Professional Documents
Culture Documents
PTN 950 Huawei Product Description
PTN 950 Huawei Product Description
Series
V100R002C01
Product Description
Issue
02
Date
2010-12-28
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Website:
http://www.huawei.com
Email:
support@huawei.com
Issue 02 (2010-12-28)
Version
V100R002C01
V100R002C01
Intended Audience
This document describes the networking application, functions, structure, features and hardware
of the OptiX PTN 950.
This document is intended for:
l
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol
Description
DANGER
WARNING
CAUTION
Issue 02 (2010-12-28)
iii
Symbol
Description
NOTE
TIP
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention
Description
Boldface
>
Change History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
iv
Issue 02 (2010-12-28)
Contents
Contents
About This Document...................................................................................................................iii
1 Network Position and Product Features................................................................................1-1
1.1 Network Position.............................................................................................................................................1-2
1.2 Equipment Features.........................................................................................................................................1-3
1.2.1 Rich Service Types.................................................................................................................................1-4
1.2.2 Powerful Processing Capability.............................................................................................................1-4
1.2.3 Rich Interface Types..............................................................................................................................1-5
1.2.4 Protection Capabilities...........................................................................................................................1-7
1.2.5 Layered OAM........................................................................................................................................1-8
1.2.6 QoS Capabilities.....................................................................................................................................1-8
1.2.7 Precision Synchronization....................................................................................................................1-10
1.2.8 DHCP Relay.........................................................................................................................................1-11
1.2.9 High Efficiency Tunnel Technology....................................................................................................1-11
1.2.10 Green Network Design for Energy Conservation..............................................................................1-11
2 System Structure.........................................................................................................................2-1
2.1 Hardware Structure.........................................................................................................................................2-2
2.1.1 Chassis....................................................................................................................................................2-2
2.1.2 Boards.....................................................................................................................................................2-3
2.2 Software Structure...........................................................................................................................................2-5
3 Introduction to Services............................................................................................................3-1
3.1 Service Model.................................................................................................................................................3-2
3.2 CES Services...................................................................................................................................................3-3
3.3 IMA/ATM Services.........................................................................................................................................3-5
3.4 Ethernet Services.............................................................................................................................................3-6
3.5 IP over PW......................................................................................................................................................3-8
4 QoS................................................................................................................................................4-1
4.1 DiffServ...........................................................................................................................................................4-2
4.2 HQoS...............................................................................................................................................................4-4
5 OAM.............................................................................................................................................5-1
5.1 MPLS Tunnel OAM........................................................................................................................................5-3
5.2 PW OAM.........................................................................................................................................................5-3
Issue 02 (2010-12-28)
Contents
6 Protection.....................................................................................................................................6-1
6.1 NSF Features...................................................................................................................................................6-2
6.2 Equipment Level Protection............................................................................................................................6-2
6.3 Network Level Protection............................................................................................................................... 6-2
6.3.1 MPLS Tunnel APS Protection............................................................................................................... 6-3
6.3.2 Offload Protection..................................................................................................................................6-6
6.3.3 PW APS................................................................................................................................................6-10
6.3.4 Dual-Homing Protection......................................................................................................................6-11
6.3.5 Dual-Homing Protection for IP over PW.............................................................................................6-13
6.3.6 FRR Protection.....................................................................................................................................6-15
6.3.7 LMSP...................................................................................................................................................6-17
6.3.8 LAG Protection....................................................................................................................................6-18
6.3.9 ML-PPP Protection..............................................................................................................................6-20
6.3.10 IMA Protection...................................................................................................................................6-21
6.3.11 Ethernet Spanning Tree Protection....................................................................................................6-21
7 Synchronization..........................................................................................................................7-1
7.1 Physical Layer Synchronization......................................................................................................................7-2
7.2 IEEE 1588 V2................................................................................................................................................. 7-5
7.3 1588 ACR........................................................................................................................................................7-7
7.4 Overview of CES ACR...................................................................................................................................7-8
8 Value-Added Feature.................................................................................................................8-1
8.1 DHCP Relay....................................................................................................................................................8-2
9 Bearer Technology.....................................................................................................................9-1
9.1 MPLS.............................................................................................................................................................. 9-2
9.1.1 Background............................................................................................................................................ 9-2
9.1.2 Basic Concepts.......................................................................................................................................9-2
9.1.3 System Structure.................................................................................................................................... 9-4
9.1.4 MPLS Features of the Equipment..........................................................................................................9-4
9.2 PWE3.............................................................................................................................................................. 9-5
9.3 IP Tunnels/GRE Tunnels................................................................................................................................ 9-6
11 DCN..........................................................................................................................................11-1
12 Operation and Maintenance................................................................................................12-1
vi
Issue 02 (2010-12-28)
Contents
13 Security Management............................................................................................................13-1
13.1 Authentication Management.......................................................................................................................13-2
13.2 Authorization Management.........................................................................................................................13-2
13.3 Network Security Management...................................................................................................................13-2
13.4 System Security Management.....................................................................................................................13-3
13.5 NE Security Log Management....................................................................................................................13-3
13.6 Syslog Management....................................................................................................................................13-3
13.7 White Name List for the MAC Address......................................................................................................13-4
14 Application Scenario.............................................................................................................14-1
14.1 Networking with PTN Equipment Only......................................................................................................14-2
14.2 Networking with a Third-Party Network Between PTN NEs.....................................................................14-6
14.2.1 Networking with a Layer 2 Network Between PTN NEs..................................................................14-7
14.2.2 Networking with a Layer 3 Network Between PTN NEs................................................................14-12
14.2.3 Offload.............................................................................................................................................14-18
vii
Contents
viii
Issue 02 (2010-12-28)
Figures
Figures
Figure 1-1 Appearance of the OptiX PTN 950.................................................................................................... 1-2
Figure 1-2 Typical networking of the OptiX PTN 950........................................................................................1-3
Figure 1-3 QoS process........................................................................................................................................1-9
Figure 1-4 Queue scheduling............................................................................................................................... 1-9
Figure 2-1 Appearance of the OptiX PTN 950.................................................................................................... 2-2
Figure 2-2 Slot allocation of the OptiX PTN 950................................................................................................2-3
Figure 2-3 Board relations of the OptiX PTN 950...............................................................................................2-5
Figure 2-4 Software structure of the OptiX PTN 950..........................................................................................2-6
Figure 3-1 Application model of the CES service............................................................................................... 3-4
Figure 3-2 Retiming synchronization mode of the CES service clock................................................................ 3-5
Figure 3-3 Self-adaptation synchronization mode of the CES service clock.......................................................3-5
Figure 3-4 E-Line service illustration.................................................................................................................. 3-7
Figure 3-5 E-LAN service illustration..................................................................................................................3-8
Figure 3-6 Deployment of IP over PW services...................................................................................................3-9
Figure 4-1 Networking diagram for the DiffServ model......................................................................................4-2
Figure 4-2 HQoS function points and QoS processing........................................................................................4-5
Figure 5-1 CC detection diagram.........................................................................................................................5-5
Figure 5-2 LB detection diagram......................................................................................................................... 5-5
Figure 5-3 LT detection diagram..........................................................................................................................5-6
Figure 5-4 Application scenarios of the Ethernet service OAM..........................................................................5-6
Figure 5-5 ATM faults at Node B and an RNC................................................................................................... 5-8
Figure 5-6 ATM faults at the NNI side................................................................................................................5-8
Figure 5-7 BFD networking application.............................................................................................................. 5-9
Figure 5-8 Application scenario of LPT.............................................................................................................5-10
Figure 6-1 MPLS Tunnel 1+1 protection.............................................................................................................6-4
Figure 6-2 MPLS Tunnel 1:1 protection..............................................................................................................6-4
Figure 6-3 Networking of offload protection where an MPLS tunnel protects an IP/GRE tunnel......................6-7
Figure 6-4 Networking of offload protection where an IP/GRE tunnel protects an IP/GRE tunnel....................6-8
Figure 6-5 PW APS networking.........................................................................................................................6-10
Figure 6-6 Protection for IP over PW services...................................................................................................6-14
Figure 6-7 Protection switching for IP over PW services in case of an equipment fault...................................6-14
Figure 6-8 Protection switching for IP over PW services in case of a link fault...............................................6-15
Figure 6-9 FRR Protection.................................................................................................................................6-16
Issue 02 (2010-12-28)
ix
Figures
Issue 02 (2010-12-28)
Tables
Tables
Table 1-1 service types supported by OptiX PTN 950.........................................................................................1-4
Table 1-2 Maximum service switching capability of the OptiX PTN 950...........................................................1-5
Table 1-3 Maximum access capability of the OptiX PTN 950............................................................................ 1-5
Table 1-4 Service interfaces of the OptiX PTN 950............................................................................................ 1-6
Table 1-5 Administration and auxiliary interfaces of the OptiX PTN 950.......................................................... 1-6
Table 1-6 Equipment level protection provided by the OptiX PTN 950..............................................................1-7
Table 1-7 Network level protection provided by the OptiX PTN 950.................................................................1-7
Table 1-8 OAM Functions for OptiX PTN 950................................................................................................... 1-8
Table 1-9 QoS capabilities................................................................................................................................... 1-9
Table 1-10 Tunnel technology supported by the OptiX PTN 950.....................................................................1-11
Table 2-1 Boards supported by the OptiX PTN 950 and their valid slots............................................................2-3
Table 3-1 Comparison among L2 Ethernet services stipulation...........................................................................3-6
Table 4-1 Queue scheduling and application....................................................................................................... 4-3
Table 5-1 Application scenarios of the MPLS Tunnel OAM...............................................................................5-3
Table 5-2 Application scenarios of the PW OAM............................................................................................... 5-4
Table 5-3 Application scenarios of the detection methods of the Ethernet service OAM...................................5-6
Table 6-1 Equipment level protection provided by the OptiX PTN 950..............................................................6-2
Table 6-2 Parameters of the MPLS Tunnel 1:1 protection...................................................................................6-5
Table 6-3 Parameters of the MPLS Tunnel 1+1 protection..................................................................................6-6
Table 6-4 Protection scenarios and protection types of tunnels on a network..................................................... 6-7
Table 6-5 Parameters for offload protection.........................................................................................................6-9
Table 6-6 Dual-homing protection schemes for various services......................................................................6-11
Table 6-7 Support for various factors of dual-homing protection......................................................................6-13
Table 6-8 Parameters of the 1+1 and 1:1 LMSP................................................................................................6-18
Table 9-1 MPLS features supported by the OptiX PTN 950............................................................................... 9-5
Table 9-2 Capabilities of the equipment of supporting PWE3.............................................................................9-6
Table 14-1 Typical bearing modes in which various user services are transmitted over a PTN network..........14-3
Table 14-2 Typical network built with PTN equipment only............................................................................14-5
Table 14-3 Typical bearing modes in which various user services are transmitted over a PSN (PTN NEs with a
Layer 2 network in between)...............................................................................................................................14-8
Table 14-4 Typical network solutions in which PTN NEs function as gateways to transmit services over a Layer
2 network...........................................................................................................................................................14-10
Table 14-5 Typical bearing modes in which various user services are transmitted over a PSN (PTN NEs with a
Layer 3 network in between).............................................................................................................................14-14
Issue 02 (2010-12-28)
xi
Tables
xii
Issue 02 (2010-12-28)
Tables
Table 16-37 Density requirements for mechanical active substances during transportation...........................16-31
Table 16-38 Density requirements for chemical active substances during transportation...............................16-32
Table 16-39 Requirements of mechanical stress for transportation.................................................................16-32
Table 16-40 Requirements on temperature and humidity................................................................................16-33
Table 16-41 Requirements on climate for operation........................................................................................16-33
Table 16-42 Density restrictions for mechanical active substances during operation......................................16-34
Table 16-43 Density requirements for chemical active substances during transportation...............................16-34
Table 16-44 Requirements for mechanical stress during operation.................................................................16-34
Issue 02 (2010-12-28)
xiii
Issue 02 (2010-12-28)
1-1
Equipment Introduction
The OptiX 950 has the following features:
l
It adopts the packet transport technology to meet the increasing requirements on bandwidth
and the demanding requirements on the flexibility of the bandwidth scheduling.
It adopts the pseudo wire emulation edge to edge (PWE3) technology to carry connectionoriented services.
It supports the access of services from base stations by using various modes, such as time
division multiplexing (TDM), ATM/IMA, and fast Ethernet (FE) , and gigabit Ethernet
(GE). It also supports the smooth evolution from the 2G mobile communication carrier
network to the 3G mobile communication carrier network.
With the complete operation, administration, and maintenance (OAM), Quality of Service
(QoS), and protection switching mechanism, it adopts the multi-protocol label switch
(MPLS) forwarding technology to optimize telecommunication carrier network and uses
the packet-based transport network to provide telecommunication services.
It supports the offload solution to divide and carry the flow of base station services such
as the high speed downlink packet access (HSDPA) services and R99 services, and uses
the x digital subscriber line (xDSL) board to transmit the HSDPA services through an
interconnected leased network, to reduce the transmission cost.
Figure 1-1 shows the appearance of the OptiX PTN 950 equipment.
Figure 1-1 Appearance of the OptiX PTN 950
Networking Application
The OptiX PTN 950 can be placed either on the base station side to access base station services
or on the convergence node side to converge services. The OptiX PTN 950 can integrate services
accessed by multiple OptiX PTN 910 or OptiX PTN 912 and then send the services to the
equipment that works at a higher layer.
Figure 1-2 shows typical networking of the OptiX PTN 950. The OptiX PTN 950 accesses
services from the base station side through TDM E1, ATM/IMA E1 or FE interfaces. The OptiX
PTN equipment adopts ML-PPP, FE or GE interfaces for networking. When the Offload solution
is adopted, the OptiX PTN 950 is connected to the xDSL network through the xDSL interfaces
1-2
Issue 02 (2010-12-28)
to transmit the HSDPA services to the convergence nodes over the xDSL network. The OptiX
PTN 3900/1900 on the base station controller (BSC) or radio network controller (RNC) side
converges the services and then sends the services to the BSC or RNC.
Figure 1-2 Typical networking of the OptiX PTN 950
cSTM-1
E1
FE
ML-PPP/
FE/GE
GE/
10GE
10GE
GE
ATM
STM-1
ATM E1/
IMA E1
xDSL/
FE/GE
GE
Wholesale
xDSL/Ethernet
BSC
1-3
The OptiX PTN 950 has complete quality of service (QoS) capabilities, and provides the eight
per-hop behavior (PHB) groups known as BE, AF1, AF2, AF3, AF4, EF, CS6, and CS7. With
the equipment, the network operators can provide services of different quality classes for users.
In this way, an integrated network emerges to carry data, voice and video services at the same
time.
1.2.7 Precision Synchronization
The OptiX PTN 950 supports the physical-layer clock synchronization, IEEE 1588 V2 precision
time protocol (PTP), and 1588 adaptive clock recovery (ACR) clock synchronization. With these
clock solutions, the equipment provides high-precision time/clock for the mobile
communication services.
1.2.8 DHCP Relay
The PTN equipment supports the DHCP Relay function, which helps the base stations to
automatically obtain IP addresses.
1.2.9 High Efficiency Tunnel Technology
The OptiX PTN 950 supports kinds of L2 and L3 tunnels to carry services.
1.2.10 Green Network Design for Energy Conservation
The OptiX PTN 950 adopts the energy conservation design and provides the energy conservation
platform, which realizes more efficient energy management and helps reduce OpEx.
Description
CES service
ATM service
L2VPN
service
E-Line service
E-LAN service
Multi-Cast service
Switching Capability
Table 1-2 shows the maximum service switching capability of the OptiX PTN 950.
1-4
Issue 02 (2010-12-28)
Table 1-2 Maximum service switching capability of the OptiX PTN 950
Product
Maximum Switching
Capability
8G
8G
Note: The OptiX PTN 950 provides unidirectional switching capability of 8 Gbit/s in the
ingress and egress directions. That is, the OptiX PTN 950 provides bidirectional switching
capability of 16 Gbit/s.
Number of Interfaces of
the Board
GE optical interface
GE electrical interface
FE optical interface
48
FE electrical interface
48
E1
32
192
Channelized STM-1
ADSL/ADSL2+
48
G.SHDSL
4 pair
24 pair
Note 1: The OptiX PTN 950 can house six GE boards with 12 GE interfaces. However, when
housed in any of the slot 3 to slot 6, the second interface of the EG2 is not available, as a
result, a maximum of eight GE interfaces are supported by the equipment.
Note 2: The CD1 board can access two channels of STM-1 signals. These two STM-1 ports
can be only configured with LMSP protection to access the same service.
Service Interfaces
Table 1-4 lists the service interfaces supported by the OptiX PTN 950.
Issue 02 (2010-12-28)
1-5
Description
GE
FE
Channelized STM-1
E1
ADSL/ADSL2+
RJ-11 interface
G.SHDSL
RJ-11 interface
Description
Quantity
Administra
tion
interface
1 (RJ-45)
NM serial interface
Cascading network interface
1 (RJ-45)
Clock/
Time
interface
2 (RJ-45)
Auxiliary
interface
Orderwire interface
1 (RJ-45)
1 (RJ-45)
1 (RJ-45)
1 (RJ-45)
1-6
Issue 02 (2010-12-28)
Protection Scheme
Revertive Mode
Non-revertive
The OptiX PTN 950 provides various network level protection schemes, as listed in Table
1-7.
Table 1-7 Network level protection provided by the OptiX PTN 950
Network Level
Protection Scheme
MPLS Tunnel
PW
1+1 protection
1:1 protection
PW redundancy protection
Ethernet link
Channelized STM-1
1+1 LMSP
1:1 LMSP
Issue 02 (2010-12-28)
IMA group
ML-PPP group
Offload protection
1-7
Function
Remark
CV/FFD
Ping
Traceroute
Performance monitoring
PW OAM
CV/FFD
VCCV
Traceroute
Performance monitoring
Ethernet service
OAM
CC
LB
LT
Performance monitoring
Connectivity and
performance monitoring
for physical Ethernet link
ATM OAM
Fault management
Fault detecting
LPT
Fault detecting
Issue 02 (2010-12-28)
The OptiX PTN 950 supports QoS mechanisms such as flow classification, committed access
rate (CAR), and queue scheduling, as listed in Table 1-9 and Figure 1-3.
Figure 1-3 QoS process
Queue
scheduling
Ingress port
Egress port
Flow
classification
CAR
Forwarding
Description
Flow
classification
CAR
Queue
scheduling
WRED
CS7
CS6
EF
AF4
AF3
AF2
AF1
BE
SP
WFQ
H
M
SP
Egress
Channel
Egress
Channel
Issue 02 (2010-12-28)
Shaping
GE
8
Shaping
1-9
E1 link
xDSL Link
NOTE
The NTR clock is a technology used to synchronize the clock at the physical layer. Clock signals are
extracted directly from the serial bit flow on the xDSL link. These clock signals are then used for data
transmission. In this way, the clock signals are transferred.
IEEE 1588 V2
IEEE 1588 V2 is a time synchronization protocol that provides the nanosecond accuracy to meet
the requirements of 3G base stations. The OptiX PTN 950 supports the following features of
IEEE 1588V2:
l
The equipment can use the IEEE 1588V2 protocol to achieve the clock timing
synchronization and time information synchronization.
The equipment supports the boundary clock (BC), ordinary clock (OC), and transparent
clock (TC, including the end-to-end transparent clock and peer-to-peer transparent clock).
The equipment can be configured with different clocks according to the requirement.
Issue 02 (2010-12-28)
information to the IEEE 1588 V2 clock packets. Then, on the third-party equipment, the clock
information is multicast to the OptiX PTN equipment on the NodeB side. When receiving the
IEEE 1588 V2 clock packets, the OptiX PTN equipment extracts the time stamps, recovers the
clock by calculation, and uses the clock as the system clock. In addition, the OptiX PTN
equipment transports the clock to NodeB. In this manner, the equipment at both ends of the
network achieves frequency synchronization.
Description
MPLS Tunnel
QinQ
IP Tunnel
GRE Tunnel
Shuts down switching ports according to online status of boards on the NE.
Issue 02 (2010-12-28)
1-11
Control of Fans
The OptiX PTN 950 controls fans as follows:
l
The NE software has the function of controlling the rotating speed of fans.
The equipment performs stepless adjustment of the rotating speed of fans according to
component temperature.
1-12
Displays the power consumption of all boards on the equipment and calculates and the
power consumption of the equipment.
Issue 02 (2010-12-28)
2 System Structure
System Structure
Issue 02 (2010-12-28)
2-1
2 System Structure
2.1.1 Chassis
The OptiX PTN 950 is case-shaped for easy deployment.
Figure 2-1 shows the appearance of the OptiX PTN 950 equipment.
Figure 2-1 Appearance of the OptiX PTN 950
The dimensions of the OptiX PTN 950 are 442 mm (width) x 220 mm (depth) x 2 U (height, 1
U = 44.45 mm).
OptiX PTN 950 chassis are classified into two types, that is, DC power-supply chassis and AC
power-supply chassis. In a DC power-supply chassis, the PIU inputs -48 V DC power to the
equipment, or an EPS30-4815AF external AC power supply system inputs 220 V AC power,
and converts the AC power to the DC power, and then outputs the DC power to the equipment.
An AC power-supply chassis uses the APIU to input 220 V AC power. Both DC and AC power
supplies support 1+1 hot backup.
NOTE
When inputting power for the equipment, only the PIU or APIU is applicable.
In an AC power-supply chassis, the APIU uses slots 4 and 6, and the slots for the PIU are covered with
filler panels.
Open rack
Figure 2-2 shows the slot allocation of the OptiX PTN 950.
2-2
Issue 02 (2010-12-28)
2 System Structure
SLOT
10
SLOT
9
SLOT
11
SLOT 7
SLOT 8
SLOT 5 (1 Gbit/s)
SLOT 6 (1 Gbit/s)
SLOT 3 (1 Gbit/s)
SLOT 4 (1 Gbit/s)
SLOT 1 (2 Gbit/s)
SLOT 2 (2 Gbit/s)
2.1.2 Boards
Boards are the key hardware components of the equipment.
Issue 02 (2010-12-28)
Board Name
Board Description
Valid Slot
CXP
Slot 7, slot 8
AUXQ
Slots 1-6
EF8T
Slots 1-6
EF8F
Slots 1-6
EG2
2 x GE service optical
interface board
Slots 1-6
EG4F
4 x GE service optical
interface board
Slots 1-6
TND1ML1
16 x E1 service interface
board (75 ohms)
Slots 1-6
TND1ML1A
16 x E1 service interface
board (120 ohms)
Slots 1-6
TND2ML1A
16 x E1 service interface
board (75 ohms)
Slots 1-6
TND2ML1B
16 x E1 service interface
board (120 ohms)
Slots 1-6
MD1A
32 x E1 service interface
board (75 ohms)
Slots 1-6
2-3
2 System Structure
Board Name
Board Description
Valid Slot
MD1B
32 x E1 service interface
board (120 ohms)
Slots 1-6
CD1
1 x channelized STM-1
service processing board
Slots 1-6
ADS2A/ADS2B
Slots 1-6
SHD4
Slots 1-6
Slots 1-6
Power board
Slot 9, slot 10
APIU
Slots 4 and 6
FAN
Fan board
Slot 11
NOTE
l When housed in slot 1 or slot 2, the EG2 can process 2 x GE signals. When housed in any other slot,
the second port of the EG2 is not available.
l The second port of the CD1 can be used for only the LMSP protection.
l The ADS2A supports the Annex A mode. The ADS2B supports the Annex B mode.
l On one NE, only one AUXQ board can be housed.
l The APIU houses two slots. Slot 4 and slot 6 house one APIU.
Board Relations
The OptiX PTN 950 uses different boards to achieve various functions.
Figure 2-3 shows board relations of the OptiX PTN 950.
2-4
Issue 02 (2010-12-28)
2 System Structure
Network side
User side
FE
FE
GE
E1
E1
Channelized
STM-1
Control and
management
module
EF8F
EF8F
EF8T
EF8T
EG2/EG4F
ML1/ML1A
/ML1B
Service
processing
and
forwarding
module
EG2/EG4F
ML1/ML1A
/ML1B
MD1A/MD1B
MD1A/MD1B
ADS2
SHD4/SHD4I
CD1
Clock module
CD1
FE
FE
GE
E1
E1
ADSL2+
G.SHDSL
Channelized STM-1
CXP
FE
FE
AUXQ
6 7 8 9
Power supply
module
PIU/APIU
Heat
dissipation
module FAN
Issue 02 (2010-12-28)
2-5
2 System Structure
Control module
Interface management
Alarm and performance
management
Configuration module
DCN
Basic frame
Hardware drive
Software Platform
The software platform includes the interface management module, the alarm and performance
management module, and the DCN module.
The interface management module converts commands that have different forms and are
transmitted from terminals of different types into internal commands that are of the same form.
By using the alarm and performance management module, current alarms can be automatically
reported and queried, history alarms can be saved and queried, and events can be reported.
DCN module processes the DCN packets, and provides the communication between the local
NE and other parts, including the U2000 and other NEs.
Control Module
The control module has the following function:
l
Provides the routing protocol and route selecting algorithm that are related to dynamic
service creation.
Provides the protocol that are related to the neighbor auto-discovery function of the
transport plane.
Configuration Module
The configuration module has the following functions:
2-6
Issue 02 (2010-12-28)
2 System Structure
Issue 02 (2010-12-28)
2-7
3 Introduction to Services
Introduction to Services
Issue 02 (2010-12-28)
3-1
3 Introduction to Services
Physical layer
The physical layer provides interfaces to connect transmission media, such as cables or
fibers, to the PTN equipment.
In the direction from the CE to the provider edge (PE), the physical layer processes the
physical signals (electrical or optical signals) transmitted from the user-side equipment,
extracts information from the signals, and then sends the signals to the service interface
layer.
In the PE-to-CE direction, the physical layer receives information transmitted from the
service interface layer, converts the information into signals that can be transmitted over
cables or fibers, and then sends the signals to the user-side equipment through the
physical channel.
On the NNI side, the equipment is connected to the PSN equipment to complete the transmission
of user services in the PSN network. In the service model, layers on the NNI side have the
following functions.
l
MPLS layer
The MPLS layer includes two MPLS labels:
3-2
Issue 02 (2010-12-28)
3 Introduction to Services
The external MPLS label is a tunnel label, which is used to create and maintain a tunnel
between PEs at two ends of a service. The tunnel crosses an MPLS network to carry
PWs.
The internal MPLS label is a PW label, which identifies a PW in a tunnel.
l
The forwarder located between the UNI and the NNI mutually forwards the services processed
on the UNI side and the emulation services on the NNI side.
Application Model
The OptiX PTN 950 can access CES services by using the PWE3 technology.
The CES service mainly applies to the wireless service and the enterprise private line service.
The 2G base station or enterprise private line accesses the OptiX PTN 950 by using the TDM
line. The PTN equipment slices and encapsulates the TDM signals into data packets, which are
then transported to the opposite end through the PW in the metropolitan transport network. See
Figure 3-1.
Issue 02 (2010-12-28)
3-3
3 Introduction to Services
Convergence
layer
BSC
Access
layer
BTS
OptiX PTN
910/912
BTS
OptiX PTN
950
OptiX PTN
3900/1900
CES
In the case of a local CES service, it is like that there are two links on the equipment. The CES
service is transmitted upstream over one link and is transmitted downstream over the other link.
Emulation Mode
The OptiX PTN 950 supports CES services of the two modes known as the structured emulation
mode and the unstructured emulation mode.
The structured emulation mode is referred to as structure-aware TDM circuit emulation service
over packet switched network (CESoPSN). In this mode:
l
The equipment senses frame structures, frame alignment modes, and timeslots in the TDM
circuit.
The equipment processes the overhead and extracts the payload in TDM frames. Then, the
equipment delivers timeslots of each channel to the packet payload according to a certain
sequence. Thus, services of each channel in the packet are fixed and visible.
Each data packet that carries the CES service loads a fixed number of TDM frames. The
encapsulation time can be configured from 0.125 ms to 3 ms.
The unstructured emulation mode is referred to as structure-agnostic TDM over packet (SAToP).
In this mode:
3-4
The equipment considers the TDM signals as bit streams at a constant rate instead of sensing
structures in the TDM signals. The entire bandwidth of the TDM signals is emulated.
Issue 02 (2010-12-28)
3 Introduction to Services
In the CESoPSN mode, the OptiX PTN 950 provides the compression function for the idle 64
kbit/s timeslots in the TDM E1 signals, to save the transmission bandwidth.
Service Clocks
TDM services have high requirements for clock synchronization. The OptiX PTN 950 supports
the retiming synchronization mode, and self-adaptation synchronization mode.
In the retiming synchronization mode, the system clock of the PEs are synchronized. For
example, the BITS clock is provided to the PE at the BSC side, and the clock is transmitted to
the PE at the BTS side through the synchronized network. The system clock of the PE equipment
is used as the service clock (retiming). Thus, all the PEs and CEs are synchronized and the service
clocks of the TDM services on all the CEs and PEs are synchronized. See Figure 3-2.
Figure 3-2 Retiming synchronization mode of the CES service clock
CES
BTS
TDM
PE
PE
TDM
BSC
In the self-adaptation synchronization mode, the PE equipment at the ingress side extracts clock
from the TDM interface. The PE equipment at the egress side recovers the TDM clock through
the CES service. See Figure 3-3.
Figure 3-3 Self-adaptation synchronization mode of the CES service clock
Service clock generated
according to the time
stamp in the CES
service
CES
BTS
TDM
PE
PE
TDM
BSC
3-5
3 Introduction to Services
In this way, the ATM service emulation is achieved. The OptiX PTN 950 supports the following
modes to map the ATM cell flow to the PW.
l
1:1 virtual channel connection (VCC) mapping scheme: one VCC is mapped into one PW.
N:1 VCC mapping scheme: N (N32) VCCs are mapped into one PW.
1:1 virtual path connection (VPC) mapping scheme: one VPC is mapped into one PW.
N:1 VPC mapping scheme: N (N32) VPCs are mapped into one PW.
ATM/IMA specifications supported by the OptiX PTN 950 are listed as follows:
l
A maximum of 8 IMA groups can be supported by the ML1 and ML1A boards.
Service Forms
Standardization organizations such as ITU-T, IETF, and MEF stipulate the model frames for
Ethernet services. Table 3-1 lists the model frames. The OptiX PTN 950 adopts the model frame
that is stipulated by MEF.
Table 3-1 Comparison among L2 Ethernet services stipulation
3-6
Service Type
Service
Multiplexing
Transport
Tunnel
IETF
Model
ITU-T
Model
MEF
Model
Point-topoint
service
Line
Physically
isolated
Physically
isolated
EPL
E-Line
Virtual
Line
Physically
isolated
VLAN
EVPL
MPLS
VPWS
VLAN
Physically
isolated
VLAN
MPLS
VPWS
Issue 02 (2010-12-28)
3 Introduction to Services
Service Type
Service
Multiplexing
Transport
Tunnel
IETF
Model
ITU-T
Model
MEF
Model
Multipointtomultipoint
service
LAN
Physically
isolated
Physically
isolated
EPLAN
E-LAN
Virtual
LAN
VLAN
Physically
isolated
EVPLAN
S-VLAN
MPLS
VPLS
Company A
Metro
carrier Ethernet
Nationwide/Global
carrier Ethernet
Company C
Metro
carrier Ethernet
Metro
carrier Ethernet
City 1
Company A
Company B
City 3
E-Line1
City 2
E-Line2
E-Line3
Company C
Company B
Issue 02 (2010-12-28)
3-7
3 Introduction to Services
ISP
Metro
carrier Ethernet
Nationwide/Global
carrier Ethernet
Branch B
Headquarter
Metro
carrier Ethernet
Branch A
Metro
carrier Ethernet
City 1
Branch B
City 3
City 2
VLAN1
VLAN2
VLAN3
Branch A
Branch B
Branch A
3.5 IP over PW
IP over PW services are private line services provided by the PTN equipment. In the case of IP
over PW services, IP packets are encapsulated into PWs for transmission.
Feature Overview
With the growth of wireless networks, the number of base stations that support IP interfaces is
greatly increased, and therefore mobile backhaul networks need to access base station services
through IP packets.
3-8
Issue 02 (2010-12-28)
3 Introduction to Services
If services are accessed through a traditional L3VPN solution, the restrictions are as follows:
l
The access equipment at the edge of a backhaul network must have strong routing
capability. This increases the cost of the access equipment.
On a mobile backhaul network, the trail between a base station and an RNC is fixed. Therefore,
if you create IP over PW services between the base station and RNC, the services can fully satisfy
service bearing requirements. In the case of IP over PW services, IP packets are encapsulated
into PWs. In this manner, IP services from base station are accessed. In addition, features of
private line services such as simple networking, easy management, and complete protection are
maintained.
Networking
As shown in Figure 3-6, an IP over PW service is created between the OptiX PTN 910/950 and
OptiX PTN 1900/3900/3900-8 for each base station.
The OptiX PTN 910/950 encapsulates IP packets from base stations into a PW, and sends the
PW over an IP over PW to the OptiX PTN 1900/3900/3900-8. The OptiX PTN
1900/3900/3900-8 decapsulates the packets and sends the packets to an RNC. In this manner,
UNI-NNI service transmission is implemented.
Figure 3-6 Deployment of IP over PW services
IP over PW
IP over PW
IP over PW
NodeB
RNC
NOTE
IP over PW services for PTN equipment support the DHCP relay function. That is, a base station can obtain
its IP address through DHCP.
A complete protection mechanism for IP over PW services on PTN equipment is available. For
details, see Protection for IP over PW Services.
Issue 02 (2010-12-28)
3-9
4 QoS
QoS
Issue 02 (2010-12-28)
4-1
4 QoS
4.1 DiffServ
A DS (DiffServ) domain consists of a group of network nodes (DS nodes) that provide the same
service policy and realize the same PHB.
As an end-to-end QoS control model, DiffServ is easy to configure and scale.
Figure 4-1 shows the application of the DiffServ model.
Figure 4-1 Networking diagram for the DiffServ model
DS node
DS domain
Non-DS node
DS node
DS node
Non-DS node
DS nodes are classified into edge DS nodes and interior DS nodes. The edge DS nodes classify
the flows that enter the DS domain and mark different PHB service classes for various flows.
The interior DS nodes perform flow control according to the PHB service classes.
As a node in the DS domain, the PTN equipment uses the following technologies to realize endto-end QoS control:
l
Flow classification
The PTN equipment supports simple flow classification.
Simple flow classification
The priorities of the accessed packets are mapped into the specified PHB service class
so that a uniform PHB service is provided for the packets traversing the DS domain.
Simple flow classification mainly applies to the interior DS nodes. All nodes in a DS
domain must adopt the same rule for simple flow classification.
The PTN equipment can access Ethernet, IP, and MPLS packets, and supports the
mutual mapping between VLAN priority, IP DSCP, MPLS EXP and PHB service class.
CAR control
Committed access rate (CAR) applies to the access side of the PTN equipment to perform
dual-rate three-color management for the accessed traffic.
When the traffic is lower than the committed information rate (CIR), packets are marked
as green and are normally let through. When the traffic is higher than the CIR but lower
than the peak information rate (PIR), the packets that exceed the CIR are marked as yellow
but are normally let through. When the traffic exceeds the PIR, the packets that exceed the
PIR are marked as red and are directly discarded.
The PTN equipment supports two color-marking modes, that is, color-blind and coloraware. In color-aware mode, a proper color is marked for the packets according to the
current packet color. This is how the color-aware mode differs from the color-blind mode.
The PTN equipment supports the configuration of the processing modes for packets with
different colors.
4-2
Issue 02 (2010-12-28)
4 QoS
NOTE
The PTN 910 and PTN 950 only support the color-blind mode.
Congestion management
In case of network congestion, the equipment drops packets by using a specific policy to
ensure QoS of high-priority services.
There are three common policies of packet dropping:
Trail drop policy
When the queue is full, packets that arrive later are dropped.
Random early detection (RED) policy
In the case of the RED policy, when the queue reaches a certain length, packets are
randomly dropped. This policy avoids global synchronization caused by the TCP slowstart mechanism.
Weighted random early detection (WRED) policy
In the case of the WRED policy, packets are dropped according to the queue length and
priorities of packets (color). The user can configure the sequence in which packets are
dropped so that the packets with high drop priorities are dropped at the earlier time and
with a higher drop possibility.
The PTN equipment supports the tail drop policy and WRED policy, and supports the
configuration of the drop start point and drop probability in the case of the WRED policy.
NOTE
The PTN 910 and PTN 950 do not support the tail drop policy.
Queue scheduling
In case of congestion, the PTN equipment provides the ensured QoS for services at the
higher service class by using different queue scheduling schemes. The PTN equipment
adopts two queue scheduling schemes, that is, priority queuing (PQ) and weighted fair
queuing (WFQ).
Table 4-1 lists the features and application of the two queue scheduling schemes.
Table 4-1 Queue scheduling and application
Issue 02 (2010-12-28)
Sched
uling
Schem
e
Basic Concept
Scheduling Feature
Application on
PTN Equipment
PQ
PQ refers to a queue
scheduling scheme in which
packets in queues are
scheduled strictly according
to the queue priority. Only
when the queues of higher
priorities are empty, the
packets in the queues of
lower priorities can be
transmitted.
4-3
4 QoS
Sched
uling
Schem
e
Basic Concept
Scheduling Feature
Application on
PTN Equipment
WFQ
This scheduling
scheme not only
ensures low delay for
forwarding packets in
queues of higher
priorities, but also
ensures effective
processing of packets in
queues of lower
priorities.
NOTE
The PTN equipment does not provide any QoS for queues of the lowest priorities (providing BE
service). In case of congestion, the PTN equipment does not schedule the queues at the BE service
class.
4.2 HQoS
When working as an edge DS node, the PTN equipment supports HQoS control.
To increase the QoS control efficiency on the entire network, the edge nodes perform HQoS
control and the interior nodes perform only simple QoS processing.
Compared with the traditional QoS, HQoS provided by the PTN equipment has the following
advantages:
l
Hierarchical scheduling mechanism, which realizes the scheduling based on port, tunnel,
and QinQ link. Thus, the QoS control granularities are further divided.
Hierarchical flow control mechanism, which realizes flow control based on port, tunnel,
and QinQ link. Thus, service QoS can be fully controlled.
Configurable WFQ and WRED policies, which increase the flexibility in QoS control.
Figure 4-2 shows where HQoS functions and how the QoS processing is performed.
4-4
Issue 02 (2010-12-28)
4 QoS
Access side
QoS function
point
Port
V-UNI
Apply
V-UNI
ingress policy
QoS
processing
Apply
port
policy
Apply
V-UNI
ingress policy
Tunnel
QinQ
Control
tunnel
bandwidth
Apply QinQ
policy
Port
Apply
port
policy
Service flow
On the access side, there are function points of the port policy on the physical ports, where the
QoS functions such as congestion management, queue scheduling and flow shaping are
performed. Then, at the function points of the V-UNI ingress policy, the QoS functions such as
flow classification, priority mapping, congestion management, and queue scheduling are
performed.
On the network side, at the function points of QinQ policy or tunnel, the bandwidth limitation
is performed on the QinQ link or the tunnel. Finally, at the function points of the egress port
policy, the QoS functions such as congestion management, queue scheduling and flow shaping
are performed.
Issue 02 (2010-12-28)
4-5
5 OAM
OAM
Issue 02 (2010-12-28)
5-1
5 OAM
a link failure occurs in a remote link, a standby link is activated to implement the network level
protection.
5-2
Issue 02 (2010-12-28)
5 OAM
Functions
The MPLS OAM mechanism can effectively detect, confirm, and locate the internal defects of
an MPLS-layer network, and thus can monitor the network performance. The equipment can
trigger protection switching based on the OAM detection status to implement quick fault
detection and service protection.
The OptiX PTN equipment provides the following MPLS OAM functions:
l
Use the hardware that supports the identification of the sending, receiving, and timing out
of a connectivity verification (CV), fast failure detection (FFD), forward defect indicator
(FDI) or backward defect indicator (BDI) message, implementing the fast connectivity
verification and failure indication.
Support the ping and traceroute commands of MPLS tunnels, facilitating the fault detection
and location.
Detect the performance of MPLS tunnels and monitor packet loss ratio, delay, and delay
variation by using the hardware.
Application Scenario
Table 5-1 shows the application scenarios of the MPLS Tunnel OAM.
Table 5-1 Application scenarios of the MPLS Tunnel OAM
OAM Function
Function Description
Application Scenario
CV/FFD/FDI/BDI
Connectivity check
Ping
Connectivity check
Single-ended location or
single-ended detection
Traceroute
Fault location
Performance monitoring
5.2 PW OAM
The PW OAM provides the complete fault detection and location mechanisms and the
performance monitoring function at the PW layer.
Functions
The PW OAM mechanism can effectively detect, confirm, and locate the internal defects of a
PW-layer network, and thus can monitor the network performance. The equipment can trigger
Issue 02 (2010-12-28)
5-3
5 OAM
protection switching based on the OAM detection status to implement quick fault detection and
service protection.
The OptiX PTN equipment provides the following PW OAM functions:
l
Support the ping and traceroute commands of PWs, and the virtual circuit connectivity
verification (VCCV) command of ATM PWs and CES PWs, thus facilitating the fault
detection and location.
Detect the performance of PWs and monitor packet loss ratio, delay, and jitter by using the
hardware.
Since the PW is bidirectional, in the case that the equipment detects a fault in one direction
of a PW, the equipment notifies the fault message in the other direction of the PW to keep
the statuses of the two directions of the PW consistent.
Application Scenario
Table 5-2 shows the application scenarios of the PW OAM.
Table 5-2 Application scenarios of the PW OAM
OAM Function
Function Description
Application Scenario
CV/FFD
Connectivity check
Real-time PW status
detection
VCCV
Connectivity check
Single-ended location or
single-ended detection
Traceroute
Fault location
PW route detection
Performance monitoring
PW performance monitoring
Definition
OAM is the method of monitoring and diagnosing network faults. Ethernet OAM is defined as
"link fault management" in the IEEE 802.1ag and is performed based on the Ethernet service
traffic. It provides an end-to-end fault detection, fault location, and performance detection for
the entire Ethernet. The Ethernet service OAM is performed by using continuity check (CC),
loopback (LB), and link trace (LT) detecting methods.
Issue 02 (2010-12-28)
5 OAM
services gains increasing attention. Currently, the methods of maintaining Ethernet Layer 2 are
limited, and thus operating, managing, and maintaining Ethernet services ona transport network
are limited. To solve the problems associated with the OAM on the transport network, the
Ethernet service OAM is developed.
The Ethernet service OAM provides an end-to-end fault detection method and implements the
following functions:
l
CC
During the unidirectional CC detection, the source MEP constructs and transmits CC frames
periodically. The destination MEP receives the CC frames and directly starts the CC function.
If the destination MEP does not receive a CC frame from the source MEP in a period (for
example, 3.5 times the transmission period), the destination MEP reports an ETH_CFM_LOC
alarm automatically, as shown in Figure 5-1.
Figure 5-1 CC detection diagram
CC
MEP
CC
MIP
MIP
MIP
MIP
MEP
LB
During the LB detection, the source MEP constructs and transmits an LBM frame and starts the
timer for timing. If the destination MEP or MIP receives the LBM frame, it constructs and
transmits an LBR frame to the source MEP. The LB detection is successful. If the source MEP
timer times out, the LB detection fails, as shown in Figure 5-2.
Figure 5-2 LB detection diagram
LBR
LBM
MEP
MIP
MIP
MIP
MIP
MEP
LT
During the LT detection, the source MEP constructs and transmits LTM frames and starts the
timer for timing. All the MIPs on the link forward the LTM frames. All the MEPs and MIPs on
Issue 02 (2010-12-28)
5-5
5 OAM
the link that receive the LTM frames transmit LTR frames as response. Based on these LTR
frames, you can determine all the MIPs on the path from the source MEP to the destination MEP.
If the source MEP timer times out, the LT detection fails. as shown in Figure 5-3.
Figure 5-3 LT detection diagram
LTR
LTM
MEP
LTR
LTM
MIP
LTR
LTM
MIP
LTR
LTM
MIP
L TR
LTM
MIP
LTM
MEP
Application
The Ethernet service OAM is a service-specific end-to-end detection method and is mainly
applicable to the core layer, as shown in Figure 5-4.
Figure 5-4 Application scenarios of the Ethernet service OAM
Access Layer
Access Layer
P
PSN
CE
PE
PE
CE
CE
CE
P
Core Layer
Custom Layer
Custom Layer
LSP
Table 5-3 lists the application scenarios of the CC, LB, and LT detection methods.
Table 5-3 Application scenarios of the detection methods of the Ethernet service OAM
5-6
OAM Function
Function Description
Application Scenario
CC
Unidirectional connectivity
check
LB
Bidirectional connectivity
check
Single-ended location or
single-ended detection
LT
Issue 02 (2010-12-28)
5 OAM
NOTE
For an Ethernet service that exclusively uses a UNI port, if Encapsulation Type is set to QinQ for the
UNI port, an LB or LT test cannot be performed on the service.
Functions
The Ethernet port OAM, based on 802.3ah, is used to handle the "last mile" problem for the
Ethernet OAM. The Ethernet port OAM can also be used to check the connectivity and
performance of the physical Ethernet links between two equipment. The Ethernet port OAM,
based on port, is applicable to the scenario where the physical Ethernet ports are directly
connected.
The Ethernet port OAM has the following functions:
l
Discovery: checks whether the opposite equipment supports the IEEE 802.3ah OAM
function.
Remote fault detection: detects the remote fault through notifications from the remote end.
Link performance event notification: The local end can notify the remote end of the
performance events that exceed the configured threshold.
Application Scenario
The Ethernet port OAM function is a method of checking the connectivity and performance of
the physical link. The Ethernet port OAM is mainly used for Ethernet ports that are directly
connected through network cables.
5-7
5 OAM
As shown in Figure 5-5, the fault in Node B or an RNC mainly refers to faulty services on Node
B or the RNC. When such a fault occurs, the PTN equipment interconnecting with Node B or
the RNC needs to receive the OAM cells that are inserted into the cell flow in Node B or the
RNC, and transmit transparently the OAM cells (including AIS, RDI, and CC cells) to the peer
end. If the segment end attribute of the connection is set for the PTN equipment, the OAM cells
can be captured on the PTN equipment. In this case, simulate a scenario where an RNC or Node
B sends the ATM OAM cells and the PTN equipment captures and reports these cells in the UNI
side.
Figure 5-5 ATM faults at Node B and an RNC
Node B fault
Node B
RNC fault
PE
PE
RNC
Figure 5-6 shows the faults in the NNI side. The PTN equipment provides two functions in this
scenarios.
l
To verify the OAM function in the NNI side, check whether the LB, CC, and segment end
attribute are processed successfully.
To insert the AIS cells in the UNI side when an exception occurs in links in the NNI side.
Node B
PE
PE
RNC
5.6 BFD
Bidirectional forwarding detection (BFD) is a fault detection function that features light load
and short duration. The BFD can detect faults over any type of channels between systems,
including the directly-connected physical links, virtual trails, tunnels, and multi-hop routes.
Functions
The BFD can implement fast detection on the communication faults over neighbor systems.
Specifically, detection packets are periodically transmitted on the inter-system channel where
5-8
Issue 02 (2010-12-28)
5 OAM
the BFD session is set up. If a system fails to receive the detection packets from the opposite
system in a certain time, the system considers that the bidirectional channel connected to the
neighbor system becomes faulty. In this case, when a fault occurs, a substitute channel can be
quickly set up or the service can be quickly switched to other links. The BFD is similar to the
neighbor detection parts of many routing protocols, but the BFD takes less time to detect faults.
The packets transmitted by the BFD are the User Datagram Protocol (UDP) packets.
The BFD has the following functions:
l
Performs fault detection that features light load and short duration on the channel where
the BFD session is set up.
Adopts a uniform mechanism to detect faults on any medium and any protocol layer in a
real-time manner.
Reduces the service data loss. Compared with the hello mechanism, the BFD detects faults
in microseconds. When the data is transmitted at a high rate, the BFD can effectively reduce
the service data loss.
Networking Application
The BFD is mainly used to detect the link status. As shown in Figure 5-7, NE 1 and NE 2 are
connected to the broadband network gateway (BNG) to access broadband TV (BTV) services.
Link 1 and link 2 provide mutual standby for each other. The BFD detects any fault on the link
between NE 1 and BNG 1, and the link between NE 2 and BNG 2.
Assume that a link failure occurs on link 1 between BNG 1 and NE 1. With the BFD, NE 1
detects the link failure.
Figure 5-7 BFD networking application
3-EF8F-2(PORT-2)3-EF8F-4(PORT-4)
BFD
Access Node
BNG1
3-EF8F-1(PORT-1)
NE1
BFD
Access Node
3-EF8F-1(PORT-1)
BNG2
NE2
3-EF8F-2(PORT-2)3-EF8F-4(PORT-4)
Link 1
Access Node
Link 2
5.7 LPT
The Link State Pass Through (LPT) is a function of transferring the link state from one end of
a network to the other end. In this manner, the other end can act based on the remote state. When
Issue 02 (2010-12-28)
5-9
5 OAM
a link failure occurs in a remote link, a standby link is activated to implement the network level
protection.
Functions
The LPT detects any fault that occurs at the service access point or in the intermediate
transmission network, and asks the equipment at both ends of a transmission network to start up
the backup network immediately to retain communication. In this way, important data can still
be successfully transmitted.
Application Scenario
Figure 5-8 shows how the LPT function is applied. The LPT function is used to detect the fault
that occurs on an access link or a service network.
Figure 5-8 Application scenario of LPT
Backup
network
NE2
Service network
Port1
Router A
NE1
Port2
Port1
Port2
Router B
Protection link
Working link
Normally, the data between router A and router B is transmitted through a service network.
When a link between router A and NE1 becomes faulty, router A fails to communicate with
router B. When a link fault occurs, the important data of VIP users must still be normally
transmitted. After the LPT function is enabled, faults between the service access point and
intermediate network can be detected and notified.
As shown in Figure 5-8, if a fault occurs on a link between router A and NE1 or occurs in the
service network, after the PTN equipment detects the fault, the master port of NE1 (Port1) can
transmit the fault information to the slave port of NE1 (Port2), and the master port of NE2 (Port1)
can transmit the fault information to the slave port of NE2 (Port2). Services at the slave port can
be switched to the standby link in time, and the services are switched to the active link after the
PTN equipment detects that the fault is rectified. Hence, the system must detect and notify a
fault in time, and start a backup network to retain communication. The backup network can be
of many forms, such as a microwave network or a leased link. In this manner, the network-level
protection is implemented.
5-10
Issue 02 (2010-12-28)
6 Protection
Protection
Issue 02 (2010-12-28)
6-1
6 Protection
Protection Scheme
Revertive Mode
Non-revertive
Issue 02 (2010-12-28)
6 Protection
6-3
6 Protection
exchanged between the two ends. The equipment at the two ends performs service switching
according to the protocol state and switching state.
NOTE
l The MPLS Tunnel 1+1 protection may be bidirectional or unidirectional. The MPLS Tunnel 1:1
protection can only be bidirectional.
l In the case of unidirectional MPLS Tunnel 1+1 protection, the destination end receives packets from
the protection Tunnel when detecting any fault of the working Tunnel. In this case, switching based
on the APS protocol is not necessary.
E1
BTS
Protection tunnel
OptiX PTN
3900/1900
In the case of MPLS Tunnel 1+1 protection, services are dually fed and selectively received.
When the working Tunnel fails, the receive end selects services in the protection Tunnel. In this
way, services are switched.
l
Detection method:
At the physical layer, the loss of signal is detected in milliseconds.
At the link layer, the detection is conducted by MPLS OAM in 10 ms.
Switching process: The receive end selects services according to the link state.
E1
BTS
Protection tunnel
OptiX PTN
3900/1900
In the case of MPLS Tunnel 1:1 protection, services are transported in the working Tunnel.
When the working Tunnel fails, services are switched to the protection Tunnel. In this case,
6-4
Issue 02 (2010-12-28)
6 Protection
services are singly fed and received. The APS protocol information is transported through the
protection Tunnel, so that the protocol state information and the switching state information are
exchanged between the two ends. The equipment at the two ends switches and selects the services
according to the protocol state and switching state.
l
Detection method:
At the physical layer, the loss of signal is detected in milliseconds.
At the link layer, the detection is conducted by MPLS OAM in 10 ms.
Switching process: After a negotiation using the APS protocol, the transmit end switches
the service to the protection Tunnel, and the receive end selects the service from the
protection Tunnel.
Protection Parameters
Table 6-2 lists the parameters of the MPLS Tunnel 1:1 protection.
Table 6-3 lists the parameters of the MPLS Tunnel 1+1 protection.
Table 6-2 Parameters of the MPLS Tunnel 1:1 protection
Switching
Type
Revertive
Mode
Switching
Protocol
Switching
Time
Switching
Delay
Time
Default
WTR Time
1:1 dualended
switching
Nonrevertive
APS
50 ms
0s to 10s (0
by default)
1:1 dualended
switching
Revertive
APS
50 ms
0s to 10s (0
by default)
5 minutes
NOTE
If the MPLS Tunnel in the protection group passes through the xDSL network (Offload scenarios), the
MPLS Tunnel 1:1 protection switching time is less than 100 ms.
Issue 02 (2010-12-28)
6-5
6 Protection
Revertive
Mode
Switching
Protocol
Switching
Time
Switching
Delay Time
Default WTR
Time
1+1 singleended
switching
Nonrevertive
50 ms
0s to 10s (0 by
default)
1+1 dualended
switching
Nonrevertive
APS
50 ms
0s to 10s (0 by
default)
1+1 singleended
switching
Revertive
50 ms
0s to 10s (0 by
default)
5 minutes
1+1 dualended
switching
Revertive
APS
50 ms
0s to 10s (0 by
default)
5 minutes
NOTE
If the MPLS Tunnel in the protection group passes through the xDSL network (Offload scenarios), the
MPLS Tunnel 1+1 protection switching time is less than 100 ms.
6-6
Issue 02 (2010-12-28)
6 Protection
Working Tunnel
Protection Tunnel
Protection Type
Scenario 1
IP/GRE tunnel
MPLS tunnel
Offload protection
Scenario 2
IP/GRE tunnel
IP/GRE tunnel
Offload protection
Scenario 3
MPLS tunnel
MPLS tunnel
MPLS APS
protection
By default, the offload protection group supported by the PTN equipment uses the dual-ended
1:1 protection, which cannot be set. Services are singly fed at the transmit end and dually received
at the receive end.
NOTE
l To reduce bandwidth of the network where the protection tunnel resides as much as possible, the PTN
equipment supports revertive 1:1 offload protection, because reliability and leasing cost of the network
are high. Table 6-4 lists the revertive type of each scenario.
l Hence, the switching mode of the offload protection group supported by the PTN equipment is dualended, because the BFD session is bidirectional.
PTN
910/950
DSLAM
ATM
Backhaul network
PTN
3900
RNC
MPLS OAM
Working TunnelIP/GRE Tunnel
Protection TunnelMPLS Tunnel
Issue 02 (2010-12-28)
6-7
6 Protection
IMA
Node B
ATM
WMS Network
PTN
910/950
PTN
3900
RNC
BFD
Working TunnelIP/GRE Tunnel
Protection TunnelIP/GRE Tunnel
Parameters
Table 6-5 lists parameters for offload protection.
6-8
Issue 02 (2010-12-28)
6 Protection
APS
Protoco
l
Protecti
on Type
Switchi
ng
Mode
Reverti
ve
Mode
Switchi
ng
Time
Switchi
ng
Delay
Time
Default
Restora
tion
Time
(100 ms)
An
MPLS
tunnel
protects
an IP/
GRE
tunnel
An IP/
GRE
tunnel
protects
an IP/
GRE
tunnel
Enables
the APS
protocol.
1:1
Dualended
Revertiv
e, nonrevertive
50 ms
(the
working
tunnel
transmits
BFD
packets
in a
period of
3.3 ms)
0-100 (0
by
default)
5 min
Does not
enable
the APS
protocol
and
triggers
the
switchin
g
through
BDI.
1:1
Dualended
Revertiv
e
50 ms
(the
working
tunnel
transmits
BFD
packets
in a
period of
3.3 ms)
0 (not
settable)
1 min
(not
settable)
Does not
enable
the APS
protocol
and
triggers
the
switchin
g
through
BDI.
1:1
Dualended
Revertiv
e
50 ms
(the
working
and
protectio
n tunnels
transmit
BFD
packets
in a
period of
3.3 ms)
0 (not
settable)
1 min
(not
settable)
Issue 02 (2010-12-28)
6-9
6 Protection
6.3.3 PW APS
As a network protection mechanism, PW automatic protection switching (APS) is intended to
protect the services on the working PW with a protection PW. That is, when the working PW is
faulty, the services on the working PW are switched to the protection PW. In this manner, the
services on the working PW are protected.
Functions
In the case of PW APS, PW OAM functions to detect the status of the working PW and protection
PW. When PE equipment detects a fault on the working PW, the PE equipment at both ends
performs PW APS protection switching by exchanging the APS protocol. Then, the services on
the working PW are switched to the protection PW. In this manner, the services are protected.
The APS protocol is transported over the protection PW.
Networking Application
Figure 6-5 shows an APS protection group. A working PW, a protection PW, and a PW APS
protection group are created between PE1 and PE2. Normally, the service is transported over
the working PW. When the working PW is faulty, the service is switched to the protection PW.
Figure 6-5 PW APS networking
PW APS
NodeB/BTS
PW APS
Working PW
PW1
PE1
NodeB/BTS
PW2
PW3
PW4
Protection PW
RNC/BSC
PE2
Supported Features
Currently, the PTN equipment supports only 1:1 PW APS protection in dual-ended switching
mode.
PW APS also provides protection for PWs of the CES, ATM, E-Line, and E-LAN services.
Tunnel APS cannot be configured for the tunnels that accommodate the working PW and
protection PW of a PW APS protection group. That is, tunnel APS and PW APS cannot co-exist
on the same tunnel.
Only one type of protection can be configured for a PW. That is, only PW APS or PW redundancy
can be configured for a PW.
6-10
Issue 02 (2010-12-28)
6 Protection
OptiX PTN 3900, OptiX PTN 3900-8 and OptiX PTN 1900 do not support PW redundancy. When the
non-dual-homing nodes require PW redundancy, the equipment on the dual-homing nodes must support
PW redundancy.
NOTE
Scenario
ATM/
CES
emulatio
n service
MC-LMSP
BTS/NodeB
BSC
/RNC
PE2
W
P
Working
DNI-PW
Protection
MC synchronization
communication
PW
redundancy PW1
PE3
PE1 MC-LMSP
W
PW2
BTS/NodeB
BSC
/RNC
PE2
Issue 02 (2010-12-28)
Working
Protection
MC synchronization
communication
Protecti
on
Scheme
Protecti
on
Point
Dualhoming
nodes,
AC-side
links of
dualhoming
nodes,
and
service
PWs
Dualhoming
nodes
and ACside
links of
dualhoming
nodes
6-11
6 Protection
Protecte
d
Service
Scenario
E-Line
service
PE3
PW APS
MC-PW APSPE1MC-LAG
W
A
BTS/NodeB
BSC
/RNC
Protecti
on
Scheme
Protecti
on
Point
Dualhoming
nodes,
AC-side
links of
dualhoming
nodes,
and
service
PWs
1:1 PW
redundan
cy
protectio
n and
MCLAG
Dualhoming
nodes
and ACside
links of
dualhoming
nodes
PE2
A
Active
DNI-PW
Standby
MC synchronization
communication
PW redundancy
PW1
PE3
PE1 MC-LAG
A
PW2
BTS/NodeB
BSC
/RNC
PE2
Active
Standby
MC synchronization
communication
NOTE
Two system control boards (active and standby) must be configured for each dual-homing node.
NOTE
When PW redundancy protection is deployed on the NNI side, APS protection can be configured for the bearer
tunnels for service PWs. Then, the NNI-side PWs can be protected but the S-PE node on a multi-segment PW
(MS PW) cannot be protected.
When a service is transported over MC PWs, it is recommended to deploy MC-PW APS protection on the NNI
side.
NOTE
6-12
Issue 02 (2010-12-28)
6 Protection
NOTE
The coupling relations among the dual-homing protection schemes and other protection schemes are as follows:
l When PW APS protection is configured, LMSP protection can be configured for the NNI ports on the PE
equipment at both ends of the PWs.; neither APS protection nor FRR protection, however, can be configured
for the bearer tunnels.
l When 1+1 PW redundancy protection is configured, 1+1 APS protection can be configured for the bearer
tunnels of the PWs, but neither 1:1 APS protection nor FRR protection can be configured; 1+1 LMSP
protection can be configured for the NNI ports on the PE equipment at both ends of the PWs, but 1:1 LMSP
protection cannot be configured.
l When 1:1 PW redundancy protection is configured, APS protection and FRR protection can be configured
for the bearer tunnels of the PWs, and LMSP protection can also be configured for the NNI ports on the
equipment at both ends of the PWs.
Table 6-7 lists the details on how the PTN equipment supports various factors of dual-homing
protection.
Table 6-7 Support for various factors of dual-homing protection
Factor
Support
Remarks
Service type
l E-Line service
PW APS
PW
redundancy
protection
Dynamic SS PW
Dynamic MS PW (each
segment of a PW is dynamic)
Normal Running
As shown in Figure 6-6, nodes A and B are connected through PW1. Nodes A and C are
connected through PW2. PW1 and PW2 protect each other.
In normal cases, packets are sent to node B over PW1 and then to the RNC.
Issue 02 (2010-12-28)
6-13
6 Protection
NodeB
RNC
Service Route
Equipment Fault
Figure 6-7 shows the situation where switching occurs when node B is faulty.
Figure 6-7 Protection switching for IP over PW services in case of an equipment fault
B
PW1
A
PW2
C
B
PW1
A
PW2
C
NodeB
Service Route
RNC
6-14
When node B is faulty, node A detects the fault through MPLS APS and PW
redundancy, and then node A switches to PW2.
Node C detects the fault of node B through the routing protocol, and then node C updates
the route information and accepts the packets sent by node A.
Issue 02 (2010-12-28)
6 Protection
Link Fault
Figure 6-8 shows the situation where switching occurs when the link between nodes A and B
is faulty.
Figure 6-8 Protection switching for IP over PW services in case of a link fault
B
PW1
A
PW2
C
B
PW1
A
PW2
C
RNC
NodeB
Service Route
Node A detects that PW1 is faulty through MPLS APS and PW redundancy, and therefore
node A switches services to PW2.
Through the routing protocol, node B updates route information and accepts the packets
sent by node C.
Issue 02 (2010-12-28)
Detour mode: Refers to one-to-one backup. In the detour mode, LSPs are protected
separately, that is, one protection LSP is specially created for each protected LSP. This
protection LSP is called a detour LSP.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
6-15
6 Protection
Bypass mode: Refers to facility backup. In the bypass mode, one protection LSP is used to
protect multiple LSPs. This protection LSP is called a bypass LSP.
Point of local repair (PLR): The PLR is the ingress node of a detour LSP or bypass LSP.
It must be on the working LSP and cannot be the egress node.
Merge point (MP): The MP is the egress node of a detour LSP or bypass LSP. It must be
on the working LSP and cannot be the ingress node.
Link protection: In link protection, the PLR and the MP are directly connected by a link
and the working LSP passes through this link. When this link fails, the services can be
switched to a detour LSP or bypass LSP.
Node protection: In node protection, the PLR and the MP are connected by a node and the
working tunnel passes through this node. When this node fails, the services can be switched
to a detour LSP or bypass LSP.
PLR
MP
Working tunnel
Bypass tunnel
In the working tunnel is marked in blue, and the bypass tunnel is marked in red. FRR provides
protection for the B-C link and node C that are connected to the PLR. When the B-C link or
node C fails, services on the working tunnel is switched to the bypass tunnel. After the switching,
the path information of the original LSP is deleted.
6-16
Issue 02 (2010-12-28)
6 Protection
6.3.7 LMSP
In the linear multiplex section protection (LMSP), the protection path protects the service that
is transported in the working path. When the working path is faulty, the service is switched to
the protection path. The 1+1 protection adopts the dual fed and selective receiving mechanism,
and the 1:1 protection adopts the single fed and single receiving mechanism. The LMSP
protection scheme is designed for STM-1 interface, for examples, the boards that provide
channelized STM-1 ports (accessing ML-PPP).
1+1 LMSP
Figure 6-10 shows the 1+1 LMSP supported by the equipment.
Figure 6-10 1+1 LMSP
NE2
NE1
Working channel
Selective
receiving
Dual fed
Protection channel
In the case of 1+1 LMSP, services are dually fed and selectively received. When the working
path is faulty, the receive end selects the service from the protection path. In this way, the service
switching is realized.
l
Detection method: The LOS alarm, LOF alarm, MS_AIS alarm, B1 bit errors, or B2 bit
errors are detected at the physical layer.
Switching process: The receive end selects services according to the link state.
1:1 LMSP
Figure 6-11 shows the 1:1 LMSP supported by the equipment.
Figure 6-11 1:1 LMSP
NE2
NE1
Working channel
Single
receiving
Single fed
Protection channel
In the case of 1:1 LMSP, services are transported through the working path. When the working
path fails, services are switched to the protection path. In this case, services are singly fed and
Issue 02 (2010-12-28)
6-17
6 Protection
received. The APS protocol information is transported through the protection path, so that the
protocol state information and the switching state information are exchanged between the two
ends. The equipment at the two ends switches and selects the services according to the protocol
state and switching state.
l
Detection method: The LOS alarm, LOF alarm, MS_AIS alarm, B1 bit errors, or B2 bit
errors are detected at the physical layer.
Switching process: The receive end selects services according to the link state.
Protection Parameters
Table 6-8 lists the parameters of the 1+1 and 1:1 LMSP.
Table 6-8 Parameters of the 1+1 and 1:1 LMSP
Switching
Type
Revertive
Mode
Switching
Protocol
Switching
Time
Switching
Delay Time
Default WTR
Time
1+1 singleended
switching
Nonrevertive
Not
required
50 ms
0s to 10s (0 by
default)
1+1 dualended
switching
Nonrevertive
APS
50 ms
0s to 10s (0 by
default)
1+1 singleended
switching
Revertive
Not
required
50 ms
0s to 10s (0 by
default)
5 minutes
1+1 dualended
switching
Revertive
APS
50 ms
0s to 10s (0 by
default)
5 minutes
1:1 dualended
switching
Revertive
APS
50 ms
0s to 10s (0 by
default)
5 minutes
Issue 02 (2010-12-28)
6 Protection
failure on any link, the service is switched to other physical links with the media of the same
category in the LAG. The links in an LAG are not distinguished by the working and protection
attributes.
Figure 6-12 shows the Ethernet LAG protection supported by the equipment.
Figure 6-12 Ethernet LAG protection
Access
Inter-board
LAG
...
Ethernet board
Intra-board
LAG
Switching board
Ethernet board
Switching board
...
Ethernet board
Access
Ethernet board
The link reliability is improved. The service flow on the failed link can be transmitted by
other available links.
Non load sharing is provided. This provides a hot standby scheme for the links.
Manual aggregation
Static aggregation
For failed links, the equipment supports the following revertive modes:
l
Revertive
Non-revertive
Load sharing
Manual Aggregation
The manual bundling of ports does not require the link aggregation control protocol (LACP).
On the OptiX PTN 950, multiple physical Ethernet ports can be bundled as one logical port.
With the port bundling technology, the transmission bandwidth between equipment can be
increased without a hardware upgrade, and the link reliability is also improved.
Issue 02 (2010-12-28)
6-19
6 Protection
After the setting of an LAG, if the load sharing is adopted, the equipment automatically enables
the load sharing among the physical ports that are bundled as a logical port. When one physical
port fails, the traffic on the failed port is automatically shared by other physical ports. When the
failed port recovers, the traffic is reallocated to ensure that the load is shared among all ports in
the LAG.
After the setting of an LAG, if the non load sharing mode is adopted, only one member link has
traffic and the standby member link is in the standby state. When the active member link fails,
the system activates the standby member link to shield the link failure.
Static Aggregation
The static aggregation of links requires the LACP protocol.
The OptiX PTN 950 supports the LACP protocol that complies with IEEE 802.3ad. After the
administrator creates an LAG group or adds member ports into an LAG group, the equipment
automatically enables the LACP protocol for the new member ports of the LAG. By exchanging
LACP packets, two interconnected equipment negotiate which ports can be used to forward data,
and thus determine whether an egress port is in the selected state.
The LACP protocol maintains the link state according to the port state. When aggregation
conditions change, the link aggregation is automatically adjusted or dismantled. Among the
member links of an LAG, the load sharing modes can function based on ports, MAC addresses,
IP addresses, or MPLS labels.
..
.
Link
Service processing
module
Switching module
After the service signals are switchinged through the switching module to the service processing
module, the service signals are transmitted through the multiple bundled links. In this way, the
load sharing and protection are realized for the board ports on the network side. The bundled
links are not distinguished by the working and protection attributes.
l
Detection method:
At the physical layer, the loss of signal and the port link state are detected in
microseconds.
6-20
Issue 02 (2010-12-28)
6 Protection
At the link layer, the link layer state is detected by the ML-PPP protocol in milliseconds.
l
Switching process: The receive end selects services according to the link state.
Link 3
IMA group
In IMA protection, when one link in the IMA group fails, the cell load is shared by other normal
links. In this way, the service is protected.
l Instance: Equipment that runs the MSTP may have multiple spanning trees at the same time. Each
spanning tree is referred to as a multiple spanning tree instance. In this way, these spanning trees can
be distinguished.
l Region: A region refers to a group of interconnected switching equipment that have the same VLANto-instance mapping relations.
Bridge protocol data units (BPDUs) that carry region and instance information are transmitted
among equipment. According to the BPDU information, the equipment determines whether it
Issue 02 (2010-12-28)
6-21
6 Protection
belongs to a specific region. Several spanning tree instances can be run within a region, and only
one spanning tree can be run among regions.
Figure 6-15 shows a switching network that has multiple VLANs.
Figure 6-15 Switching network with multiple VLANs
NE1 ROOT
10, 20
10, 20, 30
NE2 ROOT
NE5
20, 30
10, 30
10, 30
30
20
NE3
NE4
10
ROOT
After the MSTP begins running, each VLAN has an independent MST. See Figure 6-16.
Figure 6-16 Network topology after the MSTP begins running
NE1 ROOT
NE1
ROOT
NE2
NE5
NE2
NE5
NE3
NE4
NE3
NE4
VLAN 10
VLAN 20
NE1
NE2
NE3
NE5
ROOT
NE4
VLAN 30
6-22
Issue 02 (2010-12-28)
6 Protection
As each instance is mapped to one VLAN or a group of VLANs, the MSTP can forward data
based on VLAN packets and thus realizes the load balancing for VLAN data. In this case, a
perfect integration of the RSTP and VLAN is achieved.
Issue 02 (2010-12-28)
6-23
7 Synchronization
Synchronization
Issue 02 (2010-12-28)
7-1
7 Synchronization
Functions
In the case of physical-layer synchronization, the equipment directly recovers a clock frequency
from physical-layer optical signals. Hence, the frequencies of the upstream and downstream
equipment are synchronized, thereby ensuring normal transmission of services. Physical-layer
synchronization ensures normal working of a network.
The objectives of clock synchronization of mobile bearer products are as follows:
l
Meeting the requirement of framing accuracy at mobile base stations: Base stations adopt
two technologies, that is, frequency division duplex (FDD) and time division duplex (TDD).
At the base stations that adopt TDD, synchronization can decrease the spacing between
timeslots in transmitted services on an uplink and a downlink, and increase bandwidth
utilization. At the base stations that adopt FDD, synchronization can ensure that the receive
end locks signals.
The PTN equipment supports extraction of physical-layer clocks from synchronous Ethernet
signals, E1 signals, and internal crystal oscillators.
Application Scenario
As shown in Figure 7-1, the BITS provides the clock information of a primary reference source
to the PTN equipment and RNC/BSC. The PTN equipment sends the clock information to
downstream base stations through physical-layer synchronization. The physical trail in the
middle can be an SDH link, or an synchronous Ethernet link that support physical-layer clocks.
When a clock network requires the standard or extended SSM protocol, the intermediate physical
link must be an synchronous Ethernet or SDH link.
7-2
Issue 02 (2010-12-28)
7 Synchronization
RNC/BSC
RNC/BSC
BITS
GE
Convergence Layer
FE
FE
FE
Access Layer
FE
NodeB
E1
FE
NodeB
NodeB
PTN
External Clock
Physical Clock
Issue 02 (2010-12-28)
7-3
7 Synchronization
Tracing mode: It is a normal working mode, indicating that the local clock is synchronized
with the PRC.
Holdover mode: When all external timing references are lost, the protection clock enters
the holdover mode. In this mode, the protection clock takes the timing reference from the
frequency information saved before a loss of timing reference signals.
Free-run mode: When the slave clock of an NE looses all external timing references and
memories of timing references, or when the holdover mode does not exist, it works in freerun mode.
As shown in Figure 7-2, the two lines and PRC 1 at the convergence layer are faulty at the same
time. In this case, NE B has no clock source for tracing, and it enters the holdover mode. After
a certain period of time, the clock information saved by NE B is degraded, and then NE B traces
the internal clock of its own and enters the free-run mode. NE A, however, traces PRC 2 and
still works in tracing mode. The dotted lines indicate the clock tracing trail before a fault occurs;
the continuous lines indicate the clock tracing trail after a switching.
Figure 7-2 Clock working mode
RNC/BSC
BITS
BITS
RNC/BSC
NE A
GE
Convergence Layer
NE B
FE
FE
FE
Access Layer
FE
NodeB
E1
FE
NodeB
NodeB
PTN
7-4
External Clock
Physical Clock
Issue 02 (2010-12-28)
7 Synchronization
Specifications
The timing and synchronization performance of the equipment complies with ITU-T G.813.
7-5
7 Synchronization
1000 us delay. On the Ethernet where the IEEE 1588V2 protocol is enabled, the timing
synchronization is improved to a great extent.
The approach of adopting the IEEE 1588V2 protocol to achieve clock synchronization and time
synchronization marks a technical innovation for the transformation of the carrier-class IP
network.
The IEEE 1588V2 protocol helps achieve clock synchronization and time synchronization that
meet the requirements of NodeB and RNC in a 3G network.
NOTE
Application
Figure 7-3 shows the scenario where the PTP clock is applicable.
Figure 7-3 Networking diagram for typical application of the PTP clock
Node B
NE E
GPS
NE B
NE A
950
OC
TC
NE C
RNC
BC
NE D
TC
NE F
TC + OC
910
Node B
OC
External time signals
PTP clock signals
As shown in Figure 7-3, BITS sends clock signals to NE A and RNC. NE A works as BC
equipment and sends the PTP packets to two ports. The downstream equipment works as the TC
or TC+OC equipment and transparently transmits the PTP packets. NE E and NE F, which are
connected to NodeB, work as the OC equipment, recover the PTP clock, and send the clock to
NodeB through the external clock interface.
7-6
Issue 02 (2010-12-28)
7 Synchronization
Specifications
l
Time synchronization precision after a clock traverses 30 NEs is within the range of 1 us
to +1 us (test time: 120000s).
Overview
When an operator network involves a third-party network and the latter does not support a
physical clock but supports Layer 2 multicast, the clock packets can be transparently transported
in ACR mode on the third-party network as service packets to achieve frequency synchronization
of the equipment at both ends. In the case of IEEE 1588 ACR, the clock packets that are
transparently transported as service packets are IEEE 1588 V2 clock packets.
As shown in Figure 7-4, the OptiX PTN equipment is interconnected through a third-party
network. If the networkwide equipment supports the IEEE 1588 V2 protocol, the clock of RNC
can be transported to NodeB as the IEEE 1588 V2 (PTP) clock to achieve networkwide clock
synchronization. It is highly costly for the equipment on the third-party network to support the
IEEE 1588 V2 protocol. If the third-party network can transparently transport the IEEE 1588
V2 clock packets, the IEEE 1588 ACR solution is applicable for frequency synchronization of
the equipment at both ends.
The IEEE 1588 V2 clock packets supported by the OptiX PTN equipment are multicast Ethernet
packets. The OptiX PTN equipment adds the time stamps with system information to the IEEE
1588 V2 clock packets. Then, on the third-party equipment, the clock information is multicast
to the OptiX PTN equipment on the NodeB side. When receiving the IEEE 1588 V2 clock
packets, the OptiX PTN equipment extracts the time stamps, recovers the clock by calculation,
and uses the clock as the system clock. In addition, the OptiX PTN equipment transports the
clock to NodeB. In this manner, the equipment at both ends of the network achieves frequency
synchronization.
Issue 02 (2010-12-28)
7-7
7 Synchronization
Slave
NodeB 1
BITS
PTN
Master
Slave
ME
NodeB 2
PTN
Router
PTN
RNC
Slave
PTN
NodeB 3
Multicast service
External clock
NOTE
IEEE 1588 ACR can be used to achieve only frequency synchronization. To achieve time synchronization
(phase synchronization), the networkwide equipment must support IEEE 1588 V2 protocol. The IEEE 1588
ACR clock can be transported only in one clock domain.
Specifications
1588 ACR of the PTN equipment is up to the following specifications:
l
According to the test based on the networking recommended in ITU-T G.8261, clock
recovery complies with the ITU-T G.823 Traffic interface.
When the network between the two PEs meets the requirement that the PDV is less than
16ms and packet loss ratio is less than 0.05%, the recovered clock complies with ITU-T G.
823 SYNC template with respect to performance.
Basic Concept
On a PSN, the CES circuit emulation technology is used to transparently transmit TDM circuit
switching data. The PTN equipment performs emulated transparent transmission for TDM E1
and channelized STM-1 services by using the PWE3 technology.
CES ACR is based on CES services and recovers the clock of the source at the sink in adaptive
mode. The sink equipment can recover the TDM clock (in FIFO mode) according to the change
7-8
Issue 02 (2010-12-28)
7 Synchronization
in the buffer for receiving CES services (the change is caused by the packets received on the
NNI side) or recover the clock (in time stamp mode) according to the time stamp carried with
the packets received on the NNI side.
In the case of CES ACR, the equipment can add time stamps:
l
Extracts the clock frequency from the line clock, add the frequency into the time stamp,
add transmits the time stamp downstream with the CES service.
Adds the clock frequency of the system clock to the time stamp and transmits the time
stamp downstream with the CES service.
Networking Application
In the progress of IP-orientation of mobile backhaul, the traditional TDM services need to be
accessed and transported in the same way. An operator can transparently transport TDM E1
services over the IP network by using the CES circuit emulation technology.
TDM E1 services are mainly voice services and require synchronization of the transmit end and
receive end. If the clocks at both ends of the bearer network are inconsistent, slide codes may
occur in a long term, BER may rise sharply, and the services may be interrupted. When CES
ACR is applied on an asynchronous IP network, CES service packets can carry clock information
and the sink equipment can recover the clock to maintain clock synchronization between the
source equipment and sink equipment.
As shown in Figure 7-5, a TDM voice service is transmitted between BSC and BTS through an
asynchronous IP network. To ensure the quality of the voice service, BTS and BSC must
maintain synchronization.
BSC accesses the reference clock PRC/GPS. The master equipment extracts clock information
from the E1 service port and transparently transmits the clock information downstream along
with CES services. On the asynchronous IP network, CES service packets are transparently
transmitted. When receiving the CES service packets, the slave equipment recovers the service
and also recovers the clock in FIFO mode or time stamp mode. Then, the slave equipment
transfers the recovered TDM clock to BTS. In this manner, BTS and BSC maintain
synchronization.
Issue 02 (2010-12-28)
7-9
7 Synchronization
Asynchronous
IP network
BTS
Slave
Master
BSC
Transmission direction of
the CES ACR clock
Advantages:
Networkwide synchronization is not required. Instead, only the source and sink need to
maintain synchronization.
The CES ACR clock can be transparently transmitted over a PSN and thus the intermediate
equipment does not need to support CES ACR. This ensures flexible application.
Disadvantages:
The quality of the recovered clock depends on the PSN network and thus is subject to
impacts of delay variation, delay, and sequence error on the network. Hence, the QoS of
services must be ensured.
CES ACR ensures only frequency synchronization but not time (phase) synchronization.
Specifications
CES ACR of the PTN equipment is up to the following specifications:
7-10
According to the test based on the networking recommended in ITU-T G.8261, clock
recovery complies with the ITU-T G.823 Traffic interface.
When the network between the two PEs meets the requirement that the PDV is less than
16ms and packet loss ratio is less than 0.05%, the recovered clock complies with ITU-T G.
823 SYNC template with respect to performance.
Issue 02 (2010-12-28)
8 Value-Added Feature
Value-Added Feature
Issue 02 (2010-12-28)
8-1
8 Value-Added Feature
Carrier A
NodeB 1
NodeB 2
FE/GE
DHCP server A
PSN
PTN 1
NodeB 3
PTN 2
FE/GE
DHCP server B
NodeB 4
Carrier B
NOTE
As shown in Figure 8-1, carrier A and carrier B share the same bearer network, but networks of different
carriers must be isolated. The DHCP relay functions on networks of two carriers are performed
independently but the processes are the same.
8-2
Issue 02 (2010-12-28)
8 Value-Added Feature
NodeB 1
(DHCP Client)
FE
FE/GE
L2VPN
FE
DHCP Server
PTN 2
PTN 1
(DHCP Relay)
NodeB 2
(DHCP Client)
E1/FE
NodeB 1
(DHCP Client)
FE/GE
L3VPN
E1/FE
PTN 1
(DHCP Relay)
PTN 2
DHCP Server
NodeB 2
(DHCP Client)
Issue 02 (2010-12-28)
8-3
9 Bearer Technology
Bearer Technology
Issue 02 (2010-12-28)
9-1
9 Bearer Technology
9.1 MPLS
The equipment uses the multiprotocol label switching (MPLS) technology to transport multiple
types of services. The following describes the basic concepts related to the MPLS and application
of the MPLS supported by the OptiX PTN 950.
9.1.1 Background
MPLS was originally developed to increase the forwarding speed of a router. Currently, MPLS
is developed for backbone routers and VPN solutions.
9.1.2 Basic Concepts
Before learning the MPLS technology, you should learn the basic concepts of the MPLS first.
The basic concepts involves the forwarding equivalence class (FEC), label, label distribution
protocol (LDP), and label switched path (LSP).
9.1.3 System Structure
The MPLS system consists of the control plane and the forwarding plane.
9.1.4 MPLS Features of the Equipment
By using the MPLS technology, the equipment not only greatly increases the packet forwarding
speed but also provides the capability of seamlessly connecting to Layer 2 networks such as the
ATM and Ethernet networks. In addition, the equipment provides better solutions for application
of the TE, VPN and QoS.
9.1.1 Background
MPLS was originally developed to increase the forwarding speed of a router. Currently, MPLS
is developed for backbone routers and VPN solutions.
The MPLS is integrated with the powerful Layer 3 routing function of the IP network and the
highly effective forwarding mechanism of the traditional Layer 2 network. The forwarding plane
is connection-oriented and the forwarding scheme is similar to the forwarding scheme of the
existing Layer 2 network. Hence, the MPLS can easily realize the seamless combination of IP
and Layer 2 networks such as ATM and Ethernet. In addition, the MPLS provides better solutions
for the application of the traffic engineering (TE), virtual private network (VPN), and quality of
service (QoS). Thus, the MPLS becomes a criterion for expanding the data network and
increasing the network operability.
To meet the requirements of the transport network to improve the quality of service, the
connectionless feature of the standard MPLS should be simplified, and the OAM and protection
capabilities should be enhanced. In compliance with the latest international standards, the OptiX
PTN 950 supports a series of MPLS features for the transport network.
FEC
As a classification forwarding technology, the MPLS considers the packets of the same
forwarding scheme as a class, which is called an FEC. In the MPLS network, packets in the FEC
are processed in the same way.
9-2
Issue 02 (2010-12-28)
9 Bearer Technology
Label
A label is a short identifier of fixed length and with specific meanings (valid only in the MPLS
region). The label is used to identify the FEC that a packet belongs to. Under certain conditions,
for example, when load sharing is required, several labels may correspond to one FEC, but one
label only indicates one FEC.
The packet headers carry labels and the labels do not contain any topology information. Labels
are locally valid. A label has four bytes, which are encapsulated in the way as shown in Figure
9-1.
Figure 9-1 Label encapsulation structure
0
22 23
19
Label
Exp
31
TTL
Label: 20 bits. The label field indicates the label value and is used as the forwarding pointer.
Exp: three bits. The Exp field is reserved for experiment and currently used for class of
service (CoS).
S: one bit. The MPLS supports the layered labels, or multiple labels. If S is 1, it indicates
that the label is at the bottom.
TTL: eight bits. The time to live (TTL) field has the same indication as TTL of IP packets.
As a connection identifier, the label is similar to the VPI/VCI for ATM. In the case of realizing
MPLS over Ethernet, the label is encapsulated between the Ethernet frame header and the IP
layer. Figure 9-2 shows the encapsulation location of labels in a packet.
Figure 9-2 Encapsulation location of labels in a packet
Ethernet/PPP header
Label
Layer 3 data
Ethernet/SONET/SDH packet
Protocols exclusively stipulated for label distribution, such as LDP and constraint-routing
label distribution protocol (CR-LDP).
Protocols that can be extended to support the label distribution, such as border gateway
protocol (BGP) and resource reservation protocol (RSVP).
Issue 02 (2010-12-28)
9-3
9 Bearer Technology
LSP
In an MPLS network, the path involved in an FEC is called an LSP.
LSP is a unidirectional path from the ingress to the egress. Each node on an LSP is a label
switched router (LSR). According to the data transport direction, adjacent LSRs can be called
upstream LSRs and downstream LSRs.
The LSP are classified into static LSP and dynamic LSP. The static LSPs are manually
configured by the administrator. The dynamic LSPs are created dynamically by the routing
protocol and label distribution protocol.
The OptiX PTN 950 does not use penultimate hop popping (PHP), because PHP may cause
MPLS OAM information loss.
The OptiX PTN 950 does not support LSP Merge, because the LSP Merge makes the source
of a data flow unknown. If the source is unknown, OAM and performance monitoring
become difficult or even unavailable.
The OptiX PTN 950 does not support the equal cost multiple path (ECMP), because the
ECMP makes the continuity check (CC) of OAM and performance monitoring become
more complicated.
In addition, the OptiX PTN 950 provides complete OAM and proper protection.
l
The OptiX PTN 950 provides the MPLS OAM mechanism that complies with ITU-T Y.
1711. Thus, it can quickly detect the LSP status.
The OptiX PTN 950 provides the protection switching mechanism that complies with ITUT Y.1720 and ITU-T G.8131. The equipment provides not only FRR protection but also
end-to-end transport protection for LSPs.
Table 9-1 lists the MPLS features supported by the OptiX PTN 950.
9-4
Issue 02 (2010-12-28)
9 Bearer Technology
Description
MPLS OAM
MPLS protection
MPLS-TE
Others
9.2 PWE3
The pseudo wire edge to edge emulation (PWE3) technology is a Layer 2 VPN protocol used
to provide tunnels on the packet switching network (IP/MPLS) to emulate some services, such
as the TDM, IMA and Ethernet services. The PWE3 is used to connect the traditional network
and packet switching network. In this way, networks are extended and resources can be shared.
Basic Concepts
As a technology for carrying end-to-end Layer 2 services, PWE3 belongs to the point-to-point
L2VPN. At the two provider edges (PEs) of a network, the LDP is used as the signaling and
tunnels are used to emulate various Layer 2 services (such as the Layer 2 data packets and bit
flow) at the customer edge (CE). In this way, the Layer 2 data at the CE end is transparently
transmitted in the network.
PWE3 is used to create point-to-point channels, which are isolated from each other. The Layer
2 packets from users are transparently transmitted in PWs. For PE equipment, the mapping
Issue 02 (2010-12-28)
9-5
9 Bearer Technology
relation between user access interfaces and PWs is fixed once the PW connection is set up. For
provider (P) equipment, MPLS packets are forwarded according to the MPLS labels. The Layer
2 user packets encapsulated in the MPLS packets are not processed.
Typical Application
PWE3 is used to integrate the original access schemes with the existing IP backbone networks.
In this way, repeated network construction is reduced and the operation expenditure is saved.
shows the typical application scenario of PWE3.
Description
Service
encapsulation
PSN carrying
Signaling
protocol
Supports static PWs and dynamic PWs, and adopts the LDP protocol to
set up and maintain dynamic PWs.
This following describes how the emulation services (ATM service as an example) are encapsulated when
they are carried over IP tunnel and GRE tunnel.
In the MPLS network, the PWE3 technology is used to realize ATM emulation services. Figure
9-3 shows the encapsulation mode of the ATM emulation services.
9-6
Issue 02 (2010-12-28)
9 Bearer Technology
ATM
switch
MPLS
network
ATM
E1
ATM
PWE3
PW Label
LSP Label
Ethernet
ATM
E1
To realize ATM emulation services over an IP network, the OptiX PTN 950 supports carrying
ATM PWE3 services over IP tunnels, GRE tunnels in compliance with RFC 4023. As shown in
Figure 9-4 and Figure 9-5, even though the IP network does not support MPLS, the ATM
emulation services can be realized.
Figure 9-4 ATM PWE3 services carried over IP tunnels
ATM
switch
ATM
switch
Router
Router
IP
network
ATM
E1
ATM
PWE3
PW Label
IP
Ethernet
ATM
PWE3
PW Label
IP
Ethernet
ATM
E1
Issue 02 (2010-12-28)
9-7
9 Bearer Technology
ATM
switch
Router
Router
IP
network
ATM
E1
ATM
PWE3
PW Label
GRE
IP
Ethernet
ATM
PWE3
PW Label
GRE
IP
Ethernet
ATM
E1
NOTE
DCN packets can be transparently transported over the IP tunnel or GRE tunnel. When the DCN packets
pass through a third-party network, the DCN packets are transported in an end-to-end manner.
9-8
Issue 02 (2010-12-28)
10
Issue 02 (2010-12-28)
10-1
RSVP-TE
The OptiX PTN 950 uses the RSVP-TE protocol as the LSP signaling.
The RSVP protocol is originally developed for the network QoS function. It reserves resources
for particular services on the network to ensure the service quality of services. After TE was
developed, the RSVP protocol was extended to create LSP. In this way, TE can be easily realized.
The RSVP-TE protocol used by the OptiX PTN 950 has the following functions:
l
Supports the shared-explicit (SE) style to reserve resources. In the case of the SE style,
resources are reserved for a specified group of transmitters, which share the reserved
resources.
LDP
The OptiX PTN 950 uses the LDP protocol as the PW signaling.
The LDP is a control and signaling protocol for MPLS.
The LDP protocol used by the OptiX PTN 950 has the following functions:
l
Issue 02 (2010-12-28)
The OptiX PTN 950 supports the following features of the IS-IS routing protocol, that is, three
types of IS-IS routing protocol packets, optimized SPF algorithm, link overhead, and IS-IS TE.
Hello packet
Hello packets are used to construct and maintain neighbor relations between network nodes.
Hence, Hello packets are also called IS-to-IS hello (IIH) PDUs.
SNP packet
Sequence number PDU (SNP) packets describe the link state PDUs in all or part of the
LSDB. The SNP is used to synchronize and maintain the LSDB of each network node in
the PTN network.
Link Overhead
The OptiX PTN 950 supports manual setting of the link overhead to control the path involved
in the dynamically created MPLS LSP.
IS-IS TE
In the case that MPLS is used to construct the LSP, the traffic engineering information of all the
links in the local region should be known. The IS-IS TE realized by the OptiX PTN 950 supports
the construction of the MPLS LSP. By using the IS-IS routing protocol, the OptiX PTN 950
obtains the traffic engineering information (including the link utilization and the link overhead)
of all the links in the network, constructs and synchronizes the TEDB, and uses the constrained
shortest path first (CSPF) algorithm based on the TEDB to compute the route for the MPLS LSP
to travel.
Issue 02 (2010-12-28)
10-3
11 DCN
11
DCN
For a packet transport network (PTN), a data communication network (DCN) transmits
operation, administration, and maintenance (OAM) information between a network management
system (NMS) and PTN NEs.
For a PTN network, a DCN may be an internal DCN or an external DCN, depending on where
it is deployed, as shown in Figure 11-1.
Figure 11-1 External DCN and internal DCN
NMS
External DCN
Router
Issue 02 (2010-12-28)
Internal DCN
C
LAN switch
PTN equipment
11-1
11 DCN
External DCN
The DCN between an NMS and the access point on a PTN network is defined as an external
DCN.
Internal DCN
The DCN between PTN NEs is defined as an internal DCN.
An internal DCN is also called inband DCN because PTN NEs transmit network management
information over service channels.
There are two addressing modes in which the NMS and NEs communicate with each other.
11-2
Issue 02 (2010-12-28)
11 DCN
External DCN
IP can access
A
Coreroute can access
B
Internal DCN
PTN equipment
DCNs are classified into DCNs over control plane and DCNs over management plane depending
on the plane that provides routes for transmitting DCN packets.
Issue 02 (2010-12-28)
11-3
11 DCN
External DCN
Level 3 Access
Internal DCN
PTN Equipment
11-4
Issue 02 (2010-12-28)
11 DCN
External DCN
Management port
/Service port
A
VLAN/MPLS
B
Tunnel
Internal DCN
C
PTN equipment
Issue 02 (2010-12-28)
11-5
12
Issue 02 (2010-12-28)
12-1
Clear and filter current or history alarms of an NE, and filter abnormal events.
Configuration Management
The U2000 realizes configuration management functions such as service configuration,
protection configuration, clock configuration, and maintenance for an NE. Example functions
are as follows:
l
Security Management
The U2000 provides various NE security management functions. Example functions are as
follows:
l
NE user management.
NE login management.
Query users that are logged in to the NE.
Delete an NE user.
Force an NE user to log out.
12-2
NE login lockout.
NE setting lockout.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-28)
NE security parameters.
NE security log.
The equipment supports collection of statistics information about services, PWs, and
tunnels.
The equipment provides the SNMP interface for managing alarms and performance events.
The SNMP interface has two versions, that is, V1 and V2.
The running status and alarm indicators are available on each board, thus facilitating the
administrator to locate and handle faults in time.
The equipment provides functions such as alarm severity management and alarm filtering.
The equipment supports restoration of the system configuration from the database or CF
card.
The NMS can be used to dynamically monitor the running status, alarms, and performance
events of each NE in the network.
The equipment supports remote maintenance. By remote access to the equipment through
the NMS, users can maintain and monitor the equipment. In this way, the equipment
security is ensured.
LSP Ping
Traceroute
PW VCCV Ping
MPLS OAM
12-3
For the upgrade of the OptiX PTN 950, the active and standby system control boards must be
used. The active/standby protection ensures that no services are interrupted during the upgrade.
The OptiX PTN 950 supports anti-mistake software loading and version rollback in the case of
an upgrade failure.
NOTE
Rollback means that, in the case of a software upgrade failure, the software and the service configuration
can be restored to their state before upgrade. The new version software overwrites the old version software
only after the upgrade is successful.
12-4
Issue 02 (2010-12-28)
13
13 Security Management
Security Management
Issue 02 (2010-12-28)
13-1
13 Security Management
NE login management: You can successfully log in to the NE only by entering a valid user
name and a valid password.
NE user switching: On a client, only one user is allowed to operate the NE each time. For
this reason, if multiple users intend to operate the same NE simultaneously, they need to
be switched to ensure that the data is unique.
Forcibly making other users exit from the NE: To avoid errors caused by simultaneous
configuration by multiple users, or to prevent other users from illegally logging in to the
NE, one user can forcibly make other users who are at the lower level or the same level
exit from the NE.
NE user management:
According to the operation authorities, NE users are divided into five levels, which
involve monitoring level, operation level, maintenance level, system level, and
debugging level in an ascending order.
According to the U2000, NE users are classified into Local Craft Terminal (LCT) NE
users, Element Management System (EMS) NE users, Command (CMD) NE users, and
general NE users.
Create NE users, assign authorities, or specify a user flag.
Modify the user name, password, operation authority, or user activation status flag.
Delete NE users.
Set the ACL rule to filter the received IP packets, control the data traffic in the network,
and to avoid malicious attack. According to the system security level, the ACL rule is
divided into basic ACL and advanced ACL.
For an NE that requires lower security level, you can set the basic ACL rule only to
check the source address of the IP packets.
13-2
Issue 02 (2010-12-28)
13 Security Management
For an NE that requires higher security level, you can set the advanced ACL rule. In
this case, the NE checks the source address, sink address, source port, sink port, and
protocol type of the received IP packets.
If both the advanced and the basic ACL rules are available, the NE adopts the advanced
ACL rule to check the packets.
Query the ACL rule.
Modify the ACL rule.
Delete the ACL rule.
l
Control the access to NEs by using the LCT: If the U2000-LCT needs to be used to manage
NEs, log in to the U2000 and enable LCT access for the NE.
When the U2000 communicates with an NE, confidential data (such as user name and
password) is encrypted.
Query and set the Warning Screen switch of the NE to decide whether to report the alarm
information after a user logs in to the NE.
13-3
13 Security Management
Setting of Syslog protocol transfer modes: UDP (by default) and TCP
Coexisting of multiple Syslog servers and the sending of logs to multiple servers at the
same time
Reporting of alarms upon the communication disconnection between the Syslog server and
the NE
Figure 13-1 shows how the Syslog protocol is transmitted in a network. To ensure the security
of system logs, suggest that at least two system log servers are available in a network. Normally,
IP protocol is used for the communication between the NE and the system log servers.
Figure 13-1 Schematic diagram of Syslog protocol transmitting
NE B
NE A
(client)
NE C
(client)
NMS
TCP/IP
DCN
Syslog server B
Real time
security log
NE D
Syslog server A
NOTE
Normally, a system log server is a workstation or server that is dedicated to storing the system logs of all
NEs in a network.
A forwarding gateway NE receives the system logs of other NEs and forwards the logs to the system log
server. In Figure 13-1, NE A and NE C are forwarding gateway NEs.
When IP protocol is adopted on each NE for communication, every NE can directly communicate
with the two system log servers through the IP protocol. Hence, configure the IP addresses and
port numbers of the syslog servers on the NE, and the system is able to transmit the NE logs to
the two Syslog servers through the auto addressing function of IP protocol. No forwarding
gateway NE is required.
13-4
Issue 02 (2010-12-28)
14
14 Application Scenario
Application Scenario
Issue 02 (2010-12-28)
14-1
14 Application Scenario
NodeB
PE
PE
BTS
RNC
PE
NodeB
PE
BSC
BTS
Access / aggregation:
PTN 910/950/1900
VIP private
line user
TDM/ATM/IP
TDM/ATM/IP
TDM/ATM/IP
E1 / IMA /
Eth / ML-PPP/
Layer 3 VLAN
sub-interface
PW
PW
MPLS Tunnel
MPLS Tunnel
Eth/POS/ML-PPP
Eth/POS/ML-PPP
UNI
VIP private
line user
Aggregation / core:
PTN 3900/3900-8
NNI
TDM/ATM/IP
ch-STM-1 /
ATM STM-1 / Eth
UNI
In general, a layered ring network topology is used to transmit mobile services, and VIP private
line services, thus making service deployment and management easy. A PTN transport network
can be divided into the core layer, aggregation layer, and access layer. Certain layers, for
example, core layer and aggregation layer, can be merged if the network scale is relatively small.
Different PTN equipment is applicable to different network layers.
14-2
Issue 02 (2010-12-28)
14 Application Scenario
The OptiX PTN 3900/3900-8 is mainly used at the aggregation or core layer of a transport
network. After performing service conversion, it transmits the services to the user
aggregation equipment. It can not only transmit multi-services but also convert these
services into WDM services for transmission at the aggregation and core layers.
The OptiX PTN 1900/950 is mainly used at the aggregation and access layers of a transport
network.
The OptiX PTN 910 is mainly used at the access layer of a transport network. It receives
services from the terminal user equipment through various interfaces, performs service
conversion, and then transmits the services to the aggregation and core layer.
Type of
UNI
Interface
on
Equipme
nt at the
Access
Layer
Service
Flag
Channel on
the PTN
Network
Type of UNI
Interface on
Equipment at
the
Aggregation
Layer
2G mobile
TDM service
CES service
E1
Lower
order
tunnel;
lower
order
tunnel +
timeslot
MPLS tunnel
(VPN)/
ch-STM-1
3G mobile
ATM service
IMA
VPI/VCI
3G mobile IP
service or VIP
IP service
E-Line service
Ethernet
Physical
port;
physical
port +
VLAN
Issue 02 (2010-12-28)
Ethernet, POS,
ML-PPP
ATM STM-1
MPLS tunnel
(PWE3),
physical
Ethernet port,
QinQ link/
Ethernet, POS,
ML-PPP
Ethernet
14-3
14 Application Scenario
User
Service
Type
Type of
UNI
Interface
on
Equipme
nt at the
Access
Layer
Service
Flag
E-LAN service
Ethernet
MAC
address;
MAC
address +
VLAN
Ethernet/
ML-PPP/
Layer 3
VLAN subinterface
Layer 3
physical
port; Layer
3 logical
port
Channel on
the PTN
Network
Type of UNI
Interface on
Equipment at
the
Aggregation
Layer
MPLS tunnel
(VPN)/
Ethernet, POS,
ML-PPP
l VLAN/MAC resources
are limited.
l The IP addresses of RNC
and NodeB do not belong
to the same network
segment.
l NodeB provides E1
interfaces whereas RNC
provides Ethernet
interfaces.
14-4
Issue 02 (2010-12-28)
14 Application Scenario
Description
Protection
l Equipment-level protection: 1+1 protection for system control and switching boards, and
PIU boards
QoS
l CES service: The default forwarding priority of a CES service is EF (users can set the
forwarding priority as required). Users do not need to configure the bandwidth for a CES
service; instead, an NE automatically calculates and ensures the bandwidth for a CES
service.
l ATM service: ATM services are classified into five types. The ATM services are mapped
to the corresponding types according to configured ATM QoS policies and are further
mapped onto different PHBs according to the ATM service class mapping table.
l Ethernet service: Priorities of Ethernet services are differentiated by port/VLAN/IP
DSCP and hierarchical QoS of the Ethernet services are achieved by applying different
QoS policies.
l IP over PW service: Priorities of IP over PW services are differentiated by DSCP and
HQoS of the IP over PW services are achieved by applying different QoS policies.
Synchronization
DCN
l Intra-domain DCN at service ports: PTN NEs are connected to each other through service
ports with DCNs enabled.
l Gateway DCN on the control plane: DCN packets are forwarded by the routes on the
control plane. This DCN solution is generally adopted in the case of a relatively large
network.
Issue 02 (2010-12-28)
14-5
14 Application Scenario
Item
Description
Maintenance and
management
l Hierarchical OAM
Service OAM is used to monitor end-to-end services and to detect faults on the endto-end service trails. Service OAM is classified into Ethernet OAM (802.1ag) and
ATM OAM.
MPLS tunnel OAM or PW OAM is used to monitor end-to-end MPLS tunnels or
PWs between the PEs on the PTN network and to detect faults on these end-to-end
MPLS tunnels or PWs.
E1/STM-N OAM, ATM UNI OAM, Ethernet port OAM (802.3ah), and BFD are
used to monitor the links between PEs and CEs on the PTN network and to detect
faults on the links.
l Real-time reporting of alarms
l Periodic collection of performance statistics
Control plane
Static (recommended)
l The routing protocol is not enabled.
l Tunnel labels and PW labels are assigned manually or automatically by using a network
management system (NMS).
Dynamic
l Routing protocols: ISIS-TE, static routing
l MPLS tunnel label distribution protocol: RSVP-TE
l PW label distribution protocol: LDP
Issue 02 (2010-12-28)
14 Application Scenario
a network of relatively low transmission quality to reduce the overall transport costs. Such an
approach for diverting services by service QoS is referred as the offload solution.
NodeB
PE
PE / Gateway
Gateway
BTS
RNC
Layer 2 network
NodeB
Gateway
Gateway
BSC
BTS
VIP private
line user
Access / aggregation:
PTN 910/950/1900
Aggregation / core
PTN equpment: PTN 3900/3900-8
TDM/ATM/IP
TDM/ATM/IP
TDM/ATM/IP
PW
E1 / IMA /
Eth / ML-PPP/
MPLS Tunnel
Layer 3 VLAN
sub-interface
Eth
UNI
VIP private
line user
TDM/ATM/IP
PW
L2VPNE-Line/E-LAN
MPLS Tunnel
ch-STM-1 /
ATM STM-1 / Eth
Eth
NNI
UNI
In general, a layered network topology is used to transmit mobile services, and VIP private line
services, thus making service deployment and management easy. Such a network can be divided
into the core layer, aggregation layer, and access layer. Certain layers, for example, core layer
and aggregation layer, can be merged if the network scale is relatively small. Different PTN
equipment is applicable to different network layers. In the application scenario where a Layer
Issue 02 (2010-12-28)
14-7
14 Application Scenario
2 network is located between PTN NEs, the PTN NEs are located at edges of the transport
network, namely, the access layer and aggregation/core layer.
l
The OptiX PTN 3900/3900-8 is mainly used at the aggregation or core layer of a transport
network. After performing service conversion, it transmits the services to the user
aggregation equipment.
The OptiX PTN 1900/950/910 is mainly used at the access layer of a transport network. It
receives services from the terminal user equipment through various interfaces, performs
service conversion, and then transmits the services to the aggregation or core layer.
Type of Bearer
Service on the
PTN Network
Type
of UNI
Interfa
ce on
Equip
ment
at the
Access
Layer
Servic
e Flag
Channel on
the PTN
Network
Transm
ission
Mode
Provide
d by the
Layer 2
Networ
k
Type of
NNI
Interface
on
Equipmen
t at the
Aggregati
on Layer
Type of
UNI
Interface
on
Equipmen
t at the
Aggregati
on Layer
2G
mobile
TDM
service
CES service
E1
Lower
order
tunnel;
lower
order
tunnel
and
timeslo
t
MPLS tunnel
(PWE3)/
L2VPN
(E-Line
or ELAN)
Ethernet or
Layer 3
VLAN subinterface
ch-STM-1
3G
mobile
ATM
service
ATM emulation
service
IMA
VPI/
VCI
3G
mobile
IP
service
or VIP IP
service
E-Line service
Etherne
t
Physica
l port;
physica
l port +
VLAN
14-8
Ethernet,
POS, MLPPP
ATM
STM-1
MPLS tunnel
(PWE3),
physical
Ethernet port,
QinQ link/
Ethernet
Issue 02 (2010-12-28)
User
Service
Type
Type of Bearer
Service on the
PTN Network
14 Application Scenario
Type
of UNI
Interfa
ce on
Equip
ment
at the
Access
Layer
Servic
e Flag
Channel on
the PTN
Network
Etherne
(mainly applicable to t
the multipoint-tomultipoint VIP
private line services;
applicable to mobile
services only when
VLAN resources are
limited)
MAC
address
; MAC
address
+VLA
N
Ethernet,
POS, MLPPP
Etherne
t/MLPPP/
Layer 3
VLAN
subinterfac
e
Layer 3
physica
l port;
Layer 3
logical
port
MPLS tunnel
(PWE3)/
E-LAN service
IP over PW service
Application
scenario:
l Communication
between CEs and
OAM of CEs are
implemented at
Layer 3; services
on a transport
network are
deployed in static
mode and the
management and
maintenance of
the services are
implemented at
Layer 2.
Transm
ission
Mode
Provide
d by the
Layer 2
Networ
k
Type of
NNI
Interface
on
Equipmen
t at the
Aggregati
on Layer
Type of
UNI
Interface
on
Equipmen
t at the
Aggregati
on Layer
Ethernet,
POS, MLPPP
l VLAN/MAC
resources are
limited.
l The IP addresses
of RNC and
NodeB do not
belong to the
same network
segment.
l NodeB provides
E1 interfaces
whereas RNC
provides Ethernet
interfaces.
Issue 02 (2010-12-28)
14-9
14 Application Scenario
Description
Protection
QoS
l CES service: The default forwarding priority of a CES service is EF (users can set the
forwarding priority as required). Users do not need to configure the bandwidth for a CES
service; instead, an NE automatically calculates and ensures the bandwidth for a CES
service.
l ATM service: ATM services are classified into five types. The ATM services are mapped
to the corresponding types according to configured ATM QoS policies and are further
mapped onto different PHBs according to the ATM service class mapping table.
l Ethernet service: Priorities of Ethernet services are differentiated by port/VLAN/IP
DSCP and hierarchical QoS of the Ethernet services are achieved at network edges by
applying different QoS policies.
l IP over PW service: Priorities of IP over PW services are differentiated by DSCP and
HQoS of the IP over PW services are achieved at network edges by applying different
QoS policies.
l QoS of services on the Layer 2 network is implemented according to the service level
agreement (SLA) of the Layer 2 network.
14-10
Issue 02 (2010-12-28)
Item
Description
Synchronization
14 Application Scenario
Maintenance and
management
l Hierarchical OAM
Service OAM is used to monitor end-to-end services and to detect faults on the endto-end service trails. Service OAM is classified into Ethernet OAM (802.1ag) and
ATM OAM.
E1/STM-N OAM, ATM UNI OAM, Ethernet port OAM (802.3ah) and BFD are used
to monitor the links between PTN gateways and CEs and to detect faults on the links.
MPLS tunnel OAM and PW OAM are used to monitor end-to-end MPLS tunnels or
PWs between the PEs on the PTN network and to detect faults on these MPLS tunnels
or PWs.
Ethernet port OAM (802.3ah) and BFD are used to monitor the links between the
equipment on the Layer 2 network and the PTN gateways and to detect faults on the
links.
MPLS tunnel OAM or PW OAM is used to monitor end-to-end MPLS tunnels or
PWs between the PTN gateways at the both ends of the Layer 2 network and to detect
faults on these MPLS tunnels or PWs. The packets that are used to monitor these
MPLS tunnels or PWs and to detect faults are transparently transmitted over the Layer
2 network.
l Real-time reporting of alarms
l Periodic collection of performance statistics
Issue 02 (2010-12-28)
14-11
14 Application Scenario
Item
Description
Control plane
Static (recommended)
l The routing protocol is not enabled.
l Tunnel labels and PW labels are assigned manually or automatically by using a network
management system (NMS).
Dynamic
l Routing protocols: ISIS-TE, static routing
l MPLS tunnel label distribution protocol: RSVP-TE
l PW label distribution protocol: LDP
l PTN gateways do not exchange protocol packets with the Layer 2 network. The Layer
2 network transparently transmits all protocol packets between PTN NEs.
14-12
Issue 02 (2010-12-28)
14 Application Scenario
Figure 14-3 Transport network where PTN NEs function as gateways to transmit user services over a Layer 3 network
NodeB
PE / Gateway
PE
Gateway
BTS
RNC
Layer 3 network
NodeB
Gateway
Gateway
BSC
BTS
Access / aggregation:
PTN 910/950/1900
VIP private
line user
TDM/ATM/IP
TDM/ATM/IP
E1 / IMA /
Eth / ML-PPP/
Layer 3 VLAN
sub-interface
PW
UNI
IP Tunnel
Aggregation / core
PTN equpment: PTN 3900/3900-8
TDM/ATM/IP
IP routing
VIP private
line user
TDM/ATM/IP
PW
IP Tunnel
ch-STM-1 /
ATM STM-1 / Eth
Eth
Eth
NNI
UNI
In general, a layered network topology is used to transmit mobile services, and VIP private line
services, thus making service deployment and management easy. Such a network can be divided
into the core layer, aggregation layer, and access layer. Certain layers, for example, core layer
and aggregation layer, can be merged if the network scale is relatively small. Different PTN
equipment is applicable to different network layers. In the application scenario where a Layer
3 network is located between PTN NEs, the PTN NEs are located at edges of the transport
network, namely, the access layer and aggregation/core layer.
l
The OptiX PTN 3900/3900-8 is mainly used at the aggregation or core layer of a transport
network. After performing service conversion, it transmits the services to the user
aggregation equipment.
The OptiX PTN 1900/950/910 is mainly used at the access layer of a transport network. It
receives services from the terminal user equipment through various interfaces, performs
service conversion, and then transmits the services to the aggregation or core layer.
14-13
14 Application Scenario
Table 14-5 Typical bearing modes in which various user services are transmitted over a PSN (PTN NEs with a Layer
3 network in between)
User
Service
Type
Type of Bearer
Service on the
PTN Network
Type of
UNI
Interfac
e on
Equipm
ent at
the
Access
Layer
Servic
e Flag
Channel on
the PTN
Network
Transmi
ssion
Mode
Provide
d by the
Layer 3
Network
Type of
NNI
Interface
on
Equipme
nt at the
Aggregati
on Layer
Type of
UNI
Interface
on
Equipme
nt at the
Aggregati
on Layer
2G
mobile
TDM
service
CES service
E1
Lower
order
tunnel;
lower
order
tunnel
and
timeslo
t
MPLS tunnel
(VPN)/
IP/GRE
Tunnel
Ethernet,
Layer 3
VLAN subinterface
ch-STM-1
3G
mobile
ATM
service
ATM emulation
service
IMA
VPI/
VCI
3G
mobile
IP
service
or VIP IP
service
E-Line service
Ethernet
Physica
l port;
physica
l port +
VLAN
E-LAN service
Ethernet
MAC
address
; MAC
address
+VLA
N
(mainly applicable
to the multipointto-multipoint VIP
private line
services;
applicable to
mobile services
only when VLAN
resources are
limited)
14-14
Ethernet, POS,
ML-PPP
ATM
STM-1
MPLS tunnel
(PWE3),
physical
Ethernet port,
QinQ link/
Ethernet, POS,
ML-PPP
Ethernet
Issue 02 (2010-12-28)
User
Service
Type
14 Application Scenario
Type of Bearer
Service on the
PTN Network
Type of
UNI
Interfac
e on
Equipm
ent at
the
Access
Layer
Servic
e Flag
Channel on
the PTN
Network
IP over PW service
Ethernet/
MLPPP/
Layer 3
VLAN
subinterface
Layer 3
physica
l port;
Layer 3
logical
port
MPLS tunnel
(VPN)/
Application
scenario:
l Communicatio
n between CEs
and OAM of
CEs are
implemented at
Layer 3;
services on a
transport
network are
deployed in
static mode and
the
management
and
maintenance of
the services are
implemented at
Layer 2.
Transmi
ssion
Mode
Provide
d by the
Layer 3
Network
Type of
NNI
Interface
on
Equipme
nt at the
Aggregati
on Layer
Type of
UNI
Interface
on
Equipme
nt at the
Aggregati
on Layer
Ethernet, POS,
ML-PPP
l VLAN/MAC
resources are
limited.
l The IP
addresses of
RNC and
NodeB do not
belong to the
same network
segment.
l NodeB
provides E1
interfaces
whereas RNC
provides
Ethernet
interfaces.
Issue 02 (2010-12-28)
14-15
14 Application Scenario
Description
Protection
QoS
l CES service: The default forwarding priority of a CES service is EF (users can set the
forwarding priority as required). Users do not need to configure the bandwidth for a CES
service; instead, an NE automatically calculates and ensures the bandwidth for a CES
service.
l ATM service: ATM services are classified into five types. The ATM services are mapped
to the corresponding types according to configured ATM QoS policies and are further
mapped onto different PHBs according to the ATM service class mapping table.
l Ethernet service: Priorities of Ethernet services are differentiated by port/VLAN/IP
DSCP and hierarchical QoS of the Ethernet services are achieved at network edges by
applying different QoS policies.
l IP over PW service: Priorities of IP over PW services are differentiated by DSCP and
HQoS of the IP over PW services are achieved at network edges by applying different
QoS policies.
l QoS of services on the Layer 3 network is implemented according to the service level
agreement (SLA) of the Layer 3 network.
14-16
Issue 02 (2010-12-28)
Item
Description
Synchronization
14 Application Scenario
Maintenance and
management
l Hierarchical OAM
Service OAM is used to monitor end-to-end services and to detect faults on the endto-end service trails. Service OAM is classified into Ethernet OAM (802.1ag) and
ATM OAM.
E1/STM-N OAM, ATM UNI OAM, Ethernet port OAM (802.3ah) and BFD are used
to monitor the links between PTN gateways and CEs and to detect faults on the links.
MPLS tunnel OAM and PW OAM are used to monitor end-to-end MPLS tunnels or
PWs between the PEs on the PTN network and to detect faults on these end-to-end
MPLS tunnels or PWs.
Ethernet port OAM and BFD are used to monitor the links between the equipment
on the Layer 3 network and the PTN gateways and to detect faults on the links.
BFD or PW OAM is used to monitor end-to-end IP tunnels or PWs between the PTN
gateways at the both ends of the Layer 3 network and to detect faults on these endto-end IP tunnels or PWs. The packets that are used to monitor these IP tunnels or
PWs and to detect faults are transparently transmitted over the Layer 3 network.
l Real-time reporting of alarms
l Periodic collection of performance statistics
Issue 02 (2010-12-28)
14-17
14 Application Scenario
Item
Description
Control plane
Static (recommended)
l The routing protocol is not enabled.
l Tunnel labels and PW labels are assigned manually or automatically by using a network
management system (NMS).
Dynamic
l Routing protocols: ISIS-TE, static routing
l MPLS tunnel label distribution protocol: RSVP-TE
l PW label distribution protocol: LDP
l PTN gateways do not exchange protocol packets with the Layer 3 network. The Layer
3 network transparently transmits all protocol packets between PTN NEs.
14.2.3 Offload
PTN equipment can divert the service packets with high QoS priorities into a network of
relatively high transmission quality and divert the service packets with low QoS priorities into
a network of relatively low transmission quality to reduce the overall transport costs. Such an
approach for diverting services by service QoS is referred as the offload solution.
14-18
Issue 02 (2010-12-28)
14 Application Scenario
Figure 14-4 Transport network where the PTN NEs use the offload solution to transmit user services
PE / Gateway
PE / Gateway
NodeB
PTN network
NodeB
RNC
PE / Gateway
PE / Gateway
NodeB
RNC
DSLAM
VIP private
line user
Access / aggregation:
PTN 910/950
ATM / IP
IMA / Eth
UNI
Aggregation / core
PTN equpment: PTN 3900/3900-8
ATM / IP
ATM / IP
ATM / IP
PW
PW
PW
MPLS/IP
Tunnel
MPLS/IP
Tunnel
IP routing
MPLS/IP
Tunnel
xDSL
Eth
L2VPN
Eth
NNI
VIP private
line user
ATM / IP
UNI
In general, a layered network topology is used to transmit mobile services, and VIP private line
services, thus making service deployment and management easy. Such a network can be divided
into the core layer, aggregation layer, and access layer. Certain layers, for example, core layer
and aggregation layer, can be merged if the network scale is relatively small. Different PTN
equipment is applicable to different network layers. In the offload solution, PTN equipment is
located at the edges of the transport network, namely, the access layer and aggregation/core
layer.
l
The OptiX PTN 3900/3900-8 is mainly used at the aggregation or core layer of a transport
network. After performing service conversion, it transmits the services to the user
aggregation equipment.
The OptiX PTN 950/910 is mainly used at the access layer of a transport network. It receives
services from the terminal user equipment through various interfaces and performs service
conversion. Then, the OptiX PTN 950/910 transmits the services with high QoS priorities
through Ethernet or POS interfaces to the aggregation or core layer of a PTN network, and
transmits the services with low QoS priorities through the xDSL interfaces to a network
with relatively low quality and costs (Layer 2 or Layer 3 network).
Issue 02 (2010-12-28)
14-19
14 Application Scenario
Type of Bearer
Service on the PTN
Network
3G mobile
ATM
service
ATM emulation
service
3G mobile
IP service
or VIP IP
service
E-Line service
Type of
UNI
Interfac
e on
Access
Equipm
ent
Service
Diversio
n
Identifie
r
IMA
VPI/VCI
User Services
with High
QoS
Priorities
Channel on
the PTN
Network
MPLS tunnel
(VPN)/
Ethernet, POS,
ML-PPP
Ethernet
VLAN or
VLAN
+VLAN
Pri
MPLS tunnel
(PWE3),
physical
Ethernet port,
QinQ link/
User
Services
with Low
QoS
Priorities
Transmissio
n Mode
Provided by
the Layer 2 or
Layer 3
Network
L2VPN (ELine or ELAN)
IP/GRE
Tunnel
Type of
UNI
Interface
on
Aggregati
on
Equipme
nt
ATM
STM-1
Ethernet
Ethernet, POS,
ML-PPP
Issue 02 (2010-12-28)
15
This section provides a list of the software features of the OptiX PTN 950.
Table 15-1 lists the software features of the OptiX PTN 950.
Table 15-1 List of software features
Feature
Description
Service
Security feature
Logical interfaces
Issue 02 (2010-12-28)
15-1
Feature
Description
Tunnel
l MPLS tunnel
Static unidirectional MPLS tunnel
Static bidirectional MPLS tunnel
Dynamic unidirectional MPLS tunnel
l QinQ link
l IP/GRE tunnel
l Single-segment bidirectional PW (dynamic or static)
PW
Equipment level
protection
NNI-side protection
Link-level protection:
l LMSP
1+1 LMSP (only for STM-1 ports)
1:1 LMSP (only for STM-1 ports)
l ML-PPP
15-2
Issue 02 (2010-12-28)
Feature
Description
Tunnel-level protection:
l MPLS tunnel APS
1+1 MPLS tunnel APS
1:1 MPLS tunnel APS
l FRR
l RR
l 1:1 offload protection
PW protection:
l 1:1 PW APS
l PW redundancy (PWs under mutual backup must be of the
same source but different sinks)
UNI-side protection
l LMSP
1+1 LMSP (only for STM-1 ports)
1:1 LMSP (only for STM-1 ports)
l Ethernet LAG protection
l MSTP
l ML-PPP
l IMA
Clock/time
synchronization
Clock synchronization:
l TDM clock synchronization
l Synchronous Ethernet
l NTR (G.SHDSL port)
l 1588 ACR
l CES ACR
Time synchronization:
l IEEE 1588 V2
External clock/time input and output
Issue 02 (2010-12-28)
15-3
Feature
Description
QoS
l Traffic classification:
Simple traffic classification:
Complex traffic classification (based on CVLAN IDs and
SVLAN IDs)
l PHB (eight classes: CS7, CS6, EF, AF4, AF3, AF2, AF1, and
BE)
l CAR
l Queue scheduling
Weighted fair queuing (WFQ)
Priority queuing (PQ)
l Congestion management:
Tail drop
Port WRED
l Traffic shaping:
Generic traffic shaping (GTS) algorithm
Token bucket
l Hierarchical QoS
l TE QoS:
RSVP-TE
DiffServ
l ATM QoS:
ATM QoS policy
ATM service class mapping table
l QinQ QoS: QinQ policy
Protocol
15-4
Issue 02 (2010-12-28)
16
16 Technical Specifications
Technical Specifications
16-1
16 Technical Specifications
16-2
Issue 02 (2010-12-28)
16 Technical Specifications
Description
Dimensions (mm)
Weight (kg)
Issue 02 (2010-12-28)
16-3
16 Technical Specifications
Technical
Specifications
Description
- 38.4 to - 72.0
100 to 240
16-4
Issue 02 (2010-12-28)
16 Technical Specifications
Feature
Technical Specification
System performance
Packet switching
capacity
8 Gbit/s
Packet processing
capability
12 Mpps
Switching
performance of the
system control board
and switching board
Switching performance
of the CXP
E-Line service
1024
E-LAN service
32
Maximum number of
MAC address
forwarding table entries
supported by each VSI
32767
Maximum number of
dynamic MAC address
forwarding table entries
supported by the system
32767
Maximum number of
static MAC address
forwarding table entries
supported by the system
1024
Maximum number of
ATM UNI-UNI
services (native ATM
services) supported by
the system
128
Maximum number of
ATM UNI-NNI
services (remote ATM
services) supported by
the system
256
ATM service
Issue 02 (2010-12-28)
16-5
16 Technical Specifications
Attribute
Feature
Technical Specification
Maximum number of
ATM connections for
native services
supported by the system
512
Maximum number of
ATM connections for
remote services
supported by the system
1024
Maximum number of
PWE3 ATM
transparent cell
transport services
supported by the system
128
Maximum number of
IMA groups supported
by the system
192
Maximum number of
members supported by
each IMA group
CD1: 32
CES service
Maximum number of
CES services supported
by the system
378
IP over PW service
Maximum number of IP
over PW service
supported by the system
30
DHCP relay
Maximum number of
DHCP server IP
addresses supported by
each service
Maximum number of
DHCP relay hops
16
Maximum number of
static ARP table entries
supported by the system
510
Maximum number of
dynamic ARP table
entries supported by
each port
256
IMA
ARP
16-6
ML1/ML1A/ML1B/MD1A/MD1B: 16
Issue 02 (2010-12-28)
Attribute
Feature
Technical Specification
ML-PPP
Maximum number of
ML-PPP groups
supported by the system
42
Maximum number of
PPP links supported by
the system
378
Number of member
links in an ML-PPP
group
1 to 16
Maximum number of
static unidirectional
MPLS tunnels
supported by the system
512
Maximum number of
dynamic unidirectional
MPLS tunnels
supported by the system
512
Maximum number of
static bidirectional
MPLS tunnels
supported by the system
256
QinQ link
Maximum number of
QinQ links (NNI)
supported by the system
1024
Maximum number of IP
tunnels or GRE tunnels
supported by the system
128
PW
Maximum number of
PWs supported by the
system
1024
Ethernet service
OAM
(MPLS tunnel OAM,
PW OAM, BFD, and
Ethernet service
OAM share
resources.)
Maximum number of
MDs supported by the
system
16
Maximum number of
MAs supported by the
system
256
Maximum number of
MEPs supported by the
system
512
MPLS tunnel
Issue 02 (2010-12-28)
16 Technical Specifications
16-7
16 Technical Specifications
Attribute
Feature
Technical Specification
ATM OAM
Maximum number of
ATM OAM supported
by the system
1024
Maximum number of
MPLS tunnel OAM
supported by the system
256
Maximum number of
PW OAM supported by
the system
512
Maximum number of
BFD supported by the
system
512
Maximum number of
point-to-point LPTs
supported by the system
16
Switching time
Maximum number of 1
+1/1:1 MPLS tunnel
APS protection groups
supported by the system
128
Less than 50 ms
Maximum number of
1:1 PW APS protection
groups supported by the
system
255
Less than 50 ms
Maximum number of
PW redundancy
protection groups
supported by the system
512
Maximum number of
members in each PW
redundancy protection
group
Switching time
200 ms
PW OAM
BFD
LPT
PW APS
PW redundancy
protection
16-8
Issue 02 (2010-12-28)
16 Technical Specifications
Attribute
Feature
Technical Specification
FRR
Less than 50 ms
Maximum number of
1:1 offload protection
groups supported by the
system
255
Protection switching
time of 1:1 offload
Less than 50 ms
Maximum number of
LAGs supported by the
system
16
Maximum number of
members in each LAG
Switching time
Offload protection
LAG
MSTP
QoS
Issue 02 (2010-12-28)
Maximum number of
LMSP protection
groups supported by the
system
Switching time
Less than 50 ms
Maximum number of
STPs supported by the
system
32
MSTP topology
convergence time
Maximum number of
DiffServ domains
supported by the system
Maximum number of
traffic classifications
supported by the system
8000
Maximum number of
CAR settings (doublebucket CAR) for traffic
classification
1024
16-9
16 Technical Specifications
Attribute
Feature
Technical Specification
Accuracy (granularity)
of CAR or traffic
shaping
64 kbps
Issue 02 (2010-12-28)
16 Technical Specifications
The technical specifications of the SHD4I cover the interface specifications, board dimensions,
weight, and power consumption.
16.3.13 AUXQ
The technical specifications of the AUXQ include the interface specifications, board dimensions,
weight, and power consumption.
16.3.14 PIU
The technical specifications of the PIU cover the board dimensions, weight, power consumption,
and input voltage.
16.3.15 APIU
The technical specifications of the APIU cover the board dimensions, weight, power
consumption, and input voltage.
16.3.16 FAN
The technical specifications of the FAN cover the board dimensions, weight, power
consumption, and input voltage.
16.3.1 CXP
The technical specifications of the CXP include board dimensions, weight, and power
consumption.
Board dimensions (mm): 22.86 (H) x 225.75 (D) x 193.80 (W)
Weight (kg): 0.66
Power consumption (W, room temperature): 33.9
16.3.2 EF8T
The technical specifications of the EF8T include the interface specifications, board dimensions,
weight, and power consumption.
Table 16-3 lists the specifications of the electrical interfaces of the EF8T.
Table 16-3 Specifications of interfaces on the EF8T
Item
Specification
100 Mbit/s
16.3.3 EF8F
The technical specifications of the EF8F include the interface specifications, board dimensions,
weight, and power consumption.
Issue 02 (2010-12-28)
16-11
16 Technical Specifications
Table 16-4 lists the specifications of the optical interfaces of the EF8F.
Table 16-4 Performance specifications of the FE optical interface
Item
Specification
100BASE-FX
100BASE-FX
(15 km)
(40 km)
(80 km)
Fiber type
Single-mode
Single-mode
Single-mode
Working wavelength
range (nm)
1261 to 1360
1263 to 1360
1480 to 1580
-15 to -8
-5 to 0
-5 to 0
Receiver sensitivity
(dBm)
-28
-34
-34
Minimum overload
(dBm)
-8
-10
-10
8.2
10
10
34060276
34060281
34060282
34060307
34060308
34060309
NOTE
For details of the optical module, see Optical Module Labels.
16.3.4 EG2
The technical specifications of the EG2 include the interface specifications, board dimensions,
weight, and power consumption.
Table 16-5 and Table 16-8 list the specifications of the interfaces on the EG2.
Table 16-5 Technical specifications of the GE optical interface
Item
Specification
Optical
interface
type
16-12
Single-fiber bidirectional
interface
Issue 02 (2010-12-28)
Item
16 Technical Specifications
Specification
1000BAS
E-SX
1000BAS
E-LX
1000BAS
E-VX
1000BASE
-ZX
1000BASECWDM
1000BASEBX
1000BASEBX
(0.5 km)
(10 km)
(40 km)
(80 km)
(80 km)
(10 km)
(40 km)
Fiber type
Multimode
Singlemode
Singlemode
Singlemode
Singlemode
Singlemode
Singlemode
Working
wavelength
range (nm)
770 to 860
1270 to
1360
1260 to
1360
1500 to
1580
For details,
see
wavelength
allocation of
1000BASECWDM
optical
interfaces
and related
optical
module
code.
For details,
see
wavelength
allocation of
1000BASEBX optical
interfaces
and related
optical
module
code.
For details,
see
wavelength
allocation of
1000BASEBX optical
interfaces
and related
optical
module
code.
Mean
launched
optical
power
(dBm)
-9.5 to 0
-11 to -3
-5 to 0
-2 to 5
0 to 5
-9 to -3
-3 to 3
Receiver
sensitivity
(dBm)
-17
-19
-22
-22
-28
-19.5
-23
Minimum
overload
(dBm)
-3
-3
-3
-9
-3
-3
Minimum
extinction
ratio (dB)
8.2
Optical
module
code
34060286
34060473
34060298
34060360
For details,
see
wavelength
allocation of
1000BASECWDM
optical
interfaces
and related
optical
module
code.
For details,
see
wavelength
allocation of
1000BASEBX optical
interfaces
and related
optical
module
code.
For details,
see
wavelength
allocation of
1000BASEBX optical
interfaces
and related
optical
module
code.
34060290
34060324
NOTE
For details of the optical module, see Optical Module Labels.
Issue 02 (2010-12-28)
16-13
16 Technical Specifications
Table 16-6 Wavelength allocation of 1000BASE-CWDM optical interfaces and related optical module code
SN
Optical module
code
Wavelength (nm)
SN
Optical
module code
Wavelength (nm)
34060483
1464.5 to 1477.5
34060478
1544.5 to 1557.5
34060481
1484.5 to 1497.5
34060476
1564.5 to 1577.5
34060479
1504.5 to 1517.5
34060477
1584.5 to 1597.5
34060482
1524.5 to 1537.5
34060480
1604.5 to 1617.5
Table 16-7 Wavelength allocation of 1000BASE-BX optical interfaces and related optical module code
Item
Local
Remote
34060470
34060475
34060539
34060540
1260 to 1360
1480 to 1500
1480 to 1500
1260 to 1360
(10 km)
Optical part number
(40 km)
Specification Requirement
Interface rate
1000 Mbit/s.
16.3.5 EG4F
The technical specifications of the EG4F include the interface specifications,board dimensions,
and weight.
Table 16-9 lists the specifications of the interfaces on the EG4F.
16-14
Issue 02 (2010-12-28)
16 Technical Specifications
Specification
Optical
interface
type
Single-fiber bidirectional
interface
1000BAS
E-SX
1000BAS
E-LX
1000BAS
E-VX
1000BASE
-ZX
1000BASECWDM
1000BASEBX
1000BASEBX
(0.5 km)
(10 km)
(40 km)
(80 km)
(80 km)
(10 km)
(40 km)
Fiber type
Multimode
Singlemode
Singlemode
Singlemode
Singlemode
Singlemode
Singlemode
Working
wavelength
range (nm)
770 to 860
1270 to
1360
1260 to
1360
1500 to
1580
For details,
see
wavelength
allocation of
1000BASECWDM
optical
interfaces
and related
optical
module
code.
For details,
see
wavelength
allocation of
1000BASEBX optical
interfaces
and related
optical
module
code.
For details,
see
wavelength
allocation of
1000BASEBX optical
interfaces
and related
optical
module
code.
Mean
launched
optical
power
(dBm)
-9.5 to 0
-11 to -3
-5 to 0
-2 to 5
0 to 5
-9 to -3
-3 to 3
Receiver
sensitivity
(dBm)
-17
-19
-22
-22
-28
-19.5
-23
Minimum
overload
(dBm)
-3
-3
-3
-9
-3
-3
Minimum
extinction
ratio (dB)
8.2
Issue 02 (2010-12-28)
16-15
16 Technical Specifications
Item
Specification
Optical
module
code
34060286
34060473
34060298
34060290
34060360
For details,
see
wavelength
allocation of
1000BASECWDM
optical
interfaces
and related
optical
module
code.
34060324
For details,
see
wavelength
allocation of
1000BASEBX optical
interfaces
and related
optical
module
code.
For details,
see
wavelength
allocation of
1000BASEBX optical
interfaces
and related
optical
module
code.
NOTE
For details of the optical module, see Optical Module Labels.
Table 16-10 Wavelength allocation of 1000BASE-CWDM optical interfaces and related optical module code
SN
Optical module
code
Wavelength (nm)
SN
Optical
module code
Wavelength (nm)
34060483
1464.5 to 1477.5
34060478
1544.5 to 1557.5
34060481
1484.5 to 1497.5
34060476
1564.5 to 1577.5
34060479
1504.5 to 1517.5
34060477
1584.5 to 1597.5
34060482
1524.5 to 1537.5
34060480
1604.5 to 1617.5
Table 16-11 Wavelength allocation of 1000BASE-BX optical interfaces and related optical module code
Item
Local
Remote
34060470
34060475
34060539
34060540
1260 to 1360
1480 to 1500
1480 to 1500
1260 to 1360
(10 km)
Optical part number
(40 km)
Issue 02 (2010-12-28)
16 Technical Specifications
16.3.6 TND1ML1/TND1ML1A
The technical specifications of the TND1ML1/TND1ML1A include the interface specifications,
dimensions, weight, and power consumption.
Table 16-12 lists the specifications of the interfaces on the TND1ML1/TND1ML1A.
Table 16-12 Specifications of the interfaces on the TND1ML1/TND1ML1A
Item
Specification Requirement
2048
Interface impedance
75 ohms (TND1ML1)
120 ohms (TND1ML1A)
Interface code
HDB3
0 to 6
Output jitter
16.3.7 TND2ML1A/TND2ML1B
The technical specifications of the TND2ML1A/TND2ML1B include the interface
specifications, dimensions, weight, and power consumption.
Table 16-13 lists the specifications of the interfaces on the TND2ML1A/TND2ML1B.
Table 16-13 Specifications of the interfaces on the TND2ML1A/TND2ML1B
Item
Specification Requirement
2048
Interface impedance
75 ohms (TND2ML1A)
120 ohms (TND2ML1B)
Issue 02 (2010-12-28)
16-17
16 Technical Specifications
Item
Specification Requirement
Interface code
HDB3
0 to 6
Output jitter
16.3.8 MD1A/MD1B
The technical specifications of the MD1A/MD1B include the interface specifications,
dimensions, weight, and power consumption.
Table 16-14 lists the specifications of the interfaces on the MD1A/MD1B.
Table 16-14 Specifications of the interfaces on the MD1A/MD1B
Item
Specification Requirement
2048
Interface impedance
75 ohms (MD1A)
120 ohms (MD1B)
16-18
Interface code
HDB3
0 to 6
Output jitter
Issue 02 (2010-12-28)
16 Technical Specifications
16.3.9 CD1
The technical specifications of the CD1 cover the interface specifications, board dimensions,
weight, and power consumption.
Table 16-15 lists the specifications of interfaces on the CD1.
Table 16-15 Technical specifications of the STM-1 optical interface
Item
Specification
155520
L-1.1
L-1.2
(15 km)
(40 km)
(80 km)
Fiber type
Single-mode
Single-mode
Single-mode
Working wavelength
range (nm)
1261 to 1360
1263 to 1360
1480 to 1580
-15 to -8
-5 to 0
-5 to 0
Receiver sensitivity
(dBm)
-28
-34
-34
-8
-10
-10
8.2
10
10
34060276
34060281
34060282
34060307
34060308
34060309
NOTE
For details of the optical module, see Optical Module Labels.
16.3.10 ADS2A/ADS2B
The technical specifications of the ADS2A/ADS2B cover the performance specifications, board
dimensions, weight, and power consumption.
Issue 02 (2010-12-28)
16-19
16 Technical Specifications
Table 16-16 and Table 16-17 list the performance specifications of the ADS2A/ADS2B.
Table 16-16 Performance specifications of the ADS2A
Interface
Max. Downstream
Rate
Transmission
Distance
ADSL standard
0.896 Mbit/s
8 Mbit/s
5.5 km
ADSL2
1.2 Mbit/s
15 Mbit/s
5.5 km
ADSL2+
1.2 Mbit/s
24 Mbit/s
5.5 km
Max. Downstream
Rate
Transmission
Distance
ADSL standard
0.896 Mbit/s
8 Mbit/s
4 km
ADSL2
1.2 Mbit/s
15 Mbit/s
4 km
ADSL2+
1.2 Mbit/s
24 Mbit/s
4 km
16.3.11 SHD4
The technical specifications of the SHD4 cover the performance specifications, board
dimensions, weight, and power consumption.
Table 16-18 lists the performance specifications of the SHD4.
Table 16-18 Performance specifications of the SHD4
Interface
Max.
Upstream
Rate
Max.
Downstream
Rate
Max. Four-Line
Bundling Rate
Max.
Transmission
Distance
G.SHDSL
5.7 Mbit/s
5.7 Mbit/s
23 Mbit/s
5.25 km
Issue 02 (2010-12-28)
16 Technical Specifications
16.3.12 SHD4I
The technical specifications of the SHD4I cover the interface specifications, board dimensions,
weight, and power consumption.
Table 16-19 lists the specifications of the interfaces of the SHD4I.
Table 16-19 Specifications of the interfaces of the SHD4I
Interface
Max.
Upstream Rate
(Mbit/s)
Max.
Downstream
Rate (Mbit/s)
Max. Rate of
Four Bundled
Interfaces
(Mbit/s)
Max.
Transmission
Distance (km)
G.SHDSL
2.3
2.3
9.2
5.25
16.3.13 AUXQ
The technical specifications of the AUXQ include the interface specifications, board dimensions,
weight, and power consumption.
Technical Specifications
Table 16-20 lists the technical specifications of the FE1 - FE4 on the AUXQ.
Table 16-20 Technical specifications of the FE1 - FE4
Item
Specification
100 Mbit/s
Other Specifications
Other specifications of the AUXQ are as follows:
l
Issue 02 (2010-12-28)
16-21
16 Technical Specifications
16.3.14 PIU
The technical specifications of the PIU cover the board dimensions, weight, power consumption,
and input voltage.
Table 16-21 lists the technical specifications of the PIU.
Table 16-21 Technical specifications of the PIU
Item
Technical Specification
Weight (kg)
0.12
0.5
-38.4 to -72.0
16.3.15 APIU
The technical specifications of the APIU cover the board dimensions, weight, power
consumption, and input voltage.
Table 16-22 lists the technical specifications of the APIU.
Table 16-22 Technical specifications of the APIU
Item
Technical Specification
Weight (kg)
1.93
32.6
Input voltage
100 V to 240 V AC
Frequency: 50/60 Hz
16.3.16 FAN
The technical specifications of the FAN cover the board dimensions, weight, power
consumption, and input voltage.
Table 16-23 lists the technical specifications of the FAN.
Table 16-23 Technical specifications of the FAN
16-22
Item
Technical Specification
Issue 02 (2010-12-28)
16 Technical Specifications
Item
Technical Specification
Weight (kg)
0.302
12 V DC power
Optical Interface
Type
Fiber
Type
Working
Wavelength
Range
(nm)
Mean
Launched
Optical
Power
Receiver
Sensitivity
Minimum
Overload
(dBm)
(dBm)
(dBm)
GE
Bidire
ctiona
l twofiber
1000BASESX
Multimode
770 to 860
-9.5 to 0
-17
Singlemode
1270 to 1360
-11 to -3
-19
-3
Singlemode
1270 to 1360
-5 to 0
-22
-3
Singlemode
1500 to 1580
-2 to 5
-22
-3
Singlemode
See Table
16-25.
0 to 5
-28
-9
Singlemode
See Table
16-26.
-9 to -3
-19.5
-3
(0.5km)
1000BASELX
(10km)
1000BASEVX
(40km)
1000BASEZX
(80km)
1000BASECWDM
(80km)
Bidire
ctiona
l
single
-fiber
1000BASEBX
(10km)
Issue 02 (2010-12-28)
16-23
16 Technical Specifications
Rate
Optical Interface
Type
Fiber
Type
Working
Wavelength
Range
Mean
Launched
Optical
Power
(nm)
Receiver
Sensitivity
Minimum
Overload
(dBm)
(dBm)
(dBm)
1000BASEBX
Singlemode
See Table
16-26.
-3 to 3
-23
-3
Singlemode
1261 to 1360
-15 to -8
-28
-8
Singlemode
1263 to 1360
-5 to 0
-34
-10
Singlemode
1480 to 1580
-5 to 0
-34
-10
Singlemode
1261 to 1360
-15 to -8
-28
-8
Singlemode
1263 to 1360
-5 to 0
-34
-10
Singlemode
1480 to 1580
-5 to 0
-34
-10
(40km)
FE
Bidire
ctiona
l twofiber
100BASEFX
(15km)
100BASEFX
(40km)
100BASEFX
(80km)
STM1
Bidire
ctiona
l twofiber
S-1.1
(15km)
L-1.1
(40km)
L-1.2
(80km)
Wavelength (nm)
SN
Wavelength (nm)
1464.5 to 1477.5
1544.5 to 1557.5
1484.5 to 1497.5
1564.5 to 1577.5
1504.5 to 1517.5
1584.5 to 1597.5
1524.5 to 1537.5
1604.5 to 1617.5
16-24
Wavelength
Local
Remote
1260 to 1360
1480 to 1500
1480 to 1500
1260 to 1360
Issue 02 (2010-12-28)
16 Technical Specifications
DANGER
Because laser beams from inside of the fiber can cause permanent eye damage, avoid direct eye
exposure to the optical interface during installation and maintenance.
When the laser safety class of an optical interface is class 1, the maximum optical power output
at the optical interface is lower than 10 dBm (10 mW).
The laser safety class of the CD1, EG4F, EG2 and EF8F board is class 1.
Interface
External
synchronous source
Two 120-ohm 2048 kbit/s (G.703) or 2048 kHz (G.703) inputs of the
clock signals, two inputs of the time signals (1PPS + Time
Information mode or DCLS mode)
Synchronous output
Issue 02 (2010-12-28)
16-25
16 Technical Specifications
Long-Term Phase
Variation (Locked
Mode)
Specification Requirement
System availability
2 hours
199998 hours
Test Standards
Radiated Emission
CISPR22 Class A
EN55022 Class A
CISPR22 Class A
EN55022 Class A
CISPR22 Class A
EN55022 Class A
16-26
Issue 02 (2010-12-28)
16 Technical Specifications
Test Item
Test Standards
Issue 02 (2010-12-28)
ITU-T K.45
Power Induction
ITU-T K.45
16-27
16 Technical Specifications
Standard
Safety
IEC 60950-1
IEC/EN60215
IEC/EN41003
EN 60950-1
UL 60950-1
CSA C22.2 No 60950-1
AS/NZS 60950-1
BS EN 60950-1
IS 13252
GB4943
FDA rules, 21 CFR 1040.10 and 1040.11
Laser safety
Climate
Table 16-32 lists the climate requirements for the storage of the OptiX PTN 950.
16-28
Issue 02 (2010-12-28)
16 Technical Specifications
Table 16-32 Climate requirements for the storage of the OptiX PTN 950
Item
Requirement
Temperature
- 40 C to +70 C
Relative humidity
10% to 100%
1 C/min
Wind speed
20 m/s
Air pressure
Solar radiation
1120 W/m2
Heat radiation
600 W/m2
Waterproof Requirement
Requirement for storing equipment on the customer site: Generally, the equipment must be
stored indoors.
No water should remain on the floor or leak to the equipment carton. The equipment should be
placed away from places where water leakage is possible, such as near the automatic fire-fighting
facilities and heating facilities.
If the equipment is stored outdoors, the following conditions must be met.
l
Required rainproof measures must be taken to prevent water from entering the carton.
Biological Environment
l
The density of the mechanical active substances complies with the requirements defined
in Table 16-33.
The density of the chemical active substances complies with the requirements defined in
Table 16-34.
Air Cleanness
Issue 02 (2010-12-28)
16-29
16 Technical Specifications
Table 16-33 Density requirements for mechanical active substances during storage
Mechanical Active Substance
Content
Suspending dust
5.00 mg/m3
Precipitable dust
20.0 mg/m2h
Gravel
300 mg/m3
Table 16-34 Density requirements for chemical active substances during storage
Chemical Active Substance
Content
SO2
0.30 mg/m3
H2S
0.10 mg/m3
NO2
0.50 mg/m3
NH3
1.00 mg/m3
Cl2
0.10 mg/m3
HCl
0.10 mg/m3
HF
0.01 mg/m3
O3
0.05 mg/m3
Mechanical Stress
Table 16-35 lists the requirements of mechanical stress for storage.
Table 16-35 Requirements of mechanical stress for storage
Item
Specification
Random vibration
ASD
0.02 m2/s3
Frequency range
5 Hz to 10
Hz
10 Hz to 50 Hz
50 Hz to 100
Hz
dB/oct
12
- 12
16-30
Issue 02 (2010-12-28)
16 Technical Specifications
Climate
Table 16-36 lists climate requirements for transportation.
Table 16-36 Climate requirements for transportation
Item
Requirement
Temperature
- 40 C to +70 C
Relative humidity
10% to 100%
Temperature change
rate
1C/min
Wind speed
20 m/s
Air pressure
Solar radiation
1120 W/m2
Heat radiation
600 W/m2
Waterproof Requirement
The following conditions must be met for transportation.
l
Required rainproof measures must be taken so that the water does not enter the cartons.
Biological Environment
l
The density of the mechanical active substances complies with the requirements defined
in Table 16-37.
The density of the chemical active substances complies with the requirements defined in
Table 16-38.
Air Cleanness
Table 16-37 Density requirements for mechanical active substances during transportation
Issue 02 (2010-12-28)
Content
Precipitable dust
3.0 mg/m2h
Gravel
100 mg/m3
16-31
16 Technical Specifications
Table 16-38 Density requirements for chemical active substances during transportation
Chemical Active Substance
Content
SO2
0.30 mg/m3
H2S
0.10 mg/m3
NO2
0.50 mg/m3
HCl
0.10 mg/m3
NH3
1.00 mg/m3
HF
0.01 mg/m3
O3
0.05 mg/m3
Cl2
0.10mg/m3
Mechanical Stress
Table 16-39 lists the requirements of mechanical stress for transportation.
Table 16-39 Requirements of mechanical stress for transportation
Item
Sub-Item
Specification
Random vibration
ASD
1 m2/s3
-3 dB
Frequency range
5 Hz to 20 Hz
20 Hz to 200
Hz
Direction of bump
Bump
Climate
Table 16-40 and Table 16-41 list the climate requirements for the operation of the OptiX PTN
950.
16-32
Issue 02 (2010-12-28)
16 Technical Specifications
Relative Humidity
-20 C to 60 C
NOTE
l When the equipment is installed in a network cabinet, the temperature at the air intake vent of the
network cabinet must be within the range of -20 C to 50 C. For details on the requirements for network
cabinets, see the Installation Guide.
l When the equipment is installed in an APM30 outdoor cabinet, the temperature at the air intake vent
of the outdoor cabinet must be within the range of -40 C to 50 C. For details on the requirements for
outdoor cabinet, see the Installation Guide.
l Short-term operation indicates the continuous operation of less than 96 hours or uncontinuous operation
of less than 15 accumulative days in one year.
l The temperature and relative humidity are measured at the place 1.5 m above floor and 0.4 m to the
front cabinet without any front or rear protection panel.
l If the equipment is installed in the cabinet, the effect of radiation can be ignored. If the equipment is
installed outdoors, proper protection should be provided for the equipment against the radiation.
Requirement
Altitude
4000 m (If the altitude is lower than 1800 m, the equipment works
normally. If the altitude is between 1800 m and 4000 m, the
equipment working temperature should be 1 C decreased with
every 220 m increased in the altitude.)
Temperature change
rate
0.5 C/min
Wind speed
5 m/s
Air pressure
Solar radiation
700 W/m2
Heat radiation
600 W/m2
Biological Environment
l
Air Cleanness
Issue 02 (2010-12-28)
16-33
16 Technical Specifications
The density of the mechanical active substances complies with the requirements defined
in Table 16-42.
The density of the chemical active substances complies with the requirements defined in
Table 16-43.
Table 16-42 Density restrictions for mechanical active substances during operation
Mechanical Active Substance
Content
Dust particle
3 x 105 particles/m3
Suspending dust
0.4 mg/m3
Precipitable dust
15 mg/m2h
Gravel
300 mg/m3
Table 16-43 Density requirements for chemical active substances during transportation
Chemical Active Substance
Content
SO2
0.30 mg/m3
H2S
0.10 mg/m3
NOx
0.50 mg/m3
NH3
3.00 mg/m3
Cl2
0.10 mg/m3
HCl
0.10 mg/m3
HF
0.01 mg/m3
O3
0.05 mg/m3
Mechanical Stress
Table 16-44 lists the requirements of mechanical stress for operation.
Table 16-44 Requirements for mechanical stress during operation
16-34
Item
Sub-Item
Specification
Sinusoidal vibration
Velocity
5 mm/s
Acceleration
2 m/s2
Frequency range
5 Hz to 62
Hz
62 Hz to 200 Hz
Issue 02 (2010-12-28)
16 Technical Specifications
Item
Sub-Item
Specification
Shock
Shock response
spectrum II
NOTE
A shock response spectrum is a graphical representation of an arbitrary transient acceleration input, such
as shock in terms of how the equipment responds to that input.
Issue 02 (2010-12-28)
16-35
17
Environment Standard
Standard or Protocol
Title
IEC 60068-1
Environmental testing
Part 1: General and guidance
IEC 60068-2
Issue 02 (2010-12-28)
IEC 600721-1
IEC 600721-2
IEC 600529
17-1
Standard or Protocol
Title
QM333
GR-63
GR-63-CORE
Standard or Protocol
Title
EMC Standard
17-2
CISPR22
GR-1089-CORE
IEC 61000-4-2
IEC 61000-4-3
IEC 61000-4-4
IEC 61000-4-5
Issue 02 (2010-12-28)
Standard or Protocol
Title
IEC 61000-4-6
IEC 61000-4-29
Title
IEC/EN/UL 60950-1
IEC/EN 60825-1
IEC/EN 60825-2
21 CFR 1040.10/1040.11
Issue 02 (2010-12-28)
Standard or Protocol
Title
IEEE802.1D
IEEE802.1Q
17-3
Standard or Protocol
Title
IEEE802.1ad
Provider bridges
IEEE802.1ag
ITU-T G.8012
ITU-T G.1731
ITU-T G.8031
ITU-T G.8010
ITU-T G.8011
ITU-T G.8021
MEF MEF2
MEF MEF4
L2VPN Standard
Standard or Protocol
Title
draft-ietf-l2vpn-oam-req-frmk-05
draft-ietf-l2vpn-signaling-08
RFC 4664
RFC 4665
RFC 4762
MPLS Standard
17-4
Standard or Protocol
Title
ITU-T G.8112
Issue 02 (2010-12-28)
Issue 02 (2010-12-28)
Standard or Protocol
Title
ITU-T G.8131
ITU-T Y.1711
ITU-T Y.1720
ITU-T Y.1561
ITU-T G.8110
ITU-T G.8110.1
ITU-T G.8121
ITU-T Y.1710
RFC 2702
RFC 2205
RFC 3031
MPLS architecture
RFC 3469
RFC 3811
RFC 3812
RFC 3813
RFC 3814
RFC 4220
RFC 4221
17-5
17-6
Standard or Protocol
Title
RFC 4377
RFC 4378
RFC 3032
RFC 3036
LDP specification
RFC 3037
LDP applicability
RFC 3209
RFC 3210
RFC 3215
RFC 3477
RFC 3478
RFC 3612
RFC 3815
RFC 3936
RFC 4090
RFC 4182
RFC 4201
draft-ietf-mpls-soft-preemption-08
RFC 3609
RFC 4204
RFC 4327
Issue 02 (2010-12-28)
PWE3 Standard
Standard or Protocol
Title
RFC 3916
RFC 3985
RFC 4197
RFC 4385
RFC 4446
RFC 4447
RFC 4448
RFC 4720
RFC 4553
draft-ietf-pwe3-cesopsn-07
draft-ietf-pwe3-vccv-11
draft-ietf-pwe3-segmented-pw-03
draft-ietf-pwe3-ms-pw-requirements-03
draft-ietf-pwe3-ms-pw-arch-02
Issue 02 (2010-12-28)
Standard or Protocol
Title
RFC 0826
RFC 3046
17-7
QoS Standard
17-8
Standard or Protocol
Title
ITU-T Y.1291
MEF MEF10
RFC 3289
RFC 3644
RFC 3670
RFC 2212
RFC 2474
RFC 2475
RFC 2597
RFC 2697
RFC 2698
RFC 3140
RFC 3246
RFC 3270
RFC 3564
RFC 4124
RFC 4125
RFC 4127
RFC 4128
Issue 02 (2010-12-28)
ATM Standard
Standard or Protocol
Title
RFC4717
RFC4816
RFC2684
ITU-T I.610
AF-PHY-0086.001
AF-TM-0121.000
Standard or Protocol
Title
ITU-T G.703
Physical/electrical characteristics of
hierarchical digital interfaces
ITU-T G.707
ITU-T G.773
ITU-T G.841
ITU-T G.957
SDH Standard
Issue 02 (2010-12-28)
17-9
A Glossary
Glossary
Numerics
1+1 hot backup
A backup mode in which two systems with the same functions are deployed, one in the
active state and the other in the standby state with power on. The standby system backs
up the data of the active system automatically. Once the active system encounters a fault,
the standby system takes over the service of the active system automatically or by manual
intervention.
1000BASE-T
Twisted cable with the transmission speed as 1000 Mbit/s and the transmission distance
as 100 m.
100BASE-TX
IEEE 802.3 Physical Layer specification for a 100 Mb/s CSMA/CD local area network
over two pairs of Category 5 unshielded twisted-pair (UTP) or shielded twisted-pair
(STP) wire.
A
AAL
ABR
AC
A list of entities, together with their access rights, which are authorized to have access
to a resource.
ACL
active link
In the link aggregation group, the links connected to active interfaces are active links.
active/standby
switchover
address pool
Issue 02 (2010-12-28)
A-1
A Glossary
Address Resolution
Protocol
administrative unit
The information structure which provides adaptation between the higher order path layer
and the multiplex section layer. It consists of an information payload (the higher order
VC) and an AU pointer which indicates the offset of the payload frame start relative to
the multiplex section frame start.
Administrator
A user who has authority to access all the Management Domains of the EMLCore
product. He has access to the whole network and to all the management functionalities.
ADSL
advanced ACL
An advanced ACL can define ACL rules based on the source addresses, target addresses,
protocol type, such as TCP source or target port, the type of the ICMP protocol, and
message codes.
AF
aggregated link
aggregation
AIS
alarm automatic report When an alarm is generated on the device side, the alarm is reported to the Network
Management System (NMS) . Then, an alarm panel prompts and the user can view the
details of the alarm.
alarm cascading
alarm cause
A single disturbance or fault may lead to the detection of multiple defects. A fault cause
is the result of a correlation process which is intended to identify the defect that is
representative of the disturbance or fault that is causing the problem.
alarm clearance
alarm indication signal A code sent downstream in a digital network as an indication that an upstream failure
has been detected and alarmed. It is associated with multiple transport layers.
A-2
Issue 02 (2010-12-28)
A Glossary
alarm inversion
For the port that has already been configured but has no service, this function can be
used to avoid generating relevant alarm information, thus preventing alarm interference.
The alarm report condition of the NE port is related to the alarm inverse mode (not
inverse, automatic recovery and manual recovery) setting of the NE and the alarm
inversion status (Enable and Disable) setting of the port. When the alarm inversion mode
of NE is set to no inversion, alarms of the port will be reported as usual no matter whatever
the inversion status of the port is. When the alarm inversion mode of the NE is set to
automatic recovery, and the alarm inversion state of the port is set to Enabled, then the
alarm of the port will be suppressed. The alarm inversion status of the port will
automatically recover to "not inverse" after the alarm ends. For the port that has already
been configured but not actually loaded with services, this function can be used to avoid
generating relevant alarm information, thus preventing alarm interference. When the
alarm inverse mode of the NE is set as "not automatic recovery", if the alarm inversion
status of the port is set as Enable, the alarm of the port will be reported.
alarm mask
On the host, an alarm management method through which users can set conditions for
the system to discard (not to save, display, or query for) the alarm information meeting
the conditions.
alarm name
Alarm name is a brief description of the symptom of the failure related to this alarm.
Alarm notification
When an error occurs, the performance measurement system sends performance alarms
to the destination (for example, a file and/or fault management system) designated by
users.
alarm parameter
Alarm parameters describe the location where the fault has occurred. For example, for
an alarm on a board, the parameters include the shelf ID, slot ID and port ID.
alarm severity
alarm status
The devices in the network report traps to the Network Management System (NMS),
which displays the alarm statuses in the topological view. The status of an alarm can be
critical, major, minor and prompt.
alarm suppression
A function used not to monitor alarms for a specific object, which may be the
networkwide equipment, a specific NE, a specific board and even a specific function
module of a specific board.
ALS
APS
ARP
AS
assured forwarding
One of the four per-hop behaviors (PHB) defined by the Diff-Serv workgroup of IETF.
It is suitable for certain key data services that require assured bandwidth and short delay.
For traffic within the bandwidth limit, AF assures quality in forwarding. For traffic that
exceeds the bandwidth limit, AF degrades the service class and continues to forward the
traffic instead of discarding the packets.
Issue 02 (2010-12-28)
A-3
A Glossary
asymmetric digital
subscriber line
asynchronization
Asynchronization does not use the exact data signals timed by the clock. The signals
have different frequencies and phases. The asynchronization usually encapsulates the
bits into the control flag, which specifies the beginning and end of the bits.
Asynchronous
Transfer Mode
A protocol for the transmission of a variety of digital signals using uniform 53 byte cells.
A transfer mode in which the information is organized into cells; it is asynchronous in
the sense that the recurrence of cells depends on the required or instantaneous bit rate.
Statistical and deterministic values may also be used to qualify the transfer mode.
ATM
ATM Adaptation
Layer
ATM PVC
attachment circuit
attenuation
AU
auto-negotiation
An optional function of the IEEE 802.3u Fast Ethernet standard that enables devices to
automatically exchange information over a link about speed and duplex abilities.
automatic laser
shutdown
automatic protection
switching
Autonomous System
A network set that uses the same routing policy and is managed by the same technology
administration department. Each AS has a unique identifier that is an integer ranging
from 1 to 65535. The identifier is assigned by IANA. An AS can be divided into areas.
A kind of service categories defined by the ATM forum. ABR only provides possible
forwarding service and applies to the connections that does not require the real-time
quality. It does not provide any guarantee in terms of cell loss or delay.
B
B-ISDN
backward
backward defect
indication
When detecting a defect, the sink node of a LSP uses backward defect indication (BDI)
to inform the upstream end of the LSP of a downstream defect along the return path.
A-4
Issue 02 (2010-12-28)
A Glossary
A logical entity that connects the BTS with the MSC in a GSM network. It interworks
with the BTS through the Abis interface, the MSC through the A interface. It provides
the following functions: radio resource management, base station management, power
control, handover control, and traffic measurement. One BSC controls and manages one
or more BTSs in an actual network.
base transceiver station A Base Transceiver Station terminates the radio interface. It allows transmission of traffic
and signaling across the air interface. The BTS includes the baseband processing, radio
equipment, and the antenna.
Basic ACL
A basic ACL can define ACL rules based on only source addresses.
basic input/output
system
bayonet-neillconcelman
BC
BDI
BE
BER
best effort
A traditional IP packet transport service. In this service, the diagrams are forwarded
following the sequence of the time they reach. All diagrams share the bandwidth of the
network and routers. The amount of resource that a diagram can use depends of the time
it reaches. BE service does not ensure any improvement in delay time, jitter, packet loss
ratio, and high reliability.
BFD
BGP
bidirectional
forwarding detection
A simple Hello protocol, similar to the adjacent detection in the route protocol. Two
systems periodically send BFD detection messages on the channel between the two
systems. If one system does not receive the detection message from the other system for
a long time, you can infer that the channel is faulty. Under some conditions, the TX and
RX rates between systems need to be negotiated to reduce traffic load.
BIOS
BIP
bit error
Ratio of received bits that contain errors. BER is an important index used to measure the
communications quality of a network.
Issue 02 (2010-12-28)
A-5
A Glossary
bit-interleaved parity
A method of error monitoring. With even parity an X-bit code is generated by the
transmitting equipment over a specified portion of the signal in such a manner that the
first bit of the code provides even parity over the first bit of all X-bit sequences in the
covered portion of the signal, the second bit provides even parity over the second bit of
all X-bit sequences within the specified portion, etc. Even parity is generated by setting
the BIP-X bits so that there is an even number of 1s in each monitored partition of the
signal. A monitored partition comprises all bits which are in the same bit position within
the X-bit sequences in the covered portion of the signal. The covered portion includes
the BIP-X.
BITS
BMC
BNC
See bayonet-neill-concelman
Border Gateway
Protocol
boundary clock
A clock with a clock port for each of two or more distinct PTP communication paths.
BPDU
The data messages that are exchanged across the switches within an extended LAN that
uses a spanning tree protocol (STP) topology. BPDU packets contain information on
ports, addresses, priorities and costs and ensure that the data ends up where it was
intended to go. BPDU messages are exchanged across bridges to detect loops in a
network topology. The loops are then removed by shutting down selected bridges
interfaces and placing redundant switch ports in a backup, or blocked, state.
Broadband Integrated A standard defined by the ITU-T to handle high-bandwidth applications, such as voice.
Services Digital
It currently uses the ATM technology to transmit data over SONNET-based circuits at
Networks
155 to 622 Mbit/s or higher speed.
broadband TV
broadcast address
broadcast domain
A group of network stations that receives broadcast packets originating from any device
within the group. Broadcasts do not pass through a router, which bound the domains. In
addition, the set of ports between which a device forwards a multicast, broadcast, or
unknown destination frame.
BSC
BTS
BTV
See broadband TV
building integrated
timing supply
In the situation of multiple synchronous nodes or communication devices, one can use
a device to set up a clock system on the hinge of telecom network to connect the
synchronous network as a whole, and provide satisfactory synchronous base signals to
the building integrated device. This device is called BITS.
bus
A path or channel for signal transmission. The typical case is that, the bus is an electrical
connection that connects one or more conductors. All devices that are connected to a
bus, can receive all transmission contents simultaneously.
A-6
Issue 02 (2010-12-28)
A Glossary
C
cable distribution plate A component which is used to arrange the cables in order.
cable tie
CAR
A network access method in which devices that are ready to transmit data first check the
channel for a carrier. If no carrier is sensed, a device can transmit. If two devices transmit
at once, a collision occurs and each computer backs off and waits a random amount of
time before attempting to retransmit. This is the access method used by Ethernet.
CBR
CBS
CC
CCF
CCM
CDR
CDV
CDVT
CE
This parameter measures the tolerance level a network interface has to aggressive
sending (back-to-back or very closely spaced cells) by a connected device, and does not
apply to end-systems.
Field in the ATM cell header that determines the probability of a cell being dropped if
the network becomes congested. Cells with CLP = 0 are insured traffic, which is unlikely
to be dropped. Cells with CLP = 1 are best-effort traffic, which might be dropped.
CES
CF
CFM
chain network
One type of network that all network nodes are connected one after one to be in series.
channel
CID
CIR
circuit emulation
service
A function with which the E1/T1 data can be transmitted through ATM networks. At the
transmission end, the interface module packs timeslot data into ATM cells. These ATM
cells are sent to the reception end through the ATM network. At the reception end, the
interface module re-assigns the data in these ATM cells to E1/T1 timeslots. The CES
technology guarantees that the data in E1/T1 timeslots can be recovered to the original
sequence at the reception end.
CIST
Issue 02 (2010-12-28)
A-7
A Glossary
CLNP
clock synchronization A type of high-decision clock defined by the IEEE 1588 V2 standard. The IEEE 1588
compliant with
V2 standard specifies the precision time protocol (PTP) in a measurement and control
precision time protocol system. The PTP protocol ensures clock synchronization precise to sub-microseconds.
clock tracing
The method to keep the time on each node being synchronized with a clock source in a
network.
CLP
coarse wavelength
division multiplexing
colored packet
A traffic control method that uses a set of rate limits to be applied to a router interface.
CAR is a configurable method by which incoming and outgoing packets can be classified
into QoS (Quality of Service) groups, and by which the input or output transmission rate
can be defined.
committed burst size. A parameter used to define the capacity of token bucket C, that is,
the maximum burst IP packet size when the information is transferred at the committed
information rate. This parameter must be larger than 0. It is recommended that this
parameter should be not less than the maximum length of the IP packet that might be
forwarded.
committed information The rate at which a frame relay network agrees to transfer information in normal
rate
conditions. Namely, it is the rate, measured in bit/s, at which the token is transferred to
the leaky bucket.
common and internal
spanning tree
The single spanning tree calculated by STP and RSTP together with the logical
continuation of that connectivity by using MST Bridges and regions, calculated by MSTP
to ensure that all LANs in the bridged local area network are simply and fully connected.
common spanning tree A single spanning tree that connects all the MST regions in a network. Every MST region
is considered as a switch; therefore, the CST can be regarded as their spanning tree
generated with STP/RSTP.
compact flash
Compact flash (CF) was originally developed as a type of data storage device used in
portable electronic devices. For storage, CompactFlash typically uses flash memory in
a standardized enclosure.
congestion
congestion
management
A flow control measure to solve the problem of network resource competition. When
the network congestion occurs, it places the packet into the queue for buffer and
determines the order of forwarding the packet.
connection control
The set of functions used for setting up, maintaining and releasing a communication path
between two or more users or a user and a network entity, e.g. a dual tone multi-frequency
receiver.
connection control
function
A functional entity in the distributed functional plane of the intelligent network (IN)
conceptual model, which provides the basic call services of the bearer (telecom) network
and the advanced switch-based services with the call processing and controlling
functions.
A-8
Issue 02 (2010-12-28)
A Glossary
connection identifier
The MAC layer defined in the IEEE802.16 protocol is based on connection. Each
connection is uniquely identified with a CID.
connectivity check
Ethernet CFM can detect the connectivity between MEPs. The detection is achieved by
each MEP transmitting a Continuity Check Message (CCM) periodically.
connectivity fault
management
A kind of service categories defined by the ATM forum. CBR transfers cells based on
the constant bandwidth. It is applicable to service connections that depend on precise
clocking to ensure undistorted transmission.
constraint shortest path An extension of shortest path algorithms like OSPF and IS-IS. The path computed using
first
CSPF is a shortest path fulfilling set of constrains. It simply means that it runs shortest
path algorithm after pruning those links that violate a given set of constraints. A
constraint could be minimum bandwidth required per link (also know as bandwidth
guaranteed constraint), end-to-end delay, maximum number of link traversed etc. CSPF
is widely used in MPLS Traffic Engineering. The routing using CSPF is known as
Constraint Based Routing (CBR).
constraint-based
routed label switched
path
continuity check
message
control plane
The control plane performs the call control and connection control functions. Through
signaling, the control plane sets up and releases connections, and may restore a
connection in case of a failure. The control plane also performs other functions in support
of call and connection control, such as routing information dissemination.
control word
convergence layer
The convergence layer is a "bridge" between the access layer and the core layer. It
provides the convergence and forwarding functions for the access layer. It processes all
the traffic from the access layer devices, and provides the uplinks to the core layer.
Compared with the access layer, the convergence layer devices should have higher
performances, fewer interfaces and higher switching rate. In the real network, the
convergence layer refers to the network between UPEs and PE-AGGs.
core layer
The core layer functions as the backbone of high speed switching for networks, and it
provides high speed forwarding communications. It has a backbone transmission
structure that provides high reliability, high throughput, and low delay. The core layer
devices must have a good redundancy, error tolerance, manageability, adaptability, and
they support dual-system hot backup or load balancing technologies. In a real network,
the core layer includes the IP/MPLS backbone network consisting of NPEs and backbone
routers.
CPE
CPN
CR-LSP
CRC
Issue 02 (2010-12-28)
A-9
A Glossary
crossover cable
A twisted pair patch cable wired in such a way as to route the transmit signals from one
piece of equipment to the receive signals of another piece of equipment, and vice versa.
CSMA/CD
CSPF
CST
CTD
current alarm
current performance
data
customer edge
A part of BGP/MPLS IP VPN model. It provides interfaces for direct connection to the
Service Provider (SP) network. A CE can be a router, switch, or host.
customer premises
equipment
CV
connectivity verification
CW
CWDM
cyclic redundancy
check
A procedure used in checking for errors in data transmission. CRC error checking uses
a complex calculation to generate a number based on the data transmitted. The sending
device performs the calculation before transmission and includes it in the packet that it
sends to the receiving device. The receiving device repeats the same calculation after
transmission. If both devices obtain the same result, it is assumed that the transmission
was error free. The procedure is known as a redundancy check because each transmission
includes not only data but extra (redundant) error-checking values.
D
data communication
network
data communications
channel
The data channel that uses the D1-D12 bytes in the overhead of an STM-N signal to
transmit information on operation, management, maintenance and provision (OAM&P)
between NEs. The DCC channels that are composed of bytes D1-D3 is referred to as the
192 kbit/s DCC-R channel. The other DCC channel that are composed of bytes D4-D12
is referred to as the 576 kbit/s DCC-M channel.
data connection
equipment
Data connection equipment including analog, DSL, ISDN, cable modem circuits.
Layer 2 in the open system interconnection (OSI) architecture; the layer that provides
services to transfer data over the transmission link between open systems.
data terminal
equipment
A user device composing the UNI. The DTE accesses the data network through the DCE
equipment (for example, model) and usually uses the clock signals produced by DCE.
A-10
Issue 02 (2010-12-28)
A Glossary
Datagram
DC
DCC
DCE
DCN
DDF
DDN
DE
DEI
delay variation
dense wavelength
division multiplexing
Technology that utilizes the characteristics of broad bandwidth and low attenuation of
single mode optical fiber, employs multiple wavelengths with specific frequency spacing
as carriers, and allows multiple channels to transmit simultaneously in the same fiber.
desired Min Tx interval The minimum interval that the local system would like to use when transmitting BFD
control packets.
Detection multiplier
The desired detect time multiplier for BFD control packets. It determines the session
detection time together with the DMTI and RMRI.
DHCP
DHCP Relay
Dynamic Host Configuration Protocol relay (DHCP relay) is a function that enables
forwarding of DHCP data between the device that requests the IP address and the DHCP
server.
DHCP Server
A program that allocates the IP addresses of the local address pool to the users at the
user side and allocates the IP addresses of the relay address pool to the users that pass
through the DHCP proxy at the network side.
differentiated services
A service architecture that provides the end-to-end QoS function. It consists of a series
of functional units implemented at the network nodes, including a small group of perhop forwarding behaviors, packet classification functions, and traffic conditioning
functions such as metering, marking, shaping and policing.
DiffServ
A high-quality data transport tunnel that combines the digital channel (such as fiber
channel, digital microwave channel, or satellite channel) and the cross multiplex
technology.
digital distribution
frame
A type of equipment used between the transmission equipment and the exchange with
transmission rate of 2 to 155 Mbit/s to provide the functions such as cables connection,
cable patching, and test of loops that transmitting digital signals.
A technology for providing digital connections over the copper wire or the local
telephone network. DSL performs data communication over the POTS lines without
affecting the POTS service.
A network device, usually situated in the main office of a telephone company that
receives signals from multiple customer Digital Subscriber Line (DSL) connections and
puts the signals on a high-speed backbone line using multiplexing techniques.
Issue 02 (2010-12-28)
A-11
A Glossary
direct current
Electrical current whose direction of flow does not reverse. The current may stop or
change amplitude, but it always flows in the same direction.
discard eligible
A bit in the frame relay header. It indicates the priority of a packet. If a node supports
the FR QoS, the rate of the accessed FR packets is controlled. When the packet traffic
exceeds the specified traffic, the DE value of the redundant packets is set to 1. In the
case of network congestion, the packets with DE value as 1 are discarded at the node.
Discrete service
The cross-connection that exists on an NE but cannot form trails on the network
management system.
dispersion
DLL
DMTI
DNI
DNS
A hierarchical naming system for computers, services, or any resource connected to the
Internet or a private network. It associates various information with domain names
assigned to each of the participants. The Domain Name System distributes the
responsibility of assigning domain names and mapping those names to IP addresses by
designating authoritative name servers for each domain.
DRDB
DEI indicates the eight transmission precedence in the PRI field can be combined with
drop precedence.
DS
DS boundary node
DS domain
DS interior node
DS node
A DS-compliant node, which is subdivided into DS boundary node and ID interior node.
DSL
DSLAM
DTE
dual homing
dual node
interconnection
DNI provides an alternative physical interconnection point, between the rings, in case
of an interconnection failure scenario.
dual-ended switching
A protection operation method which takes switching action at both ends of the protected
entity (e.g. "connection", "path"), even in the case of a unidirectional failure.
DWDM
A-12
Issue 02 (2010-12-28)
A Glossary
Dynamic Host
Dynamic Host Configuration Protocol (DHCP) is a client-server networking protocol.
Configuration Protocol A DHCP server provides configuration parameters specific to the DHCP client host
requesting, generally, information required by the host to participate on the Internet
network. DHCP also provides a mechanism for allocation of IP addresses to hosts.
dynamic service
A term used in IEEE (Institute of Electrical and Electronic Engineers) 802.16 networks
to describe a set of messages and protocols that allow a base station and subscriber station
to add, modify, or delete the characteristics of s service flow.
E
E-LAN
E-Tree
See Ethernet-tree
E1
EBS
ECC
Edge LSR
The basic unit of the MPLS network is LSR. The network composed by LSR is named
MPLS domain. LSR is located at the edge of the MPLS domain. LSR used to connect
other user network is named Label Edge Router (LER). The LSR in the core of the
internal area is the core LSR. The core LSR can be the router that supports MPLS and
be the ATM-LSR generated after the ATM switch is ungraded. LSRs in the domain
communicated by MPLS.
EF
EFM
EGP
Egress
The group is transferred along the LSP consisting of a series of LSRs after the group is
labeled. The egress LER is named Egress.
electromagnetic
compatibility
electromagnetic
interference
electromagnetic
shielding
The process of limiting the coupling of an electromagnetic field between two locations.
Typically, it is applied to enclosures, separating electrical circuits from external
surroundings, and to cables, separating internal wires from the surroundings that the
cable passes through.
electrostatic discharge
The sudden and momentary electric current that flows between two objects at different
electrical potentials caused by direct contact or induced by an electrostatic field.
embedded control
channel
A logical channel that uses a data communications channel (DCC) as its physical layer,
to enable transmission of operation, administration, and maintenance (OAM)
information between NEs.
EMC
EMI
Issue 02 (2010-12-28)
A-13
A Glossary
EMS
Engineering label
EPL
EPLAN
error tolerance
The ability of a system or component to continue normal operation despite the presence
of erroneous inputs.
ESD
ESD jack
Electrostatic discharge jack. A hole in the cabinet or shelf, which connect the shelf or
cabinet to the insertion of ESD wrist strap.
ETH-LT
Last mile access from the broadband device to the user community. The EFM takes the
advantages of the SHDSL.b is technology and the Ethernet technology. The EFM
provides both the traditional voice service and internet access service of high speed. In
addition, it meets the users requirements on high definition television system (HDTV)
and Video On Demand (VOD).
Ethernet LAN
A type of Ethernet service that is provided with dedicated bandwidth and point-to-point
connections on an SDH, PDH, ATM, or MPLS server layer network.
Ethernet virtual
private LAN
Ethernet virtual
private LAN service
An Ethernet service type, which carries Ethernet characteristic information over a shared
bridge, point-to-multipoint connections, provided by SDH, PDH, ATM, or MPLS server
layer networks.
Ethernet-tree
ETS
ETSI
European
Telecommunications
Standards Institute
A standards-setting body in Europe. Also the standards body responsible for GSM.
EVPLAN
EVPLn
A-14
Issue 02 (2010-12-28)
A Glossary
A parameter related to traffic. In the single rate three color marker (srTCM) mode, the
traffic control is achieved by the token buckets C and E. Excess burst size is a parameter
used to define the capacity of token bucket E, that is, the maximum burst IP packet size
when the information is transferred at the committed information rate. This parameter
must be larger than 0. It is recommended that this parameter should be not less than the
maximum length of the IP packet that might be forwarded.
Exercise Switching
EXP
expedited forwarding
The highest order QoS in the Diff-Serv network. EF PHB is suitable for services that
demand low packet loss ratio, short delay, and broad bandwidth. In all the cases, EF
traffic can guarantee a transmission rate equal to or faster than the set rate. The DSCP
value of EF PHB is "101110".
experimental bits
A field in the MPLS packet header, three bits long. This field is always used to identify
the CoS of the MPLS packet.
Extended ID
The number of the subnet that an NE belongs to, for identifying different network
segments in a WAN. The extended ID and ID form the physical ID of the NE.
Exterior Gateway
Protocol
A protocol for exchanging routing information between two neighbor gateway hosts
(each with its own router) in a network of autonomous systems.
extra traffic
The traffic that is carried over the protection channels when that capacity is not used for
the protection of working traffic. Extra traffic is not protected.
F
fair queue
A mechanism for queue scheduling in which network resource is allocated equally and
delay and jitter time of all traffic are optimized.
fast Ethernet
Any network that supports transmission rate of 100Mbits/s. The Fast Ethernet is 10 times
faster than 10BaseT, and inherits frame format, MAC addressing scheme, MTU, and so
on. Fast Ethernet is extended from the IEEE802.3 standard, and it uses the following
three types of transmission media: 100BASE-T4 (4 pairs of phone twisted-pair cables),
100BASE-TX (2 pairs of data twisted-pair cables), and 100BASE-FX (2-core optical
fibers).
fast reroute
A technology to locally protect MPLS TE network. Only the interface with the speed of
100 Mbps can support FRR. If the switching speed of FRR can reach 50ms, the packet
loss decreases when some faults occur on the network. FRR is applicable to services that
are very sensitive to packet loss and delay. When a fault is detected at the lower layer,
the lower layer informs the upper routing system of the fault. Then the routing system
forwards packets through a backup link. In this manner, the impact of the link fault on
services is minimized. FRR is local and temporary. Once the protected LSP recovers or
a new LSP is set up, traffic is switched to the original or the new LSP. After you configure
FRR on LSP and some link or some node on LSP is invalid, traffic is switched to the
protected link and a new LSP is trying to be set up on the LSP ingress.
FDI
FE
FEC
FF
Issue 02 (2010-12-28)
A-15
A Glossary
FFD
FFD packet
FFD is a path failure detection method independent from CV. Different from a CV
packet, the frequency for generating FFD packets is configurable to satisfy different
service requirements. By default, the frequency is 20/s. An FFD packet contains
information the same as that in a CV packet. The destination end LSR processes FFD
packets in the same way for processing CV packets.
FIB
A kind of fiber used for connections between the subrack and the ODF, and for
connections between subracks or inside a subrack.
field programmable
gate array
FIFO
A member of the TCP/IP suite of protocols, used to copy files between two computers
on the Internet. Both computers must support their respective FTP roles: one must be an
FTP client and the other an FTP server.
filler panel
A piece of board to cover vacant slots, to keep the frame away from dirt, to keep proper
airflow inside the frame, and to beautify the frame appearance.
first in first out queuing A queuing policy that features that the packet reaching earlier can be allocated resource
firstly.
fixed filter style
On an MPLS network, an RSVP node creates a distinct reservation for data packets from
a particular sender. This sender does not share its resource reservation with other senders.
flash memory
flow control
A set of mechanisms used to prevent the network from being overloaded by regulating
the input rate transmissions.
flow queue
The same type of services of a user is considered one service flow; HQoS performs queue
scheduling according to the services of each user. The service flows of each user are
classified into four FQs, namely, CS, EF, AF, and BE. CS is assigned a traffic shaping
percentage for Priority Queuing (PQ); EF, AF, and BE are assigned weights for Weighted
Fair Queuing (WFQ). The preceding two scheduling modes occupy a certain bandwidth
each; they can act at the same time without interfering each other.
Forward
forward defect
indication
Forward defect indication (FDI) is generated and traced forward to the sink node of the
LSP by the node that first detects defects. It includes fields to indicate the nature of the
defect and its location. Its primary purpose is to suppress alarms being raised at affected
higher level client LSPs and (in turn) their client layers.
forward information
base
A-16
Issue 02 (2010-12-28)
A Glossary
forwarding equivalence As a class-based forwarding technology, MPLS classifies the packets with the same
class
forwarding mode, and the process is called Forwarding Equivalence Class. Packets with
the same FEC are processed similarly on an MPLS network. It is flexible to divide FECs,
and it can be a combination of the source address, the destination address, the source
port, the destination port, the protocol type, the VPN, and so on.
Forwarding plane
Also referred to as the data plane. The forwarding plane is connection-oriented, and can
be used in Layer 2 networks such as an ATM network.
FPGA
FQ
FR
frame relay
A packet-switching protocol for use on WANs (wide area networks). Frame relay
transmits variable-length packets at up to 2 Mbps over predetermined, set paths known
as PVCs (permanent virtual circuits). It is a variant of X.25 but dispenses with some of
X.25s error detection for the sake of speed. See also ATM (definition 1), X.25.
Free-run mode
FRR
FTP
full-duplex
G
Gateway IP
When an NE accesses a remote network management system or NE, a router can be used
to enable the TCP/IP communication. In this case, the IP address of the router is the
gateway IP. Only the gateway NE requires the IP address. The IP address itself cannot
identify the uniqueness of an NE. The same IP addresses may exist in different TCP/IP
networks. An NE may have multiple IP addresses, for example, one IP address of the
network and one IP address of the Ethernet port.
gateway network
element
A network element that is used for communication between the NE application layer and
the NM application layer
GE
generic framing
procedure
A framing and encapsulated method which can be applied to any data type. It has been
standardized by ITU-T SG15.
generic routing
encapsulation
Issue 02 (2010-12-28)
A-17
A Glossary
GFP
gigabit Ethernet
GE adopts the IEEE 802.3z. GE is compatible with 10 Mbit/s and 100 Mbit/s Ethernet.
It runs at 1000 Mbit/s. Gigabit Ethernet uses a private medium, and it does not support
coaxial cables or other cables. It also supports the channels in the bandwidth mode. If
Gigabit Ethernet is, however, deployed to be the private bandwidth system with a bridge
(switch) or a router as the center, it gives full play to the performance and the bandwidth.
In the network structure, Gigabit Ethernet uses full duplex links that are private, causing
the length of the links to be sufficient for backbone applications in a building and campus.
Global Positioning
System
GND
Ground
GNE
GPS
GR
graceful restart
graphical user interface A visual computer environment that represents programs, files, and options with
graphical images, such as icons, menus, and dialog boxes, on the screen.
GRE
GSM
GUI
H
half-duplex
Hardware loopback
A connection mode in which a fiber jumper is used to connect the input optical interface
to the output optical interface of a board to achieve signal loopback.
HDSL
hello packet
A-18
Issue 02 (2010-12-28)
A Glossary
In a SDH network, the higher order path layers provide a server network from the lower
order path layers.
History Performance
Data
The performance data that is stored in the history register or that is automatically reported
and stored in the NMS.
Hold priority
The priority of the tunnel with respect to holding resources, ranging from 0 (indicates
the highest priority) to 7. It is used to determine whether the resources occupied by the
tunnel can be preempted by other tunnels.
hot plugging
hot standby
HP
HSB
HSDPA
I
I/O
input/output
IANA
ICMP
IE
IEC
IEEE
IETF
IGMP
IGMP snooping
IGP
IGRP
IMA
Issue 02 (2010-12-28)
A-19
A Glossary
IMA frame
The IMA frame is used as the unit of control in the IMA protocol. It is a logical frame
defined as M consecutive cells, numbered 0 to M-l, transmitted on each of the N links
in an IMA group.
information element
Ingress
The group is transferred along the LSP consisting of a series of LSRs after the group is
labeled. The ingress LER is named Ingress.
Inloop
A method of looping the signals from the cross-connect unit back to the cross-connect
unit.
Institute of Electrical
and Electronics
Engineers
A society of engineering and electronics professionals based in the United States but
boasting membership from numerous other countries. The IEEE focuses on electrical,
electronics, computer engineering, and science-related matters.
integrated services
digital network
Interior Gateway
Protocol
A routing protocol that is used within an autonomous system. The IGP runs in smallsized and medium-sized networks. The commonly used IGPs are the routing information
protocol (RIP), the interior gateway routing protocol (IGRP), the enhanced IGRP
(EIGRP), and the open shortest path first (OSPF).
Interior Gateway
Routing Protocol
A routing protocol from Cisco that was developed in 1988 to overcome the shortcomings
of RIP. IGRP takes bandwidth, latency, reliability and current traffic load into
consideration. It is typically used within an autonomous system, such as an Internet
domain. IGRP was superseded by Enhanced IGRP (EIGRP).
International
Electrotechnical
Commission
The International Electrotechnical Commission (IEC) is an international and nongovernmental standards organization dealing with electrical and electronical standards.
International
Telecommunication
Union
A United Nations agency, one of the most important and influential recommendation
bodies, responsible for recommending standards for telecommunication (ITU-T) and
radio networks (ITU-R).
Internet assigned
numbers authority
The organization operated under the IAB. IANA delegates authority for IP address-space
allocation and domain-name assignment to the NIC and other organizations. IANA also
maintains a database of assigned protocol identifiers used in the TCP/IP suite, including
autonomous system numbers.
Internet Control
Message Protocol
A network-layer (ISO/OSI level 3) Internet protocol that provides error correction and
other information relevant to IP packet processing. For example, it can let the IP software
on one machine inform another machine about an unreachable destination. See also
communications protocol, IP, ISO/OSI reference model, packet (definition 1).
Internet Engineering
Task Force
A-20
Issue 02 (2010-12-28)
A Glossary
Internet Group
Management Protocol
The protocol for managing the membership of Internet Protocol multicast groups among
the TCP/IP protocols. It is used by IP hosts and adjacent multicast routers to establish
and maintain multicast group memberships.
Internet Protocol
The TCP/IP standard protocol that defines the IP packet as the unit of information sent
across an internet and provides the basis for connectionless, best-effort packet delivery
service. IP includes the ICMP control and error message protocol as an integral part. The
entire protocol suite is often referred to as TCP/IP because TCP and IP are the two
fundamental protocols. IP is standardized in RFC 791.
Internet protocol
television
Internet Protocol
version 4
The current version of the Internet Protocol (IP). IPv4 utilizes a 32bit address which is
assigned to hosts. An address belongs to one of five classes (A, B, C, D, or E) and is
written as 4 octets separated by periods and may range from 0.0.0.0 through to
255.255.255.255. Each IPv4 address consists of a network number, an optional
subnetwork number, and a host number. The network and subnetwork numbers together
are used for routing, and the host number is used to address an individual host within the
network or subnetwork.
Internet protocol
version 6
A update version of IPv4. It is also called IP Next Generation (IPng). The specifications
and standardizations provided by it are consistent with the Internet Engineering Task
Force (IETF). IPv6 is also called. It is a new version of the Internet Protocol, designed
as the successor to IPv4. The difference between IPv6 and IPv4 is that an IPv4 address
has 32 bits while an IPv6 address has 128 bits.
Internet service
provider
An organization that offers users access to the Internet and related services.
interworking
A way to connect telecom devices so that they can communicate with each other.
inverse multiplexing
over ATM
The ATM inverse multiplexing technique involves inverse multiplexing and demultiplexing of ATM cells in a cyclical fashion among links grouped to form a higher
bandwidth logical link whose rate is approximately the sum of the link rates. This is
referred to as an IMA group.
IP
IP address
A 32-bit (4-byte) binary number that uniquely identifies a host (computer) connected to
the Internet for communication with other hosts in the Internet by transferring packets.
An IP address is expressed in dotted decimal notation, consisting of the decimal values
of its 4 bytes, separated with periods; for example, 127.0.0.1. The first three bytes of the
IP address identify the network to which the host is connected, and the last byte identify
the host itself.
IP Protocol
IPTV
IPv4
Issue 02 (2010-12-28)
A-21
A Glossary
IPv6
ISDN
ISP
IST
ITU
J
jumper
L
L2VPN
Label distribution
Packets with the same destination address belong to an FEC. A label out of an MPLS
label resource pool is allocated to the FEC. LSRs record the relationship of the label and
the FEC. Then, LSRs sends a message and advertises to upstream LSRs about the label
and FEC relationship in message. The process is called label distribution.
Label Distribution
Protocol
A protocol defined for distributing labels in MPLS network. It is the set of procedures
and messages by which Label Switched Routers (LSRs) establish Label Switched Paths
(LSPs) through a network by mapping network-layer routing information directly to
data-link layer switched paths. More information about the applicability of LDP can be
found in [RFC3037].
A device that sits at the edge of an MPLS domain, that uses routing information to assign
labels to datagrams and then forwards them into the MPLS domain.
Label space
Basic element of MPLS network. All LSRs support the MPLS protocol. The LSR is
composed of two parts: control unit and forwarding unit. The former is responsible for
allocating the label, selecting the route, creating the label forwarding table, creating and
removing the label switch path; the latter forwards the labels according to groups
received in the label forwarding table.
LACP
LAG
LAN
LAN switch
Layer 2 Multicast
When Ethernet is used as the link layer, Layer 2 multicast uses multicast MAC addresses
for traffic transmission. Therefore, a technology must exist to map the IP multicast
address to the multicast MAC address.
layer 2 switch
A data forwarding method. In LAN, a network bridge or 802.3 Ethernet switch transmits
and distributes packet data based on the MAC address. Since the MAC address is the
second layer of the OSI model, this data forwarding method is called layer 2 switch.
A-22
Issue 02 (2010-12-28)
A Glossary
Layer 2 virtual private A virtual private network achieved by Layer 2 switching technologies in the packet
network
switched (IP/MPLS) network.
LB
See loopback
LBM
LBR
LC
Lucent connector
LCT
LDP
LDP peer
Two LSRs that use LDP to exchange labels or FEC mappings. LDP sessions exist
between them.
LER
limit rate
A traffic management technology used to limit the total rate of packet sending on a
physical interface or a Tunnel interface. LR is directly enabled on the interface to control
the traffic passing the interface.
line rate
The maximum packet forwarding capacity on a cable. The value of line rate equals the
maximum transmission rate capable on a given type of media.
Link Aggregation
Control Protocol
link aggregation group An aggregation that allows one or more links to be aggregated together to form a link
aggregation group so that a MAC client can treat the link aggregation group as if it were
a single link.
Link Control Protocol
In the Point-to-Point Protocol (PPP), the Link Control Protocol (LCP) establishes,
configures, and tests data-link Internet connections.
Link Group
According to some principles, links are divided into the set in the logical term. A set of
links is called the link group. The division makes management more convenient.
The Link Layer Discovery Protocol (LLDP) is an L2D protocol defined in IEEE 802.1ab.
Using the LLDP, the NMS can rapidly obtain the Layer 2 network topology and changes
in topology when the network scales expand.
Link Monitoring
Link monitoring is a mechanism for an interface to notify the peer of the fault when the
interface detects that the number of errored frames, errored codes, or errored frame
seconds reaches or exceeds the specified threshold.
Link Protection
Protection provided by the bypass tunnel for the link on the working tunnel. The link is
a downstream link adjacent to the PLR. When the PLR fails to provide node protection,
the link protection should be provided.
link state
advertisement
The link in LSA is any type of connection between OSPF routers, while the state is the
condition of the link.
Link status
The running status of a link, which can be Up, Down, backup, or unknown.
linktrace message
The message sent by the initiator MEP of 802.1ag MAC Trace to the destination MEP
is called Linktrace Message(LTM). LTM includes the Time to Live (TTL) and the MAC
address of the destination MEP2.
Issue 02 (2010-12-28)
A-23
A Glossary
linktrace reply
For 802.1ag MAC Trace, the destination MEP replies with a response message to the
source MEP after the destination MEP receives the LTM, and the response message is
called Linktrace Reply (LTR). LTR also includes the TTL that equals the result of the
TTL of LTM minus 1.
LLC
LLDP
LLID
locate loopback ID
LMP
LMSP
load sharing
A device running mode. Two or more hardware units can averagely share the system
load according to their processing capabilities when they work normally. When a
hardware unit becomes faulty, the other units fulfill the tasks of the faulty unit on the
precondition of guaranteeing the system performance, for example, few call loss.
A network formed by the computers and workstations within the coverage of a few square
kilometers or within a single building. It features high speed and low error rate. Ethernet,
FDDI, and Token Ring are three technologies used to implement a LAN. Current LANs
are generally based on switched Ethernet or Wi-Fi technology and running at 1,000 Mbit/
s (that is, 1 Gbit/s).
Lock status
Services are not switched to the protection board or channel when a fault occurs, if
currently no switching takes place. If currently the switching takes place, after the
working board or channel recovers to normal, the services are not switched back to the
working board or channel.
Locked switching
When the switching condition is satisfied, this function disables the service from being
switched from the working channel to the protection channel. When the service has been
switched, the function enables the service to be restored from the protection channel to
the working channel.
LOF
According to the IEEE 802 family of standards, Logical Link Control (LLC) is the upper
sublayer of the OSI data link layer. The LLC is the same for the various physical media
(such as Ethernet, token ring, WLAN).
LOM
loss of multiframe
loopback
A troubleshooting technique that returns a transmitted signal to its source so that the
signal or message can be analyzed for errors.
loopback message
The loopback packet sent by the node that supports 802.2ag MAC Ping to the destination
node. LBM message carries its own sending time.
loopback reply
For 802.2ag MAC Ping, the destination MEP replies with a response message to the
source MEP after the destination MEP receives the LBM, and the response message is
called Loopback Reply. The LBR carries the sending time of LBM, the receiving time
of LBM and the sending time of LBR.
LOP
LOS
Loss Of Frame
A-24
Issue 02 (2010-12-28)
A Glossary
loss of pointer
Loss Of Signal
Loss of signal (LOS) indicates that there are no transitions occurring in the received
signal.
LPQ is performed after WFQ. It also means the device schedules queues strictly based
on the priority of queues.
Lower subrack
The subrack close to the bottom of the cabinet when a cabinet contains several subracks.
Lower Threshold
When the performance event count value is smaller than a certain value, a thresholdcrossing event occurs. The value is the lower threshold.
LP
LPQ
LPT
LR
LSA
LSDB
LSP
LSP tunnel
For an LSP, after a label is assigned to an FEC on the ingress, the label determines the
traffic forwarding. The traffic is transparent to the intermediate nodes. In this sense, an
LSP can be regarded as an LSP tunnel.
LSR
LSS
LT
linktrace
LTM
LTR
M
MA
MAC
MAC address learning Service that characterizes a learning bridge, in which the source MAC address of each
received packets is stored so that future packets destined for that address can be
forwarded only to the bridge interface on which that address is located. Packets destined
for unrecognized addresses are forwarded out every bridge interface. This scheme helps
minimize traffic on the attached LANs. MAC address learning is defined in the IEEE
802.1 standard.
main distribution
frame
mains supply
The commercial power supply of a nation. In China, the nominal voltage of the mains
supply is 220 V AC and the frequency is 50 Hz.
Issue 02 (2010-12-28)
A-25
A Glossary
maintenance
association
maintenance
association end point
A MEP is an actively managed CFM Entity, associated with a specific DSAP of a Service
Instance, which can generate and receive CFM frames and track any responses. It is an
end point of a single Maintenance Association, and terminates a separate Maintenance
Entity for each of the other MEPs in the same Maintenance Association.
maintenance
association
intermediate point
A CFM Entity, associated with a specific pair of ISS Service Access Points or EISS
Service Access Points, which reacts and responds to CFM frames. It is associated with
a single Maintenance Association, and is an intermediate point within one or more
Maintenance Entities.
maintenance domain
The network or the part of the network for which connectivity is managed by CFM. The
devices in an MD are managed by a single ISP.
maintenance point
MAN
Management right
The right enabling a user to manage the specified devices and boards or the group of a
user to manage specified domains.
manual switch
Switches normal traffic signal to the protection section, unless a failure condition exists
on other sections (including the protection section) or an equal or higher priority switch
command is in effect, by issuing a manual switch request for that normal traffic signal.
master-slave
synchronization
In the master-slave mode, a designated master clock disseminates its frequency reference
to all other slave clocks.
maximum transmission The largest packet of data that can be transmitted on a network. MTU size varies,
unit
depending on the network, 576 bytes on X.25 networks, for example, 1500 bytes on
Ethernet, and 17,914 bytes on 16 Mbps Token Ring. Responsibility for determining the
size of the MTU lies with the link layer of the network. When packets are transmitted
across networks, the path MTU, or PMTU, represents the smallest packet size (the one
that all networks can transmit without breaking up the packet) among the networks
involved.
MBS
MCF
MCR
MD
MD5
MDF
MDP
The average time that a device will take to recover from a failure.
A-26
Issue 02 (2010-12-28)
A Glossary
A protocol at the media access control sublayer. The protocol is at the lower part of the
data link layer in the OSI model and is mainly responsible for controlling and connecting
the physical media at the physical layer. When transmitting data, the MAC protocol
checks whether to be able to transmit data. If the data can be transmitted, certain control
information is added to the data, and then the data and the control information are
transmitted in a specified format to the physical layer. When receiving data, the MAC
protocol checks whether the information is correct and whether the data is transmitted
correctly. If the information is correct and the data is transmitted correctly, the control
information is removed from the data and then the data is transmitted to the LLC layer.
media gateway
A logical entity that converts the format of the media of a network to meet the format
requirement of another network. It can process audio services, video services and data
services, and convert the media format in full duplex mode. In addition, it can play certain
audio and video signals, and provide the IVR function and media conference.
MEP
merge point
The LSR where one or more backup tunnels rejoin the path of the protected LSP
downstream of the potential failure. The same LSR may be both an MP and a PLR
simultaneously.
message
communication
function
message digest
algorithm 5
message dispatch
processor
The MDP roughly processes the received messages, and then sends the messages to the
destinations.
metropolitan area
network
A metropolitan area network (MAN) is a network that interconnects users with computer
resources in a geographic area or region larger than that covered by even a large local
area network (LAN) but smaller than the area covered by a wide area network (WAN).
The term is applied to the interconnection of networks in a city into a single larger
network (which may then also offer efficient connection to a wide area network). It is
also used to mean the interconnection of several local area networks by bridging them
with backbone lines. The latter usage is also sometimes referred to as a campus network.
MGW
microwave
The portion of the electromagnetic spectrum with much longer wavelengths than infrared
radiation, typically above about 1 mm.
Minimum Cell Rate (MCR). Parameter defined by the ATM Forum for ATM traffic
management. MCR is defined only for Available Bit Rate (ABR) transmissions, and
specifies the minimum value for the ACR.
MIP
mirror
It is an action to store a copy of a file to another archive site to release the load of the
original site, or to provide an archive site closer to the users geographically.
MLD
MLPPP
Issue 02 (2010-12-28)
A-27
A Glossary
MP
MP
MP-BGP
MPLS L2VPN
The MPLS L2VPN provides the Layer 2 VPN service based on an MPLS network. In
this case, on a uniform MPLS network, the carrier is able to provide Layer 2 VPNs of
different media types, such as ATM, FR, VLAN, Ethernet, and PPP.
MPLS OAM
The MPLS OAM provides continuity check for a single LSP, and provides a set of fault
detection tools and fault correct mechanisms for MPLS networks. The MPLS OAM and
relevant protection switching components implement the detection function for the CRLSP forwarding plane, and perform the protection switching in 50 ms after a fault occurs.
In this way, the impact of a fault can be lowered to the minimum.
MPLS TE tunnel
MS
MSP
MST
MSTI
MSTP
MTBF
MTTR
MTU
Multi-link Point to
Point Protocol
A protocol used in ISDN connections. MLPPP lets two B channels act as a single line,
doubling connection rates to 128 kbit/s.
Multi-protocol
Extensions for Border
Gateway Protocol
Multicast
A process of transmitting packets of data from one source to many destinations. The
destination address of the multicast packet uses Class D address, that is, the IP address
ranges from 224.0.0.0 to 239.255.255.255. Each multicast address represents a multicast
group rather than a host.
multicast group
A set of members participating in the packet multicast service. The multicast group is
defined by a rule (or set of rules) which identifies a collection of members implicitly or
explicitly. This rule may associate members for the purpose of participating in a call, or
may associate members who do not participate in data transfer but do participate in
management, security, control, and accounting for the multicast group.
multicast listener
discovery
The MLD is used by the IPv6 router to discover the multicast listeners on their directly
connected network segments, and set up and maintain member relationships. On IPv6
networks, after MLD is configured on the receiver hosts and the multicast router to which
the hosts are directly connected, the hosts can dynamically join related groups and the
multicast router can manage members on the local network.
A-28
Issue 02 (2010-12-28)
A Glossary
multiple spanning tree Multiple spanning tree instance. One of a number of Spanning Trees calculated by MSTP
instance
within an MST Region, to provide a simply and fully connected active topology for
frames classified as belonging to a VLAN that is mapped to the MSTI by the MST
Configuration. A VLAN cannot be assigned to multiple MSTIs.
Multiple Spanning
Tree Protocol
Multiple spanning tree protocol. The MSTP can be used in a loop network. Using an
algorithm, the MSTP blocks redundant paths so that the loop network can be trimmed
as a tree network. In this case, the proliferation and endless cycling of packets is avoided
in the loop network. The protocol that introduces the mapping between VLANs and
multiple spanning trees. This solves the problem that data cannot be normally forwarded
in a VLAN because in STP/RSTP, only one spanning tree corresponds to all the VLANs.
Multiple Spanning
Tree Region
The MST region consists of switches that support the MSTP in the LAN and links among
them. Switches physically and directly connected and configured with the same MST
region attributes belong to the same MST region. The attributes for the same MST region
are as follows: Same region name Same revision level Same mapping relation between
the VLAN ID to MSTI
multiplex section
The trail between and including two multiplex section trail termination functions.
multiplex section
protection
A function, which is performed to provide capability for switching a signal between and
including two multiplex section termination (MST) functions, from a "working" to a
"protection" channel.
multiplex section
termination
The function performed to generate the MSOH in the process of forming an SDH frame
signal and terminates the MSOH in the reverse direction.
Multiplexing
A procedure by which multiple lower order path layer signals are adapted into a higher
order path or the multiple higher order path layer signals are adapted into a multiplex
section.
Multiservice capability It specifies whether multiple services can be independently processed during a session.
N
NA
NCP
NE database
There are three types of database on NE SCC board as following: (1) DRDB: a dynamic
database in a dynamic RAM, powered by battery; (2) SDB: a static database in a powerdown RAM; (3) FDB0, FDB0: permanently saved databases in a Flash ROM. In efficient
operation, the NE configuration data is saved in DRDB and SDB at the same time.
Backing up an NE database means backing up the NE configuration data from SDB to
FDB0 and FDB1. When an NE is restarted after power-down, the NE database is restored
in the following procedures: As the SDB data is lost due to power-down, the main control
restores the data first from DRDB. If the data in DRDB is also lost due to the exhaustion
of the battery, the data is restored from FDB0 or FDB1.
NE ID
An ID that indicates a managed device in the network. In the network, each NE has a
unique NE ID.
NE side
The NE configuration data saved on the SCC board of the equipment, which can be
uploaded to the network management system and then stored in databases on the network
management system NE side.
network address
On the Internet, addresses are based on the IP protocol, which uses a 32-bit code in the
IP header to identify host addresses.
Issue 02 (2010-12-28)
A-29
A Glossary
Network Control
Protocol
This is the program that switches the virtual circuit connections into place, implements
path control, and operates the Synchronous Data Link Control (SDLC) link.
Network diameter
The maximum of network bridges that the communication passes through between any
two terminal devices in the switched network.
Network entity
Network entity refers to the universal basic devices used to describe the functions and
structure of the transmission network, which considerably facilitates the description of
the network. The network entities include transmission object and sub-network.
network layer
The network layer is layer 3 of the seven-layer OSI model of computer networking. The
network layer provides routing and addressing so that two terminal systems are
interconnected. In addition, the network layer provides congestion control and traffic
control. In the TCP/IP protocol suite, the functions of the network layer are specified
and implemented by IP protocols. Therefore, the network layer is also called IP layer.
Network Management A system in charge of the operation, administration, and maintenance of a network.
System
network node interface The interface at a network node which is used to interconnect with another network node.
network segment
A part of an Ethernet or other network, on which all message traffic is common to all
nodes, that is, it is broadcast from one node on the segment and received by all others.
network service access A network address defined by ISO, through which entities on the network layer can
point
access OSI network services.
network storm
Network Time Protocol The Network Time Protocol (NTP) defines the time synchronization mechanism. It
synchronizes the time between the distributed time server and the client.
network unit layer
The logical layer that implements the configuration, failure and performance for a single
network element in the layered management architecture of the telecom network
management system.
NMS
NNHOP
next-next-hop
NNI
Node Protection
A parameter of the FRR protection. It indicates that the bypass tunnel should be able to
protect the downstream node that is involved in the working tunnel and adjacent to the
PLR. The node cannot be a merge point, and the bypass tunnel should also be able to
protect the downstream link that is involved in the working tunnel and adjacent to the
PLR.
NPC
NRT
non-real-time
NSAP
NSF
NTP
A-30
Issue 02 (2010-12-28)
A Glossary
O
OAM
OAMPDU
ODF
OOF
open shortest path first A link-state, hierarchical interior gateway protocol (IGP) for network routing. Dijkstra's
algorithm is used to calculate the shortest path tree. It uses cost as its routing metric. A
link state database is constructed of the network topology which is identical on all routers
in the area.
Open Systems
Interconnection
operation log
operation,
administration and
maintenance
A group of network support functions that monitor and sustain segment operation,
activities that are concerned with, but not limited to, failure detection, notification,
location, and repairs that are intended to eliminate faults and keep a segment in an
operational state and support activities required to provide the services of a subscriber
access network to users/subscribers.
A device installed at the end of a fiber, optical source or receive unit. It is used to couple
the optical wave to the fiber when connected to another device of the same type. A
connector can either connect two fiber ends or connect a fiber end and a optical source
(or a detector).+
optical distribution
frame
optical fiber
OSI
OSPF
out of frame
Outloop
A method of looping back the input signals received at an port to an output port without
changing the structure of the signals.
overcurrent protection A circuit protection technology. When there is a great volume of traffic on a circuit and
the current is stronger than the protection threshold, the circuit is cut off after the circuit
protector timer expires.
overhead cabling
Issue 02 (2010-12-28)
Cables or fibers connect the cabinet with other equipment from the top of the cabinet.
A-31
A Glossary
P
P
A backbone device that is located in the service provider network. A P device is not
directly connected with the CE devices. The P devices only need the basic MPLS
forwarding capability and do not maintain information about a VPN.
P2P
packet loss
The discarding of data packets in a network when a device is overloaded and cannot
accept any incoming data at a given moment.
A MAN and WAN technology that provides point-to-point data connections. The POS
interface uses SDH/SONET as the physical layer protocol, and supports the transport of
packet data (such as IP packets) in MAN and WAN.
Packet rate
The number of bits or bytes passed within a specified time. It is expressed in bits/s or
bytes/s.
packet switching
parity
A method for character level error detection. An extra bit added to a string of bits, usually
a 7-bit ASCII character, so that the total number of bits 1 is odd or even (odd or even
parity). Both ends of a data transmission must use the same parity. When the transmitting
device frames a character, it counts the numbers of 1s in the frame and attaches the
appropriate parity bit. The recipient counts the 1s and, if there is parity error, may ask
for the data to be retransmitted.
pass-through
The action of transmitting the same information that is being received for any given
direction of transmission.
path layer
A layer within an SDH entity that supports the SDH based network transport services,
e.g. multiplexing, cross-connection, regeneration. The network element function is
modeled by managed objects.
PBS
PCB
PCI bus
PCI (Peripheral Component Interconnect) bus. A high performance bus, 32-bit or 64-bit
for interconnecting chips, expansion boards, and processor/memory subsystems.
PCR
PDH
PDU
PE
A parameter used to define the capacity of token bucket P, that is, the maximum burst
IP packet size when the information is transferred at the peak information rate. This
parameter must be larger than 0. It is recommended that this parameter should be not
less than the maximum length of the IP packet that might be forwarded.
Peak Information Rate. A traffic parameter, expressed in bit/s, whose value should be
not less than the committed information rate.
Peer
A-32
Issue 02 (2010-12-28)
A Glossary
penultimate hop
popping
per-hop behavior
Performance register
Performance register is the memory space for performance event counts, including 15min current performance register, 24-hour current performance register, 15-min history
performance register, 24-hour history performance register, UAT register and CSES
register. The object of performance event monitoring is the board functional module, so
every board functional module has a performance register. A performance register is
used to count the performance events taking place within a period of operation time, so
as to evaluate the quality of operation from the angle of statistics.
protection ground
phase-locked loop
A circuit that consists essentially of a phase detector which compares the frequency of
a voltage-controlled oscillator with that of an incoming carrier signal or referencefrequency generator; the output of the phase detector, after passing through a loop filter,
is fed back to the voltage-controlled oscillator to keep it exactly in phase with the
incoming or reference frequency.
PHB
PHP
physical layer
Physical layer is the Layer 1 in the Open System Interconnection (OSI) architecture; the
layer that provides services to transmit bits or groups of bits over a transmission link
between open systems and which entails electrical, mechanical and handshaking
physical link
The physical link refers to the link between two physical NEs. When the user creates
NEs or refreshes the device status, the system automatically creates the physical link
according to the topology structure information on the device. The physical link can
modify the remarks information. It cannot be deleted.
Ping Test
A test that is performed to send a data packet to the target IP address (a unique IP address
on the device on the network) to check whether the target host exists according to the
data packet of the same size returned from the target host.
PIR
plesiochronous digital
hierarchy
A multiplexing scheme of bit stuffing and byte interleaving. It multiplexes the minimum
rate 64 kit/s into the 2 Mbit/s, 34 Mbit/s, 140 Mbit/s, and 565 Mbit/s rates.
PLL
PLR
The ingress node of the bypass tunnel. The head-end node of a backup tunnel or a detour
tunnel.
point to multipoint
A communications network that provides a path from one location to multiple locations
(from one to many).
Issue 02 (2010-12-28)
A-33
A Glossary
A service between two terminal users. In P2P services, senders and recipients are
terminal users.
Point-to-Point Protocol A protocol on the data link layer, provides point-to-point transmission and encapsulates
data packets on the network layer. It is located in layer 2 of the IP protocol stack.
policy template
To define the calculation rules of a charging event, for example, rating, debiting and
accumulating. A policy template may contain the parameters to be instantiated. They
can be used when the attributes of the condition judgment, calculation method, and action
functions are carried out.
port forwarding
Port priority
The priority used when a port attaches tags to Layer 2 packets. Packets received on ports
with higher priorities are forwarded preferentially.
POS
power up
PPP
PPS
PQ
PQ
PRBS
PRC
Precision Time
Protocol
Preemption
During the process of establishing CR-LSP, if you cannot fine one path that satisfies
requirements, you can remove another established path and take up its bandwidth
resource. That is called preemption. CR-LSP check whether the path can be preempted
according to two priority features, that is, Setup Priority and Holding Priority.
Preemption is activated by the Resv message of RSVP-TE. Only when the priority of
Path1, which you want to set up, is higher than that of Path2, you can preempt the
bandwidth source of Path2 for Path1.
priority queue
A priority queue is an abstract data type in computer programming that supports the
following three operations: 1) InsertWithPriority: add an element to the queue with an
associated priority 2) GetNext: remove the element from the queue that has the highest
priority, and return it (also known as "PopElement(Off)", or "GetMinimum") 3)
PeekAtNext (optional): look at the element with highest priority without removing it
priority queuing
The Priority Queuing (PQ) is a queue scheduling algorithm based on the absolute priority.
According to the PQ algorithm, services of higher priorities are ensured with greater
bandwidth, lower latency, and less jitter. Packets of lower priorities must wait to be sent
till all packets of higher priorities are sent. In this manner, services of higher priorities
are handled earlier than others.
protection channels
The channels allocated to transport the working traffic during a switch event. When there
is a switch event, traffic on the affected working channels is bridged onto on the
protection channels.
A-34
Issue 02 (2010-12-28)
A Glossary
A bar connecting the PGND cable of the cabinet so that the cabinet and the earth are in
the same equipotential level.
protection ground
cable
A cable which connects the equipment and the protection grounding bar. Usually, one
half of the cable is yellow; while the other half is green.
Protection path
Protection service
provider edge
A device that is located in the backbone network of the MPLS VPN structure. A PE is
responsible for VPN user management, establishment of LSPs between PEs, and
exchange of routing information between sites of the same VPN. During the process, a
PE performs the mapping and forwarding of packets between the private network and
the public channel. A PE can be a UPE, an SPE, or an NPE.
pseudo random binary A sequence that is random in a sense that the value of an element is independent of the
sequence
values of any of the other elements, similar to real random sequences.
pseudo wire emulation A type of end-to-end Layer 2 transmitting technology. It emulates the essential attributes
edge-to-edge
of a telecommunication service such as ATM, FR or Ethernet in a Packet Switched
Network (PSN). PWE3 also emulates the essential attributes of low speed Time Division
Multiplexed (TDM) circuit and SONET/SDH. The simulation approximates to the real
situation.
PSTN
PTMP
PTN
PTP
public switched
telephone network
Pulse per second, which, strictly speaking, is not a time synchronization signal. This is
because 1PPS provides only the "gauge" corresponding to the UTC second, but does not
provide the information about the day, month, or year. Therefore, 1PPS is used as the
reference for frequency synchronization. On certain occasions, 1PPS can also be used
on other interfaces for high precision timing.
PVP
PWE3
Q
QinQ
A layer 2 tunnel protocol based on IEEE 802.1Q encapsulation. It encapsulates the tag
of the user's private virtual local area network (VLAN) into the tag of the public VLAN.
The packet carries two layers of tags to travel through the backbone network of the
carrier. In this manner, the layer 2 virtual private network (VPN) is provided for the user.
QoS
Issue 02 (2010-12-28)
A-35
A Glossary
quality of service
R
R99
Release 1999
The network that provides the connection between CPEs and the CN. It isolates the CN
from wireless network.
radio frequency
radio network
controller
An equipment in the RNS which is in charge of controlling the use and the integrity of
the radio resources.
RAN
random early detection A packet loss algorithm used in congestion avoidance. It discards the packet according
to the specified higher limit and lower limit of a queue so that global TCP synchronization
resulted in traditional Tail-Drop can be prevented.
Rapid Spanning Tree
Protocol
An evolution of the Spanning Tree Protocol, providing for faster spanning tree
convergence after a topology change. The RSTP protocol is backward compatible with
the STP protocol.
rated current
RDI
Re-optimization
Real-time Transport Protocol (RTP) is a host-to-host protocol. It is used to deliver realtime services such as audio and video over the IP network.
The rt-VBR is intended for real-time applications, such as compressed voice over IP
(VoIP) and video conferencing. The rt-VBR is characterized by a peak cell rate (PCR),
sustained cell rate (SCR), and maximum burst size (MBS). You can expect the source
device to transmit in bursts and at a rate that varies with time.
Real-time Transport
Protocol
A type of host-to-host protocol used in real-time multimedia services such as Voice over
IP (VoIP) and video.
reboot
To start the system again. Programs or data will be reloaded to all boards.
RED
reference clock
A kind of stable and high-precision autonous clock providing frequencies for other clocks
for reference.
REI
A-36
Issue 02 (2010-12-28)
remote defect
indication
A Glossary
A signal transmitted at the first opportunity in the outgoing direction when a terminal
detects specific defects in the incoming signal.
remote error indication A remote error indication (REI) is sent upstream to signal an error condition. There are
two types of REI alarms: Remote error indication line (REI-L) is sent to the upstream
LTE when errors are detected in the B2 byte. Remote error indication path (REI-P) is
sent to the upstream PTE when errors are detected in the B3 byte.
remote maintenance
association end point
For the other devices in the same MA, their MEPs are called the Remote Maintenance
association End Points (RMEPs).
remote monitor
A widely used network management standard defined by the IETF, and it enhances the
MIB II standard greatly. It mainly functions to monitor the data traffic over a network
segment or the entire network. RMON is completely based on the SNMP architecture,
including the NMS and the Agent running on each network device.
Request For Comments A document in which a standard, a protocol, or other information pertaining to the
operation of the Internet is published. The RFC is actually issued, under the control of
the IAB, after discussion and serves as the standard. RFCs can be obtained from sources
such as InterNIC.
required Min Rx
interval
The minimum interval between received BFD control packets that the local system is
capable of supporting.
Resource Reservation
Protocol
The Resource Reservation Protocol (RSVP) is designed for Integrated Service and is
used to reserve resources on every node along a path. RSVP operates on the transport
layer; however, RSVP does not transport application data. RSVP is a network control
protocol like Internet Control Message Protocol (ICMP).
reverse pressure
A traffic control method. In telecommunication, when detecting that the transmit end
transmits a large volume of traffic, the receive end sends signals to ask the transmit end
to slow down the transmission rate.
RF
RFC
ring network
A type of network topology in which each node connects to exactly two other nodes,
forming a circular pathway for signals.
RIP
RMEP
RMON
RMRI
RNC
RoHS
rollback
Root alarm
An alarm directly caused by anomaly events or faults in the network. Some lower-level
alarms always accompany a root alarm.
Route restriction
The constraint conditions for calculating a route. When creating a trail, the user can
specify the explicit route and the NEs that the trail cannot pass. The explicit route and
the NEs are the constraints for calculating the route. The inevitable trail only functions
when the number of routes is calculated as 1. Double-click the NE icon can set the NE
as an NE that cannot be passed, and double-clicking it again can cancel the setting.
Issue 02 (2010-12-28)
A-37
A Glossary
Routing Information
Protocol
A simple routing protocol that is part of the TCP/IP protocol suite. It determines a route
based on the smallest hop count between source and destination. RIP is a distance vector
protocol that routinely broadcasts routing information to its neighboring routers and is
known to waste bandwidth.
routing policy
Routing policies are implemented to filter routing information, mainly through the
change of route properties.
routing protocol
A formula used by routers to determine the appropriate path onto which data should be
forwarded.
routing table
A table that stores and updates the locations (addresses) of network devices. Routers
regularly share routing table information to be up to date. A router relies on the
destination address and on the information in the table that gives the possible routes--in
hops or in number of jumps--between itself, intervening routers, and the destination.
Routing tables are updated frequently as new information is available.
RS232
RS422
The specification that defines the electrical characteristics of balanced voltage digital
interface circuits. The interface can change to RS232 via the hardware jumper and others
are the same as RS232.
RSTP
RSVP
rt-VBR
RTP
RTP
S
S-VLAN
service VLAN
S1 byte
In an SDH network, each network element traces step by step to the same clock reference
source through a specific clock synchronization path, thus realizing the synchronization
of the whole network. If a clock reference source traced by the NE is missing, this NE
will trace another clock reference source of a lower level. To implement protection
switching of clocks in the whole network, the NE must learn about clock quality
information of the clock reference source it traces. Therefore, ITU-T defines S1 byte to
transmit network synchronization status information. It uses the lower four bits of the
multiplex section overhead S1 byte to indicate 16 types of synchronization quality
grades. Auto protection switching of clocks in a synchronous network can be
implemented using S1 byte and a proper switching protocol.
SC
SCR
SD
SDH
SDP
A-38
Issue 02 (2010-12-28)
A Glossary
security alarm
security level
security log
Security logs record the security operations on the NMS, such as logging in to the server,
modifying the password, and exiting from the NMS server.
SEMF
sequence number
service data
The user and/or network information required for the normal functioning of service.
SETS
Setup Priority
The priority of the tunnel with respect to obtaining resources, ranging from 0 (indicates
the highest priority) to 7. It is used to determine whether the tunnel can preempt the
resources required by other backup tunnels.
SFP
shaping
The process of delaying packets within a traffic stream to cause it to conform to certain
defined traffic profile.
SHDSL
signal cable
Common signal cables cover the E1 cable, network cable, and other non-subscriber
signal cable.
signal degrade
A signal indicating the associated data has degraded in the sense that a degraded defect
(e.g., dDEG) condition is active.
signaling stream
Simple Network
Management Protocol
A network management protocol of TCP/IP. It enables remote users to view and modify
the management information of a network element. This protocol ensures the
transmission of management information between any two points. The polling
mechanism is adopted to provide basic function sets. According to SNMP, agents, which
can be hardware as well as software, can monitor the activities of various devices on the
network and report these activities to the network console workstation. Control
information about each device is maintained by a management information block.
Simple Traffic
Classification
Simple traffic classification (STC) organizes data packets into multiple priorities or
multiple service classes. A network administrator can set STC policies. An STC policy
can include the IP precedence or the DSCP value of an IP packet, the EXP value of an
MPLS packet, the ToS field in the IP packet header or the 802.1p value of a VLAN
packet.
single-ended switching A protection operation method which takes switching action only at the affected end of
the protected entity (e.g. "trail", "subnetwork connection"), in the case of a unidirectional
failure.
Issue 02 (2010-12-28)
A-39
A Glossary
A symmetric digital subscriber line technology developed from HDSL, SDSL, and
HDSL2, which is defined in ITU-T G.991.2. The SHDSL port is connected to the user
terminal through the plain telephone subscriber line and uses trellis coded pulse
amplitude modulation (TC-PAM) technology to transmit high-speed data and provide
the broadband access service.
Slicing
small form-factor
pluggable
SMB
sub-miniature B
Smooth upgrade
SNMP
SONET
Spanning Tree Protocol STP is a protocol that is used in the LAN to remove the loop. STP applies to the redundant
network to block some undesirable redundant paths through certain algorithms and prune
a loop network into a loop-free tree network.
SPE
SPF
SQN
square connector
SSM
SSMB
static ARP
A protocol that binds some IP addresses to a specified gateway. The packet of these IP
addresses must be forwarded through this gateway.
static route
A route that cannot adapt to the change of network topology. Operators must configure
it manually. When a network topology is simple, the network can work in the normal
state if only the static route is configured. It can improve network performance and ensure
bandwidth for important applications. Its disadvantage is as follows: When a network is
faulty or the topology changes, the static route does not change automatically. It must
be changed by the operators.
A static routing table is constructed manually by the system administrator using the route
command.
Statistical multiplexing A multiplexing technique whereby information from multiple logical channels can be
transmitted across a single physical channel. It dynamically allocates bandwidth only to
active input channels, to make better use of available bandwidth and allow more devices
to be connected than with other multiplexing techniques. Compare with TDM.
STP
subnet mask
The technique used by the IP protocol to determine which network segment packets are
destined for. The subnet mask is a binary pattern that is stored in the client machine,
server or router and is matched with the IP address.
A-40
Issue 02 (2010-12-28)
A Glossary
superstratum provider The SPE devices are core devices that are located within a VPLS full-meshed network.
edge
The UPE devices that are connected with the SPE devices are similar to the CE devices.
The PWs set up between the UPE devices and the SPE devices serve as the ACs of the
SPE devices. The SPE devices must learn the MAC addresses of all the sites on UPE
side and those of the UPE interfaces that are connected with the SPE. SPE is sometimes
called NPE.
Switching restoration
time
It refers to the period of time between the start of detecting and the moment when the
line is switched back to the original status after protection switching occurs in the MSP
sub-network.
Synchronization Status A message that carries quality levels of timing signals on a synchronous timing link.
Message
Nodes on an SDH network and a synchronization network acquire upstream clock
information through this message. Then the nodes can perform proper operations on their
clocks, such as tracing, switching, or converting to holdoff), and forward the
synchronization information to downstream nodes.
Synchronize Alarm
When synchronizing the alarms, the network management system checks the alarms in
the network management system database and the alarms in the NE. If they are
inconsistent, the alarms in the NE are uploaded to the network management system
database and overwrite the old ones.
synchronize NE time
To send the system time of the server of the network management system to NEs so as
to synchronize all NEs with the server.
synchronous digital
hierarchy
A transmission scheme that follows ITU-T G.707, G.708, and G.709. It defines the
transmission features of digital signals such as frame structure, multiplexing mode,
transmission rate level, and interface code. SDH is an important part of ISDN and BISDN. It interleaves the bytes of low-speed signals to multiplex the signals to high-speed
counterparts, and the line coding of scrambling is only used only for signals. SDH is
suitable for the fiber communication system with high speed and a large capacity since
it uses synchronous multiplexing and flexible mapping structure.
synchronous
equipment
management function
The SEMF converts performance data and implementation specific hardware alarms into
object-oriented messages for transmission over DCCs and/or a Q interface.
synchronous
equipment timing
source
The SETS function provides timing reference to the relevant component parts of
multiplexing equipment and represents the SDH network clement clock.
synchronous optical
network
Synchronous source
A clock providing timing services to connected network elements. This would include
clocks conforming to Recommendations G.811, G.812 and G.813.
SYSLOG
Syslog Service
Syslog service is used to manage the device to send the log information to the host. It is
used on the sending-information port.
system logging
System log tracks miscellaneous system events like startup, shutdown and events like
hardware and controller failures.
Issue 02 (2010-12-28)
A-41
A Glossary
T
Tail drop
A congestion management mechanism, in which packets arrive later are discarded when
the queue is full. This policy of discarding packets may result in network-wide
synchronization due to the TCP slow startup mechanism.
tangent rings
It is a concept in geometry. There is a public node between two ring networks. The public
node often brings in single-point failure.
TCH
TCP
TCP/IP
TDD
TDM
TE
Telecommunication
A protocol model defined by ITU-T for managing open systems in a communications
Management Network network. An architecture for management, including planning, provisioning, installation,
maintenance, operation and administration of telecommunications equipment, networks
and services.
threshold-crossing
throughput
The maximum transmission rate of the tested object (system, equipment, connection,
service type) when no packet is discarded. Throughput can be measured with bandwidth.
TIM
In Time Division Duplex (TDD) system, the uplink and downlink links use different
timeslots. They usually share the same frequency.
time division
multiplexing
A multiplexing technology. TDM divides the sampling cycle of a channel into time slots
(TSn, n=0, 1, 2, 3), and the sampling value codes of multiple signals engross time slots
in a certain order, forming multiple multiplexing digital signals to be transmitted over
one channel.
Time Slot
Continuously repeating interval of time or a time period in which two devices are able
to interconnect.
time to live
A technique used in best-effort delivery systems to prevent packets that loop endlessly.
The TTL is set by the sender to the maximum time the packet is allowed to be in the
network. Each router in the network decrements the TTL field when the packet arrives,
and discards any packet if the TTL counter reaches zero.
timing loop
TM
TM
TMN
A-42
Issue 02 (2010-12-28)
A Glossary
token bucket algorithm The token bucket is a container for tokens. The capacity of a token bucket is limited, and
the number of tokens determines the traffic rate of permitted packets. The token bucket
polices the traffic. Users place the tokens into the bucket regularly according to the preset
rate. If the tokens in the bucket exceed the capacity, no tokens can be put in. Packets can
be forwarded when the bucket has tokens, otherwise they cannot be transferred till there
are new tokens in the bucket. This scheme adjusts the rate of packet input.
token ring
The IEEE 802.5 standard for a token-passing ring network with a star-configured
physical topology. Internally, signals travel around the network from one station to the
next in a ring. Physically, each station connects to a central hub called a multistation
access server.
tolerance
topology management
Topology Object
A basic element in the NMS topology view, which includes submap, node, connection,
and so on.
Topology view
A basic component for the human-machine interface. The topology view directly
displays the networking of a network as well as the alarm and communication statuses
of each network element and subnet. In this manner, the topology view reflects the basic
running conditions of the network.
ToS
ToS priority
A ToS sub-field (the bits 0 to 2 in the ToS field) in the ToS field of the IP packet header.
TPS
TPS protection
The equipment level protection that uses one standby tributary board to protect N
tributary boards. When a fault occurs on the working board, the SCC issues the switching
command, and the payload of the working board can be automatically switched over to
the specified protection board and the protection board takes over the job of the working
board. After the fault is cleared, the service is automatically switched to the original
board
TR
traffic channel
Indicates the channel that carries voice coding information or user data. Traffic channels
are classified into voice traffic channels and data traffic channels.
traffic classification
Traffic classification enables you to classify traffic into different classes with different
priorities according to some criteria. Each class of traffic has a specified quality of service
(QoS) in the entire network. In this way, different traffic packets can be treated
differently.
traffic engineering
A technology that is used to dynamically monitor the traffic of the network and the load
of the network elements, to adjust in real time the parameters such as traffic management
parameters, route parameters and resource restriction parameters, and to optimize the
utilization of network resources. The purpose is to prevent the congestion caused by
unbalanced loads.
Issue 02 (2010-12-28)
A-43
A Glossary
It is the traffic frame discard control. Two options are provided: enable and disable. It
indicates the means by which the NE discards cells when the network is congested. When
the frame discard mark is closed, the cells will be discarded at the cell level; when it is
opened, they will be discarded at the frame level. Here, "frame" refers to the AAL
protocol data unit.
traffic management
Traffic management refers to the process of monitoring user traffic on a network and
redistributing/rerouting it when necessary in order to ensure optimal network
performance
traffic policy
A full set of QoS policies formed by association of traffic classification and QoS actions.
trail termination source The trail termination source identifier (TTSI) of the LSP is used to uniquely identify an
identifier
LSP on a network.
transit
The group is transferred along the LSP consisting of a series of LSRs after the group is
labeled. The middle node is named Transit.
transit delay
The period from the time when a site starts to transmit a data frame to the time when the
site finishes the data frame transmission or to the time when all data frames are received
by the receiver.
Transmission Control
Protocol
The protocol within TCP/IP that governs the breakup of data messages into packets to
be sent via IP (Internet Protocol), and the reassembly and verification of the complete
messages from packets received by IP. A connection-oriented, reliable protocol (reliable
in the sense of ensuring error-free delivery), TCP corresponds to the transport layer in
the ISO/OSI reference model.
Transmission Control
Protocol/Internet
Protocol
Common name for the suite of protocols developed to support the construction of
worldwide internetworks.
transparent
transmission
A process during which the signaling protocol or data is not processed in the content but
encapsulated in the format for the processing of the next phase.
transport plane
tributary protection
switch
One or more Tributary Units, occupying fixed, defined positions in a higher order VCn payload is termed a Tributary Unit Group (TUG). TUGs are defined in such a way that
mixed capacity payloads made up of different size Tributary Units can be constructed
to increase flexibility of the transport network
trTCM
trunk cable
trunk line
TTL
TTSI
TU
tributary unit
TUG
A-44
Issue 02 (2010-12-28)
A Glossary
Tunnel
A channel on the packet switching network that transmits service traffic between PEs.
In VPN, a tunnel is an information transmission channel between two entities. The tunnel
ensures secure and transparent transmission of VPN information. In most cases, a tunnel
is an MPLS tunnel.
twisted pair
The trTCM meters an IP packet stream and marks its packets based on two rates, Peak
Information Rate (PIR) and Committed Information Rate (CIR), and their associated
burst sizes to be either green, yellow, or red. A packet is marked red if it exceeds the
PIR. Otherwise it is marked either yellow or green depending on whether it exceeds or
doesn't exceed the CIR.
type of service
A field in an IP packet (IP datagram) used for quality of service (QoS). The TOS field
has 8 bits in length, which is divided into five subfields.
U
U-VLAN
A VLAN attribute indicating that the current VLAN is a user VLAN of an M-VLAN.
Multicast services are copied from the M-VLAN to the user VLAN.
UAS
unavailable second
UAT
UBR
UBR+
UDP
unavailable time event A UAT event is reported when the monitored object generates 10 consecutive severely
errored seconds (SES) and the SESs begin to be included in the unavailable time. The
event will end when the bit error ratio per second is better than 10-3 within 10 consecutive
seconds.
underfloor cabling
The cables connected cabinets and other devices are routed underfloor.
UNI
unicast
UPC/NPC
Upper subrack
The subrack close to the top of the cabinet when a cabinet contains several subracks.
Upper threshold
UPS
usage parameter
control/network
parameter control
Issue 02 (2010-12-28)
A-45
A Glossary
User Datagram
Protocol
A TCP/IP standard protocol that allows an application program on one device to send a
datagram to an application program on another. User Datagram Protocol (UDP) uses IP
to deliver datagrams. UDP provides application programs with the unreliable
connectionless packet delivery service. Thus, UDP messages can be lost, duplicated,
delayed, or delivered out of order. UDP is used to try to transmit the data packet, that is,
the destination device does not actively confirm whether the correct data packet is
received.
user network interface The interface between user equipment and private or public network equipment (for
example, ATM switches).
User operation log
Record the operation of the user for the convenience of analysis and query.
V
V-NNI
V-UNI
One of the traffic classes used by ATM (Asynchronous Transfer Mode). Unlike a
permanent CBR (Constant Bit Rate) channel, a VBR data stream varies in bandwidth
and is better suited to non real time transfers than to real-time streams such as voice calls.
VBR
VC
VCC
VCCV
VCI
VCTRUNK
A virtual concatenation group applied in data service mapping, also called the internal
port of a data service processing board
virtual channel
Any logical connection in the ATM network. A VC is the basic unit of switching in the
ATM network uniquely identified by a virtual path identifier (VPI)/virtual channel
identifier (VCI) value. It is the channel on which ATM cells are transmitted by the
switching.
virtual channel
connection
The VC logical trail that carries data between two end points in an ATM network. A
logical grouping of multiple virtual channel connections into one virtual connection.
virtual channel
identifier
A 16-bit field in the header of an ATM cell. The VCI, together with the VPI, is used to
identify the next destination of a cell as it passes through a series of ATM switches on
its way to its destination.
virtual circuit
A logical grouping of two or more nodes which are not necessarily on the same physical
network segment but which share the same IP network number. This is often associated
with switched Ethernet.
A-46
Issue 02 (2010-12-28)
A Glossary
virtual path
A bundle of virtual channels, all of which are switched transparently across an ATM
network based on a common VPI.
The field in the ATM (Asynchronous Transfer Mode) cell header that identifies to which
VP (Virtual Path) the cell belongs.
A type of point-to-multipoint L2VPN service provided over the public network. VPLS
enables geographically isolated user sites to communicate with each other through the
MAN/WAN as if they are on the same LAN.
virtual private network A system configuration, where the subscriber is able to build a private network via
connections to different network switches that may include private network capabilities.
virtual private wire
service
A technology that bears Layer 2 services. VPWS emulates services such as ATM, FR,
Ethernet, low-speed TDM circuit, and SONET/SDH in a PSN.
VRF performs the function of establishing multiple virtual routing devices on one actual
routing device. That is, the L3 interfaces of the device are distributed to different VRFs,
performing the function of establishing multiple virtual route forwarding instances on
the device.
virtual switch instance An instance through which the physical access links of VPLS can be mapped to the
virtual links. Each VSI provides independent VPLS service. VSI has Ethernet bridge
function and can terminate PW.
virtual user-network
interface
VLAN
VLAN ID
Namely, it is the virtual LAN identifier. One Ethernet port can support 4K VLAN routes,
and one NE can support up to 8K VLAN routes.
VLAN mapping
A technology that enables user packets to be transmitted over the public network by
translating private VLAN tags into public VLAN tags. When user packets arrive at the
destination private network, VLAN mapping translates public VLAN tags back into
private VLAN tags. In this manner, user packets are correctly transmitted to the
destination.
One of the properties of the MST region, which describes the relationship between
VLANs and spanning tree instances.
VLL
voice over IP
An IP telephony term for a set of facilities used to manage the delivery of voice
information over the Internet. VoIP involves sending voice information in a digital form
in discrete packets rather than by using the traditional circuit-committed protocols of the
public switched telephone network (PSTN).
VoIP
VP
VPI
VPLS
VPN
VPWS
VRF
Issue 02 (2010-12-28)
A-47
A Glossary
VSI
W
WAN
Wander
The long-term variations of the significant instants of a digital signal from their ideal
position in time (where long-term implies that these variations are of frequency less than
10Hz).
wavelength
The distance between successive peaks or troughs in a periodic signal that is propagated
through space. Wavelength is symbolized by the Greek letter lambda and can be
calculated as speed divided by frequency.
wavelength division
multiplexing
A technology that utilizes the characteristics of broad bandwidth and low attenuation of
single mode optical fiber, uses multiple wavelengths as carriers, and allows multiple
channels to transmit simultaneously in a single fiber.
WDM
weighted random early A packet loss algorithm used for congestion avoidance. It can prevent the global TCP
detection
synchronization caused by traditional tail-drop. WRED is favorable for the high-priority
packet when calculating the packet loss ratio.
WFQ
A network composed of computers which are far away from each other which are
physically connected through specific protocols. WAN covers a broad area, such as a
province, a state or even a country.
winding pipe
Working path
WRED
wrong packets
X
X digital subscriber line A family of bandwidth-efficient modulation techniques, developed to achieve extremely
high data transfer rates over twisted- pair cables. While the letter "X" represents a
variable, DSL stands for "Digital Subscriber Line". XDSL techniques may offer several
benefits such as, capability to offer high-speed data services to customers, low cost by
using existing infrastructure and switching congestion relief caused by existing data
users.
xDSL
A-48
Issue 02 (2010-12-28)