14.11.2014 Views

An Introduction to the Ericsson Transport Network Architecture ...

An Introduction to the Ericsson Transport Network Architecture ...

An Introduction to the Ericsson Transport Network Architecture ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

66<br />

<strong>to</strong> <strong>the</strong> OS upon detection of a serious fault<br />

in <strong>the</strong> network, but it also controls diagnostic<br />

and test routines:<br />

- Alarm Surveillance<br />

The SDH NEs have <strong>the</strong> capability <strong>to</strong><br />

send alarm reports <strong>to</strong> <strong>the</strong> OS upon detection<br />

of a failure, and <strong>to</strong> s<strong>to</strong>re <strong>the</strong><br />

alarms in an event log<br />

- Fault Localisation and Testing<br />

The SDH NEs can be ordered <strong>to</strong> perform<br />

loopbacks, error injection, self-diagnostics,<br />

etc.<br />

Performance Management (PM)<br />

Performance management deals with <strong>the</strong><br />

functions necessary for an NE <strong>to</strong> collect,<br />

s<strong>to</strong>re, threshold, and report performance<br />

data associated with its moni<strong>to</strong>red PDH<br />

and SDH trail terminations. All applicationspecific<br />

and optional parameters, as specified<br />

in CCITT Rec. G.784, are supported.<br />

- PM Data Attribute Setting<br />

Basic PM data attributes, such as<br />

threshold values, can be defined<br />

- PM Data Reporting<br />

The SDH NEs can send PM data reports<br />

<strong>to</strong> an OS, ei<strong>the</strong>r when a defined<br />

threshold is exceeded (degraded or<br />

unacceptable performance level) or in<br />

accordance with predefined schedules<br />

- PM Data Logging<br />

PM data can be s<strong>to</strong>red in logs within<br />

<strong>the</strong> NEs and fetched by <strong>the</strong> OS when<br />

demanded.<br />

Security Management (SM)<br />

Security management functions deal with<br />

user access control <strong>to</strong> protect <strong>the</strong> network<br />

against unauthorised access <strong>to</strong> resources<br />

and services.<br />

- Login/Logout<br />

A local opera<strong>to</strong>r trying <strong>to</strong> access <strong>the</strong><br />

NE is checked against a user identity<br />

and a password<br />

• User Categories<br />

A user category defines different levels<br />

of function access privileges that<br />

can be assigned <strong>to</strong> a user. The lowest<br />

privilege level is read access, and <strong>the</strong><br />

highest level is <strong>the</strong> super-user category<br />

• Users<br />

New users can be defined and assigned<br />

a user identity, password and<br />

user category. Users can also be deleted.<br />

DCN Management<br />

DCN Management provides <strong>the</strong> functions<br />

necessary <strong>to</strong> control and configure <strong>the</strong><br />

data communication resources which<br />

allow communication <strong>to</strong> take place within<br />

<strong>the</strong> SDH Management <strong>Network</strong>.<br />

- <strong>Network</strong> Node Configuration<br />

Each SDH NE can be configured as a<br />

data communication node in <strong>the</strong> OSI<br />

environment, which means that addresses,<br />

application entity titles and<br />

names used locally must be defined<br />

- <strong>Network</strong> Route Configuration<br />

<strong>Network</strong> routes in <strong>the</strong> OSI context can<br />

be defined by means of routing tables<br />

and route priorities.<br />

The Information Model Perspective<br />

<strong>An</strong>o<strong>the</strong>r, more formal way of describing <strong>the</strong><br />

operation and control functionality is in<br />

terms of an Information Model (IM). <strong>An</strong> IM<br />

is an object-oriented description, independent<br />

of <strong>the</strong> actual physical realisation of<br />

<strong>the</strong> <strong>Network</strong> Element resources and how<br />

<strong>the</strong>se are managed.<br />

The Information Model consists of a collection<br />

of object classes, e.g. equipment,<br />

software, trail termination point, SDH<br />

Fig.1<br />

Model of Duplex Cross-connection<br />

Ptr<br />

CTP<br />

Bi<br />

Pointer<br />

Connection Termination Point<br />

Bidirectional<br />

ERICSSON REVIEW No. 3, 1992

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!