Académique Documents
Professionnel Documents
Culture Documents
Contents
Contents
1 System Overview .......................................................................................................................1-1
About This Chapter ........................................................................................................................... 1-1 1.1 Product Orientation ..................................................................................................................... 1-2 1.2 Features and Benefits .................................................................................................................. 1-3 1.2.1 Multi-Service Access Platform .......................................................................................... 1-3 1.2.2 High-Density Subscriber Line Access ............................................................................... 1-4 1.2.3 Service Processing Capabilities ......................................................................................... 1-4 1.2.4 Operable Broadband Video Services ................................................................................. 1-4 1.2.5 Flexible Networking Modes............................................................................................... 1-4 1.2.6 Reliability........................................................................................................................... 1-5 1.2.7 Range of UA5000 Models ................................................................................................. 1-6 1.2.8 Element Management System............................................................................................ 1-6 1.3 Major Service Offerings .............................................................................................................. 1-7 1.3.1 PSTN Voice Services ......................................................................................................... 1-7 1.3.2 Next Generation Voice Services......................................................................................... 1-8 1.3.3 Broadband Services ........................................................................................................... 1-8 1.3.4 Private Circuit Services...................................................................................................... 1-9
3 Service Implementation............................................................................................................3-1
T2-050209-20060530-C-1.D1
Contents
About This Chapter ........................................................................................................................... 3-1 3.1 VoIP Service ................................................................................................................................ 3-2 3.1.1 Voice Codecs...................................................................................................................... 3-2 3.1.2 Echo Cancellation .............................................................................................................. 3-4 3.1.3 Generating Tones ............................................................................................................... 3-5 3.1.4 Digit Collection.................................................................................................................. 3-5 3.1.5 Message Waiting Indicator Service.................................................................................... 3-6 3.1.6 Equipment Authentication ................................................................................................. 3-6 3.1.7 Standalone Capability ........................................................................................................ 3-8 3.1.8 DDI and Escape Channel ................................................................................................... 3-9 3.1.9 Dual Homing.................................................................................................................... 3-10 3.1.10 Hairpin Connection........................................................................................................ 3-11 3.1.11 Overload Control............................................................................................................ 3-11 3.1.12 VAG ............................................................................................................................... 3-12 3.1.13 IP Address Separation of Signalling Flow and Media Flow .......................................... 3-12 3.2 FoIP Service .............................................................................................................................. 3-13 3.3 MoIP Service ............................................................................................................................. 3-15 3.4 VLAN ........................................................................................................................................ 3-16 3.4.1 Overview.......................................................................................................................... 3-16 3.4.2 Standard VLAN ............................................................................................................... 3-17 3.4.3 MUX VLAN .................................................................................................................... 3-17 3.4.4 Smart VLAN .................................................................................................................... 3-18 3.4.5 Super VLAN .................................................................................................................... 3-18 3.4.6 Comparisons Between Different VLANs ........................................................................ 3-19 3.4.7 QinQ................................................................................................................................. 3-20 3.4.8 Stacking............................................................................................................................ 3-22 3.5 ARP and ARP Proxy .................................................................................................................. 3-24 3.6 DHCP Relay .............................................................................................................................. 3-26 3.7 Multicast.................................................................................................................................... 3-28 3.8 QoS............................................................................................................................................ 3-31 3.8.1 Precedence Tagging ......................................................................................................... 3-31 3.8.2 Traffic Policing ................................................................................................................ 3-33 3.8.3 Port Rate Limiting............................................................................................................ 3-33 3.8.4 Queue Scheduling ............................................................................................................ 3-33 3.8.5 Traffic Mirroring .............................................................................................................. 3-35 3.8.6 RTCP Detection ............................................................................................................... 3-35 3.9 MAC Address Management ...................................................................................................... 3-37 3.10 STP and RSTP ......................................................................................................................... 3-38 3.11 Routing Management .............................................................................................................. 3-39
ii
T2-050209-20060530-C-1.D1
Figures
Figures
Figure 1-1 The UA5000 in the overall solution................................................................................ 1-2 Figure 2-1 The UA5000 logical structure......................................................................................... 2-2 Figure 2-2 The UA5000 software architecture ................................................................................. 2-3 Figure 2-3 HABA shelf layout.......................................................................................................... 2-9 Figure 2-4 HABD shelf layout ....................................................................................................... 2-11 Figure 2-5 HABF shelf layout ........................................................................................................ 2-11 Figure 2-6 HABL shelf layout ........................................................................................................ 2-12 Figure 2-7 Hardware architecture of the master shelf .................................................................... 2-13 Figure 2-8 Hardware architecture of the extended shelf................................................................. 2-14 Figure 3-1 Authentication procedure based on the H.248 protocol .................................................. 3-7 Figure 3-2 DDI and escape channel application scenario................................................................. 3-9 Figure 3-3 Heartbeat detect and switchover process based on H.248 ............................................ 3-10 Figure 3-4 The implementation of the VBD fax............................................................................. 3-13 Figure 3-5 The implementation of the T.38 fax .............................................................................. 3-14 Figure 3-6 Implementation of the MoIP service............................................................................. 3-15 Figure 3-7 QinQ application........................................................................................................... 3-21 Figure 3-8 VLAN stacking application .......................................................................................... 3-23 Figure 3-9 The implementation of the ARP proxy ......................................................................... 3-24 Figure 3-10 Implementation of DHCP relay .................................................................................. 3-26 Figure 3-11 ToS field of the IP header............................................................................................ 3-32 Figure 3-12 DS field of the IP header............................................................................................. 3-32 Figure 3-13 Frame structure of 802.1Q .......................................................................................... 3-33 Figure 3-14 Schematic diagram of PQ ........................................................................................... 3-34 Figure 4-1 NGN consolidation ......................................................................................................... 4-2 Figure 4-2 Private circuit service...................................................................................................... 4-3 Figure 4-3 Triple play application .................................................................................................... 4-4
T2-050209-20060530-C-1.D1
Figures
Figure 5-1 Maintaining the UA5000 through the CLI...................................................................... 5-2 Figure 5-2 Inband EMS networking ................................................................................................. 5-7 Figure 5-3 Outband EMS networking .............................................................................................. 5-8
vi
T2-050209-20060530-C-1.D1
Tables
Tables
Table 1-1 Description of the UA5000 broadband subsystem ........................................................... 1-3 Table 1-2 Description of the UA5000 narrowband subsystem ......................................................... 1-3 Table 2-1 Specification of the cabinet that houses the UA5000 shelves .......................................... 2-4 Table 2-2 Description of the power supply system........................................................................... 2-5 Table 2-3 Description of the control cards...................................................................................... 2-15 Table 2-4 Description of the narrowband line cards ....................................................................... 2-16 Table 2-5 Description of the broadband line card........................................................................... 2-17 Table 2-6 Description of the broadband and narrowband combo line cards................................... 2-18 Table 2-7 Description of the other cards......................................................................................... 2-18 Table 3-1 Rates and packetisation delays of various codecs............................................................. 3-2 Table 3-2 Voice codecs and the required bandwidths ....................................................................... 3-4 Table 5-1 Configuration functions of UA5000 NE Manager............................................................ 5-5 Table 6-1 Dimensions of the cabinet that houses the UA5000 shelf ................................................ 6-2 Table 6-2 Dimensions of the UA5000 shelves.................................................................................. 6-2 Table 6-3 Weight of the UA5000 cabinet ......................................................................................... 6-2 Table 6-4 The running environment of the UA5000......................................................................... 6-3 Table 6-5 Power supply parameters of the UA5000 ......................................................................... 6-3 Table 6-6 System performance specifications .................................................................................. 6-3 Table 6-7 Types and number of the management interfaces ............................................................. 6-4 Table 6-8 Types and number of the network interfaces .................................................................... 6-4 Table 6-9 Types and number of the customer interfaces................................................................... 6-5 Table 6-10 Technical specifications of the STM-1 port.................................................................... 6-7 Table 6-11 Technical specifications of the 100Base-Tx port ............................................................ 6-7 Table 6-12 Technical specifications of the 100Base-Fx port ............................................................ 6-8 Table 6-13 Technical specifications of the 1000Base-Sx port .......................................................... 6-9 Table 6-14 Technical specifications of the 1000Base-Lx port.......................................................... 6-9
T2-050209-20060530-C-1.D1
vii
Tables
Table 6-15 Technical specifications of the 1000Base-Zx port........................................................ 6-10 Table 6-16 Technical specifications of the E3 electrical port ......................................................... 6-10 Table 6-17 Technical specifications of the T3 electrical port ......................................................... 6-11 Table 6-18 Technical specifications of the ADSL port ................................................................... 6-11 Table 6-19 Technical specifications of the ADSL2+ port ............................................................... 6-11 Table 6-20 Technical specifications of the SHDSL port................................................................. 6-12 Table 6-21 Technical specifications of the VDSL port ................................................................... 6-12 Table 6-22 Technical specifications of the E1 port ......................................................................... 6-13 Table 6-23 Technical specifications of the V.35 port ...................................................................... 6-13 Table 6-24 Features and specifications of the IP service ................................................................ 6-15 Table 6-25 Features and specifications of the AG service .............................................................. 6-17 Table 6-26 Features and specifications of terminal management and line test............................... 6-20 Table 6-27 Standards compliance ................................................................................................... 6-21
viii
T2-050209-20060530-C-1.D1
1 System Overview
1
About This Chapter
Section 1.1 1.2 Product Orientation Features and Benefits Describes 1.3 Major Service Offerings
System Overview
The position of the UA5000 in a telecommunications network. The major features and benefits of the UA5000 The major services offered by the UA5000, including the voice, broadband and private circuit services
T2-050209-20060530-C-1.D1
1-1
1 System Overview
E1
STM-1
FE/GE
H.248
STM-1/FE
MSTP
Access layer
CPE
V.24 V.35 E1
: UA5000 : Media Gateway Controller (MGC) PSTN: Public Switched Telephone Network DDN: Digital Data Network ATM: Asynchronous Transfer Mode IP: Internet Protocol STM-1: Synchronous Transfer Mode 1 FE: Fast Ethernet GE: Gigabit Ethernet CPE: Customers Premises Equipment VDSL: Very High Speed Digital Subscriber Line POTS: Plain Old Telephone Service ADSL: Asymmetric Digital Subscriber Line ISDN: Integrated Services Digital Network SHDSL: Single-pair High-speed Digital Subscriber Line LAN: Local Area Network MSTP: Multi-service Transport Platform
1-2
T2-050209-20060530-C-1.D1
1 System Overview
Table 1-2 Description of the UA5000 narrowband subsystem Control Card PVMB Function Supports: VoIP voice services Legacy voice services Narrowband private line service PVU Supports: Legacy voice services Narrowband private circuits Interface Description Customer interfaces: POTS, ISDN BRI, ISDN PRI, TDM SHDSL, 2/4W, Voice frequency (VF), 64k VF Network interfaces: FE and E1 Customer interfaces: POTS, ISDN BRI, ISDN PRI, TDM SHDSL, 2/4W, VF, 64k VF, E&M, Z, FE1, E1, V.35 and V.24 Network interface: E1
T2-050209-20060530-C-1.D1
1-3
1 System Overview
1-4
T2-050209-20060530-C-1.D1
1 System Overview
Topology: supports the ring, star and tree topologies, or a combination of them. Broadband network interface: supports the IP interface to connect to the upper layer network. Bearing technology: supports the MSTP bearing technology. Subtending: supports local subtending through a star bus, and remote subtending through the FE or the SHDSL ports.
1.2.6 Reliability
The UA5000 adopts reliability design in terms of system, software and networking to ensure the robustness of the system.
T2-050209-20060530-C-1.D1
1-5
1 System Overview
Support of dual homing. One UA5000 can register with two call servers. If one call server is faulty, the UA5000 switches over to the other.
1-6
T2-050209-20060530-C-1.D1
1 System Overview
POTS
The UA5000 provides POTS ports to support the access of analogue subscribers and PBXs. The UA5000 supports supplementary services such as Central Exchange (CENTREX) and Caller Identification Display (CID).
ISDN
The UA5000 provides ISDN BRI (2B+D) ports and ISDN PRI (30B+D) ports, and supports various N-ISDN services, including: Video conferencing Videotext G4 facsimile E-mail Data retrieval LAN interconnection Internet access The UA5000 also supports ISDN supplementary services. These ISDN supplementary services include: Direct dial-in (DDI) Multi-subscriber number (MSN) Calling line identification presentation (CLIP) The UA5000 supports a mixed configuration of ISDN subscribers and analogue telephone subscribers.
Direct-Dial-In
The UA5000 provides DDI subscriber ports to support the subscriber line extension service. This service enables the external analogue subscriber ports of other exchanges to be transparently extended inside the access network.
T2-050209-20060530-C-1.D1
1-7
1 System Overview
Service Features
The major features of the next generation voice services are as follows: Supports the Virtual Access Gateway (VAG) capability. Supports the G.711 (a-law/-law), G.723.1 and G.729 (A/B) codecs Supports the G.711 codec with 10 ms packetisation delay Supports the standalone capability Supports echo cancellation complying with ITU-T G.165/G.168 Supports point to point delay <= 25 ms with net jitter = 2 ms Supports pulse metering and polarity reversal metering Supports Real-time Transport Control Protocol (RTCP) statistics Supports the measurement of the H.248 protocol messages and the traffics on the FE port Supports call traffic measurement Supports playing announcement tones Provides QoS assurance for voice traffics with functions including priority queuing, jitter buffering, IP Type of Service (ToS), Differentiated Service Code Point (DSCP), 802.1Q VLAN, packet loss compensation, voice activation detection (VAD), and comfortable noise generation (CNG) Supports separate gain control of the transmission and reception streams
1-8
T2-050209-20060530-C-1.D1
1 System Overview
SHDSL VDSL Ethernet The UA5000 provides the following broadband network interfaces: FE GE
T2-050209-20060530-C-1.D1
1-9
1 System Overview
Local and remote DDN access through DDN ports such as E1, V.35, V.24, TDM SHDSL and 2/4-wireVF SHDSL access through ATM SHDSL ports Private circuit data at a symmetric rate of 10 Mbit/s within 1.5 km through VDSL ports Broadband private circuit LAN interconnection through the Ethernet ports
1-10
T2-050209-20060530-C-1.D1
2 System Structure
2
About This Chapter
Section 2.1 2.2 2.3 2.4 2.5 Logical Structure Software Structure Cabinet Shelves Cards Describes
System Structure
The logical structure of the UA5000 and the function of each module. The software structure of the UA5000 and the function of each module. The cabinet specifications and the power supply system. The structure and hardware principles of the HABA, HABD, HABF and HABL shelves. The cards of the UA5000, including the control card, line card, interface card, splitter card, environment monitoring card and secondary power supply card.
T2-050209-20060530-C-1.D1
2-1
2 System Structure
NNI Module
The following describes the UA5000 logical structure. The TDM control and switching module implements the switching and convergence of narrowband services through the TDM switching fabric. The packet control and switching module implements the switching and convergence of broadband services through the packet switching fabric. The packet voice processing module converts the voice stream to IP packets through voice encoding and sends them to the NGN. The NNI module provides various network ports including the STM-1, E3/T3, TDM E1, IMA E1, FE and GE ports. The UNI module provides various service ports including POTS, ISDN BRI (2B+D), ISDN PRI (30B+D), V.24 sub-rate, V.24/V.35 64 kbit/s, V.35/FE1 N x 64 kbit/s, E1, ADSL, ADSL2+, VDSL, SHDSL (TDM/ATM), Ethernet and 2/4-wire VF ports.
U NI Module
ADSL ADSL2+ VDSL ATM SHDSL Ethernet Packet control and switching module STM-1 E3/T3 TDM E1 IMA E1 FE/GE
2-2
T2-050209-20060530-C-1.D1
2 System Structure
Host software
Card software 1
Card software 2
...
Card software
The card software runs on a line card, an interface card, a monitor card or a power supply card of a certain type. The software drives the card and implements service management, data management, alarm management and fault diagnosis for the card.
Host software
The host software runs on a control card. The software consists of four layers as follows: System support layer: drives the system hardware. System service layer: provides basic services for the software running. Its fundamental module is the operating system. System management layer: provides users with the means to manage the equipment and services. Service control layer: interprets and executes the commands for service configuration. It carries out the protocol communication between devices, handles the service requests and provides the services.
T2-050209-20060530-C-1.D1
2-3
2 System Structure
2.3 Cabinet
2.3.1 Cabinet Specifications
Table 2-1 lists the cabinet that houses the UA5000 shelves.
Table 2-1 Specification of the cabinet that houses the UA5000 shelves Model Type Shelf Max. Number of Ports POTS Only ONU-F01D2001 ONU-F01D5002 ONU-F01D10003 Outdoor, front-access Outdoor, front-access Outdoor, front-access Indoor, rear-access 1 HABD 1 HABD + 1 HABF 1 HABD + 1 HABF + 1 HABD 1 HABA 1 HABA+ 1 HABA ONU-F02AF4 Indoor, front-access 1 HABD+ 1 HABF 1 HABD+ 2 HABFs+ 1 HABD 1. 2. 384 960 1344 ADSL Only 32-port: 384 16-port: 192 32-port: 672 16-port: 480 32-port: 960 16-port: 480 960 1920 960 1920 32-port: 960 16-port: 480 32-port: 1920 16-port: 960 32-port: 960 16-port: 480 32-port: 1344 16-port: 960 POTS & ADSL Combo 32-port: 384 16-port: 192 32-port: 672 16-port: 480 32-port: 960 16-port: 480 32-port: 960 16-port: 480 32-port: 1920 16-port: 960 32-port: 960 16-port: 480 32-port: 1344 16-port: 960
ONU-F02A
3.
4.
The F01D200 can be fully populated with 32-port combo line cards or 32-port broadband line cards. The F01D500 can be configured with up to two service shelves. In the two service shelves, you can configure up to twenty-one 32-port broadband line cards or 32-port combo line cards owing to the power consumption. The F01D1000 can be configured with up to three shelves. In the three service shelves, you can configure up to thirty 32-port broadband line cards or 32-port combo line cards owing to the power consumption. The F02AF can be configured with up to four shelves. The maximum number of 32-port broadband line cards or 32-port combo line cards is 42 owing to the cabling. When 32-port broadband line cards are used, up to three shelves can be configured, and the fourth shelf cannot be configured. When 32-port combo line cards are used, up to 42 slots can be configured with the combo line cards while the others can be configured with only narrowband line cards.
2-4
T2-050209-20060530-C-1.D1
2 System Structure
T2-050209-20060530-C-1.D1
2-5
2 System Structure
Power monitoring unit Built-in monitor card in the power distribution unit
2-6
T2-050209-20060530-C-1.D1
2 System Structure
T2-050209-20060530-C-1.D1
2-7
2 System Structure
2.4 Shelves
There are two types of shelves: the front-access shelf and the rear-access shelf. This section describes the structure and the hardware principles of the UA5000 shelves.
Note For details about the cards mentioned in this section, refer to "2.5
Cards".
2-8
T2-050209-20060530-C-1.D1
2 System Structure
I I P P P P W W M M X X B B
P V x / R S U x
P V x / R S U x
A I U B / x S L
T A S I S U x x x x x x x x x B B S S S S S S S S S / / L L L L L L L L L x x S S L L
x x x x x x x x x x x x x x x x x x S S S S S S S S S S S S S S S S S S L L L L L L L L L L L L L L L L L L
HABD Shelf
The HABD shelf is the master shelf of the UA5000, which stands at a height of 10 U. The HABD shelf can be subtended with HABD and HABF shelves, and the HABD shelf aggregates the services from the subordinate shelves.
T2-050209-20060530-C-1.D1
2-9
2 System Structure
The HABD shelf provides 18 slots, of which 12 are reserved for line cards. You can insert narrowband line cards, broadband line cards and combo line cards as desired, while you can insert the TSSB card only in the position as shown in Figure 2-4. The two narrowband control cards and the two broadband control cards in the shelf support backup in the event of a primary controller failure. The HABD shelf can use a minimum of one and a maximum of two PWX cards. The two PWX cards in the shelf share the power supply load, and if one PWX fails, the other dynamically provides the necessary power. When one HABD shelf is subtended with another HABD shelf, the subordinate HABD shelf is equipped with only broadband control cards and as many as 12 line cards. Figure 2-4 shows the layout of the HABD shelf.
2-10
T2-050209-20060530-C-1.D1
2 System Structure
P V I I x P P P P / W W M M R X X B B S U x
P V x / R S U x
A I U B / x S L
PWX: Secondary power supply card IPMB: Broadband control card PVx: Narrowband control card RSUx: Remote subscriber unit (RSU8/RSU4) AIUB: ATM interface card xSL: Line card (ASL/DSL/ADMB/VDLA/SDLB) TSSB: Test card
HABF Shelf
The HABF shelf is the extended shelf of the UA5000, which stands at a height of 10 U. It operates under the control of the HABD shelf, and provides the power supply to the HABD shelf. The HABF shelf provides 18 slots. They are all line card slots. You can insert narrowband line cards, broadband line cards and combo line cards as desired. Figure 2-5 shows the layout of the HABF shelf.
Fan
00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17
x x x x x x S S S S S S L L L L L L
x x x x x x x x x x x x S S S S S S S S S S S S L L L L L L L L L L L L
Cable routing area Interconnect cable connecting area Line card cable connecting area
T2-050209-20060530-C-1.D1
2-11
2 System Structure
HABL Shelf
The HABL shelf is the mini shelf of the UA5000, which stands at a height of 10 U. The HABL shelf provides 12 slots, of which 5 are available for line cards. You can insert the narrowband and the broadband line cards as desired. The shelf supports up to three 32-port ADSL/ADSL2+ line cards, three POTS and ADSL/ADSL2+ combo line cards, or five other line cards. The TSSB card can be installed only in slot 11. The two narrowband and the two broadband control cards in the shelf support backup in the event of primary controller failures. The HABL shelf can use a minimum of one and a maximum of two PWX cards. The two PWX cards in the shelf share the power supply load, and if one PWX fails, the other dynamically provides the necessary power. Figure 2-6 shows the layout of the HABL shelf.
Fan
00 01 02 03 04 05 06 07 08 09 10 11
P V I I x P P P P / W W M M R X X B B S U x
P V x x / S R L S U x
x x x x T S S S S S L L L L S B
Cable routing area Cable connecting area PWX: Secondary power supply card IPMB: Broadband control card PVx: Narrowband control card (PVU8/PVU4/PVM) RSUx: Remote subscriber unit (RSU8/RSU4) xSL: Service card (ASL/DSL/ADMB/VDLA/SDLB) TSSB: Test card
2-12
T2-050209-20060530-C-1.D1
2 System Structure
Master shelf P V x
I P M B
A S L
C S M
D S L
E A U
UNI
The master shelf is the control core of the UA5000. The shelf controls the subordinate shelves. The shelf can also connect subscriber cables. The master shelf switches, aggregates and transmits services uplink for the subordinate shelves.
Note The HABL shelf does not subtend extended shelves since it is a mini-capacity shelf.
The service handling process of the UA5000 is as follows: The narrowband line cards send services to the narrowband control card (PVU8, PVU4 and PVM) through the TDM bus. After carrying out the protocol processing and time slot crossing, the PVU8/PVU4/PVM forwards these services upstream through the NNI.
T2-050209-20060530-C-1.D1
2-13
2 System Structure
The broadband line cards send services to the broadband control card (IPMB) through the broadband bus, and the IMPB aggregates and forwards these services uplink through the NNI. The line card management of the UA5000 is as follows: The narrowband control card manages the narrowband line cards and test card in this shelf and the subtended shelves that are connected to this shelf through buses. The broadband control card manages the broadband line cards, interface cards and test card in this shelf and the subtended shelves that are connected to this shelf through buses. The broadband control card can manage the narrowband control card through the backplane communication channel to realize the narrowband and broadband integrated management. When the UA5000 acts as a component of the NGN, the PVM converts the TDM signals of all narrowband service data into IP packets and sends the IP packets to the IPMB card. The IPMB then forwards these packets upstream to the IP network along with the broadband services. The TSSB card tests the line cards, and reports the test results to the control cards.
Extended shelf
A S L
C S M
D S L
E A U
UNI
2-14
T2-050209-20060530-C-1.D1
2 System Structure
Services from the narrowband line cards are converged by the TDM bus, and forwarded upstream to the master shelf through the transfer card or the backplane. Services from the broadband line cards are converged by the broadband bus, and forwarded upstream to the master shelf through the transfer card or the backplane.
Card Management
The card management of the UA5000 is as follows: The narrowband control card, manages the narrowband line cards and E1 interface cards in this shelf and the subtended shelves. The narrowband control card also manages the narrowband part of the combo line cards. The broadband control card manages the broadband line cards and the broadband part of the combo line cards in this shelf and the subtended shelves.
2.5 Cards
The cards used in the UA5000 include the control cards, line cards and other cards. Table 2-3, Table 2-4, Table 2-5, Table 2-6, and Table 2-7 describe the details of these cards.
Table 2-3 Description of the control cards Short Name IPMB Full Name Master shelf IP service processing card Function Description The IPMB card is also called the broadband control card. The IPMB card: controls the broadband line cards aggregates and processes broadband services provides GE/FE ports supports active/standby backup PVMB Packet voice processing card The PVMB card is also called the narrowband control card. The PVMB card: processes the H.248 protocol converts the TDM voice signals into IP packets provides one FE port to transmit the VoIP service supports active/standby backup
T2-050209-20060530-C-1.D1
2-15
2 System Structure
Function Description The PVU8/PVU4 is also called the master shelf narrowband control card. The PVU8/PVU4 card: Controls the narrowband line cards Provides upstream V5 E1 ports for TDM services Provides TDM switch fabric and working clock for TDM services Supports the active/standby backup
RSU8/RSU4
The RSU8/RSU4 card: Controls the narrowband line cards in the remote subscriber shelf Subtends the narrowband services with the UA5000 master shelf or the MD5500 shelf Provides upstream E1 ports for narrowband services Supports the active/standby backup
RSUG
The RSUG card: Serves the ONU-60A multi-service access unit Connects the G.SHDSL interface card on the central office side to forward the primary and secondary node signalling Manages the secondary nodes
Table 2-4 Description of the narrowband line cards Short Name ASL A32 DSL DSLD VFB CDI ATI Full Name POTS line card POTS line card ISDN BRI line card ISDN BRI line card VF interface card Direct dial-in line card Analogue trunk interface card Function Description The ASL card provides 16 POTS ports The A32 card provides 32 POTS ports The DSL card provides 8 ISDN BRI ports The DSLD card provides 16 ISDN BRI ports The VFB card provides 16 2-wire VF ports or 8 4-wire VF ports The CDI card provides 16 DDI ports The ATI card provides 6 2/4-wire E&M trunk ports
2-16
T2-050209-20060530-C-1.D1
2 System Structure
Function Description The SDL card provides 4 TDM SHDSL ports and 4 E1 ports The SDLE card provides 8 TDM SHDSL ports and 8 E1 ports
Table 2-5 Description of the broadband line card Short Name SDLB ADLB Full Name SHDSL line card ADSL line card Function Description The SDLB card supports: 16 ATM SHDSL ports The ADLB card supports: 16 ADSL ports a built-in splitter ADMB ADSL/ADSL2+ line card The ADMB card supports: 16 ADSL/ADSL2+ ports a built-in splitter ADMC ADSL/ADSL2+ line card The ADMC card supports: 16 ADSL/ADSL2+ ports A built-in splitter ADRB ADSL/ADSL2+ line card The ADMC card supports: 32 ADSL/ADSL2+ ports A built-in splitter VDLA VDSL line card The VDLA card supports: 16 VDSL ports a built-in splitter external line test CO emulation on port 0 EAUA Ethernet line card The EAUA card supports: eight Ethernet ports
T2-050209-20060530-C-1.D1
2-17
2 System Structure
Table 2-6 Description of the broadband and narrowband combo line cards Short Name CSMB Full Name ADSL/ADSL2+ and POTS combo line card Function Description The CSMB card provides: 16 ADSL/ADSL2+ ports 16 POTS ports a built-in splitter CSLB ADSL and POTS combo line card The CSLB card provides: 16 ADSL/ADSL2+ ports 16 POTS ports a built-in splitter CSRB POTS and ADSL2+ combo line card The CSRB card provides: 32 ADSL/ADSL2+ ports 32 POTS ports a built-in splitter CSRI ADSL/ADSL2+ and POTS combo line card The CSRI card provides: 32 ADSL/ADSL2+ ports 32 POTS ports a built-in splitter
Table 2-7 Description of the other cards Short Name EDTB TSSB ESC Full Name E1 trunk card Test card Environment and power supply monitor card Function Description The EDTB card providets16 E1 trunk ports. The TSSB card is used to test the narrowband line cards. The ESC card monitors: temperature humidity door sensor fan status power supply status other analogue and digital parameters through different external sensors This card reports the above information to the control card through a serial port. PWX Secondary power supply card A master shelf can be equipped with two PWX cards. The PWX cards support inter-card and inter-shelf load-sharing.
2-18
T2-050209-20060530-C-1.D1
3 Service Implementation
3
About This Chapter
Section 3.1 VoIP Service 3.2 3.3 3.4 FoIP Service MoIP Service VLAN
Service Implementation
3.5 ARP and ARP Proxy 3.6 3.7 3.8 DHCP Relay Multicast QoS
T2-050209-20060530-C-1.D1
3-1
3 Service Implementation
3-2
T2-050209-20060530-C-1.D1
3 Service Implementation
Packetisation Delay 30 ms 30 ms
1: PCM: Pulse code modulation 2: CS-ACELP: Conjugate Structure Algebraic Code-Excited Linear Prediction 3: CELP: Code-Excited Linear Prediction 4: MP-MLQ: Multi-Pulse Maximum Likelihood Quantization
T2-050209-20060530-C-1.D1
3-3
3 Service Implementation
Table 3-2 lists the relationship between voice codec modes and bandwidth.
Table 3-2 Voice codecs and the required bandwidths Codec G.711 Rate 64 kbit/s 64 kbit/s 64 kbit/s 64 kbit/s G.729 8 kbit/s 8 kbit/s G.723.1 5.3 kbit/s 6.3 kbit/s Packetisation Delay 5 ms 10 ms 20 ms 30 ms 10 ms 20 ms 30 ms 30 ms Required Bandwidth 169.6 kbit/s 116.8 kbit/s 90.4 kbit/s 81.6 kbit/s 60.8 kbit/s 34.4 kbit/s 22.9 kbit/s 23.9 kbit/s
3-4
T2-050209-20060530-C-1.D1
3 Service Implementation
T2-050209-20060530-C-1.D1
3-5
3 Service Implementation
The DTMF digit collection is carried out by the Digital Signal Processing (DSP) of the UA5000. The DSP receives dialled DTMF digits, and then reports the digits to the service module. The service module matches the digits against the digit collection scheme delivered by the call server, and reports the matching result to the call server.
FSK Mode
Under the control of the MGC, the UA5000 sends special FSK signals to the telephone set on a specified timeslot of the voice circuit. After receiving the data, the telephone set lights up the message indicator.
3-6
T2-050209-20060530-C-1.D1
3 Service Implementation
AuC
(2) ServiceChange {MT=Restart X-IDgw , X-IDca} (4) Reply (7) Modify {SG: secu/ AuthS(rand), secu/ AuthS(Egw IKgw -ca), secu/ AuthS(EcaIKgw -ca)}
(3) Authentication (IDgw , IDca, IDcs) (6)Response (rand, AuthC, Egw IKgw -ca, EcaIKgw -ca)
(5) Reply (8) Modify {SG: secu/ AuthS(rand), secu/ AuthS(Egw IKgw -ca), secu/ AuthS(MAC)} (9) Reply (11) Notify {OE: secu/ AuthE(AuthC)} (14) Reply (17) Modify { SG: secu/ AuthS(pass)} (18) Reply
(10) Reply (12) Notify {OE: secu/ AuthE(AuthC)} (13) Reply (16) Modify { SG:secu/ AuthS(pass)} (15)Authentication (success)
(19) Reply
Figure 3-1 Authentication procedure based on the H.248 protocol Step 1 Access Gateway (GW) initiates the register process by sending a ServiceChange
message to the Call Agent (CA), with the identification of the gateway.
Step 2 The CA adds its identification of CA to the ServiceChange message, and sends
between the GW and CA; and then calculates an Authentication Code (AuthC) with the random number and the private key of the GW. Next, the authentication centre encrypts the integrity key with the private keys of the GW and CA respectively to get EgwIKgw-ca and EcaIKgw-ca and returns them to the CS.
Step 7 The CS saves the received Authentication Code (AuthC) and sends the random
EcaIKgw-ca. and calculates a message authentication code (MAC) with a random number and EcaIKgw-ca with the integrity key. And then the CS sends the random number, EcaIKgw-ca and MAC to the GW in a MODIFY message.
T2-050209-20060530-C-1.D1
3-7
3 Service Implementation
Step 9 The GW extracts the integrity key (IKgw-ca) with its private key from
EgwIKgw-ca and uses this key to test the integrity of the message from the CA. If the test is passed, the GW returns a reply to the CA. Otherwise, the GW returns an error code.
Step 10 The CA transfers the reply to the CS. Step 11 If the integrity test is passed, the GW calculates an Authentication Code with the
received random number and its private key and sends the Authentication Code to CA in a NOTIFY message.
Step 12 The CA transfers the NOTIFY to the CS. Step 13 The CS tests the Authentication Code received from CA to confirm if it is equal to
the one received from the Authentication Centre. If yes, the CS sends a reply to the CA; if not, the CS sends an error message.
Step 14 The CA sends a reply to the GW. Step 15 The CS sends a success message to the authentication centre if it gets the right
In the above process, the encryption algorithm and integrity algorithm can be predefined. The Huawei UA5000 supports signal tracing for H248 and IUA with the Toolbox running on the EMS. The recorded signals can be saved to a disk for analyzing. Packet capturing is also supported to detect any illegal calls or exceptional traffics.
Features
The standalone capability of the UA5000 has the following features: The standalone capability can be enabled or disabled through the software parameter of the MG interface. The dialling method is the same as that of a normal case.
3-8
T2-050209-20060530-C-1.D1
3 Service Implementation
No billing information is generated for the calls that occurred during the standalone period. After the communication with the call server resumes and the UA5000 registers with the call server, the ongoing calls will still be retained. The standalone capability applies to only the serving MG interface. In the standalone status, the customers of the UA5000 can call the PSTN customers through the CDI card. See "3.1.8 DDI and Escape Channel" for details.
IP PSTN UA5000
PBX Enterprise 1
UA5000
Enterprise 2
DDI (Enterprise 1)
The UA5000 connects the PBX of Enterprise 1 through the FXO interface to provide the DDI function for the PBX customers. With this function, you can directly call a customer of the PBX by dialling the access code of the enterprise and the extension number of the PBX customer.
T2-050209-20060530-C-1.D1
3-9
3 Service Implementation
Implementation Procedure
The UA5000 supports dual homing through the H.248 protocol. Dual homing is carried out by the heartbeat detection and switchover process of the call server. Figure 3-3 shows the implementation procedure.
UA5000 (1) Notify (it/ito) Heatbeat lost (2) ServiceChange (Method=Failover, Reason=909) (3) Reply Registration on CS 2 Succeeds Registration on CS 2 Fails (4) ServiceChange (Method=Disconnected, Reason=909) (5) Reply CS 1 CS 2
interval T to which there is no response. This implies that the primary call server (CS 1) is faulty.
Step 2 The UA5000 sends a registration request message ServiceChange (Method =
Failover, Reason = 909) to the first standby call server (CS 2) in the standby call server list.
3-10
T2-050209-20060530-C-1.D1
3 Service Implementation
Step 3 If the UA5000 receives a response Reply from CS 2, it implies that the
consecutive ServiceChange messages, registration on CS 2 fails and the UA5000 sends a new ServiceChange (Method = Disconnected, Reason = 909) message to CS 1 after a random delay.
Step 5 If the UA5000 receives a response Reply from CS 1, the communication between
the UA5000 and CS 1 recovers. The process is complete. If the UA5000 does not receive a response to N consecutive ServiceChanges requests sent to CS 1, registration on CS 1 fails and the UA5000 proceeds with Step 2.
Implementation
The implementation of hairpin connection is as follows:
Step 1 When the MGC finds that the caller and the called are under the same UA5000,
the MGC places the Termination IDs (TID) of the caller and the called into the same context.
Step 2 When the UA5000 finds that there are two physical terminations in the context,
the UA5000 uses the TDM fabric, instead of using the DSP resource, to set up the connection.
T2-050209-20060530-C-1.D1
3-11
3 Service Implementation
3.1.12 VAG
Virtual Access Gateway (VAG) is a feature that enables a physical AG to support multiple VAGs. The physical AG supports multiple IP interfaces, and assigns the IP interfaces for dedicated use to realise the VAG feature. VAG increases the equipment's utilization efficiency. It helps the carrier to lease its AG to multiple carriers with convenient management and settlement means. As an AG, the UA5000 supports the VAG feature. A UA5000 supports up to eight VAGs. The eight VAGs can have their own dedicated IP addresses. In this case, they function as eight independent VAGs. The VAGs can also be configured with a common IP address but different port numbers so as to facilitate the precise measurement of a given region.
3-12
T2-050209-20060530-C-1.D1
3 Service Implementation
VBD Fax
Figure 3-4 shows the implementation of the VBD fax service.
Call serv er
PSTN
IP backbone network
TMG8010
Data Data Encapsulation of T.30 f ax packet TDM Encapsulation of T.30 f ax packet G.711 UDP/IP
FAX
UA5000
IAD / UA5000
FAX
The VBD fax is also called fax over G.711. In this mode, the UA5000 encodes the voice signals through the G.711 coding mode. The gateway switches to the Fax channel after it detects the fax tone, and configures the settings of EC, NLP and jitter according to the fax type. The gateway then transmits the Fax packets transparently. The T.30 packets are processed on the fax machines.
T2-050209-20060530-C-1.D1
3-13
3 Service Implementation
T.38 Fax
Figure 3-5 shows the implementation of the T.38 fax service.
Redundant message n ... Redundant message 2 Redundant message 1 Primary message Sequence No. IP backbone network TMG8010 Call serv er
PSTN
FAX
UA5000
IAD/UA5000
FAX
The T.38 fax is also called fax relay. In this mode, the gateway (the UA5000 or the IAD) terminates the T.30 fax packet, extracts the fax data, encapsulates the fax data into T.38 packets and then sends the packets to the peer gateway. The peer gateway extracts the fax data from the T.38 packet, encapsulates the fax data into T.30 fax packets and then sends the packets to the fax machine. T.38 is an IP based protocol, which takes account of packet loss, delay and jitter that may occur in an IP network. The T.38 fax uses the data redundancy mechanism to address the packet loss. In a T.38 fax packet, fax messages sent in the previous N packets (the value of N can be up to 4) are also contained for redundant backup. With this approach, fax messages are intact when you receive one T.38 fax packet, even if the previous N packets are lost. The T.38 fax is not so dependent on the quality of the IP network. But the VBD mode is preferred in a good-quality IP network because the relay mode of the T.38 fax concerns the compatibility of the fax machines.
3-14
T2-050209-20060530-C-1.D1
3 Service Implementation
Modem traffic
UA5000
modem
PC
There are two MoIP implementation modes: VBD mode Relay mode The UA5000 supports only the VBD mode. In VBD mode, the modem signal is transmitted over the IP network through voice channels using G.711 coding. This mode requires an IP bearer network in a good condition to ensure the service quality. The relay mode uses redundant messages to protect against loss of packets during the transmission. This mode can ensure normal running of services when the IP bearer network is not in good condition.
T2-050209-20060530-C-1.D1
3-15
3 Service Implementation
3.4 VLAN
3.4.1 Overview
Introduction to VLAN
Virtual Local Area Network (VLAN) is a division of a local area network by software rather than by physical arrangement of cables. VLAN makes it possible to divide a physical LAN into different broadcast domains logically. IEEE 802.1Q specifies the VLAN implementation scheme.
Port Types
In the description of the VLAN features, the following ports may be involved: Standard port A standard port is also called an uplink port. It refers to a physical port of the control card, namely, an FE or GE port of the IPMB card. Service virtual port A service virtual port is also called an access virtual port. It refers to a service connection of a user-side physical port such as an xDSL or an Ethernet port. For example, for an ADSL/SHDSL port, two PVCs correspond to two service virtual ports. For an Ethernet port, two VLANs correspond to two service virtual ports.
VLAN Features
The UA5000 supports the following VLAN features: Common QinQ Stacking
3-16
T2-050209-20060530-C-1.D1
3 Service Implementation
The VLAN with the common feature enabled can act as a normal layer 2 VLAN or a layer 3 virtual interface. The QinQ and Stacking features are detailed in "3.4.7 QinQ" and "3.4.8 Stacking".
When to Use
The standard VLAN is used to limit the broadcast domains of the standard ports. On the UA5000, the standard VLAN contains only the standard ports (namely, FE or GE ports of the IPMB card), but not the service virtual ports (such as the ADSL and SHDSL ports).
When to Use
The MUX VLAN is used to isolate and identify the access users. One MUX VLAN corresponds to one access connection. The equipment at the upper layer identifies different access users by VLAN ID.
T2-050209-20060530-C-1.D1
3-17
3 Service Implementation
When to Use
The Smart VLAN is used to partition user groups, and each user group is associated with one Smart VLAN. The Smart VLAN also isolates the access users in one VLAN to ensure the privacy of the users and the security of the network. The Smart VLAN helps to provide the access service where multiple users are connected through one VLAN. When the VLAN number on the UA5000 is limited, you can use the Smart VLAN to access more users. The Smart VLAN is often used for the community access service.
When to Use
The Super VLAN can be used to implement the VLAN aggregation for efficient IP address allocation. Another usage of the Super VLAN is to work together with the ARP Proxy to enable the communication between different Sub VLANs. Refer to "3.5 ARP and ARP Proxy" for further details.
3-18
T2-050209-20060530-C-1.D1
3 Service Implementation
VLAN Aggregation
VLAN aggregation is a mechanism that enables the hosts residing in the same physical switched equipment, but different virtual broadcast domains, to be in the same IPv4 subnet and share one default gateway. The UA5000 implements the VLAN aggregation function through the Super VLAN. A Super VLAN uses multiple Sub VLANs to separate the layer 2 broadcast domains. A Super VLAN corresponds with a virtual layer 3 interface. Hosts that are members of all the Sub VLANs share this layer 3 interface as their default gateway. With Super VLAN, you do not have to configure a subnet for each Sub VLAN. By this, the efficiency of IP address allocation is increased.
Note Generally, if you are to use a layer 3 interface, instead of Super VLAN, to enable the communication between different VLANs, you must configure a subnet for each VLAN. This will lead to waste of IP addresses, because: The subnet number, directed broadcast address, and default gateway all consume IP addresses. The IP addresses reserved for the consideration of the growth of hosts within one VLAN cannot be used by other VLANs.
T2-050209-20060530-C-1.D1
3-19
3 Service Implementation
3.4.7 QinQ
What is a QinQ
802.1Q in 802.1Q (QinQ) is a VLAN feature that allows the UA5000 to add a VLAN tag to a tagged frame. The implementation of QinQ is to add a public VLAN tag to a frame with a private VLAN tag, making the frame encapsulated with two layers of VLAN tags. The frame is forwarded over the service providers backbone network based on the public VLAN tag. By this, a layer 2 VPN tunnel is provided to customers. The QinQ feature enables the transmission of the private VLANs to the peer end transparently, and extends the geographic coverage of the private network. On the UA5000, the implementation of the QinQ feature is as follows:
3-20
T2-050209-20060530-C-1.D1
3 Service Implementation
After receiving a frame with a private VLAN tag from the customer side, the UA5000 assigns a public VLAN tag to the packet and sends it to the upper network. After receiving a frame with two layers of VLAN tags from the network side, the UA5000 removes the public VLAN tag to restore the original user frame and then sends the frame to the CPE.
When to Use
The QinQ feature is used to extend the coverage of a private network, or to save the VLAN resource of the public network. Figure 3-7 illustrates the use of the QinQ feature.
IP L2/L3
VLAN3 VLAN2 VLAN3 VLAN1
L2/L3
UA5000 Modem
VLAN2 VLAN1
UA5000 Modem
VLAN2
L2
L2 VLAN1
Customer 1
Customer 3
Customer 4
Customer 2
As shown in Figure 3-7, the UA5000 enables the communication between customers in VLAN 1 or VLAN 2 of the same private network spanning different geographic areas. The service implementation process is as follows:
Step 1 The PC sends an untagged frame. Step 2 The LAN switch adds a private VLAN tag (VLAN 1 or VLAN 2) to the frame,
VLAN tag.
Step 5 When the peer end UA5000 receives the frame, it removes the public VLAN tag
from the frame, and sends the frame to the downstream LAN switch.
T2-050209-20060530-C-1.D1
3-21
3 Service Implementation
Step 6 The LAN switch removes the private VLAN tag (VLAN 1 or VLAN 2) from the
frame, and sends the frame to the end users that are members of the VLAN (VLAN 1 or VLAN 2). By this, the communication between user 1 and user 2 of VLAN 1, and the communication between user 3 and user 4 of VLAN 2 are realized.
3.4.8 Stacking
What is a Stacking
Stacking is a VLAN feature that allows the UA5000 to add two 802.1Q VLAN tags to a frame, so that the frame can be transported over the backbone network of the service provider. When the frame reaches the BRAS, the BRAS authenticates the frame based on the two layers of VLAN tags, or remove the outer VLAN tag and identify the customer according to the inner VLAN tag. The implementation of the VLAN Stacking feature on the UA5000 is as follows: When the UA5000 receives an untagged frame from the CPE, it adds two layers of VLAN tags to the frame and then sends the frame to the upper layer network. When the UA5000 receives a frame with two layers of VLAN tags from the network side, it removes the VLAN tags and sends the frame to the CPE.
When to Use
The Stacking feature helps to increase the VLAN space and to provision the private circuit wholesale service. By adding two VLAN tags, the VLAN space is increased. Private circuit wholesale service: with the stacking feature, the outer VLAN tag identifies the serving Internet Service Provider (ISP) of a customer and the inner VLAN tag identifies a customer. By this, customers are connected to the respective ISPs in batches. To increase the VLAN space with the Stacking feature, the associated BRAS must support the authentication of the two-layer VLAN tags. For the private circuit wholesale service, the upper network must operate at layer 2, and forward the packets based on the VLAN tag and MAC address. Figure 3-8 illustrates an application of the VLAN Stacking feature.
3-22
T2-050209-20060530-C-1.D1
3 Service Implementation
ISP1
ISP2
MAN
SP VLAN 1 C VLAN 1 SP VLAN 2 C VLAN 1
L2/L3
SP VLAN 1 C VLAN 2 SP VLAN 2 C VLAN 2
UA5000
Modem
Modem
Enterprise A
SP VLAN: Service Provider VLAN
Enterprise B
C VLAN: Customer VLAN
As shown in Figure 3-8, the UA5000 sends the shelves from hosts in enterprise A and enterprise B to ISP 1 and ISP 2 respectively. The service processing procedure is as follows:
Step 1 A host sends an untagged frame to the UA5000 through a modem. Step 2 The UA5000 adds two VLAN tags (SP VLAN and customer VLAN) to the frame.
Different SP VLAN tags correspond with different ISPs. The shelves from the hosts of enterprise A are encapsulated with SP VLAN1 as their outer VLAN, and with corresponding customer VLANs as their respective inner VLAN. The shelves from the hosts of enterprise B are encapsulated with SP VLAN2 as their outer VLAN, and with corresponding customer VLANs as their respective inner VLAN.
Step 3 The equipment in the switched metropolitan area network (MAN) forwards the
tag and identifies the customer type based on the customer VLAN tag.
T2-050209-20060530-C-1.D1
3-23
3 Service Implementation
Note For more details about the Super VLAN, refer to "3.4.5 Super VLAN"
Super VLAN
Virtual interface
xy ro PP AR
Layer 3
Layer 2
Sub VLAN 1
Isolation
3-24
T2-050209-20060530-C-1.D1
3 Service Implementation
AS shown in Figure 3-9, PC1 and PC2 are in VLAN1 and VLAN2 respectively. They are isolated at layer 2. PC1, PC2 and the virtual layer 3 interface are in the same subnet. The following process describes how the communication between PC1 and PC2 is enabled.
Step 1 Since PC1 and PC2 are in the same subnet, when PC1 attempts to send packets to
PC2, PC1 broadcasts ARP packets directly to request the MAC address of PC2. However, because PC1 and PC2 are in different broadcast domains, PC1 does not receive the ARP response packet from PC2.
Step 2 When the UA5000 that enables the ARP proxy receives the ARP request packets,
it sends the MAC address of its virtual layer 3 interface to PC1, and searches its ARP table to find the MAC address of PC2.
Step 3 If the ARP table contains the MAC address entry of PC2, the implementation of
the ARP proxy is complete, and the packets from PC1 can be forwarded to PC2 through the virtual layer 3 interface.
Step 4 If the ARP table does not contain the MAC address entry of PC2, the UA5000
broadcasts the ARP request packets through its virtual layer 3 interface to request the MAC address of PC2.
Step 5 When the UA5000 receives the ARP response packets from PC2, the UA5000
adds the MAC address of PC2 to its ARP table. By now, the implementation of the ARP proxy is complete, and PC1 and PC2 are interconnected through the UA5000.
T2-050209-20060530-C-1.D1
3-25
3 Service Implementation
DHCP REQUEST
DHCP REQUEST
Figure 3-10 Implementation of DHCP relay Step 1 The client broadcasts a DISCOVER message.
The destination IP address of the message is the broadcast IP address, source IP address is 0.0.0.0, destination MAC address is the broadcast MAC address, and source MAC address is the MAC address of the client.
Step 2 The UA5000 receives the DISCOVER message, and sends the message to the
DHCP server bound with the layer-3 interface. The UA5000 changes the destination IP address of the message to the IP address of the DHCP server, source IP address to the IP address of the layer-3 interface, and destination MAC address to the MAC address of the equipment at next hop.
3-26
T2-050209-20060530-C-1.D1
3 Service Implementation
Step 3 The DHCP server responds with an OFFER message to the UA5000 after it
receives the DISCOVER message. The UA5000 then forwards the OFFER message to the client according to the destination MAC address.
Step 4 The client broadcasts a REQUEST message after it receives the OFFER message. Step 5 The UA5000 forwards the REQUEST message to the DHCP server after it
configuration parameters for the requesting client. The UA5000 then forwards the ACK message to the client according to the MAC address.
Step 7 The client receives the ACK message to obtain the IP address and the leased time.
T2-050209-20060530-C-1.D1
3-27
3 Service Implementation
3.7 Multicast
Introduction
Multicast is a technology that enables the sending of data streams from one source to many destinations. The key function of the multicast technology is to carry out packet duplication as near as the receiver. The concept of multicast group is critical to the implementation of multicast. A multicast group is identified by a class D IP address (224.0.0.0 to 239.255.255.255). When the source host sends a packet with the destination address as the address of a multicast group, all members of the group will receive a copy of that packet. Compared with unicast, multicast helps in the following: Reduce load on the server because the server need not handle the request for each user. Save network bandwidth, which lowers the requirement on the network device.
IGMP Proxy
The UA5000 supports the Internet Group Management Protocol (IGMP) proxy function. With the IGMP proxy function, the UA5000 does not perform routing for multicast packets. The routing is carried out by the uplink multicast router. From the perspective of a multicast user, the UA5000 is a multicast router implementing the routers functions defined in the IGMP. The UA5000 receives the requests from its downlink users for joining or leaving a multicast group. The UA5000 also queries at a regular interval whether a downstream port has multicast group users. By doing so, the UA5000 obtains multicast group membership information on the downstream ports. On the other hand, from the perspective of a multicast router, the UA5000 is a multicast host which sends IGMP requests to the multicast router for joining or leaving a designated multicast group. The UA5000 forwards the multicast traffic from the uplink port to the downlink ports in a unidirectional manner based on its group membership information. It cannot forward multicast data to other uplink ports or forward multicast data received from the downlink ports. The uplink and the downlink ports may belong to different VLANs. That is, the UA5000 supports forwarding multicast data between different VLANs.
3-28
T2-050209-20060530-C-1.D1
3 Service Implementation
Managed Multicast
The UA5000 supports the managed multicast function. The managed multicast means that the multicast message is under control. It is used to implement the multicast user management, services management and accounting. The managed multicast involves: Multicast authentication and accounting Multicast monitor and analysis Multicast QoS Multicast encryption Multicast address allocation With multicast authentication, the UA5000 authenticates a user who intends to join a multicast group, and decides whether to allow the user to join the multicast group based on the authentication result. With multicast accounting, the UA5000 starts accounting on the multicast user who has passed the authentication. The accounting can be implemented based on the multicast group, traffic volume of a multicast group, duration for staying in a multicast group. The UA5000 periodically sends queries to the multicast members so as to decide whether to continue accounting on a user: When the UA5000 receives a membership report from a user, it continues the accounting on the user. When the UA5000 does not receive any response from a user, it disconnects the user from the multicast group and stops accounting on the user. When the UA5000 receives a leave message from a user, it also disconnects the user from the multicast group and stops accounting on the user.
apply to join the multicast group that offers the video program.
Step 2 After receiving the requests, the UA5000 authenticates the user.
If the user has the right to watch or preview the program, the UA5000 adds it to the corresponding multicast group. Otherwise, the UA5000 rejects the requests from the user.
Step 3 The UA5000 sends the general quest message to all online IGMP users
periodically. If the UA5000 does not receive response from an IGMP user for a period of time,
T2-050209-20060530-C-1.D1 Huawei Technologies Proprietary 3-29
3 Service Implementation
it considers that the user has left the multicast group, and deletes it from the group.
Step 4 When an IGMP user leaves a multicast group, it sends leave messages to the
UA5000. If the user is configured with quick-leave attribute, the UA5000 deletes it from the multicast group immediately. If the user is not configured with that attribute, the UA5000 sends the specific query message to the multicast group. If the UA5000 does not receive responses from the user for a period of time, it deletes the user from the multicast group.
Step 5 Apart from handling the IGMP messages as listed above, the UA5000 also
receives general query messages from the IGMP routers at upper layer, and responds to them accordingly to report the current multicast state.
3-30
T2-050209-20060530-C-1.D1
3 Service Implementation
3.8 QoS
Introduction to QoS
QoS refers to providing different services with different qualities depending on the service requirements. QoS is required to support the delay and jitter sensitive services. The QoS features of the UA5000 are as follows: Preference tagging Traffic policing Port rate limiting Queue scheduling Traffic mirroring RTCP detecting
Related concept
An important concept relating to QoS is flow classification. Flow classification is intended to identify appropriate packets by certain rules. The rules may be quite simple. For example the flows are classified according to ToS field in an IP header. The rules may also be complicated. For example, the flows are classified according to combination of MAC address, IP protocol type, source address, destination address and port number.
3 Service Implementation
different types of packets, such as signalling, media flow and maintenance packets. The definition of the ToS field is shown in Figure 3-11. Where, Precedence: 3 bits. It contains the setting of the IP precedence. Delay (D): 1 bit. Throughput (T): 1 bit. Reliability (R): 1 bit. Cost (C): 1 bit.
0 1 2 3 4 T 5 R 6 C 7 Not used Precedence D
bit 0 Version
4 IHL
8 ToS
16 Total Length
31
DSCP Precedence
DSCP precedence is defined by the Differentiated Services (DS) field of the IP header. The DS field uses the IPv4 ToS octet. Currently, only the six most significant bits of the ToS octet is used and the other two bits are reserved. Figure 3-12 shows the DS field of the IP header.
0 1 2 3 4 5 6 7 Not used DSCP
bit 0 Version
4 IHL
8 DS
16 Total Length
31
The UA5000 can configure the DSCP precedence for the specified packets. The DSCP-based flow classification is also called the differentiated services.
802.1p Precedence
The tag field of the 802.1Q frame includes the following contents: Tag protocol identity (TPID): 16 bits. For the Ethernet, the TPID is 0x8100 Priority: 3 bits, indicating the frame precedence (07) Canonical Format Indicator (CFI): 1 bit, used to indicate the frame format VLAN ID: 12 bits, indicating the VLAN uniquely
3-32
T2-050209-20060530-C-1.D1
3 Service Implementation
DA
SA
Tag
Type
Data
CRC
VLAN ID
The UA5000 supports the setting of the priority field. As an integrated AG, the UA5000 differentiates the voice service from data service, and tags voice traffics with VLANs of a higher priority to ensure the forwarding of the traffics with preference.
T2-050209-20060530-C-1.D1
3-33
3 Service Implementation
PQ Algorithm
Figure 3-14 shows the PQ algorithm.
Queuing high Packets leaving the port medium Classifying Packets entering the port normal Queuing scheduling low
PQ aims at giving a strict priority to important traffic. The important traffic is given absolute preference over low-priority queues. In PQ, each packet is placed in one of the four queues: high, medium, normal or low, which are indicated by 3, 2, 1 and 0 in the order. With PQ, traffics are sent based on their priorities. The data that are placed in the queue with lower priority will not be sent until the queues with higher priority are empty. Therefore, placing traffic of mission-critical applications into the queue with a higher priority can ensure that the traffic is serviced earlier than the less important traffic. A disadvantage of PQ is that the lower priority traffic may be underserved for a long time during network congestion.
WRR Algorithm
By WRR algorithm, the traffic on a port is divided into four or eight output queues. Each queue takes its turn in queue scheduling, so that all queues can be served for some time. Each queue is assigned with a weighted value among w3, w2, w1 and w0. Take a 100 Mbit/s port for instance. Assign the weighted value of its WRR algorithm to 50, 30, 10, and 10 (corresponding to w3, w2, w1 and w0 in turn). This aims at guaranteeing the minimum bandwidth of 10 Mbit/s to the lowest PQ. In this way, the packets in the lower PQ can be served. The advantages of WRR algorithm are as follows: The long-time underserved circumstance that may occur using PQ algorithm is avoided. Time allocated to each WRR queue is not fixed. When no traffic is available in one queue, the bandwidth resource is switched to the next queue immediately. Therefore, the bandwidth resource is efficiently used.
3-34
T2-050209-20060530-C-1.D1
3 Service Implementation
WFQ Algorithm
WFQ algorithm specifies the maximum bandwidth and the minimum bandwidth for each queue to prevent a queue from being underserved for a long time. The major features of WFQ algorithm are as follows: Specifies the maximum bandwidth and the minimum bandwidth for each queue. Services the queues round-robin to allocate the minimum bandwidth for each queue. Services the queues round-robin to allocate the remaining bandwidth to each queue till the maximum bandwidth for the queue is reached. Prevents the low-priority queues from being underserved.
T2-050209-20060530-C-1.D1
3-35
3 Service Implementation
Passive test and active test The reported information at the termination of a call includes: Packet loss rate Time delay Jitter Number of packets received Number of packets sent
Passive Test
The passive test does not intrude actual services of the network, only monitors the services. It obtains the monitor data by analyzing traffic flows. The passive test process is as follows:
Step 1 The EMS sends the statistics test tasks to two MGs. Step 2 The MGs collect the related statistics, and report them to the EMS.
The statistics include the number of sent packets, number of received packets, maximum time delay, maximum jitter and average packet loss ratio.
Step 3 After receiving the above statistics, the EMS draws related curves.
Active Test
The active test intrudes into the network. In the active test, the test traffic flow comes into the network and is analysed to obtain the test data. The active test procedure is as follows:
Step 1 The EMS sends the test command. Step 2 The call server initiates a call to set up a connection between two MGs. Step 3 The MGs send the test voice samples to each other through the connected channel. Step 4 After the MGs receive the tested traffic flow, they extract parameters from the
RTP flow, such as time delay, packet loss ratio, and jitter. The MGs then report these parameters to the call server.
Step 5 The call server summarizes the data and reports the data to the EMS. Step 6 The EMS draws the flow/network quality curves.
3-36
T2-050209-20060530-C-1.D1
3 Service Implementation
T2-050209-20060530-C-1.D1
3-37
3 Service Implementation
RSTP
Rapid Spanning Tree Protocol (RSTP) supported by the UA5000 is an enhanced version of STP. Here, rapid means the time delay is greatly reduced for the root port or the specified port to enter the forwarding status when the network device or the link changes.
3-38
T2-050209-20060530-C-1.D1
3 Service Implementation
Static Route
A static route is a special kind of route that is configured manually by the administrator. By configuring a static route, an interworking network will be created. However, when a network fault occurs, the static route cannot change automatically, and the administrator has to reconfigure it.
RIP
Routing Information Protocol (RIP) is a kind of protocol based on the V-D algorithm. It exchanges routing information through the UDP datagram, and sends the routing updates every 30 seconds. If the router does not receive an update from the opposite end within 180 seconds, all updates from this router will be labelled unreachable. Moreover, the updates will be deleted if this router still does not receive any update within another 120 seconds. RIP uses Hop Count to measure the distance to the sink machine, which is called Routing Metric. With RIP, the hop count from the equipment to the network connected directly with it is 0 (defined as 1 in some protocol), the distance from the equipment to a network reachable is 1 hop, and the rest may be deduced by analogy. To restrict the convergence time, the Metric is defined as an integral number in the range of 015 in RIP. The hop count will be taken as infinite if it is greater than or equal to 16. To avoid route loopback and enhance the performance, RIP supports the split-horizon algorithm. The trigger update is adopted for the change of the routing information. Moreover, this protocol allows the redistribution of routes obtained by other routing protocols. The UA5000 supports two RIP versions (RIP I and RIP II) at the same time. RIP II allows authentication in both clear text and MD5 cipher text and the length-variable subnet mask.
OSPF
In the IP network, Open Shortest Path First (OSPF) can dynamically detect and transmit routes by collecting and transmitting the link state of the autonomous system. At present, the second version of OSPF is used. It has the following characteristics: Wide application range
T2-050209-20060530-C-1.D1
3-39
3 Service Implementation
OSPF supports networks of various scales, with a maximum of several hundreds of routers supported. Fast convergence If the topology of the network changes, OSPF can transmit update packets immediately so that the change can be synchronized with the autonomous system. No self-loop OSPF calculates routes based on the algorithm of shortest path tree first through the collected link state. Therefore, the algorithm itself can ensure that no self-loop route is generated. Subnet mask OSPF carries the mask information about the network section in the description of the route. Therefore, the OSPF protocol gets free from the restriction of the natural mask and provides sound support for Variable-Length Subnet Mask (VLSM). Area division OSPF allows the network of the autonomous system to be divided into various areas for management. In this way, the inter-area transmitted routing information is further abstracted, thus reducing the occupied network bandwidth. Equivalent route OSPF supports multiple equivalent routes to the same destination. Route hierarchy OSPF uses four types of routes. Based on the sequence of preferences, these routes are: intra-area route, inter-area route, the first category of external route and the second category of external route respectively. Support for authentication It supports the interface-based packet authentication to ensure the security of the route calculation. Multicast transmission OSPF can transmit protocol packets by the multicast address at the link layer capable of multicast transmission. In this way, the broadcast function is realized and the interference to other network equipment is reduced to the minimum degree.
3-40
T2-050209-20060530-C-1.D1
4
About This Chapter
Section 4.1 4.2 4.3 Triple Play
T2-050209-20060530-C-1.D1
4-1
IP MAN
L2/ L3 FE/GE
UA5000
ISDN BRI
E1
PBX NT1
SHDSL
ADSL
ISDN PRA
4-2
T2-050209-20060530-C-1.D1
UA5000 TDM SHDSL Modem V.35 TDM SHDSL Modem E1 TDM SHDSL Modem E1
UA5000 FE FE
DDN node
DTE
Company branch 1
Company branch 2
T2-050209-20060530-C-1.D1
4-3
IP MAN
L2/L3
UA5000
Triple Play
IP TV video service
4-4
T2-050209-20060530-C-1.D1
5 Equipment Management
5
About This Chapter
Section 5.1 5.2 Management Through EMS
Equipment Management
T2-050209-20060530-C-1.D1
5-1
5 Equipment Management
COM ETH
UA5000
5-2
T2-050209-20060530-C-1.D1
5 Equipment Management
T2-050209-20060530-C-1.D1
5-3
5 Equipment Management
Backup and uploading of NE data Database management Environment and power supply monitoring Configuration management
Topology Management
The N2000 can display the network elements (NE) in the whole network in one topology view. Through a unified management platform, it can monitor and manage all NEs in the network. This significantly eases network maintenance.
Fault Management
The N2000 offers an overall network alarm management solution, enabling fast fault locating and trouble shooting. In addition, to simplify the trouble shooting, the N2000 supports window switching. For example, it allows shift from the topological window to the alarm window, or shift from the alarm window to the faulty port.
Security Management
The N2000 manages the network based on different user authorities and different domains. It can divide users authorities based on users, user groups, operations, applications or ACLs. It can enable automatic lock, forced disconnection and user operation logging on the clients.
Database Management
The N2000 provides a tool to carry out the backup and recovery of the EMS database. This enhances security of the system data.
5-4
T2-050209-20060530-C-1.D1
5 Equipment Management
The N2000 also provides a monitoring terminal to monitor the running status of the EMS server and the usage of the EMS database. In addition, the N2000 supports the remote dual system backup scheme to ensure the database safety.
Configuration Management
The EMS provides multiple configuration functions for the UA5000. Refer to Table 5-1 for details.
Table 5-1 Configuration functions of UA5000 NE Manager Function Feature Device management Description The NE manager manages the hardware of the device, including shelves, cards and ports. Through the NE manager, you can display the panel, maintain the system, cards and ports, as well as measure the physical resources. ADSL/ADSL2+ management The NE manager enables you to: Query, configure and maintain the ADSL or the ADSL2+ port information and statuses Manage the profiles of the ADSL or the ADSL2+ port Monitor and measure the port traffic ADSL/ATM SHDSL terminal management The NE manager enables you to: Configure the IP address of a terminal Configure the terminal profile Query the detailed information about a terminal Ping a terminal Restart a terminal SHDSL management The NE manager enables you to: Query, configure and maintain SHDSL port information and statuses Manage SHDSL port profiles
T2-050209-20060530-C-1.D1
5-5
5 Equipment Management
Description The NE manager enables you to: Add the MUX VLAN, Smart VLAN, and Standard VLAN Configure auxiliary ports and service virtual ports Query VLAN information
Ethernet management
The NE manager enables you to: Configure, activate and query Ethernet ports Add, configure, activate and query aggregated Ethernet ports
The NE manager enables you to: Add service ports for ATM ports, ADSL ports, G.SHDSL ports, and VDSL ports. Configure service port attributes, including physical ports and the maximum number of MAC addresses.
The NE manager enables you to configure and query global parameters, users, upstream ports, and programs of the IGMP Proxy. You can also manage and provision the managed video services.
Inband Networking
Inband networking means that the management is carried out using the service transmission channel of the UA5000. In this fashion, the EMS messages are transmitted through the service channel.
5-6
T2-050209-20060530-C-1.D1
5 Equipment Management
EMS server
ATM/IP
UA5000
UA5000
Features of the inband networking are as follows: Advantage: The networking is flexible, and does not require additional devices. It saves cost. Disadvantage: When the service channel is interrupted, network management cannot be carried out.
Outband Networking
Outband networking means that the management is carried out using a channel separated from the service channel. Figure 5-3 shows the outband EMS networking.
T2-050209-20060530-C-1.D1
5-7
5 Equipment Management
Management side Service side
IP
Features of the outband networking are as follows: Advantage: The EMS channel is more reliable than that of the inband EMS. When the service channel is interrupted, you can still manage the UA5000 through the outband EMS. Disadvantage: Additional devices are required to set up an EMS channel separated from the service channel.
5-8
T2-050209-20060530-C-1.D1
6 Technical Specifications
6
About This Chapter
Section 6.1 Equipment Parameters 6.2 Performance and Capacity Specifications 6.3 Port Specifications
Technical Specifications
T2-050209-20060530-C-1.D1
6-1
6 Technical Specifications
Table 6-2 Dimensions of the UA5000 shelves Shelf HABA HABD HABF HABL Dimensions (W x D x H, in mm) 482 445 711 482.6 370.0 441.7 482.6 370.0 441.7 310 370 444
Weight
Table 6-3 Weight of the UA5000 cabinet Cabinet ONU-F01D200 ONU-F01D500 ONU-F01D1000 ONU-F02A ONU-F02AF Weight (in kg) 350 (With two groups of battery :100 kg) 558 (With two groups of battery: 208 kg) 850 (With two groups of battery: 200 kg) 250 280
6-2
T2-050209-20060530-C-1.D1
6 Technical Specifications
Running Environment
Table 6-4 The running environment of the UA5000 Cabinet ONU-F01D200 ONU-F01D500 ONU-F01D1000 ONU-F02A ONU-F02AF Temperature (oC) 45 to +50 45 to +50 45 to +50 5 to +45 5 to +45 Humidity 5% to 95% 5% to 95% 5% to 95% 10% to 90% 10% to 90%
T2-050209-20060530-C-1.D1
6-3
6 Technical Specifications
Item Call processing capacity VoIP DSP channel number Call processing capacity Broadband Forwarding capacity Maximum number of GE ports Maximum number of FE ports VLAN number MAC address number Multicast group number Typical forward delay Clock Clock stratum
Index 15 CAPS
1024 15 CAPS
Wire speed forwarding 2 The IPMB card provides 6 FE ports and each EAUA provide 8. 4000 16 k (16 1024). Among them, there are 256 static MAC addresses. 1024 40 s
Stratum 3
IPMB/PVMB/PVU8/PVU4 1 IPMB/PVMB/PVU8/PVU4 1
Table 6-8 Types and number of the network interfaces Interface Type FE electrical port Provided by PVMB IPMB Number per Card 1 8 (Among them, two ports are for internal use.)
6-4
T2-050209-20060530-C-1.D1
6 Technical Specifications
Note The GE ports supported by the IPMB card includes 1000Base-Sx, 1000Base-Lx and 1000Base-Zx
Table 6-9 Types and number of the customer interfaces Interface Type POTS Provided by ASL CSMB A32 (CC0HASL/CC0RASL/CC0NASL) CSRB/CSRI ISDN BRI ISDN PRI E1 V.24 2-wire VF 4-wire VF FXO ADSL ADSL2+ DSL EDTB EDTB MTA connecting to the DSL card VFB VFB CDI CSLB/ADLB CSRB/CSRI ADMB/ADMC/CSMB VDSL TDM SHDSL VDLA SDLE SDL (Full name: H521SDL) 16 16 16 3 per MTA, namely per DSL port. 16 8 16 16 32 16 16 8 4 32 Number per Card 16
T2-050209-20060530-C-1.D1
6-5
6 Technical Specifications
6-6
T2-050209-20060530-C-1.D1
6 Technical Specifications
ITU-T G.707 (SDH-frame) ITU-T G.958 (Automatic Laser Shutdown) ITU-T G.783 (RSOH+MSOH handling) ITU-T I.432.1
100Base-Tx
Table 6-11 Technical specifications of the 100Base-Tx port Parameter Transmission rate Interface type Transmission distance Interface mode Cable type Specification 10 Mbit/s and 100 Mbit/s compatible RJ-45 (TPI) 100 m UTP/STP Category-5 twisted pair
T2-050209-20060530-C-1.D1
6-7
6 Technical Specifications
Specification 11651285 mV 9501050 mV Less than 0.5 ns Less than 0.5 ns 230 MHz 3060 MHz 6080 MHz >16 dB >1620log(f/30) dB (f-frequency, in MHz) >10 dB
The input end can sustain the sine common mode interference of 0125 MHz, 1.0 Vpp IEEE 802.3u
100Base-Fx
Table 6-12 Technical specifications of the 100Base-Fx port Parameter Transmission rate Interface type Interface mode Transmission distance (km) Central wavelength (nm) Mean transmit power (dBm) Extinction ratio (dB) Receiver sensitivity (dBm) Receiver overload power (dBm) Standard compliant with Specification 100 Mbit/s LC Multi-mode 2 1310 19 to 14 10 < 30 14 IEEE 802.3u Single mode 15 1310 15 to 8 8.2 < 31 8 Single mode 40 1310 5 to 0 8.2 < 36 8
6-8
T2-050209-20060530-C-1.D1
6 Technical Specifications
1000Base-Sx
Table 6-13 Technical specifications of the 1000Base-Sx port Parameter Transmission rate Interface type Interface mode Transmission distance (m) Average transmit power (dBm) Central wavelength (nm) Extinction ratio (dB) Receiver sensitivity (dBm) Receiver overload power (dBm) Standard compliant with Specification 1000 Mbit/s LC Multi-mode 500 9.5 to 4 850 9 < 17 0 IEEE 802.3z
1000Base-Lx
Table 6-14 Technical specifications of the 1000Base-Lx port Parameter Transmission rate Interface type Interface mode Transmission distance (km) Central wavelength (nm) Average transmit power (dBm) Extinction ratio (dB) Receiver sensitivity (dBm) Receiver overload power (dBm) Standard compliant with Specification 1000 Mbit/s LC Single mode 10 1310 11 to 3 8.2 < 19 3 IEEE 802.3z
T2-050209-20060530-C-1.D1
6-9
6 Technical Specifications
1000Base-Zx
Table 6-15 Technical specifications of the 1000Base-Zx port Parameter Transmission rate Interface type Interface mode Transmission distance (km) Wavelength (nm) Average transmit power (dBm) Extinction ratio (dB) Receiver sensitivity (dBm) Receiver overload power (dBm) Standard compliant with Specification 1000 Mbit/s LC Single mode 40 1550 5 to 0 9.0 < 21 3 IEEE 802.3z 80 1550 3 to +2 9.0 < 23 3
6.3.2 E3
Table 6-16 Technical specifications of the E3 electrical port Parameter Transmission rate Line codec Line jitter Maximum transmission distance Input/Output impedance Standard compliant with Specification 34.368Mbit/s HDB3 Complies with ITU-T G.823, G.824 and ETSI-TBR-24 1200 feet / 366 m 75 ohm ITU-T G.703 ITU-T G.704 ITU-T G.823
6-10
T2-050209-20060530-C-1.D1
6 Technical Specifications
6.3.3 T3
Table 6-17 Technical specifications of the T3 electrical port Parameter Transmission rate Line codec Line jitter Maximum transmission distance Input/Output impedance Standard compliant with Specification 44.736Mbit/s B3ZS Complies with ITU-T G.823 and ITU-TG.824 1100 feet / 335m 75 ohm The frame structure complies with ITU-T G.704.
ADSL
Table 6-18 Technical specifications of the ADSL port Parameter Upstream Bandwidth Maximum transmission rate Downstream Bandwidth Maximum transmission rate Maximum transmission distance Line code Standard compliant with Specification 26138 kHz 896 kbit/s 1381.104 MHz 8160 kbit/s 5 km DMT ITU-T G.992 (G.dmt), ITU-T G.992.2 (G.lite), ANSI T1.413
ADSL2+
Table 6-19 Technical specifications of the ADSL2+ port Parameter Upstream Bandwidth Maximum transmission rate Specification 26138 kHz 1.2 Mbit/s
T2-050209-20060530-C-1.D1
6-11
6 Technical Specifications
Parameter Downstream Bandwidth Maximum transmission rate Maximum transmission distance Line code Standard compliant with
SHDSL
Table 6-20 Technical specifications of the SHDSL port Parameter Specification Over One Twisted Pair Transmission rate Rate adjustment step Transmission distance Line code Frame protocol Transmission mode Standard compliant with 1922312kbit/s 64 kbit/s 36 km TC-PAM E1, PCM, ATM and ISDN G.991.2 Annex A and G.991.2 Annex B ITU-T G.991.2 Over Two Twisted Pairs 3844608 kbit/s 128 kbit/s
VDSL
Table 6-21 Technical specifications of the VDSL port Parameter Upstream Bandwidth Maximum transmission rate Downstream Bandwidth Maximum transmission rate Specification 4.57.9 MHz 12.5 Mbit/s 0.93.3 MHz 12.5 Mbit/s
6-12
T2-050209-20060530-C-1.D1
6 Technical Specifications
Parameter Maximum transmission distance Line code 0.5mm wire 0.4mm wire
E1
Table 6-22 Technical specifications of the E1 port Parameter Transmission rate Bit rate tolerance Line code Standard impedance Transmission distance Nominal pulse width Port protection capability Standards compliant with Specification 2048 kbit/s 50 ppm HDB3 75 ohm 1000 m 244 ns Comply with ITU-T K.20 Physical layer complies with ITU-T G.703, and frame structure complies with ITU-T G.704.
V.35
Table 6-23 Technical specifications of the V.35 port Parameter Mechanical characteristic Electric characteristic Interface function Maximum data transmission rate Transmission rate in practice Transmission distance Clock and data signals Control signal Specification 34-pin connector Balanced interface circuit Unbalanced interface circuit Data, control, clock and earthing 10 Mbit/s N 64 kbit/s (N = 132) 15 m
T2-050209-20060530-C-1.D1
6-13
6 Technical Specifications
6-14
T2-050209-20060530-C-1.D1
6 Technical Specifications
VLAN
T2-050209-20060530-C-1.D1
6-15
6 Technical Specifications
Category
Specification Multicast source control Customer authority management, including preview, authorized and unauthorized Supporting call detail recording (CDR)
STB authentication Layer 3 feature Layer 3 routing and forwarding Routing protocol User protocol conversion QoS PVC to VLAN PPPoA to PPPoE IPoA to IPoE Flow classification
Supporting DHCP Option82 None Static routing and dynamic routing protocols (including RIP v2 and OSPF) None None None Supporting the flow classification based on the following parameters: Source and destination MAC addresses Source/destination IP address Source/destination port number Protocol type
None None CAR based on the customer PVC CAR based on VLAN Separate CAR for upstream and the downstream traffics The granularity is 64 kbit/s. The minimum is 64 kbit/s and the maximum is 128 Mbit/s.
Queue scheduling
Eight queue priorities Supporting the PQ scheduling Supporting the WRR scheduling Supporting the WFQ scheduling
Security
Layer 2 PVC/VLAN isolation Supporting the binding of "IP + MAC + customer PVC". Each customer PVC can be bound with up to eight "IP + MAC".
6-16
T2-050209-20060530-C-1.D1
6 Technical Specifications
Category
Feature MAC address number control MAC address entry query Multicast group control Broadcast suppression
Specification The MAC address number for each customer is in the range of 1255. Locating the customer port quickly through the MAC address Restricting the number of the multicast groups that each customer can join Suppression of broadcast packets, unknown unicast packets and unknown multicast packets Supporting the suppression traffic adjustment by the traffic percentage
Security
DHCP Option82
During the STB authentication, the customer port information can be contained in the DHCP message and sent to the DHCP server/BRAS. During the PPPoE authentication, the user port information can be contained in the PPPoE message and sent to the BRAS. Enabling or disabling the function Enabling or disabling the interconnection of customers at one layer 3 interface
Others
Compliant with IEEE 802.1D and IEEE 802.1w Compliant with IEEE 802.3ad Supporting the FE port mirror
T2-050209-20060530-C-1.D1
6-17
6 Technical Specifications
Category
Specification None If the standalone is enabled, customers on a UA5000 can call each other when the connection between the UA5000 and the call server is interrupted. In a Hairpin connection the internal calls of a UA5000 are connected through the TDM fabric without consuming the DSP resource. None None None None None None The following technologies are provided: Voice activation detection (VAD) Comfortable noise generation (CNG) Jitter buffer dynamic adjustment Echo cancellation (compliant with ITU-T G.165/G.168) Packet loss compensation DTMF detection/generation Separate TX/RX gain control
Hairpin connection
12KC/16KC billing and the reversal polarity billing Waiting Message Indicator ISDN BRI/ISDN PRI QoS TOS/DSCP label 801.1Q 802.1p Voice quality technology
6-18
T2-050209-20060530-C-1.D1
6 Technical Specifications
Specification Objective voice assessment: When the network condition is good, the PSQM average is less than 1.5. When the network condition is normal, the PSQM is less than 1.8. (Given that the packet loss ratio is 1%, the jitter is 20 ms and the time delay is 100 ms.) When the network condition is poor, the PSQM is less than 2.0. (Given that the packet loss ratio is 5%, the jitter is 60 ms and the time delay is 400 ms.) Subjective voice assessment: When the network condition is good, the MOS is greater than 4.0. When the network condition is normal, the MOS is greater than 3.5. (Given that the packet loss ratio is 1%, the jitter is 20 ms and the time delay is 100 ms.) When the network condition is poor, the MOS is greater than 3.0. (Given that the packet loss ratio is 5%, the jitter is 60 ms and the time delay is 400 ms.)
Voice index
Delay index
Coding/decoding delay: Delay <= 25 ms when jitter = 2 ms. IP packet forward delay: Delay for forwarding packets with length less than 1516 bytes: <0.5ms. RTCP detection delay: 1 s Anti-jitter delay: 80 ms Equipment jitter delay: <10 ms
G.729: 8 kbit/s G.723: 5.3 kbit/s, 6.3 kbit/s Supports eight VAGs. The eight VAGs can share one common IP address, and each VAG can have independent IP addresses. Coding switchover delay: <60 ms
T2-050209-20060530-C-1.D1
6-19
6 Technical Specifications
Category
Specification In a favourable network: Call connection ratio>99% One-hour call holding capability>99%
Reliability
Call server dual homing Active/standby PVMB cards Load sharing of the DSP resource 1+1 backup for uplink ports
None The active/standby switchover will not interrupt services. The DSP resources in two PVMB cards use the load-sharing mode. The uplink ports of two PVMB cards operate in the 1+1 the active/standby mode. None None
Other protocols
SNTP RTCP
6-20
T2-050209-20060530-C-1.D1
6 Technical Specifications
IEEE standard for local and metropolitan area networks--Common specifications--Media access control (MAC) Bridges Traffic class expediting and dynamic multicast filtering IEEE standard for local and metropolitan area networks: Virtual Bridged Local Area Networks Local and metropolitan area networks---Common specifications Part 3: Media Access Control (MAC) Bridges---Amendment 2---Rapid Reconfiguration Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications Frame Extensions for Virtual Bridged Local Area Network (VLAN) Tagging on 802.3 Networks (Clause 43) Aggregation of Multiple Link Segments Definition of Fast Ethernet (100BTX, 100BT4, 100BFX) Definition of Full Duplex operation in a switched (LAN Flow control) Definition of Gigabit Ethernet (over Fibre) Digital network echo cancellers Digital hierarchy bit rates Physical/electrical characteristics of hierarchical digital interfaces Synchronous frame structures used at primary and secondary hierarchical levels Frame alignment and cyclic redundancy check (CRC) Procedures relating to basic frame structures defined in recommendation G.704
IEEE 802.3 IEEE 802.3ac IEEE 802.3ad IEEE 802.3u IEEE 802.3x IEEE 802.3z ITU-T G.168 ITU-T G.702 ITU-T G.703 ITU-T G.704 ITU-T G.706
T2-050209-20060530-C-1.D1
6-21
6 Technical Specifications
Standard ITU-T G.707 ITU-T G.711 ITU-T G.712 ITU-T G.723.1 ITU-T G.729 ITU-T G.781 ITU-T G.783 ITU-T G.785 ITU-T G.797 ITU-T G.803 ITU-T G.804 ITU-T G.812 ITU-T G.813 ITU-T G.821
Description G.707 Network Node Interface for the Synchronous Digital Hierarchy (SDH) Pulse code modulation (PCM) of voice frequencies Transmission performance characteristics of pulse code modulation channels Dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 kbit/s C source code and test vectors for implementation verification of the G.729 8 kbit/s CS-ACELP speech coder Synchronization layer functions Characteristics of synchronous digital hierarchy (SDH) equipment functional blocks Characteristics of a flexible multiplexer in a synchronous digital hierarchy environment Characteristics of a flexible multiplexer in a plesiochronous digital hierarchy environment Architecture of transport networks based on the synchronous digital hierarchy (SDH) ATM cell mapping into plesiochronous digital hierarchy (PDH) Timing requirements of slave clocks suitable for use as node clocks in synchronization networks Timing characteristics of SDH equipment slave clocks (SEC) Error performance of an international digital connection operating at a bit rate below the primary rate and forming part of an integrated services digital network The control of jitter and wander within digital networks which are based on the 2048kbit/s hierarchy The control of jitter and wander within digital networks which are based on the 1544kbit/s hierarchy Error performance parameters and objectives for international constant bit rate digital paths at or above the primary rate Framework recommendation on functional access networks (AN): architecture and functions, access type, management and service node aspects Optical interfaces for equipments and systems relating to the synchronous digital hierarchy
ITU-T G.957
6-22
T2-050209-20060530-C-1.D1
6 Technical Specifications
Standard ITU-T G.958 ITU-T G.960 ITU-T G.961 ITU-T G.962 ITU-T G.964 ITU-T G.965 ITU-T G.982 ITU-T G.991.2 ITU-T G.992.1 ITU-T G.992.2 ITU-T G.992.3 ITU-T G.992.5 ITU-T G.996.1 ITU-T G.997.1 ITU-T H.248 ITU-T I.361 ITU-T I.363 ITU-T I.363.1 ITU-T I.363.5 ITU-T I.371 ITU-T I.430 ITU-T I.431 ITU-T I.432.2
Description Digital line systems based on the synchronous digital hierarchy for use on optical fibre cables Access digital section for ISDN basic rate access Digital transmission system on metallic local lines for ISDN basic rate access Access digital section for ISDN primary rate at 2048kbit/s V-interfaces at the digital local exchange (LE) V5.1-interface (based on 2048kbit/s) for the support of access network (AN) V-interfaces at the digital local exchange (LE) V5.2-interface (based on 2048kbit/s) for the support of access network (AN) Optical access networks to support services up to the ISDN primary rate or equivalent bit rates Single-pair high-speed digital subscriber line (SHDSL) transceivers Asymmetric Digital Subscriber Line (ADSL) transceivers ITU standard for low-speed Asymmetrical Digital Subscriber Line without voice splitter Asymmetrical digital subscriber line (ADSL) transceivers 2 (ADSL2) Asymmetrical digital subscriber line (ADSL) transceivers extended bandwidth ADSL2 (ADSL2plus) Digital Subscriber Line (DSL) Transceiver Testing Procedure Physical layer management for Digital Subscriber Line (DSL) transceivers Gateway control protocol B-ISDN ATM layer specification B-ISDN ATM Adaptation Layer specification B-ISDN ATM Adaptation Layer Specification: Type 1 AAL B-ISDN ATM Adaptation Layer specification: Type 5 AAL Traffic control and congestion control in B-ISDN ISDN basic user-network interface layer 1 specification ISDN primary rate user-network interface layer 1 specification B-ISDN user-network interface-Physical layer specification: 155,520kbit/s and 622,080kbit/s operation
T2-050209-20060530-C-1.D1
6-23
6 Technical Specifications
Standard ITU-T I.432.3 ITU-T I.610 ITU-T I.630 ITU-T M.3100 ITU-T Q.811 ITU-T Q.812 ITU-T Q.831 ITU-T Q.921 ITU-T Q.931 ITU-T T.30 ITU-T T.38 ITU-T V.24
Description B-ISDN user-network interface - Physical layer specification: 1544 kbit/s and 2048 kbit/s operation B-ISDN operation and maintenance principles and functions ATM protection switching Generic network information model Lower layer protocol profiles for the Q3 and X interfaces Upper layer protocol profiles for the Q3 and X interfaces Fault and performance management of V5 interface environments and associated customer profiles ISDN user-network interface Data link layer specification ISDN user-network interface layer 3 specification for basic call control Procedures for document facsimile transmission in the general switched telephone network Procedures for real-time Group 3 facsimile communication over IP networks List of definitions for interchange circuits between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) Modem using the 60-108 kHz frequency band for synchronous data transmission A digital modem and analogue modem pair for use on the Public Switched Telephone Network (PSTN) at data signalling rates of up to 56 000 bit/s downstream and up to 33 600 bit/s upstream Transport of IP over ATM in public networks User Datagram protocol The TFTP Protocol (Revision 2) Internet protocol Internet Control Message Protocol Transmission Control Protocol
ITU-T Y.1310 RFC 0768 RFC 0783 RFC 0791 RFC 0792 RFC 0793 RFC 0826 RFC 0854 RFC 0894
An Ethernet Address Resolution Protocol (ARP) Telnet protocol A standard for the transmission of IP datagrams over Ethernet networks
6-24
T2-050209-20060530-C-1.D1
6 Technical Specifications
Standard RFC 1112 RFC 1155 RFC 1157 RFC 1213 RFC 1483 RFC 1493 RFC 1542 RFC 1643 RFC 1661 RFC 1723 RFC 1757 RFC 1889 RFC 1890 RFC 1907 RFC 2198 RFC 2225 RFC 2236 RFC 2328 RFC 2364 RFC 2515 RFC 2516 RFC 2613 RFC 2652 RFC 2662 RFC 2819
Description Host extensions for IP multicasting Structure and Identification of Management Information for TCP/IP-based Internets, Network Working Group, May 1990 Simple Network Management Protocol (SNMP) Management Information Base for Network Management of TCP/IP-based internets: MIB-II 2.Draft Standards Multiprotocol Encapsulation over ATM Adaptation Layer 5 Bridge MIB Clarifications and Extensions for the Bootstrap Protocol (DHCP-Relay) Definitions of Managed Objects for the Ethernet-like Interface Types Point to Point Protocol (PPP) RIP Version 2(RIP2) Remote Network Monitoring Management Information Base RTP: A Transport Protocol for Real-Time Applications RTP Profile for Audio and Video Conferences with Minimal Control Management Information Base for Version 2 of the Simple Network Management Protocol (SNMPv2) RTP Payload for Redundant Audio Data Classical IP and ARP Over ATM (IPoA) Internet Group Management Protocol Version 2 (IGMP V2) OSPF Version 2, Network Working Group, April 1998 PPP Over AAL5(PPPoA) Definitions of Managed Objects for ATM Management A Method for Transmitting PPP Over Ethernet(PPPoE) Remote Network Monitoring MIB Extensions for Switched Networks Ethernet Interface MIB Definitions of Managed Objects for the ADSL Lines Remote Network Monitoring
T2-050209-20060530-C-1.D1
6-25
6 Technical Specifications
Standard RFC 2833 RFC 2960 RFC 3015 RFC 3057 RFC 3389 RFC 3440 RFC 3525 RFC 3550 RFC 3551 RFC 4040
Description RTP Payload for DTMF Digits, Telephony Tones and Telephony Signals Stream Control Transmission Protocol Megaco Protocol Version 1.0 ISDN Q.921-User Adaptation Layer (IUA) Real-time Transport Protocol (RTP) Payload for Comfort Noise (CN) Definitions of Extension Managed Objects for Asymmetric Digital Subscriber Lines Gateway Control Protocol Version 1 RTP: A Transport Protocol for Real-Time Applications RTP Profile for Audio and Video Conferences with Minimal Control RTP payload format for a 64 kbit/s transparent call.
6-26
T2-050209-20060530-C-1.D1