Beruflich Dokumente
Kultur Dokumente
SDH TRANSMISSION
Nortel TN-1X
Command Line User Interface Guide
Printed in England
The copyright of this document is the property of Nortel Networks. Without the written consent of Nortel Networks, given by contract
or otherwise, this document must not be copied, reprinted or reproduced in any material form, either wholly or in part, and the
contents of this document, or any methods or techniques available therefrom, must not be disclosed to any other person
whatsoever.
NORTEL NETWORKS CONFIDENTIAL: The information contained herein is the property of Nortel Networks and is strictly
confidential. Except as expressly authorized in writing by Nortel Networks, the holder shall keep all information contained herein
confidential, shall disclose it only to its employees with a need to know, and shall protect it, in whole or in part, from disclosure and
dissemination to third parties with the same degree of care it uses to protect its own confidential information, but with no less than
reasonable care. Except as expressly authorized in writing by Nortel Networks, the holder is granted no rights to use the information
contained herein.
So far as Nortel Networks is aware the contents of this document are correct. However, such contents have been obtained from a
variety of sources and Nortel Networks can give no warranty or undertaking and make no representation as to their accuracy. In
particular, Nortel Networks hereby expressly excludes liability for any form of consequential, indirect or special loss, and for loss of
data, loss of profits or loss of business opportunity, howsoever arising and whether sustained by the user of the information herein
or any third party arising out of the contents of this document.
*
NORTEL NETWORKS, the Nortel Networks logo, the Globemark and Unified Networks are trademarks of Nortel Networks.
Microsoft and Windows are trademarks of Microsoft Corporation. HyperTerminal is a trademark of Hilgraeve Inc.
IBM is a trademark of International Business Machine Inc. Hewlett-Packard is a trademark of Hewlett-Packard Company.
Publication history
July 2001
Release 9 Standard
November 1998
Release 8 Standard (Revision 2)
October 1998
Release 8 Standard (Revised)
September 1998
Release 8 Standard
April 1998
Release 7 Standard (Revision 2)
November 1997
Release 7 Standard (Revision 1)
October 1997
Release 7 Standard
Contents
About this document xv
Related documents xv
Technical support and information xvi
Introduction 1-1
The structure of the UI 1-1
Using this book 1-3
Reports 4-10
Config/External_alarm <C E> 4-11
External alarms 4-11
Command details 4-11
Parameters 4-12
Autonomous events 4-12
Reports 4-12
Config/Alarms/Thresholds <C A T> 4-14
Alarm thresholds 4-14
Command details 4-14
Parameters 4-15
Autonomous events 4-15
Reports 4-16
Config/Alarms/Monitoring <C A M> 4-17
Alarm monitoring 4-17
Command details 4-17
Parameters 4-19
Autonomous events 4-19
Reports 4-19
Config/Alarms/Rau_priority <C A R> 4-21
RAU priority 4-21
Command details 4-22
Parameters 4-27
Autonomous events 4-28
Reports 4-28
Config/Alarms/misC <C A C> 4-31
Lamplocking 4-31
Command details 4-31
Parameters 4-31
Autonomous events 4-31
Reports 4-32
Config/perF_mon <C F> 4-33
Performance monitoring 4-33
Command details 4-38
Parameters 4-45
Autonomous events 4-46
Reports 4-47
Config/Sync_source <C S> 4-51
Synchronisation source protection 4-51
Command details 4-56
Parameters 4-58
Autonomous events 4-58
Reports 4-59
Config/Cons_act <C C> 4-60
Consequent actions 4-60
Command details 4-62
Parameters 4-64
Autonomous events 4-64
Reports 4-65
Config/Lp_path_Trace <C LT> 4-66
Low order path tracing 4-66
Command details 4-67
Parameters 4-68
Autonomous events 4-68
Reports 4-68
Index 14-1
Figures
Figure 3-1 Example login, NE status information and main user menu 3-3
Figure 4-1 Configuration command hierarchy 4-1
Figure 4-2 Config/Pps command hierarchy 4-3
Figure 4-3 Config/cOmms command hierarchy 4-7
Figure 4-4 Config/External_alarm command hierarchy 4-11
Figure 4-5 Config/Alarms/Thresholds command hierarchy 4-14
Figure 4-6 Config/Alarms/Monitoring command hierarchy 4-17
Figure 4-7 Config/Alarms/Rau_priority command hierarchy 4-22
Figure 4-8 Config/Alarms/misC command hierarchy 4-31
Figure 4-9 Config/perF_mon command hierarchy 4-38
Figure 4-10 SSM within an STM-N ring 4-54
Figure 4-11 Config/Sync_source command hierarchy 4-56
Figure 4-12 Config/Cons_act command hierarchy 4-62
Figure 4-13 Config/Lp_path_Trace command hierarchy 4-67
Figure 4-14 Config/Hp_path_trace command hierarchy 4-71
Figure 4-15 Config/Lp_paYload_label command hierarchy 4-75
Figure 4-16 Config/Hp_paYload_label command hierarchy 4-79
Figure 4-17 TN-1X connection types 4-83
Figure 4-18 Config/coNnections command hierarchy 4-90
Figure 4-19 Config/carDs command hierarchy 4-99
Figure 4-20 Config/Payman_Protect command hierarchy 4-107
Figure 4-21 Config/Trib_Protect 4-111
Figure 4-22 Config/poRts 4-114
Figure 4-23 MSP configurations 4-119
Figure 4-24 MSP protection between rings 4-119
Figure 4-25 Unidirectional operation 4-120
Figure 4-26 Bidirectional operation 4-121
Figure 4-27 Config/MSp command hierarchy 4-127
Figure 4-28 Config/tn1x_Card_Switch command hierarchy 4-133
Figure 4-29 Config/PunchThrough command hierarchy 4-135
Figure 4-30 Config/oVeride command hierarchy 4-138
Figure 5-1 Diagnostic menu structure 5-1
Figure 5-2 Overview of loopbacks 5-2
Figure 5-3 Diagnostic/Loopback menu structure 5-4
Figure 6-1 Maintenance menu structure 6-1
Figure 7-1 View_status menu structure 7-1
Figure 8-1 Session menu structure 8-1
Figure 9-1 Administration menu structure 9-1
Figure 9-2 An overview of the software download mechanism 9-3
Figure 9-3 Admin/Sw menu structure 9-12
Figure 9-4 An overview of restoring a configuration table 9-17
Figure 9-5 Admin/Cnfg_tbl menu structure 9-28
Figure 9-6 Admin/User menu structure 9-33
Tables
Table 2-1 PDH tributary units 2-4
Table 2-2 SDH tributary units 2-5
Table 2-3 SDH aggregate units 2-6
Table 2-4 SDH high order payloads 2-7
Procedures
Procedure 3-1 Logging in to the TN-1X from the CAT 3-2
Procedure 3-2 Logging
3-2 in to the TN-1X from the Preside EC-1 Element Controller
Procedure 9-1 Preparing the application software on the CAT 9-5
Procedure 9-2 Downloading application software from the CAT 9-5
Procedure 9-3 Preparing the application software on the Preside EC-1 Element
Controller 9-8
Procedure 9-4 Downloading application software from the Preside EC-1 Element
Controller 9-8
Procedure 9-5 Restoring a configuration table from the CAT 9-19
Procedure 9-6 Restoring a configuration table from the EC-1 9-21
Procedure 9-7 Backing up a configuration table to the CAT 9-24
Procedure 9-8 Backing up a configuration table to the EC-1 9-27
Procedure 9-9 Changing passwords 9-32
Procedure 10-1 Setting up HyperTerminal 10-2
Procedure 10-2 Starting a CAT session on HyperTerminal 10-3
Related documents
The following documents are referenced within this book:
1 Nortel TN-1X System Description, Release 9 (NTP 323-1061-100).
2 Nortel TN-1X Software Administration, Release 9 (NTP 323-1061-303).
3 Nortel TN-1X Browser User Interface Guide, Release 9
(NTP 323-1061-403).
4 Nortel TN-1X Alarm Clearing Procedures, Release 9
(NTP 323-1061-543).
5 Nortel TN-1X Module Replacement Procedures, Release 9
(NTP 323-1061-547).
6 Preside EC-1 Element Controller User Procedures, Release 14
(NTP 323-1091-402).
IONNTPS@nortelnetworks.com
Nortel Networks provides a full technical support service for its customers.
The Nortel Networks Service Desk can be called at any time on the following
numbers:
As an option, you can contact technical support through the Nortel Networks
web site:
www.nortelnetworks.com
EMC/Safety conformance
This product/product family complies with the essential
protection requirements of the EMC Directive 89/336/EEC as
amended by 92/31/EEC, when it is properly installed and
maintained and when it is used for the purposes for which it is
intended.
1-1
Introduction 1-
The Nortel Networks TN-1X Command Line User Interface (UI) of the
TN-1X enables the user to access, configure and control the TN-1X add-drop
multiplexer (Network Element/NE). The command line user interface sits
between the user and the mux’s application software, and is accessed via:
• A Craft Access Terminal (CAT). This is an IBM* compatible Personal
Computer (PC) running Microsoft* Windows 3.1/Windows95 and
terminal emulation software. The PC communicates with the NE via an
RS232-C interface connected to the network element’s CAT interface.
• A Preside EC-1 Element Controller. This is a Hewlett-Packard* (HP)
workstation platform running the HP-UX 10.20 operating system and the
Preside EC-1 Element Controller management software. The Preside EC-1
Element Controller communicates with the NE via a Local Area Network
(LAN).
• Maintenance actions:
— Terminating performance monitoring.
— Setting the mux clock.
— Manual VC-12/VC-3 path protection switching.
— Manual VC-3 1:1 tributary protection switching.
• Configuring the NE:
— Card configuration.
— Connection management.
— Communications management.
— Path protection switching.
— Multiplexer section protection switching.
— Performance monitoring.
— Alarms management.
— External alarms.
— Synchronisation source protection.
— Consequent actions.
— Low-order path tracing.
— High-order path tracing.
— Low-order payload label definition.
— High-order payload label definition.
— Payload manager protection.
— 1:N Tributary protection.
— 1:1 manual tributary protection.
• User interface session management.
• Software and configuration table management.
• User administration.
The UI provides three different user classes, available from the CAT and the
Preside EC-1 Element Controller (see “Accessing the UI application
software” on page 3-1). Each user class has different access privileges.
User interface 2-
Menu structure
The User Interface (UI) for the TN-1X has a text-based hierarchical menu tree.
After login, from either the CAT or the Preside EC-1 Element Controller, the
user is positioned at the top level of the menu tree. This is formatted as the
example below:
Config/, View_status/, Session/, Admin/, Maint/,
Diagnostic/, Logout
TN-1X /
>>
The first two lines show a list of menu options and the bottom line shows the
path (the user’s position in the menu tree) and command prompt. In this case,
at the root (the top level of the menu tree), the path is shown as a single ‘/’
character.
Menu items which have subordinate menu levels are suffixed with the ‘/’
character. Menu items without a suffix are commands in the current menu.
The user is able to move down the menu hierarchy or execute commands by
typing the desired menu item name, or a shorthand version of this name. The
UI is line oriented, and as such it requires a carriage return after each user
request. No processing takes place until a return has been pressed.
When the menu level changes, the new level of the menu structure is
displayed.
Two special characters can be used to move around the menu system:
• The asterisk character (*). This moves the user up one level in the
command hierarchy.
• The tilde character (~). This moves the user to the top (root) of the
command hierarchy.
Command prompt
The command prompt (>>) is printed beneath a block of information that
includes the current menu, and an indication of the user’s location in the menu
hierarchy. In almost all instances, the location always begins with “TN-1X”,
followed by menu names separated by slashes.
For example, when accessing the area address submenu, the following
information is displayed:
Set_1, Set_2, Set_3, Clear_1, Clear_2, Clear_3, View,
*=go back, ~=go to root
TN-1X /Config/cOmms_management/Area_address/
>>
If the TN-1X is in detached mode (see “Detached mode” on page 9-22), the
location is preceded by an indication of detached mode. That is:
TN-1X [DETACHED]/Config/cOmms_management/Area_address/
>>
Command shortcuts
There are three methods of entering commands:
• The user can type the entire command, such as ‘config’.
• The user can type three or more letters to uniquely identify the command.
These letters must be the first letters of the command name.
• The user can type a shortcut for the command. The letters included in the
shortcut are displayed in upper case in the command name, though the user
does not need to type these as upper case letters.
Note: Where numbers are included in the shortcut, the entire shortcut is
shown in square brackets after the command name.
It is possible to move through more than one menu level with a single entry.
This is achieved by typing a sequence of space-separated commands. For
example:
c e i v ↵
For all methods, when carriage return is pressed, the user input is checked to
see whether it matches a command shortcut. If it does not, and three or more
letters have been typed, the input characters are compared with the names of
menu items. If a single command can be identified uniquely by the partial
Parameters
Many commands require parameters. These are always entered after the
command, each separated by a space, and a carriage return is used to
complete the entry. Throughout this document, where parameters are required
for commands, the parameter is detailed alongside the command. If more
detailed information is available, this is indicated.
Parameter notation
Parameters are listed in this book as follows:
• Parameter names are shown inside angle brackets for most purposes. An
example of this is the <SDH_port> parameter, which is used by several
commands. Where a parameter is listed in the parameter column of a
command table, however, these brackets are excluded.
• Text parameters are shown inside single quote marks. These indicate text
that must be typed literally. For example, many of the ‘View’ commands
have an ‘all’ text parameter that can be used to represent all possible
options.
• Optional parameters are shown inside square brackets([]). For example, the
following parameter syntax indicates that the <SDH_AU4> parameter and
<HP_path_label> parameter are both required, but that the <CRC>
parameter is optional:
SDH_AU4 HP_path_label [CRC]
PDH ports
PDH ports provide access to non-SDH tributary traffic channels. Aggregate
traffic can be dropped from SDH aggregates to these ports. PDH ports are
available on the following tributary units:
Table 2-1
PDH tributary units
2M Trib 2, 4, 9, 11 1-16
Where:
• <slot> is the slot number within the multiplexer.
• <port> is the port number within the denoted slot.
Table 2-2
SDH tributary units
Where:
• <slot> is the slot number within the multiplexer.
• <port> is the physical port number within the denoted slot. For all current
hardware, this can only be equal to ‘1’. This element of the syntax can be
omitted. In this event, a default value of ‘1’ is assumed.
• <AU4> is the AU4 within the STM-1 signal. As the STM-1 contains just
one AU4, this can only be equal to ‘1’. This element of the syntax can be
omitted, as a default value of ‘1’ is assumed.
• <KLM> identifies a specific payload. See Appendix D: KLM payload
numbering for full details of this numbering system.
For example, to specify K261 on the first (and only) AU4 on an STM-1
tributary unit in slot 2:
S2-1-J1-K261
Table 2-3
SDH aggregate units
Note: STM-4 Optical aggregate units are unavailable to order until further notice.
Where:
• <slot> is the slot number within the multiplexer. Aggregate A is positioned
in slot 6, while aggregate B is positioned in slot 7.
Note: It is possible to specify ‘A’ instead of the slot/port reference of
aggregate A (that is, ‘S6-1’), and to specify ‘B’ instead of the slot/port
reference of aggregate B (that is, ‘S7-1’).
• <port> is the physical port number within the denoted slot. For all current
hardware, this can only be equal to ‘1’. This element of the syntax can be
omitted in almost all instances. If it is omitted, a default value of ‘1’ is
assumed.
• <AU4> is the AU4 within the STM-N signal.
— An STM-1 aggregate signal contains just one AU4, and can only be
equal to ‘1’. This element of the syntax can be omitted, as a default
value of ‘1’ is assumed.
— An STM-4 aggregate signal contains four AU4s, only one of which can
be accessed by the TN-1X. This element of the syntax can be omitted
if AU4 1 is in use, as a default value of ‘1’ is assumed.
• <KLM> identifies a specific payload. See Appendix D: KLM payload
numbering for full details of this numbering system.
For example, to specify a KLM reference of K261 on the third AU4 of STM-4
aggregate A (slot 6), use one of the following:
S6-1-J3-K261
A-J3-K261
Table 2-4
SDH high order payloads
Where:
• <slot> is the slot number within the multiplexer.
Note: It is possible to specify ‘A’ instead of the slot/port reference of
aggregate A (that is, ‘S6-1’), and to specify ‘B’ instead of the slot/port
reference of aggregate B (that is, ‘S7-1’).
• <port> is the physical port number within the denoted slot. For all current
hardware, this can only be equal to ‘1’. This element of the syntax can be
omitted, as a default value of ‘1’ is assumed.
• <AU4> is the AU4 within the STM-N signal. This element of the syntax
can be omitted if AU4 1 is in use, as a default value of ‘1’ is assumed.
For example, to specify the first (and only) AU4 on the STM-1 tributary unit
in slot 9:
S9-1-J1
For example, to specify the third AU4 on aggregate B (slot 7), use one of the
following:
S7-1-J3
B-J3
SDH ports
SDH ports identify physical connections to SDH signals. These connections
exist on both STM-N aggregates, and STM-1 tributaries. Currently, all SDH
hardware contains a single physical port. SDH ports exist on the following
units:
Table 2-5
SDH ports
Where:
• <slot> is the slot number within the multiplexer.
Note: It is possible to specify ‘A’ instead of the slot/port reference of
aggregate A (that is, ‘S6-1’), and to specify ‘B’ instead of the slot/port
reference of aggregate B (that is, ‘S7-1’).
• <port> is the physical port number within the denoted slot. As all SDH
equipment currently has a single port, this will always be set to ‘1’.
For example, to specify the (only) physical port on an SDH tributary unit in
slot 11:
S11-1
For example, to specify the (only) physical port on aggregate B (slot 7), use
one of the following:
S7-1
B
Confirmation
Commands that affect traffic or that delete important information require
additional confirmation. Confirmation messages are accompanied by an
audible warning. The user must enter a response followed by a carriage return.
Any response other than ‘y’ or ‘yes’ is taken to mean no.
Warning: <number> <warning_text>
Are you sure? [yes/no]
For example:
Warning: <3550> Traffic may be hit.
Are you sure? [yes/no]
Message types
The TN-1X generates two message categories:
• Response (non-autonomous) messages.
• Autonomous messages.
These message categories are detailed in the sections below.
TN-1X /Config/cOmms_management/Area_address/
>>
Autonomous messages
Autonomous messages are initiated in the NE and sent to all logged in users.
Users may enable or disable display of these messages on a per session basis
(see Chapter 8, “Session menu”). These messages are displayed by default.
Where:
— <alarm> is the alarm event.
— <instance> is the affected unit or traffic. These are identified by a slot,
port, or payload reference, and use the same syntax as the equivalent
command parameters (see “Parameters” on page 2-4).
Note 1: TAMs are identified by slot numbers. The TAMs for slot 2 are
identified by S16 and S17, the TAMs for slot 4 are S19 and S20, the TAMs
for slot 9 are S24 and S25, and the TAMs for slot 11 are S27 and S28.
Note 2: The three Multiplexer Section Protection (MSP) alarms are always
reported against the protection channel. MS and RS alarms that relate to
MSP channels are always reported against the affected channel. All other
alarms that relate to MSP channels are reported against the working
channel.
— <alarm_status> is Present or Cleared.
— <alarm_severity> is (C)ritical, (M)ajor, (m)inor, or Disconnect (X).
— <alarm_category> is (P)rompt, (D)eferred, (I)nstation, or (W)arning.
— <unique_number> is between 1 and 65535.
— <traffic_type> identifies the nature of the affected unit or traffic (see
Table 2-6 below).
Note: There are no card types for TAMs. Where TAM alarms are reported,
the card type for the unit they are associated with is used.
Table 2-6
Traffic types for the TN-1X
Note: There are no card types for TAMs. Where TAM alarms are reported, the card type for
the unit they are associated with is used.
For example:
911, TU-AIS, S6-J1-K123, clear, M, I, 123, A-1o,
customer_1, 17/01/96, 19:05:02
• Non-alarm events:
9**, <message>, <timestamp>
;
For example:
951, Cmd = c/r/t s1-2, User = oper2, 27/03/96, 23:52:29
;
Autonomous messages are displayed with a number (911 for an alarm and
9**, a three figure number starting with 9, for an event) and the date and time
that the message was entered in the appropriate log.
end of chapter
Getting started 3-
!
Accessing the UI application software
All users are required to login to the TN-1X using a user name and password.
There are three classes of user with different sets of access privileges. These
are shown in Table 3-1 below.
Table 3-1
Users and passwords
Status Manager viewr lookat Read only. Can perform all ‘view’ commands,
Configuration oper1, oper2 config All network traffic control, upgrades, restarts and
Manager connections,
System nortl teledbc All commands. Severely Errored Seconds (SES) thresholds,
Engineer password setting and comms management configuration,
Note: If the System Engineer’s password is forgotten, the Nortel Service Centre should be contacted.
Note: The above passwords are defaults. It is advised that these are
changed after installation, where this activity is supported.
Logging in
The TN-1X supports three user sessions from the Preside EC-1 Element
Controller, and one from the CAT. Only one system engineer login is
permitted. This can be from either Preside EC-1 Element Controller or CAT,
but not from both simultaneously. The configuration manager and status
manager classes can have more than one login.
CAUTION
Multiple configuration manager logins
If more than one user is logged in as a configuration manager,
care should be taken by each configuration manager to ensure
that any actions performed do not adversely affect the work of
other configuration managers.
When login starts, the user is prompted for a user name and a password. An
identification entry is also requested to enable different users with the same
user name to be distinguished.
The user can attempt to login for three minutes. If a successful login is not
achieved in this period, the user is automatically disconnected. This event will
also occur if four consecutive unsuccessful login attempts are made in the
login period.
Procedure 3-1
Logging in to the TN-1X from the CAT
Step Action
—end—
Procedure 3-2
Logging in to the TN-1X from the Preside EC-1 Element Controller
Step Action
—end—
Once logged in, the user is informed of the NE status, and the main user menu
is displayed. The NE status contains the following information:
• Date and time.
• Inventory data.
• List of users currently logged in.
• TN-1X software and configuration table status.
• Loopback test status.
• List of active alarms. !
Figure 3-1
Example login, NE status information and main user menu
login:oper1
password:
identification:fred
59,NE Time
591,NE_date=09/05/1997,NE_time=09:57:39
53,Inventory
531,S0, Address=000075403a43
532,S0, NTPEC=00750GWV, Card_type=BP_R2.5
532,S1, NTPEC=NTKD13AA, Card_type=ICC-V2_NUI_13AA
532,S2, NTPEC=NTKD16AA, Card_type=34_45M-vc3_data_16AA
532,S4, NTPEC=NTKD16AA, Card_type=34_45M-vc3_data_16AA
532,S5, NTPEC=NTKD10AA, Card_type=Payload_man-mp_10AA
532,S6, NTPEC=00750HWF, Card_type=STM_1_Agg-opt_HWF
532,S7, NTPEC=00750GSA, Card_type=STM_4_Agg-opt_GSA
532,S8, NTPEC=NTKD10AA, Card_type=Payload_man-mp_10AA
532,S9, NTPEC=00750HVT, Card_type=2M_Trib-75ohm_HVT
532,S12, NTPEC= , Card_type=PSU
532,S13, NTPEC= , Card_type=PSU
532,S14, NTPEC=00750GXD, Card_type=SRC
532,S17, NTPEC = NTKD17AA01, Card_type = 34/45M_TAM, Serial_no = ,
532,S20, NTPEC = NTKD17AB01, Card_type = 34/45M_TAM_PROT, Serial_no = ,
532,S24, NTPEC = NTKD14AA170, Card_type = V2_TAM-75ohm, Serial_no = ,
532,S25, NTPEC = , Card_type = Undefined, Serial_no = ,
52,Open Sessions
521,User=nortl,Ident=mark
31,Loopback Configuration
51,Alarm Status
511,NE-Wrong_Card,S1,Present,C,P,0015,ICC2,
511,NE-Card_Out,S3,Present,C,P,0374,2M75,
511,NE-Wrong_Card,S11,Present,C,P,1468,STM1o,
511,SYNC-Src_Not_Primary,S14,Present,C,P,0009,SRC,
;
Config/, View_status/, Session/, Admin/, Maint/, /Diagnostic/, Logout
TN-1X/
>>
Logging out
Logout can occur either manually or automatically:
• Manual logout. This is achieved using the Logout command, which is
available from the top-level (root) menu. No confirmation is required. The
command is shown below.
TN-1X/
>>l ↵
8 Bye;
Configuration menu 4-
The configuration menu allows the user to access, view and edit Network
Element (NE) settings. The top-level structure of the configuration menu is
shown in Figure 4-1. Items that have a submenu are shown in bold (all items
in this menu). Shortcuts for individual menu items are shown in upper case
(see “Command shortcuts” on page 2-2).
Figure 4-1
Configuration command hierarchy
Config
Pps
"
cOmms_management
External_alarm
Alarms
Thresholds
Monitoring
Rau_priority
misC
perF_mon
Sync_source
Cons_act
Lp_path_Trace
Hp_path_trace
Lp_paYload_label
Hp_paYload_label
coNnections
carDs
Payman_Protect
Trib_Prot
poRts
MSp
tn1x_Card_Switch
PunchThrough
oVeride
Note 1: Manual path protection switching is not possible when the mux is
in detached mode (see “Detached mode” on page 9-22).
Note 2: Older STM-1 tributary units (25U JU00 750 GVA/GVB/JBK and
25U TM00 750 HWE/HWG) do not propagate TU-AIS. As a result, path
protection switching on channels flowing between STM-1 trib connected
rings will not work. Newer units support TU-AIS propagation.
Command details
The commands that access the path protection switching functionality of the
TN-1X are shown in Figure 4-2 below, and are detailed in the tables that
follow.
Figure 4-2
Config/Pps command hierarchy
Config
Pps
Enable_holdoff
Disable_holdoff
Holdoff_time
Pps_mode_on
pps_mode_Off
"
A
B
Current
View
Status_view
Table 4-2
Config/Pps
Menu item Shortcut Parameters Confirm Description
Table 4-3
Config/Pps/pps_mode_Off
Note: These menu options do not remove the protected connection. The automatic
protection switching mechanism is disabled, but the protected connection is retained.
Parameters
The following parameters are used by the commands described above:
• The <PDH_port> parameter identifies a PDH tributary port which is part
of an established protected connection. This takes the following syntax:
S<slot>-<port>
Autonomous events
The autonomous events associated with the above functionality are:
• If any path sources are changed manually or automatically, one of the
following two events occurs.
981, <PDH_port>, New_path_src = <SDH_aggr_payload>,
Reason = <‘Forced’|‘Auto’>
981, <SDH_trib_payload>, New_path_src =
<SDH_aggr_payload>, Reason = <‘Forced’|‘Auto’>
Examples:
981, S2-1, New_path_src = S6-J1-K111, Reason = Forced
981, S4-1-J1-K123, New_path_src = S6-J1-K111,
Reason = Forced
Reports "
The reports generated by this command are detailed below.
Config/Pps/View
The report for the view command uses the following entries:
12, PPS Configuration
121, PPS_Oscillation_guard_time(seconds) = 30
122, PPS_Holdoff_time(tenths_of_seconds) =
<hold_off_time_value>
123, <PDH_port>, PPS_mode = <‘On’|‘Off_A’|‘Off_B’>
123, <SDH_trib_payload>, PPS_mode = <‘On’|‘Off_A’|‘Off_B’>
123, <epay_inst>, PPS_holdoff = <‘enabled’|‘disabled’>,
PPS_mode = <‘On’|‘Off_A’|‘Off_B’>
For example:
12, PPS Configuration
121, PPS_Oscillation_guard_time(seconds) = 30
122, PPS_Holdoff_time(tenths_of_seconds) = 200
123, S1-1, PPS_holdoff = Enabled, PPS_mode = On
123, S1-2, PPS_holdoff = Enabled, PPS_mode = On
123, S1-3, PPS_holdoff = Disabled, PPS_mode = On
123, S1-4, PPS_holdoff = Enabled, PPS_mode = Off_A
123, S1-5, PPS_holdoff = Enabled, PPS_mode = On
123, S1-6, PPS_holdoff = Enabled, PPS_mode = Off_A
123, S1-7, PPS_holdoff = Disabled, PPS_mode = On
123, S1-8, PPS_holdoff = Enabled, PPS_mode = Off_B
;
Config/Pps/STatus_view
This report duplicates a status report on the status view menu, and is
described in “View_status/VC_path_status” on page 7-12.
Communications management
The communications functionality of the TN-1X covers a number of areas.
• Link Access Procedure on the D channel:
The LAPD (Link Access Protocol for the D Channel) options
control the use of the D-bytes from the section overhead, both
for the current session and for the session after the next
restart.
Note 1: If the D bytes within the RS and MS section overheads are not in
use (that is, they are both switched off), monitoring of the QECC alarm for
the affected STM-1 port is disabled.
Note 2: If LAPD is on for any MSP non-active section port, the monitoring
of this port is dependant on its MSP LAPD settings (see “Multiplexer
section protection” on page 4-118).
• LAN connection:
The user can set the TN-1X LAN connection to one of the
following modes:
• Area addresses:
The user is able to set the initial domain segment of the each
of the three area addresses used by the TN-1X. At least one
area address must be defined at all times.
Command details
The commands that access the communications management functionality of
the TN-1X are shown in Figure 4-3, and are detailed in the tables that follow.
Figure 4-3
Config/cOmms command hierarchy
Config
cOmms_management
lapd_link_Service
"
oN_Rs
Off_Rs
oN_Ms
Off_Ms
oN_Auto
Off_Auto
View
laN_service
oN
Off
Standby
View
Area_address
Set_1
Set_2
Set_3
Clear_1
Clear_2
Clear_3
View
STatus_view
Table 4-4
Config/cOmms_management
Table 4-5
Config/cOmms_management/lapd_link_Service
Note 1: Only one of the RS, MS or Automatic settings can be set to ‘on’ at any time.
Note 2: If LAPD settings are enabled for an MSP port, the LAPD monitoring of this port
depends on the MSP LAPD settings.
Note 3: All of the above options (except View) are only available to the system engineer
user class.
Table 4-6
Config/cOmms_management/laN_service
Note: All of the above options (except View) are only available to the system engineer user
class.
Table 4-7
Config/cOmms_management/Area_address
Set_2 C O A S2
Set_3 COAS
Clear_3 C O A C3
Note 2: All of these commands (except View) are only available to the system engineer
user class.
Parameters
The following parameters are used by the commands described above:
• The <SDH_port> parameter identifies the physical port on an STM-N
aggregate or STM-1 tributary. The format for this is:
S<slot>-<port>
Autonomous events
There are no autonomous events associated with the above commands.
Reports
The reports generated by the comms management commands are detailed
below.
Config/cOmms_management/lapd_link_Service/View
The reports for this view command uses the following entries:
27, Lapd Link Configuration
272, <SDH_port>,Lapd_link_mode_RS=<‘Auto’|‘Network’|‘User’>
272, <SDH_port>,Lapd_link_mode_MS=<‘Auto’|‘Network’|‘User’>
273, <SDH_port>,Lapd_link_service_RS = <‘On’|‘Off’|‘Auto’>
273, <SDH_port>,Lapd_link_service_MS = <‘On’|‘Off’|‘Auto’>
273, <SDH_port>,No_card_carrying_DCC_traffic_in_this_slot
For example, if the mux has one STM-1 tributary unit and one aggregate in use:
27, Lapd Link Configuration
272, S4-1,Lapd_link_mode_RS=Auto
273, S4-1,Lapd_link_service_RS=Off
272, S6-1,Lapd_link_mode_RS=Auto
273, S6-1,Lapd_link_service_RS=Off
;
Config/cOmms_management/laN_service/View
The report for this view command uses the following entries:
29, LAN Configuration
291, LAN_service = <‘On’|‘Off’|’Standby’>
292, LAN_connection = <‘Present’|‘Not_Present’>
For example:
29, LAN Configuration
291, LAN_service = On
292, LAN_connection = Present
;
Config/cOmms_management/Area_address/View
The report for this view command uses the following entries:
28, OSI Manual Area Address Configuration
282, Manual_area_address_1 = <address>
283, Manual_area_address_2 = <address>
284, Manual_area_address_3 = <address>
For example:
28, OSI Address Configuration
282, Manual_area_address_1 = 490000
283, Manual_area_address_2 = 7C8001
284, Manual_area_address_3 = 7C8001
;
Config/cOmms_management/STatus_view
This report duplicates a status report on the Status View menu, and is
described in “View_status/Lapd_Link_status” on page 7-13.
External alarms
External alarms allow the TN-1X to interact with its environment. Five input
alarms are supported, each of which may be triggered by an external event
such as a fire alarm, or a security door being left open. Trigger events can be
triggered by one of two conditions. External alarms can be associated with
short names to simplify identification.
Note: Changes to external alarm names are not reflected in alarms that
have already been raised. Subsequent instances of the affected alarm will
use the new alarm name.
"
Command details
The commands that access the external alarms functionality of the TN-1X are
shown in Figure 4-4 below, and are detailed in the tables that follow.
Figure 4-4
Config/External_alarm command hierarchy
Config
External_alarm
Input
Set_name
mode_Off
mode_Closed
mode_oPen
Filter_oN
Filter_Off
RAU_priority
Prompt_critical
Defered_major
In_station_minor
X_disconnect_warning
View
Table 4-8
Config/External_alarm/Input
Table 4-9
Config/External_alarm/Input/RAU_priority
Deferred_major CEIRD
In_station_minor CEIRI
X_disconnect_ CEIRX
warning
Parameters
The following parameters are used by the commands described above:
• The <alarm_ID> parameter identifies one of the five external input alarms.
These are called ‘E1’, ‘E2’, ‘E3’, ‘E4’ and ‘E5’.
• The <alarm_name> parameter is a string of up to fifteen characters. Alarm
names default to ‘Ext_inp1’, ‘Ext_inp2’, ‘Ext_inp3’, ‘Ext_inp4’,
‘Ext_inp5’.
Autonomous events
There are no autonomous events associated with the above commands.
Reports
The reports generated by the commands described are listed below.
Config/External_alarm/Input/View
The report for the view command uses the following entries:
16, External Alarm Configuration
161, <alarm_ID>, Ext_input_name = <alarm_name>,
Ext_mode = <‘Off’|‘Mode_open’|‘Mode_closed’>,
Ext_filter = <‘On’|‘Off’>
Ext_rau = <‘Prompt_critical’|‘Deferred_major’|
‘In_station_minor’|‘X_disconnect_warning’ >
For example:
16, External Input Alarm Configuration
161, E1, Ext_input_name = Ext_inp1, Ext_mode = Mode_closed,
Ext_Filter = On, Ext_rau = Prompt_critical
161, E2, Ext_input_name = Ext_inp2, Ext_mode = Mode_closed,
"
Ext_Filter = On, Ext_rau = Prompt_critical
161, E3, Ext_input_name = Ext_inp3, Ext_mode = Mode_closed,
Ext_Filter = On, Ext_rau = Prompt_critical
161, E4, Ext_input_name = Ext_inp4, Ext_mode = Mode_closed,
Ext_Filter = On, Ext_rau = Prompt_critical
161, E5, Ext_input_name = Ext_inp5, Ext_mode = Mode_closed,
Ext_Filter = On, Ext_rau = Prompt_critical
;
Bit error rates are expressed using varying orders of magnitude. For example,
a threshold of ‘1E-4’ represents one error in 104=10000 bits. Available
thresholds vary between ‘1E-3’ (1 error in 1000) to ‘1E-7’ (1 error in
10,000,000), though not all of these are available for all alarm types.
Command details
The commands that access the alarm threshold functionality of the TN-1X are
shown in Figure 4-5 below, and are detailed in the tables that follow.
Figure 4-5
Config/Alarms/Thresholds command hierarchy
Config
Alarms
Thresholds
MS_deg
1e-5
1e-6
1e-7
HP_deg
1e-5
1e-6
1e-7
Hp_rEi
1e-5
1e-6
1e-7
Lp_eXc
1e-3
1e-4
Ms_eXc
1e-3
1e-4
View
Note: None of the commands within this branch of the user interface
require parameters, as the settings are indicated through the use of
sub-commands.
Table 4-10
Config/Alarms/Thresholds
"
Lp_eXc C A T LX See Table 4-12. These commands have identical
subcommands. These are
Ms_eXc C A T MX described in the specified table.
Table 4-11
Config/Alarms/Thresholds/<MS_deg | HP_deg | Hp_rEi>
Note: This table details the threshold options for the MS_deg, HP_deg and Hp_rEi commands.
The <Shortcut> element of the shortcut refers to the shortcut for the relevant command.
Table 4-12
Config/Alarms/Thresholds/<Lp_eXc | Ms_eXc>
Note: This table details the threshold options for the Lp_eXc and Ms_eXc commands. The
<Shortcut> element of the shortcut refers to the shortcut for the relevant command.
Parameters
There are no parameters associated with the above commands.
Autonomous events
There are no autonomous events associated with the above commands.
Reports
The reports generated by the commands described above are detailed below.
Config/Alarms/Thresholds/View
The report for the view command uses the following entries:
17, Alarms Thresholds
171, <alarm_name>_threshold = <threshold>
Where:
• <alarm_name> is the capitalised form of the alarm name. This report
shows all alarm thresholds for the multiplexer, not just those that can be
changed by the user.
• <threshold> is the threshold defined for the specified alarm.
For example:
17, Alarm Thresholds
171, MS_EXC_threshold = 1E-3
171, MS_DEG_threshold = 1E-6
171, HP_EXC_threshold = 1E-3
171, HP_DEG_threshold = 1E-7
171, HP_REI_threshold = 1E-5
171, LP_EXC_threshold = 1E-3
171, LP_DEG_threshold = 1E-4
171, LP_REI_threshold = 1E-5
171, PPI_EXC_threshold = 1E-3
171, PPI_DEG_threshold = 1E-5
;
Alarm monitoring
Alarm monitoring is a process which takes as input the raw state of an alarm,
and outputs the monitored state of the alarm. Possible states for each alarm are:
• Monitoring is enabled. In this instance, the monitored state of the alarm is
defined to be the same as its raw state.
• Monitoring is disabled. In this instance, the monitored state is defined as
clear, whatever its raw state. That is, the effect of disabling the monitoring
of an alarm is to clear the alarm down permanently.
Alarm monitoring can be enabled/disabled for each port on a per-alarm basis.
Command details
The commands that access the alarm monitoring facilities of the TN-1X are
shown in Figure 4-6 below, and are detailed in the tables that follow.
Figure 4-6
Config/Alarms/Monitoring command hierarchy
Config
Alarms
Monitoring
Ms
ms_Rdi
ms_Deg
Hp
hp_Deg
hp_Rdi
hp_Lom
Lp
lp_Deg
lp_Rdi
int_lp_Op_Buffer
Ppi
ppi_Ais
ppi_Tf
View
Table 4-13
Config/Alarms/Monitoring/<PMP>
Hp/hp_Lom CAMHL
Note: If monitoring of this RDI alarm is disabled, the equivalent REI alarm is also disabled.
Table 4-14
Config/Alarms/Monitoring/MS/<MS_alarm>
Note: This table details the enable/disable options that are available for the MS alarms
listed in Table 4-13. The <Shortcut> element of the shortcut refers to the shortcut for the
relevant alarm.
Table 4-15
Config/Alarms/Monitoring/HP/<HP_alarm>
Note: This table details the enable/disable options that are available for the HP alarms
listed in Table 4-13. The <Shortcut> element of the shortcut refers to the shortcut for the
relevant alarm.
Table 4-16
Config/Alarms/Monitoring/<LP | PPI>/<PDH_alarm>
Note: This table details the enable/disable options that are available for the LP and PPI
alarms listed in Table 4-13. The <Shortcut> element of the shortcut refers to the shortcut
for the relevant alarm.
Parameters
The following parameters are used by the commands described above: "
• The <SDH_port> parameter identifies the physical port on an STM-N
aggregate or STM-1 tributary. The format for this is:
S<slot>-<port>
• The <PDH_port> parameter identifies a PDH tributary port. This takes the
following syntax:
S<slot>-<port>
Autonomous events
There are no autonomous events associated with the above commands.
Reports
The reports generated by the alarm monitoring commands are detailed below.
Config/Alarms/Monitoring/View
The report for the view command uses the following entries:
172, Alarm Monitoring
173, <SDH_port>, <alarm_name>_monitor = <‘On’|‘Off’>
173, <SDH_AU4>, <alarm_name>_monitor = <‘On’|‘Off’>
173, <PDH_port>, <alarm_name>_monitor = <‘On’|‘Off’>
Where:
• <alarm_name> is the capitalised form of the alarm name.
For example:
172, Alarm Monitoring
173, S6-1, MS_RDI_monitor = On
173, S6-1, MS_DEG_monitor = On
173, S6-1-J1, HP_DEG_monitor = On
173, S6-1-J1, HP_RDI_monitor = On
173, S6-1-J1, HP_DEG_monitor = On
173, S2-1, LP_DEG_monitor = On
173, S2-1, LP_RDI_monitor = On
173, S2-1, INT_LP_OP_BUFFER_monitor = On
173, S2-1, PPI_AIS_monitor = On
173, S2,I1, PPI_TF_monitor = On
;
RAU priority
Each alarm on the TN-1X is assigned a Rack Alarm Unit (RAU) priority,
which establishes the response of the local alarm indicators to the occurrence
of each alarm. This priority can be set by the user. The four alarm priorities are:
• Prompt_critical - an alarm that requires immediate attention at all times. It
is normally extended to a maintenance/control point when the station is
unattended.
• Deferred_major - an alarm that does not require immediate attention
outside normal hours. It is normally extended to a maintenance/control
•
point when the station is unattended.
Instation_minor - an alarm that does not require attention outside normal
"
hours. It is not normally extended.
• Disconnect_warning - an alarm that is indicated by the UI or EC, but no
unit, subrack, or rack alarm indications or extensions are provided.
Note: The above alarm priorities are a combination of alarm categories
(prompt, deferred, instation, and disconnect) with alarm severities (critical,
major, minor, warning). The TN-1X can only associate these in the
combinations indicated.
The alarms that are subject to RAU priorities fall into a number of groupings.
These are:
• Optical Section (OS) alarms.
• Electrical Section (ES) alarms.
• Regenerator Section (RS) alarms.
• Multiplex Section (MS) alarms.
• Administrative Unit (AU) alarms.
• Low-order Path VC-12 and VC-3 (LP) alarms.
• High-order Path (HP) alarms.
• Tributary Unit (TU) alarms.
• PDH Physical Interface (PPI) alarms.
• Synchronisation (SYNC) alarms.
• Network Element card (CARD) alarms.
• 34 Mbit/s PDH Transmux (TM) alarms.
• Multiplexer Section Protection (PROT) alarms.
• Miscellaneous (MISC) alarms.
Command details
The commands that access the RAU priority functionality of the TN-1X are
shown in Figure 4-7, and are detailed in the tables that follow.
Figure 4-7
Config/Alarms/Rau_priority command hierarchy
Config
Alarms
Rau_priority
Os
Es
Rs
Ms
Au
Hp
Tu
Lp
Ppi
TM
Sync
misC
prOT
Card
Note: None of the commands within this branch of the user interface
require parameters, as the settings are indicated through the use of
sub-commands.
Table 4-17
Config/Alarms/Rau_priority/Os
Table 4-18
Config/Alarms/Rau_priority/Es
Table 4-19
"
Config/Alarms/Rau_priority/Rs
Table 4-20
Config/Alarms/Rau_priority/Ms
Table 4-21
Config/Alarms/Rau_priority/Au
Menu item Shortcut Default Description
au_Ais CARAA In_station_minor The RAU priority for each of these
alarms can be set to
‘Prompt_critical’, ‘Deferred_major’,
Int_au_Ais C A R A IA In_station_minor
‘In_station_minor’, or
‘Disconnect_warning’. This is
Int_au_loP C A R A IP Deferred_major achieved using the commands
detailed in Table 4-31.
View CARAV N/A Displays priorities for the above
alarms.
Table 4-22
Config/Alarms/Rau_priority/Hp
Menu item Shortcut Default Description
hp_eXc CARHX Prompt_critical The RAU priority for each of
these alarms can be set to
hp_Deg CARHD Deferred_major
‘Prompt_critical’,
hp_Tim CARHT Deferred_major ‘Deferred_major’,
‘In_station_minor’, or
hp_Rdi CARHR Deferred_major ‘Disconnect_warning’. This is
hp_LoM C A R H LM Deferred_major achieved using the commands
detailed in Table 4-31.
hp_rEi CARHE Deferred_major
hp_Plm CARHP Deferred_major
Int_hp_inSert_buS C A R H IS Prompt_critical
Int_hp_Thru_bus C A R H IT Prompt_critical
Int_hp_ip_Buffer C A R H IB Deferred_major
hp_qosv_24H CARHH In_station_minor
hp_qosv_15M CARHM In_station_minor
hp_Fe_qosv_24H C A R H FH In_station_minor
hp_Fe_qosv_15M C A R H FM In_station_minor
View CARHV N/A Displays priorities for the above
alarms.
Table 4-23
Config/Alarms/Rau_priority/Tu
Menu item Shortcut Default Description
tu_Ais CARTA In_station_minor The RAU priority for each of these
alarms can be set to
tu_loP CARTP Deferred_major
‘Prompt_critical’, ‘Deferred_major’,
Int_tu_Ais C A R T IA In_station_minor ‘In_station_minor’, or
‘Disconnect_warning’. This is
Int_tu_loP C A R T IP Deferred_major achieved using the commands
detailed in Table 4-31.
View CARTV N/A Displays priorities for the above
alarms.
Table 4-24
Config/Alarms/Rau_priority/Lp
"
int_lp_Ip_Buffer C A R L IB Deferred_major
int_lp_Op_Buffer C A R L OB Deferred_major
lp_Fe_qosv_24H C A R L FH In_station_minor
lp_Fe_qosv_15M C A R L FM In_station_minor
Table 4-25
Config/Alarms/Rau_priority/Ppi
Menu item Shortcut Default Description
ppi_LoM C A R P LM Prompt_critical
ppi_Crc_qosv_24H C A R P CH In_station_minor
ppi_cv_qosv_15M CARPM In_station_minor
Table 4-26
Config/Alarms/Rau_priority/Sync
Menu item Shortcut Default Description
Table 4-27
Config/Alarms/Rau_priority/TM
Menu item Shortcut Default Description
Table 4-28
Config/Alarms/Rau_priority/misC
Menu item Shortcut Default Description
int_ne_Config_Corrupt C A R C CC Prompt_critical
int_ne_Mfs_pulse_Fail C A R C MF Prompt_critical
ne_Lan_Alarm C A R C LA Prompt_critical
ne_np1_Switch_Alarm C A R C SA Deferred_major
ne_Unexpected_Lan C A R C UL Deferred_major
int_ne_config_Bp_Mismatch C A R C BM Prompt_critical
ne_Unit_Fail C A R C UF Prompt_critical
Table 4-29
Config/Alarms/Rau_priority/prOT
Menu item Shortcut Default Description
msp_Prot_Scheme C A R OT PS Major_deferred The RAU priority for each of
_ these alarms can be set to
mismatch ‘Prompt_critical’,
‘Deferred_major’,
msp_Channel_ C A R OT CM Major_deferred
‘In_station_minor’, or
Mismatch
‘Disconnect_warning’. This is
msp_Invalid_K_byte C A R OT IK Major_deferred achieved using the
s commands detailed in
Table 4-31.
"
above alarms.
Table 4-30
Config/Alarms/Rau_priority/carD
Menu item Shortcut Default Description
ne_Card_Out C A R D CO Prompt_critical The RAU priority for each of
these alarms can be set to
ne_Unexpected_Card C A R D UC In_station_minor
‘Prompt_critical’,
ne_Card_Fail C A R D CF Prompt_critical ‘Deferred_major’,
‘In_station_minor’, or
ne_Card_faulT C A R D CT Prompt_critical ‘Disconnect_warning’. This is
ne_Wrong_Card C A R D WC Prompt_critical achieved using the
commands detailed in
Table 4-31.
View CARDV N/A Displays priorities for the
above alarms.
Table 4-31
Config/Alarms/Rau_priority/<alarm group>/<alarm>
Menu item Shortcut Parameters Confirm Description
Prompt_critical <Shortcut> P N/A no Sets priority to
‘Prompt_critical’.
Deferred_major <Shortcut> D N/A no Sets priority to
‘Deferred_major’.
In_station_minor <Shortcut> I N/A no Sets priority to
‘In_station_minor’.
X_disconnect_ <Shortcut> X N/A no Sets priority to
warning ‘Disconnect_warning’.
Note: This table details the enable/disable options that are available for all of the alarms
listed from Table 4-17 to Table 4-28. The <Shortcut> element of the shortcut refers to the
shortcut for the relevant alarm.
Parameters
None of the commands within this branch of the user interface hierarchy
require parameters. All settings are defined through the use of
sub-commands.
Autonomous events
There are no autonomous events associated with the above commands.
Reports
The reports generated by the RAU priority commands are detailed below.
Config/Alarms/Rau_Priority/Os/View
Config/Alarms/Rau_Priority/Es/View
Config/Alarms/Rau_Priority/Rs/View
Config/Alarms/Rau_Priority/Ms/View
Config/Alarms/Rau_Priority/Au/View
Config/Alarms/Rau_Priority/Hp/View
Config/Alarms/Rau_Priority/Tu/View
Config/Alarms/Rau_Priority/Lp/View
Config/Alarms/Rau_Priority/Ppi/View
Config/Alarms/Rau_Priority/Sync/View
Config/Alarms/Rau_Priority/Card/View
Config/Alarms/Rau_Priority/prOT/View
Config/Alarms/Rau_Priority/Misc/View
The reports for all view commands within this branch of the user interface
make use of the following entries:
174, Alarm_rau_priority
175, <alarm_name>_rau = <‘Prompt_critical’|
‘Deferred_major’|‘In_station_minor’|
’X_disconnect_warning’>
Where:
• <alarm_name> is the capitalised form of the alarm name.
For example:
174, Alarm_rau_priority
175, OS_OPTICAL_POWER_HIGH_rau = Prompt_critical
175, OS_OPTICAL_POWER_OOL_rau = Prompt_critical
175, INT_OS_LASER_TEST_rau = In_station_minor
175, OS_LASER_SHUTDOWN_rau = Prompt_critical
175, OS_LASER_TEMP_HI_LOW_rau = Deferred_major
175, OS_OPTICAL_POWER_LOW_rau = Deferred_major
;
174, Alarm_rau_priority
175, ES-CMI_OUTPUT_FAIL_rau = Prompt_critical
175, ES-CMI_VIOLATION_rau = Prompt_critical
;
174, Alarm_rau_priority
175, RS_LOS_rau = Prompt_critical
175, RS_LOF_rau = Prompt_critical
175, RS_REALIGN_PHASE_rau = Prompt_critical
175, RS_QOSV_24H_rau = Prompt_critical
175, RS_QOSV_15M_rau = Prompt_critical
;
174, Alarm_rau_priority
175, MS_AIS_au = In_station_minor
175, MS_RDI_rau = Deferred_major
175, MS_EXC_rau = Prompt_critical
175, MS_DEG_rau = Deferred_major
175, MS_QOSV_24H_rau = Prompt_critical
175, MS_QOSV_15M_rau = Prompt_critical
;
174, Alarm_rau_priority
175, AU_AIS_rau = In_station_minor
175, INT_AU_AIS_rau = In_station_minor
175, INT_AU_LOP_rau = Deferred_major
;
174, Alarm_rau_priority
175,
175,
HP_EXC_rau = Prompt_critical
HP_DEG_rau = Deferred_major "
175, HP_TIM_rau = Deferred_major
175, HP_RDI_rau = Deferred_major
175, HP_LOM_rau = Deferred_major
175, HP_REI_rau = Deferred_major
175, HP_PLM_rau = Deferred_major
175, INT_HP_INSERT_BUS_rau = Prompt_critical
175, INT_HP_THRU_BUS_rau = Prompt_critical
175, INT_HP_IP_BUFFER = Deferred_major
175, HP_QOSV_24H_rau = Prompt_critical
175, HP_QOSV_15M_rau = Prompt_critical
175, HP_FE_QOSV_24H_rau = Prompt_critical
175, HP_FE_QOSV_15M_rau = Prompt_critical
;
174, Alarm_rau_priority
175, TU_AIS_rau = In_station_minor
175, TU_LOP_rau = Deferred_major
175, INT_TU_AIS_rau = In_station_minor
175, INT_TU_LOP_rau = Deferred_major
;
174, Alarm_rau_priority
175, LP_EXC_rau = Prompt_critical
175, LP_DEG_rau = Deferred_major
175, LP_PLM_rau = Deferred_major
175, LP_RDI_rau = Deferred_major
175, LP_REI_rau = Deferred_major
175, LP_TIM_rau = Deferred_major
175, INT_LP_IP_BUFFER_rau = Deferred_major
175, INT_LP_OP_BUFFER_rau = Deferred_major
175, LP_QOSV_24H_rau = Prompt_critical
175, LP_QOSV_15M_rau = Prompt_critical
175, LP_FE_QOSV_24H_rau = Prompt_critical
175, LP_FE_QOSV_15M_rau = Prompt_critical
;
174,Alarm_rau_priority
175,PPI_EXC_rau = Deferred_major
175,PPI_DEG_rau = Deferred_major
175,PPI_AIS_rau = Deferred_major
175,PPI_LOS_rau = Deferred_major
175,PPI_TF_rau = Deferred_major
175,PPI_LOF_rau = Deferred_major
175,PPI_RAI_rau = Deferred_major
175,PPI_CV_QOSV_15M_rau = In_station_minor
175,PPI_CV_QOSV_24H_rau = In_station_minor
175,PPI_Unexp_Signal_rau = Deferred_major
175,PPI_CRC_QOSV_15M_rau = In_station_minor
175,PPI_CRC_QOSV_24H_rau = In_station_minor
175,PPI_LOM_rau = Deferred_major
;
174, Alarm_rau_priority
175, TM-AIS_rau = Prompt_critical
175, TM-TF_rau = Prompt_critical
;
174, Alarm_rau_priority
175, SYNC_SETG_FAIL_rau = Prompt_critical
175, SYNC_SRC_NOT_PRIMARY_rau = Prompt_critical
175, SYNC_EXT_SYNC_LOS_rau = Prompt_critical
175, INT_SYNC_TRIB_LINE_FAIL_rau = Prompt_critical
175, INT_SYNC_OSCILLATOR_FAIL_rau = Prompt_critical
;
174, Alarm_rau_priority
175, QECC_COMMS_FAIL_rau = Prompt_critical
175, INT_QECC_COMMS_FAIL_rau = Prompt_critical
175, EA_INPUT_rau = Prompt_critical
175, INT_NE_RAM_FAIL_rau = Prompt_critical
175, INT_NE_SW_CORRUPT_rau = Prompt_critical
175, INT_NE_CONFIG_CORRUPT_rau = Prompt_critical
175, INT_NE_MFS_PULSE_FAIL_rau = Prompt_critical
175, NE_LAN_ALARM_rau = Prompt_critical
175, INT_EC_ALARMS_BUFFERING = Prompt_critical
175, NE_NP1_SWITCH_ALARM_rau = Prompt_critical
175, NE_UNEXPECTED_LAN_rau = Prompt_critical
175, INT_NE-UNIT_FAIL_rau = Prompt_critical
175, PS_POWER_FAIL_rau = Prompt_critical
175, NE_LOOPBACK_ALARM_rau = Deferred_major
;
174, Alarm_rau_priority
175, MSP_PROTECTION_SCHEME_MISMATCH_rau = Prompt_critical
175, MSP_CHANNEL_MISMATCH_rau = Prompt_critical
175, MSP_INVALID_K_BYTES_rau = Prompt_critical
;
174, Alarm_rau_priority
175, NE_CARD_OUT_rau = Prompt_critical
175, NE_UNEXPECTED_CARD_rau = Prompt_critical
175, NE_CARD_FAIL_rau = Prompt_critical
175, NE_CARD_FAULT_rau = Prompt_critical
175, NE_WRONG_CARD_rau = Prompt_critical
;
Lamplocking
The lamplock facility can be used to latch the subrack lamp state of alarms
that are raised, but quickly cleared. When lamplocking is active, the lamps
that are lit on the subrack will remain lit after the alarm has cleared. Operator
intervention is required to clear down the lit lamps.
Config
Alarms
misC
Lamplock_oN
Lamplock_Off
View
Table 4-32
Config/Alarms/misC
Parameters
There are no parameters associated with the above commands.
Autonomous events
There are no autonomous events associated with the above commands.
Reports
The reports generated by the commands described above are detailed below.
Config/Alarms/misC/View
The report for the view command uses the following entries:
144, Alarm Miscellaneous
145, RAU_Lamplock=<‘On’|‘Off’>
For example:
144, Alarm Miscellaneous
145, RAU_Lamplock=Off
;
Performance monitoring
The performance monitoring functionality of the TN-1X enables the user to
monitor the occurrences of different types of errors at a number of
Performance Monitoring Points (PMPs) within the mux. The duration of the
performance monitoring period and the PMPs which are enabled can be
configured by the user. Threshold levels of errors, above which Quality Of
Service Violation (QOSV) alarms are raised, can also be set by the user for
many error types.
Performance statistics
There are a number of performance statistics that are accumulated by the
TN-1X when performance monitoring is active. These statistics are based on
the error measurement methods described in “Error measurement methods” on
page 4-33, and are accumulated for enabled PMPs across the performance
monitoring period.
• Errored Seconds (ES). An ES is a second in which one or more
frame-based errors occur, or an alarm relevant to the PMP occurs. The
number of errors within this second is not recorded.
• Severely Errored Seconds (SES). An SES is a second in which a threshold
level of frame-based errors occur, or an alarm relevant to the PMP occurs.
The total number of errors is not recorded. An SES is, by definition, an ES
also. The threshold number of frame-based errors which distinguish an ES
from an SES can be configured by the user, on both a BIP and block basis.
Note: It is advised that the default SES thresholds are maintained.
• Background Bit Errors (BBE). A BBE is recorded for each frame (not
included in a SES) in which there is an anomaly. An anomaly is an error or
a small discrepancy that does not interrupt the performance of a function.
The nature of anomalies will vary between different PMPs.
• Unavailable Seconds (UAS). A UAS is any second which forms part of a
period of Unavailable Time (UAT). A period of UAT starts with the onset
of ten consecutive SESs (included in UAT). The period of UAT ends when
there are ten consecutive non-SES seconds (not included in the UAT).
Note: During periods of unavailable time (UAT), the ES, SES and BBE
statistics are not recorded. The start of UAT is indicated by ten consecutive
SESs. Until this ten seconds is complete, however, it is unclear whether the
ES, SES and BBE figures accumulated will be recorded. As a result, there
is a ten second delay in all performance monitoring timestamps.
• Assessed Seconds (AS). The AS is the number of seconds during which the
performance monitoring statistics were accumulated. Typically, this is
equivalent to the length of the performance monitoring period. However, if "
the mux is rebooted, or the performance monitoring period is terminated
prematurely, or the mux clock changes, the AS total may be shorter or
longer than the performance period.
Threshold levels of ES, SES, BBE and UAS, above which Quality Of Service
Violation (QOSV) alarms are raised, can be set by the user for all PMPs that
measure frame-based errors. See “Quality of Service Violation (QOSV)
alarms” on page 4-37 for details.
The PMPs within the TN-1X are listed in Table 4-33. The default state for
these PMPs is shown, and an indication of which performance statistics are
collected for the PMP is also given.
Table 4-33
Performance monitoring points (PMPs) and performance statistics
HP-FE High-order Path Far End Disabled Yes Yes Yes Yes - -
LP-FE Low-order Path Far End Disabled Yes Yes Yes Yes - -
PPI-CV PDH Physical Interface Code Disabled Yes Yes Yes Yes - -
Violations
PPI-CRC PDH Physical Interface Cyclic Disabled Yes Yes Yes Yes - -
Redundancy Check
CAUTION
15 minute performance monitoring
The wider range of performance monitoring options provides
greater flexibility when monitoring service quality. 24 hour
performance monitoring is used for normal performance
monitoring measurements. 15 minute performance monitoring
produces large quantities of data, and should only be used on a
manual basis for specific maintenance measurements. Do NOT
use it to collect performance monitoring data automatically.
The exception to the above rule is when a terminated 15 minute period has
less than half of its scheduled fifteen minutes remaining. In this instance, the
new period will not end at the scheduled end of the current period, but will
continue to the end of the next 15 minute period. As a result, the duration of
the new period can be over twenty two minutes.
Performance logs
Performance logs store the results of individual monitoring periods during
which monitoring was active. These logs are numbered from ‘1’, with the
latest logs having the highest log numbers. The most current log can also be
referred to by a log number of -1.
The number of performance logs that the TN-1X can store is variable.
Between sixteen and forty 15 minute performance logs can be stored,
depending on the number of PMPs that are enabled. A maximum of two
24 hour logs can be stored.
If it is not possible to store a new performance log, the oldest will be deleted.
To avoid loss of data, the Preside EC-1 Element Controller must upload
performance monitoring results frequently.
be enabled and disabled on a PMP basis, can only be raised if both monitoring
and alarm raising are enabled for the affected PMP. QOSV thresholds can be
defined by the user on both a BIP and Block basis.
Threshold levels of ES, SES, BBE and UAS can be set by the user only for
existing connections. If a connection is removed, the QOSV thresholds that
relate to it are defaulted.
Command details
The commands that access the performance monitoring functionality of the
TN-1X are shown in Figure 4-9 below, and are detailed in the tables that
follow.
Figure 4-9
Config/perF_mon command hierarchy
Config
perF_mon
Ses_defines
24H
15M
Uat
sTart_24h
Basis
Table 4-34
Config/perF_mon
Table 4-35
Config/perF_mon/Ses_defines
Menu item Shortcut Parameters Range Confirm Description
"
1-2000 using ‘P’.
Lp_Fe_vc12_ses C F S LF12
(BIP,
def 600
Lp_Fe_vc3_ses C F S LF3
ppi_2mCrc_ses CFSC integer ‘D’ | ‘P’ 1-1000 No Sets the SES bit
[integer | D] (default and block
block = thresholds for
300, BIP PPI_CRC
= 300) performance
monitoring
Note 1: Each SES setting applies to all instances of a performance monitoring point. For example, the
SES setting for the RS PMP applies to both aggregates, and any STM-1 tributary units.
Note 2: All of the above commands (except View) are only available to the system engineer user class
Table 4-36
Config/perF_mon/<15M | 24H>
Menu item Shortcut Parameters Description
Ppi_Cv <shortcut> PC
Ppi_cRc <shortcut> PR
Rs_Oof <shortcut> RO This command has two subcommands. See Table 4-40.
Au_pJe <shortcut> AJ This command has two subcommands. See Table 4-41.
Tu_pJe <shortcut> TJ This command has two subcommands. See Table 4-42.
Note 1: If this parameter is not provided, information for all PMPs is displayed.
Table 4-37
Config/perF_mon/<15M | 24H>/<RS_ne | MS_ne>
Menu item Shortcut Parameters Confirm Description
Note 1: The <Shortcut> element of the shortcut is the relevant shortcut for the parent command. The
parent commands are listed in Table 4-36.
Table 4-38
Config/perF_mon/<15M | 24H>/<HP_ne | Hp_Fe>
Menu item Shortcut Parameters Confirm Description
Note 1: The <Shortcut> element of the shortcut is the relevant shortcut for the parent command. The
parent commands are listed in Table 4-36.
Table 4-39
Config/perF_mon/<15M | 24H>/<LP_ne | Lp_Fe | Ppi_Cv | Ppi_cRc>
Menu item Shortcut Parameters Confirm Description
"
24H range= 1-65536
Note 1: The <Shortcut> element of the shortcut is the relevant shortcut for the parent command. The
parent commands are listed in Table 4-36.
Table 4-40
Config/perF_mon/<15M | 24H>/Rs_Oof
Menu item Shortcut Parameters Confirm Description
Table 4-40
Config/perF_mon/<15M | 24H>/Rs_Oof
Menu item Shortcut Parameters Confirm Description
Note 1: The <Shortcut> element of the shortcut is the relevant shortcut for the parent command. The
parent commands are listed in Table 4-36.
Table 4-41
Config/perF_mon/<15M | 24H>/Au_pJe
Menu item Shortcut Parameters Confirm Description
Note 1: The <Shortcut> element of the shortcut is the relevant shortcut for the parent command. The
parent commands are listed in Table 4-36.
Table 4-42
Config/perF_mon/<15M | 24H>/Tu_pJe>
Menu item Shortcut Parameters Confirm Description
Note 1: The <Shortcut> element of the shortcut is the relevant shortcut for the parent command. The
parent commands are listed in Table 4-36.
Table 4-43
Config/perF_mon/Uat
Item Shortcut Parameters Description
Table 4-43
Config/perF_mon/Uat
Item Shortcut Parameters Description
Ppi_Cv C F U PC
Note: If this parameter is not provided, information for all PMPs is displayed.
Note 1: The <Shortcut> element of the shortcut is the relevant shortcut for the parent command. The
parent commands are listed in Table 4-36.
Table 4-45
Config/perF_mon/Uat/<HP_ne | Hp_Fe>
Menu item Shortcut Parameters Confirm Description
Note 1: The <Shortcut> element of the shortcut is the relevant shortcut for the parent command. The
parent commands are listed in Table 4-36.
Table 4-46
Config/perF_mon/<15M | 24H | Uat>/<LP_ne | Lp_Fe | Ppi_Cv>
Menu item Shortcut Parameters Confirm Description
Note 1: The <Shortcut> element of the shortcut is the relevant shortcut for the parent command. The
parent commands are listed in Table 4-36.
Table 4-47
Config/perF_mon/Uat/Ppi_cRc/
Menu item Shortcut Parameters Confirm Description
Note 1: The <Shortcut> element of the shortcut is the relevant shortcut for the parent command. The
parent commands are listed in Table 4-36.
Table 4-48
Config/perF_mon/Start_24h
Menu item Shortcut Parameters Confirm Description
Table 4-49
Config/perF_mon/Basis
Menu item Shortcut Parameters Confirm Description
Parameters
The following parameters are used by the commands described above:
• The <BIP_threshold> parameter defines the SES threshold for
frame-based performance monitoring on a BIP basis. This has a range of
1-8000, and a default of 2400.
• The <Block_threshold> parameter defines the SES threshold for
frame-based performance monitoring on a Block basis. This has a range of
1-64000, and a default of 2400.
• The <threshold> value defines a number of errors that are required to
trigger a QOSV alarm. This can be applied to ES, SES, BBE and UAS
statistics.
• The ‘D’ entry is used instead of a threshold value. It indicates that the
default setting should be applied to the relevant parameter. "
• The ‘P’ entry is used instead of a threshold value. It indicates that the
current setting for the threshold should be preserved. For example:
P 3130
• The <SDH_slot> parameter identifies all SDH ports and/or payloads for
the specified slot. The format for this is:
S<slot>
• The <PDH_port> parameter identifies a PDH tributary port. This takes the
following syntax:
S<slot>-<port>
• The <integer> parameter defines the CRC4 threshold for selected event:
— 15M range= 1 to 900
— 24H range= 1 to 65536
• The <PDH_slot> parameter identifies all PDH ports for the specified slot.
The format for this is:
S<slot>
• The <PMP> parameter identifies a specific PMP. This can be set to one of
the following (see “Performance monitoring points” on page 4-35 for
details of these):
— RS
— RS-OOF
— MS
— HP
— HP-FE
— AU-PJE
— LP
— LP-FE
— TU-PJE
— PPI-CV
— PPI_CRC
• The <hour> parameter is a number between 0 and 23, representing the
starting hour for a 24 hour period of performance monitoring.
Autonomous events
There are no autonomous events generated by the above commands.
Reports
The reports generated by the above commands are detailed below.
Note: Performance monitoring log reports are accessible via the view
status menu (see “Performance logs” on page 7-3).
Config/perF_mon/Ses_defines/View
The view command will include a report for the SES definitions for the new
performance monitoring point.
This report displays the SES thresholds for the PMP for which this can be
defined. The report uses the following entries:
18, SES Thresholds
181, <PMP>_ses_threshold_block=<value>,
<PMP>_ses_threshold_bit=<value> "
Where:
• The <PMP> field is the capitalised form of the PMP name.
• The <value> field is the threshold value assigned to the PMP.
For example:
18,SES Thresholds
181,RS_SES_threshold_block=2400,RS_SES_threshold_bit=2400
181,MS_SES_threshold_block=2400,MS_SES_threshold_bit=2400
181,HP_SES_threshold_block=2400,HP_SES_threshold_bit=2400
181,HP_FE_SES_threshold_block=2400,
HP_FE_SES_threshold_bit=2400
181,LP_vc3_SES_threshold_block=600,
LP_vc3_SES_threshold_bit=600
181,LP_FE_vc3_SES_threshold_block=-1,
LP_FE_vc3_SES_threshold_bit=-1
181,LP_vc12_SES_threshold_block=600,
LP_vc12_SES_threshold_bit=600
181,LP_FE_vc12_SES_threshold_block=600,
LP_FE_vc12_SES_threshold_bit=600
181,PPI_CRC_vc12_SES_threshold_block=200,
PPI_CRC_vc12_SES_threshold_bit=100
;
For example:
182,Performance Monitoring Configuration
183,S2-1,PPI-CRC,24H,PM_monitoring=On
184,S2-1,PPI-CRC,24H,Alarm_enable=On,ES=2,SES=1,BBE=2,UAS=101
83,S2-2,PPI-CRC,24H,PM_monitoring=On
184,S2-2,PPI-CRC,24H,Alarm_enable=On,ES=2,SES=1,BBE=2,UAS=101
83,S2-3,PPI-CRC,24H,PM_monitoring=On
184,S2-3,PPI-CRC,24H,Alarm_enable=On,ES=2,SES=1,BBE=20,UAS=10
;
messages 183 and 184 are repeated for each valid 24 hour PPI_CRC
monitoring point that matches the user request argument.
Config/perF_mon/<15H|24H>/<PMP>/View
This report displays the enabled/disabled settings for performance monitoring.
The report uses the following entries:
182, Performance Monitoring
183, <SDH_port|SDH_AU4|SDH_aggr_payload|PDH_port>,
<PMP>, <PM_period>, Monitoring = <‘On’|‘Off’>
184, <SDH_port|SDH_AU4|PDH_port>, <PMP>, <PM_period>,
Alarm_enable = <‘On’|‘Off’>, ES = <threshold>,
SES = <threshold>, BBE = <threshold>,
UAS = <threshold>
Where:
• <PMP> is the capitalised form of the PMP’s name.
• <PM_period> is the performance monitoring period, and is set to either
‘15M’ or ‘24H’.
• <threshold> is the number of errors of the specified type.
For example:
182, Performance Monitoring
183, S2-1, LP, 15M, Monitoring = On
184, S2-1, LP, 15M, Alarm_enable = On, ES = 20, SES = 20, BBE = 20, UAS = 200
183, S2-1, LP-FE, 15M, Monitoring = On
184, S2-1, LP-FE, 15M, Alarm_enable = On, ES = 20, SES = 20, BBE = 20, UAS = 200
183, S2-1, PPI-CV, 15M, Monitoring = On
184, S2-1, PPI-CV, 15M, Alarm_enable = On, ES = 20, SES = 20, BBE = 20, UAS = 200
183, S2-2, LP, 15M, Monitoring = On
184, S2-2, LP, 15M, Alarm_enable = On, ES = 20, SES = 20, BBE = 20, UAS = 200
183, S2-2, LP-FE, 15M, Monitoring = On
184, S2-2, LP-FE, 15M, Alarm_enable = On, ES = 20, SES = 20, BBE = 20, UAS = 200
183, S2-2, PPI-CV, 15M, Monitoring = On
184, S2-2, PPI-CV, 15M, Alarm_enable = On, ES = 20, SES = 20, BBE = 20, UAS = 200
"
183, S7-1-J1, HP, 15M, Monitoring = On
184, S7-1-J1, HP, 15M, Alarm_enable = On, ES = 20, SES = 20, BBE = 20, UAS = 200
183, S7-1-J1, HP-FE, 15M, Monitoring = On
184, S7-1-J1, HP-FE, 15M, Alarm_enable = On, ES = 20, SES = 20, BBE = 20, UAS = 200
183, S7-1-J1, AU-PJE, 15M, Monitoring = On
;
Config/perF_mon/sTart_24h/View
This view command uses the following entries
186, Performance Monitoring Configuration
187, Start_24H = <0-23>
For example:
186, Performance Monitoring Configuration
187, Start_24H = 7
Foe example:
182,Performance Monitoring Configuration
183,S2-1,PPI-CRC,UAT,PM_monitoring=On
183,S2-2,PPI-CRC,UAT,PM_monitoring=Off
;
Message 183 is repeated for each valid performance monitoring point which
matches the user selection criteria <port | slot | all>.
Config/perF_mon/Basis/View
This view command uses the following entries
188, PM Basis
189, PM_Basis = <‘Bit’|‘Block’>
For example:
188, PM Basis
189, PM_Basis = Bit
Synchronisation sources
Synchronisation can be derived from the signals received on a number of ports.
These are:
• Either of the incoming STM-4 or STM-1 aggregate signals.
• Any STM-1 tributary signal. "
• Any VC-12 PDH signal on a 2M or 34M (16x2) tributary unit.
• Any VC-3 PDH tributary signal.
• External 2.048 MHz interface, via the Star Card module (not TN-1X/S).
• Internal 16.384 MHz master oscillator in the Payload Manager.
A source is regarded as failed once it has been unavailable for a defined period,
called the “failure holdoff time”. A source is regarded as stable once it has been
available for a defined period, called the “wait to restore time”. The durations
of these periods are user definable.
Note 1: The first level of the hierarchy can be set to ‘NONE’ by the user.
In this instance, only the TN-1X internal oscillator is used as a source of
synchronisation.
Note 2: In a ring of NEs using STM-4 aggregates, synchronisation should
be taken from a single external source. Problems may be experienced on
NEs which use the internal synchronisation source.
Note 3: Either channel of an MSP protection pair can be used for
synchronisation purposes. These mechanisms operate independently.
— If the source becomes stable again during this time, the source is used
as if it had not been interrupted.
— If the force setting is changed to off, a switch in synchronisation
sources will occur.
Note: When a source is in forced use, reversion settings are ignored.
• Force off. Using this setting cancels any existing forced source usage, and
source selection comes under the control of reversion settings (see above).
Existing non-reversion flags are unaffected when this mode is selected.
Note: The circumstances under which a switch in synchronisation occurs
depends on the implementation mechanism used. These are detailed in
“Synchronisation switching mechanisms” on page 4-53.
Note: A full description of SSM can be found in the Nortel TN-1X System
Description handbook (see “Related documents” on page xv).
Using this system, the TN-1X is able to evaluate which synchronisation source
is the best for use. This evaluation is used under two circumstances:
• The best source will always be selected for use, subject to software settings
restrictions (see “Synchronisation software settings” on page 4-52). That
is, if a better quality source is identified (and no source is in forced use),
the current reversion settings will dictate whether this source can be
selected for use.
• In the event of a source failure, the best of the remaining sources will be
selected for use, subject to software settings restrictions (see
“Synchronisation software settings” on page 4-52). If no source is
available, the standby source is selected.
Note: The SSM mechanism can only select sources that are listed in the
synchronisation source hierarchy.
The TN-1X transmits its QL on all STM-N ports, except for the STM-N port
from which it receives its synchronisation source. The QL transmitted on this
port is 15, which indicates to the source of the synchronisation that the
TN-1X should not be used for synchronisation. This action prevents closed
synchronisation loops, where two muxes each attempt to synchronise from
the synchronisation signal of the other.
By default, each mux uses its internal clock, which has a QL of 11.
Table 4-51
SSM quality levels
QL Meaning Description
2 Traceable to Primary Reference The external timing source for the network.
Clock (PRC).
4 Traceable to Transit Clock. A clock provided for equipment which does not connect
with customer equipment. That is, it only connects to
other nodes.
8 Traceable to Local Clock. A clock provided for equipment which connects directly
with customer equipment.
15 Do not use for synchronisation. This prevents the mux’s sync source from being used by
muxes that receive this value.
QL = 2
2 2
TN-1X
QL = 2
15 2
TN-1X TN-1X
QL = 2
STM-N RING QL = 2
2 15
TN-1X
QL = 2
15 2
Note: Before the PRC signal was introduced, all four TN-1Xs would have
used the default QL setting of 11, which indicates the use of an internal
oscillator (INT).
The user can configure the QL settings for both RX and TX purposes. These
"
manual settings override any QL values established by the TN-1X software.
Command details
The commands that access the synchronisation functionality of the TN-1X
are shown in Figure 4-11, and are detailed in the tables that follow.
Figure 4-11
Config/Sync_source command hierarchy
Config
Sync_source
Hierarchy
Reversion_on
reversion_oFf
force_oN
forCe_off
Rx_Override
Tx_Override
Ssm_oN
Ssm_Off
clear_No_Revert_flag
failure_Holdoff_Time
Wait_to_restore_time
View
STatus_view
Table 4-52
Config/Sync_source
Menu item Shortcut Parameters Confirm Description
Note: A failure holdoff time of one second must be set if the 25UPJ00750GXF Payload Manager is
used and SSM is enabled.
Parameters
The following parameters are used by the commands described above:
• The <sync_source> parameter identifies a physical port that is a source of
synchronisation, including internal and external sources. This can be one
of the following:
— An SDH port. This is the physical port on either an STM-N aggregate
unit, or an STM-1 tributary unit. The format is:
S<slot>-<port>
SDH ports are detailed in “SDH ports” on page 2-8. The <port>
elements of this syntax MUST be specified (the default value
of ‘1’ is
not assumed in this instance).
Autonomous events
The autonomous events associated with the above functionality are:
• If the current synchronisation source changes:
982, Ref_ss = <sync_source|‘EXT’|‘INT’>,
Old_SS = <sync_source|‘EXT’|‘INT’>
Reports
The reports are of the format shown below:
Config/Sync_source/View
This view command uses the following entries:
19,Sync Source Hierarchy Configuration
191, <sync_port|‘INT’|‘EXT’>, SSh_lvl =
<1|2|3|4>, SS_tx_override = <quality_level|‘SSM’>,
SS_rx_override = <quality_level|‘SSM’>,
SS_wtr_time = <restore_time>
192, Sync_src_reversion_mode = <‘Revertive’|
’Non-revertive’>
194, Sync_src_force = <‘Off’|sync_port>
195, SSM_Mode = <‘On’|‘Off’>
"
196, Sync_src_hierarchy = <‘INT’|’EXT’|SDH_port|PDH_port>
[’EXT’|SDH_port|PDH_port] [’EXT’|SDH_port|PDH_port]
[’EXT’|SDH_port|PDH_port]
197, SS_failure_holdoff_time = <failure_time>
For example:
19,Sync Source Configuration
191,PDH,SS_rx_override=11
191,INT,SS_hierarchy_level=1,SS_rx_override=11
191,EXT,SS_rx_override=11
191,S6-1,SS_tx_override=11,SS_rx_override=11,
SS_wait_to_restore_time=2
191,S7-1,SS_tx_override=11,SS_rx_override=11,
SS_wait_to_restore_time=2
191,S11-1,SS_tx_override=11,SS_rx_override=11
SS_wait_to_restore_time=2
192,Sync_src_reversion_mode=Revertive
194,Sync_src_force=Off
195,SSM_mode=Off
196,Sync_src_hierarchy=S6-1 S7-1
197,SS_failure_holdoff_time=5
;
Config/Sync_source/STatus_view
This report duplicates a status report on the Status View menu, and is detailed
in “View_status/Sync_Source_status” on page 7-11.
Consequent actions
When alarms are raised on the TN-1X, it is often necessary for other actions
to be performed. Many of these consequent actions involve other alarms being
sent up or downstream to other multiplexers, while others result in hardware
or software switches being performed. These actions can be direct or indirect,
depending on the nature of the original alarm.
Consequent actions are only enabled if all of the following conditions are met:
• The feature to which the instance relates is enabled, either in its function
menu or in the alarm monitoring menu.
• Alarm monitoring is enabled on an individual basis.
• Consequent actions are enabled on an NE basis. For PPI-AIS, consequent
actions must be enabled both on an NE basis and on an individual basis.
Where consequent actions are enabled for an instance, this means that:
• AIS insertion is enabled (except for DEG alarms).
• PPS is enabled (unless it is disabled for an instance).
• RDI insertion is enabled (except for DEG alarms).
Full details of consequent actions can be found in the TN-1X Alarm Clearing
Procedures handbook (see “Related documents” on page xv).
• Low-order Path Signal Label (LP-PLM). This alarm invokes the following
consequent actions:
— LP-RDI is sent upstream.
— PPI-AIS is injected downstream.
— On protected connections, with PPS enabled, there will be a path
protection switch for each affected TU-12.
Command details
The commands that access the consequent action functionality of the TN-1X
are shown in Figure 4-12, and are detailed in the tables that follow.
Figure 4-12
Config/Cons_act command hierarchy
Config
Cons_act
ne_Hp_Tim
oN
Off
ne_Hp_Plm
oN
Off
ne_Ms_Deg
oN
Off
ne_Lp_Plm
oN
Off
ne_Lp_Exc
oN
Off
ne_Lp_Tim
oN
Off
ne_Ppi_Ais
oN
Off
individUal
Ppi-Ais
oN
Off
View
View
Table 4-53
Config/Cons_act
Menu item Shortcut Parameters Confirm Description
individUal
View
CCU
CCV
See Table 4-61.
Table 4-54
Config/Cons_act/ne_Hp_Tim
Menu Item Shortcut Parameters Confirm Description
Table 4-55
Config/Cons_act/ne_Hp_Plm
Menu Item Shortcut Parameters Confirm Description
Table 4-56
Config/Cons_act/ne_Ms_Deg
Item Shortcut Parameters Confirm Description
Table 4-57
Config/Cons_act/ne_Lp_Plm
Menu Item Shortcut Parameters Confirm Description
Table 4-58
Config/Cons_act/ne_Lp_Exc
Menu Item Shortcut Parameters Confirm Description
Table 4-59
Config/Cons_act/ne_Lp_Tim
Menu Item Shortcut Parameters Confirm Description
Table 4-60
Config/Cons_act/ne_Ppi_Ais
Menu Item Shortcut Parameters Confirm Description
Table 4-61
Config/Cons_act/individUal/Ppi_Ais
Menu Item Shortcut Parameters Confirm Description
Parameters
The following parameters are used by the commands described above:
• The <PDH_port> parameter identifies a 2M, 34M (16x2) or 34/45M
(VC-3) tributary port. PDH ports are detailed in “PDH ports” on page 2-4.
Autonomous events
There are no autonomous events associated with the above commands.
Reports
The reports are of the format shown below:
Config/Cons_act/View
The entries used by this command are listed below.
20, Alarm Consequent Action Configuration
208, CA_<alarm> = <‘On’|‘Off’>
For example:
20, Alarm Consequent Action Configuration
208, CA_HP_TIM = On
208, CA_HP_PLM = Off
208, CA_LP_EXC = Off
208, CA_LP_PLM = On
208, CA_MS_DEG = On
208, CA_LP_TIM = Off "
208, CA_PPI_AIS = On
;
Config/Cons_act/individUal/Ppi_Ais/View
The entries used by this command are listed below.
20, Alarm Consequent Action Configuration
209, <PDH_port>, CA_<alarm> = <‘On’|‘Off’>
For example:
20, Alarm Consequent Action Configuration
209, S2-1, CA_PPI_AIS = On
209, S4-1, CA_PPI_AIS = Off
209, S9-1, CA_PPI_AIS = On
209, S11-1, CA_PPI_AIS = On
;
Transmitted strings and expected values for received strings are defined on
each mux by the user. The user specifies only fifteen characters. This string is
appended to a one byte frame marker, which includes a Cyclic Redundancy
Checking (CRC) checksum. The resulting sixteen byte transmission string is
transmitted cyclically in the J1 byte of the VC-3 path overhead.
Note: If less than fifteen characters are specified by the user, this is padded
with underscore characters.
A comparison is made between each received string and its expected value.
CRC differences highlight transmission problems, while string differences
indicate an incorrect connection. In both instances, an LP-TIM alarm is
raised.
The user can enable and disable the low order path trace monitoring
mechanism. It is also possible to override the CRC with a hexadecimal value.
The CLUI can be used to modify a user-defined ASCII text string that is
transmitted over the J2 byte for any given connection and also define the
string that should be received. The user may only enter a fifteen-character
string, the sixteenth byte being reserved as a checksum (however the user may
also manually edit this if so desired).
This transmitted string is extracted at the remote mux and compared to the
user-defined expected value. If the transmitted and expected strings do not
match then the connection is incorrect, while a CRC check highlights
transmission problems. Monitoring is supported at the Preside.
A low order path trail information mismatch (LP-TIM) alarm is raised at the
local mux if there is a mismatch in the expected and received strings.
Command details
The commands that access the low order path trace functionality of the
TN-1X are shown in Figure 4-13, and are detailed in Table 4-62.
Figure 4-13
Config/Lp_path_Trace command hierarchy
Config
Lp_path_Trace
"
Disable
Enable
Tx_set
eX_set
View
STatus_view
Table 4-62
Config/Lp_path_Trace
Menu item Shortcut Parameters Confirm Description
Note 1: This command disables consequent actions for the disabled instance.
Note 2: If no parameter is specified, information for all low order paths is displayed.
Parameters
The following parameters are used by the commands described above:
• The <PDH_port > parameter identifies a 34/45M PDH tributary port. PDH
ports are detailed in “PDH ports” on page 2-4.
• The <LP_path_label> parameter is a string of up to 15 characters. This
must use only printable characters, excluding comma, equals, colon,
semicolon and space. Default values for transmission and expected strings
are ‘TX_UNALLOCATED_’ and ‘RX_UNALLOCATED_’ respectively.
Autonomous events
There are no autonomous events associated with the above commands.
Reports
The reports generated by the above commands are listed below:
Config/Lp_path_Trace/View
The entries used by this command are listed below.
21, Path Trace Configuration
211, <PDH_port>, Path_trace_working_mode =
<‘Enabled’|‘Disabled’>
212, <PDH_port>, Path_trace_tx = <LP_path_label>,
Path_trace_ex = <LP_path_label>
213, <PDH_port>, Path_trace_tx_crc = <CRC>,
Path_trace_ex_crc = <CRC>
Where:
• The <PDH_port> parameter identifies a PDH tributary port. This takes the
following syntax:
S<slot>-<port>
For example:
21, Path Trace Configuration
211, S2-1, Path_trace_working_mode = Enabled
212, S2-1, Path_trace_tx = TX_UNALLOCATED_,
Path_trace_ex = RX_UNALLOCATED_,
213, S2-1, Path_trace_tx_crc = 64H,
Path_trace_ex_crc = 3AH
211, S4-1, Path_trace_working_mode = Enabled
212, S4-1, Path_trace_tx = TX_UNALLOCATED_,
Path_trace_ex = RX_UNALLOCATED_,
213, S4-1, Path_trace_tx_crc = 64H,
Path_trace_ex_crc = 3AH
211, S9-1, Path_trace_working_mode = Enabled
212, S9-1, Path_trace_tx = TX_UNALLOCATED_,
Path_trace_ex = RX_UNALLOCATED_,
213, S9-1, Path_trace_tx_crc = 64H,
Path_trace_ex_crc = 3AH
;
Config/Lp_path_Trace/STatus_view
The entries used by this command are listed below:
58, Received Path Trace Status
581, <PDH_port>, Rx_state = <‘PT_OK’|‘Mismatch’|
‘Misaligned’>, Path_trace_rx = <trace_string>,
Rx_crc = <trace_CRC>
581, <PDH_port> Undetermined
Where:
• <PDH_port> is the PDH destination of a VC-3 drop connection.
• <trace_string> is the received path trace string.
• <trace_CRC> is the received cyclic redundancy check.
Transmitted strings and expected values for received strings are defined on
each mux by the user. The user specifies only fifteen characters. This string is
appended to a one byte frame marker, which includes a Cyclic Redundancy
Checking (CRC) checksum. The resulting sixteen byte transmission string is
transmitted cyclically in the J1 byte of the VC-4 path overhead.
Note: If less than fifteen characters are specified by the user, this is padded
with underscore characters.
A comparison is made between each received string and its expected value.
CRC differences highlight transmission problems, while string differences
indicate an incorrect connection. In both instances, an HP-TIM alarm is
raised.
The user can enable and disable the high order path trace monitoring
mechanism. It is also possible to override the CRC with a hexadecimal value.
Command details
The commands that access the high order path trace functionality of the
TN-1X are shown in Figure 4-14, and are detailed in Table 4-63.
Figure 4-14
Config/Hp_path_trace command hierarchy
Config
Hp_path_trace
Disable
Enable
Tx_set
eX_set
"
View
STatus_view
Table 4-63
Config/Hp_path_trace
Menu item Shortcut Parameters Confirm Description
Note 1: This command disables consequent actions for the disabled instance.
Note 2: If this parameter is not specified, information for all high-order paths is displayed.
Parameters
The following parameters are used by the commands described above:
• The <SDH_port> parameter identifies the physical port on an STM-N
aggregate or STM-1 tributary. The format for this is:
S<slot>-<port>
• The <SDH_slot> parameter identifies all SDH ports and/or payloads for
the specified slot. The format for this is:
S<slot>
Autonomous events
There are no autonomous events associated with the above commands.
Reports
The reports generated by the above commands are listed below:
Config/Hp_path_trace/View
The entries used by this command are listed below.
21, Path Trace Configuration
211, <SDH_AU4>, Path_trace_working_mode =
<‘Enabled’|‘Disabled’>
212, <SDH_AU4>, Path_trace_tx = <HP_path_label>,
Path_trace_ex = <HP_path_label>
213, <SDH_AU4>, Path_trace_tx_crc = <CRC>,
Path_trace_ex_crc = <CRC>
Where:
• The <SDH_AU4> parameter identifies an AU4 high-order payload on an
STM-N aggregate or STM-1 tributary. The format for this is:
S<slot>-<port>-J<AU4>
For example:
21, Path Trace Configuration
211, S2-1-J1, Path_trace_working_mode = Enabled
212, S2-1-J1, Path_trace_tx = TX_UNALLOCATED_,
Path_trace_ex = RX_UNALLOCATED_,
213, S2-1-J1, Path_trace_tx_crc = 64H,
Path_trace_ex_crc = 3AH
211, S6-1-J1, Path_trace_working_mode = Enabled
212, S6-1-J1, Path_trace_tx = TX_UNALLOCATED_,
Path_trace_ex = RX_UNALLOCATED_,
213, S6-1-J1, Path_trace_tx_crc = 64H,
Path_trace_ex_crc = 3AH
211, S7-1-J1, Path_trace_working_mode = Enabled
212, S7-1-J1, Path_trace_tx = TX_UNALLOCATED_,
Path_trace_ex = RX_UNALLOCATED_,
213, S7-1-J1, Path_trace_tx_crc = 64H,
Path_trace_ex_crc = 3AH "
;
Config/Hp_path_trace/STatus_view
This report duplicates a status report on the Status View menu, as described in
“View_status/hp_Path_Trace_status” on page 7-12).
Each low order payload has a label defined for it. A comparison is made
between each received label and its expected value. Any difference indicates
transmission of connection problems, and raises an LP-PLM alarm.
The user can enable and disable the low order payload label monitoring
mechanism.
Note 1: If monitoring of payload labels is disabled, the comparison
between received and expected labels is not performed. The transmission
and reception of payload labels is unaffected.
Note 2: Payload label parameters associated with a connection are
defaulted if the connection is deleted.
Note: Under previous releases of the TN-1X, a zero value could be used to
represent standby connections. This functionality is now fully supported
(see “Raising signal alarms” on page 4-113).
Table 4-64
Low order VC-12 payload labels
Label Meaning
2 The VC-12 path is equipped with asynchronous mapping. This is the default for
current equipment.
Transmitted VC-12 labels and expected label values are defined on each NE
by the user. The resulting three-bit label is transmitted within bits 5 to 7 of the
V5 byte in the VC-12 path overhead.
Label Meaning
Command details
The commands that access the low order payload label functionality of the
TN-1X are shown in Figure 4-15, and are detailed in Table 4-66.
Figure 4-15
Config/Lp_paYload_label command hierarchy
Config
Lp_paYload_label
Disable
Enable
Tx_set
eX_set
View
STatus_view
Table 4-66
Config/Lp_paYload_label
Menu item Shortcut Parameters Confirm Description
Note: This command disables consequent actions for the disabled instance.
Parameters
The following parameters are used by the commands described above:
• The <PDH_port> parameter identifies a PDH tributary port. This takes the
following syntax:
S<slot>-<port>
Autonomous events
There are no autonomous events associated with the above commands.
Reports
The reports generated by the above commands are listed below:
Config/Lp_paYload_label/View
The entries used by this command are listed below.
215, Payload Label Configuration
216, <PDH_port>, Payload_label_working_mode =
<‘Enabled’|‘Disabled’>
217, <PDH_port>, Payload_label_tx = <LP_payload_label>,
Payload_label_ex = <LP_payload_label>
For example:
215, Payload Label Configuration
216, S2-1, Payload_label_working_mode = Enabled
217, S2-1, Payload_label_tx = 2, Payload_label_ex = 2
216, S2-2, Payload_label_working_mode = Enabled
217, S2-2, Payload_label_tx = 2, Payload_label_ex = 2
;
Config/Lp_paYload_label/STatus_view
The report for this command uses the following entries:
56, VC Path status
561, <PDH_port>, Path_src = <SDH_aggr_payload>,
Rx_payload_label = <LP_payload_label>
Where: "
• The <SDH_aggr_payload> parameter identifies an SDH aggregate
payload. The format for this is:
S<slot>-<port>-J<AU4>-K<KLM>
For example:
56, VC Path status
561, S2-1, Path_src = S6-1-J2-K121, Rx_payload_label = 7
561, S2-2, Path_src = S6-1-J2-K122, Rx_payload_label = 7
561, S2-3, Path_src = S6-1-J2-K123, Rx_payload_label = 7
561, S2-4, Path_src = S6-1-J2-K131, Rx_payload_label = 7
561, S2-5, Path_src = S6-1-J2-K132, Rx_payload_label = 7
561, S2-6, Path_src = S6-1-J2-K133, Rx_payload_label = 7
;
Label Meaning
Transmitted labels and expected label values are defined on each mux by the
user. The resulting one-byte label is transmitted as the C2 byte in the VC-4
path overhead.
A comparison is made between each received label and its expected value.
Any difference will indicate transmission or connection problems, and will
raise an HP-PLM alarm.
The user can enable and disable the high-order payload label monitoring
mechanism. This does not prevent payload labels from being transmitted or
received, but prevents the comparison of received and expected labels.
Note: High order payload label settings for MSP protection pairs can only
be made against the working section. Configuration of the protection
section is not supported. This will automatically mirror the settings of the
working section.
Command details
The commands that access the high order payload label functionality of the
TN-1X are shown in Figure 4-16, and are detailed in Table 4-68.
Figure 4-16
Config/Hp_paYload_label command hierarchy
Config
Hp_paYload_label
Disable
Enable
Tx_set
eX_set
View
STatus_view "
Table 4-68
Config/Hp_paYload_label
Menu item Shortcut Parameters Confirm Description
Note 1: This command disables consequent actions for the disabled instance.
Note 2: If this parameter is not specified, information for all high-order paths is displayed.
Parameters
The following parameters are used by the commands described above:
• The <SDH_port> parameter identifies the physical port on an STM-N
aggregate or STM-1 tributary. The format for this is:
S<slot>-<port>
• The <SDH_slot> parameter identifies all SDH ports and/or payloads for
the specified slot. The format for this is:
S<slot>
Autonomous events
There are no autonomous events associated with the above commands.
Reports
The reports generated by the above commands are listed below:
Config/Hp_paYload_label/View
The entries used by this command are listed below.
215, Payload Label Configuration
216, <SDH_AU4>, Payload_label_working_mode =
<‘Enabled’|‘Disabled’>
217, <SDH_AU4>, Payload_label_tx = <HP_payload_label>,
Payload_label_ex = <HP_payload_label>
Where:
• The <SDH_AU4> parameter identifies an AU4 high-order payload on an
STM-N aggregate or STM-1 tributary. The format for this is:
S<slot>-<port>-J<AU4>
For example:
215, Payload Label Configuration
216, S4-1-J1, Payload_label_working_mode = Enabled
217, S4-1-J1, Payload_label_tx = 2, Payload_label_ex = 2
216, S6-1-J1, Payload_label_working_mode = Enabled
217, S6-1-J1, Payload_label_tx = 2, Payload_label_ex = 2
216, S7-1-J1, Payload_label_working_mode = Enabled
217, S7-1-J1, Payload_label_tx = 2, Payload_label_ex = 2
;
Config/Hp_paYload_label/STatus_view
The report for this command uses the following entries:
56, VC Path status
561, <SDH_AU4>,, Rx_payload_label = <label>
For example:
56, VC Path status
561, S6-1-J1,, Rx_payload_label = 255
561, S7-1-J1,, Rx_payload_label = 255
561, S4-1-J1,, Rx_payload_label = 255
561, S11-1-J1,, Rx_payload_label = 255
;
Note: The above report is different from the report generated by the
“VC_path_status” command in the view status menu (see “View_status/
VC_path_status” on page 7-12).
"
Connection management
The connection functionality of the TN-1X relates to the management of
bidirectional VC-12 and VC-3 connections on the mux.
The TN-1X supports the following aggregate units:
• STM-1. The single AU-4 payload is accessible.
• STM-4. Only one of the four AU-4 payloads is accessible.
Note: STM-4 Optical aggregate units are unavailable to order until further
notice.
The total traffic capacity for the multiplexer is an AU-4 payload. The
containers within this payload (VC-3, VC-12) can be dropped from the
aggregates to any suitable tributary unit, or can be through connected.
Note: The number of available tributary ports can exceed the number of
aggregate ports, but the total bandwidth for the mux (63 x VC-12, 3 x VC-3
or a combination of these) cannot be exceeded.
Connection types
Connections can be divided into a number of categories:
• Through connections. Each of these connects a payload on one aggregate
to the same payload on the other aggregate. For example, a through
connection can be made between the S6-J1-K111 and S7-J1-K111
aggregate payloads.
• Protected drop connection connects a VC-12 or VC-3 tributary signal to
the same payload channel on both aggregates. In the transmit direction, the
tributary signal is transmitted on both aggregates. In the receive direction,
the signal is received from both aggregates but only one of the signals is
dropped to the tributary. If a connection fails, the connection is switched to
"
TN-1X
STM-1 STM-1
AGGR AGGR
34/45M TRIB
INTERNAL
STM-1 TRIB
2M TRIBS
BUS
...
As connections are made and unmade, the loading of the bus may become
fragmented. The user is able to defragment the bus. This maximises the
number of consecutive slots, enabling the addition of larger (VC-3) payloads.
Also, this action minimises the traffic hits that can occur when future VC-12
or VC-3 connections are made.
The physical connections for aggregate and tributary payloads are unchanged
by defragmentation, but the defragmentation of the internal bus will (in most
cases) result in temporary traffic hits while the internal bus is rearranged. You
will be made aware of traffic hits that will occur during the defragmentation.
Defragmentation of the internal bus can be performed in one of two ways:
• VC-3
A VC3 Defrag will rearrange the connections on a mux in order to
facilitate the addition of one or more VC3 connections. (This rearranging
of the existing traffic will cause these paths to experience traffic Hits). A
VC3 test defrag gives a pessimistic list of the hit risk connections that will
be effected. A VC3 Defrag will not cause a traffic hit to a VC3 connection
that is already present.
If there is less than 21 VC12 connections present then a VC3 Defrag will
provision the mux to accept two VC3 connections. When adding these two
connections directly after the defrag there will be no traffic disruption to
existing traffic.
If there is less than 42 VC12 connections present then a VC3 Defrag will
provision the mux to accept one VC3 connection. When adding this
connection directly after the defrag there will be no traffic disruption to
existing traffic.
A VC3 defrag will typically hit every VC12 connection on the mux. Each
channel will be hit for up to 20 seconds. The more connections on the mux,
the longer the mux is affected. For a full fill mux the total period is as
follows:
— Release 7 is 60 seconds
— Release 8 is 30 seconds
Release 9 is 60 seconds.
A VC3 Defrag should only be implement after, a VC3 test connect reports
connections will be hit.
• VC-12
A VC12 Defrag will rearrange the connections on a mux in order to
facilitate the addition of more VC12 connections with a reduced hit risk.
This rearranging of the existing traffic will cause these paths to experience
a traffic outage. A VC12 test defrag gives a pessimistic list of the hit risk
connections that will be effected.
A VC12 Defrag needs to be used after an upgrade from Release 8 and after
removing a VC3 but before replacing that VC 3 with VC12 connections. It
can also be used if a Mux has had its connections churned to an extent that
adding any new VC12 connections results in a significant Hit Risk
warning.
"
A VC12 defrag will typically hit every connection on the mux. Each
channel will be hit for up to 20 seconds. The more connections on the mux,
the longer the mux is affected. For a full fill mux the total period is as
follows:
— Release 7 is 60 seconds
— Release 8 is 30 seconds
— Release 9 is 60 seconds.
Before a VC12 Defrag is implemented a VC12 Test Defrag should be
applied to check the connections that may get hit.
CAUTION
Alarms during defragmentation
During a defragmentation, there is a possibility of
PPI-Unexp_Signal and QOSV alarms and traffic hits. This is
unavoidable, as the defragmentation causes connections to be
broken momentarily and then remade.
Ports 5, 6, 7, 8
Ports 9, 10, 11, 12
Ports 13, 14, 15, 16
This is for any 2M card (or the 16x2 card)
• Method 1: 60 Connections without Hit Risk
60 VC12 connections can be added in any order, but it is recommended that
the VC12 Connections on 2Meg tribs should be added in incrementing
order, all the ports on slot 2 from 1 to 16 then all the ports on s4 1 to 16, all
the ports on slot 9 1 to 16 and then slot 11 1 to 12. The last three
connections (slot 11 ports 13, 14 and 15) will generate a hit risk with this
method.
• Method 2: 63 Connections without Hit Risk
The second method requires adding the last 3 available ports first, for
"
example, add slot 11 port 13, 14 and 15, The rest of the connections can be
added in any order but it is again recommended that they are added in
incrementing order from slot 2 port 1 up to slot 11 port 12 finally. All 63
VC12 connections can be added without a Hit Risk using this method.
• Churning 2Meg Trib Connections On a VC12 Only Mux
When Churning the connections added using the above methods the last
three connections, for example, Slot 11 port 13, 14 and 15 should not be
deleted if possible, this will prevent significant Hit Risk when adding
further connections.
• Deleting then adding new connections on 2Meg Trib Cards
After VC12 connections have been deleted and new connections are to be
added, these new connections can be added in any order to the ports that
are available.
• 2Meg Trib and STM1 Cards
The VC12 Connections on 2Meg tribs should be added first in
incrementing order, all the ports on slot 2 from 1 to 16 then all the ports on
s4 1 to 16 etc. The connections on the STM1 card can then be added. This
method will prevent Hit Risk.
• Deleting then adding connections on 2Meg and STM1 Trib Cards
The connections on both cards can be deleted in any order, but the VC12
connections on the 2Meg trib cards should be re-added first using the
methods detailed above. The connections on the STM1 card can then be
added. This method will reduce a Hit Risk to existing traffic.
• Adding VC12 connections on STM1 Trib Cards only
These connections can be added in any order up to the total number of 63.
A VC12 Defrag should never be used on a mux with only STM1 trib cards
present.
• Adding VC12 Connections with a VC3 Present
The VC12 connections can be added in incrementing order using the
methods detailed above.
It is good practice that the Test Connect function and the Test Defrag is used
before applying either a connection or a defrag on the connections that are
already present. If a test connect reports a similar number of circuits hit to a
test defrag and it's not covered in the above adding connections, it is therefore
recommended to apply the Defrag as this will result in a shorter hit to the
effected existing paths. Compared to just adding the connection.
Adding connections
If a through connection (of any type) is made between aggregates, a payload
on one aggregate must be paired to the same payload on the alternate
aggregate. For this to be possible, the alternate payload must be free of
connections. This process does not use the internal bus.
Note 1: When connections are made to PDH ports, alarms may be raised if
traffic is not present. This can be prevented by use of the traffic monitoring
functionality (see “Raising signal alarms” on page 4-113).
Note 2: The internal bus of the TN-1X can be defragmented, but the
physical connections between aggregates and tributaries cannot. For a
VC-3 payload to be added, a suitable tributary payload must be available
for use (see above). This situation is made possible only by planned
network development.
Disconnections
Any connection that is established can be disconnected. When disconnected,
the traffic on the connection is lost. The payloads on either end of the
connection are available for reuse, along with the associated bandwidth on the
TN-1X buses.
Testing connections
The user is able to identify traffic hits that will occur as the result of changes
to connectivity. This allows the implications of new connections to be assessed
before they are made.
• The user can identify traffic hits that will result from a new connection. If
existing connections conflict with the proposed connection, these will be
•
identified as being at risk.
The user can identify the traffic that will be affected by a defragmentation
"
of the TN-1X internal bus that is biased towards future VC-12 connections.
• The user can identify the traffic that will be affected by a defragmentation
of the TN-1X internal bus that is biased towards future VC-3 connections.
User labels
The TN-1X supports up to sixty three through and drop connections. A user
label, which can be used to provide additional information about the nature of
the connection, is associated with each of these connections. It is a string of
up to fifteen alphanumeric characters that may include dash (‘-’) and
underscore (‘_’) characters.
The user label is displayed on all alarms, events, and performance monitoring
logs involving the connection. The default user labels associated with
connections are detailed below.
• For drop connections to a PDH port, a PDH port reference is used. For
example, ‘S2-1’.
• For drop connections to a STM-1 tributary payload, an STM-1 tributary
payload reference is used. For example, ‘S4-1-J1-K111’.
• For through connections, the alternate aggregate payload reference is used.
For example, ‘S7-1-J1-K123’.
Command details
The commands that access the connection functionality of the TN-1X are
shown in Figure 4-18 below, and are detailed in the tables that follow.
Figure 4-18
Config/coNnections command hierarchy
Config
coNnections
Au4_select
Connect
Test_connect
thRough_unused_VC12
Disconnect
aLl_disconnect
User_label
deFrag
vc12_opt
vc3_opt
vc12_Test_opt
vc3_Test_opt
coNvert_prot_to_unprot
View
Connected
BPayloads
Payloads
Au4_select
Table 4-69
Config/coNnections
Menu Item Shortcut Parameters Confirm Description
—continued—
Table 4-69
Config/coNnections (continued)
Menu Item Shortcut Parameters Confirm Description
SDH_aggr_payload
SDH_aggr_payload
SDH_trib_payload
PDH_port
SDH_trib_payload
SDH_trib_payload
—end—
Table 4-70
Config/coNnections/deFrag
Menu Item Shortcut Parameters Confirm Description
Table 4-71
Config/coNnections/View
Menu Item Shortcut Parameters Confirm Description
Note 1: Where connections exist that are part on an multiplexer section Protection (MSP) configuration,
these are displayed for the working channel only, irrespective of whether the working channel or the
protection channel is currently in use.
Parameters
The following parameters are used by the commands described above:
• The <SDH_aggr_payload> parameter identifies an SDH aggregate
payload. The format for this is:
S<slot>-<port>-J<AU4>-K<KLM>
• The <PDH_port> parameter identifies a PDH tributary port. This takes the
following syntax:
S<slot>-<port>
• The ‘1’, ‘2’, ‘3’ and ‘4’ values represent the number of the AU-4 payload
to be dropped. For an STM-1 aggregate, this defaults to ‘1’.
• The <user_label> parameter is a string of up to fifteen characters that may
include dash (‘-’) and underscore (‘_’) characters.
Autonomous events
There are no autonomous events associated with the above commands.
Reports
The reports for the above commands are detailed below.
Note: Where connections exist that are part on an Multiplexer Section
Protection (MSP) configuration, these are displayed for the working
channel only, irrespective of whether the working channel or the protection
channel is currently in use.
Config/coNnections/Test_connect
Config/coNnections/deFrag/vc12_test_opt
Config/coNnections/deFrag/vc3_test_opt
The entries used by these commands are listed below.
254, Potential Traffic hit connections
255, <SDH_aggr_payload>[&<SDH_aggr_payload>],
<SDH_trib_payload|PDH_port>, BI, Ulabel= <user_label>
For example:
254, Potential traffic hit connections
251, S6-1-J1-K111&S7-J1-K111, S2-1, BI, Ulabel= Customer_1
251, S6-1-J1-K113, S2-3, BI, Ulabel= Customer_1
251, S6-1-J1-K114, S7-J1-K114, BI, Ulabel= Customer_1
;
Config/coNnections/View/Connected
The entries used by this command are listed below.
25, Connections
251, <SDH_aggr_payload>[&<SDH_aggr_payload>] |
<SDH_trib_payload>|<PDH_trib_payload>,
<SDH_trib_payload|PDH_port>, BI, Ulabel=<user_label>
For example:
25,Connections
251,S6-1-J1-K152, S4-3, BI, Ulabel = S4-3
251,S6-1-J1-K161, S4-1, BI, Ulabel = S4-1
251,S7-1-J1-K151, S4-4, BI, Ulabel = S4-4
251,S7-1-J1-K153, S4-2, BI, Ulabel = S4-2
;
Config/coNnections/View/Au4_select
The entries used by this command are listed below.
258, AU4 Select
259, AU4_select = <‘1’|‘2’|‘3’|‘4’>
For example:
258, AU4 Select
251, AU4_select = 1
Config/coNnections/View/Payloads
The entries used by this command are listed below.
256, Payload Connectivity
257, <SDH_aggr_payload|SDH_trib_payload|PDH_port>,
con_s = <‘Free’|‘Connected’|‘Hit_risk’|‘Blocked’|
‘Blocked_internally’|‘Drop_free’|
‘MSP_blocked’ >, Ulabel = <user_label>
Where:
• ‘Free’ indicates that the payload is free, and using it will not hit traffic.
• ‘Hit_risk’ indicates that the payload is free, but using it will hit traffic
under some circumstances. The user should use one of the test connect
commands to establish the exact connections that will be hit.
• ‘Connected’ indicates that the payload is connected. "
• ‘Blocked’ indicates that the payload is not available because the bandwidth
is in use by an overlapping payload.
• ‘Blocked_Internally’ indicates that the payload is blocked due to the
internal architecture of the TN-1X.
• ‘Drop_Free’ indicates that the payload is available for drop connections
only.
• ‘MSP_blocked’ means that the payload is blocked due to MSP usage.
For example:
256, Payload Connectivity
257, S2-1, con_s = Connect, Ulabel = Customer_1
...
257, S2-16, con_s = Connect, Ulabel = Customer_2
257, S4-1, con_s = Connect, Ulabel = Customer_1
...
257, S4-16, con_s = Free, Ulabel = Customer_2
257, S6-J1-K111, con_s = Blocked, Ulabel = Customer_1
...
257, S6-J1-K373, con_s = Connect, Ulabel = Customer_1
257, S6-J1-K100, con_s = Connect, Ulabel = Customer_1
257, S6-J1-K200, con_s = Free, Ulabel = Customer_1
257, S6-J1-K300, con_s = Blocked, Ulabel = Customer_1
257, S7-J1-K111, con_s = Blocked, Ulabel = Customer_1
...
257, S7-J1-K373, con_s = Connect, Ulabel = Customer_1
257, S7-J1-K100, con_s = Connect, Ulabel = Customer_1
257, S7-J1-K200, con_s = Free, Ulabel = Customer_1
257, S7-J1-K300, con_s = Blocked, Ulabel = Customer_1
257, S9-1, con_s = Connect, Ulabel = Customer_1
...
257, S9-16, con_s = Connect, Ulabel = Customer_2
257, S11-1, con_s = Connect, Ulabel = Customer_1
...
257, S11-16, con_s = Free, Ulabel = Customer_2
;
Config/coNnections/View/BPayloads
The entries used by this command are listed below.
260, Brief Payload Connectivity
261, <SDH_AU4>,, <SDH_payload_info>
261, <PDH_port>, 16, <PDH_port_info>
Where:
• The <SDH_payload_info> is a string of characters, each of which
represents the state of a VC-12 or VC-3 payload. The following characters
are used in this string:
— ‘F’ stands for ‘Free’.
— ‘C’ stands for ‘Connected’.
— ‘D’ stands for ‘Only drop connection possible’.
— ‘H’ stands for ‘Connection possible, but potential hit-risk’.
— ‘B’ stands for ‘Blocked’.
— ‘I’ stands for ‘Blocked due to fully utilised backplane’.
— ‘M’ stands for ‘Blocked due to MSP’.
Each of the above characters represents one of the payload states detailed
in “Config/coNnections/View/Payloads” on page 4-95.
• The <PDH_port_info> is a string of sixteen characters, each of which
represents the state of a single PDH port. The characters used to represent
each state are the same as for SDP payloads (see above).
For example:
260,Brief Payload Connectivity
261,S6-1-J1,,CCCFCCCCCFFFFFFFFFFFFFFFFCFFFFFFFFFFFFFFFFFFFFFFFFCFFFFFFFFFFFFBBB
261,S7-1-J1,,FCCFCCFCCFFFFFFFFFFFFFFFFCFFFFFFFFFFFFFFFFFFFFFFFFCFFFFFFFFFFFFBBB
262,S2,16,CCCCCCFCCFFFFFFF
262,S4,16,FFFFFFFFFFFFFFFF
261,S9-1-J1,,FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFBBB
262,S11,16,FFFFFFFFFFFFFFFF
;
Equipping
The equipping functionality of the TN-1X enables the user to specify which
cards occupy which slots.
Unequipping a card
When a card is to be removed, connections to the card must first be deleted.
The card can then be unequipped by specifying the slot in which the card is
located. Finally, the card can then be removed from the mux.
Note: Cards that are part of an MSP protection pair cannot be unequipped.
However, these cards can replaced and re-equipped with cards from the
same card family without disrupting MSP settings.
Equipping a card
Once a card has been inserted into the mux, the slot can be equipped to
identify the inserted card. No confirmation is required to equip a slot.
If an inserted card has replaced another card from the same card family, the
connections used on the original card can be preserved. To do this, do not
delete the connections on the original card, or unequip the original card
before it is removed. Once the new card is inserted, re-equip the card to
remake the original connections. Each card family includes all variants of a
card type. A confirmation is required when a slot is re-equipped.
Note: If 2-inch STM-1 tributary units are installed in slots 2, 4 and 11, then
this will prevent the installation of cards in slots 3, 5, and 12. That is, slot 3
cannot be installed with an 1:N protection tributary unit, slot 5 cannot be
installed with a Payload Manager, and slot 12 cannot be installed with a
power supply unit.
Table 4-72
Cards and slots
Slot Cards
5 Payload Manager.
8 Payload Manager.
10 Unused.
Command details
The commands that access the equipping functionality of the TN-1X are
shown in Figure 4-19, and are detailed in the sections that follow.
Figure 4-19
Config/carDs command hierarchy
Config
carDs
Equip
Icc
stm_1_Trib
stm_1_Agg
stm_4_Agg
2M_trib
PSu
Payload_Man
"
16x2m
34_45M
Unequip
View
Ports_view
Table 4-73
Config/carDs
Menu Item Shortcut Parameters Confirm Description
Table 4-74
Config/carDs/Equip
Menu Item Shortcut Parameters Confirm Description
Table 4-75
Config/carDs/Equip/Icc
Menu Item Shortcut Parameters Confirm Description
Note: A confirmation is required when re-equipping a slot with a card from the same card family.
Table 4-76
Config/carDs/Equip/stm_1_Trib
Menu Item Shortcut Parameters Confirm Description
opt_HWG C D E 1T HWG
opt_mp_11aa C D E 1T 11
elec_JBK C D E 1T JBK
elec_mp_12aa C D E 1T 12
Note: A confirmation is required when re-equipping a slot with a card from the same card family.
Table 4-77
Config/carDs/Equip/stm_1_Agg
Menu Item Shortcut Parameters Confirm Description
opt_HWH C D E 1A HWH
Note: A confirmation is required when re-equipping a slot with a card from the same card family.
Table 4-78
Config/carDs/Equip/stm_4_Agg
Menu Item Shortcut Parameters Confirm Description
1550_HVB C D E 4A HVB
Note: A confirmation is required when re-equipping a slot with a card from the same card family.
Table 4-79
Config/carDs/Equip/2M_trib
Menu Item Shortcut Parameters Confirm Description
75ohm_GXG C D E 2M GXG
120ohm_GXR C D E 2M GXR
Note: A confirmation is required when re-equipping a slot with a card from the same card family.
Table 4-80
Config/carDs/Equip/Payload_Man
Menu Item Shortcut Parameters Confirm Description "
HZQ C D E PM HZQ slot No Equips the selected
(see note) Payload Manager unit in
GXF C D E PM GXF the specified slot.
mp_10aa C D E PM 10
Note: A confirmation is required when re-equipping a slot with a card from the same card family.
Table 4-81
Config/carDs/Equip/16x2m
Menu Item Shortcut Parameters Confirm Description
Note: A confirmation is required when re-equipping a slot with a card from the same card family.
Table 4-82
Config/carDs/Equip/34_45M
Menu Item Shortcut Parameters Confirm Description
Note: A confirmation is required when re-equipping a slot with a card from the same card family.
Parameters
The following parameters are used by the commands described above:
• The <slot> parameter specifies a slot for a card to be equipped into, or
unequipped from. The syntax is:
S<slot_number>
S2
Autonomous events
There are no autonomous events associated with the above commands.
Reports
The reports for the above commands are detailed below.
Config/carDs/View
The entries used by this command are listed below.
23, Cards
231, <slot>, Card = <card_type> | ‘UNEQUIPPED’
STM_1_Trib-opt_HWE
STM_1_Trib-opt_HWG
STM_1_Trib-opt_mp_11AA
STM_1_Trib-elec_JBK
STM_1_Trib-elec_mp_12AA
STM_1_Agg-opt_HWF
STM_1_Agg-opt_20AA
STM_1_Agg-opt_HWH
—continued—
Table 4-83
Card types for the TN-1X (continued)
Card Description
STM_4_Agg-IS_GSC
STM_4_Agg-1550_HVB
2M_Trib-75ohm_HVT
2M_Trib-120ohm_GXR
2M_Trib-120ohm_HVQ
Payload_man-GXF
Payload_man-HZQ
Payload Manager
"
Payload_man-mp_10AA
Payload_man-TBD_10CA
Note: Although the NTKD21AA, NTKD23AA and the NTKD23AB variants are
not selectable from the CLUI menu, they should be equipped as follows:
The NTKD21AA is equipped as Opt_hwf
The NTKD23AA is equipped as 75ohm_hvt
The NTKD23AB is equipped as 120ohm_hvq
—end—
For example:
23, Cards
231, S1, Card=UNEQUIPPED
231, S2, Card=2M_Trib-75ohm_GXG
231, S3, Card=2M_Trib-75ohm_GXG
231, S4, Card=2M_Trib-75ohm_GXG
231, S5, Card=Payload_man-mp_10AA
231, S6, Card=STM_4_agg-opt_GSA
231, S7, Card=STM_4_agg-opt_GSA
231, S8, Card=Payload_man-mp_10AA
231, S9, Card=2M_Trib-75ohm_GXG
231, S10, Card=UNEQUIPPED
231, S11, Card=2M_Trib-75ohm_GXG
231, S12, Card=Psu
231, S13, Card=Psu
231, S14, Card=SRC
;
Config/carDs/Ports_view
The entries used by this command are listed below.
536, Ports
537, <PDH_port | SDH_trib_payload | SDH_aggr_payload>,
Traffic = <Traffic_type, Ulabel = [<label>]
Where:
• The <PDH_port> parameter identifies a PDH tributary port. This takes the
following syntax:
S<slot>-<port>
• The <traffic_type> parameter identifies the nature of the card traffic on the
card. Traffic types are listed in Table 2-6 on page 2-12.
For example:
536,Ports
537,S2-1, traffic=2M75, Ulabel=S2-1
537,S2-2, traffic=2M75, Ulabel=S2-2
537,S2-3, traffic=2M75, Ulabel=S2-3
537,S2-4, traffic=2M75, Ulabel=S2-4
537,S2-5, traffic=2M75, Ulabel=S2-5
537,S2-6, traffic=2M75, Ulabel=S2-6
537,S2-7, traffic=2M75, Ulabel=S2-7
537,S2-8, traffic=2M75, Ulabel=S2-8
537,S2-9, traffic=2M75, Ulabel=S2-9
537,S2-10, traffic=2M75, Ulabel=S2-10
537,S2-11, traffic=2M75, Ulabel=S2-11
537,S2-12, traffic=2M75, Ulabel=S2-12
537,S2-13, traffic=2M75, Ulabel=S2-13
537,S2-14, traffic=2M75, Ulabel=S2-14
537,S2-15, traffic=2M75, Ulabel=S2-15
537,S2-16, traffic=2M75, Ulabel=S2-16
537,S4-1, traffic=2M75, Ulabel=S4-1
537,S4-2, traffic=2M75, Ulabel=S4-2
537,S4-3, traffic=2M75, Ulabel=S4-3
537,S4-4, traffic=2M75, Ulabel=S4-4
537,S4-5, traffic=2M75, Ulabel=S4-5
537,S4-6, traffic=2M75, Ulabel=S4-6
537,S4-7, traffic=2M75, Ulabel=S4-7
537,S4-8, traffic=2M75, Ulabel=S4-8
537,S4-9, traffic=2M75, Ulabel=S4-9
"
Provided that two Payload Managers are installed, and Payload Manager
switching is enabled, the following alarms will cause a Payload Manager
switch when raised against the active Payload Manager.
• NE-Card_Fault.
• NE-Card_Fail.
• NE-Card_Out.
Note 1: Forced Payload Manager switching is not possible when the mux
is in detached mode (see “Detached mode” on page 9-22).
Note 2: Payload Manager protection cannot be enabled unless there are
two Payload Managers of the same type. This prevents incorrect operation
when VC-3 traffic is being carried. When upgrading from Release 6
(where this was supported), Payload Manager protection will be disabled.
Note 3: Payload Manager switches should not be performed more often
that every six minutes on a single NE.
Command details
The commands that access the Payload Manager protection functionality of
the TN-1X are shown in Figure 4-20 below, and are detailed in the tables that
follow.
Figure 4-20
Config/Payman_Protect command hierarchy
Config
Payman_Protect
pm_switch_mode_oN
pm_switch_mode_Off
S5
View
S8
Current "
STatus_view
Table 4-84
Config/Payman_Protect
Menu Item Shortcut Parameters Confirm Description
Table 4-85
Config/Payman_Protect/pm_switch_Off
Menu Item Shortcut Parameters Confirm Description
Parameters
The Payload Manager protection commands described above make no use of
parameters.
Autonomous events
The autonomous events associated with the above functionality are:
• When a successful Payload Manager switch occurs:
963, Active_PM = <‘S5’|‘S8’>, Reason = <‘Forced’|‘Auto’>
Reports
The reports generated by the above commands are listed below.
Config/Payman_Protect/View
The entries used by this command are listed below.
110, Payload Manager Switch Configuration
111, PM_switch_mode = <‘Off_S5’|‘Off_S8’|‘On’>
Where:
• ‘Off_S5’ identifies slot 5 as the active Payload Manager in manual mode.
• ‘Off_S8’ identifies slot 8 as the active Payload Manager in manual mode.
• ‘On’ indicates that automatic Payload Manager protection switching is on.
For example:
110, Payload Manager Switch Configuration
111, PM_switch_mode = Off_S8
Config/Payman_Protect/STatus_view
This report duplicates a status report on the Status View menu, and is
described in “View_status/Payman_Protect” on page 7-14.
The 1:N protection switching modes described above can be enabled if all of
the following logical conditions are met:
• Slot 3 must be equipped as either of the following units:
— 2 Mbit/s 75 Ω Tributary Unit (NTKD23AA or 25U JU00 750 HVT
equipped as 25U JU00 750 HVT).
— 2 Mbit/s 120 Ω Tributary Unit (NTKD23AB or 25U JU00 750 HVQ
equipped as 25U JU00 750 HVQ).
• All 2 Mbit/s tributary units must be equipped as the same impedance type
as the card in slot 3 (see above).
• Slot 1 must be equipped as an ICC2 unit (NTKD13AA).
• The active Payload Manager must be either a 25U PJ00 750 HZQ or
NTKD10AA unit.
• There are no NE-Card_Out alarms raised against any slots on the mux.
CAUTION
1:N 2 Mbit/s tributary switching
If 1:N tributary protection is enabled, do not remove an active
2 Mbit/s Tributary Unit. Perform a manual 1:N protection
switch to the protection 2 Mbit/s Tributary Unit before
removing an active 2 Mbit/s Tributary Unit.
Auto-reversion
An auto-reversion feature is available, which enables traffic being carried on
the protection card to return automatically to the working card when the
condition causing the protection switch clears. This normally occurs a
specified time after the condition has cleared. This time interval is known as
the Wait-To-Restore (WTR) period. The user can enable/disable the
auto-reversion feature via the CLUI.
Command details
The commands that access the 1:N tributary protection functionality of the
TN-1X are shown in Figure 4-21 below, and are detailed in the tables that
follow.
Figure 4-21
Config/Trib_Protect
Config
Trib_Protect
Mode
Auto
Manual
Disable
Revert_auto
force_From
Clear_protect
View
"
STatus_view
Table 4-86
Config/Trib_Protect
Menu Item Shortcut Parameters Confirm Description
force_From C TP F ‘S2’ | ‘S4’ | Yes Switches traffic from the specified slot
(see note) ‘S9’ | ‘S11’ to the protection unit in slot 3.
Note: This command can be used only if all required logical and physical conditions are met.
Table 4-87
Config/Trib_Protect/Mode
Menu Item Shortcut Parameters Confirm Description
Note: This mode can be selected only if all required logical conditions are met.
Parameters
There are no parameters used by the above commands.
Autonomous events
The autonomous events associated with the above functionality are:
• When a successful 1:N protection switch occurs:
964,trib_switch_from = <card_inst>,switch_to=<card_inst>,
Reason = <‘Force’ | ‘Auto’ |‘Revert_auto’ | ‘Clear_prot’>,
Fail_card = <card_inst>
Reports
The reports for the above commands are listed below.
Config/Trib_Protect/View
The entries used by this command are listed below.
115, Trib Protection Configuration
116 <card_inst>,Trib_protect_mode=<‘Force’ | ‘Auto’ |
‘Revert_auto’ | ‘Disable’>,[Force_from = <‘Inactive’ |
‘card_inst’>]
For example:
115, Trib Protection Configuration
116, S3, Trib_protect_mode = Force, Force_from = Inactive
;
or
115, Trib Protection Configuration
116, S3, Trib_protect_mode = Disable
;
Config/Trib_Protect/STatus_view
This report duplicates a status report on the Status View menu, and is
described in “View_status/Trib_Protect” on page 7-13.
Command details
The commands that access the traffic functionality of the TN-1X are shown in
Figure 4-22, and are detailed in the tables that follow.
Figure 4-22
Config/poRts
Config
poRts
Traffic_auto
traffic_Standby
Bitrate
34m
45m_Short
45m_Long
View
View
sIgnal_structure
Un_framed
Framed
Framed_and_blocked
Crc
View
Table 4-88
Config/poRts
Menu Item Shortcut Parameters Confirm Description
Note: If no parameter is specified for this command, all available port information is displayed.
Table 4-89
Config/poRts/Bitrate
Menu Item Shortcut Parameters Confirm Description
Note - If this command is applied to a 34/45M card that is involved in 1:1 VC-3 Manual Tributary
Protection while protection is disabled, a ‘PPI-Unexp’ alarm is raised. To clear this alarm, enable
"
protection and perform a protection switch.
Table 4-90
Config/poRts/sIgnal_structure
Menu Item Shortcut Parameters Confirm Description
Parameters
The following parameters are used by the commands described above:
• The <PDH_port> parameter identifies a PDH tributary port. This takes the
following syntax:
S<slot>-<port>
• The <PDH_slot> parameter identifies a PDH slot. This takes the following
syntax:
S<slot>
Autonomous events
There are no autonomous events associated with the above functionality.
Reports
The reports for the above commands are listed below.
Config/poRts/View
The entries used by this command are listed below.
32, Port Configuration
321, <PDH_port>, Traffic = <‘Auto’|‘Standby’>,
Connection_src = <SDH_aggr_payload>
[&<SDH_aggr_payload>], Ulabel = <label>
Where:
• The <SDH_aggr_payload> parameter identifies an SDH aggregate
payload. The format for this is:
S<slot>-<port>-J<AU4>-K<KLM>
For example:
32, Port Configuration
321, S2-1, Traffic = Auto, Connection_src = S6-1-J1-K123,
Ulabel = Cust_1
Config/poRts/Bitrate/View
The entries used by this command are listed below.
323, Bitrates
324, <PDH_port>, Port_bitrate= <bitrate>, Ulabel = <label>
Where:
• The <bitrate> parameter identifies the configured bit rate for the specified
port. This can be 2M, 34M, 45M_short or 45M_long.
For example:
323, Bitrates
324, S2-1, Port_bitrate = 34M, Ulabel = Cust_Office_01
324, S4-1, Port_bitrate = 34M, Ulabel = Cust_Office_01
324, S9-1, Port_bitrate = 34M, Ulabel = Cust_Office_01
324, S11-1, Port_bitrate = 34M, Ulabel = Cust_Office_01
;
Config/poRts/sIgnal_structure/View
The response is;
32,Port Signal Structure Configuration:
321,s2-1, Port_signal_structure = Unframed, Ulabel = s2-1
321,s2-2, Port_signal_structure = Framed, Ulabel = s2-3
321,s2-3, Port_signal_structure = Framed_and_Blocked,
Ulabel = s2-3
321,s2-4, Port_signal_structure = Crc, Ulabel = s2-4
;
(message 321 is repeated for all valid ports that match the input argument….)
For slots that contain HVT or HVQ boards with the wrong version of ASIC
signal structure reverts to unframed and the report is:
321,s2-1, Port_signal_structure = Unframed, Ulabel = s2-1
Wrong ASIC
For slots that have just been equipped as NTKD23AA (HVT) or NTKD23AB
(HVQ) boards and have not yet reported their ASIC type, the report is:
321,s2-1, Port_signal_structure = Unframed, Ulabel = s2-1
Undetermined
"
unframed, will be given.
321, s2-1, Port_signal_structure = Unframed, Ulabel = s2-1
Wrong ASIC
MSP monitors both STM-1 channels for failures. The protection status of the
link is carried in the K1 and K2 bytes within the multiplexer section overhead
of the protection channel. The MSP mechanisms on the local mux and the
remote mux transmit protection status information using these bytes. This
enables the mechanisms to determine which of the channels should be used,
and to perform a protection switch as appropriate.
MSP will switch to the protection channel under a number of alarm and
non-alarm conditions. To revert to using the working channel, a manual
switch must be used. Automatic reversion is not supported. The MSP
mechanism can be locked to prevent the use of the protection section. It is
also possible to force the mechanism to use either the working channel or the
protection channel, and to test the working channel for errors.
MSP configurations
On the TN-1X, MSP makes use of both aggregates or a pair of STM-1
tributaries. These are connected in a point-to-point configuration to a pair of
aggregates or tributaries on another SDH mux (such as TN-1X, TN-1C,
TN-1P, TN-4X, Optera Metro 4100, TN-16X, or another manufacturer’s SDH
equipment). Supported MSP configurations are shown in Figure 4-23.
Figure 4-23
MSP configurations
"
T N -1X M U X N O N -M S P A G G R /T R IB C H A N N E LS
SDH MUX M S P A G G R /T R IB C H A N N E LS
For example, a network that uses MSP protection between two rings is shown
in Figure 4-24. The two rings are connected via an STM-1 tributary channel
(Link X). A second tributary channel that carries identical traffic (Link Y)
provides 1+1 MSP protection. If Link X fails, an MSP switch occurs. The
protected and unprotected traffic that was received at either end of the
protected channel from Link X is received instead from Link Y.
Figure 4-24
MSP protection between rings
LIN K X
RING 1 RING 2
LIN K Y
Unidirectional operation
In unidirectional mode, traffic moves in both directions, but the MSP
mechanisms operate independently. That is, switching is evaluated at the
receive end only. When a switch occurs, the failed direction is switched from
the working channel to the protection channel. Override values for the K1 and
K2 bytes can only be used for unidirectional operation.
FAILE D
C HA NN EL
TR AN SM ITTED CH AN N EL (N O T IN U SE)
Bidirectional operation
This is the default setting. In bidirectional mode, traffic moves in both
directions, and the MSP mechanisms communicate and coordinate the
switching of both channels as a pair. When a switch occurs, both channels are
switched from the working channel to the protection channel. Switching of a
single direction is not supported in this mode. Override values for the K1 and
K2 bytes are not used during bidirectional operation.
B E F O R E S W IT C H A FTE R S W ITC H
FA ILE D
CHANNEL
T RA N S M ITT E D C H A N NE L (IN U S E )
T R A N S M IT TE D C H A N N E L (N O T IN U S E )
Switching conditions
TN-1X supports both manual and automatic MSP switching. It is not possible
to perform a manual switch while the mux is in detached mode. An automatic
MSP switch is initiated via the K bytes under the following conditions:
• Equipment failure. This is characterised by a Signal Failure (SF) condition,
specifically card fail, card fault or card out alarms.
• A ‘hard failure’ condition detected on the incoming STM-1 signal. This is
characterised by a signal failure (SF), specifically LOS, LOF, MS-AIS or
MS-EXC alarms.
Note: Receipt of LOS causes a laser shutdown in addition to the switch.
This causes an LOS on the remote mux, causing a switch. As a result, both
channels switch. This occurs irrespective of whether bidirectional or
unidirectional modes are active.
MSP protocol
MSP operates using a bit-oriented protocol that is transmitted in the K bytes
(K1 and K2) of the multiplexer section overhead of the protection channel.
The K bytes indicate the protection status of both working and protection
channels, and are used by the MSP mechanisms on the local and remote mux
to determine any required switching actions.
The K1 byte
The K1 byte indicates a request from the mux that generated it:
• Bits 1 to 4 indicate the request type.
— A condition associated with a failure. For example, Signal Degradation
(SD) or Signal Failure (SF). This condition can be high or low priority
(high by default).
— A state of the MSP function. For example, Wait To Restore (WTR), Do
Not Revert (DNR), No Request (NR), Reverse Request (RR).
— An external request. For example, Lockout of Protection, Forced,
Manual or Exercise.
• Bits 5 to 8 indicate the channel for which the request is issued. This
indicates either the working or protection channel.
Note: There are a number of binary settings that are not generated by the
TN-1X. Other SDH equipment can generate these settings, however, and
the TN-1X recognises these.
The operational values for bits 1 to 4 of the K1 byte are shown in Table 4-91.
Table 4-91
K1 byte (bits 1 to 4) usage
Bits Value Request Type Description
1101 13 Signal Fail - high priority Condition Switch due to a signal fail (high
(see note) priority).
1100 12 Signal Fail - low priority Condition Switch due to a signal fail (low
priority). TN-1X does not generate
this.
1011 11 Signal Degrade - high priority Condition Switch due to BER conditions (high
priority). "
1010 10 Signal Degrade - low priority Condition Switch due to BER conditions (low
priority). TN-1X does not generate
this.
Note - A signal fail on the protection section will take priority over any forced request which would
cause an MSP switch from the working section to the protection section.
The operational values for bits 5 to 8 of the K1 byte are shown in Table 4-92.
Table 4-92
K1 byte (bits 5 to 8) usage
Bits Value Description
0010 - 1111 2 - 15 Other traffic channels. TN-1X does not generate this.
The K2 byte
The K2 byte carries status information:
• Bits 1 to 4 indicates the channel number being bridged. This is the number
of the channel being carried simultaneously on the protection channel.
• Bit 5 indicates whether 1+1 or 1:N architecture is in use.
Note: 1:N architecture is not currently supported by TN-1X.
• Bits 6-8 are mostly reserved for future use, though there are two values that
are used currently.
Note: There are a number of binary settings that are not generated by the
TN-1X. Other SDH equipment can generate these settings, however, and
the TN-1X recognises these.
The operational values for the K2 byte are shown in Table 4-93.
Table 4-93
K2 byte usage
Bits Bits Value Description
1111 - 0010 2 - 15 Other traffic channels. TN-1X does not generate this.
Evaluation of requests
Requests from the local and remote muxes are evaluated as follows:
• Bidirectional mode. The requests from the transmitted and received K1
bytes are compared to determine the highest priority request (see
Table 4-91). If a higher priority request is received, a reverse request is
transmitted to indicate this, and the request is implemented. An equal
priority with a lower channel number is handled in the same way.
• Unidirectional mode. The local and remote K1 bytes are not compared.
The local request is affected only by a change to the state of the local mux.
That is, a higher priority request occurs locally, or the current request
becomes invalid.
MSP alarms
The following new alarms are supported by the TN-1X in bidirectional
operation. These alarms will be cleared once expected behaviour is restored:
• MSP_Prot_Scheme_Mismatch. This is raised after 50 ms if there is a
difference between bit 5 in the sent and received K2 byte. This indicates
that the remote and local MSP mechanisms are configured for different
MSP architectures.
• MSP_Invalid_K_Bytes. This is raised if there is an invalid channel number
or an invalid request indicated in either of the received K bytes for longer
than 50 ms. In this instance, if the protection channel is in use, a signal fail
condition on the protection section occurs. As a result, an MSP protection
switch from the protection channel to the working channel occurs.
• MSP_Channel_Mismatch. This is raised if the K1 transmitted and K2
received channel numbers are different for longer than 50 ms. In this
instance, if the protection channel is in use, a signal fail condition on the
protection section occurs. As a result, an MSP protection switch from the
protection channel to the working channel occurs. This alarm will not be
raised if there is a signal fail on the protection section.
Note: The ‘MSP_Invalid_K_Bytes’ and ‘MSP_Channel_Mismatch’
alarms can also be raised if there is a mismatch in MSP modes used by
interworking equipment.
The MSP alarms listed above are always reported against the protection
channel. MS and RS alarms that relate to multiplexer protection channels are
always reported against the affected channel. All other alarms that relate to
multiplexer protection channels are reported against the working channel.
For details of the structure and usage of the K1 and K2 bytes, see “MSP
protocol” on page 4-122.
Note: The MSP LAPD settings on are ignored if LAPD is disabled for the
active port (see “Communications management” on page 4-6).
Note: This process should be performed on both the local and remote
multiplexers. Before this is performed, all protected traffic passing
between the multiplexers should be switched to one of the aggregate
channels.
Command details
The commands that access the multiplexer section protection functionality of
the TN-1X are shown in Figure 4-27, and are detailed in the tables that follow.
Figure 4-27
Config/MSp command hierarchy
Config
MSp
Assoc_with_prot
Disassoc_with_prot
Mode
Unidirectional
Bidirectional
K_byte_override
tx_K1_override
tx_K2_override
"
Request
Force_from
Manual_from
Lockout_p
Exercise
Release_all
Lapd_monitoring
Enable_non_active_sect
Disable_non_active_sect
View
STatus_view
Table 4-94
Config/MSp
Menu Item Shortcut Parameters Confirm Description
Note 1 - The optional ‘channel’ field can only take a value of ‘1’. If this is not supplied, it defaults to ‘1’.
Note 2 - If this field is not supplied, settings for all MSP ports are displayed.
Table 4-95
Config/MSp/Mode
Menu Item Shortcut Parameters Confirm Description
Table 4-96
Config/MSp/K_byte_override
Menu Item Shortcut Parameters Confirm Description
Note 2 - K byte overrides can be defined at any time, but are only used during unidirectional operation.
Table 4-97
Config/MSp/Request
Menu Item Shortcut Parameters Confirm Description
Note - If the protection section is in a signal fail condition, forced switches from the protection section,
and lockouts of the protection section will be attempted for up to 2.5 seconds. If the signal fail condition
does not clear in this time, the operation will then fail.
Table 4-98
Config/MSp/Lapd_monitoring
Menu Item Shortcut Parameters Confirm Description
Parameters "
The following parameters are used by the commands described above:
• The <SDH_port> parameter always identifies the physical port on an
STM-N aggregate or STM-1 tributary. The format for this is:
S<slot>-<port>
Autonomous events
The autonomous events associated with the above functionality are:
• When a successful MSP switch occurs:
975, <SDH_port>, MSP_switch_from=<SDH_port>,
MSP_switch_to=<SDH_port>
Where:
— SDH_port always refer to the SDH port for the protection channel.
— Act_Req is a description of the request that resulted in the switch.
— AR_Port is the port to which the actual request applies.
Reports
The reports generated by the above commands are listed below.
Config/MSp/View
The entries used by this command are listed below.
24,Multiplexer Section Protection Configuration
241,<SDH_port>, MSP_arch = 1p1, MSP_mode = <‘Uni’|’Bi’>,
MSP_reversion_mode = ‘Revertive’|’Non_revertive’>
242,<SDH_port>, K1_Byte_Override = <value>,
K2_Byte_Override = <value>,
Lapd_Monitoring_of_Non_Active_Sect =
<‘Enabled’|‘Disabled’>
243,MSP Group Members
244,<SDH_port>, Ch_no = <number>,
Protection_Section = <SDH_port>
For example:
24,Multiplexer Section Protection Configuration
241,S7-1, MSP_arch = 1p1, MSP_mode = Uni,
MSP_reversion = Non_revertive
242,S7-1, K1_Byte_Override = F0H, K2_Byte_Override = E0H,
Lapd_Monitoring_of_Non_Active_Sect = Enabled
243,MSP Group Members
244,S6-1, Ch_no = 1, Protection_Section = S7-1
;
Config/MSp/STatus_view
This report duplicates a status report on the Status View menu, and is detailed
in “View_status/MSp” on page 7-14.
"
To disable 1:1 tributary protection for a protection pair, the NE must not be "
using the tributary protection mechanism on the affected pair. If the protection
mechanism is in use, a manual switch back to either slot 2 or 9 is required
before the mechanism can be disabled.
Command details
The commands that access the manual tributary protection functionality of the
TN-1X are shown in Figure 4-28 below, and are detailed in the tables that
follow.
Figure 4-28
Config/tn1x_Card_Switch command hierarchy
Config
tn1x_Card_Switch
Enable
Disable
View
STatus_view
Table 4-99
Config/tn1x_Card_Switch
Menu Item Shortcut Parameters Confirm Description
Parameters
The following parameters are used by the commands described above:
• The <slot> parameter has two possible values:
— ‘S2’. This identifies the protection pair comprised of slots 2 and 4.
— ‘S4’. This identifies the protection pair comprised of slots 9 and 11.
Autonomous events
The autonomous events associated with manual tributary protection are listed
with the commands that perform the manual tributary protection switch (see
“Manually switching a 1:1 protected 34/45M tributary unit” on page 6-2).
Reports
The reports generated by the above commands are listed below.
Config/tn1x_Card_Switch/View
The entries used by this command are listed below.
66, Card Switch
661, <slot>, Standby_trib=<slot>
For example:
66, Card Switch
661, S2, Standby_trib=S4
661, S9, Standby_trib=S11
;
Config/tn1x_Card_Switch/STatus_view
This report duplicates a status report on the Status View menu, and is
described in “View_status/tn1x_Card_Switch” on page 7-15.
This command enables the user to configure and view the Punch-Through
parameters of the TN-1X.
Command details
The commands that configure the Punch-Through functionality of the TN-1X
are shown in Figure 4-29 below, and are detailed in the tables that follow.
Figure 4-29
Config/PunchThrough command hierarchy
"
Config
PunchThrough
Rate
Data_bits
Stop_bits
Parity
View
Table 4-100
Config/PunchThrough
Menu Item Shortcut Parameters Confirm Description
Table 4-100
Config/PunchThrough (continued)
Menu Item Shortcut Parameters Confirm Description
Note: Parameter options <slot_inst>, <port_inst>, external & CAT may be totally omitted on an NE that
contains only one RS-232 port.
Parameters
The following parameters are used by the commands described above:
• The <slot_inst> parameter has two possible values:
• The <port_inst> parameter
• The external parameter
• The CAT parameter
• The <baud_rate> parameter:
— Range = 300 - 19200 (or higher if the product reliably supports it)
— Default = 9600
• The <data_bits> parameter:
— Values = 7 or 8
— Default = 8
• The <stop_bits> parameter:
— Values = 1, 1.5 or 2
— Default = 1
• The <parity> parameter:
— Values = None, Odd, Even, Mark or Space.
— Default = None
Autonomous events
When a punch through session is initiated the following autonomous event is
generated
912, NE_Event=External punch through initiated,
Uname=<user_name>, User=<user>, <date>, <time>
The reason for providing this autonomous event is so that the Preside EC-1
Element Controller event log will record the start of the punch-through
session. This will mean that a systems administrator can track who has used
the punchthrough facility, in other words it is a security feature.
Reports
The reports generated by the above commands are listed below.
Config/PunchThrough/View
The entries used by this command are listed below.
135, Punchthrough Configuration
1351, <<slot_inst>|<port_inst>|external|CAT>, Rate = <baud
"
rate>, Data bits = <data_bits>, Stop bits = <stop_bits>,
Parity = <parity>
;
For example:
135, Punchthrough Configuration
1351, CAT, Rate=9600, Data_bits=8, Stop_bits=1, Parity=None
;
Overided
Lucent has implemented the use of the J2 byte in a way that is different than
Nortel Networks. Configuration of an override byte overcomes this problem.
Command details
The commands that access the override functionality of the TN-1X are shown
in Figure 4-30, and are detailed in Table 4-101.
Figure 4-30
Config/oVeride command hierarchy
Config
oVerride
J2
View
Table 4-101
Config/oVeride
Menu item Shortcut Parameters Confirm Description
Parameters
The following parameters are used by the commands described above:
• The <PDH_port > parameter identifies a 34/45M PDH tributary port. PDH
ports are detailed in “PDH ports” on page 2-4.
• The <hex_value> parameter is a hexadecimal value between 00 and FF.
• The optional [mask] value is used to mask out the bits of the override byte
which should not be overridden:
— ‘0’ bit in the mask means override
— ‘1’ bit in the mask means do not override
The [mask] value defaults to 0x00 if the mask parameter is omitted. A
‘NULL’ value turns off the overide and normal path trace functionality.
Autonomous events
There are no autonomous events associated with the above commands.
Reports
The reports generated by the above commands are listed below:
Config/oVerride/View
This allows the user to view the override status on the port(s) specified in the
single parameter
An example output is listed below:
40, Overrides
401, S2-1, Override = OFF, Mask = 00H
"
401, S2-2, Override = 00H, Mask = 00H
401, S2-3, Override = A7H, Mask = 0AH
The user can view this information about a specific port, slot and all ports that
currently have path trace capability.
end of chapter
Diagnostic menu 5-
The diagnostic menu enables the user to establish loopbacks on specific
tributary and aggregate ports, and to view loopback settings. The structure of
the configuration menu is shown in Figure 5-1.
Figure 5-1
Diagnostic menu structure
Diagnostic
Loopback #
set_Remote
set_Local
Clr
View
In the above figure, items that have a submenu are shown in bold. Shortcuts
for individual menu items are shown in upper case (see “Command shortcuts”
on page 2-2).
Loopbacks
Loopbacks are one method for identifying faulty tributary or aggregate plug
in units. A loopback enables a signal to be routed back towards its source,
either before or after it is processed by a particular plug in unit. By
implementing loopbacks at different places along a signal’s path, a faulty unit
may be identified.
Figure 5-2
Overview of loopbacks
STM-1 Signal
KEY
Remote loopback*
Aggr, Tx Aggr, Rx STM-1
Local loopback* Aggregate
Unit
SIRPIT Serial In Receive
Parallel in Transmit
Payload Manager
SIRPIT
SIRPIT
34/45M (VC-3) Tributary Unit
Mux/Demux
STM-1 Signal 2048 kbit/s Signals 34368 kbit/s Signals 34368 Kbit/s Signal
* Note: For previous releases of the TN-1X, remote loopback = ‘loop-to-line’, and local loopback = ‘loop-to-mux’.
CAUTION
Loss of synchronisation
Establishing a local loopback for a tributary that is the active
synchronisation source will result in a loss of synchronisation.
CAUTION
Disconnection of NE and Preside EC-1 Element Controller
Looping back an aggregate channel may disconnect the comms
path between the remote NE and the Preside EC-1 Element
Controller.
Command details
The commands that access the loopback functionality of the TN-1X are shown
in Figure 5-3, and detailed in Table 5-1.
Figure 5-3
Diagnostic/Loopback menu structure
Diagnostic
Loopback
set_Remote
set_Local
Clr
View
Table 5-1
Diagnostic/Loopback
Menu item Shortcut Parameters Confirm Description
Parameters
The following parameters are used by the commands described above:
• The <SDH_port> parameter identifies the physical port on an STM-N
aggregate or STM-1 tributary. The format for this is:
S<slot>-<port>
Autonomous events
The events generated by the described commands are:
• When the status of a loopback changes:
972, <SDH_port|PDH_port>, Loopback = <‘Local’|‘Remote’>,
Status = <‘active’|‘not_active’>, Ulabel = <label>,
date, time
Reports
The reports generated by the diagnostic command are detailed below.
Diagnostic/Loopback/View
The report for the view command uses the following entries:
31, Loopback Configuration
311, <SDH_port|PDH_port>, Loopback = <‘Local’|‘Remote’>
For example:
31, Loopback Configuration
311, S6-1, Loopback = Local
311, S2-1, Loopback = Remote
311, S9-1, Loopback = Local
;
end of chapter
Maintenance menu 6-
The maintenance menu allows the user to perform a number of manual
operations that affect the operation of the TN-1X.
Figure 6-1
Maintenance menu structure
Maint
Operations
perF_mon
early_Termination
15M
24H
Clock
Both
$
Read
Align
Pps
manual_switch_to_A
manual_switch_to_B
Card_Switch
Force_from
Clear_switch
Figure 6-1 shows the hierarchical structure of the menu tree. Each menu item
in bold has a submenu. The upper case letters are the shortcuts for individual
menu items.
Maint <M>
This command enables the user to terminate a performance monitoring period
prematurely, reset the mux clock, perform a manual path protection switch,
and perform a manual tributary protection switch.
Command details
The commands that access the TN-1X functionality described above are
detailed in the tables below.
Table 6-1
Maint/Operations/perF_mon/early_Termination
Table 6-2
Maint/Operations/Clock
Table 6-4
Maint/Card_Switch
Parameters
The following parameters are used by the commands described above:
• The <date> parameter represents the current date, and has a format of ‘DD/
MM/YYYY’. For example, 01/12/1996.
• The <time>parameter represents the current time, and has a format of
‘HH:MM:SS’. For example, 14:03:59.
• The <PDH_port> parameter identifies a PDH tributary port which is part
of an established protected connection. This takes the following syntax:
S<slot>-<port>
Autonomous events
The autonomous events generated by the commands described are listed
below.
• If the clock time/date is changed:
952, Old_date = <old_date>, Old_time = <old_time>,
User = <user>, <new_date>, <new_time>
Reports
The reports for these commands are described below.
Maint/Operations/Clock/Read
The report for this command uses the following entries:
59, NE time
591, NE_date = <date>, NE_time = <time>
For example:
59, NE time
$
591, NE_date = 31/05/96, NE_time = 13:24:27
;
end of chapter
Figure 7-1
View_status menu structure
View_status
ACtion_log
Alarm_Log
Active_Alarms
PerF_log
Perf_Intermediate
RS_ne
Rs_Oof
MS_ne
Au_pJe
%
HP_ne
Hp_Fe
Tu_pJe
LP_ne
Lp_Fe
Ppi_Cv
Ppi_cRc
24H_PerF_log
Uat_PerF_log
Sync_Source_status
VC_path_status
hp_Path_Trace_status
Lapd_Link_status
Trib_Protect
Payman_Protect
MSp
tn1x_Card_Switch
Figure 7-1 shows the hierarchical structure of the menu tree. Each menu item
shown in bold has a submenu. The uppercase letters are the shortcuts for
individual menu items.
View_status <V>
This command enables the user to display reports for alarms, logs, and a
number of TN–1X settings.
Performance logs
Performance logs provide a summary of the errors that occur over a
performance monitoring period (see “Performance monitoring” on page
4-33). Logs are numbered sequentially from 1, though the latest log can
always be accessed with a log number of -1. When a performance log is
requested, the required data is retrieved from the performance results stored
on the NE. This data is then formatted and displayed as a performance log.
The number of performance logs that the TN-1X can store is variable, as it
depends upon the size of individual logs. When more performance
monitoring points are enabled, the resulting logs are larger.
Where:
— <report_no> is the report number.
— <report_status> is a two letter status. These are listed in Table 7-1.
Table 7-1
Update log report status codes
Report status
Description
First Second
Most reports are denoted ‘NA’. The first report after a mux reboot is
‘FA’. A report delivered after an early termination is ‘NC’.
— <assessed_seconds> is the actual period of assessment.
— <ES> is the Errored Seconds count.
— <SES> is the Severely Errored Seconds count.
— <BBE> is the Background Bit Errors count.
— <UAS> is the Unavailable Seconds count.
— <PM_Basis> is either ‘P’ (BIP) or ‘B’ (Block).
— <AS> is the number of Assessed Seconds.
— <traffic_type> identifies the nature of the affected unit or traffic (see
Table 2-6 on page 2-12).
— <label> is the user label.
— The date and time parameters are the timestamping for the report.
Note: During periods of Unavailable Time (UAT), the ES, SES and BBE
statistics are not recorded. The start of UAT is indicated by ten consecutive
SESs. Until this ten seconds is complete, however, it is unclear whether the
ES, SES and BBE figures accumulated need to be recorded. As a result,
there is a ten second delay in all performance monitoring timestamps.
• The RS-OOF, AU-PJE and TU-PJE PMPs use the following body lines:
437,Instance,PMP,Total_count,-ve_count,AS,Traffic,
User_label
438,<PDH_port|SDH_AU4|SDH_port>,<PMP>,<total_count>,
<neg_count>,<assessed_seconds>,<traffic_type>,
<user_label>
Where:
— <report_status> is a two letter status. These are listed in Table 7-1.
— <total_count> is the number of pointer adjustments, both positive and
negative.
— <neg_count> is the number of negative pointer adjustments.
— <assessed_seconds> is the actual period of assessment.
— <traffic_type> is the hardware to which the log line applies (see
Table 2-6 on page 2-12).
— <user_label> is the relevant user label.
Where:
— <report_status> is a two letter status. These are listed in Table 7-1. %
— <traffic_type> is the hardware to which the log line applies (see
Table 2-6 on page 2-12).
— <user_label> is the relevant user label.
Command details
The commands that access the view status functionality of the TN-1X are
shown in the tables below.
Table 7-2
View_status
Menu Item Shortcut Parameters Confirm Description
Table 7-3
View_status/Perf_Intermediate
HP_ne V PI HP
Hp_Fe V PI HF
Tu_pJe V PI TJ PDH_port
LP_ne V PI LP
Lp_Fe V PI LF
Ppi_Cv V PI PC
Ppi_cRc V PI PR
Parameters
The following parameters are used by the commands described above:
• The <SDH_aggr_payload> parameter identifies an SDH aggregate
payload. The format for this is:
S<slot>-<port>-J<AU4>-K<KLM>
• The <PDH_port> parameter identifies a PDH tributary port. This takes the
following syntax:
S<slot>-<port>
Autonomous events
There are no autonomous events that relate to the view status functionality.
Reports
The reports generated by the commands described are listed below.
View_status/Alarm_Log
The entries used by this command are listed below.
71, Alarm Log
7XX, <alarm>, <instance>, <alarm_status>, <alarm_severity>,
<alarm_category>, <unique_number>, <traffic_type>,
<user_label>, <date>, <time>
Where:
• <alarm> is the alarm event.
• <instance> is the affected unit or traffic. These are identified by a slot, port,
or payload reference, and use the same syntax as the equivalent command
parameters (see “Parameters” on page 2-4).
Note 1: TAMs are identified by slot numbers. The TAMs for slot 2 are
identified by S16 and S17, the TAMs for slot 4 are S19 and S20, the TAMs
for slot 9 are S24 and S25, and the TAMs for slot 11 are S27 and S28.
Note 2: The three Multiplexer Section Protection (MSP) alarms are always
reported against the protection channel. MS and RS alarms that relate to
MSP channels are always reported against the affected channel. All other
alarms related to MSP channels are reported against the working channel.
• <traffic_type> identifies the traffic type (see Table 2-6 on page 2-12).
• <alarm_status> is Present or Cleared.
• <alarm_severity> is (C)ritical, (M)ajor, (m)inor, or Disconnect (X).
• <alarm_category> is (P)rompt, (D)eferred, (I)nstation, or (W)arning.
• <unique_number> is between 1 and 65535.
• <user_label> is the fifteen character user label.
• <date> is the date on which the alarm was generated.
• <time> is the timestamp for the alarm.
For example:
70, Alarm Log
711,INT-NE-Config_bp_mismatch,S14,Present,C,P,0010,SRC,,
13/03/1997,08:30:46
711,INT-NE-Config_Corrupt,S14,Present,C,P,0011,SRC,,
13/03/1997,08:30:46
;
View_status/ACtion_Log
The entries used by this command are listed below.
70, Action Log
7XX, <event>, <date>, <time>
Where:
• <event> is the non-alarm event.
For example:
70, Action Log
761,Event=Login, User=oper1, Ident=jfk, 13/03/1997,08:33:45
761,Event=Disconnect, User=oper1, Ident=jfk, 13/03/1997,
08:58:43
;
View_status/Active_Alarm
The entries used by this command are listed below.
51, Alarm Status
511, <alarm>, <instance>, <alarm_status>, <alarm_severity>,
<alarm_category>, <unique_number>, <traffic_type>,
<user_label> %
Where:
• <event> is the alarm event.
• <instance> is the affected unit or traffic. These are identified by a slot, port,
or payload reference, and use the same syntax as the equivalent command
parameters (see “Parameters” on page 2-4).
Note: TAMs are identified by slot numbers. The TAMs for slot 2 are
identified by S16 and S17, the TAMs for slot 4 are S19 and S20, the TAMs
for slot 9 are S24 and S25, and the TAMs for slot 11 are S27 and S28.
For example:
51, Alarm Status
511, HP-TIM, S7-1-J1, present, C, X, 178, A-1o, Cust_1
511, PPI-LOS, S2-1, present, C, X, 369, 2M75, Cust_1
511, PPI-LOS, S2-3, present, C, X, 371, 2M75, Cust_1
;
View_status/<performance log>
Performance logs use the entries described in “Performance logs” on page 7-3.
A typical 15 minute performance log is shown below:
47,Performance Monitoring Log
431,Status,Log_type,Report,Duration,End_Date,End_Time,Start_Date,Start_Time
432,NA,15M,9853,900,19/05/1997,08:30:00,19/05/1997,08:15:00
433,Instance,PMP,ES,SES,BBE,UAS,Basis,AS,Traffic,User_label
434,S2-1,LP,0,0,0,0,p,901,2M75,S2-1
434,S2-2,LP,0,0,0,0,p,901,2M75,S2-2
434,S2-3,LP,0,0,0,0,p,901,2M75,S2-3
434,S2-4,LP,0,0,0,0,p,901,2M75,S2-4
434,S6-1,RS,0,0,0,0,p,901,A-1o,S6-1
434,S6-1,MS,0,0,0,0,p,901,A-1o,S6-1
434,S6-1-J1,HP,0,0,0,0,p,901,A-1o,
434,S6-1-J1,HP-FE,0,0,0,0,p,901,A-1o,
434,S7-1,RS,0,0,0,0,p,901,B-1e,S7-1
434,S7-1,MS,0,0,0,0,p,901,B-1e,S7-1
434,S7-1-J1,HP,0,0,0,0,p,901,B-1e,
434,S7-1-J1,HP-FE,0,0,0,0,p,901,B-1e,
437,Instance,PMP,Total_count,-ve_count,AS,Traffic,User_label
438,S2-1,TU-PJE,31,0,901,2M75,S2-1
438,S2-2,TU-PJE,31,0,901,2M75,S2-2
438,S2-3,TU-PJE,31,0,901,2M75,S2-3
438,S2-4,TU-PJE,31,0,901,2M75,S2-4
438,S6-1,RS-OOF,0,0,901,A-1o,S6-1
438,S7-1,RS-OOF,0,0,901,B-1e,S7-1
;
View_status/Sync_Source_status
The entries used by this command are listed below.
55, Sync Source Status
551, <SDH_port|PDH_port|‘INT’|‘EXT’>,
Sync_src_hierarchy_level = <‘1’|‘2’|‘3’|‘4’>,
Sync_src_state = <‘Standby’|‘Failed’|‘Reference’>,
actual_ql = <QL_value>, derived_ql = <QL_value>,
no_revert_flag = ‘Off’
552, Fail_reason=<‘slot_not_active’|‘no_sync’|
‘trib_sync_line_fail’|‘ql_do_not_use’>
554, current_hierarchy_level = <‘1|‘2’|‘3’|‘4’|‘5’>,
current_sync_src = <SDH_port|PDH_port|’INT’|’EXT’>
Where:
•
•
<SDH_port> is an SDH port which is a source of synchronisation.
<PDH_port> is a PDH port which is a source of synchronisation.
%
• <QL_value> is a Quality Level value between 1 and 15.
For example:
55,Sync Source Status
551,INT,SS_hierarchy_level=4,SS_state=Standby
551,EXT,SS_hierarchy_level=3,SS_state=Standby
551,S6-1,SS_hierarchy_level=1,SS_state=Failed,
actual_ql=unknown
552,S6-1, fail_reason=slot_not_active
551,S7-1,SS_hierarchy_level=2,SS_state=Reference,
actual_ql=15551,S2-1, SS_hierarchy_level=4,
SS_state=Standby
554,Current_hierarchy_level=2,Current_sync_src=S7-1
;
View_status/VC_path_status
The report for this command uses the following entries:
56, VC Path status
561, <PDH_port>, Path_src = <SDH_aggr_payload>
Where:
• <PDH_port> is the PDH destination of a drop connection.
• <SDH_aggr_payload> is the STM-N aggregate source of the connection.
For example:
56, VC Path status
561, S2-1, Path_src = S6-1-J2-K121
561, S2-2, Path_src = S6-1-J2-K122
561, S2-3, Path_src = S6-1-J2-K123
561, S2-4, Path_src = S6-1-J2-K131
561, S2-5, Path_src = S6-1-J2-K132
561, S2-6, Path_src = S6-1-J2-K133
;
View_status/hp_Path_Trace_status
The entries used by this command are listed below:
58, Received Path Trace Status
581, <SDH_AU4>, Rx_state = <‘PT_OK’|‘Mismatch’|
‘Misaligned’>,Path_trace_rx = <trace_string>,
Rx_crc = <trace_CRC>
581, <SDH_AU4> Undetermined
Where:
• <SDH_AU4> is the high-order payload with which the path trace value is
associated.
• <trace_string> is the received path trace string.
• <trace_CRC> is the received cyclic redundancy check.
For example:
58, Received Path Trace Status
581, S6-1-J1, Rx_state = PT_OK, Path_trace_rx = From_C1,
Rx_crc = 64H
581, S7-1-J1, Rx_state = PT_OK, Path_trace_rx = To_C1,
Rx_crc = 64H
;
View_status/Lapd_Link_status
The report for this command uses the following entries:
62, LAPD Link Status
621, <SDH_port>, Lapd_link_state_RS =
<‘Connected’|‘Failed’|‘Off’>
621, <SDH_port>, Lapd_link_state_MS =
<‘Connected’|‘Failed’|‘Off’>
622, <SDH_port>, Lapd_link_current_auto_mode_RS =
<‘Network’|‘User’>
622, <SDH_port>, Lapd_link_current_auto_mode_MS =
<‘Network’|‘User’>
623, <SDH_port>, Lapd_link_service_RS = <‘On’|‘Off’|‘Auto’>
623, <SDH_port>, Lapd_link_service_RS = <‘On’|‘Off’|‘Auto’>
;
Where:
• <SDH_port> is the STM-N aggregate, or STM-1 tributary port to which
the LAPD settings apply.
For example:
62, LAPD Link Status
621, S6-1, Lapd_link_state_RS = Connected
622, S6-1, Lapd_link_current_auto_mode_RS = Network
623, S6-1, Lapd_link_service_RS = Auto
621, S7-1, Lapd_link_state_MS = Off
622, S7-1, Lapd_link_current_auto_mode_RS = Network
623, S7-1, Lapd_link_service_RS = Auto
621, S9-1, Lapd_link_state_MS = Off
622, S9-1, Lapd_link_current_auto_mode_RS = Network
623, S9-1, Lapd_link_service_RS = Auto
%
;
View_status/Trib_Protect
The entries used by this command are listed below.
566, Trib Protection Status
567, <slot>, Protected_trib = <‘slot’|‘no_card_protected’> ,
Status = <‘Protecting’|‘WTR’>
;
Where:
• <slot> identifies the card whose traffic is being protected by the 1:N
protection trib in slot 3. This can be S2, S4, S9 or S11.
For example:
566, Trib Protection Switching Status
567, S3, Protected_trib = S2, Status = WTR
;
View_status/Payman_Protect
The entries used by this command are listed below.
564, Payload Manager Switching Status
565, Active_PM = <slot>
Where:
• <slot> identifies the slot in which the active payload manager is located.
For example:
564, Payload Manager Switching Status
565, Active_PM = S5
View_status/MSp
The entries used by this command are listed below.
64, Multiplexer Section Protection Status
641, <SDH_port>, MSP_switch_from = (<SDH_port>,
Ch_no=<value>) |’None’
642, <SDH_port>, Act_Req = <‘K1_No_Request’|
‘K1_Do_Not_Revert’|’K1_Reverse_Req’|’K1_Exercise’|
‘K1_Wait_To_Restore’|’K1_Manual_Switch’|’K1_SD_Low’|
‘K1_SD_High’|’K1_SF_Low’|’K1_SF_High’|
‘K1_Forced_Switch’|’K1_Lockout’>,
AR_Port = <port_inst>, AR_Orig = ‘Local’|’Remote’
643, <SDH_port>, Pend_Req = <‘K1_No_Request’|
‘K1_Do_Not_Revert’|’K1_Reverse_Req’|’K1_Exercise’|
‘K1_Wait_To_Restore’|’K1_Manual_Switch’|’K1_SD_Low’|
‘K1_SD_High’|’K1_SF_Low’|’K1_SF_High’|
‘K1_Forced_Switch’|’K1_Lockout’>,
PR_Port = <SDH_port>, PR_Orig = <‘Local’|’Remote’>
Where:
• <SDH_port> is the STM-N aggregate, or STM-1 tributary port to which
the LAPD settings apply.
For example:
64,Multiplexer Section Protection Status
641,S7-1, MSP_switch_from = S6-1, Ch_no = 1
642,S7-1, Act_Req = K1_Forced_Sw, AR_Port = S6-1,
AR_Orig = Local
643,S7-1, Pend_Req = K1_SD_High, PR_Port = S6-1,
PR_Orig = Local
;
View_status/tn1x_Card_Switch
The entries used by this command are listed below.
67, Card Switch Status
671, <slot>, Card_Switch=<‘ENABLED’|‘DISABLED’>,
Active_Trib=<slot_inst|‘None’>
For example:
67, Card Switch Status
671, S2, Card_Switch=ENABLED, Active_Trib=S4
671, S9, Card_Switch=ENABLED, Active_Trib=S11
;
end of chapter
Session menu 8-
The session menu enables the user to view and configure many aspects of the
current User Interface (UI) session.
Note: Changes made within this menu exist for the current session only,
and revert to defaults for each new user.
The menu hierarchy for the session functionality of the TN-1X is shown in
Figure 8-1, and detailed in the sections that follow.
Figure 8-1
Session menu structure
Session
View_other_users
Inventory
Inv_Clevel
Get_mux_status
Unsolicited
oN
Off
display_Alarms_only
display_oThers_only
Mode
View
&
suppress_Menu_and_Warning
suppress_Warning
Full_dialogue
View
Auto_logout
Set
View
misC
Echo_oN
Echo_Off
View
Punchthrough
External
Kill_Ext
View
Each menu item in bold type has a submenu. The upper case letters shown are
the shortcuts for individual menu items.
Session <S>
This command enables the user to view and configure settings for the current
UI session.
Note: Changes made within this menu exist for the current session only,
and revert to defaults for each new user.
Session characteristics
There are a number of aspects of the current UI session that can be viewed and
changed by the user. These are:
• Viewing other users on the mux. There are a four sessions that are available
for mux users to log into (see “Accessing the UI application software” on
page 3-1). The user can request a report to show who is currently logged
into these sessions.
• Viewing mux inventory information. The user can request a report that
identifies several hardware aspects of the plug-in units and TAMs of the
TN-1X.
• Viewing control level information. The user can request a report that lists
the control levels of a plug-in unit within the TN-1X.
• Viewing mux status information. The user can request a report that
identifies software aspects of the TN-1X. This includes information such
as the mux clock settings, software versions, loopbacks, and active alarms.
This information is always displayed when a user logs into the TN-1X (see
“Logging in” on page 3-1).
• Controlling autonomous (unsolicited) messages. Unsolicited messages are
generated by the TN-1X and sent to all logged in users. These messages
divide into alarms and events (see “Autonomous messages” on page 2-11).
The user can configure whether alarms and events are displayed.
• Controlling menus and confirmations. The user interface assists the
selection of options by displaying possible items as a menu. Once a
selection is made by the user, a number of options request confirmation
before they will execute. The user can configure whether menus and
confirmations are used.
• Controlling the automatic logout period. Inactive TN-1X user interface
sessions for some user classes will terminate automatically after fifteen
minutes (see “Accessing the UI application software” on page 3-1). This
default period can be adjusted to between one and sixty minutes by the
user. A value of zero inhibits automatic logout.
• Controlling the echoing of characters back to the local terminal port. Echo
off means that entered characters are not echoed back to the terminal, while
echo on (default) means that they are echoed.
• Controlling Punch-Through session.
Note: The Punch-Through feature is for future use and is not a supported
feature at Release 9.
Command details
The commands that access the session functionality of the TN-1X are shown
the tables below.
Table 8-1
Session
Table 8-3
Session/Mode
Table 8-4
Session/Auto_logout
Set SAS logout_time No Set the auto logout idle time for the
current user for this session, where:
Range: 0 to 60 minutes.
Step: 1 minute.
Default: 15 minutes.
0 inhibits auto logout.
Table 8-5
Session/misC
Table 8-6
Session/Punchthrough
Note: Parameter options <slot_inst>, <port_inst>, external & CAT may be totally omitted on an NE
that contains only one RS-232 port.
Parameters
The following parameters are used by the commands described above:
• The <logout_time> parameter is a number between 0 and 60. The
<logout_time> represents the number of minutes before automatic logout
will occur. A <logout_time> value of zero inhibits the auto logout feature.
Responses
There are no responses to invalid actions for the described commands.
Autonomous events
There are no autonomous events associated with the described commands.
Reports
The reports are of the format shown below:
&
Session/View_other_users
The entries used by this command are listed below.
52, Open Sessions
521, Uname = <user_name>, User = <user>
Where:
• <user_name> is the login name of the user. This will be ‘viewr’, ‘oper1’,
‘oper2’ or ‘nortl’.
• <user> is the identification ID provided at login.
For example:
52, Open Sessions
521, Uname = oper1, User = mark
521, Uname = oper2, User = jim
;
Session/Inv_Clevel
The entries used by this command are listed below.
534, Control Level
535, <slot>, cl_entry = <entry_no>, clevel = <control_level>
Where:
• <slot> the slot specified for the report.
• <entry_no> is the entry number for the plug in unit in the specified slot.
• <control_level> is a control level for the plug in unit in the specified slot.
For example:
534, Control Level
535, S2, cl_entry = 1, clevel = 1
535, S2, cl_entry = 2, clevel = 4
535, S2, cl_entry = 3, clevel = 5
535, S2, cl_entry = 4, clevel = 6
;
Session/Inventory
The entries used by this command are listed below.
53, Inventory
531, S0, Address = <address>
532, <slot>, NTPEC = <code>, Card_type = <card_type>,
Serial_no = <serial_no>
533, <slot>, Manf_date = <manf_date>,
Chksum = <‘Valid’|‘Invalid’>
Where:
• <slot> identifies the slot a specific card is in. The backplane is nominally
regarded as being slot zero (S0).
• <address> is the address of the backplane.
• <code> is an order code for the plug-in unit or TAM. Typically, this is an
eight character code. Where thirteen character codes are used, the first five
characters are omitted. That is, 25UJU00750GVA becomes 00750GVA.
Newer cards will have the highest PCS level on the card appended to this
code as a two digit suffix. For example, the NTKD17AB TAM with a PCS
level of 1 has a code of ‘NTKD17AB01’.
• <card_type> identifies the type of the card.
• <serial_no> is the serial number of the card.
• <manf_date> is the date of manufacture for the card, format WWYY. For
example, ‘2398’.
• <checksum> indicates whether the card’s checksum is valid or invalid.
For example:
53,Inventory
531,S0, Address=000075403a43
532,S0, NTPEC=00750GWV, Card_type=BP_R2.5
&
532,S1, NTPEC=NTKD13AA, Card_type=ICC-V2_NUI_13AA
532,S2, NTPEC=NTKD16AA, Card_type=34_45M-vc3_data_16AA
532,S4, NTPEC=NTKD16AA, Card_type=34_45M-vc3_data_16AA
532,S5, NTPEC=NTKD10AA, Card_type=Payload_man-mp_10AA
532,S6, NTPEC=00750HWF, Card_type=STM_1_Agg-opt_HWF
532,S7, NTPEC=00750GSA, Card_type=STM_4_Agg-opt_GSA
532,S8, NTPEC=NTKD10AA, Card_type=Payload_man-mp_10AA
532,S9, NTPEC=00750HVT, Card_type=2M_Trib-75ohm_HVT
532,S12, NTPEC= , Card_type=PSU
532,S13, NTPEC= , Card_type=PSU
532,S14, NTPEC=00750GXD, Card_type=SRC
532,S17, NTPEC = NTKD17AA01, Card_type = 34/45M_TAM,
Serial_no = ,
532,S20, NTPEC = NTKD17AB01, Card_type = 34/45M_TAM_PROT,
Serial_no = ,
532,S24, NTPEC = NTKD14AA170, Card_type = V2_TAM-75ohm,
Serial_no = ,
532,S25, NTPEC = , Card_type = Undefined, Serial_no = ,
Session/Get_mux_status
The entries used by this command (in order) are listed below.
59, NE Time
591, NE_date = <date>, NE_time = <time>
Where:
• <SDH_port> is the SDH port to which a loopback applies.
• <PDH_port> is the PDH port to which a loopback applies.
• <version> is a software version number.
• <alarm> is the alarm event.
• <instance> is the affected unit or traffic. These are identified by a slot, port,
or payload reference, and use the same syntax as the equivalent command
parameters (see “Parameters” on page 2-4).
• <alarm_status> is Present or Cleared.
• <alarm_severity> is (C)ritical, (M)ajor, (m)inor, or Disconnect (X).
• <alarm_category> is (P)rompt, (D)eferred, (I)nstation, or (W)arning.
• <traffic_type> identifies the nature of the affected unit or traffic (see
Table 2-6 on page 2-12).
• <unique_number> is between 1 and 65535.
• <user_label> is the fifteen character user label.
• <date> is the date on which the alarm was generated.
• <time> is the timestamp for the alarm.
For example:
59,NE Time
591,NE_date=09/05/1997,NE_time=09:57:39
53,Inventory
531,S0, Address=000075403a43
532,S0, NTPEC=00750GWV, Card_type=BP_R2.5
532,S1, NTPEC=NTKD13AA, Card_type=ICC-V2_NUI_13AA
532,S2, NTPEC=NTKD16AA, Card_type=34_45M-vc3_data_16AA
532,S4, NTPEC=NTKD16AA, Card_type=34_45M-vc3_data_16AA
532,S5, NTPEC=NTKD10AA, Card_type=Payload_man-mp_10AA
532,S6, NTPEC=00750HWF, Card_type=STM_1_Agg-opt_HWF
532,S7, NTPEC=00750GSA, Card_type=STM_4_Agg-opt_GSA
532,S8, NTPEC=NTKD10AA, Card_type=Payload_man-mp_10AA
532,S9, NTPEC=00750HVT, Card_type=2M_Trib-75ohm_HVT
532,S12, NTPEC= , Card_type=PSU
532,S13, NTPEC= , Card_type=PSU
532,S14, NTPEC=00750GXD, Card_type=SRC
532,S17, NTPEC = NTKD17AA01, Card_type = 34/45M_TAM,
Serial_no = ,
532,S20, NTPEC = NTKD17AB01, Card_type = 34/45M_TAM_PROT,
Serial_no = ,
532,S24, NTPEC = NTKD14AA170, Card_type = V2_TAM-75ohm,
Serial_no = ,
532,S25, NTPEC = , Card_type = Undefined, Serial_no = ,
52,Open Sessions
521,User=nortl,Ident=mark
Session/Unsolicited/View
The entries used by this command are listed below.
35, Display Configuration for Current Session
351, Display_alarms = <‘On’|‘Off’>,
Display_others = <‘Off’|‘On’>
For example:
35, Display Configuration for Current Session
351, Display_alarms = On, Display_others = Off
;
Session/Mode/View
The entries used by this command are listed below.
523, Dialogue Mode
524, Session_mode = <‘Full_dialogue’|‘Suppress_warnings’|
‘Suppress_menu_and_warning’>
For example:
523, Dialogue Mode
524, Session_mode = Full_dialogue
;
Session/Auto_logout/View
The entries used by this command are listed below.
38, Auto Logout Time for Current Session
381, Auto_logout_time(minutes) = <minutes>
For example:
38, Auto Logout Time for Current Session
381, Auto_logout_time(minutes) = 20
;
Session/misC/View
The entries used by this command are listed below.
523, Local Terminal Echo
524, Local_terminal_echo=<‘On’|‘Off’>
For example:
523, Local Terminal Echo
524, Local_terminal_echo=On
;
Session/Punchthrough/View
The entries used by this command are listed below.
295, Punchthrough Sessions
2951,Uname=<user_name>,User=<user>,<External|Internal>,
Target=<<slot_inst>|<port_inst>|external|CAT>,
Start_date=<date>,Start_time=<time>
Where:
• <user_name> is the login name of the user.
For example:
295, Punchthrough Sessions
2951, Uname=ec_se, User=Wu, External, Target=CAT,
Start_date=02/01/00, Start_time= 05:25:18
;
In the event that multiple punch-through sessions are active, line 2951 is
repeated as often as needed.
end of chapter
&
Administration menu 9-
The administration menu enables the user to perform a number of processes
relating to application software, the configuration table, and user
management. The menu is shown in Figure 9-1 below.
Figure 9-1
Administration menu structure
Admin
Sw
DoWnload
Abort_Download
Switch_to_Loaded
Switch_to_Original
Warm_Restart
Cold_Restart
CoMmit
BackOut
CoPy
View
Cnfg_tbl
BackUp
REstore
Switch_to_Original
Switch_to_Restored
CoMmit
BackOut
Impose_Config
DeFault
Force_Detached
'
View
User
change_Pswd
Bchange_pswd
Secure
Figure 9-1 shows the hierarchical structure of the menu tree. Each menu item
shown in bold has a submenu. The upper case letters are the shortcuts for
individual menu items.
ATTENTION
The internal bus of the TN-1X is mapped differently at R9 than at earlier
releases. While this does not affect the operation of current connections,
future connections may not benefit from improved Release 9 performance
and may also generate traffic hits to existing connections as a result of adding
new connections. Customers should refer to Engineering Bulletin -
Connections Recommendations SDH_E155 for advice on how to proceed
after upgrade This will be dependant on the previous release level & traffic
configuration.
Refer to “Defragmenting the TN-1X internal bus” on page 4-84 for details of
this operation.
Figure 9-2
An overview of the software download mechanism
New software
available
Test new
software
Is new Yes
software During normal operation, it is important
OK? that both banks contain the same software.
If these are different, this can interfere with
No the operation of configuration functions.
Backout
Commit to new
software
both banks is the same version.
'
Finish
Software status
There are five states associated with the software banks of the TN-1X:
• Stable. Both software banks contain the same version of software.
• Ready_to_activate. New software has been downloaded, and this is in the
inactive bank.
• Ready_to_commit. New software has been downloaded, and this is in the
active bank.
• Download_in_progress. Software is downloading to the inactive bank.
• Checksum_bank. The download was aborted, or a software bank has been
corrupted. New software must be downloaded, or the active software must
be copied to the inactive bank.
The current application software status is displayed by the ‘Admin/Sw/View’
command (see “Reports” on page 9-15).
Step Action
—end—
Procedure 9-2
Downloading application software from the CAT
Step Action
Procedure 9-2
Downloading application software from the CAT (continued)
Step Action
—continued—
Procedure 9-2
Downloading application software from the CAT (continued)
Step Action
7 From the ‘Transfer’ menu of the HyperTerminal application, select the ‘Send
File’ option. The ‘Send File’ dialogue is displayed.
8 Select the ‘Xmodem’ option from the ‘Protocol’ pulldown menu.
9 Locate and select the new application software from the CAT’s file system.
10 Select the OK button. The ‘Xmodem file send’ dialogue is then displayed. This
dialogue contains a progress bar showing the filename, the progress of the
file transfer and a ‘Cancel’ button. The download may take between 30 to 40
minutes, depending on the loadimage size.
Note: It is not possible to issue any commands to the TN-1X while a software
download is in progress.
11 Once the download is complete, the new software is in the inactive software
bank.
ATTENTION
The first command processed via HyperTerminal after a software
download has completed will fail.
—end—
Once the new application software is loaded, the original application software
is in the active software bank, and the new software is in the inactive bank.
These versions can both be accessed until one of them is chosen for use. See
“Working with original and restored configuration tables” on page 9-22 for
details.
'
Step Action
1 Insert the application software DAT tape into the tape drive of the Preside
EC-1 Element Controller.
2 On the Preside EC-1 Element Controller, start a UNIX session.
3 Change directory to the NE_loads directory by entering:
cd ~/sdhms/data/NE_load/1X ↵
4 Copy the software file to this directory by entering:
tar xv ↵
5 The software file is placed in the following directory:
~/sdhms/data/NE_load/1X
—end—
Procedure 9-4
Downloading application software from the Preside EC-1 Element Controller
Step Action
1 Start a Command Line User Interface session on the TN-1X NE from the
Preside EC-1 Element Controller.
2 Access the ‘Admin/Sw’ submenu by entering:
a s ↵
—continued—
Procedure 9-4
Downloading application software from the Preside EC-1 Element
Controller (continued)
Step Action
Procedure 9-4
Downloading application software from the Preside EC-1 Element
Controller (continued)
Step Action
—end—
Once the new application software is loaded, the original application software
is in the active software bank, and the new software is in the inactive bank.
These versions can both be accessed until one of them is chosen for use. See
“Working with original and restored configuration tables” on page 9-22 for
details.
The user is able to switch between these versions of the software. This
enables any testing or evaluation to be made before a decision is made
whether to commit to the new version or not. Switching between versions will
always result in a warm reboot.
CAUTION
Switching from Release 9 to Release 8 or Release 7
If the TN-1X is switched from Release 9 software to Release 8
or Release 7 software, the configuration will be lost, the TN-1X
will enter detached mode, and traffic will be hit.
Note: During a reboot, some transient alarms will occur. Alarms should be
ignored until ten minutes after the reboot, to allow for settling.
Command details
The commands that access the application software management
functionality of the TN-1X are shown in Figure 9-3 below, and detailed in the
tables that follow.
Figure 9-3
Admin/Sw menu structure
Admin
Sw
DoWnload
Abort_Download
Switch_to_Loaded
Switch_to_Original
Warm_Restart
Cold_Restart
CoMmit
BackOut
CoPy
View
Table 9-1
Admin/Sw
Note: A cold restart of a fully equipped TN-1X takes 12 minutes. No canges should be made to the
TN-1X until at least 12 minutes after a cold restart.
Note: When a download has been aborted, the software status will be
‘checksum_bank’. This will also occur if a software bank is corrupted. To
resolve this state, either new application software must be loaded, or the
original software must be copied into the inactive software bank.
'
Parameters
The following parameters are used by the commands described above:
• The <filename> parameter identifies the path and filename for the TN-1X
software. The <filename> parameter may be up to 32 characters long, and
can be hierarchic. For example:
NE_loads/tn1x_sw
This represents a file called ‘tn1x_sw’ in the ‘NE_loads’ directory.
Autonomous events
The autonomous events generated by the above commands are listed below.
• Restart reason. This shows the reason for a restart.
984, Restart = <‘Cold’|‘Warm’>, Reason = <‘Power_up’|
‘User_request’|‘Bank_switch’|‘SW_error’|
‘Watch_dog’>, <date>, <time>
Where:
Reports
The reports for the described commands are shown below.
Admin/Sw/View
The entries used by this command are listed below.
57, Software and Config Table Status
571, Active_SW_version=<version>,Active_SW_bank=<‘A’|‘B’>,
Other_SW_version=<version|‘N/A’>
572, Active_cnfg_table_version=<version>,
Other_table_version=<version|‘N/A’>
573, SW_upgrade_status = <‘Stable’|‘Ready-to-activate’|
‘Ready-to-commit’|‘Download-in-progress’|
‘Checksum_bank’>
574, Cnfg_upgrade_status = <‘Stable’|‘Ready-to-activate’|
‘Ready-to-commit’>
Where:
• <version> is a software/table version number.
• The software statuses are explained in “Software status” on page 9-4
• The config table statuses are explained in “Configuration table status” on
page 9-18.
For example:
57,Software and Config table status
571,Active_SW_version=X9.01,Active_SW_bank=A,
Other_SW_version=N/A
572,Active_cnfg_table_version=9.01,
Other_table_version=9.01
573,SW_upgrade_status = Stable
574,Cnfg_upgrade_status = Stable
;
'
The active configuration table can be saved on either the CAT or the Preside
EC-1 Element Controller platform so that it can be restored at a later date (see
“Backing up the configuration table” on page 9-24). This allows
experimentation with new configurations, while retaining a secure copy of the
original configuration.
When a configuration table is restored, the data is loaded to the inactive table.
This does not affect the live configuration, which can be entirely different.
These alternative configurations can then be swapped over to enable the user
to test and evaluate them. When the user decides which configuration is
preferred, the restored configuration can be selected for use. The other
configuration is lost at this point.
Figure 9-4
An overview of restoring a configuration table
Switch to loaded
configuration While the loaded configuration is being
tested, the original configuration is in the
inactive configuration table. You can switch
between the different configurations.
Test loaded
configuration
Is loaded Yes
configuration
OK?
No
Switch to original
During normal operation, it is important
configuration
that both tables contain the same
configuration information. If these are
different, this can interfere with the
Commit to loaded operation of configuration functions.
Backout
configuration
If the loaded configuration is satisfactory,
the user may decide to commit to it. If the
Loaded loaded configuration proves unsatisfactory,
Old configuration configuration then the user must back out, reverting to
in both tables in both tables the original configuration. In either case,
the NE is left with the same configuration in
both configuration tables. '
Finish
Note 1: This process places the restored configuration into the inactive
configuration table only. Additional processes are required to put the
restored configuration into active use, and these are detailed later in this
chapter.
Note 2: This operation should not be requested while a software download,
NE configuration backup or NE configuration restoration is already in
progress. This operation should also not be requested during periods when
automatic NE backups might occur.
Note 3: Any attempt to restore a Release 8 configuration table onto a
Release 9 TN-1X will be rejected.
ATTENTION
It is recommended that the Preside EC-1 Element Controller’s ‘Restore NE’
function is used on managed NEs in preference to the functions available
from a User Interface session. This minimises the possibility of errors when
file names are specified.
Procedure 9-5
Restoring a configuration table from the CAT
Step Action
—continued—
Procedure 9-5
Restoring a configuration table from the CAT (continued)
Step Action
9 Select the OK button. The ‘Xmodem file send’ dialogue is then displayed. This
dialogue contains a progress bar showing the filename, the progress of the
file transfer and a ‘Cancel’ button.
Note: It is not possible to issue any commands to the TN-1X while a
configuration restore is in progress.
10 When the restore is complete, the restored configuration is in the inactive
configuration table.
ATTENTION
The first command processed via HyperTerminal after a restore
operation has completed will fail.
—end—
ATTENTION
It is recommended that the Preside EC-1 Element Controller’s ‘Backup NE’
function is used on managed NEs in preference to the functions available
from a User Interface session. This minimises the possibility of errors when
file names are specified.
Procedure 9-6
Restoring a configuration table from the EC-1
Step Action
1 Start a Command Line User Interface session on the TN-1X NE from the
Preside EC-1 Element Controller.
2 Access the ‘Admin/Cnfg_tbl’ submenu by entering:
a c↵
3 Ensure that the configuration status is ‘Stable’ by executing the ‘View’
command, enter:
v↵
The following report is displayed:
57,Software and Config table status
571,Active_SW_version=X9.01,Active_SW_bank=A,
Other_SW_version=X9.01
572,Active_cnfg_table_version=9.01,
Other_table_version=9.01
573,SW_upgrade_status = Stable
574,Cnfg_upgrade_status = Stable
;
If the line ‘574,Cnfg_upgrade_status = Stable’ does not appear in
the report, then the configuration tables are not identical.
If the status is ‘Ready-to-activate’ then a configuration table has
been restored but has not yet been activated. The ‘REstore’ command is not
available.
If the status is ‘Ready-to-commit’ then the restored table is
already active. The ‘REstore’ command is not available.
4 Execute the ‘REstore’ command and specify the filename and local (Preside
EC-1) path of the backup configuration by entering:
re <path>/<filename>↵
Where <path> is an absolute pathname (for example, ‘/users/syseng01/
backup’) or a pathname relative to ‘/home/sdhms/data/NE_backup’ (for
example, ‘1X/2.5/backup’).
5 The UI responds with the following messages:
4, OK, (4) request is being processed in background;
951,Cmd=a/c/re <path>/<filename>,User=<user>,
'
<date>,<time>;
6 The specified backup file is then loaded into the inactive configuration table.
Once complete, the following message is displayed:
993,Cnfg_oper=Restore,Status=Completed,<date>,<time>
—end—
The user is able to switch between these versions of the mux configuration.
This enables any testing or evaluation to be made before a decision is made
whether to commit to the new table or not. Switching between versions will
always result in a warm reboot.
Note: During a reboot, some transient alarms will occur. Alarms should be
ignored until ten minutes after the reboot, to allow for settling.
Detached mode
If the Subrack Controller (SRC) detects that there is a mismatch between the
configuration table and the current traffic configuration, the Subrack
Controller enters Detached mode. While this mode is active:
• The SRC does not control the traffic and the traffic is left running.
• Monitoring of the multiplexer is minimal and unreliable.
• An INT-NE-Config_Corrupt alarm is raised.
• The SRC can still communicate with the Element Controller or CAT.
• The configuration tables can be updated or restored, but the changes are not
imposed on the traffic cards (non-traffic affecting). When the configuration
tables have been updated or restored and are correct, the ‘Impose_Config’
command can be issued. This imposes the information in the active
configuration table on the traffic cards (possibly traffic affecting).
The Subrack Controller enters the Detached mode automatically under the
following circumstances:
• Both configuration tables are corrupt or unreadable and there are traffic
connections.
• The multiplexer is cyclically rebooting, and there are traffic connections.
• The SRC detects a difference between the configuration table and the
current traffic configuration.
• The user issues a ‘Default’ command via the user interface. The current
configuration table is overwritten with the default settings. The software
status and configuration table status must both be ‘Stable’ for this
command to be issued.
• The NE address on the backplane does not match the NE address held in
the configuration table on the SRC (that is, the SRC is in the wrong
subrack, or a new or replacement SRC has been inserted). In the situation,
an INT-NE-Config_Bp_Mismatch alarm is raised.
Manual entry to Detached Mode can be requested by the user using the
‘Force_Detached’ command. All current configuration table settings are
retained. This function should only be used under exceptional circumstances.
The software status and configuration table status must both be ‘Stable’ or
‘Ready to commit’ for this command to be issued.
To exit from the Detached mode, one of the following user actions is required:
• If the SRC is inserted in the wrong subrack, fit it into the correct subrack.
• If the SRC is a new or replacement unit, or is cyclically rebooting:
— Issue the ‘DeFault’ command via the user interface.
— Either Restore a previous configuration table, or manually update the
current configuration table via the user interface.
'
— Issue the ‘Impose_Config’ command. This clears any
INT-NE-Config_Corrupt and INT-NE-Config_Bp_Mismatch alarms.
• If the multiplexer is not carrying live traffic, perform a cold restart (issue a
cold restart command or power cycle off and on).
• If the mux has been placed in Detached mode manually, issue the
‘Impose_Config’ command to return it to normal operation. Any changes
that have been made to the active configuration while the mux was in this
mode will be applied.
Step Action
—continued—
Procedure 9-7
Backing up a configuration table to the CAT (continued)
Step Action
—continued—
Procedure 9-7
Backing up a configuration table to the CAT (continued)
Step Action
11 Once the ‘Xmodem file receive’ dialogue closes, the backup is complete.
ATTENTION
The first command processed via HyperTerminal after a restore
operation has completed will fail.
—end—
Note: Filenames detailed in this procedure are not case sensitive, and must
conform to standard DOS file naming conventions.
ATTENTION
It is recommended that the Preside EC-1 Element Controller’s ‘Backup NE’
function is used on managed NEs in preference to the functions available
from a User Interface session. This minimises the possibility of errors when
file names are specified.
Note 1: The combined pathname and filename must be between four and
50 characters in length.
Note 2: The backup process can also be achieved from the Network
Element Access window inside the Preside EC-1 Element Controller. See
the Preside EC-1 Element Controller User Procedures handbook, NTP
323-1091-402 for details.
Procedure 9-8
Backing up a configuration table to the EC-1
Step Action
1 Start a User Interface session for the target TN-1X NE on the Preside EC-1
Element Controller platform.
2 Access the ‘Admin/Cnfg_tbl’ submenu by entering:
a c↵
3 Ensure that the configuration status is ‘Stable’ by executing the ‘View’
command, enter:
v↵
The following report is displayed:
57,Software and Config table status
571,Active_SW_version=X9.01,Active_SW_bank=A,
Other_SW_version=X9.01
572,Active_cnfg_table_version=9.01,
Other_table_version=9.01
573,SW_upgrade_status = Stable
574,Cnfg_upgrade_status = Stable
;
If the line ‘574,Cnfg_upgrade_status = Stable’ does not appear in
the report, then the configuration tables are not identical.
If the status is ‘Ready-to-activate’ then a configuration table has
been restored but has not yet been activated. The ‘REstore’ command is not
available.
If the status is ‘Ready-to-commit’ then the restored table is
already active. The ‘REstore’ command is not available.
4 Execute the ‘BackUp’ command and specify a path and filename. Filenames
must be unique and should conform to a naming scheme that allows the user
to identify the particular NE to which the table refers. Do this by entering:
bu <path>/<filename> ↵
Where <path> is an absolute pathname (for example, ‘/users/syseng01/
backup’) or a pathname relative to ‘/home/sdhms/data/NE_backup’ (for
example, ‘1X/2.5/backup’). It is recommended that the filename should
conform to a naming scheme that allows the user to identify the particular NE
to which it refers. The filename should be unique, as no confirmation of the '
filename is requested. It is recommended that the filename contains the date,
to minimise the possibility of accidental overwrites.
Note: The combined pathname and filename must be between four and 50
characters in length.
—continued—
Procedure 9-8
Backing up a configuration table to the EC-1 (continued)
Step Action
—end—
Command details
The commands that access the configuration table management functionality
of the TN-1X are shown in Figure 9-5, and detailed in the tables that follow.
Figure 9-5
Admin/Cnfg_tbl menu structure
Admin
Cnfg_tbl
BackUp
REstore
Switch_to_Original
Switch_to_Restored
CoMmit
BackOut
Impose_Config
DeFault
Force_Detached
View
Table 9-2
Admin/Cnfg_tbl
Force_Detached
View
A C FD
ACV N/A No
Forces the mux into detached mode.
Parameters
The following parameters are used by the commands described above:
• The <file_name> parameter be up to 32 characters long, and can be
hierarchic if required. For example, on the Preside EC-1 Element
Controller platform:
NE_Backup/cnfg_12mar96
Autonomous events
The autonomous events generated by the above commands are listed below.
• Restart reason. This shows the reason for a restart.
984, Restart = <‘Cold’|‘Warm’>, Reason = <‘Power_up’|
‘User_request’|‘Bank_switch’|’SW_error’|
’Watch_dog’>, <date>, <time>
Where:
Reports
The reports for the command described are shown below.
Admin/Cnfg_tbl/View
The entries used by this command are listed below.
57, Software and Config Table Status
571, Active_SW_version=<version>,Active_SW_bank=<‘A’|‘B’>,
Other_SW_version=<version|‘N/A’>
572, Active_cnfg_table_version=<version>,
Other_table_version=<version|‘N/A’>
573, SW_upgrade_status = <‘Stable’|‘Ready-to-activate’|
‘Ready-to-commit’|‘Download-in-progress’|
‘Checksum_bank’>
574, Cnfg_upgrade_status = <‘Stable’|‘Ready-to-activate’|
‘Ready-to-commit’>
Where:
• <version> is a software/table version number.
• The software statuses are explained in “Software status” on page 9-4
• The config table statuses are explained in “Configuration table status” on
page 9-18.
For example:
57,Software and Config table status
571,Active_SW_version=X9.01,Active_SW_bank=A,
Other_SW_version=N/A
572,Active_cnfg_table_version=9.01,
Other_table_version=9.01
573,SW_upgrade_status = Stable
574,Cnfg_upgrade_status = Stable
;
'
User management
The user management functionality of the TN-1X enables you to change user
passwords and to put the TN-1X into Secure Mode.
Note: The Secure Mode command should be used by Nortel staff only.
Changing passwords
The Change_password command enables user passwords to be changed. The
user is prompted for the old password, the new password, and finally for a
re-keying of the new password.
Note 1: Passwords are not echoed to the screen when entered by the user.
Note 2: Passwords for a number of standard user names are fixed. That is,
they do not expire, and cannot be changed.
When a change password command is issued, the following process occurs:
Procedure 9-9
Changing passwords
Step Action
—end—
Command details
The commands that access the user management functionality of the TN-1X
are shown in Figure 9-6 below, and detailed in the tables that follow.
Figure 9-6
Admin/User menu structure
Admin
User
change_Pswd
Bchange_pswd
Secure
Table 9-3
Admin/User
Parameters
The following parameters are used by the commands described above:
• The <username> parameter identifies a user, and is between six and eight
characters in length. If this is not specified, the password for the current
login is changed.
• The <new_password> parameter is the new password for the specified '
user.
• The <authority_password> is the password for the System Engineer.
Autonomous events
There are no autonomous events associated with user management.
Reports
There are no reports generated by the change passwords command. However,
the following actions are performed.
Admin/User/change_Pswd
When a password change is requested, the following dialogue takes place:
Originator password:
New password:
Repeat new password:
Note: Passwords are not echoed to the screen when entered by the user.
end of chapter
Table 10-1
Craft Access Terminal (CAT) platform
RAM 16 Mbyte.
Interface
The CAT interface employs a simple asynchronous start-stop protocol, carried
over RS232-C compliant signals. The CAT is defined as a Data Termination
Equipment (DTE) and the TN-1X is defined as a Data Communication
Equipment (DCE).
Table 10-2
CAT interface parameters
Parameter Data
Protocol Asynchronous.
Start-stop.
Word structure 8 data bits.
No parity or hardware parity.
DO NOT USE XON/XOFF.
1 stop bit.
Software
The recommended software package is the HyperTerminal application
software which is supplied with the Windows operating system. To configure
this application for use, perform Procedure 10-1. To run the application after
it is configured, perform Procedure 10-2.
Procedure 10-1
Setting up HyperTerminal
Step Action
1 From the ‘Start’ menu of Windows95, select the ‘Programs’ menu. Then,
select ‘Accessories’. Finally, select the ‘HyperTerminal’ folder shortcut. The
‘HyperTerminal’ folder is opened.
Note: If the ‘HyperTerminal’ folder shortcut is not in the default location
described above, search for ‘HyperTerminal’ using the ‘Find’ application on
the ‘Start’ menu. Once the folder is located, double-click on it to open it.
2 In the ‘HyperTerminal’ folder, double click on the ‘Hypertrm’ (or
‘hypertrm.exe’) application. The HyperTerminal application opens, and the
‘Connection Description’ dialogue is displayed.
3 Enter a name for the HyperTerminal connection (for example, “CAT”). Then,
select a suitable icon, using the scroll bars if required.
4 Press the ‘OK’ button. The ‘Phone Number’ dialogue is displayed.
5 Select the ‘Direct to COM1’ from the ‘Connect using’ pulldown list.
6 Press the ‘OK’ button. The ‘COM1 properties’ dialogue is displayed.
7 Select the ‘Port Settings’ tab within the ‘COM1 properties’ dialogue.
8 Select the ‘19200’ setting from the ‘Bits per second’ pulldown list.
9 Select the ‘8’ setting from the ‘Data bits’ pulldown list.
10 Select the ‘None’ setting from the ‘Parity’ pulldown list.
11 Select the ‘1’ setting from the ‘Stop bits’ pulldown list.
12 Select the ‘None’ setting from the ‘Flow control’ pulldown list.
13 Press the ‘Advanced’ button in the ‘Port Settings’ tab of the ‘COM1
Properties’ dialogue. The ‘Advanced Port Settings’ dialogue is displayed.
14 Press the ‘Defaults’ button within the ‘Advanced Port Settings’ dialogue.
15 Press the ‘OK’ button within the ‘Advanced Port Settings’ dialogue.
16 Press the ‘OK’ button within the ‘COM1 properties’ dialogue.
17 The CAT will attempt to communicate with a TN-1X NE over the serial port.
Abort this operation by selecting the ‘Disconnect’ option from the ‘Call’ menu.
18 Select the ‘Properties’ option from the ‘File’ menu of the ‘HyperTeminal’
application. A properties dialogue is displayed.
19 Select a setting of ‘500’ in the ‘Backscroll buffer’ lines field.
20 Select the ‘Settings’ tab within this properties dialogue.
21 Select the ‘Terminal keys’ radio button.
—continued—
Procedure 10-1
Setting up HyperTerminal (continued)
Step Action
22 Select the ‘Auto detect’ setting from the ‘Emulation’ pulldown list.
23 Press the ‘ASCII setup’ button. The ‘ASCII setup’ dialogue is displayed.
24 In the ‘ASCII sending’ section of the ‘ASCII setup’ dialogue, uncheck the
‘Send line ends with line feeds’ tickbox. Uncheck the ‘Echo types characters
locally’ tickbox. Enter zero in the ‘Line delay’ field. Enter zero in the ‘Character
delay’ field.
25 In the ‘ASCII receiving’ section of the ‘ASCII setup’ dialogue, check the ‘Wrap
lines that exceed terminal width’ tickbox. Uncheck the ‘Append line feed to
incoming line ends’ tickbox. Uncheck the ‘Force incoming data to 7-bit ASCII’
tickbox.
26 Press the ‘OK’ button within the ‘ASCII setup’ dialogue.
27 Press the ‘OK’ button within the properties dialogue.
28 Select the ‘Save’ option within the ‘File’ menu of the HyperTeminal
application. This saves the settings using the name specified in step 3. The
‘HyperTerminal’ folder is used as the default location for this file.
29 Close the HyperTeminal application.
—end—
Procedure 10-2
Starting a CAT session on HyperTerminal
Step Action
1 Connect the CAT to the TN-1X NE using an RS232 cable. This is connected
from the COM1 port on the CAT to the CATT port on the TN-1X.
2 From the ‘Start’ menu of Windows95, select the ‘Programs’ menu. Then,
select ‘Accessories’. Finally, select the ‘HyperTerminal folder’. The
‘HyperTerminal’ folder is opened.
Note: If the ‘HyperTerminal’ folder shortcut is not in the default location
described above, search for ‘HyperTerminal’ using the ‘Find’ application on
the ‘Start’ menu. Once the folder is located, double-click on it to open it.
3 Double click on the appropriate connection icon for the CAT-mux connection
(as established in Procedure 10-1).
4 The HyperTerminal application starts, and a connection is attempted. If no
login prompt appears, press Return.
5 Specify a login name, a password and a unique identification for the session.
6 The connection between the CAT and the TN-1X NE is then established.
—end—
end of chapter
INT-NE-Config_bp_mismatch
INT-NE-Config_Corrupt
Critical
Critical
N/A
—continued—
Table 11-1
TN-1X R9 alarms (continued)
TN-1X R9 Alarm Severity TN-1X R6 Alarm
—continued—
Table 11-1
TN-1X R9 alarms (continued)
TN-1X R9 Alarm Severity TN-1X R6 Alarm
—end—
end of chapter
Error Messages
The following error messages are output by the TN-1X User Interface.
0, "Non-Enumerated Error:"
1, "Invalid command:"
2, "Ambiguous command:"
19, "Command not implemented:"
20, "Invalid argument"
Nortel TN-1X Command Line User Interface Guide
12-2 Appendix C: TN-1X Messages
Nortel TN-1X Command Line User Interface Guide
12-4 Appendix C: TN-1X Messages
Nortel TN-1X Command Line User Interface Guide
12-8 Appendix C: TN-1X Messages
Warning Messages
The following warning messages are output by the TN-1X User Interface.
0, "Non-Enumerated Warning"
end of chapter
13-1
KLM numbering for VC-3 and VC-12 payloads are shown in Table 13-1 and
Table 13-2 below. These tables also show the equivalent ETSI and Nortel
numbering.
Note: Nortel and ETSI numbering are no longer supported by the TN-1X.
Table 13-1
KLM numbering for VC-3
KLM Number ITU-T (ETSI) Nortel Number
Number
TUG-3 (K) TUG-2 (L) TU-12 (M)
1 0 0 1-21 N/A
2 0 0 22-42 N/A
3 0 0 23-63 N/A
Table 13-2
KLM numbering for VC-12
KLM Number
TUG-3 (K) TUG-2 (L) TU-12 (M) ITU-T (ETSI) Nortel Number
Number
1 1 1 1 1
1 1 2 2 22
1 1 3 3 43
1 2 1 4 4
1 2 2 5 25
1 2 3 6 46
1 3 1 7 7
1 3 2 8 28
1 3 3 9 49
1 4 1 10 10
1 4 2 11 31
1 4 3 12 52
1 5 1 13 13
1 5 2 14 34
—continued—
Table 13-2
KLM numbering for VC-12 (continued)
KLM Number
ITU-T (ETSI) Nortel Number
TUG-3 (K) TUG-2 (L) TU-12 (M)
Number
1 5 3 15 55
1 6 1 16 16
1 6 2 17 37
1 6 3 18 58
1 7 1 19 19
1 7 2 20 40
1 7 3 21 61
2 1 1 22 2
2 1 2 23 23
2 1 3 24 44
2 2 1 25 5
2 2 2 26 26
2 2 3 27 47
2 3 1 28 8
2 3 2 29 29
2 3 3 30 50
2 4 1 31 11
2 4 2 32 32
2 4 3 33 53
2 5 1 34 14
2 5 2 35 35
2 5 3 36 56
2 6 1 37 17
2 6 2 38 38
2 6 3 39 59
2 7 1 40 20
2 7 2 41 41
2 7 3 42 62
3 1 1 43 3
3 1 2 44 24
3 1 3 45 45
3 2 1 46 6
3 2 2 47 27
3 2 3 48 48
3 3 1 49 9
3 3 2 50 30
3 3 3 51 51
3 4 1 52 12
3 4 2 53 33
3 4 3 54 54
3 5 1 55 15
—continued—
Table 13-2
KLM numbering for VC-12 (continued)
!
KLM Number
ITU-T (ETSI) Nortel Number
TUG-3 (K) TUG-2 (L) TU-12 (M)
Number
3 5 2 56 36
3 5 3 57 57
3 6 1 58 18
3 6 2 59 39
3 6 3 60 60
3 7 1 61 21
3 7 2 62 42
3 7 3 63 63
—end—
end of chapter
Index 14-
1:N tributary protection 4-98, 4-109 PROT alarms 4-21
status reports 7-2, 7-13 QOSV alarms 4-33, 4-37
R6/R7 names 11-1
A RAU priority 4-21
action logs 7-2, 7-9 RS alarms 4-21, 4-23
active alarms 7-2, 7-9 severities 4-21
active configuration table 9-16 signal alarms 4-113
active LAN connection 4-6 SYNC alarms 4-21, 4-26
active software bank 9-2 thresholds 4-14
adding connections 4-88 transmux alarms 4-21, 4-26
Admin/Cnfg_tbl 9-16 TU alarms 4-21, 4-24
Admin/Sw 9-2 application software 9-2
Admin/User 9-32 committing to version 9-11
administration menu 9-1 downloading 9-2, 9-4
administrative unit alarms 4-21, 4-24 software status 9-4
aggregate units 4-82, 4-98 switching between versions 9-11
alarm events, area addresses 4-7
see alarms AS statistic 4-35, 7-4
alarm logs 7-2, 7-8 assessed seconds 4-35, 7-4
alarms 2-11 AU alarms 4-21, 4-24
action logs 7-2, 7-9 AU4 selection 4-82
active alarms 7-2, 7-9 automatic logout 3-1, 3-4, 8-2
alarm logs 7-2, 7-8 settings 8-5, 8-10
AU alarms 4-21, 4-24 autonomous messages 2-11
card alarms 4-21, 4-27
categories 4-21 B
consequent actions 4-60 background bit errors 4-33, 4-34, 7-4
ES alarms 4-21, 4-23 backing up configuration tables 9-24
external alarms 4-11 basis of frame errors 4-33, 7-4
HP alarms 4-21, 4-24 BBE statistic 4-34, 7-4
lamplocking 4-31 bidirectional operation 4-120
LP alarms 4-21, 4-25 BIP errors 4-33, 7-4
MISC alarms 4-21, 4-26 block errors 4-33, 7-4
monitoring 4-17 brief payload description 4-96
MS alarms 4-21, 4-23 bulk connections 4-89
MSP alarms 4-125 bulk disconnections 4-89
OS alarms 4-21, 4-22
PPI alarms 4-21, 4-25 C
PPS triggers 4-2 card alarms 4-21, 4-27
severely errored seconds 4-33, 4-34, 7-4 non-SSM mechanism 4-53, 4-55
signal alarms 4-113 quality levels 4-53
slot equipping 4-98 reversion 4-52
slots and cards 4-98 software settings 4-52
software banks 9-2 source failures 4-53
software status 9-4 source selection 4-53
special characters 2-1 SSM mechanism 4-53
SRC 4-98 switching sources 4-52
standby LAN connection 4-6 viewing status 7-2, 7-11
status reports wait to restore time 4-55
1:N tributary protection 7-2, 7-13
action logs 7-2, 7-9 T
active alarms 7-2, 7-9 table status 9-18
alarm logs 7-2, 7-8 terminal port 8-2, 8-10
high-order path trace 7-2, 7-12 testing connections 4-89
high-order payload labels 4-81 thresholds
LAPD settings 7-2, 7-13 alarms 4-14
low-order payload labels 4-77 error rates 4-14
manual tributary protection 7-3 through connections 4-82
multiplexer section protection 7-2, 7-14 TM alarms 4-21, 4-26
path protection switching 7-2, 7-12 traffic auto mode 4-113
payload manager protection 7-2, 7-14 traffic standby mode 4-113
performance logs 7-2, 7-3, 7-10 traffic types 7-4
sync source status 7-2, 7-11 transmitted path trace strings 4-66, 4-70
traffic types 7-4 transmitted payload labels 4-74, 4-75, 4-78
STM-1 aggregate units 4-82, 4-98 transmux alarms 4-21, 4-26
STM-1 payloads 2-3, 13-1 tributary protection 4-109
STM-4 aggregate units 4-82, 4-98 tributary unit alarms 4-21, 4-24
subrack controller 4-98 tributary units 4-98
suppressing confirmation, triggering
see commands external alarms 4-11
switching path protection switching 4-2
1:N tributary protection 4-109 payload manager switch 4-106
manual tributary protection 4-132, 6-2 TU alarms 4-21, 4-24
multiplexer section protection 4-118
payload managers 4-106
PPS 4-2, 6-2 U
sync sources 4-51 UAS statistic 4-34, 7-4
SYNC alarms 4-21, 4-26 UAT 4-34
sync source failure 4-53 UAT logs 7-3, 7-5
sync source selection 4-53 unavailable seconds 4-33, 4-34, 7-4
synchronisation unavailable time 4-34
alarms 4-21, 4-26 unequipping 4-97
available sources 4-51 unidirectional operation 4-120
equivalent R6 modes 4-55 unprotected drop connections 4-83
failure holdoff time 4-55 user
forced switch 4-52 classes 3-1
hierarchy 4-51 names 3-1
holdover 4-52 User Interface
non-reversion flags 4-52 case sensitivity 2-1
command prompt 2-1, 2-2
V
view status menu 7-1
View_status 7-2
W
wait to restore time 4-55
warning messages 12-8
warnings xvii
Windows HyperTerminal 10-1