Professional Documents
Culture Documents
Transmission System
V100R007C10
Product Description
Issue
01
Date
2013-12-30
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website:
http://www.huawei.com
Email:
support@huawei.com
Issue 01 (2013-12-30)
Product Version
V100R007C10
iManager U2000
V200R001C00
Intended Audience
This document describes the OptiX OSN 500 in terms of network application, functions,
hardware structure, software architecture, features, and technical specifications.
This document is intended for:
l
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol
Description
DANGER indicates a hazard with a high level or medium
level of risk which, if not avoided, could result in death or
serious injury.
WARNING indicates a hazard with a low level of risk
which, if not avoided, could result in minor or moderate
injury.
Issue 01 (2013-12-30)
ii
Symbol
Description
CAUTION indicates a potentially hazardous situation that,
if not avoided, could result in equipment damage, data loss,
performance deterioration, or unanticipated results.
Provides a tip that may help you solve a problem or save time.
Provides additional information to emphasize or supplement
important points in the main text.
GUI Conventions
Convention
Meaning
Boldface
>
Deleted the original description of MPLS-TP Ring Protection Switching (MRPS) in the
"Quick Reference" and "Network Level Protection" sections.
Issue 01 (2013-12-30)
iii
Added MPLS-TP Ring Protection Switching (MRPS) in sections "Quick Reference" and
"Network Level Protection". (MPLS-TP is short for multiprotocol label switching transport
profile.)
Updated the number of supported FE electrical ports in sections "Quick Reference" and
"Access Capacities."
FE8F boards' support for FE electrical ports is added to sections "Types of Supported
Services" and "Board Category."
l
l
Updated the service access capability of the equipment according to the new boards.
Optimized the structure and related description of the "Product Positioning and Features",
"Quicklook", "Networking and Application Scenarios" sections.
Issue 01 (2013-12-30)
iv
Contents
Contents
About This Document.....................................................................................................................ii
1 Product Positioning and Features...............................................................................................1
1.1 Product Positioning.........................................................................................................................................................2
1.2 Product Features.............................................................................................................................................................2
2 Quick Reference.............................................................................................................................5
3 System Architecture and Service Access.................................................................................15
3.1 System Architecture.....................................................................................................................................................16
3.2 Service Types...............................................................................................................................................................17
3.2.1 Types of Supported Services.....................................................................................................................................17
3.2.2 Access Capacities......................................................................................................................................................18
4 Product Features...........................................................................................................................19
4.1 Services Supported.......................................................................................................................................................20
4.1.1 Service Overview .....................................................................................................................................................20
4.2 Redundancy and Protection..........................................................................................................................................26
4.2.1 Equipment Level Protection......................................................................................................................................26
4.2.2 Network Level Protection..........................................................................................................................................27
4.3 Synchronization............................................................................................................................................................40
4.3.1 Requirements for Clock Synchronization..................................................................................................................40
4.3.2 Clock and Time Synchronization..............................................................................................................................41
Contents
9 Security Management.................................................................................................................83
9.1 Authentication Management.........................................................................................................................................84
9.2 Authorization Management..........................................................................................................................................84
9.3 Network Security Management....................................................................................................................................84
9.4 System Security Management......................................................................................................................................86
9.5 Log Management..........................................................................................................................................................86
10 Technical Specifications...........................................................................................................88
10.1 General Specifications................................................................................................................................................89
10.2 Function/Feature Indicators........................................................................................................................................90
10.3 Power Consumption and Weight of Each Board........................................................................................................97
10.4 Optical Port Specifications.........................................................................................................................................97
10.5 Colored Optical Ports...............................................................................................................................................102
10.6 Electrical Port Specifications....................................................................................................................................106
10.7 Indicator Status Explanation.....................................................................................................................................107
10.8 Safety Certification...................................................................................................................................................112
10.9 Environmental Specifications...................................................................................................................................112
10.9.1 Storage Environment.............................................................................................................................................112
10.9.2 Transportation Environment..................................................................................................................................114
10.9.3 Operating Environment (For the Chassis That Is Installed in a Cabinet)..............................................................117
10.9.4 Operating Environment (For the Chassis That Is Installed on a Wall)..................................................................121
vi
Contents
A Glossary......................................................................................................................................138
Issue 01 (2013-12-30)
vii
Issue 01 (2013-12-30)
Convergence
node
Convergence/Backbo
ne layer
E1/FE/GE
ATM/IMA
E1
E1/FE/GE
E1
E1/STM-1
FE
ATM/IMA
E1/GE
E1
FE
OptiX OSN
3500/7500 II
Enterprise
leased service
NodeB
BTS
RNC
BSC
Lack of overheads indicating the physical states of networks. When a fault occurs on a PTN
network, no visual and fast indicator is available to locate the fault.
To address those issues, the equipment uses the TP-Assist to provide more O&M means and
simplify O&M operations for PTN networks during installation, commissioning, service
configuration, fault locating, and routine maintenance. With the TP-Assist, PTN networks have
the SDH-like O&M capabilities, which reduce the technical requirements for O&M personnel
and improve O&M efficiency.
Hierarchical OAM
The OptiX OSN 550 supports the hierarchical OAM functions and have the SDH-like O&M
capabilities. It can quickly detect and locate faults at each layer.
The hierarchical OAM functions include ETH-OAM, MPLS tunnel/PW OAM, and MPLS-TP
tunnel/PW OAM. Figure 1-2 shows the application of hierarchical OAM.
Issue 01 (2013-12-30)
PE1
PE2
CE3
CE1
CE4
CE2
P
Ethernet Port OAM
ETH Layer
P
Ethernet Port OAM
MEP
MEP
MPLS/MPLS-TP PW OAM
PW Layer
MEP
MEP
MPLS/MPLS-TP Tunnel OAM
Tunnel Layer
MEP
MIP
MIP
Issue 01 (2013-12-30)
MEP
2 Quick Reference
Quick Reference
This chapter describes the product overview, including product photos, hardware, software, and
functions and features.
Table 2-1 lists the overview of the OptiX OSN 500.
Table 2-1 Overview of the OptiX OSN 500
Item
Description
Appearan
ce
Board
Issue 01 (2013-12-30)
Packet
functions
and
features
Switching
capacity
7.2 Gbit/s
Equipmen
t-level
protection
Intelligent
fan speed
adjustmen
t
Supports the automatic adjustment of fan speed based on the highest temperature
of the board in the chassis.
l Fan protection (The failure in a single fan does not affect the operation of
the other fans.)
2 Quick Reference
Item
Description
Managem
ent ports
and
auxiliary
ports
Interface Type
Description
Connector
External clock
port
120-ohm external
clock port, which can
work in 2048 kbit/s
mode or 2048 kHz
mode
RJ45
External time
port/Port for
monitoring an
outdoor cabinet
RJ45
Issue 01 (2013-12-30)
Power supply
port
Network
management port
Alarm input/
output port
3-input/1-output alarm
port
RJ45
2 Quick Reference
Description
MP
LS
sup
port
capa
bilit
y
(MP
LS
stan
ds
for
Mul
tipr
otoc
ol
Lab
el
Swit
chin
g.)
The packet switching unit of the CSHD board works with a service board to implement
MPLS functions.
PW
E3
sup
port
capa
bilit
y
The packet switching unit of the CSHD board works with a service board to implement
PWE3 functions.
l Service categories
TDM PWE3 services (circuit emulation services [CESs])
Asynchronous transfer mode (ATM) PWE3 services
ETH PWE3 services
l Setup mode: static pseudo wires (PWs)
l Supports single-segment PWs (SS-PWs) and multi-segment PWs (MS-PWs).
l PW encapsulation mode: Ethernet or Ethernet Tagged Mode
l PW control word: supported
l Protection: 1:1 PW APS
l OAM: supports MPLS PW OAM and MPLS-TP PW OAM. MPLS PW OAM
complies with ITU-T Y.1711, and MPLS-TP PW OAM complies with ITU-T G.
8113.1.
Pac
ket
syst
em
perf
orm
ance
Issue 01 (2013-12-30)
Ite
m
Description
Serv
ice
Service Type
Ethernet service:
l Supports the MPLS
technology.
l Supports the VLAN
technology.
2 Quick Reference
Maximum
Receiving
Capability
Service Port
Description
Connector
FE (electrical
port): 22
10/100BASE-T
(X)
RJ-45
FE (optical
port): 18
l 100BASEBX
LC
l 100BASEFX
l 100BASELX
l 100BASEVX
l 100BASEZX
GE: 6
GE optical port:
LC
l 1000BASESX
l 1000BASELX
l 1000BASEVX
l 1000BASEZX
GE electrical
port:
1000BASE-T
RJ-45
Issue 01 (2013-12-30)
Ite
m
2 Quick Reference
Description
E1 service:
l Service types:
TDM PWE3 (CES
E1)
ATM PWE3
Fractional CES E1
ML_PPP E1
l Encapsulation
formats:
CESoPSN
SAToP
l Compression of idle
timeslots: supported
only for CESoPSN
encapsulation
l E1 coding format:
HDB3
l CES E1:
80xE1
l Channelize
d STM-1:
8xSTM-1
l CES E1:
75/120-ohm
smart E1
port
l Channelized
STM-1:
optical port
of the Ie-1,
S-1.1, L-1.1,
or L-1.2
type, and
STM-1 SFP
electrical
port (SFP
stands for
small formfactor
pluggable.)
Issue 01 (2013-12-30)
Ite
m
2 Quick Reference
Description
ATM/IMA service:
l Supports ATM PWE3
services.
80xE1
75/120-ohm
smart E1 port
Anea 96
Tunnel
APS
PW APS
Issue 01 (2013-12-30)
10
Ite
m
2 Quick Reference
Description
MSTP
ERPS
LPT
LAG
Issue 01 (2013-12-30)
Multilink
Point-toPoint
Protocol
(ML-PPP)
Complies with the IETF RFC 1661 and IETF RFC 1990 standards.
Linear
multiplex
section
protection
(MSP)
11
Ite
m
Description
Mai
nten
ance
MPLS/
MPLS-TP
operation,
administra
tion, and
maintenan
ce (OAM)
2 Quick Reference
ETH
OAM
ATM
OAM
Supports the following ATM OAM functions: CC, LB, RDI, and AIS.
RMON
Issue 01 (2013-12-30)
12
Ite
m
2 Quick Reference
Description
Simple
Network
Managem
ent
Protocol
(SNMP)
Port
mirroring
Syn
chro
niza
tion
Synchrono
us
Ethernet
clock
IEEE
1588v2
l Supports the OC, BC, TC, and BC+TC clock models. The TC model
can work in two modes: E2E TC and P2P TC.
l Supports the delay deviation compensation for line transmission in
two modes: length deviation compensation and time deviation
compensation. The length deviation compensation value ranges from
0 m to 12000 m, and the time deviation compensation value ranges
from 0 ns to 65535 ns.
l Supports two 1PPS+ToD or DCLS external time ports, which use
the RS-422 level. Each port supports compensation for propagation
delay on its connected cable. The compensation can be set to a value
ranging from 0 s to 10 s in steps of 10 ns or less. ToD supports
cyclic redundancy checks (CRCs).
l Supports the setting of the input/output mode at time ports.
NOTE
SFP electrical modules do not support IEEE 1588v2.
Issue 01 (2013-12-30)
13
Ite
m
2 Quick Reference
Description
IEEE 1588
ACR
l The IEEE 1588 ACR slave recovers synchronous clocks from IEEE
1588 packets.
l The quality level of IEEE 1588 ACR clocks can be converted into
that of synchronous Ethernet clocks.
NOTE
SFP electrical modules do not support IEEE 1588 ACR.
IEEE CES
ACR
Physical
layer
clocks
Oth
ers
QoS
l DiffServ
Supports simple traffic classification by specifying PHB service
classes for service flows based on their QoS information (C-VLAN
priorities, S-VLAN priorities, DSCP values, or MPLS EXP values)
carried by packets.
l Complex traffic classification
Supports complex traffic classification based on C-VLAN IDs, SVLAN IDs, C-VLAN priorities, S-VLAN priorities, C-VLAN IDs
+ C-VLAN priorities, S-VLAN IDs + S-VLAN priorities, or DSCP
values carried by packets, and V-UNI ingress policies.
l QoS policies
Supports port policies and V-UNI ingress policies.
l Access control list (ACL) policy
Passes or discards packets in a flow that matches rules specified by
a port policy or V-UNI ingress policy.
l CAR
Provides the CAR function for traffic flows at ports and V-UNI
ingresses.
l Shaping
Provides traffic shaping for a specific port, PW ingress, prioritized
queue, or traffic flow.
l Congestion management
Supports tail drop and WRED dropping.
l Queue scheduling policies
Supports SP, WRR, and SP+WRR.
Issue 01 (2013-12-30)
14
Issue 01 (2013-12-30)
15
Power
supply
unit
Packet
switching
unit
-48 V/-60 V DC
Fan
unit
Ethernet
signal
Packet service
Service
interface
unit
NMS
Clock
unit
Auxiliary
interface
unit
DCN
External clock
External alarm
Optical/Electrical service
Cross-connect bus
Issue 01 (2013-12-30)
16
Function
Service interface
unit
Packet services:
l Receives/Transmits time division multiplexing (TDM) E1/
channelized STM-1 signals.
l Receives/Transmits ATM/inverse multiplexing over ATM (IMA)
E1 signals.
l Receives/Transmits FE/GE signals.
Packet switching
unit
Clock unit
Fan unit
Issue 01 (2013-12-30)
17
Service
Type
Service
Rate
Board
Reference Standard
Packe
t
GE service
(optical
port)
1000 Mbit/s
CSHD/EM6F
IEEE 802.3z
GE service
(electrical
port)
1000 Mbit/s
CSHD/EM6T/EM6F
FE service
(optical
port)
100 Mbit/s
CSHD/EF8F/EM6F
FE service
(electrical
port)
10/100
Mbit/s
CSHD/EF8F/EM6T/
EM6F
ATM/IMA/
E1 CES
service
2.048 Mbit/
s
CSHD/MD1
IEEE 802.3u
ITU-T G.703
ITU-T G.823
Issue 01 (2013-12-30)
GE
(Optical
Port)
GE
(Electrical
Port)
FE (Optical
Port)
FE
(Electrical
Port)
ATM/IMA/
E1 CES
Channelize
d STM-1
CES
18
22
80
18
4 Product Features
Product Features
Issue 01 (2013-12-30)
19
4 Product Features
Service
Multiplex
ing
Transport
Tunnel
IETF
Model
ITU-T
Model
MEF
Model
Poin
t-topoin
t
serv
ice
Line
Physically
isolated
Physically
isolated
EPL
E-Line
Virtual
Line
VLAN
VLAN
EVPL
MPLS
VPWS
Mul
tipoi
nttomult
ipoi
nt
serv
ice
LAN
Physically
isolated
Physically
isolated
EPLAN
Virtual
LAN
VLAN
Physically
isolated
EVPLAN
VLAN
MPLS
VPLS
E-LAN
Table 4-2 lists the E-Line and E-LAN services supported by the OptiX OSN 500.
Issue 01 (2013-12-30)
20
4 Product Features
Table 4-2 E-Line and E-LAN services supported by the OptiX OSN 500
Service
E-Line
Service Type
Native Ethernet
services
E-LAN
ETH PWE3
services
Native Ethernet
services
ETH PWE3
services
E-Line Service
Figure 4-1 illustrates the E-Line service provided by the OptiX OSN equipment.
Company A has two branches in City 1 and City 3. Company B has two branches in City 2 and
City 3. Company C has two branches in City 1 and City 2. The branches of Companies A, B,
and C require data communication. The OptiX OSN equipment can separately provide a private
line service for Companies A, B, and C to meet the communication requirement. In addition,
the service data is completely isolated.
Figure 4-1 E-Line service
Metro
carrier Ethernet
Nationwide/Global
carrier Ethernet
Metro
carrier Ethernet
Company A
Company A
Company C
Metro
carrier Ethernet
City 1
City 3
E-Line1
E-Line2
E-Line3
Issue 01 (2013-12-30)
Company B
City 2
Company C
Company B
21
4 Product Features
E-LAN Service
Figure 4-2 illustrates the E-LAN service provided by the OptiX OSN equipment.
Company Z is headquartered in City 3. Branch A of the company is located in City 1 and City
2, and Branch B of the company is located in City 1, City 2, and City 3. Branch A and Branch
B do not communicate with each other, and the data of them should be separated from each
other. The headquarters, however, need to communicate with all the branches and need to access
the Internet.
The OptiX OSN equipment can be used to provide the E-LAN service. Different VLAN tags
are used to identify service data from different branches. In this manner, the headquarters can
communicate with the branches and the data from different branches is isolated. In addition, the
VLAN is used to isolate the Internet data accessed by the headquarters from the internal service
data.
Figure 4-2 E-LAN service
ISP
Metro
carrier Ethernet
Nationwide/Global
carrier Ethernet
Branch B
Headquarter
Branch A
Metro
carrier Ethernet
Metro
carrier Ethernet
Branch B
City 3
City 1
VLAN1
VLAN2
VLAN3
City 2
Branch A
Branch B
Branch A
CES Services
The circuit emulation service (CES) helps to solve the problem of insufficient optical fiber
resources in the access ring and allows TDM services to be transparently transmitted across the
pure packet mode.
At the physical layer on the UNI side, the OptiX OSN equipment is interconnected with a CE
through the following physical channels for accessing CES services:
Issue 01 (2013-12-30)
22
Channelized STM-1
E1
4 Product Features
-Service TS
Idle TS
PSN
LSP
PW
AC
CE1
(BTS)
AC
PE1
Native TDM
service
CE2
(BSC)
PE2
TDM PWE3
Framed E1
Native TDM
service
Emulation Mode
The OptiX NG-SDH series equipment supports two types of CES services: structure-aware TDM
circuit emulation service over packet switched network (CESoPSN) CES and structure-agnostic
TDM over packet (SAToP) CES.
In the case of CESoPSN CES:
l
The equipment senses the frame format, frame alignment mode, and timeslot information
in the TDM circuit.
The equipment processes the overheads and extracts the payloads in TDM frames. Then,
the equipment loads timeslots to the packet payload in a certain sequence. As a result, the
services in each timeslot are fixed and visible in packets.
The equipment does not sense any format in the TDM signal. Instead, it considers TDM
signals as bit flows at a constant rate, and therefore the entire bandwidth of TDM signals
is emulated.
Service Type
CES services are classified into UNI-UNI CES services and UNI-UNI CES services by service
implementation point.
l
Issue 01 (2013-12-30)
23
4 Product Features
PSN
NE
TDM link
BTS
BSC
NE
TDM link
PW
BTS2
Tunnel
ATM/IMA Services
The OptiX OSN equipment supports ATM/IMA services in packet mode.
ATM Services
ATM stands for asynchronous transfer mode, which is implemented based on cells. In ATM
mode, the ATM PWE3 technology is used to emulate ATM services on a packet switched
Issue 01 (2013-12-30)
24
4 Product Features
network (PSN). Therefore, traditional ATM services can traverse the PSN. ATM service
networks can be classified into three types: one-to-one, N-to-one or ATM-TRANS, according
to the encapsulation mode of ATM PWE3 packets.
Figure 4-6 Typical application of ATM PWE3 (in one-to-one cell encapsulation mode)
PSN
PW
AC
AC
CE1
LSP
PE1
CE2
PE2
ATM PWE3
1-to-1 ATM
PWE3
service
1-to-1 ATM
PWE3
service
RNC
NodeB
Figure 4-7 Typical application of ATM PWE3 (in N-to-one cell encapsulation mode)
CE1
PSN
PW
AC
AC
CE2
PE1
LSP
PE2
CE4
ATM PWE3
CE3
N-to-1 ATM
PWE3
service
Issue 01 (2013-12-30)
N-to-1 ATM
PWE3
service
NodeB
RNC
25
4 Product Features
NOTE
IMA Services
The inverse multiplexing for ATM (IMA) technology multiplexes multiple low-speed ATM
links into a high-speed link.
The IMA technology provides inverse multiplexing of an ATM cell stream over multiple lowspeed links and retrieves the original stream at the far-end from these physical links. Figure
4-8 shows how IMA transmits services.
Figure 4-8 IMA transmission
Link 1
Link 2
ATM cell stream
Link 3
IMA group
The IMA technology helps to group multiple physical links to form a higher bandwidth logical
link whose rate is approximately the sum of the link rates. When the member links in the IMA
group are dynamically added/deleted, or fail/recover, the logical link changes only in bandwidth.
The services on the logical link are not interrupted only when the bandwidth of the logical link
is not lower than the required minimum bandwidth.
With the IMA technology, the transport network can transmit ATM services from customer
equipment on an IMA group formed by multiple low-speed links (for example, the three E1 links
shown in Figure 4-9), therefore increasing link bandwidth utilization and providing link
protection.
Figure 4-9 Application of the IMA technology
IMA group
NodeB
E1 link
Packet transmit equipment
26
4 Product Features
Power Redundancy
1+1 backup for power supply: two channels of -48 V DC power supplies are connected by using
one PIU board for backup.
As shown in Figure 4-10, the OptiX OSN 500 is configured with a pair of DC power supplies
for backup. Normal operations are not affected if any external -48 V DC power supply fails.
Figure 4-10 DC power redundancy for the OptiX OSN 500 chassis
XXXX
PIU
FAN
SLOT 3
XXXX
XXXX
SLOT 4
SLOT 2
Fan Redundancy
Three air-cooling fans dissipate the heat generated by the system. The failure of a single fan
does not affect the operation of other fans.
PW APS
This section defines PW APS and describes its purpose.
Definition
PW APS is a function that protects PWs based on the APS protocol. When the working PW is
faulty, PW APS switches services to a preconfigured protection PW.
The PW APS function supported by the OptiX OSN equipment has the following features:
l
The working PW and protection PW are carried in different tunnels but have the same local
and remote PEs.
The protection PW in the PW APS protection pair does not carry extra traffic.
The PW OAM (based on ITU-T Y.1711) or MPLS-TP OAM (based on ITU-T G.8113.1)
mechanism is used to detect faults in PWs, and the ingress and egress nodes exchange APS
protocol packets to achieve protection switching.
Purpose
PW APS improves the reliability of service transmission in PWs.
As shown in Figure 4-11, when the PW OAM mechanism detects a fault in the working PW,
services are switched to the protection PW for transmission.
Issue 01 (2013-12-30)
27
4 Product Features
PE2
Working PW
PE1
PE4
Protection PW
PE3
Protect switching
PE2
Working PW
PE1
PE4
Protection PW
PE3
Service
Packet transmission equipment
Tunnel APS
This section defines tunnel APS and describes the purpose of using this feature.
Definition
Tunnel APS is a function that protects tunnels based on the APS protocol. When the working
tunnel is faulty, tunnel APS switches services to a preconfigured protection tunnel.
Tunnel APS supported by the OptiX OSN equipment has the following features:
l
The working tunnel and protection tunnel have the same ingress and egress nodes.
Issue 01 (2013-12-30)
28
4 Product Features
The protection tunnel in the Tunnel APS protection pair does not carry extra traffic.
The MPLS OAM (based on ITU-T Y.1711) or MPLS-TP OAM (based on ITU-T G.8113.1)
mechanism is used to detect faults in tunnels, and the ingress and egress nodes exchange
APS protocol packets to achieve protection switching.
Purpose
Tunnel APS is used to improve the reliability of service transmission over tunnels. Tunnel APS
is used in two typical scenarios: co-sourced and co-sinked tunnels, and co-sourced tunnels with
different sinks. Figure 4-12 and Figure 4-13 show the typical application scenarios.
For co-sourced and co-sinked tunnels, a tunnel APS protection group is created between PE1
and PE2. Generally, services are transmitted on the working tunnel. When the working tunnel
is faulty, APS occurs and the services are switched to the protection tunnel.
Figure 4-12 Typical application of tunnel APS (for co-sourced and co-sinked tunnels)
PSN
NodeB
Tunnel APS
PE1
Tunnel APS
Tunnel1
PE2
RNC
Tunnel2
NodeB
Working Tunnel
Protection Tunnel
For co-sourced tunnels with different sinks, tunnel APS works with MC-LAG to implement
cross-equipment protection. As shown in Figure 4-13, PE1 is an access-layer NE, and PE2 and
PE3 are NEs at the backbone convergence layer. A tunnel APS protection group is created
between PE1 and PE2 and between PE1 and PE3. Generally, services are transmitted on the
working tunnel. When the working tunnel is faulty, APS occurs and the services are switched
to the protection tunnel.
Issue 01 (2013-12-30)
29
4 Product Features
Figure 4-13 Typical application of tunnel APS (for co-sourced tunnels with different sinks)
PE2
PE1
Tunnel APS
PSN
MC-LAG
NodeB
RNC
S
PE3
Working Tunnel
Protection Tunnel
Multi-chassis synchronous communication
A
S
ERPS
Ethernet technologies are applied more widely than ever before, and ring networking using
packet Ethernet boards is more and more deployed. Under the context, Ethernet ring protection
switching (ERPS) can be used to protect LAN services on packet Ethernet ring networks.
When an Ethernet ring network is configured with ERPS, under normal conditions, the ring
protection link (RPL) owner node blocks its port on a certain side so that services are transmitted
through the port on the other side. In this manner, service loops are prevented. If a ring link or
a ring node fails, the RPL owner unblocks the preceding port and then the services are transmitted
through the unblocked port.
ERPS has the following characteristics in its implementation:
l
Figure 4-14 shows networking of a single Ethernet ring protection (ERP) ring.
Issue 01 (2013-12-30)
30
4 Product Features
NE 1 RPL neighbor
node
RPL
RPL
NE 2
Protection
switching
4
Topology
NE 4
NE 2
RPL
owner node
Topology
NE 4
RPL
owner node
NE 3
NE 3
Blocked port
Ethernet service direction
Link down
As shown in Figure 4-14, NE4 is the RPL owner node and NE1 is a neighbor node. The link
between NE1 and NE4 is the RPL.
l
Under normal conditions, NE4 blocks the port connected to NE1, and NE1 also blocks the
port connected to NE4a. Services are transmitted along the route NE1 <-> NE2 <-> NE3
<-> NE4.
If the link between NE1 and NE2 fails, NE4 and NE1 unblock their ports so that services
can be transmitted along the route NE1 <-> NE4 <-> NE3 <-> NE2.
NOTE
a: If ERPS V1 is used, NE1 does not block the port connected to NE4.
NE 1 RPL neighbor
node
RPL neighbor
node
RPL
RPL
NE 2
ERP ring
1
topology
NE 4
NE 2
RPL
owner node
ERP ring
1
topology
NE 4
RPL
owner node
3
Protection
switching
NE 3
NE 3
NE 5
ERP ring
2
topology
NE 7
NE 5
RPL neighbor
node
ERP ring
2
topology
NE 7
RPL neighbor
node
RPL
RPL
Blocked port
RPL
NE 6 owner node
RPL
NE 6 owner node
Link down
Issue 01 (2013-12-30)
31
4 Product Features
As shown in Figure 4-15, ERP ring 1 is tangent to ERP ring 2 at NE3. On ERP ring 1. NE4 is
the RPL owner node and NE1 is a neighbor node. The link between NE1 and NE4 is the RPL
link. On ERP ring 2, NE6 is the RPL owner node and NE7 is a neighbor node. The link between
NE6 and NE7 is the RPL.
l
NE 1
NE 2
RPL
RPL
RPL
owner node
1
NE 3
Protection
switching
NE 4
NE 4
3
ERP ring
2
topology
ERP ring
2
topology
5
RPL neighbor
node
RPL
owner node
RPL
NE 3
ERP ring
1
topology
ERP ring
1
topology
2
NE 2
RPL neighbor
node
RPL
owner node
RPL neighbor
node
NE 5
RPL neighbor
node
RPL
owner node
Blocked port
NE 5
RPL
NE 5
Link down
As shown in Figure 4-16, ERP ring 1 and ERP ring 2 are interconnected at NE3 and NE4. On
ERP ring 1, NE2 is the RPL owner node and NE1 is a neighbor node. The link between NE1
and NE2 is the RPL. On ERP ring 2, NE5 is the RPL owner node and NE6 is a neighbor node.
The link between NE5 and NE6 is the RPL.
l
Under normal conditions: On ERP ring 1, NE2 blocks the port connected to NE1, and NE1
also blocks the port connected to NE2. Services are transmitted along the route NE2 <->
NE4 <-> NE3 <-> NE1. On ERP ring 2, NE5 blocks the port connected to NE6, and NE6
also blocks the port connected to NE5. Services are transmitted along the route NE1 <->
NE3 <-> NE4 <-> NE2.
If the link between NE1 and NE3 fails: On ERP ring 1, NE1 and NE2 unblock their ports
so that services can be transmitted along the route NE1 <-> NE2 <-> NE4 <-> NE3. On
Issue 01 (2013-12-30)
32
4 Product Features
ERP ring 2, ports connecting NE5 and NE6 are still blocked, and services are transmitted
along the route NE3 <-> NE5 <-> NE6 <-> NE4.
LAG
As the Ethernet technology is widely applied in the metropolitan area network (MAN) and the
wide area network (WAN), carriers propose increasingly higher requirements on the bandwidth
and reliability of access links that use the Ethernet technology. Hardware upgrades can increase
Ethernet link bandwidth but also incur high expenditure. In addition, hardware upgrades are less
flexible than software upgrades. To increase bandwidth at a low expenditure and flexibly, the
link aggregation technology is developed.
Link aggregation has the following characteristics:
l
With no need for hardware upgrades, link aggregation binds several Ethernet ports as a
higher-bandwidth logical port.
The link backup mechanism of the link aggregation technology provides higher link
transmission reliability.
Link aggregation functions between adjacent NEs and is independent of the network
topology.
The logical link aggregating several physical links is called a link aggregation group (LAG).
NOTE
Link aggregation is also called port aggregation because each link corresponds to two specific ports at two
ends in Ethernet transmission.
As shown in Figure 4-17, two adjacent NEs are interconnected through three pairs of Ethernet
ports. Three physical Ethernet links are bound as a logical link, called a LAG.
Figure 4-17 LAG
Link 1
Link 2
Ethernet
packet
Link 3
Ethernet
packet
LAG
LPT
This section defines LPT and provides the purpose of this feature.
Definition
Link-state pass through (LPT) detects a fault that occurs at a service access node or on a service
network and then instructs the equipment at both ends of the network to switch to a backup
network. LPT ensures normal data transmission. As shown in Figure 4-18, LPT-enabled NE1
and NE2 will disconnect their access links from router A and router B if access link 1, access
link 2, or the service network becomes faulty. When router A and router B detect a link fault
between them, they immediately switch to the backup network.
Issue 01 (2013-12-30)
33
4 Product Features
Backup network
Service network
NE1
Router A
NE2
Access link 1
Working link
Protection link
Purpose
LPT enabled access equipment detects link faults and immediately switches to a backup network.
MSTP
This topic defines MSTP and describes the purpose of this feature.
Definition
The spanning tree protocol (STP) is used in network loops. This protocol uses algorithms to
break a loop network into a loop-free tree network to prevent packets from cycling endlessly in
the loop network. See Figure 4-19.
Figure 4-19 Diagram of the STP
Switch A
Switch B
Switch A
Switch C
Switch B
Switch C
Root: Switch A
Issue 01 (2013-12-30)
34
4 Product Features
The rapid spanning tree protocol (RSTP) is an optimized version of STP. RSTP stabilizes
network topology more quickly than STP. RSTP is compatible with STP. STP packets and RSTP
packets can be differentiated by the bridge that uses the RSTP for calculating the spanning tree.
Compared with STP and RSTP, MSTP maximizes link bandwidth usage by setting up several
independent spanning trees.
Purpose
STP/RSTP meets the following requirements:
l
Any activated bridge topology can be configured as a single spanning tree. Redundant data
loops between two stations in a network topology should be removed.
The spanning tree topology can be configured to protect against bridge faults or route
interruptions. Temporary data loops can be prevented by automatically accepting the
bridges and bridge ports of the bridges that are newly added into the LAN.
A topology that has been activated can be predicted and repeated. In addition, the topology
can be selected by managing algorithm parameters.
Operations to the end stations are transparent. For example, the end stations do not know
whether they are attached to a single LAN or a bridged LAN.
A small part of the available link bandwidth is used to create and maintain a spanning tree.
Bandwidth does not increase with the expanding network scale.
STP/RSTP have shortcomings that have become apparent as VLAN technology has developed.
After the STP/RSTP is enabled, a loop network is broken into a single spanning tree and the
blocked links do not carry any traffic. This wastes bandwidth.
MSTP has fixed this defect in STP and RSTP in addition to stabilizing the network topology.
MSTP provides a load sharing mechanism that enables the traffic of different VLANs to be
transmitted over their respective trails.
l
MSTP divides a switching network into different regions, called MST regions. Multiple
spanning trees that are independent of each other exist in each region. Each spanning tree
is called a multiple spanning tree instance (MSTI).
When MSTP is enabled, VLAN mapping tables specify the mapping relationships between
VLANs and MSTIs. Each VLAN in an MST region corresponds to one MSTI and only this
MSTI can transmit data for this VLAN. One MSTI, however, may be mapped to multiple
VLANs.
Consider the network in Figure 4-20 as an example. VLAN 1 and VLAN 2 packets are
transmitted over the network. When STP/RSTP is enabled, a single spanning tree that uses switch
A as the root switch is generated and the links between switch B and switch C are blocked.
Hence, the bandwidth of this link is not utilized.
Issue 01 (2013-12-30)
35
4 Product Features
Switch A
VLAN 1
VLAN 2
Host B
Switch B
Switch C
Host C
Blocked port
Spanning tree
Root switch
If MSTP is enabled and this network is an MST region, then VLAN 1 and VLAN 2 are each
mapped to an MSTI. Figure 4-21 shows the network topology. On the ring:
l
Different VLANs are forwarded over different trails and all VLAN packets are forwarded
correctly. Load sharing is achieved.
Issue 01 (2013-12-30)
36
4 Product Features
Switch A
VLAN 1
VLAN 2
Host B
Switch B
Switch C
Switch A
Host C
Switch A
VLAN 1
VLAN 1
VLAN 2
VLAN 2
Switch B
Switch C
Switch B
Switch C
Root switch
NOTE
The OptiX OSN 500 supports only the MSTP that generates a common and internal spanning tree (CIST). The
OptiX OSN 500 does not support the load sharing function that is forwards packets of different VLANs over
different trails.
As shown in Figure 4-22, when equipment uses two different trails to access the OptiX OSN
equipment, you can configure the OptiX OSN equipment ports connected to the user network
into a port group. This port group, together with a switch on the user network, can run the MSTP.
If a service access link becomes faulty, MSTP generates a spanning tree topology to provide
protection for a user network that is configured with multiple access points.
Issue 01 (2013-12-30)
37
4 Product Features
Root
Root
Port group
CIST
Blocked Port
ML-PPP
This section defines ML-PPP and describes the purpose of using this feature on transport
networks.
Definition
The Point-to-Point Protocol (PPP) is a link layer protocol based on the Serial Line Interface
Protocol (SLIP). PPP provides a standard method for encapsulating multiple types of protocol
datagrams (including IP, IPX, and AppleTalk) on a point-to-point link.
The Multilink Point-to-Point Protocol (ML-PPP) is an extended PPP protocol. It is used to bind
multiple low-rate PPP links into a virtual ML-PPP link. An ML-PPP link is also called a Multilink
Protocol (MP) group. ML-PPP also supports packet splitting and recombination, therefore
effectively reducing the transmission latency and increasing the maximum transfer unit (MTU)
for a link.
Using the ML-PPP function brings a network the following benefits:
l
Increased bandwidth
Lower latency
Purpose
ML-PPP links can bear MPLS tunnels so that the MPLS tunnels can traverse a TDM transport
network.
As shown in Figure 4-23, MPLS packets in the MPLS tunnel are encapsulated in E1s and
transmitted over the ML-PPP link through the TDM network. At the TDM network edge, the
MPLS packets are decapsulated from E1s.
Issue 01 (2013-12-30)
38
4 Product Features
Figure 4-23 Using an ML-PPP link to transmit services through a TDM network
MPLS tunnel
Ingress
Transit
FE/GE
Payload
MPLS
FE/GE
E1
TDM
network
Transit
E1
Payload
MPLS
ML-PPP
E1
Egress
FE/GE
Payload
MPLS
FE/GE
Linear MSP
The packet-based linear MSP uses the MSOH bytes K1 and K2 to implement automatic
protection switching and thus to protect services. The OptiX OSN equipment supports 1:1
packet-based linear MSP.
Issue 01 (2013-12-30)
39
4 Product Features
Working path
NE B
Common
service
Common
service
Protection path
Protection switching
NE A
Common
service
Working path
NE B
Common
service
Protection path
Purpose
The packet-based linear MSP scheme uses the MSOH bytes K1 and K2 to implement automatic
protection switching once the working path fails, and thus to protect services.
4.3 Synchronization
The OptiX OSN 500 supports IEEE 1588v2, synchronous Ethernet clock, 2 MHz, and 2 Mbit/
s clocks and can provide an end-to-end clock transport solution when deployed with MSTP or
PTN products.
When the OptiX OSN 500 uses IEEE 1588v2 to implement phase synchronization, it supports
the following NE clock types: OC, TC, BC and TC+BC.
40
4 Product Features
Precision of Frequency
Synchronization
Precision of Phase
Synchronization
GSM
0.05 ppm
Phase synchronization is
not required.
WCDMA
0.05 ppm
Phase synchronization is
not required.
TD-SCDMA
0.05 ppm
1.5 us
CDMA2000
0.05 ppm
3 us
WiMax FDD
0.05 ppm
Phase synchronization is
not required.
WiMax TDD
1 us
LTE FDD
0.05 ppm
Phase synchronization is
not required.
LTE TDD
0.05 ppm
1.5 us
Billing system
500 ms
500 ms
1 ms
Positioning system
Issue 01 (2013-12-30)
41
4 Product Features
Definition
The synchronous Ethernet clock is a technology of frequency synchronization over the physical
layer. The system directly extracts the clock signal from the serial bit stream on the Ethernet
line, and transmits the data to each board by using the clock signal to realize the transfer of clock
information.
Purpose
As SDH networks are evolving into data networks, carrier-level large-scale networks require
synchronous Ethernet to transmit clock signals. The networkwide synchronous transmission idea
of the SDH system needs to be introduced to the Ethernet design. Clock signals are transmitted
from the core to the edge by using the Ethernet physical layer, which ensures synchronization
for all types of real-time services.
In a TDM network or packet network, Figure 4-25 shows the typical network to which
synchronous Ethernet is applied networkwide. BITS1 and BITS2 respectively transmit clock
signals to NE1 and NE2 through external clock ports. NE1 and NE2 transmit the clock signals
to NE3. NE3 transmits the clock signals from the convergence layer to access-layer NEs. The
access-layer NEs transmit the clock signals to NodeBs. In this manner, networkwide clock
synchronization is achieved.
Issue 01 (2013-12-30)
42
4 Product Features
BITS1
Clock information
Clock information
NE1
GE
ring
NE3
2.5 Gbit/s
chain
622 Mbit/s
chain
NE5
NE6
NE2
Convergence
layer
NE4
155 Mbit/s
chain
NE7
Access
layer
Node B
Node B
Node B
In a packet network, Figure 4-26 shows a typical network that uses both synchronous Ethernet
and IEEE 1588 ACR. BITS1 and BITS2 respectively transmit clock signals to Router1 and
Router2 through external clock ports. Because Router1 and Router2 need to transmit the clock
signals to convergence-layer NEs (NE1 and NE2) through a non-transport network, they convert
the clock signals into IEEE 1588 ACR clock signals. After the IEEE 1588 ACR clock signals
traverse the non-transport network and reach NE1 and NE2, the two NEs restore the signals into
synchronous Ethernet clock signals and transmit them to NE3. NE3 transmits the clock signals
to access-layer NEs. The access-layer NEs transmit the clock signals to NodeBs. In this manner,
networkwide clock synchronization is achieved.
NOTE
Currently, the equipment supports only the conversion of IEEE 1588 ACR clock signals into synchronous
Ethernet signals.
Issue 01 (2013-12-30)
43
4 Product Features
Figure 4-26 Typical network that uses both synchronous Ethernet and IEEE 1588 ACR
BITS1
BITS2
Clock
information
Clock
information
Router1
Router2
NE1
Synchronous
ethernet clock
NE3
NE5
NE6
Synchronous
ethernet clock
Node B
Node B
NE2
Converge
nce layer
NE4
NE7
Synchronous
ethernet clock
Access
layer
Synchronous
ethernet clock
Node B
Issue 01 (2013-12-30)
44
4 Product Features
IEEE 1588v2
This section provides the definition of IEEE 1588v2 and describes its purpose.
Definition
The IEEE 1588v2 defines a Precision Clock Synchronization Protocol for Networked
Measurement and Control Systems. It defines the Precision Time Protocol (PTP) to synchronize
independent clocks running on separate nodes of a distributed measurement and control system
to a high degree of accuracy and precision. The IEEE 1588v2 standard supports time
synchronization accuracy in the submicrosecond range.
Synchronization involves clock synchronization (also called frequency synchronization) or time
synchronization. The IEEE 1588v2 standard mainly applicable to time synchronization, and it
can also be used for clock synchronization.
l
Clock synchronization
To achieve synchronization of clocks for two devices, the pulses of the clocks must be at
the same frequency and keep a constant phase difference.
Time synchronization
To achieve time synchronization, the pulses of the clocks must be at the same frequency
and have a very small phase difference as required, and the times indicated by the clocks
must be measured in the same timescale. The commonly used timescales include universal
coordinated time (UTC) and international atomic time (TAI, from the French name Temps
Atomique International).
Purpose
In the applications on transmission networks, the IEEE 1588v2 standard provides an approach
to 1588v2 time synchronization on a network basis, with a synchronization accuracy in the
microsecond range; as well, the IEEE 1588v2 standard helps in transparent transmission of
1588v2 time signals. As such, the IEEE 1588v2 standard, as an alternative to the global
positioning system (GPS) or other complex timing systems, can be used to provide 1588v2 time
for NodeBs or eNodeBs. Figure 4-27 illustrates an application example wherein the IEEE
1588v2 standard helps to synchronize the time of NodeBs distributed in a CDMA2000 or TDSCDMA communication system.
Issue 01 (2013-12-30)
45
4 Product Features
Figure 4-27 Time synchronization of NodeBs implemented by the IEEE 1588v2 standard
RNC
NodeB
BITS
NodeB
PTP node
NodeB
Time
synchronization
Definition
IEEE 1588 adaptive clock recovery (ACR) is a technology used to achieve frequency
synchronization between the clock equipment that supports the IEEE 1588v2 standard. To be
specific, the master equipment encapsulates the local system clock into a Sync packet as a
timestamp and transmits the Sync packet to a packet switched network (PSN), which forwards
the Sync packet to the slave equipment. On receiving the Sync packet, the slave equipment
extracts the timestamp from the Sync packet and recovers the clock frequency by using the ACR
algorithm. In this way, the clock frequency of the PTP equipment at the two ends of a PSN is
synchronized.
IEEE 1588 ACR achieves only frequency synchronization but not time synchronization.
Purpose
With the IEEE 1588 ACR technology applied on a transport network, the clock frequency is
carried in an IEEE 1588v2 packet, which traverses an asynchronous PSN. As a result, the clock
frequency of the equipment at the two ends of the PSN is synchronized.
In the network as shown in Figure 4-28, the PTP node on the RNC side encapsulates the clock
frequency of the building integrated timing supply (BITS) equipment into an IEEE 1588v2
Issue 01 (2013-12-30)
46
4 Product Features
packet, which traverses the asynchronous PSN. On receiving the IEEE 1588v2 packet, the PTP
nodes on the NodeB side recover the clock frequency of the BITS equipment from the IEEE
1588v2 packet by using the ACR algorithm, and send the clock frequency to the NodeBs. In this
way, the clock frequencies of the NodeBs are synchronized with the clock frequency of the RNC.
Figure 4-28 IEEE 1588 ACR frequency synchronization
BITS
NodeB
PSN
NodeB
RNC
NodeB
PTP node
Frequency
synchronization
Router/Switch
Transparent
transmission of
frequency
Equipment on a transport network supports the conversion of IEEE 1588 ACR clock signals
from a non-transport network into synchronous Ethernet clock signals to achieve networkwide
frequency synchronization.
As shown in Figure 4-29, BITS1 and BITS2 respectively transmit clock signals to Router1 and
Router 2 through external clock ports. Because Router1 and Router2 need to transmit the clock
signals to convergence-layer NEs (NE1 and NE2) through a non-transport network, they convert
the clock signals into IEEE 1588 ACR clock signals. After the IEEE 1588 ACR clock signals
traverse the non-transport network and reach NE1 and NE2, the two NEs restore the signals into
synchronous Ethernet clock signals and transmit them to NE3. NE3 transmits the clock signals
to access-layer NEs. The access-layer NEs transmit the clock signals to NodeBs. In this manner,
networkwide frequency synchronization is achieved.
NOTE
Currently, the equipment supports only the conversion of IEEE 1588 ACR clock signals into synchronous
Ethernet signals.
Issue 01 (2013-12-30)
47
4 Product Features
Figure 4-29 Typical network that uses both synchronous Ethernet and IEEE 1588 ACR
BITS1
BITS2
Clock
information
Clock
information
Router1
Router2
NE1
Synchronous
ethernet clock
NE3
NE5
NE6
Synchronous
ethernet clock
Node B
Node B
NE2
Converge
nce layer
NE4
NE7
Synchronous
ethernet clock
Access
layer
Synchronous
ethernet clock
Node B
Issue 01 (2013-12-30)
48
4 Product Features
CES ACR
This section defines CES ACR and describes the purpose of using this feature.
Definition
CES ACR uses the adaptive clock recovery (ACR) technology to recover clock synchronization
information carried by CES packets. CES ACR is available in two types: standard and enhanced.
In a standard CES ACR solution, the source end (Master) uses the local clock information as
the timestamp in a Real-time Transport Protocol (RTP) packet header and encapsulates the local
clock information in a CES packet. The sink end (Slave) recovers the clock using the timestamp
in the packet. This method prevents signal impairment during the transmission.
The OptiX OSN equipment adopts the enhanced timestamp clock solution. That is, clocks can
be recovered based on SN in CES packets rather than timestamps in RTP packet headers. See
Figure 4-30.
Figure 4-30 CES ACR clock solution
Slave
Master
SN
E1
Processing
SN
CES
CES
Processing
E1
Primary
reference
clock
PSN
E1
BTS
E1
CES
PE1
PE2
BSC
Purpose
In the packet domain, CES ACR is mainly used to transparently transmit E1 clocks in the PSN.
Issue 01 (2013-12-30)
49
Issue 01 (2013-12-30)
50
5.1 Chassis
This section describes the structure, slot layout, and access capacity of the chassis.
H
D
Board
installation
area
W
3
2
SLOT SLOT
5
6
(PIU) (FAN)
SLOT 4(EXT)
SLOT 3(EXT)
SLOT 2(CSHD)
4
NOTE
An OptiX OSN 500 NE can automatically save its NE ID, extended ID, IP address, and subnet mask to its
backplane. After a new system control, switching, and timing board replaces an original one, the NE
automatically uses the saved information. Therefore, you do not need to set the NE ID, extended ID, IP
address, and subnet mask for the substitute board.
Description of Labels
Table 5-1 lists the description of the labels on the chassis and the boards in the chassis. The
actual labels may be different depending on the configurations of the chassis and boards.
Issue 01 (2013-12-30)
51
/ QUALIFICATION CARD
Label Name
Description
Grounding label
Indicates the
grounding position
of the chassis.
Qualification card
RoHS label
HUAWEI
Issue 01 (2013-12-30)
MADE IN CHINA
52
Label
Label Name
Description
Product nameplate
label
Indicates the
product name and
certification.
Ventilation Design
The chassis is densely covered with small air holes. Through these holes, air is let in from the
left and out from the right by fans.
NOTE
Ensure the smooth flow of air inside and around the equipment. Do not block the air intake vents and air
exhaust vents of subracks when cabling. Keep the top of subracks clean.
Issue 01 (2013-12-30)
53
Switching Capacities
Table 5-2 lists packet switching capacities of the OptiX OSN 500.
Table 5-2 Switching capacities of the OptiX OSN 500
Board
CSHD
7.2
SLOT
6
(FAN)
SLOT 3
2.5Gbit/s
SLOT 2
SLOT 4
2.5Gbit/s
2.5Gbit/s
Issue 01 (2013-12-30)
54
Boar
d
Acro
nym
Board Name
Port Type
Valid Slot
System
control,
switching,
and
timing
board
TNH1
CSH
D
Packet system
control,
switching, and
timing board
Slot 2
l Supports
7.2 Gbit/s
packet
switching
capacity.
l Provides
two GE/FE
SFP
optical/
electrical
ports, four
FE
electrical
ports, and
sixteen E1
ports.
l Performs
system
communica
tion and
control.
Packet
processin
g board
Issue 01 (2013-12-30)
TNM
1MD1
32xsmart E1
service
processing
board
75/120-ohm E1 port
Slots 3 to 4
TNM
1EM6
T
FE/GE
processing
board
Slots 3 to 4
55
Board
Classific
ation
Power
supply
board
Fan board
Issue 01 (2013-12-30)
Boar
d
Acro
nym
Board Name
Port Type
Valid Slot
TNM
1EM6
F
FE/GE
processing
board
Slots 3 to 4
TNM
1CQ1
4-port
channelized
STM-1 service
processing
board
Slots 3 and 4
TNM
1EF8
F
8xFE
processing
board
Slots 3 to 4
UPM
Uninterruptibl
e power
module
Slot 21
TNC1
PIU
Power supply
board
Slot 5
TNC1
FAN
Fan board
N/A
Slot 6
56
Issue 01 (2013-12-30)
57
Legend
Chain
Ring
Tangent rings
Intersecting rings
Issue 01 (2013-12-30)
58
Network Topology
Legend
ATM/IMA
E1
FE
ATM/IMA
E1/GE
10GE
S-GW/MME
Packet ring
Signal flow
NodeB
BTS
Aggregation
RNC
switch
BSC
Router
Networking Solution
When numerous Ethernet services and a few E1 services coexist, the pure packet networking
solution using the expenditure-effective PTN technology is used to meet multi-service
transmission demands and improve the price performance ratio of network buildout and
maintenance.
Issue 01 (2013-12-30)
59
FE services and GE services are transmitted in pure packet mode over the PTN network,
which reduces the transmission expenditure per bit.
E1 services are transmitted in TDM/ATM PWE3 mode over the PTN network since the
TDM network is unavailable in the pure packet networking solution.
3G IP base station services are transmitted to the OptiX OSN 500 in FE mode, and
encapsulated into PWE3 packets. The PWE3 packets are then aggregated to the OptiX OSN
3500/7500 II in end-to-end mode.
LTE base station services are transmitted to the OptiX OSN 500 in GE mode, and
encapsulated into PWE3 packets. The PWE3 packets are then aggregated to the OptiX OSN
3500/7500 II in end-to-end mode.
2G base station services and 3G ATM base station services are transmitted to the OptiX
OSN 500 in TDM E1/T1 mode and ATM/IMA E1 mode respectively. These services are
then encapsulated into PWE3 packets. Finally, the PWE3 packets are aggregated to the
OptiX OSN 3500/7500 II in end-to-end mode.
Service Types
Table 6-2 lists the service types and their transmission modes.
Table 6-2 Service types and their transmission modes for a pure PTN network
UNI-side
Device
Service Port
Encapsulation
Mode
Transmission
Technology
Service
Topology
3G IP base
station
FE
PWE3
MPLS/MPLSTP
VPWS, VPLS
LTE base
station
GE
PWE3
MPLS/MPLSTP
VPWS, VPLS
2G base station
TDM E1/T1
PWE3
MPLS/MPLSTP
End-to-end P2P
connection
3G ATM base
station
ATM/IMA E1
PWE3
MPLS/MPLSTP
End-to-end P2P
connection
NOTE
l A 3G/LTE base station and an RNC/S-GW/MME exchange services, base station management
information, and signaling. Base station management information and signaling due to their importance
are preferentially processed in the transmission network. Therefore, base station management
information and signaling are assigned a VLAN called the management VLAN, and services are
assigned a VLAN called the service VLAN. The management VLAN has a higher priority than the
service VLAN.
l To prevent VLAN conflicts, VLANs must be planned by considering all base stations. Generally, the
base stations managed by the same RNC/S-GW/MME are grouped into multiple switch areas. All base
stations in the same switch area share one management VLAN and one service VLAN. Base stations
in different switch areas have different management VLANs and service VLANs. See Figure 6-2.
l On the same OptiX OSN 500, the management VLAN and service VLAN are mapped to different
PWs, and the PWs are carried by the same tunnel to save label resources.
Issue 01 (2013-12-30)
60
RNC/S-GW/MME
Transmission network
NodeB/eNodeB
Switch area 1:
Management VLAN=68, Pri=6
Service VLAN=78, Pri=4
NodeB/eNodeB
Switch area 2:
Management VLAN=88, Pri=6
Service VLAN=98, Pri=4
NodeB/eNodeB
Switch area 3:
Management VLAN=1008, Pri=6
Service VLAN=1118, Pri=4
Protection
The PTN network is protected by the PW 1:1 APS or tunnel 1:1 APS mechanism. To achieve
dual-homing at the convergence layer, a 1:1 APS protection group with the same source but
different sinks needs to be configured, as shown in Figure 6-3.
Issue 01 (2013-12-30)
61
el
hann
ing c
k
r
o
W
Prote
ction
PW
Tunnel
chan
nel
OAM
The OptiX OSN 500 supports the hierarchical OAM functions for PTN networks, including ETH
OAM, MPLS OAM, and MPLS-TP OAM. Figure 6-4 shows the application of hierarchical
OAM.
Issue 01 (2013-12-30)
62
PE1
PE2
CE3
CE1
CE4
CE2
P
MEP
MEP
MPLS/MPLS-TP PW OAM
PW Layer
MEP
MEP
MPLS/MPLS-TP Tunnel OAM
Tunnel Layer
MEP
MIP
MIP
MEP
NOTE
For higher network bandwidth utilization, generally only CC/CV OAM is enabled for a tunnel. In addition,
to limit tunnel APS protection switching within 50 ms, the detection packet transmission interval is set to
3.3 ms.
QoS
As the service access node, an OptiX OSN 500 is generally connected to multiple base stations.
Each base station has different priorities of management data and service data. The QoS function
is used for managing traffic of different services from different base stations. Table 6-3 lists the
QoS functions for the OptiX OSN 500.
Table 6-3 QoS functions for the OptiX OSN 500 on a pure PTN network
Network
Position
Point of Application
QoS Function
Ingress node
PW ingress
Transit node
Issue 01 (2013-12-30)
63
Network
Position
Egress node
Point of Application
QoS Function
Synchronization
The synchronous Ethernet clock is used for network-wide synchronization.
l
As shown in Figure 6-5, clock synchronization information from the two building
integrated timing supplies (BITSs) is injected into the two OptiX OSN 3500/7500 II nodes
on the aggregation ring. The master BITS provides a higher-priority clock source and the
slave BITS provides a lower-priority clock source.
The base stations derive clock synchronization information from the OptiX OSN 500 by
means of the retiming E1 clock, synchronous Ethernet clock, or 2M external clock.
Master
BITS
ATM/IMA
E1/FE/2M
external clock
Slave
BITS
BITS
Issue 01 (2013-12-30)
OptiX OSN
3500/7500 II
Node B
64
Issue 01 (2013-12-30)
65
Issue 01 (2013-12-30)
Intra-NE communication management: The master and slave subracks implement intra-NE
communication for each NE at sites A-D. One NE at site A has three subracks (one master
is connected to two slaves).
66
Primary
U2000
External DCN
Switch
Router
NON-GNE
Site D
GNE
Site A
Site E
GNE
Site C
Master
Slave
NON-GNE
NON-GNE
Site F
NON-GNE
Site B
Slave
Fiber
U2000
Web LCT
Network cable
NOTE
Figure 7-1 illustrates a network that has Huawei equipment deployed at different layers: NEs at sites AD are OptiX OSN 8800 NEs, NEs at site E are OptiX OSN 1800 NEs, and NEs at site F are OptiX OSN
550/500 NEs.
67
NMSs and NEs are nodes of a DCN. The DCN between the NMSs and NEs is called the external
DCN, and the DCN between NEs is called the internal DCN.
l
An external DCN is a local area network (LAN) or a wide area network (WAN) and uses
the TCP/IP protocol for communication. It provides communication between NMSs and
between the NMS server and GNEs.
An internal DCN uses the HWECC or TCP/IP protocol to provide communication between
NEs. NEs support inband DCN and outband DCN. The outband DCN uses DCC overhead
bytes as physical DCN channels. The inband DCN uses Ethernet service channels as
physical DCN channels.
Feature
Networking Technology
Inb
and
DC
N
NM information is
transmitted through the
service channels
provided by managed
equipment. Therefore,
no extra equipment or
DCN is required. This
reduces operating
expenditure.
l Flexible networking:
NM information is
encapsulated into
Ethernet frames and
carries a fixed VLAN
ID to get separated
from the service data.
The NM information
is transmitted with
services on service
channels.
l HWECC
l IP
68
to the occurrence of alarms is recorded in the U2000. This may cause trouble in fault location.
In addition, the wrong time with regard to the occurrence of abnormal events is recorded in the
NE security logs. To ensure the NE time accuracy, the U2000 provides three time
synchronization schemes: synchronizing with the U2000 server, synchronizing with the NTP
server and synchronizing with the standard NTP server and synchronizing with the standard
NTP server.
l
If you use the scheme of synchronizing with the U2000 server, all NEs use the U2000 server
time as the standard time. The NE time can be synchronized with the U2000 server time
manually or automatically. The U2000 server time refers to the system time of the
workstation or computer where the U2000 server is located. This scheme features easy
operation, and is applicable in networks that require a low accuracy with regard to time.
If you use the scheme of synchronizing with the NTP server or synchronizing with the
standard NTP server, the NE time and the U2000 time are synchronized with the NTP server
time or the standard NTP server time automatically. The NTP server can be the U2000
server or a special time server. This scheme enables the U2000 and NEs to have a time
accuracy of one nanosecond in theory, and applies to a network with high requirement for
time accuracy.
Time server
NMS server
NE2
NE1
NE3
NE5
NE4
As shown in Figure 7-2, the equipment in the network can be classified into three categories:
Issue 01 (2013-12-30)
69
The middle-level time server: the 1- or 2-level time server that obtains time information
from the higher-level time server and provides time information for the lower-level time
server
Choose the NMS server as the time server for NEs. The NMS server can be set as the
highest-level time server, or set to obtain time information from other time servers.
NEs can only be set as the client, obtaining time information from the specified time server.
Issue 01 (2013-12-30)
70
Function
Description
Routine
maintena
nce
Alarm and
performance
management
Issue 01 (2013-12-30)
71
Applica
tion
Scenari
o
Function
Description
RMON
Upgrade and
loading of board
software and NE
software
Voltage check
Automatic search
for optical fibers
Automatic
shutdown of lasers
Port impedance
query
Optical module
information query
Power
consumption
control
OAM
Issue 01 (2013-12-30)
Storage of the ID
and IP address of
an NE
Port information
query
ETH OAM
72
Applica
tion
Scenari
o
Function
Description
ATM OAM
MPLS OAM
MPLS-TP OAM
Fault
locating
One-click data
collection
Loopback
Remote
maintenance
PRBS
Warm/Cold resets
Hot swap
Issue 01 (2013-12-30)
73
Applica
tion
Scenari
o
Other
Function
Description
Port mirroring
Quick fault
rectification
Alarm reporting
upon removal of
important
peripheral storage
devices
NSF
Issue 01 (2013-12-30)
74
8.1.1 TP-Assist
With the explosive growth of service traffic, metropolitan area networks (MANs) now mainly
carry data services, such as video services, Internet services, and voice over IP (VoIP) services,
instead of traditional voice services. Compared with connection-oriented SDH networks, packet
switched networks (PSNs) feature more flexible networking, complex configurations, and higher
technical requirements on operation and maintenance personnel. TP-Assist dramatically
simplifies PSN operation and maintenance, facilitating deployment of large-scale networks.
Unlike an SDH network, a packet network brings the following challenges:
l
More types of network topologies and more complex and time-consuming configurations,
which impose higher requirements on O&M personnel.
Lack of overheads that indicate the physical status of a network to real-time monitor
services or form a complete alarm system. Once a network is faulty, it is hard to locate the
fault.
TP-Assist supports a wide variety of transmission devices, complies with OAM standards, and
integrates Huawei's powerful NMS U2000 and unique operation and maintenance experience.
It applies to all stages of the network life cycle.
TP-Assist
Network planning
Service configuration
Network topology
planning
End-to-end service
deployment
Automatic deployment of
alarm management
Service commissioning
One-click service
connectivity test
Routine maintenance
Fault diagnosis
Performance monitoring
and statistics
IP ping response
One-click service
performance test
Service loop detection
Automatic test with no
need for any instrument
Network planning: provides powerful network planning tools and professional network
planning service.
Service configuration:
Deploys services across microwave and optical fibers in an end-to-end manner.
Automatically deploys alarm management when services are being deployed,
simplifying alarm deployment. Alarms can be reported upon a service interruption.
Service commissioning:
Provides one-click service connectivity and performance tests.
Automatically tests the delay, throughput, and packet loss rate with no need for any test
instruments.
Issue 01 (2013-12-30)
75
Fault diagnosis:
Provides the quick fault diagnosis function, which diagnoses faults at the service, PW,
or tunnel layer by checking connectivity, performance, and configurations.
Provides the IP ping function to test end-to-end connectivity, facilitating quick fault
location.
Locates looped points, checks whether a loop forms due to incorrect service
configurations, and automatically disables looped services in a ring network storm,
therefore minimizing the impact of looped services on the network.
Tunnel OAM
l
Description
The tunnel OAM mechanism helps to effectively detect, identify, and locate internal defects
at the tunnel layer of an MPLS network. The equipment triggers the protection switching
based on the OAM detection status. Therefore, quick fault detection and service protection
can be achieved.
PW OAM
l
Description
The PW OAM mechanism helps to effectively detect, identify, and locate internal defects
at the PW layer of a network. The equipment triggers the protection switching based on the
OAM detection status. Therefore, quick fault detection and service protection can be
achieved.
l
Issue 01 (2013-12-30)
76
The equipment performs PW encapsulation on service packets, and then transmits the
service packets over tunnels. The network consists of two layers: tunnel and PW. Tunnels
use tunnel OAM for maintenance and management, and PWs use PW OAM for
maintenance and management. Currently, the equipment can detect the connectivity of a
certain PW through ping packets, and then reports the result to the NMS.
MPLS-TP OAM
PSN
NodeB
RNC
PW1
PW2
NE1
MPLS tunnel
NodeB
NE2
RNC
Equipment with MPLS-TP OAM functionality can meet carrier-class data transmission needs.
77
Definition
Based on the MAC layer, the ETH OAM protocol performs OAM operations for the Ethernet
by transmitting OAM packets. This protocol is irrelevant to the transmission medium. The OAM
packets are processed only at the MAC layer, having no impact on the other layers of the Ethernet.
In addition, as a low-rate protocol, the ETH OAM protocol occupies low bandwidths. Therefore,
this protocol does not affect services carried on links.
ITU-T and IEEE have researches on ETH OAM. Currently, Huawei Ethernet service processing
boards have realized the ETH OAM function, which complies with IEEE 802.1ag and IEEE
802.3ah. Wherein, IEEE 802.1ag define Ethernet service OAM standards, and IEEE 802.3ah
defines Ethernet port OAM standards. As shown in Figure 8-2, the combination of IEEE 802.1ag
and IEEE 802.3ah provides a complete Ethernet OAM solution.
Figure 8-2 Application of IEEE 802.1ag and IEEE 802.3ah
IEEE
802.3ah
CE
1
Router1
IEEE
802.3ah
IEEE 802.1ag
P
CE3
CE2
PE2
PE1
P
Router2
Access Layer
Router3
CE4
Access Layer
Core Layer
Custom Layer
Custom Layer
OptiX NE
Ethernet service OAM focuses on the maintenance of end-to-end Ethernet links. Based on
services, Ethernet service OAM implements end-to-end detection in the unit of
"maintenance domain" and performs segmental management on each network segment that
is involved in the same service on a network.
Ethernet port OAM focuses on the maintenance of point-to-point Ethernet link between
two directly-connected devices in Ethernet in the first mile (EFM). Ethernet port OAM
does not focus on a specific service. It maintains the point-to-point Ethernet link by
performing OAM auto-discovery, link performance monitoring, fault check, remote
loopback, and selfloop check.
Purpose
With the continuous development of the Ethernet, especially when LANs evolve to WANs,
operators pay more attention to equipment maintainability. Solutions to operations,
administration and maintenance (OAM) in the transmission network are required urgently.
Therefore, ETH OAM is developed.
Issue 01 (2013-12-30)
78
A comparison of ETH OAM and existing OAM and fault locating methods is provided as
follows:
l
When a loopback is performed at a port, all packets on the port are looped back. Therefore,
the loopback method cannot be used if only a specific service needs to be looped back.
Definition
ATM OAM is used for detecting and locating ATM faults, and monitoring ATM performance.
In this document, ATM OAM refers to OAM only at the ATM layer and implements various
OAM functions by means of specific ATM OAM cells.
Purpose
ATM OAM provides segment-based ATM OAM between the CE and the PE and end-to-endbased ATM OAM between CEs.
As shown in Figure 8-3, ATM OAM cells are transmitted and detected between the CE and the
PE, or between the CEs to monitor the ATM link.
Figure 8-3 Typical application of ATM OAM
CE1
(NodeB)
PE1
CE2
PE2
(RNC)
Segment check
Segment check
End-to-end check
Packet transmission
equipment
Issue 01 (2013-12-30)
79
8.1.6 RMON
By using the remote monitoring (RMON), you can transmit network monitoring data between
different network sections.
Currently, the management of the Ethernet performance for transmission products is relevantly
simple. In the case of the management of Ethernet ports, the management of the performance
data of the ports is required. What's more, as the network is becoming complex, a method for
managing network sections is required. Thus, the RMON emerges and the RMON should have
the following features:
l
All statistics data is saved at the agent and the out-of-service operation on the manager is
supported.
Based on the preceding purposes, the RMON defines a serial of statistic formats and functions
to realize the data exchange between the control stations and detection stations that complies
with the RMON standards. To meet the requirements of different networks, the RMON provides
flexible detection modes and control mechanism. What's more, the RMON provides error
diagnosis, planning and information receiving of the performance events of the entire network.
Port mirroring applies to online fault diagnosis. It replicates the traffic at one port to another
port, and then an analyzer is used to locate faults.
After port mirroring is used, traffic can be monitored in real time using an analyzer.
As shown in Figure 8-4, a port on NE1 is the mirror source port and another port on NE1 is the
mirror destination port. NE1 replicates the traffic at the mirror source port to the mirror
destination port. An analyzer is used to analyze the traffic or to monitor the traffic in real time
without affecting the services.
Issue 01 (2013-12-30)
80
Mirror Source
Function Point
Analyst
NodeB
Mirror
Observation Point
NE1
(Monitored/Monitor)
NE2
NE3
Normal Service
RNC
Mirror Service
Issue 01 (2013-12-30)
Upgrade
Method
Package Loading
Package Diffusion
Definition
81
Upgrade
Method
Package Loading
Package Diffusion
Application
scenario
Characteristic
Applicable
version
Issue 01 (2013-12-30)
82
9 Security Management
Security Management
Issue 01 (2013-12-30)
83
9 Security Management
NE login management: You can successfully log in to an NE only after entering the correct
user name and password.
NE user switching: One client allows only one user to operate an NE at a time. For this
reason, if multiple NE users log in to an NE, the NE users need to be switched to ensure
that the configuration data is unique.
Forcibly logging other users out of an NE: To avoid errors owing to simultaneous
configuration by multiple users, or to prevent other users from illegally logging in to an
NE, one user can forcibly log a lower-level user out from the NE.
NE login locking: After the locking function is enabled, a user whose level is lower than
that of the current user is not allowed to log in to an NE.
NE configuration locking: You can lock the function of configuring certain function
modules on an NE to prevent other users from configuring the modules.
Management of NE users
Five user authority levels are available in an ascending order: monitoring level,
operation level, maintenance level, system level, and debugging level.
Based on network management systems, NE users are classified into LCT NE users,
EMS NE users, CMD NE users, and general NE users.
You can create a user, assign an authority level for the user, and specify the user flag.
You can change a user name, a password, an authority level, and a user flag.
You can delete a user.
84
9 Security Management
ACL Protocol
ACL rules are configured to filter received IP packets. This controls the data traffic on networks
and protects against malicious attacks.
You can set basic ACL rules or advanced ACL rules, based on the required system security level.
l
For an NE that requires a low security level, you can configure basic ACL rules so that the
NE checks only the source addresses of received IP packets.
For an NE that requires a high security level, you can configure advanced ACL rules. In
this case, the NE checks the source addresses, sink addresses, source ports, sink ports, and
protocol types of received IP packets.
If both basic and advanced ACL rules are configured, an NE uses only advanced ACL rules to
check received IP packets.
In addition, ACL rules support the following operations:
l
SSL Protocol
The SSL protocol is used to protect the integrity and security of data.
RADIUS Protocol
RADIUS provides a complete network security solution. After a RADIUS server verifies that
the user name and password of a user are valid, the server allows a certain authority for the user,
and provides services to the user.
Carriers' RADIUS servers manage all the user accounts and user attributes of the 500. To log in
to an OptiX OSN 500 NE, you must apply for a user account to the carrier. When you attempt
to log in to an OptiX OSN 500 NE, the RADIUS server verifies the user name and password
that you have entered. If the verification fails, a login error is reported.
The OptiX OSN 500 supports the shielding function when being connected to a network port
management device. That is, when being connected to a network port on an OptiX OSN 500
NE, a network port management device manages only the connected OptiX OSN 500 NE, and
cannot access the other devices that are connected to the OptiX OSN 500 NE through ECCs.
With this function, even if an OptiX OSN 500 NE in the insecure domain is accessed illegally,
the NEs that are connected to the OptiX OSN 500 NE will not be illegally operated.
Security FTP
Security File Transfer Protocol (SFTP) works at the secure shell (SSH) connection layer, and
extends support for FTP security based on SSH-provided fundamental services like encryption
and authentication.
l
Issue 01 (2013-12-30)
In security, FTP transmits plain text and supports only password authentication, whereas
SFTP transmits cipher text and supports both password authentication and cipher key
authentication. Authentication by cipher key is safer than authentication by password.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
85
9 Security Management
SFTP needs to perform encryption and decryption and theoretically has a lower
transmission efficiency than FTP. However, benefiting from specialized improvement
design, SFTP generally has a higher transmission efficiency than FTP.
SFTP can load packages, upload/download databases, upload log files, and upload/
download a single file. NEs can work only as SFTP clients and cannot work as SFTP
servers. In addition, SFTP works based on TCP connections and requires IP routes between
NEs and SSH servers. Therefore, SFTP service can be deployed only at gateway NEs.
Uniqueness and complexity of accounts: All accounts held in an NE are unique. An account
consists of 4 to 16 characters.
Active periods of passwords: Each password has an active period. After the active period
of a password expires, the password can be used for only three logins. For a common user's
password, the shortest active period is one day. A common user can change the password
only after the shortest active period expires.
Storage of encrypted passwords: Encrypted by using the message digest algorithm 5 (MD5)
or SHA256, passwords are held in a system. SHA256 is used by default when a user is
created or the system password is changed.
Querying about online users: An administrator account can query online users.
You can forward the system security log to the Syslog server.
Syslog Management
The Syslog service is used for the security management of NEs. Different information is
transmitted to the Syslog server in a format compliant with the Syslog protocol so that
maintenance personnel can monitor NEs easily.
The OptiX OSN 500 supports the following functions related to the Syslog protocol:
l
Issue 01 (2013-12-30)
86
9 Security Management
Setting the transmission mode of the Syslog protocol to UDP (by default) or TCP
Configuration of multiple Syslog servers and transmission of logs to multiple servers at the
same time
Reporting relevant alarms when the Syslog server fails to communicate with NEs
Figure 9-1 illustrates log transmission on a network by means of the Syslog protocol. To ensure
the security of system logs, at least two Syslog servers are required on a transmission network.
NEs communicate with Syslog servers by running the IP protocol. NEs communicate with each
other in many modes, such as HWECC, IP over DCC, and OSI over DCC.
Figure 9-1 Log transmission by means of the Syslog protocol
NE B
NMS
NE C
(client)
NE A
(client)
TCP/IP
Syslog server B
Real-time
security log
Syslog server A
NE D
NOTE
A Syslog server is a workstation or server that stores the system logs of all NEs on a network.
Forwarding gateway NEs receive system logs from other NEs, and then forward these system logs to Syslog
servers, for example, NE A and NE C in Figure 9-1.
When NEs communicate in IP mode, each NE can directly communicate with two different
Syslog servers by running the IP protocol. Therefore, you need to configure the IP addresses
and port numbers of the Syslog servers on an NE. The NE transmits the system log to two Syslog
servers by using the automatic routing function of the IP protocol. You do not need to configure
any forwarding gateway NE.
When NEs communicate in ECC mode, the NEs that are not directly connected to Syslog servers
cannot communicate with Syslog servers. The logs of these NEs need to be transmitted to the
gateway NEs that can communicate with Syslog servers directly. Then, the gateway NEs forward
the logs to Syslog servers. Therefore, you need to configure forwarding gateway NEs. For
example, you can configure NE A as the forwarding NE of NE D.
Issue 01 (2013-12-30)
87
10
10 Technical Specifications
Technical Specifications
Issue 01 (2013-12-30)
88
10 Technical Specifications
Description
Dimensions
44 mm x 442 mm x 220 mm (H x W x D)
Weight
2 kg (net weight of a chassis that contains one fan board and one PIU board)
Power
consumptio
n
SLOT 1(CSHD)
Heat
consumptio
n
Power
supply
performanc
e
Fuse
capacity
10 A
Electromag
netic
compatibilit
y
Predicted
reliability
NOTE
In the case of OptiX OSN 500 equipment, power consumption is generally transformed into heat
consumption. Hence, heat consumption (BTU/h) and power consumption (W) can be converted to each
other in the formula: Heat consumption (BTU/h) = Power consumption (W) / 0.2931 (Wh).
Issue 01 (2013-12-30)
89
10 Technical Specifications
Issue 01 (2013-12-30)
It
e
m
Specifications
Pr
ot
ec
tio
n
MPLS/
MPLS-TP
tunnel
automatic
protection
switching
(APS)
32
MPLS/
MPLS-TP
PW APS
Numbe
r of
MPLS/
MPLSTP PW
APS
protecti
on
groups
32
Numbe
r of
bound
membe
rs
512
NOTE
Tunnel APS, MPLS PW APS, MPLS-TP tunnel APS, and MPLS-TP PW APS share
resources.
NOTE
Tunnel APS, MPLS PW APS, MPLS-TP tunnel APS, and MPLS-TP
PW APS share resources.
Link-state
pass
through
(LPT)
16
Link
aggregatio
n group
(LAG)
Numbe
r of
LAGs
Numbe
r of
membe
rs in a
LAG
90
It
e
m
Specifications
Multiple
Spanning
Tree
Protocol
(MSTP)
M
ai
nt
en
an
ce
Issue 01 (2013-12-30)
10 Technical Specifications
Numbe
r of
instanc
es
support
ed by a
port
Numbe
r of port
groups
Numbe
r of
ports
provide
d by
port
groups
16
Ethernet
ring
protection
switching
(ERPS)
Linear
multiplex
section
protection
(LMSP) on
the packet
plane
MPLS/
MPLS-TP
tunnel
OAM
64
MPLS/
MPLS-TP
PW OAM
64
NOTE
Tunnel OAM, MPLS PW OAM, MPLS-TP tunnel OAM, and MPLS-TP PW OAM
share resources.
NOTE
Tunnel OAM, MPLS PW OAM, MPLS-TP tunnel OAM, and MPLS-TP PW OAM
share resources.
91
It
e
m
Specifications
ETH OAM
Se
rv
ic
es
Issue 01 (2013-12-30)
10 Technical Specifications
Numbe
r of
mainten
ance
domain
s (MDs)
32
Numbe
r of
mainten
ance
associat
ions
(MAs)
32
Numbe
r of
mainten
ance
associat
ion end
points
(MEPs)
32
Numbe
r of
mainten
ance
associat
ion
interme
diate
points
(MIPs)
32
ATM
OAM
E-Line
services
1k
NOTE
Native ETH services and ETH PWE3 services (VPWSs) share resources.
92
It
e
m
Specifications
E-LAN
services
Issue 01 (2013-12-30)
10 Technical Specifications
Numbe
r of ELAN
services
(ELAN
VSIs)
support
ed by an
NE
(VSI is
short
for
virtual
switch
instanc
e.)
Numbe
r of
logical
ports
support
ed by a
VSI
Numbe
r of
virtual
usernetwor
k
interfac
es (VUNIs)
support
ed by an
NE
(VPLS)
Number of V-UNIs
Number of VLANs
32
4096
64
2047
128
1023
256
511
512
255
1024
127
Numbe
r of split
horizon
groups
support
ed by a
VSI
93
It
e
m
Specifications
Numbe
r of
logical
ports
support
ed by an
NE
Issue 01 (2013-12-30)
10 Technical Specifications
1k
CES
services
126
ATM
services
Numbe
r of
local
services
96
Numbe
r of
remote
services
192
M
ult
iLi
nk
Po
int
to
Po
int
Pr
ot
oc
ol
(
M
LP
P
P)
Number of
ML-PPP
groups
supported
by an NE
64
Number of
PPP links
supported
by an NE
504
Number of
member
links
supported
in an MLPPP group
16
IG
M
P
sn
Number of
multicast
groups
512
94
Issue 01 (2013-12-30)
It
e
m
Specifications
oo
pi
ng
Number of
members
in a
multicast
group
1K
Q
oS
Number of
port
weighted
random
early
discard
(WRED)
policies
Number of
virtual
usernetwork
interface
(V-UNI)
ingress
policies
256
Number of
port
policies
256
Number of
Differentia
ted
Services
(DiffServ)
domains
Number of
port flows
512
Number of
V-UNI
ingress
flows
512
Number of
traffic
classificati
on rules
10 Technical Specifications
95
It
e
m
Ot
he
rs
10 Technical Specifications
Specifications
Number of
access
control
lists
(ACLs)
512
Number of
Tunnels
l Unidirectional: 1K
l Bidirectional: 512
NOTE
l One bidirectional Tunnel is counted as two unidirectional Tunnels.
l If Tunnels do not carry PWs, the sum of PWs and Tunnels must not exceed 1K.
If Tunnels carry PWs, the Tunnels are not counted and the number of carried
PWs must not exceed 1K. Therefore, if each Tunnel carries one PW, the number
of Tunnels and the number of PWs can both be 1K.
Issue 01 (2013-12-30)
Number of
static PWs
1K
Number of
MS-PWs
128
Number of
QinQ links
1K
MAC
addresses
Numbe
r of
static
MAC
address
es
support
ed by an
E-LAN
512
Numbe
r of
MAC
address
es
support
ed by ELAN
services
16K
NOTE
If Tunnels do not carry PWs, the sum of PWs and Tunnels must not exceed 1K. If
Tunnels carry PWs, the Tunnels are not counted and the number of carried PWs
must not exceed 1K. Therefore, if each Tunnel carries one PW, the number of
Tunnels and the number of PWs can both be 1K.
96
It
e
m
10 Technical Specifications
Specifications
Numbe
r of
MAC
address
es
support
ed by an
NE
VLAN ID
range
supported
by a port
16K
1 to 4094
Weight (kg)
CSHD
32.2
1.00
MD1
12.2
0.50
EM6T
10.4
0.37
EM6F
11.3
0.40
EF8F
23
0.55
CQ1
16
0.50
PIU
0.5
0.12
FAN
2.3
0.20
97
10 Technical Specifications
Value
155520 kbit/s
S-1.1
L-1.1
L-1.2
Transmission distance
(km)
15
40
80
Operating wavelength
range (nm)
1261 to 1360
1263 to 1360
1480 to 1580
Single-mode LC
Single-mode LC
Single-mode LC
-15 to -8
-5 to 0
-5 to 0
Receiver sensitivity
(dBm)
-28
-34
-34
Minimum overload
(dBm)
-8
-10
-10
8.2
10
10
NOTE
Format of optical port type is defined as follows: transmission distance-signal rate.fiber type
Explanation for optical port type "S-1.1" is as follows: "S" represents short distance; the first digit "1"
represents STM-1 signals; the second digit "1" represents ITU-T G.652 fibers (1310 nm).
Explanation for optical port type "L-1.1" is as follows: "L" represents long distance; the first digit "1"
represents STM-1 signals; the second digit "1" represents ITU-T G.652 fibers (1310 nm).
Explanation for optical port type "L-1.2" is as follows: "L" represents long distance; the first digit "1"
represents STM-1 signals; the second digit "2" represents ITU-T G.652 fibers (1550 nm).
Table 10-5 lists the specifications for the single-fiber bidirectional optical interfaces of the
OptiX OSN 500's STM-1 optical ports.
Table 10-5 Specifications for the single-fiber bidirectional optical interfaces of the STM-1
optical ports
Issue 01 (2013-12-30)
Parameter
Value
155520 kbit/s
NRZ
98
10 Technical Specifications
Parameter
Value
S-1.1
L-1.1
Transmission distance
(km)
15
40
Type of fiber
Single-mode LC
Single-mode LC
Operating transmit
wavelength (nm)
1550
1310
1550
1310
Operating receive
wavelength (nm)
1310
1550
1310
1550
-15 to -8
-5 to 0
Receiver sensitivity
(dBm)
-32
-32
Minimum overload
(dBm)
-8
-10
Minimum extinction
ratio (dB)
8.5
10
Issue 01 (2013-12-30)
Item
Value
Optical port
type
100BASE-FX
100BASE-LX
100BASE-VX
100BASE-ZX
Optical fiber
type
Multi-mode LC
Single-mode LC
Single-mode LC
Single-mode LC
Transmissio
n distance
(km)
15
40
80
Operating
wavelength
(nm)
1270 to 1380
1261 to 1360
1263 to 1360
1480 to 1580
Mean
launched
power (dBm)
-19 to -14
-15 to -8
-5 to 0
-5 to 0
99
10 Technical Specifications
Item
Value
Receiver
minimum
sensitivity
(dBm)
-30
-28
-34
-34
Minimum
overload
(dBm)
-14
-8
-10
-10
Minimum
extinction
ratio (dB)
10
8.2
10
10
Table 10-7 lists the specifications of the OptiX OSN 500's FE single-fiber bidirectional optical
ports.
Table 10-7 Specifications of the FE single-fiber bidirectional optical ports
Parameter
Value
100Base-BX
Transmission distance
(km)
15
40
Type of fiber
Single-mode LC
Single-mode LC
Operating transmit
wavelength (nm)
1550
1310
1550
1310
Operating receive
wavelength (nm)
1310
1550
1310
1550
-15 to -8
-5 to 0
Receiver sensitivity
(dBm)
-32
-32
Minimum overload
(dBm)
-8
-10
Minimum extinction
ratio (dB)
8.5
10
100
10 Technical Specifications
Value
Optical port
type
1000BASE-SX
1000BASE-LX
1000BASE-VX
1000BASE-ZX
Optical fiber
type
Multi-mode LC
Single-mode LC
Single-mode LC
Single-mode LC
Transmission
distance (km)
0.5
10
40
80
Operating
wavelength
(nm)
770 to 860
1270 to 1355
1270 to 1355
1500 to 1580
Mean
launched
power (dBm)
-9.5 to -2.5
-9 to -3
-5 to 0
-2 to +5
Receiver
minimum
sensitivity
(dBm)
-17
-20
-23
-23
Minimum
overload
(dBm)
-3
-3
-3
Minimum
extinction
ratio (dB)
NOTE
With different SFP modules, the equipment provides GE optical ports with different types and transmission
distances.
Table 10-9 lists the specifications of the OptiX OSN 500's GE single-fiber bidirectional optical
ports.
Table 10-9 Specifications of the GE single-fiber bidirectional optical ports
Issue 01 (2013-12-30)
Paramete
r
Value
Type of
optical
interface
1000BASE-LX
1000BASE-VX
101
10 Technical Specifications
Paramete
r
Value
Transmiss
ion
distance
(km)
10
40
Type of
fiber
Single-mode LC
Single-mode LC
Operating
transmit
wavelengt
h (nm)
1490
1310
1490
1310
Operating
receive
wavelengt
h (nm)
1310
1490
1310
1490
Launched
optical
power
range
(dBm)
-9 to -3
-2 to 3
Receiver
sensitivity
(dBm)
-19.5
-23
Minimum
overload
(dBm)
-3
-3
Minimum
extinction
ratio (dB)
GE Optical Port
Table 10-10 lists the parameters specified for the colored GE optical ports of the OptiX OSN
equipment that comply with ITU-T G.694.1.
Issue 01 (2013-12-30)
102
10 Technical Specifications
Value
CWDM
Nominal bit
rate
1,250,000 kbit/s
Type of fiber
Single-mode LC
Transmission
distance (km)
40
80
Launched
optical power
range (dBm)
0 to 5
0 to 5
Operating
wavelength
range (nm)
Receiver
sensitivity
(dBm)
-19
-28
Minimum
-3
overload (dBm)
-9
Minimum
extinction ratio
(dB)
8.2
8.2
Value
CWDM
Issue 01 (2013-12-30)
Type of fiber
Single-mode LC
70
0 to 4
103
Parameter
10 Technical Specifications
Value
CWDM
-9
8.2
Table 10-12 Parameters specified for colored 10GE optical ports (DWDM)
Parameter
Value
DWDM
Issue 01 (2013-12-30)
Type of fiber
Single-mode LC
Transmission
distance (km)
40
80
Launched optical
power range
(dBm)
-1 to +2
-1 to +3
Central frequency
(THz)
192.1 to 196.0
192.1 to 196.0
Central frequency
deviation (GHz)
10
10
Receiver
sensitivity (dBm)
-17
-24
Minimum
overload (dBm)
-1
-9
Minimum
extinction ratio
(dB)
9.5
8.2
104
10 Technical Specifications
Value
CWDM
Nominal bit
rate
Type of fiber
Single-mode LC
Transmission
distance (km)
40
80
Launched
optical power
range (dBm)
0 to 5
0 to 5
Operating
wavelength
range (nm)
Receiver
sensitivity
(dBm)
-19
-28
Minimum
-3
overload (dBm)
-9
Minimum
extinction ratio
(dB)
8.2
8.2
Table 10-14 Parameters specified for colored STM-16 optical ports (DWDM)
Parameter
Value
DWDM
Issue 01 (2013-12-30)
Type of fiber
Single-mode LC
Transmission distance
(km)
120
-1 to +3
105
Parameter
10 Technical Specifications
Value
DWDM
192.1 to 196.0
Central frequency
deviation (GHz)
10
-28
-9
8.2
Value
Bit rate
155520 kbit/s
Code pattern
CMI
Connector
106
10 Technical Specifications
Table 10-16 Specifications of the OptiX OSN 500's CES/ATM/IMA service electrical ports
Item
Value
Standard compliance
ITU-T G.703/G.823
2048
Code pattern
HDB3
Impedance (ohm)
75
120
Port type
Anea 96
Port Rate
Code Pattern
Port Type
GE/FE electrical
port
10BASE-T
Manchester coding
signals
RJ45
GE/FE electrical
port
100BASE-T(X)
MLT-3 coding
signals
GE electrical
port
1000BASE-T
4D-PAM5 coding
signals
Table 10-18 provides status explanation for indicators on the boards that the OptiX OSN 500
supports.
Table 10-18 Status explanation for indicators on the boards that the OptiX OSN 500 supports
Issue 01 (2013-12-30)
Indicator
State
Meaning
Applicable Board
STAT
On (green)
CSHD/MD1/EM6T/
EM6F/EF8F/CQ1
107
Indicator
10 Technical Specifications
State
Meaning
On (red)
Off
Applicable Board
l There is no power
supplied to the
board.
PROG
Software is being
loaded to the board
during the power-on
or resetting process
of the board.
The BOOTROM
self-check fails
during the power-on
or resetting process
of the board.
On (green)
CSHD/EM6T/EM6F
l The software is
running properly.
Issue 01 (2013-12-30)
108
Indicator
10 Technical Specifications
State
Meaning
On (red)
Applicable Board
SYNC
SRV
Off
On (green)
On (red)
On (green)
The system/service is
normal.
On (red)
A critical or major
alarm occurs in the
system/service.
On (yellow)
A minor or remote
alarm occurs in the
system/service.
Off
l For a CSHD
board, there is no
power supplied to
the system.
CSHD
CSHD/EM6T/
EM6F/EF8F/CQ1
l For a service
board, no service
is configured.
Issue 01 (2013-12-30)
109
Indicator
State
Meaning
Applicable Board
ACT1/ACT2
On or blinks (yellow)
CSHD
Off
On (green)
Blinks (yellow)
Off
On (green)
Off
On (red)
Off
On (green)
Power is being
supplied.
Off
LINK1/LINK2
(EM6F)
LINK1/LINK2
(CSHD)
LOS1/LOS2/LOS3/
LOS4
PWRA/PWRB
Issue 01 (2013-12-30)
10 Technical Specifications
EM6F
CSHD
CQ1
PIU
110
FAN
Issue 01 (2013-12-30)
10 Technical Specifications
On (green)
On (red)
On (yellow)
Off
ALM
On (red)
Vout
On (green)
RUN
Flashing (green)
ALM
On (red)
L/A
On (green)
Blinks (orange)
FAN
Rectifier module of
UPM
Monitoring module
of UPM
EF8F
111
Off
10 Technical Specifications
Standard
Electromagnetic compatibility
l CE certification
l ETSI EN 301 489-1
l ETSI EN 301 489-4
l CISPR 22
l EN 55022
Surge protection
l ITU-T K.27
l ETSI EN 300 253
l CE certification
Safety
l ETSI EN 60215
l ETSI EN 60950
l IEC 60825
l GB 4943
Environmental protection
l RoHS
Climate
Table 10-20 lists climate requirements.
Issue 01 (2013-12-30)
112
10 Technical Specifications
Specification
Atmospheric pressure
Temperature
-40C to +70C
1C/min
Relative humidity
5% to 100%
Solar radiation
1120 W/m2
Heat radiation
600 W/m2
Waterproofing Requirements
Requirements for storing equipment on site: Generally, the equipment must be stored indoors.
No water should remain on the floor or leak into equipment crates. The equipment should be
placed away from areas where water leakage is possible (for example, do not place near
automatic fire-fighting extinguishing and heating systems).
Ensure that all the following four conditions are met if the equipment is stored outdoors:
l
Proper rain-proofing measures are taken to prevent water from entering crates.
No water is on the ground where crates are placed and water is not seeped into crates.
Biological Environment
l
Air Cleanliness
l
Table 10-21 lists the density requirements for mechanically active substances.
Issue 01 (2013-12-30)
Content
Suspended dust
5.00 mg/m3
Precipitable dust
20.0 mg/(mh)
Sand particles
300 mg/m3
113
10 Technical Specifications
Table 10-22 lists the density requirements for chemically active substances.
Content
SO2
0.30 mg/m3
H2S
0.10 mg/m3
NO2
0.50 mg/m3
NH3
1.00 mg/m3
CL2
0.10 mg/m3
HCL
0.10 mg/m3
HF
0.01 mg/m3
O3
0.05 mg/m3
Mechanical Stress
Table 10-23 lists requirements for mechanical stress.
Table 10-23 Requirements for mechanical stress
Item
Sub-item
Specification
Sinusoidal
vibration
Displacement
1.5 mm
Acceleration
5 m/s2
Frequency range
2 Hz to 9 Hz
9 Hz to 200 Hz
Static pressure
Static load
NOTE
Static load is the pressure from the upside that the packaged equipment can tolerate when equipment is
stacked in the specified manner.
Issue 01 (2013-12-30)
114
10 Technical Specifications
Climate
Table 10-24 lists climate requirements.
Table 10-24 Climate requirements
Item
Specification
Atmospheric pressure
Temperature
-40C to +70C
1C/min
Relative humidity
5% to 95%
Solar radiation
1120 W/m2
Heat radiation
600 W/m2
Waterproofing Requirement
Ensure that the following conditions are met when transporting the equipment:
l
Proper rain-proofing measures are taken for vehicles to prevent water from entering crates.
Biological Environment
l
Air Cleanliness
l
Table 10-25 lists the density requirements for mechanically active substances.
Issue 01 (2013-12-30)
Content
Suspended dust
No requirement
Precipitable dust
3.0 mg/(m2h)
Sand particles
100 mg/m3
115
10 Technical Specifications
Table 10-26 lists the density requirements for chemically active substances.
Content
SO2
1.00 mg/m3
H2S
0.50 mg/m3
NOx
1.00 mg/m3
NH3
3.00 mg/m3
CL2
HCL
0.50 mg/m3
HF
0.03 mg/m3
O3
0.10 mg/m3
Mechanical Stress
Table 10-27 lists requirements for mechanical stress.
Table 10-27 Requirements for mechanical stress
Item
Sub-item
Specification
Random
vibration
Acceleration spectral
density
1 m2/s3
-3 dB/oct
Frequency range
5 Hz to 20 Hz
20 Hz to 200 Hz
Shock response
spectrum I (weight of
sample > 50 kg)
Shock response
spectrum II (weight
of sample 50 kg)
Static pressure
Shock
Static load
NOTE
A shock response spectrum is a graphical representation of an arbitrary transient acceleration input, such
as shock in terms of how the equipment responds to that input.
Static load is the pressure from the upside that the packaged equipment can tolerate when equipment is
stacked in the specified manner.
Issue 01 (2013-12-30)
116
10 Technical Specifications
Climate
Table 10-28 and Table 10-29 list climate requirements.
Table 10-28 Requirements on temperature and humidity during operation
Operating Temperature
Relative Humidity
Long-term operating
temperature: -5C to
+55C
Longterm operating
range: 5% to 85%
Extended operating
temperature: -5C to
+65C
Short-term operating
range: 5% to 95%
NOTE
The temperature and humidity are measured 1.5 m above the floor and 0.4 m ahead of a chassis. Longterm operating indicates that the continuous operating time of the equipment does not exceed 96 hours and
the accumulated annual operating time does not exceed 15 days.
Extended operating indicates that the continuous operating time of the equipment does not exceed 4 hours
per day and the accumulated annual operating time does not exceed 90 days.
To improve equipment reliability, ensure that the equipment room is equipped with a precise air
conditioner, which controls temperature and humidity within the following ranges:
l
Do not install an air conditioner right above equipment, to prevent air blowing directly from the air
conditioner vent into the equipment. Install an air conditioner as far away from a window as possible, to
prevent humid air blowing from the window to the equipment.
Issue 01 (2013-12-30)
Item
Specification
Altitude
-60 m to 4000 m
Atmospheric pressure
0.5C/min
Solar radiation
700 W/m
Heat radiation
600 W/m
Wind speed
5 m/s
117
10 Technical Specifications
NOTE
Between 1800 m and 4000 m of altitude, the equipment operating temperature decreases by 1C for every
increase of 220 m in altitude.
If a cabinet is installed indoors or in a corridor that is free from rain, the cabinet must meet
the requirements of IP31 rating protection. (The first numeral "3" indicates that the cabinet
can prevent a solid object with a diameter equal to or greater than 2.5 mm from entering
the cabinet. The second numeral "1" indicates that vertically falling drops shall have no
harmful effects.)
Ensure that there is no mouse in an equipment room, preventing mouse urine from entering
a cabinet.
Table 10-30 lists the density requirements for mechanically active substances during equipment
operation.
Table 10-30 Density requirements for mechanically active substances during equipment
operation
Mechanically Active
Substance
Content
Suspended dust
0.4 mg/m3
Precipitable dust
15 mg/(m2h)
Sand particles
300 mg/m3
Corrosion Protection
Sites must meet the following anti-corrosion requirements:
l
Sites must be kept away from pollution sources. If pollution sources cannot be avoided,
sites must be located in the perennial upwind direction of the pollution sources, or cabinets
providing sufficient protection must be used.
For sources of heavy pollution such as metal smelting plants and coal mines, keep a
minimum distance of 5 km.
For sources of medium pollution such as chemical factories, rubber factories,
electroplating factories, agricultural fertilizer factories, paper mills, and power plants,
keep a minimum distance of 3.7 km.
For sources of light pollution such as food factories, leather factories, daily necessities
factories, and livestock farms, keep a minimum distance of 2 km.
Equipment rooms must be kept 3.7 km away from the seaside or salt lakes, and must be
kept away from roads or sand fields with dusts flying around. If this requirement cannot
be met, cabinets providing sufficient protection must be used.
Equipment rooms must be isolated from sewer outlets, sewage treatment tanks, and
industrial/heating boilers, to prevent corrosive gases from eroding components and circuit
boards.
Issue 01 (2013-12-30)
118
10 Technical Specifications
Do not install network boxes in underground garages or other garages. If a network box
can be installed only in a garage, install it at a well-ventilated place and avoid car exhausts,
or select a network box providing sufficient protection.
Content
SO2
0.30 mg/m3
H2S
0.10 mg/m3
NH3
1.00 mg/m3
Cl2
0.10 mg/m3
HCl
0.10 mg/m3
HF
0.01 mg/m3
O3
0.05 mg/m3
NOX
0.50 mg/m3
The requirements for relative humidity at equipment's air intake vents are provided as follows:
NOTE
The relative humidity at equipment's air intake vents must be below 80%. If the relative humidity exceeds
80%, the anti-corrosion measures that the equipment provides can only decrease but not eliminate corrosion
risks.
If the humidity control measures that equipment rooms provide cannot keep the relative humidity
in the equipment rooms below 80%, adopt appropriate measures listed in Table 10-32.
Table 10-32 Measures for maintaining the relative humidity at equipment's air intake vents
below 80%
Issue 01 (2013-12-30)
Heat
Dissipati
on
Method
That
Equipme
nt Uses
Heat
Dissipat
ion
Method
That
Cabinet
s Use
Suggestion
Remarks
Natural
dissipatio
n
Natural
dissipatio
n
None
None
119
10 Technical Specifications
Heat
Dissipati
on
Method
That
Equipme
nt Uses
Heat
Dissipat
ion
Method
That
Cabinet
s Use
Suggestion
Remarks
Natural
dissipatio
n
Fan
cooling
None
Natural
dissipatio
n
Using
open
racks
None
Fan
cooling
Natural
dissipatio
n
None
Issue 01 (2013-12-30)
Fan
cooling
120
10 Technical Specifications
Heat
Dissipati
on
Method
That
Equipme
nt Uses
Heat
Dissipat
ion
Method
That
Cabinet
s Use
Suggestion
Remarks
Fan
cooling
Using
open
racks
None
Mechanical Stress
Table 10-33 lists requirements for mechanical stress.
Table 10-33 Requirements for mechanical stress
Item
Sub-item
Specification
Sinusoidal
vibration
Velocity
5 mm/s
Acceleration
2 m/s
Frequency range
5 Hz to 62 Hz
62 Hz to 200 Hz
Shock
NOTE
A shock response spectrum is a graphical representation of an arbitrary transient acceleration input, such
as shock in terms of how the equipment responds to that input.
121
10 Technical Specifications
Climate
Table 10-34 and Table 10-35 list climate requirements.
Table 10-34 Requirements on temperature and humidity during operation
Operating Temperature
Relative Humidity
Long-term operating
temperature: -5C to
+55C
Longterm operating
range: 5% to 85%
Extended operating
temperature: -5C to
+65C
Short-term operating
range: 5% to 95%
NOTE
The temperature and humidity are measured 1.5 m above the floor and 0.4 m ahead of a chassis. Longterm operating indicates that the continuous operating time of the equipment does not exceed 96 hours and
the accumulated annual operating time does not exceed 15 days.
Extended operating indicates that the continuous operating time of the equipment does not exceed 4 hours
per day and the accumulated annual operating time does not exceed 90 days.
To improve equipment reliability, ensure that the equipment room is equipped with a precise air
conditioner, which controls temperature and humidity within the following ranges:
l
Do not install an air conditioner right above equipment, to prevent air blowing directly from the air
conditioner vent into the equipment. Install an air conditioner as far away from a window as possible, to
prevent humid air blowing from the window to the equipment.
Specification
Altitude
-60 m to 4000 m
Atmospheric pressure
0.5C/min
Solar radiation
700 W/m
Heat radiation
600 W/m
Wind speed
5 m/s
NOTE
Between 1800 m and 4000 m of altitude, the equipment operating temperature decreases by 1C for every
increase of 220 m in altitude.
Issue 01 (2013-12-30)
122
10 Technical Specifications
Water Resistance
l
Dust Resistance
For dusty areas, network boxes with air filters are recommended (to improve equipment
reliability) and the network boxes must meet the requirements of IP51 rating protection. (The
first numeral "5" indicates the rating for preventing solid objects from entering network boxes.
That is, ingress of dust is not totally prevented, but dust shall not penetrate in a quantity to
interfere with satisfactory operation of equipment or to impair safety.)
NOTE
For network boxes with air filters, clear the air filters periodically.
Table 10-36 lists the density requirements for mechanically active substances during equipment
operation.
Table 10-36 Density requirements for mechanically active substances during equipment
operation
Issue 01 (2013-12-30)
Mechanically Active
Substance
Content
Suspended dust
0.4 mg/m3
Precipitable dust
15 mg/(m2h)
123
10 Technical Specifications
Mechanically Active
Substance
Content
Sand particles
300 mg/m3
Corrosion Protection
Sites must meet the following anti-corrosion requirements:
l
Sites must be kept away from pollution sources. If pollution sources cannot be avoided,
sites must be located in the perennial upwind direction of the pollution sources, or network
boxes providing sufficient protection must be used.
For sources of heavy pollution such as metal smelting plants and coal mines, keep a
minimum distance of 5 km.
For sources of medium pollution such as chemical factories, rubber factories,
electroplating factories, agricultural fertilizer factories, paper mills, and power plants,
keep a minimum distance of 3.7 km.
For sources of light pollution such as food factories, leather factories, daily necessities
factories, and livestock farms, keep a minimum distance of 2 km.
Installation sites must be kept 3.7 km away from the seaside or salt lakes, and must be kept
away from roads or sand fields with dusts flying around. If this requirement cannot be met,
network boxes providing sufficient protection must be used.
Installation sites must be isolated from sewer outlets, sewage treatment tanks, and
industrial/heating boilers, to prevent corrosive gases from eroding components and circuit
boards.
Do not install network boxes in underground garages or other garages. If a network box
can be installed only in a garage, install it at a well-ventilated place and avoid car exhausts,
or select a network box providing sufficient protection.
Issue 01 (2013-12-30)
Item
Content
SO2
0.30 mg/m3
H2S
0.10 mg/m3
NH3
1.00 mg/m3
Cl2
0.10 mg/m3
HCl
0.10 mg/m3
HF
0.01 mg/m3
O3
0.05 mg/m3
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
124
10 Technical Specifications
Item
Content
NOX
0.50 mg/m3
The requirements for relative humidity at equipment's air intake vents are provided as follows:
NOTE
The relative humidity at equipment's air intake vents must be below 80%. If the relative humidity exceeds
80%, the anti-corrosion measures that the equipment provides can only decrease but not eliminate corrosion
risks.
If the humidity control measures that network boxes provide cannot keep the relative humidity
in the network boxes below 80%, adopt appropriate measures listed in Table 10-38.
Table 10-38 Measures for maintaining the relative humidity at equipment's air intake vents
below 80%
Heat
Dissipati
on
Method
That
Equipme
nt Uses
Heat
Dissipat
ion
Method
That
Networ
k Boxes
Use
Suggestion
Remarks
Natural
dissipatio
n
Natural
dissipatio
n
None
None
Natural
dissipatio
n
Fan
cooling
None
Fan
cooling
Natural
dissipatio
n
None
Issue 01 (2013-12-30)
125
10 Technical Specifications
Heat
Dissipati
on
Method
That
Equipme
nt Uses
Heat
Dissipat
ion
Method
That
Networ
k Boxes
Use
Suggestion
Remarks
Fan
cooling
Fan
cooling
Mechanical Stress
Table 10-39 lists requirements for mechanical stress.
Table 10-39 Requirements for mechanical stress
Item
Sub-item
Specification
Sinusoidal
vibration
Velocity
5 mm/s
Acceleration
2 m/s
Frequency range
5 Hz to 62 Hz
62 Hz to 200 Hz
Shock
NOTE
A shock response spectrum is a graphical representation of an arbitrary transient acceleration input, such
as shock in terms of how the equipment responds to that input.
Issue 01 (2013-12-30)
126
11
The OptiX OSN 500 complies with RoHS directive (2002/95/EC) and WEEE directive (2002/96/
EC).
Energy Saving
The OptiX OSN 500 adopts a variety of technologies to reduce equipment energy.
l
Replaces ordinary chips with ASIC chips that require low power consumption.
Environmental Protection
The equipment is designed according to the requirements of environmental protection. The
equipment complies with RoHS directive.
l
The equipment is amply packaged while materials as conserved. The size of the package
containing the equipment and accessories is at most three times the size of the net
equipment.
The product is also designed for easy unpacking. All hazardous substances contained in
the packaging decompose easily.
Every plastic component that weighs over 25 g is labeled according to the standards of ISO
11469 and ISO 1043-1 to ISO 1043-4.
All components and packages of the equipment are provided with standard labels for
recycling.
Plugs and connectors are easy to find, and the associated operations can be performed by
using simple tools.
Certain types of identifying information, such as silkscreens, are printed on front panels or
subracks.
Issue 01 (2013-12-30)
127
12
12 Standard Compliance
Standard Compliance
Issue 01 (2013-12-30)
128
12 Standard Compliance
Issue 01 (2013-12-30)
Recommendatio
n
Description
ITU-T G.664
ITU-T G.702
ITU-T G.703
ITU-T G.704
ITU-T G.706
ITU-T G.773
ITU-T G.7710
ITU-T G.781
ITU-T G.810
ITU-T G.811
ITU-T G.812
ITU-T G.813
ITU-T G.7043/Y.
1343
ITU-T G.8010
ITU-T G.8011
ITU-T G.8011.1
ITU-T G.8011.2
ITU-T G.8012
ITU-T G.8021
ITU-T G.8110
129
12 Standard Compliance
Recommendatio
n
Description
ITU-T G.8110.1
ITU-T G.8121
ITU-T G.8112
ITU-T G.8131
ITU-T G.8261
ITU-T G.8262
ITU-T G.8264
ITU-T Y.1541
ITU-T Y.1710
ITU-T Y.1730
ITU-T Y.1731
ITU-T G.8032
ITU-T Y.1711
ITU-T Y.1720
ITU-T I.610
ITU-T Y.1291
ITU-T G.8110.1
ITU-T G.8113.1
Issue 01 (2013-12-30)
Standard
Description
RFC 2819
130
Issue 01 (2013-12-30)
12 Standard Compliance
Standard
Description
draft-ietf-l2vpnoam-reqfrmk-05
RFC 4664
RFC 3031
MPLS architecture
RFC 3469
RFC 3811
RFC 3813
RFC 3814
RFC 4115
RFC 4221
RFC 4377
RFC 4378
RFC 3032
RFC 3443
RFC 3916
RFC 3985
RFC 4197
RFC 4385
RFC 4446
RFC 0826
RFC 3270
RFC 4448
RFC 4553
131
Issue 01 (2013-12-30)
12 Standard Compliance
Standard
Description
RFC 5085
RFC 5086
RFC 4717
RFC 4816
RFC 4385
RFC 5254
draft-ietf-pwe3segmentedpw-03
draft-ietf-pwe3ms-pwrequirements-03
draft-ietf-pwe3ms-pw-arch-02
RFC 3644
RFC 2212
RFC 2474
Definition of the differentiated services field (DS Field) in the IPv4 and
IPv6 headers
RFC 2475
RFC 2597
RFC 2698
RFC 3246
RFC 3270
RFC 5586
RFC 5654
RFC 5921
RFC 5860
RFC 1990
132
12 Standard Compliance
Standard
Description
RFC 5317
draft-ietf-mplstp-oam-analysis
An Overview of the OAM Tool Set for MPLS based Transport Networks
STD 0062
Issue 01 (2013-12-30)
Standard
Description
IEEE 802.1D
IEEE 802.1Q
IEEE 802.1ad
IEEE 802.3ah
IEEE 802.1ag
IEEE 802.3
IEEE 802.3u
IEEE 802.3x
IEEE 802.1w
IEEE 802.1AX
IEEE 802.3ad
IEEE 802.3ae
IEEE 802.3z
IEEE 802.1ab
133
12 Standard Compliance
Description
ETSI EN 300
019-1-1
ETSI EN 300
019-1-2
ETSI EN 300
019-1-3
IEC 60068-2
IEC 60721-2-6
IEC 60721-3-1
IEC 60721-3-3
Issue 01 (2013-12-30)
134
12 Standard Compliance
Standard
Description
NEBS GR-63CORE
ROHS
Description
MEF 2
MEF 4
MEF 9
MEF 10
MEF 14
Issue 01 (2013-12-30)
Safety Standard
Description
EN 60950-1
IEC 60950-1
IEC 60825-1
IEC 60825-2
EN 60950
IEC 60950
CAN/CSA-C22.2 No 1M94
135
12 Standard Compliance
Safety Standard
Description
CAN/CSA-C22.2 No
950-95
73/23/EEC
2006/95/EC
UL60950-1
IEC 60529
GR-1089-CORE
EG 201 212
ITU-T G.644
Description
IEC 61000-4-2
EN 61000-4-2
IEC 61000-4-3
EN 61000-4-3
IEC 61000-4-4
EN 61000-4-4
IEC 61000-4-5
EN 61000-4-5
IEC 61000-4-6
EN 61000-4-6
IEC 61000-4-29
EN 61000-4-29
CISPR 22/EN 55022
Issue 01 (2013-12-30)
136
12 Standard Compliance
Standard
Description
ETSI EN 300386
ETSI EN 201468
ETSI EN 300127
ETSI EN 300132-2
Issue 01 (2013-12-30)
Standard
Description
IEC 61024-1
IEC 61312-1
IEC 61000-4-5
ITU-T K.11
ITU-T K.20
ITU-T K.27
ITU-T K.41
137
A Glossary
Glossary
Numerics
1+1 backup
A backup method in which two components mirror each other. If the active component
goes down, the standby component takes over services from the active component to
ensure that the system service is not interrupted.
1:N protection
An architecture that has N normal service signals, N working SNCs/trails, and one
protection SNC/trail. It may have one extra service signal.
3G
3R
A
A/D
analog/digit
AAA
AAL
AAL2
AAL5
ABR
ACAP
ACH
ACL
ACL rule
ADM
add/drop multiplexer
AF
Issue 01 (2013-12-30)
138
A Glossary
AGC
AIO
asynchronous input/output
AIS
AIS insertion
Insertion of AIS in a channel with excessive errors to indicate that it is unavailable. For
a line board, it can be set whether to insert AIS when there are excessive errors in the
B1, B2 and B3 bytes. For tributary board at the E1/T1 level, it can be set whether to
insert AIS when there are excessive errors in BIP-2. For tributary board at the E3 level
or higher, it can be set whether to insert AIS when there are excessive errors in the B3
byte.
ALS
AM
AMI
ANSI
APD
APID
APS
A protection architecture that comprises one protection facility and one working facility
and performs switchover by using the Automatic Protection Switching (APS) protocol.
Normally, signals are sent only over the working facility. If an APS switchover event is
detected by the working facility, services are switched over to the protection facility.
ARP
AS
ASCII
ASK
ATM
ATM Adaptation
Layer (AAL)
ATM protection group Logically bound ATM VP network/subnetwork connections that share the same physical
transmission channel. In the VP Group (VPG), a pair of VP connections (working
connection and its protective connection) is used for monitoring the automatic protection
switching, called monitoring connections (APS VPCs). If the monitoring connections
switch over, the whole VPG will switch over to quicken the ATM protection switching
(as quick as the protection switching of the SDH layer).
ATPC
AU
AUG
AWG
Issue 01 (2013-12-30)
139
A Glossary
Address Resolution
Protocol (ARP)
An Internet Protocol used to map IP addresses to MAC addresses. The ARP protocol
enables hosts and routers to determine link layer addresses through ARP requests and
responses. The address resolution is a process by which the host converts the target IP
address into a target MAC address before transmitting a frame. The basic function of
ARP is to use the target equipment's IP address to query its MAC address.
American National
Standards Institute
(ANSI)
An organization that defines U.S standards for the information processing industry.
Authentication,
Authorization and
Accounting (AAA)
access
A link between the customer and the telecommunication network. Many technologies,
such as the copper wire, optical fiber, mobile, microwave and satellite, are used for
access.
A list of entities, together with their access rights, which are authorized to access a
resource.
access layer
A layer that connects the end users (or last mile) to the ISP network. The access layer
devices are cost-effective and have high-density interfaces. In an actual network, the
access layer includes the devices and cables between the access points and the UPEs.
access point
Any entity that has station functionality and provides access to the distribution services,
via the wireless medium (WM) for associated stations.
accumulation
The sum of the service usage, consumption, and recharge fees of a subscriber.
active link
A link in the link aggregation group, which is connected to the active interface.
active mode
A working mode of EFM OAM. The discovery and remote loopback can only be initiated
by the interface in the active mode.
adaptive modulation
(AM)
A technology that is used to automatically adjust the modulation mode according to the
channel quality. When the channel quality is favorable, the equipment uses a highefficiency modulation mode to improve the transmission efficiency and the spectrum
utilization of the system. When the channel quality is degraded, the equipment uses the
low-efficiency modulation mode to improve the anti-interference capability of the link
that carries high-priority services.
adjacency
A portion of the local routing information which pertains to the reachability of a single
neighbor ES or IS over a single circuit. Adjacencies are used as input to the Decision
Process for forming paths through the routing domain. A separate adjacency is created
for each neighbor on a circuit, and for each level of routing (i.e. level 1 and level 2) on
a broadcast circuit.
adjacent channel
alternate polarization
(ACAP)
adjacent concatenation A situation where the virtual containers (VC) to carry concatenated services in SDH are
consecutive in terms of their service in the frame structures, so that they use the same
path overhead (POH).
Issue 01 (2013-12-30)
140
A Glossary
administrative unit
(AU)
The information structure that enables adaptation between the higher order path layer
and the multiplex section layer. The administrative unit consists of an information
payload (the higher order VC) and an AU pointer, which indicates the offset of the
payload frame start relative to the multiplex section frame start.
administrative unit
group (AUG)
One or more administrative units occupying fixed, defined positions in an STM payload.
An AUG consists of AU-4s.
advanced ACL
An ACL that defines ACL rules based on the source addresses, target addresses, protocol
type, such as TCP source or target port, the type of the ICMP protocol, and message
codes.
aggregated link
aging time
air interface
The interface between the cellular phone set or wireless modem (usually portable or
mobile) and the active base station.
alarm
alarm box
A device that reflects the status of an alarm in visual-audio mode. The alarm box notifies
you of the alarm generation and alarm severity after it is connected to the Signaling
Network Manager server or client and the related parameters are set.
alarm cascading
alarm correlation
analysis
A process to analyze correlated alarms. For example, if alarm 2 is generated within five
seconds after alarm 1 is generated, and it complies with the conditions defined in the
alarm correlation analysis rule, you can either mask the alarm or raise the level of alarm
2 according to the behavior defined in the alarm correlation rule.
alarm filtering
An alarm management method. Alarms are detected and reported to the NMS system,
and whether the alarm information is displayed and saved is decided by the alarm filtering
status. An alarm with the filtering status set to "Filter" is not displayed and saved on the
NMS, but is monitored on the NE.
alarm indication
A mechanism to indicate the alarm status of equipment. On the cabinet of an NE, four
differently-colored indicators specify the current status of the NE. When the green
indicator is on, the NE is powered on. When the red indicator is on, a critical alarm has
been generated. When the orange indicator is on, a major alarm has been generated.
When the yellow indicator is on, a minor alarm has been generated. The ALM alarm
indicator on the front panel of a board indicates the current status of the board.
A mode for an NE that indicates whether the port is automatically restored to the normal
status after the service is accessed or the fault is removed. There are three alarm inversion
modes: normal, revertible and non-revertible.
alarm notification
When an error occurs, the performance measurement system sends performance alarms
to the destination (for example, a file and/or fault management system) designated by
users.
alarm suppression
A method to suppress alarms for the alarm management purpose. Alarms that are
suppressed are no longer reported from NEs.
alternate mark
inversion (AMI)
A synchronous clock encoding technique which uses bipolar pulses to represent logical
1 values.
Issue 01 (2013-12-30)
141
A Glossary
analog signal
assured forwarding
(AF)
One of the four per-hop behaviors (PHB) defined by the Diff-Serv workgroup of IETF.
It is suitable for certain key data services that require assured bandwidth and short delay.
For traffic within the bandwidth limit, AF assures quality in forwarding. For traffic that
exceeds the bandwidth limit, AF degrades the service class and continues to forward the
traffic instead of discarding the packets.
attack
An attempt to bypass security controls in a system with the mission of using that system
or compromising it. An attack is usually accomplished by exploiting a current
vulnerability.
attenuation
attenuator
A device used to increase the attenuation of an Optical Fiber Link. Generally used to
ensure that the signal at the receive end is not too strong.
automatic laser
shutdown (ALS)
automatic transmit
A method of adjusting the transmit power based on fading of the transmit signal detected
power control (ATPC) at the receiver
autonomous system
(AS)
A network set that uses the same routing policy and is managed by the same technology
administration department. Each AS has a unique identifier that is an integer ranging
from 1 to 65535. The identifier is assigned by IANA. An AS can be divided into areas.
availability
A capability of providing services at any time. The probability of this capability is called
availability.
available bit rate (ABR) A kind of service categories defined by the ATM forum. ABR only provides possible
forwarding service and applies to the connections that does not require the real-time
quality. It does not provide any guarantee in terms of cell loss or delay.
avalanche photodiode
(APD)
average delay
A performance indicator indicating the average RTT of multiple ping operations or other
probe operations. It is expressed in milliseconds.
B
B-ISDN
BA
booster amplifier
BBE
BC
boundary clock
BCD
Issue 01 (2013-12-30)
142
A Glossary
BDI
BDI packet
A packet used to notify the upstream LSR of the failure event which has occurred on the
downstream LSR through the reverse LSP. The BDI packet can be used in the 1:1/N
protective switchover service.
BE
BER
BFD
BGP
BIP
BIP-8
BIP-X
BITS
BMC
BNC
See bayonet-neill-concelman.
BOM
bill of materials
BPDU
BPS
BSC
BSS
BTS
BWS
Bidirectional
Forwarding Detection
(BFD)
A fast and independent hello protocol that delivers millisecond-level link failure
detection and provides carrier-class availability. After sessions are established between
neighboring systems, the systems can periodically send BFD packets to each other. If
one system fails to receive a BFD packet within the negotiated period, the system regards
that the bidirectional link fails and instructs the upper layer protocol to take actions to
recover the faulty link.
backbone network
A network that forms the central interconnection for a connected network. The
communication backbone for a country is WAN. The backbone network is an important
architectural element for building enterprise networks. It provides a path for the exchange
of information between different LANs or subnetworks. A backbone can tie together
diverse networks in the same building, in different buildings in a campus environment,
or over wide areas. Generally, the backbone network's capacity is greater than the
networks connected to it.
backplane
An electronic circuit board containing circuits and sockets into which additional
electronic devices on other circuit boards or cards can be plugged.
backup
Issue 01 (2013-12-30)
143
A Glossary
backward defect
indication (BDI)
A function that the sink node of a LSP, when detecting a defect, uses to inform the
upstream end of the LSP of a downstream defect along the return path.
bandwidth
An area of radio coverage consisting of cells served by one or more Base Transceiver
Stations (BTSs) in the same base station site.
A logical entity that connects the BTS with the MSC in a GSM/CDMA network. It
interworks with the BTS through the Abis interface, the MSC through the A interface.
It provides the following functions: radio resource management, base station
management, power control, handover control, and traffic measurement. One BSC
controls and manages one or more BTSs in an actual network.
baseband
A form of modulation in which the information is applied directly onto the physical
transmission medium.
bayonet-neillconcelman (BNC)
bearer
An information transmission path with defined capacity, delay and bit error rate.
bearer network
A traditional IP packet transport service. In this service, the diagrams are forwarded
following the sequence of the time they reach. All diagrams share the bandwidth of the
network and routers. The amount of resource that a diagram can use depends of the time
it reaches. BE service does not ensure any improvement in delay time, jitter, packet loss
ratio, and high reliability.
best-effort service
A unitary and simple service model. Without being approved, but after notifying the
network, the application can send any number of packets at any time. The network tries
its best to send the packets, but delay and reliability cannot be ensured. Best-Effort is
the default service model of the Internet. It can be applied to various networks, such as
FTP and E-Mail. It is implemented through the First In First-Out (FIFO) queue.
bit error
A method of error monitoring. With even parity, the transmitting equipment generates
an X-bit code over a specified portion of the signal in such a manner that the first bit of
the code provides even parity over the first bit of all X-bit sequences in the covered
portion of the signal, the second bit provides even parity over the second bit of all X-bit
sequences within the specified portion, and so forth. Even parity is generated by setting
the BIP-X bits so that an even number of 1s exist in each monitored partition of the
signal. A monitored partition comprises all bits in the same bit position within the X-bit
sequences in the covered portion of the signal. The covered portion includes the BIP-X.
bit interleaved parity-8 Consists of a parity byte calculated bit-wise across a large number of bytes in a
(BIP-8)
transmission transport frame. Divide a frame is into several blocks with 8 bits (one byte)
in a parity unit and then arrange the blocks in matrix. Compute the number of "1" or "0"
over each column. Then fill a 1 in the corresponding bit for the result if the number is
odd, otherwise fill a 0.
Issue 01 (2013-12-30)
144
A Glossary
blacklist
A method of filtering packets based on their source IP addresses. Compared with ACL,
the match condition for the black list is much simpler. Therefore, the black list can filter
packets at a higher speed and can effectively screen the packet sent from the specific IP
address.
bound path
A parallel path with several serial paths bundled together. It improves the data throughput
capacity.
bridge
A device that connects two or more networks and forwards packets among them. Bridges
operate at the physical network level. Bridges differ from repeaters because bridges store
and forward complete packets, while repeaters forward all electrical signals. Bridges
differ from routers because bridges use physical addresses, while routers use IP
addresses.
Data messages exchanged across switches within an extended LAN that uses a spanning
tree protocol (STP) topology. BPDU packets contain information on ports, addresses,
priorities, and costs, and they ensure that the data reaches its intended destination. BPDU
messages are exchanged across bridges to detect loops in a network topology. These
loops are then removed by shutting down selected bridge interfaces and placing
redundant switch ports in a backup, or blocked, state.
bridging
The act of simultaneously transmitting identical traffic on the working and protection
channels.
broadband integrated A standard defined by the ITU-T to handle high-bandwidth applications, such as voice.
services digital network It currently uses the ATM technology to transmit data over SONNET-based circuits at
(B-ISDN)
155 to 622 Mbit/s or higher speed.
broadcast
broadcast address
A network address in computer networking that allows information to be sent to all nodes
on a network, rather than to a specific network host.
broadcast domain
A group of network stations that receives broadcast packets originating from any device
within the group. The broadcast domain also refers to the set of ports between which a
device forwards a multicast, broadcast, or unknown destination frame.
building integrated
timing supply (BITS)
In the situation of multiple synchronous nodes or communication devices, one can use
a device to set up a clock system on the hinge of telecom network to connect the
synchronous network as a whole, and provide satisfactory synchronous base signals to
the building integrated device. This device is called BITS.
built-in WDM
A function which integrates some simple WDM systems into products that belong to the
OSN series. That is, the OSN products can add or drop several wavelengths directly.
burst
A process of forming data into a block of the proper size, uninterruptedly sending the
block in a fast operation, waiting for a long time, and preparing for the next fast sending.
C
CAC
CAR
Issue 01 (2013-12-30)
145
A Glossary
CAS multiframe
A multiframe set up based on timeslot 16. Each CAS multiframe contains 16 E1 PCM
frames. Among the 8 bits of timeslot 16 in the first frame, the first 4 bits are used for
multiframe synchronization. The multiframe alignment signal (MFAS) for
synchronization is 0000. The last 4 bits are used as the not multiframe alignment signal
(NMFAS). The NMFAS is XYXX. For the other 15 frames, timeslot 16 is used to
transmit exchange and multiplexing (E&M) signaling corresponding to each timeslot.
CBR
CBS
CC
CCDP
CCS
CDVT
CE
CES
CFM
CFR
CIR
CIST
CLEI
CLK
clock card
CLNP
CLP
CMI
CO
central office
CPU
CR
connection request
CRC
CRC-4 multiframe
A multiframe recommended by ITU-T G.704 and set up based on the first bit of timeslot
0. The CRC-4 multiframe is different from the CAS multiframe in principle and
implementation. Each CRC-4 multiframe contains 16 PCM frames. Each CRC-4
multiframe consists of two CRC-4 sub-multiframes. Each CRC-4 sub-multiframe is a
CRC-4 check block that contains 2048 (256 x 8) bits. Bits C1 to C4 of a check block can
check the previous check block.
CSA
CSES
CSF
CSMA/CD
CST
Issue 01 (2013-12-30)
146
A Glossary
CTC
CV
connectivity verification
CV packet
A type of packet that is generated at the frequency of 1/s on the source end LSR of an
LSP, and is terminated on the destination end LSR of the LSP. A CV packet is transmitted
from the source end LSR to the destination LSR along the LSP. A CV packet contains
the unique identifier (TTSI) of the LSP so that all types of abnormalities on the path can
be detected.
CW
control word
CWDM
Common Channel
Signaling (CCS)
A signaling system used in telephone networks that separates signaling information from
user data. A specified channel is exclusively designated to carry signaling information
for all other channels in the system.
Common and Internal The single spanning tree jointly calculated by STP and RSTP, the logical connectivity
Spanning Tree (CIST) using MST bridges and regions, and MSTP. The CIST ensures that all LANs in the
bridged local area network are simply and fully connected.
cabinet
carrier
An organization that has telecom network resources and can provide communications
service.
A transmitting data station that detects another signal while transmitting a frame,
stops transmitting that frame, transmits a jam signal, and then waits for a random
time interval before trying to send that frame again.
cell loss priority (CLP) A field in the ATM cell header that determines the probability of a cell being dropped
if the network becomes congested. Cells with CLP = 0 are insured traffic, which is
unlikely to be dropped. Cells with CLP = 1 are best-effort traffic, which might be
dropped.
central processing unit The computational and control unit of a computer. The CPU is the device that interprets
(CPU)
and executes instructions. The CPU has the ability to fetch, decode, and execute
instructions and to transfer information to and from other resources over the computer's
main data-transfer path, the bus.
centralized alarm
Issue 01 (2013-12-30)
The alarms of all the hosts connecting to the Operation and Maintenance Unit (OMU).
147
A Glossary
channel
channel spacing
check criteria
A set of rules for checking and analyzing device echo information. The check criteria
for an alarm collection item need to be set through the configuration file.
circuit emulation
service (CES)
A function with which the E1/T1 data can be transmitted through ATM networks. At the
transmission end, the interface module packs timeslot data into ATM cells. These ATM
cells are sent to the reception end through the ATM network. At the reception end, the
interface module re-assigns the data in these ATM cells to E1/T1 timeslots. The CES
technology guarantees that the data in E1/T1 timeslots can be recovered to the original
sequence at the reception end.
clock selection
An algorithm used for selecting the best clock for clock synchronization. For different
peers (multiple servers or peers configured for a client), a peer sends clock
synchronization packets to each server or passive peer. After receiving the response
packets, it uses the clock selection algorithm to select the best clock.
clock source
clock synchronization
A process of synchronizing clocks, in which the signal frequency traces the reference
frequency, but the start points do not need to be consistent. This process is (also known
as frequency synchronization).
clock tracing
The method of keeping the time on each node synchronized with a clock source in the
network.
co-channel dual
polarization (CCDP)
A channel configuration method, which uses a horizontal polarization wave and a vertical
polarization wave to transmit two signals. The Co-Channel Dual Polarization has twice
the transmission capacity of the single polarization.
coarse wavelength
division multiplexing
(CWDM)
collision
A condition in which two packets are being transmitted over a medium at the same time.
Their interference makes both unintelligible.
A parameter used to define the capacity of token bucket C, that is, the maximum burst
IP packet size when information is transferred at the committed information rate. This
parameter must be greater than 0 but should be not less than the maximum length of an
IP packet to be forwarded.
common spanning tree A single spanning tree that connects all the MST regions in a network. Every MST region
(CST)
is considered as a switch; therefore, the CST can be considered as their spanning tree
generated with STP/RSTP.
composite service
conference
An IP multimedia session that have two or more participants. Each conference has a
focus and can be identified uniquely.
Issue 01 (2013-12-30)
148
A Glossary
congestion
congestion
management
A flow control measure to solve the problem of network resource competition. When
the network congestion occurs, it places packets into the queue for buffer and determines
the packet forwarding order.
connection
connection admission
control (CAC)
A control process in which the network takes actions in the call set-up phase (or call renegotiation phase) to determine which connection request is admitted.
connection point
A reference point where the output of a trail termination source or a connection is bound
to the input of another connection, or where the output of a connection is bound to the
input of a trail termination sink or another connection. The connection point is
characterized by the information which passes across it. A bidirectional connection point
is formed by the association of a contradirectional pair.
connectionless
Pertaining to a method of data presentation. The data has a complete destination address
and is delivered by the network on a best-effort basis, independent of other data being
exchanged between the same pair of users.
constant bit rate (CBR) A kind of service categories defined by the ATM forum. CBR transfers cells based on
the constant bandwidth. It is applicable to service connections that depend on precise
clocking to ensure undistorted transmission.
container
control VLAN
control channel
The channel used to transmit digital control information from the base station to a cell
phone or vice-versa.
convergence layer
A "bridge" between the access layer and the core layer. The convergence layer provides
the convergence and forwarding functions for the access layer. It processes all the traffic
from the access layer devices, and provides the uplinks to the core layer. Compared with
the access layer, the convergence layer devices should have higher performance, fewer
interfaces and higher switching rate. In the real network, the convergence layer refers to
the network between UPEs and PE-AGGs.
cooling system
The system that controls or influences climate by decreasing the air temperature only.
core layer
A layer that functions as the backbone of high speed switching for networks and provides
high speed forwarding communications. It has a backbone transmission structure that
provides high reliability, high throughput, and low delay. The core layer devices must
have a good redundancy, error tolerance, manageability, adaptability, and they support
dual-system hot backup or load balancing technologies. In a real network, the core layer
includes the IP/MPLS backbone network consisting of NPEs and backbone routers.
Issue 01 (2013-12-30)
149
A Glossary
correlation
corruption
The alteration of the information in IMS networks for the purpose of deception. For
example, attackers corrupt the correct charging information to evade being charged.
cross-connection
The connection of channels between the tributary board and the line board, or between
line boards inside the NE. Network services are realized through the cross-connections
of NEs.
crossover cable
A twisted pair patch cable wired in such a way as to route the transmit signals from one
piece of equipment to the receive signals of another piece of equipment, and vice versa.
crystal oscillator
A part of the BGP/MPLS IP VPN model that provides interfaces for directly connecting
to the Service Provider (SP) network. A CE can be a router, switch, or host.
cutover
To migrate the data of an application system to another application system, which then
provides services.
cyclic redundancy
check (CRC)
A procedure used to check for errors in data transmission. CRC error checking uses a
complex calculation to generate a number based on the data transmitted. The sending
device performs the calculation before performing the transmission and includes the
generated number in the packet it sends to the receiving device. The receiving device
then repeats the same calculation. If both devices obtain the same result, the transmission
is considered to be error free. This procedure is known as a redundancy check because
each transmission includes not only data but extra (redundant) error-checking values.
D
D/A
digital-analog converter
DB
database
DC
direct current
DC-C
DC-I
DC-return common
(with ground) (DC-C)
A power system, in which the BGND of the DC return conductor is short-circuited with
the PGND on the output side of the power supply cabinet and also on the line between
the output of the power supply cabinet and the electric equipment.
DC-return isolate (with A power system, in which the BGND of the DC return conductor is short-circuited with
ground) (DC-I)
the PGND on the output side of the power supply cabinet and is isolated from the PGND
on the line between the output of the power supply cabinet and the electric equipment.
DCC
DCE
DCF
DCM
DCN
DDF
Issue 01 (2013-12-30)
150
A Glossary
DDN
DHCP
DLAG
DM
DNI
DRDB
DS interior node
DS node
A DS-compliant node, which is subdivided into DS boundary node and ID interior node.
DSCP
DSL
DSLAM
DSP
DTE
DTR
DVB
DVB-ASI
DVMRP
DWDM
Distance Vector
Multicast Routing
Protocol (DVMRP)
An Internet gateway protocol based primarily on the RIP. The DVMRP protocol
implements a typical dense mode IP multicast solution and uses IGMP to exchange
routing datagrams with its neighbors.
Dynamic Host
A client-server networking protocol. A DHCP server provides configuration parameters
Configuration Protocol specific to the DHCP client host requesting information the host requires to participate
(DHCP)
on the Internet network. DHCP also provides a mechanism for allocating IP addresses
to hosts.
data backup
A method of copying key data to the backup storage area to prevent data loss in case the
original storage area is damaged or a failure occurs.
data circuitThe equipment that provides the signal conversion and coding between the data terminal
terminating equipment equipment (DTE) and the line. A DCE is located at a data station. The DCE may be
(DCE)
separate equipment, or an integral part of the DTE or intermediate equipment. The DCE
may perform other functions that are normally performed at the network end of the line.
data communication
network (DCN)
data communications
channel (DCC)
The data channel that uses the D1-D12 bytes in the overhead of an STM-N signal to
transmit information on the operation, management, maintenance, and provisioning
(OAM&P) between NEs. The DCC channel composed of bytes D1-D3 is referred to as
the 192 kbit/s DCC-R channel. The other DCC channel composed of bytes D4-D12 is
referred to as the 576 kbit/s DCC-M channel.
Issue 01 (2013-12-30)
151
A Glossary
data flow
A process that involves processing the data extracted from the source system, such as
filtering, integration, calculation, and summary, finding and solving data inconsistency,
and deleting invalid data so that the processed data meets the requirements of the
destination system for the input data.
data mapping
An algorithm that is used to convert the data between heterogeneous data models.
data restoration
data terminal
equipment (DTE)
A user device composing the UNI. The DTE accesses the data network through the DCE
equipment (for example, a modem) and usually uses the clock signals produced by DCE.
datagram
A kind of protocol data unit (PDU) which is used in Connectionless Network Protocol
(CLNP), such as IP datagram, UDP datagram.
defect
delay measurement
(DM)
The time elapsed since the start of transmission of the first bit of the frame by a source
node until the reception of the last bit of the loopbacked frame by the same source node,
when the loopback is performed at the frame's destination node.
demodulation
In communications, the means by which a modem converts data from modulated carrier
frequencies (waves that have been modified in such a way that variations in amplitude
and frequency represent meaningful information) over a telephone line. Data is converted
to the digital form needed by a computer to which the modem is attached, with as little
distortion as possible.
dense wavelength
division multiplexing
(DWDM)
The technology that utilizes the characteristics of broad bandwidth and low attenuation
of single mode optical fiber, employs multiple wavelengths with specific frequency
spacing as carriers, and allows multiple channels to transmit simultaneously in the same
fiber.
designated port
A port defined in the STP protocol. On each switch that runs the STP protocol, the traffic
from the root bridge is forwarded to the designated port. The subnet connected to the
STP switch receives the data traffic from the root bridge. All the ports on the root bridge
are designated ports. On each subnet, there is only one designated port. When a network
topology is stable, only the root port and the designated port forward traffic. Other nondesignated ports are in the blocking state, and they receive STP packets, but does not
forward user traffic.
destruction
A process during which the information and resources in a network are changed
unexpectedly and the meanings of the information and resources are deleted or changed.
A data transmission network that is designed to transmit data on digital channels (such
as the fiber channel, digital microwave channel, or satellite channel).
digital modulation
A method that controls the changes in amplitude, phase, and frequency of the carrier
based on the changes in the baseband digital signal. In this manner, the information can
be transmitted by the carrier.
digital network
Issue 01 (2013-12-30)
152
A Glossary
digital signal
A technology for providing digital connections over the copper wire or the local
telephone network. DSL performs data communication over the POTS lines without
affecting the POTS service.
A network device, usually situated in the main office of a telephone company, that
receives signals from multiple customer Digital Subscriber Line (DSL) connections and
uses multiplexing techniques to put these signals on a high-speed backbone line.
dispersion
dispersion
compensation module
(DCM)
A type of module that contains dispersion compensation fibers to compensate for the
dispersion of the transmitting fiber.
distributed link
aggregation group
(DLAG)
A board-level port protection technology that detects unidirectional fiber cuts and
negotiates with the opposite port. In the case of a link down failure on a port or hardware
failure on a board, services are automatically switched to the slave board, thereby
achieving 1+1 protection for the inter-board ports.
domain
A logical subscriber group based on which the subscriber rights are controlled.
dotted decimal notation A format of IP address. IP addresses in this format are separated into four parts by a dot
"." with each part is in the decimal numeral.
download
downstream
In an access network, the direction of transmission toward the subscriber end of the link.
dual-ended switching
dual-polarized antenna An antenna intended to simultaneously radiate or receive two independent radio waves
orthogonally polarized.
E
E-Aggr
E-LAN
E-Line
EA
encryption algorithm
EBS
ECC
EDFA
Issue 01 (2013-12-30)
153
A Glossary
EEPROM
EF
EFCI
EFM
EFM OAM
EIA
EIR
EMC
EMI
EMS
EPD
EPL
EPLAN
ERPS
ESC
ESCON
ESD
electrostatic discharge
ESN
ETS
ETSI
EVC
EVPL
EVPLAN
EXP
Electronic Industries
Alliance (EIA)
EoD
Ethernet
A LAN technology that uses the carrier sense multiple access with collision detection
(CSMA/CD) media access control method. The Ethernet network is highly reliable and
easy to maintain. The speed of an Ethernet interface can be 10 Mbit/s, 100 Mbit/s, 1000
Mbit/s, or 10,000 Mbit/s.
Ethernet aggregation
(E-Aggr)
Issue 01 (2013-12-30)
154
A Glossary
A type of boards. EoD boards bridge the PSN and TDM networks, enabling Ethernet
service transmission across PSN and TDM networks.
A type of Ethernet service provided by SDH, PDH, ATM, or MPLS server layer
networks. This service is carried over dedicated bandwidth between multipoint-tomultipoint connections.
A type of Ethernet service provided by SDH, PDH, ATM, or MPLS server layer
networks. This service is carried over dedicated bandwidth between point-to-point
connections.
Ethernet virtual
private LAN service
(EVPLAN)
A type of Ethernet service provided by SDH, PDH, ATM, or MPLS server layer
networks. This service is carried over shared bandwidth between multipoint-tomultipoint connections.
Ethernet virtual
private line (EVPL)
A type of Ethernet service provided by SDH, PDH, ATM, or MPLS server layer
networks. This service is carried over shared bandwidth between point-to-point
connections.
European
Telecommunications
Standards Institute
(ETSI)
A standards-setting body in Europe. Also the standards body responsible for GSM.
eSFP
egress
The egress LER. The group is transferred along the LSP consisting of a series of LSRs
after the group is labeled.
electric supervisory
channel (ESC)
A technology that implements communication among all the nodes and transmission of
monitoring data in an optical transmission network. The monitoring data of ESC is
introduced into DCC service overhead and is transmitted with service signals.
electrically erasable
A type of EPROM that can be erased with an electrical signal. It is useful for stable
programable read-only storage for long periods without electricity while still allowing reprograming. EEPROMs
memory (EEPROM)
contain less memory than RAM, take longer to reprogram, and can be reprogramed only
a limited number of times before wearing out.
electromagnetic
compatibility (EMC)
electromagnetic
interference (EMI)
embedded control
channel (ECC)
A logical channel that uses a data communications channel (DCC) as its physical layer
to enable the transmission of operation, administration, and maintenance (OAM)
information between NEs.
emergency
maintenance
A type of measure taken to quickly rectify an emergency fault to recover the proper
running of the related system or device and to reduce losses.
Issue 01 (2013-12-30)
155
A Glossary
encapsulation
engineering label
enterprise system
connection (ESCON)
A path protocol that connects the host to various control units in a storage system.
Enterprise system connection is a serial bit stream transmission protocol that operates a
rate of 200 Mbit/s.
entity
A part, device, subsystem, functional unit, equipment, or system that can be considered
individually.
equalization
equipment serial
number (ESN)
A string of characters that identify a piece of equipment and ensures correct allocation
of a license file to the specified equipment. It is also called "equipment fingerprint".
erbium-doped fiber
amplifier (EDFA)
An optical device that amplifies optical signals. This device uses a short optical fiber
doped with the rare-earth element, Erbium. The signal to be amplified and a pump laser
are multiplexed into the doped fiber, and the signal is amplified by interacting with
doping ions. When the amplifier passes an external light source pump, it amplifies the
optical signals in a specific wavelength range.
error tolerance
The ability of a system or component to continue normal operation despite the presence
of erroneous inputs.
event
An event indicates the information record of the status change between the system and
the managed object, including the threshold alarm of the system and the alarm reported
by the managed object.
excess burst size (EBS) A parameter related to traffic. In the single rate three color marker (srTCM) mode, traffic
control is achieved by token buckets C and E. The excess burst size parameter defines
the capacity of token bucket E, that is, the maximum burst IP packet size when the
information is transferred at the committed information rate. This parameter must be
greater than 0 but should be not less than the maximum length of an IP packet to be
forwarded.
excess information rate The bandwidth for excessive or burst traffic above the CIR; it equals the result of the
(EIR)
actual transmission rate without the safety rate.
exercise switching
An operation to check whether the protection switching protocol functions properly. The
protection switching is not really performed.
expedited forwarding
(EF)
The highest order QoS in the Diff-Serv network. EF PHB is suitable for services that
demand low packet loss ratio, short delay, and broad bandwidth. In all the cases, EF
traffic can guarantee a transmission rate equal to or faster than the set rate. The DSCP
value of EF PHB is "101110".
experimental bits
(EXP)
A field in the MPLS packet header, three bits long. This field is always used to identify
the CoS of the MPLS packet.
Issue 01 (2013-12-30)
156
A Glossary
extended ID
The number of the subnet to which an NE belongs, used to identify different network
segments in a wide area network (WAN). Together, the ID and extended ID form the
physical ID of the NE.
external links
The links between the current Web site and other Web sites. Generally, external links
refer to links from other Web sites to the current Web site.
extract
To read the data required by the destination system from the source system.
F
F1 byte
The user path byte, which belongs to the family of regenerator section overhead bytes.
F1 bytes are reserved for network providers, who use them primarily as a temporary data
or voice channel to transmit maintenance information.
FC
FDB
flash database
FDD
FDDI
FDI
FDI packet
FDV
FE port
FEC
FFD
FFD packet
A path failure detection method independent from CV. Different from a CV packet, the
frequency for generating FFD packets is configurable to satisfy different service
requirements. By default, the frequency is 20/s. An FFD packet contains information the
same as that in a CV packet. The destination end LSR processes FFD packets in the same
way for processing CV packets.
FICON
FIFO
FLR
FPGA
FPS
FQ
FR
FRU
FTN
FEC to NHLFE
FTP
Fiber Connect
(FICON)
A new generation connection protocol that connects the host to various control units. It
carries a single byte command protocol through the physical path of fiber channel, and
provides a higher transmission rate and better performance than ESCON.
Issue 01 (2013-12-30)
157
A Glossary
fairness
A feature in which for any link specified in a ring network, the source node is provided
with certain bandwidth capacities if the data packets transmitted by the source node are
constrained by the fairness algorithm.
fast protection
switching (FPS)
A type of pseudo wire automatic protection switching (PW APS). When the working
PW is faulty, the source transmits services to the protection PW and the sink receives
the services from the protection PW. FPS generally works with the interworking function
(IWF) to provide end-to-end protection for services.
fault
A failure to operate correctly. A fault does not include failures caused by preventative
maintenance, insufficient external resources, or intentional settings.
fault alarm
A type of alarm caused by hardware and/or software faults, for example, board failure,
or by the exception that occurs in major functions. After handling, a fault alarm can be
cleared, upon which the NE reports a recovery alarm. Fault alarms are of higher severity
than event alarms.
fault detection
fault notification
A process wherein a fault is notified. For example, when a fault occurs on the local
interface, the local interface notifies the peer of the fault through OAMPDUs. The local
interface then records the fault in the log, and reports it to the NMS.
feeder
A standard developed by the American National Standards Institute (ANSI) for highspeed fiber-optic LANs. FDDI provides specifications for transmission rates of 100
megabits per second on token ring networks.
fiber trough
field programmable
gate array (FPGA)
firewall
fixed bandwidth
The bandwidth that is fully reserved and is allocated periodically in a GPON system to
ensure the quality of cell transmission. If a T-CONT is provided with a fixed bandwidth
and does not transmit cells, the OLT can still allocate/assign the fixed bandwidth.
Therefore, idle cells are transmitted to the upstream OLT from the ONU/ONT.
Issue 01 (2013-12-30)
158
A Glossary
flash memory
flooding
A type of incident, such as insertion of a large volume of data, that results in denial of
service.
flow
The same type of services of a user is considered one service flow. HQoS performs queue
scheduling according to the services of each user. The service flows of each user are
classified into four FQs, namely, CS, EF, AF, and BE. CS is assigned a traffic shaping
percentage for Priority Queuing (PQ); EF, AF, and BE are assigned weights for Weighted
Fair Queuing (WFQ). The preceding two scheduling modes occupy a certain bandwidth
each; they can act at the same time without interfering each other.
forward defect
indication (FDI)
A packet generated and traced forward to the sink node of the LSP by the node that first
detects defects. It includes fields to indicate the nature of the defect and its location. Its
primary purpose is to suppress alarms being raised at affected higher level client LSPs
and (in turn) their client layers.
forward defect
A packet that responds to the detected failure event. It is used to suppress alarms of the
indication packet (FDI upper layer network where failure has occurred.
packet)
forward error
correction (FEC)
A bit error correction technology that adds correction information to the payload at the
transmit end. Based on the correction information, the bit errors generated during
transmission can be corrected at the receive end.
fragmentation
A process of breaking a packet into smaller units when transmitting over a network node
that does not support the original size of the packet.
A measurement of the variations in the frame delay between a pair of service frames,
where the service frames belong to the same CoS instance on a point to point ETH
connection.
frame loss ratio (FLR) A ratio, is expressed as a percentage, of the number of service frames not delivered
divided by the total number of service frames during time interval T, where the number
of service frames not delivered is the difference between the number of service frames
arriving at the ingress ETH flow point and the number of service frames delivered at the
egress ETH flow point in a point-to-point ETH connection.
frame relay (FR)
free-run mode
Issue 01 (2013-12-30)
159
A Glossary
frequency division
duplex (FDD)
An application in which channels are divided by frequency. In an FDD system, the uplink
and downlink use different frequencies. Downlink data is sent through bursts. Both
uplink and downlink transmission use frames with fixed time length.
full rate
A type of data transmission rate. The service bandwidth can be 9.6 kbit/s, 4.8 kbit/s, or
2.4 kbit/s.
fuse
A safety device that protects an electric circuit from excessive current, consisting of or
containing a metal element that melts when current exceeds a specific amperage, thereby
opening the circuit.
G
G-ACH
GAL
GCC
GCRA
GFC
GFP
GNE
GPS
GRE
GSM
GTS
GUI
Generic Framing
Procedure (GFP)
A framing and encapsulated method that can be applied to any data type. GFP is defined
by ITU-T G.7041.
Generic Routing
Encapsulation (GRE)
A mechanism for encapsulating any network layer protocol over any other network. GRE
is used for encapsulating IP datagrams tunneled through the Internet. GRE serves as a
Layer 3 tunneling protocol and provides a tunnel for transparently transmitting data
packets.
Global Positioning
System (GPS)
A global navigation satellite system that provides reliable positioning, navigation, and
timing services to users worldwide.
gain
The difference between the optical power from the input optical interface of the optical
amplifier and the optical power from the output optical interface of the jumper fiber,
which expressed in dB.
gateway
A device that connects two network segments using different protocols. It is used to
translate the data in the two network segments.
Issue 01 (2013-12-30)
160
A Glossary
gateway network
element (GNE)
A flow control that is applicable to the A interface, C/D interface, and trunks and can be
achieved by integrating multiple function modules. It is adopted when the traffic is heavy,
or location update and authentication of multiple subscribers are performed after the
system restarts. It can efficiently prevent system breakdown caused by link congestion
or CPU overload.
generic traffic shaping A traffic control measure that proactively adjusts the output speed of the traffic. This is
(GTS)
to adapt the traffic to network resources that can be provided by the downstream router
to avoid packet discarding and congestion.
ground terminal
H
HCS
HDB3
HDLC
HDTV
HEC
HPA
HPT
HQoS
HSDPA
HSI
high-speed Internet
hang up
A call processing mode used by an attendant to end the conversation with a user.
hardware loopback
A connection mode in which a fiber jumper is used to connect the input optical interface
of a board to the output optical interface of the board to achieve signal loopback.
A field within the ATM frame whose purpose is to correct any single bit error in the cell
Header and also to detect any multi-bit errors. It actually performs a CRC check in the
first four header bits and also at the receiving end.
hello packet
The commonest packet which is periodically sent by a router to its neighbors. It contains
information about the DR, Backup Designated Router (BDR), known neighbors and
timer values.
Issue 01 (2013-12-30)
161
A Glossary
hierarchical quality of
service (HQoS)
A type of QoS that controls the traffic of users and performs the scheduling according
to the priority of user services. HQoS has an advanced traffic statistics function, and the
administrator can monitor the usage of bandwidth of each service. Hence, the bandwidth
can be allocated reasonably through traffic analysis.
high definition
television (HDTV)
historical performance Performance data that is stored in the history register or that has been automatically
data
reported and stored in the NMS.
hop
A network connection between two distant nodes. For Internet operation a hop represents
a small step on the route from one main computer to another.
hot patch
A patch that is used to repair a deficiency in the software or add a new feature to a program
without restarting the software and interrupting the service. For the equipment using the
built-in system, a hot patch can be loaded, activated, confirmed, deactivated, deleted, or
queried.
I
IANA
IC
ICC
ICMP
ICP
IDU
IEEE
IF
IGMP
IGMP snooping
IGP
ILM
IMA
IMA frame
A control unit in the IMA protocol. It is a logical frame defined as M consecutive cells,
numbered 0 to M-l, transmitted on each of the N links in an IMA group.
IP
Internet Protocol
IP address
A 32-bit (4-byte) binary number that uniquely identifies a host connected to the Internet.
An IP address is expressed in dotted decimal notation, consisting of the decimal values
of its 4 bytes, separated with periods; for example, 127.0.0.1. The first three bytes of the
IP address identify the network to which the host is connected, and the last byte identifies
the host itself.
Issue 01 (2013-12-30)
162
A Glossary
IPA
IPTV
IPv4
IPv6
IS-IS
ISDN
ISO
ISP
IST
ITC
ITU
IWF
Interworking Function
Institute of Electrical
and Electronics
Engineers (IEEE)
Interior Gateway
Protocol (IGP)
A routing protocol that is used within an autonomous system. The IGP runs in smallsized and medium-sized networks. The commonly used IGPs are the routing information
protocol (RIP), the interior gateway routing protocol (IGRP), the enhanced IGRP
(EIGRP), and the open shortest path first (OSPF).
Intermediate System to A protocol used by network devices (routers) to determine the best way to forward
Intermediate System
datagram or packets through a packet-based network.
(IS-IS)
International
Telecommunication
Union (ITU)
A United Nations agency, one of the most important and influential recommendation
bodies, responsible for recommending standards for telecommunication (ITU-T) and
radio networks (ITU-R).
Internet Assigned
Numbers Authority
(IANA)
Internet Control
Message Protocol
(ICMP)
A network layer protocol that provides message control and error reporting between a
host server and an Internet gateway.
Internet Group
Management Protocol
(IGMP)
One of the TCP/IP protocols for managing the membership of Internet Protocol multicast
groups. It is used by IP hosts and adjacent multicast routers to establish and maintain
multicast group memberships.
Internet Protocol
television (IPTV)
A system that provides TV services over the IP network. In the IPTV system, media
streams from satellites, terrestrial, and studios are converted by the encoder to the media
streams applicable to the IP network. Then the media streams are transmitted to the
terminal layer on the IP network. Media content is displayed on a TV set after media
streams are processed by specified receiving devices (for example, an STB).
Issue 01 (2013-12-30)
163
A Glossary
Internet Protocol
version 4 (IPv4)
The current version of the Internet Protocol (IP). IPv4 utilizes a 32bit address which is
assigned to hosts. An address belongs to one of five classes (A, B, C, D, or E) and is
written as 4 octets separated by periods and may range from 0.0.0.0 through to
255.255.255.255. Each IPv4 address consists of a network number, an optional
subnetwork number, and a host number. The network and subnetwork numbers together
are used for routing, and the host number is used to address an individual host within the
network or subnetwork.
Internet Protocol
version 6 (IPv6)
An update version of IPv4, which is designed by the Internet Engineering Task Force
(IETF) and is also called IP Next Generation (IPng). It is a new version of the Internet
Protocol. The difference between IPv6 and IPv4 is that an IPv4 address has 32 bits while
an IPv6 address has 128 bits.
Internet service
provider (ISP)
An organization that offers users access to the Internet and related services.
inbound
Data transmission from the external link to the router for the routers that support the
NetStream feature.
indicator
insertion loss
The loss of power that results from inserting a component, such as a connector, coupler,
or splice, into a previously continuous path.
A combination of inseparable associated circuit elements that are formed in place and
interconnected on or within a single base material to perform a microcircuit function.
intelligent power
adjustment (IPA)
A technology that reduces the optical power of all the amplifiers in an adjacent
regeneration section in the upstream to a safe level if the system detects the loss of optical
signals on the link. IPA helps ensure that maintenance engineers are not injured by the
laser escaping from a broken fiber or a connector that is not plugged in properly.
interleaving
A process of systematically changing the bit sequence of a digital signal, usually as part
of the channel coding, in order to reduce the influence of error bursts that may occur
during transmission.
intermediate frequency The transitional frequency between the frequencies of a modulated signal and an RF
(IF)
signal.
inverse multiplexing
over ATM (IMA)
J
jitter
The measure of short waveform variations caused by vibration, voltage fluctuations, and
control system instability.
jumper
K
Issue 01 (2013-12-30)
164
K byte
A Glossary
L
L2 switching
L2VPN
LACP
LACPDU
LAG
LAN
LAPS
LB
See loopback.
LBM
LBR
LC
Lucent connector
LCAS
LCN
LCT
LDP
LED
LER
LIFO
LIU
LL
logical link
LLC
LLID
local loopback ID
LM
LOC
loss of continuity
LOM
loss of multiframe
LOP
loss of pointer
LOS
LP
LPA
LPF
LPT
LSP
Issue 01 (2013-12-30)
165
A Glossary
LSR
LT
linktrace
LTM
LTR
LU
line unit
Layer 2 switching
Link Aggregation
Control Protocol
(LACP)
A dynamic link aggregation protocol that improves the transmission speed and
reliability. The two ends of the link send LACP packets to inform each other of their
parameters and form a logical aggregation link. After the aggregation link is formed,
LACP maintains the link status in real time and dynamically adjusts the ports on the
aggregation link upon detecting the failure of a physical port.
label
A short identifier that is of fixed length and local significance. It is used to uniquely
identify the FEC to which a packet belongs. It does not contain topology information. It
is carried in the header of a packet and does not contain topology information.
label distribution
Packets with the same destination address belong to an FEC. A label out of an MPLS
label resource pool is allocated to the FEC. LSRs record the relationship of the label and
the FEC. Then, LSRs sends a message and advertises to upstream LSRs about the label
and FEC relationship in message. The process is called label distribution.
label edge router (LER) A device that sits at the edge of an MPLS domain, that uses routing information to assign
labels to datagrams and then forwards them into the MPLS domain.
label space
Basic element of an MPLS network. All LSRs support the MPLS protocol. The LSR is
composed of two parts: control unit and forwarding unit. The former is responsible for
allocating the label, selecting the route, creating the label forwarding table, creating and
removing the label switch path; the latter forwards the labels according to groups
received in the label forwarding table.
laser
A component that generates directional optical waves of narrow wavelengths. The laser
light has better coherence than ordinary light. Semi-conductor lasers provide the light
used in a fiber system.
last in first out (LIFO) A play mode of the voice mails, the last voice mail is played firstly.
layer
license
A permission that the vendor provides for the user with a specific function, capacity, and
duration of a product. A license can be a file or a serial number. Usually the license
consists of encrypted codes. The operation authority granted varies with the level of the
license.
Issue 01 (2013-12-30)
166
A Glossary
A display and lighting technology used in almost every electrical and electronic product
on the market, from a tiny on/off light to digital readouts, flashlights, traffic lights, and
perimeter lighting. LEDs are also used as the light source in multimode fibers, optical
mice, and laser printers.
line rate
The maximum packet forwarding capacity on a cable. The value of line rate equals the
maximum transmission rate capable on a given type of media.
linear MSP
link aggregation group An aggregation that allows one or more links to be aggregated together to form a link
(LAG)
aggregation group so that a MAC client can treat the link aggregation group as if it were
a single link.
link capacity
adjustment scheme
(LCAS)
LCAS in the virtual concatenation source and sink adaptation functions provides a
control mechanism to hitless increase or decrease the capacity of a link to meet the
bandwidth needs of the application. It also provides a means of removing member links
that have experienced failure. The LCAS assumes that in cases of capacity initiation,
increases or decreases, the construction or destruction of the end-to-end path is the
responsibility of the network and element management systems.
link monitoring
A mechanism for an interface to notify the peer of the fault when the interface detects
that the number of errored frames, errored codes, or errored frame seconds reaches or
exceeds the specified threshold.
link protection
Protection provided by the bypass tunnel for the link on the working tunnel. The link is
a downstream link adjacent to the point of local repair (PLR). When the PLR fails to
provide node protection, the link protection should be provided.
linktrace message
(LTM)
The message sent by the initiator MEP of 802.1ag MAC Trace to the destination MEP.
LTM includes the Time to Live (TTL) and the MAC address of the destination MEP2.
For 802.1ag MAC Trace, the destination MEP replies with a response message to the
source MEP after the destination MEP receives the LTM, and the response message is
called LTR. LTR also includes the TTL that equals the result of the TTL of LTM minus
1.
load balancing
The distribution of activity across two or more servers or components in order to avoid
overloading any one with too many requests or too much traffic.
loading
A process of importing information from the storage device to the memory to facilitate
processing (when the information is data) or execution (when the information is
program).
local MEP
A network formed by the computers and workstations within the coverage of a few square
kilometers or within a single building, featuring high speed and low error rate. Current
LANs are generally based on switched Ethernet or Wi-Fi technology and run at 1,000
Mbit/s (that is, 1 Gbit/s).
logical interface
An interface that does not exist physically and comes into being through configuration.
It can also exchange data.
According to the IEEE 802 family of standards, Logical Link Control (LLC) is the upper
sublayer of the OSI data link layer. The LLC is the same for the various physical media
(such as Ethernet, token ring, WLAN).
Issue 01 (2013-12-30)
167
A Glossary
loopback (LB)
A troubleshooting technique that returns a transmitted signal to its source so that the
signal or message can be analyzed for errors. The loopback can be a inloop or outloop.
loopback message
(LBM)
The loopback packet sent by the node that supports 802.2ag MAC Ping to the destination
node. LBM message carries its own sending time.
A response message involved in the 802.2ag MAC Ping function, with which the
destination MEP replies to the source MEP after the destination MEP receives the LBM.
The LBR carries the sending time of LBM, the receiving time of LBM and the sending
time of LBR.
loss measurement (LM) A method used to collect counter values applicable for ingress and egress service frames
where the counters maintain a count of transmitted and received data frames between a
pair of MEPs.
loss of signal (LOS)
lower threshold
A lower performance limit which when exceeded by a performance event counter will
trigger a threshold-crossing event.
M
MA
maintenance association
MAC
MAC address
A function that deletes MAC address entries of a device when no packets are received
from this device within a specified time period.
MADM
MAN
MBS
MCF
MCR
MD
MDP
ME
MEG
MEL
MEP
MFAS
MIP
MLD
MP
maintenance point
Issue 01 (2013-12-30)
168
A Glossary
MPID
MPLS
MPLS TE
MPLS VPN
MS
multiplex section
MSA
MSB
MSOH
MSP
MST
MST region
MSTI
MSTP
MTBF
MTIE
MTTR
MTU
MUX
See multiplexer.
A protocol at the media access control sublayer. The protocol is at the lower part of the
data link layer in the OSI model and is mainly responsible for controlling and connecting
the physical media at the physical layer. When transmitting data, the MAC protocol
checks whether to be able to transmit data. If the data can be transmitted, certain control
information is added to the data, and then the data and the control information are
transmitted in a specified format to the physical layer. When receiving data, the MAC
protocol checks whether the information is correct and whether the data is transmitted
correctly. If the information is correct and the data is transmitted correctly, the control
information is removed from the data and then the data is transmitted to the LLC layer.
Multiple Spanning
Tree Protocol (MSTP)
A protocol that can be used in a loop network. Using an algorithm, the MSTP blocks
redundant paths so that the loop network can be trimmed as a tree network. In this case,
the proliferation and endless cycling of packets is avoided in the loop network. The
protocol that introduces the mapping between VLANs and multiple spanning trees. This
solves the problem that data cannot be normally forwarded in a VLAN because in STP/
RSTP, only one spanning tree corresponds to all the VLANs.
Multiple Spanning
Tree region (MST
region)
A region that consists of switches that support the MSTP in the LAN and links among
them. Switches physically and directly connected and configured with the same MST
region attributes belong to the same MST region.
Multiprotocol Label
Switching (MPLS)
A technology that uses short tags of fixed length to encapsulate packets in different link
layers, and provides connection-oriented switching for the network layer on the basis of
IP routing and control protocols.
Issue 01 (2013-12-30)
169
A Glossary
main topology
maintenance domain
(MD)
The network or the part of the network for which connectivity is managed by connectivity
fault management (CFM). The devices in a maintenance domain are managed by a single
Internet service provider (ISP).
maintenance entity
(ME)
An ME consists of a pair of maintenance entity group end points (MEPs), two ends of a
transport trail, and maintenance association intermediate points (MIPs) on the trail.
maintenance entity
An end point of a MEG, which is able to initialize and stop the transmission of OAM
group end point (MEP) data packets for fault management and performance monitoring.
maintenance entity
group intermediate
point (MIP)
An intermediate point in a MEG, which is able to forward OAM packets and respond to
some OAM packets, but unable to initiate the transmission of OAM packets or perform
any operations on network connections.
management
information
maximum transmission The largest packet of data that can be transmitted on a network. MTU size varies,
unit (MTU)
depending on the network576 bytes on X.25 networks, for example, 1500 bytes on
Ethernet, and 17,914 bytes on 16 Mbit/s token ring. Responsibility for determining the
size of the MTU lies with the link layer of the network. When packets are transmitted
across networks, the path MTU, or PMTU, represents the smallest packet size (the one
that all networks can transmit without breaking up the packet) among the networks
involved.
mean time between
failures (MTBF)
The average time that a device will take to recover from a failure.
measurement period
The interval for NEs to report measurement results to the Network Management System
(NMS).
medium
A physical medium for storing computer information. A medium is used for data
duplication and keeping the data for some time. Original data can be obtained from a
medium.
member
A basic element for forming a dimension according to the hierarchy of each level. Each
member represents a data element in a dimension. For example, January 1997 is a typical
member of the time dimension.
metropolitan area
network (MAN)
A medium-scale computer network with area larger than that covered by a LAN and
smaller than that covered by a WAN. It interconnects multiple LAN networks in a
geographic region of a city.
microwave
The portion of the electromagnetic spectrum with much longer wavelengths than infrared
radiation, typically above about 1 mm.
mirroring
The duplication of data for backup or to distribute network traffic among several
computers with identical data.
Issue 01 (2013-12-30)
170
A Glossary
monitoring
A method that an inspector uses to inspect a service agent. By monitoring a service agent,
an inspector can check each detailed operation performed by the service agent during
the conversation and operate the GUI used by the service agent. The inspector helps the
service agent to provide better service.
mounting
mounting ear
A piece of angle plate on a rack. The mounting ear has holes that can be used to fix
network elements or components.
multicast
A process of transmitting data packets from one source to many destinations. The
destination address of the multicast packet uses Class D address, that is, the IP address
ranges from 224.0.0.0 to 239.255.255.255. Each multicast address represents a multicast
group rather than a host.
multicast listener
discovery (MLD)
A protocol used by an IPv6 router to discover the multicast listeners on their directly
connected network segments, and to set up and maintain member relationships. On IPv6
networks, after MLD is configured on the receiver hosts and the multicast router to which
the hosts are directly connected, the hosts can dynamically join related groups and the
multicast router can manage members on the local network.
multiframe alignment
signal (MFAS)
A distinctive signal inserted into every multiframe or once into every n multiframes,
always occupying the same relative position within the multiframe, and used to establish
and maintain multiframe alignment.
multiple spanning tree A type of spanning trees calculated by MSTP within an MST Region, to provide a simply
instance (MSTI)
and fully connected active topology for frames classified as belonging to a VLAN that
is mapped to the MSTI by the MST Configuration. A VLAN cannot be assigned to
multiple MSTIs.
multiplex section
protection (MSP)
A function, which is performed to provide capability for switching a signal between and
including two multiplex section termination (MST) functions, from a "working" to a
"protection" channel.
multiplex section
termination (MST)
A function that generates the multiplex section overhead (MSOH) during the formation
of an SDH frame signal and that terminates the MSOH in the reverse direction.
multiplexer (MUX)
multiplexing
A procedure by which multiple lower order path layer signals are adapted into a higher
order path or the multiple higher order path layer signals are adapted into a multiplex
section.
multiprotocol label
switching virtual
private network
(MPLS VPN)
An Internet Protocol (IP) virtual private network (VPN) based on the multiprotocol label
switching (MPLS) technology. It applies the MPLS technology for network routers and
switches, simplifies the routing mode of core routers, and combines traditional routing
technology and label switching technology. It can be used to construct the broadband
Intranet and Extranet to meet various service requirements.
N
N+1 protection
A radio link protection system composed of N working channels and one protection
channel.
NAS
Issue 01 (2013-12-30)
171
A Glossary
NC
NE ID
An ID that indicates a managed device in the network. In the network, each NE has a
unique NE ID.
NGN
NHLFE
NLP
NM
network management
NMC
NNI
network-to-network interface
NP
NPC
NPE
NRT-VBR
NRZ
non-return to zero
NRZ code
non-return-to-zero code
NRZI
NSAP
NSF
non-stop forwarding
NTP
A bottom-level device in the time synchronization network. An NTP client obtains time
from its upper-level NTP server without providing the time synchronization service.
Compared with the top-level NTP server, the intermediate NTP server sometimes is
called an NTP client.
network layer
Layer 3 of the seven-layer OSI model of computer networking. The network layer
provides routing and addressing so that two terminal systems are interconnected. In
addition, the network layer provides congestion control and traffic control. In the TCP/
IP protocol suite, the functions of the network layer are specified and implemented by
IP protocols. Therefore, the network layer is also called IP layer.
network parameter
control (NPC)
During communications, UPC is implemented to monitor the actual traffic on each virtual
circuit that is input to the network. Once the specified parameter is exceeded, measures
will be taken to control. NPC is similar to UPC in function. The difference is that the
incoming traffic monitoring function is divided into UPC and NPC according to their
positions. UPC locates at the user/network interface, while NPC at the network interface.
network processor (NP) An integrated circuit which has a feature set specifically targeted at the networking
application domain. Network Processors are typically software programmable devices
and would have generic characteristics similar to general purpose CPUs that are
commonly used in many different types of equipment and products.
network segment
Part of a network on which all message traffic is common to all nodes; that is, a message
broadcast from one node on the segment is received by all other nodes on the segment.
network service
A service that needs to be enabled at the network layer and maintained as a basic service.
Issue 01 (2013-12-30)
172
A Glossary
network service access A network address defined by ISO, at which the OSI Network Service is made available
point (NSAP)
to a Network service user by the Network service provider.
network storm
next generation
network (NGN)
noise figure
non-GNE
non-gateway network
element (non-GNE)
A network element that communicates with the NM application layer through the
gateway NE application layer.
O
O&M
OA
optical amplifier
OADM
OAM
OAMPDU
OAU
OC
ordinary clock
OCP
OCS
ODF
ODU
OFS
out-of-frame second
OHA
overhead access
OHP
overhead processing
OLT
ONU
OPEX
operating expense
Issue 01 (2013-12-30)
173
A Glossary
OPU
OSC
OSN
OSNR
OSPF
OTDR
OTM
OTN
OTU
OTUk
A link-state, hierarchical interior gateway protocol (IGP) for network routing that uses
cost as its routing metric. A link state database is constructed of the network topology,
which is identical on all routers in the area.
offline
Pertaining to the disconnection between a device or a service unit and the system or the
network, or no running of a device and service unit.
online
A state indicating that a computer device or program is activated and is ready for
operations, and can communicate with a computer or can be controlled by the computer.
operation,
administration and
maintenance (OAM)
A set of network management functions that cover fault detection, notification, location,
and repair.
optical add/drop
multiplexer (OADM)
A device that can be used to add the optical signals of various wavelengths to one channel
and drop the optical signals of various wavelengths from one channel.
A board that is mainly responsible for amplifying optical signals. The OAU can be used
in both the transmitting direction and the receiving direction.
optical attenuator
A passive device that increases the attenuation in a fiber link. An optical attenuator is
used to ensure that the optical power of a signal at the receive end is not excessively
high.
optical connector
A component attached to the end of an optical fiber that allows the fiber to connect to
another fiber or an optical source.
optical fiber
optical interface
A form of Access Node that converts optical signals transmitted via fiber to electrical
signals that can be transmitted via coaxial cable or twisted pair copper wiring to
individual subscribers.
optical signal-to-noise
ratio (OSNR)
The ratio of signal power to noise power in a transmission link. OSNR is the most
important index for measuring the performance of a DWDM system.
Issue 01 (2013-12-30)
174
A Glossary
optical splitter
A passive component, which is used for splitting and sending optical power to multiple
ONUs connected by an optical fiber. In a GPON system that consists of the OLT, ONU,
splitter, and optical fibers, according to the split ratio, the optical signal over the optical
fiber connected to the OLT is splitted into multiple channels of optical signals and send
each channel to each ONU. Split ratio determines how many channels of optical signals
an optical fiber can be split to.
optical supervisory
channel (OSC)
A device that sends a series of short pulses of light down a fiber-optic cable and measures
the strength of the return pulses. An OTDR is used to measure fiber length and light loss,
and to locate fiber faults.
optical transponder
unit (OTU)
A device or subsystem that converts accessed client signals into a G.694.1/G.694.2compliant WDM wavelength.
orderwire
P
P2MP
point-to-multipoint
P2P
PA
power amplifier
PADR
PBS
PCB
PCM
PCR
PCS
PDH
PDU
PE
PGND cable
A cable which connects the equipment and the protection grounding bar. Usually, one
half of the cable is yellow, whereas the other half is green.
PHB
PIM-DM
PIM-SM
PKT
PLL
Issue 01 (2013-12-30)
175
A Glossary
PM
performance monitoring
PMD
POH
path overhead
POS
PPD
PPI
PPP
Point-to-Point Protocol
PPPoE
PPS
PQ
PRBS
PRC
PSD
PSN
PSTN
PSU
PT
payload type
PTI
PTN
PTP
PVC
PVID
PVP
PW
PWE3
packet discarding
A function of discarding the packets from unknown VLAN domain or broadcast packets.
Packet Discarding is used to prevent the situation where unknown packets or broadcast
packets use the bandwidth on a link, improving the reliability of service transmission.
packet forwarding
packet loss
The discarding of data packets in a network when a device is overloaded and cannot
accept any incoming data at a given moment.
A MAN and WAN technology that provides point-to-point data connections. The POS
interface uses SDH/SONET as the physical layer protocol, and supports the transport of
packet data (such as IP packets) in MAN and WAN.
Issue 01 (2013-12-30)
176
A Glossary
packet rate
The number of bits or bytes passed within a specified time. It is expressed in bits/s or
bytes/s.
packet switched
network (PSN)
packet switching
paired slots
Two slots of which the overheads can be passed through by using the bus on the
backplane.
parity bit
A check bit appended to an array of binary digits to make the sum of all the binary digits,
including the check bit, always odd or always even.
parity check
A method for character level error detection. An extra bit is added to a string of bits,
usually a 7-bit ASCII character, so that the total number of bits 1 is odd or even (odd or
even parity). Both ends of a data transmission must use the same parity. When the
transmitting device frames a character, it counts the numbers of 1s in the frame and
attaches the appropriate parity bit. The recipient counts the 1s and, if there is parity error,
may ask for the data to be retransmitted.
parts replacement
passive mode
A working mode of EFM OAM. An interface in the passive mode cannot initiate the
discovery and remote loopback.
patch
A parameter that defines the capacity of token bucket P, that is, the maximum burst IP
packet size when the information is transferred at the peak information rate.
peer
per-hop behavior
(PHB)
performance alarm
An alarm generated when the actual result of a measurement entity equals the predefined
logical expression for threshold or exceeds the predefined threshold.
performance
parameters
The performance parameters identify some indexes to scale the general performance of
the system. The indexes include the number of managed nodes, number of supported
clients and log database capacity. The parameters are sorted into static parameters,
dynamic parameters and networking bandwidth parameters.
performance register
The memory space for performance event counts, including 15-min current performance
register, 24-hour current performance register, 15-min historical performance register,
24-hour historical performance register, UAT register and CSES register. The object of
performance event monitoring is the board functional module, so every board functional
module has a performance register. A performance register is used to count the
performance events taking place within a period of operation time, so as to evaluate the
quality of operation from the angle of statistics.
Issue 01 (2013-12-30)
177
A Glossary
performance threshold A limit for generating an alarm for a selected entity. When the measurement result
reaches or exceeds the preset alarm threshold, the performance management system
generates a performance alarm.
permanent virtual path Virtual path that consists of PVCs.
(PVP)
phase
phase-locked loop
(PLL)
A circuit that consists essentially of a phase detector that compares the frequency of a
voltage-controlled oscillator with that of an incoming carrier signal or referencefrequency generator. The output of the phase detector, after passing through a loop filter,
is fed back to the voltage-controlled oscillator to keep it exactly in phase with the
incoming or reference frequency.
physical layer
Layer 1 in the Open System Interconnection (OSI) architecture; the layer that provides
services to transmit bits or groups of bits over a transmission link between open systems
and which entails electrical, mechanical and handshaking.
physical link
The link between two physical network elements (NEs). When the user creates NEs or
refreshes the device status, the system automatically creates the physical link according
to the topology structure information on the device. The remark information of a physical
link can be modified, but the physical link cannot be deleted.
ping
A method used to test whether a device in the IP network is reachable according to the
sent ICMP Echo messages and received response messages.
ping test
A test that is performed to send a data packet to the target IP address (a unique IP address
on the device on the network) to check whether the target host exists according to the
data packet of the same size returned from the target host.
plesiochronous digital
hierarchy (PDH)
A multiplexing scheme of bit stuffing and byte interleaving. It multiplexes the minimum
rate 64 kit/s into rates of 2 Mbit/s, 34 Mbit/s, 140 Mbit/s, and 565 Mbit/s.
point-to-point service
(P2P)
A service between two terminal users. In P2P services, senders and recipients are
terminal users.
pointer
An indicator whose value defines the frame offset of a virtual container with respect to
the frame reference of the transport entity on which this pointer is supported.
polarization
A kind of electromagnetic wave, the direction of whose electric field vector is fixed or
rotates regularly. Specifically, if the electric field vector of the electromagnetic wave is
perpendicular to the plane of horizon, this electromagnetic wave is called vertically
polarized wave; if the electric field vector of the electromagnetic wave is parallel to the
plane of horizon, this electromagnetic wave is called horizontal polarized wave; if the
tip of the electric field vector, at a fixed point in space, describes a circle, this
electromagnetic wave is called circularly polarized wave.
policy
A set of rules that are applied when the conditions for triggering an event are met.
policy template
A template that is used to define the calculation rules of a charging event, for example,
rating, debiting and accumulating. A policy template may contain the parameters to be
instantiated. They can be used when the attributes of the condition judgment, calculation
method, and action functions are carried out.
polling
A mechanism for the NMS to query the agent status and other data on a regular basis.
A default VLAN ID of a port. It is allocated to a data frame if the data frame carries no
VLAN tag when reaching the port.
Issue 01 (2013-12-30)
178
A Glossary
port priority
The priority that is used when a port attaches tags to Layer 2 packets. Packets received
on ports with higher priorities are forwarded preferentially.
power adjustment
A method for dynamically and properly assigning power according to the real-time status
of a wireless network. When an AP runs under an AC for the first time, the AP uses its
maximum transmit power. When getting reports from its neighbors (that is, other APs
that are detected by the AP and managed by the same AC), the AP determines to increase
or decrease its power according to the report conclusion.
power box
A direct current power distribution box at the upper part of a cabinet, which supplies
power for the subracks in the cabinet.
power control
A process in which the MS or BS uses certain rules to adjust and control the transmit
power according to the change in the channel condition and the power of the received
signal.
The module that converts the external power input into the power supply for internal
use. Power modules are classified into AC power modules and DC power modules.
power off
power on
power spectrum
density (PSD)
private line
A line, such as a subscriber cable and trunk cable, which are leased by the
telecommunication carrier and are used to meet the special user requirements.
protection path
A path in a protection group that transports services when a fault occurs on the working
path.
A device that is located in the backbone network of the MPLS VPN structure. A PE is
responsible for managing VPN users, establishing LSPs between PEs, and exchanging
routing information between sites of the same VPN. A PE performs the mapping and
forwarding of packets between the private network and the public channel. A PE can be
a UPE, an SPE, or an NPE.
pseudo random binary A sequence that is random in the sense that the value of each element is independent of
sequence (PRBS)
the values of any of the other elements, similar to a real random sequence.
pseudo wire (PW)
Issue 01 (2013-12-30)
An emulated connection between two PEs for transmitting frames. The PW is established
and maintained by PEs through signaling protocols. The status information of a PW is
maintained by the two end PEs of a PW.
179
A Glossary
pseudo wire emulation An end-to-end Layer 2 transmission technology. It emulates the essential attributes of a
edge-to-edge (PWE3) telecommunication service such as ATM, FR or Ethernet in a packet switched network
(PSN). PWE3 also emulates the essential attributes of low speed time division
multiplexing (TDM) circuit and SONET/SDH. The simulation approximates to the real
situation.
public switched
telephone network
(PSTN)
pulse
A variation above or below a normal level and a given duration in electrical energy.
pulse code modulation A method of encoding information in a signal by changing the amplitude of pulses.
(PCM)
Unlike pulse amplitude modulation (PAM), in which pulse amplitude can change
continuously, pulse code modulation limits pulse amplitudes to several predefined
values. Because the signal is discrete, or digital, rather than analog, pulse code
modulation is more immune to noise than PAM.
Q
QA
Q adaptation
QAM
QPSK
QinQ
A layer 2 tunnel protocol based on IEEE 802.1Q encapsulation. It add a public VLAN
tag to a frame with a private VLAN tag to allow the frame with double VLAN tags to
be transmitted over the service provider's backbone network based on the public VLAN
tag. This provides a layer 2 VPN tunnel for customers and enables transparent
transmission of packets over private VLANs.
QoS
quadrature amplitude
modulation (QAM)
Both an analog and a digital modulation scheme. It conveys two analog message signals,
or two digital bit streams, by changing (modulating) the amplitudes of two carrier waves,
using the amplitude-shift keying (ASK) digital modulation scheme or amplitude
modulation (AM) analog modulation scheme. These two waves, usually sinusoids, are
out of phase with each other by 90 and are thus called quadrature carriers or quadrature
components hence the name of the scheme.
quadrature phase shift A modulation method of data transmission through the conversion or modulation and
keying (QPSK)
the phase determination of the reference signals (carrier). It is also called the fourth period
or 4-phase PSK or 4-PSK. QPSK uses four dots in the star diagram. The four dots are
evenly distributed on a circle. On these phases, each QPSK character can perform twobit coding and display the codes in Gray code on graph with the minimum BER.
quality of service (QoS) A commonly-used performance indicator of a telecommunication system or channel.
Depending on the specific system and service, it may relate to jitter, delay, packet loss
ratio, bit error ratio, and signal-to-noise ratio. It functions to measure the quality of the
transmission system and the effectiveness of the services, as well as the capability of a
service provider to meet the demands of users.
R
RADIUS
Issue 01 (2013-12-30)
180
A Glossary
RAI
RDI
RED
REG
See regenerator.
REI
RF
RIP
RMEP
RNC
ROPA
RP
rendezvous point
RPR
RS232
RS422
The specification that defines the electrical characteristics of balanced voltage digital
interface circuits. The interface can change to RS232 via the hardware jumper and others
are the same as RS232.
RSL
RSOH
RSSI
RST
RSTP
RTN
RTP
An evolution of the Spanning Tree Protocol (STP) that provides faster spanning tree
convergence after a topology change. The RSTP protocol is backward compatible with
the STP protocol.
Real-Time Transport
Protocol (RTP)
A protocol defined by the IETF for transmitting audio and video streams. RTP is based
on UDP. In the RTP header, a time stamp is defined to ensure that audio and video data
can be transmitted and synchronized in real time. H.323 is based on RTP.
Reference Standard
232 (RS232)
A standard that defines the electrical characteristics, timing, and meaning of signals, and
the physical size and pinout of connectors.
Remote Authentication A security service that authenticates and authorizes dial-up users and is a centralized
Dial In User Service
access control mechanism. RADIUS uses the User Datagram Protocol (UDP) as its
(RADIUS)
transmission protocol to ensure real-time quality. RADIUS also supports the
retransmission and multi-server mechanisms to ensure good reliability.
RoHS
Issue 01 (2013-12-30)
181
A Glossary
Routing Information
Protocol (RIP)
A simple routing protocol that is part of the TCP/IP protocol suite. It determines a route
based on the smallest hop count between the source and destination. RIP is a distance
vector protocol that routinely broadcasts routing information to its neighboring routers
and is known to waste bandwidth.
radio network
controller (RNC)
A device in a radio network subsystem that is in charge of controlling the usage and
integrity of radio resources.
radio propagation
model
random early detection A packet loss algorithm used in congestion avoidance. It discards the packet according
(RED)
to the specified higher limit and lower limit of a queue so that global TCP synchronization
resulting from traditional tail drop can be prevented.
rate limiting
A traffic management technology used to limit the total rate of packet sending on a
physical interface or a Tunnel interface. Rate limiting is directly enabled on the interface
to control the traffic passing the interface.
reboot
To start the system again. Programs or data will be reloaded to all boards.
received signal strength The received wide band power, including thermal noise and noise generated in the
indicator (RSSI)
receiver, within the bandwidth defined by the receiver pulse shaping filter, for TDD
within a specified timeslot. The reference point for the measurement shall be the antenna
receiver sensitivity
The minimum acceptable value of mean received power at point Rn (a reference point
at an input to a receiver optical connector) to achieve a 1x10-12 BER when the FEC is
enabled.
recognition
reference clock
reflectance
The ratio of the reflected optical power to the incident optical power.
regeneration
The process of receiving and reconstructing a digital signal so that the amplitudes,
waveforms and timing of its signal elements are constrained within specified limits.
regenerator (REG)
Issue 01 (2013-12-30)
182
A Glossary
relay
An electronic control device that has a control system and a system to be controlled. The
relay of the telepresence system is used to control the power of telepresence equipment
and is controlled by the telepresence host.
remote optical
pumping amplifier
(ROPA)
A remote optical amplifier subsystem designed for applications where power supply and
monitoring systems are unavailable. The ROPA subsystem is a power compensation
solution to the ultra-long distance long hop (LHP) transmission.
reservation
An action that the charging module performs to freeze a subscriber's balance amount,
free resources, credits, or quotas before the subscriber uses services. This action ensures
that the subscriber has sufficient balance to pay for services.
resistance
The ability to impede (resist) the flow of electric current. With the exception of
superconductors, all substances have a greater or lesser degree of resistance. Substances
with very low resistance, such as metals, conduct electricity well and are called
conductors. Substances with very high resistance, such as glass and rubber, conduct
electricity poorly and are called nonconductors or insulators.
resource sharing
response
A message that is returned to the requester to notify the requester of the status of the
request packet.
robustness
The ability of a system to maintain function even with changes in internal structure or
external environment.
rollback
root alarm
An alarm directly caused by anomaly events or faults in the network. Some lower-level
alarms always accompany a root alarm.
route
The path that network traffic takes from its source to its destination. Routes can change
dynamically.
router
A device on the network layer that selects routes in the network. The router selects the
optimal route according to the destination address of the received packet through a
network and forwards the packet to the next router. The last router is responsible for
sending the packet to the destination host. Can be used to connect a LAN to a LAN, a
WAN to a WAN, or a LAN to the Internet.
routing
The determination of a path that a data unit (frame, packet, message) traverses from
source to destination.
routing protocol
A formula used by routers to determine the appropriate path onto which data should be
forwarded.
rt-VBR
Issue 01 (2013-12-30)
183
A Glossary
S1 byte
SAN
SAToP
SC
square connector
SCR
SD
SD trigger flag
A signal degrade trigger flag that determines whether to perform a switching when SD
occurs. The SD trigger flag can be set by using the network management system.
SD-SDI
SDH
SDP
SDRAM
SELV
SEMF
SES
SETS
SF
SFP
SFTP
SHDSL
SMSR
SNC
subnetwork connection
SNCMP
SNCP
SNCTP
SNMP
SNR
SOH
section overhead
Issue 01 (2013-12-30)
184
A Glossary
SONET
SPE
SSL
SSM
SSMB
SSU
STD
STP
SVC
A security protocol that works at a socket level. This layer exists between the TCP layer
and the application layer to encrypt/decode data and authenticate concerned entities.
Simple Network
Management Protocol
(SNMP)
A network management protocol of TCP/IP. It enables remote users to view and modify
the management information of a network element. This protocol ensures the
transmission of management information between any two points. The polling
mechanism is adopted to provide basic function sets. According to SNMP, agents, which
can be hardware as well as software, can monitor the activities of various devices on the
network and report these activities to the network console workstation. Control
information about each device is maintained by a management information block.
Synchronization Status A message that carries the quality levels of timing signals on a synchronous timing link.
Message (SSM)
SSM messages provide upstream clock information to nodes on an SDH network or
synchronization network.
security
Protection of a computer system and its data from harm or loss. A major focus of
computer security, especially on systems accessed by many people or through
communication lines, is preventing system access by unauthorized individuals.
security service
self-healing
serial port
An input/output location (channel) that sends and receives data to and from a computer's
CPU or a communications device one bit at a time. Serial ports are used for serial data
communication and as interfaces with some peripheral devices, such as mice and printers.
service flow
service level
service protection
A measure that ensures that services can be received at the receive end.
Issue 01 (2013-12-30)
185
A Glossary
session
A logical connection between two nodes on a network for the exchange of data. It
generally can apply to any link between any two data devices. A session is also used
simply to describe the connection time.
shaping
A signal indicating that associated data has degraded in the sense that a degraded defect
condition is active.
A signal indicating that associated data has failed in the sense that a near-end defect
condition (non-degrade defect) is active.
signal-to-noise ratio
(SNR)
The ratio of the amplitude of the desired signal to the amplitude of noise signals at a
given point in time. SNR is expressed as 10 times the logarithm of the power ratio and
is usually expressed in dB.
signaling
single-ended switching A protection mechanism that takes switching action only at the affected end of the
protected entity in the case of a unidirectional failure.
single-pair high-speed
digital subscriber line
(SHDSL)
A symmetric digital subscriber line technology developed from HDSL, SDSL, and
HDSL2, which is defined in ITU-T G.991.2. The SHDSL port is connected to the user
terminal through the plain telephone subscriber line and uses trellis coded pulse
amplitude modulation (TC-PAM) technology to transmit high-speed data and provide
the broadband access service.
single-polarized
antenna
An antenna intended to radiate or receive radio waves with only one specified
polarization.
slicing
smooth upgrade
span
static ARP
A protocol that binds some IP addresses to a specified gateway. The packet of these IP
addresses must be forwarded through this gateway.
static route
A route that cannot adapt to the change of network topology. Operators must configure
it manually. When a network topology is simple, the network can work in the normal
state if only the static route is configured. It can improve network performance and ensure
bandwidth for important applications. Its disadvantage is as follows: When a network is
faulty or the topology changes, the static route does not change automatically. It must
be changed by the operators.
statistical multiplexing A multiplexing technique whereby information from multiple logical channels can be
transmitted across a single physical channel. It dynamically allocates bandwidth only to
active input channels, to make better use of available bandwidth and allow more devices
to be connected than with other multiplexing techniques.
Issue 01 (2013-12-30)
186
A Glossary
steering
A protection switching mode defined in ITU-T G.8132, which is applicable to packetbased T-MPLS ring networks and similar to SDH transoceanic multiplex section
protection (MSP). In this mode, the switching is triggered by the source and sink nodes
of a service.
stress
The force, or combination of forces, which produces a strain; force exerted in any
direction or manner between contiguous bodies, or parts of bodies, and taking specific
names according to its direction, or mode of action, as thrust or pressure, pull or tension,
shear or tangential stress.
subnet
A type of smaller networks that form a larger network according to a rule, for example,
according to different districts. This facilitates the management of the large network.
subnet mask
The technique used by the IP protocol to determine which network segment packets are
destined for. The subnet mask is a binary pattern that is stored in the device and is matched
with the IP address.
superstratum provider Core devices that are located within a VPLS full-meshed network. The UPE devices that
edge (SPE)
are connected with the SPE devices are similar to the CE devices. The PWs set up
between the UPE devices and the SPE devices serve as the ACs of the SPE devices. The
SPE devices must learn the MAC addresses of all the sites on UPE side and those of the
UPE interfaces that are connected with the SPE. SPE is sometimes called NPE.
switching capacity
switching priority
A priority assigned to boards that share protection. If multiple boards that are sharing
protection fail, the services of the board with the highest priority are switched to the
protection board. If two or more boards have the same priority, the services of whichever
board fails first are switched.
synchronous digital
hierarchy (SDH)
A transmission scheme that follows ITU-T G.707, G.708, and G.709. SDH defines the
transmission features of digital signals, such as frame structure, multiplexing mode,
transmission rate level, and interface code. SDH is an important part of ISDN and BISDN.
synchronous dynamic A new type of DRAM that can run at much higher clock speeds than conventional
random access memory memory. SDRAM actually synchronizes itself with the CPU's bus and is capable of
(SDRAM)
running at 100 MHz, about three times faster than conventional FPM RAM, and about
twice as fast as EDO DRAM or BEDO DRAM. SDRAM is replacing EDO DRAM in
computers.
synchronous optical
network (SONET)
T
TCI
TCM
TCN
Issue 01 (2013-12-30)
187
A Glossary
TCP
TCP/IP
TDC
TDM
TE
terminal equipment
TFTP
TIM
TLV
See type-length-value.
TM
TMN
TOD
time of day
TPID
TPS
TPS protection
The equipment level protection that uses one standby tributary board to protect N
tributary boards. When a fault occurs on the working board, the SCC issues the switching
command, and the payload of the working board can be automatically switched over to
the specified protection board and the protection board takes over as the working board.
After the fault is rectified, the service is automatically switched to the original board.
TSD
TTI
TTL
TTSI
TU
tributary unit
TU-LOP
TUG
Tc
Telnet
A standard terminal emulation protocol in the TCP/IP protocol stack. Telnet allows users
to log in to remote systems and use resources as if they were connected to a local system.
Telnet is defined in RFC 854.
Transmission Control
Protocol (TCP)
The protocol within TCP/IP that governs the breakup of data messages into packets to
be sent using Internet Protocol (IP), and the reassembly and verification of the complete
messages from packets received by IP. A connection-oriented, reliable protocol (reliable
in the sense of ensuring error-free delivery), TCP corresponds to the transport layer in
the ISO/OSI reference model.
A small and simple alternative to FTP for transferring files. TFTP is intended for
applications that do not need complex interactions between the client and server. TFTP
restricts operations to simple file transfers and does not provide authentication.
Issue 01 (2013-12-30)
188
A Glossary
tail drop
A congestion management mechanism, in which packets arrive later are discarded when
the queue is full. This policy of discarding packets may result in network-wide
synchronization due to the TCP slow startup mechanism.
tangent ring
A concept borrowed from geometry. Two tangent rings have a common node between
them. The common node often leads to single-point failures.
telecommunications
management network
(TMN)
terminal multiplexer
(TM)
A device used at a network terminal either to multiplex multiple channels of low rate
signals into one channel of high rate signals, or to demultiplex one channel of high rate
signals into multiple channels of low rate signals.
threshold
threshold alarm
The alarm occurs when the monitored value exceeds the threshold.
throughput
The maximum transmission rate of the tested object (system, equipment, connection,
service type) when no packet is discarded. Throughput can be measured with bandwidth.
throughput capability
time division
multiplexing (TDM)
A multiplexing technology. TDM divides the sampling cycle of a channel into time slots
(TSn, n=0, 1, 2, 3), and the sampling value codes of multiple signals engross time slots
in a certain order, forming multiple multiplexing digital signals to be transmitted over
one channel.
A specified period of time for best-effort delivery systems to prevent packets from
looping endlessly.
timer
Symbolic representation for a timer object (for example, a timer object may have a
primitive designated as T-Start Request). Various MAC entities utilize timer entities that
provide triggers for certain MAC state transitions.
timestamp
The current time of an event that is recorded by a computer. By using mechanisms such
as the Network Time Protocol (NTP), a computer maintains accurate current time,
calibrated to minute fractions of a second.
token bucket algorithm The token bucket is a container for tokens. The capacity of a token bucket is limited, and
the number of tokens determines the traffic rate of permitted packets. The token bucket
polices the traffic. Users place the tokens into the bucket regularly according to the preset
rate. If the tokens in the bucket exceed the capacity, no tokens can be put in. Packets can
be forwarded when the bucket has tokens, otherwise they cannot be transferred till there
are new tokens in the bucket. This scheme adjusts the rate of packet input.
topology
topology discovery
trTCM
traceroute
A program that prints the path to a destination. Traceroute sends a sequence of datagrams
with the time-to-live (TTL) set to 1,2, and so on, and uses ICMP time exceeded messages
that return to determine routers along the path.
Issue 01 (2013-12-30)
189
A Glossary
traffic
The product of the number of calls made and received and the average duration of each
call in a measurement period.
traffic classification
A function that enables you to classify traffic into different classes with different
priorities according to some criteria. Each class of traffic has a specified QoS in the entire
network. In this way, different traffic packets can be treated differently.
traffic policy
A full set of QoS policies formed by association of traffic classification and QoS actions.
traffic shaping
A way of controlling the network traffic from a computer to optimize or guarantee the
performance and minimize the delay. It actively adjusts the output speed of traffic in the
scenario that the traffic matches network resources provided by the lower layer devices,
avoiding packet loss and congestion.
traffic statistics
trail management
function
A network level management function of the network management system. This function
enables you to configure end-to-end services, view graphic interface and visual routes
of a trail, query detailed information of a trail, filter, search and locate a trail quickly,
manage and maintain trails in a centralized manner, manage alarms and performance
data by trail, and print a trail report.
trail termination source A TTSI uniquely identifies an LSP in the network. A TTSI is carried in the connectivity
identifier (TTSI)
verification (CV) packet for checking the connectivity of a trail. If it matches the TTSI
received by the sink point, the trail has no connectivity defect.
transaction
Business between the customer and carrier, such as payment, and account adjustment.
transfer
transit
A packet is transmitted along an LSP consisting of a series of LSRs after the packet is
labeled. The intermediate nodes are named transits.
transit node
transmission delay
The period from the time when a site starts to transmit a data frame to the time when the
site finishes the data frame transmission. It consists of the transmission latency and the
equipment forwarding latency.
transmit power control A technical mechanism used within some networking devices in order to prevent too
much unwanted interference between different wireless networks.
transparent
transmission
A process during which the signaling protocol or data is not processed in the content but
encapsulated in the format for the processing of the next phase.
tray
A component that can be installed in a cabinet for holding chassis or other components.
tributary loopback
A fault can be located for each service path by performing loopback to each path of the
tributary board. There are three kinds of loopback modes: no loopback, outloop, and
inloop.
tributary protection
switching (TPS)
trunk
Physical communications line between two offices. It transports media signals such as
speech, data and video signals.
Issue 01 (2013-12-30)
190
A Glossary
trunk link
trunk port
A switch port used to connect to other switches. The trunk port can connect to only the
trunk link. Only VLANs allowed to pass through a trunk port can be configured on the
trunk port.
tunnel
A channel on the packet switching network that transmits service traffic between PEs.
In VPN, a tunnel is an information transmission channel between two entities. The tunnel
ensures secure and transparent transmission of VPN information. In most cases, a tunnel
is an MPLS tunnel.
tunnel ID
A group of information, including the token, slot number of an outgoing interface, tunnel
type, and location method.
A type of cable that consists of two independently insulated wires twisted around one
another for the purposes of canceling out electromagnetic interference which can cause
crosstalk. The number of twists per meter makes up part of the specifications for a given
type of cable. The greater the number of twists is, the more crosstalk is reduced.
An algorithm that meters an IP packet stream and marks its packets based on two rates,
Peak Information Rate (PIR) and Committed Information Rate (CIR), and their
associated burst sizes to be either green, yellow, or red. A packet is marked red if it
exceeds the PIR. Otherwise it is marked either yellow or green depending on whether it
exceeds or does not exceed the CIR.
type-length-value
(TLV)
An encoding type that features high efficiency and expansibility. It is also called CodeLength-Value (CLV). T indicates that different types can be defined through different
values. L indicates the total length of the value field. V indicates the actual data of the
TLV and is most important. TLV encoding features high expansibility. New TLVs can
be added to support new features, which is flexible in describing information loaded in
packets.
U
UART
UAS
unavailable second
UAT
UBR
UBR+
UDP
UNI
UPC
UPE
UPI
UPM
UPS
Issue 01 (2013-12-30)
191
User Datagram
Protocol (UDP)
A Glossary
A TCP/IP standard protocol that allows an application program on one device to send a
datagram to an application program on another. UDP uses IP to deliver datagrams. UDP
provides application programs with the unreliable connectionless packet delivery
service. That is, UDP messages may be lost, duplicated, delayed, or delivered out of
order. The destination device does not actively confirm whether the correct data packet
is received.
unavailable time event An event that is reported when the monitored object generates 10 consecutive severely
(UAT)
errored seconds.
unicast
unknown multicast
packet
A packet for which no forwarding entry is found in the multicast forwarding table.
uplink
A transmission channel through which radio signals or other signals are transmitted to
the central office.
uplink tunnel
upper limit
A maximum consumption amount that a carrier sets for a subscriber in a bill cycle. If
the consumption amount if a subscriber exceeds the maximum consumption amount, the
OCS system deducts only the maximum consumption amount from the account of the
subscriber.
upstream
In an access network, the direction that is far from the subscriber end of the link.
upstream board
A board that provides the upstream transmission function. Through an upstream board,
services can be transmitted upstream to the upper-layer device.
usage parameter
control (UPC)
During communications, UPC is implemented to monitor the actual traffic on each virtual
circuit that is input to the network. Once the specified parameter is exceeded, measures
will be taken to control. NPC is similar to UPC in function. The difference is that the
incoming traffic monitoring function is divided into UPC and NPC according to their
positions. UPC locates at the user/network interface, while NPC at the network interface.
user-to-network
interface (UNI)
The interface between user equipment and private or public network equipment (for
example, ATM switches).
V
V-NNI
V-UNI
V.24
The physical layer interface specification between DTE and DCE defined by the ITUT. It complies with EIA/TIA-232.
VAS
VB
virtual bridge
VBR
VC trunk
VCC
VCCV
VCG
Issue 01 (2013-12-30)
192
A Glossary
VCI
VCTRUNK
A virtual concatenation group applied in data service mapping, also called the internal
port of a data service processing board.
VIP
VLAN
VLAN mapping
A technology that enables user packets to be transmitted over the public network by
translating private VLAN tags into public VLAN tags. When user packets arrive at the
destination private network, VLAN mapping translates public VLAN tags back into
private VLAN tags. In this manner, user packets are correctly transmitted to the
destination.
One of the properties of the MST region, which describes mappings between VLANs
and spanning tree instances.
VLAN stacking
A technology that adds a VLAN tag to each incoming packet. The VLAN stacking
technology implements transparent transmission of C-VLANs in the ISP network to
realize the application of Layer 2 Virtual Private Network (VPN).
VP
VPI
VPLS
VPN
VRRP
VSI
Virtual Router
Redundancy Protocol
(VRRP)
value-added service
(VAS)
A service provided by carriers and service providers (SPs) together for subscribers based
on voice, data, images, SMS messages, and so on. Communication network technologies,
computer technologies, and Internet technologies are used to provide value-added
services.
variable bit rate (VBR) One of the traffic classes used by ATM (Asynchronous Transfer Mode). Unlike a
permanent CBR (Constant Bit Rate) channel, a VBR data stream varies in bandwidth
and is better suited to non real time transfers than to real-time streams such as voice calls.
virtual channel
connection (VCC)
A VC logical trail that carries data between two end points in an ATM network. A pointto-multipoint VCC is a set of ATM virtual connections between two or multiple end
points.
virtual circuit
virtual concatenation
group (VCG)
A group of co-located member trail termination functions that are connected to the same
virtual concatenation link.
Issue 01 (2013-12-30)
193
A Glossary
virtual container trunk The logical path formed by some cascaded VCs.
(VC trunk)
virtual fiber
The fiber that is created between different devices. A virtual fiber represents the optical
path that bears SDH services in a WDM system.
A bundle of virtual channels, all of which are switched transparently across an ATM
network based on a common VPI.
The field in the Asynchronous Transfer Mode (ATM) cell header that identifies to which
virtual path the cell belongs.
A type of point-to-multipoint L2VPN service provided over the public network. VPLS
enables geographically isolated user sites to communicate with each other through the
MAN/WAN as if they are on the same LAN.
virtual user-network
interface (V-UNI)
voltage drop
The voltage developed across a component or conductor by the flow of current through
the resistance or impedance of that component or conductor.
W
WCDMA
WDM
WFQ
WLAN
WRED
WRR
WTR
Web LCT
Wideband Code
Division Multiple
Access (WCDMA)
A standard defined by the ITU-T for the third-generation wireless technology derived
from the Code Division Multiple Access (CDMA) technology.
The number of minutes to wait before services are switched back to the working line.
wavelength
The distance between successive peaks or troughs in a traveling wave, that is, the distance
over which a wave is transmitted within a vibration period.
weighted random early A packet loss algorithm used for congestion avoidance. It can prevent the global TCP
detection (WRED)
synchronization caused by traditional tail-drop. WRED is favorable for the high-priority
packet when calculating the packet loss ratio.
Issue 01 (2013-12-30)
194
A Glossary
A hybrid of the computer network and the wireless communication technology. It uses
wireless multiple address channels as transmission media and carriers out data interaction
through electromagnetic wave to implement the functions of the traditional LAN.
working path
working service
wrapping
A protection switching mode defined in ITU-T G.8132, which is applicable to packetbased T-MPLS ring networks and similar to SDH two-fiber bidirectional multiplex
section protection (MSP). In this mode, the switching is triggered by the node that detects
a failure. For details, see ITU-T G.841.
X
X.21
ITU-T standard for serial communications over synchronous digital lines. It is mainly
used in Europe and Japan.
X.25
A data link layer protocol. It defines the communication in the Public Data Network
(PDN) between a host and a remote terminal.
Y
Y.1731
Issue 01 (2013-12-30)
The OAM protocol introduced by the ITU-T. Besides the contents defined by
IEEE802.1ag, ITU-T Recommendation Y.173 also defines the following combined
OAM messages: Alarm Indication Signal (AIS), Remote Defect Indication (RDI),
Locked Signal (LCK), Test Signal, Automatic Protection Switching (APS), Maintenance
Communication Channel (MCC), Experimental (EXP), and Vendor Specific (VSP) for
fault management and performance monitoring, such as frame loss measurement (LM),
and delay measurement (DM).
195