User guide
Protection Switching (EPSR) Topology Maps and Inventory Tables
6-9
AlliedView NMS Administration Guide (Configuring Network Services)
6.1.6 Protection Switching (EPSR)
The EPSR feature protects the parts of the network that have a ring topology. Key components that are configured are Con-
trol VLANs, Domains, and Protected VLANs.
A Control VLAN is configured on the set of devices, and is used to send and receive control messages over the ring network.
The devices that are included in the control VLAN make up the Domain of the control VLAN.
The VLANs that require fault protection are configured on all the ring ports and are assigned to the EPSR domain. These
VLANs are called Protected VLANs.
6.1.7 Circuit Emulation Service (CES)
Starting in AlliedView NMS Release 5.0, the iMAP devices use the CES8 card to transport T1 point to point across an Ether-
net network. This CES is in unstructured mode; in this mode, the CES8 creates a “pseudo-span” across the Ethernet network
that acts like a virtual wire connection that accepts a bit stream into the pseudo-span, and recreates that same stream out of
the pseudo-span.
When configuring CES, the user provisions through forms the functional components of the CES8 and iMAP device, as well
as the network VLANs that connect devices and networks.
Note: Future releases of iMAP software will allow structured mode transport, which allows manipulation of the
individual 64kbps channels.
6.1.8 NTE8 Service
The NTE8 card is used to allow DS1/E1 facilities to connect (backhaul) the ethernet network, with both ends of the DS1/E1
connections being on iMAP 9000 devices. Refer to the iMAP User Guide for a complete description of the NTE8 configura-
tion.
Note: Refer to 5.5.15 and 5.6.21 for an overview of the NTE8 card and DS1/E1 port attributes.
The NTE8 configuration always has dual endpoints, since there must be an iMAP 9000 device at each end. Moreover, each
end must be correctly provisioned for the logical hierarchy (DS1, PPP, MLPP, ETH) of the NTE8. Finally, the hierarchy for
each endpoint in a pair must be the same.
6.2 Topology Maps and Inventory Tables
6.2.1 Overview
To view and manipulate the network VLANs, a set of maps and tables show the configuration for the network VLANs and
their status at the layer 3 and layer 2 for all their related components:
• The physical links that connect the devices
• The VLAN links that connect the VLAN interfaces
• The VLAN interfaces on the device
• The Network VLAN itself
The maps and tables that show these components are explained first, so that the menu items that create, change, and delete
these components are more easily understood. Figure 6-7 shows the Network Objects node tree and highlights those that are
used to view and configure network VLANs.