Operation Guide for RTN End-to-End Management-(V100R002C01_02)
-
Upload
wisammeesh -
Category
Documents
-
view
212 -
download
0
Transcript of Operation Guide for RTN End-to-End Management-(V100R002C01_02)
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
1/385
iManager U2000 Unified Network Management
System
V100R002C01
Operation Guide for RTN End-to-End
Management
Issue 02
Date 2010-09-24
HUAWEI TECHNOLOGIES CO., LTD.
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
2/385
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
3/385
Copyright Huawei Technologies Co., Ltd. 2010. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China
Website: http://www.huawei.com
Email: [email protected]
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
i
http://www.huawei.com/ -
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
4/385
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
5/385
About This Document
Related Version
The following table lists the product version related to this document.
Product Name Version
iManager U2000 V100R002C01
Intended Audience
This document describes how to configure an RTN network by using the end-to-end function.
This document guides you to manage an RTN network by using the trail management function.
This document is intended for:
l Network Monitoring Engineer
l Data Configuration Engineer
l NM Administrator
l System Maintenance Engineer
Symbol ConventionsThe symbols that may be found in this document are defined as follows.
Symbol Description
DANGER
Indicates a hazard with a high level of risk, which if not
avoided, will result in death or serious injury.
WARNING
Indicates a hazard with a medium or low level of risk, which
if not avoided, could result in minor or moderate injury.
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management About This Document
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
iii
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
6/385
Symbol Description
CAUTION
Indicates a potentially hazardous situation, which if not
avoided, could result in equipment damage, data loss,
performance degradation, or unexpected results.
TIP Indicates a tip that may help you solve a problem or save
time.
NOTE Provides additional information to emphasize or supplement
important points of the main text.
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
Boldface The keywords of a command line are in boldface.
Italic Command arguments are in italics.
[ ] Items (keywords or arguments) in brackets [ ] are optional.
{ x | y | ... } Optional items are grouped in braces and separated by
vertical bars. One item is selected.
[ x | y | ... ] Optional items are grouped in brackets and separated byvertical bars. One item is selected or no item is selected.
{ x | y | ... }* Optional items are grouped in braces and separated by
vertical bars. A minimum of one item or a maximum of all
items can be selected.
[ x | y | ... ]* Optional items are grouped in brackets and separated by
vertical bars. Several items or no item can be selected.
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Boldface Buttons, menus, parameters, tabs, window, and dialog titles
are in boldface. For example, clickOK.
> Multi-level menus are in boldface and separated by the ">"
signs. For example, choose File > Create > Folder.
About This Document
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management
iv Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
7/385
Update History
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Updates in Issue 02 (2010-09-24) Based on Product Version V100R002C01
The second release of the iManager U2000 V100R002C01.
Some bugs in the manual of the previous version are fixed.
Updates in Issue 01 (2010-08-16) Based on Product Version V100R002C01
The first release of the iManager U2000 V100R002C01.
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management About This Document
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
v
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
8/385
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
9/385
Contents
About This Document...................................................................................................................iii
1 Managing RTN Protection Subnets........................................................................................1-1
1.1 Basic Concepts................................................................................................................................................1-3
1.1.1 Protection Subnet...................................................................................................................................1-31.1.2 Isolated Node..........................................................................................................................................1-3
1.2 Searching for Protection Subnets....................................................................................................................1-4
1.3 Configuring an MSP Ring...............................................................................................................................1-4
1.3.1 Creating an MS Ring Protection Subnet................................................................................................1-5
1.3.2 Checking Networkwide Multiplex Section Parameters.........................................................................1-7
1.3.3 Verifying MSP Protection Switching.....................................................................................................1-7
1.4 Configuring Linear MSP.................................................................................................................................1-9
1.4.1 Creating a Linear MS Protection Subnet................................................................................................1-9
1.4.2 Checking Networkwide Multiplex Section Parameters.......................................................................1-11
1.4.3 Verifying MSP Protection Switching...................................................................................................1-12
1.5 Creating an Path Protection Ring..................................................................................................................1-13
1.6 Configuring a Non-Protection Ring..............................................................................................................1-14
1.7 Configuring a Non-Protection Chain............................................................................................................1-15
1.8 Configuring DNI Protection..........................................................................................................................1-16
1.9 Configuring IF 1+1 Protection......................................................................................................................1-17
1.10 Configuring IF N+1 Protection...................................................................................................................1-18
1.11 Maintaining Protection Subnets..................................................................................................................1-19
1.11.1 Finding Protection Subnets................................................................................................................1-20
1.11.2 Querying Protection Subnet Resources..............................................................................................1-211.11.3 Collecting Statistics on the SDH Protection Subnet Resources.........................................................1-21
1.11.4 Checking MS Protection Switching Status........................................................................................1-22
1.11.5 Setting Protection Subnet Parameters................................................................................................1-22
1.11.6 Checking TPS Switching status.........................................................................................................1-23
1.11.7 Performing MSP Switching...............................................................................................................1-23
1.11.8 Performing SNCP Service Switching................................................................................................1-24
1.11.9 Adjusting the Capacity of an MSP Ring............................................................................................1-25
1.11.10 Adjusting the Capacity of a Linear MSP.........................................................................................1-26
1.11.11 Changing an NP Chain to a 1+1 Linear MSP..................................................................................1-26
1.11.12 Checking IF 1+1 Protection Switching Status.................................................................................1-29
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management Contents
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
vii
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
10/385
1.11.13 Checking IF N+1 Protection Switching Status................................................................................1-29
1.12 Deleting Protection Subnets........................................................................................................................1-29
1.13 Deleting Isolated Nodes..............................................................................................................................1-30
2 End-to-End RTN Management................................................................................................2-12.1 Managing SDH Trails.....................................................................................................................................2-2
2.1.1 Configuration Task Flow.......................................................................................................................2-3
2.1.2 Basic Concepts.......................................................................................................................................2-4
2.1.2.1 SDH Trail............................................................................................................................................2-5
2.1.2.2 Radio Trails.........................................................................................................................................2-7
2.1.2.3 Conflict Trail.......................................................................................................................................2-9
2.1.2.4 Trail Creation Method.......................................................................................................................2-10
2.1.2.5 Process for Creating a Trail...............................................................................................................2-12
2.1.2.6 Trail Protection Strategy...................................................................................................................2-15
2.1.2.7 Trail Resource Use Strategy..............................................................................................................2-17
2.1.2.8 Principles for Selecting Timeslots During the Trail Creation...........................................................2-17
2.1.2.9 Platinum Service Group....................................................................................................................2-19
2.1.3 Disabling a Fiber..................................................................................................................................2-20
2.1.4 Creating SDH Trails by Trail Search...................................................................................................2-21
2.1.4.1 Searching for SDH Trails..................................................................................................................2-21
2.1.4.2 Viewing Discrete Services................................................................................................................2-22
2.1.4.3 Discrete Service Causes and Handling Measures.............................................................................2-23
2.1.4.4 Setting the Remarks of a Discrete Service........................................................................................2-24
2.1.4.5 Activating and Deactivating Discrete Services.................................................................................2-26
2.1.4.6 Acknowledging or Unacknowledging Discrete Services..................................................................2-26
2.1.4.7 Deleting Discrete Services................................................................................................................2-27
2.1.5 Automatically Creating VC4 Trails.....................................................................................................2-28
2.1.5.1 Creating a Non-SNCP VC4 Trail......................................................................................................2-28
2.1.5.2 Creating an SNCP VC4 Trail............................................................................................................2-30
2.1.5.3 Verifying the SNCP Trail Protection Switching...............................................................................2-33
2.1.6 Automatically Creating VC12 and VC3 Trails....................................................................................2-33
2.1.6.1 Creating a VC4 Server Trail..............................................................................................................2-34
2.1.6.2 Creating a Non-SNCP VC12 or VC3 Trail.......................................................................................2-362.1.6.3 Creating an SNCP VC12 or VC3 Trail.............................................................................................2-38
2.1.6.4 Verifying the SNCP Trail Protection Switching...............................................................................2-41
2.1.7 Creating a Platinum Service Group......................................................................................................2-42
2.1.8 Bound Platinum Service Group............................................................................................................2-43
2.1.9 Creating an SDH Trail Manually.........................................................................................................2-44
2.1.10 Creating PDH Radio Trails................................................................................................................2-45
2.1.10.1 Creating a Link Server Trail............................................................................................................2-45
2.1.10.2 Creating a PDH Radio Trail............................................................................................................2-47
2.1.11 Creating SDH Radio Trails................................................................................................................2-49
2.1.11.1 Creating a VC4 Server Trail............................................................................................................2-49
Contents
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management
viii Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
11/385
2.1.11.2 Creating an SDH Radio Trail..........................................................................................................2-51
2.1.12 Copying SDH Trails...........................................................................................................................2-52
2.1.13 Modifying an SDH Trail....................................................................................................................2-54
2.1.13.1 Modifying the Port/Timeslot/Route of an SDH Trail.....................................................................2-54
2.1.13.2 Modifying the SNC Service Control of SDH Trails.......................................................................2-55
2.1.13.3 Modifying Trail Names in Batches.................................................................................................2-56
2.1.13.4 Modifying the Trails in a Platinum Service Group.........................................................................2-57
2.1.14 Removing a Trail from a Platinum Service Group............................................................................2-57
2.1.15 Configuring Overhead Bytes of an SDH Trail...................................................................................2-58
2.1.15.1 Setting the Trace Byte.....................................................................................................................2-58
2.1.15.2 Setting the C2 Byte.........................................................................................................................2-60
2.1.15.3 Setting the V5 Byte.........................................................................................................................2-61
2.1.15.4 Setting the Overhead Termination..................................................................................................2-62
2.1.15.5 Setting Service Load Signals...........................................................................................................2-63
2.1.16 Changing Between SNCP and Non-SNCP Trails..............................................................................2-64
2.1.16.1 Changing a Non-SNCP Trail to an SNCP Trail..............................................................................2-64
2.1.16.2 Changing an SNCP Trail to a Non-SNCP Trail..............................................................................2-66
2.1.17 Enabling or Disabling VC4 Server Trails..........................................................................................2-66
2.1.17.1 Disabling VC4 Server Trails...........................................................................................................2-67
2.1.17.2 Enabling VC4 Server Trails............................................................................................................2-67
2.1.18 Joining and Splitting VC4 Server Trails............................................................................................2-68
2.1.18.1 Joining VC4 Server Trails...............................................................................................................2-69
2.1.18.2 Splitting a VC4 Server Trail............................................................................................................2-702.1.19 Service Authorization Management...................................................................................................2-71
2.1.19.1 Specifying a Customer for a Service...............................................................................................2-72
2.1.19.2 Authorizing a Customer to a U2000 User.......................................................................................2-73
2.1.19.3 Authorizing a Trail to a U2000 User...............................................................................................2-74
2.1.19.4 Modifying Trail Authorization Information....................................................................................2-74
2.1.20 Viewing SDH Trails...........................................................................................................................2-75
2.1.20.1 Viewing SDH Trail Details.............................................................................................................2-75
2.1.20.2 Viewing the Use Information of a VC4 Server Trail......................................................................2-76
2.1.20.3 Viewing Relevant Client Trails.......................................................................................................2-77
2.1.20.4 Viewing the Optical Power for the Trails.......................................................................................2-77
2.1.20.5 Viewing the Status of the Fiber Break on an SDH Trail.................................................................2-78
2.1.20.6 Viewing Fiber Information of a Trail..............................................................................................2-79
2.1.21 Maintaining SDH Trails.....................................................................................................................2-79
2.1.21.1 Locking or Unlocking an SDH Trail...............................................................................................2-80
2.1.21.2 Activating or Deactivating an SDH Trail........................................................................................2-81
2.1.21.3 Setting a Loopback for a Trail.........................................................................................................2-82
2.1.21.4 Performing the Protection Switching for a Single SNCP Trail.......................................................2-84
2.1.21.5 Performing the SNCP Trail Switching in Batches..........................................................................2-85
2.1.21.6 Verifying Platinum Service Groups in Batches..............................................................................2-87
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management Contents
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
ix
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
12/385
2.1.21.7 Converting SDH Discrete Services to Mono Nodal Trails.............................................................2-87
2.1.22 Deleting SDH Trails...........................................................................................................................2-88
2.2 Managing Ethernet Trails..............................................................................................................................2-90
2.2.1 Basic Concepts.....................................................................................................................................2-91
2.2.1.1 Ethernet End-to-End Management....................................................................................................2-91
2.2.1.2 Ethernet Services...............................................................................................................................2-93
2.2.1.3 Relation Between SDH/Radio Trails and Ethernet Trails.................................................................2-94
2.2.1.4 Tag Attributes....................................................................................................................................2-95
2.2.2 Creating Ethernet Trails by Trail Search..............................................................................................2-96
2.2.2.1 Searching for Ethernet Trails............................................................................................................2-96
2.2.2.2 Viewing Ethernet Discrete Services..................................................................................................2-98
2.2.3 Configuring EPL Service.....................................................................................................................2-98
2.2.3.1 Creating a VC4 Server Trail..............................................................................................................2-99
2.2.3.2 Creating a Trunk Link.....................................................................................................................2-101
2.2.3.3 Creating an EPL Trail.....................................................................................................................2-103
2.2.3.4 Verifying Ethernet Services............................................................................................................2-104
2.2.3.5 Sample Application: Configuring EPL Services.............................................................................2-105
2.2.4 Configuring an Unterminated EPL Service.......................................................................................2-111
2.2.4.1 Creating a VC4 Server Trail............................................................................................................2-112
2.2.4.2 Creating an Unterminated Trunk Link............................................................................................2-114
2.2.4.3 Creating a Trunk Link.....................................................................................................................2-115
2.2.4.4 Creating an Unterminated EPL Trail..............................................................................................2-116
2.2.4.5 Verifying Ethernet Services............................................................................................................2-1172.2.5 Configuring EVPL Services...............................................................................................................2-118
2.2.5.1 Creating a VC4 Server Trail............................................................................................................2-118
2.2.5.2 Creating a Trunk Link.....................................................................................................................2-120
2.2.5.3 Creating an EVPL Trail...................................................................................................................2-122
2.2.5.4 Verifying Ethernet Services............................................................................................................2-123
2.2.6 Configuring EPLAN Service.............................................................................................................2-124
2.2.6.1 Creating a VC4 Server Trail............................................................................................................2-124
2.2.6.2 Creating a Trunk Link.....................................................................................................................2-127
2.2.6.3 Creating an EPLAN Trail................................................................................................................2-128
2.2.6.4 Adjusting VB Mount Ports in an EPLAN.......................................................................................2-131
2.2.6.5 Verifying Ethernet Services............................................................................................................2-132
2.2.7 Configuring EVPL (QinQ) Service ...................................................................................................2-133
2.2.7.1 Creating a VC4 Server Trail............................................................................................................2-133
2.2.7.2 Creating a Trunk Link.....................................................................................................................2-135
2.2.7.3 Creating an EVPL (QinQ) Trail......................................................................................................2-137
2.2.7.4 Verifying Ethernet Services............................................................................................................2-138
2.2.8 Specifying a Customer for a Created Trail.........................................................................................2-139
2.2.9 Checking the Connectivity of Ethernet Link......................................................................................2-140
2.2.9.1 Ethernet OAM.................................................................................................................................2-140
Contents
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management
x Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
13/385
2.2.9.2 Creating MPs...................................................................................................................................2-141
2.2.9.3 Performing a CC Check..................................................................................................................2-142
2.2.9.4 Performing an LB Check.................................................................................................................2-142
2.2.9.5 Performing an LT Check.................................................................................................................2-143
2.2.9.6 Performing a Ping Test....................................................................................................................2-144
2.2.9.7 Performing Performance Detection.................................................................................................2-145
2.2.10 Viewing Ethernet Services...............................................................................................................2-145
2.2.10.1 Viewing Trunk Links....................................................................................................................2-146
2.2.10.2 Analyzing the Trunk Link Fault....................................................................................................2-146
2.2.10.3 Viewing Relevant Trails of a Trunk Link.....................................................................................2-147
2.2.10.4 Viewing Ethernet Trails................................................................................................................2-148
2.2.10.5 Viewing the Server Trail of an Ethernet Trail...............................................................................2-148
2.2.10.6 Analyzing the Ethernet Trail Fault................................................................................................2-149
2.2.10.7 Viewing the Connectivity of Ethernet Services Networkwide.....................................................2-150
2.2.11 Maintaining Ethernet Trails.............................................................................................................2-150
2.2.11.1 Adjusting the Ethernet Trail Bandwidth.......................................................................................2-150
2.2.11.2 Activating or Deactivating Ethernet Services...............................................................................2-151
2.2.12 Deleting Ethernet Services...............................................................................................................2-152
2.2.12.1 Deleting Ethernet Trails................................................................................................................2-152
2.2.12.2 Deleting Trunk Links....................................................................................................................2-153
2.3 Managing Alarms of an SDH Trail.............................................................................................................2-154
2.3.1 Viewing Current Alarms of an SDH Trail.........................................................................................2-155
2.3.2 Viewing History Alarms of an SDH Trail.........................................................................................2-1562.3.3 Setting Alarm Reversion for an SDH Trail........................................................................................2-156
2.3.4 Inserting an Alarm on an SDH Trail..................................................................................................2-157
2.3.5 Managing Networkwide SDH Alarm Trails in Real Time.................................................................2-158
2.3.6 Analyzing SDH alarm correlation......................................................................................................2-158
2.3.7 Browsing Relevant WDM Trails........................................................................................................2-159
2.4 Managing the Performance of SDH Trails..................................................................................................2-160
2.4.1 Viewing Current Performance Data of an SDH Trail........................................................................2-160
2.4.2 Viewing History Performance Data of an SDH Trail........................................................................2-161
2.4.3 Viewing UAT of SDH Trails.............................................................................................................2-162
2.4.4 Viewing Performance Threshold-Crossing Records of SDH Trails..................................................2-162
2.4.5 Setting Performance Monitoring Parameters of an SDH Trail..........................................................2-163
2.4.6 Setting SDH Trail Performance Threshold........................................................................................2-164
2.5 Managing Ethernet Trail Alarms.................................................................................................................2-164
2.5.1 Viewing Current Alarms of a Trunk Link..........................................................................................2-165
2.5.2 Viewing History Alarms of a Trunk Link..........................................................................................2-166
2.5.3 Viewing Current Alarms of an Ethernet Trail....................................................................................2-166
2.5.4 Viewing History Alarms of an Ethernet Trail....................................................................................2-167
2.5.5 Managing Networkwide ETH Alarm Trails in Real Time.................................................................2-168
2.6 Browsing the Performance of an Ethernet Trail..........................................................................................2-168
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management Contents
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xi
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
14/385
3 End-to-End RTN IP Management...........................................................................................3-1
3.1 Process of Configuring RTN IP Services........................................................................................................3-2
3.2 Automatically Searching RTN IP Services.....................................................................................................3-3
3.3 Managing Tunnel............................................................................................................................................3-4
3.3.1 Introduction to the Tunnel......................................................................................................................3-5
3.3.1.1 Introduction to the Tunnel...................................................................................................................3-5
3.3.1.2 Standards and Protocols Compliance of the Tunnel...........................................................................3-7
3.3.1.3 Basic Concepts of the Tunnel..............................................................................................................3-9
3.3.1.4 Working Principles............................................................................................................................3-10
3.3.1.5 Tunnel Protection Group...................................................................................................................3-11
3.3.1.6 Application of the Tunnel.................................................................................................................3-13
3.3.2 Tunnel Configuration Flow..................................................................................................................3-14
3.3.3 Configuring a Tunnel...........................................................................................................................3-16
3.3.3.1 Creating a Tunnel..............................................................................................................................3-17
3.3.3.2 Creating Tunnels in Batches.............................................................................................................3-20
3.3.3.3 Creating a Protection Group..............................................................................................................3-21
3.3.3.4 Configuring OAM for a Tunnel........................................................................................................3-23
3.3.3.5 Automatic Search for Protection Groups..........................................................................................3-24
3.3.3.6 Deploying a Tunnel...........................................................................................................................3-25
3.3.3.7 Viewing a Discrete Tunnel................................................................................................................3-26
3.3.3.8 Deleting a Tunnel..............................................................................................................................3-26
3.3.4 Monitoring a Tunnel.............................................................................................................................3-27
3.3.4.1 Viewing the VPN Service Carried on a Tunnel................................................................................3-27
3.3.4.2 Viewing the Topology of a Tunnel...................................................................................................3-28
3.3.4.3 Viewing the Performance of a Tunnel..............................................................................................3-29
3.3.4.4 Viewing the Alarms of a Tunnel.......................................................................................................3-29
3.3.4.5 Monitoring the Running Status of a Tunnel......................................................................................3-30
3.3.4.6 Viewing the LSP Topology of a Tunnel...........................................................................................3-30
3.3.4.7 Diagnosing a Tunnel.........................................................................................................................3-31
3.3.5 Configuration Example (Static CR Tunnel).........................................................................................3-32
3.3.5.1 Networking Diagram.........................................................................................................................3-32
3.3.5.2 Service Planning................................................................................................................................3-333.3.5.3 Configuration Process (Creating a Static CR Tunnel)......................................................................3-35
3.3.6 Configuration Example (RSVP TE Tunnel)........................................................................................3-44
3.3.6.1 Networking Diagram.........................................................................................................................3-44
3.3.6.2 Service Planning................................................................................................................................3-45
3.3.6.3 Configuration Process (Creating a RSVP TE Tunnel)......................................................................3-47
3.4 Configuring a Service Template...................................................................................................................3-59
3.4.1 Creating a Service Template................................................................................................................3-60
3.4.2 Creating a Service by Using a Template..............................................................................................3-60
3.5 Viewing a Service Resource.........................................................................................................................3-61
3.5.1 Querying Public Resources..................................................................................................................3-61
Contents
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management
xii Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
15/385
3.5.2 Querying CTP Resources.....................................................................................................................3-62
3.6 Managing PWE3 Services.............................................................................................................................3-62
3.6.1 Overview of PWE3..............................................................................................................................3-63
3.6.1.1 Introduction.......................................................................................................................................3-64
3.6.1.2 Reference Standards and Protocols...................................................................................................3-64
3.6.1.3 PWE3 Basic Principle.......................................................................................................................3-65
3.6.1.4 PW Template.....................................................................................................................................3-69
3.6.1.5 VCCV................................................................................................................................................3-70
3.6.1.6 Static and Dynamic Hybrid Multi-Hop PW......................................................................................3-70
3.6.1.7 PW Protection...................................................................................................................................3-71
3.6.1.8 ATM Cell Transparent Transmission................................................................................................3-74
3.6.1.9 The Application of PWE3 Service....................................................................................................3-77
3.6.2 PWE3 Configuration Process...............................................................................................................3-78
3.6.3 PWE3 Operation Tasks........................................................................................................................3-83
3.6.3.1 Creating a CES Service.....................................................................................................................3-83
3.6.3.2 Creating an ETH Service...................................................................................................................3-86
3.6.3.3 Creating an ATM Service.................................................................................................................3-88
3.6.3.4 Creating a PWE3 Service Through Duplication...............................................................................3-92
3.6.3.5 Deploying a PWE3 Service...............................................................................................................3-94
3.6.3.6 Adjusting a Discrete PWE3 Service..................................................................................................3-94
3.6.4 PWE3 Service Monitoring...................................................................................................................3-95
3.6.4.1 Viewing the PWE3 Service Topology..............................................................................................3-96
3.6.4.2 Monitoring Performance of a PWE3 Service....................................................................................3-963.6.4.3 Monitoring Alarms of a PWE3 Service............................................................................................3-97
3.6.5 Locating a PWE3 Service Fault...........................................................................................................3-98
3.6.5.1 CES Service Troubleshooting...........................................................................................................3-98
3.6.5.2 ATM Service Troubleshooting........................................................................................................3-101
3.6.5.3 Ethernet Service Troubleshooting...................................................................................................3-104
3.6.6 Example for Configuring a CES Emulation Service..........................................................................3-107
3.6.6.1 Networking Diagram.......................................................................................................................3-107
3.6.6.2 Service Planning..............................................................................................................................3-108
3.6.6.3 Configuration Process.....................................................................................................................3-111
3.6.7 Example for Configuring an ATM Emulation Service......................................................................3-127
3.6.7.1 Networking Diagram.......................................................................................................................3-128
3.6.7.2 Service Planning..............................................................................................................................3-128
3.6.7.3 Configuration Process.....................................................................................................................3-132
3.6.8 Example for Configuring an Ethernet Private Line Emulation Service.............................................3-147
3.6.8.1 Networking Diagram.......................................................................................................................3-147
3.6.8.2 Service Planning..............................................................................................................................3-147
3.6.8.3 Configuration Process.....................................................................................................................3-149
3.7 Modifying Configurations...........................................................................................................................3-158
3.7.1 Modifying Tunnel Attributes.............................................................................................................3-159
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management Contents
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xiii
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
16/385
3.7.1.1 Modifying a Tunnel.........................................................................................................................3-159
3.7.1.2 Deleting a Tunnel............................................................................................................................3-159
3.7.2 Modifying PWE3 Attributes..............................................................................................................3-160
3.7.2.1 Modifying a PWE3 Service.............................................................................................................3-160
3.7.2.2 Deleting a PWE3 Service................................................................................................................3-160
3.7.2.3 Deleting a PWE3 Service on the Network Side..............................................................................3-161
3.7.2.4 Undeploying a PWE3 Service.........................................................................................................3-161
Contents
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management
xiv Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
17/385
Figures
Figure 1-1 DNI protection example.................................................................................... ...............................1-16
Figure 2-1 End-to-end RTN network management flow.....................................................................................2-4
Figure 2-2 A conflict trail generated because a fiber is added.............................................................................2-9
Figure 2-3 A conflict trail generated because a single station cross-connection is lost.......................................2-9
Figure 2-4 A conflict trail generated because a protection service is deleted on a per-NE basis......................2-10
Figure 2-5 Creating trails by trail search............................................................................................................2-13
Figure 2-6 Creating trails in the automatic mode...............................................................................................2-14
Figure 2-7 Creating trails in the manual mode...................................................................................................2-15
Figure 2-8 Platinum service group.....................................................................................................................2-19
Figure 2-9 Downgraded platinum service group...................................... ..........................................................2-20
Figure 2-10 Joining and splitting VC4 server trails...........................................................................................2-68
Figure 2-11 Restrictions on VC4 server trail joining.........................................................................................2-69
Figure 2-12 Restrictions on VC4 server trail joining.........................................................................................2-70
Figure 2-13 Service authorization management.............................................................................. ...................2-72Figure 2-14 Loopback to Source........................................................................................................................2-82
Figure 2-15 Loopback to Sink............................................................................ ................................................2-83
Figure 2-16 Basic hierarchy of the Ethernet feature..........................................................................................2-93
Figure 2-17 EPL services of the Port type.........................................................................................................2-93
Figure 2-18 EPL services sharing a PORT port.................................................................................................2-94
Figure 2-19 EPL services sharing a VCTRUNK port........................................................................................2-94
Figure 2-20 Relation Between SDH Trails and Ethernet Trails.........................................................................2-95
Figure 2-21 Networking diagram.....................................................................................................................2-106
Figure 2-22 IDU board configuration .............................................................................................................2-106
Figure 2-23 Configuring Ethernet services......................................................................................................2-106
Figure 2-24 Timeslot allocation of Ethernet services.......................................................................................2-107
Figure 2-25 Server trail for an unterminated EPL service...............................................................................2-111
Figure 2-26 EPLAN between different boards on an NE.................................................................................2-129
Figure 3-1 Process of configuring RTN IP services.............................................................................................3-2
Figure 3-2 MPLS tunnel on the MPLS network..................................................................................................3-6
Figure 3-3 ATM PWE3 over IP tunnel................................................................................................................3-7
Figure 3-4 Process of creating a tunnel..............................................................................................................3-10
Figure 3-5 Working process of a tunnel.............................................................................................................3-11
Figure 3-6 Principles of the tunnel protection....................................................................................................3-13
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management Figures
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xv
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
18/385
Figure 3-7 Transparent transmission of point-to-point data packets..................................................................3-14
Figure 3-8 Tunnel configuration flow................................................................................................................3-15
Figure 3-9 The figure of tunnel protection group...............................................................................................3-22
Figure 3-10 Networking diagram of the MPLS tunnel...................................................................................... 3-32
Figure 3-11 Networking diagram of the MPLS tunnel...................................................................................... 3-44
Figure 3-12 Basic transmission components of the PWE3................................................................................3-66
Figure 3-13 PWE3 single-hop topology.............................................................................................................3-67
Figure 3-14 PWE3 multi-hop topology..............................................................................................................3-68
Figure 3-15 Network of the static and dynamic hybrid multi-hop PW..............................................................3-71
Figure 3-16 PW redundancy protection............................................................................................................. 3-72
Figure 3-17 CE symmetrical access dual-homing protection.............................................................................3-72
Figure 3-18 Backup protection...........................................................................................................................3-73
Figure 3-19 PW APS protection.........................................................................................................................3-73
Figure 3-20 Application of the PWE3................................................................................................................3-77
Figure 3-21 CES service configuration process.................................................................................................3-78
Figure 3-22 ATM service configuration process................................................................................................3-80
Figure 3-23 Flow of configuring an IP line service........................................................................................... 3-82
Figure 3-24 Flowchart for troubleshooting CES service faults........................................................................3-100
Figure 3-25 Flowchart for troubleshooting ATM service faults......................................................................3-103
Figure 3-26 Flowchart for troubleshooting Ethernet service faults..................................................................3-106
Figure 3-27 Networking diagram of the CES service......................................................................................3-107
Figure 3-28 Networking diagram of the IMA service......................................................................................3-128
Figure 3-29 Networking diagram of the Ethernet service................................................................................3-147
Figures
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management
xvi Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
19/385
Tables
Table 2-1 SDH trail level......................................................................................................................................2-7
Table 2-2 Comparison of methods for creating trails.........................................................................................2-11
Table 2-3 Priority relations of protection strategies...........................................................................................2-16
Table 2-4 Scheme for managing timeslot resources...........................................................................................2-18
Table 2-5 Processing policy at ingress...............................................................................................................2-95
Table 2-6 Processing policy at egress.................................................................................................................2-96
Table 3-1 Tunnel configuration tasks.................................................................................................................3-15
Table 3-2 Microwave port planning...................................................................................................................3-33
Table 3-3 NE parameter planning......................................................................................................................3-33
Table 3-4 Tunnel planning.................................................................................................................................3-34
Table 3-5 Planning of protection group parameters...........................................................................................3-35
Table 3-6 Microwave port planning...................................................................................................................3-45
Table 3-7 NE parameter planning......................................................................................................................3-45
Table 3-8 Control plane planning.......................................................................................................................3-46Table 3-9 Tunnel planning.................................................................................................................................3-46
Table 3-10 Features of the ATM cell transparent transmission services............................................................3-76
Table 3-11 Applicable scenarios of various connection types............................................................... ............3-76
Table 3-12 Comparison between 1-to-1 and N-to-1 modes...............................................................................3-77
Table 3-13 Tasks for configuring a CES service................................................................................................3-79
Table 3-14 Tasks for configuring an ATM service............................................................................................3-80
Table 3-15 Operation tasks for configuring an IP line service...........................................................................3-82
Table 3-16 List of common symptoms of CES service faults............................................................................3-99
Table 3-17 List of common symptoms of ATM service faults........................................................................3-102
Table 3-18 List of common symptoms of Ethernet service faults....................................................................3-104
Table 3-19 Service port planning.....................................................................................................................3-108
Table 3-20 Parameters for configuring the CES service: NE2-NE3 (The E1 timeslots are partially occupied.)
...........................................................................................................................................................................3-108
Table 3-21 Parameters for configuring the CES service: NE2-NE3 (The E1 timeslots are fully occupied.)
...........................................................................................................................................................................3-109
Table 3-22 Parameters for configuring the CES service: NE1-NE3 (The E1 timeslots are fully occupied.)
...........................................................................................................................................................................3-110
Table 3-23 Parameters of general attributes.....................................................................................................3-114
Table 3-24 Parameters of the source node........................................................................................................3-115
Table 3-25 Parameters of the sink node...........................................................................................................3-116
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management Tables
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xvii
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
20/385
Table 3-26 PW parameters...............................................................................................................................3-118
Table 3-27 Parameters of advanced attributes..................................................................................................3-120
Table 3-28 Parameters of general attributes.....................................................................................................3-121
Table 3-29 Parameters of the source node........................................................................................................3-121
Table 3-30 Parameters of the sink node...........................................................................................................3-121
Table 3-31 PW parameters...............................................................................................................................3-122
Table 3-32 Parameters of advanced attributes..................................................................................................3-123
Table 3-33 Parameters of general attributes.....................................................................................................3-124
Table 3-34 Parameters of the source node........................................................................................................3-124
Table 3-35 Parameters of the sink node...........................................................................................................3-125
Table 3-36 PW parameters...............................................................................................................................3-125
Table 3-37 Parameters of advanced attributes..................................................................................................3-127
Table 3-38 Service port planning.....................................................................................................................3-129
Table 3-39 IMA planning.................................................................................................................................3-129
Table 3-40 ATM QoS policy planning.............................................................................................................3-130
Table 3-41 ATM service planning....................................................................................................................3-130
Table 3-42 Parameters of general attributes.....................................................................................................3-136
Table 3-43 Parameters of the source node........................................................................................................3-137
Table 3-44 Parameters of the sink node...........................................................................................................3-138
Table 3-45 PW parameters...............................................................................................................................3-138
Table 3-46 Parameter for configuring a ATM connection...............................................................................3-140
Table 3-47 Parameters of advanced attributes..................................................................................................3-141
Table 3-48 Parameters of general attributes.....................................................................................................3-142Table 3-49 Parameters of the source node........................................................................................................3-142
Table 3-50 Parameters of the sink node...........................................................................................................3-143
Table 3-51 PW parameters...............................................................................................................................3-143
Table 3-52 Parameter for configuring a ATM connection...............................................................................3-145
Table 3-53 Parameters of advanced attributes..................................................................................................3-146
Table 3-54 Service port planning.....................................................................................................................3-148
Table 3-55 Ethernet service planning...............................................................................................................3-148
Table 3-56 Parameters of general attributes.....................................................................................................3-151
Table 3-57 Parameters of the source node........................................................................................................3-151
Table 3-58 Parameters of the sink node...........................................................................................................3-151
Table 3-59 PW parameters...............................................................................................................................3-152
Table 3-60 Service parameters.........................................................................................................................3-154
Table 3-61 PW QoS parameters.......................................................................................................................3-154
Table 3-62 Parameters of advanced attributes..................................................................................................3-154
Table 3-63 Parameters of general attributes.....................................................................................................3-155
Table 3-64 Parameters of the source node........................................................................................................3-155
Table 3-65 Parameters of the sink node...........................................................................................................3-156
Table 3-66 PW parameters...............................................................................................................................3-156
Table 3-67 Service parameters.........................................................................................................................3-157
Tables
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management
xviii Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
21/385
Table 3-68 PW QoS parameters.......................................................................................................................3-158
Table 3-69 Parameters of advanced attributes..................................................................................................3-158
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management Tables
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xix
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
22/385
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
23/385
1Managing RTN Protection SubnetsAbout This Chapter
A protection subnet has a structure of providing complete self-protection functions. The purpose
of managing RTN protection subnets is to configure and display network protection, for example,
viewing, creating, deleting, modifying and searching for protection subnets, managing NNIs,
and managing isolated nodes.
1.1 Basic Concepts
According to the layered structure of transport network, protection subnet, belonging to the
network layer, refers to a network structure that has a comprehensive self-protection function.
The protection subnet is a network unit of composing the optical transport network. To have a
good understanding of the protection subnet, you need to learn some basic concepts of thenetwork layer.
1.2 Searching for Protection Subnets
By searching for a protection subnet, the configured protection attributes at the NE layer on the
U2000 are synchronized to the network layer on the U2000 to create protection subnets
automatically.
1.3 Configuring an MSP Ring
In a ring network topology or when a service exists between rings or between a ring and a chain,
you can configure an MSP ring to protect the service if a fault occurs.
1.4 Configuring Linear MSP
In the linear network topology, you can configure the linear MSP to protect the network sectionby section.
1.5 Creating an Path Protection Ring
A path protection ring is used to protect a private ring network. Normally, the protection path
also transmits the primary service. STM-N signals can be quickly protected at a VC level without
runnig a switching protocol.
1.6 Configuring a Non-Protection Ring
When services on a ring do not need protection, you can configure a non-protection (NP) ring.
All timeslots on the ring can be used to transmit services.
1.7 Configuring a Non-Protection Chain
If a service in the chain does not need to be protected, you can configure a non-protection chain.In this case, all the timeslots in the chain can be used to transmit the service.
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management 1 Managing RTN Protection Subnets
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-1
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
24/385
1.8 Configuring DNI Protection
You can create DNI protection for the interworking nodes of two rings, and for the protection
of the interworking services between two ring networks. The network can be a combination of
equipment from different vendors or different protection modes. Moreover, DNI is also available
to fiber and node failures.
1.9 Configuring IF 1+1 Protection
IF 1+1 protection uses a standby path to protect an active service.
1.10 Configuring IF N+1 Protection
IF N+1 protection uses a standby path to protect N active services.
1.11 Maintaining Protection Subnets
When the protection status of a network is abnormal or when adjusting a network, you need to
maintain the protection subnet.
1.12 Deleting Protection Subnets
When an existing protection subnet is not suitable, you can delete the protection subnet.
1.13 Deleting Isolated Nodes
To release protection resources that are used by isolated nodes, you need to delete isolated nodes.
1 Managing RTN Protection Subnets
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management
1-2 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
25/385
1.1 Basic Concepts
According to the layered structure of transport network, protection subnet, belonging to the
network layer, refers to a network structure that has a comprehensive self-protection function.
The protection subnet is a network unit of composing the optical transport network. To have a
good understanding of the protection subnet, you need to learn some basic concepts of the
network layer.
1.1.1 Protection Subnet
A protection subnet refers to a network architecture that has a comprehensive self-protection
function. It is a network that composes the optical transmission network. In the U2000, the
protection subnet is a generalized concept that includes not only the network architecture with
the comprehensive self-protection function, such as the MSP ring and PP ring, but also the
network architecture without the self-protection function, such as the non-protection ring and
non-protection chain.
1.1.2 Isolated Node
An isolated node is not equal to an isolated NE. An isolated node refers to a special logical
system that is independent from any protection subnet. It is independent from any protection
subnet.
1.1.1 Protection Subnet
A protection subnet refers to a network architecture that has a comprehensive self-protection
function. It is a network that composes the optical transmission network. In the U2000, the
protection subnet is a generalized concept that includes not only the network architecture with
the comprehensive self-protection function, such as the MSP ring and PP ring, but also thenetwork architecture without the self-protection function, such as the non-protection ring and
non-protection chain.
In the U2000, a protection subnet is a network level concept rather than merely an MSP ring or
a PP ring. NEs and fiber connections are the basic elements required to construct a protection
subnet. You should create NEs, perform basic configurations for them, and then properly create
fiber connections between the NEs. You should have access to sufficient resources to create a
protection subnet.
1.1.2 Isolated Node
An isolated node is not equal to an isolated NE. An isolated node refers to a special logical
system that is independent from any protection subnet. It is independent from any protection
subnet.
An isolated node is a node that is configured at NEs but cannot or does not compose a protection
subnet with other nodes.
An isolated node should not exist in a transmission network that runs normally. The reason for
the existence of any isolated nodes can be as follows:
l The fiber that should be connected to the node is not created on the U2000.
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management 1 Managing RTN Protection Subnets
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-3
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
26/385
1.2 Searching for Protection Subnets
By searching for a protection subnet, the configured protection attributes at the NE layer on the
U2000 are synchronized to the network layer on the U2000 to create protection subnets
automatically.
Prerequisite
l You must be an NM user with "network maintainer" authority or higher.
l The NE data must be configured, and fibers must be properly created.
Procedure
Step 1 Choose Service > SDH Protection Subnet > Search for SDH Protection Subnet from the
Main Menu.
Step 2 In the Consistency Verification of Existing Subnet screen, select the protection subnet andclickNext.
NOTE
If the verification is unsuccessful and the subnet becomes abnormal, the search menu is unavailable. In
this case, you need to delete the abnormal subnet from the network layer and then re-search for the subnet.
Step 3 ClickSearch to start the search. The Subnet Name, Consistent Status and Subnet Typeparameters of the searched protection subnet are automatically displayed.
Step 4 ClickNext. The isolated nodes are displayed in the upper left pane of the window.
Step 5 Optional: Select the nodes that do not form any protection subnet, and clickDelete. ClickYes in the Operation Prompt dialog box.
Step 6 ClickFinish. The searched protection subnet is displayed in the Main Topology.
----End
1.3 Configuring an MSP Ring
In a ring network topology or when a service exists between rings or between a ring and a chain,
you can configure an MSP ring to protect the service if a fault occurs.
1.3.1 Creating an MS Ring Protection SubnetThe MS ring protection scheme is adopted in a common ring network. Normally, it is adopted
to protect a channel to transmit additional services. By running the APS protocol, it achieves the
MS level protection.
1.3.2 Checking Networkwide Multiplex Section Parameters
In the same MSP subnet, each NE should have the same multiplex section parameter settings.
After configuring or adjusting an MSP subnet, you need to check the parameters for the
networkwide multiplex section.
1.3.3 Verifying MSP Protection Switching
After creating a protection scheme and setting the related parameters, you can check whether
the protection scheme functions normally by performing a switching operation and query theswitching status.
1 Managing RTN Protection Subnets
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management
1-4 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
27/385
1.3.1 Creating an MS Ring Protection Subnet
The MS ring protection scheme is adopted in a common ring network. Normally, it is adopted
to protect a channel to transmit additional services. By running the APS protocol, it achieves the
MS level protection.
Prerequisite
l You must be an NM user with "network maintainer" authority or higher.
l The NE data must be configured, and fibers must be properly created.
Context
l The number of nodes in an MSP ring cannot exceed 16.
l When creating a protection subnet, select SDH NEs only. It is not required to select REG
or WDM equipment.
Procedure
Step 1 Choose Service > SDH Protection Subnet > Create 2f_MS SPRing from the Main Menu. ThePrompt dialog box is displayed. ClickOK.
NOTE
l To create a four-fiber bidirectional MS shared protection ring, choose Service > SDH Protection Subnet
> Create 4f_MS SPRing from the Main Menu to display the related dialog box.
l To create a two-fiber unidirectional MS shared protection ring, choose Service > SDH Protection
Subnet > Create 2f_MS DPRing from the Main Menu to display the related dialog box.
Step 2 Enter the name of the protection subnet. The default name is usually used, for example, 2f_MSSPRing_1.
Step 3 Select the rate of the protection subnet, for example, STM-4.
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management 1 Managing RTN Protection Subnets
Issue 02 (2010-09-24) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-5
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
28/385
Step 4 Select Resource Sharing and Assigned by VC4 as needed.
NOTE
l Resource Sharing indicates that a port is mapped into multiple protection subnets. If multiple
protection subnets uses one port of a board, you need to check the Resource Sharing check box. If
different protection subnets use different ports of a board, do not check this check box. If MSP Sharing
is enabled, you can check the Resource Sharing check box to map a port of the board to multiple
MSPs.
l Select the Assigned by VC4 option when there are different VC4s belonging to different protection
subnets to achieve virtual optical path protection. For example, for an STM-16 fiber, the VC4 1-4
belong to an STM-4 MSP, and VC4 5-8 belong to a non-protection ring.
Step 5 Add nodes to the protection subnet to be created. Double-click the NE on the Main Topology
to add it to the node list in the left-hand pane. Meanwhile, is displayed on the NE icon. If you
want to cancel the selection, double-click the NE again.
NOTE
For easy maintenance, the nodes should be added anticlockwise to the protection subnet.
Step 6 Set the attribute of the nodes. Select MSP Node in this example.
1 Managing RTN Protection Subnets
iManager U2000 Unified Network Management System
Operation Guide for RTN End-to-End Management
1-6 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-09-24)
-
8/22/2019 Operation Guide for RTN End-to-End Management-(V100R002C01_02)
29/385
Step 7 ClickNext to proceed to the Select Linkscreen of the wizard. Set parameters, such as PhysicalLink Information.
NOTE
l If there are multiple fibers between two NEs, select them from the Physical Link Information dro