Element Manager Manual PDF
Element Manager Manual PDF
Element Manager Manual PDF
Nimbra One
Nimbra 300 series
Nimbra 600 series
NimOS GX4.12
Copyright 1999-2013 by Net Insight AB, Sweden. All rights reserved. This document may
not be reproduced in whole or in part without the expressed written permission of Net
Insight AB.
The specifications and information in this document are provided “as is” and are subject to
change without notice. All statements, information, and recommendations in this document
are provided without warranty of any kind, expressed or implied, including without
limitation any warranty concerning the accuracy, adequacy, or completeness of such
specifications and information or the result to be obtained from using such specifications or
information. Net Insight AB shall not be responsible for any claims attributable to errors,
omissions, or other inaccuracies in the specifications or information in this document, and
in no event shall Net Insight AB be liable for direct, indirect, special, consequential or
incidental damages arising out of the use or inability to use this document.
GPL source code is available for applicable parts for this product. If you would like a copy
of the GPL source for the costs of preparing, please send a mail to gpl@netinsight.net. A
listing of external software distributed with the product, including copyright notices is
included as appendix to this document.
Net Insight and Nimbra are trademarks of Net Insight AB, Sweden. All other trademarks
are the property of their respective owners.
Net Insight AB
Box 42093
SE-126 14 Stockholm
Sweden
April, 2013
Stockholm, Sweden
(NID 4380/A1)
Stockholm, Sweden
Contents
1 ABOUT THIS MANUAL ............................................................................. 13
6 MAINTENANCE ......................................................................................... 38
7.5 Sensors............................................................................................................................ 74
Element Manager User's Manual About This Manual • 4
15.8 Configuration of ASI video stream – an ITS configuration example ................... 304
15.8.1 Configuration of the Terminating TTP......................................................................... 304
15.8.2 Configuration of originating TTP for a unicast connection .......................................... 307
15.8.3 Configuration of the originating TTP for a multicast service ....................................... 310
15.8.4 Configuration of interfaces .......................................................................................... 312
1.5.2 Instructions
The instructions given in this manual are numbered in the sequence in which they should be
performed, as follows
Initial measure
Next measure
…
Note: Before these procedures are performed, be sure that the unit is properly installed
according to the relevant Installation and Maintenance Manual. In particular, the
node should be mounted, grounded and powered.
In this quick start procedure, only change parameters specifically mentioned.
This chapter details the configuration needed to get a Nimbra switch operational in a
network. The short configuration procedure is:
Set the IP address
ddress from the serial interface
Set the of DTM address from the web interface
Save/back-up
up the configuration
Reboot the node
Another way of finding out if the default configuration is installed on the node is to connect
the Ethernet (management) interface directly with a PC that is configured to be on this
subnet. Writing the IP address in the URL field displays the web interface of the node
immediately, if it does have the default IP address.
Set the DTM address of the unit. Make sure that Primary address is set to ‘Yes’. Click
OK.
The DTM Addresses page below appears. The DTM loopback address
(00.00.00.00.00.00.00.01) is always shown in the list as well.
Figure 3. Configuration page of DTM addresses. Click on ‘Add address’ to add/set the
DTM address.
To set a DTM address, write the DTM address in the appropriate field and click on the OK
button.
Note: A change in the primary DTM address does not take effect until
after the node has been restarted. Remember to save the
configuration before reboot
rebooting.
Enter a suitable name without spaces and a description of the configuration (optional).
Make sure that the ‘Valid’ box is checked. Click on the ‘OK’ button.
After the node is restarted, contact with the node ceases momentarily. The contact should
be established again when the node is running again, typically in less than a minute.
When an attempt to restart the node is made, a pop-up window opens and requests
confirmation of the command. The web page is simultaneously grayed out.
In case the configuration has been changed since last restart, the system asks if the
configuration should be saved before rebooting.
On the settings tab, the basic configuration of the node is made.
Figure 11. Configuration of the syslog settings, from the Maintenance – System – Syslog
web page.
Nimbra 380
Ports 1:1 to 1:x
1 Blind Panel 1
155/622/2488 Mbps (SDH)
1 -10/100/1000 Mbps (ETH) - 2
Serial
2 Blind Panel 2
Reset ETH PPS Sync PPS Sync
TSI 1 TSI 2 Tx Rx Tx Rx
Status Status Status Status
+ A - + B -
-- 48
48 VDC
VDC Ethernet Alarm I/0 Status L/A 1 Sp L/A 2 Sp L/A 3 Sp L/A 4 Sp L/A 5 Sp L/A 6 Sp L/A 7 Sp L/A 8 Sp Tx On Tx On Tx On Tx On 3 - 155/622 Mbps (SDH) - 4
Nimbra 320 has a different numbering scheme altogether, as it only has one slot available
for a module. Ports in the module in this slot are numbered between 1:1 and 1:x (i.e.
number of ports on this module), the fixed trunk interfaces are numbered 2:1 to 2:2 and the
Ethernet ports 3:1 to 3:8.
Power input A Power input B Port 3:1 to 3:8 Port 2:1 and 2:2
In Nimbra 680, the slot positions for the interface modules are labeled 1 to 8, the reserved
positions for switch modules SW A and SW B and the reserved positions for node
controllers NC A and NC B. On the front of the node, there is graphical presentation of the
slot numbers.
For Nimbra 688, the principles are the same as for Nimbra 680, but the interfaces slots are
numbered IF 1 to IF 16. The port numbers are added after the slot position and a colon; e.g.
1:4, 3:6, 11:2, 15:7 and 16:1 denotes slot 1, port 4; slot 3, port 6 and so on.
4.1.2 Module
In this text, an item which fits into a slot in a node and is connected to the node via
connectors in the backplane is called module. In other contexts it may be called board,
plug-in unit, PIU or card. The physical interfaces on the module is labeled after the slot
occupied by the module in the node and the interface number on the module. An example is
aes/ebu-3:6, for physical interface number six (from the left) on the module occupying slot
number three. A module can always be pulled out from the node.
4.1.3 Device
In the web interface, device is used many times for module described above. Device,
however, is something wider. Device also includes firmware dependent trunks (the fixed
trunks for Nimbra 320/360/380) and integrated access features like the ASI ports of Nimbra
340, the HD-SDI ports on Nimbra 340-HD and the Ethernet ports on all Nimbra 300 series
nodes.
In other words, a module is always a device but a device is not always a module.
5.5.1.1 ‘Admin’
Admin is the administrative status of the object (e.g. route, interface, server, module or
function). The operator can either set the administrative status to ‘Up’ if the object is to be
activated, or to ‘Down’ if it is to be deactivated.
5.5.1.2 ‘Oper’
‘Oper’ is the operational status of the object (e.g. route, interface, server, module or
function). ‘Up’ indicates that the object is active, while ‘Down’ indicates that it is inactive.
If the operational status shows Down while the administrative status is Up, this is an
indication of that an error has occurred. Degraded indicates that the object is operational,
but with deficiency. Dormant means that the object is up but temporarily suspended; in
waiting for an event to take it up. Starting is a transitional state indicating that the object is
in a start-up phase. Absent indicates that the object is no longer physically present in the
node.
Enter user name and password. The default user name/password combination is root/neti.
Click OK. The start page shown below should appear:
Some of the links are further divided in different tabs. It is important to click on ‘Apply’
before jumping to another tab as clicking directly on another tab removes all changes on the
previous tab.
The system settings web page contains system parameters,, which are described below.
Configurable parameters:
6.2.1.4 Contact
Default value: empty string
Type: string variable
Range: Text string, up to 100 characters long, only with printable ASCII characters
Description: The name or the e-mail address of the contact person.
6.2.1.5 Location
Default value: empty string
Type: string variable
Range: Text string, up to 100 characters long, only with printable ASCII characters
Description: The name of the location of the unit.
Navigate to restart tab of the web page Maintenance → System. Click on ‘Restart Node’ to
execute a node reboot.
reboot Observe that this is traffic affecting and all services originating,
terminating
ating or going through the node are affected. ‘Restart Node’
ode’ means that all processes
on all modules in the node are restarted, including the node controller.
When the system is restarted, the contact with the browser is lost. After a short time (less
than a minute) the contact should automatically be reestablished.
Enter the revised date and time info in the entry fields.
For the time, use the hh:mm:ss format. To avoid involuntary change of the parameters, the
‘Update date & time’ tick box must be selected for any changes to take effect when the
‘Apply’ button is clicked.
Note: If the internal clock is set to a time or date in the future, all users are
automatically logged out from the system.
6.6 Users
The maintenance users web page lists currently active users. From this page, users
sers can be
added and their privilege level modified.
To add new users, click on the ‘Add user’ button. To configure a user currently logged in,
click on the link to the user.
The following configuration menu appears:
Enter User name, Access Mode (Full/Read only access) and Password (twice). Click on the
‘OK’ button. The new user is now ready for login.
Parameters configured on this web page are:
6.6.1.3 Password
Default value: none
Type: Encrypted string
Range: 1-50 characters long password.
Description: Password for the created user.
6.7 Preferences
The node contains one set of preferences per user for event and alarm presentation. These
preferences are configured on the web page Maintenance → Preferences. Here, the contents
and size of the event and alarm log can be set. The configurable parameters are:
Click on the Maintenance → Preferences. The Preferences page, shown below, appears.
Enter the desired information for the currently logged in user and click on the ‘Apply’
button and return to the Maintenance main page. Back up the configuration changes, so
they don’t disappear after a reboot.
The default settings are that all events and alarms are visible, the event log size is 20 events
and the auto-refresh interval is 30 seconds. The range of the event log view file size is read
from the module.
The table shows active and previous configurations stored in flash memory. The active
configuration is at the top of the table. The maximum number of saved configurations is
eight, numbered between 0 and 7).
Parameter Description
Id The index number of the configuration
Name A user--defined name of the configuration
Description An optional user
user-defined description of the configuration
Valid Indicates if the configuration is allowed (valid) on reboot or not.. The configuration
with lowest Id number and a set valid flag is used for reboot (i.e. it is ‘active’).
Date Date and time when the configuration was saved
Figure 28. Maintenance → configuration parameters
Enter a name for the configuration in the Name entry field, and a suitable description in the
Description field. The Valid checkbox must be ticked,, if the configuration is to be active
active.
Click ‘OK’.
A dialogue box pops up, indicating that the operation may take a while. The Maintenance
→ Configurations page reappears with the new configuration active once the operation is
concluded.
Information about the configuration, such as name, when it was created, a description and
its size, is shown. The only parameter that can be set here is the ‘Valid’ flag.
A click on ‘Download
Download file’
file downloads the configuration to a workstation/PC.
Click OK. The Maintenance → Configurations page appears, reflecting the modification.
Click on the Browse button. A standard File Open dialogue box appears. Select the desired
file and click the OK button.
The Confirm uploaded configuration page, appears.
Enter an appropriate name and a description for the configuration in the Configuration
name and Description entry fields. The Valid checkbox should be ticked if the file is to
become active directly.
Click the ‘OK’ button. The Maintenance → Configurations page reappears with the new
active configuration at the top of list.
Note: If the active configuration is deleted, the entire system is affected after
the unit is rebooted, as another configuration becomes active. If no
reboot takes place immediately, nothing happens directly. The node
simply runs on the current configuration (wh(which now happens to be
deleted).
Enter the Maintenance → Configurations page according to the previous section. Click on
the id of the configuration to be deleted in the Id column. The Edit configuration page
appears.
To delete the configuration, click on the ‘Delete’ button. Confirm the action in the
confirmation window that opens. The configuration is removed directly.
Enter the Maintenance → Alarm I/O page by clicking on the link. Initially, no alarm pins
are configured, which is displayed as direction ‘unused’ in the list. Click on the direction of
the pin, i.e. the link unused of the pin to be configured.
To start configuring the pin, select Direction ‘Output’ for pin 5 or Direction ‘Input’ for pins
2-4 and 6-8 and click on the OK button. The main Alarm I/O menu reappears.
Select the pin to be configured by clicking on the link to the pin (in the example below, on
the link gpio1:0:2).
To start configuring the interface/pin, select if the alarm is active when the circuit (pin to
common ground, pin 9) is open/high or when it is closed/low. Make the additional
parameter settings:
To start configuring the pin, select Direction ‘Output’ or ‘Input’ as desired and click on the
OK button. The main Alarm I/O menu reappears.
Select a pin to be configured by clicking on the link to it (in the example below, on the link
gpio1:2:9 on the main alarm I/O configuration page).
To start configuring the interface/pin, select if the alarm is active when the circuit (pin to
common ground, pin 7) is open/high or when it is closed/low. Proceed by clicking on the
‘Apply’ or ‘OK’ button.
Now up to eight different criteria can be chosen to activate the alarm. In order to add a
criterion, click on the ‘Add criterion …’ button.
Select ‘Cause’, ‘Type’ and ‘Severity’ according to preferences. For these alarm properties,
a drag-and-drop menu guides the user to the available alternatives. For alarm properties
‘Object name’ and ‘Text’, the ‘*’ character may facilitate the selection, but no drag-and-
drop help is available. The ‘*’ character matches any characters to the right of its position,
e.g. LO* matches both LOS and LOF. If in doubt about object name and text, it is strongly
suggested that the default string ‘*’ is kept.
Click on the Apply button if one (or more) additional criterion is wanted; otherwise use the
OK button. Add all criteria. If satisfied, the criteria cause the pin to become active on an
‘or-basis’ (i.e. if one or more of the criteria is satisfied, the pin becomes active).
To remove a configuration, just click on the output link on the Maintenance → Alarm I/O
page, select ‘Unused’ and click on ‘OK’ or ‘Apply’.
For Nimbra360, gpio1:0:2 to gpio1:0:9 pins are shown as absent. They are not implemented
in hardware.
6.8 Cooling
From GX4.8, there is an option to select how the cooling of the node is controlled. This
option is only available for Nimbra 680 and Nimbra 688 nodes.
Profile Description
Disabled This profile means that the function cooling profile selection is disabled. The
fans run with a constant RPM, namely 80% of maximum.
Silent This profile means that regulation is made with (low) noise level as primary
objective. Suitable for noise sensitive environments, with good ambient
cooing. The slightly higher board temperature saves fan life.
Cool This profile is made with high system life as primary objective. Suitable for
challenging environments
environments, where staff normally isn't located close
lose to the
nodes.
Balanced This profile is default and a compromise between profiles ‘Silent’ and ‘Cool’.
Suitable for normal operating conditions.
Figure 45. Cooling profiles available in Nimbra 600 series
Figure 46. The Software program error alarm with text ‘Crash dump available’ is
generated whenever a crash dump file is found on the node.
The intention behind this alarm is that any time an unexpected reboot occurs, as this is a
serious event, the event should be reported to Net Insight support. To investigate the node
behavior, a nodeinfo file and the particular circumstances around the event are needed. The
alarm could appear after a manual reboot as well; also this case should be reported.
When this alarm is observed, please contact Net Insight support and inform them about the
details, generate a nodeinfo file and send this file to Net Insight support together with the
Trouble Report ticket number.
The nodeinfo file is generated from the link Status → Nodeinfo.
Figure 47. The nodeinfo file is generated from the Status → Nodeinfo link.
Figure 49. The generated nodeinfo file is ready for download. To download, click on the
‘Download nodeinfo’ button. The downloaded nodeinfo file should be sent to
Net Insight support for investigation.
Note: The alarm list will present the alarms which are selected under the
Maintenance →Preferences link.
More information about the alarms is available by clicking on the link under the ‘Cause’
heading.
The table shows the Active and Cleared alarms as follows.
Sev Shows the severity of the alarm. The following values are possible:
Cr Critical (red)
A service affecting condition has occurred and an immediate corrective action
is required.
Ma Major (orange)
A service affecting condition has developed and an urgent corrective action is
required.
Mi Minor (yellow)
The existence of a non-service affecting fault condition and corrective action
should be taken in order to prevent a more serious fault.
Wa Warning (blue)
Detection of a potential or impending service affecting fault, before any
significant effects have been felt.
Info Information
Cl Cleared (green)
The cleared severity level indicates that the alarm is no longer active.
Ack Flag that tells if the alarm has been acknowledged or not. Not available for
events.
Figure 52. Description of alarm and event properties. For a full specification of the
alarms, see the appropriate Alarms list (Document NID2004.pdf).
To find the event list rather than the alarm list, click on links Status and then Events. The
Events page appears.
Note: In some circumstances the cause of the alarm cannot be removed or the alarm should
not be acknowledged until later. In this case, use the Comments field to pass on any
comment regarding the alarm event.
Note that the action of acknowledging an alarm does not remove the alarm from the
alarm list or change its severity.
7.3 Syslog
The Syslog page lists a log of the node. To access the page, click
lick on the Status link and then
on the Syslog tab on the web page that appears. The Syslog page contains two links, Latest
and Older, which takes the user to the latest entries in the syslog or to older entries. For
Nimbra 600 with dual Node Controllers, latest and older syslogs are available for both
Node Controllers (shown).
hown).
Figure 56. The Syslog page (latest) for the active node controller.
Syslog is configured from the syslog tab on the Maintenance→System web page.
page The
default configuration is
*.*;local1.!=info -/var/log/messages
*.alert /dev/console
This configuration logs all system messages, except from local1 info level (that pertains to
the creation, modification and deletion of DTM OAM objects), to the file
/var/log/messages. Furthermore, it also displays all ll critical messages on the console.
The syntax of the configuration items adheres to the standard BSD syslog implementation
as described in the “syslog.conf” man page of most Linux systems.
Note: It is important that the filename, of the file to which the logged
messages are written, is preceded with a ““-“ sign. Otherwise the
performance of the node can degrade significantly.
In order to configure the fan unit (in particular the ‘Enable air filter replacement alarm’),
the link FAN should be used. The following page then appears:
Note: The following applies only when using 40 Gbps switch modules in the Nimbra 680
or when using 80 Gbps switch modules in Nimbra 688. When using 80 Gbps switch
modules in Nimbra 680 or 160 Gbps switch modules in Nimbra 688, there is always
10 Gbps allocated to each interface position.
40 Gbps switch modules for Nimbra 688 is not supported.
In the Nimbra 680/688 switch, it is possible to configure the capacity allocated to a board
position. Capacity is allocated in a row
row-pair fashion. A row-pair
pair consists of the two
adjacent slots in the same row (for example IF3 and IF4). The left position has an odd IF
number (for example IF3). The total capacity of a row-pair
row is always 10 Gbps,, provided a
40 Gbps switch h module is used in Nimbra 680 or an 80 Gbps switch module is used in
Nimbra 688.. The capacity can be allocated to the two slots as follows:
Trunk and access modules can be classified in three different categories. Some modules
always require 10 Gbps switching capacity, some modules never require 10 Gbps switching
capacity and some modules require 5 or 10 Gbps switching capacity depending on how
they are used.
Modules that never require more than 5 Gbps switching capacity are:
4 x OC-3/STM-11 Trunk
4 x OC-12/STM-44 Trunk
Element Manager User's Manual Status Monitoring • 71
Modules that work at 5 Gbps are listed below. These modules work with increased
functionality at 10 Gbps.
4 x OC-48/STM-16 Trunk (only interfaces 1 and 2 in working order)
10 Gigabit Ethernet Trunk Module (with total rate limitation to 5 Gbps)
8 x Video Access Module (with total rate limitation to 5 Gbps)
Video Access Module v2 (with total rate limitation to 5 Gbps)
6 x IP/Ethernet Trunk Module (only interfaces 1 to 5 in working order)
J2K Video Access Module v2 (with total rate limitation to 5 Gbps)
Follow the Status → Equipment link and click on the position of one of the modules. Note
that it is only possible to change capacity on the left module in a row-pair, i.e. on positions
IF1/3/5/7. The corresponding right slot capacity is adjusted though, according to the
previous discussion. The total capacity for the row-pair is 10 Gbps.
Figure 64. Pluggable interface page, with information from the particular SFP.
Figure 65. The status sensors web page displays information on the various temperature
and other sensors in the node.
7.6 Inventory
The Inventory function describes the physical entities installed in the system.
A Physical entity or Physical component represents an identifiable resource within a
managed system. Typically, physical entities are resources like communications ports,
backplanes, sensors, daughter-cards, power supplies and the overall chassis which can be
managed. However, software/firmware images are also considered to be physical entities in
this (inventory) context, although they cannot be touched.
The Containment tree (status inventory) describes how entities are structured and contained
within each other. The use of the position entity allows modeling where a resource is
On the inventory page, the containment tree of the entire node is displayed, i.e. what
resources are available in the node and how they are structured.
For Boards on which more than two FW-images could be stored, the image that is running
is indicated as follows:
Primary: Image stored as primary
Secondary: Image stored as secondary
Running: Image that is running (could be either the primary or secondary)
For boards on which only one FW-image could be stored, only the primary image is
presented. Here, the primary image must be running.
The table shows information about other logged in users; user name, Tty (type of terminal
used), From (IP address), Login (time) and Expire (time). Inactive users are automatically
logged out at Expire time.
Listing Description
Status ‘*’ means active NTP, ‘ ‘ inactive
Peer Address of the clock source (NTP)
Ref Id (IP) Address of the clock source/NTP
Stratum Stratum level of the clock source/NTP
Poll interval (s) is the time between two consecutive interactions with the
clock source/NTP
Delay (ms) The time for the NTP signal to go from the node to the
NTP server and back
Offset (ms) is the time offset used by the node to allow for time transfer
delay
Jitter (ms) is the jitter exhibited by the NTP servers
Figure 70. Headers on the Status → NTP page
The nodeinfo file is generated and saved in the node if the button ‘Generate nodeinfo’ is
clicked and the choice is confirmed in the pop-up window.
When the file is generated, it can be viewed (View nodeinfo log). It can also be
downloaded or deleted directly (if the file was generated by mistake).
E F
D A Gateway
C B
8.2 Configuration
Management traffic requires only moderate bandwidth. It is therefore adequate to use 512
kbps (equals one DTM slot) per channel, both between DLE servers (server-server) and
DLE clients (client-client). As the DLE client-to-server communication is only used for
signaling and broadcasting, 512 kbps is sufficient for these channels as well.
The recommendations in this document are for an in-band management network that is used
exclusively for management of the Nimbra nodes. No consideration has been taken for
other traffic. To limit the load on the DLE server, there is a recommended maximum of
DLE clients per server in one segment. To limit the load on the gateway, there is a
recommended maximum number of nodes with traffic routed through the gateway.
For availability reasons, when a single DLE server is used, it is recommended that the
gateway for a DLE segment is located on the same node as the DLE server.
Nimbra 300
Nimbra 600
Maximum recommended number of DLE clients for one DLE server 16 16 64
When working as gateway: maximum recommended number of 255 255 1000
nodes to route traffic for
Maximum recommended number of DLE clients on a node 3 3 3
Figure 75. Configuration recommendations of the DLE in-band network used for
managing the nodes from external management stations
192.168.100.1 c 192.168.1.1
Gateway
DLE segment 192.168.100.33 …2
192.168.100.32/27 b
Figure 76. Example of a network with three DLE segments built as a tree, and one
external network
The DLE segments have a netmask of 255.255.255.224 meaning that there can be 30 nodes
on each network (one address is the network, and one is the broadcast address). The
gateways route packets between the DLE segments and the external network.
If the Nimbra network consists of more nodes than what is recommended as the maximum
for one gateway, it is recommended to split the network into separate in-band management
networks and route the traffic to the external network with a dedicated node as the gateway.
External management
network
Gateway
Tree of nodes
and DLE
segments
Figure 77. Large networks are divided into smaller networks, each with its gateway to the
external management network
8.4 IP routing
Setting up DLE only configures the individual DLE segments; it does not provide routing
between DLE segments. As with all IP networks, routing must be configured in each node.
Setting up IP routing for a DLE segment is not different from setting up IP routing in
general.
A routing entry consists of a destination, a netmask and a gateway. When a packet is sent to
a node outside the network, the IP address to the node is masked with the netmask of a
route. If the masked IP address matches the destination of the route, the packet is forwarded
to the gateway specified in the route. The gateway must be located on the local IP sub-
network.
On each node in the DLE segment, a default gateway routing entry should be specified.
This route is used to forward packets to nodes outside the DLE segment. The default route
is specified as destination 0.0.0.0 with netmask 0.0.0.0. This entry will match all IP
addresses. The gateway shall be the IP address of the gateway on the DLE segment.
Node b
Destination: 0.0.0.0
Netmask: 0.0.0.0 Default route
Gateway: 192.168.100.1
External node
Destination: 192.168.100.0
Netmask: 255.255.255.0
Gateway: 192.168.1.1
Note: Node c must have two routing entries, in addition to the default route,
one to each network (DLE segments) in the picture shown. If additional
DLE segments are defined, additional routing entries are also needed.
The sub-sections (links): In-band servers, In-band clients, IP interfaces, IP routing conf, IP
routing table and SNMP.
8.6.1.2 Purpose
Default value: Empty string
Type: String variable
Range: Length 0-255 characters
Description: The parameter is an arbitrary character string that can be used for
identification purposes.
From this tab, the parameters of the exponential back-off algorithm of the re-connect time-
out are set (minimum and maximum interval). Also, the connection can be defined as
having high Precedence, which means that in case an intermediary node goes down, this
particular connection is taken down with priority and a replacement connection is set up
with priority (i.e. it has precedence over other connections).
Primary source route alarm suppress: enabled (default) or disabled
Minimum interval: The starting value of the back-off algorithm, 10 ms (default). After
tear down of a connection, connection re-establishment is attempted immediately; if this
attempt fails, another attempt is made after the configured minimum interval.
Figure 82. Page for configuration of destination to a peering (back-up) DLE server.
Observe that destinations to clients are not set on this page.
8.7.1.2 Purpose
Default value: Empty string
Type: String variable
Range: Length 0-255 characters
Description: The parameter is an arbitrary character string that can be used for
identification purposes.
The Advanced settings are identical to those of the In-band server; see section Advanced
configuration for In-band servers for additional information.
To set the parameters, select the web page by following the link Control Networks → In
band Clients, chose the values and click on ‘Apply’ or ‘OK’.
SCC-mc
CSC-uc
A CCC-uc
CSC-uc B C
CCC-uc
CCC-uc
CCC-uc
Figure 84. Bandwidth requirement example. Node A has a DLE server and is the gateway
to the outside world. Nodes B and C each run a DLE client.
Note that the CCCs between nodes B and C are omitted in the illustration.
Click on the IP address and make the changes to the address and the netmask. Alternatively,
click on the ‘Add address...’ button in order to add a valid IP-address.
Click on the Control Networks → IP routing table links to get an overview of the defined
IP routes.
Figure 87. IP routing table page. Default means all addresses not otherwise mentioned.
U means that the routing entry is up, in other words active. G means that in order to reach
the destination you should use the gateway that is “pointed
nted out” by the routing entry.
The first entry, 127.0.0.0 is for the local host, which always will be there. The next four
entries describe that you can reach 192.168.101.0, 192.168.161.0, 192.168.162.0 and
192.168.163.0 directly witho
withoutut gateway. The last entry describes how to reach all other IP-
IP
addresses through the gateway 192.168.101.1.
Click on the Control Networks → IP Routing Conf link. The IP routing conf page
appears. This page contains the configured IP routes on the node.
Figure 89. IP routing configuration page; default means 0.0.0.0, i.e. all addresses.
Click on the Add route button and the Add page appears.
Change the settings and click ‘OK’ or ‘Apply’. To delete the route, click on ‘Delete’. The
Routing configuration page reappears modified.
If required, back up the configuration changes to the node controller before carrying out
this step.
Note that asymmetric routing may cause problems with SNMP/telnet/ftp. Thus, the return
route should follow the same path as the first route.
The page shows information about the SNMP community names and user configuration.
The SNMP agent is a full SNMPv1/v2c/v3 agent that supports SNMPv3 security levels
noAuthNoPriv, authNoPriv and authPriv. It also shows the configured notification
receivers.
Read-only community name is the community name for SNMPv1/v2c read (i.e. get)
operations. If this community name is provided by the user, the get operations requested are
accepted; write operations are not accepted with this community name.
Read-write community name is the community name for SNMPv1/v2c read (i.e. get) and
write (i.e. set) operations. If this community name is provided by the user, then
SNMPv1/v2c read/write operations are accepted.
Notification (trap) community name is the community name sent with the notifications. If
set, notifications are sent as SNMPv2 traps with this community name. Some trap receivers
require a match of the community name, while others simply ignore this community name.
SNMPv3 user is a user name used in SNMPv3 communication with the node. This type of
user is also called a USM user. If set, SNMPv3 operations from this user are accepted with
a security level that depends on the Authentication key and the Privacy key (described
below).
A fine tuned Access control can be configured from the access control tab. This tab allows
for advanced configuration of the SNMP agent, including setting up a detailed access
control.
Note: It is strongly recommended that this advanced access control SNMP configuration is
only used by the experienced and knowledgeable user of SNMP agent configuration.
Generally, this page is used for setting up the Local Configuration Datastore (LCD) of tthe
SNMP agent. The LCD describes the configuration of the SNMP agent. All of the SNMP
agent configuration can be done using this page. The simplest and most common tasks are
more easily configured from the basic SNMP configuration page previously described and
from the Trap receiver SNMP configuration page described later.
Configuration
onfiguration done on the SNMP page is internally processed the same way as if the
configuration is made directly into the LCD.
Please refer to section 8.11.4 SNMP page internal data below for a description on how the
form on the SNMP page is internally repres
represented and related to the LCD.
The default configuration of the LCD adds configurations to the SNMP agent, which are
used by the community names, SNMPv3 user, and the notification receivers configured on
the basic SNMP configuration page.
The following is the default configuration:
Access entries for the notifiers, readers, writers, authUsers and privUsers principals are
configured from the Access control SNMP configuration page. The entries define
permissions for the different principals. You can further modify
odify the permissions of these
community names and SNMPv3 users on this configuration page.
A family tree, All, which includes all the OIDs, is used when setting up the access entries.
Element Manager User's Manual Control Network • 100
Modify the configuration in the Local Configuration Datastore text box. The button
‘Restore to defaults’ loads the default configuration into the text box. To apply the new
configuration, click the ‘Apply’ button.
When the configuration is applied, it will pass a syntax control. If the configuration
contains syntax errors, the page will be reloaded with errors shown.
The link AuthKey Generator opens a window where an authentication key or privacy key
can be encoded for use in the LCD. The link Configuration Example provides an SNMP
configuration example.
Figure 96. Add SNMP trap receivers tab. Add the SNMP trap receiver IP address in the
empty field. UDP port 162 is default, but can be changed if needed.
Click ‘OK’ to add the new notification receiver. The configuration page will be loaded
again, updated with the new notification receiver.
Note: Configurations on the Basic SNMP configuration page and the Access Control
configuration page m
must
ust not be in conflict with each other. In this case, unpredictable
system behavior may happen.
only community name with the value public on the Access control SNMP
Setting of a Read-only
configuration page is equivalent to:
Setting of Read-write
write community name with the value private on the Access control
cont SNMP
configuration page is equivalent to:
Setting of Notification community name with the value public on the SNMP page is
equivalent to:
Setting of SNMPv3 user name, authentication key and privacy key on the SNMP page is
equivalent to one of the following entries, depending on the entered data. When entering
user name root only:
Setting of Notification receiver with IP address 192.168.0.1 and port 162 adds the
following per added notification receiver. The index will always be an integer value unique
per entry.
MIB view
vacmViewTreeFamilyEntry
vacmViewTreeFamilyViewName (name)
vacmAccessReadViewName… (read/write/notify)
group
vacmAccessEntry
vacmGroupName (name)
vacmGroupName (group)
user
group
vacmSecurityToGroupEntry
index is a unique index string. It does not mean anything, but must be unique.
community is the community name string that will be used.
name is the name of this entry, and will be used as the principal to refer to the entry when
setting up the security, see Defining Groups and Access Rights.
engineID is always localSnmpID, which represents the SNMP agent's administratively-
unique identifier.
context is the name of the context to which the group is part of. To gain access by this
entry, the specified context must be in use. On the Nimbra network elements, the context is
always the default context, which is represented by a dash (-).
target is always a dash (-).
storage describes how the entry is stored. This is always nonVolatile.
name is the human readable name for a family of view sub-trees, i.e. the name for the MIB
view. This is a printable string of no more than 32 characters. Multiple entries may define
one MIB view, which in this case all must have the same name. The name is used when
defining groups (see Defining Groups and Access Rights).
subtree is an OBJECT IDENTIFIER that identifies a sub-tree of the MIB, i.e. what
managed objects to include or exclude from the MIB view. The sub-tree is combined with
the mask.
mask is a bit mask which, in combination with the subtree defines a family of view sub-
trees. The bit mask is represented as a sequence of hexadecimal bytes separated by colons.
Each byte is in the range 0x00 to 0xff. A zero-length string is represented by a dash (-).
The bit mask is a series of zeros and ones, where the zeros represent wildcards, and the
ones represent an exact match. The bit mask is applied on the subtree, where the first bit
masks the first sub-identifier, and so on. The bits are grouped to bytes, which are
represented by the substring 00 through ff, and are all separated by colons (:). The last
byte is padded with ones at the end to fill out to a complete byte.
type indicates whether the entry shall define a family of sub-trees that shall be included or
excluded from the MIB view. The value of this field is included or excluded.
storage describes how the entry is stored. This is always nonVolatile.
8.11.9.1 Example 1
The example defines a view names "All" that allows access to everything (actually,
everything under the 1 branch in the MIB tree).
8.11.9.2 Example 2
The example defines a view named "noIfTable", that allows access to everything except to
the ifTable.
8.11.9.3 Example 3
The example shows how to define a family of view subtrees that only allows access to row
9 in the ifTable. The 10th bit is a zero, which makes the 10th sub-identifier in the subtree a
wildcard (don't care). This is the columnar object.
vacmAccessEntry name prefix model level match read write notify storage
name is the name of the group. The name is a string of up to 32 characters. The name is
used when associating access rights to users (see Assigning Users).
prefix is the name of the context to which the group is part of. To gain access by this entry,
the specified context must be in use. On the Nimbra network elements, the context is
always the default context, which is represented by a dash (-). (The prefix could be the
complete name of the context, or the prefix of a context, as defined by match; see below.)
model is the security model to which the group belongs. In order to gain access by this
entry, the specified security model must be in use. The security model can be snmpv1,
snmpv2c or usm for SNMPv3 using the USM.
level is the minimal security level. In order to gain access by this entry, the security level in
use must at least be the specified security level. The value is noAuthNoPriv if no
authentication is required and authNoPriv if authentication using HMAC-MD5 is
required. If multiple entries are equally indexed, except for this value, then the one with the
highest security level is applied.
match specifies how the prefix shall be matched. For the Nimbra network elements, it does
not make sense to set the value to anything except exact. The value can be exact of
prefix.
read is the name of the MIB view (see Defining MIB Views) that shall be used to control
what management information can be read. In order to gain read access by this entry, the
MIB view must allow access of the management information.
write is the name of the MIB view (see Defining MIB Views) that shall be used to control
what management information can be written. In order to gain write access by this entry,
the MIB view must allow access of the management information.
notify is the name of the MIB view (see Defining MIB Views) that shall be used to control
what management information can be included in a notification. In order to gain read access
for notifications by this entry, the MIB view must allow access of the management
information.
storage describes how the entry is stored. This is always nonVolatile.
The example defines a group named "FullAccessUser" that requires the user to have at least
the security level "authNoPriv" (authenticated, but not encrypted). The group permits
access to the MIB view "All" for read (responding to snmp-get operations), write (accept
snmp-set operations) and for notifications.
model defines the security model for the entry. The model is either snmpv1, snmpv2c or
usm.
principal is the user name for the security model USM (see Defining SNMPv3 Users), or
the security name that represents the community name for SNMPv1/v2c. A default security
name is public. The community name for the public security name is modified from the
web page Status | SNMP config.
group is the name of the group (see Defining Groups and Access Rights) to which the user
or community name shall be associated.
storage describes how the entry is stored. This is always nonVolatile.
8.11.11.1 Example 1
The example associates the USM user "root" with the group "FullAccessUser".
8.11.11.2 Example 2
The example associates the community name "public" for SNMPv2 access to the group
"ReadOnlyUser".
Note: Make sure to have all the information that the operation requires,
before starting any configuration operation. This will help you to
minimize the downtime of the system.
The table lists the DTM interfaces that are present in the unit. For each interface the
following is presented: Name (name of the interface), Capacity (in slots), Free (unused
capacity, in slots), Tx slots (used slots in the Tx direction) and Tx cap % (used fraction of
slots in the Tx direction), Rx slots and Rx cap % (used fraction of slots in the Rx direction).
In addition, Adm and Oper shows the Administrative and Operational state of the interface.
The interface name is written as “dtmX:Y”, where X is position of the card in the node and
Y position of the port, on the card.
Parameter Description
Interface name The interface id, written as “dtmX:Y” (where X is position of the card and Y
position of the port).
Operational status The operational status of the board.
Transmit capacity The total number of time slots available for transmission on this interface.
Used transmit The number of used time slots from this node to the peering node.
capacity
Used receive The number of used time slots from the peering node to this node.
capacity
Interface MAC A globally unique hardware identifier for this interface card.
address
Failure on An error reported by the underlying trunk interface. (LOF loss of frame.)
underlying interface
alarm
Reduced control The node is not able to signal the remote node. This usually indicates a
capacity alarm problem in the TX direction for the link.
Figure 104. Read-only parameters (variables) of a DTM interface
Enter the DTM address and whether the address is Primary or not and then click
lick ‘OK’. The
DTM addresses page will reappear with the new address listed in the table.
Back up the configuration changes and restart the node.
9.3.2 Editing
ing or deleting a DTM address
Go to the DTM addresses page and click on the address that is to be revised or deleted. The
following page appears:
Note: If the primary address of the node is changed, the configuration must
be saved and the node must be restarted for the changes to take effect.
Note also that the address change does not affect existing channels.
The Hostnames page shows the DTM nodes with their DTM addresses and hostname.
Remember to include the list of the hostnames in every node; all the nodes in the network
must know all the hostnames!
Enter the DTM address and the selected hostname associated with the address. Click ‘OK’.
The DTM hostsnames page reappears with the newly defined address and hostname.
Figure 110. Editing DTM hostname suffixes. The example with academy.se makes it
possible to name the node node10.academy.se but still only use node10 as
hostname for configurations.
The short names can be used for configuration of these nodes, provided that the appropriate
hostname search page has been saved on all nodes that need to know about the node. As it,
for obvious reasons, is hard to know what nodes must have the definition, it is best to
include the hostname search list in all nodes.
Note: Changes to a hostname do not affect channels that have already been
established. Th
The hostname table is only consulted when a channel is
established.
9.5 Links
The Links page shows all DTM links that the node is connected to. The page can be used to
check if links to surrounding nodes have been properly
prop established. For each link id there
should be two addresses; the node address and the address to the remote node.
The link-table
table lists all the links that this node is attached to along with all other nodes that
are attached to these links. Each line in the table represents an interface and tthehe node that
the interface is located in.
Each link starts with an Id, which is equal to the Idd of a local interface. It lists the other
interface connected to that link before starting a new link with a new id.
Click on the DTM → Links link. The Links page appears.
9.6 Routing
9.6.1 General
To establish channels in a network, the nodes must know where to find all other nodes in
the network. The process of finding a path from node A to B in the network is called
routing.
Routing in a DTM network has a lot in common with routing in an IP network. The table
below lists the main differences between IP-routing and DTM routing.
How do you specify how to One nexthop per All possible nexthops to the
reach a destination? destination destination.
Address type IP address DTM address
This section describes how to configure routing. There are two different ways to configure
routing:
Element Manager User's Manual DTM Configuration • 119
Note: Do not mix dynamic routing with static routing since this can lead to
errors that are difficult to troubleshoot.
Field Description
Administrative The aadministrative status for the route has to be set to up, in order for the node to
status be taken into account when routing decisions are made
made.
Type Shall be set to “Static” for static routing entries. See the chapter on DRP for a
description of “Link Prefix” and “Area Prefix”.
Destination The ddestination
estination and prefix together specify which destinations this routing entry is
valid for; refer to section Addresses for a description of addressing. The destination
must be a numeric DTM address.
Prefix The number of significant bits in the destination address.
Next hop One possible next hop node that can be used to reach the destination node(s). The
next hop must be the DTM address of a neighboring node.
Metric The cost of using this route entry. If there are several routes to the same
destination, then routes with the lower metric are tried before routes with higher
metric
Figure 115. The routing entries
When a node needs to find a nexthop for a destination it looks in the routing table for all
entries that match the destination address. This gives the node a list of a number of different
nexthops that it tries to use to reach the destination
destination.
Note: If there are several routing entries with different prefix lengths that are
valid for a destination, then only the entries with the longest prefix will
be used. If there are several entries with the same prefix length, then
they will all be tried in order of increasing metric.
Note: If the routing is poorly configured in a node, the operation of the entire
network can be affected.
Click on ‘Add source’ or the specific link that is to be edited or deleted; the Route page
appears.
gateway: Ticking this box forces the node to automatically find its gateway.
Detect default gateway
This is only
nly relevant for end-nodes.
end For switches, the box is grayed out (default).
(default)
neighbors This box is only visible when the user selects area number ‘Select
Detect from neighbors:
from neighbors’. Whenever it is visible, it is by default select
selected. This makes the node
request its area number (see below) from its neighbor(s).
Area number: By default, DRP distributes information about all nodes and links to all
nodes in the DTM network. This allows all nodes to make "optimal" routing decisions since
they have complete knowledge about the current topology. As the network grows larger, the
amount
unt of information distributed by DRP grows and eventually becomes too large for a
node to handle efficiently. Exactly how large a network must be before the amount of
routing information becomes too large depends on both the number of nodes, the
connectivity
ity between the nodes (i.e. the number of links) and the types of nodes in the
network. It also depends on how often the network topology changes and the network
topology itself.. As a rule of thumb, it is possible to run a network with 250 nodes without
worrying
rrying about the amount of routing information. If your network is larger than that, you
should consider using Areas.
Areas are also useful to limit the amount of routing
routing-information
information distributed between two
different operators.
n1 n2
Area A1 Area A2
Border nodes
A node that is a member of one area, but has one or more links to a node in another area, is
called a border node.
2 3 5
Figure 121. A network that has been divided into two areas in a bad way.
In the illustration, the distance from node 1 to node 5 is shorter if the channel is routed via
node 3 than if it is routed via node 2. In addition, the distance from node 1 to node 4 is
shorter via node 2. However, if a single area prefix route is used, then node 1 will think that
2 3 5
Figure 122. A better way to build the network. Note the new link between nodes 2 and 3.
Area A1 Area A2
X.17.01.3A X.17.02.21
Figure 123. A network with two areas.
In the above example, the network has been divided into two areas called A1 and A2. All
nodes in area A1 have addresses in the range X.17.01.00/56 (X is used here as a short-hand
for 00.00.00.00.00) and the nodes in area A2 have addresses in the range X.17.02.00/56. If
no area prefix routes are used, nodes in area A1 are not able to establish channels to nodes
in area A2 and vice versa.
To allow nodes in area A1 to find nodes in area A2, an area prefix route must be added to
node X.17.02.21. This area prefix route should advertise the network X.17.02.00/56 to
nodes in area A1.
Element Manager User's Manual DTM Configuration • 128
X.17.03.13
X.17.01.3A X.17.02.21
X.17.02.28
Figure 124. A network with three areas.
In the above example, the following area prefix routes must be configured:
To allow nodes in area A1 to find nodes in area A2, an area prefix route must be added to
node X.17.02.21. This area prefix route should advertise the network X.17.02.00/56 to
nodes in area A1.
To allow nodes in area A1 to find nodes in area A3, an area prefix route must be added to
node X.17.02.21. This area prefix route should advertise the network X.17.03.00/56 to
nodes in area A1.
To allow nodes in area A2 to find nodes in area A1, an area prefix route must be added to
node X.17.01.3A. This area prefix route should advertise the network X.17.01.00/56 to
nodes in area A2.
To allow nodes in area A2 to find nodes in area A3, an area prefix route must be added to
node X.17.03.13. This area prefix route should advertise the network X.17.03.00/56 to
nodes in area A2.
To allow nodes in area A3 to find nodes in area A1, an area prefix route must be added to
node X.17.02.28. This area prefix route should advertise the network X.17.01.00/56 to
nodes in area A3.
To allow nodes in area A3 to find nodes in area A2, an area prefix route must be added to
node X.17.02.28. This area prefix route should advertise the network X.17.02.00/56 to
nodes in area A1.
9.8.8 Configuration
To implement DRP areas in your network, the following configurations must be made:
Configure the area number that the node shall belong to in each node. This is done from the
DTM → Routing → Dynamic routing config link.
Configure area prefix routes in the border nodes. This is done from the DTM → Routing
link.
Note that the area prefix is only configured in the area prefix routes; you never actually
configure the area prefix for an area. The correlation between an area and an area prefix is
only maintained to make it possible to configure a single area prefix route that covers all
nodes in an area and no other nodes.
For dynamic routes (i.e. not static), the type could be set to:
X.17.01 n1
X.17.02 n2 s1
X.17.03 n3
Figure 127. Routing entries
Nodes n1, n2 and n3 are configured as end-nodes and they have DTM addresses that all fall
in the range X.17.00/60 (i.e. from X.17.00 to X.17.0F). A link-prefix route can therefore be
added to the node s1. This means that instead of announcing n1, n2 and n3 individually, s1
will announce only X.17.00/60. Instead of each node in the DTM network having three
separate routes for n1, n2 and n3, they will only have a single route that covers all three of
them (and any possible additional end-nodes added later in the same DTM address range).
The sub-links are: Trunk Interfaces, Ethernet Interfaces and Perf. monitor. Trunk Interfaces
is where the various trunk modules are configured and their state is monitored. Ethernet
Interfaces is where the Ethernet part of IP/Ethernet trunk interfaces is configured and Perf.
monitor is where performance monitoring for the interfaces is defined.
Performance monitoring (PM) is the process whereby transported data is supervised for
quality deterioration. Performance monitoring uses SNMP counters (ITU-T G.826 like) on
trunks, interfaces and connections. For further information, see the chapter on Performance
Monitoring.
To configure the trunk interfaces, just follow the link to Trunk Interfaces. Select the trunk
to be configured by clicking on the Name of the trunk (e.g. sonet/sdh-3:1, pdh-5:1, ipt-5:4).
Parameter Description
Interface name The interface name. Written as “sonet/sdh-X:Y” where X is slot position of the
module and Y port position of the interface on the module.
Operational status The operational status of the board
Speed Capacity of the interface
SOH S1 (SSM) Synchronization Status Message (4 bits) in the section overhead
Description The number of slots available for transmission on this interface. Used on OC-
3/STM-1 Trunk Module only
Figure 135. Read-only parameters for SDH/SONET interfaces
Parameter Description
Transceiver temperature Temperature of the transceiver
Transceiver laser bias Laser bias current of the transceiver laser
Transceiver power Optical power transmitted from the transceiver
Receiver power Optical power received on the transceiver
Figure 136. Additional variables for the OC-48/STM-16 X-ADM Module
Parameter Description
Suppress Alarms When the service is up and running as intended, alarms are by
default suppressed. In order to enable the alarms, the suppress
alarms tick boxes must be unmarked.
All: When marked, all alarms are suppressed.
AIS: Alarm indication signal.
RDI: Remote defect indicator.
Figure 137. Configurable parameters for common interfaces
Signal failure Delay time for 1+1. The time that the nodes waits for the
filter period underlying network (SDH/SONET/WDM) to re-establish
connection, in order to avoid a switch-over.
Default 50 ms, Range 0-2000 ms
Degraded Configuration parameters for the “Degraded” alarm, Not used for OC-
defect (DEG) according to ITU G.806 for the interface. 48/STM-16 X-ADM
period Period, default 5 sec. Trunk Module or OC-
3/STM-1 (DTM 150)
Trunk Module
Degraded Configuration parameters for the “Degraded” alarm, Not used for OC-
defect (DEG) according to ITU G.806 for the interface. 48/STM-16 X-ADM
threshold Number of background block errors. Default 1200. Trunk Module or OC-
3/STM-1 (DTM 150)
Trunk Module
Figure 138. Configurable Advanced parameters for SDH/SONET trunks.
The OC-3/STM-1 Trunk Module only display error counters B2 and B3.
The Alarms parameters are presented at the bottom of the table as:
Alarm Description
Opto module Alarms from SFP. The Opto Module alarm is not available for the OC-
3/STM-1 Trunk Module.
Unequipped (UNEQ) This alarm is received from the other end of the link, indicating that the
payload is not usable.
Los of signal (LOS) Loss of signal. No signal detected on SONET/SDH network interface,
no light in the fiber.
Los of frame (LOF) Loss of frame. Unable to align SONET/SDH frame, no light in the
fiber.
Los of pointer (LOP) Loss of pointer. No pointer for where payload is.
Alarm indication signal, Alarm indication signal, line or defect detected by upstream
line (AIS-L) SONET/SDH network interface.
Alarm indication signal, Alarm indication signal, path or defect detected by upstream
path (AIS-P) SONET/SDH network interface.
Remote defect indication, Remote defect indication, line or defect detected by downstream
line (RDI-L) SONET/SDH network interface.
Remote defect indication, Remote defect indication, path, RDI-P or defect detected by
path (RDI-P) downstream SONET/SDH network interface.
Payload mismatch (PLM) Payload mismatch.
Degraded signal (DEG) Degraded signal
Loopback Loopback alarm, NA
Figure 140. Alarms parameters
Note: Only two of the four physical interfaces will be usable when running
the board in FEC mode.
Variable Description
Interface The interface name, written as “pdh-X:Y” where X is number of the slot in the
name chassis and Y is the number of the port on the module.
DTM The name of the DTM interface, written as dtmX:Y. X and Y are used as for the
interface Interface name.
Oper. status The operational status of the board. ‘Up’, ‘Down’, ‘Absent’, ‘Starting’ or
‘Dormant’
Speed The capacity of the interface
Mode The operational mode of the node, DS3 or E3. The mode (DS3/E3) has to be the
same on the entire module, but mixing DS3 and E3 on different modules within a
node is allowed.
Figure 144. Variables of the DS3/E3 Interface
Parameter Description
Suppress Alarms When the service is up and running as intended, alarms are by
default suppressed. In order to enable the alarms, the suppress
alarms tick boxes must be unmarked.
All: When marked, all alarms are suppressed.
AIS: Alarm Indication Signal.
RDI/RAI: Remote Defect Indicator/Remote Alarm Indication
Figure 145. Configurable parameters of the DS3/E3 Trunk Interface
Parameter Description
Line build out (DS3 For operation with physical cable lengths over 68 m (225 feet), the ‘Line
only) build-out’ variable must be selected. With the selection, operation up to 137
m (450 feet) is feasible.
SSM/TM code (E3 Synchronization Status Message/Timing Marker code. Can assume values 0-
only) 15 or auto. Auto is recommended.
Receive sync Select receive DTM sync source. Either the recovered bit clock (Line) or the
(RX_FSYNC) recovered DTM Start of Frame signal (FSP). Normally set to Line, but if
source Time Transfer is used the parameter must be set to FSP. Also, in this case,
the interface must be reset, i.e. the administrative status must first be taken
down and then reset to up. Obviously, this only applies to the case where the
administrative status is up already.
Signal failure filter Delay time for 1+1. The time that the nodes waits for the underlying network
period (SDH/SONET/WDM) to re-establish connection, in order to avoid a switch-
over.
Default 50 ms, Range 0-2000 ms
Degraded defect Configuration parameters for the “Degraded Signal” alarm, according to ITU
(DEG) period G.806 for the interface.
Period, default 5 sec (Number of sequential bad seconds to set/clear DEG),
settable from a roll-down menu to an integer between 2 and 10
Degraded defect Configuration parameters for the “Degraded Signal” alarm, according to ITU
(DEG) threshold G.806 for the interface.
Number of background block errors to declare a bad second. Default 1200.
Overhead BIP 00000 (Number of detected BIP-8 errors since last reload of this page);
information REI 00000 (Number of detected remote error indications since last reload of
this page); LCV 11920 (Number of detected line code violations since last
reload of this page); CP 00000; P 00000 (Number of detected P-bit errors
since last reload of this page)
Figure 146. Advanced parameters of the DS3/E3 Trunk Interface
The Alarms parameters are presented at the bottom of the table as:
Parameter Description
Unequipped This alarm is received from the other end of the link, indicating that the
(UNEQ/IDLE) payload is not usable.
Loss of signal (LOS) Loss of signal. No signal detected on PDH network interface.
Loss of frame Out of frame. Unable to align PDH frame.
(LOF/OOF)
Alarm indication signal, Alarm indication signal, line or defect detected by upstream network
line (AIS) interface.
Remote defect indication, Remote defect indication or defect detected by downstream network
line (RDI/RAI) interface.
Payload mismatch (PLM) Payload signal label mismatch.
Degraded signal (DEG) Degraded signal.
Figure 147. Alarms parameters of the 4 x DS3/E3 Trunk Module
DTM interface
IP Trunk interface
Configuration of IP/Ethernet trunks starts from the link Trunks in the left column. Clicking
on the link Trunks displays additional links: Trunk Interfaces, Ethernet Interfaces and
Perf. Monitoring.
Configuration must be carried out in the order Ethernet Interface and Trunk Interface. In
particular, in this release, the IP Trunk interface is not created automatically as it has in
previous GX-releases for the 6 x IP/Ethernet Trunk Module, but has to be manually created.
The new 10 GE Trunk Module has two SFP+ ports, which each can transport up to 10
Gigabit. However, the combined capacity for both ports is limited to 10 Gigabit, but the
capacity can be arbitrarily divided between the two ports.
The regular 6 x IP/Ethernet Trunk Module use regular SFP ports, as it has done before.
The Ethernet interface configuration page has four different links: Basic, Advanced,
Statistics and Trunks.
The 10 GE and 6 x IP/Ethernet Trunk Modules are configured on multiple web pages. First
the Ethernet interface is configured.
Connect the Ethernet cable or fiber to the module before starting the configuration. It is
imperative that this step is followed, as the operational state of the etht interface stays down
otherwise.
Now follow the link for Ethernet interfaces and select the appropriate interface, like etht-
5:1. Make sure the administrative status is ‘up’. Proceed with IP-trunk configuration, found
under Trunk interfaces. The particular trunk has to be created, with a selected data rate,
from the specific trunk’s Trunks tab on the Trunks → Ethernet interfaces web page.
Figure 154. Basic Ethernet Interface Variables, some of which also are presented on the
advanced page. They are only presented once in this text. The statistics
variables are presented separately.
10.4.5.2 Purpose
Default value: Empty string
Type: text string, up to 255 characters long
Description: A text tag that can be entered by the user for various purposes.
Figure 155. Configuration page of the Ethernet interface of the IP/Ethernet trunk etht-5:1,
Advanced settings.
The advanced settings concern the negotiation of operating mode with the remote (peer)
interface.
10.4.6.1 Autonegotiate
Default value: ‘On’
Type: Boolean variable
Range: ‘On, ‘Off’
Description: The variable tells if the autonegotiate feature is enabled or not.
To configure the trunk, click on the trunk link, in this case ipt-5:1. This link takes you to the
basic configuration page of the IP trunk.
To configure the capacity of the IP trunk, fill in either TX slots or TX bitrate. Internally,
TX slots are used. If TX bitrate is filled out, an integer number of TX slots are
automatically filled out in the TX slots field and the TX bitrate is reduced slightly.
Make appropriate IP settings for local and remote (destination) node. Set netmask (always)
and gateway if appropriate. It is essential that IP configuration is made correctly, as no link
is established otherwise.
The maximum transmission unit is defined on this page as well (105-1500). Also, the FEC
(Forward Error Correction) parameters are configured here. The configurable basic settings
are described below.
After the basic parameters have been set and confirmed (by clicking the ‘OK’ or ‘Apply’
button), it is time to define the advanced trunk parameters.
The parameters that can be configured on this page are described below.
10.4.8.14 VLAN id
Default value: No default value
Type: integer
Range: 1-4094
Description: VLAN id is a VLAN tag attached to Ethernet frames that are of transmitted frame
type ‘vlantagged’. As it is only relevant in this case, it is grayed out for the other values of the
parameter Transmitted frame type.
In order to configure jitter tolerance, maximum path delay (p-t-p) variation should be
monitored, if necessary for a few hours or even days. The jitter tolerance is then best set to
be p-t-p + 20% or larger. In any event, both the minimum and maximum values displayed
within parenthesis must be respected. The current default value for jitter tolerance is 2000
µs.
Actually, due to a minimum buffering of packets, the jitter tolerance will always be at least
32 divided by the packet rate, where the packet rate is the DPP-IP data packet rate in
packets/s (FEC packets are not included). This means that for packet rates less than or equal
to 16000 packets/s or less, the default value is not used.
Consider a trunk set to TX slots = 179 slots (i.e. slots per DTM frame). The required
Ethernet capacity for this configuration is about 100 Mb/s. Each packet contains 179 slots
@ standard MTU (1500 bytes). The packet rate is in this case 8000 packets/s and the
minimum jitter tolerance is 4 ms (32/8000).
After having done the configuration, make sure to click on ‘OK’ or ‘Apply’ to make the
configuration stick.
After the configuration is made, make sure to click on ‘OK’ or ‘Apply’ to make it stick.
Figure 161. Basic IP Trunk configuration page with (configurable) parameters and
(displayed) variables.
Figure 162. Advanced IP Trunk configuration page with (configurable) parameters and
(displayed) variables.
10.4.13 Alarms
The IP trunk alarms are also presented on the IP trunk alarms configuration page. Below,
the different alarms are presented and described.
The listing of alarms, made in the web browser on the IP interface configuration page,
indicates for a selection of alarms if they are active or not. For alarms that are not active,
the text “No Alarm” is displayed on a green background. For alarms that are active, the text
“Alarm” is displayed on a background color associated with the severity of the alarm. For
example, an alarm with severity critical is displayed on a red background and an alarm with
severity warning is displayed on a cyan colored background. The listed alarms are:
10.4.13.10 ICMP
Description: This alarm is generated when the node receives an ICMP error message. The
text can be one of: ‘Redirect’, ‘Target unreachable’, ‘Source quench’ or ‘Parameter
problem’ depending on the problem, when the signal on the receive interface is missing or
misread.
Severity: Warning
dppIp dppIp
MissingFrame ReceivedFrame
10.6.3.1 dppipDeliveredFrames
Description: The total number of DPP-IP frames that have been received and delivered to
the DTM interface.
10.6.3.3 dppipDuplicateFrames
Description: The number of DPP-IP frames that were received with a sequence number
of an already processed DPP-IP frame.
10.6.3.4 dppipLostFrames
Description: The number of missing DPP-IP data frames that could not be delivered to
the DTM interface. dppipLostFrames only counts data frames.
10.6.3.5 dppipMissingFrames
Description: The number of DPP-IP frames that were missing in the frame sequence, i.e.
the expected sequence number was not found in the DPP-IP framing buffer.
dppipMissingFrames counts all frames, including non-data frames like FEC frames etc.
10.6.3.6 dppipReceivedFrames
Description: The total number of DPP-IP frames that have been received.
dppipReceivedFrames is the total number of received frames, including FEC frames etc.
10.6.3.7 dppipRecoveredFrames
Description: The number of missing DPP-IP data frames that were recovered by the FEC
procedure. dppipRecoveredFrames only counts data frames.
10.6.3.8 dppipReorderedFrames
Description: The number of DPP-IP frames that were received out of order, but could still
be aligned to the DPP-IP frame sequence.
10.6.3.9 dppipSentFrames
Description: The number of DPP-IP frames that were sent on the DTM interface.
10.6.4.1 etherStatsBroadcastPkts
Description: The total number of good packets received that were directed to the
broadcast address. Note that this does not include multicast packets.
10.6.4.2 etherStatsCollisions
Description: The best estimate of the total number of collisions on this Ethernet segment.
10.6.4.4 etherStatsDropEvents
Description: The total number of events in which packets were dropped by the probe
due to lack of resources. Note that this number is not necessarily the number of packets
dropped; it is just the number of times this condition has been detected.
10.6.4.5 etherStatsFragments
Description: The total number of packets received that were less than 64 octets in length
(excluding framing bits but including FCS octets) and had either a bad Frame Check
Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-
integral number of octets (Alignment Error).
10.6.4.6 etherStatsJabbers
Description: The total number of packets received that were longer than 1518 octets
(excluding framing bits, but including FCS octets), and had either a bad Frame Check
Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-
integral number of octets (Alignment Error).
10.6.4.7 etherStatsMulticastPkts
Description: The total number of good packets received that were directed to a multicast
address. Note that this number does not include packets directed to the broadcast address.
10.6.4.8 etherStatsOctets
Description: The total number of octets of data (including those in bad packets)
received on the network (excluding framing bits but including FCS octets).
10.6.4.9 etherStatsOversizePkts
The total number of packets received that were longer than 1518 octets (excluding framing
bits, but including FCS octets) and were otherwise well formed.
10.6.4.10 etherStatsPkts
Description: The total number of packets (including bad packets, broadcast packets, and
multicast packets) received.
10.6.4.12 etherStatsPkts128To255Octets
Description: The total number of packets (including bad packets) received that were
between 128 and 255 octets in length inclusive (excluding framing bits but including FCS
octets).
10.6.4.13 etherStatsPkts1519ToMaxSizeOctets
Description: The total number of packets (including bad packets) received that were
between 1519 and the highest allowed frame size.
10.6.4.14 etherStatsPkts256To511Octets
Description: The total number of packets (including bad packets) received that were
between 256 and 511 octets in length inclusive (excluding framing bits but including FCS
octets).
10.6.4.15 etherStatsPkts512To1023Octets
Description: The total number of packets (including bad packets) received that were
between 512 and 1023 octets in length inclusive (excluding framing bits but including FCS
octets).
10.6.4.16 etherStatsPkts64Octets
Description: The total number of packets (including bad packets) received that were 64
octets in length (excluding framing bits but including FCS octets).
10.6.4.17 etherStatsPkts65To127Octets
Description: The total number of packets (including bad packets) received that were
between 65 and 127 octets in length inclusive (excluding framing bits but including FCS
octets).
10.6.4.18 etherStatsUndersizePkts
Description: The total number of packets received that were less than 64 octets long
(excluding framing bits, but including FCS octets) and were otherwise well formed.
10.6.4.20 ifInErrors
Description: The number of inbound packets that contained errors preventing them from
being deliverable to a higher-layer protocol.
10.6.4.21 ifInNUcastPkts
Description: The number of packets, delivered by this sub-layer to a higher (sub-) layer,
which were addressed to a multicast or broadcast address at this sub-layer.
10.6.4.22 ifInOctets
Description: The total number of octets received on the interface, including framing
characters.
10.6.4.23 ifInUcastPkts
Description: The number of packets, delivered by this sub-layer to a higher sub-layer,
which were not addressed to a multicast or broadcast address at this sub-layer.
10.6.4.24 IfInUnknownProtos
Description: The number of packets received via the interface, which were discarded
because of an unknown or unsupported protocol.
10.6.4.25 IfOutDiscards
Description: The number of outbound packets which were chosen to be discarded even
though no errors had been detected to prevent their being transmitted. One possible reason
for discarding such a packet could be to free buffer space.
10.6.4.26 IfOutErrors
Description: The number of outbound packets that could not be transmitted because of
errors.
10.6.4.27 IfOutNUcastPkts
Description: The total number of packets that higher-level protocols have requested to be
transmitted to a non-unicast (i.e., a subnetwork-broadcast or subnetwork-multicast) address,
including those that were discarded or not sent.
10.6.4.29 IfOutUcastPkts
Description: The total number of packets that higher-level protocols requested be
transmitted, and which were not addressed to a multicast or broadcast address at this sub-
layer, including those that were discarded or not sent.
2D mode
1 2 3 4 5 Parity
Figure 170. Structure of the FEC matrix for FEC Modes 1D and 2D.
Figure 171. Synchronization of a DTM network. During fault free operation, the network is
synchronized to the external reference (clock 0). A minimal spanning tree is
built from this clock to all other nodes. When it fails, the network is
synchronized to the backup synchronization source (clock 1).
Smoothing of the sync signal is done with a digital phase-locked loop (PLL) that smoothes
out jitter from for example pointer justifications on the SDH/SONET layer. This signal is
then distributed to all outgoing trunk interfaces and all outgoing frames are aligned and
synchronized with this signal.
If the node sync function detects that the current sync source is unavailable, the node enters
hold-over mode. In hold-over mode, the node sync signal is obtained from the built-in
oscillator, which is adjusted to the average of the frequency of the sync signal over a certain
time before the fault. The time spent in hold-over mode before a new sync source is found,
is in general much shorter than in traditional SDH/SONET networks. Consequently, phase
drift and wander associated with it, is in general not of importance.
When DSYP orders a new sync source, the node sync function must ensure that the
outgoing phase is undisturbed. This is done by adding, to the new sync source, an amount
of phase corresponding to the difference between the new sync sources and the node sync
signal. This makes the outgoing sync signal “transparent” to sync changes.
The node sync function also monitors and maintains the available sync sources.
Element Manager User's Manual Sync and Time Transfer • 181
Nimbra 310, 320, 340, 340-HD, 360, 380 and 600 series 14
Nimbra One 15
Figure 176. Configuration of the clock interface sqc-1:1 in Nimbra One. It is configured to
send out a 2048 kHz signal.
11.4.2.1 Direction
Default value: ‘In + Out’
Type: One of ‘In + Out’, ‘In’, ‘Out’
Range: ‘In + Out’, ‘In’, ‘Out’
Description: Active direction for the external synchronization clocks. ‘In + Out’ means
that both in- and output interfaces are enabled, ‘In’ means that only the input interface is
enabled and ‘Out’ means that only the output interface is enabled.
Figure 178. Nimbra 360 front. The sync interfaces are found at the lower righ
rightt side.
Nimbra 380 is identical to Nimbra 360 with respect to TSI
TSI-1/TSI-22 (sqc
(sqc-1/sqc-
2).
Configuration of TSI--1/sqc-1
1 includes one parameter, time dual frequency mode, with
wi
possible values ‘none ‘or ‘PPS
‘PPS + 10 MHz’. With the parameter set to none, the port is
transformed to a regular external clock interface of the same type as on Nimbra 340/Nimbra
One.
Out In
Figure 179. Nimbra 360 with TSI
TSI-1/sqc-1 1 configured with Time Dual Frequency Mode
equal to ‘None’,
‘None’, i.e. the two ports of the interface are used as regular sync in
and sync
ync out ports.
The sqc-11 interface for Nimbra 360/380 looks a bit different from the corresponding
interface in Nimbra One/340. There are some additional parameters to configure.
When Time Dual Frequency Mode is set to ‘none’, the parameters to configure are the
same as for the Nimbra One/340 case. The parameter ‘Time input offset’ is irrelevant for
Time Dual Frequency Mode is set to ‘none’ and is grayed out in the web interface. Time
input offset is a calibration factor for the time it takes for the clock signal to reach the
Nimbra 360/380 node (from its source), but it is only relevant for Time Dual Frequency
Mode set to PPS + 10 MHz, described in next section. Square sync signals of 1544 kHz or
2048 kHz are automatically recognized by the node (According to ITU-T G.703-13).
When Time Dual Frequency Mode is set to PPS + 10 MHz, TSI-1 expects to receive two
signals: one PPS (pulse per second) on the PPS port and one 10 MHz signal on the Sync
port if the Direction parameter is set to In. If the parameter is set to ‘Out’ these signals are
sent to the ports. Selecting the clear defects box and clicking on OK or Apply makes a new
reading of the defects.
If one or both expected signals are missing or of poor quality, it can be deducted from the
web interface where the problem is. It is sufficient to look at Input frequency and Defects.
Unless the node identifies two acceptable signals, the signal is not recognized as an external
sync source and not used by the network. This can be seen on the Ext. clocks → Interfaces
web page.
Figure 184. Configuration of sqc-2/TSI-2 of Nimbra 360/380 with Time dual frequency
mode set to PPS+10 MHz.
Sync Out In
Time transfer in PPS In 10 MHz In
Time transfer out PPS Out 10 MHz Out
The web page shows the different synchronization sources and their status, as follows:
If the node has access to several clocks with the same priority, different from 0, the clock
originating from the node with the lowest Node Mac address becomes the active clock. If
there are two external clocks with priority 0, both are allowed as master sync sources and
the sync network is segmented. This case is described in the subsequent chapter.
node1
node11
Nimbra One
Nimbra One
Figure 189. Illustration of sync distribution in a case with two master sync sources, both
with priority 0. The nodes take their sync from the closest sync master. In case
the distance is equal, the sync source attached to the node with the lowest
MAC address is preferred.
Figure 190. The sqc-1 interface of node1, a Nimbra One node, details the defect (Loss of
(sync) signal).
Figure 191. The LEDs on the two interfaces TSI-1/sqc-1 and TSI-2/sqc-2 on Nimbra
360/380. On Nimbra 310/320, only TSI-1/sqc-1 is available.
Details on the faults described can be found by following the link Ext. Clocks → Interfaces
and sqc-1 or sqc-2 depending on which clock is faulty.
Defect Description
Loss Of Signal (LOS) No input signal detected.
Loss Of Frame (LOF) Input signal not properly aligned to reference
clock. Most frequently caused by too large
frequency deviation between reference clock
and input signal (should probably be renamed
to something better).
Signal Frequency Mismatch (SFM) Input frequency does not match requirements
of operational mode (e.g. 2048kHz in
PPS+10Mhz operational mode).
Excessive Phase Deviation (EPD) Output realignment limit has been exceeded.
Loss Of Alignment (LOA) Output reassignment limit has been exceeded.
Ok No defect detected
Figure 193. Details of Defects of the squelchable clocks described above.
Yes, must Only Nimbra One with If there is no external reference clock, the network may
have OC-48/STM-16 X-ADM synchronize to a Nimbra One with a built-in Stratum 4
or 2 x OC-12/STM-4 oscillator, and since the listed trunk supports only
or 4 x OC-3/STM-1 network timing mode this may result in a line rate that
or 4 x DS3/E3 Trunk exceeds the ±4.6 ppm SDH/SONET standard limits.
If several types of nodes are combined in the network,
this should not happen in GX4.8 as the nodes have an
internal clock priority according to the accuracy of the
clocks.
Yes, SDI Video service This service has a very hard requirement on drift rate that
preferred can only be guaranteed with a high stability clock
reference.
1
Note that 2.048/1.544 MHz signals shall be “clock signals”, i.e. sine or square wave.
The port does not support E1/DS1 framed signals. The external sync in port
automatically detects if a 2.048 or 1.544 MHz clock is attached.
Element Manager User's Manual Sync and Time Transfer • 199
Nimbra 310, 320, 360 and 380 can also use a 10 MHz signal as reference input.
Redundant GPS controlled sources are preferable. If the primary reference clock goes
down, DSYP will switch over to a secondary reference clock with the same frequency, and
thus avoid a possible frame
frame-slip in the transition process. These excellent sources may be
configured as external sources with priority 0, to use synchronization network
segmentation.
It is recommended
ecommended to connect the external reference clock to a centrally positioned node, in
order to get as few hops as possible to all or most nodes.
Note: Regardless of external clock source, it must disable its output upon
error in order to signal to the network that the clock source has failed.
This may require configuration in the
th source. PRC sources not
supporting mute/squelch of outputs on detected errors are not
recommended since they have a high probability of causing large
network errors difficult to pinpoint to the timing source.
Note: Nimbra One should not be used as a timing node. If still used, only
square wave signals of high amplitude must be used.
4 x OC-3/12/48 /
STM-1/4/16 See 0
Trunk
OC-192 / STM-64
See 0
Trunk
3 x IP/Ethernet See 0
Figure 195. Capabilities of Nimbra trunks
The parameter ‘Allow as sync source’, which was defined on the trunk configuration page
in GX4.7, has now been moved to the configuration page of the DTM interface.
11.9.3.4 IP/Ethernet Trunk for Nimbra One/300 and built-in ports on Nimbra
310/320/360/380
This module has one option, Enable sync recovery, which is by default enabled. The option
may be disabled in e.g. the following cases.
Interconnection of two Nimbra networks via an IP/MPLS/Ethernet link.
If each of the two Nimbra networks is synchronized via a centralized external
synchronization source, it may be beneficial not to not transport the sync from one network
to the other over the IP connection but rather use two synchronization sources for the two
parts of the network. This requires that both external references are synchronized (for
example both references are tied to GPS clocks) to avoid slips.
Single Frequency networks (SFN).
When feeding transmitter sites with the IP/Ethernet trunks in an SFN use case, GPS clocks
are needed to provide time synchronization for SFN operation, since the IP/Ethernet trunk
does not support the Time Transfer functionality.
on the Trunks → Interfaces web page. These counters are reset each time the web page is
accessed. (Note that if several users are logged in, it may be reset of another user accessing
the page). These counters give information about the difference between the line rate of the
interface and the DTM network frequency. For interfaces in Network timing mode the TX
counters should be zero. In the RX direction an intermediate SDH/SONET network could
introduce pointer justifications also when in Network timing mode.
In our case, the external clock priority is set to 4 and the administrative status is set to ‘Up’.
The second step in configuring time transfer is to enable the links on all nodes using or
passing time transfer signals. This is made from the DTM → Time transfer link.
Figure 198. Time transfer configuration web page for node iov101, the source for time
transfer.
Element Manager User's Manual Sync and Time Transfer • 205
Figure 199. Time transfer configuration web page for a specific interface.
On this page, the administrative status can be set. The administrative status is set to ‘Down’
for all trunks by default. In order to let the system handle selection of a suitable
synchronization
tion source, it is strongly recommended to set the administrative status on all
trunk interfaces to ‘Up’ when using the time transfer feature. Time transfer channels are
then established exactly where they are needed, automatically.
Note: Setting the administrative status to ‘Down’ on an interface with operational status
‘Up’ forces the operational status to state ‘Down’ and disab
disables
les the time transfer
function.
No warning is given to nodes further down in the synchronization chain, but an
event is gene
generated in the event log.
This setting is strongly discouraged.
The parameter ‘Calibrated Round trip ratio’ is the difference between the return trip time
divided with the round trip time and ½,, expressed in ppm of the round trip time. Observe
10,1 ms
A 9,9 ms
B
Figure 201. All Channels listed, including all Time Transfer channels.
Figure 202. Open ended protection with performance monitoring on both streams on
(separate) sink TTPs.
Ethernet ports, both physical interfaces on the nodes and virtual ETS interfaces. On these
ports, monitoring is available for two different logical objects in each port. The source
object monitors outgoing streams and the sink object monitors inbound streams to the port.
They are shown as eth-source, eth-sink, ets-source or ets-sink on the performance
monitoring web pages.
Node A Node B
Forwarding Forwarding
function function
eth-src ets-sink ets-src eth-sink
Point of PM measurement
Figure 204. Illustration of a bidirectional ETS connection between two Nimbra nodes. The
four performance monitoring objects per node track incoming traffic (shown as
small circles here).
The monitoring points are sampled every second and a new performance monitoring period
is started every 15 minutes, on the quarter (hh:00, hh:15, hh:30, hh:45). The 24h periods are
synchronized with the 15m periods, i.e. the first 24h period and the first 15m period start at
the same time. Timing is taken from the Date/time function of the various nodes.
When a new period starts, all regular counters are reset to zero and, if appropriate, the ZS
counter is increased with one. The Zero Suppression (ZS) counter registers number of fault
free periods prior to the current period.
Performance reports are issued at the end of the measurement intervals. Performance
reports are logged and the size of the PM log is configurable to be large, small or none. A
Element Manager User's Manual Performance Monitoring • 209
12.2 General
In the web interface, Performance monitoring is found under the Perf. monitor link.
Figure 205. Performance monitoring web page. The sub-sections are Configuration and
Data.
The general configuration settings for all performance measurement points in a node are set
on the Perf. Monitor → Configuration web page.
The configurable parameters on this page are described in the table below:
Even though very large values are allowed for the number of large and small history logs, it
is recommended to stay at or close to the default values. Excessive values leads to out-of-
memory problems at some unspecified time in future.
When the parameters have been set, click on ‘OK’ or ‘Apply’ to store the settings in the
node. Apply takes the user back to the starting page for performance monitoring, while OK
keeps the user on the configuration web page.
Parameter Description
(G.826)
UAS Unavailable Second is a second of unavailable time. Unavailable time starts after
ten consecutive SES and ends after ten non-consecutive SES.
SES Severely Error Second (Subset of ES) is a second of seriously faulty available time.
One second of available time containing ≥30% EB or at least one defect. Ten
consecutive SES seconds begin UAT state while ten consecutive non-SES seconds
end UAT.
ES Error Second is a second of available time with one or more BBE.
BBE Background Block Error is the number of errored blocks found during one second
of available time that is not part of SES.
SS Slip Second is one second containing one or more Slips, which is Applicable for
trunk modules.
Suspect If this parameter value is yes, all counter values may be erroneous and should be
interpreted with care. Incomplete measurement periods are set to yes; otherwise it
can be expected to be no.
ZS Zero suppression (counter) tells the number of periods with all performance
parameters being zero before the current period.
Figure 208. Performance Monitoring, monitored parameters
The block sizes are different for different trunks, accesses and services. The current block
sizes are:
Figure 210. The data presentation web page is also the entry point for configuration of a
single PM object (by following the Configuration tab).
Below, the object is configured. All different types of objects are configured the same way.
All headings on this page within parenthesis like (interface), (service), (direction) etc
include all values for this parameter. If a set value is chosen, like setting (interface) to
‘Trunk’, then only PM object with that value are displayed in the listing generated with a
click on the show button. The entries in these drop-down menus depend on the particular
configuration of the node. In the pictures below, this is illustrated.
Figure 213. Possible values for the parameter (interface). The default value shows all
entries, Trunk show all trunk PM objects, Access show all access PM objects
and TTP show all PM objects ending on TTPs (previously called connection).
Figure 215. Possible values for the parameter (direction) are ‘source’ or ‘sink’. Source
means signals originating from the measuring point and sink means signals
terminating on it.
Figure 216. Possible values for the parameter (errors) are ‘15m errors’ and ‘24h errors’.
Figure 218. Possible values for the parameter (oper status) are ‘Oper up’ and ‘Oper down’.
All the parameters shown in the top row form a filter, through which all PM object log
entries are passed. Only those PM object log entries that satisfy all conditions are listed on
the web page.
All configured PM objects in the node are presented in the lists that are seen in the drop-
down menus. Available PM objects depend on the node configuration.
Trunk PM available
IP/Ethernet trunks Yes
SONET/SDH trunks Yes
PDH trunk (4 x DS3/E3 for Nimbra 300) Yes
Figure 220. PM implementation on different trunks
Access PM objects are monitored on the incoming Rx port of the access interface on the
access modules which has the feature implemented.
Node A Node B
Access Access
Modules Modules
Trunk Rx Trunk Tx Trunk Rx Trunk Tx
Tx Rx Tx Rx
TTP objects can be monitored both on their source and the sink interfaces, i.e. they are
logically divided into two separate objects. PM on the sink interface is supported in most
cases, whereas PM on the source interface is limited to Ethernet PM objects (physical ETH
and logical ETS interfaces).
Node A Node B
Access Access
Modules Modules
Trunk Rx Trunk Tx Trunk Rx Trunk Tx
DTM
TTP TTP TTP TTP
Trunk Tx Trunk Rx Trunk Tx Trunk Rx
sink src sink src
Tx Rx Tx Rx
Note that for the source PM objects, errors occur in particular when the buffer for the
outgoing stream is filled and packets are dropped. This is quite different from sink
interfaces, where the cause of errors is lost packets in transit.
12.5.2 Services
Under the (services) heading, PM objects can be sorted by service. Observe that the
combination of (interface) and (service) can create logically inconsistent and for that reason
empty sets. For example, if interface is chosen as Trunk and Service SDI, the created set is
always empty as an SDI trunk is logically inconsistent.
Some services, like Ethernet, can be both trunk and access. Other services are either always
trunk or always access.
12.5.3 Direction
Under this heading it is possible to select if you want PM data only for points in the
network where traffic is terminated (i.e. sink) or where traffic originates (i.e. sources).
12.5.4 Error
Under this heading, it is possible to filter out all entries for15m or for 24h. The default
setting is to look only at those entries with one or more non-zero counters for the past 15
minutes or in other words only look at those counters with some action.
Figure 225. All entries in the list are selected by selecting the tick box in the top row, with
the headings. Objects can be removed from the selection by clicking in the tick
box in the leftmost column.
With all selected PM objects, it is now possible to reset the counters with a single click on
the ‘Go’ button. Alternatively, the admin status of the PM objects can be set to either ‘Up’
or ‘Down’. Just change the value in the (change selected item) drop-down menu and click
on the ‘Go’ button.
Figure 226. Details of trunk sonet/sdh-3:1 is obtained by clicking on the link to this trunk.
On this web page, the current values of the counters are presented as well as a graph of
previous measurement periods. For a tabular form of the data, the link History details can
be used. Similar graphs and history details are available for 24h counters.
Parameter Description
Interface name The name of the interface, STM1/OC-3-8:1
Source TTP Source TTP for the outgoing STM-1 stream
Sink TTP Sink TTP for the incoming STM-1 stream
Operational status The operational status of the board: Up, Down or Absent
Description A description of the connection, e.g. SDH/SONET path
Speed The capacity of the interface, 150.336 Mbps.
Purpose Input string, inherited from the source TTP.
Errored blocks Number of errored blocks detected
Defects Presents the defect status of the module; e.g. if the SFP is
absent, the defect status is NSFP (No SFP)
Figure 230. Read-only parameters
Parameter Description
H1 SS bits Configurable path overhead, transparently forwarded through Nimbra nodes.
These bits (‘00’, ‘01’, ‘10’, ‘11’) are not used by Nimbra nodes.
Performance B1 Section overhead
monitoring counters B2 Line overhead
B3 Path overhead
M1 Remote indication of B1
G1 Remote indication of B3
Overhead bytes: SS & C2
Pointer adjustment RPJE+ (Rx Pointer Justification Event, plus)
event, positive and RPJE- (Rx Pointer Justification Event, minus)
negative
TPJE+ (Tx Pointer Justification Event, plus)
TPJE- (Tx Pointer Justification Event, minus)
FJE+ (Frequency Justification Event, plus)
FJE- (Frequency Justification Event, minus)
Figure 232. SDH/Sonet variables and parameters
Variable Description
Interface name The name of the interface, pdh-1:2
Source TTP Originating TTP
Sink TTP Terminating TTP
Operational status The operational status of the board: Up, Down or Absent
Description A short description of the module
Speed The capacity of the access interface
Errored blocks Number of errored blocks
Defects Defect(s) on the interface are presented here
Figure 234. Read-only parameters
2
Earlier, this endpoint of the ETS connection was called TTP (Trail Termination
Point). This term is no longer in use for ETS, but is still used for ITS services.
Element Manager User's Manual Ethernet Transport Service (ETS) • 228
Forwarding Forwarding
function function
DTM
eth5:1 ff5:1 ets5:9 ets4:9 ff4:1 eth4:1
Figure 237. An ETS channel can be defined between two ETS interfaces. The physical
interfaces (ETH) are tied to the ETS interface via the Forwarding Function.
Forwarding
function
Forwarding
function
Forwarding
function
Figure 238. A multicast ETS connection, with a source (iov072) and two destinations
(iov136 and iov137). In this case the traffic is unidirectional, from iov072 to
iov136 and iov137.
In order to define the ETS service as a unidirectional service from the source to all
destination sites, it is sufficient to define the source and destination ETS interfaces.
Multicast service is by default unidirectional. If return traffic is needed, a second
connection must be defined in the opposite direction. Bandwidth need not be symmetrical
in this case.
Forwarding
ets-4:9 ets i/f group function
Forwarding ec
function ets i/f group eS
ets-5:9 ut
Ro
eth-5:1 ff5:1 etsg5:1 Ro
ut Node iov137 - Forwarding function ff4:2
eP
ets-5:10 ri
Ro Forwarding
ut ets i/f group function
eS ets-4:11
ec
Figure 239. Example of multicast hitless setup of ETS 1+1 protection with two
destinations.
Figure 240. Illustration of the objects eth-source, eth-sink, ets-source and ets-sink.
Element Manager User's Manual Ethernet Transport Service (ETS) • 232
The Forwarding Functions ff5:1 and ff4:1 should be configured the same way. In this
example we choose:
VLAN Mode Transparent
MAC Mode Auto or Nomac
MAC Aging Time Any allowed value works, default is recommended
Spanning Tree Auto (default) is recommended
Jumbo Frames On (default) is recommended
Fault propagation Off (default) is recommended
The Ethernet interfaces (eth5:1 and eth4:1) must be tied to their respective Forwarding
Functions (ff5:1 and ff4:1). ETS unicast connections between ets5:9 and ets4:9 are set up
on two separate web pages; the local DSTI number must match the destination DSTI set up
on the other ETS configuration page.
This configuration is typically set up as a bidirectional channel, but it is not necessary to set
up the return channel in case the traffic pattern is just a stream without return traffic.
Forwarding
function
Forwarding
function
Forwarding
function
Figure 242. A multicast connection between one ingress and two egress interfaces.
All Forwarding Functions can be defined with VLAN mode transparent and Mac mode
auto. Mac Aging Time can be chosen as the default, 300 s, as well as Jumbo Frames (On)
and Fault Propagation (Off). In ff5:1, an ETS multicast connection is set up with two
destinations. On the terminating ETS interfaces, a multicast ETS connection is defined.
Make sure the used local DSTI matches the destination DSTI entered in the originating
ETS interface. No destinations should be entered at the egress sites, unless the intention is
to set up return traffic to the originating node.
In this case, Ethernet capacity is reserved from the ingress interface to the egress interfaces,
but no capacity is reserved in the other direction.
The respective Forwarding Functions need to be connected to relevant Ethernet interfaces.
VLAN settings may be Acceptable Frame Type: All; Default VLAN: 1 and Transmitted
Frame Type: Tagged.
Forwarding Forwarding
function ets i/f group Route pri ets i/f group function
ets-5:9 ets-4:9
Forwarding
ets-4:9 ets i/f group function
Forwarding ec
function ets i/f group eS
ets-5:9 ut
Ro
eth-5:1 ff5:1 etsg5:1 Ro
ut Node iov137 - Forwarding function ff4:2
eP
ets-5:10 ri
Ro Forwarding
ut ets i/f group function
eS ets-4:10 eth-4:5
ec
etsg4:2 ff4:2
ets-4:12 eth-4:6
This type of protection can be used for streams between one source and one or more
destination(s) (i.e. the physical Ethernet ports in this case). In our example, we have two
destinations in the same node (and even module). The different destinations can be
configured independently of each other, i.e. they can have a mixture of hitless protection,
standby protection and even unprotected ETS interfaces.
Forwarding
function
Forwarding
ets-4:9 ets i/f group function
ets-4:10
Node iov072 - ff5:2
Route Sec
Forwarding
function
Figure 245. Open ended configuration of ETS 1+1 protection. This type can be used both
for unicast and multicast connections. The streams can be bidirectional, but for
practical applications they are mostly unidirectional.
Forwarding
function
ets5:9
Forwarding
function
Node iov137
eth5:1 ff5:1 ets5:10
Forwarding
function
ets5:11
ets4:9 ff4:1 eth4:1
Node iov138
Forwarding
function
Figure 246. Ethernet switching with one switch and three more nodes.
External Ethernet
Switch
VLAN 1-3
Node A eth1:1
VLAN 1-3
VLAN Mode: Customer
ff1:1 Mac mode: Auto
VLAN 2 VLAN 3
ets1:9 VLAN 1 ets1:10 ets1:11
Acceptable frame type All
Transmitted frame type VLAN tagged
DTM
Figure 247. An external Ethernet switch with aggregated traffic from three separate
VLANs has its traffic separated on three different Ethernet interfaces.
Different customers can share one common Ethernet interface in the Nimbra network.
VLAN tagging makes it possible to separate the different VLANs in a Forwarding Function
(in this case ff1:1) to three different ETS interfaces. On the outgoing Ethernet interfaces,
typically the tags are removed, but this is dependent on the particular application.
Figure 249. The configuration page obtained by clicking on the Devices link.
The starting point for configuration of Forwarding Functions and ETS interfaces is found
by clicking on the name of the particular device to be configured or use the ‘Create FF’
button.
Although only (at most) eight forwarding functions can exist on a module, they can be
numbered between 1 and 999999. It is recommended to use automatic selection and use
numbers sequentially, unless there is a compelling reason.
Each Forwarding Function is associated with a number of Ethernet (ETH) and ETS
interfaces. All Ethernet and ETS interfaces associated with a specific FF must be defined on
the same module as the Forwarding Function itself is defined.
The basic configurable parameters (settings) for a forwarding function are: Customer ID,
Purpose, VLAN Mode, Mac Mode, Mac Aging Time, Spanning tree, Jumbo Frames and
Fault propagation.
A Forwarding Function can currently be set in two different VLAN modes and three Mac
modes (auto, mac, nomac). When set to auto, nomac mode is selected if only two ports are
connected to the FF and mac mode otherwise.
In the table below the behavior of the forwarding function is discussed as a function of
these two parameters.
Figure 254. The table shows available VLAN and Mac Mode settings of Forwarding
Functions. The operation of the FF is lined out for the different cases.
There are five tabs to configure in a Forwarding Function, Basic settings, Advanced
(settings), Diffserv, Spanning Tree and Statistics (see Figure 253). Note that you have to
use the Apply or OK button on each page before moving on to the next tab configuration.
Figure 257. Priority selection: Two priority modes are allowed (Diffserv and Ethernet) on a
per-Interface basis. Traffic class mapping leads to two queues. The number
after the \ sign is the number of bits used.
Ethernet user priority is supported according to the standard for prioritizing Ethernet frames
based on information in the Ethernet user priority field, which is part of the VLAN tag.
This Priority Code Point (PCP) field only exists in VLAN tagged Ethernet frames and is
standardized by IEEE in [802.3] and [802.1D]. On Ethernet packets without VLAN tag
using Ethernet user priority, a default Ethernet priority is defined on the Advanced
configuration page of the ETH/ETS interface, just below MAC learning.
Figure 260. Spanning tree configuration for spanning tree mode process
Heading Description
Rx Accepted Number of accepted packets
Rx Drops Number of dropped packets
Rx Errors Numbers of errored packets
Tx Sent Number of transmitted packets
Tx Drops Number of transmitted packets
forced to be dropped
Figure 263. Interface statistics, headings
In the table below, the basic settings for of these products are shown below.
Customer ID No restrictions
Purpose No restrictions
VLAN mode Customer (not settable and not presented)
Mac mode nomac (not settable and not presented)
Mac Aging time In the web, only ‘0’ is allowed. The value is irrelevant and not used.
Spanning tree Forward (not settable and not presented)
Jumbo frames off (not settable and not presented)
Fault propagation Should not be presented
Figure 265. Capabilities for Nimbra One, Nimbra 340/340-HD and 360
As can be seen in the web GUI for Nimbra 340-HD, two links from Nimbra 600 are
missing (Advanced and Spanning Tree). This is also true for Nimbra One/340/360.
Priority Priority
Hi Hi
Lo Lo
VLAN mode
Ethernet Hi Hi
Forwarding
frames
Lo
Function Lo
Mac mode
Hi Hi
Lo Lo
Figure 270. Basic configuration settings for an Ethernet interface with a forwarding
function in VLAN mode customer set to accept all VLANs.
Element Manager User's Manual Ethernet Transport Service (ETS) • 262
Additional configuration parameters to configure for Ethernet and ETS interfaces, when the
forwarding function has value ‘customer’ are presented in the next table.
A VLAN id is always interpreted in context of the VLAN mode set for the FF that the
VLAN is associated with. If the FF is in VLAN mode Customer, then the VLAN id is
identical to an IEEE 802.1Q tag.
If ‘VLAN Mode’ of the FF is set to transparent, there is no need to define a VLAN as the
FF then ignores the VLAN tag.
Queueing Auto on all Max frames: auto, With these parameters the length of
parameters four disabled, manual the queue on the interface can be
parameters set. If manual is set, an integer must
Max bytes; auto, also be given in the input box for
manual integers.
Both max frames and max bytes
can be set.
Unless familiar to these settings, it
is recommended to keep the default
settings.
It is strongly recommended that the Queueing parameters are left with their respective
default values. Setting these parameters manually requires skill and experience. Setting max
frames to disable means effectively that all packets are dropped as the queue is turned off.
Setting them to manual and a number controls the maximum number of frames in the queue
and the total number of bytes in those frames. Contact Net Insight for more information.
Autonegotiation of interface rate, protocols etc is made with the Autoneg feature on the
Ethernet interface set to ‘On’. This is also an Ethernet interface specific advanced feature.
Advertised Auto Auto All HW supported speeds (by module and SFP) are
speed advertised. Recommended
1000 Only 1 Gbps is advertised
100 Only 100 Mbps is advertised
10 Only 10 Mbps is advertised
100,10 100 and 10 Mbps are advertised
1000,100 1000 and 100 Mbps are advertised
1000,10 1000 and 10 are advertized
1000,100,10 1000, 100 and 10 Mbps are advertised
Advertised Auto Auto All supported duplex forms are advertised.
duplex Recommended
Full Only full duplex is advertised
Half Only half duplex is advertised
Figure 283. Configuration of ETH and ETS interfaces, illustrated with multicast ETS
interface. Parameter ‘Expect channel’ is only present on the ETS interface and
this is the only parameter differing between ETS and ETH interfaces.
Addition of new interfaces is made from the ‘Add destination’ button. Here the admin
status of the destination is set together with destination node, destination DSTI and source
routes to the destination. Add source routes as needed. New source routes are defined under
All connections → Source routes.
To add a destination, click on the ‘Add Destinations’ button and define:
Spanning tree is specified in IEEE 802.1D from 2004. Net Insight adheres to the
specification. The configurable spanning tree parameters on the interfaces are ‘Port path
cost’, ‘priority’, ‘edge port’ and ‘point-to-point’. The parameters are explained in the table
below:
Port path cost defines a cost associated with the particular port/ interface. If two or more
interfaces are available for a connection to a particular node, the spanning tree algorithm
ensures that only the low-cost interface is used.
Priority defines the priority of the particular interface. Two hexadecimal digits plus two
hexadecimal 0s are added as a prefix on the MAC address of the interface to create the
identifier. The lowest identifier interface is used, in case there are two interfaces with equal
cost.
Edge port is a Boolean variable used to signal if the interface is connected to equipment not
part of the DTM Ethernet universe (true). Auto means that auto detection is used.
Point-to-point is a Boolean variable used to signal if the interface is connected to a link and
a node with a point-to-point connection. Auto means that auto detection is used.
Figure 290. ETS statistics for all ETS interfaces in a particular node.
PDH
Video
Video access
DTM channel interface
Remote
DTM
i/f
DTM
Video access
interface Local
DTM
i/f
PDH
Video
Interface Originating
Connection Terminating Interface
asi-2:1
Connection asi-1:2
itso-1
itsi-2
TTP Source
TTP Sinc
Terminating Terminating
DTM node DTM node
DTM
Originating
DTM
node
HD-SDI
Figure 293. HD-SDI video transported with a DTM multicast channel to two destinations
This chapter describes how to configure ITS services, both uni- and multicast. The main
web page for ITS is shown below.
15.2 Protection
15.2.1 Nomenclature
15.2.1.1 Closed ended protection
Closed ended protection is a protection case where one video stream enters the Nimbra
network. It is split at the entry point and routed two separate ways through the Nimbra
network to the destination node. At the destination node both streams come together and an
egress stream is designed by either one of the streams or a combination of the two streams.
Figure 295. Source stream sent through DTM network along two independent routes for
type 1 protection. This protection type only supports unicast connections and
standby protection on sink Interface B.
Figure 296. Open ended type 2 protection of ITS streams. This protection type supports
standby protection with uni- or multicast streams.
DTM
Source TTP A2
Figure 297. Stream sent through the DTM network along two independent routes for type
2 protection (closed-ended). This protection type supports standby protection
with uni- or multicast streams. This configuration is the single source (closed
ended) version (previous case).
Figure 298. Type 3 protection, open ended case, of ASI and JPEG2000 streams. This
protection type supports standby protection with uni- or multicast streams.
DTM
Interface A Interface B
Figure 299. Source stream sent through DTM network along two different routes for type
3 hitless or standby protection. This configuration is the closed ended version
of type 3 protection (previous case). Hitless or standby protection is
configured on the sink interface.
15.3.1.6 Loopback
Default value: None
Type: one of None, Line or DTM
Range: None, Line, DTM
Description: None sets No loopback; Line sets Line side traffic is in loopback mode, i.e.
traffic arriving at the Rx interface is sent back on the associated Tx interface; DTM sets
DTM side traffic in loopback mode, i.e. traffic exiting on a Tx interface is looped as closed
to the interface and returned on the corresponding Rx interface. Some modules may not
have all capabilities.
15.3.1.12 H1 SS bits
Default value: 10
Type: Two bits in any combination
Range: One of 00, 01, 10, 11
Description: Sets the two SS bits (bit 5 and 6) in the H1 byte. These bits typically should
not need to be changed from the default setting. If the external equipment attached to the
interface is older, there might be a need to change them but this should be elaborated in the
documentation for the external equipment.
configured interfaces
configured interface
JPEG encoding
JPEG decoding
Enable signal speed x x x
autosensing x
Output action on signal fail x x x x x x
Output mode x
Ignore TS-packet
synchronization errors x
Suppress alarms x x x x x x
Loopback x x x x x x
JPEG 2000 encoding x
Signal format x
Interface mode
Transmit sync source
Synchronization Status
Message (SSM)
H1 SS bits
Interface to monitor M M M
Interface direction to
monitor M M M
Enable front-panel selection
button
PDH signal to transport
Figure 302. Cross-table Configuration parameters vs. Access Module for Nimbra 600. M
designates monitor interface.
On this ITS → Sink TTPs → Add TTP web page, type can be set to terminating (sink) or
originating (source). If type is set to terminating, Mode can’t be set. As soon as terminating
type is selected, the parameters for mode become irrelevant and are grayed out..
Element Manager User's Manual Isochronous Transport Service (ITS) • 292
Follow the ITS → TTPs link; a page appears like the page below.
Click on Add TTP … to enter the setup page. A page similar to the page below will appear.
In the web page, the same settings as for the terminating TTP can be
b made.
Make the settings required (Originating/Unicast), uuse the drop-down
down menu to set the local
interface and click on the Add button.
In addition to the settings made for the termination, in the originating node the destination
DTM node with associated destination DSTI are needed. The required capacity must be
specified, either as a bandwidth (0.8-212 Mbps) for ASI or SDI (270 Mbps), SDI
compatible (from Nimbra 600 to Nimbra One/300), HD-SDI (1.485 or 1.485/1.001 Gbps),
3G-SDI (2.970 or 2.970/1.001 Gbps) or SDI compressed with the requested (compressed)
bandwidth.
We must also specify if we use protection and the source route(s) we use (if any). If a
source route is used, this is indicated on the web page with the text ‘currently used’ within
parenthesis to the right of the source route itself.
See chapter Source Routing for additional information on how to setup a source route.
Once both terminating and originating nodes are configured, the channel is established if
enough transport bandwidth is available.
sdi2:6 Egress
itso-3 itsi-4 sdi4:4 DSTI 4
In the figure above, let sr C from node1 to node2 via node4 and node3 be defined by
The source routes to node3 (sr B) and node4 (sr A) must then be defined as
Problems of this type are avoided if DRP is used for routing of multicast channels. DRP
routing of multicast channels have other, possibly undesirable, features though. With the
DRP protocol, routing is made destination per destination and conservation of bandwidth is
not considered. In other words, bandwidth allocation may not be optimal.
Figure 314. ITS basic setup for source TTP and multicast service.
In addition to common parameters with the unicast case, there is an extra link to
Destinations, where the details about the various destinations are entered.
Click on the Destinations in the middle of the page, to set the multicast destinations for the
originating connection. This page shows the nodes that are configured in this connection.
In order to define the destinations, click on the button Add destination and enter the
parameters for the sink TTPs. In the following figures, the two destinations of our example
are shown.
Set Administrative status to ‘Up’, Destination DTM to iov132 and destination DSTI to 3
and 4 for the two different cases. The destinations have now been added. In this case, we
have not used source routes.
When all the nodes are added click on the Cancel button, a list of the destinations is shown
in the Destination page. As the terminating side is not yet defined, the destinations are listed
as down.
Select the type to Terminating and use the pull-down menu to set the local interface.
Click on the Add button. Repeat for all destinations.
Follow the ITS → Source TTPs link,, open an originating TTP by following the TTP name
link, open the Advanced link; a page appears like the page below.
This menu controls the parameters of the exponential back-off algorithm (Connection re
re-
establishment),, including the re
re-connect time out.
alarm: This tick box is selected by default. In case it is
Suppress primary source route alarm:
not selected, an alarm with severity warning is raised when the primary source rou
route is not
used.
Minimum interval:: 10 ms. The starting value of the back-off algorithm. After a tear down
of the connection, the system tries to re
re-establish the connection immediately. If
unsuccessful, after a wait of 10 ms a second attempt is made. A thirdd attempt is made after
a longer time according to the algorithm.
Maximum interval:: 50000 ms. The end value of the algorithm. The rere-establish
establish
mechanism will wait not longer than 50000 ms to re
re-establish a channel.
Precedence: This drop-down
drop menu determines if the connection has precedence or not,
not i.e.
if it is torn down fast (and is re
re-established fast).. Maximum five are recommended per
node.
If required, back up the configuration changes; see chapter Maintenance,, section
Configuration handling for details.
Element Manager User's Manual Isochronous Transport Service (ITS) • 302
Figure 321. Configuration of the HD-SDI channel that is used for transportation of an ASI-
signal. Requested capacity is 1.485 Gbps.
After configuration of the HD-SDI channel, the ASI stream is simply attached to the proper
port. A look on the ITS -> interface web page of the source interface then shows the
bandwidth used by the ASI stream.
Figure 324. The Add TTP configuration page for ITS. In this example, a terminating TTP
on local interface asi-4:5 in iov132 is set up.
Clicking on ‘Add’ takes the user to the configuration page of the sink TTP.
Figure 331. Configuration of a new destination for a multicast channel. New destinations
can be added while the channel is active. They are specified with destination
node/DSTI and optional source routes. All configuration parameters here are
already defined in the unicast case (Figure 329).
Output action on Drop-down None, Mute None If set to ‘Mute’, the failed signal
signal fail muted (i.e. shut down) on the
output access interface. Muting
may speed up fail-over switching
time when using external fail-
over switches. If set to ‘None’,
different actions are taken
depending on service type.
Suppress alarm Drop-down None, warning, all None Should alarms be disabled on the
interface? None means no,
Warning means all alarms with
severity warning and all means
all alarms.
Output mode Drop-down Auto, Spread, Auto How should the outgoing ASI
Burst stream be sent, in spread or burst
mode?
Figure 333. Interface configuration parameters
48 kHz 48 kHz
Figure 335. Timing of a MADI signal on ingress and egress interfaces. The 48 kHz is a
reference clock, which needs to be attached to the outgoing interface module
of the terminating Nimbra node.
Observe that MADI does not use the through-timing of all other services. Instead, a
separate clock is needed to synchronize the egress traffic of the stream.
Figure 337. The Add TTP configuration page for ITS. In this example, a terminating TTP
on local interface aes/ebu-8:1 in iov018 is set up.
Clicking on ‘Add’ takes the user to the configuration page of the terminating TTP.
Configuration the originating TTP is made from the following web page.
Figure 341. Configuration parameters for a unicast MADI stream on the originating TTP
Figure 344. Configuration of a new destination for a multicast channel. New destinations
can be added while the channel is active. They are specified with destination
DTM node/DSTI and optional source routes. All configuration parameters here
are already defined in the unicast case (Figure 329).
This interface has three parameters to configure; ‘Output action on signal fail’, ‘Suppress
alarms’ and ‘Loopback’. In some cases the settings are not relevant, but as originating and
terminating interface are configured the same way they are nevertheless presented. The
parameters are presented in the table below.
15.9.3 Timing
MADI timing is defined under the tab ITS → Interfaces → Timing.
Figure 349. Timing definition for an interface. There are two parameters to define, ‘Output
reference’ and ‘Operating mode’.
The parameters Operating mode and Output reference exist both on the source (input) and
sink (output) interfaces. On the source interface, output reference is irrelevant and is
ignored and Operating mode must be configured as ‘Audio transport’. For sink interfaces,
the parameters are described in the table below.
Element Manager User's Manual Isochronous Transport Service (ITS) • 323
Figure 351. For the outgoing signal from interface aes/ebu-6:3, the timing is obtained from
the timing provider in aes/ebu-6:8. The configuration of this timing provider is
shown in the next picture.
Figure 353. Configuration of the MADI signal on the incoming interface. Here, no timing
provider is used. Interface 8:8 is the default output reference,, a parameter that
is irrelevant on an input interface.
Note: The test generator integrated in the web interface was developed
to internal Net Insight requirements only. Although it may be
used for others, there is no warranty – neither implicit nor
explicit – for such usage. External users use the integrated Test
Generator entirely on their own risk.
15.10.1 AES
Under the Interface link to the specific AES interface, a Test generator link is available.
The configurable parameters of the AES test generator are shown in the table below.
Sample Drop- 48.0 kHz 32.0 kHz Sample rate for the (non-configurable
configurable) 1 kHz
rate down 44.1 kHz test tone.
48.0 kHz
88.2 kHz
96.0 kHz
176.4 kHz
192.0 kHz
Figure 355. Configurable AES interface test generator parameters.
The test generator generates valid MADI frames and can be aligned to the output reference.
The test generator operates at the nominal sampling rate ± 175 ppm.
15.10.3 ASI
Under the Interface link to the specific ASI interface, a Test generator link is available. This
link is available on the 8 x Video Access Module, 8 x 3 Gbps Video Access Module and the
JPEG2000 Video Access Modules.
Pattern Drop inc The test pattern sent from the output port.
down
inc ‘inc’ means that the null-packet traffic stream is
stuffed with bits in an incrementing pattern –
0x01, 0x02, …, 0xff. Then the pattern repeats
itself.
all0 ‘all0’ means that generated null-packet transport
stream consists of only zero bits
‘all1’ means that the stream consists of only
all1
binary ones
Speed Real 5.000 0.8-212 This is the transport stream bit rate (in Mbps).
Mbps
Forward Binary Disabled Enabled The interface is enabled, which means that 16
Error FEC bytes are added to all packets (204 bytes
Correction instead of 188 bytes)
(FEC)
Disabled The interface is disabled, i.e. no FEC is added
Multi Binary Disabled Enabled MFN is enabled, i.e. all sync bytes are set to
Frequency 0x47
Network
Disabled SFN is enabled, i.e. every eighth sync byte is set
(MFN)
to 0xb8. All other sync bytes are set to 0x47.
Figure 358. Configurable ASI interface test generator parameters.
15.10.4 SDI
Under the Interface link to the specific SDI interface, a Test generator link is available.
Figure 362. Configuration of the terminating TTP. The configuration parameters are
identical as for the previously described ITS streams.
The corresponding originating TTP is defined the same way as other originating streams.
The configuration is made according to the previously described pattern for ITS services.
Figure 364. Configuration of the originating TTP for an STM-1 access module, using a
local interface of vc4/sts3c-4:1
Figure 365. Basic configuration of the vc4/sts3c-4:1. The parameter ‘Suppress alarms’ can
have values ‘None’ (default = no suppression), ‘Warning’ (= suppression of
alarms with severity warning) and ‘all’ (=suppression of all alarms).
The sonet/sdh configuration page gives the user a chance to set the two H1 bits (to ‘00’,
‘01’, ‘10’ or ‘11’).
Figure 367. JPEG 2000 encoding must be enabled in the ‘Enable JPEG 2000 encoding’
tick box on the basic interface configuration page.
All that needs to be configured on this page is the terminating type and the local interface.
The selection of Type equal to ‘Terminating’ immediately grays out the Mode parameter,
as it becomes irrelevant. Clicking on the ‘Add’ button displays the specification web page
of the terminating TTP.
The ‘Add’ button takes the user to the configuration page of the originating TTP. The
interface has to have JPEG encoding enabled (and the parameter is disabled by default),
which is done from the Interface link, if the signal shall be a JPEG2000 compressed video.
Unless JPEG is enabled on the interface, only uncompressed configurations will work.
The default setting of the requested capacity is 270 Mbps. The options in the drop-down
menu are the same, no matter if the interface is configured with encoder enabled or encoder
disabled. However, depending on the setting of encoder enabled, some choices in the drop-
down menu are irrelevant but nevertheless available to the user. They are also selectable
and are accepted by the system. The setting SDI uncompressed 270 Mbps is treated exactly
the same way as the setting SDI compressed User defined 270 Mbps.
Figure 373. Available settings for ‘Requested capacity’, with the default SDI
uncompressed 270 Mbps setting.
The default settings are that all ANC/VBI data and all audio groups are enabled. A way to
transport the compressed streams with less bandwidth is to reduce the amount of
audio/ANC/VBI data transported, in particular the data that is not used in the stream.
In the table below, the required capacity for different types of streams are detailed. The sum
of these values is what should be configured on the source TTP for the stream.
15.12.4 Multicast
Multicast is configured the same way as unicast on the terminating side. When the selection
of multicast is made, originating and terminating are grayed out in the web interface. This
indicates that the selection now is irrelevant and can no longer be made.
On the originating side, a multicast TTP is setup without destinations. The destinations are
added one at a time. Addition of destinations can also be made on active channels, making
it possible to add new destinations to services already in operation.
Destinations are added from the Destinations tab on the configuration page and the ‘Add
destinations’ button on this web page.
Figure 379. Add destinations to a multicast channel. To get to this web page, click on the
Destinations link in the previous picture.
Figure 381. Configuration of the originating interface of the connection. Make sure to
enable JPEG2000 encoding if the channel is using encoded JPEG traffic.
Element Manager User's Manual Isochronous Transport Service (ITS) • 341
Nimbra node
Figure 383. DTM loopback mode.
Figure 386. Timing configuration on an SDI interface, only relevant on the decoder side.
Figure 387. Video configuration on an SDI interface. The page is only available on the
encoding side.
Figure 388. Audio configuration on the encoding side. On the decoding side, it is possible
to monitor what ANC parameters have been transported. Audio groups five to
eight are only available for 3G-SDI speeds.
Figure 390. ANC parameter configuration on the encoding side. The web page makes it
possible to transport only some of the ANC parameters while leaving others.
Default is that all ANC data is transported. On the decoding side, it is possible
to monitor what ANC parameters have been transported.
On the encoding interface, the ancillary (ANC) parameters can be enabled for transport or
not. The parameters are presented in the table below. DID and SDID are Data Identifier and
Secondary Data Identifier respectively.
Note that in order to optimize bandwidth usage, it is important to disable unused audio,
ancillary (ANC) and VBI data. Typically, this information takes up similar amounts of
bandwidth as the video itself.
On decoder interfaces, no Audio, ANC or VBI tabs are included.
Figure 392. Configurable VBI parameters for JPEG 2000 SD-SDI compressed signals with
PAL encoding.
On the encoding interface, VBI lines are individually enabled/disabled. The default setting
is that all VBI lines are enabled and thus sent multiplexed with the encoded stream. The
VBI lines are information carrying lines sent after the last line of one frame but before the
first line of the next frame. VBI lines differ between NTSC and PAL. To select all PAL or
15.12.13 Statistics
On the statistics page on the encoder interface, various pieces of information are presented
about the stream that passes through the interface.
ANC bit rate Bitrate of the stream of ANC data (excluding radio)
VBI bit rate 0 Bitrate of the VBI stream, which is associated with
the SD-SDI format.
Total current bit Sum of used bit rates in all channels passing through
rate the interface
Hitless video 1+1 protection is a value added feature providing a completely hitless
protection switching for ASI and JPEG2000 compressed SDI.
Hitless Video 1+1 Protection switching provides a mathematically lossless protection
switching by aligning and merging two identical packet streams. It is an inherently state-
less protection approach that besides protecting against defects and link failures also
protects against random packet drops. In addition to the hitless 1+1 protection mechanism,
this release introduces support for monitoring both redundant channels. Such monitoring is
also available for open-ended protection, i.e. protection with dual sources.
Hitless Video 1+1 Protection is available for Nimbra 600 nodes on the following Access
Modules:
• JPEG2000 Video Access Module (NPS0074-6001)
• SFP Video Access Module (NPS0054-6001)
Nimbra network
Interface A Interface B
Node A Node B
Figure 395. Source stream sent through Nimbra network, using two independent routes
for closed-ended 1+1 hitless/standby protection.
Configuration of 1+1 hitless video streams is a new feature for GX4.12, although it looks
like the earlier closed ended protection case. In the new case, either one of the streams can
be sent to the sink interface (interface B; called standby protection) or both streams can be
used to create the outgoing stream (hitless protection). It is the hitless protection feature that
is new in this release and a configuration example of this case is presented.
One video stream is split at the source interface and sent to two separate source TTPs. The
streams traverse the network along different routes and are terminated in two separate sink
TTPs with a common interface. Configuration of closed ended 1+1 hitless protection starts
on the sink side, in our case interface asi-6:1in node iov136.
Member interfaces Member interfaces are zero, one or two sink TTPs associated with
the sink interface. A TTP appears as a member interface when the
sink interface is configured as the interface to the sink TTP.
Type Type of protection on the interface. All available types are
presented automatically. Currently, ‘Hitless’ or ‘Standby’ are
supported. Hitless means that both streams are used to generate
the outgoing video stream. Standby means that one of the streams
is used as the outgoing stream and the other stream is a monitored
redundant stream.
Status Current state in the Hitless/standby state machine. There are five
states altogether (in order low to high): Unavailable →
Unprotected → Standby protected → Hitless capable → Hitless
protected
Expected status If ‘status’ is “lower” than ‘expected status’ in the Hitless/standby
state machine, a major alarm with text ‘Protection status lower
than expected’ is generated.
Active interface Answers the question “What interface is passed on to the output
interface?”. Only relevant for standby protection.
Differential delay Time difference between the streams on the member interfaces, as
measured by the sequence numbers added at the source interface.
Figure 397. New parameters and variables on the sink interface in Hitless video 1+1
protection.
Figure 398. Addition of the first sink TTP in the destination node.
Figure 400. Addition of the second sink TTP in the destination node.
Warning: This option is for advanced use only. Used inappropriately, the
option may cause multiple problems. It is strongly suggested
that the user should understand the feature properly before
employing it.
With Link Class Persistent, the node will not tear down channels if the neighboring node
stops responding. Instead, it will classify the link as NoControl and leave all existing
channels in place, but deny any new channels from being established via the interface to the
peering node that has stopped responding. Furthermore, if a node has one or more links
configured as Persistent, the node will by default enenter
ter a NoControl mode if the node-
node
controller restarts. In the NoControl mode, the node will not run the normal DTM protocol
stack and instead leave the hardware configured as-is.
as is. This means that all existing channels
will continue to forward data, but it wi
will
ll not be possible to supervise the links and channels
or setup any new channels.
If an interface is configured with Link Class Persistent and the node receives an indication
that the link on that interface has failed completely (e.g. a Signal Failure cond
condition),
ition), it will
tear down all channels over that link.
Persistent links are useful to protect end
end-nodes
nodes that are single points of failure for a service.
An interface configured with link
link-class
class Persistent will never have status DownKeep, it will
go to statuss Down instead.
Warning: This option is for advanced use only. Used inappropriately, the
option may cause multiple problems. It is strongly suggested
that the user should understand the feature properly before
employing it.
With Link Class Nailed, the node will never tear down channels unless the operator sets the
administrative status of the interface to down or if the channel is removed via the
management interface. This means that the node will leave channels in place even if it
knows
ows that the channels cannot forward any data since there is a loss
loss-of-signal
signal situation on
the interface.
If the neighboring node stops responding or if the link to or from the neighboring node
fails, the node will leave all existing channels in place, but deny any new channels from
being established via the interface to the peering node. Furthermore, if a node has one or
more links configured as Nailed, the node will by default enter a NoControl mode if the
node-controller
controller restarts. In the NoControl mode, the node will not run the normal DTM
protocol stack and instead leave the hardware configured as as-is.
is. This means that all existing
channels will continue to forward data, but it will not be possible to supervise the links and
channels or setup any new channchannels.
Nailed links are useful since they allow links that break in one direction to continue
forwarding data in the other direction. They also allow faster recovery after the link has
been restored again, since all channels are already established.
Figure 406. Possible alarms or defects on a SONET/SDH trunk. All alarms except RDI-
L/RDI-P take down the trunk and cause a rerouting of all channels using that
trunk.
Figure 407. Possible alarms or defects on a IP trunk. All alarms except RDI take down the
trunk and cause a rerouting of all channels using that trunk.
16.7.5 DLE
DLE will automatically tear down and reestablish channels to maintain functionality as
long as there is an available path for control signaling. It is however very important to have
two redundant DLE servers for each DLE segment, since it may happen that a DLE server
is unable to reestablish a channel to a DLE client that has been affected by an error. This
will be resolved automatically when the DLE client decides to move to the other DLE
server since the first one is non-functional.
However, there are some situations when channels between DLE clients cannot be
reestablished automatically. The symptoms of this is that there does not seem to be
anything wrong with the node judging from the DTM Links page on its neighbors, but it is
impossible to reach the node via DLE from some node(s). The easiest way to fix this
situation is to force the DLE server that the failing node is attached to re-establish the
channel to all the DLE clients. This is done from the page for the In-band server (Control
network->In-band servers, click on the relevant server id, e.g. dles0). On that page, click on
the connection id of the only entry under the heading “Originating client connections” and
then click Re-connect channel on the resulting page. This forces the DLE server to re-
establish the channel to all DLE clients.
Selecting All connections, Statistics provides data statistics of all connections since the last
reset. Furthermore, on the data statistics page information about errors (error statistics) is
also retrievable
Figure 414. Example network to illustrate source routing. The two source routes are Far-
route-to-iov101 and Close-route-to-iov101.
Element Manager User's Manual Source Routing • 375
Figure 417. Definition of a loose source route without intermediate nodes. This definition
is needed if we want to use DRP as a last resort.
It is also possible to view, edit and delete specific source routes from the link All
connections → Source routes. Click on the Id number of the specific link, do the needed
changes and click on ‘Ok, ‘Apply’ or ’Delete’ as appropriate.
An alternative is to use loose source routes. In this case, only some intermediate nodes are
included in the source route definition and the rest of the route is completed with DRP.
Nimbra node
Figure 420. Schematic illustration of line loopback.
To configure the interface in line loopback mode, set the value of the parameter Loopback
to Line from the drop-down menu and click on ‘Apply’ or ‘OK’. The signal reaching the
Rx port on the interface should now be directly returned to the Tx port, in addition to being
sent along the regular path of an incoming signal.
In addition to the Loopback parameter, there are two more parameters to configure.
Suppress alarms can be set to suppress alarms, either ‘none’ (default), ‘all’ or ‘warning’.
‘All’ suppresses all alarms on the interface and warning suppresses all alarms with severity
warning. The last parameter is ‘Output action on signal fail’ has values ‘None’ and ‘Mute’.
If set to ‘Mute’, the failed signal muted (i.e. shut down) on the output access interface.
Muting may speed up fail-over switching time when using external fail-over switches. If set
to ‘None’, different actions are taken depending on service type.
Table for ‘output action on signal fail’ is shown below.
Nimbra node
Figure 423. DTM loopback mode. The signal is copied to the Rx port on the same interface
before being sent out on the Tx port.
The front panel selection button makes it possible to disable the output directly from the
hardware or to toggle the interface monitored (Each press on the button moves the selected
monitor interface in the cyclic sequence disabled → asi-x:1 → asi-x:2→ asi-x:3→ asi-x:4
→ asi-x:5→ asi-x:6→ asi-x:7→ asi-x:8→ disabled).
Configuration of DTM side loopback is made in an analogous fashion as for the 8 x Video
Access Module for Nimbra 600 described below.
Second ITS un
icast
Nimbra node A
Nimbra node B
Figure 427. Loopback from the DTM side in 8 x Video Access Module for Nimbra 680.
To configure the output interface for usage as source for another channel, Loopback must
be configured as DTM.
Figure 428. In order to set up the output interface to also be used as an input interface
(associated with another source TTP), Loopback must be set to ‘DTM’.
Another state variable, nodeStatus, is tied to the node, not individual modules. Normally, it
has value ‘Up’. In case persistent channels are set up and the Node Controller reboots for
some reason, the persistent channels are kept and the nodeStatus variable takes the value
NoControl. No traffic interruption is seen on these persistent channels during the reboot,
but the Node Controller lacks proper control of node hardware afterwards. In order to
It should be observed that the Node IP address is associated with different hardware
(different MAC addresses) depending on which Node Controller is active.
In the web based user interface, it looks like the user manages the node and not the node
controllers. The user needs not be concerned about which Node Controller is active, only to
manage the Node. The Node Controllers manage the node collectively.
Figure 433. Status equipment page, with administrative status of all interface slots set to
up, except slot IF8.
After the administrative status of the slot/module has been set to down, the new module
may be inserted in the slot. While the administrative status is still down, alignment of the
system release software of the node and the module is made.
To check if the new module already is aligned with the rest of the node, click on the link
Maintenance → Software. If the system alignment status parameter has value ‘full’, no
alignment is needed. In this case, all that remain is to change the value of the administrative
status parameter to ‘Up’ on the new interface. If this is not the case, alignment is needed.
Figure 436. A node with other system alignment status than ‘full’ needs realignment
between the new module and the node. This process is described below.
Type the URL to the http or ftp server. The syntax below gives two examples, one for http
and one for an ftp server.
Figure 438. Example of an http server. The repository of system release software
GX4.10.0.1 is found under directory official/GX4.10.0.1/GX4.10.0.1/ of the
http server.
Clicking on the install button starts the alignment process to the repository system release
software version, i.e. the installation of the system release software to the entire node
including the parts with administrative status down. After a brief interruption, a progress
report is generated.
GX4.4 4
GX4.5 5
GX4.7 5
GX4.8 5
GX4.9.0.0 5
GX4.9.0.1 6
GX4.10 6
GX4.11 6
GX4.12 6
Figure 442. System release software and configuration version numbers
For a configuration file with unknown version number, the easiest way to find out is to
open the file in e.g. WordPad. The version number is displayed at the very top of the file.
22.2.2 Repository
A repository is a file structure, with one directory and all files belonging to the repository
located directly in this directory. The tarred and compressed file of this structure is
sometimes also called a repository. From Net Insight support portal it is possible to
download software for different releases. In addition to the compressed repository,
compressed MIB files for the release are included in the package. The release repository
file for release GX4.10.0.2 is called “GX4.10.0.2.tgz” and analogously for other system
releases.
Unpack the .tgz file on an ftp or http server. In the example below, the “.tgz” file is
unpacked in the <target-dir> directory. The sub-directory GX4.10.0.2 is created in the
process.
On a Linux server, proceed as follows (from the directory <target-dir>)
# tar xzf GX4.10.0.2.tgz
This will unpack the GX4.11.0.0 repository to the directory
<target-dir>/GX4.10.0.2/
On a Windows server, if the tar/gzip commands are not available, the file can be unpacked
with a file decompression utility like 7-zip or Winrar. Note that WinZip does not
decompress all files correctly! For that reason it cannot be used.
After this step is taken, continue with web page Maintenance ՜ Software. The button
‘Install image’ takes you to a web page where you can install software from a repository
and change firmware while keeping the system release software constant.
In the field for ‘Install from URL’, write the URL directly after the double slash sign. This
will assume that the repository is on an http server. In case an ftp server is used instead,
replace http with ftp and proceed the same way. The structure is of the commands are:
Figure 446. Installation from http server 10.100.0.82. Repository GX4.10.0.2 is residing on
directory /official/GX4.10.0.2.
Figure 447. Installation from ftp server 192.168.101.136 with user root/password neti.
Repository GX4.10.0.2 is residing used.
The web page checks the new release and compares it with installed hardware. All relevant
software and firmware images are retrieved from the repository and installed at appropriate
locations in the node.
GX4.8.0.4 GX4.7.0.5
GX4.9.0.2
GX4.10.0.2 GX4.9.0.2
GX4.12.0.0
GX4.4.0.7 - GX4.5.0.2 No intermediate system releases
GX4.7.0.5 GX4.6.0.3 required
GX4.7.0.5
GX4.8.0.4 GX4.7.0.5
GX4.9.0.2
GX4.10.0.2 GX4.9.0.2
GX4.12.0.0
GX4.8.0.3 - GX4.8.0.4 No intermediate system releases
GX4.9.0.2 GX4.9.0.2 required
GX4.10.0.2 GX4.9.0.2
GX4.12.0.0
Figure 448. Table for required intermediate system releases for upgrading.
An upgrade must go through all intermediate releases, stated in the rightmost column. For
example, upgrading from GX4.2.0.6 (between GX4.2.0.4 and GX4.2.0.7) to GX4.12.0.0
must go through GX4.3.0.4, GX4.4.0.7, GX4.7.0.5 and GX4.9.0.2.
Note: All
ll functional enhancements described in this section require a
separate software license. This license should be obtained before
the upgrade procedure begins.
Replacement of firmware is most easily done directly from the web interface.
Example:
The functionality (supported trunk rate) for the fixed trunks of a Nimbra 310/320/
320/360/380
is easiest changed from the web interface. Note that changing the default setting of 4 x
STM-1/OC-33 trunks requires additional licenses
licenses,, which should be obtained before
upgrading.
Note that if time transfer is added on an IP Trunk, available in GX4.12, only one of the two
time transfer interfaces are available.
To change firmware from the web interface and use different trunk rates,, follow the link
Maintenance → Software
Software. On this page, click on the button ‘Install on-board
board image
image’.
A new web page appears; Maintenance → Software → Install. Here a repository with the
required files is needed; it is possible to install trunk firmware OC-3/STM-1, OC-12/STM-
4, OC-48/STM-16 or IP-Trunk firmware. Installation of IP-trunk firmware requires version
B of Nimbra 360 or Nimbra 310/320/380.
Select the required firmware and click on install. To later activate the new firmware, save
the configuration and go back to Maintenance → Software. This step is needed as the
change of firmware automatically is a change of the configuration. Clicking on ‘Bring
installed image into service’ makes the new firmware with new rates active. Before the
node is restarted, a warning pop-up shows up.
Figure 454. Warning ppop-up after firmware upgrade of trunks in Nimbra 310/320/
320/360/380.
Observe that in all cases when the firmware has been replaced, the old DTM interfaces
remain with operational status absent. If the user doesn’t intend to go back to previous
interface rates,, these interfaces can (and it is recommended that they) be deleted.
The 4 x DS3/E3 trunk/access module for Nimbra One/300 can be set to operate either in
trunk or in access configuration. The hardware is common; the difference in the two cases
is the firmware placed on the module. It is fairly easy to reconfigure the module and change
trunk mode operation to the access mode operation and vice verse. Firmware for trunk
mode is called NSF0014
NSF0014-0001 and firmware for access mode is NSF0014-A001 A001.
Figure 456. Installation of new (access) firmware on the 4xDS3/E3 Trunk/Access module.
To change a module in trunk mode to operate in access mode, fill out the field with
-d <slot #> --replace NSF0014-0001,NSF0014-A001 http://<IP>:<Port>/<repos>
To do the reverse:
-d <slot #> --replace NSF0014-A001,NSF0014-0001 http://<IP>:<Port>/<repos>
Of course, both actions can be made from an ftp server rather than an http server.
Element Manager User's Manual Up- and Downgrading • 409
From GX4.12 and later releases, tthere is one version of JPEG 2000 Video
eo Access Module
v2 for Nimbra 600. The module can run different firmware, giving it different properties
like encoding, decoding and neutral
neutral, i.e without compression. The module is delivered with
neutral firmware, which support uncompressed video streams. If used for JPEG encoding, a
JPEG encoding firmware must be used
used; if used for decoding, a JPEG decoding firmware
must bee used. The available firmware modules are presented in the table below.
The module is inserted in a slot in the Nimbra 600 node. The slots are numbered between
IF1 and IF8 for Nimbra 680 and IF1 and IF16 for Nimbra 688. Slots for NCs are numbered
NCA and NCB, whereas slots for switch modules are numbered SWA and SWB.
The default firmware,, i.e. the firmware that is delivered on the module, is the neutral
firmware (NSX0040-E0D0
E0D0).. To change from the neutral firmware to either the encoding or
the decoding firmware from the web GUI, go to the Maintenance → Software web page.
The structure of the string to enter in the field for new software is
-d <i/f#> --replace
replace <Old FW>,<New FW> http://<IP>:<Port>/<Repos>
The type of server may also in this case be ftp rather than http.
Other changes of firmware are made analogously. Note the absence of spaces between the
two NSF product numbers. In this case, the IF must be included before the slot number.
In order to put JPEG decoding firmware on the module from a repository residing on an ftp
server (iov105/repos) and using port 222, run the script with options defined below.
Changing from encoding to decoding JPEG firmware can be done directly in a similar way.
Here it is illustrated from the http-server.
By extension, changing from JPEG decoder to JPEG encoder the URL field becomes:
Note that it is important that the command is written on one line and that no space in
inserted before or after the comma between the firmware versions.
8 x ASI/AES Access Module for Nimbra 600 can run on different firmware, giving it
different properties. The module is delivered with ASI firmware, supporting up to eight ASI
video streams. In addition, there is an AES version (supports 8 x AES audio streams) and a
MADI version (supporting a MADI multiplexed audio stream).
The available firmware modules are presented in the table below.
The module is inserted in a slot in the Nimbra 600 node. The slots are numbered between
IF1 and IF8 for Nimbra 680 and IF1 and IF16 for Nimbra 688.
The default firmware on the module is the ASI firmware. To change from the ASI firmware
to either AES or MADI firmware from the web GUI, go to the web page Maintenance →
Software and use the button ‘Install image’.
In the field for new software image, write a string to specify what modules should be
affected by the change, what firmware should be removed, what firmware should be
installed and from what repository this should be done.
In order to put AES firmware on the module from a repository residing on an http-server
(192.168.234.99/repos) and using port 9090, add the following string in the URL field.
Note the absence of spaces between the two NSF product numbers.
In order to put MADI firmware on the module from a repository residing on an ftp server
(iov136/repos) and using port 2222, add options defined below.
Changing from AES to MADI firmware is done in a similar way. Here it is illustrated from
the http-server.
Figure 460. Replacing regular Gigabit Ethernet Access Module firmware with ETS 1+1.
The firmware to be replaced is NSX0022-0001 and the replacement firmware with ETS
1+1 functionality is NSX0022-ET11. Specifically, if the module is installed in slot number
one, the extended URL becomes (with the same http server, port and repository as in
previous chapter):
For the reverse process, replacing 1+1 firmware with regular ETS firmware, the order of
the arguments are swapped, i.e
Usage of ftp, instead of http, is also supported, exactly as described in the other sections in
this chapter.
Element Manager User's Manual Up- and Downgrading • 414
22.3.7.1 License
Note that in order to use ETS 1+1, one or more additional feature licenses must be
purchased, irrespective of the need for firmware swap on the module.
Figure 461. Toggling the administrative status, i.e. setting it first to ‘Down’ and then to
‘Up’ is a way to restart a module and run the new firmware.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By
contrast, the GNU General Public License is intended to guarantee your freedom to share and
change free software--to make sure the software is free for all its users. This General Public
License applies to most of the Free Software Foundation's software and to any other program
whose authors commit to using it. (Some other Free Software Foundation software is covered by
the GNU Lesser General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public
Licenses are designed to make sure that you have the freedom to distribute copies of free
software (and charge for this service if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new free programs; and that you
know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or
to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if
you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give
the recipients all the rights that you have. You must make sure that they, too, receive or can get
the source code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license
which gives you legal permission to copy, distribute and/or modify the software.
Finally, any free program is threatened constantly by software patents. We wish to avoid the
danger that redistributors of a free program will individually obtain patent licenses, in effect
making the program proprietary. To prevent this, we have made it clear that any patent must be
licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
0. This License applies to any program or other work which contains a notice placed by the
copyright holder saying it may be distributed under the terms of this General Public License. The
"Program", below, refers to any such program or work, and a "work based on the Program"
means either the Program or any derivative work under copyright law: that is to say, a work
containing the Program or a portion of it, either verbatim or with modifications and/or translated
into another language. (Hereinafter, translation is included without limitation in the term
"modification".) Each licensee is addressed as "you".
Activities other than copying, distribution and modification are not covered by this License; they
are outside its scope. The act of running the Program is not restricted, and the output from the
Program is covered only if its contents constitute a work based on the Program (independent of
having been made by running the Program). Whether that is true depends on what the Program
does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in
any medium, provided that you conspicuously and appropriately publish on each copy an
appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to
this License and to the absence of any warranty; and give any other recipients of the Program a
copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option
offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work
based on the Program, and copy and distribute such modifications or work under the terms of
Section 1 above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files
and the date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is
derived from the Program or any part thereof, to be licensed as a whole at no charge to all third
parties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it,
when started running for such interactive use in the most ordinary way, to print or display an
announcement including an appropriate copyright notice and a notice that there is no warranty (or
else, saying that you provide a warranty) and that users may redistribute the program under these
conditions, and telling the user how to view a copy of this License. (Exception: if the Program
itself is interactive but does not normally print such an announcement, your work based on the
Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work
are not derived from the Program, and can be reasonably considered independent and separate
works in themselves, then this License, and its terms, do not apply to those sections when you
distribute them as separate works. But when you distribute the same sections as part of a whole
which is a work based on the Program, the distribution of the whole must be on the terms of this
Thus, it is not the intent of this section to claim rights or contest your rights to work written
entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or
collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or
with a work based on the Program) on a volume of a storage or distribution medium does not
bring the other work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object
code or executable form under the terms of Sections 1 and 2 above provided that you also do one
of the following:
a) Accompany it with the complete corresponding machine-readable source code, which must be
distributed under the terms of Sections 1 and 2 above on a medium customarily used for software
interchange; or,
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a
charge no more than your cost of physically performing source distribution, a complete machine-
readable copy of the corresponding source code, to be distributed under the terms of Sections 1
and 2 above on a medium customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer to distribute corresponding
source code. (This alternative is allowed only for noncommercial distribution and only if you
received the program in object code or executable form with such an offer, in accord with
Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it.
For an executable work, complete source code means all the source code for all modules it
contains, plus any associated interface definition files, plus the scripts used to control compilation
and installation of the executable. However, as a special exception, the source code distributed
need not include anything that is normally distributed (in either source or binary form) with the
major components (compiler, kernel, and so on) of the operating system on which the executable
runs, unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated
place, then offering equivalent access to copy the source code from the same place counts as
distribution of the source code, even though third parties are not compelled to copy the source
along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided
under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program
is void, and will automatically terminate your rights under this License. However, parties who
have received copies, or rights, from you under this License will not have their licenses
terminated so long as such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing
else grants you permission to modify or distribute the Program or its derivative works. These
actions are prohibited by law if you do not accept this License. Therefore, by modifying or
distributing the Program (or any work based on the Program), you indicate your acceptance of
this License to do so, and all its terms and conditions for copying, distributing or modifying the
Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient
automatically receives a license from the original licensor to copy, distribute or modify the
Program subject to these terms and conditions. You may not impose any further restrictions on
the recipients' exercise of the rights granted herein. You are not responsible for enforcing
compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other
reason (not limited to patent issues), conditions are imposed on you (whether by court order,
If any portion of this section is held invalid or unenforceable under any particular circumstance,
the balance of the section is intended to apply and the section as a whole is intended to apply in
other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right
claims or to contest validity of any such claims; this section has the sole purpose of protecting the
integrity of the free software distribution system, which is implemented by public license
practices. Many people have made generous contributions to the wide range of software
distributed through that system in reliance on consistent application of that system; it is up to the
author/donor to decide if he or she is willing to distribute software through any other system and
a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest
of this License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents
or by copyrighted interfaces, the original copyright holder who places the Program under this
License may add an explicit geographical distribution limitation excluding those countries, so that
distribution is permitted only in or among countries not thus excluded. In such case, this License
incorporates the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public
License from time to time. Such new versions will be similar in spirit to the present version, but
may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number
of this License which applies to it and "any later version", you have the option of following the
terms and conditions either of that version or of any later version published by the Free Software
Foundation. If the Program does not specify a version number of this License, you may choose
any version ever published by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution
conditions are different, write to the author to ask for permission. For software which is
copyrighted by the Free Software Foundation, write to the Free Software Foundation; we
sometimes make exceptions for this. Our decision will be guided by the two goals of preserving
the free status of all derivatives of our free software and of promoting the sharing and reuse of
software generally.
NO WARRANTY
23.3.2 netkit
This package was split from netstd by Herbert Xu herbert@debian.org on Mon, 28 Sep
1998 16:50:43 +1000.
netstd was created by Peter Tobias tobias@et-inf.fho-emden.de on Wed, 20 Jul 1994
17:23:21 +0200.
It was downloaded from ftp://ftp.uk.linux.org/pub/linux/Networking/netkit/.
The license can be found at /usr/share/common-licenses/BSD on the nodes. The full text is
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to
endorse or promote products derived from this software without specific prior written
permission.
23.3.3 ntp
23.3.4 uip
Copyright © 2006, Swedish Institute of Computer Science.
All rights reserved.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3. Neither the name of the Institute nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
23.3.5 zlib
This software is provided 'as-is', without any express or implied warranty. In no event will the
authors be held liable for any damages arising from the use of this software.
Permission is granted to anyone to use this software for any purpose, including commercial
applications, and to alter it and redistribute it freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote the
original software. If you use this software in a product, an acknowledgment in the product
documentation would be appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being
the original software.
3. This notice may not be removed or altered from any source distribution.
Jean-loup Gailly Mark Adler
jloup@gzip.org madler@alumni.caltech.edu