iManager U2000 Unified Network Management System V100R002C00
Product Description
Issue
03
Date
2010-11-02
HUAWEI TECHNOLOGIES CO., LTD.
Copyright © Huawei Technologies Co., Ltd. 2010. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied.
Huawei Technologies Co., Ltd. Address:
Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China
Website:
http://www.huawei.com
Email:
[email protected]
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
i
iManager U2000 Unified Network Management System Product Description
About This Document
About This Document Related Version The following table lists the product version related to this document. Product Name
Version
iManager U2000
V100R002C00
Intended Audience The iManager U2000 Product Description describes the position, functional characteristics, system architecture and networking mode of the U2000, appended with standards that the U2000 complies with, and performance indexes. This document provides guides for getting the features and functions of the U2000. This document is intended for:
Network Planning Engineer
Data Configuration Engineer
System Maintenance Engineer
Symbol Conventions The symbols that may be found in this document are defined as follows. Symbol
Description Indicates a hazard with a high level of risk, which if not avoided, will result in death or serious injury. Indicates a hazard with a medium or low level of risk, which if not avoided, could result in minor or moderate injury.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
iii
iManager U2000 Unified Network Management System Product Description
About This Document
Symbol
Description Indicates a potentially hazardous situation, which if not avoided, could result in equipment damage, data loss, performance degradation, or unexpected results. Indicates a tip that may help you solve a problem or save time. Provides additional information to emphasize or supplement important points of the main text.
Command Conventions The command conventions that may be found in this document are defined as follows. Convention
Description
Boldface
The keywords of a command line are in boldface.
Italic
Command arguments are in italics.
[]
Items (keywords or arguments) in brackets [ ] are optional.
{ x | y | ... }
Optional items are grouped in braces and separated by vertical bars. One item is selected.
[ x | y | ... ]
Optional items are grouped in brackets and separated by vertical bars. One item is selected or no item is selected.
{ x | y | ... }*
Optional items are grouped in braces and separated by vertical bars. A minimum of one item or a maximum of all items can be selected.
[ x | y | ... ]*
Optional items are grouped in brackets and separated by vertical bars. Several items or no item can be selected.
GUI Conventions The GUI conventions that may be found in this document are defined as follows.
iv
Convention
Description
Boldface
Buttons, menus, parameters, tabs, window, and dialog titles are in boldface. For example, click OK.
>
Multi-level menus are in boldface and separated by the ">" signs. For example, choose File > Create > Folder.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
About This Document
Change History Updates between document issues are cumulative. Therefore, the latest document issue contains all updates made in previous issues.
Changes in Issue 03 (2010-11-02) The second commercial release has the following updates: The Management capabilities of the U2000 on different hardware platforms table is updated.
Changes in Issue 02 (2010-04-15) The initial commercial release has the following changes: NMS Basic Functions Descriptions of NMS basic functions are updated. Management Capability Descriptions of management capability are updated.
Changes in Issue 01 (2009-12-28) Initial field trial release.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
v
iManager U2000 Unified Network Management System Product Description
Contents
Contents About This Document ................................................................................................................... iii 1 Overview......................................................................................................................................1-1 1.1 Network Position ........................................................................................................................................... 1-1 1.1.1 Development Trend of Network Management ..................................................................................... 1-2 1.1.2 Product Orientation .............................................................................................................................. 1-2 1.2 Product Characteristics .................................................................................................................................. 1-3 1.3 Manageable Equipment ................................................................................................................................. 1-5
2 Networking and Application ...................................................................................................2-1 2.1 U2000 Deployment Mode ............................................................................................................................. 2-1 2.1.1 Centralized Deployment of the Single-Server System ......................................................................... 2-2 2.1.2 Distributed Deployment ....................................................................................................................... 2-2 2.1.3 Centralized Deployment of an HA System .......................................................................................... 2-3 2.1.4 Distributed Deployment of an HA System ........................................................................................... 2-4 2.2 Networking Scheme Introduction ................................................................................................................. 2-5 2.2.1 Inband Networking Mode .................................................................................................................... 2-5 2.2.2 Outband Networking Mode.................................................................................................................. 2-6 2.3 Application Scenario of the U2000 Management.......................................................................................... 2-7 2.3.1 Integrated NMS for Unified Network Equipment Management .......................................................... 2-8 2.3.2 Broadband Bearer Network.................................................................................................................. 2-9 2.3.3 Mobile Bearer Network ..................................................................................................................... 2-10 2.3.4 IP Core Network ................................................................................................................................ 2-12 2.3.5 Access Network ................................................................................................................................. 2-14
3 System Architecture ...................................................................................................................3-1 3.1 Software Structure ......................................................................................................................................... 3-1 3.1.1 Software Structure of the U2000 Single-Server System ...................................................................... 3-1 3.1.2 Software Structure of the U2000 HA System (Veritas Hot Standby) ................................................... 3-2 3.2 External Interfaces ........................................................................................................................................ 3-4 3.2.1 NBI....................................................................................................................................................... 3-5 3.2.2 SBI ....................................................................................................................................................... 3-9
4 NMS Basic Functions ................................................................................................................4-1 4.1 Security Management .................................................................................................................................... 4-3
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
vii
Contents
iManager U2000 Unified Network Management System Product Description
4.2 Topology Management .................................................................................................................................. 4-5 4.3 Alarm Management ....................................................................................................................................... 4-7 4.4 Performance Management ........................................................................................................................... 4-15 4.5 Inventory Management ............................................................................................................................... 4-18 4.6 Log Management ........................................................................................................................................ 4-19 4.7 Database Management ................................................................................................................................ 4-21 4.8 NE Communication Parameter Management .............................................................................................. 4-22 4.9 DCN Management ...................................................................................................................................... 4-23 4.10 NE Software Management ........................................................................................................................ 4-23 4.11 Report Management .................................................................................................................................. 4-25 4.12 System Monitoring .................................................................................................................................... 4-27
5 MSTP Network Feature Management ...................................................................................5-1 5.1 MSTP NE Management ................................................................................................................................ 5-2 5.2 MSTP Protection Subnet Management ......................................................................................................... 5-9 5.3 End-to-End MSTP Management ................................................................................................................. 5-10 5.4 End-to-End MSTP IP Management ............................................................................................................. 5-14 5.5 SDH ASON Management ........................................................................................................................... 5-15
6 WDM Network Feature Management....................................................................................6-1 6.1 WDM NE Management................................................................................................................................. 6-2 6.2 NA WDM NE Management ........................................................................................................................ 6-11 6.3 WDM Protection Subnet Management ....................................................................................................... 6-20 6.4 End-to-End WDM Management ................................................................................................................. 6-20 6.5 WDM ASON Management ......................................................................................................................... 6-23
7 RTN Network Feature Management ......................................................................................7-1 7.1 RTN NE Management ................................................................................................................................... 7-1 7.2 RTN Protection Subnet Management .......................................................................................................... 7-10 7.3 End-to-End RTN Management .................................................................................................................... 7-10 7.4 End-to-End RTN IP Management ............................................................................................................... 7-12
8 PTN Network Feature Management ......................................................................................8-1 8.1 PTN NE Management ................................................................................................................................... 8-1 8.2 End-to-End PTN Management .................................................................................................................... 8-18
9 Router Networks and Switch Networks Feature Management ........................................9-1 9.1 Router NE Management ................................................................................................................................ 9-2 9.2 Switch NE Management ................................................................................................................................ 9-6 9.3 Template Management .................................................................................................................................. 9-9 9.4 Diagnosis Management ............................................................................................................................... 9-11 9.5 Cluster Management ................................................................................................................................... 9-12 9.6 Node Redounded Management ................................................................................................................... 9-14 9.7 Report Subsystem Management .................................................................................................................. 9-14 9.8 VPN Service Management .......................................................................................................................... 9-14
viii
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Contents
9.9 Tunnel Service Management ....................................................................................................................... 9-16
10 Security Device Network Feature Management ..............................................................10-1 10.1 NE Management of Security Devices ....................................................................................................... 10-1 10.2 Single-Point Web Configuration of Security Devices ............................................................................... 10-2 10.3 Centralized Security Policy Configuration ................................................................................................ 10-3 10.3.1 Policy Package Management ........................................................................................................... 10-4 10.3.2 Security Policy Configuration .......................................................................................................... 10-5 10.3.3 Attack Defense Configuration .......................................................................................................... 10-5 10.3.4 Policy Resource Configuration ........................................................................................................ 10-6 10.3.5 Mapping Service .............................................................................................................................. 10-6 10.4 Report Subsystem Management ................................................................................................................ 10-6 10.5 VPN Service Management ........................................................................................................................ 10-7 10.5.1 IPSec End-to-End Service ................................................................................................................ 10-7 10.5.2 Remote Access Service .................................................................................................................... 10-7
11 FTTx Network Feature Management .................................................................................11-1 11.1 OLT Management ...................................................................................................................................... 11-1 11.2 ONU Management .................................................................................................................................... 11-3
12 MSAN Network Feature Management ..............................................................................12-1 12.1 MSAN Management ................................................................................................................................. 12-1
13 DSLAM Network Feature Management............................................................................13-1 13.1 DSLAM Management ............................................................................................................................... 13-1
14 ONT Management .................................................................................................................14-1 15 Reliability ................................................................................................................................15-1 15.1 Reliability Indicator................................................................................................................................... 15-1 15.2 HA System ................................................................................................................................................ 15-2 15.3 DCN Protection ......................................................................................................................................... 15-3 15.4 Disk Mirroring .......................................................................................................................................... 15-3 15.5 Data Backup .............................................................................................................................................. 15-3
16 Performance Indicators .........................................................................................................16-1 17 Management Capability .......................................................................................................17-1 17.1 Management Capability ............................................................................................................................ 17-1 17.2 Manageable MSTP Series Equipment ..................................................................................................... 17-12 17.3 Manageable WDM Series Equipment ..................................................................................................... 17-14 17.4 Manageable NA WDM Series Equipment............................................................................................... 17-15 17.5 Manageable Marine Series Equipment .................................................................................................... 17-16 17.6 Manageable RTN Series Equipment ....................................................................................................... 17-16 17.7 Manageable PTN Series Equipment ........................................................................................................ 17-17 17.8 Manageable FTTx Series Equipment ...................................................................................................... 17-18 17.9 Manageable MSAN Series Equipment .................................................................................................... 17-19 Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
ix
Contents
iManager U2000 Unified Network Management System Product Description
17.10 Manageable DSLAM Series Equipment ............................................................................................... 17-19 17.11 Manageable Router Series Equipment .................................................................................................. 17-20 17.12 Manageable Switch Series Equipment .................................................................................................. 17-21 17.13 Manageable Metro Service Platform Equipment .................................................................................. 17-22 17.14 Manageable Broadband Access Series Equipment ................................................................................ 17-22 17.15 Manageable VoIP Gateway Equipment ................................................................................................. 17-23 17.16 Manageable WLAN Series equipment .................................................................................................. 17-23 17.17 Manageable Firewall Series Equipment ................................................................................................ 17-23 17.18 Manageable Service Inspection Gateway Equipment ........................................................................... 17-26 17.19 Manageable SVN Series Equipment ..................................................................................................... 17-27
18 Standards Compliance ..........................................................................................................18-1 A Glossary .................................................................................................................................... A-1 B Acronyms and Abbreviations ................................................................................................ B-1
x
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Figures
Figures Figure 1-1 Network position of the U2000 ........................................................................................................ 1-3 Figure 1-2 Centralized network management..................................................................................................... 1-4 Figure 2-1 Single-server mode ........................................................................................................................... 2-2 Figure 2-2 Distributed deployment mode ........................................................................................................... 2-3 Figure 2-3 Centralized deployment of an HA system......................................................................................... 2-4 Figure 2-4 Distributed deployment of an HA system ......................................................................................... 2-5 Figure 2-5 Inband networking diagram .............................................................................................................. 2-6 Figure 2-6 Outband networking mode................................................................................................................ 2-7 Figure 2-7 Integrated NMS for unified network equipment management.......................................................... 2-8 Figure 2-8 Network management solution for a broadband bearer network ...................................................... 2-9 Figure 2-9 Network management solution for a mobile bearer network .......................................................... 2-11 Figure 2-10 Network management solution for an IP core network ................................................................. 2-13 Figure 2-11 Networking application of the U2000 in the access network ........................................................ 2-15 Figure 3-1 U2000 software structure .................................................................................................................. 3-2 Figure 3-2 Software structure - Solaris HA system (Veritas hot standby) .......................................................... 3-3 Figure 3-3 Software structure - SUSE Linux HA system (Veritas hot standby) ................................................. 3-3 Figure 3-4 Software structure - Windows HA system (Veritas hot standby) ...................................................... 3-4 Figure 3-5 Function and Feature ........................................................................................................................ 3-5 Figure 4-1 Overview of some of the U2000 applications ................................................................................... 4-1 Figure 4-2 Mechanism for implementing security management ........................................................................ 4-3 Figure 4-3 Topology view and its functions ....................................................................................................... 4-5 Figure 4-4 Alarm display in the topology view .................................................................................................. 4-6 Figure 4-5 Illustration of automatic topology discovery .................................................................................... 4-7 Figure 4-6 Alarm Browsing ................................................................................................................................ 4-9 Figure 4-7 Various alarm notification means .................................................................................................... 4-13 Figure 4-8 Alarm jumping ................................................................................................................................ 4-14
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
xi
Figures
iManager U2000 Unified Network Management System Product Description
Figure 4-9 Performance Management Process ................................................................................................. 4-15 Figure 4-10 Inventory management window and its functions ........................................................................ 4-18 Figure 4-11 Log management window and its functions .................................................................................. 4-19 Figure 4-12 Function and Feature .................................................................................................................... 4-24 Figure 4-13 Diagram of the NE resource report ............................................................................................... 4-26 Figure 4-14 Diagram of the network resource report ....................................................................................... 4-27 Figure 8-1 Unicast MPLS tunnel ...................................................................................................................... 8-10 Figure 8-2 CES service application model ....................................................................................................... 8-12 Figure 8-3 ATM service application model ...................................................................................................... 8-13 Figure 8-4 E-Line Service ................................................................................................................................ 8-14 Figure 8-5 E-Aggr service scenario 1 ............................................................................................................... 8-15 Figure 8-6 E-Aggr service scenario 2 ............................................................................................................... 8-15 Figure 8-7 E-LAN service ................................................................................................................................ 8-16 Figure 9-1 Cluster topology.............................................................................................................................. 9-13 Figure 9-2 Navigation path to cluster functions ............................................................................................... 9-13
xii
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Tables
Tables Table 4-1 Description of alarm functions ........................................................................................................... 4-9 Table 4-2 Monitoring template type ................................................................................................................. 4-16 Table 8-1 Types of PTN service interfaces ......................................................................................................... 8-3 Table 15-1 Reliability indicators of the U2000 ................................................................................................. 15-2 Table 15-2 Data backup .................................................................................................................................... 15-4 Table 16-1 Performance indicators ................................................................................................................... 16-1 Table 16-2 DCN bandwidth requirements ........................................................................................................ 16-2 Table 17-1 Management capabilities of the U2000 on different hardware platforms ....................................... 17-3 Table 17-2 Management capabilities of the U2000 on different OptiX NE equivalents .................................. 17-7 Table 17-3 Management capabilities of the U2000 on different IP NE equivalents ......................................... 17-9 Table 17-4 Management capabilities of the U2000 on different access NE equivalents ................................ 17-12 Table 17-5 Manageable MSTP series equipment ............................................................................................ 17-13 Table 17-6 Manageable WDM equipment ...................................................................................................... 17-14 Table 17-7 Manageable NA WDM series equipment ..................................................................................... 17-16 Table 17-8 Manageable marine series equipment ........................................................................................... 17-16 Table 17-9 Manageable RTN equipment ........................................................................................................ 17-17 Table 17-10 Manageable PTN series equipment ............................................................................................ 17-17 Table 17-11 Manageable FTTx series equipment ........................................................................................... 17-18 Table 17-12 Manageable MSAN series equipment ........................................................................................ 17-19 Table 17-13 Manageable DSLAM series equipment ...................................................................................... 17-19 Table 17-14 Manageable router series equipment .......................................................................................... 17-20 Table 17-15 Manageable switch series equipment ......................................................................................... 17-21 Table 17-16 Manageable Metro service platform equipment ......................................................................... 17-22 Table 17-17 Manageable broadband access series equipment ........................................................................ 17-22 Table 17-18 Manageable VoIP gateway equipment ........................................................................................ 17-23 Table 17-19 Manageable WLAN series equipment ........................................................................................ 17-23
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
xiii
Tables
iManager U2000 Unified Network Management System Product Description Table 17-20 Manageable firewall series equipment ....................................................................................... 17-23 Table 17-21 Manageable service inspection gateway equipment ................................................................... 17-26 Table 17-22 Manageable SVN series equipment ............................................................................................ 17-27 Table 18-1 Details of the Standards and Protocols ........................................................................................... 18-2
xiv
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
1 Overview
1
Overview
About This Chapter This topic describes the position of the U2000 in the telecommunication management network (TMN) hierarchy, the product characteristics, and the equipment that the U2000 can manage. 1.1 Network Position Introduce the development trend of network management and the network position of the U2000. 1.2 Product Characteristics After software optimization, the U2000 improves the capability of managing integrated networks, scalability, and ease of use. Therefore, the U2000 helps to construct a customer-centered and future-oriented network management system of a new generation. 1.3 Manageable Equipment Introduce the equipment that the U2000 V100R002C00 can manage.
1.1 Network Position Introduce the development trend of network management and the network position of the U2000. 1.1.1 Development Trend of Network Management With the development of IT and IP technology and the convergence of telecommunications, IT, media, and electronic industries, the telecommunications industry has witnessed tremendous growth. The broadband services and mobile services have become the mainstream services in telecommunications networks. 1.1.2 Product Orientation The U2000 is the major and future-oriented network management product and solution in Huawei.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
1-1
iManager U2000 Unified Network Management System Product Description
1 Overview
1.1.1 Development Trend of Network Management With the development of IT and IP technology and the convergence of telecommunications, IT, media, and electronic industries, the telecommunications industry has witnessed tremendous growth. The broadband services and mobile services have become the mainstream services in telecommunications networks. All-IP architecture and fixed-mobile convergence (FMC) are the network development goals for the next three to five years, during which the market orientations and business modes of telecom carriers will vary accordingly. The development of all-IP architecture is the leading factor in the transition from the existing vertical network that is divided by technology and service to the flattened horizontal network. Improving user experience, lowering operation expenditure (OPEX), and improving efficiency are the driving forces for FMC. Network convergence requires network management to be consolidated. To be oriented to the future network trend, the iManager U2000 that is the integrated network management system (NMS) combines all-IP and FMC, and manages carrier equipment and access equipment in a centralized manner. The U2000 can perform not only integrated management of multi-domain equipment but also integrated management at the network element (NE) and network layers. The U2000 has revolutionized the layer-based management mode to meet the management requirements in the transition from the existing vertical network to the flattened horizontal network. The integrated NMS U2000 aims to minimize operation and maintenance (O&M) costs for customers and to bring more network value. The U2000 is based on the design of distributed software architecture, and supports the new generation advanced telecom computing architecture (ATCA) hardware platform. In addition, the super network management capability and modular software architecture of the U2000 that shapes the development trend in the future network management make the U2000 a leading all-IP and FMC management solution.
1.1.2 Product Orientation The U2000 is the major and future-oriented network management product and solution in Huawei. The U2000 is an integrated management platform for all equipment in the Huawei. It can manage transport equipment, access equipment, and IP equipment (including routers, security equipment, and Metro Ethernet equipment) in a centralized manner. The U2000 is designed as the management system for Huawei equipment. With powerful management functions at the NE and network layers, the U2000 is the major and future-oriented network management product and solution in Huawei. In the TMN hierarchy, the U2000 is located between the element management layer and network management layer, and supports all functions of the NE and network layers. Figure 1-1 shows the network position of the U2000.
1-2
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
1 Overview
Figure 1-1 Network position of the U2000 OSS Service management layer XML/CORBA/SNMP/FTP iManager U2000
Network management layer
+
Element management layer
Access network MSAN/FTTX
Transport network SDH/WDM/ OTN/MW
IP network Router/Switch/ BRAS/PTN
Network element layer
1.2 Product Characteristics After software optimization, the U2000 improves the capability of managing integrated networks, scalability, and ease of use. Therefore, the U2000 helps to construct a customer-centered and future-oriented network management system of a new generation.
Centralized Network Management The U2000 can manage transport equipment, access equipment, and IP equipment in a centralized manner. Figure 1-2 shows the equipment that the U2000 manages. The main characteristics of the U2000 are as follows:
Manages multiple equipment and the services related to the equipment in Huawei. For details, see 1.3 Manageable Equipment.
Manages end-to-end services across domains in access and bearer networks. The services include synchronous digital hierarchy (SDH, WDM, microwave, and packet services).
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
1-3
iManager U2000 Unified Network Management System Product Description
1 Overview
Figure 1-2 Centralized network management
U2000
IP MSAN
WDM EPE NPE
EPE
VDSL2 OLT
BRAS
VPLS/MPLS
IP/MPLS
NPE
AG
MSE MSTP
MSTP
BRAS
Internet/ SP WDM
MSTP
VC12/VC4
UPE
Home/Business
IPTV
MSE EPE
ONT
IMS Core
Access Node
MSTP
MSTP
Metro Network
SR/BRAS
Backbone
Multiple Operating Systems The U2000 is a stand-alone application that can be installed on different operating systems and databases. Hence, multiple operating systems are compatible. The U2000 is developed based on Huawei's integrated management application platform (iMAP). It supports Sun workstations, PC servers, Sybase databases, Oracle databases, SQL Server databases, and Solaris, Windows, and SuSE Linux operating systems. It provides high-end solutions to large-scale networks and low-cost solutions to small and medium-scale networks.
Modular Architecture The U2000 uses a modular design to increase system flexibility.
1-4
By adopting the mature and widely-used C/S (Client/Server) architecture, the U2000 supports distributed and hierarchical database system, service processing system, and foreground application system, and supports concurrent operations of multiple clients, to meet the management requirements of complex and large-scale networks.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
1 Overview
The U2000 uses an object-oriented, multiprocessing, modular, and componentized architecture design. Hence, the degree of coupling of NE management components decreases. In addition, different application processes are integrated into the system by means of registry files. In this way, the U2000 has flexible expansion capabilities.
Stand-alone and distributed deployment of the U2000 increases the management capability to a great extent.
The modular architecture of the U2000 meets the management requirements of products in a single domain and the integrated management requirements of products across domains.
1.3 Manageable Equipment Introduce the equipment that the U2000 V100R002C00 can manage. The equipment that the U2000 V100R002C00 can manage is listed as follows:
Manageable MSTP series equipment
Manageable WDM series equipment
Manageable NA WDM series equipment
Manageable marine series equipment
Manageable RTN series equipment
Manageable PTN series equipment
Manageable FTTx series equipment
Manageable MSAN series equipment
Manageable DSLAM series equipment
Manageable router series equipment
Manageable switch series equipment
Manageable Metro service platform series equipment
Manageable broadband access series equipment
Manageable VoIP gateway series equipment
Manageable WLAN series series equipment
Manageable firewall series equipment
Manageable service inspection gateway series equipment
Manageable SVN series equipment
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
1-5
iManager U2000 Unified Network Management System Product Description
2
2 Networking and Application
Networking and Application
About This Chapter The U2000 provides a centralized networkwide management solution to transport, IP, and access networks. In addition, the U2000 provides standard external interfaces to integrate with the operation support system (OSS), to meet the management requirements of large-scale transport networks. 2.1 U2000 Deployment Mode The U2000 supports the centralized and distributed deployment modes of servers. 2.2 Networking Scheme Introduction The U2000 adopts the widely used C/S (Client/Server) model. In such a model, the client and the server communicate through the LAN or wide area network (WAN). The U2000 server communicates with its managed devices in inband or outband networking mode. 2.3 Application Scenario of the U2000 Management This topic describes the typical application scenario of U2000 management.
2.1 U2000 Deployment Mode The U2000 supports the centralized and distributed deployment modes of servers. The U2000 uses the Client/Server architecture. Depends on the sizes of managed networks, the U2000 supports the centralized and distributed deployment modes of servers. To ensure the high availability of the system, the U2000 supports the HA system (Veritas hot standby). The HA system (Veritas hot standby) can also be configured in the distributed mode. The U2000 system contains management components for manageable equipment. The components support multiple instances in the distributed mode. 2.1.1 Centralized Deployment of the Single-Server System The U2000 supports centralized deployment of the single-server system on Windows, Solaris or SUSE Linux OS, that is, there is only one U2000 server on which all management components are installed and all processes run. 2.1.2 Distributed Deployment
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
2-1
iManager U2000 Unified Network Management System Product Description
2 Networking and Application
The U2000 supports distributed deployment of the single-server system on SUSE Linux OS. Slave servers can share the CPU usage and memory usage of the master server. In this manner, the load is balanced. 2.1.3 Centralized Deployment of an HA System The U2000 HA system (Veritas hot standby) supports the centralized deployment mode where there is only one server on either the primary site or the secondary site. 2.1.4 Distributed Deployment of an HA System The U2000 HA system (Veritas hot standby) on SUSE Linux OS supports the distributed deployment mode where both the primary and secondary sites use distributed systems.
2.1.1 Centralized Deployment of the Single-Server System The U2000 supports centralized deployment of the single-server system on Windows, Solaris or SUSE Linux OS, that is, there is only one U2000 server on which all management components are installed and all processes run. The U2000 supports a networking scheme of a single server and multiple clients. In the centralized deployment mode of the single-server system, there is only one U2000 server on which all management components are installed and all processes run. See Figure 2-1. Figure 2-1 Single-server mode
This type of networking is applicable to medium and small-scale networks.
2.1.2 Distributed Deployment The U2000 supports distributed deployment of the single-server system on SUSE Linux OS. Slave servers can share the CPU usage and memory usage of the master server. In this manner, the load is balanced. The U2000 supports a networking scheme of multiple servers and clients, as shown in Figure 2-2.
2-2
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
2 Networking and Application
Figure 2-2 Distributed deployment mode
The management components for manageable equipment can be deployed on different servers or on the same server. Distributed system consists of the master server and slave server, which compose a site to perform the U2000 server function. The master server is the core of a distributed system. The database server and the core subsystems of the U2000 are running on the master server. The non-core subsystems of the U2000 (such as the management components for manageable equipment) are running on the slave server. In this way, the CPU usage and the memory usage of the master server are lowered, the load is balanced between the master and slave servers and the management capability of the U2000 is increased. In the distributed deployment mode, you can deploy all servers in only the same LAN.
2.1.3 Centralized Deployment of an HA System The U2000 HA system (Veritas hot standby) supports the centralized deployment mode where there is only one server on either the primary site or the secondary site.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
2-3
2 Networking and Application
iManager U2000 Unified Network Management System Product Description
The primary and secondary sites comprise an HA system. The data in different locations is backed up through a network. When a fault occurs in the primary site, the system switches to the secondary site so that network monitoring continues. Figure 2-3 shows the networking diagram. Figure 2-3 Centralized deployment of an HA system
2.1.4 Distributed Deployment of an HA System The U2000 HA system (Veritas hot standby) on SUSE Linux OS supports the distributed deployment mode where both the primary and secondary sites use distributed systems. The primary and secondary sites comprise an HA system. The data in different locations is backed up through a network. When a fault occurs in the primary site, the system switches to the secondary site so that network monitoring continues. In the primary or secondary site, master and slave servers are deployed in a distributed mode. The slave servers can share the CPU usage and memory usage of the master server. In this manner, the load is balanced between the master and slave servers. Figure 2-4 shows the networking diagram.
2-4
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
2 Networking and Application
Figure 2-4 Distributed deployment of an HA system
2.2 Networking Scheme Introduction The U2000 adopts the widely used C/S (Client/Server) model. In such a model, the client and the server communicate through the LAN or wide area network (WAN). The U2000 server communicates with its managed devices in inband or outband networking mode. 2.2.1 Inband Networking Mode In inband networking mode, the U2000 uses the service channels that are provided by the managed devices to manage the devices on the network. The messages sent from the U2000 are transmitted through the service channels of the managed devices. 2.2.2 Outband Networking Mode In outband networking mode, the U2000 uses the communication channels that are provided by devices other than the managed devices to transmit messages for network management. In normal cases, the management interface on the main processing unit or routing switch unit of the managed device are used as the access interface.
2.2.1 Inband Networking Mode In inband networking mode, the U2000 uses the service channels that are provided by the managed devices to manage the devices on the network. The messages sent from the U2000 are transmitted through the service channels of the managed devices. Figure 2-5 shows the inband networking diagram.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
2-5
iManager U2000 Unified Network Management System Product Description
2 Networking and Application
Figure 2-5 Inband networking diagram
Managed Network NMS
Networking Description The devices managed by the U2000 are all connected to the managed network. The U2000 needs to be connected to only the nearby NE on the managed network. After configuring the related routes, you can manage all the devices on the network. The way of connecting the U2000 with the managed network depends on the distance between the U2000 and its nearby NE. If the U2000 and its nearby IP devices are in the same equipment room, you can use the LAN mode. If the U2000 and its nearby IP devices are far from each other, you can use the private line mode. The private line mode is similar to the outband networking mode.
Networking Advantages: This networking mode is flexible and cost-effective. It does not need extra devices.
Networking Disadvantages: In the case of network failure, the communication channel between the U2000 and its managed network is interrupted. As a result, the U2000 cannot maintain the managed network.
2.2.2 Outband Networking Mode In outband networking mode, the U2000 uses the communication channels that are provided by devices other than the managed devices to transmit messages for network management. In normal cases, the management interface on the main processing unit or routing switch unit of the managed device are used as the access interface. In this mode, the U2000 can be connected to the managed devices in multiple ways. The U2000 manages the devices within its management scope through the data communication network (DCN).Figure 2-6 shows the outband networking mode.
2-6
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
2 Networking and Application
Figure 2-6 Outband networking mode
DCN
NMS
Managed Network
Networking description The devices managed by the U2000 are all connected to the managed network. The U2000 connects with the devices on the managed network through the DCN that is made up of other devices. In this manner, the U2000 implements its management on the managed network and devices.
Networking advantages: In outband networking mode, the U2000 is connected to its managed devices through other devices. It is not connected to its managed devices directly. Compared with the inband networking mode, this mode provides more reliable device management channels. When a fault occurs on a managed device, the U2000 can locate information about the faulty device in a timely manner and monitor this device in real time.
Networking disadvantages: In outband networking mode, the U2000 manages its managed devices through a maintenance channel that is independent of the service channel. To provide such a maintenance channel, you need to build a network that is made up of extra devices. Thus, the cost of constructing the network is high.
2.3 Application Scenario of the U2000 Management This topic describes the typical application scenario of U2000 management. 2.3.1 Integrated NMS for Unified Network Equipment Management This topic describes the integrated NMS U2000, which is developed for the typical solution of unified equipment management. 2.3.2 Broadband Bearer Network
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
2-7
iManager U2000 Unified Network Management System Product Description
2 Networking and Application
The U2000 provides perfect solutions for broadband bearer networks in terms of network deployment, service deployment, and service assurance. 2.3.3 Mobile Bearer Network The U2000 provides perfect solutions for mobile bearer networks in terms of network deployment, service deployment, and service assurance. 2.3.4 IP Core Network The U2000 provides perfect solutions for IP core networks in terms of network deployment, service deployment, and service assurance. 2.3.5 Access Network In the networking application of the access network, the U2000 manages and maintains xPON OLTs, ONUs, MSANs, DSLAMs and ONTs in a centralized manner.
2.3.1 Integrated NMS for Unified Network Equipment Management This topic describes the integrated NMS U2000, which is developed for the typical solution of unified equipment management. Figure 2-7 Integrated NMS for unified network equipment management oss
Service management layer
XML/CORBA/SNMP/FTP/TL1 iManager U2000 Network management layer + NE management layer
Access network MSAN/FTTX
Access network
Transport network SDH/WDM/OTN/MW
Datacom network Router/Switch/BRAS /PTN
NE layer
The features of the U2000 are as follows:
2-8
The U2000 provides a unified platform for managing access equipment, transport equipment, and datacom equipment, thus realizing integrated management on cross-domain equipment. In addition, the U2000 breaks the restrictions of the vertical management mode and realizes integrated management on the equipment at the network layer and NE layer.
The U2000 meets the network integration trend and can provide management schemes for multiple types of networking scenarios. With unified and consistent GUIs, simple and convenient service deployment, and effective service monitoring and assurance, the U2000 brings good user experience and greatly reduces network operation and maintenance costs.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
2 Networking and Application
U2000Blessed by the good cooperation relationships between Huawei and many mainstream OSS vendors, the U2000 can provide abundant NBIs and powerful NBI customization support, protecting user investment to the largest extent.
2.3.2 Broadband Bearer Network The U2000 provides perfect solutions for broadband bearer networks in terms of network deployment, service deployment, and service assurance.
Networking Diagram Figure 2-8 Network management solution for a broadband bearer network
Network Deployment The U2000 meets the following requirements in the network deployment stage:
Supporting the remote disaster recovery solutions When the active server fails, the standby server can take over as the active server to avoid service interruption.
Issue 03 (2010-11-02)
Providing the fast OSS integration capability through abundant NBIs such as SNMP, FTP, CORBA, and XML NBIs and implementing end-to-end management by providing alarm, inventory, and performance data for upper-layer OSSs.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
2-9
iManager U2000 Unified Network Management System Product Description
2 Networking and Application
Service Deployment Carrying multiple services is one of the most distinctive features of the Metro Ethernet. Services such as the high-speed internet (HSI) service, IPTV, and voice over IP (VoIP) must be established on logical channels. The U2000 allows you to quickly establish specific logical channels on physical networks. For example, you can quickly establish end-to-end MPLS LSP, MPLS TE, PW, and VPLS logical channels through GUIs. You can verify the validity of services before deployment and modify services after the logical channels are established. The Metro Ethernet often carries heavy service traffic. To adapt to this feature, the U2000 provides the batch deployment function to accelerate the deployment process. To ensure the reliability of key channels, you can configure protection protocols such as BFD, VRRP, and MPLS OAM. The U2000 provides efficient test diagnosis tools. Through the related test cases, you can use test diagnosis tools to quickly identify fault causes and rectify network faults, thus ensuring network stability.
Service Assurance The U2000 monitors the running status of the network 24 hours a day and 7 days a week in multiple ways. It can detect network faults or degradation in a timely manner and report endto- end SLA data of the network. The U2000 provides the following service assurance for the broadband bearer network:
Real-time alarm monitoring and notification The U2000 can monitor network faults and the status of devices and interfaces in real time. By notifying the related personnel of network faults through the SMS or email, the U2000 effectively ensures the normal running of the network.
Performance monitoring 24 hours a day and 7 days a week The U2000 regularly collects the traffic data of all the links or some key links on the entire network to provide effective support for network monitoring.
End-to-end SLA monitoring on network nodes The U2000 regularly collect the SLA data between PEs, between the local CE and PE, and between the PE and remote CE. With these data, you can discover network degradation, predict the trend of network running, and optimize the network accordingly.
2.3.3 Mobile Bearer Network The U2000 provides perfect solutions for mobile bearer networks in terms of network deployment, service deployment, and service assurance.
2-10
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
2 Networking and Application
Networking Diagram Figure 2-9 Network management solution for a mobile bearer network
Network Deployment The U2000 meets the following requirements in the network deployment stage:
Large-scale network management in distributed deployment mode In distributed deployment mode, NE Explorer instances can be deployed on one or more servers, enabling the entire system to have good expansibility and meet various complex network management requirements. This greatly reduces the operation and maintenance investment of large-scale networks.
HA solution The U2000 supports two-node cluster backup and real-time monitoring to ensure data security.
Service Deployment On a mobile bearer network, the TDM base station, ATM base station, and IP base station are borne by end-to-end PWs. The U2000 supports the following features in terms of service deployment: Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
2-11
iManager U2000 Unified Network Management System Product Description
2 Networking and Application
Providing user-friendly GUIs for the creation and maintenance of logical CES, ATM, Ethernet, and PWE3 channels
Supporting the ability to perform end-to-end management on static and dynamic tunnels and to query the binding relations between PWs and tunnels
Supporting the ability to configure protocols such as BFD, VRRP, IP FRR, MPLS OAM, and QoS to ensure service reliability
Supporting the ability to deploy services in batches through the service template to improve the efficiency and preciseness of service deployment, in the case that a large number of NEs are deployed on the mobile bearer network
Service Assurance The U2000 provides the following service assurance for the mobile bearer network:
Real-time alarm monitoring and notification The U2000 can monitor network faults and the status of devices and interfaces in real time. By notifying the related personnel of network faults through the SMS or email, the U2000 effectively ensures the normal running of the network.
Performance monitoring 24 hours a day and 7 days a week The U2000 periodically collects the key performance indicators of networkwide links or specified links and dynamically displays the network running status, providing important references for locating network faults.
Service-centered performance monitoring On a mobile bearer network, you can precisely analyze the trend of service traffic, and identify and locate faults through the performance indicators used to monitor the related services, such as PWE3, VPLS, and L3VPN services.
2.3.4 IP Core Network The U2000 provides perfect solutions for IP core networks in terms of network deployment, service deployment, and service assurance.
2-12
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
2 Networking and Application
Networking Diagram Figure 2-10 Network management solution for an IP core network
Network Deployment The U2000 meets the following requirements in the network deployment stage:
Centralized deployment and authority- and domain-based user management Different users can mange different objects according to their respective management rights. In this manner, the security of the U2000 is ensured.
HA solution The U2000 supports two-node cluster backup and real-time monitoring to ensure data security.
Distributed deployment of collectors for managing large-scale networks In distributed deployment mode, NE explorer instances can be deployed on one or more servers, enabling the whole system to have good expansibility and meet various complex network management requirements. This greatly reduces the operation and maintenance investment of large-scale networks.
Service Deployment The U2000 supports the following features in terms of service deployment:
Issue 03 (2010-11-02)
Supporting the ability to deploy mainstream services such as VPLS, L3VPN, and PWE3 services and providing multiple types of service configuration templates and bulk configuration templates
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
2-13
iManager U2000 Unified Network Management System Product Description
2 Networking and Application
With simple and user-friendly GUIs, the U2000 effectively improves the efficiency of service deployment.
Supporting the ability to manage mainstream routing protocols, such as OSPF, ISIS, and BGP
Supporting the ability to configure protocols such as BFD, VRRP, IP FRR, VPN FRR, MPLS OAM, and QoS to ensure service reliability
Service Assurance The U2000 provides the following service assurance for the IP core network:
Real-time alarm monitoring and notification The U2000 can monitor network faults and the status of devices and interfaces in real time. By notifying the related personnel of network faults through the SMS or email, the U2000 effectively ensures the normal running of the network. By diagnosing services according to network protocol layers, the U2000 can quick locate the faulty network layer.
Performance monitoring 24 hours a day and 7 days a week The U2000 periodically collects the key performance indicators of networkwide links or specified links and dynamically displays the network running status, providing important references for locating network faults.
End-to-end SLA monitoring on network nodes The U2000 regularly collects the SLA data between PEs, between the local CE and PE, and between the PE and remote CE. With these data, you can discover network degradation, predict the trend of network running, and optimize the network accordingly.
2.3.5 Access Network In the networking application of the access network, the U2000 manages and maintains xPON OLTs, ONUs, MSANs, DSLAMs and ONTs in a centralized manner. Figure 2-11 shows the networking application of the U2000 in the access network.
2-14
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
2 Networking and Application
Networking Diagram Figure 2-11 Networking application of the U2000 in the access network
Networking description
Issue 03 (2010-11-02)
Broadband access: −
As IP-DSLAMs, the broadband access devices support various broadband access modes, such as the ADSL2+, SHDSL, and VDSL2. They provide high-speed Internet access service, video service, and ATM and IP private line services for business users, enterprises, cyber cafes, and common users.
−
The DSLAMs at different levels can be subtended through GE/FE ports to provide xDSL services. The subtending of devices extends the coverage of the network efficiently and meets the requirements of the scenarios in which a large number of users are supported.
−
The broadband access devices provide the LAN private line interconnection service of the carrier-class high quality. The service is applicable to the interconnection between branches, such as the government, enterprise, and business user (for example, a bank), and their headquarters. It is also applicable to other applications such as broadband Internet access and video conference.
FTTx access:
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
2-15
iManager U2000 Unified Network Management System Product Description
2 Networking and Application
2-16
−
The OLT in the PON system works with the ONU/ONT, which is connected to the LAN switch or hub in the downstream direction, to provide service access for users.
−
In the downstream direction, the OLT is connected to the MDU or mini-MSAN through fibers. The MDU or mini-MSAN provides service access for more users through twisted pairs, coaxial cables, and category-5 cables.
Integrated access: −
Controlled by the MGC, the MSAN supports the VoIP, FoIP, and MoIP service access and provides ISDN BRA and ISDN PRA services.
−
The MSAN provides the ADSL/VDSL2 broadband Internet access service and the SHDSL private line interconnection service.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
3
3 System Architecture
System Architecture
About This Chapter The U2000 provides solution of the single-layer management network for small- and medium-scale transport networks. In addition, the U2000 provides standard external interfaces, through which the U2000 is interconnected with an upper-layer NMS to form a hierarchical management network. The U2000 assists the NMS at the network management layer and the NMS at the service management layer to manage large-scale transport networks. 3.1 Software Structure This topic describes the configuration requirements of the software structures of the U2000 single server system and U2000 HA system. 3.2 External Interfaces An external interface is used for the communication and data exchange between the NMS and external systems. An external interface can be a northbound or southbound interface.
3.1 Software Structure This topic describes the configuration requirements of the software structures of the U2000 single server system and U2000 HA system. 3.1.1 Software Structure of the U2000 Single-Server System This topic describes the software structure of the U2000 single-server system. 3.1.2 Software Structure of the U2000 HA System (Veritas Hot Standby) This topic describes the software structure of the U2000 HA system (Veritas Hot Standby).
3.1.1 Software Structure of the U2000 Single-Server System This topic describes the software structure of the U2000 single-server system. The U2000 single-server system is a standard system structure of the U2000. A U2000 server can be connected to multiple U2000 clients. Figure 3-1 shows the structural relationship between main modules.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
3-1
iManager U2000 Unified Network Management System Product Description
3 System Architecture
Figure 3-1 U2000 software structure
3.1.2 Software Structure of the U2000 HA System (Veritas Hot Standby) This topic describes the software structure of the U2000 HA system (Veritas Hot Standby). The U2000 HA system (Veritas Hot Standby), a type of HA system provided by the U2000, applies to geographic redundancy of an HA system. The U2000 HA system (Veritas Hot Standby) supports the Solaris, SUSE Linux, and Windows. Figure 3-2, Figure 3-3, and Figure 3-4 show the software structure.
3-2
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
3 System Architecture
Figure 3-2 Software structure - Solaris HA system (Veritas hot standby)
Figure 3-3 Software structure - SUSE Linux HA system (Veritas hot standby)
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
3-3
iManager U2000 Unified Network Management System Product Description
3 System Architecture
Figure 3-4 Software structure - Windows HA system (Veritas hot standby)
The Veritas volume replicator (VVR) is used to duplicate the U2000 data on the primary site to the secondary site so that data is synchronized between the primary and secondary sites in real time.
The Veritas cluster server (VCS) is used to monitor the system and application service in real time. When a fault occurs in hardware or software, the VCS restarts or stops the application service.
The Veritas volume manager (VxVM) is used to manage the disks and data volumes of servers.
3.2 External Interfaces An external interface is used for the communication and data exchange between the NMS and external systems. An external interface can be a northbound or southbound interface. Figure 3-5 depicts the function and feature of external interface.
3-4
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
3 System Architecture
Figure 3-5 Function and Feature
3.2.1 NBI Through the NBIs, the U2000 offers networking monitoring information for the OSS on various aspects, such as alarms, performance, and inventory. Meanwhile, the NBIs of the U2000 support network management functions, including service provisioning and diagnosis test. By using NBIs of the U2000, you can integrate the U2000 flexibly with different OSSs. 3.2.2 SBI Through the SBI, the U2000 can connect to the lower-layer NMSs and equipment, so as to implement the functions such as provisioning services, transmitting alarms, and transmitting performance data.
3.2.1 NBI Through the NBIs, the U2000 offers networking monitoring information for the OSS on various aspects, such as alarms, performance, and inventory. Meanwhile, the NBIs of the U2000 support network management functions, including service provisioning and diagnosis test. By using NBIs of the U2000, you can integrate the U2000 flexibly with different OSSs. The following table lists the equipment supported by the NBIs of the U2000.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
3-5
iManager U2000 Unified Network Management System Product Description
3 System Architecture
Interface Type
Equipment
XML
The XML NBI enables unified management functions for the OSS in terms of alarms, performance, inventory, and service provisioning. These management functions apply to routers, Metro equipment, transport equipment, and access equipment.
CORBA
The CORBA NBI enables unified alarm management for the OSS on routers, Metro equipment, transport equipment, and access equipment. Meanwhile, the CORBA NBI enables management of performance, inventory, and service provisioning for the OSS in Metro and transport domains.
SNMP
The SNMP NBI enables unified alarm management of the OSS on routers, Metro equipment, transport equipment, and access equipment.
TL1
The TL1 NBI enables inventory query, inventory provisioning, and service provisioning (xDSL, xPON, broadband, and narrowband services) for the OSS in the access domain.
FTP
The FTP performance NBI enables the export of performance statistics for the OSS. In this case, the performance statistics is exported to the specified FTP server for analysis.
MML
The U2000 can access an OSS test system, and can support tests on narrowband access devices (lines and terminals) and ADSL lines through the OSS test NBI.
XML NBI Compliant with the TMF MTOSI 2.0 series standard, the U2000 XML NBI enables unified management functions of the OSS in terms of alarms, performance, inventory, and service provisioning. These management functions apply to routers, Metro equipment, transport equipment, and access equipment. The U2000 XML NBI mainly supports the following functions:
Alarm management −
Report alarm events.
−
Synchronize active alarms.
−
Acknowledge alarms.
−
Unacknowledge alarms.
−
Collect alarm statistics.
Performance management −
Query history performance data.
−
Query current performance data.
−
Report performance threshold-crossing events.
−
Query performance threshold-crossing events.
Inventory management −
3-6
Query physical inventory (NE, shelf, slot, card, and physical port).
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
3 System Architecture
−
Query logical inventory (logical port, fiber/cable, tunnel, and service).
−
Export inventory data and report the change of inventory.
Service provisioning management −
Provision resources for the routing and Metro tunnels (MPLS tunnel and IP tunnel).
−
Provision resources for the routing and Metro services (ATM PWE3, CES PWE3, ETH PWE3, VPLS, and L3VPN).
CORBA NBI Compliant with the TMF MTNM V3.5 series standard, the U2000 CORBA NBI enables unified alarm management for the OSS. Meanwhile, the CORBA NBI enables service provisioning, diagnosis test, inventory management, and performance management on Metro and transport equipment. The U2000 CORBA NBI mainly supports the following functions:
Alarm management −
Report alarm events.
−
Synchronize active alarms.
−
Acknowledge alarms.
−
Unacknowledge alarms.
Performance management in the Metro and transport domains −
Query history performance data.
−
Query current performance data.
−
Report performance threshold-crossing events.
−
Query performance threshold-crossing events.
Inventory management in the Metro and transport domains −
Query physical inventory (NE, shelf, slot, card, and physical port).
−
Query logical inventory (logical port, fiber/cable, and trail).
Service provisioning management in the Metro and transport domains −
Provision end-to-end services in the transport domain (SDH, WDM, OTN, MSTP, ASON, and RTN).
−
Provision single-station services in the transport domain (SDH, WDM, OTN, and MSTP).
−
Provision resources for Metro tunnels (MPLS tunnel and IP tunnel).
−
Provision resources for Metro services (ATM PWE3, CES PWE3, ETH PWE3, and VPLS).
Diagnosis test management in the transport domain −
Set loopback on a port and alarm insertion.
−
Conduct Ethernet CC, LB, and LT tests.
−
Conduct the 2M PRBS test.
SNMP NBI Compliant with the SNMP V1/V2/V3 standard, the U2000 SNMP NBI enables unified alarm management of the OSS on routers, Metro equipment, transport equipment, and access equipment.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
3-7
iManager U2000 Unified Network Management System Product Description
3 System Architecture
The U2000 SNMP NBI mainly supports the following functions:
Report alarm events.
Synchronize active alarms.
Acknowledge alarms.
Unacknowledge alarms.
Report heartbeat alarm events.
Set alarm filter criteria.
TL1 NBI Compliant with the GR 831 standard, the U2000 TL1 NBI enables inventory query, inventory provisioning, and service provisioning (xDSL, xPON, broadband, and narrowband services) for the OSS in the access domain. The U2000 TL1 NBI mainly supports the following functions:
Service provisioning management in the access domain −
Provision xDSL services (ADSL, SHDSL, and VDSL2).
−
Provision xPON services (GPON and EPON).
−
Provision multicast services.
−
Provision voice services.
−
Provision BRAS services.
−
Manage service port/PVC connections.
−
Manage VLANs.
−
Manage Ethernet ports.
−
Manage ACL&Qos.
Inventory management in the access domain −
Query resources (equipment, shelf, card, daughter card, port, and service virtual port).
−
Report resource change notification.
−
Manage and maintain resources.
FTP Performance NBI The U2000 FTP performance NBI enables the export of performance statistics for the OSS. In this case, the performance statistics is exported to the specified FTP server for analysis. The U2000 FTP performance NBI mainly supports the following functions:
Set conditions for exporting performance data, as follows: −
Monitoring period of performance events
−
Monitoring indicator of performance events
−
Export period of performance data
Export performance data to the specified FTP server.
MML Test NBI The U2000 provides the MML NBI for the upper layer OSS to implement the following features:
3-8
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
3 System Architecture
Controlling the test component of an access device to perform a line test and report the test result.
Issuing commands to capture or release a subscriber line to the test bus of a device and then using external test unit to perform a line test.
The MML NBI solves the following problems:
A centralized line test system is provided to manage and test lines in the entire network. These lines can be managed by EMSs provided by different vendors.
The integrated line test system can control an access device and a test unit concurrently to perform a line test.
The U2000 supports the following types of MML NBIs:
Narrowband line test NBI: It is used to test narrowband access devices (lines and terminals).
ADSL line test NBI: It is used to query ADSL port information, and capture or release lines.
3.2.2 SBI Through the SBI, the U2000 can connect to the lower-layer NMSs and equipment, so as to implement the functions such as provisioning services, transmitting alarms, and transmitting performance data.
Qx Interface The Qx interface adopts the private OptiX management protocol developed by Huawei. Through the Qx interface, the U2000 is connected to the OptiX series equipment.
SNMP SBI The SNMP interface is compliant with the SNMP V1, V2, and V2 standards. Through the SNMP interface, the U2000 is connected to routers, switches, and security products of Huawei.
CLI SBI Through the CLI interface, the U2000 is connected to routers, switches, and security products of Huawei.
SSH SBI Secure Shell (SSH) is a tool that is similar to Telnet. All the transmitted data can be encrypted through the SSH to prevent DNS spoofing and IP spoofing. In addition, the transmission rate is high because the data transmitted through the SSH is compressed.
Telnet SBI Through the Telnet SBI, the U2000 can log in to equipment remotely and manage equipment.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
3-9
iManager U2000 Unified Network Management System Product Description
3 System Architecture
TFTP/FTP/SFTP SBI The U2000 can back up the data of devices, upgrade devices, and load patches through the TFTP/FTP/SFTP SBI. When the data is backed up in the SFTP mode, the commands and the data are encrypted before they are transmitted.
Syslog SBI The U2000 can manage the NE logs through the Syslog SBI.
3-10
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
4
4 NMS Basic Functions
NMS Basic Functions
About This Chapter The U2000 provides all management functions at element management layer and network management layer. Figure 4-1 depicts an overview of some of the U2000 applications. Figure 4-1 Overview of some of the U2000 applications
4.1 Security Management
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
4-1
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
This topic describes how to ensure the security of the U2000 by managing objects such as users, user groups, rights, and operation sets. 4.2 Topology Management In topology management, the managed NEs and their connections are displayed in a topology view. The managed NEs are displayed and managed in subnets and views. You can monitor the operating status of the entire network in real time by browsing the topology view. 4.3 Alarm Management In alarm management, you can monitor network exceptions in real time. It provides various management methods such as alarm statistics, alarm identification, alarm notification, alarm redefinition, and alarm correlation analysis. This helps the network administrator take proper measures to recover the normal operation of the network. 4.4 Performance Management The U2000 can monitor the key indicators of a network in real time, and provide statistics on the collected performance data. It provides a graphical user interface (GUI) to facilitate network performance management. 4.5 Inventory Management The U2000 provides the inventory management function that allows you to query and collect the statistics on physical and logical resources in a unified manner. 4.6 Log Management Log management includes the management of U2000 security logs, U2000 operation logs, and NE security logs. The U2000 allows you to query and save logs periodically, to detect illegal login and operations, and analyze faults in a timely manner. You can query the U2000 client that is used by a U2000 user to log in to the U2000 server and query the operations performed by the user after login. You can also dump or print log data. 4.7 Database Management The database backup management system of the U2000 provides a tool for database backup and restoration. This tool facilitates the maintenance of the U2000 database and ensures stable and safe running of the U2000. Database management includes the management of NE and U2000 databases. To ensure data security, you need to back up the database periodically. 4.8 NE Communication Parameter Management You can set the parameters for the communication between the U2000 and NEs to ensure that the U2000 communicate with the NEs in normal state. 4.9 DCN Management DCN management is applicable only to MSTP, WDM, Marine, NA WDM, PTN and microwave products. 4.10 NE Software Management U2000 supports backup and loading of the equipment data. 4.11 Report Management The U2000supports the iWeb report function and at the same time supports NMS report that provides reports about alarms, logs, and resources. The U2000 user is able to print desired data while viewing them. The report in table format supports filtering by equipment type and can be saved in Excel format.
4-2
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
4.12 System Monitoring The U2000 provides a GUI-based system monitoring tool, which is used for managing the NMS and querying the system information.
4.1 Security Management This topic describes how to ensure the security of the U2000 by managing objects such as users, user groups, rights, and operation sets. Figure 4-2 shows the mechanism for implementing security management. Figure 4-2 Mechanism for implementing security management OSS/BSS
Hacker SSL encryption
Firewall
Plain text… <=> 1010100100...
Worm
Client
Virus
Firewall iManager U2000 SSL encryption Plain text… <=> 1010100100...
Centralized authentication Account security policy Access control list
Database backup and restoration Log management
SNMP/Telnet/FTP…
Managed equipment and network
The following describes security management in details.
Login and Session Management The functions of login and session management are described as follows:
The user can log in to the U2000 with an account. The user performs operations according to the permissions assigned to the account.
If the client is not used for a period of time, the user can manually lock the client or set the lock time to make the U2000 lock the client automatically. This prevents others from performing operations illegitimately. If the client is locked out, you need to enter the user password or use the administrator account to unlock the client.
The members of the administrator group have the permissions to monitor the session information and log out of illegitimate users forcibly.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
4-3
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
The U2000 can automatically detect and clear invalid sessions.
User and User Group Management The functions of user and user group management are described as follows:
Creating a user account or user group. During user account creation, the user details, owner group of the user, management domain, user permissions, and access control list must be set. During user group creation, the user group details, management domain, and user group permissions must be set.
Modifying the user or user group information, and deleting a user account or user group.
Adding a user to a user group. After addition, the user has the permissions of the user group. A user can be added to multiple user groups. In this case, the user has the permissions of the user groups besides those of the user.
Permission Management User permissions are classified into management permissions and operation permissions. Through permission assignment, user operations on the U2000 can be controlled.
Management permissions refer to the permissions that a user is given to manage the specified equipment and its data, or the permissions that a user group is given to manage the specified domains. In the topology view, the equipment or areas that cannot be managed are invisible.
Operation permissions refer to the permissions that a user is given to perform operations. If a user does not have the permissions to manage a type of equipment, the user does not have the permissions to operate the equipment.
The functions of permission management are described as follows:
Adding or deleting user or user group permissions, and setting the management domain of the user or user group.
Creating object sets. Managed objects are grouped into different object sets to facilitate permission assignment.
Creating operation sets. Operation permissions are grouped into different operation sets to facilitate permission assignment.
Modifying or deleting object sets or operation sets.
Assigning the permissions of a type set to the user. After that, the user has the permissions to view and operate the devices whose type is consistent with the type set.
Security Policy Management The functions of security policy management are described as follows:
4-4
The password policy is used to set the user password rules and password security policies. The password rules involve the minimum password length of common users, minimum password length of superusers, and maximum password length. The password security policies involve the maximum number of password duplications with history passwords, maximum password reservation period, minimum password reservation period, and number of days ahead for notifying password expiration.
The account policy is used to set the minimum length of the user name, automatic unlocking time, maximum number of login attempts, and timeout period at a login or unlocking failure.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Access Control List The Access Control List (ACL) is a secure access control mechanism. It restricts user access to the server by allowing only the clients with specified IP addresses. ACL can effectively control the client IP addresses from which users can log in to the U2000. In this case, even if the user account and password are obtained by illegal users, these users cannot log in to the U2000. Thus, the security of the U2000 is improved.
4.2 Topology Management In topology management, the managed NEs and their connections are displayed in a topology view. The managed NEs are displayed and managed in subnets and views. You can monitor the operating status of the entire network in real time by browsing the topology view. U2000 provides the Physical Root, Clock View, IP View, Tunnel View, and Custom View. Therefore, you can view the required information in different views and also monitor and learn the operating status of the entire network.
Topology View and Its Functions The topology view of the U2000 consists of a navigation tree on the left and a view on the right. The navigation tree directly shows the network hierarchy. Meanwhile, the view displays the objects at different coordinates in the background map, which offers an intuitive view on the deployment of objects. Figure 4-3 shows the functions provided in the topology view of the U2000. Figure 4-3 Topology view and its functions
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
4-5
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Adjustable topology view: The view can be zoomed in or out so that you can view the objects clearly.
Bird's eye view: You can see the position of the current topological window in the entire view.
Network-wide NE statistics collection: You can collect statistics on the number of NE types and the number of NEs of each type in the entire network.
Filter tree: You can filter all the NEs to display only the required NEs quickly.
Status bar: It displays the information such as the current status, current login user, IP address of the server that is connected currently, and current operation result.
Topology view: A GUI in the U2000, which reflects the network structure. This GUI shows various physical and logical entities of the network and provides the entrances of various operations.
Alarm Display In the Topology View In the topology view of the U2000, alarms are displayed in different colors to indicate different status of the submaps and NEs. The alarms in the topology view are displayed by two methods: color-coded display and small icon display. The default method is the small icon display, as shown in Figure 4-4. Figure 4-4 Alarm display in the topology view
The display of topology alarms on the U2000 has the following features:
The color of a topological node indicates the polling status (such as normal, unknown, or offline) and the alarm status of the monitored NE.
When an NE generates multiple fault alarms at different severities, the corresponding topological node is displayed in the color/iron that indicates the highest alarm severity of these alarms.
When multiple nodes in a subnet generate fault alarms, the subnet is displayed in the color/iron that indicates the highest alarm severity of these alarms.
You can query the current alarms of an NE through the NE node. In addition, you can query the details of the fault alarms through the NE Panel.
Automatic Topology Discovery The U2000 provides the automatic topology discovery function. Therefore, manual intervention is not required and the operational expenditure (OPEX) is reduced. The U2000 supports two methods of automatic topology discovery, as follows:
4-6
After the SNMP parameters are set on the NE based on the SNMP protocol, the NE sends traps to the U2000 in an unsolicited manner. Then, the NE is added to the topology view on the U2000 automatically. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
In automatic topology discovery, the transport NE, NE based on the SNMP protocol, and NE based on the ICMP protocol are searched separately in batches. Then, the NE that is searched out is added to the topology view automatically.
The Secuity NE can be added to the topology view automatically by use the function of Batch Import NE.
The U2000 searches for the fiber/link in batches. Then, the discovered fiber/link is added to the topology view on the U2000 automatically.
Figure 4-5 Illustration of automatic topology discovery
1.
The automatic topology discovery operation is implemented step by step through a wizard. Specifically, the wizard guides you to configure the parameters required for the automatic discovery, such as NE type, SNMP parameters, and the IP address range.
2.
After you finish configuring the parameters, the U2000 searches for the required NE among the specified network segments according to the preset parameters. All NE (both from Huawei and other vendors) that is based on the SNMP protocol and meets the conditions is displayed automatically in the topology view. At the same time, the basic configurations of the NE is uploaded automatically. In this manner, you need not perform basic configurations on the NE again.
3.
During the discovery, you can cancel the discovery at any time. In addition, you can learn the cause if the discovery fails.
4.3 Alarm Management In alarm management, you can monitor network exceptions in real time. It provides various management methods such as alarm statistics, alarm identification, alarm notification, alarm redefinition, and alarm correlation analysis. This helps the network administrator take proper measures to recover the normal operation of the network.
Networkwide Alarm Browsing Alarm display is classified into alarm panel display, alarm topology display, and alarm browsing. The U2000 supports the following alarm browsing functions:
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
4-7
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Alarm panel display It is used to display the number of alarms of the currently managed objects by severity and simply provide the fault status of the system. It can be used as a monitoring panel.
Alarm topology display When an NE reports an alarm, the NE icon in the topology view can be in different colors according to the alarm severity. In this case, you can right-click the NE icon and query the current alarm of the NE from the shortcut menu.
Alarm browsing −
Browsingcurrent alarms It is used to browse the fault alarms that are currently not processed, that is, unacknowledged and uncleared alarms.
−
Browse history alarms It is used to browse all fault alarms that were acknowledged and cleared.
−
Browse alarm logs It is used to browse all fault alarms reported by NEs.
−
Browsing event logs It is used to browse current abnormal events.
−
Setting an alarm query template You can save common query conditions in an alarm query template. Thus, next time when you query alarms that meet the common conditions, you can use the template directly without setting query conditions again. This helps you browse and monitor the alarms that concerns you.
−
In the handling suggestion pane of the alarm, a link is provided, which points to the corresponding alarm reference topic in the Online Help.
In addition to the preceding functions, the U2000 provides various customized functions, as shown in Figure 4-6 and as listed in Table 4-1.
4-8
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Figure 4-6 Alarm Browsing
Table 4-1 Description of alarm functions Function
Description
Unified alarm panel
Through the alarm panel, you can customize alarm conditions in an alarm template flexibly and display alarms dynamically. This helps to classify alarms quickly and acknowledge the concerned alarms.
Alarm filtering
With the alarm filtering function, you can learn the running status of an NE in real time. In addition, you can query the alarm status, refresh the status in real time, and query the details of an alarm in the alarm activation window. You can also print the alarm records that are received recently and meet the print conditions.
Alarm query
With the alarm query function, you can query alarms by object where an alarm occurs, function, alarm status, and alarm severity. In addition, you can save and print the query result.
Alarm color display
The severity of each alarm in the alarm list is displayed with a corresponding color. The color can be customized.
Alarm topology display
When an NE reports an alarm, the icon in the upper left corner of the NE in the topology view varies with the alarm severity, or the NE icon in the topology view can be in different colors according to the alarm severity. In this case, you can query the current alarm of the NE from the shortcut menu.
Alarm locating
With the alarm locating function, you can select an alarm and locate the topology object that generates the alarm (For a physical alarm, you can locate the panel of the NE that generates the alarm.)
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
4-9
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Function
Description
Sequence customizing
Through the sequence customizing function, you can sort alarms by field in the alarm list and customize the alarm display. In addition, you can save alarms in the .txt, html, xls, pdf, and csv file, and print the required alarm records.
Alarm Statistics You can learn the alarm status through alarm statistics and alarm analysis. U2000 can collect alarm statistics based on user-defined conditions. The alarm conditions include the alarm name, alarm severity, alarm function type, alarm rising time, alarm status, or a combination of any preceding items.
Alarm Masking and Alarm Correlation Analysis NEs report a large number of alarms during maintenance, test, or new deployment. However, you need not concern the reported alarms. Therefore, these alarms reported by the NE need to be masked, that is, these alarms are not displayed or saved. You can set conditions to mask the alarms or events that meet the conditions. The U2000 provides the following means for you to perform specific correlation analysis: alarm/event correlation analysis, intermittent alarm analysis, repeated event analysis, and alarm/event frequency analysis, and lasting time analysis of acknowledged but uncleared alarms.
Alarm/Event correlation analysis This function helps to find the root alarm. The U2000 supports the analysis of the correlation between different NEs. The system analyzes the alarms based on the pre-defined correlation rule to mask the correlative alarms and finds the root alarm. This helps the maintenance personnel to easily find and rectify the fault.
Intermittent alarm/repeated event analysis This function helps you to analyze alarms that are repeatedly cleared or events that are repeatedly reported within a short period of time. To handle these alarms or events, the system reserves only one of these alarms or events and/or change their severities. The reserved alarms or events record the frequency with which the intermittent alarms or
4-10
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
repeated events occur. In addition, the system can change the alarm or event severity according to the pre-defined settings.
Alarm/Event frequency analysis This function helps you to analyze the frequency with which an alarm or event occurs. You can set a condition. Within the pre-defined period, when the number of alarms or events exceeds the threshold, the system informs the user according to the pre-defined correlation action.
Acknowledged&Uncleared alarm time analysis This function helps you to analyze the time of an acknowledged but uncleared alarm. You can set a condition. Within the pre-defined period, if the time of an acknowledged alarm exceeds the threshold, the system changes the alarm severity.
Alarm Dumping and Acknowledging Alarm acknowledgment helps to identify whether an alarm is processed. Alarm acknowledgment helps you to identify a processed alarm. You can then take proper measures by checking whether the alarm is in the acknowledged state.
Alarm dumping: It supports overflow dumping and manual dumping of alarms. Alarm dumping is used to dump history alarms and events to files, which ensures a stable and efficient system and saves disk space.
Alarm acknowledgment: It helps you to identify a processed alarm. You can then take proper measures by checking whether the alarm is in the acknowledged state. The U2000 supports manual and automatic acknowledgment of alarms.
Alarm Synchronization The U2000 supports the ability to synchronize NE alarms automatically and manually. You can manually synchronize NE alarms by performing operations through GUI or set an automatic synchronization policy. When the U2000 restarts or the communication with an NE recovers, the NE sends an alarm to the U2000. This implements the automatic alarm synchronization on the U2000. The U2000 supports the ability to synchronize NE alarm.
Manual synchronization You can manually synchronize NE alarms by performing operations through GUI.
Automatic synchronization You can set an automatic synchronization policy. When the U2000 starts, when its communication with an NE recovers, or when the LCT user logs out, the NE sends an alarm to the U2000. This implements the automatic alarm synchronization on the U2000.
Alarms are synchronized according to the following rules:
If an alarm is cleared on the NE but uncleared on the U2000, the alarm on the U2000 is cleared.
If an alarm exists on the NE but does not exist on the U2000, the alarm is added to the U2000.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
4-11
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Alarm Redefinition The U2000 allows you to redefine the alarms of the NE. You can redefine the alarm severity according to the requirements. You can use this function to change the alarm severity displayed on the U2000, thus highlighting only the alarms that concerns you.
Alarm Suppression U2000 supports the ability to suppress NE alarms. If you set the status of an alarm to Suppressed, the NE does not report the alarm. The difference between alarm suppression and alarm masking is as follows: If you enable alarm masking, an NE still reports an alarm but the U2000 does not receive the alarm. If you enable alarm suppression, the NE does not report an alarm.
Various Alarm Notification Means The U2000 provides various alarm notification means. The U2000 can send notifications to the related maintenance personnel for locating faults regardless of the time and place, which ensures that the faults are troubleshoot in time. Figure 4-7 shows the alarm notification means.
4-12
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Figure 4-7 Various alarm notification means
The U2000 supports the following two remote notification means:
By email You can send an alarm remote notification by email. The alarm information is sent to an email address. The user can check the email address for alarm information received on the alarm server.
By SMS You can send an alarm remote notification by SMS. The U2000 sends the alarm information to a mobile phone through the SMS device (SM modem or SM gateway) connected to the alarm server. The mobile phone user can check the SMS for alarm information received on the alarm server.
Alarm Jumping The U2000 supports the alarm locating function. This function helps to jump to the topology object that generates the required alarm. In addition, this function helps to quickly locate a network fault, which improves the efficiency of alarm locating. Figure 4-8 shows the alarm jumping function.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
4-13
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Figure 4-8 Alarm jumping
Alarm Maintenance Experience Base You can obtain the alarm processing information from the alarm maintenance experience base. This base stores alarm details. The alarm maintenance experience refers to the experience summarized by customers during the maintenance. The experience is imported to the U2000. If the same fault occurs, you can refer to the related experience to quickly handle the alarm, which improves the efficiency of troubleshooting.
4-14
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Alarm Time Localization U2000 can display the time when an alarm is generated, acknowledged, cleared, or received as the local time. The U2000 can display the time based on the server time or client time. The NE that reports an alarm and the current U2000, however, may be in different time zones. To learn the correct alarm generation time, the U2000 automatically converts the alarm generation time (NE time) into the local time of the client.
4.4 Performance Management The U2000 can monitor the key indicators of a network in real time, and provide statistics on the collected performance data. It provides a graphical user interface (GUI) to facilitate network performance management. Figure 4-9 Performance Management Process
Monitoring Instance Management Monitoring instance enables you to collect performance data according to the monitoring template and schedule policy for all performance indicators belonging to a resource from a device. One monitoring instance collects data for only one resource. Monitoring instance can be either data monitoring instance or TCA monitoring instance.
Creating a monitoring instance for resources, such as equipment, boards, ports, and links. Monitoring the IP SPLA of the PTN and the third-party equipment.
Modifying a monitoring instance.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
4-15
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Querying a monitoring instance.
Suspending a monitoring instance.
Resuming a monitoring instance.
Synchronizing resources of an instance.
TCA query.
Querying a VPN SLA test matrix. Querying the VPN SLA test result through a matrix.
Capability license control. Capability license controls the monitoring instance creation based on the license availed.
Data Monitoring Template Management The monitoring template is used with a monitor instance to monitor the performance data for specific indicators. Table 4-2 Monitoring template type Template
Description
Data Monitoring Template
A data monitoring template is a collection of indicators, which can be applied on the resources for collecting the performance data. You can configure indicators and indicator groups.
TCA Monitoring Template
A threshold crossing alert (TCA) monitoring template is a collection of indicators and threshold definition that can be applied on the resources for monitoring the TCA alerts. TCA can be applied according to the conditions selected such as high TCA monitor and low TCA monitor. Threshold definition includes high trigger, low trigger, high clear, low clear, high alarm level, and low alarm level.
View History Performance Data You can query the performance of network resources by using the U2000 which displays the history performance of a network in the form of table, curve diagram, or bar chart. In this way, you can know the dynamic running status of the network from different dimensions. You can save the performance data in different file formats. Meanwhile, you can compare the performance data in different periods in the line chart or in the histogram.
Information displayed in line chart and bar chart mode can be saved in HTML or PDF format.
Information displayed in table mode can be saved in TXT,CSV or HTMLformat.
You can collect statistics on network performance data within a specified period, to know the performance status of a network in the specified period and to provide data reference for forecasting performance change of the network.
4-16
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
By setting the performance monitoring template, you can manage performance monitoring tasks in an easy manner.
View Real-time Performance Data You can query real-time performance data in the form of table, curve diagram or bar chart, and save the performance data into file.
Information displayed in line chart and bar chart mode can be saved in HTML or PDF format.
Information displayed in table mode can be saved in TXT,CSV or HTMLformat.
View TOPN Performance Data You can query TOP N performance data sorted by two indicators, and the result will be refreshed when the new data generates.
Schedule Policy Management Schedule policy enables you to set the time segments and repeat periods at which the data needs to be collected. The schedule policy can be applied on the resources while creating or modifying a monitoring instance
Data Lifecycle Management You can back up the performance data to a specified storage medium manually or automatically when excessive performance data is saved in the database ofU2000. Data can be dumped in the following two ways:
Automatic Dumping: Performance data is dumped automatically based on the configured values, such as the number of days for different granularities and the database usage.
Manual Dumping: Performance data is dumped based on the user-defined conditions, according to the dump type with in the end date.
Monitoring Network Performance Through network grouping, you can view the performance data of devices, interfaces, IP links, L2 links, static tunnel, dynamic tunnel, and tests on the same network. In addition, you can implement various tests within a network, such as the tests of UDP jitter and FTP ping, to evaluate the quality of networks and services and perform association analysis on the quality of networks and services.
Creating a network group Associate the monitoring instances of the resources of different types with the same network according to the customized grouping rules, such as the area-based rule and service-based rule, so that you can conveniently browse and compare data.
Analyzing the interface performance trend After the interface indicators on the network are set, the trend analysis graph of the interface indicators which is generated at the current time point or 12 hours before and after the current time point can be obtained. The trend analysis graph helps you know the entire change trend of the interface performance in a timely manner.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
4-17
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Viewing the running results of SLA test on network monitoring through a matrix (Now only support UDP jitter test through matrix) You can view the results of the network monitoring test cases through a matrix. In this manner, you can know the statistics about network-related indicators, evaluate network performance, and perform association analysis on network performance.
4.5 Inventory Management The U2000 provides the inventory management function that allows you to query and collect the statistics on physical and logical resources in a unified manner. Figure 4-10 shows the inventory management window of the U2000. Figure 4-10 Inventory management window and its functions
Physical Resources The physical resources are as follows:
4-18
Telecommunications room
Rack
NE
Shelf
Board
Subboard
Port
ONU
Slot Information Report
Slot Used Statistics Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
SFP Information Report
Fiber/cable
4 NMS Basic Functions
Logical Resources The logical resources are as follows:
Connection
Gateway
VLAN
Multicast
QoS and ACL
Protocol
Link
Link group
Interface resource
4.6 Log Management Log management includes the management of U2000 security logs, U2000 operation logs, and NE security logs. The U2000 allows you to query and save logs periodically, to detect illegal login and operations, and analyze faults in a timely manner. You can query the U2000 client that is used by a U2000 user to log in to the U2000 server and query the operations performed by the user after login. You can also dump or print log data. Figure 4-11 shows the U2000 log management window and its functions. Figure 4-11 Log management window and its functions
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
4-19
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Operation Logs Operation logs record the operations (such as fault management, performance management, topology management, and resource management) performed on the U2000.
View operation logs. The network administrator can set query conditions and query user operation logs by user name, operation terminal, operation result, risk level, time range, operation name, operation object, or a random combination of the preceding items. In this manner, the network administrator can learn the operations performed by the current user in real time.
Dump operation logs. −
Dump operation logs manually.
−
Dump operation logs upon log overflow or at scheduled times.
Forward operation logs to the syslog server.
Save operation logs as the TXT, HTML, CVS, PDF or Excel file.
System Logs System logs record operations performed on the U2000, including the service start and stop, and log exporting and deletion.
View system logs. The network administrator can set query conditions and query user operation logs by source, level, time range, details, or a random combination of the preceding items. In this manner, the network administrator can learn the operations performed by the current user in real time.
Dump system logs. −
Dump system logs manually.
−
Dump system logs upon log overflow or at scheduled times.
Forward system logs to the syslog server.
Save system logs as the TXT, HTML, CVS, PDF or Excel file.
Security Logs Security logs record the security-based operations that the user performs on the U2000, including logout, login, log dumping, and device log synchronization.
View security logs. The network administrator can set query conditions and query user operation logs by user name, operation terminal, operation result, risk level, time range, operation name, security event, operation object, or a random combination of the preceding items. In this manner, the network administrator can learn the operations performed by the current user in real time.
Dump security logs. −
Dump security logs manually.
−
Dump security logs upon log overflow or at scheduled times.
Forward security logs to the syslog server.
Save operation logs as the TXT, HTML, CVS, PDF or Excel file.
NE Logs NE logs record the operations on the managed NEs. You can query the NE logs through theU2000 client GUI. You do not need to query the operation logs on each NE. 4-20
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Browse the NE syslog run logs. You can know the equipment running information through NE logs.
Dump NE syslog run logs. −
Dump NE logs manually.
−
Dump NE logs upon logs overflow or at scheduled times.
Forward NE logs to the syslog server.
Save NE logs as the TXT, HTML, CVS, PDF or Excel file.
4.7 Database Management The database backup management system of the U2000 provides a tool for database backup and restoration. This tool facilitates the maintenance of the U2000 database and ensures stable and safe running of the U2000. Database management includes the management of NE and U2000 databases. To ensure data security, you need to back up the database periodically.
NE Database Management By using the U2000, you can perform the following NE database management operations:
For transport equipment and access equipment, back up the NE database to the system control and communication unit (SCC).
For transport equipment and access equipment, back up the NE database of transport or access equipment to the CF card manually or automatically.
For transport equipment and access equipment, restore the NE configuration data of transport or access equipment from the SCC board or CF card.
Back up the NE database to a local or remote server.
Start a manual backup.
Set a scheduled backup task.
Restore the NE database from a local or remote server.
U2000 Database Management By using the U2000, you can perform the following NMS database management operations:
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
4-21
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Back up the U2000 database to a local or remote server. −
Start an immediate backup.
−
Set a scheduled backup task.
Restore the U2000 database from a local or remote server.
Dump data in the U2000 database, including operation logs, system logs, security logs, alarm /event logs, and performance data. −
Set a manual dump.
−
Set periodical dump.
Import or export script files: Export the configuration data in the U2000 to script files, or import the configuration data to the U2000 from script files. This function is applicable only to MSTP, WDM, PTN and microwave products.
Initialize the U2000 database.
Configuration upgrade wizard: On the upgraded U2000 software, previous data can be restored with the help of the upgrade wizard.
Customize scheduled tasks: Provide flexible customization of scheduled tasks to reduce operation and maintenance costs. The scheduled tasks that the U2000 supports are backing up the database, exporting script files, collecting performance data, collecting ATM performance data, backing up history performance data, and refreshing the automatically switched optical network (ASON) information.
In the case of MSTP and WDM products, the U2000 information can be exported to a TXT file so that it can be used by the MDS 6600.
In the case of MSTP and WDM products, the U2000 can import a TXT file that contains the MDS 6600 data.
4.8 NE Communication Parameter Management You can set the parameters for the communication between the U2000 and NEs to ensure that the U2000 communicate with the NEs in normal state. You can query or set the following communication parameters:
4-22
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Query and set the NE access protocol parameters.
Manage the default access protocol parameters.
Query and set the NE Telnet or STelnet parameters.
Manage the Telnet or STelnet parameter template.
4 NMS Basic Functions
4.9 DCN Management DCN management is applicable only to MSTP, WDM, Marine, NA WDM, PTN and microwave products. The U2000 communicates with NEs and manages and maintains network nodes through a DCN. In the DCN, the U2000 and NEs can be considered as nodes. These nodes are connected by using Ethernet or data communications channel (DCC). In actual practice, the U2000 and NEs may be located at different floors of the same building, or different buildings or cities. Hence, the U2000 and NEs are usually connected through an external DCN that consists of equipment such as switches and routers. Comparatively, the DCN between NEs is referred to as an internal DCN.
Modify gateway NE (GNE) parameters.
Change the GNE for an NE.
Set the secondary GNE for an NE.
Convert a GNE to a normal NE.
Convert a normal NE to a GNE.
Check the GNE switching status.
Test the communication between the U2000 and a GNE.
Check the network communication status.
4.10 NE Software Management U2000 supports backup and loading of the equipment data.
Function and Feature Figure 4-12 depicts the function and feature of software management.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
4-23
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Figure 4-12 Function and Feature
Task Management U2000 enables you to create scheduled tasks, including backing up the data of an NE, loading the programs or patches of an NE, and restoring the data of an NE. U2000 can automatically perform the tasks and can also suspend and resume tasks.
Policy Management U2000 enables you to configure backup policies and saving policies. You can configure the default backup policy or saving policy. In this case, U2000 backs up or saves the data automatically and periodically according to the configured policy. You can also modify, suspend, and run the equipment backup or saving policy.
Data Backup Management U2000 supports automatic and manual data backup. You can back up the data on the GUI of U2000. U2000 supports the ability to restore the backup data of equipment. You can restore the historical backup data of the equipment on the GUI of U2000.
Software library management The system supports the ability to manage NE software. The NE software is imported to the software library of the system for formal management. During the upgrade, a user can select the required target software from the software library.
4-24
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
4.11 Report Management The U2000supports the iWeb report function and at the same time supports NMS report that provides reports about alarms, logs, and resources. The U2000 user is able to print desired data while viewing them. The report in table format supports filtering by equipment type and can be saved in Excel format.
Alarm and Log Report
Equipment alarm severity distribution details report
Equipment alarm severity distribution report
Equipment connectivity statistics report
General alarm information report
History change record report
Resource Report
Port Resource Report
Statistics Report of SDH Tributary Port Resources
Lower Order Cross-Connections Statistic Report
SDH Fiber/Microwave Link Resource Usage Report
Statistics Report of Trails Between SDH NEs
Statistics Report of SDH Protection Subnet Resources
Statistics Report of SDH Circuit Resources
Microwave Link Report
Microwave License Capacity Report
Statistics Report of Ethernet Port Resources
Statistics Report of Service Resources Between Ethernet NEs
WDM Protection Group Switching State Report
WDM NE Master/Slave Subrack Info Report
Statistics Report of WDM Client-Side Port Resources
Statistics Report of WDM Link Resources
Statistics Report of Inter-Station Wavelength Resources
Browse WDM Wavelength Resource
Wavelength Resource Usage Report
PON Port Splitting Status
Board Manufacturer Information
Export project Document
Clock Tracing Diagram
Networking Diagram
Timeslot Allocation Diagram
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
4-25
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
iWeb report The report subsystem provides a complete set of convenient services. It allows you to generate, distribute, and manage reports based on the Web. The powerful report subsystem can help you to monitor, analyze, improve, and plan network performance. The function of the iWeb report see 9.7 Report Subsystem Management.
The diagrams of the resource report Figure 4-13 Diagram of the NE resource report
4-26
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Figure 4-14 Diagram of the network resource report
4.12 System Monitoring The U2000 provides a GUI-based system monitoring tool, which is used for managing the NMS and querying the system information. The system monitoring tool of the U2000 provides the functions for managing system processes, as shown in the following figure.
The main functions for managing system processes are as follows:
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
4-27
iManager U2000 Unified Network Management System Product Description
4 NMS Basic Functions
Starting and stopping a process
Setting the security communication mode
The system monitoring tool of the U2000 provides the functions for querying the system information, as shown in the following figure.
The main functions for querying the system information are as follows:
4-28
Querying the process information
Querying the hard disk information
Querying the database information
Querying the component information
Querying the operation logs
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
5
5 MSTP Network Feature Management
MSTP Network Feature Management
About This Chapter This topic describes the functional features of MSTP NE management and network management. 5.1 MSTP NE Management NE management refers to the management of configurations of an NE in terms of attributes, communication, services, protection, and clocks. The configuration data is saved to the database of the U2000 and to the database of the NE. 5.2 MSTP Protection Subnet Management A protection subnet is a network structure with the comprehensive self-protection function. In the U2000, the protection subnet is a generalized concept that includes not only the network structure with the comprehensive self-protection function, such as an MSP ring and a path protection (PP) ring, but also the network structure without the self-protection function, such as an unprotected ring and an unprotected chain. 5.3 End-to-End MSTP Management End-to-end network management is also referred to as trail management. You can construct the configuration data of end-to-end network management by searching for the data at the NE layer of the U2000, or directly configure the data at the network layer of the U2000, and apply the data to all the related NEs. Compared with configuring NE data on a per-NE basis, configuring NE data by using the trail management function is faster and more convenient. 5.4 End-to-End MSTP IP Management There is the IP feature in MSTP equipment. You can build the configuration data of end-to-end MSTP IP network management by searching for the data at the NE layer of the U2000, or directly configure the data at the network layer of the U2000, and apply the data to all the relevant NEs. Configuring NE data by using the trail management function is faster and more convenient compared with configuring NE data on a per-NE basis. 5.5 SDH ASON Management ASON is a new generation of optical network that integrates the exchange and transport. After a user initiates a service request, the ASON selects a route automatically, establishes and removes connections through the signaling control, and performs network connections automatically and dynamically. An ASON NE refers to the equipment that is equipped with
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
5-1
5 MSTP Network Feature Management
iManager U2000 Unified Network Management System Product Description
both SDH and ASON features. An ASON network is managed by the U2000 that combines ASON and SDH features.
5.1 MSTP NE Management NE management refers to the management of configurations of an NE in terms of attributes, communication, services, protection, and clocks. The configuration data is saved to the database of the U2000 and to the database of the NE.
Basic NE Configuration By using the U2000, a user can perform the following operations:
Modify NE attributes such as: −
NE name
−
NE ID
−
NE Extended ID
−
Remarks
−
NE pre-configuration
In the case of the NE whose ID needs to be set through the DIP switch, you can modify the NE ID on the U2000.
Synchronize NE time: Align all NEs with the system time of the U2000 server. The user can configure the U2000 to automatically synchronize the NE time by specifying the automatic synchronization period.
Query physical resources in the following lists: −
NE list
−
Board manufacturer information
−
Board list
−
Cabinet list
−
Subrack list
−
Equipment room list
Support the board plug and display feature: After a board is inserted to the slot, the NE Panel automatically displays the board and board information.
Replace a board. The user can replace a board with a board of another type on the U2000. −
The user can replace board A with board B whose rate is the same as the rate of board A and where the number of ports is the same as the number of ports on board A.
−
The user can also replace board A with board B whose rate is lower than the rate of board B and where the number of ports is less than the number of ports on board A.
Query the actual physical board type of a board that is used as a board of another type.
Automatically disable the NE functions: You can set to periodically disable some NE functions that may affect services, such as loopback and automatic laser shutdown (ALS). When the time expires, these operations automatically stop.
Environment monitoring information. You can set the following items: −
5-2
PMU interface
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
−
EMU interface
−
CAU interface
−
NE fan speed
5 MSTP Network Feature Management
Virtual NE management −
Create a virtual NE.
−
Add a board.
−
Create fibers between the virtual NE and other NEs.
−
Create SDH services.
−
Create protection subnets.
−
Search for and create trails on the virtual NE.
Support the replacement of the boards.
Supports the management of inband DCN.
Support graphical display of performance events relevant to the optical power.
Orderwire Configuration By using the U2000, a user can perform the following operations:
Set and query the orderwire phone numbers, call waiting time and orderwire phone port availability.
Set and query the networkwide conference call number.
Set and query the subnet No. length and the related subnet of the optical interface.
Configure and query the SDH network node interface (NNI) connection for orderwire.
Configure and query the F1 data port.
Configure and query the broadcast data port.
Board Protection Configuration By using the U2000, a user can perform the following operations:
Configure board 1+1 protection.
Configure 1:N tributary protection switching (TPS) protection for a tributary board.
Configure board level protection.
Configure port protection.
Query the data backup status between the active and standby SCC boards.
Interface Configuration By using the U2000, a user can perform the following operations:
Interface board management: Query and set the SDH interface boards installed on NEs.
Set the parameters of SDH interfaces.
Set the parameters of PDH interfaces.
Modify the optical/electrical attributes of the board port.
Set overhead interfaces, including:
Issue 03 (2010-11-02)
−
Orderwire
−
Hotline number Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
5-3
5 MSTP Network Feature Management −
Special line number
−
Conference call number
−
Subnet number length
−
F1 data port
−
Broadcast data port
−
Communication port
−
Data port
−
Out-ring route
iManager U2000 Unified Network Management System Product Description
Set the optical amplifier board interface.
Manage the optical power of a board.
Set tone and data access (TDA) interfaces, including:
−
TDA clock source.
−
TDA power feeding.
Query and set the overhead including: −
Regenerator section overhead (J0).
−
Lower order path overhead (V5, J2)
−
VC4 higher order path overhead (J1, C2) and its pass-through or termination.
−
VC3 higher order path overhead (J1, C2).
Support PRBS.
Support pre-alerts for the port optical power.
Support setting and querying the TUG structure in the transmit and receive directions.
Support lower order loopbacks.
Support querying the in service (IS) port status and the out of service (OOS) port status of a line board or a data board.
Support managing the power consumption.
Support setting and querying the optical power threshold of a line board.
Support the TCM function.
Support the configuration of enabling the AIS insertion of the J0MM alarm.
Set the parameters for an IF interface.
Set the parameters for a digital interface.
Set the parameters for an Outdoor unit (ODU) interface.
Configuration for SDH Services and Protection By using the U2000, a user can perform the following operations:
5-4
Configure VC12, VC3, or VC4 services and select protection groups for them. In the case of the platform 4.0 equipment, you can also select protection groups of these services.
Manage Transmux services, including M13/E13 Transmux and M13/E13 Transmux Server services.
Configure VC4-4C, VC4-8C, VC4-16C, or VC4-64C concatenated service; bind or unbind services, and select protection groups for them. In the case of the platform 4.0 equipment, you can also select protection groups of these services.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
5 MSTP Network Feature Management
Configure other services: enterprise system connection (ESCON) services, 64 kbit/s services (including TDA board services, N x 64 kbit/s services), and DSL services.
Manage subnetwork connection multiple protection (SNCMP) services.
Activate or deactivate services.
Manage subnetwork connection protection (SNCP) services.
Manage subnetwork connection tunnel protection (SNCTP) services.
Convert an SNCP service to a normal service or convert a normal service to an SNCP service.
Support multiple multiplex section protection (MSP) rings configured at a single optical port. You can configure multiple MSP rings by VC4 at an optical port to increase the usage of network resources.
Configure REG. After the line board is set as REG on the U2000, each pair of optical interfaces of the line board provides a special receive or transmit function. Through the internal switch, the SDH signals from the receiving optical interface are sent out directly to the corresponding transmitting optical interface after passing through the regenerator section layer and being amplified. The REG function is completely realized by the board without the need of the SCC board and a cross-connect board.
Query the capacity of higher order and lower order cross-connections on an NE.
Manage multiprotocol label switching (MPLS) for MSTP equipment. The MSTP equipment builds a label switched path (LSP) with a PE router, identifies LSP labels and service priorities, and encapsulates LSPs into virtual concatenation groups (VCGs) for transmission.
The linear MSP supports the reconstruction protocol. You can set the appointed MSP group as the reconstruction protocol.
Configure two 40G lower order cross-connect protection groups at the same time. You can adjust concatenated timeslots and optimize higher order pass-trough.
Configuration for ATM Interfaces, Services, and Protection By using the U2000, a user can perform the following operations:
Interface board management: Query and configure the ATM interface board on an NE.
ATM bandwidth management: Query the bandwidth of ATM board.
Set the parameters for an ATM interface.
Configure ATM traffic.
Configure ATM cross-connections.
Create a network to network interface (NNI) on the ATM processing board.
Configure ATM cross-connections.
Configure ATM protection groups.
Configure ATM protection pairs.
Configure ATM services from ATM board to SDH line.
Activate or deactivate ATM cross-connections.
Configure ATM bound path.
Perform ATM operation, administration and maintenance (OAM).
Set or query the section-end attribute of a connection point.
Set or query the continuity check (CC) activation status of the connection point.
Perform a remote loopback test.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
5-5
5 MSTP Network Feature Management
iManager U2000 Unified Network Management System Product Description
Set or query the NE loopback location identifier (LLID).
Upload, download, duplicate the OAM data of the NE or perform the related consistency check.
Configure an inverse multiplexing over ATM (IMA) group.
Configuration for Ethernet Interfaces and Services By using the U2000, a user can perform the following operations:
Interface board management: Query and configure the Ethernet interface board on an NE.
Configure fast Ethernet transparent transmission board.
Configure Ethernet internal interfaces, including:
5-6
−
Basic attributes
−
TAG attributes
−
Network attributes
−
Encapsulation/mapping
−
Link capacity adjustment scheme (LCAS)
−
Bound path
−
Advanced attributes.
Configure external ports of Ethernet interface, including: −
Basic attributes
−
Flow control
−
TAG attributes
−
Network attributes
−
Advanced attributes.
Configure point-to-point LPT and point-to-multipoint LPT.
Configure private line services, including Ethernet private line (EPL) and Ethernet virtual private line (EVPL). You can create a new service and configure a bound path.
Configure Ethernet private LAN (EPLAN) services. You can create a new virtual bridge (VB) and configure the following: service mount, VLAN filtering, VLAN unicast, disable MAC address, bound path, self-learning MAC address, VB port MAC address table capacity, and VLAN MAC address table capacity.
Configure Ethernet Layer-2 switching, including: −
Aging time
−
Spanning tree
−
Multiple Spanning Tree
−
IGMP snooping protocol.
Configure QinQ service: QinQ is an embedded technology in VLAN, and tags users with multi-layer VLAN ID, so that VLAN can be extended. You can perform operations such as adding, stripping and exchanging of tags in different scenarios.
Configure Ethernet link aggregation group (LAG), which contains intra-board LAG and inter-board LAG. −
Create or delete an LAG.
−
Add or delete LAG ports.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description −
5 MSTP Network Feature Management
Query LAG ports and aggregation state.
Configure quality of service (QoS), including: −
Flow configuration
−
CAR configuration
−
CoS configuration
−
Flow shaping management
−
Port shaping management
−
Configuring the differentiated service (DiffServ) domains
−
Port policy
−
CAR policy
−
Port WRED Policy
−
V-UNI ingress policy
−
V-UNI egress policy
−
PW policy
−
Weighted random early detection (WRED) congestion and discarding policy of services
−
QinQ policy
−
Weighted fair queuing (WFQ) schedule policy
Test frame receiving and transmitting on Ethernet boards, including the EGT, EFT, EGS, EFS and EMS boards.
Support the ability to query the opposite NE of the data services on these boards for the Metro 1000V3.
Configure OAM for Ethernet services.
Configure OAM for Ethernet ports.
Configure the LCAS attributes such as hold-off time, WTR time and protocol mode.
Use QoS template to simplify the QoS configuration for Ethernet services.
Support the automatic reporting of RMON performance of Ethernet boards.
Support the dumping of history RMON performance of Ethernet boards.
Support the automatic creation of OAM for Ethernet trails.
Support the protocol diagnosis function.
Support the configuration of IGMP static multicast table items.
Support the standard LPT bearer mode.
Support the setting of the LCAS alarm threshold.
Support the alarm function in the case of no traffic at Ethernet ports.
Support the Ethernet port mirroring.
Support the unidirectional LPT function.
Support setting and querying the MAC address of a data board.
Support traffic monitoring and report for an Ethernet port.
Support the board-level configuration, including setting and querying the IP address.
Support the LPT and port traffic statistics functions.
Support creating flows in batches.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
5-7
5 MSTP Network Feature Management
iManager U2000 Unified Network Management System Product Description
Support the setting of the LPT restoration time and the point to multi-point LPT management in the three scenarios of IP->VCTrunk(s), VCTrunk->IP(s), and VCTrunk(s)->VCTrunk(s) for a board.
Support the ability to manage multiprotocol label switching (MPLS) for multi-service transmission platform (MSTP) equipment. The MSTP equipment builds an label switched path (LSP) with a PE router, identifies LSP labels and service priorities, and encapsulates LSPs into virtual concatenation groups (VCGs) for transmission.
Supports the management of the virtual Ethernet interface
Supports the control plane for configuring the static routes and address resolution.
Supports the packet Ethernet services including E-Line service, E-LAN service, E-AGGR service and clock service.
RPR Management By using the U2000, a user can perform the following operations:
Modify resilient packet ring (RPR) node information.
Set and query the node information of an NE in the RPR.
Set the RPR link information of an NE.
Query the topology of the RPR that the NE belongs to.
Query the protection status, switching status and switching position of the RPR that an NE belongs to.
Configure forced switching, manual switching or clear switching in the RPR that an NE belongs to.
Clock Configuration By using the U2000, a user can perform the following operations:
Query the clock synchronization status.
Set clock source priority tables, including:
5-8
−
System clock source priority list
−
Priority table for phase-locked sources of 1st external clock output
−
Priority table for phase-locked sources of 2nd external clock output
Set clock source switching, including: −
Clock source restoration parameters
−
Clock source switching condition
−
Clock source switching
Configure clock subnets, including: −
Clock subnet
−
Clock quality
−
Synchronization status message (SSM) output control
−
Clock ID status
Set phase-locked sources output by external clock, including: −
External clock output phase-locked source
−
2 Mbit/s phase-locked source external clock attributes
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
5 MSTP Network Feature Management
IEEE 1588 Packet Clock By using the U2000, a user can perform the following operations:
Configure the selection mode of a frequency source.
Set the PTP clock source port.
Set the quality level of the clock source.
Set the PTP clock source priority.
Configure a PTP clock service.
Set the clock interface configuration.
Set the external clock interface configuration.
Ethernet OAM Management By using the U2000, a user can configure the 802.1 ag Ethernet OAM as follows:
Create and configure maintenance nodes.
Perform a CC check.
Perform a loopback (LB) check.
Perform a link trace (LT) check.
Perform a ping test.
Perform performance detection.
By using the U2000, a user can configure the 802.3 ah Ethernet OAM as follows:
Query remote OAM parameters.
Set link monitoring parameters. This function can help you to detect the events of frame error, frame error period, and frame error seconds.
Perform a remote loopback test.
Support reporting of Ethernet OAM loopback events.
Supports OAM management for MPLS tunnels.
5.2 MSTP Protection Subnet Management A protection subnet is a network structure with the comprehensive self-protection function. In the U2000, the protection subnet is a generalized concept that includes not only the network structure with the comprehensive self-protection function, such as an MSP ring and a path protection (PP) ring, but also the network structure without the self-protection function, such as an unprotected ring and an unprotected chain. To perform protection subnet management, you need to have the related license. By using the U2000, a user can perform the following operations:
Issue 03 (2010-11-02)
Create protection subnets of different types. −
Linear MSP: 1+1 and M:N.
−
MSP ring: two-fiber bidirectional MS shared protection ring, two-fiber unidirectional MS dedicated protection ring, and four-fiber bidirectional MS shared protection ring.
−
PP ring: two-fiber unidirectional PP ring and two-fiber bidirectional PP ring.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
5-9
5 MSTP Network Feature Management
iManager U2000 Unified Network Management System Product Description
−
dual node interconnection (DNI) protection.
−
Non-protection (NP) ring and NP chain.
Search for a protection subnet according to the information of NEs and fibers or cables in the U2000, to form a complete protection subnet.
Migrate an NP chain to a 1+1 linear MSP without interrupting services.
Start or stop the MSP protocol of the MSP subnet, such as enabling or disabling the MSP protocols networkwide or the MSP protocol for a single node.
For 1+1 MSP, the U2000 automatically generates the service of the protection channel according to the service of the working channel.
Adjust the bandwidth dynamically. You can dynamically adjust the MSP bandwidth according to the service demands and how the network bandwidth is used currently to improve the utilization of network bandwidth. For example, for an STM-16 MSP of an 8 x VC4 bandwidth, if the 6 x VC4 bandwidth is enough, then you can change the protection bandwidth from 8 x VC4 to 6 x VC4 bandwidth and save 4 x VC4 for the use of non-MSP-protected services.
Expand the capacity of an MSP ring and a linear MSP chain. Expand the link capacity by replacing the line boards on both sides of the link without interrupting active services. For example, upgrade an STM-16 MSP ring to STM-64 smoothly.
Change the reversion mode of linear MSP protection without restarting the protocol.
Expand and add nodes to multiple types of protection subnets, including MSP, SNCP, PP, NP ring, NP chain and their combinations.
Query the names, types and status of all protection subnets.
Query and set the switching status, wait-to-restore (WTR) time and the trigger condition of the protection subnet.
Query all the isolated nodes and delete useless nodes.
Set and view SDH NNIs.
Query the relevant trail by protection subnet.
Manage the entire RPR ring network. You can create, delete, and search for an RPR ring. You can also manage the RPR ring protection parameters and link parameters. RPR ring topology can be displayed through a view.
Collect statistics on protection subnets, and display the rate levels of the protection subnets.
5.3 End-to-End MSTP Management End-to-end network management is also referred to as trail management. You can construct the configuration data of end-to-end network management by searching for the data at the NE layer of the U2000, or directly configure the data at the network layer of the U2000, and apply the data to all the related NEs. Compared with configuring NE data on a per-NE basis, configuring NE data by using the trail management function is faster and more convenient. To perform end-to-end network management, you need to have the related license.
MSTP Trail Management By using the U2000, you can perform the following operations:
5-10
Create and maintain an SDH trail.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Issue 03 (2010-11-02)
5 MSTP Network Feature Management
−
Create an SDH trail, designate a timeslot, and select the protection priority strategy and the resource usage strategy. The service levels include VC12, VC3, VC4, VC4 server trail, VC4-4C, VC4-8C, VC4-16C and VC4-64C.
−
Activate or deactivate, and lock or unlock an SDH trail.
−
Join or split, and enable or disable a VC4 server trail.
−
During search of SDH trails, the U2000 retains the attributes of the existing ones as they are.
−
Upgrade an SDH trail to an ASON trail.
−
Degrade an ASON trail to an SDH trail.
−
Query the service status on a per-NE basis according to SDH trails.
−
Manage optical power: Query the input power, output power, and power thresholds for SDH boards.
−
Set and query the overhead bytes of all NEs on the trail, such as the trace byte.
−
The U2000 prompts users to configure trace bytes when timeslot out-of-sequence occurs to the MS.
−
Query the status of a lower order service.
−
Set overhead pass-through or termination of all NEs on the trail.
−
Insert alarms into the trails of VC4 level, such as AIS and remote defect indication (RDI).
−
Set loopback on any nodes of the trail, including VC4 loopback, tributary loopback, optical interface loopback and cross-connection loopback.
−
Perform a PRBS test on the trail.
−
Modify the add/drop ports of the trail and the timeslot occupied by the trail in-service.
−
Adjust the original route partially by changing the NE, board or timeslot that the trail passes through.
−
Modify the route for concatenated services in-service.
−
Person SNCP switching on a trail.
−
Generate dual-fed SDH services automatically for 1+1 linear MSP.
−
Duplicate an SDH trail for creating trails in batches.
−
Manage discrete SDH services, such as querying or analyzing discrete services.
−
View the usage of VC12 or VC3 trails related to a VC4 server trail in an easy manner. You can also view the information about the VC12 or VC3 trails.
−
Convert SDH discrete cross-connections to a mono nodal trail.
−
Manage an SDH trail based on rights and domains.
Manage the alarms and performance events related to an SDH trail. −
Configure alarm suppression or alarm reversion for a trail.
−
Query current and history alarms, current and history performance data, unavailable time (UAT) and performance threshold-crossing records of an SDH trail.
−
Set the performance parameters for an SDH trail.
−
Query the SDH trails and customer information affected by an alarm.
−
Display the R_LOS alarms in the Transmission Media Layer Route view.
Search for trails. According to the NE configuration data, at the NE layer, or the fiber connection data, protection subnet information at the network layer, the U2000 generates
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
5-11
5 MSTP Network Feature Management
iManager U2000 Unified Network Management System Product Description
the network layer information about end-to-end trails, including SDH trails and Ethernet trails.
Name trails automatically.
Filter trails in three ways. −
Filter all: Filter all trails and only display the qualified trails in a network.
−
Secondary filter: Filter those trails that are already displayed according to the filter criteria.
−
Incremental filter: Filter the newly added trails and display the newly qualified trails together with the currently displayed ones.
Ethernet Trail Management By using the U2000, you can perform the following operations:
Create and maintain an Ethernet trail.
Create trunk links at VC12, VC3, VC4, VC4-4C, VC4-8C and VC4-16C levels.
Create an unterminated trunk link.
Create an Ethernet trail. The service includes EPL, EVPL, unterminated EPL, EPLAN, EVPL based on QinQ, EVPL based on RPR and EVPLAN based on RPR. For release 4.0 NEs, the SDH NNI needs to be created on Ethernet line boards.
Activate or deactivate an Ethernet trail.
During search of Ethernet trails, the U2000 retains the attributes of the existing ones as they are.
Manage discrete Ethernet services, such as querying or analyzing discrete services.
Search for an Ethernet trail.
Manage the alarms and performance events related to an Ethernet trail.
Query the Ethernet trails and customer information affected by the alarm.
Query current and history alarms of an Ethernet trail.
Filter trails in three ways.
−
Filter all: Filter all trails and only display the qualified trails in a network.
−
Secondary filter: Filter those trails that are already displayed according to the filter criteria.
−
Incremental filter: Filter the newly added trails and display the newly qualified trails together with the currently displayed ones.
Manage the alarms and performance events related to an Ethernet trail. −
Query the Ethernet trails and customer information affected by the alarm.
−
Query current alarms, history alarms of an Ethernet trail.
−
Implement the RMON performance function of an Ethernet trail.
ATM Trail Management By using the U2000, you can perform the following operations:
5-12
Create and maintain an asynchronous transfer mode (ATM) trail. −
Create an ATM trunk link.
−
Create an ATM trail.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
5 MSTP Network Feature Management
−
Activate and deactivate an ATM trail.
−
Manage ATM discrete services, such as querying and analyzing a discrete service.
−
Search for an ATM trail.
Manage the alarms and performance events related to an ATM trail. −
Query the ATM trails and customer information affected by an alarm.
−
Query the current and history alarms related to an ATM trail.
Filter trails in three ways. −
Filter all: Filter all trails and only display the qualified trails in a network.
−
Secondary filter: Filter those trails that are already displayed according to the filter criteria.
−
Incremental filter: Filter the newly added trails and display the newly qualified trails together with the currently displayed ones.
Network-Wide Clock Topology Management
Supporting the 1588 V2, SDH, and synchronous Ethernet clocks.
Displaying clock trace relationship.
Displaying clock alarm status.
PWE3 Service Management By using the U2000, you can perform the following operations:
Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.
Pre-deploy a PWE3 service.
Implement the function of automatically discovering PWE3 services.
Modify and delete PWE3 services, and filter PWE3 services to view the desired services.
Manage multi-hop PWE3 services.
Implement the protection management of PWE3 services.
View the topology of PWE3 services.
View the alarms of a PWE3 service.
View the performance of a PWE3 service.
Test and check a PWE3 service.
Manage discrete PWE3 services.
Manage PWE3 services based on rights and domains.
Clone a PWE3 service.
Manage PWE3 service templates.
Implement the function of automatically generating Ethernet OAM for PWE3 services.
Tunnel Management By using the U2000, you can perform the following operations:
Create static tunnels.
Pre-deploy a tunnel.
Implement the function of automatically discovering tunnels.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
5-13
5 MSTP Network Feature Management
iManager U2000 Unified Network Management System Product Description
Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
View the topology of tunnels, including the working and protection routes.
View the alarm of a tunnel.
View the performance of a tunnel.
Test and check a tunnel.
Manage discrete tunnels.
Manage BGP/MPLS VPN tunnels.
Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the function of automatically discovering 1+1 or 1:1 tunnel protection groups.
Switch services in a 1+1 or 1:1 tunnel protection group manually.
Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection groups.
5.4 End-to-End MSTP IP Management There is the IP feature in MSTP equipment. You can build the configuration data of end-to-end MSTP IP network management by searching for the data at the NE layer of the U2000, or directly configure the data at the network layer of the U2000, and apply the data to all the relevant NEs. Configuring NE data by using the trail management function is faster and more convenient compared with configuring NE data on a per-NE basis. To perform end-to-end network management by using the U2000, you need to have the required license.
PWE3 Service Management By using the U2000, you can perform the following operations:
Create the CES service and the Ethernet service of the PWE3 services.
Pre-deploy a PWE3 service.
Implement the function of automatically discovering PWE3 services.
Modify and delete PWE3 services, and filter PWE3 services to view the desired services.
Manage multi-hop PWE3 services.
View the topology of PWE3 services.
View the alarms of a PWE3 service.
View the performance of a PWE3 service.
Manage discrete PWE3 services.
Manage PWE3 services based on rights and domains.
Copy a PWE3 service.
Implement the function of automatically generating Ethernet OAM for PWE3 services.
VPLS Service Management By using the U2000, you can perform the following operations:
5-14
Create a VPLS service.
Pre-deploy a VPLS service.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
5 MSTP Network Feature Management
Implement the function of automatically discovering VPLS services.
Modify and delete VPLS services, and filter VPLS services to view the desired services.
View the topology of VPLS services.
View the alarms of a VPLS service.
View the performance of a VPLS service.
Manage discrete VPLS services.
Manage VPLS services based on rights and domains.
Implement the function of automatically generating Ethernet OAM for VPLS services.
Tunnel Management By using the U2000, you can perform the following operations:
Create static CR tunnel.
Pre-deploy a tunnel.
Implement the function of automatically discovering tunnels.
Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
View the topology of tunnels.
View the alarm of a tunnel.
View the performance of a tunnel.
Manage discrete tunnels.
Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the function of automatically discovering 1+1 or 1:1 tunnel protection groups.
Switch services in a 1+1 or 1:1 tunnel protection group manually.
Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection groups.
5.5 SDH ASON Management ASON is a new generation of optical network that integrates the exchange and transport. After a user initiates a service request, the ASON selects a route automatically, establishes and removes connections through the signaling control, and performs network connections automatically and dynamically. An ASON NE refers to the equipment that is equipped with both SDH and ASON features. An ASON network is managed by the U2000 that combines ASON and SDH features.
ASON Topology Management By using the U2000, a user can perform the following operations:
Discover ASON topologies and resources automatically.
Synchronize NEs in a domain: The U2000 can obtain the topology of the network through the active NE.
Upload the configuration data of NEs that are already created automatically.
Set the active and standby NEs.
Synchronize cross-connections for NEs.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
5-15
5 MSTP Network Feature Management
iManager U2000 Unified Network Management System Product Description
Manage domains, including creating and deleting domains, and changing the domain name.
Query the ASON NE software version.
Search for ASON discrete signaling.
Manage node IDs on ASON NEs.
Enable or disable the optical virtual private network (OVPN) status of the NE.
Query SRGs relevant to an NE.
Control Link Management By using the U2000, a user can perform the following operations:
Synchronize networkwide control links .
Filter links by domain or source/sink information.
View control links.
Query the current alarm and history alarm about a control link.
Set alarm suppression for a control link.
Customize whether to display the color of alarms in the SDH Control Link Management window.
Print or save the report list control links information.
Component Link Management By using the U2000, a user can perform the following operations:
Synchronize networkwide component links.
Filter component links by domain or source/sink information
View component link information.
Create component links.
Delete component links.
Set resources reservation.
Query VC4 timeslot usage status.
Query link timeslot segmentation.
Print or save the report list component links information.
TE Link Management By using the U2000, a user can perform the following operations:
5-16
Synchronize networkwide links by domain.
Filter links by domain, source/sink information or OVPN customer.
View traffic engineering (TE) links.
Create virtual TE links.
Delete virtual TE links.
Create fibers.
Set the distance for a TE link.
Set the risk link group number.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Create a link resource report.
View bandwidth usage.
Divide link resource to an OVPN customer.
Query the alarm information for a TE link.
Set alarm suppression for a TE link.
Query the performance for a TE link.
View the interrupted TE links.
Query SRGs relevant to a TE link.
Set the cost of a TE link.
5 MSTP Network Feature Management
ASON Trail Management By using the U2000, a user can perform the following operations:
Filter relevant ASON services by actual route, original route or shared mesh restoration trail.
Synchronize ASON trails by domain or attributes.
View ASON trails.
View the details of an ASON trail.
Create an ASON server trail of the diamond, gold, silver, or copper class.
Create an ASON trail of the diamond, gold, silver, copper or iron class.
Set OVPN customer of an ASON trail.
Activate or deactivate ASON trails or SDH ASON server trails.
Delete inactive SDH ASON trails or inactive SDH ASON server trails.
Delete SDH ASON trails or SDH ASON server trails from NM.
Duplicate ASON trails.
Optimize ASON trails.
Pre-calculate and optimize service trails.
Create a user network interface (UNI) service trail.
Set routing attributes of the ASON trails, including rerouting lockout status, revertive lockout status, rerouting priority, rerouting revertive mode, WTR time, schedule revertive time, rerouting policy, trigger condition, crankback and rerouting triggered by B3 bit error
Query the rerouting reversion status of a revertive ASON trail.
Create and disable SDH ASON associated trails.
Set association for ASON trails.
Remove association for ASON trails.
Set the association source for ASON trails.
Set the trigger condition for rerouting associated route.
Query the related SDH trails for ASON trails.
Set a preset restoration trail for an ASON trail.
Downgrade an ASON trail to an SDH trail.
Migrate a trail in-service.
View the actual route, original route or associated route of an ASON trail.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
5-17
5 MSTP Network Feature Management
iManager U2000 Unified Network Management System Product Description
View the preset restoration trail or shared mesh for restoration trail an ASON trail.
Revert ASON trails manually.
Switch the working or protection trail of a diamond trail manually.
View the alarms of an ASON trail.
Set alarm suppression for the selected ASON trail.
View the control plane performance of an ASON trail.
View the performance events of an ASON trail.
Create the ASON trail report.
Refresh the original route, actual route or associated route of an ASON trail.
Refresh the preset restoration trail or shared MESH restoration trail for an ASON trail.
Set an actual route as an original route.
Restore to the original route in batches.
Set names for ASON trails in batches according to the naming rules.
Query the service level agreement (SLA) conformity of ASON trails.
Support the display of valid routes for gold services after the MSP switching.
Save the attributes of the service after you create an ASON service successful.
Restore the default attributes of the service when you create an ASON service.
Set SNCP access to a ASON trail.
Manage creators of SDH ASON trails.
Downgrade an SDH ASON trail forcibly.
Reroute the preset SDH ASON restoration trail in case of a fault.
UNI Service Management
Synchronize UNI services by domain.
View the information about an UNI service.
Filter UNI services by domain or source/sink information.
ASON Clock Subnet Management
Create an ASON clock subnet.
Create a preconfigured ASON clock subnet.
Convert a preconfigured ASON clock subnet into an ASON clock subnet.
Convert a traditional clock subnet into an ASON clock subnet.
Manage a hybrid network composed of an ASON clock subnet and a traditional clock subnet.
Manage the startup time for the SDH ASON clock recovery.
SRG Management
Create, delete and modify an SRG.
Manage SRGS of the pipe, fiber/cable, NE and site.
One-End Terminated ASON Server Trail Management By using the U2000, a user can perform the following operations:
5-18
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
5 MSTP Network Feature Management
Create and delete a one-end terminated ASON server trail.
Activate and deactivate a one-end terminated ASON server trail.
Associate one-end terminated ASON server trails.
Create and delete the ASON-SDH trail that contains one-end terminated ASON server trail.
Activate and deactivate the ASON-SDH trail that contains one-end terminated ASON server trail.
Search for the ASON-SDH trail that contains one-end terminated ASON server trail.
Set association relations between the ASON trails that have different sources and sinks.
Integration of SDH and ASON Trails By using the U2000, a user can perform the following operations:
Specify the explicit route for ASON services when creating an ASON-SDH trail. That is, an ASON-SDH trail includes an SDH trail and an ASON trail.
View SDH and ASON trails at the same time in the SDH Trail Management window.
Manage overhead bytes, alarms and performance of a joint trail in a unified manner.
Query the related ASON trails by an SDH trail.
Query the related SDH trails by an ASON trail.
Downgrade an ASON trail to an SDH trail.
Upgrade an SDH trail to an ASON trail.
Set the revertive attributes when an SDH trail is being migrated to an ASON trail.
Create dual-fed and selectively received VC4 ASON server trails.
Create lower order diamond trails.
Calculate working and protection routes using the SPC first policy.
The alarm in the ASON section of an ASON-SDH trail supports the alarm statistics function.
Support an SNCP access scheme, such as setting the SNCP access attributes of an ASON trail, querying the SNCP protection switching status of the ASON trail, and performing protection switching on the SNCP access point of the ASON trail.
File Export or Import for Simulated Network Planning Information By using the U2000, a user can perform the following operations:
Export the simulated network planning information, including networkwide configuration file, NE configuration file, network layer information file, ASON information file, the TE link information, the associated ASON service information, the route calculation policy, the component link information, the ASON resource reservation information, the WTR time information, the preset restoration trails and route calculation policy for nodes.
Import file scripts of the simulated planning information.
ASON NE Catastrophe Restoration The U2000 supports an ASON NE catastrophe restoration scheme.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
5-19
5 MSTP Network Feature Management
iManager U2000 Unified Network Management System Product Description
SDH ASON Management on a Per-NE Basis By using the U2000, a user can perform the following operations:
5-20
Manage board ASON feature.
Manage control plane parameters.
LMP control channel.
Query LMP component link.
Query LMP TE link.
Set LMP auto discovery type.
Manage fiber resource threshold.
Query OSPF control link.
Query OSPF SDH TE link.
Query OSPF component link.
Manage OSPF IP address.
Manage OSPF TE Link flood threshold.
Manage OSPF protocol authentication.
Manage ASON trail group.
Query ASON trail.
Maintenance SDH ASON signaling.
Maintenance SDH ASON switch controller.
Maintenance ASON shared MESH switch controller.
Suppression the control plane alarm.
Manage control plane performance parameters.
Manage reserved resource .
Manage VC4 timeslot occupation status.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
6
6 WDM Network Feature Management
WDM Network Feature Management
About This Chapter This topic describes the functional features of WDM NE management and network management. 6.1 WDM NE Management NE management refers to the management of configurations of an NE in terms of attributes, services, protection, and clocks. The configuration object is a single NE. The data is saved to the database of the U2000 and the database of the NE. 6.2 NA WDM NE Management NE management includes the configurations on attributes, communications, services, protection, and clock on an individual NE basis. The configuration data is saved at the NE layer on the U2000 and in the database of the NE. 6.3 WDM Protection Subnet Management A protection subnet is a network structure with the comprehensive self-protection function. In the U2000, the protection subnet is a generalized concept that includes not only the network structure with the comprehensive self-protection function, such as an MSP ring and a PP ring, but also the network structure without the self-protection function, such as an unprotected ring and an unprotected chain. 6.4 End-to-End WDM Management End-to-end network management is also referred to as trail management. You can construct the configuration data of end-to-end network management by searching for the data at the NE layer of the U2000, or directly configure the data at the network layer of the U2000, and apply the data to all the related NEs. Compared with configuring NE data on a per-NE basis, configuring NE data by using the trail management function is faster and more convenient. 6.5 WDM ASON Management ASON is a new generation of optical network that integrates the exchange and transport. After the user initiates a service request, the ASON selects a route automatically, establishes and removes connections through the signaling control, and performs network connections automatically and dynamically. An ASON NE refers to the equipment that is equipped with both WDM and ASON features. An ASON network is managed by the U2000 that combines ASON and WDM features.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
6-1
6 WDM Network Feature Management
iManager U2000 Unified Network Management System Product Description
6.1 WDM NE Management NE management refers to the management of configurations of an NE in terms of attributes, services, protection, and clocks. The configuration object is a single NE. The data is saved to the database of the U2000 and the database of the NE.
Basic NE Configuration By using the U2000, a user can perform the following operations:
Synchronize NE time: Send the computer system time, NTP server time, or standard NTP server time at the U2000 server end to all NEs for synchronizing the NE time. You can set the U2000 to automatically synchronize the NE time by specifying the automatic synchronization period.
Query the physical inventory information, including the equipment room, racks, NEs, shelves, boards, subboards, and ports.
Support the board plug and display feature: After a board is inserted to the slot, the NE Panel automatically displays the board and board information.
Disable NE functions automatically. You can set the U2000 to periodically disable certain NE functions that may affect services, such as loopback and ALS. When the time expires, these operations automatically stop.
Modify NE attributes such as:
−
NE name
−
NE ID
−
NE extended ID
−
Remarks
−
NE pre-configuration
−
NE Time zone and DST
Change attributes of optical NEs, including: −
Name
−
Remarks
−
Resources assigned for them
Environment monitoring information. You can set or query the PMU interface, NE fan speed and monitor temperature.
Network operator information. You can set the information about the network operator, including the international identifier, domestic identifier, and customized identifier.
Search and create NEs by discovering the NE IP address automatically.
Orderwire Configuration By using the U2000, a user can perform the following operations:
6-2
Configure the board to an orderwire board, and query the orderwire board information.
Set and query the orderwire phone numbers, call waiting time, dialing mode, and orderwire phone port availability.
Set and query the networkwide conference call number.
Set and query the subnet No. length and the related subnet of the optical interface.
Set and query the SDH NNI connection for orderwire.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Configure and query the F1 data port.
Configure and query the broadcast data port.
Configure E1 Cross-Connections.
6 WDM Network Feature Management
Configuration for Ethernet Interfaces and Services By using the U2000, a user can perform the following operations:
Configure Ethernet port mirroring. You can monitor packets, perform routine maintenance operations and in-service commissioning through a mirrored port in a flexible manner.
Configure or query the internal ports of an Ethernet interface, including:
−
Basic attributes
−
Flow control
−
TAG attributes
−
Network attributes
−
Bound path
−
Advanced attributes
Configure or query the external port of an Ethernet interface, including: −
Basic attributes
−
Flow control
−
TAG attributes
−
Network attributes
−
Advanced attributes
Configure EPL services, EVPL (QinQ) services and VLAN SNCP services.
QinQ is an embedded VLAN technology that introduces multi-layer VLAN IDs to identify different users. In this way, VLAN is expanded. The U2000 supports the ability to add labels.
The VLAN SNCP service is VLAN-based Ethernet private line service that has the SNCP protection. You can create VLAN SNCP and QinQ VLAN SNCP services, and perform conversion between a VLAN SNCP service and a normal Ethernet service.
Configure EPLAN services. You can create a new VB and configure the following: service mount, VLAN filtering, VLAN unicast, disable MAC address, bound path, and self-learning MAC address.
Configure QoS, including: −
Flow
−
CAR
−
CoS
−
Flow shaping
−
Port shaping
Configure link capacity adjustment scheme (LCAS): The LCAS can dynamically adjust the number of virtual containers for mapping desired services, to meet different bandwidth requirements of services. In this manner, the bandwidth utilization is improved.
Configure OAM for Ethernet services.
Configure OAM for Ethernet ports.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
6-3
6 WDM Network Feature Management
iManager U2000 Unified Network Management System Product Description
Support the intra-board LAG function.
Support the DLAG function.
Support the VLAN group function.
Support the port MAC address filtering.
Test frame receiving and transmitting on Ethernet boards.
Support the protocol diagnosis function.
Configure QinQ type area.
Configure Ethernet Layer-2 switching, including: −
Aging time
−
Spanning tree.
−
IGMP snooping protocol.
Configure Multiple Spanning Tree Protocol (MSTP). MSTP is compatible with the STP and RSTP, and it also fixes the defects of the STP and RSTP. The convergence rate of the MSTP is fast. In addition, traffic of different VLANs passes through corresponding trails, which provides a well load balancing mechanism.
Configure MPLS Tunnel. In a PSN network, the MPLS tunnel carries PWs where various services are encapsulated. In this way, data packets can be transparently transmitted among NEs.
Configure Ethernet ring protection switching (ERPS). Based on the traditional Ethernet mechanism, the ERPS uses the Eth-OAM function and the ring automatic protection switching (R-APS) protocol to achieve fast protection switching on the Ethernet ring network.
Configure link-state pass through (LPT). LPT is used to return the remote-end link status to the near end. The near-end equipment performs operations depending on the remote-end link status. The Ethernet board periodically monitors the network to know the Ethernet status. For the change in the connection status of Ethernet ports, if the change is caused by the opposite equipment, a board at the local end, network cable, human factors and other reasons, you can use the LPT function to quickly switch the route to the equipment on both ends.
Support the automatic reporting of RMON performance of Ethernet boards.
Dump history RMON performance data of Ethernet boards.
WDM Board Configuration By using the U2000, a user can perform the following operations:
6-4
Configure optical transponder units.
Configure service multiplexing and de-multiplexing units.
Configure tributary and line boards.
Configure protection boards.
Configure optical amplifier units.
Configure spectrum analysis units.
Configure optical supervisory channel units.
Configure optical add/drop multiplexing units.
Configure variable optical attenuator units.
Configure optical equalization units.
Configure optical fiber monitoring units. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Configure dispersion compensation units.
Configure wavelength management boards.
6 WDM Network Feature Management
Manage dynamic ports. Query the line rate of an optical transport network (OTN).
Overhead Configuration By using the U2000, a user can configure OTN overheads as follows:
Configure and query the SM overhead.
Configure and query PM overheads.
Configure and query the TCM overhead.
Configure and query the FTFL overhead.
Query the OPU overhead.
By using the U2000, a user can configure WDM overheads as follows:
Configure the optical channel (OCh) overhead at the SDH interface.
Configure the optical transponder unit (OTU) overhead at the OTN interface.
Configure the optical demultiplexer unit (ODU) overhead at the OTN interface.
Configure the optical channel payload unit (OPU) overhead at the OTN interface.
Configure the optical transmission section (OTS) overhead at the OTN interface.
By using the U2000, a user can configure SDH overheads for the OptiX OSN 8800 I and OptiX OSN 8800 II as follows:
Configure the regenerator section overhead (J0).
Configure the lower order path overhead (V5, J2).
Configure the VC4 higher order path overhead (J1, C2) and pass-through or termination.
Configure the VC3 higher order path overhead (J1, C2).
WDM Service Configuration At an optical add/drop multiplexer (OADM) station, a user can perform ADM configuration for GE/Any services using the OTU board as follows:
Several WDM service boards in specified slots form a cross-connect unit group.
GE/FC services can be added or dropped, passed through or looped back in each cross-connect unit group.
Support wavelength cross-connection protection (WXCP), with working and protection cross-connections configured at the sink NE.
Support the function of configuring electrical cross-connections.
The U2000 allows you to configure electrical cross-connections to control service flow in the electrical layer, and to dynamically groom, converge and split sub-wavelength services. In this way, the networking and network survivability ability is enhanced.
Integrated grooming of GE services, ODU0, ODU1 and ODU2 services realized by cross-connect boards.
Distributed grooming of GE services, ODU0, ODU1 and ODU2 services and Any services.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
6-5
6 WDM Network Feature Management
iManager U2000 Unified Network Management System Product Description
Support SNCP at the ODU2, ODU1 and ODU0 level.
You can configure optical cross-connections as follows:
Create optical cross-connections dynamically. Manage optical cross-connections for a board and a per-NE basis, including creation, activation, deactivation, deleting and querying.
Support the functions of creating, querying, and deleting boundary ports.
You can perform the following service management functions:
Lock WDM trails and view the lock status of the corresponding trails in the service management window of the NE Explorer.
View the name of the trail that a service belongs to.
Query the trail that a service belongs to.
The OSN 1800 supports service package management. The service package module helps you perform typical service configurations. In this manner, you are freed from the in-field commissioning. This reduces costs of deployment commissioning and maintenance of products. In addition, the equipment can be configured in a one-touch manner. Manage license for the service types and cross-connect capacity of the OptiX OSN 8800 I and OptiX OSN 8800 II.
ROADM Configuration Using the reconfigurable optical add/drop multiplexer (ROADM) function in the U2000, a user can perform add/drop and pass-through configuration for optical channels. The WDM equipment uses the DWC and wave selective switch (WSS) to implement the ROADM function.
Configure ROADM boards based on the DWC boards: The wavelength grooming is realized through the DWC boards. This configuration method is often used for the normal nodes in a chain or ring network.
Configure ROADM boards based on the WSS boards: There are two types of networking: WSSD+WSSM and WSS+RMU/ROAM. This configuration method is often used for the cross-connect nodes in a ring network.
Configure ROADM boards based on the multiplexing and demultiplexing boards: Wavelengths cannot be groomed dynamically. This configuration method is often used for the normal nodes in a chain network.
Clock Configuration By using the U2000, a user can perform the following operations:
6-6
Configure a board clock source.
Configure transparent transmission of an external clock.
Configure a clock for the SCC board. −
Configure a clock for the optical supervisory channel unit.
−
Specify the traceable clock source for the SCC board.
−
Define the clock source priorities.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
6 WDM Network Feature Management
PTP Clock(1588 V2 Clock) Configuration
Configure the frequency source mode.
Configure PTP clock synchronization attributes.
Query the clock source received at the port.
Configure PTP clock subnet.
Configure PTP packet attributes.
Configure the external time interface.
Physical Clock Configuration
Configure input attributes of external clocks.
Configure the system clock source priority table.
Configure the clock source protection and clock source reversion.
Configure phase-locked source output of external clocks.
Configure the quality of clock sources.
WDM Protection Configuration By using the U2000, a user can perform the following operations:
Configure optical line protection and 1:1 optical line protection.
Configure optical wavelength protection group.
Configure port protection.
Configure 1:N(N no larger than 8) optical channel protection.
Configure 1+N(N no larger than 48) optical channel protection.
Configure protection for clock transparent transmission.
Configure optical wavelength share protection (OWSP) in the case of the Metro WDM equipment and the NG WDM equipment.
Configure WXCP protection for GE/FC services.
Configure WXCP protection group for the NE in the sink slot.
Configure and query the WXCP protection parameters.
Query the status of WXCP protection switching.
Query the services with WXCP protection.
Perform WXCP protection switching.
Configure tributary protection set.
Configure dual path protection set.
Configure board 1+1 protection. −
Configure SCC board 1+1 protection.
−
Configure cross-connect and synchronous timing (XCS) board 1+1 protection.
−
Perform switching between working and protection.
−
Query the switching status.
Configure SNCP protection.
Configure sub-wavelength (SW) SNCP for GE services or services of the Any type on an OTU board.
Configure SNCP for optical channel data unit (ODUk) services.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
6-7
6 WDM Network Feature Management
iManager U2000 Unified Network Management System Product Description
Configure MS SNCP.
Configure VLAN SNCP for an Ethernet board. −
Perform protection switching.
−
Query the switching status.
Support BPS protection.
Support the DBPS protection. The distribute board protect system (DBPS) protects the 10GE and GE ports of the TBE board.
Support ODUk SPRings of the ODU1 and ODU2 levels.
Support the service package. The service package module helps you perform typical service configurations. In this manner, you are freed from the in-field commissioning. This reduces costs of deployment commissioning and maintenance of products. In addition, the equipment can be configured in a one-touch manner.
In the case of 1+1 protection for the SCC board, a user can query the status of the data backup between the active and standby SCC boards.
Optical Power Adjustment By using the U2000, a user can perform the following operations:
Manage the optical power. The user can query the input power, output power and power threshold and so on for each WDM board.
Perform the function of intelligent power adjustment (IPA) management. When a fiber is cut off, the optical amplifier board detects the signal loss at the station. The station reports an exceptional event to the U2000. After the user confirms the event, the optical amplifier boards at the upstream and downstream stations reduce their output power to a safe value to prevent the fiber maintainer from being hurt by the lasers emitted from the cut-off fiber. After the fiber is reconnected, the optical signals restore to normal and the optical power of each optical amplifier board automatically returns to a normal value.
Automatic level control (ALC) management: Support the adjustment modes including wavelength count detection, power detection, and link attenuation (gain mode). The wavelength detection mode applies to the transmission link where no service is added or dropped or where the number of wavelengths added and that dropped are the same at the OADM. When the spectrum analyzer unit detects that the sum of each wavelength power greatly differs from the standard power of the corresponding wavelength count, an exceptional event is reported to the U2000. After the user confirms the event, the user needs to manually issue a command to adjust the attenuations of each station on the link. The power reference mode applies to the transmission links where the number of added wavelengths differs from the number of dropped ones at an OADM. When the optical amplifier board detects that the output power becomes abnormal, the station automatically issues the command to adjust the attenuation of each station on the link. This mode does not involve the spectrum analyzer unit, and is thus cost-effective. For the previous two modes, a user can manually control whether to enable the ALC function. The link attenuation adjustment mode also applies to the transmission link where the number of added wavelengths differs from the number of dropped ones at an OADM. When the optical power is attenuated to the detection threshold, a command is automatically issued to adjust the attenuation of each station on the link. The link attenuation adjustment mode is also referred to as the gain mode, which compares the difference between the line attenuation and the amplifier gain, and also compares the node gain compensation offset. Through the adjustment of the nominal gain of the optical amplifier unit and the attenuation value of the attenuation adjustment unit, the attenuation value is equal to the gain value, thus ensuring the power budget of the entire link.
6-8
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
6 WDM Network Feature Management
Perform the function of automatic power equilibrium (APE). If the MCA board at the receive end detects that the optical power of some channels is abnormal, the station reports an exceptional event to the U2000. After the user confirms the event, the U2000 issues a command to the optical attenuation adjustment board of the upstream station. This board adjusts the optical power of the abnormal channel so that the optical signal noise ratio (OSNR) of each channel at the receive end is equalized.
Perform the function of ROADM optical power equalization. After the ROADM is used to dynamically configure the wavelength services, the WDM equipment outputs multiplexed wavelengths. The optical power, however, may be greatly different between each channel, especially for the newly added wavelength channels. To avoid negative impacts on the transmission performance, the ROADM optical power equalization function is provided. The ROADM first distinguishes between the pass-through wavelengths and the added wavelengths. Then the DWC/WSS adjusts the optical power of the pass-through wavelengths, and the optical attenuation adjustment board adjusts the added wavelengths based on the wavelength flags.
Support pre-alerts for the port optical power.
Dispersion Compensation By using the U2000, a user can perform the following operations:
The DCM board can conduct dispersion compensation to each band to realize dispersion equalization.
Tunable dispersion compensators (TDCs) can be used to precisely adjust the dispersion.
The submarine system supports using a separate dispersion compensation board, such as the TDC1 and TDC2, to perform dispersion compensation for signals at the line side of OTU boards.
Wavelength Monitoring The U2000 supports wavelength monitoring management for the OptiX BWS 1600G, OptiX OSN 6800, OptiX OSN 8800 I and OptiX OSN 8800 II.
WDM PRBS You can perform a PRBS test on a board to check the path quality. You can also check whether the WDM link is normal before a service is available.
SDH Board Configuration You can configure SDH line boards for the OptiX OSN 8800 I and OptiX OSN 8800 II.
Configure dynamic SDH ports.
Adjust the rates of optical ports on SDH boards.
Query the status of a port.
Configuration for SDH Services and Protection By using the U2000, a user can perform the following operations:
Configure SDH line boards, SDH services, and SDH service protection for the OptiX OSN 8800 I and OptiX OSN 8800 II.
Configure VC12, VC3, or VC4 services and select protection groups for them.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
6-9
6 WDM Network Feature Management
iManager U2000 Unified Network Management System Product Description
Activate or deactivate services.
Configure subnetwork connection protection (SNCP) services.
Convert an SNCP service to a normal service or convert a normal service to an SNCP service.
Query the capacity of higher order and lower order cross-connections on an NE.
Configure subnetwork connection tunnel protection (SNCTP). SNCTP provides protection channels at the VC4 level. When the working channel is faulty, all its services can be switched to the protection channel.
Configure linear multiplex section protection (MSP). In the MSP protection, bytes K1 and K2 in the SDH multiplex section overhead (MSOH) are used to transmit protocol information to control the transmit and receive routes of services.
Configure MSP Ring, including two-fiber and four-fiber MSP rings.
Configure transoceanic MSP Ring, A transoceanic multiplex section (MS) is an MS based on transoceanic MSP protocol and used to provide path protection for higher-order service on a transoceanic ring network.
Power Consumption Management By using the U2000, a user can perform the following operations:
Manage NE power consumption, to ensure that energy conservation and environment protection can be achieved when the NE runs in the normal state.
Query the power consumption of a board or an NE.
Configure energy conservation for an NE. You can dynamically adjust NE power consumption to achieve environment protection and energy conservation.
View the networkwide NE power consumption report.
Submarine Cable Line Management You need to create a line group for the actual submarine cable on the U2000. Hence, you can measure and analyze the line data, and monitor the working status of lines. Submarine cable line management includes the following functions:
Create a submarine cable line.
Modify a submarine cable line.
Activate a submarine cable line.
Delete a submarine cable line.
Submarine Cable Line Monitoring You can monitor and test the status of fibers and repeaters, analyze the test data, to monitor the working status of a submarine line system and locate faults. Submarine cable line monitoring includes the following functions:
6-10
Support submarine line threshold management.
Monitor submarine cable lines and the status of a repeater in the in-service mode.
Support the fast fault location function.
Locate a fault in a submarine cable line in the out-of-service mode.
Support tests of multiple types: manual test, comparison test in single-test mode, and comparison test in periodic mode.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
6 WDM Network Feature Management
Synchronize, query and analyze the test data.
Support the ability to refresh monitoring information in real time.
Support querying the gain report and event report.
PFE Managent The U2000 supports the ability to manage the PFE 1670, the PFE 1670 is the power supply equipment for the submarine transmission system.
FC Service Test The FC service test uses the 12LOM board to replace the FC test equipment (such as Smartbit) to run the test. The FC service test serves to verify whether the FC service line and the equipment under test are normal.
6.2 NA WDM NE Management NE management includes the configurations on attributes, communications, services, protection, and clock on an individual NE basis. The configuration data is saved at the NE layer on the U2000 and in the database of the NE.
Basic NE Configuration By using the U2000, a user can perform the following operations:
Synchronize NE time: Send the computer system time, NTP server time at the U2000 server end to all NEs for synchronizing the NE time. You can configure the U2000 to automatically synchronize the NE time by specifying the automatic synchronization period.
Query physical resources in the following lists: −
NE list
−
Board manufacturer information
−
Board list
−
Subrack list
−
Equipment room list
Support the board plug and display feature: After a board is inserted to the slot, the NE Panel automatically displays the board and board information.
Disable the NE functions automatically. You can set to periodically disable some NE functions that may affect services, such as loopback and ALS. When the time expires, these operations automatically stop.
Modify NE attributes such as:
Issue 03 (2010-11-02)
−
NE name
−
Remarks
−
Enable or disable automatic board installation.
−
Enable or disable LAN port access control.
−
Set start time for 24-hour performance monitoring.
−
Enable or disable daylight saving time.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
6-11
6 WDM Network Feature Management
−
Modify IP address and subnet mask of NE.
−
Enable or disable ARP proxy.
−
Enable or disable OSI protocol.
−
Modify subrack name.
−
Modify subrack remarks.
−
Set the time zone and DST.
−
Cold reset or warm reset NE.
−
Reset the NE in the DBERASE mode, with the NE database erased.
−
Reset the NE in the SWDL mode after the NE software is downloaded.
−
Enable or disable performance reporting.
−
Enable or disable alarm reporting.
−
Enable or disable database changed (DBCHG) reporting.
−
Clear audible and visual alarm indication of NE cabinet.
−
Set the NE alarm delay time, including the delay time of alarm start and the delay time of alarm end.
−
Set the longitude and latitude of the NE.
−
Affiliated gateway IP address.
−
Affiliated gateway port.
−
Choose to set the state model level of the NE.
−
Set the country code and national segment code of the NE.
−
Enable or disable buzzer of the NE.
Change attributes of optical NEs, including: −
Type
−
Name
−
Remarks
−
Vendor
−
Resources assigned for them
Support querying and modification of the parameters in board attribute interface, including: −
Set the primary and secondary states.
−
Query NE logical board and physical board.
−
Query board PCB version, software version, FPGA version, and BIOS version.
−
Query CLEI code, vendor ID, part number, serial number, date of manufacture and board description.
−
Query backup power and rated power voltage.
−
Set temperature upper threshold, temperature lower threshold and current temperature.
−
Set fan speed, working mode and LED state.
−
Perform a cold reset on a board.
−
Perform a warm reset on a board.
Environment monitoring information. You can set NE fan speed mode and speed level.
Manages fibers and cables as follows: −
6-12
iManager U2000 Unified Network Management System Product Description
View fiber cable information. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description −
Create or delete a fiber cable.
−
Create a fiber cable report.
6 WDM Network Feature Management
Dynamically add a port: The new function of dynamically adding, deleting, or modifying a port supports the SFP/XFP client side color port, fiber connection and optical cross-connection, and client side 1+1 protection.
Search and create NEs by discovering the NE IP address automatically.
Orderwire Configuration By using the U2000, a user can perform the following operations:
Set and query the orderwire phone numbers, and call waiting time.
Set and query the networkwide conference call number.
Set and query the subnet number length.
Card attributes Management By using the U2000, a user can perform the following operations:
Set the primary and secondary states. The primary and secondary states are presented in the form of PST-PSTQ, SST.
Query NE logical board and physical board.
Query board PCB version, software version, FPGA version, and BIOS version.
Query CLEI code, vendor ID, part number, serial number, date of manufacture and board description.
Query backup power and rated power voltage.
Set temperature upper threshold, temperature lower threshold and current temperature.
Set fan speed, working mode and LED state.
Perform a cold reset on a board.
Perform a warm reset on a board.
Configuration for Ethernet Interfaces and Services By using the U2000, a user can perform the following operations:
Configure Ethernet port mirroring. You can monitor packets, perform routine maintenance operations and in-service commissioning through a mirrored port in a flexible manner.
Configure the internal ports of an Ethernet interface, including:
Issue 03 (2010-11-02)
−
Basic attributes
−
TAG attributes
−
Network attributes
−
Advanced attributes
−
Flow control
Configure the external port of an Ethernet interface, including: −
Basic attributes
−
Flow control
−
TAG attributes
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
6-13
6 WDM Network Feature Management
−
Network attributes
−
Advanced attributes
iManager U2000 Unified Network Management System Product Description
Configure EPL services, EVPL (QinQ) services and VLAN SNCP services.
QinQ is an embedded VLAN technology that introduces multi-layer VLAN IDs to identify different users. In this way, VLAN is expanded. The U2000 supports the ability to add labels.
The VLAN SNCP service is VLAN-based Ethernet private line service that has the SNCP protection. You can create VLAN SNCP and QinQ VLAN SNCP services, and perform conversion between a VLAN SNCP service and a normal Ethernet service.
Configure EPLAN services. You can create a new VB and configure the following: service mount, VLAN filtering, VLAN unicast, disable MAC address, bound path, and self-learning MAC address.
Configure QoS, including: −
Flow
−
CAR
−
CoS
−
Port shaping
Configure OAM for Ethernet services.
Configure OAM for Ethernet ports.
Support the intra-board LAG function.
Support the DLAG function.
Support the VLAN group function.
Support the port MAC address filtering.
Test frame receiving and transmitting on Ethernet boards.
Support the protocol diagnosis function.
Configure QinQ Type area.
Configure Ethernet Layer-2 switching, including: −
Aging time
−
Spanning tree
−
IGMP snooping protocol.
Support the automatic reporting of RMON performance of Ethernet boards.
Dump history RMON performance data of Ethernet boards.
WDM Card Configuration By using the U2000, a user can perform the following operations:
6-14
Configure optical transponder units.
Configure service multiplexing and de-multiplexing units.
Configure tributary and line cards.
Configure protection cards.
Configure optical amplifier units.
Configure spectrum analysis units.
Configure optical supervisory channel units.
Configure optical add/drop multiplexing units.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Configure variable optical attenuator units.
Configure optical equalization units.
Configure wavelength monitoring.
Optical equalization board.
6 WDM Network Feature Management
Overhead Configuration By using the U2000, a user can configure OTN overheads as follows:
Configure and query the SM overhead.
Configure and query the PM overhead.
Configure and query the TCM overhead.
Query the OPU overhead.
Configure and query the FTFL overhead.
By using the U2000, a user can configure WDM overheads as follows:
OCh Overhead Management-SONET Interface.
Configure the OTU overhead at the OCh overhead management-OTN interface.
Configure the ODU overhead at the OCh overhead management-OTN interface.
Configure the OPU overhead at the OCh overhead management-OTN interface.
Configure the TCM overhead at the OCh overhead management-OTN interface.
Configure the OTS overhead at the OCh overhead management-OTN interface.
WDM Service Configuration At an OADM station, a user can perform ADM configuration for GE/Any services using the LQG, LOG and other boards as follows:
Several WDM service boards in specified slots form a cross-connect unit group.
GE services can be added or dropped, passed through or looped back in each cross-connect unit group.
Support WXCP protection, with working and protection cross-connections configured at the sink NE.
Configure electrical cross-connections. The U2000 allows you to configure electrical cross-connections to control service flow in the electrical layer. In this way, the networking and network survivability ability is enhanced.
Integrated grooming of GE services, ODU1 and ODU2 services realized by XCS.
Distributed grooming of GE services, ODU1 and ODU2 services and Any services.
Support ODU1, ODU2, ODU0, GE/Any, and OTU1 cross-connections, and SNCP at the ODU0, ODU1 and ODU2 level. Optical Cross-connection Configuration:
Create OCh cross-connections dynamically. Manage optical cross-connections for a board and a per-NE basis, including creation, activation, deactivation, deleting and querying.
Create edge ports.
You can perform the following service management functions:
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
6-15
6 WDM Network Feature Management
iManager U2000 Unified Network Management System Product Description
Lock WDM trails and view the lock status of the corresponding trails in the service management window of the NE Explorer.
View the name of the trail that a service belongs to.
Query the trail that a service belongs to.
ROADM Configuration Using the ROADM function in the U2000, a user can perform add/drop and pass-through configuration for optical channels. The WDM equipment uses the DWC and WSS to implement the function of reconfiguration optical add/drop multiplexing.
The DWC type of the ROADM: The DWC is applicable to normal nodes in a chain or ring network.
The WSS type of the ROADM: The WSS is applicable to cross-connect nodes in a ring. This way is applicable for the grooming of multi-dimensional optical cross-connections. A maximum of eight dimensions are supported.
Optical cross-connection broadcast services: Support the broadcast services of optical cross-connections on a per-NE basis.
Clock Configuration By using the U2000, a user can perform the following operations: Configure the master clock.
Add a clock source.
Delete a clock source.
Query a clock source.
Configure the OTC card clock.
Set the input attributes of the OTC card clock.
Set the output attributes of the OTC card clock.
Set the working route of the OTC card clock.
Set the synchronization clock source.
WDM Protection Configuration By using the U2000, a user can perform the following operations:
6-16
Configure the 1+1 optical channel protection.
Configure 1:N optical channel protection.
Configure the inter-subrack protection.
Configure port protection. −
Configure optical line protection.
−
Configure intra-board 1+1 protection: This function includes the intra-board 1+1 protection realized by the dual-fed OTU board and the intra-board 1+1 protection realized by the assistance of the DCP or OLP board.
−
Configure client-side 1+1 protection.
Configure protection for clock transparent transmission.
Configure OWSP protection. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
6 WDM Network Feature Management
Configure WXCP protection for GE/OTU1 services. −
Configure WXCP protection group for the NE in the sink slot.
−
Configure and query the WXCP protection parameters.
−
Query the status of WXCP protection switching.
−
Query the services with WXCP protection.
−
Perform WXCP protection switching.
Configure board 1+1 protection. −
Configure SCC board 1+1 protection.
−
Configure XCS board 1+1 protection.
−
Configure AUX board 1+1 protection.
−
Perform switching between working and protection.
−
Query the switching status.
Configure SNCP protection. −
Configure subwavelength (SW) SNCP for GE services or services of the Any type on an OTU board.
−
Configure SNCP for ODUk services.
−
Configure VLAN SNCP for an Ethernet board.
−
Perform protection switching.
−
Query the switching status.
Support BPS protection. The BPS protection uses two boards, that is, the working and protection boards. This function realizes the protection of any one port by performing board-level switching.
In the case of 1+1 protection for the SCC board, a user can query the status of the data backup between the active and standby SCC boards.
Optical Power Adjustment By using the U2000, a user can perform the following operations:
Manage the optical power, such as querying the input power, output power, and power threshold for each WDM board.
Perform the function of IPA management. When a fiber is cut off, the optical amplifier board detects the signal loss at the station. The station reports an exceptional event to the U2000. After the user confirms the event, the optical amplifier boards at the upstream and downstream stations reduce their output power to a safe value to prevent the fiber maintainer from being hurt by the lasers emitted from the cut-off fiber. After the fiber is reconnected, the optical signals restore to normal and the optical power of each optical amplifier board automatically returns to a normal value.
ALC management: Support link attenuation (gain mode) as the adjustment mode. The link attenuation adjustment mode applies to the transmission link where the number of added wavelengths differs from the number of dropped ones at an OADM. When the optical power is attenuated to the detection threshold, a command is automatically issued to adjust the attenuation of each station on the link. The link attenuation adjustment mode is also referred to as the gain mode, which compares the difference between the line attenuation and the amplifier gain, and also compares the node gain compensation offset. Through the adjustment of the nominal gain of the optical amplifier unit and the attenuation value of the attenuation adjustment unit, the attenuation value is equal to the gain value, thus ensuring the power budget of the entire link.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
6-17
6 WDM Network Feature Management
iManager U2000 Unified Network Management System Product Description
Perform the function of APE. If the MCA board at the receive end detects that the optical power of some channels is abnormal, the station reports an exceptional event to the U2000. After the user confirms the event, the U2000 issues a command to the optical attenuation adjustment board of the upstream station. This board adjusts the optical power of the abnormal channel so that the OSNR of each channel at the receive end is equalized.
Perform the function of ROADM optical power equalization. After the ROADM is used to dynamically configure the wavelength services, the WDM equipment outputs multiplexed wavelengths. The optical power, however, may be greatly different between each channel, especially for the newly added wavelength channels. To avoid negative impacts on the transmission performance, the ROADM optical power equalization function is provided. The ROADM first distinguishes between the pass-through wavelengths and the added wavelengths. Then the DWC/WSS adjusts the optical power of the pass-through wavelengths, and the optical attenuation adjustment board adjusts the added wavelengths based on the wavelength flags.
Support pre-alerts for the port optical power.
Dispersion Compensation
The G.652 and G.655 fibers have positive dispersion coefficient and positive dispersion slope at 1550 nm window. After the optical signal is transmitted over a certain distance, the accumulation of positive dispersion broadens the optical signal pulse and seriously affects the system transmission performance. To minimize this effect, a negative DCM is used in the network. It uses negative dispersion to compensate the positive dispersion of transmitting fiber, so as to maintain the original shape of the signal pulse.
The OEQ NE can apply dispersion compensation to each band to reach dispersion equalization.
This function supports 40G dispersion compensation configuration. It uses the TDC to precisely adjust the dispersion.
Wavelength Monitoring Wavelength monitoring uses the wavelength supervisory unit to monitor the wavelengths that are transmitted from the WDM-side optical interface of the OTU board (including the service convergence unit) and to control the wavelength drift. This function ensures stable wavelengths.
WDM PRBS You can perform PRBS on a board to check the path quality. You can also check whether the WDM link is normal before a service is available.
Housekeeping Configuration By using the U2000, a user can perform the following operations:
6-18
Set and query environment alarm property. −
Create environment alarm attributes.
−
Set normal state of environment property.
−
Query environment alarm attributes.
−
Modify environment alarm attributes.
−
Delete environment alarm attributes.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
6 WDM Network Feature Management
Set and query external control property. −
Create external control attributes.
−
Query external control attributes.
−
Modify external control attributes.
−
Delete external control attributes.
−
Set the control time of the external control relay.
Query of AO Buffer Records By using the U2000, a user can perform the following operations:
Query the records in the automatic output (AO) buffer. −
The time at which the record is generated.
−
The auto report tag (ATAG) of the record.
−
The type of the record.
−
The description of the record.
Filter the records in the AO buffer.
Save the records in the AO buffer to file.
Export the AO buffer information to the browser of the operating system for printing.
EAPE Management Enhanced automatic power equalization (EAPE) management can reduce the bit error rate (BER) of a service. You can query the EAPE function for an OCh trail.
Power Consumption Management By using the U2000, a user can perform the following operations:
Manage NE power consumption, to ensure that energy conservation and environment protection can be achieved when the NE runs in the normal state.
Query the power consumption of a board or an NE.
Configure energy conservation for an NE. You can dynamically adjust NE power consumption to achieve environment protection and energy conservation.
View the networkwide NE power consumption report.
ASON Management Topology Management By using the U2000, a user can perform the following operations:
Discover ASON topologies and resources automatically.
Synchronize NEs in a domain: the U2000 can obtain the topology of the network through the active NE.
Set the active and standby NEs.
Manage domains, including creating and deleting domains, and changing the domain name.
Query the ASON NE software version.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
6-19
6 WDM Network Feature Management
iManager U2000 Unified Network Management System Product Description
Manage node IDs on ASON NEs.
Query the enable status of the ASON NE software.
Enable or disable the ASON feature of an ASON NE.
TE Link Management By using the U2000, a user can perform the following operations:
Synchronize networkwide links by domain or payload type.
Filter links by domain, link signal type, payload type, or source/sink information.
View TE links.
Create fibers.
Manage TE links whose payload type is OCh.
Set the distance for a TE link.
Create a link resource report.
6.3 WDM Protection Subnet Management A protection subnet is a network structure with the comprehensive self-protection function. In the U2000, the protection subnet is a generalized concept that includes not only the network structure with the comprehensive self-protection function, such as an MSP ring and a PP ring, but also the network structure without the self-protection function, such as an unprotected ring and an unprotected chain. To perform protection subnet management, you need to have the related license. By using the U2000, a user can perform the following operations:
Search for a wavelength protection subnet. −
Create a 1:N wavelength protection subnet by using the search function.
−
Create ODUk SPRings at ODU1 and ODU2 levels by using the search function.
Manage a wavelength protection subnet. −
Set 1:N Wavelength Protection Subnet Parameters.
−
Perform and verify the 1:N Wavelength Protection Switching.
−
Set Parameters of an ODUk SPRing Protection Subnet.
−
Perform and verify the ODUk Wavelength Protection Switching
−
Query and delete a protection subnet.
−
Query and delete an isolated node.
−
Query protection subnet resources.
6.4 End-to-End WDM Management End-to-end network management is also referred to as trail management. You can construct the configuration data of end-to-end network management by searching for the data at the NE layer of the U2000, or directly configure the data at the network layer of the U2000, and apply the data to all the related NEs. Compared with configuring NE data on a per-NE basis, configuring NE data by using the trail management function is faster and more convenient.
6-20
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
6 WDM Network Feature Management
To perform end-to-end network management, you need to have the related license. By using the U2000, a user can perform the following operations:
Issue 03 (2010-11-02)
Search for a trail. −
According to the NE configuration data and fiber connection data in the NE layer, the U2000 generates the network layer information about end-to-end trails, including OTS trails, OCh client trails, OCh trails, optical multiplex section (OMS) trails, optical supervisory channel (OSC) trails, ODUk layer trails and optical channel transport unit (OTUk) layer trails.
−
Manage conflict and discrete trails created during the search process.
−
Join trails automatically during the wavelength trail search process.
−
Support the reservation of user-defined information on trails during WDM trail search.
−
Search for inverse multiplexing trail of the 40G and 10G rate levels.
Create a trail. −
The U2000 automatically generate an OTS trail after the fibers are correctly connected between the specified boards.
−
Create an OCh trail, and create an OCh cross-connection by using the trail management function.
−
Create an ODU0, ODU1 or ODU2 trail, and create an ODU0, ODU1 or ODU2 cross-connection by using the trail management function.
−
Create a client trail, and create GE, FC, and FE services based on the OCh and ODUk trails by using the trail management function.
−
Create SNCP or WXCP by using the trail management function.
−
Create a WDM trail by double-clicking an NE and select the source and sink ends.
−
Select the explicit route of the protection trail when creating a WDM trail.
−
Support the end-to-end management function for ASON-WDM trails.
−
Create multi-layer WDM trails. Meanwhile, the Client and ODUk cross-connections are created by using the end-to-end trail management function.
−
Create trails through duplication. You can create multiple trails by duplicating a trail. In addition, you can generate Client and ODUk cross-connections in batches by using the end-to-end trail management function.
−
Create WDM trails whose fiber jumpers are connected inside a station
−
Support port attribute.
−
View inner cross-connection.
Manage customers of a trail. −
Create a customer.
−
View and modify the customer information.
−
View the trail related to a customer.
−
View the current and history alarms for a customer.
−
Delete a customer.
View trails. −
Join trails of the same type.
−
Split a trail into trails of the same type.
−
Browse the trails included in a trail group.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
6-21
6 WDM Network Feature Management
6-22
iManager U2000 Unified Network Management System Product Description
−
Query the route information of a trail.
−
Display the signal flow diagram of a trail.
−
Query the transmission media layer (that is, server trail) for a trail.
−
Query the client trail for a trail.
−
Query details of a trail, including its attributes and channel allocation.
−
Query the optical power of a trail. You can query the optical power of a WDM trail, and the input and output optical power of the source and sink of the trail.
−
Query the DPPS protection for a trail.
−
Support display of valid routes for the protected wavelength trails.
−
Query the associated working and protection trails for the protected OCh trails.
−
Support the functions of displaying intra-site fibers in real lines and inter-site fibers in dotted lines in the signal flow diagram of a trail.
−
Support the functions of displaying working and protection routes in different colors in the signal flow diagram of a trail.
−
Support the function of displaying the details of a trail group. The details of a trail group include direction, name, trail status, source and sink, source and sink wavelength, bearer rate, rate, and service type.
−
Support enable or disable service alarm.
−
Switch between the window for viewing WDM trails and the window for viewing associated SDH trails.
−
Support lock WDM trails.
Manage the alarms and performance events related to a trail. −
Query the current alarms of a trail.
−
Query the history alarms of a trail.
−
Query history performance data of a trail.
−
Query UAT of a trail.
−
Support the ability to set the performance threshold of a WDM trail.
−
Query the performance threshold-crossing records of a trail.
−
Query the current performance data of a trail.
−
Query the Ethernet performance of an OCh client trail with GE services.
−
Manage networkwide alarmed WDM trails in real time.
−
Support display of MUT_LOS and R_LOS alarms on the signal flow diagram of a trail.
−
Support the function of setting the alarm threshold for a trail.
−
Support the service alarm.
Query statistics resources report. −
Support the function of collecting the statistics on WDM client-side port resources.
−
Support the function of collecting the statistics on WDM inter-site wavelength resources.
−
Support the function of collecting the statistics on WDM link resources.
−
Support the OTUk link resource occupancy report.
−
Support the statistics report of WDM wavelength resource.
−
Support the statistics report of WDM wavelength usage.
Manage trails. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
6 WDM Network Feature Management
−
Query 1+1 protection for an optical layer trail and perform protection switching for the optical layer trail.
−
Query WXCP and SNCP protected trails, and perform protection switching.
−
Support the ability to add and delete a WXCP protection group.
−
Use the TTI byte to check fiber connection relations of an OCh trail.
−
Support the transaction creation of WDM trails and the rollback in the case of a creation failure.
−
Support outputting the TM-TM connection diagram for WDM trails.
−
Support the automatic naming rule for WDM trails.
−
Modify the source and sink of a Client trail.
−
Support ODU trail end-to-end management.
−
Support the search and end-to-end management of Client trails.
−
Support the optical layer alarms and the configuration of optical layer overheads on trail levels.
−
Support the functions of adding and deleting the WXCP or SNCP protection of an ODUk trail or a Client trail.
−
Set the optical power mode by the end-to-end trail management function.
−
Implement the Save As and Print functions for the channel allocation of a WDM trail.
−
Save the signal flow diagram of a WDM trail.
−
Manage WDM trails base on rights and domains.
−
Manage WDM discrete services.
−
Manage WDM platinum trails.
−
Support 8 clients to create WDM trail on the same time.
Delete a trail. You can delete a WDM trail (except the OTS trail) from the NE layer and network layer of the U2000.
Support enhanced automatic power equilibrium (EAPE) based on an OCh trail. The EAPE function automatically adjusts the transmitted optical power of each path according to the signal quality of each path monitored by the OTU board at the receive end, to ensure the quality of signals in each path at the receive end meets the preset requirements. This ensures that services are available.
Filter trails in three ways. −
Filter all: Filter all trails and only display the qualified trails in a network.
−
Secondary filter: Filter those trails that are already displayed according to the filter criteria.
−
Incremental filter: Filter the newly added trails and display the newly qualified trails together with the currently displayed ones.
6.5 WDM ASON Management ASON is a new generation of optical network that integrates the exchange and transport. After the user initiates a service request, the ASON selects a route automatically, establishes and removes connections through the signaling control, and performs network connections automatically and dynamically. An ASON NE refers to the equipment that is equipped with both WDM and ASON features. An ASON network is managed by the U2000 that combines ASON and WDM features.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
6-23
6 WDM Network Feature Management
iManager U2000 Unified Network Management System Product Description
Topology Management By using the U2000, a user can perform the following operations:
Discover ASON topologies and resources automatically.
Synchronize NEs in a domain: the U2000 can obtain the topology of the ASON domain through the active NE.
Set the active and standby NEs.
Manage domains, including creating and deleting domains, and changing the domain name.
Query the ASON NE software version.
Manage node IDs on ASON NEs.
Query the version of the ASON software.
ASON Control Link Management By using the U2000, a user can perform the following operations:
Synchronize control links networkwide.
Filter links by domain or source/sink information.
View control links.
View the current alarm or history alarm information about a control link.
Set alarm suppression for a control link.
Customize whether to display the color of alarms in the Control Link Management window.
TE Link Management By using the U2000, a user can perform the following operations:
6-24
Synchronize networkwide links by domain or payload type.
Filter links by domain, link signal type, payload type (optical layer, electrical layer), or source/sink information.
View TE links.
Query the related ASON trails for a TE link.
Create fibers according the TE link.
Create a virtual TE link.
Delete a virtual TE link.
Manage TE links whose payload type is OCh, ODUk or client (GE/Any).
Set the distance for a TE link.
Set the risk link group number.
Create a link resource report.
View resource usage.
View the current alarm or history alarm information about a link.
Set alarm suppression for a control plane alarm.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
6 WDM Network Feature Management
ASON Trail Management By using the U2000, a user can perform the following operations:
Filter relevant ASON services by domain, name, original route, shared MESH restoration trail, created time, planned time, OVPN customer, type, activation status, managed identifier, class or whether original route is active.
Synchronize networkwide ASON trails by domain, level or attributes.
View ASON trails.
View details of an ASON trail.
Create an ASON trail of the diamond, gold, silver, or copper class.
When diamond WDM ASON OCh trails are created, the working and protection wavelengths are shared.
Create an ASON trail of the OCh, ODU0, ODU1, ODU2 and Client level.
Set the SNCP type and OTN level when create a diamond WDM ASON ODUk trai.
Create a inverse multiplexing WDM ASON trail.
Create WDM ASON associated trail.
Duplicate ASON trails.
Pre-calculate route when create or optimize ASON trails.
Activate or deactivate ASON trails.
Apply planning data to an ASON trail.
Delete inactive ASON trails.
Delete an ASON trail from NM.
Set routing attributes, including rerouting lockout status, reversion lockout status, rerouting priorities , revertive mode, WTR time, scheduled revertive time, rerouting policy, trigger condition, crankback, rerouting triggered by B3 bit error and rerouting hold-off time.
Set association source for ASON trails.
Set association for ASON trails.
Remove association for ASON trails.
Set the trigger condition for rerouting associated route.
Set the shared policy of associated service.
Downgrade an ASON trail to an traditional trail.
Query related server trails for ASON trails.
Query related client trails for ASON trails.
Query related trails for ASON trails.
Migrate a ASON trail in-service.
Enable or disable the optical parameters of WDM ASON OCh trails, including OSNR, PMD and chromatic dispersion.
Revert an ASON trail to the original route.
Optimize ASON trails.
Switch the working or protection trail of a diamond trail manually.
Revert ASON trails manually.
Refresh the actual route, original route, associated route or signal flow diagram of an ASON trail.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
6-25
6 WDM Network Feature Management
iManager U2000 Unified Network Management System Product Description
Set an actual route as an original route.
Refresh the preset restoration trail for an ASON trail.
Set the preset restoration trail for an ASON trail.
Delete the preset restoration trail for an ASON trail.
View the actual route , original route or associated route of an ASON trail.
View the preset restoration trail for an ASON trail.
View the alarms of an ASON trail.
View the alarm suppression information for the selected ASON trail.
Set alarm suppression for the selected ASON trail.
View the performance events of the ASON trails.
View the control plane performance of the ASON trails.
View the control plane performance parameters of the ASON trails.
Create the ASON trail report.
Recover to original route in batch.
Set names for ASON trails in batches according to the naming rules.
Save the attributes of the service after you create an ASON service successful.
Restore the default attributes of the service when you create an ASON service.
Manage creators of WDM ASON trails.
Downgrade a WDM ASON trail forcibly.
Combination of ASON and Traditional Trails By using the U2000, a user can perform the following operations:
Support the ability to create an ASON-WDM trail.
View both WDM and WDM ASON trails in the WDM Trail Management window.
Manage the overhead bytes, alarms, and performance events of an ASON-WDM trail in a centralized manner.
Query the ASON trail related to a WDM trail.
Query the WDM trail related to an ASON trail.
Downgrade an ASON trail to a traditional trail.
Upgrade a traditional WDM trail to a WDM ASON trail.
The alarm in the ASON section of an ASON-WDM trail supports the alarm statistics function.
Exchange Script Files By using the U2000, a user can perform the following operations:
Import and export the script files of WDM ASON nodes,.
Import and export the script files of WDM TE links
Import and export the script files of WDM ASON trails.
NG WDM ASON Management on a Per-NE Basis By using the U2000, a user can perform the following operations:
6-26
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Enable or disable ASON features.
Manage node IDs on ASON NEs.
Query control plane parameters.
Manage control channel.
Manage LMP TE links.
Support LMP automatic discovery.
Manage OSPF control links.
Manage OSPF TE links.
Manage OSPF IP addresses.
Authenticate the OSPF protocol.
Authenticate the RSVP protocol.
Manage WDM ASON trails.
Maintain ASON signaling.
Maintain the ASON switching controller.
Manage the LMP status.
Manage the OSPF protocol status.
Set alarm suppression for a control plane alarm.
Manage the control plane performance.
Manage resource reservation.
Manage the resource occupation status.
Issue 03 (2010-11-02)
6 WDM Network Feature Management
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
6-27
iManager U2000 Unified Network Management System Product Description
7
7 RTN Network Feature Management
RTN Network Feature Management
About This Chapter This topic describes the functional features of RTN NE management and network management. 7.1 RTN NE Management NE management refers to the management of configurations of an NE in terms of attributes, communication, services, protection, and clocks. The configuration object is a single NE. The data is saved to the database of the U2000 and to the database of the NE. 7.2 RTN Protection Subnet Management A protection subnet is a network structure with the comprehensive self-protection function. 7.3 End-to-End RTN Management End-to-end network management is also referred to as trail management. You can construct the configuration data of the end-to-end network management by searching for the data at the NE layer of the U2000, or directly configure the data at the network layer of the U2000, and apply the data to all the related NEs. Compared with configuring NE data on a per-NE basis, configuring NE data by using the trail management function is faster and more convenient. 7.4 End-to-End RTN IP Management There is the IP feature in RTN equipment. You can build the configuration data of end-to-end RTN IP network management by searching for the data at the NE layer of the U2000, or directly configure the data at the network layer of the U2000, and apply the data to all the relevant NEs. Configuring NE data by using the trail management function is faster and more convenient compared with configuring NE data on a per-NE basis.
7.1 RTN NE Management NE management refers to the management of configurations of an NE in terms of attributes, communication, services, protection, and clocks. The configuration object is a single NE. The data is saved to the database of the U2000 and to the database of the NE.
Basic NE Configuration By using the U2000, a user can perform the following operations: Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
7-1
7 RTN Network Feature Management
iManager U2000 Unified Network Management System Product Description
Support the ability to manage the connections between back-to-back RTN NEs. On the Main Topology of the U2000, the connections between back-to-back RTN NEs indicate the relations between the RTN NEs on the same station that are connected in a back-to-back manner through network interfaces.
Modify NE attributes such as: −
NE name
−
NE ID
−
NE Extended ID
−
Remarks
Synchronize NE time: Align all NEs with the system time of the U2000 server. The user can configure the U2000 to automatically synchronize the NE time by specifying the automatic synchronization period.
Query physical resources in the following lists: −
NE list
−
Board manufacturer information
−
Board list
−
Cabinet list
−
Subrack list
−
Equipment room list
Support the board plug and display feature: After a board is inserted to the slot, the NE Panel automatically displays the board and board information.
Automatically disable the NE functions: You can set to periodically disable some NE functions that may affect services, such as loopback and automatic laser shutdown (ALS). When the time expires, these operations automatically stop.
Environment monitoring information. You can set the interfaces of environment monitoring.
Support the license management function for equipment.
Support the press-to-install function for logical boards.
Support the Hop management function.
Orderwire Configuration By using the U2000, a user can perform the following operations:
Set and query the orderwire phone numbers, call waiting time and orderwire phone port availability.
Set and query the orderwire occupied bytes.
Configure and query the F1 data port.
Configure and query the broadcast data port.
Equipment Protection Configuration By using the U2000, a user can configure board 1+1 protection.
Interface Configuration By using the U2000, a user can perform the following operations:
7-2
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
7 RTN Network Feature Management
Set the parameters for a SDH interface.
Set automatic laser shutdown.
Set the parameters for a PDH interface.
Set the parameters for an IF interface.
Set the parameters for a digital interface.
Set the parameters for an Outdoor unit (ODU) interface.
Set overhead interfaces, including:
−
Orderwire
−
Broadcast data port
Query and set the overhead including: −
Regenerator section overhead (J0).
−
Lower order path overhead (V5, J2)
−
VC4 higher order path overhead (J1, C2) and its pass-through or termination.
−
VC3 higher order path overhead (J1, C2).
Enable IEEE-1588 overhead bytes.
Support PRBS.
Support the feature of packet-based microwave. You can configure a microwave interface in terms of basic and advanced attributes, IF attributes, and Layer-2 and Layer-3 attributes.
Support the ability to configure the long and short serial numbers for an MP group.
Configuration for RTN Service and Protection By using the U2000, a user can perform the following operations:
Configure VC12, VC3, or VC4 services.
Convert between an SNCP service and a normal service.
Modify attributes of SNCP services.
Perform SNCP protection switching.
Support 1+1 linear MSP, 1:N (N no larger than 3) linear MSP.
Support the N+1 protection.
Support IF 1+1 protection.
Support the REG configuration.
Support MSP rings.
Support the XPIC feature.
Configuration for Ethernet Interfaces and Services By using the U2000, a user can perform the following operations:
Issue 03 (2010-11-02)
Configure Ethernet internal interfaces, including: −
TAG attributes
−
Encapsulation/mapping
−
Network attributes
−
Link capacity adjustment scheme (LCAS)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
7-3
7 RTN Network Feature Management −
iManager U2000 Unified Network Management System Product Description
Bound path
Configure external ports of Ethernet interface, including: −
Basic attributes
−
Flow control
−
TAG attributes
−
Network attributes
−
Advanced attributes.
Configure Jumbo frame.
Configure QinQ Type area.
Configure Ethernet private line (EPL) services.
Configure EVPL (QinQ) services.
Configure Ethernet private LAN (EPLAN) services. You can create a new virtual bridge (VB) and configure the following: service mount, VLAN filtering, VLAN unicast, disable MAC address, bound path, self-learning MAC address, and VLAN MAC address table capacity.
Configure Ethernet virtual private LAN (EVPLAN) services.
Test frame receiving and transmitting on Ethernet boards.
Configure quality of service (QoS), including:
−
Flow configuration
−
CAR configuration
−
CoS configuration
−
Port shaping configuration
−
Board shaping configuration
Configure Ethernet Layer-2 switching, including: −
Aging time
−
Spanning tree
−
IGMP snooping protocol.
Support the ability to diagnose protocol faults and restore protocols.
Configure point-to-point LPT management and point-to-multipoint LPT management.
Configure Ethernet intra-board LAG.
Configure Ethernet Ring Protection.
Configure the RMON performance functions such as browsing history groups of Ethernet ports, collecting performance statistics of a group, setting an alarm group of Ethernet ports, and setting a history control group.
Clock Configuration By using the U2000, a user can perform the following operations:
7-4
Query the clock synchronization status.
Set system clock source priority list.
Set clock source switching, including: −
Clock source restoration parameters
−
Clock source switching condition
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description −
7 RTN Network Feature Management
Clock source switching
Configure clock subnets, including: −
Clock subnet
−
Clock quality
−
Synchronization status message (SSM) output control
−
Clock ID status
Set 2 Mbit/s phase-locked source external clock attributes.
Set the priority table of NE clock sources and query the currently-traced clock source.
IEEE 1588 Packet Clock By using the U2000, a user can perform the following operations:
Configure the selection mode of a frequency source.
Set the PTP system time.
Configure a PTP clock subnet.
Configure a PTP clock service.
Set the WTR time for a PTP clock source.
Set the PTP clock source priority.
Ethernet OAM Management By using the U2000, a user can configure the 802.1 ag Ethernet OAM as follows:
Support maintenance domain (MD), maintenance association (MA), maintenance end point (MEP), and maintenance intermediate point (MIP).
Perform CC check.
Perform LB check.
Perform LT check.
Perform Ping test.
Perform Performance detect.
By using the U2000, a user can configure the 802.3 ah Ethernet OAM as follows:
Support OAM self-loop detection.
Enable OAM automatic discovery.
Support link event notification and support the adjustment of the OAM error frame monitoring threshold.
Perform remote loopback.
IS-IS Protocol Configuration The U2000 uses the intermediate system-to-intermediate system (IS-IS) protocol as the protocol of the network control plane, and provides the following configuration functions:
Configure an IS-IS protocol instance.
Enable the IS-IS protocol for a port.
Import routes.
Configure link TE information.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
7-5
7 RTN Network Feature Management
iManager U2000 Unified Network Management System Product Description
OSPF Protocol Configuration The U2000 uses the open shortest path first (OSPF) protocol as the protocol of the network control plane, and provides the following configuration functions:
Configure an OSPF protocol instance.
Enable the OSPF protocol for a port.
Import routes.
Configure the TE information about a link.
MPLS Signaling Protocol Configuration The U2000 supports configuring the following two signaling protocols:
RSVP-TE protocol. Resource reservation protocol-traffic engineering (RSVP-TE) is derived from the RSVP protocol. The RSVP protocol is a type of QoS protocol. The RSVP protocol reserves resources for specific services in a network to ensure the service quality. As the TE is generated, RSVP is extended accordingly to support LSP creation and to realize TE.
LDP protocol. Label distribution protocol (LDP) is a control and signaling protocol of multi-protocol label switching (MPLS).
PTN equipment supports using the RSVP-TE protocol to create dynamic LSP connection and using the LDP protocol to create PW connection.
Static Route Management Configuration The U2000 supports configuring the static route management.
Address Parse Configuration The U2000 supports configuring the address parse.
LAG Configuration Link aggregation group (LAG) aggregates multiple Ethernet physical links to form a logical link of faster rate for transmitting data. This function improves the link availability and increases link capacity. The U2000 supports configuring the following LAG attributes:
Configure the load sharing type, including sharing and non-sharing.
Configure the LAG type, including manual and static.
Configure the service distribution algorithm of the LAG.
Configure the port priority and system priority of the LAG.
BFD Configuration Bidirectional forwarding detection (BFD) can be used to check the Ethernet link status. BFD is a simple Hello protocol. It is similar to the neighbor check of those famous protocols in many aspects. A pair of systems periodically sends detection packets on the channel on which session between the two systems is created. If a system does not receive any detection
7-6
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
7 RTN Network Feature Management
packet from the opposite end in a specific time, the system regards that a failure occurs in some part of the bidirectional channel to the adjacent system.
QoS Configuration Quality of service (QoS) indicates the performance of the data flow that travels through a network. The QoS is used to ensure end-to-end service quality. The QoS cannot increase the bandwidth, but it can minimize the delay and jitter in the network by reasonably allocating and monitoring network resources. In this way, the quality of important services is ensured. The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServ function, that is, DS nodes. In a DS domain, all DS nodes use the same service provision policy to realize the same per-hop behavior (PHB). The DS nodes are classified into edge DS nodes and internal DS nodes. The edge DS nodes usually perform complex flow classification on the traffic that enters the DS domain. Traffic of different types is marked with different PHB service types. For internal DS nodes, you need to perform only simple flow classification based on PHB service type. The U2000 supports the following QoS functions:
Configure Diffsever domains.
Configure ATM CoS mapping.
Configure simple flow classification and complex flow classification.
Configure CAR and Shaping.
Configure the color blindness mode.
Configure the WFQ schedule policy.
Configure the port WREQ schedule policy.
To simplify the operation and share some common QoS configuration parameters, the U2000 supports creating QoS function point policy. The function point policies are as follows: port policy, ATM policy and V-UNI ingress policy. By using these function point policies, you can bind the CAR configuration attribute, shaping configuration attribute, flow classification configuration attributes, WFQ schedule policy and WRED policy attributes.
MPLS Tunnel Configuration The MPLS tunnel is the tunnel defined in the MPLS protocol. Independent from the service, the MPLS tunnel realizes end-to-end transmission and carries the PWs related to the service. The U2000 supports configuring the following functions of the MPLS tunnel on a per-NE basis:
Configure basic attributes of the MPLS.
Configure static unicast MPLS tunnels.
Create forward and backward MPLS tunnels at the same time.
Create the E-LSP.
Manage PWs.
Manage Tunnel labels and PW labels.
MPLS Tunnel Protection Group Configuration The U2000 provides the following functions of configuring an MPLS tunnel protection group:
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
7-7
7 RTN Network Feature Management
iManager U2000 Unified Network Management System Product Description
Create an MPLS tunnel 1+1 protection group and an MPLS tunnel 1:1 protection group, containing the switching mode, revertive mode, wait-to-restore (WTR) time, and hold-off time.
Perform MPLS tunnel protection switching.
Query the protection switching status of an MPLS tunnel.
PWs with UDP Encapsulation. The U2000 supports the PWs with UDP encapsulation that are carried in IP tunnels.
IP Tunnel and GRE Tunnel Configuration If the equipment at the two ends of an IP network does not support MPLS tunnel, PWE3 services can pass through the IP network by using the IP tunnel or GRE tunnel. IP tunnel and GRE tunnel mainly applies to the Offload scenarios of mobile communication. The U2000 supports configuring bidirectional IP tunnels and GRE tunnels on a per-NE basis. The U2000 supports the Offload protection between MPLS and GRE tunnels.
CES Service Configuration CES is mainly used for service transparent transmission of TDM trail switching data in the packet transport network (PTN). The U2000 provides the following configuration functions for CES service creation:
Create the corresponding PW when creating a CES service.
Create UNI-UNI and UNI-NNI CES services.
Create CES services of structure-aware TDM circuit emulation service over packet switched network (CESoPSN) and of structure-agnostic TDM over packet (SAToP).
Configure QoS of the CES service.
Configure idle timeslot recovery value.
Support to carry the CES service by IP/GRE Tunnel.
ATM Service Configuration ATM emulation service is mainly used to transparently transmit ATM services in the PTN. The U2000 provides the following configuration functions for ATM service creation:
7-8
Create an ATM service that contains multiple ATM connections.
Create UNI-UNI and UNIs-NNI ATM services.
Create PVP and PVC ATM services.
Create the corresponding PW when creating an ATM service.
Configure the IMA group.
Configure QoS of the ATM service.
Configure the CoS mapping.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
7 RTN Network Feature Management
E-Line Service Configuration The E-line service is a point-to-point Ethernet service. The equipment transmits user packets from the user side to the network side based on Port or Port+VLAN. In this way, user data can be transparently transmitted in a point-to-point manner. The U2000 supports the following functions of configuring E-line services on a per-NE basis:
Create UNI-UNI E-Line services.
Create UNI-NNI E-Line services that are carried on ports.
Create UNI-NNI E-Line services that are carried on PWs.
Create UNI-NNI E-Line services that are carried on QinQ links.
Configure the service and the QoS of the corresponding PW when creating an L2VPN service.
Configure the V-UNI group.
E-Aggr Service Configuration The E-Aggr service is a multipoint-to-point Ethernet service. The equipment uses several ports to access services from the V-UNI side, and converges the services into one PW at the network side for transmission. In this way, user data from multiple points can be converged into one point. The U2000 supports the following functions of configuring E-Aggr services on a per-NE basis:
Configure the VLAN forwarding table items of an E-Aggr service.
Configure the service and the QoS of the corresponding PW when creating an E-Aggr service.
Configure the V-UNI group.
MPLS OAM Configuration MPLS OAM is an OAM function of the MPLS network. This function can check the quality of LSPs in an MPLS network. The MPLS OAM scheme can effectively check, acknowledge, and locate a defect inside the network at the MPLS layer. It can report and handle a defect. When a fault occurs, the MPLS OAM provides trigger scheme of protection switching. The U2000 provides the following functions of configuring MPLS OAM:
Configure MPLS OAM parameters of a tunnel.
Perform CV/FFD check.
Perform LSP ping check.
Perform PW ping check.
Perform LSP traceroute check.
ATM OAM Configuration ATM OAM is an end-to-end OAM function for ATM services. This function can check the quality of ATM links that pass through multiple NEs. The ATM OAM function checks an ATM link by inserting some OAM cells of the standard cell structure to the user cell flow. The U2000 provides the following functions of configuring ATM OAM:
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
7-9
7 RTN Network Feature Management
Set segment end attributes.
Perform CC activation test.
Perform remote loopback.
Set LLID.
iManager U2000 Unified Network Management System Product Description
7.2 RTN Protection Subnet Management A protection subnet is a network structure with the comprehensive self-protection function. To perform protection subnet management, you need to have the related license. By using the U2000, you can perform the following operations:
Create an RTN protection subnet.
IF_1+1 protection subnet
IF_N+1 protection subnet
Manage RTN protection subnets.
Set the parameters for a protection subnet.
Query the switching status of a protection subnet.
Query and delete a protection subnet.
Query protection subnet resources.
7.3 End-to-End RTN Management End-to-end network management is also referred to as trail management. You can construct the configuration data of the end-to-end network management by searching for the data at the NE layer of the U2000, or directly configure the data at the network layer of the U2000, and apply the data to all the related NEs. Compared with configuring NE data on a per-NE basis, configuring NE data by using the trail management function is faster and more convenient. To perform end-to-end network management, you need to have the related license. By using the U2000, you can perform the following operations:
7-10
Create and maintain an RTN trail. −
Create a PDH microwave trail.
−
Create a PDH microwave trail.
−
Activate and deactivate an RTN trail.
Manage the alarms and performance events related to an RTN trail. −
Query current and history alarms, current and history performance data, UAT and performance threshold-crossing records of an RTN trail.
−
Set the performance parameters for an RTN trail.
−
Query the RTN trails and customer information affected by an alarm.
Filter trails in three ways. −
Filter all: Filter all trails and only display the qualified trails in a network.
−
Secondary filter: Filter those trails that are already displayed according to the filter criteria. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description −
7 RTN Network Feature Management
Incremental filter: Filter the newly added trails and display the newly qualified trails together with the currently displayed ones.
Network-Wide Clock Topology Management
Supporting the 1588 V2, SDH, and synchronous Ethernet clocks.
Displaying clock trace relationship.
Displaying clock alarm status.
PWE3 Service Management By using the U2000, you can perform the following operations:
Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.
Pre-deploy a PWE3 service.
Implement the function of automatically discovering PWE3 services.
Modify and delete PWE3 services, and filter PWE3 services to view the desired services.
Manage multi-hop PWE3 services.
Implement the protection management of PWE3 services.
View the topology of PWE3 services.
View the alarms of a PWE3 service.
View the performance of a PWE3 service.
Test and check a PWE3 service.
Manage discrete PWE3 services.
Manage PWE3 services based on rights and domains.
Clone a PWE3 service.
Manage PWE3 service templates.
Implement the function of automatically generating Ethernet OAM for PWE3 services.
Tunnel Management By using the U2000, you can perform the following operations:
Create static tunnels.
Pre-deploy a tunnel.
Implement the function of automatically discovering tunnels.
Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
View the topology of tunnels, including the working and protection routes.
View the alarm of a tunnel.
View the performance of a tunnel.
Test and check a tunnel.
Manage discrete tunnels.
Manage BGP/MPLS VPN tunnels.
Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the function of automatically discovering 1+1 or 1:1 tunnel protection groups.
Switch services in a 1+1 or 1:1 tunnel protection group manually.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
7-11
7 RTN Network Feature Management
iManager U2000 Unified Network Management System Product Description
Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection groups.
7.4 End-to-End RTN IP Management There is the IP feature in RTN equipment. You can build the configuration data of end-to-end RTN IP network management by searching for the data at the NE layer of the U2000, or directly configure the data at the network layer of the U2000, and apply the data to all the relevant NEs. Configuring NE data by using the trail management function is faster and more convenient compared with configuring NE data on a per-NE basis. To perform end-to-end network management by using the U2000, you need to have the required license.
PWE3 Service Management By using the U2000, you can perform the following operations:
Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.
Pre-deploy a PWE3 service.
Implement the function of automatically discovering PWE3 services.
Modify and delete PWE3 services, and filter PWE3 services to view the desired services.
View the topology of PWE3 services.
View the alarms of a PWE3 service.
View the performance of a PWE3 service.
Manage discrete PWE3 services.
Manage PWE3 services based on rights and domains.
Copy a PWE3 service.
Implement the function of automatically generating Ethernet OAM for PWE3 services.
Tunnel Management By using the U2000, you can perform the following operations:
7-12
Create static CR, RSVP, and IP tunnels.
Create RSVP tunnels in batches.
Pre-deploy a tunnel.
Implement the function of automatically discovering tunnels.
Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
View the topology of tunnels.
View the alarm of a tunnel.
View the performance of a tunnel.
Manage discrete tunnels.
Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the function of automatically discovering 1+1 or 1:1 tunnel protection groups.
Switch services in a 1+1 or 1:1 tunnel protection group manually.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Issue 03 (2010-11-02)
7 RTN Network Feature Management
Implement the function of displaying the topology of 1+1 or 1:1 tunnel protection groups.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
7-13
iManager U2000 Unified Network Management System Product Description
8
8 PTN Network Feature Management
PTN Network Feature Management
About This Chapter This topic describes the functional features of PTN NE management and network management. 8.1 PTN NE Management NE management refers to the management of configurations of an NE in terms of attributes, communication, services, protection, and clocks. The configuration object is a single NE. 8.2 End-to-End PTN Management End-to-end network management is trail management. You can build the configuration data of end-to-end network management by searching for the data at the NE layer of the U2000, or directly configure the data at the network layer of the U2000, and apply the data to all the relevant NEs. Configuring NE data by using the trail management function is faster and more convenient compared with configuring NE data on a per-NE basis.
8.1 PTN NE Management NE management refers to the management of configurations of an NE in terms of attributes, communication, services, protection, and clocks. The configuration object is a single NE.
Basic NE Configuration By using the U2000, a user can perform the following operations:
Issue 03 (2010-11-02)
Modify NE attributes such as: −
NE name
−
NE ID
−
NE extended ID
−
Remarks
−
NE pre-configuration
Synchronize NE time: Align all NEs with the system time of the U2000 server. You can set the U2000 to automatically synchronize the NE time by specifying the automatic synchronization period.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
8-1
8 PTN Network Feature Management
iManager U2000 Unified Network Management System Product Description
Support the board plug and display feature: After a board is inserted to the slot, the NE Panel automatically displays the board and board information.
Disable NE functions automatically: You can set to periodically disable certain NE functions that may affect services, such as loopback and ALS. When the time expires, these operations automatically stop.
Support environment monitoring information.
Support the board replacement function.
Configure NE Alarm Attribute
Configure alarm severity and auto reporting.
Configure alarm saving mode, reversion mode and alarm correlation.
Configure alarm suppression.
Configure AIS insert switch.
Configure alarm reversion.
Configure NE Performance Attribute
Configure NE performance monitoring time.
Configure RMON performance.
Query board current performance, history performance and UAT event.
Reset board performance register.
Configure board performance monitor status.
Configure board performance threshold.
Configure NE Security Attribute
Support NE user management.
Support NE login management.
Configure LCT Access control.
Support NE user group management.
Support Online user management.
Configure NE security parameters.
Query NE security log.
Configure ACL.
Service Interface Types Configuration You can configure the basic, Layer-2, or Layer-3 attributes for an interface to specify the working mode and application scenario of the interface. Basic attributes are physical attributes of the interface. Layer-2 attributes are data link layer attributes of the interface, such as ATM attribute, VLAN attribute, and QinQ attribute. Layer-3 attributes are network layer attributes of the interface, such as the IP attribute. Table 8-1 lists the PTN service interface types that the U2000 supports.
8-2
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
8 PTN Network Feature Management
Table 8-1 Types of PTN service interfaces Service Interface
Supported Port Mode/Encaps ulation Type
Port Type
MP Group Supported or Not
Function
SDH interface
General attributes
Physical port
Not supported
Sets together with the Layer 3 attributes or connects to the equipment as the channelized STM service interface.
Layer 2 attributes
Physical port
Not supported
This interface can carry the ATM services.
Layer 3 attributes
Physical port
Not supported
This interface can carry tunnels after the PPP is enabled.
General attributes
Physical port
Not supported
This interface can carry the TDM services.
Layer 2 attributes
Physical port
Not supported
Carries the IMA signals.
Layer 3 attributes
Physical port
Supported
This interface can be added into a multilink PPP (MP) group after the PPP is enabled.
General attributes
None
None
Sets together with the Layer 2 and Layer 3 attributes.
Layer 2 attributes
Physical port
Not supported
Carries the user-side or network-side Ethernet services.
Layer 3 attributes
Physical port
Not supported
Carries tunnels.
General attributes
Logical port
Not supported
Sets together with the Layer 2 and Layer 3 attributes.
PDH interface
Ethernet interface
Ethernet Virtual interface
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
8-3
iManager U2000 Unified Network Management System Product Description
8 PTN Network Feature Management
Service Interface
Supported Port Mode/Encaps ulation Type
Port Type
MP Group Supported or Not
Function
Layer 2 attributes
Logical port
Not supported
Carries the Ethernet services for VLAN Sub Interface.
Layer 3 attributes
Logical port
Not supported
EOA Virtual Interface: carries the IP or GRE tunnels.
VLAN Sub Interface: applies to the BFD, L3VPN or Tunnel
ADSL interface
General attributes
Physical port
-
Carries the ADSL signals
G.SHDSL interface
General attributes
Physical port
-
Carries the G.SHDSL signals
Serial interface
General attributes
None
None
Sets together with the Layer 3 attributes.
Layer 3 attributes
Logical port
Supported
This interface can be added to an MP group after the PPP is enabled.
General attributes
None
None
Sets together with the IP attributes.
Layer 3 attributes
Logical port
None
Carries tunnels.
MP Group
IMA Group Configuration By using the U2000, you can perform the following operations:
8-4
Bind ports.
Manage IMA groups.
Query the status of an IMA group.
Query the status of an IMA link. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
8 PTN Network Feature Management
Manage ATM ports.
Microwave Interface Configuration By using the U2000, you can perform the following operations:
Configure a microwave interface in terms of basic and advanced attributes, IF attributes, and Layer-2 and Layer-3 attributes.
Configure a radio link, including the IF 1+1 protection, IF boards, and ODU boards.
Configure HOP Management.
IS-IS Protocol Configuration The U2000 uses the intermediate system-to-intermediate system (IS-IS) protocol as the protocol of the network control plane, and provides the following configuration functions:
Configure node attributes.
Configure port attributes.
Import routes.
Configure link TE information.
Configure GR Session.
Configure route aggregation.
OSPF Protocol Configuration The U2000 uses the open shortest path first (OSPF) protocol as the protocol of the network control plane, and provides the following configuration functions:
Configure node attributes.
Configure port attributes.
Configuring peer attributes.
Import routes.
Configure link TE information.
Configure route aggregation.
MP-BGP Protocol Configuration By using the internal border gateway protocol (IBGP), the U2000 implements L3VPN functions and provides the following configuration functions:
Configuring MP-BGP instance.
Configuring MP-BGP Peer.
Configuring route filtering policy.
LDP Protocol Configuration By using the label distribution protocol (LDP), the U2000 creates LSP connections and PW connections and provides the following configuration functions:
Configuring MPLS-LDP peer entities.
Configuring node attributes.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
8-5
8 PTN Network Feature Management
iManager U2000 Unified Network Management System Product Description
Configuring port attributes.
Configuring IP address filtering table.
Configuring routing policy.
Configuring label policy.
RSVP Protocol Configuration By using the resource reserved protocol (RSVP), the U2000 creates LSP connections and provides the following configuration functions:
Configure node attributes.
Configure port attributes.
Static Route Management Configuration The U2000 supports the function of configuring the static route management.
Address Parse Configuration The U2000 supports configuring the address parse.
Routing Policy Configuration The U2000 supports configuring routing policy.
Clock Configuration The U2000 supports configuring various clock mode.
Configuration the clock domain.
Query the clock synchronization status.
IEEE 1588 Packet Clock
8-6
−
Configure clock service.
−
Configure clock synchronization attribute.
−
Configure clock source priority table.
−
Configure clock subnet.
−
Configure external interface.
TOP Packet Clock Configuration −
Configure clock services.
−
Select a differential clock source.
ACR Clock Configuration −
Configure CES ACR or 1588 ACR clock.
−
Configure ACR clock protection.
Physical Clock Configuration −
Query the clock synchronization status.
−
Set clock source priority tables, including:
−
System clock source priority list
−
Priority table for phase-locked sources of 1st external clock output Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
8 PTN Network Feature Management
−
Priority table for phase-locked sources of 2nd external clock output
−
Configure clock subnets, including:
−
Clock subnet
−
Clock quality
−
SSM output control
−
Clock ID status
−
Set phase-locked sources output by external clock, including:
−
External clock output phase-locked source
−
2 Mbit/s phase-locked source external clock attributes
Board-Level Protection Configuration By using the U2000, a user can perform the following operations:
Configure TPS protection of a sub-board.
Configure board 1+1 protection for the SCC and cross-connect boards.
Check the switching status.
Perform protection switching.
LAG/MC LAG Configuration A LAG aggregates multiple Ethernet physical links to form a logical link of faster rate for transmitting data. This function improves the link availability and increases link capacity. The MC LAG supports the ability to share load between aggregation group devices. The U2000 supports configuring the following LAG/MC LAG attributes:
Configure the load sharing type, including sharing and non-sharing.
Configure the LAG type, including manual and static.
Configure the load sharing hash algorithm of the LAG.
Configure the port priority and system priority of the LAG.
MSTP Configuration The MSTP can be used to clear loops in a network. The MSTP uses a specific algorithm to block some redundant trails and change a loop network to a non-loop tree network. This function prevents packet increase in a loop network and generation of broadcast storms in an endless cycle. Different from the STP and RSTP, the MSTP can forward data according to VLAN packets and realize load balance of VLAN data. The U2000 supports configuring the following MSTP attributes:
Configure parameters of port groups and bridges.
Configure CIST and MSTI parameters.
Query CIST status and MSTI status.
IGMP Snooping Configuration IGMP Snooping is the multicast constraint scheme that runs on the Layer-2 equipment, and is used to manage and control multicast groups.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
8-7
8 PTN Network Feature Management
iManager U2000 Unified Network Management System Product Description
The U2000 supports the ability to configure IGMP snooping for E-LAN services and provides the following functions:
Configure IGMP Snooping protocol parameters.
Configure quick leave ports.
Manage routes.
Configure route member ports.
Query statistic information of IGMP protocol packets.
BFD Configuration Bidirectional forwarding detection (BFD) can be used to check the Ethernet link status. BFD is a simple Hello protocol. It is similar to the neighbor check of those famous protocols in many aspects. A pair of systems periodically sends detection packets on the channel on which session between the two systems is created. If a system does not receive any detection packet from the opposite end in a specific time, the system regards that a failure occurs in some part of the bidirectional channel to the adjacent system. The U2000 supports the functions of performing the BFD detection on IP/GRE tunnels and the inter gateway protocol (IGP). The U2000 supports configuring single-hop or multi-hop BFD detection.
LPT Configuration LPT is used to return the remote-end link status to the near end. The near-end equipment performs operations depending on the remote-end link status. When the intermediate transmission network of the services becomes faulty, the LPT informs the access equipment at both ends of the transmission network to enable the backup network. That ensures the normal transmission of the important data.
Synchronization Protocol Configuration In the application scenario of dual-homing, the status of the peer equipment needs to be obtained either for the MC LAG or for the cross-MC LMSP. Meanwhile, the actions on both sides need to be negotiated based on different fault cases. With the method of adding information of the peer end, a channel is established for control status synchronization with the peer end. In this manner, the control packets can be transmitted and received through the channel and link fault detection can be performed.
LMSP/MC LMSP Configuration Linear MSP protection contains 1+1 linear MSP and 1:N linear MSP. They use the protection channel to protect services that are transmitted on the working channel. When the working channel fails, services are switched to the protection channel. The linear MSP applies to the POS interface and structured STM interface. The multi-chassis (MC) LMSP can implement the LMSP among NEs. The U2000 supports the following functions of LMSP/MC LMSP configuration:
8-8
Create a linear MSP.
Check the linear MSP switching status.
Perform linear MSP switching. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
8 PTN Network Feature Management
QoS Configuration QoS indicates the performance of the data flow that travels through a network. The QoS is used to ensure end-to-end service quality. The QoS cannot increase the bandwidth, but it can minimize the delay and jitter in the network by reasonably allocating and monitoring network resources. In this way, the quality of important services is ensured. The DiffServ (DS) domain consists of a group of network nodes that enable the DiffServ function, that is, DS nodes. In a DS domain, all DS nodes use the same service provision policy to realize the same per-hop behavior (PHB). The DS nodes are classified into edge DS nodes and internal DS nodes. The edge DS nodes usually perform complex flow classification on the traffic that enters the DS domain. Traffic of different types is marked with different PHB service types. For internal DS nodes, you need to perform only simple flow classification based on PHB service type. The U2000 supports the following QoS functions:
Configure QoS profile.
Configure DiffServ domains.
Configure ATM CoS mapping.
Configure SVLAN DEI used flag.
Configure simple flow classification and complex flow classification.
Configure CAR and Shaping.
Configure the color blindness mode.
Configure the WFQ schedule policy.
Configure the port WRED schedule policy.
Configure the port WFQ policy.
Configure the service WRED policy.
To simplify the operation and share some common QoS configuration parameters, the U2000 supports creating QoS function point policy. The function point policies are as follows: port policy, ATM policy, V-UNI ingress policy, V-UNI egress policy, PW policy and QinQ policy. By using these function point policies, you can bind the CAR configuration attribute, shaping configuration attribute, flow classification configuration attributes, WFQ schedule policy, WRED policy and color blindness mode attributes.
Configure CoS queue mapping.
Supports the application of the QoS policy to multiple NEs.
MPLS Tunnel Configuration The MPLS tunnel is the tunnel defined in the MPLS protocol. Independent from the service, the MPLS tunnel realizes end-to-end transmission and carries the PWs related to the service. See Figure 8-1. Unicast MPLS tunnel is mainly used to transparently transmit point-to-point PWE3 services.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
8-9
8 PTN Network Feature Management
iManager U2000 Unified Network Management System Product Description
Figure 8-1 Unicast MPLS tunnel
The U2000 supports configuring the following functions of the MPLS tunnel on a per-NE basis:
Configure basic attributes of the MPLS.
Configure static unicast MPLS tunnels.
Create forward and backward MPLS tunnels at the same time.
Create bidirectional MPLS Tunnel.
Create the E-LSP and L-LSP.
Manage PWs.
Manage tunnel labels and PW labels.
Query the PWs that a tunnel carries.
MPLS Tunnel Protection Group Configuration The U2000 provides the following functions of configuring an MPLS tunnel protection group:
Create an MPLS tunnel 1+1 protection group and an MPLS tunnel 1:1 protection group, containing the switching mode, revertive mode, wait-to-restore (WTR) time, and hold-off time.
Perform MPLS tunnel protection switching.
Query the protection switching status of an MPLS tunnel.
MS PW Configuration By creating multi step (MS)-PW to transmit services, you can save tunnel resources and transmit services over different networks.
8-10
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
8 PTN Network Feature Management
UDP-Encapsulated PW Configuration The U2000 supports the UDP-encapsulated PWs that are carried in IP tunnels.
PW APS/MC PW APS Configuration As a network protection mechanism, PW automatic protection switching (APS) is intended to protect the services on the working PW with a protection PW. That is, when the working PW is faulty, the services on the working PW are switched to the protection PW. In this manner, the services on the working PW are protected. By using the MC PW APS function, you can implement the PW APS protection among NEs. You can perform the following PW APS/MC PW APS functions on a per-NE basis:
Create a protection group.
Bind the master and slave protection pairs.
IP Tunnel and GRE Tunnel Configuration If the equipment at the two ends of an IP network does not support MPLS tunnel, PWE3 services can pass through the IP network by using the IP tunnel or GRE tunnel. IP tunnel and GRE tunnel mainly applies to the Offload scenarios of mobile communication. The U2000 supports configuring bidirectional IP tunnels and GRE Tunnels on a per-NE basis. Query the PWs that a tunnel carries.
Dual-Homing Protection Configuration The two sets of PE equipment, that is, dual-homing nodes, are connected to the same CE equipment through the corresponding attachment circuits (ACs). In this case, the services that are received on the PE nodes at the two end of a carrier network can be protected. This is the dual-homing protection. You can configure the following types of dual-homing protection for ATM and CES services.
1:1 MC-PW APS and 1:1 MC-LMSP
1:1 MC-PW APS and 1+1 MC-LMSP
1:1 PW redundancy and 1:1 MC-LMSP
1+1 PW redundancy and 1+1 MC-LMSP
You can configure the following types of dual-homing protection for E-line services.
1:1 MC-PW APS and MC-LAG
1:1 PW redundancy and MC-LAG
You can configure dual-homing protection for E-LAN services through the MAC address withdrawal and MC-LAG.
CES Service Configuration CES is mainly used for service transparent transmission of TDM trail switching data in the PTN network.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
8-11
8 PTN Network Feature Management
iManager U2000 Unified Network Management System Product Description
See Figure 8-2. The 2G/3G stations or Intranet line accesses the PTN equipment by using the E1/ channelized STM-1 line. The equipment divides the E1 signals into pieces, encapsulates the pieces into the Ethernet, and transmits the E1 signals to the opposite end by using the PW. Figure 8-2 CES service application model
The U2000 provides the following configuration functions for CES service creation:
Create the corresponding PW when creating a CES service.
Create UNI-UNI and UNI-NNI CES services.
Create CES services of structure-aware TDM circuit emulation service over packet switched network (CESoPSN) and of structure-agnostic TDM over packet (SAToP).
Configure QoS of the CES service.
Configure idle timeslot recovery value.
Configure CES service alarm transparent transmission.
Select the tunnel where a PW is carried online.
ATM Service Configuration ATM emulation service is mainly used to transparently transmit ATM services in the PTN. See Figure 8-3. The 3G station accesses the PTN equipment by using the ATM IMA group. The equipment encapsulates the ATM cells into the Ethernet, and transmits the ATM cells to the opposite end by using the PW.
8-12
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
8 PTN Network Feature Management
Figure 8-3 ATM service application model
The U2000 provides the following configuration functions for ATM service creation:
Create UNI-UNI and UNIs-NNI ATM services.
Create PVP, PVC and transparent ATM services.
Create the corresponding PW when creating an ATM service.
Configure the IMA group.
Configure QoS of the ATM service.
Configure the CoS mapping.
Select the tunnel where a PW is carried online.
E-Line Service Configuration The E-line service is a point-to-point Ethernet service. The equipment transmits user packets from the user side to the network side based on Port or Port+VLAN. In this way, user data can be transparently transmitted in a point-to-point manner. See Figure 8-4. Company A has branches in City 1 and City 3. Company C has branches in City 1 and City 2. Branches of Company A or Company C that are in different cities have data communication requirements. The PTN equipment can provide E-line services for Company A and Company C, to meet their communication requirements. In addition, the service data can be completely isolated.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
8-13
8 PTN Network Feature Management
iManager U2000 Unified Network Management System Product Description
Figure 8-4 E-Line Service
The U2000 supports the following functions of configuring E-line services on a per-NE basis:
Create UNI-UNI E-Line services.
Create UNI-NNI E-Line services that are carried on ports.
Create UNI-NNI E-Line services that are carried on PWs.
Create UNI-NNI E-Line services that are carried on QinQ links.
Configure the service and the QoS of the corresponding PW when creating an L2VPN service.
Configure ETH LPT.
Configure the V-UNI group.
Select the tunnel where a PW is carried online.
E-Aggr Service Configuration The E-Aggr service is a multipoint-to-point Ethernet service. The equipment uses several ports to access services from the V-UNI side, and converges the services into one PW at the network side for transmission. In this way, user data from multiple points can be converged into one point. See Figure 8-5 and Figure 8-6. One carrier wants to construct a 3G network. Services of each Node B are converged and transported to the RNC. The data between each Node B and RNC is regarded as one service. At the convergence point, the QoS parameters such as the overall bandwidth are specified.
8-14
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
8 PTN Network Feature Management
Figure 8-5 E-Aggr service scenario 1
Figure 8-6 E-Aggr service scenario 2
The U2000 supports the following functions of configuring E-Aggr services on a per-NE basis:
Configure the VLAN forwarding table items of an E-Aggr service.
Configure the service and the QoS of the corresponding PW when creating an E-Aggr service.
Configure the V-UNI group.
Select the tunnel where a PW is carried online.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
8-15
8 PTN Network Feature Management
iManager U2000 Unified Network Management System Product Description
E-LAN Service Configuration The E-LAN is a multipoint-to-multipoint Ethernet service. It connects to multiple V-UNI and NNI access points. It realizes packet forwarding and interconnection by using the MAC address self-learning scheme of layer 2. See Figure 8-7. The HQ of Company A is in City 3. Company A has Branch A in City 1, City 2, and City 3, and has Branch B in City 1 and City 2. Branch A and Branch B do not have business with each other. Hence, the data should be isolated between the two branches. The HQ has requirements of communicating with each branch and accessing the Internet. Figure 8-7 E-LAN service
Different VLANs are used to identify service data of different branches by using the E-LAN service. In this way, data is shared within a branch and is isolated from other branches. The Internet data of the HQ is also isolated from the internal service data by using the VLAN. The U2000 supports the following functions of configuring E-LAN services on a per-NE basis:
8-16
Create E-LAN services that are carried on port.
Create E-LAN services that are carried on PWs.
Create E-LAN services that are carried on QinQ links.
Configure the service and the QoS of the corresponding PW when creating an E-LAN service.
Configure the V-UNI and NNI interfaces of an E-LAN service.
Configure the split horizon group of an E-LAN service.
Configure the V-UNI group.
Configure the MAC address learning parameters.
Configure the unknown frame processing mode.
Configure the static MAC address.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Configure the disabled MAC address.
Select the tunnel where a PW is carried online.
8 PTN Network Feature Management
Service Mirroring Configuration In the case of the service mirroring, all packets that enter a certain port are duplicated and then duplicated packets are transmitted through an observation port. In this manner, the normal service is scarcely affected when packets of the mirrored service are captured and analyzed. You can configure the service mirroring as follows:
Configure the local service mirroring.
Configure the remote service mirroring.
MPLS OAM Configuration MPLS OAM is an OAM function of the MPLS network. This function can check the quality of LSPs in an MPLS network. The MPLS OAM scheme can effectively check, acknowledge, and locate a defect inside the network at the MPLS layer. It can report and handle a defect. When a fault occurs, the MPLS OAM provides trigger scheme of protection switching. The U2000 provides the following functions of configuring MPLS OAM:
Configure MPLS OAM parameters of a tunnel.
Perform CV/FFD check.
Perform LSP ping check.
Perform PW ping check.
Perform LSP traceroute check.
Perform PW traceroute check.
The FDI can be enabled and disabled.
Ethernet Service OAM Configuration Ethernet service OAM is an end-to-end OAM function for services. This function can check the quality of Ethernet links that pass through multiple NEs. The Ethernet service OAM checks an Ethernet link by sending OAM packets. The OAM packet is handled only at the MAC layer. As a low rate protocol, the OAM protocol uses very small network bandwidth. Hence, this function does not affect services carried by the link. The U2000 provides the following functions of configuring Ethernet service OAM:
Create maintenance domains (MDs), maintenance associations (MAs), maintenance end points (MEPs), and maintenance intermediate points (MIPs).
Perform a CC check.
Perform an LB check.
Perform an LT check.
Ethernet Port OAM Configuration The Ethernet port OAM is mainly used to automatically check the connectivity and performance and locate the faults of the physical links under the MAC layer. It is applicable when the physical Ethernet ports are directly connected.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
8-17
8 PTN Network Feature Management
iManager U2000 Unified Network Management System Product Description
The U2000 provides the following functions of configuring Ethernet port OAM:
Configure OAM parameters.
Configure the OAM error frame monitoring.
Query the remote OAM parameters.
ATM OAM Configuration ATM OAM is an end-to-end OAM function for ATM services. This function can check the quality of ATM links that pass through multiple NEs. The ATM OAM function checks an ATM link by inserting some OAM cells of the standard cell structure to the user cell flow. The U2000 provides the following functions of configuring ATM OAM:
Set segment end attributes.
Perform CC activation test.
Perform remote loopback.
Set LLID.
Configure ATM alarm transmission
8.2 End-to-End PTN Management End-to-end network management is trail management. You can build the configuration data of end-to-end network management by searching for the data at the NE layer of the U2000, or directly configure the data at the network layer of the U2000, and apply the data to all the relevant NEs. Configuring NE data by using the trail management function is faster and more convenient compared with configuring NE data on a per-NE basis. To perform end-to-end network management by using the U2000, you need to have the required license.
PWE3 Service Management By using the U2000, you can perform the following operations:
8-18
Create PWE3 services of multiple types, such as ATM, CES, and Ethernet.
Pre-deploy a PWE3 service.
Implement the function of automatically discovering PWE3 services.
Modify and delete PWE3 services, and filter PWE3 services to view the desired services.
Manage multi-hop PWE3 services.
Implement the protection management of PWE3 services.
View the topology of PWE3 services.
View the alarms of a PWE3 service.
View the performance of a PWE3 service.
Test and check a PWE3 service.
Manage discrete PWE3 services.
Manage PWE3 services based on rights and domains.
Clone a PWE3 service.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
8 PTN Network Feature Management
Manage PWE3 service templates.
Implement the function of automatically generating Ethernet OAM for PWE3 services.
VPLS Service Management By using the U2000, you can perform the following operations:
Create a VPLS service.
Pre-deploy a VPLS service.
Implement the function of automatically discovering VPLS services.
Modify and delete VPLS services, and filter VPLS services to view the desired services.
View the topology of VPLS services.
View the alarms of a VPLS service.
View the performance of a VPLS service.
Test and check a VPLS service.
Manage VSI resource.
Manage VPLS services based on rights and domains.
Manage VPLS service templates.
Implement the function of automatically generating Ethernet OAM for VPLS services.
L3VPN Service Management By using the U2000, you can perform the following operations:
Create an L3VPN service that supports the BGP/MPLS protocol.
Pre-deploy an L3VPN service.
Implement the function of automatically discovering L3VPN services.
Modify and delete L3VPN services, and filter L3VPN services to view the desired services.
View the topology of L3VPN services.
View the alarms of an L3VPN service.
View the performance of an L3VPN service.
Test and check the configuration of an L3VPN service.
Manage VRF resource.
Manage L3VPN services based on rights and domains.
Manage L3VPN service templates.
Tunnel Management By using the U2000, you can perform the following operations:
Create static CR, RSVP, LDP, and IP tunnels.
Create RSVP and LDP tunnels in batches.
Pre-deploy a tunnel.
Implement the function of automatically discovering tunnels.
Modify and delete a tunnel, and filter tunnels to view the desired tunnels.
View the topology of tunnels.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
8-19
8 PTN Network Feature Management
iManager U2000 Unified Network Management System Product Description
View the alarm of a tunnel.
View the performance of a tunnel.
Test and check a tunnel.
Manage discrete tunnels.
Create, modify, and delete 1+1 or 1:1 tunnel protection groups, and implement the function of automatically discovering 1+1 or 1:1 tunnel protection groups.
Switch services in a 1+1 or 1:1 tunnel protection group manually.
Network-Wide Clock Topology Management
8-20
Supporting the 1588 V2, SDH, and synchronous Ethernet clocks.
Displaying clock trace relationship.
Displaying clock alarm status.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
9
9 Router Networks and Switch Networks Feature Management
Router Networks and Switch Networks Feature Management
About This Chapter This topic describes the functions and features of router networks and switch networks. 9.1 Router NE Management NE Configuration Management provides GUIs for you to configure and maintain NE configurations. You can directly configure devices through GUIs. 9.2
Switch NE Management
NE Configuration Management provides GUIs for you to configure and maintain NE configurations. You can directly configure devices through GUIs. 9.3 Template Management In the process of NE configuration management, you need to perform a large number of repetitive operations. With the template management function, you can quickly configure NEs in batches. 9.4 Diagnosis Management It provides easy-to-use test diagnosis functions for you to test the connectivity of networks and services. You can manually run diagnosis cases or customize test policies to let the diagnosis cases run automatically at scheduled times. 9.5 Cluster Management The Huawei Group Management Protocol (HGMP) is mainly used to solve the problems of automatic management operations and centralized management for multiple dispersed low-end and mid-range switches. 9.6 Node Redounded Management E-Trunk (Enhanced-Trunk), developed on the basis of Link Aggregation Control Protocol (LACP), is a protocol that controls and implements link aggregation among multiple sets of equipment. E-Trunk is mainly applied to a scenario where a CE is dual homed to a VPLS, VLL, or PWE3 network. In the scenario, E-Trunk can be used to protect the PEs and the links between the CE and PEs. 9.7 Report Subsystem Management
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
9-1
9 Router Networks and Switch Networks Feature Management
iManager U2000 Unified Network Management System Product Description
The report subsystem provides a complete set of convenient services. It allows you to generate, distribute, and manage reports based on the Web. The powerful report subsystem can help you to monitor, analyze, improve, and plan network performance. 9.8 VPN Service Management The U2000 provides centralized and unified management, including service deployment, service monitoring, and service diagnosis, on VPN services, namely, L3VPN service, VPLS service, and PWE3 service. 9.9 Tunnel Service Management Tunnel service management is used to plan and deploy services on the entire MPLS network. Carriers can plan, deploy, audit, and monitor end-to-end LSPs through tunnel service management, thus reducing the costs of operating and maintaining MPLS networks.
9.1 Router NE Management NE Configuration Management provides GUIs for you to configure and maintain NE configurations. You can directly configure devices through GUIs.
Device Management Identify the software versions of devices and adapt to different types of devices automatically.
Entity Management This function allows you to perform the following operations:
Automatically obtain the data about device entities, including frames, boards, power supplies, fans, and ports.
Refresh entity data and monitor the entity status.
Device Panel Management This function displays device entities, including frames, boards, power supplies, fans, and ports, on the device panel.
Clock Management This function supports physical clock and PTP clock.
Interface Management This function allows you to configure a variety of media interfaces, including:
9-2
Ethernet interfaces
POS interfaces
Virtual interfaces such as sub-interfaces, trunk interfaces, loopback interfaces, and virtual template (VT) interfaces
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
9 Router Networks and Switch Networks Feature Management
LLDP Management This function supports the configuration of LLDP globally or on interfaces.
Ethernet Features Management The specific functions are as follows:
Manage VLANs, such as configuring the global VLAN, port VLAN, VLAN stacking, and VLAN mapping.
Manage MAC address forwarding, such as configuring static MAC addresses, MAC address learning rules, and MAC address aging.
Manage VLAN switch.
Ethernet OAM Management To realize OAM, two standards are available: IEEE 802.1ag and IEEE 802.3ah. With IEEE 802.1ag, the U2000 can continuously monitor user services, and acknowledge and locate faults. With IEEE 802.3ah, the U2000 can monitor the user services of the last mile, and notify the related faults. The specific functions are as follows:
Manage global information.
Support IEEE 802.1ag-related functions, such as managing the configurations of the MD, MA, local MEP, remote MEP, and MIP and managing test diagnosis (including loopback, link trace, MAC ping, and MAC trace).
Support IEEE 802.3ah-related functions, such as configuring protocols, querying ports, and detecting loopbacks.
NE Channel Management This function allows you to configure and maintain various types of management channels, including:
Manage local users
Configure VTYs
Configure the Telnet and FTP service
Configure log services
Configure alarm services
Configure SSH services
Configure NAP services
QoS Management The specific functions are as follows:
Manage the configurations of traffic classifications, traffic behaviors, and traffic policies.
Manage the configurations of interface QoS and system QoS.
Configure DS domain policies.
Manage the configurations of mirrored traffic and mirrored ports.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
9-3
9 Router Networks and Switch Networks Feature Management
iManager U2000 Unified Network Management System Product Description
Manage the configurations of HQoS, including the discard policy, HQoS flow queue policy, HQoS flow queue mapping, HQoS scheduler, and HQoS user scheduling.
Route Management This function allows you to configure the static routes, routing information, routing policy, public network and private network of BGP routes, IS-IS routes, and OSPF routes.
MPLS Management This function supports NE-level MPLS management, including:
Enable MPLS-related protocols.
Configure MPLS TE tunnel.
Set MPLS interface parameters.
Configure static LSPs.
Configure MPLS OAM detection and protection groups.
ACL Management This function allows you to configure ACLs on network devices and perform specific access control.
BRAS Management This function supports the broadband remote access service (BRAS) features of multi-service gateways, including:
Address pool management
Authorization, authentication and accounting (AAA) management
Domain and Point-to-Point Protocol (PPP) management
Built-in Web server management
Layer-3 Internet Service Provider (ISP) configuration management
Portal server management
VLAN management
User management
This function also allows the system to collect the statistics on domains, IP address segments, and IP addresses of the whole device in real time.
VPDN Management This function allows you to configure the Layer-2 Tunneling Protocol (L2TP) on multi-service gateways and manage L2TP tunnels.
BFD Management The specific functions are as follows:
9-4
Configure BFD attributes.
Manage BFD sessions.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
9 Router Networks and Switch Networks Feature Management
Manage BFD alarms.
Perform BFD in VRF, PW, MPLS TE, IS-IS, BGP, and physical links services.
VRRP/VGMP Management The specific functions are as follows:
Manage the configurations of the Virtual Router Redundancy Protocol (VRRP), such as configuring global VRRP attributes, interface attributes, and interface VR, and managing VRRP alarms.
Manage the configurations of the VRRP Group Management Protocol (VGMP), such as configuring global VGMP attributes, managing VGMP members, and managing VGMP alarms.
VPN Management The specific functions are as follows:
Support tunnel policies.
Support PW templates.
Manage PWs.
Manage VSIs.
Manage VRFs.
MSE Management This function enables routers to support MSE features, such as configuring MSE globally, managing AAA, managing users, and configuring interface services.
Multicast Management This function enables routers to support multicast features, such as configuring IGMP Snooping, configuring SSM Mapping, managing multicast CAC, and configuring channel group.
E-Trunk Management This function supports E-Trunk search and discovery, configure E-Trunk and member of E-Trunk.
Smart Configuration Tool This function supports import NE from other system, grammer check of CLI, template of configuration, parameter setup and batch execution, provide menu entry and integration withU2000
ANCP Management This function enables routers to support ANCP services, such as configuring global ANCP information, configuring ANCP template, and configuring access management.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
9-5
9 Router Networks and Switch Networks Feature Management
iManager U2000 Unified Network Management System Product Description
9.2 Switch NE Management NE Configuration Management provides GUIs for you to configure and maintain NE configurations. You can directly configure devices through GUIs.
Device Management This function identifies the software versions of devices and adapts to different types of devices automatically.
Entity Management This function allows you to perform the following operations:
Obtain the data about device entities, including frames, boards, power supplies, fans, and ports automatically.
Refresh entity data and monitor the entity status.
Device Panel Management This function displays device entities, including frames, boards, power supplies, fans, and ports on the device panel.
LLDP Management This function supports the configuration of LLDP globally or on ports.
Interface Management This function allows you to configure a variety of media interfaces, including:
Ethernet interfaces
POS interfaces
Virtual interfaces such as sub-interfaces, trunk interfaces, loopback interfaces, and VT interfaces
Ethernet Features Management The specific functions are as follows:
Manage VLANs.
Manage MAC address forwarding.
Isolate ports.
Detect LDT loopback.
Detect PWs.
Configure BPDU tunnels.
OAM Management
9-6
To realize the OAM, two standards are available: IEEE 802.1ag and IEEE 802.3ah. With IEEE 802.1ag, the U2000 can continuously monitor user services, and acknowledge and
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
9 Router Networks and Switch Networks Feature Management
locate faults. With IEEE 802.3ah, the U2000 can monitor the user services of the last mile, and notify the related faults.
BFD is used to detect the communication fault between forwarding engines. To be specific, BFD detects the connectivity of a data protocol on the same path between two systems. The path can either be a physical link or a logical link. The specific OAM management functions are as follows: −
Manage global information.
−
Support IEEE 802.1ag-related functions, such as managing the configurations of the MD, MA, local MEP, remote MEP, and MIP, and managing test diagnosis (including loopback, link trace, MAC ping, and MAC trace).
−
Support IEEE 802.3ah-related functions, such as configuring protocols, querying ports, and detecting loopback.
−
Configure BFD attributes, manage BFD sessions and BFD alarms, and perform BFD in VRF, PW, and VSI services.
QoS Management The specific functions are as follows:
Manage the configurations of traffic classifications, traffic behaviors, and traffic policies.
Manage the configurations of interface QoS and system QoS.
Configure DS domain policies.
Manage the configurations of mirrored traffic and mirrored ports.
Route Management This function allows you to configure the public network, routing information, routing policy, and private network of static routes, BGP routes, IS-IS routes, and OSPF routes.
MPLS Management This function supports NE-level MPLS management, including:
Enable MPLS-related protocols.
Configure MPLS TE tunnel.
Configure MPLS interface parameters.
Configure static LSPs.
Configure MPLS OAM detection and protection groups.
ACL Management This function allows you to configure ACLs on network devices and perform specific access control.
BFD Management The specific functions are as follows:
Configure BFD attributes.
Manage BFD sessions.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
9-7
9 Router Networks and Switch Networks Feature Management
iManager U2000 Unified Network Management System Product Description
Manage BFD alarms.
Perform BFD in VRF, PW, MPLS TE, VSI, and physical links services.
VRRP/VGMP Management The specific functions are as follows:
Manage the configurations of the Virtual Router Redundancy Protocol (VRRP), such as configuring the global VRRP attributes, interface attributes, and interface VR, and managing VRRP alarms.
Manage the configurations of the VRRP Group Management Protocol (VGMP), such as configuring global VGMP attributes, and managing VGMP members and VGMP alarms.
VPN Management The specific functions are as follows:
Support tunnel policies.
Support PW templates.
Manage PWs.
Manage VSIs.
Manage VRFs.
EPON Management This function supports PON interface management and ONU management.
NE Channel Management This function allows you to configure and maintain various types of management channels, including:
Configure VTYs.
Configure FTP services.
Manage local users.
Configure log services.
Configure alarm services.
Configure SSH services.
Set SNMP parameters.
DLDP Management This function supports the management on the DLDP working mode, packet authentication mode, and statistics.
MSTP Management This function supports the management on the MSTP domain, MSTP protection, and statistics.
9-8
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
9 Router Networks and Switch Networks Feature Management
DHCP Management This function supports the management on the DHCP server, DHCP relay, client address, and DHCP statistics.
Web Authentication Management This function supports the management on the Web authentication server.
Controllable Multicast Management This function supports the management on the multicast group, multicast template, and interface filtering.
Mirroring Management This function supports the management on the local/remote interface mirroring, VLAN mirroring, MAC address mirroring, flow mirroring, CPU mirroring, and CPU buffer statistics.
IP Source Guard Management This function supports the management on the static user binding table, dynamic check, and clearance of dynamic configurations.
Interface Security Management This function supports the management on the Ethernet interface security.
MAC Address Authentication Management This function supports the management on the MAC address authentication.
PPPoE+ Management This function supports the management on the PPPoE+ function.
AAA and User Management This function supports the management on the user authentication, authorization, and accounting.
9.3 Template Management In the process of NE configuration management, you need to perform a large number of repetitive operations. With the template management function, you can quickly configure NEs in batches.
Template Features Template Management provides some default configuration templates. When you reference a template, the attribute settings on the template automatically apply to the configured resource.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
9-9
9 Router Networks and Switch Networks Feature Management
iManager U2000 Unified Network Management System Product Description
A template has the following features:
Offline configuration Global templates are created in advance and saved on the U2000 instead of being created on a device. Thus, you can create global templates when devices are offline or do not exist. The creation of global templates is irrelevant to the device status.
Global validity After a global template is created, this template can take effect on all the devices managed by the U2000. It can be referenced by a type of device or none of the devices.
Little duplicate data −
After a global template is applied to a type of device, if the template data on some devices is the same, the U2000 keeps only one template data record for these devices.
−
When a device references a global template, the U2000 does not adds a record of template data. Instead, the U2000 records the reference relation between the device and global template.
A global template can be referenced by a large number of devices of the same type, which helps to reduce recorded template data and facilitate maintenance.
Main Templates The main templtes are as follows:
ACL template ACLs can be used to control the access of user packets that flow into ports. Configuring ACLs in batches simplifies the configuration of the defense against attacks on the network access side. When you configure the firewall on the network access side, you need to configure ACL matching rules, such as the restriction on a MAC address and the restriction on an IP address. If a rule needs to be applied to multiple interfaces on different routers, configuring the rule at every point is time-consuming and increases the costs of management and maintenance.
QoS template The main applications of network QoS are as follows:
−
CBQoS template, and it can be applied to interfaces on NEs in batches.
−
DS domain template, and it can be applied to interfaces on NEs in batches.
−
HQoS template, and it can be applied to interfaces on NEs in batches.
−
PQ template, and it can be applied to interfaces on NEs in batches.
−
Interface CAR template, and it can be applied to interfaces on NEs in batches.
VPN service template The service template is used to perform batch configurations for multiple devices when a VPN service is created or configured. In this manner, the efficiency of service deployment is greatly improved.
Switch EPON template When you configure multiple ONU services, you can manage ONUs uniformly by configuring templates to improve configuration efficiency.
9-10
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
9 Router Networks and Switch Networks Feature Management
9.4 Diagnosis Management It provides easy-to-use test diagnosis functions for you to test the connectivity of networks and services. You can manually run diagnosis cases or customize test policies to let the diagnosis cases run automatically at scheduled times.
Test Diagnosis Functions
This describes the test diagnosis function of the U2000. The U2000 provides test cases, such as VPLS MAC ping/traceroute, ICMP ping/traceroute, PWE3 ping/traceroute, LSP ping/traceroute, and ICMP VRF ping/traceroute, which can help you to test the network connectivity at each protocol layer.
The U2000 allows you to combine several test cases into a test suite, so that you can perform test diagnosis in batches as required. By diagnosing services layer by layer according to network protocol layers, theU2000 can quickly locate the faulty network layer. −
Application Layer DNS, DHCP, FTP, SNMP, VOIP
−
Transport Layer TCP, UDP
−
Network Layer ICMP ping/traceroute, ICMP VRF ping/traceroute, ICMP Jitter, multicast ping/trace, multicast VRF trace, MTU ping
−
Data Link layer 8021.ag MAC ping, CE ping
−
MPLS Services PWE3 ping, LSP ping, VPLS MAC ping, MAC study, mfib ping, service ping
The U2000 provides intelligent result analysis. You can manually customize the thresholds of test case indicators such as delay, jitter, and packet loss ratio in the result analysis template and the result analysis policy according to the related service level. In this manner, you can quickly determine the network status.
Test Diagnosis Management Through test diagnosis management, you can test the connectivity and QoS of a network and diagnose network faults according to the test results. Test diagnosis management helps to narrow the range of fault diagnosis and reduce the time of fault location and rectification. A test diagnosis tool consists of the following parts:
Issue 03 (2010-11-02)
Test suite −
A test suite is made up of multiple test cases. Created according to user test requests, a test case is the entity of a test tool based on the application layer, transport layer, network layer, data link layer, and MPLS services. The test suite is a group of test tools organized according to certain test scenarios.
−
You can take a test suite as a performance unit and perform all the test cases or optionally perform some test cases in the test suite. Then you can diagnose network QoS according to the parameters shown in the test results, such as delay, jitter, and packet loss ratio.
Diagnosis policy
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
9-11
9 Router Networks and Switch Networks Feature Management
iManager U2000 Unified Network Management System Product Description
The U2000 provides multiple running policies for test suites. You can run the test suite associated with a certain running policy at a specified time daily, weekly, or monthly.
Network scanning It collects network information through network synchronization and tests the connectivity of partial types links on the network. The U2000 provides real-time scanning and allows you to stop running scanning tasks. The U2000 also provides the traceroute function for you to locate faults.
History data The history data is the records of test suite operations. You can filter and query history data according to conditions such as the test suite name, test result, or test time, and export query results.
Diagnosis result analysis It provides intelligent result analysis. You can manually customize the thresholds of test case indicators such as delay, jitter, and packet loss ratio in the result analysis template and the result analysis policy according to the related service level. In this manner, you can quickly determine the network status.
9.5 Cluster Management The Huawei Group Management Protocol (HGMP) is mainly used to solve the problems of automatic management operations and centralized management for multiple dispersed low-end and mid-range switches. Cluster network management involves the following functions:
Managing cluster views
Configuring clusters
Managing cluster configuration files
Managing image programs
Locating cluster faults
The U2000 provides cluster management for the CX200/CX200D/CX300/CX380/CX600/S2300/S3300/S5300. This function allows you to manage network equipment in a more convenient and efficient manner. With this function, you can monitor the network status through the physical topology of cluster networks and reduce improper operations on single equipment during management. Therefore, the U2000 meets the ever-increasing service requests. Figure 9-1 and Figure 9-2 show the cluster topology management window and functions provided by theU2000.
9-12
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
9 Router Networks and Switch Networks Feature Management
Figure 9-1 Cluster topology
Figure 9-2 Navigation path to cluster functions
Automatically discovering and dynamically refreshing cluster equipment nodes
Automatically discovering and dynamically refreshing the physical topology of cluster networks and links
Managing the configurations of cluster equipment in batches and in a unified and centralized manner
Maintaining the equipment of a cluster in a centralized manner and supporting fault detection and recovery
Facilitating the backup and recovery of configuration data
Setting the parameters, such as the management VLAN, IP address pool, and multicast MAC address, for the switches of a cluster
Supporting the plug-and-play feature of protocols such as NDP, NTDP, and HGMP
Supporting the access to command or member switches through Telnet based on the nodes in the cluster view
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
9-13
9 Router Networks and Switch Networks Feature Management
iManager U2000 Unified Network Management System Product Description
9.6 Node Redounded Management E-Trunk (Enhanced-Trunk), developed on the basis of Link Aggregation Control Protocol (LACP), is a protocol that controls and implements link aggregation among multiple sets of equipment. E-Trunk is mainly applied to a scenario where a CE is dual homed to a VPLS, VLL, or PWE3 network. In the scenario, E-Trunk can be used to protect the PEs and the links between the CE and PEs. This function allows you to perform the following operations:
Creat an E-Trunk, bind Eth-Trunks, and configure the attributes of the E-Trunk and the Eth-Trunks.
Display the automatically discovered E-Trunk information in the database of the NMS to the interface of the NMS.
Automatically discover the E-Trunk by user specify the equipment range, the configuration of the equipment and the E-Trunk group can be automatically discovered.
9.7 Report Subsystem Management The report subsystem provides a complete set of convenient services. It allows you to generate, distribute, and manage reports based on the Web. The powerful report subsystem can help you to monitor, analyze, improve, and plan network performance. The report subsystem not only supports the manual and periodical generation of reports, but also is perfect in distributing reports. It can be easily integrated with the security management module of the U2000 and has a strong data display power. The report subsystem provides Web-based report generation, distribution, and management functions. For more information, reference to "iManager U2000 (RPT)V100R002C00SPC001 Release Notes_01.doc".
9.8 VPN Service Management The U2000 provides centralized and unified management, including service deployment, service monitoring, and service diagnosis, on VPN services, namely, L3VPN service, VPLS service, and PWE3 service.
Service Deployment The U2000 provides a user-friendly service configuration GUI on which you can complete all configuration operations. The parameters of multiple sets of equipment can be automatically generated through related service templates. User configuration results can be previewed through the topology before being delivered.
Customer management The U2000 supports the operations of adding, deleting, and modifying customers, and binding customers to VPN services.
9-14
L3VPN service management
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
9 Router Networks and Switch Networks Feature Management
−
Configuring L3VPNs in networking modes such as Full-Mesh, Hub-Spoke, and Extranet
−
Configuring VPN FRR and IP FRR for L3VPNs and binding L3VPNs to TE tunnels
−
Configuring static, OSPF, and BGP private routes
−
Configuring VPN services in inter-AS OptionA or inter-AS OptionB mode
VPLS service management −
Supporting the VPLS services in LDP signaling (Martini) mode
−
Supporting the interworking of different VSIs
−
Supporting VLL/VPLS services
PWE3 service management −
Configuring static and dynamic PWE3 services
−
Supporting PWE3 services in CES, ATM, Ethernet, IWF, and heterogeneous interworking mode
−
Backing up PW configurations
−
Configuring PW FRR
Composite service management The U2000 supports the management on composite services, such as VLL/VPLS, VLL/L3VPN, L3VPN multi-VRF, and inter-AS OptionA.
Automatic Service Discovery The U2000 provides the function of automatically discovering L3VPN, VPLS, and PWE3 services that are running on the managed network. In addition, the U2000 can quickly load services on the current network to itself for unified management and monitoring, without requiring much user participation.
Service Monitoring
The U2000 provides the visual topology display function for L3VPN, VPLS, and PWE3 services. The running status of the resources used by the current service, such as an interface, a VRF, or a VSI, can be displayed in the related topology view, thus helping you to quickly locate faults.
You can quickly locate a faulty service based on the alarm generated by the related NE.
Service Diagnosis
The diagnosis tools are used to detect the connectivity of networks and locate faults. Through the service diagnosis function, you can generate diagnosis tasks according to the selected services and directly operate equipment nodes in topology views. The diagnosis results can be directly displayed.
Service Check and Test
Configuration check: checking the consistency of VPN service configurations on different sites and showing the positions of configuration errors
Service connectivity test: testing the service connectivity through the ping and tracert tests, and locating the fault equipment
Protocol status test: checking the service protocol status and the forwarding table, and displaying the error information, thereby helping you to locate faults
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
9-15
9 Router Networks and Switch Networks Feature Management
iManager U2000 Unified Network Management System Product Description
9.9 Tunnel Service Management Tunnel service management is used to plan and deploy services on the entire MPLS network. Carriers can plan, deploy, audit, and monitor end-to-end LSPs through tunnel service management, thus reducing the costs of operating and maintaining MPLS networks.
Tunnel Deployment
Enabling MPLS, LDP, and MPLS TE on the network equipment and interfaces in batches
Implement the planning of traffic on MPLS core networks by supporting the deployment of end-to-end MPLS TE tunnel services
Facilitating the implementation of the MPLS access scheme by supporting the deployment of static LSP services
Implementing the end-to-end MPLS OAM protection by supporting the configuration of end-to-end MPLS TE protection groups, configuration of MPLS OAM detection, and monitoring of related alarms
Automatic Tunnel Discovery With the help of a network administrator, the LSPs and related protection groups that are previously deployed on the network can be restored to the U2000. This satisfies the requirement in the special case where the LSP deployment is prior to the U2000 installation. Moreover, less time of the network administrator is required and the impact of incorrect operations on original services is prevented.
Tunnel Monitoring
Supporting the networkwide tunnel view and displaying multiple types of tunnels, such as static, RSVP, LDP, and IP tunnels, and their alarms in the topology view
Collecting and displaying the performance data of tunnels
Switching to the related tunnel from an alarm
Tunnel Diagnosis The U2000 supports LSP ping and LSP tracert functions through which you can diagnose deployed MPLS TE tunnels and static tunnel services.
9-16
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
10
10 Security Device Network Feature Management
Security Device Network Feature Management
About This Chapter This topic describes the functions and features of security device networks. 10.1 NE Management of Security Devices NE Configuration Management provides GUIs for you to configure and maintain NE configurations. You can directly configure basic configurations on devices through GUIs. 10.2 Single-Point Web Configuration of Security Devices Single-point Web configuration integrates the existing Web functions on the device by embedding browser controls in the Client/Server interfaces. Single-point configuration applies to all the configurations of security devices. In collaboration with centralized security policy configuration, it provides an integrated and comprehensive network security management solution. 10.3 Centralized Security Policy Configuration Deploying a set of security devices with comprehensive technologies during network security construction does not mean that the network is under stable and reliable security protection. 10.4 Report Subsystem Management The report subsystem provides a complete set of convenient services. It allows you to generate, distribute, and manage reports based on the Web. The powerful report subsystem can help you to monitor, analyze, improve, and plan network performance. 10.5 VPN Service Management As an important management component for the IPSec and L2TP VPN solutions, the VPN service management module is used to configure and monitor the IPSec and L2TP VPN services. It provides intelligent configuration and monitoring means.
10.1 NE Management of Security Devices NE Configuration Management provides GUIs for you to configure and maintain NE configurations. You can directly configure basic configurations on devices through GUIs.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
10-1
10 Security Device Network Feature Management
iManager U2000 Unified Network Management System Product Description
The NE configuration management functions are as follows:
Device management This function allows you to perform the following operations:
−
Identify the software versions of devices and adapt to different types of devices automatically.
−
Configure management tunnels on devices, for example, configure local users such as Telnet users or STelnet users, set SNMP parameters and set trap parameters.
Entity management This function allows you to perform the following operations:
−
Obtain the data about device entities, including frames, boards, power supplies, fans, and ports automatically.
−
Refresh entity data and monitor the entity status.
Panel management This function is used to display device entities, including frames, boards, power supplies, fans, and ports, on the device panel.
Interface management This function is used to configure the general interface information and Ethernet interfaces.
GTP management Through the configuration of GTP policies, the security devices can filter GTP packets according to different rules, thus realizing the security defense of the GPRS network. The security devices defend against GTP overbilling attacks, thus protecting users' benefits against illegitimate damages.
Automatic registration This function is used to receive the automatic registration messages sent by devices. If the IP address of a device changes, the NMS can synchronize the IP address information of the device in time.
10.2 Single-Point Web Configuration of Security Devices Single-point Web configuration integrates the existing Web functions on the device by embedding browser controls in the Client/Server interfaces. Single-point configuration applies to all the configurations of security devices. In collaboration with centralized security policy configuration, it provides an integrated and comprehensive network security management solution. The Web features of security devices provide users with simple and easy-to-use Web configuration interfaces. You can easily operate and maintain devices. The single-point Web configuration is a proxy-based Web access mode. It includes two parts: Web proxy and Web browser.The functions of single-point Web configuration are as follows:
10-2
Open the Web management interface of a device through a U2000 client.
Log in to the device Web interface automatically.
Access devices through the Hyper Text Transfer Protocol (HTTP) or Hyper Text Transfer Protocol Secure (HTTPS).
Support multiple Web protocols, such as javascript, Hyper Text Marked Language (HTML), CSS, and Applet, and technologies related to Web 2.0. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
10 Security Device Network Feature Management
Function without modifying or affecting the usage of local browsers such as IE and Firefox.
10.3 Centralized Security Policy Configuration Deploying a set of security devices with comprehensive technologies during network security construction does not mean that the network is under stable and reliable security protection. In network security maintenance, even deploying a satisfied security policy scheme for a small-sized local network is a rather complex task. Designing and deploying a set of reliable security protection policies for a large-scale network, accordingly, is a fairly hard and challenging task. An industry-leading security policy design, configuration, and management system is worked out upon the aim of making a security configuration and management center. With this system, the truly reliable and stable network security protection can be implemented on the basis of the security devices deployed on the network. It has the following features:
Policy package management A policy package can be used to manage all the security devices on the whole network and sort the protection tasks on each security device into security policy, attack defense, and service port mapping. Users can create their own policy packages and include the configuration tasks in the policy packages. Users can also perform operations such as creating, deploying, undeploying, and verifying policy packages. A policy package can cover all the network security configuration and management tasks of a user on a network.
Configuration and management ranges Security policy Attack defense Service port mapping Policy resource
Policy recovery During network security management and maintenance, how to ensure the data consistency between the NMS and devices so that the actual network configurations can be accurately displayed on the NMS? Policy recovery can restore the security policies and attack defense configurations deployed on devices and the used resources of devices to the NMS, thereby achieving the data consistency between the NMS and devices.
Policy audit Auditing the configuration data difference between the NMS and devices helps to ensure the data consistency and make users to fully trust the NMS when using it.
Security policy configuration and management modes of two dimensions
1.
Service-dimension configuration: manages the configurations when the services are deployed on multiple or all devices on the network. This helps users to manage and audit services from the point of networkwide view. On a large-scale network, users do not need to check and configure services on devices one by one. Therefore, missing configurations are reduced, and security services can be configured reliably and efficiently.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
10-3
10 Security Device Network Feature Management
iManager U2000 Unified Network Management System Product Description
2.
Single NE-dimension configuration: manages the configurations of a single NE. Users can select an NE to check security configurations, create, modify, deploy, and undeploy configurations, and import the configurations of other NEs to this NE.
Policy deployment status display Whether a policy is deployed, whether the deployment is successful, and whether the deployment status is the same as that on the device are displayed. This helps to prevent the repeated deployment of a policy that is already deployed.
History record query The detailed policy package configuration and maintenance procedures are recorded. The history operations that users perform on policy packages can be audited.
10.3.1 Policy Package Management This topic describes the fuction of policy package management. 10.3.2 Security Policy Configuration The U2000 allows you to manually create and modify security device rules. 10.3.3 Attack Defense Configuration The U2000 provides attack defense functions. 10.3.4 Policy Resource Configuration The configuration of policy resources includes the configuration of service,addess sets,period and ports sets. 10.3.5 Mapping Service The U2000 It provides the configuration function that re-maps the most common service ports to other ones.
10.3.1 Policy Package Management This topic describes the fuction of policy package management. This feature allows you to create, modify, delete, verify, deploy, undeploy, discover, and audit policy packages, view the deployment and audit result of policy packages. By changing operations based on single policies and single devices to centralized operations based on batch policies and multiple devices, this feature increases operation efficiency and reduces maintenance cost. The policy packages verifying function ensures the correctness of policy package configurations and correlations among the policies within the same policy package. With the policy verifying function, you can correctly deploy policy packages on devices and avoid repeated modifications due to configuration errors during policy deployment. Policy auditing is to audit the policy configuration differences between the NMS and device, so as to determine whether the policy needs to be deployed or discovered. Policy discovery is to recover the data synchronized to the database to the NMS for management. The rights to perform various operations on policy packages are under control. Operations on policy packages are recorded in logs for the policy maintenance personnel to monitor and manage policies.
10-4
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
10 Security Device Network Feature Management
10.3.2 Security Policy Configuration The U2000 allows you to manually create and modify security device rules. The U2000 allows you to manually create the device rule, including:
Specify the name of a new rule
Select the source security zone
Add the source address manually
Select the destination security zone
Add the destination address
Select the service
Select the action
Add the device
Add the time range
Choose whether to generate logs
Configure functions such as ASPF
Configure functions such as DDoS
Configure functions such as package filtering
After a rule is created and deployed to a device, the device filters device information according to this rule. The U2000 allows you to modify the device rule, including:
Change the name of a rule
Change the source security zone
Change the source address
Change the destination security zone
Change the destination address
Change the service
Change the action
Change the device
Change the time range
Change whether to generate logs
Modify functions such as ASPF
Modify functions such as DDoS
Modify functions such as package filtering
The U2000 also allows you to delete a rule, or the value of a certain configuration item of a rule.
10.3.3 Attack Defense Configuration The U2000 provides attack defense functions. This feature provides attack defense functions against SYN flood, UDP flood, ICMP flood, HTTP get flood, DNS request flood, connection flood, scanning, malformed packet, special packet control, and blacklist for security devices.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
10-5
10 Security Device Network Feature Management
iManager U2000 Unified Network Management System Product Description
10.3.4 Policy Resource Configuration The configuration of policy resources includes the configuration of service,addess sets,period and ports sets.
Configuring services, address set, time range, and port set −
Services As flexible support for the IP protocol, security services can be classified into TCP services, UDP services, ICMP services, and other services. The U2000 provides some basic services by default. You can create different services by adding different parameter settings to the same protocol. Different types of services can form a service group. A rule corresponds to one or multiple services. In the case where a rule corresponds to multiple services, these services can be in a service group or map to these services. When you log in to the U2000 for the first time, the U2000 provides some services by default.
−
Address set When setting source and destination addresses on the U2000, you can either set single IP addresses or set address sets.
−
Time range Time ranges are classified into two types: continuous time ranges and periodic time ranges. A continuous time range starts from one time point and ends at another time point. Rules are valid only within the time range. A period time range is on a weekly cycle. You need to set the start time and end time of a day and specify on which days of a week the rules are valid. Then the rules will take effect on a weekly cycle.
−
Port set A port set is a collection of single, continuous, or discontinuous port numbers, specifying the ports through which the server can provide services. The value of a port set ranges from 0 to 65535.
Configuration log server Binary flow logs of devices can be sent to binary servers via configuration of log server.
10.3.5 Mapping Service The U2000 It provides the configuration function that re-maps the most common service ports to other ones. Mapping Service means security devices map the service ports of networking program to out-of-ordered ports when forwarding network data packets.It implies the most common ports to prevent the outer attack to programs.
10.4 Report Subsystem Management The report subsystem provides a complete set of convenient services. It allows you to generate, distribute, and manage reports based on the Web. The powerful report subsystem can help you to monitor, analyze, improve, and plan network performance. 9.7 Report Subsystem Management lists the details of the report subsystem management.
10-6
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
10 Security Device Network Feature Management
10.5 VPN Service Management As an important management component for the IPSec and L2TP VPN solutions, the VPN service management module is used to configure and monitor the IPSec and L2TP VPN services. It provides intelligent configuration and monitoring means. 10.5.1 IPSec End-to-End Service The IPSec end-to-end service is to securely connect two intranets trustable to each other through Internet. It is applied when secure communication connections need to be established. This application mode can be used to protect the sensitive data transmitted on the Internet. 10.5.2 Remote Access Service The U2000 supports the implementation of remote VPN access through L2TP, IPSec (IKEv2) and L2TP over IPSec technologies. The remote access service is applicable to employees accessing the enterprise intranet in remote dial-up mode over the Internet.
10.5.1 IPSec End-to-End Service The IPSec end-to-end service is to securely connect two intranets trustable to each other through Internet. It is applied when secure communication connections need to be established. This application mode can be used to protect the sensitive data transmitted on the Internet.
Service deployment This feature provides both the single service deployment function and the service batch deployment function. Service deployment is used to make services take effect on devices. You can view the deployment results through the auditing function.
Service discovery This feature supports the function of automatically discovering services. With this function, you can discover running IPSec VPN services on the network and then restore the discovered services to the U2000 for unified management and monitoring.
Service monitoring By monitoring the status of managed services in real time, the performance management module allows you to view the service status in the topology view. The performance management module monitors the service status and performance indicators and displays collected performance data in graphs or reports.
Display of the service topology This feature provides the function of visualizing the service topology. In the topology view, you can view service alarms, service statuses, and service-related device alarms.
Service audit This feature supports to audit the differences of service configuration between the NMS and device.
10.5.2 Remote Access Service The U2000 supports the implementation of remote VPN access through L2TP, IPSec (IKEv2) and L2TP over IPSec technologies. The remote access service is applicable to employees accessing the enterprise intranet in remote dial-up mode over the Internet.
Service deployment The remote access service management supports the deployment of a single service and the deployment of services in batches. In addition, you can view deployment results in
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
10-7
10 Security Device Network Feature Management
iManager U2000 Unified Network Management System Product Description
the service topology view. Remote access services include L2TP service, L2TP over IPSec service and IPSec (IKEv2) service three types.
Service monitoring The L2TP service, L2TP over IPSec service and IPSec (IKEv2) service management can manage and monitor the online users of remote access services. It also provides the functions of displaying the statuses of online users in real time, restricting the number of online users, and forcing users to log out.
Display of the service topology The remote access service management provides the function of visualizing the service topology. In the topology view, you can view service alarms, service statuses, and service-related device alarms.
Service audit The remote access service management supports to audit the differences of service configuration between the NMS and device.
Service resource management The remote access service management provides the function of radius template management and user domain management.
10-8
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
11
11 FTTx Network Feature Management
FTTx Network Feature Management
About This Chapter This topic describes the functional features of FTTx NE management and network management. 11.1 OLT Management In the FTTx solution, the OLT is connected with high bandwidth across a long distance. It works with the ONU to provide voice, data, and video services and meets the individualized requirements of telecom users. NE configuration management provides GUIs for you to configure NEs and maintain NE configurations. You can directly configure services on devices through GUIs. 11.2 ONU Management The ONU supports GPON, EPON, and GE in the upstream direction and provides different access modes to meet different FTTx application scenarios. NE configuration management provides GUIs for you to configure NEs and maintain NE configurations. You can directly configure services on devices through GUIs.
11.1 OLT Management In the FTTx solution, the OLT is connected with high bandwidth across a long distance. It works with the ONU to provide voice, data, and video services and meets the individualized requirements of telecom users. NE configuration management provides GUIs for you to configure NEs and maintain NE configurations. You can directly configure services on devices through GUIs.
Device Management By using the U2000, you can manage device panels, shelves, cards, clock sources, and system parameter profiles.
Network Interface Management By using the U2000, you can perform the following operations:
Issue 03 (2010-11-02)
Manage and maintain TDM E1/T1 ports.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
11-1
11 FTTx Network Feature Management
iManager U2000 Unified Network Management System Product Description
Manage and maintain CES E1/T1 ports.
Manage and maintain STM-x/OC-x TDM ports.
Manage Ethernet ports.
Connection Management By using the U2000, you can manage service virtual ports and traffic profiles.
Layer 2 Management By using the U2000, you can manage VLANs and configure the RSTP, MSTP, ANCP, and LACP.
Layer 3 Management By using the U2000, you can configure the DHCP relay and the ARP function and perform MPLS management.
ACL&QoS By using the U2000, you can manage ACLs, QoS, time segments, and HQoS.
User Security and System Security By using the U2000, you can perform the following operations:
Configure user access in PITP mode.
Configure user access in DHCP option 82 mode.
Configure user access control.
Configure system security access.
Manage BFD sessions.
Ethernet Connection Fault Management By using the U2000, you can manage maintenance domains (MDs), maintenance associations (MAs), and maintenance association end point (MEPs).
Protection Group Management By using the U2000, you can manage PS protection groups and configure type B dual homing protection, GPON type C protection, and EPON type D protection.
GPON Management By using the U2000, you can manage GPON optical ports, ONTs, GEM ports, TDM private line services, and GPON profiles.
EPON Management By using the U2000, you can manage EPON optical ports, ONTs, CESoP connections, TDM private line services, and EPON profiles.
11-2
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
11 FTTx Network Feature Management
Multicast Service Management By using the U2000, you can perform basic configurations and manage programs, profiles, and users.
Service Provisioning Profile The U2000 supports E2E service provisioning profiles to improve the service provisioning efficiency.
Alarm Root Cause Identification By using the U2000, you can quickly determine the reason why the ONU is offline, and distinguish whether the backbone or tributary optical fiber is faulty or the terminal is powered off. This reduces the number of orders that require engineers to rectify faults on site.
Quick Service Cutover of PON Ports When a PON port of an OLT is faulty, you can connect the optical fiber that is connected to the faulty PON port to an idle PON port on the OLT, copy the configurations of the faulty PON port to the idle PON port, and transfer the configurations of the MDUs that are connected to the faulty PON port to the idle PON port. Then, the services restore quickly.
11.2 ONU Management The ONU supports GPON, EPON, and GE in the upstream direction and provides different access modes to meet different FTTx application scenarios. NE configuration management provides GUIs for you to configure NEs and maintain NE configurations. You can directly configure services on devices through GUIs.
Device Management By using the U2000, you can manage device panels, shelves, cards, and system parameter profiles.
Network Interface Management By using the U2000, you can perform the following operations:
Manage and maintain TDM E1/T1 ports.
Manage and maintain CES E1/T1 ports.
Manage GPON optical ports.
Manage EPON optical ports.
Connection Management By using the U2000, you can manage service virtual ports and traffic profiles.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
11-3
11 FTTx Network Feature Management
iManager U2000 Unified Network Management System Product Description
Layer 2 Management By using the U2000, you can manage VLANs and configure the RSTP, MSTP, ANCP, and LACP.
Layer 3 Management By using the U2000, you can configure the DHCP relay and ARP.
ACL&QoS By using the U2000, you can manage ACLs, QoS, and time segments.
User Security and System Security By using the U2000, you can perform the following operations:
Configure user access in PITP mode.
Configure user access in DHCP option 82 mode.
Configure user access control.
Configure system security access.
Manage BFD sessions.
Ethernet Connection Fault Management By using the U2000, you can manage MDs, MAs, and MEPs.
Protection Group Management By using the U2000, you can manage PS protection groups and configure type B dual homing protection, GPON type C protection, and EPON type D protection.
xDSL Management By using the U2000, you can manage ADSL profiles and ports, ATM SHDSL profiles and ports, and VDSL2 profiles and ports.
Ethernet Access Management By using the U2000, you can manage Ethernet ports.
Multicast Service Management By using the U2000, you can perform basic configurations and manage programs, profiles, and users.
VoIP Service Management By using the U2000, you can manage media gateways (MGs), signaling gateways, POTS ports, and IP interfaces.
11-4
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
11 FTTx Network Feature Management
Layer 2 Topology Management of MDUs In the topology view, an MDU is managed as a card in the remote shelf of an OLT node. You can double-click the virtual ODN shelf to enter the Layer 2 topology view of the ODN and the MDU. Then, you can add, delete, or modify the MDU and configure the services associated with the MDU.
Sheet Pre-deployment The U2000 provides the sheet pre-deployment solution. Therefore, you can bulk import devices to the U2000 and implement the functions of software-commissioning-free and remote acceptance. In addition, only one site visit is required and the plug and play (PnP) feature is supported. These features greatly improve the deployment efficiency and reduce network construction costs.
PnP and Quick Replacement When an MDU is faulty, you need to quickly locate the fault and restore services. It is time consuming to locate internal faults of an MDU and repair the MDU. Therefore, it is recommended that you replace faulty MDUs directly and store and repair the faulty MDUs in a centralized manner.
Remote Acceptance In FTTx network construction, the U2000 supports remote acceptance of deployed ONUs to implement one site visit and reduce operation and maintenance costs.
Automatic Bulk Upgrade The U2000 provides the solution to automatic bulk upgrade of offline ONTs. By using the U2000, you can perform the following operations:
Bulk upgrade ONTs.
Manage scheduled upgrade tasks.
Upgrade offline ONTs.
Enable the function of automatically upgrading ONTs when the ONTs are connected.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
11-5
iManager U2000 Unified Network Management System Product Description
12
12 MSAN Network Feature Management
MSAN Network Feature Management
About This Chapter This topic describes the functions and features of msan device networks. 12.1 MSAN Management The multi-service access node (MSAN) connects user telephone lines to the core network. It also provides voice, ISDN, and broadband services on the same platform. NE configuration management provides GUIs for you to configure NEs and maintain NE configurations. You can directly configure services on devices through GUIs.
12.1 MSAN Management The multi-service access node (MSAN) connects user telephone lines to the core network. It also provides voice, ISDN, and broadband services on the same platform. NE configuration management provides GUIs for you to configure NEs and maintain NE configurations. You can directly configure services on devices through GUIs.
Device Management By using the U2000, you can manage device panels, shelves, cards, clock sources, and system parameter profiles.
Network Interface Management By using the U2000, you can perform the following operations:
Manage E1 ports and Ethernet ports.
Configure and maintain E3/T3 ports.
Manage and maintain STM-x/OC-x TDM ports
Manage IMA groups and links.
Connection Management By using the U2000, you can manage service virtual ports, traffic profiles, and CESoP connections.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
12-1
12 MSAN Network Feature Management
iManager U2000 Unified Network Management System Product Description
Layer 2 Management By using the U2000, you can manage VLANs and configure the RSTP, MSTP, ANCP, and LACP.
Layer 3 Management By using the U2000, you can configure the DHCP relay and ARP.
ACL&QoS By using the U2000, you can manage ACLs, QoS, and time segments.
User Security and System Security By using the U2000, you can perform the following operations:
Configure user access in PITP mode.
Configure user access in DHCP option 82 mode.
Configure user access control.
Configure system security access.
Manage BFD sessions.
Ethernet Connection Fault Management By using the U2000, you can manage MDs, MAs, and MEPs.
Protection Group Management By using the U2000, you can manage PS protection groups and configure type B dual homing protection, GPON type C protection, and EPON type D protection.
xDSL Management By using the U2000, you can manage ADSL profiles and ports, ATM SHDSL profiles and ports, and VDSL2 profiles and ports.
Multicast Service Management By using the U2000, you can perform basic configurations and manage programs, profiles, and users.
VoIP Service Management By using the U2000, you can manage MGs, signaling gateways, POTS ports, and IP interfaces.
V5 Voice Service Management By using the U2000, you can manage V5 interfaces, service ports, SPCs, and VFB, ATI, CDI, and party line services.
12-2
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
12 MSAN Network Feature Management
Narrowband Data Service Management By using the U2000, you can manage MTA and HSL services and TDM SHDSL ports.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
12-3
iManager U2000 Unified Network Management System Product Description
13
13 DSLAM Network Feature Management
DSLAM Network Feature Management
About This Chapter This topic describes the functions and features of dslam device networks. 13.1 DSLAM Management In the ATM-DSLAM or IP-DSLAM networking mode, the DSLAM provides the access to various services such as ADSL, ADSL2+, SHDSL, and VDSL2. It also provides the integrated services that feature large capacity, high rate, and high quality. NE configuration management provides GUIs for you to configure NEs and maintain NE configurations. You can directly configure services on devices through GUIs.
13.1 DSLAM Management In the ATM-DSLAM or IP-DSLAM networking mode, the DSLAM provides the access to various services such as ADSL, ADSL2+, SHDSL, and VDSL2. It also provides the integrated services that feature large capacity, high rate, and high quality. NE configuration management provides GUIs for you to configure NEs and maintain NE configurations. You can directly configure services on devices through GUIs.
Device Management By using the U2000, you can manage device panels, shelves, cards, and system parameter profiles.
Network Interface Management By using the U2000, you can perform the following operations:
Manage E1 ports and Ethernet ports.
Configure and maintain E3/T3 ports.
Manage and maintain STM-x/OC-x TDM ports
Manage IMA groups and links.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
13-1
13 DSLAM Network Feature Management
iManager U2000 Unified Network Management System Product Description
Connection Management By using the U2000, you can manage service virtual ports, traffic profiles, and CESoP connections.
Layer 2 Management By using the U2000, you can manage VLANs and configure the RSTP, MSTP and LACP.
Layer 3 Management By using the U2000, you can configure the DHCP relay and ARP.
ACL&QoS By using the U2000, you can manage ACLs, QoS, and time segments.
User Security and System Security By using the U2000, you can perform the following operations:
Configure user access in PITP mode.
Configure user access in DHCP option 82 mode.
Configure user access control.
Configure system security access.
Manage BFD sessions.
Ethernet Connection Fault Management By using the U2000, you can manage MDs, MAs, and MEPs.
Protection Group Management By using the U2000, you can manage PS protection groups and configure type B dual homing protection, GPON type C protection, and EPON type D protection.
xDSL Management By using the U2000, you can manage ADSL profiles and ports, ATM SHDSL profiles and ports, EFM SHDSL ports, and VDSL2 profiles and ports.
Multicast Service Management By using the U2000, you can perform basic configurations and manage programs, profiles, and users.
13-2
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
14
14 ONT Management
ONT Management
The U2000 supports the management of EPON terminals in the OAM mode and GPON terminals in the OMCI mode. In this manner, the terminals are managed in a centralized manner, which saves the maintenance workload. To manage xPON terminals, the U2000 adopts two solutions, namely, SNMP+OMCI and FTP+OMCI.
The objects managed by the ONT L2 protocol and protocols at lower layers provision multicast IPTV and data services by using the SNMP+OMCI solution.
The VoIP services are provisioned through the FTP+OMCI solution. The N2000 BMS generates a .xml configuration file and then uploads the file to the FTP server. The OLT obtains the configuration file from the FTP server, loads it, and then sends it to the ONT through the OMCI. Finally, the service configuration of the ONT is complete.
The U2000 supports the automatic batch upgrade of ONTs.
Supports the batch upgrade of ONTs.
Supports the scheduled task upgrade management.
Supports the upgrade of offline ONTs, that is, automatic upgrade when the ONT is connected.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
14-1
iManager U2000 Unified Network Management System Product Description
15 Reliability
15
Reliability
About This Chapter In reliability design, measures are taken to reduce potential risks, so that the product can operate in a safer manner. 15.1 Reliability Indicator This topic describes the indicators of the reliability design. 15.2 HA System The high availability (HA) system helps you improve the running reliability of the U2000 server. 15.3 DCN Protection You can use a data communication network (DCN) to connect the U2000 to a standby gateway NE (GNE). This improves the reliability of the communication connection between the U2000 and equipment. 15.4 Disk Mirroring The disk mirroring function helps you improve the reliability of disk data on the U2000 server. 15.5 Data Backup The data backup function helps you improve the reliability of important U2000 data.
15.1 Reliability Indicator This topic describes the indicators of the reliability design. Table 15-1 lists the reliability indicators of the U2000.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
15-1
iManager U2000 Unified Network Management System Product Description
15 Reliability
Table 15-1 Reliability indicators of the U2000 Item
Indicator
Remarks
MTBF
The average fault interval is larger than 6 months.
HA system
The fault is defined as database crash. The average fault recovery time is no more than 15 minutes.
MTTR
HA system
The fault is defined as database crash. HA switching time
≤ 15 minutes
70% of the management capacity
NMS start time
≤ 10 minutes
70% of the management capacity
NMS shutdown time
≤ 10 minutes
70% of the management capacity
15.2 HA System The high availability (HA) system helps you improve the running reliability of the U2000 server. The non-distributed U2000 server uses a 1+1 scheme. If the active site fails, the U2000 can be switched to the standby site so that the U2000 application is not interrupted.
The U2000 supports distributed cluster. For better stability and risk resistance capability, the distributed cluster uses a 1+1 scheme. If a slave server fails, the master server fails, the
15-2
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
15 Reliability
database is faulty, IP addresses conflict, or the key process fails to be switched, you can switch the distributed cluster to the standby distributed cluster without interrupting the U2000. The protection mechanism of an HA system has two aspects:
Database synchronization and backup between the active and standby sites
Switching the application program between the active and standby sites
The U2000 provides the following HA schemes:
HA system (Veritas 1+1 hot standby): Applicable to remote hot standby of the non-distributed system, featuring automatic switching.
HA system (Veritas distributed hot standby): Applicable to remote hot standby of the distributed system on SUSE Linux OS, featuring automatic switching.
15.3 DCN Protection You can use a data communication network (DCN) to connect the U2000 to a standby gateway NE (GNE). This improves the reliability of the communication connection between the U2000 and equipment. The communication between non-GNEs and the U2000 is forwarded by the GNE. In the U2000, you can set the active GNE and standby GNE for NEs in advance. When the communication between the active GNE and the U2000 is interrupted, the U2000 automatically switches to the standby GNE for communication, so that the communication between the U2000 and NEs is not interrupted. When the communication between the U2000 and the active GNE recovers, the U2000 determines whether to use the active GNE again according to the preset revertive mode.
15.4 Disk Mirroring The disk mirroring function helps you improve the reliability of disk data on the U2000 server. If the server is a Sun workstation with more than two hard disks, disk mirroring can be installed together with the U2000. After you create disk mirroring, if the active disk fails, you can use a command to switch the data to the standby disk, to restore the working data and parameter settings before the active disk is damaged.
15.5 Data Backup The data backup function helps you improve the reliability of important U2000 data. The security of network data is a concern for users. The U2000 provides the following solutions listed in Table 15-2.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
15-3
iManager U2000 Unified Network Management System Product Description
15 Reliability
Table 15-2 Data backup
15-4
Data to Be Backed Up
Solution of the U2000
Operation Description
Alarm log, abnormal event log, performance log, security, and operation log
Dump logs.
Operate on the U2000 client. For more details, see the U2000 Online Help.
Configuration data
Export them to script files, adopting the MML command format. The script files can neglect the structural differences among databases of all the U2000 versions, and are suitable for data backup in the case of version upgrade. The script files supported by the U2000 consist of networkwide configuration files, NMS naming file, NE configuration file, NE list files, server computer information files, service implementation configuration file, network-layer information files, and network simulation and planning information files.
Database
Back up all data in the U2000 database.
NE database
Back up the NE data.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
16
16 Performance Indicators
Performance Indicators
This topic describes the performance indicators of the U2000. Table 16-1 Performance indicators Item
Subitem
Indicator
Storage capacity
Capacity of current alarms
Default: 100,000 pieces Maximum: 100,000 pieces
Capacity of history alarms
Default: 2,000,000 pieces Maximum: 2,000,000 pieces
Capacity of logs, including operation logs and system logs
Default: 1,000,000 pieces
Resources occupied
CPU usage
Normally, the CPU usage is not greater than 10%.
Processing capability
Response speed of alarm handling
Normally, the time interval from the time at which an alarm is generated on the equipment to the time at which the alarm is displayed on the U2000 is not more than 10 seconds.
Response speed of performance event handling
Normally, in the case of 1,000 pieces of performance data, the time interval from the time at which they are reported to the U2000 to the time at which they are stored in the database is approximately 10 seconds.
Alarm handling capability
Normally, 100 (not more than 400 at most) pieces of alarms can be handled per second.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Maximum: 1,000,000 pieces
16-1
iManager U2000 Unified Network Management System Product Description
16 Performance Indicators
Item
Subitem
Indicator
U2000 user management
User
Maximum: 500
User group
Maximum: 50
Equipment set
Maximum: 100
Function set
Maximum: 255
HA switching time
Switching between remote active and standby servers
< 15 minutes
Stability
Mean time between failures (MTBF)
The MTBF is more than six months (a failure refers to the situation where the database quits unexpectedly).
Mean time to recovery (MTTR)
The MTTR is not more than 15 minutes (a failure refers to the situation where the database quits unexpectedly).
The number of managed physical nodes
Maximum: 15,000 physical nodes
The number of managed equivalent NEs
Maximum: 15,000 equivalent NEs
Management capability
Table 16-2 DCN bandwidth requirements
16-2
Item
Bandwidth Requirements
Bandwidth required for the communication between the U2000 server and a U2000 client
2 Mbit/s
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
16 Performance Indicators
Item
Bandwidth Requirements
Bandwidth required for the communication between the N equivalent NEs and U2000 server
A bandwidth of 2 Mbit/s may not meet the bandwidth requirements in the case of different networks. In this case, you can determine the CIR or PIR by using the following formula:
CIR: N>56: 2048k+(N-56)* 0.5k
−
N<=56: 2Mbit/s
−
N>56: 2048k+(N-56)* 5k
−
N<=56: 10Mbit/s
PIR:
Bandwidth required for the communication between the OSS and U2000 server
2 Mbit/s
Bandwidth required for the communication between the primary and secondary sites in an HA system (Veritas)
2 Mbit/s
Issue 03 (2010-11-02)
−
NOTE A minimum of 2 Mbit/s is required.
NOTE A minimum of 2 Mbit/s is required. A bandwidth of 2 Mbit/s refers to the bandwidth that is required when you do not synchronize all performance data by using PMS. If you want to synchronize the performance data, more bandwidth is required.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
16-3
iManager U2000 Unified Network Management System Product Description
17
17 Management Capability
Management Capability
About This Chapter Introduce the manageable equipment and the management capability of the U2000. 17.1 Management Capability The management capability of the U2000, on the basis of satisfying the preceding performance indexes, can be measured by the maximum number of NEs it manages.
17.1 Management Capability The management capability of the U2000, on the basis of satisfying the preceding performance indexes, can be measured by the maximum number of NEs it manages. Currently, a set of U2000 can manage a maximum of 15,000 physical NEs, 20,000 equivalent NEs and 100 clients. This conclusion is drawn after the tests under a certain environment and objectively reflects the actual management capability of the U2000.
Management capability: In this document, management capability refers to the capability of the NMS to manage network resources, which are expressed in the number of equivalent NEs.
Equivalent NE: The functional features, cross-connect capacity, and number of boards/ports/channels are specific to NEs of different types. As these NEs require different resources of the NMS, the number of NEs that can be managed by the NMS depends on the NE types. For easy description and calculation of the management capability, the concept of equivalent NE is defined so that NEs of different types or a number of ports can be converted to equivalent NEs by an uniform criteria according to the system resources required by them. The system resources required by an equivalent NE is equal to the resources for managing an STM-1 transport NE.
Equivalent coefficient: The equivalent coefficient refers to the ratio of the resources used by physical NEs or ports to the resources used by equivalent NEs. Equivalent coefficient = (Resources used by physical NEs or ports)/(Resources used by equivalent NEs)
The management capability of the U2000 in a network that consists of different types of NEs is affected by the following factors:
Issue 03 (2010-11-02)
The key technical specifications include the number of equivalent NEs, number of clients, and number of physical NEs.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
17-1
17 Management Capability
iManager U2000 Unified Network Management System Product Description
The management capability of the U2000 also depends on the hardware and varies with the hardware configuration.
The system limits the number of physical nodes. Hence, the number of physical nodes is a restriction for the management capability.
The management capability refers to the maximum number of equivalent NEs that can be managed by the U2000 on certain hardware configuration conditions.
If a client also runs on the computer where the server is running, the management capability is reduced by 50%. Hence, it is recommended that you run the client and server on different computers.
Virtual NEs are not included in the management capability. A pre-configured NE is equal to a real NE. One third-party NE is equal to one equivalent NE, and can only be discovered instead of being managed. The equivalent coefficient of the OEM equipment is calculated in the way similar to Huawei equipment.
Generally, the number of equivalent NEs that the U2000 can manage is calculated according to the following rules:
Number of equivalent NEs =
+ +
= (Number of transport NEs of type_I x Equivalent coefficient + ... + (Number of transport NEs of type_n x Equivalent coefficient) For example, there are 5 OptiX OSN 9500 (equivalent coefficient: 10), 10 OptiX OSN 7500 (equivalent coefficient: 6.5), and 100 OptiX OSN 3500 (equivalent coefficient: 4.5). Then, you can calculate the number of equivalent NEs in the transport domain as follows: Number of equivalent NEs in the transport domain = 5 x 10 + 10 x 6.5 + 100 x 4.5 = 565
= (Number of IP NEs of type_I x Equivalent coefficient) + ... + (Number of IP NEs of type_n x Equivalent coefficient) For example, there are 5 NE5000E (equivalent coefficient: 10), 200 S5300 (equivalent coefficient: 1.25), and 1000 CX200 (equivalent coefficient: 0.625). Then, you can calculate the number of equivalent NEs in the IP domain as follows: Number of equivalent NEs in the IP domain = 5 x 10 + 200 x 1.25 + 1000 x 0.625 = 925
17-2
= Number of FTTx OLT equivalent NEs + Number of FTTx MDU equivalent NEs + Number of MSAN equivalent NEs + Number of DSLAM equivalent NEs + Number of equivalent NEs of other access equipment
Number of FTTx OLT equivalent NEs = (Number of ONTs x Equivalent coefficient) + (Number of MDUs x Equivalent coefficient) + (Number of P2P ports x Equivalent coefficient)
Number of FTTx MDU equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... + (Number of ports of type n x Equivalent coefficient)
Number of MSAN equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... + (Number of ports of type n x Equivalent coefficient)
Number of DSLAM equivalent NEs = (Number of ports of type_I x Equivalent coefficient) + ... + (Number of ports of type_n x Equivalent coefficient)
Number of equivalent NEs of other access equipment = (Number of NEs of type_I x Equivalent coefficient) + ... + (Number of NEs of type_n x Equivalent coefficient)
The basic unit of an equivalent NE of the U2000 is OptiX Metro 1000.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
17 Management Capability
The comparison coefficient of an equivalent NE of the U2000 to the equivalent NE in each domain is as follows: −
1 equivalent NE in the transport domain = 1 equivalent NE of the U2000
−
4 equivalent nodes in the IP domain = 1 equivalent NE of the U2000
−
3.3 equivalent nodes in the access domain = 1 equivalent NE of the U2000
The management scales of the U2000 are defined as follows: −
Small-scale network: less than 2,000 equivalent NEs of the U2000
−
Medium-scale network: less than 6,000 equivalent NEs of the U2000
−
Large-scale network: less than 15,000 equivalent NEs of the U2000
−
Extra-large-scale network: less than 20000 equivalent NEs of the U2000
Conversion between monitored instances to equivalent nodes: Monitored instances are converted into physical equivalent nodes as follows: 2 monitored instances = 1 equivalent NE of the U2000
Conversion between service resources to equivalent NEs. Service resource management needs to be converted into a certain number of equivalent nodes. The formulas for calculating the equivalent nodes are as follows: −
For 1-20,000 service resource licenses, Equivalent nodes of services = Total equivalent nodes x 20%
−
For 20,001-60,000 service resource licenses, Equivalent nodes of services = Total equivalent nodes x 25%
−
For 60,001-100,000 service resource licenses, Equivalent nodes of services = Total equivalent nodes x 30%
The management capability of the U2000 varies with hardware platforms, as shown in Table 17-1. Table 17-1 Management capabilities of the U2000 on different hardware platforms Server
Short Name of Computer
Management Capability
Number of Clients
Support Unified Network Management
Mainstream Server to Be Delivered with the U2000 V100R002C00 Sun Server
Issue 03 (2010-11-02)
T5220-4C*1.2G-16G
2000
32
No
T5220-8C*1.4G-32G
6000
64
Yes
M4000-4P*2.53G-32G Array: 6*146G Array
15000
100
Yes
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
17-3
iManager U2000 Unified Network Management System Product Description
17 Management Capability
Server
Short Name of Computer
Management Capability
Number of Clients
Support Unified Network Management
PC Server
HP DL380G6-2P*2.0G-8G
2000
32
Yes
HP DL580G5-4P*2.13G-16G
6000
64
Yes
M4000-2P*2.15G-16G
6000
64
No
SUN V890-4P*1.5G-16G
3000
48
No
SUN V890-2P*1.5G-8G
1500
32
No
SUN V445-4P*1.6GHz-8G
1500
32
No
SUN E2900-8P*1.5GHz-32G
5000
80
Yes
SUN E2900-12P*1.5GHz-48G
5000
100
Yes
Fujitsu Server
PW650-4P*1.8GHz-16G
2000
48
No
PW650-2P*1.8GHz-8G
1500
32
No
PC Server
IBM X3650-2P*2.0G-8G
2000
32
No
IBM X3850M2-4P*2.13G-16G
6000
64
No
Compatible Server (Reuse) SUN Server
Compatible Server for the Single-Domain Upgrade The servers are applicable to only the single-domain upgrade instead of the cross-domain management in centralized manner. For example, if the T2000 is installed on SUN V490, the T2000 can be directly upgraded to the U2000, but the U2000 cannot have the management functions of the IP and access domains in this case.
17-4
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
17 Management Capability
Server
Short Name of Computer
Management Capability
Number of Clients
Support Unified Network Management
SUN Server
SUN Netra240-2P*1.5GHz-2G
600
16
No SUN Netra240 does not support the management of PTN devices. If T2000 is installed on Netra240, after upgraded to the U2000, the U2000 cannot have the management functions of the PTN devices. If must to manage the PTN devices, the Netra240 must be changed.
SUN V490-2P*1.6GHz-4G
800
24
No
SUN V440-2P*1.6GHz-4G
800
24
No
SUN V240-2P*1.5GHz-4G
600
16
No
SUN V245-2P*1.5GHz-4G
600
16
No
IBM X3500-2P*2.0G-4G
2000
64
No
IBM X3200-1P*2.4G-2G
600
14
No
HP ML350-2P*2.0G-4G
2000
64
No
PC Server
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
17-5
iManager U2000 Unified Network Management System Product Description
17 Management Capability
Server
Short Name of Computer
Management Capability
Number of Clients
Support Unified Network Management
HP ML110-1P*2.4G-2G
600
24
No
HP ML570-4P*2.0G-4G
2000
48
No
DELL R900-4P*2.13G-4G
2000
48
No
DELL PE6800-4P*2.0G-4G
2000
48
No
DELL PE2900-2P*2.0G-4G
1500
32
No
DELL PE840-1P*2.4G-2G
600
24
No
HP DL380G5-2P*2.0G-8G
6000
64
No
HP DL580G5-4P*2.13G-16G
10000
100
No
IBM X3650-2P*2.0G-8G
6000
64
No
IBM X3850M2-4P*2.13G-16G
10000
100
No
Maximum number of physical NEs managed by U2000 as follows:
Maximum number of physical NEs: 15000
Maximum number of SDH paths: 300000
Maximum number of WDM paths: 50000
The management capability of the U2000 varies with OptiX NE equivalents, as shown in Table 17-2.
17-6
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
17 Management Capability
Table 17-2 Management capabilities of the U2000 on different OptiX NE equivalents NE Series
NE Type
Equivalent Coefficient for the U2000
OSN series
OptiX OSN 500
1
OptiX OSN 1500
3.5 (With ASON) 2.5 (Without ASON)
OptiX OSN 2000
2
OptiX OSN 2500
4.5 (With ASON) 3.5 (Without ASON)
OptiX OSN 2500 REG
1.5
OptiX OSN 3500
6.5 (With ASON) 4.5 (Without ASON)
OptiX OSN 7500
10 (With ASON) 6.5 (Without ASON)
OptiX OSN 9500
15 (With ASON) 10 (Without ASON)
MSTP series
SDH series
Issue 03 (2010-11-02)
OptiX Metro 100
0.5
OptiX Metro 200
0.5
OptiX Metro 500
1
OptiX 155/622H (Metro 1000)
1
OptiX Metro 1000V3
1
OptiX Metro 1050
1.5
OptiX Metro 1100
1.5
OptiX 155/622 (Metro 2050)
2
OptiX 2500+(Metro 3000)
3
OptiX Metro 3100
3
OptiX 10G (Metro 5000)
4
OptiX 155C
1
OptiX 155S
1
OptiX 155/622B_I
2
OptiX 155/622B_II
2
OptiX 2500
3
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
17-7
iManager U2000 Unified Network Management System Product Description
17 Management Capability
NE Series
NE Type
Equivalent Coefficient for the U2000
Metro WDM series
OptiX Metro 6020
1
OptiX Metro 6040
1
OptiX Metro 6040V2
1
OptiX Metro 6100
1.5
OptiX Metro 6100V1
1.5
OptiX Metro 6100V1E
1.5
OptiX OSN 900A
1
OptiX BWS OAS, OptiX BWS OCS, OptiX BWS OIS
1.5
OptiX BWS 320GV3
1.5
OptiX BWS 1600G, OptiX BWS 1600G OLA
1.5+1.5*N (N refers to the number of slave shelves)
OptiX OTU40000
1
OptiX BWS 1600S
1.5
OptiX PFE 1670
1
OptiX SLM 1630
1
OptiX OSN 1800
1
OptiX OSN 3800
3.5 (With ASON)
LH WDM series
Marine series
NG WDM series
1.5 (Without ASON) OptiX OSN 6800
4+4*N (With ASON) 2+2*N (Without ASON) N refers to the number of slave shelves
OptiX OSN 8800 I
10+10*N (With ASON) 6+6*N (Without ASON) N refers to the number of slave shelves
OptiX OSN 8800 II
16+16*N (With ASON) 12+12*N (Without ASON) N refers to the number of slave shelves
NA WDM series
17-8
OptiX BWS 1600A
1.5
OptiX BWS 1600(NA)
1.5
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
NE Series
17 Management Capability
NE Type
Equivalent Coefficient for the U2000
OptiX OSN 1800(NA)
1
OptiX OSN 3800A
3.5 (With ASON) 1.5 (Without ASON)
OptiX OSN 6800A
4+4*N (With ASON) 2+2*N (Without ASON) N refers to the number of slave shelves
OptiX OSN 8800 I(NA)
10+10*N (With ASON) 6+6*N (Without ASON) N refers to the number of slave shelves
OptiX OSN 8800 II(NA)
16+16*N (With ASON) 12+12*N (Without ASON) N refers to the number of slave shelves
RTN series
OptiX RTN 605
0.4
OptiX RTN 610
0.4
OptiX RTN 620
0.5
OptiX RTN 910
0.5
OptiX RTN 950
1
OptiX RTN 5000S
1
The management capability of the U2000 varies with IP NE equivalents, as shown in Table 17-3. Table 17-3 Management capabilities of the U2000 on different IP NE equivalents NE Series
NE Type
Equivalent Coefficient for the U2000
Router
NE05/NE08(E)/NE16(E)
0.75
NE20/NE20E
1.25
NE40/NE80
5
NE40E/NE80E
10
NE5000E
10*N (N: number of chassis)
R-series router
1
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
17-9
iManager U2000 Unified Network Management System Product Description
17 Management Capability
NE Type
Equivalent Coefficient for the U2000
AR-series router
0.25
Security equipment for load balancing and blocking
SSP
10
NSE
10
Switch
S2000 series
0.125
S2300 series
0.625
S3000 series
0.125
S3300 series
0.75
S5000 series
0.25
S5300 series
1.25
S6500 series
0.75
S7800 series
1.25
S8016 series
1.25
S8500 series
1.25
S9300 series
2.5
OptiX PTN 1900
2.5
OptiX PTN 3900
4.5
OptiX PTN 912
0.5
OptiX PTN 910
0.5
OptiX PTN 950
1
CX200 series
0.625
CX300 series
1.25
CX600 series
5
Eudomen 300/500/1000
0.5
Eudomen 200E series
0.25
Eudomen 1000E series
0.75
Eudomen 8040
3
Eudomen 8080
6
Eudomen 8080E
4
Eudomen 8160E
8
USG9110
4
NE Series
PTN series
MAN service platform
Firewall
USG
17-10
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
17 Management Capability
NE Type
Equivalent Coefficient for the U2000
USG9120
2
USG9210
3
USG9220
6
USG9310
4
USG9320
8
USG5000 series
0.75
USG3030
0.25
USG3040
0.25
USG2100 series
0.25
USG2200 series
0.25
USG50
0.25
SRG1200
0.25
SRG20-10
0.25
SRG20-11
0.25
SRG20-12
0.25
SRG20-15
0.25
SRG20-20
0.25
SRG20-21
0.25
SRG20-30
0.25
SRG20-31
0.25
SRG20-31-D
0.25
SIG9810
4
SIG9820
8
SIG9800 Server
0.25
SVN
SVN3000
0.25
Broadband access
MA5200E/F series
1.5
MA5200G series
10
ME60 series
10
Voice gateway
VG1040/1041 series
0.25
WLAN AP
AP
0.25
NE Series
SRG
SIG
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
17-11
iManager U2000 Unified Network Management System Product Description
17 Management Capability
The management capability of the U2000 varies with access NE equivalents, as shown in Table 17-4. Table 17-4 Management capabilities of the U2000 on different access NE equivalents Class
Type
Equivalent Coefficient for the U2000
FTTx OLT (calculation based on the managed ONT, MDU, and P2P resources in the case of OLT)
ONT
1/64
MDU
1/32
P2P port
1/64
FTTx MDU (calculation based on the managed user ports in the case of MDU)
xDSL port
1/128
E1 port
1/128
ETH port
1/128
PSTN/ISDN/HSL port
1/160
xDSL port
1/128
E1 port
1/128
ETH port
1/128
PSTN/ISDN/HSL port
1/160
xDSL port
1/128
E1 port
1/128
ETH port
1/128
MD5500
1.5
8850
18
8825
18
8750
18
MA5200V1R2/R9
3
MSAN (calculation based on the number of managed ports)
DSLAM (calculation based on the number of managed ports)
Other NEs (calculation based on the NE types)
17.2 Manageable MSTP Series Equipment Manageable MSTP series equipment is listed as follows:
17-12
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
17 Management Capability
Table 17-5 Manageable MSTP series equipment Category
Equipment
Description
SDH series
OptiX 155C
OptiX 155C SDH transmission unit for the access network
OptiX 155S
OptiX 155S simplified STM-1 optical transmission system
OptiX 1556/622B_I
OptiX 155/622B STM-1/STM-4 compatible optical transmission system (19-inch rack)
OptiX 1556/622B_II
MSTP series
OSN series
Issue 03 (2010-11-02)
OptiX 2500
OptiX 2500 STM-4/STM-16 compatible optical transmission system
OptiX 2500 REG
OptiX 2500 REG STM-16 regenerator
OptiX Metro 100
OptiX Metro 100 terminal STM-1 optical transmission system
OptiX Metro 200
OptiX Metro 200 ultra compact STM-1 optical transmission system
OptiX Metro 500
OptiX Metro 500 ultra compact STM-1 multi-service transmission system
OptiX 155/622H (Metro 1000)
OptiX 155/622H(Metro1000) STM-1/STM-4 MSTP
OptiX Metro 1000
OptiX 155/622H(Metro1000) STM-1/STM-4 MSTP optical transmission system V3 series
OptiX Metro 1050
OptiX Metro 1050 compact STM-1/STM-4 multi-service optical transmission system
OptiX Metro 1100
OptiX Metro 1100 compact container STM-16 multi-service transmission system
OptiX 155/622 (Metro 2050)
OptiX 155/622(Metro2050) STM-1/STM-4 compatible optical transmission system
OptiX 2500+ (Metro 3000)
OptiX 2500+(Metro3000) STM-16 MADM/MSTP optical transmission system
OptiX Metro 3100
OptiX Metro 3100 STM-16 multi-service transmission system
OptiX 10G (Metro 5000)
OptiX 10G(Metro5000)STM-64 MADM optical transmission system
OptiX OSN 500
OptiX OSN 500 STM-1/STM-4 multi-service CPE optical transmission system
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
17-13
iManager U2000 Unified Network Management System Product Description
17 Management Capability
Category
Equipment
Description
OptiX OSN 1500
OptiX OSN 1500 intelligent optical transmission system
OptiX OSN 2000
OptiX OSN 2000 enhanced STM-1/STM-4 multi-service optical transmission system
OptiX OSN 2500
OptiX OSN 2500 intelligent optical transmission system
OptiX OSN 2500 REG
OptiX OSN 2500 REG STM-16 regenerator
OptiX OSN 3500
OptiX OSN 3500 intelligent optical transmission system
OptiX OSN 3500 II OptiX OSN 7500
OptiX OSN 7500 intelligent optical switching system
OptiX OSN 9500
OptiX OSN 9500 intelligent optical switching system
17.3 Manageable WDM Series Equipment Manageable WDM series equipment is listed as follows: Table 17-6 Manageable WDM equipment
17-14
Category
Equipment
Description
Metro WDM series
OptiX Metro 6020
OptiX Metro 6020 compact container CWDM system V100R001
OptiX Metro 6040
OptiX Metro 6040 compact container WDM system V100R001
OptiX Metro 6040 V2
OptiX Metro 6040 compact container DWDM system V200R001 or higher
OptiX Metro 6100
OptiX Metro 6100 DWDM multi-service transmission system V100R002
OptiX Metro 6100V1
OptiX Metro 6100 DWDM multi-service transmission system V100R003
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Category
LH WDM series
NG WDM series
17 Management Capability
Equipment
Description
OptiX Metro 6100 V1E
OptiX Metro 6100 WDM multi-service transmission system V100R004 or higher
OptiX OSN 900A
OptiX OSN 900A compact WDM system (A Type)
OptiX BWS 320G
OptiX BWS 320G backbone DWDM optical transmission system V300R002
OptiX BWS 320G V3
OptiX BWS 320G backbone DWDM optical transmission system V300R004
OptiX BWS 1600G, OptiX BWS 1600G OLA
OptiX BWS 1600G backbone DWDM optical transmission system V100R003 or higher
OptiX OTU40000
OptiX OTU 40000 backbone DWDM optical transmission system
OptiX OSN 1800
OptiX OSN 1800 compact multi-service edge optical transport platform
OptiX OSN 3800
OptiX OSN 3800 compact intelligent optical transport platform
OptiX OSN 6800
OptiX OSN 6800 intelligent optical transport platform
OptiX OSN 8800/8800 II
OptiX OSN 8800 I/ 8800 II intelligent optical transport platform
The OptiX BWS 1600G OLA is an independent power supply subrack. It is supported by the OptiX BWS 1600G backbone DWDM optical transmission system V100R004 and higher versions.
17.4 Manageable NA WDM Series Equipment Manageable NA WDM series equipment is listed as follows:
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
17-15
iManager U2000 Unified Network Management System Product Description
17 Management Capability
Table 17-7 Manageable NA WDM series equipment Category
Equipment
Description
LH WDM series
OptiX BWS 1600A
OptiX BWS 1600A WDM Optical Transmission System
OptiX BWS 1600G(NA)
OptiX BWS 1600G(NA) Backbone DWDM Optical Transmission System
OptiX OSN 1800(NA) compact intelligent optical transport platform
OptiX OSN 1800(NA)
OptiX OSN 3800A compact intelligent optical transport platform
OptiX OSN 3800A
OptiX OSN 6800A intelligent optical transport platform
OptiX OSN 6800A
OptiX OSN 8800 I/II(NA) intelligent optical transport platform
OptiX OSN 8800 I/II(NA)
NG WDM series
17.5 Manageable Marine Series Equipment Manageable marine series equipment is listed as follows: Table 17-8 Manageable marine series equipment Category
Equipment
Description
Submarine line series
OptiX SLM 1630
OptiX SLM 1630 submarine line monitor
OptiX PFE 1670
OptiX PFE 1670 Power Feeding Equipment
OptiX BWS 1600S
OptiX BWS 1600S submarine line terminal equipment
17.6 Manageable RTN Series Equipment Manageable RTN series equipment is listed as follows:
17-16
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
17 Management Capability
Table 17-9 Manageable RTN equipment Category
Equipment
Description
RTN series
OptiX RTN 605
OptiX RTN 605 radio transmission system
OptiX RTN 610
OptiX RTN 610 radio transmission system
OptiX RTN 620
OptiX RTN 620 radio transmission system
OptiX RTN 910
OptiX RTN 910 radio transmission system
OptiX RTN 950
OptiX RTN 950 radio transmission system
OptiX RTN 5000S
OptiX RTN 5000S radio transmission system
17.7 Manageable PTN Series Equipment Manageable PTN series equipment is listed as follows: Table 17-10 Manageable PTN series equipment Category
Equipment
Description
PTN series
OptiX PTN 1900
OptiX PTN 1900 optical network PTN series multi-service packet transmission platform
OptiX PTN 3900
OptiX PTN 3900 optical network PTN series multi-service packet transmission platform
OptiX PTN 912
OptiX PTN 912 optical network PTN series multi-service packet transmission platform
OptiX PTN 910
OptiX PTN 910 optical network PTN series multi-service packet transmission platform
OptiX PTN 950
OptiX PTN 950 optical network PTN series multi-service packet transmission platform
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
17-17
iManager U2000 Unified Network Management System Product Description
17 Management Capability
17.8 Manageable FTTx Series Equipment Manageable FTTx series equipment are listed as follows: Table 17-11 Manageable FTTx series equipment Category
Equipment
Description
OLT series
MA5600T
SmartAX MA5600T Multi-service Access Module
MA5603T
SmartAX MA5603T Optical Access Equipment
MA5680T
SmartAX MA5680T Optical Access Equipment
MA5683T
SmartAX MA5683T Optical Access Equipment
MA5606T
SmartAX MA5606T Optical Access Equipment, Only the version of V800R105 support.
MA5606T
SmartAX MA5606T Optical Access Equipment
MA5620
SmartAX MA5620 Multiple Dwelling Unit
MA5626
SmartAX MA5626 Multiple Dwelling Unit
MA5620E
SmartAX MA5620E EPON Multiple Dwelling Unit
MA5626E
SmartAX MA5626E EPON Multiple Dwelling Unit
MA5620G
SmartAX MA5620G GPON Multiple Dwelling Unit
MA5626G
SmartAX MA5626G GPON Multiple Dwelling Unit
MA5610
SmartAX MA5610 Multi-service Access Module
MA5612
SmartAX MA5612 Multi-service Access Module
MA5616
SmartAX MA5616 Multi-service Access Module
ONU series
17-18
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Category
17 Management Capability
Equipment
Description
MA5651
SmartAX MA5651 Multiple Dwelling Unit
MA5651G
SmartAX MA5651G Multiple Dwelling Unit
MA5652G
SmartAX MA5652G GPON Multiple Dwelling Unit
MA5635
SmartAX MA5635 Multi-service Access Module
ATN930
ATN930 FMC Multi-service Access Unit
SRG2220
SRG2220 Service Router Gateway
17.9 Manageable MSAN Series Equipment Manageable MSAN series equipment are listed as follows: Table 17-12 Manageable MSAN series equipment Category
Equipment
Description
UA5000 series
UA5000
UA5000 Universal Access Unit
UA5000(PVU)
UA5000 Universal Access Unit
UA5000(IPMB)
UA5000 Universal Access Unit
UA5000(PVMV1)
UA5000 Universal Access Unit
MD5500
MD5500 Multi-service Distribution Module
MD5500 series
17.10 Manageable DSLAM Series Equipment Manageable DSLAM series equipment are listed as follows: Table 17-13 Manageable DSLAM series equipment Category
Equipment
Description
MA5100 series
MA5100V1
SmartAX MA5100 Multi-service Access Module
MA5100V2
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
17-19
iManager U2000 Unified Network Management System Product Description
17 Management Capability
Category
Equipment
Description
MA5105 series
MA5105
SmartAX MA5105 Multi-service Access Module
MA5605 series
MA5605
SmartAX MA5605 Multi-service Access Module
MA5615 series
MA5615
SmartAX MA5615 Broadband Access System
MA5300 series
MA5300
SmartAX MA5300 Broadband Access System
MA5600 series
MA5600V3
SmartAX MA5600 Multi-service Access Module
MA5600V8 series
MA5600T
SmartAX MA5600T Multi-service Access Module
MA5603T
SmartAX MA5603T Multi-service Access Module
MA5606T
SmartAX MA5606T Multi-service Access Module
17.11 Manageable Router Series Equipment Manageable router series equipment are listed as follows: Table 17-14 Manageable router series equipment
17-20
Category
Device
Description
NE series routers
NE05
Net engine 05 router
NE08
Net engine 08 router
NE16
Net engine 16 router
NE08E
Net engine 08E router
NE16E
Net engine 16E router
NE20
Net engine 20 router
NE20E
Net engine 20E router
NE40
Net engine 40 universal switching router
NE80
Net engine 80 universal switching router
NE40E/NE80E
Net engine 40E/80E core router
NE5000E
Net engine 5000E core router
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
17 Management Capability
Category
Device
Description
R/AR series routers
R series routers
R series routers
AR18
Advanced router 18 serials router
AR28
Advanced router 28 serials router
AR46
Advanced router 46 serials router
AR19
Advanced router 19 serials router
AR29
Advanced router 29 serials router
AR49
Advanced router 49 serials router
17.12 Manageable Switch Series Equipment Manageable switch series equipment are listed as follows: Table 17-15 Manageable switch series equipment Category
Device
Description
S8500 series switches
S8505
Quidway S8505 routing switch
S8505E
Quidway S8505E routing switch
S8508
Quidway S8508 Lanswitch
S8512
Quidway S8512 routing switch
S6502
Quidway S6502 Lanswitch
S6503
Quidway S6502 Ethernet switch
S6506R
Quidway S6506R Ethernet switch
S6506
Quidway S6506 Ethernet switch
S5000 series switches
Quidway S5000 Lanswitch
S5500 series switches
Quidway S5500 Lanswitch
S5600 series switches
Quidway S5600 Lanswitch
S3000 series switches
Quidway S3000 Lanswitch
S3500 series switches
Quidway S3500 Lanswitch
S3900 series switches
Quidway S3900 Lanswitch
S2000 series switches
Quidway S2000 Lanswitch
S2400 series switches
Quidway S2400 Lanswitch
S6500 series switches
S5000 series switches
S3000 series switches
S2000 series switches
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
17-21
iManager U2000 Unified Network Management System Product Description
17 Management Capability
Category
Device
Description
box series switches
S2300 series switches
Quidway S2300 Ethernet switch
S3300 series switches
Quidway S3300 Lanswitch
S5300 series switches
Quidway S5300 Lanswitch
S9300 series switches
Quidway S9300 Lanswitch
frame series switches
17.13 Manageable Metro Service Platform Equipment Manageable Metro service platform equipment are listed as follows: Table 17-16 Manageable Metro service platform equipment Category
Device
Description
CX series devices
CX200
Quidway carrier switch platform 200
CX200C
Quidway carrier switch platform 200C
CX200D
Quidway carrier switch platform 200D
CX300
Quidway carrier switch platform 300
CX380
Quidway carrier switch platform 380
CX600
Quidway carrier switch platform 600
17.14 Manageable Broadband Access Series Equipment Manageable broadband access series equipment are listed as follows: Table 17-17 Manageable broadband access series equipment
17-22
Category
Device
Description
Multi-service gateways
MA5200E
Multiservice access 5200E service gateway
MA5200F
Multiservice access 5200F service gateway
MA5200G
Multiservice access 5200G service gateway
ME60 series
Multiservice engine 60 serials service gateway
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
17 Management Capability
17.15 Manageable VoIP Gateway Equipment Manageable VoIP gateway equipment are listed as follows: Table 17-18 Manageable VoIP gateway equipment Category
Device
Description
VoIP Gateway
VG10
VoIP gateways 10
VG20
VoIP gateways 20
VG80
VoIP gateways 80
XE series
17.16 Manageable WLAN Series equipment Manageable WLAN Series equipment are listed as follows: Table 17-19 Manageable WLAN series equipment Category
Device
Description
WLAN
WA10 AP
WLAN 10
WA12 AP
WLAN 12
17.17 Manageable Firewall Series Equipment Manageable firewall series equipment are listed as follows: Table 17-20 Manageable firewall series equipment Category
Device
Description
Eudemon
Eudemon 8040
Eudemon 8000 series Firewall
Eudemon 8080
Eudemon 8000 series Firewall
Eudemon 1000
Eudemon 1000 series Firewall
Eudemon 500
Eudemon 500 series Firewall
Eudemon 300
Eudemon 300 series Firewall
Eudemon 8080E
Eudemon 8000E series Firewall
Eudemon 8160E
Eudemon 8000E series Firewall
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
17-23
iManager U2000 Unified Network Management System Product Description
17 Management Capability
Category
USG
17-24
Device
Description
Eudemon 1000E-U2
Eudemon 1000E series Firewall
Eudemon 1000E-U3
Eudemon 1000E series Firewall
Eudemon 1000E-U5
Eudemon 1000E series Firewall
Eudemon 1000E-U6
Eudemon 1000E series Firewall
Eudemon 200E_B
Eudemon 200E series Firewall
Eudemon 200E_C
Eudemon 200E series Firewall
Eudemon 200E_F
Eudemon 200E series Firewall
Eudemon 200S
Eudemon 200S series Firewall
Eudemon 100E
Eudemon 100E series Firewall
Eudemon 6080E
Eudemon 6000E series Firewall
USG9210
USG9210 Unified Security Gateway
USG9220
USG9220 Unified Security Gateway
USG9310
USG9310 Unified Security Gateway
USG9320
USG9320 Unified Security Gateway
USG5320
USG5320 Unified Security Gateway
USG5330
USG5330 Unified Security Gateway
USG5350
USG5350 Unified Security Gateway
USG5360
USG5360 Unified Security Gateway
USG3030
USG3030 Unified Security Gateway
USG3040
USG3040 Unified Security Gateway
USG2130
USG2130 Unified Security Gateway
USG2130W
USG2100 Unified Security Gateway
USG2130P
USG2100 Unified Security Gateway
USG2130WP
USG2100 Unified Security Gateway
USG2130BSR
USG2100 Unified Security Gateway
USG2130BSR-W
USG2100 Unified Security Gateway
USG2130HSR
USG2100 Unified Security Gateway
USG2130HSR-W
USG2100 Unified Security Gateway
USG2130HSR-P
USG2100 Unified Security Gateway
USG2130HSR-WP
USG2100 Unified Security Gateway
USG2120BSR
USG2100 Unified Security Gateway
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Category
SRG
Issue 03 (2010-11-02)
17 Management Capability
Device
Description
USG2110
USG2110 Unified Security Gateway
USG2160
USG2100 Unified Security Gateway
USG2160W
USG2100 Unified Security Gateway
USG2160P
USG2100 Unified Security Gateway
USG2160WP
USG2100 Unified Security Gateway
USG2160BSR
USG2100 Unified Security Gateway
USG2160BSR-W
USG2100 Unified Security Gateway
USG2160HSR
USG2100 Unified Security Gateway
USG2160HSR-W
USG2100 Unified Security Gateway
USG2160HSR-P
USG2100 Unified Security Gateway
USG2160HSR-WP
USG2100 Unified Security Gateway
USG5120
USG5100 Unified Security Gateway
USG5120-D
USG5100 Unified Security Gateway
USG5120BSR
USG5100 Unified Security Gateway
USG5120BSR-D
USG5100 Unified Security Gateway
USG5120HSR
USG5100 Unified Security Gateway
USG5150
USG5100 Unified Security Gateway
USG5150BSR
USG5100 Unified Security Gateway
USG5150HSR
USG5100 Unified Security Gateway
USG2210
USG2210 Unified Security Gateway
USG2220
USG2220 Unified Security Gateway
USG2230
USG2230 Unified Security Gateway
USG2250
USG2250 Unified Security Gateway
USG50
USG50 Unified Security Gateway
USG9110
USG9110 Unified Security Gateway
USG9120
USG9120 Unified Security Gateway
SRG1210-S
SRG1200 Secure Routing Gateway
SRG1210
SRG1200 Secure Routing Gateway
SRG1210W
SRG1200 Secure Routing Gateway
SRG1210P
SRG1200 Secure Routing Gateway
SRG1210WP
SRG1200 Secure Routing Gateway
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
17-25
iManager U2000 Unified Network Management System Product Description
17 Management Capability
Category
EGW
Device
Description
SRG1220
SRG1200 Secure Routing Gateway
SRG1220W
SRG1200 Secure Routing Gateway
SRG1220P
SRG1200 Secure Routing Gateway
SRG1220WP
SRG1200 Secure Routing Gateway
SRG20-11
SRG20 Secure Routing Gateway
SRG20-12
SRG20 Secure Routing Gateway
SRG20-15
SRG20 Secure Routing Gateway
SRG20-20
SRG20 Secure Routing Gateway
SRG20-21
SRG20 Secure Routing Gateway
SRG20-30
SRG20 Secure Routing Gateway
SRG20-31
SRG20 Secure Routing Gateway
SRG20-31-D
SRG20 Secure Routing Gateway
SRG3230
SRG3200 Secure Routing Gateway
SRG3230-D
SRG3200 Secure Routing Gateway
SRG3240
SRG3200 Secure Routing Gateway
SRG3240-D
SRG3200 Secure Routing Gateway
SRG3250
SRG3200 Secure Routing Gateway
SRG3260
SRG3200 Secure Routing Gateway
EGW2130
EGW2100 series Enterprise Gateway
EGW2160
EGW2100 series Enterprise Gateway
17.18 Manageable Service Inspection Gateway Equipment Manageable service inspection gateway equipment are listed as follows: Table 17-21 Manageable service inspection gateway equipment
17-26
Category
Device
Description
SIG
SIG9810
SIG9810 Service Inspection Gateway
SIG9820
SIG9810 Service Inspection Gateway
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Category
17 Management Capability
Device
Description
SIG9800 Server
SIG9800 Server Service Inspection Gateway Server
17.19 Manageable SVN Series Equipment Manageable SVN series equipment are listed as follows: Table 17-22 Manageable SVN series equipment Category
Device
Description
SVN
SVN3000
SVN3000
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
17-27
iManager U2000 Unified Network Management System Product Description
18
18 Standards Compliance
Standards Compliance
This topic describes the standards that the U2000 is compliant with. The U2000 is developed according to the network management system model that the ITU-T TMN series standards define. The information model is constructed based on the object-oriented concept. Complying with multiple standards, the U2000 has good expandability and reusability. The U2000 complies with the following international standards and protocols:
RFC 793 Telnet/TCP/IP standards
RFC 1155, RFC 1157, RFC 1212, RFC 1213 and RFC 1215 SNMP V1 series standards
RFC 1905, RFC 1906, RFC 1907, RFC 1908, RFC 2011, RFC 2012, RFC 2013, RFC 2571, RFC 2572, RFC 2573, RFC 2574, RFC 2576, RFC 2578, RFC 2579, and RFC 2580 SNMP V2 series standards
RFC 3411, RFC 3412, RFC 3413, RFC 3414, RFC 3415, RFC 3416, RFC 3417, and RFC 3418 SNMP V3 series standards
RFC 3164 Syslog standards
ISO 8824 and ISO 8825 ASN.1 standards
ITU-T standards for managing the telecommunications management network: M.3000, M.3010, M.3020, M.3100, and M.3400 (without accounting)
HTTP and JAVA interface protocols and standards
W3C SOAP 1.1/WSDL
TL1 (Telcordia GR-811, GR-831, etc.)
The XML service delivery and inventory query are based on the MTOSI standards as follows: TMF 517, TMF 608, and TMF 854
CORBA 2.5 protocol
ISO 8824 and ISO 8825 ASN.1 standards
The CORBA alarm northbound interface complies with the MTNM standards as follows: TMF 513, TMF 608, and TMF 814
Table 18-1 lists the details of the standards and protocols.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
18-1
iManager U2000 Unified Network Management System Product Description
18 Standards Compliance
Table 18-1 Details of the Standards and Protocols Standards and Protocols
18-2
Description
RFC 793
Transmission Control Protocol (Darpa Internet Program Protocol Specification)
RFC 1155
Structure and Identification of Management Information for TCP/IP-based Internets
RFC 1212
Concise MIB Definitions
RFC 1213
Management Information Base for Network Management of TCP/IP-based Internets: MIB-II
RFC 1215
A Convention for Defining Traps for use with the SNMP
RFC 1905
Protocol Operations for Version 2 of the Simple Network Management Protocol
RFC 1906
Transport Mappings for Version 2 of the Simple Network Management Protocol
RFC 1907
Management Information Base for Version 2 of the Simple Network Management Protocol
RFC 1908
Coexistence between Version 1 and Version 2 of the Internet-standard Network Management Framework
RFC 2011
SNMPv2 Management Information Base for the Internet Protocol using SMIv2
RFC 2012
SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2
RFC 2013
SNMPv2 Management Information Base for the User Datagram Protocol using SMIv2
RFC 2571
An Architecture for Describing SNMP Management Frameworks
RFC 2572
Message Processing and Dispatching for the Simple Network Management Protocol
RFC 2573
SNMP Applications
RFC 2574
User-based Security Model (USM) for version 3 of the Simple Network Management Protocol
RFC 2576
Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework
RFC 2578
Structure of Management Information Version 2 (SMIv2)
RFC 2579
Textual Conventions for SMIv2
RFC 2580
Conformance Statements for SMIv2
RFC 3411
An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Standards and Protocols
18 Standards Compliance
Description
RFC 3412
Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)
RFC 3413
Simple Network Management Protocol (SNMP) Applications
RFC 3414
User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)
RFC 3415
View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)
RFC 3416
Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)
RFC 3417
Transport Mappings for the Simple Network Management Protocol (SNMP)
RFC 3418
Management Information Base (MIB) for the Simple Network Management Protocol (SNMP)
RFC 3164
BSD syslog Protocol
ISO 8824-4-200 0
Information Technology - Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 Specifications Amendment 1: ASN.1 semantic model
ISO 8825-2-199 8
Information Technology - ASN.1 Encoding Rules: Specification of Packed Encoding Rules (PER) Second Edition; Technical Corrigendum 1: 12/15/1999; Amendment 1: 12/01/2000
ITU-T M.3000
Overview of TMN recommendations
ITU-T M.3010
Principles for a telecommunications management network
ITU-T M.3013
Considerations for a telecommunications management network
ITU-T M.3017
Framework for the integrated management of hybrid circuit/packet networks
ITU-T M.3020
TMN interface specification methodology
ITU-T M.3100
Generic network information model
ITU-T M.3101
Managed Object Conformance statements for the generic network information model
ITU-T M.3180
Catalogue of TMN management information
ITU-T M.3200
TMN management services and telecommunications managed areas: overview
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
18-3
iManager U2000 Unified Network Management System Product Description
18 Standards Compliance
Standards and Protocols
18-4
Description
ITU-T M.3300
TMN F interface requirements
ITU-T M.3400
TMN management functions
ITU-T X.720
Management information model
ITU-T X.721
Definition of management information
ITU-T X.722
Guidelines for the definition of managed objects
ITU-T X.733
Information technology - Open Systems Interconnection - Systems Management: alarm reporting function
ITU-T X.903
Information technology - Open distributed processing - Reference Model: architecture
ITU-T G.707
Network node interface for the synchronous digital hierarchy (SDH)
ITU-T G.773
Protocol suites for Q-interfaces for management of transmission systems
ITU-T G.774 (01, 02, 03, 04)
Synchronous digital hierarchy (SDH) - Management information model for the network element view
ITU-T G.783
Characteristics of synchronous digital hierarchy (SDH) equipment functional blocks
ITU-T G.784
Synchronous digital hierarchy (SDH) management
ITU-T G.803
Architecture of transport networks based on the synchronous digital hierarchy (SDH)
ITU-T G.831
Management capabilities of transport networks based on the synchronous digital hierarchy (SDH)
ITU-T G.851.1
Management of the transport network - Application of the RM-ODP framework
ITU-T G.852.1
Enterprise viewpoint for simple subnetwork connection management
ITU-T G.852.2
Enterprise viewpoint description of transport network resource model
ITU-T G.852.3
Enterprise viewpoint for topology management
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Standards and Protocols
18 Standards Compliance
Description
ITU-T G.852.6
Enterprise viewpoint for trail management
ITU-T G.853.1
Common elements of the information viewpoint for the management of a transport network
ITU-T G.853.2
Subnetwork connection management information viewpoint
ITU-T G.853.3
Information viewpoint for topology management
ITU-T G.853.6
Information viewpoint for trail management
ITU-T G.854.1
Computational interfaces for basic transport network model
ITU-T G.854.3
Computational viewpoint for topology management
ITU-T G.854.6
Computational viewpoint for trail management
Rational Unified Process 5.5
Rational Unified Process
Sif99025
EML-NML interface models
TMF513 V2.0
Multi-Technology Network Management Business Agreement NML-EML Interface Version 2.0
TMF608 V2.0
Multi-Technology Network Management Information Agreement NML-EML Interface Version 2.0
TMF814 V2.0
Multi Technology Network Management Solution Set Conformance Document Version 2.0
TMF814 V2.0
Multi Technology Network Management Solution Set Conformance Document Version 2.0
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
18-5
iManager U2000 Unified Network Management System Product Description
A Glossary
A
Glossary
A Abnormal Resource
When the NMS carries out the operation of device resource polling on the device management module or the module is refreshed manually, the physical resources of some devices, such as the card, sub-card and port, cannot be accessed because they have been deleted or have some faults. So, after the NMS carries out the operation of device resource polling on the device management module or the module is refreshed manually again, the result of polling the physical resources differ from the first time. The physical resources that cannot be polled in the second time are called the abnormal resource.
AIS insertion
If there are excessive errors in a channel, AIS can be inserted in this channel to indicate it is unavailable. For a line board, you can set whether to insert AIS when there are excessive errors in the B1, B2 and B3 bytes. For a tributary board at the E1 or T1 level, you can set whether to insert AIS when there are excessive errors in BIP-2. For a tributary board at the E3 level or higher, you can set whether to insert AIS when there are excessive errors in the B3 byte.
AIS
Alarm Indication Signal. A signal sent downstream in a digital network if an upstream failure has been detected and persists for a certain time.
Alarm correlation analysis
In the case alarm2 is raised within five seconds after alarm1 is raised, and alarm2 complies with the conditions defined in the alarm correlation analysis rule, you can either suppress the alarm2 or raise its severity level according to the behavior defined in the alarm correlation rule. Such a process is called alarm correlation analysis.
Alarm Level
Alarm level is to identify the severity of an alarm or event. It is divided up into four levels: critical, major, minor, warning alarm.
Alarm Status
Device reports the trap information to NMS. NMS displays the received information on the alarm start on the topological view. The alarm state contains four types: urgent alarm, important alarm, subordinate alarm and prompt alarm.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
A-1
iManager U2000 Unified Network Management System Product Description
A Glossary
Auto Discovery
NMS tests the remote device by using PING or the SNMP parameter module configured in advanced to discover the IP device or the device that supports SNMP and to add the discovered devices automatically.
Alarm reversion
For the port that has already been configured but not actually loaded with services, this function can be used to avoid generating relevant alarm information, thus preventing alarm interference.
Alarm severity
According to ITU-T recommendations, the alarm is classified into four severities: Critical, Major, Minor, and Warning.
Alarm suppression
The suppressed alarm of a specific object is not reported. The object here may be the networkwide equipment, a specific NE, a specific board and even a specific function module of a specific board.
Alarm
A visible or an audible indication to notify the person concerned that a failure or an emergency has occurred. See also Event.
ATM protection group
An ATM protection group refers to the logically bound ATM VP network or subnetwork connections that share the same physical transmission channel. In the VP group (VPG), a pair of VP connections (working connection and its protection connection) is used for monitoring the automatic protection switching, called monitoring connections (APS VPCs). If the monitoring connections switch over, the whole VPG will switch over to quicken the ATM protection switching (as quick as the protection switching of the SDH layer.
ALS
Automatic Laser Shutdown. ALS is turned on when the optical interface board does not carry services or the optical fibre is faulty. Its service life can be prolonged by decreasing the duration during which laser is on.
Attribute
Property of an object.
Automatic switching
When the active board or path fails, the standby one can automatically take over the job of the active one.
B
A-2
Band Width
In the data communication area, bandwidth specifies the maximum value of the rate when the data passes through some data channel.
Baseline
Select the test result when the line is in good condition as the line test baseline, to provide a basis of comparison and analysis for the following line test result.
Baseline collection test
One of the test types for submarine line. In the case of deployment or fault restoration, or when updating the baseline is required, you need to collect the baseline, to provide reference for comparison tests, and alerts or alarms.
Binding
In virtual concatenated payload configuration, designating one binding number to identify the VC4s of the same virtual concatenated payload is called "bind". If a fault occurs to one of the bound services, all bound services will switch as a whole.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
Bit error alarm threshold
A Glossary
When the bit error reaches a specific limit, the equipment will report an alarm. This limit is the bit error alarm threshold. The threshold can be divided into crossing threshold and defect threshold.
C Comparison test in periodic mode
One of the test types for submarine line. Carry out polling tests for multiple lines on the same LMU board periodically, compare the test result with the baseline data in in-service mode, and provide alerts or alarms for the line.
Comparison test in single-test mode
One of the test types for submarine line. Test a line by using test parameters of the baseline collection test in in-service mode, compare the test result with the baseline data, and provide alerts or alarms for the line.
Check alarms
The check feature compares one (or more) uncleared alarm on the NMS with that on the NE. If an alarm is included in the current alarms on the NE, it is kept on the NMS. If not, it will be removed from the NMS.
Client
A kind of terminal (PC or workstation) connected to a network that can send instructions to a server and get results through a user interface. See also server.
Clock View
The Clock View provides a visible platform to enable:1. NE clock settings2. Networkwide clock synchronisation status query3. Clock tracing and search functions
Configuration data
The data that configures the NE hardware for coordination between this NE and other NEs in the entire network and operation of specified services. Configuration data is the instruction file of NEs, and it is the key for efficient network running. The typical configuration data includes board configuration, clock configuration and protection relationship.
Configuration management
Configuration management enables inventory query of network configuration resources, including relevant configuration of NMS or SNMS, NE, subnet, links, SNC, route, TP, edge point, equipment, and so on. Real-time inventory change report can also be provided through this resource, it will be timely reported to the upper NMS to notify the carrier of the current network operation status and ensure data consistency of the upper NMS or SNMS.
Configure
To set the basic parameters of an operation object.
Connection point
A reference point where the output of a trail termination source or a connection is bound to the input of another connection, or where the output of a connection is bound to the input of a trail termination sink or another connection. The connection point is characterized by the information which passes across it. A bidirectional connection point is formed by the association of a contradirectional pair.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
A-3
iManager U2000 Unified Network Management System Product Description
A Glossary
Connection
A "transport entity" which consists of an associated pair of "unidirectional connections" capable of simultaneously transferring information in opposite directions between their respective inputs and outputs.
Current alarms
Alarms that do not clear, or has cleared but is not acknowledged.
Current performance data
The performance data stored in the current register is called current performance data. The current 15-minute or 24-hour register (only one for each) is applied to collect the performance data in the current monitoring period. It changed within the monitor period.
Change Audit Service
Change Audit Service is developed to record the change on the network device, including the changes on the information about the device, the configuration and the mapping. It provides one integrated database. Every application program records these changes in the database and ensures that these changes in the database are reflected on other applications.
Cluster
The cluster is an administrative domain composed of a set of switches. It consists of a command switch and multiple member switches. The management over all the switches within the cluster is realized through a public IP address.
Configuration File
Text file, including various configuration on the device.
D DCC
Within an STM-N signal there are two DCC channels, one is the 192 kbit/s DCC-R channel composed of bytes D1-D3, and the other is the 576 kbit/s DCC- channel composed of bytes D4-D12. All NEs can communicate with one another through the DCC-R. The DCC-M is not the regenerator section overhead and does not support communications among regenerators, and it is used to support communication channels of more universal purpose.
DNI
Dual Node Interconnection. The protection mode defined in G. 842 Recommendation for the inter-ring service . By using the recommended protection modes, the protection of the interconnecting service between two ring networks composed of the devices from different manufacturers and in different protection modes can be realised. Moreover, in case of fibre failure or node failure, services can also be protected.
Domain
The domain of the NMS specifies the scope of address or functions which are available to a certain user.
Dump
Dump is a process of exporting alarm data from the database to the customized file and meanwhile the exported data is cleared in the database.
E
A-4
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
A Glossary
EMU
Environment Monitoring Unit. As one type of power and environment monitoring unit, EMU is installed on the top of the OptiX 155/622H equipment cabinet to monitor the environment variables, such as the power supply and temperature. With external signal input through the relay, fire alarm, smoke alarm, burglary alarm, and so on can be monitored as well. Displayed on the NMS, the change of environment can be monitored timely and accurately.
Equipment set
An aggregate of multiple managed equipment. Equipment set facilitates the user authority management on equipment in the management domain of the NMS. If some operation authorities over one equipment set are assigned to a user (user group), these operation authorities over all equipment of the equipment set are assigned to the user (user group).
F Failure
The fault cause persisted long enough to consider the ability of an item to perform a required function to be terminated. The item may be considered as failed; a fault has now been detected.
Fault
A fault is the inability of a function to perform a required action. This does not include an inability due to preventive maintenance, lack of external resources, or planned actions.
Filter
The filter is used to filter the matched logs and have the unmatched one left.
Forced switch
This command performs the ring switch from working channels to the protection channels. This switch occurs regardless of the state of the protection channels, unless the protection channels are satisfying a higher priority bridge request.
H History alarms
Alarms that have cleared and been acknowledged.
History performance data
The performance data stored in the history register and the auto-report performance data stored on the NMS are called history performance data in a unified way.
I Intermediate office
Issue 03 (2010-11-02)
It refers to the equipment used for optical fibre management and dispatch in the metropolitan area. It has multiple pairs of interfaces for the optical fibre connection. Every two interfaces in a pair are connected with each other to form a longer physical optical fibre path. The physical optical fibre path connecting the transmission equipment can comprise two or more sections of optical fibre cascaded via the intermediate office. There is an intermediate office information list for some fibre & cable connections, which shows the section information about the fibre & cable.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
A-5
iManager U2000 Unified Network Management System Product Description
A Glossary
In-Service Mode
One of the test modes for submarine line. By using the in-service test mode , you can test submarine cables and repeaters without damaging the existing services of the submarine system.
Image (OS)
Binary file, equivalent to the OS of the device and a part of the device version.
IP address
In the TCP/IP protocol, it is used to uniquely identify the address of the communication port, which consists of four bytes in decimal digits, for example, 129.9.161.55.
J This index shows the delay stability of many Ping operations with the unit of ms.
Jitter
L Label
A mark on a cable, a subrack, or a cabinet for identification.
Layer
A concept used to allow the transport network functionality to be described hierarchically as successive levels; each layer being solely concerned with the generation and transfer of its characteristic information.
LCT
Local Craft Terminal. The LCT provides the user with single-layer management network solutions to the transmission network of up to five NEs to realise integrated management of multi-service transmission network. Usually it uses the cross-over cable or serial port cable to connect one NE, so as to configure and maintain a single NE. See also U2000 LCT.
Licence
A permission provided by a vendor to authorise the use of specific functions of a product. Usually the licence consists of encrypted codes, and the operation authority varies with different level of licence.
Link
The link is responsible to transmit the data from one station to next neighbour station correctly.
Lock NE login
This function prohibits the users at lower levels from logging in NE and forces logged NE users with lower level to log out.
M
A-6
Main Topology
The default NMS client interface and all topology management functions are accessed here.
Management information
The signal passing across an access point.
Manual switch
When the protection channel is efficient and there is no higher-level switching request, this mode switches the service from the working channel to the protection channel, thus testing whether network still has the protection capability.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
A Glossary
Manual test
One of the test types for submarine line. You need to set test parameters manually, start the test, and save the test result as the baseline of the in-service mode.
MO
Managed Object. The management view of a resource within the telecommunication environment that may be managed via the agent. Examples of SDH managed objects are: equipment, receive port, transmit port, power supply, plug-in card, virtual container, multiplex section, and regenerator section.
MS
Multiplex Section. A multiplex section is the trail between and including two multiplex section trail termination functions.
MSP
Multiplex section protection. The nodes online achieve protection switching through the K1 and K2 bytes in the multiplex section, including linear 1+1 MS protection switching link, linear 1:n MS protection switching link, dedicated MS protection ring and shared MS protection ring.
N NE database
There are three types of database on NE SCC board as following: (1) DRDB: a dynamic database in a dynamic RAM, powered by battery; (2) SDB: a static database in a power-down RAM; (3) FDB0, FDB0: permanently saved databases in a Flash ROM. In efficient operation, the NE configuration data is saved in DRDB and SDB at the same time. Backing up an NE database means backing up the NE configuration data from SDB to FDB0 and FDB1.
NE Explorer
NE Explorer is the main operation interface of the NMS. For easy navigation, the NE Explorer window presents an expandable directory tree (Function Tree) in the lower left pane. The configuration, management and maintenance of the equipment are accessed here.
NE
Network Element. NE includes the hardware unit and the software running on it. Usually, one NE has at least an SCC (system control and communication) board which responsible for the management and monitoring of the NE. The NE software runs on the SCC board.
NM
Network Management. In the telecommunication management network structure, the NMS is located between the NE level and network level, which can supports all functions at NE level and part of the network level management functions. See also U2000.
NNI
Network Node Interface. NNI identifies the interface between the ATM network nodes. See also SDH NNI.
Node
Node is one of the topology objects and the minimum unit that represents the device displayed on the topological view. The device is displayed with the node icon on the topological view. The type of the node includes the router, the switch and the 3rd-party device and the virtual node.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
A-7
iManager U2000 Unified Network Management System Product Description
A Glossary
O Online help
An indexed collection of information on all aspects of the NMS. They can be accessed at any time from the Help menu or by pressing the F1 key.
Optical time domain reflectormeter
OTDR is an optical fault locator and analysis tool for optical fiber networks. The OTDR features a light, compact, hand-held design with an intelligent user interface that is easy and quick to use. The color LCD display and backlight design makes testing work more comfortable and convenient, whether during daylight or at night.
Out-of-Service Mode
One of the test modes for submarine line. By transmitting detection light with high power, the out-of-service test can detect the fiber status and repeater status, to realize the status detection and fault point location after fiber cut. In general, when detecting that a line is abnormal during a test in in-service mode, you can carry out a test in out-of-service mode to locate the fault.
OWSP
Optical Wavelength Shared Protection. OWSP is a bidirectional ring, where each node is equipped with an OWSP. There are two channels (λ1 and λ2) in the main optical path on the internal and external rings in each span on a ring. The fibre and the OWSP on the main optical path are connected with the optical ports inputting λ1 and λ2 on the mux/demux board (unnecessary to be connected with the OTU), and thus λ1 and λ2 can be added and dropped at every node.
P
A-8
Path protection
The working principle of path protection: When the system works in path protection mode, the PDH path uses the dual-fed and signal selection mode. Through the tributary unit and cross-connect unit, the tributary signal is sent simultaneously to the east and west lines. Meanwhile, the cross-connect matrix sends the signal dually sent from the opposite end to the tributary board through the active and standby buses, and the hardware of the tributary board will selectively receive the signal from the two groups of buses automatically according to the AIS number of the lower order path.
Path
A trail in a path layer.
Performance register
Performance register is the memory space for performance event counts, including 15-min current performance register, 24-hour current performance register, 15-min history performance register, 24-hour history performance register, UAT register and CSES register.
Performance threshold
Performance events usually have upper and lower thresholds. When the performance event count value exceeds the upper threshold, a performance threshold-crossing event is generated; when the performance event count value is below the upper threshold for a period of time, the performance threshold-crossing event is ended. In this way, performance jitter caused by some sudden events can be shielded.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
A Glossary
PMU
One type of power and environment monitoring unit.
Private line
Both communication parties are connected permanently.
Procedure
A generic term for an action.
Process
A generic term for a collection of actions.
Protection path
A specific path that is part of a protection group and is labeled protection.
Protection strategy
In case the service route provides multiple service protections, different protection strategies can be selected as required. Protection strategy refers to the protection mode given the priority in use for the trail: protection, no protection, and extra traffic. Of the above, the protection preference is divided into trail protection and sub-network connection protection.
Protection subnet
The resources that form a protection subnetwork include NEs and fiber cables. The creation of the protection subnetwork actually means that corresponding logical system is configured for each NE by means of creating the protection subnetwork, the optical interfaces (or VC4) of each board are mapped into the logical system, and then these independent logical systems are connected with one another to form a complete network structure.
Packets Loss Ratio
This index shows the packet loss ratio after many Ping operations with the unit of %.
Poll Status
The NMS polls the device status and other configuration data periodically and displays the polling results on the topology view. The polling status contains normal, unknown, off-line, light fault, subordinate fault, important fault and urgent fault.
R ROADM
Issue 03 (2010-11-02)
Reconfiguration Optical Add/Drop Multiplexing. ROADM helps you to terminate or pass through any one wavelength at every node without affecting the existing services. At the same time, ROADM can change wavelengths through the NMS remotely, to adjust wavelengths added or dropped in a quick and convenient manner. In addition, ROADM enables power equalization at path level through a built-in power equalization function, and thus adjusts power for pass-through paths in a better way than a band-based dynamic gain equalizer (DGE) does.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
A-9
iManager U2000 Unified Network Management System Product Description
A Glossary
Route
The IP route selection is in table driving mode. In each host and each router of the Internet, there is a routing table that contains information about how the service is transmitted from the source to the sink, providing a basis for route selection. Ethernet static routing in ET1 refers to the mapping relationship between the Ethernet port and the bound path. Its routing type includes port routing and VLAN routing. Port routing: It means configuring a route between the Ethernet port and the bound path port, which is usually used for point-to-point networking communication; VLAN routing: It means configuring a route between the Ethernet port and the bound path port based on the VLAN service. It can be used flexibly in point-to-point, point-to-multipoint or multipoint-to-multipoint communication. The implementation is to divide and converge the data stream according to the VLAN flag of the packet. As a VLAN flag can be added to the Ethernet port, the equipment can be applied more flexibly.
Report
The report that is generated manually in a real-time fashion.
RTT
RTT is the round trip time, which is the time delay of the ping task.
S
A-10
Script file
It is the text file describing the physical information and configuration information of the entire network, including the NE configuration file, port naming file, end-to-end configuration file, NE physical view script file, NM information file and service implementation data script file.
Schedule Task
The report on schedule task that is generated at a interval along with the periodical running of the schedule tasks.
Script
A list of instructions for performing a specific task or action, written in a scripting language.
SDH NNI
SDH Network Node Interface. It is applied to build communications connection with the equipment beyond the NMS management area. Usually, the NM creates an SDH NNI by creating a logical system on the port of an idle line board, and the NE must be a TM without protection and fibre connection.
Section
A trail in a section layer.
Settings
Parameters of an operation that can be selected by the user.
Severity
See Alarm Severity.
Subnet mask
Also referred to as the network mask off code, it is used to define network segments, so that only the computers in the same network segment can communicate with one another, thus suppressing broadcast storm between different network segments.
Subnet number
Subnetwork number is used to differentiate the different network sections in the sub-network conference. Actually it is the first several digits (one or two) of the user phone number. An orderwire phone number is composed of the sub-network number and the user number.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
A Glossary
Subnet
Sub-network is the logical entity in the transmission network and comprises a group of network management objects. A sub-network can contain NEs and other sub-networks. A sub-network planning can better the organisation of a network view.
Support
The frame on the bottom of a cabinet, when installing the cabinet on the antistatic floor.
Synchronise NE time
Send the system time of the NMS server to NEs so as to synchronise all NEs with the server.
T TDA clock source
TDA is short for Tone Data Access. For the 2500+ NE equipment, it can be installed with the external TDA board for which the clock source must be set so that the TDA board can switch according to the set clock source sequence when clock source switching occurs.
TMN
Telecommunications Management Network. The entity which provides the means used to transport and process information related to management functions for the telecommunications network.
Topology
The NMS topology is a basic component of the man-machine interactive interface. The topology clearly shows the structure of the network, the alarms of different NEs, sub-networks in the network, the communication status as well as the basic network operation status.
Trail management function
A network level management function of the NMS. Through trail management, you can configure end-to-end services, view graphic interface and visual routes of a trail, query detailed information of a trail, filter, search and locate a trail quickly, manage and maintain trails in a centralised manner, manage alarms and performance data by trail, and print a trail report.
Trail
A trail is a kind of transport entity, mainly engaged in transferring signal from the input of the trail source to the output of the trail sink, and monitoring the integrality of the transferred signal. According to the different levels of the trail, the trail includes various types (OTS, OCH, OMS, SPI, RS, MS, VC4 server trail, VC4, VC3 and VC12). Among them, OTS, OCH and OMS represent the trails in a DWDM layer network. For the ADM and TM equipment in the SDH network, each optical fibre connection corresponds to an SPI, RS or MS trail, and a trail is the general name for service carriers, including SDH and PDH services.
Tributary loopback
A fault can be located for each service path by performing loopback to each path of the tributary board. There are three kinds of loopback modes: No loopback, Outloop and Inloop.
Threshold
The alarm range will be defined after the performance data is collected. The threshold contains the upper and lower one, related with the unit and index.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
A-11
iManager U2000 Unified Network Management System Product Description
A Glossary
U U2000
To be oriented to the future network trend, the iManager U2000 that is the unifed network management system (NMS) combines all-IP and FMC, and manages carrier equipment and access equipment in a centralized manner.
UAT
Unavailable Time. A UAT event is reported when the monitored object generates 10 consecutive severely errored seconds (SES) and the SESs begin to be included in the unavailable time. The event will end when the bit error ratio per second is better than 10-3 within 10 consecutive seconds.
UNI
UNI is the abbreviation for User Network Interface. It identifies the interface between the user and the ATM network node.
Unprotected
Services transmitted through an ordinary way, once a failure or interruption occurs, the data cannot be restored for lack of protection mechanism.
Upload
Report all or part of the configuration data of the NE to the NM and overwrite the configuration data saved in the NE layer on the NM side.
User group
User set refers to the set of NMS users with the same management authorities. The default user group includes: system administrator, system maintainer, system operator and system supervisor. The attributes of user set include name and detailed description.
User
The user of the NMS client, and the user and his/her password define the corresponding authority of operation and management of the NMS.
V
A-12
VC4 loopback
The fault of each VC4 path on the optical fibre can be located by setting loopback for each VC4 path of the line. There are three kinds of loopback modes: No loopback, Outloop, Inloop.
VC4 server trail
The path rate of the VC4 server trail is 150.336Mbit/s. The VC4 server trail provides transparent channels (that is, circuit group) for circuit-layer network nodes (for example, a switch) in a path-layer network, and acts as the basic unit of inter-office communication path. When the VC4 server trail is configured, only the higher order cross-connection of VC4 is generated in the intermediate NE, but no cross-connection is generated at the two ends, that is, no service is added/dropped. Therefore, the VC4 server trail is not a traditional service. It is only the basis for VC3 and VC12 trail creation.
VCI
The VCI, shorted for Virtual Channel Identifier, occupies 16 bits in both NNI cell or UNI cell. It indicates the virtual channel in the path. The VPI and VCI together indicate a virtual connection.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
A Glossary
Organize and display rules and filter conditions of the topology data. Customize the view according to requirements of every product and organize the data in the view displayed by the topology module, such as the layer 2 view, VPN view and IP view. By default, the platform provides the physical view. The topology view can be planned according to the domain, maintenance relationship and so on.
View
Edits and displays the rule of the topology data or the filter conditions. It can be tailored according to the requirements Virtual fibre
A virtual fibre is created between SDH equipment that has WDM equipment in between. From SDH equipment perspective, creation of virtual fibres disassociates its fibre connection with WDM equipment and prevents impact on the auto fibre search function, ensuring independence of SDH trail management.From WDM equipment perspective, its service bearer layer is a virtual fibre instead of a true one after the virtual fibre is created. Deletion of the true fibre does not affect trail management.
Virtual NE
Like a common NE, a virtual NE is also displayed with an icon on a view, but it is only an NE simulated according to the practical situation, which does not represents an actual NE. Therefore, the actual status of this NE cannot be queried and its alarm status cannot be displayed with colours. Usually, when the trail management function is used for the NEs or sub-networks the NMS cannot manage, or the equipment is interconnected with other vendors' NEs for service configuration, the end-to-end service configuration method and the trail management capability are provided.
VLAN ID
Namely, it is the virtual LAN identifier. One Ethernet port can support 4K VLAN routes, and one NE can support up to 8K VLAN routes.
VPI
The VPI, shorted for Virtual Path Identifier, occupies 12 bits in the NNI cell, and 8 bits in the UNI cell.
W Wavelength protection group
The wavelength protection group is important to describe the wavelength protection structure. Its function is similar to that of the protection sub-network in the SDH NE. The wavelength path protection can only work with the correct configuration of the wavelength protection group.
WDM service
The WDM service is accessed at the client side of the OTU board that can access SAN services.
Web LCT
In the TMN architecture, the Web LCT is located in the NE management level, which can manage the RTN series and NG WDM series equipment.
Working path
A specific path that is part of a protection group and is labelled working.
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
A-13
iManager U2000 Unified Network Management System Product Description
A Glossary
A-14
WTR time
A period of time that must elapse before a - from a fault recovered trail/connection can be used again to transport the normal traffic signal and/or to select the normal traffic signal from.
WTR
Wait to Restore. This command is issued when working channels meet the restoral threshold after an SD or SF condition. It is used to maintain the state during the WTR period unless it is pre-empted by a higher priority bridge request.
WXCP
Wavelength Cross-Connection Protection. It is a path protection type for ring networks. In this protection mode, services are switched between the primacy and secondary rings through cross-connection based on the dual fed signal selection principle.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
B
B Acronyms and Abbreviations
Acronyms and Abbreviations
A AAA
Authorization, Authentication and Accounting
ACE
Adaptive Communication Environment
ACL
Access Control List
AIS
Alarm Indication Signal
ALC
Automatic Level Control
APE
Automatic Power Equilibrium
ARP
Address Resolution Protocol
ASN.1
Abstract Syntax Notation One
ASON
Automatically Switched Optical Network
ATM
Asynchronous Transfer Mode
B BFD
Bidirectional Forwarding Detection
BGP
Border Gateway Protocol
BML
Business Management Layer
BRAS
Broadband Remote Access Server
C CAR
Committed Access Rate
CC
Continuity Check
CORBA
Common Object Request Broker Architecture
CLI
Command Line Interface
CoS
Class of Service
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
B-1
iManager U2000 Unified Network Management System Product Description
B Acronyms and Abbreviations
CPU
Central Processing Unit
CWDM
Coarse Wavelength Division Multiplexing
D DC
Data Center
DCC
Data Communications Channel
DCN
Data Communication Network
DDN
Digital Data Network
DHCP
Dynamic Host Configuration Protocol
DNI
Dual Node Interconnection
DNS
Domain Name System
DPPS
Dual Path Protection Switching
DWC
Dynamic Wavelength Control
DMS
Datacom network Management System
DWDM
Dense Wavelength Division Multiplexing
E ECC
Embedded Control Channel
EML
Element management Layer
EMS
Element Management System
EPL
Ethernet Private Line
EPLAN
Ethernet Private LAN
ESCON
Enterprise System Connection
EVPL
Ethernet Virtual Private Line
F FCAPS
Fault Management, Configuration Management, Accounting Management, Performance Management, Security Management
FTP
File Transfer Protocol
G
B-2
GNE
Gate Network Element
GUI
Graphical User Interface
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
B Acronyms and Abbreviations
H HA
High-Availability
HGMP
HUAWEI Group Management Protocol
HQoS
Hierarchical QoS
HSI
High Speed Internet
HTML
Hyper Text Markup Language
HTTP
Hyper-Text Transmission Protocol
I ID
IDentification
IEEE
Institute of Electrical and Electronics Engineers
IF
Intermediate Frequency
IGMP
Internet Group Management Protocol
IMA
Inverse Multiplexing for ATM
iMAP
Integrated Management Application Platform
ION
Intelligent Optical Network
IP
Internet Protocol
IPA
Intelligent Power Adjustment
ISDN
Integrated Services Digital Network
ISO
International Organization for Standardization
ISP
Internet Service Provider
ITU-T
International Telecommunication Union- Telecommunication Standardization Sector
L LAN
Local Area Network
LCAS
Link Capacity Adjustment Scheme
LCD
Liquid Crystal Display
LCT
Local Craft Terminal
LLID
Locate Loopback ID
LPT
Link-state Pass Through
L2TP
Layer 2 Tunneling Protocol
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
B-3
iManager U2000 Unified Network Management System Product Description
B Acronyms and Abbreviations
LLDP
Link Layer Discovery Protocol
LSP
Label Switched Path
M MA
Maintenance Association
MAC
Media Access Control
MCA
Multi-channel Spectrum Analyzer Unit
MEP
Maintenance association End Point
MD
Maintenance Domain
MDI
Multi-Document Interface
MDP
Message Dispatch Process
Mgr
Manager
MIB
Management Information Base
MIP
Maintenance association Intermediate Point
MIT
Managed Object Instance Tree
MML
Man Machine Language
MO
Managed Object
MPLS
Multiprotocol Label Switching
MS
Multiplex Section
MSP
Multiplex Section Protection
MSTP
Multi-Service Transmission Platform
MTBF
Mean Time Between Failures
MTTR
Mean Time to Repair
NBI
Northbound Interface
N NE
Network Element
NEL
Network Element Level
NML
Network Management Layer
NMS
Network Management System
NSAP
System Network Service Access Point
O
B-4
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
B Acronyms and Abbreviations
OADM
Optical Add/Drop Multiplexer
OAM
Operation Administration and Maintenance
OAMS
Optical fiber (cable) line Automatic Monitoring System
OCH
Optical Channel
OEQ
Optical Equalizer
ODU
Optical Demultiplexer Unit
ODU
Outdoor Unit
OIF
Optical Internetworking Forum
OLA
Optical Line Amplifier
OMS
Optical Multiplex Section
OMU
Optical Multiplexer Unit
OSC
Optical Supervisory Channel
OSF
Operation System Function
OSI
Open Systems Interconnection
OSN
Optical Switch Network
OSNR
Optical Signal-to-Noise Ratio
OSS
Operation Support System
OTDR
Optical Time Domain Reflectometry
OTM
Optical Terminal Multiplexer
OTS
Optical Transmission Section
OTU
Optical Transponder Unit
OWSP
Optical Wavelength Shared Protection
OSPF
Open Shortest Path First
P PC
Personal Computer
PSTN
Public Switched Telephone Network
PDH
Plesiochronous Digital Hierarchy
PP
Path Protection
PPP
Point-to-Point Protocol
PRBS
Pseudo-Random Binary Sequence
PSTN
Public Switched Telephone Network
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
B-5
iManager U2000 Unified Network Management System Product Description
B Acronyms and Abbreviations
Q QoS
Quality of Service
R RAID
Redundant Array of Inexpensive Disk
RAS
Reliability, Availability, Survivability
RDBMS
Relational Database Management System
RPR
Resilient Packet Ring
RMON
Remote Monitoring
ROADM
Reconfiguration Optical Add/drop Multiplexer
RPT
Repeater
RS
Regenerator Section
RSVP
Resource Reservation Protocol
RTN
Radio Transmission Node
RUP
Rational Unified Process
S
B-6
SDH
Synchronous Digital Hierarchy
SLM
Submarine Line Monitor
SLTE
Submarine Line Terminal Equipment
SML
Service Management Layer
SMS
Service Management System
SNCMP
Sub-Network Connection Multiple Protection
SNCP
Sub-Network Connection Protection
SNCTP
Sub-Network Connection Tunnel Protection
SNML
Sub-Network Management Layer
SNMS
Subnetwork Management System
SONET
Synchronous Optical Network
SSL
Security Socket Layer
SAP
Service Access Point
SNMP
Simple Network Management Protocol
STP
Spanning Tree Protocol
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)
iManager U2000 Unified Network Management System Product Description
B Acronyms and Abbreviations
T TCM
Tandem Connection Measurement
TCP/IP
Transmission Control Protocol / Internet Protocol
TDA
Tone & Data Access Unit
TFTP
Trivial File Transfer Protocol
TM
Terminal Multiplexer
TMF
TeleManagement Forum
TMN
Telecommunication Management Network
TPS
Tributary Protection Switching
U UML
Unified Modeling Language
UPS
Uninterrupted Power Supply
V VB
Virtual Bridge
VCI
Virtual Channel Identifier
VCS
Veritas Cluster Server
VOA
Variable Optical Attenuator
VPI
Virtual Path Identifier
VLAN
Virtual Local Area Network
VPN
Virtual Private Network
VGMP
VRRP Group Management Protocol
VRRP
Virtual Router Redundancy Protocol
VVR
Veritas Volume Replication
VVR
VERITAS Volume Replicator
VxVM
Veritas Volume Manager
W WDM
Wavelength Division Multiplexing
WSF
Work Station Function
WTR
Wait-to-Restore
WXCP
Wavelength Cross-Connection Protection
Issue 03 (2010-11-02)
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
B-7
B Acronyms and Abbreviations
B-8
iManager U2000 Unified Network Management System Product Description
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.
Issue 03 (2010-11-02)