XKL DarkStar DRA User manual

DarkStar®
Lighting the path to network independence
User Guide v3.1

DarkStar User Guide
www.xkl.com
Notices
Please note the following before using DarkStar equipment.
Trademark
DarkStar® is a registered trademark of XKL®, LLC.
Copyright
Copyright © 2006-2014 XKL, LLC
This document contains information that is protected by copyright. All rights are reserved. Reproduction, adaptation, or trans-
lation without prior written permission is prohibited, except as allowed under the copyright laws.
All material contained herein is proprietary to XKL, LLC.
Warranty
The information in this publication is subject to change without notice. The information contained herein should not be
construed as a commitment by XKL, LLC.
XKL, LLC shall not be liable for errors contained herein or for incidental or consequential damages in connection with the
furnishing, performance, or use of this material.
U.S. Government Restricted Rights
The Computer Software is delivered as “Commercial Computer Software” as defined in DFARS 48 CFR 252.227-7014.
All Computer Software and Computer Software Documentation acquired by or for the U.S. Government is provided with
Restricted Rights. Use, duplication or disclosure by the U.S. Government is subject to the restrictions described in FAR 48 CFR
52.227-14 or DFARS 48 CFR 252.227-7014, as applicable.
Technical Data acquired by or for the U.S. Government, if any, is provided with Limited Rights.
Use, duplication or disclosure by the U.S. Government is subject to the restrictions described in FAR 48 CFR 52.227-14 or DFARS
48 CFR 252.227-7013, as applicable.
Class A Compliance
DarkStar equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the
FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is
operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not
Software Copyright
The following software copyright notices are in effect in DarkStar systems:
ssh (Secure Shell)
DarkStar technology includes Secure Shell (ssh) software developed by Tatu Ylonen ([email protected]), which is Copyright © 1995
Tatu Ylonen, Espoo, Finland. All rights reserved. The software contains code implementing the packet protocol and communi-
cation with the other side. This same code is used both on client and server side.
The code Tatu Ylonen has written for this software can be used freely for any purpose. Any derived versions of this software

DarkStar User Guide
www.xkl.com
must be clearly marked as such, and if the derived work is incompatible with the protocol description in the RFC file, it must be
called by a name other than “ssh” or “Secure Shell”.
SSH2 Packet Format
SSH2 packet format added by Markus Friedl.
Copyright © 2000, 2001 Markus Friedl. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
SSLeay Library
DarkStar technology includes cryptographic software written by Eric Young (eay@cryptsoft.com).
The SSLeay library is free for commercial and non-commercial use as long as the following conditions are adhered to. The
following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This
product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”. The word ‘cryptographic’ can be left
out if the routines from the library being used are not cryptographic related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must
include an acknowledgement: “This product includes software written by Tim Hudson ([email protected])”.
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,

DarkStar User Guide
www.xkl.com
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The licence and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code
cannot simply be copied and put under another distribution licence [including the GNU Public Licence.]
OpenSSL Project
DarkStar technology includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://
www.openssl.org/)
OpenSLL is Copyright © 1998-2001 The OpenSSL Project. All rights reserved.
1. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
2. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This
product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)”
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this
software without prior written permission. For written permission, please contact openssl-[email protected]g.
5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior
written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: “This product includes software
developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)”
NetBSD Foundation
DarkStar technology contains code derived from software contributed to The NetBSD Foundation by Christos Zoulas.
Copyright © 1998 The NetBSD Foundation, Inc.
ll rights reserved.
1. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
2. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This
product includes software developed by the NetBSD Foundation, Inc. and its contributors.
4. Neither the name of The NetBSD Foundation nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,

DarkStar User Guide
www.xkl.com
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSI-
BILITY OF SUCH DAMAGE.
OpenBSD
Copyright (c) CCYY YOUR NAME HERE <user@your.dom.ain>
THE SOFTWARE IS PROVIDED “AS IS” AND THE AUTHOR DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE
INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABLILTY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF
USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
FreeBSD
Copyright © 2003 Maxim Sobolev <sobomax@FreeBSD.org>
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following
conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Lars Fenneberg
Permission to use, copy, modify, and distribute this software for any purpose and without fee is hereby granted, provided that
this copyright and permission notice appear on all copies and supporting documentation, the name of Lars Fenneberg not be
used in advertising or publicity pertaining to distribution of the program without specific prior permission, and notice be
given in supporting documentation that copying and distribution is by permission of Lars Fenneberg.used in advertising or
publicity pertaining to distribution of the program without specific prior permission, and notice be given in supporting

DarkStar User Guide
www.xkl.com
documentation that copying and distribution is by permission of Lars Fenneberg. Lars Fenneberg makes no representations
about the suitability of this software for any purpose. It is provided “as is” without express or implied warranty.
Livingston Enterprises
Copyright © 1992 Livingston Enterprises, Inc.
Livingston Enterprises, Inc. 6920 Koll Center Parkway Pleasanton, CA 94566
Permission to use, copy, modify, and distribute this software for any purpose and without fee is hereby granted, provided that
this copyright and permission notice appear on all copies and supporting documentation, the name of Livingston Enterprises,
Inc. not be used in advertising or publicity pertaining to distribution of the program without specific prior permission, and
notice be given in supporting documentation that copying and distribution is by permission of Livingston Enterprises, Inc.
Livingston Enterprises, Inc. makes no representations about the suitability of this software for any purpose. It is provided “as is”
without express or implied warranty.
University of Michigan & Merit Network
Copyright © 1992, 1993, 1994, 1995 The Regents of the University of Michigan and Merit Network, Inc.
All rights reserved.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby
granted, provided that the above copyright notice and this permission notice appear in all copies of the software and deriv-
ative works or modified versions thereof, and that both the copyright notice and this permission and disclaimer notice appear
in supporting documentation.
THIS SOFTWARE IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING WITHOUT
LIMITATION WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE REGENTS OF THE
UNIVERSITY OF MICHIGAN AND MERIT NETWORK, INC. DO NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE
SOFTWARE WILL MEET LICENSEE’S REQUIREMENTS OR THAT OPERATION WILL BE UNINTERRUPTED OR ERROR FREE. The

DarkStar User Guide
www.xkl.com
Regents of the University of Michigan and Merit Network, Inc. shall not be liable for any special, indirect, incidental or conse-
quential damages with respect to any claim by Licensee or any third party arising from use of the software.
Data Security
Copyright © 1991, 1992 RSA Data Security, Inc. Created 1991.
All rights reserved.
License to copy and use this software is granted provided that it is identified as the “RSA Data Security, Inc. MD5 Message-
Digest Algorithm” in all material mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such works are identified as “derived from the RSA Data
Security, Inc. MD5 Message-Digest Algorithm” in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of
this software for any particular purpose. It is provided “as is” without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation and/or software.
Danger
DarkStar products use hazard level 1M laser radiation, which presents a danger to human health.
Do not stare into the lasers or view with non-attenuating optical instruments. Doing so may lead to severe eye damage.
FIGURE 0.1 Laser Warning

DarkStar User Guide
TABLE OF CONTENTS
www.xkl.com
CHAPTERS
1Introduction................................................................................................................1
Overview...........................................................................................................1
Network............................................................................................................... 1
Amplification ..................................................................................................... 1
Redundancy....................................................................................................... 1
System Design...............................................................................................1
Applications ....................................................................................................... 1
Network Topology ............................................................................................ 2
Optical Budget................................................................................................... 2
Dark Fiber ........................................................................................................... 2
Hardware ..........................................................................................................2
Optical Networking Systems (DXM & DSM)................................................ 2
Amplification Systems (DBA-L & DRA)......................................................... 3
DBA-L Systems ..........................................................................................4
DRA Systems..............................................................................................4
Band Combiner Devices (DBC) ...................................................................... 5
Key Benefits ...................................................................................................6
Network & System............................................................................................. 6
Hardware............................................................................................................ 6
Software.............................................................................................................. 6
2Hardware.........................................................................................................................9
Power...................................................................................................................9
Power Requirements ........................................................................................ 9
AC Power............................................................................................................. 9
DC Power............................................................................................................. 9
DarkStar® DC Power Connection Matrix ...................................................10
Power Module Replacement .......................................................................... 11
Fan Modules....................................................................................................12
Fan Module Replacement .............................................................................. 12
Optical Configuration ..............................................................................13
Optical Modules ............................................................................................... 13
Wave Laser Module ..................................................................................13
Client Laser Module..................................................................................13
OSC Laser Module.....................................................................................13
Optical Provisioning......................................................................................... 13
Laser Module Replacement............................................................................ 13

DarkStar User Guide
TABLE OF CONTENTS
www.xkl.com
3Software............................................................................................................................17
Operating System .......................................................................................17
Terminal Pager .................................................................................................. 17
Syntax Format .................................................................................................. 17
Conventions for DXMOS Syntax..................................................................17
Command Abbreviations ............................................................................... 18
Keyboard Shortcuts.......................................................................................... 18
DXMOS Keyboard Shortcuts..........................................................................18
Help ...................................................................................................................... 19
Operating Modes .............................................................................................. 19
Configuration.................................................................................................19
Power-Up and Reboot ..................................................................................... 19
Startup Procedures .......................................................................................... 21
Boot & Recover Scenarios..............................................................................21
Physical Provisioning ....................................................................................... 22
Wave and Client Interface Provisioning ................................................22
Available Protocols, Data Rates and corresponding Encapsulation23
OSC/Ethernet Management Provisioning ............................................24
Redundancy (APP) ............................................................................................ 24
Administrative Access ..................................................................................... 27
Console Serial Interface ...........................................................................27
Telnet Access .............................................................................................28
Console Jack Pinout Configuration.............................................................28
SSH Access .................................................................................................29
SSH Key Replacement ..............................................................................29
Loopbacks........................................................................................................... 30
Management Network Services.................................................................... 30
Time and Date ................................................................................................... 31
Remote File Configuration ............................................................................. 31
Security................................................................................................................ 33
Enabled Mode Password .........................................................................33
Serial Console Password ..........................................................................34
Access Control Lists ..................................................................................35
Multiple Users............................................................................................36
AAA with RADIUS and TACACS+ ............................................................36
Amplifier Configuration .................................................................................. 36
EDFA Configuration Example..................................................................36
DRA EDFA and Raman Amplifier Optimization ....................................41
Monitoring ......................................................................................................41
Hardware Monitoring...................................................................................... 41
show interface & show environment Commands .................................41
Interface and Line Status.........................................................................42
Temperature ..............................................................................................45
Temperature Thresholds.................................................................................45
Syslog................................................................................................................... 45
Circular Log Buffer ............................................................................................ 46
SNMP.................................................................................................................... 46
XKL-specific Trap Types...................................................................................47

DarkStar User Guide
TABLE OF CONTENTS
www.xkl.com
XKL MIB Groups..................................................................................................48
Error Detection .................................................................................................. 48
Error Forwarding............................................................................................... 49
BERT (Bit Error Ratio Test).....................................................................49
Configure BERT logging .................................................................................. 50
View a BERT test results log ............................................................................ 51
Determining BERT Minimum Test Time....................................................... 52
4Troubleshooting..................................................................................................53
Good Practices ..............................................................................................53
Running Configuration ................................................................................... 53
Crash Recovery .................................................................................................. 53
Operator notification ...............................................................................54
Create a saved configuration for backup..............................................54
Getting operational again quickly .........................................................54
Automatic recovery from a warm restart..............................................55
Automatic recovery from a cold boot or power recycle.....................55
Manual crash recovery only if automatic recovery fails......................55
Diagnosis....................................................................................................55
Console Procedures...................................................................................55
System Issues ..................................................................................................... 56
System Troubleshooting Matrix...................................................................56
Networking Issues............................................................................................. 57
Networking Troubleshooting Matrix..........................................................57
Hardware Procedures ..............................................................................58
Front Panel LEDs ............................................................................................... 58
LED Legend..........................................................................................................58
Front Panel LED Patterns ................................................................................58
Recovery Mode.............................................................................................59
Recovery Mode Commands...........................................................................59
Using the Debug Command ................................................................61

x
www.xkl.com
CHAPTERS

1
DarkStar User Guide
1: Introduction
www.xkl.com
Introduction
1.1 Overview
The DarkStar family of products is an integrated suite of fiber-optic networking systems that can be used to create custom
fiber-optic network topologies to meet virtually any business need.
DarkStar products use Dense Wavelength Division Multiplexing (DWDM) optical network hardware and management
interface software to achieve data transmissions over extended distances at high data rates.
The DarkStar product line allows an enterprise complete control over its proprietary fiber-optic networks, allowing it to take
advantage of the increasing availability and economy of unlit or “dark” fiber. DarkStar networks allow businesses to
circumvent the exorbitant cost of leasing services and equipment. By developing and managing a DarkStar network directly,
businesses can create proprietary, carrier-class, fiber-optic networks with a significantly lower total cost of ownership.
DarkStar networks have therefore been designed for use by network administrators instead of optical engineers. The DarkStar
operating system offers a simple, command-line interface with router-like operation that will be familiar to any enterprise
network administrator.
1.1.1 Network
A DarkStar network consists of at least two Darkstar optical networking systems acting as endpoints. Additional DarkStar
networking systems, DarkStar amplifier systems, or DarkStar combiner systems can be added to enable extended network
designs, and enhance transport performance.
1.1.2 Amplification
DarkStar amplifier systems and amplifier components maximize the transmission distance of DarkStar networks. In general, a
simple network with paired optical networking systems supports transmission distances up to 70km; systems employing
amplification may achieve transmission distances up to 2000km.
1.1.3 Redundancy
DarkStar systems can provide redundant failover through model features, component specifications, and network design.
Consult XKL about the best ways to achieve redundant failover in your own network designs.
1.2 System Design
Requirements for designing a DarkStar network encompass more areas than can be detailed in this document. However, the
following information provides a brief overview of key features and considerations in the development of a system.
1.2.1 Applications
DarkStar systems can be used to build networks for metro, regional, or long-haul network access.

2
DarkStar User Guide
1: Introduction
www.xkl.com
1.2.2 Network Topology
In general, most networks are based upon point-to-point or ring topologies. However, DarkStar network configuration is
flexible and can be designed to match virtually any business need.
•Network topologies may be categorized as point-to-point or ring systems.
•Point-to-point topologies connect two endpoints.
•Ring topologies connect all network nodes in a closed loop.
•While the two topologies function differently, they are fundamentally the same with the distinction being a ring topology
forms a closed loop.
•The minimum network design must connect (2) endpoints, or conversely, may be built out to accommodate designs as
complex as needs require.
•Add-drop service may be incorporated at any node.
•Path protection (redundancy) is possible with the inclusion of a second fiber pair when using redundant DarkStar systems.
•Amplification can be included in network design to extend transmission distances.
1.2.3 Optical Budget
Every DarkStar network is built around an optical budget that optimizes the amount of optical power required to transport
light over required distances in a customer network. An optical budget can be calculated using site installation metrics to
determine the optical power required in a system.
It is often assumed that the more optical power a system offers, the better it will perform. In the world of optical networking,
too much optical power can cause just as many problems with signal quality as too little. Therefore, it is important that optical
networking equipment be designed to operate within a defined set of parameters. DarkStar systems can be configured
accordingly with correct specifications.
1.2.4 Dark Fiber
In designing and building an optical network, acquiring fiber access is an important consideration. Dark fiber is becoming
increasingly available through a number of sources, including private network operators and municipalities, among others.
There are also companies that specialize in assisting enterprises to locate or even install fiber services.
1.3 Hardware
DarkStar technology currently comprises three product families:
•Tunable Optical Networking Systems (DXT & DST) with DarkStar Mux Demux (DMD) devices.
•Optical Networking Systems (DXM & DSM).
•Amplification Systems (DRA & DBA-L).
•Band Combiner Devices (DBC).
1.3.1 Optical Networking Systems (DXM & DSM)
DarkStar optical networking systems are responsible for transmission and reception of data over fiber-optic cable and form
the core of any DarkStar network. The primary features of DarkStar optical networking systems are:

3
DarkStar User Guide
1: Introduction
www.xkl.com
1. XFP or SFP+ laser modules.
2. 2, 4, 10, and 20 ports per system.
3. Redundant operation (power and cooling).
4. Optional integrated amplification.
5. Integrated dispersion compensators (where required).
For more information, see the DarkStar Optical Specifications document.
FIGURE 1.1 DarkStar®Optical Networking Systems
1.3.2 Amplification Systems (DBA-L & DRA)
Each amplification type and its manner of deployment has unique characteristics and benefits. The amplification technology
and configuration used will depend upon transmission distances, network topology, and fiber type, among other factors that
are taken into account when building a system.
Information related to setting up an amplifier can be found in “Amplifier Configuration” on page 36. Amplification systems
share much of the same hardware and software as other DarkStar products, requiring only one set of general operating
instructions and commands to manage DarkStar products efficiently.
Beyond standalone amplifiers, some amplification technologies may be directly integrated into optical networking systems.
DarkStar networks and systems currently support two types of amplification:
1. EDFA (Erbium Doped Fiber Amplifier).
2. Raman.
Amplifiers generally serve three purposes in a system:
•Booster: Increase signal power into the fiber.
Console Port
AlarmLED’s
Band Port LED’s
Ethernet Management Ports
Line/Band Port
Reset Button
10-10
Client Ports
Ethernet Management Ports
East
West
Line/Band Ports
10-5R
Client Ports
Console Port
AlarmLED’s
Band Port LED’s
Reset Button
DarkStar Optical Networking Systems
Optical Networking Systems are available in two, four, and ten client port options.
DarkStar
DarkStar
E1
E1
C0 C1 C2 C3 C4 C5 C6 C7 C8 C9
C0 C1 C2 C3 C4 C5 C6 C7 C8 C9

4
DarkStar User Guide
1: Introduction
www.xkl.com
•Line Amplification: Increase repeater spacing.
•Pre-Amplification: Improve receiver sensitivity and signal-to-noise margin.
1.3.2.1 DBA-L Systems
A DBA-L system employs EDFAs to implement optical amplification, allowing for increased distances between optical
networking systems. The features of a DBA-L are:
1. Up to 4 EDFAs.
2. Integrated dispersion compensators.
3. Integrated tilt compensators.
4. Mid stage access.
An EDFA uses erbium-doped optical fiber as a gain medium to amplify an optical signal. Inside the EDFA, the input optical
signal and the pump laser are combined and passed through the erbium-doped fiber, where the signal is amplified.
WARNING
!
EDFAs can produce high-energy signals that pose a risk to human eyesight. Furthermore,
an improperly configured EDFA can damage optical receivers, both within the EDFA-
equipped DarkStar systems and in remote systems connected to the EDFA-equipped
system.
1.3.2.2 DRA Systems
A DRA system employs EDFAs and Raman amplifiers to implement optical amplification, allowing for increased distances
between optical networking systems. The features of a DRA are:
1. Up to 2 Raman amplifiers.
2. Up to 4 EDFAs.
3. Integrated dispersion compensators.
4. Integrated tilt compensators.
5. Mid stage access.
A Raman amplifier is based on Raman gain, which results from the stimulated Raman scattering effect. Unlike an EDFA, Raman
amplification uses the transmission fiber as the gain medium, instead of erbium-doped fiber, transferring the optical energy
from a pump laser to the optical signal.

5
DarkStar User Guide
1: Introduction
www.xkl.com
FIGURE 1.2 DarkStar® Amplification Systems (DRA & DBA-L)
1.3.3 Band Combiner Devices (DBC)
DBC devices may be used to scale the capacity of DarkStar networks by combining the bandwidth of multiple optical
networking systems. Using a DBC4, up to four DarkStar systems may be combined to create a total capacity of forty channels
or up to 400 Gbps of bandwidth. Total capacity is dependent on the model of optical networking systems and the number of
channels employed. The features of a DBC are:
1. 4-band and 6-band options.
2. Supports ring (DBCd) or point-to-point (DBCs) topologies.
3. Integrated OSC add/drop.
4. Passive device.
FIGURE 1.3 DarkStar® Band Combiner Devices
>95
(34
, ,
, ,
*65:63,
9,:,; >,
7>9 62
36:
367
6:*
7>9
,+-( 9(4(5
05 05 056<; 05 6<;
>,:; > ,,(:;
05
9(4(5
Console Port
AlarmLED’s
Line Port LED’s
Ethernet
Management
Ports
East
West
Line
Input Ports*
Reset Button
Amp Status
LED’s
East
West
Mid-Stage
Access Ports
Line
Output & Monitor
Ports
East
West
Output
Monitor
Output
Monitor
DRA
Console Port
AlarmLED’s
Line Port LED’s
East
West
Line Ports
Reset Button
Amp Status
LED’s
East
West
Mid-Stage
Access Ports
DBA-L
Ethernet Management Ports
DRA & DBA-L In-Line Amplication Systems
+9((TWSPMPLY:`Z[LT
367
+)(3(TWSPMPLY:`Z[LT
05
>,:;
6<;
,(:;
40+:;(.,
05
6<;
>,:; ,(:;
40+:;(.,
05
6<;
DarkStar
DarkStar
>,:; ,(:;
Combined Line Port (West)
Band Ports (West) Band Ports (East)
Combined Line Port (East)
Output
Input
Output
Input
DBC6d
DBC
Band Combiner Devices
DBC devices are available in single or dual band with four or sixport options.
DarkStar

6
DarkStar User Guide
1: Introduction
www.xkl.com
1.4 Key Benefits
1.4.1 Network & System
•Ease of Deployment: DarkStar networks are delivered pre-configured for operation based upon requirements and site
installation details provided by the customer, thereby facilitating and streamlining system deployment and network
operation.
•Seamless Management: DarkStar products share hardware and software design elements, such as chassis design and
software commands. The information provided in this guide can be used to manage all systems in a DarkStar network.
•Latency: DarkStar networks offer low-latency performance for use in the most demanding, business-critical applications.
•Integrated System: Integrated components and flexible system design make DarkStar networks easier to manage than
traditional line-card or cage-based solutions.
•Hitless Upgrades: In many cases DarkStar networks support hitless failover and upgrades, although in select cases traffic
interruption may be measured in milliseconds.
•Redundant Transmission: The inclusion of redundant optical networking systems with Automatic Path Protection (APP)
in a DarkStar network may provide complete system failover.
•Scalability: Using a DBC (for up to 40 channels) or a DMD (for up to 96 channels), the bandwidth of up to four optical
networking systems can be combined to achieve total throughput of up to 960Gbps.
•Extended Transmission Distances: The inclusion of amplifiers in a DarkStar network may provide total transmission
distances of up to 2000km.
1.4.2 Hardware
DarkStar hardware features include:
•Low Power Consumption: Every system in the DarkStar family is rated at 64-125W typical.
•Rackspace Efficiency: Each system in the DarkStar family occupies only 1U of space in a standard equipment rack.
Comparable equipment from other manufacturers often occupies 8U of space or more per device.
•Redundant Cooling: By default, all powered DarkStar products include dual, hot-swappable fan modules.
•Redundant Power: By default, all powered DarkStar products include dual, hot-swappable power supplies.
1.4.3 Software
Key features of DXMOS, the operating system of DarkStar products, include:
•Intuitive Interface: As opposed to most fiber-optic systems, which require knowledge of proprietary commands and
advanced optical-engineering concepts, DarkStar systems offer router-like operation through an intuitive command-line
interface familiar to any network administrator.
•Field-Upgradeable: DarkStar operating system and gateware can be upgraded in the field.
•Field-Configurable: Amplifiers and other systems can be configured in the field.
•Installer: An installer is provided to turn software updating into a seamless task.
•Flash File System: An integrated flash file system facilitates data management: easy access, backups, simplified naming
conventions, and the ability to boot any image, among other features. Files may be copied, uploaded, downloaded, and
check-summed to ensure operational integrity.
•Remote Management: DarkStar systems can be accessed from anywhere, whether in a rack on the other side of the room

7
DarkStar User Guide
1: Introduction
www.xkl.com
or in a hut thousands of miles away. Moreover, any single DarkStar system can access all DarkStar systems in a network via
its OSC (optical service channel), collectively creating a remote system management network.
•Remote & Automated File Configuration: System and configuration files can be hosted on a remote server to automate
configuration of DarkStar systems. Employ this feature to recover system settings upon reboot or to automatically
provision multiple systems.
•Management Network Services: The management network can be used to integrate network services with your system,
including Simple Network Time Protocol (SNTP), Syslog, RADIUS, and Simple Network Management Protocol (SNMP) trap
servers.
•AAA Support: Support for Authentication, Authorization, and Accounting (AAA) services provides increased network
security.

9
DarkStar User Guide
2: Hardware
www.xkl.com
Hardware
This chapter describes physical installation and maintenance of DarkStar hardware components.
2.1 Power
DarkStar systems ship with two power supply modules, which, under normal conditions, operate as distributed sources. In the
event that one power module fails, the system can operate on a single power module. Power supply modules are hot
swappable, and therefore can be replaced while the DarkStar system is running.
Follow the instructions in Figure 2.2, “Replacing Power Supply Modules,” on page 11 for power supply module replacement
procedures.
The general procedure for managing power supply modules is the same for all systems. Power supply modules use either AC
or DC power.
2.1.1 Power Requirements
For maximum availability, DarkStar systems should be connected to two power circuits. The circuits may be AC, DC, or a
combination of AC and DC power. The following power combinations are supported:
•Two 100-240VAC.
•Two 48VDC.
•One 100-240VAC and one 48VDC.
2.1.2 AC Power
DarkStar products with AC power require no special wiring and can be connected to a standard outlet with 100-240VAC power
using the included power cords.
2.1.3 DC Power
To install DarkStar products configured for DC power, 12-16 AWG (American Wire Gauge) stranded wire is recommended.
However, 14 AWG wire is optimal for its size and flexibility.
There are two styles of DC power connectors on DarkStar systems. Reference the following illustrations to determine which
style is installed on a DarkStar system.

10
DarkStar User Guide
2: Hardware
www.xkl.com
FIGURE 2.1 DC Power Connectors
Once the style of DC power connector is established, the following table can be used to complete wiring. The table details
wiring specifications for both -48V and +48V rails.
WARNING
!
When connecting wires to the Input Terminal, the ground connector GND must be
connected first, and disconnected last.
TABLE 2.1 DarkStar®DC Power Connection Matrix
Reference -48V Rail +48V Rail
- -48V +48V RTN
⏚GND GND
+ -48V RTN +48V
-
+
INPUT CONNECTOR INPUT TERMINAL
ò+
This manual suits for next models
2
Table of contents
Other XKL Network Hardware manuals
Popular Network Hardware manuals by other brands

Hitachi
Hitachi SJ/L-EN Ethernet Communications Module instruction manual

Plustek
Plustek NVR 4000 user guide

Huawei
Huawei Airbridge DBS3900 Hardware description

Infoblox
Infoblox TE-2210 installation guide

Cabletron Systems
Cabletron Systems SPECTRUM FRX6000 Maintenance Guide

ADPRO
ADPRO iFT Series Hardware installation manual