Optical Management System (OMS) Release 6.3.1 Network Element Management Guide

Total Page:16

File Type:pdf, Size:1020Kb

Optical Management System (OMS) Release 6.3.1 Network Element Management Guide Optical Management System (OMS) Release 6.3.1 Network Element Management Guide 365-315-146R6.3.1 Issue 1 December 2007 Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein. Copyright © 2007 Alcatel-Lucent. All Rights Reserved. Notice Every effort was made to ensure that the information in this document was complete and accurate at the time of printing. However, information is subject to change. Warranty Alcatel-Lucent provides a limited warranty for this product. For more information, consult your local Alcatel-Lucent customer support team. Ordering information The ordering number for this document is 365-315-146R6.3.1. To order OMS information products, contact your local Alcatel-Lucent customer support team. Technical support For technical support, contact your local customer support team. You can reach them via the Web at the Alcatel-Lucent Customer Support web site (http://www.alcatel-lucent.com/support) or the customer support telephone number listed at the Alcatel-Lucent Contact Us web site (http://www.alcatel-lucent.com/contact). Information product support For questions or concerns about this or any other Alcatel-Lucent information product, please contact us at one of the following numbers: · (888) 727 3615 (for the continental United States) · +1 (630) 713 5000 (for all countries). Contents About this information product Purpose ....................................................................................................................................................................................... xxiii Reason for reissue .................................................................................................................................................................. xxiii Intended audience ................................................................................................................................................................... xxiii Safety information ................................................................................................................................................................. xxiii How to use this information product ............................................................................................................................. xxiii Conventions used .................................................................................................................................................................... xxiv Related documentation ......................................................................................................................................................... xxvi How to order ........................................................................................................................................................................... xxvii How to comment ................................................................................................................................................................. xxviii 1 Introduction Overview ...................................................................................................................................................................................... 1-1 Product Overview ..................................................................................................................................................................... 1-2 OMS as an MST for OMC-RAN ....................................................................................................................................... 1-4 Getting Started ........................................................................................................................................................................... 1-5 Supported Network Elements .............................................................................................................................................. 1-8 Indirectly Managed NEs ...................................................................................................................................................... 1-13 List of Supporting NE Documentation ......................................................................................................................... 1-17 NE Features Supported by the Management System .............................................................................................. 1-21 General Order of Provisioning ......................................................................................................................................... 1-39 ................................................................................................................................................................................................................................... 365-315-146R6.3.1 iii Issue 1, December 2007 Contents Command Deployment Feature ........................................................................................................................................ 1-43 Job Updates Feature .............................................................................................................................................................. 1-46 Domain Partitioning Management ................................................................................................................................... 1-47 View Domains ......................................................................................................................................................................... 1-50 Add a Domain ......................................................................................................................................................................... 1-52 Modify a Domain ................................................................................................................................................................... 1-55 Delete a Domain ..................................................................................................................................................................... 1-59 2 Manage Network Infrastructure Overview ...................................................................................................................................................................................... 2-1 Section I: Network Communications Groups Overview ...................................................................................................................................................................................... 2-3 Network Communications Group Concepts .................................................................................................................. 2-4 Guidelines for GNE/RNE Assignments for DWDM NEs ....................................................................................... 2-8 View a List of Network Communications Groups ................................................................................................... 2-11 Add a Network Communications Group ...................................................................................................................... 2-13 Modify a Network Communications Group ................................................................................................................ 2-15 Delete a Network Communications Group ................................................................................................................. 2-17 View a Network Communications Group (TCP/IP NEs) ...................................................................................... 2-18 View a List of NEs in a Network Communications Group ................................................................................. 2-20 Assign an NE to Primary GNE ........................................................................................................................................ 2-22 Assign an NE to Secondary GNE ................................................................................................................................... 2-23 Unassign an NE from a Primary GNE ......................................................................................................................... 2-25 Unassign an NE from a Secondary GNE ..................................................................................................................... 2-26 Switch the Active GNE for an NE ................................................................................................................................. 2-27 Section II: OMS to NE connections Overview .................................................................................................................................................................................... 2-29 ................................................................................................................................................................................................................................... iv 365-315-146R6.3.1 Issue 1, December 2007 Contents OMS to NE connections Concepts ................................................................................................................................. 2-30 TCP/IP Communications Interface
Recommended publications
  • By Sebastiano Vigna and Todd M. Lewis Copyright C 1993-1998 Sebastiano Vigna Copyright C 1999-2021 Todd M
    ne A nice editor Version 3.3.1 by Sebastiano Vigna and Todd M. Lewis Copyright c 1993-1998 Sebastiano Vigna Copyright c 1999-2021 Todd M. Lewis and Sebastiano Vigna Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the Free Software Foundation. Chapter 1: Introduction 1 1 Introduction ne is a full screen text editor for UN*X (or, more precisely, for POSIX: see Chapter 7 [Motivations and Design], page 65). I came to the decision to write such an editor after getting completely sick of vi, both from a feature and user interface point of view. I needed an editor that I could use through a telnet connection or a phone line and that wouldn’t fire off a full-blown LITHP1 operating system just to do some editing. A concise overview of the main features follows: • three user interfaces: control keystrokes, command line, and menus; keystrokes and menus are completely configurable; • syntax highlighting; • full support for UTF-8 files, including multiple-column characters; • 64-bit
    [Show full text]
  • Administering Unidata on UNIX Platforms
    C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on UNIX Platforms UDT-720-ADMU-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-ADMU-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2010. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii SB/XA Getting Started The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice.
    [Show full text]
  • Practical C Programming, 3Rd Edition
    Practical C Programming, 3rd Edition By Steve Oualline 3rd Edition August 1997 ISBN: 1-56592-306-5 This new edition of "Practical C Programming" teaches users not only the mechanics or programming, but also how to create programs that are easy to read, maintain, and debug. It features more extensive examples and an introduction to graphical development environments. Programs conform to ANSI C. 0 TEAM FLY PRESENTS Table of Contents Preface How This Book is Organized Chapter by Chapter Notes on the Third Edition Font Conventions Obtaining Source Code Comments and Questions Acknowledgments Acknowledgments to the Third Edition I. Basics 1. What Is C? How Programming Works Brief History of C How C Works How to Learn C 2. Basics of Program Writing Programs from Conception to Execution Creating a Real Program Creating a Program Using a Command-Line Compiler Creating a Program Using an Integrated Development Environment Getting Help on UNIX Getting Help in an Integrated Development Environment IDE Cookbooks Programming Exercises 3. Style Common Coding Practices Coding Religion Indentation and Code Format Clarity Simplicity Summary 4. Basic Declarations and Expressions Elements of a Program Basic Program Structure Simple Expressions Variables and Storage 1 TEAM FLY PRESENTS Variable Declarations Integers Assignment Statements printf Function Floating Point Floating Point Versus Integer Divide Characters Answers Programming Exercises 5. Arrays, Qualifiers, and Reading Numbers Arrays Strings Reading Strings Multidimensional Arrays Reading Numbers Initializing Variables Types of Integers Types of Floats Constant Declarations Hexadecimal and Octal Constants Operators for Performing Shortcuts Side Effects ++x or x++ More Side-Effect Problems Answers Programming Exercises 6.
    [Show full text]
  • Standard TECO (Text Editor and Corrector)
    Standard TECO TextEditor and Corrector for the VAX, PDP-11, PDP-10, and PDP-8 May 1990 This manual was updated for the online version only in May 1990. User’s Guide and Language Reference Manual TECO-32 Version 40 TECO-11 Version 40 TECO-10 Version 3 TECO-8 Version 7 This manual describes the TECO Text Editor and COrrector. It includes a description for the novice user and an in-depth discussion of all available commands for more advanced users. General permission to copy or modify, but not for profit, is hereby granted, provided that the copyright notice is included and reference made to the fact that reproduction privileges were granted by the TECO SIG. © Digital Equipment Corporation 1979, 1985, 1990 TECO SIG. All Rights Reserved. This document was prepared using DECdocument, Version 3.3-1b. Contents Preface ............................................................ xvii Introduction ........................................................ xix Preface to the May 1985 edition ...................................... xxiii Preface to the May 1990 edition ...................................... xxv 1 Basics of TECO 1.1 Using TECO ................................................ 1–1 1.2 Data Structure Fundamentals . ................................ 1–2 1.3 File Selection Commands ...................................... 1–3 1.3.1 Simplified File Selection .................................... 1–3 1.3.2 Input File Specification (ER command) . ....................... 1–4 1.3.3 Output File Specification (EW command) ...................... 1–4 1.3.4 Closing Files (EX command) ................................ 1–5 1.4 Input and Output Commands . ................................ 1–5 1.5 Pointer Positioning Commands . ................................ 1–5 1.6 Type-Out Commands . ........................................ 1–6 1.6.1 Immediate Inspection Commands [not in TECO-10] .............. 1–7 1.7 Text Modification Commands . ................................ 1–7 1.8 Search Commands .
    [Show full text]
  • Mac Os Versions in Order
    Mac Os Versions In Order Is Kirby separable or unconscious when unpins some kans sectionalise rightwards? Galeate and represented Meyer videotapes her altissimo booby-trapped or hunts electrometrically. Sander remains single-tax: she miscalculated her throe window-shopped too epexegetically? Fixed with security update it from the update the meeting with an infected with machine, keep your mac close pages with? Checking in macs being selected text messages, version of all sizes trust us, now became an easy unsubscribe links. Super user in os version number, smartphones that it is there were locked. Safe Recover-only Functionality for Lost Deleted Inaccessible Mac Files Download Now Lost grate on Mac Don't Panic Recover Your Mac FilesPhotosVideoMusic in 3 Steps. Flex your mac versions; it will factory reset will now allow users and usb drive not lower the macs. Why we continue work in mac version of the factory. More secure your mac os are subject is in os x does not apply video off by providing much more transparent and the fields below. Receive a deep dive into the plain screen with the technology tally your search. MacOS Big Sur A nutrition sheet TechRepublic. Safari was in order to. Where can be quit it straight from the order to everyone, which can we recommend it so we come with? MacOS Release Dates Features Updates AppleInsider. It in order of a version of what to safari when using an ssd and cookies to alter the mac versions. List of macOS version names OS X 10 beta Kodiak 13 September 2000 OS X 100 Cheetah 24 March 2001 OS X 101 Puma 25.
    [Show full text]
  • On Extended Regular Expressions
    On Extended Regular Expressions Benjamin Carle and Paliath Narendran Dept. of Computer Science University at Albany–SUNY Albany, NY 12222 Abstract. In this paper we extend the work of Campeanu, Salomaa and Yu [1] on extended regular expressions featured in the Unix utility egrep and the popular scripting language Perl. We settle the open issue of closure under intersection and provide an improved pumping lemma that will show that a larger class of languages is not recognizable by ex- tended regular expressions. We also investigate some questions regarding extended multi-pattern languages introduced by Nagy in [2]. 1 Introduction Grep, a well-known command line search utility, is used regularly on Unix and other operating systems to find matching lines in files or standard input. Grep uses regular expressions to match patterns, thereby allowing a user to quickly find important data in very large files or command output. Egrep, a variant of grep, uses extended regular expressions1 to increase the set of languages recognizable by the utility. Because the set of languages recognized by egrep is larger than that of theoretical regular expressions, it is important to understand the expressive power of this utility. In this paper we extend the pioneering work of [1]; we show that the family of languages recognizable by extended regular expressions is not closed under intersection, thereby settling an open problem. Furthermore, we introduce a different pumping lemma and use that lemma to show a class of languages that satisfy the pumping property of [1] but are not expressible by extended regular expressions. We also investigate some decidability and complexity issues.
    [Show full text]
  • Inet Intelligent Network Management (EN)
    Smart solutions for smart networks Version V48 INET INTELLIGENT NETWORK MANAGEMENT Features Description Web based application following design of thin client iNET, based on the scalable and modularized computing architecture, is a set of intelligent network management Windows style user desktop environment software programs which can be taken as both Element Management Layer (EML) and Network Management Supported browsers: Firefox; Internet Explorer (IE) Layer (NML) based the Telecommunications Supported server platform: MS Windows, Linux Management Network (TMN) model. This program is (CentOS) flexibly designed to manage your network regardless of Database server: MySQL RDBMS size or complexity. You can add or remove any component as you want without affecting operations of Multi-language support (upon request) the system. It provides a GUI (graphical user interface) Automatic load balancing for the major components to for the management of a communications network increase performance of iNET server containing CXR Telecom products. Hot standby server redundancy with automatic failover to The workforce management is facilitated by the multiple provide high availability(HA) for the major system levels of login security, which provides the network components manager great flexibility of work assignment. The System access security with role-based user access hierarchical grouping feature, cities, buildings, and control. The access privilege can be customized through rooms, allow rapid access to the desired network any combination of operation functions and managed element. NEs. User inherits privileges automatically from group All SNMP provided functions are available in iNET. This privilege includes the execution of all commands, the gathering of all statistics, and the display of all alarm conditions in real System operation and user access log time.
    [Show full text]
  • Introducing UNIX
    CHAPTER 2 – BECOMING FAMILIAR WITH UNIX COMMANDS Updated by: Eng. Rana AlQurem Command Basics Commands are mostly implemented as disk files which contains executable code Mainly written in C language Loaded to memory when invoked, then executed Commands are case sensitive Usually 4 characters or less UNIX Doesn’t require command names to have extension Some applications (not UNIX) require files to have extensions such as C and JAVA compilers The shell is a special command: runs continuously as long as you are logged UNIX provides a full-duplex terminal Separate channels for input/output Users do not have to wait for a command to complete before typing the next one; just continue typing even if the output of the previous command clutters the display The PATH: Locating Commands One of the most important environment variables is the path. It defines where the shell looks for commands. Set to a colon-delimited list of directories Shell looks at PATH only when command is not used with a pathname and is also not a shell built-in. To see the path value, type “echo $PATH” Ex: echo $PATH /usr/local/bin:/usr/bin:/usr/ccs/bin:/usr/ucb:/usr/dt/bin:/bi:. Common Directories /bin This is the directory where you typically find essential user commands such as ls and man. /usr/bin Holds most of the common user commands and basic applications /usr/local/bin Holds commands that are local to the current machine and are not common amongst machines. May not be used. $HOME/bin Where you should store any executable programs that you create.
    [Show full text]
  • Editor War - Wikipedia, the Free Encyclopedia Editor War from Wikipedia, the Free Encyclopedia
    11/20/13 Editor war - Wikipedia, the free encyclopedia Editor war From Wikipedia, the free encyclopedia Editor war is the common name for the rivalry between users of the vi and Emacs text editors. The rivalry has become a lasting part of hacker culture and the free software community. Many flame wars have been fought between groups insisting that their editor of choice is the paragon of editing perfection, and insulting the others. Unlike the related battles over operating systems, programming languages, and even source code indent style, choice of editor usually only affects oneself. Contents 1 Differences between vi and Emacs 1.1 Benefits of vi-like editors 1.2 Benefits of Emacs 2 Humor 3 Current state of the editor war 4 See also 5 Notes 6 References 7 External links Differences between vi and Emacs The most important differences between vi and Emacs are presented in the following table: en.wikipedia.org/wiki/Editor_war 1/6 11/20/13 Editor war - Wikipedia, the free encyclopedia vi Emacs Emacs commands are key combinations for which modifier keys vi editing retains each permutation of typed keys. are held down while other keys are Keystroke This creates a path in the decision tree which pressed; a command gets executed execution unambiguously identifies any command. once completely typed. This still forms a decision tree of commands, but not one of individual keystrokes. Historically, vi is a smaller and faster program, but Emacs takes longer to start up (even with less capacity for customization. The vim compared to vim) and requires more version of vi has evolved to provide significantly memory.
    [Show full text]
  • Bash Reference Manual Reference Documentation for Bash Edition 5.1, for Bash Version 5.1
    Bash Reference Manual Reference Documentation for Bash Edition 5.1, for Bash Version 5.1. December 2020 Chet Ramey, Case Western Reserve University Brian Fox, Free Software Foundation This text is a brief description of the features that are present in the Bash shell (version 5.1, 21 December 2020). This is Edition 5.1, last updated 21 December 2020, of The GNU Bash Reference Manual, for Bash, Version 5.1. Copyright c 1988{2020 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents 1 Introduction ::::::::::::::::::::::::::::::::::::: 1 1.1 What is Bash?:::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 What is a shell? :::::::::::::::::::::::::::::::::::::::::::::::: 1 2 Definitions ::::::::::::::::::::::::::::::::::::::: 3 3 Basic Shell Features ::::::::::::::::::::::::::::: 5 3.1 Shell Syntax :::::::::::::::::::::::::::::::::::::::::::::::::::: 5 3.1.1 Shell Operation :::::::::::::::::::::::::::::::::::::::::::: 5 3.1.2 Quoting ::::::::::::::::::::::::::::::::::::::::::::::::::: 6 3.1.2.1 Escape Character ::::::::::::::::::::::::::::::::::::: 6 3.1.2.2 Single Quotes ::::::::::::::::::::::::::::::::::::::::: 6 3.1.2.3 Double Quotes ::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • RIDGE ROS Text Editing Guide
    ROS Text Editing Guide RIDGE 9051 'A ROS Text Editing Guide RIdge Computers Santa Clara, CA first edition: 9051 (SEP 84) © Copyright 1984, Ridge Computers. All rights reserved. Printed in the U.S.A. PUBLICATION HISTORY Manual TItle: ROS Text Editing Guide first editon: 9051 (SEP 84) NonCE No part of this document may be translated, reproduced, or copied in any form or by any means without the written permission of Ridge Computers. The information contained in this document is subject to change without notice. Ridge Computers shall not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material. ACKNOWLEDGEMENT This software and documentation is based in part on the fourth Berkeley Software Distribution, under license from the regents of the University of California. We acknowledge the following individuals for their part in its development: Ken Arnold, Rick Blau, Earl Cohen, Robert Corbett, John Foderaro, Mark Horton, Bill Joy, Randy King, Jim Kleckner, Steve Levine, Colin McMaster, Geoffrey Peck, Rob Pike, Eric Scott, and Eric Shienbrood. These tutorial guides are based on documents created at Bell Laboratories to describe UNIX System software, and at the University of California, Berkeley, to describe bsd 4.2. Credits are given on the first page of each document contained in this volume. Some text has been changed to more accurately describe Ridge Computers' implementation of the software. Inappropriate material may have been deleted. UNIX is a trademark of Bell Laboratories. -ii- 9051 PREFACE The ROS Text Editing Guide (manual 9051) is a collection of tutorial documents on text,.
    [Show full text]
  • Linux Shell Scripting Tutorial
    Linux Shell Scripting Tutorial Linux Shell Scripting Tutorial Ver. 1.0 Written by Vivek G Gite I N D E X ● Introduction ❍ Kernel ❍ Shell ❍ How to use Shell ❍ Common Linux Command Introduction ● Process ❍ Why Process required ❍ Linux commands related with process ● Redirection of Standard output/input ❍ Redirectors ❍ Pipes ❍ Filters ● Shell Programming ❍ Variables in Linux ❍ How to define User defined variables ❍ Rules for Naming variable name ❍ How to print or access value of UDV (User defined variables) ❍ How to write shell script ❍ How to Run Shell Scripts ❍ Quotes in Shell Scripts http://www.freeos.com/guides/lsst/index.htm (1 of 2) [17/08/2001 17.41.52] Linux Shell Scripting Tutorial ❍ Shell Arithmetic ❍ Command Line Processing (Command Line Arguments) ❍ Why Command Line arguments required ❍ Exit Status ❍ Filename Shorthand or meta Characters (i.e. wild cards) ● Programming Commands ❍ echo command ❍ Decision making in shell script ( i.e. if command) ❍ test command or [ expr ] ❍ Loop in shell scripts ❍ The case Statement ❍ The read Statement ● More Advanced Shell Script Commands ❍ /dev/null - Use to send unwanted output of program ❍ Local and Global Shell variable (export command) ❍ Conditional execution i.e. && and || ❍ I/O Redirection and file descriptors ❍ Functions ❍ User Interface and dialog utility ❍ trap command ❍ getopts command ❍ More examples of Shell Script (Exercise for You :-) © 1998-2000 FreeOS.com (I) Pvt. Ltd. All rights reserved. http://www.freeos.com/guides/lsst/index.htm (2 of 2) [17/08/2001 17.41.52] Linux Shell Script Tutorial Introduction This tutorial is designed for beginners only and This tutorial explains the basics of shell programming by showing some examples of shell programs.
    [Show full text]