780B service provisioning method

Remarks on 780B service provisioning method
: Currently, customers in Chongqing in communication technology
generally demand 2M services. There are two provisioning methods for 2M services. The cross-service is always generated through the subnet, and the one is to directly write the cross-data.
The feature of writing cross data through subnets is that the operation of service configuration is relatively simple and the thinking is relatively clear, but it is not easy to modify, and is generally used for service configuration between a large number of network elements.
The feature of directly writing cross data is that the service configuration is fast and easy to modify, but it is not intuitive enough and the service flow is not clear enough. It is generally used for service configuration and service testing of a single network element on site.

Take the following device as an example
780B service provisioning method
1. First, confirm that the device has been activated and that the network management can monitor the device.
Note: Make sure that all configured single disks can be monitored, and the status or performance can be checked.
If there is a grayed out single disk, you need to confirm whether the single disk type configuration is wrong, or the slot number is wrong
. The front frame slot of the 780B device The bits are 01-13, and the rear frame is 14-18. If it is not correct, you need to configure the slot offset during physical configuration.
2. The configuration position for the 2M disk protection and clock configuration of the 780B device is
the XCU or SXCU of the rear frame. For the single-disk configuration of the disk, both the active and standby slots need to be configured, as shown in the figure:
780B service provisioning method
Description: The 2M protection slot of the 780B device is slot 13, and the other slots are protected slots. For example, there are both slots 01 and 13. 2M disk, so the protection slot is set to 13, and the 01 slot is protected and written to the device. Both active and standby cross disks need to be configured.
780B service provisioning method

Note: The clock is locked to the group optical path. For example, the optical path is connected to the 04 slot 4 port and the 10 slot 4 port, the 04 slot is W6_4, the 10 slot is E6_4, then I lock the W6 slot, the second row One is empty, so that he can only get the clock from W6, the operation method is to double-click the empty, put the empty on the top, double-click W6, put the W6 on the top. After the configuration is successful, the alarm about the clock interruption on the crossbar should disappear.
Note: 1. The direction of clock locking is only slot and no port, so the default clock direction is 1 port, but in the example, the pigtail is used for 4 ports, so this configuration is not enough, you need to put a single disk on the CD The configured clock acquisition is changed to the fourth port (I read it, the plate of 066-4 should be changed in the synchronization timing selection of the single-disk exclusive configuration), but in general, it is recommended to use the first port to obtain the clock, so It is recommended to change the optical path to W6_1 and E6_1.

3. Service configuration method. In the example, W6_4 and E6_4 are connected to ZTE manufacturers' equipment, which is 1+1 protection, and needs to download 5 pieces of 2M
780B service provisioning method

Right click on the network element - cross configuration - OK
780B service provisioning method

Enter add trib.01.01.01 from west.06.13.01/n5 at the bottom of the pop-up interface and press Enter, add west.06.13.01 from east.06.13.01/n5 /u/asonp and press Enter, click Save in the lower right corner, and confirm .
add trib.01.01.01 from west.06.13.01/n5
Description: add. . . from. . . /n? is the business cross-standard format, where ? The location is the number of business entries. If you need 5 here, just write 5. In fact, when you break it down, it is add trib.01.01.01 from west.06.13.01/n1, add trib.01.01.02 from west.06.13.02/n1 , add trib.01.01.03 from west.06.13.03/n1, add trib.01.01.04 from west.06.13.04/n1, add trib.01.01.05 from west.06.13.05/n1
trib.01.01.01 Represents the first slot (.01.01) of the first VC4 of tributary 1 (trib.01)
west.06.13.01 represents the first slot of the 13th VC4 in slot West 6 (west.06) (.13.01), as for why the thirteenth VC4 is used here, it is because the fourth port is connected here, each port has 4 VC4s, the first port is 1-4VC4, the second port is 5-8VC4, and the third port It is 9-12VC4, and the fourth port is 13-16VC4, so the fourth port starts from the 13th.
add west.06.13.01 from east.06.13.01/n5 /u/asonp
This sentence means to use east.06.13.01 to protect west.06.13.01. If west.06.13.01 fails, the business will go to east.06.13.01. Note that there is a /u here, which means a single The relationship between the two, so you can't write wrong before and after, the protected one is first, and the protected one is last. But the previous one does not have /U, it is bidirectional, so it doesn't matter before and after, /asonp is the name of the protection method of 780 devices, and needs to be added to 780 devices.

After closing and reopening, the following figure is displayed:
780B service provisioning method

Right-click on the network element, go to Device Configuration and
780B service provisioning method
wait for the prompt to succeed
. Note: If the ZTE service has been completed, the current alarm on the E1-63 disk in slot 01 should have no TU_AIS, and TU_AIS means that the service is not connected. PPI_LOS is the 2M port physical port interrupt

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=325337702&siteId=291194637