Professional Documents
Culture Documents
Traverse System
SONET Documentation
Volume 3
Provisioning
Release 1.4
Publication Date: December 2003
Document Number: 800-0103-04 Rev. A
FCC Compliance
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
Part 15 of the FCC Rules. This equipment generates, uses, and can radiate radio frequency energy and, if not
installed and used in accordance with the installation instructions may cause harmful interference to radio
communications.
Canadian Compliance
This Class B digital apparatus meets all requirements of the Canadian Interference-Causing Equipment
Regulations. Cet appareil numérique de la classe B respects toutes les exigences du Règlement sur le
matériel brouilleur du Canada.
International Declaration of Conformity
We, Turin Networks, Inc. declare under our sole responsibility that the Traverse platform (models: Traverse
2000, Traverse 1600, and Traverse 600) to which this declaration relates, is in conformity with the following
standards:
EMC Standards
EN55022 EN55024 CISPR-22
Safety Standards
EN60950 CSA 22.2 No. 60950, ASINZS 3260
IEC 60950 Third Edition. Compliant with all CB scheme member country deviations.
Following the provisions of the EMC Directive 89/336/EEC of the Council of the European Union.
Copyright © 2003 Turin Networks, Inc.
All rights reserved. This document contains proprietary and confidential information of Turin Networks,
Inc., and may not be used, reproduced, or distributed except as authorized by Turin Networks. No part of this
publication may be reproduced in any form or by any means or used to make any derivative work (such as
translation, transformation or adaptation) without written permission from Turin Networks Inc.
Turin Networks Trademarks
Turin Networks, the Turin Networks logo, Traverse, Traverse 2000, Traverse 1600, Traverse 600,
TransAccess 100, TransNav, and Creating The Broadband Edge are trademarks of Turin Networks, Inc. or
its affiliates in the United States and other countries. All other trademarks, service marks, product names, or
brand names mentioned in this document are the property of their respective owners.
Government Use
Use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in FAR 12.212
(Commercial Computer Software-Restricted Rights) and DFAR 227.7202 (Rights in Technical Data and
Computer Software), as applicable.
V OLUME 3 P ROVISIONING
Contents
Volume 3 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
Section 6 Appendices
Appendix A
Provisioning Checklists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Appendix B
Services Sources and Destination. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-9
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Index-1
What’s New? Volume 3, Provisioning includes the following enhancements with respect to the new
Release 1.4 feature set.
Documentation The Traverse™ system documentation set is comprised of five volumes and is written
Set Description to meet users’ needs as described in the table below.
The documentation set meets Telcordia™ Generic Requirements for Supplier-Provided
Documentation GR–454 requirements.
Volume 1, This volume provides a detailed overview of the Anyone with the need
General Traverse system. It also includes engineering and to understand the
Information planning information. Traverse system and
its applications.
Volume 2, This volume provides required equipment and Installers, Field and
Installation tools, and step-by-step procedures for: Network Engineers.
and ■ Hardware installation.
Configuration ■ Power cabling.
■ Network cabling.
■ Power-up.
■ Configuration.
Volume 3, This volume provides provisioning concepts Network Engineers,
Provisioning related to the Traverse system. Step-by-step Provisioning and
procedures for provisioning using the TransNav Network Operations
Management System are provided. Center (NOC)
personnel.
Volume 4, This volume provides required equipment and Field and Network
Maintenance tools, and step-by-step procedures for: Engineers.
and Testing ■ Routine maintenance.
■ Module replacement.
■ Alarms and recommended actions.
■ Troubleshooting.
■ Performance monitoring.
■ Loopback tests.
■ Traverse system software upgrade.
Volume 5, This volume provides an overview of the Field and Network
TransNav TransNav™ Management System. It also includes: Engineers,
Management ■ Hardware requirements and third party Provisioning, and
System software requirements. Network Operations
■ Installation instructions for client/server, third Center (NOC)
party, and management system software. personnel.
■ Complete descriptions of management system
menus and windows along with reporting,
provisioning, fault management, performance
management, and system administration
functions.
■ Command Line Interface user’s guide.
If You Need If you need assistance while working with Traverse products, contact the Turin
Help Networks Technical Assistance Center (TAC):
■ Inside the U.S.: 1-866-TURINET (866-887-4638)
■ Outside the U.S.: 707-665-4400
■ Online: www.turinnetworks.com/technical.htm
TAC is available 6:00AM to 6:00PM Pacific Time, Monday through Friday (business
hours). When the TAC is closed, emergency service only is available on a call-back
basis. E-mail support (24-hour response) is also available through at:
support@turinnetworks.com.
Calling for If repair is necessary, call the Turin Repair Facility at 1-866-TURINET (866-887-4638)
Repairs for a Return Material Authorization (RMA) number before sending the unit.The RMA
number must be prominently displayed on all equipment cartons. The Repair Facility is
open from 6:00AM to 6:00PM Pacific Time, Monday through Friday.
When calling outside the United States, use the appropriate international access code,
and then call 707-665-4400 to contact the Repair Facility.
When shipping equipment for repair, follow these steps:
1. Pack the unit securely.
2. Enclose a note describing the exact problem.
3. Enclose a copy of the invoice that verifies the warranty status.
4. Ship the unit PREPAID to the following address:
Turin Networks, Inc.
Turin Repair Facility
Attn: RMA # ________
1415 North McDowell Blvd.
Petaluma, CA 94954 USA
Contents
Chapter 1
Provisioning Overview
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Configuration Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
TransNav System Access Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Before You Start Provisioning Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Provisioning Checklists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Chapter 2
Node and Timing Configuration
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Configure Node Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Timing Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-6
Network Timing Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
Guidelines to Configuring Network Timing . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
Configure Global Timing Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
Configure External Timing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10
Configure Line Timing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-14
Configure Derived References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15
Chapter 3
Module Configuration
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-17
Protection Groups and Card Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-17
Change Module (Card) Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-18
Change DS1 Mapping Formats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-19
Change the BER Thresholds for an STS Path . . . . . . . . . . . . . . . . . . . . . . . . 1-21
Chapter 4
Port Configuration
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-23
Before You Change DS1 Port Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-24
Change DS1 Port Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-25
Before You Change DS3 Port Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-27
Change DS3 Clear Channel Port Parameters. . . . . . . . . . . . . . . . . . . . . . . . . 1-28
Before You Change DS3TMX Port Parameters . . . . . . . . . . . . . . . . . . . . . . . 1-30
Change DS3 Transmux Port Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-31
Before You Change EC1 Port Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-34
Change EC1 Port Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-35
Before You Change Ethernet Port Parameters . . . . . . . . . . . . . . . . . . . . . . . . 1-38
Chapter 5
TransAccess 100 Mux Configuration
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-47
Before You Configure a TransAccess 100 Mux. . . . . . . . . . . . . . . . . . . . . . . . 1-47
Switch to EC-1 and Port Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-48
Add TransAccess 100 Mux to the User Interface . . . . . . . . . . . . . . . . . . . . . . 1-49
Change TransAccess 100 Mux Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . 1-51
Configure TransAccess 100 Mux DS1 Channels . . . . . . . . . . . . . . . . . . . . . . 1-54
Chapter 6
DCC Tunnel Configuration
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-57
DCC Tunnel Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-58
Before You Tunnel a DCC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-59
Tunneling a DCC Through a Traverse Network . . . . . . . . . . . . . . . . . . . . . . . 1-61
List of Figures
Figure 1-1 Node Configuration Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4
Figure 1-2 Network Timing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
Figure 1-3 Shelf View, Timing Tab, Main Subtab . . . . . . . . . . . . . . . . . . . . . . 1-8
Figure 1-4 Shelf View, Timing tab, EXT Subtab . . . . . . . . . . . . . . . . . . . . . . . 1-10
Figure 1-5 Timing Tab, EXT Subtab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-12
Figure 1-6 Timing Tab, Main Subtab, Reference Priority . . . . . . . . . . . . . . . . 1-13
Figure 1-7 Line Timing, Timing Tab, Main Subtab . . . . . . . . . . . . . . . . . . . . . 1-14
Figure 1-8 Shelf View, Timing Tab, Derived Timing Options . . . . . . . . . . . . . 1-15
Figure 1-9 Card Configuration Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-18
Figure 1-10 DS1 Card, Config Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-19
Figure 1-11 OC-192 Card, Config Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-21
Figure 1-12 DS1 Port Configuration Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-25
Figure 1-13 DS3 Clear Channel Port Configuration Screen . . . . . . . . . . . . . . . 1-28
Figure 1-14 DS3 Transmux Port Configuration Screen . . . . . . . . . . . . . . . . . . 1-31
Figure 1-15 EC1 Port Configuration Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-35
Figure 1-16 Switch to EC1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-35
Figure 1-17 Confirm Switch to EC1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-36
Figure 1-18 EC1 Port Configuration Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-36
Figure 1-19 Ethernet Port Configuration Screen. . . . . . . . . . . . . . . . . . . . . . . . 1-39
Figure 1-20 SONET Port Configuration Screen . . . . . . . . . . . . . . . . . . . . . . . . 1-43
Figure 1-21 Provision new T100 Dialog Box. . . . . . . . . . . . . . . . . . . . . . . . . . . 1-49
Figure 1-22 T100 Mux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-49
Figure 1-23 T100 Configuration Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-51
Figure 1-24 T100 Configuration Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-54
Figure 1-25 Tunneling 3rd Party DCC through a Traverse Network . . . . . . . . 1-58
Figure 1-26 DCC Tunnel Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-61
Figure 1-27 Click a Row . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-61
List of Tables
Table 1-1 Traverse Network Configuration Process and References . . . . . . 1-1
Table 1-2 Accessing the TransNav Management System . . . . . . . . . . . . . . 1-2
Table 1-3 Before Provisioning Your Network Requirements. . . . . . . . . . . . . 1-2
Table 1-4 Configure Node Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Table 1-5 Configure Global Timing Options . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
Table 1-6 Configure External Timing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10
Table 1-7 Configure Line Timing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-14
Table 1-8 Configure Derived References . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15
Table 1-9 Change Module Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-18
Table 1-10 Change DS1 Mapping Formats. . . . . . . . . . . . . . . . . . . . . . . . . . . 1-19
Table 1-11 Change the BER Thresholds for an STS Path . . . . . . . . . . . . . . . 1-21
Table 1-12 DS1 Port Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-24
Table 1-13 Change DS1 Port Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-25
Table 1-14 DS3CC Port Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-27
Table 1-15 Change DS3CC Port Parameters . . . . . . . . . . . . . . . . . . . . . . . . . 1-28
Table 1-16 DS3TMX Port Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-30
Table 1-17 Change DS3TMX Port Parameters. . . . . . . . . . . . . . . . . . . . . . . . 1-31
Table 1-18 EC1 Port Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-34
Table 1-19 Change EC1 Port Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-35
Table 1-20 Ethernet Port Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-38
Table 1-21 Change Ethernet Port Parameters . . . . . . . . . . . . . . . . . . . . . . . . 1-39
Table 1-22 SONET Port Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-42
Table 1-23 Change SONET Port Parameters . . . . . . . . . . . . . . . . . . . . . . . . . 1-43
Table 1-24 TransAccess 100 Mux Requirements . . . . . . . . . . . . . . . . . . . . . . 1-47
Table 1-25 Add TransAccess 100 Mux to the User Interface . . . . . . . . . . . . . 1-49
Table 1-26 Configure a TransAccess 100 Mux . . . . . . . . . . . . . . . . . . . . . . . . 1-51
Table 1-27 Configure TransAccess 100 Mux DS1 Channels . . . . . . . . . . . . . 1-54
Table 1-28 DCC Tunnels Hop-by-Hop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-58
Table 1-29 DCC Tunnel Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-59
Table 1-30 DCC Tunnel Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-61
Chapter 1
Provisioning Overview
Introduction This chapter describes the following topics on provisioning a Traverse network.
■ Configuration Process, page 1-1.
■ TransNav System Access Methods, page 1-2.
■ Before You Start Provisioning Procedures, page 1-2.
■ Provisioning Checklists, page 1-2.
Configuration The process to start configuring the Traverse network starts with installing and
Process commissioning each node.
Table 1-1 Traverse Network Configuration Process and References
TransNav The following table lists the different access methods you can use to connect to the
System Access TransNav management server.
Methods Table 1-2 Accessing the TransNav Management System
Management System
Access Method
Interface
Before You Before you start provisioning your network, the following tasks need to be complete.
Start
Provisioning Table 1-3 Before Provisioning Your Network Requirements
Procedures
Requirement Reference
Hardware
You have the correct hardware according to your Volume 1, General Information
network plan. Section 2—Hardware Descriptions.
Software
TransNav server software is installed. The server Volume 5, TransNav Management System
is initialized and started. Section 1—Overview, Installation and
Administration.
You are logged into the graphical user interface. Volume 5, TransNav Management System
Section 2—GUI Overview, Start Up, and
Administration, Chapter 1—“Starting the Graphical
User Interface,” page 2-1.
Chapter 2
Node and Timing Configuration
Introduction This chapter provides the following configuration procedures for the Traverse system:
■ Configure Node Parameters, page 1-3.
■ Timing Configuration, page 1-6.
■ Network Timing Example, page 1-7.
■ Configure Global Timing Options, page 1-8.
■ Configure External Timing, page 1-10.
■ Configure Line Timing, page 1-14.
■ Configure Derived References, page 1-15.
Configure After a node is commissioned, you can configure the following type of information at
Node each node: node location description, alarm profiles and NTP server IP addresses.
Parameters Alarm profiles are established to customize service-affecting and non-service-affecting
alarm severities for the node.
Use this procedure to configure parameters for each node.
Table 1-4 Configure Node Parameters
Step Procedure
1 In Map View, click and drag nodes to an area on the map to best represent
your network.
2 From the File menu, select Save User Preferences to save the placement
of the nodes.
3 Double-click a node to display Shelf View.
Step Procedure
4 Click the Config tab to display the Node Configuration dialog box.
Step Procedure
7 Values are displayed in the following fields. These values were set during
initial start-up procedures1 using the CLI:
■ Node ID.
■ Node IP.
■ BP DCN IP.
■ BP DCN Mask.
■ BP DCN Gateway.
■ GCM A IP and GCM B IP.
■ GCM A Mask and GCM B Mask.
■ GCM A Gateway and GCM B Gateway.
■ EMS IP.
■ EMS Mask.
■ EMS Gateway.
8 You can enter values for the NTP IP 1 and NTP IP 2 fields if they were
not set during initial start-up procedures. The Network Time Protocol
(NTP) server IP address is used by the node to derive Time of Day which
is used for performance monitoring, alarm and event logging2.
NTP IP 1
Type: the IP address of the primary NTP server.
(For example: aaa.bbb.ccc.ddd)
NTP IP 2
Type: the IP address of the secondary NTP server.
(For example: aaa.bbb.ccc.ddd)
9 External Alarm 1–4 fields display a default value of UNKWN. You can
select one of the following External Alarm input alarm types (based on the
environmental alarms input cabling completed during installation of the
node): HIGHTEMP, LOWTEMP, DOOROPEN, HIGHHMD,
LOWHMD, BATTDIS, BATTFAIL, or BATTLOW.
10 Click Apply.
11 Repeat Steps 1 through 10 for additional nodes.
12 The Configure Node Parameters procedure is complete.
1
See Volume 2, Installation and Configuration, Section 6, Chapter 1—“Start-up and Initial Configuration”
for detailed information.
2
Turin recommends using the TransNav server as the primary NTP source if you do not already have a
NTP source defined. Refer to Volume 5, TransNav Management System, Section 1, Chapter
8—“TransNav Server Administration Procedures” for information on how to activate NTP server on the
management server.
Timing Configure the timing source for each node in a domain. For each node, you can
Configuration configure either external timing from BITS (Building Integrated Timing Supply) or line
timing from OC interfaces.
Typically, one node in the central office receives redundant timing signals from an
external source (BITS reference). This node becomes the primary timing source for the
network. The other nodes receive the timing reference from optical interfaces. The
primary reference will be the shortest route to the primary timing source.
Synchronized primary and secondary timing inputs from the central office external
timing source are connected at the Traverse main backplane and bridged to the General
Control Modules (GCM).
Use the following procedures to configure timing options for the node.
■ Configure Global Timing Options, page 1-8.
■ Configure External Timing, page 1-10.
■ Configure Line Timing, page 1-14.
■ Configure Derived References, page 1-15.
Network In this example, the network is already connected and configured as a ring. The West
Timing Ports are the optical ports on the GCM in Slot 15 on all the nodes. The East Ports are
Example the optical ports on the GCM in Slot 16. Node 1 receives a timing signal from the
external clock. The primary line reference at Node 2 is Slot 15, the interface physically
connected to Node 1. The primary line reference at Node 4 is Slot 16, the interface
physically connected to Node 1. Node 3 can time off of either Slot 15 or Slot 16
because it is equal distance from Node 1.
EXT-A EXT-B
Node 1
Ring Configuration
West port = Slot 15
East port = Slot 16
At any node, if all timing references fail, the node will maintain timing from the
internal Stratum 3 oscillator.
Configure Configure the timing options at each node in the domain. Use this procedure to
Global Timing configure the global settings for system timing.
Options Table 1-5 Configure Global Timing Options
Step Procedure
1 In Shelf View, click the Timing tab to display the Main timing screen
(Main subtab).
Step 2
Step 3
Step 4
Step Procedure
Configure There are two external references for each node: EXT-A and EXT-B. For redundancy,
External they both have the same configuration. If both references fail, the node maintains
Timing timing from the internal stratum 3 oscillator.
Use this procedure to configure external timing interfaces for a node.
Table 1-6 Configure External Timing
Step Procedure
EXT
subtab
Step 3
Step Procedure
Step Procedure
6 For each reference, unlock the administrative state to enable the external
timing. Click the lock icon next to each reference.
Step 6 Step 7
Step Procedure
Step 8
Step 9
Configure Line You can establish up to four line timing sources based on your network requirements
Timing and the number of OC interfaces in the node. You first select the references (up to four
per node), then you assign a priority to each one.
The node uses the priority 1 reference unless there is a failure on that reference. If there
is a failure, the node switches to the next priority. If all of the references fail, the node
maintains timing from the internal stratum 3 oscillator.
Use this procedure to configure line timing from an OC interface for a node.
Table 1-7 Configure Line Timing
Step Procedure
Line Time
Mode
Line Facility
Options
(Step 3)
Reference
Priorities
(Step 4)
Configure Derived timing is the process of providing a timing reference from a line interface and
Derived sending it to an external clock. Use this procedure to configure a derived timing
References references on a node.
The Traverse can generate a timing signal to an DS1 multi-frame, a T1 ESF or a 2 MHz
external reference.
Table 1-8 Configure Derived References
Step Procedure
1 In Shelf View, click the Timing tab to display the Main timing screen
(Main subtab).
Step 2
Step 4
Step 5
Step Procedure
4 For each line reference, select an OC port for the timing reference. The
port needs to be enabled (unlocked administrative state).
5 Select a priority for each reference. If there is a failure on the first
references, the node switches to the next reference.
6 Select a reference in order of priority to generate a signal to EXT-A.
7 Select a reference in order of priority to generate a signal to EXT-B.
8 Click Apply to save the derived timing preferences.
9 The Configure Derived References procedure is complete.
Chapter 3
Module Configuration
Introduction You can customize certain parameters on each module (card) in a Traverse shelf. There
are parameters common to all modules as well as parameters specific to each module.
This chapter explains the following information for the cards supported in this release:
■ Protection Groups and Card Configuration, page 1-17.
■ Change Module (Card) Parameters, page 1-18.
■ Change DS1 Mapping Formats, page 1-19.
■ Change the BER Thresholds for an STS Path, page 1-21.
These procedures describe how to change configurable parameters only. See Volume 5,
TransNav Management System, Section 3—Configuring Equipment, Chapter
3—“Modules (Card)” for explanations of all the parameters and fields on each card.
You can change parameters for each card:
■ During the preprovisioning process. Upon discovery of the equipment, the
management server downloads the preprovisioned data to the node.
■ After the equipment is discovered. If a piece of equipment has not been
preprovisioned when it is discovered, it arrives with default values. Change the
default values on the Config tab.
Protection If you have configured a card as part of an equipment protection group, you can only
Groups and configure parameters on the working card. Down arrows on selections are grayed out
Card for parameters on the protecting card.
Configuration Parameters on a port on a protecting card are automatically set to those configured for
the same port on the working card. For example, if Line Format is set to M23 for port 1,
slot 2 (the working card), Line Format will also be set to M23 for port 1, slot 1 (the
protecting card).
For information on creating equipment protection groups, see Section 2—Creating
Protection Groups, Chapter 2—“Create an Equipment Protection Group,” page 2-3.
Change The following procedure describes the common steps for all modules.
Module (Card)
Parameters Table 1-9 Change Module Parameters
Step Procedure
Change DS1 The parameters on the DS1 module control how the DS1 channels on the module map
Mapping to a VT payload or multiplexed to an STS path. .
Formats
Important: Changing these parameters on the DS1 card is service
affecting. You cannot complete this procedure if the card is carrying traffic
(if there are services activated).
Step Procedure
Step 3 Step 4
3 Select how the DS1 channels on this module map to a VT payload. From
the DS1 Numbering list:
■ Select Non-sequential (default) maps per GR-253-CORE.
■ Select Sequential.
See Volume 5, TransNav Management System, Table 3-1 GR-253 and
Sequential VT Mapping Formats, page 3-29 for the specific mapping
format.
4 Select how the DS1 channels on this module are multiplexed into an STS.
From the DS1 Mapping list:
■ Select VC/VT-structured (default) to multiplex the signal into a
VT-mapped STS.
■ Select DS3-mapped to multiplex the signal into a DS3-mapped STS.
Step Procedure
5 Click Apply.
6 The Change DS1 Mapping Formats procedure is complete.
Change the Configure the thresholds for the path-level signal failed bit error ratio (SFBER) and
BER signal degrade bit error ration (SDBER) on the OC-N module. When the thresholds are
Thresholds for exceeded, the system raises an SFBER-P or SDBER-P alarm.
an STS Path
Table 1-11 Change the BER Thresholds for an STS Path
Step Procedure
1 In Shelf View, click an OC module. This module can be any one of the
following modules:
■ OC-3/STM-1.
■ OC-12/STM-4.
■ OC-48/STM-16.
■ OC-192/STM-64.
■ GCM with 1-port OC-12/STM-4.
■ GCM with 1-port OC-48/STM-16.
2 Click the Config tab to display the Card Configuration screen.
Step 3 Step 4
Table 1-11 Change the BER Thresholds for an STS Path (continued)
Step Procedure
3 Set the transmission quality (bit error ratio) of failed signals in the STS
path. When the error rate crosses the value specified in this parameter, the
system raises a signal failed bit error rate (BERSF-P) alarm.
Select one of the following values:
■ 1E-3 (default for STS-1 SF BER). Value equals 1 x 10-3.
■ 1E-4 (default for STS-3c and STS-12c SF BER). Value equals 1x10-4.
■ 1E-5 (default for STS-48c SF BER). Value equals 1 x 10-5.
4 Set the transmission quality (bit error ratio) of degraded signals (SD) in the
STS path. When the error rate crosses the value specified in this parameter,
the system raises a signal degraded bit error rate (BERSD-P) alarm. Select
one of the following values:
■ 1E-4. Value equals 1 x 10-4.
■ 1E-5. Value equals 1 x 10-5.
■ 1E-6 (default for STS-1 SD BER). Value equals 1 x 10-6.
■ 1E-7 (default for STS-3cand STS-12c SD BER). Value equals 1 x
10-7.
■ 1E-8 (default for STS-48c SD BER). Value equals 1 x 10-8.
■ 1E-9. Value equals 1 x 10-9.
5 Click Apply.
6 The Change the BER Thresholds for an STS Path procedure is complete.
Chapter 4
Port Configuration
Introduction This chapter explains how to change configurable parameters for the following types of
ports in a Traverse shelf:
■ Change DS1 Port Parameters, page 1-25.
■ Change DS3 Clear Channel Port Parameters, page 1-28.
■ Change DS3 Transmux Port Parameters, page 1-31.
■ Change EC1 Port Parameters, page 1-35.
■ Change Ethernet Port Parameters, page 1-39.
■ Change SONET Port Parameters, page 1-43.
Before You Review this information before you change any parameters on a DS1 port.
Change DS1
Port Table 1-12 DS1 Port Requirements
Parameters
Requirement Reference
Hardware
You can change the DS1 interface parameters on Volume 1, General Information,
the following hardware: Section 2—Hardware Descriptions.
■ DS1 To configure a TransAccess 100 Mux, see Volume
■ TransAccess 100 Mux 3, Provisioning, Section 1, Chapter
5—“TransAccess 100 Mux Configuration,”
page 1-47.
Software
DS1 mapping formats are correct. Volume 3, Provisioning, Section 1, Chapter 3,”
Change DS1 Mapping Formats, page 1-19.
These procedures describe the steps to create Volume 5, TransNav Management System,
change configurable parameters only. See Volume Section 3, Chapter 4,” DS1 Port Configuration,
5, TransNav Management System for descriptions page 3-34.
of other fields on screen.
Step Procedure
Step 2
Step 3
Step 4
Step 5
Step 6 Step 7
Step Procedure
Before You Review this information before you change any parameters on a DS3 port
Change DS3
Port Table 1-14 DS3CC Port Requirements
Parameters
Requirement Reference
Hardware
You can change the DS3 interface parameters on Volume 1, General Information,
the following hardware: Section 2—Hardware Descriptions.
■ DS3/EC1 Clear Channel.
■ DS3 Transmux module (DS3-CC port).
Software
These procedures describe the steps to create Volume 5, TransNav Management System,
change configurable parameters only. See Volume Section 3, Chapter 4,” DS3-CC and DS3-TMX
5, TransNav Management System for descriptions Port Configuration, page 3-36.
of other fields on screen.
Step 2
Step 3
Step 4
Step 5
Step 6 Step 7
Step Procedure
Before You Review this information before you change any parameters on a DS3TMX port
Change
DS3TMX Port Table 1-16 DS3TMX Port Requirements
Parameters
Requirement Reference
Hardware
You can change the DS3 interface parameters on Volume 1, General Information,
the following hardware: Section 2—Hardware Descriptions.
■ DS3 Transmux module (DS3-TMX port).
Software
These procedures describe the steps to create Volume 5, TransNav Management System,
change configurable parameters only. See Volume Section 3, Chapter 4,” DS3-CC and DS3-TMX
5, TransNav Management System for descriptions Port Configuration, page 3-36.
of other fields on screen.
Step Procedure
Step 2
Step 3
Step 4
Step 5
Step Procedure
Step Procedure
7 Click Apply.
8 The Change DS3TMX Port Parameters procedure is complete.
Before You Review this information before you change any parameters on an EC1 port.
Change EC1
Port Table 1-18 EC1 Port Requirements
Parameters
Requirement Reference
Hardware
You can change the EC1 interface parameters on Volume 1, General Information,
the following hardware: Section 2—Hardware Descriptions.
■ DS3/EC1 Clear Channel (EC1 interface).
■ DS3 Transmux module (EC1 interface).
Software
These procedures describe the steps to change Volume 5, TransNav Management System,
configurable parameters only. See Volume 5, Section 3, Chapter 4,” EC1 Port Configuration,
TransNav Management System for descriptions page 3-43.
of other fields on screen.
Step Procedure
Step 2
Step 3
Step 4
4 If the port is unlocked, lock the port. Click the Lock icon , located in the
lower left corner of the screen.
5 Switch the port from a DS3 port to an EC1 port. Select EC1 and click
Switch.
Step Procedure
Step 8
Step 9
Step 10 Step 11
Step Procedure
Before You Review this information before you change any parameters on an Ethernet port.
Change
Ethernet Port Table 1-20 Ethernet Port Requirements
Parameters
Requirement Reference
Hardware
You can change the Ethernet interface parameters Volume 1, General Information,
on the following hardware: Section 2—Hardware Descriptions.
■ GbE LX -VC.
■ 2-port GbE LX-VC plus 8-port
100BaseFX-VC.
■ 2-port GbE LX-VC plus 16-port
10/100BaseTX-VC.
■ 2-port GbE SX-VC plus 16-port
10/100BaseTX-VC.
■ 10/100BaseTX-VC.
Software
These procedures describe the steps to change Volume 5, TransNav Management System,
configurable parameters only. See Volume 5, Section 3, Chapter 4,” Ethernet Port
TransNav Management System for descriptions Configuration, page 3-46.
of other fields on screen.
Step Procedure
Steps 5
and 6
Step 8
Step Procedure
Step Procedure
Before You Review this information before you change any parameters on a SONET port.
Change
SONET Port Table 1-22 SONET Port Requirements
Parameters
Requirement Reference
Hardware
You can change the SONET interface parameters on Volume 1, General Information,
the following hardware: Section 2—Hardware Descriptions.
■ OC-3/STM-1.
■ OC-12/STM-4.
■ OC-48/STM-16.
■ OC-192/STM-64.
■ GCM with 1-port OC-12/STM-4 (optical
interface).
■ GCM with 1-port OC-48/STM-16 (optical
interface).
Software
These procedures describe the steps to change Volume 5, TransNav Management System,
configurable parameters only. See Volume 5, Section 3, Chapter 4,” SONET Port
TransNav Management System for descriptions of Configuration, page 3-50.
other fields on screen.
Step Procedure
Step 4
Steps 5
and 6
Step 7
Step 8 Step 9
Step Procedure
4 Change any one of the following parameters for the SONET interface:
AIS Mask (Alarm Indication Signal Mask):
■ Yes: Mask AIS/alarm for unused direction.
■ No (default): Do not mask AIS/alarm for any direction.
SFBER-L: Measures the transmission quality (bit error ratio) of failed
signals on the optical link. When the error rate crosses the value specified
in this parameter, the system raises a signal failed bit error rate (BERSF-L)
alarm and performs a protection switch. Select one of the following values:
■ 1E-3 (default). Value equals 1 x 10-3.
■ 1E-4. Value equals 1 x 10-4.
■ 1E-5. Value equals 1 x 10-5.
Transmitter State: Select one of the following:
■ On (default): Laser is turned on.
■ Off: Laser is turned off.
Forced DUS (Do not Use for Synchronization): Select for this port to
transmit the SSM (synchronization status message) DUS. This prevents
the remote node that receives this signal from using the line as a timing
reference.
SDBER-L: Measures the transmission quality (bit error ratio) of degraded
signals on the optical link. When the error rate crosses the value specified
in this parameter, the system raises a signal degraded bit error rate
(BERSD-L) alarm and performs a protection switch. Select one of the
following values:
■ 1E-9. Value equals 1 x 10-9.
■ 1E-8. Value equals 1 x 10-8.
■ 1E-7. Value equals 1 x 10-7.
■ 1E-6 (default). Value equals 1 x 10-6.
■ 1E-5. Value equals 1 x 10-5.
5 If this is an OC-12, OC-48, or OC-192 interface, specify if the system uses
the DCC bytes to communicate with other nodes in this network.
In the Control Data parameter, select one of the following:
■ Enabled (default): the management system uses this interface for
management traffic.
■ Disabled: the management system does not use this interface for
management traffic.
Step Procedure
6 If this is an OC-12, OC-48, or OC-192 interface AND the system uses the
DCC bytes to communicate with other nodes in this network, specify
which DCC bytes are processed. You can only change the value in this
parameter if the value in Control Data is Disabled.
In the Terminate DCC parameter, specify one of the following values:
■ Section: specifies that the interface use the D1-D3 bytes (192 Kbps) of
the first STS on this interface for management traffic.
■ Line (default): specifies that the interface use the D4-D12 bytes (576
Kbps) of the first STS on this interface for management traffic.
■ Line&Section: specifies that the interface use the combined section
DCC and line DCC bytes from the first, second, and third STS on the
interface (2.3 Mbps) for management traffic.
7 Change any of the following general parameters for the interface:
Customer: Select from the list of defined customers.
PM Template: Select from the list of defined performance monitoring
templates (of type sonet_ptp_pm). Default value is default, which
contains default thresholds for performance monitoring parameters and
thresholds for SONET ports.
Alarm Profile: Select from the list of defined alarm profiles (of type
sonet_ptp) to customize service-affecting and non-service-affecting alarm
severities. Default is the default sonet_ptp alarm profile.
8 Click the Lock icon , located in the lower left corner of the screen, to
unlock the port and be able to monitor potential problems.
9 Click Apply.
10 The Change SONET Port Parameters procedure is complete.
Chapter 5
TransAccess 100 Mux Configuration
Introduction The TransAccess 100 Mux (T100) connects to the Traverse shelf through a
10/100BaseT port to an Ethernet hub connected to the Traverse system itself. Use the
TransNav management system to remotely manage the configuration and status of the
TransAccess 100 Mux.
This chapter contains the following information:
■ Before You Configure a TransAccess 100 Mux, page 1-47.
■ Switch to EC-1 and Port Configuration, page 1-48.
■ Add TransAccess 100 Mux to the User Interface, page 1-49.
■ Change TransAccess 100 Mux Parameters, page 1-51.
■ Configure TransAccess 100 Mux DS1 Channels, page 1-54.
Before You Review this information before you create a TransAccess 100 Mux on the user
Configure a interface.
TransAccess
100 Mux Table 1-24 TransAccess 100 Mux Requirements
Requirement Reference
Hardware
Requirement Reference
Software
These procedures describe the steps to change Volume 5, TransNav Management System
configurable parameters only. See Volume 5, Section 3, Chapter 4,” TransAccess 100 Mux
TransNav Management System for descriptions (T100) Configuration.
of other fields on screen.
Switch to EC-1 The DS3 ports connected to TransAccess 100 Muxes must be converted or “switched”
and Port from a digital signal to a SONET electrical carrier signal (DS3 to EC-1) for transport
Configuration over the SONET network. See Chapter 4—“Port Configuration,” Change EC1 Port
Parameters, page 1-35 for procedure details.
Add The TransAccess 100 Mux connected to the EC-1 ports are not initially autodiscovered
TransAccess by the TransNav management system. Use this procedure to add a TransAccess 100
100 Mux to the Mux to the user interface.
User Interface
Table 1-25 Add TransAccess 100 Mux to the User Interface
Step Procedure
5 In the Name field, type a name for the for the T100.
Use alpha-numeric characters and spaces only. Do not use punctuation or
any other special characters in the Name field.
6 Click Add. A T100 is displayed next to the EC-1 port in Shelf View.
T100
Table 1-25 Add TransAccess 100 Mux to the User Interface (continued)
Step Procedure
Change Use this procedure to change default attributes for the TransAccess 100 Mux.
TransAccess
100 Mux Table 1-26 Configure a TransAccess 100 Mux
Parameters
Step Procedure
4 Enter the IP address that was set for the TransAccess 100 Mux using its
craft interface.
Ethernet IP Address
Type: aaa.bbb.ccc.ddd
5 Click Apply.
Important: The management system “discovers” the TransAccess 100
Mux based on its IP address. The management system overrides any
TransAccess 100 Mux parameters with its default parameters. The default
parameters are displayed in the T100 Configuration dialog box.
6 EC1 Port is set to slot #-port #. This is the TransAccess 100 Mux slot and
port number assignment.
Step Procedure
Step Procedure
12 Click Apply if you have changed any of the T100 default parameter
settings. These configuration parameters are applied to the TransAccess
100 Mux.
13 Click Synchronize to synchronize alarms between the TransAccess 100
Mux and management system.
14 The Configure a TransAccess 100 Mux procedure is complete.
Continue to the next procedure, Configure TransAccess 100 Mux DS1
Channels, page 1-54, to complete DS1 channel configuration fields.
Configure Use this procedure to change default attributes for the DS1 channels on the
TransAccess TransAccess 100 Mux.
100 Mux DS1
Channels Table 1-27 Configure TransAccess 100 Mux DS1 Channels
Step Procedure
Step Procedure
5 The following default values are displayed for the DS1 channels 1-28:
■ Ch #. This is the channel number, range is 1–28.
■ Ch Name (default=PTP-1 through PTP-28). To change the channel
name, click the Ch Name field and type the name of the channel.
■ Line Code (default=AMI) Alternate Mark Inversion. The other
available selection is B8ZS (Bipolar with Eight Zero Substitution).
■ Line Build Out (default=0to133ft). Other selections are: 133to266ft,
266to399ft, 399to533ft and 533to665ft. Line Build Out is the length
of the cable from the TransAccess 100 Mux to the next piece of
terminating equipment on the customer (tributary) side; for example, a
DS1 patch panel.
■ Customer (default=No Customer Selected). Select your Customer
from the list of defined customers.
6 Select InService from the Service Mode list to place the channel in
service.
7 Select Equipped from the Interface Equipped list.
8 Repeat Steps 4 through 7 for each DS1 channel (port).
9 Click Apply if you have changed any of the T100 default parameter
settings. These configuration parameters are applied to the TransAccess
100 Mux.
10 Click Synchronize to synchronize alarms between the TransAccess 100
Mux and the management system.
11 Repeat the Configure TransAccess 100 Mux DS1 Channels procedure for
each TransAccess 100 Mux.
12 The Configure TransAccess 100 Mux DS1 Channels procedures is
complete.
Chapter 6
DCC Tunnel Configuration
DCC Tunnel For example, a third party vendor uses section bytes of the first STS to carry OAM&P
Example information in their network. In order to tunnel the DCC bytes through a Traverse
network, you have to create a DCC tunnel at each node in the network.
Tunnel 1 = Tunnel 5 =
Source N1-S1-STS#-1 Source N5-S13-STS#-4
Dest. N1-S14-STS#-4 OC-48 Ring Dest. N5-S1-STS#-1
DCC Tunnels = STS#4
Node 1 4 Node 5
In a Traverse network, the Control Plane uses the DCC bytes of the first, second, and
third STSs on all trunk interfaces to provide a data communication link between
directly connected Traverse nodes. Therefore, you have to create a DCC tunnel from
the first STS on the interface connected to the external equipment to the STS on the
trunk of the first and last node. The following table lists each DCC tunnel you would
configure in the above example.
Before You Review this information before you tunnel DCC bytes through a Traverse network.
Tunnel a DCC
Table 1-29 DCC Tunnel Requirements
Requirement Reference
Hardware
Create a DCC tunnel between two SONET Volume 1, General Information, Section 2,
interfaces on the same node. You can use any of Chapter 3—“SONET/SDH Modules”.
the following hardware components:
■ OC-3/STM-1.
■ OC-12/STM-4.
■ OC-48/STM-16.
■ OC-48/STM-16 VCX (optical interface).
■ OC-192/STM-64.
■ GCM with 1-port OC-12/STM-4 (optical
interface).
■ GCM with 1-port OC-48/STM-16 (optical
interface).
Software
Requirement Reference
These procedures describe how to tunnel DCC Volume 5, TransNav Management System,
bytes through a network. See Volume 5, TransNav Section 3, Chapter 5—“DCC Tunnels,”
Management System for descriptions of other page 3-59.
fields on screen.
Tunneling a Review the information in Before You Tunnel a DCC, page 1-59 before you start this
DCC Through a procedure. Use this procedure to help you tunnel a third party section DCC bytes
Traverse through a Traverse network.
Network
Table 1-30 DCC Tunnel Configuration
Step Procedure
1 In Shelf View, click the DCC Tunnel tab, then click New. A row appears
on the screen.
Click DCC
Tunnel tab.
Click New.
2 In each column, click the row to make the list of options appear.
■ From the SourcePort column, select the port that is connected to the
third party equipment.
■ From the Source list, select an STS number.
■ From the DestinationPort list, click the trunk port for the network.
■ From the Destination list, select an STS number.
Step Procedure
3 Click Add All New to add the DCC tunnel to the node.
4 Repeat Steps 1–3 at each intermediate node in the network.
5 On the last node, create a DCC tunnel (see Steps 1–3 of this procedure).
The destination STS number must match the originating STS number. That
is, if you use STS #7 on the source interface. You must use STS #7 on the
destination interface.
6 The DCC Tunnel Configuration procedure is complete.
Contents
Chapter 1
Overview of Protection Groups
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Equipment Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Line Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Path Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Chapter 2
Create an Equipment Protection Group
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Before You Configure Equipment Protection . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Guidelines to Create an Equipment Protection Group . . . . . . . . . . . . . . . . . . 2-4
Create an Equipment Protection Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Chapter 3
Create a 1+1 APS Protection Group
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7
Example of 1+1 APS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7
Before you Create a 1+1 APS Protection Group. . . . . . . . . . . . . . . . . . . . . . . 2-8
Create a 1+1 APS Protection Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9
Chapter 4
Create a BLSR Protection Group
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13
Example of a BLSR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14
Squelching. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14
Before You Create a BLSR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15
Guidelines to Create a BLSR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-16
Create a BLSR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-16
Chapter 5
Create a 1+1 Path Protection Group
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-21
Example of a 1+1 Path Protection Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-22
Before you Create a 1+1 Path Protection Group . . . . . . . . . . . . . . . . . . . . . . 2-23
Guidelines to Create a 1+1 Path Protection Group. . . . . . . . . . . . . . . . . . . . . 2-24
Create a 1+1 Path Protection Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-24
Chapter 6
Create a UPSR Protection Group
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-27
Example of a UPSR. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-28
Before You Create a UPSR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-29
Guidelines to Create a UPSR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-30
Create a UPSR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-30
List of Figures
Figure 2-1 Select a 1:1 Equipment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Figure 2-2 Add Equipment Protection Group Screen . . . . . . . . . . . . . . . . . . . 2-5
Figure 2-3 Select Protecting and Working Cards . . . . . . . . . . . . . . . . . . . . . . 2-6
Figure 2-4 Protection Groups Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
Figure 2-5 1+1 APS in a Linear Chain Topology . . . . . . . . . . . . . . . . . . . . . . 2-7
Figure 2-6 Select 1+1 APS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9
Figure 2-7 Add 1+1 Protection Group Screen. . . . . . . . . . . . . . . . . . . . . . . . . 2-9
Figure 2-8 Select Protecting and Working Ports . . . . . . . . . . . . . . . . . . . . . . . 2-10
Figure 2-9 Protection Groups Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11
Figure 2-10 OC-192 2F BLSR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14
Figure 2-11 Select BLSR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-16
Figure 2-12 Add BLSR Ring Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17
Figure 2-13 West and East Ports for BSLR . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18
Figure 2-14 Synchronize Confirmation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18
Figure 2-15 Protection Rings Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-19
Figure 2-16 Creating 1+1 Path Protection with a Protection Group . . . . . . . . . 2-22
Figure 2-17 Select 1+1 Path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-24
Figure 2-18 Add 1 Plus 1 Protection Group Screen . . . . . . . . . . . . . . . . . . . . . 2-25
Figure 2-19 Protection Groups Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-26
Figure 2-20 Bridging and Selecting Signals in a UPSR . . . . . . . . . . . . . . . . . . 2-28
Figure 2-21 Select UPSR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-30
Figure 2-22 Add UPSR Ring Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-31
Figure 2-23 West and East Ports for SNCP/UPSR Ring . . . . . . . . . . . . . . . . . 2-31
Figure 2-24 Synchronize Confirmation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-32
Figure 2-25 Protection Rings Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-32
List of Tables
Table 2-1 Equipment Protection Requirements . . . . . . . . . . . . . . . . . . . . . . 2-3
Table 2-2 Create an Equipment Protection Group . . . . . . . . . . . . . . . . . . . . 2-4
Table 2-3 1+1 APS Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8
Table 2-4 Create a 1+1 APS Protection Group . . . . . . . . . . . . . . . . . . . . . . . 2-9
Table 2-5 BLSR Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15
Table 2-6 Create a BLSR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-16
Table 2-7 1+1 Path Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-23
Table 2-8 Create a 1+1 Path Protection Group. . . . . . . . . . . . . . . . . . . . . . . 2-24
Table 2-9 UPSR Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-29
Table 2-10 Create a UPSR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-30
Chapter 1
Overview of Protection Groups
Introduction Depending on the network requirements, the Traverse supports a selection of methods
to protect traffic.
This chapter includes the following topics:
■ Equipment Protection, page 2-1.
■ Equipment Protection, page 2-1.
■ Line Protection, page 2-1.
■ Path Protection, page 2-2.
All system components including are easily accessible and hot-swappable.
Additionally, both hardware and software upgrades can be performed “in-service”
without interruption to existing network traffic. This capability allows the transport
network to expand gracefully as new customers and service requirements are added.
Equipment Equipment protection groups use one piece of equipment to provide redundancy for
Protection another. The Traverse supports the following types of equipment protection:
■ 1:1 equipment protection. This protection scheme uses one piece of equipment to
physically protect another.
■ 1:2 equipment protection.This protection scheme uses one piece of equipment to
protect up to two others.
To create equipment protection groups, see Chapter 2—“Create an Equipment
Protection Group,” page 2-3.
Line Protection Line protection switching is a traffic protection mechanism based on SONET line level
indications. A line is the transmission medium and the associated equipment that
transports information between two network elements: one which originates the line
signal and one that terminates it. Line protection switching is a protection mechanism
coordinated by the nodes on either side of the failure condition using the automatic
protection switching (APS) signaling protocol.
APS Protocol
The APS protocol is carried in the K1 and K2 bits in the SONET signal between nodes.
The APS controllers at the line termination use the channel to exchange requests and
acknowledgement for protection switching actions.
1+1 APS
1+1 APS uses both the working and the protect fibers to send traffic simultaneously to
the next node. That is, the system duplicates the traffic and sends it over both the
working and the protect fibers at the same time.
With this protection mechanism, when the system detects a failure, the next node
switches to accept traffic from the standby path. The link remains unprotected until
service is restored on the working link.
To create a 1+1 APS protection group, see Chapter 3—“Create a 1+1 APS Protection
Group,” page 2-7.
BLSR
Bi-directional Line Switched Ring (BLSR) provides geographically diverse paths for
each service using a self-healing closed loop technology to protect against fiber cuts
and node failures. Protection switching is performed at the Line layer of the SONET
frame.
To create a BLSR protection group, see Chapter 4—“Create a BLSR Protection
Group,” page 2-13.
Path Path protection switching is a traffic protection mechanism based on SONET path level
Protection indications. Path protection the logical end-to-end path of traffic through a network.
UPSR
A Unidirectional Path Switched Ring (UPSR) requires two fibers to carry traffic in
opposite directions around the fiber ring. Protection switching is performed at the path
level. To provide survivability, traffic from the tributary side is bridged into both the
working and protecting channels at the source. Path selection at the destination chooses
the best quality signal (working or protecting) before dropping it from the ring.
To create UPSR protection groups, see Chapter 6—“Create a UPSR Protection Group,”
page 2-27.
Chapter 2
Create an Equipment Protection Group
Introduction This chapter provides configuration procedures for network link (trunk) and tributary
protection groups in a Traverse network:
■ Before You Configure Equipment Protection, page 2-3.
■ Guidelines to Create an Equipment Protection Group, page 2-4.
■ Create an Equipment Protection Group, page 2-4.
Before You Review this information before you create an equipment protection group.
Configure
Equipment Table 2-1 Equipment Protection Requirements
Protection
Requirement Reference
Hardware
The modules must be in the correct slots. Volume 2, Installation and Configuration,
Section 7—Start-up and Module Placement.
Volume 2, Installation and Configuration,
Section 7, Appendix A—“Module Placement
Planning and Guidelines,” page 7-1.
Software
Requirement Reference
These procedures describe the steps to create pro- Volume 5, TransNav Management System,
tection groups only. See Volume 5, TransNav Section 4, Chapter 3—“Equipment Protection
Management System for descriptions of other Switching,” page 4-13.
fields on screen.
Guidelines to For 1:1 equipment protection, the protecting slots are located in left-most slots. Each
Create an protection slot protects the next consecutive slot in the shelf.
Equipment In a 1:2 protection scheme, the middle module in a group of three modules protects the
Protection adjacent two working modules. The protection group can start in any odd or
Group even-numbered slot.
Step 4
Step Procedure
Step 5
Step 6
Step 7 Step 9
Step Procedure
7 Select the protecting card for the protection group. On the Protecting row,
click the Card field and select the protecting card.
8 Select the working cards for the protection group. On each Working row,
click the Card field and select the working card.
9 Click Create to create the protection group and return to the Protection
Groups screen on the Protection tab.
Chapter 3
Create a 1+1 APS Protection Group
Introduction Use 1+1 automatic protection switch (APS) on simple point-to-point and linear chain
topologies.
This chapter contains information on creating a 1+1 APS protection group.
■ Example of 1+1 APS, page 2-7
■ Before you Create a 1+1 APS Protection Group, page 2-8.
■ Create a 1+1 APS Protection Group, page 2-9.
Example of 1+1 1+1 APS uses both the working and the protect fibers to send traffic simultaneously to
APS the next node. That is, the system duplicates the traffic and sends it over both the
working and the protect fibers at the same time.
With this protection mechanism, when the system detects a failure, the next node
switches to accept traffic from the standby path. The link remains unprotected until
service is restored on the working link.
In the following example, a linear chain topology provides direct access to individual
eastbound or westbound STS channels at intermediate sites along a fiber route, without
unnecessary multiplexing and demultiplexing of pass-through traffic. The Traverse
platform supports simple point-to-point and linear chain topologies.
Configure 1+1 APS protection at for each facility connected to the next node. In this
example, configure one 1+1 APS protection group at Node 1 and Node 3. Configure
two protection groups at Node 2.
Before you Review this information before you create a 1+1 automatic protection switch (APS)
Create a 1+1 group. The Traverse supports 1+1 unidirectional and bi-directional protection
APS Protection switching.
Group
Table 2-3 1+1 APS Requirements
Requirement Reference
Hardware
Each node requires at least two modules of Volume 1, General Information, Section 2—Hardware
the same data rate: Descriptions.
■ OC-3/STM-1.
■ OC-12/STM-4.
■ OC-48/STM-16.
■ OC-48/STM-16 VCX (optical
interface).
■ OC-192/STM-64.
■ GCM with 1-port OC-12/STM-4
(optical interface).
■ GCM with 1-port OC-48/STM-16
(optical interface).
You can use the following combination of Volume 1, General Information, Section 2—Hardware
modules in a 1+1 APS protection group: Descriptions.
■ OC-12/STM-4 and a GCM with 1-port
STM-4/OC-12.
■ OC-48/STM-16 and a GCM with 1-port
OC-48/STM-16.
Each pair of modules must be in the correct Volume 2, Installation and Configuration,
slots. Section 7—Start-up and Module Placement.
Volume 2, Installation and Configuration, Section 7,
Appendix A—“Module Placement Planning and Guide-
lines,” page 7-1.
Software
There are no line-level alarms (LOS, LOF, Click the port, click the Alarms tab, and verify no alarms
AIS-L, SF-BER-L) present on the interfaces are present.
you are using to configure the protection Volume 4, Maintenance and Testing, Section 1—System
group. Monitoring.
These procedures describe the steps to create Volume 5, TransNav Management System, Section 4,
protection groups only. See Volume 5, Tran- Chapter 4—“Facility Protection Switching,” page 4-19.
sNav Management System for descriptions
of other fields on screen.
Create a 1+1 Use this procedure to create a 1+1 APS protection group.
APS Protection
Group Table 2-4 Create a 1+1 APS Protection Group
Step Procedure
Step 4
Step Procedure
9 Repeat Step 8 to select the working port. On the Working row, click the
Port field and select the working port.
Step Procedure
Chapter 4
Create a BLSR Protection Group
Introduction Bi-directional Line Switched Ring (BLSR) provides geographically diverse paths for
each service using a self-healing closed loop technology to protect against fiber cuts
and node failures. Protection switching is performed at the Line layer of the SONET
frame.
The Traverse supports for 2-fiber (2F) BLSR. 2F BLSR offers substantial capacity
advantages in interoffice and access networks that have distributed mesh traffic
patterns because of its ability to reuse bandwidth, as traffic is added and dropped at
various locations around the ring.
■ Example of a BLSR, page 2-14.
■ Squelching, page 2-14.
■ Before You Create a BLSR, page 2-15.
■ Guidelines to Create a BLSR, page 2-16.
■ Create a BLSR, page 2-16.
Example of a BLSR also provides the ability to reuse bandwidth. When traffic is dropped at one node
BLSR in a BLSR configuration, the remaining capacity is then available for traffic at that
node. BLSR assigns half of the bandwidth to working traffic and the other half is
reserved as a protection route. For example, in an OC-48 BLSR, the first 24STS-1s
carry the working traffic the other 24STS-1s are assigned as protection.
In the event of a single failure or a failure in a segment in a ring, the Traverse system
restores all protected traffic.
STS Channels
25 to 48: Protection
Node 1
Tributaries Tributaries
Node 4 Node 2
Node 3 Tributaries
Squelching The Traverse supports BLSR squelching. Nodes adjacent to a ring failure replace
non-restorable traffic with a path layer alarm indication signal (AIS) to notify the
far-end node of the interruption in service. The squelching feature automatically
generates squelch tables, no manual record keeping is required.
The squelch table first source node ID of the traffic entering the node and the last
destination node ID of the traffic exiting the node for each time slot that the node is
terminating (adding/dropping) or passing through.
Provisioning a squelch table occurs during the service provisioning.
For information on squelching and the squelch table, see Volume 5, TransNav
Management System, Section 4, Chapter 1—“BLSRs”.
Requirement Reference
Hardware
The nodes are physically connected. The East Volume 2, Installation and Configuration.
module on one node is physically connected to
the West module on the next.
Software
There are no line-level alarms (LOS, LOF, AIS-L, Click the port, click the Alarms tab, and verify no
SF-BER-L) present on the interfaces you are alarms are present.
using to configure the ring. Volume 4, Maintenance and Testing,
Section 1—System Monitoring.
The Control Data parameter is Enabled on each In Shelf View, click the port, click the Config tab,
interface you are using to configure the ring. and verify Control Data = Enabled.
Volume 3, Provisioning, Section 1, Chapter
4—“Port Configuration”.
The link is in the Enabled state. If the link is dis- In Map View, click the link, click the Config tab
abled (or is preprovisioned), you cannot synchro- and verify the Operational State is Enabled.
nize the ring. Volume 5, TransNav Management System,
Section 3, Chapter 1—“Creating and Deleting
Equipment Using Preprovisioning,” page 3-1.
These procedures describe the steps to create pro- Volume 5, TransNav Management System,
tection groups only. See Volume 5, TransNav Section 4, Chapter 1—“BLSRs,” page 4-1.
Management System for descriptions of other
fields on screen.
Guidelines to A single Traverse 2000 node supports up to four (4) OC-192 or up to nine (9) OC-48 2F
Create a BLSR BLSR protection groups.
A single Traverse 1600 node supports up to three (3) OC-192 or up to seven (7) OC-48
2F BLSR protection groups.
There can be up to 16 nodes in a 2F BLSR.
The ports that are in the BLSR protection group can only be part of the BLSR
protection group.
The East module on one node is physically connected to the West port on the next.
Step Procedure
1 Review the information in Before You Create a BLSR, page 2-15 before
you start this procedure.
2 In Map View, click the Protection tab to display the Protection Rings
screen.
3 From the New list, select BLSR.
Step 4
Step Procedure
4 Click Add to display the Protection Group Creation tab, Add BLSR
Ring screen.
Step 5
Step 6
Step 7
Step 8
Step 9 Step 10 Step 11 Step 12
Step Procedure
8 Add nodes to the ring. In Map View, click a node to add it to the ring. The
nodes are displayed on screen as you select them from Map View.
Step 8
Step Procedure
Chapter 5
Create a 1+1 Path Protection Group
Introduction 1+1 path protection is a protection mechanism that uses one SONET path of any
bandwidth to protect another of the same bandwidth. In a Traverse network, use a 1+1
path protection group to protect the transport of DS1 and VT services.
This chapter contains information on creating a 1+1 path protection group.
■ Example of a 1+1 Path Protection Group, page 2-22.
■ Before you Create a 1+1 Path Protection Group, page 2-23.
■ Guidelines to Create a 1+1 Path Protection Group, page 2-24.
■ Create a 1+1 Path Protection Group, page 2-24.
Example of a Use 1+1 path protection groups to configure path protection for the following service
1+1 Path types:
Protection ■ DS1.
Group ■ DS1-Mux.
■ DS3-TMX.
■ SONET-VT.
In the following example, first create and activate the sequence of unprotected services
(Steps 1, 2, 3, and 4). Then create the 1+1 path protection group at the Add and Drop
nodes (Steps 5 and 6). The pass through services at the intermediate nodes can be on
any available path.
1. Service Type: DS1-Mux 2. Service Type: SONET-STS (Pass Through) 4. Service Type: SONET-VT
Src: Node 1/slot-1/all ports Src: Node 2/slot 15/port-1/sts-4 Src: Node 1/slot 15/port-1/sts-4/vtg1-vt1
Dest: Node 4/slot-15/port-1/sts-4 Dest: Node 2/slot-16/port-1/sts-4 Dest: Node 4/slot-1/port-1/sts-1/vtg1-vt1
Protection Type: Unprotected Protection Type: Unprotected Protection Type: Unprotected
2
W P
5 6
W P
1 2 Node 3 2
Unprotected Unprotected
OC-48 3 3 OC-48
Node 2 3 Node 5
Before you Use a 1+1 path protection group to protect the transport of DS1 and VT services in a
Create a 1+1 Traverse network. Review this information before you create a 1+1 path protection
Path group.
Protection
Group Table 2-7 1+1 Path Requirements
Requirement Reference
Hardware
Create 1+1 path protection on trunk modules Volume 1, General Information, Section 2—Hardware
of the same data rate: Descriptions.
■ OC-3/STM-1.
■ OC-12/STM-4.
■ OC-48/STM-16.
■ OC-48/STM-16 VCX (optical
interface).
■ OC-192/STM-64.
■ GCM with 1-port OC-12/STM-4
(optical interface).
■ GCM with 1-port OC-48/STM-16
(optical interface).
You can use the following combination of Volume 1, General Information, Section 2—Hardware
modules in a 1+1 path protection group: Descriptions.
■ OC-12/STM-4 and a GCM with 1-port
STM-4/OC-12.
■ OC-48/STM-16 and a GCM with 1-port
OC-48/STM-16.
Each pair of modules must be in the correct Volume 2, Installation and Configuration,
slots. Section 7—Start-up and Module Placement.
Volume 2, Installation and Configuration, Section 7,
Appendix A—“Module Placement Planning and Guide-
lines,” page 7-1.
Software
There are no path-level alarms (LOS, LOF, Click the port, click the Alarms tab, and verify no alarms
AIS-P, SF-BER-P) present on the interfaces are present.
you are using to configure the protection Volume 4, Maintenance and Testing, Section 1—System
group. Monitoring.
These procedures describe the steps to create Volume 5, TransNav Management System, Section 4,
a 1+1 path protection group only. See Vol- Chapter 4—“Facility Protection Switching,” page 4-19.
ume 5, TransNav Management System for
descriptions of other fields on screen.
Create a 1+1 Use a 1+1 path protection group to protect the transport of DS1 and VT services in a
Path Traverse network. Review this information before you create a 1+1 path protection
Protection group. Use this procedure to create a 1+1 path protection group.
Group
Table 2-8 Create a 1+1 Path Protection Group
Step Procedure
Step 4
Step Procedure
Step Procedure
Chapter 6
Create a UPSR Protection Group
Introduction A Uni-directional Path Switched Ring (UPSR) is a self-healing closed loop topology
that protects against fiber cuts and node failures by providing duplicate, geographically
diverse paths for each service.
This chapter contains information on creating a UPSR protection group.
■ Example of a UPSR, page 2-28.
■ Before You Create a UPSR, page 2-29.
■ Guidelines to Create a UPSR, page 2-30.
■ Create a UPSR, page 2-30.
Node 2
Bridging
Node 1 Node 3
Node 4
Path selection
In a UPSR configuration in a Traverse network, the East module always transmits the
working signal clockwise around the ring. The West module always receives the
working signal. The East module on one node is physically connected to the West port
on the next.
UPSR in normal operation. In normal operation, the source node makes a duplicate of
the original traffic and bridges it around the ring in opposite directions. The destination
node determines the best quality signal based on path layer indications including path
layer defects and maintenance signals.
In a failure scenario, the destination node determines the best quality signal and selects
traffic from that path. UPSR protection is single-ended without any type of
coordination with, or notification to, the source node. During a fiber failure and before
full service is restored, there is no protection on the ring.
Requirement Reference
Hardware
Each node requires at least two modules of the Volume 1, General Information,
same data rate: Section 2—Hardware Descriptions.
■ OC-3/STM-1.
■ OC-12/STM-4.
■ OC-48/STM-16.
■ OC-48/STM-16 VCX (optical interface).
■ OC-192/STM-64.
■ GCM with 1-port OC-12/STM-4 (optical
interface).
■ GCM with 1-port OC-48/STM-16 (optical
interface).
You can use the following combination of mod- Volume 1, General Information,
ules in a protection group: Section 2—Hardware Descriptions.
■ OC-12/STM-4 and a GCM with 1-port
OC-12/STM-4.
■ OC-48/STM-16 and a GCM with 1-port
OC-48/STM-16.
Nodes are physically connected. The East module Volume 2, Installation and Configuration.
on one node is physically connected to the West
port on the next.
Software
There are no path-level alarms (LOS, LOF, AIS-P, Click the port, click the Alarms tab, and verify no
SF-BER-P) present on the interfaces you are alarms are present.
using to configure the ring. Volume 4, Maintenance and Testing,
Section 1—System Monitoring.
These procedures describe the steps to create pro- Volume 5, TransNav Management System,
tection groups only. See Volume 5, TransNav Section 4, Chapter 2—“UPSR,” page 4-9.
Management System for descriptions of other
fields on screen.
Guidelines to A single Traverse 2000 node supports up to four (4) OC-192 or up to nine (9) OC-48
Create a UPSR UPSR protection groups.
A single Traverse 1600 node supports up to three (3) OC-192 or up to seven (7) OC-48
UPSR protection groups.
There can be up to 16 nodes in a UPSR.
In a UPSR configuration in a Traverse network, the East module always transmits the
working signal clockwise around the ring. The West module always receives the
working signal.
The East module on one node is physically connected to the West port on the next.
Step Procedure
1 Review the information in Before You Create a UPSR, page 2-29 before
you start this procedure.
2 In Map View, click the Protection tab to display the Protection Rings
screen.
3 Add a UPSR protection group. From the New list, select SNCP/UPSR.
Step 4
Step Procedure
4 Click Add to display the Protection Group Creation tab, Add UPSR
Ring screen.
Step 5
Step Procedure
7 For each node in the ring (Node column), select a West port from the menu
in the West Port column.
The West Port of a node is physically connected to the East Port of another
node.
8 For each node in the ring (Node column), select an East port from the
menu in the East Port column.
The East and West ports must be on separate modules in the shelf.
9 Click Add.
10 In Synchronize Protection Group dialog box, click Yes to propagate
protection group information to all nodes in the ring.
Contents
Chapter 1
Service Provisioning Concepts
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Traverse Services Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Supported Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
ETSI to ANSI Interworking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Multicast Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
VT Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Transmultiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Resource Advisory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Transport Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Switching Hierarchies and Service Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Traverse Service Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Service Creation Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Service Creation Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
1. Add the Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
2. Configure General Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
3. Configure the Service Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
4. Configure the Attributes of the Transport Path . . . . . . . . . . . . . . . . . . 3-9
5. Set the Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
6. Activate the Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
Before You Start Creating Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
Chapter 2
Procedures Common to All Services
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
Add a Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12
Configure General Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
Set Constraints for a Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-15
Activate a Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17
Activate Multiple Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-18
Chapter 3
Creating DS1 Services
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-19
Example of DS1 Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-20
Modules Required to Create DS1 Services. . . . . . . . . . . . . . . . . . . . . . . . . . . 3-21
Before You Create DS1 Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-21
Chapter 4
Creating DS3 Services
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-35
Example of DS3 Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-36
Modules Required to Create DS3 Services . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-37
Before You Create DS3 Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-37
Sources and Destinations for DS3 Services . . . . . . . . . . . . . . . . . . . . . . . . . . 3-38
Create a DS3-CC Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-39
Create a DS3-TMX Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-46
Chapter 5
Creating SONET Services
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-53
Examples of SONET Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-54
Other SONET Services and Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-55
Modules Required to Create SONET Services . . . . . . . . . . . . . . . . . . . . . . . . 3-55
Before You Create SONET Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-55
Source and Destinations for SONET Services . . . . . . . . . . . . . . . . . . . . . . . . 3-56
Starting STS Numbers for SONET Services . . . . . . . . . . . . . . . . . . . . . . . . . . 3-57
Create a SONET-STS Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-58
Create a SONET-VT1.5 Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-66
List of Figures
Figure 3-1 End-to-End Services Creation Model . . . . . . . . . . . . . . . . . . . . . . 3-7
Figure 3-2 Hop-by-Hop Services Creation Model . . . . . . . . . . . . . . . . . . . . . . 3-7
Figure 3-3 Map View—Service Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12
Figure 3-4 Define Service—General Info Screen . . . . . . . . . . . . . . . . . . . . . . 3-13
Figure 3-5 Define Service—Constraints Screen . . . . . . . . . . . . . . . . . . . . . . . 3-15
Figure 3-6 Service Tab—Activate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17
Figure 3-7 Service Tab—Activate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-18
Figure 3-8 DS1 Lease Line Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-20
Figure 3-9 DS1 Service Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23
Figure 3-10 DS1 Service Level Agreement Screen . . . . . . . . . . . . . . . . . . . . . 3-24
Figure 3-11 DS1 Service Transport Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25
Figure 3-12 DS1 Service Constraints Screen . . . . . . . . . . . . . . . . . . . . . . . . . . 3-27
Figure 3-13 DS1-Mux Service Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-28
Figure 3-14 DS1-Mux Service Level Agreement Screen . . . . . . . . . . . . . . . . . 3-29
Figure 3-15 DS1-Mux Service Transport Screen . . . . . . . . . . . . . . . . . . . . . . . 3-30
Figure 3-16 DS1-Mux Service Constraints Screen . . . . . . . . . . . . . . . . . . . . . . 3-33
Figure 3-17 Channelized DS3 and DS3 Services . . . . . . . . . . . . . . . . . . . . . . . 3-36
Figure 3-18 DS3-CC Service Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-39
List of Tables
Table 3-1 SONET Transport Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Table 3-2 Switching Hierarchies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Table 3-3 DS1 Service Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Table 3-4 DS3 Service Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Table 3-5 SONET Service Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Table 3-6 Ethernet Service Types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Table 3-7 Before Provisioning Your Network Requirements. . . . . . . . . . . . . 3-10
Table 3-8 Add a Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12
Table 3-9 Configure General Information . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
Table 3-10 Set Constraints for a Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-15
Table 3-11 Activate a Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17
Table 3-12 Activate Multiple Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-18
Table 3-13 Modules Required to Create DS1 Services . . . . . . . . . . . . . . . . . 3-21
Table 3-14 DS1 Service Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-21
Table 3-15 Sources, and Destinations for DS1 Services . . . . . . . . . . . . . . . . 3-22
Table 3-16 Create a DS1 Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23
Table 3-17 Create a DS1-Mux Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-28
Table 3-18 Modules Required for DS3 Services . . . . . . . . . . . . . . . . . . . . . . . 3-37
Table 3-19 DS3 Service Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-37
Table 3-20 Sources, and Destinations for DS3 Services . . . . . . . . . . . . . . . . 3-38
Table 3-21 Create an DS3-CC Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-39
Table 3-22 Create an DS3-TMX Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-46
Table 3-23 Modules Required for SONET Services . . . . . . . . . . . . . . . . . . . . 3-55
Table 3-24 SONET Service Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-55
Table 3-25 Sources, and Destinations for SONET Services. . . . . . . . . . . . . . 3-56
Table 3-26 Valid Starting STS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-57
Chapter 1
Service Provisioning Concepts
Introduction Creating services in a Traverse network requires that you first identify switching
requirements, bandwidth requirements, and service types. This chapter explains the
particulars of services on a Traverse platform:
■ Traverse Services Definition, page 3-1.
■ Transport Capacity, page 3-3.
■ Switching Hierarchies and Service Types, page 3-4.
■ Traverse Service Types, page 3-5.
■ Service Creation Models, page 3-7.
■ Service Creation Process, page 3-8.
■ Before You Start Creating Services, page 3-10.
Traverse A service in a Traverse network connects traffic from a source to a destination. The
Services source can be a port, subport, or channel. The source can originate on any module and
Definition can be either a tributary module (service endpoint) or a trunk module (between nodes in
a network).
In general, the originating traffic type defines the type of service that you need to
provision. For example, if the traffic originates from an optical port, create an optical
service. If the traffic originates from an Ethernet port, create an Ethernet service.
The destination of the service varies depending on the connection you are creating. The
destination can be a compatible module, port, subport, or another service. Additionally,
the destination can be on the same node (node service) or on a separate node (domain
service).
Multicast Connections
Multicast connections are connections made from one source to multiple destinations.
The Traverse system supports multicast connections for the following services:
■ SONET-STS.
■ Ethernet.
Use multicast connections to create drop-and-continue services in a Traverse network.
Multiplexing
Multiplexing is the ability to transmit two or more signals over a single channel.
Use the DS1-Mux service to map 28 DS1 ports to a VT-packed STS.
VT Switching
The Traverse system cross connects at the VT-1.5 layer. Switching at this level of
granularity requires less multiplexing and demultiplexing between STS terminations.
Also, the Traverse provides important groom-and-fill capabilities. These capabilities
mean as many lower-speed channels as possible are packed into a circuit. This packing
makes the network more efficient and enables faster service provisioning.
Multiple VT Switches can be deployed to create a larger non-blocking cross connect
fabric. These can be added in the same Traverse shelf and distributed across a network.
Transmultiplexing
Transmultiplexing is the ability to take a number of voice analog phone conversations,
convert them to digital signals, and then bundle them up into a 1.544 Mbps bit stream.
Use the DS3-Tmx service to convert a channelized DS3 into a VT-packed STS.
Resource Advisory
If this feature is enabled, the system displays only available resources. Ports, Paths, and
other resources assigned to activated services do not appear.
Transport Use the following table as a reference for the transport requirements of each supported
Capacity service.
STS-3c 150.336 — 1 4 16 64
STS-12c 599.040 — — 1 4 16
STS-48c 2,396.160 — — — 1 4
Ethernet 100 or 1000 481 Mbps 1492 Mbps 599 Mbps 1000 Mbps 1000 Mbps
1
On a virtually concatenated VC-3 (VC-3-nv), n times 48 but no greater than 1000.
2
On a virtually concatenated VC-4 (VC-4-nv), n times 149, but no greater than 1000.
Switching In a Traverse network, you can switch traffic at different levels of the optical hierarchy.
Hierarchies ■ In SONET, you can switch traffic at the VT layer, at the STS layer, or the
and Service concatenated STS layers.
Types On a Traverse platform, the combination of switching requirements and the type of
source port (the port from which the service originates) determines the types of services
you need to create. Use the following table to help you determine service types. You
will need to create multiple services at each node to move traffic in your network.
Switching Level
Source Port Type Traverse Service Type1
SONET
VT DS1 DS1
OC-N SONET-VT1.5
STS all ports on a DS1 card DS1-Mux
(DS1MUX)
DS3-CC DS3-CC
DS3-TMX DS3-Tmx
OC-N SONET- STS
ETH100TX Ethernet
ETH100FX
GBE
Concatenated STS OC-N SONET- STS
VC-Bundle
ETH100TX Ethernet
ETH100FX
GBE
1
See the next topic for a description and references for each Traverse service type.
Traverse Use the following tables as a reference to help you define which Traverse service type
Service Types for your network:
■ DS1 Service Types, page 5.
■ DS3 Service Types, page 5.
■ SONET Service Types, page 5.
■ Ethernet Service Types, page 6.
See Chapter 3—“Creating DS1 Services,” page 3-19 for details on the following ser-
vices types:
DS1 Use this service to switch individual DS1 channels through the
network.
DS1-Mux Use this service to multiplex all 28 ports on a DS1 card onto a
transport path.
See Chapter 4—“Creating DS3 Services,” page 3-35 for details on the following ser-
vices types:
DS3-CC Use this service to transport clear channel DS3 signals.
DS3-TMX Use this service to convert a channelized DS3 into a
VT-mapped STS for transport across the network.
See Chapter 5—“Creating SONET Services,” page 3-53 for details on the following
services types:
SONET-STS Use this service to transport synchronous traffic through the
network.
SONET-VT1.5 Use this service to switch individual SONET VT1.5 payloads
through the network.
See Section 4—Creating Ethernet Services for details on the following services types:
VC-Bundle Use this service to create non-standard concatenated signals to
transport Ethernet traffic. See Section 4, Chapter 3—“Creating
VC-Bundle Services,” page 4-17.
P2PDedicated Point-to-Point Dedicated. Use this service to extend a private
LAN network across a network. Bandwidth is dedicated to one
Ethernet (10/100 or GbE) port and data is transported over the
network using a “dedicated” transport path.
P2PShared Point-to-Point Shared. Use this service to extend a LAN
network across a network using a “shared” transport path.
IAS Internet Access Service. Use this service to aggregate Internet
traffic from multiple subscriber-side Ethernet ports (10/100 or
GbE) to one provider-side Ethernet port (10/100 or GbE)
connected to an ISP router.
TLS Transparent LAN Service (TLS). Use this service to allow
multiple Ethernet devices in multiple locations to appear as a
single private LAN (virtual LAN or VLAN).
Service You can create services in a Traverse network either end-to-end or hop-by-hop.
Creation An end-to-end service is a service you can set up between nodes. You select the source
Models of a service on one node and the destination on another. The system sets up the path
(including the alternate path if the service is protected) through the domain.
Constraints
(optional)
Source Destination
Tributary Card
Tributary Card
Trunk Card
Trunk Card
Trunk Card
Trunk Card
Endpoint Intermediate Endpoint
node node node
A hop-by-hop service is a service that you configure between two modules or two ports
on one node. That is, you select the source and destination endpoints on one node only.
Tributary Card
Trunk Card
Trunk Card
Trunk Card
Trunk Card
Endpoint Intermediate Endpoint
node node node
If you create a transport path end-to-end through the network, you can monitor only the
end points. If you create a transport path hop-by-hop through the network, you can add
or drop traffic, monitor performance, and alarms at each hop.
2. Configure General
Information. Select the
service type from the
drop-down menu and
configure the general
information parameters.
Click Next to go to the next
screen.
4. Configure the
Attributes of the
Transport Path. Set the
attributes of the transport
path for the service in the
transport screen. On this
screen, the primary
requirement is to set the
protection attributes. Click
Next to go to the next
screen.
Before You Before you start provisioning your network, the following tasks need to be complete.
Start Creating
Services Table 3-7 Before Provisioning Your Network Requirements
Requirement Reference
Hardware
You have the correct hardware according to your Volume 1, General Information
network plan. Section 2—Hardware Descriptions.
Software
TransNav server software is installed. The server Volume 5, TransNav Management System
is initialized and started. Section 1—Overview, Installation and Administra-
tion.
You are logged into the graphical user interface. Volume 5, TransNav Management System
Section 2, Chapter 1—“Starting the Graphical User
Interface,” page 2-1.
Chapter 2
Procedures Common to All Services
Introduction You provision a service by completing a series of screens on the graphical user
interface called:
■ General Information.
■ Service Level Agreement.
■ Transport.
■ Constraints.
This chapter contains procedures common to all service types.
Use the following procedures to begin service creation:
■ Add a Service, page 3-12.
■ Configure General Information, page 3-13.
To explicitly define the route for end-to-end services, see
■ Set Constraints for a Service, page 3-15.
To activate services after you have completed provisioning:
■ Activate a Service, page 3-17.
■ Activate Multiple Services, page 3-18.
Add a Service The following procedure provides step-by-step procedures for beginning service
creation.
Step Procedure
1 From Map View click the Service tab to display the Service List screen.
Step 2
2 Click Add to start service creation and display the Define Service–General
Information screen.
3 The Add a Service procedure is complete.
Continue to the next procedure: Configure General Information.
Configure The following procedure provides step-by-step instructions for completing the Define
General Service -General Information screen.
Information
Table 3-9 Configure General Information
Step Procedure
Step Procedure
6 If this is an end-to-end service, select how you are going to configure the
service this service:
From the Setup Type list, select
■ Strict (default): Explicitly define the service route through all nodes,
using the Constraints screen.
■ Loose: Allow the Control Plane to determine the optimum service
route through additional nodes.
7 Resource Advisory: System displays only available resources in the
Service Level Agreement screen, Source and Destination fields. Ports and
other resources assigned to activated services do not appear.
Select one of the following:
■ On: Display only ports or paths that have not been allocated to
activated services while provisioning this service.
■ Off: Display all ports or paths during provisioning of this service.
8 Click Next> to display the Service Level Agreement screen.
9 The Configure General Information procedure is complete.
Continue to the service provisioning procedure chapter for the service
type:
■ Chapter 3—“Creating DS1 Services,” page 3-19.
■ Chapter 4—“Creating DS3 Services,” page 3-35.
■ Chapter 5—“Creating SONET Services,” page 3-53.
■ Section 4—Creating Ethernet Services.
Set The Constraints screen is only valid for these service types provisioned end-to-end
Constraints for with a Setup Type=Strict in the General Information screen.
a Service
Table 3-10 Set Constraints for a Service
Step Procedure
3 On the first row of the Constraints screen, verify that ingress Node,
Ingress Port, Ingress Ring ID (if this service is part of a BLSR or UPSR),
and Ingress Path are the originating points to this service.
4 In the Node column, click the blank row and select an intermediate Node
name.
5 Select the Ingress Port, Ingress Ring ID (if this service is part of a BLSR
or UPSR), Ingress Path, Egress Port, Egress Ring ID, and Egress Path
for the intermediate node.
6 Repeat Steps 3, 4, and 5 for each hop in the network.
7 On the last row, verify that the Egress Port, Egress Ring ID (if this
service is part of a BLSR or UPSR), and Egress Path are the terminating
points for this service.
Step Procedure
8 Click Finish to provision this service and return to the service list on the
Service tab.
9 The Set Constraints for a Service procedure is complete.
Return to the originating procedure.
Step Procedure
Step 3
Step 4
3 Click the Service from the list to activate the command buttons.
4 Click Activate to activate the service.
5 The Activate a Service procedure is complete.
Step Procedure
Step 3
Step 4
Chapter 3
Creating DS1 Services
Introduction This chapter explains how to create the following service types on a Traverse system:
■ DS1. Use this service to switch individual DS1 channels through the network.
■ DS1-Mux. Use this service to multiplex all 28 ports on a DS1 card onto a transport
path.
This chapter includes the following topics:
■ Example of DS1 Services, page 3-20.
■ Modules Required to Create DS1 Services, page 3-21.
■ Before You Create DS1 Services, page 3-21.
■ Sources and Destinations for DS1 Services, page 3-22.
■ Create a DS1 Service, page 3-23.
■ Create a DS1-Mux Service, page 3-28.
Example of Use a combination of service types to create and transport DS1 services in a Traverse
DS1 Services network:
■ DS1-Mux. This service aggregates 28 DS-1 tributaries and adapts each channel to
a VT-mapped STS for transport over the SONET network.
■ SONET-STS. This service connects the VT-mapped STS from Node 1 to
Node 3.
■ DS1. This service provides digital cross-connect (DCS) to switch the VT-mapped
STS (aggregated DS-1 channels) to dedicated lease lines.
DS1 Service:
DS1-Mux-VT Service:
Switch VT-structured STS-1
Map 28-port DS1
to DS1 Ports
to VT-structured STS-1
(via required VT Switch module)
for Integrated Transport
SONET-STS
1
1 1
2
2 2
(x12)
(x24)
(x12)
27 27 27
28 VT 28 28
DS1 OC48 OC48 OC48 Switch
OC48 DS1 DS1
Modules This table lists the Traverse modules required to create DS1 services.
Required to
Create DS1 Table 3-13 Modules Required to Create DS1 Services
Services
Service Type Source Card Destination Card
Before You Review the information in this topic before you create DS1 services.
Create DS1
Services Table 3-14 DS1 Service Requirements
Requirement Reference
Hardware
Software
DS1 mapping formats are correct. Volume 3, Provisioning, Section 1, Chapter 3,”
Change DS1 Mapping Formats, page 1-19.
These procedures describe the steps to create a Volume 5, TransNav Management System,
specific service and change only configurable Section 5, Chapter 2—“DS1 Services,” page 5-11.
parameters. See Volume 5, TransNav
Management System for descriptions of other
fields on the screen.
Requirement Reference
Sources and The following table lists service types and valid source and destination port types and
Destinations mapping information for creating DS1 services. For each service type, any one source
for DS1 can connect to any one destination. Your network may require creating multiple
Services services at multiple nodes.
Sources Destinations
Service Type
Port Type or
Port Type Mapping Mapping
Service Type
Step Procedure
1 Review the information in Before You Create DS1 Services, page 3-21
before you start this procedure.
2 Complete the procedure: Configure General Information, page 3-13 for
this service.
Step Procedure
4 On the Define DS1 Service - Service Level Agreement screen, enter the
port originating the service and terminating the service on the node.
5 Enter the source information. See Sources and Destinations for DS1
Services, page 3-22 for a list of valid sources for a DS1 service.
■ From the Source Node list, select the node where this service
originates.
■ From the Source Port list, select the port where this service
originates. If the source of this service is in an equipment protection
group, select the source on the working module.
■ If the Source Port is a DS3TMX port, select the subport from the
Source Starting Sts list.
6 Enter the destination information. See Sources and Destinations for DS1
Services, page 3-22 for a list of valid sources for a DS1 service.
■ From the Destination Node list, select the same node as you selected
in Step 5.
■ From the Destination Port list, select the destination port. If the
destination of this service is in a protection group, select the
destination on the working module or port.
■ From the Destination Path list, select a destination path if the
Destination Port is an optical port.
■ From the Dest. PM Template list, select a performance monitoring
template to monitor performance on the path.
Step Procedure
Step Procedure
Step Procedure
However, you can verify the service you have just provisioned:
■ Verify that the ingress node, port and starting path are the originating
points for this service.
■ Verify that the egress node, port and starting path are the terminating
points for this service.
■ If this service is provisioned on a protection ring, verify the ring ID of
the ingress and egress endpoints.
15 Click Finish to provision this service and return to the service list on the
Service tab.
16 The Create a DS1 Service procedure is complete.
Continue to the procedure to activate the service. See Activate a Service,
page 3-17.
Step Procedure
1 Review the information in Before You Create DS1 Services, page 3-21
before you start this procedure.
2 Complete the procedure: Configure General Information, page 3-13 for
this service
Step Procedure
5 Enter the source information. See Sources and Destinations for DS1
Services, page 3-22 for a list of valid sources for a DS1-Mux service.
■ From the Source Node list, select the node where this service
originates.
■ From the Source Port list, click the module where this service
originates. This field reads: all ports DS1MUX.
If the source of this service is in an equipment protection group, select
the source on the working module.
■ If the Source Port is a DS3TMX port, select the subport from the
Source Starting Sts list.
Step Procedure
6 Enter the destination information. See Sources and Destinations for DS1
Services, page 3-22 for a list of valid sources for a DS1-Mux service.
■ From the Destination Node list, select the same node as you selected
in Step 5.
■ From the Destination Port list, select the destination port. If the
destination of this service is in a protection group, select the
destination on the working module or port.
■ From the Destination Path list, select a destination path if the
Destination Port is an optical port.
■ From the Dest. PM Template list, select a performance monitoring
template to monitor performance on the path.
7 Click Next to continue to the DS1-Mux service transport screen.
8 On the Define DS1-Mux Service - Transport screen, set the
characteristics for the transport of this service.
Step Procedure
Step Procedure
Step Procedure
However, you can verify the service you have just provisioned:
■ Verify that the ingress node, port and starting path are the originating
points for this service.
■ Verify that the egress node, port and starting path are the terminating
points for this service.
■ If this service is provisioned on a protection ring, verify the ring ID of
the ingress and egress endpoints.
Step Procedure
17 Click Finish to provision this service and return to the service list on the
Service tab.
18 The Create a DS1-Mux Service procedure is complete.
Continue to the procedure to activate the service. See Activate a Service,
page 3-17.
Chapter 4
Creating DS3 Services
Introduction This chapter explains how to create the following service types on a Traverse system:
■ DS3-CC. Use this service to transport clear channel DS3 signals.
■ DS3-Tmx. Use this service to convert a channelized DS3 into a VT-mapped STS
for transport across the network.
This chapter includes the following topics:
■ Example of DS3 Services, page 3-36.
■ Modules Required to Create DS3 Services, page 3-37.
■ Before You Create DS3 Services, page 3-37.
■ Sources and Destinations for DS3 Services, page 3-38.
■ Create a DS3-CC Service, page 3-39.
■ Create a DS3-TMX Service, page 3-46.
Example of Use a combination of service types to create and transport DS3 traffic in a Traverse
DS3 Services network. Depending on the network requirements and configurations, the Traverse can
transport DS3 signals or channelized DS3 signals.
The following example uses a combination of service types to move traffic:
■ DS3-Tmx. This service adapts channelized DS3 traffic into a VT-mapped STS for
transport over a SONET network to a far end TransAccess 100 Mux.
■ SONET-STS. This service cross-connects the VT-mapped STS from Node 1 to
Node 3.
■ SONET-VT 1.5. This service connects a VT (channelized DS3 from Node 1) to an
EC1 port that has a TransAccess 100 Mux connected.
■ DS3-CC. This service connects a clear channel DS3 to a digital cross-connect
system for switching into the network.
SONET-STS End-to-End (STS-3c)
DS3-Tmx
DS3-CC
SONET-VT 1.5
VT
OC3 TMX OC48 OC48 DS3 OC48 OC48 Switch TMX OC12
Slot 4 Slot 8 Slot 14 Slot 2 Slot 8 Slot 14 Slot 2 Slot 3 Slot 6 Slot 8
Node 1 Node 2 Node 3
Service Type: DS3-Tmx (HOP 1) Service Type: SONET-STS (HOP 2) Service Type: SONET-VT 1.5 (HOP3)
Src: Node 1- slot 8-port 6-DS3TMX Src: Node 2- slot 2-port 1-OC48-STS 3 Src: slot 2-port 1-OC48-STS 3-VTG1-VT1
Dest: Node 1-slot 14-port 1-OC48-STS 3 Dest: Node 2-slot 14-port 1-OC48-STS 3 Dest: slot 6-port 5-EC1-STS 1-VTG5-VT2
M13 TA100
Service Type: DS3-CC
Src: Node 1- slot 8-port 9-DS3CC
Dest: Node 2-slot 8-port 9-DS3CC
M13
Service Type: SONET-STS
Setup Type: Loose
Src: Node 1- slot 4-port 1-OC3-STS 1
Dest: Node 3-slot 8-port 1-OC12-STS 1
ATM MUX
Modules This table lists the Traverse modules required to create DS3 services.
Required to
Create DS3 Table 3-18 Modules Required for DS3 Services
Services
Service Type Source Card Destination Card
Before You Review the information in this topic before you create DS3 services.
Create DS3
Services Table 3-19 DS3 Service Requirements
Requirement Reference
Hardware
Software
Requirement Reference
Sources and The following table lists service types and valid source and destination port types and
Destinations mapping information for creating DS3 services. For each service type, any one source
for DS3 can connect to any one destination. Your network may require creating multiple
Services services at multiple nodes.
Sources Destinations
Service
Type Port Type or
Port Type Mapping Mapping
Service Type
Step Procedure
Step Procedure
5 Enter the source information. See Sources and Destinations for DS3
Services, page 3-38 for a list of valid sources for a DS3-CC service.
■ From the Source Node list, select the node where this service
originates.
■ From the Source Port list, select the port where this service
originates. If the source of this service is in an equipment protection
group, select the source on the working module.
6 Enter the destination information. See Sources and Destinations for DS3
Services, page 3-38 for a list of valid sources for a DS3-CC service.
■ From the Destination Node list, select a node.
For end-to-end services, select another node in the domain.
For hop-by-hop services, select the same node as you selected in
Step 5.
■ From the Destination Port list, select the destination port. If the
destination of this service is in a protection group, select the
destination on the working module or port.
■ If the Destination Port is an optical port, from the Destination Path
list, select a path.
■ If the Destination Port is an optical port, from the Dest. PM
Template list, select a performance monitoring template to monitor
performance on the path.
Step Procedure
7 If the destination node in Step 6 is different than the source node, default
values are displayed for the following fields:
■ Setup Retry Count (default=3). The number of times the system tries
to activate a service before declaring a service activation failure. Other
selections are in increments of 3; range is 3–30.
■ Failure Retry Count (default=3). The number of times the system
tries to reestablish a service before declaring a service retry failure.
Other selections are in increments of 3; range is 3–30.
8 Click Next to continue to the DS3-CC service transport screen.
9 On the Define DS3-CC Service - Transport screen, set the characteristics
for the transport of this service
Step Procedure
Step Procedure
Step Procedure
15 If UPSR Protected or 1+1 Path Protected is selected in Step 13, select the
protection attributes for the following fields:
■ Revertive (default=notselected): Select the check box to switch traffic
back to the original port or path once the failure condition no longer
exists.
■ WTR (Wait To Restore) Time (default=5): Configurable only if the
check box for Revertive is selected. Specifies the amount of time (in
minutes) for the system to wait before restoring traffic to the original
port or path once the failure condition no longer exists. Specify a value
between 1 and 60 minutes.
16 Click Next to continue to the DS3-CC service constraints screen.
17 This screen appears regardless of the Setup Type you selected on the
General Information screen.
To explicitly set the route of the service through the network (Setup
Type=Strict), complete the procedure: Set Constraints for a Service,
page 3-15.
If Setup Type=Loose, go to Step 18.
Step Procedure
18 Click Finish to provision this service and return to the service list on the
Service tab.
19 The Create an DS3-CC Service procedure is complete.
Continue to the procedure to activate the service. See Activate a Service,
page 3-17.
Step Procedure
1 Review the information in Before You Create DS3 Services, page 3-37
before you start this procedure.
2 Complete the procedure: Configure General Information, page 3-13 for
this service.
Step Procedure
5 Enter the source information. See Sources and Destinations for DS3
Services, page 3-38 for a list of valid sources for a DS3-TMX service.
■ From the Source Node list, select the node where this service
originates.
■ From the Source Port list, select the port where this service
originates. If the source of this service is in an equipment protection
group, select the source on the working module.
6 Enter the destination information. See Sources and Destinations for DS3
Services, page 3-38 for a list of valid sources for a DS3-TMX service.
■ From the Destination Node list, select a node.
For end-to-end services, select another node in the domain.
For hop-by-hop services, select the same node as you selected in
Step 5.
■ From the Destination Port list, select the destination port. If the
destination of this service is in a protection group, select the
destination on the working module or port.
■ If the Destination Port is an optical port, from the Destination Path
list, select a path.
■ If the Destination Port is an optical port, from the Dest. PM
Template list, select a performance monitoring template to monitor
performance on the path.
Step Procedure
7 If the destination node in Step 6 is different than the source node, default
values are displayed for the following fields:
■ Setup Retry Count (default=3). The number of times the system tries
to activate a service before declaring a service activation failure. Other
selections are in increments of 3; range is 3–30.
■ Failure Retry Count (default=3). The number of times the system
tries to reestablish a service before declaring a service retry failure.
Other selections are in increments of 3; range is 3–30.
8 Click Next to continue to the DS3-TMX service transport screen.
9 On the Define DS3-TMX Service - Transport screen, set the
characteristics for the transport of this service.
Step Procedure
Step Procedure
Step Procedure
Step Procedure
18 Click Finish to provision this service and return to the service list on the
Service tab.
19 The Create an DS3-TMX Service procedure is complete.
Continue to the procedure to activate the service. See Activate a Service,
page 3-17.
Chapter 5
Creating SONET Services
Introduction This chapter explains how to create the following service types in a Traverse network:
■ SONET-STS. Use this service to transport synchronous or Ethernet traffic through
the network.
■ SONET-VT1.5. Use this service to switch individual SONET VT1.5 payloads
through the network.
This chapter includes the following topics:
■ Examples of SONET Services, page 3-54.
■ Modules Required to Create SONET Services, page 3-55.
■ Before You Create SONET Services, page 3-55.
■ Source and Destinations for SONET Services, page 3-56.
■ Starting STS Numbers for SONET Services, page 3-57.
■ Create a SONET-STS Service, page 3-58.
■ Create a SONET-VT1.5 Service, page 3-66.
Examples of Use a combination of service types to create end-to-end SONET services or switch
SONET individual VT1.5 payloads in a Traverse network.
Services ■ DS3-Tmx. This service adapts channelized DS3 traffic into a VT-mapped STS for
transport over a SONET network to a far end TransAccess 100 Mux.
■ SONET-STS. This service cross-connects the VT-mapped STS from Node 1 to
Node 3.
■ SONET-VT 1.5. This service connects a VT (channelized DS3 from Node 1) to an
EC1 port that has a TransAccess 100 Mux connected.
■ DS3-CC. This service connects a clear channel DS3 to a digital cross-connect
system for switching into the network.
■ SONET-STS. This service transports ATM traffic (STS-3c) from an ATM
multiplexer to an ATM switch on the far end.
SONET-STS End-to-End (STS-3c)
DS3-Tmx
DS3-CC
SONET-VT 1.5
VT
OC3 TMX OC48 OC48 DS3 OC48 OC48 Switch TMX OC12
Slot 4 Slot 8 Slot 14 Slot 2 Slot 8 Slot 14 Slot 2 Slot 3 Slot 6 Slot 8
Node 1 Node 2 Node 3
Service Type: DS3-Tmx (HOP 1) Service Type: SONET-STS (HOP 2) Service Type: SONET-VT 1.5 (HOP3)
Src: Node 1- slot 8-port 6-DS3TMX Src: Node 2- slot 2-port 1-OC48-STS 3 Src: slot 2-port 1-OC48-STS 3-VTG1-VT1
Dest: Node 1-slot 14-port 1-OC48-STS 3 Dest: Node 2-slot 14-port 1-OC48-STS 3 Dest: slot 6-port 5-EC1-STS 1-VTG5-VT2
M13 TA100
Service Type: DS3-CC
Src: Node 1- slot 8-port 9-DS3CC
Dest: Node 2-slot 8-port 9-DS3CC
M13
Service Type: SONET-STS
Setup Type: Loose
Src: Node 1- slot 4-port 1-OC3-STS 1
Dest: Node 3-slot 8-port 1-OC12-STS 1
ATM MUX
Other SONET Use the procedures in the following chapters to configure other SONET services or
Services and applications:
Applications ■ Section 4, Chapter 2—“Creating Ethernet Transport Paths,” page 4-11.
■ Section 5, Chapter 1—“Creating 1+1 Path-Protected Services,” page 5-1.
■ Section 5, Chapter 2—“Creating Drop-and-Continue Services Procedures,”
page 5-11.
■ Section 5, Chapter 3—“Creating Optical Transmux Services,” page 5-23.
■ Section 5, Chapter 4—“Creating Services on Overlapping UPSRs,” page 5-33.
■ Section 5, Chapter 5—“Creating Transparent Services Procedures,” page 5-45.
Modules This table lists the Traverse modules required to create SONET services.
Required to
Create SONET Table 3-23 Modules Required for SONET Services
Services
Service Type Source Card Destination Card
1
There must be a VT Switch module in the same node to create SONET-VT1.5 services.
Before You Review the information in this topic before you create any SONET services.
Create SONET
Services Table 3-24 SONET Service Requirements
Requirement Reference
Hardware
Software
Requirement Reference
Source (tributary) and destination (transport) Volume 3, Provisioning, Section 1, Chapter 4—“Port
interfaces are configured correctly. Configuration,” page 1-23.
Interworking. Support for ETSI to ANSI Volume 3, Provisioning, Section 3, Chapter 5,”
interworking: Modules Required to Create SONET Services,
■ SDH to SONET. page 3-55.
■ SONET to SDH.
Source and The following table lists service types and valid source and destination port types and
Destinations mapping information for creating SONET services. For each service type, any one
for SONET source can connect to any one destination. Your network may require creating multiple
services at multiple nodes.
Services
Table 3-25 Sources, and Destinations for SONET Services
Sources Destinations
Service Type
Port Type or
Port Type Mapping Mapping
Service Type
1
Supports multicast connections for drop-and-continue applications. Also supports Ethernet over SONET
(EOS) transport.
2
There must be a VT Switch module in the same node to create SONET-VT1.5 services.
Starting STS The starting STS number for any SONET service depends on the required bandwidth.
Numbers for For example, an OC-48 interface has a Src. Starting STS range of 1–48 if you select
SONET STS-1 in the Bandwidth parameter. If you select STS- 12c in the Bandwidth
Services parameter, the Src. Starting STS can be 1, 13, 25, or 37. The following table lists all of
the valid starting STSs. The following table lists all the valid starting STS numbers.
Starting STS
Bandwidth
OC-3 OC-12 OC-48 OC-192
For SONET service between OC192 ports, the Src. Starting Sts and the Dest. Starting
Sts must in the same range when the range is between 1 and 48 or 49 and 192. For
example, the if Src. Starting Sts 12, the Dest. Starting Sts must be between STS
number 1 and 48. If the Src. Starting Sts is 105, the Dest. Starting Sts must be
between STS number 49 and 192.
Create a Review the information in Before You Create SONET Services, page 3-55 before you
SONET-STS start this procedure.
Service
Table 3-27 Create a SONET-STS Service
Step Procedure
Step Procedure
4 From the Bandwidth parameter, select the total bandwidth for the service:
■ STS-1 (default).
■ STS-3c.
■ STS-12c (for OC-12 and greater interfaces only).
■ STS-48c (for OC-48 and greater interfaces only).
5 Enter the source information. See Source and Destinations for SONET
Services, page 3-56 for a list of valid sources for a SONET-STS service.
■ From the Source Node list, select the node where this service
originates.
■ From the Source Port list, select the port where this service
originates. If the source of this service is in a protection group, select
the source that is considered the working port.
■ From the Source Path list, select the starting STS number where this
service originates. See Starting STS Numbers for SONET Services,
page 3-57 for a complete list.
■ From the Src. PM Template list, select a performance monitoring
template to monitor performance on the path.
Step Procedure
Step Procedure
Step Procedure
Step Procedure
Step Procedure
Step Procedure
17 This screen appears regardless of the Setup Type you selected on the
General Information screen.
To explicitly set the route of the service through the network (Setup
Type=Strict), complete the procedure: Set Constraints for a Service,
page 3-15.
If Setup Type=Loose, go to Step 18.
18 Click Finish to provision this service and return to the service list on the
Service tab.
19 The Create a SONET-STS Service procedure is complete.
Continue to the procedure to activate the service. See Activate a Service,
page 3-17.
Create a Review the information in Before You Create SONET Services, page 3-55 before you
SONET-VT1.5 start this procedure.
Service
Table 3-28 Create a SONET-VT1.5 Service
Step Procedure
Step Procedure
4 Enter the source information. See Source and Destinations for SONET
Services, page 3-56 for a list of valid sources for a SONET-VT1.5 service.
■ From the Source Node list, select the node where this service
originates.
■ From the Source Port list, select the port where this service
originates. If the source of this service is in a protection group, select
the source that is considered the working port.
■ From the Source Path list, select the starting STS path number where
this service originates. See Starting STS Numbers for SONET
Services, page 3-57 for a complete list.
■ From the Source VT list, select the VT group and VT number where
this service originates.
■ From the Src. PM Template list, select a performance monitoring
template to monitor performance on the path.
Step Procedure
Step Procedure
Step Procedure
Step Procedure
However, you can verify the service you have just provisioned:
■ Verify that the ingress node, port and starting path are the originating
points for this service.
■ Verify that the egress node, port and starting path are the terminating
points for this service.
■ If this service is provisioned on a protection ring, verify the ring ID of
the ingress and egress endpoints.
Step Procedure
16 Click Finish to provision this service and return to the service list on the
Service tab.
17 The Create a SONET-VT1.5 Service procedure is complete.
Continue to the procedure Activate a Service, page 3-17 to activate the
service.
Contents
Chapter 1
Ethernet Services Overview
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
Ethernet Services in a Traverse Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
Point-to-Point Dedicated (P2PD). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
Point-to-Point Shared (P2PS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1
Internet Access Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Transparent LAN Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Ethernet Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Link Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Virtual Concatenation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3
Encapsulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3
LCAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3
LCAS Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
LCAS and 1+1 Path Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4
LCAS Group Identifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
Asymmetric LCAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
LCAS Interworking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5
Ethernet Transport Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Modules Required to Create Ethernet Services . . . . . . . . . . . . . . . . . . . . . . . 4-6
Sources and Destinations for Ethernet Services. . . . . . . . . . . . . . . . . . . . . . . 4-7
Guaranteed Data Rates and Ethernet Services . . . . . . . . . . . . . . . . . . . . . . . 4-8
Procedures Required to Create Ethernet Services . . . . . . . . . . . . . . . . . . . . . 4-9
Chapter 2
Creating Ethernet Transport Paths
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-11
Modules Required to Create Transport Paths. . . . . . . . . . . . . . . . . . . . . . . . . 4-11
Before You Create Transport Paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12
Guidelines to Create Transport Paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13
Other Transport Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14
Create a Transport Path End-to-End. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14
Create a Transport Path Hop-by-Hop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15
Chapter 3
Creating VC-Bundle Services
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17
Example of a VC-Bundle Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18
Before You Create VC-Bundle Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-19
Chapter 4
Creating Point-to-Point Dedicated Services
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25
Example of a Point-to-Point Dedicated Service. . . . . . . . . . . . . . . . . . . . . . . . 4-26
Before You Create Point-to-Point Dedicated Services . . . . . . . . . . . . . . . . . . 4-26
Guidelines to Create a Point-to-Point Dedicated Service . . . . . . . . . . . . . . . . 4-28
Create a Point-to-Point Dedicated Service . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-28
Chapter 5
Creating Point-to-Point Shared Services
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-31
Example of a Point-to-Point Shared Service . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32
Before You Create Point-to-Point Shared Services. . . . . . . . . . . . . . . . . . . . . 4-33
Guidelines to Create a Point-to-Point Shared Service. . . . . . . . . . . . . . . . . . . 4-34
Create an Ethernet Point-to-Point Shared Service . . . . . . . . . . . . . . . . . . . . . 4-35
Chapter 6
Creating Ethernet IAS Services
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-37
Example of an IAS Ethernet Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-37
Before You Create an IAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-39
Guidelines to Create an IAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-40
Create an IAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-41
Chapter 7
Creating Ethernet TLS Services
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-45
Example of a TLS Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-45
Guidelines to Create TLS Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-47
Before You Create TLS Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-47
Create a Transparent LAN Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-49
List of Figures
Figure 4-1 VC-Bundle Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18
Figure 4-2 VC-Bundle Service—Service Level Agreement . . . . . . . . . . . . . . 4-21
Figure 4-3 VC-Bundle Service—Service Level Agreement . . . . . . . . . . . . . . 4-23
Figure 4-4 Dedicated Ethernet Private Line Service . . . . . . . . . . . . . . . . . . . 4-26
Figure 4-5 Define Ethernet Service—Service Level Agreement . . . . . . . . . . 4-28
Figure 4-6 Point-to-Point Shared Services . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32
Figure 4-7 Define Ethernet Service—Service Level Agreement . . . . . . . . . . 4-35
Figure 4-8 Ethernet Internet Access Services . . . . . . . . . . . . . . . . . . . . . . . . 4-38
Figure 4-9 Define Ethernet Service—Service Level Agreement . . . . . . . . . . 4-41
Figure 4-10 Transparent LAN Services over SONET Transport Paths . . . . . . 4-46
Figure 4-11 Define Ethernet Service—Service Level Agreement . . . . . . . . . . 4-49
Figure 4-12 Service Level Agreement—TDM Endpoint . . . . . . . . . . . . . . . . . . 4-50
Figure 4-13 Service Level Agreement—ETH100TX or GbE Port. . . . . . . . . . . 4-50
List of Tables
Table 4-1 LCAS Interworking and System Behavior . . . . . . . . . . . . . . . . . . . 4-5
Table 4-2 Modules Required to Transport Ethernet Services . . . . . . . . . . . . 4-6
Table 4-3 Sources, and Destinations for Ethernet Services . . . . . . . . . . . . . 4-7
Table 4-4 CAC Limits for Sum of All Guar. Data Rates Sharing a Port. . . . . 4-8
Table 4-5 Modules Required to Transport Ethernet Services . . . . . . . . . . . . 4-11
Table 4-6 Ethernet Transport Paths Requirements. . . . . . . . . . . . . . . . . . . . 4-12
Table 4-7 Ethernet Cards and Total Number of Terminations . . . . . . . . . . . 4-13
Table 4-8 Create an Ethernet Transport Path End-to-End . . . . . . . . . . . . . . 4-14
Table 4-9 Create an Ethernet Transport Path Hop-by-Hop. . . . . . . . . . . . . . 4-15
Table 4-10 VC-Bundle Service Requirements . . . . . . . . . . . . . . . . . . . . . . . . 4-19
Table 4-11 Create a VC-Bundle Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-21
Table 4-12 Change the Encapsulation Format . . . . . . . . . . . . . . . . . . . . . . . . 4-23
Table 4-13 Point-to-Point Dedicated Service Requirements. . . . . . . . . . . . . . 4-26
Table 4-14 Create an Ethernet Point-to-Point Dedicated Service. . . . . . . . . . 4-28
Table 4-15 Point-to-Point Shared Service Requirements . . . . . . . . . . . . . . . . 4-33
Table 4-16 Create an Ethernet Point-to-Point Shared Service . . . . . . . . . . . . 4-35
Table 4-17 IAS Service Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-39
Table 4-18 Create an IAS Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-41
Table 4-19 TLS Service Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-47
Table 4-20 Create an Ethernet Transparent LAN Service (TLS) . . . . . . . . . . 4-49
Chapter 1
Ethernet Services Overview
Ethernet You can configure the following Ethernet services on the Traverse platform.
Services in a
Traverse Point-to-Point Dedicated (P2PD)
Network A point-to-point dedicated service maps Ethernet traffic into one transport path and
transports the traffic to another Ethernet interface on the far end. There is no
aggregation at either side of the network. Alternatively, you can map the Ethernet
traffic from one port on a module to another. Use the P2PD service to offer dedicated
Ethernet private line services.
For information how to configure this service, see Chapter 4—“Creating Point-to-Point
Dedicated Services,” page 4-25.
Link Integrity Link integrity is a feature that applies when the dedicated point-to-point service
connects two Ethernet ports on different nodes (not the same node) and must be
enabled on both ports to operate. This feature monitors the status of Ethernet ports and
the associated transport connection.
If the link integrity feature is enabled, the link is shut down if one of the following
failures occur:
■ A failure on the local port causes the remote port to be signaled to shut down.
■ A failure on the transport paths between the local and remote port causes the near
end port to shut down.
■ A failure on the remote port (if this feature is enabled as well) causes the local port
to shut down.
This feature is configurable through the Integrity Control and Integrity Status
parameters on the Ethernet port.
Encapsulation Creating Ethernet services in a Traverse network requires first creating the transport
paths for the services through the network. Use the SONET-STS service type to create
a transport path.
The Traverse supports two types of encapsulation format for Ethernet over SONET
(EOS) transport:
■ X.86. The system default for EOS when a SONET-STS service is used to create a
transport path.
■ GFP. Generic framing procedure (GFP) encapsulation is a procedure defined in
ITU G.7041, “Generic framing procedure (GFP)”. This procedure is a standard
method for adapting higher-layer data for transport over a SONET or other (e.g.
pure optical) network. Ethernet frames are encapsulated one-for-one into GFP
frames and become a GFP payload.
To change the encapsulation format from the default X.86, you have to add the
contiguously-concatenated SONET-STS service to a VC bundle. See Chapter
3—“Creating VC-Bundle Services,” page 4-17 for detailed information.
LCAS Link capacity adjustment scheme (LCAS) is a protocol defined in ITU G.7042, “Link
capacity adjustment scheme (LCAS) for virtual concatenated signals”. Nodes at the
ends of a VC bundle use this protocol to manage the bundle. Specifically, a system can
adjust the bundle membership in response to autonomic events (member fail or
recover) or operator requests (add or remove member). LCAS signaling between peers
is carried in the SONET path overhead as outlined in G.7042 and G.707.
See the following topics for a complete description of LCAS capabilities on the
Traverse system.
■ LCAS Operation, page 4-4.
■ LCAS and 1+1 Path Protection, page 4-4.
■ LCAS Group Identifiers, page 4-5.
■ Asymmetric LCAS, page 4-5.
■ LCAS Interworking, page 4-5.
LCAS and 1+1 Members of a VC bundle can be either unprotected or 1+1 path protected. An
Path unprotected member has a single SONET path. A protected member has two SONET
Protection paths that operate as a path protection group.
When a member is 1+1 path protected and has two paths, failure of one path will not
cause a critical alarm, but failure of both paths will. When both paths are failed,
recovery of the one path removes the critical alarm.
See Section 5, Chapter 1—“Creating 1+1 Path-Protected Services,” page 5-1 for
information on creating protected Ethernet services.
LCAS Group The LCAS protocol uses a group identifier (GID) to identify all members of the bundle
Identifiers in the LCAS messages. The GID is a pseudo-random value selected by each peer to
include in the transmit direction for all members of a particular bundle. The receiving
peer confirms that all members in the bundle contain the same GID value.
If a node receives different GID values for members of the same group, it generates an
LCAS GID Error alarm. This alarm indicates a mismatch of group composition on the
two peers (for example, a member added to the wrong bundle on one node). To correct
this condition, the operator must deactivate the bundle, remove the incorrect member,
add the correct member, and then re-activate the bundle.
LCAS When two nodes use virtual concatenation for a network connection, it is possible that
Interworking one side is configured to use LCAS on the connection, and the other side is not (or does
not support LCAS). That is, when a node is using LCAS on a VC bundle (LCAS
Configuration=Enabled), it sends LCAS control messages. If a Traverse node does not
receive any LCAS control messages, it assumes that the peer is not using LCAS.
This table describes system behavior in interworking scenarios.
Table 4-1 LCAS Interworking and System Behavior
Ethernet Creating Ethernet services in a Traverse network requires first creating the transport
Transport paths for the services through the network. The Traverse system supports Ethernet over
Features SONET (EOS) transport.
■ Encapsulation. See Encapsulation, page 4-3.
■ 1+1 path protection for Ethernet services. See Section 5, Chapter 1—“Creating
1+1 Path-Protected Services,” page 5-1.
■ Drop-and-continue (multicast). See Section 5, Chapter 2—“Creating
Drop-and-Continue Services Procedures,” page 5-11.
Modules This table lists the Traverse modules required to transport Ethernet services.
Required to Table 4-2 Modules Required to Transport Ethernet Services
Create
Ethernet Service Type Card Type
Services
Point-to-Point Dedicated Any Ethernet module:
■ 8-Port GbE LX
Point-to-Point Shared
■ 8-Port GbE SX
Internet Access Service ■ 24-Port 10/100BaseTX
■ 2-port GbE LX plus 8-port 100BaseFX
Transparent LAN Service ■ 2-port GbE LX plus 16-port 10/100BaseTX
■ 2-port GbE SX plus 16-port 10/100BaseTX
Sources and The following table lists service types and valid source and destination port types and
Destinations mapping information for creating Ethernet services on a node. For each service type,
for Ethernet any one source can connect to any one destination.
Services
Table 4-3 Sources, and Destinations for Ethernet Services
Guaranteed The Guaranteed Data Rate is the total rate of Ethernet data including both the data
Data Rates and packets themselves and the per-packet Ethernet line overhead: 8-byte preamble,
Ethernet 12-byte inter-packet gap.
Services The sum of all guaranteed data rates for all services sharing the destination port must be
less than or equal to the maximum capacity of the transport path or the backplane
connection (see EOS Tagging). The table below shows these maximum capacities.
These are the limits used by Connection Admission Control (CAC) that, when
exceeded, cause the system to reject a new service.
Table 4-4 CAC Limits for Sum of All Guar. Data Rates Sharing a Port
STS-1 48
STS-3c 149
STS-12c 599
STS-43c 1000
STS-1-nv n times 48 but no greater than 1000.
STS-3c-nv n times 149, but no greater than 1000
ETH100FX, ETH100TX 100
GBE 1000
For example, for three P2PS services sharing a path with a Bandwidth of STS-3c, the
sum of the Guar. Data Rates for these three services must not exceed 149 Mbps.
If those three P2PS services share an endpoint with a Bandwidth of STS-48c, the sum
of the Guar. Data Rates for those three services must not exceed 1000.
However, for twenty IAS services sharing a VC-Bundle that contains six STS-1s (that
is, an STS-1-6v), the sum of the Guar. Data Rates for those twenty services must not
exceed 288.
If the system uses X.86 Ethernet over LAPS mapping to carry Ethernet frames over the
SONET transport. LAPS is the type of HDLC used to carry data frames over SONET
transport. The capacity limits in the table above assume a negligible effect from
HDLCs addition of escape characters during the Ethernet-over-SONET encapsulation
process. It is possible that Ethernet data that conforming to the service’s Guar. Data
Rate may contain a high proportion of characters requiring escaping, causing SONET
path congestion and resulting packet loss.
Procedures You require a series of procedures to create Ethernet services in a Traverse network.
Required to To create a path to transport the Ethernet traffic, see:
Create ■ Chapter 2—“Creating Ethernet Transport Paths,” , page 4-11.
Ethernet
Services To create a transport path of non-standard concatenated bandwidth, see:
■ Chapter 3—“Creating VC-Bundle Services,” page 4-17.
To actually create an Ethernet service, use the following information:
■ Chapter 4—“Creating Point-to-Point Dedicated Services,” , page 4-25.
■ Chapter 5—“Creating Point-to-Point Shared Services,” , page 4-31.
■ Chapter 6—“Creating Ethernet IAS Services,” , page 4-37.
■ Chapter 7—“Creating Ethernet TLS Services,” , page 4-45.
Chapter 2
Creating Ethernet Transport Paths
Introduction Creating Ethernet services in a Traverse network requires first creating the transport
paths for the services through the network. Use the SONET-STS service type to create
a transport path. Create the transport path either hop-by-hop or end-to-end.
The transport paths can be grouped together into non-standard a virtually concatenated
signals. For information on VC-bundles, see Chapter 3—“Creating VC-Bundle
Services,” page 4-17.
This chapter include information on the following topics:
■ Modules Required to Create Transport Paths, page 4-11.
■ Before You Create Transport Paths, page 4-12.
■ Guidelines to Create Transport Paths, page 4-13.
■ Other Transport Applications, page 4-14.
■ Create a Transport Path End-to-End, page 4-14.
■ Create a Transport Path Hop-by-Hop, page 4-15.
Modules This table lists the Traverse modules required to transport Ethernet services.
Required to
Create Table 4-5 Modules Required to Transport Ethernet Services
Transport
Service Type Card Type
Paths
SONET-STS Any Ethernet module AND OC-N modules.
(hop-by-hop) The underlying SONET topology must be connected and configured.
Before You Review these requirements before you create transport paths for Ethernet services.
Create Table 4-6 Ethernet Transport Paths Requirements
Transport
Paths Requirement Reference
Hardware
You need a combination of the modules to create See Modules Required to Create Transport Paths,
transport paths for Ethernet services. page 4-11 in this chapter.
Volume 1, General Information,
Section 2—Hardware Descriptions.
Software
Ethernet interfaces are configured correctly. Volume 3, Provisioning, Section 1, Chapter 4,”
Change Ethernet Port Parameters, page 1-39.
You are aware of the valid sources and Volume 3, Provisioning, Section 4, Chapter 1,”
destinations for this service. Sources and Destinations for Ethernet Services,
page 4-7.
Card Type
GbE LX -VC 8
10/100BaseTX-VC 24
Other Use the procedures in the following chapters to configure transport paths in different
Transport applications:
Applications ■ Section 4, Chapter 3—“Creating VC-Bundle Services,” page 4-17.
■ Section 5, Chapter 1—“Creating 1+1 Path-Protected Services,” page 5-1.
■ Section 5, Chapter 2—“Creating Drop-and-Continue Services Procedures,”
page 5-11.
Create a Use a single SONET-STS service to create a transport path end-to-end through the
Transport Path network. If you create a path end-to-end, you can only add and drop traffic or monitor
End-to-End each end. If you create a transport path hop-by-hop, you can monitor performance and
alarms at each hop in the network.
Table 4-8 Create an Ethernet Transport Path End-to-End
Step Procedure
Create a Use a sequence of SONET-STS services to create a transport path hop-by-hop through
Transport Path the network. If you create a transport path hop-by-hop through the network, you can
Hop-by-Hop add and drop traffic or monitor performance and alarms at each hop. If you create a
transport path end-to-end, you can only monitor each end.
Table 4-9 Create an Ethernet Transport Path Hop-by-Hop
Step Procedure
1 Create a SONET-STS service at the first node. See the procedure: Create a
SONET-STS Service, page 3-58.
The Source Card is the Ethernet module.
The Destination Card is the trunk module. If the trunk module is in a
protection group, select the module that transmits working traffic.
2 Create a SONET-STS service at the drop node. See the procedure: Create a
SONET-STS Service, page 3-58.
The Source Card is the trunk module. If the trunk module is in a
protection group, select the module that receives the working traffic.
The Destination Card is the Ethernet module.
3 At each intermediate node, create a SONET-STS service to between the
ingress and egress trunk cards. See the procedure: Create a SONET-STS
Service, page 3-58.
4 The Create an Ethernet Transport Path Hop-by-Hop, page 4-15 procedure
is complete.
Chapter 3
Creating VC-Bundle Services
1. Service Type: SONET-STS (Path 1&2) 2. Service Type: SONET-STS (Path 3&4)
Source: Node 1/slot-1/ETH100TX card Source: Node 2/slot-1/ETH100TX card
Dest: Node 2/slot-1/ETH100TX card Dest: Node 3/slot-1/ETH100TX card
Bandwidth: STS-3c Bandwidth: STS-3c
To create VC-bundles, first create the standard SONET-STS service then bundle them
together.
Before You Review the information in this topic before you create bundle any services.
Create Table 4-10 VC-Bundle Service Requirements
VC-Bundle
Services Requirement Reference
Hardware
You need a combination of the modules to bundle Volume 3, Provisioning, Section 4, Chapter 2,”
transport paths for Ethernet services. Modules Required to Create Transport Paths,
page 4-11.
Volume 1, General Information,
Section 2—Hardware Descriptions.
Software
Ethernet interfaces are configured correctly. Volume 3, Provisioning, Section 1, Chapter 4,”
Change Ethernet Port Parameters, page 1-39.
You are aware of the valid sources and Volume 3, Provisioning, Section 4, Chapter 1,”
destinations for this service. Sources and Destinations for Ethernet Services,
page 4-7.
You can only bundle SONET-STS services that Volume 3, Provisioning, Section 3, Chapter 1,”
originate and terminate on Ethernet modules. Traverse Service Types, page 3-5.
Volume 3, Provisioning, Section 4, Chapter
2—“Creating Ethernet Transport Paths,” page 4-11.
Member services are configured and activated. Volume 3, Provisioning, Section 4, Chapter
The bandwidth of destination services must be 2—“Creating Ethernet Transport Paths,” page 4-11.
sufficient to carry the guaranteed data rate
provisioned for the Ethernet services transported
over it.
Requirement Reference
Guidelines to Before you create a VC-Bundle service, review the following guidelines:
Provision a ■ You can only bundle SONET-STS services that originate and terminate on an
VC-Bundle Ethernet modules.
Service ■ Create a bundle service at both ends of the transport path.
■ When you create a bundle, ensure the member services match on both the source
and destination nodes.
■ The member services must be the same bandwidth: STS-1 or STS-3c. A bundle
cannot contain a mixture of path sizes.
■ A bundle can contain up to 21 member STS-1 services or up to seven STS-3c
services.
■ A member service can only be in one bundled service.
■ The total Ethernet payload capacity of a bundle is based on the member services.
For example, a bundle containing four STS-1s has an Ethernet payload capacity of
192 Mbps (4 * 48 Mbps). Transport Capacity, page 5-3 shows the payload
capacity for each supported transport path.
■ The system calculates the bandwidth of the bundle when the service is activated. A
bundle containing four STS-1s is STS-1-4v, and has a bandwidth four times that of
an STS-1. A VC bundle containing four STS-3c is STS-3c-4v, and has a bandwidth
of four times that of an STS-3c.
■ Create and activate the member services before creating and activating the VC
bundle service.
■ Create and activate a bundle service before it using it to carry Ethernet services.
■ Deactivate a bundle service before making any changes (add or remove services) to
the bundle.
■ The Traverse platform supports static LCAS. Static LCAS allows an activated VC
bundle that contains multiple members to continue to operate when one or more
members have failed.
See Chapter 1—“Ethernet Services Overview,” LCAS Operation, page 4-4 for a
complete description of LCAS capabilities on the Traverse system.
Step Procedure
1 Complete the Configure General Information, page 3-13 procedure for this
service.
2 Provision the VC-Bundle by adding services in the Define VC-Bundle
Service —Service Level Agreement screen (Steps 3 to 9).
Step Procedure
Change the On a Traverse system, the VC-bundle services also controls how an Ethernet frame is
Encapsulation encapsulated into a SONET frame (either GFP or X.86). In this situation, first create a
Format on a standard SONET-STS service with a concatenated bandwidth. Then, add the signal to a
Standard VC-Bundle and change the encapsulation format. Use this procedure to change the
Concatenated Encapsulation format of the Ethernet frame.
Signal
Table 4-12 Change the Encapsulation Format
Step Procedure
3 From the Source Node list, select the node to create the VC bundle.
4 From the Services list box, select the SONET-STS service with the
Bandwidth=STS-3c, STS-12c, or STS-48c.
5 Click Add to add the selected services to the Bundle list box.
6 From the Concatenation Type list, select Standard.
7 From the Encapsulation Type list, select:
■ GFP for generic framing procedure encapsulation.
■ X.86 (default) for X.86 encapsulation.
Step Procedure
8 Click Finish to provision the service and return to the service list on the
Service tab.
9 Repeat Steps 1 to 8 at the other end of the SONET-STS service.
10 The Change the Encapsulation Format procedure is complete.
Continue to the procedure to activate the service. See Activate a Service,
page 3-17.
Chapter 4
Creating Point-to-Point Dedicated Services
Introduction This chapter explains how to create a point-to-point dedicated (P2PD) Ethernet service
on a Traverse system. Use this service to extend a private LAN network across a
network. Bandwidth is dedicated to one Ethernet (10/100 or GbE) port and data is
transported over the network using a dedicated transport path.
This chapter includes the following topics:
■ Example of a Point-to-Point Dedicated Service, page 4-26.
■ Before You Create Point-to-Point Dedicated Services, page 4-26.
■ Guidelines to Create a Point-to-Point Dedicated Service, page 4-28.
■ Create a Point-to-Point Dedicated Service, page 4-28.
Example of a A P2PD Ethernet service allows a customer to transport Ethernet frames from one
Point-to-Point Ethernet port over a dedicated transport path.The bandwidth of the transport path can
Dedicated be a contiguous signal (STS-1, STS-3c, STS-12c, or STS-48c) or a virtually
Service concatenated signal (VC-Bundle).
2
1
4 6
3 5
Before You Review the information in this topic before you create a point-to-point dedicated
Create Ethernet service.
Point-to-Point
Dedicated Table 4-13 Point-to-Point Dedicated Service Requirements
Services
Requirement Reference
Hardware
You need a combination of the modules to create Volume 3, Provisioning, Section 4, Chapter 1,”
Ethernet services. Modules Required to Create Ethernet Services,
page 4-6 for a list of required modules for specific
services.
Volume 1, General Information,
Section 2—Hardware Descriptions.
Software
Requirement Reference
Ethernet interfaces are configured correctly. Volume 3, Provisioning, Section 1, Chapter 4,”
Change Ethernet Port Parameters, page 1-39.
You are aware of the valid sources and Volume 3, Provisioning, Chapter 1—“Ethernet
destinations for this service. Services Overview,” Sources and Destinations for
Ethernet Services, page 4-7.
Guidelines to General guidelines for provisioning Ethernet point-to-point dedicated (P2PD) services
Create a are as follows:
Point-to-Point ■ The source of a P2PD service is always a Ethernet port.
Dedicated ■ The destination of a P2PD service may be one of:
Service – another Ethernet port.
– a SONET-STS service.
– a VC-Bundle service
■ A P2PD service can operate with third-party EOS vendor equipment when the
service.
■ The P2PD service supports asymmetrical guaranteed data rates. Guaranteed data
rates can be set to different rates at each endpoint node.
■ The bandwidth for the dedicated transport path must support the “higher”
guaranteed data rate assigned to an asymmetrical P2PD service.
Step Procedure
5 From the Guar. Data Rate list select the amount of data (in Mbps) the
service can send without having any data dropped. Range is 0–1000 in
increments of 1. Default is 1. This value is applied to the data received at
the source port and submitted to the transport path.
See Guaranteed Data Rates and Ethernet Services, page 4-8 for more
information.
6 The EOS Tagging adds a proprietary tag to incoming packets and appears
on the user interface only if the destination is a transport service.
In the EOS Tagging field, specify if packets (either sent or received) on
the path have VLAN tags. This parameter must be set the same for both
Ethernet services that make up the domain Ethernet service. Select one of
the following:
■ Enabled (default): packets will have VLAN tags.
■ Disabled: packets will NOT have VLAN tags. Use Disabled only if
the Ethernet service is interworking with another vendor’s equipment.
You can set EOS tagging to Disabled for no more than 4 services per
card.
7 Enter the source information:
■ From the Source Node list, select the node where this service
originates.
■ From the Source Port list, select the Ethernet port where this service
originates. See Sources and Destinations for Ethernet Services,
page 4-7 for a complete list of valid sources for this service.
8 From the Destination list, select the destination entity from the list of
available Ethernet destinations on the selected node. See Sources and
Destinations for Ethernet Services, page 4-7 for a complete list of valid
destinations for this service.
9 From the VLAN ID list, select a VLAN identification number. Range is
1–4093 in increments of 1. The VLAN ID should be the same at both
endpoints of the domain service. The same VLAN ID cannot be reused on
the same Ethernet card, but can be used on different Ethernet cards.
10 Click Finish to provision this service and return to the Service List screen.
11 The Create an Ethernet Point-to-Point Dedicated Service procedure is
complete.
Continue to the procedure to activate the service. See Activate a Service,
page 3-17.
Chapter 5
Creating Point-to-Point Shared Services
Introduction A point-to-point shared service (P2PS) maps Ethernet traffic from up to 24 Ethernet
interfaces on one Ethernet module into one transport path and transports the traffic
across the network to another Ethernet module. Use the P2PS service to offer “shared
Ethernet private line” services. Or, use this service to extend a LAN network across a
network using a shared transport path.
This chapter explains how to create a point-to-point shared service on a Traverse
system and includes the following topics:
■ Example of a Point-to-Point Shared Service, page 4-32.
■ Before You Create Point-to-Point Shared Services, page 4-33.
■ Guidelines to Create a Point-to-Point Shared Service, page 4-34.
■ Create an Ethernet Point-to-Point Shared Service, page 4-35.
Example of a A P2PS Ethernet service allows customers extend their LAN over a SONET network.
Point-to-Point However, with point-to-point shared service the service provider transports data over
Shared Service the SONET network using a shared transport path. Each Ethernet service are PCs
connected to an leased Ethernet port on the both ends of the shared transport path. The
bandwidth allocated to the shared path must be sufficient to carry the combined
guaranteed data rates assigned to the shared Ethernet services.
2 2
3 3
4 4
GCM GCM GCM GCM GCM GCM
ETH OC48 OC48 OC48 OC48 OC48 OC48 ETH OC48 OC48
Slot 1 Slot 15 Slot 16 Slot 13 Slot 14 Slot 15 Slot 16 Slot 1 Slot 15 Slot 16
Node 1 Node 2 Node 3
4. Service Type: Etherent P2PS 3. Service Type: Etherent P2PS
Source: Node 1/slot-1/port-21 Source: Node 3/slot-1/port-21
Dest: Node 1/Service STS Path 1 Dest: Node 3/Service STS Path 1
The bandwidth of the transport path can be a contiguous signal (STS-1, STS-3c,
STS-12c, or STS-48c) or a virtually concatenated signal (VC-Bundle).
Before You Review the information in this topic before you create a point-to-point Shared Ethernet
Create service.
Point-to-Point
Shared Table 4-15 Point-to-Point Shared Service Requirements
Services
Requirement Reference
Hardware
You need a combination of the modules to create Volume 3, Provisioning, Section 4, Chapter 1,”
Ethernet services. Modules Required to Create Ethernet Services,
page 4-6 for a list of required modules for specific
services.
Volume 1, General Information,
Section 2—Hardware Descriptions.
Software
Ethernet interfaces are configured correctly. Volume 3, Provisioning, Section 1, Chapter 4,”
Change Ethernet Port Parameters, page 1-39.
You are aware of the valid sources and Volume 3, Provisioning, Chapter 1—“Ethernet
destinations for this service. Services Overview,” Sources and Destinations for
Ethernet Services, page 4-7.
Requirement Reference
Guidelines to General guidelines for provisioning point-to-point shared (P2PS) Ethernet services are
Create a as follows:
Point-to-Point ■ The source of a P2PS service is always a Ethernet port.
Shared Service ■ The destination of a P2PS service may be one of:
– another Ethernet port.
– a SONET-STS service.
– a VC-Bundle service
■ P2PS services sharing a transport path must terminate on the same Ethernet
module.
■ P2PS services do not support interoperability with third-party EOS vendor
equipment.
■ The P2PS service supports asymmetrical guaranteed data rates. Guaranteed data
rates can be set to different rates at each endpoint node.
■ The bandwidth for the shared transport path must support the combined “higher”
guaranteed data rates assigned to asymmetrical services.
Step Procedure
Chapter 6
Creating Ethernet IAS Services
Introduction An Internet access service allows multiple subscribers access the hub site router for
Internet access. This service aggregates traffic in two locations: at the subscriber side
and at the hub site. On the subscriber side, the node statistically multiplexes Ethernet
traffic from multiple Ethernet ports on the same card onto a transport path. At the hub
site, the node statistically multiplexes traffic from multiple transport path onto one
single Ethernet interface. Use the IAS service to offer shared Ethernet access to Internet
services.
This chapter explains how to create an Ethernet Internet Access Service (IAS).
This chapter includes the following topics:
■ Example of an IAS Ethernet Service, page 4-37.
■ Before You Create an IAS, page 4-39.
■ Guidelines to Create an IAS, page 4-40.
■ Create an IAS, page 4-41.
sufficient to carry the guaranteed data rate for the IAS services. Finally, for each
Ethernet tributary, configure a subscriber-side and a provider-side service.
1
1. Service Type: SONET-STS 2
Source: Node 1/ slot-1/ETH100TX card/sts-1 Internet
Dest: Node 3/slot-8/GE2FE16T card/sts-1
Protection Type: UPSR Protected
Node 2
3 8
7
6
4
W E W E
OC-48 UPSR
5
GCM GCM GBE/
ETH ETH OC48 OC48 OC48 OC48 TX
Slot 1 Slot 2 Slot 15 Slot 16 Slot 1 Slot 2 Slot 8
Node 1 Node 4
5. Service Type: Ethernet IAS 6. Service Type: Ethernet IAS
Source: Node 1/ slot-2/port-22 ETH100TX Source: Node 4/slot-8/port-1 GBE
Dest: SONET-STS Service 2 Dest: SONET STS Service 2
Src. Part. Type: Subscriber, VLAN ID: 3 Src. Part. Type: Provider, VLAN ID: 3
To configure the Ethernet services in the above example, create the following services:
1. Create two end-to-end SONET-STS services with the Ethernet modules as the
source and destination. These services are the transport path.
2. On each tributary node (Node 1, Node 2, and Node 3), create subscriber-side IAS
Ethernet services. Each service has a negotiated service level agreement.
3. Finally, for each subscriber-side IAS service, create a provider-side IAS Ethernet
service at the hand-off node (Node 4).
Before You Review the information in this topic before you create an IAS services.
Create an IAS Table 4-17 IAS Service Requirements
Requirement Reference
Hardware
You need a combination of the modules to create Volume 3, Provisioning, Section 4, Chapter 1,”
Ethernet services. Modules Required to Create Ethernet Services,
page 4-6 for a list of required modules for specific
services.
Volume 1, General Information,
Section 2—Hardware Descriptions.
Software
Ethernet interfaces are configured correctly. Volume 3, Provisioning, Section 1, Chapter 4,”
Change Ethernet Port Parameters, page 1-39.
You are aware of the valid sources and Volume 3, Provisioning, Chapter 1—“Ethernet
destinations for this service. Services Overview,” Sources and Destinations for
Ethernet Services, page 4-7.
Create an IAS A multipoint-to-point Internet Access Service (IAS) connects a customer to an ISP
router for access to the Internet. Each customer appears to have a direct connection to
the Internet. IAS services are transported over the network using shared transport paths.
Use this procedure to create an Ethernet Internet Access Service.
Step Procedure
1 Review the information in Before You Create an IAS, page 4-39 before
you start this procedure.
2 Complete the procedure, Configure General Information, page 3-13 for
this service.
3 Set the characteristics of the service in the Define Ethernet Service
—Service Level Agreement screen.
Step Procedure
5 From the Class of Service list, select the class of service for this service.
This value is applied to the data received from the Source port and
submitted to the transport path.
■ Premium (default). Provides guaranteed bandwidth, no burstiness, no
cell loss, low delay, and low jitter for IAS services. Establishes the
Guaranteed Data Rate (Step 8) over the shared transport path for this
service.
■ Best Effort. Provides no guaranteed bandwidth. Best Effort services
that share the same transport path compete equally for all transport
bandwidth not currently reserved for activated Premium services.
Because the services compete for bandwidth, how much of the data
actually gets through is dependent on other traffic demands on the
transport path. Any Guaranteed Data Rate setting is ignored.
When Premium and Best Effort IAS services share a transport path, the
system reserves at least 10 Mbps of path bandwidth for the Best Effort
services. That is, 10 Mbps of the path bandwidth is not available to be
allocated to Premium services.
6 From the Packet Type field, specify if the Ethernet frames transmitted to
and received from Ethernet port have VLAN tags:
■ Tagged (default): Ethernet ports must have VLAN tags. The VLAN
ID entered for this IAS service must be the same as the VLAN ID on
the incoming tagged packet. You can assign multiple VLAN IDs.
■ Untagged: Ethernet ports must not have VLAN tags. You must assign
a valid VLAN ID for the service. See Step 12 for more information.
7 ISP Class of Service (default=Best Effort).
If Src. Part. Type is Provider (Step 11), set the ISP Class of Service for the
data going over the Ethernet port connected to the ISP router. See Step 5
for Class of Service definition.
8 From the Guar. Data Rate list select the amount of data (in Mbps) the
service can send without having any data dropped. Range is 0–1000 in
increments of 1. Default is 1. This value is applied to the data received at
the source port and submitted to the transport path.
See Guaranteed Data Rates and Ethernet Services, page 4-8 for more
information.
9 Enter the source information:
■ From the Source Node list, select the node where this service
originates.
■ From the Source Port list, select the port where this service
originates.See Sources and Destinations for Ethernet Services,
page 4-7 for a complete list of valid sources for this service.
Step Procedure
10 From the Destination list, select the destination entity from the list of
available Ethernet destinations on the selected node. See Sources and
Destinations for Ethernet Services, page 4-7 for a complete list of valid
destinations for this service.
11 From the Src. Part. Type list, select if the source port termination point is
connected to a:
■ Subscriber. Establishes the source module/port termination point as
the subscriber side of the IAS service.
■ Provider. Establishes the source port termination point as the provider
side of the IAS service. This is the IAS endpoint connected to the ISP
router. See Step 6 regarding ISP Class of Service.
12 In the VLAN ID field, select a VLAN identification number. The range is
1–4093 in increments of 1. The VLAN ID should be the same at both
endpoints of the domain service. The same VLAN ID cannot be reused on
the same Ethernet card, but can be used on different Ethernet cards.
■ If the value in Packet Type (Step 6) is Tagged, assign one or more
VLAN IDs for the IAS service. Packets arriving on an Ethernet port
must be tagged with one of the VLAN IDs assigned for the IAS
service. With a Packet Type set to Tagged the node is expecting
“tagged” packets and will check the incoming packet VLAN ID
against the VLAN IDs entered in this field.
You can use up to 243 VLAN IDs for one IAS instance with Packet
Type = Tagged. An IAS instance is the set of subscriber ports that
connect to one provider port. Select the 243 VLAN IDs from the same
screen (for one service) or for multiple services. Do not use the same
VLAN ID in subscriber services on different cards that are part of the
same IAS instance.
■ If the value in Packet Type (Step 6) is Untagged, assign a valid
VLAN ID for this service.
13 Click Finish to provision the service and return to the service list on the
Service tab.
14 The Create an IAS Service procedure is complete
Continue to the procedure to activate the service. See Activate a Service,
page 3-17.
Chapter 7
Creating Ethernet TLS Services
Introduction This chapter explains how to create Ethernet transparent LAN services (TLS) on the
Traverse system. Use a TLS service to allow multiple Ethernet devices in multiple
locations to appear as a single private LAN (virtual LAN or VLAN).
This chapter includes the following topics:
■ Example of a TLS Service, page 4-45.
■ Guidelines to Create TLS Services, page 4-47.
■ Before You Create TLS Services, page 4-47.
■ Create a Transparent LAN Service, page 4-49.
Example of a An Ethernet transparent LAN service (TLS) allows multiple Ethernet devices in
TLS Service multiple locations to appear as a single private LAN (virtual LAN/VLAN). An Ethernet
TLS is a collection of TLS services on the same Ethernet module that create a
multipoint-to-multipoint bridge or broadcast domain.
A VLAN ID identifies the Ethernet TLS broadcast domain. One Ethernet module can
support up to four TLS broadcast domains. All TLS services that use the same VLAN
ID are in the same Ethernet TLS instance. The TLS instance uses MAC learning to
discover MAC address to endpoint forwarding associations.
Received packets destined for a learned MAC address are forwarded to that endpoint.
Packets received at a termination point with a destination MAC address that is either a
broadcast or a multicast address, or a unicast address that has not been learned, are
flooded to all the other termination points in the TLS.
In the Traverse system, create an Ethernet TLS service using a series of termination
points. The termination point is either an Ethernet port (source termination) or a TDM
endpoint (destination termination). Ethernet ports are identified by slot number and
port number. TDM endpoints are identified by SONET-STS service IDs.
In the following diagram TLS services are transported over the network using STS
paths. At each node, for each VLAN ID, create a Ethernet TLS service and associate a
termination point.
1 2
5 8 11
4 7 10
3 6 9
8. VLAN ID 3
5. VLAN ID 3 TLS Service 13: slot-1/port-1 ETH100TX 11. VLAN ID 3
TLS Service 5: slot-1/port-1 ETH100TX TLS Service 14: Service STS Path 1 TLS Service 20: slot-1/port-1 ETH100TX
TLS Service 6: Service STS Path 1 TLS Service 15: Service STS Path 2 TLS Service 21: Service STS Path 2
Before You Review this information before you start to create TLS services.
Create TLS
Services Table 4-19 TLS Service Requirements
Requirement Reference
Hardware
You need a combination of the modules to create Volume 3, Provisioning, Section 4, Chapter 1,”
Ethernet services. Modules Required to Create Ethernet Services,
page 4-6 for a list of required modules for specific
services.
Volume 1, General Information,
Section 2—Hardware Descriptions.
Software
Requirement Reference
Ethernet interfaces are configured correctly. Volume 3, Provisioning, Section 1, Chapter 4,”
Change Ethernet Port Parameters, page 1-39.
You are aware of the valid sources and Volume 3, Provisioning, Chapter 1—“Ethernet
destinations for this service. Services Overview,” Sources and Destinations for
Ethernet Services, page 4-7.
Create a Use this procedure to help you create an Ethernet transparent LAN service (TLS).
Transparent
LAN Service Table 4-20 Create an Ethernet Transparent LAN Service (TLS)
Step Procedure
1 Review the information in Before You Create TLS Services, page 4-47
before you start this procedure.
2 Complete the procedure, Configure General Information, page 3-13 for
this service.
3 Set the characteristics of the service in the Define Ethernet
Service—Service Level Agreement screen.
Step Procedure
Step Procedure
Contents
Chapter 1
Creating 1+1 Path-Protected Services
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
Two Services Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1
STS Protection Group Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3
Before You Create a 1+1 Path-Protected Service . . . . . . . . . . . . . . . . . . . . . 5-4
Guidelines to Provision a 1+1 Path-Protected Service . . . . . . . . . . . . . . . . . . 5-5
Procedures Required to Create a 1+1 Path-Protected Service . . . . . . . . . . . 5-6
Create a Path-Protected Service Using Two Services . . . . . . . . . . . . . . . . . . 5-6
Create a Path-Protected Service Using a 1+1 Path Protection Group . . . . . . 5-8
Chapter 2
Creating Drop-and-Continue Services Procedures
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-11
Example of a Drop-and-Continue Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-11
Ethernet Services and Drop-and-Continue Applications . . . . . . . . . . . . . . . . . 5-13
Modules Required to Create Drop-and-Continue Service. . . . . . . . . . . . . . . . 5-13
Before You Create a Drop-and-Continue Service . . . . . . . . . . . . . . . . . . . . . . 5-13
Guidelines to Provision Drop-and-Continue Services . . . . . . . . . . . . . . . . . . . 5-14
Parameters Required to Provision Drop-and-Continue Services . . . . . . . . . . 5-14
Procedures Required to Provision a Drop-and-Continue Service . . . . . . . . . . 5-15
Provision an Add Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-16
Provision a Drop Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-18
Provision a Continue Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-20
Chapter 3
Creating Optical Transmux Services
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-23
Transforming Channelized DS3s to VT-Mapped STSs. . . . . . . . . . . . . . . . . . 5-24
Switching DS1s Inside a Channelized DS3. . . . . . . . . . . . . . . . . . . . . . . . . . . 5-25
Modules Required to Create an Optical Transmux Service . . . . . . . . . . . . . . 5-26
Before You Create an Optical Transmux Service . . . . . . . . . . . . . . . . . . . . . . 5-26
Guidelines to Provision and Optical Transmux Services. . . . . . . . . . . . . . . . . 5-27
Procedures Required to Provision an Optical Transmux Service . . . . . . . . . . 5-27
Assign and Configure Transmux Resources. . . . . . . . . . . . . . . . . . . . . . . . . . 5-28
Configure Optical Transmux Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-30
Chapter 4
Creating Services on Overlapping UPSRs
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-33
Services on Overlapping UPSRs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-33
Example of a Bidirectional Protected STS Path . . . . . . . . . . . . . . . . . . . . . . . 5-34
Example of Bidirectional Protected DS1 and VT Services . . . . . . . . . . . . . . . 5-35
Modules Required at Interconnecting Nodes. . . . . . . . . . . . . . . . . . . . . . . . . . 5-36
Before You Create Services on Overlapping Rings. . . . . . . . . . . . . . . . . . . . . 5-36
Guidelines to Provision Services on Overlapping Rings . . . . . . . . . . . . . . . . . 5-37
Procedures Required to Provision Services on Overlapping Rings. . . . . . . . . 5-37
Create an Add Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-38
Create a Pass Through Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-39
Create a Drop Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-40
Create a Continue Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-42
Chapter 5
Creating Transparent Services Procedures
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-45
Example of Transparent Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-46
Modules Required to Create a Transparent Service . . . . . . . . . . . . . . . . . . . . 5-47
Before You Create a Transparent Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-47
Guidelines to Provision Transparent Services. . . . . . . . . . . . . . . . . . . . . . . . . 5-48
Procedures Required to Create a Transparent Service. . . . . . . . . . . . . . . . . . 5-48
Disable Control Data Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-48
Provision the Transparent Service Procedure . . . . . . . . . . . . . . . . . . . . . . . . . 5-49
List of Figures
Figure 5-1 Creating 1+1 Path Protection with Two Services . . . . . . . . . . . . . 5-2
Figure 5-2 Creating 1+1 Path Protection with a Protection Group . . . . . . . . . 5-3
Figure 5-3 Drop-and-Continue Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
Figure 5-4 Transforming Channelized DS3 Signals to VT-Mapped STS . . . . 5-24
Figure 5-5 Switching DS1 Signals Inside a Channelized DS3 . . . . . . . . . . . . 5-25
Figure 5-6 Click a TMX Port, Click the Config Tab . . . . . . . . . . . . . . . . . . . . . 5-28
Figure 5-7 Switch to STS1TMX Port Type . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-28
Figure 5-8 Confirm Switch Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-29
Figure 5-9 Transmux Service SLA Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-30
Figure 5-10 Bidirectional Protected STS Paths in Overlapping PRI . . . . . . . . . 5-34
Figure 5-11 Bidirectional DS1 and VT Services in Overlapping Rings . . . . . . . 5-35
Figure 5-12 Transparent SONET Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-46
List of Tables
Table 5-1 1+1 Path-Protected Service Requirements. . . . . . . . . . . . . . . . . . 5-4
Table 5-2 Create a Path-Protected Service Using Two Services . . . . . . . . . 5-6
Table 5-3 Create a Path-Protected Service Using a 1+1 Path
Protection Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-8
Table 5-4 Modules Required for Drop-and-Continue Services . . . . . . . . . . . 5-13
Table 5-5 Drop-and-Continue Service Requirements . . . . . . . . . . . . . . . . . . 5-13
Table 5-6 Required Parameters for Drop-and-Continue Services . . . . . . . . 5-14
Table 5-7 Provision an Add Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-16
Table 5-8 Provision a Drop Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-18
Table 5-9 Provision a Continue Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-20
Table 5-10 Modules Required for an Optical Transmux Service. . . . . . . . . . . 5-26
Table 5-11 Optical Transmux Service Requirements . . . . . . . . . . . . . . . . . . . 5-26
Table 5-12 Assign and Configure Transmux Resources. . . . . . . . . . . . . . . . . 5-28
Table 5-13 Configure Optical Transmux Services. . . . . . . . . . . . . . . . . . . . . . 5-30
Table 5-14 Modules Required at the Interconnecting Nodes . . . . . . . . . . . . . 5-36
Table 5-15 Protected Ring Interconnection in Overlapping Rings . . . . . . . . . 5-36
Table 5-16 Create an Add Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-38
Table 5-17 Create a Pass Through Service . . . . . . . . . . . . . . . . . . . . . . . . . . 5-39
Table 5-18 Create a Drop Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-40
Table 5-19 Create a Continue Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-42
Table 5-20 Modules Required for Transparent Services. . . . . . . . . . . . . . . . . 5-47
Table 5-21 Transparent Service Requirements . . . . . . . . . . . . . . . . . . . . . . . 5-47
Table 5-22 Disable the Control Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-48
Table 5-23 Provision the Transparent Services . . . . . . . . . . . . . . . . . . . . . . . 5-49
Chapter 1
Creating 1+1 Path-Protected Services
Introduction 1+1 path-protected services protect the entire path of one service through a network.
This feature is designed to protect paths in a mesh network. You can also use 1+1 path
protection to protect traffic traveling over unprotected facilities.
This chapter explains how to create a 1+1 path-protected service through a Traverse
network:
■ Two Services Model, page 5-1.
■ STS Protection Group Model, page 5-3.
■ Before You Create a 1+1 Path-Protected Service, page 5-4.
■ Guidelines to Provision a 1+1 Path-Protected Service, page 5-5.
■ Procedures Required to Create a 1+1 Path-Protected Service, page 5-6.
■ Create a Path-Protected Service Using Two Services, page 5-6.
■ Create a Path-Protected Service Using a 1+1 Path Protection Group, page 5-8
Two Services This model uses two services to create a protected path across a network. First
Model provision an unprotected service. Subsequently add a protected service either
immediately or at a later date. Use this method to configure the following end-to-end
service types for 1+1 path protection:
■ DS3-CC.
■ SONET-STS.
In the following example, first provision an unprotected end-to-end service. Activate
the unprotected service, then provision the protecting service to create a protecting
path.
Notice that at the Node 1, the source for both services is identical. At the Node 4, the
destination for both services is identical. You can choose the paths at each intermediate
node using the Constraints screen of the service creation.
Unprotected Unprotected
OC-48 OC-48
The network interfaces at the Source and Drop nodes cannot be part of a 1+1 APS or
BLSR protection group. However, the interfaces can be part of a UPSR or unprotected.
Activate provisioned services in any order. However, the service you activate first
carries the active traffic.
STS Protection This model uses a 1+1 path protection group to create a protected path across the
Group Model network. First, provision the required services at each node across the network.
Subsequently, add a 1+1 path protection group either immediately, or at a later date.
Use 1+1 path protection groups to configure path protection for the following service
types:
■ DS1.
■ DS1-Mux.
■ DS3-TMX.
■ SONET-VT.
In the following example, first create and activate the sequence of unprotected services
(Steps 1, 2, 3, and 4). Then create the 1+1 path protection group at the Add and Drop
nodes (Steps 5 and 6). The pass through services at the intermediate nodes can be on
any available path.
1. Service Type: DS1-Mux 2. Service Type: SONET-STS (Pass Through) 4. Service Type: SONET-VT
Src: Node 1/slot-1/all ports Src: Node 2/slot 15/port-1/sts-4 Src: Node 1/slot 15/port-1/sts-4/vtg1-vt1
Dest: Node 4/slot-15/port-1/sts-4 Dest: Node 2/slot-16/port-1/sts-4 Dest: Node 4/slot-1/port-1/sts-1/vtg1-vt1
Protection Type: Unprotected Protection Type: Unprotected Protection Type: Unprotected
2
W P
5 6
W P
1 2 Node 3 2
Unprotected Unprotected
OC-48 3 3 OC-48
Node 2 3 Node 5
Before You Review the information in this topic before you create a 1+1 path-protected service.
Create a 1+1
Path-Protected Table 5-1 1+1 Path-Protected Service Requirements
Service
Requirement Reference
Hardware
The hardware depends on the services you are Volume 1, General Information,
creating. See the appropriate chapter in this Section 2—Hardware Descriptions.
volume to determine the correct hardware for Volume 3, Provisioning, Section 3—Creating
each service type. Services.
Software
Procedures Use the following procedures to help you provision 1+1 path-protected services on a
Required to Traverse system.
Create a 1+1 1. Create a Path-Protected Service Using Two Services, page 5-6.
Path-Protected 2. Create a Path-Protected Service Using a 1+1 Path Protection Group, page 5-8.
Service 3. Section 2, Chapter 5—“Create a 1+1 Path Protection Group,” page 2-21.
4. Activate a Service, page 3-17.
These procedures reference required parameters only. See Section 3—Creating
Services to reference all configurable parameters for each service type:
Create a Use this procedure to help you provision a path-protected service using two services.
Path-Protected
Service Using Table 5-2 Create a Path-Protected Service Using Two Services
Two Services
Step Procedure
1 At originating node, click the Service tab, and click Add to add this
service to the network.
2 In the Define Service—General Information screen, specify required
parameters for this service:
■ In the Name field, type: a name for the service.
Use alpha-numeric characters only. Do not use punctuation or special
characters in the Name field.
■ From the Service Type list, select one of the following services:
– DS3-CC.
– SONET-STS.
3 Click Next to display the Define Service—Service Level Agreement
screen.
4 Enter the source information:
■ From the Source Node list, select the node that originates the traffic.
■ From the Source Port list, select the port that originates the traffic.
■ From the Source Path list, select the select the correct path number if
this is a SONET service.
■ At the add node, the Source Path number must be same as 1+1
path-protected service.
At any intermediate nodes, the Source Path number can be different
through the network (Step 8).
Create a Use this procedure to help you provision a path-protected service using two services.
Path-Protected
Service Using Table 5-3 Create a Path-Protected Service Using a 1+1 Path Protection Group
a 1+1 Path
Protection Step Procedure
Group 1 At originating node, click the Service tab, and click Add to add this
service to the network.
2 In the Define Service—General Information screen, specify required
parameters for this service:
■ In the Name field, type: a name for the service.
Use alpha-numeric characters only. Do not use punctuation or special
characters in the Name field.
■ From the Service Type list, select one of the following services:
– DS1.
– DS1-Mux.
– DS3-TMX.
– SONET-VT.
3 Click Next to display the Define Service—Service Level Agreement
screen.
4 Enter the source information:
■ From the Source Node list, select the node that originates the traffic.
■ From the Source Port list, select the port or card that originates the
traffic.
■ From the Source Path list, select the correct path if this is a
SONET-VT service.
■ If this is a SONET-VT service, select the correct Source VT for the
service.
5 Enter the destination information:
■ From the Destination Node list, select the same node as you did in
Step 4 for the service.
■ From the Destination Port list, select a trunk port on the node. If the
destination port is part of a protection group, select the port that is
transmitting the working traffic.
■ From the Destination Path list, select the correct path number if this
is a SONET-VT service.
6 Click Next to display the Define Service—Transport screen.
7 From the Protection Type list, select Unprotected for the unprotected
service.
8 Click Finish to provision this service and return to the service list on the
Service tab.
9 Repeat Steps 1 to 8 at each node in the path for the service.
Table 5-3 Create a Path-Protected Service Using a 1+1 Path Protection Group
Step Procedure
10 At the Source and Drop nodes, create a 1+1 path protection group. See
Create a 1+1 Path Protection Group, page 2-24.
11 The Create a Path-Protected Service Using a 1+1 Path Protection Group
procedure is complete.
Continue to the procedure Activate a Service, page 3-17 to activate the
service. You can activate the services in any order, however, the service
you activate first carries the active traffic.
Chapter 2
Creating Drop-and-Continue Services
Procedures
Introduction This chapter explains how to create a drop-and-continue service in a Traverse network.
■ Example of a Drop-and-Continue Service, page 5-11.
■ Ethernet Services and Drop-and-Continue Applications, page 5-13.
■ Modules Required to Create Drop-and-Continue Service, page 5-13.
■ Before You Create a Drop-and-Continue Service, page 5-13.
■ Parameters Required to Provision Drop-and-Continue Services, page 5-14.
■ Procedures Required to Provision a Drop-and-Continue Service, page 5-15.
Example of a Drop-and-continue applications allow you to add traffic to a UPSR, drop traffic at one
Drop-and- location, and continue the signal to another destination around the ring.
Continue To provision a drop-and-continue service, you need to provision a combination of three
Service types of services at different nodes in the network.
1. Add Service: This service adds the traffic to the ring. You provision this service at
the node where the traffic enters the ring.
2. Drop Service: This service drops traffic from the ring. You provision this service
at any node for traffic traveling in either direction around the ring.
3. Continue Service: This service carries the traffic around the ring. After you have
dropped traffic at one node, you continue the path around the network. You
provision this service at any node for traffic traveling in either direction around the
ring.
Provision all required services on one node before you move to the next. That is,
configure the services hop-by-hop through the network. Provision and activate the drop
service before you provision the continue service.
In a UPSR configuration in a Traverse network, the East module always transmits the
working signal clockwise around the ring. The West module always receives the
working signal.
The following example an OC-48 UPSR is already connected and configured. The
West Ports are Slot 15 on all the nodes. The East Ports are Slot 16. Traffic enters the
ring at Node and is bridged in both directions around the ring.
This example shows ONLY the services you need to create at each node to drop and
continue traffic around the ring.
W E W E W E
OC-48 UPSR
y West Ports = Slot 15
y East Ports = Slot 16
6
Node 2 Node 3 Node 4
10 7
9 8 5
W E W E W E
9. Service Type: SONET-STS(Continue) 8. Service Type: SONET-STS (Continue) 5. Service Type: SONET-STS (Continue)
Src: Node 2 - slot 15 - port 1- sts4 Src: Node 3 - slot 15 - port 1 - sts4 Src: Node 2 - slot 16 - port 1- sts 4
Dest: Node 2 - slot 16 - port 1 - sts4 Dest: Node 3 - slot 16 - port 1 - sts4 Dest: Node 2 - slot 15 - port 1 - sts 4
Directionality = Unidirectional Directionality = Bidirectional Directionality = Unidirectional
Protection Type = Unprotected Video Client 3 Protection Type = Unprotected Protection Type = Unprotected
In this example, traffic added at Node 1 is bridged around the ring. On the Traverse
system, when you create the Add Service, you can use either the East or West port as
the destination, the system creates the second connection to the other port of the ring.
For any service that has Protection Type = UPSR, the system creates the second
connection from the signal traveling in the opposite direction around the ring.
Ethernet To create Ethernet services in a drop-and-continue application, use the same example
Services and (Figure 5-3 Drop-and-Continue Service, page 5-12). However, the Add service would
Drop-and- originate on an Ethernet module. The Drop service would terminate on an Ethernet
Continue module.
Applications
Modules This table lists the Traverse modules required to create a drop-and-continue services.
Required to
Create Table 5-4 Modules Required for Drop-and-Continue Services
Drop-and-
Service Type Source Card Destination Card
Continue
Service SONET-STS OC-N OC-N
Before You Review the information in this topic before you create a drop-and-continue service.
Create a Table 5-5 Drop-and-Continue Service Requirements
Drop-and-
Continue Requirement Reference
Service
Read the information in Section 1, Chapter 1—“Provisioning Overview,” page 1-1.
Hardware
Software
Parameters Use the information in the following table to help you provision drop and continue
Required to services on a UPSR.
Provision
Drop-and- Table 5-6 Required Parameters for Drop-and-Continue Services
Continue
Service Parameter Value
Services
ALL SERVICES
Source Service
Drop Service
Service Level Agreement Screen Source Port Trunk (East or West) port on ring
Continue Service
Service Level Agreement Screen Source Port Trunk (East or West) port on ring
Provision an This service adds the traffic to the ring. You provision this service at the node where the
Add Service traffic enters the ring. The source of this service is a tributary port. The destination is
either trunk port (East or West) of the ring. You create this add service as UPSR
protected and the system creates both the working and protection paths around the ring.
Step Procedure
1 In Map View, click the Service tab, then click Add to add a new service to
this network.
2 In the Define Service—General Information screen, specify required
parameters for this service:
■ In the Name field, type: a name for the service.
Use alpha-numeric characters only. Do not use punctuation or special
characters in the Name field.
■ From the Service Type list, select one of the following services:
– SONET-STS.
■ From the Resource Advisory list, select OFF.
3 Click Next to display the Define Service—Service Level Agreement
screen and set the service characteristics for this service (Steps 4 to 6).
4 From the Bandwidth list, select the bandwidth required to transport this
service.
5 Enter the source information:
If the source of this service is in an equipment protection group, select the
source on the working module.
■ From the Source Node list, select the node that adds traffic to the ring.
■ From the Source Port list, select the port that adds traffic to the ring.
■ From the Source Path list, select the path number where this service
originates.
■ From the Src. PM Template list, select a performance monitoring
template to monitor performance on the path.
6 Enter the destination information:
■ From the Destination Node list, select the same node as you selected
in Step 5 as the destination of the service.
■ From the Destination Port list, select a trunk port (East or West) of
the ring configuration.
■ From the Destination Path list, select an available starting path
number. The working and protect path numbers around the ring must
match. That is, if you add an STS-3c service onto path 4 at the first
node, you must use path 4 at each node to transport that service around
the ring.
7 Click Next to display the Define Service—Transport screen.
Step Procedure
Provision a This service drops traffic from the ring. You can provision this service at any node for
Drop Service traffic travelling in either direction around the ring. The source of this service is the
trunk port (East or West) that receives the added traffic from the ring. The destination is
the port which drops the added traffic from the ring.
Step Procedure
1 In Map View, click the Service tab, then click Add to add a new service to
this network.
2 In the Define Service—General Information screen, specify required
parameters for this service:
■ In the Name field, type: a name for the service.
Use alpha-numeric characters only. Do not use punctuation or special
characters in the Name field.
■ From the Service Type list, select one of the following services:
– SONET-STS.
■ From the Resource Advisory list, select Off.
3 Click Next to display the Define Service—Service Level Agreement
screen and set the service characteristics for this service (Steps 4 to 6).
4 From the Bandwidth list, select the bandwidth required to transport this
service.
5 Enter the source information:
■ From the Source Node list, select the next node in the ring (either
clockwise or counter-clockwise).
■ From the Source Port list, select the port that receives the Source
Service from the ring.
■ From the Source Path list, select the path number onto which you
added the traffic in the Provision an Add Service procedure.
6 Enter the destination information:
■ From the Destination Node list, select the same node as you selected
in Step 5 as the destination of the service.
■ From the Destination Port list, select the port that drops the traffic
from the ring.
■ From the Destination Path list, select an available path number. This
path number can be any available path on that port.
7 Click Next to display the Define SONET-STS Service—Transport
screen.Define Transport for a Drop Service
Step Procedure
8 Set the transport path and quality characteristics for this service:
■ From the Directionality list, select Uni-Directional to create
unidirectional paths from the trunk cards to the drop card.
■ From the Protection Type list, select UPSR Protected to bridge the
signals received from each direction around the ring to the drop card.
9 Click Next to display the Define Service—Constraints screen.
Verify the ingress and egress information is correct for this service.
10 Click Finish to provision this service and return to the service list on the
Service tab.
11 Complete the procedure Activate a Service, page 3-17 to activate the
service.
12 The Provision a Drop Service is complete.
Continue to the next procedure: Provision a Continue Service.
Provision a This service carries the traffic around the ring. After you have dropped traffic at one
Continue node, you continue the path around the network. You can provision this service at any
Service node for traffic travelling in either direction. The source of this service is the trunk port
(East or West) that receives the added traffic from the ring. The destination is the other
trunk card on the node.
Step Procedure
1 In Map View, click the Service tab, then click Add to add a new service to
this network.
2 In the Define Service—General Information screen, specify required
parameters for this service:
■ In the Name field, type: a name for the service.
Use alpha-numeric characters only. Do not use punctuation or special
characters in the Name field.
■ From the Service Type list, select one of the following services:
– SONET-STS.
■ From the Resource Advisory list, select Off.
3 Click Next to display the Define Service—Service Level Agreement
screen and set the service characteristics for this service (Steps 4 to 6).
4 From the Bandwidth list, select the bandwidth required to transport this
service.
5 Enter the source information:
■ From the Source Node list, select the next node in the ring (either
clockwise or counterclockwise).
■ From the Source Port list, select the port that receives the Add
Service from the ring.
■ From the Source Path list, select the path number onto which you
added the traffic in the Provision an Add Service procedure.
6 Enter the destination information:
■ From the Destination Node list, select the same node as you selected
in Step 5 as the destination of the service.
■ From the Destination Port list, select the other trunk port. For
example, if you selected the East Port in Step 5, select the West Port
for this destination.
■ From the Destination Path list, select the path number onto which
you added the traffic in the Provision an Add Service procedure.
7 Click Next to display the Define Service—Transport screen.
Step Procedure
Chapter 3
Creating Optical Transmux Services
Introduction The optical transmux feature transforms incoming channelized DS3 signals to
VT-mapped STS payloads on one node.
This chapter explains how to create an optical transmux service in a Traverse network.
■ Transforming Channelized DS3s to VT-Mapped STSs, page 5-24.
■ Switching DS1s Inside a Channelized DS3, page 5-25.
■ Modules Required to Create an Optical Transmux Service, page 5-26.
■ Before You Create an Optical Transmux Service, page 5-26.
■ Procedures Required to Provision an Optical Transmux Service, page 5-27.
■ Assign and Configure Transmux Resources, page 5-28.
■ Configure Optical Transmux Services, page 5-30.
Transforming In the following example, create a series of service types to transport traffic from the
Channelized M13 connected to Node 1 to the TransAccess 100 Mux connected to Node 5.
DS3s to 1. At Node 1, create a DS3-CC service and bridge it around the ring.
VT-Mapped 2. At Node 2, create a service that passes the traffic through the node.
STSs 3. and 4.
At Node 3, use the optical transmux feature to convert the channelized DS3 signal
to a VT-mapped STS and bridge it onto the second ring. Create a SONET-STS
service and indicate that the incoming signal is a channelized DS3.
5. At Node 4, create another pass through SONET-STS service.
6. At Node 5, create a SONET-STS service to connect the transformed STS traffic to
the TransAccess 100 Mux.
W E
2. Service Type: SONET-STS
Source: Node 2/slot-15/port-1/sts-1
Dest: Node 2/slot-16/port-1/sts-1
Directionality: Bi-directional
GCM GCM
Node 2
DS3 DS3 OC48 OC48
Slot 1 Slot 2 Slot 15 Slot 16
Node 1 OC-48 UPSR
3. Port Type: STSTMX
3.
GCM GCM
OC48 OC48 TMX TMX OC48 OC48
Slot 1 Slot 2 Slot 7 Slot 8 Slot 15 Slot 16
Node 3 OC-48 UPSR
Switching In the following example, create a series of services at different nodes to be able to
DS1s Inside a switch the DS1 traffic inside a channelized DS3 signal.
Channelized 1. At Node 1, create a DS3-CC service and bridge it around the ring.
DS3 2. At Node 2, create a service that passes the traffic through the node.
3. and 4.
At Node 3, use the optical transmux feature to convert the channelized DS3 signal
into a VT-mapped STS. Create a SONET-VT service and indicate that the
incoming and outgoing signals are transformed to a VT-mapped STS. Use the VT
Switch capabilities to switch traffic at the VT layer.
5. At Node 4, create another pass through SONET-STS service.
6. At Node 5, create a DS3-CC service to connect the traffic to the M13.
GCM GCM
OC48 OC48 TMX TMX VT VT OC48 OC48
Slot 1 Slot 2 Slot 5 Slot 6 Slot 7 Slot 8 Slot 15 Slot 16
Node 3 OC-48 UPSR
In the above example, if a TransAccess 100 Mux were connected to Node 5 instead of
the M13, you would only need to transform the source signal at Node 3 (Source DS1
Mapping parameter). At Node 5, you would create a SONET-STS service to the EC1
port connected to the TransAccess 100 Mux.
Modules This table lists the Traverse modules required to create an optical transmux service.
Required to
Create an Table 5-10 Modules Required for an Optical Transmux Service
Optical
Service Type Source Card Destination Card
Transmux
Service SONET-STS DS3-CC or DS3-TMX (EC1) DS3-CC or DS3-TMX (EC1)
OC-N OC-N
Other modules
Before You Review the information in this topic before you create an optical transmux service.
Create an
Optical Table 5-11 Optical Transmux Service Requirements
Transmux
Requirement Reference
Service
Read the information in Section 1, Chapter 1—“Provisioning Overview,” page 1-1.
Hardware
Software
Protection groups are configured for the Volume 3, Provisioning, Section 2—Creating
following modules: Protection Groups.
■ Trunk facilities.
■ Tributary facilities.
■ DS3TMX module.
■ VT/VC Switch module.
Requirement Reference
Procedures To provision an optical transmux service, you must provision a combination of services
Required to at different points in your network. Use the following procedures to help you provision
Provision an an optical transmux feature on a Traverse system.
Optical 1. Section 3, Chapter 2,” Add a Service, page 3-12.
Transmux 2. Section 3, Chapter 2,” Configure General Information, page 3-13.
Service 3. Section 3, Chapter 2,” Activate a Service, page 3-17.
These procedures reference required parameters only. Use the following procedures to
reference all configurable parameters for each service type:
■ Section 3, Chapter 5,” Create a SONET-STS Service, page 3-58.
■ Section 3, Chapter 5,” Create a SONET-VT1.5 Service, page 3-66.
Assign and Use this procedure to assign and configure transmux resources on the DS3TMX card.
Configure
Transmux Table 5-12 Assign and Configure Transmux Resources
Resources
Step Procedure
Step Procedure
Steps 6
and 7
Steps 8
and 9
Step Procedure
Chapter 4
Creating Services on Overlapping UPSRs
Introduction This chapter explains how to create path-protected bidirectional services in a 2-node
overlapping ring configuration.
■ Services on Overlapping UPSRs, page 5-33.
■ Example of a Bidirectional Protected STS Path, page 5-34.
■ Example of Bidirectional Protected DS1 and VT Services, page 5-35.
■ Modules Required at Interconnecting Nodes, page 5-36.
■ Before You Create Services on Overlapping Rings, page 5-36.
■ Guidelines to Provision Services on Overlapping Rings, page 5-37.
■ Procedures Required to Provision Services on Overlapping Rings, page 5-37.
Services on Overlapping ring configurations use the same two or more nodes in separate ring
Overlapping topologies.
UPSRs To provision services in an overlapping ring configuration, create a combination of the
following services at different nodes in the network.
■ Add Service: This service can be any one of the supported service types. Create
this type of service at each node that adds traffic to both of the overlapping rings.
■ Pass Through Service: This service is a SONET-STS service that passes the
traffic though the node. Create this type of service at all intermediate nodes in the
overlapping ring configuration that do not add or drop traffic.
■ Drop Service: This service drops traffic from one ring to the other. Create this
service at each interconnecting node (a node that is a member of both ring
configurations).
■ Continue Service: This service carries the traffic to the next interconnecting node.
After you have dropped traffic at the first interconnecting node, continue the signal
around to the next interconnecting node to create an alternative path for the traffic.
Create this service at each interconnecting node.
Example of a To create a protected bidirectional STS path across two overlapping rings, you have to
Bidirectional create a series of SONET-STS services at each node. In the following example, traffic
Protected STS enters each ring at Node A and Node D and is bridged in both directions around each
Path ring.
In a UPSR configuration in a Traverse network, the East module always transmits the
working signal clockwise around the ring. The West module always receives the
working signal.
In this example, the traffic from Node A (working) travels to the interconnecting node
(INCT Node 1) in the clockwise direction. The traffic added at Node D also travels in
the clockwise direction to INCT Node 2.
8
7
10
Working Protect
At Node B (3) and Node C (4) W E W E
1 4
Service Type: SONET-STS (Pass Through)
E W
Directionality: Bidirectional
Protection Type: Unprotected W E
Example of In the following example, DS1 traffic enters each ring at Node A and Node D and is
Bidirectional bridged in both directions around each ring. The traffic from Node A (working) travels
Protected DS1 to INCT Node 1 in the clockwise direction. The traffic added at Node D travels in the
and VT clockwise direction to INCT Node 2.
Services
8
7 10
Modules This table lists the Traverse modules required at the interconnecting nodes. Other nodes
Required at require modules depending on tributary services.
Interconnecting
Nodes Table 5-14 Modules Required at the Interconnecting Nodes
Other modules
Before You Review the information in this topic before you create services on overlapping rings.
Create Table 5-15 Protected Ring Interconnection in Overlapping Rings
Services on
Overlapping Requirement Reference
Rings
Read the information in Section 1, Chapter 1—“Provisioning Overview,” page 1-1.
Hardware
Software
All source and destination interfaces are Volume 3, Provisioning, Section 1, Chapter
configured correctly. 4—“Port Configuration,” page 1-23.
These procedures describe how to create See Volume 3, Provisioning, Section 3—Creating
bidirectional paths over overlapping rings. These Services for detailed procedures on all service types.
procedures address relevant parameters only. See Volume 5, TransNav Management System,
Section 5—Services for descriptions of other fields
on screen.
Requirement Reference
Procedures To provision services across overlapping rings, you must create a combination of
Required to service types at different nodes in the network. Use the following procedures to help
Provision you provision services in an overlapping ring configuration:
Services on 1. Create an Add Service, page 5-38. This service can be any one of the supported
Overlapping service types. See Section 3—Creating Services for detailed procedures on
Rings creating a Traverse service. Create this type of service at each node that adds
services to both of the overlapping rings.
2. Create a Pass Through Service, page 5-39. This service is a SONET-STS service
that passes the traffic though the node. Create this type of service at all
intermediate nodes in the overlapping ring configuration that do not add or drop
traffic.
3. Create a Drop Service, page 5-40. This service drops traffic from one ring to the
other. Create this service for each forward working and forward protecting signal at
each interconnecting node (a node that is a member of both ring configurations).
4. Create a Continue Service, page 5-42. This service carries the traffic to the next
interconnecting node. After you have dropped traffic at the first interconnecting
node, continue the signal around to the next interconnecting node to create an
alternative path for the traffic. Create this service for each forward working and
forward protecting signal at each interconnecting node.
5. Activate a Service, page 3-17. Create and activate services at one node before you
move on to the next.
Create an Add Perform this procedure at each node that adds traffic to each ring.
Service
Table 5-16 Create an Add Service
Step Procedure
Create a Pass Perform this procedure at each intermediate node in the overlapping ring configuration.
Through
Service Table 5-17 Create a Pass Through Service
Step Procedure
Create a Drop Perform this procedure for each forward working and forward protecting signal at each
Service interconnecting node.
Step Procedure
Step Procedure
7 For this SONET-STS service, enter the destination information for this
service:
■ From the Destination Node list, select the same node as you selected
in Step 6.
■ From the Destination Port list, select a trunk port on the second ring.
Remember that you must create two separate services to drop the
signal from one ring to the other: From the same source to both the
East and West ports on the second ring.
■ From the Destination Path list, select the path number onto which
you added the traffic in the Create an Add Service procedure.
8 If this is a SONET-VT service, drop the forward working and the forward
protecting signals from one ring to the other.
■ From the Source Node list, select an interconnecting node.
■ From the Source Port list, select the port that receives the Add
Service from the ring. For the forward working signal, select the West
port. For the forward protecting signal, select the East port.
■ From the Source Path list, select the same path number onto which
you added the traffic in the Create an Add Service procedure.
■ From the Source VT list, select the correct VT.
9 For this SONET-VT service, enter the destination information.
■ From the Destination Node list, select the same node as you selected
in Step 8.
■ From the Destination Port list, select the correct West or East port for
the each ring. See Figure 5-11, page 35.
■ From the Destination Path list, select the path number onto which
you added the traffic in the Create an Add Service procedure.
■ From the Source VT list, select the correct VT.
10 Click Next to continue to the Transport screen and set the characteristics
for the transport of this service (Steps 11 to Steps 12).
11 In the Directionality parameter, select Unidirectional to create a
unidirectional path for this service. You create four unidirectional paths for
both the Forward Working and Forward Protect signals from both rings.
12 Set the protection attributes for this service.
■ If this is a SONET-STS service, select Unprotected from the
Protection Type list.
■ If this is a SONET-VT service, select UPSR Ingress from the
Protection type list.
13 Click Finish to return to the service list on the Service tab.
14 Complete the procedure: Activate a Service, page 3-17 for this service.
Step Procedure
15 Repeat Steps 2 to 14 for each Drop service required for this configuration.
16 The Create a Drop Service procedure is complete.
Continue to the procedure: Create a Continue Service, page 5-42.
Create a Perform this procedure for each forward working and forward protecting signal at each
Continue interconnecting node.
Service
Table 5-19 Create a Continue Service
Step Procedure
Step Procedure
7 For a VT-mapped SONET-STS signal, enter the source information for this
service (Figure 5-11, page 35):
■ From the Source Node list, select an interconnecting node.
■ From the Source Port list, select the port that receives the Add
Service from the ring. In the forward working direction, this port is the
West port. In the forward protecting direction, this port is the East
port.
■ From the Source Path list, select the same path number onto which
you added the traffic in the Create an Add Service procedure.
8 For this VT-mapped SONET-STS signal, enter the destination information
for this service:
■ From the Destination Node list, select the same node as you selected
in Step 7.
■ From the Destination Port list, select the other trunk port on the same
ring to continue the signal to the next interconnecting node.
■ From the Destination Path list, select the path number onto which
you added the traffic in the Create an Add Service procedure.
9 Click Next to continue to the Transport screen and set the characteristics
for the transport of this service (Steps 11 to Steps 12).
10 In the Directionality parameter, select Unidirectional to create a
unidirectional path for this service. You create four unidirectional paths for
both the Forward Working and Forward Protect signals from both rings.
11 Set the protection attributes for this service.
■ If this is a SONET-STS service, select 1+1 Path Protection from the
Protection Type list.
■ If this is a VT-mapped STS service, select Unprotected from the
Protection type list.
12 Click Finish to return to the service list on the Service tab.
13 Complete the procedure: Activate a Service, page 3-17 for this service.
14 Repeat Steps 2 to 13 for each Continue service required for this
configuration.
15 The Create a Continue Service procedure is complete.
Chapter 5
Creating Transparent Services Procedures
Introduction This chapter explains how to create a transparent service in a Traverse network.
■ Example of Transparent Services, page 5-46.
■ Modules Required to Create a Transparent Service, page 5-47.
■ Before You Create a Transparent Service, page 5-47.
■ Guidelines to Provision Transparent Services, page 5-48.
■ Procedures Required to Create a Transparent Service, page 5-48.
■ Disable Control Data Procedure, page 5-48.
■ Provision the Transparent Service Procedure, page 5-49.
Example of A transparent service transports incoming SONET payload and the transport overhead
Transparent through the Traverse system. In the transparent multiplexing application, the tributary
Services connections and fiber span between the Traverse nodes are unprotected. The
subtending third party vendor equipment provides all protection switching and
bandwidth management.
Create a service from each port connected to the third party equipment.
Control Data = Disabled Control Data = Disabled
1. 3. 5.
2. 4. 6.
OC48 OC48 OC192 OC192 OC192 OC192 OC192 OC192 OC192 OC192 OC48 OC48
Slot 1 Slot 2 Slot 11 Slot 13 Slot 1 Slot 3 Slot 11 Slot 13 Slot 1 Slot 3 Slot 13 Slot 14
Node 1 Node 2
1. Service Type = SONET-STS 3. Service Type = SONET-STS 4. Service Type = SONET-STS
Src: Node 1/slot-2/port-1/sts-1 Src: Node 1/slot-3/port-1/sts-1 Src: Node 2/slot-3/port-1/sts-1
Dest: Node 1/slot-11/port-1/sts-1 Dest: Node 1/slot-11/port-1/sts-1 Dest: Node 2/slot-13/port-1/sts-1
Bandwidth = 48c Bandwidth = 48c Bandwidth = 48c
Transparency = ON Transparency = ON Transparency = ON
3rd party vendor equipment 3rd party vendor equipment
OC-48 (working) OC-48 (working)
In the above example, create a series of SONET-STS services, two at each node. The
Control Data parameter is disabled at any SONET port connected to third party
equipment. The transparency flag is turned ON for each SONET-STS service. The
remaining bandwidth on the OC-192 can be used for additional tributary services such
as DS3-CC, DS3-TMX, other SONET-STS, or Ethernet.
Modules This table lists the Traverse modules required to create a transparent services.
Required to
Create a Table 5-20 Modules Required for Transparent Services
Transparent
Service Type Source Card Destination Card
Service
SONET-STS OC-12 OC-48
OC-48 OC-192
Before You Review the information in this topic before you create a transparent service.
Create a
Transparent Table 5-21 Transparent Service Requirements
Service
Requirement Reference
Hardware
Software
Procedures Use the following procedures to help you provision transparent services on a Traverse
Required to system.
Create a 1. Disable Control Data Procedure, page 5-48.
Transparent 2. Configure General Information, page 3-13.
Service 3. Provision the Transparent Service Procedure, page 5-49.
4. Activate a Service, page 3-17.
These procedures reference required parameters only. Use the following procedures to
reference all configurable parameters for each service type:
■ Section 3, Chapter 5,” Create a SONET-STS Service.
Disable Use the following procedure to disable the Control Data parameter on the SONET
Control Data interface.
Procedure
Table 5-22 Disable the Control Data
Step Procedure
Contents
Appendix A
Provisioning Checklists
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Before You Start Provisioning Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-2
Node and Timing Configuration Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3
Module Configuration Checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-4
Protection Group Configuration Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5
Port Configuration Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6
Service Creation Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-7
Appendix B
Services Sources and Destination
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-9
DS1 Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-10
DS3 Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-11
Ethernet Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-12
SONET Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-13
List of Tables
Table 6-1 Before Provisioning Your Network Requirements. . . . . . . . . . . . . 6-2
Table 6-2 Node and Timing Configuration Checklist. . . . . . . . . . . . . . . . . . . 6-3
Table 6-3 Module Configuration Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . 6-4
Table 6-4 Protection Group Configuration Checklist . . . . . . . . . . . . . . . . . . . 6-5
Table 6-5 Port Configuration Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6
Table 6-6 Service Creation Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-7
Table 6-7 Sources, and Destinations for DS1 Services . . . . . . . . . . . . . . . . 6-10
Table 6-8 Sources, and Destinations for DS3 Services . . . . . . . . . . . . . . . . 6-11
Table 6-9 Sources, and Destinations for Ethernet Services . . . . . . . . . . . . . 6-12
Table 6-10 Sources, and Destinations for SONET Services. . . . . . . . . . . . . . 6-13
Appendix A
Provisioning Checklists
Introduction Use the checklists in this appendix to bring a Traverse network into service and to
create services for transport over the network using the TransNav management system
graphical user interface (GUI).
■ Node and Timing Configuration Checklist, page 6-3.
■ Module Configuration Checklist, page 6-4.
■ Protection Group Configuration Checklist, page 6-5.
■ Port Configuration Checklist, page 6-6.
■ Service Creation Checklist, page 6-7.
Successfully completing each checklist assumes that the tasks in the previous checklist
are complete.
Each step references the related detail-level procedure for additional information. All
provisioning detail-level procedure references are to Volume 3, Provisioning.
Before You Before you start provisioning your network, the following tasks need to be complete.
Start
Provisioning Table 6-1 Before Provisioning Your Network Requirements
Procedures
Requirement Reference
Hardware
You have the correct hardware according to your Volume 1, General Information
network plan. Section 2—Hardware Descriptions.
Software
TransNav server software is installed. The server Volume 5, TransNav Management System
is initialized and started. Section 1—Overview, Installation and
Administration.
You are logged into the graphical user interface. Volume 5, TransNav Management System
Section 2—GUI Overview, Start Up, and
Administration, Chapter 1—“Starting the Graphical
User Interface,” page 2-1.
Node and Use this checklist as a guide to more detailed procedures. Each step references the
Timing relevant detailed procedure.
Configuration
Checklist Table 6-2 Node and Timing Configuration Checklist
Module Use this checklist as a guide to more detailed procedures. Each step references the
Configuration relevant detailed procedure.
Checklist
Table 6-3 Module Configuration Checklist
Protection Use this checklist as a guide to more detailed procedures. Each step references the
Group relevant detailed procedure. Complete each item as required for your network
Configuration configuration.
Checklist
Table 6-4 Protection Group Configuration Checklist
Port Use this checklist as a guide to more detailed procedures. Each step references the
Configuration relevant detailed procedure. Complete the steps as required based on the modules
Checklist installed in and TransAccess 100 Mux connected to the node.
Appendix B
Services Sources and Destination
Introduction This appendix summarizes the valid source and destination information for each
supported service type on the Traverse:
■ DS1 Services, page 6-10.
■ DS3 Services, page 6-10.
■ Ethernet Services, page 6-11.
■ SONET Services, page 6-12.
DS1 Services The following table lists service types and valid source and destination port types and
mapping information for creating DS1 services. For each service type, any one source
can connect to any one destination. Your network may require creating multiple
services at multiple nodes.
Sources Destinations
Service Type
Port Type or
Port Type Mapping Mapping
Service Type
DS3 Services The following table lists service types and valid source and destination port types and
mapping information for creating DS3 services. For each service type, any one source
can connect to any one destination. Your network may require creating multiple
services at multiple nodes.
Sources Destinations
Service
Type Port Type or
Port Type Mapping Mapping
Service Type
Ethernet The following table lists service types and valid source and destination port types and
Services mapping information for creating Ethernet services on a node. For each service type,
any one source can connect to any one destination.
SONET The following table lists service types and valid source and destination port types and
Services mapping information for creating SONET services. For each service type, any one
source can connect to any one destination. Your network may require creating multiple
services at multiple nodes.
Table 6-10 Sources, and Destinations for SONET Services
Sources Destinations
Service Type
Port Type or
Port Type Mapping Mapping
Service Type
1
Supports multicast connections for drop-and-continue applications. Also supports Ethernet over SONET
(EOS) transport.
2
There must be a VT Switch module in the same node to create SONET-VT1.5 services.
Numerics CBIT
DS3 line format, 1-29, 5-29
1+1 path-protected
DS3T-MX line format, 1-32
create service, 5-4
Change
required procedures, 5-6
BER thesholds, 1-21
service requirements, 5-4
DCC tunnel, 1-59
DS1 mapping, 1-19
A
DS1 port parameters, 1-24
Access methods, 1-2 DS3 port parameters, 1-27
Active card, 1-52 DS3-TMX port parameters, 1-30
Add EC1 port parameters, 1-34
TransAccess 100 mux, 1-49 Ethernet port parameters, 1-38
AIS (Alarm Indication Signal) format module parameters, 1-18
DS3 port, 1-29, 5-29 port parameters, 1-34
AIS format port parameters SONET, 1-42
DS3-TMX port, 1-32 Channel, 1-55
AIS insertion Channel name, 1-55
DS1 port, 1-26 Checklist
AIS mask module configuration, 6-4
DS1 port, 1-26 node and timing configuration, 6-3
DS3 port, 1-29, 5-29 port configuration, 6-6
DS3-TMX port, 1-32 protection group configuration, 6-5
EC1 port, 1-37 provisioning, 6-1
SONET port, 1-44 service creation, 6-7
Alarm profile, 1-4, 1-52 ClearExtA, 1-52
DS1 port, 1-26 ClearExtB, 1-52
DS3 port, 1-29 Config tab
DS3-TMX port, 1-32 node, 1-4
EC1 port, 1-37 Configuration process, 1-1
Ethernet port, 1-41 Configure, 1-54
SONET port, 1-46 a TransAccess 100 mux, 1-51
Automatic switching, 1-52 derived references, 1-15
Auto-negotiation, Ethernet port, 1-40 external timing, 1-10
line timing, 1-14
B network timing guidelines, 1-8
BER node parameters, 1-3
threshold, 1-52 timing options global, 1-8
BLSR TransAccess 100 mux DS1 channels, 1-54
requirements, 2-15 Connection Admission Control (CAC), Ethernet, 4-8
BP DCN Connections timing inputs and outputs, 1-8
gateway, 1-5 Continue service provision, 5-20
IP, 1-5 Control data
mask, 1-5 disable procedure, 5-48
SONET port, 1-45
C Create
BLSR, 2-16
CAC, Ethernet, 4-8 service, 3-66
Card configuration screen, 1-18 service 1+1 path-protected, 5-4
OC-192, 1-21 service SONET-VT1.5, 3-66
N Procedures (continued)
change SONET port parameters, 1-43
Name, 1-49
configure a TransAccess 100 mux, 1-51
NAS (North America Standard)
configure derived references, 1-15
AIS (Alarm Indication Standard) format, 1-29, 1-32,
configure external timing, 1-10
5-29
configure general information, 3-13
Network
configure global timing options, 1-8
configuration process, 1-1
configure line timing, 1-14
Network Time Protocol IP, see NTP IP
configure node parameters, 1-3
Node
configure TransAccess 100 mux DS1 channels, 1-54
and timing configuration checklist, 6-3
control data disable, 5-48
config tab, 1-4
create a DS1 service, 3-23
configuration dialog box, 1-4
create a DS1-Mux service, 3-28
ID, 1-5
create a DS3 service, 3-39
IP, 1-5
create a DS3-TMX service, 3-46
NTP IP, 1-5
create a SONET-STS service, 3-58
create a SONET-VT1.5 service, 3-66
O
create a UPSR, 2-30
OC-192 card configuration, 1-21 create an Ethernet P2PD, 4-28
ONES AIS (Alarm Indication Signal) format, 1-29, 1-32, create an Ethernet P2PS, 4-35
5-29 create an Ethernet TLS, 4-49
create BLSR, 2-16
P create transparent service, 5-48
Parameters create transparent services, 5-45
required for drop and continue service, 5-14 create VC-bundle service, 4-21
Performance monitoring template, 1-52 DCC tunnel configuration, 1-61
DS1 port, 1-26 multiple services, 3-18
DS3 port, 1-29 provision a continue service, 5-20
DS3-TMX port, 1-32 provision a drop service, 5-18
EC1 port, 1-37 provision a source service, 5-16
Ethernet port, 1-41 provision transparent service, 5-49
SONET port, 1-46 required for drop and continue service, 5-15, 5-27,
Port configuration 5-37
checklist, 6-6 required to create 1+1 path-protected service, 5-6
screen SONET, 1-43 set constraints, 3-15
Port requirements timing configuration, 1-6
DS3-TMX, 1-30 Protection
EC1, 1-34 mode, 1-52
SONET, 1-42 rings dialog box, 2-16
Primary reference, 1-8 Protection group configuration
Procedures checklist, 6-5
activate a service, 3-17 Protection rings dialog box, 2-19, 2-32
add a service, 3-12 Provision
add TransAccess 100 mux, 1-49 a continue service, 5-20
before you start provisioning, 1-2 drop and continue service guidelines, 5-14, 5-27, 5-
change BER thesholds, 1-21 37
change DS1 mapping formats, 1-19 drop service, 5-18
change DS1 port parameters, 1-25 new T100 dialog box, 1-49
change DS3 port parameters, 1-28 source service, 5-16
change DS3-TMX port parameters, 1-31 ProvisionExtA, 1-52
change EC1 port parameters, 1-35 ProvisionExtAandB, 1-52
change Ethernet port parameter, 1-39 ProvisionExtB, 1-52
change module parameters, 1-18