Element Manager Manual PDF
Element Manager Manual PDF
Element Manager Manual PDF
GX 5.3
© 1999-2017 by Net Insight AB, Sweden. All rights reserved. This document may not be
reproduced in whole or in part without the expressed written permission of Net Insight
AB.
The specifications and information in this document are provided “as is” and are subject
to change without notice. All statements, information, and recommendations in this
document are provided without warranty of any kind, expressed or implied, including
without limitation any warranty concerning the accuracy, adequacy, or completeness of
such specifications and information or the result to be obtained from using such
specifications or information. Net Insight AB shall not be responsible for any claims
attributable to errors, omissions, or other inaccuracies in the specifications or information
in this document, and in no event shall Net Insight AB be liable for direct, indirect, special,
consequential or incidental damages arising out of the use or inability to use this
document.
GPL source code is available for applicable parts for this product. If you would like a copy
of the GPL source for the costs of preparing, please send a mail to gpl@netinsight.net. A
listing of external software distributed with the product, including copyright notices is
included as appendix to this document.
Net Insight and Nimbra are trademarks of Net Insight AB, Sweden. All other trademarks
are the property of their respective owners.
Net Insight AB
Box 42093
SE-126 14 Stockholm
Sweden
August, 2017
Stockholm, Sweden
(NID 4954/A13)
Stockholm, Sweden
Contents
1 ABOUT THIS MANUAL .............................................................................. 13
6.3 Syslog........................................................................................................................... 40
6.9 Nodeinfo....................................................................................................................... 52
7 MAINTENANCE.........................................................................................54
8 CONTROL NETWORK............................................................................... 80
10.8 Configuration of Time (external clocks, synchronization and time transfer) .................... 188
10.8.1 Clock interfaces .................................................................................................................. 188
10.8.2 Nimbra 360,380 and 390 ..................................................................................................... 189
10.8.3 Nimbra 310 and 320 ............................................................................................................ 195
10.8.4 Nimbra 640, 680 and 688 .................................................................................................... 196
13.7 Configuration of ASI video stream – an ITS configuration example ................................. 300
13.7.1 Configuration of the Terminating TTP ................................................................................ 300
13.7.2 Configuration of originating TTP for a unicast connection................................................... 302
13.7.3 Configuration of the originating TTP for a multicast service ................................................ 304
13.7.4 Configuration of interfaces ................................................................................................. 306
17 LOOPBACK ..........................................................................................398
Note: Before these procedures are performed, be sure that the unit is properly
installed according to the relevant Installation and Maintenance Manual. In
particular, the node should be mounted, grounded and powered.
In this quick start procedure, only change parameters specifically
mentioned.
This chapter details the configuration needed to get a Nimbra switch operational in a
network. The short configuration procedure is:
Set the IP address from the serial interface
Set the Trunk network (DTM) address from the web interface
Save/back-up the configuration
Reboot the node
Set the trunk network address of the unit. Make sure that Primary address is set to ‘Yes’.
Click OK.
The Trunk network Addresses page below appears. The DTM loopback address
(00.00.00.00.00.00.00.01) is always shown in the list as well.
Enter a suitable name without spaces and a description of the configuration (optional).
Make sure that the Valid box is checked. Click on the OK button.
Figure 6. Listing of all configurations. Note that configuration with the valid
flag set to ‘no’ are never used for restart of the system.
After the node is restarted, contact with the node ceases momentarily. The contact
should be established again when the node is running again, typically in less than a
minute.
When an attempt to restart the node is made, a pop-up window opens and requests
confirmation of the command. The web page is simultaneously grayed out.
In case the configuration has been changed since last restart, the system asks if the
configuration should be saved before rebooting.
On the settings tab, the basic configuration of the node is made.
On the syslog tab, the syslog configuration can be made. Default configuration is
presented in the window.
Blind Panel
Blind Panel
Nimbra 320 has a different numbering scheme altogether, as it only has one slot available
for a module. Ports in the module in this slot are numbered between 1:1 and 1:x (i.e.
number of ports on this module), the fixed trunk interfaces are numbered 2:1 to 2:2 and
the Ethernet ports 3:1 to 3:8.
1 2
Power input A Power input B Port 3:1 to 3:8 Port 2:1 and 2:2
For Nimbra 688, the principles are the same as for Nimbra 680, but the interfaces slots
are numbered IF 1 to IF 16. The port numbers are added after the slot position and a
colon; e.g. 1:4, 3:6, 11:2, 15:7 and 16:1 denotes slot 1, port 4; slot 3, port 6 and so on.
4.1.2 Module
In this text, an item which fits into a slot in a node and is connected to the node via
connectors in the backplane is called module. In other contexts it may be called board,
plug-in unit, PIU or card. The physical interfaces on the module is labeled after the slot
occupied by the module in the node and the interface number on the module. An
example is aes/ebu-3:6, for physical interface number six (from the left) on the module
occupying slot number three. A module can always be pulled out from the node.
4.1.3 Device
In the web interface, device is used many times for module described above. Device,
however, is something wider. Device also includes firmware dependent trunks (the fixed
trunks for Nimbra 310/320/380/390 and integrated access features like the Ethernet ports
on all Nimbra 300 series nodes.
In other words, a module is always a device but a device is not always a module.
5.4.1.1 Admin
Admin is the administrative status of the object (e.g. route, interface, server, module or
function). The operator can either set the administrative status to Up if the object is to be
activated, or to Down if it is to be deactivated.
5.4.1.2 Oper
Oper is the operational status of the object (e.g. route, interface, server, module or
function). Up indicates that the object is active, while Down indicates that it is inactive. If
the operational status shows Down while the administrative status is Up, this is an
indication of that an error has occurred. Degraded indicates that the object is
operational, but with deficiency. Dormant means that the object is up but temporarily
suspended; in waiting for an event to take it up. Starting is a transitional state indicating
that the object is in a start-up phase. Absent indicates that the object is no longer
physically present in the node.
Enter user name and password. The default user name/password combination is
root/neti.
Click OK. The start page shown below should appear:
Note: The alarm list will present the alarms which are selected under
the Maintenance Preferences link.
More information about the alarms is available by clicking on the link under the ‘Cause’
heading.
To find the event list rather than the alarm list, click on links Status and then Events. The
Events page appears.
This page shows the same information as the alarm list, with the addition of an editable
Comment field and an Acknowledged drop-down menu.
Enter any desired comment, set the Acknowledged drop-down menu to ‘Yes’ and click
Applyor OK. The alarm now appears with ‘Ack’ (alarm acknowledgement) set to “yes” on
the alarm page.
Note: In some circumstances the cause of the alarm cannot be removed or the
alarm should not be acknowledged until later. In this case, use the
Comments field to pass on any comment regarding the alarm event.
Note that the action of acknowledging an alarm does not remove the
alarm from the alarm list or change its severity.
6.3 Syslog
The Syslog page lists a log of the node. To access the page, click on the Status link and
then on the Syslog tab on the web page that appears. The Syslog page contains two links,
Latest and Older, which takes the user to the latest entries in the syslog or to older
entries. For Nimbra 600 with dual Node Controllers, latest and older syslogs are available
for both Node Controllers (shown).
Figure 23. The bottom of the Syslog page (latest) for the active node
controller.
Syslog is configured from the syslog tab on the Maintenance System web page. The
default configuration is
*.*;local1.!=info -/var/log/messages
kern.* -/var/log/kern.log
*.alert /dev/console
This configuration logs system messages, except from local1 info level (that pertains to
the creation, modification and deletion of DTM OAM objects), to the file
/var/log/messages. The exception is messages from the kernel, which are logged in a
separate file /var/log/kern.log. Furthermore, all critical messages are displayed on the
console. The syntax of the configuration items adheres to the standard BSD syslog
implementation as described in the “syslog.conf” man page of most Linux systems.
Note: It is important that the filename, of the file to which the logged
messages are written, is preceded with a “-“ sign. Otherwise
the performance of the node can degrade significantly.
6.4 Equipment
The Equipment page lists the installed modules and gives a temperature reading of the
unit. To access the page, click on the Status Equipment link. The following page
appears:
In order to configure the fan unit (in particular the ‘Enable air filter replacement alarm’),
the link FAN should be used. The following page then appears:
Note: The following applies only when using 40 Gbps switch modules in the
Nimbra 680 or when using 80 Gbps switch modules in Nimbra 688. When
using 80 Gbps switch modules in Nimbra 680 or 160 Gbps switch modules
in Nimbra 688, there is always 10 Gbps allocated to each interface
position.
40 Gbps switch modules for Nimbra 688 is not supported.
In the Nimbra 680/688 switch, it is possible to configure the capacity allocated to a board
position. Capacity is allocated in a row-pair fashion. A row-pair consists of the two
adjacent slots in the same row (for example IF3 and IF4). The left position has an odd IF
number (for example IF3). The total capacity of a row-pair is always 10 Gbps, provided a
40 Gbps switch module is used in Nimbra 680 or an 80 Gbps switch module is used in
Nimbra 688. The capacity can be allocated to the two slots as follows:
Default is that both IF positions in the row-pair have 5 Gbps allocated. If the left column
interface module should have the whole capacity of the row-pair, the module has to be
configured for that. This is described below.
Trunk and access modules can be classified in three different categories. Some modules
always require 10 Gbps switching capacity, some modules never require 10 Gbps
switching capacity and some modules require 5 or 10 Gbps switching capacity depending
on how they are used.
Modules that never require more than 5 Gbps switching capacity are:
4 x OC-3/STM-1 Trunk
4 x OC-12/STM-4 Trunk
8 x ASI/AES Access Module
Modules that work at 5 Gbps are listed below. These modules work with increased
functionality at 10 Gbps.
4 x OC-48/STM-16 Trunk (only interfaces 1 and 2 in working order)
10 Gigabit Ethernet Trunk Module (with total rate limitation to 5 Gbps)
8 x Video Access Module (with total rate limitation to 5 Gbps)
Video Access Module v2 (with total rate limitation to 5 Gbps)
6 x IP/Ethernet Trunk Module (only interfaces 1 to 5 in working order)
J2K Video Access Module v2 (with total rate limitation to 5 Gbps)
Select the Requested capacity, 5 or 10 Gbps and click Applyor OK. Furthermore, on this
page information from the various mounted SFPs is available (Digital Diagnostics). Click
the sfp link, like sfp3:1 and reload the web page.
Figure 31. Pluggable interface page, with information from the particular SFP.
Figure 32. The status sensors web page displays information on the various
temperature and other sensors in the node.
On the inventory page, the containment tree of the entire node is displayed, i.e. what
resources are available in the node and how they are structured.
For Boards on which more than two FW-images could be stored, the image that is
running is indicated as follows:
Primary: Image stored as primary
Secondary: Image stored as secondary
Running: Image that is running (could be either the primary or secondary)
For boards on which only one FW-image could be stored, only the primary image is
presented. Here, the primary image must be running.
The table shows information about other logged in users; user name, Tty (type of
terminal used), From (IP address), Login (time) and Expire (time). Inactive users are
automatically logged out at Expire time.
6.9 Nodeinfo
In order to generate and download a diagnostic file about the node that is needed for
advanced troubleshooting, the link System Nodeinfo should be followed.
The nodeinfo file that can be generated contains the status of the node. If there is trouble
with the node, it is very valuable for troubleshooting to generate the file before the node
is rebooted, as a lot of information is lost when the node is rebooted.
The nodeinfo file is generated and saved in the node if the button Generate Nodeinfo is
clicked and the choice is confirmed in the pop-up window.
When the file is generated, it can be viewed (View nodeinfo log). It can also be
downloaded or deleted directly (if the file was generated by mistake).
User's Guide Status web page 52
Some of the links are further divided in different tabs. It is important to click on
Applybefore jumping to another tab as clicking directly on another tab removes all
changes on the previous tab.
The system settings web page contains configurable system parameters, which are
described below.
7.2.1.4 Contact
Default value: empty string
Type: string variable
Range: Text string, up to 100 characters long, only with printable ASCII characters
Description: The name or the e-mail address of the contact person.
7.2.1.5 Location
Default value: empty string
Type: string variable
Range: Text string, up to 100 characters long, only with printable ASCII characters
Description: The name of the location of the unit.
Figure 42. Maintenance system syslog web page, with default configuration.
Navigate to restart tab of the web page Maintenance System. Click on ‘Restart Node’
to execute a node reboot. Observe that this is traffic affecting and all services originating,
terminating or going through the node are affected. ‘Restart Node’ means that all
processes on all modules in the node are restarted, including the node controller.
Figure 43. The restart tab of the maintenance system web page
When the system is restarted, the contact with the browser is lost. After a short time (less
than a minute) the contact should automatically be reestablished.
Enter the revised date and time info in the entry fields.
For the time, use the hh:mm:ss format. To avoid involuntary change of the parameters,
the ‘Update date & time’ tick box must be selected for any changes to take effect when
the Apply button is clicked.
Terms and parameters found on the web page:
UTC: Coordinated Universal Time (abbreviated as UTC) is the global standard time.
DST: Daylight Savings Time
Time zone: Name of the standard time zone used, which is selectable from a drop down
menu.
Standard offset to UTC: Hours to add/subtract to the local time (no DST included) to
reach UTC, e.g. GMT-1, GMT+4. Observe that for places to the east of Greenwich, a
minus sign should be added and for places to the west of Greenwich, a plus sign should be
added. This could be contrary to other conventions, like Windows, which use the other
sign. In other words, Stockholm Daylight Savings time is set by using GMT-2 (or easier by
using Time zone Europe/Stockholm) rather than GMT+2.
If DST (Daylight Saving Time) is enabled, select as Time Zone a proper city like
Europe/Stockholm. In these time zones, relevant DST information is included.
Note: If the internal clock is set to a time or date in the future, all
users are automatically logged out from the system.
7.6 Users
The Maintenance Users web page lists currently active users. From this page, users
can be added and their privilege level modified.
To add new users, click on the Add User button. To configure a user currently logged in,
click on the link to the user.
The following configuration menu appears:
Enter User name, Access Mode (Full/Read only access) and Password (twice). Click on the
OK button. The new user is now ready for login.
Parameters configured on this web page are:
7.7 Preferences
The node contains one set of preferences per user for event and alarm presentation.
These preferences are configured on the web page Maintenance Preferences. Here,
the contents and size of the event and alarm log can be set. The configurable parameters
are:
Click on the Maintenance Preferences link. The web page shown below appears.
Enter the desired information for the currently logged in user and click on the Apply
button and return to the Maintenance main page. Back up the configuration changes, so
they don’t disappear after a reboot.
The default settings are that all events and alarms are visible, the event log size is 20
events and the auto-refresh interval is 30 seconds. The range of the event log view file
size is read from the module.
7.8 Configurations
In order not to risk losing the configuration when changes have been verified and
approved, the configuration should be backed up.
Click on the Maintenance menu link and then click on Configurations. The Maintenance
Configurations page appears.
The table shows active and previous configurations stored in flash memory. The active
configuration is at the top of the table. The maximum number of saved configurations is
eight (numbered between 0 and 7).
Parameter Description
Id The index number of the configuration
Name A user-defined name of the configuration
Description An optional user-defined description of the configuration
Valid Indicates if the configuration is allowed (valid) on reboot or not. The
configuration with lowest Id number and a set valid flag is used for reboot
(i.e. it is ‘active’).
Date Date and time when the configuration was saved
Figure 50. Maintenance configuration parameters
Tip: If Valid is set to “Yes” for more than one configuration, the first
configuration with Valid set to “Yes” is used at reboot.
The previously saved configurations are retained in the unit until they are
deleted. To make a previous configuration in the list active, set the Valid
flag to ‘No’ for all configurations prior to the one to be used and restart the
node.
Enter a name for the configuration in the Name entry field, and a suitable description in
the Description field. The Valid checkbox must be ticked, if the configuration is to be
active.
Click OK.
Information about the configuration, such as name, when it was created, a description
and its size, is shown. The only parameter that can be set or removed here is the ‘Valid’
flag. Make the alteration and click on the OK button to save the setting.
Click on the Download File button to download the configuration to the workstation/PC.
A window opens and the user is asked to provide a file name for the configuration (to be
used on the PC).
Click on the Choose File button. A standard File Open dialogue box appears. Select the
desired file and click the OK button.
The Confirm Upload Configuration page appears.
Enter an appropriate name and a description for the configuration in the Configuration
name and Description entry fields. The Valid checkbox should be ticked if the file is to
become active directly.
Click the OK button. The Maintenance Configurations page reappears with the new
active configuration at the top of list.
Enter the Maintenance Configurations page according to the previous section. Click
on the id of the configuration to be deleted in the Id column. The Edit configuration page
appears.
To delete the configuration, click on the Delete button. Confirm the action in the
confirmation window that opens. The configuration is removed directly.
Alignment Meaning
full All running, primary and secondary images (reported by the CLI command
swap) must match entries in the current Packages.list file: the image is
found and the board criteria matches the board article number and
revision
weak All running and primary images match entries in the current Packages.list
file but some secondary images differ. Restart of a board or the entire
node is OK if all boards boot from their primary image. If a board with
different primary and secondary images fails to boot the primary image,
but succeeds with the secondary image, this board may become unusable.
(Double error: board reboot and image failure)
vulnerable- All primary images match entries in the current Packages.list file, but
strong some running images differ (node controller and at least one interface
board); all secondary images are the same as the corresponding primary
images. Restart of the node will give full alignment.
vulnerable- All primary images match entries in the current Packages.list file but some
weak running images differ (node controller and at least one interface board); at
least one secondary image is different from the corresponding primary
image. Restart of the node will give weak alignment.
none All other cases
Figure 55. Possible values for the parameter ‘System alignment status’
For a better understanding of what this web page does, consult the Up- and Downgrading
chapter.
SSL Certificates can be obtained as files from reputable certificate issuers (as files) and
installed on the nodes via the Upload button. Alternatively, SSL certificates can be self-
generated from the Generate button.
In order to download a certificate, the button Choose File must first be selected. A
window is then opened of the file system and the appropriate file can be selected.
When the file has been selected, the button Upload is no longer grayed out. Clicking on it
will upload and install the new certificate. In case the selected file is not an SSL certificate,
the request is silently ignored.
A new, self-generated certificate is obtained by clicking on the button Generate.
On this page, the common name is displayed as the string entered in the URL field to find
the node in the first place (in our case, this is the IP address). Default issuing organization
is Snakeoil Ltd, default country is SE and default validity is 365 days.
Figure 62. Alarm I/O configuration direction page, shown for pin #2.
To start configuring the pin, select Direction ‘Output’ for pin 5 or Direction ‘Input’ for pins
2-4 and 6-8 and click on the OK button. The main Alarm I/O menu reappears.
Select the pin to be configured by clicking on the link to the pin (in the example below, on
the link gpio1:0:2).
To start configuring the interface/pin, select if the alarm is active when the circuit (pin to
common ground, pin 9) is open/high or when it is closed/low. Make the additional
parameter settings:
A new submenu appears, when the unused link of a particular pin is clicked.
To start configuring the interface/pin, select if the alarm is active when the circuit (pin to
common ground, pin 7) is open/high or when it is closed/low. Proceed by clicking on the
Applyor OK button.
7.12 Cooling
There is an option to select how the cooling of the node is controlled. This option is only
available for Nimbra 680 and Nimbra 688 nodes.
Profile Description
Disabled This profile means that the function cooling profile selection is disabled. The
fans run with a constant RPM, namely 80% of maximum.
Silent This profile means that regulation is made with (low) noise level as primary
objective. Suitable for noise sensitive environments, with good ambient
cooing. The slightly higher board temperature saves fan life.
Cool This profile is made with high system life as primary objective. Suitable for
challenging environments, where staff normally isn't located close to the
nodes.
Balanced This profile is default and a compromise between profiles ‘Silent’ and ‘Cool’.
Suitable for normal operating conditions.
Figure 70. Cooling profiles available in Nimbra 600 series
The intention behind this alarm is that any time an unexpected reboot occurs, as this is a
serious event, the event should be reported to Net Insight support. To investigate the
node behavior, a nodeinfo file and the particular circumstances around the event are
needed. The alarm could appear after a manual reboot as well; also this case should be
reported.
When this alarm is observed, please contact Net Insight support and inform them about
the details, generate a nodeinfo file and send this file to Net Insight support together with
the Trouble Report ticket number.
The nodeinfo file is generated from the link Status Nodeinfo.
Figure 72. The nodeinfo file is generated from the Status Nodeinfo link.
Figure 74. The generated nodeinfo file is ready for download. To download,
click on the Download Nodeinfo button. The downloaded nodeinfo file
should be sent to Net Insight support for investigation.
Note: Note that the DLE segment is a logical segment. The physical
E F
D A Gateway
C B
In this illustration it is assumed that all nodes communicate via the gateway (A). The
gateway has channels connected to and from all other nodes. Communication has taken
8.2 Configuration
Management traffic requires only moderate bandwidth. It is therefore adequate to use
512 kbps (equals one DTM slot) per channel, both between DLE servers (server-server)
and DLE clients (client-client). As the DLE client-to-server communication is only used for
signaling and broadcasting, 512 kbps is sufficient for these channels as well.
The recommendations in this document are for an in-band management network that is
used exclusively for management of the Nimbra nodes. No consideration has been taken
for other traffic. To limit the load on the DLE server, there is a recommended maximum
of DLE clients per server in one segment. To limit the load on the gateway, there is a
recommended maximum number of nodes with traffic routed through the gateway.
For availability reasons, when a single DLE server is used, it is recommended that the
gateway for a DLE segment is located on the same node as the DLE server.
Nimbra 300
Nimbra 600
Maximum recommended number of DLE clients for one DLE 16 64
server
When working as gateway: maximum recommended 255 1000
number of nodes to route traffic for
Maximum recommended number of DLE clients on a node 3 3
Figure 77. Configuration recommendations of the DLE in-band network used
for managing the nodes from external management stations
192.168.100.1 c 192.168.1.1
Gateway
DLE segment 192.168.100.33 …2
192.168.100.32/27 b
Figure 78. Example of a network with three DLE segments built as a tree, and
one external network
The DLE segments have a netmask of 255.255.255.224 meaning that there can be 30
nodes on each network (one address is the network, and one is the broadcast address).
The gateways route packets between the DLE segments and the external network.
If the Nimbra network consists of more nodes than what is recommended as the
maximum for one gateway, it is recommended to split the network into separate in-band
management networks and route the traffic to the external network with a dedicated
node as the gateway.
User's Guide Control Network 83
External management
network
Gateway
Tree of nodes
and DLE
segments
Figure 79. Large networks are divided into smaller networks, each with its
gateway to the external management network
8.4 IP routing
Setting up DLE only configures the individual DLE segments; it does not provide routing
between DLE segments. As with all IP networks, routing must be configured in each
node. Setting up IP routing for a DLE segment is not different from setting up IP routing
in general.
A routing entry consists of a destination, a netmask and a gateway. When a packet is sent
to a node outside the network, the IP address to the node is masked with the netmask of
a route. If the masked IP address matches the destination of the route, the packet is
forwarded to the gateway specified in the route. The gateway must be located on the
local IP sub-network.
On each node in the DLE segment, a default gateway routing entry should be specified.
This route is used to forward packets to nodes outside the DLE segment. The default
route is specified as destination 0.0.0.0 with netmask 0.0.0.0. This entry will match all IP
addresses. The gateway shall be the IP address of the gateway on the DLE segment.
Node b
Destination: 0.0.0.0
Netmask: 0.0.0.0 Default route
Gateway: 192.168.100.1
External node
Destination: 192.168.100.0
Netmask: 255.255.255.0
Gateway: 192.168.1.1
The sub-sections (links): In-band servers, In-band clients, IP interfaces, IP routing, Firewall
and SNMP.
8.6.1.2 Purpose
Default value: Empty string
Type: String variable
Range: Length 0-255 characters
Description: The parameter is an arbitrary character string that can be used for
identification purposes.
From this tab, the parameters of the exponential back-off algorithm of the re-connect
time-out are set (minimum and maximum interval). Also, the connection can be defined
as having high Precedence, which means that in case an intermediary node goes down,
this particular connection is taken down with priority and a replacement connection is set
up with priority (i.e. it has precedence over other connections).
With the Force button, it is possible to restrict the route to the back-up DLE server to
first, second or third source route defined for the destination.
Figure 85. Page for configuration of the destination to the back-up DLE server.
Source routes must be defined in the node before they can be used.
Destination DTM node is the DTM address/host name to the back-up server
and Destination DSTI is the back-up DLE server’s DTM Service Type Instance
number.
8.7.1.2 Purpose
Default value: Empty string
Type: String variable
Range: Length 0-255 characters
Description: The parameter is an arbitrary character string that can be used for
identification purposes.
Figure 88. Control network statistics let the user see traffic stats to and from
the DLE client.
SCC-mc
CSC-uc
A CCC-uc
CSC-uc B C
CCC-uc
CCC-uc
CCC-uc
Figure 89. Bandwidth requirement example. Node A has a DLE server and is
the gateway to the outside world. Nodes B and C each run a DLE client.
SCC - Server to Client Connection is a multicast channel. This channel is up all the time. If
all clients are on a long chain, this channel takes one slot on every link.
CSC - Client to Server Connection is the return channel from the client to the server. This
channel is a unicast channel and the server terminates one channel from each client
connected to the server. This return channel is always up.
CCC - Client to Client Connection is a unicast channel which is established between two
DLECs. This is the channel where normally all traffic between the clients travels. The
channel is by default torn down after 600 seconds without transmitted data and is
automatically reestablished when there is new traffic. The channel normally exists
between the gateway and all DLECs. If Nimbra Vision is used, this channel stays up all the
time since NV polls every node every 120 seconds. It is possible to force data traffic to use
SCC and CSC (all data traffic is routed via the DLES server) by setting the CCC bandwidth
to zero slots on all DLECs. However, if CCC is configured to use zero slots, there is a risk
that DLES is overloaded with too much data and the result might be that the DLE server
crashes.
In our example, the bandwidth requirement is:
From A to B 1 SCC + 2 CCC = 3 DLE slots
From B to A 2 CSC + 2 CCC = 4 DLE slots
Note that the CCCs between nodes B and C are omitted in the illustration.
8.9 IP interfaces
IP interface menu configures the physical and logical Ethernet address of the interface as
well as the IP address for all logical In-band clients. This section describes how to change
the address of the physical and logical Ethernet interface and also how to change the
netmask of the subnet.
Follow the Control Networks IP interfaces web page.
eth0 (Nimbra 300) or eth-front (on NC in Nimbra 600)/eth-aux (on GPIO module in
Nimbra 600): The physical address of the Ethernet interface
dlec0, dlec1, dlec2: The logical addresses of In-band clients
Click on the Id of the interface to be changed.
On this configuration page, the security zone for the dlec interface is set. Security zone is
explained later under the Firewall heading. After one of the four available zones (zone0,
zone1, zone2 and zone3) have been selected, additional configuration can be made by
clicking on the IP address and set IP address and netmask. Alternatively, click on the Add
address... button in order to add another IP address. Multiple IP addresses are allowed on
the interfaces.
Click on the Control Networks IP routing link to get an overview of the defined IP
routes.
Figure 94. IP routing page. Default means all addresses not otherwise
mentioned.
U means that the routing entry is up, in other words active. G means that in order to reach
the destination you should use the gateway that is “pointed out” by the routing entry.
The first entry, 127.0.0.0 is for the local host, which always will be there. Three entries
describe that you can reach 192.168.101.0, 192.168.111.0 and 192.168.201.0 directly
without gateway. Also, the first IP entry is shown with a gateway. This entry describes
how to reach all other IP-addresses through the gateway 192.168.101.1.
In order to set up a new route, the tab ‘Configuration’ should be used.
Figure 96. IP route configuration add page. On this page, new routes are
entered with needed netmasks and gateways.
Figure 98. Security profile 0, default for zones 0 to 2, allows for the most
common applications. Anything that is not expressively allowed is prohibited.
There are also two other predefined security profiles: allow all and block all. Furthermore,
additional security profiles can easily be user defined.
To configure the firewall, follow the Control network Firewall link.
On this configuration page, different security profiles can be set for different firewall
zones. Also, additional security profiles are easily created by using the Add Profile button
under the security profiles heading. In addition, the different interfaces can have changed
settings directly from the member interface link, under the zone membership heading.
The page shows information about the SNMP community names and user configuration.
The SNMP agent is a full SNMPv1/v2c/v3 agent that supports SNMPv3 security levels
noAuthNoPriv, authNoPriv and authPriv. It also shows the configured notification
receivers.
Read-only community name is the community name for SNMPv1/v2c read (i.e. get)
operations. If this community name is provided by the user, the get operations requested
are accepted; write operations are not accepted with this community name.
Read-write community name is the community name for SNMPv1/v2c read (i.e. get) and
write (i.e. set) operations. If this community name is provided by the user, then
SNMPv1/v2c read/write operations are accepted.
Notification (trap) community name is the community name sent with the notifications. If
set, notifications are sent as SNMPv2 traps with this community name. Some trap
receivers require a match of the community name, while others simply ignore this
community name.
SNMPv3 user is a user name used in SNMPv3 communication with the node. This type of
user is also called a USM user. If set, SNMPv3 operations from this user are accepted with
a security level that depends on the Authentication key and the Privacy key (described
below).
Authentication key is the passphrase used for SNMPv3 authentication of the SNMPv3
user. If empty, then the authentication check is disabled, e.g. security level is
noAuthNoPriv.
Privacy key is a key used for encryption of SNMP messages. If this key is absent, no
encryption takes place. Privacy can’t be used without authentication, but authentication
can be used without privacy.
A fine tuned Access control can be configured from the access control tab. This tab allows
for advanced configuration of the SNMP agent, including setting up a detailed access
control.
Generally, this page is used for setting up the Local Configuration Datastore (LCD) of the
SNMP agent. The LCD describes the configuration of the SNMP agent. All of the SNMP
agent configuration can be done using this page. The simplest and most common tasks
are more easily configured from the basic SNMP configuration page previously described
and from the Trap receiver SNMP configuration page described later.
Configuration done on the SNMP page is internally processed the same way as if the
configuration is made directly into the LCD.
Please refer to section 8.11.4 SNMP page internal data below for a description on how the
form on the SNMP page is internally represented and related to the LCD.
The default configuration of the LCD adds configurations to the SNMP agent, which are
used by the community names, SNMPv3 user, and the notification receivers configured
on the basic SNMP configuration page.
The following is the default configuration:
Access entries for the notifiers, readers, writers, authUsers and privUsers principals are
configured from the Access control SNMP configuration page. The entries define
permissions for the different principals. You can further modify the permissions of these
community names and SNMPv3 users on this configuration page.
A family tree, All, which includes all the OIDs, is used when setting up the access entries.
Entries that define how notifications (traps) are sent are included.
To edit the SNMP agent configuration, select the tab Access control from the SNMP
configuration page. The Access control configuration page appears.
User's Guide Control Network 102
Modify the configuration in the Local Configuration Datastore text box. The button
Restore to Defaults loads the default configuration into the text box. To apply the new
configuration, click the Apply button.
When the configuration is applied, it will pass a syntax control. If the configuration
contains syntax errors, the page will be reloaded with errors shown.
The link AuthKey Generator opens a window where an authentication key or privacy key
can be encoded for use in the LCD. The link Configuration Example provides an SNMP
configuration example.
Figure 104. Add SNMP trap receivers tab. Add the SNMP trap receiver IP
address in the empty field. UDP port 162 is default, but can be changed if
needed.
Click OK to add the new notification receiver. The configuration page will be loaded
again, updated with the new notification receiver.
Setting of a Read-only community name with the value public on the Access control
SNMP configuration page is equivalent to:
MIB view
vacmViewTreeFamilyEntry
vacmViewTreeFamilyViewName (name)
vacmAccessReadViewName… (read/write/notify)
group
vacmAccessEntry
vacmGroupName (name)
vacmGroupName (group)
usergroup
vacmSecurityToGroupEntry
8.11.9.1 Example 1
The example defines a view names "All" that allows access to everything (actually,
everything under the 1 branch in the MIB tree).
8.11.9.2 Example 2
The example defines a view named "noIfTable", that allows access to everything except
to the ifTable.
8.11.9.3 Example 3
The example shows how to define a family of view subtrees that only allows access to row
9 in the ifTable. The 10th bit is a zero, which makes the 10th sub-identifier in the subtree a
wildcard (don't care). This is the columnar object.
vacmAccessEntry name prefix model level match read write notify storage
name is the name of the group. The name is a string of up to 32 characters. The name is
used when associating access rights to users (see Assigning Users).
prefix is the name of the context to which the group is part of. To gain access by this
entry, the specified context must be in use. On the Nimbra network elements, the context
is always the default context, which is represented by a dash (-). (The prefix could be the
complete name of the context, or the prefix of a context, as defined by match; see below.)
model is the security model to which the group belongs. In order to gain access by this
entry, the specified security model must be in use. The security model can be snmpv1,
snmpv2c or usm for SNMPv3 using the USM.
level is the minimal security level. In order to gain access by this entry, the security level in
use must at least be the specified security level. The value is noAuthNoPriv if no
authentication is required and authNoPriv if authentication using HMAC-MD5 is
required. If multiple entries are equally indexed, except for this value, then the one with
the highest security level is applied.
match specifies how the prefix shall be matched. For the Nimbra network elements, it
does not make sense to set the value to anything except exact. The value can be exact of
prefix.
read is the name of the MIB view (see Defining MIB Views) that shall be used to control
what management information can be read. In order to gain read access by this entry, the
MIB view must allow access of the management information.
write is the name of the MIB view (see Defining MIB Views) that shall be used to control
what management information can be written. In order to gain write access by this entry,
the MIB view must allow access of the management information.
notify is the name of the MIB view (see Defining MIB Views) that shall be used to control
what management information can be included in a notification. In order to gain read
access for notifications by this entry, the MIB view must allow access of the management
information.
storage describes how the entry is stored. This is always nonVolatile.
8.11.10.1 Example
principal is the user name for the security model USM (see Defining SNMPv3 Users), or the
security name that represents the community name for SNMPv1/v2c. A default security
name is public. The community name for the public security name is modified from the
web page Status | SNMP config.
group is the name of the group (see Defining Groups and Access Rights) to which the user
or community name shall be associated.
storage describes how the entry is stored. This is always nonVolatile.
8.11.11.1 Example 1
The example associates the USM user "root" with the group "FullAccessUser".
8.11.11.2 Example 2
The example associates the community name "public" for SNMPv2 access to the group
"ReadOnlyUser".
Trunks of various types connect the nodes of a Nimbra network. The trunks can be of
different types; 8B/10B, SONET/SDH, PDH and IP/Ethernet. Trunks are configured both
under Ethernet interfaces and Trunk interfaces.
The trunk interfaces supported are 8B10B, SONET/ SDH, PDH and IP/Ethernet.
IP/Ethernet interfaces are configured under two separate links; Ethernet interfaces and
Trunk interfaces. The other trunk interfaces are configured under Trunk interfaces.
Additional configuration is also made under Trunk network; DTM interfaces, Links, (DTM)
Addresses and Hostnames, Routing and Performance monitoring (Perf. monitor).
Note: Make sure to have all the information that the operation
requires, before starting any configuration operation. This will
help you to minimize the downtime of the system.
The 10 GE Trunk Module has two SFP+ /SFP ports, which each can transport up to 10
Gbps/1 Gbps. However, the combined capacity for both ports is limited to 10 Gbps, but
the capacity can be arbitrarily divided between the two ports.
SFP+/Multirate modules work at 10 Gbps, when inserted in a 10 GE trunk module.
SFP+/Multirate modules work at 1 Gbps, when inserted in a 6xIP/Ethernet trunk module.
SFP modules operate at 1 Gbps, when inserted in either a 10 GE or 6xIP/Ethernet trunk
module.
The regular 6 x IP/Ethernet Trunk Module use regular SFP ports.
The table on the overview tab lists the Ethernet Interfaces that are present in the unit. For
each interface, the following is presented: Name (name of the interface), Type (of
interface), Adm (Administrative status of the interface), Oper (Operational status of the
interface), Speed (of the interface) and Purpose (String entered by the user do specify
further the interface). The interface name is written (for trunk interfaces) as “ethtX:Y”,
where X is position of the module in the node and Y position of the port on the module.
The table on the statistics tab lists the Ethernet Interfaces and their packet counters. For
each interface, the following is presented: Name (name of the interface), Rx Accepted
(Number of received packets accepted), Rx dropped (Number of received packets
dropped), Rx Errors (Number of received packets with errors), Tx sent (Number of sent
packets) and Tx Drops (Number of outgoing packets that are dropped and thus not sent).
The Ethernet interface configuration page has four different links: Basic, Advanced,
Statistics and Trunks.
The 10 GE and 6 x IP/Ethernet Trunk Modules are configured on multiple web pages. First
the Ethernet interface is configured.
Connect the Ethernet cable or fiber to the module before starting the configuration. It is
imperative that this step is followed, as the operational state of the etht interface stays
down otherwise.
Now follow the link for Ethernet interfaces and select the appropriate interface, like
etht-3:1. Make sure the administrative status is Up. Proceed with IP-trunk configuration,
found under Trunk interfaces. The particular trunk has to be created, with a selected data
rate, from the specific trunk’s Trunks tab on the Trunks Ethernet interfaces web page.
Figure 121. Structure of the FEC matrix for FEC Modes 1D and 2D.
9.3.6.5 Purpose
Default value: Empty string
Type: text string, up to 255 characters long
Description: A text tag that can be entered by the user for various purposes.
9.3.8.1 etherStatsBroadcastPkts
Description: The total number of good packets received that were directed to the
broadcast address. Note that this does not include multicast packets.
9.3.8.2 etherStatsCollisions
Description: The best estimate of the total number of collisions on this Ethernet
segment.
9.3.8.3 etherStatsCRCAlignErrors
Description: The total number of packets received that had a length (excluding framing
bits, but including FCS octets) of between 64 and 1518 octets, inclusive. The packet had
either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error)
or a bad FCS with a non-integral number of octets (Alignment Error).
9.3.8.4 etherStatsDropEvents
Description: The total number of events in which packets were dropped by the probe
due to lack of resources. Note that this number is not necessarily the number of packets
dropped; it is just the number of times this condition has been detected.
9.3.8.5 etherStatsFragments
Description: The total number of packets received that were less than 64 octets in
length (excluding framing bits but including FCS octets) and had either a bad Frame
Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a
non-integral number of octets (Alignment Error).
9.3.8.6 etherStatsJabbers
Description: The total number of packets received that were longer than 1518 octets
(excluding framing bits, but including FCS octets), and had either a bad Frame Check
Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-
integral number of octets (Alignment Error).
9.3.8.7 etherStatsMulticastPkts
Description: The total number of good packets received that were directed to a
multicast address. Note that this number does not include packets directed to the
broadcast address.
9.3.8.8 etherStatsOctets
Description: The total number of octets of data (including those in bad packets)
received on the network (excluding framing bits but including FCS octets).
9.3.8.9 etherStatsOversizePkts
The total number of packets received that were longer than 1518 octets (excluding
framing bits, but including FCS octets) and were otherwise well formed.
9.3.8.11 etherStatsPkts1024To1518Octets
Description: The total number of packets (including bad packets) received that were
between 1024 and 1518 octets in length inclusive (excluding framing bits but including
FCS octets).
9.3.8.12 etherStatsPkts128To255Octets
Description: The total number of packets (including bad packets) received that were
between 128 and 255 octets in length inclusive (excluding framing bits but including FCS
octets).
9.3.8.13 etherStatsPkts1519ToMaxSizeOctets
Description: The total number of packets (including bad packets) received that were
between 1519 and the highest allowed frame size.
9.3.8.14 etherStatsPkts256To511Octets
Description: The total number of packets (including bad packets) received that were
between 256 and 511 octets in length inclusive (excluding framing bits but including FCS
octets).
9.3.8.15 etherStatsPkts512To1023Octets
Description: The total number of packets (including bad packets) received that were
between 512 and 1023 octets in length inclusive (excluding framing bits but including FCS
octets).
9.3.8.16 etherStatsPkts64Octets
Description: The total number of packets (including bad packets) received that were 64
octets in length (excluding framing bits but including FCS octets).
9.3.8.17 etherStatsPkts65To127Octets
Description: The total number of packets (including bad packets) received that were
between 65 and 127 octets in length inclusive (excluding framing bits but including FCS
octets).
9.3.8.18 etherStatsUndersizePkts
Description: The total number of packets received that were less than 64 octets long
(excluding framing bits, but including FCS octets) and were otherwise well formed.
9.3.8.19 ifInDiscards
Description: The number of inbound packets which were chosen to be discarded even
though no errors had been detected to prevent their being deliverable to a higher-layer
protocol. One possible reason for discarding such a packet could be to free buffer space.
9.3.8.21 ifInNUcastPkts
Description: The number of packets, delivered by this sub-layer to a higher (sub-) layer,
which were addressed to a multicast or broadcast address at this sub-layer.
9.3.8.22 ifInOctets
Description: The total number of octets received on the interface, including framing
characters.
9.3.8.23 ifInUcastPkts
Description: The number of packets, delivered by this sub-layer to a higher sub-layer,
which were not addressed to a multicast or broadcast address at this sub-layer.
9.3.8.24 IfInUnknownProtos
Description: The number of packets received via the interface, which were discarded
because of an unknown or unsupported protocol.
9.3.8.25 IfOutDiscards
Description: The number of outbound packets which were chosen to be discarded even
though no errors had been detected to prevent their being transmitted. One possible
reason for discarding such a packet could be to free buffer space.
9.3.8.26 IfOutErrors
Description: The number of outbound packets that could not be transmitted because of
errors.
9.3.8.27 IfOutNUcastPkts
Description: The total number of packets that higher-level protocols have requested to
be transmitted to a non-unicast (i.e., a subnetwork-broadcast or subnetwork-multicast)
address, including those that were discarded or not sent.
9.3.8.28 IfOutOctets
Description: The total number of octets transmitted out of the interface, including
framing characters.
9.3.8.29 IfOutUcastPkts
Description: The total number of packets that higher-level protocols requested be
transmitted, and which were not addressed to a multicast or broadcast address at this
sub-layer, including those that were discarded or not sent.
An overview of Ethernet statistics for all interfaces on a particular module are found under
the Trunk network Ethernet interface Statistics tab.
Figure 125. Ethernet interface configuration – Trunks page, with three IP trunks
defined.
The trunks are numbered ipt-x:y, where x is the device number and y is a sequential
number at the time of the creation of the particular trunk.
In GX 5.1, creation of multiple trunks on a common physical interface is allowed. The
maximum number of IP trunks on different objects is described below.
To configure the different trunks, click on the particular trunk link (shown below is ipt-
3:1). This link takes you to the basic configuration page of the IP trunk.
The tabs of the IP Trunk configuration page are seen on the first (basic) configuration
page are Basic, Advanced, Alarms and Statistics.
To configure the capacity of the IP trunk, fill in either TX slots or TX bitrate. Internally, TX
slots are used. If TX bitrate is filled out, an integer number of TX slots are automatically
filled out in the TX slots field and the TX bitrate is reduced slightly.
Make appropriate IP settings for local and remote (destination) node. Set netmask
(always) and gateway if appropriate. It is essential that IP configuration is made correctly,
as no link is established otherwise.
The maximum transmission unit is defined on this page as well (105-1500). Also, the FEC
(Forward Error Correction) parameters are configured here. The configurable basic
settings are described below.
The parameters that can be configured on this page are described below.
9.3.11.3 VLAN id
Default value: No default value
Type: integer
Range: 1-4094
Description: VLAN id is a VLAN tag attached to Ethernet frames that are of transmitted frame
type ‘vlantagged’. As it is only relevant in this case, it is grayed out for the other values of the
parameter Transmitted frame type.
9.3.14.7 Rx bitrate
Type: Real
Description: The variables Rx slots and Rx bitrate are proportional. R
The listing of alarms, made in the web browser on the IP interface configuration page,
indicates for a selection of alarms if they are active or not. For alarms that are not active,
the text “No Alarm” is displayed on a green background. For alarms that are active, the
text “Alarm” is displayed on a background color associated with the severity of the alarm.
For example, an alarm with severity critical is displayed on a red background and an alarm
with severity warning is displayed on a cyan colored background. The listed alarms are:
9.3.17.10 ICMP
Description: This alarm is generated when the node receives an ICMP error message. The
text can be one of: ‘Redirect’, ‘Target unreachable’, ‘Source quench’ or ‘Parameter
problem’ depending on the problem, when the signal on the receive interface is missing
or misread.
Severity: Warning
In addition to the nine counters described in next chapter, there are two counters
dppipMaxConsecutiveMissingFrames and dppipOutOfAlignmentCount. These two
counters are not defined from the illustration in chapter 9.4.2 DPP-IP Trunk level
statistics.
9.4.1.1 dppipMaxConsecutiveMissingFrames
Description: This counter is keeping track of the highest number of consecutive missing
frames. Whenever in a sequence two consecutive frames follow each other, counting is
restarting.
9.4.2.1 dppipDeliveredFrames
Description: The total number of DPP-IP frames that have been received and delivered to
the DTM interface.
9.4.2.2 dppipDroppedFrames
Description: The number of DPP-IP frames that have been received and have not been
delivered since the interface was unable to align its data into the DTM trunk stream.
9.4.2.3 dppipDuplicateFrames
Description: The number of DPP-IP frames that were received with a sequence number
of an already processed DPP-IP frame.
9.4.2.5 dppipMissingFrames
Description: The number of DPP-IP frames that were missing in the frame sequence, i.e.
the expected sequence number was not found in the DPP-IP framing buffer.
dppipMissingFrames counts all frames, including non-data frames like FEC frames etc.
9.4.2.6 dppipReceivedFrames
Description: The total number of DPP-IP frames that have been received.
dppipReceivedFrames is the total number of received frames, including FEC frames etc.
9.4.2.7 dppipRecoveredFrames
Description: The number of missing DPP-IP data frames that were recovered by the FEC
procedure. dppipRecoveredFrames only counts data frames.
9.4.2.8 dppipReorderedFrames
Description: The number of DPP-IP frames that were received out of order, but could still
be aligned to the DPP-IP frame sequence.
9.4.2.9 dppipSentFrames
Description: The number of DPP-IP frames that were sent on the DTM interface.
9.4.3.1 Rx Delivered
Description: The number of received packets delivered to higher level (DTM) protocols.
9.4.3.3 Rx Corrected
Description: The number of received packets corrected and delivered to higher level
(DTM) protocols.
9.4.3.4 Tx Sent
Description: The number transmitted packets sent towards the Ethernet interface
9.4.4.1 Rx Accepted
Description: Number of received packets accepted by the Ethernet interface.
9.4.4.2 Rx Drops
Description: Number received packets dropped and not sent to the Ethernet interface.
9.4.4.3 Rx Errors
Description: Number of received packets with errors that are corrected and sent to the
Ethernet interface.
9.4.4.4 Tx Sent
Description: Number of packets sent towards the line and the remote Ethernet interface.
9.4.4.5 Tx Drops
Description: Number of packets dropped and not sent towards the line and the remote
Ethernet interface.
Parameter Description
Interface name The interface name. Written as “sonet/sdh-X:Y” where X is slot position
of the module and Y port position of the interface on the module.
Operational The operational status of the board
status
Speed Capacity of the interface
SOH S1 (SSM) Synchronization Status Message (4 bits) in the section overhead
Description The number of slots available for transmission on this interface. Used
on OC-3/STM-1 Trunk Module only
Figure 141. Read-only parameters for SDH/SONET interfaces
Parameter Description
Transceiver temperature Temperature of the transceiver
Transceiver laser bias Laser bias current of the transceiver laser
Transceiver power Optical power transmitted from the transceiver
Receiver power Optical power received on the transceiver
Figure 142. Additional variables for the OC-48/STM-16 X-ADM Module
Parameter Description
Suppress Alarms When the service is up and running as intended, alarms
are by default suppressed. In order to enable the
alarms, the suppress alarms tick boxes must be
unmarked.
All: When marked, all alarms are suppressed.
AIS: Alarm indication signal.
RDI: Remote defect indicator.
Figure 143. Configurable parameters for common interfaces
Additional read-only parameters (variables) are presented under the Advanced heading:
Parameter name Description
Error counters B1 Section overhead
B2 Line overhead
B3 Path overhead
M1 Remote indication of B1
G1 Remote indication of B3
Pointer adjustment RXPJE+
event, positive and RXPJE-
negative TXPJE+
TXPJE-
The OC-3/STM-1 Trunk Module only display error counters B2 and B3.
User's Guide Trunk network configuration 151
Alarm Description
Opto module Alarms from SFP. The Opto Module alarm is not available for
the OC-3/STM-1 Trunk Module.
Unequipped (UNEQ) This alarm is received from the other end of the link, indicating
that the payload is not usable.
Los of signal (LOS) Loss of signal. No signal detected on SONET/SDH network
interface, no light in the fiber.
Los of frame (LOF) Loss of frame. Unable to align SONET/SDH frame, no light in
the fiber.
Los of pointer (LOP) Loss of pointer. No pointer for where payload is.
Alarm indication Alarm indication signal, line or defect detected by upstream
signal, line (AIS-L) SONET/SDH network interface.
Alarm indication Alarm indication signal, path or defect detected by upstream
signal, path (AIS-P) SONET/SDH network interface.
Remote defect Remote defect indication, line or defect detected by
indication, line (RDI-L) downstream SONET/SDH network interface.
Remote defect Remote defect indication, path, RDI-P or defect detected by
indication, path (RDI- downstream SONET/SDH network interface.
P)
Payload mismatch Payload mismatch.
(PLM)
Degraded signal Degraded signal
(DEG)
Loopback Loopback alarm, NA
Figure 146. Alarms parameters
3:1 3:1
3:2 3:2
JPEG2k (8p) JPEG2k (8p)
Video (8p) Video (8p)
GigE (8p) ASI/AES (8p) GigE (8p) ASI/AES (8p)
STM-16 (4p) STM-16 (4p)
40 Gbps SWA 40 Gbps SWB 40 Gbps SWA 40 Gbps SWB
NCA NCB NCA NCB
680 680
iov136 iov136
Variable Description
Interface The interface name, written as “pdh-X:Y” where X is number of the slot
name in the chassis and Y is the number of the port on the module.
DTM The name of the DTM interface, written as dtmX:Y. X and Y are used as
interface for the Interface name.
Oper. status The operational status of the board. Up, Down, ‘Absent’, ‘Starting’ or
‘Dormant’
Speed The capacity of the interface
Mode The operational mode of the node, DS3 or E3. The mode (DS3/E3) has
to be the same on the entire module, but mixing DS3 and E3 on
different modules within a node is allowed.
Figure 150. Variables of the DS3/E3 Interface
Parameter Description
Suppress Alarms When the service is up and running as intended, alarms
are by default suppressed. In order to enable the
alarms, the suppress alarms tick boxes must be
unmarked.
All: When marked, all alarms are suppressed.
AIS: Alarm Indication Signal.
RDI/RAI: Remote Defect Indicator/Remote Alarm
Indication
Figure 151. Configurable parameters of the DS3/E3 Trunk Interface
User's Guide Trunk network configuration 155
Parameter Description
Line build out (E3 For operation with physical cable lengths over 68 m (225 feet), the
mode only) ‘Line build-out’ variable must be selected. With the selection,
operation up to 137 m (450 feet) is feasible. The feature
compensates the frequency content to accommodate for frequency
dependent attenuation and propagation properties of the cable.
SSM/TM code (E3 Synchronization Status Message/Timing Marker code. Can assume
only) values 0-15 or auto. Auto is recommended.
Receive sync Select receive DTM sync source. Either the recovered bit clock
(RX_FSYNC) (Line) or the recovered DTM Start of Frame signal (FSP). Normally
source set to Line, but if Time Transfer is used the parameter must be set
to FSP. Also, in this case, the interface must be reset, i.e. the
administrative status must first be taken down and then reset to
up. Obviously, this only applies to the case where the
administrative status is up already.
Signal failure Delay time for 1+1. The time that the nodes waits for the underlying
filter period network (SDH/SONET/WDM) to re-establish connection, in order to
avoid a switch-over.
Default 50 ms, Range 0-2000 ms
Degraded defect Configuration parameters for the “Degraded Signal” alarm,
(DEG) period according to ITU G.806 for the interface.
Period, default 5 sec (Number of sequential bad seconds to
set/clear DEG), settable from a roll-down menu to an integer
between 2 and 10
Degraded defect Configuration parameters for the “Degraded Signal” alarm,
(DEG) threshold according to ITU G.806 for the interface.
Number of background block errors to declare a bad second.
Default 1200.
Overhead BIP 00000 (Number of detected BIP-8 errors since last reload of this
information page); REI 00000 (Number of detected remote error indications
since last reload of this page); LCV 11920 (Number of detected line
code violations since last reload of this page); CP 00000; P 00000
(Number of detected P-bit errors since last reload of this page)
Figure 152. Advanced parameters of the DS3/E3 Trunk Interface
The Alarms parameters are presented at the bottom of the table as:
Parameter Description
Unequipped This alarm is received from the other end of the link, indicating
(UNEQ/IDLE) that the payload is not usable.
Loss of signal (LOS) Loss of signal. No signal detected on PDH network interface.
Loss of frame Out of frame. Unable to align PDH frame.
(LOF/OOF)
Navigate to the Trunks Trunk Interfaces web page and then on the trunk interface
that should be edited.
Make all your choices and click on Apply or OK. Apply doesn’t change the web page,
whereas OK takes you back to the previous web page (the Trunks Trunk Interfaces).
Figure 154. Edit the Trunk parameters on a DS3/E3 Trunk Interface, here shown
for E3.
In order to configure a particular interface, click on the link in the listing. In the text,
interface dtm1:1 is configured.
Parameter Description
Administrative Status Down (disabled)
Up (enabled)
Purpose A text field where a descriptive name name can ble
given.
Link class Link class is a property of the link. It tells how a faulty
DTM link is handled and can have three different values:
normal, persistent or nailed. It is described in chapter 14
Channel Persistence.
Control channel capacity There is always a control channel using one slot per
DTM frame, which is the default. It is configured in the
web as 0 slots, so the number entered in this box is
really the control channel capacity minus one
(expressed in slots).
9.8 Links
The Links page shows all DTM links that the node is connected to. The page can be used
to check if links to surrounding nodes have been properly established. For each link id
there should be two addresses; the node address and the address to the remote node.
The link-table lists all the links that this node is attached to along with all other nodes that
are attached to these links. Each line in the table represents an interface and the node
that the interface is located in.
Each link starts with an Id, which is equal to the Id of a local interface. It lists the other
interface connected to that link before starting a new link with a new id.
Click on the Trunk networks Links link. The Links page appears.
Enter the DTM address and whether the address is Primary or not and then click OK. The
(DTM) addresses’ page will reappear with the new address listed in the table.
Back up the configuration changes and restart the node. This configuration change,
different from all other configuration changes, needs a restart of the node to become
active.
The Hostnames page shows the DTM nodes with their DTM addresses and hostname.
Remember to include the list of the hostnames in every node in the network; all the nodes
in the network must know all the hostnames!
Enter the DTM address and the selected hostname associated with the address. Click OK.
The DTM hostsnames page reappears with the newly defined address and hostname.
There are some syntax rules for hostnames. The names can consist of letters, numbers
and characters dot ‘.’ and dash ‘-‘, but they must start with a letter. Examples of valid
hostnames are:
node10.neti.se, node12.academy.net-insight.net
It is possible, but not recommended to specify several names per address, by entering
each name on a separate line. Only the name on the first line will be shown on the
hostname page; use several entries with the same DTM address instead if the need of
using multiple host names exists.
Figure 165. Editing DTM hostname search suffixes is done from the Search tab
under the Trunk network Hostnames link. This example with lab,
academy.se, netinsight.net makes it possible, for example, to name the
Figure 166. Summary of some allowed short names, provided that the suffix has
been defined on the hostname search page defined on the node.
The short names can be used for configuration of these nodes, provided that the
appropriate hostname search page has been saved on all nodes that need to know about
the node. As it, for obvious reasons, is hard to know what nodes must have the definition,
it is best to include the hostname search list in all nodes.
This section describes how to configure DTM routing. There are two different ways to do
this:
Static routing is where the routing tables are configured manually.
Dynamic routing is where a routing protocol calculates routing tables automatically.
Note: Do not mix dynamic routing with static routing since this can
lead to errors that are difficult to troubleshoot.
Click on ‘Add source’ or the specific link that is to be edited or deleted; the configuration
page for a static route appears. To edit or delete an already existing static route, click on
the DTM address of the route (underlined).
Detect default gateway: Ticking this box forces the node to automatically find its
gateway. This is only relevant for end-nodes. For switches, the box is grayed out (default).
Detect from neighbors: This box is only visible when the user selects area number ‘Select
from neighbors’. Whenever it is visible, it is by default selected. This makes the node
request its area number (see below) from its neighbor(s).
Area number: By default, DRP distributes information about all nodes and links to all
nodes in the DTM network. This allows all nodes to make "optimal" routing decisions
since they have complete knowledge about the current topology. As the network grows
larger, the amount of information distributed by DRP grows and eventually becomes too
large for a node to handle efficiently. Exactly how large a network must be before the
amount of routing information becomes too large depends on both the number of nodes,
the connectivity between the nodes (i.e. the number of links) and the types of nodes in
the network. It also depends on how often the network topology changes and the
network topology itself. As a rule of thumb, it is possible to run a network with 250 nodes
without worrying about the amount of routing information. If your network is larger than
that, you should consider using Areas.
n1 n2
Area A1 Area A2
Border nodes
Figure 171. A network divided into two areas.
A node that is a member of one area, but has one or more links to a node in another area,
is called a border node.
2 3 5
Figure 172. A network that has been divided into two areas in a bad way.
In the illustration, the distance from node 1 to node 5 is shorter if the channel is routed via
node 3 than if it is routed via node 2. In addition, the distance from node 1 to node 4 is
shorter via node 2. However, if a single area prefix route is used, then node 1 will think
that the distance to nodes 4 and 5 are the same and it doesn't matter if it routes the traffic
via node 2 or 3. This will lead to sub-optimal routing decisions.
This problem can be fixed by using more than one area prefix route to tell nodes in the
upper area if there are some groups of nodes that are cheaper to reach via one of the
border nodes than via the other. The extreme would be to add one area prefix route per
node in the area, but then you would be better off with all nodes in a single area.
2 3 5
Figure 173. A better way to build the network. Note the new link between nodes
2 and 3.
A better network layout is shown here. Here, a new link has been added between nodes 2
and 3. This means that it matters less if node 1 chooses to run the channel via node 2 or
node 3.
All nodes in an area should share a common addressing prefix. This prefix is independent
from the area number; it is only needed to announce to nodes in other areas which nodes
reside in this area. It is possible to have nodes with different prefixes within an area, as
long as one area prefix route is configured in each border node for each address prefix in
the area.
Area A1 Area A2
X.17.01.3A X.17.02.21
Figure 174. A network with two areas.
In the above example, the network has been divided into two areas called A1 and A2. All
nodes in area A1 have addresses in the range X.17.01.00/56 (X is used here as a short-hand
for 00.00.00.00.00) and the nodes in area A2 have addresses in the range X.17.02.00/56. If
no area prefix routes are used, nodes in area A1 are not able to establish channels to
nodes in area A2 and vice versa.
To allow nodes in area A1 to find nodes in area A2, an area prefix route must be added to
node X.17.02.21. This area prefix route should advertise the network X.17.02.00/56 to
nodes in area A1.
To allow nodes in area A2 to find nodes in area A1, an area prefix route must be added to
node X.17.01.3A. This area prefix route should advertise the network X.17.01.00/56 to
nodes in area A2.
X.17.03.13
X.17.01.3A X.17.02.21
X.17.02.28
Figure 175. A network with three areas.
In the above example, the following area prefix routes must be configured:
To allow nodes in area A1 to find nodes in area A2, an area prefix route must be added to
node X.17.02.21. This area prefix route should advertise the network X.17.02.00/56 to
nodes in area A1.
To allow nodes in area A1 to find nodes in area A3, an area prefix route must be added to
node X.17.02.21. This area prefix route should advertise the network X.17.03.00/56 to
nodes in area A1.
To allow nodes in area A2 to find nodes in area A1, an area prefix route must be added to
node X.17.01.3A. This area prefix route should advertise the network X.17.01.00/56 to
nodes in area A2.
To allow nodes in area A2 to find nodes in area A3, an area prefix route must be added to
node X.17.03.13. This area prefix route should advertise the network X.17.03.00/56 to
nodes in area A2.
To allow nodes in area A3 to find nodes in area A1, an area prefix route must be added to
node X.17.02.28. This area prefix route should advertise the network X.17.01.00/56 to
nodes in area A3.
To allow nodes in area A3 to find nodes in area A2, an area prefix route must be added to
node X.17.02.28. This area prefix route should advertise the network X.17.02.00/56 to
nodes in area A1.
9.11.10 Configuration
To implement DRP areas in your network, the following configurations must be made:
Configure the area number that the node shall belong to in each node. This is done from
the DTM Routing Dynamic routing config link.
Figure 176. Dynamic routing is made by changing the Type parameter from
Static to Link prefix or Area prefix.
For dynamic routes (i.e. not static), the type could be set to:
X.17.02 n2 s1
X.17.03 n3
Nodes n1, n2 and n3 are configured as end-nodes and they have DTM addresses that all
fall in the range X.17.00/60 (i.e. from X.17.00 to X.17.0F). A link-prefix route can therefore
be added to the node s1. This means that instead of announcing n1, n2 and n3
individually, s1 will announce only X.17.00/60. Instead of each node in the DTM network
having three separate routes for n1, n2 and n3, they will only have a single route that
covers all three of them (and any possible additional end-nodes added later in the same
DTM address range).
Figure 180. A fault on the leftmost link will automatically result in a new minimal
spanning tree from sync master 0. During recalculation of the spanning tree,
the involved node (in this case the lower left node) is in holdover mode.
Figure 182. By un-ticking the ‘Selectable’ checkbox in the table, the clock sync
signal will not be distributed further in the DTM network.
When an interface should not be used, a Do Not Use (DNU) signal can be generated, and
when the interface detects this it will enter the DNU state which is reflected by the
interface status field being “DNU”. When in DNU state, the interface cannot be selected
as selected timing source.
For TRA messages received which have traversed a too long path, there is a limit to the
trace length. This also acts as a transient loop cut-off mechanism. When the TRA has a
trace-length above the trace-length limit (64 nodes), it enters the TRACELENGTH state
which is reflected by the interface status message “TraceLen”. The time source is not
selectable when in the TRACELENGTH state.
When a TRA is received on an interface which the current TRA is degraded, then all timing
sources having a matching TRA from the same source are marked as black-listed. This
black-listing is lifted after two valid messages have been received. The black-listing
mechanism aims to remove potentially dangerous misinformation about potential paths
and hugely improve convergence time as proper alternative paths will be accepted within
Yes, SDI Video service This service has a very hard requirement on drift
preferred rate that can only be guaranteed with a high
stability clock reference.
1
Note that 10/5/2.048/1.544 MHz signals shall be “clock signals”, i.e. sine or square
wave. The port does not support E1/DS1 framed signals. The external sync in port
automatically detects if a 10, 5, 2.048 or 1.544 MHz clock is attached.
User's Guide Synchronization 185
Nimbra 310, 320, 360, 380, 390, 640, 680 and 688 (only with a 160 Gbps Switch Board or
with an 80 Gbps Switch Board, revision A6 or higher) can also use a 10 MHz signal as
reference input.
Redundant GPS controlled sources are preferable. If the primary reference clock goes
down, DSYP will switch over to a secondary reference clock with the same frequency, and
thus avoid a possible frame-slip in the transition process. These excellent sources may be
configured as external sources with priority 0, to use synchronization network
segmentation.
All sources shall be able to turn off, squelch, their output upon failure. This allows DSYP
to choose alternative sources to the network without manual intervention and with
significantly reduced effect on network and transported services. Some clocks are unable
to squelch their output on failure, and those should be avoided. Some clocks have the
ability to squelch their output on failure, but need to be configured to achieve that. Users
is strongly recommended to verify that all their sources have this ability.
In networks for which no external synchronization signal is applied, voting is done among
the nodes to select the node according to default priority and node identifier. Since node
identifiers are not configurable, the node identifier being most preferable might be in a
distant node, making the service of the network dependent on this node and the links
from it. Experience shows that this can cause problems, so as networks grow beyond 10
nodes or so, it is strongly recommended to have at least one node being fed an external
clock both to provide a stable reference and a suitable insertion point for the network.
It is recommended to connect the external reference clock to a centrally positioned node,
in order to get as few hops as possible to all or most nodes. For larger networks, it is
recommended to have multiple synchronization sources with geographical separation
such that common problems do not affect all sources. This also helps to handle larger
network failures that cause it to break into pieces, as it increases likelihood of feeding
both sides of the break.
Figure 184. Configuration of time for a sync interface, sqc-b:1 in Nimbra 600
10.8.1.1 Direction
Default value: ‘In + Out’
Type: One of ‘In + Out’, ‘In’, ‘Out’
Range: ‘In + Out’, ‘In’, ‘Out’
Description: Active direction for the external synchronization clocks. ‘In + Out’ means
that both in- and output interfaces are enabled, ‘In’ means that only the input interface is
enabled and ‘Out’ means that only the output interface is enabled.
Figure 185. Nimbra 360 front. The sync interfaces are found at the lower right
side. Nimbra 380 and 390 are identical to Nimbra 360 with respect to TSI-
1/TSI-2 (sqc-1/sqc-2).
Configuration of TSI-1/sqc-1 includes one parameter, time dual frequency mode, with
possible values ‘None’ or ‘PPS + 10 MHz’. With the parameter set to none, the port is a
regular external clock interface that accepts and distributes a synchronization signal.
With the parameter set to PPS + 10 MHz, the interface is set up to accept (or deliver) a
time transfer signal.
Figure 186. Nimbra 360 with TSI-1/sqc-1 configured with Time Dual Frequency
Mode equal to ‘None’, i.e. the two ports of the interface are used as regular
sync in and sync out ports. Observe that sync in is the leftmost connector of
the pair.
In order to configure this interface from the web interface, follow link Time Clock
interfaces. The available clock interfaces are shown on this web page.
Figure 188. Configuration of sqc-1, with time dual frequency set to ‘None’.
When Time Dual Frequency Mode is set to ‘None’, the parameters to configure are
direction and Output frequency (if applicable). The parameter ‘Time input offset’ is
irrelevant when Time Dual Frequency Mode is set to ‘None’ and is grayed out in the web
interface. Time input offset is a calibration factor for the time it takes for the clock signal
to reach the Nimbra 360/380/390 node (from its source), but it is only relevant for Time
Dual Frequency Mode set to PPS + 10 MHz, described in next section. Square wave input
sync signals of 1.544 MHz, 2.048 MHz, 5 MHz or 10 MHz are automatically recognized by
the node (according to ITU-T G.703-13).
When Time Dual Frequency Mode is set to PPS + 10 MHz, TSI-1 expects to receive two
signals: one PPS (pulse per second) on the PPS port and one 10 MHz signal on the Sync
port if the Direction parameter is set to ‘In’. If the parameter is set to ‘Out’ these signals
are sent to the ports and can be used by external equipment.
If one or both expected signals are missing or of poor quality, it can be deducted from the
web interface where the problem is. It is sufficient to look at Input frequency and Defects.
Unless the node identifies two acceptable signals, the signal is not recognized as an
external sync source and not used by the network. This can be seen on the Time Clock
interfaces web page.
Blind Panel
1 2
Sync Out In
Time transfer in PPS In 10 MHz In
Time transfer out PPS Out 10 MHz Out
10.8.4.1 Direction
Default value: In + Out
Type: one of three values; ‘In’, ‘Out’ or ‘In + Out’
Range: ‘In’, ‘Out’ or ‘In + Out’
Description: This is the configured direction of the sync signal. ‘In’ means that the node
expects a signal on the ‘Sync In’ port. ‘Out’ means that the node generates a sync signal
on the Sync Out port. ‘In + Out’ means that the node expects a signal on the Sync In port
while simultaneously delivering a signal to the Sync Out port.
Figure 196. The Sync page, where internal and external clock priority are
configured and Node clock bandwidth.
Details on the faults described can be found by following the link Time Clock
interfaces and sqc-1 or sqc-2 depending on which clock is faulty.
Defect Description
Loss Of Signal (LOS) No input signal detected.
Loss Of Frame (LOF) Input signal not properly aligned to
reference clock. Most frequently caused
by too large frequency deviation
between reference clock and input
signal.
Signal Frequency Mismatch Input frequency does not match
(SFM) requirements of operational mode (e.g.
2048kHz in PPS+10Mhz operational
mode).
Excessive Phase Deviation Output realignment limit has been
(EPD) exceeded.
Loss Of Alignment (LOA) Output reassignment limit has been
exceeded.
Ok No defect detected
Figure 200. Details of Defects of the squelchable clocks described above.
These counters are reset each time the web page is accessed. (Note that if several users
are logged in, it may be reset of another user accessing the page). These counters give
information about the difference between the line rate of the interface and the DTM
network frequency. In the RX direction, an intermediate SDH/SONET network could
introduce pointer justifications also when in Network timing mode.
Figure 202. Configuration of the external clock admin status in the node that is
the source for time transfer or has an external clock that is.
In our case, the external clock priority is set to 4 and the administrative status is set to Up.
The second step in configuring time transfer is to enable the links on all nodes using or
passing time transfer signals. This is made from the Time Time transfer web page.
The admin status of these links must be set to Up at both ends of all relevant links as
Time Transfer is enabled on a per link basis. The easiest way is to set it to Up for all links in
all nodes. While in operation, links not used for distribution of time transfer signal may be
removed later.
Operational status is Up when time transfer is active and sync is taken from the interface.
If sync is only delivered to the link, the operational status remains stated as ‘dormant’ in
the web interface. That is why no link has operational status Up in the illustration above;
the source node only delivers time transfer signals, it does not receive them.
Timing reference is the synchronization source that is currently active.
Time scale status describes the current operating mode. It can take on three values;
uninitiated, reassigned and compensated. The initial state is Uninitiated, which indicates
that the time of the time scale is not initiated and may not be used for any time keeping.
When the time scale of the node has a degenerated time offset from neighbor nodes
(being Compensated) or a local TAI/UTC (atomic time/universal time coordinated) source,
the node reassigns the time scale and enters the reassigned state, during which the time
scale may not be used for precision timekeeping. When the time scale of the node has
been initiated to TAI/UTC, it is compensated and can be used for time keeping.
Calibration reference is the reference clock, which is compared to the time transfer
(reference) clock distributed in the network. It can be set to any of the interfaces, an
external clock or the node itself (sync/osc).
To configure a particular interface, click on the link to the interface in the Time sources
column.
Figure 204. Time transfer configuration web page for a specific interface in a
node.
The calibration clocks, comprising of one PPS and one 10 MHz oscillator, is used for
reference and to determine the time difference between different interfaces. In the
User's Guide Synchronization 205
Go to the web page for the interface to be calibrated (Time Time transfer Specific
interface like sync/dtm3:2).
Find a good average of one way (delay deviation) to round trip time error ratio. This is
what is read from the (negative of the) value of Calibration factor error seen at the
bottom of the web page.
Input this number with a negative sign as calibration factor in the available entry field.
Make sure admin status is down, when setting the calibration factor.
Figure 209. Inspection of the web page. Once calibration and interface time
error are small values, the calibration is as good as it gets.
Watch the interface and calibration time error on the page. If their time average is close
to zero, the calibration is fine. Otherwise, add the new calibration factor with negative
sign to the value already entered previously.
Iterate the calibration step, if needed.
Figure 210. All Channels listed, including all Time Transfer channels.
PM
Node A
Nimbra network
Interface B
PM
PM
Nimbra network
Interface A Interface B
PM
Node A Node B
Ethernet ports, both physical interfaces on the nodes and virtual ETS interfaces. On these
ports, monitoring is available for two different logical objects in each port. The source
object monitors outgoing streams and the sink object monitors inbound streams to the
port. They are shown as eth-source, eth-sink, ets-source or ets-sink on the performance
monitoring web pages.
The monitoring points are sampled every second and a new performance monitoring
period is started every 15 minutes, on the quarter (hh:00, hh:15, hh:30, hh:45). The 24h
periods are synchronized with the 15m periods, i.e. the first 24h period and the first 15m
period start at the same time. Timing is taken from the Date/time function of the various
nodes.
When a new period starts, all regular counters are reset to zero and, if appropriate, the ZS
counter is increased with one. The Zero Suppression (ZS) counter registers number of
fault free periods prior to the current period.
11.2 General
In the web interface, Performance monitoring is found under the Perf. monitor link.
The general configuration settings for all performance measurement points in a node are
set on the Perf. Monitor Configuration web page.
The configurable parameters on this page are described in the table below:
Even though very large values are allowed for the number of large and small history logs,
it is recommended to stay at or close to the default values. Excessive values leads to out-
of-memory problems at some unspecified time in future.
When the parameters have been set, click on OK or Apply to store the settings in the
node. Apply takes the user back to the starting page for performance monitoring, while
OK keeps the user on the configuration web page.'
Parameter Description
(G.826)
UAS Unavailable Second is a second of unavailable time. Unavailable time
starts after ten consecutive SES and ends after ten non-consecutive SES.
SES Severely Error Second (Subset of ES) is a second of seriously faulty
available time. One second of available time containing 30% EB or at
least one defect. Ten consecutive SES seconds begin UAT state while ten
consecutive non-SES seconds end UAT.
ES Error Second is a second of available time with one or more BBE.
BBE Background Block Error is the number of errored blocks found during one
second of available time that is not part of SES.
SS Slip Second is one second containing one or more Slips, which is
Applicable for trunk modules.
Suspect If this parameter value is yes, all counter values may be erroneous and
should be interpreted with care. Incomplete measurement periods are
set to yes; otherwise it can be expected to be no.
ZS Zero suppression (counter) tells the number of periods with all
performance parameters being zero before the current period.
Figure 217. Performance Monitoring, monitored parameters
Figure 219. The data presentation web page is also the entry point for
configuration of a single PM object (by following the Configuration tab).
Below, the object is configured. All different types of objects are configured the same
way.
The configurable parameters are:
All headings on this page within parenthesis like (interface), (service), (direction) etc
include all values for this parameter. If a set value is chosen, like setting (interface) to
‘Trunk’, then only PM object with that value are displayed in the listing generated with a
click on the Show button. The entries in these drop-down menus depend on the
particular configuration of the node. In the pictures below, this is illustrated.
Figure 222. Possible values for the parameter (interface). The default value
shows all entries, Trunk show all trunk PM objects, Access show all access PM
objects and TTP show all PM objects ending on TTPs (previously called
connection).
Figure 223. Possible values for the parameter (service). The default value shows
all entries; the values that show up in the menu are available but different
values appear depending on the node configuration.
Figure 224. Possible values for the parameter (direction) are ‘source’ or ‘sink’.
Source means signals originating from the measuring point and sink means
signals terminating on it.
Figure 226. Possible values for the parameter (admin status) are ‘Admin up’ and
‘Admin down’.
Figure 227. Possible values for the parameter (oper status) are ‘Oper up’ and
‘Oper down’.
All the parameters shown in the top row form a filter, through which all PM object log
entries are passed. Only those PM object log entries that satisfy all conditions are listed
on the web page. All configured PM objects in the node are presented in the lists that are
seen in the drop-down menus. Available PM objects depend on the node configuration.
Trunk PM available
IP/Ethernet trunks Yes
SONET/SDH trunks Yes
PDH trunk (4 x DS3/E3 for Nimbra 300) Yes
Figure 229. PM implementation on different trunks
Access PM objects are monitored on the incoming Rx port of the access interface on the
access modules which has the feature implemented.
TTP objects can be monitored both on their source and the sink interfaces, i.e. they are
logically divided into two separate objects. PM on the sink interface is supported in most
cases, whereas PM on the source interface is limited to Ethernet PM objects (physical
ETH and logical ETS interfaces).
Note that for the source PM objects, errors occur in particular when the buffer for the
outgoing stream is filled and packets are dropped. This is quite different from sink
interfaces, where the cause of errors is lost packets in transit.
11.4.2 Services
Under the (services) heading, PM objects can be sorted by service. Observe that the
combination of (interface) and (service) can create logically inconsistent and for that
reason empty sets. For example, if interface is chosen as Trunk and Service SDI, the
created set is always empty as an SDI trunk is logically inconsistent.
Some services, like Ethernet, can be both trunk and access. Other services are either
always trunk or always access.
11.4.3 Direction
Under this heading it is possible to select if you want PM data only for points in the
network where traffic is terminated (i.e. sink) or where traffic originates (i.e. sources).
Figure 234. All entries in the list are selected by selecting the tick box in the top
row, with the headings. Objects can be removed from the selection by clicking
in the tick box in the leftmost column.
With all selected PM objects, it is now possible to reset the counters with a single click on
the Go button. Alternatively, the admin status of the PM objects can be set to either Up
or Down. Just change the value in the (change selected item) drop-down menu and click
on the Go button.
On this web page, the current values of the counters are presented as well as a graph of
previous measurement periods. For a tabular form of the data, the link History details can
be used. Similar graphs and history details are available for 24h counters.
2
Earlier, this endpoint of the ETS connection was called TTP (Trail Termination
Point). This term is no longer in use for ETS, but is still used for ITS services.
User's Guide Ethernet Transport Service (ETS) 225
Figure 239. A multicast ETS connection, with a source (node A) and two
destinations (node B and node C).
Figure 241. Example of unicast hitless setup of ETS 1+1 protection with one
destination. Observe that the primary and secondary routes through the
network must be different, in order to ensure a working protection
mechanism.
Figure 243. The configuration page obtained by clicking on the Devices link.
The starting point for configuration of Forwarding Functions, ETS or interface groups is
found by clicking on the name of the particular object to be configured or use the Create
buttons.
Click on the statistics tab to get an overview of the statistics counters of all the interfaces
belonging to the device.
If an Ethernet device is in status absent a button that says Delete Device will appear. This
is the case when the module has been removed from the node. If the button is clicked, the
device is removed from the web interface.
Although only (at most) eight forwarding functions can exist on a module, they can be
numbered between 1 and 999999. It is recommended to use automatic selection and use
numbers sequentially, unless there is a compelling reason.
The basic configurable parameters (settings) for a forwarding function are: Customer ID,
Purpose, VLAN Mode, Mac Mode, Mac Aging Time, Spanning tree, Jumbo Frames and
Fault propagation.
A Forwarding Function can currently be set in two different VLAN modes and two Mac
modes see Figure 247 below. When Mac mode is set to auto; nomac switching mode is
selected if only two ports are connected to the FF and mac switching mode in all other
cases.
There are five tabs to configure in a Forwarding Function; Basic settings, Advanced
(settings), Diffserv, Spanning Tree and Statistics (see Figure 246 above). Note that you
have to use the Apply or OK button on each page before moving on to the next tab to
save the configuration.
3
Nimbra 360 only supports ’Auto’ and ’Forward’
User's Guide Ethernet Transport Service (ETS) 233
Ethernet user priority is supported according to the standard for prioritizing Ethernet
frames based on information in the Ethernet user priority field, which is part of the VLAN
tag. This Priority Code Point (PCP) field only exists in VLAN tagged Ethernet frames and
is standardized by IEEE in [802.3] and [802.1D]. On Ethernet packets without VLAN tag
using Ethernet user priority, a default Ethernet priority is defined on the advanced
configuration page of the ETH/ETS interface (Traffic priority Priority mode (Ethernet
or Diffserv)
Figure 252. Default priority mode is defined for all packets reaching the
forwarding function under the ETH or ETS interface advanced configuration
web page.
Figure 253. Traffic class and drop precedence illustration. All TC1 traffic is
handled before TC0 traffic (strict-priority).
Figure 254. Mapping of flow groups into traffic class/drop precedence is made
on the advanced ETH/ETS configuration page.
DSCP or Diffserv configuration is made per forwarding function, under the Diffserv link on
the forwarding function configuration page.
The Spanning Tree Protocol (STP) and the Rapid Spanning Tree Protocol (RSTP) are
supported by most Nimbra Ethernet devices. The selection of type of spanning tree
protocol to use is made per forwarding function, on the “Spanning tree” web page.
Heading Description
Rx Accepted Number of accepted packets
Rx Drops Number of dropped packets
Rx Errors Numbers of errored packets
Tx Sent Number of transmitted packets
Tx Drops Number of transmitted packets
exceeding the Q threshold,
causing congestion in the
network.
Figure 258. Interface statistics, headings
In the table below, the basic settings for of these products are shown below:
As can be seen in the web GUI for Nimbra 360, two links from Nimbra 600 are missing
(Advanced and Spanning Tree).
To manage an ETS interface select Ethernet Devices, click on the link to the desired
device (like eth1). In the overview tab click on the desired ETS interface (ets1:9) or create
new ETS interface by clicking on the button Create Unicast i/f. See Figure 262 below:
An SCU license is required on each terminating node. Only one SCU-ETS channel can be
setup per trunk link. That is, the SCU-ETS must be terminated in a Forwarding Function
(FF) on the nodes that terminates the trunk link. The same FF can be used to terminate
several SCU-ETS, as well as ordinary ETS channels, creating a network with dynamic, as
well as fixed capacity channels.
The Originating Channel Parameters are:
4
Not supported by Nimbra360
5
Only supported and the only mode in Nimbra 360 for ETS.
User's Guide Ethernet Transport Service (ETS) 248
Note: If ‘VLAN Mode’ of the FF is set to transparent, then VLAN tags are
ignored.
These settings are made on the incoming packets to the forwarding function.
For ETH interfaces the additional section used to manage autonegotiate is shown on the
advanced tab, see 12.2.8.7 Specific Advanced Ethernet (ETH) interface parameters. For
ETs interfaces the additional section used to manage connection re-establishment is
shown on the advanced tab, see 12.2.8.8 Advanced ETS specific interface configuration
parameters.
In the table below, configuration of the Drop Precedence parameters are shown. Both
Traffic Class 0 and Traffic Class 1 have their independent parameter set.
Autonegotiation of interface, rate, protocols etc is made with the Autoneg feature on the
Ethernet interface set to ‘On’. This is also an Ethernet interface specific advanced feature.
6
Only supported by Nimbra 360.
7
The only supported mode in Nimbra 360.
User's Guide Ethernet Transport Service (ETS) 255
Under the ‘Connection re-establishment’ header, the parameters of the exponential back-
off algorithm and the reconnect time out can be set. Also, the connection can be defined
as having “Precedence”, which means that in case an intermediary node goes down, this
particular connection is taken down with priority. This also means that a replacement
connection is typically set up with priority (i.e. it has precedence over other connections).
Minimum interval: The starting value of the back-off algorithm. When a connection is
torn down, a first connection re-establishment attempt is made immediately; if the
attempt fails, another attempt is made after the minimum interval of the back-off
algorithm. The default setting is 10 ms.
Maximum interval: The end value of the algorithm, 50000 ms. The re-establish
mechanism will wait no longer than 50000 ms to re-establish a channel. If not successful,
another attempt is made after 50000 ms.
Figure 279. Configuration of ETH and ETS interfaces, illustrated with multicast
ETS interface. Parameter ‘Expect channel’ is only present on the ETS interface
and this is the only parameter differing between ETS and ETH interfaces.
Addition of new interfaces is made from the Add destination button. Here the admin
status of the destination is set together with destination node, destination DSTI and
source routes to the destination. Add source routes as needed. New source routes are
defined under All connections Source routes.
To add a destination, click on the Add Destinations button and define:
Spanning tree is specified in IEEE 802.1D. Net Insight adheres to the specification. The
configurable spanning tree parameters on the interfaces are ‘Port path cost’, ‘priority’,
‘edge port’ and ‘point-to-point’. The parameters are explained in the table below:
Port path cost defines a cost associated with the particular port/ interface. If two or more
interfaces are available for a connection to a particular node, the spanning tree algorithm
ensures that only the low-cost interface is used.
Priority defines the priority of the particular interface. Two hexadecimal digits plus two
hexadecimal 0s are added as a prefix on the port identity of the interface to create the
identifier. The lowest identifier interface is used, in case there are two interfaces with
equal cost.
Edge port is a Boolean variable used to signal if the interface is connected to equipment
not part of the DTM Ethernet universe (true). Auto means that auto detection is used.
Point-to-point is a Boolean variable used to signal if the interface is connected to a link
and a node with a point-to-point connection. Auto means that auto detection is used.
If statistics for all ETS interfaces are wanted, it is best found from Ethernet ETS
Interfaces and the Statistics tab.
Figure 290. Explanation of the different buffer levels in an ETSG with two
streams that define a hitless connection.
The Ethernet interfaces (eth5:1 and eth4:1) must be tied to their respective Forwarding
Functions (ff5:1 and ff4:1). ETS unicast connections between ets5:9 and ets4:9 are set up
on two separate web pages; the local DSTI number must match the destination DSTI set
up on the other ETS configuration page.
This configuration is typically set up as a bidirectional channel, but it is not necessary to
set up the return channel in case the traffic pattern is just a stream without return traffic.
This type of protection can be used for streams between one source and one or more
destination(s) (i.e. the physical Ethernet ports in this case). In our example, we have two
destinations in the same node (and even module). The different destinations can be
configured independently of each other, i.e. they can have a mixture of hitless protection,
standby protection and even unprotected ETS interfaces.
Figure 295. Open ended configuration of ETS 1+1 protection. This type can be
used both for unicast and multicast connections. The streams can be
bidirectional, but for practical applications they are mostly unidirectional.
Figure 297. An external Ethernet switch with aggregated traffic from three
separate VLANs has its traffic separated on three different Ethernet
interfaces.
Different customers can share one common Ethernet interface in the Nimbra network.
VLAN tagging makes it possible to separate the different VLANs in a Forwarding Function
(in this case ff1:1) to three different ETS interfaces. On the outgoing Ethernet interfaces,
typically the tags are removed, but this is dependent on the particular application.
PDH
Video
Video access
DTM channel interface
Remote
DTM
i/f
DTM
Video access
interface Local
DTM
i/f
PDH
Video
Interface Originating
Connection Terminating Interface
asi-2:1
Connection asi-1:2
itso-1
TTP Source itsi-2
TTP Sinc
Terminating Terminating
DTM node DTM node
DTM
Originating
DTM
node
HD-SDI
Figure 300. HD-SDI video transported with a DTM multicast channel to two
destinations
13.2 Protection
13.2.1 Nomenclature
13.2.1.1 Closed ended protection
Closed ended protection is a protection case where one video stream enters the Nimbra
network. It is split at the entry point and routed two separate ways through the Nimbra
network to the destination node. At the destination node both streams come together
and an egress stream is designed by either one of the streams or a combination of the
two streams.
Route One
DTM
Sink TTP B2
Figure 301. Source stream sent through DTM network along two independent
routes for type 1 protection. This protection type only supports unicast
connections and standby protection on sink Interface B.
DTM
Interface A1 Interface B
Route Two
Interface A2
Source TTP A2
Figure 302. Open ended type 2 protection of ITS streams. This protection type
supports standby protection with uni- or multicast streams.
DTM
Source TTP A2
Figure 303. Stream sent through the DTM network along two independent
routes for type 2 protection (closed-ended). This protection type supports
standby protection with uni- or multicast streams. This configuration is the
single source (closed ended) version (previous case).
DTM
Interface A1 Interface B
Sink TTP B2
Route Two
Interface A2
Source TTP A2
Figure 304. Type 3 protection, open ended case, of ASI and JPEG2000 streams.
This protection type supports standby protection with uni- or multicast
streams.
DTM
Interface A Interface B
Figure 305. Source stream sent through DTM network along two different
routes for type 3 hitless or standby protection. This configuration is the closed
ended version of type 3 protection (previous case). Hitless or standby
protection is configured on the sink interface.
13.3.1.13 H1 SS bits
Default value: 10
Type: Two bits in any combination
Range: One of 00, 01, 10, 11
Description: Sets the two SS bits (bit 5 and 6) in the H1 byte. These bits typically should
not need to be changed from the default setting. If the external equipment attached to
the interface is older, there might be a need to change them but this should be elaborated
in the documentation for the external equipment.
Configurable parameter
Configurable parameter
configured interface
Enable signal speed x x x
autosensing x
Output action on signal x x x x
fail x x
Transport format
Output mode x
TS-packet sync errors x
Suppress alarms x x x x x x
Loopback x x x x x x
JPEG 2000 encoding x
Signal format x
Interface mode
Transmit sync source
Synchronization Status
Message (SSM)
H1 SS bits
Interface to monitor M M M
Interface direction to
monitor M M M
Enable front-panel
selection button
PDH signal to transport
PDH Framing
On this ITS Sink TTPs Add TTP web page, type can be set to terminating (sink) or
originating (source). If type is set to terminating, Mode can’t be set. As soon as
terminating type is selected, the parameters for mode become irrelevant and are grayed
out.
The local interface drop down menu lists all possible available options for the local
interface. The selected interface is tied to the connection and TTP.
When the Add button is selected, the sink TTP is configured/defined in a web page.
User's Guide Isochronous Transport Service (ITS) 287
Administrative status is either Down (when the TTP is disabled) or Up (when attempts to
establish a channel to this TTP is made). Customer ID (integer) and Purpose are freely
configurable fields. In the Local interface drop down menu, all available interfaces are
listed. Local DSTI is the DTM Service Type Instance, a unique number per service type,
direction and node. A default DSTI is selected by the system (lowest available number)
but it can be user modified. The DSTIs don’t have to be consecutive.
With the Connection protection parameter, it is possible to configure the sink TTP for
1+1 protection (parameter value on) or without it (parameter off). Note that when
protection is used, there are two terminating connections connected to a single TTP.
Protection is more described in chapter Source Routing.
Suppress alarms can have valued none, warning or all. Active channel when protected
can be set to first or second. This is the defined channel. It is grayed out if it cannot be set.
Degraded threshold and Degraded period are two parameters that together define the
conditions for raising the Degraded alarm. The alarm is raised if (and only if) the degraded
threshold has been reached or surpassed for each second during the degraded period.
When finished with the configuration, click OK or ‘Apply’.
Click on Add TTP … to enter the setup page. A page similar to the page below will appear.
In the web page, the same settings as for the terminating TTP can be made.
Make the settings required (Originating/Unicast), use the drop-down menu to set the
local interface and click on the Add button.
In addition to the settings made for the termination, in the originating node the
destination DTM node with associated destination DSTI are needed. The required
capacity must be specified, either as a bandwidth (0.8-212 Mbps) for ASI or SDI (270
Mbps), SDI compatible (from Nimbra 600 to Nimbra 300), HD-SDI (1.485 or 1.485/1.001
Gbps), 3G-SDI (2.970 or 2.970/1.001 Gbps) or SDI compressed with the requested
(compressed) bandwidth.
We must also specify if we use protection and the source route(s) we use (if any) If a
source route is used, this is indicated on the web page with the text ‘currently used’ within
parenthesis to the right of the source route itself.
See chapter Source Routing for additional information on how to setup a source route.
Once both terminating and originating nodes are configured, the channel is established if
enough transport bandwidth is available.
Note: The lower part Destination DSTI is the sink (destination) TTP
DSTI number. To establish the connection, this number must
User's Guide Isochronous Transport Service (ITS) 290
node1 node4
3:1 7:2
itso-0 itsi-0
360 sr A
3:2
1:1
1:2
680
7:1
sr B
3:2
3:1
1:1 1:1
sr C
itsi-0 itsi-0
1:2 1:2
360 380
node2 node3
In the figure above, let sr C from node1 to node2 via node4 and node3 be defined by
IP/Ethernet IP/Ethernet
node1 node4
3:1 7:2
itso-0 itsi-0
360
3:2
1:1
1:2
680
7:1
sr D
3:2
3:1
1:1 1:1
sr C
itsi-0 itsi-0
1:2 1:2
360 380
node2 node3
Figure 319. Illustration of a disallowed combination of source routes for a
multicast channel. sr C and sr D both enter node3 on two different interfaces
(3:1 and 3:2), which is interpreted as a rooting loop and is disallowed.
Problems of this type are avoided if DRP is used for routing of multicast channels. DRP
routing of multicast channels have other, possibly undesirable, features though. With the
DRP protocol, routing is made destination per destination and conservation of bandwidth
GroupisAnot considered. SDH/SONET STM-16
In other words, Groupmay
bandwidth allocation B not be optimal.SDH/SONET STM-16
IP/Ethernet IP/Ethernet
13.5.2 Configuration of a Multicast Connection
A multicast ITS tunnel is a channel from one IN interface to multiple OUT interfaces. The
channel is unidirectional, i.e. traffic only flows from the source to the destination. No
traffic is transmitted in the back direction.
In our example, an ASI channel is set up between iov072 and iov137. The channel is
terminated on several interfaces in iov137.
The sequence for fast completion of the circuit is to set up the sink TTPs first and then to
set up the source TTP.
Select the type to Terminating and use the pull-down menu to set the local interface.
Note that as soon as Type is set to Terminating, Mode cannot be set.
Click on the Add button. Repeat for all destinations.
Figure 322. ITS basic setup for source TTP and multicast service.
Chose the type of interface (originating) and type of mode (multicast in our example), use
the pull-down menu to select the local interface and click on the Add button.
In addition to common parameters with the unicast case, there is an extra link to
Destinations, where the details about the various destinations are entered.
Click on the Destinations in the middle of the page, to set the multicast destinations for
the originating connection. This page shows the nodes that are configured in this
connection.
In order to define the destinations, click on the button Add Destination and enter the
parameters for the sink TTPs. In the following figures, the two destinations of our
example are shown.
Set Administrative status to Up, Destination DTM to iov137 and destination DSTI to 2 and
3 for the two different cases. The destinations have now been added. In this case, we have
not used source routes.
When all the nodes are added click on the Cancel button, a list of the destinations is
shown in the Destination page.
Follow the ITS Source TTPs link, open an originating TTP by following the TTP name
link, open the Advanced link; a page appears like the page below:
From this menu a variety of parameters are set: DCP version to be tried, suppression of
primary source route alarm and the parameters of the exponential back-off algorithm.
After configuration of the HD-SDI channel, the ASI stream is simply attached to the
proper port. A look on the ITS interfaces web page of the source interface then shows
the bandwidth used by the ASI stream.
Clicking on ‘Add’ takes the user to the configuration page of the sink TTP.
Figure 334. The Add TTP Configuration page for ITS. In this example, a source
TTP on local interface asi-2:1 is set up.
Output action Drop-down None, Mute None If set to ‘Mute’, the failed signal
on signal fail muted (i.e. shut down) on the
output access interface. Muting
may speed up fail-over
switching time when using
external fail-over switches. If
set to ‘None’, different actions
are taken depending on service
type.
Output mode Drop-down Auto, Spread, Auto How should the outgoing ASI
Burst stream be sent, in spread or
burst mode?
48 kHz 48 kHz
Figure 342. Timing of a MADI signal on ingress and egress interfaces. The 48
kHz is a reference clock, which needs to be attached to the outgoing interface
module of the terminating Nimbra node. Alternatively, the node clock can be
used as a clock source for extracting an egress MADI signal.
Please note that MADI does not use the through-timing of all other services. Instead,
there are a number of possible ways to synchronize the stream. The typical setup uses the
word clock of the egress interface to synchronize the egress traffic. It is possible,
DTM
aes/ebu-8:1
Nimbra 680
Nimbra 680 Node iov018
Node iov044
TTP
TTP aes/ebu-6:1
Clicking the ‘Add’ button opens the configuration page of the terminating TTP.
Figure 347. The Add TTP configuration page for ITS. In this example, an
originating TTP on local interface aes/ebu-8:1 is set up.
Configuration of the originating TTP is made from the following web page:
This interface has some parameters to configure; ‘Output action on signal fail’, ‘Suppress
alarms’; ‘Loopback’; ‘Type’ (can only have one value – Standby); ‘Expected Status’ and
‘Active interface’. In some cases the settings are not relevant, but as originating and
terminating interface are configured the same way they are nevertheless presented. The
parameters are presented in the table below.
Active Answers the e.g. The first ITS One of the two ITS services connected to
interface question itsi-1, service to the physical interface.
“What itsi-2 be
interface is associated
passed on to with the
the output physical
interface?”. interface
Only relevant
for standby
protection.
The basic interface settings are defined from the ITS Interfaces Basic Settings. On
the basic settings page for the interface, there are also a number of variables presented.
Figure 356. Configuration page for built-in test generator for MADI.
On this page, you can enable the test generator for MADI or a World clock by choosing it
in the Output Signal drop down menu and ticking the enable box.
The MADI signal is an AES10 signal, with 64 audio channels, sampled at a 48 kHz rate.
The word clock is a 48 kHz, square-wave clock, with an average output voltage of 0 V and
a 1 V peak-to-peak value.
13.8.4 Timing
MADI timing is defined under the tab ITS Interfaces Timing.
Figure 357. Timing definition for an interface. There are two parameters to
define, ‘Operating mode’ and ‘Output reference’.
The parameters ‘Operating mode’ and ‘Output reference’ exist both on the source (input)
and sink (output) interfaces. On the source interface, ‘Operating mode’ must be
configured as ‘Audio transport’. For sink interfaces, the parameters are described in the
table below.
Operating Drop- Audio transport Audio transport Audio transport forwards a MADI
mode down Word clock stream and should be used for an
timing source output interface.
Word clock timing source is used for
timing source input. Selecting this
item in the dropdown list will
disable the Output reference list
and display the Output delay input
field.
Output Drop- node sync, aes/ebu-x:8 The output reference to which the
reference down aes/ebu-x:1 to signal is aligned.
aes/ebu-x:8 The interface has to have a word
(excluding the clock timing source attached if
interface under aes/ebu-x:1 to aes/ebu-x:8 is used.
configuration)
‘node sync’ means that the node
clock is used for synchronization of
the output signal (i.e. through-
timing is used).
Figure 359. Interface configuration parameters. They exist both for source and
sink interfaces, but are irrelevant for source interfaces.
Figure 362. The Add TTP configuration page for ITS. In this example, a
terminating TTP on local interface aes/ebu-5:1 in iov136 is set up.
Clicking on ‘Add’ takes the user to the configuration page of the terminating TTP.
The configurable parameters are defined in the table below. To activate the terminating
TTP, make sure that the administrative status is set to Up,
Local DSTI Integer 0-32767 (215-1) Lowest Unique per service type and node
available
Connection Drop- On/Off Off The terminating TTP can allow for
protection down 1+1 protection. If it does so, two
channels are terminated on the
TTP. One of the channels is
forwarded to the outgoing access
interface, while the other is used as
backup.
Active channel Drop- First/Second First When the channel is 1+1 protected,
when protected down one of the channels (the ‘Active
channel when protected’) is
forwarded to the access interface.
With admin status Up, the
forwarded channel can be changed
manually by altering this
parameter.
Figure 365. The Add TTP configuration page for ITS. In this example, an
originating TTP on local interface aes/ebu-8:1 is set up.
Configuration the originating TTP is made from the web page obtained by clicking on the
Add button.
(Local) DSTI Integer 0-32767 (215-1) Lowest Unique per service type and
available node
Figure 367. Configuration parameters for AES/EBU and the originating TTP.
Set both administrative statuses to up and make sure there is bandwidth available
between the nodes. The channel should now be established.
Once a channel has been set up, it is very simple to set up a protected channel between
the two nodes. All it takes is define a second source TTP to the same destination TTP (i.e.
the destination DSTI). Connection protection to off for both the originating source TTP
and on for the terminating TTP (allows for the receiving TTP to handle two different
streams).
When this is done, both channels should be up and the same information sent two
separate ways through the network. See chapter 13.2.2.3 Type 2 protection – closed
ended for more details.
New destinations can be added while the channel is active. They are specified with
destination DTM node/DSTI and optional source routes. All configuration parameters are
used in the unicast case (Figure 336).
Figure 370. The Add TTP configuration page for ITS. In this example, a
terminating TTP on local interface sdi-6:1 in iov136 is set up.
Clicking on the Add button takes the user to the configuration page of the terminating
TTP.
The configurable parameters are defined in the table below. To activate the terminating
TTP, make sure that the administrative status is set to Up,
Local DSTI Integer 0-32767 (215-1) Lowest Unique per service type and node
available
Connection Drop- On/Off Off The terminating TTP can allow for
protection down 1+1 protection. If it does so, two
channels are terminated on the
TTP. One of the channels is
forwarded to the outgoing access
interface, while the other is used as
backup.
Active channel Drop- First/Second First When the channel is 1+1 protected,
when protected down one of the channels (the ‘Active
channel when protected’) is
forwarded to the access interface.
With admin status Up, the
forwarded channel can be changed
manually by altering this
parameter.
Figure 373. The Add Source TTP configuration page for ITS. In this example, an
originating TTP on local interface sdi-8:1 is set up.
Configuration of the originating TTP is made from the web page obtained by clicking on
the Add button.
(Local) DSTI Integer 0-32767 (215-1) Lowest Unique per service type and
available node
Use source route Drop- Auto, 1st, 2nd, 3rd Auto Override of the defined
down source route order. Auto
means that the source
routes are attempted in
order. 1st means that the
first route is tried first, 2nd
that the second route is
tried first and 3rd that the
third route is tried first.
Figure 375. Configuration parameters for SDI and the originating TTP.
Set both administrative statuses to up and make sure there is bandwidth available
between the nodes. The channel should now be established.
User's Guide Isochronous Transport Service (ITS) 334
New destinations can be added while the channel is active. They are specified with
destination DTM node/DSTI and optional source routes. All configuration parameters are
used in the unicast case (Figure 336).
All that needs to be configured on this page is the terminating type and the local
interface. The selection of Type equal to ‘Terminating’ immediately grays out the Mode
parameter, as it becomes irrelevant. Clicking on the Add button displays the specification
web page of the terminating TTP.
In this example, admin status is set to Up and Connection protection to Off. Default DSTI
is kept at 5, the lowest unused DSTI available. After clicking on Apply or OK, the TTP goes
in operational state dormant, which indicates that it is awaiting action by other node(s).
Proceed with the configuration of the interface by clicking on the link with the interface
name. In our case, the ‘Speed autosensing’ parameter is enabled and grayed out, which it
always is on the sink interface.
The Add button takes the user to the configuration page of the originating TTP. The
interface has to have JPEG encoding enabled (and the parameter is disabled by default),
which is done from the Interface link, if the signal shall be a JPEG2000 compressed video.
Unless JPEG 2000 is enabled on the interface, only uncompressed configurations will
work.
The default setting of the requested capacity is 270 Mbps. The options in the drop-down
menu are the same, no matter if the interface is configured with encoder enabled or
encoder disabled. However, depending on the setting of encoder enabled, some choices
in the drop-down menu are irrelevant but nevertheless available to the user. They are also
selectable and are accepted by the system. The setting SDI uncompressed 270 Mbps is
treated exactly the same way as the setting SDI compressed User defined 270 Mbps.
Figure 385. The setting User defined 270 Mbps is treated exactly the same way
as uncompressed SDI 270 Mbps.
The default settings are that all ANC/VBI data and all audio groups are enabled. A way to
transport the compressed streams with less bandwidth is to reduce the amount of
audio/ANC/VBI data transported, in particular the data that is not used in the stream.
The audio part of the compressed stream is a constant per audio stream. For SD-SDI
streams, the bandwidth requirement is depending on the SD audio mode (20 or 24 bit).
This is described in the table below.
VBI can only be sent over compressed SD-SDI signals. The required bandwidth per line is
a constant, but different for PAL and NTSC because they are of different length.
13.11.4 Multicast
Multicast is configured the same way as unicast on the terminating side. When the
selection of multicast is made, originating and terminating are grayed out in the web
interface. This indicates that the selection now is irrelevant and can no longer be made.
On the originating side, a multicast TTP is setup without destinations. The destinations
are added one at a time. Addition of destinations can also be made on active channels,
making it possible to add new destinations to services already in operation.
Destinations are added from the Destinations tab on the configuration page and the Add
Destinations button on this web page.
Figure 392. Add destinations to a multicast channel. To get to this web page,
click on the Destinations tab in the previous picture.
The interfaces of both source and sink modules must be configured. This is done on the
interfaces. Some parameters are configured on the encoder side and some on the
decoder side. Configuration is made from several different links, which are described in
the following text one by one. The tab VBI is only relevant for SD-SDI signals.
13.11.6.3 Loopback
Default value: ‘None’
Type: Enumerated list
Range: ’None’ does not configure the interface in loopback mode. ‘DTM’ copy the stream
on a sink interface and makes it possible to reuse the stream as a source for another
Nimbra node
Figure 396. DTM loopback mode.
Figure 397. Video configuration on an SDI interface. The page is only available
on the encoding side.
Figure 398. Audio configuration on the encoding side. Audio groups five to eight
are only available for 3G-SDI speeds.
Figure 399. ANC parameter configuration on the encoding side. The web page
makes it possible to transport only some of the ANC services. Default is that
all ANC data is transported.
On the encoding interface, ancillary (ANC) data can be enabled for transport or not. The
parameters are presented in the table below. DID and SDID are Data Identifier and
Secondary Data Identifier respectively.
Note that in order to optimize bandwidth usage, it is important to disable unused audio,
ancillary (ANC) and VBI data. Typically, this information takes up similar amounts of
bandwidth as the video itself.
On decoder interfaces, no Audio, ANC or VBI tabs are included.
Figure 401. Configurable VBI parameters for JPEG 2000 SD-SDI compressed
signals with PAL or NTSC encoding.
On the encoding interface, VBI lines are individually enabled/disabled. The default setting
is that all VBI lines are enabled and thus sent multiplexed with the encoded stream. The
VBI lines are information carrying lines sent after the last line of one frame but before the
first line of the next frame. VBI lines differ between NTSC and PAL. To select all PAL or all
NTSC lines, use the PAL or NTSC button. To select all or no lines, use the All or None
button.
On the statistics page on the encoder interface, various pieces of information are
presented about the stream that passes through the interface.
ANC bit rate Bitrate of the stream of ANC data (excluding radio)
VBI bit rate 0 Bitrate of the VBI stream, which is associated with
the SD-SDI format.
Total current bit Sum of used bit rates in all channels passing
rate through the interface
The properties of an Interface Group will have a Basic tab and a PM tab.On the Basic tab
you can specify a descriptive Purpose or click on the links to the Members. The PM tab is
where Performance Monitoring for the Interface Group is handled. The PM functionality
is described in the next chapter.
Parameter Description
(G.826)
UAS Unavailable Second is a second of unavailable time. Unavailable time
starts after ten consecutive SES and ends after ten non-consecutive SES.
SES Severely Error Second (Subset of ES) is a second of seriously faulty
available time. One second of available time containing 30% EB or at
least one defect. Ten consecutive SES seconds begin UAT state while ten
consecutive non-SES seconds end UAT.
ES Error Second is a second of available time with one or more BBE.
BBE Background Block Error is the number of errored blocks found during one
second of available time that is not part of SES.
SS Slip Second is one second containing one or more Slips, which is
Applicable for trunk modules.
Suspect If this parameter value is yes, all counter values may be erroneous and
should be interpreted with care. Incomplete measurement periods are
set to yes; otherwise it can be expected to be no.
ZS Zero suppression (counter) tells the number of periods with all
performance parameters being zero before the current period.
Figure 408. Performance Monitoring, monitored parameters
In the web interface, Performance Monitoring is found under the Perf. monitor link. The
general configuration settings for all performance measurement points in a node are set
on the Perf. Monitor Configuration web page. The PM information for all interfaces
and Interface Groups are collected and listed in a table on the ITS Perf. Monitor web
page.
Performance Monitoring of a 4K stream will be an aggregate of all the partaking streams
in the Interface Group. The details of the aggregated PM will be dependent on the PM
settings of the individual Interfaces. For an error to be reported in the group, the
individual PM object where the error occurs must have Performance Monitoring activated
for that particular parameter.
The configurable parameters are:
Hitless Video 1+1 Protection is available for Nimbra 600 nodes on the following Access
Modules:
JPEG2000 Video Access Module v2 (NPS0074-6001)
SFP Video Access Module (NPS0054-6001)
Video Access Module v2 (NPS0052-6001)
Nimbra network
Interface A Interface B
Node A Node B
Figure 412. Source stream sent through Nimbra network, using two
independent routes for closed-ended 1+1 hitless/standby protection.
Configuration of 1+1 hitless video streams is a new feature for GX4.12, although it looks
like the earlier closed ended protection case. In the new case, either one of the streams
can be sent to the sink interface (interface B; called standby protection) or both streams
can be used to create the outgoing stream (hitless protection). It is the hitless protection
feature that is new in this release and a configuration example of this case is presented.
One video stream is split at the source interface and sent to two separate source TTPs.
The streams traverse the network along different routes and are terminated in two
separate sink TTPs with a common interface. Configuration of closed ended 1+1 hitless
protection starts on the sink side, in our case interface asi-6:1in node iov136.
In the table, parameters and their possible values are detailed. Non-configurable variables
are also listed.
Parameter/Variable Description
Member interfaces Member interfaces are zero, one or two sink TTPs associated
with the sink interface. A TTP appears as a member interface
when the sink interface is configured as the interface to the sink
TTP.
Type Type of protection on the interface. All available types are
presented automatically. Currently, ‘Hitless’ or ‘Standby’ are
supported. Hitless means that both streams are used to
generate the outgoing video stream. Standby means that one of
the streams is used as the outgoing stream and the other stream
is a monitored redundant stream.
Status Current state in the Hitless/standby state machine. There are
five states altogether (in order low to high): Unavailable,
Unprotected, Standby protected, Hitless capable and Hitless
protected
Expected status If ‘status’ is “lower” than ‘expected status’ in the Hitless/standby
state machine, a major alarm with text ‘Protection status lower
than expected’ is generated.
Active interface Answers the question “What interface is passed on to the output
interface?” Only relevant for standby protection.
Differential delay Time difference between the streams on the member interfaces,
as measured by the sequence numbers added at the source
interface.
Figure 417. Addition of the second sink TTP in the destination node.
An enabled test generator is active both on the TX and RX side of the port, i.e. the signal
can be used as an input signal to another port via a BNC cable or it can be set up as a
source TTP and distributed in the network as a unicast or multicast ITS channel. In fact, it
can be used in both fashions simultaneously.
In order to access all these test generators, go to the link ITS Interfaces Test
Generator.
13.14.1 AES
Under the Interface link to the specific AES interface, a Test generator link is available.
The configurable parameters of the AES test generator are shown in the table below:
Sample Drop- 48.0 kHz 32.0 kHz Sample rate for the (non-configurable) 1 kHz
rate down 44.1 kHz test tone.
48.0 kHz
88.2 kHz
96.0 kHz
176.4 kHz
192.0 kHz
13.14.2 MADI
The MADI test generator can be set to either MADI signal or Word clock signal.
There is only one parameter to configure and that is to enable or disable the test
generator itself.
If set to MADI, the test generator generates valid MADI frames and can be aligned to the
output reference. The test generator operates at the nominal sampling rate ± 175 ppm.
The Word clock Output signal is for when the MADI board is used as a MADI generator for
external equipment.
13.14.3 ASI
Under the Interface link to the specific ASI interface, a Test generator link is available.
This link is available on the 8 x Video Access Module v2, 8 x ASI/EBU Video Access module
and JPEG2000 Video Access Modules v2.
Pattern Drop inc The test pattern sent from the output port.
down inc ‘inc’ means that the null-packet traffic stream is
stuffed with bits in an incrementing pattern –
0x01, 0x02, …, 0xff. Then the pattern repeats
itself.
all0 ‘all0’ means that generated null-packet
transport stream consists of only zero bits
‘all1’ means that the stream consists of only
all1 binary ones
Speed Real 5.000 0.8-212 This is the transport stream bit rate (in Mbps).
Mbps
Forward Binary Disabled Enabled The interface is enabled, which means that 16
Error FEC bytes are added to all packets (204 bytes
Correction instead of 188 bytes)
(FEC) Disabled The interface is disabled, i.e. no FEC is added
Multi Binary Disabled Enabled MFN is enabled, i.e. all sync bytes are set to
Frequency 0x47
Network Disabled SFN is enabled, i.e. every eighth sync byte is
(MFN) set to 0xb8. All other sync bytes are set to 0x47.
13.14.4 SDI
Under the Interface link to the specific SDI interface, a Test generator link is available.
The configurable test generator parameters are described in the table below:
On our current JPEG decoder modules, only ports one to four support JPEG2000
decoding and those are the only ports with automatic frame alignment implemented.
Ports five to eight can be used as reference source. On our current Video Access Module
v2, all eight ports can have frame alignment activated.
Figure 431. Digital sync reference can be input on any port, analog blackburst
can only be input on port 8.
Note: The E0D0 and E0D4 Video Access Applications both support
Frame Synchronsation. It is supported for both encrypted and
unencrypted streams.
The E4D0 Video Access Application doesn’t support Frame
Synchronization.
Figure 434. Timing configuration on a JPEG 2000 Decoder SDI interface (five to
eight). Note that if an interface is to be used as a timing source, it has to be
configured as a digital timing source first. On port eight, an analog timing
source can also be attached and configured as such (not shown).
Figure 435. The “Output action on signal fail” must be set to “Freeze” for Frame
Synchronization to be enabled.
Note: This option is for advanced use only. Used inappropriately, the
option may cause multiple problems. It is strongly suggested
that the user should understand the feature properly before
employing it.
With Link Class Persistent, the node will not tear down channels if the neighboring node
stops responding. Instead, it will classify the link as NoControl and leave all existing
channels in place, but deny any new channels from being established via the interface to
the peering node that has stopped responding. Furthermore, if a node has one or more
links configured as Persistent, the node will by default enter a NoControl mode if the
node-controller restarts. In the NoControl mode, the node will not run the normal DTM
protocol stack and instead leave the hardware configured as-is. This means that all
existing channels will continue to forward data, but it will not be possible to supervise the
links and channels or setup any new channels.
If an interface is configured with Link Class Persistent and the node receives an indication
that the link on that interface has failed completely (e.g. a Signal Failure condition), it will
tear down all channels over that link.
Persistent links are useful to protect end-nodes that are single points of failure for a
service. An interface configured with link-class Persistent will never have status
DownKeep, it will go to status Down instead.
Note: This option is for advanced use only. Used inappropriately, the
option may cause multiple problems. It is strongly suggested
that the user should understand the feature properly before
employing it.
With Link Class Nailed, the node will never tear down channels unless the operator sets
the administrative status of the interface to down or if the channel is removed via the
management interface. This means that the node will leave channels in place even if it
knows that the channels cannot forward any data since there is a loss-of-signal situation
on the interface.
If the neighboring node stops responding or if the link to or from the neighboring node
fails, the node will leave all existing channels in place, but deny any new channels from
being established via the interface to the peering node. Furthermore, if a node has one or
more links configured as Nailed, the node will by default enter a NoControl mode if the
node-controller restarts. In the NoControl mode, the node will not run the normal DTM
protocol stack and instead leave the hardware configured as-is. This means that all
existing channels will continue to forward data, but it will not be possible to supervise the
links and channels or setup any new channels.
Nailed links are useful since they allow links that break in one direction to continue
forwarding data in the other direction. They also allow faster recovery after the link has
been restored again, since all channels are already established.
Figure 436. Possible alarms or defects on a SONET/SDH trunk. All alarms except
RDI-L/RDI-P take down the trunk and cause a rerouting of all channels using
that trunk.
14.3.7 DLE
DLE will automatically tear down and reestablish channels to maintain functionality as
long as there is an available path for control signaling. It is however very important to
have two redundant DLE servers for each DLE segment, since it may happen that a DLE
server is unable to reestablish a channel to a DLE client that has been affected by an error.
This will be resolved automatically when the DLE client decides to move to the other DLE
server since the first one is non-functional.
However, there are some situations when channels between DLE clients cannot be
reestablished automatically. The symptoms of this is that there does not seem to be
anything wrong with the node judging from the DTM Links page on its neighbors, but it is
impossible to reach the node via DLE from some node(s). The easiest way to fix this
situation is to force the DLE server that the failing node is attached to re-establish the
channel to all the DLE clients. This is done from the page for the In-band server (Control
network In-band servers, click on the relevant server id, e.g. dles0). On that page,
click on the connection id of the only entry under the heading “Originating client
connections” and then click Re-connect channel on the resulting page. This forces the
DLE server to re-establish the channel to all DLE clients.
Figure 440. List of channels to, from and via the node
Selecting All connections, Statistics provides data statistics of all connections since the
last reset. Furthermore, on the data statistics page information about errors (error
statistics) is also retrievable
First, we need to define the source routes in iov072. We force the connections to use the
desired paths through the network with two different source-routes. Both of these
source-routes are “strict”, since we specify all nodes on the path from the source to the
destination. The interfaces that we are using in the example are optional.
To define the source routes, follow the link All connections Source routes in web
interface of node 1.
Each source-route is specified as a list of all the nodes that the source-route passes
through. Each node is written on a separate line and it can be represented either by its
node name (if it has been configured in the hostname list under DTM Hostnames) or
by its DTM address directly.
Finally, we define a loose source route without any nodes. This is needed later if we want
to combine source routes and DRP.
Figure 447. Definition of a loose source route without intermediate nodes. This
definition is needed if we want to use DRP as a last resort.
It is also possible to view, edit and delete specific source routes from the link All
connections Source routes. Click on the Id number of the specific link, do the needed
changes and click on ‘Ok, Applyor ’Delete’ as appropriate.
Nimbra node
Figure 450. Schematic illustration of line loopback.
To configure the interface in line loopback mode, set the value of the parameter
Loopback to Line from the drop-down menu and click on Applyor OK. The signal
reaching the Rx port on the interface should now be directly returned to the Tx port, in
addition to being sent along the regular path of an incoming signal.
In addition to the Loopback parameter, there are two more parameters to configure.
Suppress alarms can be set to suppress alarms, either ‘none’ (default), ‘all’ or ‘warning’.
‘All’ suppresses all alarms on the interface and warning suppresses all alarms with severity
warning. The last parameter is ‘Output action on signal fail’ has values ‘None’ and ‘Mute’.
If set to ‘Mute’, the failed signal muted (i.e. shut down) on the output access interface.
Muting may speed up fail-over switching time when using external fail-over switches. If
set to ‘None’, different actions are taken depending on service type.
Table for ‘output action on signal fail’ is shown below:
Type of service Action
PDH AIS sent on the output access interface if the channel is up and there is
an error. ‘Mute’ action otherwise.
SDH AIS sent on the output access interface if the channel is up and there is
an error. ‘Mute’ action otherwise.
ASI IDLE packets are sent on the output access interface if the channel is
up and there is an error. ‘Mute’ action otherwise.
AES/EBU, ‘Mute’ action, possibly involving some extra noise from short cables, if
MADI the channel is up and there is an error. ‘Mute’ action otherwise.
SDI, Native ‘Mute’ action, possibly involving some extra noise from short cables, if
the channel is up and there is an error. ‘Mute’ action otherwise.
SDI, JPEG Repeat of last frame or black picture (in case no frame has been
compressed received) if the channel is up. If the channel is down, a black picture is
generated.
Figure 452. Actions taken on the output access interface for the parameter
‘Output action on signal fail’ having value ‘None’.
Nimbra node
Figure 453. DTM loopback mode. The signal is copied to the Rx port on the
same interface before being sent out on the Tx port.
17.2.1 Loopback from the line side in 8 x ASI Transport Module for
Nimbra One/300
In 8 x ASI Transport Module, the monitoring port (the ninth port) can be used for
loopback. In this case, the monitor port copies the incoming signal on a port and sends
the copy back towards the line.
The loopback is set up by creating an ITS from one node to another. In our case, it is made
between iov101 and iov102. The signal is sent from iov102 to iov101, where the signal
received on asi-1:1 is sent to the monitor interface (i.e. returned to the line side).
The monitor port on the module in iov101 is set to listen to this local interface (asi-1:1),
which is used as an Rx port. To configure the monitor port, select Interfaces from the ITS
link after the ITS unicast service is set up between iov102 and iov101. The ITS unicast is
configured as a regular ITS unicast. If in doubt, see the specific description of ITS
configuration.
Select interface asi-8:1 to be monitored and connect the return cable to the external ASI
player. The ASI signal now enters the module on interface asi-1:1 and leaves the module
on the monitor interface. The line loopback is complete.
The front panel selection button makes it possible to disable the output directly from the
hardware or to toggle the interface monitored (Each press on the button moves the
selected monitor interface in the cyclic sequence disabled asi-x:1 asi-x:2 asi-
x:3 asi-x:4 asi-x:5 asi-x:6 asi-x:7 asi-x:8 disabled).
17.2.2 Loopback from the line side in Video Access Modules for
Nimbra 600
In one of the multiple Video Access Modules compatible with GX4.11, one of the
interfaces can be used as a monitor port and configured in the same manner as the 8 x ASI
Transport Module for Nimbra One/300 described in the previous section. If configured in
this way, the physical port will be busy in this configuration and one less interface is
available for active signals.
First, an ITS unicast is defined. Another port is selected as monitor port from the ITS
Interface link. The original port is selected as ‘Interface to monitor’. The direction of the
original signal also has to be configured, but the Enable front-panel selection button is
not relevant as the button is lacking.
After configuration, select OK or Applyand the configuration is made.
17.2.3 Loopback from the DTM side in Video Access Modules for
Nimbra 600
In order to configure a module for a DTM type of loopback, the interface already
configured as an end point of the ITS unicast can be used as an originating interface of
another ITS unicast. In this manner, the outgoing signal is both sent out from the
interface towards the line and returned towards the DTM side and the terminating
interface of the second ITS unicast. The principle is illustrated below.
Second ITS un
icast
Nimbra node A
Nimbra node B
Figure 457. Loopback from the DTM side in 8 x Video Access Module for Nimbra
680.
To configure the output interface for usage as source for another channel, Loopback must
be configured as DTM. The second ITS service is configured as a regular ITS service, with
source TTP tied to the interface set to DTM loopback mode.
Figure 458. In order to set up the output interface to also be used as an input
interface (associated with another source TTP), Loopback must be set to
‘DTM’.
User's Guide Loopback 403
Another state variable, nodeStatus, is tied to the node, not individual modules. Normally,
it has value Up. In case persistent channels are set up and the Node Controller reboots for
some reason, the persistent channels are kept and the nodeStatus variable takes the
value NoControl. No traffic interruption is seen on these persistent channels during the
reboot, but the Node Controller lacks proper control of node hardware afterwards. In
order to complete the reset, nodeStatus has to be set to Up by the user. At this point,
traffic disturbance follows on the persistent channels.
User's Guide Redundancy for Nimbra 600 404
The node should be configured from the serial port of the active Node Controller. The
active Node Controller is identified from its green Redundancy LED, whereas the
Redundancy LED of a standby Node Controller is amber. Once the initial IP configuration
has been made, it is suggested that an Ethernet switch be introduced before the two
Node Controllers. In this way, the user sees the node as one entity with one IP address
irrespective of which Node Controller is active.
It should be observed that the Node IP address is associated with different hardware
(different MAC addresses) depending on which Node Controller is active.
In the web based user interface, it looks like the user manages the node and not the node
controllers. The user needs not be concerned about which Node Controller is active, only
to manage the Node. The Node Controllers manage the node collectively.
c:\Users\dummy\Repos\GX5.1.0.2>dir
Volume in drive C is Win7Pro
Volume Serial Number is CCB0-0888
Directory of c:\Users\dummy\Repos\GX5.1.0.2
Figure 461. Status equipment page, with administrative status of all present
interface slots set to up, except slot IF8.
After the administrative status of the slot/module has been set to down, the new module
may be inserted in the slot. While the administrative status is still down, alignment of the
system release software of the node and the module is made.
To check if the new module already is aligned with the rest of the node, click on the link
Maintenance Software. If the system alignment status parameter has value ‘full’, no
alignment is needed. In this case, all that remain is to change the value of the
administrative status parameter to Up on the new interface. If this is not the case,
alignment is needed.
Figure 464. A node with other system alignment status than ‘full’ needs
realignment between the new module and the node. This process is described
below.
In order to align node and module system releases, the repository of the node system
release software is stored on an http or ftp server. Follow the link Maintenance
Software and click on the Install image button. The page below appears on the screen.
Type the URL to the http or ftp server. The syntax below gives two examples, one for http
and one for an ftp server.
Clicking on the Install button starts the alignment process to the repository system
release software version, i.e. the installation of the system release software to the entire
node including the parts with administrative status down. After a brief interruption, a
progress report is generated.
In GX4.1.2 and all later system releases, software and embedded software modules (i.e.
application packages) are delivered in a release “repository” file. This file is a compressed
file with a directory and an internal file structure. The file is intended to be unpacked on a
file server. The unpacked repository, which is what we in this text refer to as repository, is
a flat file structure with a directory that carries the name of the repository. All files
belonging to the repository are located directly under the (repository) directory.
The node has to be able to reach the file server with http or ftp in order to be upgraded.
For a configuration file with unknown version number, the easiest way to find out is to
open the file in e.g. WordPad. The version number is displayed at the very top of the file.
20.2.2 Repository
A repository is a file structure, with one directory and all files belonging to the repository
located directly in this directory. The tarred and compressed file of this structure is
sometimes also called a repository. From Net Insight support portal it is possible to
download software for different releases. In addition to the compressed repository,
compressed MIB files for the release are included in the package. The release repository
file for release GX4.10.0.2 is called “GX4.10.0.2.tgz” and analogously for other system
releases.
<target-dir>/GX4.10.0.2/
On a Windows server, if the tar/gzip commands are not available, the file can be
unpacked with a file decompression utility like 7-zip or Winrar. Note that WinZip does
not decompress all files correctly! For that reason it cannot be used.
The unpacked repository contains all the files that constitute the new GX release. To
check the integrity of the repository directory, go to the directory and run (Linux):
# md5sum -c md5sums
If all files are printed with an OK after the file name, the repository is correctly set-up and
ready to be used. If the checksum is not correct, the file transfer has not been successful.
In that case, don’t use the files and call Net Insight support.
Below all files belonging to repository ~/repos/GX4.10.0.2/GX4.10.0.2 are shown.
rippo:~/repos/GX4.10.0.2/GX4.10.0.2> ls –la
total 96952
drwxr-xr-x 2 gunlar users 4096 2012-08-28 11:08 ./
drwxr-xr-x 3 gunlar users 4096 2012-09-28 10:02 ../
-r--r--r-- 1 gunlar users 67317 2012-08-28 10:59 AP_install
-r--r--r-- 1 gunlar users 5412 2012-08-28 11:06 fingerprints
-r--r--r-- 1 gunlar users 3122 2012-08-28 11:08 md5sums
-r--r--r-- 1 gunlar users 511152 2012-08-27 08:18 NPM0006-0155_B3.flow
-r--r--r-- 1 gunlar users 7864588 2012-08-28 11:02 NPM0013-N101_R3.flow
-r--r--r-- 1 gunlar users 8034048 2012-08-28 11:02 NPM0013-N301_R3.flow
-r--r--r-- 1 gunlar users 76300 2012-04-13 08:50 NPM0014-N101_A10.flow
-r--r--r-- 1 gunlar users 73904 2012-04-13 08:50 NPM0014-N301_A8.flow
-r--r--r-- 1 gunlar users 73904 2012-04-13 08:50 NPM0014-N361_A3.flow
-r--r--r-- 1 gunlar users 303060 2012-08-27 08:18 NSF0010-0141_B9.flow
-r--r--r-- 1 gunlar users 325844 2012-08-27 08:18 NSF0010-0441_B9.flow
-r--r--r-- 1 gunlar users 314260 2012-08-27 08:18 NSF0010-1621_B9.flow
-r--r--r-- 1 gunlar users 511152 2012-08-27 08:18 NSF0011-0001_A36.flow
-r--r--r-- 1 gunlar users 511152 2012-08-27 08:18 NSF0012-0001_B8.flow
-r--r--r-- 1 gunlar users 1027760 2012-08-27 08:18 NSF0013-0001_C6.flow
-r--r--r-- 1 gunlar users 1027760 2012-08-27 08:18 NSF0013-0141_C6.flow
-r--r--r-- 1 gunlar users 1027760 2012-08-27 08:18 NSF0013-0421_C6.flow
-r--r--r-- 1 gunlar users 580016 2012-08-27 08:18 NSF0014-0001_B2.flow
-r--r--r-- 1 gunlar users 580016 2012-08-27 08:18 NSF0014-A001_A8.flow
-r--r--r-- 1 gunlar users 387044 2012-08-27 08:18 NSF0019-0340_A35.flow
-r--r--r-- 1 gunlar users 356484 2012-08-27 08:18 NSF0019-HD01_A28.flow
-r--r--r-- 1 gunlar users 1844580 2012-08-27 08:18 NSF0020-0001_A23.flow
-r--r--r-- 1 gunlar users 1896780 2012-08-27 08:18 NSF0020-AEB1_A20.flow
-r--r--r-- 1 gunlar users 2149868 2012-08-27 08:18 NSF0020-SD01_A12.flow
-r--r--r-- 1 gunlar users 393764 2012-08-27 08:18 NSF0021-0360_E4.flow
-r--r--r-- 1 gunlar users 519028 2012-08-27 08:18 NSF0032-0380_A23.flow
-r--r--r-- 1 gunlar users 88292 2008-02-20 08:28 NSS0004-
0001_1.2.2.flash
User's Guide Up- and Downgrading 418
In case an ftp server is used instead of an http server, replace http with ftp and proceed
the same way. The structure is of the commands are:
Figure 475. Installation from ftp server 10.100.1.144 with user luser and
password neti.
The web page checks the new release and compares it with installed hardware. All
relevant software and firmware images are retrieved from the repository and installed at
appropriate locations in the node.
After the message ‘Installation completed successfully’, proceed with clicking on the OK
button. This takes you to the Maintenance Software web page. To start the node with
the new software, click on the Bring Installed Image Into Service button.
Note that the startup of new software is most likely service disrupting.
The described procedure can just as easily be used for downgrades as for upgrades. The
only thing determining what release is installed in the node is the repository, which
defines the system release software version.
It is recommended that caution is used in downgrading GX software as testing is limited
and will continue to be so. If needed to downgrade, contact Net Insight for the availability
of repositories for older releases, or look directly in the Net Insight support portal.
It is crucial that downgrade is made on a configuration file with proper version number
(i.e. the same as expected by the software) discussed earlier (Figure 470. System release
software and configuration version numbers).
GX4.8.0.4 GX4.7.0.5
GX4.9.0.2
GX4.10.0.3 GX4.9.0.2
GX4.13.0.0
GX5.0 GX4.13.0.1
GX5.3
GX4.4.0.7 - GX4.5.0.2 No intermediate system releases
GX4.7.0.5 GX4.6.0.3 required
GX4.7.0.5
Figure 476. Table for required intermediate system releases for upgrading.
An upgrade must go through all intermediate releases, stated in the rightmost column.
For example, upgrading from GX4.2.0.6 (between GX4.2.0.4 and GX4.2.0.7) to GX5.3.0.0
must go through GX4.3.0.4, GX4.4.0.7, GX4.7.0.5, GX4.9.0.2 and GX4.13.0.1.
For upgrades from versions prior to GX4.1.2 (Nimbra 600 series), this procedure may not
work. In case you have such needs, please contact Net Insight.
Replacement of firmware is most easily done directly from the web interface.
The functionality (supported trunk rate) for the fixed trunks of a Nimbra 310/320/360/380
is easiest changed from the web interface.
Note that if time transfer is added on an IP Trunk, available in GX4.12, only one of the two
time transfer interfaces are available.
To change firmware from the web interface and use different trunk rates, follow the link
Maintenance Software and configure. On this page, click on the Install On-board
Image button.
A new web page appears; Maintenance Software Install. Here a repository with
the required files is needed; it is possible to install trunk firmware OC-3/STM-1, OC-
12/STM-4, OC-48/STM-16 or IP-Trunk firmware. Installation of IP-trunk firmware requires
version B of Nimbra 360 or Nimbra 310/320/380.
Select the required firmware and click on install. To later activate the new firmware, save
the configuration and go back to Maintenance Software. This step is needed as the
change of firmware automatically is a change of the configuration. Clicking on ‘Bring
installed image into service’ makes the new firmware with new rates active. Before the
node is restarted, a warning pop-up shows up.
Observe that in all cases when the firmware has been replaced, the old DTM interfaces
remain with operational status absent. If the user doesn’t intend to go back to previous
interface rates, these interfaces can (and it is recommended that they) be deleted.
A new web page appears; Maintenance Software Install image. In front of the URL
to the repository, some options are needed.
To activate the change, it is necessary to toggle the administrative status of the module,
i.e. to set it first to down and then back to up. This is most easily done from web page
Status Equipment.
Observe that in all cases when the firmware has been replaced, the old DTM interfaces
remain with operational status absent. If the user doesn’t intend to go back to previous
interface rates, these interfaces can (and it is recommended that they) be deleted.
The 4 x DS3/E3 trunk/access module for Nimbra 300 can be set to operate either in trunk
or in access configuration. The hardware is common; the difference in the two cases is the
firmware placed on the module. It is fairly easy to reconfigure the module and change
trunk mode operation to the access mode operation and vice verse. Firmware for trunk
mode is called NSF0014-0001 and firmware for access mode is NSF0014-A001.
To install the access mode firmware on a module configured as a trunk module, go to the
web page for Maintenance Software. As described with earlier firmware upgrades, a
configuration should be saved before the upgrade.
To change a module in trunk mode to operate in access mode, fill out the field with
-d <slot#> --replace NSF0014-0001,NSF0014-A001 http://<IP>:<Port>/<repos>
To do the reverse:
-d <slot #> --replace NSF0014-A001,NSF0014-0001 http://<IP>:<Port>/<repos>
Of course, both actions can be made from an ftp server rather than an http server.
Multiple targets can be included with a comma separated list.
When the download is finished, save the configuration once more and use the Bring
Installed Image Into Service button. These actions are detailed previously.
An Access mode feature license is needed to enable/use a 4 x DS3/E3 Trunk/Access
Module with access functionality if it has been purchased for trunk use, and that a Trunk
mode feature license is needed to enable/use a 4 x DS3/E3 Access/Trunk Module with
trunk functionality if it has been purchased for access use.
User's Guide Up- and Downgrading 429
From GX4.12 and later releases, there is one version of JPEG 2000 Video Access Module
v2 for Nimbra 600. The module can run different firmware, giving it different properties
like encoding, decoding and neutral, i.e without compression. The module is delivered
with neutral firmware, which support uncompressed video streams. If used for JPEG
encoding, a JPEG encoding firmware must be used; if used for decoding, a JPEG decoding
firmware must be used. The available firmware modules are presented in the table below.
The module is inserted in a slot in the Nimbra 600 node. The slots are numbered between
IF1 and IF8 for Nimbra 680 and IF1 and IF16 for Nimbra 688. Slots for NCs are numbered
NCA and NCB, whereas slots for switch modules are numbered SWA and SWB.
The default firmware, i.e. the firmware that is delivered on the module, is the neutral
firmware (NSX0040-E0D0). To change from the neutral firmware to either the encoding
or the decoding firmware from the web GUI, go to the Maintenance Software web
page.
The structure of the string to enter in the field for new software is
-d <i/f#> --replace <Old FW>,<New FW> http://<IP>:<Port>/<Repos>
Of course, both actions can be made from an ftp server rather than an http server.
Multiple targets can be included with a comma separated list.
In order to put JPEG encoding firmware on the module with default (E0D0) firmware from
a repository residing on an http-server (192.168.234.99/repos), using port 9090, follow
the example below.
-d if4 --replace NSX0040-E0D0,NSX0040-E4D0 http:// 192.168.234.99:9090/repos
Other changes of firmware are made analogously. Note the absence of spaces between
the two NSF product numbers. In this case, the IF must be included before the slot
number.
-d if3 --replace NSX0040-E0D0,NSX0040-E4D0 http://192.168.234.99:9090/repos
Changing from encoding to decoding JPEG firmware can be done directly in a similar way.
Here it is illustrated from the http-server.
-d if3 --replace NSX0040-E4D0,NSX0040-E0D4 http://192.168.234.99:9090/repos
By extension, changing from JPEG decoder to JPEG encoder the URL field becomes:
-d if3 --replace NSX0040-E0D4,NSX0040-E4D0 http://192.168.234.99:9090/repos
Note that it is important that the command is written on one line and that no space in
inserted before or after the comma between the firmware versions. Of course, the actions
can be made from an ftp server rather than an http server. Multiple targets can be
included with a comma separated list.
Figure 488. Toggling the administrative status, i.e. setting it first to Down and
then to Up is a simple way to restart a module and run the new firmware.
8 x ASI/AES Access Module for Nimbra 600 can run on different firmware, giving it
different properties. The module is delivered with AES firmware by default, supporting up
to eight AES audio streams. In addition, there is an ASI version (supports 8 x ASI video
streams) and a MADI version (supporting a MADI multiplexed audio stream).
The available firmware modules are presented in the table below.
The module is inserted in a slot in the Nimbra 600 node. The slots are numbered between
IF1 and IF8 for Nimbra 680 and IF1 and IF16 for Nimbra 688.
The default firmware on the module is the AES firmware. To change from the AES
firmware to either ASI or MADI firmware from the web GUI, go to the web page
Maintenance Software and click the Install Image button.
In the field for new software image, write a string to specify what modules should be
affected by the change, what firmware should be removed, what firmware should be
installed and from what repository this should be done.
In order to put MADI firmware on the module from a repository residing on an ftp server
(iov136/repos) and using port 2222, add options defined below.
-d if6 --replace NSX0033-E001,NSX0033-M001 ftp://user:pass@iov136:2222/repo
Changing from ASI to MADI firmware is done in a similar way. Here it is illustrated from
the http-server.
-d if6 --replace NSX0033-A001,NSX0033-M001 http://192.168.234.99:9090/repos
Of course, the actions can be made from an ftp server rather than an http server. Multiple
targets can be included with a comma separated list (i.e. –d if2,if4,if6).
Firmware Description
NSX0022-0001 8 x Gigabit Ethernet Access Application
NSX0022-ET11 8 x GE Access, S/H 1+1 Option
Figure 491. Different firmware possible to load on an 8 x Gigabit Ethernet
Access Module.
In order to load ETS 1+1 firmware on a Gigabit Ethernet Access Module for Nimbra 600
nodes, it is simple to use the web GUI. Go to the Maintenance Software web page and
click on the Install Image button.
The firmware to be replaced is NSX0022-0001 and the replacement firmware with ETS
1+1 functionality is NSX0022-ET11. Specifically, if the module is installed in slot number
one, the extended URL becomes (with the same http server, port and repository as in
previous chapter):
-d if1 --replace NSX0022-0001,NSX0022-ET11
http://192.168.234.99:9090/repos
For the reverse process, replacing 1+1 firmware with regular ETS firmware, the order of
the arguments are swapped, i.e:
-d if1 --replace NSX0022-ET11,NSX0022-0001
http://192.168.234.99:9090/repos
Of course, the actions can be made from an ftp server rather than an http server. Multiple
targets can be included with a comma separated list.
It is important that the command is written on one line and that no space in inserted
before or after the comma between the firmware versions.
20.3.7.1 License
Note that in order to use ETS 1+1, one or more additional feature licenses must be
purchased, irrespective of the need for firmware swap on the module.
Firmware Description
NSX0037-0001 2 x 10 Gb/s IP/Ethernet trunk application
NSX0037-A002 2 x 10 G Ethernet Access S/H 1+1 Option
Figure 493. Different firmware possible to load on a 10 GE Module
20.3.8.1 License
Note that in order to use Ethernet Access firmware, an additional feature license must be
purchased, irrespective of the need for firmware swap on the module.
21.2.1.1 Preamble
The licenses for most software are designed to take away your freedom to share and
change it. By contrast, the GNU General Public License is intended to guarantee your
freedom to share and change free software--to make sure the software is free for all its
users. This General Public License applies to most of the Free Software Foundation's
software and to any other program whose authors commit to using it. (Some other Free
Software Foundation software is covered by the GNU Lesser General Public License
instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General
Public Licenses are designed to make sure that you have the freedom to distribute copies
of free software (and charge for this service if you wish), that you receive source code or
can get it if you want it, that you can change the software or use pieces of it in new free
programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these
rights or to ask you to surrender the rights. These restrictions translate to certain
responsibilities for you if you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you
must give the recipients all the rights that you have. You must make sure that they, too,
receive or can get the source code. And you must show them these terms so they know
their rights.
21.3.2 netkit
This package was split from netstd by Herbert Xu herbert@debian.org on Mon, 28 Sep
1998 16:50:43 +1000.
netstd was created by Peter Tobias tobias@et-inf.fho-emden.de on Wed, 20 Jul 1994
17:23:21 +0200.
It was downloaded from ftp://ftp.uk.linux.org/pub/linux/Networking/netkit/.
The license can be found at /usr/share/common-licenses/BSD on the nodes. The full text is
Copyright:
Copyright © 1988, 1993 The Regents of the University of California.
Copyright © 1995 David A. Holland
Copyright © 1994 Peter Tobias (issue.net(5))
Copyright © 1983, 1995 Eric P. Allman (setproctitle.[ch])
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to
endorse or promote products derived from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
21.3.3 ntp
Copyright (c) David L. Mills 1992-2003
21.3.4 uip
Copyright © 2006, Swedish Institute of Computer Science.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
3. Neither the name of the Institute nor the names of its contributors may be used to
endorse or promote products derived from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
21.3.5 zlib
Copyright © 1995-2005 Jean-loup Gailly and Mark Adler
This software is provided 'as-is', without any express or implied warranty. In no event will
the authors be held liable for any damages arising from the use of this software.
Permission is granted to anyone to use this software for any purpose, including
commercial applications, and to alter it and redistribute it freely, subject to the following
restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you
wrote the original software. If you use this software in a product, an acknowledgment in
the product documentation would be appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be
misrepresented as being the original software.