R11.0 Infinera GNM Overview Guide
R11.0 Infinera GNM Overview Guide
R11.0 Infinera GNM Overview Guide
Release 11.0
Version 001
V001
Document ID 1900-001369
Infinera Corporation
140 Caspian Court
Sunnyvale, CA 94089
www.infinera.com
+ 1-408-572-5200
- Please refer to the Infinera Customer Web Portal for the most recent version of this document -
Copyright
© Copyright 2015 Infinera Corporation. All rights reserved.
This Manual is the property of Infinera Corporation and is confidential. No part of this Manual may be reproduced for any purposes or
transmitted in any form to any third party without the express written consent of Infinera.
Infinera makes no warranties or representations, expressed or implied, of any kind relative to the information or any portion thereof
contained in this Manual or its adaptation or use, and assumes no responsibility or liability of any kind, including, but not limited to,
indirect, special, consequential or incidental damages, (1) for any errors or inaccuracies contained in the information or (2) arising
from the adaptation or use of the information or any portion thereof including any application of software referenced or utilized in the
Manual. The information in this Manual is subject to change without notice.
Trademarks
Infinera, Infinera Intelligent Transport Networks, I-PIC, IQ NOS, FlexILS, DTN-X, DTN, ATN, FastSMP and logos that contain Infinera
are trademarks or registered trademarks of Infinera Corporation in the United States and other countries.
All other trademarks in this Manual are the property of their respective owners.
Infinera DTN-X, DTN, ATN, and Infinera Optical Line Amplifier Regulatory Compliance
FCC Class A
This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) this device may not cause
harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired
operation. Modifying the equipment without Infinera's written authorization may result in the equipment no longer complying with FCC
requirements for Class A digital devices. In that event, your right to use the equipment may be limited by FCC regulations, and you
may be required to correct any interference to radio or television communications at your own expense.
DOC Class A
This digital apparatus does not exceed the Class A limits for radio noise emissions from digital apparatus as set out in the
interference-causing equipment standard titled “Digital Apparatus," ICES-003 of the Department of Communications.
Cet appareil numérique respecte les limites de bruits radioélectriques applicables aux appareils numériques de Classe A prescrites
dans la norme sur le matériel brouilleur: "Appareils Numériques," NMB-003 édictée par le Ministère des Communications.
Class A ITE
This is a Class A product based on the standard of the VCCI Council. If this equipment is used in a domestic environment, radio
interference may occur, in which case, the user may be required to take corrective actions.
この装置は、クラス A 情報技術装置です。この装置を家庭環 境で使用すると電波妨害を引き起こす場合があります。
Warning
This is a class A product. In a domestic environment this product may cause radio interference in which case the user may be
required to take adequate measures.
FDA
This product complies with the DHHS Rules 21CFR 1040.10 and 1040.11, except for deviations pursuant to Laser Notice No. 50,
dated June 24, 2007.
Page iii
Contents
Chapter 1 - Introduction
Infinera GNM Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
New Features and Hardware for Release 11.0. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
Fault Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-14
Configuration Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15
Service Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
DTN Service Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
DTN-X Service Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
FlexILS Service Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-17
Performance Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-18
Security and Access Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-19
Appendix B - Acronyms
List of Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-18
Figure 1-1 Infinera Intelligent Transport Network and Infinera Management Solution . . . . . . . . . . . . . . . . . . 1-2
Figure 3-1 DTN-X Ethernet Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Figure 3-2 FlexROADM -Ethernet Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Figure 3-3 Local Area Connection Properties: Windows 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Figure 3-4 TCP/IP Properties: Windows 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Figure 3-5 Local Area Connection Properties: Windows XP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Figure 3-6 TCP/IP Properties: Windows XP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Figure 3-7 Infinera GNM Login Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
Figure 3-8 Change Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
Figure 3-9 Opening LaunchGnmMgr window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14
Figure 3-10 Choose Helper Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14
Figure 3-11 Java Cache Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
Figure 4-1 SW-DB Upload/Download Manager Window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7
Figure 4-2 SW-DB Manager Window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16
Figure 5-1 GNM Main View for DTN-X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Figure 5-2 GNM Main View for DTN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3
Figure 5-3 GNM Main View for Optical Amplifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4
Figure 5-4 GNM Main View for FlexROADM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5
Figure 5-5 GNM Main View for Optical Line Amplifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-6
Figure 5-6 Expanded Equipment Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9
Figure 5-7 GNM Equipment View for DTN-X . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-11
Figure 5-8 GNM Equipment View for DTN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
Figure 5-9 GNM Equipment View for Optical Amplifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-13
Figure 5-10 GNM Equipment View for FlexROADM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-14
Figure 5-11 GNM Equipment View for Optical Line Amplifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-15
Figure 5-12 Quick View Browser. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-16
This section is an overview of the Infinera GNM Overview Guide. It discusses these topics:
“Objective” on page 11
“Audience” on page 11
“Conventions” on page 14
Objective
This guide describes the Infinera Graphical Node Manager user interface. It also describes the new
features, the hardware and software requirements required to launch the GNM. It also provides procedures
to install and upgrade the software and database on the Infinera network elements.
Audience
The primary audience for this guide includes network operation personnel and administrators responsible
for maintaining network elements and provisioning services using Infinera GNM. This guide assumes that
the reader is familiar with the following topics and products:
Microsoft Windows XP and Microsoft Windows Vista
Web browsers such as Internet Explorer, Mozilla and Netscape Navigator
Internet and networking terminology and concepts
Optical networking
Document Organization
The following table describes each chapter in this guide:
Infinera DTN and DTN-X 1900-001363 Describes procedures for turning up, commissioning and testing
Turn-up and Test Guide the installed Infinera DTN-X, Infinera Line System (ILS), DTN,
and Optical Line Amplifier network elements. Includes the
description of circuit activation and end-end system testing pro-
cedures.
Infinera DTN and DTN-X Site 1900-001364 Describes the procedures for initial installation of the Infinera
Preparation and Hardware DTN-X, ILS, DTN, and Optical Line Amplifier network elements
Installation Guide at any given site. Includes procedures for site preparation and
site testing, system cabling, safety procedures and hand-over to
provisioning activities.
Infinera DTN and DTN-X 1900-001365 Provides the routine task oriented procedures (TOPs) used in
Task Oriented Procedures support of the Infinera DTN-X, ILS, DTN, and Optical Line
Guide Amplifier network elements.
Infinera DTN and DTN-X 1900-001366 Provides the hardware description of the Infinera DTN-X, ILS,
Hardware Description Guide DTN, and Optical Line Amplifier network elements which
includes the description of chassis, common modules and circuit
packs. It provides hardware block diagrams, functional descrip-
tions, mechanical and electrical specifications for each module.
Infinera DTN and DTN-X 1900-001367 Describes the user interface for the Infinera DTN-X, ILS, DTN,
SNMP Agent Reference and Optical Line Amplifier Simple Network Management Proto-
Guide col (SNMP) Agent. It provides detailed instructions to configure
and operate the Infinera SNMP Agent from the Infinera network
element.
Infinera DTN and DTN-X 1900-001368 Provides an overview of the Intelligent Transport Network and its
System Description Guide principal elements, including the Infinera DTN-X, ILS, DTN, and
the Optical Line Amplifier. Includes a description of the Infinera
IQ Network Operating System and an overview of the manage-
ment interfaces for Infinera products.
Infinera GNM Overview 1900-001369 Describes the Infinera Graphical Node Manager user interface.
Guide It also describes the new features, the hardware and software
requirements required to launch the GNM. It also provides pro-
cedures to install and upgrade the software and database on the
Infinera network elements.
Infinera GNM Fault 1900-001370 Describes the Fault Management inventories, Alarm Manager
Management and and Event Log. It also provides the procedures to perform diag-
Diagnostics Guide nostic tests on Infinera network elements. In addition, it
describes the alarms raised by the Infinera network elements
and the corrective procedures to perform to clear the alarms.
Infinera GNM Configuration 1900-001371 Describes the procedures to use the Infinera GNM to configure
Management Guide the Infinera network elements and the network topology. It also
provides a description on the Equipment Manager and Facility
Manager.
Infinera GNM Performance 1900-001372 Describes the procedures to use Infinera GNM to view perfor-
Management Guide mance monitoring (PM) data and modify PM thresholds for the
Infinera DTN-X, ILS, DTN, and Optical Line Amplifier network
elements. It also provides the PM parameters details reported
by the Infinera network elements.
Infinera GNM Security 1900-001373 Describes the procedures to perform security and access man-
Management Guide agement tasks such as creating, deleting and managing user
accounts on the Infinera network elements.
Infinera GNM Service 1900-001374 Describes the procedures to provision cross-connects, subnet-
Provisioning Guide work connections (SNCs) and protected services on Infinera
DTN-X, ILS, DTN, and Optical Line Amplifier network elements.
It includes a description of the various inventory managers dis-
played in the Infinera GNM.
Infinera DTN and DTN-X TL1 1900-001375 Describes the TL1 interface supported by the Infinera DTN-X,
User Guide ILS, DTN, and Optical Line Amplifier network elements. It
includes the description of the supported TL1 commands and
the procedures for the commonly performed OAM&P functions.
Conventions
The table below lists the conventions used in this guide.
bold default font Menu command paths Select Fault Management >
Alarm Manager
Button names Click Apply
User interface labels Click Summary panel
Window/dialog box titles In the Dial-Up Networking window
courier font User-entered text In the Label enter EastBMM
Command output Database restore from
local or remote machine?
Directory path /DNA/GNM
default font, italic Document titles Refer to the Infinera DTN and
DTN-X System Description
Technical Assistance
Customer Support for Infinera products is available, 24 hours a day, 7 days a week (24x7). For information
or assistance with Infinera products, please contact the Infinera Technical Assistance Center (TAC) using
any of the methods listed below:
Email: techsupport@infinera.com
Telephone:
Direct within United States: 1-408-572-5288
Documentation Feedback
Infinera strives to constantly improve the quality of its products and documentation. Please submit
comments or suggestions regarding Infinera Technical Product Documentation using any of the following
methods:
Submit a service request using the Infinera Customer Web Portal
Send email to: techpubs@infinera.com
Send mail to the following address:
Introduction
This chapter provides a high-level introduction to the Infinera Graphical Node Manager and its capabilities
in the following sections:
“Infinera GNM Overview” on page 1-2
Figure 1-1 Infinera Intelligent Transport Network and Infinera Management Solution
The Infinera GNM is a browser-launched Java application. It provides fault management, configuration
management, service provisioning, performance management, and security management (FCPS)
functionality across local and remote network elements. Users launch the Infinera GNM from a computer
(referred to as the GNM Terminal) using an Internet browser (such as Microsoft Internet Explorer, Mozilla or
Netscape Navigator). Infinera GNM also features context-sensitive navigation and Java-based user
interfaces that provide a “native look-and-feel” on Windows and Solaris platforms.
Note: In previous releases, a node with an OTC as the Main Chassis (and an OMM as the node
controller module) was referred to in the documentation as an “Optical Line Amplifier”
node. Note that the management interfaces have always referred to this node type as an
“Optical Amplifier.” In Release 10, the customer documentation is updated to match the ter-
minology of the management interfaces, wherein a node with an OTC Main Chassis is
called an “Optical Amplifier.” Note that the term “Optical Line Amplifier” is re-introduced as
a node with an MTC-9 as the Main Chassis (with an IMM as the node controller module)
and configured with IAMs/IRMs. (Note that a FlexROADM node, a reconfigurable optical
add/drop multiplexer node, is also a node with an MTC-9 as the main chassis, but in this
case the node is configured with FRMs to support optical multiplexing.)
Note: Unless specifically noted otherwise, all references to “line module” will refer interchange-
ably to either the DLM, XLM, ADLM, AXLM, SLM, AXLM-80, ADLM-80 and/or SLM-80
(DTC/MTC only) and AOFM, AOFX, AOLM, AOLM2, AOLX, AOLX2, SOLM, SOLM2,
SOLX, and/or SOLX2 (XTC only). The term “LM-80” is used to specify the LM-80 sub-set
of line modules and refers interchangeably to the AXLM-80, ADLM-80 and/or SLM-80
(DTC/MTC only). Note that the term “line module” does not refer to TEMs, as they do not
have line-side capabilities and are used for tributary extension.
Table 1-1 New and Updated Features for DTN-X, DTN, Optical Amplifier, and FlexILS Nodes
Feature Description
Network Applications
Layer 0 Optical Private Release 11.0 introduces the Layer 0 Optical Private Network (L0 OPN) feature,
Network (OPN) wherein a subscriber’s line module OCG is connected to a provider’s BMM OCG for
cases in which the subscriber does not have access to fiber between required ser-
vice end points.
Open Wave Support In Release 11.0, the FlexILS line modules (AOFM/AOFX/SOFM/SOFX and their
Instant Bandwidth equivalents) support Open Wave configuration, in which two line
modules configured for Open Wave can be connected to each other without
requiring an intermediate amplifier (FRM, in the case of FlexILS line modules). The
two line modules can be connected directly, or with a third party line system between
them.
Table 1-1 New and Updated Features for DTN-X, DTN, Optical Amplifier, and FlexILS Nodes
Feature Description
Inter-node Control Plane In Release 11.0, support for Infinera General Communication Channel (IGCC) is
(IGCC) expanded: The maximum number of TE links using IGCC on a DTN-X node is
increased from 30 to 64.
In addition, Release 11.0 IGCC support is expanded to include inter-node connec-
tions between FlexILS line modules (AOFM/AOFX/SOFM/SOFX and their Instant
Bandwidth equivalents) configured for Open Wave.
Submarine Line Terminal Release 11.0 introduces support for split spectrum mode for SLTE manual optical
Equipment (SLTE) cross-connects on the SOFM/SOFX.
In addition, support for express connections between FRMs in SLTE mode is
expanded to include the following cross connect types:
• Optical channel blocking
• ASE idler optical cross connects
Table 1-1 New and Updated Features for DTN-X, DTN, Optical Amplifier, and FlexILS Nodes
Feature Description
Node Configurations
Multi-chassis Scalability In Release 11.0, the multi-chassis scalability for a DTN-X node has been updated:
• The total number of chassis supported on a DTN-X remains the same at 60. How-
ever, the maximum number of each chassis type is updated:
• The number of XTCs allowed has been increased from 10 XTCs to 14 XTCs.
• The number of DTCs/MTCs allowed has been decreased from 32 DTCs/MTCs
to 30 DTCs/MTCs.
• For OTCs and MTC-9s, Release 11.0 supports a combined total of 16 OTCs/
MTC-9s. (In Release 10.1 a DTN-X could have a maximum of 12 OTCs and a
separate maximum of 6 MTC-9s.)
• The total number of line modules and OTMs supported on a DTN-X has been
increased from 184 to 224:
• The number of OTMs allowed in a node has been increased from 40 to 64.
• The number of XTC line modules (AOLM, AOLX2, SOLM, etc.) allowed in a
node has been increased from 48 to 64.
• Also in Release 11.0, the supported number of fiber directions is increased for cer-
tain DTN-X configurations:
• For DTN-X using ILS links only (BMMs/OAMs/ORMs only), the number of sup-
ported fiber directions is increased from 12 to 16.
• For DTN-X with MTC-9s using both FlexILS and ILS links, the number of sup-
ported fiber directions is increased from 12 to 16:
• The number of ILS links (BMMs/OAMs/ORMs) supported is increased from
8 to 16.
• The number of FlexILS links (IAMs/IRMs) supported is increased from 4 to
9.
In addition, Release 11.0 updates the support for DTN-X node configuration with
XTC line modules only (no DTC/MTC line modules):
• Up to 42 total chassis (increased from 35 total chassis):
• The number of XTCs allowed has been increased from 18 XTCs to 22 XTCs.
• The number of DTCs allowed has been increased from 7 DTCs to 8 DTCs.
• The number of OTCs allowed has been increased from 10 OTCs to 12 OTCs.
• Up to 192 total line modules and OTMs (increased from 160 total chassis):
• The number of OTMs allowed in a node has been increased from 80 to 96.
• The number of XTC line modules (AOLM, AOLX2, SOLM, etc.) allowed in a
node has been increased from 80 to 96.
Network Timing Protocol To support NTP server redundancy, in Release 11.0 node can be configured with up
(NTP) Redundancy to three NTP servers.
Table 1-1 New and Updated Features for DTN-X, DTN, Optical Amplifier, and FlexILS Nodes
Feature Description
OTN Tributary Module Release 11.0 supports full pre-provisioning of the OTM2-500 PON. In previous
(OTM) releases, the OTM2-500 was pre-provisioned as a generic “OTM” and was reported
in the management interfaces for both “Installed Equipment” and “Provisioned
Equipment” as “OTM-500.” In Release 11.0, the OTM2-500 can be pre-provisioned
using the full PON “OTM2-500,” and the “Installed Equipment” and “Provisioned
Equipment” fields will reflect the full PON “OTM2-500. In addition, any OTM2-500
provisioned before Release 11.0 will also reflect the full PON in the “Installed
Equipment” and “Provisioned Equipment” fields.
Tributary Interface Module Release 11.0 introduces the following TIMs for the XTC:
(TIM) • TIM-16-2.5GM
• TIM-1-40GM
In Release 11.0, the management interfaces include support for installed equipment
type and provisioned equipment type for the following TIMs (before Release 11.0,
these TIMs were identified in the management interfaces in the PON field only):
• TIM-5B-10GM
• TIM-1B-100GE
In Release 11.0 the following TIMs support ODU multiplexing:
• TIM-1-100GX
• TIM-5-10GX
NOTE: A TIM-5-10GX shipped in Release 11.0 supports ODU multiplexing by
default. A TIM-5-10GX shipped before Release 11.0 supports ODUk switching by
default. When upgraded to Release 11.0 software, a pre-Release TIM-5-10GX will
continue to support ODUk switching with no effect to traffic. To provision a multiplex-
ing service on a TIM-5-10GX shipped before Release 11.0, the TIM-5-10GX must be
upgraded to the latest firmware. The upgrade requires a cold reboot, which will affect
any traffic on the TIM-5-10GX.
Table 1-1 New and Updated Features for DTN-X, DTN, Optical Amplifier, and FlexILS Nodes
Feature Description
Tributary Optical Module Release 11.0 introduces the following new TOM supported on the TIM-1-40GM of an
(TOM) XTC:
• TOM-40GMR-FR
Also in Release 11.0, the following existing DTC/MTC TOMs are now supported on
the XTC on the TIM-16-2.5GM:
• TOM-2.5G-LR2
• TOM-2.5G-IR2
• TOM-2.5GMR-IR1
• TOM-2.5GMR-SR1
• TOM-MR-Dn-LR2
• TOM-MR-Cn-LR2
• TOM-1G-LX
• TOM-1G-SX
• TOM-1G-ZX
FlexROADM Module Release 11.0 supports the following new capabilities for express connections
(FRM) between FRMs in SLTE mode FRMs:
• Optical channel blocking
• ASE idler optical cross connects
Fiber Multiplexing Panel Release 11.0 adds a new FMP for Open Wave configurations with FlexILS line mod-
(FMP) ules :
• FMP-F250-19-2-LC-LC
Submarine Control Module Release 11.0 supports full pre-provisioning of the SCM-2 PON. In previous releases,
(SCM) the SCM-2 was pre-provisioned as a generic “SCM” and was reported in the man-
agement interfaces for both “Installed Equipment” and “Provisioned Equipment” as
“SCM-1.” In Release 11.0, the SCM-2 can be pre-provisioned using the full PON
“SCM-2,” and the “Installed Equipment” and “Provisioned Equipment” fields will
reflect the full PON “SCM-2.” In addition, any SCM-2 provisioned before Release
11.0 will also reflect the full PON in the “Installed Equipment” and “Provisioned
Equipment” fields.
Table 1-1 New and Updated Features for DTN-X, DTN, Optical Amplifier, and FlexILS Nodes
Feature Description
System Interfaces
Client/Tributary Interfaces Release 11.0 supports the following new client/tributary interfaces on the XTC:
• Supported by TIM-1-40GM:
• OC-768
• STM-256
• Supported by the TIM-16-2.5GM:
• 1GbE
FlexILS Service In Release 11.0, FlexILS service provisioning is expanded to include the following
Provisioning new capabilities for FRMs in SLTE mode:
• Split spectrum mode for manual optical cross-connects in SLTE configuration
In addition, the following existing features are expanded to include express connec-
tions between FRMs in SLTE mode:
• Optical channel blocking
• ASE idler optical cross connects
Dynamically Signaled Release 11.0 expands 1 Port D-SNCP support to include line-side termination points
Subnetwork Connection on the XTC.
(SNC) Provisioning
OTU4 Transparent In Release 11.0 the DTN-X supports virtual concatenation for transparent transport
Transport without FEC without FEC for OTU4 services on the following TIMs:
• TIM-1-100G
• TIM-1-100GM
• TIM-1-100GX, when configured for ODU4-ODL (ODU switching) operating mode
The OTU4 is routed through the network as ten ODU2i; all of the ODU2i must be
routed over the same OCG/SCG, and all ten ODU2i entities must traverse through
the same modulation type (QPSK or BPSK is supported).
ODU Multiplexing In Release 11.0, the DTN-X supports ODU multiplexing, in which the client OTUk
and ODUk overhead is terminated at the ingress, and the ODUj is switched across
the network. The ODUj overhead is switched at every network hop from one inter-
face to the next interface (meaning that the ODUj overhead is accessible at every
hop).
• The TIM-1-100GX supports the following ODU multiplexing options:
• Up to 4xODU2 to ODU4 to OTU4
• Up to 4xODU2e to ODU4 to OTU4
• The TIM-5-10GX supports the following ODU multiplexing options:
• Up to 4xODU1 to ODU2 to OTU2
• Up to 8xODU0 to ODU2 to OTU2
Table 1-1 New and Updated Features for DTN-X, DTN, Optical Amplifier, and FlexILS Nodes
Feature Description
Network Mappings Release 11.0 supports the following new network mapping options for services on
the XTC:
• OC-768 -> ODU3-AMP
• OC-768 -> ODU3-BMP
• STM-256 -> ODU3-AMP
• STM-256 -> ODU3-BMP
• 1GBE -> ODU0-TTT-GMP
• OTU4 -> ODU2i-10v
• GFP -> ODUflexi
Digital Subnetwork Release 11.0 expands 1 Port D-SNCP support to include the following:
Connection Protection • Line-side termination points on the XTC.
(D-SNCP)
• 1GbE services originating on the TIM-16-2.5GM on the XTC.
• ODU multiplexing services on the XTC:
• On the TIM-1-100GX:
• Up to 4xODU2 to ODU4 to OTU4
• Up to 4xODU2e to ODU4 to OTU4
• On the TIM-5-10GX:
• Up to 4xODU1 to ODU2 to OTU2
• Up to 8xODU0 to ODU2 to OTU2
Fast Shared Mesh For services with endpoints on the XTC, the DTN-X supports Fast Shared Mesh
Protection (FastSMP™) Protection (FastSMP™), which allows protection groups to share protection
resources using protection paths that are not required concurrently by the two
protection groups. Infinera’s FastSMP supports protection switching in less than
50ms.
ODUk AIS for ODUk Release 11.0 introduces support for ODUk AIS TDA in DTN for ODUk encapsulated
Encapsulated Clients on clients on the DTC/MTC.
DTC/MTC
Tributary Disable Action Release 11.0 expands the support of the Tributary Disable Action feature: DTN-X
tributaries can be configured to trigger the egress tributary disable action based on
forwarded defects.
Encapsulated Client Release 11.0 includes the following updates for Encapsulated Client Disable Action:
Disable Action • For DTN-X, Encapsulated Client Disable Action is now supported for OC-768,
STM-256, and 1GbE services.
• For DTN, Encapsulated Client Disable Action is now supported for SONET, SDH,
and ODUk services. In addition, the 10GbE support is expanded to include ODU-
AIS and Laser Off options.
Table 1-1 New and Updated Features for DTN-X, DTN, Optical Amplifier, and FlexILS Nodes
Feature Description
Fault Management
Alarm Surveillance Release 11.0 introduces an administrative event to indicate an update to the
Expected Span Loss (ESL) values. In TL1 interface, the condition description for the
event (ESLCHG) includes the updated ESL high and low thresholds, as well as the
previous values for ESL high and low thresholds. In GNM/DNA, the new and previ-
ous values are displayed in the Additional Text field for the event.
In Release 11.0, in order to track equipment removals/replacements, any equipment
alarm/event (e.g., IMPROPRMVL, PLUGOUT, etc.) includes the serial number of the
module on which the condition is reported. In TL1 this is shown in the REPT ALM or
REPT EVT autonomous message. In GNM/DNA, the serial number is shown in the
Additional Text field for the alarm/event. The serial number is shown for both raising
and clearing of alarms/events. Note that the serial number isn’t reported for condi-
tions where the serial number is not yet known (e.g., upon circuit pack plug-in and
circuit pack initialization, etc).
In Release 11.0, GbE clients (1GbE, 10GbE, 40GbE, and 100GbE) on Infinera
nodes support a configurable setting to raise an OOS-AU alarm when the GbE cli-
ent’s operational state is disabled. The setting is configured on a per-client basis; the
default behavior (and the pre-Release 11.0 behavior) is that no alarm is raised when
the operation state is disabled. Without the OOS-AU alarm, the user can see the
operation state by viewing the properties of the GbE client.
Optical Ground Wire Release 11.0 supports the Optical Ground Wire (OPGW) feature, which helps
(OPGW) prevent traffic disruption in case of a lightning strike to an optical ground wire.
NOTE: Do not configure OPGW parameters (Aggressive Tracking and Rapid Recov-
ery) unless consulted to do so by an Infinera Technical Assistance Center (TAC)
resource.
Maintenance and Release 11.0 supports loopbacks on the new service types added on the XTC:
Troubleshooting • OC-768 (on the TIM-1-40GM)
• STM-256 (on the TIM-1-40GM)
Release 11.0 supports the following loopbacks for PXM services:
• Ethernet Interface (ETHIF)
• All other loopbacks supported by the TIM
Release 11.0 supports PRBS tests for the new service types added on the XTC:
• OC-768 (on the TIM-1-40GM)
• STM-256 (on the TIM-1-40GM)
Release 11.0 supports GbE client termination point test signals on 1GbE clients on
the TIM-16-2.5G on the XTC. .
In addition, Release 11.0 supports transparent J0 path trace messaging for OC-768
and STM-256 services on the TIM-1-40GM of an XTC.
Table 1-1 New and Updated Features for DTN-X, DTN, Optical Amplifier, and FlexILS Nodes
Feature Description
Debug File Transfer Before sending any compiled file (i.e., debug files, PM files, and database backups),
the node must first compile the file, a process which takes several minutes and can-
not be canceled once initiated. Because of this, starting in Release 11.0 when a
compiled file transfer is initiated by the user, the node will first verify the FTP server
configuration before compiling the file. Users can also enable a connectivity check
with the configured servers prior to initiating the debug file transfer.
Equipment Management
Line Module Modulation Release 11.0 introduces support for mixed modulation for ILS2 line modules with
SD-FEC. Starting in Release 11.0, an AOLM2, AOLX2, SOLM2, or SOLX2 can
support both BPSK and QPSK.
Optical, Digital, and Client In addition to PM data support for the new modules listed above, Release 11.0 sup-
Performance Monitoring ports increased granularity for pre-FEC Q value PM for Carrier CTPs and Optical
Channel CTPs. In previous releases, pre-FEC Q value PM could be retrieved for 15
minute and 24 hour intervals. In Release 11.0, the AOLM2, AOLX2, SOLM2,
SOLX2, AOFX, AOFM, SOFX, and SOFM also support per carrier (wave) real-time
Pre-FEC Q value PM data for 10 second interval. The 10-second interval values are
stored on the node for 24 hours (note that the user can configure DNA to read and
archive this data every 24 hours so that the information is not lost). In addition, the
GNM/DNA interfaces are updated in Release 11.0 to support display of this informa-
tion in a chart format.
PM Data Uploads Release 11.0 introduces the following updates for PM data file uploads:
• Infinera nodes can be configured to transfer PM data files simultaneously to both
the primary and secondary FTP servers. (Simultaneous transfer requires that both
servers are configured correctly.)
• When a compiled file transfer is initiated, the node will first verify the FTP server
configuration before compiling the file. (Users can also enable a connectivity check
with the configured servers prior to initiating the file transfer.)
DTN-X Network Latency The DTN-X supports a PM measurement for network latency, a measure for network
Measurement latency incurred between ODUk connection termination points within a DTN-X net-
work. This includes measurements between any two peer ODUk termination points.
Table 1-1 New and Updated Features for DTN-X, DTN, Optical Amplifier, and FlexILS Nodes
Feature Description
User Passwords Release 11.0 includes the following updates for user passwords:
• Support for a configurable network element password digest type: In addition to
MD5, secure hash algorithm (SHA) values are now supported in Release 11.0.
The following password digest schemes are supported: MD5, SHA-256, SHA-384,
SHA-512. For new Release 11.0 installations, the default scheme is SHA-256. For
nodes upgrading from pre-Release 11.0, the default scheme is MD5 to maintain
backwards compatibility.
• Support for longer passwords: A user password can be up to 32 alphanumeric
characters long (the previous maximum password length was 10 characters).
• TL1 support for default user password configuration: An admin user can use the
TL1 interface to change the default user password for the node (the default pass-
word is “infinera1”). In previous releases, default user password could be changed
only via DNA/GNM.
Secure Sockets Layer In Release 11.0, Infinera nodes are upgraded to a later version of Secure Sockets
(SSL) Layer (SSL):
• From OpenSSL 1.0.0e to OpenSSL 1.0.1h
• From OpenSSH 5.9_p1 to OpenSSH 6.6_P1
Nodal Software Multi- Release 11.0 includes functionality that allows DTN and DTN-X digital node types
Release Interoperability which are running IQ NOS Release 11.0 software to inter-operate with ILS Optical
Amplifiers or FlexILS Optical Line Amplifiers that are running IQ NOS Release 10.1
software. Note that support is continued as in previous releases for the ILS Optical
Amplifiers or FlexILS Optical Line Amplifiers to be running the same software
release as the DTN and DTN-X digital nodes (e.g., Release 11.0).
Nodal Software Efficient Starting with upgrades from Release 11.0 software, the nodal software update pro-
Update cess will automatically bypass those hardware FRUs that do not have any software
changes and/or enhancements in the target upgrade release, hence reducing the
total nodal upgrade time and avoid unnecessary updates or issues. This feature will
take effect starting from the next IQ NOS software maintenance release of Release
11.0 (e.g., Release 11.0.1), and the next major release after Release 11.0 in the
future.
Nodal Software Pre- Release 11.0 includes functionality to support Nodal Software Pre-Upgrade
Upgrade Verification Verification for future software upgrades of the network element. At the time of a
nodal software upgrade (from Release 11.0 to a Release 11.0.x maintenance
release or from Release 11.0 to a future major release such as Release 15.3), the
user can initiate a Prepare for Upgrade command, which will cause the node to
distribute the new software to the shelf controllers and perform pre-upgrade checks
on the shelf controllers to verify that the upgrade will complete successfully. These
checks are performed without initiating the actual upgrade. In this way, the user can
prepare for a software upgrade without performing the upgrade, and without losing
management connectivity.
Table 1-1 New and Updated Features for DTN-X, DTN, Optical Amplifier, and FlexILS Nodes
Feature Description
FTP Connection Before sending any compiled file (i.e., debug files, PM files, and database backups),
Verification the node must first compile the file, a process which takes several minutes and can-
not be canceled once initiated. Because of this, starting in Release 11.0 when a
compiled file transfer is initiated by the user, the node will first verify the FTP/SFTP
server configuration before compiling the file.
Database Management Release 11.0 introduces the following updates for database backup file uploads:
• Infinera nodes can be configured to transfer database backup files simultaneously
to both the primary and secondary FTP servers. (Simultaneous transfer requires
that both servers are configured correctly.)
• When a compiled file transfer is initiated by the user, the node will first verify the
FTP server configuration before compiling the file. (Users can also enable a con-
nectivity check with the configured servers prior to initiating the file transfer.)
• The user interfaces (TL1, GNM, DNA) support the “%V” token for adding the soft-
ware version to the database backup file names.
Transaction Language 1 Release 11.0 includes updates to the TL1 interface to support the Release 11.0 fea-
(TL1) Interface tures listed in this chapter. See the Infinera DTN and DTN-X TL1 User Guide for
detailed information on TL1 interface features and syntax updates.
Commissioning Command In Release 11.0, the CCLI presents an alert banner of hash marks during the reboot
Line Interface (CCLI) cycle to draw attention to the reconfiguration option that might otherwise be missed.
The hash tag alert banner is presented in the CLI prior to the reconfiguration option
before the prompt, “Press Enter to reconfigure, or wait for normal startup..."
Fault Management
Infinera Intelligent Transport Networks feature fault monitoring and management capabilities that provide
real-time information on the status of all the managed entities. Developed in accordance with Telcordia and
ITU standards, the fault management features include a standards-based current alarm table that tracks
outstanding alarm conditions within the target network element, and a wrap-around historical event log that
tracks all changes that occur within the target network element including user-initiated state and attribute
change events.
Refer to the Infinera GNM Fault Management and Diagnostics Guide for more information on fault
management.
Infinera GNM provides two fault management tools:
Alarm Manager—Displays outstanding alarm conditions. Alarm conditions display category, sever-
ity, source, time of occurrence, acknowledgment check, service-affecting or non-service affecting
and probable cause.
Event Log—Displays historical event logs. Events display event type, severity, source, time of
occurrence, message, AID and Log Type.
Additionally, Infinera GNM allows you to:
acknowledge outstanding alarms.
allow/inhibit alarms per managed entity.
configure reminders and useful messages for alarms using Customizable Alarm Settings feature.
configure severity of individual fault conditions using Alarm Severity Profile Settings (ASPS) feature.
control environmental alarms by configuring output closure contacts and input closure contacts.
export all alarms and events.
export current view of alarms and events.
filter alarms and events.
perform maintenance functions such as diagnostics and loopbacks.
sort alarms and events based on all the fields, in both ascending and descending order.
test and monitor the diagnostic capabilities like loopabacks, trace messaging, PRBS test and so on.
Refer to the Infinera GNM Fault Management and Diagnostics Guide for more information on fault
management and diagnostics.
Configuration Management
Infinera Intelligent Transport Networks provide configuration management capabilities that allow the user
to configure and monitor the state of circuit packs and termination points. To ease deployment of network
elements and meet diverse customer needs, Infinera GNM supports two modes of configuration:
Auto-configuration—In this mode, the network element automatically detects and configures the
equipment when it is present.
Pre-configuration—In this mode, users can pre-configure equipment and termination point prior to
the equipment being present.
Refer to the Infinera DTN and DTN-X System Description for more information on equipment types and
configuration modes.
Infinera GNM enables users to:
pre-configure managed equipment.
modify attributes associated with managed equipment.
delete managed equipment.
modify the administrative state of managed entity, enabling it to be in-service or out-of-service.
configure and modify switching mode options in DTC-B.
clear or leave outstanding alarms, using the Alarm Reporting Control (ARC) feature.
view equipment inventory using inventory tools like the Facility Manager and Equipment Manager.
perform timer-based disabling of Automatic Laser Shutdown (ALS) feature.
enable automatic in-service (AINS) on a Tributary port, for a specified time interval, to troubleshoot a
faulty termination point in an alarm-free state.
For faster configuration of managed equipment, Infinera GNM allows users to configure templates with
default values. The newly created managed object attributes are initialized to the default values defined in
the template.
Infinera GNM also supports Protection Group Manager tool to view, create, lockout, clear lockout, manual
switch or delete protection groups. The tool also supports revertive protection switching.
Refer to the Infinera GNM Configuration Management Guide for more information on equipment
management.
Service Provisioning
“DTN Service Provisioning” on page 1-16
Performance Monitoring
Infinera Intelligent Transport Networks provide extensive digital and analog performance monitoring and
flexible performance parameter management. These features can help reduce overall operational costs
associated with fault isolation and troubleshooting in the transport domain.
The system provides an extensive collection of performance monitoring (PM) data, including:
Infinera Digital Transport Frame (DTF) PM data (for section and path layers) at every DTN
Optical PM data at every DTN and Optical Line Amplifiers
Native SONET/SDH section layer PM data at tributary ports
1GbE and 10GbE PM data
Forward Error Connection (FEC) PM data at every DTN
For more information on the system performance monitoring, refer to the Infinera DTN and DTN-X System
Description.
Infinera GNM enables users to:
access real-time PM data.
view PM data collected for 15 minute and 24 hour intervals.
reset PM counters.
set PM threshold crossing alerts.
enable or disable PM data reporting.
monitor the performance of end-user circuits and log historical PM data for analysis.
configure the PM data screen refresh rate.
Refer to the Infinera GNM Performance Management Guide for more information on performance
management.
Getting Started
This chapter describes the browser, hardware and software platform requirements to run Infinera GNM on
your machine. It includes the following sections:
“Hardware Requirements” on page 2-2
Hardware Requirements
Table 2-1 lists the minimum and recommended hardware requirements for Infinera GNM. Ensure that the
GNM Terminal configuration meets or exceeds the minimum requirements
Operating Recommende
System Minimum Recommended Minimum Recommended Minimum d
Software Requirements
In order to launch Infinera GNM client, make sure any of the following operating system requirement is
met.
Requirements Versions
Additionally,
Ensure that all OS patches are installed as recommended by Sun Microsystems (now Oracle). For
the patch cluster, go to https://support.oracle.com.
Ensure that the following two Oracle Solaris patches or the latest revision of the same are installed:
118833-36 or later
118777-13 or later
119963-14 or later
120753-06 or later
139574-03 or later
Ensure that the patch cluster required for Java is installed as recommended by Sun Microsystems
(now Oracle). For a list of patches go to https://support.oracle.com
In addition, the Verisign License Signature must be accepted. The DTN GNM client prompts you to accept
the license if it is not already accepted.
Oracle Solaris 11 and Microsoft Windows 7 and Red Hat Linux 6.6 and Macintosh 10.10
10 8 6.5 and 10.8
JRE1.7.72(64 bit) • JRE1.7.72 (32 and 64 • JRE1.7.72 (64 bit) on • JRE1.7.72 (32 and
bit) Red Hat Linux Version 64 bit)
• JRE1.8.40 (32 and 64 6.6 • JRE1.8.40 (64 bit)
bit) • JRE1.8.40 (64 bit) on on Macintosh 10.8
Red Hat Linux Version only
6.6
• JRE1.7.72 (32 bit) on
Red Hat Linux Version
6.5
• JRE1.8.40 (32 bit) on
Red Hat Linux Version
6.5
Note: GNM does not restrict the launch of GNM client using JRE versions higher than the listed
above. It is recommended to contact Infinera Technical Assistance Center before using a
JRE version not listed above. For contact information see “Obtaining Technical Assistance”
on page 77.
Note: Use common desktop environment to install the JRE on the Oracle Solaris machine.
Note: Use common desktop environment to install the JRE on the Oracle Solaris platform.
rm /usr/bin/javaws
Step 7 Create the javaws softlink for the new JRE
ln -s /usr/java/jre1.6.0_18/bin/java /usr/bin/java
ln -s /usr/java/jre1.6.0_18/bin/javaws /usr/bin/javaws
Browser Requirements
In order to run the Infinera GNM, the GNM Terminal must have one of the following browsers specified in
Table 2-4
Port Information
Table 2-5 provides the network element port information
10023a Telnet Proxy Telnet Proxy Server Used for telnet to SNEs via GNE through this Bi-directional in terms of packet flow between Client Host To allow traffic to port 10023 on
Server Port service for accessing NE operating system shell. network element and the Client Host. the network element from client
host used for telnet.
21b FTP FTP Used for manual FTP operations, like Transfer of Bi-directional in terms of packet flow between NE To allow traffic to port 21 on the
Slog info. network element and the Client Host. NE from client host
22 SSH Secured Channel for Used to establish secure communication for Bi-directional in terms of packet flow between Client host To allow traffic to port 22 on the
management management services between client host and network element and the Client Host. NE from DNA server, GNM and
applications (FTP, SSH, NE client host.
TL1 and XML)
23 Telnet Telnet Server Used to connect to NE's telnet shell. (Essentially Bi-directional in terms of packet flow between Client Host Can be blocked if access to telnet
for debugging) network element and the Client Host. is not required for debugging
purpose
8080 HTTP WebServer Used for downloading the JAR files of GNM from Bi-directional in terms of packet flow between GNM To allow traffic to port 80 on the
NE network element and the Client Host. NE from GNM.
10080 HTTP HTTP Proxy Server Used for downloading the GNM JAR files of SNEs Bi-directional in terms of packet flow between NE GNM To allow traffic to this port on the
via GNE through this service and GNM NE from GNM.
Transport Protocol: Telnet
9090 and TL1 TL1 Agent Used for launching TL1 session with NE. Port Bi-directional in terms of packet flow between NE Client Host To allow traffic to this port on the
9099c 9099 gives TL1 programmatic interface and Client Host NE from client host.
a. Can be blocked if Telnet is not going to be used for debugging Network Elements
b. If all the NEs are configured with secure FTP then this port may be blocked.
c. Can be blocked if secure TL1 is chosen as communication channel
Establishing Connectivity
This chapter describes how to establish connectivity between the GNM Terminal and a target network
element (a DTN/DTN-X/FlexROADM/Optical Amplifier/Optical Line Amplifier) in the following sections:
“Connecting a GNM Terminal to a Target Network Element” on page 3-2
Note: The type of Ethernet cable required will depend on the make and model of computer used
for the GNM Terminal.
Each network element must have a unique IP address that you use to access the element.
To connect the Ethernet cable from the craft computer to the target network element
Step 1 Connect the Ethernet cable to the Ethernet port on the craft computer.
Step 2 Connect the Ethernet cable to the connector labeled Craft on the active XCM/MCM/OMM/IMM.
Note: If there is a redundant XCM/MCM/OMM/IMM, it should not be installed in the slot at this
time.
Step 1 From your Windows desktop, choose Start > Control Panel > Network and Sharing Center >
Change adapter settings.
Step 2 Right-click Local Area Connection and select Properties. The Local Area Connection Properties
window is displayed.
Step 3 Select Internet Protocol(TCP/IP Protocol), and click Properties. The Internet Protocol(TCP/
IP) Properties window is displayed.
Step 1 From your Windows desktop, choose Start > Control Panel. The Control Panel window is dis-
played.
Step 2 Double-click Network Connections. The Network Connections window is displayed.
Step 3 Right-click Local Area Connection icon and select Properties. The Local Area Connection
Properties window is displayed.
Step 4 In the Local Area Connection Properties window, select Internet Protocol (TCP/IP) and click
Properties. The Internet Protocol (TCP/IP) Properties window is displayed.
Step 7 In the Local Area Connection Properties window, click Ok to save the changes.
Step 8 Click OK.
Step 9 Click Close.
Step 1 Go to Start > Run and enter cmd and click OK.
Step 2 At the cmd prompt, enter the following command:
ping [Craft IP]
A message similar to the following is displayed:
Pinging 192.168.0.1 with 32 bytes of data:
Reply from 192.168.0.1: bytes=32 time<10ms TTL=128
Reply from 192.168.0.1: bytes=32 time<10ms TTL=128
LAN Connection
To access the target network element from a LAN, the IP address of the GNM terminal must be in the same
sub-net of the DCN IP address of the network element. The procedure is described under the following
headings:
“Connecting the GNM Terminal to the LAN” on page 3-8
To connect the Ethernet cable from the GNM Terminal to the target network element
Step 1 Connect the male RJ-45 connector on one end of a standard Category 5 Ethernet cable to the
Ethernet port on your GNM Terminal.
Step 2 Connect the male RJ-45 connector on the other end of the Ethernet cable to the female RJ-45
connector labeled “DCN” on the MCM/OMM/XCM/IMM.
Step 1 From your Windows desktop, choose Start > Settings > Network and Dial-up Connections >
Local Area Connection. The Local Area Connection Status dialog box is displayed.
Step 2 Click Properties. The Local Area Connection Properties dialog box is displayed. See
Figure 3-3 on page 3-5.
Step 3 Select TCP/IP Protocol and click Properties.
Step 4 Set the IP Address on the TCP/IP Properties dialog box back to Obtain an IP address from a
DHCP server. If your LAN requires that DNS or WINS be enabled, change the setting on the
DNS Configuration or WINS Configuration tab of the TCP/IP Properties dialog box.
Step 5 If your computer is connected to a proxy server, disable the proxy service or add the target net-
work element nodes as exceptions. See “To disable a proxy service using Internet Explorer” on
page 3-9 and “Remote Access” on page 3-9.
Step 1 From your Windows desktop, choose Start > Settings > Control Panel.
Step 2 In the Control Panel window, select Internet Options. The Internet Properties window is dis-
played.
Step 3 On the Connections tab click Connections > LAN Settings. The Local Area Network (LAN)
Settings window is displayed.
Step 4 Do one of the following:
De-select Use a proxy server for your LAN to disable the service.
Leave Use a proxy server selected and click Advanced. On the Proxy Setting dialog box,
under Exceptions, enter the IP addresses of the nodes that you will access. Separate each
address with a semicolon. To include all nodes on your network, insert an asterisk for the
host number. Click OK to close each open dialog box.
Remote Access
LAN modems can be used to access target network elements from remote sites. The modem port is
located on the I/O panel of the target network element. The LAN modem connected to the target network
element must be properly configured. When the modem is installed, dial-up access to the target network
element is available using a PC or Solaris workstation modem.
Step 1 Ensure that the appropriate version of Sun Java Runtime Environment (JRE) is installed. See
“Java Web Start Requirements” on page 2-3 for more details.
Step 2 Navigate to the appropriate directory as mentioned below:
In case of a Windows client: C:\Documents and Settings\<user_name>\Application
Data\Sun\Java\Deployment
In case of a Solaris client: $<user.home>/.java/deployment
Note: GNM Client launch aborts when an intermittent or sustained loss of network connectivity is
detected during the GNM Client initialization or JAR file download process. An error mes-
sage will be displayed.
Note: GNM Client launch may abort due to cache issues. An error message, indicating a fatal
error with recommendation to clear the GNM software cache will be displayed. In such
cases, click Abort in the error message window to abort the client launch and follow the
instructions in the procedure, “Clearing GNM Software Cache” on page 3-15 to clear the
cache and re-launch the client.
Password—The password that allows you to login to Infinera GNM. If you are log-
ging in for the first time, enter Infinera1.
Note: If you do not have a User name or Password, contact your System Administrator.
Note: If you do not have a User name or Password, contact your system administrator.
Note: In the Solaris environment, Infinera GNM must be launched on a Solaris console only. If
launched from any other application connected to the Solaris machine, the menu items will
overlap and will not be usable.
Note: More than 3 attempts to log in with an invalid password locks the account for 60 seconds.
Further attempts to login during this period will not be successful. Hence wait 60 seconds
before attempting to log in again. These values are configurable by the Security Adminis-
trator.
Step 3 Do the following to choose the application to launch the JNLP file:
Step 3a In the Opening launchGnmCacheMgr window, select the Open with radio button.
Step 3b Click the field next to the Open with radio button and then select Other to launch the
Choose Helper Application window.
Step 3c In the Choose Helper Application window, browse to the Java Web Start Launcher
and click OK.
Step 3d [Optional] Select the check-box, Do this automatically for files of this form from
now on.
This will save the application to be used to launch the JNLP file.
Step 3e Click OK to launch the JNLP file and hence the GNM client.
The GNM login window is displayed.
Step 1 Execute the following command from the command prompt to launch the Java Cache Viewer
from the Java Control Panel:
javaws -viewer
The Java Cache Viewer with a list of applications is displayed.
Step 2 Select the applications to be deleted from the cache and click the Remove Selected Items but-
ton.
Note: Use the Ctrl key to select multiple applications to be removed from the cache.
Step 1 From your Windows desktop, choose Start > Settings > Control Panel > Java.
The Java Control Panel window is displayed.
Step 2 Choose the Advanced.
Step 3 Choose Debugging.
Step 4 Select Enable tracing to enable GNM log capture.
Step 5 Click Apply.
Step 6 Click OK.
The log files are automatically stored at C:\Documents and Settings\<user name>\Application
Data\Sun\Java\Deployment\log\. The log files are named as javaws<number>.trace.
Software Maintenance
This chapter describes how to maintain the network element software and database using Infinera GNM
interface. It consists of these topics:
“Overview” on page 4-2
Overview
Infinera network elements provide the following capabilities to manage software and database images:
“Downloading the Software” on page 4-2
activate the software and database. Before you upgrade the software, you must download the new
database image to the network element.
Restart Software with empty database—This operation lets you activate the current software
image with an empty database.
Uncompress Software—This operation lets you uncompress the software image to enable faster
software upgrade.
In general, upgrading the software does not affect existing service. However, upgrading of certain
firmware, for example, TAM FPGA that is not auto upgradable can be service affecting. Hence, proper
planning is recommended. If this occurs, you receive a warning message.
You must upgrade the software on a node-by-node basis. Therefore, at any given time, the network
elements within a network may be running at least two software image versions. These different images
must be compatible. In the presence of multiple software versions, the network provides functions that are
common to all the network elements.
When you initiate a software upgrade, the procedure:
1. validates the uncompressed software image. If the software image is invalid, the upgrade proce-
dure is not allowed.
2. uncompresses the software image. If there is not enough memory on the network element to store
the decompressed image, the upgrade procedure is aborted and software image reverts to the pre-
viously active software image version.
3. reboots the network element so that the new software image becomes active. If the reboot fails, the
upgrade procedure is aborted and software image reverts to the previously active software image
version.
4. When the new software image is activated, the software upgrade procedure updates the format of
the Event Log and Alarm Manager, if necessary.
Note: When the software is upgraded, the PM historical data is not converted to the new format (if
there is a change in the format) and it is not persisted. Hence, before you upgrade the soft-
ware, you must upload and save the PM data in your local servers.
In general, if the upgrade procedure is aborted, the software reverts to the previously active version. The
procedure reports events and alarms indicating the cause of the failure.
In the FlexROADM, DTN-X, DTN, Optical Amplifier and Optical Line Amplifier network elements, the
software upgrade is also supported when there is only one management card (IMM circuit pack of the
ROADM and Optical Line Amplifier, MCM in the DTN, OMM in the Optical Amplifier and XCM in the DTN-
X) circuit pack in the Main Chassis. In the Infinera ATN, the AMM must be present for any software
operation. During the upgrade process, the communication with clients and with other network elements
within the network is lost.
In both cases, the current active database is backed up, not any previously saved database files. In the
case of a multi-chassis system, a database backup operation is restricted to the active MCM/XCM on the
Main Chassis. For a system with redundant controllers, a database backup operation is restricted to the
active MCM/XCM.
Step 1 Log into the network element with network administrator privilege.
Step 2 Select Tools > SW-DB Upload/Download Manager.The SW-DB Upload/Download Manager
window is displayed.
Note: You can store up to two software image versions (including current) in the network element.
Make sure there is sufficient space in the network element before downloading.
Note: For this procedure, there must be DCN connectivity to the FTP server.
Step 1 Invoke the SW-DB Upload/Download Manager tool as described in “To invoke the SW-DB
Upload/Download Manager tool” on page 4-6. The SW-DB Upload/Download Manager window
is displayed.
Step 2 From the table, select Download SW Image operation.
Step 3 In the FTP Setup panel, specify the primary FTP or/and secondary FTP server information,
including:
IP address of the primary and secondary FTP servers.
Step 1 Invoke the SW-DB Upload/Download Manager tool as described in “To invoke the SW-DB
Upload/Download Manager tool” on page 4-6. The SW-DB Upload/Download Manager window
is displayed.
Step 2 From the table, select Download Config DB operation.
Step 3 In the FTP Setup panel, specify the primary FTP or/and secondary FTP server information,
including:
FTP server address where the database file is located
Note: Make sure the user ID has write permission in the directory where the database file is
uploaded and there is sufficient space on the server.
Step 1 Invoke the SW-DB Upload/Download Manager tool as described in “To invoke the SW-DB
Upload/Download Manager tool” on page 4-6. The SW-DB Upload/Download Manager window
is displayed.
Step 2 From the table, select Backup Config DB operation.
Step 3 In the FTP Setup panel, specify the primary FTP or/and secondary FTP server information,
including:
FTP server address where the database file will uploaded
Note: Both relative and absolute paths can be mentioned in combination with supported tokens. If
no path is specified, by default, the database file is backed-up to the home directory of the
user.
Name Format—The format of the backed up database file. To specify the file name, the
tokens %M (network element name) and %D (date and time) are supported. A default file
name DB_%D is assigned, where %D is the token for the date and time at which the database
is backed up. You can replace the file name prefix DB with any name of your choice. The file
name can have a maximum of 48 characters when the tokens are expanded including the
extension .tar.gz. The network element validates for special characters such as
:@,$&"#* ()/\?;. These special characters are not supported in file names.
Note: There is a possibility that the backups from multiple network elements stored in the same
directory on the server may overwrite each other. Make sure that each network element is
assigned a different directory on the server. Alternatively, append the network element’s
node name to the backed up database file name.
Note: In order to prevent all network elements from transferring the database backup file at the
same time, Infinera GNM starts the transfer at xfrScheduleOffset seconds after the config-
ured date and time. The xfrScheduleOffset value ranges from 0 to 60 seconds and its value
is derived randomly in each network element.
Step 8 When you are done, click Close to exit SW-DB Upload/Download Manager.
Note: Make sure the user ID has write permission in the directory where the debug file is
uploaded and there is sufficient space on the server.
Step 1 Invoke the SW-DB Upload/Download Manager tool as described in “To invoke the SW-DB
Upload/Download Manager tool” on page 4-6. The SW-DB Upload/Download Manager window
is displayed.
Step 2 From the table, select Upload Debug Info operation.
The AID option in the Debug Commands panel is enabled.
Step 3 In the FTP Setup panel, specify the primary FTP or/and secondary FTP server information,
including:
FTP server address where the database file will be uploaded to.
Note: Both relative and absolute paths can be mentioned in combination with supported tokens. If
no path is specified, by default, the database file is uploaded to the home directory of the
user.
Name Format—The format of the uploaded debug file. A default file name debuginfo_%D
is assigned, where %D is the token for the date and time at which the debug information is
uploaded. You can replace the file name prefix debuginfo with any name of your choice.
The file name can have a maximum of 48 characters when the tokens are expanded includ-
ing the extension .tar.gz. The network element validates for special characters such as
:@,$&"#* ()/\?;. These special characters are not supported in file names.
Note: There is a possibility that the backups from multiple network elements stored in the same
directory on the server may overwrite each other. Make sure that each network element is
assigned a different directory on the server.
Note: Make sure the user ID has write permission in the directory where the debug file is
uploaded and there is sufficient space on the server.
Step 1 Invoke the SW-DB Upload/Download Manager tool as described in “To invoke the SW-DB
Upload/Download Manager tool” on page 4-6. The SW-DB Upload/Download Manager win-
dow is displayed.
Step 2 From the table, select Upload Debug Info operation.
The AID option in the Debug Commands panel is enabled.
Step 3 In the FTP Setup panel, specify the primary FTP or/and secondary FTP server information,
including:
FTP server address where the database file will be uploaded to.
Note: Both relative and absolute paths can be mentioned in combination with supported tokens. If
no path is specified, by default, the database file is uploaded to the home directory of the
user.
Name Format—The format of the uploaded debug file. A default file name debuginfo_%D is
assigned, where %D is the token for the date and time at which the debug information is
uploaded. You can replace the file name prefix debuginfo with any name of your choice.
The file name can have a maximum of 48 characters when the tokens are expanded includ-
ing the extension .tar.gz. The network element validates for special characters such as
:@,$&"#* ()/\?;. These special characters are not supported in file names.
Note: There is a possibility that the backups from multiple network elements stored in the same
directory on the server may overwrite each other. Make sure that each network element is
assigned a different directory on the server.
Step 7 Click Current/Last Attempt Details panel to monitor the transfer status.
Step 8 In the Upload Schedule panel, click Transfer Now to start the transfer. A success message is
displayed. Click Ok.
The Current Transfer information in the Current/Last Attempt Details panel provides the transfer
status. When the transfer is complete, the Status(Primary) and Status(Secondary) fields indi-
cates if the database file was successfully uploaded to the primary and secondary FTP servers,
respectively.
Click the Last Successful Upload/Download panel to view details of the last successful upload/
download operation.
Step 9 When you are done, click Close to exit SW-DB Upload/Download Manager.
SW-DB Manager
The SW-DB Manager tool lets a user with network administrator privilege perform these procedures:
“Installing New Software” on page 4-18
Note: Before you perform any software and database maintenance operations, make sure that
there are no more than three database images (including current) stored in the network
element.
Step 1 Log into the network element with network administrator privilege.
Step 2 Select Tools > SW-DB Manager. The SW-DB Manager window is displayed.
The SW-DB Manager window displays the software images and database files stored in the network
element. Table 4-1 on page 4-16 describes the software image information. Table 4-2 on page 4-17
describes the database file information.
Item Description
Item Description
Format The format in which the software is stored. Valid values can be one of the
following:
• Compressed—Software image is compressed.
• Normal—Software image is uncompressed.
SpaceUsed(Kb) The amount of space in kilobytes, used by this software version.
Created The date and time the software image was created. This is generated by
the system.
Item Description
Note: Installing a new software with empty database is traffic affecting. Do not attempt to reboot
the system while it is coming up with an empty database. This may corrupt the database
and cause the MCM/OMM/XCM/IMM to reboot repeatedly.
Note: The new software image version may be older than or newer than the active software ver-
sion.
Step 1 If the chassis is equipped with MCMs/OMMs/XCMs/IMMs in the redundant configuration, right-
click the stand-by (stby) MCM/OMMs/XCMs/IMMs and select Admin State > Lock.
Step 1 Invoke the SW-DB Manager tool as described in “To invoke SW-DB Manager tool” on page 4-15.
The SW-DB Manager window is displayed.
Step 2 [Optional]In the SW Images panel, right-click the software image that you want to install and
choose Uncompress. Uncompressing the software images saves time when the new software
image is to be installed.
Step 3 In the SW-DB Manager window, do one of the following:
In the SW Images panel, right-click the software image that you want to install and choose
Fresh Install. A warning message Fresh Install will activate the selected SW
Image and start with empty DB. Do you want to continue? is displayed.
In the SW Images panel, select the software image that you want to install and click Fresh
Install button. A warning message Fresh Install will activate the selected SW
Image and start with empty DB. Do you want to continue? is displayed.
Step 4 Click Fresh Install. A success message is displayed.
Step 5 Click Ok. The network element is rebooted. It takes a few minutes for the network element to
reboot. Infinera GNM loses connectivity to the network element.
Note: Because the software is new and the database is empty, you need to reconfigure the net-
work element. Use the default user ID and password to log into the network element.
Note: Performing the Fresh Install operation on a SNE, results in the GMPLS information being
lost. This results in loss of connectivity to management interfaces GNM, DNA and TL1.
Refer to the Infinera DTN and DTN-X Turn-up and Test Guide to re-configure the SNE.
Note: If the database image with the same name as that of the software image exists on the net-
work element, the Fresh Install operation will be rejected by displaying an appropriate error
message.
Note: Any software image that was previously uncompressed, will be stored in a compressed for-
mat after a successful install.
Note: When upgrading to Release 9.0 for network elements that are provisioned with restorable
SNCs with OTU2 Clear Channel service type, do one of the following:
Upgrade both the head-end and tail-end network elements for the OTU2 Clear Channel
service at the same time.
or
Before upgrading to Release 9.0, change all OTU2 Clear Channel restorable SNCs to
non-restorable SNCs. After the upgrade, the SNCs can be changed back to restorable
SNCs.
In case of mixed scenario for manual cross-connect:
There is no impact on the OTU2-Clear Channel services created manually in Release
8.x.
New OTU2-Clear Channel services will not come up if head-end and tail-end have a mix
of Release 8.x and Release 9.x.
Note: During IQ NOS software upgrade in Optical Line Amplifier nodes, OMM flash requirement
reaches its peak (requires two software images to be in an uncompressed format plus an
additional Database being created for the Software Upgrade). This will result in a transient
alarm “available non-volatile memory low or very low alarm” being reported. The transient
alarm will clear automatically and it is not service affecting.
Step 1 Ensure all expansion chassis on the network element being upgraded to Release 9.0 are reach-
able. If any of the expansion chassis is not reachable, the upgrade procedure will fail and the
Software Upgrade Failure alarm will be reported.
Note: If a chassis is physically installed and reachable (at least one MCM/XCM controller is
active), upgrade can be performed with pre-provisioned services and equipments.
Step 2 Invoke the SW-DB Manager tool as described in “To invoke SW-DB Manager tool” on page 4-15.
The SW-DB Manager window is displayed.
Step 3 Verify the number of software images on the network element. From the Infinera DTN GNM main
view, select Tools > SW-DB Manager. The SW-DB Manager window is displayed.
Note: Up to two software images (including the current) can be stored on the network element.
Step 4 If two software images exist, select the image that is not in use (backup), right click and select
Delete. In the SW Images panel, ensure that the Usage Status attribute lists Backup. A warning
message is displayed.
Step 5 Click Delete.
Note: Verify any associated alarms before initiating the software download process.
Step 6 Download the appropriate software image using the SW-DB Upload/Download Manager. See
“To download the software image to the network element” on page 4-7 for detailed procedure.
Step 7 Invoke the SW-DB Manager tool as described in “To invoke SW-DB Manager tool” on page 4-15.
The SW-DB Manager window is displayed.
Step 8 From the SW-DB Manager window, verify the following two attributes (Validity and Compatible
with selected SW?) before proceeding to the next step:
In the SW Images panel, Validity—Good
Note: Once the network element upgrades to the new version, the software upgrade is complete.
This upgrade is not traffic affecting. Any software image that was previously uncom-
pressed, will be stored in a compressed format after a successful upgrade.
Note: For detailed traffic, FPGA upgrade, and operational effects associated with upgrading to a
specific software image version, refer to the applicable Software Release Notes.
Use this procedure to upgrade the FPGA firmware on a circuit pack using Infinera GNM.
Note: Infinera recommends that the current configuration database be backed up prior to per-
forming this procedure. Refer to the respective Infinera DTN Product Release Notes for
procedures to backup the network element database.
Note: Do not physically unseat a circuit pack when a firmware upgrade is in progress.
Step 1 Launch Infinera GNM, refer to “To launch Infinera GNM using Mozilla browser” on page 3-14.
Step 2 From the Infinera GNM main view, select Configuration > Equipment Manager. The Equip-
ment Manager window is displayed.
Step 3 In the Filter drop down menu, select FW Upgrade Available. A list of hardware is displayed in
the table. Scroll to the right to see the hidden frames.
Step 4 In the Firmware field (under SA Upgrade), if Available is listed, this indicates that an FPGA
firmware version upgrade is available.
Note: Non-Service Affecting (NSA) firmware upgrades are automatically performed for all the cir-
cuit packs in DTN/DTN-X/FlexROADM.
Note: For DTN-X, sidekick upgrades take effect only when the circuit pack is cold rebooted or
reset and not performed automatically. However, FCP upgrade is automatically performed
when the software is upgraded.
Step 5 Verify that there are no new related alarms on any equipment requiring an FPGA firmware ver-
sion upgrade.
Step 6 Right click on a circuit pack requiring an FPGA firmware version upgrade. From the menu dis-
played, select Admin State. Click Maintenance.
Step 7 Right click on the circuit pack. From the menu displayed, select Reset. Click Cold.
Note: Except for MCM/OMM/XCM/IMM cards, a cold reset of any circuit pack is service affecting.
Note: From the Infinera GNM main view, the circuit pack that has just rebooted will remain in a
Major (SA) alarm state (displayed in Orange) until the reboot is complete.
Step 10 Once the circuit pack has finished booting, it will be necessary to verify that the FPGA firmware
version upgrade completed successfully. From the Infinera GNM main view, select Configura-
tion > Equipment Manager. The Equipment Manager window is displayed.
Step 11 In the Filter drop down menu, select FW Upgrade Available. A list of hardware is displayed in
the table.
Step 12 The circuit pack that was just upgraded will no longer be listed in the FW Upgrade Available filter.
This indicates that the FPGA firmware version upgrade was successful.
Note: If the upgrade was not successful, contact Infinera Technical Support.
Step 13 Repeat Step 2 through Step 12 for all circuit packs requiring an FPGA firmware version upgrade.
Step 1 If the chassis is equipped with MCMs/OMMs/XCMs/IMMs in the redundant configuration, right-
click the stand-by (stby) MCM/OMMs/XCMs/IMMs and select Admin State > Lock.
Step 2 Invoke the SW-DB Manager tool as described in “To invoke SW-DB Manager tool” on page 4-15.
The SW-DB Manager window is displayed.
Step 3 In the SW Images panel, select the software image you want to activate.
Step 4 [Optional]Right-click and choose Uncompress. Uncompressing the software images saves
time when the software image is to be activated.
Step 5 In the DB Images panel, select the database image you want to activate. The Compatible with
selected SW? value must be Compatible or Migratable.
Step 6 Click Activate SW & DB. A warning message This action will restart the Node
with the selected SW Image and force it to use the selected DB Image
instead of the currently running DB. Do you want to continue? is displayed.
Note: To see the Activate SW & DB option, you must select the correct software and database
images.
Note: Any software image that was previously uncompressed, will be stored in a compressed for-
mat after the software image and database image have been successfully activated.
Note: Restarting the current software image with an empty database is traffic affecting.
Note: Do not attempt to reboot the system while it is coming up with an empty database. This may
corrupt the database and cause the MCM/OMM/XCM/IMM to re-boot repeatedly.
Step 1 If the chassis is equipped with MCMs/OMMs/XCMs/IMMs in the redundant configuration, right-
click the stand-by (stby) MCM/OMMs/XCMs/IMMs and select Admin State > Lock.
Step 2 Invoke the SW-DB Manager tool as described in “To invoke SW-DB Manager tool” on page 4-15.
The SW-DB Manager window is displayed.
Step 3 In the SW Images panel, select the current active software image. The Usage Status value
must be Current.
Step 4 Click Restart with empty DB.... A warning message This action will delete the cur-
rent running database and restart the NE. This will bring down the traf-
fic running through this node. This will also bring down the
communication to and away from this node. Do you want to proceed with
this operation? is displayed.
Step 5 Click Restart with Empty DB. A success message is displayed.
Step 6 Click Ok. The node is rebooted. It takes a few minutes for the network element to reboot. Infinera
GNM loses connectivity to the network element.
Note: Because the software is restarted with an empty database, you need to reconfigure the net-
work element. Use the default user ID and password to log into the network element.
To restore a database
Step 1 Invoke the SW-DB Manager tool as described in “To invoke SW-DB Manager tool” on page 4-15.
The SW-DB Manager window is displayed.
Step 2 In the SW Images panel, select the current active software image. The Usage Status value
must be Current.
Step 3 In the DB Images panel, select the database image you want to activate. The Compatible with
selected SW? value must be Compatible/Migratable.
Step 4 Click Restore DB. A warning message Restore DB operation will restore config-
uration and reboot the node. Do you want to continue? is displayed.
Step 5 Click Restore. A success message is displayed.
Step 6 Click Ok. The node is rebooted. It takes a few minutes for the network element to reboot. Infin-
era GNM loses connectivity to the network element.
Note: When an SNC is restored along an alternate path, note that the network elements associ-
ated with the SNC (including the local, remote, and intermediate network elements used
for the alternate path as well as those used for the original path) will have updated their
Cross-connect databases. However, until a backup operation is performed, the backup
databases on these network elements will not contain information for the restored alternate
path of the SNC. This must be taken into consideration before performing a database res-
toration on any of these network elements. Traffic will be affected if an older database is
restored after an SNC auto restoration has occurred.
Note: You can have a maximum of two software images including the current image and three
database images including the current image, on the network element. If there are more
than the permissible number of software and database images, you cannot perform any of
the software and database upgrade operations.
Step 1 Invoke the SW-DB Manager tool as described in “To invoke SW-DB Manager tool” on page 4-15.
The SW-DB Manager window is displayed.
Step 2 In the DB Images panel, select the current active database image. Make sure the Usage Status
is Current.
Step 3 Click Take Local Backup. A warning message is displayed.
Step 4 Click Backup. A success message is displayed.
Step 5 Click Ok. The database backup file is created and displayed in the DB Images panel.
Step 6 When you are done, click Close to exit SW-DB Manager.
Step 1 Invoke the SW-DB Manager tool as described in “To invoke SW-DB Manager tool” on page 4-15.
The SW-DB Manager window is displayed.
Step 2 Do one of the following:
To delete a software image, in the SW Images panel, select the software image you want to
delete.
To delete a database image, in the DB Images panel select the database image you want to
delete.
Step 3 Right-click and select Delete. A warning message is displayed.
Step 4 Click Delete. A success message is displayed.
Step 5 Click Ok.
Step 6 When you are done, click Close to exit SW-DB Manager.
Step 1 Invoke the SW-DB Manager tool as described in “To invoke SW-DB Manager tool” on page 4-15.
The SW-DB Manager window is displayed.
Step 2 Do one of the following:
To compress the software image, in the SW Images panel, right-click the software image you
want to compress and choose Compress.
To compress the database image, in the DB Images panel, right-click the database image
you want to compress and choose Compress.
Step 3 When you are done, click Close to exit SW-DB Manager.
Infinera GNM provides a graphical user interface to access and manage Infinera DTN-Xs, DTNs,
FlexROADMs, Optical Amplifiers and Optical Line Amplifiers.This chapter provides an overview of the
Infinera GNM user interface and provides information on how to use it, in the following sections:
“Infinera GNM Interface Components” on page 5-2
Note: Unless specifically noted otherwise, all references to "line module" will refer interchange-
ably to either the DLM, XLM, ADLM, AXLM, SLM, AXLM-80, ADLM-80 and/or SLM-80
(DTC/MTC only) and AOLM, AOLM2, AOLX, AOLX2, SOLM, SOLM2, SOLX, SOLX2,
AOFM, and/or AOFX (XTC only). The term "LM-80" is used to specify the LM-80 sub-set of
line modules and refers interchangeably to the AXLM-80, ADLM-80 and/or SLM-80 (DTC/
MTC only). Note that the term "line module" does not refer to TEMs, as they do not have
line-side capabilities and are used for tributary extension.
Note: In previous software releases, a node with an OTC as the Main Chassis (i.e. OMM as the
node controller module) was referred to in the documentation as an "Optical Line Amplifier"
node. Note that the management interfaces have always referred to this node type as an
"Optical Amplifier". Starting in Release 10.0, the customer documentation is updated to
match the terminology of the management interfaces, wherein a node with an OTC Main
Chassis is called an "Optical Amplifier" and a node with an MTC-9 Main Chassis (i.e. IMM
as the node controller module) configured with IAMs/IRMs is now called an "Optical Line
Amplifier". Note that an MTC-9 Main Chassis configured with FRMs is called a Flex-
ROADM node, to support optical multiplexing.
Keyboard Accelerators
Frequently used commands have keyboard shortcuts. To access commands using these keyboard
shortcuts, press Alt+<underlined letter in the menu option>. For example, to access the Provisioning
menu, hold the Alt key and press P.
Equipment Tree
The Equipment Tree is located at the top left side of the GNM Main View. It provides a hierarchical view of
all the equipment contained within the target network element, and a list of all other nodes in the same
signaling domain. When an object in the Equipment Tree is selected the corresponding object is outlined in
the Equipment View. Right-click options on objects in the Equipment Tree is supported wherein, a context-
based menu is displayed to perform various operations depending on the access privileges of the user;
some operations may be disabled, and appear in grey text.
The Equipment Tree displays a tree structure of the following:
Current Network Element View
The Current Network Element View displays the target network element and its sub-equipment. It
lists the network element’s chassis and other contained equipment in hierarchical format. See
Figure 5-6 on page 5-9. The equipment tree can be expanded and collapsed as desired.
Network Neighborhood View
The Network Neighborhood View lists the network elements within the same signaling domain of the
target network element. Users can launch separate instances of Infinera GNM to manage neighbor-
ing network elements by right-clicking on the network element icons. Every new instance of Infinera
GNM requires the user to log in and is launched in a separate Web browser window. Unreachable
network elements are not displayed in the Network Neighborhood View.
Select the network element name, and click the expand button to expand the tree. Figure 5-6 on
page 5-9 shows the expanded view of the tree.
Workspace Area
The Workspace Area is located at the top right side of the GNM Main View. The Workspace Area displays
the Equipment View and the other inventory tools such as Facility Manager, Equipment Manager, Cross-
Connect Manager, Protection group Manager, and Circuit Manager. The following sections describes each
of the applications that can be displayed within the Workspace Area.
Rack View
The Rack View is displayed in the Workspace area when a user successfully logs into a network element.
The Rack View displays the rack view of all chassis comprising the network element. It displays the
location of the chassis within a node.
The Rack View displays the following information:
The name of the rack. Chassis are grouped according to the rack name. A maximum of two chassis
can be in a rack. If no rack name is entered, no rack name is displayed. If multiple chassis have
the same rack name, the chassis are displayed in two racks.
The chassis label. If no label is entered for a chassis, nothing is displayed.
The chassis number at the top right corner. Chassis are sorted and placed using the RU Location
in Rack attribute of chassis configured from the Chassis Properties dialog. Chassis are first
grouped using the rack name and inside the same group stacked from bottom to top using the RU
Location in Rack attribute. If this attribute is not provided or equal then the chassis number is
used
The Node Controller chassis is indicated by a * next to the chassis number. The rack with the Node
Controller chassis is displayed first followed by the other racks.
The maximum severity color of the chassis or any equipment and (or) facilities is displayed on the
chassis panel.
The maximum severity color of the chassis object is displayed on the chassis icon
The Rack View displays the maximum alarm severity as per the color scheme described in Table 5-2 on
page 5-10.
Color/Imagea Description
Light Grey No alarms are reported on the chassis or equipment and/or facilities in the chassis
Red The chassis has at least one critical alarm
Orange The chassis has at least one major alarm.
Yellow The chassis has at least one minor alarm.
Light Blue The chassis has at least one warning.
a. If the chassis icon is colored, it indicates the chassis has an alarm. If the chassis panel is colored, it indicated the alarm is
raised on the chassis or any of the equipment or facilities on the chassis.
The Rack View provides right-click options for the most commonly performed tasks. To view the Rack
View, click the network element label in the Equipment Tree. Double-click the chassis view to view the
Equipment View.
Equipment View
The Equipment View is displayed when the user clicks on the chassis icon in the Equipment Tree. It
displays the target network element’s chassis along with its contained equipment and associated ports.The
GNM equipment View for a:
DTN-X is shown in Figure 5-7 on page 5-11
DTN is shown in Figure 5-8 on page 5-12 and
Optical Amplifier is shown in Figure 5-9 on page 5-13.
FlexROADM is shown in Figure 5-10 on page 5-14
Optical Line Amplifier is shown in Figure 5-11 on page 5-15
In a multi-chassis configuration, to view the contents of another chassis, click the corresponding chassis in
the Equipment Tree. To select an item in Equipment View, click the label or name of the equipment in the
Equipment Tree. The selected item is highlighted by a black outline. Selecting an item within the
Equipment View refreshes the Equipment Tree (by highlighting the corresponding item in the tree
structure) and the Quick View Browser (by displaying summary information about the selected item).
Right-clicking an item in the Equipment View displays a context-sensitive pop-up menu. The most
frequently used actions are listed at the top of the menu, and the context sensitive actions appear after a
separator.
The Equipment View represents the state of each displayed item using the color scheme described in
Table 5-3 on page 5-15.
Color/Image Description
Dark Grey The slot is empty. The circuit pack has not been pre-provisioned or equipped.
Blue The circuit pack is only pre-provisioned. No alarms can be reported.
Color/Image Description
Light Grey The circuit pack is provisioned and no alarms are reported from the circuit pack.
Red The circuit pack is provisioned and has at least one critical alarm reported.
Orange The circuit pack is provisioned and has at least one major alarm reported.
Yellow The circuit pack is provisioned and has at least one minor alarm reported.
Light Blue The circuit pack is provisioned and has at least one warning reported.
The Quick View Browser displays the information in the Details tab. The Details tab of the Quick View
Browser displays a snapshot (summary information) of the equipment selected in the Equipment Tree or
the Equipment View. Information can be displayed for a port, a card, a chassis or the network element.
Alarm Manager
The Alarm Manager is located at the lower right side of the GNM Main View. It includes the Alarm Table
and the Filter panel. The Alarm Table displays all outstanding alarms in the target network element. Alarms
displayed in the Alarm Manager can be customized using the Filter panel. For more information on Alarm
Manager, refer to Infinera GNM Fault Management and Diagnostics Guide.
Status Bar
The status bar is located at the bottom of the GNM Main View. It displays the connectivity status, user
information, status of the last operation performed using Infinera GNM and alarm summary.
Slide Bar
The slide bar is located at the extreme right of the GNM Equipment View. It is used to zoom/unzoom an
equipment view.
Tree Option
The Equipment Tree displays the network element and equipment identifiers such as Label and/or Name
beside the icon by default. This display can be configured using the Tree Option menu. Users can
configure the Tree Option appropriately to either display the label or name or both associated with the
network element and equipment on the network element.
Step 1 In the GNM Main Menu, select Tools > View > Tree Option.
The following options are displayed for selection:
Show Label
Show Name
The Equipment Tree is updated to display the network element and equipment identifiers based
on the configuration.
GNM Size
The GNM user interface application window can be resized using the GNM size menu option.
Step 1 In the GNM Main Menu, select Tools > View > GNM Size.
The following options are displayed for selection:
800x600
1024x768
Full Screen
Step 2 Select the radio button associated with the desired option to enable the option.
The GNM user interface application window is resized based on the selected option.
To reset preferences
From the Infinera GNM main menu, click Help > Help Contents.
The main page of the Online help is displayed.
Starting from the main page, you can navigate anywhere within the Online help system to access
other information.
Inventories
Infinera GNM supports the following inventories:
Equipment Manager: The Equipment Manager displays an equipment inventory for the target net-
work element in a tabular format. Filter operations allow users to customize how the information is
displayed. For a description of the attributes in the Equipment Manager, refer to the Infinera GNM
Configuration Management Guide.
Facility Manager: The Facility Manager displays an inventory of all termination points for the net-
work element in a tabular format. Filter operations allow users to customize how the information is
displayed. For a description of the attributes in the Facility Manager, refer to the Infinera GNM Con-
figuration Management Guide.
Static Route Manager: The Static Route Manager is used to view, create, modify and delete static
routes. For a description of the attributes in the Static Route Manager, refer to the Infinera GNM
Configuration Management Guide.
Cross-Connect Manager: The Cross-connect Manager is used to view, filter, create, modify, and
delete manual Cross-Connects. For information on how to create Cross-Connects, refer to the Infin-
era GNM Service Provisioning Guide.
Circuit Manager: The Circuit Manager is used to view, create, modify and delete circuits. For infor-
mation on how to create circuits refer to the Infinera GNM Service Provisioning Guide.
UNI Neighbor Manager: Use UNI Neighbor Manager tool to view, create, modify, filter and delete
UNI Neighbors and to associate/disassociate GRE Tunnels and UNI TE Links with UNI Neighbors.
For a description of the attributes in the UNI TE Neighbor Manager, refer to the Infinera GNM Ser-
vice Provisioning Guide.
UNI TE Link Manager: Use UNI TE Link Manager tool to view, create, modify, filter and delete UNI
TE Links and to associate/disassociate Tributary Ports with UNI TE Links. For a description of the
attributes in the UNI TE Link Manager, refer to the Infinera GNM Service Provisioning Guide.
Link Manager: The Link Manager displays an inventory of all the OCG TE Links and the L1OPN
links available from the source node, in a tabular format. Filter operations allow users to customize
how the information is displayed. The Link Manager allows for the configuration of the GRE Tunnels,
GMPLS Control Channels, TE Interfaces, and TE Endpoints and support the setting up of the out of
band GMPLS channels through the GRE Tunnels. Link Manager also supports the export functional-
ity, wherein the link inventory information can be exported to a .csv format. For more information on
the various configurations and procedural details associated with the Link Manager, refer to the Infin-
era GNM Service Provisioning Guide.
Back Plane Link Manager: The Back Plane Link Manager displays an inventory of unidirectional
Traffic Engineering (TE) links with the source and destination line module slots in a tabular format.
These are virtual links between line modules within a network element where back plane traces are
available to transfer data. Filter operations allow users to customize how the information is dis-
played. For a description of the attributes in the Back Plane Link Manager, refer to the Infinera GNM
Service Provisioning Guide.
Protection Group Manager: The Protection Group Manager displays an inventory of Digital SNCPs
and is used to view, filter, create, lockout, clear lockout, manual switch or delete Digital SNCPs. For
information on how to create Digital SNCPs, refer to the Infinera GNM Service Provisioning Guide.
Event Log: The Event Log displays a list of logged events in tabular form. The events displayed are
generated by the target network element. For information on events and event management, refer to
the Infinera GNM Fault Management and Diagnostics Guide.
Alarm Manager: The Alarm Manager displays all outstanding conditions (alarms) in a tabular form.
All outstanding alarms are maintained in the Alarm Table and displayed until the condition is cleared.
For a description of attributes in the Alarm Manager, refer to the Infinera GNM Fault Management
and Diagnostics Guide.
Lightpath Manager: Lightpath Manager allows the user to create, modify, delete, validate, clone,
view and export Optically Engineered Lightpaths (OELs). An OEL is an end-to-end optical path that
is optically reachable for a given rate, modulation, and frequency slot type. For more information on
Lightpath Manager, refer to the Infinera GNM Service Provisioning Guide.
Critical Alarm Circuit Indicates a circuit pack with at least one outstanding alarm of critical
Pack severity level. The Equipment View displays the card in red.
Major Alarm Circuit Pack Indicates a circuit pack with at least one outstanding alarm of major
severity level. The Equipment View displays the card in orange.
Minor Alarm Circuit Pack Indicates a circuit pack with at least one outstanding alarm of minor
severity level. The Equipment View displays the card in yellow.
Warning Circuit Pack Indicates a circuit pack with at least one warning. The Equipment View
displays the card in cyan.
No Alarm Circuit Pack Indicates a circuit pack with no outstanding alarms. The icon is dis-
played in the Equipment View.
Critical Alarm Chassis Indicates a chassis with at least one critical outstanding alarm. The icon
is displayed next to the chassis ID in the Equipment Tree.
Major Alarm Chassis Indicates a chassis with at least one major outstanding alarm. The icon
is displayed next to the chassis ID in the Equipment Tree.
Minor Alarm Chassis Indicates a chassis with at least one minor outstanding alarm. The icon
is displayed next to the chassis ID in the Equipment Tree.
Warning Chassis Indicates a chassis with at least one warning. The icon is displayed next
to the chassis ID in the Equipment Tree.
No Alarm Chassis Indicates a chassis with no outstanding alarms. The icon is displayed
next to the chassis ID in the Equipment Tree.
Critical Alarm PEM Indicates a Power Entry Module with at least one critical outstanding
alarm. The icon is displayed in the top left corner of the Equipment
View.
Major Alarm PEM Indicates a Power Entry Module with at least one major outstanding
alarm. The icon is displayed in the top left corner of the Equipment
View.
Minor Alarm PEM Indicates a Power Entry Module with at least one minor outstanding
alarm. The icon is displayed in the top left corner of the Equipment
View.
Warning PEM Indicates a Power Entry Module with at least one warning outstanding
alarm. The icon is displayed in the top left corner of the Equipment
View.
No Alarm PEM Indicates a Power Entry Module with no alarms. The icon is displayed in
the top left hand corner of the Equipment View.
Critical Alarm FAN Indicates a fan with at least one critical outstanding alarm. The icon is
displayed in the top left hand corner of the Equipment View beside the
Power Entry Module icons.
Major Alarm FAN Indicates a fan with at least one major outstanding alarm. The icon is
displayed in the top left hand corner of the Equipment View beside the
Power Entry Module icons.
No Alarm FAN Indicates a fan with no outstanding alarms. The icon is displayed in the
top left hand corner of the Equipment View beside the Power Entry
Module icons.
Equipment Under Main- Indicates that the equipment is under maintenance and will not provide
tenance any service. This icon is displayed in the Equipment View.
Equipment Unlocked Indicates that the equipment is in an unlocked state. All outstanding
alarms are re-evaluated and new alarms are raised appropriately. This
icon is displayed in the State panel in the equipment properties window.
Equipment Locked Indicates that the equipment is in a locked state. All outstanding alarms
on the equipment are cleared, and new alarm reporting is suppressed.
This icon is displayed in the State panel in the equipment properties
window.
Equipment Alarm Report- Indicates that alarm reporting for the equipment is enabled. This icon is
ing Enabled displayed in the State panel in the equipment properties window.
Parent Equipment Alarm Indicates that alarm reporting for the equipment is disabled because it is
Reporting Disabled disabled for the parent object. This icon is displayed in the State panel
in the equipment properties window.
Parent and This Equip- Indicates that alarm reporting for the equipment and the parent object is
ment Alarm Reporting disabled. This icon is displayed in the State panel in the equipment
Disabled properties window.
Equipment Alarm Report- Indicates that alarm reporting for the equipment is disabled. This icon is
ing Disabled displayed in the State panel in the equipment properties window.
Equipment In Service Indicates that the equipment is in-service. This icon is displayed in the
Equipment Tree beside the equipment and in the State panel in the
equipment properties window.
Equipment Out Of Ser- Indicates that the equipment is out-of-service. This icon is displayed in
vice the Equipment Tree beside the equipment and in the State panel in the
equipment properties window.
No Alarm Termination Indicates absence of alarm on the termination point. This icon is dis-
point played in the Equipment Tree beside the equipment.
Alarm Termination point Indicates presence of alarm on the termination point. This icon is dis-
played in the Equipment Tree beside the equipment.
Equipment Out of Ser- Indicates that the equipment is out-of-service and in administrative
vice and Maintenance maintenance state. This icon is displayed in the Equipment Tree beside
the equipment.
Equipment Out of Ser- Indicates that the equipment is out-of-service and in administrative
vice and Locked locked state. This icon is displayed in the Equipment Tree beside the
equipment.
Empty Slot Indicates an empty slot in the chassis. The icon is displayed in the
Equipment Tree beside the equipment.
Digital Repeater Node Indicates that the node is a digital repeater. The icon appears in the
Equipment Tree, next to the node label.
Optical Line Amplifier Indicates that the node is an Optical Line Amplifier. This icon appears in
Node the Equipment Tree, next to the node label.
Terminal Node Indicates that the node is a terminal node. This icon appears in the
Equipment Tree, next to the node label.
Add-Drop Node Indicates that the node type is Add-Drop. This icon appears in the
Equipment Tree.
Digital Optical Node Indicates that the node type is Digital Optical Node. This icon appears in
the Equipment Tree.
Critical Alarm DTC-B Indicates at least one critical outstanding alarm on the DTC-B. The icon
is positioned next to the DTC-B chassis ID in the Equipment Tree.
Major Alarm DTC-B Indicates at least one major outstanding alarm on the DTC-B. The icon
is positioned next to the DTC-B chassis ID in the Equipment Tree.
Minor Alarm DTC-B Indicates at least one minor outstanding alarm on the DTC-B. The icon
is positioned next to the DTC-B chassis ID in the Equipment Tree.
Warning DTC-B Indicates at least one warning on the DTC-B. The icon is positioned
next to the DTC-B chassis ID in the Equipment Tree.
No Alarm DTC-B Indicates a chassis with no outstanding alarms on the DTC-B. The icon
is positioned next to the DTC-B chassis ID in the Equipment Tree.
Critical Alarm MTC Indicates at least one critical outstanding alarm on the MTC. The icon is
positioned next to the MTC chassis ID in the Equipment Tree.
Major Alarm MTC Indicates at least one major outstanding alarm on the MTC. The icon is
positioned next to the MTC chassis ID in the Equipment Tree.
Minor Alarm MTC Indicates at least one minor outstanding alarm on the MTC. The icon is
positioned next to the MTC chassis ID in the Equipment Tree.
Warning MTC Indicates at least one warning on the MTC. The icon is positioned next
to the MTC chassis ID in the Equipment Tree.
No Alarm MTC Indicates a chassis with no outstanding alarms on the MTC. The icon is
positioned next to the MTC chassis ID in the Equipment Tree.
Critical Alarm OTC Indicates at least one critical outstanding alarm on the OTC. The icon is
positioned next to the OTC chassis ID in the Equipment Tree.
Major Alarm OTC Indicates at least one major outstanding alarm on the OTC. The icon is
positioned next to the OTC chassis ID in the Equipment Tree.
Minor Alarm OTC Indicates at least one minor outstanding alarm on the OTC. The icon is
positioned next to the OTC chassis ID in the Equipment Tree.
Warning OTC Indicates at least one warning on the OTC. The icon is positioned next
to the OTC chassis ID in the Equipment Tree.
No Alarm OTC Indicates a chassis with no outstanding alarms on the OTC. The icon is
positioned next to the OTC chassis ID in the Equipment Tree.
Transitioning Manage- Indicates that the management card is transitioning from active to
ment Card standby.
Diversity Enabled Icon in the graphical representation panel of the service summary
screen indicating if diversity is enabled on the circuit.
Routing Constraints Icon in the graphical representation panel of the service summary
Enabled screen indicating if routing constraints are enabled on the circuit.
Service Summary Navi- Icon in the Navigation Panel of the Circuit Properties window to navi-
gation Icon gate to the Service Summary screen.
Circuit Properties Navi- Icon in the Navigation Panel of the Circuit Properties window to navi-
gation Icon gate to the Circuit Properties screen in case of unprotected circuits.
Working Path Properties Icon in the Navigation Panel of the Circuit Properties window to navi-
Navigation Icon gate to the Working Path Properties screen in case of protected circuits.
Protection Path Proper- Icon in the Navigation Panel of the Circuit Properties window to navi-
ties Navigation Icon gate to the Protection Path Properties screen in case of protected cir-
cuits.
Edit Protection Parame- Icon in the Navigation Panel of the Circuit Properties window to navi-
ters Navigation Icon gate to the Edit Protection Parameters screen in case of protected cir-
cuits.
Cross-Connect Icon in the graphical representation panel of the service summary
screen indicating a cross-connect provisioned.
Service Summary Navi- Icon in the Navigation Panel of the Cross-Connect Properties window to
gation Icon navigate to the Service Summary screen.
Cross-Connect Proper- Icon in the Navigation Panel of the Cross-Connect Properties window to
ties Navigation Icon navigate to the Circuit Properties screen in case of unprotected circuits.
Working Path Properties Icon in the Navigation Panel of the Cross-Connect Properties window to
Navigation Icon navigate to the Working Cross-Connect Properties screen in case of
protected circuits.
Protection Path Proper- Icon in the Navigation Panel of the Cross-Connect Properties window to
ties Navigation Icon navigate to the Protection Cross-Connect Properties screen in case of
protected circuits.
Edit DSNCP Navigation Icon in the Navigation Panel of the Cross-Connect Properties window to
Icon navigate to the Edit Protection Parameters screen in case of protected
circuits.
Infinera IQ NOS software uses certain third party software. The license terms associated with this software
require that we give copyright and license information, and these Infinera IQ NOS Third Party Software
License Terms provide those details.
As can be seen in the chart below, several third party software packages are licensed under the Sun
Binary Code License Agreement, Apache License Version 2.0, GNU General Public License Version 2,
GNU Library General Public License Version 2, or the GNU Lesser General Public License Version 2.1.
The complete text of each of those licenses is set forth after the chart below.
4 QNX Software Systems © 1982-2002, QNX Software Systems Ltd. All rights reserved.
This product incorporates software from QNX Software Systems.
QNX Software systems incorporates certain third party software in
its stack. For license terms associated with this third party soft-
ware, please refer to the following document:
http://www.qnx.com/legal/licensing/dev_license/eula/
TPLTG.1_05d.updated.Nov24_06.pdf
5 javax jnlp javax jnlp is licensed under the GNU Lesser General Public
License v 2.1.
6 NanoXML Copyright
NanoXML is distributed under the zlib/libpng license, which is OSS
(Open Source Software) compliant. It is not GPL or LGPL and it will
never be part of the GNU project.
Copyrighted ©2000-2002 Marc De Scheemaecker, All Rights
Reserved
This software is provided 'as-is', without any express or implied
warranty. In no event will the authors be held liable for any dam-
ages arising from the use of this software.
Permission is granted to anyone to use this software for any pur-
pose, including commercial applications, and to alter it and redis-
tribute it freely, subject to the following restrictions:
The origin of this software must not be misrepresented; you must
not claim that you wrote the original software. If you use this soft-
ware in a product, an acknowledgment in the product documenta-
tion would be appreciated but is not required.
Altered source versions must be plainly marked as such, and must
not be misrepresented as being the original software.
This notice may not be removed or altered from any source distri-
bution.
7 Glazed Lists Glazed Lists is licensed under the GNU Lesser General Public
License v 2.1.
8 bpf Copyright (c) 1990, 1991, 1992, 1993, 1994, 1995, 1996
The Regents of the University of California. All rights reserved.
This code is derived from the Stanford/CMU enet packet filter, (net/
enet.c) distributed as part of 4.3BSD, and code contributed to
Berkeley by Steven McCanne and Van Jacobson both of Lawrence
Berkeley Laboratory.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copy-
right notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribu-
tion.
3. All advertising materials mentioning features or use of this soft-
ware must display the following acknowledgement:
This product includes software developed by the University of Cali-
fornia, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contrib-
utors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CON-
TRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIM-
ITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
9 GNU Readline Licensed under the terms of the GNU General Public License, ver-
sion 2.
10 tftpd Copyright (c) 1983 Regents of the University of California. All rights
reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copy-
right notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribu-
tion.
3. All advertising materials mentioning features or use of this soft-
ware must display the following acknowledgement:
This product includes software developed by the University of Cali-
fornia, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contribu-
tors may be used to endorse or promote products derived from this
software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CON-
TRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIM-
ITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
To obtain a copy of this source code, please contact Brad Good-
son, Director, Intellectual Property Counsel, at Infinera Corporation
at bgoodson@infinera.com.
11 netx jnlp Licensed under the GNU Lesser General Public License v 2.1.
12 javahelp Javahelp is licensed under the Sun Binary Code License Agree-
ment with the addition of the following supplemental licensing
terms:
JAVAHELP(TM) VERSION 2.0 SUPPLEMENTAL LICENSE
TERMS
These supplemental license terms ("Supplemental Terms") add to
or modify the terms of the Binary Code License Agreement (collec-
tively, the "Agreement"). Capitalized terms not defined in these
Supplemental Terms shall have the same meanings ascribed to
them in the Agreement. These Supplemental Terms shall super-
sede any inconsistent or conflicting terms in the Agreement, or in
any license contained within the Software.
1. Software Internal Use and Development License Grant. Subject
to the terms and conditions of this Agreement, including, but not
limited to Section 4 (Java(TM) Technology Restrictions) of these
Supplemental Terms, Sun grants you a non-exclusive, non-trans-
ferable, limited license to reproduce internally and use internally
the binary form of the Software complete and unmodified for the
sole purpose of designing, developing and testing your Java
applets and applications intended to run on the Java platform
("Programs").
2. License to Distribute Software.á In addition to the license
granted in Section 1 (Software Internal Use and Development
License Grant) of these Supplemental Terms, subject to the terms
and conditions of this Agreement, including but not limited to Sec-
tion 4 (Java Technology Restrictions), Sun grants you a non-exclu-
sive, non-transferable, limited license to reproduce and distribute
the Software in binary form only, provided that you (i) distribute the
Software complete and unmodified and only bundled as part of
your Programs, (ii) do not distribute additional software intended to
replace any component(s) of the Software, (iii) do not remove or
alter any proprietary legends or notices contained in the Software,
(iv) only distribute the Software subject to a license agreement that
protects Sun's interests consistent with the terms contained in this
Agreement, and (v) agree to defend and indemnify Sun and its
licensors from and against any damages, costs, liabilities, settle-
ment amounts and/or expenses (including attorneys' fees) incurred
in connection with any claim, lawsuit or action by any third party
that arises or results from the use or distribution of any and all Pro-
grams and/or Software.
3. License to Distribute Redistributables. In addition to the license
granted in Section 1 (Software Internal Use and Development
License Grant) of these Supplemental Terms, subject to the terms
and conditions of this Agreement,
18 FreeRADIUS Copyright (C) 1999, 2000, 2001, 2002, 2003, 2004, 2005 The Fre-
eRADIUS Server Project
Copyright (C) 1999, 2000, 2001, 2002, 2003, 2004, 2005 Alan
DeKok <aland@ox.org>
Copyright (C) 1996, 1997, 1999, 2000, 2002, 2003, 2004, 2005
Free Software Foundation, Inc.
Copyright (C) 2003, 2004, 2005 Kostas Kalevras <kka-
lev@noc.ntua.gr>
Copyright (C) 2004 Cladju Consulting, Inc.
Copyright (C) 2001, 2002, 2003, 2004, 2005 Google, Inc.
Copyright (C) 2003, 2004 Michael Richardson <mcr@sandel-
man.ottawa.on.ca>
Copyright (C) 2002, 2003, 2004 Novell, Inc.
Copyright (C) 2002 Miguel A.L. Paraz <mparaz@mparaz.com>
Copyright (C) 2002 Simon Ekstrand <simon@routemeister.net>
Copyright (C) 2001 Chad Miller <cmiller@surfsouth.com>
Copyright (C) 2001 hereUare Communications, Inc.
Copyright (C) 2000 Jochen Friedrich <jochen@scram.de>
Copyright (C) 2000, 2002 Miquel van Smoorenburg
Copyright (C) 2000 Jeff Carneal <jeff@apex.net>
Copyright (C) 2000 Alan Curry <pacman@world.std.com>
Copyright (C) 2000 David Kerry <davidk@snti.com>
Copyright (C) 2000 Dmitri Ageev <d_ageev@ortcc.ru>
Copyright (C) 2000 Nathan Neulinger <nneul@umr.edu>
Copyright (C) 2000 Mike Machado <mike@innercite.com>
Copyright (C) 2000, 2001 Chad Miller <cmiller@surfsouth.com>
Copyright (C) 1997, 1998, 1999 Cistron Internet Services B.V.
Copyright (C) 1999 Kunihiro Ishiguro <kunihiro@zebra.org>
Licensed under the GNU General Public License version 2.
To obtain a copy of this source code, please contact Brad Good-
son, Director, Intellectual Property Counsel, at Infinera Corporation
at bgoodson@infinera.com.
[Continued...]
Note that any information and cryptographic algorithms used in this
software are publicly available on the Internet and at any major
bookstore, scientific library, and patent office worldwide. More infor-
mation can be found e.g. at "http://www.cs.hut.fi/crypto".
The legal status of this program is some combination of all these
permissions and restrictions.Use only at your own responsibility.
You will be responsible for any legal consequences yourself; I am
not making any claims whether possessing or using this is legal or
not in your country, and I am not taking any responsibility on your
behalf.
NO WARRANTY BECAUSE THE PROGRAM IS LICENSED FREE
OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM,
TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT
WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PRO-
GRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FIT-
NESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS
WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE,
YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
REPAIR OR CORRECTION. IN NO EVENT UNLESS REQUIRED
BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY
MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMIT-
TED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING
ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE
THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES
SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
THE PROGRAM TO OPERATE WITH ANY OTHER PRO-
GRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS
BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
2. The 32-bit CRC compensation attack detector in deattack.c was
contributed by CORE SDI S.A. under a BSD-style license. Cryp-
tographic attack detector for ssh - source code Copyright (c) 1998
CORE SDI S.A., Buenos Aires, Argentina. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that this copyright notice is
retained.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS
OR IMPLIED WARRANTIES ARE DISCLAIMED. IN NO EVENT
SHALL CORE SDI S.A. BE LIABLE FOR ANY DIRECT, INDIRECT,
[Continued...]
INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL
DAMAGES RESULTING FROM THE USE OR MISUSE OFTHIS
SOFTWARE.
Ariel Futoransky <futo@core-sdi.com> <http://www.core-sdi.com>
3. ssh-keyscan was contributed by David Mazieres under a BSD-
style license. Copyright 1995, 1996 by David Mazieres
<dm@lcs.mit.edu>. Modification and redistribution in source and
binary forms is permitted provided that due credit is given to the
author and the OpenBSD project by leaving this copyright notice
intact.
4. The Rijndael implementation by Vincent Rijmen, Antoon Bosse-
laers and Paulo Barreto is in the public domain and distributed with
the following license:
• @version 3.0 (December 2000) Optimised ANSI C code for the
Rijndael cipher (now AES)
• @author Vincent Rijmen <vincent.rijmen@esat.kuleuven.ac.be>
• @author Antoon Bosselaers <antoon.bosselaers@esat.kuleu-
ven.ac.be>
• @author Paulo Barreto <paulo.barreto@terra.com.br>
This code is hereby placed in the public domain.
THIS SOFTWARE IS PROVIDED BY THE AUTHORS ''AS IS''
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED.IN NO EVENT SHALL THE AUTHORS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE-
MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOW-
EVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
5. One component of the ssh source code is under a 3-clause BSD
license, held by the University of California, since we pulled these
parts from original Berkeley code.
Copyright (c) 1983, 1990, 1992, 1993, 1995
The Regents of the University of California.All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
[Continued...]
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copy-
right notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribu-
tion.
3. Neither the name of the University nor the names of its contrib-
utors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CON-
TRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WAR-
RANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED.IN NO EVENT
SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR
ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIM-
ITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
(INTERRUPTION). HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
6. Remaining components of the software are provided under a
standard 2-term BSD licence with the following names as copyright
holders:
• Markus Friedl
• Theo de Raadt
• Niels Provos
• Dug Song
• Aaron Campbell
• Damien Miller
• Kevin Steves
• Daniel Kouril
• Wesley Griffin
• Per Allansson
• Nils Nordman
• Simon Wilkinson
Portable OpenSSH additionally includes code from the following
copyright holders, also under the 2-term BSD license:
[Continued...]
• Ben Lindstrom
• Tim Rice
• Andre Lucas
• Chris Adams
• Corinna Vinschen
• Cray Inc.
• Denis Parker
• Gert Doering
• Jakob Schlyter
• Jason Downs
• Juha Yrjölä
• Michael Stone
• Networks Associates Technology, Inc.
• Solar Designer
• Todd C. Miller
• Wayne Schroeder
• William Jones
• Darren Tucker
• Sun Microsystems
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copy-
right notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribu-
tion.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANT-
ABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEM-
PLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSI-
NESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
[Continued...]
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHER-
WISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFT-
WARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
8. Portable OpenSSH contains the following additional licenses:
a) md5crypt.c, md5crypt.h
"THE BEER-WARE LICENSE" (Revision
42):<phk@login.dknet.dk> wrote this file.
As long as you retain this notice you can do whatever you want
with this stuff. If we meet some day, and you think this stuff is worth
it, you can buy me a beer in return. Poul-Henning Kamp
b) snprintf replacement
Copyright Patrick Powell 1995
This code is based on code written by Patrick Powell (papow-
ell@astart.com) It may be used for any purpose as long as this
notice remains intact on all source code distributions
c) Compatibility code (openbsd-compat)
Apart from the previously mentioned licenses, various pieces of
code in the openbsd-compat/ subdirectory are licensed as follows:
Some code is licensed under a 3-term BSD license, to the following
copyright holders:
• Todd C. Miller
• Theo de Raadt
• Damien Miller
• Eric P. Allman
• The Regents of the University of California
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copy-
right notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribu-
tion.
3. Neither the name of the University nor the names of its contrib-
utors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CON-
TRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED
[Continued...]
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE ARE DISCLAIMED.IN NO
EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEM-
PLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSI-
NESS INTERRUPTION). HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIA-
BILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Some code is licensed under an ISC-style license, to the following
copyright holders:
• Internet Software Consortium.
• Todd C. Miller
Permission to use, copy, modify, and distribute this software for any
purpose with or without fee is hereby granted, provided that the
above copyright notice and this permission notice appear in all cop-
ies.
THE SOFTWARE IS PROVIDED "AS IS" AND TODD C. MILLER
DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFT-
WARE INCLUDING ALL IMPLIED WARRANTIES OF MER-
CHANTABILITY AND FITNESS. IN NO EVENT SHALL TODD C.
MILLER BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR
CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSO-
EVER RESULTING FROM LOSS OF USE, DATA OR PROFITS,
WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR
OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC-
TION WITH THE USE OR PERFORMANCE OF THIS SOFT-
WARE.
Some code is licensed under a MIT-style license to the following
copyright holders:
Free Software Foundation, Inc.
Permission is hereby granted, free of charge, to any person obtain-
ing a copy of this software and associated documentation files (the
"Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish,
distribute, distribute with modifications, sublicense, and/or sell cop-
ies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be
included in all copies or substantial portions of the Software.
[Continued...]
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY
OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FIT-
NESS FOR A PARTICULAR PURPOSE AND NONINFRINGE-
MENT. IN NO EVENT SHALL THE ABOVE COPYRIGHT
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
Except as contained in this notice, the name(s) of the above copy-
right holders shall not be used in advertising or otherwise to pro-
mote the sale, use or other dealings in this Software without prior
written authorization.
$OpenBSD: LICENSE, v 1.19 2004/08/30 09:18:08 markus Exp $
[Continued...]
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com). This product includes software written by Tim
Hudson (tjh@cryptsoft.com).
Original SSLeay License
Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
All rights reserved.
This package is an SSL implementation written by Eric Young
(eay@cryptsoft.com). The implementation was written so as to
conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long
as the following conditions are adhered to. The following conditions
apply to all code found in this distribution, be it the RC4, RSA,
lhash, DES, etc., code; not just the SSL code. The SSL documen-
tation included with this distribution is covered by the same copy-
right terms except that the holder is Tim Hudson
(tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices
in the code are not to be removed. If this package is used in a prod-
uct, Eric Young should be given attribution as the author of the
parts of the library used. This can be in the form of a textual mes-
sage at program startup or in documentation (online or textual) pro-
vided with the package.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions
are met:
1. Redistributions of source code must retain the copyright notice,
this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copy-
right notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribu-
tion.
3. All advertising materials mentioning features or use of this soft-
ware must display the following acknowledgement:
"This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com)"
The word 'cryptographic' can be left out if the routines from the
library being used are not cryptographic related.
[Continued...]
4. If you include any Windows specific code (or a derivative
thereof) from the apps directory (application code) you must
include an acknowledgement:
"This product includes software written by Tim Hudson (tjh@crypt-
soft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANT-
ABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CON-
TRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCI-
DENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE-
MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOW-
EVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY
WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publicly available version
or derivative of this code cannot be changed. i.e. this code cannot
simply be copied and put under another distribution licence [includ-
ing the GNU Public Licence.]
22 MD5.cpp MD5.cpp - RSA Data Security, Inc., MD5 message-digest algorithm
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All
rights reserved.
License to copy and use this software is granted provided that it is
identified as the "RSA Data Security, Inc. MD5 Message-Digest
Algorithm" in all material mentioning or referencing this software or
this function.
License is also granted to make and use derivative works provided
that such works are identified as "derived from the RSA Data Secu-
rity, Inc. MD5 Message-Digest Algorithm" in all material mentioning
or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning
either the merchantability of this software or the suitability of this
software for any particular purpose. It is provided "as is" without
express or implied warranty of any kind. These notices must be
retained in any copies of any part of this documentation and/or soft-
ware.*/
23 XercesX Licensed under the Apache Software License, Version 2.0.
[Continued...]
Code to be separated) that provides material functionality in addi-
tion to the functionality provided by the Original Code.
2.2 Binary Code.
Subject to the terms of this Agreement, GoAhead hereby grants
You a worldwide, royalty-free, nonexclusive, nontransferable
license, without right of sublicense, to copy and distribute binary
code copies of the Original Code together with Your Modifications
in binary code.
2.3 Restrictions on Use.
You may sublicense third parties to use Your Modifications if You
enter into a license agreement with such third parties that bind
such third parties to all the obligations under this Agreement appli-
cable to You and that are otherwise substantially similar in scope
and application to this Agreement (without limiting the protections
afforded to GoAhead). You may not rent, lease, or loan the soft-
ware.
2.4 Documentation.
Subject to the terms of this Agreement, GoAhead hereby grants
You a worldwide, royalty-free, nonexclusive, nontransferable
license, without right of sublicense, to copy and distribute the Doc-
umentation in connection with the authorized distribution of the
Original Code and Modifications.
2.5License Back to GoAhead.
You hereby grant in both source code and binary code to GoAhead
a world-wide, royalty-free, non-exclusive license to copy, modify,
display, use and sublicense any Modifications You make that are
distributed or planned for distribution. Within 30 days of either such
event, You agree to ship to GoAhead a file containing the Modifica-
tions (in a media to be determined by the parties), including any
programmers’ notes and other programmers’ materials. Addition-
ally, You will provide to GoAhead a complete description of the
product, the product code or model number, the date on which the
product is initially shipped, and a contact name, phone number and
e-mail address for future correspondence. GoAhead will keep con-
fidential all data specifically marked as such.
3. Trademarks and Brand.
3.1 License and Use.
GoAhead hereby grants to You a limited world-wide, royalty-free,
non-exclusive license to use the GoAhead trade names, trade-
marks, logos, service marks and product designations posted in
Exhibit A (collectively, the "GoAhead Marks") in connection with the
activities by You under this Agreement. Additionally, GoAhead
grants You a license under the terms above to such GoAhead
[Continued...]
trademarks as shall be identified at a URL (the "URL") provided by
GoAhead. The use by You of GoAhead Marks shall be in accor-
dance with GoAhead’s trademark policies regarding trademark
usage as established at the Web site designated by the URL, or as
otherwise communicated to You by GoAhead at its sole discretion.
You understand and agree that any use of GoAhead Marks in con-
nection with this Agreement shall not create any right, title or inter-
est in or to such GoAhead Marks and that all such use and goodwill
associated with GoAhead Marks will inure to the benefit of GoA-
head.
3.2 Promotion by You of GoAhead WebServer Mark.
In consideration for the licenses granted by GoAhead to You
herein, You agree to notify GoAhead when You incorporate the
GoAhead WebServer in Your product and to inform GoAhead when
such product begins to ship. You agree to promote the Original
Code by prominently and visibly displaying a graphic of the GoA-
head WebServer mark on the initial Web page of Your product that
is displayed each time a user connects to it. You also agree that
GoAhead may identify your company as a user of the GoAhead
WebServer by placing your company logo on its Web site. You may
further promote the Original Code by displaying the GoAhead Web-
Server mark in marketing and promotional materials such as the
home page of your Web site or Web pages promoting the product.
3.3 Copyright Notice.
You agree to include copies of the following notice (the "Notice")
regarding proprietary rights in all copies of the Original Code and
Modifications that You distribute, as follows: (a) embedded in the
binary code; and (b) on the title pages of all documentation. Fur-
thermore, You agree to use commercially reasonable efforts to
cause any licensees of your products to embed the Notice in object
code and on the title pages or relevant documentation. The Notice
is as follows: Copyright (c) 20XX GoAhead Software, Inc. All Rights
Reserved. Unless GoAhead otherwise instructs, the year 20xx is to
be replaced with the year during which the release of the Original
Code containing the notice is issued by GoAhead. If this year is not
supplied with Documentation, GoAhead will supply it upon request.
3.4 No Modifications to Server Identification Field.
You agree not to remove or modify the Server identification Field
contained in the Response Header as defined in Section 1.7 and
1.8.
4. Term.
This Agreement and license are effective from the time You exe-
cute this Agreement until this Agreement is terminated. You may
[Continued...]
terminate this Agreement at any time by uninstalling or destroying
all copies of the Original Code including all binary versions and
removing any Modifications to the Original Code existing in any
products. This Agreement will terminate immediately and without
further notice if You fail to comply with any provision of this Agree-
ment. All restrictions on use, and all other provisions that may rea-
sonably be interpreted to survive termination of this Agreement, will
survive termination of this Agreement for any reason. Upon termi-
nation, You agree to uninstall or destroy all copies of the Original
Code, Modifications, and Documentation.
5. Warranty Disclaimers.
THE ORIGINAL CODE, THE DOCUMENTATION, AND THE
MEDIA UPON WHICH THE ORIGINAL CODE IS RECORDED (IF
ANY) ARE PROVIDED "AS IS" AND WITHOUT WARRANTIES OF
ANY KIND, EXPRESS, STATUTORY OR IMPLIED, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
CHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE,
TITLE, AND NON-INFRINGEMENT.
The entire risk as to the quality and performance of the Original
Code (including any Modifications You make) and the Documenta-
tion is with You. Should the Original Code or the Documentation
prove defective, You (and not GoAhead or its distributors, licensors
or dealers) assume the entire cost of all necessary servicing or
repair. GoAhead does not warrant that the functions contained in
the Original Code will meet your requirements or operate in the
combination that You may select for use, that the operation of the
Original Code will be uninterrupted or error free, or that defects in
the Original Code will be corrected. No oral or written statement by
GoAhead or by a representative of GoAhead shall create a war-
ranty or increase the scope of this warranty.
GOAHEAD DOES NOT WARRANT THE ORIGINAL CODE
AGAINST INFRINGEMENT OR THE LIKE WITH RESPECT TO
ANY COPYRIGHT, PATENT, TRADE SECRET, TRADEMARK OR
OTHER PROPRIETARY OR INTELLECTUAL PROPERTY RIGHT
OF ANY THIRD PARTY AND DOES NOT WARRANT THAT THE
ORIGINAL CODE DOES NOT INCLUDE ANY VIRUS, SOFT-
WARE ROUTINE OR OTHER SOFTWARE DESIGNED TO PER-
MIT UNAUTHORIZED ACCESS, TO DISABLE, ERASE OR
OTHERWISE HARM SOFTWARE, HARDWARE OR DATA, OR
TO PERFORM ANY OTHER SUCH ACTIONS.
Any warranties that by law survive the foregoing disclaimers shall
terminate 90 days from the date You received the Original Code.
6. Limitation of Liability.
YOUR SOLE REMEDIES AND GOAHEAD'S ENTIRE LIABILITY
[Continued...]
ARE SET FORTH ABOVE. IN NO EVENT WILL GOAHEAD OR
ITS DISTRIBUTORS OR DEALERS BE LIABLE FOR DIRECT,
INDIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES
RESULTING FROM THE USE OF THE ORIGINAL CODE, THE
INABILITY TO USE THE ORIGINAL CODE, OR ANY DEFECT IN
THE ORIGINAL CODE, INCLUDING ANY LOST PROFITS, EVEN
IF THEY HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
You agree that GoAhead and its distributors and dealers will not be
LIABLE for defense or indemnity with respect to any claim against
You by any third party arising from your possession or use of the
Original Code or the Documentation.
In no event will GoAhead’s total liability to You for all damages,
losses, and causes of action (whether in contract, tort, including
negligence, or otherwise) exceed the amount You paid for this
product.
SOME STATES DO NOT ALLOW LIMITATIONS ON HOW LONG
AN IMPLIED WARRANTY LASTS, AND SOME STATES DO NOT
ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR
CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATIONS
OR EXCLUSIONS MAY NOT APPLY TO YOU. THIS WARRANTY
GIVES YOU SPECIFIC LEGAL RIGHTS AND YOU MAY HAVE
OTHER RIGHTS THAT VARY FROM STATE TO STATE.
7. Indemnification by You.
You agree to indemnify and hold GoAhead harmless against any
and all claims, losses, damages and costs (including legal
expenses and reasonable counsel fees) arising out of any claim of
a third party with respect to the contents of Your products, and any
intellectual property rights or other rights or interests related
thereto.
8. High-Risk Activities.
The Original Code is not fault-tolerant and is not designed, manu-
factured or intended for use or resale as online control equipment
in hazardous environments requiring fail-safe performance, such
as in the operation of nuclear facilities, aircraft navigation or com-
munication systems, air traffic control, direct life support machines
or weapons systems, in which the failure of the Original Code could
lead directly to death, personal injury, or severe physical or envi-
ronmental damage. GoAhead and its suppliers specifically disclaim
any express or implied warranty of fitness for any high-risk uses
listed above.
9. Government Restricted Rights.
For units of the Department of Defense, use, duplication, or disclo-
sure by the Government is subject to restrictions as set forth in
[Continued...]
subparagraph (c)(1)(ii) of the Rights in Technical Data and Com-
puter Software clause at DFARS 252.227-7013. Contractor/manu-
facturer is GoAhead Software, Inc., 10900 N.E. 8th Street, Suite
1200, Bellevue, Washington 98004.
If the Commercial Computer Software Restricted rights clause at
FAR 52.227-19 or its successors apply, the Software and Docu-
mentation constitute restricted computer software as defined in that
clause and the Government shall not have the license for published
software set forth in subparagraph (c)(3) of that clause.
The Original Code (i) was developed at private expense, and no
part of it was developed with governmental funds; (ii) is a trade
secret of GoAhead (or its licensor(s)) for all purposes of the Free-
dom of Information Act; (iii) is "restricted computer software" sub-
ject to limited utilization as provided in the contract between the
vendor and the governmental entity; and (iv) in all respects is pro-
prietary data belonging solely to GoAhead (or its licensor(s)).
10. Governing Law and Interpretation.
This Agreement shall be interpreted under and governed by the
laws of the State of Washington, without regard to its rules govern-
ing the conflict of laws. You hereby consent to the exclusive juris-
diction of the state and federal courts located in King County,
Washington over any disputes arising out of related to this Agree-
ment. If any provision of this Agreement is held illegal or unenforce-
able by a court or tribunal of competent jurisdiction, the remaining
provisions of this Agreement shall remain in effect and the invalid
provision deemed modified to the least degree necessary to rem-
edy such invalidity.
11. Entire Agreement.
This Agreement is the complete agreement between GoAhead and
You and supersedes all prior agreements, oral or written, with
respect to the subject matter hereof.
If You have any questions concerning this Agreement, You may
write to GoAhead Software, Inc., 10900 N.E. 8th Street, Suite
1200, Bellevue, Washington 98004 or send e-mail to info@goa-
head.com.
25 NuDesign software Include the following in the documentation:
Copyright (c) 1998-2007 NuDesign Technologies, Inc. All Rights
Reserved.
Copyright (c) 1999-2007 The OpenSSL Project. All rights reserved.
26 SMC – The State Machine The Source Code version of SMC is available at http://source-
Compiler forge.net/projects/smc/ under the terms of the Mozilla Public
License, Version 1.1.
ment. The foregoing limitations will apply even if the above stated warranty fails of its essential pur-
pose.
6. Termination. This Agreement is effective until terminated. You may terminate this Agreement at any
time by destroying all copies of Software. This Agreement will terminate immediately without notice
from Sun if you fail to comply with any provision of this Agreement. Upon Termination, you must
destroy all copies of Software.
7. Export Regulations. All Software and technical data delivered under this Agreement are subject to
US export control laws and may be subject to export or import regulations in other countries. You
agree to comply strictly with all such laws and regulations and acknowledge that you have the
responsibility to obtain such licenses to export, re-export, or import as may be required after deliv-
ery to you.
8. U.S. Government Restricted Rights. If Software is being acquired by or on behalf of the U.S. Gov-
ernment or by a U.S. Government prime contractor or subcontractor (at any tier), then the Govern-
ment's rights in Software and accompanying documentation will be only as set forth in this
Agreement; this is in accordance with 48 CFR 227.7201 through 227.7202-4 (for Department of
Defense (DOD) acquisitions) and with 48 CFR 2.101 and 12.212 (for non-DOD acquisitions).
9. Governing Law. Any action related to this Agreement will be governed by California law and con-
trolling U.S. federal law. No choice of law rules of any jurisdiction will apply.
10. 10. Severability. If any provision of this Agreement is held to be unenforceable, this Agreement will
remain in effect with the provision omitted, unless omission would frustrate the intent of the parties,
in which case this Agreement will immediately terminate.
11. Integration. This Agreement is the entire agreement between you and Sun relating to its subject
matter. It supersedes all prior or contemporaneous oral or written communications, proposals, rep-
resentations and warranties and prevails over any conflicting or additional terms of any quote,
order, acknowledgment, or other communication between the parties relating to its subject matter
during the term of this Agreement. No modification of this Agreement will be binding, unless in writ-
ing and signed by an authorized representative of each party.
(Some other Free Software Foundation software is covered by the GNU Lesser General Public License
instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are
designed to make sure that you have the freedom to distribute copies of free software (and charge for this
service if you wish), that you receive source code or can get it if you want it, that you can change the
software or use pieces of it in new free programs; and that you know you can do these things. To protect
your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to
surrender the rights.
These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if
you modify it.For example, if you distribute copies of such a program, whether gratis or for a fee, you must
give the recipients all the rights that you have. You must make sure that they, too, receive or can get the
source code. And you must show them these terms so they know their rights. We protect your rights with
two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to
copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make
certain that everyone understands that there is no warranty for this free software. If the software is
modified by someone else and passed on, we want its recipients to know that what they have is not the
original, so that any problems introduced by others will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that
redistributors of a free program will individually obtain patent licenses, in effect making the program
proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use
or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
GNU GENERAL PUBLIC LICENSE
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the copyright
holder saying it may be distributed under the terms of this General Public License. The "Program", below,
refers to any such program or work, and a "work based on the Program" means either the Program or any
derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either
verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included
without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than
copying, distribution and modification are not covered by this License; they are outside its scope. The act
of running the Program is not restricted, and the output from the Program is covered only if its contents
constitute a work based on the Program (independent of having been made by running the Program).
Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any
medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright
notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of
any warranty; and give any other recipients of the Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty
protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on
the Program, and copy and distribute such modifications or work under the terms of Section 1 above,
provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the
date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived
from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the
terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it, when
started running for such interactive use in the most ordinary way, to print or display an announcement
including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you
provide a warranty) and that users may redistribute the program under these conditions, and telling the
user how to view a copy of this License. (Exception: if the Program itself is interactive but does not
normally print such an announcement, your work based on the Program is not required to print an
announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not
derived from the Program, and can be reasonably considered independent and separate works in
themselves, then this License, and its terms, do not apply to those sections when you distribute them as
separate works. But when you distribute the same sections as part of a whole which is a work based on the
Program, the distribution of the whole must be on the terms of this License, whose permissions for other
licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is
not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the
intent is to exercise the right to control the distribution of derivative or collective works based on the
Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work
based on the Program) on a volume of a storage or distribution medium does not bring the other work
under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or
executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:
a) Accompany it with the complete corresponding machine-readable source code, which must be
distributed under the terms of Sections 1 and 2 above on a medium customarily used for software
interchange; or,
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no
more than your cost of physically performing source distribution, a complete machine-readable copy of the
corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer to distribute corresponding source
code. (This alternative is allowed only for noncommercial distribution and only if you received the program
in object code or executable form with such an offer, in accord with Subsection b above.) The source code
for a work means the preferred form of the work for making modifications to it. For an executable work,
complete source code means all the source code for all modules it contains, plus any associated interface
definition files, plus the scripts used to control compilation and installation of the executable. However, as a
special exception, the source code distributed need not include anything that is normally distributed (in
either source or binary form) with the major components (compiler, kernel, and so on) of the operating
system on which the executable runs, unless that component itself accompanies the executable. If
distribution of executable or object code is made by offering access to copy from a designated place, then
offering equivalent access to copy the source code from the same place counts as distribution of the
source code, even though third parties are not compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this
License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will
automatically terminate your rights under this License. However, parties who have received copies, or
rights, from you under this License will not have their licenses terminated so long as such parties remain in
full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing else grants
you permission to modify or distribute the Program or its derivative works. These actions are prohibited by
law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work
based on the Program), you indicate your acceptance of this License to do so, and all its terms and
conditions for copying, distributing or modifying the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically
receives a license from the original licensor to copy, distribute or modify the Program subject to these
terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights
granted herein. You are not responsible for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not
limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise)
that contradict the conditions of this License, they do not excuse you from the conditions of this License. If
you cannot distribute so as to satisfy simultaneously your obligations under this License and any other
pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a
patent license would not permit royalty-free redistribution of the Program by all those who receive copies
directly or indirectly through you, then the only way you could satisfy both it and this License would be to
refrain entirely from distribution of the Program. If any portion of this section is held invalid or
unenforceable under any particular circumstance, the balance of the section is intended to apply and the
section as a whole is intended to apply in other circumstances. It is not the purpose of this section to
induce you to infringe any patents or other property right claims or to contest validity of any such claims;
this section has the sole purpose of protecting the integrity of the free software distribution system, which
is implemented by public license practices. Many people have made generous contributions to the wide
range of software distributed through that system in reliance on consistent application of that system; it is
up to the author/donor to decide if he or she is willing to distribute software through any other system and
a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this
License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by
copyrighted interfaces, the original copyright holder who places the Program under this License may add
an explicit geographical distribution limitation excluding those countries, so that distribution is permitted
only in or among countries not thus excluded. In such case, this License incorporates the limitation as if
written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License
from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail
to address new problems or concerns. Each version is given a distinguishing version number. If the
Program specifies a version number of this License which applies to it and "any later version", you have
the option of following the terms and conditions either of that version or of any later version published by
the Free Software Foundation. If the Program does not specify a version number of this License, you may
choose any version ever published by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions
are different, write to the author to ask for permission. For software which is copyrighted by the Free
Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our
decision will be guided by the two goals of preserving the free status of all derivatives of our free software
and of promoting the sharing and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR
THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE
PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE,
YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH
HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way
to achieve this is to make it free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source
file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright"
line and a pointer to where the full notice is found.
<one line to give the program's name and a brief idea of what it does.>
Copyright (C) <year> <name of author>
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General
Public License as published by the Free Software Foundation; either version 2 of the License, or (at your
option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even
the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program; if not, write
to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
Also add information on how to contact you by electronic and paper mail. If the program is interactive,
make it output a short notice like this when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) year name of author. Gnomovision comes with ABSOLUTELY NO
WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under
certain conditions; type `show c' for details. The hypothetical commands `show w' and `show c' should
show the appropriate parts of the General Public License. Of course, the commands you use may be
called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--
whatever suits your program. You should also get your employer (if you work as a programmer) or your
school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the
names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes
at compilers) written by James Hacker.
<signature of Ty Coon>, 1 April 1989
Ty Coon, President of Vice
This General Public License does not permit incorporating your program into proprietary programs. If your
program is a subroutine library, you may consider it more useful to permit linking proprietary applications
with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this
License.
GNU LESSER GENERAL PUBLIC LICENSE
Version 2.1, February 1999
Copyright (C) 1991, 1999 Free Software Foundation, Inc.
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is
not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the
GNU Library Public License, version 2, hence the version number 2.1.]
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By
contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change
free software--to make sure the software is free for all its users. This license, the Lesser General Public
License, applies to some specially designated software packages--typically libraries--of the Free Software
Foundation and other authors who decide to use it. You can use it too, but we suggest you first think
carefully about whether this license or the ordinary General Public License is the better strategy to use in
any particular case, based on the explanations below. When we speak of free software, we are referring to
freedom of use, not price. Our General Public Licenses are designed to make sure that you have the
freedom to distribute copies of free software (and charge for this service if you wish); that you receive
source code or can get it if you want it; that you can change the software and use pieces of it in new free
programs; and that you are informed that you can do these things. To protect your rights, we need to make
restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These
restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify
it. For example, if you distribute copies of the library, whether gratis or for a fee, you must give the
recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source
code. If you link other code with the library, you must provide complete object files to the recipients, so that
they can relink them with the library after making changes to the library and recompiling it. And you must
show them these terms so they know their rights. We protect your rights with a two-step method: (1) we
copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute
and/or modify the library.
To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also,
if the library is modified by someone else and passed on, the recipients should know that what they have is
not the original version, so that the original author's reputation will not be affected by problems that might
be introduced by others. Finally, software patents pose a constant threat to the existence of any free
program. We wish to make sure that a company cannot effectively restrict the users of a free program by
obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for
a version of the library must be consistent with the full freedom of use specified in this license. Most GNU
software, including some libraries, is covered by the ordinary GNU General Public License. This license,
the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from
the ordinary General Public License. We use this license for certain libraries in order to permit linking those
libraries into non-free programs. When a program is linked with a library, whether statically or using a
shared library, the combination of the two is legally speaking a combined work, a derivative of the original
library. The ordinary General Public License therefore permits such linking only if the entire combination fits
its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code
with the library. We call this license the "Lesser" General Public License because it does Less to protect
the user's freedom than the ordinary General Public License. It also provides other free software
developers Less of an advantage over competing non-free programs. These disadvantages are the reason
we use the ordinary General Public License for many libraries. However, the Lesser license provides
advantages in certain special circumstances. For example, on rare occasions, there may be a special need
to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To
achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free
library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the
free library to free software only, so we use the Lesser General Public License. In other cases, permission
to use a particular library in non-free programs enables a greater number of people to use a large body of
free software. For example, permission to use the GNU C Library in non-free programs enables many
more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating
system. Although the Lesser General Public License is Less protective of the users' freedom, it does
ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run
that program using a modified version of the Library. The precise terms and conditions for copying,
distribution and modification follow. Pay close attention to the difference between a "work based on the
library" and a "work that uses the library". The former contains code derived from the library, whereas the
latter must be combined with the library in order to run.
below, refers to any such software library or work which has been distributed under these terms. A "work
based on the Library" means either the Library or any derivative work under copyright law: that is to say, a
work containing the Library or a portion of it, either verbatim or with modifications and/or translated
straightforwardly into another language. (Hereinafter, translation is included without limitation in the term
"modification".)
"Source code" for a work means the preferred form of the work for making modifications to it. For a library,
complete source code means all the source code for all modules it contains, plus any associated interface
definition files, plus the scripts used to control compilation and installation of the library. Activities other
than copying, distribution and modification are not covered by this License; they are outside its scope. The
act of running a program using the Library is not restricted, and output from such a program is covered
only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for
writing it). Whether that is true depends on what the Library does and what the program that uses the
Library does.
1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in
any medium, provided that you conspicuously and appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the
absence of any warranty; and distribute a copy of this License along with the Library. You may charge a
fee for the physical act of transferring a copy, and you may at your option offer warranty protection in
exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the
Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided
that you also meet all of these conditions:
a) The modified work must itself be a software library.
b) You must cause the files modified to carry prominent notices stating that you changed the files and
the date of any change.
c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms
of this License.
d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application
program that uses the facility, other than as an argument passed when the facility is invoked, then you
must make a good faith effort to ensure that, in the event an application does not supply such function or
table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For
example, a function in a library to compute square roots has a purpose that is entirely well-defined
independent of the application. Therefore, Subsection 2d requires that any application-supplied function or
table used by this function must be optional: if the application does not supply it, the square root function
must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable
sections of that work are not derived from the Library, and can be reasonably considered independent and
separate works in themselves, then this License, and its terms, do not apply to those sections when you
distribute them as separate works. But when you distribute the same sections as part of a whole which is a
work based on the Library, the distribution of the whole must be on the terms of this License, whose
permissions for other licensees extend to the entire whole, and thus to each and every part regardless of
who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written
entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective
works based on the Library. In addition, mere aggregation of another work not based on the Library with
the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not
bring the other work under the scope of this License.
3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a
given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they
refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version
than version 2 of the ordinary GNU General Public License has appeared, then you can specify that
version instead if you wish.) Do not make any other change in these notices. Once this change is made in
a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all
subsequent copies and derivative works made from that copy. This option is useful when you wish to copy
part of the code of the Library into a program that is not a library.
4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or
executable form under the terms of Sections 1 and 2 above provided that you accompany it with the
complete corresponding machine-readable source code, which must be distributed under the terms of
Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object
code is made by offering access to copy from a designated place, then offering equivalent access to copy
the source code from the same place satisfies the requirement to distribute the source code, even though
third parties are not compelled to copy the source along with the object code.
5. A program that contains no derivative of any portion of the Library, but is designed to work with the
Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation,
is not a derivative work of the Library, and therefore falls outside the scope of this License. However, linking
a "work that uses the Library" with the Library creates an executable that is a derivative of the Library
(because it contains portions of the Library), rather than a "work that uses the library". The executable is
therefore covered by this License. Section 6 states terms for distribution of such executables. When a
"work that uses the Library" uses material from a header file that is part of the Library, the object code for
the work may be a derivative work of the Library even though the source code is not. Whether this is true is
especially significant if the work can be linked without the Library, or if the work is itself a library. The
threshold for this to be true is not precisely defined by law. If such an object file uses only numerical
parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or
less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative
work. (Executables containing this object code plus portions of the Library will still fall under Section 6.)
Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under
the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they
are linked directly with the Library itself.
6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with
the Library to produce a work containing portions of the Library, and distribute that work under terms of
your choice, provided that the terms permit modification of the work for the customer's own use and
reverse engineering for debugging such modifications. You must give prominent notice with each copy of
the work that the Library is used in it and that the Library and its use are covered by this License. You must
supply a copy of this License. If the work during execution displays copyright notices, you must include the
copyright notice for the Library among them, as well as a reference directing the user to the copy of this
License. Also, you must do one of these things:
a) Accompany the work with the complete corresponding machine-readable source code for the Library
including whatever changes were used in the work (which must be distributed under Sections 1 and 2
above); and, if the work is an executable linked with the Library, with the complete machine-readable "work
that uses the Library", as object code and/or source code, so that the user can modify the Library and then
relink to produce a modified executable containing the modified Library. (It is understood that the user who
changes the contents of definitions files in the Library will not necessarily be able to recompile the
application to use the modified definitions.)
b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that
(1) uses at run time a copy of the library already present on the user's computer system, rather than
copying library functions into the executable, and (2) will operate properly with a modified version of the
library, if the user installs one, as long as the modified version is interface-compatible with the version that
the work was made with.
c) Accompany the work with a written offer, valid for at least three years, to give the same user the
materials specified in Subsection 6a, above, for a charge no more than the cost of performing this
distribution.
d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent
access to copy the above specified materials from the same place.
e) Verify that the user has already received a copy of these materials or that you have already sent this
user a copy. For an executable, the required form of the "work that uses the Library" must include any data
and utility programs needed for reproducing the executable from it. However, as a special exception, the
materials to be distributed need not include anything that is normally distributed (in either source or binary
form) with the major components (compiler, kernel, and so on) of the operating system on which the
executable runs, unless that component itself accompanies the executable. It may happen that this
requirement contradicts the license restrictions of other proprietary libraries that do not normally
accompany the operating system. Such a contradiction means you cannot use both them and the Library
together in an executable that you distribute.
7. You may place library facilities that are a work based on the Library side-by-side in a single library
together with other library facilities not covered by this License, and distribute such a combined library,
provided that the separate distribution of the work based on the Library and of the other library facilities is
otherwise permitted, and provided that you do these two things:
a) Accompany the combined library with a copy of the same work based on the Library, uncombined with
any other library facilities. This must be distributed under the terms of the Sections above.
b) Give prominent notice with the combined library of the fact that part of it is a work based on the
Library, and explaining where to find the accompanying uncombined form of the same work.
8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided
under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is
void, and will automatically terminate your rights under this License. However, parties who have received
copies, or rights, from you under this License will not have their licenses terminated so long as such
parties remain in full compliance.
9. You are not required to accept this License, since you have not signed it. However, nothing else grants
you permission to modify or distribute the Library or its derivative works. These actions are prohibited by
law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based
on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for
copying, distributing or modifying the Library or works based on it.
10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically
receives a license from the original licensor to copy, distribute, link with or modify the Library subject to
these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the
rights granted herein. You are not responsible for enforcing compliance by third parties with this License.
11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason
(not limited to patent issues), conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this
License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any
other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if
a patent license would not permit royalty-free redistribution of the Library by all those who receive copies
directly or indirectly through you, then the only way you could satisfy both it and this License would be to
refrain entirely from distribution of the Library. If any portion of this section is held invalid or unenforceable
under any particular circumstance, the balance of the section is intended to apply, and the section as a
whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to
infringe any patents or other property right claims or to contest validity of any such claims; this section has
the sole purpose of protecting the integrity of the free software distribution system which is implemented by
public license practices. Many people have made generous contributions to the wide range of software
distributed through that system in reliance on consistent application of that system; it is up to the author/
donor to decide if he or she is willing to distribute software through any other system and a licensee cannot
impose that choice. This section is intended to make thoroughly clear what is believed to be a
consequence of the rest of this License.
12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by
copyrighted interfaces, the original copyright holder who places the Library under this License may add an
explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in
or among countries not thus excluded. In such case, this License incorporates the limitation as if written in
the body of this License.
13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public
License from time to time. Such new versions will be similar in spirit to the present version, but may differ in
detail to address new problems or concerns. Each version is given a distinguishing version number. If the
Library specifies a version number of this License which applies to it and "any later version", you have the
option of following the terms and conditions either of that version or of any later version published by the
Free Software Foundation. If the Library does not specify a license version number, you may choose any
version ever published by the Free Software Foundation.
14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are
incompatible with these, write to the author to ask for permission. For software which is copyrighted by the
Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this.
Our decision will be guided by the two goals of preserving the free status of all derivatives of our free
software and of promoting the sharing and reuse of software generally.
NO WARRANTY
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE
LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE
LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU
ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL,
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY
TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Libraries
If you develop a new library, and you want it to be of the greatest possible use to the public, we
recommend making it free software that everyone can redistribute and change. You can do so by
permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General Public
License). To apply these terms, attach the following notices to the library. It is safest to attach them to the
start of each source file to most effectively convey the exclusion of warranty; and each file should have at
least the "copyright" line and a pointer to where the full notice is found.
<one line to give the library's name and a brief idea of what it does.>
Copyright (C) <year> <name of author>
This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser
General Public License as published by the Free Software Foundation; either version 2.1 of the License, or
(at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have
received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free
Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
Also add information on how to contact you by electronic and paper mail. You should also get your
employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the
library, if necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a library for tweaking knobs)
written by James Random Hacker.
<signature of Ty Coon>, 1 April 1990
Ty Coon, President of Vice
That's all there is to it!
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is
not allowed.[This is the first released version of the library GPL. It is numbered 2 because it goes with
version 2 of the ordinary GPL.]
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By
contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change
free software--to make sure the software is free for all its users. This license, the Library General Public
License, applies to some specially designated Free Software Foundation software, and to any other
libraries whose authors decide to use it. You can use it for your libraries, too. When we speak of free
software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure
that you have the freedom to distribute copies of free software (and charge for this service if you wish), that
you receive source code or can get it if you want it, that you can change the software or use pieces of it in
new free programs; and that you know you can do these things. To protect your rights, we need to make
restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These
restrictions translate to certain responsibilities for you if you distribute copies of the library, or if you modify
it.
For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients
all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If
you link a program with the library, you must provide complete object files to the recipients so that they can
relink them with the library, after making changes to the library and recompiling it. And you must show them
these terms so they know their rights.
Our method of protecting your rights has two steps: (1) copyright the library, and (2) offer you this license
which gives you legal permission to copy, distribute and/or modify the library. Also, for each distributor's
protection, we want to make certain that everyone understands that there is no warranty for this free library.
If the library is modified by someone else and passed on, we want its recipients to know that what they
have is not the original version, so that any problems introduced by others will not reflect on the original
authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to
avoid the danger that companies distributing free software will individually obtain patent licenses, thus in
effect transforming the program into proprietary software. To prevent this, we have made it clear that any
patent must be licensed for everyone's free use or not licensed at all. Most GNU software, including some
libraries, is covered by the ordinary GNU General Public License, which was designed for utility programs.
This license, the GNU Library General Public License, applies to certain designated libraries. This license
is quite different from the ordinary one; be sure to read it in full, and don't assume that anything in it is the
same as in the ordinary license. The reason we have a separate public license for some libraries is that
they blur the distinction we usually make between modifying or adding to a program and simply using it.
Linking a program with a library, without changing the library, is in some sense simply using the library, and
is analogous to running a utility program or application program. However, in a textual and legal sense, the
linked executable is a combined work, a derivative of the original library, and the ordinary General Public
License treats it as such. Because of this blurred distinction, using the ordinary General Public License for
libraries did not effectively promote software sharing, because most developers did not use the libraries.
We concluded that weaker conditions might promote sharing better. However, unrestricted linking of non-
free programs would deprive the users of those programs of all benefit from the free status of the libraries
themselves. This Library General Public License is intended to permit developers of non-free programs to
use free libraries, while preserving your freedom as a user of such programs to change the free libraries
that are incorporated in them. (We have not seen how to achieve this as regards changes in header files,
but we have achieved it as regards changes in the actual functions of the Library.) The hope is that this will
lead to faster development of free libraries. The precise terms and conditions for copying, distribution and
modification follow. Pay close attention to the difference between a "work based on the library" and a "work
that uses the library". The former contains code derived from the library, while the latter only works
together with the library. Note that it is possible for a library to be covered by the ordinary General Public
License rather than by this special one.
GNU LIBRARY GENERAL PUBLIC LICENSE
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License Agreement applies to any software library which contains a notice placed by the copyright
holder or other authorized party saying it may be distributed under the terms of this Library General Public
License (also called "this License"). Each licensee is addressed as "you".
A "library" means a collection of software functions and/or data prepared so as to be conveniently linked
with application programs (which use some of those functions and data) to form executables.
The "Library", below, refers to any such software library or work which has been distributed under these
terms. A "work based on the Library" means either the Library or any derivative work under copyright law:
that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or
translated straightforwardly into another language. (Hereinafter, translation is included without limitation in
the term "modification".) "Source code" for a work means the preferred form of the work for making
modifications to it. For a library, complete source code means all the source code for all modules it
contains, plus any associated interface definition files, plus the scripts used to control compilation and
installation of the library. Activities other than copying, distribution and modification are not covered by this
License; they are outside its scope. The act of running a program using the Library is not restricted, and
output from such a program is covered only if its contents constitute a work based on the Library
(independent of the use of the Library in a tool for writing it). Whether that is true depends on what the
Library does and what the program that uses the Library does.
1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in
any medium, provided that you conspicuously and appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the
absence of any warranty; and distribute a copy of this License along with the Library. You may charge a
fee for the physical act of transferring a copy, and you may at your option offer warranty protection in
exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the
Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided
that you also meet all of these conditions:
a) The modified work must itself be a software library.
b) You must cause the files modified to carry prominent notices stating that you changed the files and
the date of any change.
c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms
of this License.
d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application
program that uses the facility, other than as an argument passed when the facility is invoked, then you
must make a good faith effort to ensure that, in the event an application does not supply such function or
table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For
example, a function in a library to compute square roots has a purpose that is entirely well-defined
independent of the application. Therefore, Subsection 2d requires that any application-supplied function or
table used by this function must be optional: if the application does not supply it, the square root function
must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable
sections of that work are not derived from the Library, and can be reasonably considered independent and
separate works in themselves, then this License, and its terms, do not apply to those sections when you
distribute them as separate works. But when you distribute the same sections as part of a whole which is a
work based on the Library, the distribution of the whole must be on the terms of this License, whose
permissions for other licensees extend to the entire whole, and thus to each and every part regardless of
who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written
entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective
works based on the Library. In addition, mere aggregation of another work not based on the Library with
the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not
bring the other work under the scope of this License.
3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a
given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they
refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version
than version 2 of the ordinary GNU General Public License has appeared, then you can specify that
version instead if you wish.) Do not make any other change in these notices. Once this change is made in
a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all
subsequent copies and derivative works made from that copy. This option is useful when you wish to copy
part of the code of the Library into a program that is not a library.
4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or
executable form under the terms of Sections 1 and 2 above provided that you accompany it with the
complete corresponding machine-readable source code, which must be distributed under the terms of
Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object
code is made by offering access to copy from a designated place, then offering equivalent access to copy
the source code from the same place satisfies the requirement to distribute the source code, even though
third parties are not compelled to copy the source along with the object code.
5. A program that contains no derivative of any portion of the Library, but is designed to work with the
Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation,
is not a derivative work of the Library, and therefore falls outside the scope of this License. However, linking
a "work that uses the Library" with the Library creates an executable that is a derivative of the Library
(because it contains portions of the Library), rather than a "work that uses the library". The executable is
therefore covered by this License.
Section 6 states terms for distribution of such executables.
When a "work that uses the Library" uses material from a header file that is part of the Library, the object
code for the work may be a derivative work of the Library even though the source code is not. Whether this
is true is especially significant if the work can be linked without the Library, or if the work is itself a library.
The threshold for this to be true is not precisely defined by law. If such an object file uses only numerical
parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or
less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative
work. (Executables containing this object code plus portions of the Library will still fall under Section 6.)
Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under
the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they
are linked directly with the Library itself.
6. As an exception to the Sections above, you may also compile or link a "work that uses the Library" with
the Library to produce a work containing portions of the Library, and distribute that work under terms of
your choice, provided that the terms permit modification of the work for the customer's own use and
reverse engineering for debugging such modifications. You must give prominent notice with each copy of
the work that the Library is used in it and that the Library and its use are covered by this License. You must
supply a copy of this License. If the work during execution displays copyright notices, you must include the
copyright notice for the Library among them, as well as a reference directing the user to the copy of this
License. Also, you must do one of these things:
a) Accompany the work with the complete corresponding machine-readable source code for the Library
including whatever changes were used in the work (which must be distributed under Sections 1 and 2
above); and, if the work is an executable linked with the Library, with the complete machine-readable "work
that uses the Library", as object code and/or source code, so that the user can modify the Library and then
relink to produce a modified executable containing the modified Library. (It is understood that the user who
changes the contents of definitions files in the Library will not necessarily be able to recompile the
application to use the modified definitions.)
b) Accompany the work with a written offer, valid for at least three years, to give the same user the
materials specified in Subsection 6a, above, for a charge no more than the cost of performing this
distribution.
c) If distribution of the work is made by offering access to copy from a designated place, offer equivalent
access to copy the above specified materials from the same place.
d) Verify that the user has already received a copy of these materials or that you have already sent this
user a copy. For an executable, the required form of the "work that uses the Library" must include any data
and utility programs needed for reproducing the executable from it. However, as a special exception, the
source code distributed need not include anything that is normally distributed (in either source or binary
form) with the major components (compiler, kernel, and so on) of the operating system on which the
executable runs, unless that component itself accompanies the executable. It may happen that this
requirement contradicts the license restrictions of other proprietary libraries that do not normally
accompany the operating system. Such a contradiction means you cannot use both them and the Library
together in an executable that you distribute.
7. You may place library facilities that are a work based on the Library side-by-side in a single library
together with other library facilities not covered by this License, and distribute such a combined library,
provided that the separate distribution of the work based on the Library and of the other library facilities is
otherwise permitted, and provided that you do these two things:
a) Accompany the combined library with a copy of the same work based on the Library, uncombined with
any other library facilities. This must be distributed under the terms of the Sections above.
b) Give prominent notice with the combined library of the fact that part of it is a work based on the
Library, and explaining where to find the accompanying uncombined form of the same work.
8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided
under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is
void, and will automatically terminate your rights under this License. However, parties who have received
copies, or rights, from you under this License will not have their licenses terminated so long as such parties
remain in full compliance.
9. You are not required to accept this License, since you have not signed it. However, nothing else grants
you permission to modify or distribute the Library or its derivative works. These actions are prohibited by
law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based
on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for
copying, distributing or modifying the Library or works based on it.
10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically
receives a license from the original licensor to copy, distribute, link with or modify the Library subject to
these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the
rights granted herein. You are not responsible for enforcing compliance by third parties to this License.
11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason
(not limited to patent issues), conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this
License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any
other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if
a patent license would not permit royalty-free redistribution of the Library by all those who receive copies
directly or indirectly through you, then the only way you could satisfy both it and this License would be to
refrain entirely from distribution of the Library.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance
of the section is intended to apply, and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to
contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free
software distribution system which is implemented by public license practices. Many people have made
generous contributions to the wide range of software distributed through that system in reliance on
consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute
software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this
License.
12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by
copyrighted interfaces, the original copyright holder who places the Library under this License may add an
explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in
or among countries not thus excluded. In such case, this License incorporates the limitation as if written in
the body of this License.
13. The Free Software Foundation may publish revised and/or new versions of the Library General Public
License from time to time. Such new versions will be similar in spirit to the present version, but may differ in
detail to address new problems or concerns. Each version is given a distinguishing version number. If the
Library specifies a version number of this License which applies to it and "any later version", you have the
option of following the terms and conditions either of that version or of any later version published by the
Free Software Foundation. If the Library does not specify a license version number, you may choose any
version ever published by the Free Software Foundation.
14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are
incompatible with these, write to the author to ask for permission. For software which is copyrighted by the
Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this.
Our decision will be guided by the two goals of preserving the free status of all derivatives of our free
software and of promoting the sharing and reuse of software generally.
NO WARRANTY
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE
LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE
LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU
ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE
LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL,
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY
TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
Appendix: How to Apply These Terms to Your New Libraries
If you develop a new library, and you want it to be of the greatest possible use to the public, we
recommend making it free software that everyone can redistribute and change. You can do so by
permitting redistribution under these terms (or, alternatively, under the terms of the ordinary General Public
License).
To apply these terms, attach the following notices to the library. It is safest to attach them to the start of
each source file to most effectively convey the exclusion of warranty; and each file should have at least the
"copyright" line and a pointer to where the full notice is found.
<one line to give the library's name and a brief idea of what it does.>
Copyright (C) <year> <name of author>
This library is free software; you can redistribute it and/or modify it under the terms of the GNU Library
General Public License as published by the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even
the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Library General Public License for more details.
You should have received a copy of the GNU Library General Public License along with this library; if not,
write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
Also add information on how to contact you by electronic and paper mail.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a
"copyright disclaimer" for the library, if necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the library `Frob' (a library for tweaking knobs)
written by James Random Hacker.
<signature of Ty Coon>, 1 April 1990
Ty Coon, President of Vice That's all there is to it!
Apache License
Version 2.0, January 2004
http://www.apache.org/licenses/
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
1. Definitions.
"License" shall mean the terms and conditions for use, reproduction, and distribution as defined by
Sections 1 through 9 of this document.
"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the
License.
"Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by,
or are under common control with that entity. For the purposes of this definition, "control" means (i) the
power, direct or indirect, to cause the direction or management of such entity, whether by contract or
otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial
ownership of such entity.
"You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.
“Source" form shall mean the preferred form for making modifications, including but not limited to software
source code, documentation source, and configuration files.
"Object" form shall mean any form resulting from mechanical transformation or translation of a Source
form, including but not limited to compiled object code, generated documentation, and conversions to other
media types.
"Work" shall mean the work of authorship, whether in Source or Object form, made available under the
License, as indicated by a copyright notice that is included in or attached to the work (an example is
provided in the Appendix below).
"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived
from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications
represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works
shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of,
the Work and Derivative Works thereof.
"Contribution" shall mean any work of authorship, including the original version of the Work and any
modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to
Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to
submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of
electronic, verbal, or written communication sent to the Licensor or its representatives, including but not
limited to communication on electronic mailing lists, source code control systems, and issue tracking
systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving
the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by
the copyright owner as "Not a Contribution."
"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has
been received by Licensor and subsequently incorporated within the Work.
2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby
grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license
to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the
Work and such Derivative Works in Source or Object form.
3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby
grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated
in this section) patent license to make, have made, use, offer to sell import, and otherwise transfer the
Work, where such license applies only to those patent claims licensable by such Contributor that are
necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work
to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a
cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the
Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under
this License for that Work shall terminate as of the date such litigation is filed.
4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any
medium, with or without modifications, and in Source or Object form, provided that You meet the following
conditions:
(a) You must give any other recipients of the Work or Derivative Works a copy of this License; and
(b) You must cause any modified files to carry prominent notices stating that You changed the files; and
(c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent,
trademark, and attribution notices from the Source form of the Work, excluding those notices that do not
pertain to any part of the Derivative Works; and
(d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that
You distribute must include a readable copy of the attribution notices contained within such NOTICE file,
excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the
following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source
form or documentation, if provided along with the Derivative Works; or, within a display generated by the
Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE
file are for informational purposes only and do not modify the License. You may add Your own attribution
notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from
the Work, provided that such additional attribution notices cannot be construed as modifying the License.
You may add Your own copyright statement to Your modifications and may provide additional or different
license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such
Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise
complies with the conditions stated in this License.
5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally
submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this
License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall
supersede or modify the terms of any separate license agreement you may have executed with Licensor
regarding such Contributions.
6. Trademarks. This License does not grant permission to use the trade names, trademarks, service
marks, or product names of the Licensor, except as required for reasonable and customary use in
describing the origin of the Work and reproducing the content of the NOTICE file.
7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the
Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES
OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or
conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR
PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the
Work and assume any risks associated with Your exercise of permissions under this License.
8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence),
contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or
agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect,
special, incidental, or consequential damages of any character arising as a result of this License or out of
the use or inability to use the Work (including but not limited to damages for loss of goodwill, work
stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if
such Contributor has been advised of the possibility of such damages.
9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You
may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability
obligations and/or rights consistent with this License. However, in accepting such obligations, You may act
only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if
You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims
asserted against, such Contributor by reason of your accepting any such warranty or additional liability.
END OF TERMS AND CONDITIONS
APPENDIX: How to apply the Apache License to your work.
To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed
by brackets "[]" replaced with your own identifying information. (Don't include the brackets!) The text should
be enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class
name and description of purpose be included on the same "printed page" as the copyright notice for easier
identification within third-party archives.
Copyright [yyyy] [name of copyright owner]
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in
compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/
LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is
distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either
express or implied. See the License for the specific language governing permissions and limitations under
the License.
Acronyms
List of Acronyms
Acronym Definition
A
AAM ATN Amplifier Module
AC alternating current; air conditioner; attachment circuit
ACLI administrative command line interface
ACO alarm cutoff
ACT active
AD add/drop
ADLM Amplified Digital Line Module
ADM add/drop multiplexer
AGC Automated Gain Control
AID access identifier
AINS automatic in-service
AIS alarm indication signal
ALS Automatic Laser Shutdown
AMM ATN Management Module
AMP amplifier
ANSI American National Standards Institute
AOFM Advanced OTN FlexChannel Line Module
Acronym Definition
B
BDFB battery distribution fuse bay
BDI backward defect indication
BEI backward error indication
BER bit error rate; bit error ratio
BERT bit error rate testing
BIF bend insensitive fiber
BIP-8 bit interleaved parity
BITS building-integrated timing supply
BLSR bi-directional line switched ring
BMM Band Multiplexing Module
Acronym Definition
C
C Celsius
CBN Common Bonding Network
CBS committed burst size
CCITT Consultative Committee on International Telegraph and Telephone
(now known as the ITU-T)
CCLI commissioning command line interface
CDC colorless, directionless, and contentionless
CDE chromatic dispersion equalizer
CDR clock and data recovery
CDRH Center for Devices and Radiological Health
cDTF Clear Channel Digital Transport Frame
CET Channel Engineering Tool
CFP 100G* form factor pluggable *(C = 100 in Roman numerals; Centum)
CFR code for federal regulations
CH/Ch/ch channel
CID circuit identifier
CIR committed information rate
CIT craft interface terminal
CLEI common language equipment identifier
CLI command line interface
CLM C-band and L-band Coupler
CMM Channel Multiplexing Module
CMP congestion management profile
CNM Customer Network Manager
Acronym Definition
CO central office
CODEC coder and decoder
COM communication
CORBA Common Object Request Broker Architecture
CoS class of service
COSP class of service profile
COSV class of service values
CPC common processor complex
CPE customer premises equipment
CPLD complex programmable logic device
CPU central processing unit
CRC cyclic redundancy check
CRM customer relationship management
CS contiguous spectrum
CSM Customer Service Module
CSPF constraint-based shortest path first algorithm
CSV comma separated value
CTAG correlation tag
CTP connection termination point, channel trail termination point, client termination point
CTS clear to send
CV coding violation
CV-L coding violation-line
CV-P coding violation-path
CV-S coding violation-section
CWDM coarse wavelength division multiplexing
D
DA digital amplifier
DB database
dB decibel
DC direct current; dual carrier
DCC data communications channel
DCE data communications equipment
DCF dispersion compensation fiber
DCM Dispersion Compensation Module
DCN data communication network
Acronym Definition
E
EBS excess burst size
ECC error-correcting code; error correction code
EDFA erbium doped fiber amplifier
EEPROM electrically-erasable programmable read-only memory
Acronym Definition
F
F Fahrenheit
FA frame alignment
FAS frame alignment signal
FastSMP Fast Shared Mesh Protection
FBG fiber Bragg grating
FC Fibre Channel; fiber channel; failure count
FCAPS fault management, configuration management, accounting, performance monitor-
ing, and security administration
FCC Federal Communications Commission (USA)
FDA Food and Drug Administration
FDI forward defect indication
FDR field data recorder
FEC forward error correction
FICON Fibre Connection
Acronym Definition
FIFO first-in-first-out
FIS Fault Integration Server
FIT failures in time
FLT fault
FOADM fixed optical add/drop multiplexer
FMP Fiber Multiplexing Panel
FMP-C Fiber Multiplexing Panel – Colorless
FPC Fiber Panel Chassis
FPGA field programmable gate array
FRM FlexROADM Module
FRU field replaceable unit
FSE FlexROADM Switching Expansion Module
FSM FlexROADM Switching Module
FSP Fiber Shuffle Panel
FTP file transfer protocol; floating termination point
G
GAM Gain Adapter Module
GbE gigabit Ethernet
Gbps gigabits per second
GCC general communication channel
GFEC general forward error correction
GFP generic framing protocol
GHz gigahertz
GMPLS generalized multi protocol label switching
GNE gateway network element
GNM Graphical Node Manager
GRE generic routing encapsulation
GTP group termination point
GUI graphical user interface
H/I
HD high definition
HD-FEC Hard Decision Forward Error Correction
HDLC high-level data link control
HTML hypertext markup language
Acronym Definition
J/K/L
JDK Java Development Kit
JRE Java Runtime Environment
JS jabber seconds
L2CP Layer 2 Control Protocol
LAN local area network
LBC laser bias current
LC fiber optic cable connector type
LCK locked
LED light-emitting diode
LMM Line Multiplexing Module
Acronym Definition
M
MA monitoring access
MAC media access control
MAP management application proxy
MB megabyte
Mbps megabits per second
MCM Management Control Module
MEMS micro electro mechanical systems
MFAS multi frame alignment signal
MIB management information base
MMF multimode fiber
MPO multiple-fiber push-on/pull-off
MS multiplex section
MSA multi source agreement
MSB most significant bit
MSI multiplex structure identifier
MSO multi-service operator
MSOH multiplex section overhead
MTBF mean time between failure
MTC-9 Modular Transport Chassis, 9 slot
MTU maximum transmission unit
MUX multiplex; multiplexer; multiplexing
Acronym Definition
N
NA network administrator
NAND flash type
NC normally closed; node controller; nodal control
NCT nodal control and timing
NDSF non zero dispersion shifted fiber
NE network engineer
NEBS network equipment building standards
NEC National Electrical Code
NECG net electrical coding gain
NEL network element layer
NEPA National Environmental Policy Act
NFPA National Fire Protection Association
nm nanometer
NML network management layer
NMS network management system
NNI network-to-network interface
NO normally open
NOC network operations center
NPS Network Planning System
NRZ non-return to zero
NSA non-service affecting
NTP network time protocol
NVRAM nonvolatile random access memory
NWIF network interface
O
O-SNC optical subnetwork connection
O-TE link optical traffic engineering link
OA Optical Amplifier
OAM Optical Amplification Module
OAM&P operation, administration, maintenance and provisioning
OC-12 optical carrier signal at 622.08Mbps
OC-192 optical carrier signal at 9.95328Gbps
OC-3 optical carrier signal at 155.52Mbps
Acronym Definition
Acronym Definition
P/Q
PC personal computer
PCM Power Conversion Module
PCPM per channel power monitoring
PCS physical coding sublayer
PD photo diode
PDU protocol data unit; power distribution unit
PEM Power Entry Module
PG protection group
PHY physical
PIC Photonic Integrated Circuit
PID protocol identifier
PIN positive-intrinsic negative
Acronym Definition
Acronym Definition
R
RADIUS Remote Authentication Dial-In User Service
RAM Raman Amplifier Module; random access memory
RBM Red/Blue Band Mux/Demux
RDI remote defect indication
REI-L remote error indication-line
REI-P remote error indication-path
REM Raman Extender Module
RFI remote failure indication
RLL Receive Light Level
RMA return material authorization
ROADM reconfigurable optical add/drop multiplexer
ROM read-only memory
RS regenerator section; Reed-Solomon
RSOH regenerator section overhead
RSTP rapid spanning tree protocol
RTC real time clock
RTN return lead
RTS ready to send
RU rack unit
Rx receiver; receive
Rx Q receiver quality
RZ return to zero
RZ-DQPSK return to zero-differential quadrature phase shift keying
S
SA service affecting; security administrator; security association
SAPI source access point identifier
SC shelf controller; single carrier; square shaped fiber optic cable connector
SCh super channel
SCG super channel group
SCM Submarine Control Module
SD signal degrade; standard definition
SD-FEC Soft Decision Forward Error Correction
SDH synchronous digital hierarchy
Acronym Definition
Acronym Definition
T/U/V
TAC technical assistance center
TAM Tributary Adapter Module
TAP Timing and Alarm Panel
TCA threshold crossing alert
TCC threshold crossing condition
TCM tandem connection monitoring
TCP transmission control protocol
TE traffic engineering
TEC thermo-electric cooler
TEM TAM Extender Module
TERM terminal
TFTP trivial file transfer protocol
TID target identifier
TIM Tributary Interface Module; trace identifier mismatch
TL1 Transaction Language 1
TLA terminal line amplifier
TLS tunable laser source
TMA traffic management action list
TMF TeleManagement Forum
TMN telecommunications management network
Acronym Definition
W/X/Y/Z
WAN wide area network
WDM wavelength division multiplexing
WPCS Wet Plant Control and Surveillance System
Acronym Definition
MISC
1R re-amplification
2R re-amplification, re-shape
3R re-amplification, re-shape, re-time
4R re-amplification, re-shape, re-time, re-code
µEDFA micro-erbium doped fiber amplifier