Sunteți pe pagina 1din 422

Element Manager User's Manual

Nimbra One
Nimbra 300 series
Nimbra 600 series



















NimOS GX4.12


Copyright 1999-2013 by Net Insight AB, Sweden. All rights reserved. This document may
not be reproduced in whole or in part without the expressed written permission of Net
Insight AB.

The specifications and information in this document are provided as is and are subject to
change without notice. All statements, information, and recommendations in this document
are provided without warranty of any kind, expressed or implied, including without
limitation any warranty concerning the accuracy, adequacy, or completeness of such
specifications and information or the result to be obtained from using such specifications or
information. Net Insight AB shall not be responsible for any claims attributable to errors,
omissions, or other inaccuracies in the specifications or information in this document, and
in no event shall Net Insight AB be liable for direct, indirect, special, consequential or
incidental damages arising out of the use or inability to use this document.
GPL source code is available for applicable parts for this product. If you would like a copy
of the GPL source for the costs of preparing, please send a mail to gpl@netinsight.net. A
listing of external software distributed with the product, including copyright notices is
included as appendix to this document.
Net Insight and Nimbra are trademarks of Net Insight AB, Sweden. All other trademarks
are the property of their respective owners.









Net Insight AB
Box 42093
SE-126 14 Stockholm
Sweden

Phone: +46 8 685 04 00
Fax: +46 8 685 04 20
E-mail: info@netinsight.net



April, 2013

Stockholm, Sweden

(NID 4380/A1)

Stockholm, Sweden



Element Manager User's Manual About This Manual 3

2013 Net Insight AB, All rights reserved
Contents
1 ABOUT THIS MANUAL ............................................................................. 13
1.1 Overview .......................................................................................................................... 13
1.2 Intended reader ............................................................................................................... 13
1.3 Support and assistance ................................................................................................. 13
1.4 Organization of content ................................................................................................. 13
1.5 Conventions in this manual .......................................................................................... 14
1.5.1 Information of specific importance ................................................................................ 14
1.5.2 Instructions .................................................................................................................... 14
1.5.3 Terminal output and keyboard input ............................................................................. 14
1.5.4 Web interface examples ............................................................................................... 15
2 GLOSSARY OF TERMS ............................................................................ 16
3 QUICK START GUIDE............................................................................... 21
3.1 Overview .......................................................................................................................... 21
3.2 Configuration of the IP address .................................................................................... 21
3.2.1 Initial settings for VT100 terminal emulator .................................................................. 22
3.2.2 IP settings for Nimbra One/Nimbra 300 series ............................................................. 23
3.2.3 IP settings for Nimbra 600 series .................................................................................. 24
3.2.4 Set the DTM address .................................................................................................... 25
3.2.5 Parameter configuration example ................................................................................. 27
3.2.6 Save the configuration .................................................................................................. 27
3.2.7 System configuration and restart .................................................................................. 28
4 KEY CONCEPTS ....................................................................................... 31
4.1 General ............................................................................................................................ 31
4.1.1 Slot numbering in Nimbra nodes .................................................................................. 31
4.1.2 Module .......................................................................................................................... 32
4.1.3 Device ........................................................................................................................... 32
4.1.4 Connection, TTP and Channel ..................................................................................... 33
4.1.5 Isochronous Transport Stream (ITS) ............................................................................ 33
4.1.6 Ethernet Transport Stream (ETS) ................................................................................. 33
5 THE USER INTERFACE ............................................................................ 34
5.1 Overview .......................................................................................................................... 34
5.2 Connecting to the units ................................................................................................. 34
5.2.1 Required software ......................................................................................................... 34

Element Manager User's Manual About This Manual 4

2013 Net Insight AB, All rights reserved
5.3 Command Line Interface ................................................................................................ 34
5.4 Web interface .................................................................................................................. 35
5.5 Frequently used terms ................................................................................................... 35
5.6 Default username/password.......................................................................................... 36
5.7 Logging in using the Telnet connection ...................................................................... 36
5.7.1 Terminal connection, General for Nimbra nodes .......................................................... 36
5.8 Logging in using a web browser .................................................................................. 36
6 MAINTENANCE ......................................................................................... 38
6.1 Overview .......................................................................................................................... 38
6.2 Maintenance system settings ....................................................................................... 39
6.3 Maintenance system syslog .......................................................................................... 43
6.4 Maintenance system restart .......................................................................................... 43
6.5 Maintenance Date and Time .......................................................................................... 44
6.6 Users ................................................................................................................................ 45
6.7 Preferences ..................................................................................................................... 47
6.7.1 Configuration handling .................................................................................................. 48
6.7.2 Saving the current configuration ................................................................................... 49
6.7.3 Download of configurations to PC ................................................................................ 50
6.7.4 Upload configurations from PC ..................................................................................... 50
6.7.5 Switching configurations ............................................................................................... 52
6.7.6 Delete a configuration ................................................................................................... 52
6.7.7 Software maintenance .................................................................................................. 52
6.7.8 Alarm I/O configuration ................................................................................................. 55
6.8 Cooling ............................................................................................................................ 60
6.9 Software program error alarm ....................................................................................... 61
7 STATUS MONITORING ............................................................................. 63
7.1 Overview of status monitoring ...................................................................................... 63
7.2 Alarms and events .......................................................................................................... 64
7.2.1 The alarms page ........................................................................................................... 64
7.2.2 Acknowledging an alarm ............................................................................................... 66
7.3 Syslog .............................................................................................................................. 66
7.4 Equipment ....................................................................................................................... 69
7.4.1 Setting the administrative status of a module (board) .................................................. 70
7.4.2 Allocating backplane capacity in Nimbra 600 ............................................................... 71
7.5 Sensors............................................................................................................................ 74

Element Manager User's Manual About This Manual 5

2013 Net Insight AB, All rights reserved
7.6 Inventory.......................................................................................................................... 74
7.7 Who (is currently logged in) .......................................................................................... 77
7.8 NTP (Network Time Protocol) ........................................................................................ 78
7.9 Nodeinfo .......................................................................................................................... 79
8 CONTROL NETWORK .............................................................................. 81
8.1 General about In-band management ............................................................................ 81
8.1.1 Ethernet DLE ................................................................................................................ 81
8.1.2 IP and routing ................................................................................................................ 82
8.1.3 DLE clients .................................................................................................................... 82
8.1.4 DLE server .................................................................................................................... 83
8.1.5 Multiple DLE servers on a DLE segment ...................................................................... 83
8.2 Configuration .................................................................................................................. 83
8.3 Building networks with DLE .......................................................................................... 84
8.4 IP routing ......................................................................................................................... 85
8.5 Control Network main web page ................................................................................... 87
8.6 In-band servers ............................................................................................................... 87
8.6.1 Basic configuration for In-band servers ........................................................................ 88
8.6.2 Advanced configuration for In-band servers ................................................................. 89
8.6.3 Destinations configuration for In-band servers ............................................................. 90
8.7 In-band clients ................................................................................................................ 90
8.7.1 Basic configuration for In-band clients .......................................................................... 91
8.8 Bandwidth requirements of DLE ................................................................................... 93
8.9 IP interfaces .................................................................................................................... 95
8.10 IP routing configuration ............................................................................................. 96
8.10.1 Routes ........................................................................................................................... 96
8.10.2 Setting up IP routes ...................................................................................................... 97
8.10.3 IP route reconfiguration ................................................................................................. 98
8.11 SNMP configuration .................................................................................................... 99
8.11.1 Basic SNMP configuration ............................................................................................ 99
8.11.2 Access control SNMP configuration ........................................................................... 100
8.11.3 Addition of an SNMP trap receiver(s) ......................................................................... 101
8.11.4 SNMP page internal data ............................................................................................ 103
8.11.5 Format of Access control SNMP configuration ........................................................... 104
8.11.6 Configuration Procedure ............................................................................................. 105
8.11.7 Defining SNMPv3 Users ............................................................................................. 105
8.11.8 Defining Community .................................................................................................... 106
8.11.9 Defining MIB Views ..................................................................................................... 106
8.11.10 Defining Groups and Access Rights ....................................................................... 108
8.11.11 Assigning Users ...................................................................................................... 109
9 DTM CONFIGURATION .......................................................................... 110

Element Manager User's Manual About This Manual 6

2013 Net Insight AB, All rights reserved
9.1 Overview of DTM configuration .................................................................................. 110
9.2 Interfaces ....................................................................................................................... 111
9.2.1 Editing a DTM interface .............................................................................................. 111
9.3 Addresses ..................................................................................................................... 114
9.3.1 Adding a DTM address ............................................................................................... 114
9.3.2 Editing or deleting a DTM address ............................................................................. 115
9.4 Hostnames .................................................................................................................... 116
9.4.1 Adding a host .............................................................................................................. 116
9.4.2 Editing or deleting hostnames .................................................................................... 118
9.5 Links .............................................................................................................................. 118
9.6 Routing .......................................................................................................................... 119
9.6.1 General ....................................................................................................................... 119
9.6.2 Static routing ............................................................................................................... 120
9.6.3 Dynamic routing .......................................................................................................... 121
9.7 Static routing ................................................................................................................ 122
9.7.1 Adding, editing or deleting a static route ..................................................................... 122
9.8 Dynamic routing ........................................................................................................... 123
9.8.1 Setting the dynamic routing parameters ..................................................................... 123
9.8.2 Area Definition ............................................................................................................ 125
9.8.3 Area Planning ............................................................................................................. 125
9.8.4 Area Prefix Routes ...................................................................................................... 128
9.8.5 Directly Connected Areas ........................................................................................... 128
9.8.6 Indirectly Connected Areas ......................................................................................... 129
9.8.7 Metrics for Area Prefix Routes .................................................................................... 130
9.8.8 Configuration ............................................................................................................... 130
9.8.9 Addition of a dynamic routing entry ............................................................................ 130
9.8.10 Editing or deleting a dynamic routing entry................................................................. 132
10 TRUNKS ............................................................................................... 133
10.1 Overview of Trunks ................................................................................................... 133
10.1.1 Trunk Modules, Nimbra One ....................................................................................... 133
10.1.2 Trunk Modules, Nimbra 300........................................................................................ 134
10.1.3 Fixed trunk interfaces for Nimbra 310/320/360/380 ................................................... 134
10.1.4 Trunk Modules, Nimbra 600........................................................................................ 135
10.1.5 Trunk interfaces configuration .................................................................................... 135
10.2 Editing SDH/SONET Trunk Interfaces ..................................................................... 136
10.2.1 Asymmetric alarm generation ..................................................................................... 140
10.2.2 Optional FEC version for 4 x OC-3/STM-1 Trunk ....................................................... 141
10.3 Editing the DS3/E3 Trunk interfaces ....................................................................... 142
10.3.1 Configuration of DS3/E3 mode ................................................................................... 145
10.4 Editing the IP/Ethernet trunk interface ................................................................... 146
10.4.1 Protocol stacking ......................................................................................................... 146
10.4.2 Configuration of IP/Ethernet trunks Ethernet ........................................................... 147
10.4.3 Ethernet Interface Parameters and Variables ............................................................ 148
10.4.4 Basic and Advanced Ethernet Interface Variables ..................................................... 149
10.4.5 Ethernet Interface Parameters - Basic settings .......................................................... 150

Element Manager User's Manual About This Manual 7

2013 Net Insight AB, All rights reserved
10.4.6 Ethernet Interface Parameters - Advanced settings ................................................... 151
10.4.7 Ethernet Interface Parameters Trunk ...................................................................... 151
10.4.8 Configuration of the IP/Ethernet trunk IP Trunk ....................................................... 153
10.4.9 IP trunk interface variables ......................................................................................... 161
10.4.10 Basic variables ........................................................................................................ 161
10.4.11 Advanced variables ................................................................................................. 163
10.4.12 Alarm configuration page variables ......................................................................... 165
10.4.13 Alarms ..................................................................................................................... 166
10.5 Ports used by IP trunk .............................................................................................. 168
10.6 Statistics .................................................................................................................... 169
10.6.1 General ....................................................................................................................... 169
10.6.2 Overview statistics ...................................................................................................... 170
10.6.3 DPP-IP Trunk level statistics ...................................................................................... 170
10.6.4 Ethernet/IP level statistics ........................................................................................... 171
10.6.5 Forward error correction ............................................................................................. 176
11 SYNC AND TIME TRANSFER .............................................................. 178
11.1 General ....................................................................................................................... 178
11.2 DTM Synchronization distribution .......................................................................... 178
11.2.1 The DSYP Protocol ..................................................................................................... 179
11.2.2 The node synchronization function ............................................................................. 180
11.3 Synchronization sources and priority .................................................................... 182
11.3.1 Default internal synchronization priority ...................................................................... 182
11.3.2 Clock priority mapping in GX4.8 ................................................................................. 182
11.3.3 Synchronization source extracted from DTM links ..................................................... 183
11.3.4 External clocks ............................................................................................................ 183
11.4 Configuration of external clocks ............................................................................. 184
11.4.1 Nimbra One ................................................................................................................. 184
11.4.2 Nimbra 340/340-HD .................................................................................................... 184
11.4.3 Nimbra 360 and 380 ................................................................................................... 186
11.4.4 Nimbra 310 and 320 ................................................................................................... 190
11.4.5 Nimbra 680 ................................................................................................................. 191
11.4.6 Configuration of internal and external synchronization sources ................................. 192
11.5 DTM Synchronization segmentation ....................................................................... 194
11.6 Fault Indications synchronization alarms ........................................................... 195
11.7 DTM and transport layer synchronization .............................................................. 197
11.7.1 Timing modes of SDH/Sonet trunks ........................................................................... 197
11.7.2 Hold-over and free-running properties ........................................................................ 198
11.8 IP/Ethernet Trunk ...................................................................................................... 198
11.9 Configuration recommendations ............................................................................ 199
11.9.1 External reference clocks - requirements ................................................................... 199
11.9.2 Trunk interface configurations .................................................................................... 201
11.9.3 Trunks for Nimbra One/300 ........................................................................................ 202
11.10 Allow as sync source DTM configuration ........................................................... 203

Element Manager User's Manual About This Manual 8

2013 Net Insight AB, All rights reserved
11.11 Monitoring synchronization performance .............................................................. 203
11.11.1 Slip Seconds ........................................................................................................... 203
11.11.2 Pointer Justification Events ..................................................................................... 204
11.12 Time Transfer ............................................................................................................ 204
11.12.1 Listing of time transfer channels ............................................................................. 207
11.12.2 Time transfer on additional interfaces from GX4.12 ............................................... 207
12 PERFORMANCE MONITORING .......................................................... 208
12.1 Overview .................................................................................................................... 208
12.2 General ....................................................................................................................... 210
12.3 Monitored performance values ............................................................................... 212
12.4 Configuration of PM objects .................................................................................... 213
12.5 Presentation of PM objects ...................................................................................... 215
12.5.1 Interface PM objects ................................................................................................... 217
12.5.2 Services ...................................................................................................................... 219
12.5.3 Direction ...................................................................................................................... 219
12.5.4 Error ............................................................................................................................ 219
12.5.5 Admin and Oper Status ............................................................................................... 220
12.5.6 Reset of counters and setting of admin status on multiple objects............................. 220
12.5.7 Particular PM Object web page .................................................................................. 221
13 ACCESS MODULES............................................................................. 223
13.1 Access Module types ............................................................................................... 223
13.2 Overview access interface modules ....................................................................... 223
13.3 OC3 /STM-1 Access Interface web example ....................................................... 224
13.4 DS3 /E3 Access Interface web example #2 ......................................................... 226
14 ETHERNET TRANSPORT SERVICE (ETS) ......................................... 228
14.1 Basic concepts .......................................................................................................... 228
14.1.1 Forwarding function (FF) ............................................................................................. 228
14.1.2 Ethernet Transport Service interface (ETS) ................................................................ 228
14.1.3 ETS channels .............................................................................................................. 229
14.1.4 ETS 1 +1 protection .................................................................................................... 230
14.1.5 ETS interface groups .................................................................................................. 231
14.1.6 Protection type hitless or standby ............................................................................ 231
14.1.7 Hitless protection ........................................................................................................ 232
14.1.8 Standby protection ...................................................................................................... 232
14.1.9 Interface source and sink constituent parts ............................................................. 232
14.2 Configuration examples of ETS services ............................................................... 233
14.2.1 DTM network as extension cable ................................................................................ 233
14.2.2 ETS Multicast replication in the DTM layer ................................................................. 234
14.2.3 ETS 1+1 unicast closed ended configuration ............................................................. 234
14.2.4 ETS 1+1 multicast closed ended configuration .......................................................... 235

Element Manager User's Manual About This Manual 9

2013 Net Insight AB, All rights reserved
14.2.5 ETS 1+1 open ended configuration ............................................................................ 236
14.2.6 Ethernet Switching ...................................................................................................... 237
14.2.7 Ethernet switch and VLAN tagging ............................................................................. 239
14.3 Configuration of ETS services ................................................................................ 240
14.3.1 Devices (modules) ...................................................................................................... 240
14.3.2 Forwarding Function Basic settings ......................................................................... 241
14.3.3 Forwarding function - Advanced ................................................................................. 247
14.3.4 Forwarding function Diffserv configuration .............................................................. 250
14.3.5 Forwarding function Spanning tree .......................................................................... 253
14.3.6 Forwarding function Statistics .................................................................................. 256
14.3.7 Nimbra One/340/340-HD/360 limitations for FF ......................................................... 258
14.3.9 ETH and ETS Interfaces ............................................................................................. 259
14.3.10 Fault management for ETH and ETS interfaces ..................................................... 272
14.3.11 Configuration of Fault management for ETH and ETS interfaces .......................... 273
14.3.12 Destinations configuration for ETS multicast channels ........................................... 275
14.3.13 Spanning tree configuration for ETH and ETS interfaces ....................................... 277
14.3.14 Statistics overview tab on the ETS configuration page ........................................... 278
15 ISOCHRONOUS TRANSPORT SERVICE (ITS) .................................. 280
15.1 Overview .................................................................................................................... 280
15.2 Protection .................................................................................................................. 282
15.2.1 Nomenclature .............................................................................................................. 282
15.2.2 ITS protection cases ................................................................................................... 283
15.3 Interface settings for Access Modules ................................................................... 285
15.3.1 Configurable interface parameters ............................................................................. 285
15.4 Setting up a unicast ITS tunnel ............................................................................... 292
15.4.1 Terminating Connection .............................................................................................. 292
15.4.2 Originating Unicast Connection .................................................................................. 294
15.5 Setting up a multicast ITS tunnel ............................................................................ 296
15.5.1 Considerations for multicast channels ........................................................................ 296
15.5.2 Originating Multicast Connection ................................................................................ 298
15.5.3 Terminating Multicast Connection .............................................................................. 301
15.6 Editing/deleting Connections .................................................................................. 301
15.7 Advanced settings .................................................................................................... 302
15.7.1 Embedded ASI in HD-SDI channels ........................................................................... 303
15.8 Configuration of ASI video stream an ITS configuration example ................... 304
15.8.1 Configuration of the Terminating TTP ......................................................................... 304
15.8.2 Configuration of originating TTP for a unicast connection .......................................... 307
15.8.3 Configuration of the originating TTP for a multicast service ....................................... 310
15.8.4 Configuration of interfaces .......................................................................................... 312
15.9 Configuration of MADI streams ............................................................................... 314
15.9.1 Configuration process ................................................................................................. 314
15.9.2 Configuration of interfaces .......................................................................................... 321
15.9.3 Timing ......................................................................................................................... 323
15.10 Configuration of interfaces - Test Generator ......................................................... 325
15.10.1 AES ......................................................................................................................... 326

Element Manager User's Manual About This Manual 10

2013 Net Insight AB, All rights reserved
15.10.2 MADI........................................................................................................................ 327
15.10.3 ASI ........................................................................................................................... 327
15.10.4 SDI........................................................................................................................... 328
15.11 Configuration of STM-1 Access streams................................................................ 329
15.12 Configuration of JPEG 2000 services ..................................................................... 333
15.12.1 Enabling the encoder .............................................................................................. 333
15.12.2 Sink TTP configuration ............................................................................................ 334
15.12.3 Source TTP configuration ....................................................................................... 336
15.12.4 Multicast .................................................................................................................. 339
15.12.5 Interface configuration ............................................................................................. 341
15.12.6 Basic interface parameters ..................................................................................... 342
15.12.7 Test Generator interface parameters ...................................................................... 344
15.12.8 Timing interface parameters ................................................................................... 346
15.12.9 Video interface parameters ..................................................................................... 347
15.12.10 Audio interface parameters ..................................................................................... 349
15.12.11 Ancillary (ANC) interface parameters ...................................................................... 351
15.12.12 Vertical Blanking Interval (VBI) interface parameters ............................................. 353
15.12.13 Statistics .................................................................................................................. 354
15.13 Configuration of 1+1 hitless video .......................................................................... 355
15.13.1 Hitless web parameters and variables .................................................................... 356
16 CHANNEL PERSISTENCE ................................................................... 363
16.1 General ....................................................................................................................... 363
16.2 Persistence Configuration ....................................................................................... 363
16.2.1 Link Class Normal ....................................................................................................... 363
16.2.2 Link Class Persistent .................................................................................................. 364
16.2.3 Link Class Nailed ........................................................................................................ 364
16.2.4 Restart On Error .......................................................................................................... 364
16.2.5 Redundant DLE Servers ............................................................................................. 365
16.3 Handling an Error Situation ..................................................................................... 365
16.3.1 The DTM->Links Page ................................................................................................ 365
16.4 Node Status NoControl ............................................................................................ 366
16.5 Restarting a node in NoControl ............................................................................... 366
16.5.1 Restarting via Outband Management ......................................................................... 366
16.5.2 Restarting via Serial Console ..................................................................................... 367
16.5.3 Restarting from a Neighboring Node .......................................................................... 367
16.6 Link Errors ................................................................................................................. 367
16.7 Channels with broken control-paths ...................................................................... 367
16.7.1 Tearing down a unicast channel ................................................................................. 367
16.7.2 Reestablishing a unicast channel ............................................................................... 368
16.7.3 Re-establishing a multicast channel ........................................................................... 368
16.7.4 Channel reestablishment upon link failures ................................................................ 369
16.7.5 DLE ............................................................................................................................. 370
17 CONNECTION AND CHANNEL LISTS ................................................ 371

Element Manager User's Manual About This Manual 11

2013 Net Insight AB, All rights reserved
17.1 Overview .................................................................................................................... 371
18 SOURCE ROUTING.............................................................................. 374
18.1 Loose and strict source-routes ............................................................................... 374
18.1.1 Optional interface specification ................................................................................... 374
18.1.2 Deleting a source-route ............................................................................................... 375
18.2 Example of how to define source routes ................................................................ 375
18.3 Using source routes ................................................................................................. 378
19 LOOPBACK .......................................................................................... 379
19.1 General ....................................................................................................................... 379
19.1.1 Line loopback .............................................................................................................. 379
19.1.2 DTM Loopback ............................................................................................................ 381
19.2 Behaviorally equivalent configurations .................................................................. 381
19.2.1 Loopback from the line side in 8 x ASI Transport Module for Nimbra One/300 ......... 382
19.2.2 Loopback from the line side in Video Access Modules for Nimbra 600 ..................... 383
19.2.3 Loopback from the DTM side in Video Access Modules for Nimbra 600 ................... 383
20 REDUNDANCY FOR NIMBRA 600 ...................................................... 386
20.1 General ....................................................................................................................... 386
20.2 Node Controller redundancy ................................................................................... 387
20.3 Switch Module redundancy ..................................................................................... 388
21 MODULE INSTALLATION .................................................................... 390
21.1 General ....................................................................................................................... 390
21.2 Differences Nimbra One/300 vs Nimbra 600 .......................................................... 391
21.3 Addition of new modules to existing nodes .......................................................... 392
22 UP- AND DOWNGRADING .................................................................. 398
22.1 General ....................................................................................................................... 398
22.2 Up/downgrading GX version from web GUI ........................................................... 398
22.2.1 Saving the current configuration ................................................................................. 398
22.2.2 Repository ................................................................................................................... 399
22.2.3 Up-/downgrading from the web GUI ........................................................................... 401
22.2.4 Required intermediate system releases ..................................................................... 403
22.3 Addition of functional enhancement ...................................................................... 405
22.3.1 General ....................................................................................................................... 405
22.3.2 FEC to the 4 x OC-3/STM-1 Trunk Module from CLI ................................................. 405
22.3.3 Changing fixed trunk interface on Nimbra 310/320/360/380 ...................................... 406
22.3.4 Setting modes for 4 x DS3/E3 Trunk/Access Modules ............................................... 408

Element Manager User's Manual About This Manual 12

2013 Net Insight AB, All rights reserved
22.3.5 Changing firmware on JPEG2000 Video Access Modules by CLI ............................. 410
22.3.6 Changing firmware on 8 x ASI/AES Access Module .................................................. 412
22.3.7 Changing firmware on 8 x Gigabit Ethernet Access Module ...................................... 414
22.3.8 Module restart ............................................................................................................. 415
23 LICENSE INFORMATION ..................................................................... 416
23.1 General ....................................................................................................................... 416
23.2 GNU General Public license GPLv2 ........................................................................ 416
23.3 Other open source third party software ................................................................. 420
23.3.1 libarchive ..................................................................................................................... 420
23.3.2 netkit ............................................................................................................................ 420
23.3.3 ntp ............................................................................................................................... 421
23.3.4 uip ............................................................................................................................... 421
23.3.5 zlib ............................................................................................................................... 422

Element Manager User's Manual About This Manual 13

2013 Net Insight AB, All rights reserved
1 About This Manual
1.1 Overview
This manual includes information on how to configure, monitor and maintain network
elements of a network, comprising the Nimbra series of multi-service switches, when being
installed with the Nimbra Element Manager, system software provided by Net Insight. For
further information on how to install and maintain the Nimbra switches please see Nimbra
One / Nimbra300 series / Nimbra 600 series Installation and Maintenance Manuals.
1.2 Intended reader
This manual is intended for network managers and administrators involved in operation and
maintenance of network elements that use Nimbra Element Manager as element
management software platform.
1.3 Support and assistance
If you have any questions about how to use your equipment or software, and if you do not
find the solution to your problem in this manual, please contact your local equipment and
support supplier. If any question still remains, please consult Net Insight's Technical
Support Center.
1.4 Organization of content
The contents of this manual are organized as follows:
Glossary of Terms contains information about different abbreviations and terms used in the
manual.
Quick Start Guide contains procedures to set up and run the unit after initial installation.
Maintenance covers software maintenance, such as backup routines and software upgrades.
Status Monitoring refers to the functions for monitoring the status of the unit.
Control Network contains information on how to set up in-band management and configure
the IP routes of a unit.
DTM Configuration covers information about the node administration for the units.
Trunks describe the trunk interfaces that are used to connect nodes into a network.
In Sync and Time Transfer, synchronization principles are defined and the Time Transfer
option is elaborated.
Performance Monitoring shows how to use the web interface to set up performance
monitoring.
Access Modules covers the access interfaces that are used to feed the network with various
kinds of traffic.

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
Ethernet Transport Service
configuration and maintenance of Ethernet interfaces.
Isochronous Transport Service (ITS)
video tunnel, a PDH tunnel or a Sonet/SDH tunnel through the DTM network.
Channel Persistence describes what happens to already established channels if nodes along
their respective routes are taken down.
In Connection and channel lists
explained.
In Source Routing, the concept
source route.
In Loopback, this diagnostic feature is described.
Redundancy for Nimbra 600
Series.
In Module installation
Up- and Downgrading
1.5 Conventions in
1.5.1 Information of specific importance

Note:

Information for proper function of the equipment is contained in
this kind of boxes, which includes the tip heading and symbol.

Tip:

Information for better understanding and utilization of the
equipment is contained in this kind of box, which includes the
tip heading and symbol.
1.5.2 Instructions
The instructions given in this manual are numbered in the sequence in which they should be
performed, as follows
Initial measure
Next measure

1.5.3 Terminal output and keyboard input
Examples of text and commands appearing on a terminal screen are marked with a special
font as follows:

Example of terminal text output

Example of command <optional parameters>
About This Manual
2013 Net Insight AB, All rights reserved
Ethernet Transport Service (ETS) describes how to setup Ethernet transport and the
configuration and maintenance of Ethernet interfaces.
Isochronous Transport Service (ITS) describes how services are used and how to create a
video tunnel, a PDH tunnel or a Sonet/SDH tunnel through the DTM network.
describes what happens to already established channels if nodes along
their respective routes are taken down.
Connection and channel lists all lists available from the web interface are described and
the concept of source routing is described as well as how to configure a
this diagnostic feature is described.
Redundancy for Nimbra 600 explains the basic redundancy principles in the Nimbra 600
Module installation, installation of additional modules in operational nodes is described.
and Downgrading describes how to upgrade a node from the web interface.
Conventions in this manual
Information of specific importance
Information for proper function of the equipment is contained in
this kind of boxes, which includes the tip heading and symbol.
Information for better understanding and utilization of the
equipment is contained in this kind of box, which includes the
tip heading and symbol.

The instructions given in this manual are numbered in the sequence in which they should be
performed, as follows
output and keyboard input
Examples of text and commands appearing on a terminal screen are marked with a special
Example of terminal text output
Example of command <optional parameters>
About This Manual 14
describes how to setup Ethernet transport and the
describes how services are used and how to create a

describes what happens to already established channels if nodes along
all lists available from the web interface are described and
as well as how to configure a
explains the basic redundancy principles in the Nimbra 600
is described.
describes how to upgrade a node from the web interface.
Information for proper function of the equipment is contained in
The instructions given in this manual are numbered in the sequence in which they should be
Examples of text and commands appearing on a terminal screen are marked with a special

Element Manager User's Manual About This Manual 15

2013 Net Insight AB, All rights reserved
1.5.4 Web interface examples
The configurations shown in the displayed web pages in this document are taken from
generic systems and for this reason the parameters might differ from the users particular
configuration.


Element Manager User's Manual Glossary of Terms 16

2013 Net Insight AB, All rights reserved
2 Glossary of Terms
Access device Access device is a network component that provides access for
services to the network. Examples of services are ASI, HD-SDI
and ETS.
ADM Add/drop multiplexer
AES/EBU Audio Engineering Society/European Broadcasting Union
ANC Ancillary
AIS Alarm Indication Signal
ASI Asynchronous SCSI Interface
BBE Background Block Error
BPDU Bridge Protocol Data Unit
CATV Cable TeleVision
CENELEC Comit Europen de Normalisation lectrotechnique
CLI Command Line Interface
CCC Client Client Connection
CSC Client Server Connection
Control Module The control module or node controller of a Nimbra node
handles communication with other nodes. It also handles
resource and network management.
Control slot A DTM frame is divided into data slots for transferring user
data and control slot for sending control messages (DCP
messages) between DTM nodes. There are static control slots
that are set up initially and cannot be altered and dynamic
control slots, which can be set up on demand to change the
signaling capacity of a node.
CPU Central Processing Unit
DCAP DTM Encapsulation, which is the mechanism to adapt a service
for transport in a DTM Network. The protocols DCAP-0/1/3
are defined. DCAP-0 and DCAP-3 is used for ITS
encapsulation and DCAP-1 for ETS encapsulation.
DEG Degraded
DID Data Identifier
DLE DTM LAN Emulation allows DTM to be used as a bridge
between different segments of an Ethernet network.
DLE client DTM LAN Emulation client
DNF DPCP-IP Negotiation Failure
DNU Do Not Use
DRP DTM Routing Protocol

Element Manager User's Manual Glossary of Terms 17

2013 Net Insight AB, All rights reserved
DSCP Differentiated Services Code Point
DTM Dynamic synchronous Transfer Mode
DTM channel A DTM channel is an end-to-end connection with a defined
route. The route is either defined by the user (source route) in
the source node or by the network at the time of creation
(DRP). A DTM channel has a reserved capacity in steps of 512
kbps.
DTM Frame A DTM frame consists of control slots and data slots. The
number of slots depends on the bit rate of the DTM link. A
DTM frame is 125 s long.
DTM Link DTM Link is the physical medium connecting DTM Nodes. It
is typically an optical fiber, but other types of media like
electrical cable and microwave links may also be used.
DPCP-IP DPP Control Protocol for DTM over IP
DPP-IP DTM Physical Protocol for DTM over IP
DRP DTM Routing Protocol
DSCP Differentiated Services Code Point
DST Daylight Savings Time
DSTI DTM Service Type Instance. It is a number, unique per service
type (ETS and ITS), direction and node.
DSYP DTM Synchronization Protocol
DVB Digital Video Broadcasting
EP Edge Port
EPS Edge Port Status
ES Errored Second
Ethernet Ethernet is a simple LAN protocol originally developed by
Digital and Xerox for use with servers and workstations. Later
standardized as IEEE 802.3. The success of Ethernet for use
with personal computers has put force between further
developments towards 10Base-T, Fast Ethernet (100Base-T),
Gigabit Ethernet and 10 Gigabit Ethernet. Ethernet is a
CDMA-CD protocol with an exponential back-off algorithm.
ETS Ethernet Transport Service
ETSI European Telecommunications Standards Institute
FCS Frame Check Sequence
FEC Forward Error Correction or Fast Ethernet Card
FF Forwarding Function
GARP Generic Attribute Registration Protocol
GEC Gigabit Ethernet Card
GMT Greenwich Mean Time
GPIO General Purpose Input/Output
GVRP GARP VLAN Registration Protocol
GUI Graphical User Interface
HD/SD-SDI High Definition/Standard Definition Serial Data Interface

Element Manager User's Manual Glossary of Terms 18

2013 Net Insight AB, All rights reserved
HTTP Hypertext Transport Protocol
IETF Internet Engineering Task Force
IF Interface
I/O Input/Output
IP Internet Protocol is the Internet network protocol handling
addressing and routing in the Internet. IP is the fundamental
protocol in the Internet and usually works in conjunction with
TCP. IP is a connection-less protocol that operates at the
network layer (layer 3) of the OSI model.
IPOD IP Over DTM. This protocol specifies how to run IP directly on
top of DTM.
ITS Isochronous Transport Service
ITU International Telecommunication Union
IPMC Internet Protocol Multimedia Communications
IPTV Internet Protocol TeleVision
JPEG 2000 Joint Photographic Experts Group, year 2000, an image
standard and coding system
LACP Link Aggregation Control Protocol
LAN Local Area Network
LCD Local Configuration Datastore
LCV Line code violations
LED Light Emitting Diode
LLDP Link Layer Discovery Protocol
LOF Loss of Frame
LOP Loss of Pointer
LOS Loss of Signal
MIB Managed Information Base, a set of data definitions for
describing managed objects in a conceptual database that is
accessed using SNMP.
MM Multi Mode
MTU Maximum Transmission Unit
NC Node Controller
Node Network device directly connected to the DTM network, e.g. a
switch or access device.
NTP Network Time Protocol
OC Optical Channel
OID Object IDentifier
OOF Out of frame
OS Operating System
OSPF Open Shortest Path First
PAE Physical Address Extension

Element Manager User's Manual Glossary of Terms 19

2013 Net Insight AB, All rights reserved
PDH Plesiochronous Digital Hierarchy, a way to multiplex several
telephony trunks into one bit-stream
PDH transport/tunnel A service that allows transparent PDH connections across a
DTM network
PLM Payload Mismatch
PM Performance Monitoring
POH Path Overhead
PPS Pulse per second
QoS Quality of Service
RAI Remote Alarm Indication
RDI Remote Defect Indication
REI Remote Error Indication
RFC Request For Comments
RMS Root Mean Square
RSTP Rapid Spanning Tree Protocol
Rx Receiver
SDH Synchronous Digital Hierarchy
SDID Secondary Data Identifier
SCC Server to Client Connection
SCSI Small Computers System Interface
SES Severely Errored Second
SFP Small Form factor Pluggable
SFP+ Small Form factor Pluggable Plus
SLA Service Level Agreement
SLIP Serial Line IP. A framing protocol for transferring IP packets
on serial (point-to-point) links.
SM Single Mode
SNMP Simple Network Management Protocol
SNMPv3 Version 3 of SNMP. Extension to SNMP that addresses
security and administration issues.
SONET Synchronous Optical Network
SPE Synchronous Payload Envelope
SQC or sqc Squelchable clock
SS Slip Second (used for performance monitoring)
SSM Synchronization Status Message
STM Synchronous Transport Module
STP Spanning Tree Protocol
STS Synchronous Transport Signal
TAI Atomic time
TCA Topology Change Acknowledge, a binary variable

Element Manager User's Manual Glossary of Terms 20

2013 Net Insight AB, All rights reserved
TCP Transmission Control Protocol. An Internet protocol that
provides end-to-end, connection-oriented, reliable transport
layer (layer 4) functions over IP controlled networks. TCP
performs the following functions: flow control,
acknowledgement of packets received and end-to-end
sequencing of packets.
TM Timing Marker
TTL Time to live
TTP Train Termination Point
Tx Transmitter
UAS UnAvailable Seconds
UAT UnAvailable Time
UDP User Datagram Protocol
UNEQ Unequipped
USM User-based Security Model
UTC An abbreviation compromise between Temps Universelle
Coordin (TUC, French) and Coordinated Universal Time
(CUT, English). For all practical purposes, it is equal to
Greenwich Mean Time (GMT).
VBI Vertical Blanking Interval
VC Virtual Container
VLAN Virtual Local Area Network
WDM Wavelength Division Multiplexer
ZS Zero Suppression (Counter) or Zero sessions; number of
measurement intervals without errors before the current
measurement interval (used for performance monitoring)


Element Manager User's Manual

2013 Net Insight AB, All rights reserved
3 Quick Start Guide
3.1 Overview
There are some initial configurations, which are needed before the nodes could be used in
the network. The instructions in this chapter are intended to guide an
a Nimbra node active in a network.

Note:

Before these procedures are performed, be sure that the unit is properly installed
according to the relevant Installation and Maintenance Manual. In particular, the
node should be
In this quick start procedure, only change parameters specifically mentioned.

This chapter details the configuration needed to get a Nimbra switch operational in a
network. The short configuration procedure is:
Set the IP address from the serial interface
Set the of DTM address from the web interface
Save/back-up the configuration
Reboot the node
3.2 Configuration of the IP address
There are two different cases for the IP address. From release GX4.7 there is a default IP
address: 192.168.125.125. This address appears in the factory default configuration, which
appears when all other configurations are removed and the node is rebooted
is the previous case without default IP address. In order to check if there is a set IP address,
connect the PC/Terminal with an IP address on the same subnet and try to ping
192.168.125.125. If there is a reply, the node has the default I
reply, it has to be assumed that the node has no IP address. In this case, the serial port must
be used.
In the default IP address case, change the IP settings (IP address, netmask and gateway)
from the web interface. Proceed
set the IP address of the PC/Terminal to fit the LAN and go ahead with DTM address
setting. This procedure is described in chapter
If no default IP address is set on the node, i.e. if the node has GX4.6 or earlier system
release software running, in
configuration on Nimbra nodes is made, the serial connection must be used for IP network
parameters. Once the IP settings have been made, subsequent configuration can be made
from the Ethernet port and
Command Line Interface (CLI) and the serial port.
In order to see what is stored in registry, log in to the node (root/neti) and issue command:
registry list
The FactoryDefault configuration should
later is running.
Quick Start Guide
2013 Net Insight AB, All rights reserved
Quick Start Guide
There are some initial configurations, which are needed before the nodes could be used in
the network. The instructions in this chapter are intended to guide an operator to quickly get
a Nimbra node active in a network.
Before these procedures are performed, be sure that the unit is properly installed
according to the relevant Installation and Maintenance Manual. In particular, the
node should be mounted, grounded and powered.
In this quick start procedure, only change parameters specifically mentioned.
This chapter details the configuration needed to get a Nimbra switch operational in a
network. The short configuration procedure is:
ddress from the serial interface
Set the of DTM address from the web interface
up the configuration
Configuration of the IP address
There are two different cases for the IP address. From release GX4.7 there is a default IP
address: 192.168.125.125. This address appears in the factory default configuration, which
appears when all other configurations are removed and the node is rebooted. The other case
is the previous case without default IP address. In order to check if there is a set IP address,
connect the PC/Terminal with an IP address on the same subnet and try to ping
192.168.125.125. If there is a reply, the node has the default IP address. In case there is no
reply, it has to be assumed that the node has no IP address. In this case, the serial port must
e default IP address case, change the IP settings (IP address, netmask and gateway)
from the web interface. Proceed with saving the configuration and rebooting the node. Then
set the IP address of the PC/Terminal to fit the LAN and go ahead with DTM address
setting. This procedure is described in chapter 9 DTM Configuration.
If no default IP address is set on the node, i.e. if the node has GX4.6 or earlier system
release software running, initially an IP address must be set. When the initial IP
configuration on Nimbra nodes is made, the serial connection must be used for IP network
parameters. Once the IP settings have been made, subsequent configuration can be made
from the Ethernet port and the web interface. All settings can also be made from the
Command Line Interface (CLI) and the serial port.
n order to see what is stored in registry, log in to the node (root/neti) and issue command:
actoryDefault configuration should now appear, if system release software GX4.7 or
Quick Start Guide 21
There are some initial configurations, which are needed before the nodes could be used in
operator to quickly get
Before these procedures are performed, be sure that the unit is properly installed
according to the relevant Installation and Maintenance Manual. In particular, the
In this quick start procedure, only change parameters specifically mentioned.
This chapter details the configuration needed to get a Nimbra switch operational in a
There are two different cases for the IP address. From release GX4.7 there is a default IP
address: 192.168.125.125. This address appears in the factory default configuration, which
The other case
is the previous case without default IP address. In order to check if there is a set IP address,
connect the PC/Terminal with an IP address on the same subnet and try to ping
P address. In case there is no
reply, it has to be assumed that the node has no IP address. In this case, the serial port must
e default IP address case, change the IP settings (IP address, netmask and gateway)
with saving the configuration and rebooting the node. Then
set the IP address of the PC/Terminal to fit the LAN and go ahead with DTM address
If no default IP address is set on the node, i.e. if the node has GX4.6 or earlier system
When the initial IP
configuration on Nimbra nodes is made, the serial connection must be used for IP network
parameters. Once the IP settings have been made, subsequent configuration can be made
the web interface. All settings can also be made from the
n order to see what is stored in registry, log in to the node (root/neti) and issue command:
, if system release software GX4.7 or

Element Manager User's Manual Quick Start Guide 22

2013 Net Insight AB, All rights reserved
To see the contents, write resedit get -r -n ipconf

Figure 1. FactoryDefault configuration for GX4.7 and later releases.
Another way of finding out if the default configuration is installed on the node is to connect
the Ethernet (management) interface directly with a PC that is configured to be on this
subnet. Writing the IP address in the URL field displays the web interface of the node
immediately, if it does have the default IP address.
3.2.1 Initial settings for VT100 terminal emulator
A serial adapter is provided (RJ45-RS232 adapter, NPA0006-0001) to adapt the serial port
of the Nimbra node to the PC DSUB-9 connector of the PC. Attach the adapter to the serial
port of the PC and connect the other end of the adapter with a straight Ethernet cable to the
serial port of the Nimbra node. Use a VT100 terminal emulator like Tera Term or Hyper
terminal and log in.

The communication settings are:
Port speed: 38.4 kbps
Data bits: 8
Parity bit: No
Stop bit: One
Flow control: No


Element Manager User's Manual Quick Start Guide 23

2013 Net Insight AB, All rights reserved
3.2.2 IP settings for Nimbra One/Nimbra 300 series
Open a VT100 terminal emulator, with settings given above, on the PC and hit the Enter
key. Log on to the node (The default user name/password combination is root/neti).
List current IP registry by issuing the command
resedit get -r -n ipconf.if.0
The system should reply with something like (in this example, GX4.6 or earlier software is
assumed):
.ipconf.if.0
.ipconf.if.0.name "eth0"
.ipconf.if.0.address
.ipconf.if.0.media
.ipconf.if.0.media.current "autoselect"
.ipconf.if.0.media.active "autoselect"
.ipconf.if.0.mac "00:10:5b:00:00:1b"
.ipconf.if.0.mtu 1500

3.2.2.1 Set the IP address and subnet mask
Create an address structure and set the IP address and subnet mask with the following
commands:
resedit create -n ipconf.if.0.address
resedit set -n ipconf.if.0.address.0.inet -v x.x.x.x
resedit set -n ipconf.if.0.address.0.netmask -v y.y.y.y

x.x.x.x is the IP address
y.y.y.y is the subnet mask.


Element Manager User's Manual Quick Start Guide 24

2013 Net Insight AB, All rights reserved
3.2.3 IP settings for Nimbra 600 series
Connect a straight Ethernet cable to the serial port of the active node controller module on
the 600 series Nimbra node. Connect the other end of the cable to an RJ45-RS232 adapter,
NPA0006-0001, connected to a regular DSUB-9 serial port (like COM1) on your working
computer.
Using the previously stated settings, connect to the node with a VT100 terminal emulator
and hit the Enter key. Log on to the node with the default user name/password combination
(root/neti). List current IP registry with
resedit get -r -n ipconf
A typical reply from the node may be (in this case software GX4.6 or earlier is assumed):
.ipconf
.ipconf.if
.ipconf.if.0
.ipconf.if.0.name "eth-aux"
.ipconf.if.0.address
.ipconf.if.0.address.0
.ipconf.if.0.address.0.inet "192.168.101.74"
.ipconf.if.0.address.0.netmask "255.255.255.0"
.ipconf.if.0.media
.ipconf.if.0.media.current "autoselect"
.ipconf.if.0.media.active "100baseTX half-duplex"
.ipconf.if.0.mac "00:10:5b:20:63:02"
.ipconf.if.0.mtu 1500
.ipconf.if.1
.ipconf.if.1.name "eth-front"
.ipconf.if.1.address
.ipconf.if.1.media
.ipconf.if.1.media.current "autoselect"
.ipconf.if.1.media.active ""
.ipconf.if.1.mac "00:30:d6:03:94:3e"
.ipconf.if.1.mtu 1500

3.2.3.1 Set IP address and subnet mask
Create an address structure and subsequently set the IP address and subnet mask with the
following commands:

resedit create -n ipconf.if.1.address
resedit set -n ipconf.if.1.address.0.inet -v x.x.x.x
resedit set -n ipconf.if.1.address.0.netmask -v y.y.y.y

x.x.x.x is the IP address
y.y.y.y is the subnet mask.


Element Manager User's Manual Quick Start Guide 25

2013 Net Insight AB, All rights reserved
3.2.4 Set the DTM address
In order to proceed with the web interface, disconnect the serial connection and reconnect
the node at the Ethernet port. The PC must have IP connectivity to the node.
Open the web interface (login with root/neti as user/password combination) and navigate to
the web page DTM Addresses, and click on the Add address button.



Figure 2. Login to the node with the web interface
Set the DTM address of the unit. Make sure that Primary address is set to Yes. Click
OK.
The DTM Addresses page below appears. The DTM loopback address
(00.00.00.00.00.00.00.01) is always shown in the list as well.


Figure 3. Configuration page of DTM addresses. Click on Add address to add/set the
DTM address.
To set a DTM address, write the DTM address in the appropriate field and click on the OK
button.

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
Figure 4. Addition of DTM address.

Note:

A change in the primary DTM address does not take effect until
after the node has been restarted.
configuration before reboot

Figure 5. Listing of the all DTM addresses

Quick Start Guide
2013 Net Insight AB, All rights reserved
Addition of DTM address.
A change in the primary DTM address does not take effect until
after the node has been restarted. Remember to save the
configuration before rebooting.
Listing of the all DTM addresses

Quick Start Guide 26



Element Manager User's Manual Quick Start Guide 27

2013 Net Insight AB, All rights reserved
3.2.5 Parameter configuration example
There is a CLI configurable parameter, which is neither configurable from the graphical
user interface nor from SNMP.
The parameter is called maxAlarmRate and has two possible values, normal (default) or
high. Normal means that the hold-off (filtering) time for ITS alarms is 2 s and the wait-to-
restore time is 5 s. Corresponding times with maxAlarmRate set to high is 100 ms and 1 s.
In CLI, the parameter is set to normal with command
resedit -n its.maxAlarmRate -v normal

The parameter is set to high with
resedit -n its.maxAlarmRate -v high

The parameter value is displayed with
resedit get -r -n its.maxAlarmRate

3.2.6 Save the configuration
In order to save a configuration, you need to navigate to web page Maintenance
Configurations and click on the Save configuration button. The Save page appears.


Figure 6. Backup of the configuration; the save page.
Enter a suitable name without spaces and a description of the configuration (optional).
Make sure that the Valid box is checked. Click on the OK button.

Element Manager User's Manual Quick Start Guide 28

2013 Net Insight AB, All rights reserved

Figure 7. Listing of all configurations. Note that configuration with the valid flag set to
no are never used for restart of the system.
3.2.7 System configuration and restart
The Maintenance System web page is found by following the Maintenance System
link. To restart the system, click on the Restart tab. In the new window that appears, click
on the Restart Node button. Restart Node means that all processes on all modules in the
node are restarted, including the node controller.


Figure 8. Restart node web page

After the node is restarted, contact with the node ceases momentarily. The contact should
be established again when the node is running again, typically in less than a minute.
When an attempt to restart the node is made, a pop-up window opens and requests
confirmation of the command. The web page is simultaneously grayed out.

Element Manager User's Manual Quick Start Guide 29

2013 Net Insight AB, All rights reserved

Figure 9. Confirmation pop-up for node restart.

In case the configuration has been changed since last restart, the system asks if the
configuration should be saved before rebooting.
On the settings tab, the basic configuration of the node is made.

Figure 10. The maintenance system settings configuration page

Element Manager User's Manual Quick Start Guide 30

2013 Net Insight AB, All rights reserved
On the syslog tab, the syslog configuration can be made. Default configuration is presented
in the window.


Figure 11. Configuration of the syslog settings, from the Maintenance System Syslog
web page.

The parameters are explained in chapter 6.2 Maintenance system settings.

Element Manager User's Manual Key concepts 31

2013 Net Insight AB, All rights reserved
4 Key concepts
4.1 General
In this chapter, a brief description is made of key concepts for DTM networks. They
include services, channel, connection and TTP. DTM slot numbering, common for all
interface modules, is also described.
4.1.1 Slot numbering in Nimbra nodes
Slot and interface numbering is different on different hardware platforms. On Nimbra One,
the slots are numbered from 1 (dedicated for node controller) to 8. The different interfaces
on the modules are numbered in a way clearly seen on the module front. The interfaces are
numbered from 1 and the last number varies depending on the particular interface.
For example, an OC-3/STM-1 Trunk Module in slot six with four ports have the ports
numbered sonet/sdh-6:1, sonet/sdh-6:2, sonet/sdh-6:3 and sonet/sdh-6:4.
Slot numbering for Nimbra 300 series nodes are different.
In Nimbra 340, the node controller (virtual) slot position is 0. The two available, regular
slots are labeled 1 and 2. The interfaces on the modules inserted in these slots are labeled
from 1 and upwards. The fixed ASI interfaces are 3:1 and 3:2. Finally, the fixed Gigabit
Ethernet Access Module Interface is labeled 4:1.
In Nimbra 340-HD and 360/380, slots 0, 1 and 2 are used in the same manner. In Nimbra
340-HD, the fixed HD-SDI interfaces are labeled 3:1 and 3:2, while in Nimbra 360/380 the
fixed trunk interfaces are labeled 3:1, 3:2, 3:3 and 3:4. In Nimbra 340, 340-HD and 360, the
Gigabit Ethernet Access Module is labeled 4:1. In Nimbra 380, the fixed Gigabit Ethernet
ports are labeled 4:1 to 4:8.


Figure 12. Nimbra 380 with port numbering
Nimbra 320 has a different numbering scheme altogether, as it only has one slot available
for a module. Ports in the module in this slot are numbered between 1:1 and 1:x (i.e.
number of ports on this module), the fixed trunk interfaces are numbered 2:1 to 2:2 and the
Ethernet ports 3:1 to 3:8.
- 48 VDC - 48 VDC
1
2
+ A - + B -
Nimbra 380
Blind Panel
Blind Panel
Ports 4:1 to 4:8
Reset Reset
Status Status Ethernet
Serial
Sync
Tx On
Status
PPS
Tx On
Status
TSI 2 Sync
Tx On
Status
PPS
Tx On
Status
TSI 1
1 2
3 4
- 48 VDC
1
2
Rx Tx Rx Tx
Rx Tx Rx Tx
- 155/622 Mbps (SDH) -
155/622/2488 Mbps (SDH)
10/100/1000Mbps (ETH)
- -
ETH
L/A 1 Sp L/A 2 Sp L/A 3 Sp L/A 4 Sp L/A 5 Sp L/A 6 Sp L/A 7 Sp L/A 8 Sp
Alarm I/0
Ports 1:1 to 1:x
Ports 2:1 to 2:x
Ports 3:1 to 3:4

Element Manager User's Manual Key concepts 32

2013 Net Insight AB, All rights reserved

Figure 13. Port numbering of Nimbra 320
In Nimbra 680, the slot positions for the interface modules are labeled 1 to 8, the reserved
positions for switch modules SW A and SW B and the reserved positions for node
controllers NC A and NC B. On the front of the node, there is graphical presentation of the
slot numbers.

Figure 14. Slot allocation for Nimbra 680
For Nimbra 688, the principles are the same as for Nimbra 680, but the interfaces slots are
numbered IF 1 to IF 16. The port numbers are added after the slot position and a colon; e.g.
1:4, 3:6, 11:2, 15:7 and 16:1 denotes slot 1, port 4; slot 3, port 6 and so on.
4.1.2 Module
In this text, an item which fits into a slot in a node and is connected to the node via
connectors in the backplane is called module. In other contexts it may be called board,
plug-in unit, PIU or card. The physical interfaces on the module is labeled after the slot
occupied by the module in the node and the interface number on the module. An example is
aes/ebu-3:6, for physical interface number six (from the left) on the module occupying slot
number three. A module can always be pulled out from the node.
4.1.3 Device
In the web interface, device is used many times for module described above. Device,
however, is something wider. Device also includes firmware dependent trunks (the fixed
trunks for Nimbra 320/360/380) and integrated access features like the ASI ports of Nimbra
340, the HD-SDI ports on Nimbra 340-HD and the Ethernet ports on all Nimbra 300 series
nodes.
In other words, a module is always a device but a device is not always a module.
- 48 VDC - 48 VDC
+ A - + B -
Nimbra 320
Port 2:1 and 2:2
Power input A Power input B
Reset Reset
Status Status Ethernet
Serial
- 48 VDC
Sync
Tx On
Status
PPS
Tx On
Status
TSI 1
1
Blind Panel
1
1 2
Rx Tx Rx Tx
155/622/2488 Mbps (SDH)
10/100/1000Mbps (ETH)
- -
ETH
L/A 1 Sp L/A 2 Sp L/A 3 Sp L/A 4 Sp L/A 5 Sp L/A 6 Sp L/A 7 Sp L/A 8 Sp
Port 1:1 to 1:x
Port 3:1 to 3:8

Element Manager User's Manual Key concepts 33

2013 Net Insight AB, All rights reserved
4.1.4 Connection, TTP and Channel
Connection, Trail Termination Point (TTP) and Channel are all related concepts. A
connection is defined by its two end-points, its TTPs. The channel is defined, in addition to
its TTPs, by the route(s) from source to destination TTPs.
The virtual points in the nodes, where the real time streams to/from access equipment are fit
into DTM channels are called Trail Termination Points (TTPs). In setting up ITS streams,
TTPs are the important object to configure. In addition to TTPs, the interfaces may also be
configured. How they are configured varies, depending on the type of service.
4.1.5 Isochronous Transport Stream (ITS)
The real time streams transported over a DTM infrastructure are called Isochronous
Transport Streams. These ITS streams can be of different type (DS3/E3, STM-1 access,
ASI, SD/HD/3G-SDI, AES/EBU or MADI audio) but they are configured basically the
same way.
4.1.6 Ethernet Transport Stream (ETS)
The Ethernet Stream going through the DTM infrastructure from ingress to egress port is
called Ethernet Transport Stream (ETS).

Element Manager User's Manual The User Interface 34

2013 Net Insight AB, All rights reserved
5 The User Interface
5.1 Overview
The implemented software provides necessary functionality for node management, such as
configuration and monitoring of the units.
Among the functions are:
Network configuration changes
Unit handling
Software diagnostics and upgrade
The graphical user interface (web based) is the normal user interface for all node and
network management. Some initial tasks, like setting the first IP address must be done from
a text-based terminal connection (CLI). These CLI based initial commands are detailed in
the various Installation manuals. In this document, only web browser procedures are
described.
5.2 Connecting to the units
Communication with the units is done either locally through a terminal connected directly
to the unit, or when the unit is in operation, remotely over the in-band management network
(DLE).
5.2.1 Required software
Terminal software: To utilize the terminal connection via the Serial Control Port, a
standard terminal emulation software (VT100) is required, e.g. Windows Terminal.
Web interface: For the web interfaces a standard web-browser able to handle Java-script
and cookies should be used. Internet Explorer 7, Firefox 3.6 or later versions are
recommended web browsers.
5.3 Command Line Interface
A Command Line Interface (CLI) is a set of system commands used for management of the
Nimbra nodes via Terminal or Telnet software. E.g. the CLI can be used when connecting
to the unit via the Serial Control Port using Terminal software, or when connecting via
Telnet (TCP/IP) over the Ethernet Control Port or over the in- management network.
Normally the web interface should be used. The CLI is intended mainly for initial
configuration operations.

Element Manager User's Manual The User Interface 35

2013 Net Insight AB, All rights reserved
5.4 Web interface
The web interface is the easiest and most straightforward way to communicate with the
units. It is designed to be easy to use and to give a good overview of the configuration
status of the unit. Monitoring and configuration is typically done from the web interface.

Figure 15. The web based user interface
5.5 Frequently used terms
The following terms and parameters are frequently used throughout this document:
5.5.1.1 Admin
Admin is the administrative status of the object (e.g. route, interface, server, module or
function). The operator can either set the administrative status to Up if the object is to be
activated, or to Down if it is to be deactivated.
5.5.1.2 Oper
Oper is the operational status of the object (e.g. route, interface, server, module or
function). Up indicates that the object is active, while Down indicates that it is inactive.
If the operational status shows Down while the administrative status is Up, this is an
indication of that an error has occurred. Degraded indicates that the object is operational,
but with deficiency. Dormant means that the object is up but temporarily suspended; in
waiting for an event to take it up. Starting is a transitional state indicating that the object is
in a start-up phase. Absent indicates that the object is no longer physically present in the
node.

Element Manager User's Manual The User Interface 36

2013 Net Insight AB, All rights reserved
5.6 Default username/password
The default username/password combination is
user: root
pass: neti
5.7 Logging in using the Telnet connection
5.7.1 Terminal connection, General for Nimbra nodes
If the unit has just been installed, a local serial connection can be used to set an IP address
on the node according to the appropriate Installation and Maintenance Manual.
Start a Telnet client and connect to the node. When the connection is established, log in to
the node (root/neti). Set the IP address according to the particular instruction.
The unit is now ready to receive commands over the web interface.
Alternatively, if the node house system release software version GX4.7 or later, there is a
default IP address (192.168.125.125) on the node. Set the IP address on your connecting
device on the same subnet, open a web browser and write the default IP address in the URL
window should directly open the web browser. In this case, configuration can be made
directly from the web interface.
5.8 Logging in using a web browser
Establish the connection, either locally or remotely, and start the browser.
Enter the name or the IP-address of the unit in the address field. A Login page, shown
below, appears in the browser window.

Figure 16. The login page
Enter user name and password. The default user name/password combination is root/neti.
Click OK. The start page shown below should appear:

Element Manager User's Manual The User Interface 37

2013 Net Insight AB, All rights reserved


Figure 17. The start page of the Element Manager.


Element Manager User's Manual Maintenance 38

2013 Net Insight AB, All rights reserved
6 Maintenance
6.1 Overview
This chapter describes general maintenance of the unit, like how to back-up and modify
configurations, how to set time and date and how to configure the alarm interfaces on the
GPIO Auxiliary Module.
The first maintenance web page is shown below.

Figure 18. The maintenance web page
The available links on the page are:

System: A subset of the administration and log configuration
Date & time: Settings of the system clock
Users: List of logged in users
Preferences: Alarm and event logging preferences
Configurations: Handling of unit configurations and backup
Software: Handling of Operating System (OS) software
Alarm I/O: Configuration of alarms
Cooling: Selection of cooling profile, i.e. how the fans operate

Some of the links are further divided in different tabs. It is important to click on Apply
before jumping to another tab as clicking directly on another tab removes all changes on the
previous tab.

Element Manager User's Manual

2013 Net Insight AB, All rights reserved

Note:

Some of the
important to click on Apply before jumping to another tab as
clicking directly on another tab removes all changes on the
previous tab.
6.2 Maintenance system settings
The maintenance system web page is divi
restart. The bulk of the configuration takes place on the settings web page.
Figure 19. Maintenance system settings web page
The system settings web
Configurable parameters:

Maintenance
2013 Net Insight AB, All rights reserved
Some of the links are further divided in different tabs. It is
important to click on Apply before jumping to another tab as
clicking directly on another tab removes all changes on the
previous tab.
Maintenance system settings
The maintenance system web page is divided into three different tabs; settings, syslog and
restart. The bulk of the configuration takes place on the settings web page.
Maintenance system settings web page
settings web page contains system parameters, which are described below.
Configurable parameters:

Maintenance 39
ded into three different tabs; settings, syslog and

, which are described below.

Element Manager User's Manual Maintenance 40

2013 Net Insight AB, All rights reserved
6.2.1.1 Restart on error
Default value: off
Type: Boolean variable (tick box)
Range: on, off
Description: If one or more links defined in the node are of type persistent or nailed,
these links can enter a state of NoControl. This means that links are set to up, these links
are normally kept during a node reboot and the node enters state NoControl. Checking the
tick box disables this feature and causes all links to be instantly torn down upon a node
reboot. In essence, ticking this box makes all nailed or persistent links behave like normal
links.

6.2.1.2 Upgrade readiness
Default value: off
Type: Boolean variable (tick box)
Range: on, off
Description: Upgrade readiness indicates that the node will not switch any more services,
i.e. the node will not allow any new services to pass through it. The node will allow new
services starting and ending on the node and services already passing through the node will
not be affected.

6.2.1.3 System name
Default value: empty string
Type: string variable
Range: Text string, up to 63 characters long, without spaces, restricted to letters A-Z, a-z,
numbers 0-9 and the characters - (dash) and . (dot).
Description: The name of the unit, to be used instead of the IP address, for easier
recognition in the web page.

6.2.1.4 Contact
Default value: empty string
Type: string variable
Range: Text string, up to 100 characters long, only with printable ASCII characters
Description: The name or the e-mail address of the contact person.

6.2.1.5 Location
Default value: empty string
Type: string variable
Range: Text string, up to 100 characters long, only with printable ASCII characters
Description: The name of the location of the unit.


Element Manager User's Manual Maintenance 41

2013 Net Insight AB, All rights reserved
6.2.1.6 Name Server
Default value: none, i.e. no server is configured
Type: IP address
Range: 0.0.0.0 255.255.255.255
Description: The IP address of the DNS (Domain Name Server) server. Up to three name
servers (with their IP addresses comma separated) can be defined. The system looks them
up in entry order (i.e. first IP address is used first; if it doesnt respond the second IP
address is tried etc)

6.2.1.7 NTP Server
Default value: none, i.e. no server is configured
Type: IP address
Range: 0.0.0.0 255.255.255.255
Description: The IP address of the NTP (Network Timing Protocol) server.

6.2.1.8 Log these events Config
Default value: ticked, i.e. on
Type: Boolean variable (tick box)
Range: on, off
Description: The parameter determines if configuration events are logged.

6.2.1.9 Log these events Reset
Default value: ticked, i.e. on
Type: Boolean variable (tick box)
Range: on, off
Description: The parameter determines if reset events are logged.

6.2.1.10 Log these events Performance
Default value: ticked, i.e. on
Type: Boolean variable (tick box)
Range: on, off
Description: The parameter determines if performance events are logged.



Element Manager User's Manual Maintenance 42

2013 Net Insight AB, All rights reserved
6.2.1.11 Log these events Debug
Default value: ticked, i.e. on
Type: Boolean variable (tick box)
Range: on, off
Description: The parameter determines if debug events are logged.

6.2.1.12 Log these events Info
Default value: ticked, i.e. on
Type: Boolean variable (tick box)
Range: on, off
Description: The parameter determines if information events are logged.

6.2.1.13 Log these events Alarm
Default value: ticked, i.e. on
Type: Boolean variable (tick box)
Range: on, off
Description: The parameter determines if alarm events are logged.

6.2.1.14 Event log size
Default value: 20
Type: Integer
Range: Read from the node and displayed in the web interface.
Description: The parameter defines the size of the event log, in number of events.

6.2.1.15 Alarm log size
Default value: 10
Type: Integer
Range: Read from the node and displayed in the web interface
Description: The parameter defines the size of the alarm log, in number of alarms.

The button Resume full operation is grayed out in normal operation.
After the settings have been made, make sure to click on the Apply button before
continuing to next tab, otherwise all configuration will be lost.


Element Manager User's Manual

2013 Net Insight AB, All rights reserved
6.3 Maintenance system syslog
The syslog file is configured
The configuration is discussed in the
document.
Figure 20. Maintenance system syslog web page
6.4 Maintenance system restart

Note:

Save the configuration before restarting. Otherwise the parameter
changes will be lost!
details.
Navigate to restart tab of the
execute a node reboot
terminating or going through the node are affected.
on all modules in the node are restarted,
Maintenance
2013 Net Insight AB, All rights reserved
Maintenance system syslog
The syslog file is configured under the syslog tab on the maintenance system web page.
The configuration is discussed in the Syslog section of the Status Monitoring chapter of this
Maintenance system syslog web page
Maintenance system restart
Save the configuration before restarting. Otherwise the parameter
changes will be lost! See chapter 6.7.1 Configuration handling for

restart tab of the web page Maintenance System. Click on Restart
execute a node reboot. Observe that this is traffic affecting and all services originating,
ating or going through the node are affected. Restart Node means that all processes
on all modules in the node are restarted, including the node controller.
Maintenance 43
system web page.
chapter of this

Restart Node to
Observe that this is traffic affecting and all services originating,
ode means that all processes

Element Manager User's Manual Maintenance 44

2013 Net Insight AB, All rights reserved

Figure 21. The restart tab of the maintenance system web page
When the system is restarted, the contact with the browser is lost. After a short time (less
than a minute) the contact should automatically be reestablished.
6.5 Maintenance Date and Time
On this web page, date and time of the node can be manually set. These parameters can also
be configured to be aligned with an NTP server. The NTP server is configured under the
settings tab of the maintenance system web page described in chapter 6.2 Maintenance
system settings.

Figure 22. Date & time page
Enter the revised date and time info in the entry fields.
For the time, use the hh:mm:ss format. To avoid involuntary change of the parameters, the
Update date & time tick box must be selected for any changes to take effect when the
Apply button is clicked.


Element Manager User's Manual

2013 Net Insight AB, All rights reserved
Terms and parameters found on the
UTC: Coordinated Universal Time (abbreviated as UTC) is the
DST: Daylight Saving
Time zone: Name of the standard time zone used, which is
menu.
Standard offset to UTC:
reach UTC, e.g. GMT
sign should be added and for places to the west of Greenwich, a plus sign should be added.
This could be contrary to other conventions, like Windows, which use the other sign. In
other words, Stockholm Daylight Savings time i
Time zone Europe/Stockholm)
If DST (Daylight Saving Time) is enabled,
Europe/Stockholm. In these time zones, relevant DST information is included.

Note:

If the internal clock is set to a time or date in the future, all users are
automatically logged out from the system.

6.6 Users
The maintenance users web page
added and their privilege
Figure 23. The Maintenance

To add new users, click on the Add user button. To configure a user currently logged in,
click on the link to the user.
The following configuration menu appears:
Maintenance
2013 Net Insight AB, All rights reserved
Terms and parameters found on the web page:
Coordinated Universal Time (abbreviated as UTC) is the global standard time
Daylight Savings Time
of the standard time zone used, which is selectable from a drop down
Standard offset to UTC: Hours to add/subtract to the local time (no DST included) to
reach UTC, e.g. GMT-1, GMT+4. Observe that for places to the east of Greenwich, a minus
sign should be added and for places to the west of Greenwich, a plus sign should be added.
This could be contrary to other conventions, like Windows, which use the other sign. In
other words, Stockholm Daylight Savings time is set by using GMT-2 (or easier by using
Time zone Europe/Stockholm) rather than GMT+2.
(Daylight Saving Time) is enabled, select as Time Zone a proper city like
Europe/Stockholm. In these time zones, relevant DST information is included.
If the internal clock is set to a time or date in the future, all users are
automatically logged out from the system.
maintenance users web page lists currently active users. From this page, users can be
privilege level modified.
Maintenance Users page
To add new users, click on the Add user button. To configure a user currently logged in,
click on the link to the user.
The following configuration menu appears:
Maintenance 45
standard time.
electable from a drop down
(no DST included) to
the east of Greenwich, a minus
sign should be added and for places to the west of Greenwich, a plus sign should be added.
This could be contrary to other conventions, like Windows, which use the other sign. In
2 (or easier by using
a proper city like

sers can be

To add new users, click on the Add user button. To configure a user currently logged in,

Element Manager User's Manual Maintenance 46

2013 Net Insight AB, All rights reserved

Figure 24. Add user configuration page

Enter User name, Access Mode (Full/Read only access) and Password (twice). Click on the
OK button. The new user is now ready for login.
Parameters configured on this web page are:
6.6.1.1 User name
Default value: none
Type: String variable
Range: 1-50 characters long
Description: The user name for the defined user.

6.6.1.2 Access mode
Default value: Full access
Type: Access rights
Range: Full access or Read only access
Description: The access rights or privilege level of the created user.

6.6.1.3 Password
Default value: none
Type: Encrypted string
Range: 1-50 characters long password.
Description: Password for the created user.



Element Manager User's Manual Maintenance 47

2013 Net Insight AB, All rights reserved
6.6.1.4 Retype password
Default value: none
Type: Encrypted string
Range: 1-50 characters long password.
Description: Password for the created user. This password must match the previous line
for the setting to take effect.
To modify the settings for an already created used, go to the page and make the changes.
After confirming the changes with OK or Apply the settings are in effect but the
configuration must be saved for the settings to remain after a reboot.
6.7 Preferences
The node contains one set of preferences per user for event and alarm presentation. These
preferences are configured on the web page Maintenance Preferences. Here, the contents
and size of the event and alarm log can be set. The configurable parameters are:

Parameter
type
Description Type
Visible events Type of events that the user can see. There are six different
types: performance, config, reset, debug, info and alarm.
Boolean
Visible alarms Type of alarms that the user can see. There are five different
alarm categories the user can select: acknowledged alarms
(i.e. alarms actively acknowledged by the user) plus alarms
of severity levels warning, minor, major and critical.
Boolean
Event log size Number of events kept in the log and presented for the user.
Note: The log cannot contain more events than is set on the
Maintenance Systems Settings tab.
Integer
Auto refresh The refresh interval for the alarm list information. 30 s (default) is
recommended
Figure 25. Configurable parameters, user preferences

Click on the Maintenance Preferences. The Preferences page, shown below, appears.


Element Manager User's Manual Maintenance 48

2013 Net Insight AB, All rights reserved

Figure 26. Maintenance, Preferences page
Enter the desired information for the currently logged in user and click on the Apply
button and return to the Maintenance main page. Back up the configuration changes, so
they dont disappear after a reboot.
The default settings are that all events and alarms are visible, the event log size is 20 events
and the auto-refresh interval is 30 seconds. The range of the event log view file size is read
from the module.
6.7.1 Configuration handling
In order not to risk losing the configuration when changes have been verified and approved,
the configuration should be backed up.
Click on the Maintenance menu link and then click on Configurations. The Maintenance
Configurations page appears.

Figure 27. Configurations page
The table shows active and previous configurations stored in flash memory. The active
configuration is at the top of the table. The maximum number of saved configurations is
eight, numbered between 0 and 7).

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
The table shows the following information:

Parameter
Id The index number of the
Name A user-
Description An optional user
Valid Indicates if the configuration is allowed
with lowest Id number and a set
Date Date and time when the configuration was saved
Figure 28. Maintenance

Tip:

If Valid is set to Yes for more than one configuration
configuration with
The previous configurations are retained in the unit until they are deleted. To
make a previous configuration in the list active, set the Valid
all configurations prior to the

6.7.2 Saving the current configuration
Navigate to the Maintenance
When the Save configuration
Figure 29. Backup (save)
Enter a name for the configuration in the
Description field. The
Click OK.
A dialogue box pops up, indicating that the operation may
Configurations page
concluded.
Maintenance
2013 Net Insight AB, All rights reserved
The table shows the following information:
Description
The index number of the configuration
-defined name of the configuration
An optional user-defined description of the configuration
Indicates if the configuration is allowed (valid) on reboot or not. The configuration
with lowest Id number and a set valid flag is used for reboot (i.e. it is active).
Date and time when the configuration was saved
Maintenance configuration parameters
If Valid is set to Yes for more than one configuration, the first
configuration with Valid set to Yes is used at reboot.
The previous configurations are retained in the unit until they are deleted. To
previous configuration in the list active, set the Valid flag to
all configurations prior to the one to be used and restart the node.
Saving the current configuration
Maintenance Configurations page according to the previous section.
Save configuration button is clicked, the Save configurations page appears
(save) configuration to the node
Enter a name for the configuration in the Name entry field, and a suitable description in the
field. The Valid checkbox must be ticked, if the configuration is to be active
A dialogue box pops up, indicating that the operation may take a while. The Maintenance
Configurations page reappears with the new configuration active once the operation is
Maintenance 49
. The configuration
valid flag is used for reboot (i.e. it is active).
The previous configurations are retained in the unit until they are deleted. To
to No for

according to the previous section.
page appears:

entry field, and a suitable description in the
, if the configuration is to be active.
Maintenance
reappears with the new configuration active once the operation is

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
6.7.3 Download of
Note:

Changes in a valid configuration occur w
active configuration is made inactive or deleted the entire system is
affected on restart, as another configuration becomes active.
Only one configuration can be active at any given time.

Navigate to the Maintenance
Click on the Id of the configuration to be modified in the Id column. The
configurations page appears.
itself, but the valid flag can be changed.
Figure 30. Edit configuration
Information about the configuration, such as name, when it was created, a description and
its size, is shown. The only parameter that can be
A click on Download file
Click OK. The Maintenance
6.7.4 Upload configurations
To upload a prepared configuration file to the unit, use the following procedure:
Navigate to the Maintenance
click on the Upload configuration
Maintenance
2013 Net Insight AB, All rights reserved
of configurations to PC
Changes in a valid configuration occur when the unit is restarted. If the
configuration is made inactive or deleted the entire system is
affected on restart, as another configuration becomes active.
Only one configuration can be active at any given time.
Maintenance Configurations page according to the previous section.
d of the configuration to be modified in the Id column. The Edit
page appears. On this page, nothing can be configured in the configuration
itself, but the valid flag can be changed.
configuration
the configuration, such as name, when it was created, a description and
size, is shown. The only parameter that can be set here is the Valid flag.
Download file downloads the configuration to a workstation/PC.
Maintenance Configurations page appears, reflecting the modification.
configurations from PC
To upload a prepared configuration file to the unit, use the following procedure:
Maintenance Configurations page according to the previous section and
Upload configuration button. The Upload page appears.
Maintenance 50
according to the previous section.
Edit
On this page, nothing can be configured in the configuration

the configuration, such as name, when it was created, a description and

appears, reflecting the modification.
To upload a prepared configuration file to the unit, use the following procedure:
ccording to the previous section and

Element Manager User's Manual Maintenance 51

2013 Net Insight AB, All rights reserved

Figure 31. Upload configuration page
Click on the Browse button. A standard File Open dialogue box appears. Select the desired
file and click the OK button.
The Confirm uploaded configuration page, appears.

Figure 32. Confirmation page for Upload configuration
Enter an appropriate name and a description for the configuration in the Configuration
name and Description entry fields. The Valid checkbox should be ticked if the file is to
become active directly.
Click the OK button. The Maintenance Configurations page reappears with the new
active configuration at the top of list.


Element Manager User's Manual

2013 Net Insight AB, All rights reserved
6.7.5 Switching configurations
To make a previous configuration active, the Valid option has
configurations prior to the wanted one in the list. This is done by following these steps:
Enter the Maintenance
the name of the configuration to be modified in the N
page appears.
Make the configuration inactive by clearing the Valid checkbox.
If necessary, repeat to make other configurations inactive. After setting all needed
configurations to inactive (i.e. not Valid), restart t
the configuration file with the lowest Id number that is Valid.
6.7.6 Delete a configuration

Note:

If the active configuration is deleted, the entire system is affected after
the unit is rebooted, as another configuration becomes active.
reboot takes place
simply runs on the current configuration (wh
deleted).

Enter the Maintenance
the id of the configuration to be
appears.
To delete the configuration, click on
confirmation window that opens. The configuration is removed directly.
6.7.7 Software maintenance
New software and firmware is easily installed on the Nimbra switch directly from the web
interface. The newly installed soft
reboot of the node.
Running and installed software images, also known as GX system releases, are shown on
the Maintenance Software page below. The Running image is currently active and
Installed image becomes active upon reboot. An image consists of a directory structure
with a number of files and can be downloaded from a Net Insight ftp or http server
provided that the customer has an active support contract
It is shown how well the different soft
release in the variable System alignment status.
click on the Maintenance
vulnerable-strong, vulnerable
The meaning of the different variable values is:


Maintenance
2013 Net Insight AB, All rights reserved
Switching configurations
To make a previous configuration active, the Valid option has to be set to No for all
configurations prior to the wanted one in the list. This is done by following these steps:
Maintenance Configurations page according to the previous section.
the name of the configuration to be modified in the Name column. The Edit configuration
Make the configuration inactive by clearing the Valid checkbox.
If necessary, repeat to make other configurations inactive. After setting all needed
configurations to inactive (i.e. not Valid), restart the node. The node becomes active with
the configuration file with the lowest Id number that is Valid.
Delete a configuration
If the active configuration is deleted, the entire system is affected after
the unit is rebooted, as another configuration becomes active. If no
reboot takes place immediately, nothing happens directly. The node
simply runs on the current configuration (which now happens to be
deleted).
Enter the Maintenance Configurations page according to the previous section. Click on
the id of the configuration to be deleted in the Id column. The Edit configuration
To delete the configuration, click on the Delete button. Confirm the action in the
confirmation window that opens. The configuration is removed directly.
Software maintenance
New software and firmware is easily installed on the Nimbra switch directly from the web
installed soft- and firmware combination is activated upon a manual
Running and installed software images, also known as GX system releases, are shown on
Software page below. The Running image is currently active and
Installed image becomes active upon reboot. An image consists of a directory structure
with a number of files and can be downloaded from a Net Insight ftp or http server
provided that the customer has an active support contract.
l the different soft- and firmware modules are aligned to a single GX
release in the variable System alignment status. To see the current value of this variable,
Maintenance Software link. The variable can have five values: full, weak,
strong, vulnerable-weak and none.
The meaning of the different variable values is:

Maintenance 52
to be set to No for all
configurations prior to the wanted one in the list. This is done by following these steps:
o the previous section. Click on
ame column. The Edit configuration
If necessary, repeat to make other configurations inactive. After setting all needed
The node becomes active with
Configurations page according to the previous section. Click on
in the Id column. The Edit configuration page
the Delete button. Confirm the action in the
New software and firmware is easily installed on the Nimbra switch directly from the web
and firmware combination is activated upon a manual
Running and installed software images, also known as GX system releases, are shown on
Software page below. The Running image is currently active and the
Installed image becomes active upon reboot. An image consists of a directory structure
with a number of files and can be downloaded from a Net Insight ftp or http server,
and firmware modules are aligned to a single GX-
To see the current value of this variable,
variable can have five values: full, weak,

Element Manager User's Manual Maintenance 53

2013 Net Insight AB, All rights reserved
Alignment Meaning
full All running, primary and secondary images (reported by the CLI command swap)
must match entries in the current Packages.list file: the image is found and the board
criteria matches the board article number and revision
weak All running and primary images match entries in the current Packages.list file but
some secondary images differ. Restart of a board or the entire node is OK if all
boards boot from their primary image. If a board with different primary and
secondary images fails to boot the primary image, but succeeds with the secondary
image, this board may become unusable. (Double error: board reboot and image
failure)
vulnerable-
strong
All primary images match entries in the current Packages.list file, but some running
images differ (node controller and at least one interface board); all secondary images
are the same as the corresponding primary images. Restart of the node will give full
alignment.
vulnerable-
weak
All primary images match entries in the current Packages.list file but some running
images differ (node controller and at least one interface board); at least one
secondary image is different from the corresponding primary image. Restart of the
node will give weak alignment.
none All other cases
Possible values for the parameter System alignment status


Figure 33. Maintenance, Software page


Element Manager User's Manual Maintenance 54

2013 Net Insight AB, All rights reserved

The following information is shown:
Running image: Currently running image
Installed image: Image that boots upon restart of the node
System alignment status: The alignment between different software modules is shown in
the variable System alignment status. If its value is not full, all discrepancies are listed.
Possible values for this parameter are full, vulnerable-strong, weak, vulnerable-weak and
none. Under normal operation, the value is expected to be full.
To install a new image, click on the Install image button. A new page asking for a
URL with the location of the repository of the new image appears (see below). The
repository is the directory including all files that belong to a particular system software
release.
To install the image, simply provide the URL and click on install. Observe that the
currently running software image is active until the node has been rebooted.



Figure 34. Maintenance, Software, Install page for ftp servers.


Figure 35. Maintenance, Software, Install page for http servers.

Element Manager User's Manual Maintenance 55

2013 Net Insight AB, All rights reserved
For a better understanding of what this web page does, consult the Up- and Downgrading
chapter.
6.7.8 Alarm I/O configuration
In the current release, alarm in- and output signals are supported for Nimbra One, Nimbra
340, 380 and all Nimbra 600 series nodes.
Nimbra One and Nimbra 300 series nodes with alarm I/O ports have one configurable
output, between pin 5 and pin 9 on the DSUB-9 physical contact and six configurable input
pins (pins 2-4 and 6-8). Nimbra 600 has 16 different configurable interfaces/pins on two
DSUB-9 contacts located on the GPIO alarm module front (optional module).
The pins are numbered according to the following principle:
1:0:<pin number> for Nimbra One, Nimbra 340 or 380
1:<DSUB number on module (1 or 2)>:<pin number> for Nimbra 600.
Example: gpio1:1:4 (Nimbra 600), gpio1:2:8 (Nimbra 600) and gpio 1:0:5 (Nimbra
One/300 series). For Nimbra 600, pin #7 (of both contacts) is connected to ground and is
not configurable.
To configure pins of Nimbra One/300, proceed as follows (Nimbra 380 is shown as an
example):

Enter the Maintenance Alarm I/O page by clicking on the link. Initially, no alarm pins
are configured, which is displayed as direction unused in the list. Click on the direction of
the pin, i.e. the link unused of the pin to be configured.

Figure 36. Alarm I/O configuration page for Nimbra 380.
A new submenu appears.


Element Manager User's Manual Maintenance 56

2013 Net Insight AB, All rights reserved

Figure 37. Alarm I/O configuration direction page
To start configuring the pin, select Direction Output for pin 5 or Direction Input for pins
2-4 and 6-8 and click on the OK button. The main Alarm I/O menu reappears.
Select the pin to be configured by clicking on the link to the pin (in the example below, on
the link gpio1:0:2).

Figure 38. Alarm I/O configuration page of a specific interface/pin
To start configuring the interface/pin, select if the alarm is active when the circuit (pin to
common ground, pin 9) is open/high or when it is closed/low. Make the additional
parameter settings:


Element Manager User's Manual Maintenance 57

2013 Net Insight AB, All rights reserved

Parameter Default Possible values
Type Equipment Communications
Environmental
Equipment
Processing error
Quality of Service
Severity Warning Warning
Minor
Major
Critical
Text GPIO port active Text string
Figure 39. Alarm I/O configuration parameters
Proceed by clicking on the Apply or OK button. The configuration is complete.
To configure pins of Nimbra 680, proceed as follows:
Enter the Maintenance Alarm I/O page by clicking on the link. Initially, no alarm pins
are configured, which is displayed as direction unused in the list. Click on the direction of
the pin, i.e. the link unused of the pin to be configured.


Figure 40. Alarm I/O configuration page for Nimbra 680.
A new submenu appears.

Element Manager User's Manual Maintenance 58

2013 Net Insight AB, All rights reserved

Figure 41. Alarm I/O configuration direction page
To start configuring the pin, select Direction Output or Input as desired and click on the
OK button. The main Alarm I/O menu reappears.
Select a pin to be configured by clicking on the link to it (in the example below, on the link
gpio1:2:9 on the main alarm I/O configuration page).

Figure 42. Alarm I/O configuration page of a specific interface/pin
To start configuring the interface/pin, select if the alarm is active when the circuit (pin to
common ground, pin 7) is open/high or when it is closed/low. Proceed by clicking on the
Apply or OK button.
Now up to eight different criteria can be chosen to activate the alarm. In order to add a
criterion, click on the Add criterion button.

Element Manager User's Manual Maintenance 59

2013 Net Insight AB, All rights reserved

Figure 43. Alarm I/O configuration page for a specific criterion.
Select Cause, Type and Severity according to preferences. For these alarm properties,
a drag-and-drop menu guides the user to the available alternatives. For alarm properties
Object name and Text, the * character may facilitate the selection, but no drag-and-
drop help is available. The * character matches any characters to the right of its position,
e.g. LO* matches both LOS and LOF. If in doubt about object name and text, it is strongly
suggested that the default string * is kept.
Click on the Apply button if one (or more) additional criterion is wanted; otherwise use the
OK button. Add all criteria. If satisfied, the criteria cause the pin to become active on an
or-basis (i.e. if one or more of the criteria is satisfied, the pin becomes active).
To remove a configuration, just click on the output link on the Maintenance Alarm I/O
page, select Unused and click on OK or Apply.


Element Manager User's Manual

2013 Net Insight AB, All rights reserved
Note:

If Cause, Type, Severity,
in a manner not consistent with software defined alarms, the particular
criterion cannot be satisfied and thus never generate
condition does not in itself generate an alarm.
use the
For Nimbra360, gpio1:0:2
in hardware.
6.8 Cooling
From GX4.8, there is an option to select how the cooling of the node is controlled. This
option is only available for Nimbra 680 and Nimbra 688 nodes.
Figure 44. Drop-down menu for selection of cooling profile.
The cooling profiles available are:


Profile
Disabled This profile means that the function cooling profile selection is disabled. The
fans run with a constant RPM, namely 80% of maximum.
Silent This profile means that regulation is made with (low) noise level as primary
objective. Suitable for
cooing. The slightly higher board temperature saves fan life.
Cool This profile is made with high system life as primary objective.
challenging environments
nodes.
Balanced This profile is default and a compromise between profiles Silent and Cool.
Suitable for normal operating conditions.
Figure 45. Cooling profiles available in Nimbra 600 series
Maintenance
2013 Net Insight AB, All rights reserved
If Cause, Type, Severity, Object name and Text has been selected
in a manner not consistent with software defined alarms, the particular
criterion cannot be satisfied and thus never generates an alarm. This
condition does not in itself generate an alarm. In order to avoid the
use the any- selection whenever in doubt.
gpio1:0:2 to gpio1:0:9 pins are shown as absent. They are not implemented
GX4.8, there is an option to select how the cooling of the node is controlled. This
option is only available for Nimbra 680 and Nimbra 688 nodes.
down menu for selection of cooling profile.
The cooling profiles available are:
Description
This profile means that the function cooling profile selection is disabled. The
fans run with a constant RPM, namely 80% of maximum.
This profile means that regulation is made with (low) noise level as primary
objective. Suitable for noise sensitive environments, with good ambient
cooing. The slightly higher board temperature saves fan life.
This profile is made with high system life as primary objective. Suitable for
challenging environments, where staff normally isn't located close to the
This profile is default and a compromise between profiles Silent and Cool.
Suitable for normal operating conditions.
Cooling profiles available in Nimbra 600 series
Maintenance 60
Object name and Text has been selected
in a manner not consistent with software defined alarms, the particular
This
the situation,
They are not implemented
GX4.8, there is an option to select how the cooling of the node is controlled. This

This profile means that the function cooling profile selection is disabled. The
This profile means that regulation is made with (low) noise level as primary
noise sensitive environments, with good ambient
Suitable for
lose to the
This profile is default and a compromise between profiles Silent and Cool.

Element Manager User's Manual Maintenance 61

2013 Net Insight AB, All rights reserved
6.9 Software program error alarm
From system release software version GX4.7, an alarm is generated every time an
unexpected (spontaneous) reboot occurs. This alarm is seen when the node has rebooted
and is active again. The alarm has severity warning.

Figure 46. The Software program error alarm with text Crash dump available is
generated whenever a crash dump file is found on the node.
The intention behind this alarm is that any time an unexpected reboot occurs, as this is a
serious event, the event should be reported to Net Insight support. To investigate the node
behavior, a nodeinfo file and the particular circumstances around the event are needed. The
alarm could appear after a manual reboot as well; also this case should be reported.
When this alarm is observed, please contact Net Insight support and inform them about the
details, generate a nodeinfo file and send this file to Net Insight support together with the
Trouble Report ticket number.
The nodeinfo file is generated from the link Status Nodeinfo.


Figure 47. The nodeinfo file is generated from the Status Nodeinfo link.

Element Manager User's Manual Maintenance 62

2013 Net Insight AB, All rights reserved


Figure 48. Generation in progress of the nodeinfo file.


Figure 49. The generated nodeinfo file is ready for download. To download, click on the
Download nodeinfo button. The downloaded nodeinfo file should be sent to
Net Insight support for investigation.

Element Manager User's Manual Status Monitoring 63

2013 Net Insight AB, All rights reserved
7 Status Monitoring
7.1 Overview of status monitoring
This chapter describes how general supervision of status and configuration is performed
over the web interface.
The starting web page for status monitoring is shown as below.

Figure 50. The start web page for Status (monitoring)
The available subpages are:

Alarms: present the alarms in the node
Events: present the events in the node
Syslog: presents a log of the system (node)
Equipment: lists the installed equipment in the node.
Sensors: lists information available on the various sensors in the node
Inventory: presents the cards in the node including all the information about it such as: Art
no, Rev and serial number.
Who: shows the users that are logged in to the node
NTP: shows NTP servers (clocks) available for the node
Nodeinfo: is a link to create a nodeinfo file, needed for advanced troubleshooting.


Element Manager User's Manual

2013 Net Insight AB, All rights reserved
7.2 Alarms and events
An alarm is the reporting of a fault or a condition in the system. The alarm is always active
or cleared, meaning that an alarm is indicating an actual status. It should always be possible
to examine the fault condition, and from this determine
event is something that happens within the system, but is not necessary a fau
All alarms are events, but

Note:

The alarm list will present the alarms which are
Maintenance
7.2.1 The alarms page
When clicking on the Status
Figure 51. Alarms page
More information about the alarms is available by clicking on the link under the Cause
heading.
The table shows the Active

Status Monitoring
2013 Net Insight AB, All rights reserved
and events
An alarm is the reporting of a fault or a condition in the system. The alarm is always active
red, meaning that an alarm is indicating an actual status. It should always be possible
to examine the fault condition, and from this determine whether an alarm exists or not. An
event is something that happens within the system, but is not necessary a fault or condition.
All alarms are events, but not all events are alarms.
The alarm list will present the alarms which are selected under the
Maintenance Preferences link.
The alarms page
on the Status Alarms link, the following page appears:
Alarms page
More information about the alarms is available by clicking on the link under the Cause
Active and Cleared alarms as follows.

Status Monitoring 64
An alarm is the reporting of a fault or a condition in the system. The alarm is always active
red, meaning that an alarm is indicating an actual status. It should always be possible
whether an alarm exists or not. An
lt or condition.

More information about the alarms is available by clicking on the link under the Cause

Element Manager User's Manual Status Monitoring 65

2013 Net Insight AB, All rights reserved

Cause Describes the cause of alarm
Sev
Shows the severity of the alarm. The following values are possible:
Cr Critical (red)
A service affecting condition has occurred and an immediate corrective action
is required.
Ma Major (orange)
A service affecting condition has developed and an urgent corrective action is
required.
Mi Minor (yellow)
The existence of a non-service affecting fault condition and corrective action
should be taken in order to prevent a more serious fault.
Wa Warning (blue)
Detection of a potential or impending service affecting fault, before any
significant effects have been felt.
Info Information
Cl Cleared (green)
The cleared severity level indicates that the alarm is no longer active.
Object name
The object that triggers the alarm.
Text More detailed text about the alarm.
Time
Time stamp for the alarm.
Ack Flag that tells if the alarm has been acknowledged or not. Not available for
events.
Figure 52. Description of alarm and event properties. For a full specification of the
alarms, see the appropriate Alarms list (Document NID2004.pdf).
To find the event list rather than the alarm list, click on links Status and then Events. The
Events page appears.


Figure 53. Events page


Element Manager User's Manual

2013 Net Insight AB, All rights reserved
7.2.2 Acknowledging an alarm
The alarms remain in the
the alarm has been acknowledged. To acknowledge an alarm, do the following:
Go to the Alarms web
Cause column. The Edit
Figure 54. Acknowledge alarm page
This page shows the same i
Comment field and an Acknowledged drop
Enter any desired comment, set the Acknowledged drop
Apply or OK. The alarm
on the alarm page.

Note:

In some circumstances the cause of the alarm cannot be removed or the alarm should
not be acknowledged until later. In this case, use the Comments field to pass on any
comment regarding the alarm event.
Note that the action of acknowledging an alarm does not remove the alarm from the
alarm list
7.3 Syslog
The Syslog page lists a log of the
on the Syslog tab on the web page
and Older, which takes the user to the latest entries in the syslog or to older entries. For
Nimbra 600 with dual Node Controllers, latest and older syslogs are available for both
Node Controllers (shown).
Status Monitoring
2013 Net Insight AB, All rights reserved
Acknowledging an alarm
The alarms remain in the Alarm monitor field at the top of the alarms list web page until
alarm has been acknowledged. To acknowledge an alarm, do the following:
web page described before. Click on the alarm to be acknowledged in the
Edit page below is shown:
Acknowledge alarm page
This page shows the same information as the alarm list, with the addition of an editable
Comment field and an Acknowledged drop-down menu.
Enter any desired comment, set the Acknowledged drop-down menu to Yes and click
The alarm now appears with Ack (alarm acknowledgement)
In some circumstances the cause of the alarm cannot be removed or the alarm should
not be acknowledged until later. In this case, use the Comments field to pass on any
comment regarding the alarm event.
Note that the action of acknowledging an alarm does not remove the alarm from the
alarm list or change its severity.
page lists a log of the node. To access the page, click on the Status
tab on the web page that appears. The Syslog page contains two links, Latest
and Older, which takes the user to the latest entries in the syslog or to older entries. For
Nimbra 600 with dual Node Controllers, latest and older syslogs are available for both
hown).
Status Monitoring 66
web page until
alarm has been acknowledged. To acknowledge an alarm, do the following:
. Click on the alarm to be acknowledged in the

nformation as the alarm list, with the addition of an editable
and click
owledgement) set to yes
In some circumstances the cause of the alarm cannot be removed or the alarm should
not be acknowledged until later. In this case, use the Comments field to pass on any
Note that the action of acknowledging an alarm does not remove the alarm from the
lick on the Status link and then
The Syslog page contains two links, Latest
and Older, which takes the user to the latest entries in the syslog or to older entries. For
Nimbra 600 with dual Node Controllers, latest and older syslogs are available for both

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
Figure 55. The Syslog page for a Nimbra 600 with dual Node Controllers.
Figure 56. The Syslog page (latest) for the active node controller.
Syslog is configured from the
default configuration is
*.*;local1.!=info
*.alert /dev/console
This configuration logs all system messages, except from local1 info level (that pertains to
the creation, modification and deletion of DTM OAM objects), to the file
/var/log/messages
The syntax of the configuration items adheres to the standard BSD syslog implementation
as described in the syslog.conf

Note:

It is important that the filename, of the file to which
messages are written, is preceded with a
performance of the node can degrade significantly.
Status Monitoring
2013 Net Insight AB, All rights reserved
The Syslog page for a Nimbra 600 with dual Node Controllers.
The Syslog page (latest) for the active node controller.
is configured from the syslog tab on the MaintenanceSystem web page
default configuration is
*.*;local1.!=info -/var/log/messages
*.alert /dev/console
This configuration logs all system messages, except from local1 info level (that pertains to
the creation, modification and deletion of DTM OAM objects), to the file
/var/log/messages. Furthermore, it also displays all critical messages on the console.
The syntax of the configuration items adheres to the standard BSD syslog implementation
syslog.conf man page of most Linux systems.
It is important that the filename, of the file to which the logged
messages are written, is preceded with a - sign. Otherwise the
performance of the node can degrade significantly.
Status Monitoring 67


web page. The
This configuration logs all system messages, except from local1 info level (that pertains to
ll critical messages on the console.
The syntax of the configuration items adheres to the standard BSD syslog implementation

Element Manager User's Manual Status Monitoring 68

2013 Net Insight AB, All rights reserved
An alternative useful setting is
*.*;local1.!=info @<IP address of central syslog daemon>
This setting will send all system messages over UDP port 514 to a central syslog server.
This is a convenient way of consolidating node system and events messaging information in
a simple way. Note that the syslog protocol does not guarantee that messages are
transferred between sender and listener.
Generally some care should be taken when changing syslog settings since flooding of
messages that should be written to the internal flash memory can severely affect the
performance of the node.

Figure 57. Definition of the syslog file.


Element Manager User's Manual Status Monitoring 69

2013 Net Insight AB, All rights reserved
7.4 Equipment
The Equipment page lists the installed modules and gives a temperature reading of the unit.
To access the page, click on the Status Equipment link. The following page appears:

Figure 58. Equipment page
In order to configure the fan unit (in particular the Enable air filter replacement alarm),
the link FAN should be used. The following page then appears:

Figure 59. Configuration of the Air filter replacement alarm.

Element Manager User's Manual Status Monitoring 70

2013 Net Insight AB, All rights reserved
When a filter is replaced or when the function is first enabled, the Date when air filter was
last replaced and Air filter replacement interval are filled out and the Enable air filter
replacement alarm tick box is selected. Unless the default setting is changed, an alarm is
issued until the alarm is enabled and then disabled or set.
After the tick box is selected, the Apply button should be pressed. The variable Date
when air filter shall be replaced is calculated and presented on the web page. An alarm
with severity warning is presented when this date is passed, which indicate that a
replacement is needed. For suitable air filter replacement intervals, please see the relevant
Installation and Maintenance manual. Default values, ranges and formatting of the
parameters are indicated in the table below:

Parameter Default Range Format Comment
Enable air filter
replacement
alarm
Disabled Disabled or
Enabled
Tick box The default setting
generates an alarm by
default, suggesting to the
user to enter a vale.
Date when air
filter was last
replaced
Thu Jan 1
01:00:00 1970
1970-2038 Thu Jan 1
01:00:00 1970
Weekday (Mon, Tue,
Wed, Thu, Fri, Sat, Sun)
is ignored
Air filter
replacement
interval
0 0-24855 Integer Configuration of days
between filter
replacement
Date when air
filter shall be
replaced
(variable)
Thu Jan 1
01:00:00 1970
1970-2038 Thu Jan 1
01:00:00 1970
Calculated as Date when
air filter was last
replaced plus Air filter
replacement interval
Figure 60. Air filter replacement parameters and variables.
7.4.1 Setting the administrative status of a module (board)
To set the administrative status of a board, follow the Status Equipment link. Click on
the position (Pos) of one of the modules. The Board page appears.

Figure 61. Board page

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
In the roll-down menu, the Administrative status
Apply to change the setting.
requested for odd numbered interface slots (i.e. slots IF1, IF3, IF5, IF7, IF9, ). This is
described more in next chapter.
The status of the card can be verified in the administrative status and operat
columns of the Status

Note:

A change in the Administrative Status of the standby Node Controller
needs to be saved (i.e. the configuration needs to be saved) in order for
the change to remain in place after a system reboot

7.4.2 Allocating backplane capacity in Nimbra 600

Note:

The following applies only when using 40 Gbps switch modules in the Nimbra 680
or when using 80 Gbps switch modules in Nimbra 688. When using 80 Gbps switch
modules in Nimbra 680 or 160 Gbps switch
10 Gbps allocated to each interface position.
40 Gbps switch modules for Nimbra 688 is not supported.
In the Nimbra 680/688 switch, it is possible to configure the capacity allocated to a board
position. Capacity is allocated in a row
adjacent slots in the same row (for example IF3 and IF4). The left position has an odd IF
number (for example IF3). The total capacity of a row
40 Gbps switch module is used in Nimbra 680 or an 80 Gbps switch module is used in
Nimbra 688. The capacity can be allocated to the two slots as follows:

Option Left slot
1 (default) 5 Gbps
2 10 Gbps
Figure 62. Backplane capacity allocation in
Default is that both IF position
interface module should have the whole capacity of the row
configured for that. This is described below.

Note:

Note that both slots of a row
above, by changing the capacity of one slot.
pair will be restarted.

Trunk and access modules can be classified in three different categories. Some modules
always require 10 Gbps switching capacity, some modules never require 10 Gbps switching
capacity and some modules require 5 or 10 Gbps switching capacity depending on how
they are used.
Modules that never require more than 5 Gbps switching capacity are:
4 x OC-3/STM-1 Trunk
4 x OC-12/STM-4 Trunk
Status Monitoring
2013 Net Insight AB, All rights reserved
down menu, the Administrative status is set to Up or Down. Click on OK or
Apply to change the setting. On this page, capacity towards the backplane is also
requested for odd numbered interface slots (i.e. slots IF1, IF3, IF5, IF7, IF9, ). This is
described more in next chapter.
The status of the card can be verified in the administrative status and operational status
Status Equipment page.
A change in the Administrative Status of the standby Node Controller
needs to be saved (i.e. the configuration needs to be saved) in order for
the change to remain in place after a system reboot.
Allocating backplane capacity in Nimbra 600
The following applies only when using 40 Gbps switch modules in the Nimbra 680
or when using 80 Gbps switch modules in Nimbra 688. When using 80 Gbps switch
modules in Nimbra 680 or 160 Gbps switch modules in Nimbra 688, there is always
10 Gbps allocated to each interface position.
40 Gbps switch modules for Nimbra 688 is not supported.
In the Nimbra 680/688 switch, it is possible to configure the capacity allocated to a board
allocated in a row-pair fashion. A row-pair consists of the two
adjacent slots in the same row (for example IF3 and IF4). The left position has an odd IF
number (for example IF3). The total capacity of a row-pair is always 10 Gbps, provided a
h module is used in Nimbra 680 or an 80 Gbps switch module is used in
. The capacity can be allocated to the two slots as follows:
Left slot Right slot
5 Gbps
0 Gbps
Backplane capacity allocation in Nimbra 680/688.
IF positions in the row-pair have 5 Gbps allocated. If the lef
interface module should have the whole capacity of the row-pair, the module has to be
This is described below.
at both slots of a row-pair are affected, according to the Figure
above, by changing the capacity of one slot. Both boards in the row-
pair will be restarted.
Trunk and access modules can be classified in three different categories. Some modules
require 10 Gbps switching capacity, some modules never require 10 Gbps switching
capacity and some modules require 5 or 10 Gbps switching capacity depending on how
Modules that never require more than 5 Gbps switching capacity are:
1 Trunk
4 Trunk
Status Monitoring 71
Click on OK or
On this page, capacity towards the backplane is also
requested for odd numbered interface slots (i.e. slots IF1, IF3, IF5, IF7, IF9, ). This is
ional status
The following applies only when using 40 Gbps switch modules in the Nimbra 680
or when using 80 Gbps switch modules in Nimbra 688. When using 80 Gbps switch
modules in Nimbra 688, there is always
In the Nimbra 680/688 switch, it is possible to configure the capacity allocated to a board
pair consists of the two
adjacent slots in the same row (for example IF3 and IF4). The left position has an odd IF
, provided a
h module is used in Nimbra 680 or an 80 Gbps switch module is used in
left column
has to be
Trunk and access modules can be classified in three different categories. Some modules
require 10 Gbps switching capacity, some modules never require 10 Gbps switching
capacity and some modules require 5 or 10 Gbps switching capacity depending on how

Element Manager User's Manual Status Monitoring 72

2013 Net Insight AB, All rights reserved
8 x ASI/AES Access Module

Modules that always require 10 Gbps switching capacity are:
OC-192/STM-64 Trunk
10 Gigabit Ethernet Module (without rate limitation)
4 x OC-48/STM-16 Trunk (all interfaces in working order)
6 x IP/Ethernet Trunk Module (all interfaces in working order)

Modules that work at 5 Gbps are listed below. These modules work with increased
functionality at 10 Gbps.
4 x OC-48/STM-16 Trunk (only interfaces 1 and 2 in working order)
10 Gigabit Ethernet Trunk Module (with total rate limitation to 5 Gbps)
8 x Video Access Module (with total rate limitation to 5 Gbps)
Video Access Module v2 (with total rate limitation to 5 Gbps)
6 x IP/Ethernet Trunk Module (only interfaces 1 to 5 in working order)
J2K Video Access Module v2 (with total rate limitation to 5 Gbps)

To change the capacity allocation of an IF position, do the following:

Follow the Status Equipment link and click on the position of one of the modules. Note
that it is only possible to change capacity on the left module in a row-pair, i.e. on positions
IF1/3/5/7. The corresponding right slot capacity is adjusted though, according to the
previous discussion. The total capacity for the row-pair is 10 Gbps.


Figure 63. Edit board page, Nimbra 600 series

Element Manager User's Manual Status Monitoring 73

2013 Net Insight AB, All rights reserved
Select the Requested capacity, 5 or 10 Gbps and click Apply or OK. Furthermore, on
this page information from the various mounted SFPs is available (Digital Diagnostics).
Click the sfp link, like sfp3:1, and the web page shown below is displayed.

Figure 64. Pluggable interface page, with information from the particular SFP.


Element Manager User's Manual Status Monitoring 74

2013 Net Insight AB, All rights reserved
7.5 Sensors
On the sensors web page, various sensors with current values and alarm limits are shown.

Figure 65. The status sensors web page displays information on the various temperature
and other sensors in the node.
7.6 Inventory
The Inventory function describes the physical entities installed in the system.
A Physical entity or Physical component represents an identifiable resource within a
managed system. Typically, physical entities are resources like communications ports,
backplanes, sensors, daughter-cards, power supplies and the overall chassis which can be
managed. However, software/firmware images are also considered to be physical entities in
this (inventory) context, although they cannot be touched.
The Containment tree (status inventory) describes how entities are structured and contained
within each other. The use of the position entity allows modeling where a resource is

Element Manager User's Manual Status Monitoring 75

2013 Net Insight AB, All rights reserved
absent, i.e. a board slot position may be empty only to be filled out later. The containment
tree is listed in the inventory table.
To access the Inventory page, proceed as follows:
Click on the Status Inventory; the Inventory page appears.

Figure 66. The Inventory page, first part
On the inventory page, the containment tree of the entire node is displayed, i.e. what
resources are available in the node and how they are structured.


Element Manager User's Manual Status Monitoring 76

2013 Net Insight AB, All rights reserved

Figure 67. The Inventory page, second part
For Boards on which more than two FW-images could be stored, the image that is running
is indicated as follows:
Primary: Image stored as primary
Secondary: Image stored as secondary
Running: Image that is running (could be either the primary or secondary)
For boards on which only one FW-image could be stored, only the primary image is
presented. Here, the primary image must be running.


Element Manager User's Manual Status Monitoring 77

2013 Net Insight AB, All rights reserved
7.7 Who (is currently logged in)
This link (Status Who) lists all current users. To see the page, click on the link Status
Who.

Figure 68. The Status Who page
The table shows information about other logged in users; user name, Tty (type of terminal
used), From (IP address), Login (time) and Expire (time). Inactive users are automatically
logged out at Expire time.


Element Manager User's Manual Status Monitoring 78

2013 Net Insight AB, All rights reserved
7.8 NTP (Network Time Protocol)
Follow the link (Status NTP) and youll find the various NTP servers available for the
node listed. The table shows information about available clocks in the node.

Figure 69. The Status NTP page


Listing Description
Status * means active NTP, inactive
Peer Address of the clock source (NTP)
Ref Id (IP) Address of the clock source/NTP
Stratum Stratum level of the clock source/NTP
Poll interval (s) is the time between two consecutive interactions with the
clock source/NTP
Delay (ms) The time for the NTP signal to go from the node to the
NTP server and back
Offset (ms) is the time offset used by the node to allow for time transfer
delay
Jitter (ms) is the jitter exhibited by the NTP servers
Figure 70. Headers on the Status NTP page


Element Manager User's Manual Status Monitoring 79

2013 Net Insight AB, All rights reserved
7.9 Nodeinfo
In order to generate and download a diagnostic file about the node that is needed for
advanced troubleshooting, the link System Nodeinfo should be followed.
The nodeinfo file that can be generated contains the status of the node. If there is trouble
with the node, it is very valuable for troubleshooting to generate the file before the node in
rebooted, as a lot of information is lost when the node is rebooted.

Figure 71. Nodeinfo
The nodeinfo file is generated and saved in the node if the button Generate nodeinfo is
clicked and the choice is confirmed in the pop-up window.
When the file is generated, it can be viewed (View nodeinfo log). It can also be
downloaded or deleted directly (if the file was generated by mistake).


Element Manager User's Manual Status Monitoring 80

2013 Net Insight AB, All rights reserved

Figure 72. Nodeinfo page when the file has been generated.

Element Manager User's Manual Control Network 81

2013 Net Insight AB, All rights reserved
8 Control Network
8.1 General about In-band management
The management network is used for managing the nodes in the Nimbra network. It is used
when an operator or application access the nodes with telnet, HTTP or SNMP. The
management network can also be used by other protocols, such as NTP (Network Time
Protocol).
Typically, the type of traffic on a management network originates from management
stations located in a network outside the Nimbra (DTM) network. The networks are
connected with one or more IP gateways. Management stations interact with relevant nodes
when provisioning connections, collecting network statistics or checking the status of the
nodes. Alarm messages are sent from the managed nodes to a set of management stations.
Communication between the management station and the nodes is usually direct; there is
rarely any communication needed between the nodes. Communication is done through a
network management system such as Nimbra Vision or directly from a web browser or
telnet session.
8.1.1 Ethernet DLE
DLE (DTM LAN Emulation) emulates a LAN (Local Area Network) as an Ethernet
segment on top of Net Insights network. It is implemented using channels throughout the
network. Seen from DLE, each node in the segment has direct connectivity to all other
nodes, as on an Ethernet segment. The underlying physical topology of the DTM network is
not related to the topology of the segment, e.g. two nodes on the same DLE segment may
be located far away from each other.


D T M
Nimbra
X
Nimbra
X
Nimbra
X
Nimbra
X
DLE
client
DLE
client DLE
client
DLE
client
DLE
server
DLE
server
DLE Segment 1
server
DLE Segment 2
server

Figure 73. Two separate DLE segments.


Element Manager User's Manual

2013 Net Insight AB, All rights reserved

Note:

Note that the DLE segment is a logical
topology exists only on the DTM level.
8.1.2 IP and routing
Each node that is connected to the DLE segment has a virtual IP interface assigned,
allowing it to communicate with other nodes on the segment using IP. A gateway routes the
IP packets to and from the segment. This means that each segment has its own IP network
address. Routing can be to other networks, i.e. DLE segments, or to an out
network.
Routing will load the Control Module CPU of the gateway node. The number of packe
that can be routed will therefore be limited by the capacity of th
8.1.3 DLE clients
Each virtual Ethernet interface is implemented by the DLE client, one client per virtual
interface. When Ethernet packets are sent from one node to another
client establishes a channel to the remote node. The remote node
channel for any reply. This means that from each node, there will be a channel established
to every other node in the segment to which pac
of channels in a segment, channels can be torn down automatically or manually when they
are no longer used. By default, they are torn down automatically after
inactivity.
It is also possible to force
between DLE clients completely. This means that all DLE clients share one channel from
the server for all traffic.
D
Figure 74. A DLE segment with channels between DLE client
Control Network
2013 Net Insight AB, All rights reserved
Note that the DLE segment is a logical segment. The physical
topology exists only on the DTM level.
IP and routing
Each node that is connected to the DLE segment has a virtual IP interface assigned,
allowing it to communicate with other nodes on the segment using IP. A gateway routes the
ckets to and from the segment. This means that each segment has its own IP network
address. Routing can be to other networks, i.e. DLE segments, or to an out-band IP
Routing will load the Control Module CPU of the gateway node. The number of packe
that can be routed will therefore be limited by the capacity of this Control Module.
Each virtual Ethernet interface is implemented by the DLE client, one client per virtual
interface. When Ethernet packets are sent from one node to another within the segment, the
a channel to the remote node. The remote node in turn establish
channel for any reply. This means that from each node, there will be a channel established
to every other node in the segment to which packets have been sent. To reduce the number
of channels in a segment, channels can be torn down automatically or manually when they
By default, they are torn down automatically after ten minutes of
It is also possible to force all traffic to go through the server and avoid setting up channels
between DLE clients completely. This means that all DLE clients share one channel from
the server for all traffic.
Gateway
E
C
F
A
B
A DLE segment with channels between DLE clients
Control Network 82
Each node that is connected to the DLE segment has a virtual IP interface assigned,
allowing it to communicate with other nodes on the segment using IP. A gateway routes the
ckets to and from the segment. This means that each segment has its own IP network
band IP
Routing will load the Control Module CPU of the gateway node. The number of packets
Control Module.
Each virtual Ethernet interface is implemented by the DLE client, one client per virtual
within the segment, the
establishes a return
channel for any reply. This means that from each node, there will be a channel established
kets have been sent. To reduce the number
of channels in a segment, channels can be torn down automatically or manually when they
minutes of
all traffic to go through the server and avoid setting up channels
between DLE clients completely. This means that all DLE clients share one channel from
Gateway


Element Manager User's Manual Control Network 83

2013 Net Insight AB, All rights reserved
In this illustration it is assumed that all nodes communicate via the gateway (A). The
gateway has channels connected to and from all other nodes. Communication has taken
place between nodes (E) and (F) during the past ten minutes (or other configured time
interval, if the default setting is not used), resulting in an established channel between these
two nodes. It is possible to have multiple DLE clients on a single node.
Client to Server Channels and Server to Client Channels are used for broadcast packets, and
for DLE signaling.
Client to Client Channels are used for peer-to-peer communication.
8.1.4 DLE server
Each DLE segment has a DLE server. The responsibility of the server is to provide
information to the clients about other nodes in the segment and thus assist them to establish
connectivity to each other. Because the client and server must always be in contact with
each other, permanent channels are set up between them. One multicast channel is set up
from the server to all clients and one return channel is set up from each client to the server.
The channels between server and clients are also used when distributing broadcast packets.
The broadcast packets from a client are sent to the server, which distributes it to all the
other clients on the segment. Packets are also distributed this way if no client to client
channel is established between a pair of clients. Typically, this would be during the period
when a channel is being established.
8.1.5 Multiple DLE servers on a DLE segment
It is possible to use two DLE servers for a single segment. The servers co-operate and allow
for redundancy. At any time, a client is connected to only one server. The servers are
interconnected through channels, one in each direction. Client packets that would be sent
via the server to other clients are also replicated by the server and sent to the peering server
for distribution to its connected clients.
The two servers are used as alternative servers for the client. For each client, it is possible
to configure two alternative servers, where the servers must serve the same DLE segment.
When a client establishes a channel to a server, it tries the two servers in order. If a server
goes down, the client then establishes a new channel to the alternative server. This is the
way redundancy is implemented.
8.2 Configuration
Management traffic requires only moderate bandwidth. It is therefore adequate to use 512
kbps (equals one DTM slot) per channel, both between DLE servers (server-server) and
DLE clients (client-client). As the DLE client-to-server communication is only used for
signaling and broadcasting, 512 kbps is sufficient for these channels as well.
The recommendations in this document are for an in-band management network that is used
exclusively for management of the Nimbra nodes. No consideration has been taken for
other traffic. To limit the load on the DLE server, there is a recommended maximum of
DLE clients per server in one segment. To limit the load on the gateway, there is a
recommended maximum number of nodes with traffic routed through the gateway.
For availability reasons, when a single DLE server is used, it is recommended that the
gateway for a DLE segment is located on the same node as the DLE server.


Element Manager User's Manual Control Network 84

2013 Net Insight AB, All rights reserved
Critical parameters
N
i
m
b
r
a

O
n
e

N
i
m
b
r
a

3
0
0

N
i
m
b
r
a

6
0
0

Maximum recommended number of DLE clients for one DLE server 16 16 64
When working as gateway: maximum recommended number of
nodes to route traffic for
255 255 1000
Maximum recommended number of DLE clients on a node 3 3 3
Figure 75. Configuration recommendations of the DLE in-band network used for
managing the nodes from external management stations
8.3 Building networks with DLE
When building in-band management networks using DLE, use the recommendations
previously listed.
For networks larger than the number of nodes recommended within one DLE segment, it is
suggested that a tree of segments is built and intermediate nodes acts as gateways between
the segments. Note that the root of the tree will have to route traffic to and from all of nodes
to the external network.


Figure 76. Example of a network with three DLE segments built as a tree, and one
external network
The DLE segments have a netmask of 255.255.255.224 meaning that there can be 30 nodes
on each network (one address is the network, and one is the broadcast address). The
gateways route packets between the DLE segments and the external network.
If the Nimbra network consists of more nodes than what is recommended as the maximum
for one gateway, it is recommended to split the network into separate in-band management
networks and route the traffic to the external network with a dedicated node as the gateway.
b
Gateway
DLE segment
192.168.100.64/27
External network
192.168.1.0/24
192.168.100.33
DLE segment
192.168.100.00/27
192.168.100.66
a
DLE segment
192.168.100.32/27
192.168.100.34 35 36
67 68
192.168.100.1
192.168.100.65
Gateway
c
Gateway
2
3
192.168.1.1

Element Manager User's Manual Control Network 85

2013 Net Insight AB, All rights reserved

Figure 77. Large networks are divided into smaller networks, each with its gateway to the
external management network
8.4 IP routing
Setting up DLE only configures the individual DLE segments; it does not provide routing
between DLE segments. As with all IP networks, routing must be configured in each node.
Setting up IP routing for a DLE segment is not different from setting up IP routing in
general.
A routing entry consists of a destination, a netmask and a gateway. When a packet is sent to
a node outside the network, the IP address to the node is masked with the netmask of a
route. If the masked IP address matches the destination of the route, the packet is forwarded
to the gateway specified in the route. The gateway must be located on the local IP sub-
network.
On each node in the DLE segment, a default gateway routing entry should be specified.
This route is used to forward packets to nodes outside the DLE segment. The default route
is specified as destination 0.0.0.0 with netmask 0.0.0.0. This entry will match all IP
addresses. The gateway shall be the IP address of the gateway on the DLE segment.

Gateway
Tree of nodes
and DLE
segments
Tree of nodes
and DLE
segments
Gateway


External management
network

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
Node a
Destination: 0.0.0.0
Netmask: 0.0.0.0
Gateway: 192.168.100.33
Node b
Destination: 0.0.0.0
Netmask: 0.0.0.0
Gateway: 192.168.100.1
Destination: 192.168.100.64
Netmask: 255.255.255.224
Gateway: 192.168.100.3
Node c
Destination: 0.0.0.0
Netmask: 0.0.0.0
Gateway: 192.168.1.222
Destination: 192.168.100.32
Netmask: 255.255.255.224
Gateway: 192.168.100.2
Destination: 192.168.100.64
Netmask: 255.255.255.224
Gateway: 192.168.100.3
External node
Destination: 192.168.100.0
Netmask: 255.255.255.0
Gateway: 192.168.1.1

Figure 78. Routing tables for a previously discussed network.
Note:

Node c must have two routing entries, in addition to the default route,
one to each network (DLE segments)
DLE segments are defined, additional routing entries are also needed.



Control Network
2013 Net Insight AB, All rights reserved
Destination: 0.0.0.0
Gateway: 192.168.100.33
Destination: 0.0.0.0
Gateway: 192.168.100.1
Destination: 192.168.100.64
Netmask: 255.255.255.224
Gateway: 192.168.100.3
Destination: 0.0.0.0
Gateway: 192.168.1.222
Destination: 192.168.100.32
Netmask: 255.255.255.224
Gateway: 192.168.100.2
Destination: 192.168.100.64
Netmask: 255.255.255.224
Gateway: 192.168.100.3
Destination: 192.168.100.0
Netmask: 255.255.255.0
Gateway: 192.168.1.1
Default route
Default route
Default route. The gateway is the
node on the external network that
acts as gateway to other networks.
This might not be any node, in which
case this entry does not exist. In this
example, it is assumed that the
gateway is 222, which is not shown
in the figure.
This route is only necessary if you
want to be able to send packets from
network 192.168.100.32 to network
192.168.100.64.
Routing tables for a previously discussed network.
Node c must have two routing entries, in addition to the default route,
one to each network (DLE segments) in the picture shown. If additional
DLE segments are defined, additional routing entries are also needed.

Control Network 86
Default route. The gateway is the
node on the external network that
acts as gateway to other networks.
This might not be any node, in which
case this entry does not exist. In this
example, it is assumed that the
gateway is 222, which is not shown
This route is only necessary if you
want to be able to send packets from
network 192.168.100.32 to network
If additional

Element Manager User's Manual Control Network 87

2013 Net Insight AB, All rights reserved
8.5 Control Network main web page
This section describes how to use the web interface to set up IP and SNMP parameters for
in- and out-band management. The starting web page for Control network is shown below.


Figure 79. The Control network web page
The sub-sections (links): In-band servers, In-band clients, IP interfaces, IP routing conf, IP
routing table and SNMP.
8.6 In-band servers
DLE servers use one single multicast channel for connection to all peering DLE servers.
Each server is responsible for re-establishing the originating multicast channel in case
(parts of) it goes down, after verifying that the peering server still is configured as a peer.
A DLE server must be configured in one of the units of the network, according to the
following procedure.

Element Manager User's Manual Control Network 88

2013 Net Insight AB, All rights reserved
8.6.1 Basic configuration for In-band servers

Figure 80. Basic In-band server configuration

8.6.1.1 Administrative status
Default value: Down
Type: Boolean variable (only two states possible)
Range: Down, Up
Description: The parameter determines if the server is thought to be active (Up) or
inactive (down).

8.6.1.2 Purpose
Default value: Empty string
Type: String variable
Range: Length 0-255 characters
Description: The parameter is an arbitrary character string that can be used for
identification purposes.

8.6.1.3 DSTI (DTM Service Type Instance)
Default value: 32769 for first defined server on the node, 32770 for the second etc
Type: Integer
Range: 0-65535
Description: The parameter is the instance number of the DLE server, i.e. the identifier of
this particular service. It is recommended to keep the default value.

Element Manager User's Manual Control Network 89

2013 Net Insight AB, All rights reserved

8.6.1.4 Server - Client connection capacity
Default value: 0.485 Mbps, i.e. one slot per frame
Type: Real number
Range: 0 to the capacity of the trunk between server and client
Description: The capacity between the server and the client.

8.6.1.5 Server - server connection capacity
Default value: 0.485 Mbps, i.e. one slot per frame
Type: Real number
Range: 0 to the capacity of the trunk between the servers
Description: The capacity between the server and the back-up server.

8.6.2 Advanced configuration for In-band servers

Figure 81. Advanced In-band server configuration
From this tab, the parameters of the exponential back-off algorithm of the re-connect time-
out are set (minimum and maximum interval). Also, the connection can be defined as
having high Precedence, which means that in case an intermediary node goes down, this
particular connection is taken down with priority and a replacement connection is set up
with priority (i.e. it has precedence over other connections).
Primary source route alarm suppress: enabled (default) or disabled
Minimum interval: The starting value of the back-off algorithm, 10 ms (default). After
tear down of a connection, connection re-establishment is attempted immediately; if this
attempt fails, another attempt is made after the configured minimum interval.

Element Manager User's Manual Control Network 90

2013 Net Insight AB, All rights reserved
Maximum interval: The final value of the algorithm, 50000 ms (default). The re-establish
mechanism will never wait longer than the configured maximum interval to re-establish a
channel.
Precedence: Priority to take down (and set up replacement) service; can be normal or high.
8.6.3 Destinations configuration for In-band servers
Clicking on this tab gives the user a way to define a peering (back-up) DLE server. The
peering DLE server operate on the same control level and work together for redundancy
and load balance. In order to have full redundancy, the servers must back up each other.

Figure 82. Page for configuration of destination to a peering (back-up) DLE server.
Observe that destinations to clients are not set on this page.

8.7 In-band clients
An In-band client must be configured on every node in the segment, including the node(s)
with the In-band server. The web page where the configuration is made is found by
following the Control In-band clients link.

Element Manager User's Manual Control Network 91

2013 Net Insight AB, All rights reserved

Figure 83. In-band client configuration page
8.7.1 Basic configuration for In-band clients
8.7.1.1 Administrative status
Default value: Down
Type: Boolean variable (only two states possible)
Range: Down, Up
Description: The parameter determines if the client is thought to be active (Up) or
inactive (down).

8.7.1.2 Purpose
Default value: Empty string
Type: String variable
Range: Length 0-255 characters
Description: The parameter is an arbitrary character string that can be used for
identification purposes.



Element Manager User's Manual Control Network 92

2013 Net Insight AB, All rights reserved
8.7.1.3 DSTI (DTM Service Type Instance)
Default value: 0 for first defined client on the node, 1 for the second etc
Type: Integer
Range: 0-65535
Description: The parameter is the instance number of the DLE client, i.e. the identifier of
this particular service. It is recommended to keep the default value.

8.7.1.4 Client to Client connection capacity
Default value: 0.485 Mbps, i.e. one slot per frame
Type: Real number
Range: 0 to the capacity of the trunk between server and client
Description: The capacity between the client and other clients.

8.7.1.5 Tear down unused connection after
Default value: 600 seconds
Type: Integer
Range: 1 9999999
Description: The time after which an unused connection is torn down. Zero is a special
value that means that the link is never torn down.

8.7.1.6 Server DTM node
Default value: none
Type: DTM address or hostname of DLE server
Range: 00.00.00.00.00.00.00.00 - FF.FF.FF.FF.FF.FF.FF.FF or hostname
Description: The DTM address or hostname of the In-band (DLE) server.

8.7.1.7 Server DSTI
Default value: 0
Type: Integer
Range: 0-65535
Description: The parameter is the instance number of the DLE server that the defined
client attaches to. Observe that this default is different than the default setting of the server
itself (which is 32769).



Element Manager User's Manual Control Network 93

2013 Net Insight AB, All rights reserved
8.7.1.8 Alternative Server DTM node
Default value: none
Type: DTM address or hostname of back-up In-band (DLE) server.
Range: 00.00.00.00.00.00.00.00 - FF.FF.FF.FF.FF.FF.FF.FF or hostname
Description: The DTM address or hostname of the back-up In-band (DLE) server.

8.7.1.9 Alternative Server DSTI
Default value: 0
Type: Integer
Range: 0-65535
Description: The parameter is the instance number of the alternative DLE server that the
defined client attaches to.

8.7.1.10 Client to server connection capacity
Default value: 0.485 Mbps, i.e. one slot per frame
Type: Real number
Range: 0 to the capacity of the link between the client and the server/back-up server.
Description: The capacity between the client and the server.

The Advanced settings are identical to those of the In-band server; see section Advanced
configuration for In-band servers for additional information.
To set the parameters, select the web page by following the link Control Networks In
band Clients, chose the values and click on Apply or OK.
8.8 Bandwidth requirements of DLE
The bandwidth required by the In-band control function can be divided into three different
parts: server-to-client connections, client-to-server connection and client to-client
connection. In the illustration, the server and gateway are both located on node A. Nodes B
and C have each a client connected to the server.



Figure 84. Bandwidth requirement example. Node A has a DLE server and is the gateway
to the outside world. Nodes B and C each run a DLE client.
A B C
SCC-mc
CSC-uc
CSC-uc
CCC-uc
CCC-uc
CCC-uc
CCC-uc

Element Manager User's Manual Control Network 94

2013 Net Insight AB, All rights reserved
SCC - Server to Client Connection is a multicast channel. This channel is up all the time. If
all clients are on a long chain, this channel takes one slot on every link.
CSC - Client to Server Connection is the return channel from the client to the server. This
channel is a unicast channel and the server terminates one channel from each client
connected to the server. This return channel is always up.
CCC - Client to Client Connection is a unicast channel which is established between two
DLECs. This is the channel where normally all traffic between the clients travels. The
channel is by default torn down after 600 seconds without transmitted data and is
automatically reestablished when there is new traffic. The channel normally exists between
the gateway and all DLECs. If Nimbra Vision is used, this channel stays up all the time
since NV polls every node every 120 seconds. It is possible to force data traffic to use SCC
and CSC (all data traffic is routed via the DLES server) by setting the CCC bandwidth to
zero slots on all DLECs. However, if CCC is configured to use zero slots, there is a risk that
DLES is overloaded with too much data and the result might be that the DLE server
crashes.

In our example, the bandwidth requirement is:

From A to B 1 SCC + 2 CCC = 3 DLE slots
From B to A 2 CSC + 2 CCC = 4 DLE slots

Note that the CCCs between nodes B and C are omitted in the illustration.


Element Manager User's Manual Control Network 95

2013 Net Insight AB, All rights reserved
8.9 IP interfaces
IP interface menu configures the physical and logical Ethernet address of the interface as
well as the IP address for all logical In-band clients. This section describes how to change
the address of the physical and logical Ethernet interface and also how to change the
netmask of the subnet.
Follow the Control Networks IP interfaces web page.

Figure 85. IP interfaces page
eth0: The physical address of the Ethernet interface
dlec0, dlec1, dlec2: The logical addresses of In-band clients
Click on the Id of the interface that should be changed.

Figure 86. IP address page
Click on the IP address and make the changes to the address and the netmask. Alternatively,
click on the Add address... button in order to add a valid IP-address.


Element Manager User's Manual

2013 Net Insight AB, All rights reserved

Note:

Certain settings of IP address will make further contact with the node
impossible. This should be considered before the OK or Apply
button is clicked.
8.10 IP routing conf
8.10.1 Routes
In order to enable routing outside an In
the segment to the wider network
to the subnet of a configured Ethernet interface

Note:

An IP route must be configured on every node in the DLE segment.
It will tell the node where to send IP traffic to a node outside the
DLE segment.
Click on the Control Networks
IP routes.
Figure 87. IP routing table page. Default means all addresses not otherwise mentioned.
U means that the routing entry is up, in other words active.
the destination you should use the
The first entry, 127.0.0.0 is for the local host, which always will be there.
entries describe that you can reach 192.168.101.0, 192.168.161.0, 192.168.162.0
192.168.163.0 directly witho
addresses through the gateway 192.168.101.1.

Control Network
2013 Net Insight AB, All rights reserved
Certain settings of IP address will make further contact with the node
impossible. This should be considered before the OK or Apply
button is clicked.
IP routing configuration
In order to enable routing outside an In-band segment, routes have to be configured
the segment to the wider network. Some default routes are always configured in a node, e.g.
a configured Ethernet interface and to the loopback interface.
An IP route must be configured on every node in the DLE segment.
It will tell the node where to send IP traffic to a node outside the
DLE segment.
Control Networks IP routing table links to get an overview of the
IP routing table page. Default means all addresses not otherwise mentioned.
U means that the routing entry is up, in other words active. G means that in order to reach
the destination you should use the gateway that is pointed out by the routing entry.
entry, 127.0.0.0 is for the local host, which always will be there. The next
entries describe that you can reach 192.168.101.0, 192.168.161.0, 192.168.162.0
directly without gateway. The last entry describes how to reach all other IP
addresses through the gateway 192.168.101.1.

Control Network 96
band segment, routes have to be configured from
. Some default routes are always configured in a node, e.g.
links to get an overview of the defined

IP routing table page. Default means all addresses not otherwise mentioned.
G means that in order to reach
nted out by the routing entry.
next four
entries describe that you can reach 192.168.101.0, 192.168.161.0, 192.168.162.0 and
ut gateway. The last entry describes how to reach all other IP-

Element Manager User's Manual Control Network 97

2013 Net Insight AB, All rights reserved
8.10.2 Setting up IP routes
The configurable parameters for a route are:

Parameter Description Type
Destination The destination IP network that the route will use. 0.0.0.0 is
displayed as default
Mandatory
Netmask The network mask to apply for the destination network. E.g. netmask
255.255.255.0 (or netmask 0.0.0.0 for the default route)
Mandatory
Gateway The IP address of the node that is connected to the outside network. Mandatory
Figure 88. Configurable routing parameters
Click on the Control Networks IP Routing Conf link. The IP routing conf page
appears. This page contains the configured IP routes on the node.

Figure 89. IP routing configuration page; default means 0.0.0.0, i.e. all addresses.

Click on the Add route button and the Add page appears.

Figure 90. Add IP route

Element Manager User's Manual Control Network 98

2013 Net Insight AB, All rights reserved

Enter the parameters and click on OK. The Routing configuration page reappears with the
new entry.
8.10.3 IP route reconfiguration
To reconfigure an IP route, follow these steps:
Navigate to web page Control Networks IP Routing conf and click on the route to be
verified or reconfigured. The Edit page appears.

Figure 91. Edit IP route

Change the settings and click OK or Apply. To delete the route, click on Delete. The
Routing configuration page reappears modified.
If required, back up the configuration changes to the node controller before carrying out
this step.
Note that asymmetric routing may cause problems with SNMP/telnet/ftp. Thus, the return
route should follow the same path as the first route.


Element Manager User's Manual Control Network 99

2013 Net Insight AB, All rights reserved
8.11 SNMP configuration
This chapter describes the SNMP (Simple Network Management Protocol) configuration
for the network element. It describes setting up of community names, SNMPv3 user, and
notification receivers.
8.11.1 Basic SNMP configuration
Click on the Control Network SNMP link to view the Basic SNMP configuration page.

Figure 92. SNMP configuration page

The page shows information about the SNMP community names and user configuration.
The SNMP agent is a full SNMPv1/v2c/v3 agent that supports SNMPv3 security levels
noAuthNoPriv, authNoPriv and authPriv. It also shows the configured notification
receivers.
Read-only community name is the community name for SNMPv1/v2c read (i.e. get)
operations. If this community name is provided by the user, the get operations requested are
accepted; write operations are not accepted with this community name.
Read-write community name is the community name for SNMPv1/v2c read (i.e. get) and
write (i.e. set) operations. If this community name is provided by the user, then
SNMPv1/v2c read/write operations are accepted.
Notification (trap) community name is the community name sent with the notifications. If
set, notifications are sent as SNMPv2 traps with this community name. Some trap receivers
require a match of the community name, while others simply ignore this community name.
SNMPv3 user is a user name used in SNMPv3 communication with the node. This type of
user is also called a USM user. If set, SNMPv3 operations from this user are accepted with
a security level that depends on the Authentication key and the Privacy key (described
below).

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
Authentication key is the passphrase used for SNMPv3 authentication of the SNMPv3 user.
If empty, then the authentication check is disabled, e.g. security level is
Privacy key is a key used for encryption of SNMP messages. If this key is absent, no
encryption takes place.
be used without privacy.

Security level
noAuthNoPriv No authentication, no privacy
AuthNoPriv Authentication, no privacy
AuthPriv Authentication, privacy
Figure 93. Possible ways to operate SNMP v3

A fine tuned Access control
for advanced configuration of the SNMP agent, including setting up a detailed access
control.
8.11.2 Access control
Access control configuration of the SNMP agent is done from the
SNMP configuration web page.
and knowledgeable users of SNMP agent configuration.

Note:

It is strongly recommended that this advanced access control SNMP configuration is
only used by the experienced and knowledgeable user of SNMP agent configuration.


Generally, this page is used for setting up the Local Configuration Datastore (LCD) of t
SNMP agent. The LCD describes the configuration of the SNMP agent. All of the SNMP
agent configuration can be done using this page.
more easily configured from the basic SNMP configuration page previously described
from the Trap receiver SNMP configuration page described later.
Configuration done on the SNMP
configuration is made
Please refer to section
form on the SNMP page is internally repres
The default configuration of the LCD adds configurations to the SNMP agent, which are
used by the community names, SNMPv3 user, and the notification receivers configured on
the basic SNMP configuration
The following is the default configuration:
Access entries for the
configured from the Access control
permissions for the different principals. You can
community names and SNMPv3 users
A family tree, All, which includes all the OIDs, is used when setting up the access entries.
Control Network
2013 Net Insight AB, All rights reserved
s the passphrase used for SNMPv3 authentication of the SNMPv3 user.
If empty, then the authentication check is disabled, e.g. security level is noAuthNoPriv
Privacy key is a key used for encryption of SNMP messages. If this key is absent, no
takes place. Privacy cant be used without authentication, but authentication can
be used without privacy.
Explanation Comment
No authentication, no privacy Read only usage of SNMP v3
Authentication, no privacy Read/write usage. Password needed
to communicate with the node, no
encryption
Authentication, privacy Read/write usage. Password needed
to communicate with the node,
encryption of data
Possible ways to operate SNMP v3
Access control can be configured from the access control tab. This tab
for advanced configuration of the SNMP agent, including setting up a detailed access
Access control SNMP configuration
configuration of the SNMP agent is done from the Access control
SNMP configuration web page. It is suggested that this option is only used by experienced
and knowledgeable users of SNMP agent configuration.
It is strongly recommended that this advanced access control SNMP configuration is
only used by the experienced and knowledgeable user of SNMP agent configuration.
Generally, this page is used for setting up the Local Configuration Datastore (LCD) of t
SNMP agent. The LCD describes the configuration of the SNMP agent. All of the SNMP
agent configuration can be done using this page. The simplest and most common tasks are
more easily configured from the basic SNMP configuration page previously described
from the Trap receiver SNMP configuration page described later.
onfiguration done on the SNMP page is internally processed the same way as if the
configuration is made directly into the LCD.
Please refer to section 8.11.4 SNMP page internal data below for a description on how the
form on the SNMP page is internally represented and related to the LCD.
The default configuration of the LCD adds configurations to the SNMP agent, which are
used by the community names, SNMPv3 user, and the notification receivers configured on
configuration page.
the default configuration:
Access entries for the notifiers, readers, writers, authUsers and privUsers principals are
Access control SNMP configuration page. The entries define
permissions for the different principals. You can further modify the permissions of these
community names and SNMPv3 users on this configuration page.
which includes all the OIDs, is used when setting up the access entries.
Control Network 100
s the passphrase used for SNMPv3 authentication of the SNMPv3 user.
noAuthNoPriv.
Privacy key is a key used for encryption of SNMP messages. If this key is absent, no
Privacy cant be used without authentication, but authentication can

Read only usage of SNMP v3
d/write usage. Password needed
to communicate with the node, no
Read/write usage. Password needed
to communicate with the node,
configured from the access control tab. This tab allows
for advanced configuration of the SNMP agent, including setting up a detailed access
ccess control tab on the
It is suggested that this option is only used by experienced
It is strongly recommended that this advanced access control SNMP configuration is
only used by the experienced and knowledgeable user of SNMP agent configuration.
Generally, this page is used for setting up the Local Configuration Datastore (LCD) of the
SNMP agent. The LCD describes the configuration of the SNMP agent. All of the SNMP
The simplest and most common tasks are
more easily configured from the basic SNMP configuration page previously described and
page is internally processed the same way as if the
below for a description on how the
The default configuration of the LCD adds configurations to the SNMP agent, which are
used by the community names, SNMPv3 user, and the notification receivers configured on
principals are
define
odify the permissions of these
which includes all the OIDs, is used when setting up the access entries.

Element Manager User's Manual Control Network 101

2013 Net Insight AB, All rights reserved
Entries that define how notifications (traps) are sent are included.
To edit the SNMP agent configuration, select the tab Access control from the SNMP
configuration page. The Access control configuration page appears.

Figure 94. Access control configurations page, default settings

Modify the configuration in the Local Configuration Datastore text box. The button
Restore to defaults loads the default configuration into the text box. To apply the new
configuration, click the Apply button.
When the configuration is applied, it will pass a syntax control. If the configuration
contains syntax errors, the page will be reloaded with errors shown.
The link AuthKey Generator opens a window where an authentication key or privacy key
can be encoded for use in the LCD. The link Configuration Example provides an SNMP
configuration example.
8.11.3 Addition of an SNMP trap receiver(s)
To configure SNMP trap receivers, follow the link Control Network SNMP and click on
the tab Trap receivers. The Add SNMP notification receiver page appears.
A notification receiver is the management station that will process notifications (SNMP
traps) sent from the network elements. You may send notifications for multiple
management stations.
IP address shows the IP addresses of the configured SNMP notification receivers. UDP port
number shows the UDP (user data protocol) port number for the notification receivers. 162
is the standard port and configured as default port.

Element Manager User's Manual Control Network 102

2013 Net Insight AB, All rights reserved

Figure 95. SNMP trap receivers tab. Click on the Add receiver button to add a new
receiver or the IP address link to edit the IP address of the configured receiver.


Figure 96. Add SNMP trap receivers tab. Add the SNMP trap receiver IP address in the
empty field. UDP port 162 is default, but can be changed if needed.

Click OK to add the new notification receiver. The configuration page will be loaded
again, updated with the new notification receiver.


Element Manager User's Manual

2013 Net Insight AB, All rights reserved
8.11.4 SNMP page internal data
Setting up data on the SNMP page is equivalent to setting up data on the
configurations page. This section describes how the equivalent setup on th
corresponds to the form on the SNMP page.
Note that the entries here assume at least the default configuration in the LCD, as the
definitions in the LCD are referred to from the internal entries.
configurations on the Basic SNMP config
configuration page must not be in conflict with each other. In this case, unpredictable
system behavior may happen.

Note:

Configurations on the Basic SNMP configuration page and the Access Control
configuration page m
system behavior may happen.


Setting of a Read-only community name with the value public on the
configuration page is equivalent to:

snmpCommunityEntry
vacmSecurityToGroupEntry snmpv1 standardReader readers non
vacmSecurityToGroupEntry snmpv2c standardReader readers nonVolatile
Setting of Read-write community name with the value private on the
configuration page is equivalent to:

snmpCommunityEntry
vacmSecurityToGroupEntry snmpv1 standardWriter writers non
vacmSecurityToGroupEntry snmpv2c standardWriter writers nonVolatile
Setting of Notification community name with the value public on the SNMP page is
equivalent to:

snmpCommunityEntry
vacmSecurityToGroupEntry snmpv2c standardNotifier
Setting of SNMPv3 user name, authentication key and privacy key on the SNMP page is
equivalent to one of the following entries, depending on the entered data. When entering
user name root only:

usmUserEntry localSnmpID root usmNoAuthProtocol
usmNoPrivProtocol n
vacmSecurityToGroupEntry usm root readers nonVolatile
or when entering authentication key public:

usmUserEntry localSnmpID root usmHMACMD5AuthProtocol
usmNoPrivProtocol nonVolatile
vacmSecurityToGroupEntry usm root
or when also entering privacy key secret:

usmUserEntry localSnmpID root usmHMACMD5AuthProtocol
usmDESPrivProtocol nonVolatile
vacmSecurityToGroupEntry usm root privUsers nonVolatile
Setting of Notification receiver
following per added notification receiver. The
per entry.

Control Network
2013 Net Insight AB, All rights reserved
SNMP page internal data
Setting up data on the SNMP page is equivalent to setting up data on the Access control
page. This section describes how the equivalent setup on the latter
corresponds to the form on the SNMP page.
Note that the entries here assume at least the default configuration in the LCD, as the
definitions in the LCD are referred to from the internal entries. Also note that
configurations on the Basic SNMP configuration page and the Access Control
configuration page must not be in conflict with each other. In this case, unpredictable
system behavior may happen.
Configurations on the Basic SNMP configuration page and the Access Control
configuration page must not be in conflict with each other. In this case, unpredictable
system behavior may happen.
only community name with the value public on the Access control
page is equivalent to:
snmpCommunityEntry 1 public standardReader localSnmpID - - nonVolatile
vacmSecurityToGroupEntry snmpv1 standardReader readers nonVolatile
vacmSecurityToGroupEntry snmpv2c standardReader readers nonVolatile
write community name with the value private on the Access cont
is equivalent to:
snmpCommunityEntry 2 private standardWriter localSnmpID - - nonV
vacmSecurityToGroupEntry snmpv1 standardWriter writers nonVolatile
vacmSecurityToGroupEntry snmpv2c standardWriter writers nonVolatile
Setting of Notification community name with the value public on the SNMP page is
snmpCommunityEntry 3 public standardNotifier localSnmpID - - nonvolatile
pEntry snmpv2c standardNotifier notifiers nonVolatile
SNMPv3 user name, authentication key and privacy key on the SNMP page is
equivalent to one of the following entries, depending on the entered data. When entering

usmUserEntry localSnmpID root usmNoAuthProtocol \
usmNoPrivProtocol nonVolatile - - -
vacmSecurityToGroupEntry usm root readers nonVolatile
when entering authentication key public:
usmUserEntry localSnmpID root usmHMACMD5AuthProtocol \
usmNoPrivProtocol nonVolatile - public -
vacmSecurityToGroupEntry usm root authUsers nonVolatile
when also entering privacy key secret:
usmUserEntry localSnmpID root usmHMACMD5AuthProtocol \
usmDESPrivProtocol nonVolatile - public secret
vacmSecurityToGroupEntry usm root privUsers nonVolatile
Setting of Notification receiver with IP address 192.168.0.1 and port 162 adds the
following per added notification receiver. The index will always be an integer value unique
Control Network 103
Access control
e latter page
Note that the entries here assume at least the default configuration in the LCD, as the
configuration page must not be in conflict with each other. In this case, unpredictable
Configurations on the Basic SNMP configuration page and the Access Control
ust not be in conflict with each other. In this case, unpredictable
Access control SNMP
olatile
olatile
vacmSecurityToGroupEntry snmpv2c standardReader readers nonVolatile
Access control SNMP
Volatile
olatile
vacmSecurityToGroupEntry snmpv2c standardWriter writers nonVolatile
Setting of Notification community name with the value public on the SNMP page is
nonvolatile
notifiers nonVolatile
SNMPv3 user name, authentication key and privacy key on the SNMP page is
equivalent to one of the following entries, depending on the entered data. When entering
with IP address 192.168.0.1 and port 162 adds the
will always be an integer value unique

Element Manager User's Manual Control Network 104

2013 Net Insight AB, All rights reserved
snmpTargetAddrEntry index snmpUDPDomain 192.168.0.1:162 1500 3 \
standardTrapSink standardParams nonVolatile 255.255.255.255:0 2048
8.11.5 Format of Access control SNMP configuration
The Local Configuration Datastore (LCD) is represented by a text format, where each line
represents an entry. Actually, an entry in the LCD is representing an entry in an SNMP
table. The different field for an entry represents columnar objects in the tables. The format
of an entry is in general:
Keyword value
The keyword represents the type of entry, and the value is a list of fields in the entry
separated by spaces. The keyword is actually describing what SNMP table to configure, and
the field values are the columnar objects.
Entries may span multiple lines by using a backslash (\) at the end of the entry's lines.
White-space (space) is ignored.
String values that contain blanks must be delimited by quotation marks (").
A line is considered a comment and ignored if it starts with a hash (#).
Some fields shall have an OBJECT IDENTIFIER as the value. An OBJECT IDENTIFIER
is the complete OID from the root or the MIB tree, written as numbers separated by dots.
E.g. an OBJECT IDENTIFIER for the sysName object defined in the MIB-2 systems group
would be 1.3.6.1.2.1.1.5.
If the OBJECT IDENTIFIER is not part of an enterprise specific object, the OBJECT
IDENTIFIER may be substituted by its name. The sysName object would thus be
sysName. It is possible to start the OBJECT IDENTIFIER with a substituted name, and
continue with the remaining fields. The sysName could be written as system.5 because
system represents 1.3.6.1.2.1.1, or as mib-2.1.5. Similar, all the enterprise MIB objects
can start with enterprises, as this represents 1.3.6.1.4.1.
The following entry keywords are supported. For full description on the meaning of the
entry, please refer to the description in the corresponding IETF RFC.

Keyword See also
snmpCommunityEntry RFC3584
usmUserEntry RFC3414
vacmViewTreeFamilyEntry RFC3415
vacmAccessEntry RFC3415
vacmSecurityToGroupEntry RFC3415
snmpNotifyEntry RFC3413
snmpTargetAddrEntry RFC3413
snmpTargetParamsEntry RFC3413
snmpNotifyFilterEntry RFC3413
snmpNotifyFilterProfileEntry RFC3413
Figure 97. SNMP table entries as keywords


Element Manager User's Manual Control Network 105

2013 Net Insight AB, All rights reserved
8.11.6 Configuration Procedure
The configuration procedure involves the following steps:
Define an SNMPv3 user or community.
Define a family of view sub-trees, MIB views. The MIB view defines a set of managed
information that may be accessed.
Define a group with associated access rights. The group is assigned the MIB views for read,
write and notification access.
Assign SNMPv3 user or SNMPv1/v2c community names to the group.
The associations between the MIB views, the groups and the principals (users/community
names) are shown in the figure below.





vacmGroupName (group)
vacmGroupName (name)
vacmAccessReadViewName (read/write/notify)
vacmViewTreeFamilyViewName (name)
vacmSecurityName (principal)
usmUserName (name)
user
usmUserEntry
group
vacmAccessEntry
MIB view
vacmViewTreeFamilyEntry
user group
vacmSecurityToGroupEntry
community name
snmpCommunityEntry
snmpCommunitySecurityName (name)
vacmSecurityName (principal)
- or -


Figure 98. MIB views, groups and users or community names

8.11.7 Defining SNMPv3 Users
At least one SNMPv3 user must be configured for the SNMP agent to send and receive
SNMP messages using the SNMPv3 protocol. In contrast, SNMPv1/v2c does not have
users. Instead they have community names, see section Defining Community). An SNMPv3
user can be defined either on the Basic SNMP configuration page (one user) or on the
Access control SNMP configuration page (multiple users).
A user is defined in the User-based Security Model, USM.
Note that an USM user is not the same as the element manager users used for the CLI or
web access of the Nimbra network element. Hence, the users defined for the element
manager are not known by the SNMP agent, and the element manger does not know about
the USM users.
A user entry is represented by the tag usmUserEntry. The format of the entry is:

usmUserEntry engineID name authProtocol privProtocol storage target authKey

Element Manager User's Manual Control Network 106

2013 Net Insight AB, All rights reserved
engineID is always localSnmpID, which represents the SNMP agent's administratively-
unique identifier.
name is the user name, as a human readable string of up to 32 characters.
authProtocol is the authentication protocol that must be used when sending and receiving
messages for this user. The authentication protocol is used to authenticate the user. The
value is usmNoAuthProtocol if no authentication protocol shall be used,
usmHMACMD5AuthProtocol if HMAC-MD5 protocol shall be used, or
usmHMACSHAAuthProtocol if HMAC-SHA shall be used. (This value is actually an
OBJECT IDENTIFIER that represents the authentication protocol.)
privProtocol is the privacy protocol that must be used when sending and receiving
messages for this user. The privacy protects the messages from disclosure. The value is
usmNoPrivProtocol if no privacy protocol shall be used, or
usmDESPrivProtocol if CBC-DES shall be used. (This value is actually an OBJECT
IDENTIFIER that represents the privacy protocol.)
storage describes how the entry is stored. This is always nonVolatile.
target is always a dash (-).
authKey is the user's authentication password. If no authentication protocol is used, the
value shall be a dash (-). (The password is converted to a key at run-time.) The password
can be given in clear text , or as an encrypted string. To encrypt the password, use the Auth
Key Generator on the Edit Access Control page.
8.11.8 Defining Community
At least one SNMPv2 community must be defined for the SNMP agent to send and receive
SNMP messages using the SNMPv1/v2c protocols. The preferred method to define
community names is using the SNMP page.

snmpCommunityEntry index community name engineID context target storage
index is a unique index string. It does not mean anything, but must be unique.
community is the community name string that will be used.
name is the name of this entry, and will be used as the principal to refer to the entry when
setting up the security, see Defining Groups and Access Rights.
engineID is always localSnmpID, which represents the SNMP agent's administratively-
unique identifier.
context is the name of the context to which the group is part of. To gain access by this
entry, the specified context must be in use. On the Nimbra network elements, the context is
always the default context, which is represented by a dash (-).
target is always a dash (-).
storage describes how the entry is stored. This is always nonVolatile.
8.11.9 Defining MIB Views
A family of view sub-trees is a definition that includes or excludes managed information
forms a MIB view. A MIB view is used for defining a set of managed information that may
be accessed. The definition of the family view of sub-trees may include wildcards. If no
wildcards are used, the family of view sub-trees becomes a single sub-tree.
If there are multiple sub-trees defined, then the one with most sub-identifies in its OID is
used. If multiple sub-trees are defined with the same number of sub-identifiers, then the
lexographically greatest is used.

Element Manager User's Manual Control Network 107

2013 Net Insight AB, All rights reserved
A MIB view is represented by one or multiple sub-trees. An entry is represented by the tag
vacmViewTreeFamilyEntry. The format of the entry is:

vacmViewTreeFamilyEntry name subtree mask type storage
name is the human readable name for a family of view sub-trees, i.e. the name for the MIB
view. This is a printable string of no more than 32 characters. Multiple entries may define
one MIB view, which in this case all must have the same name. The name is used when
defining groups (see Defining Groups and Access Rights).
subtree is an OBJECT IDENTIFIER that identifies a sub-tree of the MIB, i.e. what
managed objects to include or exclude from the MIB view. The sub-tree is combined with
the mask.
mask is a bit mask which, in combination with the subtree defines a family of view sub-
trees. The bit mask is represented as a sequence of hexadecimal bytes separated by colons.
Each byte is in the range 0x00 to 0xff. A zero-length string is represented by a dash (-).
The bit mask is a series of zeros and ones, where the zeros represent wildcards, and the
ones represent an exact match. The bit mask is applied on the subtree, where the first bit
masks the first sub-identifier, and so on. The bits are grouped to bytes, which are
represented by the substring 00 through ff, and are all separated by colons (:). The last
byte is padded with ones at the end to fill out to a complete byte.
type indicates whether the entry shall define a family of sub-trees that shall be included or
excluded from the MIB view. The value of this field is included or excluded.
storage describes how the entry is stored. This is always nonVolatile.
8.11.9.1 Example 1
The example defines a view names "All" that allows access to everything (actually,
everything under the 1 branch in the MIB tree).

vacmViewTreeFamilyEntry All iso - included nonVolatile
8.11.9.2 Example 2
The example defines a view named "noIfTable", that allows access to everything except to
the ifTable.

vacmViewTreeFamilyEntry noIfTable iso - included nonVolatile
vacmViewTreeFamilyEntry noIfTable 1.3.6.1.2.1.2.2 - excluded \
nonVolatile
8.11.9.3 Example 3
The example shows how to define a family of view subtrees that only allows access to row
9 in the ifTable. The 10
th
bit is a zero, which makes the 10
th
sub-identifier in the subtree a
wildcard (don't care). This is the columnar object.



Element Manager User's Manual Control Network 108

2013 Net Insight AB, All rights reserved

Parameter Byte 1 Byte 2
full subtree (OID) 1.3.6.1.2.1.2.2.1.0.9
subtree (OID) 1.3.6.1 2.1.2.2 1.0.9
mask 1111 1111 101
padded mask 1111 1111 1011 1111
mask in hexadecimal 0xff 0xbf
mask as value ff:bf
Figure 99. Parameters for a family of view subtrees

vacmViewTreeFamilyEntry if9 1.3.6.1.2.1.2.2.1.0.9 ff:bf included nonVolatile
8.11.10 Defining Groups and Access Rights
A group is associating the MIB views with access rights A group is represented by one or
multiple entries, for different accesses. An entry is represented by the tag
vacmGroupName.

vacmAccessEntry name prefix model level match read write notify storage
name is the name of the group. The name is a string of up to 32 characters. The name is
used when associating access rights to users (see Assigning Users).
prefix is the name of the context to which the group is part of. To gain access by this entry,
the specified context must be in use. On the Nimbra network elements, the context is
always the default context, which is represented by a dash (-). (The prefix could be the
complete name of the context, or the prefix of a context, as defined by match; see below.)
model is the security model to which the group belongs. In order to gain access by this
entry, the specified security model must be in use. The security model can be snmpv1,
snmpv2c or usm for SNMPv3 using the USM.
level is the minimal security level. In order to gain access by this entry, the security level in
use must at least be the specified security level. The value is noAuthNoPriv if no
authentication is required and authNoPriv if authentication using HMAC-MD5 is
required. If multiple entries are equally indexed, except for this value, then the one with the
highest security level is applied.
match specifies how the prefix shall be matched. For the Nimbra network elements, it does
not make sense to set the value to anything except exact. The value can be exact of
prefix.
read is the name of the MIB view (see Defining MIB Views) that shall be used to control
what management information can be read. In order to gain read access by this entry, the
MIB view must allow access of the management information.
write is the name of the MIB view (see Defining MIB Views) that shall be used to control
what management information can be written. In order to gain write access by this entry,
the MIB view must allow access of the management information.
notify is the name of the MIB view (see Defining MIB Views) that shall be used to control
what management information can be included in a notification. In order to gain read access
for notifications by this entry, the MIB view must allow access of the management
information.
storage describes how the entry is stored. This is always nonVolatile.

Element Manager User's Manual Control Network 109

2013 Net Insight AB, All rights reserved
8.11.10.1 Example

vacmAccessEntry FullAccessUser - usm authNoPriv exact All All All
nonVolatile
The example defines a group named "FullAccessUser" that requires the user to have at least
the security level "authNoPriv" (authenticated, but not encrypted). The group permits
access to the MIB view "All" for read (responding to snmp-get operations), write (accept
snmp-set operations) and for notifications.
8.11.11 Assigning Users
A user must be associated with a group, where the group defines the access rights for the
user. For SNMPv1 and SNMPv2c, which do not have the user concept, the community
name is used instead.
An entry maps a security model and its user or community name to a group. An entry is
represented by the tag vacmSecurityToGroupEntry.

vacmSecurityToGroupEntry model principal group storage
model defines the security model for the entry. The model is either snmpv1, snmpv2c or
usm.
principal is the user name for the security model USM (see Defining SNMPv3 Users), or
the security name that represents the community name for SNMPv1/v2c. A default security
name is public. The community name for the public security name is modified from the
web page Status | SNMP config.
group is the name of the group (see Defining Groups and Access Rights) to which the user
or community name shall be associated.
storage describes how the entry is stored. This is always nonVolatile.
8.11.11.1 Example 1
The example associates the USM user "root" with the group "FullAccessUser".

vacmSecurityToGroupEntry usm root FullAccessUser nonVolatile
8.11.11.2 Example 2
The example associates the community name "public" for SNMPv2 access to the group
"ReadOnlyUser".

vacmSecurityToGroupEntry snmpv2c public ReadOnlyUser nonvolatile

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
9 DTM Configuration
9.1 Overview of DTM configuration
This chapter describes how to use the web interface to configure
layer. The starting web page for DTM is shown below.
Figure 100. The starting

The sub-sections (links)
Routing, Sync and Time transfer.

Note:

Make sure to have all the information that the operation requires,
before starting any configuration operation. This will help you to
minimize

DTM Configuration
2013 Net Insight AB, All rights reserved
DTM Configuration
Overview of DTM configuration
This chapter describes how to use the web interface to configure and monitor the DTM
web page for DTM is shown below.
ing web page for DTM
(links) are: Interfaces, Addresses, Hostnames, Hostname search, Links,
Routing, Sync and Time transfer.
Make sure to have all the information that the operation requires,
before starting any configuration operation. This will help you to
minimize the downtime of the system.
onfiguration 110
monitor the DTM-

names, Hostname search, Links,

Element Manager User's Manual DTM Configuration 111

2013 Net Insight AB, All rights reserved
9.2 Interfaces
The starting web page for Interfaces is presented.

Figure 101. DTM interfaces page
The table lists the DTM interfaces that are present in the unit. For each interface the
following is presented: Name (name of the interface), Capacity (in slots), Free (unused
capacity, in slots), Tx slots (used slots in the Tx direction) and Tx cap % (used fraction of
slots in the Tx direction), Rx slots and Rx cap % (used fraction of slots in the Rx direction).
In addition, Adm and Oper shows the Administrative and Operational state of the interface.
The interface name is written as dtmX:Y, where X is position of the card in the node and
Y position of the port, on the card.
9.2.1 Editing a DTM interface
To edit a DTM interface, click on the Name of the interface that should be edited.

Element Manager User's Manual DTM Configuration 112

2013 Net Insight AB, All rights reserved

Figure 102. DTM Interface, Edit page

Element Manager User's Manual DTM Configuration 113

2013 Net Insight AB, All rights reserved
The configurable parameters are:

Parameter
name
Description Type Possible
Values
Default
Admin. status The administrative status of the
board.
Binary, Up
or down
Up, Down Up
Purpose Identifying field, selected by the user Text string Any 0-255
character(s)
long string
Empty
string
Link class Type of link Enumerated
list
Normal,
Persistent or
Nailed
Normal
Control channel
capacity
Extra bandwidth of the control
channel, in addition to one slot
always allocated, expressed in slots
per DTM-frame (1 slot = 512 kbit/s)
Integer 0 to the
capacity of
link
0
Enable dynamic
routing
This tick box is selected if Dynamic
routing (DRP) should be used.
Binary Ticked,
unticked
Ticked
Metric for
dynamic routing
The cost of using this interface when
dynamic routing is used.
Integer 1-99999 1
Allow as sync
source
This tick box is selected if the
synchronization extracted from the
link should be allowed as DTM
synchronization source in the node.
Binary Ticked,
unticked
Ticked
Figure 103. Configurable parameters for a DTM interface

Read-only parameters (variables) are:

Parameter Description
Interface name The interface id, written as dtmX:Y (where X is position of the card and Y
position of the port).
Operational status The operational status of the board.
Transmit capacity The total number of time slots available for transmission on this interface.
Used transmit
capacity
The number of used time slots from this node to the peering node.
Used receive
capacity
The number of used time slots from the peering node to this node.
Interface MAC
address
A globally unique hardware identifier for this interface card.
Failure on
underlying interface
alarm
An error reported by the underlying trunk interface. (LOF loss of frame.)
Reduced control
capacity alarm
The node is not able to signal the remote node. This usually indicates a
problem in the TX direction for the link.
Figure 104. Read-only parameters (variables) of a DTM interface


Element Manager User's Manual DTM Configuration 114

2013 Net Insight AB, All rights reserved
9.3 Addresses
This chapter describes how to configure the DTM addresses of the unit. The DTM address
must be configured before any configuration of services can be done.
Each node can have one primary DTM address and several alias addresses. The primary
address (marked with a symbol in the Primary address column), in the table below, is
always used as the source address when the node establishes a channel. In addition to the
primary address, a node also accepts channels to all its alias addresses.
The address 00.00.00.00.00.00.00.01 is a loop back address that all nodes listen to. It is
equivalent to the address 127.0.0.1 in an IP-node.
Click on the DTM menu item and then click on Addresses. The DTM Addresses page
appears.

Figure 105. DTM address page
The table shows information of the configured addresses as follows:
DTM address: The configured (primary) DTM address for the unit and one loopback
(always 00.00.00.00.00.00.00.01) address to the back plane. On occasion, more than one
DTM address can be assigned to the node, but only one address can be primary.
Primary address: Indicates which address is the default for the node.
9.3.1 Adding a DTM address
Go to the DTM addresses page and click on the Add address button. The Add address
page appears.

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
Figure 106. Add DTM address page
Enter the DTM address and whether the address is Primary or not
DTM addresses page will reappear with the new address listed in the table.
Back up the configuration changes
9.3.2 Editing or deleting a DTM address
Go to the DTM addresses page
following page appears:
Figure 107. Edit DTM address page
Change the parameters as desired and click

Note:

If the primary address of
be saved and the node must be restarted for the changes to take effect.
Note also that the address change does not affect existing channels.

DTM Configuration
2013 Net Insight AB, All rights reserved
Add DTM address page
Enter the DTM address and whether the address is Primary or not and then click
DTM addresses page will reappear with the new address listed in the table.
Back up the configuration changes and restart the node.
ing or deleting a DTM address
Go to the DTM addresses page and click on the address that is to be revised or deleted. The
page appears:
Edit DTM address page
Change the parameters as desired and click OK.
If the primary address of the node is changed, the configuration must
be saved and the node must be restarted for the changes to take effect.
Note also that the address change does not affect existing channels.
DTM Configuration 115

lick OK. The
and click on the address that is to be revised or deleted. The


Element Manager User's Manual DTM Configuration 116

2013 Net Insight AB, All rights reserved
9.4 Hostnames
Nodes in a DTM network can be assigned names using the hostnames function. Hostnames
are configured locally in each node and used as aliases for a DTM address.
To configure host names, click on the link DTM Hostnames. The following page
appears.

Figure 108. Hostnames page
The Hostnames page shows the DTM nodes with their DTM addresses and hostname.
Remember to include the list of the hostnames in every node; all the nodes in the network
must know all the hostnames!
9.4.1 Adding a host
Go to the hostnames page and click on the Add host button. The following page appears:

Figure 109. Add DTM hostnames page
Enter the DTM address and the selected hostname associated with the address. Click OK.
The DTM hostsnames page reappears with the newly defined address and hostname.

Element Manager User's Manual DTM Configuration 117

2013 Net Insight AB, All rights reserved
There are some syntax rules for host names. Host names can consist of letters, numbers and
characters dot . and dash -, but must start with a letter. Examples of valid hostnames are:
node10.neti.se, node12.academy.net-insight.net
It is possible, but not recommended to specify several names per address, by entering each
name on a separate line. Only the name on the first line will be shown on the hostname
page; use several entries with the same DTM address instead if the need of using multiple
host names exists.
A list of host name suffixes may be defined in the web interface. The completion function
searches for a match, starting with the top suffix defined in the list. To access the suffix
definition page, follow the DTM Hostname search link.

Figure 110. Editing DTM hostname suffixes. The example with academy.se makes it
possible to name the node node10.academy.se but still only use node10 as
hostname for configurations.

Hostname search
entry(suffix)
Full name Short name
lab iov101.lab iov101
academy.se node5.academy.se node5
netinsight.net iov072.netinsight.net iov072
netinsight.net cus033.netinsight.net cus033
Figure 111. Summary of some allowed short names, provided that the suffix has been
defined on the hostname search page defined on the node.
The short names can be used for configuration of these nodes, provided that the appropriate
hostname search page has been saved on all nodes that need to know about the node. As it,
for obvious reasons, is hard to know what nodes must have the definition, it is best to
include the hostname search list in all nodes.


Element Manager User's Manual

2013 Net Insight AB, All rights reserved
9.4.2 Editing or deleting hostnames
Navigate to the DTM hostnames
deleted. The Edit DTM Host
Figure 112. Editing DTM hostnames
Change the parameters
To delete a host, click the
host removed from the table.

Note:

Changes to a hostname do
established. Th
established.
9.5 Links
The Links page shows all DTM links that the node is connected to. The page can be used to
check if links to surrounding nodes have been prop
should be two addresses; the node address and the address to the remote node.
The link-table lists all the links that this node is attached to along with all other nodes that
are attached to these links. Each line in the table represents an interface and t
the interface is located in.
Each link starts with an
interface connected to that link before starting a new link with a new id.
Click on the DTM
DTM Configuration
2013 Net Insight AB, All rights reserved
Editing or deleting hostnames
DTM hostnames page and click on the address for the host to be edited or
DTM Hostnames page appears.
Editing DTM hostnames
Change the parameters and click Apply or OK.
To delete a host, click the Delete button. The DTM hostnames page reappears
host removed from the table.
Changes to a hostname do not affect channels that have already been
established. The hostname table is only consulted when a channel is
established.
The Links page shows all DTM links that the node is connected to. The page can be used to
check if links to surrounding nodes have been properly established. For each link id there
should be two addresses; the node address and the address to the remote node.
table lists all the links that this node is attached to along with all other nodes that
are attached to these links. Each line in the table represents an interface and the node that
the interface is located in.
Each link starts with an Id, which is equal to the Id of a local interface. It lists the other
interface connected to that link before starting a new link with a new id.
Links link. The Links page appears.
DTM Configuration 118
page and click on the address for the host to be edited or

s with the
The Links page shows all DTM links that the node is connected to. The page can be used to
For each link id there

table lists all the links that this node is attached to along with all other nodes that
he node that
d of a local interface. It lists the other

Element Manager User's Manual DTM Configuration 119

2013 Net Insight AB, All rights reserved

Figure 113. DTM links page
The variables that are presented are:

Id: The local interface that is connected to the link.
i/f MAC addr: Lists the MAC address of the opposite (remote) interface.
Node MAC addr: Lists the MAC addresses of the opposite (remote) node.
Node addr: Shows the node address or node host name of all opposite (remote) nodes
connected to the link.
Oper: Operational Status (OperStatus)
Last change: Time for last DTM link change
9.6 Routing
9.6.1 General
To establish channels in a network, the nodes must know where to find all other nodes in
the network. The process of finding a path from node A to B in the network is called
routing.
Routing in a DTM network has a lot in common with routing in an IP network. The table
below lists the main differences between IP-routing and DTM routing.

Parameter name IP DTM
What is routed? Packets Channel-setup requests
How do you specify how to
reach a destination?
One nexthop per
destination
All possible nexthops to the
destination.
Address type IP address DTM address
Figure 114. Differences between routing in an IP network and a DTM network
This section describes how to configure routing. There are two different ways to configure
routing:

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
Static routing is where the routing
Dynamic routing is where a routing protocol calculates routing tables automatically.

Note:

Do not mix dynamic routing with static routing since this can lead to
errors that are
9.6.2 Static routing
To use static routing, it is necessary to configure each node in the network with information
on how to reach all other node
single neighbor, this is as easy as instructing the node that all other no
via that neighbor; but for nodes with multiple interfaces it is necessary to configure which
neighbor to use to reach each destination or group of destinations.
Static routing is configured in the Routing Table. The routing table can be
Routing page. The routing table consists of a number of routing entries. Each routing
entry contains the fields shown below.

Field
Administrative
status
The a
be taken into account when routing decisions are made
Type Shall be set to Static for static routing entries. See the chapter on DRP for a
description of Link Prefix and Area Prefix.
Destination The d
valid for; refer to section
must be a numeric DTM address.
Prefix The number of significant bits in the destination
Next hop One possible next hop node that can be used to reach the destination node(s). The
next hop must be the DTM address of a neighboring node.
Metric The cost of using this route entry. If there are several routes to the same
destination,
metric
Figure 115. The routing entries
When a node needs to find a nexthop for a destination it looks in the routing table for all
entries that match the destination address. This gives the node a
nexthops that it tries to use to reach the destination

Note:

If there are several routing entries with different prefix lengths that are
valid for a destination, then only the entries with the longest prefix will
be used.
they will all be tried in order of increasing metric.

Note:

If the routing is poorly
network can be affected.
DTM Configuration
2013 Net Insight AB, All rights reserved
where the routing tables are configured manually.
where a routing protocol calculates routing tables automatically.
Do not mix dynamic routing with static routing since this can lead to
errors that are difficult to troubleshoot.
Static routing
To use static routing, it is necessary to configure each node in the network with information
other nodes in the network. For nodes with a single interface and a
single neighbor, this is as easy as instructing the node that all other nodes can be reached
but for nodes with multiple interfaces it is necessary to configure which
neighbor to use to reach each destination or group of destinations.
Static routing is configured in the Routing Table. The routing table can be seen in the
page. The routing table consists of a number of routing entries. Each routing
entry contains the fields shown below.
Description
The administrative status for the route has to be set to up, in order for the node to
be taken into account when routing decisions are made.
Shall be set to Static for static routing entries. See the chapter on DRP for a
description of Link Prefix and Area Prefix.
The destination and prefix together specify which destinations this routing entry is
valid for; refer to section Addresses for a description of addressing. The destination
must be a numeric DTM address.
The number of significant bits in the destination address.
One possible next hop node that can be used to reach the destination node(s). The
next hop must be the DTM address of a neighboring node.
The cost of using this route entry. If there are several routes to the same
destination, then routes with the lower metric are tried before routes with higher
metric
The routing entries
When a node needs to find a nexthop for a destination it looks in the routing table for all
entries that match the destination address. This gives the node a list of a number of different
to use to reach the destination.
If there are several routing entries with different prefix lengths that are
valid for a destination, then only the entries with the longest prefix will
If there are several entries with the same prefix length, then
they will all be tried in order of increasing metric.
If the routing is poorly configured in a node, the operation of the entire
network can be affected.
DTM Configuration 120
where a routing protocol calculates routing tables automatically.
To use static routing, it is necessary to configure each node in the network with information
in the network. For nodes with a single interface and a
des can be reached
but for nodes with multiple interfaces it is necessary to configure which
seen in the DTM
page. The routing table consists of a number of routing entries. Each routing
has to be set to up, in order for the node to
Shall be set to Static for static routing entries. See the chapter on DRP for a
estination and prefix together specify which destinations this routing entry is
The destination
One possible next hop node that can be used to reach the destination node(s). The
The cost of using this route entry. If there are several routes to the same
then routes with the lower metric are tried before routes with higher
When a node needs to find a nexthop for a destination it looks in the routing table for all
list of a number of different

Element Manager User's Manual DTM Configuration 121

2013 Net Insight AB, All rights reserved

Figure 116. Configuration of static routes
9.6.3 Dynamic routing
Instead of configuring the routing tables manually in each node; a routing protocol can be
used to populate the routing table automatically. This is called dynamic routing. In a DTM
network, the routing protocol DRP can be used.
Dynamic routing has the following advantages over static routing:
Less manual configuration required for large networks
Automatically updated routing tables when the network topology changes
Automatic routing is not error-prone.
The DRP Protocol is a routing protocol that is very similar to OSPF, but it has been adapted
to the unique characteristics of the Net Insights technology. It automatically calculates the
routing tables in all nodes and updates them as changes are detected in the network.
To use DRP, all that is necessary is to enable DRP on all nodes in the network and then
remove all the static routing entries that have been added to the nodes as shown in the
section on Static Routing.


Element Manager User's Manual DTM Configuration 122

2013 Net Insight AB, All rights reserved
9.7 Static routing
9.7.1 Adding, editing or deleting a static route
Follow the link DTM Routing. The starting web page for Routing configuration is
shown.

Figure 117. Routing
Click on Add source or the specific link that is to be edited or deleted; the Route page
appears.


Figure 118. The edit route page

The parameters and variables used are:

Route id: This is the id of the routing entry

Element Manager User's Manual DTM Configuration 123

2013 Net Insight AB, All rights reserved
Administrative status: The Administrative status for the defined routing entry; Down
means that the route is ignored, Up means that the routing entry is used.
Type: The type of routing entry. Set to static for static routes. The alternatives Link prefix
and Area prefix are used for dynamic routing and explained later.
Destination: The address of the remote node or network.
Prefix: The length of netmask for the remote subnet, i.e. the number of (starting) bit that
needs to be in agreement with the DTM address of the remote node.

Prefix 64 or /64 is equal to a mask of FF.FF.FF.FF.FF.FF.FF.FF, which means that the
destination is only made for one node. Prefix 56 or /56 is equal to a mask of
FF.FF.FF.FF.FF.FF.FF.00, i.e. the defined route is shared by nodes with identical first 56
bits in the DTM address. Prefix 48 or /48 is equal to a mask of FF.FF.FF.FF.FF.FF.00.00,
i.e. the defined route is shared by nodes with identical first 48 bits in the address.
Next hop: The DTM address of the neighboring node that can be used to reach the
destination. Used only for static routes.
Metric: The cost associated with using this route. A route with a lower metric will be tried
before a route with a higher metric.
After configuration is done, click on Apply or OK to save the settings. Delete is used
to remove the route and cancel is used to cancel the action. Observe that the route is created
when the Add source button is clicked and to remove the route, the delete button should be
used in the second step.
9.8 Dynamic routing
9.8.1 Setting the dynamic routing parameters
Go to the routing configuration web page and click on the Dynamic routing tab.

Figure 119. Dynamic routing

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
The goal of DRP is to find the lowest
cost of a path is defined as the sum of the cost of all switches and outgoing interfaces
the path uses. A good base
to 1 and the cost for passing through all nodes t
This means that the lowest
of links. In some circumstances, the operator
lowest cost path is. It is then possible to classify some links or switches as more
expensive than other links. This is done via a set of configuration variables called
metrics.
Changes to the Metric settings
in the network and they will update their routing tables accordingly. This process can
however take some time (on the order of seconds in smaller networks) before all nodes
have received the new
already established.
Node metric: The cost of switching a channel in this node
Interface metric: The cost of setting up a
value 0.
Enable: Allows the node
neighboring nodes via this interface? Th
can be disabled when DRP
interface connects to another operator
Under the header advanced settings, additional configuration is made.
to the rest of the DTM
complete routing table. The only routing entry necessary is
the other side of the point
end-node; all other nodes are called
switch.

Note:

If a node is configured as an end node, it can only originate and
terminate channels; it cannot switch channels.
Detect default gateway
This is only relevant for end
Detect from neighbors
from neighbors. Whenever it is visible, it is by default select
request its area number (see below) from its neighbor(s).
Area number: By default, DRP distributes information about all nodes and links to all
nodes in the DTM network. This allows all nodes to make "optimal" routing decisions since
they have complete knowledge about the current topology. As the network grows larger, the
amount of information distributed by DRP grows and eventually becomes too
node to handle efficiently. Exactly how large a network must be before the amount of
routing information becomes too large depends on both the number of nodes, the
connectivity between the nodes (i.e. the number of links) and the types of nodes in the
network. It also depends on how often the network topology changes
topology itself. As a rule of thumb, it is possible to run a network with 250 nodes without
worrying about the amount of routing information. If your network is larger than that, you
should consider using Areas.
Areas are also useful to limit the amount of routing
different operators.
DTM Configuration
2013 Net Insight AB, All rights reserved
The goal of DRP is to find the lowest-cost path from source node to destination node. The
cost of a path is defined as the sum of the cost of all switches and outgoing interfaces
the path uses. A good base configuration for DRP is to set the cost of all outgoing interfaces
to 1 and the cost for passing through all nodes to 0 (i.e. to use the default configuration)
This means that the lowest cost path is always the path that passes through the least number
of links. In some circumstances, the operator might have a different opinion on what the
cost path is. It is then possible to classify some links or switches as more
expensive than other links. This is done via a set of configuration variables called
Changes to the Metric settings in a node will be automatically propagated to all other nodes
in the network and they will update their routing tables accordingly. This process can
however take some time (on the order of seconds in smaller networks) before all nodes
have received the new information. Changes to metrics do not affect channels that are
: The cost of switching a channel in this node, with default value 0
: The cost of setting up an outgoing channel via this interface, with def
node to communicate and exchange routing information with
via this interface? The check box should be selected when using DRP. It
can be disabled when DRP is not to be used via the specific interface, e.g. when the
interface connects to another operator. The box is selected by default.
Under the header advanced settings, additional configuration is made. If a node is attached
DTM network with a single point-to-point link, the node doesnt need a
complete routing table. The only routing entry necessary is the default route to
the other side of the point-to-point link. In DRP terminology, this type of node is called an
other nodes are called switches. By default , the node is configured as a
If a node is configured as an end node, it can only originate and
terminate channels; it cannot switch channels.
Detect default gateway: Ticking this box forces the node to automatically find its gateway.
nly relevant for end-nodes. For switches, the box is grayed out (default)
Detect from neighbors: This box is only visible when the user selects area number Select
from neighbors. Whenever it is visible, it is by default selected. This makes the node
request its area number (see below) from its neighbor(s).
By default, DRP distributes information about all nodes and links to all
nodes in the DTM network. This allows all nodes to make "optimal" routing decisions since
they have complete knowledge about the current topology. As the network grows larger, the
unt of information distributed by DRP grows and eventually becomes too large
node to handle efficiently. Exactly how large a network must be before the amount of
routing information becomes too large depends on both the number of nodes, the
ity between the nodes (i.e. the number of links) and the types of nodes in the
network. It also depends on how often the network topology changes and the network
. As a rule of thumb, it is possible to run a network with 250 nodes without
rrying about the amount of routing information. If your network is larger than that, you
should consider using Areas.
Areas are also useful to limit the amount of routing-information distributed between two
DTM Configuration 124
cost path from source node to destination node. The
cost of a path is defined as the sum of the cost of all switches and outgoing interfaces that
ll outgoing interfaces
(i.e. to use the default configuration).
always the path that passes through the least number
might have a different opinion on what the
cost path is. It is then possible to classify some links or switches as more
expensive than other links. This is done via a set of configuration variables called
in a node will be automatically propagated to all other nodes
in the network and they will update their routing tables accordingly. This process can
however take some time (on the order of seconds in smaller networks) before all nodes
information. Changes to metrics do not affect channels that are
, with default value 0.
, with default
ion with
when using DRP. It
when the
If a node is attached
t link, the node doesnt need a
the node on
point link. In DRP terminology, this type of node is called an
By default , the node is configured as a
find its gateway.
(default).
This box is only visible when the user selects area number Select
the node
By default, DRP distributes information about all nodes and links to all
nodes in the DTM network. This allows all nodes to make "optimal" routing decisions since
they have complete knowledge about the current topology. As the network grows larger, the
large for a
node to handle efficiently. Exactly how large a network must be before the amount of
routing information becomes too large depends on both the number of nodes, the
ity between the nodes (i.e. the number of links) and the types of nodes in the
and the network
. As a rule of thumb, it is possible to run a network with 250 nodes without
rrying about the amount of routing information. If your network is larger than that, you
information distributed between two

Element Manager User's Manual DTM Configuration 125

2013 Net Insight AB, All rights reserved
9.8.2 Area Definition
An area is defined as a set of interconnected nodes configured with the same area number.
All nodes in an area must be able to reach all other nodes in the area without passing
through a node that belongs to a different area.
A node can only belong to one area.
Links do not belong to an area. A link can interconnect two nodes that belong to different
areas.
Two nodes that belong to the same area will exchange information about all nodes and links
within their area. Two nodes that belong to different areas will only exchange Area Prefix
routes (see below).




Figure 120. A network divided into two areas.
A node that is a member of one area, but has one or more links to a node in another area, is
called a border node.
9.8.3 Area Planning
Dividing a network into areas require careful planning. There are a number of issues to
consider before deciding where a network should be split into areas.
First of all, connectivity between areas should be as simple as possible. A node in one area
will not know anything about what another area looks like on the inside. It only knows the
shortest path to the area, not which path is shortest towards a particular destination inside
another area. Therefore, all border-nodes for an area should preferably have more or less
the same cost towards all destinations inside the area.

n1 n2
Area A1 Area A2
Border nodes

Element Manager User's Manual DTM Configuration 126

2013 Net Insight AB, All rights reserved

Figure 121. A network that has been divided into two areas in a bad way.
In the illustration, the distance from node 1 to node 5 is shorter if the channel is routed via
node 3 than if it is routed via node 2. In addition, the distance from node 1 to node 4 is
shorter via node 2. However, if a single area prefix route is used, then node 1 will think that
1
2
4
5
3

Element Manager User's Manual DTM Configuration 127

2013 Net Insight AB, All rights reserved
the distance to nodes 4 and 5 are the same and it doesn't matter if it routes the traffic via
node 2 or 3. This will lead to sub-optimal routing decisions.
This problem can be fixed by using more than one area prefix route to tell nodes in the
upper area if there are some groups of nodes that are cheaper to reach via one of the border
nodes than via the other. The extreme would be to add one area prefix route per node in the
area, but then you would be better off with all nodes in a single area.


Figure 122. A better way to build the network. Note the new link between nodes 2 and 3.
1
2
4
5
3

Element Manager User's Manual DTM Configuration 128

2013 Net Insight AB, All rights reserved
A better network layout is shown here. Here, a new link has been added between nodes 2
and 3. This means that it matters less if node 1 chooses to run the channel via node 2 or
node 3.
All nodes in an area should share a common addressing prefix. This prefix is independent
from the area number; it is only needed to announce to nodes in other areas which nodes
reside in this area. It is possible to have nodes with different prefixes within an area, as long
as one area prefix route is configured in each border node for each address prefix in the
area.
9.8.4 Area Prefix Routes
Area Prefix routes are used to distribute information about which nodes are inside an area
to nodes in other areas. They are configured in the border nodes and they are only
distributed to nodes in other areas, i.e. not to nodes in the same area as the border node that
the area prefix route is configured in. Area Prefix routes received from another node are
distributed to all nodes in the same area as the receiver, but not to nodes belonging to other
areas.
Example: an area prefix route configured in node n1 in Figure 120/Figure 123 is distributed
to all nodes in area A2. This route tells nodes in area A2 that they can reach nodes in area
A1 by going through node n2.
9.8.5 Directly Connected Areas

Figure 123. A network with two areas.
In the above example, the network has been divided into two areas called A1 and A2. All
nodes in area A1 have addresses in the range X.17.01.00/56 (X is used here as a short-hand
for 00.00.00.00.00) and the nodes in area A2 have addresses in the range X.17.02.00/56. If
no area prefix routes are used, nodes in area A1 are not able to establish channels to nodes
in area A2 and vice versa.
To allow nodes in area A1 to find nodes in area A2, an area prefix route must be added to
node X.17.02.21. This area prefix route should advertise the network X.17.02.00/56 to
nodes in area A1.
Area A1 Area A2
X.17.01.3A
X.17.02.21

Element Manager User's Manual DTM Configuration 129

2013 Net Insight AB, All rights reserved
To allow nodes in area A2 to find nodes in area A1, an area prefix route must be added to
node X.17.01.3A. This area prefix route should advertise the network X.17.01.00/56 to
nodes in area A2.
9.8.6 Indirectly Connected Areas
If two areas are not directly interconnected, area prefix routes must be configured for all
areas that can be reached through that area.


Figure 124. A network with three areas.
In the above example, the following area prefix routes must be configured:
To allow nodes in area A1 to find nodes in area A2, an area prefix route must be added to
node X.17.02.21. This area prefix route should advertise the network X.17.02.00/56 to
nodes in area A1.
To allow nodes in area A1 to find nodes in area A3, an area prefix route must be added to
node X.17.02.21. This area prefix route should advertise the network X.17.03.00/56 to
nodes in area A1.
To allow nodes in area A2 to find nodes in area A1, an area prefix route must be added to
node X.17.01.3A. This area prefix route should advertise the network X.17.01.00/56 to
nodes in area A2.
To allow nodes in area A2 to find nodes in area A3, an area prefix route must be added to
node X.17.03.13. This area prefix route should advertise the network X.17.03.00/56 to
nodes in area A2.
To allow nodes in area A3 to find nodes in area A1, an area prefix route must be added to
node X.17.02.28. This area prefix route should advertise the network X.17.01.00/56 to
nodes in area A3.
To allow nodes in area A3 to find nodes in area A2, an area prefix route must be added to
node X.17.02.28. This area prefix route should advertise the network X.17.02.00/56 to
nodes in area A1.

Area A1 Area A2
X.17.01.3A
X.17.02.21
Area A3
X.17.02.28
X.17.03.13

Element Manager User's Manual DTM Configuration 130

2013 Net Insight AB, All rights reserved
9.8.7 Metrics for Area Prefix Routes
Each area prefix route has an associated metric that decides how "expensive" it is to use this
particular path to the area. This is useful if two areas are interconnected by two different
pairs of nodes where one path is preferred over the other. It is also useful if it is possible to
reach an area both directly and via another area. Then the area prefix routes can be
configured so that the direct path has a lower cost than the path via another area.
9.8.8 Configuration
To implement DRP areas in your network, the following configurations must be made:
Configure the area number that the node shall belong to in each node. This is done from the
DTM Routing Dynamic routing config link.
Configure area prefix routes in the border nodes. This is done from the DTM Routing
link.
Note that the area prefix is only configured in the area prefix routes; you never actually
configure the area prefix for an area. The correlation between an area and an area prefix is
only maintained to make it possible to configure a single area prefix route that covers all
nodes in an area and no other nodes.
9.8.9 Addition of a dynamic routing entry
To add a dynamic route, follow the DTM Routing link. Click on the Add source
button. The static routing web page appears.

Figure 125. Dynamic routing



Element Manager User's Manual DTM Configuration 131

2013 Net Insight AB, All rights reserved

Figure 126. Dynamic routing, with available Type selections.
For dynamic routes (i.e. not static), the type could be set to:
9.8.9.1 Link Prefix
If there are many end-nodes with addresses with a common prefix attached to a single node,
then it is possible to announce all the end-nodes as a single route instead of announcing
them individually. This is done by configuring the end-nodes as end node (in Dynamic
routing config) and adding a link-prefix route in node s1.

Figure 127. Routing entries
Nodes n1, n2 and n3 are configured as end-nodes and they have DTM addresses that all fall
in the range X.17.00/60 (i.e. from X.17.00 to X.17.0F). A link-prefix route can therefore be
added to the node s1. This means that instead of announcing n1, n2 and n3 individually, s1
will announce only X.17.00/60. Instead of each node in the DTM network having three
separate routes for n1, n2 and n3, they will only have a single route that covers all three of
them (and any possible additional end-nodes added later in the same DTM address range).
s1
n3
n2
n1 X.17.01
X.17.03
X.17.02

Element Manager User's Manual DTM Configuration 132

2013 Net Insight AB, All rights reserved
9.8.9.2 Area Prefix
A network can be divided into areas to increase the scalability of DRP. Each area is
identified with an area number that must be configured in each node belonging to the area.
The default value of the area number is zero. A border node is a node that has at least one
neighbor that resides in another area. Two border nodes with different area numbers will
not become adjacent and exchange topology state information automatically.
9.8.10 Editing or deleting a dynamic routing entry
To edit a dynamic routing entry, follow the DTM Routing link and click on the address
of the route to be edited. The page below appears:


Figure 128. DTM Routing config page
Enter the values that should be changed. Click Apply or OK.
To delete the route, click on the Delete button instead. The routing entry is removed.


Element Manager User's Manual Trunks 133

2013 Net Insight AB, All rights reserved
10 Trunks
10.1 Overview of Trunks
Trunks of various types connect the nodes of a Nimbra network. The trunks can be of
different types; 8B/10B, SONET/SDH, PDH and IP/Ethernet.
The trunk interface manager supports 8B10B, SONET/ SDH, PDH and IP/Ethernet
interfaces. The main functional areas covered by the manager are Trunk interface
configuration including alarm reporting and performance monitoring. Performance
Monitoring is described in a separate chapter.
Normally, the trunk is configured from one web page, but the IP trunk and the Ethernet it
runs over are configured on separate web pages.
10.1.1 Trunk Modules, Nimbra One
There are several different trunk modules. Some of the cards are turnable and some are
available in type A and B versions.

Trunk Modules Data rate Category
OC-48/STM-16 X-ADM Module 2 488 Mbps SDH/SONET
OC-12/STM-4 Trunk Module
(DTM 622 Trunk Module)
622 Mbps SDH/SONET
2 x OC-12/STM-4 Trunk Module 2 x 622 Mbps SDH/SONET
4 x OC-3/STM-1 Trunk Module 4 x 155 Mbps SDH/SONET
OC-3/STM-1 Trunk Module
(DTM 150 Trunk Module)
155 Mbps SDH/SONET
4 x DS3/E3 Trunk/Access Module DS3 45 Mbps
E3 34 Mbps
PDH
3 x IP/Ethernet Trunk Module 1 000 Mbps IP/Ethernet
Figure 129. Available Trunk Modules for Nimbra One.


Element Manager User's Manual Trunks 134

2013 Net Insight AB, All rights reserved
10.1.2 Trunk Modules, Nimbra 300
There are several versions of trunk modules, according to the table below. From a web
management point of view, all Nimbra 300 trunk modules have a Nimbra One mirror image
and behave identically as it in the GUI interface. Hence, no separate description is made of
Nimbra 300 Series trunk modules.

Trunk Modules Data rate Category
OC-48/STM-16 X-ADM Module 2 488 Mbps SDH/SONET
OC-12/STM-4 Trunk Module 622 Mbps SDH/SONET
2 x OC-12/STM-4 Trunk Module 622 Mbps SDH/SONET
4 x OC-3/STM-1 Trunk Module 155 Mbps SDH/SONET
4 x DS3/E3 Trunk/Access Module DS3 45 Mbps/E3 34 Mbps PDH
3 x IP/Ethernet Trunk Module 1 000 Mbps IP/Ethernet
Figure 130. Available trunk modules for Nimbra 340.
10.1.3 Fixed trunk interfaces for Nimbra 310/320/360/380
Nimbra 310/320/360/380 has integrated fixed SDH/SONET trunk interfaces on the base
unit. One interface type is installed among the options below. The difference is in the
firmware, which can be changed in the field. In addition, the IP/Ethernet trunk can run on
two of the fixed ports, provided that the hardware supports it.

Fixed Trunk Interfaces, Nimbra 320/360/380 Data rate Category
OC-48/STM-16 X-ADM Interface (2 ports) 2 488 Mbps SDH/SONET
OC-12/STM-4 Trunk Interface (2 ports 320; 4 ports 360/380) 622 Mbps SDH/SONET
OC-3/STM-1 Trunk Interface (2 ports 320; 4 ports 360/380) 155 Mbps SDH/SONET
IP/Ethernet Trunk Interface; requires Nimbra320, Nimbra 360,
HW version B or Nimbra 380 (2 ports)
1000 Mbps IP/Ethernet
Figure 131. Fixed trunk interfaces for Nimbra 320/360/380.


Fixed Trunk Interfaces, Nimbra 310 Data rate Category
OC-48/STM-16 X-ADM Interface (1 port) 2 488 Mbps SDH/SONET
OC-12/STM-4 Trunk Interface (1 port) 622 Mbps SDH/SONET
OC-3/STM-1 Trunk Interface (1 port) 155 Mbps SDH/SONET
IP/Ethernet Trunk Interface (1 port) 1000 Mbps IP/Ethernet
Figure 132. Fixed trunk interfaces for Nimbra 310.



Element Manager User's Manual Trunks 135

2013 Net Insight AB, All rights reserved
10.1.4 Trunk Modules, Nimbra 600
There are several versions of trunk modules, outlined in the table below. These modules
look slightly different in the web interface than corresponding ones in the web interface of
the Nimbra One/300.

Trunk Modules Data rate Category
OC-192/STM-64 Trunk Module 9 952 Mbps SDH/SONET
4 x OC-48/STM-16 Trunk Module 2 488 Mbps SDH/SONET
4 x OC-12/STM-4 Trunk Module 622 Mbps SDH/SONET
4 x OC-3/STM-1 Trunk Module 155 Mbps SDH/SONET
6 x IP/Ethernet Trunk Module Configurable, up to 1000 Mbps IP/Ethernet
10 GE Trunk Module Configurable, up to 10000 Mbps IP/Ethernet
Figure 133. Trunk Modules for Nimbra 600. The available data rate could be limited by the
amount of capacity between the module and the switch module (i.e. the
aggregate capacity of the DPP links).
10.1.5 Trunk interfaces configuration
The starting web page for the Trunks link is shown in below.

Figure 134. The starting web page for Trunks
The sub-links are: Trunk Interfaces, Ethernet Interfaces and Perf. monitor. Trunk Interfaces
is where the various trunk modules are configured and their state is monitored. Ethernet
Interfaces is where the Ethernet part of IP/Ethernet trunk interfaces is configured and Perf.
monitor is where performance monitoring for the interfaces is defined.
Performance monitoring (PM) is the process whereby transported data is supervised for
quality deterioration. Performance monitoring uses SNMP counters (ITU-T G.826 like) on
trunks, interfaces and connections. For further information, see the chapter on Performance
Monitoring.
To configure the trunk interfaces, just follow the link to Trunk Interfaces. Select the trunk
to be configured by clicking on the Name of the trunk (e.g. sonet/sdh-3:1, pdh-5:1, ipt-5:4).

The following information is presented on the web page:


Element Manager User's Manual Trunks 136

2013 Net Insight AB, All rights reserved
Name is the name of the interface, according to Net Insight naming convention
Mode is the type of interface
Capacity is the total capacity of the trunk interface in Mbps
Admin is the administrative status of the trunk interface. This is only relevant for IP trunk
interfaces; for interfaces lacking this parameter, nothing is displayed in this column.
Oper is the operational status of the trunk interface (up, down, absent, starting or degraded)
10.2 Editing SDH/SONET Trunk Interfaces
The basic structure of the configuration page is kept constant for the various interfaces in
Nimbra One and Nimbra 300.
First, interface specific variables are presented, followed by configurable parameters. These
parameters are followed by additional configurable advanced parameters under the
advanced heading and sometimes by additional variables. Finally, the alarm status is
presented.
The common Read-only parameters (variables) are:

Parameter Description
Interface name The interface name. Written as sonet/sdh-X:Y where X is slot position of the
module and Y port position of the interface on the module.
Operational status The operational status of the board
Speed Capacity of the interface
SOH S1 (SSM) Synchronization Status Message (4 bits) in the section overhead
Description The number of slots available for transmission on this interface. Used on OC-
3/STM-1 Trunk Module only
Figure 135. Read-only parameters for SDH/SONET interfaces

Additional variables for OC-48/STM-16 X-ADM Module are:

Parameter Description
Transceiver temperature Temperature of the transceiver
Transceiver laser bias Laser bias current of the transceiver laser
Transceiver power Optical power transmitted from the transceiver
Receiver power Optical power received on the transceiver
Figure 136. Additional variables for the OC-48/STM-16 X-ADM Module



Element Manager User's Manual Trunks 137

2013 Net Insight AB, All rights reserved
The configurable parameters for the common interfaces are:

Parameter Description
Suppress Alarms When the service is up and running as intended, alarms are by
default suppressed. In order to enable the alarms, the suppress
alarms tick boxes must be unmarked.
All: When marked, all alarms are suppressed.
AIS: Alarm indication signal.
RDI: Remote defect indicator.
Figure 137. Configurable parameters for common interfaces
The configurable Advanced parameters for SDH/SONET trunk modules are:

Parameter Description Comment
Transmit sync
source
Define the sync source for the transmitting (Tx) interface.
The parameter can have two values, interface and loop.
The default setting is interface, which uses the node sync
source as source for the outgoing Tx interface. loop
means that the incoming Rx signal is reused on the Tx
interface. This setting should not be used at both ends of
the link!
Not used for OC-
48/STM-16 X-ADM
Trunk Module or
Nimbra 600 OC-
48/STM-16 Trunk
modules
H1 SS bits Different between Sonet and SDH.
This value is the value of the SS bits in the H1 byte in the
Sonet/SDH section overhead. Older Sonet/SDH equipment
may require other values than the default values
(00 Sonet; 10 SDH)

POH C2 byte Path overhead
The C2 byte in the path overhead specifies what type of
network is used. ITU-T has not yet assigned a C2 value for
DTM networks, so for DTM networks use 05 as the ITU-
T experimental value.
Used on 4 x OC-
3/STM-1 Trunk
Module and OC-
48/STM-16 X-ADM
Module
Signal failure
filter period
Delay time for 1+1. The time that the nodes waits for the
underlying network (SDH/SONET/WDM) to re-establish
connection, in order to avoid a switch-over.
Default 50 ms, Range 0-2000 ms

Degraded
defect (DEG)
period
Configuration parameters for the Degraded alarm,
according to ITU G.806 for the interface.
Period, default 5 sec.
Not used for OC-
48/STM-16 X-ADM
Trunk Module or OC-
3/STM-1 (DTM 150)
Trunk Module
Degraded
defect (DEG)
threshold
Configuration parameters for the Degraded alarm,
according to ITU G.806 for the interface.
Number of background block errors. Default 1200.
Not used for OC-
48/STM-16 X-ADM
Trunk Module or OC-
3/STM-1 (DTM 150)
Trunk Module
Figure 138. Configurable Advanced parameters for SDH/SONET trunks.



Element Manager User's Manual Trunks 138

2013 Net Insight AB, All rights reserved
Additional read-only parameters (variables) are presented under the Advanced heading:

Parameter name Description
Error counters B1 Section overhead
B2 Line overhead
B3 Path overhead
M1 Remote indication of B1
G1 Remote indication of B3
Pointer adjustment
event, positive and
negative
RXPJE+
RXPJE-
TXPJE+
TXPJE-
Overhead bytes SS=2 C2=5 (default)
Figure 139. Additional advanced read-only parameters
The OC-3/STM-1 Trunk Module only display error counters B2 and B3.
The Alarms parameters are presented at the bottom of the table as:

Alarm Description
Opto module Alarms from SFP. The Opto Module alarm is not available for the OC-
3/STM-1 Trunk Module.
Unequipped (UNEQ) This alarm is received from the other end of the link, indicating that the
payload is not usable.
Los of signal (LOS) Loss of signal. No signal detected on SONET/SDH network interface,
no light in the fiber.
Los of frame (LOF) Loss of frame. Unable to align SONET/SDH frame, no light in the
fiber.
Los of pointer (LOP) Loss of pointer. No pointer for where payload is.
Alarm indication signal,
line (AIS-L)
Alarm indication signal, line or defect detected by upstream
SONET/SDH network interface.
Alarm indication signal,
path (AIS-P)
Alarm indication signal, path or defect detected by upstream
SONET/SDH network interface.
Remote defect indication,
line (RDI-L)
Remote defect indication, line or defect detected by downstream
SONET/SDH network interface.
Remote defect indication,
path (RDI-P)
Remote defect indication, path, RDI-P or defect detected by
downstream SONET/SDH network interface.
Payload mismatch (PLM) Payload mismatch.
Degraded signal (DEG) Degraded signal
Loopback Loopback alarm, NA
Figure 140. Alarms parameters
As an example, configuration of one interface on the OC-12/STM-4 Trunk Module is
given.


Element Manager User's Manual Trunks 139

2013 Net Insight AB, All rights reserved

Figure 141. Configuration page of the OC-12/STM-4 module, part one. Digital diagnostics
are values reported directly from the SFP.

Element Manager User's Manual Trunks 140

2013 Net Insight AB, All rights reserved

Figure 142. Configuration page of the OC-12/STM-4 module, part two. This page displays
the status of possible trunk alarms.

10.2.1 Asymmetric alarm generation
When the DTM link is taken down between a Nimbra 680/688 and a Nimbra 300
series/Nimbra One, alarms are generated. As it is possible to take down the link in only one
direction on Nimbra 680/688, but this feature is missing on Nimbra 300/Nimbra One
alarms are not generated symmetrically in this case.
Observe that to see these alarms at all, the default setting of alarm suppression on the
SDH/Sonet trunk level must be removed. Also, the described alarm pattern is only valid for
SDH/Sonet trunks.

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
Figure 143. Asymmetrical alarm generation when a DTM interface is
Nimbra 360 (left) and when a DTM interface is taken down in a Nimbra 680.
10.2.2 Optional FEC version for 4 x OC
FEC155 Firmware Module is a value added firmware module for the
4 x OC-3/STM-1 Trunk Modules. Currently, it requires va
One) or NPS0009-3S31 (Nimbra 300 Series) of the Trunk Module. It provides
comprehensive forward error correction to the trunk module. Typically it should be used
when running traffic over unreliable media such as microwave links
and burst errors. All services are protected since FEC works on the link level. The module
performs Reed-Solomon encoding/decoding
Reed-Solomon encoding/decoding p
can detect and correct up to 8 bytes of an STS

Note:

Only two of the four physical interfaces will be usable when running
the board in FEC mode.
The module is easy installable on the NPS0009
OC-3/STM-1 Trunk Module by a remote firmware upgrade; please see
Downgrading chapter, chapter

Trunks
2013 Net Insight AB, All rights reserved
Asymmetrical alarm generation when a DTM interface is taken down in a
Nimbra 360 (left) and when a DTM interface is taken down in a Nimbra 680.
Optional FEC version for 4 x OC-3/STM-1 Trunk
FEC155 Firmware Module is a value added firmware module for the
1 Trunk Modules. Currently, it requires variant NPS0009-XS31 (Nimbra
3S31 (Nimbra 300 Series) of the Trunk Module. It provides
comprehensive forward error correction to the trunk module. Typically it should be used
when running traffic over unreliable media such as microwave links that are prone to bit
and burst errors. All services are protected since FEC works on the link level. The module
Solomon encoding/decoding and Row/Column interleaving.
Solomon encoding/decoding performs a (255,239) encoding/decoding of t
can detect and correct up to 8 bytes of an STS-3c SPE/VC-4 row.
Only two of the four physical interfaces will be usable when running
the board in FEC mode.
The module is easy installable on the NPS0009-XS31/NPS0009-3S31 variant of the 4 x
1 Trunk Module by a remote firmware upgrade; please see the Up-
, chapter 22 of this document.

Trunks 141

taken down in a
Nimbra 360 (left) and when a DTM interface is taken down in a Nimbra 680.

XS31 (Nimbra
3S31 (Nimbra 300 Series) of the Trunk Module. It provides
comprehensive forward error correction to the trunk module. Typically it should be used
that are prone to bit
and burst errors. All services are protected since FEC works on the link level. The module
erforms a (255,239) encoding/decoding of the data and
3S31 variant of the 4 x
- and

Element Manager User's Manual Trunks 142

2013 Net Insight AB, All rights reserved
10.3 Editing the DS3/E3 Trunk interfaces
The presented variables are:

Variable Description
Interface
name
The interface name, written as pdh-X:Y where X is number of the slot in the
chassis and Y is the number of the port on the module.
DTM
interface
The name of the DTM interface, written as dtmX:Y. X and Y are used as for the
Interface name.
Oper. status The operational status of the board. Up, Down, Absent, Starting or
Dormant
Speed The capacity of the interface
Mode The operational mode of the node, DS3 or E3. The mode (DS3/E3) has to be the
same on the entire module, but mixing DS3 and E3 on different modules within a
node is allowed.
Figure 144. Variables of the DS3/E3 Interface

The configurable parameters for the DS3/E3 Trunk Interface are:

Parameter Description
Suppress Alarms When the service is up and running as intended, alarms are by
default suppressed. In order to enable the alarms, the suppress
alarms tick boxes must be unmarked.
All: When marked, all alarms are suppressed.
AIS: Alarm Indication Signal.
RDI/RAI: Remote Defect Indicator/Remote Alarm Indication
Figure 145. Configurable parameters of the DS3/E3 Trunk Interface



Element Manager User's Manual Trunks 143

2013 Net Insight AB, All rights reserved
The Advanced parameters are:

Parameter Description
Line build out (DS3
only)
For operation with physical cable lengths over 68 m (225 feet), the Line
build-out variable must be selected. With the selection, operation up to 137
m (450 feet) is feasible.
SSM/TM code (E3
only)
Synchronization Status Message/Timing Marker code. Can assume values 0-
15 or auto. Auto is recommended.
Receive sync
(RX_FSYNC)
source
Select receive DTM sync source. Either the recovered bit clock (Line) or the
recovered DTM Start of Frame signal (FSP). Normally set to Line, but if
Time Transfer is used the parameter must be set to FSP. Also, in this case,
the interface must be reset, i.e. the administrative status must first be taken
down and then reset to up. Obviously, this only applies to the case where the
administrative status is up already.
Signal failure filter
period
Delay time for 1+1. The time that the nodes waits for the underlying network
(SDH/SONET/WDM) to re-establish connection, in order to avoid a switch-
over.
Default 50 ms, Range 0-2000 ms
Degraded defect
(DEG) period
Configuration parameters for the Degraded Signal alarm, according to ITU
G.806 for the interface.
Period, default 5 sec (Number of sequential bad seconds to set/clear DEG),
settable from a roll-down menu to an integer between 2 and 10
Degraded defect
(DEG) threshold
Configuration parameters for the Degraded Signal alarm, according to ITU
G.806 for the interface.
Number of background block errors to declare a bad second. Default 1200.
Overhead
information
BIP 00000 (Number of detected BIP-8 errors since last reload of this page);
REI 00000 (Number of detected remote error indications since last reload of
this page); LCV 11920 (Number of detected line code violations since last
reload of this page); CP 00000; P 00000 (Number of detected P-bit errors
since last reload of this page)
Figure 146. Advanced parameters of the DS3/E3 Trunk Interface

The Alarms parameters are presented at the bottom of the table as:

Parameter Description
Unequipped
(UNEQ/IDLE)
This alarm is received from the other end of the link, indicating that the
payload is not usable.
Loss of signal (LOS) Loss of signal. No signal detected on PDH network interface.
Loss of frame
(LOF/OOF)
Out of frame. Unable to align PDH frame.
Alarm indication signal,
line (AIS)
Alarm indication signal, line or defect detected by upstream network
interface.
Remote defect indication,
line (RDI/RAI)
Remote defect indication or defect detected by downstream network
interface.
Payload mismatch (PLM) Payload signal label mismatch.
Degraded signal (DEG) Degraded signal.
Figure 147. Alarms parameters of the 4 x DS3/E3 Trunk Module

Element Manager User's Manual Trunks 144

2013 Net Insight AB, All rights reserved
Navigate to the Trunks Trunk Interfaces web page and then on the trunk interface that
should be edited.
Make all your choices and click on Apply or OK. Apply doesnt change the web page,
whereas OK takes you back to the previous web page (the Trunks Trunk Interfaces).

Figure 148. Edit the Trunk parameters on a DS3/E3 Trunk Interface

Element Manager User's Manual Trunks 145

2013 Net Insight AB, All rights reserved

Figure 149. Alarms of a DS3/E3 Trunk Interface, presented on the alarms tab.
10.3.1 Configuration of DS3/E3 mode
For a 4 x DS3/E3 Trunk/Access Module used as a trunk module, it is not possible to set the
DS3/E3 mode of the module from the web GUI. The DS3/E3 mode can only be set for the
entire module at boot time, i.e. it must be decided whether the node shall run the 4 x
DS3/E3 trunk modules in DS3 or E3 mode. This is done on a per-module basis. A change
of configuration requires a change in the file modprobe.conf and a reboot of the node.
The mode is set by editing the file /flash/etc/modprobe.d/modprobe.conf.
The string options mau-50 e3=2,3,4 ds3=5,6,7,8 makes all 4 x DS3/E3
trunk/access modules used in trunk mode operate with the E3 protocol if placed in slots 2-4
and with the DS3 protocol if placed in slots 5-8.
To operate all modules in E3 mode, write options mau-50 mode=0.
To operate all modules in DS3 mode, write options mau-50 mode=1.
An empty modprobe.conf file sets all modules to DS3 mode (default).
After the file has been edited, the node has to be rebooted.
For system release versions prior to GX4.3.0.0, it is not possible to mix E3 and DS3 trunks.
The entire node must be set to either DS3 or E3 mode.
The configuration of E3/DS3 mode for a slot position does not affect the operation of other
board types, i.e. it is possible to use any interface module in a DS3/E3 configured slot. The
configuration only applies for DS3/E3 trunk/access modules uses as trunk modules.

Element Manager User's Manual Trunks 146

2013 Net Insight AB, All rights reserved
If the 4 x DS3/E3 Trunk/Access Module is used as an access module, DS3 or E3 is
configurable from the web interface per interface. Trunk/access operation is determined by
what firmware is installed on the module.

10.4 Editing the IP/Ethernet trunk interface
There are two different IP/Ethernet rates available, on different modules, 1000 Mbps and
10000 Mbps. The IP/Ethernet trunks are configured essentially the same way, as is
described below.
10.4.1 Protocol stacking
On the 10GE and 6 x IP/Ethernet Trunk Modules, the underlying physical Ethernet
interface, the IP Trunk interface and the DTM interface that runs on top of the other two
interfaces are all configured from links in the left column of the main web menu.

Figure 150. The interface structure of the IP trunk.
Configuration of IP/Ethernet trunks starts from the link Trunks in the left column. Clicking
on the link Trunks displays additional links: Trunk Interfaces, Ethernet Interfaces and
Perf. Monitoring.
Configuration must be carried out in the order Ethernet Interface and Trunk Interface. In
particular, in this release, the IP Trunk interface is not created automatically as it has in
previous GX-releases for the 6 x IP/Ethernet Trunk Module, but has to be manually created.
Ethernet interface (physical)
IP Trunk interface
DTM interface

Element Manager User's Manual Trunks 147

2013 Net Insight AB, All rights reserved


Figure 151. The first configuration page for IP Trunks.
The new 10 GE Trunk Module has two SFP+ ports, which each can transport up to 10
Gigabit. However, the combined capacity for both ports is limited to 10 Gigabit, but the
capacity can be arbitrarily divided between the two ports.
The regular 6 x IP/Ethernet Trunk Module use regular SFP ports, as it has done before.
10.4.2 Configuration of IP/Ethernet trunks Ethernet
Configuration of both 10 GE Trunk Module and 6 x IP/Ethernet Trunk Module can be
made from the link Ethernet interfaces, found under the Trunks link on the left side of the
web interface.
The particular, Ethernet interface is labeled etht-<slot #>:<interface number>, e.g. etht-
2:3, etht-2:6 and etht-5:2. Both IP trunk modules are named according to the same
principle, but they have different number of interfaces. Example of their numbering is ipt-
2:3, ipt-2:6 and ipt-5:2. Both trunk modules have the same nomenclature for the created
(IP) trunks. Note that there is no longer a numerical coupling between the Ethernet trunk
and IP trunk. In other words, etht-7:2 can have ipt-7:1 on top of it.

Module name Interface data rate (Mbps) Number of
interfaces/module
10 GE Trunk Module 10000 2
6 x IP/Ethernet Trunk Module 1000 6
Figure 152. Interfaces of IP/Ethernet trunks
The Ethernet interface configuration page has four different links: Basic, Advanced,
Statistics and Trunks.
The 10 GE and 6 x IP/Ethernet Trunk Modules are configured on multiple web pages. First
the Ethernet interface is configured.
Connect the Ethernet cable or fiber to the module before starting the configuration. It is
imperative that this step is followed, as the operational state of the etht interface stays down
otherwise.
Now follow the link for Ethernet interfaces and select the appropriate interface, like etht-
5:1. Make sure the administrative status is up. Proceed with IP-trunk configuration, found
under Trunk interfaces. The particular trunk has to be created, with a selected data rate,
from the specific trunks Trunks tab on the Trunks Ethernet interfaces web page.

Element Manager User's Manual Trunks 148

2013 Net Insight AB, All rights reserved

Figure 153. Basic (configuration) page of the Ethernet interface of the IP/Ethernet trunk
etht-4:1, Basic settings.
10.4.3 Ethernet Interface Parameters and Variables
The Ethernet interface configuration is quite simple, but on the main page there are four
different tabs for Basic (settings), Advanced (settings), Statistics and Trunks. Observe that
you need to click on OK or Apply on each page before you proceed to the other tabs for
additional configurations, otherwise the setting just made does not stick.
Statistics is described later together with the statistical measures available for the IP trunk
(dpp counters). Trunks have to be individually created, which is made from the Trunks
Trunk interfaces link. The procedure is described later in the chapter.
In addition to the parameters to configure, there are additional variables (i.e. read-only
entities) presented in the web interface.


Element Manager User's Manual Trunks 149

2013 Net Insight AB, All rights reserved
10.4.4 Basic and Advanced Ethernet Interface Variables


Figure 154. Basic Ethernet Interface Variables, some of which also are presented on the
advanced page. They are only presented once in this text. The statistics
variables are presented separately.

10.4.4.1 Interface name
Type: Character string (interface name of type etht-x:y)
Description: The name of the Ethernet trunk interface that is configured

10.4.4.2 Operational status
Type: Up, Down, Dormant, Absent
Description: The operational status of the interface.

10.4.4.3 Last change
Type: Time on format hh:mm:ss
Description: Time stamp of the last change of the configuration.

10.4.4.4 Interface type
Type: Type of physical interface
Description: The physical interface is stated, e.g. 10Gbase-SR, 1000Base-T



Element Manager User's Manual Trunks 150

2013 Net Insight AB, All rights reserved
10.4.4.5 Active speed
Type: Speed
Description: Speed of the link from the Ethernet interface

10.4.4.6 Active duplex
Type: Duplex
Description: Full/Half Duplex or Simplex used on the interface. Currently only Full
Duplex is supported.

10.4.4.7 Active flow control
Type: Flow control
Description: Flow control technology currently used on the interface. Could also be
none, i.e. flow control is not used. Currently, only none is supported.

10.4.5 Ethernet Interface Parameters - Basic settings
10.4.5.1 Administrative Status
Default value: Down
Type: Down, Up
Description: The module can be set to administratively active (up) or inactive (down).

10.4.5.2 Purpose
Default value: Empty string
Type: text string, up to 255 characters long
Description: A text tag that can be entered by the user for various purposes.



Element Manager User's Manual Trunks 151

2013 Net Insight AB, All rights reserved
10.4.6 Ethernet Interface Parameters - Advanced settings


Figure 155. Configuration page of the Ethernet interface of the IP/Ethernet trunk etht-5:1,
Advanced settings.

The advanced settings concern the negotiation of operating mode with the remote (peer)
interface.
10.4.6.1 Autonegotiate
Default value: On
Type: Boolean variable
Range: On, Off
Description: The variable tells if the autonegotiate feature is enabled or not.
10.4.6.2 Advertised speed
Default value: auto
Type: Text string, describing the available speeds of the Ethernet interface.
Range: auto, 1000, 100, 10, 1000, 100 , 1000,10, 100,10, 1000, 100, 10
Description: A list of supported Ethernet interface speeds.
10.4.7 Ethernet Interface Parameters Trunk
IP Trunks have to be specifically created before they can be configured. On the Ethernet
Interface configuration page, follow the Trunks link, to create (and configure) an IP trunk.


Element Manager User's Manual Trunks 152

2013 Net Insight AB, All rights reserved

Figure 156. Ethernet interface configuration Trunks page
IP trunks are created by clicking the Add Trunk button.



Figure 157. Trunk created with no bandwidth (default)
To configure the trunk, click on the trunk link, in this case ipt-5:1. This link takes you to the
basic configuration page of the IP trunk.


Element Manager User's Manual Trunks 153

2013 Net Insight AB, All rights reserved
10.4.8 Configuration of the IP/Ethernet trunk IP Trunk
The tabs of the IP Trunk configuration page are seen on the first (basic) configuration page
are Basic, Advanced, Alarms and Statistics.


Figure 158. Default basic IP trunk configuration page

To configure the capacity of the IP trunk, fill in either TX slots or TX bitrate. Internally,
TX slots are used. If TX bitrate is filled out, an integer number of TX slots are
automatically filled out in the TX slots field and the TX bitrate is reduced slightly.
Make appropriate IP settings for local and remote (destination) node. Set netmask (always)
and gateway if appropriate. It is essential that IP configuration is made correctly, as no link
is established otherwise.
The maximum transmission unit is defined on this page as well (105-1500). Also, the FEC
(Forward Error Correction) parameters are configured here. The configurable basic settings
are described below.

Element Manager User's Manual Trunks 154

2013 Net Insight AB, All rights reserved
10.4.8.1 Basic settings
10.4.8.2 Administrative status
Default value: Down
Type: Binary
Range: Down, Up
Description: This parameter is the users selected state for the IP trunk. If set to Up, the IP trunk
is trying to establish itself.

10.4.8.3 Maximum transmission unit
Default value: 1500 (bytes)
Type: integer
Range: 105-1500 (bytes)
Description: IP maximum transmission unit, including IP overhead (64 bytes).

10.4.8.4 Tx slots (Tx bitrate)
Default value: The default Tx slot rate is 179. Tx bitrate is internally computed from the Tx slot
rate.
Type: Integer
Range: Displayed immediately to right of the field.
Description: It is possible to express the transmitted capacity either as number of slots per DTM
frame (Tx slots) or directly as bitrate. Only one of the fields should be filled out; the other field is
automatically computed as soon as the fill-out field is left. A Tx slots value of 0 means that the trunk
is taken down in the transmit direction.

10.4.8.5 Local IP address
Default value: 169.254.0.0
Type: IP address, xxx.yyy.zzz.aaa where xxx, yyy, zzz and aaa all are integers in the range 0-255.
Range: 0.0.0.0-255.255.255.255
Description: This is the IP address of the configured trunk interface.

10.4.8.6 Subnet mask
Default value: 255.255.255.0
Type: IP address, xxx.yyy.zzz.aaa where xxx, yyy, zzz and aaa all are integers in the range 0-255.
Range: 0.0.0.0-255.255.255.255
Description: This is the subnet mask of the configured trunk interface.



Element Manager User's Manual Trunks 155

2013 Net Insight AB, All rights reserved
10.4.8.7 Gateway IP address
Default value: 0.0.0.0
Type: IP address, xxx.yyy.zzz.aaa where xxx, yyy, zzz and aaa all are integers in the range 0-255.
Range: 0.0.0.0-255.255.255.255
Description: The default IP gateway used to reach remote locations in other subnets.

10.4.8.8 Remote IP address
Default value: 169.254.0.0
Type: IP address, xxx.yyy.zzz.aaa where xxx, yyy, zzz and aaa all are integers in the range 0-255.
Range: 0.0.0.0-255.255.255.255
Description: This is the IP address of the remote (peer) trunk interface.

10.4.8.9 Forward Error Correction Transmit Mode
Default value: none
Type: text string
Range: Alternatives that are supported by the hardware, shown in a drop-down menu.
Description: none means that the function is disabled. 1D means that the 1D form of
Forward Error Correction (FEC) is used for transmission (column checksum) from this interface.
2D means that the 2D form of FEC is used for transmission (column + row checksums) from this
interface. See the description of FEC (10.6.5 Forward error correction).

10.4.8.10 Forward Error Correction Transmit rows
Default value: 10
Type: integer
Range: Displayed immediately to right of the field, as supported by hardware.
Description: Number of rows in the transmit FEC matrix. The product of FEC Transmit rows and
FEC Transmit Columns must be below 100. The parameter is grayed out if it cant be configured.

10.4.8.11 Forward Error Correction Transmit columns
Default value: 10
Type: integer
Range: Displayed immediately to right of the field, as supported by hardware.
Description: Number of columns in the transmit FEC matrix. The product of FEC Transmit rows
and FEC Transmit Columns must be below 100. The parameter is grayed out if it cant be configured.

After the basic parameters have been set and confirmed (by clicking the OK or Apply
button), it is time to define the advanced trunk parameters.

Element Manager User's Manual Trunks 156

2013 Net Insight AB, All rights reserved
10.4.8.12 Advanced settings

Figure 159. Default advanced IP trunk configuration page
The parameters that can be configured on this page are described below.


Element Manager User's Manual Trunks 157

2013 Net Insight AB, All rights reserved
10.4.8.13 Transmitted frame type
Default value: untagged
Type: text string
Range: One of untagged, priotagged or vlantagged
Description: Untagged means that neither VLAN tags nor prio tags are attached to the packets
header. vlantagged means that all packets are labeled in the VLAN ID field. Priotagged means
that VLAN id tags on incoming packets are ignored and outgoing packets are not labeled with a
VLAN ID. However, the prio field in the header is set in the Ethernet priority field (default: 0, type:
integer, range: 0-7) and determines the priority of the packets.

10.4.8.14 VLAN id
Default value: No default value
Type: integer
Range: 1-4094
Description: VLAN id is a VLAN tag attached to Ethernet frames that are of transmitted frame
type vlantagged. As it is only relevant in this case, it is grayed out for the other values of the
parameter Transmitted frame type.

10.4.8.15 Ethernet priority
Default value: 0
Type: integer
Range: 0-7
Description: Ethernet priority is a setting that determines the priority of the Ethernet frames. It is
assigned to Ethernet frames that are of transmitted frame type vlantagged or priotagged.

10.4.8.16 DiffServ Code Point
Default value: 0
Type: integer
Range: 0-63
Description: Differentiated Services Code Point is a number that the customer assigns IP packets
over the trunk. It defines a networking architecture that specifies a mechanism for classifying,
managing network traffic and providing QoS guarantees.

10.4.8.17 Time to live
Default value: 30
Type: integer
Range: 0-255
Description: Maximum number of hops allowed between originating interface and terminating IP
interface.

10.4.8.18 Jitter tolerance
Default value: 2000 (s)

Element Manager User's Manual Trunks 158

2013 Net Insight AB, All rights reserved
Type: integer
Range: Jitter tolerance depends on type of IP trunk and is displayed in the web interface.
Description: The tolerated jitter and wander of the IP interface, given in microseconds.

In order to configure jitter tolerance, maximum path delay (p-t-p) variation should be
monitored, if necessary for a few hours or even days. The jitter tolerance is then best set to
be p-t-p + 20% or larger. In any event, both the minimum and maximum values displayed
within parenthesis must be respected. The current default value for jitter tolerance is 2000
s.
Actually, due to a minimum buffering of packets, the jitter tolerance will always be at least
32 divided by the packet rate, where the packet rate is the DPP-IP data packet rate in
packets/s (FEC packets are not included). This means that for packet rates less than or equal
to 16000 packets/s or less, the default value is not used.
Consider a trunk set to TX slots = 179 slots (i.e. slots per DTM frame). The required
Ethernet capacity for this configuration is about 100 Mb/s. Each packet contains 179 slots
@ standard MTU (1500 bytes). The packet rate is in this case 8000 packets/s and the
minimum jitter tolerance is 4 ms (32/8000).
After having done the configuration, make sure to click on OK or Apply to make the
configuration stick.

10.4.8.19 Alarm settings
In the web interface, some additional settings are made from the Alarms tab on the IP trunk
configuration page.

Element Manager User's Manual Trunks 159

2013 Net Insight AB, All rights reserved

Figure 160. Default alarms IP trunk configuration page
10.4.8.20 Suppress alarms - All
Default value: yes, i.e. ticked
Type: binary
Range: yes or no
Description: The suppress alarm tick box for all alarms can be used to suppress all alarms.



Element Manager User's Manual Trunks 160

2013 Net Insight AB, All rights reserved
10.4.8.21 Suppress alarms - RDI
Default value: yes, i.e. ticked
Type: binary
Range: yes or no
Description: The suppress alarm tick box for the RDI (Remote Defect Indication) alarm can be
used to suppress the RDI alarms.

10.4.8.22 Signal failure filter period
Default value: 50
Type: integer
Range: 0-2000
Description: The signal fail filter delay time (in milliseconds), i.e. a system set delay
before a signal fail alarm is generated (after its detection).

10.4.8.23 Degraded defect (DEG) period
Default value: 5
Type: integer
Range: 2-10
Description: Number of consecutive seconds that exceed the threshold before the DEG
alarm is generated. Not implemented in the current release.

10.4.8.24 Degraded defect (DEG) threshold
Default value: 1200
Type: integer
Range: 0-8000
Description: Number of acceptable errored blocks per second. A higher error rate than
this value starts the time counter towards the DEG alarm.

After the configuration is made, make sure to click on OK or Apply to make it stick.


Element Manager User's Manual Trunks 161

2013 Net Insight AB, All rights reserved
10.4.9 IP trunk interface variables
Variables, presented with their respective values are shown on the various configuration
pages and are described in the following chapters.

Figure 161. Basic IP Trunk configuration page with (configurable) parameters and
(displayed) variables.
10.4.10 Basic variables
10.4.10.1 Interface name
Type: Character string (interface name of type ipt-x:y)
Description: The name of the IP trunk interface that is configured



Element Manager User's Manual Trunks 162

2013 Net Insight AB, All rights reserved
10.4.10.2 Physical interface
Type: Character string (interface name of type etht-x:y)
Description: The name of the underlying physical Ethernet interface. A link is provided
for fast access to the relevant configuration page.

10.4.10.3 DTM interface
Type: Character string (interface name of type dtm-x:y)
Description: The name of the DTM interface residing on top of the IP trunk under
configuration.

10.4.10.4 Operational status
Type: Up, Down, Dormant
Description: The operational status of the interface.

10.4.10.5 Max Tx Bitrate
Type: Integer
Description: The highest possible Tx bitrate that can be configured on this interface.

10.4.10.6 Rx slots (Rx bitrate)
Type: Integer
Description: The variables Rx slots and Rx bitrate are proportional. These variables are
configurable from the remote (peer) interface as Tx slots/Tx bit rate. If the Rx slot value is
zero, the trunk is taken down from the other end.

10.4.10.7 Max Rx Bitrate
Type: Integer
Description: The highest possible Rx bitrate that can be received on this interface.

10.4.10.8 Forward Error Correction, Receive mode
Type: text string
Description: The FEC receive mode is equal to the FEC transmit mode defined on the
remote (peer) interface. The value none means that the (FEC) function is disabled. 1D
means that the 1D form of Forward Error Correction (FEC) is used (column FEC) to this
interface. 2D means that the 2D form of FEC is used (column + row FEC) to this
interface.



Element Manager User's Manual Trunks 163

2013 Net Insight AB, All rights reserved
10.4.11 Advanced variables
The advanced variables are the variables that are presented on the advanced configuration
page of the IP trunk.



Figure 162. Advanced IP Trunk configuration page with (configurable) parameters and
(displayed) variables.
10.4.11.1 Mean RX data packet interval
Type: real (s)
Description: The mean (i.e. not average) time interval between received packets. The
value is found from a measurement consisting of 100000 measurement points, which takes
typically four minutes. As soon as one measurement is finished, another is initiated.

Element Manager User's Manual Trunks 164

2013 Net Insight AB, All rights reserved
10.4.11.2 Path delay variation (RMS) (s)
Type: real number
Description: The RMS (root mean square) value of the path delay variation i.e. standard
deviation value of the IP path delay (s). The value is found from a measurement consisting
of 100000 samples, which takes about fifteen minutes (100 samples/s). As soon as one
measurement is finished, another is initiated.

10.4.11.3 Path delay variation (p-t-p) (s)
Type: real number
Description: The peak-to-peak value of the IP path delay (s). The value is found from a
measurement consisting of 100000 measurement points, which takes typically four minutes.
As soon as one measurement is finished, another is initiated.

10.4.11.4 Path delay variation (99.9%) (s)
Type: real number
Description: The 99.9% IP path delay variation value (s). The value is found from a
measurement consisting of 100000 measurement points, which takes typically four minutes.
As soon as one measurement is finished, another is initiated.

10.4.11.5 Peer abilities, Max Rx slots
Type: integer
Description: The maximum amount of slots that the remote (peer) IP trunk interface can
accommodate. If the parameter Tx slots exceed this value, an alarm is raised and the trunk
connection cannot be established.

10.4.11.6 Peer abilities, Max Receive Mode
Type: text string
Description: The highest FEC Max Receive Mode that is possible on the interface, where
the FEC Receive Mode is classed as none (lowest), 1D or 2D (highest).

10.4.11.7 Peer abilities, Min Receive rows
Type: integer
Description: The lowest FEC Receive rows that is possible on the interface.

10.4.11.8 Peer abilities, Max Receive rows
Type: integer
Description: The highest FEC Receive rows that is possible on the interface.



Element Manager User's Manual Trunks 165

2013 Net Insight AB, All rights reserved
10.4.11.9 Peer abilities, Min Receive columns
Type: integer
Description: The lowest FEC Receive column that is possible on the interface.

10.4.11.10 Peer abilities, Max Receive columns
Type: integer
Description: The highest FEC Receive column that is possible on the interface.

10.4.11.11 Peer abilities, Max Receive elements
Type: integer
Description: The maximum number of Data Elements in the receive side FEC matrix that
is supported by the remote (peer) interface.

10.4.12 Alarm configuration page variables
Variables presented on the alarms configuration IP trunk web page are presented below.

Element Manager User's Manual Trunks 166

2013 Net Insight AB, All rights reserved

Figure 163. Alarms IP Trunk configuration page with (configurable) parameters and
(displayed) variables.
10.4.12.1 Sync signal status
Type: One of normal, degraded or failed
Description: The status of the sync signal regenerated from the IP trunk.

10.4.13 Alarms
The IP trunk alarms are also presented on the IP trunk alarms configuration page. Below,
the different alarms are presented and described.

Element Manager User's Manual Trunks 167

2013 Net Insight AB, All rights reserved


Figure 164. IP Trunk alarms
The listing of alarms, made in the web browser on the IP interface configuration page,
indicates for a selection of alarms if they are active or not. For alarms that are not active,
the text No Alarm is displayed on a green background. For alarms that are active, the text
Alarm is displayed on a background color associated with the severity of the alarm. For
example, an alarm with severity critical is displayed on a red background and an alarm with
severity warning is displayed on a cyan colored background. The listed alarms are:
10.4.13.1 Unequipped (UNEQ)
Description: This alarm is received when the signal on the receive interface is missing.
Severity: Minor

10.4.13.2 Loss of signal (LOS)
Description: This alarm is received when the signal on the receive interface is missing.
Severity: Critical

10.4.13.3 Loss of frame (LOF)
Description: This alarm is received when the frame on the incoming signal cannot be
properly aligned.
Severity: Critical

10.4.13.4 Loss of pointer (LOP)
Description: This alarm is received when the pointer of the incoming signal is missing
(Bad alignment of DTM frames).
Severity: Critical



Element Manager User's Manual Trunks 168

2013 Net Insight AB, All rights reserved
10.4.13.5 Loss of multiframe (LOM)
Description: This alarm is received when the FEC matrix on the incoming signal cannot
be aligned.
Severity: Minor

10.4.13.6 Remote Defect Indication (RDI)
Description: This alarm is received when a defect is detected by downstream equipment.
Severity: Warning

10.4.13.7 Degraded signal (DEG)
Description: This alarm is received when the signal on the IP network interface is
degraded.
Severity: Critical

10.4.13.8 Tx not established (TNE)
Description: This alarm is received when Tx path between the nodes cannot be
established.
Severity: Critical

10.4.13.9 Rx not established (RNE)
Description: This alarm is received when Rx path between the nodes cannot be
established.
Severity: Critical

10.4.13.10 ICMP
Description: This alarm is generated when the node receives an ICMP error message. The
text can be one of: Redirect, Target unreachable, Source quench or Parameter
problem depending on the problem, when the signal on the receive interface is missing or
misread.
Severity: Warning
10.5 Ports used by IP trunk
In the table, the UDP ports used by the IP/Ethernet trunk are defined.

UDP port IP/Ethernet trunk Protocol
1024 DPP-IP
1025 DPCP-IP
Figure 165. UDP port usage by IP/Ethernet trunk protocols

Element Manager User's Manual Trunks 169

2013 Net Insight AB, All rights reserved
10.6 Statistics
10.6.1 General
In order to view the different statistical counters, follow the proper link. The statistical
measures have been divided into DPP-IP counters available from the TrunksTrunk
InterfacesInterface nameStatistics link and Ethernet/IP counters available from the
Ethernet InterfacesInterface name Statistics link (display of all counters).
Statistics is available on two separate levels for the IP trunk. One level is the underlying
Ethernet/IP layer and one level is the DPP-IP Trunk level. In this description the available
counters are described in separate sections.
DPP-IP counters are found under the Statistics tab on the specific web page for the IP trunk
interface (Trunks Trunk interfaces Specific trunk, like ipt-1:2).


Figure 166. IP Trunk statistics


Element Manager User's Manual Trunks 170

2013 Net Insight AB, All rights reserved
10.6.2 Overview statistics
For the IP trunks, there is also an overview web page for sent and received packets on all
interfaces. This page is found under Trunks Trunk Interfaces link. On this page, the
Statistics link should be followed.

Figure 167. Overview trunk interface statistics
10.6.3 DPP-IP Trunk level statistics

Figure 168. Relationship between the various DPP-IP counters
10.6.3.1 dppipDeliveredFrames
Description: The total number of DPP-IP frames that have been received and delivered to
the DTM interface.

dppIp
MissingFrame
dppIp
LostFrame
dppIp
RecoveredFrame
dppIp
ReorderedFrame
dppIp
DeliveredFrame
dppIp
DuplicateFrame
dppIp
ReceivedFrame
dppIp
DroppedFrame
dppIp
SentFrame

Element Manager User's Manual Trunks 171

2013 Net Insight AB, All rights reserved
10.6.3.2 dppipDroppedFrames
Description: The number of DPP-IP frames that have been received and have not been
delivered since the interface was unable to align its data into the DTM trunk stream.

10.6.3.3 dppipDuplicateFrames
Description: The number of DPP-IP frames that were received with a sequence number
of an already processed DPP-IP frame.
10.6.3.4 dppipLostFrames
Description: The number of missing DPP-IP data frames that could not be delivered to
the DTM interface. dppipLostFrames only counts data frames.

10.6.3.5 dppipMissingFrames
Description: The number of DPP-IP frames that were missing in the frame sequence, i.e.
the expected sequence number was not found in the DPP-IP framing buffer.
dppipMissingFrames counts all frames, including non-data frames like FEC frames etc.

10.6.3.6 dppipReceivedFrames
Description: The total number of DPP-IP frames that have been received.
dppipReceivedFrames is the total number of received frames, including FEC frames etc.

10.6.3.7 dppipRecoveredFrames
Description: The number of missing DPP-IP data frames that were recovered by the FEC
procedure. dppipRecoveredFrames only counts data frames.

10.6.3.8 dppipReorderedFrames
Description: The number of DPP-IP frames that were received out of order, but could still
be aligned to the DPP-IP frame sequence.

10.6.3.9 dppipSentFrames
Description: The number of DPP-IP frames that were sent on the DTM interface.


10.6.4 Ethernet/IP level statistics
These statistical counters are specified in IETF RFC 1213 or IETF RFC 2819. In the web
interface, they are available from the Trunks Ethernet interfaces page. On this web page,
follow the specific interface and the Statistics tab.

Element Manager User's Manual Trunks 172

2013 Net Insight AB, All rights reserved

Figure 169. Ethernet interface statistics
The counters are standardized. Their meaning is described below.
10.6.4.1 etherStatsBroadcastPkts

Description: The total number of good packets received that were directed to the
broadcast address. Note that this does not include multicast packets.

10.6.4.2 etherStatsCollisions
Description: The best estimate of the total number of collisions on this Ethernet segment.


Element Manager User's Manual Trunks 173

2013 Net Insight AB, All rights reserved
10.6.4.3 etherStatsCRCAlignErrors
Description: The total number of packets received that had a length (excluding framing
bits, but including FCS octets) of between 64 and 1518 octets, inclusive. The packet had
either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or
a bad FCS with a non-integral number of octets (Alignment Error).

10.6.4.4 etherStatsDropEvents
Description: The total number of events in which packets were dropped by the probe
due to lack of resources. Note that this number is not necessarily the number of packets
dropped; it is just the number of times this condition has been detected.

10.6.4.5 etherStatsFragments
Description: The total number of packets received that were less than 64 octets in length
(excluding framing bits but including FCS octets) and had either a bad Frame Check
Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-
integral number of octets (Alignment Error).

10.6.4.6 etherStatsJabbers
Description: The total number of packets received that were longer than 1518 octets
(excluding framing bits, but including FCS octets), and had either a bad Frame Check
Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-
integral number of octets (Alignment Error).

10.6.4.7 etherStatsMulticastPkts
Description: The total number of good packets received that were directed to a multicast
address. Note that this number does not include packets directed to the broadcast address.

10.6.4.8 etherStatsOctets
Description: The total number of octets of data (including those in bad packets)
received on the network (excluding framing bits but including FCS octets).

10.6.4.9 etherStatsOversizePkts
The total number of packets received that were longer than 1518 octets (excluding framing
bits, but including FCS octets) and were otherwise well formed.

10.6.4.10 etherStatsPkts
Description: The total number of packets (including bad packets, broadcast packets, and
multicast packets) received.


Element Manager User's Manual Trunks 174

2013 Net Insight AB, All rights reserved
10.6.4.11 etherStatsPkts1024To1518Octets
Description: The total number of packets (including bad packets) received that were
between 1024 and 1518 octets in length inclusive (excluding framing bits but including
FCS octets).

10.6.4.12 etherStatsPkts128To255Octets
Description: The total number of packets (including bad packets) received that were
between 128 and 255 octets in length inclusive (excluding framing bits but including FCS
octets).

10.6.4.13 etherStatsPkts1519ToMaxSizeOctets
Description: The total number of packets (including bad packets) received that were
between 1519 and the highest allowed frame size.

10.6.4.14 etherStatsPkts256To511Octets
Description: The total number of packets (including bad packets) received that were
between 256 and 511 octets in length inclusive (excluding framing bits but including FCS
octets).

10.6.4.15 etherStatsPkts512To1023Octets
Description: The total number of packets (including bad packets) received that were
between 512 and 1023 octets in length inclusive (excluding framing bits but including FCS
octets).

10.6.4.16 etherStatsPkts64Octets
Description: The total number of packets (including bad packets) received that were 64
octets in length (excluding framing bits but including FCS octets).

10.6.4.17 etherStatsPkts65To127Octets
Description: The total number of packets (including bad packets) received that were
between 65 and 127 octets in length inclusive (excluding framing bits but including FCS
octets).

10.6.4.18 etherStatsUndersizePkts
Description: The total number of packets received that were less than 64 octets long
(excluding framing bits, but including FCS octets) and were otherwise well formed.


Element Manager User's Manual Trunks 175

2013 Net Insight AB, All rights reserved
10.6.4.19 ifInDiscards
Description: The number of inbound packets which were chosen to be discarded even
though no errors had been detected to prevent their being deliverable to a higher-layer
protocol. One possible reason for discarding such a packet could be to free buffer space.

10.6.4.20 ifInErrors
Description: The number of inbound packets that contained errors preventing them from
being deliverable to a higher-layer protocol.

10.6.4.21 ifInNUcastPkts
Description: The number of packets, delivered by this sub-layer to a higher (sub-) layer,
which were addressed to a multicast or broadcast address at this sub-layer.
10.6.4.22 ifInOctets
Description: The total number of octets received on the interface, including framing
characters.

10.6.4.23 ifInUcastPkts
Description: The number of packets, delivered by this sub-layer to a higher sub-layer,
which were not addressed to a multicast or broadcast address at this sub-layer.

10.6.4.24 IfInUnknownProtos
Description: The number of packets received via the interface, which were discarded
because of an unknown or unsupported protocol.

10.6.4.25 IfOutDiscards
Description: The number of outbound packets which were chosen to be discarded even
though no errors had been detected to prevent their being transmitted. One possible reason
for discarding such a packet could be to free buffer space.

10.6.4.26 IfOutErrors
Description: The number of outbound packets that could not be transmitted because of
errors.

10.6.4.27 IfOutNUcastPkts
Description: The total number of packets that higher-level protocols have requested to be
transmitted to a non-unicast (i.e., a subnetwork-broadcast or subnetwork-multicast) address,
including those that were discarded or not sent.


Element Manager User's Manual Trunks 176

2013 Net Insight AB, All rights reserved
10.6.4.28 IfOutOctets
Description: The total number of octets transmitted out of the interface, including
framing characters.

10.6.4.29 IfOutUcastPkts
Description: The total number of packets that higher-level protocols requested be
transmitted, and which were not addressed to a multicast or broadcast address at this sub-
layer, including those that were discarded or not sent.

10.6.5 Forward error correction
In order to configure the basic parameters of forward error correction, FEC transmit mode
must be set. This variable has three possible values: none, 1D or 2D. None means that
the FEC function is disabled. 1D or 2D indicates that one or two parity checks are made, as
described below.
The FEC matrix, defined by FEC, transmit rows and FEC, transmit columns parameters
can have one or two sets of parity sums. These parity sums are data packets of the same size
as the data packets in the matrix. The packet size is defined by the MTU parameter, which
is an integer in the range 105-1500 (default 1500). To create the 1D parity sum packet, bits
of the same position in all packets in one column are added and divided modulo-2. In the
example below, for the first bit of the 1D parity check sum of the first column, 1+0+1=2,
which is congruent with 0 (modulo-2). In other words, the parity check sum in an even
number. This is true for the second, third and forth bits as well in this example.
For 2D FEC mode, corresponding check sums are formed for both the row and the column.
In this case, the column check sums are used first to correct erroneous packets. After this
operation is finished, a second correction is made with the row check sums. With this
method, it is sometimes (but not always) possible to correct dual faults in one row or
column.
Observe that the size of the packets in the illustration below is kept well below the real
minimum packet size (64 octets), to improve clarity.
2D FEC is only possible between Nimbra 600 nodes. Between Nimbra 600 and Nimbra 300
nodes, 1D FEC is possibly. Capabilities in the nodes are always displayed in the web
interface.


Element Manager User's Manual Trunks 177

2013 Net Insight AB, All rights reserved

Figure 170. Structure of the FEC matrix for FEC Modes 1D and 2D.
1
1 3 2 4 Parity 5
2
3
Parity
1101 0100 1001 0001 1000 1001
0010 0111 0000 1101 0000 1000
1111 1011 1101 0110 1110 0001
0000 1000 0100 1010 0000
2D mode
1
1 3 2 4 5
2
3
Parity
1101 0100 1001 0001 1001
0010 0111 0000 1101 1000
1111 1011 1101 0110 0001
0000 1000 0100 1010 0000
1D mode

Element Manager User's Manual Sync and Time Transfer 178

2013 Net Insight AB, All rights reserved
11 Sync and Time Transfer
11.1 General
This chapter describes the synchronization principles of DTM networks (ETSI ES 201
803). While many aspects of network synchronization principles is similar to what is found
in SDH/SONET networks, DTM has introduced some important new features in order to
achieve an automated and robust network synchronization. This extra functionality reduces
the burden of synchronization planning to a minimum and also reduces the risk for bad
configuration of the synchronization network.
DTM maintains its own synchronization mechanism that spans over the entire switched
DTM network layer, independent of lower layer transport. DTM is usually transported over
SDH/SONET, but it can also be transported over PDH (DS3/E3) or over IP/Ethernet (IP
Trunk).
The primary role of DTM network synchronization is to synchronize information carried in
DTM frames for switching. A secondary role is to maintain a timing quality level of the
transported signal that is required by the most demanding services, such as transport of
studio video content. The synchronization mechanism in Nimbra nodes addresses both
these issues.
11.2 DTM Synchronization distribution
The DTM synchronization architecture is based on DSYP, the network-wide
synchronization protocol, and node and interface synchronization.
All nodes in a network are synchronized to one or more reference source(s) in a master-
slave scheme. A source can be either node internal or external to the node. DTM links
transfer clock information automatically between nodes in the network, but they can be
manually disabled. This is configured on the DTM interface and is the configuration is
described in 9.2.1 Editing a DTM interface. All nodes have also an internal clock. If
external sources are missing, these internal clocks are used for synchronization. Unless the
network is very small, external sources should normally be used.
All clocks or synchronization sources can be assigned a priority number. According to the
definition made, the lower the priority number is, the higher the priority of the source is.
If two or more synchronization sources have equal and highest priority (i.e. lowest priority
number) in the network, the source that is used is the source attached to the node with
lowest MAC address. There is an exception to this and that is if the sources have priority 0.
In case there are two or more sync masters with the highest clock priority the Nimbra
network is synchronized by two or more sources. The individual nodes get as sync master
the node that is closest in terms of number of hops. In this way synchronization is
segmented and as a consequence there could be slips in DTM-frames between adjacent
nodes that have different synchronization masters. Users must ensure that phase deviations
are within limits and that frequency errors are insignificant (Primary Reference Clock, ITU-
T G.811)
The synchronization topology is a minimum spanning tree that is calculated by a node
distributed algorithm, which assures shortest path between synchronization source(s) and
the nodes. Furthermore, synchronization loops are eliminated.

Element Manager User's Manual Sync and Time Transfer 179

2013 Net Insight AB, All rights reserved
If a synchronization source fails, affected nodes enter hold-over mode until a new spanning
tree has been calculated for back-up synchronization sources. This takes at most a couple of
seconds. In hold-over mode, phase and frequency continuity is maintained.
11.2.1 The DSYP Protocol
DSYP, the DTM Synchronization Protocol, is a protocol that exchanges synchronization
information between nodes of the network. The protocol data unit that is exchanged
contains information about sync masters (Node ID, priority level, number of nodes
traversed).
All nodes exchange synchronization information with its neighbors. Based on this
information, a distributed algorithm (Bellman-Ford) calculates a minimum spanning tree
that ensures that each node in the network is synchronized to the synchronization source
with highest priority. If the active master fails, the network automatically synchronizes to
the next clock in the priority list. If two clocks, internal or external, have the same priority,
the one with lowest node ID (MAC address) is used.
Different node types have different quality of their node clocks. This is the reason why they
have different default internal clock priorities. Running the network without an external
clock reference may be adequate for certain applications, but it is strongly recommended to
have at least one primary and one secondary (backup) external reference synchronization
source.

Figure 171. Synchronization of a DTM network. During fault free operation, the network is
synchronized to the external reference (clock 0). A minimal spanning tree is
built from this clock to all other nodes. When it fails, the network is
synchronized to the backup synchronization source (clock 1).


Element Manager User's Manual Sync and Time Transfer 180

2013 Net Insight AB, All rights reserved

Figure 172. A fault on the leftmost link will automatically result in a new minimal
spanning tree from sync master 0. During recalculation of the spanning tree,
the involved node (in this case the lower left node) is in holdover mode.
11.2.2 The node synchronization function
The node synchronization function coordinates all synchronization tasks that are local to
the node. Among these are
Selection of node synchronization source (as ordered by DSYP)
Smoothing of the synchronization signal
Distribution of the smoothed signal to all outgoing trunk interfaces
Providing a hold-over mode in case of lost synchronization source
Ensuring phase continuity when changing sync source
Supervision of available sync sources
In all releases up to GX4.7, synchronization information is carried automatically over the
DTM interface and DTM layer. On the receiving side of the link, there is always a
synchronization signal to regenerate from the link. The synchronization signal selected by
the node is then the signal with lowest priority number, obtained from any of the links.
A feature, included from system software release GX4.7, is synchronization enable/disable
on DTM-interfaces. By default, this parameter is enabled on all DTM interfaces, but now it
is possible for the user to manually disable the incoming DTM synchronization, per
interface. The usage of this feature is in cases where the synchronization information of a
particular DTM interface is unreliable and should not, under any circumstances, be used at
the receiving node as sync source. As a consequence, the incoming disabled sync route is
not propagated to other nodes in the network from the node with the disabled interface.

Element Manager User's Manual Sync and Time Transfer 181

2013 Net Insight AB, All rights reserved

Figure 173. By deselecting Allow as sync source, the user selects not to extract
synchronization information from the DTM interface. The clock is not
distributed further in the DTM network.
Smoothing of the sync signal is done with a digital phase-locked loop (PLL) that smoothes
out jitter from for example pointer justifications on the SDH/SONET layer. This signal is
then distributed to all outgoing trunk interfaces and all outgoing frames are aligned and
synchronized with this signal.
If the node sync function detects that the current sync source is unavailable, the node enters
hold-over mode. In hold-over mode, the node sync signal is obtained from the built-in
oscillator, which is adjusted to the average of the frequency of the sync signal over a certain
time before the fault. The time spent in hold-over mode before a new sync source is found,
is in general much shorter than in traditional SDH/SONET networks. Consequently, phase
drift and wander associated with it, is in general not of importance.
When DSYP orders a new sync source, the node sync function must ensure that the
outgoing phase is undisturbed. This is done by adding, to the new sync source, an amount
of phase corresponding to the difference between the new sync sources and the node sync
signal. This makes the outgoing sync signal transparent to sync changes.
The node sync function also monitors and maintains the available sync sources.

Element Manager User's Manual Sync and Time Transfer 182

2013 Net Insight AB, All rights reserved
The same fundamental concepts are kept for providing sync over an IP/MPLS/Ethernet
network, but the methods for recovering the sync signals are adjusted to handle the higher
levels of jitter and wander associated with a packet based transport.
11.3 Synchronization sources and priority
All synchronization sources in a DTM network have a priority. The scale of the priorities is
0-15, but contrary to what can be expected, lower priority number means higher priority.
Priority 0 is the highest priority and priority 15 the lowest.
A Nimbra node has three possible types of sync sources, which are selected by the DSYP
protocol. The source types are external reference clocks attached to a Sync In port,
extracted sync sources from DTM links and internal node clocks. Their relative importance
is typically in this order, but the extracted clock gets its priority from the origin of the sync
source arriving on the link, i.e. the external or internal clock used as its sync master.
The most common sync source for a node is an incoming signal from a trunk interface. The
extracted clocks on all incoming DTM links are normally always used as (possible) sync
sources, but they can be individually disabled in the web interface. The built-in node clock
is typically only used if there is no external reference clock in the network.
When the network is physically divided into two or more parts by a node or link failure, the
parts are synchronized independently with separate master sources. This case essentially
means that the network has been split into two or more separate networks and when the
connectivity is restored synchronization is re-established. There is one exception to this
rule, and that is if two or more external synchronization sources are attached to nodes in the
network.
Since the DTM network is synchronous, there is normally only one sync master active in
the network at any given time. In fact, in all releases prior to GX4.8, there is only one
allowed synchronization source. In GX4.8, multiple sync masters with priority 0 are
allowed. If such synchronization segmentation is used, it is necessary that the sync sources
are really synchronous by means external to the network.
11.3.1 Default internal synchronization priority
Every DTM node has its own clock or synchronization source. From system software
release GX4.8, the internal node clock has a default priority depending on the node type. In
addition, the internal node clock priority is configurable, making it possible to set the node
clock priority to any value from 4 to 15.
The default clock priority for Nimbra nodes are detailed below.

Nimbra node Default clock priority
Nimbra 360 GOLD 13
Nimbra 310, 320, 340, 340-HD, 360, 380 and 600 series 14
Nimbra One 15
Figure 174. Default internal node clock priority
11.3.2 Clock priority mapping in GX4.8
Because external clocks could have a configured priority of 13 or 14 in GX-versions before
GX4.8 and any usage of these priorities must have been for external clock as the internal
clocks could not be configured (they were hard set to priority level 15), priority levels 13

Element Manager User's Manual Sync and Time Transfer 183

2013 Net Insight AB, All rights reserved
and 14 are mapped to other priority levels in GX4.8 and later releases. In the table, the
mapping is detailed.
The reason behind this mapping is that priorities 13 and in particular 14, the old default
external clock priority, are now used as new internal default priority levels. As a defined
priority level, they should (normally) remain higher in priority than any node internal
clocks. When changing to GX4.8, no external clock sources should have priority level 11 or
12 as they would get a lower priority than sources with priority level 13 or 14. For more
precise instructions, please see the release notes.

Clock priority level before
GX4.8
Clock priority level in GX4.8
and later releases
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
8 8
9 9
10 10
11 11
12 12
13 11
14 (default for external clocks) 12
15 (used for all internal clocks) 15
Figure 175. Clock priority level mapping from previous GX-versions to GX4.8 and later
releases
11.3.3 Synchronization source extracted from DTM links
From all incoming DTM links, the synchronization signal is extracted by the node. The
signal is extracted from the DTM frame start and has a frequency of 8 kHz. In the
IP/Ethernet trunk the frame sync signal is encoded as a time-stamp in the DPP-IP overhead
in the IP/UDP packet.
By default, all extracted clocks can potentially be used by the node as a synchronization
source. It is possible to disable this feature by removing the tick on the DTM Interfaces
web page on a link by link basis. In this manner it is possible to tailor the sync distribution
and only use reliable links to transfer (allowed) synchronization sources.
The priority of these clocks/synchronization sources is transferred from the clock source via
DSYP.
11.3.4 External clocks
There are ways to attach external clocks (synchronization sources) to all Nimbra nodes.
How this is done differs between the different nodes, but the node specific configuration is

Element Manager User's Manual Sync and Time Transfer 184

2013 Net Insight AB, All rights reserved
made from the link Ext. clock Interfaces in all cases. In Nimbra 680, there is no web
interface to configure an external clock.
11.4 Configuration of external clocks
11.4.1 Nimbra One
Configuration of the external clock in Nimbra One is not recommended to carry out from
the web. If you still do, you need to make sure that you have enough amplitude of a square
wave signal. In Nimbra One nodes, one external clock interface (to configure) is available
from the link Ext Clock Interfaces. The external clock source is attached to the front of
the node controller (leftmost module) with an SMB connector (75 ). To emphasize, it is
not recommended to use the Nimbra One as a synchronization source, as the quality of its
internal node clock is not sufficient for the network.

Figure 176. Configuration of the clock interface sqc-1:1 in Nimbra One. It is configured to
send out a 2048 kHz signal.
11.4.2 Nimbra 340/340-HD
In Nimbra 340 nodes, one external sync interface is available. The external clock source is
attached to the front of the node with a BNC connector (75 ). This is the only available
clock interface for Nimbra 340. The clock is configured in the web interface.

Element Manager User's Manual Sync and Time Transfer 185

2013 Net Insight AB, All rights reserved

Figure 177. Configuration of sqc-1 in Nimbra 340.
The parameters for Nimbra One and Nimbra 340 are:
11.4.2.1 Direction
Default value: In + Out
Type: One of In + Out, In, Out
Range: In + Out, In, Out
Description: Active direction for the external synchronization clocks. In + Out means
that both in- and output interfaces are enabled, In means that only the input interface is
enabled and Out means that only the output interface is enabled.

11.4.2.2 Output frequency
Default value: 2048 kHz
Type: One of 8 kHz, 1544 kHz and 2048 kHz.
Range: 8 kHz, 1544 kHz or 2048 kHz
Description: This is the frequency delivered to the external sync output when it is
enabled, i.e. when the parameter Direction is either In + Out or Out.

11.4.2.3 Clear defects
Default value: Unticked
Type: Checkbox
Range: Ticked, unticked
Description: In order to remove all old defects to be displayed on this web page, this tick
box is selected and the OK or Apply button are clicked. This triggers a fresh reading of
active defects.


Element Manager User's Manual

2013 Net Insight AB, All rights reserved
11.4.3 Nimbra 360 and 380
In Nimbra 360 and 380
sqc-2. On the physical node, they can be found at the lower right side, with notations TSI
(sqc-1) and TSI-2 (sqc
Figure 178. Nimbra 360 front. The sync interfaces are found at the lower righ
Nimbra 380 is identical to Nimbra 360 with respect to TSI
2).
Configuration of TSI-
possible values none or
transformed to a regular external clock interface of the same type as on Nimbra 340/Nimbra
One.
Figure 179. Nimbra 360 with TSI
equal to None
and sync out ports.
The sqc-1 interface for Nimbra
interface in Nimbra One/340. There are some additional parameters to configure.

Sync and Time Transfer
2013 Net Insight AB, All rights reserved
360 and 380
360 and 380 nodes, there are two different external clock interfaces, sqc
2. On the physical node, they can be found at the lower right side, with notations TSI
2 (sqc-2).
Nimbra 360 front. The sync interfaces are found at the lower right side.
Nimbra 380 is identical to Nimbra 360 with respect to TSI-1/TSI-2 (sqc
-1/sqc-1 includes one parameter, time dual frequency mode, wi
possible values none or PPS + 10 MHz. With the parameter set to none, the port
transformed to a regular external clock interface of the same type as on Nimbra 340/Nimbra
Nimbra 360 with TSI-1/sqc-1 configured with Time Dual Frequency Mode
equal to None, i.e. the two ports of the interface are used as regular sync in
ync out ports.
1 interface for Nimbra 360/380 looks a bit different from the corresponding
interface in Nimbra One/340. There are some additional parameters to configure.
In Out
Sync and Time Transfer 186
nodes, there are two different external clock interfaces, sqc-1 and
2. On the physical node, they can be found at the lower right side, with notations TSI-1

t side.
2 (sqc-1/sqc-
1 includes one parameter, time dual frequency mode, with
PPS + 10 MHz. With the parameter set to none, the port is
transformed to a regular external clock interface of the same type as on Nimbra 340/Nimbra

1 configured with Time Dual Frequency Mode
, i.e. the two ports of the interface are used as regular sync in
looks a bit different from the corresponding
interface in Nimbra One/340. There are some additional parameters to configure.

Element Manager User's Manual Sync and Time Transfer 187

2013 Net Insight AB, All rights reserved

Figure 180. Configuration of sqc-1/TSI-1 of Nimbra 360/380 with Time dual frequency
mode set to none.
When Time Dual Frequency Mode is set to none, the parameters to configure are the
same as for the Nimbra One/340 case. The parameter Time input offset is irrelevant for
Time Dual Frequency Mode is set to none and is grayed out in the web interface. Time
input offset is a calibration factor for the time it takes for the clock signal to reach the
Nimbra 360/380 node (from its source), but it is only relevant for Time Dual Frequency
Mode set to PPS + 10 MHz, described in next section. Square sync signals of 1544 kHz or
2048 kHz are automatically recognized by the node (According to ITU-T G.703-13).
When Time Dual Frequency Mode is set to PPS + 10 MHz, TSI-1 expects to receive two
signals: one PPS (pulse per second) on the PPS port and one 10 MHz signal on the Sync
port if the Direction parameter is set to In. If the parameter is set to Out these signals are
sent to the ports. Selecting the clear defects box and clicking on OK or Apply makes a new
reading of the defects.
If one or both expected signals are missing or of poor quality, it can be deducted from the
web interface where the problem is. It is sufficient to look at Input frequency and Defects.
Unless the node identifies two acceptable signals, the signal is not recognized as an external
sync source and not used by the network. This can be seen on the Ext. clocks Interfaces
web page.

Input frequency
(MHz)
Defects Interpretation
0 Loss of signal, Signal
Frequency Error, PPS
(Loss of Signal)
PPS and 10MHz are faulty
or not attached
10 OK, PPS(Loss of
Signal)
PPS is faulty/not attached,
but 10 MHz is OK
PPS Loss of Signal, Signal
Frequency Error
PPS is OK, but 10 MHz is
faulty/not attached
PPS+10MHz OK Both PPS+10Mhz are OK
Figure 181. The four different ways of connecting PPS and 10 MHz to the TSI interface.
Under normal time transfer operation, PPS should always be attached.

Element Manager User's Manual Sync and Time Transfer 188

2013 Net Insight AB, All rights reserved
The web page for the case where no PPS is attached but 10 MHz is attached is shown
below.


Figure 182. Defect presented on the sqc-1 web page.


Figure 183. Configuration of sqc-1/TSI-1 of Nimbra 310/320/360/380 with Time dual
frequency mode set to PPS+10 MHz. Note that as the direction is In, the
parameter Output frequency is not used and is grayed out.

Element Manager User's Manual Sync and Time Transfer 189

2013 Net Insight AB, All rights reserved
The one remaining parameter to configure is Time input offset. This parameter is to
compensate the transit time from source to Nimbra 310/320/360/380 of the PPS signal.
The other interface on Nimbra 360/380, TSI-2/sqc-2, can be used as an output interface
with time dual frequency mode set to PPS+10 MHz. In this case, some additional
parameters can also be configured. This interface is absent on Nimbra 310/320.

Figure 184. Configuration of sqc-2/TSI-2 of Nimbra 360/380 with Time dual frequency
mode set to PPS+10 MHz.
The parameters to configure, in addition to time dual frequency mode, are:

11.4.3.1 Output frequency (kHz)

Default value: 2048 kHz
Type: one of three values, real
Range: 8 kHz, 1544kHz, 2048 kHz
Description: This is the frequency delivered to the Out port when the interface is in sync
mode, i.e. when Time dual frequency mode is set to None. The parameter can be set
independently on both configurable ports.



Element Manager User's Manual Sync and Time Transfer 190

2013 Net Insight AB, All rights reserved
11.4.3.2 Time output offset
Default value: 0 ns
Type: real value, unit ns
Range: -999999999 to +999999999
Description: This is delay from the Nimbra 360/380 to the destination of the sync signal.
The parameter cannot be set independently on both configurable ports.
11.4.3.3 PPS output pulse width
Default value: 20 s
Type: real value, unit s
Range: 0.1-999999.9
Description: This is the pulse width of the PPS output pulse, configurable in steps of 0.1
s.

11.4.3.4 Time output deviation realignment limit
Default value: 2000 ns
Type: real value, unit ns
Range: 0-999999999
Description: If the deviation between the node internal time and the time derived from
the PPS + 10 MHz pair (displayed) exceeds this setting, an alarm is generated.

11.4.3.5 Time output deviation reassignment limit
Default value: 62500 ns
Type: real value, unit ns
Range: 0-999999999
Description: If the deviation between the node internal time and the time derived from
the PPS + 10 MHz pair (displayed) exceeds this setting, the PPS/10 MHz pair is silently
squelched and reset to match the node internal time.

11.4.4 Nimbra 310 and 320
Nimbra 310/320 has one TSI/sqc interface, sqc-1, which can be used for in and output
signals. The interface can be used to input regular sync signals in the same way as Nimbra
360/380 and it accepts the same 1544 and 2048 kHz sync signals. Nimbra 310 or 320 can
also be used as an entry point for time transfer, the same way as Nimbra 360 or 380. It is
limited, though, by one interface for time transfer signals. The time transfer signal interface
pair (PPS + 10 MHz) can either be used for input or output.


Element Manager User's Manual Sync and Time Transfer 191

2013 Net Insight AB, All rights reserved

Figure 185. Nimbra 320 configurable TSI-1 interface
11.4.5 Nimbra 680
Nimbra 680 accepts 1544 kHz or 2048 kHz synchronization signals. They are attached to
the front of the switch modules and the frequency is automatically recognized. The external
clock source is attached to the front of the node with a BNC connector (75 ).
DSYP handles redundant switch modules in Nimbra 680 transparently to the operator. Both
modules lock to the selected synchronization reference signal and deliver a node
synchronization signal in phase with each other. At fail-over, the standby switch module
becomes active and its internal clock becomes the synchronization source of the node.
There is one operational aspect of having redundant switch modules in a Nimbra 680. If the
Nimbra 680 node receives an external synchronization signal, this signal must be delivered
to both switch modules. The external signal must be split and connected to both modules as
the node cannot use an external synchronization source connected only to the standby
switch module.

Figure 186. Configuration of external clock interface on Nimbra 600 systems.
The parameters to configure are:


- 48 VDC - 48 VDC
+ A - + B -
Nimbra 320
Reset Reset
Status Status Ethernet
Serial
- 48 VDC
Sync
Tx On
Status
PPS
Tx On
Status
TSI 1
1
Blind Panel 1
1 2
Rx Tx Rx Tx
155/622/2488 Mbps (SDH)
10/100/1000 Mbps (ETH)
- -
ETH
L/A 1 Sp L/A 2 Sp L/A 3 Sp L/A 4 Sp L/A 5 Sp L/A 6 Sp L/A 7 Sp L/A 8 Sp
Sync Out In
Time transfer in PPS In 10 MHz In
Time transfer out PPS Out 10 MHz Out

Element Manager User's Manual Sync and Time Transfer 192

2013 Net Insight AB, All rights reserved
11.4.5.1 Direction

Default value: In + Out
Type: one of three values; In, Out or In + Out
Range: In, Out or In + Out
Description: This is the configured direction of the sync signal. In means that the node
expects a signal on the Sync In port. Out means that the node generate a sync signal on
the Sync Out port. In + Out means that the node expects a signal on the Sync In port while
simultaneously delivering a signal to the Sync Out port.

11.4.5.2 Output frequency (kHz)

Default value: 2048 kHz
Type: one of three values, real
Range: 8 kHz, 1544kHz, 2048 kHz
Description: This is the frequency delivered to the Out port when Direction is set to either
Out or In+Out.

11.4.5.3 Clear defects

Default value: not selected
Type: binary
Range: selected, not selected
Description: Selecting this check box and clicking on the OK or apply button reads out
the defect status anew. This clears old defects that are no longer present.

11.4.6 Configuration of internal and external synchronization
sources
The external reference clock is configured on two separate web pages. They are found on
web pages DTM Sync and Ext clock Interfaces. The latter step has already been
discussed. The link DTM Sync shows the following configuration page.


Element Manager User's Manual Sync and Time Transfer 193

2013 Net Insight AB, All rights reserved

Figure 187. The Sync page where internal and external clock priority are configured.
The parameters to configure are:
11.4.6.1 Internal clock priority
Default value: Dependent on node type, 15 for Nimbra One, 14 for Nimbra 300 and 600
nodes expect Nimbra 360 GOLD which has default priority level 13.
Type: integer
Range: 4-15
Description: The lower the priority setting is, the higher the priority is. The
administrative status of the internal clock is not configurable and it is always Up.
11.4.6.2 External clock priority
Default value: 12
Type: integer
Range: 0-12
Description: The lower the priority setting is, the higher the priority is.
11.4.6.3 External clock admin status
Default value: Down
Type: binary
Range: Down or Up
Description: If the external clock administrative status is set to down, the clock cannot be
used by the network; if it is set to Up it is available to the network.
The variables presented on the page are:


Element Manager User's Manual Sync and Time Transfer 194

2013 Net Insight AB, All rights reserved
Variable Value Meaning
Sync oper. State
(Synchronization
operational state)
Up The node is synchronized
Pending The node is starting up
Down Error in sync function. If there is an error, it is
shown in the alarms list
Type Internal Node clock
External External, attached clock
Interface Clock extracted from DTM link
Id Interface Id
Current source yes The source is currently sync source for the node
no The source is currently not sync source for the
node
Backup source yes The source is currently a backup sync source for
the node, i.e. it can be used as a sync source
no The source is currently not a backup sync
source for the node
TR prio 0-15 Clock source priority, where a lower number
means a higher priority
Figure 188. Variables presented on the DTM Sync web page.
The web page shows the different synchronization sources and their status, as follows:
If the node has access to several clocks with the same priority, different from 0, the clock
originating from the node with the lowest Node Mac address becomes the active clock. If
there are two external clocks with priority 0, both are allowed as master sync sources and
the sync network is segmented. This case is described in the subsequent chapter.
11.5 DTM Synchronization segmentation
A novelty of GX4.8 is that it allows several network master synchronization sources. In
previous system release versions, only one clock could be the master of the network. In this
case, if several external clocks are used (in different nodes) with the same priority level, the
clock attached to the node with the lowest node MAC address becomes the sync master of
the network.
In GX4.8, this is also true for all clock priority levels of 1 and higher. For clock priority
setting 0, a new feature called synchronization segmentation is introduced. If multiple
clocks with priority level 0 are used, they have to be very much in tune. In practical cases,
GPS synchronization of all such sources is recommended.
In this case, i.e. with multiple external clocks all with priority 0, the nodes select as their
source the external clock with shortest distance in terms of number of hops. If the distance,
in terms of number of hops is equal, the sync source for the node is the clock that is
attached to the node with lowest MAC address.
In the illustration below, node 12 has a lower MAC address than node 2.

Element Manager User's Manual Sync and Time Transfer 195

2013 Net Insight AB, All rights reserved

Figure 189. Illustration of sync distribution in a case with two master sync sources, both
with priority 0. The nodes take their sync from the closest sync master. In case
the distance is equal, the sync source attached to the node with the lowest
MAC address is preferred.
11.6 Fault Indications synchronization alarms
There are no alarms directly associated to the external clock interfaces. Instead alarms are
handled through DSYP and Time Transfer objects in following way. Input faults, i.e. a
lacking or poor quality input synchronization input, generate a No external sync source
available alarm. More details can be viewed from the sqc interface web page.

Figure 190. The sqc-1 interface of node1, a Nimbra One node, details the defect (Loss of
(sync) signal).
node1
Nimbra One
node11
Nimbra One
Nimbra 360
node3
Nimbra 680
node10
Nimbra 340
node2
node4
Nimbra One
node14
Nimbra One
Nimbra 340
node12
Nimbra 680
node20
Nimbra 360
node13
Master clock, prio 0
Master clock, prio 0

Element Manager User's Manual Sync and Time Transfer 196

2013 Net Insight AB, All rights reserved
From Nimbra 310, 320, 360 and 380, Output faults of the time transfer signal
(PPS+10MHz) generate a Threshold crossed alarm. More details concerning faults can be
viewed as Defects from the web page of the relevant sqc interface.
On Nimbra 310, 320, 360 and 380, faults are also indicated by LED colors in following
ways. There are two indicator LEDs (Status and TxOn) per port (PPS and Sync) and one or
two interfaces (TSI-1/sqc-1 and TSI-2/sqc-2).

Figure 191. The LEDs on the two interfaces TSI-1/sqc-1 and TSI-2/sqc-2 on Nimbra
360/380. On Nimbra 310/320, only TSI-1/sqc-1 is available.

LED Tx On LED Status Description
Green Off Tx disabled
Green Green Tx enabled and transmitting error free
Green Red Unable to transmit requested signal
Off Off Rx disabled
Off Green Receiving error free
Off Flashing red Error and not Loss Of Signal
Off Red Loss Of Signal
Figure 192. Interpretation of LEDs for the synchronization/time transfer input ports. When
used as sync interface, the sync port is used for input and the PPS port for
(sync) output. When used as time transfer interface, both ports of the interface
(PPS and Sync) are either used as input or output.
Details on the faults described can be found by following the link Ext. Clocks Interfaces
and sqc-1 or sqc-2 depending on which clock is faulty.

Defect Description
Loss Of Signal (LOS) No input signal detected.
Loss Of Frame (LOF) Input signal not properly aligned to reference
clock. Most frequently caused by too large
frequency deviation between reference clock
and input signal (should probably be renamed
to something better).
Signal Frequency Mismatch (SFM) Input frequency does not match requirements
of operational mode (e.g. 2048kHz in
PPS+10Mhz operational mode).
Excessive Phase Deviation (EPD) Output realignment limit has been exceeded.
Loss Of Alignment (LOA) Output reassignment limit has been exceeded.
Ok No defect detected
Figure 193. Details of Defects of the squelchable clocks described above.

Element Manager User's Manual Sync and Time Transfer 197

2013 Net Insight AB, All rights reserved
On Nimbra 310 and 320, the TSI-2 interface described for Nimbra 360 and 380 is absent,
but the TSI-1 interface is present and has the same functionality.
11.7 DTM and transport layer synchronization
In a modern SDH/SONET/DTM network, the two synchronization mechanisms are co-
operating. DTM maintains its own overlay timing domain, which is governed by the
DTM synchronization reference clock. This timing domain controls and synchronizes the
transmission of the DTM frames, i.e. the VC-4 -Xc/STS-3Xc of the network. The frequency
difference between this domain and the various parts of the SDH/SONET network is
handled by pointer justifications in the SDH/SONET layer.
The synchronization protocol treats IP/Ethernet transport layer in the same way as a
SDH/SONET layer. An 8 kHz clock is transported over the underlying packet network and
recovered to become the node synchronization signal. Of course, the transport properties of
a packet based network are different from those of a synchronous or optical network. The
IP/Ethernet trunk has different mechanisms, like Forward Error Correction, to overcome
packet loss and jitter that are prevalent in the packet network.
11.7.1 Timing modes of SDH/Sonet trunks
The functionality of the Nimbra DTM interfaces with respect to SDH/SONET trunks is to
set a timing mode for the line interface. Each trunk interface support all or a sub-set (see
Figure 195) of the following timing modes:
Network timing: The line rate is synchronized to the DTM network frequency. This applies
to all new Nimbra One/300 trunks, 4 x DS3/E3 and all Nimbra 600 series trunks.
Interface timing: The line rate is synchronized to an on-board local oscillator. Applies to:
4xOC-3/STM-1 Trunk (NPS0009-X/3S31), OC-12/STM-4 Trunk and 4xOC-3/STM-1
Access for Nimbra One and 300 series.
Loop timing: The line rate is synchronized to the incoming line frequency. Applies to:
4xOC-3/STM-1 Trunk (NPS0009-X/3S31), OC-12/STM-4 Trunk and 4xOC-3/STM-1
Access for Nimbra One and 300 series.
In Interface timing mode, the line frequency is asynchronous to DTM Network timing and
pointer justifications are performed in the transmit direction in order synchronize the VC-4
-Xc/STS-3Xc to the line rate.
In Loop timing mode, the line frequency may be asynchronous to DTM network timing, but
it may also be synchronous if the SDH/SONET network is synchronized with the same
reference clock that is used by the DTM network. In this case, we have a fully synchronous
network, since we have then no pointer justifications at all. Otherwise, pointer justification
in the transmit direction applies as in the Interface mode described above.
Finally in Network timing mode, the line rate is synchronized to the DTM network
frequency and hence no pointer justifications are needed in the transmit direction. In this
case we can also have a fully synchronous SDH/SONET/DTM network if the same
reference clock is used for both SDH/SONET and DTM.
The IP/Ethernet trunk is timed in a way that is similar to the Network timing mode.
Note that when running in either Interface or Loop timing modes the trunks are not
intended for SDH/SONET synchronization; they are rather DNU (Do Not Use for
synchronization) clocks. This applies especially for the older trunk interfaces, the 1-port
OC-3/STM-1 and OC-12/STM-4 trunk, which have Stratum 4 clocks. The 4 x OC-3/STM-1
Trunk/Access Module has a Stratum 3 clock and can, if necessary, be used to source
synchronization to a SDH/SONET sub-net.

Element Manager User's Manual Sync and Time Transfer 198

2013 Net Insight AB, All rights reserved
Interfaces that support Network timing mode can be used to transport SDH/SONET
synchronization, provided that the network is synchronized by a suitable external reference
clock. This applies to the OC-48/STM-16 X-ADM and the 4 x DS3/E3 trunk modules.
11.7.2 Hold-over and free-running properties
A Nimbra switch is never in hold-over for longer than at maximum a couple of seconds.
This is by the design of the DTM synchronization mechanism. During this time, the clock
in hold-over mode obtains the network frequency as learned while in a synchronized state.
The effect of the residual frequency difference between the real network frequency and the
sourced frequency in the short hold-over time is about 0.1 ppm and is negligible due to the
short time the node is in hold-over mode. This residual frequency difference will cause a
phase ramp during holdover.
If the network does not have an external clock source, the network is synchronized to one
of the node internal clocks that is free-running. In this case, all other node-clocks are locked
to this internal clock, all network timing properties are also governed by this clock. This is
not an ideal situation and it is strongly recommended to use an external clock reference of
sufficient quality.
11.8 IP/Ethernet Trunk
The synchronization performance of the IP/Ethernet trunk is affected by the quality of the
IP connection. The more packet jitter, the more jitter/wander on the recovered sync signal.
The quality of the IP/Ethernet trunk can be monitored by inspecting the Synchronization
Signal Status. This Status has three values.
Normal Recovered node sync is of G.813 quality, i.e. of the same quality as given by a
SDH/Sonet equipment clock (ADM).
Degraded Recovered sync is not of G.813 quality, due to packet delay variations outside
what can be handled, but is still used. Performance degradation can be expected.
Failed Recovered sync is not usable, the node selects another synchronization source as
decided by the DSYP protocol. Frame slips can be expected.
Other performance indicators related to the synchronization signal recovery are available in
the Web GUI; Packet jitter delay variation, Peak-to-peak packet jitter, 99.9% percentile
packet delay variation and RMS packet jitter.
Time transfer is now available over certain IP Trunk links, between fixed interfaces in
Nimbra 300 nodes. This is described in the last section of this chapter (11.12 Time
Transfer).

Element Manager User's Manual Sync and Time Transfer 199

2013 Net Insight AB, All rights reserved
11.9 Configuration recommendations
11.9.1 External reference clocks - requirements
A strong general recommendation is to use an external reference clock with high accuracy
and stability. Some networks works perfectly well without an external reference clock
while other networks may function but with lower service quality. Some networks may fail
to operate completely without an external clock reference. In the table some suggestions are
listed:

External
reference
clock
needed?
Network contains Why?
Yes, must
have
Only Nimbra One with
OC-48/STM-16 X-ADM
or 2 x OC-12/STM-4
or 4 x OC-3/STM-1
or 4 x DS3/E3 Trunk

If there is no external reference clock, the network may
synchronize to a Nimbra One with a built-in Stratum 4
oscillator, and since the listed trunk supports only
network timing mode this may result in a line rate that
exceeds the 4.6 ppm SDH/SONET standard limits.
If several types of nodes are combined in the network,
this should not happen in GX4.8 as the nodes have an
internal clock priority according to the accuracy of the
clocks.
Yes,
preferred
SDI Video service This service has a very hard requirement on drift rate that
can only be guaranteed with a high stability clock
reference.
No None of the above OK for smaller networks with less requirements on
wander performance, such as for Ethernet transport for
example.
Figure 194. External clock recommendations.
The requirements on the external reference clock are:
High stability (preferably PRC/Stratum 1, which could be obtained from GPS)
2.048 MHz signal, according to ITU-T G.703.13, sine or square wave
1

Alternatively, a 1.544 MHz signal with the same electrical properties as the 2.048 MHz
clock described above may be used.


1
Note that 2.048/1.544 MHz signals shall be clock signals, i.e. sine or square wave.
The port does not support E1/DS1 framed signals. The external sync in port
automatically detects if a 2.048 or 1.544 MHz clock is attached.

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
Note:

Please note, D4, SF or ESF formatted T1 timing signals cannot be used
as synchronization source.
Nimbra 310, 320, 360 and 380
Redundant GPS controlled sources are preferable. If the primary reference clock goes
down, DSYP will switch over to a secondary reference clock
thus avoid a possible frame
configured as external sources with priority 0, to use synchronization network
segmentation.
It is recommended to connect the external reference clock to a centrally positioned
order to get as few hops as possible to

Note:

Regardless of external clock source, it must disable its output upon
error in order to signal to the network that the clock source has failed.
This may require configuration in th
supporting mute/squelch of outputs on detected errors are not
recommended since they have a high probability of causing large
network errors difficult to pinpoint to the timing source.

Note:

Nimbra One should not be used as a
square wave signals of high amplitude must be used.

Sync and Time Transfer
2013 Net Insight AB, All rights reserved
Please note, D4, SF or ESF formatted T1 timing signals cannot be used
as synchronization source.
360 and 380 can also use a 10 MHz signal as reference input.
Redundant GPS controlled sources are preferable. If the primary reference clock goes
down, DSYP will switch over to a secondary reference clock with the same frequency, and
possible frame-slip in the transition process. These excellent sources may be
configured as external sources with priority 0, to use synchronization network
ecommended to connect the external reference clock to a centrally positioned
order to get as few hops as possible to all or most nodes.
Regardless of external clock source, it must disable its output upon
error in order to signal to the network that the clock source has failed.
This may require configuration in the source. PRC sources not
supporting mute/squelch of outputs on detected errors are not
recommended since they have a high probability of causing large
network errors difficult to pinpoint to the timing source.
Nimbra One should not be used as a timing node. If still used, only
square wave signals of high amplitude must be used.
Sync and Time Transfer 200
10 MHz signal as reference input.
Redundant GPS controlled sources are preferable. If the primary reference clock goes
the same frequency, and
These excellent sources may be
ecommended to connect the external reference clock to a centrally positioned node, in

Element Manager User's Manual Sync and Time Transfer 201

2013 Net Insight AB, All rights reserved
11.9.2 Trunk interface configurations
Different trunk interfaces have different capabilities with respect to SDH/SONET
synchronization. In this section, the various interfaces are discussed and recommended
settings are given. Below is a table that summarizes capabilities and recommended settings.

Trunk interface Capabilities Choices Default Recommendation Comments
Nimbra One/300 series
4 x OC-3/STM-1
Trunk (-X/3S31)
Transmit sync
source
Interface
Loop
Interface Interface See 11.9.3.2
4 x OC-3/STM-1
Access
Transmit sync
source
Internal
Loop
Loop Loop
Internal =
Interface
Synchronization
Status message
(SSM)
0..15 15 15 15 = Do Not Use
4 x DS3/E3
Trunk/Access
used as trunk
Receive sync
(RX_FSYNC)
source
Line
FSP
Line
Line
FSP (if Time transfer
is used)
DS3: Line =
synchronized to
line signal
FSP =
synchronized to
Frame Start
Pattern
OC-12/STM-4
Trunk
Transmit sync
source
Interface
Loop
Interface Interface See 11.9.3.2
OC-3/STM-1
Trunk
Transmit sync
source
Interface
Loop
Interface Interface See 11.9.3.2
STM-1/4/16 See 11.9.3.1
3 x IP/Ethernet
Trunk
See 11.9.3.4
Nimbra 600 series
4 x OC-3/12/48 /
STM-1/4/16
Trunk
See 0
OC-192 / STM-64
Trunk
See 0
3 x IP/Ethernet See 0
Figure 195. Capabilities of Nimbra trunks
The parameter Allow as sync source, which was defined on the trunk configuration page
in GX4.7, has now been moved to the configuration page of the DTM interface.

Element Manager User's Manual Sync and Time Transfer 202

2013 Net Insight AB, All rights reserved
11.9.3 Trunks for Nimbra One/300
11.9.3.1 OC-48/STM-16 X-ADM, 2 x OC-12/STM-4 Trunk and 4 x OC-3/STM-1 Trunk
Module (NPS0009-X/3S32)
These modules only support Network sync mode, so there is no timing mode to configure.
Note that it is important that the network frequency is kept within 4.6 ppm in order to
comply with SDH/SONET standards. The on-board clock quality is of SEC/Stratum 3.

11.9.3.2 OC-12/STM-4 Trunk, 4 x OC-3/STM-1 Trunk/Access (NPS0009-X/3S31) and
OC-3/STM-1 Trunk Module
These modules support interface and loop timing modes. Default is interface timing mode
and this is also the recommended mode. Loop timing mode may be used when the trunk
interface is connected to SDH/SONET network that sources timing.
When two OC-3/STM-1 or OC-12/STM-4 trunks are directly connected with a fiber pair or
wavelength the following combinations exists:
Interface <-> Interface OK
Interface <-> Loop OK
Loop <-> Interface OK
Loop <-> Loop Not OK
The last combination would lead to a timing loop and possibly a fault.
The 4 x OC-3/STM-1 Trunk/Access Modules have SEC/Stratum 3 quality clocks, the
others is of Stratum 4 quality.
11.9.3.3 4 x DS3/E3 Trunk/Access Module
This module is always slaved to the network frequency and thus it has no timing
configuration options. The same external synchronization condition that applies to the OC-
48/STM-16 X-ADM also applies for this board.
FSP (Frame Sync Pattern) is required when the Time Transfer is used.
11.9.3.4 IP/Ethernet Trunk for Nimbra One/300 and built-in ports on Nimbra
310/320/360/380
This module has one option, Enable sync recovery, which is by default enabled. The option
may be disabled in e.g. the following cases.
Interconnection of two Nimbra networks via an IP/MPLS/Ethernet link.
If each of the two Nimbra networks is synchronized via a centralized external
synchronization source, it may be beneficial not to not transport the sync from one network
to the other over the IP connection but rather use two synchronization sources for the two
parts of the network. This requires that both external references are synchronized (for
example both references are tied to GPS clocks) to avoid slips.
Single Frequency networks (SFN).
When feeding transmitter sites with the IP/Ethernet trunks in an SFN use case, GPS clocks
are needed to provide time synchronization for SFN operation, since the IP/Ethernet trunk
does not support the Time Transfer functionality.


Element Manager User's Manual Sync and Time Transfer 203

2013 Net Insight AB, All rights reserved
11.9.3.5 All trunks for the Nimbra 600 series
These trunks have a parameter Allow as sync source on the DTM interfaces. By default, it
is selected, but by disabling synchronization distribution along certain trunks the user can
tailor the synchronization according to customer specific requirements. These trunks all use
Network timing mode.
11.10 Allow as sync source DTM configuration
On the DTM Interfaces web page, all DTM interfaces are configured, and it is also here
where you now can find the configuration parameter allow as sync source.
This parameter is by default selected, i.e. the synchronization signal extracted from the link
is available as sync source in the node. This behavior is the same as in GX4.7 and earlier.
Removing this selection is the new feature in GX4.8.

Figure 196. Allow as sync source is defined on the DTM interface.
11.11 Monitoring synchronization performance
11.11.1 Slip Seconds
The single most important tool for monitoring the synchronization performance is to
inspect the Slip Seconds (SS) performance counters. These counters indicate if there have
been one or more DTM frame slips during a second. This could hypothetically happen if
node sync, for some faulty reason, is not synchronized to a trunk interface that is part of the
synchronization spanning tree. Then it will pace out frames at another frequency than the
network frequency. This should never happen. The counters are found in the Web GUI
under Perf. Monitor Trunks
These should always indicate 0. Anything else indicates a serious problem. During
extreme conditions, such as changing to a new reference source with another frequency, or

Element Manager User's Manual Sync and Time Transfer 204

2013 Net Insight AB, All rights reserved
if there has been very many sync changes (due to many intermittent topology changes for
example) the slip counter may step one count. In former case due to that all phase relations
are altered when the network frequency changes. In the latter case due to accumulated
residual phase errors in the synchronization source change process. However, in steady
state there should be no slips if the network synchronization works alright.
It is also possible to trigger an alarm, by enabling a threshold crossing alarm. Use a
threshold of 1 in order to be sure to catch a single slip.
11.11.2 Pointer Justification Events
Pointer Justification Events (PJE) at SDH/SONET interfaces are available for monitoring.
There are counters for
RPJE +
RPJE
TPJE +
TPJE -

on the Trunks Interfaces web page. These counters are reset each time the web page is
accessed. (Note that if several users are logged in, it may be reset of another user accessing
the page). These counters give information about the difference between the line rate of the
interface and the DTM network frequency. For interfaces in Network timing mode the TX
counters should be zero. In the RX direction an intermediate SDH/SONET network could
introduce pointer justifications also when in Network timing mode.
11.12 Time Transfer
Time transfer is an optional software feature available on Nimbra 310, 320, 360, 380 and
the Nimbra 600 series. It requires Nimbra 310, 320, 360 or 380 nodes for PPS/10 MHz
input/output interfaces.
Time transfer is based on node clocks and network synchronization available in all DTM
networks. The Time Transfer functionality distributes absolute time to all participating
nodes of a Nimbra Network. With Time Transfer, Time delay between two neighboring
nodes is constantly measured and communicated between the nodes. This allows the nodes
to calculate absolute time with great accuracy, with all intrinsic, static and dynamic time
delay constantly taken into account.
Time transfer is distributed according to a DSYP spanning tree configuration. Time transfer
is an add-on feature of the synchronization distribution and follows the same path as the
sync distribution. A consequence of this is that whenever time transfer is active, the
synchronization source of the network must be the external clock introduced in the time
transfer master node.
This is useful for many applications. For example, in DTT contexts a Single Frequency
Network is used for transmitter sites to simultaneously broadcast programs on the same
frequency. This means that the received signal is stronger and that the network operator
gets a simpler network/frequency plan.
Time transfer specific information is sent between nodes on dedicated, automatically set-up
time transfer channels. They can be listed from the link All connections Channels or
from Nimbra Vision.
The time transfer function utilizes DSYP to find the shortest path for time distribution and
to find an alternative path in case of node or link failure. The time transfer accuracy is
better than 1.5 s for ten consecutive node hops.
To configure time transfer, the PPS/10 MHz input node must also be used as an external
synchronization source. Start from the DTM Sync page.

Element Manager User's Manual Sync and Time Transfer 205

2013 Net Insight AB, All rights reserved

Figure 197. Configuration of the external clock admin status in the node that is the source
for time transfer.
In our case, the external clock priority is set to 4 and the administrative status is set to Up.
The second step in configuring time transfer is to enable the links on all nodes using or
passing time transfer signals. This is made from the DTM Time transfer link.

Figure 198. Time transfer configuration web page for node iov101, the source for time
transfer.

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
The admin status of these links must be set to Up at both ends of all relevant links as
Transfer is enabled on a per link basis
nodes.
Operational status is Up when time transfer is active
If sync is only delivered to the link, the operational status remains stated as dormant in the
web interface. That is why no link has operational status up in the illustration; the source
node only delivers time transfer signals, it does not receive them.
Timing reference is the synchronization source that is currently active.
Time scale status describes the cu
values; uninitiated, reassigned and compensated.
indicates that the time of the time scale is not initiated and may
keeping. When the time
nodes (being Compensated
source, the node reassigns the time scale
time scale may not be used for precision timekeeping
been initiated to TAI/UTC, it
To configure a particular interface, click on the link to the interface in the Time sources
column.
Figure 199. Time transfer configuration web page for a specific interface.
On this page, the administrative status can be set. The administrative status is set to Down
for all trunks by default. In order to let the system handle selection of a suitable
synchronization source, it is strongly recommended to set the administrative status on all
trunk interfaces to Up when using the time transfer feature.
then established exactly where they are needed, automatically.

Note:

Setting the
Up forces the operational status to state Down and disab
function.
No warning is given to nodes further down in the synchronization chain, but an
event is gene
This setting is strongly discouraged.

The parameter Calibrated Round trip ratio is the difference between the
divided with the round trip time and
Sync and Time Transfer
2013 Net Insight AB, All rights reserved
The admin status of these links must be set to Up at both ends of all relevant links as
Transfer is enabled on a per link basis. The easiest way is to set it to Up for all links in all
Operational status is Up when time transfer is active and sync is taken from the interface
If sync is only delivered to the link, the operational status remains stated as dormant in the
That is why no link has operational status up in the illustration; the source
node only delivers time transfer signals, it does not receive them.
Timing reference is the synchronization source that is currently active.
Time scale status describes the current operating mode. In can take on three different
values; uninitiated, reassigned and compensated. The initial state is Uninitiated, which
indicates that the time of the time scale is not initiated and may not be used for any time
When the time scale of the node have a degenerated time offset from neighbor
Compensated) or a local TAI/UTC (atomic time/universal time coordinated )
source, the node reassigns the time scale and enters the reassigned state, during which the
y not be used for precision timekeeping. When the time scale of the node has
been initiated to TAI/UTC, it is compensated and can be used for time keeping.
To configure a particular interface, click on the link to the interface in the Time sources
Time transfer configuration web page for a specific interface.
On this page, the administrative status can be set. The administrative status is set to Down
for all trunks by default. In order to let the system handle selection of a suitable
tion source, it is strongly recommended to set the administrative status on all
trunk interfaces to Up when using the time transfer feature. Time transfer channels are
then established exactly where they are needed, automatically.
Setting the administrative status to Down on an interface with operational status
Up forces the operational status to state Down and disables the time transfer
function.
No warning is given to nodes further down in the synchronization chain, but an
is generated in the event log.
This setting is strongly discouraged.
The parameter Calibrated Round trip ratio is the difference between the return trip time
divided with the round trip time and , expressed in ppm of the round trip time.
Sync and Time Transfer 206
The admin status of these links must be set to Up at both ends of all relevant links as Time
o Up for all links in all
and sync is taken from the interface.
If sync is only delivered to the link, the operational status remains stated as dormant in the
That is why no link has operational status up in the illustration; the source
rrent operating mode. In can take on three different
The initial state is Uninitiated, which
not be used for any time
offset from neighbor
(atomic time/universal time coordinated )
and enters the reassigned state, during which the
When the time scale of the node has
.
To configure a particular interface, click on the link to the interface in the Time sources

On this page, the administrative status can be set. The administrative status is set to Down
for all trunks by default. In order to let the system handle selection of a suitable
tion source, it is strongly recommended to set the administrative status on all
Time transfer channels are
administrative status to Down on an interface with operational status
les the time transfer
No warning is given to nodes further down in the synchronization chain, but an
return trip time
, expressed in ppm of the round trip time. Observe

Element Manager User's Manual Sync and Time Transfer 207

2013 Net Insight AB, All rights reserved
that it is the return time to the node that counts, not vice verse. The parameter is in the
range -499999 to 499999.

Figure 200. Definition of calibrated round trip ratio, given as an example.
11.12.1 Listing of time transfer channels
The time transfer channels are seen under All Connections Channels are listed. They are
listed as Time transfer services.

Figure 201. All Channels listed, including all Time Transfer channels.
11.12.2 Time transfer on additional interfaces from GX4.12
Time transfer was first introduced and only available on SDH interfaces. In GX4.12, time
transfer is also supported from fixed IP Trunk interfaces in Nimbra 310/320/360/380, but
currently not from the plug-in modules of the same node types. Neither is it supported for
IP trunks in the Nimbra 600 series.
Inclusion of time transfer on such links requires supporting firmware, which needs to be
downloaded to the module. Support for such downloads is included in the web interface.
A B
10,1 ms
9,9 ms
CalRTT_RA = 9.9/(10,1+9,9) - 1/2 =
- 0.1/20 = - 5000 ppm
CalRTT_RB = 10.1/(10,1+9,9) - 1/2 =
+ 0.1/20 = + 5000 ppm

Element Manager User's Manual Performance Monitoring 208

2013 Net Insight AB, All rights reserved
12 Performance Monitoring
12.1 Overview
The Performance management function collects measurement data to allow a network
operator to troubleshoot, plan maintenance on their network and discuss quality-of-service
issues with their own customers.
Performance monitoring is based on ITU-T G.826 standards for SONET/SDH trunks.
Performance monitoring for other measurement points follows the standard as well as they
can, but in some cases were the standard is not applicable, other measures are used to
evaluate performance in the network.
Monitoring is available on all
Trunk interfaces, on the receiving ports
Access interfaces, on the receiving ports (from external equipment)
ITS services (end-to-end), on the egress from the DTM layer towards the outgoing access
port. This monitoring is available, regardless if the stream is sent to the sink interface or
used as an available (standby) backup stream. For PM to be available on standby streams,
the stream must be terminated on a separate sink TTP. Protection cases may be open ended
or closed ended, the important thing is that they are terminated on separate TTPs.

Figure 202. Open ended protection with performance monitoring on both streams on
(separate) sink TTPs.

Element Manager User's Manual Performance Monitoring 209

2013 Net Insight AB, All rights reserved

Figure 203. Closed ended (hitless/standby) protection with performance monitoring on
both streams.
Ethernet ports, both physical interfaces on the nodes and virtual ETS interfaces. On these
ports, monitoring is available for two different logical objects in each port. The source
object monitors outgoing streams and the sink object monitors inbound streams to the port.
They are shown as eth-source, eth-sink, ets-source or ets-sink on the performance
monitoring web pages.


Figure 204. Illustration of a bidirectional ETS connection between two Nimbra nodes. The
four performance monitoring objects per node track incoming traffic (shown as
small circles here).
The monitoring points are sampled every second and a new performance monitoring period
is started every 15 minutes, on the quarter (hh:00, hh:15, hh:30, hh:45). The 24h periods are
synchronized with the 15m periods, i.e. the first 24h period and the first 15m period start at
the same time. Timing is taken from the Date/time function of the various nodes.
When a new period starts, all regular counters are reset to zero and, if appropriate, the ZS
counter is increased with one. The Zero Suppression (ZS) counter registers number of fault
free periods prior to the current period.
Performance reports are issued at the end of the measurement intervals. Performance
reports are logged and the size of the PM log is configurable to be large, small or none. A
eth-sink
eth-src
Forwarding
function
ets-src
ets-sink
ets-sink
ets-src
Forwarding
function
eth-src
eth-sink
Node A Node B
Point of PM measurement

Element Manager User's Manual Performance Monitoring 210

2013 Net Insight AB, All rights reserved
small PM log consists of 15 15m periods and one 24h period. A large PM log consists of 96
15m periods and 30 24h periods. None disables the PM log.
Alarms can be configured to be generated for unavailable time and defined threshold on
counters (15m ES/SES/BBE/SS or 24h ES/SES/BBE/SS). The threshold crossing alarms
(which is singular) is ceased after a complete measuring period (15 min or 24 h) below the
threshold value.
Zero suppression is by default enabled, which means that performance monitoring periods
with all zeros are not entered in the PM log and thus not listed in the web interface.
Entries in the PM log can generate events and subsequently sent as SNMP traps; by default
this feature is disabled.
If a parameter cannot be calculated, e.g. because a sample is unavailable or a sample is
outside the range of the measurement variable, the performance interval is declared invalid.
12.2 General
In the web interface, Performance monitoring is found under the Perf. monitor link.

Figure 205. Performance monitoring web page. The sub-sections are Configuration and
Data.
The general configuration settings for all performance measurement points in a node are set
on the Perf. Monitor Configuration web page.


Figure 206. Performance Monitoring configuration menu
The configurable parameters on this page are described in the table below:


Element Manager User's Manual Performance Monitoring 211

2013 Net Insight AB, All rights reserved
Figure 207. Configurable performance monitoring parameters in the node.
Even though very large values are allowed for the number of large and small history logs, it
is recommended to stay at or close to the default values. Excessive values leads to out-of-
memory problems at some unspecified time in future.
When the parameters have been set, click on OK or Apply to store the settings in the
node. Apply takes the user back to the starting page for performance monitoring, while OK
keeps the user on the configuration web page.

Parameter Type Range Default Description
Administrative
status
Binary Up, Down Up The administrative status of all performance
monitoring in the node. Setting it to Up
enables performance monitoring while
setting it to Down disables performance
monitoring in the node.
Small history
log (max
number)
Integer 0 - 4294967295
(2
32
-1)
128 Consist of 15 PM report entries of 15
minute and one entry of 24 hrs. Allocated
system resources for the small history log.
Large history
log (max
number)
Integer 0 - 4294967295
(2
32
-1)
4 Consist of 96 PM report entries of 15
minute and 30 entries of 24 hrs. Allocated
system resources for the large history log.

Element Manager User's Manual Performance Monitoring 212

2013 Net Insight AB, All rights reserved
12.3 Monitored performance values
The following performance parameters are monitored:

Parameter
(G.826)
Description
UAS Unavailable Second is a second of unavailable time. Unavailable time starts after
ten consecutive SES and ends after ten non-consecutive SES.
SES Severely Error Second (Subset of ES) is a second of seriously faulty available time.
One second of available time containing 30% EB or at least one defect. Ten
consecutive SES seconds begin UAT state while ten consecutive non-SES seconds
end UAT.
ES Error Second is a second of available time with one or more BBE.
BBE Background Block Error is the number of errored blocks found during one second
of available time that is not part of SES.
SS Slip Second is one second containing one or more Slips, which is Applicable for
trunk modules.
Suspect If this parameter value is yes, all counter values may be erroneous and should be
interpreted with care. Incomplete measurement periods are set to yes; otherwise it
can be expected to be no.
ZS Zero suppression (counter) tells the number of periods with all performance
parameters being zero before the current period.
Figure 208. Performance Monitoring, monitored parameters
The block sizes are different for different trunks, accesses and services. The current block
sizes are:

Trunk/Access/Service Block size
IP Trunk 1 frame, 8000 frames/s
T1 (1544 kbit/s) 4632 bits
E1 (2048 kbit/s) 2048 bits
E3 (44736 kbit/s) 4760 bits
STM-1 (VC-4) 18792 bits
STM-4 (VC-4-4c) 75168 bits
OC-48/STM-16 (VC-4-16c) 300672 bits
Ethernet access 1 Ethernet packet
AES/EBU Audio 12288 bits
MADI Audio 125000 bits
SDI Access 1000 block/s, bit rate dependent
ASI Access 1000 block/s, bit rate dependent
Figure 209. Block size for different trunks, accesses and service

Element Manager User's Manual Performance Monitoring 213

2013 Net Insight AB, All rights reserved
12.4 Configuration of PM objects
The monitored PM objects; trunks, access interfaces, ITS (sinks) and Ethernet ports
(sources and sinks) are all individually configurable. To configure an individual PM object,
go to web page for configuration of the specific object. This is done by following the link
(in the example below) Perf. monitor Data sonet/sdh-3:2 Configuration tab.


Figure 210. The data presentation web page is also the entry point for configuration of a
single PM object (by following the Configuration tab).
Below, the object is configured. All different types of objects are configured the same way.

Element Manager User's Manual Performance Monitoring 214

2013 Net Insight AB, All rights reserved
The configurable parameters are:

Parameter Type Range Default Description
Administrative
status
Binary Up,
Down
Up This parameter enables (Up) or disables (Down)
PM on the PM object.
Enable UAT
alarms
Binary On, Off Off This parameter enables (On) or disables (Off)
UAT alarms on the PM object. The alarm is
generated when the PM object is in an Unavailable
Time state (after ten consecutive SES)
Enable
threshold
crossing alarm
Binary On, Off Off This parameter enables (On) or disables (Off)
threshold crossing alarms on the PM object. One of
two possible alarms is received when one or more of
the threshold values (defined below) are equaled or
surpassed. The alarms are 15 min and 24 h
threshold crossing alarm.
Enable zero
suppression
Binary On, Off On This parameter enables (On) or disables (Off) zero
suppression on the PM object. Zero suppression
means that PM entries with all counters equal to zero
are not stored in the PM log, but instead the ZS
counter is increased with one. The next entry in the
PM log is the next entry with one of the PM counters
(ES/SES/BBE/SS/UAS) not equal to zero.
Enable periodic
history reports
Binary On, Off Off This parameter enables (On) or disables (Off)
periodic history reports to be generated as events and
thus subsequently sent as SNMP traps to SNMP
managers like Nimbra Vision.
History log size Drop
down
None,
Small,
Large
Small None: No history log is used.
Small: Small history log is used.
Large: Large history log is used.
15m ES
threshold
Integer 0-900 2 Value for 15m ES threshold, where zero has a special
meaning of disabling the threshold.
15m SES
threshold
Integer 0-900 1 Value for 15m SES threshold, where zero has a
special meaning of disabling the threshold.
15m BBE
threshold
Integer 0- 2 Value for 15m BBE threshold, where zero has a
special meaning of disabling the threshold.
15m SS
threshold
Integer 0-900 1 Value for 15m SS threshold, where zero has a special
meaning of disabling the threshold.
24h ES
threshold
Integer 0-86400 10 Value for 24h ES threshold, where zero has a special
meaning of disabling the threshold.
24h SES
threshold
Integer 0-86400 1 Value for 24h SES threshold, where zero has a
special meaning of disabling the threshold.
24h BBE
threshold
Integer 0- 10 Value for 24h BBE threshold, where zero has a
special meaning of disabling the threshold.
24h SS
threshold
Integer 0-86400 1 Value for 24hm SS threshold, where zero has a
special meaning of disabling the threshold.
Figure 211. Configurable parameters for PM objects.

Element Manager User's Manual Performance Monitoring 215

2013 Net Insight AB, All rights reserved
12.5 Presentation of PM objects
Available PM data is presented in the web interface from the link
Perf. Monitor Data. The top row is by default set to view all PM objects with non-zero
entries in the 15m PM log, shown below.


Figure 212. Performance Monitoring Data web page
All headings on this page within parenthesis like (interface), (service), (direction) etc
include all values for this parameter. If a set value is chosen, like setting (interface) to
Trunk, then only PM object with that value are displayed in the listing generated with a
click on the show button. The entries in these drop-down menus depend on the particular
configuration of the node. In the pictures below, this is illustrated.


Figure 213. Possible values for the parameter (interface). The default value shows all
entries, Trunk show all trunk PM objects, Access show all access PM objects
and TTP show all PM objects ending on TTPs (previously called connection).


Element Manager User's Manual Performance Monitoring 216

2013 Net Insight AB, All rights reserved

Figure 214. Possible values for the parameter (service). The default value shows all entries;
the values that show up in the menu are available but different values appear
depending on the node configuration.


Figure 215. Possible values for the parameter (direction) are source or sink. Source
means signals originating from the measuring point and sink means signals
terminating on it.


Figure 216. Possible values for the parameter (errors) are 15m errors and 24h errors.


Element Manager User's Manual Performance Monitoring 217

2013 Net Insight AB, All rights reserved

Figure 217. Possible values for the parameter (admin status) are Admin up and Admin
down.


Figure 218. Possible values for the parameter (oper status) are Oper up and Oper down.
All the parameters shown in the top row form a filter, through which all PM object log
entries are passed. Only those PM object log entries that satisfy all conditions are listed on
the web page.
All configured PM objects in the node are presented in the lists that are seen in the drop-
down menus. Available PM objects depend on the node configuration.
12.5.1 Interface PM objects
Under this listing, in a typical node, there are three different choices; trunk, access and TTP
(known as Connections in previous GX releases). Selection of trunk, access or TTP
presents only those types of PM objects, in the same way as the main links in previous GX
releases.
Trunk PM objects are monitored on the incoming (Rx) port of the trunk interface, which is
illustrated below.


Element Manager User's Manual Performance Monitoring 218

2013 Net Insight AB, All rights reserved


Figure 219. Trunk PM objects

Trunk PM available
IP/Ethernet trunks Yes
SONET/SDH trunks Yes
PDH trunk (4 x DS3/E3 for Nimbra 300) Yes
Figure 220. PM implementation on different trunks

Access PM objects are monitored on the incoming Rx port of the access interface on the
access modules which has the feature implemented.


Figure 221. Access PM objects

Access module PM available
8 x Gigabit Ethernet Access Module Yes
8 x Video Access Module Yes
8 x 3 Gbps Video Access Module Yes
JPEG 2000 Video Access Module Yes
ASI/AES Access Module (also for MADI) Yes
Figure 222. PM implementation on access modules for Nimbra 600

Node A Node B
Point of Trunk PM measurement
Trunk Rx
Trunk Tx
Trunk Tx
Trunk Rx
Access
Modules
Trunk Rx
Trunk Tx
Trunk Tx
Trunk Rx
Access
Modules
Node A Node B
Point of Access PM measurement
Trunk Rx
Trunk Tx
Trunk Tx
Trunk Rx
Access
Modules
Trunk Rx
Trunk Tx
Trunk Tx
Trunk Rx
Access
Modules
Rx Rx Tx Tx

Element Manager User's Manual Performance Monitoring 219

2013 Net Insight AB, All rights reserved

Access module PM available
4 x DS3/E3 Trunk/Access Module Yes
Gigabit Ethernet Access Module Yes
Fast Ethernet Access Module No
8 x ASI Transport Access Module Yes
8 x AES/EBU Access Module Yes
SDI Video Access Module Yes
8 x SDI Video Access Module Yes
4 x OC-3/STM-1 Access Module Yes
E1/T1 Access Module No
Figure 223. PM implementation on access modules for Nimbra One/300
TTP objects can be monitored both on their source and the sink interfaces, i.e. they are
logically divided into two separate objects. PM on the sink interface is supported in most
cases, whereas PM on the source interface is limited to Ethernet PM objects (physical ETH
and logical ETS interfaces).


Figure 224. TTP PM objects
Note that for the source PM objects, errors occur in particular when the buffer for the
outgoing stream is filled and packets are dropped. This is quite different from sink
interfaces, where the cause of errors is lost packets in transit.
12.5.2 Services
Under the (services) heading, PM objects can be sorted by service. Observe that the
combination of (interface) and (service) can create logically inconsistent and for that reason
empty sets. For example, if interface is chosen as Trunk and Service SDI, the created set is
always empty as an SDI trunk is logically inconsistent.
Some services, like Ethernet, can be both trunk and access. Other services are either always
trunk or always access.
12.5.3 Direction
Under this heading it is possible to select if you want PM data only for points in the
network where traffic is terminated (i.e. sink) or where traffic originates (i.e. sources).
12.5.4 Error
Under this heading, it is possible to filter out all entries for15m or for 24h. The default
setting is to look only at those entries with one or more non-zero counters for the past 15
minutes or in other words only look at those counters with some action.
Node A Node B
Point of TTP PM measurement
Trunk Rx
Trunk Tx
Trunk Tx
Trunk Rx
Access
Modules
Trunk Rx
Trunk Tx
Trunk Tx
Trunk Rx
Access
Modules
Rx Rx Tx Tx
DTM
TTP
src
TTP
sink
TTP
src
TTP
sink

Element Manager User's Manual Performance Monitoring 220

2013 Net Insight AB, All rights reserved
12.5.5 Admin and Oper Status
Under the two last headings, it is possible to sort the PM objects on their administrative or
operative status. It is possible to select object with administrative status up/down and
operative status up/down, independently of each other.
12.5.6 Reset of counters and setting of admin status on
multiple objects
In the list that is presented after a search has been made, i.e. after the different headings has
been selected and the button Show has been clicked, tick boxes appear for all entries.
To select all entries in the list, just tick the box on the row with the headings.

Figure 225. All entries in the list are selected by selecting the tick box in the top row, with
the headings. Objects can be removed from the selection by clicking in the tick
box in the leftmost column.
With all selected PM objects, it is now possible to reset the counters with a single click on
the Go button. Alternatively, the admin status of the PM objects can be set to either Up
or Down. Just change the value in the (change selected item) drop-down menu and click
on the Go button.


Element Manager User's Manual Performance Monitoring 221

2013 Net Insight AB, All rights reserved
12.5.7 Particular PM Object web page
If details of a particular interface are of interest, click on this link in the listing and the web
page is presented.

Figure 226. Details of trunk sonet/sdh-3:1 is obtained by clicking on the link to this trunk.
On this web page, the current values of the counters are presented as well as a graph of
previous measurement periods. For a tabular form of the data, the link History details can
be used. Similar graphs and history details are available for 24h counters.

Element Manager User's Manual Performance Monitoring 222

2013 Net Insight AB, All rights reserved

Figure 227. Graph and history details for sonet/sdh-3:1

Element Manager User's Manual Access Modules 223

2013 Net Insight AB, All rights reserved
13 Access Modules
13.1 Access Module types
Access Modules can be of two different types in Nimbra nodes, ITS (Isochronous Transport
Service) or Ethernet Transport Service (ETS). Configurable parameters of the modules are
described under the ITS or Ethernet sections.
13.2 Overview access interface modules
The access interfaces are used to feed the network with various kinds of traffic. A wide
range of interfaces allowing access modules interacting of most kinds of data, voice and
video equipment or external network are available. For Nimbra One some of the interfaces
are available in type A (odd slot) and B (even slot) versions, but most of the modules can be
used as A/B.
Access modules without specified hardware are available in Nimbra One and Nimbra 300
versions.

Access Module Nimbra node Service supported Type
E1 Access Nimbra One/300 Switched E1 tunnel ITS
T1 Access Nimbra One/300 Switched T1 tunnel ITS
4 x DS3/E3 Trunk/Access Nimbra One/300 Switched DS3/E3 tunnel ITS
Fast Ethernet Access Nimbra One/300 Ethernet Tunnel service ETS
Gigabit Ethernet Access Nimbra One/300 Ethernet Tunnel Service ETS
4 x OC-3/STM-1 Access Nimbra One/300 4 x OC-3/STM-1 Access ITS
SDI Video Access Nimbra One/300 Streaming SD-SDI video ITS
8 x SDI Video Access Nimbra One/300 Streaming SD-SDI video ITS
8 x ASI Transport Access Nimbra One/300 Streaming ASI service ITS
8 x AES/EBU Access Nimbra One/300 Streaming AES/EBU audio ITS
8 x Video Access Nimbra 600 Streaming ASI, SD/HD-SDI ITS
8 x 3Gbps Video Access Nimbra 600 Streaming SD/HD/3G-SDI ITS
JPEG2000 Video Access Nimbra 600 Streaming SD/HD/3G-SDI ITS
8 x Gigabit Ethernet Access Nimbra 600 Ethernet Tunnel service ETS
8 x ASI/AES Access Nimbra 600 Streaming ASI, AES or MADI ITS
Figure 228. Access module overview


Element Manager User's Manual Access Modules 224

2013 Net Insight AB, All rights reserved
13.3 OC3 /STM-1 Access Interface web
example
Configuration of STM 1 Access Interfaces is shown as an example of web configuration
of interfaces. The basic configuration web page is shown below:

Figure 229. Basic Parameters to configure
The displayed variables are:

Parameter Description
Interface name The name of the interface, STM1/OC-3-8:1
Source TTP Source TTP for the outgoing STM-1 stream
Sink TTP Sink TTP for the incoming STM-1 stream
Operational status The operational status of the board: Up, Down or Absent
Description A description of the connection, e.g. SDH/SONET path
Speed The capacity of the interface, 150.336 Mbps.
Purpose Input string, inherited from the source TTP.
Errored blocks Number of errored blocks detected
Defects Presents the defect status of the module; e.g. if the SFP is
absent, the defect status is NSFP (No SFP)
Figure 230. Read-only parameters
The configurable basic parameter for the module is:


Element Manager User's Manual Access Modules 225

2013 Net Insight AB, All rights reserved
Parameter Description
Suppress
Alarms
When the service is up and running as intended, alarms are by default suppressed. In
order to enable the alarms, the suppress alarms parameter must be set to None.
Other possible parameter values are:
All: When marked, all alarms are suppressed.
Warning: Suppresses all active alarms with severity warning
Figure 231. Configurable basic parameter

The configurable SDH/Sonet parameters for the module are:



Parameter Description
H1 SS bits Configurable path overhead, transparently forwarded through Nimbra nodes.
These bits (00, 01, 10, 11) are not used by Nimbra nodes.
Performance
monitoring counters
B1 Section overhead
B2 Line overhead
B3 Path overhead
M1 Remote indication of B1
G1 Remote indication of B3
Overhead bytes: SS & C2
Pointer adjustment
event, positive and
negative
RPJE+ (Rx Pointer Justification Event, plus)
RPJE- (Rx Pointer Justification Event, minus)
TPJE+ (Tx Pointer Justification Event, plus)
TPJE- (Tx Pointer Justification Event, minus)
FJE+ (Frequency Justification Event, plus)
FJE- (Frequency Justification Event, minus)
Figure 232. SDH/Sonet variables and parameters

Element Manager User's Manual Access Modules 226

2013 Net Insight AB, All rights reserved
13.4 DS3 /E3 Access Interface web example #2
Configuration of the DS3/E3 Access Interface is shown below as another example of web
configuration of interfaces. Follow ITS Interfaces Link to the specific interface.

Figure 233. Configuration/edit web page of a DS3/E3 access interface.
The displayed variables are:

Variable Description
Interface name The name of the interface, pdh-1:2
Source TTP Originating TTP
Sink TTP Terminating TTP
Operational status The operational status of the board: Up, Down or Absent
Description A short description of the module
Speed The capacity of the access interface
Errored blocks Number of errored blocks
Defects Defect(s) on the interface are presented here
Figure 234. Read-only parameters
The configurable parameters for the module are:

Element Manager User's Manual Access Modules 227

2013 Net Insight AB, All rights reserved

Parameter Description
Output action on
signal fail
How is the case with a failing signal on the far-end access interface handled?
If set to Mute, the failed signal muted (i.e. shut down) on the output access
interface. Muting may speed up fail-over switching time when using external
fail-over switches. If set to None, different actions are taken depending on
service type.
Output action on signal fail is irrelevant on the source interface.
Suppress Alarms When the service is up and running as intended, alarms are by default
suppressed. In order to enable the alarms, the suppress alarms parameter must
be set to none. Other possible parameter values are:
All: When marked, all alarms are suppressed.
Warning: Suppresses all active alarms with severity warning
Loopback The loopback parameter can have three values; None, line or DTM
None means that loopback is disabled
Line means that the signal is looped back on the line side, i.e. that a signal that
comes from an external equipment is sent back to that equipment directly at
the interface.
DTM means that the incoming signal from the DTM network is looped back
to the DTM network. See chapter 19 Loopback for a more detailed discussion.
PDH signal to
transport
Type of PDH signal is configured here. DS3 (default) and E3 are the available
options.
PDH framing PDH framing used; none means no framing, g751 or g832 are two different
ITU-T framing formats.
Figure 235. Configurable parameters for the DS3/E3 trunk/access module, used in access
mode.
Table for output action on signal fail:

Type of service Action
PDH AIS sent on the output access interface if the channel is up and there is an
error. Mute action otherwise.
SDH AIS sent on the output access interface if the channel is up and there is an
error. Mute action otherwise.
ASI IDLE packets are sent on the output access interface if the channel is up and
there is an error. Mute action otherwise.
AES/EBU, MADI Mute action, possibly involving some extra noise from short cables, if the
channel is up and there is an error. Mute action otherwise.
SDI, Native Mute action, possibly involving some extra noise from short cables, if the
channel is up and there is an error. Mute action otherwise.
SDI, JPEG
compressed
Repeat of last frame or black picture (in case no frame has been received) if
the channel is up. If the channel is down, a black picture is generated.
Figure 236. Actions taken on the output access interface for the parameter Output action
on signal fail having value None.


Element Manager User's Manual Ethernet Transport Service (ETS) 228

2013 Net Insight AB, All rights reserved
14 Ethernet Transport
Service (ETS)
Net Insight offers a flexible Ethernet Transport Service. Ethernet interfaces on access
modules in physically separated nodes can be combined into logical network segments,
with or without VLAN tags all according to preferences of the network operator. Ethernet
switching is implemented in some Nimbra nodes, but even earlier Nimbra node types
without this feature can be configured to take at least partial advantage of this switch
feature.
14.1 Basic concepts
14.1.1 Forwarding function (FF)
The forwarding function is a virtual Ethernet switch integrated in Nimbra nodes. When
configuring Ethernet services, this is the first object that needs to be specified. Depending
on type of node, it has different properties. The full functionality is only available on
Nimbra 310/320/380 and Nimbra 600 series nodes.
To the forwarding function, there are both physical ports (Ethernet interfaces) and logical
ETS interfaces attached. The two types of ports are configured in principle in the same way,
with small differences.
The properties of the forwarding function determines if Ethernet switching is active (Mac
mode = mac), if VLAN tags are used for switching (VLAN mode = Customer) and if
Spanning tree is used to remove unwanted Ethernet loops in the network.
The forwarding function is numbered by the user at the time of its creation. It is labeled
after the module on which it is defined with an integer to keep it unique. An example is
ff7:2, the defined FF numbered two on the module that is occupying slot number seven.
The configuration number is customer selectable and can be between 1 and 999999, but
handled by the node a consecutive sequence number is used.
14.1.2 Ethernet Transport Service interface (ETS)
The bidirectional interface in the DTM layer is called ETS interface
2
. From this point, a
unicast ETS service can be established to another ETS interface or a multicast service can
be established to any number of ETS interfaces. This type of service can be set up as a
unidirectional service, a service with a small return channel from all (or some) of the
destinations or as a complete hub service, i.e. all ETS interfaces have equal bandwidth to all
other ETS interfaces. This is discussed further in the multicast chapter.
Numbering of ETS interfaces is made automatically when unicast or multicast services are
defined. All physical interfaces gets the lowest interface numbers, like eth-x:1. The first
ETS interface created gets the lowest number available after the physical interfaces have

2
Earlier, this endpoint of the ETS connection was called TTP (Trail Termination
Point). This term is no longer in use for ETS, but is still used for ITS services.

Element Manager User's Manual Ethernet Transport Service (ETS) 229

2013 Net Insight AB, All rights reserved
been numbered. On a Gigabit Ethernet Access Module, this is ets-x:9, where x is the slot
number of the module. The second ETS interface is labeled ets-x:10 and so on. For a
Gigabit Ethernet module on Nimbra One or 300, the first ETS interface becomes ets-x:2.
This is the general principle.
The ETS interfaces are configured in the same manner as the physical interfaces (see 14.3.9
ETH and ETS Interfaces).
14.1.3 ETS channels
ETS channels are set up from one ETS source interface to one (unicast) or multiple
(multicast) ETS sink interfaces. On top of the ETS channels, ETS services are run. ETS
services and ETS channels may be used interchangeably in the text.
14.1.3.1 ETS unicast connection
A schematic picture of an ETS unicast connection is shown below. It consists of two
channels, one in each direction. These channels are used to send packets through the DTM
network from the ETS interface at iov072 to the ETS interface at iov137 and vice versa.
Bandwidth need not be symmetrical in this case.
In the illustration, the DTM network acts like a giant extension cord between two Ethernet
interfaces of the nodes.


Figure 237. An ETS channel can be defined between two ETS interfaces. The physical
interfaces (ETH) are tied to the ETS interface via the Forwarding Function.
14.1.3.2 ETS multicast connection
An ETS multicast connection connects several sink ETS interfaces to one source ETS
interface. It can be defined with any number of destinations (including zero). Both source
and destination sites must be defined as ETS interfaces. The connection provides a point to
multipoint service.

ff5:1
eth4:1
Node iov072 Node iov137
eth5:1 ets5:9
Forwarding
function
ff4:1
Forwarding
function
ets4:9
DTM

Element Manager User's Manual Ethernet Transport Service (ETS) 230

2013 Net Insight AB, All rights reserved

Figure 238. A multicast ETS connection, with a source (iov072) and two destinations
(iov136 and iov137). In this case the traffic is unidirectional, from iov072 to
iov136 and iov137.
In order to define the ETS service as a unidirectional service from the source to all
destination sites, it is sufficient to define the source and destination ETS interfaces.
Multicast service is by default unidirectional. If return traffic is needed, a second
connection must be defined in the opposite direction. Bandwidth need not be symmetrical
in this case.

14.1.4 ETS 1 +1 protection
The ETS 1+1 protection feature requires a different firmware on the 8 x Gigabit Ethernet
Access Modules. This firmware requires a separate license. This firmware is downloaded as
described in chapter 22 Up- and Downgrading.
Two ETS services can be grouped in such a way that they protect each other. A pair of
ETS-interfaces, starting points for the two services, in one node can be configured as an
ETS interface group. This means that properties that have to be identical for both interfaces
are set on the interface group level, while properties that may be different (like bandwidth)
are set on the ETS level. Note that even the properties that may differ in most cases should
be equal, for best operation.
For a unicast, 1+1 protected service, one ETS interface group is needed at both ends. For a
multicast 1+1 protected services, protection is configured and made on the terminating
nodes.
The interface group in the source node adds sequence numbers to the different packets. In
the sink node, the sequence numbers are used to build up the egress stream with packets
from both steams. Sink nodes can also be configured to ignore the sequence numbers and
not part of interface groups at all.
There are two configurable, different protection types; hitless or standby. They are
configured on interface group level. In hitless protection, a sequence number is added at the
source and both streams are used at the sink to generate the output stream. Normally, one
channel (the primary channel) is used, but in case of lost packets the alternative stream is
used to complement this primary channel. The design is such that the outgoing stream is
placed in a play-out buffer and a delay in introduced on the sink interface. It also means
that the streams are assumed to be identical.
ff5:1
eth4:1
Node iov072
Node iov137
eth5:1 ets5:9
Forwarding
function
ff4:1
Forwarding
function
ets4:9
Node iov136
ff3:1
Forwarding
function
ets3:9 eth3:1

Element Manager User's Manual Ethernet Transport Service (ETS) 231

2013 Net Insight AB, All rights reserved
The selection of protection type at the sink nodes means that one multicast stream may have
destinations terminated in different ways. Potentially, they may be hitless, standby or
without the 1+1 protection feature completely (individual ETS interfaces).
14.1.5 ETS interface groups
ETS interface groups are objects that can be located in the web user interface as ETS
interfaces. The interface groups must be created, much like forwarding functions. ETS
interface groups are needed for ETS 1+1 protection; otherwise they are not needed.
Up to two ETS interfaces can be associated to an ETS interface group. These interfaces
must in some respects have identical properties, which are then configured on the interface
group level. In other respects, they can have different properties, which then are configured
on the ETS interfaces themselves.
When two ETS interfaces are associated to an interface group, they can be configured to act
as backup for each other. This backup can be configured as standby, in which case traffic
goes through either of the ETS interfaces entirely, i.e. one stream is used and the other
stream is discarded. Alternatively, two streams can carry identical traffic and be
reconstructed as a single outgoing stream at the output. In the latter case, packets from both
streams may be used to put together the combined stream.
When the interface group is created, a forwarding function has to be assigned to the
interface group. When later, a first ETS interface is associated with the interface group; all
properties of this interface are copied to the interface group. Furthermore, they can now
only be changed on the interface group level and not on the ETS interface level. When a
second ETS interface is associated with the group, all properties are copied from the
interface group to the new ETS interface. There are a couple of parameters that still can be
set on the individual ETS interfaces, as exceptions to this rule.


Figure 239. Example of multicast hitless setup of ETS 1+1 protection with two
destinations.
14.1.6 Protection type hitless or standby
ETS 1+1 protection type can be configured to be either Hitless or Standby. The two
different types have fundamentally different properties and it is important to understand the
implications of hitless protection before using it. If conditions are suitable for hitless
protection, packets are used from two incoming streams to form a combined stream without
errors. If conditions are not suitable and one of the streams is missing, a single error in a
packet leads to reset of the buffer and a loss of content.
ff5:1
ets-5:9
ets-5:10
ets-4:9
ets-4:10
eth-4:1
Node iov072
Node iov137 - Forwarding function ff4:1
R
o
u
te
S
e
c
R
o
u
t
e
P
r
i
R
o
u
t
e
P
r
i
R
o
u
t
e
S
e
c
eth-5:1 etsg5:1
Forwarding
function ets i/f group
ff4:1
Forwarding
function
etsg4:1
ets i/f group
ets-4:11
ets-4:12
eth-4:5
Node iov137 - Forwarding function ff4:2
ff4:2
Forwarding
function
etsg4:2
ets i/f group

Element Manager User's Manual Ethernet Transport Service (ETS) 232

2013 Net Insight AB, All rights reserved
One ETS interface group, or rather one ETS interface in an ETS interface group can form a
channel (or channels) with sinks that are not part of an interface group. Sinks may even
reside on nodes without the capability to have interface groups. Of course, in these cases,
no protection is available.
14.1.7 Hitless protection
Hitless protection means that the two streams are combined in the play-out buffer on the
sink. The egress stream in composed on packets from both streams. This imposes two
requirements on the streams. First of all, the streams have to originate on the same
TTP/input interface to get the sequence number added simultaneously for both streams. To
get protection, the streams have to go through the Nimbra network along two different
routes. In other words, protection has to be closed ended, i.e. the streams start on the same
TTP in one node and traverse the network in different routes.
The physical Ethernet interface on the module is labeled after the slot occupied by the
module in the node and secondly, the interface number on the module. An example is
eth3:6, for physical interface number six (from the left) on the module occupying slot
number three.
The physical ports are configured under Ethernet Ethernet interfaces (see 14.3.9 ETH
and ETS Interfaces).
14.1.8 Standby protection
Standby protection of an ETS interface group means that one of the two streams is used
completely (and the other stream is not used at all). Switching between the two streams is
made for the usual reasons (LOS, AIS, DEG or RBR). The selection is made at the receiver
and there is no requirement that the two streams are identical. This also means that the two
streams can originate on different nodes and have different content.
14.1.9 Interface source and sink constituent parts
Ethernet (ETH) and ETS interfaces are each divided into two separate parts, source and
sink. The source part of the interface is the part that sends packets out from the interface
and the sink part of the interface is the part that receives packets destined to the interface.
Thus, there are four distinct parts all associated with the forwarding function (eth-source,
eth-sink, ets-source and ets-sink). These constituent parts are described in the performance
measurement section (12 Performance Monitoring)


Figure 240. Illustration of the objects eth-source, eth-sink, ets-source and ets-sink.

Element Manager User's Manual Ethernet Transport Service (ETS) 233

2013 Net Insight AB, All rights reserved
14.2 Configuration examples of ETS services
In this chapter different examples of ETS services are discussed, while in the next chapter a
comprehensive discussion of configuration of the different objects discussed in the previous
chapter (Forwarding Function, ETH and ETS interfaces and ETS interface groups). These
objects have many configurable parameters and it is obviously a good idea to grasp the
concept before trying to configure it.
For some parameters, there are explicit warnings about configuring them without proper
insight to their operation. In order to save the operator much trouble and unnecessary
downtime of their system, please follow this advice.
In the configuration examples below, different use cases are discussed. The details in the
configuration are described in the following chapter.
14.2.1 DTM network as extension cable
It is possible to configure the DTM network to act as an Ethernet extension cable, where the
signal on a physical Ethernet interface is transported transparently through the DTM
network to another physical Ethernet interface.


Figure 241. A unicast connection between two Ethernet interfaces.
The Forwarding Functions ff5:1 and ff4:1 should be configured the same way. In this
example we choose:
VLAN Mode Transparent
MAC Mode Auto or Nomac
MAC Aging Time Any allowed value works, default is recommended
Spanning Tree Auto (default) is recommended
Jumbo Frames On (default) is recommended
Fault propagation Off (default) is recommended

The Ethernet interfaces (eth5:1 and eth4:1) must be tied to their respective Forwarding
Functions (ff5:1 and ff4:1). ETS unicast connections between ets5:9 and ets4:9 are set up
on two separate web pages; the local DSTI number must match the destination DSTI set up
on the other ETS configuration page.
This configuration is typically set up as a bidirectional channel, but it is not necessary to set
up the return channel in case the traffic pattern is just a stream without return traffic.

ff5:1
eth4:1
Node iov072 Node iov137
eth5:1 ets5:9
Forwarding
function
ff4:1
Forwarding
function
ets4:9
DTM
ETS ETH
ETH
ETS

Element Manager User's Manual Ethernet Transport Service (ETS) 234

2013 Net Insight AB, All rights reserved
14.2.2 ETS Multicast replication in the DTM layer
Multicast Ethernet, where traffic originates on one ingress interface and leaves the DTM
network for further distribution on several egress interfaces, is illustrated below. This traffic
pattern is typical for IP multicast distribution in applications like IP-TV.

Figure 242. A multicast connection between one ingress and two egress interfaces.
All Forwarding Functions can be defined with VLAN mode transparent and Mac mode
auto. Mac Aging Time can be chosen as the default, 300 s, as well as Jumbo Frames (On)
and Fault Propagation (Off). In ff5:1, an ETS multicast connection is set up with two
destinations. On the terminating ETS interfaces, a multicast ETS connection is defined.
Make sure the used local DSTI matches the destination DSTI entered in the originating
ETS interface. No destinations should be entered at the egress sites, unless the intention is
to set up return traffic to the originating node.
In this case, Ethernet capacity is reserved from the ingress interface to the egress interfaces,
but no capacity is reserved in the other direction.
The respective Forwarding Functions need to be connected to relevant Ethernet interfaces.
VLAN settings may be Acceptable Frame Type: All; Default VLAN: 1 and Transmitted
Frame Type: Tagged.
14.2.3 ETS 1+1 unicast closed ended configuration
In the simplest case of closed ended protected configuration, one Ethernet interface in one
Nimbra node is connected to another Ethernet interface in another Nimbra node. Defined
on both ingress and egress modules are a forwarding function, one ETS interface group and
two ETS interfaces. The ETS interfaces form two channels between the nodes, which
protect each other. Hence, the term ETS 1+1 protection can be used.
In the illustration below, which is used as a configuration example, all streams are unicast.

Figure 243. ETS 1+1 protection in a point to point case.
ff5:1
eth4:1
Node iov072
Node iov137
eth5:1 ets5:9
Forwarding
function
ff4:1
Forwarding
function
ets4:9
Node iov136
ff3:1
Forwarding
function
ets3:9 eth3:1
ff5:1
ets-5:9
ets-5:10
Node iov072
eth-5:1 etsg5:1
Forwarding
function ets i/f group
eth-4:1
Node iov137
ff4:1
ets-4:9
ets-4:10
Forwarding
function
etsg4:1
ets i/f group
Route pri
Route sec

Element Manager User's Manual Ethernet Transport Service (ETS) 235

2013 Net Insight AB, All rights reserved
14.2.3.1 Configuration procedure
The configuration procedure is straight forward. A stepwise guide is:
Create two forwarding functions in the sink and source module. If we intend to use VLAN
tagged traffic, so we can choose to set VLAN mode to customer for the forwarding
functions.
Create an ETS per forwarding function. Combine the ETSes with DSTI numbers, i.e. form
channels between them.
Create an ETS interface group per ETS and move the configured ETS to the interface group
in one node. Repeat for the other node.
Create a second ETS per forwarding function. Put them into the ETS interface group and
combine the new ETS interfaces with DSTI numbers, i.e. form a channel between them.
Configure the Ethernet interfaces to be included in respective forwarding function. Put
admin status to up on the interfaces.
In the example below, nodes iov072 and iov137 are put together, from eth-5:1 in iov072 to
eth-4:1 in iov137.
14.2.4 ETS 1+1 multicast closed ended configuration
In the closed ended case of protection, two point-to-point connections are defined between
two ETS interface groups. In order to get protection, the connections have to be routed
different ways in the network. On both sides of the connection, one forwarding function,
one ETS interface group with two ETS interfaces must be configured. For distribution, one
physical Ethernet interface is natural to use in the source node, while in the sink node one
or more Ethernet interfaces are possible.

Figure 244. 1+1 closed ended ETS Protection, multicast case
This type of protection can be used for streams between one source and one or more
destination(s) (i.e. the physical Ethernet ports in this case). In our example, we have two
destinations in the same node (and even module). The different destinations can be
configured independently of each other, i.e. they can have a mixture of hitless protection,
standby protection and even unprotected ETS interfaces.


ff5:1
ets-5:9
ets-5:10
ets-4:9
ets-4:11
eth-4:1
Node iov072
Node iov137 - Forwarding function ff4:1
R
o
u
te
S
e
c
R
o
u
t
e
P
r
i
R
o
u
t
e
P
r
i
R
o
u
t
e
S
e
c
eth-5:1 etsg5:1
Forwarding
function ets i/f group
ff4:1
Forwarding
function
etsg4:1
ets i/f group
ets-4:10
ets-4:12
eth-4:5
Node iov137 - Forwarding function ff4:2
ff4:2
Forwarding
function
etsg4:2
ets i/f group
eth-4:6

Element Manager User's Manual Ethernet Transport Service (ETS) 236

2013 Net Insight AB, All rights reserved
14.2.4.1 Configuration procedure
The configuration procedure is straight forward. A stepwise guide is:
Create forwarding functions in all sink and source modules. In our case, we need to create
two forwarding functions in node iov137 as we intend to take out two independent streams
from this module.
Create an ETS per forwarding function. Combine the ETSes with DSTI numbers, i.e. form
channels between them.
Create an ETS interface group per ETS and move the ETS to that interface group in one
node. Repeat with the other ETSes.
Create a second ETS per forwarding function. Put them in the ETS interface group and
combine the new ETS interfaces with DSTI numbers, i.e. form channels between them.
Put admin status to up on the Ethernet interfaces that carry the Ethernet Traffic.
In the example below, nodes iov072 and iov137 are put together, from eth-5:1 in iov072 to
eth-4:1 in iov137 and eth-4:5/eth-4:6. Observe that the two different forwarding functions
in iov137 operate independently. They need not reside on a common module or common
node.
14.2.5 ETS 1+1 open ended configuration
Open-ended 1+1 configuration can be used both for unicast and multicast channels. The
setup is naturally made with streams duplicated outside the DTM network and entered in
two different nodes, at two different hub sites, or as in our example in different Ethernet
interfaces but in the same node.
The protection type allows the user to use a separate stream as protection. The two streams
must both be of the same type (i.e. Ethernet), but the bandwidth may vary.


Figure 245. Open ended configuration of ETS 1+1 protection. This type can be used both
for unicast and multicast connections. The streams can be bidirectional, but for
practical applications they are mostly unidirectional.

ets-4:9
ets-4:10
Node iov137
Route Pri
Route Sec
ets-5:10
Node iov072 - ff5:2
eth-5:5 ff5:2
Forwarding
function
ets-5:9
Node iov072 - ff5:1
eth-5:1 ff5:1
Forwarding
function
etsg4:1
ets i/f group
ff4:1
Forwarding
function
eth-5:1

Element Manager User's Manual Ethernet Transport Service (ETS) 237

2013 Net Insight AB, All rights reserved
14.2.5.1 Configuration procedure
The described procedure has two source nodes/modules/forwarding functions, use unicast
connections with one destination node/module. The ETS interface group is only used in the
destination node, where the selection of stream is made. If multiple destinations are used,
this selection is made in each destination, independently of other destinations.
In our example, the ingress points are iov072/ff5:1 and iov072/ff5:2. The destination is
iov137/ff4:1 and ETS interfaces defined in this forwarding function. To configure an open-
ended ETS 1+1 protected channel, proceed as follows:
Create one FF in the destination node (iov137) and two in the source node (iov072). The
two in the source node should be associated with different ETS interfaces in the next step.
Create one ETS interface per FF in the source node and two ETS interfaces in the
destination node/forwarding function.
Associate the ETS interface in iov072/ff5:1 with one ETS interface in iov137. Configure
routing with source route Route Pri. Associate the ETS interface in iov072/ff5:2 with
another ETS interface in iov137, using Route Sec. Configure 20 Mbps bandwidth
downstream and 1 Mbps upstream.
Group the two ETS interfaces in node iov137 together in the newly created ETS interface
group. They now protect each other.
Connect three physical Ethernet interfaces (eth port) to the three different forwarding
functions. Set administrative status to up on all ETH interfaces. Now the connection should
be up and running. Insert the same Ethernet stream in ports eth-5:1 and eth-5:5 in iov072.
The protected stream should egress on interface 4:1 in node iov137.
14.2.6 Ethernet Switching
Ethernet switching can be configured by connecting multiple ETS interfaces to one
common Forwarding Function. In the illustration below, one node is configured as hub
node and three as spoke nodes. Three unicast ETS connections are defined between node
iov072 and nodes iov136, iov137 and iov138 respectively. These ETS interfaces are all
associated to one forwarding function, which also is associated with node A. All nodes
should have VLAN Mode set to Transparent and Mac mode set to Auto.

Element Manager User's Manual Ethernet Transport Service (ETS) 238

2013 Net Insight AB, All rights reserved

Figure 246. Ethernet switching with one switch and three more nodes.
ff5:1
eth3:1
Node iov072
Node iov136
eth5:1 ets5:10
Forwarding
function
ff3:1
Forwarding
function
ets3:9
Node iov137
ff4:1
Forwarding
function
ets4:9 eth4:1
ets5:9
ets5:11
Node iov138
ff5:1
Forwarding
function
ets5:9 eth5:1

Element Manager User's Manual Ethernet Transport Service (ETS) 239

2013 Net Insight AB, All rights reserved
14.2.7 Ethernet switch and VLAN tagging


Figure 247. An external Ethernet switch with aggregated traffic from three separate
VLANs has its traffic separated on three different Ethernet interfaces.
Different customers can share one common Ethernet interface in the Nimbra network.
VLAN tagging makes it possible to separate the different VLANs in a Forwarding Function
(in this case ff1:1) to three different ETS interfaces. On the outgoing Ethernet interfaces,
typically the tags are removed, but this is dependent on the particular application.

DTM
f1:1
eth1:1
Node A
f5:1
eth5:7
ets5:9
Node C
VLAN Mode: Customer
Mac mode: Auto
f7:1
eth7:2
ets7:9
Node B
VLAN Mode: Customer
Mac mode: Auto
VLAN Mode: Customer
Mac mode: Auto
f1:2
eth1:3
ets1:10
Node D
VLAN Mode: Customer
Mac mode: Auto
ets1:10 ets1:9 ets1:11
VLAN 1 VLAN 2 VLAN 3
VLAN 1-3
External Ethernet
Switch
VLAN 1-3
VLAN 1
VLAN 2 VLAN 3
Acceptable frame type All
Transmitted frame type VLAN tagged
Acceptable frame type All
Transmitted frame type VLAN tagged
Acceptable frame type All
Transmitted frame type Untagged

Element Manager User's Manual Ethernet Transport Service (ETS) 240

2013 Net Insight AB, All rights reserved
14.3 Configuration of ETS services
ETS service configuration requires configuration of all physical (ETH) and virtual Ethernet
(ETS) interfaces and the Forwarding Function (FF) tying the different interfaces together.
In addition, ETS interface groups must be configured for ETS 1+1 protection.
Configuration, starts from Ethernet in the left column. Additional submenus pop up:
Devices; Forwarding Functions; Ethernet Interfaces; ETS Interfaces and Perf Monitor. To
continue, follow the Devices link.

14.3.1 Devices (modules)

Figure 248. The first configuration page for Ethernet.


Figure 249. The configuration page obtained by clicking on the Devices link.
The starting point for configuration of Forwarding Functions and ETS interfaces is found
by clicking on the name of the particular device to be configured or use the Create FF
button.

Element Manager User's Manual Ethernet Transport Service (ETS) 241

2013 Net Insight AB, All rights reserved

Figure 250. The configuration page for a particular Ethernet device (i.e. module) is found
in this example when the link (name) eth1 is used.
14.3.2 Forwarding Function Basic settings
A Forwarding Function (FF) is a virtual Ethernet switch defined on a module. In this text,
we first treat the case without ETS 1+1 protection.
The FF is created and deleted by the user. The first time an 8 x Gigabit Ethernet Access
Module is detected no FFs exist on the module. In order to use the device, at least one
Forwarding Function must be created. To create a FF, select Ethernet Devices, click on
the link to the selected device (like eth1) and the button Create forwarding function.
The forwarding function in a Nimbra node must be associated with a physical device in a
node. Physical interfaces can only be attached to a forwarding function residing on the
same device/module.
When a forwarding function is deleted, a confirmation window is opened. The deletion is
confirmed with the OK button.

Element Manager User's Manual Ethernet Transport Service (ETS) 242

2013 Net Insight AB, All rights reserved


Figure 251. Creation of a forwarding function and selection of the index number (in this
case ff-5:1 is created).

Although only (at most) eight forwarding functions can exist on a module, they can be
numbered between 1 and 999999. It is recommended to use automatic selection and use
numbers sequentially, unless there is a compelling reason.



Figure 252. The relationship of different fundamental concepts in Ethernet switching.
Each Forwarding Function is associated with a number of Ethernet (ETH) and ETS
interfaces. All Ethernet and ETS interfaces associated with a specific FF must be defined on
the same module as the Forwarding Function itself is defined.
ff5:1
eth4:1
Node iov072 Node iov137
eth5:1 ets5:9
Forwarding
function
ff4:1
Forwarding
function
ets4:9
DTM
ETS ETH
ETH
ETS

Element Manager User's Manual Ethernet Transport Service (ETS) 243

2013 Net Insight AB, All rights reserved

Figure 253. Configuration of a Forwarding Function in a Nimbra 680.
The basic configurable parameters (settings) for a forwarding function are: Customer ID,
Purpose, VLAN Mode, Mac Mode, Mac Aging Time, Spanning tree, Jumbo Frames and
Fault propagation.
A Forwarding Function can currently be set in two different VLAN modes and three Mac
modes (auto, mac, nomac). When set to auto, nomac mode is selected if only two ports are
connected to the FF and mac mode otherwise.
In the table below the behavior of the forwarding function is discussed as a function of
these two parameters.


Element Manager User's Manual Ethernet Transport Service (ETS) 244

2013 Net Insight AB, All rights reserved
Mac Mode
VLAN Mode
nomac mac
Transparent Transparent mode
Forwards all incoming packets to the
ports belonging to the same FF.
Bridged MAC mode
VLAN transparent
Switching mode
IEEE802.1D
Customer Customer mode
Forwarding based on customer
VLAN only. Forwards incoming
packets to the interfaces belonging to
the same FF and (customer) VLAN.
Only mode supported in Nimbra
One/340/340-HD/360 products
Bridged VLAN/Mac mode
VLAN aware Switching
mode
IEEE802.1Q
Figure 254. The table shows available VLAN and Mac Mode settings of Forwarding
Functions. The operation of the FF is lined out for the different cases.

There are five tabs to configure in a Forwarding Function, Basic settings, Advanced
(settings), Diffserv, Spanning Tree and Statistics (see Figure 253). Note that you have to
use the Apply or OK button on each page before moving on to the next tab configuration.
14.3.2.1 Basic setting Customer ID
Default value: 0
Type: integer
Range: 0- 4294967295 (2
32
-1)
Description: A number to identify the customer or another entity
14.3.2.2 Basic setting - Purpose
Default value: Empty (text) string
Type: text string
Range: string consisting of 0 to 255 characters
Description: an arbitrary text string
14.3.2.3 Basic setting VLAN mode
Default value: Transparent
Type: All choices available are presented in a drop down menu
Range: Transparent or Customer
Description: Transparent means that no switching is made based on VLAN ID. The tags
are passed on transparently through the switch, without changes. Customer means that Q-
tags are used for switching by the forwarding function.
No VLAN configuration is possible with VLAN mode equal to transparent. The selections
are grayed out in the web interface.
In VLAN mode customer, VLAN-handling is in accordance with IEEE 802.1Q. All
frames belong to a VLAN, either from a tag present in the header or from a default tag

Element Manager User's Manual Ethernet Transport Service (ETS) 245

2013 Net Insight AB, All rights reserved
added by the Ethernet/ETS interface in case no VLAN tag is included in the incoming
frame.
14.3.2.4 Basic setting Mac Mode
Default value: auto, the currently used value (nomac/mac) is seen in the web interface
Type: All choices available are presented in a drop down menu
Range: auto, nomac, mac
Description: auto means that nomac mode is used if only two ports/interfaces are attached
to the forwarding function and mac mode if three or more ports/interfaces are attached.
nomac means that no switching is made on the mac address, i.e. the FF never looks at the
source/destination MAC address of forwarded packets. It only forwards all frames
according to the settings of VLAN mode (if VLAN mode is customer, otherwise not).
mac means that the FF performs MAC address based forwarding and learning (i.e.
traditional Ethernet switching).

14.3.2.5 Basic setting Mac Aging Time
Default value: 300 (seconds)
Type: integer
Range: 0-65500 (seconds)
Description: Mac Aging Time defines how long time the stored Mac addresses remain
listed before they are removed from the list. The removal of entries can be disabled by
entering the value zero for this parameter. In this case, the entries are never removed.
14.3.2.6 Basic setting Spanning tree
Default value: auto
Type: List
Range: auto, forward, drop, process
Description: The configurable parameter Spanning Tree defines how BPDU packets are
handled by the Forwarding Function. BPDU stands for Bridge Protocol Data Unit and these
frames are exchanged between adjacent Ethernet Switches and carry STP information.
The Spanning Tree parameter can assume values Auto, Forward, Drop and Process
for Nimbra 310/320/380 and 600 nodes. Auto and Forward for other nodes. In the table
below, it is outlined what actions are taken depending on the values of the spanning tree
parameter.



Element Manager User's Manual Ethernet Transport Service (ETS) 246

2013 Net Insight AB, All rights reserved

Nimbra type Spanning Tree VLAN mode Action
Nimbra One
Nimbra 340/340-HD/360
Auto Transparent Forward; All BPDU packets
are forwarded by the
forwarding function
Nimbra One
Nimbra 340/340-HD/360
Auto Customer Forward; All BPDU packets
are forwarded by the
forwarding function
Nimbra One
Nimbra 340/340-HD/360
Forward All All BPDU packets are
forwarded by the forwarding
function
Nimbra 310/320/380
Nimbra 600 nodes
Auto Transparent Process; BPDU packets are
processed by the spanning tree
algorithm
Nimbra 310/320/380
Nimbra 600 nodes
Auto Customer Drop; All BPDU packets are
dropped by the forwarding
function
Nimbra 310/320/380
Nimbra 600 nodes
Forward All All BPDU packets are
forwarded by the forwarding
function
Nimbra 310/320/380
Nimbra 600 nodes
Drop All Drop; All BPDU packets are
dropped by the forwarding
function
Nimbra 310/320/380
Nimbra 600 nodes
Process All Process; BPDU packets are
forwarded or dropped
depending on the spanning tree
algorithm
Figure 255. Spanning tree settings in different nodes, with actions taken.
14.3.2.7 Basic setting Jumbo frames
Default value: on
Type: binary (drop down)
Range: on or off
Description: The parameter Jumbo frames must be set to On, if over sized packets
should be accepted. In this case, frames with up to 9208 bytes are accepted. In case the
parameter is set to Off, frames up to sizes 1518 bytes untagged and 1522 bytes Q-tagged
are supported. The default setting of the parameter is On.
14.3.2.8 Basic setting Fault propagation
Default value: off
Type: binary (drop down)
Range: on or off
Description: Fault Propagation is a parameter that by default is off, but it must be set to
on if the forwarding function should send out or propagate the alarm indication signal
(AIS) instead of a poor signal. AIS can be generated in two different cases on either the
Ethernet (ETH) or ETS interface; when a degraded signal fault (DEG) is detected or when a
reduced bit rate fault (RBR) is detected. In addition to having the fault propagation
parameter set to on, it is needed to have the Generate AIS on Degraded and/or the
Generate AIS on Reduced Bit Rate parameter set to yes for the interface where the fault
is detected.

Element Manager User's Manual Ethernet Transport Service (ETS) 247

2013 Net Insight AB, All rights reserved
In addition to send AIS if warranted, the fault propagation setting passes on other alarms
through the forwarding function.
It is not presented on Nimbra One, Nimbra 340/340-HD /360.
14.3.3 Forwarding function - Advanced
A number of reserved group MAC addresses, 01-80-C2-00-00-0X (X ranging from 2 to F
hexagonally), should not be used to forward packets to according to IEEE standard 802.1D.
Recently, some applications require this mode of action to be overridden. To support such
applications, it is now possible to configure the forwarding function to drop or forward
packets addressed to these destinations in the advanced configuration web page for a
forwarding function.
Users not familiar with these concepts are strongly encouraged to leave the default settings
intact. This ensures an identical behavior to previous GX releases and the standard.
These settings can only be made on Nimbra 320/380 and Nimbra 600 models.


Figure 256. Configuration of advanced settings of a forwarding function.


Element Manager User's Manual Ethernet Transport Service (ETS) 248

2013 Net Insight AB, All rights reserved
14.3.3.1 Advanced Reserved address 01-80-C2-00-00-02
Default value: drop
Type: binary, selectable from a drop-down menu
Range: drop, forward
Description: This is a reserved address for LACP, Ethernet OAM. Packets to this address
are dropped according to the IEEE 802.1D standard, but this standard can be overridden by
setting this parameter to forward.
14.3.3.2 Advanced Reserved address 01-80-C2-00-00-03
Default value: drop
Type: binary, selectable from a drop-down menu
Range: drop, forward
Description: This is a reserved address for 802.1X PAE. Packets to this address are
dropped according to the IEEE 802.1D standard, but this standard can be overridden by
setting this parameter to forward.
14.3.3.3 Advanced Reserved address 01-80-C2-00-00-04
Default value: drop
Type: binary, selectable from a drop-down menu
Range: drop, forward
Description: This is a reserved address. Packets to this address are dropped according to
the IEEE 802.1D standard, but this standard can be overridden by setting this parameter to
forward.
14.3.3.4 Advanced Reserved address 01-80-C2-00-00-05
Default value: drop
Type: binary, selectable from a drop-down menu
Range: drop, forward
Description: This is a reserved address. Packets to this address are dropped according to
the IEEE 802.1D standard, but this standard can be overridden by setting this parameter to
forward.

14.3.3.5 Advanced Reserved address 01-80-C2-00-00-06
Default value: drop
Type: binary, selectable from a drop-down menu
Range: drop, forward
Description: This is a reserved address. Packets to this address are dropped according to
the IEEE 802.1D standard, but this standard can be overridden by setting this parameter to
forward.


Element Manager User's Manual Ethernet Transport Service (ETS) 249

2013 Net Insight AB, All rights reserved
14.3.3.6 Advanced Reserved address 01-80-C2-00-00-07
Default value: drop
Type: binary, selectable from a drop-down menu
Range: drop, forward
Description: This is a reserved address. Packets to this address are dropped according to
the IEEE 802.1D standard, but this standard can be overridden by setting this parameter to
forward.

14.3.3.7 Advanced Reserved address 01-80-C2-00-00-08
Default value: drop
Type: binary, selectable from a drop-down menu
Range: drop, forward
Description: This is a reserved address for Provider Bridge STP. Packets to this address
are dropped according to the IEEE 802.1D standard, but this standard can be overridden by
setting this parameter to forward.

14.3.3.8 Advanced Reserved address 01-80-C2-00-00-09
Default value: drop
Type: binary, selectable from a drop-down menu
Range: drop, forward
Description: This is a reserved address. Packets to this address are dropped according to
the IEEE 802.1D standard, but this standard can be overridden by setting this parameter to
forward.

14.3.3.9 Advanced Reserved address 01-80-C2-00-00-0A
Default value: drop
Type: binary, selectable from a drop-down menu
Range: drop, forward
Description: This is a reserved address. Packets to this address are dropped according to
the IEEE 802.1D standard, but this standard can be overridden by setting this parameter to
forward.

14.3.3.10 Advanced Reserved address 01-80-C2-00-00-0B
Default value: drop
Type: binary, selectable from a drop-down menu
Range: drop, forward
Description: This is a reserved address. Packets to this address are dropped according to
the IEEE 802.1D standard, but this standard can be overridden by setting this parameter to
forward.

Element Manager User's Manual Ethernet Transport Service (ETS) 250

2013 Net Insight AB, All rights reserved
14.3.3.11 Advanced Reserved address 01-80-C2-00-00-0C
Default value: drop
Type: binary, selectable from a drop-down menu
Range: drop, forward
Description: This is a reserved address. Packets to this address are dropped according to
the IEEE 802.1D standard, but this standard can be overridden by setting this parameter to
forward.

14.3.3.12 Advanced Reserved address 01-80-C2-00-00-0D
Default value: drop
Type: binary, selectable from a drop-down menu
Range: drop, forward
Description: This is a reserved address for Provider Bridge GVRP. Packets to this
address are dropped according to the IEEE 802.1D standard, but this standard can be
overridden by setting this parameter to forward.

14.3.3.13 Advanced Reserved address 01-80-C2-00-00-0E
Default value: drop
Type: binary, selectable from a drop-down menu
Range: drop, forward
Description: This is a reserved address for LLDP. Packets to this address are dropped
according to the IEEE 802.1D standard, but this standard can be overridden by setting this
parameter to forward.

14.3.3.14 Advanced Reserved address 01-80-C2-00-00-0F
Default value: drop
Type: binary, selectable from a drop-down menu
Range: drop, forward
Description: This is a reserved address. Packets to this address are dropped according to
the IEEE 802.1D standard, but this standard can be overridden by setting this parameter to
forward.

14.3.4 Forwarding function Diffserv configuration
Prioritization is performed on traffic within the ETS channel, which makes it possible to
provide a differentiated service to the customers. For customers utilizing equipment with or
without VLAN-tagging, diffserv prioritization can be used to prioritize the traffic.
Diffserv user priority is supported according to the standard for prioritizing IP-packets
based on information in the IP DSCP field, [RFC2474] and [RFC2475]. The DSCP field is
a 6-bit field, which is used for packet classification purposes. DSCP stands for
Differentiated Services Code Point. Each DSCP value has to have a defined per-hop-
behavior, which is determined by the defined Flow Group. On the Diffserv configuration
tab (web page), all of these settings have to be made.

Element Manager User's Manual Ethernet Transport Service (ETS) 251

2013 Net Insight AB, All rights reserved
Flow Group is defined as an integer in the range 0-7. Diffserv configuration is applied per
forwarding function, but for each interface there is an option to select Ethernet or Diffserv
prioritization. Hence a Forwarding Function may have some interfaces with Diffserv and
some with Ethernet prioritization, but all interfaces with Diffserv prioritization must have
the same Diffserv (i.e. code point to flow group) configuration. The configuration of DSCP
is made on the forwarding function, under the link Diffserv.
The mapping of flow group to priority is made on the Ethernet interface configuration page.

Figure 257. Priority selection: Two priority modes are allowed (Diffserv and Ethernet) on a
per-Interface basis. Traffic class mapping leads to two queues. The number
after the \ sign is the number of bits used.
Ethernet user priority is supported according to the standard for prioritizing Ethernet frames
based on information in the Ethernet user priority field, which is part of the VLAN tag.
This Priority Code Point (PCP) field only exists in VLAN tagged Ethernet frames and is
standardized by IEEE in [802.3] and [802.1D]. On Ethernet packets without VLAN tag
using Ethernet user priority, a default Ethernet priority is defined on the Advanced
configuration page of the ETH/ETS interface, just below MAC learning.


Element Manager User's Manual Ethernet Transport Service (ETS) 252

2013 Net Insight AB, All rights reserved

Figure 258. Default Ethernet priority is defined for all untagged packets reaching the
forwarding function is made under the ETH interface Advanced tab/Traffic
Priority heading.
Furthermore, on the Ethernet/ETS interface configuration page, there is a mapping of the
eight Flow Groups numbered 0 to 7 into Traffic Classes (numbered 0 or 1). The Traffic
Class is a strict priority function, where all packets in Traffic Class 1 are handled before
any packets in Traffic Class 0 are handled. In other words, dual queues are used.
DSCP or Diffserv configuration is made per forwarding function, under the Diffserv link on
the forwarding function configuration page.

Element Manager User's Manual Ethernet Transport Service (ETS) 253

2013 Net Insight AB, All rights reserved

Figure 259. Diffserv (DSCP) configuration, from code point to flow group, for all
interfaces in a forwarding function using DSCP prioritization. All 64 possible
values for code point are mapped into eight possible values for flow groups (0-
7). These flow groups are later mapped into traffic classes on the ETS/ETH
interfaces.
14.3.5 Forwarding function Spanning tree
One well known problem with Ethernet switching is that packets can travel in loops, never
to reach a final destination. In some topologies, their number can be multiplied per loop and
eventually all available bandwidth is used by this circulating traffic. The Spanning Tree
Protocol is defined to resolve such problems.
Spanning tree is configured first on the basic configuration page for the forwarding
function. Then the details are filled out from the Spanning Tree link on the same web page.
The basic setting Spanning Tree of a forwarding function is described in chapter 14.3.2.6
Basic setting Spanning tree. Depending on the value assigned to the parameter Spanning
Tree, different web interfaces are shown for the details in the spanning tree configuration.

Element Manager User's Manual Ethernet Transport Service (ETS) 254

2013 Net Insight AB, All rights reserved
For spanning tree equal to auto, a transparent forwarding function will have spanning tree
equal to process and a customer forwarding function will have spanning tree equal to drop.
For spanning tree set to drop or forward (or auto resulting in drop or forward), the status
values of spanning tree cannot be read out. This implementation is made on purpose, as the
values are not relevant. For spanning tree set to process (or auto, resulting in process), the
status values are presented.
In both cases, the spanning tree parameters detailed below can be configured. These
parameters are only relevant when spanning tree is in process mode, but allowing them to
be configured prior to usage is a feature that reduces the number of reconfigurations.

Figure 260. Spanning tree configuration for spanning tree mode process

Element Manager User's Manual Ethernet Transport Service (ETS) 255

2013 Net Insight AB, All rights reserved

Figure 261. Configuration page for Spanning tree on a forwarding function in drop mode.
The appearance is identical in forward mode.
The configurable parameters are on this page:
14.3.5.1 Spanning Tree STP version
Default value: RSTP
Type: All choices available are presented in a drop down menu
Range: RSTP, STP
Description: Defines what version of the spanning tree protocol (from IEEE 802.1D) the
forwarding function is using.
14.3.5.2 Spanning Tree -priority
Default value: 8000
Type: Hexadecimal, four digit number, selectable from a drop down menu
Range: One of 0x0000, 0x1000, 0x2000, 0x3000, , 0xF000
Description: A hexadecimal four digit number added before the Mac address to define the
identifier. The addition of this number is a way to change the (numerical) order of the
identifiers.

Element Manager User's Manual Ethernet Transport Service (ETS) 256

2013 Net Insight AB, All rights reserved
14.3.5.3 Spanning Tree Max Age (seconds)
Default value: 20
Type: Integer
Range: 6-40
Description: The maximum allowed time for BPDU packet. If this value is exceeded the
packet is immediately aged out.
14.3.5.4 Spanning Tree Hello time
Default value: 2
Type: Integer, all choices available are presented in a drop down menu
Range: 1, 2
Description: The time between periodic transmissions of BPDU packet from the
ports/interfaces
14.3.5.5 Spanning Tree Forward delay
Default value: 15
Type: Integer
Range: 4-30
Description: The delay used by the forwarding function to change ports/interfaces to
forwarding of BPDU packets
14.3.5.6 Spanning Tree Transmit hold count
Default value: 6
Type: Integer
Range: 1-10
Description: This number designates the highest transmission rate of BPDU packets. A
lower number means a lower transmission rate.

14.3.6 Forwarding function Statistics
From the Statistics link, a summary of basic statistics for all interfaces associated with the
Forwarding Function are shown. There are links to the specific interfaces, for additional
and more detailed interface statistics.

Element Manager User's Manual Ethernet Transport Service (ETS) 257

2013 Net Insight AB, All rights reserved

Figure 262. Forwarding function , statistics web page


Heading Description
Rx Accepted Number of accepted packets
Rx Drops Number of dropped packets
Rx Errors Numbers of errored packets
Tx Sent Number of transmitted packets
Tx Drops Number of transmitted packets
forced to be dropped
Figure 263. Interface statistics, headings

Element Manager User's Manual Ethernet Transport Service (ETS) 258

2013 Net Insight AB, All rights reserved
14.3.7 Nimbra One/340/340-HD/360 limitations for FF
The products Nimbra One, Nimbra 340, Nimbra 340-HD and Nimbra 360 all have common
hardware restrictions for some of the configuration parameters of the forwarding function.
As an example, configuration of a Nimbra 340-HD, is shown below.

Figure 264. Configuration of a forwarding function in Nimbra 340-HD
In the table below, the basic settings for of these products are shown below.

Property Possible values in Nimbra One/340/340-HD/360
Customer ID No restrictions
Purpose No restrictions
VLAN mode Customer (not settable and not presented)
Mac mode nomac (not settable and not presented)
Mac Aging time In the web, only 0 is allowed. The value is irrelevant and not used.
Spanning tree Forward (not settable and not presented)
Jumbo frames off (not settable and not presented)
Fault propagation Should not be presented
Figure 265. Capabilities for Nimbra One, Nimbra 340/340-HD and 360
As can be seen in the web GUI for Nimbra 340-HD, two links from Nimbra 600 are
missing (Advanced and Spanning Tree). This is also true for Nimbra One/340/360.


Element Manager User's Manual Ethernet Transport Service (ETS) 259

2013 Net Insight AB, All rights reserved
14.3.9 ETH and ETS Interfaces
Ethernet switching has two separate interface types that in all important aspects are
configured the same way. They are physical interfaces (Eth) and virtual Ethernet Transport
Service (ETS) interfaces, i.e. end points of Ethernet transport in the DTM network. In the
illustration below, the two types of interfaces are tied together with a forwarding function.
The key parameters of the forwarding function, VLAN mode and Mac mode are
emphasized.

Figure 266. Illustration of the two types of interfaces, connected with each other through a
forwarding function. On all outgoing interfaces, there are two queues or traffic
classes (Hi=1 on config page, Lo=0 on config page).
14.3.9.1 Common configurable basic interface parameters, VLAN mode transparent
On both physical Ethernet and ETS interfaces, most common features are configured in the
same way.
First, these common configurations are described. Later, the differences between the two
interface types are detailed.
As the feature ETS 1+1 requires different firmware than what is needed without it, the web
pages may also differ. In the text, both web interfaces are described.

Ethernet interfaces
(physical)
Hi
Lo
ETS interfaces
(logical channel end points)
Ethernet
frames
Hi
Lo
VLAN mode
Mac mode
8 physical interfaces Up to 247
logical interfaces
Access
side
Network
side
Forwarding
Function
Priority Priority
Hi
Hi
Lo
Lo
Lo
Lo
Hi
Hi

Element Manager User's Manual Ethernet Transport Service (ETS) 260

2013 Net Insight AB, All rights reserved

Figure 267. Configuration of Ethernet basic interface settings.


Element Manager User's Manual Ethernet Transport Service (ETS) 261

2013 Net Insight AB, All rights reserved


Figure 268. Configuration of ETS basic interface settings. The illustration shows the
appearance with firmware NSX0022-ET11. The appearance with firmware
NSX0022-0001 is identical, but only option (none) for the Interface group is
allowed.

Element Manager User's Manual Ethernet Transport Service (ETS) 262

2013 Net Insight AB, All rights reserved
The common interface parameters are:

Parameter Type Default Range
Administrative
status
(Admin status)
Binary Down Down (disabled)
Up (enabled)
Customer ID Integer 0 0-4294967295 (2
32
1)
Purpose Text string Empty text
string
Text string of 255 or less
characters
Forwarding
function
Enumerable list/drop-
down menu
None None (disables switching), All
defined forwarding functions
Figure 269. Common basic Ethernet/ETS/ETS 1+1 interface parameters for a forwarding
function in transparent mode.

14.3.9.2 Additional common configurable basic interface parameters, VLAN mode
customer
For VLAN mode customer, there are some additional parameters to configure on the
interfaces, namely VLAN tagging and VLAN membership.

Figure 270. Basic configuration settings for an Ethernet interface with a forwarding
function in VLAN mode customer set to accept all VLANs.

Element Manager User's Manual Ethernet Transport Service (ETS) 263

2013 Net Insight AB, All rights reserved


Figure 271. Basic configuration settings for an ETS interface with a forwarding function in
VLAN mode customer set to accept all VLANs (1-4094).
Additional configuration parameters to configure for Ethernet and ETS interfaces, when the
forwarding function has value customer are presented in the next table.


Element Manager User's Manual Ethernet Transport Service (ETS) 264

2013 Net Insight AB, All rights reserved

Parameter Default Possible
values
Explanation
Acceptable
frame type
all all
vlantagged
untagged
All frames are accepted
Only VLAN tagged frames are accepted
Only untagged and priority tagged frames are
accepted
Default
VLAN
1 1-4094 If no VLAN tag is attached to a packet, the
default VLAN tag is added where appropriate.
The default VLAN tag is interpreted as an IEEE
802.1Q VLAN tag.
Transmitted
frame type
vlantagged vlantagged,
untagged,
legacy
Describes if tagging is used on flows leaving the
interface, i.e. for the Ethernet interface in the
direction of external equipment and for ETS
interfaces in the direction of the DTM network.
Legacy means that Ethernet frames are sent
unmodified, but that information about the
VLAN ID is sent in the ETS header.
The ETS header is terminated on the ETS
interface in the terminating node. The VLAN ID
information is used for VLAN assignment in the
terminating node.
This is a way for Nimbra One, Nimbra 340,
Nimbra 340-HD and Nimbra 360 to be
compatible with Nimbra 320/380 and Nimbra 600
series nodes.
Figure 272. Common basic Ethernet/ETS interface parameters for a forwarding function in
VLAN mode customer.
The implementation is made as required by IEEE 802.1Q, section 8.4.3
VLAN membership is defined both on the ETH and ETS interfaces. Only packets with
VLAN tags included in the list are passed through the interface.

14.3.9.3 VLAN configuration for ETH and ETS interfaces
To access the configurable parameters, click on the Add VLAN button at the bottom of
the basic ETH/ETS interface configuration page.

Figure 273. VLAN membership configuration on the ETH interface.

Element Manager User's Manual Ethernet Transport Service (ETS) 265

2013 Net Insight AB, All rights reserved


Figure 274. VLAN membership configuration on the ETS interface.

The configurable parameters for VLAN settings are very basic:

Parameter Default Possible values Explanation
VLAN set Empty Integer or a List of integers
in the range 1-4094
Allowed VLAN(s);
Example: 1,3-18,47,62-68, 4092-4094
Customer ID 0 0 - 4294967295 (2
32
1) Integer identifier
Purpose Empty
string
Text string, 0-255
characters
Text string identifier, to the users
disposal
Figure 275. Configurable parameters for VLAN settings
A VLAN id is always interpreted in context of the VLAN mode set for the FF that the
VLAN is associated with. If the FF is in VLAN mode Customer, then the VLAN id is
identical to an IEEE 802.1Q tag.
If VLAN Mode of the FF is set to transparent, there is no need to define a VLAN as the
FF then ignores the VLAN tag.
14.3.9.4 Basic ETS specific interface configuration parameters
An ETS interface behaves much in the same way as a physical Ethernet interface: In
addition to the common parameters, the following parameters are needed specifically for
ETS interfaces, in order to define channels to other ETS interfaces at other nodes.



Element Manager User's Manual Ethernet Transport Service (ETS) 266

2013 Net Insight AB, All rights reserved

Parameter Default value Possible
values
Explanation
Local DSTI (DTM
Service Type Instance)
Lowest unused
integer, starting
with 0.
Integers between 0
and 32767
Must be unique in the
node in order to
identify an object
during connection setup
Destination node None DTM address or
Hostname

Destination DSTI Lowest unused
integer, starting
with 0.
Integers between 0
and 32767
Must match the local
DSTI of the ETS
unicast or multicast
interface defined in the
destination node.
Required capacity
(Mbps)
0.000 Mbps Values between 0
and the trunk
capacity
Capacity allocated to
the channel, rounded
upwards to an integer
slot number.
Source routes (Up to
three)
None All defined source
routes in the node
Used if the defined ETS
channel is source
routed
Interface group None None plus all
defined ETS
interface groups.
The ETS interface
group is used for ETS
1+1 protection.
Figure 276. Specific basic interface parameters for ETS interfaces.




Element Manager User's Manual Ethernet Transport Service (ETS) 267

2013 Net Insight AB, All rights reserved
14.3.9.5 Common configurable advanced interface parameters
The web pages to configure advanced settings for Ethernet and ETS interfaces are shown
below.


Figure 277. Configuration of Ethernet advanced interface settings

Element Manager User's Manual Ethernet Transport Service (ETS) 268

2013 Net Insight AB, All rights reserved


Figure 278. Configuration of ETS advanced interface settings.

Element Manager User's Manual Ethernet Transport Service (ETS) 269

2013 Net Insight AB, All rights reserved
There are some common advanced settings for all Ethernet/ETS interfaces:

Parameter Default Possible values Explanation
MAC Learning On On






Off
Upon reception of a return packet,
the association between source
MAC address and the port/interface
is learnt. Subsequent frames are
only distributed to relevant
interfaces. (on)
MAC Learning disabled (Off)
Default Ethernet
priority
0 Integer, 0-7
Selectable from a
drop-down menu
Assigned on the ingress interface
for untagged packets. Used on the
egress interface if the outgoing
packet is tagged.
Priority mode Ethernet Ethernet
Diffserv
Priority according to Ethernet
Priority according to Diffserv
Default traffic
class
0 0

1
All packets, lacking prioritizing
information, have lowest priority
All packets, lacking prioritizing
information, have highest priority
Flow Group to
Traffic Class
mapping, flow
groups 0 to 7
0 0

1
All packets in the flow group have
lowest priority (traffic class 0)
All packets in the flow group have
highest priority (traffic class 1)
Queueing
parameters
Auto on all
four
parameters
Max frames: auto,
disabled, manual
Max bytes; auto,
manual
With these parameters the length of
the queue on the interface can be
set. If manual is set, an integer must
also be given in the input box for
integers.
Both max frames and max bytes
can be set.
Unless familiar to these settings, it
is recommended to keep the default
settings.
Figure 279. Common advanced Ethernet/ETS interface parameters.
It is strongly recommended that the Queueing parameters are left with their respective
default values. Setting these parameters manually requires skill and experience. Setting max
frames to disable means effectively that all packets are dropped as the queue is turned off.
Setting them to manual and a number controls the maximum number of frames in the queue
and the total number of bytes in those frames. Contact Net Insight for more information.

Element Manager User's Manual Ethernet Transport Service (ETS) 270

2013 Net Insight AB, All rights reserved
14.3.9.6 Specific Advanced Ethernet (ETH) interface parameters
There are some specific Ethernet interface parameters to be configured, in addition to the
auto-negotiation protocol described later.

Parameter Default Possible values Explanation
Force
VLANs
tagged
None Integer, or a
combination and
range of integers.
VLANs included in this field are
tagged, despite the general setting of
Transmitted frame type Untagged
Example: 1,2,5-8,16 tags VLAN 1,2,5
to 8 and 16 on egress traffic.
This field is only available if
Transmitted frame type of the interface
is Untagged
Force
VLANs
untagged
None Integer, or a
combination and
range of integers.
VLANs included in this field are not
tagged, despite the general setting of
Transmitted frame type Tagged
Example: 1,2,5-8,16 untags VLAN
1,2,5 to 8 and 16 on egress traffic.
This field is only available if
Transmitted frame type of the interface
is Tagged
Figure 280. Ethernet specific Interface parameters.

Autonegotiation of interface rate, protocols etc is made with the Autoneg feature on the
Ethernet interface set to On. This is also an Ethernet interface specific advanced feature.



Figure 281. Autonegotiation of an Ethernet interface

Element Manager User's Manual Ethernet Transport Service (ETS) 271

2013 Net Insight AB, All rights reserved
The settings of the auto-negotiation features are:

Parameter Default Possible
values
Explanation
Auto
negotiate
On On
Off
The autonegotiate feature is enabled
The autonegotiate feature is disabled
Advertised
speed
Auto Auto

1000
100
10
100,10
1000,100
1000,10
1000,100,10
All HW supported speeds (by module and SFP) are
advertised. Recommended
Only 1 Gbps is advertised
Only 100 Mbps is advertised
Only 10 Mbps is advertised
100 and 10 Mbps are advertised
1000 and 100 Mbps are advertised
1000 and 10 are advertized
1000, 100 and 10 Mbps are advertised
Advertised
duplex
Auto Auto

Full
Half
All supported duplex forms are advertised.
Recommended
Only full duplex is advertised
Only half duplex is advertised
Advertised
flow-control
Auto Auto

PAUSE
ASM_DIR
PAUSE,
ASM_DIR
All supported flow-control forms are advertised.
PAUSE flow-control is advertised
ASM_DIR flow-control is advertised
PAUSE and ASM_DIR are advertised. For a
description, see IEEE802.3-2005 Section Two.
Figure 282. Auto negotiation parameters for Ethernet interfaces. The available parameter
values are always presented in the web interface, but could vary depending on
interface type.


Element Manager User's Manual Ethernet Transport Service (ETS) 272

2013 Net Insight AB, All rights reserved
14.3.9.8 Advanced ETS specific interface configuration parameters
Under the Connection re-establishment header, the parameters of the exponential back-off
algorithm and the reconnect time out can be set. Also, the connection can be defined as
having Precedence, which means that in case an intermediary node goes down, this
particular connection is taken down with priority. This also means that a replacement
connection is typically set up with priority (i.e. it has precedence over other connections).
Minimum interval: The starting value of the back-off algorithm. When a connection is
torn down, a first connection re-establishment attempt is made immediately; if the attempt
fails, another attempt is made after the minimum interval of the back-off algorithm. The
default setting is 10 ms.
Maximum interval: The end value of the algorithm, 50000 ms. The re-establish
mechanism will wait no longer than 50000 ms to re-establish a channel. If not successful,
another attempt is made after 50000 ms.
14.3.10 Fault management for ETH and ETS interfaces
The goal with the fault management and performance management system is to monitor the
behavior of a service. If a fault occurs somewhere that affects the delivered service, an
alarm shall be raised in exactly one node and performance management shall register the
error in exactly one object. This means that all faults must be detected and handled in one
well-defined object and all other objects that transport the service must be notified that a
fault has been detected and handled in another object.
The fault propagation mechanism makes sure that if a fault is detected that affects a service
somewhere along the path that the service takes, then that fault is propagated upstream and
downstream from the point where the fault was detected. This makes it possible for failover
mechanisms to react.
In SDH networks, the fault propagation is done with the AIS (Alarm Indication Signal) and
RDI (Remote Defect Indication) signals. The same terminology has been used in our
implementation of fault propagation.
However, the physical Ethernet interfaces cannot be regarded as separate source and sink
interfaces as Ethernet services are often bi-directional. There is also a relationship between
the signals in both directions. There have been recent additions to the Ethernet standards of
AIS and RDI signals, but since these are not yet widely supported, we have chosen to not
support them now. As long as AIS and RDI is not supported, the only way to signal across
an Ethernet port that there is an error further down the path is to force the Ethernet link
down and that is how we have chosen to distribute the message. The response affects the
signal in both directions, which makes the fault state of the two directions dependent on
each other.

Element Manager User's Manual Ethernet Transport Service (ETS) 273

2013 Net Insight AB, All rights reserved
14.3.11 Configuration of Fault management for ETH and ETS
interfaces

Figure 283. Configuration of ETH and ETS interfaces, illustrated with multicast ETS
interface. Parameter Expect channel is only present on the ETS interface and
this is the only parameter differing between ETS and ETH interfaces.
There are some parameters to configure on the interfaces:
14.3.11.1 Degraded detection
Default value: off on source interfaces, on on sink interfaces
Type: Boolean, on or off
Range: on or off
Defined on object: eth-source, eth-sink, ets-source, ets-sink
Description: For the fault Degraded to be detected on the interface, this parameter must
be set to on. If the fault is detected on a sink interface, the parameter Fault Propagation on
the FF must be set to on for the fault to pass the FF and exit the node on the source
interface, towards the destination node as an AIS signal.

Element Manager User's Manual Ethernet Transport Service (ETS) 274

2013 Net Insight AB, All rights reserved
14.3.11.2 Degraded threshold in packets/s
Default value: 0 on source interfaces, 100 on sink interfaces
Type: integer
Range: 1- 4294967295 (2
32
-1)
Defined on object: eth-source, eth-sink, ets-source, ets-sink
Description: For source interfaces: As Enabled Degraded detection is by default off,
this parameter is by default 0. When Enabled Degraded detection is set to on, the value
of this parameter cannot be 0; hence the default setting must be changed to an integer value
must be assigned to the degraded threshold in the range specified above.
For sink interfaces, this parameter is by default 100.

14.3.11.3 Degraded period in seconds
Default value: 7
Type: integer
Range: 2-10, selectable from a drop down menu
Defined on object: eth-source, eth-sink, ets-source, ets-sink
Description: The degraded period is the number of consecutive seconds, with an error
level exceeding the degraded threshold value, required to generate the degraded signal
fault.

14.3.11.4 Minor Reduced Bit Rate threshold in Mbps
Default value: 0
Type: real value
Range: 0.000001- 99999.998 Mbps
Defined on object: eth-source, eth-sink, ets-source, ets-sink
Description: The effectively used bit rate is measured once per second. If the used bit rate
falls below a used defined threshold (i.e. this parameter), a minor reduced bit rate threshold
alarm with severity minor is raised.

14.3.11.5 Major Reduced Bit Rate threshold in Mbps
Default value: 0
Type: real value
Range: 0.000001- 99999.998 Mbps
Defined on object: eth-source, eth-sink, ets-source, ets-sink
Description: The effectively used bit rate is measured once per second. If the used bit rate
falls below a used defined threshold (i.e. this parameter), a major reduced bit rate threshold
alarm with severity major is raised.
If both reduced bit rate thresholds have been configured to 0, the detection of reduced bit
error rate is disabled.

Element Manager User's Manual Ethernet Transport Service (ETS) 275

2013 Net Insight AB, All rights reserved
14.3.11.6 Generate AIS on Reduced Bit Rate
Default value: no
Type: Boolean, yes or no
Range: yes or no
Description: Setting this parameter to yes generates an AIS on all ports on the
forwarding function except the port which generated the Reduced bit rate fault. It is
necessary to configure the forwarding function with Fault propagation set to on as
otherwise no AIS is passed through the forwarding function despite this setting.
14.3.11.7 Expect channel
Default value: no
Type: Boolean, no or yes
Range: no or yes
Defined on object: ets-sink for multicast
Description: This parameter determines if the lack of a channel should be regarded as an
anomaly or not. If it is set to yes, an alarm should be generated if no channel terminates
on the ETS interface. This alarm is, however, not implemented in GX4.8.
14.3.11.8 Generate AIS on Degraded
Default value: no
Type: Boolean, yes or no
Range: yes or no
Defined on object: eth-sink, ets-sink
Description: Setting this parameter to yes generates an AIS on all ports on the other
side of the forwarding function that are configured to receive the signal. It is necessary to
configure the forwarding function with Fault propagation set to on as otherwise no AIS is
passed through the forwarding function.

14.3.12 Destinations configuration for ETS multicast channels
ETS multicast channels are, when admin status is set to up, operational even without
destinations. The destinations are added one by one from the Destinations tab on the ETS
configuration page. For unicast channels, the (single) destination is configured on the basic
configuration page of the interface.

Element Manager User's Manual Ethernet Transport Service (ETS) 276

2013 Net Insight AB, All rights reserved

Figure 284. Addition of multicast destinations is made from the Destinations tab on the
Ethernet ETS Interfaces <Specific interface> web page.
Addition of new interfaces is made from the Add destination button. Here the admin
status of the destination is set together with destination node, destination DSTI and source
routes to the destination. Add source routes as needed. New source routes are defined under
All connections Source routes.
To add a destination, click on the Add Destinations button and define:

Parameter Possible values
Administrative status Up or Down
Destination DTM node DTM address or hostname of the destination node
Destination DSTI DSTI of the connection at the destination node
Figure 285. Configuration parameters for Ethernet/ETS destinations for multicast
connections.



Figure 286. Add destination configuration web page.

Element Manager User's Manual Ethernet Transport Service (ETS) 277

2013 Net Insight AB, All rights reserved
14.3.13 Spanning tree configuration for ETH and ETS
interfaces
The spanning tree parameter can have four different values, auto, forward, process and
drop configured as a basic setting on the forwarding function. The spanning tree
functionality is by default set to auto. This means process for VLAN mode transparent
and drop for VLAN mode customer. The exception to this rule is for the fixed ports of
Nimbra One/340/340-HD/360 and Fast Ethernet/Gigabit Ethernet Access Modules where
auto means forward. What is actually running is shown on the detailed spanning tree
page of the interfaces.
Spanning tree is enabled by force on the configuration page of the forwarding function by
setting the value of the parameter Spanning Tree to process. Spanning tree for the
forwarding function is configured from a tab on the forwarding function basic configuration
page. In the illustration below, the FF spanning tree configuration page is shown.
Some spanning tree settings are made on the interface configuration page. This part of the
configuration page is identical for ETH and ETS interfaces.

Figure 287. Detailed spanning tree configuration on the ETH/ETS interface
Spanning tree is specified in IEEE 802.1D from 2004. Net Insight adheres to the
specification. The configurable spanning tree parameters on the interfaces are Port path
cost, priority, edge port and point-to-point. The parameters are explained in the table
below:


Element Manager User's Manual Ethernet Transport Service (ETS) 278

2013 Net Insight AB, All rights reserved

Parameter Default Range Type Comment
Port path
cost
Auto Auto, Manual (0-
200000000)
Auto or Integer
(manual)
Manual enables an input
field.
Priority 80 Drop-down;
0x00,10,..,F0
Two hexadecimal
digits
Drop-down menu
Edge port Auto Auto, True, False Boolean variable Drop-down menu
Point-to-
point
Auto Auto, True, False Boolean variable Drop-down menu
Figure 288. Configurable spanning tree parameters for an ETS/ETH interface.
Port path cost defines a cost associated with the particular port/ interface. If two or more
interfaces are available for a connection to a particular node, the spanning tree algorithm
ensures that only the low-cost interface is used.
Priority defines the priority of the particular interface. Two hexadecimal digits plus two
hexadecimal 0s are added as a prefix on the MAC address of the interface to create the
identifier. The lowest identifier interface is used, in case there are two interfaces with equal
cost.
Edge port is a Boolean variable used to signal if the interface is connected to equipment not
part of the DTM Ethernet universe (true). Auto means that auto detection is used.
Point-to-point is a Boolean variable used to signal if the interface is connected to a link and
a node with a point-to-point connection. Auto means that auto detection is used.
14.3.14 Statistics overview tab on the ETS configuration page
On the ETS configuration page, there is one tab under which statistical values for the ETS
interface could be found.
This in only present if there is a destination defined.

Figure 289. Statistics for a specific ETS interface

Element Manager User's Manual Ethernet Transport Service (ETS) 279

2013 Net Insight AB, All rights reserved
If statistics for all ETS interfaces are wanted, it is best found from Ethernet ETS
Interfaces and the Statistics tab.

Figure 290. ETS statistics for all ETS interfaces in a particular node.

Element Manager User's Manual Isochronous Transport Service (ITS) 280

2013 Net Insight AB, All rights reserved
15 Isochronous Transport
Service (ITS)
15.1 Overview
The ITS menu handles configuration of all Isochronous Transport Services (ITS). These
services are used to create 3G/HD/SD-SDI, JPEG2000, ASI, AES/EBU, MADI, PDH and
Sonet/SDH tunnels through the DTM network.
The services can be of two different types, unicast or multicast. Unicast ITS services
transport a stream through the network from one originating to one terminating interface.
Multicast ITS services transport a stream from an ingress interface to multiple egress
interfaces.


DTM
Video access
interface
Remote
DTM
i/f
Local
DTM
i/f
Video access

interface
DTM channel
PDH
PDH
Video
Video

Figure 291. Video traffic through a unicast DTM channel.



Figure 292. ASI,TTP connection, unicast

Interface
asi-2:1
Interface
asi-1:2
itso-1
TTP Source
itsi-2
TTP Sinc
Originating
Connection Terminating
Connection

Element Manager User's Manual Isochronous Transport Service (ITS) 281

2013 Net Insight AB, All rights reserved

DTM
Originating
DTM
node
HD-SDI
HD-SDI HD-SDI
Terminating
DTM node
Terminating
DTM node

Figure 293. HD-SDI video transported with a DTM multicast channel to two destinations
This chapter describes how to configure ITS services, both uni- and multicast. The main
web page for ITS is shown below.


Figure 294. ITS main page

Element Manager User's Manual Isochronous Transport Service (ITS) 282

2013 Net Insight AB, All rights reserved
The sub-sections of the Isochronous Transport Services (ITS) are:
Source TTPs: Configuration and editing of ITS source TTPs (Trail Termination Points), i.e
the logical starting points of the connections.
Sink TTPs: Configuration and editing of ITS sink TTPs (Trail Termination Points), i.e the
logical end-points of the connections.
Interface: Configuration and editing of the interfaces.
Perf. monitor: Shortcut to the Performance monitoring menu, which is seen in chapter
Performance monitoring.
To configure ITS services, start with creating TTPs with destinations (i.e. ITS sources).
Continue with matching TTPs at the various ITS destinations (one or multiple). After
finishing the configuration, all ITS channels should be set up if the required bandwidth is
available.
15.2 Protection
15.2.1 Nomenclature
15.2.1.1 Closed ended protection
Closed ended protection is a protection case where one video stream enters the Nimbra
network. It is split at the entry point and routed two separate ways through the Nimbra
network to the destination node. At the destination node both streams come together and an
egress stream is designed by either one of the streams or a combination of the two streams.
15.2.1.2 Open ended protection
Open ended protection is a protection case where two video streams enter the Nimbra
network separately. The streams can either be identical, only split outside the Nimbra
network, or different. Nevertheless, in the last case one stream is acting as protection for the
other stream.
15.2.1.3 Standby protection
Standby protection is a protection case which can be used for both closed and open ended
protection. The protection type uses only one of the two available video streams for the
output stream on the outgoing access interface. Monitoring of the state of the stream that is
not used, makes sure that switchover is only made to a working stream.
15.2.1.4 Hitless protection
Hitless protection is a special protection case that only can be configured in the closed
ended protection case. Hitless protection uses both streams incoming to the sink interface,
where packets from both streams are used to synthesize a common video stream.

Element Manager User's Manual Isochronous Transport Service (ITS) 283

2013 Net Insight AB, All rights reserved
15.2.2 ITS protection cases
15.2.2.1 Type 1 protection

Figure 295. Source stream sent through DTM network along two independent routes for
type 1 protection. This protection type only supports unicast connections and
standby protection on sink Interface B.

15.2.2.2 Type 2 protection- open ended

Figure 296. Open ended type 2 protection of ITS streams. This protection type supports
standby protection with uni- or multicast streams.


Element Manager User's Manual Isochronous Transport Service (ITS) 284

2013 Net Insight AB, All rights reserved
15.2.2.3 Type 2 protection - closed ended

Figure 297. Stream sent through the DTM network along two independent routes for type
2 protection (closed-ended). This protection type supports standby protection
with uni- or multicast streams. This configuration is the single source (closed
ended) version (previous case).

15.2.2.4 Type 3 protection - open ended

Figure 298. Type 3 protection, open ended case, of ASI and JPEG2000 streams. This
protection type supports standby protection with uni- or multicast streams.


DTM
Route One
Route Two
Source TTP A1
Source TTP A2
Sink TTP B1
Interface A Interface B

Element Manager User's Manual Isochronous Transport Service (ITS) 285

2013 Net Insight AB, All rights reserved
15.2.2.5 Type 3 protection closed ended


Figure 299. Source stream sent through DTM network along two different routes for type
3 hitless or standby protection. This configuration is the closed ended version
of type 3 protection (previous case). Hitless or standby protection is
configured on the sink interface.
15.3 Interface settings for Access Modules
The configurable settings for the access cards are found either under ITS or Ethernet
headings in the web browser interface. The interface settings of ITS services are found
under ITS Interfaces web page, described below.
15.3.1 Configurable interface parameters
15.3.1.1 Enable signal speed autosensing
Default value: Ticked
Type: Binary
Range: Ticked, Unticked
Description: If ticked, the rate of the input signal is automatically detected. If configured
for another rate, the signal is still passed through the channel if the signal fits the allocated
bandwidth, otherwise an alarm is raised. Example: if a channel is defined between two
nodes as HD-SDI (1.485 Gbps), SD-SDI signals are nevertheless passed on (270 Mbps) but
3G-SDI signals (2.970 Gbps) are not passed on. If unchecked, the signal is not passed on
and an alarm is raised.
Autosense cannot be changed when the TTP has admin status up.

15.3.1.2 Output action on signal fail
Default value: None
Type: Binary
Range: None, Mute
Description: If set to Mute, the failed signal muted (i.e. shut down) on the output access
interface. Muting may speed up fail-over switching time when using external fail-over
switches. If set to None, different actions are taken depending on service type.

DTM
Route One
Route Two
Source TTP A1
Source TTP A2
Sink TTP B1
Sink TTP B2
Interface A Interface B

Element Manager User's Manual Isochronous Transport Service (ITS) 286

2013 Net Insight AB, All rights reserved
Type of service Action
PDH AIS sent on the output access interface if the channel is up and there is an
error. Mute action otherwise.
SDH AIS sent on the output access interface if the channel is up and there is an
error. Mute action otherwise.
ASI IDLE packets are sent on the output access interface if the channel is up and
there is an error. Mute action otherwise.
AES/EBU, MADI Mute action, possibly involving some extra noise from short cables, if the
channel is up and there is an error. Mute action otherwise.
SDI, Native Mute action, possibly involving some extra noise from short cables, if the
channel is up and there is an error. Mute action otherwise.
SDI, JPEG
compressed
Repeat of last frame or black picture (in case no frame has been received) if
the channel is up. If the channel is down, a black picture is generated.
Figure 300. Actions taken on the output access interface for the parameter Output action
on signal fail having value None.
15.3.1.3 Ignore TS-packet synchronization errors
Default value: Unchecked
Type: Binary
Range: Checked, Unchecked
Description: If checked, synchronization errors in the Transport Stream packets are
ignored. This option will allow the Nimbra equipment to accept ASI streams which do not
comply with accepted international standards. The robustness of the transport stream cannot
be guaranteed in this mode and it should be seen as a customer specific workaround for
deficiencies in equipment from other vendors. The setting should be made on the receive
side of the connection.

15.3.1.4 Output mode
Default value: Auto
Type: One of Auto, Spread, Burst
Range: Auto, Spread, Burst
Description: Determines how MPEG TS packet bytes are transmitted from the ASI TX
port.
In Burst mode, all bytes of a TS packet are sent back-to-back in one burst. IDLE bytes are
sent between bursts to adapt the bit stream.
In Spread (spread-byte) mode, TS packet bytes are spread out as evenly as possible, with
IDLE stuffing between TS packets as well as between bytes within a TS packet.
In Auto mode, Burst or Spread mode is automatically selected to be the same as detected on
the corresponding ASI RX port. In general, Spread mode is the preferred mode.
Output mode is only available for ASI signals.



Element Manager User's Manual Isochronous Transport Service (ITS) 287

2013 Net Insight AB, All rights reserved
15.3.1.5 Suppress alarms
Default value: None
Type: Drop-down menu
Range: None, Warning, All
Description: None does not suppress any alarms; Warning suppresses only alarms with
severity warning and All suppress all alarms.

15.3.1.6 Loopback
Default value: None
Type: one of None, Line or DTM
Range: None, Line, DTM
Description: None sets No loopback; Line sets Line side traffic is in loopback mode, i.e.
traffic arriving at the Rx interface is sent back on the associated Tx interface; DTM sets
DTM side traffic in loopback mode, i.e. traffic exiting on a Tx interface is looped as closed
to the interface and returned on the corresponding Rx interface. Some modules may not
have all capabilities.

15.3.1.7 Interface mode
Default value: SDH
Type: One of SDH, Sonet
Range: SDH, Sonet
Description: This parameter determines if the interface works in SDH or Sonet mode.

15.3.1.8 JPEG 2000 encoding
Default value: disabled
Type: binary; enabled, disabled
Range: enabled or disabled
Description: This parameter determines if the interface works in SDH or Sonet mode.

15.3.1.9 Signal format
Default value: none
Type: drop-down menu; the various alternatives are read out from hardware
Range: SDI, HD-SDI, HD-SDI (U.S.), 3G-SDI, 3G-SDI (U.S.)
Description: Identified signal format on the interface, either through speed autosensing or
through hard setting on the interface by the operator. Only available if speed autosensing is
disabled and JPEG encoding is enabled.



Element Manager User's Manual Isochronous Transport Service (ITS) 288

2013 Net Insight AB, All rights reserved
15.3.1.10 Transmit sync source
Default value: Loop
Type: one of Loop, Internal
Range: Loop, Internal
Description: This parameter determines which clock is used for the outgoing signal from
the interface. When Transmit sync source is set to Loop, the clock from the incoming signal
on the interface is extracted and used as clock for the outgoing signal. When Transmit sync
source is set to Internal, the node internal clock is used as clock for the outgoing signal.

15.3.1.11 SDH Sync message
Default value: 15
Type: Integer, 0-15
Range: 0-15
Description: Sets the outgoing Synchronization Status Message (SSM) in byte S1. The
default value is 15. (Do not use for synchronization!)
If Transmit sync source is set to Internal, the value 11 should be set (G.813 Option I)

15.3.1.12 H1 SS bits
Default value: 10
Type: Two bits in any combination
Range: One of 00, 01, 10, 11
Description: Sets the two SS bits (bit 5 and 6) in the H1 byte. These bits typically should
not need to be changed from the default setting. If the external equipment attached to the
interface is older, there might be a need to change them but this should be elaborated in the
documentation for the external equipment.

15.3.1.13 Interface to monitor
Default value: None
Type: interface
Range: None, sdi-1:1-1:8, asi-1:1-1:8 etc depending on module and slot position.
Description: This parameter describes which interface is monitored, i.e. which incoming
or outgoing video stream that is duplicated and sent to the configured interface.

15.3.1.14 Enable front panel selection button
Default value: No
Type: Binary
Range: Yes or No
Description: This parameter describes if the front panel selection button is activated or
not. The front panel button is only available on some interface like the 8 x ASI module for
Nimbra 300 nodes.


Element Manager User's Manual Isochronous Transport Service (ITS) 289

2013 Net Insight AB, All rights reserved
15.3.1.15 Interface direction to monitor
Default value: In
Type: Binary
Range: In, Out
Description: This parameter describes which direction is monitored for the selected
interface.

15.3.1.16 PDH signal to transport
Default value: DS3
Type: DS3 or E3
Range: DS3 or E3
Description: PDH type to transport, configurable per interface.

In the cross-reference table below, it is shown on which modules/fixed interfaces the
different configurable parameters are found.


Element Manager User's Manual Isochronous Transport Service (ITS) 290

2013 Net Insight AB, All rights reserved

Configurable
parameter
E
1
/
T
1

A
c
c
e
s
s

M
o
d
u
l
e

4

x

D
S
3
/
E
3

A
c
c
e
s
s

M
o
d
u
l
e

4

x

O
C
-
3
/
S
T
M
-
1

A
c
c
e
s
s

M
o
d
u
l
e

S
D
I

V
i
d
e
o

A
c
c
e
s
s

M
o
d
u
l
e

8

x

S
D
I

V
i
d
e
o

A
c
c
e
s
s

M
o
d
u
l
e

A
S
I

T
r
a
n
s
p
o
r
t

A
c
c
e
s
s

M
o
d
u
l
e

8

x

A
S
I

T
r
a
n
s
p
o
r
t

A
c
c
e
s
s

M
o
d
u
l
e

8

x

A
E
S
/
E
B
U

A
c
c
e
s
s

M
o
d
u
l
e

F
i
x
e
d

A
S
I

i
n
t
e
r
f
a
c
e

(
N
i
m
b
r
a

3
4
0
)

F
i
x
e
d

H
D
-
S
D
I

i
/
f

(
N
i
m
b
r
a

3
4
0
-
H
D
)

Enable signal speed
autosensing

Output action on signal fail x x x x x x x x x
Output mode x
Ignore TS-packet
synchronization errors

Suppress alarms x x x x x x x x x x
Loopback x x x x x x x
Interface mode x
Transmit sync source x
Synchronization Status
Message (SSM)
x
H1 SS bits x
Interface to monitor M M M
Interface direction to
monitor

Enable front-panel selection
button
M M M
PDH signal to transport x
Figure 301. Cross-table Configuration parameters vs. Access Module for Nimbra 300. M
designates monitor interface.


Element Manager User's Manual Isochronous Transport Service (ITS) 291

2013 Net Insight AB, All rights reserved
Configurable
parameter
8

x

o
r

8

x

3
G
b
p
s

V
i
d
e
o

A
c
c
e
s
s

M
o
d
u
l
e
,

H
D
/
S
D

o
r

3
G

S
D
I

c
o
n
f
i
g
u
r
e
d

i
n
t
e
r
f
a
c
e

8

x

A
S
I
/
A
E
S

A
c
c
e
s
s

M
o
d
u
l
e
,

8

x

o
r

8

x

3
G
b
p
s

V
i
d
e
o

A
c
c
e
s
s

M
o
d
u
l
e
,

A
S
I

c
o
n
f
i
g
u
r
e
d

i
n
t
e
r
f
a
c
e

8

x

A
S
I
/
A
E
S

A
c
c
e
s
s

M
o
d
u
l
e
,

A
E
S
/
M
A
D
I

c
o
n
f
i
g
u
r
e
d

i
n
t
e
r
f
a
c
e
s

J
P
E
G
2
k

V
i
d
e
o

A
c
c
e
s
s

M
o
d
u
l
e

v
2
,

H
D
/
S
D

o
r

3
G

S
D
I

c
o
n
f
i
g
u
r
e
d

i
n
t
e
r
f
a
c
e

J
P
E
G
2
k

V
i
d
e
o

A
c
c
e
s
s

M
o
d
u
l
e

v
2
,

J
P
E
G

e
n
c
o
d
i
n
g

J
P
E
G
2
k

V
i
d
e
o

A
c
c
e
s
s

M
o
d
u
l
e

v
2
,

J
P
E
G

d
e
c
o
d
i
n
g

Enable signal speed
autosensing x
x x x
Output action on signal fail x x x x x x
Output mode x
Ignore TS-packet
synchronization errors x

Suppress alarms x x x x x x
Loopback x x x x x x
JPEG 2000 encoding x
Signal format x
Interface mode
Transmit sync source
Synchronization Status
Message (SSM)

H1 SS bits
Interface to monitor M M M
Interface direction to
monitor M M M

Enable front-panel selection
button

PDH signal to transport
Figure 302. Cross-table Configuration parameters vs. Access Module for Nimbra 600. M
designates monitor interface.


Element Manager User's Manual

2013 Net Insight AB, All rights reserved
15.4 Setting up a

Tip:

Configure the terminating connections before the originating
connections
50 ms. This tip o

15.4.1 Terminating Connection
Follow the ITS Sink
Figure 303. ITS setup
Click on Add TTP to configure the Termination; see figure below.
Figure 304. ITS, TTPs, Add page
On this ITS Sink TTPs
originating (source). If type is set to terminating,
type is selected, the parameters
Isochronous Transport Service (ITS)
2013 Net Insight AB, All rights reserved
Setting up a unicast ITS tunnel
Configure the terminating connections before the originating
connections; when doing so the establishment time is 5 ms compared to
This tip only works for unicast connections.
Terminating Connection
Sink TTPs link; a page appears like the page below.
ITS setup sink TTPs main terminating page
to configure the Termination; see figure below.
TTPs, Add page
Sink TTPs Add TTP web page, type can be set to terminating (sink)
If type is set to terminating, Mode cant be set. As soon as terminating
parameters for mode become irrelevant and are grayed out.
Isochronous Transport Service (ITS) 292
5 ms compared to


terminating (sink) or
As soon as terminating
.

Element Manager User's Manual Isochronous Transport Service (ITS) 293

2013 Net Insight AB, All rights reserved
The local interface drop down menu lists all possible available options for the local
interface. The selected interface is tied to the connection and TTP.
When the add button is selected, the sink TTP is configured/defined in a web page.

Figure 305. Configuration of terminating TTP of an ITS unicast channel.
15.4.1.1 Reference information
Administrative status is either Down (when the TTP is disabled) or Up (when attempts to
establish a channel to this TTP is made). Customer ID (integer) and Purpose are freely
configurable fields. In the local interface drop down menu, all available interfaces are
listed. DSTI is the DTM Service Type Instance, a unique number per service type, direction
and node. A default DSTI is selected by the system but it can be user modified. The DSTIs
dont have to be consecutive.
Suppress alarms can have valued none, warning or all. Active channel when protected can
be set to first or second. This is the defined channel. It is grayed out if it cannot be set.
Note that there are two terminating connections connected to one single TTP. This is
because of the open ended 1+1 protection feature, described in chapter Source Routing.
When finished; Click OK or Apply.

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
15.4.2 Originating Unicast Connection

Note:

Even if there are 2 in + 2 out connectors on the 340
there is only one HD
configured. One of the two in or out connectors can be used at a time!
The preferred in and out HD
web. Both out ports can be used for a multicast HD
Follow the ITS TTPs link; a page appears like the page below.
Click on Add TTP
Figure 306. Definition of the
In the web page, the same settings as for the terminating TTP can b
Make the settings required (Originating/Unicast), u
interface and click on the

Isochronous Transport Service (ITS)
2013 Net Insight AB, All rights reserved
Originating Unicast Connection
Even if there are 2 in + 2 out connectors on the 340-HD for HD-SDI,
only one HD-SDI in and one out stream that can be
configured. One of the two in or out connectors can be used at a time!
The preferred in and out HD-SDI streams should be configured via the
web. Both out ports can be used for a multicast HD-SDI stream.
TTPs link; a page appears like the page below.
to enter the setup page. A page similar to the page below will appear.
Definition of the ITS Source TTP.
In the web page, the same settings as for the terminating TTP can be made.
Make the settings required (Originating/Unicast), use the drop-down menu to set the local
interface and click on the Add button.
ransport Service (ITS) 294
SDI,
configured. One of the two in or out connectors can be used at a time!
SDI streams should be configured via the
to enter the setup page. A page similar to the page below will appear.

down menu to set the local

Element Manager User's Manual Isochronous Transport Service (ITS) 295

2013 Net Insight AB, All rights reserved


Figure 307. ITS, TTPs, create connection page
In addition to the settings made for the termination, in the originating node the destination
DTM node with associated destination DSTI are needed. The required capacity must be
specified, either as a bandwidth (0.8-212 Mbps) for ASI or SDI (270 Mbps), SDI
compatible (from Nimbra 600 to Nimbra One/300), HD-SDI (1.485 or 1.485/1.001 Gbps),
3G-SDI (2.970 or 2.970/1.001 Gbps) or SDI compressed with the requested (compressed)
bandwidth.
We must also specify if we use protection and the source route(s) we use (if any). If a
source route is used, this is indicated on the web page with the text currently used within
parenthesis to the right of the source route itself.
See chapter Source Routing for additional information on how to setup a source route.
Once both terminating and originating nodes are configured, the channel is established if
enough transport bandwidth is available.


Element Manager User's Manual

2013 Net Insight AB, All rights reserved
Note:

The lower part Destination DSTI is the
DSTI number.
match what is used for the sink TTP.
15.5 Setting up a multicast ITS tunnel
A multicast ITS tunnel is a channel from one
channel is unidirectional,
is transmitted in the back direction.
In our example, an HD
terminated on several interfaces in node20.
Figure 308. Setup of Multic
15.5.1 Considerations for multicast channels
There are two things that must be considered when a combination of source
multicast channels are used.
First, if source routes are used for multiple destinations, the source routes must be
of each other and the exact same definition has to be used in both cases. For instance, if one
source route specifies the interfaces, the interfaces must also be specified in all other source
routes used to set up the channel
Figure 309. Example of source r
In the figure above, let sr C from node1 to node2 via node4 and node3 be defined by
iov129
sdi2:5
sdi2:6
Ingress
DSTI 2
Isochronous Transport Service (ITS)
2013 Net Insight AB, All rights reserved
The lower part Destination DSTI is the sink (destination) TTP
DSTI number. To establish the connection, this number must
match what is used for the sink TTP.
Setting up a multicast ITS tunnel
A multicast ITS tunnel is a channel from one IN interface to multiple OUT interfaces. The
channel is unidirectional, i.e. traffic only flows from the source to the destination. No traffic
is transmitted in the back direction.
In our example, an HD-SDI channel is set up between iov129 and iov132. The channel is
terminated on several interfaces in node20.
Setup of Multicast Channel.
Considerations for multicast channels
There are two things that must be considered when a combination of source-routes and
multicast channels are used.
First, if source routes are used for multiple destinations, the source routes must be
of each other and the exact same definition has to be used in both cases. For instance, if one
source route specifies the interfaces, the interfaces must also be specified in all other source
used to set up the channel.
Example of source routes used for multiple destinations.
In the figure above, let sr C from node1 to node2 via node4 and node3 be defined by
v129
itso-2
itso-3
iov132
itsi-3
itsi-4
Isochronous Transport Service (ITS) 296
interfaces. The
i.e. traffic only flows from the source to the destination. No traffic
. The channel is

routes and
First, if source routes are used for multiple destinations, the source routes must be subsets
of each other and the exact same definition has to be used in both cases. For instance, if one
source route specifies the interfaces, the interfaces must also be specified in all other source

In the figure above, let sr C from node1 to node2 via node4 and node3 be defined by
sdi4:3
sdi4:4
Egress
DSTI 3
Egress
DSTI 4

Element Manager User's Manual Isochronous Transport Service (ITS) 297

2013 Net Insight AB, All rights reserved

Figure 310. Definition of sr C in node1.

The source routes to node3 (sr B) and node4 (sr A) must then be defined as

Figure 311. Definition of sr B in node1, a subset of sr C.


Figure 312. Definition of sr A in node1, a subset of sr B and sr C.

Element Manager User's Manual Isochronous Transport Service (ITS) 298

2013 Net Insight AB, All rights reserved
Another consideration is that multiple destinations in a multicast channel cannot use source
routes in such a way that the channel defined enters an intermediate node on two different
interfaces. This is interpreted by the network as a disallowed loop.
This is displayed in the picture below. This setting of multiple source routes is thus NOT
ALLOWED!

Figure 313. Illustration of a disallowed combination of source routes for a multicast
channel. sr C and sr D both enter node3 on two different interfaces (3:1 and
3:2), which is interpreted as a rooting loop and is disallowed.
Problems of this type are avoided if DRP is used for routing of multicast channels. DRP
routing of multicast channels have other, possibly undesirable, features though. With the
DRP protocol, routing is made destination per destination and conservation of bandwidth is
not considered. In other words, bandwidth allocation may not be optimal.
15.5.2 Originating Multicast Connection
Follow the Source ITS TTPs link and the Add TTP button; a page appears like the page
below.

Figure 314. ITS basic setup for source TTP and multicast service.

Element Manager User's Manual Isochronous Transport Service (ITS) 299

2013 Net Insight AB, All rights reserved
Chose the type of interface (originating) and type of mode (unicast/multicast), use the pull-
down menu to select the local interface and click on the Add button.
A webpage similar to page below will appear.

Figure 315. ITS source TTPs basic configuration web page
In addition to common parameters with the unicast case, there is an extra link to
Destinations, where the details about the various destinations are entered.
Click on the Destinations in the middle of the page, to set the multicast destinations for the
originating connection. This page shows the nodes that are configured in this connection.

Figure 316. ITS Source configure TTP destinations web page.
In order to define the destinations, click on the button Add destination and enter the
parameters for the sink TTPs. In the following figures, the two destinations of our example
are shown.


Element Manager User's Manual Isochronous Transport Service (ITS) 300

2013 Net Insight AB, All rights reserved
Click on Add destination to add a new node.


Figure 317. Destinations to a source ITS TTPs are defined.
Set Administrative status to Up, Destination DTM to iov132 and destination DSTI to 3
and 4 for the two different cases. The destinations have now been added. In this case, we
have not used source routes.
When all the nodes are added click on the Cancel button, a list of the destinations is shown
in the Destination page. As the terminating side is not yet defined, the destinations are listed
as down.

Element Manager User's Manual Isochronous Transport Service (ITS) 301

2013 Net Insight AB, All rights reserved

Figure 318. Destinations defined in the originating TTP.
15.5.3 Terminating Multicast Connection
Follow the ITS Sink TTPs link and the button Add TTP; a page appears like the page
below.

Figure 319. ITS TTPs create Multicast page
Select the type to Terminating and use the pull-down menu to set the local interface.
Click on the Add button. Repeat for all destinations.
15.6 Editing/deleting Connections
Follow the ITS Source TTP or ITS Sink TTPs link and the click on the connection to
be edited or deleted. Make the change and click on OK or Apply if it is an edit; set admin
status to down first, the delete the TTP with the delete button if the TTP is to be removed.


Element Manager User's Manual

2013 Net Insight AB, All rights reserved
15.7 Advanced settings

Note:

Before changing the max and min settings in a production network
please consult Net Insight support services fir
Follow the ITS Source
link, open the Advanced
Figure 320. Edit ITS
This menu controls the parameters of the exponential
establishment), including the re
Suppress primary source route alarm
not selected, an alarm with severity warning is raised when the primary source rou
used.
Minimum interval: 10 ms. The starting value of the
of the connection, the system tries to re
unsuccessful, after a wait of
a longer time according to the algorithm.
Maximum interval: 50000 ms. The end value of the algorithm. The re
mechanism will wait not longer than 50000 ms to re
Precedence: This drop
if it is torn down fast (and is re
node.
If required, back up the configuration changes;
Configuration handling
Isochronous Transport Service (ITS)
2013 Net Insight AB, All rights reserved
Advanced settings
Before changing the max and min settings in a production network
please consult Net Insight support services first.
Source TTPs link, open an originating TTP by following the TTP name
Advanced link; a page appears like the page below.
Edit ITS Source TTP Advanced Configuration
This menu controls the parameters of the exponential back-off algorithm (Connection re
, including the re-connect time out.
Suppress primary source route alarm: This tick box is selected by default. In case it is
not selected, an alarm with severity warning is raised when the primary source rou
: 10 ms. The starting value of the back-off algorithm. After a tear down
the system tries to re-establish the connection immediately. If
unsuccessful, after a wait of 10 ms a second attempt is made. A third attempt is made after
a longer time according to the algorithm.
: 50000 ms. The end value of the algorithm. The re-establish
mechanism will wait not longer than 50000 ms to re-establish a channel.
drop-down menu determines if the connection has precedence or not
if it is torn down fast (and is re-established fast). Maximum five are recommended
If required, back up the configuration changes; see chapter Maintenance, section
Configuration handling for details.
Isochronous Transport Service (ITS) 302
, open an originating TTP by following the TTP name

(Connection re-
: This tick box is selected by default. In case it is
not selected, an alarm with severity warning is raised when the primary source route is not
algorithm. After a tear down
If
d attempt is made after
establish
precedence or not, i.e.
. Maximum five are recommended per
, section

Element Manager User's Manual Isochronous Transport Service (ITS) 303

2013 Net Insight AB, All rights reserved
15.7.1 Embedded ASI in HD-SDI channels
A feature of release GX4.4 and later is that ASI channels can be embedded in HD-SDI
channels. These channels use all the reserved bandwidth of an HD-SDI channel (1.485
Gbps) in the network at all times, but the feature enables mixing of video formats.
To set up an embedded ASI channel in an HD-SDI channel, start with the HD-SDI channel
and reserve 1.485 Gbps capacity. Below is an illustration of the ITS Source TTPs basic
configuration web page.


Figure 321. Configuration of the HD-SDI channel that is used for transportation of an ASI-
signal. Requested capacity is 1.485 Gbps.
After configuration of the HD-SDI channel, the ASI stream is simply attached to the proper
port. A look on the ITS -> interface web page of the source interface then shows the
bandwidth used by the ASI stream.

Element Manager User's Manual Isochronous Transport Service (ITS) 304

2013 Net Insight AB, All rights reserved

Figure 322. ITS Interfaces web page of the inserted ASI stream.
15.8 Configuration of ASI video stream an ITS
configuration example
Configuration starts on the terminating (destination) TTP. This is true whether the service is
uni- or multicast. Having defined the terminating TTPs, the originating TTP is defined.
After all TTPs are defined and the channel is established, some additional configuration can
be made on the interfaces.
In this text, an example of an ASI stream configuration is given. From this example,
configuration of all ASI streams and all ITS services in general can be understood.
An ASI stream from interface asi-2:1 in iov129 to interface asi-4:5 in iov132 is used as
example. It is also shown, how to set up an ASI multicast stream from interface asi-2:1 in
iov129 to multiple interfaces in iov132.
15.8.1 Configuration of the Terminating TTP
All configuration of Isochronous transport services (ITS) is made from the ITS page. To
configure the terminating TTP, go to the sink TTPs web page and click on the Add TTP
button. Select the interface on which the outgoing stream is wanted.
Note that, once Terminating Type is selected, mode selection is grayed out. This is because,
for the terminating TTP, configuration is identical for uni- and multicast service.

Element Manager User's Manual Isochronous Transport Service (ITS) 305

2013 Net Insight AB, All rights reserved

Figure 323. ASI Configuration example




Figure 324. The Add TTP configuration page for ITS. In this example, a terminating TTP
on local interface asi-4:5 in iov132 is set up.
Clicking on Add takes the user to the configuration page of the sink TTP.


Element Manager User's Manual Isochronous Transport Service (ITS) 306

2013 Net Insight AB, All rights reserved

Figure 325. Configuration parameters for the terminating TTP.


Element Manager User's Manual Isochronous Transport Service (ITS) 307

2013 Net Insight AB, All rights reserved

Parameter Type Possible values Default Comment
Administrative
status
Drop-down Up/Down Down
Toggle admin Check box Ticked/Not ticked Not ticked Toggle admin sets admin status
to down, does the requested
action and sets admin status to
up.
Customer ID Integer 0 - 4294967295
(2
32
-1)
0 Identifier
Purpose String Character string Empty
string
Identifier
Local interface Drop-down Any interface in
the list
Selected
interface

DSTI Integer 0-32767 (2
15
-1) Lowest
available
Unique per service type,
direction and node
Suppress
alarms
Drop-down None/Warning/All None Should alarms associated with
the TTP be suppressed
Connection
protection
Drop-down On/Off Off Should two streams be allowed
to terminate on the TTP?
Active channel
when protected
Drop-down First/Second First What channel should be used
when two channels ends at the
TTP.
Figure 326. Configuration parameters for terminating TTP
15.8.2 Configuration of originating TTP for a unicast
connection
The originating TTP is where you configure if the channel is uni- or multicast. If you define
the channel as multicast, the different destinations are entered under a separate link
(Destinations) on the configuration web page of the source TTP. This link can be viewed as
a subpage of the configuration page, only needed for multicast streams. Multicast streams
are described separately.
To configure a unicast connection, click on ITS Source TTPs and the Add TTP button
on the page. Select originating type, unicast mode and local interface asi-2:1, according to
Figure 327. When the add button is clicked, the configuration page of the originating TTP
is presented (Figure 328).


Element Manager User's Manual Isochronous Transport Service (ITS) 308

2013 Net Insight AB, All rights reserved

Figure 327. The Add TTP configuration page for ITS. In this example, an originating TTP
on local interface asi-2:1 is set up.

Element Manager User's Manual Isochronous Transport Service (ITS) 309

2013 Net Insight AB, All rights reserved
Configuring the originating TTP is made from the following web page.



Figure 328. Configuration parameters for ASI service on an originating TTP

Element Manager User's Manual Isochronous Transport Service (ITS) 310

2013 Net Insight AB, All rights reserved
The configuration parameters are defined in the table below.

Parameter Type Possible values Default
value
Comment
Administrative
status
Drop
down
Up/Down Down
Customer ID Integer 0 - 4294967295 (2
32
-1) 0 Identifier
Purpose String Character string Empty
string
Identifier
Local interface Drop-
down
Any interface in the
list
Selected
interface

DSTI Integer 0-32767 (2
15
-1) Lowest
available
Unique per service
type, direction and
node
Destination
DTM node
String Defined hostname or
DTM address
None
Destination
DSTI
Integer 0-32767 (2
15
-1) 0 Number unique
per service type,
direction and node
Requested
capacity (Mbps)
Real
number
0.8-212 Mbps 2 Mbps Capacity dedicated
to the stream
Connection
protection
Drop-
down
On/Off Off Should two
streams originate
from the TTP?
First/Second
Channel Source
Route
Drop-
down
All defined source-
routes in a node. Three
routes are available per
channel.
(none) Three source
routes possible to
select (in priority
order) per channel
Figure 329. Configuration parameters for originating TTP
15.8.3 Configuration of the originating TTP for a multicast
service
The multicast case is very similar to the unicast case; the difference is that you define all
destinations from the link Destinations. This is also where you specify source-routes in the
multicast case.

Element Manager User's Manual Isochronous Transport Service (ITS) 311

2013 Net Insight AB, All rights reserved

Figure 330. Configuration of a multicast originating TTP. Destinations are defined under
the Destinations link on the configuration page.


Figure 331. Configuration of a new destination for a multicast channel. New destinations
can be added while the channel is active. They are specified with destination
node/DSTI and optional source routes. All configuration parameters here are
already defined in the unicast case (Figure 329).

Element Manager User's Manual Isochronous Transport Service (ITS) 312

2013 Net Insight AB, All rights reserved
15.8.4 Configuration of interfaces
The physical ASI interface is a 75 Ohm BNC connector.
This interface has three parameters to configure; Suppress alarms, Loopback and
Output action on signal fail on all interfaces. In some cases the settings are not relevant;
the parameters are presented in the table below. To configure the interface, click on ITS
Interfaces and the particular interface.

Figure 332. Interface configuration


Element Manager User's Manual Isochronous Transport Service (ITS) 313

2013 Net Insight AB, All rights reserved

Parameter Type Value range Default Comment
Output action on
signal fail
Drop-down None, Mute None If set to Mute, the failed signal
muted (i.e. shut down) on the
output access interface. Muting
may speed up fail-over switching
time when using external fail-
over switches. If set to None,
different actions are taken
depending on service type.
Suppress alarm Drop-down None, warning, all None Should alarms be disabled on the
interface? None means no,
Warning means all alarms with
severity warning and all means
all alarms.
Loopback Drop-down None, DTM None Is it allowed to use the physical
port for both ingress and egress
(DTM) or not (None) traffic?
TS packet sync
errors
Tick box Ticked, not ticked Not
ticked

Output mode Drop-down Auto, Spread,
Burst
Auto How should the outgoing ASI
stream be sent, in spread or burst
mode?
Figure 333. Interface configuration parameters
Table for Output action on signal fail and possible services.

Type of service Action
PDH AIS sent on the output access interface if the channel is up and there is an
error. Mute action otherwise.
SDH AIS sent on the output access interface if the channel is up and there is an
error. Mute action otherwise.
ASI IDLE packets are sent on the output access interface if the channel is up and
there is an error. Mute action otherwise.
AES/EBU, MADI Mute action, possibly involving some extra noise from short cables, if the
channel is up and there is an error. Mute action otherwise.
SDI, Native Mute action, possibly involving some extra noise from short cables, if the
channel is up and there is an error. Mute action otherwise.
SDI, JPEG
compressed
Repeat of last frame or black picture (in case no frame has been received) if
the channel is up. If the channel is down, a black picture is generated.
Figure 334. Actions taken on the output access interface for the parameter Output action
on signal fail having value None.



Element Manager User's Manual Isochronous Transport Service (ITS) 314

2013 Net Insight AB, All rights reserved
15.9 Configuration of MADI streams
In a MADI application example, the transport of a MADI signal (AES10) can be set up
between one source and one destination point (unicast) or between one source and multiple
destinations (multicast) in a Nimbra network. The service type can be set up without
protection or with a defined 1 + 1 protection. This stream uses 245 slots in the DTM frame
and is displayed with speed 125 Mbps.
It requires the ASI/AES module for Nimbra 600 with MADI firmware running on the
module. This firmware only supports MADI signals; it does neither support regular
AES/EBU streams nor DVB-ASI video streams. To install MADI firmware, look in the Up-
and Downgrading chapter (chapter 22).


Figure 335. Timing of a MADI signal on ingress and egress interfaces. The 48 kHz is a
reference clock, which needs to be attached to the outgoing interface module
of the terminating Nimbra node.
Observe that MADI does not use the through-timing of all other services. Instead, a
separate clock is needed to synchronize the egress traffic of the stream.
15.9.1 Configuration process
Configuration starts on the terminating TTP, whether the service is uni- or multicast.
Having previously defined all terminating TTPs for the service, the originating TTP is
defined. After all TTPs are defined and the channel is established, some parameters on the
interfaces can be set. The parameters can also be configured during the setup process.
In this text, an example of a MADI stream is given.
A MADI stream from interface aes/ebu-8:1 in node iov044 to interface aes/ebu-6:1 in node
iov018 is used as example. It is shown, starting from this example, how to set up a MADI
multicast stream from interface aes/ebu-1:1 in node iov044 to multiple interfaces in node
iov018.
It is necessary for the proper extraction of the MADI signal from the terminating TTP that
an output reference clock is configured on the ITS Interfaces Timing link in the web
interface and that this reference is attached to the interface. In addition, the output interface
of the MADI signal must also be configured. All these configurations are discussed under
Configuration of interfaces.
15.9.1.1 Configuration of the Terminating TTP
All configuration of Isochronous transport services (ITS) is made from the ITS link. To set
up the terminating TTP, follow the TTPs link and click on the Add TTP button. Select
the interface on which the outgoing stream is wanted.
Note that, once Terminating Type is selected, mode selection is grayed out. This is because,
for the terminating TTP, configuration is identical for uni- and multicast service.
MADI
48 kHz
Nimbra Nimbra MADI
DTM
48 kHz

Element Manager User's Manual Isochronous Transport Service (ITS) 315

2013 Net Insight AB, All rights reserved

Figure 336. AES/EBU Configuration example with a MADI stream between interface
aes/ebu-8:1 in iov044 and aes/ebu-6:1 in iov018.


Figure 337. The Add TTP configuration page for ITS. In this example, a terminating TTP
on local interface aes/ebu-8:1 in iov018 is set up.
Clicking on Add takes the user to the configuration page of the terminating TTP.



Element Manager User's Manual Isochronous Transport Service (ITS) 316

2013 Net Insight AB, All rights reserved

Figure 338. Configuration parameters for the terminating TTP.
The configurable parameters are defined in the table below.


Element Manager User's Manual Isochronous Transport Service (ITS) 317

2013 Net Insight AB, All rights reserved
Parameter Type Possible values Default Comment
Administrative
status
Drop-
down
Up/Down Down
Toggle admin Check
box
Ticked/Not ticked Not
ticked
Toggle admin sets admin status to
down, does the requested action and
(re)sets admin status to up.
Customer ID Integer 0 - 4294967295
(2
32
-1)
0 Identifier
Purpose String Character string Empty
string
Identifier
Local interface Drop-
down
Any interface in
the list
Selected
interface

DSTI Integer 0-32767 (2
15
-1) Lowest
available
Unique per service type and node
Suppress alarms Drop-
down
None/Warning/All None Suppression of alarms on the
terminating TTP is possible. The
options are:
None No alarm suppression
is made
Warning Suppression of alarms
with severity Warning
is made
All All alarms are
suppressed
Connection
protection
Drop-
down
On/Off Off The terminating TTP can allow for
1+1 protection. If it does so, two
channels are terminated on the TTP.
One of the channels is forwarded to
the outgoing access interface, while
the other is used as backup.
Active channel
when protected
Drop-
down
First/Second First When the channel is 1+1 protected,
one of the channels (the Active
channel when protected) is
forwarded to the access interface.
With admin status up, the
forwarded channel can be changed
manually by altering this parameter.
Figure 339. Configuration parameters for terminating TTP
15.9.1.2 Configuration of originating TTP for a unicast connection
The originating TTP is where you configure if the channel is uni- or multicast. If you define
the channel as multicast, the different destinations are entered under a separate link
Destinations on the configuration web page. This link can be viewed as a subpage of the
configuration page, only needed for multicast streams. Multicast streams are described
later.
To configure a unicast connection, click on ITS Source TTPs and the Add TTP button
on the page. Select originating type (unicast mode) and local interface (in the example
aes/ebu-8:1), according to Figure 340. When the add button is clicked, the configuration
page of the originating TTP is presented (Figure 341).

Element Manager User's Manual Isochronous Transport Service (ITS) 318

2013 Net Insight AB, All rights reserved

Figure 340. The Add TTP configuration page for ITS. In this example, an originating TTP
on local interface aes/ebu-8:1 is set up.
Configuration the originating TTP is made from the following web page.

Figure 341. Configuration parameters for a unicast MADI stream on the originating TTP

Element Manager User's Manual Isochronous Transport Service (ITS) 319

2013 Net Insight AB, All rights reserved
The configuration parameters are defined in the table below.

Parameter Type Range Default Comment
Administrative
status
Drop
down
Up/Down Down
Toggle admin Check
box
Ticked/Not ticked Not ticked Toggle admin sets admin
status to down, does the
requested action and (re)sets
admin status to up.
Customer ID Integer 0 - 4294967295
(2
32
-1)
0 Identifier
Purpose String Character string Empty string Identifier
Local interface Drop-
down
Any interface in
the list
Selected
interface

(Local) DSTI Integer 0-32767 (2
15
-1) Lowest
available
Unique per service type and
node
Destination
DTM node
String Defined hostname
or DTM address
None
Destination
DSTI
Integer 0-32767 (2
15
-1) 0 Number unique per service
type and node
Connection
protection
Drop-
down
On/Off Off The originating TTP can
allow for 1+1 protection. If
it does so, two channels are
originating on the TTP, with
one common destination
TTP.
First/Second
Channel Source
Route
Drop-
down
All defined source-
routes in a node.
Three routes are
available per
channel.
(none) Three source routes possible
to select (in priority order)
per channel. If no source
route is selected, DRP
routes the channel(s). For
1+1 protection, source
routes are strongly
recommended.
Figure 342. Configuration parameters for originating TTP. The bandwidth is not
configured as it is always 125 Mbps.

Element Manager User's Manual Isochronous Transport Service (ITS) 320

2013 Net Insight AB, All rights reserved
15.9.1.3 Configuration of the originating TTP for a multicast service
The multicast case is very similar to the unicast case; the difference is that you define all
destinations from the link Destinations. This is also where you specify source-routes in the
multicast case.

Figure 343. Configuration of a multicast originating TTP. Destinations are defined
thorough the Destinations link on the configuration page.


Figure 344. Configuration of a new destination for a multicast channel. New destinations
can be added while the channel is active. They are specified with destination
DTM node/DSTI and optional source routes. All configuration parameters here
are already defined in the unicast case (Figure 329).

Element Manager User's Manual Isochronous Transport Service (ITS) 321

2013 Net Insight AB, All rights reserved
15.9.2 Configuration of interfaces
15.9.2.1 Basic settings
The physical interface of the ASI/AES module, which is used to transport MADI services,
is a 75 Ohm BNC connector. The basic interface settings is defined from the ITS
Interfaces Basic (Settings), illustrated here with node iov018.

Figure 345. Basic interface settings configuration
This interface has three parameters to configure; Output action on signal fail, Suppress
alarms and Loopback. In some cases the settings are not relevant, but as originating and
terminating interface are configured the same way they are nevertheless presented. The
parameters are presented in the table below.


Element Manager User's Manual Isochronous Transport Service (ITS) 322

2013 Net Insight AB, All rights reserved

Parameter Type Range Default Comment
Output action on
signal fail
Drop-down None,
Mute
None If set to Mute, the failed signal muted (i.e.
shut down) on the output access interface.
Muting may speed up fail-over switching time
when using external fail-over switches. If set
to None, different actions are taken
depending on service type.
Suppress alarm Drop-down None,
warning,
all
None Suppression of alarms on the terminating TTP
is possible. The options are:
None No suppression is made
Warning Suppression of alarms
with severity Warning is made
All All alarms are suppressed
Loopback Drop-down None,
DTM
None The physical port can be used for both ingress
and egress traffic (DTM Loopback) or this
possibility can be disabled (None)
Figure 346. Interface configuration parameters
Table for output action on signal fail:

Type of service Action
PDH AIS sent on the output access interface if the channel is up and there is an
error. Mute action otherwise.
SDH AIS sent on the output access interface if the channel is up and there is an
error. Mute action otherwise.
ASI IDLE packets are sent on the output access interface if the channel is up and
there is an error. Mute action otherwise.
AES/EBU, MADI Mute action, possibly involving some extra noise from short cables, if the
channel is up and there is an error. Mute action otherwise.
SDI, Native Mute action, possibly involving some extra noise from short cables, if the
channel is up and there is an error. Mute action otherwise.
SDI, JPEG
compressed
Repeat of last frame or black picture (in case no frame has been received) if
the channel is up. If the channel is down, a black picture is generated.
Figure 347. Actions taken on the output access interface for the parameter Output action
on signal fail having value None.


Element Manager User's Manual Isochronous Transport Service (ITS) 323

2013 Net Insight AB, All rights reserved
The basic interface settings are defined from the ITS Interfaces Basic Settings. On
the basic settings page for the interface, there are also a number of variables presented.

Variable Possible values Comment
Operational
status
Up, Down
Description Interface
description
A description of the interface is given.
Speed Positive value The currently used bandwidth over the interface.
Purpose String with 0-255
characters
Default value is the empty string.
Errored
blocks
Zero or positive
value
This counter registers the number of errored blocks since
it was last read out from the interface. Observe that
refreshing the web browser resets the counter.
Unaligned
seconds
Zero or positive
value
This counter registers the number of seconds that the
output interface does not find proper alignment of the
stream and its stream synchronization source on the
module of the outgoing video stream. The counter is
cumulative and is not reset to zero when good (i.e.
synchronized) seconds occur. Observe that refreshing the
web browser resets the counter.
Defects All possible
defects on the
interface
All present defects on the interface are presented.
Observe that refreshing the web browser reads out
present defects again.
Figure 348. Variables presented on the interface configuration page.

15.9.3 Timing
MADI timing is defined under the tab ITS Interfaces Timing.


Figure 349. Timing definition for an interface. There are two parameters to define, Output
reference and Operating mode.
The parameters Operating mode and Output reference exist both on the source (input) and
sink (output) interfaces. On the source interface, output reference is irrelevant and is
ignored and Operating mode must be configured as Audio transport. For sink interfaces,
the parameters are described in the table below.

Element Manager User's Manual Isochronous Transport Service (ITS) 324

2013 Net Insight AB, All rights reserved

Parameter Type Value range Default Comment
Output
reference
Drop-
down
aes/ebu-x:1 to
aes/ebu-x:8
aes/ebu-x:8 Output reference to which the signal
is aligned. This interface has to
have a word clock timing source
attached.
Operating
mode
Drop-
down
Audio
transport
Word clock
timing source
Audio transport Audio transport forwards a MADI
stream. Word clock timing source is
used for timing source input.
Figure 350. Interface configuration parameters. They exist both for source and sink
interfaces, but are irrelevant for source interfaces.
In the following, three examples of the interface configuration are made.


Figure 351. For the outgoing signal from interface aes/ebu-6:3, the timing is obtained from
the timing provider in aes/ebu-6:8. The configuration of this timing provider is
shown in the next picture.


Element Manager User's Manual

2013 Net Insight AB, All rights reserved

Figure 352. Configuration of the timing
6:8. The timing provider uses a word
output reference parameter is irrelevant

Figure 353. Configuration of the MADI signal on the incoming interface. Here,
provider is
is irrelevant on
15.10 Configuration of interfaces
From GX4.10, test generators for
and 3G-SDI) are available. When the test generator is active, no channel can originate or
terminate on the interface.
cannot be enabled.

Note:

When a test generator is enabled on an interface, no channel can
originate or terminate on that interface.
using the interface, the test generator cannot be enabled.
Isochronous Transport Service (ITS)
2013 Net Insight AB, All rights reserved
Configuration of the timing reference, which is attached to interface aes/ebu
The timing provider uses a word-clock timing source. In this case, the
output reference parameter is irrelevant and thus grayed out.
Configuration of the MADI signal on the incoming interface. Here,
provider is used. Interface 8:8 is the default output reference, a parameter that
is irrelevant on an input interface.
Configuration of interfaces - Test Generator
, test generators for MADI, AES, ASI and all SDI versions (SD-SDI, HD
SDI) are available. When the test generator is active, no channel can originate or
terminate on the interface. If channels are already using the interface, the test generator
When a test generator is enabled on an interface, no channel can
originate or terminate on that interface. When channel(s) is/are
using the interface, the test generator cannot be enabled.
Isochronous Transport Service (ITS) 325

reference, which is attached to interface aes/ebu-
In this case, the

Configuration of the MADI signal on the incoming interface. Here, no timing
, a parameter that
Test Generator
SDI, HD-SDI
SDI) are available. When the test generator is active, no channel can originate or
If channels are already using the interface, the test generator
When a test generator is enabled on an interface, no channel can

Element Manager User's Manual

2013 Net Insight AB, All rights reserved

In order to access all these test generators, go to the link
Generator.

Note:

The test generator integrated in the web interface was developed
to internal Net Insight requirements only. Although it may be
used for others, there is no warranty
explicit
Generator entirely on their own risk.
15.10.1 AES
Under the Interface link to
Figure 354. Test generator configuration for an AES interface.
The configurable parameters

Parameter Type
Enable Binary
Sample
rate
Drop-
down
Figure 355. Configurable AES interface test generator parameters.

Isochronous Transport Service (ITS)
2013 Net Insight AB, All rights reserved
In order to access all these test generators, go to the link ITS Interfaces Test
The test generator integrated in the web interface was developed
to internal Net Insight requirements only. Although it may be
used for others, there is no warranty neither implicit nor
explicit for such usage. External users use the integrated Test
Generator entirely on their own risk.
Interface link to the specific AES interface, a Test generator link is available.
Test generator configuration for an AES interface.
parameters of the AES test generator are shown in the table below.
Default Range Explanation
Disabled Enabled
Disabled
The test generator on the interface is
The test generator on the interface is
48.0 kHz 32.0 kHz
44.1 kHz
48.0 kHz
88.2 kHz
96.0 kHz
176.4 kHz
192.0 kHz
Sample rate for the (non-configurable
test tone.
Configurable AES interface test generator parameters.

Isochronous Transport Service (ITS) 326
Test
The test generator integrated in the web interface was developed
link is available.

of the AES test generator are shown in the table below.
interface is on
interface is off
configurable) 1 kHz

Element Manager User's Manual Isochronous Transport Service (ITS) 327

2013 Net Insight AB, All rights reserved
15.10.2 MADI
There is only one parameter to configure for a MADI test generator and that is to enable the
test generator itself.

Figure 356. Configuration of MADI test generator
The test generator generates valid MADI frames and can be aligned to the output reference.
The test generator operates at the nominal sampling rate 175 ppm.
15.10.3 ASI
Under the Interface link to the specific ASI interface, a Test generator link is available. This
link is available on the 8 x Video Access Module, 8 x 3 Gbps Video Access Module and the
JPEG2000 Video Access Modules.

Figure 357. Test generator configuration for an ASI interface.

Element Manager User's Manual Isochronous Transport Service (ITS) 328

2013 Net Insight AB, All rights reserved
The configurable parameters are described in the table below.

Parameter Type Default Range Comment
Enable Binary Disabled Enabled
Disabled
The interface is enabled (checkbox selected)
The interface is disabled (checkbox not selected)
Pattern Drop
down
inc
inc



all0


all1
The test pattern sent from the output port.
inc means that the null-packet traffic stream is
stuffed with bits in an incrementing pattern
0x01, 0x02, , 0xff. Then the pattern repeats
itself.
all0 means that generated null-packet transport
stream consists of only zero bits
all1 means that the stream consists of only
binary ones
Speed Real 5.000
Mbps
0.8-212 This is the transport stream bit rate (in Mbps).
Forward
Error
Correction
(FEC)
Binary Disabled Enabled


Disabled
The interface is enabled, which means that 16
FEC bytes are added to all packets (204 bytes
instead of 188 bytes)
The interface is disabled, i.e. no FEC is added
Multi
Frequency
Network
(MFN)
Binary Disabled Enabled

Disabled
MFN is enabled, i.e. all sync bytes are set to
0x47
SFN is enabled, i.e. every eighth sync byte is set
to 0xb8. All other sync bytes are set to 0x47.
Figure 358. Configurable ASI interface test generator parameters.
15.10.4 SDI
Under the Interface link to the specific SDI interface, a Test generator link is available.

Figure 359. Test generator configuration for an SDI interface.

Element Manager User's Manual Isochronous Transport Service (ITS) 329

2013 Net Insight AB, All rights reserved
The configurable test generator parameters are described in the table below.

Parameter Type Default Possible
values
Comment
Enable Binary Disabled Enabled
Disabled
The test generator on the interface is
enabled/disabled (ticked/not ticked)
Format Drop-
down
576/50/i 480/59/i
576/50/i
720/23/p
720/24/p
720/25/p
720/29/p
720/30/p
720/50/p
720/59/p
720/60/p
1080/23/p
1080/24/p
1080/25/p
1080/29/p
1080/30/p
1080/50/i
1080/50/p
1080/59/i
1080/59/p
1080/60/i
1080/60/p
# of active lines/# of fields per
second/interlaced (i) or (p)
progressive picture
Observe that some values are only
possible for HD-SDI or 3G-SDI
Pattern Drop-
down
matrix black
matrix
color75
black means a digital black pattern;
matrix means pathological equalizer
and PLL pattern; color75 means 75
% color bar pattern. pattern is
increasing with one per packet.
Figure 360. Configurable Test generator on an SDI interface.
15.11 Configuration of STM-1 Access streams
Regular STM-1 streams may be transported through the DTM infrastructure. In this case, a
point-to-point connection is defined between two interfaces on 4 x OC-3/STM-1 Access
modules, which are available for Nimbra One (NPS0020-3S31) and Nimbra 300 series
(NPS0020-XS31). These unidirectional connections are easily set up from the web
interface.
In the illustrated example, two streams have been defined within the STM-1 access module.
Like with other ITS services, they are best defined at the termination node first. Go to ITS
TTPs and follow the Add TTP link.

Element Manager User's Manual Isochronous Transport Service (ITS) 330

2013 Net Insight AB, All rights reserved

Figure 361. Configuration of a terminating TTP of an STM-1 access connection between
two STM-1 interfaces. Observe that the connection is unidirectional; if
bidirectional connections are preferred they must be defined in both directions.


Figure 362. Configuration of the terminating TTP. The configuration parameters are
identical as for the previously described ITS streams.
The corresponding originating TTP is defined the same way as other originating streams.

Element Manager User's Manual Isochronous Transport Service (ITS) 331

2013 Net Insight AB, All rights reserved

Figure 363. Creation of an originating TTP for an STM-1 access.
The configuration is made according to the previously described pattern for ITS services.

Figure 364. Configuration of the originating TTP for an STM-1 access module, using a
local interface of vc4/sts3c-4:1

Element Manager User's Manual Isochronous Transport Service (ITS) 332

2013 Net Insight AB, All rights reserved
Configuration from the Advanced link is made as previously described for other ITS
services. What is different is how the interface is configured.
Both the originating and terminating interfaces must also be configured. From the link ITS
Interfaces, there is a possibility to configure the OC-3/STM-1 interface carrying the
payload interfaces used for ITS TTPs.
Configuration of the vc4/sts3c-4:1 looks like this:

Figure 365. Basic configuration of the vc4/sts3c-4:1. The parameter Suppress alarms can
have values None (default = no suppression), Warning (= suppression of
alarms with severity warning) and all (=suppression of all alarms).
The sonet/sdh configuration page gives the user a chance to set the two H1 bits (to 00,
01, 10 or 11).

Figure 366. Sonet/SDH settings of H1 SS bits.


Element Manager User's Manual Isochronous Transport Service (ITS) 333

2013 Net Insight AB, All rights reserved
15.12 Configuration of JPEG 2000 services
On both source and sink side of the connection, one TTP object and one interface object
must be configured. In order to complete the channel as fast as possible, it is beneficial to
start with configuration of the terminating TTP/interface and continue with the source
module. This is the way the setup is described.
15.12.1 Enabling the encoder
Encoding is configured per interface and not per module.
Autosense enables all transport (audio, ANC, VBI). If all bandwidth is not required,
whatever bandwidth not required can be removed after autosense has been selected.
In order to work properly, autosense has to be enabled on both the source and sink
interfaces.
The default setting is that the encoder is disabled and that autosensing is enabled. In order
for the module to carry a JPEG encoded stream, the encoder has to be enabled. The setting
is made on the encoder interface web page.

Figure 367. JPEG 2000 encoding must be enabled in the Enable JPEG 2000 encoding
tick box on the basic interface configuration page.

Element Manager User's Manual Isochronous Transport Service (ITS) 334

2013 Net Insight AB, All rights reserved
15.12.2 Sink TTP configuration

Figure 368. Configuration of the terminating TTP in a unicast HD-SDI or SD-SDI
JPEG2000 channel. Observe that the termination TTP must be configured on a
decoder configured JPEG2000 Video Access Module if the channel is
compressed.
All that needs to be configured on this page is the terminating type and the local interface.
The selection of Type equal to Terminating immediately grays out the Mode parameter,
as it becomes irrelevant. Clicking on the Add button displays the specification web page
of the terminating TTP.

Figure 369. Configuration of the sink TTP.

Element Manager User's Manual Isochronous Transport Service (ITS) 335

2013 Net Insight AB, All rights reserved
In this example, admin status is set to Up and Connection protection to Off. Default DSTI
is kept at 5, the lowest unused DSTI available. After clicking on Apply or OK, the TTP
goes in operational state dormant, which indicates that it is awaiting action by other
node(s).
Proceed with the configuration of the interface by clicking on the link with the interface
name. In our case, the Speed autosensing parameter is enabled and grayed out, which it
always is on the sink interface.

Figure 370. Configuration of the terminating interface


Element Manager User's Manual Isochronous Transport Service (ITS) 336

2013 Net Insight AB, All rights reserved
15.12.3 Source TTP configuration
After finishing the configuration of the sink side, proceed with the source side. In this
example, interface 3:2 in iov129 is used as source interface.

Figure 371. Creation of the originating TTP.
The Add button takes the user to the configuration page of the originating TTP. The
interface has to have JPEG encoding enabled (and the parameter is disabled by default),
which is done from the Interface link, if the signal shall be a JPEG2000 compressed video.
Unless JPEG is enabled on the interface, only uncompressed configurations will work.

Element Manager User's Manual Isochronous Transport Service (ITS) 337

2013 Net Insight AB, All rights reserved

Figure 372. Configuration of the originating TTP, basic settings.
The default setting of the requested capacity is 270 Mbps. The options in the drop-down
menu are the same, no matter if the interface is configured with encoder enabled or encoder
disabled. However, depending on the setting of encoder enabled, some choices in the drop-
down menu are irrelevant but nevertheless available to the user. They are also selectable
and are accepted by the system. The setting SDI uncompressed 270 Mbps is treated exactly
the same way as the setting SDI compressed User defined 270 Mbps.


Figure 373. Available settings for Requested capacity, with the default SDI
uncompressed 270 Mbps setting.

Element Manager User's Manual Isochronous Transport Service (ITS) 338

2013 Net Insight AB, All rights reserved

Figure 374. The setting User defined 270 Mbps is treated exactly the same way as
uncompressed SDI 270 Mbps.


JPEG Encoder
enabled on interface
Relevant drop-down
menu choices
Irrelevant drop-down menu choices
Yes SDI compressed, i.e.
User defined with
rate set in the box
SDI uncompressed (all six
alternatives), but the default setting
User defined 270 Mbps is presented
as uncompressed SDI 270 Mbps.
No SDI uncompressed
(all six alternatives)
SDI compressed, i.e. User defined
with rate set in the box
Figure 375. Relevant and non-relevant settings on the Requested capacity parameter
depend on the setting on the interface for JPEG Encoder enabled.
The default settings are that all ANC/VBI data and all audio groups are enabled. A way to
transport the compressed streams with less bandwidth is to reduce the amount of
audio/ANC/VBI data transported, in particular the data that is not used in the stream.
In the table below, the required capacity for different types of streams are detailed. The sum
of these values is what should be configured on the source TTP for the stream.

Type of stream Video Audio ANC/VBI
SD-SDI 10-125 0-36 0-15
HD-SDI 10-250 0-74 0-2.5
3G-SDI 10-500 0-138 0-2.5
Figure 376. Capacity requirement for different types of (compressed) streams

In addition to Basic settings, also Advanced settings can be configured.

Element Manager User's Manual Isochronous Transport Service (ITS) 339

2013 Net Insight AB, All rights reserved

Figure 377. Configuration of the originating TTP, advanced settings. In this case, the
channel is set up as compressed HD-SDI with 100 Mbps bandwidth.

15.12.4 Multicast
Multicast is configured the same way as unicast on the terminating side. When the selection
of multicast is made, originating and terminating are grayed out in the web interface. This
indicates that the selection now is irrelevant and can no longer be made.
On the originating side, a multicast TTP is setup without destinations. The destinations are
added one at a time. Addition of destinations can also be made on active channels, making
it possible to add new destinations to services already in operation.
Destinations are added from the Destinations tab on the configuration page and the Add
destinations button on this web page.

Element Manager User's Manual Isochronous Transport Service (ITS) 340

2013 Net Insight AB, All rights reserved

Figure 378. Configuration of a multicast channel, in this case uncompressed.


Figure 379. Add destinations to a multicast channel. To get to this web page, click on the
Destinations link in the previous picture.

Element Manager User's Manual Isochronous Transport Service (ITS) 341

2013 Net Insight AB, All rights reserved

Figure 380. Addition of a new destination to an originating multicast TTP.
15.12.5 Interface configuration

Figure 381. Configuration of the originating interface of the connection. Make sure to
enable JPEG2000 encoding if the channel is using encoded JPEG traffic.

Element Manager User's Manual Isochronous Transport Service (ITS) 342

2013 Net Insight AB, All rights reserved
The interfaces of both source and sink modules must be configured. This is done on the
interfaces. Some parameters are configured on the encoder side and some on the decoder
side. Configuration is made from several different links, which are described in the
following text one by one. The tab VBI is only relevant for SD-SDI signals.
15.12.6 Basic interface parameters
15.12.6.1 Output action on signal fail
Default value: None (No action taken)
Type: Enumerable list
Range: None, Mute
Description: If set to Mute, the failed signal muted (i.e. shut down) on the output access
interface. Muting may speed up fail-over switching time when using external fail-over
switches. If set to None, different actions are taken depending on service type.
Table for output action on signal fail and different services.

Type of service Action
PDH AIS sent on the output access interface if the channel is up and there is an
error. Mute action otherwise.
SDH AIS sent on the output access interface if the channel is up and there is an
error. Mute action otherwise.
ASI IDLE packets are sent on the output access interface if the channel is up and
there is an error. Mute action otherwise.
AES/EBU, MADI Mute action, possibly involving some extra noise from short cables, if the
channel is up and there is an error. Mute action otherwise.
SDI, Native Mute action, possibly involving some extra noise from short cables, if the
channel is up and there is an error. Mute action otherwise.
SDI, JPEG
compressed
Repeat of last frame or black picture (in case no frame has been received) if
the channel is up. If the channel is down, a black picture is generated.
Figure 382. Actions taken on the output access interface for the parameter Output action
on signal fail having value None.

15.12.6.2 Suppress alarms
Default value: None
Type: Enumerable list
Range: possible values are None, Warning and All
Description: The default setting None does not suppress any alarms. Warning
suppresses all alarms with severity warning and all suppresses all alarms.



Element Manager User's Manual Isochronous Transport Service (ITS) 343

2013 Net Insight AB, All rights reserved
15.12.6.3 Loopback
Default value: None
Type: Enumerated list
Range: None does not configure the interface in loopback mode. DTM copy the stream
on a sink interface and makes it possible to reuse the stream as a source for another
channel. DTM loopback sends back the uncompressed stream and not the compressed
stream, i.e. it uses significant amounts of bandwidth.
Description: Sets the DTM loopback mode. DTM loopback is a way to send a signal,
destined for a Tx interface, back to the path of the Rx signal on the very same interface.
The signal is split at the interface and sent out on the Tx interface as well as being looped
back. It can be (and normally is) used as a signal source for another destination.
The return video stream (the looped back signal) is returned after passing the JPEG
decompression block and is thus uncompressed.

Figure 383. DTM loopback mode.

15.12.6.4 Speed autosensing
Default value: Enabled
Type: Binary (tick box)
Range: Enabled, Disabled
Description: Selection of this parameter enables speed autosensing. The parameter has to
be set on both source (ingress) and sink (egress) interfaces to work properly, but on the sink
interface it is always enabled and not configurable.

15.12.6.5 JPEG 2000 encoding
Default value: Disabled
Type: Binary (tick box)
Range: Enabled, Disabled
Description: Selection of this parameter enables JPEG 2000 encoding. The parameter is
only available on a JPEG2000 module with JPEG 2000 encoding firmware.


Nimbra node
Interface in DTM loopback mode

Element Manager User's Manual Isochronous Transport Service (ITS) 344

2013 Net Insight AB, All rights reserved
15.12.6.6 Signal format
Default value: HD-SDI (1.485 Gbps)
Type: Enumerated list
Range: Available signal formats for the JPEG2000 Video Access Module v2 are: 3G-SDI
(2.970 Gbps or 2.970/1.001 Gbps), HD-SDI (1.485 Gbps or 1.485/1.001 Gbps) and SD-SDI
(270 Mbps).
Description: The available format on the interface. This parameter is only available with
auto-sense disabled and JPEG2000 encoding enabled.

15.12.7 Test Generator interface parameters
Under the Interface tab to the specific SDI interface, a Test generator link is available.
In order to access the test generator, administrative status of all TTPs defined on the
interface has to be down.


Figure 384. Test generator configuration for an SDI interface.


Element Manager User's Manual Isochronous Transport Service (ITS) 345

2013 Net Insight AB, All rights reserved

Parameter Type Default Possible
values
Comment
Enable Check
box
Unticked Ticked
Unticked
Test generator function enable/disable.
Format List 576/50/i 480/59/i
576/50/i
720/23/p
720/24/p
720/25/p
720/29/p
720/30/p
720/50/p
720/59/p
720/60/p
1080/23/p
1080/24/p
1080/25/p
1080/29/p
1080/30/p
1080/50/i
1080/50/p
1080/59/i
1080/59/p
1080/60/i
1080/60/p
# of active lines/# of fields per
second/interlaced (i) or (p) progressive
picture
Observe that some values are only possible
for HD-SDI
Pattern List black black
matrix
color75
black means a digital black pattern;
matrix means pathological equalizer and
PLL pattern;
color75 means 75 % color bar pattern.
Figure 385. Configurable Test generator on an SDI interface.

Element Manager User's Manual Isochronous Transport Service (ITS) 346

2013 Net Insight AB, All rights reserved
15.12.8 Timing interface parameters
This is a web page that is currently not configurable. The only thing currently implemented
is the Dropped frames and Repeated frames shown at the bottom. The text describes the
intended way of operating, when implementation is finished.
In order to have access to the timing parameters, administrative status of all TTPs defined
on the interface has to be down.

Figure 386. Timing configuration on an SDI interface, only relevant on the decoder side.
15.12.8.1 Operating mode
Default value: SDI Transport
Type: Enumerated list
Range: Alternatives that are supported by the hardware are shown in a drop-down menu.
Description: SDI Transport means that the signal is not used by the system as a timing
source, digital timing source that is it used as a digital timing source.

15.12.8.2 Output reference
Default value: sdi-x:8
Type: Enumerated list
Range: Node sync, sdi-x:1, sdi-x:2,, sdi-x:n, where n is number of interfaces on the node
in question, except the interface itself.
Description: Reference is the outgoing timing signal used to clock out the signal from the
interface being configured.



Element Manager User's Manual Isochronous Transport Service (ITS) 347

2013 Net Insight AB, All rights reserved
15.12.8.3 Vertical delay (lines)
Default value: 0
Type: integer
Range: 0 to the number of lines in the frame minus one
Description: Number of lines offset between the timing source and the signal itself.

15.12.8.4 Horizontal delay (pixels)
Default value: 0
Type: integer
Range: 0 to the number of pixels per line minus one
Description: Number of pixels offset between the timing source and the signal itself.

15.12.9 Video interface parameters
This is a JPEG2000 encoder side configuration only and neither the link nor the web page
is available with decoder or no JPEG2000 firmware.

Figure 387. Video configuration on an SDI interface. The page is only available on the
encoding side.
15.12.9.1 Auto chroma weight
Default value: Selected
Type: Tick box
Range: Selected, Not selected
Description: Determines if the chroma weight setting is automatic or not. If it is, the two
parameters that follow become irrelevant and are grayed out.



Element Manager User's Manual Isochronous Transport Service (ITS) 348

2013 Net Insight AB, All rights reserved
15.12.9.2 Cb weight (%)
Default value: 5
Type: real number
Range: 2-15
Description: Weight of the Cb or blue difference component of the video.

15.12.9.3 Cr weight (%)
Default value: 5
Type: real number
Range: 2-15
Description: Weight of the Cr or red difference component of the video.


Element Manager User's Manual Isochronous Transport Service (ITS) 349

2013 Net Insight AB, All rights reserved
15.12.10 Audio interface parameters

Figure 388. Audio configuration on the encoding side. On the decoding side, it is possible
to monitor what ANC parameters have been transported. Audio groups five to
eight are only available for 3G-SDI speeds.


Element Manager User's Manual Isochronous Transport Service (ITS) 350

2013 Net Insight AB, All rights reserved
15.12.10.1 Audio group enable (for groups one to eight)
Default value: Selected
Type: Tick box
Range: Selected, Not selected
Description: Only audio groups which are enabled will be transported together with the
JPEG encoded video.
Note that in order to optimize bandwidth usage, it is important to disable unused audio and
ancillary (ANC) data.

15.12.10.2 Select all audio groups
Default value: Disabled
Type: Tick box
Range: Enabled, Disabled
Description: This setting selects all audio groups on the web page. Individual audio groups
can later be individually removed from the selection.
Note that in order to optimize bandwidth usage, it is important to disable unused audio and
ancillary (ANC) data.

15.12.10.3 Extra configuration for SD-SDI video streams
For SD-SDI streams there is one additional setting. It is a setting to define if the audio
stream carried with the compressed SD-SDI signal is sampled with 20 bits or 24 bits. The
parameter is called Audio Mode.

Figure 389. Audio mode setting of SD-SDI compressed video streams.
15.12.10.4 Audio Mode (for SD-SDI compressed streams only)
Default value: 20-bit
Type: Binary, 20 or 24 bit settings allowed
Range: 20 or 24 bit audio (A/D) encoder setting
Description: Enables (24-bit) or disables (20-bit) forwarding of the extended audio ANC
packets, carrying four bits extra of audio information in 24-bit mode.
Note that in order to optimize bandwidth usage, it is important to disable unused audio and
ancillary (ANC)/vertical blanking interval (VBI) data.

Element Manager User's Manual Isochronous Transport Service (ITS) 351

2013 Net Insight AB, All rights reserved
15.12.11 Ancillary (ANC) interface parameters

Figure 390. ANC parameter configuration on the encoding side. The web page makes it
possible to transport only some of the ANC parameters while leaving others.
Default is that all ANC data is transported. On the decoding side, it is possible
to monitor what ANC parameters have been transported.
On the encoding interface, the ancillary (ANC) parameters can be enabled for transport or
not. The parameters are presented in the table below. DID and SDID are Data Identifier and
Secondary Data Identifier respectively.


Element Manager User's Manual Isochronous Transport Service (ITS) 352

2013 Net Insight AB, All rights reserved

Service DID SDID Comment
AFD 0x41 0x05 Active Format Description
WSS 0x50 0x01 Wide Screen Signaling
ATC 0x60 0x60 Ancillary Time Code
OP-47, SDP 0x43 0x02 Subtitling Distribution Packet
OP-47 VANC multi
packet
0x43 0x03 Vertical ANC Packets
Caption Distribution
Packet (CEA-708)
0x61 0x01
CEA-608 0x61 0x02 Only usable in 30/60 frames
per second systems
VPID 0x41 0x01
ANSI/SCTE 104
messages
0x41 0x07
Figure 391. ANC data to be enabled/disabled
Note that in order to optimize bandwidth usage, it is important to disable unused audio,
ancillary (ANC) and VBI data. Typically, this information takes up similar amounts of
bandwidth as the video itself.
On decoder interfaces, no Audio, ANC or VBI tabs are included.

Element Manager User's Manual Isochronous Transport Service (ITS) 353

2013 Net Insight AB, All rights reserved
15.12.12 Vertical Blanking Interval (VBI) interface parameters


Figure 392. Configurable VBI parameters for JPEG 2000 SD-SDI compressed signals with
PAL encoding.
On the encoding interface, VBI lines are individually enabled/disabled. The default setting
is that all VBI lines are enabled and thus sent multiplexed with the encoded stream. The
VBI lines are information carrying lines sent after the last line of one frame but before the
first line of the next frame. VBI lines differ between NTSC and PAL. To select all PAL or

Element Manager User's Manual Isochronous Transport Service (ITS) 354

2013 Net Insight AB, All rights reserved
all NTSC lines, use the PAL/NTSC button. To select all or no lines, use the Select All/None
button.
15.12.13 Statistics

Figure 393. Statistics page on the encoder interface.
On the statistics page on the encoder interface, various pieces of information are presented
about the stream that passes through the interface.



Element Manager User's Manual Isochronous Transport Service (ITS) 355

2013 Net Insight AB, All rights reserved

Parameter Example Comment
Frame format 1280x720p@
60 Hz
Written as
[Pixels/line]x[lines/frame][i=interlaced/p=progressiv
e]@[field frequency] Hz
SDI Speed Bitrate of the
video stream
Supported: 270, 1.485, 1.485/1.001, 2.997,
2.997/1.001 Gbps
Channel capacity 11 Mbps Requested capacity on the encoding/source TTP.
Has to be greater than 10 Mbps plus all configured
audio, ANC and VBI capacity.
Current JPEG
2000 video bit rate
Momentary JPEG 2000 video rate
Maximum JPEG
2000 video bit rate
Highest possible value of the previous counter
Audio bit rate Bit rate of the (entire) audio stream
ANC bit rate Bitrate of the stream of ANC data (excluding radio)
VBI bit rate 0 Bitrate of the VBI stream, which is associated with
the SD-SDI format.
Total current bit
rate
Sum of used bit rates in all channels passing through
the interface
Total maximum
bit rate
Highest possible value of the previous counter
Figure 394. Variables shown on the Interface Statistics web page.
15.13 Configuration of 1+1 hitless video

Hitless video 1+1 protection is a value added feature providing a completely hitless
protection switching for ASI and JPEG2000 compressed SDI.
Hitless Video 1+1 Protection switching provides a mathematically lossless protection
switching by aligning and merging two identical packet streams. It is an inherently state-
less protection approach that besides protecting against defects and link failures also
protects against random packet drops. In addition to the hitless 1+1 protection mechanism,
this release introduces support for monitoring both redundant channels. Such monitoring is
also available for open-ended protection, i.e. protection with dual sources.
Hitless Video 1+1 Protection is available for Nimbra 600 nodes on the following Access
Modules:
JPEG2000 Video Access Module (NPS0074-6001)
SFP Video Access Module (NPS0054-6001)



Element Manager User's Manual Isochronous Transport Service (ITS) 356

2013 Net Insight AB, All rights reserved

Figure 395. Source stream sent through Nimbra network, using two independent routes
for closed-ended 1+1 hitless/standby protection.
Configuration of 1+1 hitless video streams is a new feature for GX4.12, although it looks
like the earlier closed ended protection case. In the new case, either one of the streams can
be sent to the sink interface (interface B; called standby protection) or both streams can be
used to create the outgoing stream (hitless protection). It is the hitless protection feature that
is new in this release and a configuration example of this case is presented.
One video stream is split at the source interface and sent to two separate source TTPs. The
streams traverse the network along different routes and are terminated in two separate sink
TTPs with a common interface. Configuration of closed ended 1+1 hitless protection starts
on the sink side, in our case interface asi-6:1in node iov136.
15.13.1 Hitless web parameters and variables
There are two new configurable web parameters in the hitless video 1+1 protection release.
They appear at the bottom on the outgoing sink interface web page. A closer look at this
part of the web interface is shown below.

Figure 396. New parameters to configure in Hitless Video 1+1 Protection.
In the table, parameters and their possible values are detailed. Included are also the (non-
configurable) variables.

Nimbra network
Route One
Route Two
Source TTP A1
Source TTP A2
Sink TTP B1
Sink TTP B2
Interface A Interface B
Node A Node B

Element Manager User's Manual Isochronous Transport Service (ITS) 357

2013 Net Insight AB, All rights reserved

Parameter/Variable Description
Member interfaces Member interfaces are zero, one or two sink TTPs associated with
the sink interface. A TTP appears as a member interface when the
sink interface is configured as the interface to the sink TTP.
Type Type of protection on the interface. All available types are
presented automatically. Currently, Hitless or Standby are
supported. Hitless means that both streams are used to generate
the outgoing video stream. Standby means that one of the streams
is used as the outgoing stream and the other stream is a monitored
redundant stream.
Status Current state in the Hitless/standby state machine. There are five
states altogether (in order low to high): Unavailable
Unprotected Standby protected Hitless capable Hitless
protected
Expected status If status is lower than expected status in the Hitless/standby
state machine, a major alarm with text Protection status lower
than expected is generated.
Active interface Answers the question What interface is passed on to the output
interface?. Only relevant for standby protection.
Differential delay Time difference between the streams on the member interfaces, as
measured by the sequence numbers added at the source interface.
Figure 397. New parameters and variables on the sink interface in Hitless video 1+1
protection.

15.13.1.1 Creation of sink TTPs
Create two separate sink TTPs (Sink TTP B1 and Sink TTP B2) and tie both of them to the
same interface (Interface B). Set the TTPs to admin status up for faster completion of the
channel. The TTPs should appear with administrative status up and operational status
dormant in the list of sink TTPs.

Select ITS Sink TTP and the Add TTP button.


Figure 398. Addition of the first sink TTP in the destination node.

Element Manager User's Manual Isochronous Transport Service (ITS) 358

2013 Net Insight AB, All rights reserved

Figure 399. Configuration of a sink TTP (itsi-0 or Sink TTP B1). It is suggested that you
set admin status to up and keep the other default settings.

Repeat for the other sink TTP in the destination node.


Figure 400. Addition of the second sink TTP in the destination node.


Element Manager User's Manual Isochronous Transport Service (ITS) 359

2013 Net Insight AB, All rights reserved

Figure 401. Configuration of the second sink TTP (itsi-1 or Sink TTP B2). It is suggested
that you set admin status to up and keep the other default settings.

The sink TTPs created so far are listed below.


Figure 402. Created sink TTPs.
15.13.1.2 Creation of source TTPs
Now continue with creation of the two source TTPs in the source node, in our case on
interface asi-8:1 in iov072. Follow the link ITS Source TTPs and the button Add TTP.
Make sure to define the destination node and destination DSTI (matching the first sink
TTP), requested capacity and the first channel source route. In the second source TTP that
is configured, it is necessary to select a different destination DSTI (matching the other sink
TTP) and a different source route. Different source routes are needed to get proper
protection.

Element Manager User's Manual Isochronous Transport Service (ITS) 360

2013 Net Insight AB, All rights reserved

Figure 403. Configuration of first source TTP (itso-1 or Source TTP A1). The channel is
set up along route Route pri to iov136. Source routes are defined under All
connections Source routes in web

Element Manager User's Manual Isochronous Transport Service (ITS) 361

2013 Net Insight AB, All rights reserved

Figure 404. Configuration of second source TTP. (itso-2 or Source TTP A2). The channel
is set up along route Route sec to iov136. Observe that both source TTPs
are associated with the same physical interface. Source routes are defined
under All connections Source routes in web.
15.13.1.3 Configuration of the sink interface
The final configuration item is the sink interface (asi-6:1 in iov136).
Go to ITS Interfaces and select the interface.

Element Manager User's Manual Isochronous Transport Service (ITS) 362

2013 Net Insight AB, All rights reserved

Figure 405. Type of protection is selected in the Type drop-down menu. Hitless is
available only if there are two sink TTPs (Member interfaces; itsi-0 and itsi-
1) attached to the sink interface. Hitless makes sense only for closed ended
protection, i.e. one incoming stream that is split at the input interface.




Element Manager User's Manual Channel Persistence 363

2013 Net Insight AB, All rights reserved
16 Channel Persistence
16.1 General
Given a large network, it is inevitable that failures occur from time to time. These failures
can affect transmission links as well as switching nodes. When an error occurs somewhere
in a DTM network, the default action is to tear down all channels that are affected by the
error. The reason for this is that the network can hopefully find another path through the
network for the channel and restore the service quickly.
Tearing down the channels is however not always the best course of action. In some
situations, channels can continue to forward data even though a node-controller has stopped
working or a link has become unidirectional. In other situations, it might be appropriate to
let a channel remain established even though a link that it is running over has failed. This
will lead to faster recovery when the link is repaired. The Channel Persistence functionality
allows the operator to configure the behavior of the network when failures occur. Three
main types of failures are handled:
A node-controller that restarts due to a software or hardware error.
A node-controller that fails completely due to a hardware failure.
A link that fails in one or both directions.
16.2 Persistence Configuration
The main configuration parameter for channel persistence is the Link Class for each
interface. The Link Class decides how a node shall behave if it detects that the neighboring
node stops responding or the link fails. It is configured on a per-interface basis on the
DTM->Interfaces->Edit page. The link class must be configured with the same value at
both ends of a link.
16.2.1 Link Class Normal
Link Class Normal means that the node will consider the link as Down if it detects an error
with the link (Signal Failure) or if the node at the other end of the link fails to respond to
the periodic supervision messages. When a link is considered Down, all channels utilizing
that link are immediately torn down. . This means that as soon as an error is detected, all
channels affected by the error are torn down. Link Class Normal is the default for all
interfaces.
An interface configured with link class Normal will never have status NoControl or
DownKeep. It will go directly to status Down instead.

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
16.2.2 Link Class Persistent

Warning:

This option is for advanced use only. Used inappropriately, the
option may cause multiple problems.
that the user should understand the feature properly before
employing it.

With Link Class Persistent, the node will not tear down channels if the neighboring node
stops responding. Instead, it will classify the link as NoControl
channels in place, but deny any new channels from being established via the interface to the
peering node that has stopped responding. Furthermore, if a node has one or more links
configured as Persistent, the node will by default en
controller restarts. In the NoControl mode, the node will not run the normal DTM protocol
stack and instead leave the hardware configured as
will continue to forward data, but it wi
or setup any new channels.
If an interface is configured with Link Class Persistent and the node receives an indication
that the link on that interface has failed completely (e.g. a Signal Failure cond
tear down all channels over that link.
Persistent links are useful to protect end
An interface configured with link
go to status Down instead.
16.2.3 Link Class Nailed

Warning:

This option is for advanced use only. Used inappropriately, the
option may cause multiple problems. It is strongly suggested
that the user should understand the feature properly before
employing it.

With Link Class Nailed, the node will never tear down channels unless the operator sets the
administrative status of the interface to down or if the channel is removed via the
management interface. This means that the node will leave channels in place even if it
knows that the channels cannot forward any data since there is a loss
the interface.
If the neighboring node stops responding or if the link to or from the neighboring node
fails, the node will leave all existing channels in place, but
being established via the interface to the peering node. Furthermore, if a node has one or
more links configured as Nailed, the node will by default enter a NoControl mode if the
node-controller restarts. In the NoControl mode,
protocol stack and instead leave the hardware configured as
channels will continue to forward data, but it will not be possible to supervise the links and
channels or setup any new chann
Nailed links are useful since they allow links that break in one direction to continue
forwarding data in the other direction. They also allow faster recovery after the link has
been restored again, since all channels are already established.
16.2.4 Restart On Error
If a node is configured with at least one interface with a link class of either Persistent or
Nailed, the node will by default enter node status NoControl if the local node controller
Channel Persistence
2013 Net Insight AB, All rights reserved
Link Class Persistent
This option is for advanced use only. Used inappropriately, the
option may cause multiple problems. It is strongly suggested
that the user should understand the feature properly before
employing it.
With Link Class Persistent, the node will not tear down channels if the neighboring node
stops responding. Instead, it will classify the link as NoControl and leave all existing
channels in place, but deny any new channels from being established via the interface to the
peering node that has stopped responding. Furthermore, if a node has one or more links
configured as Persistent, the node will by default enter a NoControl mode if the node
controller restarts. In the NoControl mode, the node will not run the normal DTM protocol
stack and instead leave the hardware configured as-is. This means that all existing channels
will continue to forward data, but it will not be possible to supervise the links and channels
or setup any new channels.
If an interface is configured with Link Class Persistent and the node receives an indication
that the link on that interface has failed completely (e.g. a Signal Failure condition), it will
tear down all channels over that link.
Persistent links are useful to protect end-nodes that are single points of failure for a service.
An interface configured with link-class Persistent will never have status DownKeep, it will
s Down instead.
Link Class Nailed
This option is for advanced use only. Used inappropriately, the
option may cause multiple problems. It is strongly suggested
that the user should understand the feature properly before
employing it.
Class Nailed, the node will never tear down channels unless the operator sets the
administrative status of the interface to down or if the channel is removed via the
management interface. This means that the node will leave channels in place even if it
ows that the channels cannot forward any data since there is a loss-of-signal situation on
If the neighboring node stops responding or if the link to or from the neighboring node
fails, the node will leave all existing channels in place, but deny any new channels from
being established via the interface to the peering node. Furthermore, if a node has one or
more links configured as Nailed, the node will by default enter a NoControl mode if the
controller restarts. In the NoControl mode, the node will not run the normal DTM
protocol stack and instead leave the hardware configured as-is. This means that all existing
channels will continue to forward data, but it will not be possible to supervise the links and
channels or setup any new channels.
Nailed links are useful since they allow links that break in one direction to continue
forwarding data in the other direction. They also allow faster recovery after the link has
been restored again, since all channels are already established.
On Error
If a node is configured with at least one interface with a link class of either Persistent or
Nailed, the node will by default enter node status NoControl if the local node controller
Channel Persistence 364
With Link Class Persistent, the node will not tear down channels if the neighboring node
and leave all existing
channels in place, but deny any new channels from being established via the interface to the
peering node that has stopped responding. Furthermore, if a node has one or more links
ter a NoControl mode if the node-
controller restarts. In the NoControl mode, the node will not run the normal DTM protocol
is. This means that all existing channels
ll not be possible to supervise the links and channels
If an interface is configured with Link Class Persistent and the node receives an indication
ition), it will
nodes that are single points of failure for a service.
class Persistent will never have status DownKeep, it will
Class Nailed, the node will never tear down channels unless the operator sets the
administrative status of the interface to down or if the channel is removed via the
management interface. This means that the node will leave channels in place even if it
signal situation on
If the neighboring node stops responding or if the link to or from the neighboring node
deny any new channels from
being established via the interface to the peering node. Furthermore, if a node has one or
more links configured as Nailed, the node will by default enter a NoControl mode if the
the node will not run the normal DTM
is. This means that all existing
channels will continue to forward data, but it will not be possible to supervise the links and
Nailed links are useful since they allow links that break in one direction to continue
forwarding data in the other direction. They also allow faster recovery after the link has
If a node is configured with at least one interface with a link class of either Persistent or
Nailed, the node will by default enter node status NoControl if the local node controller

Element Manager User's Manual Channel Persistence 365

2013 Net Insight AB, All rights reserved
restarts. See the section on Node Status NoControl for an explanation of the
consequences of this.
The Restart on error setting allows the operator to tell the node that it shall always go
directly to Up mode and tear down all existing channels if the node controller restarts. This
means that the only time the node stops in NoControl is if the node-controller fails and
needs to be replaced.
The Restart on error setting can be found on the Maintenance System page.
16.2.5 Redundant DLE Servers
If persistent channels are used in a DTM network, it is strongly recommended to configure
all nodes with access to two redundant DLE servers. Otherwise, it may happen in an error
situation that a node looses contact with the DLE server and becomes impossible to reach
via the in-band management network.
It is also important to place the DLE servers in nodes that can be reached via in-band-
management without passing through the DLE segment that the DLE server handles.
Otherwise, if a DLE server fails for some reason, then it becomes impossible to reconfigure
the DLE server since to reach the node with the DLE server, we need to use the DLE
segment that just failed. One possible location for the DLE server is in the gateway to the
DLE segment in question. The backup DLE server can be placed in a node connected to a
different DLE segment.

16.3 Handling an Error Situation
When the Persistent Channel functionality is used (i.e. when at least one interface in the
network is configured with link-class Persistent or Nailed), the network will try to tolerate
some types of failures without tearing down all affected channels. If such an error occurs in
the network, the network will run in a somewhat degraded state. This section describes how
to diagnose a network in such a degraded state, the behavior that can be expected from the
network in the degraded state and how the network can be repaired.
16.3.1 The DTM->Links Page
The DTM->Links web page displays the status of communication with all neighboring
nodes. It shows a list of all local DTM trunks with the administrative status set to Up. For
each interface it shows the status of the RX interface followed by the status of the TX
interface. Since a DTM network only requires bi-directional connectivity between a pair of
nodes and not bi-directional links, it is possible for the status of an RX interface to be
different from the status of the corresponding TX-interface. It is even possible (but not
recommended) for the RX and TX interfaces to be connected to different nodes.
The status of a TX interface can be
Down No peering node has been detected.
Up Full, bi-directional communication with the peering node is possible.
NoControl The communication with the peering node has been Up, but the peering node
has now stopped responding. This indicates that the peering node-controller has either
entered the NoControl state or it has failed completely and needs to be replaced.
DownKeep The communication with the peering node is still Up, but an error has been
detected on the trunk to or from the peer.
An RX-interface can have the same statuses as a TX-interface plus

Element Manager User's Manual Channel Persistence 366

2013 Net Insight AB, All rights reserved
Pending A node has been detected at the other end of the link, but it has not been possible
to establish full communication with the node. This indicates that we only have uni-
directional communication (from the peer to this node) with the peering node.
Loopback The RX-interface is connected to a TX-interface in this node.
In status Pending and Loopback, only the interface-address of the peer is known and
displayed. In status Up, NoControl and DownKeep, the node-address and DTM address of
the peer is also shown.
In normal operation, all interfaces with attached fibers shall show a status of Up. If you
suspect that a node has entered a NoControl state and you cannot reach the node directly,
look at the DTM Links page in a neighboring node to determine what the neighbor thinks
about the node.
If any link has status NoControl, the node will raise a Major alarm with cause Response
time excessive and description Peering node is in state NoControl or is not responding.
If any link has status DownKeep, the node will raise a Major alarm with cause
Communication subsystem failure and description Link is in state DownKeep.
Note that unless we have several links between two nodes, both the RX and TX direction of
the link will get status NoControl or DownKeep at the same time. This means that two
alarms will be raised in each node, one for each direction.
16.4 Node Status NoControl
If a node is configured with one or more links with link-class Persistent or Nailed and the
node-controller restarts, the node will by default enter a state called NoControl. In this state,
the node will run with the DTM protocol stack disabled and it will not be able to
communicate with its neighbors. It will however retain all existing channels, both to, from
and via the node.
Since the DTM protocol stack is disabled, it is not possible to contact the node via the in-
band management network (DLE). If the node is contacted via outband management, it will
show a very limited view of the node and it will not display any information about the
status of the hardware or services. The only meaningful action in this state is that the node
can be restarted. When this is done, the node will activate the DTM protocol stack, tear
down any existing channels and try to reestablish them from the beginning.
The idea behind the NoControl state is that if an error occurs, the node tries very hard not to
disrupt any existing traffic. It is then up to the operator to choose when he wants to tear
down the channels and restore the node to full working condition.
16.5 Restarting a node in NoControl
A node in NoControl state can be brought into full working state (Up) in three different
ways:
Via outband management
Via serial console
From a neighboring node
16.5.1 Restarting via Outband Management
To restart the node via outband management, you can either use the Resume full
operation button on the Maintenance->System web page or the CLI-command node-
restart local.

Element Manager User's Manual Channel Persistence 367

2013 Net Insight AB, All rights reserved
16.5.2 Restarting via Serial Console
To restart the node via serial console, use the CLI-command node-restart local.
16.5.3 Restarting from a Neighboring Node
To restart a neighboring node, look at the DTM Links page. It will show the status of all
its neighbors. If any neighbor appears to be in status NoControl, click on the interface name
for the row that displays NoControl. It will take you to the DTM Interface page for that
interface. From that page, you can send a restart command to the node connected to the TX-
part of the interface. This is done with the Restart Neighbor button. Note that a node will
only respond to the Restart Neighbor command if the node has status NoControl. If the
node is already up and running, the Restart Neighbor button will have no effect.
It is also possible to send the same restart command to a neighbor via the CLI using the
command node-restart dtm3: 1.
16.6 Link Errors
If a link configured as Nailed reports an error such as Signal Failure, all channels will
remain established over that link. To force the system to tear down the channels, set the
administrative status of the interface to Down or reconfigure the link-class as Normal. This
must be done on both nodes connected to the link in question.
16.7 Channels with broken control-paths
If a link configured as Nailed fails, or if a node-controller enters the NoControl state, all
channels running over that link or to, from, and via that node have broken control paths.
This means that the network will preserve the channels, but it will have limited control over
them. Depending on the type of error that has occurred, channels with broken control-paths
may or may not continue to forward data.
The best way to get rid of the broken control-path is to resolve the underlying problem, i.e.
to restart or replace the node-controller that is in NoControl state or repair the broken link.
Alternatively, the operator can also choose to disable the broken link by setting the
administrative status of the link to Down in both nodes connected to the link. All these
measures will however affect traffic if only the control-path is broken but the data-path is
actually working.
Another alternative is to selectively tear down and reestablish channels. This gives exact
control over which channels will be affected, but is more complex to perform. This is
because it is generally not possible to send control messages all the way from the source to
the destination for a channel. Control messages will only reach the node before the error
and there they will be buffered, waiting for the error to be resolved. Therefore, special
measures are sometimes needed to resolve the situation.
The rest of this chapter describes how to tear down or reestablish different types of
channels when the channels have broken control-paths.
16.7.1 Tearing down a unicast channel
To tear down a unicast channel with a broken control path, it is necessary to tear it down
from both sending and receiving side. This can be done by setting the administrative status
for the service to Down at both ends. If this is only done at the sending side, the receiving
side will show that it is still receiving the channel, but the sending side will show that the
channel has been torn down.

Element Manager User's Manual Channel Persistence 368

2013 Net Insight AB, All rights reserved
16.7.2 Reestablishing a unicast channel
By reestablishing a unicast channel, we can force the network to find an alternate route
through the network that avoids the error. To force a channel to be reestablished, open the
webpage for the TTP at the sending side and click the connection id (Conn id) that you
want to reestablish under Originating connections. On the displayed page, click the
button labeled Re-connect channel.
In some (rare) circumstances, the channel must be torn down at the receiving side before it
can be reestablished. If the channel is not reestablished properly, go to the TTP at the
receiving side and click on the connection id under Terminating connections. Then use
the button labeled Delete to tear down the channel from the terminating side as well.
16.7.3 Re-establishing a multicast channel
If a multicast channel is affected by a broken control-path, there are two different ways to
reestablish the channel to the affected destinations. The easiest way is to reestablish the
entire multicast tree by toggling the administrative status of the originating TTP. This will
tear down the entire multicast tree and replace it with an entirely new channel. This of
course affects all destinations and not just the destinations that are affected by the broken
control-path. Note that since the control-path is broken, it may take slightly more than one
minute to tear down the old multicast tree.
If it isnt possible to reestablish the entire multicast tree, you can also choose to tear down
and reestablish only the affected destinations. To do this, it is necessary to perform two
different tear downs:
First, we want to tear down the channel downstream from the break in the control path. To
do this, we first need to find out the channel identifier for the channel. This id consists of
the source DTM address for the channel and a numerical identifier. To find the channel
identifier, go to the webpage for the originating TTP and click on the number in the column
Conn Id for the failed originating multicast channel. This will display the Connection
Details page for the connection. The Channel id can be found on that page. Write down
the Channel id or copy it by selecting it and pressing Ctrl-C.
Now, we need to find the node directly after the break in the control-path for the channel. If
the error is a link in DownKeep state, then it is the node connected directly downstream
from that link. If the error is a node in NoControl state, then it is the node connected
directly downstream from that node.
Log in to the node in question via the CLI. Use the dcp list command to verify that you
have found a node that the channel passes through. This can be done by issuing the
command dcp list <channel id> (e.g. dcp list 02.00.00.00.00.00.00.41 65538). If the
node answers with a lot of output, then the channel exists. If the node answers No such
channel, then the channel does not exist in this node.
If the channel exists, you can tear it down using the command dcp remove <channel id>
(e.g. dcp list 02.00.00.00.00.00.00.41 65538). This will tear down all multicast
destinations in this node and any downstream nodes.
Second, we need to remove the destinations from the source to the point where the control
path is broken. If the control path wasnt broken, you would have torn down the channel
from the source to all downstream nodes in the first step. However, since the control path is
broken, the source application still thinks that the destinations are properly established. To
fix this, locate the originating TTP for the channel. Click on the Destinations link to see
all destinations for this TTP. Put a checkbox before the destinations that you tore down in
the previous step and click the button Re-connect checked. Note that since the control-
path is broken, it will take approximately one minute before the destinations are torn down
and can be reestablished along an alternate path.

Element Manager User's Manual Channel Persistence 369

2013 Net Insight AB, All rights reserved
16.7.4 Channel reestablishment upon link failures
16.7.4.1 DRP
A channel that is routed with DRP will be rerouted every time a link used by the channel
goes down. This condition (that a link goes down) happens as soon as the link has a defect
noted in the web interface. In the web interface, this can be seen on all trunks in the two
examples below, the sonet/sdh and iptrunk are illustrated.

Figure 406. Possible alarms or defects on a SONET/SDH trunk. All alarms except RDI-
L/RDI-P take down the trunk and cause a rerouting of all channels using that
trunk.


Figure 407. Possible alarms or defects on a IP trunk. All alarms except RDI take down the
trunk and cause a rerouting of all channels using that trunk.

Element Manager User's Manual Channel Persistence 370

2013 Net Insight AB, All rights reserved
16.7.4.2 1 + 1 with source routes
Channels set up with source routes, i.e. in the normal case where one source route
(secondary) is backup to another source route (primary), will switch to the alternative
source route as soon as there is a problem with the received signal in the destination. In
addition to be caused by a problem on one of the constituent trunks (according to the
previous chapter), it can be caused by a LOS on the access interface or other reason
generating an AIS signal in the destination. For ETS services, this alarm can be generated
by Reduced Bit Rate alarm or DEG (degraded) alarm from a forwarding function along the
route of the service.
Switchover to the backup/secondary channel starts directly and as the backup channel lacks
monitoring, there is no guarantee that the backup signal is operational.
16.7.5 DLE
DLE will automatically tear down and reestablish channels to maintain functionality as
long as there is an available path for control signaling. It is however very important to have
two redundant DLE servers for each DLE segment, since it may happen that a DLE server
is unable to reestablish a channel to a DLE client that has been affected by an error. This
will be resolved automatically when the DLE client decides to move to the other DLE
server since the first one is non-functional.
However, there are some situations when channels between DLE clients cannot be
reestablished automatically. The symptoms of this is that there does not seem to be
anything wrong with the node judging from the DTM Links page on its neighbors, but it is
impossible to reach the node via DLE from some node(s). The easiest way to fix this
situation is to force the DLE server that the failing node is attached to re-establish the
channel to all the DLE clients. This is done from the page for the In-band server (Control
network->In-band servers, click on the relevant server id, e.g. dles0). On that page, click on
the connection id of the only entry under the heading Originating client connections and
then click Re-connect channel on the resulting page. This forces the DLE server to re-
establish the channel to all DLE clients.

Element Manager User's Manual Connection and channel lists 371

2013 Net Insight AB, All rights reserved
17 Connection and channel
lists
17.1 Overview
In the web interface, information about originating and terminating connections is
available, as well as information about originating, terminating and pass-through channels.
These listings are informational only.

Figure 408. List of originating connections


Figure 409. List of terminating connections


Element Manager User's Manual Connection and channel lists 372

2013 Net Insight AB, All rights reserved

Figure 410. List of channels to, from and via the node


Figure 411. List of data statistics
Selecting All connections, Statistics provides data statistics of all connections since the last
reset. Furthermore, on the data statistics page information about errors (error statistics) is
also retrievable


Element Manager User's Manual Connection and channel lists 373

2013 Net Insight AB, All rights reserved

Figure 412. List of error statistics

Element Manager User's Manual Source Routing 374

2013 Net Insight AB, All rights reserved
18 Source Routing
When establishing a connection between two (or more for multicast) endpoints at the rim of
the network, it is usually not important to know exactly which path the connection takes
through the network.
The default routing method is therefore to let the network itself decide the best (shortest and
most efficient on transmission resources) path via hop-by-hop routing.
The alternative routing method is to define precisely the path in the network that should be
used, from the source to the destination. Optionally, used interfaces can also be defined.
Such routes are defined in the source node and are called source routes.
The obvious usage for source routes are 1+1 protection, where it is essential that a single
network fault does not take down both the primary route and the backup route
simultaneously. Other reasons could be network operator preferences or preparations for
network maintenance.
18.1 Loose and strict source-routes
There are two different types of source routes, strict and loose. A strict source defines all
intermediate nodes between the source and the destination. Note that neither the source
node nor the destination node should be included. Optionally, the interfaces in the nodes
(including the source node) can also be specified.
For a loose source route, only nodes that are required to be passed are specified; the path
between the specified nodes is found via hop-by-hop routing (i.e. by DRP).
To define a source route that only uses DRP (a contradiction in terms), a loose source route
without any specified nodes should be defined. Such a route can be (and typically is) used
as a last alternative for services if all specified source routes are non-usable.
Source-routes are configured in two steps. The first step is to create a source-route in the
source node and give it a descriptive name. The second step is to configure a channel to use
the specified source-route.
18.1.1 Optional interface specification
Sometimes there are several trunks available between two nodes and it is of interest to
specify which trunk is used by a source route. This is made with a specification after the
node specification, but on the same line for intermediate nodes. On the source node itself it
is made in a separate box (Outgoing interface). The interface nomenclature is the regular
for the nodes, described in the Chapter Key concepts.

Element Manager User's Manual Source Routing 375

2013 Net Insight AB, All rights reserved

Figure 413. A source-route with explicit interface specifications
18.1.2 Deleting a source-route
Before you can delete a source-route entry, you must make sure that the source-route is not
used by any TTP. This is easy to check by clicking on the link Used by in the page
describing the path for the source-route. If you try to delete a source-route that is currently
in use, the node will return an error message and refuse to delete it.
18.2 Example of how to define source routes
Consider the network below. We want to establish a 1+1-protected channel from node
iov072 to node iov101. The first connection, Far-route-to-iov101, passes through nodes
iov137, iov136 and iov102. The second channel passes through nodes iov136 only.

Figure 414. Example network to illustrate source routing. The two source routes are Far-
route-to-iov101 and Close-route-to-iov101.

Element Manager User's Manual Source Routing 376

2013 Net Insight AB, All rights reserved
First, we need to define the source routes in iov072. We force the connections to use the
desired paths through the network with two different source-routes. Both of these source-
routes are strict, since we specify all nodes on the path from the source to the destination.
The interfaces that we are using in the example are optional.
To define the source routes, follow the link All connections Source routes in web
interface of node 1.
Each source-route is specified as a list of all the nodes that the source-route passes through.
Each node is written on a separate line and it can be represented either by its node name (if
it has been configured in the hostname list under DTM Hostnames) or by its DTM
address directly.

Figure 415. Specification of the first source route

Figure 416. Specification of the second source route

Element Manager User's Manual Source Routing 377

2013 Net Insight AB, All rights reserved
Finally, we define a loose source route without any nodes. This is needed later if we want to
combine source routes and DRP.

Figure 417. Definition of a loose source route without intermediate nodes. This definition
is needed if we want to use DRP as a last resort.
It is also possible to view, edit and delete specific source routes from the link All
connections Source routes. Click on the Id number of the specific link, do the needed
changes and click on Ok, Apply or Delete as appropriate.
An alternative is to use loose source routes. In this case, only some intermediate nodes are
included in the source route definition and the rest of the route is completed with DRP.

Figure 418. Definition of a loose-far-route-to-iov101.

Element Manager User's Manual Source Routing 378

2013 Net Insight AB, All rights reserved
In the same way, a loose version of Close-route-to-iov101 can be defined.

Figure 419. Definition of a loose version of close-route-to-iov101.
18.3 Using source routes
The source routes are used when all types of channels are set up, to get control of traffic
routing in the network. The alternative to using source routes is to use DTM Routing
Protocol (DRP) and let the network do the routing.
At a later stage, if it is decided that certain services need protection, the two streams that
protect each other must traverse the network along different routes (otherwise, there is no
protection). The channels that those services use may be rerouted with source routes at this
point.
In general, it is good practice not to mix source routes and DRP. If source routes are used,
the operator wants to control the traffic pattern in the network. In this case, partially using
DRP removes such control. For this reason, when source routes are used, the default is not
to use DRP in case none of the (maximum three) defined source routes can be used. If the
operator still wants to use DRP as a last resort, a loose source route with no defined
interface or nodes acts like DRP. This is the solution needed in this case.

Element Manager User's Manual Loopback 379

2013 Net Insight AB, All rights reserved
19 Loopback
19.1 General
Loopback is a function that makes it possible to loop the incoming signal on an interface
(Rx port) to the outgoing port on the same interface (Tx port) or to loop the signal destined
for the outgoing Tx port on an interface back to the Rx port on the same interface. The first
type of loopback is called line loopback and the second type DTM loopback in this
document, as well as in the web interface of the Nimbra nodes.
19.1.1 Line loopback
Line loopback is illustrated below. It is currently implemented explicitly on the ASI
Transport Access Module for Nimbra One and 300 (NPS0004-3001, NPS0004-X001) as
well as on the fixed interfaces of Nimbra 340.

Figure 420. Schematic illustration of line loopback.
To explicitly configure the interface in line loopback mode, proceed as follows:
Go to the web page ITS Interfaces Specific interface, like asi-3:1. In this case, a
Nimbra 340 with fixed interfaces is used as an example.

The following web page should then be opened:
Nimbra node
Interface in line loop mode

Element Manager User's Manual Loopback 380

2013 Net Insight AB, All rights reserved

Figure 421. Configuration of line loopback on a fixed interface in Nimbra 340.
To configure the interface in line loopback mode, set the value of the parameter Loopback
to Line from the drop-down menu and click on Apply or OK. The signal reaching the
Rx port on the interface should now be directly returned to the Tx port, in addition to being
sent along the regular path of an incoming signal.
In addition to the Loopback parameter, there are two more parameters to configure.
Suppress alarms can be set to suppress alarms, either none (default), all or warning.
All suppresses all alarms on the interface and warning suppresses all alarms with severity
warning. The last parameter is Output action on signal fail has values None and Mute.
If set to Mute, the failed signal muted (i.e. shut down) on the output access interface.
Muting may speed up fail-over switching time when using external fail-over switches. If set
to None, different actions are taken depending on service type.
Table for output action on signal fail is shown below.

Type of service Action
PDH AIS sent on the output access interface if the channel is up and there is an
error. Mute action otherwise.
SDH AIS sent on the output access interface if the channel is up and there is an
error. Mute action otherwise.
ASI IDLE packets are sent on the output access interface if the channel is up and
there is an error. Mute action otherwise.
AES/EBU, MADI Mute action, possibly involving some extra noise from short cables, if the
channel is up and there is an error. Mute action otherwise.
SDI, Native Mute action, possibly involving some extra noise from short cables, if the
channel is up and there is an error. Mute action otherwise.
SDI, JPEG
compressed
Repeat of last frame or black picture (in case no frame has been received) if
the channel is up. If the channel is down, a black picture is generated.
Figure 422. Actions taken on the output access interface for the parameter Output action
on signal fail having value None.

Element Manager User's Manual Loopback 381

2013 Net Insight AB, All rights reserved

19.1.2 DTM Loopback
DTM loopback is a way to send a signal, destined for a Tx interface, back to the path of the
Rx signal on the very same interface. The signal is split at the interface and sent out on the
Tx interface as well as being looped back. To configure the fixed ASI port of a Nimbra 340
or the ASI port of the ASI Transport Access Module for Nimbra One and 300 (NPS0004-
3001, NPS0004-X001) in this manner, set the parameter Loopback to DTM.

Figure 423. DTM loopback mode. The signal is copied to the Rx port on the same interface
before being sent out on the Tx port.

Figure 424. Configuration of DTM loopback on a fixed interface in Nimbra 340.

19.2 Behaviorally equivalent configurations
Nimbra node
Interface in DTM loopback mode

Element Manager User's Manual Loopback 382

2013 Net Insight AB, All rights reserved
Strict implementation of DTM and line loopback, with a loop very close to the actual
interface, is only found in the ASI Transport Module and the ASI ports of Nimbra 300.
However, an equivalent system behavior can be configured in some other ways in other
Nimbra products.
19.2.1 Loopback from the line side in 8 x ASI Transport
Module for Nimbra One/300
In 8 x ASI Transport Module, the monitoring port (the ninth port) can be used for loopback.
In this case, the monitor port copies the incoming signal on a port and sends the copy back
towards the line.
The loopback is set up by creating an ITS from one node to another. In our case, it is made
between iov101 and iov102. The signal is sent from iov102 to iov101, where the signal
received on asi-1:1 is sent to the monitor interface (i.e. returned to the line side).
The monitor port on the module in iov101 is set to listen to this local interface (asi-1:1),
which is used as an Rx port. To configure the monitor port, select Interfaces from the ITS
link after the ITS unicast service is set up between iov102 and iov101. The ITS unicast is
configured as a regular ITS unicast. If in doubt, see the specific description of ITS
configuration.
Select interface asi-8:1 to be monitored and connect the return cable to the external ASI
player. The ASI signal now enters the module on interface asi-1:1 and leaves the module on
the monitor interface. The line loopback is complete.

Figure 425. Configuration of the monitor interface.
The front panel selection button makes it possible to disable the output directly from the
hardware or to toggle the interface monitored (Each press on the button moves the selected
monitor interface in the cyclic sequence disabled asi-x:1 asi-x:2 asi-x:3 asi-x:4
asi-x:5 asi-x:6 asi-x:7 asi-x:8 disabled).
Configuration of DTM side loopback is made in an analogous fashion as for the 8 x Video
Access Module for Nimbra 600 described below.

Element Manager User's Manual Loopback 383

2013 Net Insight AB, All rights reserved
19.2.2 Loopback from the line side in Video Access Modules
for Nimbra 600
In one of the multiple Video Access Modules compatible with GX4.11, one of the
interfaces can be used as a monitor port and configured in the same manner as the 8 x ASI
Transport Module for Nimbra One/300 described in the previous section. If configured in
this way, the physical port will be busy in this configuration and one less interface is
available for active signals.
First, an ITS unicast is defined. Another port is selected as monitor port from the ITS
Interface link. The original port is selected as Interface to monitor. The direction of the
original signal also has to be configured, but the Enable front-panel selection button is not
relevant as the button is lacking.
After configuration, select OK or Apply and the configuration is made.

Figure 426. Configuration of line type loopback on an 8 x Video Access Module on
Nimbra 680. Interface asi/sdi-7:2 is monitored in the out direction.

19.2.3 Loopback from the DTM side in Video Access Modules
for Nimbra 600
In order to configure a module for a DTM type of loopback, the interface already
configured as an end point of the ITS unicast can be used as an originating interface of
another ITS unicast. In this manner, the outgoing signal is both sent out from the interface
towards the line and returned towards the DTM side and the terminating interface of the
second ITS unicast. The principle is illustrated below.

Element Manager User's Manual Loopback 384

2013 Net Insight AB, All rights reserved


Figure 427. Loopback from the DTM side in 8 x Video Access Module for Nimbra 680.
To configure the output interface for usage as source for another channel, Loopback must
be configured as DTM.

Figure 428. In order to set up the output interface to also be used as an input interface
(associated with another source TTP), Loopback must be set to DTM.
Nimbra node A
Interface terminating one ITS
unicast and originating a second
Nimbra node B
First ITS unicast
Second ITS unicast

Element Manager User's Manual Loopback 385

2013 Net Insight AB, All rights reserved
The second ITS service is configured as a regular ITS service, with source TTP tied to the
interface set to DTM loopback mode.

Element Manager User's Manual Redundancy for Nimbra 600 386

2013 Net Insight AB, All rights reserved
20 Redundancy for Nimbra
600
20.1 General
Redundancy is available with the Nimbra 600 Series and software NimOS GX 4.1.0 and
later versions. In order to keep the node operating normally or with a minimal interruption
upon module failure or degradation, Node Controllers and Switch Modules can be
duplicated. A failure of an active module causes an automatic switchover to a standby
module with minimal or no loss of traffic. In order to understand how the duplicated
modules operate, three module specific state variables (AdminStatus, OperStatus and
RedundancyRole) are important and described.
AdminStatus is set by the user to either Up or Down on each module. Down implies that
the module is not intended to take an active role as Node Controller or Switch Module.
OperStatus can be one of Up, Degraded, Starting, down or Absent. OperStatus Up means
that the module is working properly. Note that this does not imply that the module is active,
only that it may be. State variable RedundancyRole (see below) determines if it actually is.
OperStatus Degraded means that an error has been detected on the module, but it may be
able to function anyway. Starting (a transient state) means that the module is starting up.
Down means that the administrative status for the module is set to Down, or that the
module has suffered a serious failure and cannot take over control of the node. Absent
means that there is no module physically present.
RedundancyRole can be one of Active, Standby or None. Active means that the module is
operational. Only one of the two duplicated modules can be active at a given time. Standby
means that the module is prepared to immediately take over the critical tasks and become
active. None indicate that the module is unable to take over as active for the moment.
LEDs on the module front display current status of OperStatus (Status LED) and
RedundancyRole (Redundancy LED). A green Status LED indicate operStatus Up and a
green Redundancy LED indicate RedundancyRole Active.


Figure 429. Node controller for Nimbra 600.
Another state variable, nodeStatus, is tied to the node, not individual modules. Normally, it
has value Up. In case persistent channels are set up and the Node Controller reboots for
some reason, the persistent channels are kept and the nodeStatus variable takes the value
NoControl. No traffic interruption is seen on these persistent channels during the reboot,
but the Node Controller lacks proper control of node hardware afterwards. In order to

Element Manager User's Manual Redundancy for Nimbra 600 387

2013 Net Insight AB, All rights reserved
complete the reset, nodeStatus has to be set to Up by the user. At this point, traffic
disturbance follows on the persistent channels.
20.2 Node Controller redundancy
The key idea in order to have a properly working node at all times is to replicate (copy) any
changes in software or configuration on the active Node Controller as soon as they occur to
the other Node Controller. In this manner, the standby Node Controller always has the
latest software and configuration and is ready to take over.
The replication procedure is initiated by the active Node Controller. It updates software and
configuration on the standby Node Controller to match its own settings. After successful
completion of the replication procedure, the Standby Node Controller reads some necessary
information from the new registry file but is not rebooted.
Replication takes place when the Node Controller is promoted to active or when the state
variable OperStatus on the other Node Controller is changed to Up or Degraded.
Replication also takes place when software has been upgraded or the configuration has
changed on the active Node Controller. When software has been upgraded, the standby
node controller is always rebooted.
Upon failure or restart of the active Node Controller, the standby Node Controller takes
over as active Node Controller (i.e. its RedundancyRole state variable changes from
Standby to Active) immediately if the value of its OperStatus state variable is Up. In case
this value is Degraded, the standby Node Controller waits for the (previously) active Node
Controller to restart before taking any actions. If the OperStatus state variable of the latter
Node Controller is Up after restart, it becomes active again and continues to run the node
and the standby Node Controller remains standby. If the (previously) active Node
Controller comes up with an OperStatus state variable value of Degraded, Down or Absent
after reboot, the Standby node-controller is promoted to Active, even though its OperState
state variable value is Degraded. It is not recommended to run the node in this way for any
prolonged period of time.
When the operator restarts the node, both Node Controllers are restarted. The Node
Controller that is fastest to boot becomes the active one. Typically, the standby node
controller is faster to reboot as it has fewer running processed that needs to be taken down
before it can reboot.
In order to maintain changes in the Standby Node Controllers state variable AdminStatus
upon soft or hard reboot, it is essential to save any altered configuration on the active Node
Controller. Saving the configuration copies the (saved) configuration to the Standby Node
Controller automatically. Replicaton takes place directly after the configuration is saved.
The node should be configured from the serial port of the active Node Controller. The
active Node Controller is identified from its green Redundancy LED, whereas the
Redundancy LED of a standby Node Controller is amber. Once the initial IP configuration
has been made, it is suggested that an Ethernet switch be introduced before the two Node
Controllers. In this way, the user sees the node as one entity with one IP address
irrespective of which Node Controller is active.

Element Manager User's Manual Redundancy for Nimbra 600 388

2013 Net Insight AB, All rights reserved

Figure 430. Hardware configuration of redundant Node Controllers and Switch Modules.
It should be observed that the Node IP address is associated with different hardware
(different MAC addresses) depending on which Node Controller is active.
In the web based user interface, it looks like the user manages the node and not the node
controllers. The user needs not be concerned about which Node Controller is active, only to
manage the Node. The Node Controllers manage the node collectively.
20.3 Switch Module redundancy
From a user perspective, switch mode redundancy works transparently. Plug in one Switch
Module and there is no redundancy; plug in two Switch Modules and there is redundancy.
There is no problem to power the switch with dual Switch Modules mounted; in fact that is
the suggested way to work if redundancy is planned from the start.
Internally, as long as the active Switch Module has OperStatus Up, it continues to be active.
If its OperStatus value for some reason changes to Degraded, negotiation with the standby
Switch Module begins and as a result its RedundancyRole state variable changes to Standby
and the RedundancyRole variable of the previously Standby Switch Module changes to
Active.
The Node takes its synchronization signal from the active switch module. For this reason,
an external synchronization signal has to be split before the interface to the switch modules.
The signal is distributed to the modules. Make sure the connecting cables from the splitter
to the switch modules are as identical as possible. In this manner it is ascertained that the
same synchronization signal reaches both Switch Modules and it does not matter which
module is active.
On the Status/Equipment page in the web interface, the active module can be found (shown
below).

Element Manager User's Manual Redundancy for Nimbra 600 389

2013 Net Insight AB, All rights reserved

Figure 431. Status/Equipment web page of a system with duplicated Node Controllers and
Switch Modules.


Element Manager User's Manual Module installation 390

2013 Net Insight AB, All rights reserved
21 Module installation
21.1 General
There are a few things to consider when modules are added to a node installed in a network
in full operation. It is critical to have complete nodes aligned to a system release software
and the delivered new module(s) may have different system release software than the node.
In order to make sure that the system release software running on the node is downloaded
to the new module and the module is properly aligned, it is very important to follow the
procedure described in this chapter when installing new or replacement modules.
The system release software should be stored in a so called repository on a computer or
server with connectivity to the Nimbra node where the new module is installed. The
repository is a collection of files stored in a directory with the name of the system release.
An example is shown below:

Element Manager User's Manual Module installation 391

2013 Net Insight AB, All rights reserved

Figure 432. The repository, here for GX4.6.0.0, is shown.
21.2 Differences Nimbra One/300 vs Nimbra 600
Implementation of administrative status is different on Nimbra One/300 and Nimbra 600. If
a module has administrative status set to Down on a Nimbra One/300 node, power is shut
down to the module. Hence, the module is incommunicado and no software realignment is
possible. For this reason, all software realignment on Nimbra One/300 must be made with
admin status Up. Otherwise, the procedure outlined below can be followed. Make sure to
click on the Bring new image into service at the end of the procedure and OK in the
confirmation window irrespective of the misleading confirmation window.
The procedure below describes how to realign a Nimbra 600 node


Element Manager User's Manual Module installation 392

2013 Net Insight AB, All rights reserved
21.3 Addition of new modules to existing nodes
Before new modules are inserted in existing nodes, it is crucial that the administrative status
of the slot position is set to down in the Nimbra 600. If it is not, the module comes up
directly. This may cause various problems if the system release software is not aligned.
Connect to the node via the web interface. Log in to the node and follow the link System
Equipment. Click on the interface link (IF1 IF8) of the slot(s), which will receive the new
module(s). In the drop-down menu, select Down as value for Administrative status, then
click the Apply button.

Figure 433. Status equipment page, with administrative status of all interface slots set to
up, except slot IF8.
After the administrative status of the slot/module has been set to down, the new module
may be inserted in the slot. While the administrative status is still down, alignment of the
system release software of the node and the module is made.


Element Manager User's Manual Module installation 393

2013 Net Insight AB, All rights reserved

Figure 434. Status equipment page, with administrative status of all interface slots set to
up, except slot IF8 which is intended for the new module.
To check if the new module already is aligned with the rest of the node, click on the link
Maintenance Software. If the system alignment status parameter has value full, no
alignment is needed. In this case, all that remain is to change the value of the administrative
status parameter to Up on the new interface. If this is not the case, alignment is needed.


Element Manager User's Manual Module installation 394

2013 Net Insight AB, All rights reserved

Figure 435. A node with full system alignment status after the new module is inserted does
not need additional software alignment. All that remain is to set the
administrative status of the new module to Up.


Figure 436. A node with other system alignment status than full needs realignment
between the new module and the node. This process is described below.

Element Manager User's Manual Module installation 395

2013 Net Insight AB, All rights reserved
In order to align node and module system releases, the repository of the node system
release software is stored on an http or ftp server. Follow the link Maintenance Software
and click on the button Install image. The page below appears on the screen.

Figure 437. Install image web page.
Type the URL to the http or ftp server. The syntax below gives two examples, one for http
and one for an ftp server.

Figure 438. Example of an http server. The repository of system release software
GX4.10.0.1 is found under directory official/GX4.10.0.1/GX4.10.0.1/ of the
http server.

Element Manager User's Manual Module installation 396

2013 Net Insight AB, All rights reserved

Figure 439. Example of an ftp server, with user root and password neti. The repository of
system release software GX4.10.0.1 is found under directory /repos of the ftp
server.
Clicking on the install button starts the alignment process to the repository system release
software version, i.e. the installation of the system release software to the entire node
including the parts with administrative status down. After a brief interruption, a progress
report is generated.

Figure 440. Progress report of installation.
When the installation is complete, the web interface communicates this.


Element Manager User's Manual Module installation 397

2013 Net Insight AB, All rights reserved

Figure 441. Message of complete installation.
For details, the installation log can be viewed.
Click on the link Maintenance Software. If alignment exists, the system alignment status
parameter has value full. In this case, just change the administrative status of the module to
Up. Then the system is aligned and operational.
Otherwise, the inserted module must have its ipmc software restarted (this software is never
automatically rebooted). To manually reset this process, follow the link Maintenance
Software. Click on the Bring installed image into service button.
If this step is required, click on the Bring installed image into service after saving the
configuration. A general confirmation window pops up, asking if the user wants to restart
the node controller. However, the installation software ensures that only software that needs
to be restarted is restarted. If this procedure has been followed, there is no need for a restart
of the node controller and no such restart will occur. In order to align software,
confirmation must be given in the confirmation window (i.e. the question must be answered
with OK, not Cancel).
After this set is completed, just set the administrative status to Up and the module is
operational and the node is fully aligned.

Element Manager User's Manual Up- and Downgrading 398

2013 Net Insight AB, All rights reserved
22 Up- and Downgrading
22.1 General
Changing system release software, i.e. a defined collection of soft- and firmware modules,
can be made to a higher or lower system release. In addition, an enhanced
software/firmware feature, requiring a separate software license, can be added without
modifying the system release.
In this chapter, the regular up/downgrading procedure is described first. Addition of
enhanced features without altering system release is described later in this chapter, on a
case-by-case basis. Currently, there are a many different enhanced features; addition of
FEC on a 4 x OC-3/STM-1 Trunk Module; change of trunk speed on Nimbra
310/320/360/380; change of mode on the DS3/E3 Trunk/Access Module; change of
firmware (ASI/AES/MADI) on ASI/AES Video Access Module; change of firmware
(Encoder/Neutral/Decoder) on JPEG 2000 Video Access Module and change of firmware
(Regular ETS, ETS 1+1) on 8 x Gigabit Ethernet Access Module.
The regular up/downgrading procedure is described on a node basis, from the web
interface. Changing the system release software in a Nimbra network is conveniently
handled by the Nimbra Vision software. Using this software, checks are made that proper
software and firmware are loaded in all places where they are needed.
22.2 Up/downgrading GX version from web GUI

In GX4.1.2 and all later system releases, software and embedded software modules (i.e.
application packages) are delivered in a release repository file. This file is a compressed
file with a directory and an internal file structure. The file is intended to be unpacked on a
file server. The unpacked repository, which is what we in this text refer to as repository, is a
flat file structure with a directory that carries the name of the repository. All files belonging
to the repository are located directly under the (repository) directory.
The node has to be able to reach the file server with http or ftp in order to be upgraded.
22.2.1 Saving the current configuration
Before any up- or downgrade is started, the current configuration should be saved and
preferably labeled with current system release version. If a downgrade is ever needed, a
saved configuration file from relevant previous release should be transferred to the node
before the downgrade is carried out. A configuration name of Config_for_GX4.11.0.0 or
similar (for the appropriate system release) is suitable to keep track of the system release
under which the configuration file was generated.
During the upgrade process, the version of the configuration (not identical to the system
release software) is read by the system. If the configuration is from the future, i.e. newer
than the system release software version, the configuration is skipped and the reboot is
attempted with the next configuration file in the registry list. If all configurations are from
the future, i.e. a downgrade is made on the node without a usable configuration, the node
reboots without configuration, i.e. without IP settings, and the only way to communicate
with the node is through the serial interface (console port).

Element Manager User's Manual Up- and Downgrading 399

2013 Net Insight AB, All rights reserved
In the table below, configuration version numbers and system release software are
specified.

System release software Configuration version number
GX4.4 4
GX4.5 5
GX4.7 5
GX4.8 5
GX4.9.0.0 5
GX4.9.0.1 6
GX4.10 6
GX4.11 6
GX4.12 6
Figure 442. System release software and configuration version numbers
For a configuration file with unknown version number, the easiest way to find out is to
open the file in e.g. WordPad. The version number is displayed at the very top of the file.



Figure 443. Header for configuration file BasicConfigGX47
22.2.2 Repository
A repository is a file structure, with one directory and all files belonging to the repository
located directly in this directory. The tarred and compressed file of this structure is
sometimes also called a repository. From Net Insight support portal it is possible to
download software for different releases. In addition to the compressed repository,
compressed MIB files for the release are included in the package. The release repository
file for release GX4.10.0.2 is called GX4.10.0.2.tgz and analogously for other system
releases.
Unpack the .tgz file on an ftp or http server. In the example below, the .tgz file is
unpacked in the <target-dir> directory. The sub-directory GX4.10.0.2 is created in the
process.
On a Linux server, proceed as follows (from the directory <target-dir>)
# tar xzf GX4.10.0.2.tgz
This will unpack the GX4.11.0.0 repository to the directory
<target-dir>/GX4.10.0.2/
On a Windows server, if the tar/gzip commands are not available, the file can be unpacked
with a file decompression utility like 7-zip or Winrar. Note that WinZip does not
decompress all files correctly! For that reason it cannot be used.

Element Manager User's Manual Up- and Downgrading 400

2013 Net Insight AB, All rights reserved
The unpacked repository contains all the files that constitute the new GX release. To check
the integrity of the repository directory, go to the directory and run (Linux):
# md5sum -c md5sums
If all files are printed with an OK after the file name, the repository is correctly set-up and
ready to be used. If the checksum is not correct, the file transfer has not been successful. In
that case, dont use the files and call Net Insight support.
Below all files belonging to repository ~/repos/GX4.10.0.2/GX4.10.0.2 are shown.
rippo:~/repos/GX4.10.0.2/GX4.10.0.2> ls la
total 96952
drwxr-xr-x 2 gunlar users 4096 2012-08-28 11:08 ./
drwxr-xr-x 3 gunlar users 4096 2012-09-28 10:02 ../
-r--r--r-- 1 gunlar users 67317 2012-08-28 10:59 AP_install
-r--r--r-- 1 gunlar users 5412 2012-08-28 11:06 fingerprints
-r--r--r-- 1 gunlar users 3122 2012-08-28 11:08 md5sums
-r--r--r-- 1 gunlar users 511152 2012-08-27 08:18 NPM0006-0155_B3.flow
-r--r--r-- 1 gunlar users 7864588 2012-08-28 11:02 NPM0013-N101_R3.flow
-r--r--r-- 1 gunlar users 8034048 2012-08-28 11:02 NPM0013-N301_R3.flow
-r--r--r-- 1 gunlar users 76300 2012-04-13 08:50 NPM0014-N101_A10.flow
-r--r--r-- 1 gunlar users 73904 2012-04-13 08:50 NPM0014-N301_A8.flow
-r--r--r-- 1 gunlar users 73904 2012-04-13 08:50 NPM0014-N361_A3.flow
-r--r--r-- 1 gunlar users 303060 2012-08-27 08:18 NSF0010-0141_B9.flow
-r--r--r-- 1 gunlar users 325844 2012-08-27 08:18 NSF0010-0441_B9.flow
-r--r--r-- 1 gunlar users 314260 2012-08-27 08:18 NSF0010-1621_B9.flow
-r--r--r-- 1 gunlar users 511152 2012-08-27 08:18 NSF0011-0001_A36.flow
-r--r--r-- 1 gunlar users 511152 2012-08-27 08:18 NSF0012-0001_B8.flow
-r--r--r-- 1 gunlar users 1027760 2012-08-27 08:18 NSF0013-0001_C6.flow
-r--r--r-- 1 gunlar users 1027760 2012-08-27 08:18 NSF0013-0141_C6.flow
-r--r--r-- 1 gunlar users 1027760 2012-08-27 08:18 NSF0013-0421_C6.flow
-r--r--r-- 1 gunlar users 580016 2012-08-27 08:18 NSF0014-0001_B2.flow
-r--r--r-- 1 gunlar users 580016 2012-08-27 08:18 NSF0014-A001_A8.flow
-r--r--r-- 1 gunlar users 387044 2012-08-27 08:18 NSF0019-0340_A35.flow
-r--r--r-- 1 gunlar users 356484 2012-08-27 08:18 NSF0019-HD01_A28.flow
-r--r--r-- 1 gunlar users 1844580 2012-08-27 08:18 NSF0020-0001_A23.flow
-r--r--r-- 1 gunlar users 1896780 2012-08-27 08:18 NSF0020-AEB1_A20.flow
-r--r--r-- 1 gunlar users 2149868 2012-08-27 08:18 NSF0020-SD01_A12.flow
-r--r--r-- 1 gunlar users 393764 2012-08-27 08:18 NSF0021-0360_E4.flow
-r--r--r-- 1 gunlar users 519028 2012-08-27 08:18 NSF0032-0380_A23.flow
-r--r--r-- 1 gunlar users 88292 2008-02-20 08:28 NSS0004-0001_1.2.2.flash
-r--r--r-- 1 gunlar users 849172 2012-04-13 09:10 NSS0006-X001_E1.flow
-r--r--r-- 1 gunlar users 3627900 2012-04-13 09:10 NSS0011-0001_R1.flow
-r--r--r-- 1 gunlar users 46008 2012-04-13 08:50 NSS0012-0001_A4.flow
-r--r--r-- 1 gunlar users 46124 2012-04-13 08:50 NSS0012-0002_A2.flow
-r--r--r-- 1 gunlar users 9668940 2012-08-28 11:02 NSS0013-0001_S3.flow
-r--r--r-- 1 gunlar users 335408 2012-04-13 08:50 NSS0014-0001_A6.flow
-r--r--r-- 1 gunlar users 13456 2012-03-26 16:06 NSS0019-APP1_G6.flow
-r--r--r-- 1 gunlar users 73916 2012-04-13 08:50 NSS0024-3001_A2.flow
-r--r--r-- 1 gunlar users 1268876 2012-04-13 09:10 NSX0011-0001_T1.flow
-r--r--r-- 1 gunlar users 1132880 2012-06-21 08:10 NSX0012-0001_T2.flow
-r--r--r-- 1 gunlar users 1074016 2012-06-21 08:10 NSX0018-0002_T2.flow
-r--r--r-- 1 gunlar users 1063692 2012-06-21 08:10 NSX0020-0001_T2.flow
-r--r--r-- 1 gunlar users 1069552 2012-06-21 08:10 NSX0021-0001_T2.flow
-r--r--r-- 1 gunlar users 1762124 2012-06-21 08:10 NSX0022-0001_R2.flow
-r--r--r-- 1 gunlar users 1540172 2012-04-13 09:10 NSX0025-0001_T1.flow
-r--r--r-- 1 gunlar users 2224732 2012-06-21 08:10 NSX0027-0001_S2.flow
-r--r--r-- 1 gunlar users 3010248 2012-06-21 08:10 NSX0030-E0D0_F2.flow
-r--r--r-- 1 gunlar users 4451752 2012-06-21 08:10 NSX0030-E0D4_D2.flow
-r--r--r-- 1 gunlar users 4414920 2012-06-21 08:10 NSX0030-E4D0_D2.flow
-r--r--r-- 1 gunlar users 569480 2012-08-28 11:02 NSX0031-3602_J2.flow
-r--r--r-- 1 gunlar users 3531420 2012-08-28 11:02 NSX0031-N013_J2.flow
-r--r--r-- 1 gunlar users 1546984 2012-06-21 08:10 NSX0033-A001_C2.flow
-r--r--r-- 1 gunlar users 1527272 2012-06-21 08:10 NSX0033-E001_G2.flow
-r--r--r-- 1 gunlar users 1503144 2012-06-21 08:10 NSX0033-M001_E2.flow
-r--r--r-- 1 gunlar users 2417672 2012-08-28 11:02 NSX0034-E601_J3.flow
-r--r--r-- 1 gunlar users 1452464 2012-06-21 08:10 NSX0036-0002_C2.flow
-r--r--r-- 1 gunlar users 4631752 2012-06-21 08:10 NSX0037-0001_B2.flow
-r--r--r-- 1 gunlar users 3103400 2012-06-21 08:10 NSX0040-E0D0_B2.flow
-r--r--r-- 1 gunlar users 5118056 2012-06-21 08:10 NSX0040-E0D4_B2.flow
-r--r--r-- 1 gunlar users 5230696 2012-06-21 08:10 NSX0040-E4D0_B2.flow
-r--r--r-- 1 gunlar users 10951 2012-08-28 11:06 Packages.list

Element Manager User's Manual Up- and Downgrading 401

2013 Net Insight AB, All rights reserved
22.2.3 Up-/downgrading from the web GUI
To up- or downgrade the system release software on a node, start with saving the
configuration. This is good practice, as youll never know if you need the configuration
again, in case you need to revert after an unsuccessful installation.
This is made from web page Maintenance Configuration and the button Save
configuration.


Figure 444. Save configuration web page.
After this step is taken, continue with web page Maintenance Software. The button
Install image takes you to a web page where you can install software from a repository
and change firmware while keeping the system release software constant.


Figure 445. Install system release software web page.
In the field for Install from URL, write the URL directly after the double slash sign. This
will assume that the repository is on an http server. In case an ftp server is used instead,
replace http with ftp and proceed the same way. The structure is of the commands are:


Element Manager User's Manual Up- and Downgrading 402

2013 Net Insight AB, All rights reserved
http://<IP of Repository server>:<Port used by http>/<Repository>

ftp://user:pass@<IP of Repository server>:<Port used by ftp>/<Repository>

If standard ports are used, they dont need to be specified.


Figure 446. Installation from http server 10.100.0.82. Repository GX4.10.0.2 is residing on
directory /official/GX4.10.0.2.



Figure 447. Installation from ftp server 192.168.101.136 with user root/password neti.
Repository GX4.10.0.2 is residing used.

The web page checks the new release and compares it with installed hardware. All relevant
software and firmware images are retrieved from the repository and installed at appropriate
locations in the node.

Element Manager User's Manual Up- and Downgrading 403

2013 Net Insight AB, All rights reserved
After the message Installation completed successfully, proceed with clicking on the OK
button. This button takes you to the Maintenance Software web page. To start the node
with the new software, click on the Bring installed image into service button.
Note that the startup on new software may be service disrupting.
The procedure can just as easily be used for downgrades as for upgrades. The only thing
determining what release is installed in the node is the repository, which defines the system
release software version.
It is recommended that caution is used in downgrading GX software as testing is limited
and will continue to be so. If needed to downgrade, contact Net Insight for the availability
of repositories for older releases, or look directly in the Net Insight support portal.
22.2.4 Required intermediate system releases
This procedure described in the previous section can only be used to upgrade to system
release GX.4.1.3.5. For upgrades to higher releases (i.e. newer releases) the upgrade must
be made in multiple steps. After a successful installation of GX4.1.3.5, node install can be
used once more to install a newer system release. In this second step, a new repository must
be used. The procedure may need to be replicated several times, which is described in the
table below. Each time an upgrade is made, the configuration file should be saved and the
node rebooted with the intermediate system release software, before proceeding to the next
system release software in the sequence.
When upgrading to a version, always upgrade to the last available patch, unless there is a
specific reason to the contrary.


Element Manager User's Manual Up- and Downgrading 404

2013 Net Insight AB, All rights reserved

Current system
release
Target
system
release
Required intermediate system
releases
GX4.1.2.0 -
GX4.1.2.2
GX4.1.3.0 -
GX4.1.3.4
GX4.5.0.2
GX4.6.0.3
GX4.7.0.5
GX4.1.3.5
GX4.3.0.4
GX4.4.0.7
GX4.8.0.4
GX4.9.0.2
GX4.7.0.5
GX4.10.0.2
GX4.12.0.0
GX4.9.0.2
GX4.1.3.5
GX4.1.4.1
GX4.1.4.5
GX4.2.0.1
GX4.2.0.2
GX4.2.0.4 -
GX4.2.0.7
GX4.3.0.0
GX4.3.0.1
GX4.3.0.3
GX4.5.0.2
GX4.6.0.3
GX4.7.0.5
GX4.3.0.4
GX4.4.0.7
GX4.8.0.4
GX4.9.0.2
GX4.7.0.5
GX4.10.0.2
GX4.12.0.0
GX4.9.0.2
GX4.3.0.4
GX4.4.0.1
GX4.4.0.6
GX4.5.0.2
GX4.6.0.3
GX4.7.0.5

GX4.4.0.7
GX4.8.0.4
GX4.9.0.2
GX4.7.0.5
GX4.10.0.2
GX4.12.0.0
GX4.9.0.2
GX4.4.0.7 -
GX4.7.0.5
GX4.5.0.2
GX4.6.0.3
GX4.7.0.5

No intermediate system releases
required
GX4.8.0.4
GX4.9.0.2
GX4.7.0.5
GX4.10.0.2
GX4.12.0.0
GX4.9.0.2
GX4.8.0.3 -
GX4.9.0.2
GX4.8.0.4
GX4.9.0.2
No intermediate system releases
required
GX4.10.0.2
GX4.12.0.0
GX4.9.0.2
Figure 448. Table for required intermediate system releases for upgrading.
An upgrade must go through all intermediate releases, stated in the rightmost column. For
example, upgrading from GX4.2.0.6 (between GX4.2.0.4 and GX4.2.0.7) to GX4.12.0.0
must go through GX4.3.0.4, GX4.4.0.7, GX4.7.0.5 and GX4.9.0.2.


Element Manager User's Manual

2013 Net Insight AB, All rights reserved
Current system
release
GX4.1.3.5
GX4.1.4.1
GX4.1.4.5
GX4.2.0.1
GX4.2.0.2
GX4.2.0.4 -
GX4.2.0.7
GX4.3.0.0
GX4.3.0.1
GX4.3.0.3
GX4.5.0.2
GX4.6.0.3
GX4.7.0.5

GX4.8.0.3
GX4.9.0.2
GX4.10.0.2
GX4.1
Figure 449. Explanation how to read the previous table; in this case how to upgrade from
version GX4.2.0.6 to GX4.1
required intermediate system releases.
For upgrades from versions prior to GX4.1.
One/300 series), this procedure does not work. In case you have such needs, please contact
Net Insight.
22.3 Addition of functional enhancement
22.3.1 General
All functional enhancements described in this section of Element Manager require separate
software licenses.

Note:

All functional enhancements described in this section require a
separate software license.
the upgrade procedure
Replacement of firmware is most easily done directly from the web
22.3.2 FEC to the 4 x OC
Adding FEC to the 4 x OC
additional option, --replace
rather an enhancement u
d <module #> should be used.

The syntax is (for Nimbra One
For an http-server

-d <if #> --replace
http://<IP>:<port>/

and for an ftp-server

Up- and Downgrading
2013 Net Insight AB, All rights reserved
Target
system
release
Required intermediate system
releases
GX4.5.0.2
GX4.6.0.3 -
GX4.7.0.5 -

GX4.3.0.4
GX4.4.0.7
GX4.8.0.3 -
GX4.9.0.2
GX4.7.0.5
GX4.10.0.2
GX4.12.0.0
GX4.9.0.2
Explanation how to read the previous table; in this case how to upgrade from
version GX4.2.0.6 to GX4.12.0.0. All the emboldened system releases are
required intermediate system releases.
For upgrades from versions prior to GX4.1.2 (Nimbra 600 series) or GX3.3.3.0 (Nimbra
One/300 series), this procedure does not work. In case you have such needs, please contact
Addition of functional enhancement
All functional enhancements described in this section of Element Manager require separate
ll functional enhancements described in this section require a
separate software license. This license should be obtained before
the upgrade procedure begins.
Replacement of firmware is most easily done directly from the web interface.
FEC to the 4 x OC-3/STM-1 Trunk Module from CLI
Adding FEC to the 4 x OC-3/STM-1 Trunk Module can be made from the web GUI.
replace, tells the script that it is not a question of system upgrade but
rather an enhancement upgrade. To indicate what interfaces are to be upgraded, the flag
should be used.
The syntax is (for Nimbra One and 300 nodes):
replace NSF0011-0001,NPM0006-0155
/<dir>/GX4.11.0.0
and Downgrading 405
Explanation how to read the previous table; in this case how to upgrade from
All the emboldened system releases are
X3.3.3.0 (Nimbra
One/300 series), this procedure does not work. In case you have such needs, please contact
All functional enhancements described in this section of Element Manager require separate
from CLI
from the web GUI. An
, tells the script that it is not a question of system upgrade but
To indicate what interfaces are to be upgraded, the flag

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
-d <if #> --replace
ftp://usr:pass@<IP>:<Port>/<dir>/GX4.9.0.2

Example:

Figure 450. Installation of new (FEC) firmware on OC
Nimbra One/300 series.
22.3.3 Changing fixed trunk interface
310/320/360/380

Note:

This procedure should only be executed with a separate data
network. Using in
node upon reboot of the node.

The functionality (supported trunk rate) for the fixed trunks of a Nimbra
is easiest changed from the web interface.
STM-1/OC-3 trunks requires additional licenses
upgrading.
Note that if time transfer is added on an IP Trunk,
time transfer interfaces are available.
To change firmware from the web interface
Maintenance Software
Up- and Downgrading
2013 Net Insight AB, All rights reserved
replace NSF0011-0001,NPM0006-0155
ftp://usr:pass@<IP>:<Port>/<dir>/GX4.9.0.2
Installation of new (FEC) firmware on OC-3/STM-1 trunk modules for
Nimbra One/300 series.
Changing fixed trunk interface on Nimbra
360/380
This procedure should only be executed with a separate data
network. Using in-band DLE causes a loss of contact with the
node upon reboot of the node.
The functionality (supported trunk rate) for the fixed trunks of a Nimbra 310/320/
changed from the web interface. Note that changing the default setting of 4
3 trunks requires additional licenses, which should be obtained before
Note that if time transfer is added on an IP Trunk, available in GX4.12, only one of the two
time transfer interfaces are available.
To change firmware from the web interface and use different trunk rates, follow the link
Software. On this page, click on the button Install on-board image
and Downgrading 406

1 trunk modules for
320/360/380
Note that changing the default setting of 4 x
, which should be obtained before
only one of the two
, follow the link
board image.

Element Manager User's Manual Up- and Downgrading 407

2013 Net Insight AB, All rights reserved

Figure 451. Web page for replacement of the default setting on the fixed interfaces of a
Nimbra 310/320/360/380.
A new web page appears; Maintenance Software Install. Here a repository with the
required files is needed; it is possible to install trunk firmware OC-3/STM-1, OC-12/STM-
4, OC-48/STM-16 or IP-Trunk firmware. Installation of IP-trunk firmware requires version
B of Nimbra 360 or Nimbra 310/320/380.

Figure 452. Selection of fixed trunk firmware on a Nimbra 310/320/360/380.
Select the required firmware and click on install. To later activate the new firmware, save
the configuration and go back to Maintenance Software. This step is needed as the
change of firmware automatically is a change of the configuration. Clicking on Bring
installed image into service makes the new firmware with new rates active. Before the
node is restarted, a warning pop-up shows up.

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
Figure 453. Activation of the new firmware is made by clicking on the Bring installed
image into service button.

Figure 454. Warning p
Observe that in all cases when the firmware has been replaced, the old DTM interfaces
remain with operational status absent. If the user doesnt intend to go back to previous
interface rates, these interfaces can (and it is recommended that they) be deleted.

22.3.4 Setting modes for 4 x DS3/E3 Trunk/Access Modules
Note:

This procedure should only be executed with a separate data
network. Using in
node u


The 4 x DS3/E3 trunk/access module
trunk or in access configuration. The hardware is common; the difference in the two cases
is the firmware placed on the module. It is fairly easy to reconfigure
trunk mode operation
mode is called NSF0014
Up- and Downgrading
2013 Net Insight AB, All rights reserved
Activation of the new firmware is made by clicking on the Bring installed
image into service button.
Warning pop-up after firmware upgrade of trunks in Nimbra 310/320/
Observe that in all cases when the firmware has been replaced, the old DTM interfaces
remain with operational status absent. If the user doesnt intend to go back to previous
, these interfaces can (and it is recommended that they) be deleted.
Setting modes for 4 x DS3/E3 Trunk/Access Modules
This procedure should only be executed with a separate data
network. Using in-band DLE causes a loss of contact with the
node upon reboot of the node.
4 x DS3/E3 trunk/access module for Nimbra One/300 can be set to operate either in
trunk or in access configuration. The hardware is common; the difference in the two cases
is the firmware placed on the module. It is fairly easy to reconfigure the module and change
operation to the access mode operation and vice verse. Firmware for trunk
NSF0014-0001 and firmware for access mode is NSF0014-A001
and Downgrading 408

Activation of the new firmware is made by clicking on the Bring installed

320/360/380.
Observe that in all cases when the firmware has been replaced, the old DTM interfaces
remain with operational status absent. If the user doesnt intend to go back to previous
, these interfaces can (and it is recommended that they) be deleted.
Setting modes for 4 x DS3/E3 Trunk/Access Modules
can be set to operate either in
trunk or in access configuration. The hardware is common; the difference in the two cases
module and change
and vice verse. Firmware for trunk
A001.

Element Manager User's Manual Up- and Downgrading 409

2013 Net Insight AB, All rights reserved
To install the access mode firmware on a module configured as a trunk module, go to the
web page for Maintenance Software. As described with earlier firmware upgrades, a
configuration should be saved before the upgrade.


Figure 455. Installation of access firmware on a 4 x DS3/E3 module running trunk
firmware starts with the Install image.


Figure 456. Installation of new (access) firmware on the 4xDS3/E3 Trunk/Access module.

To change a module in trunk mode to operate in access mode, fill out the field with
-d <slot #> --replace NSF0014-0001,NSF0014-A001 http://<IP>:<Port>/<repos>

To do the reverse:
-d <slot #> --replace NSF0014-A001,NSF0014-0001 http://<IP>:<Port>/<repos>

Of course, both actions can be made from an ftp server rather than an http server.

Element Manager User's Manual

2013 Net Insight AB, All rights reserved

When the download is finished, save the configuration once more and
installed image into service.
An Access mode feature license is needed to enable/use a 4 x DS3/E3 Trunk/Access
Module with access functionality if it has been purchased for trunk use, and that a Trunk
mode feature license is needed to enable/use
trunk functionality if it has been purchased for access use.
22.3.5 Changing firmware on JPEG2000 Video Access
Modules by CLI

Note:

This procedure should only be executed with a separate data
network. Using in
node upon reboot of the node.


From GX4.12 and later releases, t
v2 for Nimbra 600. The
like encoding, decoding and neutral
neutral firmware, which support uncompressed video streams. If used
JPEG encoding firmware must be used
must be used. The available firmware modules are presented in the table below.

Module name
JPEG 2000 Video
Access module v2
JPEG 2000 Video
Access module v2
JPEG 2000 Video
Access module v2
Figure 457. Different
The module is inserted in a slot in the Nimbra 600 node. The slots are numbered between
IF1 and IF8 for Nimbra 680 and IF1 and IF16 for Nimbra 688.
NCA and NCB, whereas slots
The default firmware, i.e. the firmware that is delivered
firmware (NSX0040-E0D0
the decoding firmware from
The structure of the string to enter in the field for new software is

-d <i/f#> --replace <Old FW>,<New FW> http://<IP>:<Port>/<Repos>

The type of server may
Up- and Downgrading
2013 Net Insight AB, All rights reserved
When the download is finished, save the configuration once more and use the button Bring
installed image into service. These actions are detailed previously.
n Access mode feature license is needed to enable/use a 4 x DS3/E3 Trunk/Access
Module with access functionality if it has been purchased for trunk use, and that a Trunk
mode feature license is needed to enable/use a 4 x DS3/E3 Access/Trunk Module with
trunk functionality if it has been purchased for access use.
Changing firmware on JPEG2000 Video Access
by CLI
This procedure should only be executed with a separate data
network. Using in-band DLE causes a loss of contact with the
node upon reboot of the node.
From GX4.12 and later releases, there is one version of JPEG 2000 Video Access Module
The module can run different firmware, giving it different properties
decoding and neutral, i.e without compression. The module is delivered with
neutral firmware, which support uncompressed video streams. If used for JPEG encoding, a
JPEG encoding firmware must be used; if used for decoding, a JPEG decoding firmware
e used. The available firmware modules are presented in the table below.
Module
product
number
Firmware
type
Firmware Comment
NPS0074-
6001
Neutral NSX0040-
E0D0
Support uncompressed video
NPS0074-
6001
JPEG2000
Encoder
NSX0040-
E4D0
Support JPEG encoding and
uncompressed video
NPS0074-
6001
JPEG2000
Decoder
NSX0040-
E0D4
Support JPEG decoding and
uncompressed video
Different firmware possible to load on JPEG 2000 Video Access module
The module is inserted in a slot in the Nimbra 600 node. The slots are numbered between
IF1 and IF8 for Nimbra 680 and IF1 and IF16 for Nimbra 688. Slots for NCs are numbered
NCA and NCB, whereas slots for switch modules are numbered SWA and SWB.
, i.e. the firmware that is delivered on the module, is the neutral
E0D0). To change from the neutral firmware to either the encoding or
the decoding firmware from the web GUI, go to the Maintenance Software web page.
The structure of the string to enter in the field for new software is
replace <Old FW>,<New FW> http://<IP>:<Port>/<Repos>
The type of server may also in this case be ftp rather than http.
and Downgrading 410
use the button Bring
n Access mode feature license is needed to enable/use a 4 x DS3/E3 Trunk/Access
Module with access functionality if it has been purchased for trunk use, and that a Trunk
a 4 x DS3/E3 Access/Trunk Module with
Changing firmware on JPEG2000 Video Access
eo Access Module
different properties
delivered with
JPEG encoding, a
a JPEG decoding firmware
e used. The available firmware modules are presented in the table below.
Comment
Support uncompressed video
Support JPEG encoding and
uncompressed video
Support JPEG decoding and
uncompressed video
possible to load on JPEG 2000 Video Access module v2.
The module is inserted in a slot in the Nimbra 600 node. The slots are numbered between
Slots for NCs are numbered
for switch modules are numbered SWA and SWB.
is the neutral
. To change from the neutral firmware to either the encoding or
Software web page.

Element Manager User's Manual Up- and Downgrading 411

2013 Net Insight AB, All rights reserved
In order to put JPEG encoding firmware on the module with default (neutral) firmware
from a repository residing on an http-server (192.168.234.99/repos), using port 9090,
follow the example below.

-d if4 --replace NSX0040-E0D0,NSX0040-E4D0 http:// 192.168.234.99:9090/repos

Other changes of firmware are made analogously. Note the absence of spaces between the
two NSF product numbers. In this case, the IF must be included before the slot number.

-d if3 --replace NSX0040-E0D0,NSX0040-E4D0 http://192.168.234.99:9090/repos

In order to put JPEG decoding firmware on the module from a repository residing on an ftp
server (iov105/repos) and using port 222, run the script with options defined below.

-d if3 --replace NSX0040-E0D0,NSX0040-E0D4 ftp://user:pass@iov105:222/repos

Changing from encoding to decoding JPEG firmware can be done directly in a similar way.
Here it is illustrated from the http-server.

-d if3 --replace NSX0040-E4D0,NSX0040-E0D4 http://192.168.234.99:9090/repos

By extension, changing from JPEG decoder to JPEG encoder the URL field becomes:

-d if3 --replace NSX0040-E0D4,NSX0040-E4D0 http://192.168.234.99:9090/repos

Note that it is important that the command is written on one line and that no space in
inserted before or after the comma between the firmware versions.

22.3.5.1 Module restart
In order for the new firmware to become active, the module must be restarted. This can be
done from the web interface, from the Status Equipment page. Select the module and
toggle the administrative status of the module, i.e. set the administrative status first to
Down and then to Up. This procedure causes the module to restart with the new
firmware.

Element Manager User's Manual

2013 Net Insight AB, All rights reserved
Figure 458. Toggling the administrative status, i.e.
Up is a

22.3.5.2 Limitations and licenses
Using either JPEG2000 encoding or decoding firmware requires JPEG2000 feature
licenses. In GX4.12, one feature license is re
SDI. To encode/decode HD
four licenses are required.
HD-SDI streams can be compressed on a mo
used for uncompressed streams.
This release supports JPEG2000 compressed 3G
uncompressed 3G-SDI, HD
i.e. different stream types can be encoded or
22.3.6 Changing firmware on 8 x ASI/AES Access Module
Note:

This procedure should only be executed with a separate data
network. Using in
node upon reboot of t


8 x ASI/AES Access Module for Nimbra 600 can run on different firmware, giving it
different properties. The module is delivered with
video streams. In addition, there is an AES version (supports 8 x AES audio streams) and a
MADI version (supporting a MADI multiplexed audio stream).
The available firmware modules are presented in the table below.

Up- and Downgrading
2013 Net Insight AB, All rights reserved
Toggling the administrative status, i.e. setting it first to Down and then to
Up is a simple way to restart a module and run the new firmware.
Limitations and licenses
Using either JPEG2000 encoding or decoding firmware requires JPEG2000 feature
, one feature license is required to encode/decode one stream of SD
SDI. To encode/decode HD-SDI two licenses are required and to encode/decode 3G
required. Up to eight licenses can be used per module, i.e. at most four
SDI streams can be compressed on a module. The remaining four interfaces can be
used for uncompressed streams.
This release supports JPEG2000 compressed 3G-SDI, HD-SDI and SD-SDI, together with
SDI, HD-SDI, SD-SDI or ASI. Stream selection is made per interface,
stream types can be encoded or decoded on a single module.
Changing firmware on 8 x ASI/AES Access Module
This procedure should only be executed with a separate data
network. Using in-band DLE causes a loss of contact with the
node upon reboot of the node.
Access Module for Nimbra 600 can run on different firmware, giving it
different properties. The module is delivered with ASI firmware, supporting up to eight ASI
video streams. In addition, there is an AES version (supports 8 x AES audio streams) and a
MADI version (supporting a MADI multiplexed audio stream).
The available firmware modules are presented in the table below.

and Downgrading 412

setting it first to Down and then to
way to restart a module and run the new firmware.
Using either JPEG2000 encoding or decoding firmware requires JPEG2000 feature
quired to encode/decode one stream of SD-
SDI two licenses are required and to encode/decode 3G-SDI
Up to eight licenses can be used per module, i.e. at most four
dule. The remaining four interfaces can be
SDI, together with
SDI or ASI. Stream selection is made per interface,
Changing firmware on 8 x ASI/AES Access Module
Access Module for Nimbra 600 can run on different firmware, giving it
ASI firmware, supporting up to eight ASI
video streams. In addition, there is an AES version (supports 8 x AES audio streams) and a

Element Manager User's Manual Up- and Downgrading 413

2013 Net Insight AB, All rights reserved

Firmware
type
Firmware Comment
ASI NSX0033-A001 Supports up to 8 x ASI video streams
AES NSX0033-E001 Supports up to 8 x AES audio streams
MADI NSX0033-M001
Supports a multiplexed MADI audio stream
Figure 459. Different firmware possible to load on an 8 x ASI/AES Access Module.
The module is inserted in a slot in the Nimbra 600 node. The slots are numbered between
IF1 and IF8 for Nimbra 680 and IF1 and IF16 for Nimbra 688.
The default firmware on the module is the ASI firmware. To change from the ASI firmware
to either AES or MADI firmware from the web GUI, go to the web page Maintenance
Software and use the button Install image.

In the field for new software image, write a string to specify what modules should be
affected by the change, what firmware should be removed, what firmware should be
installed and from what repository this should be done.
In order to put AES firmware on the module from a repository residing on an http-server
(192.168.234.99/repos) and using port 9090, add the following string in the URL field.
Note the absence of spaces between the two NSF product numbers.

-d if5 --replace NSX0033-A001,NSX0033-E001 http://192.168.234.99:9090/repos
In order to put MADI firmware on the module from a repository residing on an ftp server
(iov136/repos) and using port 2222, add options defined below.

-d if5 --replace NSX0033-A001,NSX0033-M001 ftp://user:pass@iov136:2222/repo

Changing from AES to MADI firmware is done in a similar way. Here it is illustrated from
the http-server.

-d if5 --replace NSX0033-E001,NSX0033-M001 http://192.168.234.99:9090/repos

By extension, changing from MADI to AES becomes:

Element Manager User's Manual Up- and Downgrading 414

2013 Net Insight AB, All rights reserved

-d if5 --replace NSX0033-M001,NSX0033-E001 http://192.168.234.99:9090/repos

22.3.6.1 Licensing requirement for ASI/AES/MADI
The 8 x ASI/AES Access Module must be ordered with firmware and by default the ASI
firmware is loaded. If the user prefers another firmware after the purchase and uses this
procedure to install it, an additional firmware license is required for the installed firmware
module.
22.3.7 Changing firmware on 8 x Gigabit Ethernet Access
Module
In order to load ETS 1+1 firmware on a Gigabit Ethernet Access Module for Nimbra 600
nodes, it is simple to use the web GUI. Go to the Maintenance Software web page and
click on the Install image button.


Figure 460. Replacing regular Gigabit Ethernet Access Module firmware with ETS 1+1.

The firmware to be replaced is NSX0022-0001 and the replacement firmware with ETS
1+1 functionality is NSX0022-ET11. Specifically, if the module is installed in slot number
one, the extended URL becomes (with the same http server, port and repository as in
previous chapter):

-d if1 --replace NSX0022-0001,NSX0022-ET11 http://192.168.234.99:9090/repos

For the reverse process, replacing 1+1 firmware with regular ETS firmware, the order of
the arguments are swapped, i.e

-d if1 --replace NSX0022-ET11,NSX0022-0001 http://192.168.234.99:9090/repos

Usage of ftp, instead of http, is also supported, exactly as described in the other sections in
this chapter.

Element Manager User's Manual Up- and Downgrading 415

2013 Net Insight AB, All rights reserved
It is important that the command is written on one line and that no space in inserted before
or after the comma between the firmware versions.
22.3.7.1 License
Note that in order to use ETS 1+1, one or more additional feature licenses must be
purchased, irrespective of the need for firmware swap on the module.
22.3.8 Module restart
In order for the new firmware to become active, the module must be restarted. This can be
done from the web interface, from the Status Equipment page. Select the module and
toggle the administrative status of the module, i.e. set the administrative status first to
Down and then to Up. This procedure causes the module to restart with the new
firmware.

Figure 461. Toggling the administrative status, i.e. setting it first to Down and then to
Up is a way to restart a module and run the new firmware.


Element Manager User's Manual License information 416

2013 Net Insight AB, All rights reserved
23 License information
23.1 General
Some elements of this product include third party software released under open source
licenses.
23.2 GNU General Public license GPLv2
Elements that include GPL source code are released under GPLv2. If you would like a copy
of the source code for those elements for the cost of preparing it, please send a mail to
gpl@netinsight.net.
For GNU General Purpose License, version 2, this is the full license text
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA

Everyone is permitted to copy and distribute verbatim copies of this
license document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By
contrast, the GNU General Public License is intended to guarantee your freedom to share and
change free software--to make sure the software is free for all its users. This General Public
License applies to most of the Free Software Foundation's software and to any other program
whose authors commit to using it. (Some other Free Software Foundation software is covered by
the GNU Lesser General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public
Licenses are designed to make sure that you have the freedom to distribute copies of free
software (and charge for this service if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new free programs; and that you
know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or
to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if
you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give
the recipients all the rights that you have. You must make sure that they, too, receive or can get
the source code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license
which gives you legal permission to copy, distribute and/or modify the software.

Element Manager User's Manual License information 417

2013 Net Insight AB, All rights reserved
Also, for each author's protection and ours, we want to make certain that everyone understands
that there is no warranty for this free software. If the software is modified by someone else and
passed on, we want its recipients to know that what they have is not the original, so that any
problems introduced by others will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the
danger that redistributors of a free program will individually obtain patent licenses, in effect
making the program proprietary. To prevent this, we have made it clear that any patent must be
licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND
MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the
copyright holder saying it may be distributed under the terms of this General Public License. The
"Program", below, refers to any such program or work, and a "work based on the Program"
means either the Program or any derivative work under copyright law: that is to say, a work
containing the Program or a portion of it, either verbatim or with modifications and/or translated
into another language. (Hereinafter, translation is included without limitation in the term
"modification".) Each licensee is addressed as "you".
Activities other than copying, distribution and modification are not covered by this License; they
are outside its scope. The act of running the Program is not restricted, and the output from the
Program is covered only if its contents constitute a work based on the Program (independent of
having been made by running the Program). Whether that is true depends on what the Program
does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in
any medium, provided that you conspicuously and appropriately publish on each copy an
appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to
this License and to the absence of any warranty; and give any other recipients of the Program a
copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option
offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work
based on the Program, and copy and distribute such modifications or work under the terms of
Section 1 above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files
and the date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is
derived from the Program or any part thereof, to be licensed as a whole at no charge to all third
parties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it,
when started running for such interactive use in the most ordinary way, to print or display an
announcement including an appropriate copyright notice and a notice that there is no warranty (or
else, saying that you provide a warranty) and that users may redistribute the program under these
conditions, and telling the user how to view a copy of this License. (Exception: if the Program
itself is interactive but does not normally print such an announcement, your work based on the
Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work
are not derived from the Program, and can be reasonably considered independent and separate
works in themselves, then this License, and its terms, do not apply to those sections when you
distribute them as separate works. But when you distribute the same sections as part of a whole
which is a work based on the Program, the distribution of the whole must be on the terms of this

Element Manager User's Manual License information 418

2013 Net Insight AB, All rights reserved
License, whose permissions for other licensees extend to the entire whole, and thus to each and
every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written
entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or
collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or
with a work based on the Program) on a volume of a storage or distribution medium does not
bring the other work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object
code or executable form under the terms of Sections 1 and 2 above provided that you also do one
of the following:
a) Accompany it with the complete corresponding machine-readable source code, which must be
distributed under the terms of Sections 1 and 2 above on a medium customarily used for software
interchange; or,
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a
charge no more than your cost of physically performing source distribution, a complete machine-
readable copy of the corresponding source code, to be distributed under the terms of Sections 1
and 2 above on a medium customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer to distribute corresponding
source code. (This alternative is allowed only for noncommercial distribution and only if you
received the program in object code or executable form with such an offer, in accord with
Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it.
For an executable work, complete source code means all the source code for all modules it
contains, plus any associated interface definition files, plus the scripts used to control compilation
and installation of the executable. However, as a special exception, the source code distributed
need not include anything that is normally distributed (in either source or binary form) with the
major components (compiler, kernel, and so on) of the operating system on which the executable
runs, unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated
place, then offering equivalent access to copy the source code from the same place counts as
distribution of the source code, even though third parties are not compelled to copy the source
along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided
under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program
is void, and will automatically terminate your rights under this License. However, parties who
have received copies, or rights, from you under this License will not have their licenses
terminated so long as such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing
else grants you permission to modify or distribute the Program or its derivative works. These
actions are prohibited by law if you do not accept this License. Therefore, by modifying or
distributing the Program (or any work based on the Program), you indicate your acceptance of
this License to do so, and all its terms and conditions for copying, distributing or modifying the
Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient
automatically receives a license from the original licensor to copy, distribute or modify the
Program subject to these terms and conditions. You may not impose any further restrictions on
the recipients' exercise of the rights granted herein. You are not responsible for enforcing
compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other
reason (not limited to patent issues), conditions are imposed on you (whether by court order,

Element Manager User's Manual License information 419

2013 Net Insight AB, All rights reserved
agreement or otherwise) that contradict the conditions of this License, they do not excuse you
from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your
obligations under this License and any other pertinent obligations, then as a consequence you
may not distribute the Program at all. For example, if a patent license would not permit royalty-
free redistribution of the Program by all those who receive copies directly or indirectly through
you, then the only way you could satisfy both it and this License would be to refrain entirely from
distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance,
the balance of the section is intended to apply and the section as a whole is intended to apply in
other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right
claims or to contest validity of any such claims; this section has the sole purpose of protecting the
integrity of the free software distribution system, which is implemented by public license
practices. Many people have made generous contributions to the wide range of software
distributed through that system in reliance on consistent application of that system; it is up to the
author/donor to decide if he or she is willing to distribute software through any other system and
a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest
of this License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents
or by copyrighted interfaces, the original copyright holder who places the Program under this
License may add an explicit geographical distribution limitation excluding those countries, so that
distribution is permitted only in or among countries not thus excluded. In such case, this License
incorporates the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public
License from time to time. Such new versions will be similar in spirit to the present version, but
may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number
of this License which applies to it and "any later version", you have the option of following the
terms and conditions either of that version or of any later version published by the Free Software
Foundation. If the Program does not specify a version number of this License, you may choose
any version ever published by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution
conditions are different, write to the author to ask for permission. For software which is
copyrighted by the Free Software Foundation, write to the Free Software Foundation; we
sometimes make exceptions for this. Our decision will be guided by the two goals of preserving
the free status of all derivatives of our free software and of promoting the sharing and reuse of
software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO
WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE
LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS
AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR
CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY

Element Manager User's Manual License information 420

2013 Net Insight AB, All rights reserved
MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE
LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,
INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU
OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY
OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
23.3 Other open source third party software
23.3.1 libarchive
This software is used under BSD license (BSD-3-clause). The full text is
Copyright 2003-2008, Tim Kientzle
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions
and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
Neither the name of the <ORGANIZATION> nor the names of its contributors may be
used to endorse or promote products derived from this software without specific prior
written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

23.3.2 netkit
This package was split from netstd by Herbert Xu herbert@debian.org on Mon, 28 Sep
1998 16:50:43 +1000.
netstd was created by Peter Tobias tobias@et-inf.fho-emden.de on Wed, 20 Jul 1994
17:23:21 +0200.
It was downloaded from ftp://ftp.uk.linux.org/pub/linux/Networking/netkit/.
The license can be found at /usr/share/common-licenses/BSD on the nodes. The full text is

Element Manager User's Manual License information 421

2013 Net Insight AB, All rights reserved

Copyright:
Copyright 1988, 1993 The Regents of the University of California.
Copyright 1995 David A. Holland
Copyright 1994 Peter Tobias (issue.net(5))
Copyright 1983, 1995 Eric P. Allman (setproctitle.[ch])

Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to
endorse or promote products derived from this software without specific prior written
permission.

THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS
IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
SUCH DAMAGE.

23.3.3 ntp

Copyright (c) David L. Mills 1992-2003
Permission to use, copy, modify, and distribute this software and its documentation for any purpose
and without fee is hereby granted, provided that the above copyright notice appears in all copies and
that both the copyright notice and this permission notice appear in supporting documentation, and that
the name University of Delaware not be used in advertising or publicity pertaining to distribution of
the software without specific, written prior permission. The University of Delaware makes no
representations about the suitability this software for any purpose. It is provided "as is" without
express or implied warranty.

23.3.4 uip
Copyright 2006, Swedish Institute of Computer Science.
All rights reserved.

Element Manager User's Manual License information 422

2013 Net Insight AB, All rights reserved

Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions
and the following disclaimer in the documentation and/or other materials provided with the
distribution.
3. Neither the name of the Institute nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

23.3.5 zlib

Copyright 1995-2005 Jean-loup Gailly and Mark Adler

This software is provided 'as-is', without any express or implied warranty. In no event will the
authors be held liable for any damages arising from the use of this software.
Permission is granted to anyone to use this software for any purpose, including commercial
applications, and to alter it and redistribute it freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote the
original software. If you use this software in a product, an acknowledgment in the product
documentation would be appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being
the original software.
3. This notice may not be removed or altered from any source distribution.
Jean-loup Gailly Mark Adler
jloup@gzip.org madler@alumni.caltech.edu

S-ar putea să vă placă și