Cisco ONS 15454 Installation and Operations Guide Product and Documentation Release 3.1 November 2001 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
C ON T E NT S About This Manual Audience xxxiii xxxiii Organization xxxiii Related Documentation Conventions xxxiv xxxv Obtaining Documentation xxxv World Wide Web xxxvi Optical Networking Product Documentation CD-ROM Ordering Documentation xxxvi Documentation Feedback xxxvi xxxvi Obtaining Technical Assistance xxxvii Cisco.
Contents Procedure: Open the Front Cabinet Compartment (Door) Procedure: Remove the Front Door 1-13 1.5 Backplane Access 1-14 Procedure: Remove the Backplane Sheet Metal Covers 1.5.1 Lower Backplane Cover 1-15 Procedure: Remove the Lower Backplane Cover 1-16 1.5.2 Alarm Interface Panel 1-16 1-12 1-15 1.6 EIA Installation 1-17 1.6.1 BNC EIA 1-17 1.6.2 High-Density BNC EIA 1-18 1.6.3 SMB EIA 1-19 1.6.
Contents Procedure: Install DS-1 AMP Champ Cables on the AMP Champ EIA 1-43 1.12 Card Installation 1-44 1.12.1 Slot Requirements 1-45 Procedure: Install the TCC+ and XC/XCVT/XC10G Cards 1-47 Procedure: Install Optical, Electrical, and Ethernet Cards 1-48 Procedure: Install the AIC Card 1-49 1.12.2 Gigabit Interface Converter 1-50 Procedure: Install Gigabit Interface Converters 1-50 Procedure: Remove a Gigabit Interface Converter 1-52 1.
Contents 1.16.14 Power Specifications 1-67 1.16.15 Environmental Specifications 1.16.16 Dimensions 1-67 1.17 Installation Checklist 1-67 1-67 1.18 ONS 15454 Software and Hardware Compatibility Matrix CHAPTER 2 Software Installation 1-68 2-1 2.1 Installation Overview 2.2 Computer Requirements 2-1 2-2 2.
Contents Procedure: Modify the Network or Domain Background Color 2-19 2.6.2.5 Changing the Network View Background Image 2-19 Procedure: Change the Network View Background Image 2-20 Procedure: Add a Node to the Current Session 2-21 2.6.3 Card View 2-21 2.7 CTC Navigation 2-22 2.8 Viewing CTC Table Data 2-24 2.9 Printing and Exporting CTC Data 2-26 Procedure: Print CTC Window and Table Data Procedure: Export CTC Data 2-28 2.
Contents 4.2 ONS 15454 IP Addressing Scenarios 4-2 4.2.1 Scenario 1: CTC and ONS 15454s on Same Subnet 4-2 4.2.2 Scenario 2: CTC and ONS 15454s Connected to Router 4-3 4.2.3 Scenario 3: Using Proxy ARP to Enable an ONS 15454 Gateway 4.2.4 Scenario 4: Default Gateway on CTC Computer 4-6 4.2.5 Scenario 5: Using Static Routes to Connect to LANs 4-6 Procedure: Create a Static Route 4-8 4.2.6 Scenario 6: Static Route for Multiple CTCs 4-9 4.2.7 Scenario 7: Using OSPF 4-10 Procedure: Set up OSPF 4-12 4.
Contents Procedure: Add a UPSR Node 5-34 Procedure: Remove a UPSR Node 5-35 5.4 Subtending Rings 5-36 Procedure: Subtend a UPSR from a BLSR Procedure: Subtend a BLSR from a UPSR Procedure: Subtend a BLSR from a BLSR 5-38 5-38 5-40 5.5 Linear ADM Configurations 5-41 Procedure: Create a Linear ADM 5-42 Procedure: Convert a Linear ADM to UPSR 5-42 Procedure: Convert a Linear ADM to a BLSR 5-47 5.6 Path-Protected Mesh Networks CHAPTER 6 Circuits and Tunnels 5-50 6-1 6.1 Circuits Overview 6-1 6.
Contents 7.2.2 DS-3 Card Parameters 7-6 Procedure: Modify Line and Threshold Settings for the DS-3 Card 7-6 7.2.3 DS3E Card Parameters 7-8 Procedure: Modify Line and Threshold Settings for the DS3E Card 7-9 7.2.4 DS3XM-6 Card Parameters 7-11 Procedure: Modify Line and Threshold Settings for the DS3XM-6 Card 7-12 7.2.5 EC1-12 Card Parameters 7-14 Procedure: Modify Line and Threshold Settings for the EC-1 Card 7-14 7.3 Provisioning Optical Cards 7-18 7.3.
Contents 8.1.5 Using the Baseline Button 8-7 Procedure: Use the Baseline Button on the Performance Monitoring Screen 8-7 8.1.6 Using the Clear Button 8-8 Procedure: Use the Clear Button on the Performance Monitoring Screen 8-8 8.2 Changing Thresholds 8-9 8.3 Enabling Intermediate-Path Performance Monitoring 8-10 8.4 Pointer Justification Count Parameters 8-12 Procedure: Enable Pointer Justification Count Performance Monitoring 8.5 Performance Monitoring for Electrical Cards 8-14 8.5.
Contents 9.4.1 Q-Tagging (IEEE 802.1Q) 9-22 9.4.2 Priority Queuing (IEEE 802.1Q) 9-23 9.4.3 VLAN Membership 9-24 Procedure: Provision Ethernet Ports for VLAN Membership 9.5 Spanning Tree (IEEE 802.1D) 9-26 9.5.1 Multi-Instance Spanning Tree and VLANs 9-26 Procedure: Enable Spanning Tree on Ethernet Ports 9.5.2 Spanning Tree Parameters 9-27 9.5.3 Spanning Tree Configuration 9-27 9.5.4 Spanning Tree Map 9-28 Procedure: View the Spanning Tree Map 9-28 9-24 9-26 9.
Contents 10.3.1.4 Row Display Options 10-11 10.3.2 Applying Alarm Profiles 10-11 Procedure: Apply an Alarm Profile at the Card View 10-13 Procedure: Apply an Alarm Profile at the Node View 10-13 10.4 Suppressing Alarms 10-14 Procedure: Suppressing Alarms CHAPTER 11 SNMP 10-14 11-1 11.1 SNMP Overview 11-1 11.2 SNMP Basic Components 11-2 11.3 SNMP Support 11-3 Procedure: Set Up SNMP Support 11.4 SNMP Management Information Bases 11.5 SNMP Traps 11-3 11-5 11-6 11.6 SNMP Community Names 11-8 11.
Contents Power Supply Disconnection Warning B-6 Outside Line Connection Warning B-7 Class 1 Laser Product Warning B-8 Class I and Class 1M Laser Warning B-8 Restricted Area Warning B-9 Ground Connection Warning B-10 Qualified Personnel Warning B-11 Invisible Laser Radiation Warning (other versions available) More Than One Power Supply B-12 Unterminated Fiber Warning B-13 Laser Activation Warning B-15 APPENDIX C Acronyms APPENDIX D Glossary B-11 C-1 D-1 INDEX Cisco ONS 15454 Installation and Oper
F I G U R E S Figure 1-1 Cisco ONS 15454 dimensions Figure 1-2 Reversing the mounting brackets (23-inch position to 19-inch position) Figure 1-3 Mounting an ONS 15454 in a rack Figure 1-4 A four-shelf node configuration Figure 1-5 A four-shelf ONS 15454 Bay Assembly Figure 1-6 The front-door erasable label Figure 1-7 The laser warning on the front-door label Figure 1-8 The ONS 15454 front door Figure 1-9 Removing the ONS 15454 front door Figure 1-10 Backplane sheet metal covers Figure 1
Figures Figure 1-32 Attaching a fiber boot Figure 1-33 Managing cables on the front panel Figure 1-34 Routing fiber-optic cables on the optical-card faceplate Figure 1-35 Fold-down front door of the cable-management tray (displaying the cable routing channel) Figure 1-36 Routing coaxial cable through the SMB EIA backplane Figure 1-37 Clear BIC rear cover Figure 1-38 Backplane attachment for BIC cover Figure 1-39 Installing the BIC rear cover with spacers Figure 1-40 Attaching ferrites to p
Figures Figure 3-7 Editing protection groups Figure 3-8 An ONS 15454 timing example Figure 3-9 Setting Up ONS 15454 timing Figure 3-10 Displaying ONS 15454 hardware information Figure 4-1 Scenario 1: CTC and ONS 15454s on same subnet Figure 4-2 Scenario 2: CTC and ONS 15454s connected to router Figure 4-3 Scenario 3: Using Proxy ARP Figure 4-4 Scenario 4: Default gateway on a CTC computer Figure 4-5 Scenario 5: Static route with one CTC computer used as a destination Figure 4-6 Scenario
Figures Figure 5-21 A UPSR with a fiber break Figure 5-22 An OC-3 UPSR Figure 5-23 Layout of Node ID 0 in the OC-3 UPSR example (Figure 5-15) Figure 5-24 Layout of Node IDs 1 – 3 in the OC-3 UPSR example (Figure 5-15) Figure 5-25 Connecting fiber to a four-node UPSR Figure 5-26 Using the span shortcut menu to display circuits Figure 5-27 Switching UPSR circuits Figure 5-28 An ONS 15454 with multiple subtending rings Figure 5-29 A UPSR subtending from a BLSR 5-37 Figure 5-30 A BLSR subte
Figures Figure 6-16 Selecting DCC tunnel end points Figure 7-1 Provisioning line parameters on the DS1-14 card Figure 7-2 Provisioning thresholds for the OC48 IR 1310 card Figure 7-3 IPPM provisioned for STS 1 on an OC-12 card Figure 7-4 AIC alarm input and output Figure 7-5 External alarms and controls using a virtual wire Figure 7-6 Provisioning external alarms on the AIC card Figure 7-7 Provisioning local orderwire Figure 7-8 Viewing slot protection status Figure 8-1 Viewing performan
Figures Figure 9-4 A Single-card EtherSwitch configuration Figure 9-5 A Multicard EtherSwitch point-to-point circuit Figure 9-6 A Single-card Etherswitch point-to-point circuit Figure 9-7 Provisioning an Ethernet circuit Figure 9-8 Choosing a circuit source Figure 9-9 A shared packet ring Ethernet circuit Figure 9-10 Choosing a VLAN name and ID Figure 9-11 Selecting VLANs Figure 9-12 Adding a span Figure 9-13 Viewing a span Figure 9-14 A Hub and Spoke Ethernet circuit Figure 9-15 Eth
Figures Figure 11-3 Example of the primary SNMP components Figure 11-4 Setting up SNMP Figure 11-5 Viewing trap destinations Figure A-1 Multiple protection domains Figure A-2 Secondary sources and drops Figure A-3 Alternate paths for virtual UPSR segments Figure A-4 Mixing 1+1 or BLSR protected links with a UPSR Figure A-5 Ethernet shared packet ring routing Figure A-6 Ethernet and UPSR 11-3 11-4 11-5 A-1 A-3 A-4 A-4 A-5 A-5 Cisco ONS 15454 Installation and Operations Guide November 2
Figures Cisco ONS 15454 Installation and Operations Guide xxii November 2001
T A B L E S Table 1-1 Installation Tasks Table 1-2 External Timing Pin Assignments for BITS Table 1-3 LAN Pin Assignments Table 1-4 Craft Interface Pin Assignments Table 1-5 Pin Assignments for AMP Champ Connectors (Shaded Area Corresponds to White/Orange Binder Group) 1-41 Table 1-6 Pin Assignments for AMP Champ Connectors (shielded DS1 cable) Table 1-7 Slot and Card Symbols Table 1-8 Card Ports, Line Rates, and Connectors Table 1-9 LED Activity during TCC+ and XC/XCVT/XC10G Card Installa
Tables Table 5-2 Two-Fiber BLSR Capacity 5-7 Table 5-3 Four-Fiber BLSR Capacity 5-7 Table 6-1 ONS 15454 Cards Supporting J1 Path Trace Table 6-2 Path Trace Source and Drop Provisioning Table 6-3 XC, XCVT, and XC10G Card STS Cross-Connect Capacities Table 6-4 XC, XCVT, and XC10G VT1.5 Capacities Table 6-5 VT1.
Tables Table 8-19 Near-End SONET Path PMs for the DS3-12E and DS3N-12E Cards Table 8-20 Far-End CP-bit Path PMs for the DS3-12E and DS3N-12E Cards Table 8-21 Near-End DS3 Line PMs for the DS3XM-6 Card 8-29 Table 8-22 Near-End DS3 Path PMs for the DS3XM-6 Card 8-30 Table 8-23 Near-End CP-bit Path PMs for the DS3XM-6 Card Table 8-24 Near-End DS1 Path PMs for the DS3XM-6 Card Table 8-25 Near-End VT PMs for the DS3XM-6 Card Table 8-26 Near-End SONET Path PMs for the DS3XM-6 Card Table 8-27 F
Tables Table 10-4 Conditions Columns Description Table 10-5 Alarm Profile Buttons Table 10-6 Alarm Profile Editing Options Table 11-1 SNMP Message Types Table 11-2 IETF Standard MIBs Implemented in the ONS 15454 SNMP Agent Table 11-3 SNMP Trap Variable Bindings Table 11-4 Traps Supported in the ONS 15454 Table A-1 Bidirectional STS/VT/Regular Multicard EtherSwitch/Point-to-Point (straight) Ethernet Circuits Table A-2 Unidirectional STS/VT Circuit Table A-3 Multicard Group Ethernet Shared
P R O C E D U R E S Hardware Installation Reverse the Mounting Bracket to Fit a 19-Inch Rack 1-7 Mount the Shelf Assembly in a Rack (One Person) 1-8 Mount the Shelf Assembly in a Rack (Two People) 1-9 Mount Multiple Shelf Assemblies in a Rack 1-9 Open the Front Cabinet Compartment (Door) 1-12 Remove the Front Door 1-13 Remove the Backplane Sheet Metal Covers Remove the Lower Backplane Cover 1-15 1-16 Install a BNC, High-Density BNC, or SMB EIA Install the AMP Champ EIA 1-22 1-24 Install t
Procedures Route the Coaxial Cables 1-57 Route DS-1 Twisted-Pair Cables Install the BIC Rear Cover 1-58 1-59 Attach Ferrites to Power Cabling 1-61 Attach Ferrites to Wire-Wrap Pin Fields 1-63 Software Installation Run the CTC Setup Wizard 2-4 Set Up the Environment Variable (Solaris installations only) Reference the JRE (Solaris installations only) 2-5 Creating a Direct Connection to an ONS 15454 Access the ONS 15454 from a LAN 2-4 2-5 2-7 Disable Proxy Service Using Internet Explorer (Win
Procedures Set Up Internal Timing 3-17 IP Networking Create a Static Route Set up OSPF 4-8 4-12 SONET Topologies Install the BLSR Trunk Cards 5-11 Create the BLSR DCC Terminations Enable the BLSR Ports Provision the BLSR 5-13 5-13 5-14 Upgrade From a Two-Fiber to a Four-Fiber BLSR Add a BLSR Node 5-16 5-18 Remove a BLSR Node 5-21 Move a BLSR Trunk Card 5-24 Install the UPSR Trunk Cards 5-30 Configure the UPSR DCC Terminations Enable the UPSR Ports Switch UPSR Traffic Add a UPSR Node 5-
Procedures Provision a DCC Tunnel 6-22 Card Provisioning Modify Line and Threshold Settings for the DS-1 Card 7-3 Modify Line and Threshold Settings for the DS-3 Card 7-6 Modify Line and Threshold Settings for the DS3E Card 7-9 Modify Line and Threshold Settings for the DS3XM-6 Card Modify Line and Threshold Settings for the EC-1 Card Provision Line Transmission Settings for OC-N Cards Provision Threshold Settings for OC-N Cards Provision an OC-N Card for SDH 7-18 7-23 7-25 7-27 Provision Exter
Procedures Provision Ethernet Ports for VLAN Membership Enable Spanning Tree on Ethernet Ports View the Spanning Tree Map 9-24 9-26 9-28 Retrieve the MAC Table Information 9-30 Creating Ethernet RMON Alarm Thresholds 9-32 Alarm Monitoring and Management View Affected Circuits for a Specific Alarm 10-4 View Alarm Counts on a Specific Slot and Port Create an Alarm Profile 10-9 Apply an Alarm Profile at the Card View Apply an Alarm Profile at the Node View Suppressing Alarms 10-8 10-13 10-13 10
Procedures Cisco ONS 15454 Installation and Operations Guide xxxii November 2001
About This Manual This section explains who should read the Cisco ONS 15454 Installation and Operations Guide, how the document is organized, related documentation, document conventions, how to order print and CD-ROM documentation, and how to obtain technical assistance. Audience This guide is for Cisco ONS 15454 administrators who are responsible for hardware installation, software installation, node setup, and node and network configuration.
About This Manual Related Documentation Chapter Number and Title Description Chapter 6, “Circuits and Tunnels” Describes how to create standard STS and VT1.5 circuits as well as VT tunnels, multiple drop circuits, and monitor circuits. The chapter also explains how to edit UPSR circuits and create path traces to monitor traffic. Chapter 7, “Card Provisioning” Provides procedures for changing the default transmission parameters for ONS 15454 electrical and optical cards.
About This Manual Conventions Cisco ONS 15216 EDFA1 Operations Guide Installing the Cisco ONS 15216 DWDM Filters Installing Cisco ONS 15216 OADMS Installing Cisco ONS 15216 Optical Performance Manager Operations Guide Conventions The following conventions are used throughout this publication: Note Means reader take note. Notes contain helpful suggestions or useful background information. Caution Means reader be careful.
About This Manual Obtaining Documentation World Wide Web You can access the most current Cisco documentation on the World Wide Web at the following sites: • http://www.cisco.com • http://www-china.cisco.com • http://www-europe.cisco.com Optical Networking Product Documentation CD-ROM Optical networking-related documentation, including Release 3.
About This Manual Obtaining Technical Assistance Obtaining Technical Assistance Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can obtain documentation, troubleshooting tips, and sample configurations from online tools. For Cisco.com registered users, additional troubleshooting tools are available from the TAC website. Cisco.com Cisco.
About This Manual Obtaining Technical Assistance Contacting TAC by Telephone If you have a priority level 1(P1) or priority level 2 (P2) problem, contact TAC by telephone and immediately open a case. The toll-free Optical Networking Assistance number is 1-877-323-7368. P1 and P2 level problems are defined as follows: • P1—Your production network is down, causing a critical impact to business operations if service is not restored quickly. No workaround is available.
C H A P T E R 1 Hardware Installation This chapter provides procedures for installing the Cisco ONS 15454.
Chapter 1 Hardware Installation Installation Overview Warning The ONS 15454 is intended for installation in restricted access areas. A restricted access area is where access can only be gained by service personnel through the use of a special tool, lock, key, or other means of security. A restricted access area is controlled by the authority responsible for the location. Warning The ONS 15454 is suitable for mounting on concrete or other non-combustible surfaces only.
Chapter 1 Hardware Installation Installation Equipment The ONS 15454 is powered using -48V DC power. Negative, return, and ground power terminals are accessible on the backplane. Table 1-1 lists the tasks required to install an ONS 15454. Table 1-1 Note Installation Tasks Task Reference Mount the ONS 15454 in the rack. See the “Rack Installation” section on page 1-5. Install the EIAs. See the “Install a BNC, High-Density BNC, or SMB EIA” procedure on page 1-22. Install the fan-tray assembly.
Chapter 1 Hardware Installation Installation Equipment 1.2.1 Included Materials The following materials are required and are shipped with the ONS 15454. The number in parentheses gives the quantity of the item included in the package. • #12-24 x 3/4 pan head phillips mounting screws (8) • #12 -24 x 3/4 socket set screws (2) • T-handle #12-24 hex tool for set screws (1) • ESD wrist strap with 1.
Chapter 1 Hardware Installation Rack Installation • Wire strippers • Crimp tool 1.2.2.2 Test Equipment • Volt meter • Power meter (for use with fiber optics only) • Bit Error Rate (BER) tester, DS-1 and DS-3 1.3 Rack Installation Warning To prevent the equipment from overheating, do not operate it in an area that exceeds the maximum recommended ambient temperature of 131°F (55°C). To prevent airflow restriction, allow at least 3 inches (7.6 cm) of clearance around the ventilation openings.
Chapter 1 Hardware Installation Rack Installation Figure 1-1 Cisco ONS 15454 dimensions Top View 22" total width 12" 19" or 23" between mounting screw holes Front View 22" total width Side View 5" 32099 18.5" 12" 19" or 23" between mounting screw holes 1.3.1 Reversible Mounting Bracket Caution Use only the fastening hardware provided with the ONS 15454 to prevent loosening, deterioration, and electromechanical corrosion of the hardware and joined material.
Chapter 1 Hardware Installation Rack Installation Procedure: Reverse the Mounting Bracket to Fit a 19-Inch Rack Step 1 Remove the screws that attach the mounting bracket to the side of the shelf assembly. Step 2 Flip the detached mounting bracket upside down. Text imprinted on the mounting bracket will now also be upside down. Step 3 Place the widest side of the mounting bracket flush against the shelf assembly (see Figure 1-2).
Chapter 1 Hardware Installation Rack Installation Figure 1-3 Mounting an ONS 15454 in a rack FAN 39392 Equipment rack FAIL CR IT MA J MIN Universal ear mounts (reversible) Two people should install the shelf assembly; however, one person can install it using the temporary set screws included. The shelf assembly should be empty for easier lifting. The front door can also be removed to lighten the shelf assembly (see the “Remove the Front Door” procedure on page 1-13).
Chapter 1 Hardware Installation Rack Installation Procedure: Mount the Shelf Assembly in a Rack (Two People) Step 1 Ensure that the shelf assembly is set for the desired rack size (either 19 or 23 inches). Step 2 Lift the shelf assembly to the desired position in the rack. Step 3 Align the screw holes on the mounting ears with the mounting holes in the rack. Step 4 While one person holds the shelf assembly in place, the other person can install one mounting screw in each side of the assembly.
Chapter 1 Hardware Installation Rack Installation but not merge multiple nodes into a single ONS 15454. You can link nodes with OC-12 or OC-48 fiber spans as you would link any other two network nodes. The nodes can be co-located in a facility to aggregate more local traffic. Figure 1-4 shows a four-shelf node setup. Each shelf assembly is reorganized as a separate node in the ONS 15454’s software interface (Cisco Transport Controller [CTC]), and traffic is mapped using CTC cross-connect options.
Chapter 1 Hardware Installation Front Door Access Figure 1-5 A four-shelf ONS 15454 Bay Assembly Fuse & Alarm Panel Fiber Channel (Optional Kit) Fiber Channel Mounting Brackets (Optional Kit) 39157 ONS 15454s 1.4 Front Door Access The Critical, Major, and Minor alarm LEDs visible through the front door indicate whether a Critical, Major, or Minor alarm is present anywhere on the ONS 15454. These LEDs must be visible so technicians can quickly determine if any alarms are present.
Chapter 1 Hardware Installation Front Door Access The front-door erasable label 61840 Figure 1-6 Note The front door label also includes the Class I and Class 1M laser warning shown in the laser warning on the front-door label (Figure 1-7). The laser warning on the front-door label 67575 Figure 1-7 Procedure: Open the Front Cabinet Compartment (Door) Note Step 1 The ONS 15454 has an ESD plug input and is shipped with an ESD wrist strap.
Chapter 1 Hardware Installation Front Door Access Figure 1-8 The ONS 15454 front door CISCO ONS 15454 Optical Network System Door lock Door button 33923 Viewholes for Critical, Major and Minor alarm LEDs Procedure: Remove the Front Door Step 1 Open the door. Step 2 Lift the door from its hinges at the top left-hand corner of the door (Figure 1-9).
Chapter 1 Hardware Installation Backplane Access Removing the ONS 15454 front door FAN 38831 Figure 1-9 FAIL CR IT MA J MIN Translucent circles for LED viewing Door hinge Assembly hinge pin Assembly hinge 1.5 Backplane Access To access the ONS 15454 backplane, remove the two standard sheet metal covers on each side of the backplane (Figure 1-10). Each sheet metal cover is held in place with nine 6-32 x 3/8 inch phillips screws.
Chapter 1 Hardware Installation Backplane Access Figure 1-10 Backplane sheet metal covers B A Backplane Sheet Metal Covers 32074 Lower Backplane Cover Procedure: Remove the Backplane Sheet Metal Covers Step 1 To remove the lower backplane cover, loosen the five screws that secure it to the ONS 15454 and pull it away from the shelf assembly. Step 2 Loosen the nine perimeter screws that hold the backplane sheet metal cover(s) in place.
Chapter 1 Hardware Installation Backplane Access 32069 Figure 1-11 Removing the lower backplane cover Retaining screws Procedure: Remove the Lower Backplane Cover Step 1 Unscrew the five retaining screws that hold the clear plastic cover in place. Step 2 Grasp the clear plastic cover at each side. Step 3 Gently pull the cover away from the backplane (shown in Figure 1-11). 1.5.2 Alarm Interface Panel The AIP is located above the alarm pin field on the lower section of the backplane.
Chapter 1 Hardware Installation EIA Installation 1.6 EIA Installation Optional EIA backplane covers are typically pre-installed when ordered with the ONS 15454. EIAs must be ordered when using DS-1, DS-3, DS3XM-6, or EC-1 cards. A minimum amount of assembly may be required when EIAs are ordered separately from the ONS 15454. Four different EIA backplane covers are available for the ONS 15454: BNC, High-Density BNC, SMB, and AMP Champ. This section describes each EIA in detail.
Chapter 1 Hardware Installation EIA Installation Figure 1-12 A BNC backplane for use in 1:1 protection schemes B 16 TX 14 TX RX TX RX 4 TX RX TX RX A 2 TX RX TX RX TX RX 1 7 1 7 1 7 1 7 2 8 2 8 2 8 2 8 3 9 3 9 3 9 3 9 4 10 4 10 4 10 4 10 5 11 5 11 5 11 5 11 6 RX TX 12 RX TX 6 RX TX 12 RX TX 6 RX TX 12 RX TX 6 RX TX 12 BNC backplane connectors Tie wrap posts RX 2076 TX RX The EIA side marked “A” has 24 pairs of BNC conn
Chapter 1 Hardware Installation EIA Installation To install coaxial cable with High-Density BNC connectors, see the “High-Density BNC Connector Installation” section on page 1-37.
Chapter 1 Hardware Installation EIA Installation Figure 1-14 An SMB EIA backplane B TX 12x DS-3s 16 RX TX 15 RX TX RX TX 14 RX TX 13 RX 6 12 TX TX RX 5 RX TX 4 RX TX 3 RX TX 2 RX TX A 1 RX TX RX 1 1 1 2 2 2 2 3 3 3 3 4 4 4 4 5 5 5 5 6 6 6 6 7 7 7 7 8 8 8 8 9 9 9 9 10 10 10 10 11 11 11 11 12 12 12 12 13 13 13 13 14 14 14 TX RX TX RX TX RX TX RX TX RX TX RX SMB backplane connectors Tie wrap posts 14 TX RX TX RX
Chapter 1 Hardware Installation EIA Installation For information about AMP champ cable management, see the “AMP Champ Cable Management” section on page 1-59. Figure 1-15 An AMP EIA Champ backplane 32070 AMP CHAMP connector The EIA side marked “A” hosts six AMP Champ connectors. The connectors are numbered 1 – 6 for the corresponding slots on the shelf assembly.
Chapter 1 Hardware Installation EIA Installation Procedure: Install a BNC, High-Density BNC, or SMB EIA See the “Install the AMP Champ EIA” procedure on page 1-24 if you are using an AMP Champ EIA. Step 1 To remove the lower backplane cover, loosen the five screws that secure it to the ONS 15454 and pull it away from the shelf assembly. Step 2 Remove the EIA card from the packaging. Line up the connectors on the card with the mating connectors on the backplane.
Chapter 1 Hardware Installation EIA Installation Figure 1-17 Installing the High-Density BNC EIA 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4 5 6 7 8 9 10 11 43766 12 43762 Figure 1-18 Installing the SMB EIA (use a balun for DS-1 connections) Cisco ONS 15454 Installation and Operations Guide November 2001 1-23
Chapter 1 Hardware Installation EIA Installation Procedure: Install the AMP Champ EIA Step 1 To remove the lower backplane cover, loosen the five screws that secure it to the ONS 15454 and pull it away from the shelf assembly. Step 2 Align the AMP Champ cover panel with the backplane and insert and tighten the nine perimeter screws (P/N 48-0358) at 8-10 lbs. Step 3 Align an AMP Champ card with the backplane connector and push until it fits snugly.
Chapter 1 Hardware Installation Fan-Tray Assembly Installation 1.7 Fan-Tray Assembly Installation The fan-tray assembly is located at the bottom of the ONS 15454 front compartment. The fan tray is a removable drawer that holds fans and fan-control circuitry for the ONS 15454. The front door can be left in place when removing or installing the fan tray but removal is recommended.
Chapter 1 Hardware Installation Fan-Tray Assembly Installation Procedure: Install the Bottom Brackets and Air Filter The shelf assembly ships with bottom brackets that you should use to install the air filter. The bottom brackets consist of two grooved metal pieces that attach to the bottom of the shelf assembly using three screws each. When you use the bottom bracket to install the fan-tray air filter, you do not need to remove the fan-tray assembly to access the air filter.
Chapter 1 Hardware Installation Fan-Tray Assembly Installation Step 4 Slide the air filter into the shelf assembly. Procedure: Install the Fan-Tray Assembly To install the fan-tray assembly, it is not necessary to move any of the cable-management facilities. Caution You must place the edge of the air filter flush against the front of the fan-tray assembly compartment when installing the fan tray on top of the filter. Failure to do so could result in damage to the filter, the fan tray, or both.
Chapter 1 Hardware Installation Power and Ground Installation 38532 Figure 1-21 Installing the fan-tray assembly FAN FAIL CR IT MA J MIN Fan tray assembly 1.8 Power and Ground Installation This section explains how to connect the ONS 15454 assembly to the power supply. Ground the equipment according to Telcordia standards or local practices. Warning Shut off the power from the power source or turn off the breakers before beginning work. Warning This equipment is intended to be grounded.
Chapter 1 Hardware Installation Power and Ground Installation Warning Connect the ONS 15454 only to a DC power source that complies with the safety extra-low voltage (SELV) requirements in IEC 60950-based safety standards. Warning The ONS 15454 relies on the protective devices in the building installation to protect against short circuit, overcurrent, and grounding faults. Ensure that the protective devices are properly rated to protect the system, and that they comply with national and local codes.
Chapter 1 Hardware Installation Power and Ground Installation Procedure: Install Redundant Power Feeds Ground only one cable to ground the shelf assembly. Terminate the other end of the ground cable to ground according to local site practice. The ONS 15454 backplane also has a ground terminal on the right side of the backplane. Connect a ground terminal for the frame ground (FGND) terminal according to local site practice.
Chapter 1 Hardware Installation Power and Ground Installation Step 3 Remove or loosen the #8 power terminal screws on the ONS 15454. To avoid confusion, label the cables connected to the BAT1/RET1 power terminals as 1, and the cables connected to the BAT2/RET2 power terminals as 2. Note Step 4 Caution Before you make any crimp connections, coat all bare conductors (battery, battery return, and frame ground) with an appropriate antioxidant compound.
Chapter 1 Hardware Installation Alarm, Timing, LAN, and Craft Pin Connections 1.9 Alarm, Timing, LAN, and Craft Pin Connections Caution Always use the supplied ESD wristband when working with a powered ONS 15454. Plug the wristband cable into the ESD jack located on the lower-right outside edge of the shelf assembly. The ONS 15454 has a backplane pin field located at the bottom of the backplane. The backplane pin field provides 0.
Chapter 1 Hardware Installation Alarm, Timing, LAN, and Craft Pin Connections Note The X.25, Modem, and TBOS pin fields are not active. 1.9.1 Alarm Installation The alarm pin field supports up to 17 alarm contacts, including four audible alarms, four visual alarms, one alarm cutoff (ACO), and four user-definable alarm input and output contacts. Audible alarm contacts are in the LOCAL ALARM AUD pin field and visual contacts are in the LOCAL ALARM VIS pin field.
Chapter 1 Hardware Installation Alarm, Timing, LAN, and Craft Pin Connections Table 1-2 External Timing Pin Assignments for BITS External Device Contact Tip & Ring Function First external device A3 (BITS 1 Out) Primary ring (-) Output to external device B3 (BITS 1 Out) Primary tip (+) Output to external device A4 (BITS 1 In) Secondary ring (-) Input from external device B4 (BITS 1 In) Secondary tip (+) Input from external device Primary ring (-) Output to external device B1 (BITS 2 O
Chapter 1 Hardware Installation Alarm, Timing, LAN, and Craft Pin Connections Table 1-3 LAN Pin Assignments Pin Field Backplane Pins RJ-45 Pins LAN 1 Connecting to data circuit-terminating equipment (DCE*) (a hub or switch) B2 1 A2 2 B1 3 A1 6 LAN 1 Connecting to data terminal equipment (DTE) (a PC/workstation or router) B1 1 A1 2 B2 3 A2 6 *The Cisco ONS 15454 is DCE. Procedure: Install LAN Wires on the Backplane Step 1 Use #22 or #24 AWG wire.
Chapter 1 Hardware Installation Coaxial Cable Installation Procedure: Install Craft Interface Wires on the Backplane Step 1 Use #22 or #24 AWG wire. Step 2 Wrap the craft interface wires on the appropriate wire-wrap pins according to local site practice. Note For information about attaching ferrites to wire-wrap pin fields, see the “Ferrite Installation” section on page 1-61. Step 3 Wrap the ground shield of the craft interface cable to the frame-ground pin.
Chapter 1 Hardware Installation Coaxial Cable Installation Step 3 Gently push the connector down until the notch backplane connector slides into the slot on the cable connector. Step 4 Turn the cable connector until the notch clicks into place. Step 5 Tie wrap or lace the cables to the EIA according to Telcordia standards (GR-1275-CORE) or local site practice. Step 6 Route the cables to the nearest side of the shelf assembly through the side cutouts according to local site practice.
Chapter 1 Hardware Installation Coaxial Cable Installation Procedure: Install Coaxial Cable With High-Density BNC Connectors Step 1 Place the BNC cable connector over the desired connection point on the backplane. Step 2 Using the insertions tool, position the cable connector so that the slot in the connector is over the corresponding notch at the backplane connection point. Step 3 Gently push the connector down until the notch backplane connector slides into the slot on the cable connector.
Chapter 1 Hardware Installation DS-1 Cable Installation 32100 Figure 1-26 Installing coaxial cable with SMB connectors Warning Step 5 Metallic interfaces for connection to outside plant lines (such as T1/E1/T3/E3, etc.) must be connected through a registered or approved device such as CSU/DSU or NT1. Label the transmit, receive, working, and protect cables at each end of the connection to avoid confusion with cables that are similar in appearance. 1.
Chapter 1 Hardware Installation DS-1 Cable Installation Caution Always use the supplied ESD wristband when working with a powered ONS 15454. Plug the wristband cable into the ESD jack located on the lower-right outside edge of the shelf assembly. If you use DS-1 electrical twisted-pair cables, equip the ONS 15454 with an SMB EIA on each side of the backplane where DS-1 cables will terminate.
Chapter 1 Hardware Installation DS-1 Cable Installation c. Terminate the shield ground wire on the DS-1 cable to ground according to local site practice. If you put DS1N-14 cards in Slots 3 and 15 to form 1:N protection groups, do not wire Slots 3 and 15 for DS-1 electrical interface adapters. Figure 1-28 shows a ONS 15454 backplane with an SMB EIA with DS-1 electrical interface adapters attached on both sides of the shelf assembly to create DS-1 twisted-pair termination points.
Chapter 1 Hardware Installation DS-1 Cable Installation Table 1-5 Pin Assignments for AMP Champ Connectors (Shaded Area Corresponds to White/Orange Binder Group) (continued) Signal/Wire Pin Pin Signal/Wire Signal/Wire Pin Pin Signal/Wire Tx Tip 3 white/green 3 35 Tx Ring 3 green/white Rx Tip 3 yellow/brown 19 51 Rx Ring 3 brown/yellow Tx Tip 4 white/brown 4 36 Tx Ring 4 brown/white Rx Tip 4 yellow/slate 20 52 Rx Ring 4 slate/yellow Tx Tip 5 white/slate 5 37 Tx Ring 5 slate/wh
Chapter 1 Hardware Installation DS-1 Cable Installation Table 1-6 Pin Assignments for AMP Champ Connectors (shielded DS1 cable) (continued) 64-Pin Blue Bundle Caution 64-Pin Orange Bundle Signal/Wire Pin Pin Signal/Wire Signal/Wire Pin Pin Signal/Wire Tx Tip 5 white/slate 5 37 Tx Ring 5 slate/white Rx Tip 5 white/slate 21 53 Rx Ring 5 slate/white Tx Tip 6 red/blue 6 38 Tx Ring 6 blue/red Rx Tip 6 red/blue 22 54 Rx Ring 6 blue/red Tx Tip 7 red/orange 7 39 Tx Ring 7 orange/re
Chapter 1 Hardware Installation Card Installation Step 3 Use the clips on the male AMP Champ connector to secure the connection. The female connector has grooves on the outside edge for snapping the clips into place. Note To install optical cable, you must first install optical cards. 1.12 Card Installation This section describes the how to install ONS 15454 cards. The procedure for installing ONS 15454 cards is nearly identical for each card.
Chapter 1 Hardware Installation Card Installation Warning Invisible laser radiation may be emitted from the end of the unterminated fiber cable or connector. Do not stare into the beam or view directly with optical instruments. Viewing the laser output with certain optical instruments (for example, eye loupes, magnifiers, and microscopes) within a distance of 100 mm may pose an eye hazard.
Chapter 1 Hardware Installation Card Installation Slots 7 and 11 are dedicated to TCC+ cards. Slots 8 and 10 are dedicated to cross-connect (XC, XCVT, XC10G) cards. Slot 9 is reserved for the optional Alarm Interface Controller (AIC) card. Slots 3 and 15 can also host DS1N-14 and DS3N-12 cards that are used in 1:N protection. Caution Do not operate the ONS 15454 with a single TCC+ card or a single XC/XCVT/XC10G card installed.
Chapter 1 Hardware Installation Card Installation Table 1-8 Card Ports, Line Rates, and Connectors (continued) Card Ports Line Rate per Port Connector Types Connector Location DS3N-12E 12 44.736 Mbps SMB or BNC* — DS3XM-6 6 44.736 Mbps SMB or BNC* Backplane EC1-12 12 51.
Chapter 1 Hardware Installation Card Installation Table 1-9 LED Activity during TCC+ and XC/XCVT/XC10G Card Installation Card Type TCC+ XC/XCVT/XC10G Note Step 6 Tip LED Activity 1. The red FAIL LED turns on and remains lit for 20 to 30 seconds. 2. The red FAIL LED blinks for 35 to 45 seconds. 3. The red FAIL LED remains lit for 5 to 10 seconds. 4. All LEDs (including the CRIT, MAJ, MIN, REM, SYNC, and ACO LEDs) blink once and turn off for 5 to 10 seconds. 5. The ACT/STBY LED turns on.
Chapter 1 Hardware Installation Card Installation Step 2 Slide the card along the guide rails into the correct slot. Step 3 Close the ejectors. Step 4 Verify that power is applied to the shelf assembly. Step 5 Verify the LED activity, as described in Table 1-10. Table 1-10 LED Activity during Optical and Electrical Card Installation Card Type OC-3, OC-12, OC-48, OC-192 DS-1, DS-3, EC-1 Ethernet LED Activity 1. The red FAIL LED turns on and remains lit for 20 to 30 seconds. 2.
Chapter 1 Hardware Installation Card Installation 1.12.2 Gigabit Interface Converter GBICs are hot-swappable input/output devices that plug into a Gigabit Ethernet (E1000-2 or E1000-2-G) card to link the card with the fiber-optic network. Cisco provides two GBIC models: one for short reach applications (part number 15454-GBIC-SX) and one for long-reach applications (15454-GBIC-LX). The short reach, or “SX” model, connects to multimode fiber and the long reach, or “LX” model, requires single-mode fiber.
Chapter 1 Hardware Installation Card Installation Figure 1-30 Installing a GBIC on an E1000-2 card E1000 2 Plug FAIL ACT SF RX 1 TX ACT/LINK ACT/LINK RX 2 33678 12931 Step 4 44734 TX Slide the GBIC through the cover flap until you hear a click. The click indicates the GBIC is locked into the slot. Warning GBICs are Class I laser products. These products have been tested and comply with Class I limits.
Chapter 1 Hardware Installation Fiber-Optic Cable Installation Procedure: Remove a Gigabit Interface Converter Step 1 Disconnect the network fiber cable from the GBIC SC connector. Step 2 Release the GBIC from the slot by simultaneously squeezing the two plastic tabs (one on each side of the GBIC). Step 3 Slide the GBIC out of the Gigabit Ethernet module slot. A flap closes over the GBIC slot to protect the connector on the Gigabit Ethernet card. 1.
Chapter 1 Hardware Installation Fiber-Optic Cable Installation Caution Do not user fiber loopbacks with the OC192 LR 1550 card unless you are using a 20 dB attentuator. Never connect a direct fiber loopback. Using fiber loopbacks causes irreparable damage to the OC-192 card. Procedure: Install Fiber-Optic Cables on OC-N Cards Note Step 1 Clean all fiber connectors thoroughly. Dust particles can degrade performance. Put caps on any fiber connectors that are not used.
Chapter 1 Hardware Installation Cable Routing and Management Step 1 Position the open slot of the fiber boot underneath the fiber cable. Step 2 Push the fiber cable down into the fiber boot. Step 3 Twist the fiber boot to lock the fiber cable into the tail end of the fiber boot. Slide the fiber boot forward along the fiber cable until the fiber boot fits snugly onto the end of the SC cable connector. Figure 1-32 Attaching a fiber boot SC cable connector Fiber boot 32092 Fiber optic line 1.
Chapter 1 Hardware Installation Cable Routing and Management Note To remove the reels, take out the screw in the center of each reel. Figure 1-33 shows the cable management facilities that you can access through the fold-down front door, including the cable-routing channel and the jumper routing fins. Figure 1-33 Managing cables on the front panel FAN FAIL CR IT MA J MIN 34238 Reversible jumper routing fins Fold down front door 1.14.
Chapter 1 Hardware Installation Cable Routing and Management Figure 1-34 Routing fiber-optic cables on the optical-card faceplate Faceplate connector FAIL ACT SF Cable connector Tx Rx Retaining clip 39140 Slot on cable management tray Fold down faceplate Cutout Procedure: Route Fiber-Optic Cables in the Shelf Assembly Step 1 Open the fold-down front door on the cable-management tray. Step 2 Route the cable on the card faceplate through the fiber clip on the faceplate.
Chapter 1 Hardware Installation Cable Routing and Management Figure 1-35 Fold-down front door of the cable-management tray (displaying the cable routing channel) FAN FAIL CR IT MA MIN 45063 J 1.14.2 Coaxial Cable Management Coaxial cables connect to EIAs on the ONS 15454 backplane using cable connectors. EIAs feature cable-management eyelets for tie wrapping or lacing cables to the cover panel.
Chapter 1 Hardware Installation Cable Routing and Management Figure 1-36 Routing coaxial cable through the SMB EIA backplane Connector ends B A 32079 Tie-wrap posts Tie-wraps 1.14.3 DS-1 Twisted-Pair Cable Management Connect twisted pair/DS-1cables to SMB EIAs on the ONS 15454 backplane using cable connectors and DS-1 electrical interface adapters (balun). Procedure: Route DS-1 Twisted-Pair Cables When using DS-1 twisted-pair cables, the backplane cover has cutouts over the SMB cable connectors.
Chapter 1 Hardware Installation Cable Routing and Management 1.14.4 AMP Champ Cable Management EIAs have cable management eyelets to tiewrap or lace cables to the cover panel. Tie wrap or lace the AMP Champ cables according to local site practice and route the cables. If you configure the ONS 15454 for a 23-inch rack, two additional inches of cable management area is available on each side of the shelf assembly.
Chapter 1 Hardware Installation Cable Routing and Management Figure 1-38 Backplane attachment for BIC cover 32073 Screw locations for attaching BIC rear cover 55374 S A UIT P N A -4 IN LE O B 65 2 N S A -C LE 0 TO TR S E O FO W -5 U R M at 7 C E B R ts V TI FE U M M dc S O O ax N R TI U S TO B N im . LE TI um IN N S S U G TA R O LL FA N A C TI E O .
Chapter 1 Hardware Installation Ferrite Installation 1.15 Ferrite Installation Place third-party ferrites on certain cables to dampen electromagnetic interference (EMI) from the ONS 15454. Ferrites must be added to meet the requirements of GR 1089. Refer to the ferrite manufacturer documentation for proper use and installation of the ferrites.
Chapter 1 Hardware Installation Ferrite Installation 32088 Figure 1-41 Attaching ferrites to AMP Champ connectors Figure 1-42 shows the suggested method for attaching ferrites to baluns. Use an oval ferrite TDK ZCAT 1730-0730 for each cable. Figure 1-42 Attaching ferrites to electrical interface adapters (baluns) A 32090 B Figure 1-43 shows the suggested method for attaching ferrites to SMB/BNC connectors.
Chapter 1 Hardware Installation Ferrite Installation Figure 1-43 Attaching ferrites to SMB/BNC connectors B 32089 A Procedure: Attach Ferrites to Wire-Wrap Pin Fields Use an oval ferrite TDK ZCAT1730-0730 and block ferrite Fair Rite 0443164151 for each pair of cables. Figure 1-44 shows the suggested method for attaching ferrites to wire-wrap pin fields. Step 1 Wrap the cables once around and through the block ferrites and pull the cables straight through the oval ferrites.
Chapter 1 Hardware Installation ONS 15454 Assembly Specifications 1.16 ONS 15454 Assembly Specifications This section contains hardware and software specifications for the ONS 15454. 1.16.1 Bandwidth • Total bandwidth: 240 Gbps • Data plane bandwidth: 160 Gbps • SONET plane bandwidth: 80 Gbps 1.16.
Chapter 1 Hardware Installation ONS 15454 Assembly Specifications • OC12 LR 1550 • OC48 IR 1310 • OC48 LR 1550 • OC48 IR/STM16 SH AS 1310 • OC48 LR/STM16 LH AS 1550 • OC192 LR 1550 • OC48 ELR DWDM • OC48 ELR 1550 • E100T-12 • E1000-2 • E100T-G • E1000-2-G Note The OC-3, OC-12, OC-48, and E1000-2 cards are Class 1 laser products (IEC 60825-1 2001-01/Class I laser product (21CFR 1040.10 and 1040.11).
Chapter 1 Hardware Installation ONS 15454 Assembly Specifications • Backplane access: LAN pin field 1.16.7 TL1 Craft Interface • Speed: 9600 bps • TCC+ access: RS-232 DB-9 type connector • Backplane access: CRAFT pin field 1.16.8 Modem Interface • Hardware flow control • TCC+: RS-232 DB-9 type connector 1.16.9 Alarm Interface • Visual: Critical, Major, Minor, Remote • Audible: Critical, Major, Minor, Remote • Alarm contacts: 0.045mm, -48V, 50 mA • Backplane access: Alarm pin fields 1.
Chapter 1 Hardware Installation Installation Checklist • Holdover Stability: 3.7 x10 -7/day, including temperature (< 255 slips in first 24 hours) • Reference: External BITS, line, internal 1.16.14 Power Specifications • Input power: -48 VDC • Power consumption: 55W (fan tray only); 650W (maximum draw w/cards) • Power Requirements: -42 to -57 VDC • Power terminals: #6 Lug 1.16.
Chapter 1 Hardware Installation ONS 15454 Software and Hardware Compatibility Matrix Table 1-11 Installation Checklist (continued) Description Check Power connections are fused properly (15A recommended). -48V DC (tolerance -42 to -57V DC) power is present at DC A and DC B terminals (if used) when power is applied. The fan-tray air filter is installed in the fan tray with the flow direction arrow on the filter frame pointing up. The fan-tray assembly is installed.
Chapter 1 Hardware Installation ONS 15454 Software and Hardware Compatibility Matrix Table 1-12 ONS 15454 Software and Hardware Compatibility (continued) Hardware 2.00.0x (2.0) 2.10.0x (2.1) 2.20.0x (2.2.0) 3.00.0x (3.0) 3.10.0x (3.
Chapter 1 Hardware Installation ONS 15454 Software and Hardware Compatibility Matrix Table 1-12 ONS 15454 Software and Hardware Compatibility (continued) Hardware 2.00.0x (2.0) 2.10.0x (2.1) 2.20.0x (2.2.0) 3.00.0x (3.0) 3.10.0x (3.
C H A P T E R 2 Software Installation Cisco Transport Controller (CTC), the Cisco ONS 15454’s software interface, is stored on the TCC+ card and download to your workstation each time you log into the ONS 15454.
Chapter 2 Software Installation Computer Requirements 3. If the computer does not have CTC installed, or if the installed release is older than the TCC+ version, the launcher downloads the CTC program files from the TCC+. 4. The launcher starts CTC. The CTC session is separate from the web browser session, so the web browser is no longer needed.
Chapter 2 Software Installation Computer Requirements Table 2-2 Computer Requirements for CTC Area Requirements Notes Processor Pentium II 300 MHz, UltraSPARC, or equivalent 300 Mhz is the recommended processor speed. You can use computers with less processor speed; however, you may experience longer response times and slower performance. RAM 128 MB Hard drive 2 GB Operating System Web browser CTC application files are downloaded from the TCC+ to your computer’s Temp directory.
Chapter 2 Software Installation Running the CTC Setup Wizard Note On PCs, the mouse pointer scheme should be set to Windows Standard (Windows 95/98) or None (Windows NT or Windows 2000). To check the settings, choose Settings and then Control Panel from the Windows Start menu. Double-click the Mouse option. From the Pointers tab of the Mouse Properties dialog box, select the Windows Standard (or “none” for NT or Windows 2000) mouse scheme. Click OK. 2.
Chapter 2 Software Installation Connecting PCs to the ONS 15454 Procedure: Reference the JRE (Solaris installations only) Step 1 Run the Control Panel by typing: [JRE]/j2rel1_3_0_01/bin/ControlPanel Step 2 Click the Advanced tab. Step 3 From the combo box, select [JRE]/j2rel1_3_0_01. If the JRE is not found, select other and enter the following in the Path text box: [JRE]/j2rel1_3_0_01 Step 4 Click Apply. 2.
Chapter 2 Software Installation Connecting PCs to the ONS 15454 Table 2-3 • DHCP (Dynamic Host Configuration Protocol) is not enabled on the ONS 15454 or the ONS 15454 is not connected to a DHCP server. If DHCP is enabled, go to Step 2. (For information about DHCP, see the“Setting Up Network Information” section on page 3-2.) • The ONS 15454 is not connected to a LAN. Setting Up Windows 95/98, Windows NT, and Windows 2000 PCs for Direct ONS 15454 Connections Windows 95/98 Windows NT 1.
Chapter 2 Software Installation Connecting PCs to the ONS 15454 b. Enter the Cisco ONS 15454 IP address in the web address (URL) field. If the connection is established, a Java Console window, CTC caching messages, and the Cisco Transport Controller Login dialog box display. If this occurs, go to Step 2 of the “Log into the ONS 15454” procedure on page 2-9 to complete the login. If the Login dialog box does not appear, complete Steps c and d. c.
Chapter 2 Software Installation Connecting PCs to the ONS 15454 Step 3 From the Internet Properties dialog box, click Connections > LAN Settings. Step 4 On the LAN Settings dialog box, either: • Deselect Use a proxy server to disable the service or • Leave Use a proxy server selected and click Advanced. On the Proxy Setting dialog box under Exceptions, enter the IP addresses of ONS 15454 nodes that you will access. Separate each address with a semicolon.
Chapter 2 Software Installation Logging into the ONS 15454 For information about using TL1 commands with the ONS 15454, see the Cisco ONS 15454 TL1 Command Guide. 2.5 Logging into the ONS 15454 After you set up the physical connections between the PC and ONS 15454 and change your PC network settings, you can log into CTC. Note If you encounter errors while logging in, refer to the Cisco ONS 15454 Troubleshooting and Maintenance Guide for possible causes.
Chapter 2 Software Installation Logging into the ONS 15454 Note Step 4 Step 5 The CISCO15 user is provided with every ONS 15454. CISCO15 has superuser privileges, so you can create other users. CISCO15 is delivered without a password. To create one, click the Provisioning > Security tabs after you log in and change the CISCO15 password. (You cannot delete the CISCO15 user.) For more information about ONS 15454 security, see the “Creating Users and Setting Security” section on page 3-6.
Chapter 2 Software Installation Logging into the ONS 15454 Figure 2-2 A login node group Laptop PC IP Address 192.168.106.100 LAN/WAN (Ethernet) Node 1 IP Address 192.168.106.143 Node 4 IP Address 192.168.105.119 Node 5 IP Address 192.168.104.109 Two node ring Node 2 Single Node 3 Node 6 IP Address 192.168.103.199 55029 Three node ring Procedure: Create a Login Node Group Step 1 From the CTC Edit menu, choose Preferences. Step 2 Click the Login Node Group tab and click Create Group.
Chapter 2 Software Installation Logging into the ONS 15454 2.5.2 Accessing ONS 15454s Behind Firewalls If an ONS 15454 or CTC computer resides behind a firewall that uses port filtering, you must receive an Internet Inter-ORB Protocol (IIOP) port from your network administrator and enable the IIOP port on the ONS 15454 and/or CTC computer, depending on whether one or both devices reside behind firewalls.
Chapter 2 Software Installation Working with the CTC Window Step 2 In node view, select the Provisioning > Network tabs.
Chapter 2 Software Installation Working with the CTC Window Figure 2-5 CTC window elements in the node view (default login view) Menu bar Tool bar Status area Top pane Graphic area Tabs Subtabs 61867 Bottom pane 2.6.1 Node View The CTC node view, shown in Figure 2-5, is the first view displayed after you log into an ONS 15454. The login node is the first node displayed, and it is the “home view” for the session. Node view allows you to view and manage one ONS 15454 node.
Chapter 2 Software Installation Working with the CTC Window 2.6.1.2 Node View Card Shortcuts If you move your mouse over cards in the graphic, tooltips display additional information about the card including the card type, card status (active or standby), the number of critical, major, and minor alarms (if any), and the alarm profile used by the card. Right-clicking a card reveals a shortcut menu, which you can use to open, reset, or delete a card. Right-click a slot (grey) to pre-provision a card (i.e.
Chapter 2 Software Installation Working with the CTC Window Figure 2-6 A four-node network displayed in CTC network view Icon color indicates node status Dots indicate the selected node 61868 Bold letters indicate login node; asterisk indicates topology host 2.6.2.
Chapter 2 Software Installation Working with the CTC Window Table 2-7 Performing Network Management Tasks in Network View Action Procedure Open a node Any of the following: • Double-click a node icon • Right-click a node icon, choose Drill Down to Node from the shortcut menu • Click a node and choose Go to Selected Object View from the CTC View menu • From the View menu, choose Other Node.
Chapter 2 Software Installation Working with the CTC Window Adding nodes to a domain 55023 Figure 2-7 After you add a node to a domain, the span lines leading to nodes within the domain become thicker (Figure 2-8). The thick lines may represent multiple spans. For example, if the “rio-104” node in Figure 2-8 is connected to two nodes within domain-0, the thick line represents two spans. The thick line is green if all spans it represents are active and grey if any one span it represents is down.
Chapter 2 Software Installation Working with the CTC Window Table 2-8 Managing Domains Action Procedure Create a domain Right-click the network map and choose Create New Domain from the shortcut menu. When the domain icon appears on the map, type the domain name. Move a domain Pressing Ctrl, drag the domain icon to the new location. Rename a domain Right-click the domain icon and choose Rename Domain from the shortcut menu. Type the new name in the domain name field.
Chapter 2 Software Installation Working with the CTC Window Note You can obtain the longitude and latitude for cities and Zip Codes from the U.S. Census Bureau U.S. Gazetteer website (http://www.census.gov/cgi-bin/gazetteer). Procedure: Change the Network View Background Image Caution Before you begin this procedure, verify that the image file you want to use is located on your hard drive and is in JPEG or GIF format.
Chapter 2 Software Installation Working with the CTC Window 61872 Figure 2-11 Network view with a custom map image Step 7 At the network view, use the CTC toolbar Zoom buttons (or right-click the graphic area and select a Zoom command from the shortcut menu) to set the area of the image you can view. Procedure: Add a Node to the Current Session During a CTC session, you can add nodes that are not displayed in the session without having to log out of the session.
Chapter 2 Software Installation CTC Navigation Note CTC displays a card view for all ONS 15454 cards except the TCC+, XC, XCVT, and XC10G cards. Card view provides access to the following tabs: Alarms, History, Circuits, Provisioning, Maintenance, Performance, and Conditions. (The Performance tab is not displayed for the AIC card.) The subtabs, fields, and information displayed under each tab depend on the card type selected.
Chapter 2 Software Installation CTC Navigation Figure 2-13 CTC node view showing popup information 61870 Moving the mouse over the CTC window objects displays ONS 15454 status information Table 2-9 describes different methods for navigating within the CTC window.
Chapter 2 Software Installation Viewing CTC Table Data Table 2-9 CTC Window Navigation (continued) Technique Right-Click Move Mouse Cursor Description • Network view graphic area—Displays a menu where you can create a new domain, change the position and zoom level of the graphic image, and change the background image and color.
Chapter 2 Software Installation Viewing CTC Table Data Figure 2-14 Table shortcut menu that customizes table appearance 61871 Column preferences Table 2-10 lists the options that you can use to customize information that is displayed in CTC tables.
Chapter 2 Software Installation Printing and Exporting CTC Data 2.9 Printing and Exporting CTC Data You can print CTC windows and table data such as alarms and inventory. You can also export CTC table data for use by other applications such as spreadsheets, word processors, and database management applications. Table 2-11 shows CTC data that can be exported.
Chapter 2 Software Installation Printing and Exporting CTC Data Table 2-11 Table Data with Export Capability (continued) View or Card AIC Card Tab Subtab(s) Provisioning Line/Alarm Behavior Alarms Conditions History Session/Card Circuits EC1-12 Provisioning External Alarms/External Controls Maintenance External Alarms/External Controls/Virtual Wires Alarms Conditions History Session/Card Circuits Provisioning Line/Threshold/STS/Alarm Behavior Maintenance Performance DS3XM-6 Alarms Condi
Chapter 2 Software Installation Printing and Exporting CTC Data • Table Contents—Prints CTC data in table format; this option is only available for CTC table data (see the “Viewing CTC Table Data” section on page 2-24). Figure 2-15 Selecting CTC data for print Step 3 Click OK. Step 4 In the Windows Print dialog, choose a printer and click Print. Procedure: Export CTC Data Step 1 From the CTC File menu, click Export.
Chapter 2 Software Installation Displaying CTC Data in Other Applications Step 5 Navigate to a directory where you want to store the file. Step 6 Click OK. 2.10 Displaying CTC Data in Other Applications CTC data exported in HTML format can be viewed with any web browser, such as Netscape Navigator or Microsoft Internet Explorer. To display the data, use the browser’s File/Open command to open the CTC data file.
Chapter 2 Software Installation Displaying CTC Data in Other Applications Cisco ONS 15454 Installation and Operations Guide 2-30 November 2001
C H A P T E R 3 Node Setup This chapter explains how to set up a Cisco ONS 15454 node using the Cisco Transport Controller (CTC).
Chapter 3 Node Setup Setting Up Basic Node Information 3.2 Setting Up Basic Node Information Setting basic information for each Cisco ONS 15454 node is one of the first provisioning tasks you perform. This information includes node name, location, contact, and timing. Completing the information for each node facilitates ONS 15454 management, particularly when the node is connected to a large ONS 15454 network.
Chapter 3 Node Setup Setting Up Network Information Subnetting enables LAN administrators to create subnetworks that are transparent to the Internet. Within networks, ONS 15454s often exist as subnetworks, which are created by adding a subnet mask to the ONS 15454 IP address. The following procedure tells you how to set up the essential ONS 15454 networking information.
Chapter 3 Node Setup Setting Up Network Information Figure 3-1 Setting up general network information Step 3 Click Apply. Step 4 Click Yes on the confirmation dialog box. Both ONS 15454 TCC+ cards will reboot, one at a time. Procedure: Change IP Address, Default Router, and Network Mask Using the LCD You can change the ONS 15454 IP address, subnet mask, and default router address using the Slot, Status, and Port buttons on the front panel LCD.
Chapter 3 Node Setup Setting Up Network Information Selecting the IP address option Slot Status Port Slot-0 Status=IpAddress FAN FAIL MAJ MIN Press the Status button to display the node IP address (Figure 3-3), the node subnet mask length, or default router IP address. Figure 3-3 Changing the IP address Slot Status Port 172.020.214.
Chapter 3 Node Setup Creating Users and Setting Security Saving the new configuration causes the TCC+ cards to reboot. During the reboot, a “Saving Changes TCC Reset” message displays on the LCD. The LCD returns to the normal alternating display after the TCC+ reboot is complete. 3.4 Creating Users and Setting Security The CISCO15 user provided with each ONS 15454 can be used to set up other ONS 15454 users. You can add up to 500 users to one ONS 15454.
Chapter 3 Node Setup Creating Users and Setting Security Table 3-1 ONS 15454 Security Levels—Node View (continued) CTC Tab Inventory Subtab Actions Alarming n/a Retrieve Provisioning Superuser Edit X X Delete X X X X Reset Maintenance Database EtherBridge Maintenance X Backup/Restore Spanning Tree Retrieve X X Spanning Tree Clear/Clear all MAC Table Retrieve X MAC Table Clear/Clear all Trunk Utilization Refresh X X X X X X X X X X X X X X X X Protection Switch/loc
Chapter 3 Node Setup Creating Users and Setting Security Procedure: Create New Users Step 1 In network view, select the Provisioning > Security tabs. Step 2 On the Security pane, click Create. Step 3 In the Create User dialog box, enter the following: • Name—Type the user name. • Password—Type the user password.
Chapter 3 Node Setup Creating Protection Groups Step 5 Click OK and click Apply. 3.5 Creating Protection Groups The ONS 15454 provides several card protection methods. When you set up protection for ONS 15454 cards, you must choose between maximum protection and maximum slot availability. The highest protection reduces the number of available card slots; the highest slot availability reduces the protection. Table 3-3 shows the protection types that can be set up for ONS 15454 cards.
Chapter 3 Node Setup Creating Protection Groups Based on these selections, a list of available working cards or ports is displayed under Available Cards or Available Ports. Figure 3-6 shows a 1+1 protection group. Figure 3-6 Creating a 1+1 protection group Step 4 From the Available Cards or Available Ports list, choose the card or port that you want to be the working card or port (the card(s) or port(s) that will be protected by the card or port selected in Protect Cards or Protect Ports).
Chapter 3 Node Setup Creating Protection Groups Step 2 Click the Provisioning > Line tabs. Step 3 Change the port status to In Service. Step 4 Click Apply. Procedure: Edit Protection Groups Step 1 From the CTC node view, click the Provisioning > Protection tabs (Figure 3-7). Figure 3-7 Editing protection groups Step 2 In the Protection Groups section, choose a protection group. Step 3 In the Selected Group section, edit the fields as appropriate.
Chapter 3 Node Setup Setting Up ONS 15454 Timing Step 2 Verify that working traffic is not running on the protect card: a. In the Protection Groups section, choose the group you want to delete. b. In the Selected Group section, verify that the protect card is in standby mode. If it is in standby mode, continue with Step 3. If it is active, complete Step c. c. If the working card is in standby mode, manually switch traffic back to the working card.
Chapter 3 Node Setup Setting Up ONS 15454 Timing 3.6.1 Network Timing Example Figure 3-8 shows an ONS 15454 network timing setup example. Node 1 is set to external timing. Two timing references are set to BITS. These are Stratum 1 timing sources wired to the BITS input pins on the Node 1 backplane. The third reference is set to internal clock. The BITS output pins on the backplane of Node 3 are used to provide timing to outside equipment, such as a Digital Access Line Access Multiplexer.
Chapter 3 Node Setup Setting Up ONS 15454 Timing 3.6.2 Synchronization Status Messaging Synchronization Status Messaging (SSM) is a SONET protocol that communicates information about the quality of the timing source. SSM messages are carried on the S1 byte of the SONET Line layer. They enable SONET devices to automatically select the highest quality timing reference and to avoid timing loops. SSM messages are either Generation 1 or Generation 2.
Chapter 3 Node Setup Setting Up ONS 15454 Timing Step 3 • Timing Mode—Set to External if the ONS 15454 derives its timing from a BITS source wired to the backplane pins; set to Line if timing is derived from an OC-N card that is optically connected to the timing node. A third option, Mixed, allows you to set external and line timing references. (Because Mixed timing may cause timing loops, Cisco does not recommend its use. Use this mode with care.
Chapter 3 Node Setup Setting Up ONS 15454 Timing – Timing Mode set to Line—options are the node’s working optical cards and Internal Clock. Select the cards/ports that are directly or indirectly connected to the node wired to the BITS source, that is, the node’s trunk cards. Set Reference 1 to the trunk card that is closest to the BITS source. For example, if Slot 5 is connected to the node wired to the BITS source, select Slot 5 as Reference 1.
Chapter 3 Node Setup Setting Up ONS 15454 Timing Procedure: Set Up Internal Timing If no BITS source is available, you can set up internal timing by timing all nodes in the ring from the internal clock of one node. Caution Internal timing is Stratum 3 and not intended for permanent use. All ONS 15454s should be timed to a Stratum 2 or better primary reference source. Step 1 Log into the node that will serve as the timing source. Step 2 In the CTC node view, click the Provisioning > Timing tabs.
Chapter 3 Node Setup Viewing ONS 15454 Inventory Step 11 Repeat Steps 7–10 at each node that will be timed by the node in Step 3. 3.7 Viewing ONS 15454 Inventory The Inventory tab (Figure 3-10) displays information about cards installed in the ONS 15454 node including part numbers, serial numbers, hardware revisions, and equipment types. The tab provides a central location to obtain information and to determine applicability of ONS 15454 Product Change Notices (PCNs) and Field Service Bulletins (FSBs).
Chapter 3 Node Setup Viewing CTC Software Versions • HW Part #—Card part number; this number is printed on the top of the card • HW Rev—Card revision number • Serial #—Card serial number; this number is unique to each card • CLEI Code—Common Language Equipment Identifier code • Firmware Rev—Revision number of the software used by the ASIC chip installed on the card 3.
Chapter 3 Node Setup Viewing CTC Software Versions Cisco ONS 15454 Installation and Operations Guide 3-20 November 2001
C H A P T E R 4 IP Networking This chapter explains how to set up Cisco ONS 15454s in internet protocol (IP) networks and includes: • Scenarios showing Cisco ONS 15454s in common IP network configurations • Procedures for creating static routes • Procedures for using the Open Shortest Path First (OSPF) protocol The chapter does not provide a comprehensive explanation of IP networking concepts and procedures.
Chapter 4 IP Networking ONS 15454 IP Addressing Scenarios 4.2 ONS 15454 IP Addressing Scenarios ONS 15454 IP addressing generally has seven common scenarios or configurations. Use the scenarios as building blocks for more complex network configurations. Table 4-1 provides a general list of items to check when setting up ONS 15454s in IP networks. Additional procedures for troubleshooting Ethernet connections and IP networks are provided in Chapter 9, “Ethernet Operation.
Chapter 4 IP Networking ONS 15454 IP Addressing Scenarios Figure 4-1 Scenario 1: CTC and ONS 15454s on same subnet CTC Workstation IP Address 192.168.1.100 Subnet Mask 255.255.255.0 Default Gateway = N/A Host Routes = N/A LAN A ONS 15454 #2 IP Address 192.168.1.20 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A SONET RING ONS 15454 #3 IP Address 192.168.1.30 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A 33157 ONS 15454 #1 IP Address 192.168.1.
Chapter 4 IP Networking ONS 15454 IP Addressing Scenarios Figure 4-2 Scenario 2: CTC and ONS 15454s connected to router LAN A Int "A" CTC Workstation IP Address 192.168.1.100 Subnet Mask 255.255.255.0 Default Gateway = 192.168.1.1 Host Routes = N/A Int "B" Router IP Address of interface “A” to LAN “A” 192.168.1.1 IP Address of interface “B” to LAN “B” 192.168.2.1 Subnet Mask 255.255.255.0 Default Router = N/A Host Routes = N/A LAN B ONS 15454 #2 IP Address 192.168.2.20 Subnet Mask 255.255.255.
Chapter 4 IP Networking ONS 15454 IP Addressing Scenarios Figure 4-3 Scenario 3: Using Proxy ARP CTC Workstation IP Address 192.168.1.100 Subnet Mark at CTC Workstation 255.255.255.0 Default Gateway = N/A LAN A ONS 15454 #1 IP Address 192.168.1.10 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A SONET RING ONS 15454 #3 IP Address 192.168.1.30 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes = N/A 33159 ONS 15454 #2 IP Address 192.168.1.20 Subnet Mask 255.255.255.
Chapter 4 IP Networking ONS 15454 IP Addressing Scenarios 4.2.4 Scenario 4: Default Gateway on CTC Computer Scenario 4 is similar to Scenario 3, but nodes #2 and #3 reside on different subnets, 192.168.2.0 and 192.168.3.0, respectively (Figure 4-4). Node #1 and the CTC computer are on subnet 192.168.1.0. The network includes different subnets because Proxy ARP is not used.
Chapter 4 IP Networking ONS 15454 IP Addressing Scenarios Figure 4-5 Scenario 5: Static route with one CTC computer used as a destination Router IP Address of interface ”A” to LAN “A” 192.168.1.1 IP Address of interface “B” to LAN “B” 192.168.2.1 Subnet Mask 255.255.255.0 LAN A Int "A" CTC Workstation IP Address 192.168.1.100 Subnet Mask 255.255.255.0 Default Gateway = 192.168.1.1 Host Routes = N/A Int "B" LAN B ONS 15454 #1 IP Address 192.168.2.10 Subnet Mask 255.255.255.0 Default Router = 192.168.
Chapter 4 IP Networking ONS 15454 IP Addressing Scenarios Figure 4-6 Scenario 5: Static route with multiple LAN destinations LAN D Router #3 LAN C Router #2 Router #1 IP Address of interface ”A” to LAN “A” 192.168.1.1 IP Address of interface “B” to LAN “B” 192.168.2.1 Subnet Mask 255.255.255.0 LAN A CTC Workstation IP Address 192.168.1.100 Subnet Mask 255.255.255.0 Default Gateway = 192.168.1.1 Host Routes = N/A Int "A" Int "B" LAN B ONS 15454 #1 IP Address 192.168.2.10 Subnet Mask 255.255.255.
Chapter 4 IP Networking ONS 15454 IP Addressing Scenarios Step 4 • Mask—Enter a subnet mask. If the destination is a host route (i.e., one CTC computer), enter a 32-bit subnet mask (255.255.255.255). If the destination is a subnet, adjust the subnet mask accordingly, for example, 255.255.255.0. If the destination is 0.0.0.0, enter a subnet mask of 0.0.0.0 to provide access to all CTC computers. • Next Hop—Enter the IP address of the router port (in this example, 192.168.90.
Chapter 4 IP Networking ONS 15454 IP Addressing Scenarios Figure 4-7 Scenario 6: Static route for multiple CTCs CTC Workstation #1 IP Address 192.168.1.100 Subnet Mask 255.255.255.0 Default Gateway = N/A LAN A ONS 15454 #1 IP Address 192.168.1.10 Subnet Mask 255.255.255.0 Default Router = N/A Static Routes Destination 192.168.1.100 Mask 255.255.255.255 Next Hop 192.168.1.10 Cost = 1 SONET RING ONS 15454 #2 IP Address 192.168.1.20 Subnet Mask 255.255.255.
Chapter 4 IP Networking ONS 15454 IP Addressing Scenarios the need to manually enter static routes for ONS 15454 subnetworks. Figure 4-7 shows the same network enabled for OSPF. Figure 4-9 shows the same network without OSPF. Static routes must be manually added to the router in order for CTC computers on LAN A to communicate with ONS 15454 #2 and #3 because these nodes reside on different subnets. OSPF divides networks into smaller regions, called areas.
Chapter 4 IP Networking ONS 15454 IP Addressing Scenarios Figure 4-9 Scenario 7: OSPF not enabled LAN A Int "A" CTC Workstation IP Address 192.168.1.100 Subnet Mask 255.255.255.0 Default Gateway = 192.168.1.1 Host Routes = N/A Router IP Address of interface “A” to LAN A 192.168.1.1 IP Address of interface “B” to LAN B 192.168.2.1 Subnet Mask 255.255.255.0 Static Routes = Destination 192.168.3.20 Next Hop 192.168.2.10 Destination 192.168.4.30 Next Hop 192.168.2.
Chapter 4 IP Networking ONS 15454 IP Addressing Scenarios Figure 4-10 Enabling OSPF on the ONS 15454 Step 3 Step 4 Step 5 Step 6 On the top left side, complete the following: • DCC OSPF Area ID—Enter the number that identifies the ONS 15454s as a unique OSPF area. The OSPF area number can be an integer between 0 and 4294967295, and it can take a form similar to an IP address. The number must be unique to the LAN OSPF area. • DCC Metric—This value is normally unchanged.
Chapter 4 IP Networking ONS 15454 IP Addressing Scenarios The OSPF priority and intervals default to values most commonly used by OSPF routers. In the Priority and Invervals area, verify that these values match those used by the OSPF router where the ONS 15454 is connected. Step 7 • Router Priority—Used to select the designated router for a subnet. • Hello Interval (sec)—Sets the number of seconds between OSPF “hello” packet advertisements sent by OSPF routers. Ten seconds is the default.
Chapter 4 IP Networking Viewing the ONS 15454 Routing Table Dead Int (sec)—Sets the number of seconds that will pass while an OSPF router’s packets are not visible before its neighbors declare the router down. Forty seconds is the default. c. Step 9 Click OK. After entering ONS 15454 OSPF area data, click Apply. If you changed the Area ID, the TCC+ cards will reset, one at a time. 4.
Chapter 4 IP Networking Viewing the ONS 15454 Routing Table Figure 4-11 Viewing the ONS 15454 routing table Table 4-2 shows sample routing entries for an ONS 15454. Table 4-2 Sample Routing Table Entries Entry Destination Mask Gateway Interface 1 0.0.0.0 0.0.0.0 172.20.214.1 cpm0 2 172.20.214.0 255.255.255.0 172.20.214.92 cpm0 3 172.20.214.92 255.255.255.255 127.0.0.1 lo0 4 172.20.214.93 255.255.255.255 0.0.0.0 pdcc0 5 172.20.214.94 255.255.255.255 172.20.214.
Chapter 4 IP Networking Viewing the ONS 15454 Routing Table • Mask (255.255.255.0) is a 24-bit mask, meaning all addresses within the 172.20.214.0 subnet can be a destination. • Gateway (172.20.214.92) is the gateway address. All outbound traffic belonging to this network is sent to this gateway. • Interface (cpm0) indicates that the ONS 15454 Ethernet interface is used to reach the gateway. Entry #3 shows the following: • Destination (172.20.214.92) is the destination host IP address.
Chapter 4 IP Networking Viewing the ONS 15454 Routing Table Cisco ONS 15454 Installation and Operations Guide 4-18 November 2001
C H A P T E R 5 SONET Topologies This chapter explains how to set up the Cisco ONS 15454 in different SONET topologies, including: • Two-fiber and four-fiber bidirectional line switched rings (BLSRs) • Unidirectional path switched rings (UPSRs) • Subtending rings • Linear add/drop multiplexers (ADMs) • Path-protected mesh networks (PPMNs) 5.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Note Two-fiber BLSRs can support up to 24 ONS 15454s, but switch times are slightly longer for rings containing more than 16 nodes. BLSRs with 16 or fewer nodes will meet the GR-1230 switch time requirement. Four-fiber BLSRs can only support 16 nodes. 5.2.1 Two-Fiber BLSRs In two-fiber BLSRs, each fiber is divided into working and protect bandwidths.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings The SONET K1 and K2 bytes carry the information that governs BLSR protection switches. Each BLSR node monitors the K bytes to determine when to switch the SONET signal to an alternate physical path. The K bytes communicate failure conditions and actions taken between nodes in the ring. If a break occurs on one fiber, working traffic targeted for a node beyond the break switches to the protect bandwidth on the second fiber.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Figure 5-3 Four-node, two-fiber BLSR traffic pattern following line break Node 0 Node 3 OC-48 Ring Node 1 Fiber 1 Node 2 Fiber 2 61957 Traffic flow 5.2.2 Four-Fiber BLSRs Four-fiber BLSRs double the bandwidth of two-fiber BLSRs. Because they allow span switching as well as ring switching, four-fiber BLSRs increase the reliability and flexibility of traffic protection.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Figure 5-4 A four-node, four-fiber BLSR Node 0 Span 4 Span 1 Span 5 Span 8 OC-48 Ring Span 6 Node 1 Span 7 Span 3 Span 2 = Working fibers = Protect fibers Node 2 61932 Node 3 Four-fiber BLSRs provide span and ring switching: • Span switching (Figure 5-5) occurs when a working span fails. Traffic switches to the protect fibers between the nodes (Node 0 and Node 1 in the Figure 5-5 example) and then returns to the working fibers.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Figure 5-5 A four-fiber BLSR span switch Node 0 Span 4 Span 1 Span 5 Span 8 OC-48 Ring Node 3 Span 6 Node 1 Span 7 Span 2 = Working fibers = Protect fibers Node 2 Figure 5-6 61959 Span 3 A four-fiber BLSR ring switch Node 0 Span 1 Span 4 Span 5 Span 8 OC-48 Ring Span 6 Node 1 Span 7 Span 3 Span 2 = Working fibers Node 2 = Protect fibers 61960 Node 3 Cisco ONS 15454 Installation and Operations Guide 5-6 78-13453-01
Chapter 5 SONET Topologies Bidirectional Line Switched Rings 5.2.3 BLSR Bandwidth BLSR nodes can terminate traffic that is fed from either side of the ring. Therefore, BLSRs are suited for distributed node-to-node traffic applications such as interoffice networks and access networks. BLSRs allow bandwidth to be reused around the ring and can carry more traffic than a network with traffic flowing through one central hub. BLSRs can also carry more traffic than a UPSR operating at the same OC-N rate.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Figure 5-7 BLSR bandwidth reuse Node 0 STS#1 STS#1 Node 1 Node 3 STS#1 STS#1 Node 2 = Node 1 – Node 2 traffic = Node 2 – Node 3 traffic 32131 = Node 3 – Node 1 traffic 5.2.4 Sample BLSR Application Figure 5-8 shows a sample two-fiber BLSR implementation. A regional long-distance network connects to other carriers at Node 0. Traffic is delivered to the service provider’s major hubs.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Figure 5-8 A five-node BLSR Carrier 1 2 OC-3s Carrier 2 56 local 12 DS-3s DS-1s 4 DS-1s Node 0 14 DS-1s Node 1 14 DS-1s 2 DS-1s Node 4 Node 2 14 DS-1s 8 DS-3s = Fiber 1 4 DS-1s 14 DS-1s = Fiber 2 32138 Node 3 Figure 5-9 shows the shelf assembly layout for Node 0, which has one free slot. Figure 5-10 shows the shelf assembly layout for the remaining sites in the ring.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Figure 5-9 Shelf assembly layout for Node 0 in Figure 5-8 32640 DS3-12 DS3-12 OC3 OC3 OC48 OC48 TCC XCVT AIC (Optional) XCVT TCC Free Slot DS1-14 DS1-14 DS1N-14 DS1-14 DS1-14 Figure 5-10 Shelf assembly layout for Nodes 1 – 4 in Figure 5-8 32140 DS3-12 DS3-12 Free Slot Free Slot OC48 OC48 TCC XCVT AIC (Optional) XCVT TCC Free Slot Free Slot Free Slot Free Slot DS1-14 DS1-14 5.2.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings • Create the BLSR DCC terminations. See the “Create the BLSR DCC Terminations” procedure on page 5-13. • Enable the BLSR ports. See the “Enable the BLSR Ports” procedure on page 5-13. • Set up BLSR timing. See the “Set up ONS 15454 Timing” procedure on page 3-14. • Provision the BLSR. See the “Provision the BLSR” procedure on page 5-14.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Figure 5-11 Connecting fiber to a four-node, two-fiber BLSR West Tx Rx East West Slot 12 Slot 5 Tx Rx East Slot 12 Slot 5 Node 1 Node 2 Tx Rx Tx Rx West Tx Rx Tx Rx East West Slot 12 Slot 5 Tx Rx East Slot 12 Slot 5 Node 3 55297 Tx Rx Node 4 Figure 5-12 Connecting fiber to a four-node, four-fiber BLSR Node 2 Tx Rx Tx Rx East West Slot Slot 12 13 Slot Slot 6 5 Tx Rx West East West Slot Slot 12 13 Slot Slot
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Procedure: Create the BLSR DCC Terminations Step 1 Log into the first node that will be in the BLSR. Step 2 Click the Provisioning > Sonet DCC tabs. Step 3 In the SDCC Terminations section, click Create. Step 4 On the Create SDCC Terminations dialog, press Ctrl and click the two slots/ports that will serve as the BLSR ports at the node. For example, Slot 5 (OC-48)/Port 1 and Slot 12 (OC-48)/ Port 1.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Figure 5-13 Enabling an optical port Step 5 Repeat Steps 2 – 4 for the other optical card configured as a DCC termination. Step 6 (Four-fiber BLSR only) Repeat Steps 2 – 4 for each protect card. Step 7 Repeat Steps 2 – 5 at each node that will be in the BLSR. After configuring the SONET DCC, set the timing for the node. For procedures, see the “Setting Up ONS 15454 Timing” section on page 3-12.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings • East Port—Assign the east BLSR port for the node from the pull-down menu. (In Figure 5-11, this is Slot 12.) The east and west ports must match the fiber connections and DCC terminations set up in the “Install the BLSR Trunk Cards” procedure on page 5-11 and the “Create the BLSR DCC Terminations” procedure on page 5-13.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Step 9 On the BLSR Ring Map dialog box, verify that the ring map contains all the nodes you provisioned in the expected order. If so, click Accept. If the nodes do not appear, or are not in the expected order, repeat Steps 1 – 8, making sure no errors are made.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings c. Click Status and choose In Service. d. Click Apply. e. Repeat Steps a – d for each new OC-N card at each BLSR node. Step 4 Connect the fiber to the new cards. Use the same east – west connection scheme that was used to create the two-fiber connections. Figure 5-12 shows an example. Step 5 Test the new fiber connections using procedures standard for your site.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings 5.2.7 Adding and Removing BLSR Nodes This section explains how to add and remove BLSR nodes. To add or remove a node, you force a protection switch to route traffic away from the span where you will add or remove the node. Figure 5-15 shows a three-node BLSR before the new node is added. To add Node 3, you would: Note • Force a protection switch on the Node 1 (Slot 5, West) and Node 4 (Slot 12, East) span.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Step 2 Log into CTC and display the BLSR nodes in network view. Verify the following: • All BLSR spans on the network map are green. • On the Alarms tab, no critical or major alarms are present, nor any facility alarms, such as LOS, LOF, AIS-L, SF, and SD. In a BLSR, these facility conditions may be reported as minor alarms. • On the Conditions tab, no ring switches are active.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Figure 5-16 A BLSR with a newly-added fourth node Tx Rx West Tx Rx East West Slot 12 Slot 5 Tx Rx Tx Rx Slot 12 Slot 5 Node 1 East Node 2 Node 1 Fiber connected to Slot 12 (East) West East West Slot 12 Slot 5 Node 3 Tx Rx Tx Rx East Slot 12 Slot 5 Node 4 Fiber connected to Slot 5 (West) 68119 Tx Rx Tx Rx Node 4 Step 11 Log out of CTC and then log back into any node in the BLSR.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Procedure: Remove a BLSR Node Caution Step 1 The following procedure minimizes traffic outages during node deletions, but traffic will be lost when you delete and recreate circuits that passed through the deleted node. Before you start this procedure, make sure you know the following: • Which node is connected through its east port to the node that will be deleted.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Step 7 Use information recorded in Step 1 to switch traffic away from the ports of neighboring nodes that will be disconnected when the node is removed: Caution Traffic is unprotected during the protection switch. a. Open the neighboring node that is connected through its east port to the removed node. b. Click the Maintenance > Ring tabs. c. From the East Switch list, choose FORCE RING. Click Apply. d.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Figure 5-17 shows a four node OC-48 BLSR using trunk cards in Slots 6 and 12 at all four nodes. Trunk cards will be moved at Node 4 from Slots 6 and 12 to Slots 5 and 6. To do this Node 4 is temporarily removed from the active BLSR while the trunk cards are switched.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings Figure 5-18 A four-node BLSR after the trunk cards are switched at one node Slot 6 (West) Slot 12 (East) Node 1 Node 2 Slot 12 (East) Slot 6 (West) Slot 12 (East) Slot 5 (West) Node 3 Node 4 Slot 6 (West) Unchanged fiber route Changed fiber route 67551 Slot 6 (East) Procedure: Move a BLSR Trunk Card Use the following steps to move one BLSR trunk card to a different slot. Use this procedure for each card you want to move.
Chapter 5 SONET Topologies Bidirectional Line Switched Rings When you perform a manual switch, a manual switch request equipment alarm (MANUAL-REA) is generated. This is normal. Caution Traffic is unprotected during a protection switch. c. Log into the node that is connected through its west port to the node where the trunk card will be moved. (In the Figure 5-17 example, this is Node 3.) Click the Maintenance > Ring tabs. d. From the West Switch list, choose FORCE RING. Click Apply.
Chapter 5 SONET Topologies Unidirectional Path Switched Rings Step 7 Disable the ring on the current node: a. Click the Provisioning > Ring tabs. b. Highlight the ring and click Delete. c. On the confirmation message, confirm that this is the ring you want to delete. If so, click Yes. Step 8 If an OC-N card is a timing source, select the Provisioning > Timing tabs and set timing to Internal. Step 9 Place the ports on the card out of service: a. Double-click the card. b.
Chapter 5 SONET Topologies Unidirectional Path Switched Rings Figure 5-20 A basic four-node UPSR ONS 15454 Node ID 0 ONS 15454 Node ID 3 ONS 15454 Node ID 1 ONS 15454 Node ID 2 32148 = Fiber 1 = Fiber 2 Figure 5-21 A UPSR with a fiber break Source ONS 15454 Node ID 0 Span 4 Span 5 Span 8 ONS 15454 Node ID 3 ONS 15454 Node ID 1 Span 6 Span 3 Span 1 Span 7 Span 2 Destination ONS 15454 Node ID 2 = Fiber 1 = Fiber 2 32639 Fiber break Cisco ONS 15454 Installation and Operations Guide Nove
Chapter 5 SONET Topologies Unidirectional Path Switched Rings 5.3.1 Example UPSR Application Figure 5-22 shows a common UPSR application. OC-3 optics provide remote switch connectivity to a host TR-303 switch. In the example, each remote switch requires eight DS-1s to return to the host switch. Figure 5-23 and Figure 5-24 show the shelf layout for each site.
Chapter 5 SONET Topologies Unidirectional Path Switched Rings Figure 5-23 Layout of Node ID 0 in the OC-3 UPSR example (Figure 5-15) 32142 Free Slot Free Slot Free Slot Free Slot Free Slot Free Slot TCC XCVT AIC (Optional) XCVT TCC OC3 IR 4 1310 OC3 IR 4 1310 DS1-14 DS1-14 DS1-14 DS1-14 In the Figure 5-22 on page 5-28 example, Nodes IDs 1 - 3 each contain two DS1-14 cards and two OC3 4 IR 1310 cards. Eight free slots exist. They can be provisioned with other cards or left empty.
Chapter 5 SONET Topologies Unidirectional Path Switched Rings 5.3.2 Setting Up a UPSR To set up a UPSR, you perform four basic procedures: • Install the UPSR trunk cards. Use the “Install the UPSR Trunk Cards” procedure on page 5-30 • Create the DCC terminations. Use the “Configure the UPSR DCC Terminations” procedure on page 5-31. • Configure the timing. Use the “Setting Up ONS 15454 Timing” section on page 3-12. • Enable the ports. Use the “Enable the UPSR Ports” procedure on page 5-32.
Chapter 5 SONET Topologies Unidirectional Path Switched Rings Figure 5-25 Connecting fiber to a four-node UPSR Tx Rx Tx Rx Slot 12 Slot 5 Node 2 Tx Rx Slot 12 Slot 5 Slot 12 Slot 5 Node 1 Tx Rx Tx Rx Node 3 Tx Rx Tx Rx Slot 12 Slot 5 68120 Tx Rx Node 4 Procedure: Configure the UPSR DCC Terminations Step 1 Log into the first node that will be in the UPSR. Step 2 Click the Provisioning > Sonet DCC tabs. Step 3 In the SDCC Terminations section, click Create.
Chapter 5 SONET Topologies Unidirectional Path Switched Rings Procedure: Enable the UPSR Ports Step 1 Log into the first UPSR node. Step 2 Double-click one of the cards that you configured as an SDCC termination. Step 3 Click the Provisioning > Line tabs. Step 4 Under Status, select In Service for each port that you want enabled. Step 5 Repeat Steps 2 - 4 for the second card. Step 6 Click Apply. You configured a UPSR for one node. Use the same procedures to configure the additional nodes.
Chapter 5 SONET Topologies Unidirectional Path Switched Rings Figure 5-26 Using the span shortcut menu to display circuits Step 3 Caution On the Circuits on Span dialog box (Figure 5-27), select the protection from the Switch all UPSR circuits away menu: • CLEAR removes a previously-set switch command. • MANUAL switches the span if the new span is error free. • FORCE forces the span to switch, regardless of whether the new span is error free.
Chapter 5 SONET Topologies Unidirectional Path Switched Rings Figure 5-27 Switching UPSR circuits Step 4 Click Apply. Step 5 When the confirmation dialog box appears, click OK to confirm the protection switching. The column under Switch State changes to your chosen level of protection. Step 6 Click Close after Switch State changes. Procedure: Add a UPSR Node Note Step 1 You can add only one node at a time. Perform these steps onsite and not from a remote location.
Chapter 5 SONET Topologies Unidirectional Path Switched Rings b. Step 6 Remove the west fiber connection from the node that will connect to the east port of the new node. Replace the removed fiber connections with connections from the new node. Perform this step on site at the new node. Note Step 7 Log out of CTC and then log back in. Step 8 Display the network view. The new node should appear in the network map. Wait for a few minutes to allow all the nodes to appear.
Chapter 5 SONET Topologies Subtending Rings d. Click Yes when prompted. Step 4 From the node that will be deleted, remove the east and west span fibers. At this point, the node should no longer be a part of the ring. Step 5 Reconnect the span fibers of the nodes remaining in the ring. Step 6 Open the Alarms tab of each newly-connected node and verify that the span cards are free of alarms. Resolve any alarms before proceeding.
Chapter 5 SONET Topologies Subtending Rings Figure 5-28 An ONS 15454 with multiple subtending rings UPSR UPSR UPSR or BLSR UPSR 55302 UPSR or BLSR Figure 5-29 shows a UPSR subtending from a BLSR. In this example, Node 3 is the only node serving both the BLSR and UPSR. OC-N cards in Slots 5 and 12 serve the BLSR, and OC-N cards in Slots 6 and 13 serve the UPSR.
Chapter 5 SONET Topologies Subtending Rings Procedure: Subtend a UPSR from a BLSR This procedure requires an established BLSR and one BLSR node with OC-N cards and fibers to carry the UPSR. The procedure also assumes you can set up a UPSR. (For UPSR setup procedures, see the “Setting Up a UPSR” section on page 5-30.) Step 1 In the node that will subtend the UPSR (Node 3 in Figure 5-29), install the OC-N cards that will serve as the UPSR trunk cards (Node 3, Slots 6 and 13).
Chapter 5 SONET Topologies Subtending Rings c. Click Apply. d. Repeat steps a – c for the second BLSR trunk card. Step 9 Use the “Provision the BLSR” procedure on page 5-14 to configure the BLSR. Step 10 Follow Steps 1– 8 for the other nodes that will be in the BLSR. Step 11 Go to the network view to see the subtending ring. The ONS 15454 can support two BLSRs on the same node.
Chapter 5 SONET Topologies Subtending Rings Procedure: Subtend a BLSR from a BLSR This procedure requires an established BLSR and one BLSR node with OC-N cards and fibers to carry the BLSR. The procedure also assumes you know how to set up a BLSR. For BLSR setup procedures, see the “Setting Up BLSRs” section on page 5-10. Step 1 In the node that will subtend the BLSR (Node 4 in Figure 5-30), install the OC-N cards that will serve as the BLSR trunk cards (Node 4, Slots 6 and 13).
Chapter 5 SONET Topologies Linear ADM Configurations Figure 5-32 Configuring two BLSRs on the same node 5.5 Linear ADM Configurations You can configure ONS 15454s as a line of add/drop multiplexers (ADMs) by configuring one set of OC-N cards as the working path and a second set as the protect path. Unlike rings, linear (point-to-point) ADMs require that the OC-N cards at each node be in 1+1 protection to ensure that a break to the working line is automatically routed to the protect line.
Chapter 5 SONET Topologies Linear ADM Configurations Procedure: Create a Linear ADM Complete the following steps for each node that will be included in the linear ADM. Step 1 Complete the general setup information for the node. For procedures, see the “Setting Up Basic Node Information” section on page 3-2. Step 2 Set up the network information for the node. For procedures, see the “Setting Up Network Information” section on page 3-2. Step 3 Set up 1+1 protection for the OC-N cards in the ADM.
Chapter 5 SONET Topologies Linear ADM Configurations Figure 5-34 Verifying working slots in a protection group Step 3 Under Protection Groups, select the 1+1 protection group (that is, the group supporting the 1+1 span cards). Step 4 Under Selected Group, verify that the working slot/port is shown as “Working/Active.” If yes, go to Step 5. If the working slot says “Working/Standby” and the protect slot says “Protect/Active,” switch traffic to the working slot: a.
Chapter 5 SONET Topologies Linear ADM Configurations c. Click Yes on the confirmation dialog box. d. Verify that no traffic disruptions are indicated on the test set. If disruptions occur, do not proceed. Recreate the protection group and isolate the cause of the disruption. e. Continue deleting 1+1 protection groups while monitoring the existing traffic with the test set.
Chapter 5 SONET Topologies Linear ADM Configurations Figure 5-36 Converting a linear ADM to a UPSR Linear ONS 15454 Node 1 ONS 15454 Node 2 ONS 15454 Node 3 Slot 6 to Slot 6 Slot 12 to Slot 12 Slot 5 to Slot 5 Slot 13 to Slot 13 UPSR ONS 15454 Node 1 Slot 6 (West) ONS 15454 Node 3 Slot 12 (East) Slot 12 (West) Slot 13 (East) 32135 Slot 5 (West) Slot 6 (East) ONS 15454 Node 2 Step 8 Physically reroute the other protect fiber to connect the two end nodes.
Chapter 5 SONET Topologies Linear ADM Configurations Step 15 In the SDCC Terminations section, click Create. Step 16 In the Create SDCC Terminations dialog box, select the slot/port that had been the protect slot in the linear ADM, for example, for Node 1, this would be Slot 5/Port 1 (OC-48). Step 17 Click OK. An EOC SDCC alarm will occur until an SDCC termination is created on the adjacent node.
Chapter 5 SONET Topologies Linear ADM Configurations Figure 5-37 A UPSR displayed in network view Procedure: Convert a Linear ADM to a BLSR The following procedures describe how to convert a three-node linear ADM to a BLSR. You will need a SONET test set to monitor traffic while you perform these procedures. Caution This procedure is service affecting. Caution Always wear an authorized electrostatic discharge wrist band when removing or installing ONS 15454 cards.
Chapter 5 SONET Topologies Linear ADM Configurations c. Verify that the working slot is carrying traffic. If it is, continue to Step (d). If not, clear the conditions that prevent the card from carrying working traffic before proceeding. d. From the Switch Commands, select Clear. A Confirm Clear Operation dialog is displayed. e. Click Yes on the confirmation dialog box. Step 5 Repeat Step 4 for each group in the 1+1 Protection Groups list at all nodes that will be converted.
Chapter 5 SONET Topologies Linear ADM Configurations Step 9 Step 10 Step 11 In the middle node, place the cards in Slots 5 and 13 out of service: a. Display the first card in card view, then select the Provisioning > Line tabs. b. Under Status, select Out of Service. Click Apply. c. Repeat Steps a and b for the second card. Delete the equipment records for the cards: a. From the View menu, choose Node View. b. Right-click the card you just took out of service (e.g.
Chapter 5 SONET Topologies Path-Protected Mesh Networks Be sure to assign the same Ring ID and different node IDs to all nodes in the BLSR. Do not accept the BLSR ring map until all nodes are provisioned. Note Step 20 E-W Mismatch alarms will occur until all nodes are provisioned. Display the network map to view the newly-created ring. 5.
Chapter 5 SONET Topologies Path-Protected Mesh Networks Figure 5-39 A path-protected mesh network Source Node Node 3 Node 5 Node 2 Node 4 Node 1 Node 10 Node 8 Node 6 Node 7 Node 11 Node 9 c raffi ng t ki Wor Destination Node = Primary path = Secondary path 32136 Protect traffic PPMN also allows spans of different SONET line rates to be mixed together in “virtual rings.” Figure 5-40 shows Nodes 1, 2, 3, and 4 in a standard OC-48 ring.
Chapter 5 SONET Topologies Path-Protected Mesh Networks Figure 5-40 A PPMN virtual ring ONS 15454 Node 5 ONS 15454 Node 1 OC-12 ONS 15454 Node 4 ONS 15454 Node 8 OC-12 32137 OC-48 UPSR ONS 15454 Node 6 ONS 15454 Node 2 ONS 15454 Node 3 ONS 15454 Node 7 Cisco ONS 15454 Installation and Operations Guide 5-52 78-13453-01
C H A P T E R 6 Circuits and Tunnels This chapter explains how to create and administer Cisco ONS 15454 circuits and tunnels, which includes: • Creating standard STS and VT1.5 circuits • Creating VT tunnels • Creating multiple drop circuits • Creating monitor circuits • Editing UPSR circuits • Creating path traces to monitor traffic • Reviewing ONS 15454 cross-connect card capacities • Creating DCC tunnels to tunnel third-party equipment through ONS 15454 networks 6.
Chapter 6 Circuits and Tunnels Creating Circuits and VT Tunnels Note In this chapter, “cross-connect” and “circuit” have the following meanings: Cross-connect refers to the connections that occur within a single ONS 15454 to allow a circuit to enter and exit an ONS 15454. Circuit refers to the series of connections from a traffic source (where traffic enters the ONS 15454 network) to the drop or destination (where traffic exits an ONS 15454 network). 6.
Chapter 6 Circuits and Tunnels Creating Circuits and VT Tunnels • Size—Select the circuit size (STS circuits only). The “c” indicates concatenated STSs. • Bidirectional—Check this box to create a two-way circuit; uncheck it to create a one-way circuit (STS and VT circuits only; VT tunnels are bidirectional). • Number of circuits—Type the number of circuits you want to create. If you enter more than 1, you can use auto-ranging to create the additional circuits automatically.
Chapter 6 Circuits and Tunnels Creating Circuits and VT Tunnels Options include node, slot, port, STS, and VT/DS-1. The options that display depend on the circuit type and circuit properties you selected in Step 3 and the cards installed in the node. For example, if you are creating a VT circuit or tunnel, only nodes with XCVT and XC10G cards are displayed. For Ethergroups, see the “Ethernet Circuit Configurations” section on page 9-6.
Chapter 6 Circuits and Tunnels Creating Circuits and VT Tunnels • Using Required Nodes/Spans—If selected, click Next to display the Circuit Route Constraints panel (Figure 6-3). On the circuit map, click a node or span and click Include (to include the node or span in the circuit) or Exclude (to exclude the node/span from the circuit). The order in which you select included nodes and spans sets the circuit sequence. Click spans twice to change the circuit direction.
Chapter 6 Circuits and Tunnels Creating Circuits and VT Tunnels Procedure: Create a Manually Routed Circuit Note Step 1 Tip If you want to route circuits on protected drops, create the card protection groups before creating circuits. See the “Create Protection Groups” procedure on page 3-9. Log into an ONS 15454 and click the Circuits tab. You can also right-click a source node in network view, select Provision Circuit To, and choose the circuit destination node from the menu. Step 2 Click Create.
Chapter 6 Circuits and Tunnels Creating Circuits and VT Tunnels • Revertive—Check this box if you want traffic to revert to the working path when the conditions that diverted it to the protect path are repaired. If Revertive is not chosen, traffic remains on the protect path after the switch. • Reversion time—If Revertive is checked, set the reversion time. This is the amount of time that will elapse before the traffic reverts to the working path.
Chapter 6 Circuits and Tunnels Creating Multiple Drops for Unidirectional Circuits c. Click Add Span. The span is added to the Included Spans list and the span arrow turns blue. Step 14 Repeat Step 13 until the circuit is provisioned from the source to the destination node. When provisioning a protected circuit, you only need to select one path of BLSR or 1+1 spans from the source to the drop.
Chapter 6 Circuits and Tunnels Creating Monitor Circuits 6.4 Creating Monitor Circuits You can set up secondary circuits to monitor traffic on primary bidirectional circuits. Figure 6-5 shows an example of a monitor circuit. At Node 1, a VT1.5 is dropped from Port 1 of an EC1-12 card. To monitor the VT1.5 traffic, test equipment is plugged into Port 2 of the EC1-12 card and a monitor circuit to Port 2 is provisioned in CTC. Circuit monitors are one-way.
Chapter 6 Circuits and Tunnels Searching for Circuits 6.5 Searching for Circuits CTC provides the ability to search for ONS 15454 circuits based on circuit name. Searches can be conducted at the network, node, and card level. You can search for whole words and include capitalization as a search parameter. Procedure: Search for ONS 15454 Circuits Step 1 Log into CTC.
Chapter 6 Circuits and Tunnels Editing UPSR Circuits Figure 6-6 Editing UPSR selectors Procedure: Edit a UPSR Circuit Step 1 Log into the source or drop node of the UPSR circuit. Step 2 Click the Circuits tab. Step 3 Click the circuit you want to edit, then click Edit. Step 4 On the Edit Circuit window, click the UPSR tab. Step 5 Edit the UPSR selectors: • Reversion Time—Controls whether traffic reverts to the working path when conditions that diverted it to the protect path are repaired.
Chapter 6 Circuits and Tunnels Creating a Path Trace FORCE TO PROTECT—Forces traffic to switch to the protect circuit path, regardless of whether the path is error free. MANUAL TO WORKING—Switches traffic to the working circuit path when the working path is error free. MANUAL TO PROTECT—Switches traffic to the protect circuit path when the protect path is error free. Caution Step 6 The FORCE and LOCKOUT commands override normal protection switching mechanisms.
Chapter 6 Circuits and Tunnels Creating a Path Trace Table 6-2 Path Trace Source and Drop Provisioning Step Port Action Notes 1 Source Edit the path-trace transmit string. If not edited, an empty string is transmitted. 2 Drop 3 Source Edit the path-trace expected string. 4 Drop Edit the path-trace expected string Only Path Trace mode is set to Manual, and only on DS-1, DS3E, and DS3XM cards. 5 Drop Change Path Trace Mode Automatic or Manual.
Chapter 6 Circuits and Tunnels Creating a Path Trace Figure 6-7 Step 5 Selecting the Edit Path Trace option On the Circuit Path Trace window (Figure 6-8) in the New Transmit String field (this field is available only on DS-1, DS3E, and DS3XM cards), enter the string that you want the source port to transmit. For example, you could enter the node IP address, node name, circuit name, or another string. If the New Transmit String field is left blank, the J1 transmits an empty string.
Chapter 6 Circuits and Tunnels Cross-Connect Card Capacities Step 8 On the circuit map, right-click the drop port for the circuit and select Edit Path Trace from the shortcut menu. Step 9 On the Circuit Path Trace window (Figure 6-8) in the New Transmit String field (this field is available only on DS-1, DS3E, and DS3XM cards), enter the string that you want the drop port to transmit. If the field is left blank, the J1 transmits an empty string.
Chapter 6 Circuits and Tunnels Cross-Connect Card Capacities Table 6-3 XC, XCVT, and XC10G Card STS Cross-Connect Capacities Card Total STSs STS Cross-connects XC 288 144 XCVT 288 144 XC10G 1152 576 6.8.1 VT1.5 Cross-Connects XCVTs and XC10Gs can map up to 24 STSs for VT1.5 traffic. Because one STS can carry 28 VT1.5s, the XCVT and XC10G cards can terminate up to 672 VT1.5s, or 336 VT1.5 cross-connects. However, to terminate 336 VT1.5 cross-connects: • Each STS mapped for VT1.
Chapter 6 Circuits and Tunnels Cross-Connect Card Capacities Figure 6-9 Example #1: A VT1.5 circuit in a BLSR VT1.5 circuit #1 on STS-1 1 VT1.5 used on STS-1 27 VT1.5s available on STS-1 XCVT-XC10G Matrices Source STS Matrix Drop EC-1 2 STSs total used 22 STSs available OC-12 STS VT1.5 61846 VT1.5 Matrix In Figure 6-10, a second VT1.5 circuit is created from the EC-1 card. In this example, the circuit is assigned to STS-2: • Two more of the 24 STSs available for VT1.5 traffic are used.
Chapter 6 Circuits and Tunnels Cross-Connect Card Capacities • 21 STSs are available for VT1.5 circuits. Figure 6-11 Example #3: VT1.5 circuit in a UPSR or 1+1 protection scheme VT1.5 circuit #1 XCVT-XC10G Matrices Source STS Matrix Working OC-12 Drop Protect EC-1 3 STSs total used 21 STSs available OC-12 STS VT1.5 61848 VT1.5 Matrix Figure 6-12 shows a second VT1.5 circuit that was created using STS-2. When the second VT1.5 circuit is created: • Three more VT1.5-mapped STSs are used.
Chapter 6 Circuits and Tunnels Cross-Connect Card Capacities • In the Figure 6-10 example, three STSs are used at the source and drop nodes and four STSs are used at pass-through nodes. In Figure 6-12, six STSs are used at the source and drop nodes and four STSs at the pass-through nodes. 6.8.2 VT Tunnels To maximize VT matrix resources, you can tunnel VT1.5 circuits through ONS 15454 pass-through nodes (nodes that are not a circuit source or drop). VT1.
Chapter 6 Circuits and Tunnels Cross-Connect Card Capacities Figure 6-14 A six-node ring with two VT1.5 tunnels VT1.5 source Node 1 Node 6 Node 2 28 VT1.5 circuits 28 VT1.5 circuits Node 5 Node 3 Node 4 VT1.5 drop Table 6-5 BLSR VT Tunnel 61851 VT1.5 drop VT1.
Chapter 6 Circuits and Tunnels Creating DCC Tunnels sufficient capacity, CTC displays a dialog box asking whether you want to create a tunnel. Before you create the tunnel, review the existing tunnel availability, keeping in mind future bandwidth needs. In some cases, you may want to manually route a circuit rather than create a new tunnel. 6.
Chapter 6 Circuits and Tunnels Creating DCC Tunnels Figure 6-15 A DCC tunnel Link 1 From (A) To (B) Slot3 (OC3) Slot13 (OC48) port 1, SDCC port 1, Tunnel 1 Link 2 From (A) To (B) Slot12 (OC48) Slot13 (OC48) port 1, Tunnel 1 port 1, Tunnel 1 Node 2 Node 3 32134 Node 1 Link 3 From (A) To (B) Slot12 (OC48) Slot3 (OC3) port 1, Tunnel 1 port 1, SDCC Third party equipment Third party equipment When you create DCC tunnels, keep the following guidelines in mind: • Each ONS 15454 can have up to 32 DCC
Chapter 6 Circuits and Tunnels Creating DCC Tunnels Figure 6-16 Selecting DCC tunnel end points Step 5 Click OK. Step 6 Put the ports hosting the DCC tunnel in service: a. Double-click the card hosting the DCC in the shelf graphic or right-click the card on the shelf graphic and select Open. b. Click the Provisioning > Line tabs. c. Under Status, select In Service. d. Click Apply. DCC provisioning is now complete for one node.
Chapter 6 Circuits and Tunnels Creating DCC Tunnels Cisco ONS 15454 Installation and Operations Guide 6-24 November 2001
C H A P T E R 7 Card Provisioning This chapter provides Cisco ONS 15454 procedures for: Note • Changing the default transmission parameters for electrical (EC-1, DS-N) and optical (OC-N) cards, including provisioning OC-N cards for SDH • Setting performance monitoring (PM) thresholds, including intermediate path performance monitoring • Provisioning the Alarm Interface Controller card • Converting the DS1-14 and DS3-12 cards from 1:1 to 1:N protection Ethernet card provisioning is described in C
Chapter 7 Card Provisioning Provisioning Electrical Cards 7.2 Provisioning Electrical Cards The ONS 15454 electrical cards (DS1-14, DS1N-14, DS3-12, DS3N-12, DS3E1-12, DS3EN-12, DS3XM-6, and EC1-12) are pre-provisioned with settings that you can modify to manage transmission quality. When you open a card in CTC and select the Provisioning tab, the following subtabs are commonly displayed: • Line—Sets line setup parameters, such as line coding and line length.
Chapter 7 Card Provisioning Provisioning Electrical Cards Table 7-1 DS-N Card Provisioning Overview (continued) Subtab Provisioning Item DS1-14/ DS1N-14 DS3-12/ DS3N-12 DS3E1-12/ DS3EN-12 DS3XM-6 SONET Threshold Port X X X X CV X X X X ES X X X X FC X X X X SES X X X X UAS X X X X Port X X X X Profile X X X X Suppress Alarms X X X X Alarming 7.2.1 DS-1 Card Parameters The ONS 15454 DS-1 cards (DS1-14 and DS1N-14) provide 14 DS-1 ports.
Chapter 7 Card Provisioning Provisioning Electrical Cards Step 3 Depending on the setting you need to modify, click the Line, Line Thrshld, Elect Path, or Sonet Thrshld subtab. Note Step 4 See Chapter 10, “Alarm Monitoring and Management” for information about the Alarm Behavior tab. Modify the settings shown in Table 7-2 on page 7-4. For drop-down lists, select an item from the list. For numerics, double-click the field and type the new number.
Chapter 7 Card Provisioning Provisioning Electrical Cards Table 7-2 DS-1 Card Parameters (continued) Subtab Parameter Description Options Elect Path Thrshld ES Errored seconds Numeric. Defaults: SES SAS AIS UAS SONET Threshold CV ES FC SES UAS Severely errored seconds Severely errored frame/alarm indication signal Alarm indication signal Unavailable seconds 65 (15 minutes) • 648 (1 day) Numeric. Defaults: • 10 (15 minutes) • 100 (1 day) Numeric.
Chapter 7 Card Provisioning Provisioning Electrical Cards Table 7-2 DS-1 Card Parameters (continued) Subtab Parameter Description Options Alarming Port Port number 1 - 14 Profile Sets the alarm profile for the port Suppress Alarms Suppresses alarm display for the port • Default • Inherited • Custom profiles (if any) • Unselected (default) • Selected Step 5 Click Apply. Step 6 Repeat Steps 4 – 5 for each subtab that has parameters you want to provision. 7.2.
Chapter 7 Card Provisioning Provisioning Electrical Cards Table 7-3 DS-3 Card Parameters Subtab Parameter Description Options Line Port # Port number 1 - 12 Port Port name To enter a name for the port, click the cell and type the name. To change a name, double-click the cell, then edit the text.
Chapter 7 Card Provisioning Provisioning Electrical Cards Table 7-3 DS-3 Card Parameters (continued) Subtab Parameter Description Options SONET Thrshold CV Coding violations Numeric. Defaults (Near End, STS termination): ES FC SES UAS Alarming Errored seconds Failure count Severely errored seconds Unavailable seconds Port Port number Profile Sets the alarm profile for the port. Suppress Alarms Suppresses alarm display for the port. • 15 (15 minutes) • 125 (1 day) Numeric.
Chapter 7 Card Provisioning Provisioning Electrical Cards Note If the DS3E is installed in an ONS 15454 slot that is provisioned for a DS-3 card, the DS3E enhanced performance monitoring parameters are not available. If this occurs, remove the DS3E from the ONS 15454, delete the DS-3 card in CTC, and provision the slot for the DS3E. Procedure: Modify Line and Threshold Settings for the DS3E Card Step 1 Display the DS3E-12 or DS3EN-12 in CTC card view. Step 2 Click the Provisioning tab.
Chapter 7 Card Provisioning Provisioning Electrical Cards Table 7-4 Subtab DS3E Card Parameters (continued) Parameter Line Thrshold CV Description Options Coding violations Numeric. Defaults: • 387 (15 minutes) • 3865 (1 day) ES Errored seconds Numeric.
Chapter 7 Card Provisioning Provisioning Electrical Cards Table 7-4 DS3E Card Parameters (continued) Subtab Parameter Description Options Sonet Thrshld CV Coding violations Numeric. Defaults (Near End STS termination): ES FC SES UAS Alarming Errored seconds 15 (15 minutes) • 125 (1 day) Numeric. Defaults (Near End STS termination): Failure count • 12 (15 minutes) • 100 (1 day) Numeric.
Chapter 7 Card Provisioning Provisioning Electrical Cards Procedure: Modify Line and Threshold Settings for the DS3XM-6 Card Step 1 Display the DS3XM-6 in CTC card view. Step 2 Click the Provisioning tab. Step 3 Depending on the setting you need to modify, click the Line, Line Thrshld, Elect Path, or Sonet Thrshld subtab. Note Step 4 See Chapter 10, “Alarm Monitoring and Management” for information about the Alarm Behavior tab. Modify the settings shown in Table 7-5.
Chapter 7 Card Provisioning Provisioning Electrical Cards Table 7-5 DS3XM-6 Parameters (continued) Subtab Parameter Description Options Elect Path Thrshld CV Coding violations Numeric. Defaults (DS3, Pbit Near End only; DS3 CPbit, Near and Far End): ES SES SAS AIS UAS Errored seconds • 382 (15 minutes) • 3820 (1 day) Numeric.
Chapter 7 Card Provisioning Provisioning Electrical Cards Table 7-5 DS3XM-6 Parameters (continued) Subtab Parameter Description Options Sonet Thrshld CV Coding violations Numeric.
Chapter 7 Card Provisioning Provisioning Electrical Cards Step 2 Click the Provisioning tab. Step 3 Depending on the setting you need to modify, click the Line, Thresholds, or STS subtab. Note Step 4 See Chapter 10, “Alarm Monitoring and Management” for information about the Alarm Behavior tab. Modify the settings shown in Table 7-6. For drop-down lists, select an item from the list. For numerics, double-click the field and type the new number.
Chapter 7 Card Provisioning Provisioning Electrical Cards Table 7-6 EC1-12 Card Parameters (continued) Subtab Parameter Description Options Thresholds Line CV Coding violations Numeric. Defaults: ES SES FC UAS Errored seconds Severely errored seconds Failure count Unavailable seconds • 1312 (15 minutes) • 13120 (1 day) Numeric. Defaults: • 87 (15 minutes) • 864 (1 day) Numeric. Defaults: • 1 (15 minutes) • 4 (1 day) Numeric.
Chapter 7 Card Provisioning Provisioning Electrical Cards Table 7-6 EC1-12 Card Parameters (continued) Subtab Parameter Description Options Thresholds Section CV Coding violations Numeric. Defaults (Near End only): 10000 (15 minutes) 100000 (1 day) ES Errored seconds 500 (15 minutes) 5000 (1 day) SES Severely errored seconds 500 (15 minutes) 5000 (1 day) SEFS Thresholds Path CV Severely errored framing seconds 500 (15 minutes) Coding violations Numeric.
Chapter 7 Card Provisioning Provisioning Optical Cards Step 6 Repeat Steps 4 – 5 for each subtab that has parameters you want to provision. 7.3 Provisioning Optical Cards This section explains how to modify transmission quality by provisioning line and threshold settings for OC-N cards and how to provision OC-N cards for SDH. 7.3.1 Modifying Transmission Quality The OC-3, OC-12, OC-48, and OC-192 cards are pre-provisioned with settings that you can modify to manage transmission quality.
Chapter 7 Card Provisioning Provisioning Optical Cards Table 7-7 OC-N Card Line Settings on the Provisioning > Line Tab (continued) Heading Description Send Do Not Use When checked, sends a DUS (do not use) message on the S1 byte • Yes (checked) • No (unchecked; default) PJ Sts Mon # Sets the STS that will be used for pointer justification. If set to 0, no STS is monitored. Only one STS can be monitored on each OC-N port.
Chapter 7 Card Provisioning Provisioning Optical Cards Table 7-8 OC-N Card Threshold Settings on the Provisioning > Thresholds Tab Heading Description Port Port number CV Coding violations Options • 1, 2, 3, or 4 (OC-3) • 1 (OC-12, OC-48, OC-192) Numeric.
Chapter 7 Card Provisioning Provisioning Optical Cards Table 7-8 OC-N Card Threshold Settings on the Provisioning > Thresholds Tab (continued) Heading Description Options FC Failure count Numeric. Defaults (15 min/1 day): Line • 10/0 (OC-3, Near and Far End) • 10/40 (OC-12, OC-48, OC-192 Near and Far End) Path • UAS Unavailable seconds 10/10 (OC-12, OC-48, OC-192 Near and Far End) Numeric.
Chapter 7 Card Provisioning Provisioning Optical Cards Table 7-8 OC-N Card Threshold Settings on the Provisioning > Thresholds Tab (continued) Heading Description Options PSD Protection Switch Duration (Line) Numeric. Defaults (15 min/1 day): Line PSC-W Protection Switching Count Working line BLSR is not supported on the OC-3 card; therefore, the PSC-W, PSC-S, and PSC-R PMs do not increment.
Chapter 7 Card Provisioning Provisioning Optical Cards Click Apply. 7.3.2 Provisioning OC-N Cards for SDH You can provision the ONS 15454 OC-3, OC-12, and OC-48 cards to support either SONET or SDH over SONET signals. When provisioned for SDH, each OC-N port drops and inserts STM traffic in unprotected or 1+1 protection mode. Each STM-1 signal is mapped as a 155 Mbps concatenated signal (STS-3c) for transparent transport over a SONET network.
Chapter 7 Card Provisioning Provisioning IPPM 7.4 Provisioning IPPM Intermediate-Path Performance Monitoring (IPPM) allows you to transparently monitor traffic originating on DS-1, DS-3, DS3E and DS3XM cards (Path Terminating Equipment) as it passes through EC-1, OC-3, OC-12, OC-48, and OC-192 cards (Line Terminating Equipment). To use IPPM, you create the STS circuit on the DS-N cards, then enable IPPM on the EC-1 or OC-N cards that carry the circuit. Note For Release 3.
Chapter 7 Card Provisioning Provisioning the Alarm Interface Controller Procedure: Enable Intermediate-Path Performance Monitoring Step 1 If the STS circuit does not exist, create the circuit. (The circuit must pass through the EC-1 or OC-N card before you can enable IPPM on the circuit.) Step 2 In CTC, open the card view of an EC-1 or OC-N card that carries the circuit. Step 3 Select the Provisioning > STS tabs. Step 4 Click Enable IPPM for the STS you want to monitor. Step 5 Click Apply. 7.
Chapter 7 Card Provisioning Provisioning the Alarm Interface Controller AIC alarm input and output External control Bell External alarms Relay Relay Relay Relay Light CTC alarm turns on an external device Smoke detector Heat sensor External device generates CTC alarm = External alarm = External control 38566 Figure 7-4 7.5.
Chapter 7 Card Provisioning Provisioning the Alarm Interface Controller Figure 7-5 External alarms and controls using a virtual wire Bell Smoke detector Virtual Wire #1 is external control trigger Virtual Wire #1 Virtual Wire #1 ONS 15454 Node 1 Smoke detector Smoke detector ONS 15454 Node 4 ONS 15454 Node 2 ONS 15454 Node 3 Virtual Wire #1 = External alarm Smoke detector = External control 44743 Virtual Wire #1 When using AIC virtual wires, you can: • Assign different external devices to
Chapter 7 Card Provisioning Provisioning the Alarm Interface Controller • Severity—Select a severity. The severity determines how the alarm is displayed in the CTC Alarms and History tabs and whether the LEDs are activated. Critical, Major, and Minor activate the appropriate LEDs. Not Alarmed and Not Reported do not activate LEDs, but do report the information in CTC. • Virtual Wire—To assign the external device to a virtual wire, select the virtual wire. Otherwise, do not change the None default.
Chapter 7 Card Provisioning Provisioning the Alarm Interface Controller • Description—Enter a description. Step 4 To provision additional controls, complete Step 3 for each additional device. Step 5 Click Apply. 7.5.2 Provisioning AIC Orderwire The AIC provides RJ-11 jacks to allow onsite personnel to communicate with one another using standard phone sets.
Chapter 7 Card Provisioning Converting DS-1 and DS-3 Cards From 1:1 to 1:N Protection Figure 7-7 Provisioning local orderwire Step 3 In the Available Ports list, select each port that you want to use for the orderwire channel and click Add to move them to the Selected Ports column. Step 4 If needed, adjust the Tx and Rx dBm by moving the slider to the right or left for the headset type (four-wire or two-wire) that you will use. In general, you should not need to adjust the dBm. Step 5 Click Apply.
Chapter 7 Card Provisioning Converting DS-1 and DS-3 Cards From 1:1 to 1:N Protection To create 1:1 protection for DS-1 and DS-3 cards, see the “Creating Protection Groups” section on page 3-9. Procedure: Convert DS1-14 Cards From 1:1 to 1:N Protection Note This procedure assumes DS1-14 cards are installed in Slots 1 through 6 and/or Slots 12 through 17. The DS1-14 cards in Slots 3 and 15, which are the protection slots, will be replaced with DS1N-14 cards. The ONS 15454 must run CTC Release 2.
Chapter 7 Card Provisioning Converting DS-1 and DS-3 Cards From 1:1 to 1:N Protection Figure 7-8 Viewing slot protection status Step 4 Repeat Steps 1 – 3 for each protection group that you need to convert. Step 5 Verify that no standing alarms exist for any of the DS1-14 cards that you are converting. If alarms exist and you have difficulty clearing them, contact your next level of support. Step 6 Click the Provisioning > Protection tabs.
Chapter 7 Card Provisioning Converting DS-1 and DS-3 Cards From 1:1 to 1:N Protection Step 14 Physically insert a DS1N-14 card into the same slot. Step 15 Verify that the card boots up properly. Step 16 Click the Inventory tab and verify that the new card appears as a DS1N-14. Step 17 Click the Provisioning > Protection tabs. Step 18 Click Create. The Create Protection Group dialog opens with the protect card in the Protect Card field and the available cards in the Available Cards field.
Chapter 7 Card Provisioning Converting DS-1 and DS-3 Cards From 1:1 to 1:N Protection Note Deleting the 1:1 protection groups will not disrupt service. However, no protection bandwidth exists for the working circuits until the 1:N protection procedure is completed. Do not delay when completing this procedure. Step 10 If you are deleting more than one protection group, repeat Steps 7–9 for each group.
C H A P T E R 8 Performance Monitoring Performance monitoring parameters (PMs) are used by service providers to gather, store, threshold, and report performance data for early detection of problems. PM terms are defined for both electrical cards and optical cards.
Chapter 8 Performance Monitoring Using the Performance Monitoring Screen Figure 8-1 Viewing performance monitoring information Card view 55379 Performance tab 8.1.1 Viewing PMs Before you view PMs, be sure you have created the appropriate circuits and provisioned the card according to your specifications. For information about circuit creation and card provisioning, see the Cisco ONS 15454 Installation and Operations Guide. Procedure: View PMs Step 1 Open the electrical or optical card of choice.
Chapter 8 Performance Monitoring Using the Performance Monitoring Screen Figure 8-2 Time interval buttons on the card view Performance tab 5378 Fifteen-minute and twenty-four hour intervals Procedure: Select Fifteen-Minute PM Intervals on the Performance Monitoring Screen Step 1 Open the electrical or optical card of choice. Double-click the card’s graphic in the main (node) view or right-click the card and select Open Card. (Clicking a card once highlights the card only.
Chapter 8 Performance Monitoring Using the Performance Monitoring Screen Note If a complete 15-minute interval count is not possible, the value displays with a yellow background. An incomplete or incorrect count can be caused by changing node timing settings, changing the time zone settings on CTC, replacing a card, resetting a card, changing port states, or by using the Baseline button. When a complete count occurs, the subsequent 15-minute interval appears with a white background.
Chapter 8 Performance Monitoring Using the Performance Monitoring Screen Figure 8-3 Near End and Far End buttons on the card view Performance tab 55377 Near End and Far End buttons Procedure: Select Near End PMs on the Performance Monitoring Screen Step 1 Open the electrical or optical card of choice. Double-click the card’s graphic in the main (node) view or right-click the card and select Open Card. (Clicking a card once highlights the card only.
Chapter 8 Performance Monitoring Using the Performance Monitoring Screen 8.1.4 Using the Signal-Type Menu Use the signal-type menus to monitor PMs for near-end or far-end signals on a selected port. Different signal-type menus appear depending on the card type and the circuit type. The appropriate types (DS1, DS3, VT path, STS path, OCn section, line) appear based on the card. For example, the DS3XM has DS3, DS1, VT path, and STS path PMs.
Chapter 8 Performance Monitoring Using the Performance Monitoring Screen 8.1.5 Using the Baseline Button In Software R3.0 and higher, the Baseline button located on the far right of the screen clears the PM count displayed in the Current column, but does not clear the PM count on the card. When the current 15-minute or 24-hour time interval expires or the screen view changes, the total number of PM counts on the card and on the screen appear in the appropriate column.
Chapter 8 Performance Monitoring Using the Performance Monitoring Screen 8.1.6 Using the Clear Button The Clear button located on the far right of the Performance Monitoring screen clears certain PM counts depending on the option selected. Figure 8-6 shows the Clear button on the Performance Monitoring screen. Caution Pressing the Clear button can potentially mask problems if used incorrectly. This button is commonly used for testing purposes.
Chapter 8 Performance Monitoring Changing Thresholds Step 5 Note • All interfaces on port x: Clearing all interfaces on port x erases from the card and the screen display all PM counts associated with all combinations of the radio buttons on the selected port. This means the 15-minute near-end and far-end counts are cleared, and 24-hour near-end and far-end counts are cleared from the card and the screen display.
Chapter 8 Performance Monitoring Enabling Intermediate-Path Performance Monitoring Figure 8-7 Threshold tab for setting threshold values Provisioning tab Card view 61945 Threshold tab Change the threshold if the default value does not satisfy your error monitoring needs. For example, customers with a critical DS1 installed for 911 calls must guarantee the best quality of service on the line; therefore, they lower all thresholds so that the slightest error raises a TCA. 8.
Chapter 8 Performance Monitoring Enabling Intermediate-Path Performance Monitoring Figure 8-8 Provisioning tab Card view 61946 STS tab STS tab for enabling IPPM Software R3.0 and higher allows LTE cards to monitor near-end PM data on individual STS payloads by enabling IPPM. After enabling IPPM provisioning on the line card, service providers can monitor large amounts of STS traffic through intermediate nodes, thus making troubleshooting and maintenance activities more efficient.
Chapter 8 Performance Monitoring Pointer Justification Count Parameters 8.4 Pointer Justification Count Parameters Pointers are used to compensate for frequency and phase variations. Pointer justification counts indicate timing errors on SONET networks. There are positive (PPJC) and negative (NPJC) pointer justification count parameters. PPJC is a count of path-detected (PPJC-Pdet) or path-generated (PPJC-Pgen) positive pointer justifications.
Chapter 8 Performance Monitoring Pointer Justification Count Parameters On CTC, the count fields for PPJC and NPJC PMs appear white and blank unless they are enabled on the Provisioning > Line tabs. Figure 8-10 shows the PJStsMon# menu on the Provisioning screen. Figure 8-10 Line tab for enabling pointer justification count parameters Provisioning tab Card view 61948 Line tab Procedure: Enable Pointer Justification Count Performance Monitoring Step 1 Open the electrical or optical card of choice.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards 8.5 Performance Monitoring for Electrical Cards The following sections define performance monitoring parameters for the EC1, DS1, DS1N, DS3, DS3N, DS3-12E, DS3N-12E, and DS3XM electrical cards. 8.5.1 EC1 Card Performance Monitoring Parameters Figure 8-11 shows signal types that support far-end PMs. Far-end performance monitoring is not reported for EC1.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Note SONET path PMs will not count unless IPPM is enabled. For additional information, see the “Enable Intermediate-Path Performance Monitoring” procedure on page 7-25. The far-end IPPM feature is not supported in Software R3.1. However, SONET path PMs can be monitored by logging into the far-end node directly.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Table 8-3 Near-End Line Layer PMs for the EC1 Card (continued) Parameter Definition UAS-L Near-End Line Unavailable Seconds (UAS-L) is a count of the seconds when the line is unavailable. A line becomes unavailable when ten consecutive seconds occur that qualify as SES-Ls, and the line continues to be unavailable until ten consecutive seconds occur that do not qualify as SES-Ls.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Table 8-5 Near-End SONET Path BIP PMs for the EC1 Card Parameter Definition PPJC-Pdet Positive Pointer Justification Count, STS Path Detected (PPJC-Pdet) is a count of the positive pointer justifications detected on a particular path in an incoming SONET signal.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards 8.5.2 DS1 and DS1N Card Performance Monitoring Parameters Figure 8-13 shows the signal types that support far-end PMs. Far-end VT and STS path performance monitoring is supported for the DS1 card. Far-end DS1 path performance monitoring is not supported for the DS1 card. Figure 8-14 shows where overhead bytes detected on the ASICs produce performance monitoring parameters for the DS1 and DS1N cards.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Table 8-7 DS1 Line PMs for the DS1 and DS1N Cards Parameter Definition DS1 CV-L Code Violation Line (CV-L) indicates the number of coding violations occurring on the line. This parameter is a count of bipolar violations (BPVs) and excessive zeros (EXZs) occurring over the accumulation period.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Table 8-9 DS1 Transmit Path PMs for the DS1 and DS1N Cards Parameter Definition DS1 Tx AISS-P Transmit Path Alarm Indication Signal (Tx AIS-P) means an alarm indication signal occurred on the transmit end of the path. This parameter is a count of seconds containing one or more AIS defects. DS1 Tx CV-P Transmit Path Code Violation (Tx CV-P) means a coding violation occurred on the transmit end of the path.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Table 8-10 VT Path PMs for the DS1 and DS1N Cards (continued) Parameter Definition SES-V Severely Errored Seconds VT Layer (SES-V) is a count of seconds when K (600) or more VT Path BIP errors were detected. SES-V can also be caused by an AIS-V defect (or a lower-layer, traffic-related, near-end defect) or an LOP-V defect. UAS-V Unavailable Second VT Layer (UAS-V) is a count of the seconds when the VT path was unavailable.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Table 8-12 Far-End VT Path PMs for the DS1 Card Parameter Definition CV-V Far-End VT Path Coding Violations (CV-VFE) is a count of the number of BIP errors detected by the far-end VT path terminating equipment (PTE) and reported back to the near-end VT PTE using the REI-V indication in the VT path overhead. Only one BIP error can be indicated per VT superframe using the REI-V bit.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Figure 8-16 PM read points on the DS3 and DS3N cards ONS 15454 DS3 & DS3N Cards XC10G Card OC-N LIU DS3 CV-L DS3 ES-L DS3 SES-L DS3 LOSS-L DS3 ES-P DS3 SES-P DS3 SAS-P DS3 AISS-P DS3 UAS-P Mux/Demux ASIC DS3 Side SONET Side STS CV-P STS ES-P STS FC-P STS SES-P STS UAS-P BTC ASIC Path Level PMs read on Mux/Demux ASIC 55305 PMs read on LIU Table 8-13 Near-End DS3 Line PMs for the DS3 and DS3N Cards Parameter Definition
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Table 8-14 Near-End DS3 Path PMs for the DS3 and DS3N Cards (continued) Parameter Definition DS3 AISS-P Alarm Indication Signal Seconds-Path (AISS-P) is a count of seconds containing one or more AIS defects. DS3 UAS-P Unavailable Seconds-Path (UAS-P) is a count of one-second intervals during which the DS3 path is unavailable.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Figure 8-17 Monitored signal types for the DS3-12E and DS3N-12E cards Near End Far End DS3 Signal DS3 Signal ONS 15454 DS3E ONS 15454 Fiber OC48 OC48 DS3E 61156 DS3E Path Far End PMs Are Supported STS Path (STS XX-P) Far End PMs Not Supported Note The XX in the illustration above represents all PMs listed below with the given prefix and/or suffix.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Table 8-16 Near-End DS3 Line PMs for the DS3-12E and DS3N-12E Cards Parameter Definition DS3 CV-L Code Violation Line (CV-L) indicates the number of coding violations occurring on the line. This parameter is a count of bipolar violations (BPVs) and excessive zeros (EXZs) occurring over the accumulation period.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Table 8-18 Near-End CP-bit Path PMs for the DS3-12E and DS3N-12E Cards (continued) Parameter Definition DS3 SESCP-P Severely Errored Seconds Path (SESCP-P) is a count of seconds containing more than 44 CP-bit parity errors, one or more SEF defects, or one or more AIS defects. DS3 UASCP-P Unavailable Second Path (UASCP-P) is a count of one-second intervals when the DS3 path is unavailable.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Table 8-20 Far-End CP-bit Path PMs for the DS3-12E and DS3N-12E Cards Parameter Definition DS3 CVCP-P Code Violation (CVCP-PFE) is a parameter that is counted when the three far-end block error (FEBE) bits in a M-frame are not all collectively set to 1.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Note The XX in the illustration above represents all PMs listed below with the given prefix and/or suffix.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Table 8-22 Near-End DS3 Path PMs for the DS3XM-6 Card Parameter Definition DS3 AISS-P AIS Seconds Path (AISS-P) is a count of one-second intervals containing one or more AIS defects. DS3 CVP-P Code Violation Path (CVP-P) is a code violation parameter for M23 applications. CVP-P is a count of P-bit parity errors occurring in the accumulation period.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Table 8-24 Near-End DS1 Path PMs for the DS3XM-6 Card Parameter Definition DS1 AISS-P Alarm Indication Signal Path (AIS-P) means an AIS occurred on the path. This parameter is a count of seconds containing one or more AIS defects. DS1 ES-P Errored Seconds Path (ES-P) is a count of the seconds containing one or more anomalies and/or defects for paths.
Chapter 8 Performance Monitoring Performance Monitoring for Electrical Cards Table 8-26 Near-End SONET Path PMs for the DS3XM-6 Card Parameter Definition STS CV-P Near-End STS Path Coding Violations (CV-P) is a count of BIP errors detected at the STS path layer (i.e., using the B3 byte). Up to eight BIP errors can be detected per frame; each error increments the current CV-P second register.
Chapter 8 Performance Monitoring Performance Monitoring for Optical Cards Table 8-28 Far-End VT PMs for the DS3XM-6 Card Parameter Definition CV-V Code Violation VT Layer (CV-V) is a count of the BIP errors detected at the VT path layer. Up to two BIP errors can be detected per VT superframe; each error increments the current CV-V second register. ES-V Errored Seconds VT Layer (ES-V) is a count of the seconds when at least one VT Path BIP error was detected.
Chapter 8 Performance Monitoring Performance Monitoring for Optical Cards Figure 8-21 PM read points on the OC-3 card ONS 15454 OC-3 Card XC10G Card DS1 Pointer Processors CV-S ES-S SES-S SEFS-S BTC ASIC STS CV-P STS ES-P STS FC-P STS SES-P STS UAS-P CV-L ES-L SES-L UAS-L FC-L Path Level PMs read on BTC ASIC PPJC-Pdet NPJC-Pdet PPJC-Pgen NPJC-Pgen 55308 PMs read on PMC Note For PM locations relating to protection switch counts, see the GR-253-CORE document.
Chapter 8 Performance Monitoring Performance Monitoring for Optical Cards Table 8-30 Near-End Line Layer PMs for the OC-3 Card Parameter Definition CV-L Near-End Line Code Violation (CV-L) is a count of BIP errors detected at the line-layer (i.e. using the B2 bytes in the incoming SONET signal). Up to 8 x N BIP errors can be detected per STS-N frame; each error increments the current CV-L second register.
Chapter 8 Performance Monitoring Performance Monitoring for Optical Cards Table 8-32 Near-End SONET Path H-byte PMs for the OC-3 Card Parameter Definition PPJC-Pdet Positive Pointer Justification Count, STS Path Detected (PPJC-Pdet) is a count of the positive pointer justifications detected on a particular path on an incoming SONET signal.
Chapter 8 Performance Monitoring Performance Monitoring for Optical Cards Table 8-34 Far-End Line Layer PMs for the OC-3 Card Parameter Definition CV-L Far-End Line Code Violation (CV-L) is a count of BIP errors detected by the far-end line terminating equipment (LTE) and reported back to the near-end LTE using the REI-L indication in the line overhead. For SONET signals at rates below OC-48, up to 8 x N BIP errors per STS-N frame can be indicated using the REI-L.
Chapter 8 Performance Monitoring Performance Monitoring for Optical Cards Note PMs on the protect STS are not supported for BLSR. The XX in the illustration above represents all PMs listed below with the given prefix and/or suffix.
Chapter 8 Performance Monitoring Performance Monitoring for Optical Cards Table 8-35 Near-End Section PMs for the OC-12, OC-48, and OC-192 Cards (continued) Parameter Definition SES-S Section Severely Errored Seconds (SES-S) is a count of the seconds when K (see GR-253 for value) or more section-layer BIP errors were detected or an SEF or LOS defect was present. SEFS-S Section Severely Errored Framing Seconds (SEFS-S) is a count of the seconds when an SEF defect was present.
Chapter 8 Performance Monitoring Performance Monitoring for Optical Cards Table 8-37 Near-End SONET Path H-byte PMs for the OC-12, OC-48, and OC-192 Cards (continued) Parameter Definition PPJC-Pgen Positive Pointer Justification Count, STS Path Generated (PPJC-Pgen) is a count of the positive pointer justifications generated for a particular path to reconcile the frequency of the SPE with the local clock.
Chapter 8 Performance Monitoring Performance Monitoring for Optical Cards Table 8-38 Near-End Line Layer PMs for the OC-12, OC-48, and OC-192 Cards (continued) Parameter Definition PSC-S In a 4-fiber BLSR, Protection Switching Count-Span (PSC-S) is a count of the number of times service switches from a working line to a protection line plus the number of times it switches back to the working line. A count is only incremented if span switching is used.
Chapter 8 Performance Monitoring Performance Monitoring for Optical Cards Table 8-40 Far-End Line Layer PMs for the OC-12, OC-48, and OC-192 Cards Parameter Definition CV-L Far-End Line Code Violation (CV-L) is a count of BIP errors detected by the far-end line terminating equipment (LTE) and reported back to the near-end LTE using the REI-L indication in the line overhead. For SONET signals at rates below OC-48, up to 8 x N BIP errors per STS-N frame can be indicated using the REI-L.
C H A P T E R 9 Ethernet Operation The Cisco ONS 15454 integrates Ethernet into a SONET time-division multiplexing (TDM) platform. Unlike traditional transport products, which map Ethernet frames directly over dedicated TDM bandwidth, the ONS 15454 incorporates layer 2 switching to allow more efficient data transport over the existing SONET backbone.
Chapter 9 Ethernet Operation Ethernet Cards Table 9-2 Port-level LEDs LED State Description Amber Transmitting and Receiving Solid Green Idle and Link Integrity Green Light Off Inactive Connection or Unidirectional Traffic 9.1.1 E100T-12/E100T-G E100T-12/E100T-G cards provide twelve switched, IEEE 802.3-compliant 10/100 Base-T Ethernet ports.
Chapter 9 Ethernet Operation Ethernet Cards For GBIC installation and cabling instructions, see the “Fiber-Optic Cable Installation” section on page 1-52. Caution E1000-2/E1000-2-G cards lose traffic for approximately 30 seconds when an ONS 15454 database is restored. Traffic is lost during the period of spanning tree reconvergence. The CARLOSS alarm will appear and clear during this period.
Chapter 9 Ethernet Operation Multicard and Single-Card EtherSwitch Step 3 From the Port screen, choose the appropriate mode for each Ethernet port. Valid choices for the E100T-12/E100T-G card are Auto, 10 Half, 10 Full, 100 Half, or 100 Full. Valid choices for the E1000-2/E1000-2-G card are 1000 Full or Auto. Both 1000 Full and Auto mode set the E1000-2 port to the 1000 Mbps and Full duplex operating mode; however, flow control is disabled when 1000 Full is selected.
Chapter 9 Ethernet Operation Multicard and Single-Card EtherSwitch Caution Whenever you drop two STS-3c multicard EtherSwitch circuits onto an Ethernet card and delete only the first circuit, you should not provision STS-1 circuits to the card without first deleting the remaining STS-3c circuit. If you attempt to create a STS-1 circuit after deleting the first STS-3c circuit, the STS-1 circuit will not work and no alarms will indicate this condition.
Chapter 9 Ethernet Operation Ethernet Circuit Configurations . Table 9-4 ONS 15454 and ONS 15327 Ethernet Circuit Combinations 15327 Single-Card 15327 Multicard 15454 Single-Card 15454 Multicard six STS-1s three STS-1s one STS 12c six STS-1s two STS 3cs one STS 3c two STS 6cs two STS 3cs one STS 6c one STS 6c and two STS 3cs one STS 6c one STS 12c one STS 6c and six STS-1s four STS 3cs two STS 3cs and six STS-1s twelve STS-1s 9.
Chapter 9 Ethernet Operation Ethernet Circuit Configurations Figure 9-5 A Multicard EtherSwitch point-to-point circuit ONS 15454 #1 192.168.1.100 255.255.255.0 VLAN test 1 Slot 5, port 1 192.168.1.50 255.255.255.0 VLAN test 1 Slot 15, port 1 ONS 15454 #3 ONS 15454 #2 192.168.1.75 255.255.255.0 VLAN test 1 Slot 17, port 1 SONET Ethernet Figure 9-6 43272 192.168.1.25 255.255.255.0 VLAN test 1 Slot 4, port 1 A Single-card Etherswitch point-to-point circuit 192.168.1.25 255.255.255.
Chapter 9 Ethernet Operation Ethernet Circuit Configurations Step 5 Navigate to the other ONS 15454 Ethernet circuit endpoint. Step 6 Repeat Steps 2 – 5. Step 7 Click the Circuits tab and click Create. The Circuit Creation (Circuit Attributes) dialog box opens (Figure 9-7). Figure 9-7 Provisioning an Ethernet circuit Step 8 In the Name field, type a name for the circuit. Step 9 From the Type pull-down menu, choose STS. Step 10 The VT and VT Tunnel types do not apply to Ethernet circuits.
Chapter 9 Ethernet Operation Ethernet Circuit Configurations Step 14 If you are building a Multicard EtherSwitch circuit, choose Ethergroup from the Slot menu and click Next. Step 15 If you are building a Single-card EtherSwitch circuit, from the Slot menu choose the Ethernet card where you enabled the single-card Etherswitch and click Next. The Circuit Creation (Destination) dialog box opens. Step 16 Choose the circuit destination from the Node menu, in this example Node 2.
Chapter 9 Ethernet Operation Ethernet Circuit Configurations 9.3.2 Shared Packet Ring Ethernet Circuits This section provides steps for creating a shared packet ring (Figure 9-9). Your network architecture may differ from the example.
Chapter 9 Ethernet Operation Ethernet Circuit Configurations For shared packet ring Ethernet, valid circuit sizes are STS-1, STS-3C and STS-6c. Step 14 Verify that the Bidirectional checkbox is checked. Note Step 15 You must manually provision the circuits if you are building a shared packet ring configuration. Click Next. The Circuit Creation (Circuit Source) dialog box opens. Step 16 From the Node menu, choose the circuit source. Any shared packet ring node can serve as the circuit source.
Chapter 9 Ethernet Operation Ethernet Circuit Configurations Figure 9-11 Selecting VLANs e. Highlight the VLAN name and click the >> tab to move the VLAN(s) from the Available VLANs column to the Circuit VLANs column (Figure 9-11). By moving the VLAN from the Available VLANs column to the Circuit VLANs column, all the VLAN traffic is forced to use the shared packet ring circuit you created. Step 22 Click Next. Step 23 Uncheck the Route Automatically checkbox and click Next.
Chapter 9 Ethernet Operation Ethernet Circuit Configurations Step 27 Click the green span leading to the next node. The span turns white. Step 28 Click Add Span. The span turns blue. Step 29 Repeat Steps 24 – 27 for every node remaining in the ring. Figure 9-13 shows the Circuit Path Selection dialog box with all the spans selected. Figure 9-13 Viewing a span Step 30 Verify that the new circuit is correctly configured.
Chapter 9 Ethernet Operation Ethernet Circuit Configurations 9.3.3 Hub and Spoke Ethernet Circuit Provisioning This section provides steps for creating a hub and spoke Ethernet circuit configuration. The hub and spoke configuration connects point-to-point circuits (the spokes) to an aggregation point (the hub). In many cases, the hub links to a high-speed connection and the spokes are Ethernet cards. Figure 9-14 illustrates a sample hub and spoke ring.
Chapter 9 Ethernet Operation Ethernet Circuit Configurations Step 12 From the Node menu, choose the circuit source. Either end node can be the circuit source. Step 13 From the Slot menu, choose the Ethernet card where you enabled the single-card EtherSwitch and click Next. The Circuit Creation (Circuit Destination) dialog box opens. Step 14 Choose the circuit destination from the Node menu. Choose the node that is not the source.
Chapter 9 Ethernet Operation Ethernet Circuit Configurations Step 25 Display the CTC node view. Step 26 Click the Circuits tab and click Create. Step 27 Choose STS from the Type pull-down menu. Note The types VT and VT Tunnel do not apply to Ethernet circuits. Step 28 Choose the size of the circuit from the Size pull-down menu. Step 29 Verify that the Bidirectional checkbox is checked and click Next. Step 30 Choose the circuit source from the Node menu and click Next.
Chapter 9 Ethernet Operation Ethernet Circuit Configurations Figure 9-15 Ethernet manual cross-connects Non-ONS Network ONS Node SONET Ethernet 47093 ONS Node Procedure: Provision a Single-card EtherSwitch Manual Cross-Connect Step 1 Display CTC for one of the ONS 15454 Ethernet circuit endpoints. Step 2 Double-click one of the Ethernet cards that will carry the circuit. Step 3 Click the Provisioning > Card tabs. Step 4 Under Card Mode, verify that Single-card EtherSwitch is checked.
Chapter 9 Ethernet Operation Ethernet Circuit Configurations The Circuit Creation (Circuit Destination) dialog box opens. Step 13 From the Node menu, choose the current node as the circuit destination. Step 14 From the Slot menu, choose the optical card that will carry the circuit. Step 15 Choose the STS that will carry the circuit from the STS menu and click Next. Note For Ethernet manual cross-connects, the same node serves as both source and destination.
Chapter 9 Ethernet Operation Ethernet Circuit Configurations Note If the circuit information is not correct use the Back button, then redo the procedure with the correct information. Alternately, you can click Finish, then delete the completed circuit and start the procedure from the beginning. Step 19 Click Finish. Step 20 You now need to provision the Ethernet ports and assign ports to VLANs. For port provisioning instructions, see the “Provision Ethernet Ports” procedure on page 9-3.
Chapter 9 Ethernet Operation Ethernet Circuit Configurations Note Step 10 The types VT and VT Tunnel do not apply to Ethernet circuits. Choose the size of the circuit from the Size pull-down menu. The valid circuit sizes for an Ethernet Multicard circuit are STS-1, STS-3c and STS-6c. Step 11 Verify that the Bidirectional checkbox is checked and click Next. The Circuit Creation (Circuit Source) dialog box opens. Step 12 From the Node menu, choose the current node as the circuit source.
Chapter 9 Ethernet Operation VLAN Support • Circuit name • Circuit type • Circuit size • VLANs on this circuit • ONS 15454 nodes included in this circuit Note Step 19 If the circuit information is not correct use the Back button, then redo the procedure with the correct information. Alternately, you can click Finish, then delete the completed circuit and start the procedure from the beginning. Click Finish. You now need to provision the Ethernet ports and assign ports to VLANs.
Chapter 9 Ethernet Operation VLAN Support 9.4.1 Q-Tagging (IEEE 802.1Q) IEEE 802.1Q allows the same physical port to host multiple 802.1Q VLANs. Each 802.1Q VLAN represents a different logical network. The ONS 15454 works with Ethernet devices that support IEEE 802.1Q and those that do not support IEEE 802.1Q. If a device attached to an ONS 15454 Ethernet port does not support IEEE 802.1Q, the ONS 15454 only uses Q-tags internally. The ONS 15454 associates these Q-tags with specific ports.
Chapter 9 Ethernet Operation VLAN Support Figure 9-20 A Q-tag moving through a VLAN Data Flow Q-tag ONS 15454 ONS 15454 The receiving ONS 15454 removes the Q-tag and forwards the frame to the specific VLAN. 1. The ONS 15454 uses a Q-tag internally to deliver the frame to a specific VLAN. Q-tag No tag Q-tag ONS 15454 2. The ONS 15454 receives a frame with a Q-tag and passes it on. Q-tag ONS 15454 The receiving ONS 15454 receives a frame with a Q-tag and passes it on. 61075 No tag 9.4.
Chapter 9 Ethernet Operation VLAN Support Table 9-5 Priority Queuing User Priority Queue Allocated Bandwidth 0,1,2,3 Low 30% 4,5,6,7 High 70% Figure 9-21 The priority queuing process Data Flow Priority ONS 15454 Priority tag removed ONS 15454 ONS 15454 maps a frame with port-based priority using a Q-tag. The receiving ONS 15454 removes the Q-tag and forwards the frame. Same priority Priority ONS 15454 ONS 15454 uses a Q-tag to map a frame with priority and forwards it on.
Chapter 9 Ethernet Operation VLAN Support Step 1 Display the CTC card view for the Ethernet card. Step 2 Click the Provisioning > VLAN tabs (Figure 9-22). Figure 9-22 Configuring VLAN membership for individual Ethernet ports Step 3 To put a port in a VLAN, click the port and choose either Tagged or Untag. Figure 9-22 on page 9-25 shows Port 1 in the red VLAN and Port 2 through Port 12 in the default VLAN. Table 9-6 shows valid port settings.
Chapter 9 Ethernet Operation Spanning Tree (IEEE 802.1D) Note If Tagged is chosen, the attached external devices must recognize IEEE 802.1Q VLANs. Note Both ports on individual E1000-2/E1000-2-G cards cannot be members of the same VLAN. 9.5 Spanning Tree (IEEE 802.1D) The Cisco ONS 15454 operates spanning tree protocol (STP) according to IEEE 802.1D when an Ethernet card is installed. STP operates over all packet-switched ports including Ethernet and SONET ports.
Chapter 9 Ethernet Operation Spanning Tree (IEEE 802.1D) Step 2 Click the Provisioning > Port tabs. Step 3 In the left-hand column, find the applicable port number and check the Stp Enabled checkbox to enable STP for that port. Step 4 Click Apply. 9.5.2 Spanning Tree Parameters Default spanning tree parameters are appropriate for most situations. Contact the Cisco Technical Assistance Center (TAC) at 1-877-323-7368 before you change the default STP parameters.
Chapter 9 Ethernet Operation Ethernet Performance and Maintenance Screens Table 9-8 Spanning Tree Configuration Column Default Value Value Range Priority 32768 0 - 65535 Bridge max age 20 seconds 6 - 40 seconds Bridge Hello Time 2 seconds 1 - 10 seconds Bridge Forward Delay 15 seconds 4 - 30 seconds 9.5.4 Spanning Tree Map The Circuit screen shows forwarding spans and blocked spans on the spanning tree map.
Chapter 9 Ethernet Operation Ethernet Performance and Maintenance Screens 9.6.1 Statistics Screen The Ethernet statistics screen lists Ethernet parameters at the line level. Table 9-9 defines the parameters. Display the CTC card view for the Ethernet card and click the Performance > Statistics tabs to display the screen.
Chapter 9 Ethernet Operation Remote Monitoring Specification Alarm Thresholds 9.6.4 MAC Table Screen A MAC address is a hardware address that physically identifies a network device. The ONS 15454 MAC table, also known as the MAC forwarding table, will allow you to see all the MAC addresses attached to the enabled ports of an Ethernet card or an Ethernet Group. This includes the MAC address of the network device attached directly to the port and any MAC addresses on the network linked to the port.
Chapter 9 Ethernet Operation Remote Monitoring Specification Alarm Thresholds One of the ONS 15454’s RMON MIBs is the Alarm group. The alarm group consists of the alarmTable. An NMS uses the alarmTable to find the alarm-causing thresholds for network performance. The thresholds apply to the current 15-minute interval and the current 24-hour interval. RMON monitors several variables, such as Ethernet collisions, and triggers an event when the variable crosses a threshold during that time interval.
Chapter 9 Ethernet Operation Remote Monitoring Specification Alarm Thresholds Table 9-10 Ethernet Threshold Variables (MIBs) (continued) Variable Definition etherStatsUndersizePkts Number of packets received with a length less than 64 octets etherStatsFragments Total number of packets that are not an integral number of octets or have a bad FCS, and that are less than 64 octets long etherStatsPkts64Octets Total number of packets received (including error packets) that were 64 octets in length eth
Chapter 9 Ethernet Operation Remote Monitoring Specification Alarm Thresholds Figure 9-26 Creating RMON thresholds Step 4 From the Slot menu, choose the appropriate Ethernet card. Step 5 From the Port menu, choose the Port on the Ethernet card. Step 6 From the Variable menu, choose the variable. Table 9-10 lists and defines the Ethernet Threshold Variables available in this field.
Chapter 9 Ethernet Operation Remote Monitoring Specification Alarm Thresholds Cisco ONS 15454 Installation and Operations Guide 9-34 November 2001
C H A P T E R 10 Alarm Monitoring and Management This chapter explains how to manage alarms with Cisco Transport Controller (CTC), which includes • Viewing alarms • Viewing history • Viewing conditions • Viewing alarm counts on the front-panel LCD • Creating and managing alarm profiles • Suppressing alarms To troubleshoot specific alarms, see the Cisco ONS 15454 Troubleshooting and Maintenance Guide. 10.
Chapter 10 Alarm Monitoring and Management Viewing ONS 15454 Alarms Table 10-1 Alarms Column Descriptions Column Information Recorded New Indicates a new alarm. To change this status check either the Synchronize Alarms or Delete Cleared Alarms checkbox, or reset the active TCC+ card.
Chapter 10 Alarm Monitoring and Management Viewing ONS 15454 Alarms Alarms display in one of five background colors, listed in Table 10-2, to quickly communicate the alarm severity. Events, conditions, and cleared alarms are also color coded. Conditions and events display in the History or Conditions tab.
Chapter 10 Alarm Monitoring and Management Viewing ONS 15454 Alarms Figure 10-2 Selecting the Affected Circuits option Procedure: View Affected Circuits for a Specific Alarm Step 1 Under the Alarm tab, right-click the Cond column of an active alarm. The Select Affected Circuit dialog appears. Step 2 Left-click Select Affected Circuits. The Circuits screen appears with affected circuits highlighted (Figure 10-3.
Chapter 10 Alarm Monitoring and Management Viewing ONS 15454 Alarms Figure 10-3 Highlighted circuit appears 10.2.3 Conditions Tab The Conditions tab displays retrieved fault conditions. A fault is a problem detected by ONS 15454 hardware or software. When a fault occurs and continues for a minimum time period, it raises a fault condition, which is a flag showing whether this particular fault currently exists on the ONS 15454.
Chapter 10 Alarm Monitoring and Management Viewing ONS 15454 Alarms Figure 10-4 Viewing fault conditions retrieved under the Conditions tabs 10.2.3.2 Conditions Column Descriptions Table 10-4 lists the tab’s column headings and the information recorded in each column.
Chapter 10 Alarm Monitoring and Management Viewing ONS 15454 Alarms 10.2.4 Viewing History The History tab displays historical alarm data. It also displays events, which are non-alarmed activities such as timing changes and threshold crossings. For example, protection switching events or performance monitoring threshold crossings appear here.
Chapter 10 Alarm Monitoring and Management Alarm Profiles 10.2.5 Viewing Alarms on the LCD The Critical, Major and Minor alarm LEDs on the fan-tray assembly front panel indicate whether a critical, major, or minor alarm is present anywhere on the ONS 15454. These LEDs are viewable through the front door so that you can quickly determine if any alarms are present on the node. These LEDs are independent of the Card, Port, and Status indicators on the LCD.
Chapter 10 Alarm Monitoring and Management Alarm Profiles 10.3.1 Creating and Modifying Alarm Profiles Alarm profiles are created at the network view using the Provisioning > Alarm Profiles tabs (Figure 10-7.) A default alarm profile (in the Default column) is pre-provisioned for every alarm. After loading the Default profile on the node, you can use the Clone feature to create new profiles based on the default alarm profile.
Chapter 10 Alarm Monitoring and Management Alarm Profiles Profile names must be unique. If you try to import or name a profile that has the same name as another profile, CTC adds a suffix to create a new name. Step 9 Click OK. A new alarm profile (named in Step 5) is created. This profile duplicates the severities of the default profile and is added as a new column on the far right-hand side. Step 10 Note Modify (customize) the alarm profile: a.
Chapter 10 Alarm Monitoring and Management Alarm Profiles Table 10-6 Alarm Profile Editing Options Button Description Store Saves a profile in either a node or a file Rename Changes a profile name Clone Creates a new profile that contains the same alarm severity settings as the highlighted profile (the profile being cloned) Reset Restores a profile to the state of that profile before it was last applied or to the state when it was first loaded, if it has not yet been applied Remove Removes a p
Chapter 10 Alarm Monitoring and Management Alarm Profiles Figure 10-8 Node view of a DS1 alarm profile At the card level, you can apply profile changes on a port-by-port basis or set all ports on that card at once. Figure 10-9 shows the affected DS-1 card; notice the CTC shows Parent Card Profile: Inherited.
Chapter 10 Alarm Monitoring and Management Alarm Profiles Procedure: Apply an Alarm Profile at the Card View Step 1 In CTC, display the card view of the desired card. Step 2 Click the Provisioning > Alarm Behavior tabs. Step 3 To apply profiles on a port-to-port basis: Step 4 Tip a. Click the appropriate row under the Profile column for the port desired. b. Choose the appropriate Profile. c. Click Apply. (Multiple port profiles can be selected before clicking Apply.
Chapter 10 Alarm Monitoring and Management Suppressing Alarms 10.4 Suppressing Alarms Suppressing alarms causes alarms to appear under the Conditions tab instead of the Alarms tab. It prevents alarms from appearing on CTC Alarm or History tabs or in any other clients. The suppressed alarms behave like conditions, which have their own non-reporting (NR) severities. Under the Conditions tab, the suppressed alarms appear with their alarm severity, color code, and service-affecting status.
Chapter 10 Alarm Monitoring and Management Suppressing Alarms Note When you uncheck the Suppress Alarms checkbox and click Apply, the node sends out autonomous messages to raise any actively suppressed alarms.
Chapter 10 Alarm Monitoring and Management Suppressing Alarms Cisco ONS 15454 Installation and Operations Guide 10-16 November 2001
C H A P T E R 11 SNMP This chapter explains Simple Network Management Protocol (SNMP) as implemented by the Cisco ONS 15454. 11.1 SNMP Overview SNMP is an application-layer communication protocol that allows network devices to exchange management information. SNMP enables network administrators to manage network performance, find and solve network problems, and plan network growth. The ONS 15454 uses SNMP to provide asynchronous event notification to a network management system (NMS).
Chapter 11 SNMP SNMP Basic Components 52582 Figure 11-1 A basic network managed by SNMP 11.2 SNMP Basic Components An SNMP-managed network consists of three primary components: managed devices, agents, and management systems. A managed device is a network node that contains an SNMP agent and resides on an SNMP-managed network. Managed devices collect and store management information and use SNMP to make this information available to management systems that use SNMP.
Chapter 11 SNMP SNMP Support Figure 11-3 Example of the primary SNMP components Management Entity NMS Agent Agent Management Database Management Database Management Database 33930 Agent Managed Devices 11.3 SNMP Support The ONS 15454 supports SNMP v1 and v2c traps and get requests. The SNMP MIBs in the ONS 15454 define alarms, traps, and status. Through SNMP, NMS applications can query a management agent using a supported MIB.
Chapter 11 SNMP SNMP Support Figure 11-4 Setting up SNMP Step 4 Type the IP address of your NMS in the IP Address field. Step 5 Type the SNMP community name in the Community Name field. For a description of SNMP community names, see the “SNMP Community Names” section on page 11-8. Step 6 Note The community name is a form of authentication and access control. The community name assigned to the ONS 15454 is case-sensitive and must match the community name of the NMS.
Chapter 11 SNMP SNMP Management Information Bases Figure 11-5 Viewing trap destinations 11.4 SNMP Management Information Bases A management information base (MIB) is a hierarchically-organized collection of information. Network-management protocols, such as SNMP, gain access to MIBs. MIBs consist of managed objects and are identified by object identifiers. The ONS 15454 SNMP agent communicates with an SNMP management application using SNMP messages. Table 11-1 describes these messages.
Chapter 11 SNMP SNMP Traps Table 11-1 SNMP Message Types Operation Description get-bulk-request Similar to a get-next-request, but this operation fills the get-response with up to the max-repetition number of get-next interactions trap An unsolicited message sent by an SNMP agent to an SNMP manager indicating that an event has occurred A managed object (sometimes called a MIB object) is one of any specific characteristics of a managed device.
Chapter 11 SNMP SNMP Traps is service affecting or non-service affecting. The traps also contain a date/time stamp that shows the date and time the alarm occurred. The ONS 15454 also generates a trap for each alarm when the alarm condition clears. Each SNMP trap contains ten variable bindings listed in Table 11-4. Table 11-3 SNMP Trap Variable Bindings Number Name Description 1 cerentGenericAlarmTable This table holds all the currently-raised alarms.
Chapter 11 SNMP SNMP Community Names Table 11-4 Traps Supported in the ONS 15454 Trap From RFC# Description ColdStart RFC1213-MIB Agent up, cold start WarmStart RFC1213-MIB Agent up, warm start AuthenticationFailure RFC1213-MIB Community string does not match NewRoot RFC1493/ Sending agent is the new root of the spanning tree BRIDGE-MIB TopologyChange EntConfigChange RFC1493/ BRIDGE-MIB A port in a bridge has changed from Learning to Forwarding or Forwarding to Blocking RFC2037/ The ent
Chapter 11 SNMP SNMP Remote Network Monitoring typical CTC user, because RMON interoperates with an NMS. However, with CTC you can provision the RMON alarm thresholds (see the “SNMP Remote Network Monitoring” section on page 11-8). CTC also monitors the five RMON groups implemented by the ONS 15454. ONS 15454 RMON implementation is based on the IETF-standard MIB Request for Comment (RFC)1757.
Chapter 11 SNMP SNMP Remote Network Monitoring Cisco ONS 15454 Installation and Operations Guide 11-10 November 2001
A P P E N D I X A Circuit Routing This appendix provides an in-depth explanation of ONS 15454 circuit routing and VT tunneling in mixed protection or meshed environments, such as the one shown in Figure A-1. For circuit creation and provisioning procedures, see Chapter 6, “Circuits and Tunnels.
Appendix A Circuit Routing Automatic Circuit Routing Circuit Routing Characteristics The following list provides principles and charactistics of automatic circuit routing: • Circuit routing tries to use the shortest path within the user-specified or network-specified constraints. VT tunnels are preferable for VT circuits because VT tunnels are considered shortcuts when CTC calculates a circuit path in path-protected mesh networks.
Appendix A Circuit Routing Manual Circuit Routing Secondary sources and drops Primary source Primary destination Vendor A network Vendor B network Secondary source Secondary destination ONS 15454 network 55402 Figure A-2 Several rules apply to secondary sources and drops: • CTC does not allow a secondary destination for unidirectional circuits because you can always specify additional destinations (drops) after you create the circuit • Primary and secondary sources should be on the same node
Appendix A Circuit Routing Manual Circuit Routing • If you enabled Fully Path Protected, choose a diverse protect (alternate) path for every unprotected segment (see Figure A-3).
Appendix A Circuit Routing Manual Circuit Routing Figure A-5 Ethernet shared packet ring routing Ethernet source Node 1 Node 2 Node 3 Node 4 55405 Ethernet destination • Multicard EtherSwitch circuits can have virtual UPSR segments if the source or destination is not in the UPSR domain. This restriction also applies after circuit creation; therefore if you create a circuit with UPSR segments, Ethernet node drops cannot exist anywhere on the UPSR segment (see Figure A-6).
Appendix A Circuit Routing Manual Circuit Routing Table A-1 Bidirectional STS/VT/Regular Multicard EtherSwitch/Point-to-Point (straight) Ethernet Circuits (continued) # of Inbound Links # of Outbound Links # of Sources # of Drops Connection Type - 2 2 - Double UPSR 1 1 - - Two Way 0 or 1 0 or 1 Ethernet Node Source - Ethernet 0 or 1 0 or 1 - Ethernet Node Drop Ethernet Table A-2 Unidirectional STS/VT Circuit # of Inbound Links # of Outbound Links # of Sources # of Drops C
Appendix A Circuit Routing Constraint-Based Circuit Routing Table A-4 Bidirectional VT Tunnels (continued) # of Inbound Links # of Outbound Links # of Sources # of Drops Connection Type - - - VT tunnel end point At destination nodes only 1 Although virtual UPSR segments are possible in VT Tunnels, VT tunnels are still considered unprotected.
Appendix A Circuit Routing Constraint-Based Circuit Routing Cisco ONS 15454 Installation and Operations Guide A-8 November 2001
A P P E N D I X B Regulatory and Compliance Requirements This appendix lists customer, industry, and government requirements met by the Cisco ONS 15454. Installation warnings are also included.
Appendix B Regulatory and Compliance Requirements Japan Approvals Table B-1 Standards (continued) Discipline Country Specification Environmental Canada Telcordia GR-63-CORE NEBS USA Cisco Mechanical Environmental Design and Qualification Guideline ENG-3396 Canada Telcordia GR-63-CORE NEBS USA Bell Atlantic NEBS Requirements, RNSA-NEB-95-0003, Rev 8 Structural Dynamics (Mechanical) AT&T Network Equipment Development Standards (NEDS) Generic Requirements, AT&T 801-900-160 Pacific Bell/Nevada
Appendix B Regulatory and Compliance Requirements Installation Warnings Class A Notice Warning This is a Class A Information Product. When used in residential environment, it may cause radio frequency interference. Under such circumstances, the user may be requested to take appropriate countermeasures.
Appendix B Regulatory and Compliance Requirements Installation Warnings ¡Advertencia! Ver las instrucciones de instalación antes de conectar el sistema a la red de alimentación. Varning! Läs installationsanvisningarna innan du kopplar systemet till dess strömförsörjningsenhet. DC Power Disconnection Warning Warning Waarschuwing Varoitus Before performing any of the following procedures, ensure that power is removed from the DC circuit.
Appendix B Regulatory and Compliance Requirements Installation Warnings Aviso Antes de executar um dos seguintes procedimentos, certifique-se que desligou a fonte de alimentação de energia do circuito de corrente contínua. Para se assegurar que toda a corrente foi DESLIGADA, localize o disjuntor no painel que serve o circuito de corrente contínua e coloque-o na posição OFF (Desligado), segurando nessa posição a manivela do interruptor do disjuntor com fita isoladora.
Appendix B Regulatory and Compliance Requirements Installation Warnings ¡Advertencia! Después de cablear la fuente de alimentación de corriente continua, retirar la cinta de la palanca del interruptor automático, y restablecer la alimentación cambiando la palanca a la posición de Encendido (ON).
Appendix B Regulatory and Compliance Requirements Installation Warnings Outside Line Connection Warning Warning Waarschuwing Metallic interfaces for connection to outside plant lines (such as T1/E1/T3/E3 etc.) must be connected through a registered or approved device such as CSU/DSU or NT1. Metaalhoudende interfaces bestemd voor aansluiting op fabrieksleidingen buiten (zoals T1/E1/T3/E3 etc.) dienen aangesloten te worden m.b.v. een geregistreerd of goedgekeurd apparaat zoals CSU/DSU of NT1.
Appendix B Regulatory and Compliance Requirements Installation Warnings Class 1 Laser Product Warning Warning Waarschuwing Varoitus Class 1 laser product. Klasse-1 laser produkt. Luokan 1 lasertuote. Attention Produit laser de classe 1. Warnung Laserprodukt der Klasse 1. Avvertenza Prodotto laser di Classe 1. Advarsel Laserprodukt av klasse 1. Aviso Produto laser de classe 1. ¡Advertencia! Varning! Producto láser Clase I. Laserprodukt av klass 1.
Appendix B Regulatory and Compliance Requirements Installation Warnings Warnung Laserprodukte der Klasse I (21 CFR 1040.10 und 1040.11) und Klasse 1M (IEC 60825-1 2001-01). Avvertenza Prodotti laser di Classe I (21 CFR 1040.10 e 1040.11) e Classe 1M (IEC 60825-1 2001-01). Advarsel Klasse I (21 CFR 1040.10 og 1040.11) og klasse 1M (IEC 60825-1 2001-01) laserprodukter. Aviso ¡Advertencia! Varning! Produtos laser Classe I (21 CFR 1040.10 e 1040.11) e Classe 1M (IEC 60825-1 2001-01).
Appendix B Regulatory and Compliance Requirements Installation Warnings Advarsel Denne enheten er laget for installasjon i områder med begrenset adgang. Et område med begrenset adgang gir kun adgang til servicepersonale som bruker et spesielt verktøy, lås og nøkkel, eller en annen sikkerhetsanordning, og det kontrolleres av den autoriteten som er ansvarlig for området. Aviso Esta unidade foi concebida para instalação em áreas de acesso restrito.
Appendix B Regulatory and Compliance Requirements Installation Warnings ¡Advertencia! Varning! Al instalar el equipo, conectar la tierra la primera y desconectarla la última. Vid installation av enheten måste jordledningen alltid anslutas först och kopplas bort sist. Qualified Personnel Warning Warning Waarschuwing Varoitus Avertissement Achtung Avvertenza Advarsel Aviso ¡Atención! Varning Only trained and qualified personnel should be allowed to install or replace this equipment.
Appendix B Regulatory and Compliance Requirements Installation Warnings Varoitus Kun porttiin ei ole kytketty kaapelia, portin aukosta voi vuotaa näkymätöntä lasersäteilyä. Älä katso avoimiin aukkoihin, jotta et altistu säteilylle. Attention Etant donné qu’un rayonnement laser invisible peut être émis par l’ouverture du port quand aucun câble n’est connecté, ne pas regarder dans les ouvertures béantes afin d’éviter tout risque d’exposition au rayonnement laser.
Appendix B Regulatory and Compliance Requirements Installation Warnings Avvertenza Advarsel Aviso ¡Advertencia! Varning! Questa unità ha più di una connessione per alimentatore elettrico; tutte le connessioni devono essere completamente rimosse per togliere l'elettricità dall'unità. Denne enheten har mer enn én strømtilkobling. Alle tilkoblinger må kobles helt fra for å eliminere strøm fra enheten.
Appendix B Regulatory and Compliance Requirements Installation Warnings Warnung Eine unsichtbare Laserstrahlung kann vom Ende des nicht angeschlossenen Glasfaserkabels oder Steckers ausgestrahlt werden. Nicht in den Laserstrahl schauen oder diesen mit einem optischen Instrument direkt ansehen. Ein Betrachten des Laserstrahls mit bestimmten optischen Instrumenten, wie z.B. Augenlupen, Vergrößerungsgläsern und Mikroskopen innerhalb eines Abstands von 100 mm kann für das Auge gefährlich sein.
Appendix B Regulatory and Compliance Requirements Installation Warnings Laser Activation Warning Warning The laser is on when the card is booted and the safety key is in the on position (labeled 1). The port does not have to be in service for the laser to be on. The laser is off when the safety key is off (labeled 0). Waarschuwing De laser is aan zodra de kaart is opgestart en de veiligheidssleutel in de AAN-positie is (gelabeld 1). De poort hoeft niet in dienst te zijn om de laser aan te zetten.
Appendix B Regulatory and Compliance Requirements Installation Warnings Cisco ONS 15454 Installation and Operations Guide B-16 November 2001
A P P E N D I X C Acronyms Numerics 10BaseT standard 10 megabit per second local area network over unshielded twisted pair copper wire 100BaseT standard 100 megabit per second ethernet network 100BaseTX specification of 100BaseT that supports full duplex operation A ACO Alarm Cutoff ACT/STBY Active/Standby ADM Add-Drop Multiplexer AIC Alarm Interface Controller AID Access Identifier AIP Alarm Interface Panel AIS Alarm Indication Signal Cisco ONS 15454 Installation and Operations Guide November
Appendix C Acronyms AIS-L Line Alarm Indication Signal AMI Alternate Mark Inversion ANSI American National Standards Institute APS Automatic Protection Switching ARP Address Resolution Protocol ATAG Autonomous Message Tag ATM Asynchronous Transfer Mode AWG American Wire Gauge B B8ZS Bipolar 8 Zero Substitution BER Bit Error Rate BIC Backplane Interface Connector BIP Bit Interleaved Parity BITS Building Integrated Timing Supply BLSR Bidirectional line switched ring Cisco ONS 15454 Installat
Appendix C Acronyms BNC Bayonet Neill-Concelman (coaxial cable bayonet locking connector) BPDU Bridge Protocol Data Unit C CAT 5 Category 5 (cabling) CCITT Consultative Committee International Telegraph and Telephone (France) CEO Central Office Environment CEV Controlled Environment Vaults CLEI Common Language Equipment Identifier code CLNP Correctionless Network Protocol CMIP Common Management Information Protocol cm centimeter COE Central Office Environment CORBA Common Object Request Broke
Appendix C Acronyms CTC Cisco Transport Controller D DCC Data Communications Channel DCN Data Communications Network DCS Distributed Communications System DRAM Dynamic Random Access Memory DS-1 Digital Signal Level One DS-3 Digital Signal Level Three DS1-14 Digital Signal Level One (14 ports) DS1N-14 Digital Signal Level One (N-14 ports) DS3-12 Digital Signal Level Three (12 ports) DS3N-12 Digital Signal Level Three (N-12 ports) DS3XM-6 Digital Service, level 3 Trans Multiplexer 6 ports DSX
Appendix C Acronyms E EDFA Erbium Doped Fiber Amplifier EFT Electrical Fast Transient/Burst EIA Electrical Interface Assemblies ELR Extended Long Reach EMI Electromagnetic interface EML Element Management Layer EMS Element Management System EOW Express Orderwire ERDI Enhanced Remote Defect Indicator ES Errored Seconds ESD Electrostatic Discharge ESF Extended Super Frame ETSI European Telecommunications Standards Institute Cisco ONS 15454 Installation and Operations Guide November 2001 C-5
Appendix C Acronyms F FC Failure Count FDDI Fiber Distributed Data Interface FE Frame Bit Errors FG1 Frame Ground #1(pins are labeled “FG1,” “FG2,” etc.
Appendix C Acronyms IEEE Institute of Electrical and Electronics Engineers IETF Internet Engineering Task Force IP Internet Protocol IPPM Intermediate-Path Performance Monitoring I/O Input/Output ITU-T The International Telecommunication Union- Telecommunication Standards Sector J JRE Java Runtime Environment L LAN Local Area Network LCD Liquid Crystal Display LDCC Line Data Communications Channel LOP Loss of Pointer LOS Loss of Signal LOF Loss of Frame Cisco ONS 15454 Installation and Ope
Appendix C Acronyms LOW Local Orderwire LTE Line Terminating Equipment LVDS Low Voltage Differential Signal M MAC Media Access Control Mbps Million bits per second, or Million bytes per second Mhz Megahertz MIB Management Information Bases MIME Multipurpose Internet Mail Extensions Mux/Demux Multiplexer/Demultiplexer N NE Network Element NEL Network Element Layer NEBS Network Equipment-Building Systems NML Network Management Layer Cisco ONS 15454 Installation and Operations Guide C-8 Nov
Appendix C Acronyms NMS Network Management System O OAM&P Operations, Administration, Maintenance, and Provisioning OC Optical carrier OOS AS Out of Service Assigned OSI Open Systems Interconnection OSPF Open Shortest Path First OSS Operations Support System OSS/NMS Operations Support System/Network Management System P PCM Pulse Code Modulation PCMCIA Personal Computer Memory Card International Association PCN Product Change Notices PDI-P STS Payload Defect Indication-Path POP Point of Pres
Appendix C Acronyms PM Performance Monitoring PPMN Path-Protected Mesh Network PSC Protection Switching Count PSD Protection Switching Duration PTE Path Terminating Equipment R RAM Random Access Memory RDI-L Remote Defect Indication Line RES Reserved RJ45 Registered Jack #45 (8 pin) RMA Return Material Authorization RMON Remote Network Monitoring RS232 Recommended Standard #232 (ANSI Electrical Interface for Serial Communication Rx Receive Cisco ONS 15454 Installation and Operations Guide
Appendix C Acronyms S SCI Serial Communication Interface SCL System Communications Link SDCC Section Data Communications Channel SDH/SONET Synchronous Digital Hierarchy/Synchronous Optical Network SEF Severely Errored Frame SELV Safety Extra Low Voltage SES Severely Errored Seconds SF Super Frame SML Service Management Layer SMF Single Mode Fiber SNMP Simple Network Management Protocol SNTP Simple Network Time Protocol SONET Synchronous Optical Network SPE Synchronous Payload Envelope Cisco
Appendix C Acronyms SSM Synchronous Status Messaging STA Spanning Tree Algorithm STP Shielded Twisted Pair STS-1 Synchronous Transport Signal Level 1 SWS SONET WAN Switch SXC SONET Cross Connect ASIC T TAC Technical Assistance Center TBOS Telemetry Byte Oriented Serial protocol TCA Threshold Crossing Alert TCC+ Timing Communications and Control+ Card TCP/IP Transmission Control Protocol/Internet Protocol TDM Time Division Multiplexing TDS Time Division Switching TID Target Identifier Cisco
Appendix C Acronyms TL1 Transaction Language 1 TLS Transparent LAN service TMN Telecommunications Management Network TSA Time Slot Assignment TSI Time-Slot Interchange Tx Transmit U UAS Unavailable Seconds UDP/IP User Datagram Protocol/Internet Protocol UID User Identifier UPSR Unidirectional Path Switched Ring UTC Universal Time Coordinated UTP Unshielded Twisted Pair V VDC Volts Direct Current Cisco ONS 15454 Installation and Operations Guide November 2001 C-13
Appendix C Acronyms VLAN Virtual Local Area Network VPN Virtual Private Network VT1.5 Virtual Tributary equals 1.544 megabits per second W WAN Wide Area Network W Watts X XC Cross Connect XCVT Cross Connect Virtual Tributary X.
A P P E N D I X D Glossary Numerics 1:1 protection A card protection scheme that pairs a working card with a protect card of the same type in an adjacent slot. If the working card fails, the traffic from the working card switches to the protect card. When the failure on the working card is resolved, traffic reverts back to the working card if this option is set. This protection scheme is specific to electrical cards.
Appendix D Glossary AID Access Identifier. An access code used in TL1 messaging that identifies and addresses specific objects within the ONS 15454. These objects include individual pieces of equipment, transport spans, access tributaries, and others. AMI Alternate Mark Inversion. Line-code format used on T1 circuits that transmits ones by alternate positive and negative pulses. Zeroes are represented by 01 during each bit cell and ones are represented by 11 or 00, alternately, during each bit cell.
Appendix D Glossary Bridge Device that connects and passes packets between two network segments that use the same communications protocol. In general, a bridge will filter, forward, or flood an incoming frame based on the MAC address of that frame. Broadcast Data packet that will be sent to all nodes on a network. Broadcasts are identified by a broadcast address. Compare with multicast and unicast. See also Broadcast address.
Appendix D Glossary CTC Cisco Transport Controller. A Java-based graphical user interface (GUI) that allows operations, administration, maintenenance, and provisioning (OAM&P) of the ONS 15454 using an Internet browser. CTM Cisco Transport Manager. A Java-based network management tool used to support large networks of Cisco 15000-class equipment. CV code violation D DCC Data Communications Channel.
Appendix D Glossary EIA Electrical Interface Assemblies. Provides connection points for the ONS 15454 and DS-1, DS-3, or EC-1 units. EMI Electromagnetic Interference. Interference by electromagnetic signals that can cause reduced data integrity and increased error rates on transmission channels. Envelope The part of messaging that varies in composition from one transmittal step to another.
Appendix D Glossary G GBIC Gigabit Interface Converter. A hot-swappable input/output device that plugs into a Gigabit Ethernet port to link the port with the fiber optic network. H Hard reset The physical removal and insertion of a card. A card pull. HDLC High-Level Data Link Control. Bit-oriented, synchronous, data-link layer protocol developed by ISO. HDLC specifies a data encapsulation method on synchronous serial links using frame characters and checksums.
Appendix D Glossary L LAN Local Area Network. High-speed, low error data network covering a relatively small geographic area. LANs connect workstations, peripherals, terminals, and other devices in a single building or other geographically limited area. Ethernet, FDDI, and Token Ring are widely used LAN technologies. LCD Liquid Crystal Display. An alphanumeric display using liquid crystal sealed between two pieces of glass. LCDs conserve electricity.
Appendix D Glossary Managed device A network node that contains an SNMP agent and resides on a managed network. Managed devices include routers, access servers, switches, bridges, hubs, computer hosts, and printers. Managed object In network management, a network device that can be managed by a network management protocol. Sometimes called an MIB object.
Appendix D Glossary Node Endpoint of a network connection or a junction common to two or more lines in a network. Nodes can be processors, controllers, or workstations. Nodes, which vary in routing and other functional capabilities, can be interconnected by links, and serve as control points in the network. Node is sometimes used generically to refer to any entity that can access a network. In this manual the term “node” usually refers to an ONS 15454.
Appendix D Glossary Ping Packet internet grouper. ICMP echo message and its reply. Often used in IP networks to test the reachability of a network device. PPJC positive pointer justification count PPMN Path Protected Mesh Network. PPMN extends the protection scheme of a unidirectional path switched ring (UPSR) beyond the basic ring configuration to the meshed architecture of several interconnecting rings.
Appendix D Glossary RMON Remote Network Monitoring. Allows network operators to monitor the health of the network with a Network Management System (NMS). RMON watches several variables, such as Ethernet collisions, and triggers an event when a variable crosses a threshold in the specified time interval. S SNMP Simple Network Management Protocol. Network management protocol used almost exclusively in TCP/IP networks.
Appendix D Glossary Static route A route that is manually entered into a routing table. Static routes take precedence over routes chosen by all dynamic routing protocols. STP Spanning Tree Protocol. Bridge protocol that uses the spanning-tree algorithm to enable a learning bridge to dynamically work around loops in a network topology by creating a spanning tree. See also Spanning tree, STA, and Learning bridge. STS-1 Synchronous Transport Signal 1. Basic building block signal of SONET, operating at 51.
Appendix D Glossary Telcordia Telcordia Technologies, Inc., formerly named Bellcore. Eighty percent of the U.S. telecommunications network depends on software invented, developed, implemented, or maintained by Telcordia. TID Target Identifier. Identifies the particular network element (in this case, the ONS 15454) where each TL1 command is directed. The TID is a unique name given to each system at installation. TLS Transparent LAN Service. Provides private network service across a SONET backbone.
Appendix D Glossary V Virtual fiber A fiber that carries signals at different rates and uses the same fiber optic cable. Virtual ring Entity in a source-route bridging (SRB) network that logically connects two or more physical rings together either locally or remotely. The concept of virtual rings can be expanded across router boundaries. Virtual wires Virtual wires route external alarms to one or more alarm collection centers across the SONET transport network. VLAN Virtual LAN.
I N D E X provisioning external alarms Numerics 7-27 provisioning external controls 1+1 optical card protection description virtual wires 3-9 AIP creating a protection group creating linear ADMs 3-9 7-26 1-16, 10-8 air filter 5-41 description 1:1 electrical card protection description 3-9 1-25 bottom brackets 1-26 node installation 1-8 converting DS-1 cards to 1:N protection 7-31 AIS converting DS-3 cards to 1:N protection 7-33 alarm indication signal see AIS creating a protectio
Index viewing wires 10-1 1-33 alarm settings TBOS 1-33 timing 1-33 X.
Index PSC converting DS-1 and DS-3 card protection groups 8-40 removing a node ring switching 5-21 5-5 set up procedures span switching creating a protection group 3-9 deleting a protection group 3-11 editing a protection group 5-10 Ethernet (spanning tree) 5-5 subtending a BLSR 5-40 subtending a UPSR 5-38 card provisioning AIC card 3-11 9-26 7-1 to 7-34 7-25 testing 5-16 converting DS-1 and DS-3 protection groups timing 5-14 CTC card view 2-21 electrical cards 7-2 two-fiber
Index hub-and-spoke Ethernet circuit 9-14 manual Ethernet cross-connects manual routing detail monitoring names 9-16 2-1 to 2-13 colors 10-3 deleting 6-2, 6-6 point-to-point Ethernet circuit provisioning with a shortcut 10-3 history 9-6 10-7 profiles 2-17 10-8 see also alarms 6-5 route automatically searching installing alarms A-3 6-9 review routes CTC viewing 6-4, 6-7 10-1 card inventory 6-10 shared packet ring Ethernet circuit STS switching 9-10 card protection setup unid
Index OC-3 card 8-34 CV-V parameter DS-1 cards 8-20, 8-22 DS3XM-6 card 8-31, 8-33 CD-ROM xxxvi obtaining xxxv online 2-4 related xxxiv domains description D 2-17 changing background color database MAC address version 1-16 3-19 data communication channels see DCC data export 2-17 opening 2-19 removing 2-19 renaming 2-19 drop 2-26 datagrams creating creating multiple drops 4-5 date definition 6-2 6-12, 6-15 default 1-30 drop port setting 3-2 nodes capacity seconda
Index DS1 Rx ES-P parameter DS-3 cards 8-19 8-23 DS1 Rx SAS-P parameter 8-19 DS3E cards DS1 Rx SES-P parameter 8-19 DS3XM-6 card DS1 Rx UAS-P parameter 8-26 DS3 ES-P parameter 8-19 DS1 SAS-P parameter 8-31 DS1 SES-L parameter 8-19 DS3E cards DS1 SES-P parameter 8-31 DS3XM-6 card 8-26 8-20 DS3E cards DS1 Tx ES-P parameter 8-20 DS3XM-6 card DS1 Tx SAS-P parameter 8-20 DS1 Tx SES-P parameter 8-20 8-23 8-26 8-29 DS3N-12E card modify line and threshold settings path trace 8-20
Index DS3XM-6 card installing DS-1 cables alarm settings export data electrical interface assemblies see EIA 7-14 environment variable 2-27 path trace 6-12 performance monitoring 8-28 provision line and threshold settings 7-11 DS-N cards creating protection groups EIA requirement exporting data 1-40 ESD plug input 1-12 ES-L parameter 8-29 DS-1 cards 8-19 DS-3 cards 8-23 DS3E cards 3-9 EC-1 card 1-2 2-4 8-26 8-15 OC-12, OC-48, OC-192 cards 2-26 modifying transmission settings
Index router aggregation spanning tree protection statistics screen OC-12, OC-48, OC-192 cards 9-1 trunk utilization screen events attaching to power cables 9-31 fiber boot 9-21 1-63 1-53 fiber-optic cables 10-3, 10-7 installation on GBIC (Ethernet cards) adding a BLSR node installation on OC-N cards 5-18 BLSR bandwidth reuse routing 5-7 converting degrees to degrees and minutes creating a VT1.5 circuit on an EC-1 card creating login node groups creating VT1.
Index H hello interval 4-14 attaching ferrites hop 1-37 1-3 1-34 B-1 intermediate-path performance monitoring see IPPM 1-62 Internet Inter-ORB Protocol see IIOP 1-18 internet protocol see IP 1-22 interoperability 4-7, 4-9 hosts tasks (hardware) warnings attaching coaxial cable installing 1-38 timing wires high-density BNC EIA description SMB connectors JRE compatibility 3-2 2-2 ONS node Ethernet circuit combinations hub-and-spoke 9-14 software and hardware matrix inventory 9
Index J1 path trace line timing 6-12 to 6-15 Java 3-12 listener port and CTC, overview console window java.
Index NPJC-Pdet parameter N description navigating in CTC 2-22 EC-1 card Netscape Communicator obtaining 8-17 OC-12, OC-48, OC-192 cards 2-2 OC-3 card running the CTC setup wizard 2-4 7-21 NPJC-Pgen parameter 2-1 EC-1 card disabling proxy service 2-8 testing the node connection network interface cards 8-39 8-36 provisioning Netscape Navigator CTC browser 8-12 8-12 8-17 OC-12, OC-48, OC-192 cards 2-6 OC-3 card 2-5 8-40 8-36 provisioning 7-21 networks building circuits 6-1
Index OSPF connecting nodes to CTC definition 4-6 5-32 enabling, general 3-10 Ethernet 4-10 to 4-13 routing table enable for UPSR 9-3 IIOP port 4-5 P 2-12 LCD button 3-4 listener port 2-12 path trace source and drop passwords protection 2-9, 3-8 3-9 path-protected mesh network see PPMN RJ-45 on TCC+ path trace status PDI-P 6-12 to 6-15 performance monitoring 15-minute intervals clear count stored feeds 8-7 DS3 and DS3N parameters IPPM description 8-24 EC-1 card 8-22 OC-
Index count PSD-S (span switching) 7-21 count see PSC duration PSD-W (working) 8-35 Q duration see PSD editing a UPSR circuit reversion time revertive 6-11 queuing 9-23 6-3, 6-7 3-10, 6-3, 6-7 ring switching R 5-5 protocols IP 8-40 7-22 duration parameter (PSD) DHCP 8-41 rack installation 3-3 1-5 to 1-11 19-inch rack 4-1 overview 1-6 1-5 Proxy ARP see Proxy ARP Bay Assembly 1-10 SNMP see SNMP multiple nodes 1-9 SNTP reversible mounting bracket 3-2 spanning tree SSM 9-2
Index SD threshold single-card Etherswitch 6-3, 6-7 secondary sources slots see cards A-2 security SMB EIA setting up attaching coaxial cables 3-6 tasks per level viewing 9-5 connecting ferrites 3-6 SEFS parameter description 7-20 SEFS-S parameter EC-1 card installing SNMP 8-15 OC-12, OC-48, and OC-192 parameters OC-3 card 8-39 SES-L parameter 8-39, 8-42 SES parameter, provisioning 11-1 11-5 traps 11-3 11-6 3-2 see CTC finding the version number 8-15 OC-12, OC-48, and OC-192
Index spanning tree protocol configuration description OC-12, OC-48, OC-192 cards OC-3 card 9-27 parameters 8-36 STS FC-P parameter 9-26 multi-instance 9-26 9-27 DS-1 cards 8-21 DS-3 cards 8-24 SPE see synchronous payload envelope DS3E cards SSM DS3XM-6 card description enabling EC-1 card 3-14 ST3 clock OC-3 card 3-12 static routes 4-1 4-6 STM-4 8-24 8-16 OC-3 card 8-21 string 6-12 DS-3 cards 8-24 STS CV-P parameter DS3E cards 8-27 DS-1 cards 8-21 DS3XM-6 card DS-3
Index access to nodes 24-hour interval 4-7 creating a static route changing thresholds 4-9 destination host or network subnetting 8-4 IPPM paths 4-15 8-9 8-11 threshold guidelines 3-3 subtending rings 7-1 TCC+ card 5-36 subtend a BLSR from a BLSR 5-40 card view subtend a BLSR from a UPSR 5-38 fan speed control subtending a BLSR from a BLSR 2-22 installing 5-40 switching 1-25 1-47 non-volatile memory capacity see protection switching RS-232 port see traffic switching softw
Index time zone timing 3-2 U 7-18 UAS-L parameter BITS see BITS installation internal setting up OC-12, OC-48, OC-192 cards 3-12 OC-3 card 3-14 specifications DS-1 cards AID in CTC 8-31, 8-33 UPSR 2-8 1-35 craft interface specifications 1-66 adding a node 5-34 circuit editing 6-10 converting from linear ADM TLS see VLAN topology hosts 8-21, 8-22 unidirectional path switched rings see UPSR 2-2 craft interface connection DCC terminations 2-10 description traffic outages when r
Index provisioning Ethernet ports spanning tree 9-3 9-26 VT1.