Sie sind auf Seite 1von 64

Training on Pasolink Network

Management System (Java version)

Technical Center Group


NEC India
Contents
 Introduction to Pasolink family
 Introduction to Netconfigtoolj
a) Definitions and Basic Operation
b) Creation of configuration files
 Introduction to PNMSj
a) Introduction to DCN concepts
b) PNMSj installation and integration
c) Basic operation
 PNMSj practicals.
Introduction to Pasolink family
Introduction to Pasolink Family
Pasolink Family Tree
Introduction to Pasolink Family
Introduction to Pasolink Family
Introduction to Netconfigtoolj
Introduction to Netconfigtoolj
Main Window Main Menu Tool Bar

Network list

Work Area
Introduction to Netconfigtoolj
File Menu
Start a new network configuration. This will delete
the current network configuration loaded on the
NetCfgTool.

Open and existing NetCfgTool file (nct) and load it


on the workspace. This will allow you to work and
modify a saved configuration.
.
the current configuration in the workspace. Save
The file will be save as *.nct.
.
Select a specific area in the workspace to be
printed.

Export Configuration files to the PMC : config


files downloaded to the PMC to allow it to
participate in PNMS network

Netconfigtool View the list of NE’s that have changes in the


Shuts down configuration file (network.cfg /system.cfg)
Edit Menu

Select an NE

Add Network Element in the


work space

Add a back-to-back line


between NE’s.

Select NE type (Pasolink V3, Pasolink-


S, Pasolink+ STM-1, MIU, Pasolink
NEO etc.)
Network Menu

Add a new Network. This will essentially


allow you to add another CPMC cluster in
the PNMS.

Copy an existing Network

Modify or edit the Properties of the


Selected Network. (Change IP network
address, and or subnet mask.)
Tools Menu

Check and create the


configuration of the selected
network.

Display the subnet information


of the selected network.
Help Menu

Display NetConfig Tool Manual.

Show the version number of the


NetConfig Tool
NE Properties
Right Click on any NE and click properties to display the
following window.

The General Tab


NE Properties - Network

The Network Tab


NE Properties - PNMS

PNMS Tab
Network Properties
Right click in the background and select Network properties

The General Tab


Network Properties - Subnet
Create Configuration wizard
Create Configuration wizard
Create Configuration wizard – Changed NE list
Introduction to PNMSj
System Overview

The NEC PNMS is a sophisticated supervisory tool for transmission equipment and allows operator to
perform remote system monitor alarms, control NE configuration parameters and display event logging and
performance data in either UNIX or Microsoft Windows platform.
Fig. above shows a typical PNMS application. The system consists of a central computer (PNMS PC) and a
number of remote data processing nodes called as PM cards. It supervises and controls the Pasolink
transmission equipments.
System Components

PNMS : The central site computer is the central operator interface and database from which system
operators manage the Pasolink network. It receives the data via PM card, stores it and displays it to the
operator in a variety of formats. It accepts command request from the operators and sends them to the on-
site equipment for execution. Two types of PNMS can be proposed in accordance with customer‟s
network size viz : PNMS on Windows NT/2000/XP and the other is PNMS on UNIX OS.

Pasolink Management (PM) Card : PM cards are located at each site in the monitored network to
collect alarm and status information from Pasolink and to control that equipment in response to
commands from the central site operator. The PMC primary tasks are to control and acquire data from
Pasolink at remote location and transfer this data back to the central site. The PM card is designed as
plug-in modules.

PM card is functioned as SNMP agent, which detects alarm and status changes in monitored equipment
and sends change of notifications to PNMS.

PM card retains the MIB data and transmits a response to “SNMP GET” commands from PNMS and
PNMT.
PMC Operation Modes
Depending on the size, a network can normally be divided into a number of sub-networks. To
distribute the traffic load we normally define one of the PMC as master and the rest as slaves
through discrete design. We also call a master as Central PMC (CPM), a sub-master as Sub-
Central PMC (SCPM) and a slave as Remote PMC (RPM).
Even though there is no difference in the hardware design, the PMC will be playing different roles
according to the installed software in a NMS as follows :
Master mode (CPM) :
• To get information from the remote sites and to generate reports to the PNMS. The
CPM may act as a terminal unit; which processes and then transfers all the physical
information of equipment, which is directly connected to the CPM.
• The CPM is connected to PNMS via a dedicated serial communications link, and passes
messages received from RPMCs to the PNMS for display.
Sub Master mode (SCPM) :
• Master and gateway function which performs the same activity as a CPM acting as a
gateway between CPM and RPM and routing the messages from CPM to RPM and
back.
• It also performs a terminal unit function that acts as a stand-alone data acquisition and
control unit which processes and then transfers all the physical information of
equipment which is directly connected to the SCPM. This function is same as that of
RPM.
Slave mode (RPM) :
• It is a stand-alone data acquisition and control unit. It monitors and controls
equipments at some remote location. The prime task of RPM is to monitor, control and
transfer data back to the central site.
PMC Operation Modes

NEO NE
IP Address
For the TCP/IP communication, each node connected in the network needs to be given an
IP address. By interpreting the given IP address, all the nodes can communicate each
other.
The form of the IP address is :
- Length : 32 bits
- It consists of two parts
Network Part (Also called Network Address)
Field to identify the logical network
Host Part (also called Host Address)
-Notation
Dividing 32 bits into four 8-bits sections, changing each of them into decimal numbers,
and arraying them in a line with dots separating those numbers (called “dot notation”)
Example : 1100 0011 0000 0000 0001 0010 0011 0100

195 . 0 . 12 . 34
27
IP Address
Classifying IP address (Class A B and C)
IP address are classified according to the values of their most significant 1 to 4 bits.
There are five classes; A, B, C, D and E. The classes D and E are however, used for
special purposes only and are not dealt with. Class A, B and C are explained here. These
three classes are allocated to nodes and devices according to the number of networks and
host computers in a network.
Class A (from 0.x.x.x to 127.x.x.x)
Number of networks : 128 (= 2^7)

00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 3 1
Number of Host per Network :
16,777,214 (=2^24-2)
0 7 bits 24 bits
All “0” is used to indicate the network
Network Part Host Part itself and all „1” is used for IP
broadcast address.

00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 3 1 Number of Networks:16,384 (=2^14)


1 0 14 bits 16 bits Number of Host per Network :
65,65,534 (=2^16-2)
Network Part Host Part
Number of Networks:
00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 3 1
2,097,152 (=2^21)
1 1 0 21 bits 8 bits
Number of Host per Network :
Network Part Host Part 254 (=2^8-2)

28
IP Address
Global IP address and Private IP address
The Global Address refers to the IP address uniquely assigned to a device connected to
the Internet and is essential for communicating through the Internet. The Global Address
is centrally administered by IANA, under whose jurisdiction the NICs (Network
Information Centers) of each country allocates addresses to such organizations as service
providers.
The Private Address can be freely allocated within an organization without applying for
the allocation to NIC. The address space which never be accessed in the Internet is
defined by RFC (Request For Comment) -1918.

Privet IP Address Space Class A From 10.0.0.0 to 10.255.255.255.255


Class B From 172.16.0.0 to 172.31.255..255
Class C From 192.168.0.0 to 192.168.255.255
Address
Translation at
* NAT/NAPT

INTERNET INTERNET

* NAT : Network
Address Translation

Privet IP Address or Global Global


IP Address is used IP Address is used
29
IP Address
Subnet
Since recent trend has accelerated the introduction of LAN, the number of segments (logical
networks) in many corporations has significantly increased. However, allocating class-B or
class-C addresses will swiftly exhaust the address space. To cope with this situation was
created Subnet Address that allows to further subdivide a network address.
A subnet address is a means to expand the number of identifiable networks by using several
bits in the host part of the IP address for each class.
In the subnet environment, the network address is handled as the network part plus subnet
part, thus expanding the network part by partial use of the host part.
When viewed from outside of the subnet, it looks like a network of the same class.

 Without Subnet (IP address of class A, B or C

Network Part Host Part

 With Subnet

Network Part Subnet Part Host Part

Interpreted as Network Address

30
Subnet Mask IP Address
The Subnet Mask is used to identify the boundary of the network part and the host part in the network that
divided in to subnets.
The notation of the subnet mask is similar to the IP address. The 32-bit array is divided in to four 8-bit parts,
each of which then converted into decimal numbers. These numbers are arrayed in a line with dots placed
between them for separation. The part where the bit stream shows continuous “1”s in the subnet mask means the
network part. The subnet mask utilized for a node to check if other corresponding computers belong to the same
subnet (segment).
Example : The subnet mask of an IP address whose network part consists of first 26 bits.
11111111 11111111 11111111 11000000
( 255 . 255 . 255 . 192 )
Calculation of Network Address from an IP Address and Subnet Mask : Comparison of IP address and
subnet mask of the node leads to the network address. The comparison is to be done in the following steps.
IP address (Decimal) : 195 . 125 . 100 . 8
: 255 . 255 . 255 . 192
IP address (Binary) : 11000011 01000101 01100100 00001000 Apply logical AND

Subnet mask (Binary) : 11111111 11111111 11111111 11000000 CIDR (classless inter-
domain routing :
Network Address(24bits) Host (6bits)
Subnet address(2bits) 195. 125. 100. 8/26*
* Indicates first 26 bits is
Network address (Binary) : 11000011 01111101 01100100 00000000
network address
(including subnet)

Network address (Decimal) : 195 . 125 . 100 . 0


31
IP Addresses and Subnets

RS232C
19.2/9.6kbps, Async
PNMS Remote Site-B

4 5
PNMS
(Windows) 2 3
Remote Site-C

Remote Site-A
6 7
Remote Site-D
1 : CPM
2 : RPM
8

Figure7.1 Typical Network Example (Simple trunk line [Physical Model])


Typical network example

Subnet-A (PNMS-CPM Subnetwork)


PNMS 172.20.100.1
172.20.100.2

172.20.101.1 172.20.101.4
172.20.101.3 172.20.101.5 172.20.101.7

172.20.101.2 172.20.101.6 172.20.101.8


1
CPM
Central Site 2 3 4 5 6 7 8
RPM RPM RPM RPM RPM RPM RPM

Subnet-B (PASOLINK CPM cluster)

Figure7.2 Typical Network Example (Simple trunk line [Logical Model])


Typical network example

RS232C
19.2/9.6kbps, Async

R IP R 1
Network Remote Site-B
PNMS

4 5

2 3
Remote Site-C

Remote Site-A
6 7

R : Router Remote Site-D


1 : CPM
2 : RPM 8

Figure7.3 Typical Network Example (Simple trunk line [Physical Model])


Typical network example
PNMS

Subnet-A (Router-CPM Subnetwork)


R
IP
Network 172.20.100.1
R 172.20.100.2
172.20.101.8

172.20.101.1 172.20.101.4
172.20.101.3 172.20.101.5 172.20.101.7

172.20.101.2 172.20.101.6
1
CPM
Central Site 2 3 4 5 6 7 8
RPM RPM RPM RPM RPM RPM RPM

Subnet-B (PASOLINK CPM cluster)

Figure7.4 Typical Network Example (Simple trunk line [Logical Model])


Typical network example
Typical network example

RS232C
19.2/9.6kbps, Async
Remote Site-B
1
PNMS 5 6
(Windows)
Central Site
3 4
Remote Site-E Remote Site-C

Remote Site-A 7
Remote Site-G 10 9 2
8
13 12 11
RS485
Remote Site-D
9.6kbps, Async
Remote Site-F
1 : CPM
14
2 : SCPM
3 : RPM

Figure 7.6 Typical Network Example (Multi sub-branches network[Physical Model])


Typical network example

PNMS 172.20.100.1 Subnet-B


172.20.100.2 (PASOLINK CPM cluster)
172.20.101.1 172.20.101.7
172.20.101.4
172.20.101.3 172.20.101.5 172. 20.101.8
1 172.20.101.2 172. 20.101.6 172.20.101.9
CPM
Central Site 3 4 5 6 7 8 2 14
RPM RPM RPM RPM RPM RPM SCPM RPM
172.120.101. 21 172.20.101. 20 172.20.101.17
172.20.101. 19 172.20.101.18
172.20.101. 22
Subnet-A
(Router-CPM Subnetwork) 13 12 11 10 9
RPM RPM RPM RPM RPM

Subnet-C
Figure 7.7 Typical Network Example (Multi sub-branches network[Logical Model])
Network Size ( Pasolink Family)
Network Sizing Rule :

Network Elements Allowed


Pasolink NEO Pasolink + Pasolink V3/V4

Number of Regions for 1 central PNMSj 50 50 50


Number of Networks in 1 PNMSj Server 500 500 500
Number of Sub Networks in 1 Network 64 64 32
Number of NEs in 1 Network 500 500 416
Number of NEs in 1 Subnet 1,5,13,29,61 (max) 1,5,13,29,61 (max) 1,5,13(max)
Number of NEs in Multidrop Connection 32 32 14

Subnet Mask Subnet Size Available IP Address Number of NEs

255.255.255.252 4 2 1
255.255.255.248 8 6 5
255.255.255.240 16 14 13
255.255.255.224 32 30 29
255.255.255.192 64 62 61

39
PNMSj Basic Operation
Main Window Map: Group Map
Main Menu

Views

Event Log
Map Views

Group View Connection View


Event Log Window
User/Group Management Window

Security Window
Link Summary Window
Group Properties Window (Adding new user)
PNMS Properties Window
Active Alarm Window
Alarm History Window
Event Log History Window
Network Configuration Update Window

Network Configuration
Update Wizard (1/6)
Network Configuration Update Window

Network Configuration Update Wizard (2/6)


Network Configuration Update Window

Network Configuration Update Wizard (3/6)


Network Configuration Update Window

Network Configuration Update Wizard (4/6)


Network Configuration Update Window

Network Configuration Update Wizard (5/6)


Network Configuration Update Window

Network Configuration Update Wizard (6/6)


Network Configuration Update Window

Network Configuration Finish


Configuration files Downloading
Configuration files Downloading
Configuration files Downloading

 This function is used to download configuration files created by the NetConfig Tool to the PM Card in the selected NE.

 There are two files created for each NE – MIB.cfg and Network.cfg.

 MIB.cfg contains file contains relevant information about the equipment (i.e. name, pm type, etc.) and housekeeping (Aux. I/O).

 Network.cfg contains the IP address of the target NE as well as the IP address of the opposite NE and the information about the network where the target
NE is located.

 Click on the CONFIGURATION FILE button under the DOWNLOAD (PC>>PMC) in the PMC window to open the Download Configuration file
window.
Configuration files Downloading

 Select each type of config file one by one from the type window

 Browse and select the path location to the file selected in the type window

 Click execute button to download the selected config file

 Repeat the download procedure for the other config file.

 A message window indicates the status of the download operation and it will close automatically once the operation is over.
Configuration files Downloading
Configuration files Downloading

 After the successful download of the configuration files, click UPDATE button. Update Configuration File window opens.

 Select the appropriate box for the type of configuration file(s) that will be updated.

 Click OK button to start the update operation.

 While updating CFG file, PMC to PMC communication will be lost when PMC initializes to the new system configuration. During this time,
PNMT connection to the Pasolink will be lost but will be automatically be reconnected after the PMC resets.
Thank You

64

Das könnte Ihnen auch gefallen