+ All Categories
Home > Documents > Final Report for Industrial Training

Final Report for Industrial Training

Date post: 14-Apr-2018
Category:
Upload: nadiatul-shima
View: 227 times
Download: 0 times
Share this document with a friend
70
 1 CHAPTER 1 OVERVIEW OF INDUSTRIAL TRAINING 1.0 INTRODUCTION Industrial Training program provides pre-professional work experience with specific assignments and responsibilities. An Industrial Training should be relevant to a students  personal career interests and academic courses of study, serving as a bridge between university and the world of work. Productive Industrial Trainings help students make informed decisions and improve their marketability after graduation. 1.1 THE OBJECTIVES OF INDUSTRIAL TRAINING 1. To experience and understand real life situations in industrial organizations and their related environments. 2. To accelerate the learning process of how students knowledge could be used in a realistic way. 3. To understand the formal and informal relationships in an industrial organization so as to  promote favorable human relations and teamwork.  4. To implement what they have learned and learn more throughout this training.  5. To learn the accepted safety practices in the industry.  6. To provide pre-professional work experience with specific assignments and responsibilities 
Transcript
Page 1: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 1/70

 

1

CHAPTER 1

OVERVIEW OF INDUSTRIAL TRAINING

1.0 INTRODUCTION

Industrial Training program provides pre-professional work experience with specific

assignments and responsibilities. An Industrial Training should be relevant to a student‟s

 personal career interests and academic courses of study, serving as a bridge between university

and the world of work. Productive Industrial Trainings help students make informed decisions

and improve their marketability after graduation.

1.1 THE OBJECTIVES OF INDUSTRIAL TRAINING

1.  To experience and understand real life situations in industrial organizations and their 

related environments. 

2.  To accelerate the learning process of how student‟s knowledge could be used in a realistic

way. 

3.  To understand the formal and informal relationships in an industrial organization so as to

 promote favorable human relations and teamwork. 

4.  To implement what they have learned and learn more throughout this training. 

5.  To learn the accepted safety practices in the industry. 

6.  To provide pre-professional work experience with specific assignments and

responsibilities 

Page 2: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 2/70

 

2

1.2 THE IMPORTANCES OF INDUSTRIAL TRAINING

Industrial Training has a lot of importance to students. In addition the limited period set by

the UTeM provides advantages to students relative to the other studies that only provide a very

 brief period.

Moreover, this Industry Training allows students to link theories to practical and

otherwise. As a student at UTeM, theory and practice are two things that are equally

important. Therefore, as a student is very important for those who practice what they have

learned to not feel awkward when the work later.

Industry Training is very important to students because:

1.  To develop an appreciation of the structure and operation of industrial organizations.

2.  To appreciate the importance of good communication and interpersonal skills, and to

develop these skills

3.  To appreciate the ethical basis of engineering practice in industry.

4.  To improve the life and thoughts of students in the face training throughout the industry.

5.  To form a personality and skills of the students towards a more

 positive for them more confident when working soon.

6.  To learn more in-depth knowledge of how things work 

was carried out systematically and how to solve problems

1.3 SCOPE OF INDUSTRIAL TRAINING

Learning process about DSLAM, MSAN, how to check problems of the equipments

 based on alarms appeared by using telnet. Besides that, learning how to check batteries at the

equipment at TM‟s cabinet. Learn more about the configuration of GPON (Gigabit Passive

Optical Network).

Page 3: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 3/70

 

3

CHAPTER 2

2.0 HISTORY OF TELECOMMUNICATION IN MALAYSIA

The first telephone line used in the Philippines was in 1874 by the British Resident in

Taiping, Perak. While the first telegraph line installed in Pakistan in 1876 that the British Office

of Kuala Lumpur with the Office of the Assistant Resident in Taiping, Perak.

The first exchanges are built in Malaysia, in 1894, located in Kuala Lumpur. In 1926, the

first wireless station was established, namely in Penang. By the year 1895, there were 21 phones

in Kuala Lumpur which is supported by telephone and telegraph lines along the 400 miles. At

first use of the phone is not so widespread because of high capital. But gradually it has grown

since its use is very important.

Telephone network extends all over the place and it is starting to urban areas. More online

content and then apply the new Exchange, the exchanges have been launched. In 1962, our 

country has been receiving facilities continue to dial the remote system (STD). In Malaysia, this

system was established in 1963.

In the next year was a variety of important advances have been implemented in the field of 

Telecommunication, Television and Radio Service has developed throughout peninsular 

Malaysia. Although the overall responsibility of Television and Radio broadcast a program on

TM but remains responsible for ensuring that these facilities can be felt by everyone.

Rapid advances in telecommunication technology have led many more sophisticated

Exchange introduced. History of exchange started from exchange installation type 'Stronger' to

cross Exchange (Digital Cross Connect) and then semi electronic system.

Page 4: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 4/70

Page 5: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 5/70

 

5

Establishment of Telekom Malaysia Berhad also provides job opportunities for 

Malaysians. With this, the local population to meet the employment opportunities available and

the unemployment rate that exists can be reduced.

2.1.1 HISTORY OF TELEKOM MALAYSIA BERHAD

TM is the largest telecommunications service provider in Malaysia. TM was announced as

a corporate body on 1 January 1987 to take over the Malaysian communications services. It was

originally a government body known as the Jabatan Telekom Malaysia. TM is known as a

company that provides connectivity to the rest of the country, including major urban areas to

rural areas. In this era, TM faces competition from several other communications companies such

as DIGI, MAXIS, CELCOM and others. Even though so, he still manages to maintain its

 performance and plays an important role in the KLSE market capital exceeding U.S. $ 16 billion. 

In 1987, Jabatan Telekom Malaysia was privatized, known as Telekom Malaysia that is

already regulated by the Ministry of Energy, Communications and Multimedia. In line with the

growth of communications, Telecom continued to grow ahead with the establishment of a

continuing result of the increase contributed by the high profits. Telekom Malaysia also

contributed in the development of telecommunication market in Pakistan is progressive.

Jabatan Telekom Malaysia Berhad exists in 1946 after a period of Japanese rule. In the

1956 Federal Plan goals, they aim to provide modern telephone service. In the era of the 60s, the

 phone network has been enhanced by the Telecommunications Department. In 1963, the first

microwave system was installed between Kuala Lumpur and Singapore. It extends to Ipoh and

Penang in the West Coast and East Coast including Kuantan and Kota Bharu. Radio Telephone

Systems International of Malaya and Singapore to Kuching was introduced in 1960. In April

1970, the International Earth Satellite station first established to provide international telephoneservices. Telex service manually replaced with an automated system in 1975. Meanwhile,

Telecom has also introduced the International Direct Dial (International Direct Dialing /

IDD). Through this service, calls can be made directly to foreign countries like United Kingdom,

Australia, Japan and Hong Kong also increased to over 70 destinations abroad.

Page 6: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 6/70

 

6

In 1980, the first electronic exchange (SPC) has been launched in Johor. At the same time

the submarine cable project (Submarine Cable) connecting Kuantan and Kuching have been

successfully implemented. In 1981, 'Standard Satellite' is the second in Lendu, Malacca linking

the Indian Ocean satellite, was launched. Whereas in 1982, Telefax been introduced with the aim

of facilitating transmission line printing, images, and graphics. To improve the quality of services

 provided by Jabatan Telekom Malaysia (JTM), the government has taken prudent steps to private

it on October 12, 1984. With this, JTM was renamed the company Telekom Malaysia Berhad and

he is able to compete with existing telecommunications companies in Malaysia. Privatization

goals of the organization are to improve national productivity and balancing to industrial

countries. In addition, Telekom Malaysia Berhad (TMB) was privatized to challenge the

government in bringing a premier organization in the country.

In 1990, Telekom has managed to increase its efficiency when the number of lines

increased to 1:58 million budget line by line ratios of 8 to 100 people. Telekom has also been

listed on the Kuala Lumpur Stock Exchange (KLSE) for the year. The telecommunications

industry in Malaysia towards the goal of pushing changes to promote healthy competition with

many other networks in the telecommunications market through the implementation of Equal

Access (Equal Access) from 1 January 1999.

Starting July 1, 1995, Telekom implemented organizational restructuring in preparation for 

the change in market conditions, especially due to the increasing number of competitors in this

industry. It provides full control and responsibility of the Local Telecommunications Office

Manager segments respectively. Through this new structure, Telekom to meet the needs and

requirements of each market segment more effectively. To face the globalization era, once again

in January 2001 TMB restructured. In a new appreciation of TMB has more competitiveness to

face the globalization era.

In addition, the development of improved technology era, many new services have been

 provided. Among these are Hotline COINS, TOLLFREE,

VPN, KADFON, MALAYSIA DIRECT, VSAT, WILL, TELESSTOCK, ISDN,

TMNET, video conferencing and soon have been introduced. Improved of performance and

sustained by Telekom Malaysia Berhad, is possible if it becomes a leading telecommunications

company and a leading and internationally competitive

Page 7: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 7/70

 

7

2.1.2 PRIVATE TELEKOM MALAYSIA

Based on demand and encourage the development of the telecommunications, Syarikat

Telekom Malaysia Berhad (pledged) was incorporated on October 12, 1984 to take over the

department consistent with Telekom Malaysia's privatization policy. Operations are controlled by

a license issued by Ministry of Energy, Telecommunications and Posts to trial 20 years beginning

in January 1987. License issued by the Ministry of Energy, Telecommunications and Postal

Company has rights to Telekom Malaysia Berhad (pledged) to the establishment, maintenance

and control of all telecommunications systems owned by licensees who are operating or 

scheduled to operate while it seeks to provide all forms of telecommunications, television and

radio in country and around the world.

Features Jabatan Telekom Malaysia was officially taken over by Syarikat Telekom

Malaysia Berhad on 1 January 1987. Jabatan Telekom Malaysia was the first public sector 

organization commercialized by privatization. On January 6, 1987 at 10 am at the company

headquarters of Telekom Malaysia Berhad, Jalan Raja Chulan, Kuala Lumpur was held Syarikat

Telekom Malaysia ceremony officiated by the Minister of Energy, Telecommunications and

Posts of the Honorable Dato 'Leo Moggie. 

Page 8: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 8/70

 

8

2.1.3 TELEKOM MALAYSIA HISTORY OF NETWORK SYSTEM

1874 - The first line connecting the Resident Office in Kuala Lumpur and

Office of the Assistant Resident in Taiping.

1882 - The line that connects through the bottom of the sea and Seberang Prai Penang was

established.

1891 - Exchange was first built in Kuala Lumpur.

1900 - Magneto's first mobile phone service launched in the State.

1962 - Connect Direct Dial facility (STD) between Kuala Lumpur and

Singapore established.

1964 - Marketing SEACOM submarine cable between Singapore and Kota Kinabalu.

1970 - Satellite Earth Station was built in Kuantan.

1975 - Installation of automatic telex exchanges.

1979 - Facilities International Direct Dial (IDD) is introduced.

1980 - Electronic Exchange launched.

1981 - The station launched the second satellite in the Lendu.

1983 - Datel and telefax services are introduced.

1987 - Cass (Automated Customer Service System) is implemented. 

2.1.4 LOGOS AND SYMBOLS OF TM BERHAD

First Logo of Jabatan Telekom Malaysia

Page 9: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 9/70

 

9

Second Logo Sistem Telekom Berhad (STMB)

Third Logo Telekom Malaysia Berhad

STM logo was launched by Deputy Prime Minister En. Ghafar Baba on 8/17/1990. The

objective of this logo was introduced aimed at creating a progressive organization. It is part of the

company's efforts towards building a dynamic organization that caters to the needs of 

telecommunications services both nationally and internationally.

Latest Logo Telekom Malaysia Berhad

Page 10: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 10/70

 

10

i.  Letters 'TM' symbolizes the identity of the group consists of three vibrant colors and clear 

the orange, blue, and red.

ii.  Orange symbolizes the vibrancy of TMNet multimedia subsidiary.

iii.  Red also symbolizes freedom identity of Celcom, TM's mobile arm.

iv.  Letters 'TM' and the new colors reflect the new image of the 'CE' as an organization is a

tough, courageous, passionate and energetic.

v.  There is also a tagline new "Orienteering Chance", (Open up possibilities Ready) to help

customers discover and pave all the possibilities and opportunities for communication

TM (Telekom Malaysia) Bhd

Type Public

Established Incorporated October 12, 1984

Headquarters Headquarters in Kuala Lumpur, Malaysia

Main Person Dato' Zamzamzairani Mohd Isa, CEO Group

Industry Telecommunication

Product Telecommunication Services

Results ▲ RM17.84 bilion (USD5.46 bilion) (2007) 

Workers 30,000 Groupwide

Website www.tm.com.my

Page 11: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 11/70

 

11

2.1.5 COMPANY LOGO

 New brand logos reflect the true nature of TM. Italics are used has been specially

designed to reflect the characteristics of progressive and proactive company. Three corporate

colors in the logo represents the integration of the colors blue, a color that reflects the continuity

of the corporate home in the States, an orange red TM Net and Celcom. Its shown a combination

of orange as a symbol of TM Net boomerang cheerful and bold red wing Celcom forms known as

'WINGZ'. Form of orange and red wings on the letter M represents the position of pioneering a

new brand as well as possible opportunities. These colors also reflect the personality of the brand

new, more cheerful, brave and spirited.

Page 12: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 12/70

 

12

2.1.6 VISIONS AND MISSIONS

Telekom Malaysia Berhad is Malaysia's number one in the organizing of communication

technology. As the leading integrated Telecommunications Company in Malaysia, Telekom

Malaysia aim to deliver cutting-edge communications, information and entertainment services.

Explore our profile to find out more about who we are and what we stand for.

We believe connections make everything possible. Therefore, as Malaysia‟s leading

 provider in information communications technologies, we strive to provide the right connections

to help you bring your close ones closer. From the way we operate to what we intend to

accomplish both on the local and international front, we apply and hold close a vision of 

excellence created towards making your life better.

Vision.

"To be Malaysia‟s leading new generation communications provider, embracing customer needs

through innovation and execution excellence".

Mission 

 Strive towards customer service excellence and operational efficiency.

 Enrich consumer lifestyle and experience by providing innovative new generation services.

  Improve the performance of our business customers by providing high value information and

communications solutions.

 Deliver value for stakeholders by generating shareholder value and supporting Ma laysia‟s

growth and development.

Page 13: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 13/70

 

13

2.2 Background of Network Operation

TM has and continues to change how people communicate and live with a wide range of 

fixed line, mobile and international network services. And as the heart of the services, Network 

Operation TM Wholesale has played major roles behind every success and achievements of TM

so far. With a vision to be a model of operational efficiency in Asia Pacific regions, Network 

Operation is driven to deliver the best quality of products and services. Network Operations

consists of 9 main divisions namely:

  Service Assurance Center (SAC)

 Service Fulfillment Center (SFC)

  Transmission Network Operation Center (TNOC)

  Switching Network Operation Center (SNOC)

  Access Network Operation Center (ANOC)

  IP Network Operation Center (IP NOC)

  International Network Operation (INO)

2.2.0 Vision

The vision of Network Operation is to be model of operational efficiency in Asia Pacific region

 by 2010

2.2.1 Mission

The mission of Network Operation will be achieved through:

  Providing quality customer services through timely service fulfillment and effective

service assurance.

  Achieve customer satisfaction through best practices and standards of operation.

  Realizing cost effectiveness through automation and innovation.

Page 14: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 14/70

 

14

2.1.2 Strategic Objectives

In order to support the mission, there are two major strategic objectives that we must concentrate

to run the operation toward the vision.

  First, striving for higher Quality of Service through state-of-the-art technology and

network, good engineering practices, effective maintenance program and with competent,

 proactive and responsive staff in realizing customer satisfaction and loyalty.

  Second, striving for Cost Effectiveness through operational efficiency and staff 

 productivity with emphasis on innovation, teamwork and continuous organization

learning in contributing towar d TM‟s profitability.

 Network Operation Center‟s are responsible for monitoring the networks for alarms or certain

that may require special attention to avoid impact on the network‟s performance. For example, in

a telecommunications environment, NOC‟s are responsible for monitoring for power failures,

communication line alarm (such as bit errors, framing errors, line coding errors and circuit down)

and other performance issues that may affect the network.

2.1.4 Analysis of NOC 

The objective of most performance interventions can be stated in terms of result or impact, such as reduced turnover, improved efficiency, reduced costs or better quality. These

impacts or results are achieved by closing performance gaps, developing employees to achieve

 better results, improving process and removing performance block. This also has a reverse

causality in that not only does great performance to continue since people tend to continue

 behaviors that are perceived to be effective.

2.1.5 Quality Policy of NOC

The Quality Policy of Network Operation is to manage, operate and maintain a

telecommunication network comprising voice, data and infrastructure so as to achieve high

quality and reliability, exceeding customer services in a proactive manner. We will be a

committed team of highly competent and motivated professionals. The QMS shall comply with

all the applicable ISO 9001:2000 requirements and shall be continuously improved. The quality

Page 15: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 15/70

 

15

 policy shall be reviewed for its suitability and shall be communicated within Network 

Operations.  Network Operation‟s quality objectives are based on practice, performance and

 potential of the organization. The details of the objectives are:

a.  Enhance efficiency customer and operational productivity so as to improve overall quality

 performance.

 b.  Emphasize customer needs and customer satisfaction through: Providing high quality and

reliable services to customers in a competitive environment.

c.  Enhance network management, performance and potential through :

i.  Improving network element performance.

ii.  Improving operation and maintenance of network elements.

iii.  Maintaining new/enhanced products and technologies.

d.  Provide ST and ND operational expertise and needs to improve planning and

implementation process.

e.  Develop operational plans to guide strategy implementation.

f.  Develop highly motivated and competent personal with relevant skills and competencies.

Page 16: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 16/70

 

16

2.1.6 ORGANIZATION CHART of Access Network Management (ANM) 

Page 17: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 17/70

 

17

CHAPTER 3

3.0 DIGITAL SUBSCRIBER LINE ACCESS MULTIPLEXER (DSLAM)

DSLAM is a networking equipment, often located in baldric mother telephone

telecommunication operator. It contacts digital interface line multiple customer to one digital

communication speed channel use multiplexing techniques.

Diagram 3.0.1 shows xDSL connectivity diagram.

3.1 INTERNET PROTOCOL DSLAM (IP DSLAM)

Traffic consumer is mostly IP based. Traditional 20th

century DSLAMs uses Asynchronous Transfer Mode technology connect to MAF

routers upstream / exchange. These tools then take IP traffic and pass it in to IP router in

IP network. Thisdivision of labour were being conceived have been worthy because DSL own

 base to MAF, and can theoretically bring data other than IP in MAF river. On the other hand, a IP

DSLAM takes IP traffic in DSLAM itself and approve it in to IP router. IP

DSLAM advantage more than one traditional MAF DSLAM is equipment join less costly make

andoperate and can offer one feature richer set.

3.2 ASYMMETRIC DIGITAL SUBSCRIBER LINE (ADSL)

Line is digital asymmetrical customer is a type of customer digital technology line, a

technology data communication which enables faster data transmission on

telephone line copper from one conventional voice band modem could be preparing.

Page 18: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 18/70

 

18

It makes this by using frequency that unused by one telephone call voice. A breakdown

or filter DSL allow a single telephone connection used for both services and ADSL voice calls at

the same time. ADSL can generally only distributed on close range from telephone exchange (last

mile), usually less than 4 kilometres but has transpired to

exceed 8 kilometres if originally placed wire gauge allow next distribution.

In baldric mother line telephones generally end in customer digital multiplexer line access where

one more breakdown frequency separate voice band signal for conventional phone network. Data

carried by ADSL usually sent on data network Phone Company and eventually

reach a conventional Internet Protocol network.

3.3 MULTI-SERVICE ACCESS NETWORK (MSAN)MSAN is also known as a Multi- access service gateway is a device usually appoint at

one telephone exchange although sometimes at a roadside serve area interface cabinet which

connects telephone line customer to backbone network, provide telephone, ISDN,

and broadband like DSL all from one single platform.

Before MSANs placement, telecommunication suppliers usually have deal equipments

separately including DSLAMs provide kind of service carious to customers. Integrate all

services at one single book, that usually backhauls all data stream on IP or Asynchronous

Transfer Mode (ATM) can become more effective cost and can give new service to customers

faster that previously possible.

MSAN is extraordinary cabinet contain narrowBand, broadBand services, battery with

straightener, optic transmission unit and copper distribution framework.

3.4 TELNET

Telnet is a system that being used for TM to make sure the problems is tally with the

alarms received of the equipment by using command prompt. These all procedures to use Telnet

as shown below:

STEP 1: to find DSLAM IP based on DSLAM ID. To check the DSLAM IP by using

http:10.43.42.177//dslam/ as an example DSLAM ID is BAKS121.

Page 19: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 19/70

 

19

Diagram 3.4.0 is show to find the IP address for BAKS121

STEP 2: When the displayed as shown as Diagram 3.4.1, just pick up DSLAM IP of BAKS 121.

The DSLAM IP is 10.0.3.209

Diagram 3.4.1 is show a displayed on DSLAM search

Page 20: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 20/70

 

20

STEP 3: Open the command windows.

Diagram 3.4.2 is shows a command prompt displayed

STEP 4: type in „Telnet DSLAM IP‟. As an example, „Telnet 10.0.309‟ 

Diagram 3.4.3 is shows a command prompt with its command

Page 21: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 21/70

 

21

STEP 5: waiting for the result

Diagram 3.4.4 is shown a command prompt is connecting to DSLAM IP

STEP 6: if the connection is failed, that is means have the other problem. If the connection is

successful, the command prompt is shown as Diagram 3.4.6

Diagram 3.4.5

STEP 6: When the connection is successfully, the command prompt is shown as below. Login the

DSLAM Remote Terminal with the given login id and password.

Page 22: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 22/70

 

22

Diagram 3.4.6

Diagram 3.4.7

STEP 7: After that, type in „rtrv-alm-eqpt::shelf-0:0;‟ 

Page 23: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 23/70

 

23

Diagram 3.4.8 is shown when the command is type in

Diagram 3.4.9 is shown the details

3.5 FINDS PTT, BRAND BASED ON DSLAM ID

To find the PTT, brand for the DSLAM ID, used the same website which is DSLAM

SEARCH at http/10.43.42.177/dslam/.

3.6 NET expert Command Center Launch pads: ADSLPROD

 NET expert is being used by Access Network Operation Center (ANOC) mostly to check 

recorded alarms. NETexpert command center launch pad(ADSLPROD_SUS) has ten

applications. There is „Alert Navigator”, “Object Browser‟, „Install Client‟,  „VCI Tool‟,

„Advanced Troubleshooting Tool‟, „CRM Tiert Utility‟, „Other DSL Service CRM Tiert Utility‟,

„Task Scheduler‟, „Open NCC user guide‟, „BMS service‟, „Network Inventory‟, and „BMS

 portal‟. All alarms either from equipment or system will be saved in „Alert Navigator‟.

3.7 CHECKING BATTERIES CONDITION AT EQUIPMENT MSAN

At the cabinet of equipment for MSAN, new battery will be installed based on the alarms.

To make sure the battery installation is tally with the system, a person who responsible to check it

need to switch off the rectifier at the cabinet. While switching off process, that person will called

another person ANOC who is in charge to capture the alarms using system. When the alarms at

Page 24: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 24/70

 

24

ANOC are appeared, that is means the alarms is tally with both sides which is at equipment and

system.

3.8 GPON OPERATION AND MAINTENANCE TRAINING

3.8.0 GPON FUNDAMENTALS

GPON is a short form for “Gigabit Capable Passive Optical Network”. The optical access

network comprises the following scenarios which are FTTB, FTTC & FTTCab, and FTTH.

Diagram 3.8.0 shows an architecture of optical access network 

Page 25: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 25/70

 

25

From the architecture diagram above, the optical access network comprises the followng

scenarios :

1.  FTTB ( Fiber to the Business) scenario

As an access scenario for business users, FTTB scenarios falls into single business unit

(SBU) and Business Multi-tenant unit (MTU) in terms of capacity. Of then, SBU provides

a comparatively small number of ports, including following types of POTS,

10/100/1000BASE-T, RF and DS1/T1/E1 ports.

1.  FTTC ( Fiber to the Curb) & FTTCab ( Fiber to the cabinet)

As an access to the curb or the cabinet over fiber, FTTC & FTTCab scenario for the

Multi-dwelling unit (MDU), providing a comparatively larger number of ports, including

following types of 10/100/1000BASE-T, RF(33dBmV), VDSL2, and so on.

2.  FTTH (Fiber to the Home)

As an access to the home over fiber, FTTH scenario is mainly for the single familu (SFU),

 providing a comparatively small number of ports, including following types of POTS,

10/100/1000BASE-T, and RF(18dBmV)

GPON architecture is using passive optical network featuring one-to-multiple-point which

is to Optical Line Terminal (OLT), Optical Network Unit (ONU) and Optical Distribution

 Network (ODU). GPON is supports triple-play services which are high defintion television

(HDTV) from 16M until 20M per program, data (10M) and voice conference (4.5M). Besides

that, GPON have high-bandwidth up to 1.25Gbps/2.5Gbps and long-reach up to 20KM. Due to

that specifications, GPON is the choice of large carriers in the international market.

Page 26: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 26/70

 

26

Diagram 3.8.1 shows a passive optical network flow

Diagram 3.8.2 shows capabilities of GPON

GPON using principle of data multiplexing that adopts a Wavelength Division

Multiplexing (WDM) technology, facilitating bi-direction communication over a single fiber. To

separate upstream or downstream signals of multiple users over a single fiber, GPON adopts two

multiplexing mechanisms. For downstream direction, data packets are transmitted in a broadcast

mode manner. For upstream direction, data packets are transmitted in a Time Division Multiplex

Access (TDMA) mode manner.

Page 27: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 27/70

 

27

Diagram 3.8.3 shows GPON‟s principle of data multiplexing

Diagram 3.8.4 shows GPOS‟s principle for upstream direction 

Data rate

(Upstream/Downstream Gbps)

1.24416

2.48832

Maximum physical reach 20 km

Maximum differential fiber distance 20 km

Split ratio 1 : 64 up to 1 : 128

Table 3.8.5: Basic performance parameters

The distance

between nearest

and farthest

ONTs

Page 28: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 28/70

 

28

Diagram 3.8.6 shows GPON Network model reference

In GPON multiplexing architecture has GEM port, T-CONT, and IF PON. GEM port is

the minimum unit for carrying services. Besides that, transmission container (T-CONT) is a kind

of buffer that carries services. It is mainly used to transmit upstream data units. T-CONT is

introduced to realize the dynamic bandwidth assignment of the upstream bandwidth, so as to

enhance the utilization the line. IF PON is a GPON interface, based on the mapping scheme,

service traffic is carried to different GM ports and then to different T-CONTs. The mapping

 between the GEM port and the T-CONT is flexible. A GEM port can correspond to a T-CONT or 

multiple GEM ports can correspond to the same T-CONT. A GPON interface of an ONU

contains one or multiple T-CONTs.

TDU frames are buffered and queued as they arrive, then TDM data is multiplexed in to

fixed-length GEM frames for transmission. This scheme does not vary TDM services but

transmits TDM services transparently. Featuring fixed length, GEM frames benefit the

transmission of TDM services. That is a procedure for mapping of TDM services in GPON.

Page 29: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 29/70

 

29

For mapping of Ethernet services in GPON, GPON systems revolves Ethernet frames and

then directly maps the data of frames into GEM Payload. Then, GEM frames automatically

encapsulate header information. Mapping format is clear and it clear and easy for device to

support this mapping. Besides that, it is also boosts good compatibility.

Diagram 3.8.7 shows GPON multiplexing architecture

Diagram 3.8.8 shows mapping of TDM service in GPON

Page 30: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 30/70

 

30

Diagram 3.8.9 shows mapping of Ethernet service in GPON

3.8.2 GPON KEY TECHNOLOGIES

There are two types of key technologies of GPON. They are T-CONT and attenuation.

For Transmission Container (T-CONT) is involved in bandwidth terms. T-CONT‟s function is

dynamically receives grants delivered by Optical Line Terminal (OLT). Besides that, T-CONTs

also are used for the management of upstream bandwidth allocation in the PON (Passive Optical

 Network) section of the transmission convergence layer. T-CONTs are also primarily used to

improve upstream bandwidth use on the PON.

In GPON, there are two forms of Dynamic Bandwidth Allocation (DBA) which are

Status-Reporting (SR) and Non-Status Reporting (NSR). In NSR DBA, the OLT continuously

allocates a small amount of extra bandwidth of each Optical Network Unit (ONU). If the ONU

has no traffic to send, it transmits idle frames during its excess allocation. If the OLT observes a

given is not sending idle frames, it increases the bandwidth allocation to that ONU. One of the

ONU‟s burst has been transferred, the OLT observes a large number of idle frames from the  

given ONU, and reduces its allocation accordingly NSR DBA has advantage that it imposes no

Page 31: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 31/70

 

31

requirements on the ONU, and the disadvantages that there is no way for OLT to know the best

to assign bandwidth across several ONUs that need more.

For SR DBA, the OLT polls INU for their backlogs. A given ONU may have several T-

CONTs, each with its own priority or traffic class. The ONU reports each T-CONT separately to

the OLT. The report message contains a logarithms measure of the backlog in the T-CONT

queue.

Diagram 3.8.2.0 shows T-CONT bandwidth terms

For attenuation, it mostly involved in fiber attenuation and power budget. Fiber attenuation relates to the fiber length is about 0.35dB/KM for 1310nm. The attenuation of fiber 

splicing point is generally less than 0.2dB. Other factors may cause attenuation such as fiber 

 bending. Huawei‟s OLT and ONU is 28dB and classify in Class B+. 

Class A Class B Class B+ Class C

Maximum loss 20 dB 28 dB 28 dB  30 dB

Minimum loss 5 dB  10 dB 13 dB 15 dB

Table 3.8.2.1 shows classes for optical path loss

Page 32: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 32/70

 

32

Diagram 3.8.2.2 shows fiber attenuation and power budget

Table 3.8.2.3 shows parameters of GPON interfaces for Class B+

Page 33: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 33/70

 

33

3.8.3 BASIC SERVICES OVER GPON NETWORK 

There have several types of services provisioning. They are carriers‟ nightmare and

flexible configuration plan of GPON. For carriers‟ nightmare is an initial configuration such as

service system information configuration, data configuration are required on terminals and then

they can be put into use. To finish the configurations, it is not cost-effective to carriers. For 

flexible configuration plan of GPON, GPON supports zero configurations on terminals and plug-

and-play of terminals, which is cost-effective.

Besides that, VoIP service management solution in GPON is exists. Basic operation and

maintenance process is service provisioning, terminal activation and daily management.

Maintenance personnel use activation code generator to generate terminal activation code

including IADMSIP, PPPoE user name and password. Users input activation code on terminals;

terminals register on IADMS upon power-up and the IADMS makes auto-configuration on

terminals.

GPON provides basic services such as triple-play, TDM and RF overlay services. GPON

also provides unprecedented bandwidth which is up to 2.5Gbps downstream rate, shared by up to

128 premises, and a greater distance from a central office which is 20KM to 40KM, as opposed

to 4KM~5KM for DSL, allowing service provides to enable bandwidth-intensive application andestablish a long-term strategic position in the broadband market. GPON devices deliver triple-

 play which are high-speed voice, data and video services to residential and business subscribers.

Page 34: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 34/70

 

34

Diagram 3.8.3.0 shows GPON service provisioning and zero configuration on terminals

For TDM service solution in GPON, there is two types of mode which are CESOP mode

and Native mode. With fixed upstream or downstream frame structure, periodic multiframes are

transmitted in GPON line. So, GPON can transmit TDM services are used to support processing

TDM service in Native and CESOP modes. With guaranteed QoS, GPON ensures the parameter 

indexes of TDM service, such as end-to-end delay, sitter and bit error. GPON also supports

effective isolation and higher-priority processing of TDAM service.

Page 35: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 35/70

 

35

Diagram 3.8.3.1 shows triple play solution in GPON

3.8.4 MA5680T PRODUCT DESCRIPTION

The OLT is at the central office end in GPON system, the SmartAX MA5680T Optical

Access Equipment of MA65680T is researched and developed by Huawei.

Diagram 3.8.4.0 shows an example of MA5680T

MA5680T provides GPON access to satisfy the requirements for data, voice, and video

services with large capacity, high bit rate, and high bandwidth over a single fiber to satisfy

customized requirements. Besides that, MA5680T provides high-bandwidth and long-reach

access to overcome the obstacles of large-scale access coverage. MA5680T is also being used for 

Page 36: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 36/70

 

36

network applications of fiber to the home (FTTH), fiber to the building (FTTB), base station

transmission, leased line interconnection and Multi-ISP wholesale second level.

MA5680T is used two types of equipment management which are management through

CLI and management through EMS. For management through CLI using two different

approaches, which are by using telnet through IP to local maintenance and by using remote

maintenance terminal through PSTN to local maintenance terminal. Local maintenance terminal

can be whether console cable/serial, software hyper terminal or command link interface. For 

management through EMS, the N2000 provides the following management functions. There are

topology management, performance management, fault management (typical for alarms), security

management, batch service, provisioning, network element (NE) data backup and loading,

database management and environment and power supply management.

3.8.5 MA5680T HARDWARE DESCRIPTION

There are four ports of MA5680T hardware which are cabinets, shelves, boards, and

cables. In cabinet have two types of connection which are external cable connections and internal

connections and ventilation.

For MA5680T shelves, it has dimensions with brackets (W x D x H), in specifications

(W=530mm, D=275.8mm and H=447.2mm). Besides that, it‟s maximum power consumption of 

the service shelf in 1500W. The power ports of the service shelf are on the PRTA board, working

in redundant backup mode. PDU provides four -48V power inputs, eight -48V power outputs and

monitor the status of digital and analogue parameters.

For MA5680T boards have four types of board list. There are control board, service

 board, uplink interface board and power board. In control board has SCUL. The SCUL board is

the broadband control board. It mainly controls the system and processes broadband services.

GPBC is the GPON service board. It works together with the optical network terminal (ONT) to

access GPON services. The GPBC board also has the following functions and features. There are

each GPBC board provides 4GPON ports of the front panel and GPON port can connect up to

64ONTs. XICA is at uplink interface board. The XICA board provides one 10GE upstream port

for GE uplink. XICA supports NTT 2Mbits/s, 2MHz BITS input, and clock output of NTT

Page 37: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 37/70

 

37

8kbits/s, 400Hz. Besides that, it supports output of two 1.544MHz clock signals on the backplane

and supports isolation protection. XICA also provides one 10GE upstream port and external +5V

 power supply and supports the BITS subtending. The PRTA board is the power input board. It is

also has several functions. There are draws and filters a single -48V power input. Besides that, it

is provides LED alarms for under-voltage and fuse blow of the -48V power input and reports the

alarm. Finals, PRTA used to report the manufacturing information.

There are four types of MA5680T cables which are serial port cable, network cable,

environment monitoring cable and optical fiber. Serial port cable is used for debugging or 

maintaining the MA5680T locally. There are three types of connectors that being used which are

RJ-45, DB-25, and DB-9. For network cable, it is being used to maintain MA5680T locally or 

remotely. The RJ-45 connectors can connect with Category-3 and Category-5 unshielded twisted

 pair (UTP-3 and UTP-5) or shielded twisted pair (STP). So that, to get the best electrical

transmission performance, ensure that the wires connected to pins 1 and 2 are twisted.

Environment monitoring cable is being used for reporting environment monitoring information

form the service shelf to the PDU monitoring unit. An optical fiber cable is being used for GPON

access or uplink.

3.8.6 MA5680T FEATURE DESCRIPTION

Gigabit Passive Optical Network (GPON) is adopts the passive optical transmission

technology. GPON is supports the downstream bit rate of 2.488Gbits/s and the upstream bit rate

of 1.244Gbits/s. besides that, GPON port of the MA5680Tapplies to fiber to the building (FTTB)

and fiber to the home (FTTH).

Based on GPON multiplex structure, each ONU/ONT can be allocated multiplex T-

CONT. Upstream bandwidth allocation based on T-CONT, which is decided by COS

requirement and can be divide into five types. Besides that, GEM port is service control channelthat can get one service flow or multiple service flow into one GEM port channel and some like

ATM pvc. Flow classification can be classified based on VLAN, 802.1P, also L3/L4 identifier.

Virtual local area network (VLAN) is a technology used to form virtual workgroups by

grouping the devices of a LAN logically. In 1999, IEEE issued draft IEEE 802.1Q for aiming of 

Page 38: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 38/70

 

38

standardizing VLAN implementations. The advantages of VLAN are the workstations in the

same VLAN can be placed in different physical LANs. Besides that, the broadband and unicast

traffic in the same VLAN will not be forwarded to the other VLANs. In addition, it reduces

equipment investment, eases network management, and enhances network security. There have a

few types of VLAN. They are standard VLAN, smart VLAN, and MUX VLAN. For standard

VLAN are isolated from each other. In addition, standard VLAN only can be used for Ethernet

 ports for network management and subtending. A SMART VLAN can contain multiple upstream

 ports and virtual ports. Traffic on these virtual ports is isolated. Besides that, it can serves

multiple users, thus saving VLAN resources. In addition, a SMART VLAN is being applied in

residential communities to provide access to the internet.

The other type of VLAN is MUX VLAN. MUX VLAN can contain multiple upstream

 ports, but only one virtual port. Traffic on different VLANs is isolated from each other. One-to-

one mapping can be set up between a MUX VLAN and an access user. So, a MUX VLAN can

uniquely identify an access user. Besides that, a MUX VLAN usually being applied when users

are distinguished according to VLANs.

There are a few types for VLAN attribute which are QinQ and stacking. For a VLAN

 packet that has the QinQ attribute, it contains two VLAN tags which are inner VLAN tag from

 private network and outer VLAN tag from the MA5680T. Through the outer VLAN tag, a layer 2

VPN tunnel can be set up to transparently transmit service data among private networks. It is

usually being applied to enterprise users.

Other type of VLAN attribute is stacking. For a VLAN packet that has the stacking

attribute, it contains two VLAN tags which are inner VLAN tag and other VLAN tag allocated by

the MA58680T. With this attribute, the upper layer BRAs can authenticate users based on the

double VLAN tags, thus increasing the number of access users. Besides that, the upper layer 

network working in layer 2 mode can forward packets based on “VLAN + MAC” to provide the

multi-ISP wholesale service. So, it extends the VLAN application.

Page 39: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 39/70

 

39

3.8.7 MULTICAST SERVICE

Multicast is a kind of point-to-multipoint communication form in the network. The core

of the multicast technology is to try to duplicate the packets at the place nearest to the receiver.

The advantages of multicast when compared with the unicast is eases the burden of the server.

The server need not process each user‟s request. Besides that, mu lticast saves the network 

 bandwidth resources and lowers the requirements for the network device.

IP address of multicast group is a D class IP address, which ranges from 224.0.0.0-

239.255.255.255. The source host sends one copy of data to the IP addresses of the multicast

group, and all hosts in this multicast group can receive the same copy of the data.

The MA5680T supports operable, manageable and controlled multicast services, Internet

Group Management Protocol V1/V2 (1GMP V1/V2) and IGMP proxy and IGMP snooping.

IGMP proxy is the upper multicast router performs routing function. The MA5680T is

supports the IGMP proxy function to act as the multicast router to multicast subscribers. Besides

that, it acts as a multicast subscriber to upper multicast router. In addition, it also acts as a

controllable multicast service.

3.8.8 DHCP RELAY FEATURE

Dynamic Host Configuration Protocol (DHCP) works in client-server mode. The DHCP

client dynamically requests the configuration data from the DHCP server. Server is provides the

data for the client. Initially, DHCP was only suitable for applications where the DHCP client and

server are located on the same subnet and could not work across the subnet. If the early DHCP is

used to dynamically configuration the host, each subnet shall be equipped with a DHCP server.

That is obviously uneconomical. Due to that problem, DHCP relay was introduced to solve it.

The MA5680T supports the DHCP relay function, which serves as relay between the

DHCP client and the server located on different subnets. The DHCP packets can be relayed to the

destination DHCP server or client across the subnet. In this way, the DHCP clients on different

subnets can be use the same DHCP server. This is economical and convenient for centralized

management.

Page 40: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 40/70

 

40

DHCP relay principle for the MA5680T performs a few operations. First, change the

destination IP address of the packet to the IP address of the DHCP server. Then, change the

destination MAC address of the packet to the MAC address of the next hop. After that, change

the source IP address of the packet to the IP address of the layer 3 interface. Finally, change the

source MAC address of the packet to the MAC address of the layer 3 interfaces.

There are three types of DHCP relay mode. There are DHCP Standard mode, DHCP

option60 mode, and DHCP MAC address segment mode.

3.9 MA5680T BASIC CONFIGURATION

3.9.0 MAINTENANCE TERMINAL CONFIGURATION

There have a few method of maintenance. There are through the serial port, through the

outband and through the inband management interface. Through serial port, there are two types

of maintenance which are local and remote maintenance.

Local maintenance through the serial port is helps users to locally connect a maintenance

terminal (PC) to the serial port of MA5680T. Then, users can log in the MA5680T to maintain it

locally. For the remote maintenance through the serial port helps users to remotely connect a

maintenance terminal (PC) to the serial port of MA5680T. After that, users can log in to theMA5680T to maintain it remotely. Then, to run „hyper terminal‟, users should start the Hyper 

Terminal.

Start Programs Accessories Communication Hyper terminal

Then, users should be able to configure Hyper Terminal with those specifications. There are 9600

 bits/s for baud rate, 8 for data bits, none for parity, „1‟ for stop bits and none for flow control.

3.9.1 OUTBAND AND INBAND MANAGEMENT

The processes to use outband management over LAN is use the straight through cable to

connect the MA5680T with the LAN. Then, make sure that the ETH port of the SW board and

the PC used for maintaining the MA5680T are located in the same subnet. For the outband

management over the WAN (Wide Area Network), LAN is connected with WAN and router acts

Page 41: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 41/70

 

41

as connector to connect the MA5680T with the WAN. To configure outband management, firstly

set up the configuration environment. Then, set the IP addresses of the ETH port. To set up the IP

address of the ETH port of SCU board, do as follows:

- huawei (config) #interface meth 0

- huawei (config-if-Meth0) # ip address 10.10.20.1 255.255.255.0

Finally, add a rout for the NMS, do as follows:

-huawei(config) #ip route-static 10.10.21.0 10.10.20.254

For inband management whether over LAN or WAN, totally inversed version of outband

management. But have same differences in configuration. Firstly, set up the configuration

environment. Then, create an NMS VLAN and add the upstream port to it, do as follows:

-huawei(config) # vlan 1000 standard

-huawei(config) # port vlan 1000 0/190/0

After that, set the IP addresses of VLAN interface, do as follows:

-huawei(config) # interface vlanif 1000

-huawei(config-if-vlanif1000) # ip address 10.10.20.2 255.255.255.0

Finally, set inband NMS route, do as follows:

-huawei(config) # ip route 0.0.0.0 0.0.0.0 10.10.20.1

3.9.2 SNMP CONFIGURATION

Before configure SNMP, we need to set the SNMP parameters. Firstly, we need to create

the community name. To create, do as follows:

-huawei(config) #snmp-agent community read public

-huawei(config) #snmp-agent community write private

Page 42: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 42/70

 

42

Then, setting up the system contact, to set, do as follows:

-huawei(config) #snmp-agent sys-info location HW-075528780808

After that, setting the system location, do as follows:

-huawei(config) #snmp-agent sys-infor version v1

After finished set the SNMP parameters, we can continue to configure SNMP configuration.

Firstly, we need to enable traps sending, do as follows:

-huawei(config) #snmp-agent trap enable standard

After that, setting the IP address of the target-host for traps, do as follows:

-huawei(config) #snmp-agent target-host trap address 10.10.21.1 securityname private

Finally, setting the IP address of the ETH port as the source address for traps sending, do as

follows:

-huawei(config) #snmp-agent trap source meth 0

3.9.3 GETTING STARTED WITH CLI

For command line interface (CLI), there have few CLI characteristics. There are

intelligent matching, interaction characteristics, interactive mode, edit functions, and history

command saving.

For intelligent matching command, do as follows:

-huawei #end To enter the enable command, just type in en or end

For interaction characteristics, do as follows:

-huawei(config)#load program

  {xmodem<K> ltftp<K>lftp<K>} : tftp

  {serverIPAdresses <1> <x.x.x.x> } : 10.10.10.1

  {frameid<U><0,1>lframeid/slotid <S><3,15>} :0/3

Page 43: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 43/70

 

43

In interactive mode, when you type in an incomplete command, the system, prompts you with the

next keyword and its parameter type. Besides that, the CLI provides basic command edit

functions. This is allows multi-line editing, with up to 255 bytes for each command.

< >< > <ctrl + P> Display history commands

For history command saving, do as follows:

-huawei(config) #history command max-size 11

  To set the number of history commands saved in the buffer to 11

3.9.4 USER MANAGEMENT

There have three levels of users. First is a common user. Common user is authorized to

 perform basic system operations and query operations. Next is an operator. Operator is authorized

to configure MA5680T and services. Last level is administrator end super user. The similar 

authority for administrator and super user is to perform all operations and maintain the

MA5680T, user accounts, and user authorities. But, there have same differences. Only one super 

user exists in the system, while multiple administrators in the system. Besides that, the super user 

is the highest level in the system. In addition, the super user can create an administrator account

 but an administrator has no authority to add a super user.

For adding a user, do as follows:

-huawei(config) #terminal user name

  User name (<=15 chars) : huawei

  User password (<=23) :

  Confirm password (<=23) :

  User‟s level : 

  1. Common user 2. Operator 3. Administrator 

  Permitted Reenter Number ( 0 - - 4) : 3

  User‟s Appended Info (<=30 chars) : User  

  This user has been added

Page 44: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 44/70

 

44

  Repeat this operation? (y/n)[n] :

For modifying user level, do as follows:

-huawei(config) #terminal user level

For changing user password, do as follows:

-huawei(config) #terminal user password

For modifying the permitted reenter number, do as follows:

-huawei(config) #terminal user opdinfo

For disconnecting an online user, do as follows:

-huawei #client kickoff 2

For deleting a user, do as follows:

-huawei(config) #undo terminal user name

3.9.5 EQUIPMENT MANAGEMENT

First of all, we should to set description of a shelf, do as follows:

-huawei(config) #frame set 0 desc frame1

-huawei(config) #display frame desc 0

Then, resetting the main control boards, do as follows:

-huawei #reboot active

After that, adding a service board offline, do as follows:

-huawei(config) #board add 0/2 h592gpba

-huawei(config) #display board 0

Then, confirming a service board, do as follows:

Page 45: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 45/70

 

45

-huawei(config) #board confirm 0

-huawei(config) #board confirm 0/2

After that, deleting a service board, do as follows,

-huawei(config) #board delete 0/2

Then, resetting a service board, do as follows:

-huawei(config) #board reset 0/2

Finally, prohibiting a service board, do as follows:

-huawei(config) #board prohibit 0/12

There have five states of board which are normal, failed, config, Auto_find, and

 prohibited. For normal board state, it indicates that the board is running in normal state. Failed

 board state is to indicate that the board is faulty. For config board state, it indicates that the board

is being configured. Auto_find board state is being used to indicate that the board is just inserted,

 but nit confirmed yet. Last state is prohibited. It is to indicate that the board is prohibited.

3.10 GPON SERVICE VLAN SOLUTION

The MA5680Tsupports the following types of VLANs which are standard VLAN, MUX

VLAN and Smart VLAN. There have two types of VLAN port which are standard port and

service virtual port. A standard port refers to a physical port of the control card namely on FE or 

GE port of the uplink cards. Besides that, it is also called the upstream port. A service virtual port

refers to a service connection of a user-side physical port such as an xDSL or the Ethernet port. In

addition, it is also called the access port.

There have three types of VLAN types on the MA5680T which are standard VLAN,

Smart VLAN, MUX VLAN. Standard VLAN is only contains standard port in the same VLAN.

Besides that, it contains Ethernet ports for subtending. For Smart VLAN, it is contains multiple

xDSL virtual ports whose service flow are isolated. In addition, xDSL access services is being

used for reducing the number of VLAN occupied. MUX VLAN is contains only one xDSL

Page 46: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 46/70

 

46

virtual port whose service flow is isolated in different VLANs. It is also used xDSL access

services to distinguish different customers by the VLAN IDs.

A standard VLAN is the VLAN defined by the IEEE 802.1Q standard which has the

following features. There are the ports in one VLAN are interconnected of layer and the ports in

different VLANs are isolated at layer 2. On the MA5600T, the standard VLAN can contain only

standard ports (GE or 10GE ports of the uplink card), but not the service virtual ports such as the

GPON service ports. Besides that, a smart VLAN is used to partition user groups. Each user 

group is associated with one smart VLAN. When the number of VLANs on a MA5600T is

limited, you can use the smart VLAN to give access to more users than a MUX VLAN. In

addition, a smart VLAN contain broadcasts allowing the partition of user groups, while

maintaining user security. The broadcast domain of a standard port includes all ports in the smart

VLAN. The broadcast domain of a service virtual port includes only the standard ports.

A MUX VLAN is a VLAN that can contain multiple standard ports but only one service

virtual port. There is a one-to-one mapping relationship between the VLAN ID and access user.

Besides that, the MUX VLAN is used to isolate and identify access users. One VLAN IS

corresponds with one access connection.

3.11 GPON SERVICE IMPLEMENTATION PRINCIPLE

In GPON service multiplex structure, each ONU/ONT can be allocated at multiple T-

CONTs. Besides that, upstream bandwidth allocation based on t-cont is decided by COS

requirement, t-cont can be divided into five types. GEM port is service control channel. One

GEM can carry on service flow or multiple service flow. In addition, flow classification can

 based on VLAN, 802.1P also L3/L4 identifier.

For GPON service basic concepts, in the upstream, the T-CONT (T-Container) is used to

 bear the service traffic. GPON uses the T-CONT to implement the service comvergence. T-

CONT is the basic control unit of the upstream service traffic in the GPON system. Besides that,

each T-CONT is identified by the Alloc-ID uniquely. The Alloc-ID ranges from 0 to 4095. It is

allocated by the OLT, that is, an Alloc-ID can only be used by one ONT/ONU of one PON port.

In addition, GPON Encapsulation Method (GEM) frames are transmitted between the OLT and

Page 47: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 47/70

 

47

the ONU/ONT. Each T-CONT consists of one or more GEM ports. Each GEM port bears one

kind of service traffic. Each GEM Port-ID is identified by the Port-ID uniquely. The Port-ID

ranges from 0 to 4095. It is allocated by the OLT, that is, a GEM port from any be used by one

ONU/ONT of one PON port.

Relationship between T-CONTs, GEM port and service traffic is the management channel

shall be configured with a GEM port and a T-CONT separately to ensure the bandwidth for the

terminal management service. The GEM port is the virtual connection used to identify the service

traffic.

Mapping Details Application

VLAN ID

Mapping

  It maps the service traffic of the

specified VLAN ID to a unique Port-

ID. In Qin-Q mode, one GEM port

supports multiple VLAN ID mappings

  The ONU/ONT adopts the VLAN

ID to differentiate the user service

traffic

802.1P

Mapping

  It maps the specified 802.1P service

traffic to a unique Port-ID. In Qin-Q

mode, one GEM port supports

multiple 802.1P mappings

  The ONU/ONT adopts the priority

differentiate the user service

traffic. The user packet must be

 pri-tagged, that is, the VLAN ID is

0

VLAN ID

+ 802.1P

Mapping

  It maps the specified VLAN ID +

802.1P service traffic to a unique

PORT-ID. In Qin-Q mode, one GEM

 port supports multiple VLAN ID +

802.1P mappings

  The ONU/ONT adopts the

 priority + VLAN ID to

differentiate the user service

traffic

Table 3.11.0 shows relationship between T-CONT, GEM port and service traffic

Page 48: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 48/70

 

48

3.12 GPON SERVICE CONFIGURATION BASICS

To configure service VLAN, firstly, adding service VLAN, do as follows:

vlan vlanid  [to end-vlanid]{mux|smart|standard|super}

The system supports up to 4039 VLANs. VLAN 1 is the default system VLAN which cannot be

added or deleted. Next, add uplink port for service VLAN, do as follows:

port vlan vlanid [to end-vlanid] frameid/slotid portlist

For example, to add upstream port 0/9/0 to smart VLAN 10, do as follows:

-huawei(config) #vlan 10 smart 

-huawei(config) #port vlan 10 0/19 0

 Next, to add traffic table command is used to create a traffic entry. The traffic entry is used to set

the upstream or downstream rate of a service port. There are seven default traffic profiles in the

system. The following table describes the function of each profile. For example:

Assume that:

The profile 1D is 33

The profile name is huawei

The CIR is 3333

The CBS is 10240

The PIR is 4444

The PBS is 20480

The priority of the outgoing packets copies

the user.

802.1P priority (the default priority is 7)

Mapping profile 1 is used with the default

 priority 2.

The packet priority policy is Local-setting

Page 49: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 49/70

 

49

huawei (config) # traffic table ip

{cir<K>|index<K>|modify<K>| name<K>}:index 

{row-index<U><O,1023>}:33{cir<K>|name<K>}:name

{name<S><Length 1-32>}:huawei {cir<K>}:cir 

{cir<?U><64,524888>|off<K>}:3333 

{cbs<K>|pbs<K>|pir<K>|priority<K>}:cbs 

{cbs<U><2000,1024000>}:10240{pbs<K>|pir<K>|priority<K>}:pir 

{pir<U><524288>}:4444{pbs<K>|priority<K>}:pbs{ pbs<0><2000,1024000>}:20480 

{priority<K>}:priority 

{prival<U><0.7>|user-cos<K>|user-inner cos<K>|user-ros<K>}:user-

cos{defaultval<U><0,7>}:7 

{inner-priority<K>|priority-policy<K>}:inner-priority 

{inner-prival<U><0,7>}:2{priority-policu<K>}:priority-policy 

{priority-policy<E><Local-setting, Tag-In-Package>}:local setting

3.13 FOR ADDING A DBA-PROFILE

The MA5680T supports up to 512 T-CONT profiles. T-CONT profiles 1-9 are the default

 profiles. The system adjusts the bandwidth value you input when you add a T-CONT profile to a

multiple of 64. The command is:

DBA-profile add [profile-id profile id][profile-name profile name][type|fix fix-

 bandwidth[bandwidth_compensate bandwidth_compensate][type2 assure assure-

 bandwidth|type3 assure assure-bandwidth max max-bandwidth|type4 max max-

 bandwidth|type5 fix fix-bandwidth assure assure-bandwidth max max-bandwidth}

Page 50: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 50/70

 

50

To add a DBA profile with ID of 20, type of type 5, fixed bandwidth of 1Mbits/s, assured

 bandwidth of 2Mbits/s and maximum bandwidth of 4Mbits/s, do as follows:

huawei(config)#tcont-profile add profile-id 30 type1 fix 102400

3.13.0 FOR ADDING AN ALARM PROFILE

The ONT alarm profile consists of a series of alarm threshold parameters. It is used to

monitor the performance of the ONT line. When a statistic reaches the related alarm threshold,

the host is notified of this information, and an alarm is sent to the log host and the NMS. Besides

that, the system supports up to 50 alarm profiles. There is default alarm profile (profile 1) in the

system. It cannot be deleted and can be modified.

As an example, use default as shown:

-huawei(config) #gpon alarm-profile add profile-id 2

  {<cr>|profile-name<K>}:

  Command :

  gpon alarm-profile add profile-id 2

  >GEM port loss of packets threshold (0-100)[0]:20

  >Ethernet FCS errors threshold (0-100)[0]:50

  . . . . . . . . . . . . .

There have another command to add on ONT line profile. In a ONT line-profile, T-

CONT is band to a DBA-profile, GEM port is bind to a T-CONT. Besides that, mapping mode is

defined. GEM port is mapped to the mode defined. As an example, to create ONT line profile 10,

do as follows:

huawei(config) #ont-lineprofile

{epon<K>|gpon<K>}:epon

{<cr>|profile-id<K>|profile-name<K>}:profile-id

{profile-id<U><1,4096>}:10

Page 51: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 51/70

 

51

{<cr>|profile-name<K>}:

Command : ont-lineprofile epon profile-id 10

3.13.1 FOR ADDING T-CONT TO ONT-LINEPROFILE

The t-cont command is used to bind a DBA profile to a T-CONT. the T-CONT is the

 physical resources of the ONT. Besides that, a T-CONT can bear services only after it is bound to

a DBA profile. After a T-CONT is successfully bound to a DBA profile, the T-CONT can

 provide flexible DBA solutions based on different settings of the DBA profile. A format of 

command is shown below:

tcont tcont-list {dba-profile-id profile-id|dba-profile-name profile-name}

As an example to show it clearly as shown below:

Bind DBA profile 2 to T-CONT 6 In ONT line profile 10

huawei(config-gpon-lineprofile-10) #tcont

{t-cont-list<S><Length 1-13>}:6

{data-profile-id<K>|dba-profile-name<K>}:dba-profile-id

{profile-id<U><1,512>}:2

Command : tcont 6 dba-profile-id 2

3.13.3.1 To Add GEM port

This command is used to bind a GEM port to a T-CONT and configure the related

attributes in an ONT line profile. Before creating a service virtual port, you need to run this

command to bind the GEM port and the T-CONT. The format is shown below:

gem add gem-index service-type t-cont tcont-id{encrypt encrypt|casscode

casscode|{priority-queue priority-queue|gem-oar traffic-table-index}}

As an example to show it clearly as shown below:

Page 52: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 52/70

 

52

Bind GEM port 1 to T-CONT 2 in ONT line profile 10, and specify the PQ queue priority

to 5

huawei(config-gpon-lineprofile-10)#gem-port

{gem-index<U><0,127>}:1 

{service-type<E><eth,tdm>}:eth

{tcont<K>}:tcont{tcont-id<U><0,7}:2 

{<cr>|casscode<K>|encrypt<K>|gem-car<K>|priority-queue<K>}:priority-queue 

{priority-queue<U><0,7>}:5 

{<cr>|casscode<K>|encrypt<K>}:

Command : gem add 1 eth tcont 2 priority-queue 5

3.14 MAPPING MODE

This command is used to create mapping between the GEM ports and ONT-side services,

namely, the mapping between the GEM ports and data traffic on ONT subscriber interfaces. The

GEM port can carry services only after mapping is created by running this command. The format

is shown below:

mapping-mode {vlan|priority|port|port-vlan|port-priority|port-vlan-priority|iptos}

For example, to set the mapping mode supported by the ONT that is bound tp line profile 30 to

 priority.

huawei(config-gpon-lineprofile-30)#mapping mode 

{iptos<K>|port<K>|port-priority<K>|port-vlan<K>|port-vlan-

 priority<K>|priority<K>|vlan<K>|vlan-priority<K>}:priority 

Page 53: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 53/70

 

53

3.14.0 MAPPING

This command is used to set up the mapping between the GEM port and the ONT-side

service, that is, to set up the mapping between the GEM port and the upstream data stream of the

ONT user port. The format is shown below:

gem mapping gem-index mapping index{eth port-id[vlan vlanid|priority 

 priority]*|moca port-id[vlan vlanid|priority priority]*|iphost|el port-id}

For an example, to map service stream with the GEM port 1 and the mapping 0 to the

Ethernet port 2 in ONT line profile 10, and set the priority to 7

huawei(config-gpon-lineprofile-10)#gem mapping

{gem-index<U><0,127>}:1{mapping-index<U><0,7>}:0 

{el<K>|eth<K>|flow-car<K>|iphost<K>|moca<K>|priority<K>|vlan<K>}:eth 

{ont-portid<U><1,8>}:2 

{<cr>|flow-car<K>|priority<K>|vlan<K>}:priority 

{priority<U><0,7>}:7{,cr>|flow-car<K>}:

Command: gem mapping 1 0 eth 2 priority 7

3.14.1 ADDING AN ONT SERVICE PROFILE

ONT services profile is used to configure the attributes or capacity of the ONT. Besides

that, it is being used to define the type and number of ports. It is also used to define the user 

service VLAN for each port. The format is shown below:

ont-srvprofile gpon[profile-id profile-id|profile-name profile name]

For an example to show it clearer is shown below:

huawei(config)#ont-srvprofile 

{epon<K>|gpon<K>}:gpon 

Page 54: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 54/70

 

54

{<cr>|profile-id<K>|profile-name<K>}:profile-id 

{profile-id<U><1,4096>}: 10

{<cr>|profile-name<K>}:

So, its command is ont-srvprofile gpon profile-id 10

3.14.2 ADDING ONT’S SERVICE PROFILE: ONT-PORT

ONT port is the ONT line profile set the number of each types of ports on the ONT. The

format is shown below:

ont-port{pots pots-port|eth eth-port|tdm tdm-port|tdm-type port-type|tdm srvtype srv-

type|moca moca-port|catv catv-port} 

As an example:

 Number of POTS ports: 1

 Number of Ethernet ports: 2

 Number of TDM ports: 2

Type of the TDM ports: E1

Service type of the TDM port: TDMOGEM

 Number of MOCA ports: 2

 Number of CATV ports: 2

Page 55: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 55/70

 

55

huawei(config-gpon-srvprofile-10)#ont-port 

{catv<K>|eth<K>|moca<K>|pots<K>|tdm<K>|tdm-srvtype<K>|tdm-type<K>}: pots 

{pots-port<U><0,8>}: 1 

{<cr>|catv<K>eth<K>|moca<K>|tdm<K>|tdm-srvtype<K>|tdm-type<K>}: eth 

{eth-port<U><0,8>}: 2 

<cr>|catv<K>eth<K>|moca<K>|tdm<K>|tdm-srvtype<K>|tdm-type<K>}:tdm-

srvtype{srv-type<E><TDMoGEM}:tdmoGEM 

{<cr>|catv<K>| moca<K>|tdm-type<K>}: tdm-type 

{port-type<E><E1,T1>}: e1 

{<cr>|catv<K>|moca<K>}: moca 

{moca-port<U><0,8>}: 2 

{<cr>|catv<K>}: catv 

{catv-port<U><0,8>}: 2 

The command is shown below:

ont-port port 1 eth 2 tdm-srvtype tdmoGEM tdm 2 tdm-type e1 moca 2 catv 2

3.15 ADDING ONT-SERVICE PROFILE: PORT VLAN

Port-VLAN is used to in an ONT service profile add the UNI port to a VLAN.

When the syste, needs to manage the attribute of the ONU UNI port in the remote

management mode, run this command to add the UNI port to the VLAN. The format is

shown as below:

port vlan eth ont-portlist{vlanid|transparent|translation vlanid user-vlan 

user-vlanid}

As an example:

In ONT service profile 10, to add Ethernet port 1 to VLAN 10

Page 56: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 56/70

 

56

huawei(config-gpon-srvprofile-10) #port vlan 

{eth<K>|iphost<K>|moca<K>}:eth 

{ont-portlist<S><Length 1-128>}:1 

{translation<K>|transparent<K>|vlanid<U><0,4095>}: 10 

Its command is:

 port vlan eth 1 10

3.16 ADDING AND ACTIVATING AN ONT

To add an ONT on GPON port 0/3/0, authenticate the ONT by the SN and bind

the ONT with line profile 1. For example:

huawei(config-if-gpon-0/3)#ont add 

{portid<U><0,7>}:0 

{ontid<U><0,127>|password-auth<K>|sn-auth<K>}: sn-auth 

{sn-value<S><Length 13-16>}:hwhw-12341234 

{omci<K>|password-auth<K>|snmp<K>}:snmp 

{ont-lineprofile-id<K>|ont-lineprofile-name<K>}: ont-lineprofile-id 

{profile-id<U><1,4096>}:1 

{<cr> 1 desc<K>}:

Its command is:

ont add 0 sn-auth hwhw-12341234 snmp ont-lineprofile-id 1 Number of ONTs

that can be added :1 success:1 PortID:0, ONTID:0

  Add ONT

Page 57: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 57/70

 

57

huawei(config-if-gpon-0/12)#ont add 1 1 sn-auth hwhw-12341234 10101010

password-auth huawei profile-id 2

 Activate ONThuawei(config-if-gpon-0/12)#ont activate 1 0

CHAPTER 4

4.0 CONCLUSION

The conclusion that I can make here is that this industrial training is an important

 point because it can train the skills learned by students in their learning in lecture halls

where it can be applied effectively. Industrial training is also a branch to develop self-

confident students for the real world of work ahead in the future.

This is because the training industry has been given appropriate disclosure about

the intricacies of employment in order to prepare students in the future world of 

work. In addition, it also has to allow me to know the usefulness of the lessons in the

field of telecommunication engineering that I have learned.

This industrial training is not only to improve my self-confidence to face the real

working environment but also helps me improve the way I communicate with the public. Cooperation of staff training is also very good and this has taught me how great

sense of cooperation. I feel very proud and fortunate to have the opportunity to undergo

industrial training. This is because, at present to get a job at any company, we must have

the skills on the post that we seek.

Upon completion of Industrial Training which began on 24th

June 2013 and has

safely ended on 30th August 2013 at the ANOC (Access Network Operation Center)

Telekom Malaysia at Cyberjaya. Now I could make some conclusions.

During my 10 weeks Industrial Training in the office, I have learned and been

exposed more about the field of telecommunications and related telecommunication of 

courses taken at UTeM. Many of the things that unknown before this, I learned during

my industrial training. For sure it can finalize its students to face the real working world

after graduating from the UTeM. Although there are some tasks that are not closely

related to the field are taken, this can also increase students' knowledge. I am grateful to

have received guidance from the company, especially supervisors and colleagues.

Page 58: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 58/70

Page 59: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 59/70

 

59

4.2 APPENDIXES

4.2.0 To find brand for DSLAM based on DSLAM ID

Page 60: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 60/70

 

60

Page 61: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 61/70

 

61

4.2.1 To find PTT for DSLAM based on DSLAM ID

Page 62: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 62/70

 

62

4.2.2 Huawei system network equipment (NE)

Page 63: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 63/70

 

63

4.2.3 Checking alarms for MSAN

Page 64: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 64/70

 

64

Page 66: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 66/70

 

66

Page 67: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 67/70

 

67

Page 68: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 68/70

 

68

Page 69: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 69/70

 

69

Page 70: Final Report for Industrial Training

7/27/2019 Final Report for Industrial Training

http://slidepdf.com/reader/full/final-report-for-industrial-training 70/70

 


Recommended