Académique Documents
Professionnel Documents
Culture Documents
Product Description
Issue 01
Date 2009-06-30
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided “AS IS” without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but the statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Purpose
This document describes the networking application, functions, structure, features of the
equipment.
This document provides guides to get the general information about the OptiX PTN 3900.
Related Versions
The following table lists the product versions related to this document.
Intended Audience
This document is intended for:
Organization
This document is organized as follows.
Chapter Description
Chapter Description
2 Functions and Features Describes the service types, processing capability, service
interfaces, protection capability, QoS, OAM feature, NSF
function and DCN mode that are supported by the
equipment.
A Compliant Standards and Describes the compliant standards and protocols of the
Protocols equipment.
C Acronyms and Lists the acronyms and abbreviations used in this document.
Abbreviations
Conventions
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Symbol Description
NOTE Indicates a tip that may help you solve a problem or save
time.
TIP Provides additional information to emphasize or supplement
important points of the main text.
General Conventions
The general conventions that may be found in this document are defined as follows.
Convention Description
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Keyboard Operations
The keyboard operations that may be found in this document are defined as follows.
Format Description
Key Press the key. For example, press Enter and press Tab.
Key 1+Key 2 Press the keys concurrently. For example, pressing Ctrl+Alt
+A means the three keys should be pressed concurrently.
Key 1, Key 2 Press the keys in turn. For example, pressing Alt, A means
the two keys should be pressed in turn.
Mouse Operations
The mouse operations that may be found in this document are defined as follows.
Action Description
Click Select and release the primary mouse button without moving
the pointer.
Drag Press and hold the primary mouse button and move the
pointer to a certain position.
Update History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
Contents
3 System Architecture...................................................................................................................3-1
3.1 Functional Modules.........................................................................................................................................3-2
3.2 Hardware Structure......................................................................................................................................... 3-3
3.2.1 Overview................................................................................................................................................3-4
3.2.2 Cabinet................................................................................................................................................... 3-4
3.2.3 Subrack...................................................................................................................................................3-6
3.2.4 Boards.....................................................................................................................................................3-9
3.2.5 Valid Slots for Boards..........................................................................................................................3-10
3.3 Software Architecture...................................................................................................................................3-12
3.3.1 Overview..............................................................................................................................................3-12
3.3.2 NE Software.........................................................................................................................................3-14
3.3.3 Board Software.....................................................................................................................................3-15
4 Services.........................................................................................................................................4-1
4.1 Overview.........................................................................................................................................................4-2
4.1.1 Service Model........................................................................................................................................4-2
4.1.2 Service Processing..................................................................................................................................4-7
4.2 Ethernet Service..............................................................................................................................................4-9
4.3 ATM Service.................................................................................................................................................4-13
4.4 Circuit Emulation Service.............................................................................................................................4-14
4.5 L3VPN Services............................................................................................................................................4-16
5 Key Features................................................................................................................................5-1
5.1 MPLS..............................................................................................................................................................5-3
5.1.1 MPLS Background.................................................................................................................................5-3
5.1.2 Basic MPLS Concepts............................................................................................................................5-3
5.1.3 MPLS System Structure.........................................................................................................................5-5
5.1.4 MPLS Features of the Equipment..........................................................................................................5-5
5.2 IS-IS Routing Protocol....................................................................................................................................5-6
5.3 BGP.................................................................................................................................................................5-8
5.4 OSPF Protocol...............................................................................................................................................5-10
5.5 RIP.................................................................................................................................................................5-12
5.6 MPLS Signaling............................................................................................................................................5-14
5.7 PWE3............................................................................................................................................................5-14
5.8 IP Tunnel and GRE Tunnel...........................................................................................................................5-15
5.9 QoS................................................................................................................................................................5-17
5.10 IGMP Snooping...........................................................................................................................................5-20
5.11 MSTP/RSTP/STP........................................................................................................................................5-21
5.12 ACL ............................................................................................................................................................5-22
5.13 BFD.............................................................................................................................................................5-23
5.14 Synchronous Ethernet Clock.......................................................................................................................5-23
5.15 IEEE 1588 V2 Clock...................................................................................................................................5-25
6 Protection.....................................................................................................................................6-1
6.1 Equipment Level Protection............................................................................................................................6-2
6.1.1 TPS Protection........................................................................................................................................6-2
6.1.2 1+1 Protection for the SCA Board.........................................................................................................6-3
6.1.3 1+1 Protection for the Cross-Connect and Timing Board......................................................................6-4
6.1.4 1+1 Protection for the PIU.....................................................................................................................6-5
6.2 Network Level Protection...............................................................................................................................6-5
6.2.1 MPLS 1+1 and 1:1 Protection................................................................................................................6-6
6.2.2 FRR Protection.......................................................................................................................................6-8
6.2.3 Ethernet LAG Protection......................................................................................................................6-10
6.2.4 Ethernet Spanning Tree Protection......................................................................................................6-11
6.2.5 LMSP Protection..................................................................................................................................6-13
6.2.6 Packet E1 ML-PPP Protection.............................................................................................................6-16
6.2.7 IMA Protection.....................................................................................................................................6-17
8 Security Management................................................................................................................8-1
8.1 Authentication Management...........................................................................................................................8-2
8.2 Authorization Management.............................................................................................................................8-2
8.3 Network Security Management.......................................................................................................................8-2
8.4 System Security Management.........................................................................................................................8-3
8.5 NE Security Log Management........................................................................................................................8-3
8.6 Syslog Management........................................................................................................................................8-3
9 Networking Application...........................................................................................................9-1
9.1 Application of the Equipment for Mobile Services........................................................................................ 9-2
9.2 Application of the OptiX PTN 3900 for the L2VPN Service.........................................................................9-6
9.2.1 Transport of the E-Line Service.............................................................................................................9-6
9.2.2 Transport of the E-LAN Service............................................................................................................9-7
9.3 Offload Solution..............................................................................................................................................9-9
10 Technical Specifications.......................................................................................................10-1
10.1 System Specifications.................................................................................................................................10-2
10.2 System Performance....................................................................................................................................10-3
10.3 Technical Specifications of Boards.............................................................................................................10-6
10.3.1 Technical Specification of the TN81EG16........................................................................................10-7
10.3.2 Technical Specification of the TN82EG16........................................................................................10-8
10.3.3 Technical Specification of the EX2....................................................................................................10-9
10.3.4 Technical Specification of the ETFC...............................................................................................10-10
10.3.5 Technical Specifications of the EFF8..............................................................................................10-11
10.3.6 Technical Specification of the EFG2...............................................................................................10-11
10.3.7 Technical Specification of the MP1.................................................................................................10-12
10.3.8 Technical Specification of the MD1................................................................................................10-13
10.3.9 Technical Specification of the MQ1................................................................................................10-13
10.3.10 Technical Specification of the CD1...............................................................................................10-13
10.3.11 Technical Specification of the AD1...............................................................................................10-13
10.3.12 Technical Specification of the ASD1.............................................................................................10-14
10.3.13 Technical Specifications of the AFO1...........................................................................................10-15
10.3.14 Technical Specification of the POD41...........................................................................................10-16
10.3.15 Technical Specification of the D12................................................................................................10-17
10.3.16 Technical Specification of the D75................................................................................................10-17
10.3.17 Technical Specification of the CMR4............................................................................................10-18
Figures
Tables
1 Overview
This chapter describes the features and network application of the OptiX PTN 3900.
1.1 Equipment Introduction
The OptiX PTN 3900 is new generation metropolitan optical transport platform, which is
developed by Huawei for packet transport.
1.2 Network Application
The OptiX PTN 3900 is applied at the convergence layer and the backbone layer of a
metropolitan transport network.
As emerging data services are widely applied, operators require increasing bandwidth of the
transport network and demand more flexibility of scheduling bandwidth. As a circuit-switching
network, the traditional SDH-based multiservice transport network is inapplicable to the data
services that feature burst and flexibility. In addition, the traditional connectionless IP network
should not be used as a telecommunication carrier network because it cannot strictly ensure the
quality and performance of important services.
With the pseudo wire emulation edge-to-edge (PWE3) technology, the multi-protocol label
switch (MPLS) technology, as well as ideal operation, administration and maintenance (OAM)
and protection switching mechanism, the OptiX PTN 3900 is able to provide services of carrier-
class quality in a packet transport network and SDH transport network.
The OptiX PTN 3900 is mainly used in the convergence layer and the backbone layer of a
metropolitan transport network. It transports packet services in the network, and converges the
services to an IP/MPLS backbone network.
The OptiX PTN 3900 also supports the coarse wavelength division multiplexing (CWDM)
networking and realizes the local wavelength grooming.
In later versions, the OptiX PTN 3900 supports the SDH boards of the OptiX OSN
1500/2500/3500/7500 product series and supports the dense wavelength division multiplexing
(DWDM) boards of the OptiX OSN 3800/6800 product series, to realize the networking with a
WDM/SDH backbone network. This facilitates the smooth evolution of the metropolitan
transport network from a time division multiplex (TDM) switching network to a packet switching
network.
Figure 1-2 shows the network application of the OptiX PTN 3900.
STM-N GE/10GE
Metro WDM
DSLAM Enterprise
BTS NodeB
private line
The OptiX PTN 3900 supports various types of services, and provides abundant functions and
features to ensure service transport quality and efficiency.
The OptiX PTN 3900 supports the physical layer clock synchronization mechanism, the external
clock input/output, and the equipment internal clock. In addition, the OptiX PTN 3900 also
supports the IEEE 1588 V2 clock synchronization
2.10 DCN Scheme
The data communication network (DCN) is an integral part of network management, and is used
to transmit the network management information. The OptiX PTN 3900 supports the inband
DCN to ensure the intercommunication of network management information.
Note: The OptiX PTN 3900 provides unidirectional switching capability of 320 Gbit/s in the
ingress and egress directions. That is, the OptiX PTN 3900 provides bidirectional switching
capability of 640 Gbit/s.
ATM STM-1 2 (AD1) 2 (AD1 and 32 (AD1, The ATM STM-1 signals
2 (ASD1) MP1) ASD1) can be accessed by
2 (ASD1 and 128 (AFO1) processing board (AD1,
8 (AFO1) ASD1) as well as
MP1)
interface board (AFO1)
32 (EG16)
POS interface STM-1 optical interfaces: S-1.1, L-1.1, L-1.2 Applicable to UNI
STM-4 optical interfaces: S-4.1, L-4.1, L-4.2, and NNI
Ve-4.2
NOTE
Table 2-4 Administration and auxiliary interfaces of the OptiX PTN 3900
External clock interface Common interface for 120-ohm clock input 2 x RJ-45
and output (2048 kbit/s or 2048 kHz), or 2 x SMB
Common interface for 75-ohm clock input
and output (2048 kbit/s or 2048 kHz)
Networking Interface
The OptiX PTN 3900 supports the following interfaces for networking.
l 10GE
l GE
l FE
l POS STM-4
l POS STM-1
l ML-PPP
NOTE
l It is recommended that the ML-PPP should be used to form the chain network.
l The FE electrical interface is not recommended to be used as networking interface.
ML-PPP
POS
POS
POS
ML-PPP
GE
GE
GE
GE
GE
R99 flow
Leased line
For details on the networking application of the OptiX PTN equipment for mobile
communication, see 9.1 Application of the Equipment for Mobile Services. For details on the
networking application of the OptiX PTN equipment in the offload solution, see9.3 Offload
Solution.
FE
GE
E-Line
Protection Path
CE
Figure 2-5 shows the typical networking mode of the PTN equipment for E-LAN services.
FE
GE
E-LAN
CE
Figure 2-6 shows the typical networking mode of the PTN equipment for E-Aggr services.
FE
OptiX PTN 3900 NodeB
GE
For details on the networking application of the OptiX PTN equipment for Ethernet services,
see 9.2 Application of the OptiX PTN 3900 for the L2VPN Service.
PE
PE
VPN 2 P P
VPN 1
CE-D
CE-B
CE
For details on the networking application of the OptiX PTN equipment for L3VPN, see 4.5
L3VPN Services.
The OptiX PTN 3900 provides various equipment level protection schemes, as listed in Table
2-5.
The OptiX PTN 3900 provides various network level protection schemes, as listed in Table
2-6.
1:1 protection
Reroute protection
2.6 QoS
The OptiX PTN 3900 provides hierarchical end-to-end quality of service (QoS) management,
and thus provides high quality transports that are differentiated by service.
The OptiX PTN 3900 provides complete QoS grooming mechanisms, which include the
following:
l DiffServ mode based on flow classification. With the DiffServ mode, the OptiX PTN 3900
helps operators provide services of different quality classes for users. Hence, operators can
provide an integrated network that can carry data, voice and video services.
l QoS for end-to-end services
– Hierarchical QoS (HQoS) mechanism at the access side. The HQoS mechanism helps
control the overall bandwidth for a single service type, a single service access point,
multiple service access points, a single service or multiple services. See Table 5-3 for
the action points of the HQoS.
– Traffic Engineering (TE) mechanism at the network side. The TE mechanism helps
balance the network traffic to ensure the service quality.
With the complete QoS mechanisms, the OptiX PTN 3900 ensures that the specifications of
delay, delay variation, and bandwidth are satisfied for different services, and thus guarantees
the provision of carrier-class services.
Figure 2-8 shows the OAM mechanism of the OptiX PTN 3900.
CE CE
FE FE
PTN PTN
Router Router
At the network level, the OptiX PTN 3900 supports MPLS OAM and Ethernet OAM.
l The OptiX PTN 3900 supports the following MPLS OAM functions.
– The equipment provides hardware support, to transmit and receive connectivity
verification (CV) messages, fast failure detection (FFD) messages, backward defect
indicator (BDI) messages, and forward defect indicator (FDI) messages, and to perform
timeout judgment for these messages. In compliance with ITU-T Y.1710 and ITU-T Y.
1711, the fast continuity check and failure indication are realized. As supported by the
equipment, the minimum period for transmitting the FFD packets is 3.3 ms.
– The equipment supports the MPLS Tunnel Ping and TraceRoute commands, and also
the virtual circuit connectivity verification (VCCV) command for the PW. These
commands can be used to detect and locate the faults.
– The equipment supports performance monitoring for MPLS Tunnel. In compliance with
ITU-T Y.1710, the equipment provides hardware support for the monitoring of packet
loss ratio, packet delay and packet delay variation.
l The OptiX PTN 3900 supports the following Ethernet OAM functions that are compliant
with IEEE 802.1ag and ITU-T Y.1731.
– The equipment provides hardware support for the Ethernet continuity check (ETH-CC)
and the performance monitoring. As supported by the equipment, the minimum period
for transmitting the OAM frames is 3.3 ms.
– The control plane of the equipment supports the Ethernet loopback (ETH-LB) and
Ethernet link trace (ETH-LT) operations.
– The equipment supports performance monitoring for the E-Line service. In compliance
with ITU-T Y.1731, the equipment provides hardware support for the monitoring of
packet loss ratio, packet delay, and packet delay variation.
At the link layer, the OptiX PTN 3900 supports the following OAM mechanisms.
l The equipment supports Ethernet OAM that is compliant with IEEE 802.3ah. Each Ethernet
port supports link discovery, link state monitoring, remote fault indication, and remote
loopback.
l The equipment supports ATM OAM, including the fault management in the F4 OAM and
F5 OAM.
2.8 NSF
With the non-stop forwarding (NSF) function, data forwarding can be properly performed even
when the control plane of the equipment is faulty (for example, the CPU is restarted). In this
case, key services on the network are protected.
The OptiX PTN 3900 supports the protocol level graceful restart (GR) technology (for example,
the LDP GR). In the case of a fault, the neighbor nodes do not delete the route information. In
this way, services are still forwarded and the network route oscillation is avoided.
The OptiX PTN 3900 supports the NSF function in the following cases:
l The warm reset of the processing board and the XCS board.
l The cold reset of the XCS board (the XCS board should be configured with 1+1 protection).
l The reset of the SCA board (the SCA board should be configured with 1+1 protection).
2.9 Clock
The OptiX PTN 3900 supports the physical layer clock synchronization mechanism, the external
clock input/output, and the equipment internal clock. In addition, the OptiX PTN 3900 also
supports the IEEE 1588 V2 clock synchronization
The OptiX PTN 3900 supports input/output of two 75-ohm or two 120-ohm external clock
sources, which are of 1+1 protection.
The OptiX PTN 3900 supports three clock working modes, that is, the locked, hold-over, and
free-run modes. The OptiX PTN 3900 also supports the processing and transfer of
synchronization status messages (SSM).
The synchronous Ethernet is a technology used to synchronize the clock at the Ethernet physical
layer. Clock signals are extracted directly from the serial bit flow on the Ethernet link. These
clock signals are then used for data transmission. In this way, the clock signals are transferred.
IEEE 1588 V2
IEEE 1588 V2 is a time synchronization protocol that provides the nanosecond accuracy to meet
the requirements of 3G base stations. OptiX PTN 3900 supports the following features of IEEE
1588 V2:
l The equipment can use the IEEE 1588 V2 protocol to achieve the clock synchronization
and time synchronization.
l The equipment supports the boundary clock (BC) mode, ordinary clock (OC) mode, and
transparent clock (TC)/(TC+OC) mode. The TC mode includes the end-to-end (E2E) TC
mode and (P2P) TC mode.
l The equipment supports the BMC algorithm to select clock source.
3 System Architecture
This chapter describes the system architecture of the OptiX PTN 3900 in terms of functional
module, hardware structure and software architecture.
FE/GE/10GE POS
Clock module
ATM STM-1
GE/10GE
客户接口
E1
UNI NNI
Switching plane
interface interface ML-PPP
Channelized
STM-1 Service Service
sub-board sub-board
Service processing module
Bus
NM interface
Alarm I/O interface
Heat
Power supply Management and
dissipation Alarm cascade interface
module control module
module CF card
F&f
better quality and locks phase of the clock source for synchronization. Finally, the clock module
provides the system clock for each module and supports the output of clock signals through the
external clock interfaces.
The clock module processes and transfers the synchronization status messages (SSMs).
3.2.1 Overview
The OptiX PTN 3900 equipment consists of the subrack and boards.
3.2.2 Cabinet
The OptiX PTN 3900 can be installed in a 300 mm deep ETSI cabinet (N63E cabinet or T63
cabinet).
3.2.3 Subrack
The OptiX PTN 3900 subrack is of a dual-layer structure. The subrack consists of processing
board area, interface board area, switching fabric area, system control board area, power supply
board area, fan area and fiber routing trough.
3.2.4 Boards
Boards of the OptiX PTN 3900 include the processing board, WDM board, service sub-board,
interface board, cross-connect and timing board, system control, communication and auxiliary
processing board, fan board and power supply board.
3.2.5 Valid Slots for Boards
On the OptiX PTN 3900 subrack, 40 slots are available, covering the 16 slots for processing
boards, 16 slots for interface boards, two slots for switching boards, two slots for system control
boards, two slots for PIU boards, and two slots for FAN boards.
3.2.1 Overview
The OptiX PTN 3900 equipment consists of the subrack and boards.
Figure 3-2 shows the subrack installed in the cabinet.
Cabinet
Power distribution
unit
Cable distribution
plate
Subrack
3.2.2 Cabinet
The OptiX PTN 3900 can be installed in a 300 mm deep ETSI cabinet (N63E cabinet or T63
cabinet).
Figure 3-3 shows the cabinets used to house the OptiX PTN 3900 subrack.
Figure 3-3 Appearance of the cabinets used to house the OptiX PTN 3900
3.2.3 Subrack
The OptiX PTN 3900 subrack is of a dual-layer structure. The subrack consists of processing
board area, interface board area, switching fabric area, system control board area, power supply
board area, fan area and fiber routing trough.
Subrack Structure
Figure 3-4 shows the structure of the OptiX PTN 3900 subrack.
Interface board
area System control
board area
Power supply
board area
Fan area
(without air filter)
Processing board
area
Processing
board area Switching fabric
area
Fan area
Air filter
l Processing board area, which is used to house the processing boards and service sub-
boards.
l Interface board area, which is used to house the interface boards.
l System control board area, which is used to house the system control, communication and
auxiliary processing board (SCA).
l Switching fabric area, which is used to house the cross-connect and timing board (XCS).
l Power supply board area, which is used to house the power supply boards.
l Fan area, which is used to house the fan tray assembly and air filter.
l Fiber routing trough, which is used to route fibers and external clock cables.
Slot Allocation
The OptiX PTN 3900 subrack consists of the upper layer and lower layers. The upper layer
contains 20 slots and the lower layer contains 18 slots. In addition, there are two slots for FAN
boards. In total, 40 slots are available on the OptiX PTN 3900 subrack.
Figure 3-5 shows the position of each slot in the OptiX PTN 3900 subrack.
S S S S S S S S P P S S S S S S S S S S
L L L L L L L L I I C C L L L L L L L L
O O O O O O O O U U A A O O O O O O O O
T T T T T T T T T T T T T T T T
1 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3
9 0 1 2 3 4 5 6 27 28 29 30 1 2 3 4 5 6 7 8
Fan SLOT 39
S S S S S S S S X X S S S S S S S S
L L L L L L L L C C L L L L L L L L
O O O O O O O O S S O O O O O O O O
T T T T T T T T T T T T T T T T
1 2 3 4 5 6 7 8 9 10 1 1 1 1 1 1 1 1
1 2 3 4 5 6 7 8
Fan SLOT 40
Air filter
Table 3-1 Mapping relation between slots for processing boards and interface boards of the
OptiX PTN 3900
Slots for Processing Boards Slots for Interface Boards
Slots 5-8 -
Slots 11-14 -
Table 3-2 lists the mapping relation between processing boards and interface boards.
Table 3-2 Mapping relation between processing boards and interface boards of the OptiX PTN
3900
Processing Board Service Sub-Board Interface Board
EX2 - -
S S S S S S S S P P S S S S S S S S S S
L L L L L L L L I I C C L L L L L L L L
O O O O O O O O U U A A O O O O O O O O
T T T T T T T T T T T T T T T T
1 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 3
9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8
Fan SLOT 39
S S S S S S S S S S S S S S S S
L L L L L L L L X X L L L L L L L L
O O O O O O O O C C O O O O O O O O
T T T T T T T T S S T T T T T T T T
1 2 3 4 5 6 7 8 9 1 1 1 1 1 1 1 1 1
0 1 2 3 4 5 6 7 8
2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
G G G G G G G G G G G G G G G G
b b b b b b b b b b b b b b b b
i i i i i i i i i i i i i i i i
t t t t t t t t t t t t t t t t
/ / / / / / / / / / / / / / / /
s s s s s s s s s s s s s s s s
3.2.4 Boards
Boards of the OptiX PTN 3900 include the processing board, WDM board, service sub-board,
interface board, cross-connect and timing board, system control, communication and auxiliary
processing board, fan board and power supply board.
Table 3-3 lists the boards of the OptiX PTN 3900 and their functions.
Interface board ETFC, EFG2, POD41, D12, Accesses ATM STM-1, FE,
D75, EFF8, AFO1 GE, POS STM-1/STM-4 and
E1 signals.
Table 3-4 Valid slots for boards in the OptiX PTN 3900 subrack
Board Full Name Valid Slot Remarks
EX2 2-port 10 Gigabit Ethernet Slots 1, 3, 5, 7, 11, One EX2 occupies two
Switching Processing Board 13, 15, and 17 slots.
CD1 2-port channelized STM-1 Slots 1 - 8 and 11 - The CD1 should be jointly
sub-board 18 used with the MP1.
AD1 2-port ATM STM-1 sub- Slots 1 - 8 and 11-18 The AD1 should be jointly
board used with the MP1.
ASD1 2-port ATM STM-1 sub- Slots 1 - 8 and 11 - The ASD1 should be jointly
board with SAR function 18 used with the MP1.
AFO1 8 x ATM STM-1 interface Slots 19 - 26 and 31 The AFO1 should be jointly
board - 38 used with the EG16.
EFF8 8 x FE optical interface board Slots 19 - 26 and 31 The EFF8 should be jointly
- 38 used with the EG16.
3.3.1 Overview
The software for the OptiX PTN 3900 consists of the management plane, control plane and data/
forwarding plane.
3.3.2 NE Software
The NE software manages, monitors and controls the running status of boards in the NE. The
NE software also functions as the service unit for the communication between the T2000 and
boards. In this way, the T2000 can control and manage the NE. In addition, the NE software
manages the software loading, software package loading and fix of the system control board.
3.3.3 Board Software
The board software is responsible for Layer 2 switching, the MPLS packet processing and the
QoS. The board software monitors and reports the alarms and performance events of each board
to the NE software.
3.3.1 Overview
The software for the OptiX PTN 3900 consists of the management plane, control plane and data/
forwarding plane.
Figure 3-7 shows the logical block diagram for the software architecture of the OptiX PTN
3900.
Figure 3-7 Logical block diagram for the software architecture of the OptiX PTN 3900
Management
plane System
management unit
Control
plane System control
unit
Processing Processing
board board
Forwarding Forwarding
unit unit
Data
Switching
plane unit
Forwarding 交换网板 Forwarding
unit unit
General cross-
Processing connect and timing Processing
board board board
Management Plane
The management plane performs functions such as performance management, fault
management, configuration management, software management, Layer 2 protocol control and
security management. The NE software and board software both belong to the management
plane. The board software is used to manage the data/forwarding plane.
Control Plane
The control plane consists of a group of communication entities and controls the calling and
connection. The control plane uses signaling to set up, release, monitor and maintain
connections, and to recover connections in the case of a fault. Both the NE software and board
software are involved in the functions of the control plane.
Data Plane
The data plane receives and forwards service data according to the forwarding message generated
by the control plane. This plane also monitors the control packets of services and reports these
packets to the control plane and the management plane.The processing boards and XCS are
responsible for the provision of the data plane.
3.3.2 NE Software
The NE software manages, monitors and controls the running status of boards in the NE. The
NE software also functions as the service unit for the communication between the T2000 and
boards. In this way, the T2000 can control and manage the NE. In addition, the NE software
manages the software loading, software package loading and fix of the system control board.
Figure 3-8 shows the architecture of the NE software for the OptiX PTN 3900.
Figure 3-8 Architecture of the NE software for the OptiX PTN 3900
Software GCP Protocol
Platform
Interface Configuration Module IGMP
management
snooping
QoS Layer 2
Alarm and
performance MSTP
management MPLS
Basic frame
Hardware driver
Software Platform
The software platform consists of the interface management module, alarm and performance
management module, and DCN module.
Interface management module: This module divides and converts different forms of commands
from different types of terminals to the internal commands of the same form.
Alarm and performance management module: This module supports the reporting and query of
current alarms, storage and query of history alarms, reporting of performance events and
management of the system logs.
DCN module: This module processes the DCN packets, and provides the communication
between the local NE and other parts, including the T2000 and other NEs.
GCP
The GCP provides a uniform static or dynamic distribution mechanism for MPLS labels. The
GCP also provides routing protocols and trail computation algorithm related to the creation of
dynamic service. In addition, the GCP provides the LMP protocol related to the neighbor auto-
discovery function of the transport plane.
Configuration Module
The configuration module consists of the equipment management sub-module and QoS sub-
module. The functions of the configuration module as follows.
l Responsible for the management configuration of the entire NE, including service
management, equipment management, resource management and protocol configuration
agent.
l Responsible for the setting and querying of the attributes of alarms and performance of the
managed objects.
l Responsible for querying and reporting of the performance data.
l Responsible for inter-board alarm suppression and query of alarms of specified objects.
l Responsible for storing configuration data.
l Responsible for providing Layer 2 switching, processing MPLS and IP packets and the
QoS function.
Protocol
IGMP Snooping protocol, which is a Layer 2 multicast protocol and provides the Layer 2
multicast function.
MSTP protocol, which is a spanning tree protocol used for loop release, link backup and VLAN-
based link load balance.
Link aggregation control protocol (LACP) protocol, which is used for linear bandwidth
increasing, link backup and load balance.
Basic Frame
The basic frame provides the basic platform kernel and system support. For example, the basic
frame realizes the board management, distributed message management and log management.
Figure 3-9 shows the architecture of the board software for the OptiX PTN 3900.
Figure 3-9 Architecture of the board software for the OptiX PTN 3900
Forwarding plane Alarm/log Performance Software
management
LIB Software
Alarm report/ 15-m/24-h
indication performance package
Alarm detection loading
computation
Alarm anti-jitter/
Statistics of inter-board Patch
RMON
performance units suppression management
Basic frame
Hardware driver
4 Services
4.1 Overview
The OptiX PTN 3900 supports the L2VPN and L3VPN service, Ethernet service, ATM service
and CES service. Based on the service model of the OptiX PTN 3900, this section describes the
processing of various services in the OptiX PTN 3900.
4.2 Ethernet Service
The OptiX PTN 3900 supports various Ethernet services and provides ideal L2VPN solutions.
4.3 ATM Service
In the transport network with the packet switching as the core, the OptiX PTN 3900 provides
the ATM emulation service.
4.4 Circuit Emulation Service
In a packet switching network (PSN), the circuit emulation services are used to transparently
transmit the TDM circuit. The OptiX PTN 3900 supports TDM CES accessed by the E1 electrical
interfaces and the channelized STM-1 optical interfaces.
4.5 L3VPN Services
The OptiX PTN 3900 supports border gateway protocol (BGP)-based or MPLS-based layer3
virtual private network (L3VPN) services. The equipment provides a complete L3VPN solution.
4.1 Overview
The OptiX PTN 3900 supports the L2VPN and L3VPN service, Ethernet service, ATM service
and CES service. Based on the service model of the OptiX PTN 3900, this section describes the
processing of various services in the OptiX PTN 3900.
Basic concepts
Basic concepts include customer edge (CE), provider edge (PE), provider (P), and site.
l CE is the edge equipment in the user network and has interfaces to directly connect the
network of the service provider. A CE can be a router, a switch, or a host. Normally, a CE
need not support the MPLS.
l PE is the edge router of the service provider. It is the edge equipment in the network of the
service provider and is directly connected to the CE.
l P is the backbone router in the network of the service provider. It is not directly connected
to the CE. The P equipment needs to have only the basic MPLS forwarding capability.
l Site is the IP system group where IP systems are interconnected and the connectivity is
independent of the network of the service provider. The site is connected to the network of
the service provider through the CE. One site can include multiple CEs, but one CE belongs
to only one site.
Figure 4-1 MPLS-Based PWE3 Service model of the OptiX PTN 3900
UNI NNI
Forwarder
Emulated
Native service Ethernet TDM TDM ATM Ethernet
ATM switch service
processing switch processing
To CE To PSN
The UNI side is interconnected to the customer-side equipment (CE), responsible for accessing
the customer-side services to the PSN network. In the service model, the functions of layers on
the UNI side are described as follows.
l Physical layer
The physical layer provides interfaces between the PTN equipment and the transmission
media, such as cables and fibers.
– In the direction from the CE to the PE, the physical layer processes the physical signals
(electrical signals or optical signals) transmitted from the customer-side equipment,
extracts information from the signals, and transmits the information to the service
interface layer.
– In the direction from the PE to the CE, the physical layer receives the information
transmitted from the service interface layer, converts the information into signals
suitable for the transmission through the transmission medium, and then transmits the
signals to the customer-side equipment through the physical channel.
l Service interface layer
– In the direction from the CE to the PE, the service interface layer receives the
information transmitted from the physical layer, distinguishes service types, and
transmits the services to the corresponding native service processing (NSP) layer for
processing.
– In the direction from the PE to the CE, the service interface layer receives the service
signals transmitted from the NSP layer, selects the proper physical channel type and
transmits the signals to the physical layer.
l NSP layer
According to the customer requirements, the NSP layer performs relevant processing for
different services.
The NNI side is interconnected to the PSN equipment, to achieve the transmission of customer
services in the PSN network. In the service model, the functions of layers on the NNI side are
described as follows.
l Emulation service layer
The emulation service layer corresponds to the payload that is to be encapsulated into the
PW. An emulation service corresponds to a PW. The emulation service layer is an abstract
logical layer. The PTN equipment does not perform any specific operation at this layer.
l PWE3 encapsulation layer
The PWE3 encapsulation layer adopts different encapsulation modes for different
emulation services. It can encapsulate different emulation services into PWE3 protocol data
units or decapsulate different emulation services from PWE3 protocol data units.
l MPLS layer
The MPLS layer contains the following two MPLS labels:
– Outer label, that is, the tunnel label. It is used to create and maintain a tunnel that crosses
the MPLS network between the PE stations at two ends of a service, for the purpose of
carrying the PW.
– Inner label, that is, the PW label. It is used to distinguish different PWs in the same
tunnel.
l Data link layer and physical layer
As the carrier layers of the MPLS, the data link layer and the physical layer provide links
for the MPLS layer to transmit data. The OptiX PTN 3900 supports the following network-
side link types.
– Ethernet link (GE/10GE interface)
– POS link (STM-1 or STM-4 interface)
– ML-PPP link (E1 interface or channelized STM-1 interface)
The forwarder located between the UNI and the NNI mutually forwards services processed at
the NSP layer on the UNI side and the emulation services on the NNI side.
NOTE
The Ethernet link of the FE electrical interface is not recommended to be used as the network-side link for
the OptiX PTN 3900.
BGP/MPLS Model
Figure 4-2 shows the BGP/MPLS service model of the OptiX PTN 3900 which is used as PE.
VPN label
Native service VRF
processing layer MPLS layer
Tunnel label
Service interface IP
layer IPoE1
PPP PPP 802.2
(MP) HDLC 802.3 Data link layer
E1/ STM-1/ GE/ and
E1/ physical layer
Physical layer FE GE 10GE STM-1 cSTM-1 STM-4 10GE
cSTM-1
ML-PPP POS Ethernet
To PSN
To CE
On the UNI side, the equipment is connected to the customer edge (CE) to access the L3VPN
services to the PSN. In the case of the BGP/MPLS model, layers on the UNI side have the
following functions.
l Physical layer
The physical layer provides interfaces to connect transmission media, such as cables or
fibers, to the PTN equipment.
– In the CE-to-PE direction, the physical layer processes the physical signals (electrical
or optical signals) transmitted from the user-side equipment, extracts information from
the signals, and then sends the signals to the service interface layer.
– In the PE-to-CE direction, the physical layer receives information transmitted from the
service interface layer, converts the information into signals that can be transmitted over
the transmission medium, and then sends the signals to the user-side equipment through
the physical channel.
l Service interface layer
– In the CE-to-PE direction, the service interface layer receives information transmitted
from the physical layer, extracts and sends IP packets to corresponding VPN routing
and forwarding tables (VRFs) for processing.
– In the PE-to-CE direction, the service interface layer receives service signals transmitted
from VRFs, selects proper types of physical channels, and sends the service signals onto
the physical layer.
l Native service processing module
On the native service processing layer, respective VRF processes each L3VPN service. The
VRF has the following functions:
– Forwards IP packets of each service port (UNI ports and NNI ports) in the native VPN
according to the routing table of the VPN.
– Updates routes connected to the CE by running the same routing protocol as CE.
– Updates routes of the VPN by using the multi-protocol extensions for border gateway
protocol (MP-BGP) on all equipment in the VPN.
On the NNI side, the native service processing layer is connected to the PSN equipment to
transmit the L3VPN services in the PSN network. In the case of the BGP/MPLS service model,
layers on the NNI side have the following functions.
l MPLS layer
The MPLS layer includes two MPLS labels:
– The external MPLS label is a tunnel label, which is used to create and maintain a tunnel
between PEs at two ends of a service. The tunnel crosses an MPLS network to carry
PWs.
– The internal MPLS label is a PW label, which identifies a PW in a tunnel.
l Data link layer and physical layer
The data link layer and the physical layer work as the MPLS carrier layer and provide links
for the MPLS layer to transmit data. The OptiX PTN 3900 supports the following types of
network-side links.
– Ethernet link (FE interface or GE interface)
– cSTM-1 link
– ML-PPP link (E1 interface)
Forwarder
To PSN To PSN
The NNI side, interconnected with the PSN equipment, transmits the services in the public PSN.
The OptiX PTN 3900 has only the MPLS forwarding capability. That is, the OptiX PTN 3900
forwards the MPLS packets according to the forwarding table of tunnel labels.
At the physical layer on the UNI side, the OptiX PTN 3900 supports the interconnection to the
customer-side equipment through the following physical interfaces to access the Ethernet
service.
l FE
l GE
l 10GE
l In the direction from the CE to the PE, receives the signals transmitted from the physical
layer, extracts the Ethernet frames, and sends the Ethernet frames to the Ethernet switch
module at the native service processing (NSP) layer for processing.
l In the direction from the PE to the CE, receives the Ethernet frames transmitted from the
Ethernet switch module that is at the NSP layer, and sends the Ethernet frames to the
corresponding Ethernet physical channel.
According to the customer requirements, the NSP layer on the UNI side performs the following
processing.
l Processes a VLAN tag for the Ethernet frames (adds, strips or exchanges a VLAN tag).
l Performs the QoS processing, such as flow classification and congestion management.
l Controls the access authority by using the access control list (ACL).
l Performs the Ethernet OAM processing according to IEEE 802.1ag or IEEE 802.3ah.
The forwarder located between the UNI and the NNI mutually forwards the Ethernet service at
the NSP layer on the UNI side and the relevant PW on the NNI side. The forwarder can adopt
the following two modes to determine the relevant PW of the Ethernet service.
The emulation service layer on the NNI side corresponds to the payload that is to be encapsulated
into the PW. The emulation service layer is an abstract logical layer. The PTN equipment does
not perform any specific operation at this layer.
The PWE3 encapsulation layer on the NNI side adds the PW header to an Ethernet frame to
form a PW protocol data unit (PDU).
At the MPLS layer on the NNI side, by using two tags, the OptiX PTN 3900 distinguishes the
PW that carries the service from the tunnel that carries the PW.
At the data link layer and the physical layer on the NNI side, the OptiX PTN 3900 carries and
transmits the MPLS packet through different links.
NOTE
On the NNI side, the Ethernet service can be carried by a QinQ Tunnel instead of an MPLS Tunnel. In this
case, the C-VLAN and S-VLAN tags are used instead of MPLS labels.
On the NNI side, the Ethernet service can be directly carried by a physical Ethernet port without using the
PWE3 encapsulation and MPLS label technology. In this case, the Ethernet port is fully occupied by the
Ethernet service.
The forwarder located between the UNI and the NNI mutually forwards the ATM service at the
NSP layer on the UNI side and the relevant PW on the NNI side. The forwarder can adopt the
following modes to determine the relevant PW of the ATM service.
l VCC
l VPC
The emulation service layer on the NNI side corresponds to the payload that is to be encapsulated
into the PW. The emulation service layer is an abstract logical layer. The PTN equipment does
not perform any specific operation at this layer.
The PWE3 encapsulation layer on the NNI side can adopt the following two modes to encapsulate
the ATM cells into a PW PDU.
l Encapsulating one ATM cell into a PW PDU.
l Encapsulating N (N<=31) ATM cells into a PW PDU. This is also referred to as ATM cell
concatenation.
At the MPLS layer on the NNI side, by using two tags, the OptiX PTN 3900 distinguishes the
PW that carries the service from the tunnel that carries the PW.
At the data link layer and the physical layer on the NNI side, the OptiX PTN 3900 carries and
transmits the MPLS packet through different links.
At the physical layer on the UNI side, the OptiX PTN 3900 supports the interconnection to the
customer-side equipment through the following physical interfaces to access the CES service.
l Channelized STM-1
l E1
l In the direction from the CE to the PE, receives the signals transmitted from the physical
layer, extracts the TDM services, and sends the TDM services to the TDM processing
module at the NSP layer for processing.
l In the direction from the PE to the CE, receives the TDM services transmitted from the
TDM processing module that is at the NSP layer, and sends the TDM services to the
corresponding physical channel.
According to the customer requirements, the NSP layer on the UNI side performs the following
processing
l Performs the multiplexing and demultiplexing for channelized STM-1 signals and E1
signals.
l Performs the E1 (VC-12) granularity scheduling for the channelized STM-1 signals.
The forwarder located between the UNI and the NNI mutually forwards the TDM service at the
NSP layer on the UNI side and the relevant PW on the NNI side. The forwarder can adopt the
following two modes to determine the relevant PW of the TDM service.
The emulation service layer on the NNI side corresponds to the payload that is to be encapsulated
into the PW. The emulation service layer is an abstract logical layer. No specific operation is
performed at this layer.
The PWE3 encapsulation layer on the NNI side can adopt the following two modes to encapsulate
the TDM service into a PW PDU.
At the MPLS layer on the NNI side, by using two tags, the OptiX PTN 3900 distinguishes the
PW that carries the service from the tunnel that carries the PW.
At the data link layer and the physical layer on the NNI side, the OptiX PTN 3900 carries and
transmits the MPLS packet through different links.
A virtual private network (VPN) is a private network constructed on the basis of the public
network. The L2VPN is the VPN based on technologies of the link layer. The VPN constructed
on the public network can provide the same security, reliability and manageability as the existing
private networks.
Service providers can provide the VPN value-added service for enterprises to fully use the
existing network resources and to increase the service volume. In addition, service providers
can consolidate long-term partnership with enterprises.
For VPN users, the cost to lease the network is saved. The flexibility of the VPN networking
makes the network management easier for enterprises. As the network security and encryption
technology develops, the private data can be transmitted over the public network with security.
Service Form
For the OptiX PTN 3900, the Ethernet service has the following forms.
The QoS processing, such as flow classification and bandwidth control, can be performed for
the Ethernet service.
Standardization organizations such as ITU-T, IETF and MEF stipulate the model frames for L2
Ethernet services. Table 4-1 lists these model frames. In this document, the L2 Ethernet services
are of the model frame stipulated by MEF.
VLAN Physically -
isolated
VLAN -
MPLS VPWS
S-VLAN -
MPLS VPLS
S-VLAN B-MAC -
B-VLAN
E-Line1
E-Line2 City 2
E-Line3
Company C Company B
the branchs and the data from different branchs are isolated. In addition, the VLAN is used to
isolate the Internet data accessed by the headquarters from the internal service data.
ISP
Metro Nationwide/Global
carrier Ethernet carrier Ethernet
Branch B Headquarter
Metro
carrier Ethernet
VLAN1 City 2
VLAN2
VLAN3 Branch A Branch B Branch A
FE
FE
GE
FE
The OptiX PTN 3900 can access the IMA service and supports the following operations.
l Query of the IMA link status.
l Add the channelized STM-1 VC-12 link (CD1) or E1 link to the IMA group.
l Delete the channelized STM-1 VC-12 link (CD1) or E1 link from the IMA group.
l The OptiX PTN 3900 supports a maximum of 4k ATM services (remote service) and a
maximum of 2k ATM services (local service), each optical interface supports 512 ATM
services.
l The OptiX PTN 3900 supports a maximum of 8k ATM connections (remote service) and
a maximum of 4k ATM connections (local service), each optical interface supports 1k ATM
connections.
The OptiX PTN 3900 supports the following IMA specifications.
l The CD1 board supports a maximum of 64 IMA groups.
l The MD1 board and MQ1 board support a maximum of 32 IMA groups.
l Each IMA group contains a maximum of 32 E1 links or 32 channelized STM-1 VC-12
channels.
For the ATM service, the QoS policies can be configured in relation to the service type and
bandwidth.
Application Model
The OptiX PTN 3900 uses the PWE3 technology to provide the CES.
The CES mainly applies to the wireless service and enterprise private line service. For 2G/3G
stations or enterprise private lines, the PTN equipment accesses E1 signals from E1 lines or
channelized STM-1 lines. The PTN equipment then encapsulates the E1 signals into packets,
which are then transported to the opposite end through the PW. Figure 4-7 shows the process.
Backbone
layer
IP/MPLS backbone
Convergence
RNC BSC
layer
Access
layer
OptiX OptiX
CES
PTN 3900 PTN 1900
Emulation Mode
The OptiX PTN 3900 supports the CES services in both the structured emulation mode and
unstructured emulation mode.
The structured emulation mode is also the structure-aware TDM circuit emulation service over
packet switched network (CESoPSN) mode.
l In this mode, the equipment detects the frame structure, framing scheme and timeslot
information in the TDM circuit.
l In this mode, the equipment processes the overhead in the TDM frames and extracts the
payload. The equipment then places each channel of timeslots into the packet payload in a
certain sequence. In this way, each channel of services are fixed and known.
The unstructured emulation mode is also the structure-agnostic TDM over packet (SAToP)
mode.
l In this mode, the equipment does not detect the structure of any TDM signals, but takes
signals as bit flow of the fixed rate. In this way, the overall TDM signals is emulated.
l In this mode, the overhead and payload in the TDM signals are transparently transmitted.
In the structured emulation mode, the OptiX PTN 3900 senses the E1 structure of the TDM
signal and provides the idle 64 kbit/s timeslot suppression function to save the transmission
bandwidth.
Service Clocks
TDM services have high requirements for clock synchronization. The OptiX PTN 3900 supports
the retiming synchronization mode.
In the retiming synchronization mode, the system clock of the PEs are synchronized and the
system clock is used as the service clock (retiming). Thus, all the PEs and CEs are synchronized
and the service clocks of the TDM services on all the CEs and PEs are synchronized. See Figure
4-8.
CES
BTS TDM PE PE TDM BSC
Basic Concepts
The BGP/MPLS L3VPN, based on the PE, is an L3VPN technology of the provider provisioned
VPN (PPVPN). It uses the BGP to issue VPN routes in the backbone network of the service
provider and uses the MPLS to forward VPN packets in the backbone network of the service
provider.
The BGP/MPLS L3VPN enables flexible networking and can be easily extended. In addition,
the BGP/MPLS L3VPN supports the MPLS QoS and MPLS TE.
Figure 4-9 shows the schematic diagram of BGP/MPLS L3VPN application.
PE
PE
VPN 2 P P
VPN 1
CE-D
CE-B
CE
Route Diffusion
The route is the basis of the Layer 3 IP forwarding. The diffusion and differentiation of routers
is a core problem to be solved by the L3VPN solution
The BGP/MPLS L3VPN solution of the OptiX PTN equipment supports the following routing
mechanisms:
l Runs the open shortest path first (OSPF), routing information protocol (RIP), and E-BGP
routing protocols together with the CE to complete the VPN route diffusion between the
local equipment and the CE.
l Uses the MP-BGP protocol to complete the VPN route diffusion between PEs in the same
VPN.
l Uses the IS-IS routing protocol for networking between the OptiX PTN equipment.
Service Forwarding
The BGP/MPLS L3VPN adopts the MPLS technology to forward service packets by using two
MPLS labels. On the PE connected to the CE, the VPN, to which a service packet belongs, is
distinguished by using the inner MPLS label. When traveling the public PSN, the service packets
are forwarded in the public PSN by using the outer MPLS label.
As shown in Figure 4-10, IP packets of the CE-C in VPN 2 need be transmitted to the subnet
connected to CE-B. For the packet forwarding process, see Table 4-2.
PE-X
IP
ETH
PE-Z
VPN 2 P3 P4
VPN 1
CE-D
CE-B
Table 4-2 Instances for service packet forwarding of the BGP/MPLS L3VPN
NE Action Description Label Stack
5 Key Features
such as the TDM, ATM and Ethernet services. The emulated VPN protocol is used to connect
the traditional network and packet switching network. In this way, networks are extended and
resources can be shared.
5.8 IP Tunnel and GRE Tunnel
The OptiX PTN 3900 can use the IP tunnel or GRE tunnel to carry the ATM PWE3 service,
CES PWE3 service and ETH PWE3 service. In this way, ATM emulation services and ETH
emulation services can be transparently transmitted in an IP network.
5.9 QoS
The equipment supports DiffServ based on the standard, including flow classification, flow
policing, traffic shaping, congestion management and queue scheduling.
5.10 IGMP Snooping
The Internet group management protocol (IGMP) Snooping function is used to realize multicast
distribution.
5.11 MSTP/RSTP/STP
The multiple spanning tree protocol (MSTP) is compatible with the spanning tree protocol (STP)
and rapid spanning tree protocol (RSTP). In addition, the MSTP rectifies the defects of the STP
and RSTP. The MSTP supports fast reconfiguration and provides multiple paths for forwarding
data. During the data forwarding process, the VLAN data is of load balance. The MSTP complies
with IEEE 802.1s.
5.12 ACL
To filter data packets, the access control list (ACL) can be used to stipulate a series rules in order.
The equipment classifies the received data packets according to the ACL rules and then forwards
or discards these packets.
5.13 BFD
The OptiX PTN 3900 supports the bidirectional forwarding detection (BFD) function. The Hello
mechanism is used to detect states of Ethernet links.
5.14 Synchronous Ethernet Clock
The OptiX PTN 3900 realizes the synchronous Ethernet clock on the Physical layer.
5.15 IEEE 1588 V2 Clock
The OptiX PTN 3900 supports the function of adopting the IEEE 1588 V2 protocol to realize
clock synchronization and time synchronization.
5.1 MPLS
The OptiX PTN 3900 uses the multiprotocol label switching (MPLS) technology to transport
multiple types of services. This section describes the basic concepts related to the MPLS and
application of the MPLS supported by the OptiX PTN 3900.
Label
A label is a short identifier of fixed length and is locally valid (only valid in the MPLS domain).
The label is used to identify the FEC that one packet belongs to. On certain conditions, for
example, when load sharing is required, several labels may correspond to one FEC, but one label
just indicates one FEC.
The packet headers carry labels and the labels do not contain any topology information. Labels
are locally valid. A label has four bytes, which are encapsulated in the way illustrated in Figure
5-1.
l Label: 20 bits. The label section indicates the label value and is used as the forwarding
pointer.
l Exp: 3 bits. The Exp section is reserved for test and currently used for CoS.
l S: 1 bit. The S section is an identifier at the bottom of a stack. The MPLS supports the
layered labels, or multiple labels. If S is 1, it indicates that the label is at the bottom.
l TTL: 8 bits. The TTL section has the same indication as the time to live (TTL) of IP packets.
As a connection identifier, the label is similar to the VPI/VCI for ATM. The labels are
encapsulated between the link layer and the network layer in a Ethernet frame. Figure 5-2 shows
the encapsulation location of labels.
Ethernet/SONET/SDH packet
LDP
The LDP is the control protocol for the MPLS. Similar to the signaling protocol of the traditional
network, the LDP is responsible for creation and maintenance of LSP and PW, FEC
classification, and label distribution.
l Some protocols are exclusively stipulated for label distribution, such as LDP and constraint-
routing label distribution protocol (CR-LDP). The OptiX PTN 3900 uses the LDP to create
and maintain PWs.
l Some exiting protocols can be extended to support the label distribution, such as border
gateway protocol (BGP) and resource reservation protocol (RSVP). The OptiX PTN
LSP
In an MPLS network, the path involved in an FEC is called an LSP.
The LSP is a unidirectional path from the ingress to egress. Each node on an LSP is a label
switched router (LSR). According to the data transport direction, adjacent LSRs are upstream
LSR and downstream LSR.
The LSPs are classified into static LSPs and dynamic LSPs. The static LSPs are manually
configured by the administrator. The dynamic LSPs are created dynamically by the RSVP-TE
protocol.
The control plane of the MPLS system is connectionless. The control plane of the MPLS system
uses the powerful and flexible routing function of a Layer 3 network, which meets the network
requirements of new application.
The forwarding plane is also called a data plane, which is connection-oriented and can use Layer
2 networks such as Ethernet. The MPLS uses short labels of fixed length to encapsulate packets.
The forwarding plane then quickly forwards the encapsulated packets.
To ensure the service quality required in a transport network, the OptiX PTN 3900 simplifies
the non-connection-oriented feature of the MPLS.
l The OptiX PTN 3900 does not use the penultimate hop popping (PHP).
l The OptiX PTN 3900 does not support LSP Merge, for the LSP Merge makes the source
of a data flow unknown. If the source is unknown, the OAM and performance monitoring
become difficult or unusable.
l The OptiX PTN 3900 does not support the equal cost multiple path (ECMP), for the ECMP
makes the CC of the OAM and performance monitoring complex.
In addition, the OptiX PTN 3900 provides complete OAM support and powerful protection
capabilities.
l The OptiX PTN 3900 uses the MPLS OAM mechanism compliant with ITU-T Y.1711 to
fast check the LSP.
l The OptiX PTN 3900 uses the protection switching mechanism that complies with ITU-T
Y.1720 and ITU-T G.8131. The OptiX PTN 3900 not only provides FRR protection for
LSPs, but also provides end-to-end transport protection for LSPs.
The OptiX PTN 3900 supports the MPLS technology and has the following MPLS features.
MPLS basic The equipment supports basic MPLS functions and service forwarding.
function The equipment uses the RSVP-TE protocol to create and maintain the
MPLS Tunnels, and uses the LDP to create and maintain the PWs.
The equipment uses the MPLS tunnel technology and the pseudo wire
emulation edge-to-edge (PWE3) technology to form an MPLS network,
where multiple services can be accessed.
The equipment supports the static MPLS Tunnel and dynamic MPLS
Tunnel.
MPLS OAM The equipment supports the MPLS OAM in compliance with ITU-T Y.
1711.
The equipment supports Ping and TraceRoute commands for the MPLS
Tunnel.
MPLS protection The equipment supports the MPLS Tunnel re-route (RR).
The equipment supports the 1+1 protection and 1:1 protection for the
MPLS Tunnel.
Maximum 8k
number of MPLS
tunnel
Maximum 16k
number of PWs
and path cost, the OptiX PTN 3900 uses the optimized shortest path first (SPF) algorithm to
generate the routing table, and uses the IS-IS TE of the IS-IS routing protocol to generate the
traffic engineering database (TEDB). The TEDB and routing table are the bases of creating the
MPLS LSP. The TEDB computes the route that the MPLS LSP travels through. The routing
table forwards the RSVP-TE and LDP protocol packets to realize label distribution. In this way,
the MPLS LSP is dynamically created.
Three features of the IS-IS routing protocol are supported by the OptiX PTN 3900, that is, three
types of IS-IS routing protocol packets, optimized SPF algorithm, path cost, and IS-IS traffic
engineering (IS-IS TE).
path cost
The OptiX PTN 3900 supports the manual setting of path cost, and controls the route that the
MPLS LSP travels through when it is dynamically created.
IS-IS TE
When the MPLS constructs the LSP, the traffic engineering information of all the links in the
local domain should be known. The IS-IS TE realized by the OptiX PTN 3900 supports the
construction of the MPLS LSP. The OptiX PTN 3900 obtains the traffic engineering information
(link utilization and path cost) of all the links in the network through the IS-IS routing protocol.
It constructs and synchronizes the TEDB, and uses the constrained shortest path first (CSPF)
algorithm used by the TEDB to compute the route that the MPLS LSP travels through.
5.3 BGP
In the case of the L3VPN service application, the OptiX PTN 3900 uses the BGP to control route
advertisement and selection of the best route. On the client side, the OptiX PTN 3900 discovers
routes by running the external BGP (E-BGP). On the network side, the OptiX PTN 3900
discovers routes by running the multiprotocol extensions for BGP-4 (MP-BGP).
As an exterior gateway protocol (EGP), the border gateway protocol (BGP) runs between
autonomous systems (ASs) to control route advertisement and selection of the best route.
NOTE
An AS is a collection of routers that are under the control of one entity and have the same internal routing
policy.
The BGP supported by the OptiX PTN 3900 complies with RFC 3107 (Carrying Label
Information in BGP-4), RFC 1997 (BGP Communities Attribute), RFC 4271 (A Border Gateway
Protocol 4) and RFC 4760 (Multiprotocol Extensions for BGP-4).
Basic Concepts
The basic concepts with regard to the BGP are as follows:
l Speaker: The OptiX PTN equipment that transmits the BGP messages is referred to as a
speaker, which receives or generates new routing information and advertises the routing
information to its peers. When a BGP speaker receives routing information from another
AS, the BGP speaker advertises the routes to its peers in the AS, if the route is better than
the known routes or the BGP speaker does not contain the routes.
l Peer: The BGP speakers that exchange the routing information are peers to each other.
l Internal BGP (I-BGP): When the BGP runs in the same AS, the BGP is referred to as I-
BGP.
l External BGP (E-BGP): When the BGP runs in different ASs, the BGP is referred to as E-
BGP.
l MP-BGP: MP-BGP is the multiprotocol extensions for the BGP-4. The MP-BGP supports
multiple network protocols. MP-BGP runs in the same AS.
BGP Messages
In the PSN, the BGP notifies the routing information, maintains and interrupts connections by
transporting the BGP messages. The OptiX PTN 3900 supports the following messages:
l Open messages: When a TCP connection is established, the Open messages are sent to
establish connections between BGP peers.
l Update messages: The Update messages are transported for peers to exchange the routing
information. The Update messages can advertise the information about multiple reachable
routes with the same attributes and delete the information about multiple unreachable
routes.
l Keepalive messages: The Keepalive messages are sent periodically to the peers to maintain
the validity of connections. When receiving the Open messages, the peers send the
Keepalive messages to maintain the validity of connections. After the acknowledgment,
the peers can exchange the Update, Notification, and Keepalive messages.
l Notification messages: When detecting a status error, the Notification messages are sent
to peers. Then, the BGP connection is interrupted immediately.
NOTE
The routing information is transported according to the incremental updates. That is, only route changes
are notified.
BGP Attributes
BGP routing attributes are a series of parameters that further define certain routes and thus help
the BGP to filter and select routes.
The OptiX PTN 3900 supports the following BGP attributes:
l Origin: The Origin attribute defines the origin of the path information.
l AS_Path: The AS_Path attribute records the numbers of the ASs that one route traverses
from the local to the destination, in a vector sequence. The AS_Path attribute avoids route
loops. Generally, the BGP does not receive the information about the route whose AS_Path
attribute contains the local AS number. In this manner, the route loop is avoided.
l Next_Hop: The Next_Hop attribute indicates the address of the next hop along the message
transmission path to the destination.
l Multi-exit-descriminator (MED): The MED attribute is transmitted only between two
adjacent ASs to determine the best route along which the traffic enters the AS. The route
whose MED value is the smallest is selected as the best route with priority.
l Community: The Community attribute simplifies the routing policy and facilitates the
maintenance and management of routes.
l The BGP speaker advertises only the routing information that it uses to its peers.
l The BGP speaker advertises all the routes that it learns from the E-BGP to its peers
(including E-BGP peers and I-BGP peers).
l The BGP speaker does not advertises the routes that it learns from the I-BGP to its I-BGP
peers.
l The BGP speaker advertises the routes that it learns from the I-BGP to its E-BGP peers,
when the synchronization of the BPG and IGP is not enabled.
l The BGP speaker advertises all the BGP routes to the new peers once the connections are
established.
NOTE
The synchronization between the BGP and IGP refers to the process where the BGP adds a new route to
the routing table only after the IGP adds the new route to the routing table. If the BGP is not synchronous
with the IGP, the BGP straightly adds new routes to the routing table.
Basic Concepts
The basic concepts with regard to the OSPF protocol include the OSPF protocol packet, link
state advertisement (LSA), neighbor, adjacency, router ID, and OSPF TE.
l There are the following categories of OSPF protocol packets:
– Hello packets: The Hello packets are used to discover and maintain the OSPF
neighborhood and are sent periodically.
– Database description (DD) packets: Exchanging the DD packets are used to maintain
synchronization of the databases. The DD packets describe the summary of the local
link state database (LSDB).
– Link state request (LSR) packet: The LSR packets are used to request for the required
LSA from each other. The LSR packets are sent to each other only after they successfully
start to exchange the DD packets.
– Link state update (LSU) packet: The LSU packets are used to send the required LSA to
each other.
– Link state acknowledgment (LSAck) packet: The LSAck packets are used to
acknowledge the received LSA.
l The OSPF advertises the routing information by encapsulating the route description into
LSAs. The common LSA categories are as follows:
– Router LSA (type 1): The router LSA describes the link status and cost of the OptiX
PTN equipment and is flooded only in the OSPF area.
– Network LSA (type 2): The network LSA describes the status of the links in the local
network segment and is flooded in the OSPF area.
– Network summary LSA (type 3): The network summary LSA describes the routes in a
certain network segment in the OSPF area and advertises the routing information to
other related OSPF areas.
– AS boundary router (ASBR) summary LSA (Type 4): The ASBR summary LSA
describes the routes to the ASBRs and advertises the routing information to all other
related OSPF areas except the areas where the ASBRs are located.
– AS external LSA (type 5): The AS external LSA describes the routers to the outside of
the AS and advertises the routing information to all the OSPF areas (Stub area and NSSA
excluded).
– Not so totally stub area (NSSA) LSA (type 7): The NSSA LSA describes the routers to
the outside of the AS and is flooded only in the NSSA.
– Opaque LSA (type 10): The opaque LSA carries the TE information.
l Neighbor: When running the OSPF protocol, the OptiX PTN equipment sends the Hello
packets through the OSPF interface. When receiving the Hello packets, the OptiX PTN
equipment checks the related parameters defined in the packets for consistency. If the
related parameters are consistent, the neighborhood is established.
l Adjacency: The neighborhood does not necessarily ensure the adjacency. The network type
determines when the adjacency can be established. Two OptiX PTN systems can establish
the adjacency only after they successfully exchange the DD packets and LSA.
l Router ID: A router ID is a 32-bit value that uniquely identifies an OptiX PTN equipment
in an AS. A router ID is important for the OptiX PTN equipment to run the OSPF protocol.
l OSPF TE: The OSPF TE supports the creation of the label switching paths (LSPs) for TE.
Before building LSPs, the MPLS protocol has to know the traffic information of all links
in the area. The MPLS protocol obtains the TE information of the links through the OSPF
protocol.
1. Each OptiX PTN equipment generates the LSA based on the surrounding network topology
and sends the LSA to other systems on the network through the DD packets, LSR packets,
or LSU packets.
2. Each OptiX PTN equipment collects the LSAs sent by the adjacent systems. The collection
of LSAs is referred to an LSDB. The OptiX PTN equipment can obtain the topology of the
entire network from the LSDB. The LSDB is the same for the OptiX PTN equipment of
the PTN network.
NOTE
The LSA describes the surrounding topology of the OptiX PTN equipment and the LSDB describes
the network topology of the entire AS.
3. According to the LSDB, each OptiX PTN equipment computes a shortest path tree that is
rooted at itself by using the shortest path first (SPF) algorithm. The tree defines the routes
to each node in the AS.
OSPF Area
The OSPF protocol logically divides the OptiX PTN systems into areas, which are identified by
area IDs. Each interface where the OSPF protocol runs must belong to an area.
The OptiX PTN equipment supports the OSPF backbone area, which is responsible for inter-
area routing information. Backbone areas should be interconnected.
5.5 RIP
The OptiX PTN 3900 supports the routing information protocol (RIP). On the client side, the
OptiX PTN 3900 obtains the routing information and discovers routes by running the RIP.
The RIP is an internal gateway protocol (IGP). Based on the distance-vector algorithm, the RIP
uses the hop count to indicate the distance to the destination. The RIP is applicable to small-
scale networks.
The RIP supported by the OptiX PTN 3900 complies with the RFC 2453 (RIP Version 2).
Basic Concepts
The basic concepts related to the RIP supported by the OptiX PTN 3900 include the hop count,
RIP message, RIP routing database, and RIP timer.
l Hop count: The RIP uses the hop count to measure the distance to the destination. The hop
count is also referred to as metric. As defined in the RIP, if the OptiX PTN equipment is
directly connected to a network, the hop count is 0; if the OptiX PTN equipment is
connected to a network through one set of equipment, the hop count is 1. The hop count
can be determined by analog. To limit the convergence time, the RIP defines that the metric
should be an integer in the range of 0 to 15. If the hop count is 16 or more, the RIP defines
the metric as infinite. That is, the RIP considers the destination as unreachable.
l RIP messages: The RIP switches the routing information on the basis of user datagram
protocol (UDP) messages by using the RIP packets. The RIP protocol defines two types of
messages, that is, request messages and response messages. The request messages are sent
to request the neighbors to send all or part of the routing information and the response
messages send all or part of the local routing information.
l RIP routing database: One set of the OptiX PTN equipment that runs the RIP manages one
RIP routing database, which contains the route entries to all the reachable destinations on
the network. The key route entries are as follows:
– Destination address, which is the IP address of the host or network.
– Next-hop address, which is the IP address of the interface on the adjacent equipment
that the RIP packets have to traverse to reach the destination.
– Interface, which forwards packets.
– Metric, which indicates the distance from the OptiX PTN equipment to the destination
and is an integer in the range of 0 to 15.
– Routing time, which indicates the period from the last time when the route entries are
modified to the present time. When the route entries are modified, the routing time is
reset to 0.
– Route flag, which distinguishes the routes of the internal routing protocol from the routes
of the external routing protocol.
l RIP timer, which controls the RIP. There are three types of RIP timers, that is, Update,
Age, and Garbage-Collect.
– Update time: During the update time, the OptiX PTN equipment periodically transmits
the update packets.
– Age time: If the OptiX PTN equipment fails to receive the update packets from one of
its neighbors when the age time expires, the OptiX PTN equipment considers the route
to the neighbor as unreachable.
– Garbage-Collect time: If the OptiX PTN equipment fails to receive the update packets
from one of its neighbors during the garbage-collect time, the OptiX PTN equipment
deletes the route to the neighbor from the route table.
When processing the RIP, the OptiX PTN equipment mainly processes the RIP packets and RIP
routes.
LSP Signaling
The OptiX PTN 3900 uses the RSVP-TE protocol as the LSP signaling.
At first, the RSVP protocol is used to reserve resources for certain services. In this way, the QoS
can be guaranteed. As TE comes up lately, the RSVP protocol is extended to create LSP. In this
way, TE is more easily realized.
The RSVP-TE protocol used by the OptiX PTN 3900 has the following functions.
l Supports various messages and objects of standard RSVP-TE protocol.
l Supports shared-explicit (SE) style to reserve resources. For the SE style, resources are
reserved for a group of transmitters, which share the reserved resources.
l Supports refreshing, fast re-transmission and confirmation of the software status.
PW Signaling
The OptiX PTN 3900 uses the label distribution protocol (LDP) as the PW signaling.
The LDP is a control and signaling protocol for the MPLS.
The LDP protocol used by the OptiX PTN 3900 has the following functions.
l Supports extension of the LDP protocol by the PWE3.
l Supports the extended neighbor discovery mechanism.
l Supports the label distributing scheme of the downstream on demand.
l Supports the ordered label control scheme.
l Supports the liberal retention mode.
5.7 PWE3
The pseudo wire emulation edge-to-edge (PWE3) technology is used to provide tunnels on the
packet switching network (IP/MPLS) to emulate the Layer 2 VPN protocol for some services,
such as the TDM, ATM and Ethernet services. The emulated VPN protocol is used to connect
the traditional network and packet switching network. In this way, networks are extended and
resources can be shared.
Basic Concept
The PWE3 is an end-to-end Layer 2 service carrying technology, and belongs to point-to-point
L2VPN. In the two provider edges (PEs) of a network, the LDP is used as the signaling and
tunnels are used to emulate various Layer 2 services at the customer edge (CE), such as the Layer
2 data packets and bit flow. In this way, the Layer 2 data at the CE end are transparently
transmitted in the network.
The PWE3 is used to create point-to-point channels, which are isolated from each other. The
Layer 2 packets from users are transparently transmitted among PWs. For PE equipment, the
mapping relation between user access interfaces and PWs is determined after the PW connection
is set up. For P equipment, MPLS packets are forwarded according to the MPLS labels. The
Layer 2 user packets encapsulated in the MPLS packets are not processed.
Typical Application
The PWE3 is used to integrate the original access schemes with the existing IP backbone
networks. In this way, repeated network construction is reduced and the OpEx is saved.
BSC
E1 interface
BTS
NodeB
In an MPLS network that consists of the PTN equipment, the PWE3 technology is used to provide
the ATM emulation services. Figure 5-4 shows how the ATM emulation services are
encapsulated.
ATM ATM
PTN PTN
switch switch
MPLS
network
If an ATM emulation service that travels through an IP network is required, the OptiX PTN
3900 can use the IP tunnel or GRE tunnel to carry the ATM PWE3. This complies with RFC
4023. As shown in Figure 5-5 and Figure 5-6, an ATM emulation service can be provided
between NE A and NE B, even though the IP network between NE A and NE B does not support
the MPLS.
ATM ATM
PTN Router Router PTN
switch switch
IP
ne two rk
ATM ATM
PTN Router Router PTN
switch switch
IP
ne two rk
NOTE
DCN packets can be transparently transported over the IP tunnel or GRE tunnel. When the DCN packets
pass through a third-party network, the DCN packets are transported in an end-to-end manner.
5.9 QoS
The equipment supports DiffServ based on the standard, including flow classification, flow
policing, traffic shaping, congestion management and queue scheduling.
The equipment realizes the eight groups of pre-hop behavior (PHB) stipulated in the standard.
The eight PHB groups are BE, AF1, AF2, AF3, AF4, EF, CS6 and CS7. With the equipment,
the vendors can provide services of different quality classes for users. In this way, an integrated
network emerges to carry data, voice and video services at the same time.
Flow Classification
The flow classification indicates that data packets are classified into several priorities or service
classes. For example, if the first six bits of the DSCP type of service (ToS) field are used for the
flow classification, the flow can be classified into a maximum of 64 classes. After the flow is
classified, other QoS features then can be used for different classes. In this way, the class-based
congestion management and traffic shaping are realized.
The equipment supports the simple flow classification and the complex flow classification.
In the simple flow classification, the priorities of external packets and the priorities of internal
packets are mapped to each other, according to the DSCP values of IP packets, the EXP values
of MPLS packets, and the Pri values of VLAN packets.
The equipment supports the simple flow classification for S-VLAN packets, C-VLAN packets,
IP packets, and MPLS packets. The simple flow classification is performed at an Ethernet port
or at a POS port.
The simple flow classification is effective for an internal node in a DS region. In a DS region,
the simple flow classification rules are the same for all nodes. The simple flow classification
maps the original priorities of packets in the network to the internal priorities of the equipment,
so that the packets can be transmitted inside the equipment according to the preset priorities.
Compared with the complex flow classification, the simple flow classification features a simplex
classification form and easy configuration. In this case, the QoS configuration for each node in
a DS region is simplified.
In the complex flow classification, packets are classified according to relatively complex rules.
The processing actions include the ACL, the CAR, and the setting of CoS.
The equipment supports the complex flow classification for S-VLAN packets, C-VLAN packets,
and IP packets. The complex flow classification is performed at an Ethernet port.
In the complex flow classification, packets are classified according to complex rules. Further
processing, including the ACL, the CAR, and the setting of grooming class, is also conducted
for the flow bandwidth and for the flow forwarding. The complex flow classification features
flexible and diversified classification forms. In this case, the user can classify accessed services
based on the QoS in a more specific manner.
CAR
The committed access rate (CAR) is a method used to limit the rate of accessed packets according
to the four preset parameters of the token bucket. The purpose of CAR is to mark accessed
packets with colors (or label the packets), and to limit the rate of accessed packets.
There are two color marking modes: color-blind and color-aware. In both modes, the current
rate of packets is compared with the committed information rate (CIR) and peak information
rate (PIR) of the token bucket. The packets that exceed the PIR are marked in red. The packets
that exceed the CIR but are within the PIR are marked in yellow. The packets that are within the
CIR are marked in green. The difference is that, in the color-aware mode, if the packets
themselves have a color, their own color is compared with the color that should be marked and
then the deeper color is used.
Traffic rate limiting determines whether to discard some colored packets, and thus limits the
access rate of the traffic.
The default rule is that the red packets are discarded and the yellow and green packets are allowed
to pass. The actions can also be manually set for the three-color packets.
NOTE
The token bucket is a technology used to realize the CAR functions. In IETF Recommendations, the single
rate three color marker (srTCM) or two rate three color marker (trTCM) algorithm is used to assess packets.
According to the assessment result, the packets are marked with colors and labeled with different discarding
priorities. The PTN equipment adopts the trTCM algorithm.
Queue Scheduling
Packets are sent to queues of different grooming priorities by using different flow classification
methods. After the flow classification, the equipment adopts a PQ + WFQ + SPL (that is, priority
queuing + weighted fair queuing + Strict Priority-low) method to groom the queues. The PQ
method is adopted to groom the CS7, CS6, and EF packets. The WFQ method is adopted to
groom the AF packets. The lowest priority is adopted to groom the BE packets.
Congestion Management
In the case of a congestion, the equipment discards packets by using the tail-drop method and
the weighted random early detect (WRED) method. The network congestion can be alleviated
by using these discarding methods.
In the tail-drop method, a buffer queue is used to buffer the packets, and the packet discarding
priorities are not distinguished during the buffering. When the buffer queue is full, packets that
come thereafter are discarded.
In the WRED method, the discarding priorities (that is, colors) of packets can be detected.
According to the discarding priorities, the upper threshold, lower threshold, and probability are
set for the purposes of packet discarding. In this case, different discarding characteristics are
provided.
Traffic Shaping
The purpose of traffic shaping is to limit the traffic burst of outgoing packets of a network, and
thus to transmit the packets out at a relatively even rate. In this way, congestion is prevented on
the downstream equipment, and fewer packets are discarded. The equipment adopts the generic
traffic shaping (GTS) algorithm.
HQoS
The hierarchical QoS (HQoS) is a QoS technology that can both control the service traffic and
groom services according to their priorities. With the complete traffic statistics functions
provided by the HQoS, the network administrator can supervise the bandwidth occupied by each
type of service, and reasonably allocate the bandwidth for services by analyzing the traffic.
The traditional QoS grooms traffic on a port basis, but cannot groom traffic on a multiple-user
and multiple-service basis. The HQoS, however, provides the multilevel grooming mode. In this
mode, the HQoS provides differentiated QoSs for multiple services of multiple users.
Compared with the traditional QoS, the HQoS has the following advantages:
l The multilevel grooming mechanism provides rich service capabilities.
l Parameters such as the maximum queue length and the WRED can be configured for a flow
queue.
l The CIR and PIR can be configured for each user.
The HQoS can be reflected as the hierarchical service grooming. Based on the HQoS, a network
carrier can provide further classified service guarantees.
The HQoS function is implemented on the equipment at the network edge. The purpose of such
an implementation is to maintain a simple core network. In this case, not every piece of
equipment in the network is required to conduct the complex QoS processing. At the network
edge, the HQoS is implemented as seven levels of grooming: V-UNI+CoS, V-UNI, V-UNI
group, PW+CoS, PW, Tunnel, and port+CoS. Table 5-3 lists the action points of the HQoS.
Table 5-3 HQoS action points at the access side and the network side of the equipment
Action In the Ingress Direction In the Egress Direction
Point
The OptiX PTN 3900 supports the following L2 IGMP Snooping functions.
l The L2 IGMP Snooping function complies with RFC4541. The L2 IGMP Snooping can
analyze and process the IGMPv1 and IGMPv2 protocol packets. When the IGMP Snooping
protocol is enabled and IGMPv3 protocol packets are received, the equipment forwards the
packets to all other ports in the VLAN of the packets, except the port receiving the packets.
l The L2 IGMP Snooping only applies to the E-LAN service rather than other types of
services.
l The equipment supports the setting of the aging time of the router port.
l The equipment supports the setting of maximum non-response times.
l The equipment supports the setting of the allowed multicast groups for use and the
maximum number of their members.
l The equipment supports addition of static router ports and member ports.
l The equipment supports the setting of the quick deletion function on the member port.
NOTE
For the static member, the quick deletion function cannot be set.
5.11 MSTP/RSTP/STP
The multiple spanning tree protocol (MSTP) is compatible with the spanning tree protocol (STP)
and rapid spanning tree protocol (RSTP). In addition, the MSTP rectifies the defects of the STP
and RSTP. The MSTP supports fast reconfiguration and provides multiple paths for forwarding
data. During the data forwarding process, the VLAN data is of load balance. The MSTP complies
with IEEE 802.1s.
The MSTP divides a switching network into several domains. In each domain, several spanning
trees are formed and are independent from each other. Each spanning tree is called a multiple
spanning tree instance (MSTI) and each domain is called a multiple spanning tree (MST) domain.
The MSTP sets the VLAN mapping table, which specifies the mapping relation between VLAN
and MSTI, to connect the VLAN and MSTI.
Table 5-4 lists the comparison among the MSTP, STP and RSTP.
STP A spanning tree not of a loop is l The MSTP and RSTP are
formed to prevent multicast storm and compatible, and they can recognize
provide redundant backup. protocol packets of each other.
l The STP does not recognize the
RSTP l A spanning tree not of a loop is
MSTP packets. To be compatible
formed to prevent multicast storm
with the STP, the MSTP sets two
and provide redundant backup.
working modes, which are STP-
l Fast reconfiguration. compatible mode and MSTP mode.
In the STP-compatible mode, each
port of the equipment transmits
STP packets. In the MSTP mode,
each port of the equipment
transmits MSTP packets and has
the MST functions.
The OptiX PTN 3900 supports the following key MSTP specifications.
l MSTP topology aggregation time: In the case of a link failure, the aggregation time is less
than 1s if the conditions are present for P/A mechanism and is equal to 2 x (Forward Delay
Time) if the conditions do not exist for P/A mechanism.
l Each MST domain supports a maximum of 16 MSTIs.
l Each port group supports a maximum of 16 Ethernet ports.
l On the equipment that supports the MSTP, load balance is realized by setting the path cost
and port priority for different VLANs.
– Ports in different spanning tree instances have different path cost. Proper path cost
makes the traffic of different VLANs forwarded along different physical links. In this
way, load balance is realized.
– In different spanning tree instances, one ports is of different priorities. In this way, one
port plays different roles in different MSTIs. As a result, the traffic of different VLANs
are transmitted along different physical links. Hence, load balance is realized.
5.12 ACL
To filter data packets, the access control list (ACL) can be used to stipulate a series rules in order.
The equipment classifies the received data packets according to the ACL rules and then forwards
or discards these packets.
The ACL is just a group of rules and cannot filter data packets. Instead, the ACL marks a class
of data packets. How to process these packets, however, depends on the specific functions that
introduce the ACL. For the OptiX PTN 3900, the ACL should be used with the flow classification
function to filter data packets. Figure 5-7 shows the details. The flow classification should be
created before the creation of ACL. The equipment supports self-defined ACL. The maximum
number of ACLs supported by the OptiX PTN 3900 is 8k.
Network A
Flow ID=2
Disable
GE
Internet
GE
Enable
Flow ID=1
Network B
5.13 BFD
The OptiX PTN 3900 supports the bidirectional forwarding detection (BFD) function. The Hello
mechanism is used to detect states of Ethernet links.
The BFD is a simple Hello protocol, which is similar to the neighbor detection mechanism of
the routing protocol in many aspects. A pair of systems periodically transmit the detection
packets in the channels where inter-system talk is established. If a system does not receive any
detection packets in a certain time from the opposite end, it is determined that some part of the
bidirectional channel connected to adjacent nodes is faulty.
The OptiX PTN 3900 adopts the asynchronous mode to perform BFD detection for Ethernet
links. In the asynchronous mode, the equipment at both ends of a link periodically transmits the
BFD control packets to each other. If the equipment does not receive any BFD control packets
in a long time from the opposite end, it is determined that the Ethernet link is faulty.
l The devices such as the primary reference clock (PRC) transfer clock signals to the NE
through the external clock interface.
l NEs transfer the clock signals through the synchronous Ethernet among them.
l The clock processing module of each NE extracts the clock signals from the serial bit stream
on the Ethernet line and selects a clock source.
l The clock phase-locked loop traces one of the Ethernet line clocks and generates the system
clock.
l The system clock is used as the transmit clock on the physical layer of Ethernet to transport
data. In this way, the clock is transferred to the downstream.
NOTE
To achieve the synchronous Ethernet clock, each NE that the synchronization information traverses should
support the synchronous Ethernet technology.
Typical Networking
The OptiX PTN equipment constitutes a synchronous Ethernet, supports the synchronous
Ethernet interfaces and realizes synchronization on the physical layer of Ethernet. Figure 5-8
shows the typical networking for synchronous Ethernet.
RNC
BTS
BSC
FE
OptiX PTN 1900
In a synchronous Ethernet, the clock information from devices such as PRC is distributed to the
OptiX PTN equipment that is connected to the base transceiver station (BTS) or WCDMA base
station (NodeB). Then, the OptiX PTN equipment extracts and transfers the clock signals to the
BTS or NodeB, base station controller (BSC), and radio network controller (RNC) through
synchronous Ethernet interfaces. In this way, the synchronous Ethernet clock is realized.
To achieve IEEE 1588 V2 clock synchronization, all NEs on the clock link should support the IEEE 1588
V2 protocol.
In the application of networking, the IEEE 1588 V2 clock can achieve the 1 microsecond precision.
BMC Algorithm
The best master clock (BMC) algorithm compares data describing two clocks to determine which
data describes the better clock, and selects the better clock as the clock source. The BMC
algorithm includes the following algorithms:
l Data set comparison algorithm: The NE determines which of the clocks is better, and selects
the better clock as the clock source. If an NE receives two or more channels of clock signals
from the same grandmaster clock (GMC), the NE selects one channel of the clock signals
that traverses the least number of nodes as the clock source.
l State decision algorithm: The state decision algorithm determines the next state of the port
based on the results of the data set comparison algorithm.
Clock Architecture
Figure 5-9 shows the architecture of the IEEE 1588 V2 clock.
OC1
GMC
TC1
1
BC1 BC1
2 3 1 2 3
TC2+OC2 TC3
The OptiX PTN 3900 supports four models for the IEEE 1588 V2 clock architecture.
l Ordinary clock (OC): A clock that has a single IEEE 1588 V2 port and the clock needs to
be recovered. It may serve as a source of time, i.e. be a master clock, or may synchronize
to another clock, i.e. be a slave clock.
l Boundary clock (BC): A clock that has multiple IEEE 1588 V2 ports and the clock needs
to be recovered. It may serve as the source of time, i.e. be a master clock, and may
synchronize to another clock, i.e. be a slave clock.
l Transparent clock (TC): A device that measures the time taken for a PTP event message
to transit the device and provides this information to clocks receiving this PTP event
message. That is, the clock device functions as an intermediate clock device to transparently
transmit the clock and process the delay, but does not recover the clock.
– End-to-end TC: A transparent clock that supports the use of the end-to-end delay
measurement mechanism between slave clocks and the master clock.
– Peer-to-peer TC: A transparent clock that supports the use of the peer-to-peer delay
measurement mechanism.
l TC+OC: A clock device corrects and transparently transmits the time stamps for the IEEE
1588 V2 packets, and realizes clock synchronization.
NOTE
l The end-to-end TC and peer-to-peer TC adopt different mechanisms to realize delay transmission, and
do not interwork on the same communication path. That is, the adjacent TC devices on the same time
path can adopt either the end-to-end TC or peer-to-peer TC, but they cannot adopt both at the same
time.
l Time Stamp (TS) is used to convey time information.
l PTP event messages are timed messages in that an accurate TS is generated both at transmission and
receipt.
Typical Networking
By using the IEEE 1588 V2 protocol, the OptiX PTN equipment can transfer the precise time
information to achieve clock synchronization and time synchronization for equipment in the
network. This meets the requirement of the telecommunications network for precise time. Figure
5-10 shows the typical networking for IEEE 1588 V2 clock synchronization.
BC RNC
BC/TC/TC+OC
NE1
BC/TC/TC+OC
BC/TC/TC+OC
BC/TC/TC+OC
BC/TC/TC+OC/OC
NodeB
FE
Clock signals
In Figure 5-10, the PRC transfers clock signals to NE1 and RNC, which selects the PRC as the
GMC according to the BMC algorithm. In this case, the PRC is of the OC model and only works
as the clock source. NE1 is of the BC model, in the case of the connected PRC, NE1 is the clock
sink, in the case of the other connected OptiX PTN equipment, NE1 is a clock source. NE1
transmits IEEE 1588 V2 packets to the other OptiX PTN equipment, which transfers the packets
downstream. In this case, the other OptiX PTN equipment works in the BC, TC, TC+OC or OC
mode.
If only one clock source is available for the network, the OptiX PTN equipment can work in
BC, TC, or TC+OC mode to realize the following functions:
l In the BC mode, the OptiX PTN equipment selects the time source, recovers the system
time of the local NE, and adopts the system time as the new time source to transmit the
time information downstream. When the intermediate NEs require time synchronization,
this mode is applicable.
l In the TC mode, the OptiX PTN equipment updates and transparently transmits the time
stamps of the IEEE 1588 V2 packets, and transfers the time information downstream. When
the intermediate NEs do not require clock or time synchronization, this mode is applicable.
l In the TC+OC mode, the OptiX PTN equipment realizes the following functions:
– Updates and transparently transmits the time stamps of the IEEE 1588 V2 packets, and
transfers the time information downstream.
– Synchronizes the clock (not the time) for the local NE.
When the intermediate NEs require clock synchronization, this mode is applicable.
l In the OC mode, the OptiX PTN equipment selects the time source and recovers the system
time of the local NE. In addition, the OptiX PTN equipment adopts the system time as the
new time source, and transmits the time information downstream through the external time
interface. When the intermediate NEs are connected to the NodeB, this mode is applicable.
If multiple clock domains are in the network, the OptiX PTN equipment can work in the TC or
TC+OC mode.
l In the case of different GMCs, the IEEE 1588 V2 packets must be transferred through
different ports.
NOTE
The BC mode is not applicable to this case, because the NE in the BC mode synchronizes itself with one
channel of clock signals, which is selected as a clock source from the clock signals and is transferred
downstream. One of the clock sources is transferred downstream and the other clock signals are terminated.
NodeB receives time information from the external time interface of the OptiX PTN equipment,
and synchronizes the time with RNC.
6 Protection
The OptiX PTN 3900 provides equipment level protection and network level protection.
Table 6-2 lists the mapping relations between working and protection slots in TPS protection.
Table 6-2 Mapping relations between working and protection slots in TPS protection
Working Slot Protection Slot Interface Board Slot
Switching time In the case of TPS switching, the restoration time for the E1
physical link is less than 50 ms.
Table 6-5 1+1 protection parameters of the cross-connect and timing board
Parameter Description
Inverse multiplexing for ATM (IMA) demultiplexes a concentrated flow of ATM cells into
multiple lower-rate links, and at the remote end multiplexes these lower-rate links to recover as
the same sequence as the original concentrated flow of ATM cells. In this way, multiple lower-
rate links are flexibly and conveniently multiplexed.
Working path
Subnetwork
Processing board Processing board
The MPLS 1+1 protection adopts the dual fed and selective receiving mechanism for services.
When the working path is faulty, the receive end selects the service from the protection path. In
this way, the service switching is realized.
l Detection method:
– Physical layer check: At the physical layer, the loss of signal is detected in
microseconds.
– Link layer check: The link layer check is performed through the MPLS OAM. If the
MPLS OAM check time is 3.3 ms, it ensures that the MPLS automatic switching time
is less than 50 ms.
l Switching process: The receive end selects the service channel according to the link status.
Figure 6-2 shows the MPLS 1:1 protection supported by the equipment.
Subnetwork
Protection path
Protocol path
In the MPLS 1:1 protection, the accessed service is transported in the working path. When the
working path is faulty, the service is switched to the protection path. The single fed and single
receiving mechanism is used for the service. The extended APS protocol information is
transported through the protection path. The equipment at the two ends exchanges the protocol
state information and the switching state information. According to the protocol state and
switching state, the equipment at the two ends performs the service switching.
l Detection method:
– Physical layer check: At the physical layer, the loss of signal is detected in
microseconds.
– Link layer check: The link layer check is performed through the MPLS OAM. If the
MPLS OAM check time is 3.3 ms, it ensures that the MPLS automatic switching time
is less than 50 ms.
l Switching process: After a negotiation using the extended APS protocol, the transmit end
switches the service to the protection path, and the receive end selects the service from the
protection path.
Protection Parameters
Table 6-6 lists the parameters of the MPLS 1+1 and 1:1 protection.
l Detour mode: Refers to one-to-one backup. In the detour mode, LSPs are protected
separately, that is, one protection LSP is specially created for each protected LSP. This
protection LSP is called a detour LSP.
l Bypass mode: Refers to facility backup. In the bypass mode, one protection LSP is used to
protect multiple LSPs. This protection LSP is called a bypass LSP.
l PLR: Refers to point of local repair. The PLR is the ingress node of a detour LSP or bypass
LSP. The PLR must be on the route of the working LSP, and cannot be the egress node of
the working LSP.
l MP: Refers to merge point. The MP is the egress node of a detour LSP or bypass LSP. The
MP must be on the working LSP, and cannot be the ingress node.
l Link protection: In link protection, a direct link connection exists between the PLR and the
MP, and the working LSP passes through this link. When this link fails, the services can
be switched to a detour LSP or bypass LSP.
l Node protection: In node protection, the PLR and the MP are connected through an
intermediate node, and the working tunnel passes through this node. When this node fails,
the services can be switched to a detour LSP or bypass LSP.
FRR protection complies with RFC 4090.
D E
B
A
MP
PLR
In Figure 6-3, the working tunnel is marked in blue, and the bypass tunnel is marked in red.
FRR protects the B-C link and node C, which are connected to the PLR. When link B-C or node
C fails, the data on the working tunnel is switched to the bypass tunnel. After the switching, the
original path information between the PLR and the MP is deleted.
For failed links, the equipment supports the following revertive modes:
l Revertive
l Non-revertive
The equipment supports the priority setting for the ports in an LAG.
Manual Aggregation
The manual bundling of ports does not require the link aggregation control protocol (LACP),
and does not require the exchange of protocol packets. In manual aggregation, the aggregation
of ports is manually specified by the administrator.
On the OptiX PTN 3900, multiple physical Ethernet ports can be bundled as one logical port.
With the port bundling technology, the transmission bandwidth between two equipment can be
increased without a hardware expansion, and the link reliability is also improved.
After the setting of an LAG, the equipment automatically enables the load sharing among the
physical ports that are bundled as a logical port. When one physical port fails, and if the load
sharing is enabled, the traffic on the faulty port is automatically shared by other physical ports.
When the faulty port recovers, the traffic is reallocated to ensure that the load is shared among
all ports.
After the setting of an LAG, if the non loading sharing mode is adopted, only one member link
has traffic and the other member links are in the standby state. In fact, this provides a hot standby
scheme. When the active member link fails, the system activates one of the standby member
links to shield the link failure.
Static Aggregation
The static aggregation of links requires the LACP protocol. In static aggregation, the automatic
maintenance of aggregated ports is realized through the exchange of protocol packets. The
administrator, however, is still responsible for creating an LAG and adding member links into
the LAG. Furthermore, the LACP protocol cannot change the configuration information of the
administrator.
The OptiX PTN 3900 supports the LACP protocol that complies with IEEE 802.3ad. By
exchanging LACP packets, two interconnected equipment negotiate which ports can be used to
forward data, and thus determine whether an egress port is in the selected or standby state.
The LACP protocol maintains the link state according to the port state. When aggregation
conditions change, the link aggregation is automatically adjusted or dismantled. Among the
member links of an LAG, the load sharing or non load sharing modes can function based on
ports, MAC addresses, IP addresses, or MPLS labels.
VLANs and MSTIs by setting a VLAN mapping table (that is, a VLAN and MSTI mapping
relation table). Each instance is mapped to one VLAN or a group of VLANs.
NOTE
l Instance: Equipment that runs the MSTP may have multiple spanning trees at the same time. Each
spanning tree is referred to as a multiple spanning tree instance. In this way, these spanning trees can
be distinguished.
l Region: A region refers to a group of interconnected switching equipment that have the same VLAN-
to-instance mapping relations.
Bridge protocol data units (BPDUs) that carry region and instance information are transmitted
among equipment. According to the BPDU information, the equipment determines whether it
belongs to a specific region. Several spanning tree instances can be run within a region, and only
one spanning tree can be run among regions.
Figure 6-5 shows a switching network that has multiple VLANs.
10, 30 10, 30
30 20
NE3 NE4
10
ROOT
After the MSTP begins running, each VLAN has an independent MST. See Figure 6-6.
ROOT
NE2 NE5 NE2 NE5
NE2 NE5
VLAN 30
As each instance is mapped to one VLAN or a group of VLANs, the MSTP can forward data
based on VLAN packets and thus realizes the load balancing for VLAN data. In this case, a
perfect integration of the RSTP and VLAN is achieved.
Working path
Cross-connect Cross-connect
Protection path
The LMSP 1+1 protection adopts the dual fed and selective receiving mechanism for services.
When the working path is faulty, the receive end selects the service from the protection path. In
this way, the service switching is realized.
l Detection method: The LOS alarm, LOF alarm, MS_AIS alarm, or B2_SD, B2_EXC are
detected at the physical layer.
l Switching process: The receive end selects the service according to the line state.
Cross-connect Cross-connect
Protection path
In the LMSP 1:1/1:N protection, the service is transported in the working path. When the working
path is faulty, the service is switched to the protection path. The single fed and single receiving
mechanism is used for the service. The APS protocol information is transported through the
protection path. The equipment at the two ends exchanges the protocol state information and the
switching state information. According to the protocol state and switching state, the equipment
at the two ends performs the service switching.
l Detection method: The LOS alarm, LOF alarm, MS_AIS alarm, or B2_SD, B2_EXC are
detected at the physical layer.
l Switching process: After a negotiation using the APS protocol, the transmit end switches
the service to the protection path, and the receive end selects the service from the protection
path.
Protection Parameters
Table 6-7 lists the parameters of the LMSP protection.
..
Processing board . Processing board
Link
Access Cross-connect Cross-connect Access
After the service signals are accessed, the cross-connect board cross-connects the signals to the
processing board, which uses the allocated bundled links to transmit the signals. In this way, the
load of board ports at the network side is shared and protected. The links all share the service
load and no one is standby.
ML-PPP is a intra-board protection scheme. If any link fails, the service load is shared by other
links for transmission.
l Detection method:
– At the physical layer, the loss of signal and the AIS, RDI state are detected in
microseconds.
– At the link layer, the detection is performed by the ML-PPP protocol in milliseconds.
l Switching process: The receive end selects the service according to the link state.
IMA is applicable for transmitting ATM cells through E1 ports and channelized VC12 links.
IMA provides a path for ATM cells, but does not process the service types or ATM cells. Hence,
IMA transparently transmit signals of the ATM layer and a higher layer. Figure 6-10 shows the
IMA transmission.
Link 1
Link 2
ATM cell flow Link 3 ATM cell flow
IMA group
In the case of the IMA protection, cells are distributed to other normal links for transport if one
link in the IMA group fails. In this case, services are protected.
The OptiX PTN 3900 provides powerful functions of operation, administration and maintenance.
T2000: Users can use the OptiX iManager T2000 transport network management system (T2000
for short) to perform network level configuration, especially service configuration. The T2000
supports software package loading and collection of information on faults. For details on the
T2000, refer to 7.2 T2000 Network Management System.
The OptiX PTN 3900 supports the following monitoring and maintenance functions.
l Each board has running status and alarm indicators, which are used for the network
administrator to locate and handle faults in time.
l The equipment provides functions such as alarm management and alarm filtering.
l The equipment supports automatic laser shutdown. (The Ethernet interface does not support
this function.)
l The equipment supports software upgrade without affecting services.
l The equipment supports in-service backup and loading of the database.
l The equipment supports restoration of the system configuration from the database.
l The equipment supports MPLS OAM and Ethernet OAM.
l The equipment supports the non-stop forwarding (NSF) function.
l The equipment supports inband management DCN.
l The T2000 can be used to dynamically monitor the running status, alarms and performance
of each NE in the network.
l The equipment supports package loading and remote loading of the board software and NE
software, and provides functions of anti-mistake loading and resuming interrupted file
transfer.
Rollback indicates that the original software version and service configuration can be recovered in the case
of upgrade failure. The new software covers the original software only after the upgrade succeeds.
The T2000 software runs on a workstation or a PC. The T2000 enables the user not only to
operate and maintain transmission equipment, but also to manage the transmission network. The
T2000 software has the following management functions.
Configuration Management
The configuration management function enables users to configure and manage interfaces,
clock, services, tunnels, protection and NE time.
l Creates or deletes network entities.
l Creates or changes fibers.
l Sets or modifies NE attributes, and delivers configuration.
l Configures interface attributes.
l Configures tunnels and protection.
l Configures OAM.
l Configures services.
l Configures clock sources.
l Uploads configuration data or checks data consistency.
l Checks NE information.
Maintenance Management
For the maintenance management, several schemes are provided to help maintenance personnel
to locate and clear equipment faults.
l Sets loopback.
l Sets the NE timing synchronization scheme.
l Resets boards or NE software.
l Sets automatic laser shutdown. (The Ethernet interface does not support this function.)
l Starts performance monitoring.
l Backs up the NE database.
Security Management
The T2000 can use several schemes to manage the NE security.
l NE user management.
l NE login management.
l NE login lockout.
l NE setting lockout.
l NE user group management.
l NE security parameters.
l NE security log.
8 Security Management
The T2000 uses many schemes to manage the security of the OptiX PTN 3900 NE. The NE
security management takes effect on the basis of the reasonable planning.
8.1 Authentication Management
Considering the security, only the legal user can log in to the NE after authentication.
8.2 Authorization Management
Proper authority assignment to different NE users can ensure the successful operations
performed by each user and the security of the NE system.
8.3 Network Security Management
Safe data transmission between the T2000 and NEs is the prerequisite for the T2000 to effectively
manage the NEs.
8.4 System Security Management
Considering the security, the system provides some security policies, which must be executed
forcibly.
8.5 NE Security Log Management
The NE security logs record the operations performed by all the NE users and the operation
results. By querying these logs, the administrator can trace and review the operations.
8.6 Syslog Management
The system log service (Syslog service) is used for the security management on an NE. For
unified control by maintenance engineers, all types of information are transmitted to the log
server in the format complying with the system log (Syslog) protocol.
– For an NE that requires lower security level, you can set the basic ACL rule only to
check the source address of the IP packets.
– For an NE that requires higher security level, you can set the advanced ACL rule. In
this case, the NE checks the source address, sink address, source port, sink port, and
protocol type of the received IP packets.
– If both the advanced and the basic ACL rules are available, the NE adopts the advanced
ACL rule to check the packets.
– Query the ACL rule.
– Modify the ACL rule.
– Delete the ACL rule.
l An NE can access the T2000 by using any of the following methods:
– Access over the Ethernet port (ETH port and EXT port). By default, an NE connects to
the T2000 over the Ethernet port.
– Access through the serial interface.
l Control the access to NEs by using LCT: If the T2000-LCT needs to be used to manage
NEs, you can enable the LCT access authority allowed by the NE on the T2000.
l When the T2000 communicates with an NE, confidential data (such as user name and
password) is encrypted.
NE A
(client) NE C
NMS (client)
TCP/IP DCN
Syslog server B
Real time
security log
NE D
Syslog server A
NOTE
Normally, a system log server is a workstation or server that is dedicated to storing the system logs of all
NEs in a network.
A forwarding gateway NE receives the system logs of other NEs and forwards the logs to the system log
server. In Figure 8-1, NE A and NE C are forwarding gateway NEs.
When IP protocol is adopted on each NE for communication, every NE can directly communicate
with the two system log servers through the IP protocol. Hence, configure the IP addresses and
port numbers on the NE, and the system is able to transmit the NE logs to the two Syslog servers
through the auto addressing function of IP protocol. No forwarding gateway NE is required.
When DCN mode is adopted on each NE for communication, the NE that does not directly
connect to the Syslog servers cannot communicate with the servers. The logs of the NE must be
transmitted to a gateway NE that directly communicates with the Syslog servers through DCN.
Then, the logs are forwarded to the Syslog servers by the gateway NE. Hence, the forwarding
gateway NE must be configured, for example, configure NE A as the forwarding gateway NE
for NE D.
9 Networking Application
The OptiX PTN 3900 is used at the convergence and backbone layers of the MAN. The
equipment can transport various services and carry WDM services at the convergence and
backbone layers of the MAN. The equipment can be used to transport mobile services, private
line services and broadband services.
Table 9-1 Application of the OptiX PTN 3900 for the mobile service
Item Description
Service Figure 9-1 shows how Figure 9-2 shows Figure 9-3 shows how
accessing to access the E1 services how to access the to access the FE
from base transceiver IMA E1 services services from base
stations (BTS). from base stations. stations.
Networking Tree, ring, mesh Tree, ring, mesh Tree, ring, mesh
scheme
Networking GE, 10GE, ML-PPP E1, GE, 10GE, ML-PPP GE, 10GE
interface POS E1, POS
Item Description
NOTE
Channelized E1: The same service is configured for the 32 timeslots of an E1 signal.
Fractional E1: Different services are configured for the 32 timeslots of an E1 signal.
Figure 9-1 Networking application of the OptiX PTN 3900 for transport of mobile services (E1
service between the base station and equipment)
E1 GE/POS/
GE/POS/ ML-PPP
ML-PPP
STM-1
E1
GE/POS/ GE/POS/
ML-PPP ML-PPP
GE/POS/
ML-PPP
GE/POS/ STM-1
ML-PPP
E1
Figure 9-2 Networking application of the OptiX PTN 3900 for transport of mobile services
(IMA E1 service between the base station and equipment)
IMA E1 GE/POS/
GE/POS/ ML-PPP
ML-PPP
IMA E1
IMA E1
GE/POS/ GE/POS/
ML-PPP ML-PPP
GE/POS/
ML-PPP
GE/POS/ ATM STM-1
ML-PPP
IMA E1
Figure 9-3 Networking application of the OptiX PTN 3900 for transport of mobile services (FE
service between the base station and equipment)
FE GE/POS/ GE/POS/
ML-PPP ML-PPP
GE
FE
GE/POS/ GE/POS/
ML-PPP ML-PPP
GE/POS/
ML-PPP
GE/POS/ FE
ML-PPP
FE
FE
GE
E-Line
Protection Path
CE
Table 9-2 Application of the OptiX PTN 3900 for the E-Line service
Item Description
Networking 10GE, GE
interface
Service scenario l The PTN equipment provides the E-Line service. The equipment
accesses user services from GE or FE interfaces and then
transparently transmits these services. In addition, the equipment
provides DiffServ/HQoS service.
l The equipment supports the traffic statistics counting based on port
or service (PW, Tunnel).
l The equipment provides the Ethernet OAM function (IEEE 802.1ag,
IEEE 802.3ah) and MPLS OAM function (ITU-T Y.1711).
FE
GE
E-LAN
CE
Table 9-3 Application of the OptiX PTN 3900 for the E-LAN service
Item Description
Networking Mesh
scheme
Networking 10GE, GE
interface
Item Description
R99 flow
Leased line
The ADSL modem can work in either the bridge or the router mode.
l When working in the bridge mode, the ADSL modem performs EoA encapsulation to the
accessed FE services. The OptiX PTN 1900 at the access node can use either the MPLS
Tunnel or the IP Tunnel and GRE Tunnel.
l When working in the router mode, the ADSL modem performs IPoA encapsulation to the
accessed FE services. the OptiX PTN 1900 at the access node can use the IP Tunnel and
GRE Tunnel.
Services forwarded through the ADSL network are finally converged to the OptiX PTN 3900
at the convergence node through the STM-1 interface. The OptiX PTN 3900 at the convergence
node then rearranges the data packets that carry the HSDPA services, and forwards the data
packets along with the signaling and R99 services to the RNC. The RNC forwards the services
to different service networks according to service types. In this way, the HSDPA service can be
forwarded in the wireless access and transport network in an end-to-end manner.
10 Technical Specifications
The technical specifications of the OptiX PTN 3900 are related to several items.
Table 10-1 Specifications of the ETSI cabinet for the OptiX PTN 3900 subrack
Number of
Allowed
Number of Number of
Dimensi OptiX PTN
Cabinet Weight Allowed OptiX Allowed
ons 3900 and
Type (kg) PTN 3900 OptiX PTN
(mm) OptiX PTN
Subracks 1900 Subracks
1900
Subracks
Table 10-2 lists the specifications of the OptiX PTN 3900 subrack.
FRR protection When less than 256 tunnels are switched at the same time, the FRR
time for TE tunnel protection time is less than 50 ms.
LAG protection l When links fail bidirectionally, the LAG protection switching time is
switching time less than 500 ms.
l When links fail unidirectional, the LAG protection switching time is
less than 3.5s.
Switching When the board is removed or manually switched, the service is not
performance of affected.
the SCA and XCS
MSTP topology In the case of a link failure, the switching time is less than 1s when
converging time conditions are available for fast reconfiguration, and less than 30s when
conditions are unavailable for fast reconfiguration.
Maximum 256
number of routing
neighbors
Maximum 20k
number of routes
supported by the
equipment
Number of 4k (TN81SCA)
supported MPLS 8k (TN82SCA)
Tunnels
Number of 2k
supported Tunnel
OAM
Number of 8k (TN81SCA)
supported PWs 16k (TN82SCA)
Number of 1512
supported CES
services
Number of 4k
supported E-Line
services
Number of VSI 1k
supported for E-
LAN
Maximum 256
number of virtual
ports supported
for each VSI
Number of 64k
supported VLAN/
VLAN list
ARP table 512 static ARP entries for the entire equipment
capacity 256 dynamic ARP entries for each port
Number of 1k
supported APS
protection groups
Number of 256
supported ML-
PPP groups
Number of 64 (TN81SCA)
supported L3VPN 255 (TN82SCA)
Item Specification
Item Specification
Min. overhead 0 -3 -3 -3 -3
point (dBm)
Extinction 9 9 9 9 9
ratio (dB)
Item Specification
Working 770 to 860 1270 to 1355 1270 to 1355 1500 to 1580 For details on
wavelength wavelength
range (nm) allocation,
see Table
10-7.
Min. overhead 0 -3 -3 -3 -3
point (dBm)
Extinction 9 9 9 9 9
ratio (dB)
Item Specification
Min. -1 -1 0.5 -1 -7
overhead
point (dBm)
Item Specification
Interface Specifications
Table 10-10 lists the specifications of the optical interfaces of the EFF8.
Item Specification
Other Specifications
Board dimensions (mm): 261.4 (height) x 156.9 (depth) x 22.0 (width)
Table 10-11 lists the specifications of interfaces on the EFG2. Table 10-12 lists the wavelengths
of colored optical interfaces on the EFG2.
Working 770 to 860 1270 to 1355 1270 to 1355 1500 to 1580 For details on
wavelength wavelength
range (nm) allocation, see
Table 10-12.
Min. overhead 0 -3 -3 -3 -3
point (dBm)
Extinction 9 9 9 9 9
ratio (dB)
Item Specification
Item Specification
Item Specification
Item Specification
Interface Specifications
Table 10-16 lists the specifications of interfaces on the AFO1.
Mean launched - 15 to - 8 - 5 to 0 - 5 to 0
optical power (dBm)
Receiver sensitivity - 28 - 34 - 34
(dBm)
Minimum overhead -8 - 10 - 10
point (dBm)
Other Specifications
Board dimensions (mm): 261.4 (height) x 156.9 (depth) x 22.0 (width)
Working wavelength 1261 to 1360 1280 to 1355 1480 to 1580 1480 to 1580
range (nm)
Item Specification
Code HDB3
Code HDB3
Item Specification
The CMR4 adds/drops and multiplexes four signals to/from the multiplexed signals. Table
10-22 lists the rules of adding/dropping wavelength of the CMR4.
The CMR2 adds/drops and multiplexes two signals to/from the multiplexed signals. Table
10-24 lists the rules of adding/dropping wavelength of the CMR2.
A1/D1 A2/D2
1 1271 1371
2 1471 1491
3 1511 1531
4 1551 1571
5 1591 1611
WARNING
Avoid direct eye exposure to the laser beams launched from the optical interface during the
installation and maintenance of the fiber. Otherwise, your eyes may be hurt.
Class 1M LASER
CMR2, CMR4
RADIATION
CLASS 1M LASER
PRODUCT
External clock Two-channel 75-ohm 2048 kbit/s (G.703) or 2048 kHz (G.703) inputs
synchronization Two-channel 120-ohm 2048 kbit/s (G.703) or 2048 kHz (G.703)
source inputs
Complies with ITU-T G.813 Complies with ITU-T G.813 Complies with ITU-T G.
and G.823. and G.823. 813 and G.823.
Table 10-28 lists the reliability specifications of the OptiX PTN 3900.
The OptiX PTN 3900 complies with the following EMC standards:
l ETSI EN 300 386 1.3.3 (2005-04)
l ETSI EN 300 132-2 (2003-09)
l CISPR22 (2003-04)
l GR-1089 (2006)
l IEC 61000-4-2 (2001-04)
l IEC 61000-4-3 (2002-09)
Table 10-29 lists the safety certifications that the OptiX PTN 3900 has passed.
Table 10-29 Safety certifications that the OptiX PTN 3900 has passed
Climate
Table 10-30 lists the climatic requirements of the OptiX PTN 3900 for storage.
Table 10-30 Climatic requirements of the OptiX PTN 3900 for storage
Item Specification
Waterproof Requirement
Requirement for storing equipment on the customer site: Generally, the equipment must be
stored indoors.
No water should remain on the floor or leak to the equipment carton. The equipment should be
placed away from places where water leakage is possible, such as near the automatic fire-fighting
facilities and heating facilities.
If the equipment is stored outdoors, the following four conditions are required.
Biological Environment
l Avoid multiplication of microbe, such as eumycete and mycete.
l Keep rodents such as mice away.
Air Cleanness
l The air must be free from explosive, electric-conductive, magnetic-conductive or corrosive
dust.
l Table 10-31 lists the density requirements for mechanically active substances during
storage.
l Table 10-32 lists the density requirements for chemically active substances during storage.
Table 10-31 Density requirements for mechanically active substances during storage
Table 10-32 Density requirements for chemically active substances during storage
Mechanical Stress
Table 10-33 lists the requirements of mechanical stress for storage.
dB/oct 12 - -12
Axes of vibration 3
Climate
Table 10-34 lists climatic requirements for transportation.
Item Specification
Item Specification
Rain ≤ 6 mm/min
Waterproof Requirement
The following conditions should be present for transportation.
Biological Environment
l Avoid multiplication of microbe, such as eumycete and mycete.
l Keep rodents such as mice away.
Air Cleanness
l The air must be free from explosive, electric-conductive, magnetic-conductive or corrosive
dust.
l Table 10-35 lists the density requirements for mechanically active substances during
transportation.
l Table 10-36 lists the density requirements for chemically active substances during
transportation.
Table 10-35 Density requirements for mechanically active substances during transportation
Table 10-36 Density requirements for chemically active substances during transportation
HF ≤ 0.03 mg/m3
O3 ≤ 0.1 mg/m3
Mechanical Stress
Table 10-37 lists the requirements of mechanical stress for transportation.
Bump Shock spectrum type 100 m/s2, 11ms, 100 in each direction
I (mass>50kg)
Direction of bump 6
Climate
Table 10-38 and Table 10-39 list the climatic requirements of the OptiX PTN 3900 for operation.
Table 10-38 Temperature and humidity required by the OptiX PTN 3900 for operation
Table 10-39 Other climatic requirements of the OptiX PTN 3900 for operation
Item Specification
Altitude ≤ 4000 m
Biological Environment
l Avoid multiplication of microbe, such as eumycete and mycete.
l Keep rodents such as mice away.
Air Cleanness
l The air must be free from explosive, electric-conductive, magnetic-conductive or corrosive
dust.
l Table 10-40 lists the density requirements for mechanically active substances during
operation.
l Table 10-41 lists the density requirements for chemically active substances during
operation.
Table 10-40 Density requirements for mechanically active substances during operation
Table 10-41 Density requirements for chemically active substances during operation
Mechanical Stress
Table 10-42 lists the requirements of mechanical stress for operation.
Acceleration - 2 m/s2
Direction of bump 6
Environment Standard
Standard or Protocol Title
EMC Standard
Standard or Protocol Title
L2VPN Standard
Standard or Protocol Title
MPLS Standard
Standard or Protocol Title
PWE3 Standard
Standard or Protocol Title
QoS Standard
Standard or Protocol Title
ATM Standard
Standard or Protocol Title
SDH Standard
Standard or Protocol Title
B Glossary
ACL Access control list. A list of sequential instructions that are composed
of permit|deny statements. In firewall, the ACL is used on router
interfaces so that the router can determine which data packets to receive
and which to refuse. In QoS, the ACL is also used for flow
classification.
BDI When detecting a defect, the sink node of a LSP uses backward defect
indication (BDI) to inform the upstream end of the LSP of a
downstream defect along the return path.
control plane A set of communicating entities that are responsible for the
establishment of connections including set-up, release, supervision and
maintenance. A control plane is supported by a signaling network.
E-Line The Ethernet line that provides the Ethernet private line service, the
Ethernet-based Internet access service, and the point-to-point Ethernet
VPN service.
E-Tree The Ethernet multicast service, that is, the point-to-multipoint E-LAN
service.
FDI Forward defect indication (FDI) is generated and traced forward to the
sink node of the LSP by the node that first detects defects. It includes
fields to indicate the nature of the defect and its location. Its primary
purpose is to suppress alarms being raised at affected higher level client
LSPs and (in turn) their client layers.
forwarding plane Also referred to as the data plane. The forwarding plane is connection-
oriented, and can be used in Layer 2 networks such as an ATM network.
IGMP snooping Internet group management protocol snooping. A mechanism used for
signaling from the host to the router, in the end network of IP multicast.
Through IGMP, the host joins or quits a multicast group, and the router
determines whether multicast group members exist in the downstream
network segment.
LDP Label distribution protocol. A protocol using which two label switch
routers (LSR) exchange label mapping information. The two LSRs are
called LDP peers and the exchange of information is bidirectional. LDP
is used to build and maintain LSR databases that are used to forward
traffic through MPLS networks.
LSP Label switch path. An ingress and egress switched path built through
a series of LSRs to forward the packets of a particular FEC using a label
swapping forwarding mechanism.
LSR Label switch router. A device located in the core of the network that
switches labeled packets according to precomputed switching rules.
This device can be a switch or a router.
MPLS L2VPN The MPLS L2VPN provides the Layer 2 VPN service based on an
MPLS network. In this case, on a uniform MPLS network, the carrier
is able to provide Layer 2 VPNs of different media types, such as ATM,
FR, VLAN, Ethernet, and PPP.
MPLS OAM The MPLS OAM provides continuity check for a single LSP, and
provides a set of fault detection tools and fault correct mechanisms for
MPLS networks. The MPLS OAM and relevant protection switching
components implement the detection function for the CR-LSP
forwarding plane, and perform the protection switching in 50 ms after
a fault occurs. In this way, the impact of a fault can be lowered to the
minimum.
MSTP The multiple spanning tree protocol (MSTP) can be used in a loop
network. Using an algorithm, the MSTP blocks redundant paths so that
the loop network can be trimmed as a tree network. In this case, the
proliferation and endless cycling of packets is avoided in the loop
network.
multicast To transmit data to multiple recipients on the network at the same time
using one transmission stream to the switches, at which point data are
distributed out to the end users on separate lines.
NSAP Network service access point. The point at which the OSI Network
Service is made available to a Transport entity. The NSAPs are
identified by OSI Network Addresses. The NSAP is a generic standard
for a network address consisting of 20 octets. ATM has specified E.164
for public network addressing and the NSAP address structure for
private network addresses.
PDU Packet data unit. The unit that is transported in a local interconnect
network (LIN) diagnostic frame. A PDU used for node configuration
is a complete message.
POS Packet over SDH/SONET. A MAN and WAN technology that provides
point-to-point data connections. The POS interface uses SDH/SONET
as the physical layer protocol, and supports the transport of packet data
(such as IP packets) in MAN and WAN.
synchronous status A message that is used to transmit the quality levels of timing signals
message on a synchronous timing link. By reading the SSM, a node clock in the
SDH network and the synchronization network obtains the upstream
clock information. The SSM performs relevant operations (such as
tracing, switching, and hold-over) on the clock of the local node, and
then transmits the synchronization information of the local node to the
downstream.
VPLS Virtual private LAN service. A service that, with the assistance of an
IP public network, realizes the interconnection of LANs through a
VPN. The VPLS is the extension of a LAN in the IP public network.
VPWS Virtual Private Wire Service. A virtual private wire service is a point-
to-point circuit (link) connecting two customer edge devices. The link
is established as a logical through a packet switched network. The CE
in the customer network is connected to a PE in the provider network
via an attachment circuit. The attachment circuit is either a physical or
a logical circuit.
AF Assured Forwarding
CV Connectivity Verification
GE Gigabit Ethernet
GR Graceful Restart
HA High Availability
IP Internet Protocol
MP Merge Point
PE Provider Edge
PW Pseudo Wire
TE Traffic Engineering
VC Virtual Channel
VP Virtual Path
Index
A
I
access capability, 2-3
ACL, 5-22 IGMP Snooping, 5-20
application inband DCN, 2-15
E-LAN service, 9-7 interface type
E-Line service, 9-6 service interface, 2-5
mobile service, 9-2 IP tunnel, 5-15
IS-IS routing protocol, 5-6
B
L
BFD, 5-23
l3vpn service
C introduction, 4-16
laser class, 10-21
clock, 2-14 log
compliant standard list, A-1 security log, 8-3
Syslog, 8-3
D
DCN, 2-15
M
diagnosis and debugging, 7-3 monitoring and maintenance, 7-2
MPLS
E basic concept, 5-3
equipment feature, 5-5
E-Aggr service, 4-12 generation background, 5-3
E-LAN service, 4-11 signaling, 5-14
E-Line service, 4-11 system structure, 5-5
environment requirement MPLS OAM, 2-13
storage, 10-25 MSTP, 5-21
Transportation, 10-27
Ethernet OAM, 2-13
expansion and upgrade, 7-3
N
network application, 1-3
G network management system, 7-3
NSF, 2-14
GRE tunnel, 5-15
O
H
OAM
hardware Ethernet OAM, 2-13
board, 3-9 MPLS OAM, 2-13
slots for boards, 3-10 security management, 8-1
structure, 3-4 offload solution, 9-9
subrack, 3-6