CPAN Introduction
CPAN Introduction
CPAN Introduction
equipment.............................................................................................. 59
5. OTNM2000 Installation.................................................................. 77
6. OTNM2000 Introduction............................................................... 93
CPAN Introduction
2
CPAN Introduction
CPAN provides transparent MPLS-TP based Converged Packet Access Network (CPAN)
transmission of client data traffic
between connected client devices by
establishing and maintaining point-to-
point or point-to-multipoint
connections between such devices.
CPAN Introduction
3
IP/MPLS packet forwarding
MPLS was developed to make it possible to explicitly determine the path route of IP packets by
attaching a label to an IP packet and forwarding the packet by inspecting only the label instead of
the IP address header itself using label switched routers
4
Configuration of MPLS-TP Network
OAM
5
Difference between per-node and per-interface model in alarm classification
OAM Functions
6
Protection
The mechanism for network survivability is automatic protection switching, which involves reserving a protection
channel (dedicated or shared) with the same capacity as the channel or facility to be protected. The protection
mechanisms are categorized by topology (linear or ring), protection resource (dedicated or shared), direction
(unidirectional of bidirectional), and revertive or non-revertive.
7
Comparison of OAM functions in G.8113.1 and G.8113.2
8
CPAN Introduction
Service Classification
16
BROADEN YOUR FUTURE
www.fiberhomegroup.com
9
PAN Contents
Networking Networking Mode: the network can be chain network, star network, ring network and
capability MESH network etc.
Linear Protection: it can provide LSP 1:1 protection and PW redundancy protection
10
MPLS L2VPN Introduction
MPLS L2VPN means to transparently transmits L2 data of users on an MPLS network. From the point of view of
users, an MPLS L2 VPN is a two-layer switching network, on which an L2 connection can be established between
different sites.
MPLS L2VPN needs the following parts:
Ø Attachment Circuit (AC): An AC is an independent link or circuit attaching a CE to a PE. The AC interface is
a physical or logical interface. AC attributes include encapsulation mode, maximum transmission unit (MTU),
and interface parameters of specific link types.
Ø Virtual Circuit (VC): A VC is a logical connection between two PEs.
Ø Network Tunnel (Tunnel): transparently transmit user data.
BROADEN YOUR FUTURE
www.fiberhomegroup.com
L2VPN----E-Line Service
PE1 P PE2
CE1
CE2
CE3 PW
LSP CE4
n VPWS configuration is used, different services use different PW and different PW can use
one LSP
57
BROADEN YOUR FUTURE
www.fiberhomegroup.com
11
L2VPN---- E-Tree Service
VPLS B VPLS A
Leaf 1 Leaf 1
PE3
VPLS B
root Horizontal division
PE1 PE2
VPLS B
Leaf 2
LSP
Horizontal division
VPLS A VPLS A
VPLS A
root Leaf 2
VPLS A Leaf 3
Leaf 4
n VPLS configuration is used. In one VPLS, horizontal division is configured between leaf nodes.
4
BROADEN YOUR FUTURE
www.fiberhomegroup.com
L2VPN----E-LAN Service
VPLS B
VPLS A
Site2
Site2
PE3
VPLS B
Site1 PW
PE1
PE2
VPLS B
Site3
LSP
VPLS A
VPLS A
VPLS A
Site3
Site1 VPLS A Site5
Site4
n VPLS configuration is used. In one VPLS, services of different directions use different PW , disable
horizontal division for different directions.
12
L2VPN---- E-CES Service
PW LSP
n VPWS configuration is used, different E1s use different PWs and different PWs can use the
same LSP.
6
BROADEN YOUR FUTURE
www.fiberhomegroup.com
CPAN Introduction
13
Future Direction— SDN
14
15
IP Routing & Network Planning
IP Overview
IP Fundamentals
IP Routing
Network Planning
16
Business drivers for network
evolution to IP
17
From vertical networks to layered architecture
18
IP Overview
IP Fundamentals
IP Routing
Network Planning
› IP is part of the TCP/IP Model and is the glue that makes all the other protocols
work
19
OSI Model
Layer 1 - Physical
20
Layer 2 - Data Link
Layer 3 - Network
21
Layer 4 – Transport
Layer 5 – Session
22
Layer 6 – Presentation
Layer 7 – Application
23
OSI Model and TCP/IP Model
› Router examines IP header (reads the fields) and decides on the next hop by looking at
the ‘Destination’ IP field.
BROADEN YOUR FUTURE
www.fiberhomegroup.com
24
IPv4 Header Explanation
32 Bits
8 8 8 8
Source Address
Destination Address
Options Padding
IP Address
n An IP address uniquely identifies a network device. It contains 4 bytes, consisting of 32 bits.
32 bits
n An IP address consists of two parts: network part and host part.
25
Classful IP Addressing
Subnetting
Network C 192.168.1.0 has been divided into 4 smaller networks:
• 192.168.1.0 – 30 hosts
• 192.168.1.32 – 30 hosts
• 192.168.1.64 – 30 hosts
• 192.168.1.96 – 30 hosts
26
Subnet Mask
› To divide our class C network 192.168.1.0 into 2 smaller networks we
need to use some bits from host part as networks bits.
Address: 11000000.10101000.00000001.00000000 -> 192.168.1.0
Subnet Mask: 11111111.11111111.11111111.00000000 -> 255.255.255.0
Bitcount: 192.168.1.0/24
Available subnetworks:
› 192.168.1.0/25 – range 0-127
› 192.168.1.128/25 – range 128-255
BROADEN YOUR FUTURE
www.fiberhomegroup.com
27
Private IP Address Space
Network
Host Address Address Type Used to
Address
Stand for a network
Any "0" only Network address
segment.
Stand for all nodes in the
Any "1" only Broadcast address
specified network segment.
28
IP Overview
IP Fundamentals
IP Routing
Network Planning
What is IP Routing
› IP Routing is the process of delivering IP Packets from one device to another, across an
IP network, using routers.
29
Postal System
IP Network
30
IP Routing Basic
Ø John wants to exchange information with Bob
Ø IP packets needs to be forwarded across network
Ø Each router in the network needs to know the next hop of each packet to get to its destination.
L3 Forwarding Principles
Destination Next Hop
Network
Segment
192.5.1.0/24 10.1.1.1
192.5.0.0/16 10.1.1.1
10.1.1.2 20.1.1.2
10.1.1.0/24 10.1.1.2
10.1.1.2/32 127.0.0.1
10.1.1.1 192.4.1.1 192.5.1.1 ......
20.1.1.1
192.5.1.1
192.4.1.1
31
Route
IP/MASK NEXTHOP
IP/MASK NEXTHOP
100.1.0.0/16 DIRECT
100.1.0.0/16 R2
…..
….. R2 (100.1.0.0)
IP/MASK NEXTHOP
100.1.0.0/16 R1 R1
…..
100.1.1.1
R5
(200.2.0.0)
R3
R4
IP Forwarding Table
(130.3.0.0/16) (120.2.0.0/16)
32
IP Overview
IP Fundamentals
IP Routing
Network Planning
Hierarchical Architecture
FE
Access GE POS
NodeB layer
FE
Distribution layer Core layer
RNC
Access
NodeB layer GE POS
PWE3
RNC
BTS
Access layer: accesses services from base stations. Numerous network nodes exist at this layer and the
bandwidth pressure is small.
Recommended network mode: ring, chain, or dual-uplink network
33
Hierarchical Architecture
Distribution layer: converges traffic and ports, with powerful dynamic scheduling capability. Many
network nodes exist at this layer and the bandwidth pressure is relatively large.
Recommended network mode: ring or dual-uplink network.
Core layer: accesses traffic from the distribution layer. It serves as the service system gateway and
schedules entire traffic comprehensively. A few network nodes exist at this layer and the bandwidth
pressure is large.
Recommended network mode: dual-uplink, mesh, or rectangle-shape network
R835E
R845 R860
R860
R860
R860
R835E
R835E
34
Network Topology Planning for the
Distribution Layer
n Dual-homed core devices will be used for network building at the later stage if the
capital resource is sufficient. The purpose is to reduce the network load and
enhance network security.
RNC
RNC
Ring
RNC
MESH
35
Basic Principles for Planning
The counterclockwise allocation mode and No address can be duplicated with
the principle of allocating IP addresses from other addresses on the same
the core layer to the access layer ensure the Uniqueness
network.
continuity And aggregation of IP addresses.
Continuity Expansibility
Meaningfulness Economization
IP address allocation conforms to certain IP addresses must be fully used based on the
principles and useful information can be minimum use principle to avoid wastes. For
obtained from IP addresses. example, interface interconnection addresses
can use 30-bit mask addresses.
BROADEN YOUR FUTURE
www.fiberhomegroup.com
Loopback addresses
The system administrator creates one loopback interface for each router and allocates a
separate IP address for the interface as the management address to facilitate
management.
Interconnection addresses
Interconnection addresses refer to the addresses used by interfaces for connecting two
or more network devices.
36
Example of IP Address Allocation in NE
Management
R2 R1
Core Layer 12.2.254.1 12.1.254.1
12.4.254.1 R4 R3 12.3.254.1
R5
12.5.254.1
R9 12.9.254.1
Distribution Layer R6 R8
12.8.254.1
12.6.254.1 12.7.254.1 R10 12.10.254.
R7
1 R1112.11.254.
R12 R17 1
12.6.1.1 R14 12.8.3.1 12.10.3.1 R20
R16 12.10.1.1
12.6.3.1 R18
Access Layer R13
12.8.2.1
R15 12.10.2.1
12.6.2.1
R19
12.8.1.1
R8 R9
the principle of rings first and then chains.
10.229.2.2/32 10.229.2.3/32
37
Example of Interconnection Address
Allocation
n Allocate interconnection addresses based on 10.254.0.14/30 10.254.0.13/30
t h e net w or k h i er a r c h y a n d a l l o c a t e I P R1 R4 10.254.0.10/30
10.254.0.1/30
Core layer
addresses to interconnection interfaces from 10.254.0.2/30 10.254.0.9/30
38
39
MPLS VPNs Overview
MPLS Introduction
MPLS L2VPN
MPLS L3VPN
40
What Is A VPN Service?
A VPN is private, because it
Virtual Private Network has the same properties as
locally run internal networks.
Customer sites are separated.
VPN Requirements
nVPN service is
Privacy
nBe easy for the
customer to use
nEasy provisioning
of new sites
nScalability
41
What are MPLS VPNs?
LABLE FRAME
FR/ETH FR/ETH
ATM
ATM
LABLE FRAME
LABLE FRAME
MPLS Network
BROADEN YOUR FUTURE
www.fiberhomegroup.com
MPLS Introduction
MPLS L2VPN
MPLS L3VPN
42
Origin of MPLS
n Advantages of IP: Control plane: automatically calculates routes and dynamically updates routes by
using dynamic routing protocols.
n Advantages of ATM: Forwarding plane: forwards packets through label switching and is connection-
oriented, which guarantee quality of service (QOS).
MPLS Overview
n MPLS: Multi-Protocol Label Switching
n Multi-Protocol: Multiple layer 3 protocols, such as IP, IPv6, and IPX, are supported.
n Label Switching: MPLS operates at a layer that is generally considered to lie between traditional
definitions of OSI Layer 2 (data link layer) and Layer 3 (network layer), and thus is often referred to as
a layer 2.5 protocol. It was designed to provide a unified data-carrying service for both circuit-based
clients and packet-switching clients which provide a datagram service model. It can be used to carry
many different kinds of traffic, including IP packets, as well as native ATM, SONET, and Ethernet
frames.
43
MPLS Label
MPLS works by prefixing packets with an MPLS header, containing one or more labels. This is called a
label stack. Each entry in the label stack contains four fields:
n Label: A 20-bit label value. A label with the value of 1 represents the router alert label.
n EXP: a 3-bit Traffic Class field for QoS (quality of service) priority and ECN (Explicit Congestion Notification).
Prior to 2009 this field was called EXP.
n S: a 1-bit bottom of stack flag. If this is set, it signifies that the current label is the last in the stack.
n TTL: an 8-bit TTL (time to live) field.
44
Label Forwarding (1)
Label operation: Push
IP header analysis
Binding between FECs and LSPs
Mapping from labels to FECs
E1
A B C D
Ingress LER LSR LSR Egress LER
A:
E0
A B C D
Ingress LER LSR LSR
45
Label Forwarding (3)
Label operation: Swap
E0
A B C D
Ingress LER LSR LSR
A B C D
Ingress LER LSR LSR
46
MPLS Network Architecture
LSP Establishment
Static LSP is established by manually allocating labels for FECs. A principle that must be followed in
manually allocating labels is that: the value of the outgoing label of current node is the same as that of the
incoming label of the next node.
Dynamic LSP is established dynamically using routing protocols and label advertisement protocols.
MPLS supports several label advertisement protocols:
Label Distribution Protocol (LDP): LDP specifies the messages to be exchanged during label
advertisement and relevant processing. Through LDP, two LSRs negotiate label advertisement and establish
an LSP. LSRs query their local forwarding tables for incoming labels, next-hop node, and outgoing labels
that correspond to specific FECs and combine these information to build LSPs across the entire MPLS
domain.
47
LSP Establishment
Resource Reservation Protocol Traffic Engineering (RSVP-TE): RSVP is designed for the
Integrated Service model to reserve resource at nodes on a path. Despite working at the transport
layer, RSVP does not participate in application data transmission but functions as a control protocol,
like ICMP. As an extension of RSVP, RSVP-TE is used to establish Constraint-based Routed Label
Switched Paths (CR-LSPs), namely TE tunnels. RSVP-TE provides functions such as advertising
bandwidth reserve requests, bandwidth constraint, link coloring, and explicit path, which are
unavailable for common LDP LSP.
Multiprotocol Border Gateway Protocol (MP-BGP): MP-BGP is an extension of BGP. It introduces the
Community attribute and can be used to allocate labels for VPN routes and multi-domain VPN labeled routes
in MPLS VPN services.
LSP Establishment
Routing Routing
Routing protocol
Control Component
Routing table
48
Difference between IP Routing and MPLS
D est O ut
4 7 .1 1
4 7 .2 2
4 7 .3 3
DEST OUT IP 47.1.1.1 1 47.1
1
47.1.0.0 1
3 IP 47.1.1.1
47.0.0.0 1 2
2
47.1.1.0 1
1
47.3 3 IP 47.1.1.1 47.2
2
IP 47.1.1.1
IP Networking
BROADEN YOUR FUTURE
www.fiberhomegroup.com
MPLS Forwarding
1 47.1
3
3 1
2
IP 47.1.1.1
2
47.3 3 1 47.2
2
IP 47.1.1.1
During MPLS label forwarding, LSPs are established for packets beforehand by using allocated labels. When a
packet arrives at a device on such an LSP, only labels in the packet are switched quickly.
49
What Is A VPN Service?
MPLS Introduction
MPLS L2VPN
MPLS L3VPN
VPN Overview
A Virtual Private Network (VPN) is constructed by an Internet Service Provider (ISP) and
Network Service Providers (NSPs) on a public network.
Based on the two characteristics of a VPN, an IP network can be divided into logically isolated
networks.
Partner HQ
Remote office
Tunnel
Internet
Private line Branch
50
L2VPN Introduction
AC VC AC
tunnel
CE PE PE CE
MPLS network
MPLS L2VPN means to transparently transmits L2 data of users on an MPLS network. From the point of view
of users, an MPLS L2 VPN is a two-layer switching network, on which an L2 connection can be established
between different sites. MPLS L2VPN needs the following parts:
n Attachment Circuit (AC): An AC is an independent link or circuit attaching a CE to a PE. The AC interface is
a physical or logical interface. AC attributes include encapsulation mode, maximum transmission unit
(MTU), and interface parameters of specific link types.
n Virtual Circuit (VC): A VC is a logical connection between two PEs.
n Network Tunnel (Tunnel): transparently transmit user data.
MPLS L2VPN also uses a label stack to transparently transmit user packets through an MPLS network.
n Outer label (Tunnel label): used to transmit packets between PEs.
n Inner label (VC label in MPLS L2 VPN): used to identify connections of different VPNs. The PE receiving a
packet identifies the destination CE of the packet according to the VC label.
51
L2VPN Forwarding
LSP VC Vlan Payload
VC Vlan Payload
MPLS network
PE R R
PE Vlan Payload
Vlan Payload
CE CE
S S
MPLS network
S R
CE PE
R
PE S
CE
52
L2VPN E-Line VLAN Process
VL
AN
1
Switch 1 DA VLAN1 DATA 1
TA
1 VLAN2 DATA 2
S S
TA
2 Core Switch
DA Type 1: VLAN from client
2
AN
VL
Switch 1
DA
TA
1
Switch 1 VLAN1 DATA 1
VLAN2 DATA 2
S S
2 Core Switch
TA
DA Type 2: VLANs are added in PTN network
Switch 1
Root
MPLS network
S R
CE PE
Leaf
R
PE S
CE
53
L2VPN E-LAN Services
S
CE
PE
MPLS network
S R
CE PE
R
PE S
CE
CE
CE VLAN1
VLAN1 VSI1 VSI1
PE PE
VSI2 VSI2
CE
CE VLAN2
VLAN2
VSI1 VSI2
PE
CE CE
VLAN1 VLAN2
54
Capsulation of Ethernet Services
MPLS network
S R R R S
CE PE P PE CE
MPLS network
S R R R S
CE PE P PE CE
55
L2VPN Services Application
VPLS B
DATA 1
VPLS A
VLAN2 DATA 2
PE3
VPLS B
VLAN1 DATA 1 VPLS B
PE1
Horizontal Split PE2 DATA 1
VLAN2 DATA 2
LSP
VLAN2 DATA 2 VLAN2 DATA 2
VLAN2 DATA 2
Horizontal Split
VPLS A VPLS A VPLS A
VPLS A
56
What Is A VPN Service?
MPLS Introduction
MPLS L2VPN
MPLS L3VPN
MPLS L3VPN
57
MPLS L3VPN Implementation
CE
CE BGP
IP IP
888 IP Packet
400 PE IP Packet
888
300 PE IP Packet
888
P P PE
IP
IP Packet
IP
IP Packet
CE
CE
BROADEN YOUR FUTURE
www.fiberhomegroup.com
58
59
Introduction to CiTRANS 650 U Series Device
CiTRANS 650 U3
60
Overview of Device
CiTRANS 650 U3 supports the switching capacity of 160G. It can realize the 10GE and GE Ethernet access, CES
service access of STM-1 and E1, and circuit service access of STM-4, STM-1 and E1. It locates network access
aggregation and replaces SDH network access aggregation, to meet the unified bearing demands of centralized
scheduling and integrated service of wireless backhaul service.
61
Functional Overview of Device -2
Service Service protection
• Support the Ethernet service of Ø Support PW1:1 and LSP1:1
FE/GE/XGE Ø Support cross-card LAG
• Support E1 and STM-1 CES service
Ø Support the branch link protection
• Support E1 and STM-1/4 SDH service
• Support the static VPWS and VPLS service Ø Support MSP1:1\1+1
model Ø Support SNCP1+1
• Support LAG service model
QoS
Link detection Ø Support the simple QoS priority
• TP-OAM(Y1731) VS\VP\VC scheduling model
• SDH overhead
• LACP protocol
NNI NNI
Line Clock cross- Line
XGE/GE board connect board board XGE/GE
62
Device Hardware Architecture
Interfaces of
F/COM/CLK/MON/
TOD
UNI NNI
E1/cSTM STM-n
SE RDE S SE RDE S
Circuit service card SDH line card
FE/GE/XGE SE RDE S SE RDE S GE/XGE
Ethernet service card Master control cross- Ethernet line card
Function Architecture
63
Service Forwarding Process
CiTRANS 650 U3
64
U3 Backplane Bandwidth
40G 5 40G 10
40G 4 40G 9
40G 3 40G 8
Fan unit 15 40G 2 40G 7
40G/100G 1 40G/100G 6
Cross-connect master control card 12 Power 14
Cross-connect master control card 11 Power 13
65
CiTRANS 650 Card Function and Card Number Summary
SNCV1
CLK Green Work under locking state LOCKED CKIO interface: Support the external clock
Green, slow Work under hold state HOLD TOD interface: Support 1PPS+TOD
flashing
Green, quick Work under free running FREE
flashing state
STAT Green Work in active
66
MSV1
GSV4
67
XSV1
S1V1(CES)
68
S1V4(SDH)
S4V1(SDH)
69
S16V1(SDH)
E1V1(CES)&E1V3(SDH)
70
CTRANS 650 U Series Card Summary
CiTRANS 610A-8
71
Overview of Equipment
The CiTRANS 610A a new generation of packet transfer platform designed by FiberHome for packet
transport based on MPLS-TP. The CiTRANS 610A provides a switching capacity up to 6G and
provides various types of interfaces such as GE,FE, E1, and clock and time synchronization
interfaces. It is located at the remote access layer of the Nertwork, meeting the growing bandwidth
requirements of the IP-based services and implementing flexible scheduling of bandwidth resources.
The CiTRANS 610A includes CiTRANS 610A-8A (AC type) and CiTRANS 610A-8D (DC type).
Technical Specifications
72
Structure
Description of Structure
73
Description of Structure
Panel Description
Button
The RST button, which is a hidden button, is located on the panel. When this button is pressed down, the
equipment will be soft reset.
Sign
The equipment label is attached to the panel of the equipment. The label contains information such as SN and
MAC address of the equipment.
BROADEN YOUR FUTURE
www.fiberhomegroup.com
74
Panel Description
Interface Description
Note 1:
The GE/FE3 RJ45 interface and GE/FE3 SFP
interface constitute a Combo interface group. You can
use one of them as required, but the two interfaces
cannot work at the same time. When one interface is
enabled, the other one is automatically disabled.
75
Safety and Warning Signs
76
77
Installation of EMS client
78
Hardware and software
Ø OS:
For Server: Windows 2008 server.
For Client: Windows 7
Ø Database version:
Mysql5.1
79
Add network adapter(1)
Open the device manager , select the network adapter , action-->add legacy hardware.
80
Add network adapter (3)
81
Add network adapter (5)
Select microsoft loopback adaptor in “network connection”, right click , select property.
82
Preparation for the installation
83
The installation of database Mysql5.1(2)
Type command as shown below .
84
Preparation for the installation
85
Installation of the EMS client(2)
Ø 2. Accept the license agreement.
Click Yes.
86
Installation of the EMS client(4)
Ø 4. Select a language
Select English, and then click Next.
87
Installation of the EMS client(6)
Ø 6. Select the working mode
Select Client Mode, and then click Next.
88
Installation of the EMS client(8)
Ø 8. Select IP address for database
89
Installation of the EMS client(10)
Ø 10. Select a setup type
Select Typical and click Next.
90
Installation of the EMS client(12)
Ø 12. The following alert box appears subsequently. Click Finish to complete the
installation.
91
Client function checking(1)
Ø Run “createalldbroot” in the folder d:/otnm/md/alldb/mysql
Note:The IP address in the box is the database IP of the EMS server. Click ok. If we can login in
the EMS server and can monitor the equipment normally, that means the EMS client is installed
well(“1” is the default username and password).
BROADEN YOUR FUTURE
www.fiberhomegroup.com
92
93
OTNM2000 Introduction
OTNM2000 Introduction
OTNM2000 Functions
94
Software Architecture
n The OTNM2000 is a type of software researched and developed by FiberHome to effectively manage multiple
Product Features
Management Capability
Scalability
High Reliability
Extensibility
Security
User-friendliness
95
Networking with NEs
If an IP network is available, the OTNM2000 The OTNM2000 supports the management of multiple GNEs
can connect to the transmission equipment (Gateway Network Elements). On a large-scale network,
network through the IP network multiple GNEs can be deployed to improve the reliability and
avoid losing network control due to the disconnection of a
network management channel.
96
Functions of OTMN2000
Two icons will appear after OTNM2000 is installed completely. What we can do on them?
OTNM2000 Introduction
OTNM2000 Functions
97
Function Overview
Security management
98
Topology Management
u Logical Tree
u Operational Tree
99
Basic Configuration
Service Configuration
100
Manager Service Config
Before creating Network Topology, you should configure manager Service.
101
Create a part
Ø Right-click the project object in the Logical Tree pane and select New Network Block from the shortcut menu.
Then set the properties such as Part No, Part Name and Manager Service according to the data planning.
Create a part
102
Configuring Cards
103
Configuring Project, Part and NE
Business Configuration
104
Alarm Management
Alarm management involves
monitoring in real time the faults
and exceptions occurred during the
operation of the OTNM2000 and
providing alarm details and
analysis means, thereby providing
effective support for fault isolation
and rectification.
105
Alarm Classification
Alarms are classified as follows based on the causes:
uDevice alarms: alarms related to the device hardware.
uQoS alarms: alarms related to the service status and network QoS.
uCommunication alarms: alarms related to NE communication and
optical communication.
uEnvironment alarms: alarms related to the power supply system and
environment in the equipment room.
uHandling failure alarms: alarms related to software handling and
exceptions.
uAlarms are classified into five levels based on severity. The level of
each alarm can be changed as required.
Performance Management
106
Performance collect
107
Import DCG file
1 2 3
Steps:
108
109
DCN Solution
1 DCN Introduction
110
What is DCN?
B1-3
n DCN is Data Communication Network ,which is used to transmit OAM messages between NMS
and NE. The DCN system provides network equipment with management access and
Management
Network Out-band DCN
As part of network management, the DCN is used to transmit network management information.
The CiTRANS 600-Series support multiple DCN construction modes and isolation of MCN and SCN, and
implements both in-band and out-of-band DCN network modes.
111
In-Band DCN
In an in-band DCN, the service channel provided by the managed equipment is used to perform network
equipment management. In this mode, network management information is transmitted via the service
channel of the equipment.
This network mode is flexible and requires no additional equipment.
Out-Band DCN
112
Simple Introduction about DCN
1 DCN Introduction
113
CPAN EMS & DCN Brief Architecture
North NOC (in Chandigarh )
North eMS Client
UPS
FH CPAN
Network
North Region
DCN
FH CPAN South eMS Client
Network
South Region South NOC (in Bangalore)
UPS
L3 VPN(GRE)
IP Address Design
CPAN Interconnection interface IP 650/610A-8 Management IP
Two Types < 2 Direction
for IP Block /30 IP Block /30 IP Block
§ Each CPAN ring (domain) interconnect interface and management interface IP address are designed in a continuous network segment.
§ The 650 (ABR) do routing convergence, and then transfer the route to Domain 0.
114
Review CPAN DCN Solution
GRE Tunnel
EMS
CPAN IP/MPLS
Indian MNG-PAN
EMS
GE
convert
F
R660
We do nothing in our equipment for this scene , all
FH
Equipment configurations is done by customer in their equipment .
NETWORK
660+650
115
116
Packet Equipment Basic
Configuration
V2.0
Training Center
May 2018
117
Topology Configuration
Topology as shown below, two CiTRANS 650 U3 and two CiTRANS 610A, it’s a chain network.
650-1 650-2
610A-1 610A-2
Note:
The IP address of NE which connect with NMS server directly and the IP address of NMS
server NIC must be in the same subnet. For example, 650-1 is connected with NMS server
directly, IP address of 650-1 is 10.18.1.1/24, you can use 10.18.1.254/24 as NMS server IP,
gateway of NMS server should be 10.18.1.1/24.
Note:
System would create “project 1” automatically, you can modify project name in “property”
by right click on “project 1”. Choose “New Network Block”.
118
——network block name:Name for this network block.
Click “Ma Ne No” button,below the network block, create the first NE.
1)NE Property Config.
119
650-1 650-2
10.18.1.1 10.18.2.1
610A-1 610A-2
10.18.3.1 10.18.4.1
Note:
1) Following IP address is NE management IP, use for NMS OTNM2000 managing NE.
2) 32 NEs can be added into a network block at most.
3) It is not recommended to add Layer 2 NE and Layer 3 NE in the same network block.
3. Topology Configuration.
You must add links strictly the same as the existing network.
WAN_1 WAN_1
610A-1 610A-2
Note:
When adding links, make sure the port rate for both sides of link are the same.
120
121
Set IP Address of Devices by SN
V1.0
122
Set IP address of devices by SN
Each device has a unique SN, and the devices can be discovered by SN, so the
server can monitor and manage the devices on OTNM2000.
In the menu bar, choose “Configuration”-------“NE Ip Remote Config”.
1. Set local NE
Choose the local NE and click “Settings---set as local NE”.
Caution: the local NE is the device that connected to the server directly.
2. Discover local NE SN
Click “Query---Read Local NE SN”.
123
124
L2VPN Service Configuration
(E-Line)
V1.0
125
L2VPN Service Configuration (E-Line)
For different types of services, the configuration may be different.
650-1 650-2
610A-1 610A-2
GE
Requirements:
One channel of GE signal is transmitted between 610A-1 and 610-2, and the service type
is E-Line.
1. Configure the loopback IP
Right click on the Citrans 650 NE, and choose “NE config”---------“interface manager
“---------“manager port”.
650-1 650-2
1.1.1.1/32 2.2.2.2/32
610A-1 610A-2
10.26.0.1/30
10.26.0.5/30 10.26.0.9/30
650-1 650-2
10.26.0.2/30
610A-1 610A-2
126
——port_mode:
When the interface is used to connect IP RAN device, “L3” should be chosen.
When the interface is used to connect PTN device, “TP” should be chosen.
——ip_mode:
Set according to the planning.
——mpls_en:
For NNI interface, “mpls_en” must be signed.
3. Configure ARP
Right click on the NE, and choose “NE config”------“Other” ----“static”.
127
Click the arrow on the right of “slotType”.
Modify the port type “I-NNI” to “UNI” for the interface that needs to transmit client
services.
128
Click “OK”.
5. Configure tunnel
Click “Next”.
Select the source LSR as 610A-1, and the sink LSR as 610A-2.
129
Set the label of working path in the forward and reverse direction.
Then, click “Next”.
130
Choose the path.
If we “select an NE”, the path will pass through this NE.
If we do not select an NE, the static policy will take effect.
“Min. NE quantity” means the shortest path.
Click “Next”.
131
Click “Finish”, the tunnel is set up successfully.
6. Configure PW
On the menu bar, click “Business Configuration”------“PTN/IP RAN”------“PW”.
132
Choose the source and sink NE.
Set the PW label in positive and reverse direction.
Caution: The label in the positive and reverse direction must be the same.
Click “Next”.
Sign the corresponding tunnel, set the quantity and then click “Finish”, the PWs are
set up successfully.
133
7. Configure L2VPN
On the menu bar, click “Business Configuration”------“PTN/IP RAN”------“L2VPN
service”.
134
Select the source port as “WAN”.
Select the sink port as “WAN”.
Click “Next”.
Click “Next”.
Click “Completed”.
135
Caution: Multiple PWs can be configured in one tunnel, and one L2VPN service can
be configured in one PW.
136