DRM833 1 Dragon PTN Network Operation A4 E Screen
DRM833 1 Dragon PTN Network Operation A4 E Screen
DRM833 1 Dragon PTN Network Operation A4 E Screen
Basic Configuration
Dragon PTN Network Operation
Manuals and software are protected by copyright. All rights reserved. The copying, reproduction,
translation, conversion into any electronic medium or machine scannable form is not permitted,
either in whole or in part. An exception is the preparation of a backup copy of the software for your
own use.
The performance features described here are binding only if they have been expressly agreed when
the contract was made. This document was produced by Hirschmann Automation and Control GmbH
according to the best of the company's knowledge. Hirschmann reserves the right to change the
contents of this document without prior notice. Hirschmann can give no guarantee in respect of the
correctness or accuracy of the information in this document.
Hirschmann can accept no responsibility for damages, resulting from the use of the network
components or the associated operating software. In addition, we refer to the conditions of use
specified in the license contract.
You can get the latest version of this manual on the Internet at the Hirschmann product site
(www.hirschmann.com).
1. INTRODUCTION ......................................................................................................... 7
1.1 General ....................................................................................................... 7
1.2 Supported Hardware, Firmware, Software ................................................... 7
1.3 Manual References ...................................................................................... 7
7. SYNCE...................................................................................................................... 30
7.1 General ..................................................................................................... 30
7.2 Configuration ............................................................................................ 32
7.3 Normal Clock Selection Process .................................................................. 34
7.4 Operation .................................................................................................. 35
9. LOSS/DELAY/ASSURANCE MONITORING................................................................... 41
List of figures
Figure 1 Dragon PTN Network Example ........................................................................................ 7
Figure 2 Link: DCN Bandwidth Profile ........................................................................................... 9
Figure 3 Ethernet Link: Link Capacity .......................................................................................... 10
Figure 4 LAN/WAN Settings......................................................................................................... 11
Figure 5 Tunnel Creation ............................................................................................................. 12
Figure 6 Point-to-Point Tunnels .................................................................................................. 13
Figure 7 MultiPoint Tunnels ........................................................................................................ 13
Figure 8 Logical Ring Tunnel ........................................................................................................ 13
Figure 9 Subring Tunnel............................................................................................................... 14
Figure 10 Create Tunnels............................................................................................................. 14
Figure 11 Tunnel - Device Selection ............................................................................................ 15
Figure 12 Tunnel - Link Selection................................................................................................. 15
Figure 13 Set Protection Mode of LSP ......................................................................................... 16
Figure 14 Tunnel HQoS / HQoS Application Priority ................................................................... 16
Figure 15 Protection Parameters ................................................................................................ 17
Figure 16 Example: Propagate Topology Change (=PTC) ............................................................ 19
Figure 17 Example: Main Ring + Subrings ................................................................................... 19
Figure 18 RingX (=Main Ring): Ring Protection Tab .................................................................... 20
Figure 19 SubringX1: Ring Protection / Topology Change Propagation Tab ............................... 20
List of Tables
Table 1 Manual References ........................................................................................................... 7
Table 2 Tunnel Topologies and Protection.................................................................................. 12
Table 3 Tunnel Action Commands............................................................................................... 29
Table 4 Provisioned QL Ordered According Quality .................................................................... 33
Table 1 CSM Ethernet Port Monitoring Fields............................................................................. 52
Table 2 CODIR Port Monitoring Fields ......................................................................................... 55
Table 3 SyncE Monitoring 'System Information' Fields ............................................................... 56
Table 4 SyncE Monitoring 'Clock Information' Fields .................................................................. 57
Table 5 IEEE 1588 Monitoring Fields ........................................................................................... 58
Table 6 CPU Status Monitoring ................................................................................................... 59
Table 7 Memory Status Monitoring ............................................................................................ 60
Table 8 Disk Status Monitoring ................................................................................................... 60
Table 9 Protocol and Feature Support Matrix ............................................................................. 68
This manual describes in detail how to set up the core Dragon PTN MPLS-TP network
(without the application services), e.g. the DCN communication channel, the tunnels, etc….
Prerequisites: The HiProvision PC must have been configured and installed.
To install the HiProvision PC and how to operate it: see Ref. [2Mgt] in Table 1;
A detailed description to setup pure Ethernet services: see Ref. [2Eth] in Table 1;
A detailed description to setup Legacy services: see Ref. [2Leg] in Table 1.
Dragon PTN Node HiProvision PC
(=Dragon PTN Management)
router router
Dragon PTN
MPLS-TP Network
Optical WAN links can be created on (see WAN support in feature matrix §12):
4-GC-LW/4-GCB-LW IFM (=interface module) → 1 Gbps, one link per module;
4-GO-LW IFM → 1 Gbps, four links per module;
1-10G-LW IFM → 10 Gbps, one link per module;
4-10G-LW IFM → 10 Gbps, four links per module;
1-40G-LW IFM → 40 Gbps, one link per module;
Electrical WAN links can be created on:
a 4-GC-LW/4-GCB-LW IFM:
Four links per module if no optical link (port1) is coming up on this module;
Three links per module if an optical link (port1) is coming up on this module.
Connect all the links in all the nodes as described in the paragraphs below. Once the entire
WAN network has been connected, ports not used as WAN port can be used as LAN port.
The RJ45 port of combo port1 can only be used when there is no optical link on this port.
CAUTION:
Make sure that the used TRMs (=SFPs/XFPs/QSFPs+) are suited for the optical link
distance. A received optical budget that exceeds the TRM receiver sensitivity level (or the
transmitting TRM is too powerful for the link distance), could damage the receiving TRM.
More information on the TRMs can be found in Ref.[14] in Table 1.
NOTE: Fiber optic reporting information is available via the Reporting Engine Add-on, see
see Ref. [24] in Table 1.
40 Mbps (=default): Use this value if you have plenty of bandwidth available in your
network. All your management activities will go fast/normal;
20 Mbps;
5 Mbps;
1.5 Mbps: Use this value if you have to consume your bandwidth very efficiently or if you
have lack of bandwidth in your network. Your management activities could go slow/slower
depending on the network layout and load;
NOTE: The selected bandwidth also influences the number of protected tunnels through
this link, see paragraph below.
NOTE: Management activity example: Load firmware into the network, see Ref. [2Mgt] in
Table 1.
NOTE: The DCN Bandwidth Profile must always be less than the Link Capacity (see §3.4).
Link Capacity
Link
The Link Capacity can be configured or downscaled if desired via Dashboard → Network
Hardware → Links → Link → Generic: Link Capacity (L1):
NOTE: The Link Capacity must always be more than the DCN Bandwidth Profile (see §3.3);
Link Capacity
Link
By default, all the ports of the IFMs that support WAN ports (see §12) are WAN ports. This is
because nodes are discovered via the HiProvision discovery function, which operates over
MPLS-TP links that interconnect nodes via WAN ports. Ports that do not have a WAN link can
be changed into a LAN port by using the network settings wizard.
The network settings wizard allows to easily set all the port configurations of multiple IFMs
together, without having to open each IFM individually. Click the Network Settings Wizard
button (see previous paragraph) to open it.
CAUTION: While the loading to the Dragon PTN network is in progress, do not turn off,
shut down or restart the HiProvision Server or Agent, since this may cause database
corruption and network problems!
LAN/WAN
drop-down list
5.1 General
A tunnel is a virtual path through the physical network in which customer application
services can be programmed later on. The concept of a tunnel can be found in the figure
below. A network consists of nodes with links in between. The bandwidth within a link is
divided over the configured tunnels through that link. The tunnels can start or end in a node
(=LER) or just pass through a node (=LSR) and will be used to program customer application
services in.
LER: Label Edge Router = MPLS-TP access node with customer applications;
Multipoint Optional
Logical Ring Always, included automatically via RPL (=Ring Protection Link)
(max. 60 LERs per tunnel)
(*) Note: An 'External' tunnel type cannot be selected or created manually. Such a tunnel will be created
automatically when creating an 'External E1 Link'. 'External E1 Links' must only be used when the Local Mode
service is used on 2-OLS or 2-C37.94 IFMs, see Ref. [2Leg] in Table 1.
This external tunnel cannot be modified/deleted. It will be deleted automatically when deleting the associated
'External E1 Link'.
Working path (yellow in the figures below): the active data path;
Protection path (orange in the figures below): the standby or backup data path if the
working path should fail. This path is optional for point-to-point and multi-point tunnels
and mandatory for logical ring or subring tunnels. Switching between the working path and
protection path occurs automatically due to a working path failure or can be initiated
manually for maintenance reasons for example, see §5.7.
The possible amount of protected tunnels through a link depends on the selected DCN
bandwidth profile for that link, see §3.3.
10 12 15 16 10 12 15 16
13 13 Protection Path
MultiPoint MultiPoint
no protection with protection
11 14 11 14
10 12 15 16 10 12 15 16
Protection
13 13
Protection
Logical Ring
with protection
11 14
10 12 15 16
Owner
13
Protection = RPL =
Ring Protection Link Neighbor
11 14
10 12 15 16
Neighbor (LR)
Subring
13 Subring (S)
with protection
Protection = RPL (LR)
Owner (LR) 17 18
Connections Tab
Create Tunnels
Tunnels
The tunnels wizard opens. The list below summarizes every page in the wizard. :
Devices
Click device
to add to tunnel
Click device
to add to tunnel
Link Selection: Select the links that must be part of the tunnel. A link can be selected by
clicking the link line between the node icons or by clicking the ‘Selected’ checkbox. A
selected link is colored brown, an unselected link is colored grey. Click again on this link or
its ‘Selected’ checkbox to unselect the link. Multiple links can be selected/unselected at
once via selecting a number of rows and clicking / .
Click link
to add to tunnel
Links
Next select all the links of the protection path (link selection/unselection is similar
as described above). After this, the protection path is configured.
Logical Ring: See next paragraph.
QoS Parameters: HQoS (= is way to prioritize service traffic via assigning a priority to the
tunnel in which the service data is transported.
Use HQoS/HQoS Application Priority (HQoS = Hierarchical Quality of Service):
Unchecked (=default): No HQoS will be used.
Checked: An HQoS Application Priority (0 = default = lowest priority, …., 6 = highest
priority) can be assigned to the tunnel if Use HQoS has been checked. More info
on HQoS can be found in Ref. [2Eth] in Table 1. Click Next >>.
Protection Parameters :
Main Ring
LR LR LR flushed
S1 S1 S1 PTC = ON
S2 S2 S2 PTC = ON
S3 S3 S3
RingX
(Ring ID=4)
SubRingX1
(Ring ID=5)
SubRingX2
(Ring ID=7)
SubRingX1
(Ring ID=5)
SubRingX1
flushes
Main Ring (=ID4) → First interconnection node → Second interconnection node
to the upper ring/subring to the upper ring/subring
→ Ring ID of the upper ring/subring → Ring ID of the upper ring/subring
that will be flushed. that will be flushed.
SubRingX2
(Ring ID=7)
SubRingX2
flushes
SubRingX1 (=ID5)
- Point-to-Point
- Multipoint Sharing not relevant
- Logical Ring
- Subring
(Advised)
Use Shared LSP
→ Performant
Reuse (share) of
resources
LSP1 LSP1
LER for LSR for LSP1 (no red
both LSPs bullet)
LER for LSP2
LSP2 LSP2
Review: If ok, click Finish. The configuration load manager will be invoked.
Load: The configuration load manager is a tool that starts and monitors the load process
of a HiProvision configuration. Click the Load button to load the new HiProvision
configuration into the live network. See Ref. [2Mgt] in Table 1 for more info.
CAUTION: While the loading to the Dragon PTN network is in progress, do not turn off,
shut down or restart the HiProvision Server or Agent, since this may cause database
corruption and network problems!
5.3 Subrings
5.3.1 General
A 'Logical Ring' tunnel can have a maximum of 60 LERs. It can be easily extended by
connecting subrings (or 'Subring' tunnels) to it via two interconnection nodes which
terminate the subring. Each subring has its own RPL (=ring protection link). The resulting
network combining Logical Ring and one or more subrings is called a ladder topology. See
figure below.
NOTE: The number of subrings through a link depends on the selected DCN bandwidth
profile for that link, see §3.5.
Ladder Topology
LR = Logical Ring
RPL
LR LR LR
Interconnection
Interconnection
Node S1 Node S1 S1
RPL
S = Subring
LR LR
Interconnection Interconnection
Node Node
S1
A Subring:
Different configured Subrings in the same logical ring have another Subring color:
A Logical Ring:
can nest subrings maximum 3 levels deep (Logical Ring not included);
can have maximum 15 subrings connected, either directly or indirectly via other subrings
or a mix;
An interconnection node:
Hint: Do not share a link with the ladder topology when configuring a subring.
LR Sn LR S15 LR
S1 S1
S1 S4
S2 S2
S3 S3 S2 S5
S3
S5 LR S4 LR S4
S1 S1 S5
S2 S2
S3 S3
LR S1 LR S1
Shared Link
Normal
working path
breaks
NOTE: Swapping paths can also be done the hardware way by just pulling out a link or
cable when the protection switching is operational.
TUNNELS Tab
4. The 'Action on Tunnel' window shows up and depends on the selected tunnel type:
Point-to-Point/Multipoint Tunnels: see §5.7.2;
Ring/Subring Tunnels: see §5.7.3;
NOTE: Click 'Working Path' or 'Protection Path' to highlight it in the network drawing.
1. Select the node in the Send to Node list that must trigger the swap from working to
protection path. For a point-to-point tunnel, either node is OK;
2. Select a '...Switch To...' command in the Action on LSP list, see Table 3 for a command
overview. Click OK in the pop-up box to execute the command in the live network!
3. Some status info will change (Node://<node name>/, working path, protection path). For
more detailed tunnel status information, click Close. Go to the Network tile → Select
tunnel. Status info is shown in the Network drawing or properties tabs via , e.g. LPS tab
(=Linear Protection Switching). Click the Refresh button for faster feedback. Also have a
look at §5.5.
4. If the swap is OK ('protection path active'), perform the required maintenance (if any);
5. If you are ready to swap back to the working path and you closed the Tunnel actions
window, open it again via .
6. Swap back to the working path by selecting the Clear command in the Action on LSP list.
Use 'Clear' only on the node where the '...Switch To...' command was executed! Click OK
in the pop-up box to execute it! If the swap back does not occur immediately, probably a
Wait to Restore timer has to expire first. The Wait to Restore time has been configured at
the tunnel creation.
CAUTION: Use 'Clear' only on the node where the '...Switch To...' command was executed!
NOTE: An 'Idle' ring indicates an up and running ring, the working path (=full line) is active
and the protection path (=dashed line) is in standby.
Protection Path
1. Decide which node must trigger, by blocking a port, a swap from working to protection
path. For the port that must be blocked, select a port '...Switch' action. See Table 3 for a
command overview. Click OK in the pop-up box to execute it in the live network!
2. Both the Node and Port status will change. For more detailed tunnel status information,
click Close. Go to the Network tile → Select tunnel. Status info is shown in the Network
drawing or properties tabs via , e.g. Ring Protection tab. Click the Refresh button for
faster feedback. Also have a look at §5.5.
3. If the swap is OK (Ring State is Forced Switch/Manual Switch and one port is blocked),
perform the required maintenance (if any);
4. If you are ready to swap back to the working path and you closed the Tunnel actions
window, open it again via .
5. Swap back to the working path by selecting the Clear command in the Node Action list of
the node where the '...Switch' command was executed (see figure below). It is the node
that has one port in the 'Blocked' state. Click OK in the pop-up box to execute the
command! If the swap does not occur immediately, probably a Wait to Restore timer has
to expire first. The Wait to Restore time has been configured at tunnel creation.
CAUTION: Use 'Clear' only on the node where the '...Switch' command was executed!
Force Switch to - Swaps the tunnel in a forced way to the protection path, also if the
Protection protection path is not OK! Attention: if both the working and
protection path are not OK, communication will be lost between the
two end-points;
- After the swap, if the protection path breaks, there will be no
automatic swap to the working path.
Manual Switch to - Swaps the tunnel to the protection path if all tunnel paths are ok, no
Protection error conditions!
- After the swap, if the protection path breaks, the tunnel swaps back to
the working path automatically if the tunnel was configured as
revertive.
Manual Switch to - Swaps the tunnel to the working path only if the working path is OK!
Working This is useful when your tunnel has swapped to the protection path
automatically due to a real break (not via tunnel actions) and your
tunnel is non-revertive;
- This command has the same effect as the Clear command.
Port Force Switch Same as 'Force Switch to Protection' command described above.
6. CSM REDUNDANCY
Prerequisite: one CSM Redundancy voucher (see Ref. [2Mgt] in Table 1) or license is required
for each node having two CSMs installed.
A node can have two CSMs installed for redundancy reasons. A CSM can be in the Active,
Standby or Passive state. Normally, one CSM will be Active and the other will be Standby.
NOTE: More info on CSM Redundancy can be found in Ref.[2Mgt], [4] in Table 1 and in the
redundancy cases in in Ref.[2Mgt];
Node selected
Standby
Active
Active
5. With CSM redundancy, a switchover is only possible when both CSMs have the same
firmware version and one CSM is 'active' and the other CSM is 'standby'.
6. To manually switchover the CSMs or make the Standby CSM the active one and vice versa,
select the node row and click the CSM switchover button . More switchover
possibilities are described Ref. [4];
7. CSM Redundancy is non-revertive.
7. SYNCE
7.1 General
SyncE is a protocol that manages the distribution of a synchronous clock, based on a PRC
(=Primary Reference Clock), network wide over all the nodes that have SyncE configured.
The protocol uses SSMs (= Synchronization Status Message) to inform the nodes about the
quality of the clock on that link. The clock itself is recovered from the received electrical/
optical signals on the configured recovery ports (see also Ref. [4] in Table 1). Recovery ports
can be configured on the IFMs that support the SyncE feature, see §12.
Some facts:
Make sure not to configure timing loops when configuring SyncE. In a timing loop, when the
master PRC node breaks down, the other nodes start synchronizing on each other, still
believing the master PRC is up and running. As a result, the nodes in the timing loop slowly
drift away from the rest of the network, and they possibly never pick up again with the PRC
master whenever it comes back because of the non-revertive behavior (see §7.3).
PRC
PRC
PRC,
PRC, Prio2 DUS,
Prio2 Prio2
7.2 Configuration
SyncE can be configured/modified via the Dashboard → Network Hardware → Network
Settings Wizard button = . The Network Settings wizard opens. The list below summarizes
every page in the wizard:
15 DUS Don't Use for Sync. For testing or maintenance purposes on the link. 5 (=worst)
7 ST2 Stratum 2 2
10 ST3 Stratum 3 3
15 DUS Don't Use for Sync. For testing or maintenance purposes on the link. 4
Select Port: To assign a recovery port to Clock1, click the 'Select Port' cell in Clock1 and
select the recovery port from the port list. Similar for Clock2, Clock3 and Clock4.
Clock Priority (1:highest, 9:lowest) (default=0): see the normal clock selection process
in §7.3 for more info. If no recovery port is selected, the value is 0. When a port is
selected, the value automatically goes to 1;
Provisioned QL (default=Auto): Quality Level of the delivered clock, see §7.3.
Lockout:
False (=default): the received clock will be used in §7.3;
True: the received clock on this port will be locked out or not be used in §7.3;
Switch Request: Possibility to force a clock usage or overrule the selected clock by the
selection process in §7.3;
Review: If ok, click Finish. The configuration load manager will be invoked.
Load: The configuration load manager is a tool that starts and monitors the load process
of a HiProvision configuration. Click the Load button to load the new HiProvision
configuration into the live network. See Ref. [2Mgt] in Table 1 for more info.
CAUTION: While the loading to the Dragon PTN network is in progress, do not turn off,
shut down or restart the HiProvision Server or Agent, since this may cause database
corruption and network problems!
The normal clock selection process in the node is driven by the following parameters:
Provisioned QL;
Clock Priority;
NOTE: The normal clock selection process can be overruled by a Lock Out of a port, or a
Forced Switch Request. See also §7.2;
7.4 Operation
Once the SyncE has been configured and loaded in the network, it is up and running. To
monitor the running SyncE, see §10.3.
7.4.1 Reporting
Reporting information is available via the Reporting Engine Add-on, see Ref.[24] in Table 1.
NOTE: For readability reasons, 'IEEE 1588v2' will be further referred to as '1588';
NOTE: In respect to the definitions below, a Dragon PTN node can only act as Transparent
Clock, not as Grandmaster, Boundary clock nor Ordinary Clock;
Some definitions:
MPLS-TP
Ethernet
Dragon PTN
4-GC-LW
Ethernet
The master periodically broadcasts the current timestamp as a Sync message to the ordinary
clocks to manage and synchronize the time distribution system.
The figure below shows the most important 1588 protocol messages. The slave is able to
calculate the network delay and clock offset based on the timestamps T1, T1', T2 and T2'
which are passed via the 1588 messages. As a result, the slaves can synchronize to the
grandmaster timestamp clock. In addition, it is possible to use get a more accurate
timestamp via using the correction field in Transparent Clocks, see further on.
Sync Delay Delay Sync
Message Request Response Message
Message Message
Master
(T1) (T1, T1’,T2) (T1, T1’,T2,T2’,T3) (T4)
Slave
Round-trip Time
Operation:
Ethernet
MPLS-TP
Dragon PTN
Ethernet
Figure 21 1588 on Port and Node Level for LERs and LSRs
An external 1588 grandmaster clock broadcasts Sync messages with timestamp 'x' to the
Dragon PTN network via Ethernet ports on the supported IFMs. Multiple masters are
possible, the best master clock will be selected by the slaves based on a priority field.
1588 enabled in Dragon PTN?
Yes: Nodes are configured as transparent clock and fill out the correction field in the
1588 messages. Each node adds its own '∆n' (=the time needed to pass the node) to
the correction field. The total time correction for the entire path through Dragon PTN
'∆y' = the sum of all '∆n's of each node on that path. Multiple message 1588 sequences
(n) will result in a lot of '∆y's and will finally average in '∆z'. This average correction has
filtered out the variable networking delay resulting in a very accurate calculated
timestamp in the slaves.
∆n ∆n ∆n
∆n ∆n
No: The 1588 protocol messages are only transported via the Ethernet service, the
nodes do not interact with the messages, no correction field is filled out. The resulting
calculated timestamps in the slaves will be less accurate.
1. Node level: Enable 1588 on each LER and LSR node of the Ethernet service:
Node: Dashboard → Network Hardware → (DEVICES) Node → Generic → IEEE 1588
Global Enable:
True: 1588 is enabled in this node;
False (=default): 1588 is disabled on this node. No port in this node will be able to
participate in 1588;
Network Hardware
Node
2. Port level: Enable 1588 on each port of the Ethernet service (including LAN and WAN ports)
of all the LER and LSR nodes of that Ethernet service and set the correct (and same)
encapsulation type:
Port: Dashboard → Network Hardware → (DEVICES) Port → IEEE1588 Settings;
IEEE1588 Enable:
True: If the IEEE 1588 Global Enable on node level is True, this port participates
in 1588;
False (=default): This port will not participate in 1588;
IEEE1588 Encapsulation: 'Ethernet' or 'Ethernet IP/UDP'. Find below the required
values of the different fields (provided by the applications) in the received 1588
messages.
Ethernet: Ptp in pure Ethernet, Destination MAC address = 01-1B-19-00-00-00,
Ethertype = 0x88F7, VLAN = not checked, Domain = 0..3;
Ethernet IP/UPD (*): Ptp in UDP/IP, Destination MAC address = any multicast,
Ethertype = 0x0800, UDP port = 319, Destination IP address = 224.0.1.129, VLAN
= not checked, Domain = 0..3;
(*): currently not possible on ports 1 and 2 of the 4-GC-LW, 4-GCB-LW, 4-GO-
LW cards IFMs.
IEEE1588 Reset Engine: False/True: Set to True and click the apply button to reset
the 1588 engine immediately on that port, no load required!
3. Load changes via Network Hardware Tab → into the live network to activate them. It
starts the configuration load manager. See Ref. [2Mgt] in Table 1 for an overview of this
tool.
CAUTION: While the loading to the Dragon PTN network is in progress, do not turn off,
shut down or restart the HiProvision Server or Agent, since this may cause database
corruption and network problems!
8.4 Operation
Once the 1588 has been configured and loaded in the network, it is up and running. To
monitor the running 1588, see §10.4.
9. LOSS/DELAY/ASSURANCE MONITORING
9.1 General
Prerequisite: Some services must have been created. Any type of service is OK.
The Assurance tile on the dashboard allows to execute some network performance tests:
9.2.2 Configuration
To create such a measurement, follow the steps below:
CAUTION: When another LER is located between the selected source and destination, an
unintentional loss can be measured, because the extra in-between LER could take its part
of the traffic as well.
5. Measurement Parameters:
Priority: Indicates the priority that was assigned during service creation. The loss
measurement messages will have the same priority.
Interval (default = 1s, range[100ms, 1s, 10s, 1min, 10min]: Loss measurement
messages are sent according to the configured interval. By default, such a message will
be sent every second.
Max Time (default = 4s, range[4-172800s]): Configures the maximum amount of time
that the loss measurement can last;
Number of Messages (default = 3, range[3-8192]): Configures the number of messages
that can be sent during the measurement. The sending of messages will stop when the
Max Time has expired or the number of messages sent equals the configured Number
of Messages;
9.2.3 Operation
a. Single Measurement
Once the configuration has been done, click the play button to start the measurement.
The Status field indicates ‘running’.
The measurement will stop when one of the 3 events below occur:
Once the measurement has stopped, the Status field indicates ‘idle’ and the results are filled
out. See further on for more info on the results.
NOTE: Ring Tunnel: In the case of a switchover to the protection RPL path during the
measurement, a loss will only occur if the only path left from source to destination
is via the RPL path;
Status
Step1: Measurement
configured
→ status = idle
Confi gured measurement entity
Step2: Measurement
started
→ status = running
Step3: Measurement
stopped
→ status = idle
→ results Export res ults Los s Results
b. Multiple Measurements
Within the same service, multiple measurements can run simultaneously provided that both
measurements have no common part in the selected route.
NOTE: Maximum 5 measurements (regardless the performance test) can be started and
run simultaneously per node.
CAUTION: a loss occurred when ‘Number of Messages IN’ <> ‘Number of Messages Out’ or
one of the other ‘Loss’ fields <>0
NOTE: The results can be exported via clicking the export button .
9.3.2 Configuration
Similar to the configuration of Loss Measurement, see §9.2.2;
9.3.3 Operation
a. Single Measurement
Similar to Loss Measurement, see §9.2.3a;
c. Results, Delay
When multiple delay measurement entities are configured, click the entity in the result list
to show its results. An overview of the result values can be found below:
Number of Messages IN: The number of DM test messages that have made the entire
round trip from source to destination and back to source;
Number of Messages OUT: The number of DM test messages that has been sent out from
the source to the destination. In normal circumstances, ‘Number of Messages IN’ =
‘Number of messages Out’;
Delay (ms): Indicates the roundtrip delay for a DM test message to travel from the source
to the destination port and back to the source. Each DM test message measures a Delay.
At the end of the measurement, a minimum and maximum of these values is filled out.
NOTE: If all the DM test messages are lost (no DM test message returns back to the
source), then the delay is infinite and all the delay fields remain empty.
NOTE: The results can be exported via clicking the export button .
The measured delay is indicative and is a round-trip delay. It means that the delay is
measured from the source to the destination and back to the source.
9.4.2 Configuration
To create such a measurement, follow the steps below:
b. Multiple Measurements
Similar to Loss Measurement, see §9.2.3b;
Status:
In Progress: The measurement is ongoing, new measured values will be updated
automatically until the status is Success or Failure;
Success: The measurement has finished successfully, the destination was reachable
within the configured parameters;
Failure: The measurement has failed, the destination was not reachable within the
configured parameters e.g. because of a broken link. Try again with adapted
configuration parameters e.g. higher Receive Timeout etc... If the problem persists,
investigate the path.
Max/Min/Average Round Trip: Maximum/minimum/average round trip delay of all the
send out Echo Requests;
Number Received Echo Requests: the number of transmitted echo requests that made the
total round-trip from source to destination and back to the source;
Number Transmitted Echo Requests: the number of transmitted echo requests from
source to destination;
Furthermore, Traceroute measures a round-trip delay from source to each hop and back to
the source. The measured delay is indicative. The measurement process is performed by
sending Echo Request messages over the selected tunnel segment to each hop.
9.5.2 Configuration
Similar to the configuration of Tunnel Ping, see §9.4.2. Differences with Tunnel Ping:
9.5.3 Operation
a. Single Measurement
Similar to Loss Measurement, see §9.2.3a;
b. Multiple Measurements
Similar to Loss Measurement, see §9.2.3b;
source destination
Hop4
Example:
Hop3 Detection
Detected hops
Actual hop count: indicates which hop is being measured at that time. All the result fields
in that row are related to the hop measured at that time. These fields will be overwritten
when the next hop (=Actual Hop Count + 1) is being measured;
After each hop that has been measured, a new hop row will be added in the Detected Hops
list, indicating the Node Id and Hop Round Trip time.
NOTE: If an expected hop is not shown in the 'Detected Hops' list, it means that the
tunnel is down on one or both sides of the expected hop.
NOTE: Monitoring ports from L2/L3 IFMs can be monitored in the next paragraph.
NOTE: For 'Test & Loopback Performance', another reset method must be used, see
further;
3) Counter
1) Counter
Statistics
Control
show ports
4) Counter
add ports
Graphs
optional:
2) Port add to graph
Counters (=green cell border)
Default
Pane1
Pane2
Bytes In bytes The total number of L2 bytes that the interface has
(ingress) received.
Multicast In Packets packets The number of multicast packets received by the interface.
(ingress)
Disc In Packets packets The number of discarded inbound packets (even though Verify your HiProvision
(ingress) no errors had been detected in these packets) and not configuration.
delivered to a higher-layer protocol. Example: free up
buffer space, packets without labels, routing problems,
unknown VLANs...
Error In Packets packets Number of incoming packets that had an error and as a Verify also other
(ingress) result were dropped. This error could be for example, FCS counters, e.g. FCS error,
errors..... Jabber error, MTU error
....
Bytes Out bytes The total number of L2 bytes that the interface has
(egress) transmitted.
Ucast Out Packets packets The total number of packets that higher-level protocols
(egress) requested to be transmitted, and which were not
Multicast Out Packets packets The number of multicast packets transmitted by the
(egress) interface.
Disc Out Packets packets The number of discarded or untransmitted outbound Verify your HiProvision
(egress) packets (even though no errors had been detected). configuration.
Example: free up buffer space, packets without labels,
routing problems, unknown VLANs...
Error Out Packets packets Number of outgoing packets that had an error and as a Verify also other
(egress) result were dropped. This error could be for example, FCS, counters, e.g. FCS error,
CRC errors..... Jabber error, MTU error
....
Average Bandwidth In (kbps) kbps The average of the 5 latest 'Bandwidth In' measurements.
(ingress) Every (manual) refresh is a new measurement.
Bandwidth Out (kbps) kbps The consumed outgoing bandwidth in the last
(egress) measurement = (('Bytes Out Current' - 'Bytes Out
Previous')/1000)/Time
Average Bandwidth Out (kbps) kbps The average of the 5 latest 'Bandwidth Out'
(egress) measurements. Every (manual) refresh is a new
measurement.
Average Frame Size In (bytes) bytes The average frame size of all the frames that are received
(ingress) on this port in the 5 latest measurements. Every (manual)
refresh is a new measurement.
Average Frame Size Out (bytes) bytes The average frame size of frames that are transmitted on
(egress) this port in the 5 latest measurements. Every (manual)
refresh is a new measurement.
Oversized Frames frames The number of Ethernet frames that had an Ethernet
(ingress) frame size bigger than the fixed oversize limit of 1544
bytes, but smaller or equal than the configured MTU size
in HiProvision. These frames were NOT dropped!
Jabber Error frames The number of Ethernet frames that matched all the Transmission problems,
(ingress) conditions below: bit failures, check
- Ethernet frame had an FCS error (= Frame Check cabling...
Sequence error indicating that the frame was being
corrupted during transmission → CRC mismatch)
- Ethernet frame size > oversize (=1544 bytes, fixed)
- Ethernet frame size <= MTU size (=configured in
HiProvision)
These frames were dropped!"
Fcs Error frames The number of Ethernet frames that matched all the Transmission problems,
(ingress) conditions below: bit failures, check
- Ethernet frame had an FCS error (= Frame Check cabling...
Sequence error indicating that the frame was being
corrupted during transmission → CRC mismatch)
- Ethernet frame size <= oversize (=1544 bytes, fixed)
Mtu Error frames Ethernet frame size > MTU size: Possible Transmission
The number of Ethernet frames that had an Ethernet problems, bit failures,
frame size bigger than the configured MTU size in check cabling... also
HiProvision. These frames were dropped! These frames possible FCS error. If no
could have a valid or invalid FCS (for example if frames are problems of this kind,
concatenated). just increase the
configured MTU size in
HiProvision or lower
your application MTU
size.
NOTE: See also Ref. [11] in Table 1 for more info on ITU-T G.703 Code Conversion and the
violation block.
Rx Slip Counter count In ITU-T G.703 Code Conversion (64kbps), the Check synchronization between source
(ingress) alternation in polarity of the blocks is violated and destination when this counter
every eighth block. The violation block marks the increases
last bit in an octet. If the violation block is not
received as expected, the 'Rx Slip Counter' will
increase and might indicate a synchronization
problem between source and destination.
System Information;
Clock Information;
A detailed monitoring set-up description is similar to the description in §10.2. This
monitoring does not support graph monitoring as in §10.2.1.
Nodes
Active Source value The active source is the index[0..3] of the recovered clock to
which the node is currently locked or slaving. A node can have a
maximum of 4 clock recovery ports configured in the SyncE
wizard in row[1..4]. Row[1..4] maps to index[0..3]. Index 255
means that the node has no valid clock to slave on due to e.g.
free running, holdover, ...
Switch Status value EqpNoRequestStatus: no forced or manual clock has been set, Only during maintenance, a
normal dynamic clock selection is active, state different from
EqpManualStatus: manual clock has been configured via switch EqpNoRequestStatus is
request. expected. If not, verify your
EqpForcedStatus: forced clock has been configured via switch configuration.
request.
EqpUndefined: the clock status is unknown.
Timing Status value Normal: Either no SyncE is enabled (=freerunning) or SyncE is Holdover: problem with
enabled and the node is slaving to clock. incoming links; link down,
Holdover: The clock to which the node slaved got lost. The node no SSMs, clock too
turned into the status ‘holdover’ meaning that the internal node unstable... Verify the
clock will be used further on. incoming links
Timing Ql quality The resulting clock quality of the node, either based on a fixed
values in clock configuration or a dynamic clock selection process. The
Table 4 possible quality levels can be found in Table 4.
Slot Number value The node slot number in which the clock source
is recovered
Port Number value The port number in which the clock source is
recovered
Ql Out quality The clock quality that the node sends out to
(egress) values in neighbor nodes. It is the resulting best clock
Table 4 that is available in the node.
Link State True/False True: the link is up on this port If the link is down, verify your links.
False: the link is down on this port
Freq Meas Offset ppb Parts Per Billion (=PPB) frequency difference
between the recovered clock (if any) and the
internal node clock.
Freq Meas Valid True/False True: the measured Freq Meas Offset could be false and link is up: clock is too
measured and is valid unstable... verify connected device
False: the measured Freq Meas Offset could not or recovered clock
be measured and is invalid
Refresh
In Modified frames The number of received IEEE 1588 frames on this port. These
(ingress) frames carry a valid timestamp from the master. This frame
has been prepared by the node to measure the travel time
through this node. If this counter increases, it means that IEEE
1588 is operating normally.
In Fcs Error frames The number of received Ethernet frames that had an FCS Transmission
(ingress) error (= Frame Check Sequence error) indicating that the problems, bit failures,
frame was being corrupted during transmission → CRC check cabling...
mismatch. These frames will be dropped by the node!
In Preamble Too Short frames The number of received IEEE 1588 frames with a preamble
that was too short. The preamble is a 7 byte pattern
preceding an Ethernet frame and is used for clock
synchronizing between devices.
Out Modified frames The number of outgoing IEEE 1588 frames on this port. The
(egress) travel time through the node has been measured. This time
has been filled out in the IEEE 1588 correction field of the
outgoing IEEE 1588 frame. If this counter increases, it means
that IEEE 1588 is operating normally.
Out FCS Error frames Similar to 'In FCS Error' but for outgoing frames.
(egress)
Out Preamble Too Short frames Similar to 'In Preamble Too Short' but for outgoing frames.
Note: Click the Refresh button for the latest results; Clear the counter values by clicking ; 'C' value in cell = current value;
'P' value in cell = previous value;
%CPU Usage (user) the percentage * 100 of CPU utilization that occurred while executing at the user
level (application).
%CPU Usage (user nice priority) the percentage * 100 of CPU utilization that occurred while executing at the user
level with nice priority. The ‘nice’ CPU percentage is the % of CPU time occupied by
user level processes that are nice to have, so background process that are not critical.
A nice to have process has a positive nice value (lower scheduling priority). It is the
CPU time that's currently ‘in use’, but if a normal (nice value 0) or high-priority
(negative nice value) process comes along, those ‘nice to have’ programs (positive
nice value) will only be scheduled when the CPU has some free time.
%CPU Usage (system) the percentage * 100 of CPU utilization that occurred while executing at the system
level (kernel).
%CPU Usage (await I/O requests) the percentage * 100 of time that the CPU or CPUs were idle during which the
system had an outstanding disk I/O request.
%CPU Usage (hardware interrupts) the percentage * 100 of time spent by the CPU or CPUs to service hardware
interrupts.
%CPU Usage (software interrupts) the percentage * 100 of time spent by the CPU or CPUs to service software
interrupts.
%CPU Usage (stolen by other the percentage * 100 of time spent in involuntary wait by the virtual CPU or CPUs
virtual processors) while the hypervisor was servicing another virtual processor.
%CPU Usage (virtual processors) the percentage * 100 of time spent by the CPU or CPUs to run a virtual processor.
Note: Click the Refresh button for the latest results; Clear the counter values by clicking ; 'C' value in cell = current
value; 'P' value in cell = previous value;
Note: Click the Refresh button for the latest results; Clear the counter values by clicking ; 'C' value in cell = current
value; 'P' value in cell = previous value;
Disk Name There are two disks on the CSM, either the flash or the SD memory card.
The name indicates which disk values are shown.
Disk Size Used (KB) Indicates the used disk size in kilobytes
Disk Size Available (KB) Indicates the available disk size in kilobytes
Disk Size Percentage Filled Indicates the used percentage of the disk
Note: Click the Refresh button for the latest results; Clear the counter values by clicking ; 'C' value in cell = current
value; 'P' value in cell = previous value;
11. TROUBLESHOOTING
11.1 Health Monitor
If you have problems with a specific node, a service in a node, responsiveness of a node,
possible traffic loss in a node, it is always a good idea to verifiy the Health Monitor (see
§10.5).
CPU usage
Memory usage
Disk (=Flash, SD memory card) usage
11.2.2 Configuration
CAUTION:
- Port Mirroring will be configured directly in the live network, it cannot be configured in
the HiProvision database. As a result, HiProvision must be online for configuration!
- Port Mirroring changes will NOT be persistent in the network after adding/deleting them.
Changes will be lost after reboot/clear node unless they were made persistent later on
via the Load Manager (see Ref. [2Mgt] in Table 1).
- Port Mirroring can be done from multiple source ports to one destination port, not to
multiple destination ports.
1. Make sure that your HiProvision is online. Port Mirroring can be configured via Dashboard
→ Network Hardware → ;
Port Mirroring
Sessions
2. The Destination Selection shows the available destination ports on the selected node.
Select a desired destination port from the list by clicking its Selected checkbox.
NOTE: Active WAN ports, ports in a service or source ports will not be shown in this
destination selection list.
Node
Destination Port Source Port(s)
Port Mode
3. The Source Selection shows possible source ports in the same node for the selected
destination port. Assign a source port to the destination port by selecting a value in its Port
Mode (Rx, Tx, or Rx/Tx: Rx = Receive traffic, Tx= Transmit traffic, Rx/Tx = all traffic).
Multiple source ports can be assigned to one destination port.
5. The Port Mirroring Sessions show the configured sessions on this node in the live network
so far. The added source ports will not be available anymore in the destination ports list.
Session
6. If desired, multiple mirroring sessions can be added in the same or different nodes by
repeating previous steps in this paragraph.
7. Port Mirroring is up and running in the live network for the configured sessions.
Delete all mirroring sessions from the node by deleting each individual session, see §c .
1) Sel ect
El ement
Type
2) Sel ect
El ement
1. Select one or more Element Types that you want to monitor. An element type is an
object in your network that has monitorable properties. It could be a node, IFM, port
etc… The ELEMENT TYPES section shows all the unique element types in your network.
2. Select one or more Elements that you want to monitor. The ELEMENTS section shows
all your network elements that match the selected Element Types.
3. Select one or more Properties to monitor. Each selected property will create a new
property column in the Results section on the right-hand side. The PROPERTIES section
shows all the properties that are available on the selected Elements.
4. Click the Refresh button to fill out the monitored values of the selected properties.
10g
ri ght-click
bpdu
Res ults
port1
7. In the results window below, click the button to optimize the results into a full
screen view. Click the CSV icon to export the results into a csv file. Exported CSV
files are by default saved in the <HiProvision installation path>\Logging\System Logging folder.
Example CSV filename: Property Values-2020-01-22 10u50.48.csv.
full screen export to csv
Hi de/Show
Sel ections
Ful l Screen
Res ults View
Show/Hide
Devices Summary
MACsec Ref.[2Mgt] --- --- --- Yes on 1-10G-LW WAN ports --- ---
(Only in Aggregation Node)
Synchronisation
SyncE §7 --- Yes on 2-OLS E1 ports Yes Yes --- ---
PTP IEEE 1588v2 §8 --- --- --- Yes: as Transparent Clock, not as --- ---
(Only in Aggregation Node) Grandmaster, Boundary clock nor
Ordinary Clock
(not for 4-10G-LW, 1-40G-LW)
Hardware
LAG + LACP Ref.[2Eth] --- --- --- In Aggregation Nodes: Yes Yes
(Only LAN ports) LAG: Yes / LACP: No
In Core Nodes:
LAG: No / LACP: No
Smart SFP Ref.[2Leg] --- --- --- Yes on 4-GO-LW ports or --- ---
4-GC-LW/4-GCB-LW front port 1
(not for 4-10G-LW, 1-40G-LW)
Ethernet: Local Service Ref.[2Eth] --- --- --- --- Yes Yes
Circuit Emulation Ref.[2Leg] --- Yes (except for 4-DSL-LW) Yes --- --- ---
Serial Ethernet Ref.[2Leg] --- Yes on 7-SERIAL --- --- --- ---
Voice Ref.[2Leg] Yes (analog Voice) --- --- Yes (VoIP) Yes (VoIP) Yes (VoIP)
Local Mode Ref.[2Leg] --- Yes on 2-OLS Yes on 2-C37.94 --- --- ---
Layer2
LLDP --- --- --- --- Yes Yes Yes
IGMP Snooping Ref.[2Eth] --- --- --- --- Yes, MAC based Yes, IP based
MSTP Ref.[2Eth] --- --- --- MAC flush on topology change, Yes Yes
immediate switchover. Port based service: Port based service:
Port based service: Network wide Network wide Network wide
VLAN based service: VLAN based service:
Local in Node Local in Node
Storm Control Ref.[2Eth] --- --- --- Yes, Port Properties Yes, Port Properties Yes, Port Properties
BPDU Guard Ref.[2Eth] --- --- --- Yes, Port Properties Yes, included in Yes, included in
Layer2 MSTP Wizard Layer2 MSTP Wizard
IP ACL Ref.[2Eth] --- --- --- Yes (max. 1 rule) Yes (max. 128 rules) Yes (max. 128 rules)
MAC ACL Ref.[2Eth] --- --- --- Yes (max. 1 rule) Yes (max. 128 rules) Yes (max. 128 rules)
Sticky MAC Ref.[2Eth] Yes --- --- Yes Yes (Back End Ports) Yes (Back End Ports)
Static MAC Table Ref.[2Eth] Yes --- --- Yes Yes (Back End Ports) Yes (Back End Ports)
Loss Measurement (LM) §9.2 Yes Yes Yes Yes --- ---
(Only in Aggregation Node) (not for 4-10G-LW, 1-40G-LW)
Delay Measurement (DM) §9.3 Yes Yes Yes Yes --- ---
(Only in Aggregation Node) (not for 4-10G-LW, 1-40G-LW)
Port Mirroring §11.2 Yes, intra node: Yes, intra node: Yes, intra node: Yes, intra node: Yes, same IFM: Yes:
- can only be a - can only be a source, can - can only be a source, - source can be any IFM except L3 source and source and
source, can be be mirrored to Ethernet can be mirrored to IFM destination must be destination can be a
mirrored to Ethernet IFMs Ethernet IFMs - destination: Ethernet IFMs same L2 IFM mix of main and
IFMs extension L3 IFM
MAC Monitor Ref.[2Eth] Yes (Node level) Yes on 7-SERIAL (Node --- Yes Yes Yes
Ref.[2Leg] level)