5i' PART VI I.600-Series Recommendations MAINTENANCE PRINCIPLES BLANC Montage: Page PAIRE = Blanche Recommendation I.601 GENERAL MAINTENANCE PRINCIPLES OF ISDN SUBSCRIBER ACCESS AND SUBSCRIBER INSTALLATION (Melbourne, 1988) 1 Scope of application 1.1 This Recommendation outlines the general aspects and prin- ciples relating to the reference configurations and general archi- tecture for each kind of subscriber access (basic, primary, multi- plexed, higher rate) and associated subscriber installations. This is given in terms of the function groupings and the interconnecting communication parties. Loopback definitions and their locations used in this Recom- mendation are also given. 1.2 Recommendation I.602 is concerned with the maintenance of the ISDN subscriber installation. The maintenance principles are given in a general way for functions which are dependent on the design of NT2 and TE and more precisely where it impacts directly on the S or T interface (i.e. in relation to Recommendations I.430, I.431). These functions are supervised and/or controlled by the subscriber installation. The ISDN management protocols which provide this activity are contained in Recommendation Q.940 on ISDN user-network management and maintenance protocols. 1.3 Recommendation I.603 describes maintenance for the network portion of the ISDN basic access (144 kbit/s). A common format with other similar Recommendations, in conformance with Recommendation M.20, is used. The functions performed by the digital transmission section and the exchange termination (ET) are identified. These functions are supervised and/or controlled by the network or Administration (see S 3.3 of Recommendation I.601). 1.4 Recommendation I.604 describes maintenance of the network portion of the ISDN primary access (2048 and 1544 kbit/s) following the same principles as given in Recommendation I.603. The functions provided by the digital transmission section and the exchange termination (ET) are identified. The functions are supervised and/or controlled by the network or Administration. 1.5 Recommendation I.605 describes the maintenance of a multi- plexed basic rate system. Reference is made to Recommendations I.603 and I.604 when common mechanisms are applied. The functions performed by the digital section of the ISDN basic rate access, the basic access multiplexer, the digital link, and the exchange termination (ET) are identified. These functions are supervised andB/For controlled by the network or Administra- tion. 2 Objectives In order to try and meet overall objectives, a number of points have been identified for Administrations and maintenance service providers (see S 3.2.2.3): i) to detect fault conditions, identify the failed maintenance entity, take system protection actions, inform the maintenance staff of Administrations; ii) to incorporate facilities to enable the failure to be located by the maintenance staff, so that failure correction is achievable by a single attendance to the failed location; iii) to provide an appropriate maintenance organi- zation and levels of staffing, so as to achieve goals for out-of-service repair times; iv) to incorporate facilities to allow clear dif- ferentiation of failures between the subscriber installation and the network; v) to incorporate facilities to allow clear dif- ferentiation between failures and normal subscriber activities. 3 Network reference model 3.1 ISDN subscriber access and installation configuration Figure 1/I.601 shows the simplified ISDN subscriber access and installation configuration (based on Recommendations I.411 and Q.512). The definitions contained in this figure are the ones used in the I.600-Series Recommendations. Figure 1/I.601, p. 3.2 Network configuration and definition for maintenance activities 3.2.1 Network configuration Figure 2/I.601 is the basis for the general maintenance prin- ciples of the ISDN access and subscriber installation. Figure 2/I.601, p. 3.2.2 Definitions 3.2.2.1 Subscriber Access Maintenance Centre (SAMC) A SAMC represents a group of functions, network equipment ele- ments and staff controlled by the Administration, which together have the responsibility and capability for maintenance functions and maintenance actions within the subscriber access, such as defined in Figure 2/I.601. The equipment and functions may be centralized or distributed in the network, local exchange and subscriber access. The architec- ture of the SAMC and its internal interface(s) between SAMC staff equipment(s) is presented in S 3.4. Conceptually, the SAMC is con- sidered to be a single functional entity within an ISDN, as seen by the subscriber. 3.2.2.2 Subscriber Installation Maintenance Entity (SIME) An SIME represents a group of dedicated functions contained within the functional groups (as specified in Recommendation I.411) of the subscriber installation which have the following purposes, e.g.: - interaction with the (human) user; - handling of the maintenance protocol from the subscriber installation and/or maintenance service provider ; - control of internal testing and maintenance mechanisms. It is considered that the functions of the SIME may be distri- buted throughout layers 1-3 and management/maintenance entities, including NT1 functions in some applications. However, the precise architecture and protocol of the SIME is not a subject of this Recommendation. 3.2.2.3 Maintenance Service Provider (MSP) The MSP represents a group of functions, equipment and mainte- nance staff, which together have the responsibility for maintaining a subscriber installation or a part of the subscriber installation. A MSP cannot control the maintenance functions of the subscriber access. If authorized, it can request an SAMC to perform these functions. Agreement and responsibility for maintenance between the sub- scriber and the MSP for each part or parts of the subscriber installation should be made at the time of subscription to the maintenance service (this may take the form of a commercial con- tract). In any case, provision to allow a customer to change the maintenance service provider(s) is recommended. The subscriber may choose not to make such an agreement with the MSP. Maintenance service providers can be: - private providers; - the Administration. Note - A subscriber can act as his own MSP. A private maintenance service provider external to ISDN is connected to the ISDN via a recommended T reference point. An Administration's maintenance service provider may be connected to the ISDN via a recommended T reference point or via an interface which is internal (outside the scope of this Recommendation) to the ISDN. More than one MSP may have the responsibility to maintain one subscriber installation. The responsibility for maintaining each equipment shall be unique. Other interfaces are for further study. If authorized, the MSP can invoke maintenance function in the SIME. It is the sole responsibility of a subscriber installation and not of the network to ensure that an unauthorized MSP cannot get access to maintenance functions in the subscriber installation. 3.3 Communication configurations 3.3.1 General The presentation of the relationships between the functional blocks SAMC, SIME and MSP and the configurations to be maintained have been completed by figures showing the various communication paths. The communication paths are shown by bold lines within the Figures 3/I.601 to 7/I.601. 3.3.2 Communication configuration for maintenance of a subscriber access by the SAMC Figure 3/I.601 shows the communication configuration between the subscriber access and the SAMC. Figure 3/I.601, p. 3.3.3 Communication configuration for maintenance of a sub- scriber access by a SAMC requested by an MSP Figure 4/I.601 shows the communication configuration between an MSP and a SAMC that allows the MSP to request maintenance infor- mation and actions related to the subscriber access. Figure 4/I.601, p. 3.3.4 Communication configuration for maintenance of a sub- scriber installation by an MSP within the ISDN Figure 5/I.601 shows the communication configuration between an MSP within the ISDN and the subscriber installation. Figure 5/I.601, p. 3.3.5 Communication configuration for maintenance of a sub- scriber installation by an MSP connected to the ISDN via an S or T reference point Figure 6/I.601 shows the communication configuration between an MSD at reference point S or T and the subscriber installation. Figure 6/I.601, p. 3.4 Management configurations 3.4.1 Relationships In Figure 7/I.601 the communication relationships between the management entities required to support the functions in this series of Recommendations are given. It does not imply any physical model of the network. Figure 7/I.601, p. The connections shown in Figure 7/I.601 represent the allowed communication paths that use the protocol architecture defined in Recommendation Q.940. These communications are subject to security procedures implemented by the receiver of the message. The subscriber access maintenance entity (SAME) controls the subscriber access maintenance functions and provides communications for such activities. The SAMC functions might be distributed. The operations administration and maintenance centre (OAMC) consists of a group of functions and staff. In the context of this Recommendation the OAMC is responsible for the communication with, and the controlling of, the subscriber access maintenance functions as provided by the SAME. The OAMC may also be responsible for the communication with, and the controlling of, other maintenance functions as provided by other management entities. Such functions are outside the scope of this Recom- mendation. Therefore, the SAMC can be considered as the grouping of the SAME, communication path and part of the OAMC. 3.4.2 Security provisions To facilitate maintenance procedures and failure localization, management entities responsible for different control domains may communicate. However, since management and maintenance information is of critical importance to system integrity, access to management functions and information is subject to prior authorization and security restrictions. The security restrictions are enforced by the recipient of the maintenance request and may include requirements for user authenti- cation (identification), the use of passwords and/or limited access based on the originating call. The use of adequate security mechanisms is especially impor- tant in the case of the OAMC since maintenance functions for many users may be affected by unauthorized access. 3.5 Maintenance conditions for an ISDN subscriber access In general, a subscriber access can be considered to be in one of the following conditions for the purpose of explanation of the relationship between maintenance and trafficability in this Recom- mendation. 3.5.1 In service 3.5.1.1 Correct functioning An access which is fully equipped has been allocated an ISDN number(s) and is correctly functioning (meeting all the network performance and operational requirements) is considered to be "in service". The access can be either busy or free in this condition. 3.5.1.2 Degraded transmission An access is said to be in the "degraded transmission" condi- tion when the transmission of the digital section has degraded sufficiently to cause the initiation of further maintenance activity. The amount of degradation at which the maintenance activity is initiated is service dependent. In this condition call offering is not changed (i.e. the same as for the "in service" condition). The levels at which an access enters the degraded transmission condition may be dependent on the quality of service provided to the customer. These levels are found in other Recommendations. 3.5.2 Out of service 3.5.2.1 Out of service due to failure ( unavailability state ) When a failure exists and has been detected such that the net- work performance is below an acceptable limit the access is con- sidered to be "out of service due to failure". In such a condition call offering may be rejected or attempted as normal. In the latter case, the call offering may not be successful and normal clearing with cause may not be possible. Examples of failure conditions are: - unacceptable transmission performance; - access in a failure condition; - failure of subscriber installation; - failure of the digital transmission section; - failure within individual exchange subscriber equipment; - local exchange failure. 3.5.2.2 Out of service due to operational reasons This condition is included for information but is not con- sidered further in this Recommendation. An Administration may wish to mark an access "out of service due to operational reasons" due to, for example, payment deficien- cies by the customer. Call offering (either originating and/or terminating) may be rejected. Note - In any of the conditions, testing (and/or measure- ments) may be in progress. The availability of the access call offering will be dependent on the specific test in progress. Whether the test or the call attempt is rejected (in the case of a collision) is dependent on the specific test and/or the Administra- tion. Further study is required. 4 Control domain on the ISDN subscriber basic access 4.1 General In Figure 8/I.601 the layered communication configuration is shown for the ISDN subscriber access showing also the SIME, SAMC and the OAMC. Figure 8/I.601, p. 4.2 Control domains The control domain is defined as the grouping of those proto- col layer entities which are under the supervision and control of a management entity (e.g. SAME or SIME). 4.2.1 The control domain of the SAME The control domain of the SAME is shown in Figure 9/I.601. Since the SAME supervises the correct functioning of the peer-to-peer communication between protocol layer entities, failures outside its control domain will be recognized by the layer 2 and 3 processes in the ET and reported by it to the SAME (i.e. layers 2 and 3 failures in the B-channel entities of the sub- scriber installation, and layer 1 failures at the T reference point). Automatic additional failure localization may be necessary to have clear differentiation between failures in the subscriber installa- tion and the subscriber access. Figure 9/I.601, p. 4.2.2 The control domain of the SIME The control domain of the SIME is given in Figure 10/I.601. Since the SIME supervises the correct functioning of the peer-to-peer communication between protocol layer entities, failures outside its control domain will be recognized by the layer 2 and 3 processes on the subscriber equipment and reported by them to the SIME [i.e. layers 2 and 3 failures in the D-channel entities of the exchange (ET), and layer 1 failures beyond the T reference point, as seen by the subscriber]. Automatic additional failure localization may be necessary to have clear differentiation between failures in the subscriber installation and the subscriber access. Figure 10/I.601, p. 5 Loopbacks 5.1 Use of loopbacks In general loopbacks are used for failure localization and verification as defined in Recommendation M.20. The use of loopbacks should not result in unnecessary activity in the terminal layer 2 functions, which could cause possible error reporting by the terminal management function to the user or his MSP. 5.2 Digital loopback mechanism definitions A digital loopback is a mechanism incorporated into a piece of equipment whereby a bidirectional communication path may be con- nected back upon itself so that some or all of the information con- tained in the bit stream sent on the transmit path is returned on the receive path. The loopback point is the location of the loopback. The loopback control point is the point which has the ability to directly control loopbacks and should be located as close as possible to the loopback point. The loopback control point may receive requests for loopback operation from several loopback requesting points. The loopback requesting point is the point which requests the loopback control point to operate loopbacks. Note 1 - The generation of the test pattern used over the loopback may or may not take place at the control point. Note 2 - Loopback requests should be subject to identifica- tion and authorization. Note 3 - Possible locations of loopback requesting points are: the network, or a telecommunications management network (TMN), or a maintenance service providers (MSP). The following three types of loopback mechanisms are defined: a) Complete loopback - a complete loopback is a physical layer [1] mechanism which operates on the full bit stream. At the loopback point, the received bit stream shall be transmitted back towards the transmitting station without modification. Note - The use of the term "complete loopback" is not related to implementation since such a loopback may be provided by means of active logic elements or controlled unbalance of hybrid transformers, etc. At the control point only the information chan- nels may be available. b) Partial loopback - partial loopback is a physi- cal layer [1] mechanism which operates on one or more specified channels multiplexed within the full bit stream. At the loopback point, the received bit stream associated with the specified channel(s) shall be transmitted back towards the transmitting sta- tion without modification. c) Logical loopback - a logical loopback acts selectively on certain information within a specified channel or channels and may result in some specified modification of the looped information. Logical at any layer 2 loopbacks may be defined to apply at any layer [Ref. 1], depending on the detailed mainte- nance procedures specified. For each of the above three types of loopback mechanisms, the loopback may be further categorized as either transparent or non-transparent. (See Figures 11/I.601 and 12/I.601.) i) A transparent loopback is one in which the sig- nal transmitted beyond the loopback point (the forward signal) when the loopback is activated, is the same as the received signal at the loopback point. Figure 11/I.601, p. ii) A non-transparent loopback is one in which the signal transmitted beyond the loopback point (the forward signal) when the loopback is activated, is not the same as the received signal at the loopback point. The forward signal may be a defined signal or unspecified. Figure 12/I.601, p. Note - Whether or not a transparent loopback is used, the loopback should not be affected by facilities connected beyond the point at which the loop is provided, e.g. by the presence of short circuits, open circuits or foreign voltages. 5.3 Loopback locations in the subscriber access and sub- scriber installation Figure 13/I.601 shows the numbering and location of loopbacks described in the I-Series of Recommendations. The characteristics and implementation status of these loop- backs are given in the appropriate I.600-Series Recommendation. Figure 13/I.601, p. Reference [1] CCITT Recommendation Reference model of open system interconnection for CCITT applications , Vol. VIII, Rec. X.200. Recommendation I.602 APPLICATION OF MAINTENANCE PRINCIPLES TO ISDN SUBSCRIBER INSTALLATIONS (Melbourne, 1988) 1 Scope of application This Recommendation presents the possible elementary functions for the maintenance of the subscriber installation. The functions are to be considered as optional, except when needed to meet specific network interface requirements found in Recommendations I.430 and I.431. These functions can be controlled by the local side (e.g. from the subscriber premises) and by a remote side [i.e. from an MSP (maintenance service provider), as described in Recommendation I.601]. It is the responsibility of the subscriber installation to ensure that only authorized MSPs are given access to the following functions. 2 Network configuration for maintenance activities Figure 1/I.602 is the basis for the general maintenance prin- ciples of the ISDN subscriber installation. Figure 1/I.602, p. 3 Automatic supervision 3.1 Continuous automatic supervision on layer 1 3.1.1 General This supervision may be realized by permanent automatic mechanisms located in the pieces of equipment of the subscriber installation (see definition in Figure 1/I.602). These automatic mechanisms are operational during the active period of the sub- scriber basic access. They are designed to detect malfunctioning of particular items, e.g. power supply, quality level of transmission, incoming signal, frame alignment. 3.1.2 Subscriber installation functions The following functions may be supervised: - monitoring of operation functions within the sub- scriber installation (e.g. power supply); - supervision of information related to or received from the digital transmission section. 3.2 Automatic supervision on layer 2 and layer 3 of the D-channel protocol This activity covers supervision of activities on layers 2 and 3 of the D-channel protocol. Automatic supervision on layers 2 and 3 may be made by self-acting mechanisms implemented in the sub- scriber installation. There are three categories of automatic supervision which may be performed by layer 2 and layer 3 of the D-channel protocol: - service provision incapability detection (e.g. detection of incapability of layer 2 to establish a data link con- nection); - protocol misoperation detection; - error monitoring (e.g. layer 2 CRC check pro- cedure can detect the occurrence of an errored frame). These events (defined in Recommendations I.440 and I.450) should be recorded. 4 Internal tests 4.1 Internal test of the TE1 and TA Some of the TEs/TAs may manage internal tests for all or parts of their functionalities. The internal tests may be activated either automatically by the TE and TAs or by a local command in the TE and TAs or by a remote request. Some of these tests are dependent on the terminal type. Such tests shall not affect the user-network interface, i.e. no test signals shall be transmitted across the interface when a test is in operation. The terminal equipment may have the ability to abort an inter- nal test sequence, for example, in case of an incoming call attempt. If this test has been requested by an MSP, the subscriber installation should report the discontinuance of the test to the requesting MSP. The result of an internal test procedure execution should be either passed | or failed , and in the latter case an additional diagnostic information may be given. 4.2 Internal test of the NT2 The subscriber should have facilities which can help to verify that the subscriber installation is not affected by a failure. Definitions of these procedures and functions require further study. The functionalities may be similar to the ones presented for the TE and TA in S 4.1. The following internal tests of the NT2 have been identified: 4.2.1 Continuity test The objective is to verify that the internal S interfaces of the NT2 can be activated. The mechanism which is implemented in the NT2 could be based on a normal activation of the layer 1 of the interfaces. The principle for such a test is the same as the one defined for the local exchange function (see Recommendation I.603, S 3.3). 4.2.2 S interface check using loopback 3 The loopbacks are shown in S 7. The results could be used for failure localization, particularly in the case where the NT2 func- tions are distributed. 4.2.3 Test call to the terminal equipment from the NT2 An NT2 may address one particular terminal equipment of the installation. Thus, it easily controls a test call. This procedure would allow the NT2 to verify the connection of the TE or TA to the installation and also to check layers 1, 2 and 3 operating condi- tions (e.g. response time supervision). The test call could be initiated by the SIME. The test call could be a normal call made for maintenance pur- poses. 5 Test call from the MSP Further study is required, especially concerning charging and authorization aspects. 6 Call to a test responder from the subscriber installation The MSP may provide test responders that are accessed via nor- mal call procedures. There may be test responders for various teleservices and bearer services. The selection of the service involved with the test call is made using the lower layer and higher layer compatibility informa- tion elements as defined for the normal call control procedures. 7 Loopbacks 7.1 Locations of loopbacks associated with the subscriber installation Loopback locations for failure localization and verification are shown in Figure 2/I.602. Figure 2/I.602, p. 7.2 Loopback characteristics for basic rate subscriber installations Characteristics of loopbacks are given in Table 1/I.602. 7.3 Loopback characteristics for primary rate subscriber installations Characteristics of loopbacks are given in Table 2/I.602. 8 Status request A piece of equipment, i.e. NT2, TE, TA may have different states regarding its operation and/or maintenance conditions, e.g. in service, out of service, under tests, etc. These states may be defined in the future. An MSP may request a SIME in the subscriber installation to indicate the current status of a particular terminal and/or of the connected terminal equipment. 9 Failure report to MSP A subscriber installation which has detected that a TE is in a failed condition (e.g. when it is detected that a threshold has been exceeded) may have the ability to inform (via the ISDN), immediately, the MSP responsible for the concerned TE. After reception of such an information, the MSP may initiate a more precise failure localization. 10 Interrogation of parameter values and counters A MSP may have the ability to access basic information, such as instantaneous value of a parameter or counter. H.T. [T1.602] TABLE 1/I.602 Characteristics of loopback mechanisms for basic rate subscriber installations ____________________________________________________________________________________________________________________________________________________________________________________________________________ Loopback Location | Channel(s) looped back| Loopback type| Control point| Control mechanism | Application| Implementation ____________________________________________________________________________________________________________________________________________________________________________________________________________ 3 { See Appendix I of Recommendation I.430 } ____________________________________________________________________________________________________________________________________________________________________________________________________________ 4 { See Appendix I of Recommendation I.430 } ____________________________________________________________________________________________________________________________________________________________________________________________________________ 5 { Inside the TA, as near as possible to the R interface } B 1, B 2 { Partial, partial transparent or non-transparent } { NT2, remote maintenance server or remote user } Message from an MSP (Note 1) | | | | | | | | | Failure localization | | | | | | | | | Optional | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ____________________________________________________________________________________________________________________________________________________________________________________________________________ A { See Appendix I of Recommendation I.430 } ____________________________________________________________________________________________________________________________________________________________________________________________________________ B 1 { See Appendix I of Recommendation I.430 } ____________________________________________________________________________________________________________________________________________________________________________________________________________ B 2 { See Appendix I of Recommendation I.430 } ____________________________________________________________________________________________________________________________________________________________________________________________________________ C See Appendix I of Recommendation I.430 ____________________________________________________________________________________________________________________________________________________________________________________________________________ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Note 1 - This loop might also be controlled by signalling in the B-channel as specified in the X- and V-Series Recommendations. Note 2 - Activation/deactivation of loopback 3 may be initiated by request from an MSP (by management messages carried via layer 3 in the D-channel). However, the generalization of the test pattern over the loopback would be by the NT2. Note 3 - From a technical viewpoint it is desirable that loopback 3 can always be implemented (although not mandatory) and, there- fore, the design of protocols for loopback control should include the operation of loopback 3. Note 4 - Whether the loopback is transparent or non-transparent is an implementor's decision. Whether or not a transparent loopback is used, the loopback should not be affected by configurations and conditions beyond the point at which the loopback is provided, e.g. by the presence of short circuits, open circuits or foreign vol- tages. Tableau 1/I.602 [T1.602], p.16 BLANC H.T. [T2.602] TABLE 2/I.602 Characteristics of optional loopbacks for primary rate access ______________________________________________________________________________________________________________________________________________________________ Loopback Location Channel(s) looped Loopback type Control point Control mechanism Implementation ______________________________________________________________________________________________________________________________________________________________ C Inside the NT1 { 23 | + D or 24 | channels (Note 5) 30 | + D or 31 | channels (Note 6) } { Complete, non-transparent (Note 4) } TE, NT2 Layer 1 (Note 1) Optional ______________________________________________________________________________________________________________________________________________________________ B 1 { Inside the NT2, at subscriber side (Note 2) } B, H 0, H 1 (Note 3) { Partial, transparent or non-transparent } TE, NT2 Layer 1 or Layer 3 Optional ______________________________________________________________________________________________________________________________________________________________ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Tableau 2/I.602 [T2.602], p.17 Recommendation I.603 APPLICATION OF MAINTENANCE PRINCIPLES TO ISDN | BASIC ACCESSES (Melbourne, 1988) 1 Scope of application This Recommendation covers the maintenance of that part of the ISDN subscriber basic access which is controlled by the network. The Recommendation follows the maintenance principles as defined in Recommendation M.20 and applies to the basic access directly con- nected to the local exchange without any multiplexer or concentra- tor. The principle of controlled maintenance (as defined in Recommendation M.20) is applied for maintaining the subscriber basic access Controlled maintenance is a method of sustaining a desired technical performance by the systematic application of supervision, testing and performance sampling in order to minimize preventive maintenance and to reduce corrective maintenance 2 Network configuration for maintenance activities Figure 1/I.603 is the basis for the general maintenance prin- ciples of the subscriber access. Figure 1/I.603, p. 3 Failure detection 3.1 General When the digital section (as seen by the exchange) of the ISDN subscriber basic access is in the active state, automatic supervi- sion of the correct functioning of the layer 1 up to the NT1 is operating. This supervision is called continuous automatic supervi- sion on layer 1. When the ISDN subscriber basic access is in the active state (as seen by the exchange), automatic supervision of the correct functioning of the D-channel layers 2 and 3 is also operating. This supervision is called automatic supervision on layers 2 and 3 of the D-channel protocol. When the ISDN subscriber basic access is not in an active state (as seen by the exchange), the subscriber access may be periodically tested by the exchange. This is called the continuity test. 3.2 Automatic supervision 3.2.1 Continuous automatic supervision of layer 1 3.2.1.1 Objectives This supervision is realized by permanent automatic mechanisms located in the pieces of equipment of the subscriber basic access (see definition in Figure 1/I.601). These automatic mechanisms are continuously operational during the active period of the subscriber basic access. They are designed to detect malfunctioning of partic- ular items, e.g. power supply, quality level of transmission, incoming signal, frame alignment. The continuous automatic supervision mechanism should be in operation even if there is no subscriber installation connected to the T reference point. For this, it must be possible for the digi- tal section to be placed in a state where the automatic supervision can be performed continuously although the T reference point may not be capable of full activation according to Recommendation I.430. 3.2.1.2 Digital section functions Functions, which are allocated to the digital section are listed below: - detection of loss of frame alignment within the digital system; - detection of loss of frame alignment on the user-network interface as defined in Recommendation I.430; - supervision of the power feeding; - transmission performance monitoring. Transmission performance monitoring mechanisms are for further study. Note - In case the digital section has its own failure detec- tion mechanism, failure indication signals may be sent to, and received by, the local exchange termination. Alternatively, the detection mechanisms are included in the exchange termination. 3.2.1.3 Exchange termination functions Functions which are allocated to the exchange termination are listed below: - supervision of information related, to or received from, the digital section; - transmission performance evaluation. The transmission performance evaluation is based on a per- manent processing of the elementary results presented by the con- tinuous error monitoring of the digital section. The result of the processing will give information on at least one transmission quality level. Definition of quality levels and evaluation of timing condi- tions are out of the scope of this Recommendation. 3.2.2 Automatic supervision of layers 2 and 3 of the D-channel protocol This activity covers supervision of activities of layers 2 and 3 of the D-channel protocol. Automatic supervision on layers 2 and 3 will be made by self-acting mechanisms implemented in the network (e.g. in the ET). There are three categories of automatic supervision which may be performed by layers 2 and 3 of the D-channel protocols: - service provision incapability detection (e.g. incapability of layer 2 to establish a data link connection); - protocol misoperation detection (e.g. at layer 2, detection of dual TE1 assignment); - error monitoring (e.g. the layer 2 CRC check pro- cedure can detect the occurrence of an errored frame). These events (defined in Recommendations I.440 and I.450) should be recorded. 3.3 Continuity test 3.3.1 General When the subscriber basic access is not active (normal case and/or unknown failure condition case) or has not been recently activated, a continuity test may be applied in order to detect a possible failure condition. The test should be a simple go/no go test. Note - The periodicity of testing on each access, if such test is performed on a periodical basis, shall be compatible with the failure detection time value (i.e. the time between failure occurrence and failure detection). 3.3.2 Control of the continuity test The continuity test is based on a normal activation of layer 1. If the activation is confirmed by a positive result of the con- tinuity test, the subscriber basic access is declared to be in good order for operation. No report is given to the SAMC. If the activation is not confirmed by a positive result of the continuity test, or if a failure condition is detected during the process, then the exchange will automatically enter into the failure localization process, and will report to SAMC. The result of the continuity test should be judged to be posi- tive if the NT1 has the capability to signal that there is no failure on the subscriber basic access. 4 System protection When a failure is detected which has an adverse effect on the availability and/or functionality of network equipment, the access is considered "out of service due to failure" and call attempts may be rejected to prevent further damage or to remove the adverse effect (see Recommendation I.601). In this condition, removal of power from the line may be required. 5 Failure information A failure confirmed by the exchange and related to a sub- scriber basic access and/or subscriber installation shall be reported to the SAMC in a message. The message could be presented after an automatic identifica- tion of a failed maintenance entity (ME) has been made (see S 6). 6 Failure localization 6.1 Automatic confirmation of failure within the subscriber basic access An automatic test procedure to confirm a detected possible failure condition within the subscriber basic access should be pro- vided. It should be initiated by an automatic reaction of the exchange, following abnormal conditions which have been detected by the processes presented above, i.e. continuous supervision, super- vision on layer 2 and layer 3, continuity test. The process is based on loopback techniques which allows the exchange to verify that there is no failure within the network and that the failure condition, if any, is not of a temporary nature. If failures are detected in the D-channel layers 2 and 3 com- munication, clear differentiation between failures within the sub- scriber installation and within the subscriber access should be possible. 6.2 Failed maintenance entity identification 6.2.1 General Such a function has to be made on demand or automatically fol- lowing the indication of failed conditions by the network or fol- lowing a subscriber complaint. It is necessary, before undertaking the appropriate action, to identify (i.e., to know) the maintenance entity affected by the failure. 6.2.2 Objectives The main objective of this function, which is controlled by the SAMC is to indicate to the SAMC, if the failure is: - within the ET and/or the LT; - within the line and/or the NT1, the localization specified between NT1 or line if possible; - within the subscriber installation. 6.3 Loopbacks 6.3.1 Locations of loopbacks within the subscriber basic access Loopback locations for failure localization and verification controlled by the local exchange are shown in Figure 2/I.603. Note - Other loopbacks might be necessary. Figure 2/I.603, p. 6.3.2 Characteristics of loopbacks within the subscriber access The characteristics of loopbacks within the subscriber access are given in Table 1/I.603. Other loopbacks used in support of maintaining the subscriber installation from within the subscriber installation are specified in Recommendation I.602. 6.3.3 Use of loopbacks If the loopback 2 is established, the network part of the sub- scriber basic access is considered to be correctly functioning. No report is given to the SAMC. If loopback 2 cannot be established and/or if faulty network conditions are detected, the exchange: - either goes further in the identification of the failed maintenance entity (see S 6.2) and reports to the SAMC later once the failed maintenance entity has been identified; or - informs the SAMC that the network is affected by a failure, in the case where the non-automatic identification pro- cess of the failed maintenance entity is implemented. 6.4 Command controlled tests and measurements For more precise failure localization, it would be necessary to obtain line parameter measurements indicating that the value of an electrical parameter is within a certain margin or showing the precise value of the parameter. For further study. H.T. [T1.603] TABLE 1/I.603 Characteristics of loopbacks within the subscriber access _________________________________________________________________________________________________________________________________________________________________________________________ Loopback Location Channel(s) looped back Loopback type Control point Control mechanism Application Implementation _________________________________________________________________________________________________________________________________________________________________________________________ 1 { In LT, as near as possible to the line, towards the ET } { Complete loopback (2 | + D at least) } { Complete, transparent or non-transparent (Note 1) } { Under control of local exchange } Layer 1 signals { Failure localization + verification } Recommended _________________________________________________________________________________________________________________________________________________________________________________________ 1A In the regenerator Complete loopback { Complete, transparent or non-transparent (Note 1) } { Under control of local exchange } Layer 1 signals Failure localization Optional _________________________________________________________________________________________________________________________________________________________________________________________ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Tableau 1/I.603 [T1.603], p.20 7 Logistic delay time See Recommendation M.20. 8 Failure correction See Recommendation M.20. 9 Verification The verification that the failure has been corrected is made on demand of the staff. Tests described in SS 3, 6 and 11 may be used. 10 Restoration After the failure has been rectified and the correct operation of the access verified (during which time the access will be in either the "out of service due to failure" or "degraded transmission" conditions), the access shall be returned to the "in service" condition. The mechanism/procedure for returning the access to the "in service" condition (e.g. automatic or manual) is not a subject of this Recommendation (see Recommendation I.601). 11 Overall performance measurements Overall performance measurements could, from the point of view of the exchange: - concern a limited number of subscriber accesses at the same time; - be made only on demand. These tests and/or measurements shall not influence the condi- tions of the subscriber installation for incoming and outgoing calls. This gives the advantage of enabling measurement of the per- formance independently of the activity in the different channels of the subscriber basic access and also over a long period of time. For the performance evaluation of a digital transmission sys- tem (over a long period of time, with permanent activation of the subscriber basic access) the network Administration shall have arrangements for the calculation of the performance levels accord- ing to Recommendation G.821. Recommendation I.604 APPLICATION OF MAINTENANCE PRINCIPLES TO ISDN | PRIMARY RATE ACCESSES (Melbourne, 1988) 1 Scope of application This Recommendation covers the maintenance of that part of the ISDN subscriber primary rate access which is controlled by the net- work. The Recommendation follows the maintenance principles as defined in Recommendation M.20 and applies to the primary rate access connected to the local exchange. The scope of this Recommendation is to describe the minimum functions required to maintain the subscriber primary rate access applicable to any primary rate access The principle of controlled maintenance (as defined in Recommendation M.20) is applied for maintaining the subscriber pri- mary rate access. Controlled maintenance is a method of sustaining a desired technical performance by the systematic application of supervision, testing and performance sampling in order to minimize preventive maintenance and to reduce corrective maintenance. 2 Network configuration for maintenance activities Figure 1/I.604 gives the basis for the general maintenance principles of the subscriber access, in accordance with Figure 2/I.601 which defines the ISDN subscriber access. 3 Failure detection 3.1 General Unlike the ISDN basic access, the digital section of the ISDN subscriber primary rate access is never deactivated (as seen by the exchange); continuous automatic supervision of the correct func- tioning of layer 1 up to NT2 is always operating. This supervision is called continuous automatic supervision of layer 1. Automatic supervision of the correct functioning of the D-channel layers 2 and 3 is also operating. This supervision is called automatic supervision of layers 2 and 3 of the D-channel protocol. 3.2 Automatic supervision 3.2.1 Objectives This supervision is realized by continuous automatic mechan- isms located in various pieces of equipment of the ISDN primary rate access. Figure 1/I.604, p.21 Figure 2/I.604, p.22 These automatic mechanisms are never deactivated and are gen- erally based on the operation of CRC information which is given by the CRC procedure associated with the link between the customer and the local exchange. These mechanisms are complemented by the detection of malfunctioning of particular items, e.g. loss of power supply, loss of incoming signal, loss of frame alignment. Minimum functions which could be allocated to the subscriber installation and exchange termination are listed below. Further details of these functions and those of the digital section are found in Annex A, where various options concerning the handling of CRC functions are described. 3.2.2 NT2 termination functions The functions allocated to the NT2 are listed below: - detection of loss of incoming signal; - detection of loss of frame alignment; - detection of AIS and RAI; - generation of frame signal; - CRC code generation; - RAI generation; - CRC monitoring of the incoming signal (network-to-user); - detection of CRC error information (user-to-network); - CRC error reporting to the network (optional in 1544 kbit/s). 3.2.3 Exchange termination (ET) functions The functions which are allocated to the ET are listed below: - detection of loss of incoming signal; - detection of loss of frame alignment; - detection of AIS, generation of AIS (optional in 1544 kbit/s); - detection of RAI; - generation of frame signal; - CRC code generation; - RAI generation; - CRC monitoring of the incoming signal (user-to-network); - detection of the CRC error information (network-to-user); - CRC error reporting to the user (optional in 1544 kbit/s). The exchange termination may optionally detect the CRC error information reported by the user side. The RAI is generated towards NT2 upon detection by the ET of a fault in the input direction (loss of signal, loss of frame align- ment, detection of AIS). The exchange termination has the option to evaluate the transmission performance based on the statistical treatment of the local and remote CRC error reports and on the fault indications. The transmission performance evaluation is based on a per- manent processing of the elementary results presented by the con- tinuous error monitoring of the digital transmission link. The result of this processing will give information on the transmission quality level (normal quality, degraded quality, unacceptable qual- ity) and on the unavailability of the access (see S 5.6). 3.3 Automatic supervision of layers 2 and 3 of the D-channel protocol This covers supervision of activities of layers 2 and 3 of the D-channel protocol. Automatic supervision of layers 2 and 3 will be made by self-acting mechanisms implemented in the network (e.g. in the ET). There are three categories of automatic supervision which may be performed by layer 2 and layer 3 of the D-channel protocols: - service provision incapability detection (e.g. incapability of layer 2 to establish a data link connection); - protocol misoperation detection; - error monitoring (e.g. the layer 2 CRC check pro- cedure can detect the occurrence of an errored frame). These events (defined in Recommendations I.440 and I.450) should be recorded. 4 System protection When a confirmed fault is detected which has an adverse effect on the availability and/or functionality of network equipment, the access is considered "out of service due to failure" and call attempts may be rejected to prevent further damage or to remove the adverse effect (see Recommendation I.601). 5 Failure indication 5.1 Default indication signals a) AIS - as defined in Recommendation I.431. b) RAI - as defined in Recommendation I.431. 5.2 State tables State tables associated with failures in the primary rate access are given in Recommendation I.431. 5.3 Generation of defect indication signals by the NT2 The NT2 functions are listed in S 3.2.2. The generation of RAI toward the ET is used to indicate the loss of incoming layer 1 capability. 5.4 Generation of defect indication signals by the sub- scriber access The digital link functions are listed in Annex A for each option within the access. 5.5 Generation of defect indication signals by the exchange termination The exchange termination functions are listed in S 3.2.3. The generation of RAI toward the NT1 is used to indicate the loss of incoming layer 1 capability. 5.6 Transmission quality monitoring by the exchange 5.6.1 Error performance parameters According to Recommendations M.20 and M.550, the anomaly and defect indications are treated on a statistical basis. 5.6.2 Error performance evaluations The access is considered by the local exchange to be "unavail- able", "unacceptable" or "degraded" according to Recommendation M.550. 5.7 Failure information from the exchange A defect confirmed by the exchange and related to a subscriber access and/or a subscriber installation shall be reported to the SAMC in a message. The detection of a degraded or unacceptable quality level or of the unavailability of the access by the exchange shall be reported to the SAMC in a message. The message could be presented after an automatic identifica- tion of a failed Maintenance Entity (ME) has been made (see S 6). 5.8 Failure information to the subscriber installation The detection of a degraded or unacceptable quality level by the exchange may be reported to the user by the transmission of a state indication. 6 Failure localization 6.1 Automatic confirmation of failure within the subscriber primary rate access An automatic test procedure to confirm a detected possible failure condition within the subscriber access should be provided. It shall be initiated by an automatic reaction of the exchange, following abnormal conditions which have been detected by the processes presented above, i.e. continuous supervision of layer 1, supervision of layers 2 and 3 of the D-channel protocol. If failures are detected in the D-channel layers 2 and 3 com- munication, clear differentiation between failures within the sub- scriber installation and within the subscriber access should be possible. 6.2 Failed maintenance entity identification 6.2.1 General Such a function has to be made on demand or automatically fol- lowing the indication of failure conditions by the network or fol- lowing a subscriber complaint. It is necessary, before undertaking the appropriate action, to identify (i.e. to know) the maintenance entity affected by the failure. 6.2.2 Objectives The main objective of this function, which is controlled by the SAMC, is to indicate to the SAMC whether the failure is: - within the ET; - within the digital transmission link (NT1 to LT); - within the subscriber installation. 6.3 Loopbacks for maintenance of the subscriber primary rate access 6.3.1 Location of loopbacks Possible loopback locations for failure localization and verification controlled by the SAMC are shown in Figure 3/I.604. Figure 3/I.604, p. 6.3.2 Characteristics of loopbacks The characteristics of the loopbacks are given in Table 1/I.604. H.T. [T1.604] TABLE 1/I.604 Characteristics of the loopbacks for primary rate subscriber access __________________________________________________________________________________________________________________________________________________________________________________________________ Loopback Location Channel(s) looped back Loopback type| Control point | Control mechanism| Application| Implementation __________________________________________________________________________________________________________________________________________________________________________________________________ 0 { In ET, as close as possible to V 3 } Part of ET self-test Optional __________________________________________________________________________________________________________________________________________________________________________________________________ 1 { In LT, as near as possible to the line, towards LT } Complete loopback Complete FS Layer 1 signals (Note 1) { Failure localization and verification } Optional __________________________________________________________________________________________________________________________________________________________________________________________________ 1A { In the regenerator, towards V 3 } Complete loopback Complete FS Layer 1 signals (Note 1) { Failure localization and verification } Optional __________________________________________________________________________________________________________________________________________________________________________________________________ 2 { In NT1, as near as possible to T, towards ET (Note 2) } Complete loopback Complete FS Layer 1 signals (Note 2) { Failure localization and verification } Optional __________________________________________________________________________________________________________________________________________________________________________________________________ 2 1 In NT1 Per channel FS FS FS FS FS FS __________________________________________________________________________________________________________________________________________________________________________________________________ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | FS Further study required. Note 1 - These layer 1 signals may not be in the frame signals. They may be line signals. Note 2 - In the case of using existing digital systems, a manual loopback may replace loopback 2. This loopback is implemented between NT2 and NT1 and is controlled by the user on demand of the network staff. Table 1/I.604 [T1.604], p. 6.4 Failure localization mechanisms See Figure 4/I.604. If a subscriber access failure is confirmed by the exchange and if the failure is not located in the exchange, then: - either the loopback 2 can be established under control of the exchange, in which case: i) if the loopback 2 is successful, the exchange considers the subscriber access to be functioning correctly; ii) if the loopback 2 is unsuccessful, the exchange reports to the OAMC; - or, if the loopback 2 cannot be established under control of the exchange, then the exchange informs the OAMC that the digital link is affected by a failure. In the case of a failed maintenance entity being detected, an automatic localization process is initiated. This process could localize the failure within the digital link by the use of loop- backs or subscriber access fault information. Figure 4/I.604, p. 6.4.1 Initial failure localization performed by the ET and/or NT2 (TE) The initial failure localization capability depends on the CRC option used in the network. For further information about different CRC options which may be applied in the access, see Annex A. In general, CRC error information and fault indication signals may be used by either the NT2 or ET to deduce the location of some failures in operational conditions. Failure localization in the case of option 2 refers to the capability to distinguish between a failure occurring either: - between NT2 and NT1; or - between NT1 and ET. Failure localization in the case of option 3 refers to the capability to distinguish between a failure occurring either: - between NT2 and NT1; or - between NT1 and LT; or - between LT and ET. Failure localization in the case of option 4 refers to the capability to distinguish between a failure occurring either: - between NT2 and NT1; or - between NT1 and ET. This localization may be achieved by either the NT2 or the ET obtaining additional information from the NT1. The means to obtain this information is for further study. 6.4.1.1 Failure localization performed by the NT2 In options 2 and 3 the combination of CRC error information and RAI received from the interface allows the NT2 to localize a fault in the upstream direction of the access as follows: - receipt of RAI by the NT2 with no, or a very small number of, reported CRC errors indicates a failure inside the network; or - receipt of RAI by the NT2 with constantly, or a very high number of, reported CRC errors indicates a fault between NT2 and NT1. This capability is not provided by option 1. Concerning the downstream direction of the access, failure localization can be made in options 1, 2 and 3 by distinguishing between the following conditions at the receiving side of the NT2: - AIS, indicating a fault inside the network; or - loss of incoming signal or loss of frame align- ment, indicating a failure between NT1 and NT2. 6.4.1.2 Failure localization performed by the ET The failure localization capability of the ET depends on the CRC option used in the access, on the fault detection and reporting capability of the equipment installed and the provision of optional loopbacks as given in Table 1/I.604. For further information about different CRC options applied in the access, see Annex A. 6.4.2 Further failure localization For more precise localization, further techniques may be necessary, e.g. line parameter measurements. This is for further study. 6.4.3 Additional signals The use and definition of additional signals for transmission direction indication, extension of remote CRC reporting mechanisms and specific equipment signals is for further study. 7 Logistic delay time See Recommendation M.20. 8 Failure connection See Recommendation M.20. 9 Verification The verification that the failure has been corrected is per- formed on demand of the staff. Tests described in SS 3, 6 and 11 may be used. 10 Restoration After a failure has been rectified and the correct operation of the access verified (during which time the access will be in either the "out of service due to failure" or "degraded transmis- sion" conditions), the access shall be returned to the "in service" condition. The mechanism/procedure for returning the access to the "in service" condition (e.g. automatic or manual) is not a subject of this Recommendation. 11 Overall performance measurements Overall performance measurements could, from the point of view of the exchange: - concern a limited number of subscriber accesses at the same time; - be made only on demand. These tests and/or measurements shall not influence the condi- tions of the subscriber installation for incoming or outgoing calls. This gives the advantage of enabling measurement of the per- formance independently of the activity in the different channels of the subscriber access and also over a long period of time. For the performance evaluation of a digital transmission sys- tem (over a long period of time) the Administration network shall have arrangements for calculating the performance levels according to Recommendation G.821. ANNEX A (to Recommendation I.604) Subscriber access option A.1 Digital link without CRC processing (option 1) A.1.1 Definition The transmission equipment used between interfaces at the T and V reference points (multiplexers, NT1-LT) could be existing equipment which have standard functions of supervision and detec- tion of defects and faults. In this case, the digital link is said to be "without CRC pro- cessing": the CRC procedure is between the ET and NT2 (see Figure A-1/I.604). Figure A-1/I.604, p. A.1.2 Digital link functions Functions allocated to the digital link are listed below: - detection of loss of incoming signal on either side and inside the transmission section, and generation of AIS "downstream"; - detection of AIS inside the transmission section and generation of AIS "downstream"; - detection of defects and anomalies in the digital link. A.1.3 NT2 functions Functions allocated to the NT2 are given in S 3.2.2. A.2 Digital link with CRC processing in the NT1 (option 2) A.2.1 Definition The transmission equipment used between interfaces at the T and V reference points could be new equipment with CRC processing in the NT1 (see Figure A-2/I.604). In this case, the digital link is said to be with "CRC processing in the NT1". Figure A-2/I.604, p. A.2.2 Digital link functions Functions allocated to the digital link are listed below: - detection of loss of signal at either side of the NT1 or inside the transmission section; - detection of loss of frame alignment at either side of the NT1; - generation of AIS downstream in the direction to the user; - supervision of power supply (optional); - CRC generation towards the user and towards the ET; - CRC monitoring at both sides of the NT1 and detection of CRC blocks received with error; - when a block with CRC error is received from NT2, transmission of CRC error information towards NT2 (Note); - when a block with CRC error is received from ET, transmission of CRC error information towards ET; - when a block with CRC error is received from ET, transmission of CRC error information towards NT2 (optional); - detection of defect and anomaly in the digital link. Note - To fulfill the requirement of failure localization, the NT1 has to report the CRC error information toward the NT2 even when loss of frame alignment has occurred. This is different from the procedure described in Recommendation G.706. A.2.3 NT2 functions Functions allocated to the NT2 are given in S 3.2.2. A.3 Digital link with CRC processing in the LT and NT1 (option 3) A.3.1 Definition The transmission equipment used between interfaces at the T and V reference points may be new equipment with CRC processing, treatment and reporting of the results of that processing in the NT1 and LT (see Figure A-3/I.604). In this case the digital link is said to be with Figure A-3/I.604). In this case the digital link is said to be with "CRC processing and reporting in the NT1 and the LT". Figure A-3/I.604, p. A.3.2 LT functions Functions allocated to the LT are listed below: - detection of loss of signal at either side of the LT; - detection of loss of frame alignment at either side of the LT; - detection of RAI at either side of the LT; - generation of AIS downstream in the direction of the NT1; - supervision of power supply (optional); - generation of CRC towards NT1 and ET; - monitoring of CRC from both sides of the LT and detection of CRC blocks received with error; - when a block with CRC error is received from NT1, transmission of CRC error information toward NT1; - when a block with CRC error is received from ET, transmission of CRC error information toward ET; - when a block with CRC error is received from ET, transmission of CRC error information toward NT1 (optional); - supervision of the numbers of CRC blocks received with error, from ET and from NT1 separately; - checking thresholds corresponding to errored seconds, severely errored seconds and degraded minutes; - reporting errored seconds, severely errored seconds and degraded minutes. A.3.3 NT1 functions Functions allocated to the NT1 are listed below: - detection of loss of signal at either side of the NT1; - detection of loss of frame alignment at either side of the NT1; - detection of RAI at either side of the NT1; - generation of AIS downstream in the direction of the NT2; - supervision of power supply (optional); - generation of CRC towards NT2 and LT; - monitoring of CRC from both sides of the NT1 and detection of CRC blocks received with error; - when a block with CRC error is received from NT2, transmission of CRC error information toward NT2; - when a block with CRC error is received from LT, transmission of CRC error information toward LT; - when a block with CRC error is received from LT, transmission of CRC error information toward NT2 (optional); - supervision of the numbers of CRC blocks received with error, from LT and NT2 separately; - checking thresholds corresponding to errored seconds, severely errored seconds and degraded minutes; - reporting errored seconds, severely errored seconds and degraded minutes. A.4 Digital link with CRC monitoring in the NT1 (option 4) A.4.1 Definition The transmission equipment used between interfaces at the T and V reference points could be new equipment with CRC monitoring in the NT1 (see Figure A-4/I.604). In this case, the digital link is said to be "with CRC monitoring in the NT1". Figure A-4/I.604, p. A.4.2 NT1 functions Functions allocated to the NT1 are listed below: - detection of loss of signal or loss of frame alignment at either side; - generation of AIS toward either side when signal or frame alignment on opposite side is lost; - monitor CRC from both directions; - store information derived from the CRC monitor- ing. The information derived from the CRC monitoring and stored in the NT1 may be retrieved from either the NT2 or ET. The means of this retrieval is for further study. A.4.3 NT2 function In addition to the functions described in S 3.2.2, NT2s may also, optionally, have the capability of retrieving from the NT1 the stored information derived from CRC monitoring. A.4.4 ET function In addition to the functions described in S 3.2.3, ETs may also, optionally, have the capability of retrieving from the NT1 the stored information derived from CRC monitoring. Recommendation I.605 APPLICATION OF MAINTENANCE PRINCIPLES TO STATIC MULTIPLEXED ISDN BASIC ACCESSES (Melbourne, 1988) 1 Scope of application This Recommendation covers the maintenance of the static mul- tiplexed basic rate access, controlled by the network, and describes the operations and maintenance aspects of the V4 interface The V4interface is defined in Recommendation Q.512. The specification of the operations and maintenance aspects of the V4 interface is the subject of this Recommendation. This Recommendation follows the maintenance principles as defined in Recommendation M.20 and applies to the basic rate access connected to the exchange via a multiplexer. The principle of controlled maintenance is applied for main- taining the static multiplexed basic rate access. Controlled maintenance is a method of sustaining a desired technical performance by the systematic application of supervision, testing and performance sampling in order to minimize preventive maintenance and to reduce corrective maintenance. 2 Network configuration for maintenance activities Figure 1/I.605 shows the general reference configuration of the multiplexed basic rate access, connected via a digital link to the Exchange Termination (ET). Figure 1/I.605, p. 3 Relationship to the maintenance of the basic rate access The same principles as given in Recommendation I.603 for the ISDN basic rate accesses directly connected to the local exchange, should be applied. Therefore, the NT1 and LT for the basic rate accesses connected via a static basic access multiplexer to the local exchange must have the same functions as NT1 and LT for the basic rate accesses connected directly to the local exchange. (The loopback mechanism must be implemented according to Recommendation I.603.) In order to support these principles, operation and maintenance information has to be exchanged between the digital section for the ISDN basic rate access and the exchange termination (ET). This information is conveyed in the CV1-channel , which is defined in Recommendation Q.512. This CV1-channel is shown in Figure 2/I.605. Figure 2/I.605, p. The functions which are allocated within this CV1-channel are defined in Recommendation G.960 on the digital section for the ISDN basic rate access. These functions can be classified according to: - activation/deactivation procedures; - error and status reporting to the ET; - failure localization within the digital section for the ISDN basic rate access; - conveyance of control information from the ET to the digital section of the ISDN basic rate access. 4 Maintenance of the digital link and basic access multi- plexer 4.1 Failure detection Unlike the ISDN basic access, the digital link and basic access multiplexer are always in the active state (as seen by the exchange). Continuous automatic supervision, supervising the correct functioning of layer 1 up to the basic access multiplexer, is operating. This supervision is called continuous automatic supervision on layer 1 4.1.1 Functions applied to the ET The functions which are allocated to the ET are listed below: - detection of loss of incoming signal; - detection of loss of frame alignment; - detection of AIS; - detection of RAI; - generation of the frame signal; - CRC code generation; - RAI generation; - CRC monitoring of the incoming signal (basic access multiplexer to the ET); - detection of CRC error information; - CRC error reporting (ET to the basic access mul- tiplexer) (optional); - AIS generation. The implementation of these functions should be the same as for the ET in the ISDN primary rate access, as defined in Recommendation I.604 for the exchange termination (ET). 4.1.2 Functions applied to the static basic access multi- plexer The functions which are allocated to the basic access multi- plexer are listed below: - detection of loss of incoming signal; - detection of loss of frame alignment; - detection of AIS; - detection of RAI; - generation of the frame signal; - CRC code generation; - CRC monitoring of the incoming signal (network to basic access multiplexer) and detection of CRC error information (if provided from the ET); - CRC error reporting (basic access multiplexer to the ET). The implementation of these functions should be the same as for the NT2 in the primary rate access, as defined in Recommendation I.604. In addition, the following functions are allocated to the basic access multiplexer: - sending of AIS on the V4interface, in case of a defect in the basic access multiplexer between the V1 reference point and the V4 interface of the multiplexer; - signalling to all the basic rate accesses the condition "out of service due to failure", in the case of a defect occurring in the basic access multiplexer, between the V1 reference point and the V4 interface of the multiplexer, and in the digital link. 4.1.3 Functions allocated to the digital links The functions, which are allocated to the digital links are: - detection of loss of incoming signal on either end and within the digital link; - generation and transmission of AIS within the digital link. 4.2 System protection When a defect is detected in the digital link or basic access multiplexer, which has an adverse effect on the availability and/or functionality of all the ISDN basic rate accesses, all the ISDN basic rate accesses connected via this digital link and basic access multiplexer are considered to be "out of service due to failure" and call attempts may be rejected. When a defect is detected in the digital link or basic access multiplexer, which has an adverse efect on the availability and/or functionality of only one basic rate access, then this particular basic access is considered to be "out of service due to failure" and call attempts may be rejected. 4.3 Failure information When a defect is detected in the basic access multiplexer or digital links, this should be reported to the SAMC by a message. 4.4 Failure localization When a defect is detected in the digital link, additional information for failure localization may be required from other network management entities. 4.5 Logistic delay time See Recommendation M.20. 4.6 Failure correction See Recommendation M.20. 4.7 Verification The verification that the failure has been corrected is per- formed on demand of the SAMC. 4.8 Restoration After a failure has been rectified and the correct operation of all the accesses verified (during which time the accesses will be in either the "out of service due to failure" or "degraded transmission" conditions), the accesses shall be returned to the "in service" condition. The mechanism/procedure for returning the accesses to the "in service" condition (e.g. automatic or manual) is not a subject of this Recommendation. 4.9 Overall performance measurements See Recommendation I.603 for the performance related to the digital section of the basic rate access, and Recommendation I.604 for the V4digital section. BLANC