Accessing performance data – Verilink Red Zone Encryption (REMS) (880-502423-001) Product Manual User Manual

Page 28

Advertising
background image

Theory of operation

3-2

Red Zone Encryption Management System (REMS) User Manual

Accessing
performance data

Historically, network performance monitoring, network alarms, and fault
isolation of an encrypted ESF-framed T1 signal were only accessible
from the network connected ESF CSU in the Black Zone. Network
performance information could not be passed through the encryptor
because either:

The framing and performance information was removed prior to
encryption, or

all information was encrypted, rendering the network framing and
performance information unidentifiable and useless at the secured
communication center (Red Zone).

In this situation, the secured communication center in the Red Zone has
no means of rapidly identifying whether T1 service in the Black Zone is
deteriorating or failing. Isolating local hardware problems from network
service problems is difficult without ESF CSU access. Resolution has
required dispatching a technician to the ESF CSU site to evaluate the
performance data. Often the site is unattended and located miles from the
communication center, causing logistics problems for the operations staff.
Typically, resolution requires considerable communications center
downtime.

Verilink’s REMS
solution to
encrypted T1
transmission

Verilink’s Access System 2000 Red Zone Encryption Management
System provides very useful solution for full bandwidth operation and
network performance monitoring from the secured Red Zone.

Using a proprietary, patented Verilink technique, the REMS allows fully
framed T1 signals to be transmitted through an encryption system while
maintaining a standard Extended Superframe (ESF) framed signal at the
carrier network interface.

The Access System 2000 REMS also allows critical network
management information (such as ESF performance data and alarms)
collected from the near- and far-end REMS Black systems to be delivered
through the encryptor to Verilink’s Access Manager 2000, located in the
Red Zone side of the encryptor. This technique is accomplished without
“wrap around” or other means requiring payload overhead.

Advertising