Академический Документы
Профессиональный Документы
Культура Документы
Huawei e-Learning
http://support.huawei.com/learning/NavigationAction!createNavi?navId=MW
000001_term1000025144&lang=en n
t io
Huawei Certification ica
tif
r
Ce
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_31
&lang=en &
ng
Find Training ini
ra
T
ei
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_trai
ningsearch&lang=en a w
Hu
More Information n
it o
i c a
r tif
Huawei learning APP Ce
&
g
n in
r ai
i T
e
a w
H u
ca
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Development history of optical transport networks: H u
In 1966, Charles K. Kao proposed the
o n theory of optical transmission.
ti equipment began to appear.
C
In the 1990s, synchronous digital hierarchy (SDH) emerged and was standardized by
the ITU-T, and& was widely deployed in the world.
g
n in1990s, the dense wavelength division multiplexing (DWDM) technology
In the late
withaai higher rate started to be constructed in large scale. The DWDM technology
a w investment costs.
H u
At the beginning of the 21st century, to increase the transmission capacity to Tbit/s
or even more than 10 Tbit/s and implement signal processing (such as the adding,
dropping, and multiplexing of optical signals and optical wavelength
conversion/switching) at the optical layer, the optical transport network (OTN)
technology was introduced and applied.
With the rapid development of data services and the requirements of all-IP networks,
the new packet transport network (PTN) technology that supports powerful data
service transmission has emerged and been applied.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Technical background of SDH emergence:
Hu
n
Fiber communications with inexpensive bandwidth features have become the
tio
ca
it fi
The traditional PDH transmission system no longer adapts to development of modern
communications networks.
e r
Limitations of PDH
C
&
Interface standards:
g
airate levels. They use different frame structures and multiplexing modes, which
European
r
T hinders interconnection.
ei
a w Worldwide standards for optical interfaces are absent. Vendors develop their
t
Optical interfaces use the scrambledanon-return-to-zero
n
frames/s, and the frame period is 125 μs. The frame is transmitted row by row.
Payload: it o
ca frame.
f i
ti
Carries service data in an STM-N
A path overhead (POH)r is added together with data blocks as part of the overhead to
e
detect damages toCservice data (low-rate signals) during transmission. That is, it
& performance monitoring, management, and control over low-rate
performs real-time
signals. n g
n i
i
a (SOH):
r
Section overhead
T used for operation, administration, and maintenance (OAM) to ensure proper
i
e and flexible transport of payload data.
Bytes
w
H ua Monitors the whole STM-N signal flow.
g
goods during transportation.
n whole STM-N signal flow. This means, section overheads monitor all
n ithe
ai in an STM-N carriage.
SOH: monitors
T r
goods packed
ua
structure.
H Multiplex section overhead (MSOH): monitors the information structure at the
multiplex section layer in an STM-N signal.
RSOH, MSOH, and POH implement monitoring functions in the descending order of
monitoring scope.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
AU-PTR: Hu
n
tio
It is used to locate low-rate signals in an STM-N frame (payload), that is, to make the
a
position of the low-rate signals predictable.
c
r it fi
When packing the signal into an STM-N payload, the transmit end adds AU-PTR to
e
indicate the position of the signal package in the payload. This is, the goods package
C
to be loaded into the carriage is given a position coordinate value.
&
ing
The receive end splits the required low-rate tributary signal from the STM-N frame
in
payload according to the AU pointer value. That is, according to the position
a
Tr
coordinates of the goods package, the required package is directly obtained from the
ei carriage.
H multiplexing. Therefore, you only need to locate the first goods package in the
carriage.
If the rate of the multiplexed low-speed signal is low, that is, the package after
packing is too small, such as 2M and 34M, level-2 pointer positioning is required. A
TU-PTR locates a small-sized package in a medium-sized package. An AU-PTR locates
a medium-sized package in a large-sized package.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H u
Multiplexing proceeds according to a specific multiplexing route selected by a country or
n
region from several routes specified by ITU-T.
it o
ca
G.707 – VC Type and Capacity
f i
VC Type
r ti VC Bandwidth VC Payload
e
C 1664 kbit/s
VC-11 1600 kbit/s
&
VC-12
i ng 2240 kbit/s 2176 kbit/s
VC-2 in
ra 6848 kbit/s 6784 kbit/s
i T
e
VC-3 48 960 kbit/s 48 384 kbit/s
&
The multiplexing route is 140M – C-4 – VC-4 – AU-4 – STM-1. Therefore, only one 140M
ng into an STM-1.
signal can be multiplexed
i
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
ua corresponding to 34M and
C-3 – container 3. It is the standard informationHstructure
implements the rate adaptation function.
n
it o information structure corresponding to C-3 and
ca 34M signals in real time.
VC-3 – virtual container 3. It is the standard
monitors the performance of the iloaded
f
rtistandard information structure corresponding to VC-3 and
TU-3 – tributary unit 3. It isethe
C positioning.
Therefore,
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
C-12 – container 12. It is the standard information ustructure corresponding to 2M and
n
implements rate adaptation. Four base frames form a multiframe.
it o information structure corresponding to 2M
ca
VC-12 – virtual container 12. It is a standard
f i
ti
and monitors a 2M signal in real time.
TU-12 – tributary unit 12. Iteisr the standard information structure corresponding to VC-12
and locates the first-levelCpointer of the VC-12.
&
TUG-2 – tributaryg
i n unit group 2; TUG-3 – tributary unit group 3.
n
Multiplexingi routes are 2M – C-12 – VC-12 – TU-12, 3 x TU-12 – TUG-2, 7 x TUG-2 – TUG-
3, and T
a
3 rx TUG-3 – VC-4 – STM-1.
ei sixty three (= 3 x 7 x 3) 2 Mbit/s signals can be multiplexed into an STM-1. The
H u 2M
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Answer: (B) Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The overhead function is used to monitor and manageu
H SDH signals layer by layer. The
n
monitoring can be classified into section-layer monitoring and path-layer monitoring.
it oregenerator section (RS) layer monitoring and
Section-layer monitoring is classified into
&
RSOH monitors the entire STM-16 signal, MSOH monitors any of the 16 STM-1 signals in
the STM-16, HPOH g monitors VC-4s in each STM-1, and LPOH further monitors any of the
T r
e i
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Section overhead (SOH) Hu
n
tio
A1 and A2 are framing bytes. These bytes are used to separate STM-N frames in a
signal flow.
ca
r it fi
J0 is a regenerator section trace byte. This byte is used to repeatedly transmit a
e
section access point identifier, so that the receive end can verify its continuous
C
connection to the specified transmit end.
&
ng
B1 is bit interleaved parity-8 (BIP-8). This byte is used to monitor bit errors at the
ni
i
regenerator section layer.
a
Trand E2 are orderwire bytes. These bytes are used to provide a voice channel for
E1
ei orderwire connections.
a w
H u F1 is a user channel byte.
D1 to D12 are data communication channel (DDC) bytes for OAM message
transmission.
B2 is a bit interleaved parity check Nx24 (BIP-N %24) byte, used for monitoring bit
errors at the multiplex section layer.
K1 and K2 (b1 to b5) are automatic protection switching (APS) channel bytes. These
bytes are used to transmit APS signaling.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The receive end locates and separates STM-N frames u
H from the information flow through A1
n
and A2, and then locates a low-rate signal in the frame through the pointer to find the
it o
frame header of the continuous signal flow.
T r
distinguished.
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
The NMS and gateway NE (GNE) are connectedH ua Ethernet cables and communicate
through
a t
c
The D1 to D12 bytes provide the igeneral data communication channel that can be accessed
f of the embedded control channel (ECC), this channel
i
r t
e
by all SDH NEs. As the physical layer
C
transmits operation, administration and maintenance (OAM) information between NEs to
form the transmission&channel of an SDH management network (SMN).
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Regenerator section bit error monitoring byte B1: u
H Monitors the regenerator section signal
n
flow in BIP8 even parity check mode.
Mechanism of the BIP8 even parity it ocheck: Check the corresponding bit column (bit
ca byte). If the number of "1"s is even in corresponding
f i
block) in the unit of 8 bits (one
column, the check result iis 0. If the number of "1"s is odd in corresponding column,
the check result is 1,e
t
asr shown in the following figure.
C
The working mechanism& of the B1 byte is described as follows:
i ngend performs a BIP-8 even parity check for the last scrambled frame
The transmit
in and places the check result in the B1 byte of the current frame (2#STM-
(1#STM-N),
N).ra
i T
e receive end performs a BIP-8 even parity check for the current unscrambled
The
w
ua
frame (1#STM-N), and performs the logical operation exclusive OR between the
H check result (B1') and the B1 byte in the next scrambled frame (2#STM-N).
If the obtained value is 0, no bit error block is generated. If the obtained value is not
0, the number of "1"s indicates the number of bit error blocks.
If the receive end detects B1 bit error blocks, it is reflected in the RS-BBE
performance event.
n
BIP24 even parity check mode.
Mechanism of the BIP24 even parity it o check: In the unit of 24 bits (3 bytes; each STM-
a
r ti
shown in the following figure.
The working mechanismC ofethe B2 byte is described as follows:
The transmit end& performs a BIP-24 even parity check for all the bytes but the RSOH
g
in the lastnunscrambled frame, and places the check result in the three consecutive
i
B2 bytesniof the current frame.
T rareceive end performs a BIP-24 even parity check for all the bytes except the
ei RSOH in the current scrambled frame, and performs the logical operation exclusive
The
a w OR between the check result (B2') and the B2 byte in the next scrambled frame.
H u If the obtained value is 0, no bit error block is generated.
If the obtained value is not 0, the number of "1"s indicates the number of bit error
blocks.
If the receive end detects B2 bit error blocks, it is reflected in the MS-BBE
performance event.
n
(B2) at the receive end, so that the transmit end can learn the bit error status at the receive
end. it o
i a For STM-4, the value range is (0, 96). For STM-16,
c24).
For STM-0/1, the value range is (0,
f
tithe signals with higher rates, the M0 and M1 bytes are used
r
e value range is (0, 1536). For STM-256, the value range is (0,
the value range is (0, 255). For
for counting. For STM-64, Cthe
6144). &
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
E1 bytes are used as orderwire bytes to implement u
H orderwire communication between
the
n
NEs A, B, C, and D. Because the terminal multiplexer (TM) processes RSOH and MSOH, the
regenerator REG regenerates signals and it oprocesses only the RSOH. Therefore, the E1 bytes
enable the orderwire communication
f i cabetween NEs A, B, C, and D.
ti orderwire byte, only NEs A and D can communicate with
If only the E2 byte is used as rthe
Be
each other, because NEsC and C do not process the MSOH or E2 byte.
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Automatic protection switching (APS) channel bytes:u
H K1 and K2 (b1 to b5)
o
Transmits APS signaling, enabling networkn self-healing.
ti
e r
C end generates the MS-AIS alarm when the received
b6 to b8 = 111: The local
& signal is all "1"s.
multiplex section
g
b6 to b8in
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
In an SDH optical transmission system, the S1 byte u
H used to transmit the quality and usage
is
n
information of clock sources. By using the byte information, the synchronization timing unit
can implement the automatic switchingio
a
table lists the information codes ofcthe
t S1 byte (b5 to b8).
protection function on clock sources. The following
t i fi
S1 (b5 to b8) S1 Byte r
e
SDH Synchronization Quality Level
C Synchronization quality unknown (existing
0000
&
0x00
synchronous network)
g
n 0x01
0001
i Reserved
0010
a in 0x02 G.811-recommended clock signal
0011T
r
e i 0x03 Reserved
ni
orderwire communications between paths.
i
a
Tr tributary unit (TU) position indication byte
H4:
Hu
K3 (b5 to b8): reserved byte
N1: network operator byte. This byte is used for a specified management purpose.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
When J1 byte mismatch occurs, an HP_TIM alarm u
H generated. In this case, services may be
is
n
interrupted. The processing mechanisms of different devices are different.
it oequipment is HuaWei SBS.
cathe channel access point identifier may be a 16-byte
The default J1 byte value of Huawei SDH
f i
ti
During network application in China,
E.164 numbering format orear64-byte free format code stream recommended by the CCITT.
C
At the border of an international network, only the 16-byte E.164 numbering format is
&
ng16-byte format will be repeated four times.
allowed. If the 16-byte format is transferred to the area with the 64-byte format for
i
inframe (that is, the path trace identification multiplexing frame PT) that
transmission, the
ra
T
The 16-byte
e i the E.164 number contains 16 J1 bytes, which have the same coding method as
transmits
a w of J0 bytes.
that
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
The B3 byte is used to monitor the bit error performance u of VC-4 transmission in STM-N
n
frames. The monitoring mechanism of B3 is similar to those of B1 and B2. However, B3
performs the BIP-8 check on VC-4 frames. it o
f i careceive end, the local performance monitoring event
ti
If a bit error block is detected at the
e r
HP-BBE (higher-order path background block error) displays the number of bit error blocks.
C
At the same time, the performance monitoring event HP-REI (higher-order path remote
error indication) of the&VC-4 path at the transmit end displays the number of bit error
blocks received n g
i at the receive end.
in of bit errors at the receive end exceeds a certain limit, the device reports
When theanumber
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H the multiplexing structure of the VC
C2 is the signal label byte, which is used to indicate
n
frames and the payload property. The transmitted C2 byte must match the C2 byte to be
received. When a C2 mismatch is detected, it o the corresponding VC-4 path at the local end
generates an HP_SLM alarm.
f i ca
i
Mapping between the servicerttypes and values of C2 bytes
Ce
&
g
Parameter Setting of the
Type of the Input Service
i n C2 Byte (Hexadecimal)
a in
TUG structure 02
r
T asynchronously mapped into a C-3
e i
34M/45M 04
H u Not loaded 00
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Bits 6 to 8 of the G1 byte are not used temporarily.u
H The value range of b1 to b4 in the G1
n
byte is 0 to 15. However, B3 can only detect a maximum of eight bit error blocks in a
frame. That is, values 0 to 8 of b1 to b4io
a
blocks are detected, and the othercseven
t values (9 to 15) are considered as bit-error-free
in the G1 byte indicate that only 0 to 8 bit error
t i fi
blocks.
e r
C when the AIS alarm indication signal or AU-AIS/HP-TIM/HP-
The HP-RDI alarm is reported
SLM/HP-UNEQ alarm& is generated.
g
n in
r ai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
LPOH
Hu
V5: path status and signal label byte
n
tio
J2: VC-12 path trace byte. This byte is used to repeatedly transmit a lower order path
a
c
it fi
access point identifier so that a sink can verify its continuous connection to a source
on a path. A 16-byte frame is defined in international specifications to transmit
e r
access path identifiers with the frame format identical to that of J0 byte.
C
N2: network operator byte. This byte is used for a specified management purpose.
&
ng
For example, it can provide tandem connection monitor (TCM) for lower-order paths,
i
which is similar to the function of N1 bytes on higher-order path overheads.
a in
K4: b1 to b4 are used to transmit the lower order path APS protocol. b5 to b7 are
Tr
used to transmit the enhanced RDI on lower order paths. Bit 8 is reserved.
ei
V5: path status and signal label byte (similar to G1 or C2 byte). It is the first byte located by
w
u a a TU-PTR in a multiframe and performs VC-12 bit error monitoring, VC-12 remote fault and
H
defect indication, and signal labeling.
Bits 1 to 2: allocated for lower-order path background block error (LP-BBE)
monitoring using the BIP-2 scheme
Bit 3: used for lower-order path remote error indication, LP-REI
Bit 4: used for lower-order path remote failure indication, LP-RFI. This bit is set to 1 if
a failure is declared. For V5 bytes in VC-12 and VC-2, this bit has not been defined.
Bits 5 to 7: signal label indicating path information. For example, it indicates whether
the path is loaded. If yes, it indicates the used mapping mode. If bits 5 to 7 are set to
000, an LP-UNEQ alarm is reported on the associated path.
Bit 8: used to return an LP-RDI alarm signal to the source with the bit value being set
to 1 when the local end receives a TU-AIS, an LP-TIM, or an LP-SLM alarm signal.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The pointer is used for alignment and indicatesH theustart position of VC-n in the
n
corresponding AU or TU frame. In this way, the receive end can correctly remove the
corresponding VC from the STM-N, andio
a
low-rate signals, such as PDH. Thatcis,
tlow-rate tributary signals can be directly dropped
then split the VC and C encapsulation to separate
t i fi
er the position of the VC-4 in an AU-4.
from the STM-N signal.
TU-PTR is used&
g to locate the position of the VC-12 in a TU-12.
inwith the framing bytes A1 and A2, pointers are used to directly drop low-
n
ai signals from high-speed STM-N signals.
Together
T r
speed
i
e the network is in the synchronous working state, the pointer is used to calibrate the
When
w
ua
phases between synchronization signals.
H When network synchronization fails, the pointer is used for frequency and phase
calibration.
When the network works asynchronously, the pointer is used for frequency tracking
calibration.
The pointer can also be used to accommodate the frequency jitter and drifting in the
network.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Answer: Hu
n
tio
1. B1 for regenerator section bit error monitoring, B2 for multiplex section bit error
a
monitoring, B3 for higher-order path bit error monitoring, and V5 for lower-order
c
it fi
path bit error monitoring
e r
2. AIS alarm or BBE performance event generated at the receive end and sent back to
the transmit end C
&
ing
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The names of all functional modules are describeduas follows:
H
n
SPI: SDH physical interface; TTF: transmission terminal function; RST: regenerator
it o
section terminal
a multiplex section terminal; LOI: lower-order
HOI: higher-order interface; cMST:
i
f
interface
r ti
C e protection; HOA: higher-order assembler; MSA: multiplex
MSP: multiplex section
section adaptation
& path connection; PPI: PDH physical interface; OHA: overhead
access in
g
HPC: higher-order
in
LPA:alower-order path adaptation; SEMF: synchronous equipment management
H u
HPA: higher-order path adaptation; SETPI: synchronous equipment timing physical
interface; HPT: higher-order path termination
The preceding figure shows the functional modules of a TM. The signal flow is as follows:
An STM-N signal on the line enters a device at the reference point A of the device. After
traversing the A→B→C→D→E→F→G→L→M path, the signal is split into 140 Mbit/s PDH
signals. After traversing the A→B→C→D→E→F→G→H→I→J→K path, the signal is split
into 2 Mbit/s or 34 Mbit/s PDH signals (2 Mbit/s signal is used as an example here). This
direction is defined as the receive direction of the device. In the opposite direction, 140
Mbit/s, 34 Mbit/s, and 2 Mbit/s PDH signals are multiplexed into STM-N signal frames on
the line along the reverse direction of the two paths. The functions of the device are
implemented by all basic functional modules together.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Answer: A. SPI Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H section between the RSTs of two
A regenerator section (RS) refers to the maintenance
n
devices (including two RSTs and the optical cables between them).
io
A multiplex section (MS) refers to the tmaintenance
n
generation flow chart, you can easily locate the fault points and causes of TU_AIS and
other related alarms. it o
f i cais another common cause for TU_AIS. If the service
ti making the service timeslots of a path (between the
During network maintenance, there
r
e mismatch, the TU_AIS alarm will be reported.
timeslot is incorrectly configured,
transmit end and receiveC end)
&
g
n in
r ai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
The preceding figure shows the detailed alarm H ua flowchart of each functional
generation
n
module of an SDH device. You can view the alarm and performance event information
generated by each functional module ofiothe SDH device and the relationship between the
alarms and performance events. ca
t
t i fi
e r
C
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The MS_AIS alarm indicates that the signal at point u
H C is all "1"s. This alarm is caused by
n
R_LOS and R_LOF. When the RST receives R_LOS and R_LOF, the signal at point C is all
"1"s. In this case, the b6 to b8 of the K2it obyte is "111". In addition, the MS_AIS alarm at
the local end may be caused by the
f i caMS_AIS signal sent from the opposite end. That is, the
r
transmitted STM-N frame consists ti of a valid RSOH and other all-"1"s signals.
Ce
&
g
n in
r ai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
MSTP is short for Multi-Service Transmission Platform.u
Huawei MSTP devices have two series: OptiX
o n OSN 1500/2500/3500/7500 series and OptiX
ti
e
generation intelligent optical system developed by Huawei Technologies Co.,
Ctransmits various services, such as SDH, PDH, Ethernet, ATM,
Ltd. The system efficiently
&
ng the system manages the services and bandwidths intelligently.
DDN, and SAN services, from the backbone layer to the access layer. By using intelligent
i
in 500/550/580 is mainly used at the network access layer or in enterprise
network technologies,
ra
T
The OptiX OSN
ei
private networks.
a w course is intended for engineers who are responsible for device commissioning and
This
u
&
different services.
as the clock source for the whole system by receiving external clock signals through
external clock ports or for other devices by outputting the processed clock signals.
Alternatively, it traces clock signals extracted from an SDH unit or a PDH unit to
provide timing for other functional units in the system.
Auxiliary unit: It provides ports for orderwire phones or serial data, connects to and
processes power supplies, and amplifies optical power.
SCC unit: It controls the whole system and communicates with the NMS. It also
reports alarms and performance data collected from each functional unit through
NMS ports to an NMS operating terminal, and receives configuration commands
delivered by the NMS.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The MSTP device subrack or chassis can be installed u
H in a standard 300 mm or 600 mm ETSI
n
cabinet or a 19-inch cabinet. The OSN 1500/2500 can also be installed in an access
network cabinet, and the OSN 500/550io
or installed in an outdoor cabinet. ca
t can also be mounted on the wall or on the desktop
i f i
t
The 300 mm ETSI cabinet hasr two models: T63 and N63E. The 600 mm ETSI cabinet is
e supports the back-to-back installation of NG-SDH
orderwireaphone
r
T be installed in a cabinet varies depending on the cabinet height. For example, only
i
that can
oneeOSN 3500 subrack can be installed in a cabinet with a height of 2 m, and a maximum
a w
H u of two OSN 3500 subracks can be installed in a cabinet with a height of 2.2 m or 2.6 m. In
addition to subracks, the DC power distribution box and cabinet indicators are usually
configured on the top of a cabinet.
External case-shaped devices other than subracks can be installed in a cabinet as required.
Fiber management tray, which is used to spool redundant fibers inside the cabinet
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
Cabinet indicators are installed on the top of a H ua to indicate the power supply status
cabinet
on
and alarm status of the entire cabinet.
The green indicator is the powertisupply indicator. If the green indicator is on, it
ca to the device. If the green indicator is off, it indicates
f i
ti to the device.
indicates that power is supplied
e r
that power is not supplied
The red indicator isCthe critical alarm indicator, the orange indicator is the major
&and the yellow indicator is the minor alarm indicator.
g
alarm indicator,
T r
subracks
e i When an alarm occurs, the corresponding alarm indicator is on, but does not blink.
w
H ua Cabinet indicators are driven by subracks. The cabinet indicators can work properly
only after the subracks are powered on and power cables are correctly connected.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The DC power distribution unit (PDU), TN51PDU, u
H is installed at the top of a cabinet, and
can be divided into two parts, namely, part A and part B that back up each other.
Currently, each part receives four –48 Vo n supplies. The power supply connections are
t i power
as follows:
c a
t i fi supplies are connected to RTN(+) and NEG(-).
For part A, two primary power
r power supplies are connected to RTN(+) and NEG(-).
C e
For part B, two standby
Power supply output& area: On both sides of the DC PDU, there are respectively four output
ng are used to connect to the power cables of subracks.
i
terminal blocks that
a
Power supply ininput area: The TN51PDU board provides corresponding power supply input
r based on the power supply capacity of the equipment room.
T
capabilities
ei When the equipment room provides four power supply inputs not less than 63 A,
w part A and part B can respectively be connected to four –48 V DC power cables and
u a
H four power supply ground cables, that is, eight –48 V DC power cables and eight
power supply ground cables in total.
When the equipment room provides two power supply inputs not less than 125 A,
part A and part B can be respectively connected to two –48 V DC power cables and
two power supply ground cables through the installation of copper fittings, that is,
four –48 V DC power cables and four power supply ground cables in total.
Power supply switch area: On both sides of the DC PDU, there are respectively four power
supply output switches that correspond to the output terminal blocks. The power supply
output switches control power supply to corresponding subracks.
There are many types of DC PDUs. This course uses TN51PDU as an example.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
The maximum power consumption per subrackH ua to the maximum power consumption
refers
n
configuration that a subrack can support and the maximum heat dissipation capability that
it o power consumption of the typical configuration
the subrack has. In actual application, the
is far less than the maximum power
f i caconsumption.
r ti by the device cause higher power consumption. To
Ce of the device, the internal power supply system provides
The increasing features supported
ensure the normal operation
& of power consumption according to different power
different mapping policies
g
in
consumption requirements.
n
i
The poweraconsumption
r of the device depends on the number and types of boards
T in the subrack. For details about the power consumption of each board, see the
i
configured
e Description in the corresponding product manual.
w
Hardware
H uaThe preceding table lists the maximum power consumption and cabinet fuse capacity of a
common subrack. For details about the specifications of an enhanced subrack, see the
corresponding product manual.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The OptiX OSN 1500 has two models: OSN 1500A u
H OSN 1500B. The OSN 1500A has a
and
n
single-layer subrack structure, and the OSN 1500B has a two-layer subrack structure. This
slide shows the subrack structure of theio
a t OSN 1500B, which is referred to as the OptiX OSN
1500.
f i c
t i
r 1500 subrack has a two-layer subrack structure. The upper
e
As shown in the figure, the OSN
layer accesses signals andCpower supplies, and the lower layer processes signals. The entire
subrack can be divided&into the following functional parts:
g
n in
Service processing board slots: They are used to house the line, tributary, and
i
r a processing boards.
Ethernet
i T
e interface boards.
Interface board slots: They are used to house tributary interface boards and Ethernet
w
H ua SCC, cross-connect, timing, and line board slots: They are used to house the PCXLN
boards, which are SCC, cross-connect, timing, and line boards.
AUX board slots: They are used to provide alarm interfaces, management and
maintenance interfaces, and 120-ohm clock interfaces.
PIU slots: Two PIU boards are installed to supply power to the subrack and provide
75-ohm clock ports.
Fan unit area: This area houses one fan module to dissipate heat generated by the
device.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
The OptiX OSN 2500 subrack has a single-layerH ua structure. The entire subrack can
subrack
n
be divided into the following functional parts:
it o are used to house the line, tributary, and
f
rti are used to house tributary interface boards and Ethernet
Interface board slots:eThey
interface boards. C
&
n g
SCC, cross-connect, timing, and line board slots: They are used to house the
i
H u
interfaces.
PIU slots: They are used to house two PIU boards to supply power to the subrack.
Fan unit area: This area houses two fan modules to dissipate heat generated by the
device.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H u
The OptiX OSN 3500 has a two-layer subrack structure. The entire subrack can be divided
into the following functional parts:
n
it o are used to house various service processing
ca Ethernet, and ATM processing boards.
Service processing board slots: They
f i
rti are used to house the interface boards corresponding to
boards, such as the line, tributary,
i
connect n boards.
T raboard slots: They are used to house the active and standby SCC boards.
SCC
ei AUX board slot: It can be used to house an auxiliary interface board AUX to
a w implement the access of orderwire phone, clock, alarm, and NMS signals.
H u
PIU slots: They are used to house two PIU boards to supply power to the subrack.
Fan unit area: This area houses three fan modules to dissipate heat generated by the
device.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The OptiX OSN 3500 subrack consists of 37 slots u
H the upper and lower layers. The upper
at
n
layer, where 19 slots are present, is the slot area for interface boards. The lower layer,
it o for processing boards.
where 18 slots are present, is the slot area
i a
csubrack
f
rtito 18
Slot layout of the OptiX OSN 3500
&
Cross-connect and timing board slots: slots 9 to 10
g slots: slots 1 to 8, slots 11 to 17
nboard
i
Processing
in board slots: slots 19 to 26, slots 29 to 36
r a
Interface
T
This table lists the slot relationship between the service processing boards and interface
boards of the OptiX OSN 3500.
The paired slots of the OptiX OSN 3500 are symmetrical with cross-connect board slots in
the middle. As shown in the figure, slots 8 and 11 are paired slots, slots 7 and 12 are
paired slots, and so on. The boards in two directions of an ADM site must be installed in
paired slots.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
The OptiX OSN 3500 II has a two-layer subrackH ua The entire subrack can be divided
structure.
into the following functional parts:
n
it o are used to house various service processing
ca Ethernet, and ATM processing boards.
Service processing board slots: They
f i
rti are used to house the interface boards corresponding to
boards, such as the line, tributary,
i
standby n SCC, cross-connect, and timing boards.
T ra interface board slots: They are used to house AUX boards to implement the
Auxiliary
ei access of orderwire phone, clock, alarm, and NMS signals.
a w Fan unit area: This area houses three fan modules to dissipate heat generated by the
H u
device.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The OptiX OSN 3500 II subrack consists of 39 slots u
H the upper and lower layers. The
at
n
upper layer, where 20 slots are present, is the slot area for interface boards. The lower
layer, where 19 slots are present, is theio
a t slot area for processing boards, including PIU,
EOW, and AUX.
f i c
t i
r OSN 3500 II subrack
e
Slot layout of the OptiX
C1 and slot 41
PIU board slots: slot
&
i ng
SCC, cross-connect, and timing board slots: slots 9 to 10
T
ei Auxiliary interface boards: slots 42 and 43
Interface
a w
H u
This table lists the slot relationship between the service processing boards and interface
boards of the OptiX OSN 3500 II.
The paired slots of the OptiX OSN 3500 II are symmetrical with cross-connect board slots in
the middle. As shown in the figure, slots 9 and 10 are paired slots, slots 8 and 11 are
paired slots, and so on. The boards in two directions of an ADM site must be installed in
paired slots.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The OptiX OSN 7500 has a two-layer subrack structure.H u The entire subrack can be divided
into the following functional parts:
n
it oused to house various service processing boards,
caand ATM processing boards.
Service processing board slots: They are
i f
such as the line, tributary, Ethernet,i
Interface board slots: They e rtused
are to house the interface boards corresponding to PDH,
C boards.
boards.
a in
T
SCC boardr slots: They are used to house the active and standby SCC boards.
eiboard slot: It can be used to house an auxiliary interface board AUX to implement the
H u access
PIU slots: They are used to house two PIU boards to supply power to the subrack.
Fan unit area: This area houses three fan modules to dissipate heat generated by the
device.
Note: Compared with the OSN 3500, the SCC boards of the OSN 7500 are moved to the
upper layer of the subrack, and therefore the OSN 7500 provides more service processing
board slots and a larger access capacity.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The OptiX OSN 7500 subrack consists of 38 slots, u
H slots at the upper layer and 18 slots at
20
the lower layer.
n
it osubrack
ic25a
Slot layout of the OptiX OSN 7500
C e
Cross-connect and timing boards: slots 9 to 10
Interfacein
in
board slots: slots 19 to 22, slots 35 to 38
a
r interface board slot: slot 34
T
Auxiliary
a
u table lists the slot relationship between the processing boards and interface boards of
This
H
The paired slots of the OptiX OSN 7500 are symmetrical with cross-connect board slots in
the middle. As shown in the figure, slots 8 and 11 are paired slots, slots 7 and 12 are
paired slots, and so on. The boards in two directions of an ADM site must be installed in
paired slots.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
The OptiX OSN 7500 II subrack consists of the H ualayer and lower layer, wherein 40
upper
n
slots are available. There are 20 slots at the upper layer, 18 slots at the lower layer, and
two slots for the fan modules. it o
f i ca
ti slots 26 to 33, slots 34 to 41
Interface board slots:
e
Service interface board rslots:
C
&
Processing board slots:
n g
i
Service processing board slots: slots 1 to 8 and slots 11 to 18
in and timing board slots: slots 9 to 10
r a
Cross-connect
T
Paired slots are two slots between which overhead bytes can pass through the backplane
bus. Paired slots implement automatic transparent transmission of overhead bytes, such as
K bytes, D bytes, and E1 bytes. This improves MSP switching performance and protects
DCC communication with other NEs even if the SCC board on the local NE is offline.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The ISU slot houses a functional board integrating u
H SCC unit, cross-connect unit, timing
the
n
unit, tributary unit, line unit, and transparent data transmission unit. The ISU board is
available in multiple types depending on it othe functions and access capacity provided by the
i
OptiX OSN 500. The ISU board is mandatory.
f ca
r tiline unit, tributary unit, and data unit.
Ce
The extended slots support the
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
Power supply area: This area houses DC powerH ua modules for the DC power input and
supply
output of the device.
n
it owhich dissipates heat generated by the device. The
cafor locked-rotor and rotating speed, status query, and
Fan area: This area houses a fan board,
f i
ti
fan board supports the status checks
fault reporting.
e r
Extended board slot area:CThis area houses various extended boards and AC power supply
&
g
board APIU of the OptiX OSN 550. It can provide line, tributary, and data units.
n
Slot area for n i
the OptiXra
i the SCC, cross-connect, and timing board: This area houses the CXL board of
T
OSN 550. The CXL slot houses a functional board integrating the SCC unit, cross-
e i unit, and timing unit. The functional board is available in multiple types depending
connect
a w the functions and access capacity provided by the OptiX OSN 550.
on
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Device dimensions: Hu
221 mm x 442 mm x 224 mm (H x W x D)
o n
i
a t slots:
c
The OptiX OSN 580 provides the following
i to house packet processing boards, tributary boards,
fused
t i
r multiplexer (OADM) boards, and auxiliary boards.
Slots 1 to 14: They can be
e
C
line boards, optical add/drop
Slots 17,in
in is DC powered. Slots 17 and 19 are dedicated for housing the APIU
18, and 19: Slots 17 and 18 are dedicated for housing the PIU boards when
the a
T r when the chassis is AC powered.
chassis
a w
H u
Note:
Slot 19 cannot be used to house a packet processing board, tributary board, or line
board because this slot does not have any cross-connect bus.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
An APIU board occupies two slots. The pins onH theuboard are located on the lower part of
n
the board. Therefore, the board is inserted in the lower slot of the two occupied slots. Its
it o lower slot of the two occupied slots. For
logical slot on the NMS is the same as the
i
example, if an APIU board is inserted
f cain slot 17, it occupies slots 1 and 17, and its logical
r ti 17.
slot displayed on the NMS is slot
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Answer to question 1: The maximum access capacity u
H of the OSN 1500B is 15 Gbit/s before
n
and after slot splitting. The maximum access capacity of the OSN 2500 slot is 17.5 Gbit/s
it o slot splitting. The maximum access capacity of
before slot splitting and 18.75 Gbit/s after
the OSN 3500 is 35 Gbit/s when the
f i caGXCS cross-connect board is configured, 58.75 Gbit/s
r
when the EXCS/UXCS cross-connect ti board is configured, or 155 Gbit/s when the
C
SXCS/IXCS cross-connect boarde is configured. The maximum access capacity of the OSN
&
3500 II is 40 Gbit/s when the Q5CXL board is configured or 90 Gbit/s when the Q6CXL
board is configured.
n g The maximum access capacity of the OSN 7500 subrack can reach 200
i
in board is configured.
Gbit/s when the GXCS or EXCS board is configured or 280 Gbit/s when the SXCS, UXCS, or
a
r
IXCS cross-connect
T
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
Different boards have different appearances and u
dimensions.
following types:
a
ic interfaces that can access and process service signals,
Service processing boardsifwith
rt
such as SL16.
C e
&
Service processing boards that can only process service signals, such as PQ1.
ra
T
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
In terms of functionality, boards can be classified u
H SDH units, PDH units, EOS units, and
into
auxiliary units.
n
it o
f i ca
r ti
Ce
&
g
n in
r ai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The meanings of SDH unit names are as follows: H u
The first character S indicates an SDH
o n unit.
tia line unit (F indicates the FEC function).
-: 1 x STM-NCsignal
&
g
D: 2 x STM-N signals
i4nx STM-N signals
n
aiO: 8 x STM-N signals
Q:
T r
i
e
a w T: 12 x STM-N signals
H u H: 16 x STM-N signals
SL64 indicates an SDH line unit that can access and process one STM-64 signal.
SF64 is a special SDH unit that has the forward error correction (FEC) function (represented
by F). FEC is a technology that improves the reliability of data transmission. It can increase
the transmission distance of signals and improve network performance.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
The interface type determines the transmission H ua rate, and wavelength of signals.
distance,
on
For details, see the following slides.
The optical ports that can output fixedtiwavelengths can be directly interconnected with
ca
WDM devices.
i f i
r tsupport
The OSN 1500/2500 does not e
C 1500/2500.
STM-64 optical boards. Therefore, the SL64 board
cannot be used in the OSN
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The SL64/SF64/SL16 board uses fixed and unpluggable u
H optical modules, but does not
support pluggable SFP optical modules.
n
it o
f i ca
r ti
C e (ESD) label is used to identify an electrostatic sensitive device.
Electrostatic discharge
&
Pay attention to ESD when performing operations.
g
in
CLASS 1
n
ai
LASER
r
PRODUCT
i T
e Laser safety class label is used to identify the class of the laser source.
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The working mechanism of an SDH unit is as follows: u
H Take the SL64 board as an example.
n
An STM-64 optical signal is sent to an optical board through the optical port. The optical
it o on the STM-64 optical signal, demultiplexes
board performs optical/electrical conversion
i
the high-rate electrical signal into 64
f caVC-4 electrical signals, recovers the line clock, extracts
r i
SDH overhead bytes from the treceived multiple low-rate electrical signals, and processes
& adds overheads to the signals, and forms an STM-64 line optical
backplane bus. In addition, the board receives 64 VC-4 signals from the cross-connect unit,
g
multiplexes the signals,
n in entire process, the SDH unit collects alarms and performance events
abyi the local board and sends them to the SCC unit for processing.
signal. During the
generated
T r
e i
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The STM-16/64 board supports the output of fixed u
H wavelengths, and can be directly
n
connected to the multiplexer board of a DWDM device. For example, if the optical port
specifications of an STM-16 optical boardit o support the output of standard wavelengths
compliant with ITU-T G.692 and no
f i cawavelength conversion unit is required for converting
r
wavelengths, the STM-16 optical ti board can be directly connected to a multiplexer board of
Ce (WDM) device to achieve long-haul transmission.
a wavelength division multiplexing
i
services (VC-4-4c,n VC-4-8c, VC-4-16c, and VC-4-64c services are concatenation services).
a insupports the automatic laser shutdown (ALS) function. When no optical signal
T r the ALS function automatically shuts down the corresponding optical module to
The SDH unit
a w
protect
H u The SDH unit supports the loopback function to help maintenance personnel locate faults.
Pseudo-random binary sequence (PRBS): It is used for network self-check and maintenance.
You can determine whether the working path towards a tributary port, towards the line
direction, or towards the cross-connect direction is normal, depending on whether bit
errors are detected in a PRBS test.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The following uses SL64 and SF64 boards as examples u
H to describe the technical
specifications of SDH units.
n
it o are different, because the SF64 board has the
caof the SL64 board is 9.95 Gbit/s, and that of the SF64
The line rates of the SL64 and SF64 boards
f i
ti the two boards cannot be interconnected.
outband FEC function. The port rate
e
board is 10.71 Gbit/s. Therefore,r
The preceding table lists C the optical port types, including I-64.1, S-64.2b, and L-64.2b.
&follows:
T r
i
The first number after the hyphen indicates the STM rate level.
n
SL1Q, and SL4D, and the OptiX OSN 580 supports SL1Q, SL4D, SL16Q, SL64S, and SL64D.)
o
t i
Board Description
c a Port Type Connector
2 x STM-1 opticalfi
SL1D
r ti S-1.1, L-1.1, L-1.2
e
interface board
4 x STM-1Coptical
SL1Q
& board S-1.1, L-1.1, L-1.2
g
interface
SL4D n i n
2 x STM-4 optical
i S-4.1, L-4.1, L-4.2
ra 4 x STM-16 optical
interface board
T LC
a w
H u SL64S
1 x STM-64 optical
interface board
I-4.1, S-64.2b, P1L1-2D2
2 x STM-64 optical
SL64D I-4.1, S-64.2b, P1L1-2D2
interface board
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The working mechanism of an SDH unit is as follows: u
H The SL1D board is used as an
example.
n
it o signals are sent to an optical board through
a
In the receive direction: STM-1 optical
the optical port. The opticalicboard performs optical/electrical conversion on the STM-
f
ti the high-rate electrical signals into two VC-4 electrical
r
Celine clock, extracts SDH overhead bytes from the received
1 optical signals, demultiplexes
signals, recovers the
& electrical signals, and processes the pointers. Then, the two VC-4
multiple low-rate
g
nsent to the cross-connect unit through the backplane bus.
i
signals are
a intransmit direction: The board receives two VC-4 signals from the cross-connect
T r multiplexes the signals, adds overheads to the signals, and forms STM-1 line
In the
ei optical signals.
unit,
a w
H u During the entire process, the SDH unit collects alarms and performance events
generated by the local board and sends them to the SCC unit for processing.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The following uses the SL1D board as an example. u
H functional specifications are as
The
follows:
n
it o 2 x STM-1 optical signals.
caAll optical ports comply with ITU-T G.957, and
Basic functions: Transmits and receives
f i
C e
standard S-1.1, L-1.1, and
&
Specifications of optical modules: Supports the detection and query of optical
n g
module information. The optical ports provide the function of enabling and disabling
i
n and the automatic laser shutdown (ALS) function.
i
the laser
a w paths, as well as warm and cold resets. The warm reset does not affect services.
H u
Protection schemes: Supports two-fiber unidirectional MSP ring, linear MSP, and
SNCP.
Alarms and performance events: Provides various alarms and performance events,
facilitating device management and maintenance.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
PDH units process various service signals, includinguE1/T1, E3/DS3, and E4/STM-1.
a t
S indicates SDH.
fi c
t i
er
P indicates PDH.
M indicates mixed.C
&
g
The PL3A board provides ports on the front panel and does not require any interface
board. The PL3in
f i
ti
transmitted to the PDH processing
e r
processing board asynchronously maps the 2 Mbit/s signals into C-12 signals, adds
the path overheadsCto the C-12 signals to form VC-12 signals, adds pointers to the
VC-12 signals to&form TU-12 signals, multiplexes the TU-12 signals to form a VC-4
g
n finally sends the VC-4 signal to the cross-connect unit through the
i
signal, and
a in bus. During signal processing, the PQ1 board communicates with the SCC
backplane
n
port impedance. The two boards use different interface boards to receive signals.
it o warm reset and cold reset. The warm reset does
There are two types of board reset modes:
i a reset affects running services.
ccold
i
not affect running services, but the
f
t(TPS):
e
Tributary protection switchingr TPS protection is a device-level protection scheme. If
the working board fails, C
The PRBSra
T services. An NE that provides the PRBS function can work as a simple device used
functional module is equivalent to a simple instrument that transmits and receives
i
eanalyze whether a service path is faulty. The PRBS functional module can be used to
unframed
w
uaanalyze the local NE or the entire network. The PRBS function is a substitute for a test
to
ca
it fi
SP3DA 42 x E1 (120-ohm)/T1 (100-ohm) processing board
r
42ex E1 (75-ohm) processing board
Anea 96
SP3DB
C
&
ng
PL3T 3 x E3/T3 processing board SMB
i
PD1
a in 32 x E1/T1 tributary service processing board
Tr
ei
DMS 32 x E1/T1 electrical interface board Anea 96
a w
u
Indicators on the front panel of the SP3D/PL3T board (the indicator meanings are the same
H as those of the previous SDH units):
Board hardware status indicator (STAT) – two colors (red and green)
Service alarm indicator (SRV) – three colors (red, green, and yellow)
On the front panel of the SP3D board, there are two Anea 96 ports, each of which receives
and transmits 21 E1/T1 services.
The SP3D board has two functional versions: SP3DA and SP3DB. The differences between
the two board versions lie in whether the T1 interface is supported and that the E1 port
impedances are different.
There are three pairs of electrical ports on the front panel of the PL3T board. Ports TX1 to
TX3 transmit 1 to 3 channels of E3/T3 signals, and ports RX1 to RX3 receive 1 to 3
channels of E3/T3 signals.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The following uses the SP3D board as an example u
H describe the working mechanism of
to
PDH units:
n
it ofrom the switch or other devices are first
ca board through the interface board. The PDH
The 42 x 2 Mbit/s signals accessed
f i
ti
transmitted to the PDH processing
e r
processing board asynchronously maps the 2 Mbit/s signals into C-12 signals, adds
the path overheadsCto the C-12 signals to form VC-12 signals, adds pointers to the
VC-12 signals to&form TU-12 signals, multiplexes the TU-12 signals to form a VC-4
g
n finally sends the VC-4 signal to the cross-connect unit through the
i
signal, and
a in bus. During signal processing, the SP3D board communicates with the
backplane
T
SCCr unit bidirectionally, reports the alarms and performance events generated by the
ei local board to the SCC unit in real time, and receives the configuration commands
a w issued by the SCC unit. This is the upstream signal flow direction, which is from the
H u PDH port, cross-connect board, to the SDH port. The downstream signal flow
direction of the service is opposite to the preceding direction.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Pseudo-random binary sequence (PRBS) Hu
n
tio
The PRBS function is used to test and maintain networks. You can analyze whether a
a
service channel is faulty for one NE or multiple NEs. During troubleshooting, you can
c
it fi
use this function to replace the 2M BER tester.
e r
C
&
ing
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Naming conventions of EOS units are as follows: Hu
E indicates Ethernet.
o n
i
a t
F indicates FE interface.
i c
G indicates GE interface.tif
e r
C
A indicates 10GE interface.
&
n g
S indicates the switching function.
i
n the transparent transmission function.
i
T indicates
ra the RPR function.
RTindicates
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Common boards (OSN 580 V100R008C10 supports u
H only EGS4.)
n
Board Description
it o Port Type Connector
f i ca
ti
1 x GE Ethernet transparent
transmissionrboard
EGT1 1000Base-SX/LX LC
Ce
4 x FE/GE&
100Base-
ng board
service processing
EGS4
i BX/FX/LX/VX/ZXX1000 LC
a in
r
Base-SX/LX/VX/ZX
i T
eEFS8 8 x FE switching and
w 100Base-TX RJ-45
ua
processing board
H
Board indicators
a
through the interface converting module for demapping and decapsulation. The
c
it fi
Ethernet processing module determines the service routes according to the
e r
equipment level, classifies service flows according to the service type and
C
configuration requirements, and performs frame delimitation, preamble adding, CRC
&
code computing, and Ethernet performance count. Finally, the interface converting
ng
ni
module converts the parallel signals to serial signals, and transmits the serial signals
i
ra direction:
through an Ethernet interface.
T
ei The interface module accesses the signals from the external Ethernet device such as
In the receive
a w
H u an Ethernet switch or a router, decodes the signals, and converts the serial signals
into parallel signals. The service processing module then performs frame delimitation,
preamble stripping, CRC code termination, and Ethernet performance count for the
signal. Then, the encapsulation module encapsulates Ethernet frames in the GFP-F
format, transmits the frames to the mapping/demapping module, which then maps
the frames. Finally, the encapsulation module transmits the frames to the cross-
connect unit through the interface converting module. The Ethernet unit implements
bidirectional communication with the SCC unit, reports the generated alarms and
performance events to the SCC unit in real time, and receives the configuration
commands issued by the SCC unit.
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Auto-negotiation Hu
n
tio
The auto-negotiation function enables one network device to transmit information
a
about its supported working modes to the opposite end on the network and to
c
it fi
receive corresponding information from the opposite end on the network. Extraction
e r
of such information identifies the working modes supported by the remote device as
C
well as some information used for the handshake mechanism of the auto-negotiation
function. &
g
n in
Link capacity adjustment scheme (LCAS): LCAS provides an error tolerance mechanism that
i
enhances a
T r the robustness of the concatenation function from the following aspects:
i
e configuration of system capacity, the increase and decrease of the concatenated VC
When being applied in concatenation technologies, the LCAS function enables the
a w
Hu
quantity, and the dynamic change of bearer bandwidth (services are not damaged
during the dynamic change).
Ethernet services:
Ethernet private line (EPL): EPL services can be configured to realize point-to-point
transparent transmission of Ethernet services.
Ethernet virtual private line (EVPL): EVPL services are isolated by MPLS/QinQ to
achieve bandwidth sharing.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
The preceding table lists the line capacity, lower-order u cross-connect capacity, and higher-
order cross-connect capacity of the CXL1/CXL4/CXL16 boards. According to the table, the
n lower-order cross-connect capacities but
it oof the CXL1/CXL4/CXL16 board corresponds to
three boards have the same high-order and
modules.ra
in board, the CXLLN board supports the selectable rates of optical
with the Q1/2/3CXL
CXLQ41 is a four-in-one board with multiple optical ports.
i T
eService activation
w
Steady green The cross-connect unit is in the active state.
H ACTX
The cross-connect unit is in the standby state.
i T capability of the subrack is 155 Gbit/s. The SXCSB board supports extended
The difference is that the SXCSA board does not support extended subracks and therefore
theeaccess
a w
subracks, and therefore the access capability of the subrack can reach 156.25 Gbit/s.
H u IXCSA/B and SXCSA/B have the same higher-order cross-connect capacity, but the lower-
order cross-connect capacity of IXCSA/B reaches 40 Gbit/s.
The higher-order and lower- order cross-connect capacities of the FXCSA board are both
120 Gbit/s, and the FXCSA board implements the full cross-connection function.
The functional version of PSXCSA is N2. When N1SXCSA and N4GSCC boards are used
together, the N2PSXCSA board can substitute for the N1SXCSA board using the board
version replacement function to implement 200 Gbit/s higher-order cross-connection at the
VC-4 level and 20 Gbit/s lower-order cross-connection at the VC-3 or VC-12 level.
The XCE board is a cross-connect and timing board for the extended subrack. It implements
1.25 Gbit/s lower-order cross-connection at the VC-3 or VC-12 level, and applies only to
the OptiX OSN 3500. The XCE board is installed on the backplane of the OptiX OSN 3500
to function as an extended subrack.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The OptiX OSN 7500 has many types of cross-connect u
H units. During the configuration, the
n
active and standby cross-connect units of the same subrack must be of the same type. If
the types of the cross-connect units areio
a t As shown in the preceding table, the GXCS
different, the access capacities of the
fi c
corresponding subracks are also different.
r t i
board has a 240 Gbit/s VC-4 higher-order cross-connect capacity and a 20 Gbit/s VC-3/VC-
C
12 lower-order cross-connecte capacity. If the GXCS board is configured in a subrack, the
&
access capability of the subrack is 200 Gbit/s.
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Clock functions:
Hu
n
Traces the external clock source, line clock source, tributary clock source, or internal
tio
clock source.
ca
rit fi
Supports the non-SSM, standard SSM, and extended SSM.
C e
Supports three working modes that comply with ITU-T G.781, namely, tracing,
holdover, and free-run modes.
&
ng
Outputs the line clock, tributary clock, and external clock.
i ni
Supports tributary retiming.
a
a w
When configuring the S1 byte clock protection, you must enable the Synchronization Status
H u Message (SSM) protocol. The SSM protocol status of an NE can be set to provide different
clock protection modes.
Standard SSM: The ITU-T recommends the use of the SSM protocol to identify the
quality of the synchronization source. The lower four bits of the SOH S1 byte can
transmit 16 types of timing quality for the SSM protocol.
Extended SSM: Based on the SSM protocol recommended by ITU-T, Huawei adds the
concept of clock ID, defines a unique ID for any source, and transmits the ID together
with the SSM information (occupying the higher four bits of the S1 byte), so that the
clock ID is also referenced during clock switching. This prevents the NE from tracing
the clock signals sent by itself when the network is faulty.
Non-SSM: The S1 byte is not used to distinguish clock quality.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
There are many indicators on the front panel ofH au
CXL board, including board hardware
o
activation status indicator (ACTX), SCC iunit
nactive/standby status indicator (ACTC), cross-
status indicator (STAT), board software status indicator (PROG), cross-connect unit service
a t
fi
connect unit service alarm indicator c (SRVX), line unit service alarm indicator (SRVL), alarm
r i
muting indicator (ALMC), and tsynchronization clock indicator (SYNC). The line optical ports
C e
of each board are below indicators, and use LC connectors and pluggable optical modules
&
to facilitate routine maintenance. The RESET button is below the optical ports, and can be
pressed to perform g a warm reset on the SCC unit. The ALMCUT button is below the RESET
n inbe pressed for a short period to mute the current alarm sound. If you press
ai button for more than 3 seconds, the alarm sound can be permanently muted.
button, and can
the ALMCUTr
T this button for more than 3 seconds again, the alarm muting function is
If youi press
e
w
ua
canceled.
H The OptiX OSN 3500 II supports the four-in-one board Q5/Q6CXL. The Q5CXL board can
be used in an OSN 1500B/2500 subrack, and the Q6CXL board can be used only in an OSN
3500 II subrack.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The SCC boards of the OSN 3500/7500 have multiple u
H versions. The N1SCC/GSCC board can
n
be used only in the OSN 3500 subrack, the N2SCC/GSCC board can be used only in the
OSN 7500 subrack, and the SCC boardsio
a t of N3 and later versions can be used in both the
OSN 3500 and OSN 7500 subracks.
fi c
r t i
C e
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H overhead processing, and
The SCC unit performs system control, communication,
n
active/standby backup (including database backup) functions.
it o with various boards through inter-board
cafunctions: managing various boards in the subrack,
The system control function is to communicate
f i
ti events, collecting the status information of other
channels to implement the following
r
Ce relevant management operations, and configuring and
monitoring alarms and performance
functional modules, performing
& The preceding functions include: issuing commands from the
grooming device services.
g
nfunctional modules, collecting the alarms and performance events of each
i
local board to all
T r mechanism.
communication
i
Theecommunication function is to transmit OAM information to other NEs through DCCs,
a w
H u report the alarms and performance events of the device to the network management
terminal, and to respond to the commands issued by the network management terminal.
After performing timeslot cross-connections through the overhead bus from each service
board, the overhead processing function uses the FPGA to process the overhead bytes to
achieve the functions such as orderwire phone, broadcast data port, and 64 kbit/s
codirectional data port.
The active and standby SCC boards back up each other to achieve the backup of
performance data, alarm data, and configuration data.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Through the SCC unit, maintenance personnel canuconfigure and modify services at any
H
time, monitor service performance, and quickly restore and protect services when a fault
o n
i
occurs.
i
The SCC unit also ngsupports ECC communication and extended ECC.
incontrols cabinet indicators and fan units.
ra
The SCC unit
T
ei unit supports external alarm input and internal alarm output.
The SCC
a wshould be noted that not all SCC units support the ASON function. To enable the ASON
It
u function on an OSN device, you must configure the GSCC board physically.
H The OptiX OSN 1500/2500 supports three external alarm inputs and one internal alarm
output.
The OptiX OSN 3500/7500 supports 16 external alarm inputs and four internal alarm
outputs.
The SCC unit reports the power supply (the power supply of the EOW board and the
backup power supply) failure alarm for the AUX/EOW board.
The SCC unit monitors the –48 V/–60 V power supply.
The SCC unit detects whether a PIU board is in position and checks whether the surge
protection module of the PIU board fails.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
The OptiX OSN 1500/2500 supports the ASONH ua when using the Q2/3/5CXL board,
function
n
and does not support the ASON function when using the Q1CXL board.
it ofunction when using the GSCC board, and does
ca using the SCC board.
The OptiX OSN 3500 supports the ASON
f i
ti board according to the power-on sequence of SCC
not support the ASON function when
r
CeOptiX OSN 3500 is powered on, the active SCC board of the
The device selects the active SCC
boards. Therefore, after an
& be the SCC board in slot 17. However, considering future
g
OptiX OSN 3500 should
n in
expansion requirements, slot 17 may be used by a service board. Therefore, you are advised
i
a perform an active/standby switchover of SCC boards. That is, the SCC board in
r
to manually
slot 17Tis the standby board, and the SCC board in slot 18 is the active board.
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
If no optical fiber connections are available between u
H NEs, you can use Ethernet ports on the
n
NEs to implement extended ECC communication. If there are only two NEs, you can use a
straight-through network cable to connect it o them. If there are more than two NEs, use
standard network cables to connect
f i cathese NEs to the same hub.
r i
tautomatic
e
Extended ECC is classified into extended ECC and extended ECC in specified
mode. C
&
nagstraight-through network cable (or standard network cables for hub
For the automatic extended ECC, you only need to connect the Ethernet ports of two
i
in In this case, you do not need to specify the server or client.
NEs using
r a
connection).
T
ei NE that
For the extended ECC in specified mode, you must configure one NE (generally the
a w is the nearest to the gateway NE) as the server and other NEs as clients.
H u In actual application, automatic extended ECC can be enabled for a maximum of four
NEs, and manual extended ECC allows a maximum of four clients that can be
connected to a server. Otherwise, the server may be reset.
As shown in the preceding figure, an NE on ring A is directly connected to the NMS, and
there is no optical fiber connection between ring A and ring B. If the NEs on ring B need to
be monitored by the NMS, you can enable the extended ECC function of two NEs on ring A
and ring B to monitor ring B on the NMS. In the case of physical connection, a less than 50
m network cable must be used to directly connect the Ethernet ports of the two NEs.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
To save NE configuration data, the SCC unit has four u NE databases, namely memory
n
database (MDB), dynamic random database (DRDB), and two flash databases FDB0 and
FDB1.
it o
MDB: The data in the MDB varies
f i ca according to the configuration, and will be lost if
the SCC unit is reset or a ipower failure occurs.
e rt
DRDB: The data that C is verified is automatically saved in the DRDB.
Flash database& (FDB): There are FDB0 and FDB1 databases. The data needs to be
g and can be saved permanently.
manually n
n i copied
i
a (U2000)succeeds,
T r
After the NMS delivers configuration data to NEs, the data enters the MDB first.
to e
i
After the verification the configuration data is saved to the DRDB and delivered
each functional unit in the subrack where the SCC unit resides. Then, the NE enters the
w
ua
normal running state. If the data verification of the board fails, the entire NE enters the
H installation state and reports the corresponding alarm information to the NMS. Both the
MDB and DRDB do not save data when a power failure occurs. Once the SCC unit is
removed or encounters a power failure, data will be lost. When the system is powered on
again, the configuration data in the DRDB is copied to the MDB. If no configuration data is
found in the DRDB, the system copies the configuration data from FDB0 or FDB1 to the
MDB, so that the NE can enter the normal running state. If no configuration data is found
in FDB0 or FDB1, the NE enters the installation state. Therefore, to effectively save the NE
configuration data, the SCC units of NG-SDH devices support the automatic backup
function. After the NE configuration is verified, the data in the DRDB is automatically saved
to FDB0 and FDB1 every 30 minutes. In addition, the NE database can be manually backed
up to effectively protect NE configuration data.
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Common boards
Hu
n
tio
Board PDH Port
ica
Description Optical Port
Type Impedance
t i f
ISU A e r 21 x E1/T1, 8 x FE
2 x STM-1/4,
E1: 120 Ω
C T1: 100 Ω
&
n2gx STM-1/4, 21 x E1/T1
E1: 120 Ω
ISU B
i
a in T1: 100 Ω
S-1.1, L-1.1,
T rC S-4.1, L-4.1,
ei
ISU 2 x STM-1/4, 21 x E1/T1, 8 x FE 75 Ω and LC
a w
H u ISU D 2 x STM-1/4, 21 x E1/T1 75 Ω
E1: 120 Ω
ISU E 2 x STM-1/4, 21 x E1/T1, 8 x FE
T1: 100 Ω
f i ca
CXL1
r ti port
1 × STM-1 optical S-1.1, L-1.1, and LC
C e
CXL4 1&× STM-4 optical port S-4.1, L-4.1, and LC
i ng
a
CXL16in 1 × STM-16 optical port S-16.1, L-16.1, L-16.2, and LC
Tr
ei
a w
The CXL board integrates the following units:
Cross-connect (XC)
n
communication control, service grooming, and clock processing functions. The UCX board
it o
can be installed in slot 15 or 16 of the chassis.
e r
CCross-connects
UCX & and 5 Gbit/s VC-12 and grooms 280 Gbit/s VC-4 signals
n g or VC-3 signals.
i ni
T ra
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The UCXE board integrates the SCC, cross-connect, u
H and timing units to provide
n
communication control, service grooming, and clock processing functions. The UCXE board
it o
can be installed in slot 15 or 16 of the chassis.
f i ca
Board Type
r ti Basic Function Specification
C e
Higher-order cross-connect capability 280 Gbit/s
&Lower-order cross-connect capability
g 20 Gbit/s
UCXE in
i n Packet switching capability 560 Gbit/s
n
Message (SSM) protocol. The SSM protocol status of an NE can be set to provide different
clock protection modes. it o
f i ca
i
Standard SSM: The ITU-T recommends the use of the SSM protocol to identify the
t
Extended SSM:&
g Based on the SSM protocol recommended by ITU-T, Huawei adds the
n clock ID, defines a unique ID for any source, and transmits the ID together
concept iof
n
i SSM information (occupying the higher four bits of the S1 byte), so that the
withathe
r
T ID is also referenced during clock switching. This prevents the NE from tracing
i clock
e the clock signals sent by itself when the network is faulty.
w
H ua Non-SSM: The S1 byte is not used to distinguish clock quality.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H u
The AUX board provides the system with various auxiliary ports and management ports and
n
implements centralized backup of +3.3 V power supply for each board of the subrack.
The AMU board provides various auxiliary,it o orderwire phone, and broadcast data ports for
ca
the system.
f i
LAMP1 is the output port of rtheti cabinet alarm indicator and LAMP2 is the input cascading
e
port of the cabinet alarmCindicator. Connecting these ports incorrectly may cause short
circuits. &
To connect the n g
i LAMP indicator, perform the following operations:
a incabinet alarm indicator to the LAMP1 port on the AUX board of the lower
T r
Connect the
ei the LAMP1 port on the AUX board of the upper subrack to the LAMP2 port on the
subrack.
a w
Connect
a t(PROG)
Board software status indicator
f i c
i
Channel A –48 V powertindicator (PWRA) - two colors (red and green)
r
e
i n
The front panel
a
r
T NMS port. Currently, on the DCN network, an NE can access the NMS only
i
ETH:
e through Ethernet by default.
w
H ua COM: commissioning port. It is used for onsite commissioning. Because the COM
port is directly connected to the SCC board, incorrect use of the COM port may
adversely affect the service processing of the NE. In addition, the COM port has a low
rate. Therefore, you are advised to use the Ethernet access mode. This port is
disabled by default.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Functions and features Hu
n
tio
Management ports: It provides the OAM interface, which supports the X.25
a
protocol. It provides the management serial port F&f, ETH NMS port, and 10/100M
c
it fi
compatible Ethernet EXT port to manage extended subracks.
e r
Auxiliary ports: It provides four broadcast data ports (Serial 1 to 4) and one 64 kbit/s
C
i
ohms and two BITS clock input/output ports whose impedance is 75 ohms.
a
Tr contact signal ports: It provides dry contact signal alarm ports for 16 inputs and
Dry
ei four outputs and dry contact signal alarm cascading ports for four outputs.
a w
H u Cabinet alarm indicators: It provides one 4-output port for cabinet alarm indicators
and one 4-input cascading port for cabinet alarm indicators.
Power supply backup and detection: It provides the centralized backup of the +3.3 V
power supply for boards in the subrack, which is the 1:N protection for the
secondary power supply of each board. It performs the overvoltage (3.8 V) check and
undervoltage (3.1 V) check on the output of the +3.3 V backup power supply. It
supports audible alarms and the alarm muting function.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The AUX board is a system auxiliary interface board u
H of the OptiX OSN 7500. It provides
n
various auxiliary ports and management ports as well as centralized backup of +3.3 V
it o
power supply for each board in the subrack.
CLKO1
n g
SMB 75-ohm clock output port 2
i
T
ei PHONE RJ-45 Orderwire phone port
EXT
a w
a
power supplies, and can be installed in slot 5 of the chassis.
c
FAN board
r it fi
C e
The FAN board adjusts the fan rotating speed, and detects and reports the fan
status.
&
ing
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
PIU board Hu
n
tio
Two PIUs are provided, and each PIU supports the access of one –48 V or –60 V DC
power supply.
ca
r it fi
The maximum power supply capability of each input is 550 W, and the maximum
current is 15 A.
C e
&
Supports 1+1 hot backup.
Supports n g
i overcurrent protection and short circuit protection.
in surge protection.
ra
Supports
T
r it fi
Provides soft-start for the fan power supply and protects fans against overcurrent.
C e
Reports information about the fan rotating speed, alarms, version number, and board
&
in-position status.
g
n alarms when a fan fails or is aged.
i
Reports specific
inthe power supply status of a fan, and reports an alarm indicating that the
a
r supplied to a fan fails.
Detects
T
e i power
aw Reports specific alarms when the FAN board is offline and stops detecting fan status
Supports intelligent fan speed adjustments, fan speed adjustments in specific areas,
and fan shut-down at low temperature.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
The AUX board of the OptiX OSN 550 providesH uaorderwire phone port, one external
one
n
clock port, one 64 kbit/s synchronous data port, one 19.2 kbit/s asynchronous transparent
it o port.
data port, and one outdoor cabinet monitoring
e r
asynchronous transparent
Provides two BITS Cclock input/output ports whose impedance is 120 ohms.
&
Provides drygcontact signal alarm ports with six inputs and two outputs.
i n
n
i one outdoor cabinet monitoring port (sharing one physical port with a dry
ra
Provides
r
e can be installed in slots 17 and 19.
power supply and converts the
supports 1+1 hot backupCand
& fan speed adjustment, fan status detection, and fan status reporting
g
The FAN board has the
n be installed in slot 20 of the chassis.
functions, and ican
n
ai integrates auxiliary ports including external clock ports and dry contact
The AUXrboard
T
signali alarm ports, and provides two BITS clock input/output ports whose impedance is 120
e dry contact signal alarm ports with six inputs and two outputs, one orderwire phone
w
uaport that enables voice communication between the operation or maintenance engineers at
ohms,
H different sites, and two cabinet indicator output/cascading ports for engineers to monitor
device alarms through cabinet indicators.
transmission. in
g amplifies optical signals and applies to long-distance optical fiber
n
ai is a dispersion compensation board that compensates for the dispersion
The DCUrboard
T during the fiber transmission of optical signals and compresses optical signal
i
e so that the transmitted optical signals can be restored. In addition, the DCU board
accumulated
w
uacan implement long-haul transmission with optical regeneration when working with an
pulses,
RPC01 is an external forward Raman amplifier, and RPC02 is an external backward Raman
amplifier.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
Basic functions of optical amplifier units: DuringHthe ualong-haul transmission of optical
n
signals, the signal attenuation is high. Therefore, the BA and PA boards must be added to
ensure that the optical receiver receivesio
a t normal optical signals.
f i c
i
The preceding figure shows the position of a BA board in an optical transmission system.
t
r signals from the transmit end, and then transmits the
e
The BA board amplifies the optical
amplified optical signals C
to the line for long-haul transmission.
& the input and output optical power must be carefully checked to
g
For the BA board,
in all specifications can meet the optical power requirements. The BA board
n
ensure that
rai the transmit optical power of the line board to 13–15 dBm or 15–17 dBm.
increases
i T
Therefore, when the G.652 optical fiber with a loss of 0.275 dB/km is used, the
e transmission distance can reach 120 km, 130 km, or above.
w
H ua EDFA: The BA board automatically controls the optical power and laser temperature
of the erbium-doped fiber amplifier (EDFA) module, automatically monitors the input
and output optical power of the EDFA module, queries the optical power, and
protects the EDFA module. When no optical signals are input, the laser is
automatically turned off. When optical signals are input, the laser is automatically
turned on.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Answer to question 1: Hu
n
tio
SDH unit
PDH unit
ca
it fi
PCM unit
e r
EOS unit C
&
ng
SCC, cross-connect, and timing unit
i
a in
Auxiliary unit
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
Terminal multiplexer (TM): TMs apply to terminal sitesu in a network. For example, in a chain
network, TMs are located at both ends. They are used to multiplex the low-rate signals of
n of line ports or demultiplex low-rate tributary
it oNote that the line port on a TM inputs/outputs
tributary ports to the high-rate STM-N signals
C e
signals into STM-N frames (multiplexing low-rate signals to the line).
an intermediate node&
Add/Drop multiplexer (ADM): An ADM has three ports and applies to a transit site, such as
a w
MADM the cross-connect unit, line unit, and tributary unit.
H u Regenerator (REG): An REG implements the pass-through of line signals at the local site,
and regenerates, reshapes, and re-times the signals.
The OptiX OSN 2500 REG provides the following functions:
Supports STM-64 FEC, STM-64, STM-16 FEC (ITU-T G.709), and STM-16 port
rates.
Each optical interface board regenerates one channel of optical signals in the
regenerator loopback mode.
Terminates and regenerates the overhead bytes of the frame header and
regeneration section, and transparently transmits other overhead bytes,
pointers, and payloads.
Inserts the MS_AIS signal to the downstream site when the optical port detects
an R_LOS or R_LOF alarm.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Intelligent fan Hu
o n
The power supplies for fan modules back up each other.
i
When one of the fan modulesaist faulty, other fan modules operate at the full speed.
f i c
i
rt temperature is low.
Fans are shut down when
e
i n
Overvoltage
a
T r
i
Temperature detection for the board with a large heat emission.
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
OptiX OSN 500 Hu
n
tio
Supports device-level 1+1 protection for power supplies. The PIU board inputs two –
a
48 V (compatible with –60 V) DC power supplies at the same time. The two power
c
it fi
supplies back up each other. If one power supply fails, the device works normally
e r
with the other power supply.
ing
Supports device-level 1+1 protection for power supplies. The PIU board inputs two –
in
48 V (compatible with –60 V) DC power supplies at the same time. The two power
a
Tr
supplies back up each other. If one power supply fails, the device works normally
ei power supply modules to provide 1+1 protection for power supplies. Each power
with the other power supply. The APIU board supports hitless switching of two
a w
H u supply module supports protection against input overvoltage or undervoltage, output
overvoltage, output overcurrent, output short circuit, and overtemperature.
The OptiX OSN 550 supports 1+1 backup of SCC, cross-connect, timing, and line
boards.
Supports TPS protection at the E1/T1 level. The OptiX OSN 550 supports two groups
of 1:1 protection.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The OptiX NG-SDH has powerful network self-healingu
H protection capabilities and provides
n
multiple protection schemes at the SDH layer to protect services against fiber cuts, line
board damage, or node failures. it o
f i ca protection schemes that comply with ITU-T
ti standards:
The OptiX NG-SDH supports the following
e r
recommendations and international
n
ai
protection
T r
bidirectional MS shared protection ring. Both the two-fiber and four-fiber rings can
a
processing boards, 1:N TPS, 1+1 BPS, and 1+1 PPS protection for Ethernet boards,
c
it fi
1+1 protection for SCC, cross-connect, and timing boards, and 1+1 protection for
power supplies.
e r
C
Network-level protection schemes include 1+1 or 1:N (N ≤ 14) linear MSP, two-fiber
&
ng
bidirectional MS shared protection ring, two-fiber unidirectional MS private
i
in
protection ring, four-fiber bidirectional MS shared protection ring, SNCP, and MS
a
Tr
shared protection.
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
ua TPS protection switching. The
When a working PQ1 board is faulty, the deviceHperforms
on
switching process is as follows:
The cross-connect board detectstithat the working PQ1 board is faulty through the
ca
f i
rti is normal, the cross-connect board sends a switching
board status bus.
T
shared
ei The protection PQ1 board receives and processes the services that are transferred
w from the D75S board to the protection bus to complete the protection switching.
u a
H
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
When a working SEP1 board is faulty, the device H u
performs TPS protection switching. The
on
switching process is as follows:
The cross-connect board detectstithat the working SEP1 board is faulty through the
ca
f i
ti is normal, the cross-connect board sends a switching
board status bus.
r
Ceand TSB8 boards corresponding to the faulty SEP1 board
If the protection SEP1 board
message to the EU08
& control bus.
g
through the switching
T r
services
The protection SEP1 board receives and processes the services transmitted from the
TSB8 board. The protection switching is complete.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H and standby cross-connect boards.
The source service board sends services to the active
o
After service cross-connections are completed, n both the active and standby cross-connect
ti
a
boards send data to the sink service board.
c from the active and standby cross-connect boards.
idata
t
The sink service board selects thei f
r
C e
The buses of the two cross-connect boards work independently and do not interfere with
each other.
&
i ng structure indicates that the service board performs dual data feeding
The dual-bus system
a in side and selective receiving of the data from the cross-connect side.
to the cross-connect
T r
i
The cross-connect configurations of cross-connect boards A and B are the same. The
e board selectively receives services based on the service quality, status, and
w
service
H uaactive/standby status.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
A clock board traces the NE clock to ensure that u
H clock of the local NE is synchronized
the
with other NEs or reference timing units.
n
it o
a
The clock boards of an OptiX OSN 1500/2500/3500 work in hot backup mode. When the
c is automatically switched to the standby clock
active clock board fails, the clock itracing
i f
board.
e rt
C (including the clock extracted from a line and the external
The NE reference clocks
&
ng
synchronous reference clock) are sent to the active and standby clock boards at the
i
in and standby clock boards generate the synchronous system clock required
same time.
ra
T
The active
a w Clock board A provides system clocks for cross-connect board A and other service
u
H boards.
Clock board B also provides system clocks for cross-connect board B and other
service boards.
Service boards always select the clock of the active clock board. If the active clock
board is abnormal, service boards will select the clock of the standby clock board.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
SDH network topologies Hu
n
tio
An SDH network consists of multiple network nodes (NEs) that are connected
a
through optical fibers. A network topology refers to a network shape, which is a
c
it fi
geometric arrangement of network nodes and transmission lines. It reflects the
e r
physical connections of the network.
C
The validity, reliability, and cost-effectiveness of a network significantly depend on its
&
ng
specific topology.
i
a in
Generally, there are linear (chain), star, tree, ring, and mesh topologies. The linear
Tr
and ring topologies are common in SDH networks.
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
For backbone networks and large regional networks, u
H the concept of subnet is introduced to
n
facilitate routing and management. The network with a complex topology can be divided
into subsets, making the network simple it oand easy to manage.
f i ca that includes network nodes, network
ti
A subnet can be compared to a container
e r
connections (links), or even lower-level subnets.
C
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
With information playing an increasingly important u
H for all walks of life,
role
n
communications networks need to accurately and promptly transmit information among
users. Once a fault occurs on a networkio
a
the society may suffer a great loss.c(It
tis inevitable actually. For example, optical cables are
that carries increasing information at a high rate,
i
as a fiber cut) within
n
unidirectional
raiIn the case of a unidirectional ring, the routes for transmitting and receiving
T services are different when the network is normal. The services with diverse
e i
a w routes are called unidirectional services.
H u In the case of a bidirectional ring, the routes for transmitting and receiving
services are consistent, and are called uniform routes. The services with
uniform routes are called bidirectional services.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
In the view of protection mechanisms and network u
H topologies, SDH self-healing networks
on
are grouped as follows:
r t
C e
MSP ring, including two-fiber unidirectional MSP ring, two-fiber bidirectional
&
MSP ring, and four-fiber bidirectional MSP ring.
g
nprotection
i
Path (PP) ring, including two-fiber unidirectional PP ring and two-
n bidirectional PP ring.
a ifiber
T r
i Subnetwork connection protection (SNCP)
ecourse focuses on the common linear MSP, two-fiber bidirectional MSP ring, four-fiber
w
uabidirectional MSP ring, and SNCP.
This
H
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
1+1 linear MSP Hu
n
tio
The transmit end transmits services on both the working route and protection route,
a
and the receive end receives only the better service signals. Generally, the receive end
c
it fi
receives services from only the working route. When a fault occurs on the working
e r
route, the receive end receives services from the protection route.
C
In 1+1 linear MSP, services are dually fed at the transmit end, and therefore the
&
ng
protection route does not carry extra services.
i
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
According to different switching and restoration H u
modes, 1+1 linear MSP is classified into
on
single-ended and dual-ended switching modes and revertive and non-revertive modes.
In single-ended switching mode,tiswitching occurs only at one end and the status of
ca In dual-ended switching mode, switching occurs
f i
ti
the other end remains unchanged.
at both ends.
e r
In revertive mode, C
after the original working route is restored, the system
& services from the original working route after a specified
g
automatically receives
rai from the original working route even if the original working route is restored,
services
i T receives services from the original working route only when switching trigger
and
e conditions are met.
w
H ua Therefore, there are four types of 1+1 linear MSP: single-ended non-revertive mode,
a
The value of N ranges from 1 to 14, and 1:1 is a special case of the 1:N mode.
c
r it fi
In normal cases, N working routes transmit common service signals concurrently. In
e
addition, the protection route can transmit extra services (not important) or are not
C
used.
&
ing
When one of the N working systems fails, as shown in the preceding figure, when
in
the optical fiber of working route 1 between NE A and NE B is broken, the STM-N
a
Tr
signals can be switched to the protection system for transmission. When multiple
a w
H u systems are the same, the protection switching sequence is determined by the
working path ID. Therefore, working path 1 has the highest priority of protection
switching, and working path 14 has the lowest priority of protection switching.
The 1:N linear MSP switching a t the APS protocol. Devices from different
c requires
fi with each other due to different protocol processing
t i
vendors may fail to interconnect
r
mechanisms.
C e
&
1:N linear MSP supports extra services. That is, when the network is normal, the
T ra of the working system are switched to the protection path for transmission,
signals
n
configured based on TMs. In this way, even if a network fault occurs, protection switching
it o switching occurs only between two
is performed by section. That is, the protection
a on services on the entire network. For the
adjacent TMs, which minimizes thecimpact
i
f
i MSP can be configured based on TMs or ADMs.
devices such as OptiX 2500+, tlinear
r
e that linear MSP be configured based on TMs by converting
C
However, it is recommended
&
each linear ADM into two back-to-back TMs, so that section-specific switching can be
implemented. g
T r
started normally.
i
Doenot use different optical ports on the same board for the active and standby working
a w
H u routes in the same direction of linear MSP. Otherwise, the protection cannot be
implemented due to the failure of one board.
a
each NE requires two optical boards installed in paired slots to form a ring. On one
c
it fi
hand, when an SCC fails, overheads (OAM information) can pass through the paired
e r
slots, facilitating the transmission of OAM information between other sites and the
C
NMS. On the other hand, according to the engineering specifications, the two optical
&
boards of an ADM NE must be installed in two paired slots. This is especially
ing
important for the MSP ring. Otherwise, the switching time of the MSP ring may
a in
exceed the threshold (on the OptiX OSN 1500/2500/3500/7500) or the switching
Tr
fails (on the OptiX 155/622H/2500+/10G/OSN 9500).
ei Generally, in the case of a ring network, the left side of two paired slots is called or
aw
Hu
defined as west direction, and the right side of two paired slots is called or defined as
east direction. In MSP networking, when optical fibers are connected between sites,
the east optical board of a site is connected to the west optical board of the
downstream site, and these sites are connected in sequence to form a ring. In this
case, the direction from the east optical board of a site to the west optical board of
the downstream site is the major ring direction, and the reverse direction is the
backup ring direction.
n
adjacent nodes on a ring. The capacity of each optical fiber in each transmission direction is
it o to the working path, and the other half is
divided into two parts. The first half is allocated
allocated to the protection path. That
f i ca is, one optical fiber carries both the working path S1
and protection path P2, and the
r ti other fiber carries both the working path S2 and
C
protection path P1. Generally,e the working path (S1) on one optical fiber is protected by
is, the last half of g
&
the protection path (P1) on the other optical fiber in the opposite direction of the ring. That
one optical fiber protects the first half of the other fiber. For example,
n
timeslot P2 onithe S1/P2 optical fiber is used to protect the S2 service on the S2/P1 fiber,
n
r
and timeslotai P1 is used to protect the S1 service. This enables bidirectional transmission of
i T traffic.
e
working
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
In this case, the first half timeslots of each optical u
H are used as the working timeslots
fiber
n
(for example, 1# to 8# STM-1 or VC-4 paths in an STM-16 system) to transmit active
services, and the other half timeslots areit oused as the protection timeslots (for example, 9#
to 16# STM-1 or VC-4 paths in an cSTM-16
i a system) to transmit extra services. That is, the
f
ti fiber are used to protect the active services on the other
r
protection timeslots of one optical
optical fiber.
Ce
An STM-N two-fiber & bidirectional MSP ring has N AU-4s. The AU-4 timeslots numbered
g
from 1 to N/2 innthe clockwise direction are assigned to the working path, and the AU-4
i ni from N/2+1 to N are assigned to the protection path. The timeslot
raof the optical fibers in counterclockwise direction is similar. The AU-4 numbered
timeslots numbered
T
allocation
eithe working path is protected by the AU-4 numbered N/2+m of the corresponding
m in
a w
protection path in the opposite direction.
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
When the network operates normally, NE A transmits u
H protected services in timeslot S1 (For
o n P2 (For an STM-16 system, extra services
an STM-16 system, protected services use only the first eight timeslots, which are 1# to 8#
STM-1s or VC-4s.) and extra services initimeslot
a ton the S1/P2 optical fiber. NE B transparently
c
fi protected services from timeslot S1 and extra
use only 9# to 16# STM-1s or VC-4s.)
i
transmits these services. NE C textracts
rthe S1/P2 optical fiber.
C
services from timeslot P2 one
& services in timeslot S2 and extra services in timeslot P1 on the
NE C transmits protected
ngNE B transparently transmits these services. NE A extracts protected
i
S2/P1 optical fiber.
a
services fromintimeslot S2 and extra services from timeslot P1 on the S2/P1 optical fiber.
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
When optical cables are broken between NE A and
H u NE B, MSP switching occurs on the
entire network.
n
For services from NE A to NE C:
it o
f i
NE A performs bridged switching. caoptical
That is, the cross-connect unit switches services
t i
from timeslot S1 on the S1/P2 fiber to timeslot P1 on the S2/P1 optical fiber.
r services are switched from the 1# to 8# STM-1s or VC-4s on
e
(For an STM-16 system,
C to the 9# to 16# STM-1s or VC-4s on the S2/P1 optical fiber.)
the S1/P2 optical fiber
At this moment,& the extra services in timeslot P1 on the S2/P1 optical fiber are
interrupted.gNE D and NE C transparently transmit the services in timeslot P1 (the
n inpath) on the S1/P1 optical fiber to NE B. NE B performs bridged switching.
protection
a i the cross-connect unit switches services from timeslot P1 on the S2/P1 optical
That is,
r
T to timeslot S1 on the S1/P2 optical fiber. NE B transmits the services in timeslot
fiber
i
e services from NE A to NE C are protected.
S1 to NE C, and then NE C extracts the services in timeslot S1. In this manner,
w
H uaFor services from NE C to NE A:
i
services that are originally transmitted
f ca between NE A and NE B (switching section) are
protected by the protection path
r ti in the NE A–D–C–B section of the normal optical path.
e by default), if the optical path between NE A and NE B is
Within the WTR time (10Cminutes
& enters the normal state. That is, all services, including extra
normal, the entire network
g
n to the original timeslot paths. The WTR state prevents frequent
i
services, are restored
a in
network switchovers caused by the unstable optical path during optical cable repair,
T r
thereby avoiding multiple transient interruptions of services.
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
An MSP ring supports the APS protocol, and APS u
H protocol information is transmitted
through K1 and K2 bytes in the multiplex section overhead. Specifically, if the MSP ring
n all NEs on the ring must process the APS
it oproperly, involving the optical boards, SCC units,
needs to be correctly switched and restored,
ring. i n
T ra state: When a switching trigger condition is met on the ring, for example,
ei optical cables are broken, the NEs on both sides enter the switching state. That is,
Switching
a w bridged switching is performed to directly switch services on the working path to the
H u protection path through the cross-connect unit.
Pass-through state: When a switching trigger condition is met on the ring, for
example, optical cables are broken, the NEs on both sides enter the switching state.
In this case, other NEs on the ring enter the pass-through state. That is, services in
the protection path pass through all these NEs.
WTR state: When the switching trigger condition is cleared on the ring, for example,
optical cables are repaired, the NEs on both sides enter the WTR state (other NEs are
still in the pass-through state). In this case, the service status is consistent with that in
the switching state. If no switching trigger condition occurs during the WTR time, the
entire network enters the normal state. The WTR state is used to prevent frequent
switchovers caused by an unstable line. It is recommended that you set the WTR time
to 5 to 12 minutes. The default WTR time is 10 minutes.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
ua SF events, such as R_LOS, R_LOF,
The conditions of triggering MSP ring switchingHinclude
n
MS_AIS, and B2_EXC (B2_OVER) and SD events, generally referring to B2_SD. MSP ring
it o Whether the switching is triggered is
switching is based on the multiplex section.
i
determined by the quality of multiplex
f ca section signals transmitted on the ring, rather than
r ti service. Therefore, MSP is a network-level protection
the connectivity status of a certain
scheme. The MSP does notedirectly protect a service, and the MSP switching and
C
&
restoration are not affected even if there is no service on the MSP ring.
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H u
After a timeslot in a bidirectional MSP ring is occupied by a service transmitted over a
a in to the number of ring nodes. It is STM-N. When each network node has
and is irrelevant
T r with its adjacent nodes, that is, all services on a ring are scattered in a
only services
ei manner, the service capacity of the ring can reach the maximum value and is
distributed
a w to the number of nodes on the ring. It is (K/2) x STM-N, where K is the number of
related
H u nodes on the ring. Therefore, the two-fiber bidirectional MSP ring is applicable to the
scenarios where services are scattered in a ring.
In an MSP ring, the APS protocol must be used to control protection switching. The APS
protocol is complex to implement. When protection switching occurs, the protection
switching time of services is long because the APS protocol communication process of all
sites on the ring is involved. However, the protection switching time is still less than 50 ms,
which is defined in ITU-T Recommendations.
According to ITU-T Recommendations, K1 and K2 bytes are used to transmit APS protocol
information. each byte has four bits that indicate the addresses of the source node and sink
node. Therefore, the number of nodes in an MS ring cannot exceed 16.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
System architecture of a four-fiber bidirectionalH uaring
MSP
In a four-fiber MSP ring, four opticalnfibers (S1, P1, S2, and P2) are used to connect
o and S2 are working paths that transmit active
iS1
t
caand P2 are protection paths that transmit standby
two adjacent sites. Optical fibers
i
services, and optical fibers P1
f i
services. That is, opticalrtfibers P1 and P2 are used to protect the active services on
CeS2 when the working paths are faulty. Note that the service
optical fibers S1 and
& fibers S1 and S2 are opposite (uniform route and bidirectional
directions of optical
g
ring). Thenservice directions of optical fibers S1 and P1 are opposite to those of
i S2 and P2. As shown in the preceding figure, the service directions are
nfibers
a i
optical
ther same between S1 and P2 and between S2 and P1.
T
ei Note that each NE node on a four-fiber MSP ring must be configured with two ADMs.
a w An ADM has only two line ports (east and west). One pair of transmit and receive
H u optical fibers is called a line port. However, an NE node on the four-fiber MSP ring
has two line ports in the east and west directions respectively. Therefore, two ADMs
must be configured for each NE node.
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Service signal flows in normal cases Hu
n
tio
When a ring network is normal, the active services from NE A to NE D are added to
a
and dropped from NE D through the S1 optical fiber and NE F and NE E. The services
c
it fi
from NE D to NE A are transmitted through the S2 optical fiber and NE F and NE E to
e r
NE A (bidirectional services and uniform route).
C
The extra services between NE A and NE D are transmitted over the P1 and P2 optical
&
ng
fibers. NE A and NE D receive services on the working paths to interconnect active
i
in
services between the two NEs, and receive services on the protection paths to
a
Tr
interconnect standby services between the two NEs.
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
ua path
Section switching after a fiber cut occurs on theHworking
H u Based on the preceding analysis, section switching occurs only on the NEs at both
sides of the broken optical fiber, which is fast and reliable and similar to 1:1 linear
MSP. This protection scheme does not adversely affect the active and extra services
in other spans.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Ring switching after fiber cuts occurs on both the H uworking and protection paths
a in
(implementing the pass-through function) to reach NE E. On NE E, the services on the
P1roptical fiber are switched back to the S1 optical fiber because ring switching is
i T
e performed. Then, NE D receives the services from the S1 optical fiber, which are the
a w active services from NE A to NE D.
H u The switching process of the services from NE D to NE A is similar.
Ring switching requires the participation of all NEs on the ring and interrupts all extra
services.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
The four-fiber bidirectional MSP ring allows timeslot u multiplexing. There are two extreme
scenarios of calculating the service capacity. Scenario 1: A service centralization site exists
on a ring, and each NE are interconnectednwith this site for service transmission, but there
t ioNEs. In this case, the minimum service capacity of
ca and 4 x STM-N (including extra services). Either the
are no services between other adjacent
f i
the ring is 2 x STM-N (active services)
east or west side of the serviceticentralization site only supports a maximum of STM-N
e r(including extra services). Why? Answer: The rate level of the
C STM-N. Scenario 2: Services only exist between two adjacent
(active services) or 2 x STM-N
&
optical cable section is only
ngadjacent NEs that communicate with each other. For example, the A–B
NEs on a ring, and cross-NE services do not exist. In this case, each optical cable section is
i
dedicated for the
optical cablein
ra section
section transmits only bidirectional services between A and B, and the B–C
T
optical cable transmits only bidirectional services between B and C. The services
ei way,adjacent
between NEs do not occupy the timeslot resources of other optical cable sections.
a w
In this each optical cable section can transmit a maximum of STM-N (active services)
H u or 2 x STM-N (including extra services) services, and timeslot resources can be reused. The
number of optical cable sections on the ring is equal to the number of NEs on the ring.
Therefore, the service capacity in this scenario reaches a maximum of N x STM-N or 2N x
STM-N. The four-fiber bidirectional MSP ring also needs to be supported by the APS
protocol. During the switching and restoration, the optical boards, SCC units (except those
of the OptiX OSN 1500/2500/3500/7500), and cross-connect units of all NEs on the ring
must correctly transmit and process the APS protocol and cross-connect matrix. In addition,
because the system requires high redundancy and the dual-ADM configuration is used, the
cost is high.
The most outstanding advantage of a four-fiber bidirectional MSP ring is large service
capacity. If services are scattered in a distributed manner on more NEs, there will be a
larger capacity and higher path utilization.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
SNCP uses 1+1 protection and features dual feeding u
H and selective receiving. SNCP is
n
service-based. That is, no intra-site protocols are used and all monitoring and switching
operations are performed by a single site.it o SNCP is reliable and allows flexible service
configurations. SNCP can be used c toaprotect cross-subnet services in flexible networking
i f i
topologies, such as ring-chaintnetworks,
r tangent rings, intersecting rings, and dual node
e rings. In the respective of protection forms, SNCP is an
C
interconnection (DNI) in two
&
extension of path protection (PP).
g
The subnet termnhere is generic. It refers to any network topology that allows a working
ni path such a chain, ring, or complex network, or even an optical fiber.
a i
path and protection
For easy rmanagement and analysis, a subnet provides a working path and protection path
i T
to e
implement service connections regardless of its real topology.
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The protection mechanism of SNCP is dual feeding u
H selective receiving. The transmit end
and
o
sources and selectively receives one. In ithis
nway, the service is protected, which is similar to
of an SNCP service transmits two service sources, and the receive end checks the service
a t
PP.
f i c
t i
r including lower-order services such as VC-12 and VC-3 and
e
SNCP supports various services,
Cas VC-4 and VC-4 concatenation services. Hybrid SNCP
higher-order services such
& for multiple services at the same time. In addition, SNCP
protection can be configured
protection usesn g
i a single service as the basic unit. The logic and status of each SNCP service
a in of others.
is independent
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H board. For SNCP, services are
For PP, services are selectively received on the tributary
n
selectively received on the cross-connect board. Therefore, SNCP can protect pass-through
it o services dropped to the local tributary board.
services on the line while PP can only protect
f i ca
r ti
Ce
&
g
n in
r ai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
An SNCP service pair consists of one working source, u
H one protection source, and one
n
service sink. It corresponds to the SNCP protection group that is configured, managed, and
maintained. In an SNCP service pair, theio
monitored, but the working sourcecand a t protection source are two monitoring points of the
status of the sink node does not need to be
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
After the optical cable between NE B and NE CH is u
repaired, the SNCP status of NE C enters
n
the WTR state. The WTR time is 10 minutes by default, and can be to 5 to 12 minutes. In
it o are still the same as those when the optical
this case, the services on the entire network
i
cable is broken. Within the WTR time,
f ca if the optical path between NE B and NE C is normal,
the entire network enters the t
r i state. That is, all services are restored to their original
normal
C
timeslot paths. The WTR statee prevents frequent network switchovers caused by the
&
unstable optical path during optical cable repair, thereby avoiding multiple transient
g
interruptions of services.
n in
r ai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
References: Hu
n
tio
IEEE 802.1Q
IEEE 802.3X
ca
it fi
e r
C
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Currently, the standard Ethernet is seldom used, u
H the FE/GE is most commonly used. In
and
n
the future, more 10GE interfaces will be used as Network to Network Interfaces (NNIs) on
metro Ethernet. it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
At first, the 10 Mbps bandwidth provided by Ethernet u seemed to be more than enough.
Ethernet inherited some standards defined in 10BASE-T, such as Ethernet frame format,
& and structured wiring. Fast Ethernet just increased the
g
multi-port repeater, bridge
bandwidth by 10
n in times, and of course the Ethernet standard changed, too. For example,
a i that have been widely used cannot be used to carry fast Ethernet signals.
telephone lines
r
i Telectromagnetic radiation in the transmission exceeded the FCC and European
This was because the attenuation of Fast Ethernet signals was too severe on telephone lines
andethe
a w
standards. At that time, the problem was to determine whether to use a new type of cable,
i T of 15 km.
distance
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Due to the increasing demand for bandwidth, theuGigabit Ethernet standard was officially
H
released in 1998, which enables the signal bandwidth of optical fibers or twisted pairs to
reach 1 Gbit/s.
o n
i
t was responsible for the standardization of this
c a
The IEEE Gigabit Ethernet working group
fi are IEEE 802.3z (optical fiber and copper cable) and
Ce uses the modified physical layer protocol and the MAC layer
The Gigabit Ethernet standard
&
similar to Standard Ethernet and Fast Ethernet standard. To cope with the problem of
g that Ethernet works at such a high rate, the Gigabit Ethernet standard
nthe
collision and ensure
i
n previous standards.
is different from
i
ra can work in half-duplex or full-duplex mode. As the prices of related
Gigabit Ethernet
devicesTdecrease, it is widely used in the interconnection of the backbone layer, campus
ei and common devices.
w
network
u
aCompared with the traditional Standard Ethernet standards, the Gigabit Ethernet standard
H has changed greatly, but it is still regarded as an evolved Standard Ethernet technology.
Some devices have GE, FE and 10 Mbit/s ports at the same time to facilitate seamless
connection of Ethernet signals at various rates.
Gigabit Ethernet defines three types of media:
1000Base-LX – single-mode optical fiber (with a transmission distance of more than 3
km).
1000Base-SX-MMF (with a transmission distance of 300 to 550 m).
1000Base-CX – coaxial cable (with a transmission distance of more than 25 m).
1000Base-T - four pairs of unshielded twisted pairs (with a transmission distance of
100 m).
Gigabit Ethernet is an ideal solution for Ethernet backbone network.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Gigabit Ethernet supports two working modes:H uduplex
full mode and half duplex mode.
t
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
The physical layer of LAN
Hu
n
The physical layer of LAN is often used for the interconnection between routers and
tio
ca
used, the transmission distance can reach 80 km. The data rate of the physical layer
it fi
of LAN is 10.3 Gbit/s, which uses the 64B/66B coding.
r
82 m. C e
10GBASE-SR (Short Range) uses MMFs and supports a transmission distance of 26 to
&
ng
10GBASE-LRM is derived from IEEE 802.3aq and uses FDDI-grade 62.5 µm MMFs.
i
The transmission distance can reach 220 m.
a in
10GBASE-LR (Long Range) uses 1300 nm SMFs, and supports a transmission distance
Tr
of 10 to 25 km.
ei 10GBASE-ER (Extended Range) uses 1550 nm SMFs, and supports a transmission
aw
distance of 40 km.
a t services.
fi c
It is used to access 10GE Ethernet
t i
er
10GBase-SW/LW/EW WAN interface
10GBase-LX4nLAN
ai
T r
e i
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The physical layer defines the standards relevant u
H the physical media carrying TCP/IP
to
communications:
n
it o the signal characteristics such as signal level,
ca mode and signal waveform.
The electrical/optical protocols describe
f i
ti are specifications such as connector dimensions and
optical power, bit timing, encoding
e r
Mechanical specifications
transmission mediaCtypes.
&
The data link layergdefines the protocols for controlling the physical layer: how the medium
inshared, how devices on the medium are identified, and how data is framed
n
ai transmitted on the medium. Common data link layer protocols include IEEE
is accessed and
T r
before being
e i
802.3/Ethernet, IEEE 802.5/Token Ring, and FDDI/Fiber Distributed Data Interface.
a w
Network layer defines the packet format and addressing mode and is responsible for the
u
The transport layer defines protocols for controlling the network layer. Both the transport
layer and data link layer are able to perform flow control and error control. The data link
protocol controls traffic on the data link, which is the physical medium connecting two
devices. While the transport layer protocol controls traffic on the logical link, which is the
E2E connection between two devices whose logical link may traverse a series of data links.
The application layer in the TCP/IP model corresponds to the session layer, presentation
layer, and application layer in the OSI model. The application layer provides interfaces that
applications use to access the network.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
In a collision domain, a collision occurs when data H u packets from different devices are sent
to the shared medium at the same time.
n
Each device on the network can send tdata io only when the network is idle. Therefore, the
cathe network efficiency is lower when there are more
f i
ti
possibility of collisions is higher and
r
Ce
devices on the network.
Collision domain:
&
Points that g
inof a hub belong to the same collision domain, no port can receive and
share the same information channel form a collision domain. For example,
n
aidata at the same time.
if all ports
T r
send
e i
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Due to the limitation of CSMA/CD algorithm, the u
H length of Standard Ethernet should
frame
n
not be smaller than 64 bytes, which is determined by the maximum transmission distance
and the working mechanism of collisionio
a t detection.
f c
i prevents situations in which a station finishes sending
i
The use of a minimum frame length
t
r first bit of the packet has not arrived at the remote station.
e
the last bit of a packet, but the
At this point, the remoteC station senses that the line is idle and begins to send data, leading
to a collision. &
The upper layerin
g
n
protocol must ensure that the minimum length of the Data field in an
i
ra is 46 bytes. If the length is less than 46 bytes, the upper layer protocol must
Ethernet frame
fill the T
i redundant bits to make the length of the Data field reach 46 bytes. A 46-byte Data
e a 14-byte Ethernet frame header, and a 4-byte verification code form a 64-byte
w
field,
The maximum transmission distance depends on the elements such as line quality and
signal attenuation.
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
MAC: Media Access Control Hu
n
tio
A MAC address is the physical address of a network device. MAC addresses are
a
managed and allocated by IEEE and are globally unique.
c
r it fi
A MAC address consists of two parts: the device supplier code is used to uniquely
e
identify a device supplier, other bytes are allocated by the device suppliers.
C
&
A MAC address is 48 bits and is usually represented as a 12-digit string in dotted
ng
hexadecimal notation.
i
a in
The first 24 bits indicate the identifier of the device supplier, and the last 24 bits are
Tr
n
represented as FF-FF-FF-FF-FF-FF in hexadecimal notation.
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Destination MAC addresses in Ethernet frames H areuclassified into three types:
a tcan
Broadcast address: all the hosts
f i c
i
Multicast address: all thet hosts in a specified multicast group can receive and process
r
e
the frame.
C
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
The fields of an Ethernet frame: Hu
n
tio
Preamble, which is 7 bytes long. The bit pattern of each byte is 10101010, which is
a
used for timing synchronization between the transmit end and the receive end.
c
rit fi
SFD: frame start delimiter. The bit pattern is 10101011, which is used to inform the
e
receive end that the next byte is the beginning of the frame.
C
&
DMAC: destination MAC address. The length is 6 bytes.
g
n MAC address. The length is 6 bytes.
i
SMAC: source
in Length/Type. The length is 2 bytes. The meaning varies according to
a
r value:
Length/Type:
T
e i the
aw If Length/Type > 1500, it indicates the type of the data frame (the upper layer
Hu protocol type, for example, 0x0800 indicates that the Layer 3 data is an IP
packet).
If Length/Type <= 1500, it indicates the length of the data and the padding
field in the data frame.
DATA: the length is 46 - 1500 bytes. If the length of the Data field is less than 46
bytes, the field must be padded to ensure that the length of the entire frame is at
least 64 bytes.
o
A device can either receive or send datan in one direction at one time.
ti
CSMA/CD is required.
i c a
i f
e rt distance transmission.
This mode applies to short
i n
The throughput
a
r
T mode has no limitation on the transmission distance.
i
This
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
IEEE 802.3u first defined auto-negotiation, whichH umeans that auto-negotiation was
n
introduced into the 100M Ethernet, but auto-negotiation could be backward compatible
with 10BASE-T. In 1999, auto-negotiationit o was extended to IEEE 802.3ab (the Gigabit
Ethernet protocol).
f i ca
r ti transmission rates (such as 10 Mbit/s and 100 Mbit/s) and
e
For devices that support multiple
multiple working modes C (half-duplex and full-duplex), the two connected devices can use
the auto-negotiation& mechanism to determine the best communication mode, "the best"
g
means that highntransmission rate is better than low transmission rate. For the same rate,
i nimode is better than the half-duplex mode.
ra
the full-duplex
T
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
A device not supporting auto-negotiation may H failuto negotiate with a device supporting
n
auto-negotiation. A device supporting auto-negotiation can detect the rate of the
connected device based on the receivedio
a t signal, but cannot detect the full or half duplex
fi
mode of it. At this time, one devicec may work in full-duplex mode, and another device may
work in half-duplex mode. Thistisituation
r is called duplex mode mismatch. Although they
Ce
can communicate, the communication efficiency is low.
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Many new Ethernet cards, switches, and hubs can H uautomatically implement internal cross-
n
over functions, which is called automatic MDI/MDI-X identification, universal cable
it o you do not need to use cross-over cables or
identification, or auto-sensing. Therefore,
worry about using a wrong cable. ca
t i fi
e r
C
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
If a congestion occurs in the receiving queue ofH anuEthernet port (the data in the buffer of
o
signal to simulate line congestion. This imakes
n the connected device lower its transmission
the incoming port exceeds a certain threshold), the Ethernet port can send a jamming
a t
rate and avoids packet loss.
f i c
t i
r mode uses the back pressure technology to control the
e
An Ethernet port in half-duplex
C Ethernet is seldom used.
traffic. Currently, half-duplex
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Ethernet supports the flow control based on PAUSE u
H frames. A PAUSE frame can request the
n
remote station to stop sending data to the local end.
io between device A and device B. If the rate at
For example, a full-duplex connectiontexists
H u
A 42-byte reserved field is required to pad the PAUSE frame to meet the requirement of the
minimum Ethernet frame length.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
An Ethernet switch or bridge has the followingH ua
functions:
t
f i ca
Forwards frames based on destination
r ti
Filters frames based on destination MAC addresses.
e
1. A hubnworks
a i
2. T r
i
Hub: a hub works in half-duplex mode, floods packets, and is inefficient. Switch: a
e switch works in full-duplex mode, generates a CAM table by learning MAC
w
H ua addresses, prevents collisions, and creates a broadcast domain.
device Tfirst checks the destination MAC address of the frame, and then looks up the CAM
e i
table. If no entry in the CAM table matches the destination MAC address, the device
a w
forwards the frame out of all ports except port 1 and adds the source MAC address of the
H u frame into the CAM table. The mapping between port 1 and PC A's MAC address is created.
The device establishes the CAM table by using the preceding method.
If no entry in the CAM table matches the destination MAC address of the received data
frame, the device floods the frame out of all the other ports except the port on which the
frame is received. The device learns MAC addresses through flooding. Flooding does not
cause the loss of data frame because the device is transparent in the whole network when
flooding.
After learning MAC addresses for a period of time, the device establishes a CAM table and
can stably forward frames. The device directly forwards a data frame by looking up the
CAM table for the port mapped to the destination MAC address, improving forwarding
efficiency.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
When a switch receives a data frame, the device u
H the destination MAC address of the
reads
on
data frame and compares the MAC address in the CAM table.
If the destination MAC address tisi found in the CAM table, the frame is directly
ca port.
f i
ti does not exist in the CAM table, the frame is flooded
forwarded out of the corresponding
r
Ce the port that receives the frame.
If the destination MAC address
out of all ports except
&
Aging Mechanismg
i n
i n
ra
The capacity of the CAM table is limited. It contains only a certain number of entries.
i T
Switches provide a timer for each MAC forwarding entry. The timer decreases from
e an initial value. Each time the entry is used (the entry matches a received data frame),
w
ua
the timer is reset. If the entry is not matched for a long time and the timer decreases
H to zero, the entry is deleted.
The default value of the timer is 5 minutes, that is, the aging time is 5 minutes.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Cut-through mode
Hu
n
Switches operating in cut-through mode check only the first 6 bytes of a frame. The
tio
first 6 bytes represent the destination MAC address, which is sufficient for
ca
forwarding data frames. The cut-through mode has short delay, but the devices may
errors. rit fi
forward errored frames because they forward data frames without checking for
Store-and-forward mode C e
&
ng
Before forwarding data frames, the devices in store-and-forward mode check for
ni
errors so that only correct data frames are forwarded. However, the forwarding
i
efficiency is low.
T ra mode
Fragment-free
ei This mode has the advantages of both the cut-through mode and store-and-forward
w mode. Just as in the cut-through mode, the devices in fragment-free mode can
u a
H
forward a data frame after receiving the first 64 bytes instead of waiting for receiving
the complete data frame. As in the store-and-forward mode, the devices in
fragment-free mode check for errors in the first 64 bytes and discards the errored
frames.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
As shown in the figure, a switch divides a network u
H multiple collision domains. If each
into
n
port of the device connects to a hub, then each port is a collision domain.
it oa broadcast domain. Any broadcast packet is
ca and all devices can receive the broadcast packet.
The device and the connected LANs form
f i
ti
flooded in the entire broadcast domain
Too many broadcast packetsrtransmitted
e
in a broadcast domain may occupy excess
network bandwidth and C reduce forwarding efficiency. This is because the broadcast
packets are also sent&to the hosts that do not desire these packets.
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Improve bandwidth utilization Hu
n
tio
VLAN can effectively resolve the performance deterioration caused by broadcast
storms.
ca
r it fi
Enhance communication security
C e
Data frames with a VLAN ID will not be received by hosts in other VLANs, protecting
&
data security.
g
n stability
i
Enhance network
a innetwork scale expands, some network failures may adversely affect the entire
ei VLANs.
network.
a w
H u Suppress broadcast
By creating VLANs, the broadcast domain can be limited to the ports that belong to
the same VLAN.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
The 802.1Q tag header contains the following H ua
information:
f i c field:
r i
The TPID indicates the 802. 1Qt tag. The value of TPID is fixed to 0x8100.
ei inframe.
the data frame. If the CFI value is 0, the Ethernet frame is a standard Ethernet
a w If the value is 1, it indicates that the frame is a token ring or FDDI frame.
H u VLAN ID: indicates the value of the VLAN ID. There are 12 bits in total. A maximum
of 4096 VLANs are supported.
In the figure, port 1 and port a 7 tbelong to VLAN 5, and port 3 and port 10 belong to
c
fiC are connected to port 1 and port 7 respectively, so they
VLAN 10. Host A and host
t i
r host B and host D belong to VLAN 10. Therefore, host B
e
belong to VLAN 5. Similarly,
C with host A.
cannot communicate
&
If there are g
VLAN.n i n multiple switches, you can add ports of different devices in the same
i For example, you can add ports 1 to 6 on device 1 and ports 1 to 4 on device
e iPort-based VLAN assignment is the most frequently used method because its
aw
configuration is simple. You can easily define VLAN members. If the user leaves the
Hu previous port and reconnects to a port on a new device, the VLAN that the new port
belongs to must be re-specified.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
UNI Hu
n
tio
UNI port attributes include Tag aware, Access, and Hybrid.
ca
rit fi
C e
&
ing
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
In the receive direction: Hu
n
io
Add the default VLAN ID to received untagged frames.
t
Discard received tagged frames.
f i ca
In the transmit direction:
r ti
Ce ID.
Strip the original VLAN
&
g
n in
r ai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
In the receive direction: Hu
Discard untagged frames.
o n
i
t
Transparently transmit taggedaframes.
fi c
In the transmit direction:
r t i
C e
Transparent transmission
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
In the receive direction: Hu
o n
Add the default VLAN ID if receive untagged frames.
i
t
Transparently transmit taggedaframes.
fi c
t i
er
In the transmit direction:
Remove the VLANC ID if the VLAN ID in the received frame is the same as the default
VLAN ID. &
g
n in transmit the received frame if the VLAN ID in the received frame is
Transparently
ai from the default VLAN ID.
r
different
T
e i
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
If hosts in different VLANs need to communicate u
H each other, Layer 3 switches must be
with
used.
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
Question 1: Learn MAC addresses by examiningHthe uasource MAC address of each frame,
on
and forward frames based on destination MAC addresses
f i
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Concatenation is an important feature of SDH. H It isuused to transmit client signals whose
n
capacity is greater than C-4 (149 760 kbit/s) and do not introduce additional damage to
client signals. it o
f i ca that combines multiple containers so that their
tias a single container that retains bit sequence integrity.
Concatenation is a combination process
r
Ce
combined capacity can be used
Concatenation service transmission is mainly based on the new G.707 protocol of ITU-T.
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Contiguous concatenation is performed in the same u
H STM-N by concatenating contiguous C-
n
n to into a C-n-Xc to form a single structure for transmission. It can be known that the
contiguously concatenated VC-4-Xc share it o the same set of POH. Therefore, contiguous
i
concatenation must maintain continuous
f ca bandwidth during the entire transmission process.
r ti of all intermediate devices on the network, and most
This technology requires the support
& the VC-ns (which can be of the same route or different routes)
In virtual concatenation,
g
a
transmission.inEach VC-n in the virtual concatenation has an independent structure and its
own POH,
T r forming a complete VC-n structure. VC-n virtual concatenation is equivalent to
eiinterleaving. In terms of equipment, only the devices at both ends need to support
VC-n
a w concatenation technology.
the
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The concatenation indication in the AU-4 pointer u
H used to indicate that multiple C-4
is
n
payloads carried in a single VC-4-Xc must be kept together. Available capacity for mapping
it o by X (for example, when the value of X is 4,
equals the capacity of multiple C-4s multiplied
the capacity is 599,040 kbit/s; when
f i cathe value of X is 16, the capacity is 2,396,160 kbit/s).
r tifixed padding bits, and column 1 of VC-4-Xc is used as POH.
CeVC-4-Xc.
Columns 2 to X of VC-4-Xc are
This POH is allocated to the
n in set their pointers to concatenation indications. That is, bits 1-4 are set
the AU-4-Xc should
i 5-6 are not specified, and bits 7-16 are set to "1111111111". The
to "1001",abits
r
T indication specifies that the pointer processor should perform the same
i
concatenation
e
w
operations as those in the first AU-4 in the AU-4-Xc.
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
One VC-4-Xv provides a capacity of X times of H ua kbit/s for the X contiguous C-4
149,760
n
payload area (C-4-Xc), and the container is mapped to X independent VC-4s constituting
the VC-4-Xv. Each VC-4 has its own POH. it o The POH specification of each VC-4 is the same
as that of the common VC-4. The c
i abyte in the POH is used as the specified sequence
H4
f
ti (MFI) of the virtual concatenation.
r
number and multiframe indication
converted from VC4-Xc to VC4-Xvcat a tthe edge of the network that provides access for the
meet this requirement. Therefore, the services are
i ngline boards of the OptiX OSN 1500/2500/3500/7500/9500 support the
Currently, the SDH
a in
access of contiguous concatenation services.
T r data boards of the OptiX devices use the virtual concatenation mode to form VC-
ei The networking is flexible and supports multi-path transmission. In addition, the
Most EoS
a w
TRUNKs.
H u data boards can be used with the LCAS to adjust the link bandwidth.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
With the development of multi-service transmission u
H of SDH/SONET and the increasing
n
demand for access bandwidth, the original container (the maximum granularity is VC4)
cannot meet the requirements. Therefore,it o the concatenation technology is used. Virtual
i ca and higher bandwidth utilization than
concatenation allows for greater flexibility
f
contiguous concatenation. ti
e r
Both virtual concatenationC contiguous concatenation have the following issues:
and
& physical channel in the concatenation leads to the failure of the
g
The failure of any
in
n
entire concatenation channel. In other words, all the services are interrupted.
i
T ra adjustment has great impact on services. If the bandwidth is adjusted
Bandwidth
ei after a service is established, the user service is usually interrupted for a period of
a w time.
H u It takes a long time for service provisioning: The period from the time when a user
applies for a service to the time when the service is provisioned is too long.
LCAS is a link capacity adjustment scheme and an extension of the virtual concatenation
technology.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
LCAS is designed to solve the preceding problems u
H virtual concatenation and complies
of
with ITU-T standard G.7042.
n
it o end and the destination end of LCAS can
caaccording to the traffic volume of the services to be
The control mechanism between the source
f i
ti In addition, LCAS can temporarily cancel the link
dynamically adjust the VCG capacity
r
Cecontainer (MEMBER) that has mapped the service is faulty.
mapped and the required bandwidth.
when the link of the virtual
Assume that four VC-4s& are mapped to a VC-TRUNK in the normal state. When two
channels in the n g
i virtual concatenation fail, LCAS automatically adjusts the capacity of the
a in rate is reduced to prevent service data loss. After the faulty channel is
VCG. The service
a w
In addition,
H u bandwidth on the multiplex section protection (MSP) ring network, the transmission
bandwidth of the protection MSP channel can be fully used. The details are as follows: The
protection MSP channel can be used to transmit extra services, but the extra services are
not protected. Therefore, the availability is not guaranteed. If virtual concatenation is used,
some services are mapped to the working channel, and the other services are mapped to
the protection channel. If the protection channel fails, the LCAS dynamically decreases the
VCG members in a virtual concatenation group. As a result, the service transmission
bandwidth automatically decreases, and the services are not interrupted. After the
protection channel recovers, the bandwidth is automatically restored.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Encapsulation format Hu
n
tio
MSTP defines three standard encapsulation protocols: HDLC, LAPS, GFP. Vendors can
a
use different encapsulation protocols. In actual systems, one or two options are often
c
it fi
selected. However, some options are different even if the same encapsulation
protocol is used.
e r
C
The compatibility of encapsulation format is important. If the encapsulation formats
&
ng
of different vendors can be compatible with each other, then GE or FE Ethernet
i
in
services can traverse SDH networks of different vendors and the two ends of the
a
Tr
network can use SDH devices from different vendors. In this manner, the SDH
a w
H u The GFP protocol is highly standardized. It is a standard mode in which data services
are mapped to SDH/OTN and it complies with ITU-T G.7041. There are two modes of
GFP: frame-mapped and transparent. GFP collects statistics on data signals and
multiplexes the signals. GFP prevents errored frames caused by bit errors and
facilitates interworking between devices of different vendors.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H u
GFP, defined as G.7041, provides data header scrambling and multiplexes multiple physical
&
encapsulate packets of any protocols and ensure that packets of common protocols are
transmitted at thegoptical layer. It also ensures flexibility and finer bandwidth granularities.
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
GFP has two modes: Hu
Frame-mapped GFP (GFP-F)
o n
i
i n
n
raiThe
GFP-T is a block-code (8B/10B code block) oriented processing mode. It
iT
extracts a single character from the received data block and maps the character
e into the fixed-length GFP frame.
aw
Hu
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Ethernet MAC frame encapsulation Hu
n
tio
The content of the Ethernet MAC frame from the destination address to the frame
a
check sequence is placed in the GFP payload information field, and the byte order
c
it fi
and bit sequence in the GFP frame are not changed.
e
Deletion and recovery of the IFGr
C
&
When the client signal is not a local client that passes the GFP frame mapping, the
ng
IFG may need to be deleted and restored according to the following rules:
i ni IFG is deleted before GFP adaptation at the source end and is inserted
a The
Tr after GFP adaptation at the sink end.
ei
aw
When the Ethernet MAC frame is extracted from the client data, the IFG is
Hu
deleted. Then, the extracted Ethernet MAC frame is processed at the source
end of GFP, and encapsulated into GFP frames.
After the Ethernet MAC frame is extracted from the received GFP frame, the
IFG is restored. The restoration of IPGs assures that sufficient bytes that contain
00 exist between consecutively received Ethernet MAC frames to meet the
minimum IFG requirements (16 bytes).
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Question 1:
Hu
n
Function: Adjust the bandwidth as required to dynamically increase and decrease the
tio
ng
Increase and decrease bandwidth, and suppress and restore failed members using
ni
i
the handshake protocol between the source NE and the sink NE.
a
Tr the SDH overhead byte H4/K4 (H4 for the higher order virtual concatenation and
Use
ei K4
for the lower order virtual concatenation) to carry the control information and
a w perform the handshake operation between the source NE and the sink NE.
H u
Question 2:
Frame-mapped GFP (GFP-F)
The GFP-F is a PDU-oriented processing mode. It encapsulates the entire PDU into the
GFP payload area and makes no modification on the encapsulated data. It
determines whether to add a detection area for the payload area, depending on
requirements
Transparent GFP (GFG-T)
The GFP-T is a block-code (8B/10B code block) oriented processing mode. It extracts
a single character from the received data block and maps the character into the
fixed-length GFP frame.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H are transmitted by both datacom and
Of course, in real-world service scenarios, the services
n
transport networks. However, in essence, the services are Ethernet services, although the
name may vary with scenarios. it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
ua signal relay stations, indoor and
Video images of GSM-R base stations along theHrailway,
n
outdoor units in the traction equipment room, indoor and outdoor units of power stations,
and railway bridges. it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H and scheduling services and is one
The power scheduling data network carries production
n
of the core information networks of the power industry.
it o data is transmitted in the transmission
ca of Ethernet services.
In the power scheduling system, the scheduling
network and data network in theiform
ti f
r
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H and county-level units have their own
In the government network system, municipal units
intranets.
n
it o
f i ca
r ti
Ce
&
g
n in
r ai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
EPL: Ethernet Private Line Hu
n
tio
Features: Bandwidth is not shared, data is not forwarded based on MAC addresses,
a
and the topology is point-to-point.
c
rit fi
EVPL: Ethernet Virtual Private Line
C e
Features: Bandwidth is shared, data is not forwarded based on MAC addresses, and
&
the topology can be point-to-point or point-to-multipoint.
g
EPLAN: EthernetnPrivate LAN
n i
i
a Bandwidth is not shared, data is forwarded based on MAC addresses, and
r
Features:
T topology is multipoint-to-multipoint.
i the
e Ethernet Virtual Private LAN
w
ua
EVPLAN:
H Features: Bandwidth is shared, data is forwarded based on MAC addresses, and the
topology is multipoint-to-multipoint.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
EPL service is transparent, which means that the H u
access, termination, and intermediate
n
transport devices form a private line for the user data.
it ooccupies a VCTRUNK and does not need to share
ca the EPL service has strict bandwidth guarantee
In the EPL service, each user exclusively
f i
ti require other QoS mechanisms and security mechanisms.
the bandwidth with other users. Therefore,
and user isolation, and does r
Ce
not
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
As shown in the preceding figure, the service isH ua
transmitted transparently end-to-end,
without bandwidth sharing.
n
it o data services through the Multi-service
r a of the line and be isolated from other services to ensure security. This
bandwidth
n
resources. In this case, the VLAN ID, MPLS label, or QinQ technology can be used to isolate
data of different users. it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
ua labels, and QinQ VLAN tags.
EVPL services can be isolated by VLAN ID labels,HMPLS
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
a w
Hu
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H and VCTRUNKs.
EVPL services allow for the sharing of physical ports
IDs.
a
ic the data of different users can be isolated by VLAN
i f
rt tags.
In the case of VCTRUNK sharing,
IDs, MPLS labels, andeQinQ
C
&
In MSTP networks, the most common method is using VLAN IDs.
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Using VLAN IDs, ports on Ethernet service process H uboards can be shared, providing
n
flexibility in networking. P2MP transparent transmission can be provided for users. The data
frames from one Ethernet port can be sent it o to different destinations based on the VLAN IDs,
and the data frames from multiplecsources
i a can be aggregated on one destination Ethernet
ti f
port.
r
In the preceding figure: Ce
n
aiThe bandwidth is allocated based on VCTRUNKs. The services of a VLAN are
The data
T r
i
n
case, VCTRUNK sharing can be implemented to transmit Ethernet data from multiple VLANs
through the same VCTRUNK channel. Inio
a t this case, the bandwidth for a VLAN cannot be
guaranteed.
f i c
r t i
e
As shown in this figure:
C frames and scheduling data frames share the same VCTRUNK
The surveillance data
&
g
and are distinguished by VLAN IDs.
n
When n i
a i multiple VLANs share a VCTRUNK, the bandwidth resources for a VLAN cannot
berguaranteed.
T
ei If two VLANs share the same VCTRUNK and one VLAN occupies 90% of the
w
ua
bandwidth, only 10% of the total bandwidth is available to the other VLAN.
H The Committed Access Rate (CAR) function can be used to control the access
rate of ports by setting the committed access rate (CIR) parameter for different
users.
In this mode, services can be converged and bandwidth can be shared on the line. Multiple
services can share a VCTRUNK and be distinguished by VLAN tags. Users sharing a
VCTRUNK compete for bandwidth. Therefore, this method is suitable for users whose
service peaks occur in different periods of time.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
EPLAN uses Layer 2 switching. EPLAN supportsH allunetworking types of EPL and EVPL,
n
except MPLS. EPLAN also supports multi-point networking.
it o N1EGS4, N3EGS4, and N1EAS2 boards of
a
Currently, only the N2EFS4, N4EFS0, N1EMS4,
the NG-SDH series support EPLANic(IEEE 802.1d bridge) services.
ti f
r
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
As shown in the figure, Hu
n
tio
The three branch offices of company H are connected to NE A, NE B, and NE D,
a
respectively. The branch offices need to exchange information with each other. In
c
it fi
this case, the Ethernet board of NE B needs to implement the Ethernet Layer 2
switching function.
e r
C
The EPLAN service realizes the multi-point dynamic sharing of Ethernet services,
&
ng
which complies with the dynamic features of data services and saves bandwidth
ni
resources.
i
a broadcast storms, Ethernet EPLAN services must be loop-free. Therefore,
Torprevent
T
ei ifprevent
the ring topology is used, the Spanning Tree Protocol (SPT) must be enabled to
H u
EPLAN is implemented based on IEEE802.1d. Therefore, EPLAN is also called 802.1d bridge.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
IEEE 802.1q bridge: Supports one layer of VLAN u
H for data isolation. The 802.1q bridge
tags
n
checks the VLAN tags of the data frames and performs Layer 2 switching based on the
destination MAC addresses and VLAN IDs it o of the data frames.
i a of company H need to communicate with each
coffices
f
ti company G need to communicate with each other, and the
As shown in the figure, the branch
other, and the branch officesrof
data of company H needs Ctoe be isolated from that of company G. Therefore, the virtual
&on NE B needs to distinguish the data of the two companies by
bridge (VB) configured
g
VLAN IDs.
n in
i connected to the VB on NE B include PORT 1, PORT 2, VCTRUNK 1, and
Theaports
T r
e i VCTRUNK2, and a VLAN forwarding table needs to be configured.
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
IEEE 802.1ad bridge: Data frames with two layers u
H VLAN tags are supported. The outer S-
of
n
VLAN tag is used for VLAN isolation. Only the ports whose port attributes are C-Aware and
S-Aware can be used. it o
f i cacheck the VLAN tags of the data frames and performs
i the destination MAC addresses.
The 802.1ad bridge does not
ton
g
switching based on the destination MAC addresses and S-VLAN IDs of the data
frames. in
a inthe figure, the VoIP and high-speed Internet services of the two residential
T
As shown r in
e i
communities need to be separately connected to the VoIP server and the high-speed
a w access server, respectively. During transmission, the VoIP and the high-speed
Internet
H u Internet services need to be separately scheduled and isolated at the transmission network
side. In this case, the VB configured on NE B needs to add different S-VLAN tags to data
frames to identify the two types of services.
When the services arrive on the VB on NE B, S-VLAN tags need to be added. When
the services arrive on the next hop, the S-VLAN tags need to be stripped.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
IEEE 802.1q bridge: Supports one layer of VLAN u
H for data isolation. The 802.1q bridge
tags
n
checks the VLAN tags of the data frames and performs Layer 2 switching based on the
destination MAC addresses and VLAN IDs it o of the data frames.
f i ca based on page 20 and the actual situation on the
ti
Typical scenarios: Discuss this question
live network to deepen your runderstanding.
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H Ethernet services.
This section describes the parameters for configuring
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H Ethernet services during port
This section describes the parameters for configuring
n
configuration. For details about the service configuration methods, see the subsequent
configuration course. it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
Disabling an Ethernet port may interrupt services.
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Working mode: When setting this parameter, you u
H ensure the working modes of the
must
n
interconnected ports are the same. Otherwise, the services are unavailable.
i f i
100M full-duplex, 1000M half-duplex, 1000M full-duplex, 10GE full-duplex LAN,
t
10GE full-duplex WAN,r and 10GE full-duplex WAN (SONET mode).
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H faults, but services are interrupted.
MAC loopback and PHY loopback are used to locate
n
The two functions are mutually exclusive. When MAC inloop is configured, PHY inloop
cannot be configured, and vice versa. io
a t
fi c
r t i
C e
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H services.
Configuring the ports of Ethernet boards may interrupt
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
a w
Hu
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H are tagged.
All Ethernet packets that arrive on an Ethernet board
a
caution needs to be exercised. For example,
ic untagged data packets and the VLAN ID carried in the
i f
connected to a port can receive only
i f i
attribute of the port, that is, whether
format.
&
A P port is agport connected to the service provider network. Therefore, a P port
n encapsulated data packets.
iMPLS
n
ai
receives
T r
e i
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
uaactual service requirements. For
Select the level of the bound paths according toHthe
n
example: To configure the 10Mbit/s service, select VC12-xv. To configure the 100Mbit/s
service, select VC3-xv. it o
f i cathe bound paths are displayed in a centralized manner.
ti displayed in a distributed manner.
If you select Display in Combination,
Otherwise, the bound paths r
Ce
are
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Broadcast Packet Suppression Threshold: Hu
n
tio
After broadcast packet suppression is enabled, broadcast packets are suppressed
a
when the bandwidth occupied by broadcast packets exceeds the total bandwidth of
c
it fi
the port multiplied by the suppression threshold.
e r
C
&
ing
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Loop Detection: Hu
n
tio
For the external physical interface of the board, the transmit end is connected to the
receive end by a fiber.
ca
r it fi
The two external physical ports on the board are connected to each other through
fibers.
C e
&
A cross-connection is created on the same VCTRUNK of the board.
n g
i
A cross-connection is created between different VCTRUNKs of the board.
in
ra
i T
e
aw
Hu
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
If the value of Scramble for the VCTRUNK of the u
H equipment is different from that of
local
n
the interconnected equipment, the service is interrupted.
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Extension Header Option: Hu
n
tio
Specifies whether Mapping Protocol of the GFP protocol supports the extension
header.
ca
rit fi
This parameter takes effect only when Mapping Protocol is set to GFP.
C e
For the N1EFT8, N1EFT8A, R1EFT4 or N1EAS2 board, if the value of Extension
&
Header Option is inconsistent for the VCTRUNK ports of the interconnected
ng
equipment at the two ends, the service is interrupted. Moreover, the FCS_ERR alarm
i ni
is reported.
T raProtocol is set to HDLC or LAPS and the value of Check Field Length is different
If Mapping
eithat for the interconnected VCTRUNKs at the two ends, the service is interrupted.
from
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
LCAS is a bidirectional protocol, which can run H ua only when bandwidth is available
normally
n
in both directions of physical channels. If bandwidth is available only in one direction, the
bandwidth adjustment result of the LCAS it omay not be correct.
i a to the following principles:
cadhere
f
rti are Huawei devices, use Huawei mode at both ends.
When configuring the LCAS mode,
&
If a Huawei device is interconnected with a third-party device, set the mode to the
same one atgboth ends based on the modes supported by the third-party device.
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
WTR Time (s): The fault recovery time of the LCAS u
protocol is affected. After the network
n
recovers from a fault, the LCAS protocol can recover only after a WTR duration.
it o
ca
Value range: 0-720.
f i
Default value: 300 (s)
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Answer: Hu
n
tio
False.
ca
rit fi
C e
&
ing
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H u
In the preceding figure, the XML/CORBA/SNMP/FTP/TL1/112 test interfaces are northbound
n
interfaces (NBIs). The U2000 offers network monitoring information, such as the alarm,
performance, and inventory information, it ofor OSSs through NBIs. The NBIs support network
i
management functions, such as service
f ca configuration and diagnostic tests. Through NBIs,
r i
the U2000 can integrate with tdifferent OSSs flexibly.
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
In the U2000 single-server system, there is onlyH uaU2000 server but multiple U2000
one
n
clients. The clients can gain access to the server at the same time.
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
In single-server system deployment mode, onlyH uaU2000 server is deployed, and all
one
n
processes are running on this server. Multiple clients can be connected and operated.
it o and the cost is low. However, it does not provide
ca
The single-server system is easy to deploy
high reliability and is weak in risk iresistance.
t i f If high reliability is required, the U2000 HA
e r
deployment solution is recommended.
The single-server system C can be deployed on the Windows, Solaris, or SUSE Linux operating
&
r a
T
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
The U2000 manages the network, devices and H ua and stores a large quantity of
services,
n
crucial data. Due to the importance of the U2000, it must be highly reliable to run 24 x 7,
and measures must be in place to ensureit oavailability in case of various disasters. In addition,
a systems and services after a disaster occurs. The
the U2000 must be able to quicklycrecover
i
ti f
r
HA solution uses a physical redundancy mechanism. The standby system automatically
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
A remote HA system consists of a primary site and u
H secondary site. Both sites can run on
a
n
Solaris or Linux and support multiple clients. During deployment, you can deploy the
servers at the primary and secondary sitesit o in the same place (local) or in different cities
(remote). Ensure that the hardwareca
f i configurations of the primary and secondary sites are
the same.
r ti
Ce on Veritas. Veritas not only synchronizes data between the
The remote HA system relies
primary and secondary &sites in real time but also monitors the running status of the U2000.
g
n site is faulty, the network monitoring service is automatically switched to
i
When the primary
a
the secondaryin site.
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
A local HA system consists of a primary site andH au
secondary site. The primary and
n
secondary sites can be deployed only on SUSE Linux operating systems and support
multiple clients. During deployment, deployit o the servers at the primary and secondary sites
in the same place (local) and ensure
f i cathat the hardware configurations are the same at the
two sites.
r ti
The local HA system reliesCone Veritas. Veritas not only synchronizes data between the
primary and secondary &sites in real time but also monitors the running status of the U2000.
g
n site is faulty, the network monitoring service is automatically switched to
i
When the primary
a
the secondaryin site.
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
In a standalone system (Vmware, PC server), VMwareu
H software is installed on a PC server to
n
create one or more virtual servers. The U2000 is installed on a virtual server.
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
In a standalone system (VMware, E9000 blade H ua a blade server and a disk array are
server),
n
used. VMware software is installed on each blade of the blade server. The VMware
it oservers, and the U2000 is installed on a virtual
software is used to create multiple virtual
r
automatically
T installed on the other blade manages multiple ESXi hosts, allowing all blades
i
eVMs in the system to form a cluster. When a blade is damaged, VMs running on the
The vCenter
w
uablade are automatically migrated to the backup blade, achieving local hardware HA.
and
H
Terms:
vCenter: You can use the vCenter server to manage multiple ESXi hosts at a time.
Using vCenter Server to manage multiple hosts allows you to experiment with
advanced management options, such as resource sharing, and all of the other
options available within the vSphere environment.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Note: Hu
n
tio
The configuration refers to the hardware configuration of a VM, not the physical
a
hardware configuration of the server where the VMware ESXi is installed. Huawei
c
it fi
RH5885H V3 PC servers and E9000 blade servers are recommended for installing
VMware ESXi servers.
e r
C
&
ing
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Note: Hu
n
tio
In the scenario of managing single-domain devices on an access network, the
a
following servers can also manage medium-scale networks.
c
rit fi
RH2288H V3: 1. CPU: two hexa-core Xeon CPUs, 2.4 GHz or higher; 2.
e
Memory: 64 GB or more; 3. Hard disk: 8*300 GB or more
C
&
The configuration refers to the hardware configuration of a VM, not the physical
ng
hardware configuration of the server where the VMware ESXi is installed. Huawei
i
in
RH5885H V3 PC servers and E9000 blade servers are recommended for installing
a
Tr
VMware ESXi servers.
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Note: Hu
n
tio
In the scenario of managing single-domain devices on an access network, the
a
following servers can also manage medium-scale networks.
c
rit fi
RH5885H V3: 1. CPU: 4 octa-core Xeon CPUs, 2.0 GHz or higher; 2. Memory:
e
64 GB or more; 3. Hard disk: 8*300 GB or more
C
&
The configuration refers to the hardware configuration of a VM, not the physical
ng
hardware configuration of the server where the VMware ESXi is installed. Huawei
i
in
RH5885H V3 PC servers and E9000 blade servers are recommended for installing
a
Tr
VMware ESXi servers.
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Note: Hu
n
tio
In the scenario of managing single-domain devices on an access network, the
a
following servers can also manage medium-scale networks.
c
rit fi
RH5885H V3: 1. CPU: 4 octa-core Xeon CPUs, 2.0 GHz or higher; 2. Memory:
e
128 GB or more; 3. Hard disk: 2 *300 GB or more
C
&
ing
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The U2000 supports only simplified Chinese andH u
English operating systems.
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
A U2000 client can be installed on a Windows H OS.uCurrently, the U2000 client cannot be
installed on a SUSE Linux or Solaris OS.
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The connection mode between the U2000 andH theuDCN depends on the spatial relationship
n
between the U2000 and the connected NE. If the U2000 is near the connected NE (for
it o
example, they are in the same telecommunications room), they can be connected through a
i ca
LAN. If the U2000 is far from the connected
f
NE, they can be connected through dedicated
r ti networking mode.
lines; this is similar to the out-of-band
Disadvantages: When&
g the network fails, the service channel between NMS and the
managed network
n in is interrupted and the U2000 cannot launch maintenance tasks.
r ai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
In out-of-band networking mode, the U2000 can H uconnect to managed devices through a
n
DCN, E1 lines, or routers. In this example, the U2000 manages devices through a DCN.
it o to the managed network. The U2000
canetwork through the DCN that consists of other
Devices managed by the U2000 are connected
f i
ti
connects to devices on the managed
devices.
e r
Advantages: The U2000 C does not directly connect to its managed devices. Instead, the
&by dedicated equipment, which ensures more reliable management
g
connection is provided
n
channels. When ina managed device fails, the U2000 can quickly identify the information
i device and monitor the device in real time.
about theafaulty
T r
e i
Disadvantages: The out-of-band networking constructs a network that consists of extra
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Security management implements security control u
H the NMS. It ensures the security of
on
n
the U2000 through user management, operation authorization (rights-and domain-based
management), user login management,io
a
can manage logs generated duringcuser
t login, user operations, and U2000 running. It also
and a series of other security policies. The U2000
n
topology view. You can learn the network structure and monitor the operating status of
it o the topology view.
the entire network in real time by browsing
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Monitoring NE performance: This function supports u
H the following NE-level performance
indicators:
n
it o
ca
CPU usage
f i
Memory usage.
r ti
Hard disk usage
Ce
Monitoring network & traffic: This function is used to collect the traffic statistics of network
g
ports, including:n
n i
i
a traffic
T r
Incoming
e i
Outgoing traffic
w
H ua Packet error rate
Monitoring SLA data: This function supports multiple types of SLA data, including:
Delay, jitter, and loss ratio of ICMP, TCP, UDP, and SNMP packets
Connection delay and download speed of Internet services such as HTTP and FTP
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Uploading: The data on NEs is reported to the U2000
H u and overwrites the original NE data
on the U2000. The data that is present on the U2000 but absent on the NEs is not deleted.
o nis applied to the NEs; the original data on the NEs
Downloading: The NE data on the U2000
t i
is overwritten.
c a
i NE data on the U2000 is consistent with the data on
Consistency check: Verifies thatifthe
t
r U2000 will synchronize or upload the NE configuration
data. C e
the NEs. If it is inconsistent, the
&
n gNEs but absent on the U2000) to the NE layer on the U2000. The data
Synchronization: Uploads the inconsistent data (including the conflicting data and the data
i
that is present on
n on both the U2000 and the NEs is not uploaded, and the data that is
i
that is present
present on
T rathe U2000 but absent on the NEs is not deleted.
ei
Duplication: For NEs of the same type and of the same software version, if the
a w
configuration data of an NE to be configured is the same as that of a configured NE, you
H u can configure the new NE by duplicating the data of the configured NE. Duplicating the NE
data only changes the data on the U2000 and does not affect the data on the NE. To make
the duplicated data take effect on the NE, you need to apply the configuration.
Preconfiguration: The configuration data of an NE is saved only at the NE layer on the
U2000 and does not affect the actual configuration data on the NE. The preconfiguration
function is generally used for large-scale service adjustment or expansion.
Initialization of the NE data on the U2000: The NE data is deleted from the NE layer on the
U2000. The NE will be unconfigured after the initialization.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H u
Saving: After the system is configured, the configuration data is saved in the memory or
n
hard disks of NEs so that the data will not be lost when the system is restarted.
it o
a
Backup: Backs up NE data (such as configuration data/data file) to storage devices other
than NEs. The backup data is usedicfor restoring NE data. If the U2000 has the rights to
t i fbackup, or restoration operation is being performed on the
e
manage the NE and no loading, r
NE, the NE will accept theC request to back up the data. The U2000 then transmits the
contents to be backed &up to the specified backup directory on the server by using a
g
n And the backup data can be also backed up to the client, or to the third
i
transfer protocol.
part server. in
T ra
on e
i
Policy management: Setting policies in advance enables the system to perform operations
w NEs periodically or when trigger conditions are met. This is applicable to routine NE
H uamaintenance. A policy is periodic. It is used for operations that are performed frequently,
such as data saving and data backup. You can select a policy based on the scenarios at the
sites.
Loading: Loads software for upgrading an NE. If the U2000 has the rights to manage the
NE upgrading and no loading, backup, or restoration operation is being performed on the
NE, the NE will accept the request to load the software.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
The logs of the U2000 are classified into operation u logs, system logs, security logs, and NE
n
logs. The logs can be saved to TXT, HTML, CSV, PDF, XLSX, and XLS files.
it o operations that users performed, such as
f
ti that the U2000 automatically performed, such as
disabling the alarm sound.
r
Cetasks.
System logs record the operations
scheduled tasks and system
&
g
inand unlocking.
Security logs record the security-related operations that users performed, such as login,
i n
logout, lockout,
ra
i T operation logs record the operation results of managed NEs. You can acquire the
NE Syslog
NEeoperation logs from the U2000 client instead of having to do so from each NE. This
a w is applicable to access OLT, MDU, MSAN, and DSLAM series NEs.
function
H u
NE Syslog running logs record the running information of NEs managed by the U2000. The
U2000 obtains all Syslog running logs from NEs. Therefore, you can acquire the Syslog
running logs of the managed NEs from the U2000 instead of having to do so from each NE.
This function is applicable to routers, switches, and service gateway NEs.
NE security logs record security-based operations that all NE users perform on an NE. You
can view the NE security logs on the U2000, rather than viewing them on each NE. The
U2000 allows you to browse security logs of transport NEs.
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Note: Hu
n
tio
In a Solaris/SUSE Linux operating system, the U2000 license file must be in the UNIX
a
format and cannot be in the DOS format.
c
rit fi
The network adapter where the ESN bound to the U2000 license file is located
cannot be disabled.
C e
&
The U2000 provides a 60-day grace period for permanent commercial licenses. No
ng
grace period is provided for other types of licenses.
i ni license items that are allowed to be overloaded within the grace period
a The
Tr can continue to be added, and the added resources can still be used. You can
ei use the MTOSI XML NBI to synchronize NE inventory and alarm information on
aw the entire network.
Hu After the grace period expires, a warning or alarm is displayed indicating that
the grace period has expired. In this case, access of new NEs or service objects
cannot be provided. You need to apply for a license as soon as possible.
Otherwise, some functions will become unavailable. When the MTOSI XML NBI
is used to synchronize NE inventory and alarm information on the entire
network, an error message is displayed indicating that the number of
equivalent NEs exceeds the license limit.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Note: Hu
n
tio
Incremental update: Update product license files based on the file type (commercial
or temporary).
ca
r it fi
Full update: Replace all the product license files.
C e
&
ing
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Answer: Hu
n
tio
ABCD
ABC
ca
it fi
e r
C
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Choose File > Discovery > NE... from the Main Menu.u
H The NE Discovery window is displayed.
Click the Transport NE Search tab.
n
it o list of Search Mode. In the Search Domain
ca Search Domain dialog box is displayed.
Select the search mode from the drop-down
f i
ti is complete.
dialog box, click Add. Then, the Input
r
Ce
Click Next and wait until the search
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Choose File > Discovery > NE... from the Main Menu. u
H You can also right-click in the Main
n
Topology and choose New > NE from the shortcut menu.
it odialog box, select the NE type of the NE to be
ca
On the Object Type tree of the displayed
f i
rtishown in the following figure.
created.
&
To create a gateway NE or a non-gateway NE, perform the following steps:
If the NE nis g
i a non-gateway NE, set Gateway Type to Non-Gateway and select the
in of the NE.
a
gateway
r
IfTthe NE is a gateway NE, set Gateway Type to Gateway.
ei Select the protocol type of the gateway. Generally, IP is selected.
a w
The default user name is root and the default password is Changeme_123. If you
have changed the NE user name or password, ensure that the user name and
password are the same as those on the NE.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
Some basic concepts in transport network dataH ua
management must be understood.
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The U2000 provides a variety of functions to ensure
H u the security and consistency of the NE
configuration data. The basic functions include upload, download, consistency check,
synchronization, duplication, preconfiguration,
o n and NE data initialization on the U2000.
t i
Uploading:
c a
i function to upload the NE data to the U2000.
When creating an NE, useifthis
t
r it is recommended that you upload the NE data to the
e
Cuploading function.
After the U2000 is upgraded,
U2000 by using the
If there are g
&
many unsynchronized items, you can use this function to upload NE data
i n
n
to the U2000.
i
a The data on the U2000 is applied to the NEs; the original data on the NEs is
T r
Downloading:
i
overwritten.
e
a w
Consistency check: Verifies that the data on the U2000 is consistent with the data on the
H u NEs. If it is inconsistent, the U2000 will synchronize or upload the NE configuration data.
Synchronization: Uploads the inconsistent data (including the conflicting data and the data
that is present on NEs but absent on the U2000) to the U2000. The data that is present on
both the U2000 and the NEs is not uploaded, and the data (user-defined NE data on the
U2000) that is present on the U2000 but absent on the NEs is not deleted.
Duplication: For NEs of the same type and of the same software version, if the
configuration data of an NE to be configured is the same as that of a configured NE, you
can configure the new NE by duplicating the data of the configured NE. Duplicating the NE
data only changes the data on the U2000 and does not affect the data on the NE. To make
the duplicated data take effect on the NE, you need to apply the configuration.
Preconfiguration: The configuration data of an NE is saved only on the U2000 and does not
affect the actual configuration data on the NE. The preconfiguration function is generally
used for large-scale service adjustment or expansion.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H Data from the main menu.
Choose Configuration > Synchronize NE Configuration
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
Select one or more NEs from the object tree onH ualeft, and then click the arrow button.
the
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H click Synchronize or right-click the
Select one or more NEs that are not synchronized, and
n
NEs and select Synchronize from the shortcut menu.
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
The synchronization is complete. Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Select the NE whose data is to be configured. Hu
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Select Initialize and Manually Configure NE Data u
H click Next. Then, the Confirm dialog
and
n
box is displayed, indicating that manual configuration clears the data on the NE.
it o
f i ca
r ti
Ce
&
g
n in
r ai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H that manual configuration interrupts
Then, the Confirm dialog box is displayed, indicating
n
the service on the NE. Click Yes. Then, the Set NE Attribute dialog box is displayed.
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Set NE Name, Equipment Type, NE Remarks, andHuShelf Type.
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
Click Next. The NE slot layout window is displayed. u Add boards based on the actual
conditions.
n
it othe logical boards of the NE.
a
Click Query Logical Information to query
icquery
Click Query Physical Informationifto
o n
Select Verify and Run according to the requirements and click Finish.
ti the configurations will be verified. After you click
a
ic to the NE to complete basic configurations of the
If the Verify and Run option is selected,
Finish, the configurations will beifapplied
e rt the NE becomes operational.
NE. After the verification succeeds,
C
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Select the NE whose data is to be uploaded. Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Select Upload and click Next. The Confirm dialog u
H is displayed, indicating that uploading
box
NE data to the U2000 may take a long time.
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Click Yes to start the upload. When the uploading u
H completed, the Operation Result
is
n
dialog box is displayed, indicating that the operation succeeded.
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Click Close to complete the uploading. Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Procedure: Hu
n
tio
on the Main Topology of the U2000, right-click the NE whose ID needs to be
a
changed. Then, select NE Explorer.
c
rit fi
Choose Configuration > NE Attribute from the Function Tree.
C e
Click Modify NE ID in the lower right corner of the window.
&
Enter New ID and New Extended ID. Click OK.
ng
i ni
In the displayed Warning dialog box, click OK.
T ra the NE ID is a dangerous operation, which may interrupt NE
Note: Modifying
ei
communication.
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Procedure: Hu
n
tio
On the Main Topology of the U2000, right-click the NE whose IP needs to be
a
changed. Then, select NE Explorer.
c
r it fi
Choose Communication > Communication Parameters from the Function Tree.
C e
Set the communication parameters of the NE, including IP address, subnet mask, and
&
gateway IP Address.
g
n In the displayed Warning dialog box, click OK. In the Operation Result
dialogin
i
Click Apply.
fi c
Close the Operation Result dialog box.
diagram.
r t i
C e
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
In the Main Topology, double-click the icon of the u
H to open the NE Panel.
NE
drop-down list.
ic a
i f
e rt
C
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Choose File > Discovery > Fiber/Cable/Microwave u
H from the Main Menu.
Link
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
In the left pane, select ports from one or more H u
NEs.
n
it o
f i ca
r ti
Ce
&
g
n in
r ai
i T
e
a w
Hu
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Click Search to search for the fibers or cables. Hu
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
In the displayed dialog box, click Yes. A progress u
H is displayed indicating the operation
bar
progress.
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Wait until the fiber search is complete. Hu
n
a tio
c
rit fi
C e
&
ing
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H is successful. Click Close.
A dialog box is displayed, indicating that the operation
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H u
Select one or more fibers from the Physical Fibers/Cable Link List and click Create
Fiber/Cable.
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
a w
Hu
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Choose System > DCN Management from the main u
H menu.
Click the NE tab and click Refresh to checknwhether the Communication Status of the non-
io
t
ca
gateway NE is Normal.
i f i
t
Select an NE. Right-click in the Communication Status column and select Test NE from the
r Result dialog box is displayed indicating the test result of the
shortcut menu. The Operation
C e
non-gateway NE.
&
Click Close.
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Choose System > DCN Management from the main u
H menu.
o
Click the GNE tab. In the Filter window that n is displayed, set the filtering conditions, and
ticommunication status of the GNE.
a
then click OK. Click Refresh to view the
ic from the shortcut menu. The Operation Result dialog
Right-click an NE and select TestifGNE
rttest result of the GNE.
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
Set the synchronization mode. If an NTP server H ua
is configured for the U2000 and NEs, set
n
the synchronization mode to standard NTP. If no NTP server is configured, the default
synchronization mode is U2000. it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H with NM Time button, and check
Select one or more NEs in the list, click the Synchronize
n
whether NE Current Time is synchronized with the NM Time.
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
To query operation logs, choose AdministrationH>u
Log Management > Query Operation
Logs from the Main Menu.
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
In the Filter dialog box, set filtering conditions, H uclick OK.
and
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H menu to view information, save all
In the query result window, you can use the shortcut
n
records, save selected records, save specified records, print all records, print selected
it o
records, print specified records, and search.
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The U2000 supports manual and scheduled backup. u
H To reduce daily maintenance work,
n
you are advised to configure scheduled backup.
it obackup every week to ensure that the scheduled
ca
You are advised to check the scheduled
f i
ti to ensure that the disk space is always sufficient.
backup is running properly.
r
Ce
Clear backup data files periodically
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
Choose Administration > Back Up/Restore NMSH ua> Database Backup from the Main
Data
Menu.
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
Choose Administration > Back Up/Restore NMSH ua> Import/Export Script File from the
Data
Main Menu.
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Click the TXT or XML button. Hu
n
tio
Select Export.
ca
rit fi
C e
&
ing
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Select the script file type in Script File Type. Hu
n
tio
Select the NE for which you want to export script files from the Export NE List on the left.
ca
r it fi
C e
&
ing
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
to u
Click Create File Directory to create a directory H save the exported script files.
t
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
A Confirm dialog box is displayed, indicating that u
H NM and NE data has been
the
synchronized before the export.
n
it o
Click OK.
i a
cclick
t i
In the Operation Result dialog box,f Close.
r
C e
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Choose Administration > NE Software Management u
H > NE Data Backup/Restoration from
the Main Menu.
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
In the NE View area, select one or more NEs ofH usame
the type.
n
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
In Backup To, select the location where the data u
H to be backed up.
needs
Select NMS Client if the data needs a totbe backed up to the NMS client.
ic
i f
e rt
C
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H Status indicates the progress of the
Click Start to start the backup operation. Operation
n
backup operation. After the backup operation is successful, Operation Status displays a
message, indicating that the operation iisosuccessful.
a t
fi c
r t i
C e
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
In the NE Explorer, choose Configuration > Board u
H Protection.
1+1
o
Right-click the main control board in the listn and select Working/Protection Switching.
ti
ic a
i f
e rt
C
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Answer: Hu
n
tio
A
B
ca
it fi
e r
C
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Chapter objectives Hu
o
Understand the basic concepts of WDM.n
i
fi c
of WDM.
t i
rand technical characteristics of WDM.
C e
Know the background
&
i ng
a in
T r
e i
aw
Hu
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
The linear increase of transmission capability usingu space division multiplexing (SDM) is
n
implemented by adding optical fibers and transmission devices.
it ofrom primary rate multiplexing into quaternary
ca STM-16, and STM-64 multiplexing in SDH.
Time division multiplexing (TDM) evolves
f i
tiare affected.
groups in legacy PDH to STM-1, STM-4,
e r
Disadvantage 1: Services
C
&
Disadvantage 2: The rate upgrade is not flexible.
g
n 3: For a higher-rate TDM device, the cost is high, and the 40 Gbit/s
i
Disadvantage
n has reached the rate limit of electronic components.
TDM idevice
ra
i T
WDM multiplexes the optical signals at multiple rates (wavelengths) over one fiber for
e
w
transmission. The digital signals carried by these optical signals can have the same rate and
H uadata format or different rates and data formats. To expand the capacity of a network, new
wavelengths can be deployed in the network, as per customer requirements.
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Legends: Hu
n
tio
Highway: optical fiber
C
Gray car: client services
&
n g
Colored car: services in different channels (wavelengths)
i
n wavelength
i
Lane: optical
risaregarded as a multi-lane highway, a traditional TDM system uses only one of the
T
ei To improve the bit rate of the traditional system, the speed on the lane must be
If a fiber
lanes.
a w
H u increased, so as to increase the traffic within a time unit. However, a dense WDM (DWDM)
system uses all these lanes on the highway to fully utilize the fiber transmission capacity.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The DWDM technology uses a number of wavelengths u
H as carriers and transmits the carrier
n
channels over the same optical fiber. Generally, the DWDM technology uses single-mode
it obut provide large bandwidth. In contrast to a
optical fibers because they have low loss
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
An OTU converts diverse wavelengths to standard H uwavelengths specified by ITU-T using the
n
optical to electrical to optical (O/E/O) scheme. That is, a positive-intrinsic-negative (PIN)
photodiode or an avalanche photodiode it o(APD) converts the received optical signals to
a modulate the standard-wavelength laser to
electrical signals, and the electricalcsignals
i
f
obtain new optical signals overtiITU-T-compliant WDM wavelengths.
An OMU, located at the C er end, is a component that has several input ports and one
transmit
& port receives one optical signal. These signals are transmitted
output ports. Each input
g
n one output port. An ODU, located at the receive end, has one input port
together through
i
n ports and separates signals at multiple wavelengths.
and several ioutput
r a
An OAT(such as BA/LA/PA) amplifies optical signals. An all-optical amplifier features real-
ei high gain, broad width, on-line, low noise, and low attenuation. It is an essential
a w
time,
An OSC is set up to monitor WDM optical transmission systems. ITU-T recommends the
preferential use of 1510 nm wavelength at 2 Mbit/s. The OSC can work properly at low
rates based on high receiver sensibility (greater than –48 dBm). However, it must be
dropped before reaching an EDFA and be added after reaching the EDFA.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
A single-fiber unidirectional WDM system uses H twouaoptical fibers. One fiber is used to
n
transmit optical signals in only one direction, and the other fiber is used to transmit optical
signals in the reverse direction. it o
f i caof the huge bandwidth resources of optical fibers, so
i
The WDM system can make full use
that the transmission capacityrtof each optical fiber can be increased by several times to
Ce transmission network, wavelengths can be added gradually
dozens of times. In a long-haul
& volume to implement capacity expansion.
based on the actual service
g
n in
r ai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
An open DWDM system has no special requirements u
H for the optical interfaces of
standards recommended by the ITU-T. iThe o nDWDM system uses the wavelength conversion
multiplexing terminals, and the interfaces only need to comply with the optical interface
C
wavelengths compliant with e
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
Currently, a common optical fiber can transmit high u bandwidth, but its utilization rate is
very low. The DWDM technology increases the transmission capacity of an optical fiber by
n of times the transmission capacity of a
it ocapacity of an optical fiber transmission system in
several times, dozens of times, or even hundreds
ca
single wavelength. Currently, the highest
commercial use is 3.2 Tbit/s.
f i
The DWDM system multiplexes r tiand demultiplexes signals based on optical wavelengths.
e
C
The multiplexing and demultiplexing are independent of the signal rate and electrical
& service signals in various formats, such as ATM, IP, and possible
modulation mode. That is, the multiplexing and demultiplexing are transparent to data. The
WDM system can carry
n g
i
signals in the future. The WDM system implements transparent transmission. For service-
ineach wavelength channel in the WDM system is similar to a virtual optical
layer signals,
fiber. ra
i T expansion and development, optical cable lines do not need to be reconstructed.
e only replacing optical transmitters and receivers is required. This is an ideal
In network
w
uaexpansion method and is a convenient means for introducing broadband services (such as
Instead,
H CATV, HDTV, and B-ISDN). In addition, a wavelength can be added to introduce any new
service or capacity.
The new communication network using WDM technologies is more simplified than that
using traditional electrical TDM technologies, and has clear network layers. The grooming
of various services can be achieved only by adjusting the wavelengths of corresponding
optical signals. Because the network structure is simplified, network layers are clear, and
service grooming is convenient, it is obvious that networks are flexible, cost-effective, and
reliable.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Compared with a dense WDM (DWDM) system, au
H CWDM system provides a certain number
of wavelengths and a transmission distance within 100 km, which greatly reduces system
on CWDMwith
cost and has strong flexibility. Therefore, the
it bandwidth
system is mainly applied to metro
a
networks. CWDM provides high access low costs. It is applicable to various
popular network structures, such as
f i c point-to-point, Ethernet, and SONET rings, especially
r ti communication
for the scenarios with short distance, high bandwidth, and dense access points. For
C e
example, CWDM applies to network within buildings or between buildings.
&
ng
Category CWDM DWDM
i
Channel
spacing ra
in 20 nm 100 GHz/50 GHz/25 GHz
i T
e C-band even wavelengths: 191.30 THz to 196.00 THz
a w C-band odd wavelengths: 191.35 THz to 196.05 THz
u
1271 nm
Wavelength C-band even wavelengths-Plus: 191.325 THz to 196.025 THz
H range
to 1611
nm
C-band odd wavelengths-Plus: 191.375 THz to 196.075 THz
L-band even wavelengths: 186.95 THz to 190.85 THz
L-band odd wavelengths: 187.00 THz to 190.90 THz
18 x 5
192 x 10 Gbit/s = 1920 Gbit/s
Capacity Gbit/s = 90
80 x 40 Gbit/s = 3200 Gbit/s
Gbit/s
Uncooled
Laser Cooled laser
laser
Price Low High
Transmission
100 km 5000 km
distance
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Hu
n
Category CWDM
a tio DWDM
c
it fi
Channel
20 nm 100 GHz/50 GHz/25 GHz
spacing
e r
C C-band even wavelengths: 191.30 THz to 196.00 THz
& C-band odd wavelengths: 191.35 THz to 196.05 THz
g
n1271
i
C-band even wavelengths-Plus: 191.325 THz to 196.025
n
ai
Wavelength nm to THz
range
T r 1611 nm C-band odd wavelengths-Plus: 191.375 THz to 196.075
ei
THz
L-band even wavelengths: 186.95 THz to 190.85 THz
a w L-band odd wavelengths: 187.00 THz to 190.90 THz
H u
18 x 5 Gbit/s 192 x 10 Gbit/s = 1920 Gbit/s
Capacity
= 90 Gbit/s 80 x 40 Gbit/s = 3200 Gbit/s
Uncooled
Laser Cooled laser
laser
Price Low High
Transmission
100 km 5000 km
distance
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Answer to question 1: Hu
n
tio
WDM: It refers to a technology that transmits optical signals at multiple wavelengths
over one optical fiber.
ca
rit fi
DWDM: It is a technology that uses high-bandwidth and low-loss single-mode fibers,
e
carries signals over multiple wavelengths at a specific frequency spacing, and enables
C
the simultaneous transmission of multiple channels in one optical fiber.
&
ing
CWDM: It is a signal transmission technology that multiplexes widely-spaced optical
in
channels into the same optical fiber. CWDM has a large channel spacing, which is
a
Tr
typically several nanometers or larger. It does not support optical amplifiers and is
a w to question 2:
Answer
u
Optical Amplifier (OA. BA is short for booster amplifier, LA for line amplifier, and PA
for pre-amplifier.)
n
chapter, you will have a basic understanding of G.652, G.653, G.654, and G.655 optical
it o
fibers as well as concepts such as dispersion.
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Factors, such as the fiber core diameter and refractiveu
H index of fiber and cladding materials,
on
have specific impact on optical fiber characteristics.
The fiber core refractive index n1 musttibe higher than the cladding refractive index n2,
e
Optical fibers can be classifiedr single-mode and multi-mode optical fiber by
C
transmission mode.
&
In the case g
i
small andn generally smaller than 10 μm.
a case of a multi-mode optical fiber, the diameter of the fiber core is relatively
rthe
T
In
ei large and generally about 50 μm.
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
According to the Snell's law, the angles of incidence u
H and refraction are equal (θ1 = θ3), and
n
the relationship between incidence and refraction meets n1sinθ1 = n2sinθ2.
it o transmission media, which seems as if different
ca lights at different levels. The parameter used to
Light transmits at different rates in different
f i
ti is named refractive index or index of refraction.
transmission media resist transmitting
r
Ceof light in a medium, and с is the speed of light in a vacuum, the
describe this feature for the medium
Therefore, if ν is the speed
refractive index can be&determined by using the following formula: n = с/ν.
g
n in lists the refractive indexes of different media.
The following figure
ai
T r
e i
w
H ua
When a beam of light radiates to the surface of an object (such as glass) through the air,
the transmission speed slows down, and the transmission direction changes at the same
time. Therefore, the refractive index is measured by the bending degree of light transmitted
from one medium into another. In general, when a beam of light radiates to the junction of
two media, it splits into two beams as reflected light and refracted light, as shown in the
preceding figure.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
According to the Snell's law, the angles of incidence u
H and refraction are equal (θ1 = θ3), and
n
the relationship between incidence and refraction meets n1sinθ1 = n2sinθ2. When the
incidence angle is greater than a criticalio
contact surface, and no refraction c a t exists.
angle θc, the light is completely reflected on the
i f i light
t
r when light radiates from a medium with large refractive
e
Then, what will happen
index (such as the C
glass) into a medium with small refractive index (such as the air)?
As shown in the&preceding figure, when the incidence angle θ (shown as the dashed
g
n figure) reaches a certain value, the refraction angle (shown as the
i
arrow in the
a
dashedinarrow in the figure) is equal to 90°, and the light no longer enters the
T r medium (in this example, air). In this case, the incidence angle is called critical
second
ei angle θc. If the incidence angle is continuously increased to reach θ > θc, all the light
a w will be reflected back to the incident medium (shown as the solid arrow in the figure).
H u Because all light is reflected back to the incident medium, this phenomenon is called
total reflection.
It is easy to understand that the attenuation of an optical fiber can be greatly reduced
when all light is completely reflected in the optical fiber, because the light is basically
propagated in the fiber core area and does not enter the cladding.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Light is a kind of high-frequency electromagnetic H uwave. Based on the wave optics and
n
electromagnetic field theory, after Maxwell equation is calculated for multiple times, the
it olight is transmitted in tens and even hundreds of
fact is found out that: in an optical fiber,
modes if the geometry size of the c
i a core is much larger than the optical wavelengths.
fiber
f
ti supported by an optical fiber varies depending on the
r
The number of transmission modes
e step-index fibers or graded-index fibers can be further
C
fiber diameter. Therefore, the
&
classified into single-mode optical fibers and multi-mode optical fibers by number of
transmission modes.
n g A single-mode optical fiber transmits only one mode of optical signals.
i
inoptical fiber transmits multiple modes of optical signals. The diameter of the
The diameter of the fiber core is small and is generally within the range of 5 μm to 10 μm.
a
Tr is large and has a typical size of about 50 μm.
A multi-mode
fibericore
e
w
ua
Actually, when light is transmitted over an optical fiber, it is in the mode of one beam. In
H other words, a group of beams transmitted in different angles can be found if the inside
part of the optical fiber is visible. The angle ranges from zero to αc, and light whose angle
is more than αc can radiates through the fiber core into the cladding (not meeting the
requirement of all reflection) and then be absorbed by the coating, as shown in the
following figure. These different beams of light are called modes. Generally, the smaller the
transmission angle, the lower the mode order. Strictly speaking, the mode in which light is
transmitted parallel to the fiber central axes is called zero-order mode or basic mode. The
other modes in which light is transmitted in a certain angle to the fiber central axes are all
called higher-order modes.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
The attenuation of an optical fiber depends on H ua attenuation, scattering
absorption
attenuation, and bending attenuation.
n
it o
a
Absorption attenuation: This type of attenuation is caused by the fiber materials, because
ic of the light passing through them. It is specially
i f
the fiber materials absorb the fraction
e
refers to the absorption caused rt by the presence of impurities, such as metallic ions and OH-
ions. C
&
ng
Scattering attenuation: Generally, a microscopic bit of change in the fiber material density
n i
and uneven concentration of SiO2, GeO2, and P2O5 ions can cause uneven refraction in
i
a inside an optical fiber. As a result, scattering occurs. Some light power is
r
some regions
T outside the optical fiber, and this is scattering attenuation. During optical fiber
i
scattered
e
w
manufacturing, scattering attenuation also occurs in impurities at the core-cladding
H uainterface, strains or bubbles in the optical fiber. If the defect size is greater than the optical
wavelength, the scattering attenuation occurs, which is irrelevant to the wavelength. At the
same time, the attenuation curve moves upward, which means that the attenuation
increases. However, this type of attenuation is much lower than the first type of
attenuation.
The attenuation coefficients of SMFs in the 1310 nm and 1550 nm ranges are generally
0.3–0.4 dB/km and 0.17–0.25 dB/km respectively. ITU-T G.652 defines that the attenuation
coefficients of optical fibers in the 1310 nm and 1550 nm ranges should be less than 0.5
dB/km and 0.4 dB/km respectively.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
u
H mode components or frequency
When signals are carried over optical fibers, different
n
components present in the signals have different group velocities. Therefore, the signals
it o distortion. This phenomenon is called dispersion.
diffuse during transmission, causing signal
f i
ti fiber cross section, which results in the fiber refractive
manufacturing process. The uneven
cause anisotropic stresses onrthe
Cethe two polarized modes have different propagation speeds,
index anisotropy. Therefore,
& of group velocities occurs, leading to PMD. PMD is a random value
and the delay difference
g
n factors generate randomly.
i
because its causing
n system, the system with a rate of 10 Gbit/s or lower is slightly affected
a iWDM
T rFor a 40G system, the corresponding coding technology can be used to improve
In an actual
i
by PMD.
theePMD tolerance.
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
The G.652 fiber is the widely used single-modeH ua(SMF) that has the best 1310 nm
fiber
n
performance. It is also called the dispersion-unshifted fiber.
it ofiber (DSF) or the fiber with the best 1550 nm
cacross section of the fiber refractivity, the zero-
The G.653 fiber is called dispersion shift
performance. With the design of ithe
f
ti 1550 nm window to match the minimum attenuation
dispersion point is shifted to rthe
Cecase, the fiber transmission at an ultra-high rate and for an
window of the fiber. In this
& possible.
ultra-long distance becomes
g
n
The G.654 fiberinis the cut-off shifted SMF. The design of this fiber aims to decrease the
aiin 1550 nm. The zero-dispersion point is still around 1310 nm. Therefore, the
r
attenuation
T in 1550 nm is high, and can reach 18 ps/(nm.km). In this case, single-longitudinal
i
dispersion
e lasers are required to eliminate the impact of dispersion. The G.654 fiber is mainly
w
mode
H uaapplied to the submarine fiber communication that requires long regeneration sections.
The G.655 fiber is the SMF of non-zero dispersion shift, which is similar to the G.653 fiber.
Therefore, there is certain dispersion around 1550 nm. In this case, the G.655 fiber
prevents four-wave mixing during DWDM transmission, and therefore applies to DWDM
systems.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
The G.652 fiber is the widely used single-modeH ua(SMF) that has the best 1310 nm
fiber
n
performance. It is also called the dispersion-unshifted fiber.
it ofiber (DSF) or the fiber with the best 1550 nm
cacross section of the fiber refractivity, the zero-
The G.653 fiber is called dispersion shift
performance. With the design of ithe
f
ti 1550 nm window to match the minimum attenuation
dispersion point is shifted to rthe
Cecase, the fiber transmission at an ultra-high rate and for an
window of the fiber. In this
& possible.
ultra-long distance becomes
g
n
The G.654 fiberinis the cut-off shifted SMF. The design of this fiber aims to decrease the
aiin 1550 nm. The zero-dispersion point is still around 1310 nm. Therefore, the
r
attenuation
T in 1550 nm is high, and can reach 18 ps/(nm.km). In this case, single-longitudinal
i
dispersion
e lasers are required to eliminate the impact of dispersion. The G.654 fiber is mainly
w
mode
H uaapplied to the submarine fiber communication that requires long regeneration sections.
The G.655 fiber is the SMF of non-zero dispersion shift, which is similar to the G.653 fiber.
Therefore, there is certain dispersion around 1550 nm. In this case, the G.655 fiber
prevents four-wave mixing during DWDM transmission, and therefore applies to DWDM
systems.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
If you want to convert a new DWDM technology u
H a commodity, how do you implement
into
o
of a DWDM system, including the lightisource,
n optical amplifier, and wavelength division
it on hardware? This chapter describes the key technologies and implementation methods
i n
n
i T
Understand the optical supervisory channel (OSC) of DWDM.
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The dispersion tolerance is described as follows:Hu
a
G.652 fiber, the dispersion coefficient
icthe dispersion limitation distance is 40 km (L = 800/20).
i
dispersion redundancy), and
f
e rt distance exceeds 40 km, the DCM must be added for
That is, when the transmission
C the larger the dispersion tolerance, the better.
compensation. Therefore,
&
g
n in
r ai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H u
Direct modulation: It is also called internal modulation, and is used to directly modulate the
light source signal. This method determines the strength of the laser output light wave by
controlling the current injected to the laser.
o n
i
tcommon G.652 fibers can implement ≤ 2.5 Gbit/s
Generally, direct modulation on
c a
transmission over a distancei of less than or equal to 100 km. It generally applies to
t i f
CWDM systems.
e r
C
Electroabsorption (EA) modulation: EA modulation does not directly modulate the light
&
source. In this modulation method, an external modulator is used on the output path of the
However, modulation has a small modulation frequency chirp, and can be applied
i T
to a transmission rate of 2.5 Gbit/s or higher and a transmission
e
w
distance of over 300 km. Therefore, in a DWDM system that uses an optical line
ua
amplifier, a laser of the transmitter part is generally a laser in EA modulation mode.
H Mach-Zehnder (M-Z) modulation: The M-Z modulator splits the input light into two equal
parts, and directs them on its two optical paths. On the two optical paths, electro-optic
material is used and the refractive index of the material varies with the strength of the
externally fed electrical signal. As a refractive index change on the optical paths will cause a
change in the signal phase, the combined optical signal at the output end of the two
optical paths is a coherent signal with varied strengths. In this manner, information carried
on electrical signals is transformed onto the optical signals, and then the electrical signals
are modulated based on the strength of the optical signals. The frequency chirp of the
separated external modulation laser can be equal to zero. Compared with an EA
modulation laser, the separated external modulation laser has high cost.
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
PDM modulation Hu
n
tio
Step 1: The PBS splits the laser light into two polarizations (x-pol and y-pol) that are
perpendicular to each other.
ca
rit fi
40G/100G coherent modulation technologies
C e
ePDM-QPSK, short for enhanced Polarization Division Multiplexing-Quadrature Phase
&
Shift Keying, is the best solution for 100G WDM transmission.
g
n short for enhanced Polarization Division Multiplexing-Binary Phase Shift
i
ePDM-BPSK,
inis the solution for 40G ultra-long haul WDM transmission.
a
Keying,
r
i T
e
aw
Hu
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
PDM modulation
Hu
n
Step 2: After the laser at the transmit end is divided into two parts in polarizations x
tio
and y, QPSK/BPSK modulation is performed on the two polarized light (x and y). The
ca
polarization multiplexer combines the modulated optical signals in polarizations x and
cable transmission. r it fi
y into one optical fiber, and then the signals are multiplexed and amplified for optical
C e
The traditional WDM modulation implements amplitude modulation. Both PDM-BPSK and
&
PDM-QPSK modulate signal phases for coherent transmission.
g
n processing
The 100G coherent
n i transmission system uses the PDM and QPSK technologies to reduce
i
the electrical-layer rate. For the current electrical technology, the 40 Gbit/s rate
T rathe electromagnetic
is close to bottleneck limit. Higher rate brings about more signal loss, power
e i
consumption, radiation (interference), and impedance match problems,
w
which cost much financially and technically.
H ua In PDM, one light is divided into two polarizations, and the signal carried by the light
n
in the optical field, and then converts them into a phase signal θ after computation using
the s(t)=I*Cosωt-Q*Sinωt=√2 Cos(ωt+θ)io
value of θ can be π/4, 3π/4, 5π/4,cand a t 7π/4, which represent 00, 01, 11, and 10
formula. This phase signal contains two bits. The
t i fi
respectively.
e r
C
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Coherent reception Hu
n
tio
Step 3: A local oscillator (LO) laser that has the same frequency as the received signal
a
is used to implement coherent processing between the LO laser signal and received
c
it fi
signal to restore the amplitude, phase, and polarization state information from the
received signal.
e r
C
&
ing
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
Optical fiber amplifiers (OFAs) can be divided into u
H earth ion doped OFAs and non-linear
rare
n
OFAs. Rare earth ion doped OFAs amplify optical signals using the simulated radiation
mechanism, and non-linear OFAs amplify it ooptical signals using the nonlinear effect of optical
fibers. Among OFAs, erbium-doped
f i cafiber amplifier (EDFAs) and Raman fiber amplifiers
(RFAs) are practical.
r ti
OAs do not need to convertCeoptical signals to electrical signals and then convert electrical
&signals. This feature helps form two advantages over regenerators
signals back to optical
g
for OAs.
n in
raiOAs support any bit rates and signal formats, and simply amplify all received
First,
i T This attribute is generally described as that OAs are transparent to any bit
signals.
e rates and signal formats.
w
H ua Second, OAs not only support the amplification of a single signal wavelength, which
Actually, WDM technologies play an important role in optical fiber communication only
after OAs, especially EDFAs, become available. Currently, EDFA is the most popular optical
amplifier. It has transformed the theories of WDM and all-optical network into reality.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
As key components of EDFAs, erbium-doped fibers u
H fibers that contain certain Er3+ ions.
are
n
Before illustrating the working principle of EDFAs, this course introduces the energy level
diagram of Er ions in the following. Outer it o electrons of the Er ion occupy three energy levels
(E1, E2, and E3). E1 is the ground c
i a E2 the metastable state, and E3 the high-energy
state,
ti f
level.
r
When a high-energy Cepump laser is used to simulate an erbium-doped fiber, a large
number of bound & electrons of the Er ion is simulated from E1 to E3.However, E3 is
unstable,n g
i so nonradiative transition (photons are not released) occurs soon and the
a
energyinlevel of the Er ion drops to E2.
T ris a metastable energy level, at which a particle can exist for a long time. The
ei particles simulated by the pump laser continuously assemble to E2 in nonradiative
E2
n
communication system. It has the advantages of high gain, high output power, large
working optical bandwidth, independent it oof polarization, low noise figure, and independent
i
of system bit rates and data formats.
f caIt is an indispensable key component in a large-
capacity DWDM system.
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
rai
T
ei
a w
Main advantages of EDFAs
Hu
n
High coupling efficiency: EDFAs can be easily interconnected with transmission fibers.
tio
High energy conversion efficiency: The diameter of the erbium-doped fiber (EDF) core
a
c
it fi
is smaller than that of the transmission fiber core, and signal light and pump light are
transmitted in the EDF concurrently. Therefore, light energy is concentrated, enabling
e r
adequate interaction between light and gain medium (Er ions). With the EDF of a
C
proper length, the light energy conversion efficiency is high.
&
ng
Good gain stability: EDFAs are insensitive to temperature, and the gain is
ni
independent of polarization.
i
ra
The gain is independent of system bit rates and signal formats.
i T
Main disadvantages of EDFAs
e Fixed gain bandwidth range: Due to the differences between energy levels of the Er
w
ua ion, the working bandwidth of EDFAs is only 1550 nm.
H Gain unflatness: The gain bandwidth of EDFAs is large but not flat. When EDFAs are
used in WDM systems, a special technology must be used to optimize the gain
flatness.
Optical surge problem: The input optical power can be increased quickly using EDFAs,
but the dynamic gain of the EDFAs changes slowly. Therefore, the optical surge
problem may occur in case of step change of the input signals, that is, an input
optical power peak occurs. The optical surge problem is more severe when EDFAs are
cascaded. The peak optical power can be several walts, which may damage O/E
converters and optical connector endfaces.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The gain locking of an EDFA is an important issue. u
H a WDM system is a multi-wavelength
As
system is shifted to the signals that areinoto nlost due to gain competition, thereby increasing
working system, if the signals of certain wavelengths are lost, the energy of the WDM
a t
the power of other wavelengths. At c
fi of the eight wavelengths are lost, all the power will be
the receive end, the sudden level increase may cause
i
bit errors. In extreme cases, if tseven
rwavelength, and the power may reach about 17 dBm. This
C
centralized on the remaining e
&
will result in a strong nonlinear effect or the receive power overload of the receiver, as well
as a large numbergof bit errors.
n intechnologies for locking the EDFA gain. The typical method is to control
ai
There are many
the gain rof a pump laser. The internal monitoring circuit of the EDFA controls the output of
i T source by monitoring the ratio of the input power to the output power. When
theepump
a w signals of the input wavelengths are lost, the input power decreases and the ratio of
some
H u the output power to the input power increases. Through the feedback circuit, the output
power of the pump source is reduced to keep the EDFA gain (output/input) unchanged. In
this way, the total output power of the EDFA is reduced, and the output signal level is
stable.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
In a common optical fiber system, the optical power u
H is low, and the optical fiber has the
n
linear transmission feature. When the incident optical power of the light into an optical
it o high, the high-energy pump light (of short
fiber (non-linear optical medium) is rather
wavelength) scatters to transfer a c
i a portion of the power to the beam whose frequency
small
f
tifrequency shift depends on the vibration mode. This
is down shifted. The amount of
r
e In the quantum mechanics, the process is described as that
C
process is called Raman effect.
&
a photon of the incident wavelength is scattered to a low-frequency photon, and the
molecule performs gthe transition between the vibration states. The incident photon is
H (generally less than 10 μm). The single-mode fiber can be used to restrict the interaction
between the high-strength laser field and the medium to a very small sectional area. This
increases the optical power density of the incident optical field greatly. In the low-loss fiber,
the action between the optical field and the medium can keep a long distance. The energy
coupling in the process is very sufficient, which makes it possible to utilize the stimulated
Raman scattering (SRS) in the fiber.
The quartz fiber has a wide SRS gain spectrum with a wide gain peak around 13 THz that
the pump light frequency is down shifted. If a weak signal and a strong pump light are
transmitted in an optical fiber simultaneously, and the wavelength of the weak signal is
within the range of Raman gain bandwidth of the pump light, the weak signal light can be
amplified. The optical amplifier based on the SRS mechanism is called the Raman amplifier.
The gain of the Raman amplifier is on-off gain, which is the difference of the output power
values when the amplifier is enabled and disabled.
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
The Raman amplifier has three highlights: Hu
n
tio
The gain wavelength of a Raman amplifier is determined by pump light wavelengths.
a
Theoretically, optical signals of any wavelength can be amplified if only the pump
c
it fi
light wavelengths are proper. Raman fiber amplifiers (RFAs) can amplify optical
e r
signals in the band that EDFAs cannot amplify. When multiple pump sources are used,
C
RFAs can obtain a gain bandwidth much larger than that of EDFAs (which is only 80
&
nm due to limitation of the energy level transition mechanism). Therefore, the entire
ng
ni
low-loss bandwidth range of fibers, which is from 1270 nm to 1670 nm, can be
a i
developed.
Tr gain media of RFAs is the transmission fiber itself. Therefore, the RFA can amplify
ei optical signals online, which constitutes distribution amplification and achieves
The
a w
H u regeneration-free and long-haul transmission. It is especially suitable for submarine
cable communication where it is inconvenient to deploy regenerators. In addition,
amplified optical signals are distributed along the fiber instead of being centralized,
and therefore the optical power is low and non-linear effects, especially the four-
wave mixing (FWM) effect, are reduced.
The noise figure is low. When being used with EDFAs, RFAs can significantly lower
the system noise figure and extend the transmission distance.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H u
According to the position in a DWDM optical transmission network, EDFAs can be classified
n
into booster amplifiers (BAs), line amplifiers (LAs), and pre-amplifiers (PAs).
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The core components of a WDM system is wavelength u
H division multiplexing components,
n of the entire system.
which are optical multiplexers and demultiplexers. They are actually optical filters, and their
it o
performance largely determines the performance
rai
crosstalk attenuation is large, and the passband range is wide.
H
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
A TFF comprises tens of alternating layers of high- u
H low-refractive-index thin films,
and
n
which are made of different materials and have varying thickness. The thickness of each
thin film is 1/4 of a wavelength. it o
f i ca of required wavelengths, but blocks those unwanted
ti exhibiting the required filtering characteristic.
The TFF allows passband transmission
r
Cemultiplexer are as follows: The component is small-factor with
wavelengths through a stopband,
g
stable structure, signal
n
low, and channelin spacing is proper. The disadvantage is that the number of channels is not
large.
r ai
i T system, it is ideal to use TFFs as multiplexers when only 4 to 16 wavelengths
e to be multiplexed.
In a WDM
w
ua
need
H
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H
Arrayed waveguide grating (AWG) is a planar waveguide u device developed based on optical
n
integration technologies. Typically, an AWG is fabricated by depositing a thin silicon dioxide
it o it into required pattern using photolithography.
(SiO2) glass on the silicon chip and printing
f i ca
i
AWGs are commonly used as multiplexers/demultiplexers in DWDM systems. One
t
outstanding representative ofr AWGs was developed by Japanese NTT. This AWG has small
Ce many channels, and provides flat passband. It is very suitable
wavelength spacing, supports
& large-capacity WDM systems.
for ultra-high speed and
g
n in
r ai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
According to ITU-T Recommendations, the OSCH ofua DWDM system should be completely
n
independent of the main channel, and the independency of the OSC and main channel is
fully reflected in the signal flow. it o
caOTM site, the OSC is connected to the main channel
In the transmit direction of ian
f
ti is multiplexed and amplified. In the receive direction, the
r
Ce and then the system performs pre-amplification and
only after the main channel
OSC is first separated,
demultiplexing& for the main channel.
g
n in direction of an OLA site, the OSC is the last to be connected. In the
In the transmit
ai direction of the OLA site, the OSC is the first to be separated.
r
receive
T
It cani be seen that: During the entire transmission process, the OSC does not participate in
e
a w
amplification, but is terminated and regenerated at each site. This is the opposite of the
H u main channel. The main channel participates in optical power amplification of the entire
process, but is not terminated or regenerated on the entire line. The WDM devices provide
only a transparent optical channel for the main channel.
a t
fi c
ALC is short for automatic level control.
r t i
F1, F2, and F3: transparent transmission of data in the same direction
r t
e
boards, and improves the optical
C
&
i ng
a in
T r
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
w
Answer to question 1: EA modulation does notH ua modulate the light source. In this
directly
n
modulation method, an external modulator is used on the output path of the light source
it o is equivalent to a switch.
to modulate the light wave. This modulator
f i ca
tifiber amplifier (EDFA) is a key component of the new-
Answer to question 2:
e
EDFA: The erbium-doped r
generation optical C
rai
indispensable key component in a large-capacity DWDM system.
i T
e optical power is low, and the optical fiber has the linear transmission feature. When
Raman amplifier: It is based on Raman effects. In a common optical fiber system, the
w
H ua the incident optical power of the light into an optical fiber (non-linear optical
medium) is rather high, the high-capacity pump light (of short wavelength) scatters
to transfer a small portion of the power to the beam whose frequency is down
shifted. The amount of frequency shift depends on the vibration mode. This process
is called Raman effect.
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
This chapter describes some ITU-T recommendationsu
H and specifications for WDM systems.
n
It provides a basic understanding of ITU-T knowledge that is involved WDM systems.
it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
H u
To standardize optical interface parameters, the ITU-T G.692 defines all reference points of
the WDM optical transmission system, as shown in the preceding figure. Tx1, Tx2, and TxN
n and an optical multiplexer is used at the
it o of signals over different wavelengths and send
are generally terminal transmitters of the system,
n
of transmitters
i
n reference points of channels 1 to n on the optical fibers at the optical
i
RM1…RMn:
ra connectors of an OM/OA
input
T
ei MPI-S:
reference point on the optical fiber behind the optical output connector of an
a w OM/OA
H u S': reference point on the optical fiber behind the optical output connector of a line
optical amplifier
R': reference point on the optical fiber before the optical input connector of a line
optical amplifier
MPI-R: reference point on the optical fiber before the optical input connector of an
OA/OD
SD1…SDn: reference points at the optical output connectors of an OA/OD
R1…Rn: reference points at the optical input connectors of receivers
MPI: main path interface
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
ai
i Tr
e
a w
The channel frequency allowed in a DWDM system u
H is the frequency spacing series based on
n
the reference frequency 193.1 THz and the minimum channel spacing of 100 GHz, 50 GHz,
or 25 GHz. it o
f i ca
r ti
Ce
&
g
n in
rai
i T
e
w
H ua
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
ica
rtif
C e
&
i ng
n
r ai
T
ei
a w
Hu
n
a tio
c
rit fi
C e
&
i ng
a in
Tr
ei
a w
H u
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
References H u
n
tio
ITU-T G.709
ITU-T G.798
ca
it fi
e r
C
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
OTN, which is not a new concept, uses optical-electrical
integration network
n
technologies. Over the years, ITU-T has formulated a series of OTN-related industry
it o G.874, G.693, and G.872) to replace
standards (G.709, G.805, G.806, G.798,
traditional WDM+SDH networking
f i cawith OTN, laying a solid foundation for the
convergence and promotiontof
r i IP networks. The OTN technology is developed based
C e and has combined the advantages of both SDH and
on SDH and WDM technologies
WDM technologies.
&
g
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
u
H provision
OAM&P: operation, administration, maintenance
and
n
it o
f i ca
r ti
Ce
&
g
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
OTN standards include a series of protocols, involving
device management, jitter and
n
performance, network protection, structure and mapping, and physical-layer features
and architecture. it o
a
[G.874: Management aspects oficoptical transport network elements] It describes OTN
f
i of an OTN network and the management features
tlayers
NEs at one or more network
e r
of transport functions.C The management of optical-layer networks is separated from
& In this way, the same management method can be used,
that of client networks.
g
n client networks. G.874 specifies the management functions for fault
independent of
i
a
management,in configuration management, charging management, and performance
T r and mainly describes the management network structure model for
monitoring,
ei
communication between the element management system (EMS) and the device
w
a management functions of NEs on the optical network.
Hu [G.798: Characteristics of optical transport network hierarchy equipment functional
blocks] It specifies the functional requirements of OTN in NE devices.
[G.709: Interfaces for the optical transport network] It defines the requirements for the
n-level optical transport module (OTM-n) signals of OTN, including optical transport
hierarchy (OTH), overhead functions of a multi-wavelength optical network, frame
structures, bit rates, and formats for mapping client signals.
Note:
This course mainly involves G.709 and G.798 protocols.
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
Objectives for this chapter: H u
n
tio
Architecture and interfaces of OTN
e r
C
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
An OTM-n.m consists of up to "n" multiplexing
H u
wavelengths and OTM overhead signals
that support non-associated overheads.
o n
i
"m" can be 1, 2, 3, 4, 12, 23,t34, 123, 234, or 1234.
i1,ca2, 3, or 4, the OTU1, OTU2/OTU2V, OTU3, or OTU4
a
r the OTM overhead signal (OOS). The OOS is transmitted over an
The overheads
T
ei
constitute
aw
independent optical supervisory channel (OSC) as non-associated overheads.
c a
i support non-associated overhead OOSs and has no
i
However, the OTM-nr.m does not
f
e rt is called the OTM interface with reduced functionality.
OSC. Therefore, the OTM-nr.m
C
&
ing
ain
T r
ei
aw
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
The OTN optical-layer multiplexing and mapping
H uprocess is as follows:
full functionality, OCh, or the toptical channel with reduced functionality, OChr.
a
icthe
After OCh is modulatedifto
t optical channel carrier (OCC), wavelength division
r on "n" OCCs to form OCG-n.m. After that, OMS
e
multiplexing is performed
C to OCG-n.m to form the OMSn interface. Then, OTS
overheads are added
&
g
overheads are added to OMSn to form the OTSn unit.
n
i
AfternOChr is modulated to the OCC with reduced functionality (OCCr),
ai
T r
wavelength division multiplexing is performed on "n" OCCrs to form OCG-nr.m.
ei After that, OMS overheads are added to OCG-nr.m to form the OMSnr interface.
aw Then, OTS overheads are added to OMSnr to form the OTSnr unit.
Hu From the preceding figure, we can see that the OTM-n.m (with "n" equal to or
greater than 1) consists of OTSn, OMSn, OCh, OTUk, OTUkV, and ODUk.
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
w
The electrical-layer multiplexing and mappingH
ua of OTN for the signals whose rate
process
is lower than 1.25 Gbit/s is as follows:
o n
i
t 1.25 Gbit/s, as OPU payloads, together with
c a
Client signals at a rate lower than
i into lower-order OPU0.
OPU overheads, are mapped
i f
As ODU payloads, e rt together with ODU0P, ODU0T frame alignment
OPU0,
C "0"s OTU overheads, form lower-order ODU0.3. After these
n i
of corresponding
a imultiplexing
r
five routes available for ODU0 signals. According to relevant
Tprotocols, time division multiplexing (TDM) is performed on ODU0 signals on
i
e each route. These signals are multiplexed into ODTUGk (k = 1, 2, 3, 4, or 5). As
a w
Hu
shown in the preceding figure, two ODU0 signals can be multiplexed into an
ODTUG1, eight ODU0 signals can be multiplexed into an ODTUG2, 32 ODU0
signals can be multiplexed into an ODTUG3, 80 ODU0 signals can be multiplexed
into an ODTUG4, and 320 ODU0 signals can be multiplexed into an ODTUG5.
ODU1
i n signals can directly serve as OTU1 payloads, together with OTU overheads
T ra FEC areas, are mapped into OTU1[V].
and
Hu in the preceding figure, four ODU1 signals can be multiplexed into an ODTUG2,
16 ODU1 signals can be multiplexed into an ODTUG3, 40 ODU1 signals can be
multiplexed into an ODTUG4, and 160 ODU1 signals can be multiplexed into an
ODTUG5.
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
u
H and mapping structures of OTN, we
During the learning of electrical-layer multiplexing
n
have a basic knowledge of TDM. The following describes the TDM process in detail.
it o as client-side higher-order ODUk signals.
Lower-order ODUk signals can be considered
That is, TDM can be performed on
f i calower-order ODUk signals to form higher-order
r
ODUk signals. In addition, TDM ti can be performed on multiple lower-order ODUk
Ce form a higher-order ODUk signal.
signals at different rates to
r
signal.
Tj x ODU2, k x ODU1, and (32-2k-8j) x ODU0 signals are multiplexed into one
i
e ODU3 (0 ≤ j ≤ 4, 0 ≤ k ≤ 16-4j) signal.
a w
Hu h x ODU3, j x ODU2, k x ODU1, and (80-2k-8j-32h) x ODU0 signals are
multiplexed into one ODU4 (0 ≤ h ≤ 2, 0 ≤ j ≤ 10-5h, 0 ≤ k ≤ 40-4j-20h) signal.
n
signal from the perspective of frame structure.
o
i
t upper right of the figure, contains frame
The ODU1 frame, shown on the
c a
i "0"s OTUk overhead, and completes the clock
i f
alignment overhead and all
ODU1 isignals
a in control and opportunity signals (JC, NJO) are frame interleaved into
T r
justification
ei After the ODU2 overhead is added, the ODU2 is mapped into the OTU2 or
the OPU2 overhead area.
aw
Hu
OTU2V. Then, OTU2 or OTU2V overhead, frame alignment overhead, and FEC
areas are added to form the OTU2 signal that can be transmitted through an
OTM signal.
Note:
Like the ODU1 frame, the ODU2 frame is 4 rows and 3824 columns and its
payload occupies 3808 columns. The ODU2 payload, that is, OPU2 cannot hold
four ODU1 frames. Therefore, the ODU1 frame has to cross the frame boundary
of the ODU2 frame and occupies 3824/3808 ODU2 frames, that is, about 1.004
ODU2 frame. However, the ODU1 frame can be multiplexed into the ODU2
frame and occupy more than one ODU2 frame, because the frame frequencies of
ODU1 and ODU2 are different and the ODU2 frame frequency is much higher
than the ODU1 frame frequency.
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
OTUk rate calculation method H u
n
tio
As introduced previously, the size of an OTUk (k = 1, 2, 3, 4 or 5) frame is fixed
a
at 4 rows and 4080 columns. For an OTU1 frame, columns 1 to 16 are OTU1,
c
it fi
ODU1, and OPU1 overheads, columns 17 to 3824 (3808 columns in total) are
r
e
client signals, and columns 3825 to 4080 (256 columns in total) are FEC areas.
C
Assuming that the OTU1 frame is loaded with STM-16 SDH signals and its rate is
&
2,488,320 kbit/s, you can obtain the nominal OTU1 frame rate based on the
g
in
following formula: Client signal size/OTU frame size = Client signal rate/Nominal
OTUin
ra
frame rate. The following information is obtained: 3808/4080
T=2488320/Nominal OTU1 frame rate. That is, the nominal OTU1 frame rate is
ei 255/238 x 2,488,320 kbit/s.
aw
Hu
For an OTU2 frame, four ODU1 signals are time-division multiplexed into
ODTUG2 and four ODU1 signals function as the OPU2 payload with 3808
columns, and the 16 columns of the OPU2 payload are OTU1, ODU1, and OPU1
overheads. Therefore, client signals occupy 3792 columns in total. You can
obtain the nominal OTU2 frame rate using this formula: 3792/4080 = 2488320 x
4/Nominal OTU2 frame rate. That is, the nominal OTU2 frame rate is 255/237 x
9,953,280 kbit/s.
Based on the OTU1/2/3 frame rates, the following conclusion can be drawn:
OTUk rate = 255/(239-k) x STM-N frame rate
n
t io
i f ica
t
C er
&
i ng
n
r ai
i T
e
a w
As introduced previously, the OTUk (k = 1, 2,H
3,u4, or 5) frame size is fixed as 4 rows
n
and 4080 columns. For different signal levels, the OTN signal frame period changes.
With the known signal frame rates, the it oframe period can be calculated for the signals
i
with different rate levels, using the
f cafollowing formula: Signal byte count/Signal frame
r ti
rate = Signal frame period. However, the method for calculating the frame period for
C
ODUflex and OPUflex signalse is different from the method for calculating the frame
&
period for other signals.
g
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
As described in the SDH Principles, the overhead
H u function performs specific monitoring
fi c
transmission. This chapter describes
r i
overheads, and optical-layertoverheads, and illustrates the implementation mechanisms
of overheads.
Ce
&
g
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
r ai
i T
e
a w
As shown in the preceding figure, the OPUk unit
H u ranges from column 15 to column
payload area ranges from column 17ito o ncolumn 3824, and client signals exist in the
3824. The OPUk overhead area ranges from column 15 to column 16, the OPUk
a t
OPUk payload area.
f i c
i
rt consisting of the ODUk overhead and OPUk. The
e
ODUk is a 4 x 3824 block structure
ODUk overhead area isClocated in columns 1–14 of rows 2–4 in the lower-left part, the
& area is columns 1–7 of row 1, and columns 8–14 of row 1
frame alignment overhead
g
n OTUk overhead area is located in columns 8–14 of row 1, and the FEC
i
are all "0"s.The
a
area rangesinfrom column 3825 to column 4080 in the right part of the frame.
T r alignment overhead area is located in columns 1–7 of row 1, which is the
ei header.
The frame
aw
frame
Hu
The client signal rate corresponding to OTU1/2/3/4/5 is 2.5/10/40/100/400 Gbit/s. The
OTUk frame structures at different levels are the same. The higher the level is, the faster
the frame frequency and rate.
Differences between the SDH frame structure and OTN frame structure
SDH Frame OTN Electrical-Layer Frame
Frame 9 rows and 270 x n columns, with a 4 rows and 4080 columns,
structure changeable size with a fixed size
Frame rate 8000 frames per second, fixed rate Changeable rate
Frame Section overhead, pointer, path OPUk, ODUk, OTUk, and FEC
components overhead, and payload
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
The frame alignment overhead is used for frame
H ulocating and composed of a 6-byte
FAS and a 1-byte MFAS.
o n
t i
c a
The OTUk overhead supports the transmission function of one or more optical channel
connections and is composed ofi 3-byte SM, 2-byte GCC0, and 2-byte RES overheads.
t i f
e r in the place where the OTUk signal is assembled and
The OTUk overhead is terminated
disassembled. C
&
ng PM, 3-byte TCMi (TCM1 to TCM6), 1-byte TCMACT, 1-byte FTFL, 2-
The ODUk overhead is used to support maintenance and operation of optical channels.
It consists ofi3-byte
n GCC1/2, 4-byte APS/PCC, and 6-byte RES overheads. The ODUk
i2-byte
a
r is terminated in the place where the ODUk signal is assembled and
byte EXP,
T
ei
overhead
wdisassembled, and the TC overhead is added and terminated at the source and sink of
a the corresponding tandem connection respectively.
Hu The OPUk overhead is used to support client signal adaptation and is composed of 1-
byte PSI, 3-byte JC, 1-byte NJO, and 3-byte RES overheads. The OPUk overhead is
terminated in the place where the OPUk signal is assembled and disassembled.
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
In consideration of framing, the frame alignment byte FAS of the OTUk overhead must
n
not be scrambled. Scrambling is performed after the FEC calculation results are inserted
in the OTUk signals. it o
f i ca bytes of the frame signal, which are equivalent
ti structure.
OA1 and OA2 are the frame alignment
r
Ce
to A1 and A2 in the SDH frame
&
g
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
Some OTUk and ODUk overheads, such as TTI,
u
H to cross multiple OTUk/ODUk
need
n
frames. These overheads implement OTUk/ODUk frame alignment and multiframe
alignment. The MFAS overhead is used it oto implement multiframe alignment.
f i ca
r ti
Ce
&
g
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
The OTUk overhead bytes occupy columns 8–14
u
H row 1 in the OTUk frame structure.
of
n
The OTUk overhead includes SM, GCC0, and RES bytes.
o
t i
The SM overhead includes:
c a
i trace identifier.
f
The first byte is the TTI itrail
rt
incoming
i
n trail trace identifier, contains one byte and is located at the first byte of
a ifor
Troverhead to transmit 64-byte OTUk-level TTI signals.
TTI, short
thei SM
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
Working mechanism H u
n
tio
The BIP-8 check calculates the OTUk BIP-8 based on bits in the entire OPUk area
a
of the OTUk frame i and inserts the calculated result into the OTUk BIP-8
c
it fi
overhead of the OTUk frame i+2. In the frame i+2, as shown in the preceding
r
e
figure, the value is compared with the BIP-8 calculation result of the current
C
frame. If the two values mismatch, bit error blocks are detected at the near end.
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
BEI and BIAE, short for backward error indication
u
H and backward incoming alignment
n
error respectively, are used to indicate backward bit errors and incoming alignment
it o the count of bit errors and IAE status to the
errors. The BEI/BIAE area is used to return
upstream direction on the OTUkclevel.
i a It contains 4 bits, and is located at the higher
f
i SM overhead. In the IAE status, this area is set to
four bits of the third byte in tthe
r
"1011", and the bit errorecount is ignored. In the non-IAE status, the bit error count (0–
C
&
8) is inserted. The other six values may be caused by some irrelevant statuses, and
ng
should be explained as zero bit errors and BIAE not activated.
BDI, shortin
i
a for backward defect indication, is a reverse defect indication. It is used to
return rthe detected signal failure status of the section terminal sink function to the
i T
e
upstream direction on the OTUk level. It has only one bit, and is located in the fifth bit
w
a of the third byte in the SM overhead. If the BDI area is set to "1", an OTUk reverse
Hu defect is detected. Otherwise, the BDI area is set to "0".
IAE, short for incoming alignment error, is used to indicate an incoming alignment error.
It allows the OTUk section connection monitoring end point (S-CMEP) ingress point to
inform its peer S-CMEP egress point that an alignment error in the incoming signal has
been detected. The S-CMEP egress point can use the information to suppress the bit
error count which may be caused by a frame phase change of the OTUk at the ingress
point. The 1-byte IAE is located in the sixth bit of the third byte in the SM overhead. If
the IAE is set to "1", a frame alignment error is detected. Otherwise, the IAE area is set
to "0".
The last two bits of the SM overhead are reserved bits, which are set to "00".
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
w
The ODUk overhead consists of the PM signalH
ua TCM byte, GCC1/GCC2 byte,
byte,
n
APS/PCC byte, FTFL byte, EXP byte, and RES byte.
o
i
PM and SM are defined to have thetsame overheads, because the PM overhead bytes
caregeneration site, while the SM overhead bytes
i f i
are not processed at the electrical
needs to be processed. rt
e
During the comparisonCwith SDH regulations, the SM is equivalent to the regenerator
& and the PM is equivalent to the multiplex section overhead
g
section overhead (RSOH),
(MSOH).
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
Compared with the SM overhead, the PM overhead
u
H contains the new STAT field, which
n
is used for ODUk path-level maintenance signals. It contains 3 bits, located at the lower
three bits of column 12 in row 3. it o
f i ca
r ti
Ce
&
g
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
TCM supports monitoring ODUk connectionsH
foruthe following network applications:
rthe
e
connections through
C
&
Sublayer monitoring for linear 1+1, 1:1 and 1:n optical channel subnetwork
n
connectiong protection (SNCP) switching, to determine the signal failure (SF) and
i
ndegrade (SD) conditions.
i
signal
aw
Hu
Monitoring an optical channel tandem connection for the purpose of detecting
an SF/SD condition in a switched optical channel connection, to initiate automatic
restoration of the connection during fault and error conditions in the network.
c a
Each TC-CMEP will insert its TCM overhead into or extract its TCM overhead from one
of the six TCMi overhead fields.iThe specific TCMi overhead field is provisioned by the
network operator, networkrt
if
Ce
management system, or switching control platform.
&
g
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
u
H A1-A2/B1-B2/C1-C2 and A1-A2/B3-
In the preceding figure, the monitored connections
n
B4 are nested, while the monitored connections B1-B2/B3-B4 are cascaded.
it o
f i ca
r ti
Ce
&
g
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
w
The monitored connections B1-B2/C1-C2 are H
ua
overlapped.
f i ca
r ti
Ce
&
g
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
r ai
i T
e
a w
H u
PSI[1] is reserved for future international standardization.
PSI[2] to PSI[17] are
n
multiplexing structure identifiers (MSIs), which contain the ODU types and transmitted
ODU tributary port numbers. OPU2 only it o requires bytes PSI[2] to PSI[5], because it has
i
only four ODU1 tributary port numbers.
f ca In this case, the last 12 bytes of MSI are set to
r ti the 8-bit MSI overhead of an OTN frame cannot
all "0"s. For the OTU5, currently,
identify all tributary ports.eTherefore, the MSI overhead must be expanded. The first to
C
&
third bits of the OMFI byte on row 4 and column 16 are used to expand the MSI
aw
1
2
PLD
Hu
3
4 EPSI OMFI
PSI OMFI
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3
EPSI[0] PT
EPSI[i+1] Tributary Port # TS#i
EPSI[1] reserved
EPSI[2]
occupation
n
the sink node. The corresponding boards at the source and sink nodes monitor the
it o
signals and report the performance information. The preceding figure is an example for
i
introducing how OTN electrical-layer
f ca overheads are used to monitor the OTN signals.
r ti are processed on the OTU, tributary, and line boards.
The OTN electrical-layer overheads
The details are as follows:e
C
& are terminated at the sink node of a channel.
The PM overheads
g
inoverheads
i n
The SM need to be terminated and then regenerated at all the nodes
r a have the reshaping, retiming, regenerating (3R) functions. That is, all the
that
i Tboards that support the OTN interface must process the SM overheads.
e The TCM overheads can be terminated at a selective sink node based on the
a w
Hu
actual situation. The TCM overheads have six levels and three allocation modes
(cascaded, nested, or overlapped), which can be flexibly determined as required.
In the preceding figure, the three-level TCM overhead is taken as an example.
TCM1, TCM2, and TCM3 are nested, TCM2s are cascaded, and TCM2 and TCM3
are overlapped.
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
The OTS, OMS, and OCh overheads are generated
u
H at the source node and terminated
n
at the sink node. The corresponding boards at the source and sink nodes monitor the
it o
signals and report the performance information. The preceding figure is an example for
introducing how OTN optical-layer
f i caoverheads are used to monitor the OTN signals. The
r ti OTN are processed on the FIU, MUX/DEMUX/OADM, and
optical-layer overheads of the
Ce are as follows:
OTU/line boards. The details
T r
The
e i
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
This chapter describes OTN trail layers and maintenance
signals to lay a foundation for
troubleshooting an OTN network.
n
it o
f i ca
r ti
Ce
&
g
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
OTN trails include electrical-layer trails and optical-layer
trails. Electrical-layer service
n
trails include Client, ODUk, and OTUk trails. Optical-layer trails include OCh, OMS, OTS,
it o of services.
and OSC trails. The OSC trail is independent
The OTUk trail uses the SM section of the OTUk overhead in the frame structure.
This overhead is responsible for monitoring the status of the entire OTUk section.
It is processed on the OTU/tributary/line boards to generate corresponding alarms.
The ODUk trail uses the PM section and TCM section of the ODUk overhead in
the frame structure. By default, the PM section overhead is used to monitor the
status of the entire ODUk section. The TCM section monitoring can be set to
monitor the status of the TCMx section in end-to-end mode. The PM section and
TCM section overheads are processed on the OTU/tributary/line boards to
generate corresponding alarms.
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H
OTS trail: An OTS trail corresponds to a physical ufiber. Each optical fiber connecting two
n
sites is an OTS trail. The typical example is the optical cable between the two FIU or OA
boards of different NEs. it o
f i ca to a path of a multiplexed signal, which is
ti and demultiplex wavelengths. For example, an
OMS trail: An OMS trail corresponds
r
Cea multiplexer and a demultiplexer or between two OADM
between two boards that multiplex
OMS trail exists between
boards. &
OCh trail: Anin
g
i n OCh trail is a wavelength-level trail between two OTU boards. The typical
exampleais between the WDM-side optical modules on the OTU boards at the two ends
of a T
r
e i service.
awOTUk trail: The source and sink ends of an OTUk trail are established on the internal
Hu
logical ports of the OTU boards, tributary boards, or line boards.
ODUk trail: The source and sink ends of an ODUk trail are established on the internal
logical ports of the OTU boards, tributary boards, or line boards.
Client trail: A client trail is a trail that needs to be implemented in the WDM
system. That is, each client trail is the trail between the client-side port of one
OTU or tributary board to that of the other OTU or tributary board.
OSC trail: Different from other six trails, an OSC trail is related only to the
supervisory channel and is independent of services. It is independent of other six
trails and only exists between supervisory channel boards.
n
t io
i f ica
t
C er
&
i ng
n
r ai
i T
e
a w
LOF/LOM: loss of frame/loss of multiframe H u
TTI: trail trace identifier
o n
i
f c
ia signal failure is detected in the upstream direction.
rt i
direction to indicate that
C e
OCI: open connection indication
&
An OCI signal is transmitted to the downstream direction to indicate that the
ngsignal is not connected to the trail termination source point.
i
upstream
e i indicate that the upstream signal connection is locked and no signal passes.
i c a
end ODUk trail.
i f
ODUk TCM (ODUkT): An e rt is an information structure used to support a TCM trail.
ODUkT
A maximum of six TCMCsublayers are supported.
&
g
in but generating this signal is not required. According to ITU-T
OTUk_AIS is used
to support the future service layer. Currently, only detecting this
n
ai
signal is required,
T r
Recommendations, Huawei devices support OTUk_AIS detection instead of OTUk_AIS
e i CBR AIS is generated in the ODUk/CBRx adaptation sink function. If this signal
insertion.
n
ODUk signal except FA OH, OTUk OH, and ODUk FTFL.
it o
f i ca
r ti
Ce
&
g
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
u
H status of the terminal sink function
BDI: It is used to convey the detected signal failure
Ce downstream.
command is issued) for the
&
g
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
The LCK signal is transmitted to the downstream
H udirection to indicate that the
n
upstream signal connection is locked and no signal passes.
o
i
t with "0101 0101". The insertion area is the entire
The ODUk_LCK insertion area is filled
c
ODUk signal except FA OH andiOTUk OH.
a
t i f
e r
C
&
ing
ain
T r
ei
aw
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
The IAE has one bit, which is used for the ingress
u
H point of the section connection
n
monitoring end point (S-CMEP) to indicate the alignment error that has been detected
in the input signal to the egress pointio
a t the value of IAE is "0".
of the peer S-CMEP. If the value of IAE is "1", a
i c
frame alignment error occurs. Otherwise,
f
rt i
C e
&
i ng
ain
T r
ei
aw
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
w
The value of k can be 1, 2, 3, 4, or 5, and theH
ua of i ranges from 1 to 6.
value
ng
alarm is reported if the MFAS overhead stays in out of multiframe (OOM) state for three
n i
consecutive milliseconds (ms), that is, the MFAS overhead is invalid. The alarm is cleared
i
after theamultiframe synchronization state is restored for three consecutive milliseconds
(ms).T
r
e i
awDEG: signal degrade
Hu BEFFEC_EXC: Signal degraded before FEC. Signals sent from the WDM side of the
opposite-end OTU have the FEC function. As a result, before performing signal FEC in
the receive direction on the WDM side of the local-end OTU, the local-end OTU counts
the bit error rate. This alarm is generated when the counted bit error rate crosses the
threshold.
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
ODUk_PM_TIM: ODUk PM trace identifier mismatch
u
H (TIM) alarm. This alarm occurs
n
during the control process when the trail trace identifier (TTI) at the opposite end
mismatches that at the local end while it othe TIM detection is enabled.
f i cadegrade alarm. When BIP8 bit errors are detected in
ti after signal degrade or bit error threshold crossing
ODUk_PM_DEG: ODUk PM signal
e r
burst mode, this alarm is generated
occurs. When BIP8 bit C errors are detected in Poisson mode, this alarm is generated
after signal degrade&occurs.
g
n
ODUk_PM_EXC: in This alarm is reported when the BIP8 bit errors in the ODUk PM
ai the specified threshold. When BIP8 bit errors are detected in Poisson
r
section exceed
T this alarm is generated after bit errors exceed the specified threshold.
i
mode,
e
a wODUk_PM_BDI: ODUk PM backward defect indication alarm. This alarm is transmitted
Hu
by the peer site to the local site when the peer site detects a signal failure in the PM
section.
ODUk_LOFLOM: abnormal frame and multiframe alignment signal alarm. This alarm
occurs when the information of the upstream frame header does not match that of the
downstream frame header.
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
w
ODUk_TCMi_TIM: ODUk TCMi trace identifierHmismatch
ua alarm. This alarm occurs during
n
the control process when the trail trace identifier (TTI) at the opposite end mismatches
it o is enabled. The system compares the
that at the local end while the TIM detection
burst mode, this alarmC is generated after signal degrade or bit error threshold-crossing
& are detected in Poisson mode, this alarm is generated after
occurs. When bit errors
g
noccurs.
signal degrade
i
ain This alarm is reported when bit errors in the ODUk TCMi section
T rthe specified threshold. When bit errors are detected in Poisson mode and
ODUk_TCMi_EXC:
aw
exceed
Hu
ODUk_TCMi_BDI: ODUk TCMi backward defect indication. This alarm is generated
when the BDI bit of a TCMi overhead stays "1" for five consecutive frames.
n
t io
i f ica
t
C er
&
i ng
n
r ai
i T
e
a w
OPUk_PLM: OPUk payload mismatch alarm. This
H u alarm is generated when the type of
n
received payload mismatches the expected payload type defined in the adaptation
function.OPUk_MSIM: OPUk multiplex it ostructure identifier mismatch alarm
f i ca
r ti
Ce
&
g
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
w
ES is short for errored second. It indicates theH
ua
one-second period that contains one or
n
more bit error blocks. FEES indicates the far end errored second.
o
i
t It indicates the one-second period that
c a
SES is short for severely errored second.
contains ≥ 15% bit error blocksior at least one defect (OCI/AIS/LCK/IAE/LTC/TIM/PLM).
tif errored second.
FESES indicates the far endrseverely
Ceerrored second ratio. It indicates the ratio of the number of
SESR is short for severely
&period to the total number of seconds within a fixed test period.
g
SESs in the available
e i
SESs.
a w
Hu
BBER
is short for background block error ratio. It indicates the ratio of the number of
BBEs in the available period to the total number of blocks within a fixed test period.
The total number of blocks does not include the number of blocks in the SESs. FEBBER
indicates the far end background block error ratio.
UAS is short for unavailable second. An unavailable period starts from the first second
of 10 consecutive SES events. These 10 seconds are considered as a part of the
unavailable seconds. A new available period starts from the first second of 10
consecutive non-SES events. These 10 seconds are considered as a part of the available
seconds. FEUAS indicates the far end unavailable second.
IAES is short for incoming alignment error second. It indicates a second at which an IAE
error occurs.
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
u
H of ODU2/OTU2 overheads on a
The preceding figure shows an application example
n
point-to-point network. The following slides describe several common overhead
application scenarios. it o
f i ca
r ti
Ce
&
g
n in
r ai
i T
e
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
When a fiber cut occurs between nodes A and
u
H the preceding figure illustrates the
B,
n
overhead processing and detection and alarm reporting. The detailed process is as
follows: it o
f i ca and detection: The FIU on node B detects the
ti the OTS_BDI alarm back to node A. The FIU on node
Optical-layer overhead processing
OTS_LOS alarm and rinserts
Ce alarm. The LSX board on node C reports the OCh_SSF
A reports the OTS_BDI
alarm. &
g
n in overhead processing and detection: The R_LOS and OTU2_SSF
Electrical-layer
ai trigger that node B inserts the ODU2_PM_AIS indication to the
r
alarms
Tdownstream node C and inserts the OTU2_BDI indication back to the upstream
i
e node A. Then, node C detects the ODU2_PM_AIS indication and node A detects
a w
Hu
the OTU2_BDI indication. When detecting the ODU2_PM_AIS indication, node C
inserts the ODU2_PM_BDI indication back to node A. Then, node A detects the
ODU2_PM_BDI indication.
Hu
the overhead indications. Node A reports the ODU2_PM_BDI and OTU2_BDI
alarms. Node B reports the OTU2_LOF and OTU2_SSF alarms. Node C reports the
ODU2_PM_SSF alarm. In this case, it can infer that the optical signals in the
transmit direction of node A and receive direction of node B are severely
degraded.
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
w
The preceding figure shows the application ofHthe
uaODU1/ODU2/OTU2 overheads on a
n
network with an OADM node. Nodes A and C use the TOM and NS2 boards to access
client services and complete overheadio
a t services. The source and sink nodes of the OTU2,
processing. Node B uses the NS2, TOM, and NS2
c
iare marked in the figure. The WDM-side wavelengths
boards to add, drop, and pass through
f
ODU2P, and ODU1P overheads i
rt ODU1s are allocated as follows:
C e
are on the OTU2 level. Three
Secondin
inODU1: B–C (Services are added at node B.)
ODU1: A–C (Services pass through node B.)
r a
T
Third
Hu
n
t io
i f ica
t
C er
&
i ng
n
r ai
i T
e
w
When a fiber cut occurs in the direction fromH
uaA to node B, the preceding figure
node
n
illustrates the overhead processing and detection and alarm reporting. The detailed
process is as follows: it o
Overhead processing andic
a
f
i R_LOS alarm and OTU2_SSF alarms and inserts the
tthe
detection: When a fiber cut occurs between nodes A
r
Ce back to node A. In addition to generating the
and B, node B detects
OTU2_BDI indication
ODU2_PM_AIS & indication and inserting the ODU2_PM_BDI indication back to
g
node A,nnode B triggers the insertion of the lower-order overhead (ODU1s A–B
andin
i
ra respective ODU1_PM_AIS indications. The ODU1_PM_AIS indications trigger
A–C) ODU1_PM_AIS indication. Node B and the downstream node C detect
T their
ei the backward insertion of the ODU1_PM_BDI indication. Node A then detects
aw the ODU2_PM_BDI and ODU1_PM_BDI indications from node B and the
Hu ODU1_PM_BDI indication from node C.
ain
ODU1_PM_BIP bit errors are detected in the lower-order ODU1s (ODU1s A–B
T r A–C) at nodes B and C. The ODU1_PM_BIP bit errors at nodes B and C cause
and
ei both nodes to detect the ODU1_PM_DEG indication and insert the
aw ODU1_PM_BEI indication back to the corresponding upstream nodes. Node A
Hu then detects the OTU2_BEI, ODU2_PM_BEI, and ODU1_PM_BEI indications from
node B and the ODU1_PM_BEI indication from node C.
testing.
&
ing
ain
T r
ei
aw
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
n
t io
i f ica
t
C er
&
i ng
n
rai
i T
e
a w
H u
n
a tio
c
rit fi
C e
&
ing
n
r ai
T
ei
a w
Hu
Recommendations
Huawei Learning Website
http://learning.huawei.com/en
Huawei e-Learning
http://support.huawei.com/learning/NavigationAction!createNavi?navId=MW
000001_term1000025144&lang=en n
t io
Huawei Certification ica
tif
r
Ce
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_31
&lang=en &
ng
Find Training ini
ra
T
ei
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_trai
ningsearch&lang=en a w
Hu
More Information n
it o
i c a
r tif
Huawei learning APP Ce
&
g
n in
r ai
i T
e
a w
H u