Cisco ONS 15454 SDH Installation and Operations Guide, Release 3.3
Chapter 3, Node Setup

Table of Contents

Node Setup
3.1 Before You Begin
3.2 Setting Up Basic Node Information
3.3 Setting Up Network Information
3.4 Creating Users and Setting Security
3.5 Setting Up ONS 15454 SDH Timing
3.6 Creating Card Protection Groups

Node Setup


This chapter explains how to set up a Cisco ONS 15454 SDH node using Cisco Transport Controller (CTC). Table 3-1 lists node setup topics. Table 3-2 lists node setup procedures. The chapter also includes a list of required information for node setup. Refer to "Set up PC and Log into CTC" for CTC setup procedures.

3.1 Before You Begin

Before you begin node setup, you will need:

  • Node name
  • Contact name (optional)
  • Location (optional)
  • Longitude and latitude (optional). You can find the longitude and latitude for cities from the Latitude and Longitude of World Cities website (http://www.infoplease.com/ipa/A0001769.html).
  • Date and time
  • Time zone

If the ONS 15454 SDH will be connected to a network, you will need:

  • The IP address and subnet mask to assign to the node
  • The IP address of the default router
  • If Dynamic Host Configuration Protocol is used, you will need the IP address of the DHCP server

If you are responsible for setting up IP networking for the ONS 15454 SDH network, see "IP Networking" for more information.

To create card protection groups, you will need to know:

  • The card protection scheme that will be used and what cards will be included in it
  • The SDH protection topology that will be used for the node

  • Note   You must be able to log into the node to complete node provisioning. If you cannot log into the node, see the "Setting Up the CTC Computer" section.

3.2 Setting Up Basic Node Information

Setting basic information for each Cisco ONS 15454 SDH node is one of the first provisioning tasks you perform. This information includes node name, location, contact, latitude, longitude, dates, and time.

Procedure: Add the Node Name, Contact, Location, Date, and Time

Purpose

Use this procedure to set node identification and other node-specific information.

Prerequisite Procedures

"Logging into CTC" section.

Onsite/Remote

Onsite or remote


Step 1   Start CTC for an ONS 15454 SDH node. The CTC node view is displayed.

Step 2   Click the Provisioning > General tabs.


Figure 3-1   Setting up general node information


Step 3   Enter the following:

  • Node Name—Type a name for the node. For TL1 compliance, names must begin with an alpha character and have no more than 20 alphanumeric characters. (TL1 is not available in SDH Software R3.3.)
  • Contact—Type the name of the node contact person and the phone number (optional).
  • Location—Type the node location, for example, a city name or specific office location (optional).
  • Latitude—Enter the node latitude: N (North) or S (South), degrees, and minutes (optional).
  • Longitude—Enter the node longitude: E (East) or W (West), degrees, and minutes (optional).

CTC uses the latitude and longitude to position node icons on the network view map.


Note   You can also position nodes manually by pressing Ctrl and dragging the node icon to a new location.

To convert a coordinate in degrees to degrees and minutes, multiply the number after the decimal by 60. For example, the latitude 38.250739 converts to 38 degrees, 15 minutes (.250739 x 60 = 15.0443, rounded to the nearest whole number).

  • Use SNTP/NTP Server—When checked, CTC uses a Simple Network Time Protocol (SNTP) server or Network Time Protocol (NTP) server to set the date and time of the node. Using an SNTP/NTP server ensures that all ONS 15454 SDH network nodes use the same date and time reference. The server synchronizes the nodes time after power outages or software upgrades.

If you check Use SNTP/NTP Server, type the server's IP address in the next field. If you do not use an SNTP/NTP server, complete the Date, Time, and Time Zone fields. The ONS 15454 SDH will use these fields for alarm dates and times. (CTC displays all alarms in the login node's time zone for cross network consistency.)

  • DateType the current date if you did not select Use SNTP/NTP Server.
  • TimeType the current time if you did not select Use SNTP/NTP Server.
  • Time ZoneSelect the time zone if you did not select Use SNTP/NTP Server.

Step 4   Click Apply.





3.3 Setting Up Network Information

Before you connect a node to other nodes or to a LAN, you must change the default IP address that is shipped with each ONS 15454 SDH (192.168.1.1). IP addresses are unique identifiers for devices—called hosts—that connect to TCP/IP networks. Every IP address includes a network number, which is assigned to an organization, and a host (device) number, which the organization's LAN administrator assigns to an individual network device.

Subnetting enables LAN administrators to create subnetworks that are transparent to the Internet. Within networks, ONS 15454 SDHs often exist as subnetworks, which are created by adding a subnet mask to the ONS 15454 SDH IP address.

Procedure: Set Up Network Information

Purpose

Use this procedure to start provisioning a network. Additional ONS 15454 SDH networking information and procedures, including IP addressing examples, static route scenarios and Open Shortest Path First (OSPF) protocol options are provided in Chapter 3, "IP Networking."

Prerequisite Procedures

  • The IP address and subnet mask to assign to the node
  • The IP address of the default router
  • If Dynamic Host Configuration Protocol is used, you will need the IP address of the DHCP server

Onsite/Remote

Onsite or remote


Step 1   Log into CTC or navigate to the node view. Click the Provisioning > Network tabs (Figure 3-2).


Figure 3-2   Setting up general network information


Step 2   Complete the following:

  • IP Address—Type the IP address assigned to the ONS 15454 SDH node.
  • Prevent LCD IP Config—If checked this field prevents the ONS 15454 SDH IP address from being changed using the LCD. If you want to use the LCD, see the "Change IP Address, Default Router, and Network Mask Using the LCD" procedure.
  • Default Router—Check this field if the ONS 15454 SDH must communicate with a device on a network that the ONS 15454 SDH is not connected to. The ONS 15454 SDH forwards the packets to the default router. Type the IP address of the router in this field. If the ONS 15454 SDH is not connected to a LAN, leave the field blank.
  • Subnet Mask Length—If the ONS 15454 SDH is part of a subnet, type the subnet mask length (decimal number representing the subnet mask length in bits) or click the arrows to adjust the subnet mask length. The subnet mask length is the same for all ONS 15454 SDHs in the same subnet.

Note    The MAC Address is read only. It displays the ONS 15454 SDH address used by the IEEE 802 Media Access Control (MAC) layer.

  • Forward DHCP Requests ToWhen checked, this field forwards Dynamic Host Configuration Protocol requests to the IP address entered in the Request To field. DHCP is a TCP/IP protocol that enables CTC computers to get temporary IP addresses from a server. If you enable DHCP, CTC computers that are directly connected to an ONS 15454 SDH node can find temporary IP addresses from the DHCP server.
  • TCC CORBA (IIOP) Listener PortSets a listener port to allow communication with the ONS 15454 SDH through firewalls. See the "Accessing ONS 15454 SDH Behind Firewalls" section for more information.
  • Gateway SettingsSee "Scenario 8: Provisioning the ONS 15454 SDH Proxy Server" section for detailed information.
    • Craft Access Only—When this choice is enabled, the ONS 15454 SDH neither installs nor advertises default or static routes. CTC computers can communicate with the ONS 15454 SDH, but they cannot communicate directly with any other DCC-connected ONS 15454 SDH.

In a configuration where all nodes are on the same subnet, if you start a CTC session before proper provisioning, the login node will appear grey in the CTC network view. Other CTC users will not be able to open the grey-colored node to access their node. Provision a static route on the node that is LAN-connected, or, if you are directly connected to the node, provision craft access. For procedures, see "Scenario 5: Using Static Routes to Connect to LANs" section, or "Scenario 8: Provisioning the ONS 15454 SDH Proxy Server" section.

  • Enable Proxy—When this choice is enabled, the ONS 15454 SDH responds to CTC client requests with a list of DCC-connected ONS 15454 SDHs for which the node serves as a proxy. The CTC client establishes connections through the proxy server for any ONS 15454 SDH in the returned list. By using the proxy, the CTC client can connect to nodes that the PC on which the CTC client runs cannot access. If Enable Proxy is off, the node responds to CTC requests with an empty list, indicating that it is not willing to serve as a proxy.
  • Enable Firewall—If this choice is selected, the node prevents IP traffic from being routed between the DCC and the LAN port. The ONS 15454 SDH can communicate with machines connected to the LAN port or connected through the DCC. However, the DCC-connected machines cannot communicate with the LAN-connected machines, and the LAN-connected machines cannot communicate with the DCC-connected machines. A CTC node using the LAN to reach the firewalling node can use the proxy capability to manage the unreachable, DCC-connected nodes. CTC connected to a DCC-connected node can only manage other DCC-connected nodes and the firewall itself.

Step 3   Click Apply.

Step 4   Click Yes on the confirmation dialog box.

Both ONS 15454 SDH TCC-I cards will reboot, one at a time.


Note   CTC software does not monitor for the presence or absence of FMECs unless the TCC-I(s) card is Active/Stby. During transitional states such as power-up or TCC-I reset, CTC ignores the FMEC inventory displayed in node view.





Procedure: Change IP Address, Default Router, and Network Mask Using the LCD

Purpose

You can change the ONS 15454 SDH IP address, subnet mask, and default router address using the Slot, Status, and Port buttons on the front panel LCD.

Prerequisite Procedures

  • The IP address and subnet mask to assign to the node
  • The IP address of the default router
  • If Dynamic Host Configuration Protocol is used, you will need the IP address of the DHCP server

Onsite/Remote

Onsite or remote


Step 1   On the ONS 15454 SDH front panel, repeatedly press the Slot button until Node appears on the LCD.


Note    The LCD reverts to normal display mode after 5 seconds of button inactivity.

Step 2   Repeatedly press the Port button until the following displays:

  • To change the node IP address, Status=IpAddress (Figure 3-3)
  • To change the node network mask, Status=Net Mask
  • To change the default router IP address, Status=Default Rtr

Figure 3-3   Selecting the IP address option


Step 3   Press the Status button to display the node IP address (Figure 3-4), the node subnet mask length, or the default router IP address.


Figure 3-4   Changing the IP address


Step 4   Push the Slot button to move to the IP address or subnet mask digit you need to change. The selected digit flashes.

Step 5   Press the Port button to cycle the IP address or subnet mask digit to the correct digit.

Step 6   When the change is complete, press the Status button to return to the Node menu.

Step 7   Repeatedly press the Port button until the Save Configuration option appears (Figure 3-5).


Figure 3-5   Selecting the Save Configuration option


Step 8   Press the Status button to select the Save Configuration option.

A Save and REBOOT message appears (Figure 3-6).


Figure 3-6   Saving and rebooting the TCC-I


Step 9   Press the Slot button to save the new IP address configuration. (Or press Port to cancel the configuration.)

Saving the new configuration causes the TCC-I cards to reboot. During the reboot, a "Saving Changes - TCC Reset" message displays on the LCD. The LCD returns to the normal alternating display after the TCC-I reboot is complete.


Note   CTC software does not monitor for the presence or absence of FMECs unless the TCC-I(s) card is active/standby. During transitional states such as power-up or TCC-I reset, CTC ignores the FMEC inventory displayed in node view.





3.4 Creating Users and Setting Security

Use the CISCO15 user, provided with each ONS 15454 SDH, to set up other ONS 15454 SDH users. You can add up to 500 users to one ONS 15454 SDH. Each ONS 15454 SDH user can be assigned one of the following security levels:

  • Retrieve users can retrieve and view CTC information but cannot set or modify parameters.
  • Maintenance users can access only the ONS 15454 SDH maintenance options.
  • Provisioning users can access provisioning and maintenance options.
  • Superusers can perform all of the functions of the other security levels as well as set names, passwords, and security levels for other users.

Each ONS 15454 SDH user has a specified amount of time that he or she can leave the system idle before the CTC window is locked. The lockouts prevent unauthorized users from making changes. Higher-level users have shorter idle times, as shown in Table 3-3.

Table 3-3   ONS 15454 SDH User Idle Times

Security Level  Idle Time 

Superuser

15 minutes

Provisioning

30 minutes

Maintenance

60 minutes

Retrieve

Unlimited

Table 3-4 shows the actions that each user can perform in node view. In the tables below, Yes means the user can use the specified tab or screen. Table cells with dashes (—) mean the user cannot use the specified tab or screen.

Table 3-4   ONS 15454 SDH Security Levels—Node View

CTC Tab  Subtab  Actions  Retrieve  Maint.  Provision  Super user 

Alarms

Synchronize alarms

Yes

Yes

Yes

Yes

Conditions

Retrieve conditions

Yes

Yes

Yes

Yes

History

Session

Read only

Yes

Yes

Yes

Yes

Node

Retrieve alarms/events

Yes

Yes

Yes

Yes

Circuits

Create, delete, or edit circuits

Yes

Yes

Search for circuits

Yes

Yes

Yes

Yes

Provisioning

General

Edit

Yes

Yes

Ether

Bridge

Spanning Trees: Edit

Yes

Yes

Thresholds: Create, or delete

Yes

Yes

Network

General: Edit

Yes

Static Routing: Create, edit, or delete

Yes

OSPF: Edit

Yes

Protection

Create, delete, or edit

Yes

Yes

Browse groups

Yes

Yes

Yes

Yes

Ring

All (MS-SPRing)

Yes

Yes

Security

Create or delete

Yes

Change password

Same User

Same User

Same User

All Users

SNMP

Create, delete, or edit

Yes

Browse trap destinations

Yes

Yes

Yes

Yes

SDH DCC

Create, or delete

Yes

View SDCC Terminations and DCC Tunnel Connections

Yes

Yes

Yes

Yes

Timing

Edit

Partial Edit

Partial Edit

Yes

Yes

Alarm Behavior

Edit

Yes

Yes

Orderwire

Create, or delete

Yes

Yes

Inventory

Delete card

Yes

Yes

Reset card

Yes

Yes

Yes

View equipment information

Yes

Yes

Yes

Yes

Maintenance

Database

Backup, or restore

Yes

Ether Bridge

Spanning Tree Retrieve

Yes

Yes

Yes

Yes

Spanning Tree Clear/Clear all

Yes

Yes

Yes

MAC Table Retrieve

Yes

Yes

Yes

Yes

MAC Table Clear/Clear all

Yes

Yes

Yes

Trunk Utilization Refresh

Yes

Yes

Yes

Yes

Protection

Switch/lock out operations

Yes

Yes

Yes

Ring

MS-SPRing maintenance

Yes

Yes

Yes

Software

Download/Activate/Revert

Yes

XC Cards

Switch/Lock/Unlock

Yes

Yes

Yes

Diagnostic

Retrieve Diagnostics File

Yes

Lamp Test (Will be available for Maintenance, Provisioning, and Super users in Software R3.4.)

Yes

Timing

Edit

Yes

Yes

Yes

Audit

Retrieve Audit Trail

Yes

Yes

Yes

Yes

Routing Table

Read only

Yes

Yes

Yes

Yes

Procedure: Create a New User with Security Settings

You can perform ONS 15454 SDH user management tasks from network or node view. In network view, you can add, edit, or delete users from multiple nodes at one time. If you perform user management tasks in node view, you can only add, edit, or delete users from that node.


Note   You must add the same user name and password to each node the user will access.

Purpose

Create new users with security settings.

Prerequisite Procedures

"Logging into CTC" section

Onsite/Remote

Onsite or remote


Step 1   In network view, select the Provisioning > Security tabs.

Step 2   On the Security pane, click Create.


Figure 3-7   Creating new users from the network view


Step 3   In the Create User dialog box, enter the following:

  • Name—Type the user name.
  • PasswordType the user password. The password must be a minimum of six and a maximum of ten alphanumeric characters (for example, ILM+12), where at least one character is numerical (0-9) and at least one special character is used (+, #,%).
  • Confirm Password—Type the password again to confirm it.
  • Security Level—Select the user's security level.

Step 4   Under "Select applicable nodes," deselect any nodes where you do not want to add the user (all network nodes are selected by default).

Step 5   Click OK.


Note   New users can also be created from node view. If you add a user in node view, you can only add, edit, or delete users from that node (Figure 3-8).


Figure 3-8   Creating new users from the node view






Procedure: Change a User's Security Settings

Purpose

Change a user's security settings.

Prerequisite Procedures

"Logging into CTC" section

"Create a New User with Security Settings" section

Onsite/Remote

Onsite or remote


Step 1   In network view, select the Provisioning > Security tabs.

Step 2   Click a name under the list of users.


Figure 3-9   Changing a user's security settings from the network view


Step 3   On the Selected User dialog box, edit the user information: name, password, password confirmation, and/or security level. (A Superuser does not need to enter an old password. Other users must enter their old password when changing their own passwords.)


Note    You cannot change the CISCO15 user name.

Step 4   If you do not want the user changes to apply to all network nodes, deselect the nodes that you do not want to change in the Change Users dialog box.

Step 5   Click OK.

Changed user permissions and access levels do not take effect until the user logs out of CTC and logs back in.


Note    User security settings can also be changed from node view (Figure 3-10).


Figure 3-10   Changing a user's security settings from the node view






Procedure: Delete a User's Security Settings

Purpose

Delete a user's security settings.

Prerequisite Procedures

"Logging into CTC" section

"Create a New User with Security Settings" section

Onsite/Remote

Onsite or remote


Step 1   In network view, select the Provisioning > Security tabs.

Step 2   Click Delete.


Figure 3-11   Deleting a user from the network view


Step 3   On the Delete User dialog box, enter the name of the user you want to delete.

Step 4   If you do not want to delete the user from all network nodes, deselect the nodes.

Step 5   Click OK and click Apply.


Note   User security settings can also be deleted from node view (Figure 3-12).


Figure 3-12   Deleting a user from the node view






3.5 Setting Up ONS 15454 SDH Timing

SDH timing parameters must be set for each ONS 15454 SDH.

3.5.1 Timing Sources and Modes

Each ONS 15454 SDH independently accepts its timing reference from one of three sources:

  • The Timing A and Timing B connector on the MIC-C/T/P FMEC in Slot 24.

  • Note   CTC refers to Timing A and Timing B as BITS (Building Integrated Timing Supply) 1 and BITS 2.

  • An STM-N card installed in the ONS 15454 SDH. The STM-N card is connected to a node that receives timing through a BITS source.
  • The internal ST3 clock on the TCC-I card.

You can set ONS 15454 SDH timing to one of three modes: external, line, or mixed. If timing is coming from the MIC-C/T/P FMEC timing connector, set ONS 15454 SDH timing to external. If the timing comes from an STM-N card, set the timing to line.


Note   The line timing mode is not available for 64 KHz.

In typical ONS 15454 SDH networks:

  • One node is set to external. The external node derives its timing from a MIC-C/T/P FMEC timing connector. The MIC-C/T/P FMEC, in turn, derives its timing from a Primary Reference Source (PRS) such as a Stratum 1 clock or global positioning satellite (GPS) signal.
  • The other nodes are set to line. The line nodes derive timing from the externally-timed node through the STM-N trunk cards.

You can set three timing references for each ONS 15454 SDH. The first two references are typically two FMEC-level sources, or two line-level sources optically connected to a node with a BITS source. The third reference is the internal clock provided on every ONS 15454 SDH TCC-I card. This clock is a Stratum 3 (ST3). If an ONS 15454 SDH becomes isolated, timing is maintained at the ST3 level.


Caution   Mixed timing allows you to select both external and line timing sources. However, Cisco does not recommend its use because it can create timing loops. Use this mode with caution.

3.5.2 Network Timing Example

Figure 3-13 shows an ONS 15454 SDH network timing setup example. Node 1 is set to external timing. Two timing references are set to BITS. These are Stratum 1 timing sources connected to the MIC-C/T/P FMEC. The third reference is set to internal clock. The Timing A and Timing B out connectors on the MIC-C/T/P FMEC of Node 3 are used to provide timing to outside equipment.

In the example, Slots 5 and 6 contain the trunk cards. Timing at Nodes 2, 3, and 4 is set to line, and the timing references are set to the trunk cards based on distance from the MIC-C/T/P FMEC. Reference 1 is set to the trunk card closest to the timing source. At Node 2, Reference 1 is Slot 5 because it is connected to Node 1. At Node 4, Reference 1 is set to Slot 6 because it is connected to Node 1. At Node 3, Reference 1 could be either trunk card because they are equal distance from Node 1.


Figure 3-13   An ONS 15454 SDH timing example


3.5.3 Synchronization Status Messaging

Synchronization Status Messaging (SSM) communicates information about the quality of the timing source. The SSM supported in SDH is G.811, STU, G812T, G812L, SETS, DUS (ordered from high quality to low quality). SSM messages are carried on bits 5 to 8 of SDH overhead byte S1. They enable SDH devices to automatically select the highest quality timing reference and to avoid timing loops.


Note   The message set in San1 to San4 is a copy of the set defined in SDH bits 5 to 8 of byte S1.

Table 3-5   Assignment of Bit Patterns as Shown in ITU G.704

QL  San1, San2, San3, or San4 S1 bits b5-b8 
SDH Synchronization Quality Level (QL) Description
 

0

0000

Quality unknown (existing synchronization network)

1

0001

Reserved

2

0010

Rec. G.811

3

0011

Reserved

4

0100

Synchronization Supply Unit (SSU-A)

5

0101

Reserved

6

0110

Reserved

7

0111

Reserved

8

1000

Synchronization Supply Unit (SSU-B)

9

1001

Reserved

10

1010

Reserved

11

1011

Synchronous Equipment Timing Source (SETS)

12

1100

Reserved

13

1101

Reserved

14

1110

Reserved

15

1111

Do not use for synchronization

Procedure: Set up External, Line, or Mixed Timing for the ONS 15454 SDH


Note   CTC refers to Timing A and Timing B as BITS (Building Integrated Timing Supply) 1 and BITS 2. The MIC-C/T/P FMEC connector is labeled as Timing A and Timing B.

Purpose

Use this procedure to set external, line, or mixed timing for your ONS 15454 SDH nodes. To set up internal timing, see the "Set Up Internal Timing for the ONS 15454 SDH" procedure.

Prerequisite Procedures

"Logging into CTC" section

"Add the Node Name, Contact, Location, Date, and Time" section

"Set Up Network Information" section

Onsite/Remote

Onsite or remote


Step 1   From the CTC node view, click the Provisioning > Timing tabs (Figure 3-14).


Figure 3-14   Setting up external, line, or mixed ONS 15454 SDH timing


Step 2   In the General Timing section, complete the following information:

  • Timing Mode—Choose External if the ONS 15454 SDH derives its timing from a MIC-C/T/P FMEC; choose Line if timing is derived from an STM-N card that is optically connected to the timing node. A third option, Mixed, allows you to set external and line timing references. (Because Mixed timing may cause timing loops, Cisco does not recommend its use. Use this mode with care.)
  • Revertive—If this checkbox is selected, the ONS 15454 SDH reverts to a primary reference source after the conditions that caused it to switch to a secondary timing reference are corrected.
  • Revertive Time—If Revertive is checked, indicate the amount of time the ONS 15454 SDH will wait before reverting to its primary timing source.

Step 3   In the BITS Facilities section, complete the following information:


Note    The BITS Facilities section sets the parameters for your BITS1 and BITS2 timing references. Many of these settings are determined by the timing source manufacturer. If equipment is timed through BITS Out, you can set timing parameters to meet the requirements of the equipment.

  • E1, 2.048 MHz, 64 KHz—Choose E1, 2.048 MHz, or 64 KHz depending on the signal supported in your market. For example, 64 KHz is used in Japan. E1, 2.048 MHz, and 64 KHz are physical signal modes used to transmit the external clock (from a GPS for example) to BITS.
  • State—Set the BITS reference to IS (In Service) or OOS (Out of Service). For nodes set to Line timing with no equipment timed through BITS Out, set State to OOS. For nodes using External timing or Line timing with equipment timed through BITS Out, set State to IS.
  • Coding—Choose the coding used by your BITS reference, either HDB3 or AMI. If you selected 2.048 MHz, or 64 KHz, the coding option is disabled.
  • Framing—Choose the framing used by your BITS reference, either unframed, FAS, FAS + CAS, FAS + CRC, or FAS + CAS + CRC. If you selected 2.048 MHz, or 64 KHz, the framing option is disabled.
  • Sync Messaging—Select the checkbox to enable synchronization status message (SSM). SSM is used to deliver clock quality. The SSM supported in SDH is G811, STU, G812T, G812L, SETS, DUS (ordered from high quality to low quality). If you selected 2.048 MHz, or 64 KHz, the SSM option is disabled.
  • AIS Threshold—Sets the quality level at which a node sends an Alarm Indication Signal (AIS) from the BITS 1 Out and BITS 2 Out FMEC connector. When a node times at or below the AIS Threshold quality, an AIS is sent. (The AIS Threshold is used when Sync. Messaging is disabled or framing is set to unframed, FAS, or FAS + CAS.)
  • LBO—Choose a BITS cable length. Line build out (LBO) relates to the BITS cable length.
  • Sa bit—Choose one of 5 Sa bits (Sa4, Sa5, Sa6, Sa7, and Sa8). The Sa bit transmits the SSM message. If you selected 2.048 MHz or 64 KHz, the Sa bit option is disabled.

Step 4   Under Reference Lists, complete the following information:


Figure 3-15   Reference list on the ONS 15454 SDH timing tab



Note    Reference lists define up to three timing references for the node and up to six BITS Out references. BITS Out references define the timing references used by equipment attached to the node's MIC-C/T/P FMEC Timing A and Timing B Out connector. If you attach equipment to the Timing A or B Out connector, you normally attach it to a node with Line mode because equipment near the External timing reference can be directly wired to the reference.

  • NE Reference—Allows you to define three timing references (Ref 1, Ref 2, Ref 3). The node uses Reference 1 unless a failure occurs to that reference, in which case, the node uses Reference 2. If Reference 2 fails, the node uses Reference 3, which is typically set to Internal Clock. The internal clock is the Stratum 3 clock provided on the TCC-I. The options displayed depend on the Timing Mode setting.
    • Timing Mode set to External—Your options are BITS1, BITS2, and Internal Clock.
    • Timing Mode set to Line—Your options are the node's working optical cards and Internal Clock. Select the cards/ports that are directly or indirectly connected to the node wired to the BITS source, that is, select the node's trunk cards. Set Reference 1 to the trunk card that is closest to the BITS source. For example, if Slot 5 is connected to the node wired to the BITS source, select Slot 5 as Reference 1.
    • Timing Mode set to Mixed—Both BITS and optical cards are available, allowing you to set a mixture of external BITS and optical trunk cards as timing references.
  • BITS 1 Out/BITS 2 Out—Define the timing references for equipment connected to the Timing A or B Out FMEC connector. Normally, Timing Out is used with Line nodes, so the options displayed are the working optical cards. Timing A and Timing B Out are enabled as soon as BITS-1 and BITS-2 facilities are placed in service.

Step 5   Click Apply.


Note   Refer to the Cisco ONS 15454 SDH Troubleshooting and Maintenance Guide for timing-related alarms.





Procedure: Set Up Internal Timing for the ONS 15454 SDH


Note   CTC refers to Timing A and Timing B as BITS (Building Integrated Timing Supply) 1 and BITS 2. The MIC-C/T/P FMEC connector is labeled as Timing A and Timing B.

Purpose

If no BITS source is available, you can set up internal timing by timing all nodes in the ring from the internal clock of one node. Internal timing is Stratum 3 and not intended for permanent use. All ONS 15454 SDHs should be timed to a Stratum 2 or better primary reference source.

Use this procedure to set internal timing for your ONS 15454 SDH nodes. To set up external, line, or mixed timing, see the "Set up External, Line, or Mixed Timing for the ONS 15454 SDH" procedure.

Prerequisite Procedures

"Logging into CTC" section

"Add the Node Name, Contact, Location, Date, and Time" section

"Set Up Network Information" section

Onsite/Remote

Onsite or remote


Step 1   Log into the node that will serve as the timing source.

Step 2   From the CTC node view, click the Provisioning > Timing tabs (Figure 3-16).


Figure 3-16   Setting up internal ONS 15454 SDH timing


Step 3   In the General Timing section, enter the following:

  • Timing Mode—Choose External.
  • Revertive—Not relevant for internal timing; the default setting (checked) is sufficient.
  • Revertive Time—Not relevant for internal timing; the default setting (5 minutes) is sufficient.

Step 4   In the BITS Facilities section, enter the following information:

  • E1, 2.048 MHz, 64 KHz—Choose E1, 2.048 MHz, or 64 KHz depending on the signal supported in your market. For example, 64 KHz is used in Japan. E1, 2.048 MHz, and 64 KHz are physical signal modes used to transmit the external clock (from a GPS for example) to BITS.
  • State—Set BITS 1 and BITS 2 to OOS (Out of Service).
  • Coding—Not relevant for internal timing; the default (HDB3) is sufficient.
  • Framing—Not relevant for internal timing; the default (FAS + CAS + CRC) is sufficient.
  • Sync Messaging—The box is checked automatically. Synchronization status message (SSM) is used to deliver clock quality. The SSM supported in SDH is G811, STU, G812T, G812L, SETS, DUS (ordered from high quality to low quality). If you selected 2.048 MHz, or 64 KHz, the SSM option is disabled.
  • AIS Threshold—Not relevant for internal timing.
  • LBO—Not relevant for internal timing; line build out (LBO) relates to the BITS cable length.
  • Sa bit—Not relevant for internal timing; the Sa bit is used to transmit the SSM message.

Step 5   In the Reference Lists section, enter the following information:

  • NE Reference
    • Ref1—Set to Internal Clock.
    • Ref2—Set to Internal Clock.
    • Ref3—Set to Internal Clock.
  • BITS 1 Out/BITS 2 Out—Set to None

Step 6   Click Apply.

Step 7   Log into a node that will be timed from the node set up in Step 1 to Step 6.

Step 8   In the CTC node view, click the Provisioning > Timing tabs.

Step 9   In the General Timing section, enter the following:

  • Timing Mode—Set to Line.
  • Revertive—Not relevant for internal timing; the default setting (checked) is sufficient.
  • Revertive Time—The default setting (5 minutes) is sufficient.

Step 10   In the Reference Lists section, enter the following:

  • NE Reference
    • Ref-1—Use the pull-down menu to choose the STM-N trunk card with the closest connection to the node in Step 3.
    • Ref-2—Use the pull-down menu to choose the STM-N trunk card with the next closest connection to the node in Step 3.
    • Ref-3—Use the pull-down menu to choose Internal Clock.

Step 11   Click Apply.

Step 12   Repeat Step 7 to Step 11 at each node that will be timed by the node serving as the timing source.





3.6 Creating Card Protection Groups

The ONS 15454 SDH provides several card protection methods. When you set up protection for ONS 15454 SDH cards, you must choose between maximum protection and maximum slot availability. The highest protection reduces the number of available card slots; the highest slot availability reduces the protection. Table 3-6 shows the protection types that can be set up for ONS 15454 SDH cards.

Table 3-6   Protection Types

Type  Cards  Description 

1:1

E1-N-14

E3-12

DS3i-N-12

Pairs one working card with one protect card. Install the protect card in an odd-numbered slot and the working card in an even-numbered slot next to the protect slot towards the center, for example: protect in Slot 1, working in Slot 2; protect in Slot 3, working in Slot 4; protect in Slot 15, working in Slot 14.

1:N

E1-N-14

DS3i-N-12

Assigns one protect card for several working cards. The maximum is 1:5. Protect cards (E1-N-14, DS3i-N-12) must be installed in Slots 3 or 15 and the cards they protect must be on the same side of the shelf. Protect cards must match the cards they protect. For example, a E1-N-14 can only protect E1-N-14 cards. If a failure clears, traffic reverts to the working card after the reversion time has elapsed.

1+1

Any optical

Pairs a working optical port with a protect optical port. Protect ports must match the working ports. For example, Port 1 of an STM-1 card can only be protected by Port 1 of another STM-1 card. Cards do not need to be in adjoining slots.

Unprotected

Any

Unprotected cards can cause signal loss if a card fails or incurs a signal error. However, because no card slots are reserved for protection, unprotected schemes maximize the service available for use on the ONS 15454 SDH. Unprotected is the default protection type.

Procedure: Create Protection Groups

Purpose

Use this procedure to create card protection groups for the ONS 15454 SDH. Unprotected cards can cause signal loss if a card fails or incurs a signal error.

Prerequisite Procedures

"Logging into CTC" section

"Add the Node Name, Contact, Location, Date, and Time" section

"Set Up Network Information" section

"Setting Up ONS 15454 SDH Timing" section

Onsite/Remote

Onsite or remote


Step 1   From the CTC node view, click the Provisioning > Protection tabs.

Step 2   Under Protection Groups, click Create.


Figure 3-17   Creating card protection groups


Step 3   In the Create Protection Group dialog box, enter the following:

  • Name—Type a name for the protection group. The name can have up to 32 alphanumeric characters.
  • Type—Choose the protection type (1:1, 1:N, or 1+1) from the pull-down menu. The protection selected determines the cards that are available to serve as protect and working cards. For example, if you choose 1:N protection, only E1-N-14 and DS3i-N-12 cards are displayed.
  • Protect Card or Port—Choose the protect card (if you are using 1:1 or 1:N) or protect port (if you are using 1+1) from the pull-down menu.

Based on these selections, a list of available working cards or ports is displayed under Available Cards or Available Ports. Figure 3-18 shows a 1:1 protection group.


Figure 3-18   Creating a 1:1 protection group


Step 4   From the Available Cards or Available Ports list, choose the card or port that you want to be the working card or port (the card(s) or port(s) that will be protected by the card or port selected in Protect Cards or Protect Ports). Click the top arrow button to move each card/port to the Working Cards or Working Ports list.

Step 5   Complete the remaining fields:

  • Bidirectional switching—(optical cards only) Click if you want both the transmit and the receive channels to switch if a failure occurs to one.
  • Revertive—If checked, the ONS 15454 SDH reverts traffic to the working card or port after failure conditions stay corrected for the amount of time entered in Reversion time.
  • Reversion time—If Revertive is checked, enter the amount of time that will elapse after a failure is corrected before the ONS 15454 SDH will revert to the working card or port.

Step 6   Click OK.


Caution   Before running traffic on a protected card within a protection group, enable the ports of all protection group cards. See the "Set Card Ports In Service" procedure.


Note   To convert protection groups, see the "Converting E1-N14 and DS-3i-N-12 Cards From 1:1 to 1:N Protection" section.





Procedure: Edit Protection Groups

Purpose

Use this procedure to make changes to your card protection scheme.

Prerequisite Procedures

"Create Protection Groups" section

Onsite/Remote

Onsite or remote


Step 1   From the CTC node view, click the Provisioning > Protection tabs.

Step 2   In the Protection Groups section, choose a protection group.

Step 3   In the Selected Group section, edit the fields as appropriate:

  • Name—Type a name for the protection group. The name can have up to 32 alphanumeric characters.
  • Type—Choose the protection type (1:1, 1:N, or 1+1) from the pull-down menu. The protection selected determines the cards that are available to serve as protect and working cards. For example, if you choose 1:1 protection, only E1, E3, and DS3i cards are displayed.
  • Protect Card or Port—Choose the protect card (if you are using 1:1 or 1:N) or protect port (if you are using 1+1) from the pull-down menu.

Based on these selections, a list of available working cards or ports is displayed under Available Cards or Available Ports.

Step 4   From the Available Cards or Available Ports list, choose the card or port that you want to be the working card or port (that is, the card(s) or port(s) that will be protected by the card or port selected in Protect Cards or Protect Ports). Click the top arrow button to move each card/port to the Working Cards or Working Ports list.

Step 5   Complete the remaining fields:

  • Bidirectional switching—(optical cards only) Click if you want both the transmit and the receive channels to switch if a failure occurs to one.
  • Revertive—If checked, the ONS 15454 SDH reverts traffic to the working card or port after a failure has been corrected for the amount of time entered in Reversion time.
  • Reversion time—If Revertive is checked, enter the amount of time following a failure correction that the ONS 15454 SDH will revert to the working card or port.

Step 6   Click Apply.





Procedure: Delete Protection Groups

Purpose

Use this procedure to delete a card protection group.

Prerequisite Procedures

"Create Protection Groups" section

Onsite/Remote

Onsite or remote


Step 1   From the CTC node view, click the Maintenance > Protection tabs.

Step 2   Verify that working traffic is not running on the protect card:

a. In the Protection Groups section, choose the group you want to delete.

b. In the Selected Group section, verify that the protect card is in standby mode. If the protect card is in standby mode, continue with Step 3. If it is active, complete Step c.

c. If the working card is in standby mode, manually switch traffic back to the working card. In the Selected Group pane, click the working card, then click Manual. Verify that the protect card switches to standby mode and the working card is active. If the protect card is standby, continue with Step 3. If the protect card is still active, do not continue. Begin troubleshooting procedures or call technical support.

Step 3   From the node view, click the Provisioning > Protection tabs.

Step 4   In the Protection Groups section, click a protection group.

Step 5   Click Delete.