1 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Communications, Inc. Product Overview Course Module 6 Craft NMS Interface Terawave Management System.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

Objectives Overview Define an operating system
WSUS Presented by: Nada Abdullah Ahmed.
Module 1: Installing Windows XP Professional
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
Chapter 8 Operating Systems and Utility Programs.
Chapter One The Essence of UNIX.
Lesson 15 – INSTALL AND SET UP NETWARE 5.1. Understanding NetWare 5.1 Preparing for installation Installing NetWare 5.1 Configuring NetWare 5.1 client.
1 Web Server Administration Chapter 3 Installing the Server.
Optinuity Confidential. All rights reserved. C2O Configuration Requirements.
Lesson 5-Accessing Networks. Overview Introduction to Windows XP Professional. Introduction to Novell Client. Introduction to Red Hat Linux workstation.
Introduction to Web Interface Technology (CSE2030)
Lesson 4-Installing Network Operating Systems. Overview Installing and configuring Novell NetWare 6.0. Installing and configuring Windows 2000 Server.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Maintaining and Updating Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Use of Thin Clients in an Industrial Environment Foxboro Southeast User’s Group Birmingham, Al February 10-11, 2009 Walter Conner Senior Plant Engineer.
Operating Systems.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Installing software on personal computer
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
Chapter 8 Operating Systems and Utility Programs By: James Granahan.
Tripwire Enterprise Server – Getting Started Doreen Meyer and Vincent Fox UC Davis, Information and Education Technology June 6, 2006.
Remote Monitoring and Desktop Management Week-7. SNMP designed for management of a limited range of devices and a limited range of functions Monitoring.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW Understand the difference between service.
16.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 16: Examining Software Update.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Ch 11 Managing System Reliability and Availability 1.
© 2003, Cisco Systems, Inc. All rights reserved. CSIDS 4.0—11-1 Chapter 11 Enterprise IDS Management.
© 2003, Cisco Systems, Inc. All rights reserved. CSIDS 4.0—16-1 Chapter 16 Enterprise Intrusion Detection System Monitoring and Reporting.
Chapter 8 Operating Systems and Utility Programs
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Introduction to HP LoadRunner Getting Familiar with LoadRunner >>>>>>>>>>>>>>>>>>>>>>
Computing Fundamentals Module A Unit 2: Using Windows Vista LessonTopic 8Looking at Operating Systems 9Looking at the Windows Desktop 10Starting Application.
Chapter 7: Using Windows Servers to Share Information.
Chapter 8 Operating Systems and Utility Programs Serena Oldhouser.
Introduction to Windows XP Professional Chapter 2 powered by dj.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Explain the purpose of an operating system
Module 7: Fundamentals of Administering Windows Server 2008.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
PackLet A web-based text messaging application using AX.25 packet radio technology.
EMerge Browser Managed Security Platform Module 3: Startup eMerge Certification Course  Physical connection  TCP/IP Characteristics of PC  Initial connection.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Computer Emergency Notification System (CENS)
Module 1: Installing Microsoft Windows XP Professional.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Integra32 System - Training Course
System Manager February 11, What is System Manager System Manager unites Inter-Tel’s diverse product line into a family of products that can be.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
TERAWAVE CONFIDENTIAL – DO NOT COPY 1 Module 3 Terawave Communications, Inc. Product Overview Course Module 3 Training Network Overview Test Equipment.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
2: Operating Systems Networking for Home & Small Business.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
ITMT 1371 – Window 7 Configuration 1 ITMT Windows 7 Configuration Chapter 8 – Managing and Monitoring Windows 7 Performance.
Maintaining and Updating Windows Server 2008 Lesson 8.
9 Copyright © 2004, Oracle. All rights reserved. Getting Started with Oracle Migration Workbench.
DIT314 ~ Client Operating System & Administration
Chapter 8 Operating Systems and Utility Programs.
An Introduction to Computer Networking
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

1 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Communications, Inc. Product Overview Course Module 6 Craft NMS Interface Terawave Management System (TMS) NMS Interface

2 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Objectives Upon completion of this module you will:  Know the two NMS interfaces supported  Be familiar with the purpose, functions and capabilities of the Craft interface  Be familiar with the purpose, functions and capabilities of the Terawave Management System(TMS) interface  Be familiar with the capabilities to interface to other management systems

3 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Contents The Craft Interface - 4  Installation - 6  Security - 9  Browsing - 13  Alarm Management - 15 The Terawave Management System(TMS) - 18  Report generation - 38  External interfaces - 40  Command levels - 42  Network Auto-Discovery - 44  Software upgrades - 46  Alarm management - 49  Database management - 54  Database matching - 56  NE communication - 58  Connection provisioning - 60  Tests & diagnostics - 62

4 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY The Craft Interface

5 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Craft Interface Purpose To allow Craftspersons access to individual Network Elements of the PON network for the purpose of:  Network Element initialization  Network Element hardware provisioning  Diagnostics  Performance monitoring  Setting Threshold Crossing Alert levels

6 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Installation

7 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY The Craft Interface Hardware/Software Requirements The Craft interface requires no special software. The actual interface code is part of the OLT and ONT Embedded code Hardware  Any laptop or desktop computer  Ethernet connection  128M RAM minimum Software  Windows 95, 98, 2000 or NT  Apple OS 9 or later  Internet Explorer 5.5 or later  Netscape Navigator 4.7

8 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY The Craft Interface Physical Connectivity Options Direct connection DCN connection RR DCN Network

9 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Security

10 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY The Craft Interface Security – Access Levels Access capabilities based on  ID  Password  Level (Type of function) Multiple levels of access  Public – Used by management workstations to access certain MIBs for management purposes  Viewer can: Only view information  Tester can: Perform all physical layer tests All tasks that can be performed by the Viewer privileges

11 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY The Craft Interface Security – Access Levels Multiple levels of access (Cont’d)  Operator can: Provision or de-provision cards Configure ports Monitor statistics and alarms Change Operator’s and Viewer’s password All tasks that can be performed by the Tester and Viewer privileges  Administrator can: Create, modify or delete other user accounts for the NE Zip an NE (wipe out an NE database) Upgrade System software Backup/restore configuration databases Perform login override (in case another user is already logged in to Craft) All tasks that can be performed by the Operator, Tester and Viewer privileges

12 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY The Craft Interface Security – Session Timeouts Configurable on an ONT-by-ONT basis Accessed from the ONT or OLT Craft interface Settable from 30 to 3600 seconds (half minute to 1 hour)  Default is 1200 seconds (20 minutes)

13 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Browsing

14 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY The Craft Interface Browsing Browsing is the ability to logically access multiple NEs after physically logging in to one NE From an NE, you can Browse to:  An ONT On the same PON On a different PON  An OLT Browsing is unique to the Craft interface

15 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Alarm Management

16 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY The Craft Interface Alarm Management The Craft interface provides access to local alarm management functions  Alarm Reporting  Alarm Filtering  Alarm Logs

17 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY The Craft Interface Login Screen

18 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System (TMS)

19 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System (TMS) Overview of TMS Standards it uses Connectivity Options Installation Requirements TMS Installation

20 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY TMS Definitions Card  A card is defined as an individual module that can be inserted into an OLT or ONT Network Element  A Network Element is defined as a complete OLT or ONT. A Network Element includes all the cards provisioned in the OLT or ONT PON  A PON is defined as the fiber that connects to a PCU in an OLT. A PON also includes all the ONTs connected to that fiber System  A System is defined as an OLT, all the cards in the OLT, all the PONs connected to the OLT and all the ONTs connected to those PONs

21 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System(TMS) Purpose TMS functionality includes:  Provisioning Network Elements in the TMS database  Provisioning hardware modules in the Network Elements  Provisioning services  Aggregating & displaying Alarms from Network Elements  Resource aggregation – Enables viewing multiple NEs as a single unit based upon a given set of requirements  Alarm aggregation & viewing– Viewing alarms on all NEs from a centralized platform  Performance of diagnostics  Setting Threshold Crossing Alert levels TMS relies on the NE (INT, ONT or OLT) database as the database of record

22 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System(TMS) Overview TMS Options  TMS Server – GUI interface, SNMP based, Provider management platform  TMS Client – GUI interface, SNMP based, Provider management or Customer monitoring/management platform Supports up to 50 fully loaded OLTs (6,450 NEs) Simultaneous connectivity path to OSs/NMSs and NEs over a DCN Maximum of 16 simultaneous OS/NMS connections Support existing DCN (X.25 and TCP/IP) infrastructures

23 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System(TMS) Standards SNMP based management for communication with Terawave equipment  IETF Standards MIB II: RFC 1213 Medium Attachment Units MIB: RFC2668 Bridge MIB: RFC q Bridge Table MIB based on IETF Draft draft-ietf-bridge-bridgemib- 06 DS1 MIB: RFC2495 DS3 MIB: RFC2496 AToM MIB: RFC2514, RFC 2515 RMON MIB: RFC1757 SONET/SDH MIB: RFC2558 RS232 communication MIB: RFC1659  ATM forum based standards CES MIB based on af-vtoa ILMI MIB based on af-ilmi

24 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System(TMS) Standards HTTP based management for communication with Terawave equipment  We use IETF standard described in RFC 2616 OMG CORBA standard  We use OMG CORBA specification 2.2 JAVA 2 is used in TMS development for multi-platform support XML specification 1.0 Servlet specification 2.2

25 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System(TMS) Implementation Architecture OSS ******** SQL or Object Oriented Database TMS Server TMS GUI Client OSS LAN Hub Local TW-600 Craft Interface MultipleIP Sessions Local TW-300 Craft Interface SNMP

26 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System (TMS) Installation Requirements TMS has hardware and software “recommendations” TMS can operate on platforms less than the minimum recommendations, but performance and response will be less than acceptable for a standard working environment TMS is NOT supported on the Linux OS at this time  The underlying TMS code is the same as Unix, but the scripting for installation, startup and shutdown must be written for the Linux OS

27 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System (TMS) Installation Requirements, Hardware, Windows Server Workstation  Pentium 800MHz or better  256M RAM (w/o Oracle)  512M RAM (w/Oracle)  512M RAM (If Server and Client run on same computer)  2GB Hard Drive (5 TeraPON Systems)  CD-ROM  Ethernet NIC card Client Workstation  Pentium 500MHz or better  128M RAM  CD-ROM  Ethernet NIC card

28 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System(TMS) Installation Requirements, Hardware, UNIX Server Workstation  Sun Sparc Ultra 60 or higher  256M memory (RAM)  2GB Hard Drive (5 TeraPON Systems)  CD-ROM  Ethernet NIC card Client Workstation/UNIX  Sun Sparc Ultra 10 or better  128M Memory (RAM)  100MB hard disk space  CD-ROM  Ethernet NIC

29 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System(TMS) Installation Requirements, Software, Windows Server TMS application Java runtime Environment (JRE) Windows NT 4.0 (Service Pack 5) or Windows 2000 TCP/IP UNIX - Sun OS 5.8 (Solaris 2.8 or Solaris 8) Web Browser  Windows - Internet Explorer 5.5 or higher  UNIX - Netscape Communicator 4.7 or higher

30 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System(TMS) Installation Requirements, Software, Windows Client Windows NT 4.0 or greater OR Windows 95, 98, ME, 2000 or XP TCP/IP Java Runtime Environment (JRE) Web Browser – Internet Explorer 5.5 or higher

31 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System(TMS) Installation Requirements, Software, UNIX Java Runtime Environment (JRE) Server Workstation – UNIX  Sun OS 5.8 (Solaris 2.8 or Solaris 8) Client Workstation/UNIX  Sun OS 5.8 (Solaris 2.8 or Solaris 8) Web Browser – Netscape Communicator 4.7 or higher

32 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System(TMS) Connectivity Options – Direct Connect, Single PCU Direct 10bT LAN connection  TMS Server can only be connected to a PCU module Craft/NMS port  TMS Server communicates with ONTs through a dedicated Embedded Operations Channel (EOC) PVC within the PON  EOC can be 128Kbps-1.536Mbps TW-600 PCU PON TMS™

33 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System(TMS) Connectivity Options – Direct Connect, Multiple PCUs 10bT LAN connection thru Hub  TMS can always communicate with the network no matter which PCU is Master TW-600 PCU TeraPON TM TMS Hub

34 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System(TMS) Connectivity Options – Indirect Connection IP connection through router network  Separate management DCN Local TW-300 Craft Interface LAN Hub Local TW-600 Craft Interface Management DCN C.O. TMS Server TMS GUI

35 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System(TMS) Connectivity Options – In-Band Management A dedicated PVC transported within the NIM card Uplink OC-3c or OC-12c.

36 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System(TMS) Connectivity Options – ONT Craft Port If direct connectivity to the OLT TMS/Craft port is not possible and an In-Band Management PVC is not an option, the OLT can be managed by the TMS Server connecting to the Craft port of an ONT connected to the OLT

37 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Management System(TMS) Database Management TMS uses an ObjectStore database from Excelon Information stored includes:  Inventory (OLTs, ONTs, Slots, Cards, Ports)  Connections/services  EPS configuration  PVCs  BW groups

38 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Report Generation

39 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Report Generation WITHOUT optional Oracle database connection:  Inventory lists  Bandwidth Usage ONT PON Uplink  Service connection records  Customer Name & Circuit ID WITH optional Oracle database connection:  Audit logs  Performance Data storage

40 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY External Interfaces

41 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Interface to OSSs CORBA  A native CORBA interface for exporting information to a higher level management platform is under study TL1  Not supported at this time on the Terawave product line  A requirement for a TL1 interface is under study SNMP  Terawave equipment incorporates standard v1 SNMP MIBS for Traps  Terawave equipment incorporates standard v2 SNMP MIBS for general use  Terawave equipment can use SNMP to report Alarms and Threshold Crossing alerts (TCAs) to a centralized SNMP based Network Management System  Full SNMP support for configuration and/or connection management from a centralized SNMP based Network Management System is under study

42 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Command Levels

43 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Command Levels Port – Affects only a single port Card – Affects only a single card Network Element - Affects all elements of the same type within the Network Element PON - Affects all elements of the same type within the entire PON System – Affects all elements of the same type within the entire system

44 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Network Auto-Discovery

45 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY TMS Network Auto-Discovery Auto-Discovery takes place soon as you Register an OLT TMS will Auto-Discover any Terawave network equipment already installed  TMS must be able to communicate with the OLT  Auto-Discovery includes OLT Configuration PONs ONT Configuration All service connections that have already been provisioned

46 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY TMS Software Upgrade Options

47 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Software Upgrades Levels Of Upgrade Card  Allows software download only for a specific card on a specific Network Element Network Element  Allows the option to download new software to the same type of card on a specific Network Element. Multiple cards of the same type on a Network Element will be downloaded to at the same time PON  Allows the option to download new software to the same type of card in EVERY Network Element in the APON System  Allows the option to download new software to the same type of card in EVERY Network Element in the System

48 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Software Upgrades Sources Of Upgrade Local  Local is defined as the CD Drive or Hard Drive of the TMS Server workstation Intranet  Intranet is defined as a server located somewhere within the corporate Intranet Terawave FTP Site  New versions of software are available from the Terawave FTP site

49 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY TMS Alarm Management

50 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY TMS Alarm Management Alarms can be viewed on multiple levels  ONT  OLT  System Includes OLT & ONT alarms Local Active History All Local Active Events TCA Events RMON Events  Network Includes all Systems

51 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY TMS Alarm Management Alarm management is performed on a System basis, administered by the OLT Alarm management consists of two functions  Alarm Reporting – What NMS workstations do you want information reported to. IP address dependent Will report Alarms to 3 workstations TMS automatically uses one IP address  Alarm Filtering – Severity of Alarms and what you want to do with the Alarms Severity – Critical, Major, Minor, Informational Filter –Ignore them –Keep them local –Report them to NMS workstations

52 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY TMS Alarm Management – Alarm Logs Alarm Logs  ONT All Local Active - Log Local Active - Report Local History Events TCA Events – Non-Ethernet events RMON Events – Ethernet events  OLT All Local Active - Log Local Active - Report System Active – Active alarms from OLT and all ONTs on all PONs Local History Events TCA Events RMON Events

53 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY TMS Alarm Management – Alarm Logs Alarm Logs  TMS Network - Includes alarms/events from all Systems –Active –History –Events –TCA events Alarms/Events are stored in the TMS computer RAM. A computer restart or power failure will wipe out all Alarms and Events from TMS After a TMS restart, Active Alarms will be retrieved through the Synchronization process Short term Alarms/Events are stored in tomcat/webapps/EyeWave/db

54 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Database Management

55 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY TMS Database Management Configuration Database Backup  Can be done on multiple levels System Network Element Configuration Database Restore  Can be done on multiple levels System Network Element  Must restart each Network Element that has had the database restored

56 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Database Matching

57 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY TMS Database Matching TMS to Network Elements Network Element database always assumed to be most correct Ability exists to “synchronize” the TMS configuration databases with the NE databases “Synchronize” can be performed on multiple levels  Network Element  System An Auto-Synchronize is performed by TMS with each NE once a day (around midnight)

58 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Network Element Communication

59 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY TMS “Keep-Alive” Signals Periodic Keep-Alive  Every two minutes a keep alive SNMP request message is sent from the TMS to a NE that is provisioned in TMS  The NE is expected to respond to the message. If no response is received, 3 retries are done over a 7 second period. If all requests fail, then the lightning bolt is displayed Normal Operation  During normal user operation, if any SNMP request fails, 3 retries are done over a 7 second period. If all requests fail, then the dagger would go through the NE

60 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Connection Provisioning

61 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY TMS Connection Provisioning Connection provisioning can be done from Craft or TMS interface Point-and-click, pull-down menus Keyboard action kept to a minimum

62 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Tests & Diagnostics

63 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY TMS Tests & Diagnostics Most testing and loopbacks can be done from TMS Local NE tests and diagnostics that require the NE to be isolated from the PON can only be done from Craft

64 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Objectives Revisited Know the two NMS interfaces supported Be familiar with the purpose, functions and capabilities of the Craft interface Be familiar with the purpose, functions and capabilities of the Terawave Management System(TMS) interface Be familiar with the capabilities to interface to other management systems

65 Module 6 TERAWAVE CONFIDENTIAL – DO NOT COPY Terawave Communications, Inc. Lighting The First Mile™