ADX ASX System Manual
ADX ASX System Manual
ASX System
User Manual
1449203 Rev A
ADCP-80-578 • Issue 2 • 8/2008 • Preface
COPYRIGHT
© 2008, ADC Telecommunications, Inc.
All Rights Reserved
REVISION HISTORY
ISSUE DATE REASON FOR CHANGE
1 10/2007 Original.
2 08/2008 References to a blinking LED on powerup were deleted on pages 20, 62, 65, 118, and 119; LED defini-
tion was removed from page xii; section 6.5.1. was deleted; typo in Figure 2 on page 1 was corrected.
TRADEMARK INFORMATION
ADC is a registered trademark of ADC Telecommunications, Inc.
DISCLAIMER OF LIABILITY
Contents herein are current as of the date of publication. ADC reserves the right to change the contents without prior notice. In no
event shall ADC be liable for any damages resulting from loss of data, loss of use, or loss of profits and ADC further
disclaims any and all liability for indirect, incidental, special, consequential or other similar damages. This disclaimer of
liability applies to all products, publications and services during and after the warranty period.
This publication may be verified at any time by contacting ADC’s Technical Assistance Center at 1-800-366-3891, extension 73475
(in U.S.A. or Canada) or 952-917-3475 (outside U.S.A. and Canada), or by e-mail to [email protected].
Page ii
ADCP-80-578 • Issue 2 • 8/2008 • Preface
TABLE OF CONTENTS
Content Page
Page iii
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008 • Preface
TABLE OF CONTENTS
Content Page
Page iv
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008 • Preface
TABLE OF CONTENTS
Content Page
Page v
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008 • Preface
TABLE OF CONTENTS
Content Page
Page vi
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008 • Preface
TABLE OF CONTENTS
Content Page
Page vii
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008 • Preface
TABLE OF CONTENTS
Content Page
Page viii
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008 • Preface
ADMONISHMENTS
Important safety admonishments are used throughout this manual to warn of possible hazards to
persons or equipment. An admonishment identifies a possible hazard and then explains what
may happen if the hazard is not avoided. The admonishments — in the form of Dangers,
Warnings, and Cautions — must be followed at all times. These warnings are flagged by use of
the triangular alert icon (seen below), and are listed in descending order of severity of injury or
damage and likelihood of occurrence.
Danger: Danger is used to indicate the presence of a hazard that will cause severe personal
injury, death, or substantial property damage if the hazard is not avoided.
Warning: Warning is used to indicate the presence of a hazard that can cause severe personal
injury, death, or substantial property damage if the hazard is not avoided.
Caution: Caution is used to indicate the presence of a hazard that will or can cause minor
personal injury or property damage if the hazard is not avoided.
Danger: This equipment uses a Class 1 Laser according to FDA/CDRH rules. Laser radiation
can seriously damage the retina of the eye. Do not look into the ends of any optical fiber. Do not
look directly into the optical transceiver of any digital unit or exposure to laser radiation may
result. An optical power meter should be used to verify active fibers. A protective cap or hood
MUST be immediately placed over any radiating transceiver or optical fiber connector to avoid
the potential of dangerous amounts of radiation exposure. This practice also prevents dirt
particles from entering the adapter or connector.
Danger: Do not look into the ends of any optical fiber. Exposure to laser radiation may result.
Do not assume laser power is turned-off or the fiber is disconnected at the other end.
Danger: Wet conditions increase the potential for receiving an electrical shock when installing
or using electrically-powered equipment. To prevent electrical shock, never install or use
electrical equipment in a wet location or during a lightning storm.
Page ix
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008 • Preface
Caution: Read the installation section of this manual before you connect the system to the
power source.
Caution: This system is intended for installation in restricted areas. A restricted area is where
access can only be gained by service employees through the use of a specific tool, lock and key,
or other means of security, and is controlled by the authority responsible for the location.
Caution: Only trained and qualified employees are allowed to install or replace system
components.
Caution: All ports are safety extra-low voltage (SELV) circuits. SELV circuits should only be
connected to other SELV circuits.
Caution: Only a DC power source that is isolated from AC mains with reinforced insulation
and that complies with the SELV requirements can be connected to the system.
Caution: This product must be connected to an IEC60950 compliant limited power source OR
a Power over Ethernet (PoE) IEEE802.3af compliant power source.
Caution: This product relies on the buildings installation for short-circuit (over current)
protection. Ensure that the protective device is rated not greater than 1 ampere.
Caution: Do not use Power over Ethernet simultaneously with Telecom power feeding.
Caution: Remove power before connecting or disconnecting ground or power wires to the
system. To ensure that all power is OFF, locate the circuit breaker on the panel board that
services the DC circuit, switch the circuit breaker to the OFF position, and tap the switch
handle of the circuit breaker in the OFF position.
Caution: Wire the DC power supply using the appropriate connectors at the wiring end. The
proper wiring is ground to ground, positive to positive, and negative to negative. Note that the
ground wire should always be connected first and disconnected last.
Caution: The blank face plates prevent vermin and dust to enter the system as well as exposure
to electromagnetic interference.
Page x
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008 • Preface
STANDARDS CERTIFICATION
Environmental
Safety
Safety meets:
• Electrical safety:
– According to IEC 950 and/or EN 60950-1
• CE qualification:
– According to low voltage directive 73/23/EEC and
EMC directive 89/336/EEC
• Optical safety:
– Is determined by the SFP inserted
• Thermal safety:
– Surface temperature or exposed component below 75 0C
Page xi
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008 • Preface
Page xii
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008 • Preface
Page xiii
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008 • Preface
Page xiv
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
1 PRODUCT DESCRIPTION
The ASX system combines an ASX Add Drop Multiplexer (ADM), a FLEXDSX test and patch
panel, and an ASX Remote Control Graphical User Interface (GUI). Figure 1 shows the system
components. Figure 2 shows the ASX panel, which contains the ADM and the FLEXDSX.
REMOTE
NEs ASX REMOTE
CONTROL GUI
SDH
NETWORK
LAN/
INTERNET
FLEXDSX
64 E1s
LOCAL PATCH
AND TEST ACCESS 22161-A
ADM
FLEXDSX
22167-A
Page 1
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The ASX System takes an STM-1 frame from an SDH optical network, separates the STM-1
frame into its component E1 frames, and routes the E1 circuits into a FLEXDSX panel,
providing the ability to cross-connect, patch, or monitor the E1 circuits at a local site. Figure 3
shows the functional components of the System.
SNMP
SDH AGENT
NETWORK
LAN/ SNMP
REMOTE
INTERNET MANAGER
PROVISIONING,
ALARMS
LAN/ REMOTE
INTERNET
LOCAL
INTERNET
PROTOCOL
(IP) CRAFT
INTERFACE
ASX
ALARMS
CONTROL
LAPTOP
2 STM-1s SDH INTERFACE
ADM CARDS
ASX
PANEL
FLEXDSX ASX
CONSOLE
LEDs ALARM
CONTACTS
MONITOR
ACCESS
MO MO
O O
I I
FLEXDSX MI MI
MONITOR
EI ACCESS LOCAL
CIRCUIT NE
NE NE EXAMPLE
CROSS-CONNECT
22164-A
LOCAL NEs
Page 2
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
10. FLEXDSX—is a cross-connect panel built into the ASX. Onsite personnel can use this
panel to cross-connect or patch E-1 circuits to local Network Elements. The panel also
provides test and monitor access to the E-1 circuits. The panel accommodates up to 16
circuit modules, each capable of providing access to four E-1 circuits, for a total of up to
63 E-1 circuits per panel.
Page 3
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The ASX panel is available in two models, wire-wrap and LSA. Figure 4 shows the main
external components of the panel.
MOUNTING
VERTICAL EAR (4 PLACES)
CABLE GUIDE
(2 PLACES)
22156-A
FLEXDSX CIRCUIT
COMPONENT MODULE
(16 PLACES)
Included are:
• ASX Component—is the active component of the ASX containing a compact SDH add
drop multiplexer,. This component also contains the hardware and software providing
remote control of the unit through an SNMP interface.
• Network Interface—is the physical connection point for the network optical fibers. The
interface consists of two Small Form Factor Pluggable (SFP) connectors accommodating
four optical fibers.
• Power Interface—is the –48/–60 VDC power input for the ASX ADM. The interface
consists of two sets of three pins (+, –, and GND). One set is used for primary power input.
The other set is used for redundant power input.
• Alarm Contacts—provide local alarm notification through the use of two sets of alarm
contacts. Each set has three contacts: Normally Open (NO), Common (C), and Normally
Closed (NC). The contacts can be wired locally as either NO-C or NC-C with a shorted or
open circuit, respectively, indicating an alarm condition.
• LEDs—are high-brilliance Light Emitting Diodes (LEDs) indicating power present
(green), minor alarm (yellow), and major alarm (red).
Page 4
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
22157-A
WIRE WRAP LSA
MODULE MODULE
Page 5
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
1.4 Connectors
The System has one LAN 10/100 BASE-T full/half duplex MDI interface. Cross wire (MDX)
detection is not supported. If the PC does not support MDI/MDX switching, a PC cross-cable is
required for direct connection. This interface is intended for singlemode fibers terminated with
LC connectors.
A serial 9 pole sub–d connector per RS232C is available for changing local management control
settings. The connection settings are: 38400 b/s, no parity, 8 data bits, one start, stop bit. The
System does not require hardware control wires to be connected.
The ASX panel has two power feeds with a nominal voltage of -48/-60 VDC. Each power feed
has three pins (+, –, and GND). The first three pins from the left (when viewed from the front of
the panel) are the primary power input. The next three pins are the redundant power input. A
Phoenix mini-Combicon connector is provided with the product for connection to the power
feeds. It is a six-position connector with three positions assigned to each power feed. The
connector accepts copper wire in the size range 28-16 AWG.
The ASX panel has a ground stud located on the front of the panel for use in grounding the
panel to office ground. The stud is intended for copper wire of size AWG 18 or higher.
The panel has an optical interface on the front of the panel. Physically, the interface consists of
two Small Form-factor Pluggables (SFPs) transceivers. The transceivers are intended for
singlemode fibers terminated with LC connectors.
The ASX panel has alarm contacts intended for use in a local alarm reporting system. The
contacts are in two sets, one each for minor and major alarms. Each set consists of NO, NC, and
COMMON contacts. (The contacts may be wired as either NO or NC as required for the local
alarm reporting system.) Two Molex connectors are provided with the product for connection to
the alarm contacts. Each connector has four positions with two positions being used and two
remaining unused corresponding to the labeling on the front of the panel. The connector accepts
copper wire in the size range 24-16 AWG.
Page 6
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The System has an integrated web server that can be accessed using a web browser. Supported
browsers are Mozilla Firefox and Internet Explorer 6.0.
The ASX System overview window shown in Figure 6 indicates the general setup of the GUI.
On the left side of the window are launch pads for menu selections. The menu headings shown
represent the major parts of the system as follows:
• System Menu—provides System configuration functions including IP settings, OSPF
settings, and SNMP settings.
• Maintenance Menu—is used for querying the software versions and maintaining the
System database, log file, and users and passwords.
• Alarms—provides the ability to view and examine current alarms as well as alarm history.
Alarm severities and thresholds can be managed.
• Xconnect Menu—is not used in this application.
• Transmission Menu—is used to provision signals.
• Timing Menu—is used to set System timing and timing sources.
• MSP Menu—is used to set up MSP protected lines.
The central portion of the system overview window represents another major portion of the GUI
which is viewing and editing details for specific ports within the ASX. The eight rows represent
the eight Interface Cards, each of which has a tributary port (TP) whereby it receives its input
signal from the ADM and line ports (LP) whereby it passes an E1 signal to one of the
FLEXDSX circuits accessible on the front of the panel.
For a more detailed introduction to the ASX GUI, refer to Section 5, System Software Setup, on
Page 43.
Page 7
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Below is a short list of the key features supported by the ASX System:
• Integrated web server with intuitive Graphical User Interface (GUI)
• SNMP manageable for alarming
• Sub network connection protection (SNCP)
• Remote management
• Loopback functions E1 incoming, E1 outgoing and STM-1 outgoing
• Non service affecting software upgrading (hitless upgrading)
• Full flexible VC12 cross connect (uni- and bidirectional)
• Non intrusive monitoring of any connection in the System
• Line protection (MSP)
• Two STM-1 aggregate signal (optical or electrical)
• Dual and single fiber interworking
• Degraded signal reporting and provisionable thresholds
• Synchronization, free running or selectable reference
• E1 retiming outputs
• Eight slot positions for Interface Cards
• Eight times 2.048 Mb/s according to G.703 interface per Interface Card
• Simple and rapid installation
• Database backup and restore
• Smart defaults, use of prepared databases
• Local E-1 cross-connect and test and patch access
• Local major and minor alarm contacts for onsite alerts
• Local LEDs (power on, major and minor alarms)
• Wire wrap or LSA cross-connect options
The ASX System software (installed on the same computer as the ASX GUI) supports all
System products. The System has two memory banks containing the active and an inactive
software version. The software is stored in non volatile (flash) memory.
Page 8
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Remote and local software downloads are supported. Software upgrades are non service
affecting. They do not affect data communication settings.
The System database (installed on the same computer as the ASX GUI) contains all provisioned
settings of the System except for the IP and SNMP related settings. The System supports eight
databases, of which one is active. Databases are reusable between Systems of the same
hardware version (for example between one ASX system and another ASX system).
At first start up, the System has a default database in which no cross connects and other
transmission related settings are provisioned. A database operation does not have impact on the
data communication settings.
The System maintains a log file (first in first out) to keep track of changes when system settings
are changed. Per event, the log file includes a time stamp, a user identification, and descriptive
text. The log file can be viewed using the ASX GUI.
The System has an accurate (better than 4.6 ppm) Real Time Clock on board. The time of this
clock can bet set by the user and will survive a power outage of at least ten minutes. The clock is
used for adding a time stamp to reported alarms. The internal System time is in UTC format;
however, during management via the GUI alarm, raise and clear times are represented in the
local time zone of the browser.
1.6.7 Powering
The System has two telecom power connections for -48/-60 V DC that can be used as redundant
power feeds. The power is monitored. By default, power fails are not reported. Alternatively, the
System can be powered using Power over Ethernet. Powering via PoE is not monitored.
Page 9
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The ASX GUI can be used to review inventory data for the “pluggable items” described in the
previous topic. The function provides a master list in which any item can be selected to view
details for that item.
The System supports Multiplex Section Protection (MSP) line port protection; this allows
restoration of traffic when a failure has been detected on one of the line sections, including SFP
failures. Unidirectional MSP for both revertive and non-revertive operation is supported.
1.6.11 Synchronization
The ASX System can be synchronized externally via each of the line ports and one of the E1
tributary ports. An internal (free running) clock with an accuracy of ± 4.6 ppm (or better) has
been integrated. When no suitable reference is available, the System will use its holdover clock.
1.6.12 E1 Retiming
Every E1 port individually can be provisioned in retiming mode. In this mode, the outgoing E1
signal will be retimed with the System clock. In this way the E1 signal can be used as a timing
reference for a next System (with the SDH network) connected to the System being accessed
through the ASX GUI.
The ASX System supports the alarm reporting of current alarms. Alarms are reported on the
web browser and to an SNMP manager if provisioned. The alarms can also be visible on the
System LEDs. The System has a log for 500 cleared alarms. For every alarm, the severity and
reporting state can be provisioned. Every port and termination point has a monitoring mode to
control the alarming.
Page 10
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The ASX GUI provides the ability to create logical cross-connects (within the ASX ADM, not
using the FLEXDSX circuit modules); however, in the multiplexing application of the ASX
described in this manual, logical cross connects are not usually created.
Logical cross connects are used in a Digital Automatic Cross Connect (DAX) application of the
ASX3 (not documented in this manual). When used, logical cross connects can be fully flexibly
added between line and tributary ports, between line and line ports, and between tributary and
tributary ports. Both uni- and bidirectional cross connects are supported. Bidirectional cross
connects transmit traffic in two directions; unidirectional cross connects transmit traffic in one
direction.
Full access is available to the SDH overhead. RS, MS, VC4, and VC12 overhead can be viewed
and provisioned (for example, full trail trace identifier provisioning).
The System has an integrated web server, thus no additional management system is needed.
Only a web browser is needed. Via this web browser, the System can be managed.
The System supports alarm reporting towards an SNMP manager. Five different SNMP
managers can be added. Both SNMPv1 and SNMPv2 are supported. User specific MIB files are
supported.
The System supports both single and dual fiber small form-factor pluggables, SFPs. An SFP is
the optical/electrical STM-1 line interface unit.
1.6.20 Loopback
Page 11
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Page 12
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Figure 7 shows the ASX panel dimensions. Table 2 lists ASX system specifications.
17.50 IN.
(44.5 CM)
8.72 IN.
(22.1 CM)
Page 13
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Page 14
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
* Note in this mode the system does not assume any formatting/framing of the 2048
kbit/Sec signal so also framed signals are supported.
Page 15
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Page 16
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
This section contains instructions for installing the ASX panel. Procedures are provided here for
unpacking the product, installing the panel on a rack, and wiring the panel. Procedures are also
provided for testing and patching of E! circuits using the FLEXDSX circuit modules.
All procedures documented in this section are done at the physical site where the ASX panel is
located.
Use the following procedure to unpack and inspect the cabinet and all accessories:
1. Open the shipping carton(s) and carefully unpack the cabinet and any accessories from the
protective packing material.
2. Open the cabinet doors (requires 216B key tool) and check for broken or missing parts. If
there are damages, contact ADC for an RMA (Return Material Authorization) and to
reorder if replacement is required.
Page 17
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The ASX panel is a 19-inch rack mount panel designed to be mounted on a standard E-1 rack.
The panel mounts with four screws included with the shipped items.
Use the following procedure to mount the panel on the rack (Figure 8):
1. Determine the rack location where the panel will be mounted.
2. Position the panel in line with the rack location selected.
3. Secure the panel to the rack using the four screws provided.
22176-A
Page 18
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
GROUND
USE AWG 18
OR HIGHER
COPPER WIRE
22211-A
1. Install a ground wire from the ground stud on the ASX front panel to office ground. Use
copper wire AWG 18 or higher.
2. Locate the two Molex connectors (ADC part number 1317429) provided with the product.
Install copper wires in the connectors for connection from the local alarm reporting system
to the alarm contacts on the front of the panel. The alarm contacts can be wired as either
Normally Open (NO-C) or Normally Closed (NC-C). Wire the connectors using copper
wire in the size range 24-16 AWG. Note that each connector has four positions of which
two positions will be used and two positions will be unused corresponding to the labeling
on the front of the panel.
Note: The configuration of used and unused positions will differ for the two connectors
because the configuration of alarm contacts is different for minor and major alarms (to
reduce the possibility for the connectors to be mistakenly reversed).
3. Connect the Cat 5 Ethernet cable from the ASX panel to the PC providing the LAN. The
LAN interface must be a 10/100 BASE-T full/half duplex MDI interface. Cross wire
(MDX) detection is not supported.
Note: If the PC does not support MDI/MDX switching, a PC cross-cable is required for
direct connection.
Page 19
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
4. Connect the four network optical fibers to the SFPs on the ASX front panel. These must be
single mode fibers terminated with LC connectors.
5. Locate the six-position Phoenix mini-Combicon connector (ADC part number 1303445)
provided with the product. Install copper wires in the connector for connection from the
local power source to the power interface on the front of the panel. The first three pins
from the left (when viewed from the front of the panel) are the primary power input. The
next three pins are the redundant power input. The connector accepts copper wire in the
size range 28-16 AWG. The power interface has a nominal voltage of -48/-60 V DC.
Apply power to the System and wait for the system to complete its power-up sequence.
Connecting with a Web browser to the System is not possible at this time. After 3 minutes the
System is operational. A connection via the Web browser can then be made. For the first minute
of operation, alarm information is not available.
Monitoring the presence of power is enabled when setting the alarm for power failure to
reported (default it is not reported). Each power has its own detector, SYScPFA and SYScPFB.
When this alarm is raised, power might not be present at the input or the corresponding fuse is
broken. Check this by measuring the input voltage. Fuses are not field replaceable.
Note: A swap of -/+ will result in a power failure alarm, although the System is powered.
In a typical installation, cross-connect jumpers are installed between the ASX panel circuit
modules and a DSX panel connected to local NEs. Once installed, these cross connections are
left in place semi-permanently and only reconfigured in unusual circumstances. To cross-
connect between circuit modules for two network elements, use the wire-wrap pins or LSA
cross connect field located on the lower area of the circuit module. Figure 10 shows a circuit
module with a wire wrap cross connect field.
Page 20
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
LED
INSULATION
(ONE TURN ON
MONITOR OUT
THREE CORNERS OF PIN)
MONITOR IN
RECOMMENDED
WIRE WRAP (ONE PIN)
TRACER LAMP
TO
WIRE WRAP
CROSS-CONNECT RO
FIELD TI
SHADED AREA IDENTIFIES
RI
ONE CIRCUIT
12121-A
FRONT VIEW
Figure 10. Cross-Connect Field and Patch and Test Jack Field
For a wire-wrap connection, use five-conductor 24 AWG jumpers, cross-connect DSX circuits
as shown in Figure 11. Terminal identification is as shown in the installation drawing
accompanying each panel.
• Connect the TL of the first termination to the TL of the second termination (green wire).
• Connect the OUT of the first termination to the IN of the second termination (blue wire
and blue-white wire).
• Connect the IN of the first termination to the OUT of the second termination (orange wire
and orange-white wire).
Remove any discontinued jumper by disconnecting each end and cutting off the bare ends.
Remove each end of the jumper from the vertical wireways, and carefully remove the jumper
from the horizontal wireway by pulling at either end. This method will allow the jumper to be
removed without snagging or placing undue strain on the remaining jumpers.
Page 21
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
GREEN TL
BLUE TWISTED PAIRS
TO
5 CONDUCTOR
BLUE-WHITE OUT RO JUMPER WIRE
ORANGE TI TL
ORANGE-WHITE IN RI TO
OUT
RO
CROSS-CONNECT TI
TERMINAL BLOCKS IN
RI
11893-B
For an LSA connection, use LSA-plus connectors to cross-connect DSX circuits as shown in
Figure 11 (ignoring wire color). Terminal identification is as shown in the installation drawing
accompanying each panel.
Cross-connect jumpers should be routed as shown in Figure 12. All cross-connect jumpers
should use the horizontal wireways between bays, and the vertical wireways within the bay.
Whenever a jumper changes direction, it should do so where a ring, tray or fanning strip is
located. This will allow the jumpers to be dressed neatly without strain or interfering with other
jumpers. All discontinued jumpers should be removed from the DSX wireways, to prevent
unnecessary buildup and congestion.
Page 22
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
UPPER
JUMPER
WIREWAYS
CROSS-
CONNECT
A B
VERTICAL
JUMPER C
WIREWAYS
B A
D
LOWER
JUMPER
WIREWAYS
ROUTING RULES:
A. ALL JUMPERS IN THE LEFT-HAND SIDE OF THE CROSS-CONNECT FIELD SHOULD ENTER AND LEAVE THE BAY
FROM THE LEFT VERTICAL WIREWAYS.
B. ALL JUMPERS IN THE RIGHT-HAND SIDE OF THE CROSS-CONNECT FIELD SHOULD ENTER AND LEAVE THE BAY
FROM THE RIGHT VERTICAL WIREWAYS.
C. ALL INTRABAY CROSS-CONNECTS SHOULD USE THE VERTICAL RINGS EXCEPT WHEN TERMINATIONS ARE IN THE
SAME PANEL.
D. ALL INTERBAY JUMPERS SHOULD USE HORIZONTAL WIREWAYS.
E. ALL INTERBAY JUMPERS ORIGINATING IN THE UPPER HALF OF THE CROSS-CONNECT FIELD SHOULD ROUTE VIA
THE UPPER HORIZONTAL WIREWAYS.
F. ALL INTERBAY JUMPERS ORIGINATING IN THE LOWER HALF OF THE CROSS-CONNECT FIELD SHOULD ROUTE VIA
THE LOWER HORIZONTAL WIREWAYS.
8464-B
Page 23
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
For patching and testing use the patch and test bantam jackfield identified in Figure 10 on Page
21. Refer to ADCP-80-514, “DSX-1 Operational Procedures”, for individual procedures such as
in-service and out-of-service patching.
Page 24
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
This section provides some functional background information on the ASX System. Also, this
section describes some aspects of provisioning, however not in detail.
The System is designed to achieve an optimum between routing aspects, easy configuration, and
maintenance. To achieve this, dynamic routing is used instead of static routing.
Open Shortest Path First (OSPH) is an example of a link state routing protocol. Neighbor
routers tell each other their connections and status. In this way, the routers create a map with the
network topology. Routes are quickly recalculated in case of topological changes. In OSPF, the
cheapest path is calculated using cost metrics.
OSPF is a hierarchical interior gateway protocol (IGP). IGP stands for a set of routing protocols
in Autonomous Systems (AS). An AS is a collection of nodes/routers in the same network with
OSPF enabled, thus sharing the same network information.
OSPF supports multiple areas to limit the amount of routing related traffic. If communication
between other areas or other networks is required, there must be a way out. An ASBR is used for
this purpose (see Section 4.3.2 on Page 26).
To use OSPF, you must enable it, and, at that point, you must also specify a router ID for the
System. This router ID is also used for system/host addressing. The router ID must be unique
and cannot be equal to 0.0.0.0.
Since OSPF allows classless routing (defined in RFC 1817), discontinuous addressing is
allowed.
An OSPF network can be divided into areas. The System, however, supports only one area.
Since OSPF AS requires that all routers are connected to the backbone area (also known as area
0 or area 0.0.0.0), this is the only area supported by the System.
The System supports up to 50 routers per AS. If more routers are connected, all Systems will
give the SYScROUTE alarm (see Section 7.8.1.5 on Page 122). No guarantee can be given that
the Systems function properly if this alarm is raised. As a user you must take appropriate actions
to avoid or to solve these problems.
Page 25
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
OSPF protocol interworking is only supported for systems from the same family.
Authentication is realized by means of a simple password check.
An area border router connects one or more OSPF areas to the backbone. Since the System only
supports this backbone network, ABRs are not supported.
Autonomous system border routers are routers on the border of an OSPF AS. They are used to
communicate with external networks. The system supports the ASBR functionality.
The ASBR router can be used for remote management of the network.
Becoming an ASBR
As the number of nodes in a LAN network grows, the link state messages will increase to the
square. To be more specific: N nodes result in N*(N-1) link state messages. To reduce the
number and size of messages from increasing, the System automatically assigns one of the
routers as a designated router.
The designated router plays a critical role in the link state advertisement. As a fall back
possibility, the System also addresses one of the routers as a backup designated router. If the
designated router (DR) fails, the back-up designated router (BDR) automatically takes over the
role.
Each router is assigned an 8-bit priority, indicating its ability to be selected as the DR or BDR.
All multi-access networks must have a DR. A BDR may also be selected. The backup ensures
there is no extended loss of routing capability if the DR fails.
Page 26
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The DR and BDR are selected using information contained in hello packets. The device with the
highest OSPF router priority on a segment becomes the DR for that segment. The same process
is repeated to select the BDR. In case of a tie, the router with the highest RID is selected. A
router declared the DR is ineligible to become the BDR. Once selected, the DR and BDR
proceed to establish adjacencies with all routers on the multi-access segment.
Unnumbered network (point-to-point links between routers) is not supported in this release. As
a consequence, the user will have to assign an IP address for a point-to-point interface.
The address resolution protocol allows the host to find the physical address (MAC) of a target
host on the same physical network, given only the target's IP address.
The proxy address resolution protocol (PARP) is a way to make a machine a logical part of a
physical network while it is not physically connected to that network. Proxy ARP can only be
enabled for the LAN ports.
Normally the system for which proxy ARP is enabled will only respond to ARP requests for
known network elements and OSPF enabled networks .
An advantage of proxy ARP above ASBR is that no static route provisioning is needed for the
gateway outside the AS. A disadvantage is that the subnet mask of the gateway router outside
the AS must be large enough to contain all systems and networks outside the AS.
For the System no link layer protocol configuration for the embedded DCC links is required.
The System uses PPP (point-to-point protocol) over HDLC. It uses the MS-DCC
communication channel. The signal rate is 576 kbit/second.
The System does not support load balancing (dividing traffic over equal-costs routes).
Page 27
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
If a system can be managed via an MSP protected link, OSPF is best be enabled for both
working and protection port at both sides of the protected link.
Type A B C D
NE LAN Interface 10 12 LAN#: 0 - 255 NE#: 1 - 99
LP1 (PPP0) interface 192 168 1 NE#: 1 - 99
LP2 (PPP1) interface 192 128 2 NE#: 1 - 99
System or host address / router ID 10 15 0 NE#: 1 - 99
Directly connected Host / Manager 10 12 LAN#: 0 - 255 Host#: 100 - 254
LAN interface
Host or manager LAN interface in 80 80 LAN#: 0 - 255 Host#: 100 - 254
access network
Access Router LAN interface 80 80 LAN#: 0 - 255 Router#: 80-99
Systems can be accessed by IP addresses. The figure shows an example. If OSPF is disabled, the
LAN IP address should be used.
Page 28
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
10.12.0.100 / 24 Host#1
default route
10.12.0.1
(10.12.0.x / 24) 192.168.1.1 / 32 192.168.2.4 / 32
ospf ospf
10.12.0.1 / 24 [10]
ospf
NE#1 [174] NE#4
(10.15.0.1) (10.15.0.4)
Autonomous System
192.168.2.1 / 32
192.168.1.4 / 32
ospf
[174] [174] ospf
SDH 'ring'
192.168.1.2 / 32
ospf 192.168.2.3 / 32
NE#2 NE#3 ospf
(10.15.0.2) [174] (10.15.0.3)
10.12.1.2 / 24 10.12.1.3 / 24
ospf ospf
[10] [10]
(10.12.1.x / 24)
[link cost]
(Router ID)
Note: The notation (10.15.0.1) or more general (A.B.C.D) in the network element (NE#x)
indicates the router ID and also that OSPF is enabled at System level.
If there are no errors (so NE#2 and NE#3 are connected via the LAN) in the OSPF enabled
network the OSPF protocol will access NE#3 via the shortest path. This path is:
Host#1 <-> NE#1 <-> NE#2 <-> NE#3, costs: 174 + 10 = 184
Now a LAN error occurs, as shown in the figure. In this case, no rerouting takes place because
the 10.12.1.x/24 network is still available. Therefore NE#3 cannot be reached anymore.
A better solution is achieved if the host uses the System router ID, being 10.15.0.3, to reach
NE#3. In this case NE#3 remains accessible via the rerouting path:
Host#1 <-> NE#1 <-> NE#4 <-> NE#3, costs: 174 + 174 +1 = 349
Page 29
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
This section describes some management network examples that illustrate the functioning of the
basic routing options.
4.9.1 Local Management, Host Directly Connected to System LAN and No Routing Protocol
In order to communicate with each other, the system and host must be part of the same subnet.
Note: We advise an equal size of the subnet for all systems connected to the LAN.
If Proxy ARP is used, it is mandatory to use one subnet mask for all connected elements.
The number of hosts and systems that can be connected depends on the size of the subnet mask.
It can be calculated with:
2 (32-X) - 1
where X is the size of the subnet mask. -1 is included in the calculation because the broadcast
address (255.255.255.255) must be excluded.
In this case, local management traffic is realized by communication over the local System LAN
interface. If the host wants to access the System that is not in the same subnet, it will use the
default route entry. This is the ethernet address for router RT#1. RT#1 will deliver the message
to the next element. If the access network is properly connected, System (NE#1) can be
accessed by the host.
Page 30
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The system will use the default route of RT#2 to response to the host.
Note: For hosts with multiple LAN ports, you can sometimes specify a default route per
LAN port. This depends on the operating system, and behavior is undefined.
The point-to-point protocol (PPP) is used to establish the connection between NE#1 and NE#2.
Now the interface address of NE#1 is known by NE#2 and the other way round. This is
something taken care of by the PPP protocol.
Page 31
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
NE#2 is an ASBR (this can be set with the GUI). If OSPF is enabled on System level and on
line port level, the OSPF protocol provides the routing table of NE#1 with 10.15.0.2 and NE#2
with 10.15.0.1. Also the default route, 10.12.0.100, will be advertised.
Note that for the communication between Host#1 and NE#1 it is needed that NE#1 knows how
to access the 10.12.0.x / 24 network. Without OSPF, this information is not distributed and
communication fails.
Figure 16. Example of Remote Management, Host Directly Connected to System LAN
Page 32
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Flags
U: route is up. G: route is to a gateway. H: route is to a host. If this flag is not set, it is a route to
a network.
From this table, it becomes clear that the Host can reach NE#1 via NE#2. The following takes
place when you login with the address 10.15.0.1:
1. The Host cannot find this address on the LAN, so it will use the default gateway:
10.12.0.2.
2. NE#2 receives the message and checks the address 10.15.0.1 in its routing table, and use:
192.168.1.2.
3. NE#1 responses to the host via 192.168.1.2.
4. Next 10.12.0.x/24 is used, because this is advertised by OSPF.
Note: For the local LAN of NE#1, it is necessary to use a LAN IP address that doesn't fit
in the LAN network of Host#1 (for example, 10.127.127.1/30). It is advised to disable
DHCP for NE#1. Otherwise, IP address conflicts may occur. If 10.127.127.1/30 is used,
then the IP subnet addresses are: 10.127.127.0 10.127.27.1, 10.127.127.2, and
10.127.127.3. The first one is often not allowed and the last one is a broadcast. So both
cannot be used as a host address.
Caution: If you use a LAN address for NE#1 that is in the same subnet as the default route of
the host, you cannot reach NE#1 by its router ID anymore. In this case, NE#1 will notice that a
shorter route exists if a request from NE#2 comes in, namely the local LAN of NE#1.
Remarks
• Local addresses
The system software does not use the routing table if a local destination address is
involved. This means that the costs and actual route can be ignored for a local PPP
interface.
Page 33
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
In this configuration, shown in Figure 17, both hosts are able to access any of the systems. All
Systems, except NE#3, are OSPF enabled. So the topology of the network is advertised from
neighbor to neighbor.
The designated router can either be NE#2 or NE#5. Normally, NE#5 becomes the designated
router because it has an router ID greater than the router ID of NE#2.
This is achieved by the fact that NE#5 has OSPF enabled on the LAN interface. This will be
advertised to, among others, NE#4. So if Host#2 wants to access NE#3 via 10.12.0.3, the
following takes place:
1. The message is sent to the default route, being 10.12.1.4. This is NE#4.
2. NE#4, in its turn will access the next hop. This is NE#5.
3. NE#5 will put the message forward to its LAN network: 10.12.0.5/24.
4. NE#3 will pick it up from the LAN network.
Page 34
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
10.127.127.1 / 30
(no dhcp)
NE#1
(10.15.0.1) NE#2
SDH terminal (10.15.0.2)
Host#1
10.12.0.3 / 24
192.168.2.1 / 32 192.168.2.2 / 32 default route:
ospf ospf 10.12.0.5
192.168.2.4 / 32
ospf SDH ring
192.168.1.6 / 32
192.168.2.7 / 32 ospf 10.127.127.1 / 30
NE#7 NE#6
ospf (10.15.0.7) (10.15.0.6) (no dhcp)
192.168.1.7 / 32
ospf
10.127.127.1 / 30
(no dhcp)
4.10.2.2 Example Two: Host #1 Wants to Access a System in the SDH Ring
Host#1 sends the message to NE#2 because its default route is to NE#2. Because OSPF is
enabled for all Systems, NE#2 forwards the message to NE#5. And so on. Also NE#2
recognizes that a shorter path exists; therefore, it will send a so called redirect message to
Host#1. Now Host#1 may change its routing table.
Page 35
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Figure 18 shows an example of a system with ASBR. To make NE#6 an ASBR, it must have a
default route to the LAN network and advertisement must be enabled. In this way, all systems in
the access network can be reached, but only if RT#1 is provisioned for it. This can be done
either on a per individual address basis or by assigning a single entry: 10.15.0.0/28 -> 80.80.2.6.
This covers the range 10.15.0.0 ... 10.15.0.14.
The access network does not get any status information of the autonomous system. This implies
that only internal failures inside the AS can be addressed/resolved. To make it more reliable,
you might consider also involving NE#7 and RT#2 in the routing scheme; however, the network
thereby becomes more complex.
Page 36
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Note that routing protocol inter-working between RT#1 and NE#6 cannot take place because of
the OSPF password authentication.
Caution: Host#1 can use or misuse the routing network to access remote nodes, like SNMP#1.
The routing is not designed for this through traffic. It should be avoided.
Instead of using ASBR and a static routing table for RT#2 to get to the access network (see
“Example with ASBR” on page ), it is also possible to use proxy ARP on an ASBR. Figure 19
shows an example The applied subnet mask /24 (preferred multiple of 8), gives access to a
relatively large subnet. You may want to use /28 which is sufficient in the depicted case.
Page 37
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Note that the routing protocol inter-working between RT#1 and NE#7 cannot take place because
of the OSPF password authentication.
A proxy ARP enabled system will not respond to an ARP request if the routing path involves
the network interface via which the ARP request was received. Only OSPF enabled systems can
be managed via the access network. The managed nodes and at least the LAN port of NE#7 and
RT#1 are part of one subnet.
It is not allowed to have multiple access routers reporting the same or overlapping subnet. This
may result in unmanageable Systems (see next topic).
Figure 20 shows a configuration in which management problems may occur if the connection
between NE#3 and NE#4 is OSPF enabled. The problem occurs because an ARP request for
NE#4 by Host#1 can be answered by both NE#2 and NE#1.
10.15.0.100 / 24
10.15.0.12 / 24
10.15.0.11 / 24 ospf
ospf Host#1 proxy arp
proxy arp
NE#1 NE#2
(10.15.0.1) (10.15.0.2)
OSPF
NE#5 NE#3
(10.15.0.5) No OSPF (10.15.0.3)
NE#4
(10.15.0.4)
Table 20 below shows who is answering on a proxy ARP request if more nodes have their LAN
settings provisioned as proxy ARP.
Page 38
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Note: If the connection between NE#3 and NE#4 was OSPF enabled, an NE#4 ARP
request would also be answered by NE#2. In this way, NE#4 might become
unmanageable.
Note: If resilience is not needed, only one System per LAN network should have the
Proxy ARP feature enabled, this keeps the management network as simple as possible.
The system supports subnetwork connection protection. With the aid of SNCP, the System
protects a low order virtual container (sub) network connection. At the head-end, the virtual
container is permanently bridged into two tributary units (TU). At the tail-end, the selection is
made.
When a defect occurs, or as a result of a user request, the traffic is rerouted to the non-defective
TU. Both resources together form a so called 1+1 protection group (PG).
Only non-revertive switching is supported. This means that the TU where the traffic was
rerouted to remains active when the error disappears. Manual, forced, and clear commands are
supported.
The system supports SNC/N subnetwork protection (refer to ITU-T G.841). In this protection
scheme, the following criteria are used for determination of the active traffic selected path:
• A server signal failure on the subnetwork connection;
• A trace identifier mismatch (TIM);
Note: Per SNCP connection, a user can exclude TIMs from the switching conditions.
LPdTIM results in a consequent action that takes 3 TTI frames to clear, the TTI frame
during which the switch occurs is also lost, together 4 TTI frames = 32 ms.
Note: The user can set the threshold for the DEG criteria (see Section 6.8.5 on Page 77).
Before an SNCP protection switch is executed, the Hold Off Time must have been elapsed. This
time is adjustable between 0 and 10 seconds in steps of 1/10 of a second. This time can be set per
Page 39
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
SNCP protection group. If multiple switch requests are simultaneously active, their hold-off
timers run independently. The switching is completed within 50 ms after fault detection plus the
hold off time.
Worker (from) and protection(prot) legs are linked to different Line Ports. The protected port
always links to a tributary port. The settings for the Non Intrusive Monitors (NIM) are retrieved
from the VC12 termination point (VC12TTP) associated with the protected (to-leg) port. This
applies to:
• Accepted TTI provisioning
• TIM setting
• Degraded Threshold setting
• monitoring mode
For reliable monitoring of SNCP protected cross-connects the system supports multiple
protected cross-connects that share the same worker and protection leg. Sharing of only one leg
is not supported and rejected by the System. Note that at most one of the cross connects can be
bidirectional.
Note: NIM ports shared settings are retrieved from the last provisioned VC12 trail trace
termination point. The initial NIM settings are copied from the first associated VC12 trail
trace termination point with an SNCP protection group.
Note: Changing the termination settings for a protected VC12 termination point will also
be applied to the worker and protection NIM settings.
This may harm your configuration.
Page 40
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Provisioning notes:
• Swapping of worker (from-leg) and protection (prot-leg) requires two user operations.
First the from-leg is removed and next the prot-leg is assigned with the previous worker
leg.
• In order to change the leg of an SNCP protected cross-connect one needs to temporarily
convert the cross-connect into an unprotected one by removing the worker or protection
leg. After this a different protection leg can be added to the unprotected cross-connect
resulting in the changed SNCP protected cross-connect.
Caution: Also the test ports can be provisioned as an ordinary port, in fact it is an ordinary port
for which only the outgoing signal is made available. By changing the settings of the test port,
the above mentioned settings are used for the cross connect in stead of the settings of the
originally applied tributary port.
E1 Incoming Loopback
The System accepts at most one incoming E1 port loopback. If you want to add a new E1 port
loopback you first have to locate the existing one (see page ) and then remove it.
Note: To avoid local alarm messages the locally generated VC12 Alarms are suppressed if
you implement an E1 incoming port loopback.
Page 41
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Incoming Outgoing
Test
IFC 1 LP 1
VC12
E1 AIS
IFC n LP 2
Outgoing
E1 AIS
E1 Outgoing Loopback
If you create an E1 outgoing port loopback an E1 AIS alarm is forwarded in the signal leaving
the system.
Note: There are no restrictions regarding the number of outgoing port loopbacks.
If you create an STM-1 outgoing port loopback an MS-AIS alarm is forwarded in the signal
leaving the system. On the outgoing loopback no alarm is raised but a signal containing an E1-
AIS and MS-AIS is sent out.
Page 42
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
This section provides the information needed during the first set up of the System. Included are
an overview the physical connectors of the System, a description of the settings of the IP
parameters for accessing the System, and an overview of the Web browser (ASX GUI) set up
and behavior.
The System can be managed via the 10/100BASE-T Ethernet LAN interface. To get access to
the management interface, the System must have a valid (known) IP address, in the subnet range
of the LAN it is connected to.
The first time a connection needs to be set-up with a web browser to the System, this can be
done with a direct PC to System LAN connection. The System has an integrated web server.
The Hi There utility can be used to discover that the System equipment is present on the LAN;
no router must be present between the System and PC.
The default address of the System is 10.127.127.1/8. Depending on the use of a DHCP server in
your network, you can provision the LAN port settings. The subnet mask notation /8 is equal to
255.0.0.0 (RFC950).
When no DHCP server is used, a new default address needs to be provisioned for the System.
After System recovery, the System will perform a limited number of attempts to obtain an IP
address/mask from a DHCP server. When not successful, no further requests will be made.
Page 43
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Connect a PC to the local console port. Use a utility like ‘hyperterm’ or ‘putty’. When
connected to the System, a prompt appears. Press enter, type the password, adm123. Now you
have access to the functionality. To change the IP settings you have to type: dbs dr set_ip. The
format is:
Page 44
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Check the keyed in address carefully before entering the address. The System parameters will
directly apply.
Note: The provisioned default gateway should be reachable; otherwise 0.0.0.0 is applied.
After a System recovery the System DHCP client will perform a number of attempts to obtain
an IP address/mask from a DHCP server (if DHCP is enabled). If this is successful, this IP
address/mask will become operational. If this is not successful, the System will fall back to its
default IP settings, but will keep trying to obtain a DHCP assigned address.When the default IP
settings are changed after the DHCP assignment, these settings will become operational.
Changing of the default IP settings in this case is similar to what has just been described for IP
management without a DHCP server (see Section 5.1.1 on Page 43).
Hi There Utility
Page 45
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The Hi There utility can be installed on a Windows PC. This utility is used to discover the
Systems on the subnet the PC is connected to. Each System is installed with a Hi There server
program. The System responds with its MAC address, IP address, sub net mask, IP default
gateway, and Linux host name.
From the Hi There utility, direct access can be obtained to the GUI, by selecting the requested
System with the right mouse button.
Note: In a situation where multiple Systems are using the default IP address, they can be
distinguished by their MAC address.
Note: Only members of the admin group can change the LAN settings.
Note: After the change has been made, connection with the web browser could be lost and
has to be set up with the new address.
• Mask—The default value is 8. Values between 8 and 30 can be provisioned. Provision the
applicable value for your environment.
• Gateway—The factory programmed value is 0.0.0.0. You can provision the default
gateway address. This change will directly become effective if DHCP is disabled.
Page 46
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
• MAC Address—The MAC address of the System. The MAC address of the Systems
always starts with the Organization Unique Identifier (OUI) 00 0f 25. This is a read-only
value fixed for every System. The MAC address is also printed on the label present on the
System.
Note: In case of a DHCP assigned IP address, the IP address field does not reflect this
assigned address.
• DHCP—If you enable this option the System will immediately try to obtain the LAN IP
details (IP address, mask, gateway) from a DHCP server. If this fails the Default values
will be restored. These values are also used if you disable this option (again).
Note: The current gateway can be obtained via OSPF, in that case an IP interface address
of the ASBR System is shown or the IP address of the external access router/gateway. This
gateway address is only be applied if it can be reached directly without involvement of an
ASBR System.
IP2Box needs to be installed on a Windows PC. The IP2Box utility uses the MAC address to
connect to the System. Figure 25 shows the LP2Box utility.
Use the MAC address to connect to the System. Next fill in the requested IP address, Subnet
mask, and Default Gateway. Additionally a Host Name needs to be entered. Next select Assign
to apply the settings.
Page 47
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
5.2.1 Introduction
The System has an integrated web server providing a Graphical User Interface (GUI) for
querying and provisioning the System. Browsers supported for use of the GUI are Mozilla
Firefox and Internet Explorer 6.0. This section contains instructions and guidelines for setting
up the web browser.
Page 48
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The System supports three user groups. Per group, at least ten users can be supported. User
names are unique per system. Each user can change the password after entering the existing
password first. The user is required to enter the new password twice before the new password is
applied. By default, a number of login names are already available.
• view group—Members of the view group have read access only. On the GUI, buttons that
could normally trigger a change of system setting are made invisible.
The view group has one default login name:
– Login name: view
– Password: empty
• config group—Members of the config group have access to normal transmission related
operations. The config group has two default login names.
The view group has one default login name:
– Login name 1: user
– Password: adc123
– Login name 2: config
– Password: adc123
• admin group—Members of the admin group are responsible for maintenance activities
like software upgrading, database operations, user group administration and IP and SNMP
settings.
Only users in the admin group can create or remove users. They can also provide initial
passwords for new users. The password of already existing users can be changed by an
admin user without knowledge about the existing password.
There must always be at least one user in the admin group. For this reason the user admin
cannot be removed.
The admin group has one default login name:
– Login name: admin
– Password: adm123
Note: Also an expert/root user exists via which all the default password settings can be
restored to their factory defaults. Contact ADC for this procedure.
Note: The login screen and System layout differs per platform.
Page 49
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Note: The login screen contains the user name and password.
Caution: It is recommended to change the passwords of admin and config users after
installation.
The welcome screen shown in Figure 26 contains the user identification and password.
The ASX System overview shown in Figure 27 represents the hardware with the eight tributary
slots shown and the eight E1 ports, separated in transmit (TX) and receive (RX) side. This
overview is independent of pluggable items being present or not.
Page 50
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
• E1 Port—(Any port) Details of the E1 port provisioning. In this case, there’s no difference
when accessing it via RX or TX.
• Tributary Slot—(Any slot) Slot details.
• [!}—This button appears when the alarm situation changes: either a new alarm is raised or
an existing alarm has been cleared. Press [!] to clear this indicator.
The System maintains a log file (first in first out) to keep track of changes when system settings
are changed. Per event the log file include a time stamp, a user identification and a descriptive
text. The sort order depends on the provisioning moment. The size of the file is about 100 kB.
Contact ADC for details.
Only users of the admin group can access logfiles. They can download (Backup) them from the
System in WordPad format, as well as Delete them from the system.
Note: Deleting the logfile results in creating a new logfile which shows that the logfile was
deleted.
The details of the menus are described (see on page ) except for the LAN settings which is
described in this section.
Note: Depending on the login rights (see page ) some menus are not shown.
System menu
System | Details
Page 51
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
System | Time
Maintenance menu
Maintenance | Database
Maintenance | Log
Maintenance | Users
Maintenance | Logout
Alarms menu
Alarms | Current
Alarms | History
Alarms | Profile/Severtities
XConnects menu
XConnects | List
Page 52
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Transmission menu
Timing menu
MSP menu
MSP | Details
MSP | Create
Page 53
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Page 54
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
This section contains instructions for using the ASX GUI to provision the System. If a new user,
refer to Section 5.2 on Page 48 for information on setup and basic use of the GUI.
Table 7 lists the tasks that can be done with the ASX GUI and indicates which section of this
manual to refer to for more information.
Page 55
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
This is a short overview of the transmission terms and definitions used throughout this section.
• Downstream—The direction coming from the STM-1 aggregate side into the System, the
de-multiplexing direction.
• Upstream—The direction from the termination points towards the STM-1 aggregate side.
The multiplexing direction.
• Near End—The System at the local side of a protected connection..
• Far End—The system terminating the transmission point at the other side of a protected
connection.
• Connection—An end-to-end related path carrying service, which is terminated at both
ends.
• Consequent Action—An autonomous action of the System. When a failure in the System
is detected this is reported as an alarm. This action will insert (for example, an AIS signal)
in the downstream direction or an RDI in the upstream direction in case of a bidirectional
cross connect.
• Ingress—The incoming side of a port.
• Egress—The outgoing side of a port.
The System has an accurate real time clock on board that provides the System time. This
System time is used to add a time stamp to reported alarms on the web browser and SNMP
traps/notifications.
When no time is set, the default Linux time is taken at startup: January 1, 1970. The SYScTIME
alarm is reported. The accuracy of the real time clock is ± 4.6 ppm or better.
The System software synchronizes the real-time clock to the network timing (see Section 6.11,
Synchronization, on Page 95). The real time clock has an inaccuracy of less then three minutes
per year.
The System Time window is used to view or set the System time. Figure 28 shows the System
Time window. Table 8 describes the System Time window fields. To display the window, select
the following from the ASX GUI menu:
SYSTEM | TIME
Page 56
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Changing the time can be done in two ways using the System - Time window:
• To place the current Host date and time to the System time, click on the Sync button.
• To key in a System time, key in the values in the System time field. Be sure to use the
correct format and values, then click on Edit.
Pluggable items are of two types, Small Form Factor Pluggables (SFPs) and Interface Cards
(IFCs), which are identified in terms of the Tributary Slot (TS) in which they are installed.
Pluggable items are “hot pluggable” (they can be inserted and removed while the system is
powered on).
Caution: Pluggable items (SFPs and Interface Cards) need to be handled according to ESD
guidelines.
Page 57
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The Pluggable Items Selector window shows the current status of all pluggable items known to
the System. Table 29 shows the Pluggable Items window. Table 9 describes the fields. To
display the window, select the following from the ASX GUI menu:
In the Pluggable Items Selector, Interface Cards are identified as Tributary Slots (TS), each with
a unique item number. The System supports the ADC101 Interface Card. The System will
automatically discover an inserted Interface Card (IFC). The default tributary slot state is
AUTO. When the IFC has a supported item code (ADC101-ADC120), the state will change
from AUTO to ASSIGNED and the IFC will be operational; this takes less than one minute.
Selecting the desired TS (Tributary Slot) displays the details for that item. Figure 30 shows the
Interface Card Details window. Table 10 describes the fields.
Page 58
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Page 59
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
When an IFC is replaced with another IFC having a different but supported item code, an
IFCcREPL alarm is reported and the user has the option to accept this IFC. The alarm notifies
the user of the change in item code.
In the last accepted field, the user can view the previous item code and can decide if the change
is requested. When Accept Pluggable Item is selected, the inserted IFC becomes ASSIGNED.
All provisioning regarding this IFC is taken over.
When no IFC is inserted, the related VC12 termination points are available, but in an upstream
direction AIS is inserted into the payload (E1 signal). When VC12 termination point settings
are provisioned, they do not become effective until an IFC is inserted. In this situation, you can
pre-provision the VC12 TTP.
The System has two SFP positions related to the line ports. When an SFP is selected in the
Pluggable Items Selector window, the details for the SFP are displayed in a details window.
Figure 31 shows the Pluggable Items Details window. Table 11 describes the fields.
Page 60
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
When the SFP state is AUTO and an SFP is inserted, this is accepted irrespective of the module
qualifier. When the SFP state is ASSIGNED and an SFP is inserted, then, in fact, it is a
replacement. In this case, the inserted SFP module qualifier is compared with the last accepted.
When the presently inserted and last accepted SFPs differ, an SFPcWUI alarm is raised and the
SFP is not accepted. Transmission is shut down. This alarm notifies the operator of a change of
SFP type. When this change is acceptable, the SFP state has to be changed to AUTO. This
action will cause the SFP to be accepted and the state to be changed to ASSIGNED. When a
timing reference is assigned from this port, the timing reference has to be unassigned before
changing the state to AUTO.
The System supports single fiber or bidirectional SFPs. It is important to have matching SFPs at
each end of the fiber connection. The wave length used for transmitting should be different (see
Table 11 above).
Page 61
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Some actions related to the System software or database may result in a System recovery. A
System recovery takes about three minutes. A System recovery is not service affecting.
Communication with the web browser(s) and SNMP manager(s) are lost. Two minutes after the
recovery, the user can login again. After the System has come up, a cold restart trap is sent to the
provisioned SNMP manager(s).
When at any time a database failure is detected, the System will invoke automatically a System
recovery.
Note: A user can define the alarm priorities (see Section 7.5, Alarm Profiles, Severities,
Reporting, and LEDs, on Page 116).
Note: An alarm output is set if an alarm with the appropriate severity is present, also if the
cause is remotely detected (for example, receiving an AIS). Note that only a locally
detected cause of an alarm contributes to the alarm LEDs (see Section 7.5.3, LED
Indicators, on Page 118).
Note: The alarm output is steady. For example, in case of a loss of signal, the output is
continuously on.
The System supports one Load Line. The current System software release is:
The System has two software memory banks called Bank 1 and Bank 2. Bank 1 contains the
active Image System Database (ISD) and Bank 2 the inactive. The memory banks can be
queried using the window shown in Figure 32.
Page 62
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Table 8 summarizes the possible combinations of bank statuses that may be shown in the
window. To display the window, select the following from the ASX GUI menu:
Image Status
Bank 1 Bank 2 Meaning
Active Inactive Normal situation. Both banks are filled and the software in Bank 1 is currently
running
Active Soak A software upgrade has taken place and the sanity process is not yet finished.
The software in Bank 1 is currently running. When the sanity process is fin-
ished, the new status (either Bank1 or Bank2) is Active or Inactive if the
upgrade is successful, or Soak or Error if a recovery has taken place before
expiration of the sanity timer
Soak Error during last An ISD switch has been unsuccessful (only applicable for the inactive bank).
image transition If this error occurs, the image is valid but a transition error occurred. The
action can be repeated and become successful
Active Empty Normal situation for a System leaving the factory. Bank 2 is empty and the
software of Bank 1 is running
When an inactive ISD is selected, the System switches over to the inactive ISD. The System will
recover and connection to the Web browser is lost.
Page 63
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
This action will be performed when a software upgrade is required. Before activating the
inactive ISD, check that the ISD status is in fact Inactive and that ISD specific details such as
Item code and software version correspond with the ISD requested. During recovery, the
System database will be converted when necessary to the new software version.
Note: If you select the inactive ISD, a warning is shown to indicate the impact of the
operation.
During recovery after an ISD switch, a sanity timer is running. This timer enables the System to
fall back to the previous ISD when the switch was not successful (for example, due to a conflict
in the database). In this way, service is never affected. When a switch is unsuccessful, check
whether the upgrade you were performing is supported. The sanity timer will run for about one
minute after the System is manageable.
Some other facts to be aware of:
1. System recovery takes about three minutes.
2. After the recovery is done, you can login to the System; alarm evaluation has been
completed.
3. Do not perform any database manipulations or provisioning changes during this period. If
the system restarts (for example, due to a power cycle) while the sanity timer is running,
the System selects the previous active software. The database changes made during the
sanity period are lost.
Check after the System is up again whether the requested ISD is active. (Bank 1 always contains
the active ISD.) When a switch over was not successful, the state of the second bank is “error
during last image transition.” This could be caused by a power outage during recovery.
Caution: After a software upgrade has been performed do not attempt any changes in the
System configuration within one minute after you login.
Page 64
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Click on Browse to browse on the PC for the ISD of interest. Select the ISD to be installed.
When selected, the ISD is uploaded to the System. This will take about five minutes. The size of
an ISD is about 6.5 Mb.
Note: The text in the Browse button depends on your local language settings.
Caution: Do not select any other menu during the software upload, this will stop the upload.
When the upload is finished, the details of the uploaded ISD are shown in a separate window
(Figure 35).
Note: The Software Version number in this figure (above) is shown as an example only; it
is not the most recent version number of the software.
A new System has one database, the default database: addf.db. This default database is included
in the System software and will never be lost. Database handling can only be executed by
‘admin’ users. The System supports eight databases, of which one is active.
To display an overview of all database, select the following from the ASX GUI menu
MAINTENANCE | DATABASES
Page 65
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The databases can be identified by name. The currently active database is identified by the
postfix “(active)”.
Selecting a new database may result in incompatibility between the current running software
and the structure of the selected database. For this reason, so called database conversion scripts
are needed, included in the active ISD.
Conversion is only supported from a lower to a higher database version. If for example a
database version #1 is selected while the current running software is supporting database
version #3, a conversion form #1 -> #3 is needed. The System first converts #1 -> #2 followed
by a conversion from #2 -> #3. The original (#1) and intermediate (#2) database (or multiple
intermediate databases, if present) are removed by the system. For fail safe operation, the user
can make a backup of this database by downloading it to a host system.
Note: The converted database gets the hardware identification of the hardware on which
the conversion takes place.
This operation takes a few seconds and is also dependent on the amount of conversions needed.
The request might be rejected if:
Page 66
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
1. A database is selected for which conversion is required but no tooling or script is available.
Note that this implies that the selection of a database with a version number higher than
the current active database version number is rejected.
2. The database file is not existing because it has been removed by a concurrent database
operation.
3. The database does not match the system hardware.
4. Communication with the system is lost due to a concurrent operation which result is a
recovery (for example, active database selection) and software upgrading.
5. Software sanity is in progress, database selection is not permitted.
For database maintenance, use the Database Listing window (shown in Figure 36 on Page 66).
Using this option, a database can be uploaded to the System. Using Browse, select the desired
on the PC connected to the System. A database can be recognized by the extension .db.
A database restore usually takes less than one minute (depending on your network connection).
The typical database size is about 100 Kbytes. When finished, the uploaded database will be
shown in the database list.
Note: The text in the Browse button depends on your local language settings.
With the backup option, a copy (download) of the selected database can be made on the
connected PC.
To backup a database, select it and click on the Backup button. Follow the instructions.
Page 67
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Note: Key in the new name without entering the .db extension.
Deleting the database removes the database from the System. When an active database is
deleted, the System will recover and come up with the default database, retaining the database
name; service will be lost. The SNMP, OSPF, and IP settings are not lost. Deleting the default
database is possible, but it still is present in the System software. When necessary, this database
will be created again and started up.
Activating a database causes the System to recover; connection to the Web browser is lost.
When the selected database has different settings than the current one, transmission is also
affected. When the selected database has identical settings, transmission is not affected.
This option makes a copy of the active database. The database copy will have the filename
entered. The database copy will be stored on the System.
Figure 37 shows the dialog used for entering the filename. After keying in the filename, click on
the Apply button to complete the copy.
A database copy of one System can be used at another System of the same hardware platform
type. Specific databases can be prepared on one System and then uploaded to Systems in the
field. In this way, the multiple Systems can be operational in a short time.
Page 68
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Database copies can also be prepared for specific situations, like emergency cases. The database
copies can be stored and used as needed. When a situation occurs for which a database copy has
been prepared, the database copy can be set to active.
6.8.1 Ports
The System has two STM-1 line ports and 8 E1 tributary ports per interface card.
Monitoring Mode
A common concept in provisioning of the line and tributary ports is the monitoring mode. The
monitoring mode of a port controls the alarm reporting. The default value is AUTO. The options
for the monitoring mode are:
• MONITORED—In this mode, alarm reporting is on.
• AUTO—In this mode, no alarms are reported.
• NOT MONITORED—In this mode, no alarms are reported.
The AUTO mode has an AUTO mode timer for which the default value is 10 minutes. A port in
AUTO mode goes to MONITORED when a valid signal is continuously present on the port for
greater than the period of time specified in the AUTO mode time. The timer starts whenever a
valid signal is detected. The AUTO mode timer can be provisioned between 0 and 30 minutes in
steps of one minute.
The Line Ports Selector window (Figure 38) shows the current monitor mode and Out
Loopback state of the two Line Ports. To display the window, use:
Page 69
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
To provision a Line Port, select the Line Port name and click on the Edit button to display the
Line Port Details window, shown in Figure 39.
After the Line Port is displayed, you can proceed to provision the Line Port. The Port
Automode Time, Port Monitor Mode, and Out Loopback values can be provisioned.
By default, the Force Do Not Use value is disabled. When this value is set to Enabled, the SSM
out value will be set to “Do Not Use” (SSM value 1111). The far end system connected to this
line port will not select this signal for synchronization when QL enabled is selected. For more
information on synchronization, see Section 6.11, Synchronization, on Page 95.
The E1 tributary ports support unframed E1 transmission. In fact, they are transparent for any
type of 2 Mb/s signal according to ITU-T G.703; for example, they are framed with or without
CAS (Channel Associated Signalling).
Note: In the selection list of tributary ports, only those ports are shown of ASSIGNED
Interface Cards.
The tributary port selection can be made using the Tributary Ports Selector window, shown in
Figure 40. To display the window, use:
Page 70
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
To display the details for a tributary port, select the port and click on the Edit button. Figure 41
shows the Tributary Port Details window.
After displaying the port details, you can proceed to provision the port. The Port AutoMode
Time, Port Monitor Mode, and User Label can be provisioned. The user label is displayed
during E1 port provisioning, the provisioning of a cross connect involving a tributary port, and
for an E1/VC12 termination point related alarm.
Note: Changing the User Label while an alarm exists results in clearing the alarm,
immediately followed by raising the alarm with the new label.
The timing-related items do concern the retiming feature (Section 6.11.7, Retiming E1 Ports, on
Page 103).
Default value for the Timing Mode setting is “Self Timed.” In this mode, the retiming option is
disabled. See Section 6.11.7, Retiming E1 Ports, on Page 103.
Page 71
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
In the Tributary Port Selector window (shown in Figure 40 on Page 71), the Loopback field is
set to “In Loopback” (see Section 4.12, Port Loopback Functionality, on Page 41).
At a termination point, the virtual container is terminated (sink) and constructed (source). The
following levels of termination points can be accessed:
• RS and MS Regenerator section (see “RS and MS Section” below)
• VC4 (see page )
• VC12
The RS and MS termination point selection can be using the RS/MS Selection window shown in
Figure 42. To display the window, use:
The RS and MS termination points are direct related to the physical line ports. The monitoring
mode therefore cannot be provisioned and is slaved to the related line port mode. The
monitoring mode of the RS/MS TTPs controls the alarming on these points. Use Edit to show
the details of the selected RS/MS termination point (Figure 43).
Page 72
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
RS Termination Point
For the RS termination point (rsTTP), the J0 byte Trail Trace identifier can be provisioned (see
Section 6.8.6, Trail Trace Identifier Provision and Handling, on Page 78). Specific for the J0
byte is, in the Non specific byte mode the J0 value is 01.
MS Termination Point
For the MS termination point (msTTP), the degraded threshold value set can be selected. This
defines the threshold at which an MS degraded alarm will be reported.Two sets are available.
These sets can be provisioned separately (see Section 6.8.5, Degraded Threshold Provisioning
and Handling, on Page 77).
The System has two VC4 termination points which are directly related to the line ports, of
which one is selected independently per port. Line port 1 has a fixed VC4 cross connect to VC4
#1 and Line port 2 towards VC4 #2.
The default monitoring mode of the VC4 termination points is monitored. The VC4 TTP
monitoring mode controls the alarming on this point, except for the VC4cPLM and VC4cLOM
which will be reported irrespective of the monitoring mode (see Section 7.6, Resolving Alarms,
on Page 118 ).
To select a VCR ports for provisioning, use the selector window (Figure 44). To display the
window, use:
Page 73
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Note: When MSP protection is enabled, the VC4 termination point related to the
protection line port does not exist (see Section 6.10, Transmission Protection MSP, on
Page 89).
Use Edit to get the details of the selected termination point (Figure 45).
Page 74
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The System has 64 VC12 termination points. Irrespective of the presence of Interface Cards, the
VC12 terminations points are available.
The list of VC12 termination points can be retrieved using the window shown in Figure 46. To
display the window, select the following from the System menu:
Page 75
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Note: When applying a bidirectional cross connect, or unidirectional in which the VC12
TTP is the To point toward a VC12 termination point, the monitoring mode will be set to
Monitored.
Use Edit to get the details of the VC12 termination point in the details window (Figure 47).
Table 14 describes the fields.
Page 76
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
For every termination point, two sets of degraded thresholds can be provisioned. The value of
the provisioned degraded threshold defines the number of background block errors in the related
path or section overhead which lead to a Degraded Signal alarm, when the number is exceeded.
When using MSP protection, an MS degraded can cause a protection switch.
The default value of the degraded value corresponds with the severely error second declaration
in the Performance Monitoring domain.
The duration value defines the number of consecutive seconds in which the errors of the
degraded signal exceed the threshold value. This value can be provisioned from 2 to 10 seconds,
the default is seven seconds.
The degraded thresholds can be provisioned for MS, VC4 and VC12 level, as shown in
Table 15.
Page 77
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
RELATIVE VALUE OF
SIGNAL LEVEL DEFAULT VALUE THE DEFAULT RANGE
STM-1 (MS) 28800 15% 1..192000
VC4 2400 30% 1..8000
VC12 600 30% 1..2000
The degraded threshold can be defined as two global sets per level, and per specific termination
point the threshold set 1 or 2 can be chosen.
To get the global set for all values, use the Degraded Thresholds Overview window (Figure 48).
You can display the window using:
Two sets of degraded thresholds exist. On every individual termination point of the
corresponding level, you can make a selection out of the two sets.
The trail trace identifier (TTI) enables an end to end check on the transmission path. The source
will send a transmitted trail trace identifier which is received at the destination (accepted trail
trace identifier). When TIM (Trace Identifier Mismatch) detection is enabled, the accepted trail
trace identifier is compared with the expected value. When a mismatch is detected, a TIM alarm
is reported. As a consequent action of the TIM, AIS is sent downstream and RDI is inserted in
the upstream direction. VC12 RDI is sent upstream only in case of a VC12 bidirectional cross
connect.
Page 78
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
• Non-Specific Byte—In this mode, a constant value is sent in the TTI. For the System, this
is 01 for the RS level and 00 for VC4 and VC12. In this mode, no transmitted and accepted
value can be provisioned. For J0 (RS), a trail trace identifier mismatch is detected when
the accepted TTI does have a different value than 01. For J1 and J2 a trail trace identifier
mismatch is detected when no non specific byte is received. When TIM detection is
enabled, a TIM alarm for this termination point is reported and, as a consequent action,
AIS is sent downstream and RDI upstream.
• String—In this mode, a 15 byte string can be provisioned for the transmitted and expected
value. On the transmitted byte, a CRC check byte is added internally in the System. The
values to be entered must be according to the ITU-T T.50 character set. When TIM
detection is enabled and the accepted (received) trail trace identifier differs from the
expected one, a TIM alarm is reported and, as a consequent action, AIS is sent
downstream and RDI upstream.
When selecting a requested termination point to be changed, the trail trace identifiers can be
provisioned. This behavior is similar for all levels VC12, VC4 and RS. The example is a VC12
level (Figure 49). Table 16 describes the fields.
Page 79
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Page 80
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The System supports remote error indication (REI). This is supported for all layers: MS, VC4
and VC12. The REI is inserted in the upstream direction and corresponds with the measured
background block error rate in the downstream direction. When the far end system supports far
end performance monitoring, these values can be used for the measurements. Both VC4 and
VC12 should be bidirectional.
To provide transmission over the System, cross connects have to be provisioned. From each line
port, a fixed VC4 cross connect is present towards the low order cross connect function. Within
this low order cross connect, VC12 cross connects can be provisioned. Cross connects can be
made full flexible, from:
• Every tributary port towards every TU12 (klm) on the line port, and vice versa
• Among line ports
• Among tributary ports
The actions on cross connects consist of adding and deleting cross connects. Two basic types of
cross connects can be made
• Unidirectional
• Bidirectional
6.9.1 Definitions
Cross connects can be added and deleted. In this section, the parameters for provisioning them
are listed.
From
The From point in a cross connect defines the originating point. Choosing which point will
become the From is mainly of importance when adding unidirectional cross connects. Note that
from an existing cross connect the from point can be edited, however this is not possible from
the To point.
To
The To point in a cross connect defines the destination point. At this point the VC12 path
overhead is terminated if it is a VC12 termination point. In the System, VC12 termination
points only exist at the tributary slot related points.
The System supports VC12 SNCP path protection. The protection switch can be triggered to
become active if a TIM (Trace Identifier Mismatch), an UNEQ (unequipped VC), or a DEg
Page 81
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
(degraded signal) condition exists on the service connection (if the stand-by connection does not
show these defects).
At a VC12 termination point, the VC12 path is terminated to a To point and generated at a From
point. The provisioning of the VC12 termination point can be made (see Section 6.8, Ports and
Termination Points, on Page 69). VC12 termination points only exist at the tributary port. There
is a fixed relation between the tributary port number and the VC12 TTP number. There are
noted as TSX.Y where X is the slot position and Y is the port number. Cross connects can be
added irrespective of the presence of Interface Cards.
Note: For related alarms, refer to Section 7.6, Resolving Alarms, on Page 118.
TU12 connection termination points exist at the line ports. These points are noted as LPX.klm
where X is the line port and klm identifies the position of the TU12 in the VC4, the so-called
TU12 numbering:
• k = 1...3 = TUG3
• l = 1...7 = TUG2
• m = 1...3 = TU12
The line port TU12 points are not terminated in the System at the end points of a VC12 path. In
fact, the line port points are TU12 non-intrusive points; no overhead is added or extracted.
When MSP is provisioned, only the TU12 points from the MSP leg are available.
If the not cross connected TU12s, VC12 unequipped is inserted in upstream direction.
Type
The type identifies if the cross connect is bidirectional or unidirectional. The following
definitions apply:
Bidirectional
A bidirectional cross connect supports traffic in two directions. Bidirectional cross connects can
be made between:
• Line port and tributary port—Traffic coming from the line port is dropped to the
connected port (downstream) and traffic from the tributary port is added to the line port
signal (upstream).
• Tributary and tributary port—Traffic is connected in both directions between two
tributary ports.
Page 82
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Line port and line port—Traffic is connected in both direction at TU12 level between the
line ports selected. This connection type can be used when there is no need to drop traffic
in this System. This type is called through cross connect.
Unidirectional
A unidirectional cross connect supports traffic in one direction. Coming from the From point
towards the To point. For the unidirectional cross connect several applications do exist. Major
difference with the bidirectional is that unidirectional cross connects can be made between two
free points but also can be added to the from point of an existing cross connect (bridging) They
only can be added to the from point, you have to realize this when adding cross connects which
you later want to bridge with a unidirectional cross connect.
• Loop back cross connect—A unidirectional cross connect with the same from and to
point, can be used as a VC12 loop back.
• Broadcasting—Uni directional cross connects can be multiple bridged. In this way a
broadcast function is supported. Multiple outputs are provided with one source signal. The
source signal is coming from the “From” point. The number of bridged points is unlimited.
The return path is unassigned. A point which is once being used as a “To” point can only
be used once.
Unidirectional cross connects can be made between the same type of points as bidirectional. As
unidirectional cross connects do not have a return path no RDI and REI will be inserted.
To delete or edit cross connects use the Cross Connect List window (Figure 50). To display the
window, select:
Page 83
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
To show and modify the settings of the cross connect, select the cross connect in the Cross
Connect List window.
Note: If a user considers that in the future an unprotected cross connect might be changed
into a protected it is important to realize that LP<->TP is different than TP<->LP. Only the
first one allowed the conversion to a protected cross connect.
To edit a cross connect, select the cross connect in the Cross Connect List window, select the
new From / Protection points, and click on Apply.
To delete a cross connect, select the cross connect in the Cross Connect List window and click
on Delete. No further message is shown and transmission via this cross connect will be lost.
The System supports sequentially adding cross connects. After a cross connect has been added,
the window returns with a pre-selection for the next logical selection. When no next logical
selection is available, no pre-selection is made. In the selection list, only available cross connect
candidates are listed. Once a point has been cross connected, it will be removed from the
selection list. Supported are:
• Bidirectional cross connects (see Section 6.9.3.1 below)
• Unidirectional cross connects (see Section 6.9.3.2 on Page 86)
Page 84
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
• Protected SNCP Bidirectional cross connects (see Section 6.9.3.3 on Page 87)
• Protected SNCP Unidirectional cross connects (see Section 6.9.3.4 on Page 88)
Adding a bidirectional cross connect sets the VC12 termination point(s) involved to monitored.
Adding a unidirectional cross connect sets the mode to monitored if the VC12 termination point
is the To point. Deleting a cross connect will not change the monitoring mode. For a
bidirectional cross connect, a VC12 termination point is not always involved. When connecting
to a line port, a TU12 CTP (connection termination point) is involved and these do not have a
monitoring mode.
Select the desired to and from point, then click on Add. The cross connect will be established.
If you assign a user label, it is also shown in the screen. For more information on user labels,
refer to Section 6.8.3, Tributary Ports, on Page 70.
Page 85
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Adding a bidirectional cross connect will set the VC12 termination point(s) involved to
monitored. Adding a unidirectional cross connect will set the mode to monitored if the VC12
termination point is the To point. Deleting a cross connect will not change the monitoring mode.
For a bidirectional cross connect, a VC12 termination point is not always involved. When
connecting to a line port, a TU12 CTP (connection termination point) is involved and these do
not have a monitoring mode.
Select the desired to and from point, the click on Add. The cross connect will be established.
Note: This is the same for the other add unidirectional cross connect options.
Page 86
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
An SNCP protected cross connect can be either uni- or bidirectional, and, in either case, can be
either of the following:
LP1 ->TP <- LP2
Example
To create an SNCP unidirectional cross connect for LP1 -> TP <- LP2, select
Select the desired ports, then click on Add. The cross connect will be established.
Note: This is the same for the other add uni- or bidirectional SNCP cross connects.
Page 87
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Note: For SNCP protected unidirectional cross connects, only the selector is provisioned,
and not the bridge. A bridge can also be created manually.
Swapping of worker (from-leg) and protection (prot-leg) requires two user operations. First the
from-leg is removed, then the prot-leg is assigned to the previous worker leg.
In order to change the leg of an SNCP protected cross-connect:
1. Temporarily convert the cross-connect into an unprotected one by removing the worker or
protection leg.
2. Add a different protection leg to the unprotected cross-connect, resulting in the changed
SNCP protected cross-connect.
To edit an SNCP cross connect, use MENU: XCONNECTS | LIST to list the cross connects,
then select a cross connect and press Details to display a window such as shown in Figure 55.
Table 17 describes the fields.
Page 88
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Note: You cannot overrule the status of an SNCP group with a switch request having a
lower priority than the current priority. In this case you first have to execute a “Clear”
request and then the actual request.
Page 89
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The MSP protocol enables the user in an end to end terminal application to have an STM-1
section protected. Both worker and protection leg carry the same information. The selection for
worker or protection is made at the receiver side. When MSP only is used, one VC4 (63*VC12)
container can be transmitted instead of two. Only the VC4 related to the worker MSP leg will be
available.
The service interruption due to an MSP switch will be shorter than 50 ms.
An MSP pair can be set up between line port 1 and line port 2 (with line port 1 as worker and
line port 2 as protection, and vice versa).
6.10.1 Precautions
When the above precautions are not followed, an error message is shown on the Web browser
when an attempt is made to create an MSP pair.
The following definitions and related concepts are important to understand when provisioning
MSP pairs:
• Unidirectional—In unidirectional mode, the switching of near end and far end are
independent.
• Switch Criteria—Failures detected at the MS layer lead to an MSP switch. When an
MS1cSSF or MS1cAISis detected at the MS section, a signal fail is declared for that leg.
When an MS degraded is detected, the leg is declared Degraded.
• Signal Fail—A signal fail indicates that the corresponding leg has an MS failure. SFP
failures are also included.
• Degraded—The corresponding leg has an MS degraded alarm, based on the degraded
threshold provisioning (see Section 6.8.5, Degraded Threshold Provisioning and
Handling, on Page 77).
• Worker—The leg defined as worker during MSP setup.
• Protection—The leg defined as protection side during MSP setup.
• Active Leg—The leg currently active, the selected input source.
• Standby Leg—The leg currently not active.
• Non-revertive—In non revertive mode, the traffic switches to the protection side when a
failure has been detected at the worker side. It remains at the protection side when the
failure has been cleared.
Page 90
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
• Revertive—In case of a failure in revertive mode, the traffic switches to the protection
side and switches back when the failure has been cleared after expiry of the wait to restore
timer.
• Wait to Restore—The wait to restore timer, only applicable in revertive mode, defines the
time the switch will revert after a failure has been cleared. During expiry of the wait to
restore time, no failure should be detected, otherwise the state will return to failed. To
avoid intermittent behavior of the MSP switch, due to a toggling MS1 failure, between
failed and not failed, the WTR timer is used. In this way, an MS1 layer needs to be non-
failed for a certain period; this period is the WTR time.
• External Switch Requests—The user can invoke switch requests via the web browser to
override the automatic switching . In case of maintenance this might be useful.
• MSP and Alarming—The alarm location used for the VC4 and TU12 locations will
differ when MSP is enabled. As these termination points are in the traffic path, related to
the active leg, the alarm location will be LPa indicating it is related to the active leg. Check
the MSP details to find out which leg is active.
An MSP pair can be created with LP1 as worker and LP2 as protection, or vice versa. Select the
operation mode required, non-revertive or revertive, then click on Create. Once the MSP pair
has been created, no changes regarding operation mode or worker/protection side can be made.
To change these settings, the pair has to be deleted and recreated with the desired settings.
Note: If a port is carrying traffic or the MSP pair already exists, a warning is displayed
(Figure 57).
Page 91
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The MSP pair will be pre-selected, as there is only one MSP pair available. Select Delete to have
the MSP pair deleted.
This may be service affecting; however, if near end and far end are both set to worker, no service
impact is expected.
The MSP pair will be pre-selected, as there is only one MSP pair available.
Page 92
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Select Edit to display an MSP Details window (Figure 59). Table 18 describes the fields.
Page 93
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
To override the MSP automatic switching, the user can invoke an external switch request. To
execute a switch request, select
Executing switch requests may lead to a service interruption of less than 50 ms. The current
switch state is shown in the State field.
When a switch request is initiated, a warning pops up to indicate switching may be service
affecting. The user has then the option to cancel the switch request.
Page 94
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The WTR (wait to restore) timer is only applicable in revertive mode. The default value is five
minutes. This timer can be provisioned between 0 and 60 minutes in steps of one minute.
Setting the timer to 0 minutes will disable the wait to restore timer.
6.11 Synchronization
The intention of Synchronization is to synchronize the whole SDH network to one master clock.
The provisioning of the individual network elements must be aligned to be synchronized from
one side and forward the reference towards the other side of the network. Before provisioning
the System, a network synchronization plan must be available, including a backup plan when
the master clock fails, preventing timing loops in any scenario.
The System has an internal clock corresponding to ITU-T G.781 option-1 with an accuracy of ±
4.6 ppm of its nominal frequency.
Changing the synchronization setting takes some time to complete the details shown on the
window returned after the action is not up to date. A refresh of the window is needed to get the
actual details.
Note: In Section 7.10, Synchronization Network, on Page 134, an example is given for
provisioning synchronization of a network.
Page 95
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
6.11.1 Definitions
Page 96
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
– In a case where the System is in holdover or free running mode, the SSM out is
SEC.
– In a case where the System is locked to a certain port, the SSM out on this port is
DNU, to prevent timing loops in the network.
– On line ports, the SSM out represents the System QL (except for the active
reference, see previous case).
– For an MSP pair, both line ports have the same SSM out value.
– When the QL is disabled, the SSM out is DNU.
The System has the ability to provision three independent timing sources. One from one of the
E1 ports and two from both line ports.
to display the Timing Sources List (Figure 61). Table 20describes the fields.
Page 97
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
To edit timing source details for a line port, select the line port in the Reference field in the
Timing Sources List (shown in Figure 61 on Page 97); then click on Edit to display the Timing
Source Details window (Figure 62).
Assigning and editing the reference are separate actions. It is preferred to first assign the
reference and next edit the settings.
Page 98
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
1. Assign
Select the line port to be assigned to this timing source and select the assign button. Only
the line port references available are shown. When MSP is enabled only the worker port of
the MSP pair is available.
2. Edit
Choose from:
Reference: indicates the assigned reference to this timing source.
3. Monitored
Choose from:
– Monitored
– Not monitored: Now a timing source failure can be reported for this timing source
with a SYNCcTLF.
Table 21 describes other fields in the window.
Page 99
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
To edit timing source details for a tributary port, select the tributary port in the Reference field in
the Timing Sources List (shown in Figure 61 on Page 97); then click on Edit to display the
Timing Source Details window (Figure 62).
The procedure is the same as explained for provisioning a line port (see Section 6.11.3,
Provisioning Line Port References, on Page 98). Only differences with provisioning line port
are explained.
• Reference
Only references from Interface Cards which are in the ASSIGNED state are available.
Only one E1 port from all tributary ports can be selected.
• QL-in
As the System does not support SSM values for the E1 ports, there is no QL-in value.
Page 100
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
• Reference status
A reference fail for an E1 port may be due to:
– E1cLOS or E1cAIS.
– An excessive frequency offset of the reference.
• QL provisioned
As the System does not support SSM for E1 tributary ports thus a QL value needs to be
provisioned. A value corresponding to the quality of the reference needs to be chosen. Be
aware that changes in the frequency accuracy of this reference will not be observed. The
default value is SSUT.
When provisioning System timing, the timing mode can be chosen and the use of the SSM
algorithm. Next to that timing reference, switches can be made to overrule the automatic
selection when the System is under maintenance. Provisioning and switching are separate
actions in the System timing menu. To provision System timing, select
to display the window shown below (Figure 64). Table 22 describes the relevant fields.
Page 101
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The selection of the active reference can operate in two modes, priority based and SSM based
(see SSM Based Algorithm on Page 103).
Each timing source can be provisioned with a priority. These priorities can be 1,2 or 3. The
lower this number the higher the priority. Multiple timing references may have the same
priority.
Page 102
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Priority based selection is operational when QL is disabled. The reference with the highest
priority will be selected. In case multiple references have the same priority the selection is
random. When a reference fails the next in priority will be chosen, when the first becomes non-
failed the System will revert to the reference with the highest priority.
When multiple references have the same priority and one of them fails, the other one, with same
priority will be chosen. When the failed reference becomes available again the System will not
revert to that one.
When QL is enabled, the selection is SSM based. The reference with the highest quality will be
chosen. For QL definitions, see Table 19 on page 96. The quality levels in descending order are
PRC, SSU-T, SSU-L, SEC.
The following rules are applicable for the SSM based selection:
• All references that are not failed and do not have SSM=DNU are considered for selection
• The reference with the highest QL will be selected.
• In case multiple references have the same QL, the one with the highest priority is selected.
• In case multiple references have the same QL and the same priority, the selection is
random.
• In case no suitable reference is available the System will switch to holdover and a
SYNCcBHO is reported.
Each individual E1 port can be provisioned in retiming mode. In retiming mode, the frequency
of the outgoing E1 signal is resynchronized with the System frequency. A retimed E1 output
port can be used as timing reference for the System connected to, as the E1 signal coming from
the retimed port has the System timing frequency. In normal operation, self-timed, the
frequency of the E1 output signal is the floating average of the frequency of the E1 input signal.
Using an E1 port in retiming mode might affect the traffic on this connection. When there is a
frequency difference between the incoming E1 payload signal and the System frequency, this
causes bit errors. The frequency difference is handled with a buffer. When there is a frequency
difference, this buffer over- or underflows. Each over- or underflow leads to a buffer re-center.
This causes a controlled slip. A frequency difference of 1 ppm leads to a slip once per halve
minute.
to display the E1 ports then select the port of interest and click on Edit to display the E1 Trib
Ports Retiming Provisioning window shown in Figure 65.
Page 103
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Page 104
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
6.12 SNMP
The System supports a Simple Network Management Protocol (SNMP) agent. This enables the
System to sent SNMP alarm traps or notifications to an SNMP manager, also the current raised
alarms can be requested. The System supports both SNMPv1 and SNMPv2. The user can
provision up to five SNMP managers. These are identified by their IP address. The community
string has to be entered, public, and a selection for traps v1 and or v2 notifications can be made.
Autonomous events are reported to the SNMP manager. In a trap notification, the alarm
description, location, severity, and time stamp are shown, and if it is a raise or clearing.
Requesting the current alarm list is possible when using the enterprise MIB with prefix:
iso.org.dcd.internet.private.enterprise
AimValleyBV(1.3.6.1.4.1.23862)
Before being able to show this list, you have to import the System MIB to the SNMP browser.
The MIB files are available at the System software CD. Please contact ADC for MIB files.
Next, you compile the MIB in the SNMP browser. Now the browser is able to retrieve the
current alarm list. These actions will be specific for the SNMP browser being used.
The alarm reporting towards the SNMP manager is identical as the alarms reported at the web
browser.
to display the SNMP Details window shown in Figure 66. Table 24 describes the fields.
Page 105
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Note: The UTC time is used (see Section 1.6.6, Real Time Clock, on Page 9).
Page 106
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
to display the window shown below (Figure 68). Table 25 describes the fields.
Page 107
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
to display the window shown below (Figure 69). Table 26 describes the fields.
Page 108
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
To reach the OSPF LAN/LP interfaces select the following from the ASX GUI menu:
A window appears. In this window, select LAN or LP1/LP2. Depending on the selection, the
screen displays the OSPF Interface LAN, OSPF Interface LP1, or OSPF Interface LP2 window.
Figure 71 shows an example.
Page 109
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Page 110
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The field RouterID shows the OSPF enabled systems that can be reached. Note that RouterID is
displayed.
Page 111
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Page 112
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
7 ALARMS
The System supports alarm reporting for all SDH levels (RS, MS, VC4, and VC12), equipment-
related alarms, port-related alarms and synchronization-related alarms. These alarms will be
reported to the Web browser, the SNMP manager when provisioned, and can be visible at the
System LEDs.
When a defect is present, is reported as an alarm within 2.5 ± 0.5 seconds. When the cause of a
raised alarm is cleared within 10 ± 0.5 seconds, the clearing is reported and the alarm is added
to the history list.
In the most recent alarms bar in the Web browser, the most recent alarm is shown with the raised
time and the number of outstanding active alarms (Figure 73). Table 29 describes the fields.
The alarm refresh rate is the rate at which alarms are reported. This refresh rate is specific for
every Browser connection. It is set to the default value of five seconds when reloading the
browser page or when re-logging in to the System.
To display the GUI settings for the alarm refresh rate, select
Page 113
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Selecting None/Stop causes the most recent alarm bar to not be updated. The refresh rate can be
set to 1, 5, 10, 60, 300 seconds or none/stop.
The Current Alarms window (Figure 75) shows all current outstanding alarms. To display the
window, select
Page 114
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
To have the current alarm list updated to the current situation, you have to refresh it (see
Section 7.6, Resolving Alarms, on Page 118). Notifications towards the provisioned SNMP
manager are sent autonomously.
The System has a log for 500 cleared alarms. Alarms that are cleared are put in the alarm history
with the alarm type, severity, time raised, and time cleared time stamp.
Page 115
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The alarm severity and reported mode can be provisioned per alarm type individually. To
display the alarm types, select
to display the alarm profile list (Figure 78). Table 32 describes the fields.
Page 116
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
To change the alarm reported mode or severity, first list the alarm in the Alarm Profile list (just
shown in Figure 78 on Page 116), then select the alarm of interest in the list and click on the
Edit button to display the Severity Settings window (Figure 79). Table describes the fields.
Page 117
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Though LED indicators are described in this section, no provisioning is applicable for them.
In addition, for the Yellow LED and Red LED, the following applies:
• These LEDs indicate only those alarms that are the consequence of defects detected in the
System. This means that SSF, RDI, and AIS alarms do not contribute to the LED state.
7.6.1 Introduction
This section describes the alarms that can be reported by the System. For each alarm type, there
is a specific description and a description of some probable root causes. Alarm types are split up
into logical levels.
This section is intended for maintenance employees and network operators. This section
provides information to support them in their tasks of resolving alarms or analyzing end
customer complaints.
Current alarms are identified by the location, alarm type, severity, and a time stamp of the raise
time.
7.6.2 Location
The location of an alarm identifies the detection point. This can be any of the following:
• System—a System related fault.
• IFC—related to the Interface Card, followed by a slot position.
• SFP—related to an SFP, in line port 1 (LP1) or line port 2 (LP2).
• Line port—related to Line port 1 or 2.
• VC4 termination point—identified by related line port, LP1, LP2 or the active line port
(LPa) in case of MSP.
• VC12 termination point—identified by tributary slot number, followed by the port
number.
• VC12 monitoring point—identified by related line port, followed by klm indication.
Page 118
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
• AU alarm—identified by line port number, LP1, LP2 or the active line port (LPa) in case
of MSP.
• TU alarm—identified by line port number, LP1, LP2 or the active line port (LPa) in case
of MSP, followed by the klm indication.
Table 34 shows all defined alarm types and their default severity and default LED state.
Page 119
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
COLUMN DESCRIPTION
Alarm Type This is a short name (mnemonic) of the fault cause according to the ITU standards: G.783,
G.784 and G.806
Severity This identifies the provisioned severity for the alarm. The default severity is listed by the
descriptions (see Section 7.5, Alarm Profiles, Severities, Reporting, and LEDs, on Page
116)
Time Stamp The time stamp identifies the raise time of the alarm. This time is based on the System time
of the System (see Section 1.6.6, Real Time Clock, on Page 9)
Reported Mode The default reported mode for all alarms is reported, except for the SYScPFA and
SYScPFB alarm. When an alarm is required to not be reported, this can be provisioned (see
Section 7.5.2, Changing the Alarm Reported Mode or Severity, on Page 117)
Page 120
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The monitoring mode of a port or termination point controls the alarming. If the monitoring
mode is monitored, alarms are reported on that point. If the state is not monitored, alarms are
not reported. See Section 6.8, Ports and Termination Points, on Page 69.
The pluggable items state affects the reporting of alarms. In the assigned state all alarms are
reported. In the AUTO state, only the EQF and WUI alarms are reported (see Section 6.4,
Pluggable Items, on Page 57).
When a complete System needs to be replaced, the database of the previous System can be used
on the other System. In this way the System will be directly operational. But the IP, OSPF and
SNMP parameters need to be provisioned as they are not part of the database.
7.8.1.1 SYScTIME
The System time is not set or lost. The System time is running from start up on the default linux
clock.
Alarms will be reported with a wrong timestamp, not the real time.
System time has not been provisioned. Or System time has been lost due to a power outage
longer than 10 minutes.
7.8.1.2 SYScPFA
When this alarm is reported the System has another power feed, but redundant powering on feed
A is unavailable.
No power connected to power feed A. Or voltage is below 40.5 Volt. Or the -48 and 0
connections are swapped, the System will operate but a SYScPFA is reported. The default
reporting state is not reported, When monitoring is required the state must be set to reported.
Page 121
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
7.8.1.3 SYScPFB
When alarm is reported the System has another power feed, but redundant powering on feed B
is unavailable.
No power connected to power feed B. Or voltage is below 40.5 Volt. Or the -48 and 0
connections are swapped, the System will operate but a SYScPFB is reported. The default
reporting state is not reported, When monitoring is required, the state must be set to reported.
Note: For Power over Ethernet no power monitor is available. This is a non-redundant
input and mixing PoE and telecom power feed is forbidden.
7.8.1.4 SYScEQF
7.8.1.5 SYScROUTE
Reduce the number of nodes in the OSPF AS (see Section 4.1, Open Shortest Path First (OSPF),
on Page 25).
7.8.2.1 IFCcUNP
A unit not present for the identified slot has been detected, although a unit is expected.
The Interface Card of an assigned slot has been removed. Reinsert the correct Interface Card or
when no Interface Card is desired for this slot position change the slot state to AUTO (see
Section 6.4.2, Interface Card (IFC), on Page 58 )
7.8.2.2 IFCcWUI
A wrong unit inserted has been detected for the identified slot.
Page 122
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Transmission provisioned towards this slot will be disabled, the interface on the card will be
shut down. When a port of the Interface Card is assigned as timing source this reference is
declared failed with a SYNCcTLF, to prevent synchronization from an invalid reference.
The inserted Interface Card has a not supported item code. Replace the Interface Card by a
supported type.
7.8.2.3 IFCcREPL
A different Interface Card as the previous inserted one has been inserted. But the item code of
the inserted Interface Card is within the range of supported Interface Cards.
Transmission is retained towards the Interface Card, but depending on the e.g. impedance of this
card and the previous inserted card, transmission might be affected.
Accept the Interface Card (see Section 6.4.2, Interface Card (IFC), on Page 58). Take care
cabling is according to this Interface Card.
7.8.2.4 IFCcEQF
Transmission is not shut down, but due to the nature of the failure transmission can be lost.
When a port of the Interface Card is assigned as timing source this reference is declared failed
with a SYNCcTLF, to prevent synchronization from an invalid reference.
Replace IFC.
7.8.2.5 SFPcUNP
A SFP not present has been detected for the identified line port position.
Reinsert a correct SFP with the correct module qualifier (see Section 6.4.4, Small Form
Pluggable, on Page 60).
7.8.2.6 SFPcWUI
A wrong SFP inserted has been detected for the identified line port. The module qualifier of the
inserted SFP differs from the last accepted SFP.
Transmission will be shut down to this line port. When this port is assigned as timing source this
reference will be declared failed with a SYNCcTLF
Page 123
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Reinsert an SFP with an identical module qualifier as the last accepted one. or change the state
to AUTO and the System will set the current inserted SFP to operational (see Section 6.4.4,
Small Form Pluggable, on Page 60).
7.8.2.7 SFPcEQF
Transmission is not shut down, but due to the nature of the fault transmission can be affected.
Replace the SFP with an identical one (same module qualifier) and return the failed SFP.
7.8.3.1 SYNCcBHO
System timing has fall back to hold over mode. The System is running on its hold over clock.
None of the provisioned references is available or has sufficient quality.
Transmission is not affected, but the System timing is not locked to a valid reference.
Check if any timing source is provisioned. Check if the provisioned timing sources do have a
timing link failure SYNcTLF and if they are in MONITORED mode.
7.8.3.2 SYNCcTLF
A timing link failure has been detected for the identified timing source. No reference assigned
for this timing source or the signal has one of the next failures:
• For line ports: RS1cTIM, STM1cLOS, STM1cLOF, MS1cAIS.
• For tributary ports: E1cLOS or E1cAIS
Or the timing reference has a frequency deviation of more than ±15 ppm related to the internal
clock of the System.
This timing source will not be part of the System timing selection. When another reference is
available the System timing will select that one. When no other timing source is available the
System timing will switch to holdover and the SYNCcBHO will be reported.
Check the signal provided to the timing source has a defect and resolve that cause, or if none
timing source has been assigned to the identified timing source.
7.8.3.3 SYNCcLRR
Loss of re-timing reference, a retimed E1 port has fallen back in its retiming mode.
Page 124
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The output frequency of this E1 port does not have the quality requested. The System connected
to it, using this a timing source must use an other timing reference.
The System timing QL is below the acceptance QL of the retimed E1 port. Check why System
timing QL has decreased.
7.8.4.1 E12cLOS
Transmission via this E1 port in the upstream direction will be lost and AIS is inserted in the
upstream direction.
7.8.4.2 E12cAIS
Signal is present at the E1 port but this signal contains AIS. This is due to a defect at the System
connected to the E1 port.
7.8.4.3 STM1cLOS
Transmission via this line port in the downstream direction is lost. In the downstream direction
AIS is inserted. In the upstream direction (return path) MS RDI is inserted.
7.8.4.4 STM1cLOF
The identified line port has signal present but no correct STM-1 frame is detected.
Transmission via this line port in the downstream direction is lost. In the downstream direction
AIS is inserted. In the upstream direction (return path) MS RDI is inserted.
Check signal provided to this line port. E.g. a STM4 signal might be provided or input might be
overloaded (to much optical power).
Page 125
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
7.8.5.1 RS1cTIM
A trail trace identifier mismatch has been detected on the identified line port.
Transmission via this line port in the downstream direction is lost. In the downstream direction
AIS is inserted. In the upstream direction (return path) MS RDI is inserted
Check the accepted and expected TTI for this port. The System might be connected to the
wrong far end system or port.
7.8.5.2 RS1cSSF
A server signal fail on the RS layer has been detected for the identified line port. The root cause
is a failure in the layer above.
Check the root cause of this RS1cSSF. Might be due to a STM1cLOS, or STM1cLOF.
7.8.5.3 MS1cSSF
A server signal fail on the MS layer has been detected for the identified line port. The root cause
is a failure in the layer above.
Check the root cause of this failure. Might be due to a STM1cLOS, STM1cLOF or RS1cTIM.
7.8.5.4 MS1PcSSF
A server signal fail has been detected on the MS1 protection layer, only applicable when MSP is
provisioned.
Both line ports do have an MS related failure, or a forced switch is in place to a failed line port.
7.8.5.5 MS1cAIS
AIS is detected in the MS signal of the identified line port. The root cause will be a failure in the
far end system.
Transmission is lost in the downstream direction. In the upstream direction MS RDI is inserted.
Page 126
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
7.8.5.6 MS1cRDI
7.8.5.7 MS1cDEG
The number of B2 background block errors detected on the identified line port does exceed the
provisioned degraded threshold (see Section 6.8.5, Degraded Threshold Provisioning and
Handling, on Page 77).
The STM-1 signal received has a degraded quality due to too much attenuation or dispersion.
Check the optical path or the SFP being used at the far end has insufficient power. In some cases
overload of the input signal might lead to an MS degraded signal.
7.8.5.8 AU4cAIS
The root cause is in the layer above or due to a failure in the far end system. Check MS and RS
alarms on the related line port or alarms on the far end system.
7.8.5.9 AU4cLOP
7.8.5.10 VC4cSSF
A server signal fail has been detected on the identified VC4 termination point.
Transmission is lost in the downstream direction and VC4 RDI inserted in the upstream
direction.
The root cause of this alarm is a failure in the layer above. This might be due to a RS, MS or
AU4 failure which sends AIS downstream.
Page 127
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
7.8.5.11 VC4cUNEQ
The received signal label (C2 byte) at the VC4 termination points is zero.
Transmission is lost in the downstream direction, AIS is inserted. In the upstream direction VC4
RDI is inserted.
The far end system connected to might not have a VC4 cross connection towards this system.
7.8.5.12 VC4cPLM
The received signal label (C2 byte) at the VC4 termination differs from the expected value. The
type of traffic in the VC4 does not match.
The VC4 coming from the far end system does not have a label 01 (equipped) or TUG
structured (02) but a different kind of traffic. Check in the details of the related VC4 TTP the
accepted TSL value. The far end system does have wrong type of traffic. The VC4cPLM alarm
is not under control of the monitoring flag.
7.8.5.13 VC4cTIM
A trail trace identifier mismatch has been detected at the identified VC4 termination point. The
accepted (received) trail trace (J1 byte) does not match the expected trail trace and TIM
detection is enabled.
Transmission is lost in the downstream direction, AIS is inserted. In the upstream direction VC4
RDI is inserted.
Check the expected and accepted trail trace. A difference might be due to a wrong cross connect
in the transmission path between the near and far end VC4 TTP. If no match is required TIM
detection can be disabled thus no alarms is raised and no consequent actions are executed.
7.8.5.14 VC4cDEG
The number of background block errors in the received B3 byte do exceed the provisioned
degraded threshold.
7.8.5.15 VC4cLOM
The VC4 received does not contain the TU12 multi frame indicator.
Page 128
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
As no VC4cPLM is raised the traffic type is correct, but the TUG structured VC4 may contain a
TU3 container in stead of only TU12.
7.8.5.16 VC4cRDI
The far end systems has detected a downstream failure at VC4 level. Check alarming at the far
end system.
7.8.5.17 TU12cAIS
The TU12 contains AIS. The TU12cAIS is identified by the TU12 number (klm) at the line port
side.
7.8.5.18 TU12cLOP
No TU12 pointer is detected in the TU12 identified. The TU12cLOP is identified by the TU12
number (klm) at the line port side.
Check far end provisioning, a TUG without TU12 pointer might be used e.g. TU3.
7.8.5.19 VC12cSSF
The VC12 layer is unavailable for traffic due to a failure in layers above (VC4, MS)
Transmission is lost. For a VC12 trail termination point AIS is inserted downstream and VC12
RDI is inserted upstream in case of a bi-directional cross connect.
7.8.5.20 VC12cUNEQ
The received signal label (V5 byte) at the VC12 termination points is zero.
Transmission is lost in the downstream direction. For a VC12 trail termination point AIS is
inserted. In the upstream direction VC12 RDI is inserted. When provisioning cross connects on
Page 129
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
both side of a connection, temporarily a VC12cUNEQ might be raised due to the absence of the
cross connect at the far end.
The far end system connected to might not have a VC12 cross connection towards this system
or any other System in the transmission path.
7.8.5.21 VC12cPLM
The received signal label (V5 byte) at the VC12 termination differs from the expected value.
The type of traffic in the VC12 does not match.
Transmission is lost in the downstream direction. For a VC12 trail termination point AIS is
inserted.
The VC12 coming from the far end system does not have a label 01 (equipped) or asynchronous
(02) but a different kind of traffic. Check in the details of the related VC12 TTP the accepted
TSL value. The far end system does have wrong type of traffic. The VC12cPLM alarm is not
under control of the monitoring flag.
7.8.5.22 VC12cTIM
A trail trace identifier mismatch has been detected at the identified VC12 termination point. The
accepted (received) trail trace (J2 byte) does not match the expected trail trace and TIM
detection is enabled.
Transmission is lost in the downstream direction. For a VC12 trail termination point AIS is
inserted. In the upstream direction VC12 RDI is inserted.
Check the expected and accepted trail trace. A difference might be due to a wrong cross connect
in the transmission path between the near and far end VC12 TTP. If no match is required TIM
detection can be disabled thus no alarms is raised and no consequent actions are executed.
7.8.5.23 VC12cDEG
The number of background block errors in the received TU BIP byte exceeds the provisioned
degraded threshold.
7.8.5.24 VC12cRDI
Page 130
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
The far end systems has detected a downstream failure at VC12 level. Check alarming at the far
end system.
Page 131
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Page 132
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Page 133
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Table 82 shows an example of a synchronization plan for a ring network with four Systems.
Page 134
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Provisioning System 1
• Timing source 1: Assigned to TS1.8, QL provisioned SSU_T, priority 2
• Timing source 2: Assigned to Line port 2, QL:AUTO, priority 3
• Timing source 3: Assigned to Line port 1, QL: AUTO, priority 1
Provisioning System 2
• Timing source 1: Assigned to Line port 2, Q: AUTO, priority 1
• Timing source 2: Assigned to Line port 1, QL: AUTO, priority 2.
Provisioning System 3
• Timing source 1: Assigned to Line port 2, QL: AUTO, priority 1
• Timing source 2: Assigned to Line port 1, QL: AUTO, priority 2.
Provisioning System 4
• Timing source 1: Assigned to Line port 2, QL: AUTO, priority 1
• Timing source 2: Assigned to Line port 1, Q: AUTO, priority 2.
Timing source 3: Assigned to Trib port TS8.2, QL provisioned PRC, priority 1
During normal operation the synchronization is as shown. The PRC clock on timing source 3 on
System4 has got the best quality:
• System4 will select Timing source 3 (PRC is the best quality).
• System3 will select Timing source 1 (LP2) as this one reference has the highest priority.
• System2 will select Timing source 1 (LP2) as this reference has the highest priority.
• System1 will select Timing source 3 (LP1) as this reference has the highest priority.
Page 135
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Network Failure 1
It is interesting to see what happens when a failure occurs. Figure 83 shows a failure on the PRC
clock is present. The Systems will switch over to their next best reference. At first instance
System4 falls back to holdover. Due to this System1 will switch over to Timing source 1, the
SSU_T reference on TS1.8. Next System4 will switch over to Timing source 1. System3 will
retain at Timing source 1 and System2 will retain at Timing source 1.
Page 136
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Network Failure 2
Figure 84 shows a failure has occurred on the incoming side of Line port 2 on System2. In this
case System2 will switch over from Timing source 1 to Timing source 2 (LP1). The other
Systems do not switch over.
Page 137
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Page 138
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Index
A C
activating a database 68 C12cUNEQ alarm 129
adding cross connects 84 changing alarm reported mode or s everity 117
Address Resolution Protocol (ARP) 27 connecting panel 19
alarm contacts 6 connectors 5
alarm descriptions 121 copying an active database 68
alarm history 115 Craft interface 6
Alarm History List window 115 Cross Connect List window 83
Alarm List Overview 119 cross connect routing 22
Alarm Profile List window 116 cross-connect jumpers 20
alarm profiles, severities, reporting, and LEDs current alarms 114
116 Current Alarms List window 106, 114
alarm refresh rate 113 D
alarms 113 Database Listing window 66
Alarms menu 52 default database 65
alarms, resolving 118 Degraded threshold provisioning and handling
ASBR example 34 77
assigning IP addresses for system management Degraded Thresholds Overview window 78
28 deleting a cross connect 84
ASX GUI 50 deleting a database 68
features 48 deleting an MSP pair 92
introduction 7, 48 DHCP state transitions, diagram 44
log file 51 dimensions 13
master index of tasks 55 E
menu structure 51 E1 ports, retiming 103
settings 48 E1 Trib Port Retiming Provisioning window 104
user groups, logins, and rights 49 E1 tributary ports 70
windows and procedures 55 E12cAIS alarm 125
ASX panel E12cLOS alarm 125
connecting 19 editing a cross connect 84
dimensions 13 editing SNCP cross connects 88
installing cross-connect jumpers 20 external MSP switch requerst 94
mounting on rack 18 F
patching and testing 24 functional background, ASX system
powering up 20 ASX system
ASX panel components 4 functional background 25
ASX System Overview window 50 G
AU4cAIS alarm 127 ground stud 6
AU4cLOP alarm 127 H
Autonomous System Border Router (ASBR) 26 Hi There Utility 45
B I
backing up a database 67 IFC replacement 60
bidirectional cross connects 85 IFCcEQF alarm 123
Page 139
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Page 140
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Page 141
© 2008, ADC Telecommunications, Inc.
ADCP-80-578 • Issue 2 • 8/2008
Page 142
© 2008, ADC Telecommunications, Inc.
PHONE:
U.S.A. or CANADA
Sales: 1-800-366-3691
Extension 73000
Technical Assistance: 1-800-366-3891
Connectivity Extension: 73475
Wireless Extension: 73476
EUROPE
Sales Administration: +32-2-712-65 00
Technical Assistance: +32-2-712-65 42
EUROPEAN TOLL FREE NUMBERS
Germany: 0180 2232923
UK: 0800 960236
Spain: 900 983291
France: 0800 914032
Italy: 0800 782374
ASIA/PACIFIC
Sales Administration: +65-6294-9948
Technical Assistance: +65-6393-0739
ELSEWHERE
Sales Administration: +1-952-938-8080
Technical Assistance: +1-952-917-3475
WRITE:
ADC Telecommunications (S’PORE) PTE, LTD;
100 Beach Road, #18-01, Shaw Towers.
Singapore 189702.
[email protected]
[email protected]
[email protected]
[email protected]
13944-O
Contents herein are current as of the date of publication. ADC reserves the right to change the contents
without prior notice. In no event shall ADC be liable for any damages resulting from loss of data,
loss of use, or loss of profits and ADC further disclaims any and all liability for indirect, incidental,
special, consequential or other similar damages. This disclaimer of liability applies to all products,
publications and services during and after the warranty period.