The terminologies are defined below.
Terminology |
Meaning |
|---|---|
Data interface service |
The data interface service works in point-to-point mode. Currently the TDA board can provide 4 RS-232C asynchronous interfaces and 4 RS-422 asynchronous interfaces. The support rate is from 75kbit/s to 19. 2kbit/s. The data interface payload is used to transmit such information as call charge, NMS and power supply monitoring. |
Data on NE |
It is the NE configuration data saved on the SCC board of the OptiX equipment, which can be uploaded on the U2000 Web LCT and then saved in the NMS. |
DCC |
Within an STM-N signal there are two DCC channels, one is the 192 kbit/s DCC-R channel composed of bytes D1-D3, and the other is the 576 kbit/s DCC-M channel composed of bytes D4-D12. All NEs can communicate one another through the DCC-R. The DCC-M is not the regenerator section overhead and does not support communications among regenerators, and it is used to support communication channels of more universal purpose. For example, it supports TMN as a physical channel of ECC. |
Delete protection sub-network at network layer |
Delete the association between the logical systems of the protection sub-network and the NE . After deletion, such functions as deleting optical fiber and re-uploading NE data are available. The command is not sent to NE and has no effect on the service. After configuring, search the protection sub-network again, and then search the trail in the trail view to create the original service. |
Delete protection sub-network on NE side |
Delete the logical systems of the protection sub-network and the NE and delete all the related services. A deleted protection sub-network cannot be restored but can be reestablished. |
Delete SDH NNI at network layer |
After successfully deleting it, the SDH NNI becomes an isolated node and has no effect on service. After creating the isolated node as SDH NNI again, the SDH NNI can be found again in the trail view. |
Delete SDH NNI on NE side |
Delete the SDH NNI and all its service directly, and can not resume them later. |
Device set |
It is an aggregate of multiple managed equipment. Device set facilitates the authority management on devices in the management domain of the U2000 Web LCT. If some operation authorities over one device set are assigned to a user (user group), these operation authorities over all devices of the device set are assigned to the user (user group), thus eliminating the need to set the operation authorities over these devices respectively. It is suggested to design device set according to such criteria as geographical region, network level, device type, etc. |
Dispersed routing Ethernet trail |
It means that several SDH end-to-end trails (such as VC12, VC3, VC4, cascade service, etc) transporting the Ethernet service have different server trails. |
Division as per VC4 |
Division as per VC4 means that different timeslots in a fiber belong to different protection sub-networks. Assign timeslots, as per VC4, into different protection sub-networks. It functions to implement virtual optical path protection. It means that some of the VC4s over the fiber can be put into one protection sub-network. For example, in an STM-16 fiber, the 1st to 4th VC4s belong to an STM-4 unprotected ring, while the 5th to 8th VC4s belong to another unprotected link. |
Dual node interconnection (DNI) |
The service between ring networks can be classified into the Single Node Interconnection (SNI) mode and the dual node interconnection (DNI) mode. The former can be protected in line protection mode. However, in this mode, protection is only valid for fiber and optical transmitting/receiving ports, and protection fails in the case of interconnection node failure. In the latter mode, specific regulations on the protection mode for the inter-ring service are made in G. 842 Recommendation. It regulates the protection modes of the two interconnection nodes both on a MSP ring or a PP ring, therefore, by adopting the recommended protection modes, the protection of the interconnecting service between two ring networks composed of the devices of different manufacturers and in different protection modes can be realized. Moreover, in case of fiber failure or node failure, services can also be protected |