Está en la página 1de 625

The privilege of HCNA/HCNP/HCIE:

With any Huawei Career Certification, you have the privilege on http://learning.huawei.com/en to enjoy:
n
1e-Learning Courses Logon http://learning.huawei.com/en and enter Huawei Training/e-Learning
/e

o m
If you have the HCNA/HCNP certificateYou can access Huawei Career Certification and Basic Technology e-Learning
courses.
e i .c
If you have the HCIE certificate: You can access all the e-Learning courses which marked for HCIE Certification Users.

aw

Methods to get the HCIE e-Learning privilege : Please associate HCIE certificate information with your Huawei account, and

hu

email the account to Learning@huawei.com to apply for HCIE e-Learning privilege.


g .
2 Training Material Download
i n

arn
Content: Huawei product training material and Huawei career certification training material.

//le
MethodLogon http://learning.huawei.com/en and enter Huawei Training/Classroom Training ,then you can download
training material in the specific training introduction page.
p :
3 Priority to participate in Huawei Online Open Class (LVC)
t t

s :h
The Huawei career certification training and product training covering all ICT technical domains like R&S, UC&C, Security,

4Learning Tools: rc e
Storage and so on, which are conducted by Huawei professional instructors.

s o
eNSP Simulate single Router&Switch device and large network.

R e
WLAN Planner Network planning tools for WLAN AP products.

n g
In addition, Huawei has built up Huawei Technical Forum which allows candidates to discuss technical issues with Huawei experts ,

ni
share exam experiences with others or be acquainted with Huawei Products.

a r
Statement:
L e
r e
This material is for personal use only, and can not be used by any individual or organization for any commercial purposes.
o
M
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential 1
Basic Optical Communications Technology P-1

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Content :
t t
:h
1. Preparatory Knowledge4

e s
2. Optical Fiber 8

r c
3. Passive components26

ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-2

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-3

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-4

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-5

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Light rays propagate within different media at a different velocities. The characteristics

:h
that describes property of a media is called refractive index.

e s
Refractive index n is determined by the following formula: n=/.

r c
In figure1: 1 is the angle of incidence, 3 is the angle of reflection, and 2 is the angle of

ou
refraction. The relationship among these angles depends on the medium the light rays

es
strikes: 1=3, n1 sin1=n2 sin2.
R
In figure2: When the angle of incidence reaches a value, the refraction angle equals
g

ni n
90, the light will not enter another medium (air in this example), and the angle of

r
incidence then is called the critical angle c. If we continue to increase the angle of
a
e
incidence to make c, all light will be reflected back into the incident medium. This

e L phenomenon is called total reflection because all light is reflected back to the medium of

or
incidence.

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-6

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Light is a kind of transverse wave, that is, the direction of vibration of the electromagnetic

:h
field of light is vertical to the direction of propagation. If the direction of vibration of light

s
wave remains constant, and the amplitude of the light wave varies with phase, such light is
e
c
called linearly polarized light.
r

ou
In the propagation course of natural light, light intensity varies with the direction of

es
vibration due to external influence, and light intensity at a direction prevails over that at

R
other directions. Such light is called partially polarized light.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-7

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The material of the prism (glass) or water has different indices of refraction (n) for light of

:h
different wavelengths (corresponding to different colors). As a result, the propagation

s
velocity and the refractive angle of the light differ and lights of different colors spread
e
across the space.
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-8

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-9

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-10

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Fiber is of cylindrical form and consists of the core, cladding and coating.

:h
Core is lying at the center of the fiber, it is made from high purity silicon dioxide, mixing

e s
with a small amount of doping agent to increase the refractive index (n1) of core.

r c
Cladding is around the core and is also made from high purity silicon dioxide mixing with a

ou
trivial amount of doping agent. The doping agent here is to reduce the refractive index

es
(n2) of the cladding and make it slightly lower than that of the core.
R
Step index fiber: the refractive indices of the core and cladding are evenly distributed along
g

ni n
the radius of the fiber, and the refractive rate changes abruptly at the interface between

r
the core and the cladding.
a

L e
Graded index fiber: the refractive index of the core is not constant, but reduces gradually
with the increase of the coordinate along the radius of core to the extent that it ultimately
e
or
equals the refractive index of the cladding.

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-11

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Light is propagated in the fiber as an independent group of light ray. In other words, we

:h
will find out, if we could look into the fiber, that a group of light beam propagates at

s
different angles ranging from zero to critical angle c. The light with an angle larger than
e
c
c will pass through the core into the cladding. These different light beams are modes.
r

ou
The mode of propagation strictly following the central axis of the fiber is called zero-order

es
mode, or fundamental mode; other beams which propagate along an angle from the

R
central axis are called high-order modes.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-12

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
When the size of the fiber (mainly the diameter of core d1) is far larger than the optical

:h
wavelength (about 1 micrometer), there will be tens of or even hundreds of transmission

s
modes in fiber. Such fiber is called multimode fiber.
e

r c
When the size of the fiber (mainly the diameter of core d1) is comparatively small and at
u
the same order of magnitude as the optical wavelength (e.g. d1 is within the range of 5 to
o
es
10 micrometers), the fiber allows only one propagation mode (fundamental mode) and

R
cuts off other high-order modes. Such fiber is called single-mode fiber.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-13

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Attenuation or loss is an important constraint factor of fiber for the propagation of optical

:h
signal. Loss of fiber restricts the propagation distance of optical signal without optical

s
amplification. Loss of fiber mainly depends on absorption loss, scattering loss and bending
e
loss.
r c

ou
Absorption loss of fiber results from the material of fiber, which includes ultraviolet

es
absorption, infrared absorption and impurity absorption.

R
Scattering loss resulting from the inhomogeneity of materials is called Rayleigh scattering
loss.
n g

r ni
Bending of fiber tends to cause radiation loss.

e a
Loss is one of major characteristics of fiber and the major parameter used to describe such

e L loss is attenuation coefficient.

or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-14

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Different frequencies and modes in the optical pulse have different group velocities.

:h
Therefore, these frequency components and modes reach the fiber terminals at different

s
time, and result in optical pulse stretching, which is the dispersion of fiber.
e

r c
Light beams of different modes in multimode fiber have different group velocities and they
u
have different time delays in transmission, dispersion arising from which is called mode
o
es
dispersion. Mode dispersion is mainly associated with multimode fiber.

R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-15

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Chromatic dispersion is the sum of material dispersion and waveguide dispersion. All two

:h
depend on wavelength. Chromatic dispersion is the different light speed in fiber according

s
to the light wavelength. In vacuum, the light propagate at the same speed, in a certain
e
c
medium, such as quartz crystal silicon dioxide, however, different wavelength has different
r
u
propagation speed. This diagram is the dispersion curve of the different SMF.
o
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-16

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Light can be polarized in vertical and horizontal. Because of geometric imperfection of the

:h
fiber. PMD is caused by slight fiber asymmetry. Different Polarization travel at different

s
speed. PMD is statistical in nature. Large variation in PMD values can be observed during
e
c
the life cycle of a fiber. Additional stress can be applied to a fiber during transportation
r
u
and cabling. Effects of temperature and vibration are still regarded as potential problem by
o
s
operator. Cable can be crushed, stressed, or physically damaged during installation. Cable
e
R
handling causes variations in PMD.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-17

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Optical pulse from LD is not monochromatic, it is composed of many wavelengths or

:h
colors. The chromatic dispersion in the fiber causes different wavelength to travel at

s
different speed, cause different of propagation delay, and, at the receiver, arrive at the
e
different time.
r c

ou
The adjacent optical pulse overlap. It causes inter-symbol interference and bit error.

es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-18

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
When actual wavelength is smaller than cutoff wavelength, there will be several modes

:h
transmitted in the SMF, thus assuming multimode characteristics. To avoid mode noise and

s
mode dispersion, the cutoff wavelength of the minimum fiber length of actual system fiber
e
c
should be smaller than the minimum operating wavelength of the system. Cutoff
r
u
wavelength conditions can ensure single-mode transmission in minimum fiber length,
o
s
inhibit the generation of high-order modes, or reduce the cost of generated high-order
e
R
mode noise power to such an extent that it can be neglected.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-19

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In fiber, not all luminous energy is transmitted via core, but some luminous energy is

:h
transmitted via cladding. MFD is the parameter used to describe the concentration of
luminous energy in SMF.
e s

r c
MFD and effective area mainly relate to the density of energy passing through the fiber.
u
The smaller the MFD, the greater the energy density passing through the cross section of
o
es
the fiber. Excessively large energy density of the fiber will lead to the non-linear effects,

R
lower the optical SNR, and greatly affect the system performance. Therefore, as for the

g
MFD (or effective area) of the transmission fiber, the larger the better.
n
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-20

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
G.652 fiber is one of the single-mode optical fiber defined by recommendation G.652. this

:h
fiber also be called conventional SMF. G.652 fiber has the zero-dispersion wavelength

s
around 1310nm and it is optimized for use in the 1310nm wavelength region. G.652 fiber
e
c
can also be used in 1550nm wavelength region.
r

ou
G.653 fiber, also known as dispersion shifted fiber (DSF), refers to the fiber whose zero

es
point of dispersion is close to 1,550nm. It is called so because its zero point of dispersion

R
has shifted compared with standard SMF (G.652).

n g
G.654 fiber refers to the SMF with shifted cutoff wavelength. Its is mainly applicable to

ni

submarine fiber communications where long regenerator section distance is required.

a r
e
G.655: DWDM system working at zero dispersion wavelength is easily subject to four-wave

e L mixing effect (as described in the following section), which seriously affects the system

or
performance. To avoid such effect, the zero point of dispersion will be shifted out of the
operating wavelength of DWDM close to 1550nm. This kind of fiber is non-zero dispersion
M shifted fiber (NZDSF).

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-21

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
All media are non-linear in nature. However, on most occasions, the non-linear

:h
characteristics are rather negligible to be perceived. However, the non-linear characteristics

s
of the fiber will become stronger and stronger when an optical amplifier or laser is
e
c
employed in the fiber communication system. The reason is that the optical signal of SMF
r
u
is confined to the mode field and the effective area of SMF is rather small. As a result,
o
s
optical power density is very high and such high power density will remain over a long
e
R
distance due to low loss.

n g
Non-linear effects of SMF is usually divided into: stimulated non-elastic scattering, Kerr

ni
effect and four-wave mixing.
r
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-22

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Assume that the frequency of incident light is 1, and the molecular vibration frequency of

:h
the medium is v, then the frequency of scattered light s=1-v and as=1+v. This

s
phenomenon is called stimulated Raman scattering.
e

r c
Stimulated Brillouin scattering is very similar to stimulated Raman scattering in the physical
u
process. The pump with the incident frequency of p transfers part of the energy to the
o
es
Stokes wave with the frequency of s, and emits phonons with the frequency of .

R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-23

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
We call the phenomenon that the refractive index of a medium changes with the variation

:h
of light intensity Kerr effect. In a single-mode fiber, Kerr effect appears as self-phase

s
modulation and cross phase modulation.
e

r c
Due to Kerr effect, an instant change of signal light intensity tends to lead to the phase
u
change of optical pulse. This effect is called self-phase modulation (SPM).
o

es
In a multi-channel system, when changes of the light intensity cause phase changes, the
R
phase modulation will generally broaden the signal spectrum as a result of interaction

n g
between adjacent channels. The extent of spectrum broadening caused by XPM is related

ni
to the channel spacing.
r
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-24

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The frequency of the new wavelength is the combination of the tree, as shown in the

:h
following formula: flnm=flfnfm.

e s
occurrence of FWM requires phase match of signal lights. When various signal lights are

r c
transmitted near zero dispersion of the fiber, the group velocities of optical signals with
u
different wavelengths are nearly the same. Therefore, the phase match condition is quite
o
es
easy to satisfy, and thus FWM effect is likely to occur.

R
FWM effect is much more serious on a G.653 fiber than on G.652 and G.655 fibers, and

n g
the transmission loss caused thereby is bigger. Appropriate dispersion can suppress the

ni
occurrence of FWM.
r
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-25

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-26

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-27

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-28

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
A dielectric thin film filter is composed of several dozens of layers of dielectric films with

:h
different materials, different refractive indices and different thickness.

e s
film interfering filter can provide a pass band to a certain range of wavelengths, and

r c
provide a block band to other wavelengths, so as to form the filter characteristics as
required.
ou

es
The main characteristics of the dielectric thin film filter are: a miniaturized device with
R
stable structure, flattened and polarization independent signal pass band, low insertion

n g
loss, reasonable path interval and stable temperature which is better than 0.0005nm/C.

r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-29

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Fiber grating is formed by means of manual introduction of a periodic refractive index

:h
variation along the length of a section of fiber. Fiber grating is a space phase fiber grating

s
formed in the core by means of the optical sensitivity of the fiber material (the permanent
e
c
change of refractive index caused by the interaction between the external incident photons
r
with the core).
ou

es
According to the distribution mode of the refractive index on the fiber axial direction, the

R
fiber grating can be divided into uniform grating and non-uniform grating. Uniform

g
grating refers to the grating with constant optical cycle (the product of the effective
n
ni
refractive index and the refractive index modulation depth) along the fiber axial direction,
r
a
such as Bragg grating and long-cycle grating. Non-uniform grating refers to the grating
e
e L with optical cycle varies along the fiber axial direction, such as chirped grating

or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-30

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Arrayed waveguide grating (AWG) is a plane waveguide device on the basis of optical

:h
integration technology. The typical manufacturing process is to d brought into the lab for

s
eposite a layer of thin silica glass on a piece of silica, and then form the pattern and shape
e
c
by means of the optical scoring technology.
r

ou
The AWG optical multiplexer/demultiplexer features small wavelength interval, large

es
number of channels and flattened passband etc., making it very suitable for the superhigh-

R
speed and large-capacity DWDM system.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-31

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The basic working principle of this device is shown in the figure above. Input light with an

:h
interval of 50G can be divided into odd and even groups by means of an interleaver with

s
an interval of 50G, with the interval of each group being 100G; and then the input light is
e
c
divided into four groups with an interval of 200G by means of two interleavers with an
r
u
interval of 100G; finally, the input light is demultiplexed by means of a common
o
s
demultiplexer with an interval of 200G. Of course, at the second stage, the input light can
e
R
be demultiplexed into a single-wavelength optical signal directly by means of an AWG or a

g
thin film filter with an interval of 100G.
n

r ni
By means of this device, the toll trunk can be conveniently upgraded to the DWDM system

a
with an interval of 50G, without wasting the existing multiplexer and demultiplexer with
e
e L an interval of 100G, thus it is cost efficient.

or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-32

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Optical coupler is a device for combining the lights from different fibers; and optical

:h
splitter, just as it name implies, is a device for splitting the optical signals to several fibers.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-33

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In fiber-optic communication links, light is reflected from any components -connector,

:h
passive device and receiver and so on inserted into the optical path. If the backreflection

s
light enters a laser or optical amplifier, the performance of this device will degrade. Isolator
e
c
is to isolate the laser or optical amplifier from the reflected light. The isolator must allow
r
u
the forward light pass through with minimal loss (ideally, 0), and block backreflection light
o
s
with maximum loss (ideally, infinity). Insertion loss of a modern isolator can be as low as
e
R
0.15dB, while isolation can be as high as 70dB.

n g
Circulator is a kind of one way device. It direct a light signals from one port to another

ni
sequentially in only one direction. The light inputted from port1 can be only outputted
r
a
from port2 (isolation between port1 and port2); the light inputted from port2 can be only
e
e L outputted from port3; and the light inputted from port3 can be only outputted from port1

or
.

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-34

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
It is the basic device for optical communication, the optical switches have many

:h
applications. These applications mainly include:

e s
Automatic protection switch: In the case of fiber broken or sending device failure, the

r c
optical switch can be used to realize the protective switchover. The signals are switched to
u
the standby protection fiber or transmitter through the optical switch. This is the most
o
es
basic application of the optical switch, which is generally realized by a 12 or 1N switch.

R
Dynamic Optical Add/Drop Multiplexer (OADM): The dynamic OADM can add/drop one

n g
wavelength from multiple wavelengths without OEO conversion. In the future, the

ni
dynamic OADM will be applied to both long-haul system and MAN, especially applied to
r
a
the MAN to construct ring network. Optical switch is not mandatory for OADM. However,
e
e L the OADM with optical switch can be switched to optical channel flexibly, and provides

or
dynamic upload and download functions, that means, the selected wavelengths to be
downloaded can be done through software intervention. To meet the network
M requirements, OADM can be connected with 22 optical switch or 1616 optical switch
(for MAN) or 6464 (for toll trunk).
Optical cross connection (OXC): It represents a new core technology in the network. OXC
means the high density network and any end-to-end optical cross connection. It can
implement many functions, from simple network protection to dynamic optical path
management.

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-35

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
Answer:
t t
:h
1) Dielectric Thin Film Filter
2) Fiber Grating
e s
3)
r c
Arrayed Waveguide Grating-AWG

ou
4) Comb Filter

es
5)
R
Optical Coupler and Optical Splitter
6)
g
Isolator and Circulator
n
7)
r ni
Optical Switch

a
For their functions, please refer to the above contents.
e
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-36

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Basic Optical Communications Technology P-37

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-1

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
Contents
t t
:h
SDH Overview.........Page3

e s
Frame Structure & Multiplexing Methods...Page11

r c
Overheads & Points......Page26

ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-2

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-3

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-4

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
SDH is the abbreviation of Synchronous Digital Hierarchy.

:h
SDH is a transmission system (protocol) which defines the characteristic of digital signals,

e s
including frame structure, multiplexing method, digital rates hierarchy, and interface code
pattern, and so on.
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-5

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
PDH (Plesiochronous Digital Hierarchy) electrical interfaces

:h
There are only some regional standards: European Series, North American Series

s
and Japanese Series, instead of universal standards for electrical interface. Each of
e
c
them has different electrical interface rate levels, frame structures and multiplexing
r
u
methods. This makes it difficult for international interconnection.
o
PDH optical interfaces
es

R
No universal standards for optical interfaces. All PDH equipment manufacturers use

g
their own line codes to monitor the transmission performance in the optical links.
n
ni
So equipment at the two ends of a transmission link must be provided by the same

a rvendor. This causes many difficulties for network structuring, management and

L e network interconnection.
SDH electrical interfaces
e

or SDH system provides universal standards for network node interfaces (NNI),

M including standards on digital signal rate level, frame structure, multiplexing


method, line interface, etc. So SDH equipment of different vendors can be easily
interconnected.
SDH optical interfaces
Line interfaces (here refers to optical interface) adopt universal standards. Line
coding of SDH signals is only universal scrambling. Therefore the opposite-terminal
equipment can be interconnected with SDH equipment of different vendors via
standard descrambler alone.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-6

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
As PDH system adopts asynchronous multiplexing method, the locations of the low-rate

:h
signals are not regular nor fixed when they are multiplexed into higher-rate signals. That is

s
to say, the locations of the lower signals are unable to be identified from the higher speed
e
c
signals. Therefore, low-rate signals can not be directly added/dropped from PDH high-rate
r
u
signals. For example, 2Mb/s signals can not be directly added/dropped from 140Mb/s
o
s
signals. Here arise two problems:
e

R
Adding/dropping low-rate signals from high-rate signals must be conducted level

g
by level. This not only enlarges the size and increases cost, power consumption and
n
r ni
complexity of equipment, but also decreases the reliability of the equipment.

e

a Since adding/dropping low-rate signals to high-rate ones must go through many

e L stages of multiplexing and de-multiplexing, impairment to the signals during

or
multiplexing/de-multiplexing processes will increase and transmission performance
will deteriorate. This is unbearable in large capacity transmission. That's the reason
M why the transmission rate of PDH system has not being improved further.
No universal network management interface in PDH system
Different parts of the network may use different network management systems,
which are obstacles in forming an integrated telecommunication management
system (TMN).

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-7

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
As low-rate SDH signals are multiplexed into the frame structure of high-rate SDH signals

:h
via byte interleaved multiplexing method, their locations in the frame of high-rate SDH

s
signal are fixed and regular, or say, predictable. Therefore, low-rate SDH signals, e.g.
e
c
155Mb/s, (Synchronous Transport Module STM-1 ), can be directly added to or dropped
r
u
from high-rate signals, e.g., 2.5Gb/s (STM-16 ). This simplifies the multiplexing and de-
o
s
multiplexing processes of signals and makes SDH hierarchy especially suitable for high rate
e
R
and large capacity optical fiber transmission systems.

n g
As synchronous multiplexing method and flexible mapping structure are employed, PDH

ni
low-rate tributary signals (e.g., 2Mb/s ) can also be multiplexed into SDH signal frame
r
a
(STM-N). Their locations in STM-N frame are also predictable. So low-rate tributary signals
e
e L can be directly added to or dropped from STM-N signals. Note that this is different from

or
the above process of directly adding/dropping low-rate SDH signals to/from high-rate SDH
signals. Here it refers to direct adding/dropping of low-rate tributary signals, such as 2Mb/s,

M 34Mb/s, and 140Mb/s, to/from SDH signals. This saves lots of multiplexing/de-multiplexing
equipment (back-to-back equipment), enhances reliability, and reduces signal impairment,
and the cost, power consumption and complexity of the equipment. Adding/dropping of
services is further simplified.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-8

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
PDH OAM function
t t
:h
In the frame structure of PDH signals, there are few overhead bytes used for

e s
operation, administration and maintenance (OAM). The fact that few overhead

r c
bytes are used for the OAM of PDH signals is also a disadvantage for layered
u
management, performance monitoring, real-time service dispatching, bandwidth
o
es
control, and alarm analyzing and locating of the transmission network.
SDH OAM function R
n g
ni
Abundant overhead bits for operation, administration and maintenance (OAM)

a rfunctions are arranged in the frame structures of SDH signals. This greatly enforces

e
the network monitoring function, i.e. automatic maintenance. Some redundancy

e L bits must be added during line coding for line performance monitoring because

or
few overhead bytes are arranged in PDH signals. For example, in the frame
structure of PCM30/32 signals, only the bits in TS0 and TS16 time slots are used for
M OAM function.
The abundant overheads in SDH signals account for 1/20 of the total bytes in a
frame. It greatly enhances the OAM function and reduces the cost of system
maintenance that occupies most of the overall cost of telecommunication
equipments. The overall cost of SDH system is less than that of PDH system and
estimated to be only 65.8% of that of the later.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-9

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
SDH has high compatibility, which means that the SDH transmission network and the

:h
existing PDH transmission network can work together while establishing SDH transmission

s
network. SDH network can be used for transmitting PDH services, as well as signals of
e
c
other hierarchies, such as asynchronous transfer mode (ATM) signals and FDDI signals.
r

ou
How does the SDH transmission network achieve such compatibility? The basic transport

es
module (STM-1) of SDH signals in SDH network can accommodate three PDH digital signal

R
hierarchies and other hierarchies such as ATM, FDDI and DQDB. This reflects the forward

g
and backward compatibility of SDH and guarantees smooth transitions from PDH to SDH
n
ni
network and from SDH to ATM.
r

e a
How does SDH accommodate signals of these hierarchies? It simply multiplexes the low-

e L rate signals of different hierarchies into the frame structure of the STM-1 signals at the

or
boundary of the network (e.g. SDH/PDH start point) and then de-multiplexes them at the
boundary of the network (end point). In this way, digital signals of different hierarchies can
M be transmitted in the SDH transmission network.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-10

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Low bandwidth utilization ratio
t t
:h
One significant advantage of SDH is that system reliability is greatly enhanced

e s
(highly automatic OAM) since many overhead bytes for OAM function are

r c
employed in SDH signals. To transmit the same amount of valid information, PDH
u
signals occupy less frequency bandwidth (transmission rate) than SDH signals, i.e.
o
es
PDH signals use lower rate. In other words, STM-1 occupies a frequency bandwidth

R
larger than that needed by PDH E4 signals (they have the same amount of

g
information).
n

r ni
Complex mechanism of pointer justification

e

a The pointer constantly indicates the location of low-rate signals so that specific

e L low-rate signals can be properly de-multiplexed in time of "unpacking". However,

or
the pointer function increases the complexity of the system. Most of all, it
generates a kind of special jitter in SDH system ---- a combined jitter caused by
M pointer justification. This jitter will deteriorate the performance of low-rate signals
being de-multiplexed.
Influence of excessive use of software on system security
One of the features of SDH is its highly automatic OAM, which means that
software constitutes a large proportion in the system. As a result, SDH system is
vulnerable to computer viruses, manual mis-operation and software fault on
network layer.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-11

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-12

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
ITU-T defines the frames of STM-N as rectangle block frame structure in unit of byte (8bit).

:h
The frame structure of STM-N signals is 9 rows 270N columns. The N here is equal to

e s
the N in STM-N, ranging from 1, 4, 16, 64, and 256. The N indicates that this signal is

r c
multiplexed by N STM-1 signals via byte interleaved multiplexing. This explains that the
u
frame structure of STM-1 signals is a block structure of 9 rows 270 columns. When N
o
es
STM-1 signals are multiplexed into STM-N signal via byte interleaved multiplexing, only the

R
columns of STM-1 signals are multiplexed via byte interleaved multiplexing. While the

g
number of rows remains constantly to be 9. It is known that signals are transmitted bit-by-
n
ni
bit in lines. Then what is the sequence of transmission? The principle for SDH signal frame
r
a
transmission is: the bytes (8-bit) within the frame structure is transmitted bit-by-bit from
e
e L left to right and from top to bottom. After one row is transmitted, the next row will follow.

or
After one frame is completed, the next frame will start.
ITU-T defines the frequency to be 8000 frames per second for all levels in STM hierarchy.
M That means the frame length or frame period is a constant value of 125us. Constant frame
period is a major characteristic of SDH signals. The constant frame period makes the rates
of STM-N signals regular. For example, the data rate of STM-4 transmission is constantly 4
times as that of STM-1, and STM-16 is 4 times of STM-4 and 16 times of STM-1. Such
regularity of SDH signals makes it possible to directly add/drop low-rate SDH signals
to/from high-rate SDH signals, especially for high-capacity transmission.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-13

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
The frame of STM-N consists of three parts
t t
:h
Section Overhead (including Regenerator Section Overhead --- RSOH and Multiplex

e s
Section Overhead ---- MSOH)

r c
Administrative Unit Pointer---- AU-PTR
u

s o
Information Payload

Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-14

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The Information Payload is a place in the STM-N frame structure to store various

:h
information code blocks to be transmitted by STM-N. It functions as the "wagon box" of

s
the truck---STM-N. Within the box are packed low-rate signals ---- cargoes to be shipped.
e
c
To monitor the possible impairment to the cargoes (the packed low-rate signals) on a real-
r
u
time basis during transmission, supervisory overhead bytes ---- Path Overhead (POH) bytes
o
s
are added into the signals when the low-rate signals are packed. As one part of payload,
e
R
the POH, together with the information code blocks, is loaded onto STM-N and

g
transmitted on the SDH network. The POH is in charge of monitoring, administrating and
n
ni
controlling (somewhat similar to a sensor) the path performances for the packed cargoes

a r
(the low-rate signals).

L e
What is a path? Let's take the following example. STM-1 signals can be demultiplexed into

e
or
63 2Mb/s signals. In other words, STM-1 can be regarded as a transmission path divided
into 63 bypaths. Each bypath, which is equal to a low-rate signal path, transmits

M corresponding low-rate signals. The function of the Path Overhead is to monitor the
transmission condition of these bypaths. The 63 2Mb/s paths multiplex and form the path
of STM-1 signals that can be regarded as a "section" here. Paths refer to corresponding
low-rate tributary signals. The function of POH is to monitor the performance of these low-
rate signals transmitted via the STM-N on the SDH network. This is consistent with the
analogy in which the STM-N signal is regarded as a truck and the low-rate signals are
packed and loaded onto the truck for transmission.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-15

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The Section Overhead (SOH) refers to the auxiliary bytes which is necessary for network

:h
operation, administration and maintenance (OAM) to guarantee normal and flexible

s
transmission of Information Payload. For example, the Section Overhead can monitor the
e
c
impairment condition of all "cargoes" in STM-N during transmission. The function of POH
r
u
is to locate the certain impaired cargo in case impairments occurred. SOH implements the
o
s
overall monitoring of cargoes while the POH monitors a specific cargo.
e

R
The Section Overhead is further classified into Regenerator Section Overhead (RSOH) and

g
Multiplex Section Overhead (MSOH). They respectively monitor their corresponding
n
ni
sections and layers. Then, what's the difference between RSOH and MSOH? In fact, they
r
a
have different monitoring domains. For example, if STM-16 signals are transmitted in the
e
e L fiber, the RSOH monitors the overall transmission performance of STM-16 while the MSOH

or
monitors the performances of each STM-1 of the STM-16 signals.
RSOH, MSOH and POH provide SDH signals with monitoring functions for different layers.
M For a STM-16 system, the RSOH monitors the overall transmission performance of the
STM-16 signal; the MSOH monitors the transmission performances of each STM-1 signal;
and the POH monitors the transmission performances of each packaged low-rate tributary
signal (e.g. 2Mb/s) in STM-1. Through these complete monitoring and management
functions for all levels, you can conveniently conduct macro (overall) and micro (individual)
supervision over the transmission status of the signal and easily locate and analyze faults.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-16

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The Administrative Unit Pointer within column 9 N of row 4 of the STM-N frame is 9

:h
N bytes in total. What's the function of AU-PTR? We have mentioned before those low-

s
rate tributaries (e.g. 2Mb/s) could be added/dropped directly from high-rate SDH signals.
e
c
Because the locations of low-rate signals within a high-rate SDH frame structure are
r
u
predictable, i.e. regular. The predictability can be achieved via the pointer overhead bytes
o
s
function in the SDH frame structure. The AU-PTR indicates the exact location of the first
e
R
byte of the information payload within the STM-N frame so that the information payload

g
can be properly extracted at the receiving end according to the value of this location
n
ni
indicator (the value of the pointer). Let's make it easier. Suppose that there are many

a r
goods stored in a warehouse in unit of pile. Goods (low-rate signals) of each pile are

L e
regularly arranged (via byte interleaved multiplexing). We can locate a piece of goods

e within the warehouse by only locating the pile this piece of goods belongs to. That is to

or say, as long as the location of the first piece of goods is known, the precise location of any

M piece within the pile can be directly located according to the regularity of their
arrangement. In this way you can directly carry (directly add/drop) a given piece of goods
(low-rate tributary) from the warehouse. The function of AU-PTR is to indicate the location
of the first piece of goods within a given pile.
In fact, the pointer is further classified into higher order pointer and low order pointer. The
higher order pointer is AU-PTR while the lower order pointer is TU-PTR (Tributary Unit
Pointer). The function of TU-PTR is similar to that of AU-PTR except that the former
indicates smaller "piles of goods".

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-17

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
SDH multiplexing includes three types: multiplexing of lower-order SDH signals into higher-

:h
order SDH signals and multiplexing of low-rate tributary signals (e.g. 2Mb/s, 34Mb/s and

s
140Mb/s) into SDH signals ----STM-N, and other hierarchy signals to SDH Signals.
e

r c
The second type of multiplexing from Low to high rate SDH signals is conducted
u
mainly via byte interleaved by multiplexing four into one, e.g. 4STM-1-->STM-4
o
es
and 4STM-4-->STM-16. after the multiplexing, the rate of the higher-level STM-N

R
signals is 4 times that of the next lower-level STM-N signals. During the byte

g
interleaved multiplexing, the information payload, pointer bytes of each frame are
n
r ni
multiplexed via interleaved multiplexing based on their original values.

e

a The second type of multiplexing is mostly used for multiplexing of PDH signals into

e L the STM-N signals.

or
The last one is other hierarchy signals e.g. IP or ATM signals to SDH Signals.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-18

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
ITU-T defined a complete multiplexing structure, through which digital signals of three

:h
PDH hierarchies can be multiplexed into STM-N signals.

e s
This multiplexing structure includes some basic multiplexing units: C - Container,

r c
VC - Virtual Container, TU - Tributary Unit, TUG - Tributary Unit Group, AU -
u
Administrative Unit, and AUG - Administrative Unit Group. The suffixes of these
o
es
multiplexing units denote their corresponding signal levels.

R
The multiplexing route used in a country or an area must be unique. The route on
g

n
the slide is the most usual and adopted in most of countries.

ni

a r
Low-rate tributaries are multiplexed into STM-N signals through three procedures:

e
mapping, aligning and multiplexing.

e L SDH mapping is a procedure by which tributaries are adapted into virtual

or
containers at the boundary of an SDH network, e.g. E1 into VC-12.

M SDH aligning is a procedure to add TU-PTR or AU-PTR into the VC-12, VC-3 or VC4.
The pointer value constantly locates the start point of VC within the TU or AU. So
that the receiving end can correctly separate the corresponding VC.
SDH multiplexing, a relatively simple concept, is the procedure by which the TUs
are organized into the higher order VC or the AUs are organized into STM-N via
byte interleaving.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-19

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
From 140Mb/s to C4
t t
:h
First, the 140Mb/s PDH signals are adapted via bit rate justification (bit stuffing

s
method) into C-4, which is a standard information structure used to accommodate
e
c
140Mb/s PDH signals. After being processed via bit rate justification techniques,
r
u
service signals of various rates involved in SDH multiplexing must be loaded into a
o
es
standard container corresponding to the rate level of the signal: 2Mb/s---C-12,
34Mb/s---C-3 and 140Mb/s---C-4. The main function of a container is for bit rate
R
justification. The frame structure of C-4 is block frame in unit of bytes, with the

n g
ni
frame frequency of 8000-frame per second.

a r
From C4 to VC4

L e A column of path overhead bytes (higher-order path overhead VC-4-POH) shall be


added in front of the C-4 block frame during multiplexing in order to monitor the
e
or
140Mb/s path signals. Then the signals become a VC-4 information structure. The
virtual container, a kind of information structure whose integrity is always
M maintained during transmission on the SDH network, can be regarded as an
independent unit (cargo package). It can be flexibly and conveniently
added/dropped at any point of the path for synchronous multiplexing and cross-
connection processing. Now you might get the idea that VC-4 is in fact the
information payload of the STM-1 frame. The process of packing PDH signals into
C and adding the corresponding path overhead to form the information structure
of VC is called mapping.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-20

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
From VC4 to AU4
t t
:h
By adding an Administrative Unit Pointer --- AU-PTR before the VC-4, the signal is

e s
changed from VC-4 into another information structure--- Administrative Unit AU-4.

r c
The function of AU-PTR is to indicate the location of the higher order VC within the
u
STM frame. Under the pointer function, the higher order VC is allowed to "float"
o
es
within the STM frame, i.e. the frequency offsets and phase differences to a certain

R
degree between VC-4 and AU-4 are tolerable. Because the AU-PTR is outside of the

g
payload area and co-located with the section overhead instead. This guarantees
n
r ni
that the AU-PTR can be accurately found in the corresponding location. Then the

e a VC-4 can be localized by the AU pointer and disassembled from STM-N signals.

e L From AU4 to AUG (N)

or
One or more AUs with fixed locations within the STM frame form an AUG ----
Administrative Unit Group. The location of the first byte of the VC-4 with respect
M to the AU-4 pointer is given by the pointer value. The AU-4 is placed directly in the
AUG.
From AUG (N) to STM-N
The last step is to add corresponding SOH to AU-4 to form STM-N signals. During
being multiplexed, the N AUGs are one-byte interleaved into this structure and
have a fixed phase relationship with respect to the STM-N.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-21

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
From 34Mb/s to C3
t t
:h
Similarly, 34Mb/s signals are first adapted into the corresponding standard

e s
container -- C-3 through bit rate justification.
From C3 to VC3
r c
ou
After adding corresponding POH, the C-3 is packed into VC-3 with the frame
s

e
structure of 9 rows 85 columns.
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-22

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
From VC3 to TU3
t t
:h
For the convenience of locating VC-3 at the receiving and separating it from the

e s
high-rate signals, a three-byte pointer, TU-PTR (Tributary Unit Pointer), is added to

r c
the VC-3 frame. Then what is the function of a tributary pointer? The TU-PTR is
u
used to indicate the specific location of the first byte of the lower order VC within
o
es
the tributary unit TU. It is similar to an AU-PTR that indicates the location of the

R
first byte of the VC-4 within the STM frame. Actually, the operating principles of

g
these two kinds of pointers are similar.
n

r ni
From TU3 to TUG3

e

a The TU-3 frame structure is incomplete. First fill the gap to form the frame

e L structure of TUG3.

or
From TUG3 to C4, VC4 and STM-N

M Three TUG-3 can be multiplexed into the C-4 signal structure via byte interleaved
multiplexing method. The TUG-3 is a 9-row by 86-column structure. Two columns
of stuffed bits are added to the front of the composite structure of 3 TUG-3 to
form a C-4 information structure.
The last step is to multiplex C-4 into STM-N. This is similar to the process of
multiplexing 140Mb/s signals into STM-N signals: C-4-->VC-4-->AU-4-->AUG--
>STM-N.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-23

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
At present, the most frequently used multiplexing method is multiplexing of 2Mb/s signals

:h
into STM-N signals. It is also the most complicated method of multiplexing PDH signals
into SDH signals.
e s
From 2Mb/s to C12
r c
ou
First, the 2Mb/s signal shall be adapted into the corresponding standard container
s

From C12 to VC12 Re


C-12 via rate adaptation.

ni n
To monitor on a real-time basis the performance of each 2Mb/s path signal during

a rtransmission on SDH network, C-12 must be further packed ---- adding

L e corresponding path overhead (lower order overhead)---- to form a VC-12


information structure. The LP-POH (lower order path overhead) is added to the
e
or
notch in the top left corner of each basic frame. Since the VC can be regarded as

M
an independent entity, dispatching of 2Mb/s services later is conducted in unit of
VC-12.
From VC12 to TU12
For correct aligning of VC-12 frames in the receiving end, a four-byte TU-PTR is
added to the four notches of the VC-12 multi-frame. Then the information
structure of the signal changes into TU-12 with 9 rows4 columns. The TU-PTR
indicates the specific location of the start point of the first VC-12 within the multi-
frame.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-24

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
From TU12 to TUG2
t t
:h
Three TU-12 forms a TUG-2 via byte interleaved multiplexing. The TUG-2 has the

e s
frame structure of 9 rows by 12 columns.
From TUG2 to TUG3
r c
ou
Seven TUG-2 can be multiplexed into a TUG-3 information structure via byte
s

Re
interleaved multiplexing. Note that this information structure formed by the 7
TUG-2 is 9-row by 84-column. Two rows of fixed stuff bits shall be added in front

n g
ni
of the structure. The TUG-3 is a 9-row by 86-column structure with the first two

a rcolumns of fixed stuff.


L e
From TUG3 to C4, VC4 and STM-N

e The procedures of multiplexing the TUG-3 information structure into STM-N are

or

the same as mentioned before.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-25

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
The frame of STM-N consists of three parts
t t
:h
Section Overhead (including Regenerator Section Overhead ---- RSOH and

e s
Multiplex Section Overhead ---- MSOH)

r c
Administrative Unit Pointer---- AU-PTR
u

s o
Information Payload with POH

Re
There are 9 rows and 270N columns in the STM-N frame, which will be transmitted 8000

g
times per second. Here the value of N equals to 4 for STM-4.

n
ni
9 (rows) X 270 X 4 (columns) X 8 (bits) X 8000 (frame/second) = 622080000

a rbits/second. It is so called 622 Mbits/s

L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-26

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-27

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
As mentioned before, the functions of overhead are to implement layered monitoring

:h
management for SDH signals. The monitoring is classified into section layer monitoring and

s
path layer monitoring. The section layer monitoring is further classified into regenerator
e
c
section layer monitoring and multiplex section layer monitoring while the path layer
r
u
monitoring is further classified into higher order path layer and lower order path layer.
o
s
Thus the layered monitoring for STM-N is implemented. For example, in a STM-16 system,
e
R
the regenerator section overhead monitors the overall STM-16 signal while the multiplex

g
section overhead further monitors each of the 16 STM-1. Furthermore, the higher order
n
ni
path overhead monitors the VC-4 of each STM-1 and the lower order path overhead can

a r
monitor each of the 63 VC-12 in the VC-4. Hence the multistage monitoring functions

L e
from 2.5Gb/s to 2Mb/s are implemented.

e
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-28

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Then, how are these monitoring functions implemented? They are implemented via

:h
different overhead bytes.

e s
The overhead of each layer, including RSOH, MSOH, HPOH, and LPOH consists of some

r c
different bytes for different OAM function. Especially, several overhead bytes e.g. K1 and
u
K2 bytes are very important for maintenance and troubleshooting. According to ITU-T
o
es
recommendation, there are some overhead bytes reserved for national use.

R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-29

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Like a pointer, the function of the frame bytes is alignment. The first step is to properly

:h
extract each STM-N frame from the received continuous signal stream at the receiver. The

s
function of the bytes A1 and A2 is to locate the start of the STM-N frame. So the receiver
e
c
can align and extract the STM-N frame from the information stream via these two bytes
r
u
and further align a specific lower-rate signal within the frame via the pointers.
o

es
How does the receiver align the frames via the A1 and A2 bytes? The A1 and A2 have

R
fixed value, i.e. fixed bit patterns: A1: 11110110 (f6H) and A2: 00101000(28H). The

g
receiver monitors each byte in the stream. After detecting 3N successive f6H bytes
n
ni
followed by 3N 26H bytes (there are three A1 and three A2 bytes within an STM-1 frame),
r
a
the receiver determines that an STM-N frame starts to be received. By aligning the start of
e
e L each STM-N frame, the receiver can identify different STM-N frames and disassemble them.

or
STM-N signals shall be scrambled before being transmitted via the line so that the receiver
can extract timing signals from the line. But the A1 and A2 framing bytes shall not be
M scrambled for the receiver to properly align them. Thus it is convenient to extract the
timing from the STM-N signals and disassemble the STM-N signals at the receiver.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-30

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
If the receiver doesn't receive A1 and A2 bytes within five or more successive frames

:h
(625us), i.e. it can't identify the start of five successive frames (identify different frames), it

s
will enter out-of-frame status and generate out-of-frame alarm ---- OOF. If the OOF keeps
e
c
for 3ms, the receiver will enter loss-of-frame status ---- the equipment will generate loss-
r
u
of-frame alarm ---- LOF. Meanwhile, an AIS signal will be sent downward and the entire
o
s
services will be interrupted. Under LOF status, if the receiver stays in normal frame
e
R
alignment status again for successive 1ms or more, the equipment will restore the normal
status.
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-31

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
One of the features of SDH is its highly automatic OAM function which can conduct

:h
commands issue and performance auto poll to the networks element via NMT Network

s
Management Terminals. SDH has some functions which are not possessed by PDH
e
c
systems, such as real-time service allocation, alarm fault location and on-line performance
r
u
testing. Where are these OAM data arranged to transmit? The data used for OAM
o
s
functions, such as sent commands and checked alarm performance data, are transmitted
e
R
via D1-D12 bytes within the STM-N frame. Thus the D1-D12 bytes provide a common data

g
communication channel accessible to all SDH network elements. As the physical layer of
n
ni
the embedded control channel (ECC), the D1-D12 bytes transmit OAM information among

a r
the network elements and form a transmission channel of the SDH management network

L e
(SMN).

e
or
The DCC has a total rate of 768kb/s that provides a powerful communication base for SDH
network management. D1, D2 and D3 are regenerator section DCC bytes (DCCR) with a

M rate of 364kb/s 192kb/s and are used to transmit OAM information among
regenerator section terminals. D4-D12 are multiplex section DCC bytes (DCCM) with a sum
rate of 964kb/s=576kb/s and are used to transmit OAM information among multiplex
section terminals.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-32

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
E1 is part of the RSOH and may be accessed at regenerators. E2 is part of the MSOH and

:h
man be accessed at multiplex section terminations. Each of these two bytes provides a

s
64kb/s orderwire channel for voice communication, i.e. voice information is transmitted via
e
these two bytes.
r c

ou
The orderwire provides a convenient communication function during maintenance and
troubleshooting.
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-33

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
This B1 byte is allocated for regenerator section error monitoring (Byte B1 is located in the

:h
regenerator section overhead). What is the mechanism for monitoring? First, we'll discuss the BIP-8
parity.

e s
Suppose that a signal frame is composed of 4 bytes: A1=00110011, A2=11001100, A3=10101010
c

r
and A4=00001111. The method of providing BIP-8 parity to this frame is to divide it into 4 block
u
o
with 8 bits (one byte) in a parity unit (each byte as a block because one byte has 8 bits, the same as

s
a parity unit) and to arrange these blocks. Compute the number of "1" over each column. Then fill a
e
R
1 in the corresponding bit of the result (B) if the number is odd, otherwise fill a 0. That is, the value

g
of the corresponding bit of B makes the number of "1" in the corresponding column of A1A2A3A4

n
ni
blocks even. This parity method is called BIP-8 parity. In fact this is an even parity since it guarantees

r
that the number of "1" is even. B is the result of BIP-8 parity for the A1A2A3A4 block.

e a
The mechanism for B1 byte is: the transmitting equipment processes BIP-8 even parity over all bytes

e L of the previous frame (1#STM-N) after scrambling and places the result in byte B1 of the current

or
frame (2#STM-N) before scrambling. The receiver processes BIP-8 parity over all bits of the current
frame (1#STM-N) before de-scrambling and compares the parity result and the value of B1 in the

M next frame (2#STM-N) after de-scrambling. The different bit means the error block. According to the
number of different bits, we can monitor the number of error blocks occurred in 1#STM-N frame
during transmission.
If the B1 of the receive end has detected error blocks, the number of error blocks detected by the
B1 will be displayed in receive end performance event RS-BBE (Regenerator Section Background
Block Error). When the error bits detected by the receive end exceed a given threshold, the
equipment will report corresponding alarms. When the error bit ratio (EBR) is greater than 10E-6,
the given alarm is B1-SD. When the error bit ratio (EBR) is greater than 10E-3, B1-EXC (another
name B1-OVER) will be given.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-34

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
B2 is similar to B1 in operation mechanism except that it monitors the error status of the

:h
multiplex section layer. The B1 byte monitors the transmission error of the complete STM-

s
N frame signal. There is only one B1 byte in an STM-N frame. There are N*3 B2 bytes in an
e
c
STM-N frame with every three B2 bytes corresponding to an STM-1 frame. The B2
r
u
monitoring adopts BIP-24 (three bytes) method, which can at most monitor 24 error blocks
o
one time.
es

R
Since error performance of higher rate signals is reflected via error blocks, the error status

g
of STM-N signals is actually the status of error blocks. As can be seen from the BIP-24
n
ni
parity method, each bit of the parity result is corresponding to a bit block. So three B3
r
a
bytes can at most monitor 24 error blocks from an STM-N frame that occur during
e
e L transmission (The result of BIP-24 is 24 bits with each bit corresponding to a column of bits

or
---- a block).
If the B2 of the receive end has detected error blocks, the number of error blocks detected
M by the B2 will be displayed in this end performance event MS-BBE (Multiplex Section
Background Block Error). At the same time, M1 will be used to report to the transmit end
that error blocks have been detected, and the transmit end will report MS-FEBBE (Multiplex
Section Far End Background Block Error) performance event and MS-REI (Multiplex Section
Remote Error Indication) alarm. When the error bits detected by the receive end exceed a
given threshold, the equipment will report corresponding alarms. When the error bit ratio
(EBR) is greater than 10E-6, the given alarm is B2-SD. When the error bit ratio (EBR) is
greater than 10E-3, B2-EXC will be given.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-35

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
If the B2 of the receive end has detected error blocks, the number of error blocks detected

:h
by the B2 will be displayed in this end performance event MS-BBE (Multiplex Section

s
Background Block Error). At the same time, M1 will be used to report to the transmit
e
c
end that error blocks have been detected, and the transmit end will report MS-FEBBE
r
u
(Multiplex Section Far End Background Block Error) performance event and MS-REI
o
s
(Multiplex Section Remote Error Indication) alarm.
e

R
This is a message returned to its transmit end by the receive end so that the transmit end

g
can get the receiving error status of the receive end. For STM-N levels this byte conveys the
n
ni
count (in the range of [0, 255]) of interleaved bit blocks that have been detected in error
r
a
by the BIP-24N (B2). For rates of STM-16 and above, this value shall be truncated to 255.
e
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-36

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Two bytes are allocated for APS signaling for the protection of the multiplex section. For

:h
the bit assignments for these bytes and the bit-oriented protocol, please refer to G.783,
G.841 (10/98).
e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-37

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
This is an alarm message, returned to the transmit end (source) by the receive end (sink),

:h
which means that the receive end has detected an incoming section defect or is receiving

s
the Multiplex Section Alarm Indication Signal (MS-AIS). That is, when the receive end
e
c
detects receiving deterioration, it returns an Multiplex Section Remote defect
r
u
Indication (MS-RDI) alarm signal to the transmit end so that the later obtains the status of
o
s
the former. If the received b6-b8 bits of the K2 is 110, it means that this signal is an MS-
e
R
RDI alarm signal returned by the opposite end. If the received b6-b8 bits of the K2 is 111,

g
it means that this signal is an MS-AIS alarm signal received by current end. Meanwhile, the
n
ni
current end is required to send out MS-RDI signal to the opposite end, i.e. insert 110 bit

a r
pattern into the b6-b8 of the K2 within the STM-N signal frame to be sent to the opposite

L e
end. Not all deterioration results in returning MS-RDI. Current end equipment returns MS-

e RDI only upon receiving R-LOS, R-LOF, and MS-AIS alarm signals.

or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-38

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
We can use the extended SSM for clock protection. In this case, the different value of bits

:h
1 ~ 4 of byte S1 indicates the different clock source.

e s
Bits 5 to 8 of byte S1 are allocated for Synchronization Status Messages. Table 3-1 gives

r c
the assignment of bit patterns to the four synchronization levels agreed to within ITU-T.
u
Two additional bit patterns are assigned: one to indicate that quality of the
o
es
synchronization is unknown and the other to signal that the section should not be used for

R
synchronization. The remaining codes are reserved for quality levels defined by individual

g
Administrations. Different bit patterns, indicating different quality levels of clocks defined
n
ni
by ITU-T, enable the equipment to determine the quality of the received clock timing signal.
r
a
This helps to determine whether or not to switch the clock source, i.e. switch to higher
e
e L quality clock source. The smaller the value of S1 (b5-b8), the higher the level of clock

or
quality.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-39

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The Section Overhead is responsible for section layer OAM functions while the Path

:h
Overhead for path layer OAM functions. Like transporting the cargoes loaded in the

s
container: not only the overall impairment status of the cargoes (SOH) but also the
e
c
impairment status of each cargo (POH) shall be monitored.
r

ou
According to the "width" of the monitored path (the size of the monitored cargo) , the

es
Path Overhead is further classified into Higher Order Path Overhead and Lower Order Path

R
Overhead. In this curriculum the Higher Order Path Overhead refers to the monitoring of

g
VC-4 level paths within the STM-N frame. The Lower Order Path Overhead implements the
n
ni
OAM functions for VC-12 path level, i.e. monitoring the transmission performance of
r
a
2Mb/s signals within the STM-N frame.
e

e L The Higher Order Path Overhead, consisting of 9 bytes, is located in the first column of the

or
VC-4 frame.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-40

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The AU-PTR pointer indicates the specific location of the start of the VC-4 within the AU-4,

:h
i.e. the location of the first byte of the VC-4, so that the receive end can properly extract

s
VC-4 from the AU-4 according to the value of this AU-PTR. The J1 is the start of the VC-4,
e
c
so the AU-PTR indicates the location of the J1 byte.
r

ou
The J1 byte is used to transmit repetitively a Higher Order Path Access Point Identifier so

es
that a path receiving terminal can verify its continued connection to the intended

R
transmitter (this path is under continued connection). This requires that the J1 bytes of the

g
received and transmit ends match. The default transmit/receive J1 byte values of the
n
ni
equipments provided by Huawei Company are HuaWei SBS. Of course the J1 byte can be
r
a
configured and modified according to the requirement.
e

e L The received J1 should match or be same with the expected J1. If not, HP-TIM alarm will

or
be generated, which perhaps interrupts the service within the VC4 sometimes.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-41

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The B3 byte is allocated for monitoring the transmission error performance of VC-4. Its

:h
monitoring mechanism is similar to that of the B1 and B2 except that it is used to process

s
BIP-8 parity for the VC-4 frame.
e

r c
Once the receive end detects error blocks, the number of error blocks will be displayed in
u
the performance monitoring event ---- HP-BBE (Higher Order Path Background Block
o
es
Error) of the received end. At the same time, G1 (b1-b4) will be used to report to the

R
transmit end that error blocks have been detected, and the transmit end will report HP-

g
FEBBE (Higher-order Path Far End Background Block Error) performance event and
n
ni
HP-REI (Higher-order Path Remote Error Indication) alarm.
r

e a
When the error bits detected by the receive end exceed a given threshold, the equipment

e L will report corresponding alarms. When the error bit ratio (EBR) is greater than 10E-6, the

or
given alarm is B3-SD. When the error bit ratio (EBR) is greater than 10E-3, B3-EXC will be
given.
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-42

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The C2 is allocated to indicate the composition of multiplexing structure and information

:h
payload of the VC frame, such as equipped or unequipped status of the path, the type of

s
loaded services and their mapping method. For example, C2=00H indicates that this VC-4
e
c
path is unequipped. Then the payload TUG-3 of the VC-4 is required to be inserted all "1" -
r
u
--- TU-AIS and the higher order path unequipped alarm ---- HP-UNEQ appears in the
o
s
equipment. C2=02H indicates that the payload of the VC-4 is multiplexed via a TUG
e
R
structure multiplexing route. In China, the multiplexing of 2Mb/s signals into VC-4 adopts

g
the TUG structure. To configure the multiplexing of 2Mb/s signals for Huawei equipments,
n
ni
the C2 is required to be configured as TUG structure.

a r
The received C2 should match or be same with the expected C2. If not, HP-SLM alarm will

L e
be generated, which interrupts the service within the VC4 sometimes.

e
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-43

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The LPOH here refers to the path overhead of the VC-12 that monitors the transmission

:h
performance of the VC-12 path level, i.e. monitors the transmission status of 2Mb/s PDH

s
signals within the STM-N frame. Where is the LPOH located within the VC-12? The lower
e
c
order POH is located in the first byte of each VC-12 basic frame. An LP-POH consists of
r
u
four bytes denoted V5, J2, N2 and K4. Usually, V5 byte is the most important in LPOH.
o

es
The V5 provides the functions of error checking, signal label and path status of the VC-12

R
paths. So this byte has the functions of the G1, B3 and C2 bytes within the higher order

g
path overhead. If the V5 (b1b2) of the receive end have detected error blocks, the number
n
ni
of error blocks detected by the V5 (b1b2) will be displayed in this end performance event
r
a
LP-BBE (Lower-order Path Background Block Error). At the same time, V5 (b3) will be used
e
e L to report to the transmit end that error blocks have been detected, and the transmit end

or
will report LP-FEBBE (Lower-order Path Far End Background Block Error) performance event
and LP-REI (Lower-order Path Remote Error Indication) alarm. When the error bits detected

M by the receive end exceed a given threshold, the equipment will report corresponding
alarms. When the error bit ratio (EBR) is greater than 10E-6, the given alarm is BIP-SD.
When the error bit ratio (EBR) is greater than 10E-3, BIP-EXC will be given.
Bit 8 of the V5 is allocated for the VC-12 Path Remote Defect Indication. An LP-RDI (Lower
Order Path Remote Defect Indication) is sent back to the source if either a TU-12 AIS signal
or signal failure condition is being detected by the sink. Notes: In this curriculum, RDI is
called remote deterioration indication or remote defect indication.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-44

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The function of the pointers is aligning via which the receiver can properly extract the

:h
corresponding VC from the STM-N and then disassemble the VC and C packages and

s
extracts the lower rate PDH signals, i.e. directly drop lower rate tributary signals from the
e
STM-N signal.
r c

ou
What is aligning? Aligning is a procedure by which the frame offset information is

es
incorporated into the Tributary Unit or the Administrative Unit, i.e. via the Tributary Unit

R
Pointer (or Administrative Unit Pointer) attached to the VC to indicate and determine the

g
start of the lower order VC frame within the TU payload ( or the start of the higher order
n
ni
VC frame within the AU payload). When relative differences occur in the phases of the
r
a
frames and make the VC frames "float", the pointer value will be justified to ensure that it
e
e L constantly and properly designates the start of the VC frame. For a VC-4, its AU-PTR

or
indicates the location of the J1 byte while for a VC-12; its TU-PTR indicates the location of
the V5 byte. The TU pointer or AU pointer provides a method of allowing flexible and

M dynamic alignment of the VC within the TU or AU frame because these two pointers are
able to accommodate differences, not only in the phases of the VC and the SDH, but also
in the frame rates.

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-45

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The AU-PTR, located in row 4 of columns 1 to 9 within the STM-1 frame, is used to

:h
indicate the specific location of the fist byte J1 of the VC-4 within the AU-4 payload so that

s
the receiver can properly extract the VC-4. The AU-4 pointer provides a method of
e
c
allowing flexible and dynamic alignment of the VC-4 within the AU-4 frame. Dynamic
r
u
alignment means that the VC-4 is allowed to "float" within the AU-4 frame. Thus, the
o
s
pointer is able to accommodate differences, not only in the phases of the VC-4 and the
e
R
SOH, but also in the frame rates. The pointer contained in H1 and H2 designates the

g
location of the byte where the VC-4 begins. The last ten bits (bits 7-16) of the pointer
n
ni
word carry the pointer value.

a r
L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-46

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The TU pointer is used to indicate the specific location of the first byte V5 of the VC-12

:h
within the TU-12 payload so that the receiver can properly extract the VC-12. The TU

s
pointer provides a method of allowing flexible and dynamic alignment of the VC-12 within
e
c
the TU-12 multi-frame. The TU-PTR is located in the bytes denoted V1, V2, V3 and V4
r
u
within the TU-12 multi-frame.
o

es
The TU pointer of TU3 consists of H1, H2 and H3. Their function is similar to that of AU-
PTR.
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-47

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
K2 byte is used to monitor the status of MS, which might generate MS-AIS or MS-RDI

:h
alarm.

e s
If the receiver doesn't receive A1 and A2 bytes within five or more successive frames

r c
(625us), i.e. it can't identify the start of five successive frames (identify different frames), it
u
will enter out-of-frame status and generate out-of-frame alarm ---- OOF. If the OOF keeps
o
es
for 3ms, the receiver will enter loss-of-frame status ---- the equipment will generate loss-

R
of-frame alarm ---- LOF. Meanwhile, an AIS signal will be sent downward and the entire

g
services will be interrupted. Under LOF status, if the receiver stays in normal frame
n
ni
alignment status again for successive 1ms or more, the equipment will restore the normal
r
a
status.
e

e L The BIP-8 parity.

or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-48

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


SDH Principle P-49

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-1

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Contents
t t
:h
WDM Overview..........Page4

e s
WDM Transmission Media ........................Page16

r c
WDM Key Technologies ......Page24

ou
s
Technology Specifications for WDM System..................................................... Page48

e
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-2

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
About this course:
t t
:h
This course mainly introduces the basic knowledge of WDM technologies,

e s
expounds key technologies and optical transmission specification of WDM.

r c
Through this course, you will have a relatively complete understanding of the WDM
u
knowledge and the development orientation of optical transmission networks.
o
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-3

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
Reference:
t t
:h
OTC000003 WDM principle

e s
ITU-T G.694.1 and G.694.2 (about the wavelength distribution)

r c
ITU-T G.671 (about the optical passive components)
u

s o
ITU-T G.652 , G.653 and G.655 (about the fiber)

Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-4

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-5

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
SDM increases the transmission capacity linearly by adding the number of optical fibers,

:h
and the transmission equipment will be increased linearly, too.

e s
TDM keeps the same transmission medium but increases the bit rate. The equipment is

r c
getting more and more complicated and expensive. Additionally, the maximum
u
transported capability over a fiber pair is in the range of a few 10Gbps.
o

es
The way to scale to higher transported capacity is WDM. This technology keeps the same
R
fiber, the same bit rate, but uses multiple colours to multiply transported capacity.

n g
ni
WDM is widely used in the national and metro backbone transmission systems.

a r
L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-6

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Legend:
t t
:h
Freeway: Fiber

e s
Patrol Car: Supervisory Signal

r c
Gas Station: Optical Relay

ou
Gray Car: Client Service

es
Colored Car: Service in different channels (wavelength)

R
Driveway: Optical Wavelength

n g
Wave Division Multiplexing is a technology that utilizes the properties of refracted light

ni
to both combine and separate optical signals based on their wavelengths within the optical

a r
spectrum.

L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-7

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The Greek letter lambda ( ) , is often used to designate individual wavelengths.

:h
Key word in the content is specific wavelength. How specific ? Please refer to ITU-T series
recommendations in chapter 4.
e s

r c
WDM allows for a more efficient use of existing fiber by providing multiple optical paths

ou
along a single (pair of) fiber (s).

es
WDM allows for a greater range of protocol transmission better suited than legacy
R
network for data centric applications. (E.g.. GE, ESCON, Fiber Channel, D1 video)

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-8

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
OTU: Access the client service and convent the wavelength complied with ITU standards.

:h
OMU: Multiplex several services with different wavelength into one main path signal

e s
ODU: Demultiplex one main path signal into several individual signals.

r c
OA: Amplifies the optical signal.
u


s o
OLA: Optical Line Amplifier

Re
OSC: Optical Supervisory Channel

n g
ESC: Electrical Supervisory Channel

r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-9

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Unidirectional WDM system adopts two optical fibers. One only implements the

:h
transmission of signals in one direction while the other implements the transmission of the

s
signals in the opposite direction.
e

r c
This tansmission mode is widely used in the worldwide.

ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-10

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Bi-directional wave WDM system utilizes only one optical fiber. The single fiber transmits

:h
optical signals in both directions simultaneously, and the signals in the different directions

s
should be assigned on different wavelengths
e
Note:
r c
ou
To MUX/DEMUX the signals in one fiber, circulator is recommended.
s

Re
This mode is usually used in the CWDM system to reduce the cost

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-11

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Integrated system does not adopt the wavelength conversion technology, instead, it

:h
requires that the wavelength of the optical signals at the multiplex terminal conforms to

s
the specifications for the WDM system
e

r c
The optical interface in the client equipment that could provide standard wavelength is
u
called colored interface. Huawei series OSN products could support this function
o
Thought:
es
R
Can some channels use OTU and some channels use colored interface?
g

ni n
a r
L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-12

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Up to know the capacity is 1920Gbps at most.

:h
Data Transparency Transmission:

e s
WDM doesnt change the structure or any byte in the frame for the client signal

r c
Long Haul transmission: 5000km without REG / 230km long hop.
u


s o
Smooth expansion: modularization and no affect the existing services

Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-13

n
/e
o m
ei.c
aw
u
g .h
ni n
ar
//le
p :

t t
CWDM greatly reduces the system cost while providing certain amount of wavelengths

:h
and transmission distance within 100 km.


e s
Fewer channels=cheaper hardware
r c
u
No amplification=a lower-cost system and distance-limited system

s o
Comparison between CWDM and DWDM

Re
n g
ni
Types CWDM DWDM

a r
Channel Spacing 20nm 100GHz/50GHz/25GHz

L e
Band 1311~1611nm
C-band: 1529nm~1561nm
L-band: 1570nm~1603nm
e
or Capacity 16 x 2.5Gb/s = 40G 192 x 10Gb/s = 1920G

M Laser
Cost
Un-cooled Laser
70%
Cooled Laser
100%
Application 100km 5000km

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-14

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Fill in the blanks:
t t
:h
1. WDM System includes:________, _________, _________ and __________;

e s
2. CWDM system could use optical amplifiers (True or False) __________;

r c
3. ESC means____________________________________. Need additional wavelength

ou
to transmit in the fiber (True or False) _________.

es
4. Single fiber bidirectional transmission (can or can not )_________ use the same
R
g
wavelength for transmitting and receiving.

n
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-15

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
OTU, MUX/DeMUX, OA,OSC
t t
:h
False

e s
Electrical Supervisory Channel,False
Can not
r c
u

s o
Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-16

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
Objectives for this chapter:
t t
:h
List the characteristics of the fiber

e s
Classify different types of the fiber

r c
Outline the methods to against the factors
u

s o
Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-17

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
An optical fiber consists of two different types of solid glass the core and claddingthat

:h
are mixed with specific elements to adjust their refractive indices. The difference between

s
the refractive indices of the two materials causes most of the transmitted light to bounce
e
c
off the cladding and stay within the core. The critical angle requirement is met by
r
u
controlling the angle at which the light is injected into the fiber. Two or more layers of
o
s
protective coating around the cladding ensure that the glass can be handled without
e
damage.
R

n g
N1 and N2, which one is larger ?

r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-18

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :
Band Wavelength
t
Bandwidth (nm)
t
:h
Original 1260~1360 100
Extended 1360~1460
e s
100
Short 1460~1525
r c 65
u

Conventional
s
1525~1565
o 40
Long
Re
1565~1625 60
Ultra long
i n g
1625~1675 50

r n

e a
Combining the above losses, the attenuation constant of single mode fiber at 1310nm and

e L 1550nm wavelength areas is 0.3~0.4dB/km (1310nm) and 0.17~0.25dB/km (1550nm),

or
respectively. As defined in ITU-T Recommendation G.652, the attenuation constant at
1310nm and 1550nm should be less than 0.5dB/km and 0.4dB/km, respectively.
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-19

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Dispersion in fiber refers to a physical phenomenon of signal distortion caused when

:h
various modes carrying signal energy or different frequencies of the signal have different

s
group velocity and disperse from each other during propagation
e
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-20

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
G.652 fiber is currently a single mode fiber for widely use, called 1310nm property optimal

:h
single mode fiber and also called dispersion unshifted fiber

e s
G.653 fiber is called dispersion shifted fiber or 1550nm property optimal fiber. By

r c
designing the refractive index cross section, the zero dispersion point of this kind of fiber is
u
shifted to the 1550nm window to match the minimum attenuation window. This makes it
o
es
possible to implement ultrahigh speed and ultra long distance optical transmission

R
G.655 fiber, a nonzero dispersion shifted single mode optical fiber, is similar to G.653 fiber

n g
and preserves certain dispersion near 1550nm to avoid four-wave mixing phenomenon in

ni
DWDM transmission. It is suitable for DWDM system applications
r
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-21

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
DCF is one special kind of optical fiber, with the negative dispersion at 1550nm window

:h
The dispersion coefficient is -90~-120ps/nm.km

e s
DCF can counter act positive dispersion while bring new insertion loss and increasing of
PMD
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-22

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Fill in the blanks:
t t
:h
1. The attenuation coefficient of G.652 fiber is __________; approximately ________
for engineering planning
e s
r c
2. The dispersion coefficient of G.655 at 1550nm window is_______________

ou
3. The dispersion coefficient of G.652 at 1310nm window is__________; at 1550nm

es
window is___________
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-23

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
Coating, Cladding, Core
t t
:h
G.652, G.653, G.655

e s
Attenuation, Dispersion, Nonlinear effect

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-24

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-25

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-26

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-27

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Output laser is controlled by input current. The variation of the modulation current causes

:h
the variation of output wavelength

e s
This variation, called modulation chirp, is actually a kind of wavelength (frequency) jitter

r c
inevitable for direct modulation of the sources. The chirp broadens the bandwidth of the
u
emitting spectrum of the laser, deteriorates its spectrum characteristics and limits the
o
es
transmission rate and distance of the system

R
Transmission rate is limited to 2.5Gbit/s, and transmission distance is less than 100km

n g
ni
Similar Specification This kind of modulator is Widely used in CWDM system

a r
L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-28

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
EA modulator adopts different structure, use stable DC current to let LD output a standard

:h
wavelength (complied with ITU-T). EA module act as a door that open only happens to the

s
current change. In this way, the information is modulated into the wavelength
e

r c
Less chirp = Support long haul transmission (2.5Gb/s > 600km)

ou
High Dispersion tolerance (2.5Gb/s: 7200~12800ps/nm)

es
Most widely used in DWDM
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-29

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
This modulator separates the light input into two equal signals which enter the two optical

:h
branches of the modulator respectively. These two optical branches employ an electro-

s
optical material whose refractive index changes with the magnitude of the external
e
c
electrical signal applied to it. Changes of the refractive index of the optical branches will
r
u
result in the change variation of the signal phases. Hence, when the signals from the two
o
s
branches recombine at the output end, the combined optical signal is an interference
e
R
signal with varying intensity. With this method, the frequency chirp of the separated

g
external modulated laser can be equal to zero
n

r ni
Long dispersion limited distance

e a
High cost with good performance

e L Negligible chirp

or
Not widely used

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-30

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
As a maturing technology, direct modulator and indirector modulator are widely used in

:h
WDM system

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-31

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
The EDFA amplifier is widely used in WDM system

s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-32

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Principle:
t t
:h
The outer electrons of Er ions have 3 energy levels, where E1 is the basic state

e s
energy level, E2 is the metastable state energy level and E3 is the high energy level

r c
When high-energy pump lasers are used to excite the EDF, lots of bound electrons
u

o
of the erbium ions are excited from E1 to E3 level, then soon dropped to the E2
s
Re
level via a non-radiation decay process (i.e. no photon but heat is released)
When a signal with the wavelength of 1550nm passes through this erbium-doped
g

ni n
fiber, particles in the metastable state are transited to the basic state via stimulated

a r radiation and generate photons identical to those in the incident signal light

L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-33

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
TAP is used to spilt out a little part of energy and send it to the PD to detection

:h
ISO is used to make sure the signal transmit in one direction

e s
Pump laser has two type: with 980nm and with 1480nm

r c
If we want to get a high gain, we could cascade EDF and pumping laser
u

s o
Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-34

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
Advantage:
t t
:h
Fortunately, 1550nm is in the low attenuation window, the emergence of EDFA

e s
greatly activate the development of WDM
Disadvantage:
r c
o
Gain un-flatnessu
s

Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-35

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
If we cannot control the gain, optical surge generates

:h
With AGC function:

e s
When add wavelengths from 1 to 40, the gain will be not changed

r c
When drop wavelengths from 40 to 1, the gain will be not changed also
u


s o
Key Component is the DSP that makes the nonlinear calculation

Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-36

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Principle:
t t
:h
Fiber has wide SRS gain spectrum and a wide gain peak around a frequency 13THz lower

e s
than that of the pumping light. If a weak signal and a strong pumping light wave are

r c
transmitted through the fiber at the same time, and the wavelength of the weak signal is
u
set within the Raman gain bandwidth of the strong pumping light, the weak signal can be
o
es
amplified. Such SRS-based OA is call Raman optical amplifier. Raman optical amplifiers

R
gain is the switch gain, that is, the difference between the output power when the

g
amplifier is on and that when the amplifier is off
n
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-37

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Advantage:
t t
:h
The gain wavelength is determined by the pumping light wavelength

e s
The gain medium is the transmission fiber itself, low noise

r c
As the amplification is distributed along the fiber with the comparatively low signal
u

o
power, it reduces the interference from non-linear effect, especially FWM effect
s
Disadvantage:
Re

n g
High power is harmful for body

ni
Be careful when put operation on Raman

a r
L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-38

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
According to its application:
t t
:h
BA: Booster amplifier, mainly used in the transmit end. For the hardware

e s
description, you will see OBU card

r c
LA: Line amplifier, mainly used in the amplifier station, could be recognized as
u

o
BA+PA. For the hardware description, you will see OAU card
s

Re
PA: Pre-amplifier, mainly used in the receive end. For the hardware description, you
will see OPU card

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-39

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
For all the optical lights are bidirectional, the mechanisms of multiplexer and demultiplexer

:h
are the same. Here in after we just discuss about the multiplexer, if you reverse the

s
direction, it could also be considered as a demultiplexer
e
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-40

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Film Filter offers good stability and isolation between channels at moderate cost, but with

:h
a high insertion loss

e s
So the number of dropping wavelength is limited

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-41

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The waveguides are connected to cavities at the input and output. When the light enters

:h
the input cavity, it is diffracted and enters the waveguide array. There the optical length

s
difference of each waveguide introduces phase delays in the output cavity, where an array
e
c
of fibers is coupled. The process results in different wavelengths having maximal
r
u
interference at different locations, which correspond to the output ports
o
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-42

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
OSC is often used in the backbone wavelength system, and ESC is normally used in

:h
metropolitan system

e s
r c
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-43

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Pumping wavelength of OA: 980nm or 1480nm.
t t
:h
1310nm already defined by ITU-T for future use.

e s
OA fails, all signal lost, requires the supervisory signal continue to transmit alarms and
other indications.
r c
ou
The receive sensitivity of the OSC unit is very good, up to -48dBm.
s

Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-44

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
FA: Frame alignment
t t
:h
E1 E2 : Orderwire
ALC: Automatic Level Control.
e s
r c
F1 F2 F3 : transparent serials data
u


s o
D1-D12: DCC bytes, data communication channel

Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-45

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The optical transponder unit (OTU) multiplexes the supervisory information into the service

:h
channel for transmission

e s
The ESC reduces the investment of the OSC. It also deletes the insertion loss of the FIU.

r c
This lowers the cost and the power budget of optical channels

ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-46

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Fill in the blanks:
t t
:h
1. EDFA means:______________________; its pumping wavelength is___________;

e s
We can calculate noise figure by _________

r c
2. AWG means:______________________; TFF means:________________________;

ou
3. OSC signals frame structure is_____________, (can, can not) by amplified by OA.

es
4. ESC support OLA station ?_______(True, False)
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-47

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
LD, EA, M-Z
t t
:h
EDFA, Raman
TFF, AWG
e s
OSC, ESC
r c
u

s o
Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-48

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-49

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
ITU-G.692 Optical Interfaces for Multi-Channel Systems with Optical Amplifiers

:h
This recommendation specifies multi-channel optical line system interfaces for the

e s
purpose of providing future transverse compatibility among such systems. The

r c
current recommendation defines interface parameters for systems of four, eight,
u
and sixteen channels operating at bit rates of up to STM-16 on fibers, as described
o
es
in Recommendations G.652, G.653, and G.655 with nominal span lengths of 80

R
km, 120 km, and 160 km and target distances between regenerators of up to 640

g
km. A frequency grid anchored at 193.1 THz with inter-channel spacing at integer
n
r ni
multiples of 50 GHz and 100 GHz is specified as the basis for selecting channel

e a central frequencies

e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-50

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The WDM system in the above figure has the following reference points:

:h
S1Sn: The reference points on the fiber at transmitter optical output connector
in channels 1n
e s
r c
RM1 RMn: The reference points on the fiber at OM/OA optical input connector in
u

channels 1n
s o

connector Re
MPI-S: A reference point on the optical fiber just behind the OM/OA optical output

n g
ni
S': A reference point on the optical fiber behind the optical output connector of

a rthe optical line amplifier

L e R': A reference point on the optical fiber in front of the optical input connector of

e the optical line amplifier

or MPI-R: A reference point on the optical fiber in front of the OA/OD input optical

M
connector
SD1SDn: The reference points at the OA/OD optical output connector
R1Rn: The reference points at receiver optical transmitter input connector

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-51

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-52

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


WDM Principle P-53

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-1

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
Contents
t t
:h
Optical transport hierarchy ....Page4

e s
OTN interface structure...Page8

r c
Multiplexing/mapping principles and bit rates........Page15

ou
s
Overhead description....Page28

e
R
Maintenance signals and function for different layers...Page48

g
Alarm and performance events ...Page59
n
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-2

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
This Course is mainly based on
t t
:h
ITU-T G.872 Architecture of optical transport networks
ITU-T G.709
e s
Interfaces for the Optical Transport Network (OTN)
ITU-T G.874
r c
Management aspects of the optical transport network element
u

ITU-T G.798
s oCharacteristics of optical transport network hierarchy equipment

e
functional blocks
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-3

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-4

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
Objectives for the first chapter:
t t
:h
Describe the features of OTN

e s
Outline the protocols which supports OTN system

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-5

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
One important feature of OTN is that the transmission setting of any digital customer

:h
signal is independent of specific features of the customer, that is, independence of
customer.
e s

r c
According to the requirements given in Rec. G.872.

ou
The optical transport network supports the operation and management aspects of optical

es
networks of various architectures.
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-6

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Compared with SDH/SONET, the benefits of OTN are as follows:

:h
Strong scalability of the capacity: The cross-connect capacity can be expanded to
dozens of T bit/s.
e s
r c
The customer signal transparency covers payload and clock information.
u

s o
The asynchronous mapping eliminates restriction on the synchronization in the

Re
whole network, with stronger FEC. The simplified system design can decrease the
networking costs.

n g
ni
Up to 6-level TCM monitoring management capability.

a r
Compared with the traditional WDM:

L e Effective monitoring capability: OAM&P and network survivability

e
or
Flexible optical/electrical grooming capability, carrier-class, manageable, and
operable networking capability.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-7

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
G.874, management features of optical transmission NE, describes the management

:h
feature of the OTN NE and transmission function of one or more network layers in the

s
OTN. The management of the optical layer network is separated from the management of
e
c
the customer layer network. Therefore, the same management method that is independent
r
u
of the customer can be used. G.874 defines fault management, configuration
o
s
management, billing management, and performance monitoring. G.874 describes the
e
R
management network architecture model between the NE EMS and optical NE equipment

g
management functions.
n

r ni
G.798, feature of equipment function block of the optical transport network, defines the

a
function requirements of the optical transmission network in the NE equipment.
e

e L G.709, OTN interface, defines OTM-n signal requirements of OTN, including OTH, support

or
of multi wavelength optical network overhead, frame structure, bit rate, and format of
mapping customer signals.
M G.872, OTN architecture, defines the relation between OTN hierarchical architecture,
feature information and customer/service layer, and the function description of the
network topology and layer network.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-8

n
/e
o m
ei.c
aw
u
g .h
ni n
ar
//le
p :
Objectives for this chapter:
t t
:h
Draw the frame structure of OTN;

e s
Outline the function of each part in OTN frame;

r c
Brief introduce the difference between OTM-n.m and OTM-0.m;
u

s o
Describe how does a client signal are encapsulated to OTN frame.

Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-9

n
/e
o m
ei.c
aw
u
g .h
ni n
ar
//le
p :
OPUk: Optical channel Payload Unit-k
t t
:h
ODUk: Optical channel Data Unit-k

e s
OTUk: completely standardized Optical channel Transport Unit-k

r c
OTUkV: functionally standardized Optical channel Transport Unit-k
u


s o
OCh: Optical Channel with full functionality

Re
OChr: Optical Channel with reduced functionality

n g
OMS: Optical Multiplex Section

r ni
OTS: Optical Transmission Section

e a
OPS: Optical Physical Section

e L OTM: Optical Transport Module

or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-10

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Now we introduce the basic information contained in OTM-n.m, OTM-nr.m, and OTM-0.m. The

:h
rates and frame formats comply with ITU-T G.709 recommendations.

e s
The figure on the right shows the composition of the OTM-n.m signals of the OTM interface with
complete function. The OTM-n.m is composed of up to n multiplexing wavelengths and OTM

r c
overhead signals that support the non-associated overhead. Where, m can be 1, 2, 3, 12, 23, or

ou
123.m=1 indicates the bearer signals are OTU1/OTU1V. m=2: indicate the bearer signals are

s
OTU2/OTU2V. m=3 indicates the bearer signals are OTU3/OTU3V. m=12 indicates partial bearer
e
R
signals are OTU1/OTU1V and partial bearer signals are OTU2/OTU2V. m=23 indicates partial

g
bearer signals are OTU 2/OTU2V and partial bearer signals are OTU3/OTU3V. m=123 indicates

n
ni
partial bearer signals are OTU 1/OTU1V, partial bearer signals are OTU2/OTU2V, and partial bearer

r
signals are OTU3/OTU3V. The physical optical feature specifications of OTM-n.m signals are

a
determined by the suppliers. The recommendations do not have specific specifications.
e

e L The signal mapping or multiplexing of each layer is introduced in the above. Here, we will not

or
repeat it.
Note: The optical layer signal OCh is composed of OCh payload and OCh overhead. After the OCh is

M modulated to the OCC, multiple OCC time division multiplexes (TDM) constitute the OCG-n.m unit.
OMSn payload and OMSn overhead constitute the OMU-n.m. OTSn payload and OTSn overhead
constitute the OTM-n.m unit.
The overhead and generic management information of the optical layer units constitute the OTM
overhead signal (OOS), which is transmitted by 1-channel independent OSC in the non-associated
overhead.
The overhead of electrical layer units such as OPUk, ODUk, and OTUk are the associated channel
overheads, which are transmitted together with the payload.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-11

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The OTM-nr.m signals are composed of up to n optical channel multiplexing, and does not

:h
support the non-associated overhead. At present, m of OTM-16r.m can be 1, 2, 3, 12, 23,

s
or 123, where, the physical optical feature specifications of OTM-16r.1 and OTM-16r.2 are
e
c
defined in G959.1 of ITU-T. The physical optical feature specifications of other four signals
r
u
are in need of the further study.
o

es
The electrical layer signal structures of OTM-nr.m and OTM-n.m are the same. The optical

R
layer signals do not support the non-associated overhead OOS, without the optical

g
monitor channel. Therefore, it is called the OTM interface with the reduced function.
n
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-12

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
OTM-0.m is composed of the single optical channel. It does not support the associated

:h
overhead OOS and is without specific wavelength configuration. Only one optical channel

s
is contained; therefore, m can be 1, 2, or 3 only. The physical optical feature specifications
e
c
of OTM-0.1, OTM-0.2, and OTM-0.3 are defined in G.959.1 and G.693.
r

ou
The electrical layer signal structure of three OTM interfaces are the same, the electrical

es
layer signals are monitored through the associated overhead. The difference is: The OTM-

R
n.m optial layer signals supports the transmission of the non-associated overhead through

g
1-channel OSC. The OTM-nr.m and OTM-0.m do not support the optical layer overhead.
n
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-13

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-14

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Now, we introduce the OTN network interface. As shown in the figure, the interface

:h
between user A and network operator B is the UNI, and the interface between different

s
OTN networks is NNI. G.872 defines two OTN network interfaces: IrDI and IaDI. The IrDI
e
c
refers to the network interface between different operators, for example, the interface
r
u
between operators B and C as shown in the figure. The IaDI refers to the network
o
s
interface within the same operator. According to the suppliers, the IaDI includes the
e
R
interface between different supplier equipment IrVI (for example, the interface between

g
supplier equipment X and supplier equipment Y in operator Bs domain as shown in the
n
ni
figure) and the subnet interface of the same supplier equipment IaVI (for example, the

a r
interface between supplier equipment X subnet and supplier equipment Y subnet).

L e
The OTUk and OTUkV provide the transparent network connection between 3R

e
or
regenerator points. The OTUk is applicable to OTM IrDI and IaDI. The OTUkV is applicable
to OTM IaDI only.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-15

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Objectives for this chapter:
t t
:h
Draw the mapping route of OTM;

e s
List the rate of all types of OTUk,ODUk and OPUk signals;

r c
Describe how does a lower rate ODUk multiplex to a higher rate ODUk.
u

s o
Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-16

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-17

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-18

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-19

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-20

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-21

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Now we introduce the frame rate of OPU/ODU/OTU. The size of OTUk is fixed, that is,

:h
OTU1, OTU2, and OTU3 are 4-line and 4080-column. For OTU1 frames, from Column 1 to

s
Column 16, there are OTU1, ODU1, and OPU1 overhead. From Column 17 to Column
e
c
3824 (with 3808 columns in total), there are customer signals. From column 3825 to

ur
column 4080 (with 256 columns in total), there are FEC areas. Assume the customer

o
signals are STM-16 SDH signals, the rate is 2 488 320kbit/s, the calculations are as follows:
s

Re
Customer signal size/OTU frame size = Customer signals rate / nominal OTU frame rate

n g
3808/4080 = 2 488 320 / nominal OTU1 frame rate

ni
That is, nominal OTU1 frame rate = 255/238 x 2 488 320 kbit/s

a r
For OTU2 frames, four ODU1s are combined to ODTUG2 through the TDM. Four ODU1s

L e
operate as the OPU2 payload, occupying 3808 columns. In OPU2 payload, there are 16
columns of OTU1, ODU1, and OPU1 overhead. Therefore, the customer signals are 3792
e
or
columns. The calculation is as follows:


3792/4080 = 2 488 320 x 4 / nominal OTU2 frame rate
That is, nominal OTU2 frame rate = 255/237 x 9 953 280 kbit/s
The nominal OTU3 frame rate = 255/236 x 39 813 120 kbit/s
For OTU1/2/3 frame rate, the conclusion is as follows:
OTUk rate = 255/(239-k) x STM-N frame rate
Where, k=1, 2, 3 correspond to the frame rate of STM-16, STM-64, and STM-256
respectively.
The OTU bit rate tolerance is 20 ppm.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-22

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
NOTE The nominal ODUk rates are approximately: 2 498 775.126 kbit/s (ODU1),

:h
10 037 273.924 kbit/s (ODU2), 40 319 218.983 kbit/s (ODU3), 104 794 445.815 kbit/s

s
(ODU4) and 10 399 525.316 kbit/s (ODU2e).
e
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-23

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
NOTE The nominal OPUk payload rates are approximately: 1 238 954.310 kbit/s (OPU0

:h
Payload), 2 488 320.000 kbit/s (OPU1 Payload), 9 995 276.962 kbit/s (OPU2 Payload), 40

s
150 519.322 kbit/s (OPU3 Payload), 104 355 975.330 (OPU4 Payload) and 10 356
e
c
012.658 kbit/s (OPU2e Payload). The nominal OPUk-Xv Payload rates are approximately: X
r
u
2 488 320.000 kbit/s (OPU1-Xv Payload), X 9 995 276.962 kbit/s (OPU2-Xv Payload)
o
s
and X 40 150 519.322 kbit/s (OPU3-Xv Payload).
e
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-24

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-25

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-26

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
First of all, we introduce how four ODU1 multiplex to one ODU2. Use the frame alignment

:h
overhead to expand one ODU1 signal, and use the JOH to map them asynchronously to

s
the optical channel data tributary units 1 and 2 (ODTU12). Then, four ODTU12 is combined
e
c
to ODTUG2 in the TDM mode, and ODTUG2 is mapped to the OPU2. Finally, the OPU2 is
r
mapped to the ODU2.
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-27

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
The second TDM: Multiplex the ODU1 signal or ODU2 to ODU3 signals, or ODU1 and

:h
ODU2 are multiplexed to ODU3 signals.

e s
The multiplexing includes two steps:

r c
Procedure 1: For the ODU1 signal, use the frame alignment overhead to expand one ODU1

ou
signal, and asynchronously map to the ODTU13 by using the JOH.

es
Procedure 2: For the ODU2 signals, use the frame alignment overhead to expand one
R
ODU2 signal, and use the JOH to asynchronously map them to the ODTU23; then, j

n g
ODTU23 (0 j 4) and (16-4j) ODTU13 signal are combined to ODTUG3 in the TDM mode.

r ni
Then, ODTUG3 is mapped to the OPU3. Finally, the OPU3 is mapped to the ODU3. In this

e a
way, the TDM from ODU1 and ODU2 to ODU3 is completed.

e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-28

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
Objectives for this chapter:
t t
:h
List the overheads in OTN frame;

e s
Describe the function of each overhead.

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-29

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The OPUk is in the area from row 15 to row 3824, where, OPUk overhead area is from

:h
column 15 to column 16, OPUk payload area is from column 17 to column 3824, customer

s
signals are in the OPUk payload area.
e

r c
The ODUk is in the block structure with 4 lines and 3824 columns, which is composed of
u
ODUk overhead and OPUk, where ODUk overhead area is from row 1 to row 4 and from
o
es
column 1 to column 14. The frame alignment overhead area is from column 1 to column 7

R
in the first line. Column 8 to 14 in the first line are all-zero.

n g
The OTUk overhead area is from column 8 to column 14 in the first line, and the FEC area

ni

is from column 3825 to column 4084 (256 columns in total) on the right of the frame. The

a r
frame alignment overhead area is from Column 1 to column 7 of the first line in the frame

L e
header.

e
or
The customer signal rate corresponding to OTU1/2/3 is respectively 2.5G/10G/40Gbits/s.
The OTUk frame structure of each level is the same. The OTUk signals at the ONMI must
M have the sufficient bit timing information. Therefore, the OTUk provides the scramble
function, to construct an appropriate bit pattern by using a scrambler, with the avoidance
of long 1 or long 0 series. With the consideration of the framing, the OTUk overhead
FAS should not be scrambled. The scrambling operation is performed after FEC calculation
and insertion of OTUk signals.
The transmission sequences of the bytes in the OTUk frame is from left to right, from top
down

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-30

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The figure shows the overall electrical layer overhead, include frame alignment overhead,

:h
OTUk layer overhead, ODUk layer overhead, and OPUk layer overhead.

e s
The frame alignment overhead is used for the framing. It is composed of 6-byte frame

r c
alignment signal overhead FAS and 1-byte multi-frame alignment overhead MFAS.

ou
OTUk layer overhead supports the transmission operation function connected through one

es
or more optical channel. It is composed of 3-byte SM, 2-byte GCC0, and 2-byte RES. It is
R
terminated at the OTUk signal assembly and dissemble places.

n g
ni
ODUk layer overhead is used to support the operation and maintenance of the optical

r
channel. It is composed of 3-byte PM for end-to-end ODUk channel monitoring, 6-level
a
e
TCM1-TCM6 with 3 bytes respectively, 1-byte TCMACT, 1-byte FTFL, 2-byte EXP, 2-byte

e L GCC1, 2-byte GCC2, 4-byte APS/PCC, and 6-byte reservation overhead. The ODUk

or
overhead is terminated at the ODUK assembly and disassemble places. TC overhead is
added at the source, and is terminated at the sink.
M OPUk overhead is used to support the customer signal adaptation. It is composed of 1-
byte PSI, 3-byte JC, 1-byte NJO, and 3-byte reservation overhead. It is terminated at the
OPUk assembly and disassemble places.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-31

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Frame Alignment Signal (FAS) is used for the frame alignment and positioning, with the

:h
length of six bytes. It is located in Column 1 to Column 6 of Line 1. The contents are

s
shown in the figure: three OA1 plus three OA2 series. The value of OA1 is 0xF6, and the
e
value of OA2 is 0x28.
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-32

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Multi-Frame Alignment Signal (MFAS) follows the FAS. Some OTUk and ODUk overheads,

:h
for example, TTI, should cross multiple OTUk/ODUk frames. These overheads must

s
implement the OTUk/ODUk frame alignment and multi-frame alignment processing. The
e
c
MFAS is used for the multi-frame alignment.
r

ou
The length of the overhead is one byte, and is located in Line 1 Column 7.

es
The value of the MFAS bytes increases with the increase of the OTUk/ODUk basic frame
R
number, from 0 to 255 (with up to 256 basic frames). For the overhead of each multi-

n g
frame structure, the length can be adjusted. For example, if an overhead uses the multi-

ni
frame structure with 16 basic frames, bit1-bit4 are not calculated when the multi-frame
r
a
signals are extracted.
e
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-33

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
The SM overhead is composed of three bytes.
t t
:h
The trail trace identifier (TTI), with the length of one byte, is located in the first byte of the

e s
SM overhead. It is used to transmit 64-byte OTUk-level trail trace identifier signals. The

r c
content sequence of 64 bytes are:

ou
Byte 0 includes SAPI[0] character, with the fixed value of all zeroes.

es
Byte 1-byte5 include 15-character SAPI.
R

n g
Byte 16 includes DAPI[0] character, with the fixed value of all zeroes.

ni
Byte 17-byte 31 include 15-character DAPI.

a r
Byte 32- byte 63 are the contents designated by the operator.

L e
The 64-byte TTI signal should align with the OTUk multi-frame. Transmit for four times in

e
or
each multi-frame. Each multi-frame contains 256 frames.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-34

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Bit Interleaved Parity-8 (BIP-8) byte is used for the detection of the OTUk-level bit error

:h
detection. The code is in the even parity inserted among bits. Its length is one byte, located

s
in the second byte of the SM overhead. For BIP8 parity, calculate the bit in the whole
e
c
OPUK frame area of the No.i OTUk frame to obtain the OTUk BIP-8. Insert the results to
r
u
No.(i+2) OTUk frame OTUk BIP-8 overhead position. In No.(i+2) frame, as shown in the
o
s
figure, compare this value with the DIP8 calculation results of the current frame. If both
e
R
values mismatch, detect the bit error block of the near end.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-35

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Backward Error Indication (BEI) and Backward Incoming Alignment Error (BIAE) are used to

:h
return the detected bit errors to the upstream of the OTUk-level and to introduce the IAE.

s
The length is four bits. It is located in the most significant four bits of the third byte of the
e
c
SM overhead. In the IAE status, the field is set to 1011. The bit error number and non IAE
r
u
state is omitted, insert the bit error number (0-8). Other six values may be caused by some
o
s
irrelevant status. It should be explained as 0 bit error and BIAE inactivation.
e

R
The backward defect indication (BDI) is used for OTUk-level to return the signal invalidity

g
status detected in the terminal sink function. The length is one bit. It is located in Bit5 of
n
ni
byte3 of the SM overhead. When the BDI is set to 1, it indicates OTUk backward defect.
r
a
Otherwise, it is set to 0.
e

e L The Incoming Alignment Error (IAE) is used for the OTUk-level S-CMEP at the ingress point

or
to notify the peer S-CMEP at the egress point that the alignment error is detected in the
introduction signals. The S-CMEP egress point can use this information to stress the bit
M error number. These bit error may be caused by the ODUk frame phase change at the TC
ingress point. The IAE length is one bit. It is located in bit6 of byte 3 of the SM overhead.
The IAE bit is set to 1 to indicate the frame alignment error. Otherwise, it is set to 0.
The last two bits of the SM is reserved, and is set to 00.
S-Connection Monitoring End Point (CMEP): Section-Connection monitoring end-points
represent end points of trails and correspond as such with the trail termination functions.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-36

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
General Communication Channel 0 (GCC0) is used to support the general communication

:h
between OTUk terminals. The length is two bytes. It is located in Column 11 to Column 12

s
of line 1. The GCC0 is the transparent channel. The format specification is not discussed
e
here in this course.
r c

ou
Then, it is the 2-byte OTUk reserved overhead, for the international standardization. It is

es
located in column 13-column 14 of line 1. The reserved overhead is set to all zeroes.

R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-37

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
The PM is similar to the SM.
t t
:h
The PM overhead is composed of three bytes. It is located in column 10-column 12 of line

e s
3. The PM is composed of 1-byte TTI, 1-byte BIP-8, 4-bit BDI, 1-bit BEI, and 3-bit STAT.

r c
The definitions of TTI / BIP-8 / BEI / BDI are similar to those in SM. These parts support the
channel monitor.
ou

es
The PM overhead does not support IAE and BIAE function. In addition, BIP-8 of the PM
R
overhead is parity of the whole OPUk frame (column 15- 3824). But, the parity position is

n g
in the PM overhead, which differs from the BIP regenerated node in the BIP8.The BEI field

ni
needs not to support the BIAE function. Therefore, one value is less that of the SM
r
a
overhead to indicate the return of the IAE state. Four bits of BEI fields in the PM overhead
e
e L have nine effective values in total. 0-8 indicates 0-8 bit errors respectively. The other seven

or
values are caused by some irrelevant status, which can be interpreted as 0 bit error.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-38

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The STAT field is used for the maintenance signals of ODUk channel level. The length is 3

:h
bits. It is located in the least significant 3 bits of Column 12 of Line 3.

e s
The table describes the meaning of the STAT field.

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-39

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The ODUk overhead defines TCM1-TCM6 of six domains. The Tandem Connection

:h
Monitoring (TCM) overhead supports the monitoring of the ODUk connection. It is used to

s
the scenarios such as one or more optical UNI to UNI, NNI to NNI serial line connection
e
c
monitoring, linear and ring protection switch sub-layer monitoring, the fault location of the
r
u
optical channel serial line connection, and the service delivery quality acceptance. TCM6-
o
s
TCM1 are located in Column 5-Column 13 of line 2, Column 1-Column 9 of Line 3. Its
e
R
format is similar to the SM of the OTUk overhead and the PM of the ODUk overhead.

n g
TTIi / BIP-8i / BEIi / BIAEi / BDIi support the TCMi sub-layer monitoring, where, i ranges

ni
from 1 to 6. The definitions and functions of these parts are the same as the
r
a
corresponding parts in SM. But, only the monitoring levels are different.
e
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-40

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
STAT is used for the maintenance signal of TCMi sub layer, whether the IAE error exists in

:h
the source TC-CMEP, whether the source TC-CMEP is activated. The length is 3 bits. It is

s
located in the least significant 3 bits of the TCMi field.
e

r c
It indicates the meaning of the STAT field.

ou
TCMi overhead has more BIAE function than PM overhead. In the maintenance signals in

es
the STAT field, there are more two meanings: No source TC, and TC in use but with IAE
error. R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-41

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Along one ODUk trail, the monitored connections range from 0 to 6. The monitored multi-

:h
level connections can be overlay, nesting, or cascading. At present, the overlay mode is

s
applicable to the test only. Each TC-CMEP inserts or extracts the TCM overhead from six
e
c
TCMi overhead domains. The corresponding network operator, network management
r
u
system or switching control platform provides the TCMi overhead domain contents.
o

es
As shown in the figure, the monitored connects A1-A2, B1-B2, and C1-C2 are nested, A1-

R
A2 and B3-B4 are nested, B1-B2 and B3-B4 are cascaded.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-42

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
As shown in the figure, the monitored connects B1-B2 and C1-C2 are overlaid, A1-A2 and

:h
B1-B2 are nested, A1-A2 and C1-C2 are nested.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-43

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
GCC1 and GCC2 can be used to access to the ODUk frame structure (that is, located in 3R

:h
regeneration points) between any two NEs. The length is 2 bytes, respectively located in

s
Column 1-2 and Column 3-4 of Line 1. It is the transparent channel. Its function is similar
e
c
to OTUk overhead GCC0. The ESC function can be applied to the product.
r
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-44

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
TCM Activation/Deactivation (TCMACT) overhead is 1-byte long, and is located in Column

:h
4 of Line 2. Its definition is not determined yet.

e s
Automatic Protection Switching (APS)/Protection Communication Control (PCC) overhead is

r c
applicable to the protection protocol communication, with the length of four bytes. This
u
field can appear in up to 8-level nested APS/PCC signals. It can be used by multiple
o
es
protection mechanisms. In the multi-frame, the first eight basic frames (for MFAS, it is 0-7)

R
APS/PCC are sequentially allocated to ODUk channel layer, ODUk TCM1-TCM6 sub layers,

g
and OTUk section layer.
n

r ni
The ODUk overhead defines 2-byte EXP, which allows the equipment supplier or network

a
operator to use the extra ODUk overhead on the subnet. The specific function of the EXP is
e
e L not limited to the standard, which is not defined within G.709 range.

or
The ODUk overhead is allocated with one byte to transmit total 256-byte Fault Type &
Fault Location (FTFL). The FTFL message is composed of forward area and backward area,
M with 128 bytes in each area, respectively containing the forward and backward fault type,
operator identifier, and operator designated domain.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-45

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The OPUk overhead defines 1-byte payload structure identifier (PSI) overhead to transmit

:h
the 256-byte PSI to indicate the OPUk signal type. The PSI overhead is in Column 15 of

s
Line 4. The 256-byte PSI signal aligns with the ODUk multi-frame. PSI[0] is a 1-byte
e
c
payload type (PT); PSI[1]-PSI[255] are used for the mapping and cascading; PSI[1] is
r
u
reserved, and PSI[2]-PSI[17] is the multiplex structure identifier (MSI). The MSI includes the
o
s
ODU type and transmitted ODU tributary port number information. For OPU2, there are
e
R
only four ODU1 tributary port number. Therefore, only four bytes PSI[2]-PSI[5] are needed,

g
and the last 12 bytes of the MSI are set to 0.
n
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-46

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The OOS is the non-associated overhead, which is transmitted through the OSC. The

:h
optical layer overhead function should comply with the standard. The recommendation

s
defines overheads and corresponding functions contained in the optical layer, and does
e
c
not define the frame rate or frame structure. The optical layer overhead include OTS, OMS,
r
u
OCh overheads, and generic management information overhead defined by the supplier,
o
where,
es

R
The OTS overhead is used to support the maintenance and operation function of the

g
optical transmission section, and is terminated at the OTM signal assembly and dissemble
n
ni
places, including:
r
e

a TTI: Transmit the TTI consisting of 64-byte character string. The TTI includes the

e L source access point indication, destination access point indication, and information

or
designated by the operator.
BDI-P: Transmit the OTSn payload signal invalidity status detected from the OTSn
M

terminal sink function to the upstream.


BDI-O: Transmit the OTSn overhead signal invalidity status detected from the OTSn
terminal sink function to the upstream.
PMI: It is used to transmit the status of payload that is not added at the upstream
of the OTS signal source terminal to the downstream, to suppress subsequent
reporting of loss of signal.
To be continued in the next page

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-48

n
/e
o m
ei.c
aw
u
g .h
ni n
ar
//le
p :
Objectives for this chapter:
t t
:h
List the maintenance signals type;

e s
Describe the function and application of maintenance signals.

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-49

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
OTS, OMS, OCh are all optical layer trails and OTUk, ODUk, Client are all electrical layer

:h
trails.

e s
OSC trail is independent, which is related to supervisory signal.

r c
OTUK use SM section to send maintenance signals.

ou
ODUK use PM and TCM to send maintenance signals.
s

Re
OTS,OMS,OCh ,OSC send different optical layer maintenance signals.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-50

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
OCh client trail sets the source/sink port at the client side of OTU. LQG, as an example, it

:h
is GE service trail of the client port.

e s
OCh trail sets the source/sink port at the WDM side of OTU. LQG, as an example, it is the
wavelength trail.
r c

ou
OMS trail sets the source/sink port at the OUT/IN port of MUX/DeMUX. It is a trail of the
multiplex signal.
es
R
OTS trail is the fiber connection between adjacent OM/OD/OA in the main path.
g

ni n
OSC trail is independent, which is related to supervisory signals.

a r
L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-51

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The FDI is the signal sent to the downstream in OMS and OCh layers, to indicate the

:h
detected upstream defects. FDI-P indicates the payload forward defect, and FDI-O

s
indicates the overhead forward defect.
e

r c
OMS-FDI-P indicates the OMS servcie layer dfect of the OTS network layer.

ou
OMS-FDI-O indicates that the transmission of the OMS overhead transmitted through the

es
OOS is interrupted owing to the signal invalidity status of the OOS.
R
OCh-FDI-P indicates the OCh service layer defect in the OMS network layer. When the
g

ni n
OTUk is terminated, OCh-FDI-P serves as the ODUk-AIS signal to continue.

a r
OCh-FDI-O indicates that the transmission of the OCh overhead transmitted through the

L e
OOS is interrupted owing to the signal invalidity status of the OOS.

e
The FDI signal is generated in the adaptation sink function. In the trail terminal sink

or function, it is generated to suppress the downstream defects and invalidities detected

M
owing to the transmission interruption of the upstream signals.
The FDI is similar to AIS. When the signal is in the optical domain, use the FDI. When the
signal is in the digital domain, use the AIS. The FDI served as the non-associated overhead
is transmitted in the OTM overhead signal (OOS)

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-52

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
AIS is the electrical layer OTUk, ODUkP, ODUkT, and customer layer CBR sent to

:h
downstream to indicate the detected upstream defect, to suppress the downstream

s
defects and invalidities detected due to the interruption of upstream signal transmission.
e
c
The AIS of ODUkP and ODUkT layer uses the ASI with all-1 pattern.
r
Note:
ou

es
OTUk-AIS supports the new service layer in future. At present, only the signal is
R
required to be detected, instead of the generation of this signal. According to this

n g
recommendation, Huawei equipment only supports the detection of the OTUk-AIS,

r ni
instead of inserting OTUk_AIS. CBR AIS is generated in the the ODUk/CBRx

e a adaptation sink function. If the SDH receives this signal, it is detected as the LOF.

e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-53

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The AIS of ODUkP and ODUkT level uses the all-1 pattern, as shown in the figure.

:h
When we introduce the PM and TCMi overhead, we have learnt that the value 111 of

e s
STAT field of PM or TCMi indicates the detected ODUk_AIS signals. When ODUkP or

r c
ODUkT detects the AIS, it only concerns about the value of the STAT of the corresponding
u
level. For example, to detect the AIS of the TCM1, check whether the STAT corresponding
o
es
bit of the TCM1 is 111; To check the AIS of the PM, check whether the STAT

R
corresponding bit of the PM is 111.

n g
To insert the AIS, the ODUkP or ODUkT is not distinguished. For either of them, insert to

ni

PM or 6-level PCM overhead area or all payloads (excluding FTFL byte). Therefore, it is

a r
called the insertion of ODUk-AIS signals. The ODUk_AIS may be generated in the

L e
adaptation sink function from OTU to ODU or in the ODUkT termination sink function. For

e
or
the adaptation sink function from OTU to ODT, insert the ODUk_AIS owing to the
invalidity of the service layer. For the ODUkT termination sink function, when the TCM is in
M the operation mode, insert ODUk_AIS owing to the detection of the LCK, OCI, and TIM.
Whether the TIM is inserted with the AIS can be set.
When the AIS is cleared, 111 of the STAT of the local area is cleared also. For example, for
the TCM1 source function, change the STAT of the TCM1 from 111 to 001.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-54

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
The Backward Defect Indication (BDI) includes the OTS of the optical layer, the BDI of the

:h
OMS layer, OTUk and ODUkP of the electrical layer, and the BDI of the ODUkT layer.

e s
The BDI-P indicates the payload backward defect. The BDI-O indicates the overhead

r c
backward defect. If the remote defect of the BDI inserting the OOS detected consecutively
u
in X ms, the BDI is generated. If the BDI-P upstream defect inserted by OOS detected
o
es
within the consecutive Y ms is cleared, clear the BDI-P. The values of X and Y needs the
further study.
R
n g
For the electrical layer OTUk, ODUkP and ODUkT layers BDI, we have learnt the electrical

ni

layer overhead part. If the BDI bit of the SM/PM/TCMi overhead domain of the consecutive

a r
five frames (bit 5 of byte 3) is 1, generate the dBDI. If the BDI bit of the SM/PM/TCMi

L e
overhead domain of the consecutive five frames (bit 5 of byte 3) is 0, clear the dBDI.

e
or
If the signal is invalid, the BDI should be cleared.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-55

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The Open connection indication (OCI) is used for the optical layer OCh, electrical layer

:h
ODUkP, and ODUkT to indicate that the upstream signal does not connect to the trail

s
terminal source signals. The OCI signal is generated in the connection function. Through
e
c
the connection function, output at any output connection point that is not connected to
r
u
any input connection point. The OCI signals are detected in the trail terminal sink function.
o

es
For the OCh layer, if the input and output is detected in the consecutive X ms, generate

R
the OCI. If the input and output connection is normal or the overhead signal is invalid in

g
the consecutive Y ms, clear OCI. The values of X and Y are still under the research.
n

r ni
As shown in the figure, it is the OCI pattern of the ODUkP and ODUkT layer. Detect the

a
OCI, which is similar to the detection of the AIS. Check whether the corresponding bit of
e
e L the STAT is 110. For example, check the OCI of the TCM1 to check whether the STAT

or
corresponding bit of the TCM1 is 110. Detect the OCI of the PM, to check whether the
STAT corresponding bit of the PM is 110.
M Insert the OCI, and insert to PM and 6-level TCM area and all payloads. Clear the OCI to
clear 110 of this area STAT. For example, for TCM1, it means to change the STAT of the
TCM1 from 110 to 001. If the data signal is invalid, the OCI should be cleared.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-56

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
To support the operator's requirement of locking the user access point signal, ODUkP and

:h
PDUkT layer provide the LCK maintenance signals to indicate the upstream connection is

s
the locked signal, without signals passing.
e

r c
When the operator performs sets up the test, the customer signals are replaced by the
u
locked (LCK) fixed digital signals. It is generated through the service layer adaptation sink
o
es
and source function, and is sent to the downstream. The downstream termination sink

R
function allows the report of the LCK alarm, indicating that the upstream connection is

g
locked and no signals pass.
n

r ni
As shown in the figure, it is the LCK pattern of the ODUkP and ODUkT layer. Detect the

a
LCK, and check whether the corresponding bit of the STAT is 101. For example, check the
e
e L LCK of the TCM1 to check whether the STAT corresponding bit of the TCM1 is 101. Detect

or
the LCK of the PM, to check whether the STAT corresponding bit of the PM is 101.
Insert the LCK, and insert to PM and 6-level TCM area and all payloads. Clear the LCK to
M

clear 101 of this area STAT. For example, for TCM1 source function, change the STAT of
the TCM1 from 101 to 001.
The priority of inserting the LCK is higher than that of the AIS. That is, if a user sets the
insertion of the LCK and meets the condition of automatic insertion of the ASI, the result is
insertion of the LCK.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-57

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
Incoming Alignment Error (IAE) and Backward Incoming Alignment Error (BIAE). The

:h
electrical layer OTUk and ODUkT provide the maintenance signals of IAE and BIAE. IAE and

s
BIAE are not the fault reasons. The IAE is used to suppress the near end performance of
e
c
the OTUk and ODUkT (EBC and DS). The BIAE is used to suppress the remote performance
r
of the OTUk and ODUkT.
ou

es
For the IAE of the OTUk, if the IAE bit in the consecutive 5-frame SM overhead domain (bit

R
6 of byte 3) is 1, generate the dIAE. If the IAE bit in the consecutive 5-frame SM overhead

g
domain (bit 6 of byte 3) is 0, clear the dIAE. For the IAE of the ODUkT, if the received STAT
n
ni
information is 010, generate the dIAE. If the received STAT information is not 010, clear
r
a
the dIAE.
e

e L If the signal is invalid, the dIAE and dBIAE should be cleared.

or
For the signals sent to the upstream by the BIAE, if the BEI/BIAE bit of the consecutive 3-
frame SM/TCMi overhead domain (bit1-bit4 of byte 3) is 1011, generate dBIAE. If the
M BEI/BIAE bit of the consecutive 3-frame SM/TCMi overhead domain (bit1-bit4 of byte 3) is
1011, clear dBIAE.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-58

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
For the framing and monitoring, the OTUk and ODUkP support to obtaining the LOF and

:h
LOM through the detection of the FAS and MFAS. The ODUkP is applicable to the scenario

s
from the low-level ODU multiplexing to the high-level ODU signals.
e

r c
For the continuity monitoring, three layers support the TTI signals of the corresponding
level.
ou

es
For the information maintenance, three layers support AIS, BDI, and BEI signals. The ASI of
R
the OTUk layer is the generic AIS signal. In ODUkP and ODUkT, there are all-1 AIS signals.

n g
ni
ODUkP and ODUkT layers support OCI and LCK signals.

a r
The ODUkT layer supports the LTC signals. Note: LTC indicates there is no TCM source.

L e
OTUk and ODUkT support the IAE/BIAE signals.

e For the monitoring of the signal quality, three layers support the performance detection

or

based on the BIP-8 calculation. That is, check the OPUk frames. But the check location and

M layers are different.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-59

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
// le
p :
Objectives for this chapter:
t t
:h
Classify the alarms into the corresponding layer;

e s
Outline the suppression mechanism of alarms.

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-60

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Firstly,about the OTN alarm of each electrical layer, for the alarms of OTUk layer, except

:h
the BEFFEC_EXC alarm related to the FEC, other alarm names start with OTUk. For the

s
ODUkP layer, except ODUk_LOFLOM, other alarms start with ODUk_PM. For ODUkT
e
c
layer alarms, the name starts with ODUk_TCMi. The OPUk layer alarm starts with
r
OPUk.
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-61

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
This table lists OTN performance events in the OTUk, ODUk_PM, and ODUk_TCMi layers. For

:h
definitions related to the performances, see ITU-T G.8201.

e s
ES: Errored Second: When one or more bit error blocks are found in one second, it is called ES. FEES:
far end ES.
r c

ou
SES: Severely Errored Second: In one second period, include 15% bit error blocks, or, there is at

s
least one defect (OCI/AIS/LCK/IAE/LTC/TIM/PLM). FESES: far end severely errored second.

e

R
SESR: Severely Eroded Second Ratio: It indicates the ratio between the SES and total seconds in the

g
available time within the fixed test interval. FESESR: far end Severely Eroded Second Ratio.

n
ni
BBE: Background Block Error: It indicates the bit error block beyond the severely eroded second.

r
FEBBE: far end background block error.
a

L e
BBER: Background block error ratio. It indicates the ratio between the BBE and total blocks in the

e
available time within the fixed test interval. The total number of the blocks excludes the number of

or
the blocks in the SES. FEBBER: far end background block error ratio.

M UAS: Unavailable second: It starts from 10 consecutive SES events. The 10 seconds are considered
as a part of the unavailable second. The new available time period starts from 10 consecutive non-
SES events. Ten seconds can be considered as one part of the available time. FEUAS: Far end
unavailable second.
IAES: Incoming Alignment Error Second: When the IAE error exists in one second, the second is the
incoming alignment error second. BIAES: backward Incoming Alignment Error Second.
After the FEC is used, the definitions of all performance events are after the FEC. That is, the
detection of the performance event (for example, BBE and SES) is after all error corrections.

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-62

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
Which kinds of the components does the OTM-n.m have?

:h
OTSn, OMSn, OCh, OTUk/OTUkV, ODUk, OPUk

e s
Whats the difference between SM and PM?

r c
SM is in the OTUk OH,PM is in the ODUk OH.
u

s o
SM contains TTI/BIP-8/BEI/BIAE/BDI/IAE/RES,PM contains TTI/BIP-8/BEI/BDI/STAT.

Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-63

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-64

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-65

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-66

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-67

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-68

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-69

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OTN Principle P-70

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-1

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
Content:
t t
:h
LAN IntroductionPage 4

e s
Ethernet Principles.Page10

r c
Ethernet Port Technology.Page29

ou
s
EoS Introduction..Page39

e
R
VLAN Basics and Port Attributes..Page57

g
QoS Introduction and Application.. Page76
n
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-2

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-3

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-4

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
A network is a complex system interconnected formed by interconnected people or things.

:h
Networks exist everywhere in our life, for example, the telephony network and telegraph

s
network. There are also many network systems in one's body, for example, the nerve
e
c
system and the digestive system.
r
ou

es
The computer network is a large-scale and powerful system that connects computers and
R
peripheral devices in different areas through communication lines. In the computer

n g
network, substantive computers can exchange information and share information

ni
resources. The computer network was developed to meet the requirement for exchanging
r
a
information and sharing information resources.
e
e L
or
In the initial stage of the computer network, each computer is an independent device.

M
Computers work independently and do not communicate with each another. Combination
of the computing technology and communication technology brings a far-reaching
influence to the organization of the computer system and makes possible the
communication among computers. Computers of different types use the same protocol to
communicate, and thus the computer network comes into being.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-5

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The Internet is a large network formed by networks and devices. Based on the covered

:h
geographic scope, networks are classified into LAN, WAN, and

e s
Metropolitan Area Network (MAN) whose size is between the LAN and WAN.
Local Area Network (LAN)
r c
ou
A LAN is formed by connected communication devices in a small area. A LAN
s

Re
covers a room, a building, or an industry garden. A LAN covers several kilometers.
It is a combination of computers, printers, modems, and other devices

n g
ni
interconnected through various mediums within several kilometers.

a r
Wide Area Network (WAN)

L e A WAN covers a larger geographic scope, such as a state or a continent. It provides

e the data communication service in a large area and is used to connect LANs. The

or China Packet Network (CHINAPAC), China Data Digital Network (CHINADDN),

M China Education and Research network (CERnet), CHINANET, and China Next
Generation Internet (CNGI) are all WANs. A WAN connects LANs that are far from
each other.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-6

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
LAN is a network that connect all kinds of communication devices together, within a room,

:h
building or garden. The distance is usually only several miles. It has features such as short

s
distance, low delay, high rate and reliability and so on.
e

r c
Standard is a set of rules or program that are widely used or defined by organization. It
u
defines the protocols, and performance set. IEEE 802.X is the most common used standard.
o

es
In China, the common local network is Ethernet, ATM (Asynchronous Transfer Mode). They
R
are different in topology, transmission medium, signal rate, frame structure, and so on.

n g
Ethernet is widely used because its the most economical one and it develops very quickly.

r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-7

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-8

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Common devices used in LAN
t t
:h
CableEnlarging the transmission distance, e.g. fiber, twisted pair, coax and so on

e s
NICNetwork Interface Card: Seated in the main board of the computerconverting the

r c
user data into special forms that other network devices can read.

ou
HUB is a multiple ports device. When one of the cable is broken, others will not be
s

affected.
Re

n g
Switch is also a multiple ports device. Every two ports have private service bus, so switch

ni
has a higher ability to forward the signals.

a r
Router is an important device that can connect LAN, WAN and Internet together. The

L e
router can analyze route information and choose a best route for packets, and forwards

e them in order.

or ATM is a special switching device used in ATM network. It is only applied in back-bone

M network because of its special techniques.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-9

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-10

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-11

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Carrier Sense Multiple Access / Collision Detect (CSMA/CD) is an effective method for

:h
multi-point communication under the condition of medium sharing.

e s
1) If the medium is idle, the transmission will be made; otherwise, it goes to step 2.

r c
2) If the medium is busy, the channel will be monitored till it is idle and the transmission will
be made at once.
ou
es
3) If collision is detected during the transmission, a short and small jamming signal will be
R
sent to let all the stations know that conflict occurs and stop the transmission.

n g
ni
4) After sending the jamming signal and waiting for a random time, the transmission will be

r
tried again and it will go to step 1 to start again.
a

L e
The CSMA/CD technology adopted by the Ethernet may reduce the waste of the channel

e caused by the conflict to the minimum extent. However, it cannot ensure the transmission

or efficiency in case of high network load.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-12

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
As limited by the CSMA/CD algorithm, an Ethernet frame cannot be shorter than 64 bytes,

:h
which is determined by the maximum transmission distance and the mechanism of collision
detection.
e s

r c
The limitation of the frame length can prevent the situation that a station finishes sending
u
the last bit; however, the first bit does not reach the remote destination. The remote
o
es
station believes the line is idle and continues to send data. The conflict, therefore, occurs.

R
The upper layer must guarantee that the Data field contains a minimum of 46 bytes. If the

n g
Data field is shorter than 46 bytes, the upper layer must fill the filed. The 46-byte Data

ni
field, 14-byte Ethernet header, and 4-byte check code consist of a 64-byte frame, which is
r
a
a frame of minimum length.
e

e L The maximum length of the Data field is 1500 bytes.

or
The maximum transmission distance is determined by factors such as line quality and signal

M
attenuation.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-13

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
MAC: media access control
t t
:h
The MAC address is the physical address of each device connected to the network.

e s
MAC address assignments are administrated by IEEE and are be globally unique.

r c
Each address is composed of two parts, the OUI which is the Organization Unique
u
Identifier which is the address space assigned to the provider, the remainder of the
o
es
address space is assigned by each organization.

R
The first 24 bits denotes the provider code and the last 24 bit is assigned at the providers
discretion.
n g

r ni
MAC address includes 48 bits and it is shown as 12 dotted hexadecimal notations

e a MAC address is exclusive globally which is allotted and managed by IEEE. Every
L

MAC address is composed of two parts. The first 24 bits part is the vendor code
e
or
and the other 24 bits part is serial number

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-14

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
All 1s in the address otherwise written as FF-FF-FF-FF-FF-FF in hexadecimal denotes a

:h
broadcast address, which will be read by all attached stations.

e s
If 48 bits are all 1, it means the address is used for broadcast

r c
If the 8th bit is 1, it means the address is used for multicast

ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-15

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The destination address in the Ethernet header can be one of three forms:

:h
Unicast address: Only the specified host will process the frame e.g. a frame sent
from PC to Server
e s
r c
Broadcast address: This frame will be processed by every host (PC, Printer, server,
u

etc)
s o

Re
Multicast address: All hosts that are members of the specified multicast group will
process this frame e.g. a router to other routers

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-16

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Ethernet Frame Fields
t t
:h
Preamble: 7 bytes of 10101010 to allow timing synchronisation between sender
and receiver
e s
r c
SFD: Start Frame Delimiter 10101011 to tell the receiver the next byte is the start
u

of the frame
s o

Re
DMAC: destination MAC address, 6bytes

n g
SMAC: source MAC address, 6bytes

ni
Length/Type: 2bytes, it has the following meanings:

a r if Length/Type > 1500 ,this field indicates the type of the upper protocol

L e of an Ethernet_II frame

e
or
if Length/Type <=1500, the field indicates the length of the data, and it is a
802.3 frame.

M DATA: 46~1500bytes , If the data field is less than 46 bytes padding is used to fill
up the frame to make sure that the length of frame must be at least 64 bytes.
FCS: Frame check sequence 4bytes
The whole length of the fame is 64~1518 bytes.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-17

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :

t t
From 10M Ethernet, the rate of Ethernet increases of 10 times.

:h
Currently FE/GE are the most common ones, in the coming future more and more NNI

e s
(Network Node Interface) will be upgrade to 10GE in Metro Ethernet network.

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-18

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Generally, 10Mbit/s Ethernet is only positioned at the access layer of the network. The new

:h
generation products of multimedia, video and database can easily overwhelm the Ethernet

s
running at the rate of 10Mbit/s.
e

r c
The 10Mbit/s Ethernet can achieve the connection of 100m in distance.

ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-19

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-20

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Ethernet networks providing 10 Mbps of bandwidth seemed very fast when it was first

:h
released, but developments in computer speed meant that by the early 1990s computers

s
were running faster and could provide a heavy load for a 10 Mbps network. The network
e
c
became a bottleneck slowing down communications and business then it became clear
r
u
that a faster speed technology would need to be developed.
o

es
The development of fast Ethernet began in 1993 and became a standard in 1995. The

R
foundations remained the same as for those for 10BASE-T: Ethernet frame format,

g
multiport repeaters, bridges and structured wiring but with ten times the transmission
n
ni
speed. Some trade offs were required however. The telephone cable used would not
r
a
support the transmission frequencies of fast Ethernet. Telephone quality cable has too
e
e L much signal degradation for fast Ethernet and the level of electromagnetic radiation

or
allowed by the FCC and European regulatory bodies is exceeded during transmission. So
either a different form of cable was required or a different method of using the same form.

M The 100BaseTX portion of the standards documents fast Ethernet over standard category 5
UTP. This is the dominant form of Fast Ethernet and has become the standard Ethernet
installation.
In the 100Base FX option, the F relates to operation over fiber optic cabling. Greater
distances can be achieved with fiber. 100BASE-FX used in half duplex mode on a point to
point link can achieve a distance of 412 meters, but this is limited due to the collision
domain requirements. In full duplex mode distances of 2000 meters can be reached.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-21

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The category 3 UTP scheme, called 100Base-T4, uses a signaling speed of 25 MHz, only

:h
25 percent faster than standard Ethernet's 20 MHz. However, to achieve the necessary

s
bandwidth, 100Base-T4 requires four twisted pairs.
e

r c
For category 5 wiring, the design, 100Base-TX, is simpler because the wires can handle
u
clock rates of 125 MHz. Only two twisted pairs per station are used, one to the hub and
o
es
one from it. 100Base-TX and 100Base-T4 are collectively referred to as 100Base-T.

R
The last option, 100Base-FX, uses two strands of multimode fiber, one for each direction,

n g
so it, too, is full duplex with 100 Mbps in each direction. In addition, the distance

ni
between a station and the hub can be up to 2 km.
r
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-22

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
The IEEE Gigabit Ethernet task force is responsible for standards development for this

:h
technology. The Gigabit standard was developed as the IEEE 802.3z supplement and the

e s
work assisted by the Gigabit Ethernet Alliance, which is a group of major product
manufacturers that are assisting the task force with their development project.

r c
Like Fast Ethernet, this system uses an upgraded physical layer protocol and an upgraded
u

o
MAC layer which is similar to both the 10Mbps and 100Mbps standards. There are
s
Re
however some differences to do with collision domain parameters to enable Ethernet to
work at these speeds.

n g
Gigabit Ethernet can operate in both half and full duplex modes and has become

ni
increasing popular in both backbone, campus and general device connectivity as

r
equipment prices fall.
a

L e
Although the standard for Gigabit Ethernet offers several changes to the traditional
10Mbps variant it is viewed as a natural extension to the technology. Products that
e
or
combine Gigabit Ethernet , Fast Ethernet and 10Mbps Ethernet are readily available
allowing for a seamless integration of the technology.
M The specification includes the following media types:
1000BaseLX - Single mode fiber (3km plus)
1000BaseSX - Multi-mode fiber (300 - 550 meters)
1000BaseCX - Coaxial cable (25 meters plus)
1000BaseT - UTP (multi-pair up to 100m)
Gigabit Ethernet is ideal for LAN backbone solutions. It scales well from existing Ethernet
as the speed is the major technological change and the technology is obviously already
widely utilized and understood.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-23

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
Gigabit Ethernet supports two different modes of operation: full-duplex mode and half-

:h
duplex mode. The ''normal'' mode is full-duplex mode, which allows traffic in both
directions at the same time.
e s

r c
Gigabit Ethernet supports both copper and fiber cabling.

ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-24

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
LAN PHY
t t
:h
The most common variety is referred to as LAN PHY, used for connecting between
routers and switches. Although called LAN, this can be used with 10GBase-LR and -

e s
ER up to 80 km. LAN PHY uses a line rate of 10.3 Gbit/s and a 64B/66B encoding.

r c
10GBASE-SR (short range) has a range of 26 m to 82 m depending on multi-mode
fiber cable type.
ou

es
10GBASE-LRM, also known as 802.3aq, supports up to 220 m on FDDI-grade 62.5
m multi-mode cable
R
10GBASE-LR is a Long Range technology over 1300 nm single-mode fiber between
g

10 Km to 25 Km.

ni n
10GBASE-ER (extended range) supports distances up to 40 km over single-mode

a r
fiber (using 1550 nm).

L e 10GBASE-LX4 uses coarse wavelength division multiplexing to support ranges of


between 240 m and 300 m over deployed multi-mode cabling. This is achieved
e
or
through the use of four separate laser sources operating at 3.125 Gbit/s in the
range of 1300nm on unique wavelengths. This standard also supports 10 km over
single-mode fiber.
M 10GBASE-T, or IEEE 802.3an-2006, provides 10 gigabit/second connections over
conventional unshielded or shielded twisted pair cables. 10GBASE-T works over
shorter distances with Category 6 cabling (up to about 56 meters), with the
possibility of up to 100 meters for new cable installations designed for 10GBase-T.
The 802.3an standard defines the wire-level modulation for 10GBASE-T as a
Tomlinson-Harashima Precoded (THP) version of pulse-amplitude modulation with
16 discrete levels (PAM-16), encoded in a two-dimensional checkerboard pattern
known as DSQ128. The mathematics for this are 3.125bits encoded per symbol x
833Mbauds x 4 pairs = ~10Gbps.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-25

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
10GBase-SR/LR/ER WAN Interface
t t
:h
10GE Ethernet service, data rate is 10.31Gbit/s.

e s
Connect with 10GE Ethernet service.

r c
10GBase-SW/LW/EW WAN Interface
u

s o
mapping of Ethernet frames into simplified SONET/SDH frames, data rate is 9.953
Gbit/s.
Re

n g
Connect with 10G POS service.

ni
10GBase-LX4

a r10.3 Gbit/s for the serial (LAN).


e

e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-26

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-27

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-28

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The half-duplex mode has the following features:

:h
Receiving data or sending data takes place only in one direction at a time.
CSMA/CD is used.
e s
r c
This mode has the limitation to the transmission distance.
u


s o
The full-duplex mode has the following features:

Re
Receiving data and sending data can take place simultaneously.

n g
The maximum throughput is double the transmission rate.

r ni
This mode does not have the limitation to the transmission distance.

e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-29

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Auto-negotiation was originally defined in the IEEE 802.3u standard in 1995. It was

:h
introduced into the fast Ethernet part of the standard but is also backwards compatible to

s
10BASE-T. This was later updated in 1999, the negotiation protocol was significantly
e
c
extended by IEEE 802.3ab, which specified the protocol for Gigabit Ethernet, making auto-
r
u
negotiation mandatory for Gigabit Ethernet.
o

es
Auto-negotiation is used by devices that are capable of different transmission rates (such

R
as 10Mbit/sec and 100Mbit/sec), and different duplex modes (half duplex and full duplex).

g
Every device will declare its possible modes of operation. The two devices then choose the
n
ni
best possible mode of operation that are shared by the two devices, where higher speed
r
a
(100Mbit/sec) is preferred over lower speed (10Mbit/sec), and full duplex is preferred over
e
e L half duplex at the same speed.

or
Parallel detection is used when a device that is capable of auto-negotiation is connected to
one that is not. This happens if one device does not support auto-negotiation or it is
M disabled via software. In this condition, the device that is capable of auto-negotiation can
determine the speed of the other device. This procedure cannot determine the presence of
full duplex, so half duplex is always assumed.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-30

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
A duplex mismatch will result if the other device is in full duplex mode, that is, one device

:h
is using full duplex while the other one is using half duplex. The typical effect of duplex

s
mismatch is that the connection is working but at a very low speed.
e
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-31

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Many newer Ethernet NICs, switches and hubs automatically apply an internal crossover

:h
when necessary. This feature is known Auto-MDI/MDI-X, Universal Cable Recognition or

s
Auto Sensing. This eliminates the need for crossover cables, uplink ports and manual
e
c
selector switches found on many older hubs and switches. This also reduces installation
r
errors.
ou

es
Crossover cables for 10/100 Ethernet have only pairs 2 and 3 swapped, a 1000BASE-T

R
crossover cable also has pairs 1 and 4 swapped.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-32

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-33

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The Ethernet standard includes an optional flow control operation known as "PAUSE"

:h
frames. PAUSE frames permit one end station to temporarily stop all traffic from the other
end station.
e s

r c
For example, if we have a full-duplex link that connects two devices called Device A" and
u
Device B". If Device A transmits frames at a faster rate than Device B can process because
o
es
there is no buffer space remaining to receive additional frames. Device B can transmit a

R
PAUSE frame to Device A requesting that Device A stop transmitting frames for a specified

g
period of time.
n

r ni
The format of a PAUSE frame conforms to the standard Ethernet frame format but includes

a
a unique type field with additional parameters.
e

e L The MAC Control Parameters field contains a 16-bit value that specifies the duration of the

or
PAUSE in units of 512-bit times. Valid values are 00-00 to FF-FF (hex).

M
A 42-byte reserved field (transmitted as all zeros) is required to pad the length of the
PAUSE frame to the minimum Ethernet frame size.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-34

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
When the data processing/transferring capability of the equipment fails to handle the flow

:h
received at the port, congestion occurs on the line. To reduce the number of discarded

s
packets due to buffer overflowing, proper flow control measures must be taken.
e

r c
The half-duplex Ethernet port applies the back-pressure mechanism to control the flow.
u
Currently, the half-duplex Ethernet function is not widely applied.
o
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-35

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-36

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-37

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Concatenation, which is one of the important SDH transmission features, specifies how to

:h
transmit service signals whose rate is greater than C-4 (149 760 kbit/s). The concatenation

s
technology does not impair service signals.
e

r c
Concatenation is a process for combining multiple containers as one container that
u
maintains the integrity of the bit sequences.
o

es
Concatenation service transmission is based on ITU-T Recommendation G.707.
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-38

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Contiguous concatenation concatenates the contiguous C-4s in the same STM-N into an

:h
entire structure (C-n-Xc) to be transported. VC-4-Xc in contiguous concatenation has only

s
one column of POH indication. Therefore, contiguous concatenation maintains the
e
c
contiguous bandwidth throughout the whole transmission process. Contiguous
r
u
concatenation requires the support of all the equipment that services travel by. Most
o
s
existing equipment, however, does not have such capabilities.
e
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-39

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Virtual concatenation concatenates VC-n containers in different STM-Ns, which can be

:h
transferred in the same route or different routes, into a big virtual structure (VC-n-Xv) to

s
transport. In virtual concatenation, each VC-n has a separate structure and POH to form a
e
c
complete VC-n structure. Multiple concatenated VC-ns functions interleaving of several VC-
r
u
ns. The equipment on both the source NE and sink NE requires only special hardware for
o
concatenation.
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-40

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The concatenation indicator in the AU-4 pointer specifies that multiple C-4 payloads

:h
carried in a VC-4-Xc must remain together. The available capacity for mapping equals the

s
C-4 capacity of multiple C-4s multiplied by X (for example, when the value of X is 4, the
e
c
capacity is 599040 kbit/s; when the value of X is 16, the capacity is 2396160 kbit/s).
r

ou
Columns 2 to X of VC-4-Xc are the fixed stuffed bits, and column 1 of VC-4-Xc is used as

es
the POH, which is allocated to the VC-4-Xc.

R
The first AU-4 of AU-4-Xc must have a pointer value within the specified range. For all the

n g
subsequent AU-4s of AU-4-Xc, their pointers must be set to concatenation indication. That

ni
is, bits 1 to 4 are set to "1001", bits 5 to 6 are not specified, and bits 7 to 16 are set to ten
r
a
1s. Concatenation indication specifies that the pointer processor performs the same
e
e L operations as the first AU-4 of AU-4-Xc.

or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-41

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
One VC-4-Xv provides the contiguous payload area (C-4-Xc) whose payload capacity is C-4

:h
multiplied by X. The container can be mapped into X individual VC-4s, which form the VC-

s
4-Xv. Each VC-4 has its POH, which is the same as the POH in a common VC-4. The H4
e
c
byte in POH is used as the sequence number specified in the virtual concatenation and
r
multi-frame indicator.
ou

es
The MFI signal, which is generated in all VC-4s of VC-4-Xv, is transmitted through bits 5-8

R
in the H4 byte of all the VC-4s. The MFIs are numbered from 0 to 15.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-42

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
According to the requirements of SDH contiguous concatenation services, all the NEs

:h
through which the end-to-end services travel must be capable of processing VC-4-Xc

s
services. The network conditions, however, are difficult to meet. Therefore, VC-4-Xc
e
c
services are generally converted into VC-4-Xv services on the network boundary where
r
u
contiguous concatenation services are received. In this case, the intermediate NEs on the
o
s
network need to process VC-4 services but not VC-4-Xc services. The NEs on the network
e
R
boundary convert VC-4-Xc services to VC-4-Xv services.

n g
The existing SDH service line board on the OptiX OSN 1500/2500/3500/7500/9500 can

ni
access and process contiguous concatenation services.
r

e a
Most EoS service data boards on the OptiX equipment form VC-TRUNKs in virtual

e L concatenation mode, which facilitates flexible networking and supports multi-path

or
transmission. The virtual concatenation technology can be used with the LCAS scheme for
adjustment of link bandwidth.
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-43

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Due to development of services transmitted on SDH/SONET networks and constantly increasing

:h
demands for access bandwidths, the previous fixed container (with the maximum granularity of VC-
4) no longer meets the relevant requirement. Therefore, the concatenation technology emerges.

e s
Compared with contiguous concatenation, virtual concatenation is more flexible and enjoys higher
bandwidth utilization.
r c

ou
Both contiguous concatenation and virtual concatenation have the following problems:

es
When a physical channel fails, all the concatenated channels fail. In other words, all services
are interrupted.
R
Severe impact of bandwidth adjustment on services: If you adjust the bandwidth after a
g

ni n
service is created, the service is interrupted for certain period of time.
Long service provisioning time: The duration from the time when a subscriber applies for a
r

e a service to the time when the service is available lasts very long.

L
The LCAS is a supplement to the virtual concatenation technology. The LCAS supports the following

e
functions:

or
The LCAS dynamically adjusts (adds or deletes) the service bandwidth without affecting the
availability of the existing services.
M If some physical channels fail in virtual concatenation, the LCAS suppresses these physical
channels. Other physical channels in virtual concatenation can transfer services. Hence, this
prevents a situation where the failure of a single physical channel causes interruption of
services.
The LCAS is applied on the basis of virtual concatenation and can improve the performance
of virtual concatenation. The control packet is transported in the reserved SDH overhead
byte (H4 byte for a higher order virtual concatenation, or K4 byte for lower order virtual
concatenation). The LCAS can dynamically adjust the number of virtual containers for
mapping required services to meet the bandwidth requirements of different services. As a
result, the bandwidth utilization is improved.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-44

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The LCAS, which complies with ITU-T G.7042, is developed to solve the virtual

:h
concatenation problems.

e s
In the LCAS scheme, the source NE and sink NE can dynamically adjust the required VCG

r c
capacity based on the traffic volume of the services to be mapped and the required
u
bandwidth. When a link of the VC-TRUNK member where services are mapped is faulty,
o
es
the LCAS can also cancel the link. As shown in the figure on page 15, in normal state,

R
assume that 4xVC-4 virtual concatenation are mapped in VC-TRUNK. When two channels

g
in the virtual concatenation fail, the LCAS automatically adjusts the VCG capacity.
n
ni
Although the service rate is decreased, the service data is protected. When the failed
r
a
channels recover, the bandwidth of the virtual concatenation is automatically restored.
e

e L On an MSP ring network, the transmission bandwidth of the protection MSP channel can

or
be fully utilized if the LCAS technology is adopted to dynamically adjust the virtual
concatenation bandwidth. Specifically, the protection MSP channel transports extra
M services whose reliability is not assured because they are not protected. If virtual
concatenation is adopted, some services are mapped into the working channel, and the
other services are mapped into the protection channel. If the protection channel fails, the
LCAS dynamically decreases the VCG members in a virtual concatenation group. As a result,
the service transmission bandwidth automatically decreases, and the services are not
interrupted. When the protection channel recovers, the service bandwidth is automatically
restored.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-45

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-46

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Synchronization of changes in the service traffic between the source NE and the sink NE is

:h
achieved by control packets. Each control packet describes the state of the link during the

s
next control packet. In other words, the link state change information is sent in advance to
e
c
facilitate the receiver to timely process or modify the relevant configuration.
r

ou
The LCAS is based on virtual concatenation. The control packet (K4 byte for lower order

es
virtual concatenation) consists of consecutive 16 H4 bytes.

R
The CRC method for assurance of the control frame is used for the overhead in the control

n g
packet. When a control packet is received, the CRC method is used to immediately check

ni
the control packet and determine whether the contents are valid.
r

e a
Definition (implementing method) of a control packet:

e L In higher order (HO) mode: 16 frames form a multi-frame (note: 8000 frames are

or
transmitted each second).

M Consisting of H4 overhead byte: There are altogether consecutive 16 frames from


frame 8 in multi-frame n (multi-frame 2) to frame 7 in multi-frame n+1.
Bits 1-4 in the H4 byte of each frame have different meanings in different frames.
For example, bits 1-4 in frames 0 and 1 represent the multi-frame number, and bits
1-4 in frames 8 and 9 represent the member status. For the interpretation and
function of each field (for example, CTRL), see the subsequent definition and
description of the overhead control field.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-47

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Encapsulation format
t t
:h
MSTP defines three standard encapsulation formats: HDLC, LAPS, and GFP.

e s
Different vendors use different encapsulation formats. In practice, a vendor uses

r c
one or two formats. Although the same encapsulation format is used, certain
u
differences also exist.
o

es
The exchangeability of Ethernet encapsulation formats is important. If the
R
encapsulation formats specified by different vendors are exchangeable, GE or FE

n g
services not only traverse an SDH network that consists of the equipment of

r ni
different vendors, but also do not require the SDH equipment provided by the

e a same vendor at both ends. The SDH network that consists of equipment of

e L different vendors becomes a transparent channel of Ethernet service, and provides

or
a basis for building wider Layer-2 networks.
The GFP format is highly standardized. It is used for mapping data services into
M

SDH/OTN services and complies with ITU-T G.7041. The GFP format currently
supports frame-mapped GFP and transparent GFP. It can perform statistical
multiplexing for data signals to effectively prevent error frames caused by bit errors,
therefore facilitating interconnection and interworking between the equipment of
different vendors.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-48

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Generic framing procedure (GFP), which is defined in ITU-T G.7041, can correct errors in

:h
data packet headers and multiplex channel identifiers on a port (it can combine multiple

s
physical ports as a network path). The most important feature of GFP is that GFP supports
e
c
frame mapping and transparent transmission, therefore supporting more applications. In
r
u
frame mapping mode, the frames in framed data signals are encapsulated into GFP frames.
o
s
Lower rates can be increased and multiplexed. In transparent transmission mode, data
e
R
signals are received but are not changed. Digital encapsulation based on low overhead and

g
low delay is performed for SDH frames. In principle, GFP can be used for encapsulating any
n
ni
protocol-compliant packets. It assures the packets in simple protocol format to be

a r
transmitted at the optical transmission layer. It also assures flexible encapsulation and

L e
smaller bandwidth granularities.

e
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-49

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Generic framing procedure (GFP), which is defined in ITU-T G.7041, can correct errors in

:h
data packet headers and multiplex channel identifiers on a port (it can combine multiple

s
physical ports as a network path). The most important feature of GFP is that GFP supports
e
c
frame mapping and transparent transmission, therefore supporting more applications. In
r
u
frame mapping mode, the frames in framed data signals are encapsulated into GFP frames.
o
s
Lower rates can be increased and multiplexed. In transparent transmission mode, data
e
R
signals are received but are not changed. Digital encapsulation based on low overhead and

g
low delay is performed for SDH frames. In principle, GFP can be used for encapsulating any
n
ni
protocol-compliant packets. It assures the packets in simple protocol format to be

a r
transmitted at the optical transmission layer. It also assures flexible encapsulation and

L e
smaller bandwidth granularities.

e
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-50

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
GFP supports the following working modes:
t t
:h
Frame-Mapped GFP (GFP-F), which is a PDU (such as IP and Ethernet) oriented

e s
processing mode, performs one-to-one mapping between the upper-layer PDUs of

r c
Ethernet MAC frames and the GFP PDUs.

ou
Transparent GFP (GFP-T), which is a data coding block (such as Fiber Channel and
s

Re
ESCON) oriented processing mode, transparently maps 8B/10B payload into GFP
frames for low-delay transmission. The signals that can be transparently mapped

n g
include Fiber Channel signals, ESCON signals, FICON signals, and GE signals. In

r ni
GFP-T mode, the entire frame need not be buffered. All the words in the signals

e a are separately decoded, and are then mapped into fixed-length GFP frames,

e L regardless of data words or control words. As a result, the 8B/10B control words in

or
the signals are protected.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-51

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t
Frame structure in GFP encapsulation format
t
:h
GFP core header

e s
The GFP core header consists of four bytes, including one 16-bit PDU

r c
length indicator field and one 16-bit core header error check (cHEC) field.

ou
PDU length indicator (PLI)

es
PLI indicates the length of the GFP payload area.
R
In a GFP client frame, the minimum value of PLI is 4. The values from 0 to 3
g

ni n are used for GFP control frames.


a rGFP payload frame header

L e The GFP payload frame header includes the PTI field and the Extension
Header field.
e
or
Payload Type Identifier (PTI)
The PTI field indicates the type of the payload.
M

The GFP extension header, which is an extended field that contains 0 to 60


bytes, supports data link header such as virtual link identification,
source/destination address, port number, class of service, and extension
header error control.
Payload frame check sequence (FCS) field
The CRC-0/16/32 sequence assures that the contents of the GFP payload
information are correct.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-52

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
Encapsulating Ethernet MAC frames
t t
:h
The Ethernet MAC frames from the destination address through the frame check

e s
sequence, inclusive, are placed in the GFP-F payload field. The byte sequence and

r c
bit identification within a byte in a GFP-F frame remain unchanged.

ou
Deleting and restoring an inter-frame gap (IFG)

es
When the Ethernet frames are not locally encapsulated in GFP-F format, their IFGs
R

need to be deleted and restored based on the following rules:

n g
ni
The IFGs are deleted before GFP-F adaptation on the source NE, and are

a r inserted after GFP-F deadaptation on the sink NE.

L e When Ethernet MAC frames are extracted from the service data, the IFGs

e are deleted. After GFP-F adaptation is performed for the extracted Ethernet

or MAC frames on the source NE, the Ethernet MAC frames are encapsulated

M
into GFP-F frames.
After Ethernet MAC frames are extracted from the received GFP-F frames,
the IFGs are restored. The restoration of IFGs assures that sufficient bytes
that contain 00 exist between consecutively received Ethernet MAC frames
to meet the minimum IFG requirements (16 bytes).

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-53

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-54

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
An Ethernet switch or bridge has the following functions:

:h
Source MAC address learning.

e s
Forwarding based on the destination address.

r c
Filtering based on the destination address
u

s o
Flooding based on the destination address

Re
Comparison between HUB and LAN Switch:

n g
1. HUB is located in Physical Layer while LAN Switch is located in Data-Link Layer.

r ni
2. HUB: semi-duplex, data will broadcast to all the ports, lower efficiency. LAN

e a Switch: full-duplex, through MAC self-learning get CAM table, avoid collision and

e L enlarge the broadcast domain.

or
Today, LAN switches are used to replace hubs in the wiring closet because user
applications demand greater bandwidth.
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-55

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Every LAN Switch has a MAC address table, which is the map of MAC address and port,

:h
and LAN Switch forwards the frames based on the MAC address table.

e s
Source address learning is the process of obtaining the MAC address of devices. When a

c
bridge is first turned on, it has no entries in its bridge table. As traffic passes through the
r
u
bridge, the sender's MAC address is stored in a table along with the associated port on
o
s
which the traffic was received.
e

R
As we see in the diagram - If PC A sends a frame to PC D, the Switch receives the frame on

g
port 1, first, it looks at the destination MAC address, and checks the MAC address table, if
n
ni
the table has no entry which matches the destination MAC address the LAN Switch sends

r
the frame to all the other ports, it will then write the source MAC address of the received
a
L e
frame into the table. This establishes the mapping relationship between the port 1 and the
MAC address of PC A. Using this method, each switch will establish the mapping
e
or
relationship and the MAC address table can be populated.
When a bridge does not have an entry in its bridge table for a specific address, it will
M transparently forward the traffic through all its ports except the source port. This is known
as flooding. The source port is not "flooded" because the original traffic came in on this
port and already exists on that segment. Flooding allows the bridge to learn, as well as
stay transparent to the rest of the network, because no traffic is lost while the bridge is
learning. After the bridge learns the MAC address and associate port of the devices to
which it is connected, the benefits of transparent bridging can be seen by way of filtering.
Filtering occurs when the source and destination are on the same side (same bridge port)
of the bridge.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-56

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
When a frame arrives at a switch interface, the destination hardware address is compared

:h
to forward/filter MAC database.

e s
If the destination hardware address is known and listed in the database, the frame

r c
is only sent to correct interface.

ou
If the destination hardware address is not listed in the MAC database, then the
s

Re
frame is broadcasted out all active interfaces except the interface the frame was
received on. While a device answers the broadcast, the MAC database is updated.

n g
ni
Maximum Age:

a rEach CAM table has its capacity, it only can contain limited MAC database. So

L e CAM table set a timer, the default value of the timer is 5 minutes. If the
destination hardware address dont use the database in CAM table for 5 minutes,
e
or
the timer will be initialized, and that database in the table will be deleted.


Ageing is required to keep the address table fresh.
Devices may be moved from port to port which could lead to traffic being sent out of the
wrong port.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-57

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Cut-Through Mode
t t
:h
Switches operating in cut-through mode receive and examine only the first 6 bytes

e s
of a frame. These first 6 bytes cover the destination MAC address, which has

r c
sufficient information to make a forwarding decision. Although cut-through
u
switching offers the least latency when transmitting frames, it is may transmit
o
es
fragments created during Ethernet collisions, corrupted frames.
Fragment-Free Mode R
n g
ni
Switches operating in fragment-free mode receive and examine the first 64 bytes

a rof frame. Why examine 64 bytes? In a properly designed Ethernet network,

e
collision fragments must be detected in the first 64 bytes.

e
L Store-and-Forward Mode

or Switches operating in store-and-forward mode receive and examine the entire

M frame, resulting in the most error-free type of switching, however this is also the
slowest type of switching.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-58

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Layer 2 switches separate the network in to collision domains, so if a hub is attached to

:h
each port there will be a collision domain on each port.

e s
But the switch and the LANs connected to the switch form a Broadcast Domain. Any

r c
broadcast packets will be flooded across the whole domain, and all connected devices will
u
receive the broadcast packet .if there are many broadcast packets in a domain, it may
o
es
occupy a large part of the available network bandwidth and because these broadcasts may

R
go to areas of the network where they are not needed this will reduce the efficiency of the
network.
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-59

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Improve the bandwidth utilization rate:
t t
:h
The VLAN can effectively solve the performance declining problem caused by the
broadcast storm;
e s

r c
Enhance the communication security:

ou
The message of one VLAN will not be received by the hosts in other VLANs;
s

Re
Strengthen the network robustness:

n g
When the network scale increases, the failure in part of the network will influence

ni
the whole network. After introducing the VLAN, some network failure can be

a rlimited within one;

L e As the VLAN makes the segmentation on the network logically, the flexible

e networking solution and simple configuration management reduce the

or management and maintenance cost.

M Broadcast Control:
All ports in the same VLAN will filter the broadcast, different VLAN members can
not received the broadcasts.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-60

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The four-byte 802.1q tag head contains a 2-byte Tag Protocol Identifier field (TPID) and a

:h
two-byte Tag Control Information (TCI) field.

e s
TPID (Tag Protocol Identifier) is a new type field defined by the IEEE, indicating that the

r c
frame carries an 802. 1Q tag. The TPID contains a fixed value of 0x8100.

ou
The TCI contains the frame control information including the following elements:

es
Priority: Three bits indicate the frame priority with a total of 8 priority levels
R

ranging from 0 - 7. This is specified by the IEEE 802.1p standard.

n g
ni
Canonical Format Indicator (CFI): This is used to indicate the bit encoding format of

a rthe address in the frame. If the CFI value is 0, it indicates the standard format for

L e Ethernet. If it is 1 it indicates a non-standard format which is used in token ring or


FDDI.
e
or VLAN Identifier (VLAN ID): This 12-digit field indicates the VLAN ID which can

M
support a total of 4096 VLANs.
In switched networks Ethernet frames have two formats:
Frames without the four-byte 802.1Q tag are called untagged frames;
Frames with the tag are called tagged frames.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-61

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
VLAN Based on port:
t t
:h
Normally VLAN 1 reserved for internal use.

e s
In the figure, the port 1 and port 7 are designated to the VLAN 5, and the port 3

r c
and port 10 are designated to the VLAN 10. The host A and host C connect to the

ou
port 1 and port 7 respectively. Therefore they belong to the VLAN5. In this way,

es
host B can not communicate with host A.
R
If there are several switches, you can designate that the ports 1~6 of the switch 1
g

ni n
and the ports 1~4 of the switch 2 belong to the same VLAN. Thats to say, the

a rsame VLAN can cross several Ethernet switches. The port-based segmentation is

e
the most commonly used method in defining the VLAN. The advantage of this

e L segmentation method is that it is simple to define the VLAN members by only

or
defining all the ports. Its disadvantage is that the port should be defined again if
the VLAN subscriber leaves the original port to a certain port of a new switch .
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-62

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-63

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
The VLAN application has solved many problems occurred in the large-scale layer 2

:h
switching network:

e s
Improve the bandwidth utilization rate: The VLAN has effectively solved the

r c
performance declining problem caused by the broadcast storm;

ou
Enhance the communication security: The message of one VLAN will not be

es
received by the hosts in other VLANs;
R
Strengthen the network robustness: When the network scale increases, the failure
g

ni n
in part of the network will influence the whole network. After introducing the

a rVLAN, some network failure can be limited within one;


L e
L3 switch is needed if the hosts in different VLAN communicate with each other.

e
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-64

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
UNI
t t
:h
UNI port in customer side, include tag, access and hybrid, UNI port can identify

e
the VLAN tag of frame.
s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-65

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-66

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
P1 refers to the original data, P2 refers to the processed data.

:h
Receiving:

e s
Input data without VLAN tag: Add Default VLAN;

r c
Input data without VLAN tag: Discard.
u

Transmitting:
s o

Re
Strip Default VLAN.

n g
In this case, set port attribute is Access, then the input data of VC trunk must with VLAN,

ni
so set the attribute of VC trunk is Tag aware.

a r
L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-67

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
Receiving:
t t
:h
Input data without VLAN tag: Discard;

e s
Input data with VLAN tag: Transparent transport.
Transmitting:
r c
u

s o
Transparent transport.

Re
In this case, set port attribute is tag aware, then the input data of VC trunk must with

g
VLAN, so set the attribute of VC trunk is Tag aware.
n
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-68

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Receiving:
t t
:h
Input data without VLAN tag: Add Default LAN;

e s
Input data with VLAN tag: Transparent transport.
Transmitting:
r c
u

s o
If the received VLAN ID is same as the Default VLAN ID: Strip Default VLAN;

Re
If the received VLAN ID is different with the Default VLAN ID: Transparent

g
transport.
n
ni
In this case, set port attribute is Hybrid, then the input data of VC trunk must with VLAN,

a r
so set the attribute of VC trunk is Tag aware.

L e
Also can set the attribute of VC trunk is Hybrid in some occasion.

e
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-69

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
QinQ technology is a VLAN stacking technology, which conforms to the recommendation

:h
for S-VLAN in IEEE 802.1ad and is an expansion of VLAN technology.
Advantages of QinQ technology:
e s
r c
Expands VLAN and alleviates VLAN resource insufficiency. For example, a VLAN
u

o
providing 4096 VLAN IDs can provide 4096 x 4096 VLANs after VLAN stacking;
s

Re
Extends LAN service to WAN, connecting the client network to the carrier network
and supporting transparent transmission.

n g
ni
QinQ frame format:

a r
L e
DA SA TYPE(8100) S-VLAN TYPE(8100) C-VLAN Ethernet
e
or
(6B) (6B) (2B) (2B) (2B) (2B) Data

M
Customer VLAN label, defined as C-VLAN;
Server layer VLAN label, defined as S-VLAN.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-70

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The transmission process of a QinQ packet in the above network model is as follows:

:h
When two service packets respectively containing C-VLAN1 and C-VLAN2 tags

e s
arrive at service provider network S1 through transmission equipment, the S-Aware

r c
port adds an S-VLAN tag defined by the service provider to the packets. Thus, the
u
service packets contain two layers of VLAN tags during the transmission in the
o
network.
es
R
When the service packets go from service provider network S1 into service provider
g

ni n
network S2, the S-Aware port in service provider network S2 replaces the S-VLAN1
tag with a S-VLAN2 tag and the service packets are continuously transmitted in

a rservice provider network S2.

L e When the service packets arrive at the network at the side of the destination users,
e

or
the C-Aware port at the user side removes the S-VLAN2 tag and forwards the
service packets to the destination users according to different C-VLAN tags.
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-71

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-72

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In a traditional IP network, all packets are treated in an undifferentiated way. Every router adopts

:h
the first in first out (FIFO) policy to process packets, and makes its best effort to transmit packets to
the destination. In this case, the packet transmission performances such as the reliability and delay

e s
are not ensured. The constant development of networks and the emergence of new applications

r c
based on IP networks pose new requirements for the QoS of IP networks. Real-time services such as

ou
voice over IP (VoIP) services pose stringent requirements for the transmission delay of packets. An
extremely long transmission delay is not acceptable to the user. Video conference and video on

es
demand (VOD) services require ensured high bandwidth, low delay, and low delay jitter. Key tasks

R
such as transactions and Telnet may not require a high bandwidth but require low delay, and thus

g
these key tasks must be always handled first in the case of network congestion. Email and FTP

n
ni
services are not sensitive to time delay. To support voice, video, and data services that have different
service requirements, a network must be able to differentiate communication types so as to provide

a r
relevant services.

L e
QoS: Quality of Service (QoS) refers to the ability of a communication network to ensure the

e
expected service quality in the aspects of bandwidth, delay, delay jitter, and packet loss ratio,

or
therefore ensuring that the request and response from the user or the request and response from
the application meet the requirements of an expected service class.

M The following illustrates the sending of packets in an FIFO queue and a priority queue:
FIFO queue: All packets to be transmitted through this interface enter the tail of the FIFO
queue according to the sequence of their arrival at the interface. The interface transmits
these packets from the head of the queue. The packets are not differentiated during the
transmission, and the quality of packet transmission is not ensured.
Priority queue: After packets arrive at the interface, the packets are classified first. Then,
these packets enter the tail of their corresponding queues according to their types. In this
manner, the higher-priority packets are always transmitted first and these packets have low
delay jitter. In addition, the performance indexes of these packets, including the packet loss
ratio and delay jitter, can be ensured even in the event of network congestion.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-73

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Basic concepts of QoS:
t t
:h
Flow classification: A flow refers to a group of packets that have the same characteristics.

s
By using the specified rules, flow classification identifies packets that meet different types of

r c e
characteristics. It is the precondition and basis for providing differentiated services. Flow
classification can be classified into two types, namely, complex flow classification and

u
simple flow classification.
o

es
Traffic policing: The typical function of traffic policing is to supervise the rate of traffic and
to ensure that the rate of traffic does not exceed the committed rate. If the traffic of a
R
connection exceeds the committed rate, some packets can be discarded or the packet
g
priorities can be re-set through the traffic policing function.
n
ni
Traffic marking: Traffic marking lets another application system or device that processes a

packet know the type of the packet and perform the predefined processing for the packet.

e a Queue scheduling: Queue scheduling is used for implementing congestion management.


L

When a congestion happens on an outgoing port, a proper queue scheduling mechanism


e
or
can ensure that a type of packets can first be sent. The queue scheduling mechanisms
include FIFO, PQ, CQ, WFQ, CBWFQ, LLQ, and IP RTP.

M Traffic shaping: It can restrict the traffic and burst of a connection in a network, and
enables the packet to be transmitted at an even rate.
Packet processing:
At the ingress port, the network equipment classifies the traffic, measures rates, and
differentiates CoSs for packets. In this manner, the equipment labels the packets according
to flow classification, CAR results, and CoS rules. Then, the equipment forwards the packets
to the egress port, according to a forwarding algorithm.
At the egress port, the packets are classified again for identifying the packets that require
traffic shaping. According to the labels added at the ingress port, the packets enter the
queues of relevant priorities and wait for scheduling.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-74

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Best-Effort model
t t
:h
It is the default mode for all traffic. Internet was initially based on a best-effort

e s
packet delivery service. Its queuing algorithm is FIFO.
IntServ model
r c
ou
The Integrated Service (IntServ) model expects applications to signal their
s

Re
requirements to the network on demand. The bandwidth should be reserved
according to application. The signal protocol is RSVP.

n g
ni
DiffServ model

a rDiffServ provides the greatest scalability and flexibility in implementing QoS in a

L e network. Network devices recognize traffic classes and provide different levels of

e QoS to different traffic classes.

or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-75

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-76

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Integrated service is an integrated service model that meets various QoS requirements.

:h
Before sending packets, the service model should apply specific service to the network.

s
This request is accomplished by signaling. The application program first notifies the
e
c
network about its traffic parameters and the required specific service quality including
r
u
bandwidth and delay etc. After the application program receives network confirmation

o
s
(that is, the network confirms to reserve resources for packets of the application program),

Re
it begins sending packets. Meanwhile, packets sent by the application program should be
controlled within the range of traffic parameter description.

n g
ni
After the network receives the resource request from the application program, it executes

a r
the resource admission control to judge whether to assign resources for the application
program according to the resource request and current network resource condition. Once

L e
the network determines to assign resource for packets of the application program, it will

e
or
ensure the QoS requirements to the application program so long as the packets are
controlled within the range of traffic parameter description. The network will maintain a

M state for each flow (decided by IP address of two ends, port number and protocol number),
and execute packet classification, traffic policing, queuing and dispatching to accomplish
its permission to the application program according to this state.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-77

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In the differentiated service (DiffServ) model, services are described by the traffic classifier.

:h
The flows are classified and marked on the ingress router in the DiffServ domain.

e s
The internal NE perform corresponding PHB according to the classification marking of the

r c
packets and need not perform complex traffic classification. PHB stands for per-hop

u
behavior. It is the action performed to the traffic by a NE, for example, expedited
o
s
forwarding, re-marking, and dropping of packets. The traffic classification marking is
e
R
contained in the packet header and transmitted in the network with the data. Therefore,

g
the router need not maintain the status information for the flows. (In integrated service
n
ni
model, the router must maintain the status information for each flow.) The service that a

r
packet can obtain is related to the marking of the packet. The ingress NE and egress NE of
a
L e
a DiffServ (DS) domain are connected to other DS domains or non-DS domains through
links. Different administrative domains may apply different QoS policies, so the
e
or
administrative domains must negotiate the Service Level Agreement (SLA) and establish the
Traffic Conditioning Agreement (TCA). The inbound traffic to the ingress router and the
M
outbound traffic to the egress router must comply with the TCA.
The DiffServ (DS) domain consists of a group of network nodes (DS nodes) that provide the
same service policy and realize the same per-hop behavior (PHB).
The DS nodes are of two types, namely, DS edge nodes and internal DS nodes. The DS
edge node classifies the traffic that enters the DS domain. The DS edge node marks
different PHB service levels according to different types of service traffic. The internal DS
node controls the flow based on the PHB service levels.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-78

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Complex flow classification means fine packet classification by use of complex rules such as

:h
information (for example, source MAC address, destination MAC address, source IP

s
address, destination IP address, user group number, protocol type, and TCP/UDP port of an
e
c
application) about the link layer, network layer, and transport layer.
r

ou
Simple flow classification means coarse packet classification by use of simple rules such as

es
Type of Service (ToS) field in IP packets, user priority, or EXP field in MPLS packets. Simple

R
flow classification is used to identify flows with different priorities.

n g
Port flow: The packets from a certain port are classified as a type of flow. The Ethernet

ni

r
services associated with such a flow are Ethernet private line services whose service source

a
is the port. The Layer 2 switch services from VB logic port can be classified as port flow.
e

e L Port+VLAN flow: The packets that are from a certain port and have a specified VLAN ID

or
are categorized as a type of flow. The Ethernet services associated with such a flow are
Ethernet private line services whose service source is the port+VLAN.
M Port+S-VLAN flow: The packets that are from a certain port and have a specified S-VLAN
are classified as a type of flow. The Ethernet services associated with such a flow are EVPL
(QinQ) or EVPLAN (802.1ad bridge) services whose service source is the port+S-VLAN.
Port+C-VLAN+S-VLAN flow: The packets that are from a certain port and have a specified
C-VLAN+S-VLAN are classified as a type of flow. The Ethernet services associated with such
a flow are EVPL (QinQ) or EVPLAN (802.1ad bridge) services whose service source is the
port+C-VLAN+S-VLAN.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-79

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
srTCM algorithm:
t t
:h
Tokens enter the two token buckets at the CIR. Every token represents a number of

s
bytes. If the packets that arrive at the buckets do not exceed the CBS, they are
e
c
marked green. If the packets that arrive at the buckets exceed the CBS but do not
r
u
exceed the EBS, they are marked yellow. If the packets that arrive at the buckets
o
s
exceed the EBS, they are marked red. The red packets are directly discarded. In the
e
R
case of network congestion, the green packets can always pass first and the yellow

g
packets are discarded.

n
ni
trTCM algorithm:

a r
Tokens enter the two token buckets respectively at the PIR and CIR. Each token

L e represents a number of bytes. When the rate of the packet exceeds the PIR, the
packet is marked red. When the rate of the packet is between the PIR and the CIR,
e
or
the packet is marked yellow. When the rate of the packet does not exceed the CIR,
the packet is marked green. The red packet is discarded directly. In the case of
M network congestion, the yellow packet is first discarded and the green packet is
always transmitted first.
Parameters:
CIR: Committed information rate
PIR: Peak information rate
EBS: Excess burst size
CBS: Committed burst size
PBS: Peak burst size

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-80

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Packets are classified according to the preset matching rules. The packets whose flow

:h
performance is not defined are directly transmitted without being processed in the token

s
bucket. The packets that require traffic control enter the token bucket for processing.
e

r c
The token bucket can be considered as a container of tokens, and it has a certain capacity.
u
Tokens are placed into the bucket at a rate specified by the user. The user can also set the
o
es
capacity of the token bucket, so that no more tokens can be placed into the bucket when

R
the number of tokens is greater than the capacity of the bucket.

n g
When the packets are processed in the token bucket, the packets can pass and be

ni

transmitted if the token bucket have sufficient tokens to transmit the packets. In this case,

a r
the number of tokens in the bucket decreases according to the length of the transmitted

L e
packets. When the number of tokens in the bucket is so small that no more packets can be

e
or
transmitted, the remaining packets are discarded or marked. In this manner, the traffic
control is performed for a certain type of packets.
M When the token bucket is filled with tokens, the packets that are represented by these
tokens can be transmitted, which allows the transmission of the burst data. When no
tokens are available in the token bucket, packets cannot be transmitted until new tokens
are generated in the bucket. This ensure that the traffic of packets is not more than the
rate at which the tokens are generated. Hence, the traffic control is achieved.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-81

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The token bucket contains tokens instead of packets. A token is generated and added to

:h
the token bucket every t period. When the token bucket is full, the new token is
dropped.
e s

r c
A token permit to send a single (or, in some case, a byte) of packet. A packet can be
u
forwarded when there are enough tokens in the token bucket. The number of tokens
o
es
decreased accordingly, depending on the packet size. If there are not enough tokens, the

R
packet is dropped and the number of token does not change.

n g
The Ethernet processing board that supports the QoS assesses traffic by using the single

ni

rate three color marker (srTCM, which complies with RFC 2697) algorithm or the two rate

a r
three color marker (trTCM, which complies with RFC 2698) algorithm. Packets are marked

L e
in green, yellow, or red according to the assessment results. Based on the packet colors,

e
or
the packets are marked with different priorities in the case of discarding.
The srTCM algorithm is defined for the burst of packet size. The two rate three color
M

marker (trTCM) algorithm, however, is defined for the burst of packet rate.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-82

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
CoS: Packets are scheduled into certain queues of different priorities and then transmitted

:h
depending on the priority of each queue. As a result, the packets in the queues of different

s
priorities are transmitted according to their QoS policies, such as delay and bandwidth.
e

r c
With the four types of CoSs configured, packets can be scheduled to egress queues

u
of different priorities.
o

es
Simple CoS: When a flow is configured with the simple CoS, all packets of the flow

R
are scheduled to a specified egress queue, regardless of the packet type and

g
contents of the flow.

n
ni
VLAN priority CoS: When a flow is configured with the VLAN priority CoS, the

a rpackets of the flow are scheduled to a specified egress queue according to the

L e VLAN priority value carried in the packets. The classification of VLAN priorities is
based on the Pri field defined by IEEE 802.1Q. If the user uses the same VLAN to
e
or
carry services, and if the classification of priorities for the service flows is completed
before the services access the network, the system is able to determine the CoS of
M
the data packets according to the Pri-to-CoS mapping relations.
IP TOS CoS: When a flow is configured with the IP TOS CoS, the packets of the
flow are scheduled to a specified egress queue according to the IPv4 IP TOS value
carried in the packets. This type of CoS is applicable to a data flow containing IP
packets only.
DSCP CoS: When a flow is configured with the DSCP CoS, the packets of the flow
are scheduled to a specified egress queue according to the IPv6 IP DSCP
(Differentiated Services Code Point) value carried in the packets. This type of CoS is
applicable to a data flow containing IP packets only.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-83

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Traffic shaping is usually realized by using a buffer and a token bucket. When the packet

:h
transmission rate is very high, the packets are stored in the buffer. Under the control of the

s
token bucket, the buffered packets are then evenly transmitted. In this manner, the traffic
e
c
shaping function prevents packet loss in case that the fluctuating traffic transiently exceeds
r
u
the bandwidth, and prevents the impact of huge traffic on the downstream equipment.

es
The srTCM algorithm is adopted for traffic shaping. In addition, buffer queues are added
before the token bucket. When service packets exceeds the capacity of the token bucket,
R
g
they are buffered in the corresponding queues.

ni n
When a packet does not obtain a Tp token, the packet is placed into the Tp buffer

a rqueue. When the Tp buffer queue overflows, the overflowed packet is directly

L e discarded.
If a packet obtains a Tp token but no Tc token, the packet is placed into the Tc
e

or
buffer queue. When the Tc queue overflows, the overflowed packet is marked in
yellow and then placed into the egress queue so that the packet is first discarded in
M the case of a network congestion.
If a packet obtains a Tc token, the packet is directly placed into the egress queue.
The optional parameters for traffic shaping include CIR and CBS. CIR is the committed
bandwidth and CBS is the committed burst size.
Committed bandwidth: Shaping bandwidth configured for a queue
Extra bandwidth: Remaining bandwidth after all committed bandwidths that
should be allocated are deducted from the total bandwidth of a port.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-84

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-85

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-86

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The SP queue scheduling algorithm is designed for key service applications. A key service

:h
must be processed with the highest priority when congestion occurs so that the response

s
delay can be shortened. For example, a port provides eight egress queues, which are
e
c
allocated with priorities from 7 to 0 in a descending order.
r

ou
During the SP queue scheduling, packets are transmitted in a descending order of

es
priorities. When a queue with a higher priority is empty, the packets in the queue

R
with a lower priority can be transmitted. In this manner, packets of key services are

g
placed into the queues with higher priorities and packets of non-key services (such
n
r ni
as email services) are placed into queues with lower priorities. Therefore, the

e a packets of key services can be always transmitted first, and the packets of non-key

e L services are transmitted when the data of key services is not processed.

or
The disadvantage of the SP scheduling algorithm is as follows: If there are packets
in the queues with higher priorities when congestion occurs, the packets in the
M queues with lower priorities cannot be transmitted all the time.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-87

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The Weighted Round Robin (WRR) scheduling algorithm divides each port into several

:h
egress queues and schedules the packets in these queues in turn. This ensures that each

s
queue obtains a certain service period.
e

r c
For example, a port provides four queues. In an order of priorities, the WRR
u
configures the w3, w2, w1, and w0 weights for the four queues. Each weight
o
es
stands for the proportion of resources that the relevant queue can obtain from the

R
total resources. If this port is a 100 Mbit/s port and the weights of its four queues

g
are set to 50, 30, 10, and 10 (corresponding to w3, w2, w1, and w0) by the WRR
n
r ni
scheduling algorithm, a minimum of 10 Mbit/s bandwidth is guaranteed for the

e a queue with the lowest priority. This prevents the disadvantage that packets in the

e L queues with lower priorities may fail to obtain services for a long time in the case

or
of the SP queue scheduling.
Another advantage of the WRR scheduling is as follows: Although scheduling of
M multiple queues is performed in the polling manner, time segment allocated to
each queue is not fixed. That is, when a queue is empty, the packets in the next
queue are scheduled immediately. In this manner, the bandwidth resources can be
fully utilized.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-88

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The SP+WRR scheduling algorithm sets one of the egress queues as an SP queue, and

:h
therefore the packets in this queue are always first scheduled. This setting can ensure that

s
the key services are always fist processed. The other egress queues adopt the WRR
e
c
scheduling algorithm, and therefore each queue can obtain a certain period of service.
r

ou
For example, a port provides eight queues, among which queue 7 is an SP queue.

es
In this case, the committed bandwidth for queue 7 is always fist provided. For

R
queues 0 to 6, the WRR scheduling is performed according to the 1:2:4:8:16:32:64

g
weight allocation, and at each service time segment the packets in the
n
r ni
corresponding queue are transmitted. If the queue that corresponds to a service

e a time segment does not have packets, this service time segment is removed and the

e L packets in the queue that corresponds to the following service time segment are

or
transmitted.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-89

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
To enable packets in low-priority queues to obtain the opportunity of fair scheduling and

:h
share network resources in a fair manner, and to optimize the delay and jitter of all flows

s
as much as possible, the FQ scheduling technology emerges. According to the idea of the
e
c
FQ scheduling, the equipment schedules different queues cyclically so that the queues
r
u
obtain the opportunity of fair scheduling and the delays of different packet flows are
o
s
balanced on a whole. Later, a bandwidth allocation weight is added on the basis of the FQ
e
R
to form the WFQ (Weighted Fair Queuing) technology in which queues are scheduled

g
according to the weights.
n

r ni
When WFQ scheme is used, queues are scheduled in a fair manner according to the

a
weight allocated to each queue. Generally, larger weights and bandwidths are allocated to
e
e L the higher-priorities queues, and smaller weights and bandwidths are allocated to lower-

or
priority queues. This queue scheduling scheme ensures the packets in higher-priority
queues are forwarded with little delay. In addition, this scheme ensures that the packets in

M lower-priority queues can be processed accordingly.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-90

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
One output queue adopts the SP scheduling algorithm to guarantee that key services are

:h
first scheduled and processed. Other output queues adopt the WFQ scheduling algorithm

s
to guarantee that each of them obtains a certain bandwidth.
e

r c
For example, a port provides eight output queues. Queue 7 is an SP queue and the
u
committed bandwidth of the queue is first guaranteed. Bandwidth is allocated to
o
es
queue 0 to queue 6 according to the weight proportions of 1:2:4:8:16:32:64.

R
Hence, all the packets in queue 0 to queue 6 can be transmitted according to the

g
committed bandwidth of each queue.
n

r ni
The combination of the SP and WFQ algorithms not only overcomes the defect that

a
packets in low-priority queues cannot obtain a bandwidth in a long period of time, but
e
e L also guarantees that time-sensitive services (for example, voice service) are first scheduled.

or
For example, a port provides four output queues. Queue 4 is an SP queue and the
packets in queue 4 are first scheduled. Bandwidths are allocated to queue 1 to
M queue 3 according to the weight proportions of 1:2:4.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-91

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-92

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
For example, if a port supports eight queues, the egress port scheduling rules are as

:h
follows:

e s
1. The priority of a queue with the traffic shaping function enabled is higher than

c
the priority of a queue with the traffic shaping function disabled.
r

ou
2. When the traffic shaping function is enabled (or disabled) for all eight queues,

es
queue 8 has the absolute priority, and the remaining bandwidth is allocated to
queues 1-7 in the proportion of 1:2:4:8:16:32:64.
R

n g
For example, you can enable the traffic shaping function for queues 6 and 7, and

ni
disable the traffic shaping function for the other queues. According to the first

r
priority rule, the priorities of queues 6 and 7 are higher than the priorities of the

e a other queues, and thus queues 6 and 7 are first allocated with the configured CIR

e L bandwidth. Then, according to the second priority rule, the priority of queue 8 is
higher than the priorities of queues 1-5. In this case, after the required bandwidth

or is allocated to queues 6 and 7, the remaining bandwidth is first allocated to queue

M 8, and then allocated to queues 1-5 according to the bandwidth proportion.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-93

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-94

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Technologies P-95

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Packet Switch Principle P-1

e n
/
o m
e i.c
aw
u
g .h
ni n
r
// lea
p :
Course Content
t t
: h
1 Data Communication Network Overview...................................................Page3

e s
2 IP Addressing..........................................................................................Page21

r c
3 QinQ Technology....................................................................................Page41

s ou
4 MPLS Technology....................................................................................Page48

Re
5 PWE3 Technology...................................................................................Page73

i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-2

e n
/
o m
ei.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-3

e n
/
o m
ei.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-4

e n
/
o m
ei.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-5

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
A network is a complex system interconnected formed by interconnected people or

h
things. Networks exist everywhere in our life, for example, the telephony network and
:
s
telegraph network. There are also many network systems in one's body, for example,
e
r c
the nerve system and the digestive system.

s ou

Re
The computer network is a large-scale and powerful system that connects computers
and peripheral devices in different areas through communication lines. In the

n g
computer network, substantive computers can exchange information and share
i
n
information resources. The computer network was developed to meet the requirement
r
a
for exchanging information and sharing information resources.
e
e L
o r In the initial stage of the computer network, each computer is an independent device.

M
Computers work independently and do not communicate with each another.
Combination of the computing technology and communication technology brings a
far-reaching influence to the organization of the computer system and makes possible
the communication among computers. Computers of different types use the same
protocol to communicate, and thus the computer network comes into being.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-6

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
Element of Data Communication Network in Equipment

: h
End Equipment(User Equipment)End equipment is an interface equipment

e s
between users and communication networkwhich can transfer users

r c
message into electric signal . At the same time, end equipment also can

ou
transfer electric signal into users message.

es
Transfers SystemTransfers system is the channel used to transfer electric
R
signalincluding wire,wireless,fiber etc.

i n g
Switching EquipmentSwitching equipment is used to carry out routing

r n
choice,switch control between end equipment and other equipment.

e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-7

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
In recent years, the computer network is developing rapidly. The computer
communications network and the Internet have become the basic part of the society.

: h
The computer network is applied to many fields of industry and commerce, including
s
e-bank, e-commerce, modernized enterprise management , and information service.
e
r c
Remote education, government routines, and community cannot work without the
network technology. The saying "network exists everywhere in the world" is not an

ou
exaggerated statement.

es

R
The computer network came into being in 1960s. At that time, the network was a

g
host-based low-speed serial connection providing program running, remote printing,

n i n
and data service. The System Network Architecture (SNA) of IBM and X.25 public data
network are such kind of network. In 1960s, the defense department of US funded a
r
packet switching network called ARPANET, which was the earliest rudiment of the
a
L e
Internet.

r
e In 1970s, the commercial computing mode, which featured personal computers, came
o forth. Initially, personal computers were used as independent devices. Because of the

M complexity of commercial computing, many terminal devices needed to cooperate,


and thus the local area network (LAN) was developed. The LAN lowers the expense on
printers and disks dramatically.

In 1980s and 1990s, to deal with the increasing demand on remote computing, the
computer industry developed many wide area network protocols (including TCP/IP and
IPX/SPX). Then the Internet was expanded fast. Now TCP/IP is extensively used on the
Internet.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-8

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The Internet is a large network formed by networks and devices. Based on the covered

h
geographic scope, networks are classified into LAN, WAN, and Metropolitan Area
:
s
Network (MAN) whose size is between the LAN and WAN.
e
Local Area Network (LAN)
r c

s ou
A LAN is formed by connected communication devices in a small area. A LAN covers a

Re
room, a building, or an industry garden. A LAN covers several kilometers. It is a
combination of computers, printers, modems, and other devices interconnected

n g
through various mediums within several kilometers.
i

r n
Wide Area Network (WAN)

e a
A WAN covers a larger geographic scope, such as a state or a continent. It provides

e Lthe data communication service in a large area and is used to connect LANs. The China

o r Packet Network (CHINAPAC), China Data Digital Network (CHINADDN), China

M
Education and Research network (CERnet), CHINANET, and abuilding China Next
Generation Internet (CNGI) are all WANs. A WAN connects LANs that are far from
each other.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-9

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
A LAN is formed by interconnected communication devices in a small area. In general, a LAN
covers several kilometers. The LAN is featured by short distance, low delay, high data

:
transmission speed, and high reliability. h

e s
Common LANs are Ethernet and Asynchronous Transfer Mode (ATM). They are different in

c
topology, transmission speed, and data format. Ethernet is the most widely used LAN.
r
ou
The following network devices are used in LAN construction:

s
Cables: A LAN is extended by cables. Various cables are used in LANs, for example, the


Re
fiber, twisted pair, and coaxial cable.
Network Interface Card (NIC): An NIC is inserted in the main board slot of a computer.

i n g
It transforms the data to the format that other network devices can identify and
transmits the data through the network medium.

r

nHub: A hub is a shared device that provides many network interfaces to connect

e a computers in the network. The hub is called a shared device because all its interfaces

L
share a bus. At a moment, only one user can transmit data, and so the data amount
and speed of each user (interface) depends on the number of active users (interfaces).

r e Switch: also called a switched hub. A switch also provides many interfaces to connect
o

network nodes but its performance is much higher than that of a shared hub. It can be

M considered to have many buses so that devices connected to each interface can
independently transmit data without affecting other devices. For users, the interfaces
are independent of each other and have fixed bandwidth. In addition, a switch has
some functions that a hub lacks, such as data filtering, network segmentation, and
broadcast control.
Router: A router is a computer device used to connect networks. A router works at the
third layer (network layer) of the OSI model and is used to route, store, and forward
packets between networks. Generally, a router supports two or more network
protocols so that it can connect networks of different types. A router can also run
dynamic routing protocols to dynamically route packets.
ATM switch: used to connect ATM networks.
Confidential Information of Huawei. No

Spreading Without Permission


Packet Switch Principle P-10

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
A WAN covers a larger geographic scope, such as a state or a continent. A WAN connects

h
LANs that are far from each other. It consists of the end system (users on two ends) and

:
the communication system (the link between two ends).
s

r c e
The communication system is the key of the WAN and it falls into the following types:
Integrated Service Digital Network (ISDN): a dial-up connection mode.

ou

Leased Line: called DDN in China. It is a point-to-point connection that transmits


s
data at the speed of 64 kbps to 2.048 Mbps. The leased line guarantees data
e
R
transmission and provides constant bandwidth, but the cost is high and the point-
to-point structure is not very flexible.

i n g
X.25: a WAN type that appeared early and is still in extensive use at present.

r

nFrame Relay: a new technology developed on the basis of X.25.

e a Asynchronous Transfer Mode (ATM): a cell exchange network that features high

e L speed, low delay, and guaranteed transmission quality. Most of ATM network use
fibers as the connection medium. The fiber provides a high speed of over 1 gigabit,

o r but the cost is also high. ATM is also a WAN protocol.


In the WAN, access is implemented through various serial connections. Generally,
M

enterprise networks are connected to the local ISP through the WAN lines. The WAN
provides fulltime and part-time connections. In the WAN, serial interfaces can work at
different speeds.
The following devices are used in the WAN:
Router: The process of looking for the transmission path is called routing. A router
establishes routes between WANs and LANS according to the addresses and sends
the data to the destination.
Modem: As the device used to transform signals between the end system and
communication system, a modem is the indispensable device in a WAN.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-11

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
A complete IP network consists of the backbone network, MAN, and access network.

and cities.
: h
Backbone network: a network connecting networks of different countries

e s
MAN: the network between the backbone network and access network. It
c

r
connects networks of different areas in the same city. A MAN consists of the

ou
core layer, convergence layer, and access layer.

es
Access network: layer-2 network under the access control policy. The access
network is responsible for access of end users. Users can connect to the
R
Internet through xDSL and Ethernet.

i n g
The target networks of the IP MAN are:
n

a r
IP MAN

L e The IP MAN is a layer-3 routing network consisting of access control


points (the BRAS and service router) and the upstream routers.

r e The IP MAN consists of the core layer, convergence layer, and service
o access control layer.

M Broadband access network


The broadband access network is the layer-2 access network under the
access control point.
The broadband access network consists of the layer-2 convergence
network and the last-mile access network.
The service plane logically falls into the access network plane for the public and the
access network plane for key customers.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-12

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
Many international standardization organizations made great contributions to
development of the computer network. They unify network standards so that devices

: h
of different vendors can communicate with each other. Till now, the following
s
standardization organizations have made contributions to development of the
e
computer network.
r c
ou
International Organization for Standardization (ISO)ISO stipulates standards for
large-scale networks, including the Internet. The ISO brings forward the OSI model
s
that describes the working mechanism of network. The OSI model is a comprehensible
e
R
and clear hierarchical model of the computer network.

n g
Institute of Electrical and Electronics (IEEE)IEEE defines standards for network
hardware so that hardware devices of different vendors can communicate with each
i
r n
other. The IEEE LAN standard is the dominant standard for LANs. IEEE defines the
802.X protocol suite. 802.3 is the standard for the Ethernet; 802.4 is the standard for

e a
the token bus network; 802.5 is the standard for token ring; 802.11 the standard fro

e Lthe wireless local area network (WLAN).

r
American National Standards Institute (ANSI)ANSI is an organization formed by

o companies, governments, and other members voluntarily. The ANSI defines the
standard for the fiber distribution data interface.
M Electronic Industries Association/Telecomm Industries Association (EIA/TIA)They
define the standards for network cables, for example, RS232, CAT5, HSSI, and V.24.
They also define the standard for cabling, for example, EIA/TIA 568B.
International Telecomm Union (ITU)They define the standard for the telecom
network working as the WAN, for example, X.25 and Frame Relay.
Internet Engineering Task Force (IETF)Founded at the end of 1985, the IETF is
responsible for researching and establishing technical specifications related to the
Internet. Now IETF has become the most authoritative research institute in the global
Internet field.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-13

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
Since 1960s, computer network has undergone a dramatic development. To take the leading
position and have a larger share in the communication market, manufacturers competed in

: h
advertising their own network structures and standards which included IBMs SNA, Novells

e s
IPX/SPX., Apples Apple Talk, DECs DECnet and TCP/IP, the most widely used nowadays. At the
same time, these companies pushed software and hardware that use their protocols to the

r c
market enthusiastically. All these efforts promoted the fast development of network technology

ou
and the prosperity of the market of network devices. However, on the other hand, the network

s
became more and more complicated due to the various protocols and communications became

each other.
Re
more and more difficult since networks using different protocols were not compatible with

i n g
To improve network compatibility, the International Organization for Standardization (ISO) in
1984 developed the Open System Interconnection Reference Model (OSI RM) which soon

n
became the model of network communications.
r

e a
The ISO followed the following principles when they designed the OSI reference model:

L
Each layer of the model has its own responsibilities which should help it stand out as a
distinct layer.

r e To avoid function overlapping, there should be enough layers.


o

The OSI reference model has the following advantages:


It simplifies network related operations.
It provides compatibility and standard interfaces for systems designed by different
institutions.
It enables all producers to be able to produce interoperationable network devices,
which facilitates the standardization of networks.
It lays the complex concept of communications down into simpler and smaller
problems, which facilitates our understanding and operations.
It separates the whole network into areas, which guarantees changes in one area will
not affect other areas and networks in each area can be updated quickly and
independently.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-14

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The functions of each layer of the OSI reference model are listed as follows:

: h
Physical layer: providing a standardized interface to physical transmission

s
media including power level, line speed and mechanical specification of
e
r c
electrical connectors and cables.

ou
Data link layer: provides a service to the network layer.It encapsulates the

es
network Iayer information in a frame (the layer 2 PDU).

R
Network layer:

i n g
Provide logical addresses for transmission across networks.

n
ar
Routing: to forward packets from one network to another.

Le
Transport layer: providing reliable or unreliable data transfer services and error
check before retransmission.

r e
o Session layer: establishing, managing and terminating the connections

M between the local and remote application. Service requests and responds of
application programs in different devices form the communication of this layer
RPC,NFS and SQL belong to this layer.
Presentation layer: providing data encoding, encryption and ensuring that the
data sent by the application layer of one system can be understood by the
application layer of another system.
Application layer: providing network services as the closest layer to users
among the seven layers.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-15

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
Since the OSI reference model and protocols are comparatively complicated, they do

h
not spread widely. However, TCP/IP has been widely accepted for its openness and
:
s
simplicity. The TCP/IP stack has already been the main stream protocols for the
e
Internet.
r c
s ou

Re
The TCP/IP model also takes a layered structure. Each layer of the model is
independent from each other but they work together very closely. The difference

n g
between the TCP/IP model and the OSI reference model is that the former groups the
i
n
presentation layer and the session layer into the application layer. So the TCP/IP model
r
a
has only five layers. From bottom to top, they are: physical layer, data link layer,
e
e Lnetwork layer, transport layer and application layer.

o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-16

e n
/
o m
e i.c
aw
u
g.h
ni n
r
//lea
p :

t t
Each layer of the TCP/IP model corresponds to different protocols. The TCP/IP protocol

h
stack is a set of communication protocols. Its name, the TCP/IP protocol suite, is
:
s
named after two of its most important protocols: the Transmission Control Protocol
e
r c
(TCP) and the Internet Protocol (IP) . The TCP/IP protocol stack ensures the

ou
communication between network devices. It is a set of rules that define how

s
information is delivered in the network.
e

R
The router is a common network device that works at the network layer. Routers

i n g
functions mainly for forwarding packets among networks.

r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-17

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
Each layer of the TCP/IP model uses protocol data unit (PDU) to exchange information

h
and enable communication between network services. PDUs of different layers carry
:
e s
different information, and so they are named differently. For example, the transport
layer adds TCP header to the PDU from the upper layer to form the layer 4s PDU,
r c
which is called segment. And then segments are delivered to the network layer. And

ou
they become packets after the network layer puts the IP header into those PDUs. The
s
Re
packets are transmitted to the data link layer, where they are added data link layer
headers to become frames. Finally, those frames are transformed into bit stream to be

i n g
transmitted through network medium . This process in which data are delivered
following the protocol suite from the top to the bottom and are added with headers

r n
and tails is called encapsulation.

e a
After encapsulation, data is sent to the receiving device after transmission. The
L

receiving device will decode the data to extract the original service data unit and

r e decides how to pass the data to an appropriate application program along the
o protocol stack. This reverse process is called decapsulation. The matching layer, or
M
peer, of different devices communicates through encapsulation and decapsulation.
As the figure above shows, Host A is communicating with Host B. Host A delivers data
transformed from an upper layer protocol to the transport layer. The transport layer
encapsulates its header in front of the data and passes it to the network layer. Then
the network layer keeps the data it received as its own data and adds its header to it
before delivers it to the data link layer. The data link layer encapsulates its header into
the data and then passes it down to the physical layer. The physical layer then
transforms the data into bit stream and sends it to Host B through the physical line.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-18

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
When Host B receives the bit stream, it sends it to its data link layer. The data link layer

h
extracts the data link layer packet out and passes the left to the upper layer, the
:
s
network layer. Then the network layer deletes the IP header from the packet and
e
r c
passes it to the transport layer. In the similar way, the transport layer extracts the

ou
original data and delivers it to the top layer, the application layer.

es

R
The process of encapsulation or decapsulation is done layer by layer. Each layer of the

n g
TCP/IP has to deal with data both from its upper and lower layers by adding or
i
n
deleting packet headers.
r
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-19

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The data link layer ensures that datagram are forwarded between devices on the same

h
network, while the network layer is responsible for forwarding packets from source to
:
destination across networks.

e s

r c
In the above figure, Host A and Host B reside on different networks or links. When the

ou
router that resides on the same network as Host A receives frames from Host A, the
router passes those frames to the network layer after it ensures that the frames should

es
be sent to itself by analyzing the frame header. Then the network layer checks where
R
those frames should go according to the destination address in the network layer

i n g
header and later it forwards those frames to the next hop. The process repeats until

n
the frames are sent to Host B.

a r
As the slide shows, this procedure is called encapsulation, in which data is transferred

L e
along the TCP/IP protocol stack, from the upper layer downward, meanwhile, relative

r e header and tail are added. After the data encapsulation and transmission in the
network, the receiving equipment will delete the information added, and decide how
o to deliver the data to proper application along the TCP/IP protocol stack, according to
M the information in the header.
Among different layers of TCP/IP model, information is exchanged to ensure the
communication between network equipment. The PDU is used for exchanging
information. The PDU is different for different layers, and with different names. For
instance, in the transport layer, the PDU with TCP layer is called segment; after the
segment is transmitted to network layer, and added with IP header, the PDU is called
packet. Then, the PDU with layer 2 header is called frame. Finally, the frame is
changed into bits, and are transmitted through network media.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-20

e n
/
o m
e i.c
aw
u
g .h
ni n
r
// lea
p :

t t
The LAN is featured by short distance, low delay, high data transmission speed, and high reliability.

h
A LAN is formed by interconnected communication devices in a small area.In general, a LAN covers

:
several kilometers. A WAN covers a larger geographic scope. A WAN connects LANs that are far from

e s
each other. The WAN operates in a scope larger than that of the LAN.
The functions of each layer of the OSI reference model are listed as follows:

r
Physical layer: providing a standardized interface to physical transmission media.

ou
Data link layer: provides a service to the network layer.It encapsulates the network Iayer

s
information in a frame (the layer 2 PDU).


Re
Network layer: providing logical addresses for routers to decide routes.
Transport layer: providing reliable or unreliable data transfer services and error check before

i g
retransmission.

n
Session layer: establishing, managing and terminating the connections between the local and

n
remote application.

a r Presentation layer: providing data encoding, encryption and ensuring that the data sent by the

e
application layer of one system can be understood by the application layer of another system.

e L Application layer: providing network services as the closest layer to users among the seven
layers.

o r Each layer of the TCP/IP model is independent from each other but they work together very closely. Each
layer of the TCP/IP model uses protocol data unit (PDU) to exchange information and enable

M
communication between network services. PDUs of different layers carry different information, and so
they are named differently.
For example, the transport layer adds TCP header to the PDU from the upper layer to form the layer 4s
PDU, which is called segment. And then segments are delivered to the network layer. And they become
packets after the network layer puts the IP header into those PDUs. The packets are transmitted to the
data link layer, where they are added data link layer headers to become frames. Finally, those frames are
transformed into bit stream to be transmitted through network medium . This process in which data are
delivered following the protocol suite from the top to the bottom and are added with headers and tails is
called encapsulation.After encapsulation, data is sent to the receiving device after transmission. The
receiving device will decode the data to extract the original service data unit and decides how to pass the
data to an appropriate application program along the protocol stack. This reverse process is called
decapsulation. The matching layer, or peer, of different devices communicates through encapsulation
and decapsulation.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-21

e n
/
o m
ei.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-22

e n
/
o m
ei.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-23

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The network layer receives data from transport layer, and adds source address and
destination address into the data.
: h

e s
As learned in previous course, data link layer has the physical address- MAC address,

r c
which is globally unique. When there is data to be sent, the source network

ou
equipment queries the MAC address of the other end equipment, and send it out.

es
However, the MAC addresses are existent in a flat address space, without clear
R
address classification. Thus, it is only suitable for the communication within the same

n g
network segment. Besides, the MAC address is fixed in the hardware, with poor
i
n
flexibility. Hence, for communication between different networks, usually it is based
r
a
on IP address based on software, to provide better flexibility.
e
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-24

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
IP address is composed of 32 bits, which are divided into four octets, or four bytes.

: h
The IP address could be represented in the following methods:

e s
Dotted decimal format:10.110.128.111
c

r
Binary format00001010.01101110.10000000.01101111

ou

es
Hexadecimal format:0a.7e.80.7f

R
Usually, IP address is represented in the dotted decimal format; and seldom in

i n g
hexadecimal format.

r n
The hierarchy scheme makes IP address is compose of two parts: network part and

a
host part.
e
eL
The hierarchy scheme of IP address is similar to telephone number, which is also

or
globally unique. For example, as for the telephone number 010-8288248: the 010
represents the city code of Beijing, and 82882484 represents a telephone in Beijing
M city. It is the same for IP address. The previous network part represents a network
segment, while the latter host part represents the equipment in this network segment.
By this hierarchical design, for every layer 3 network equipment, instead of the IP
address of every host, only the network segment address ( which represents all the
hosts in this network segment) is needed to maintain. Thus, it decreases the route
items greatly, and increases the routing flexibility.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-25

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
IP address is a collection of 32 binary digits. Usually, it is represented by 4 bytes (each

h
byte is composed of 8 binary digits). Every 8 binary digits correspond to a decimal
:
number.
e s

r c
Decimal counting system is based on the power of 10: 101 , 102 , etc. And binary

ou
counting system is based on the power of 2: 21 , 22 , etc.

es
In a byte, from the right to the left bit, they are corresponding 20 , 21 , 22 27.
R
As the slide shows, for this byte, from left to right, the decimal number represented
g

i n
are: 27 =128, 26 =64, 25 =32, 24 =16, 23 =8, 22 =4, 21 =2, 20 =1.

a r
The sum of them is 255. Thus, the byte (8 bits) with all 1 represents 255 in decimal.

L e
r e
o
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-26

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
As this slide shows, for 11101001, calculate every bit of it into corresponding

h
decimal number. Then convert this binary to the decimal number.
:
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-27

e n
/
o m
ei.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-28

e n
/
o m
e i.c
aw
u
g .h
ni n
r
// lea
p :

t t
The network layer adds the IP header to TCP datagram which it receives from the transport layer. Usually,
the IP header has a fixed length of 20 bytes which does not include the IP options.

:
The IP header consists of the following fields: h

e s
Version: indicates the version of the IP protocol. At present, the version is 4. The version is 6 for

r c
the next generation IP protocol.

ou
IP header length is the number of 32-bit words forming the header including options. Since it is
a 4-bit field, its maximum length is 60 bytes.

es
TOS: 8 bits. It consists of a 3-bit COS (Class of Service) field, a 4-bit TOS field and a 1-bit final bit.

R
The 4 bits of the TOS field indicates the minimum delay, the maximum throughput, the highest

i g
reliability and the minimum cost respectively.

n
Total length: indicates the length of the whole IP packet including the original data. This field is

r n
16 bit long which means an IP packet can be 65535 bytes at most. Although an IP packet can

a
be up to 65535 byte long, most data link layers segment them before transmission.

L e Furthermore, hosts cannot receive a packet more than 576 bytes and UDP limits packets within
512 bytes. However, nowadays many applications allow IP datagram that are more than 8192

r e bytes to go through the links especially for applications that support NFS.

o Identification: identifies every datagram the host sends. The value increases with the number of
datagram the host sends.
M Time to Live (TTL) : indicates the number of routers a packet can travel through. The value
decreases one every time the packet passes a router. When the value turns to 0, the packet will
be discarded.
Protocol: indicates the next level protocol used in the data portion of the internet datagram. It
is similar to the port number. IP protocols use protocol number to mark upper layer protocols.
The protocol number of TCP is 6 and the protocol number of UDP is 17.
Head checksum: calculates the checksum of the IP header to see if the header is complete.
The source IP address field and the destination IP address filed point out the IP addresses of the
source and the destination.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-29

e n
/
o m
e i.c
aw
u
g .h
ni n
r
// lea
p :

t t
An IP address contains a network ID, which identifies a network segment uniquely or identifies the
aggregation of multiple network segments. The devices in the same network segment use the same
network ID.
: h

e s
An IP address also contains a host ID, which identifies a device in the network segment uniquely.

r c
How to distinguish the network ID and the host ID? The Internet designer classifies the IP addresses into
five classes according to the size of the network, namely, class A, class B, class C, class D, and class E.

s ou
The network ID of the IP address of class A is the first octet, and the first digit of the first octet is 0.
Therefore, the number of valid bits for network address in class A address is 81=7. The first octet of

Re
class A address ranges from 1 to 126 (127 is reserved). For example, 10.1.1.1 and 126.2.4.78 are class A
addresses. The host ID of the class A address is the last three octets, namely, the last 24 bits. The IP

addresses.
i n g
address of class A ranges from 1.0.0.0 to 126.255.255.255. Each class A network can have 2 24 IP

r n
The network ID of the class B address is the first two octets. The first digit of the first octet is 1 and the

e a
second digit is 0. Therefore, the number of valid digits of the class B network address is 162=14. The
first octet of class B address ranges from 128 to 191. For example, 128.1.1.1 and 168.2.4.78 are class B

e Laddresses . The host ID of the class B address is the last two octets, namely, the last 16 bits. The class B
address ranges from 128.0.0.0 to 191.255.255.255. Each class B network can have 2 16 IP addresses.

o r The network ID of the class C address is the first three octets. The first two digits of the first octet are 11,
and the third digit is 0. Therefore, the number of valid digits of class C network address is 243=21. The

M first digit of the class C address ranges from 192 to 223. For example, 192.1.1.1 and 220.2.4.78 are class
C addresses. The host ID of the class C address is the last octet. The class C address range from 192.0.0.0
to 223.255.255.255. Each class C network can have 28 =256 IP addresses.
The first three digits of the first octet of class D address is 111, and the fourth digit is 0. Therefore, the
first octet of the class D address ranges from 224 to 239. The class D address is used as the multicast
address. The first octet of class E address ranges from 240 to 255. It is reserved for research.
The IP address usually used are of class A, class B and class C. The IP addresses are allocated by the
International Network Information Center (InterNIC) according to the scale of the company. Basically, the
class A addresses are allocated to governments, the class B addresses are allocated to medium-sized
companies, and class C addresses are allocated to small-sized companies. With the fast development of
the Internet and also the waste of IP addresses, the IP address is becoming insufficient.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-30

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
When planning IP addresses, usually, private IP addresses are used within the same

h
company. Private IP addresses, reserved by the InterNIC, can be freely used by the
:
s
companies. The private IP addresses cannot be used to access the Internet. The reason
e
r c
is that the private IP addresses cannot have corresponding routes on the public

ou
network and the IP addresses may conflict.

es
When the user with private IP address needs access to the Internet, the private IP

R
address must be translated to the public address that can be identified by the public

i n g
network through Network Address Translation (NAT) technique.

r n
The InterNIC reserves the following network segments as the private IP addresses:

e a class A: 10.0.0.0-10.255.255.255

eL
class B: 172.16.0.0-172.31.255.255

or class C: 192.168.0.0-192.168.255.255

M By using the private IP addresses, the enterprises reduce the cost on buying public
addresses and the IP addresses are saved.
By default
the nature mask of class A network 255.0.0.0 or /8
the nature mask of class B network 255.255.0.0 or /16
the nature mask of class C network 255.255.255.0 or /24

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-31

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
For IP address network without subnet, it is regarded as a single network externally.

h
For example, all the route to address 172.16.X.X is regarded as the same direction,
:
s
without consideration of third and fourth byte. This reduces the route items in the
e
routing table.
r c
ou
However, in the way, different subnets cannot be distinguished in the same big

es
network. Thus, all the hosts in the network can receive the broadcast of the big

R
network, which reduces the network performance, and not convenient for network
management.
i n g

r n
For example, a class B network can contain 65000 hosts. If the user applied for the

a
class B address only needs 100 IP address, it is a huge waste since the addresses left
e
e Lcannot be used by others. Hence, a method is needed to divide this kind of network

o r into several segment, and to manage it according to different subnets.


From the view of address allocation, subnet is the extension of network address. The
M

network administration can decide the size of the subnet according to the need of
development of organization.
Using Subnet Mask, the network equipment could decide in the IP address which part
is network part and which is host part. By using subnet, the network addresses are
used more efficiently. Externally, it is still a single network; and internally, it is divided
into several different subnets.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-32

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
Subnet mask is used to distinguish the network part and host part. In a subnet mask,

h
the 1 represents network part, and 0 for host part.

e s
By default, the subnet mask of class A network is 255.0.0.0, the subnet mask of class
B network is 255.255.0.0, and the subnet mask of class C network is 255.255.255.0.

r c
Addressing without Subnet means using nature mask, no subdivision of network

ou

segment. Class B segment 172.16.0.0 with mask 255.255.0.0

es
Subnet Mask Representation

R
After learning the transform between binary and decimal number, it is easy to

i n g
understand the corresponding relationship for that of IP address and network mask.
For example, subnet mask is 255.255.255.240(11111111 11111111 11111111

r n
11110000),the number of bits of network must is 8+8+8+4=28, which indicates the
a
number of consecutive 1 in the network must is 28, i.e., the network part is of 28-
e
e Lbit length.

o r The subnet can be represented in another method: /28 indicate that the first 28 bits
are the network ID.


Calculation of Network address
As shown in the slide, the IP address and subnet mask are already known. Then, the
network address is obtained from the AND operation between the IP address and the
subnet mask. The AND operation is 1&1=1, 1&0=0, and 0&0=0. Therefore, the
calculation of the AND operation of the example in this slide is as follows:
11000000, 10101000, 00000001, 00000001
&11111111, 11111111, 11111111, 00000000
11000000, 10101000, 00000001, 00000000
The calculation result is the network address.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-33

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
Calculation of Host Number
t t

: h
The number of hosts is calculated through the subnet mask. First, we should know

e s
that how many 0s there are in the subnet mask. As shown in the above figure, if there
are m-bit 0s, then, the number of hosts is 2m. The number of IP addresses that can be

r c
allocated to the host is 2m -2 (deducting the network address containing all 0s and the

ou
broadcast address containing all 1s).

Host Number 2m
es
R

i n g
Valid Host Number : 2m 2

r n
For example,IP Address192.168.1.100/28, /28=255.255.255.240

e a
The binary representation of subnet

e Lmask:11111111111111111111111111110000

o rnetwork portion is 28bits,Host portion is 4bits,The total number of host: 24 ,The valid
number of host: 24 -2.

M This example shows the calculation of host quantity.

The subnet mask of class A address is 255.0.0.0, namely, 24-bit host ID. The subnet
mask of class B address is 255.255.0.0, namely, 16-bit host ID. The subnet mask of
class C address is 255.255.255.0, namely, 8-bit host ID.
This example is a class C address. The standard subnet mask has an 8-bit host ID, and
in this case, the first 4 bits of it are also used as the subnet mask. Then, the maximum
number of hosts is 28-4.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-34

e n
/
o m
ei.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-35

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
In this example, the network address is of class C: 201.222.5.0. Suppose 20 subnets

h
are needed, and 5 hosts in very subnet. Thus, it is needed to divide the last byte into
:
subnet part and host part.
e s

r c
The bits of subnet part decide the number of subnets. In this example, because it is a

ou
class C address, there are 8 bits for subnet and hosts. And since 24<20<25 , there are 5

es
bits for subnets, and the maximum subnets which could be provided are 32(2 5). And

R
the 3 bits left are for host, and 23=8, deducting the network address and broadcast

i n g
address in this network, which is 8-2=6. It is can meet the network requirements.

r n
And each network segment is as follows:

e a 201.222.5.0~201.222.5.7

eL
201.222.5.8~201.222.5.15

or 201.222.5.16~201.222.5.23



201.222.5.232~201.222.5.239
201.222.5.240~201.222.5.247
201.222.5.248~201.222.5.255

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-36

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
Upgrade IPv4 to IPv6:
t t

: h
The Internet with IPv4 as its core has so far made great success . The shortage of IPv4

e s
address resources directly limits the application of IP technologies on a larger scale.
The development of mobile (3G) and broadband technologies gives rise to the need

r c
for more IP address . Technologies like CIDR, NAT and DHCP, though temporarily ease

ou
the shortage of IPv4 addresses, cannot solve the problem fundamentally . IETF raised

es
the idea about the next generation Internet protocol, IPv6, in the 1990s.Its
fundamental improvement to IPv4 is the almost unlimited address space (the length of
R
address increases from 32 bits to 128 bits).

i n g
The fast expansion of the Internet is beyond the imagination of its designers. In

n
particular, the past decade has seen a proliferation of the Internet, which has become
r
e a
a necessity for tens of thousands of families and individuals. It is such proliferation
that leads to depletion of IP addresses.

e L The application of new technologies deteriorates the shortage of IP addresses. As

o r technologies develop, the PDA, wireless equipment, 3G mobile telephone and even
automobile and refrigerator require a global unicast address to get access to the
M Internet . In addition to address shortage, demand for functions like security, QoS and
easy configuration gives rise to a common ground: a new protocol to fundamentally
solve all problems IPv4 is now confronted.
The IP address depletion process has shown to us that we need and be able to design
a new protocol in place of the current IPv4, and the new protocol should provide
more than extended address space. We are now facing a good opportunity to revise
the IPv4 addressing scheme.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-37

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
What is new in IPv6?
t t
h
Brand-new packet format IPv6 uses new header format, instead of simply extending the

s :
address in an IPv4 header to 128 bits. An IPv6 header consists of IPv6 header and extension
header. The latter includes non-fundamental and optional fields. All this streamlines header

c
processing by intermediate routers.

r e
Plenty of address An IPv6 address is 128-bit long, four times an IPv4 address. As you know,

ou

in principle there can be 232 IPv4 addresses, namely 4,294,967,296, or two addresses for every

es
three people in the whole (based on current population). Then what does 128-bit mean?
3.4*1038! This means each people in the world can have 5.7*1028 IPv6 addresses (the actual

R
available addresses are less but still huge). There is even a saying goes: You can allocate an IP


i g
address to every grain of sand on the earth.

n
Brand-new address configuration As technologies develop, nodes on the Internet are no

r n
longer limited to the computer, they can be a PDA, mobile phone, terminal of any kind, and
even refrigerator and TV set. This calls for easier IPv6 host address configuration .To this end,

e a
IPv6 supports Stateless Address Autoconfiguration as well as manual address configuration and

e LStated Address Autoconfiguration (by a special address allocation server). Stateless Address
Autoconfiguration enables a host to configure IPv6 address for itself. All hosts on a link can

o r
communicate with others without human interference.
Better QoS A new Flow Label field is defined in the IPv6 header. This field enables a router to

M identify and process packets belonging to the same flow. With this flag , a router can identify a
flow without even accessing its inner packet, thus ensuring the QoS in the case of payload
encryption.
Built-in security IPv6 supports IPSec with extension headers like AH and ESP. This provides a
standard-based solution to network security, enabling compatibility among different IPv6
solutions.
Built-in mobility The Routing Header and Destination Options Header provide built-in mobility.
A complete IPv6 address is expressed by IPv6 address plus prefix length . As you know, IPv4
address is in dotted decimal format plus the mask or prefix length, such as 192.168.1.1/24. An
IPv6 address is 128-bit long, so the decimal expression does no apply any longer. RFC2373
defines a different text presentation.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-38

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
Similar to IPv4 addresses, an IPv6 address consists of prefix and ID (host ID in IPv4, interface ID

h
in IPv6).

s :
IPv6 prefix As the name suggests, address prefix is the digital sequence prepended to an

r c e
address. Of course, it belongs to the 128 bits. This part is either a fixed value or the
routing/subnet ID, similar to the network ID of an IPv4 address. The prefix is expressed as

ou
follows (similar to IPv4 CIDR): address/prefix length.

s
An IPv6 address also includes an interface ID. Then how is the interface ID generated? Currently


Re
three methods are available.
Automatically generated in accordance with IEEE EUI-64

i g
Generated at random by the device The device can generate an interface ID at
n
random, which is supported by Windows XP currently.
n
ar
Manual configuration As the name suggests, manual configuration is to specify an

e
interface ID manually.

e L IEEE EUI-64

or
A typical interface ID is 64 bits. IEEE EUI-64 defines how to generate a 64-bit interface
ID based on an IEEE 48-bit MAC address. In a MAC address, c bit stands for vendor ID,

M d bit stands for vendor code ID, 0 bit is global/local bit, meaning global effectiveness.
g specifies an individual host or a group. To convert: Change 0 to 1, and insert FFFE
between c and d. The result is IPv6interface ID.
This method streamlines configuration especially in the case of Stateless Address Auto
configuration (to be covered later), where what you need is merely an IPv6 prefix.
An obvious weakness of this method is the possibility for a malicious user to calculate
the L3 IPv6 address based on the L2 MAC address.
ID Change 48-bit MAC address to 64-bit interface ID
Automatically generated by the device
MAC address is unique, so interface ID is unique too
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-39

e n
/
o m
e i.c
aw
u
g .h
ni n
r
// lea
p :
t
According to RFC2373 (IPv6 Addressing Architecture), three expressions of IPv6 addresses are available. Preferred form,
compression form and alternative form.
Preferred form (RFC2373)
h t
:

e s
Hexadecimal expression . : separated 4-digit (16 bits) pieces . Address prefix is expressed as /xx.
For example2001:0410:0000:0001:0000:0000:0000:45ff/64

r
The 128-bit IPv6 address is divided into 16-bit pieces, each expressed by a 4-bit hexadecimal value, and separated by

ou
a :. This form is called colon separated hexadecimal expression. The preferred form plus the prefix length forms a
complete IPv6 address.

e
Compression form (RFC2373)
s
R
The leading zeros of an address can be omitted, and multiple groups of 16-bit of zeros can be expressed by
::. The "::" can only appear once in an address . The prefix length is expressed by /xx.

i g
For example: 2001:410:0:1::45ff/64,2001:410::1::45ff/64 is a wrong expression.

n
The preferred form includes eight 16-bit pieces. There are many zeros in the expression that are obvious unnecessary. In

r n
order to make writing addresses containing zero bits easier, a special syntax is available to compress the zeros.

a
According to RFC2373, "::" is used to indicate multiple groups of 16-bit of zeros, but the "::" can only appear once in

e
an address (or the system cannot judge how many all-0 groups are omitted). Unnecessary zeros can be omitted.

e LThe address of preferred form, 2001:0410:0000:0001:0000:0000:0000:45ff can also be expressed as


2001:410:0:1::45ff,The following addresses are invalid (using :: for several times): ::AAAA::1and3ffe::1010:2A2A::1

o r Note: You cannot compress valid zeros in a group. For example, you cannot compress FF02:30:0:0:0:0:0:5 to FF02:3::5,
but to FF02:30::5.The compression form plus the prefix length is a complete IPv6 address: 2001:410:0:1::45ff/64

M
Alternative form (RFC2373)
In some special cases, the IPv6 address must include an IPv4 address, such as address for IPv6 tunnel
compatible with IPv4.Such IPv6 address can be expressed in preferred or compression form except the IPv4
address part . The built-in IPv4 is still in dotted decimal format . The address prefix is expressed as /xx.
For example0:0:0:0:0:0:166.168.1.2/64 and ::166.168.1.2/64
In some special cases, the IPv6 address must include an IPv4 address. To highlight the IPv4 address, RFC2373 defines
an alternative form of IPv6 address . The alternative form is detailed in other IPv6 related trainings . An IPv6 address of
this form consists of hexadecimal values and a standard presentation of IPv4 address. Two types are available.Here is
an example: 0:0:0:0:0:0:192.168.1.2 or ::192.168.1.2 , 0:0:0:0:0:FFFF:192.168.1.2 or ::FFFF:192.168.1.2
The alternative form plus the prefix length is a complete IPv6 address: 0:0:0:0:0:0:192.168.1.2 / 64
or ::192.168.1.2/64
Note that RFC2373 is replaced by RFC3513, but the definitions about text presentation of addresses basically remain
unchanged.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-40

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
192.168.1.1/30
t t
192.168.1.5/30
: h
Question : Whats NAT?
e s
r c
Due to lack of IP address, the Network Address Translation (NAT) technology is widely

ou

applied to existing IPv4 networks, and is considered an effective (even permanent)
s
solution to IP address shortage. However, NAT comes with certain inherent
e
R
deficiencies that make it merely a temporary solution. It may prolong the lifecycle of

g
IPv4, but cannot solve the address shortage fundamentally:

i n
NAT breaks the point-to-point model of IP. IP is initially designed to enable
n
r
connection processing only on end points (host and server). The application

e a NAT greatly affects peer communication. In a peer communication model, a

e L peer can serve as either a server or a client. Peers communicate with each
other by sending packets directly to the other. If one peer is behind the NAT,

o r additional processing is needed.


Need for keeping connectivity. The NAT technology requires the NAT to keep
M

connectivity. It must remember the address and port it translates. Address and
port translation all require additional processing, which decreases network
performance. In addition, an organization who need to record its end users
behaviors for security must also maintain a NAT state table.
Breaking end-to-end network security. Some encryption algorithms are used
to ensure integrity of the IP header that must remain unchanged when
traveling from source to destination. The source is responsible for header
integrity, while the destination checks the integrity. Any change to the header
on the way will cause problem to integrity check.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-41

e n
/
o m
ei.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-42

e n
/
o m
ei.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-43

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
Introduction to QinQ
t t

: h
The QinQ technology provides a cheap and easy Layer 2 (L2) virtual private network

e s
(VPN) solution. With the VLAN stacking and nesting technology, the data packets carry

r c
two VLAN tags at two different layers to identify different data packets. This method

ou
clears the limit of the original solution in which only one VLAN tag at one layer is used

es
to identify different data packets. As a result, the VLAN IDs are extended.

R
The network services are becoming more complex and the number of service

n g
subscribers continuously increases. Hence, the original VLAN IDs no longer meet the
i
n
actual demands. In addition, the Layer 3 (L3) switch is becoming mature in technology
r
a
and is more widely used. As a result, many users of intranets and small metropolitan
e
e Larea networks (MANs) encounter the following problems:

o r The network is complex, and configuration and maintenance is difficult.

M
Many manufacturers' L3 switch does not support the multi-protocol label
switch (MPLS) function. If the user constructs a VPN based on MPLS, the
existing switch equipment has to be knocked out, which results in a severe
waste of resources.
The boards that support the MPLS function are expensive. The small-sized
users cannot afford to buy them.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-44

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The QinQ technology brings about the following benefits:

: h
Extends the VLAN ID resources. By VLAN stacking, the number of VLAN IDs

e s
can be increased to 4096 x 4096.

r c
Simplifies the network configuration and maintenance because the users and

ou

the operator can independently and flexibly plan the VLAN resources.

es
Unties the users from depending on the MPLS function. As a result, the
R

expenditure on equipment upgrade is reduced.

i n g
Realizes a situation in which various boards that support the QinQ function are
n

a r available and cheaper, compared with the boards that support the MPLS

L e function.

r e Extends the network service scale from the local area network (LAN) to the

o wide area network (WAN).

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-45

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
VLAN stacking refers to a technique in which one more VLAN tag is added in front of

h
the existing VLAN tag in a data frame structure. That is, one data frame carries two
:
s
VLAN tags at two layers in VLAN stacking.
e

r c
As shown in Figure, C-VLAN indicates the customer-side VLAN; S-VLAN indicates the

ou
supplier-side VLAN.
Types of VLAN Tags
es
R
VLAN tags are used to identify customer-side packets and supplier-side packets.
g


i n
IEEE 802.1ad defines two types of VLAN tags, as shown in Figure.
n
a

r Customer-side VLAN tag, which is referred to as C-VLAN.

L e Supplier-side VLAN tag, which is referred to as S-VLAN.

r
e Where, the length of the data text is variable. The maximum length of the data text is

o related to the maximum frame length that the ports of the equipment support.
M Structures of the S-VLAN and C-VLAN Tags
The 4-byte S-VLAN or C-VLAN text is divided into two subtexts: the tag protocol ID
(TPID) and the tag control information (TCI).Both the TPID and TCI consist of two bytes.
TPID structure,TPID consists of two bytes to indicate the VLAN tag type. The TPID of
the C-VLAN is always 0x8100; the TPID of the S-VLAN can be set.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-46

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
Networking and Application
t t

: h
Learning the common QinQ application scenarios and referring to them in the case of

s
similar scenarios help correctly configure the QinQ function.
e

r c
As shown in Figure, Internet users, IPTV users, and key clients require access to the

ou
broadband network of the community where they live. They are assigned with

s
different C-VLAN IDs for identification. A switch aggregates the services of different
e
R
requirements. When the services are accessed to the supplier-side network, they are

i n g
added with different S-VLAN tags for identification and indication to meet the
different requirements of user access.

r n
You can configure the QinQ function on the OptiX NE to realize the following

e a
purposes:

eL
The external S-VLAN ID of the department A data packet whose C-VLAN ID

or
is100 is 30.

M
The external S-VLAN ID of the department B data packet whose C-VLAN ID
is100 is 31.
In this manner, different client services with different two-tag combinations are
classified and transmitted to different destinations. A specific two-tag combination for
each client clears the limit of identifying services based on only one VLAN ID to a great
extent and facilitates the grooming in and between the customer- and supplier-side
networks.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-47

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The QinQ technology provides a cheap and easy Layer 2 (L2) virtual private network

h
(VPN) solution. With the VLAN stacking and nesting technology, the data packets carry
:
s
two VLAN tags at two different layers to identify different data packets. This method
e
r c
clears the limit of the original solution in which only one VLAN tag at one layer is used

ou
to identify different data packets. As a result, the VLAN IDs are extended.

es
The QinQ technology brings about the following benefits:

R
Extends the VLAN ID resources
g

i n
The users and the operator can independently and flexibly plan the VLAN

n
a r resources

L e The expenditure on equipment upgrade is reduced

r e The QinQ technology provides a cheap and easy Layer 2 (L2) virtual private

o network (VPN) solution

M Extends the network service scale from the local area network (LAN) to the
wide area network (WAN)

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-48

e n
/
o m
ei.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-49

e n
/
o m
ei.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-50

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The Internet based on the IP technology prevailed in the middle 1990s. The IP

h
technology, however, performs poorly in forwarding packets because of inevitable
:
s
software dependence on searching routes through the longest match algorithm. As a
e
r c
result, the forwarding capability of IP technology becomes a bottleneck to the network

ou
development.

es
In the traditional IP forwarding, physical layer receives a packet from a port on the

R
router, then sends to data link layer. Data link layer removes link layer encapsulation,

i n g
then sends to corresponding network layer according to protocol field of the packet.

n
The network layer will check whether the packet is sent to this device, if it is, it will
r
a
remove network layer encapsulation, and send to its up-level protocol. If it is not, it
e
e Lwill lookup routing table according to packets destination IP address, if the route is

r
matched, the packet will be sent to data link layer of the corresponding port, after

o encapsulated by data link layer, it will be transmitted. If it is not matched, the packet

M
will be discarded.
The traditional IP forwarding adopts hop-by-hop forwarding, each router that packet
passed through should implement the process (as the figure shows, RTA receives a
data packet whose destination IP address is . . . , RTA will lookup routing
table and forward according to matched route item, RTB, RTC will also do like this), So
the efficiency is low. And all the routers need to know all routes in the entire network
or default route . Besides, the traditional IP forwarding is connectionless oriented, so it
is hard to deploy Qos.Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-51

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
With the evolvement of network technologies, the Asynchronous Transfer Mode (ATM)

h
technology comes out. It uses labels (namely, cells) of fixed length and maintains a
:
s
label table that is much smaller than a routing table. Therefore, compared with the IP
e
r c
technology, the ATM technology performs much better in forwarding packets. The

ou
ATM technology, however, is difficult to popularize because of its complex protocol

s
and high cost in deployment.
e
R
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-52

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The traditional IP technology is simple and costs little in deployment. People then are

h
eager to making a technical breakthrough to combine advantages of IP and ATM

:
technologies. Thus, the MPLS technology comes forth.
s

r c e
Initially, MPLS emerges to increase the forwarding rate of devices. Different from IP
routing in forwarding packets, MPLS analyzes a packet header only on the network edge

ou
but not at each hop. In this manner, the time to process packets is shortened . The

s
application specific integrated circuit (ASIC) technology is developed and the routing rate

Re
is no longer a bottleneck of the network development. As a result, MPLS does not have
advantages in high-speed forwarding any more. MPLS supports multi-layer labels, and its

i n g
forwarding plane is connection-oriented. Thus, MPLS is widely used in Virtual Private
Network (VPN), traffic engineering (TE), and Quality of Service (QoS).

r n
MPLS works between the data link layer and the network layer in the TCP/IP protocol stack.
a
It provides the IP layer with connection services and obtains services from the data link
e
e Llayer. MPLS replaces IP forwarding with label switching. A label is a short connection
identifier of fixed length that is meaningful for the local end. The label is similar to the

o r ATM virtual path identifier (VPI)/virtual channel identifier (VCI) and the Frame Relay data
link connection identifier (DLCI). The label is encapsulated between the data link layer and
M the network layer . MPLS is not limited by any specific protocol of the data link layer and is
enabled to use any Layer 2 media to transfer packets.
The origin of MPLS is the Internet Protocol version 4 (IPv4). The core MPLS technology can
be extended to multiple network protocols, such as the Internet Protocol version 6 (IPv6),
Internet Packet Exchange (IPX), Appletalk, DECnet, and Connectionless Network Protocol
(CLNP). Multiprotocol in MPLS means that the protocol supports multiple network
protocols.
In fact, the MPLS technology is a tunneling technology rather than a service or an
application. It supports multiple protocols and services. Moreover, it can ensure the
security for data transmission.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-53

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The typical structure of MPLS network is shown in this slide: the router and ATM

: h
switch located inside of MPLS domain are called LSR, router and ATM switch located
at the edge of MPLS domain that used to connect IP network or other kinds of

e s
network are called LER . In IP network, it implements traditional IP forwarding; in

r c
MPLS domain, it implements label forwarding.

ou
The fundamental element of an MPLS network is Label Switching Router (LSR). Many

es
LSRs on a network form an MPLS domain. LSRs that reside at the edge of an MPLS
domain and connect to other networks are Label Edge Routers (LERs). LSRs within an
R
MPLS domain are core LSRs. If an LSR connects to one or more adjacent nodes that do

n g
not run MPLS, the LSR is the LER. If all the adjacent nodes of an LSR run MPLS, the LSR
i
n
is the core LSR.

a r
The transfer of packets in the MPLS domain is based on labels. When IP packets enter

L e
an MPLS network, the LER at the entrance analyzes IP packets and then adds proper
labels to them. All nodes on the MPLS network forward data according to labels.

r e When IP packets leave the MPLS network, the labels are deleted on the LER that is the
o exit.
M The path that packet passes through in MPLS domain is called Label Switch Path (LSP),
this path is already confirmed and established by kinds of protocols before packet
forwarding, packet will be transmitted along the specified LSP . An LSP is a
unidirectional path in the same direction with the data flow.
Both of LER and LSR have the ability of label forwarding, but they are located in
different position, the packet processing is different. LERs charge is to receive IP
packet from IP network and insert label into the packet, then transmit it to LSR,
whereas, its charge is also to receive labeled packet from LSR and remove label,
transmit it to IP network; LSRs charge is to forward according to the label.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-54

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
MPLS ForwardingIngress LER (RTA)
t t

: h
When a IP packet enters MPLS domain, ingress LER (RTA) will analyze packet,
determine which label to encapsulate packet according to packet characteristic

e s
(generally by prefix analysis of destination IP address), and determine to transmit to

r c
which next hop from which interface.

ou
FEC represents the same kind of packets, NHLFE contains next hop, label operation

es
and other information. Only associating FEC with NHLFE, it can implement particular
label forwarding for same kind of packets, FTN can implement this function, FTN (FEC-
R
to-NHLFE) indicates the mapping for an FEC to NHLFE, if there are multiple cost-equal

i n g
paths, one FEC maybe map to multiple NHLFE.
MPLS ForwardingLSR (RTB)
n


a r
RTB receives message with MPLS label 1024 from RTA, and forwards it according to

L e
MPLS label.first , it will find the next hop (RTC), use outgoing label to swap incoming
label, and then continue forwarding. (this case is special, outgoing label and incoming

r e label are the same.)

o ILM maps each incoming label to a set of NHLFE, It is used when forwarding packets

M that arrive as labeled packets. If there are multiple equal-cost paths, one incoming
label maps to multiple NHLFE.
MPLS ForwardingLSR (RTC)
Similar to RTB, when RTC receives message with label 1029, it forwards packet by
label, and uses new outgoing label to swap original label, then transmits packet from
outgoing interface , the next hop is RTD.
MPLS ForwardingEgress LER (RTD)
Egress LSR RTD receives message with label 1039, Pops the label, lookups IP routing
table and forwards it.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-55

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
Multiprotocol Label Switching (MPLS) is a technology combining the routing function

h
of Layer 3 and the forwarding function of Layer 2. MPLS was first developed to help
:
s
increase the forwarding speed. Its architecture consists of:
e
Control plane
r c

s ou
It is connectionless and implemented through the current IP network.

Re
Forwarding plane

ing
Also known as data plane, it is connection-oriented and can make use
of the Layer 2 network such as ATM or Frame Relay network.

r n
a
MPLS uses a short label of fixed length to encapsulate packets. Data with the label is

L e
fast forwarded on the data plane. The powerful, flexible routing function of the IP

r e network is used on the control plane to meet the demands of new applications for the

o network.

M MPLS originates from the Internet Protocol version 4 (IPv4). Its core technique can be
applied to a variety of network layer protocols. These include Internet Protocol version
6 (IPv6), Internet Packet Exchange (IPX), Appletalk, DECnet, Connectionless Network
Protocol (CLNP), and so on. That is what multiprotocol means.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-56

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
There are two MPLS encapsulation modes: frame mode and cell mode.

: h
Frame encapsulation mode inserts a MPLS label header between layer 2 header
and layer 3 header. Ethernet and PPP protocol adopt this mode.

e s
ATM adopts cell mode MPLS encapsulation, VPI/VCI fields in ATM cell header
c

r
are used for label switching. If there is a MPLS Header in the packet, this MPLS

ou
Header will be reserved, but not used for forwarding, and only the first cell

s
reserves MPLS Header.
e
R
A label is a short identifier of a fixed length that is only meaningful for the local end. It
is used to uniquely identify an FEC to which a packet belongs. In some cases such as

n g
load balancing, an FEC can represent multiple incoming labels, but one label only
i
represents one FEC on a device. The label is a connection identifier, similar to the ATM
r n
VPI/VCI and the Frame Relay DLCI.

e a
A label contains the following fields:

e L Label: indicates the value field of a label. The length is 20 bits.

o r Exp: indicates the bits used for extension. The length is 3 bits. Generally, this
field is used for the Class of Service (CoS) that serves similarly to Ethernet
M
802.1p.
S: identifies the bottom of a label stack. The length is 1 bit. MPLS supports
multiple labels, namely, the label nesting. When the S field is 1, it means that
the label is at the bottom of the label stack.
TTL: indicates the time to live. The length is 8 bits. This field is the same as the
TTL in IP packets.
Labels are encapsulated between the data link layer and the network layer. Thus,
labels can be supported by all protocols of the data link layer . Figure shows the
position of the label in a packet and the encapsulation structure of the label.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-57

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The protocol filed PID in layer 2 header specifies that payload starts with packet with

h
label encapsulated or IP header. For example, in Ethernet protocol, PID=0x8847
:
e s
identifies that the frame payload is a multicast MPLS packet. PID=0x8848 identifies
that the frame payload is a unicast MPLS packet. PID=0x0800 identifies that the frame
r c
payload is a unicast IP packet. In PPP protocol, PID=0x8281 identifies that the frame

ou
payload is a unicast MPLS packet. PID=0x8283 identifies that the frame payload is a
s

Re
multicast MPLS packet.
S bit in MPLS header indicates whether the next header is another label or a layer 3 IP
header.
i n g

r n
Usually MPLS only allocates one label for a packet. But some advanced applications of

a
MPLS use multiple labels. For example, MPLS VPN will use 2 layers of labels (in
e
L
complex situation, it even uses 3 layers of labels), out-label is used for public network

r e forwarding, in-label is used to indicate that which VPN the packet belongs to; MPLS TE
also uses two or more labels, the outmost label is used to indicate TE tunneling, in-
o label indicates the destination of packet.
M Note: The Label1, Label2, Label3 all mean 4 Bytes MPLS header in last slide, it includes
20-bit label information.
A label stack is a set of arranged labels. An MPLS packet can carry multiple labels at
the same time. The label next to the Layer 2 header is called the top label or the outer
label. The label next to the Layer 3 header is called the bottom label or inner label.
Theoretically, MPLS labels can be nested limitlessly.
The label stack organizes labels according to the rule of Last-in, First-Out. The labels
are processed from the top of the stack.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-58

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
FEC (Forwarding equivalence class) means a group of IP packets which are forwarded

h
in the equipollence method, for example, a group of IP packets with same destination
:
s
IP prefix will be allocated a unique label.
e

r c
NHLFE (Next Hop Label Forwarding Entry ) is used when forwarding a labeled packet,

ou
It contains the following information:

es
the packet's next hop;
R
the operation to perform on the packet's label stack (it contains pushing new
g

i n
label, popping label, replacing the original label with new label). It may also

n
a r contain other information, such as the data link encapsulation to use when

L e transmitting the packet.

r e
o
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-59

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
Label Switching Router
t t

: h
A Label Switching Router (LSR) refers to devices that can swap labels and forward

e s
MPLS packets. It is also called the MPLS node. The LSR is a fundamental element on an

r c
MPLS network. All LSRs support the MPLS protocol.
LER
s ou

Re
An LER is the LSR that resides on the edge of an MPLS domain. When an LSR connects
to one node that does not run MPLS, the LSR acts as the LER.

i n g
The LER classifies the packets entering an MPLS domain by FECs and pushes labels into

r n
FECs. Then, the LER forwards MPLS packets based on labels. When packets leave the

e a
MPLS domain, the labels are popped out. The packets become IP packets again and

e Lare forwarded continuously.

o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-60

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
Label Switched Path

t t

: h
The path that an FEC passes through in the MPLS network is called the LSP . An LSP functions similarly to
virtual circuits of ATM and Frame Relay. The LSP is a unidirectional path from the ingress to the egress.
Ingress, Transit, and Egress LSRs
e s

r c
The LSP is a unidirectional path. LSRs along an LSP can be classified as follows:

ou
Ingress LSR: indicates the beginning of an LSP. Only one ingress exists on an LSP . The ingress

s
pushes a new label to the packet and encapsulates the IP packet as an MPLS packet to forward.

e
R
Transit LSR: indicates the middle node of an LSP. Namely, the nodes between both ends along
the LSP are transits. Multiple transit LSRs may exist on an LSP . The transit LSR mainly searches

n g
routes in the label forwarding table. Then, it swaps labels to complete the forwarding of MPLS

i
packets.
n
ar
Egress LSR: indicates the end node of an LSP. Only one egress exists on an LSP . The egress

L e mainly pops labels out of MPLS packets and forwards the packets that restore the original
encapsulation.

e
or
The ingress LSR and egress LSR serve as LSRs and LERs. The transit LSR serves as the LSR.
An LSP may have none, one, or several transit(s), but only one ingress and one egress.


Procedure of Establishing LSPs
Usually, MPLS allocates labels for packets and establish an LSP. Then, MPLS can forward packets.
Labels are allocated and distributed by a downstream LSR to an upstream LSR. The downstream LSR
classifies FECs according to an IP routing table and then allocates labels to specific FECs. Then, the
downstream LSR notifies the upstream LSR through label advertisement protocols to set up a label
forwarding table and an LSP.
The classification of LSPs is as follows:
Static LSP: It is set up by the administrator.
Dynamic LSP: It is set up by the routing protocol and label distribution protocol.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-61

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
Information about the basic label operations is a part of the label forwarding table.
The operations are described as follows:

: h

e s
Push: When an IP packet enters an MPLS domain, the ingress adds a new label
to the packet between the Layer 2 header and the IP header; or, an LSR adds a

r c
new label to the top of the label stack, namely, the label nesting.

s ou
Swap: When a packet is transferred within an MPLS domain, the local node
swaps the label at the top of the label stack in the MPLS packet for the label

Re
allocated by the next hop according to the label forwarding table.

i n g
Pop: When a packet leaves an MPLS domain, the label is popped out from the
MPLS packet; or, the top label of the label stack is popped out at the

r npenultimate hop on an MPLS network to decrease the number of labels in the

e a stack.

e LPenultimate Hop Popping

o r In fact, the label is useless at the last hop of an MPLS domain. In this case, the feature
of penultimate hop popping (PHP) is applied. On the penultimate node, the label is

M popped out of the packet to reduce the size of the packet that is forwarded to the last
hop. Then, the last hop directly forwards the IP packet or the VPN packet.
PHP is configured on the egress. In addition, the egress only allocates the following
label to the PHP:
Label 3: indicates the implicit-null label. This label is not listed in the label stack.
When an LSR receives an implicit-null label, the LSR pops out the label in the
packet rather than uses this implicit-null label to replace the label at the top of
the label stack. The egress directly forwards the packet through an IP link or
according to the next layer label.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-62

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
Establishing Static LSPs
t t

: h
You can allocate labels manually to set up static LSPs. The principle is that the value of

e s
the outgoing label of the upstream node is equal to the value of the incoming label of
the downstream node.
r c

s ou
The availability of a static LSP makes sense only for the local node that cannot sense
the entire LSP.
Re
On the ingress: A static LSP is set up, and the outgoing interface of the ingress is
g

i n
enabled with MPLS. If the route is reachable, the static LSP is Up regardless of the

n
r
existence of the transit or egress. A reachable route means that a route entry exists
a
L e
whose destination address and the next hop address match those in the local routing
table.

r e
o
On the transit: A static LSP is set up, and the incoming and outgoing interfaces of the

M
transit are enabled with MPLS. If the incoming and outgoing interfaces are Up on the
physical layer and protocol layer, the static LSP is Up, regardless the existence of the
ingress, egress, or other transits.
On the egress: A static LSP is configured, the incoming interface of the egress is
enabled with MPLS. If the incoming interface is Up on the physical layer and protocol
layer, the static LSP is Up, regardless the existence of the ingress or the transit.
A reachable route is required on the ingress only for setting up a static LSP, but not on
the transit or egress.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-63

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
A static LSP is set up without label distribution protocols or exchanging control

h
packets. Thus, the static LSP costs little and it is applicable to small-scale networks
:
s
with simple and stable topology. The static LSP cannot vary with the network topology
e
r c
dynamically. The administrator needs to configure the static LSP.

ou
Static LSPs are configured by the administrator. Dynamic LSPs are set up by label

es
distribution protocols.

R
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-64

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
Processing MPLS TTL
t t

: h
An MPLS label has a TTL field in the length of 8 bits. The TTL field is the same as that

e s
in an IP packet header. MPLS processes the TTL to prevent loops and implement
traceroute .
r c

s ou
RFC 3443 defines two modes in which MPLS processes the TTL, that is, uniform mode

Re
and pipe mode. By default, MPLS processes the TTL in Pipe mode.
The Hybrid MSTP equipment supports both types.
g


i
Uniform Mode
n n

a r
When IP packets enter an MPLS network, on the ingress, the IP TTL decreases by one

L e
and is mapped to an MPLS TTL field. Then, the TTL field in MPLS packets is processed

r e in the standard mode. As shown in Figure , on the egress, the MPLS TTL decreases by

o one and is mapped to the IP TTL field . Namely, when an egress node pops the label, it

M renews the packet scheduling priority according to the EXP field in the label.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-65

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
Pipe Mode
t t

: h
As shown in Figure , on the ingress, the IP TTL decreases by one and the MPLS TTL is

e s
constant. Then, MPLS TTL is processed in the standard mode. On the egress, IP TTL

r c
decreases by one. That is, when IP packets enter an MPLS network, the IP TTL only

ou
decreases by one respectively on the ingress and egress . That is to say, when an

es
egress pops the label, it does not renew the packet scheduling priority.

R
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-66

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
Establishing Dynamic LSPs
t t

: h
Dynamic LSPs are set up automatically by the label distribution protocol. The following

s
label distribution protocols are applicable to an MPLS network.
e
Label Distribution Protocols
r c

s ou
Label distribution protocols are MPLS control protocols, namely, signaling protocols.

e
They are used to classify FECs, distribute labels, and create and maintain LSPs.
R
g
MPLS utilizes multiple label distribution protocols, such as Label Distribution Protocol

i n
(LDP), Resource Reservation Protocol Traffic Engineering (RSVP-TE), and Multiprotocol
n
r
Border Gateway Protocol (MP-BGP).
a
L e
r e
o
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-67

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
LDP
t t

: h
The Label Distribution Protocol (LDP) is specially defined for distributing labels. When LDP sets
up an LSP in hop-by-hop mode, LDP identifies the next hop along the LSP according to the

e s
routing forwarding table on each LSR. Information contained in the routing forwarding table is

r c
collected by IGP and BGP. LDP is not directly associated with routing protocols, but indirectly

ou
uses routing information.

MPLS labels.
es
LDP is not the only label distribution protocol. BGP and RSVP can also be extended to distribute

RSVP-TE R
g

n i n
The Resource Reservation Protocol (RSVP) is designed for the integrated service module and is
used to reserve resources on nodes along a path. RSVP works on the transport layer and does

a r
not transmit application data. RSVP is a network control protocol, similar to the Internet

e
Control Message Protocol (ICMP).

eL
RSVP is extended to support the setting up of a Constraint-based Routed LSP (CR-LSP). The

or
extended RSVP is called the RSVP-TE signaling protocol. It is used to set up TE tunnels.
Different from LDP LSPs, RSVP-TE tunnels are characteristic as follows:


Bandwidth reservation requests
Bandwidth constraint
Link colors
Explicit paths
MP-BGP
The Multiprotocol Extensions for BGP (MP-BGP) is an extended protocol of BGP. MP-BGP
imports the community attribute. MP-BGP supports label distribution for routes over MPLS VPN
and the Inter-AS VPN.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-68

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
However, with the development of ASIC technology, routing lookup speed is not

h
bottleneck of network development any more. Improving forwarding speed is no
:
s
longer the obvious advantage of MPLS.
e

r c
MPLS integrates the advantage of the two forwarding technologies, powerful layer 3

ou
routing function of IP network and high efficiency forwarding mechanism of

es
traditional layer 2 network, its forwarding plane adopts connection oriented, it is very

R
similar to layer 2 network forwarding method in existence.

n g
It makes MPLS easy to implement seamless combination of IP and ATM, frame relay
i
n
and other layer 2 network, and provide better solution for TE (Traffic Engineering),
r
a
VPN (Virtual Private Network), QoS (Quality of Service) and other applications.
e
eL
VPN based on MPLS can combine different embranchment of private network, form a

or
uniform network, VPN based on MPLS also supports communication control between
different VPN. As the figure shows, CE is user edge device; PE is service provider edge
M router, which is located in backbone network. P is backbone router in the service
provider network, it does not directly connect with CE. VPN data is transmitted along
LSP (label switch path) encapsulated with MPLS label.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-69

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
This figure shows the networking topology of MPLS L2 VPN and MPLS L3 VPN.

: h
Both MPLS L2 VPN and L3 VPN model contain the following parts:

e s
CE is Customer Edge. It indicates an edge device in the customer network,
c

r
which has one or more interfaces directly connected to the service provider

ou
network. A CE can be a router, a switch or a host. Mostly, the CE cannot
s
Re
"sense" the existence of the VPN, and does not need to support MPLS.
PE is Provider Edge. It indicates an edge device of the provider network, which
g

i n
is directly connected to the CE. In the MPLS network, the PE device performs

n
a r all the VPN-related processing.

L e P is Provider. It indicates a backbone device in the provider network, which is


not directly connected to the CE. The P device need only provide basic MPLS
r e
o
forwarding capability.

M Site indicates a group of IP systems. Sites have IP connectivity between each


other and this connectivity is independent of the service provider network. A
site is connected to the provider network through the CE. A site may contain
many CEs, but a CE belongs only to a single site.
Both MPLS L2 VPN and MPLS L3 VPN Services are offered from the edge of a network.
MPLS L3 VPN passes IP traffic over IP Backbone.
MPLS L2 VPN passes Ethernet, ATM, Frame Relay, PPP, HDLC traffic over IP
Backbone. Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-70

e n
/
o m
e i.c
aw
u
g.h
ni n
r
//lea
p :

t t
This table lists some major difference between MPLS Layer 3 VPN and MPLS L2 VPN.

: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-71

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
This figure shows a typical Metropolitan Ethernet Network. In this network, Triple

h
Player service (HIS service, VOIP Service and BTV Service ) and Enterprise
:
s
Interconnection are provided to customers.
e

r c
HIS Service, VOIP service, BTV Service are transmitted over separate MPLS L2 VPNs.

s ou
The branch offices of the enterprise communicate with each other through MPLS L2
VPN.
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-72

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The speed of traditional IP forwarding is low, and all the routers should maintain the

h
routes of the entire network, so it is hard to deploy QoS.
:
e s

r c
MPLS completes data forwarding by label.

s ou

Re
MPLS VPNMPLS QoSMPLS TE.

i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-73

e n
/
o m
ei.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-74

e n
/
o m
ei.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-75

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
With
t t
the development of the IP data network, the scalability, upgrade, and

h
compatible interworking of the IP network become powerful. The traditional network
:
s
is poor in upgrading, scaling, and interworking. It is confined by the transmission
e
r c
mode and service type, and the newly established network is difficult to share and

ou
manage. Therefore, in upgrading and expanding the traditional network, you must

s
decide to establish a repetitious network or fully utilize the current or public network
e
R
resources. PWE3 is a solution to combine the traditional network and the current

i n g
packet-based network.
PWE3

r n is a technology that bears Layer 2 services. PWE3 emulates the basic behaviors

a
and characteristics of the services such as Asynchronous Transfer Mode (ATM) , Frame
e
e L
Relay (FR) , Ethernet, low-speed Time Division Multiplex (TDM) circuit, and

r
Synchronous Optical Network (SONET) or Synchronous Digital Hierarchy (SDH) in a

o PSN.

M The PWE3 technology can interconnect the traditional network and the PSN to share
the resources and expand the network. PWE3 is an extension to the Martini protocol.
PWE3 extends new signaling, reduces the cost of signaling, prescribes the inter-AS
multi-hop mode, and makes the networking more flexible.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-76

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
Functions of PW
t t

: h
Encapsulate the emulated service from the logical or physical port on the PE
side.
e s
r c
Carry the encapsulated packets to the transmit tunnel.

ou

Set up PW at the tunnel end, including the exchanging and distribution of PW


s

labels.
Re

i n g
Perform the traffic monitoring in the ingress direction and traffic shaping in the
egress direction.

r n
a
Manage signalling, timing and sequence at the PW edge.

L e Manage the status specified by the service and alarms.

r e
o
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-77

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
PWE3: pseudo-wire emulation edge to edge. It is an end-to-end technology that bears

h
Layer 2 services. PWE3 is an extension to the VPWS, especially the Martini VPWS.
:
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-78

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
In the PWE3 network reference model, a PW connects two provider edges (PEs), and

h
an attachment circuit (AC) connects a PE device and a customer edge (CE) device.
:

e s
One or more PWs are created between PE1 and PE2 based on the service access

r c
requirements at the CEs. Several PWs can be carried in one or more PSN tunnels. In

ou
this manner, native services can be transmitted over a PSN.

es
PWE3 Basic Working Procedure
R
The following takes the flow direction of Virtual Private Network (VPN) packets from
g

i n
CE2 to CE4 as an example to show how PWE3 works:

n
ar
CE2 sends the service flow to be Emulated to PE1 through an AC.

Le
After PE1 receives the packets, the forwarder selects a PW for forwarding the

r e packets.

o PE1 generates double MPLS labels according to the forwarding entry of the

M PW (the private network label is used to identify the PW; the public network
label is used to forward packets to PE2 through the tunnel).
After emulated service packets arrive at PE2 through the public network tunnel,
the system removes the label.
The forwarder of PE2 selects an AC for forwarding the original service flow to
CE4.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-79

e n
/
o m
e i.c
aw
u
g .h
ni n
r
// lea
p :

t t
AC: attachment circuit. It is the physical or virtual circuit that connects a CE to a PE. If the physical

h
AC and the virtual AC adopt the same technology such as ATM, Ethernet, or FR, PWs can provide

:
homogeneity transmission; otherwise, PWs provide heterogeneity transmission.

e s
Forwarder : A PE sub-system that selects a PW to transmit the payload received on the AC.

r c
Tunnel : A mechanism to transparently bear the information on the network. It is used to bear PWs.

ou
A tunnel can bear multiple PWs. In most cases, a tunnel is an MPLS tunnel. The tunnel is a channel
that directly connects a local PE to a peer PE. In the tunnel, the data is transmitted transparently

s
between PEs. PSN tunnels are available in several types, but the Hybrid MSTP equipment supports
e
R
only MPLS tunnels. In this document, PWE3 is generally based on the MPLS tunnel (LSP), unless
otherwise specified.

n g
Encapsulation : The packets transmitted on PWs use the standard PW encapsulation type and
i
n
technology. The RFC 4446 defines multiple encapsulation types of PWE3 packets on PWs.

a r
PW signaling : The basis on which PWE3 is implemented. It is used for creating and maintaining

e
PWs. Currently, the primary PW signaling is LDP.

eL
PW: pseudo wire . It is a mechanism that carries the essential elements of an emulated circuit

or
between PEs over a PSN. The Hybrid MSTP equipment supports only static PWs.
CE: Customer Edge . It is a device that originates or terminates a service. The CE cannot be aware

M
whether an emulated service or a local service is in use.
PE: Provider Edge.It is a device that provides PWE3 to a CE. It is usually the edge router that is
connected to a CE on a backbone network. A PE is responsible for processing the VPN service. A PE
performs the mapping and forwarding of the packets from the private network to the public-
network tunnels and that in the reverse order.
U-PE: ultimate PE. It is an edge device that is directly connected to a user edge device on a
backbone network.
S-PE: switching PE. It is a device that is responsible for PW switching and PW label
forwarding within a backbone network.
CW: control word. A control word is a 4-byte encapsulated packet header. It is used to transmit
packets in an MPLS PSN.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-80

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
PWs can be classified into the following types:

: h
According to the implementation scheme, PWs can be classified into Static
PWs and Dynamic PWs.
e s
r c
According to the networking type, PWs can be classified into Single-Hop PWs

ou

and Multi-Hop PWs.

es
Static PWs specify the parameters through command rather than negotiate parameters
R

by using signaling. Data is transmitted between PEs through tunnels.



i n g
Dynamic PWs are PWs that are set up through signaling. U-PEs switch VC labels

r n
through LDP and bind the corresponding CE through the virtual circuit (VC) ID. After

e a
the tunnel that connects two PEs is set up and the switching and binding of labels are

e Lcomplete, a VC is set up if the AC of these two PEs are Up.

o r The single-hop PW indicates that only one PW exists between U-PEs. The label

M
switching at the PW label level is not needed.
The multi-hop PW indicates that multiple PWs exist between U-PEs, The forwarding
mechanisms of U-PEs in multi-hop PWs and in single-hop PWs are the same. The only
difference is the multi-hop PW requires to switch labels at the PW label level on the S-
PE.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-81

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The single-hop PW indicates that only one PW exists between U-PEs. The label

h
switching at the PW label level is not needed. The figure shows the networking of
:
s
single-hop PWE3 and the encapsulation of packets.
e
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-82

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
To carry out multi-hop PWs, the S-PE needs to connect the single-hop PWs at both

h
endpoints of the PW and switch the labels at the PW level on the S-PE.
:

e s
PWs can be switched in the following modes:

r c
Dynamic-to-dynamic: indicates that the PWs at both ends of the S-PE are set

ou

up through signaling. In dynamic-to-dynamic PWs, the remote label is sent

es
from two neighboring endpoints (U-PE or S-PE) through signaling to this S-PE.
R
The CW and the VCCV are sent to this S-PE through signaling by two U-PEs.

i n g
Static-to-static: indicates that PWs on both sides of the S-PE are static PWs.

n
ar
Dynamic-and-static: indicates that the PW on one side of the S-PE is set up

Le
through signaling, and the PW on the other side of the S-PE is set up through
static configurations.
r e
o
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-83

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The ETH PWE3 technology emulates the basic behaviors and characteristics of Ethernet

h
services on a packet switched network (PSN) by using the PWE3 mechanism, so that
:
s
the Ethernet services can be transmitted on a PSN.
e

r c
The outer label is used to identify a PSN tunnel; the inner label is used to identify a PW.

s ou
The tunnel label can be distributed by signaling protocol (Dynamic tunnel . It refers to

Re
an LSP established by running the label distribution protocol (LDP).) or configured
manually(Static tunnel . It refers to an LSP for which a static label is configured by

n g
using the management plane.). The Hybrid MSTP equipment supports static tunnels.
i

r n
The PW label can be distributed by signaling protocol or configured manually.

e a
CW is optional. If strict sequence is required, CW should be used.

e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-84

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
In terms of OptiX Hybrid MSTP equipment , the Control Word parameter specifies the
PW control word usage policy.
: h

e s
The control word is the 4-byte encapsulation packet header. The control word is used

r c
to identify the packet sequence or function as stuffing bits.

s ou
The following describes the meaning of each field in the CW:

Re
The first four bits must be 0, which indicates that the data is the PW data. The
packet must be ignored by the PE that receives the packet.

i n g
Reserved: It is of 12 bits. It is the reserved field and is often set to 0.
n

a r
Sequence Number: It is of 16 bits. It is used to guarantee the packet order.

L e This field is optional. If the Sequence Number is 0, it means the packet order

r e check is disabled.

o
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-85

e n
/
o m
ei.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-86

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The TDM PWE3 technology emulates the basic behaviors and characteristics of TDM

h
services on a packet switched network (PSN) by using the PWE3 mechanism, so that
:
s
the emulated TDM services can be transmitted on a PSN.
e

r c
TDM PWE3 services are also called CES services carried by PWE3. In this document, all

ou
the CES services are carried by PWE3.

es
TDM: Time Division Multiplex

R
Transmission channel is divided into different time slots.

n g
Each time slot can be used to transmit service for different users.
i

r n
E1: A type of TDM service . Transmission resource divided into 32 time slots . One time

e a
slot transmit 8 bits each time.8000 E1 frames will be transmitted per-second . So

e Lbandwidth for E1 transmission is :

o r32(time slots/frame)*8(bits/time
slot)*8000(frames/s)=2048000(bits/s)=2.048(Mbps)=32*64(Kbps)
M Unframed E1
Using all the 31 time slots as a whole to transmit user data.So, the total
bandwidth for one unframed E1 connection is 2.048Mbps, just like the
bandwidth provided by a serial interface.
Framed E1
Time slot 0 used for signaling or other purpose . Time slot 1-31 can be used for
transmit service data for different users.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-87

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
Elements of TDM emulation service
t t

: h
To use a PW to emulate the transmission of TDM service over a PSN, the following

e s
elements must be carried to the other end of the PW : TDM data , Frame format of

r c
TDM data , TDM alarm and signaling at the AC side , Synchronous timing information

ou
of TDM.

es
To implement TDM circuit emulation, TDM data is encapsulated with a special circuit
R
emulation packet header, which carries frame format, alarm, signaling and

n g
synchronous timing of the TDM data. The encapsulated packets are called PW packets,
i
n
which are carried by a protocol such as IP, MPLS or L2TP to traverse the PSN. After
r
a
arrival at the egress of the PW tunnel, they are decapsulated to reconstruct data
e
e Lstreams of TDM CS service.

o r OptiX Hybrid MSTP equipment supports TDM E1 PWE3 , namely CES(Circuit Emulation
Service) E1.
M As shown in Figure , CES service between BTS and BSC is transfered by Hybrid MSTP
equipment.BTS uses E1 interface which is connected to PE. BSC uses channelized STM-
1 interface which is connected to PE.
Structure Agnostic TDM over Packet Switched Network (SAToP) and Circuit Emulation
Service over Packet Switched Network (CESoPSN) are two methods for encapsulating
TDM serial bit streams as pseudo wires.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-88

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
In the SAToP mode:
t t

: h
The equipment regards TDM signals as constant rate bit flows, instead of sensing

s
structures in the TDM signals. The entire bandwidth of TDM signals is emulated.
e

r c
The overhead and payload in the TDM signal are transparently transmitted.

ou
SAToP provides the emulation and transport functions for unchannelized TDM services.

s
That is, it addresses only structure-agnostic transport. Therefore, SAToP can meet the

e
R
transport needs when a user needs services based on E1s.

i n g
SAToP segments and encapsulates TDM services as serial bit streams, and then
transmits the bit streams in PW tunnels. Although it disregards the TDM frame

r n
structure, it supports transmission of synchronous information.

e a
MPLS labels include tunnel labels and PW labels, which are used to identify tunnels and PWs

e Lrespectively. The format of the tunnel label is the same as that of the PW label.

o r Control Word: optional, can choose use CW or not, if not, CW header is not required.
RTP Header/ Time Stamp/ SSRC Identifier: if RTP used, these encapsulations are required; if not,
M

not required.
We can encapsulate one E1 frame into one PW encapsulation, or we can encapsulate more E1
frames into one PW header.
If one E1 frame encapsulated into one PW header, more bandwidth will be used but
the encapsulation time is short.
If more E1 frames encapsulated into one PW header, can improve the bandwidth
efficiency but need more time to encapsulate all the frames.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-89

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
In the CESoPSN mode:
t t
h
The MSTP equipment senses frame structures, frame alignment modes and timeslots in
the TDM circuit.

s :
e
The MSTP equipment processes the overhead and extracts the payload in TDM frames.

r c
Then, the MSTP equipment delivers the timeslot of each channel to the packet payload
according to certain sequence. As a result, the service in each channel in the packet is

ou
fixed and visible.

es
Each Ethernet frame that carries the CES service loads TDM frames of a fixed number.

R
CESoPSN provides the emulation and transport functions for channelized TDM services.
That is, it identifies the TDM frame format and signaling in the frame. Therefore,

i n g
CESoPSN can meet the transport needs when a user needs services based on timeslots.
With the frame format of the TDM service identified, CESoPSN does not transmit idle
n

a r timeslot channels; instead, CESoPSN extracts only the usable timeslots from the service
flow and then encapsulates these timeslots as PW packets for transmission.

L e
MPLS labels include tunnel labels and PW labels, which are used to identify tunnels and PWs
respectively. The format of the tunnel label is the same as that of the PW label.

re Control Word: optional, can choose use CW or not, if not, CW header is not required.
o RTP Header/ Time Stamp/ SSRC Identifier: if RTP used, these encapsulations are required; if not,

M
not required.
The CESoPSN different from SAToP is:
The CESoPSN protocol can identify frame structure of TDM service. It may not transmit
idle timeslot channels, but only extracts useful timeslots of CE devices from the E1
traffic stream and then encapsulates them into PW packets for transmission.
For example: only time slot 1-5 have data, all the other time slots are idle, CESoPSN
can choose only transmit time slot 1-5s data to another PE, the opposite PE can
reconstruct the original E1 frame, and then send it to appropriate CE.
NOTE: CESoPSN does not support the automatic detection of idle timeslots. Therefore,
idle timeslots must be manually specified.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-90

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
Data Jitter Buffer
t t

: h
After CES packets are transmitted over a PSN, the intervals between packet arrivals may be

s
different and the packets may be misordered. To ensure that the TDM bit streams can be

r c e
reconstructed on the egress PE, a jitter buffer is required to smooth the intervals between
packet arrivals and to reorder the misordered packets.The data jitter buffer works as follows:

s ou
The data jitter buffer enables the packets to enter the queue in the order that the
packets arrive at the interface. At the same time, data jitter buffer enables the packets

Re
to leave the queue in the order that the packets enter the queue.

i n g
When the packets are received with consecutive sequence numbers, the write pointer
writes data into the queue, beginning at the tail of the queue; the read pointer reads

r n
data from the queue, beginning at the head of the queue.

e a When the received packets are misordered, the read pointer automatically

e L accommodates to reading packets in the correct order.

r
The size of the data jitter buffer can be set as required. A low-capacity jitter buffer easily

o overflows, and as a result data may be lost at different degrees; a high-capacity jitter buffer can

M absorb jitters resulting from larger packet transmission intervals on the network, but a large
delay may be generated when the TDM bit streams are reconstructed. Therefore, during service
deployment, you need to properly configure the data jitter buffer based on the actual network
delay and jitter conditions.
CES Alarm Transparent Transmission
The Hybrid MSTP equipment uses the L/M and R fields in the control word to transparently
transmit alarms.CES alarm transparent transmission involves transmitting local CES alarms to
the remote end, and inserting corresponding alarms to notify the remote end of faults in the
local end. Depending on the position where the alarm is generated, CES alarm transparent
transmission can be between AC sides, and from the NNI side to the AC side.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-91

e n
/
o m
e i.c
aw
u
g .h
ni n
r
// lea
p :
Clock Recovery Schemes of TDM PWE3

t t
h
When clocks need to be transmitted with CES services, you can adopt CES retiming or CES adaptive clock
recovery (ACR) as required.

s :
e
CES Retiming CES retiming is an approach to reduce signal jitter after CES services traverse a

r c
transmission network. It combines the timing reference signal and CES service signal for transmission.
Therefore, the transmitted CES service signal carries the timing information that is synchronized with the

ou
timing reference signal. CES retiming is applicable when the following conditions are met:

es
All the clocks on the PSN are synchronous.

R
All the clocks on the PSN are synchronized with the clock of the incoming service.

g
CES ACR CES ACR is a technology wherein the CES service is used to restore the clock of the source end

n
in an adaptive manner. The sink end recovers the clock based on the packet received on its NNI side.

n i
All the clocks on the PSN are not synchronous.

a
All the clocks on the PSN are synchronous, but the clocks on the PSN are not synchronized with

e the clock of the incoming service.

eL
QoS of TDM PWE3

or
The QoS of TDM services features low delay, low jitter, and fixed bandwidth. Therefore, a high enough
per-hop behavior (PHB) level needs to be assigned to CES packets.

M
The Hybrid MSTP equipment performs QoS for TDM PWE3 packets as follows.
Ingress node
The PHB service class of a TDM PWE3 packet can be manually specified (the PHB service class is set to EF,
by default). When a packet leaves an ingress node, the EXP value of the packet is determined according
to the mapping (between PHB service classes and EXP values) defined by the DiffServ domain of the
egress port.
Transit node
When a packet enters a transit node, the PHB service class of the packet is determined according to the
mapping (between EXP values and PHB service classes) defined by the DiffServ domain of the ingress port.
When a packet leaves a transit node, the EXP value of the packet is determined according to the
mapping (between PHB service classes and EXP values) defined by the DiffServ domain of the egress port.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-92

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The ATM PWE3 technology emulates the basic behaviors and characteristics of ATM

h
services on a packet switched network (PSN) by using the PWE3 mechanism, so that
:
s
the emulated ATM services can be transmitted on a PSN.
e

r c
The outer label is used to identify a PSN tunnel; the inner label is used to identify a PW.

s ou
ATM transparent cell transport bears the following services though the PSN:

Re
The PW payload is the ATM cell.

i n g
The PW payload is the AAL5 SDU/PDU.
ATM transparent cell transport can be used to move the original ATM network
n

a r
through a PSN, with no new ATM device and no change of ATM CE configuration.

L e
ATM CEs regard ATM transparent cell transport as a TDM leased line to interconnect

r e ATM networks by transparently transporting cells through the PSN.

o
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-93

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :
VCC cell transport
t t

: h
Virtual circuit connection. It is a basic unit in an ATM network.

e s
It is applicable to transmit various ATM network services.
c

VPC cell transport r


ou

es
Virtual path connection. It is a group of VCCs with the same destination.

R
It is applicable for transmission of various ATM network services. If users have

i n g
multiple service connections of the same destination, the VPC cell is a better
solution compared with the VCC cell. VPC cell transport is swifter than VCC cell

r n
a
transport and is easy to manage and configure.

L e
One-to-one (1-to-1)

r e A VCC or VPC is mapped to one PW, supports all the AAL types.

o The VPI/VCI is not encapsulated.


M

N-to-one (N-to-1)
Multiple VCCs or VPCs are mapped to one PW.
N >= 1. Supports all the AAL types.
The VPI/VCI is encapsulated.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-94

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The CW, which is optional, is inserted before the ATM payload. If the MPLS PSN

h
supports the equal-cost multiple path (ECMP), the packets may not reach the
:
s
destination in the sending order. The Sequence Number field in the CW can be used to
e
c
restore the correct order of the packets. If the MPLS PSN does not support the ECMP,
r
ou
or the network has no strict requirement for the packet order, the CW is optional.

es
The following describes the meaning of each field in the CW:

R
The first four bits must be 0, which indicates that the data is the PW data. The

i n g
packet must be ignored by the PE that receives the packet.
Flags: It is of four bits. In some cases, the network strips off the Layer 2 header
n

a r at the ingress and re-adds the header at the egress.

L e Res: It is of two bits. It is the reserved field and is often set to 0.

r e Length: It is of six bits. The Length field is not used in N-to-1 cell transport

o mode. It is set to 0.

M Sequence Number: It is of 16 bits. It is used to guarantee the packet order.


This field is optional. If the Sequence Number is 0, it means the packet order
check is disabled.
An ATM Service Payload is of 52 bytes: 4-byte ATM Header and 48-byte ATM Cell
Payload. A common ATM Cell is of 53 bytes. Compared with the common ATM cell,
the ATM Service Payload discards a 1-byte Header Error Check (HEC) contained in the
common ATM header, that is, 53 -1 = 52 bytes.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-95

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The CW, which is optional, is inserted before the Pseudo wire Header. The ATM

h
Specific Header is inserted before the ATM Cell Payload.
:

e s
The following describes the meaning of each field in the ATM Specific Header:

r c
M: It is of one bit. It indicates the transmission mode. That is, a packet contains

ou

an ATM cell or a frame payload. The value of 0 indicates that the packet

es
contains an ATM cell; the value of 1 indicates that the packet contains a frame
payload. R

i n g
V: It refers to the VCI flag, which is of one bit. It indicates whether a packet

r n
contains the VCI field or not. The value of 0 indicates that the packet does not

e a contain the VCI; the value of 1 indicates that the packet contains the VCI. The

e L VCC is an ATM connection that is switched by the VCI value in the ATM cell

o r header. Therefore, the VCI is not needed for a VCC.

M
Resvd: It refers to the reserved field, which is of two bits. This field is set to 0
when it is transmitted and is ignored when it is received.
The number of ATM cells to be encapsulated is negotiated between the ingress device
and the egress device. Each encapsulated ATM cell has the 1-byte ATM Specific
Header. Therefore, the ATM cell information of 53 bytes can be regarded as being
encapsulated in 49 bytes.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-96

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The CW, which is mandatory, is inserted before the Pseudowire Header. The ATM

h
Specific Header is inserted before the ATM Cell Payload.
:

e s
For a common ATM VPC, the egress PE cannot change the VCI field in a packet. In

c
VPC cell transport, the egress PE can set a VCI value that is different from the VCI
r
ou
value on the ingress. The VCI set by the egress PE is determined only by the PW
Header.

es

R
The following describes the meaning of each field in the ATM Specific Header:

i n g
M: It is of one bit. It indicates the transmission mode. That is, a packet contains
an ATM cell or a frame payload. The value of 0 indicates that the packet

r n
contains an ATM cell; the value of 1 indicates that the packet contains a frame

e a payload.

eL
V: It refers to the VCI flag, which is of one bit. It indicates whether a packet

or
contains the VCI field or not. The value of 0 indicates that the packet does not
contain the VCI; the value of 1 indicates that the packet contains the VCI. The
M VPC is an ATM connection that is switched by the VPI value in the ATM cell
header. Therefore, the VCI is needed for a VPC, and is transmitted in each cell.
VCI: It is of 16 bits. This filed indicates that VCI value after the ATM cell is
encapsulated.
The number of ATM cells to be encapsulated is negotiated between the ingress device
and the egress device. Each encapsulated ATM cell has the 1-byte ATM Specific
Header. Therefore, the ATM cell information of 53 bytes can be regarded as being
encapsulated in 51 bytes.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-97

e n
/
o m
e i.c
aw
u
g .h
ni n
r
// lea
p :
Number of ATM Cells Encapsulated in PWE3 Packets

t t
h
The number of ATM cells encapsulated in PWE3 packets is determined by the parameters Maximum

:
Number of Concatenated Cells and Loading Time.

s
e
The number of ATM cells in a ATM service is determined by the parameters Maximum Number of

c
Concatenated Cells and ATM Cell Concatenation Waiting Time.

r
ou
When Maximum Number of Concatenated Cells is set to 1, each PWE3 packet contains only
one ATM cell. Specifically, an ATM cell is directly encapsulated into a PWE3 packet after the PE

s
receives an ATM cell from the AC.

e
R
When Maximum Number of Concatenated Cells is set to a value greater than 1, the PE uses
the timer ATM Cell Concatenation Waiting Time. If the PE receives the maximum number of

i n g
ATM cells from the AC before the timer expires, the PE encapsulates all the received ATM cells
into a PWE3 packet and resets the timer. If the timer expires, the PE encapsulates all the

r n
received ATM cells into a PWE3 packet and resets the timer, even if the maximum number of

e a ATM cells is not reached.

eL
QoS of ATM PWE3
The QoS requirements depend on the category of the ATM service. As such, set the PHB service level of

or
an ATM PWE3 packet based on the category of the emulated ATM service to ensure specific QoS
objectives.


Specify an appropriate PHB service level for an ATM service based on its category. The following table
provides the default mapping relationships between ATM service categories and PHB service levels.
The OptiX OSN equipments perform QoS for ATM PWE3 packets as follows.
Ingress node The PHB service class of an ATM PWE3 packet can be manually specified. When a packet
leaves an ingress node, the EXP value of the packet is determined according to the mapping (between
PHB service classes and EXP values) defined by the DiffServ domain of the egress port.
Transit node When a packet enters a transit node, the PHB service class of the packet is determined
according to the mapping (between EXP values and PHB service classes) defined by the DiffServ domain
of the ingress port. When a packet leaves a transit node, the EXP value of the packet is determined
according to the mapping (between PHB service classes and EXP values) defined by the DiffServ domain
of the egress port.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-98

e n
/
o m
ei.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-99

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The MSTP products supports various Ethernet services and provides ideal L2VPN
solutions.
: h

e s
A virtual private network (VPN) is a private network constructed on the basis of the

r c
public network. The L2VPN is the VPN based on technologies of the link layer. The

ou
VPN constructed on the public network can provide the same security, reliability and

es
manageability as the existing private networks.

R
Service providers can provide the VPN value-added service for enterprises to
g

n i n
fully use the existing network resources and to increase the service volume. In
addition, service providers can consolidate long-term partnership with

a r enterprises.
e
eL
For VPN users, the cost to lease the network is saved. The flexibility of the VPN

or
networking makes the network management easier for enterprises. As the
network security and encryption technology develops, the private data can be
M transmitted over the public network with security.
For the MSTP products, the Ethernet service has the following forms.
Point-to-point service: E-Line service
Multipoint-to-multipoint service: E-LAN service
Multipoint-to-point converging service: E-Aggr service

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-100

e n
/
o m
e i.c
aw
u
g.h
ni n
r
//lea
p :

t t
Company A and Company B have departments in City 1 and City 2, which need to

h
communicate with each other respectively. The communication of Company A should
:
s
be isolated from that of Company B. For such an application, the E-Line service carried
e
by the PW should be created.
r c
ou
Create two PWs carrying the services of Company A and Company B

es
respectively.

R
The two PWs can use one tunnel, and share bandwidth of the same tunnel.
g

n i n
a r
L e
r e
o
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-101

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
The three user side networks respectively access the carrier networks through the PE.

h
Each user side network has its own VLAN tag. The user side networks require access
:
s
between each other. The user side networks can communicate with each other
e
r c
through the configuration of the E-LAN service.

ou
On each PE node, the accessed data is forwarded through the target MAC address or

es
target MAC address + VLAN. At the network side, the data is transparently transmitted

R
to the opposite PE equipment through the created MPLS tunnel.

n g
In this case, the entire transport network, which exchanges different data at the user
i
n
sides, equals a Layer 2 switch. In other words, the transport network is transparent to
r
a
the user network.
e
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-102

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
Node B connected to NE1 and Node B connected to NE2 need communicate with the

h
RNC connected to NE3. In this case, NE1 and NE2 can aggregate the services accessed
:
s
from Node B to two MPLS tunnels respectively. The two MPLS tunnel then transports
e
r c
the services to NE3, which then aggregates the services to the RNC. All services of

ou
Node B have VLAN, whose value is 100.

es
Node B is connected to the equipment through the FE interface. RNC is connected to

R
the equipment through the GE interface. The NEs are connected through the STM-4

i n g
POS interfaces for networking.

r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-103

e n
/
o m
e i.c
aw
u
g.h
ni n
r
//lea
p :

t t
Between BTS and BSC, the CES service is transported through the MSTP equipment. A

h
CES service is available between BTS and BSC that are connected to PE1. Two CES
:
s
services are available between BTS and BSC that are connected to PE2.
e

r c
BTS1 uses one E1 connection connected to PE1, BTS2 uses two E1 connections

ou
connected to PE2. PE3 uses one channelized STM-1 connection connected to BSC.

es
So, we need create one PW between PE1 and PE3, and two PWs between PE2 and
PE3. R
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-104

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
In N-to-1 VPC ATM cell transport, a PW bears cells of multiple ATM VPCs. This mode

h
supports all the AAL types. The tunnel packets carry the VPI/VCI value.
:

e s
In this mode, multiple VPs can be set up between a PE and a CE. The data transmission

r c
on VPs is independent of each other.

s ou
In N-to-1 VPC ATM cell transport, multiple VPs of an ATM sub-interface can be

Re
mapped to a PW. Multiple VPs of different ATM sub-interfaces cannot be mapped to a
PW. In addition, multiple VPs of different service boards cannot be mapped to a PW.

i n g
N-to-1 VPC ATM cell transport has two types: remote N-to-1 VPC ATM cell transport

r n
and local N-to-1 VPC ATM cell transport.

e a Remote N-to-1 VPC ATM cell transport


L

r e ATM cells are transparently transmitted across the entire PSN and each

o PW bears cells of multiple ATM VPCs , as shown in Figure .

M Local N-to-1 VPC ATM cell transport.


ATM cells are forwarded through the PE rather than transparently
transmitted across the entire PSN.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-105

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
In 1-to-1 VCC ATM cell transport, a PW bears cells of an ATM VCC. This mode

h
supports all the AAL types. The tunnel packets do not carry the VPI/VCI value.
:

e s
In this mode, the VPI/VCI switching is supported without any switching configuration

r c
on the PE because the MPLS PW is considered as an ATM switch.

s ou
1-to-1 VCC ATM cell transport has two types: remote 1-to-1 VCC ATM cell transport

Re
and local 1-to-1 VCC ATM cell transport.
Remote 1-to-1 VCC ATM cell transport
g

n i n
ATM cells are transparently transmitted across the entire PSN and each

a r PW bears cells of only one ATM VCC , as shown in Figure .

L e Local 1-to-1 VCC ATM cell transport.

r e ATM cells are forwarded through the PE rather than transparently

o transmitted across the entire PSN.

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-106

e n
/
o m
e i.c
aw
u
g .h
ni n
r
//lea
p :

t t
PWE3 is a technology that bears Layer 2 services. PWE3 emulates the basic behaviors

h
and characteristics of the services such as ATM , Frame Relay (FR) , Ethernet, low-
:
s
speed TDM circuit, and SONET or SDH in a PSN.
e

r c
List the difference between SAToP and CESoPSN.

s ou
In the SAToP mode:

Re
The equipment regards TDM signals as constant rate bit flows, instead
of sensing structures in the TDM signals. The entire bandwidth of TDM

i n g signals is emulated.

n
ar
The overhead and payload in the TDM signal are transparently

Le
transmitted.

re
In the CESoPSN mode:

o The MSTP equipment senses frame structures, frame alignment modes

M
and timeslots in the TDM circuit.
The MSTP equipment processes the overhead and extracts the payload
in TDM frames. Then, the MSTP equipment delivers the timeslot of
each channel to the packet payload according to certain sequence. As
a result, the service in each channel in the packet is fixed and visible.
Typical applications of PWE3 have the following typesEthernet Service to
PWE3,TDM E1 Service to PWE3 and ATM Service to PWE3.
Confidential Information of Huawei. No
Spreading Without Permission
Packet Switch Principle P-107

e n
/
o m
e i.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-108

e n
/
o m
e i.c
aw
u
g.h
ni n
r
//lea
p :
VPN Virtual Private Network
t t
LDP Label Distribution Protocol
: h
PDU Protocol Data Unit
e s
STB Set Top Box r c
ou

HG Home Gate
es

R
DSLAM Digital Subscriber Line Access Multiplexer

i n g
BRAS Broadband Remote Access Server

r n
ISP Internet Service Provider Internet

e a
VoIP Voice over IP

eL
HSI High Speed Internet

or BTV Broadband TV


BTSBase Transceiver Station
BSCBase Station Controller
RNC Radio Network Controller
CIDRClassless Inter-Domain Routing
DHCPDynamic Host Configuration Protocol

Confidential Information of Huawei. No


Spreading Without Permission
Packet Switch Principle P-109

e n
/
o m
e i.c
aw
u
g.h
ni n
r
//lea
p :
t t
: h
e s
r c
s ou
Re
i n g
r n
e a
e L
o r
M

Confidential Information of Huawei. No


Spreading Without Permission
OptiX SDH Equipment Hardware P-1

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Content
t t
:h
1. Product Introduction ....................................................................................Page 3

e s
2. Cabinet, Sub-rack .........................................................................................Page 6

r c
3. Boards ...................................................................................................... Page 16

ou
s
4. Common Network Elements and Configuration ......................................... Page 52

e
R
5. Features .....................................................................................................Page 57

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-2

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
// le
p :
References
t t
:h
OptiX OSN 3500 Hardware Description manual

e s
OptiX OSN 3500 Product Description manual

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-3

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-4

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
OptiX OSN 1500/2500 mainly used in Optical convergence or access switching system.

:h
OptiX OSN 3500 mainly used in Optical convergence and core switching system.

e s
OptiX OSN 7500 mainly used in Optical core switching system.

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-5

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Totally six main units:
t t
:h
Tributary unit (TU): access low rate signal (PDH, Ethernet, ATM, and so on) &
process it.
e s
r c
Line unit (LU): access optical high rate signal (STM-1/4/16/64 SDH signal) & process
u

it.
s o

Re
Cross-connect Unit: change VC-4,VC-3,VC-12 level signals direction & channel.

n g
Timing Unit: provide timing signal for the system.

ni
Auxiliary Unit: provide kinds of Auxiliary interfaces to monitor the equipment &

a r signals status.

L e SCC Unit: collect alarm and performance events & communicate with another

e HUAWEIS SDH equipment in the same network.

or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-6

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-7

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The OptiX OSN series sub-rack can be installed in a 300-mm or 600-mm deep ETSI cabinet.

:h
The external case-shaped devices can be installed in the cabinet as required.
COA
e s
r c
Fiber management spool, which is used to spool the redundant fibers inside the
u

cabinet.
s o

Re
For 600MM depth cabinet two sub-racks can not be installed as back to back. It is just to

g
say the same height cabinet installed the same kind equipments sub-rack number are the

n
ni
same.

a r
L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-8

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
The indicators on the ETSI cabinet are power supply indicators and alarm severity

:h
indicators.

e s
If alarm occurs, indicators will be on, not flashing.

r c
If alarm indicator is on, alarm occurs on one or more sub-racks inside the cabinet.
u

s o
The cabinet indicators are driven by the sub-rack. The cabinet indicators can be lit

e
only after the cables are correctly connected and the sub-rack is powered on.
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-9

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The PDU, TN81PDU, is installed at the top of the cabinet, and is divided into two parts,

:h
namely, part A and part B that back up each other.

e s
The TN81PDU provides eight power output interfaces, supplying power to the subracks
inside the cabinet.
r c

ou
Power output area: On both sides of the DC PDU, there are respectively four output

es
terminal blocks that are used to connect to the power cables of subracks.
R
Power input area: The TN81PDU supports corresponding power input capability based on
g

ni n
the power supply capacity of the telecommunications room.

a rWhen the telecommunications room provides four power inputs not less than 32 A,
part A and part B can respectively be connected to four -48 V DC power cables and

L e four power ground cables, that is, eight -48 V DC power cables and eight power

e ground cables in total

or
When the telecommunications room provides two power inputs not less than 63 A,
part A and part B can respectively be connected to two -48 V DC power cables and
M two power ground cables, that is, four-48 V DC power cables and four power
ground cables in total
Power switch area: On both sides of the DC PDU, there are respectively four power output
switches that correspond to the output terminal blocks. The power output switches
control power supply to the corresponding subracks.

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-10

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
On the top of the ETSI cabinet, there are cabinet indicators and a DC power distribution

:h
unit (PDU). The OptiX OSN series supports the input of 48 V or 60 V DC power supply.

e s
The Voltage range of input power supply should be 38.4 V to 57.6 V or 48 V to 72 V.

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-11

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The sub-rack of the OptiX OSN 3500 adopts a two-tier structure. The structure is divided

:h
into board area, fan area, and fiber routing area.

e s
Interface board area: for various OptiX OSN 3500 interface boards.

r c
Fan area: for three fan modules, enabling heat dissipation function.

ou
Processing board area: for all processing boards of the OptiX OSN 3500.
s

Re
Fiber routing area: for fiber routing.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-12

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
The sub-rack of the OptiX OSN 3500 has two tiers. The upper tier gives 16 slots for

:h
interface boards. The lower tier gives 18 slots, 15 slots of them for processing boards.

e s
Slots for Interface Boards: slots 1926, slots 2936.

r c
Slots for Processing Boards: slots 18 and slots 1117.
Slots for Other Boards.
ou
s

Re
XCS boards: slots 910

n g
GSCC boards: slots 1718 (Slot 17 can also hold a service processing board)

ni
Power interface boards: slots 2728

a rAuxiliary interface boards: slot 37


e

e L Dual slot can pass though the DCC byte and orderwire byte by hardware if the SCC board

or
is offline.

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-13

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
The OptiX OSN 3500 offers a 200 Gbit/s, 80 Gbit/s or 40 Gbit/s cross-connect capacity

:h
according to the type of cross-connect boards.

e s
622M x 8+2.5G x 4+10G x 2=35G

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-14

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
1.25G x 7+2.5G x 4+10G x 4=58.75G
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-15

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
5G x 7+10 G x 4+ 20 G x 4=155G
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-16

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-17

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-18

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
We can not use the processing board solely. Because on processing board there are no

:h
interface to access the signal, so we should use the corresponding interface board

s
together to provide specific interface to access the signal.
e
CAUTIONS:
r c

ou
Wear the anti-static wrist strap when holding the board with hands. Make sure

s
that the anti-static wrist strap is well grounded. Otherwise, the static discharge
e
R
may cause damage to the board.

n g
Do not directly insert the attenuators into the level optical modules. If the

ni
attenuators are required, use the attenuators at the ODF side.

a rIf a board requires an attenuator, insert the attenuator in the IN interface instead

L e of the OUT interface.

e When performing the loopback, use attenuators to prevent damage to the optical

or

modules.

M Laser Safety Class


The safety class of the laser on the board is CLASS 1.
The maximum launched optical power of the optical interfaces is lower than 10
dBm (10 mW).
DANGER
Avoid direct eye exposure to laser beams launched from the optical interface board
or optical interfaces. Otherwise, damage may be caused to the eyes.

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-19

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-20

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
LC: Lucent connector.
t t
:h
A: support SFP module

e s
F: support FEC (Forward Error Correction) function
I-64.2:
r c
u

I: Internal
s o

Re
L: Long distance

n g
S: Short distance

r ni
64: STM-64 16:STM-16

e a
1: Wavelength is 1310nm, used for G.652 fiber

e L 2: Wavelength is 1550nm used for G.652 fiber

or
3: Wavelength is 1550nm used for G.653 fiber

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-21

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
SL64/SF64 cannot support SFP module
t t
:h
SFP: Small Form-Factor Pluggable

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-22

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
SLH1 is a 16 x STM-1 electrical signal processing board.

:h
SEP1 is a 2 x STM-1 electrical signal processing board, with two STM-1 electrical interfaces
on the front panel.
e s

r c
SEP1 is an 8 x STM-1 electrical signal processing board with interface board, in this case,

ou
the SEP1 we should create it on NMS as SEP.

es
EU08, EU04 and OU08 are interface boards of the SEP&SLH1. The TSB8 and TSB4 are
R
electrical interface switching and bridging boards.

n g
ni
When used with different interface boards and electrical interface switching and bridging

r
boards, the SEP1 and SLH1 have different access ability.
a
L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-23

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The optical interface of the N1OU08 uses the LC connector. The optical interface of the

:h
N2OU08 uses the SC connector. The N1OU08 uses the pluggable optical module. The

s
N2OU08 does not use the pluggable optical module.
e
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-24

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Receiving direction:
t t
:h
The O/E conversion module includes E/O (O/E) conversion and MUX/DEMUX part. The O/E

detects R_LOS alarms.


e s
conversion converts the received 2.666 Gbit/s FEC optical signals into electrical signals and

r c
u
The DEMUX part demultiplexes the high rate electrical signals into multiple parallel electrical

o
signals, and recovery the clock signal at the same time.
s

Re
The multiple electrical signals demultiplexed are transferred to the digital packet
encapsulation and FEC processing module to have FEC packets decapsulated and SDH

g
overheads processed.
n

r ni
The SDH overhead processing module extracts overhead byte from the received multiple

a
electrical signals, performs pointer processing, and then sends the signals to the cross-

L e connect unit through backplane bus. R_LOF, R_OOF, AU_LOP and AU_AIS alarms are
detected in this module.
e
or
Transmitting direction

M
After being inserted with overhead bytes in the SDH overhead processing module, the
parallel electrical signals from the cross-connect unit are then sent to the digital packet
encapsulation and FEC processing module.
The digital packet encapsulation and FEC processing module performs FEC coding and SDH
overhead inserting to the multiple signals, and then sends it to the O/E conversion module.
The O/E conversion module multiplexes the received parallel electrical signals into high rate
electrical signals through the MUX part, converts the signals into SDH optical signals.
Signals are then sent to fibres for transmission.

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-25

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Different boards have different appearance and dimensions.

:h
The barcode on the front panel of the board indicates the board version, name and board
features.
e s

r c
Two types of barcodes are used for the boards of the OSN series.

ou
16-character manufacturing code + board version + board name + board feature
s

code
Re

n g
20-character manufacturing code + board version + board name + board feature

ni
code

a r
For details on the board feature code, please refer to the section that describes the board

L e
feature code for each board on equipment hardware manuals.

e
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-26

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-27

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-28

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-29

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
PDH service processing boards include the boards which can process E1/T1, E3/DS3,

:h
E4/STM-1 services.

e s
Naming rules of PDH service processing boards:
S - SDH
r c
u

P - PDH
s o
M - MIX
Re

n g
PL3A has three pairs of 75-ohm unbalanced SMB interfaces, and can work without

ni
interface board; PL3 must work with C34S.

a r
D75S - 75 means the interface impedance is 75; D12S 12 means 120 .

L e
The difference between D12S and D12B is: D12S supports TPS configuration, while D12B

e
or
does not.

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-30

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
Indicators of SPQ4
t t
:h
STAT: Board hardware status indicator

e s
ACT: Board activation status indicator

r c
PROG: Board software status indicator
u

s o
SRV: Service status indicator

Re
MU04 is the interface board for SPQ4 with SMB connector, for E4/STM-1 signal.

n g
There is no indicator on MU04.

r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-31

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Functions of PQ1:
t t
:h
Receiving Direction

e s
The E1 signal enters through the interface module, the decoder where

r c
HDB3 or B8ZS data signal and clock signal are recovered. Then, the signal is

ou
sent to the mapping module.

es
In the mapping module, the E1 signal is mapped asynchronously to C-12,
R

and formed as VC-12 after channel overhead processing, as TU-12 after

n g
ni
pointer processing, and finally as VC-4 through multiplexing. Then, the

a r signal is sent to the cross-connect unit.

L e Transmitting Direction

e The de-mapping module extracts binary data and clock signals from the

or

VC-4 signal from the cross-connect unit, and sends the signal to the

M encoder, where E1 signals are output.

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-32

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
There are two types of PQ1: PQ1A (75) and PQ1B (100/120).

:h
Warm reset will not affect the running service, while cold reset may affect the service.

e s
TPS: Tributary Protection Switching. It is intended to protect several (N) tributary

r c
processing boards through a standby tributary processing board .

ou
PRBS: Pseudo-Random Binary Sequence. The PRBS function is mainly used for network self-
s

Re
test and maintenance. An NE that provides the PRBS function can work as a simple device
used to analyze if a service path is faulty. Such analysis can be performed for the NE and

n g
ni
the entire network. During deployment or troubleshooting, the PRBS function realizes the

r
test without a real test device.
a
L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-33

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
If there is no interface port on the board, then the board must work with an interface

:h
board.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-34

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-35

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-36

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Function of EFS4
t t
:h
Convert Ethernet signal to VC-4 or VC-4 concatenated signal and convert VC-4 or

s
VC-4 concatenate signal back to standard Ethernet signal.
e

r c
Collect alarm and performance events.

ou
GFP: Generic Framing Procedure.
Receiving Direction
es
R
The interface module accesses 100BASE-SX/LX/ZX signals from external Ethernet
g

n
equipment (such as LAN switch and router) and performs decoding and serial or

r ni
parallel conversion to the signals. Then it sends signals to the service processing

e a module for frame delimitation, preamble field code stripping, cyclic redundancy

e L code (CRC) termination and Ethernet performance statistics. At the encapsulation


module, HDLC, LAPS or GFP-F encapsulation is done to the Ethernet frame. After

or that, the services are mapped into VC-3 or VC-4 at the mapping module and then

M
sent to the cross-connect unit.
Transmitting Direction
De-map the VC-3 or VC-4 signals from the cross-connect unit and send them to the
encapsulation module for decapsulation. The service processing module determines
the route according to the level of the equipment; it also provides frame
delimitation, adding preamble field code, CRC calculation and performance
statistics. Finally, the interface module performs parallel or serial conversion and
encoding to the signals and then sends them out from the Ethernet interface.

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-37

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
// le
p :
LCAS: Link Capacity Adjustment Scheme.
t t
:h
Testing frame only for GFP protocol.
EPL: Ethernet Private Line.
e s
r c
EPLAN: Ethernet Private Local Area Network.
u


s o
EVPL: Ethernet Virtual Private Line.

Re
EVPLAN: Ethernet Virtual Private Local Area Network.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-38

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
XCE can be used in extended sub-rack only.

s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-39

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Note: When OptiX OSN 3500 is configured as an extended sub-rack, the EXT port of AUX

:h
board should be connected to the one of main sub-rack.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-40

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Standard SSM mode: A mechanism for synchronization management in SDH network, is

:h
loaded in the lower four bits of S1 byte in SDH overhead. It allows the exchange of the

s
quality information of clock source among nodes. Thus, the Timing Unit can automatically
e
c
choose the clock source of the highest quality and priority to prevent clock mutual tracing.
r

ou
Extended SSM mode: Huawei raises the concept of clock source ID, which is defined using

es
the higher four bits of S1 byte and is transmitted with SSM together. When a node

R
receives the S1 byte, it checks the clock source ID to determine if it is originated from this

g
station. If so, the clock source is unavailable, thus the clock loop can be avoided when the
n
ni
clock tracing trail is configured as a ring.
r

e a
Stop SSM mode: The Timing Unit selects and switches the clock source based on the

e L priority table. The available clock source with highest priority is selected as the tracing

or
source.

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-41

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-42

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Control Module
t t
:h
The control module configures and manages boards and NEs, collect alarms and

e s
performance events, and backs up important data.
Communication Module
r c
ou
The communication module provides 10 Mbit/s and 100 Mbit/s compatible
s

Re
Ethernet interface for the connection between the NE and the T2000, F&f interface
for managing external devices such as COA, and the OAM interface.

n g
ni
Overhead Processing Module

a rThe overhead processing module receives overhead signals from the line slot and

L e processes such bytes as E1, E2, F1 and serials 1-4. The overhead processing module

e also sends overhead signals to the line board, and externally provides one

or orderwire interface, two SDH NNI audio interfaces, interface F1, and the broadcast

M data interfaces serials 1-4.

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-43

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
Power Monitoring Module
t t
:h
The power monitoring module comprises 48 V power monitoring and working
power.
e s
r c
The working power provides the GSCC with working voltage and detects and
u

o
switches the active and standby 3.3 V power supply (which is provided through
s
AUX).
Re
The 48 V power monitoring module monitors the +3.3 V power alarm of AUX,
g

ni n
monitors fan alarms, monitors and manages the PIU, and processes sixteen

a rhousekeeping alarm inputs and four housekeeping alarm outputs as well as the

e
cabinet alarm indicator signal, monitors the over-voltage of -48v and produces

e L corresponding power alarm.

or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-44

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-45

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
If there are two subnets which are not connected by fibers, ethernet cables can be applied

:h
to establish the extended ECC communication. In this way, the U2000 can manage these

s
equipment in a centralized manner. One NE will work as a server and anther one is a client.
e
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-46

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The mdb is in the dynamic random-access memory (RAM), saving the current databases.

:h
The drdb is saved in flash RAM and D RAM. When power failure occurs to NE, the

s
databases will be recovered in the order of drdb fdb0 fdb1. The drdb will be checked
e
c
first for configuration data. If the configuration data are safe in drdb, they will be
r
u
recovered to mdb from drdb; if they are damaged, data will be recovered from fdb0 or
o
s
fdb1, depending on which saves the latest data. If data in fdb0 are also damaged, fdb1 is
e
R
used for data recovery. Therefore, it is important to back up data to fdb0 and fdb1 and

g
compare the data in them.
n
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-47

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The AUX, EOW, SAP and SEI are the system auxiliary interface board, providing the system

:h
with various auxiliary interfaces, management interfaces, central backup of the +3.3 V

s
board power supply, orderwire interface and broadcast data interface.
e

r c
The BA2 is a 2-port booster amplifier board. The BPA is a booster amplifier & pre-amplifier
board.
ou

es
The COA, a case-shape optical amplifier, integrates the EDFA module, drive circuit and

R
communication circuit in an aluminium case. Three types of COA are available: 61COA,

g
N1COA and 62COA.

n
ni
The DCU is the dispersion compensation board. It can compensate for the optical signal

r
dispersion accumulated during transmission in the 10 Gbit/s system. In addition, it
a
L e
compresses the optical signal and works with the booster amplifier to achieve long
distance optical transmission.
e
or
The PIU is a power interface board.


It functions power access, lightening protection and filtering.
The uninterruptible power module (UPM), numbered GIE4805S, is a special power supply
system. It can convert 110 V/220 V AC power supply directly to 48 V DC needed by
transmission equipment, such as OptiX OSN 2500. It is suitable for telecom carriers who
do not have 48 V DC power supply equipment or who require storage batteries.
The OptiX OSN equipment uses the modularized fan. The FAN is a fan control board,
responsible for fan speed adjustment, fan failure detection and failure report, as well as
report of the fan not-in-position alarm.

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-48

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Principle Of AUX
t t
:h
The AUX consists of communication module, interface module and power module.
Communication Module
e s
r c
Provide the U2000 interface for active/standby SCCs, OAM interface for remote
u

o
maintenance, and interfaces for inter-board communication.
s
Interface Module
Re

n g
Provide various auxiliary interfaces, such as F&f, OAM, F1 and clock input/output.

ni
The N1 AUX and R1/R2 AUX provide different auxiliary interfaces.

a r
Power Module

L e Provide the AUX with working power, and other boards on the subrack with +3.3
e
or
V centralised backup power.

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-49

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-50

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The DCU is used to compensate the accumulated dispersion during the transmission of the

:h
10 Gbit/s system, suppress optical pulse signals, recover optical signals, and realize the

s
long-haul transmission with optical regeneration when used with optical amplifier board.
e

r c
During the long-haul transmission (more than 80 km) of 10 Gbit/s signals, the pulse width
u
of optical signals is expanded and signals are distorted because of dispersion. As a result,
o
es
the optical signals cannot be normally received by the optical receiver. Thus, the DCU

R
should be used to compensate the dispersion.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-51

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-52

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-53

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-54

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-55

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-56

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-57

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-58

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-59

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
TPS of E1/T1 service does not need TSB4/TSB8 board.

:h
1:8 TPS of E1/T1 board: slot1 is for protection boardwhile slot2 - slot5 and slot13 -

e
slot16 are for working boards.
s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-60

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-61

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Equipment Hardware P-62

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-1

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Content
t t
:h
SDH Network Topologies....................................................................Page 2

e s
Survivable networks and their protection mechanisms.Page 14

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-2

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Through this course, trainees should be able to:

:h
List the SDH different topologies structures, features and applications.

e s
Have idea about the basic concept of the SDH network protection. And understand

r c
the network objectives, application architecture, switching initialization and

ou
restoration criteria, characteristics, network capacity of different types of network
protection.
es
References R
g

ni n
ITU-T Recommendation G.841 (Oct, 1998) Types and characteristics of SDH

a rnetwork protection architectures

L e ITU-T Recommendation G.810 (Aug, 1996) Definitions and terminology for

e synchronization networks ITU-T Recommendation G.803

or ITU-T Recommendation G.803 (Aug, 2003) Architecture of transport networks

M based on the synchronous digital hierarchy (SDH)

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-3

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-4

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-5

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The network topology, the geometrical layout of SDH network nodes and transmission

:h
lines, reflects the physical connection of the network. The network topology is important

s
in the sense that it determines the performance, reliability and cost-effectiveness of an SDH
e
network.
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-6

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-7

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The chain network is simple and economical at the initial application stage of SDH

:h
equipment. For a chain network, its more difficult and more expensive to protect the

s
traffic, compared with a ring network. The chain network is used in cases where the traffic
e
c
is unimportant or where the traffic load is small so that we dont have to care about the
r
traffic protection.
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-8

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In the star network, the hub node selects routes and passes through the traffic signals for

:h
all the other nodes. As a result, the hub node is able to manage the bandwidth resources

s
thoroughly and flexibly. On the other hand, there is the possibility of a potential bottleneck
e
c
of bandwidth resources. Besides, the equipment failure of the hub node may result in the
r
u
breakdown of the entire network.
o
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-9

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
A tree structure can be considered as the combination of chain and star structures. It is

:h
suitable for broadcast service. However, due to the bottleneck problem and the optical

s
power budget limit, it is not suitable for bidirectional traffic.
e
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-10

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The ring network is the most widely used network for SDH transmission networks.

:h
In such a structure, any traffic between two adjacent nodes can be directly add/drop

e s
between them. For traffic between two non-adjacent nodes, we have to configure the

r c
add/drop traffic at the source node and the sink node. And the pass-through traffic in
u
between those two nodes must be created as well.
o

es
The ring network is highly survivable. The most obvious advantage of a ring network is its
R
high survivability that is essential to modern optical networks with large capacity. Thus, the

n g
ring network enjoys very broad applications in SDH networks.

r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-11

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Mesh networks are such communications networks in which many nodes are

:h
interconnected with each other via direct routes. In such topological structure, if direct

s
routes are used in the interconnection of all the nodes, this structure is considered as an
e
c
ideal mesh topology. In a non-ideal mesh topological structure, the service connection
r
u
between nodes that are not connected directly is established through route selection and
o
s
transiting via other nodes.
e

R
In a mesh network, no bottle neck problem exists. Since more than one route can be

g
selected between any nodes, when any equipment fails, services can still be transmitted
n
ni
smoothly through other routes. Thus, the reliability of service transmission is increased.
r
a
However, such networks are more complicated, costly and difficult to manage. Mesh
e
e L networks are very suitable for those regions with large traffic.

or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-12

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Tangent ring networks / Intersectant ring networks/ Not protection chain.

:h
In selecting a topological structure, many factors should be considered. For example, the

e s
network should be highly survivable, easy to configure, suitable to add new services, and

r c
simple to mange. In a practical communications network, different layers adopt different
topological structures.
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-13

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
The advantage of sub-network can simplify the big network, make it easy to maintenance.

s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-14

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The concept of sub-network is introduced in Huawei OptiX series equipment and network

:h
management systems in order to facilitate network topology management, security

s
management, tributary interface expansion, and traffic management.
e

r c
In practical applications, it simplifies the topology structure of complicated networks and
u
thus enables hierarchical management.
o
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-15

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-16

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-17

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
Modern society is getting more and more dependent on communications with the

:h
development of science and technologies, and so higher requirements to network security

s
are being brought forward. Thus the concept of survivable network comes into being. The
e
c
following will deal with the concepts of survivable network.
r
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-18

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Please pay attention to that the network can only restore services here. It cannot repair the

:h
failure in the network, which cannot do without human intervention.

e s
So there should have protection channels to carry over the services in the working

r c
channels. The first requirement for survivability of network is there should have protection
u
routes or standby routes.
o

es
A survivability also need something else. Nodes in the network must have the intelligence
R
to check out the failure occurred and inform corresponding units of doing relative

n g
protection operation. And the nodes also should have powerful cross-connect capability to

ni
implement the protection operation.
r

e a
For the survivable network, the protection object can be the physical or electronic.

e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-19

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-20

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Unidirectional traffic and bidirectional traffic are named regarding the traffic flow

:h
directions in the ring. A unidirectional ring means that traffic travel in just one direction,

s
e.g. clockwise or counter-clockwise. While in a bidirectional ring, traffic signals go in two
e
c
directions, one opposite to another.
r

ou
Protection modes can be divided into two kinds: 1+1 and 1:N. In 1+1 protection mode,

es
every working system is protected by a dedicated protection system. But in 1:N protection

R
mode, N systems share one protection system; and when the system is in normal operation,

g
the protection system can also transmit extra traffic. Thus a higher efficiency can be
n
ni
obtained than that of 1+1 system.
r

e a
For multiplex section protection ring, traffic protection is based on multiplex section.

e L Switching or not is determined by signal qualities of the multiplex section between each

or
span of nodes.

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-21

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The network has two channels (two pairs of fibers): working (active) channel and

:h
protection (standby) channel.

e s
When the network is normal (i.e. no failure on working channel), working channel is used
to transport the traffics.
r c

ou
When the working channel is failed, use the protection channel.

es
Linear Multiplex Section (MS) protection is one of multiplex section protections. Linear
R
multiplex section protection switching can be a dedicated or shared protection mechanism.

n g
ni
It protects the multiplex section layer, and applies to point-to-point physical networks. One

r
protection multiplex section can be used to protect the normal traffic from a number (N) of
a
e
working multiplex sections. It cannot protect against node failures. It can operate in a

e L unidirectional or bidirectional manner, and it can carry extra traffic on the protection

or
multiplex section in bidirectional operation.

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-22

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :
Source node: concurrent sending
t t
:h
Sink node: selective receiving

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-23

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Out of 1+1 linear multiplex section protections, some modes require APS protocol during

:h
the switching process, some dont require. For 1 1 unidirectional switching, the signal

s
selection is based on the local conditions and requests. Therefore each end operates
e
c
independently of the other end, and bytes K1 and K2 are not needed to coordinate switch
r
action.
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-24

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
When the network has no failure, N working channels can transmit the normal traffic while

:h
the protection channel transmits extra (unimportant) traffic or it transmits no traffic.

e s
Suppose the fiber from NE A to NE B of the working channel 1 is broken. NE B detects

r c
R_LOS alarm and sends a request to NE A to switch the services on the failed channel to
the protection channel.
ou

es
Upon receiving the request, NE A bridges the service on the failed channel to the
protection channel.R
n g
ni
NE B get the information from NE A and switch to select the service from the protection

r
channel.
a

L e
NE A switches to select the service from the protection channel. This step completes the
switching of the service on the faulty channel to the protection channel for both directions.
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-25

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
When the working channel 1 repaired, the _RLOS alarm disappears. NE B sets the K1 byte

:h
to Wait-To-Restore (WTR) state. If WTR state lasts for a special time (10 minutes by

s
default), it switches to select the signal from the working channel and sends No Request
e
c
signal to the NE A using K1 byte.
r

ou
NE A releases the bridge and replies with the same indication on K1 byte. The selector at

es
the NE A is also released.

R
Receiving this K1 byte causes the NE B to release the bridge. This step completes the

n g
protection recovery.

r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-26

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In 1+1 protection mode, every working system is protected by a dedicated protection

:h
system. But in 1:N protection mode, N systems share one protection system; and when the

s
system is in normal operation, the protection system can also transmit extra traffic. Thus a
e
c
higher efficiency can be obtained than that of 1+1 system, but a more complicated APS
r
u
protocol is needed. This protection mode mainly protects the normal traffic in case optical
o
s
cable of the working multiplex section is cut off or multiplex section performance degrades.
e
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-27

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
Answer
t t
:h
Linear 1+1 MS
Linear M:N (M=1)
e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-28

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In OSN networking application, there is no PP ring. But when we need to create a

:h
protection sub-net when using the NMS T2000.

e s
The protection switching principle of two-fiber bidirectional path protection ring is

r c
basically the same as that of unidirectional path protection ring, except that in two-fiber
u
bidirectional path protection ring, the route of receiving signals is consistent with that of
o
sending signals
es

R
Two-fiber unidirectional MS dedicated protection ring is composed of two fibers. Working

n g
channels and protection channels are carried over different optical fibers. Of course, fiber

ni
P1 can be used to carry extra traffic when not used for protection. The two-fiber
r
a
unidirectional Multiplex Section dedicated protection ring is seldom used in actual
e
e L applications since it has no advantages over either the two-fiber unidirectional path

or
protection ring or two-fiber bidirectional multiplex section shared protection.

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-29

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The orderwires can be passed through used the backboard in the dual slots

:h
When we are facing the sub-rack, the left hand side is the West line board, the right hand
side is the East line board
e s

r c
The W was used for the source node

ou
The E was used for the sink node
s

Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-30

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
On each fiber, half the channels are defined as working channels and half are defined as

:h
protection channels. The normal traffic carried on working channels in one fiber are

s
protected by the protection channels in another fiber traveling in the opposite direction
e
c
around the ring. This permits the bidirectional transport of normal traffic. Only one set of
r
u
overhead channels is used on each fiber.
o
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-31

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
For example, a STM-16 system shall assign #1--- #8VC4 as the working channels, #9---#16

:h
as the protection channels. One fiber of #9---#16 are to protect #1---#8 of another fiber.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-32

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
For two-fiber bidirectional multiplex section protection rings, as their traffic have uniform

:h
routes and are sent bidirectional, time slots in the ring can be shared by all nodes, so the

s
total capacity is closely related to the traffic distribution mode and quantity of nodes on
e
the ring.
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-33

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
When a node determines that a switch is required, it sources the appropriate bridge

:h
request in the K-bytes in both directions, i.e. the short path and long path.

e s
The destination node is the node that is adjacent to the source node across the failed span.

r c
When a node that is not the destination nodes receives a higher priority bridge request, it
u
enters the appropriate pass-through state. In this way, the switching nodes can maintain
o
es
direct K-byte communication on the long path. Note that in the case of a bidirectional

R
failure such as a cable cut, the destination node would have detected the failure itself and

g
sourced a bridge request in the opposite direction around the ring.
n

r ni
When the destination node receives the bridge request, it performs the bridge and bridges

a
the channels that were entering the failed span onto the protection channels in the
e
e L opposite direction. In addition, for signal fail-ring switches, the node also performs the

or
switch to protection channels.

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-34

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
WTR: wait to restore
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-35

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
APS requests are also initiated based on multiplex section and equipment performance

:h
criteria detected by the NE. All the working and protection channels are monitored

s
regardless of the failure or degradation conditions (i.e. after a switch has been completed,
e
c
all appropriate performance monitoring is continued). The NE initiates the following bridge
r
u
requests automatically: Signal Failure (SF), Signal Degrade (SD), Reverse Request (RR), and
o
s
Wait to Restore (WTR). The bridge requests are transmitted from NE to NE (not from NMS
e
to NE).
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-36

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The APS controller is responsible for generating and terminating the APS information

:h
carried in the K1K2 bytes and implementing the APS algorithm. With the switching state of

s
each NE, the APS controller status is also changed.
e
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-37

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
For two-fiber bidirectional multiplex section protection rings, as their traffic have uniform

:h
routes and are sent bidirectional, time slots in the ring can be shared by all nodes, so the

s
total capacity is closely related to the traffic distribution mode and quantity of nodes on
e
c
the ring. The network capacity for two-fiber bidirectional multiplex section ring is
r
u
*M*STM-N (M is the number of nodes on the ring, STM-N is the STM level). If we count
o
s
the protection channels as well, the maximum traffic load that a two-fiber bidirectional MS
e
R
shared protection ring can carry is M*STM-N. Nevertheless, half of the traffic would not be

g
protected in case of fiber failures.
n
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-38

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Four-fiber MS shared protection rings require four fibers for each span of the ring.

:h
Working and protection channels are carried over different fibers: two multiplex sections

s
transmitting in opposite directions carry the working channels while two multiplex sections,
e
c
also transmitting in opposite directions, carry the protection channels. This permits the
r
u
bidirectional transport of normal traffic. The multiplex section overhead is dedicated to
o
s
either working or protection channels since working and protection channels are not
e
R
transported over the same fibers.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-39

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In the normal situation, the services will be transmitted on the working fibers

s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-40

n
/e
o m
ei.c
aw
u
g .h
ni n
ar
// le
p :

t t
When the fibers between two nodes broken, the switching will happen between these

:h
two nodes

e s
In the other sections, the services will be transmit on the original routes

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-41

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :

t t
When all the fibers between two NEs broken, the ring switch happens

:h
All the services will go to the protection fibers

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-42

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
APS requests are also initiated based on multiplex section and equipment performance

:h
criteria detected by the NE. All the working and protection channels are monitored

s
regardless of the failure or degradation conditions (i.e. after a switch has been completed,
e
c
all appropriate performance monitoring is continued). The NE initiates the following bridge
r
u
requests automatically: Signal Failure (SF), Signal Degrade (SD), Reverse Request (RR), and
o
s
Wait to Restore (WTR). The bridge requests are transmitted from NE to NE (not from NMS
e
to NE).
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-43

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-44

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
For four-fiber bidirectional multiplex section protection rings, as their traffic have uniform

:h
routes and are sent bidirectional, time slots in the ring can be shared by all nodes, so the

s
total capacity is closely related to the traffic distribution mode and quantity of nodes on
e
c
the ring. The network capacity for four-fiber bidirectional multiplex section ring is M*STM-
r
u
N (M is the number of nodes on the ring; STM-N is the STM level). If we count the
o
s
protection channels as well, the maximum traffic load that a four-fiber bidirectional MS
e
R
shared protection ring can carry is 2*M*STM-N. Nevertheless, half of the traffic would not

g
be protected in case of fiber failures.
n
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-45

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
K1 bits 1-4 carry bridge request codes. K1 bits 5-8 carry the destination node ID for the

:h
bridge request code indicated in K1 bits 1-4.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-46

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
As network structures are becoming more and more complicated, the sub-network

:h
connection protection (SNCP) is the only traffic protection mode that can be adapted to

s
various network topological structures with a fast switching time.
e

r c
The protection mechanism of SNCP is similar to the PP ring. But for SNCP, the protection
u
function will be completed in the cross-connect unit not PDH unit.
o
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-47

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
As shown in the figure , SNCP uses the 1+1 protection mode. Traffics are simultaneously

:h
sent on both the working and protection sub-network connection. When the working sub-

s
network connection fails, or when its performance deteriorates to a certain level, at the
e
c
receiving end of the sub-network connection, the signal from the protection sub-network
r
u
connection is selected according to the preference selection rule. Switching usually takes
o
s
the unidirectional switching mode, thus it needs no APS protocol.
e
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-48

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-49

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The protection mechanism of SNCP ring is concurrent sending in the transmitting end and

:h
selective receiving in the receiving end.

e s
Here is a ring chain combination network with 5 nodes. The ring network is SNCP ring.

r c
Suppose that there have E1 services from node A to the end node of the chain. The

ou
services will concurrently sent to both working SNC and protection SNC. After passing

es
through subnetwork1 and subnetwork2 separately, they both reach node C. there is a
R
selector in node C, the SNC termination node. Normally, node C will receive the service

n g
from the working SNC, then pass through to the line unit in the chain.

r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-50

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
TU-LOM (HP-LOM): tributary unit loss of multi-frame, a consecutive of 2-10 frames of H4

:h
are not in the order of the multi-frame or have invalid H4 values.

e s
TU-LOP: tributary unit loss of pointer, a consecutive of 8 frames receives invalid pointers or
NDF.
r c

ou
HP-TIM: higher order path trace identifier mismatch, what J1 should receive is not

es
consistent with it actually receives, generating this alarm in this terminal.
R
HP-SLM: higher order path signal label mismatch, what C2 should receive is not consistent
g

ni n
with it actually receives, generating this alarm in this terminal.

a r
L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-51

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
If the signal failure recovers in any way, node C would switch back to receive services from

:h
working SNC after 10 minutes.

e s
10 minutes is the default restoration time. It can be set from 5 to 12 minutes.

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-52

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-53

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-54

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-55

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


OptiX SDH Networking and Self-Healing Protection P-56

n
/e
o m
ei.c
aw
u
g.h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-1

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
1. Architecture and Main Features of U2000 ... 3

:h
2. Directory Structure of U2000..19

e s
2.Main Functions of U2000 ....22

r c
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-2

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-3

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
Upon completion of this chapter, you will be able to:

:h
List 8 pieces of main functions of U2000.

e s
Describe the realization means of U2000

r c
Perform some basic operations of U2000.
u

s o
Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-4

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-5

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
This is the position figure of the U2000 in telecommunication management network

:h
(TMN). There are 5 layers of TMN as follows:

e s
Network element layer, whose management software is local craft terminal (LCT)

r c
Element management layer, which manages and configures individual NE as a
whole.
ou

es
Network management layer, which is used to manage a large scale or distributed
network. R
n g
ni
Service management layer, which supports integrated service operation

a rmanagement including service lease, bandwidth wholesale, VPN etc.

L e Business management layer, which provides the customer relationship capabilities

e that include billing, customer care, and service-level agreements. This layer is also

or primarily where internal business management applications share information with

M
external applications.
Traditional Operations Support Systems (OSS) contain three layers of management: (i) a
Business Management Layer, (ii) a Service Management Layer, and (iii) a Network
Management Layer. OSS is a part of business and operation support systems (BOSS).

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-6

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
The features of the U2000 are as follows:
t t
:h
The U2000 provides a unified platform for managing transport equipment, Access

e s
equipment, and datacom equipment (routers, switches, and security equipment),

r c
thus realizing integrated management on cross-domain equipment. In addition, the
u
U2000 breaks the restrictions of the vertical management mode and realizes
o
es
integrated management on the equipment at the network layer and NE layer.

R
The U2000 meets the network integration trend and can provide management

n g
schemes for multiple types of networking scenarios. With unified and consistent

r ni
GUIs, simple and convenient service deployment, and effective service monitoring

e a and assurance, the U2000 brings good user experience and greatly reduces

e L network operation and maintenance costs.

or
The U2000 is blessed by the good cooperation relationships between Huawei and
many mainstream OSS vendors. The U2000 can provide abundant NBIs and
M powerful NBI customization support, protecting user investment to the largest
extent.

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-7

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
The Characteristic of New Architecture
t t
:h
Core modules split from single Process to multi Process.

e s
E2E modules split mutil Process by service.

r c
NEs manager modules split independent NE manager.
u


s o
System stronger than before, single Process failed doesnt affect other Process.

Re
The advantages of the architecture: NE manager, E2E service management adopted

g
independent Process, which can support system distributed deployment and expended
n
ni
management capability smoothly.

a r
L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-8

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
The client of U2000 implement the workstation function (WSF) of TMN, by which the user

:h
can operate and manage any transaction on the network.

e s
The server of U2000 implement the operating system function (OSF) of TMN, save the

r c
network data, provide performs all kinds of management function on the network.

ou
The client and server of U2000 can be installed on PC or workstation. But it is

es
recommended to run the client on the Windows platform. The operating system and
R
database versions should be as follows:

n g
ni
UNIX operating system version on SUN workstation is Solaris 10 and the database

a rversion is Sybase 15.0;

L e PC operating system supports Windows Server 2003, while the database is


Microsoft SQL Server 2000 Standard.
e
or Linux operating system version is SUSE Linux 10 SP2 while the database is SYBASE

M
12.5.
Key features of U2000 architecture:
Excellent system structure;
Standard interfaces and high integration;
High efficiency and robustness.

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-9

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
TMN defines northbound interface (NBI) to be used in connecting upper level system

:h
while southbound interface (SBI) connecting lower level system or equipment.

e s
Corba (Common Object Request Broker Architecture) interface is one of the standard

r c
interfaces, by which U2000 can communicate with the NMS developed by other vendors

ou
SNMP (Simple Network Management Protocol) interface is one of the standard interfaces
used in the industry.
es
R
The U2000 communicates with transmission GNE by Qx/TL1 interface of TCP/IP protocol,
g

ni n
or OSI protocol interface.

a r
U2000 supports syslog protocol and radius authentication.

L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-10

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Datacom

t t Transmission Access

:h
ME SDH BSL
MA5200E/F/G, ME60 OptiX 155C, OptiX 155S, OptiX 1556/622, ISN8850/ESR8825
SIG
e s
OptiX 2500, OptiX 2500 REG MA5100V1
SIG9810/9820
SIG9800-server
r c OSN
OptiX OSN 500, OptiX OSN 1500, OptiX
MA5606T
MA5620E
Router
ou OSN 2000, OptiX OSN 2500, OptiX OSN MA5620G

es
NE40, NE80, NE40E, NE80E,
NE5000E, NE05, NE08NE08E,
2500 REG, OptiX OSN 3500, OptiX OSN
7500,OptiX OSN 9500
MA5626E
MA5626G
NE16E, NE20, NE20E
R MSTP MA5651

n g
AR18, AR19, AR28, AR29, AR46, OptiX Metro 100, OptiX Metro 200, OptiX MA5651G

ni
AR49 Metro 500, OptiX 155/622H(Metro 1000), MA5680T
Switch OptiX Metro 1000V3, OptiX Metro 1050, MD5500

a r
S8505, S8505E, S8508,
S8512,S8016,S6502, S6503,
OptiX Metro 1100, OptiX 155/622(Metro
2050), OptiX 2500+(Metro 3000), OptiX
Radium8750
UA5000

L e
S6506R, S6506, S5000, S5500,
S5600, S3000, S3500, S3900
Metro 3100, OptiX 10G(Metro 5000)
NG WDM
MA5105
MA5200E/F
e
or
S2000S2400,S2300, S3300, OptiX OSN 1800 OptiX OSN 3800, OptiX MA5200G
S5300, S9300,S7800E OSN 6800,OptiX OSN 8800 MA5300V1

M
PTN Metro WDM MA5600
PTN 910, PTN 912, PTN 950 OptiX Metro 6020, OptiX Metro 6040, OptiX MA5600T
PTN 1900, PTN 3900 Metro 6100, OptiX OSN 900 MA5605
Security LH WDM
Eudemon300, Eudemon500, OptiX BWS OAS, OptiX BWS OCS, OptiX
Eudemon1000/E, Eudemon8040, BWS OIS, OptiX BWS 320GV3, OptiX BWS
Eudemon8080/E, 1600G, OptiX BWS 1600G OLA, OptiX
Eudemon8160E,Eudemon200E_C, OTU40000
Eudemon200E_F Submarine
CX OptiX BWS 1600S
CX200, CX200C/D, CX300 RTN
CX380, CX600 OptiX RTN 605, OptiX RTN 610, OptiX RTN
620, OptiX RTN 910, OptiX RTN 950

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-11

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The U2000 evaluates the management capability of different hardware platforms according to the

:h
maximum number of managed equivalent NEs and the concurrently accessed clients.

e s
Currently, a set of U2000 can manage up to 15,000 physical NEs, 20,000 equivalent NEs, and 100

c
clients. This result is provided after tests are performed under a certain environment and can be
r
u
used to show the actual management capability of the U2000.

es
Number of IP equivalent NEs = Number of IP NEs of type 1 x Equivalent coefficient + ...... + Number

R
of IP NEs of type n x Equivalent coefficient

n g
NOTE: For example, in the case of 5 NE5000E NEs (equivalent coefficient 10), 200 S5300 NEs

ni
(equivalent coefficient 1.25), and 1,000 CX200 NEs (equivalent coefficient 0.625), the calculation

r
method is as follows: Number of IP equivalent NEs = 5 x 10 + 200 x 1.25 + 1,000 x 0.625 = 925
a

L e
The basic unit of the U2000 equivalent NE is OptiX Metro 1000.

e
The relation between the U2000 equivalent NE and the equivalent NE in each domain is as follows:

or 1 transport equivalent NE = 1 U2000 equivalent NE

M
4 IP equivalent NEs = 1 U2000 equivalent NE
The management scale of the U2000 is defined as follows:
Small-scale management scenario: 2,000 U2000 equivalent NEs
Medium-scale management scenario: 6,000 U2000 equivalent NEs
Large-scale management scenario: 15,000 U2000 equivalent NEs
Super large-scale management scenario: 20,000 U2000 equivalent NEs.

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-12

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Typical Software Requirement of HA
t t
s :h
OS& DB

r c e
U2000 V1R1 U2000 V1R2 U2000 V1R3

Remote HA
ou Veritas 5.0 MP3 Veritas 6.0

s
Solaris

Re
1: N HA Remote 1:N Cold backup

Windows

i n g Local HA Windows Cluster

r n
Linux Remote HA / Veritas 5.0 MP3

e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-13

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Centralize the administration of multifold service and equipments.

:h
Function as subnetwork management system, provide powerful capability in end-to-end
trail management.
e s

r c
Support several open external interfaces, such as CORBA, SNMP, and XML.

ou
NMS operation is independent of the operation system. Windows, Solaris and SUSE Linux
s

e
platforms are supported, on which the same operations are provided.
R

n g
Adopt the Client-Server structure;

ni
Provide Java-based graphical user interface with iLOG style in a structure of "tree on the

r
left and table on the right both for Windows and Unix platform.
a

L e
In the U2000, 3 in 1 View Filter makes the Fiber layer, Trail layer, and Protection layer in

e one view layer. That is to say, you can check the physical topology, server and service trail

or and protection view simultaneously in just one window, which dispenses with the switch

M of working windows. Different display condition can be set in the Filter Tree depends on
your factual requirement.

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-14

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The U2000 manages different function modules by using processes. After starting the

:h
U2000 server, you can view each process in the user interface of the System Monitor
client.
e s

r c
In the U2000, you can deploy the processes of the NE management service, network
u
service, and NBI service independently by the Network Management System Maintenance
o
Suite.
es

R
In the System Monitor client, you can also get the information of database, hard disk,

n g
component, log and server status.

r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-15

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
MSuite: The MSuite is a graphical maintenance tool developed for the Huawei iManager

:h
U2000 (U2000), a type of Huawei network product. The MSuite is used to debug,

s
maintain, and redeploy the U2000.
e

r c
The NMS maintenance suite focuses on functions of adding and deleting instances, and
u
backing up and restoring the information about deployed instances and subsystems,
o
es
installing and uninstalling the subsystems, NBI configuration.

R
The MSuite can also backup, restore and initialize the database.

n g
ni
The entrance for the NMS maintenance suite:

a rLogin the MSuite client. The default user and password are both admin.

L e
e
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-16

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The license file is used to control the functions and resources of the U2000. If the license

:h
file is unavailable, some U2000 processes can not start and the functions of the U2000 are
limited.
e s

r c
The menu to check license information is Help-> License Information for U2000
V100R002.
ou

es
The menu to check license information is Help--> About --> License for U2000 V100R001.
Precautions R
g

ni n
The U2000 license file naming format is: licenseXXXXXXX.dat.

a rOne license file corresponds to the MAC address of a network interface card in an

L e NMS computer and can be used only on the corresponding computer.

e For a server with multiple network interface cards, you need to apply for the

or

license of only the primary network interface card of the U2000.


Do not make any change to the license file. Otherwise, the license becomes invalid.
The license control items vary according to the versions of the U2000. When you
fill in the application form, use the template that matches the intended version of
the U2000.
The license folder contains only one license file in the U2000\server\etc\conf\license
directory of the U2000 V100R002.
The license file path is U2000\server\license for U2000V100R001.

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-17

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
Upon completion of this chapter, you will be able to:

:h
List 8 pieces of main functions of U2000.

e s
Describe the realization means of U2000

r c
Perform some basic operations of U2000.
u

s o
Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-18

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
You can get the document folders as the figure shows above after the U2000 is

:h
successfully installed on your computer (Maybe a little difference):

es
Directory Description
client
r c U2000 Client

u
log U2000 client log
lib
s o U2000 client files
patch

Re
sysmoni
U2000 patch and information
U2000 sysmonitor files

g
version
n
U2000 client version information

ni
common Third party software

a r tomcat Tomcat

e
SVG SVG view software

e L server
notify
U2000 Server
Remote Notify Service

or cau CAU

M
uninstall Uninstall

Tips:
The installation of the folders is optional which depends on the practical
requirement.
Drawings and reports are saved in U2000\client\report by default.
There are HWENGR and HWNMSJRE folders in root path or C disk after
installation.

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-19

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
Directory
:
Description
p
server
t t U2000 Server

:h
3rdTools Third Party Tools
bin

e s Execute Files, such as U2000 start/stop script

c
etc Configure Files
conf
ur Configure Files of iMAP Platform
license
s o U2000 License

e
conf Configure Files of U2000 System
log
R U2000 log

g
svc_profile.sh

n
The ENV setting script of U2000

ni
var Output data of U2000 running time

r
backup

a
Data backup

e
broadcast Running time data of broadcast

e L dbdata Database temp data

or
fm Running time data of fault subsystem
useful
The logs U2000
link of U2000 (The installation path is D:\ log for iMAP platform
as example.)

M tools
U2000server Tools
D:\U2000\server\bin\startnms.bat

D:\U2000\server\bin\stopnms.bat
U2000sysmonitor D:\U2000\client\startup_sysmonitor_global.bat
U2000client D:\U2000\client\startup_all_global.bat
Msuiteclient C:\HWENGR\engineering\startclient.bat
Msuiteserver C:\HWENGR\engineering\startserver.bat

C:\HWENGR\engineering\stopserver.bat

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-20

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
Upon completion of this chapter, you will be able to:

:h
List 8 pieces of main functions of U2000.

e s
Describe the realization means of U2000

r c
Perform some basic operations of U2000.
u

s o
Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-21

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-22

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Tips:
t t
:h
Please accustom yourself to often use the right click of the mouse and F1 key on

e s
the keyboard during the operation, you can get some useful shortcuts and help.

r c
Right click on different objectives can lead you to the entrances of many frequently
used operations.
ou

es
Using F1 key can make you get correlative help information or description in
R
different operation windows.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-23

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
In topology management, the managed equipment and their connection status are displayed in a

:h
topological view. The managed objects are organized in submaps and views. You can browse the

s
topological view to know the status of the entire network in real time.

r c
The U2000 provides the physical view, L2 view, RPR view, IP view, cluster view, and MPLS TE view.

u
Therefore, users can browse the required information in different views and also monitor and learn

o
s
information about the running status of the entire network.

Re
Function of Topological View

n g
An U2000 topological view consists of a navigation tree on the left and a view on the right. The

ni
navigation tree directly reflects the network hierarchy. The view displays the objects at different

r
coordinates in the background map.
a

L e
The topological view provides you with the following functions:

e
Add, delete, modify, cut, move to and paste a submap.

or Add, delete, modify, cut, copy, copy to, move to, and paste a topology node.


Zoom in or out on topological views.
Set a background map. You can know the position of an equipment node through its icon
in the background map.
Find topology objects globally. You can identify an object.
Provide a navigation tree through which you can quickly switch between views.
Provide the aerial view, print function, and filter function.
Support the custom view. You can define and organize different views according to the
actual requirements.

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-24

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The NE Panel displays the slots, boards, and ports of the subrack in different colors. You

:h
can check the legend (click the corresponding shortcut icon at the top of the NE Panel)

s
and get the status of the slots, board and ports. Most of the operations such as equipment
e
c
configuration, monitoring, and maintenance are performed in the NE Panel.
r
NE Status
ou

es
Verify Configuration
R
NE Time Synchronization
g

ni n
Synchronize Current Alarms

a r Browse Current Alarms

L e Clear Alarm Indication

e
or
Browse Performance
Refresh Board Status
M Backup NE Database to SCC
Tips:
There is an blank area at the bottom of NE Panel, when you left click on a board,
the corresponding information of the board is displayed.
Right click on the board and you can get the entrances of many frequently used
operations.

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-25

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
NE Explorer is the main operation interface of the U2000. For easy navigation, the NE

:h
Explorer window presents an expandable directory tree (Function Tree) in the lower left

s
pane. The configuration, management and maintenance of the equipment are accessed
e
here.
r c
NE functions include:
ou
Configuration
es
Alarm R
g

ni n
Performance

a rCommunication

L e Security

e
or
ASON (Automatic Switched Optical Network)
Board functions include:
M Configuration
Alarm
Performance

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-26

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
For this course, we take a window of SDH service configuration as an example, which is

:h
applied to the following scenarios:

e s
Create SDH service in Single Station method.

r c
Query and maintain the cross-connection of a single station.

ou
Tips: The cross-connection created in End-to-End Trail method is still displayed in this
s

interface.
Re
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-27

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In the Overhead Management, you can query and configure the overhead bytes including

:h
J0, J1, J2, C2 and Overhead Termination.

e s
This operation is commonly applied to interconnecting with the equipment provided by a
third party.
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-28

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
You can configure the parameters of each boards including interface boards. U2000

:h
provides the parameters configuration such as loopback, service load, laser switch etc,

s
which are important and helpful to maintenance work.
e

r c
Tips: Generally speaking, the parameters of Ethernet board should be changed based on
u
different services, while other cards, the PDH board and SDH board, for example, can
o
es
work in the default configuration.

R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-29

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
This operation is mainly applied to NE communication. The function sub-tree includes:

:h
Communication Parameters
ECC Management
e s
OSI Management
r c
u

Access Control
s o

Re
NE ECC Link Management

n g
DCC Management

r ni
IP Protocol Stack Management

e

a Inband DCN System Management

e

L Tips: You can check the communication parameters, NE ECC channels and DCC

or
parameters when the NE communication malfunction happens caused by faulty ECC,
which is helpful to allocate and solve the problem.
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-30

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
You should create the protection subnet according to actual network protection demand

:h
before the service configuration.

e s
Protection subnet management supports protection subnet search, browse, creation and
maintenance.
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-31

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In this user interface, you can maintain and manage protection subnets such as starting or

:h
stopping the MSP protocol, protection switching, or checking the protection status. There

s
would be some slight change during the operation for different protection subnet type.
e

r c
Tips: Before MSP testing, you can perform exercise switching to check if the APS protocol
can normally work.
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-32

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In the Clock View, you can create a virtual clock device, create a virtual clock link, search

:h
for clock links.

e s
Virtual clock devices and virtual clock links are for the third party equipments

r c
which U2000 cant manage.

ou
Searching for clock links: You can search for clock links of NEs network-wide to

es
learn the clock tracing relationships between NEs. In this function, you can specify
R
the search scope based on the NE or clock link types, which including 1588v2,

n g
SDH, PON, Synchronous ETH.

r ni
The broken line represents clock priority configuration, while the real link represents the

e a
current synchronization status

e
L Caution: There should be no clock trace loopback or clock ring in normal SDH network.

or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-33

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In the user interface of DCN Management, you can assign the gateway NE for NEs, which

:h
ensures the DCN connectivity.
DCN protection includes:
e s

r c
Automatic switch of Gateway NE. You can assign one primary and three standby
GNEs at most.
ou

es
Configure the Revertive Mode for switch.
R

n g
Configure GNE type and IP address.

ni
NE connectivity test.

a rQuery the NEs connected with the GNE in DCN management interface.

L e
In GNE management interface, you can take a view of GNE attributes, modify GNE IP

e
or
address, and test GNE connectivity.
NSAP (Network Service Access Point) address is used for OSI protocol while the TSAP
M (Transport layer Service Access Point) is the protocol port of OSI protocol.
An NE and GNE can be converted each other.
Cautions: The recommended number of non-gateway NEs (including non-gateway NEs
that connects to the GNE by using the extended ECC) that connect to each GNE is fewer
than 50. Do not connect more than 60 non-gateway NEs to a GNE.

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-34

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
U2000 supports powerful E2E functions for transmission network:

:h
SDH E2E
Ethernet Service E2E
e s
WDM E2E
r c
u

RTN E2E
s o
ASON E2E
Re

n g
Hybrid MSTP E2E

r ni
The E2E functions are controlled by the license file.

e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-35

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
The U2000 provides a powerful and flexible trail creation function for SDH, Ethernet, ATM,

:h
WDM, etc. In this SDH trail creation interface, for example, you can allocate timeslot,

s
protection priority strategy and resource usage strategy for the service trails. The service
e
c
route can also be automatically calculated by system or be manually assigned via the
r
u
Route Constraint function.
o

es
The U2000 supports the service granularities based on VC12, VC3, VC4, VC4-4C, VC4-8C,

R
VC4-16C, and VC4-64C. The VC4 server trail must be created before the VC12 and VC3

g
services configuration.
n

r ni
The Trail Creation can avoid the discrete services.

e a
Tips: During a new deployment of the equipment, certain alarms that are reasonable but

e L meaninglessly occur. For example, when you configure an SDH trail without the physical

or
connection of cables, the corresponding LOS alarm is generated. If the Alarm Reversion is
checked, the alarm will not be displayed. This does not affect the network monitoring
M performed by maintainers. The alarm reversion is unavailable for VC4 server trail.

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-36

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The Trail Management interface comprises four parts: part A is the table of trails, part B is

:h
the function buttons area, part C is the detailed trail route area, and Part D is the graphic
area.
e s

r c
In this user interface, you can set filter criteria for trail display, check the status of the
u
service trail and correlative information, alarms or abnormal performance.
o

es
The U2000 supports the maintenance operation based on trails, such as alarm
R
supppression and alarm reversion, overhead bytes modification, loopback, etc. You can

n g
also export the table of trails and print out.

r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-37

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Entrance: Choose Service > Tunnel > Create Tunnel from the main menu.

:h
OptiX equipment supports the MPLS tunnel, which is a tunneling technology using the

e s
MPLS-protocol-based encapsulation.

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-38

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Entrance: Choose Service > Tunnel > Manage Tunnel from the main menu.

:h
You can view the VPN service carried on a Tunnel.

e s
You can view the topology of a Tunnel.

r c
You can view the performance and alarms of a Tunnel.
u


s o
You can monitor the running status of a Tunnel.

Re
You can diagnose a Tunnel by performing the LSP ping and LSP tracert tests.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-39

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Entrance: Choose Service > PWE3 Service > Create PWE3 Service from the main menu.

:h
You can create a CES PWE3 service tunnel for transmitting TDM signals in trail

e s
configuration mode. By using the trail configuration mode, you can directly configure the

r c
source and sink nodes of a CES service and the PW attributes on the GUI of the U2000. In
u
this manner, the CES service can be created quickly.
o
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-40

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Entrance: Choose Service > PWE3 Service > Manage PWE3 Service from the main menu.

:h
You can view the service topology of a PWE3 service, learn the topology structure and

e s
running status of the service in real time.

r c
You can also monitor the performance and alarm of a PWE3 service.

ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-41

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
U2000V1R5 supports quick PID service configuration.

:h
Search and automatic creation of OCH trails

e s
PID service configuration

r c
U2000V1R5 supports quick OTN service configuration.
u


s o
Service package configuration

Re
Cross-layer service creation, modification and replication

n g
One-station configuration

r ni
U2000V1R5 supports centralized trail maintenance.

e

a Centralized information displays in GUIs, including alarms, optical power, MCA

e L spectrum analysis data, bit errors, etc

or
Automatic analysis of fault location on trails, improving troubleshooting efficiency


U2000V1R5 supports the trail configuration of ODUflex service.
U2000V1R6 supports the trail configuration of 40G/100G coherent boards.

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-42

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In alarm management, you can monitor network exceptions in real time. It provides

:h
various management methods such as alarm statistics, alarm identification, alarm

s
notification, alarm redefinition, and alarm correlation analysis so that the network
e
c
administrator can take proper measures to recover the normal operation of the network.
r

ou
The U2000 supports the powerful fault management function which helps us for the

es
routine maintenance, most of the operation such as fault browse, alarms synchronization,

R
etc, are implemented by this function.

n g
Alarms browse is the important operation for routine maintenance.

ni

a r
Choose one piece of the alarms and right click, you can check the Alarm Affected Trails

L e
and Alarm Affected Customers, you can also remove the faults with the of Fault
Diagnosis wizard.
e
or
Choose one piece of the records, you can get the alarm details and handling suggestion,

M
which is helpful to deal with the faults, click the link you can get more detailed help.

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-43

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In the interface of Fault>Settings> NE Alarm/Event Config, you can set alarm severity,

:h
automatic reporting, and alarm suppression status and apply an alarm attribute template
to NEs, subnet and boards.
e s

r
Explanation for the Status
c

ou
Report: Alarm detected by NE is reported to the NMS.

es
Not Report: The alarm detection is still carried on by NE, but not reported to the
NMS. R
n g
ni
Suppressed: Detected alarm is suppressed and the NE does not monitor the

a rsuppressed alarm anymore.

L e Not suppressed: Vice versa.

e Caution: The system usually works with the default Alarm Attribute which cannot be

or

modified, but you can modify and save it as another template and apply it to NEs, subnet

M and boards.

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-44

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
Alarm management mainly includes the following operations:

:h
Customizing Alarm Template
Synchronizing Alarms
e s
r c
Monitoring Network Alarms
u


s o
Handling an Alarm

Re
Setting the Alarm Auto Processing

n g
Setting the Alarm Filtering

r ni
Setting Audible and Visual Alarm Notification

e

a Setting Alarm Remote Notification

e L Analyzing the Root Alarm of a Fault

or
Dumping Alarms or Events


Suppressing Alarms
Setting Alarm Reversion
Setting Automatic Alarm Reporting
Modifying Alarm Severity
Diagnosing Faults
Alarm Time Localization

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-45

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The U2000 supports the powerful performance management function which helps us for

:h
the routine maintenance, most of the operation for alarms are implemented by this
function.
e s

r c
Performance browse is the important operation for routine maintenance. You can check
u
the current and history performance data, UAT events and performance threshold
o
es
crossings record in the browse window, you can also select the options in the frame of

R
Performance Event Type to get the performance information that you expect.

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-46

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The U2000 can monitor the key indexes of a network in real time, and provide statistics on

:h
the collected performance data. It provides a graphical user interface (GUI) to facilitate
network performance management.
e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-47

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Management on physical inventories, fibers and cables, fiber and cable pipes, link

:h
resources, and interface resources.

e s
Physical Resource
r c
ou
Telecommunications Room
s

Rack
Re
NE
n g
ni
Shelf

a rBoard

L e Port
e
or
Slot

M Fiber/Cable

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-48

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
The U2000 provides the inventory management function that allows you to query and

:h
collect statistics on physical and logical resources.

e s
Logical Resource
r c
Connection
ou
s

Gateway
Re

n g
Virtual Local Area Network (VLAN)

ni
Multicast

a rQuality of service (QoS) and access control list (ACL)

L e Protocol
e
or
Link


Link group
Interface Resource

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-49

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
For convenient information browse and management, U2000 supports the following main

:h
reports:
Project Document
e s

r c
Clock Tracing Diagram

ou
s
Networking Diagram

Re
Timeslot Allocation Diagram

n g Board Manufacturer Information

ni

r
SDH Report

e a Port Resource Report

e L Statistics Report of SDH Tributary Port Resources

or

Lower Order Cross-Connection Statistics Report


M Microwave Report

Microwave Link Report

Microwave License Capacity Report


WDM Statistics Report

WDM Protection Group Switching Status Report

WDM NE Master/Slave Subrack Info Report

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-50

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The security management function includes authentication, authorization, and access

:h
control, to ensure that users can perform operations according to their respective
authorities. The U2000 adopts an authority-based and domain-based security

e s
management policy, and a security mechanism including access control and encrypted text

r c
transmission. This ensures the security of the U2000 system and the transport network
data.
ou

es
Authentication ManagementSupport NM user authentication and NE security
management.
R

n g
Authority Management: Support authority management of NM user and remote

ni
maintenance user.

a rNetwork Security Management: Support the Security Socket Layer (SSL) protocol

L e and encrypting the user name and password that are used to log in to an NE
System Security Management: Support monitoring system status and user login
e

or
management.
Log Management: Support the log operations query and log events restoration.
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-51

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Security management function
t t
:h
User Management
User Group Management
e s
r c
Operation Set Management
u


s o
Access Management

Re
Equipment Set Management

n g
Security Policy Management

r ni
Client Lockout

e

a ACL

e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-52

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
Database management includes the management of NE and U2000 databases. To ensure

:h
data security, you need to back up the database periodically.

e s
MSuite is a tool for U2000 database backup, restoration or initialization.

r c
You can backup or restore the U2000 network configuration data by importing or

ou
exporting script files through U2000 client.

es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-53

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The U2000 provides SNMP, CORBA, FTP performance NBI and XML NBIs. The U2000 can

:h
be interconnected with different third-party NMSs flexibly through NBIs, to provide the

s
information about physical inventory and alarms to the upper-layer NMSs.
e
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-54

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
If the U2000 needs to be accessed to the upper-level network management system, the

:h
corresponding northbound interface such as CORBA, XML, and SNMP northbound
interfaces should be configured.
e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-55

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Answers:
t t
:h
NEL, EML, NML, SML, BML.

e s
Q3, XML, SNMP, CORBA, TXT interfaces

r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-56

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


iManager NMS system introduction P-57

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-1

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
1 Basic Concepts.................................................................................. Page 3

s :h
2 Ethernet Service Classification............................................................Page 9

r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-2

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
Reference:
t t

s :h
ITU-T Recommendation G.8011/Y.1307

c e
ITU-T Recommendation G.8010/Y.1306
r

ou
ITU-T Recommendation G.7041/Y.1303 (GFP)

es
ITU-T Recommendation G.7042/Y.1305 (LCAS)
R

n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-3

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The basic concepts about Ethernet over SDH (EOS) will be mentioned in chapter 1

:h
including External port, VCTRUNK, Tag attribute etc.


e s
Chapter 2 is the introduction of Ethernet service classification, the definitions, applications

r c
and related functions of Ethernet services will be described.

ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-4

n
/e
o m
ei.c
aw
u
g .h
ni n
ar
//le
p :

t t
For OptiX Ethernet unit, we mainly focus on L2. VLAN (Virtual local area network) is used

:h
to isolated different Ethernet signals which are carried by the same physical link, for
example the same port or VCTRUNK.
e s
r c
Frame structure of IEEE 802.1Q frame (VLAN)
u

s o
DA
6
SA

R
6
e PT= 0X8100
2
VLAN
2
Ethernet Data
N

n g
r ni
e a
e L
or
The protocol type (PT) of IEEE 802.1Q frame is 0X8100, it is the identification of
the signal;
M In two bytes VLAN label:

Priority 3 bits, 0~8 levels;

CFI 1 bit, Token-Ring encapsulation;

VLAN ID 12 bits, the range of VLAN ID is 0~4095.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-5

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Port is the external physical port of Ethernet unit. For example, in the front panel of EFS4

:h
there are four external physical ports (RJ45).

e s
The working modes of the FE external port are Auto-negotiation, 10Mbps
c

r
(Half/Full duplex) and 100Mbps (Half/Full duplex);
u

s o
For GE optical port the working modes are Auto-negotiation and 1000Mbps Full
duplex.
Re

n g
For 10GE optical port the working modes are 10GE Full duplex LAN (10.3125

ni
Gbit/s) and 10GE Full duplex WAN (9.953 Gbit/s).

a r
VCTRUNK is the logical internal port. One Ethernet unit provides several VCTRUNKs
e

e L
connect with XCS unit.

or
VCTRUNK is built by VC (virtual container), for example if we bind five VC12 into

M
one VCTRUNK the rate of SDH side is around 10Mbps (2Mbps*5);

Normally virtual concatenation (VCAT) technology is used to bind VC into


VCTRUNK. VCAT is much more flexible than contiguous concatenation (CCAT), all
of the members status can be monitored by Ethernet unit. If some of the members
are failed, the LCAS (link Capacity Adjustment Scheme) function executes the
bandwidth adjustment immediately without service interruption, however CCAT
can not provide this function, all of the bandwidth will be unavailable when
member failure in one group.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-6

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
FE or GE signal is accessed by external port then the GFP-F encapsulation protocol will

:h
adopt the Ethernet signal to VCTRUNK.


e s
Two types of GFP encapsulation protocols:

r c

ou
GFP-F (Frame-mapped GFP)

es
For Ethernet service, e.g. FE/GE.

R
GFP-T (Transparent GFP)

n g
ni
For SAN (Storage Area Network) service, e.g. ESCON/FICON/Fiber

r
channel.

e a
Both of the external and internal ports can process Tag flag.

e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-7

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
//le
p :

t t
All of the EFGS series boards can process the Tag flag.

s :h
Tag flag is used to identify the type of frames:

c e
Tag frame: Signal contains VLAN;
r

ou
Untag frame: Signal doesnt contain VLAN.

es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-8

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Most of the Ethernet boards provide three types of tag attributes: Tag aware, Access and

:h
Hybrid. But some of the boards in Metro series can not provide Hybrid, e.g. ET1.

Thought:
e s
r c

ou
The VLAN ID of the frame accessed from the external port is 10, please fill the

s
blanks. If the frame doesnt contain VLAN ID please fill with -.
e
R
i n g

rn
Board

ea
Port VCTRUNK

e L Port types Port VCTRUNK

or
s s
Tag Tag VID VID
PVID PVID
attribute attribute
M
Board

EFS0 Access 11 Access 12

EFS4 Tag Access 12

Hybrid 10 Hybrid 10
EGS2
Tag Hybrid 12

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-9

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-10

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-11

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
From ITU-T recommendation:
t t
EPL: Ethernet Private Line
s :h

c e
Feature: Point to point transmission without sharing.
r

ou
EVPL: Ethernet Virtual Private Line

es
Feature: Point to point transmission with port or VCTRUNK sharing.

R
EPLAN: Ethernet Private LAN

n g
ni
Feature: Multi-points to multi-points transmission without sharing, based

r
on L2 switching.

e a
EVPLAN: Ethernet Virtual Private Line

e L Feature: Multi-points to multi-points transmission with port or VCTRUNK

or
sharing, based on L2 switching;
Bandwidth utilization ratio is low.
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-12

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
In the case of EPL services, a bandwidth is exclusively occupied by the service of a user and

:h
the services of different users are isolated. In addition, the extra QoS scheme and security
scheme are not required.
e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-13

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Services A & B access with different external ports then cross-connect to different

:h
VCTRUNKs.


e s
Point to point transmission without sharing, it provides the low latency and high security

r
point to point transmission.c
ou

es
The bandwidth for customers can be guaranteed, the max. bandwidth of point to point
EPL depends on the bandwidth of VCTRUNK.
R

n g
Application: Private line for VIP user for example bank and government private line.

r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-14

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
If the resource of port or Vctrunk is not enough, different users should share the same

:h
port or Vctrunk. Hence, VLAN ID division/MPLS/QinQ technology should be adopted to
isolate different services.
e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-15

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
In ITU-T the V of EVPL stands for sharing. Share the external port or VCTRUNK with

:h
different VLAN ID, MPLS label or S-VLAN.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-16

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Service which is from the headquarters have to be transmitted to different department.

s :h
Services access by NE 1will be transmitted by the same external port then cross-connect to

r c e
different VCTRUNKs, these two services are isolated with different VLAN ID.

ou
Different customers occupy different VCTRUNK, the bandwidth of VCTRUNK can be
guaranteed.
es

R
More than one customers share with one external port, so we should control the

g
bandwidth allocation of this external port.
n

r ni
For example two customers share with one FE port, if one customer use 90%

e a bandwidth of the FE port then another one just can use 10%.

e L Normally we use CAR (Committed Access Rate) function to solve the problem.

or
We can manually configure the committed information rate (CIR) for each of

M
customer.

Application: the quantity of external port is limited, if the external ports are not enough
then we can try to implement the port shared EVPL service.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-17

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
Services A & B access with different external ports then cross-connect to the same

:h
VCTRUNKs, these two services are isolated with different VLAN ID in the same VCTRUNK.


e s
Different customers occupy different external ports, the bandwidth of external port can be
guaranteed.
r c
ou

es
More than one customers share with one VCTRUNK, so we should control the bandwidth
allocation of this VCTRUNK.
R

n g
For example two customers share with one VCTRUNK, if one customer use 90%

ni
bandwidth of this VCTRUNK then another one just can use 10%.

a r Normally we use CAR (Committed Access Rate) function to control the rate of
e

e L external port. We can manually configure the committed information rate (CIR) for

or
each of customer.

M Application: the max. bandwidth of VCTRUNK is limited, if the total bandwidth is not
enough then the VCTRUNK shared EVPL can be used (Different users should have different
VLAN ID).

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-18

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
The frame structure of MPLS:
t t
MartinioE Format
s :h
DA SA
c e
0x8847(0x8848 broadcast)

r
Tunnel VC Ethernet Data
6 6

ou 2 4 4 N

es
For the MartinoE encapsulation protocol totally 22 bytes add to the original frame;

R
The value of protocol type is 0x8847 for MPLS, this is the indication of MPLS;
g

ni n
Totally there are two labels in one MatinoE frame, Tunnel and VC, each of them is

a r 4 bytes. In the tunnel and VC there are 20 bits used as the label function. So the

L e available range of label is 16~(220-1), 0~15 is reserved by the system.

e
or
The port attribute of MPLS is P or PE:

PE: the edge of MPLS network, it is used to access the signal without MPLS;
M

P: the internal port of MPLS network;

The operation of PE and P ports:

PE->P (Ingress): Add MPLS label;


P->PE (Egress): Discard MPLS label;
P->P (Transit): Exchange MPLS label.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-19

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
When we configure the EVPL (MPLS) service, the default MPLS encapsulation is MartinoE.

:h
It provides two stackable labels Tunnel and VC;


e s
Different values of VC and Tunnel are used to isolate several Ethernet signal with the same
VLAN ID.
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-20

n
/e
o m
e i.c
aw
u
g.h
ni n
ar
// le
p :

t t
QinQ technology is a VLAN stacking technology, which conforms to the recommendation

:h
for S-VLAN in IEEE 802.1ad and is an expansion of VLAN technology.

Advantages of QinQ technology:


e s
r c

ou
Expands VLAN and alleviates VLAN resource insufficiency. For example, a VLAN

s
providing 4096 VLAN IDs can provide 4096 x 4096 VLANs after VLAN stacking;
e

R
Extends LAN service to WAN, connecting the client network to the carrier network

g
and supporting transparent transmission.
n

r ni
QinQ frame format:

e a
e L
DA SA TYPE(8100) S-VLAN TYPE(8100) C-VLAN Ethernet

or
(6B) (6B) (2B) (2B) (2B) (2B) Data

M Customer VLAN label, defined as C-VLAN;

Server layer VLAN label, defined as S-VLAN.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-21

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
t t
:h
From NE1 to NE2, traffic flow from Dept.A and Dept.B with the same C-VLAN-100, two

s
different S-VLAN be attached on the two access ports of NE1 separately, hence, the two

e
c
traffic flows can be transported in the same channel, on the destination site NE2, the two
r
u
S-VLAN tag be unloaded, to recover the original traffic.

o
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-22

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-23

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
EPLAN service can provide multi-point to multi-point transmission without sharing.

s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-24

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
EPLAN is based on L2 switching, so in NE2, 3, 4 we should manually configure the VB

:h
(Virtual bridge), it is the logical L2 lanswitch. So the traffic between NE2 and NE4 will be

s
forwarded by this VB, and its no need to configure the point to point VCTRUNK between
e
c
NE2 to NE4 any more. Also this solution can increase the bandwidth utilization ratio.
r
u
Compared with EPL service we need less point to point VCTRUNKs.
o
Thought:
es
R

n g
If NE3s VB is failed, what will happen to the EPLAN service?

r ni If NE3s VB is failed, then the LAN service will be interrupted, the VB in NE3

e a can not forward the data any more. Normally we should configure another

e L backup VB to prevent the VB failure. For example we could configure a


backup VB in NE1, and if NE3s VB is failed the traffic can still go through

or with NE1s VB.

M However, there is another problem which is called Broadcast storm. After


we configure 2 VBs in different NEs then loop occurs. STP (Spanning Three
Protocol) is used to solve this problem.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-25

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
VB is the logical L2 switch, it provides MAC address self-learning function.

s :h
MAC address self-learning function obviously improves the data forwarding efficiency.
How?

r c e

ou
There is a CAM table in the L2 switch. Initially the CAM table is empty, when the

es
port of L2 switch receives the frame it will broadcast the frame to all the other
ports, at the same time it records the source MAC address of the frame into the
R
g
CAM table. The CAM table records the relation between MAC address and port

n
ni
No.;

a rAfter the relation of MAC address and port is established, and the L2 switch will

L e forward frames based on the destination address.

e
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-26

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The working mechanism of VB is the same as L2 switch, the ports of this logical L2 switch

:h
are called LP.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-27

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The spanning tree protocol (STP) blocks certain ports to avoid the loop. Hence, this can

:h
solve problems.


e s
In addition, after being enabled, the STP logically modifies the network topology structure
to avoid broadcast storms.
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-28

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-29

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
EVPLAN Service can provide multi-point to multi-point transmission with sharing. In order

:h
to identify data from different users, VLAN/MPLS/QinQ technology should be adopted.

e s
r c
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-30

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :

t t
The MAC address self-learning and data forwarding of EPLAN service will be based on VB

:h
+ MAC address. Its no need to configure the VLAN filter table.

e s
UNI port type of SVL VB: Tag Aware and Access
c


ur
EVPLAN service forwards data through VB + MAC Address + VLAN/S-VLAN. The VLAN

s o
filter table is necessary.


Re
UNI port type of IVL VB: Tag Aware, Access and Hybrid

n g
Ingress Filtering:

ni

a rEnabled: The ingress filtering depends on the setting of the bridge switching mode.

L e When the bridge switching mode is set to IVL/Enable Ingress Filtering, the ingress

e
filtering is jointly enabled.

or Disabled: The ingress filtering depends on the setting of the bridge switching mode.

M When the bridge switching mode is set to SVL/Disable Ingress Filtering, the ingress
filtering is jointly disabled.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-31

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The configuration of EVPLAN (802.1q) service is quite similar with EPLAN service. The only

:h
difference is the VLAN filter table is necessary in EVPLAN (802.1q) service.


e s
IEEE 802.1q bridge supports isolation by using one layer of VLAN tags. It checks the

r c
contents of the VLAN tags that are in the data frames and performs Layer 2 switching

ou
according to the destination MAC addresses and VLAN IDs.

es
In NE 3, the LPs of VB is port 1, port 2, VCTRUNK 1 and VCTRUNK 2. Data forwarding will
R

g
be based on different VLAN ID.

n
Thought:
r ni
e a
Is it necessary to configure VB in NE 2 and NE 4? If no, what kind of service should

e L be configured in these two stations?

or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-32

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :

t t
The IEEE 802.1ad bridge supports data frames with two layers of VLAN tags. It adopts the

:h
outer S-VLAN tags to isolate different VLANs and supports only the mounted ports whose

s
attributes are C-Aware or S-Aware. This bridge supports the following switching modes:
e
r c
This bridge does not check the contents of the VLAN tags that are in the packets
u

o
and performs Layer 2 switching according to the destination MAC addresses of the
s
packets.
Re

n g
This bridge checks the contents of the VLAN tags that are in the packets and

ni
performs Layer 2 switching according to the destination MAC addresses and the S-

a r VLAN IDs of the packets.


L e
In this case, the VoIP services need to be isolated from the HSI services. User M does not

eneed to communicate with user N. Since the C-VLAN of VoIP and HIS service from user M

or and user N are the same, different S-VLAN should be assigned to isolated the services.

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-33

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-34

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-35

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
// le
p :
Thank you!
t t
s :h
r c e
ou
es
R
n g
rni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


Ethernet Services and Networking Applications Page-36

n
/e
o m
e i.c
aw
u
g .h
ni n
ar
//le
p :
t t
s :h
r c e
ou
es
R
n g
r ni
e a
e L
or
M

Confidential Information of Huawei. No Spreading Without Permission


The privilege of HCNA/HCNP/HCIE:
With any Huawei Career Certification, you have the privilege on http://learning.huawei.com/en to enjoy:
n
1e-Learning Courses Logon http://learning.huawei.com/en and enter Huawei Training/e-Learning
/e

o m
If you have the HCNA/HCNP certificateYou can access Huawei Career Certification and Basic Technology e-Learning
courses.
e i .c
If you have the HCIE certificate: You can access all the e-Learning courses which marked for HCIE Certification Users.

aw

Methods to get the HCIE e-Learning privilege : Please associate HCIE certificate information with your Huawei account, and

hu

email the account to Learning@huawei.com to apply for HCIE e-Learning privilege.


g .
2 Training Material Download
i n

arn
Content: Huawei product training material and Huawei career certification training material.

//le
MethodLogon http://learning.huawei.com/en and enter Huawei Training/Classroom Training ,then you can download
training material in the specific training introduction page.
p :
3 Priority to participate in Huawei Online Open Class (LVC)
t t

s :h
The Huawei career certification training and product training covering all ICT technical domains like R&S, UC&C, Security,

4Learning Tools: rc e
Storage and so on, which are conducted by Huawei professional instructors.

s o
eNSP Simulate single Router&Switch device and large network.

R e
WLAN Planner Network planning tools for WLAN AP products.

n g
In addition, Huawei has built up Huawei Technical Forum which allows candidates to discuss technical issues with Huawei experts ,

ni
share exam experiences with others or be acquainted with Huawei Products.

a r
Statement:
L e
r e
This material is for personal use only, and can not be used by any individual or organization for any commercial purposes.
o
M
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential 1

También podría gustarte