User guide

2-37
Cisco Transport Manager Release 9.2 GateWay/CORBA User Guide and Programmer Manual
OL-20937-01
Chapter 2 NE- and CTM-Specific Details
2.2.6 Programming Details
2.2.5.10 L2 Topology
An L2 topology represents a point-to-point, hub-and-spoke, or Resilient Packet Ring (RPR) Layer 2
network topology. These topologies exist over the underlying Layer 1 topology, which is formed by
physical topological links. Each L2 topology name is identified in the context of an EMS and has two
tuples. The first tuple represents the EMS name, and the second tuple represents the nativeEMSName of
the L2 topology. The L2 topology name is unique within an EMS. Each L2 topology can be associated
with multiple ML VLANs.
2.2.5.11 ML VLAN
Each ML VLAN is associated with an L2 topology and is unique for a given L2 topology. The fully
qualified ML VLAN name is identified by three tuples. The first tuple represents the EMS name, the
second tuple represents the L2 topology name, and the last tuple represents the nativeEMSName of the
ML VLAN (which is the VLAN ID). A maximum of 255 ML VLANs can be created per L2 topology,
ranging from 1 to 4095.
2.2.5.12 QoS Template
The QoS template is defined in the scope of an EMS domain. The fully qualified QoS template name is
identified by two tuples. The first tuple represents the EMS name and the second tuple represents the
QoS template name.
2.2.5.13 VCAT
The fully qualified VCAT name is identified by two tuples. The first tuple represents the EMS name and
the second tuple represents the VCAT name, which is the same as the nativeEMSName of the VCAT.
2.2.6 Programming Details
2.2.6.1 Boolean Mapping
The following boolean parameters apply:
On = True
Off = False
2.2.6.2 Resource Cleanup
Many TMF interfaces that CTM implements return iterator objects for large volumes of data. These
iterators are allocated CTM resources. CTM supports a maximum of 128 iterators. If the iterator limit is
reached, the NMS receives an EXCPT_TOO_MANY_OPEN_ITERATORS exception.
By default, CTM cleans up all iterator objects if they are not accessed in a time interval of six hours.