Professional Documents
Culture Documents
0 Product
Description
ZXCTN 6150 V3.0 Product Description
TABLE OF CONTENTS
1 Overview ............................................................................................................ 9
2 Highlights........................................................................................................... 9
FIGURES
TABLES
Table 3-1 ZXCTN 6150 switching capability .......................................................................12
Table 3-2 ZXCTN 6150 maximum access capability ..........................................................12
Table 3-3 ZXCTN 6150 service interface ...........................................................................13
Table 3-4 ZXCTN 6150 auxiliary interface type and number ..............................................13
Table 3-5 EVC (Ethernet Virtual Connection) service supported by ZXCTN 6150 ..............15
Table 3-6 VLAN feature .....................................................................................................19
Table 3-7 OSPF packet types ............................................................................................27
Table 3-8 MPLS-TP OAM failure management functions ...................................................59
Table 3-9 MPLS-TP performance management functions ..................................................59
Table 3-10 OAM types that ZXCTN 6150 supports ............................................................60
Table 3-11 Typical Ethernet OAM protocol ........................................................................62
Table 3-12 ZXCTN 6150 Ethernet OAM functions .............................................................63
Table 3-13 Ethernet Link OAM ...........................................................................................64
Table 3-14 ZXCTN 6150 equipment-level protection..........................................................67
Table 4-1 ZXCTN 6150 board type and functio ..................................................................86
Table 4-2 XGEx2(O) board function ...................................................................................87
Table 4-3 XGEx1 board function ........................................................................................88
Table 4-4 GEx8(O) board function ........................................................................................90
Table 4-5 GECHx4(O) board function ................................................................................91
Table 4-6 GECx4 V2 board function ..................................................................................92
Table 4-7 FEx8(E) board function....................................................................................94
Table 4-8 FEx8(OE) board function .................................................................................95
Table 4-9 ZXCTN 6150 software system interface description .........................................106
Table 5-1 Equipment physical performance list ................................................................119
Table 5-2 E1 interface electric performance .....................................................................120
Table 5-3 STM-1 optical interface performance ...............................................................121
Table 5-4 STM-1/OC-12 optical interface performance ....................................................122
Table 5-5 10/100Base-TX interface electric performance ................................................122
Table 5-6 GE interface optical performance .....................................................................123
Table 5-7 10GE interface optical performance .................................................................123
Table 5-8 L2 Feature .......................................................................................................124
Table 5-9 L3 Feature .......................................................................................................125
Table 5-10 QoS Feature ..................................................................................................126
Table 5-11 Service Management .....................................................................................127
1 Overview
ZXCTN 6000 series is ZTE’s Carrier class Multi-service Packet-based Platform (CMPP)
in compliance with IP-based service development trend. The packet-based multiservice
bearer platform provides Mobile Backhaul end-to-end solution and supports smooth
network evolution to lower CAPEX and OPEX for carriers.
ZXCTN 6000, applied to network access layer, integrates packet and transport
technologies to meet complex service demands. As the platform based on packet
switching, ZXCTN 6000 support multiservice interfaces, network synchronization,
carrier-class OAM & protection, and many other functions, which make ZXCTN 6000 as
a powerful platform to process and transmit carrier-class Ethernet, ATM and TDM
services.
ZXCTN 6000 series consists of ZXCTN 6110(F), ZXCTN 6120, ZXCTN 6120S, ZXCTN
6130XG-S, ZXCTN 6150, ZXCTN 6180, ZXCTN 6200, ZXCTN 6220 and ZXCTN 6300.
The rack-type equipment ZXCTN 6150, 6180, 6200, 6220 and 6300 provide redundant
protection for equipment-level key units in the ASIC-based centralized packet switching
structure. ZXCTN 6150, 6180, 6200 and 6220 are applied to large capacity network
access layer.
Mobile Backhaul
2 Highlights
Multiservice bearer platform to meet full-service demands
Based on full-packet structure and PWE3 technology, ZXCTN 6150 supports
IP/MPLS & MPLS-TP technology to bear services such as TDM and Ethernet with
high efficiency, which can meet full-service demands and significantly lower the
network TCO of customers.
control, clock and power module to improve disaster restoration and fault solving.
The network protection provides layered and sectioned LSP, and
connection-oriented ring protection for complex full-service applications to
guarantee protection switching in 50ms. The network edge-level protection includes
LAG protections. These protections lead to the carrier-class reliability of 99.999%.
ZXCTN 6150 offers a wide variety of security and anti-attack features, forwards
full-rate services in the configuration of tens of thousands of ACL, support packet
check, traffic classification, CPU protection, limited-rate protocol message, route
authentication, DdoS attack monitoring and hierarchical NM, and shields network
attack risks.
ZXCTN 6150 service processing capability includes switching capability and service
access capability.
ZXCTN 6150 supports the packet-based service switching. ZXCTN 6150 service
switching capability is shown in Table 3-1.
ZXCTN 6150 can access multiple services via different types of interfaces. The type and
access capacity of ZXCTN 6150 service interface are shown in Table 3-2.
GE(Optical) 8 56
GE(Electrical) 4 28
FE(Optical) 8 56
FE(Electrical) 8 56
CEP STM-1 4 28
ZXCTN 6150 supports multiple interfaces, as shown in Table 3-3. 8 ports FE interface
card just support UNI function now.
ZXCTN 6150 also supports NM interface, clock interface and alarm interface, as shown
in Table 3-4.
External alarm 1
Support 4*external RJ45 physical
input/output
alarm input/output interface
interface
1/1 Interface is
Support 2M BITS/Hz RS422 interface
BITS
input and output (RJ45 physical
interface)
2 Interface is
Support 1PPS+TOD
RS422 interface
GPS interface interface (input or
(RJ45 physical
output,)
interface)
ZXCTN 6150 bears TDM/ETH services through PWE3 (Pseudo Wire Emulation
Edge-to-Edge) and provides a transparent transport channel for various services in PSN
(Packet Switching Network). In the channel, user services are isolated from each other
and service attributes keep unchanged during the transport.
PWE3 integrates the original access modes and the existing IP backbone network to
reduce CAPEX and OPEX.
ZXCTN 6150 supports TDM service via TDM E1 interface and STM-N interface. ZXCTN
6150 supports Structure-aware and Structure-agnostic Emulation of TDM service, and
CEP Emulation of VC-4.
Support VC4 emulation and one to one mapping between VC4 and PW
ZXCTN 6150 supports flexible configuration of TDM CES. Each E1 interface can be
configured as Structure-aware or Structure-agnostic independently.
ZXCTN 6150 supports access and transmission of Ethernet service via Fast Ethernet
interfaces, Gigabit Ethernet interface, etc.
ZXCTN 6150 offers the following three types of Ethernet services that are compliant with
ITU-T, MEF6.
Table 3-5 EVC (Ethernet Virtual Connection) service supported by ZXCTN 6150
Port-Based(All to
Service Type VLAN-Based(Service multiplexed)
one bundling)
Port-Based(All to
Service Type VLAN-Based(Service multiplexed)
one bundling)
3.2.2.1 E-Line
E-Line is the point-to-point (PTP) service and consists of EPLine and EVPLine.
3.2.2.2 E-LAN
3.2.2.3 E-Tree
Support the following port traffic control functions based on full-duplex IEEE 802.3x
Pause frame mechanism.
Port based
ZXCTN 6150 supports powerful VLAN function to divide virtual working groups.
Attribute Description
ZXCTN 6150 supports port based VLAN separation and provides multiple types of
interfaces according to whether the received messages are encapsulated with VLAN Tag.
ZXCTN 6150 is connected to user host via Access interface, to other ZXCTN equipment
via Trunk interface, and to user host or other ZXCTN or Ethernet switch via Hybrid
interface. The equipments connected via Trunk interface can connect with each other
through VLAN Trunk connection and transport multiple VLAN data stream. As a result,
the VLAN interworking can be achieved in the whole metro network.
In 802.1Q VLAN protocol, VLAN ID is based on 12 bits, which limits VLAN number up to
4096. In order to extend VLAN ID address space and improve security, ZXCTN extends
VLAN on the basis of IEEE802.1Q (QinQ). QinQ is also called Stacked VLAN or Double
VLAN, which encapsulates VLAN Tag of the private network into VLAN Tag of the public
network so that the packets go through backbone network (public network) of the carriers
with two layers of VLAN Tag. Because QinQ has two layers of tag, it extends VLAN
range of metro backbone network.
ZXCTN 6150 supports link aggregation to bind a group of physical interfaces, which can
make the interfaces group as same as the single link logically.
aggregation function can protect transmission on the fault links and switch the service to
the working links of the same link aggregation group, which can remarkably increase the
transmission reliability.
There are manual aggregation and static aggregation according to implementation mode.
Manual aggregation does not need LACP (Link Aggregation Control Protocol), but static
aggregation does.
ZXCTN 6150 supports manual load-sharing link aggregation and LACP defined by IEEE
802.3ad, which can bind FE and GE interfaces, and support link aggregation across
service boards based on MAC, VLAN & IP load balancing.
ZXCTN 6150 supports STP complying with IEEE802.1D, RSTP complying with
IEEE802.1w, and MSTP complying with IEEE802.1s.
Without authentication mechanism, STP cannot authenticate and limit new added BPDU
packets, which will impact network topology and stability. ZXCTN 6150 uses BPDU
protection, root protection and ring protection to stabilize L2 switching network topology.
In the simple network (e.g., small network composed of several switches) or the special
port (e.g., the port connected to PC), which STP is not needed, STP can be disabled
manually to meet the network and management requirements. ZXCTN 6150 provides the
protocol disable function based on port.
ZXCTN 6150 supports DHCP Relay. DHCP Server is usually deployed in the
convergence layer or core layer equipment, thus it is required that DHCP packet of the
host can penetrate different subnets to reach DHCP Server. In order to support the
penetration, ZXCTN 6150 can snoop and relay DHCP packet, which is DHCP Relay
function.
3.3.6 Multicast
IGMP proxy/snooping uses L2 multicast to forward the information only to the receiver in
demand and has the following advantages:
Create the multicast table based on IGMP proxy/snooping and forward multicast
services according to service ports registered in the multicast table.
Dynamically create, delete and maintain multicast table, and multicast query based
on VPLS/E-LAN service.
3.4 L3 function
3.4.1.1 L3 interface
VLAN-based L3 interface.
Qx-based L3 interface.
ZXCTN 6150 support ARP (Address Resolution Protocol). The basic function of ARP is
to query MAC address of target equipment according to its IP address to assure smooth
communication.
ZXCTN 6150 support static route. Static route is manually configured by the
administrator and can be configured to make simple network run normally. Static route
can be set and used properly to improve network performance, and guarantee the
sufficient bandwidth for important networks.
ZXCTN 6150 supports route forwarding load sharing (Equal Cost of Multi-path). When IP
network uses route protocol or static configuration to reach a destination network,
multiple equivalent next hops share the load in IP route forwarding. ECMP can share the
load of IP packets for services and NM to increase the forwarding capability. Each ECMP
group supports up to 8 routes.
ZXCTN 6150 follows ICMP (Internet Control Message Protocol) and has the following
functions in the network:
Host probe
Route maintenance
Route selection
Traffic control
ZXCTN 6150 follows UDP (User Datagram Protocol). As basic connectionless transport
protocol, UDP is the transports means of many protocols. For example, it is used by
protocols such as OSPF and LDP to transmit Hello protocol packets. The basic function
follows RFC 768 - User Datagram Protocol.
VRRP is the protocol about gateway node redundancy protection. As shown in Figure
3-6, CE is dual-homed to PE1 and PE2 via two links. PE1 address is 30.1.1.2, MAC1 and
PE2 address is 30.1.1.4, MAC2.
After running VRRP, PE1 and PE2 virtualize an IP address 30.1.1.1. When CE is
configured with routes, next hop is designated as VRRP virtual address. Thus CE shields
the IP address of the actual port with virtual address.
After running VRRP, PE1 and PE2 exchange VRRP packets with each other to select the
active equipment. When the network is in operation, only the active equipment virtualizes
ARP request packets of the address 30.1.1.1. Thus the MAC address learnt by CE is the
MAC address of the active, the packets will be forwarded to the active.
When the active is found going wrong in VRRP packet check, the standby will work as
the active and send a free ARP packet to virtual address. After receiving the packet, CE
updates ARP table to refresh forwarding paths and send service packets to the new
active. ZXCTN 6150 follows Virtual Router Redundancy Protocol (RFC 3768).
3.4.1.10 IP FRR
ZXCTN 6150 supports BFD-based fast IP rerouting to convergence routes rapidly in the
Native IP networking.
OSPF, an Internal Gateway Protocol (IGP), releases route information between routers
in the single Autonomous System (AS). OSPF supports large networks and fast route
convergence and occupies few network resources. It plays a very important role in
current route protocols.
OSPF is a typical route link status protocol. It adopts OSPF routers to exchange and
save links information of the entire network, discover network topology and calculate
routes independently.
Support various OSPF packets. Please refer to Table 8 for more details.
P2P: When link-layer protocol is PPP, HDLC, DCC link and VCG link, the
default network type is P2P for OSPF. The protocol packets are
transmitted in the form of multicast (224.0.0.5).
Support Virtual Link and provide virtual connection between Area and Backbone.
Support Stub area and follow OSPF Stub Router Advertisement (RFC 3137).
Support OSPF GR functions and provide Graceful OSPF Restart (RFC 3623):
After restart, the restarted node relearns the pre-restart route information
from neighbors and ages the forwarding table items of forwarding plane.
The neighbors of restart nodes can send the route information, which was
sent to neighbors before restart, to the restarted node.
IS-IS is a dynamic route protocol designed by ISO for CLNP (Connectionless Network
Protocol). In order to support IP routes, IETF extends and modifies IS-IS in RFC 1195 to
apply it to TCP/IP and OSI environment simultaneously.
IS-IS, an Internal Gateway Protocol (IGP), is used in Autonomous System (AS) and is a
link status protocol using SPF algorithm to calculate the routes.
Support broadcast link, e.g., Ethernet and Token-Ring, and P2P link, e.g.,
PPP and HDLC.
Exchange LSP (Link State PDU) packets for Routing diffusion and LSDB
(LSP database) synchronization.
After restart, restart node relearns the pre-restart route from neighbors
and ages the forwarding table items of forwarding plane and the
neighbors of restart nodes can resend the route which was sent to
neighbors before.
BGP (Border Gateway Protocol) is a dynamic route protocol between ASs. Different from
IGP such as OSPF and RIP, BGP focuses on control route transmission and best route
selection instead of route discovery and calculation. BGP runs in two ways: It is called
IBGP when it runs in one AS and EBGP when it runs between different ASs. As the
actual Internet external route protocol standard, BGP-4 is widely used between ISPs
(Internet Service Provider).
ZXCTN 6150 is able to release L3 VPN route information through BGP in MPLS network.
It supports the following BGP functions:
Support BGP-4 basic functions and follow A Border Gateway Protocol 4 (RFC
4271).
Support IBGP and EBGP and follow their route release rules.
Support BGP MP extension (L3 VPN) and follow Multiprotocol Extensions for
BGP-4 (RFC 4760). ZXCTN 6150 supports MP-BGP and uses MP-BGP as
signaling protocol in BGP/MPLS L3 VPN to transmit packets via L3 VPN route in
backbone network, and transmit VPN member information and VPN-IPV4 table
items between L3 VPN PEs.
Support BGP to transfer IPv4 label route and follow Carrying Label Information in
BGP-4 (RFC 3107). When creating cross-domain LSP, the equipment transfers
public network routes in AS or between ASs through BGP, while carrying labels to
work with LDP or RSVP to create ETE cross-domain LSP.
Support BGP GR functions and provide Graceful Restart Mechanism for BGP
(RFC4724)
After restart, the restarted node relearns the pre-restart route information
from neighbors and ages the forwarding table items of forwarding plane.
The neighbors of restart nodes can send the route information, which was
sent to neighbors before restart, to the restarted node
Support BGP route aggregation to aggregate multiple routes into one route
according to aggregation policy and release it to remote end.
3.5 MPLS
Multi-protocol label switching (MPLS) was proposed first to increase the forwarding
speed of router. Currently MPLS is developing towards backbone router and VPN
solution.
The typical MPLS network architecture is as shown in Figure 3-9. The basic element of
MPLS network is Label Switching Router (LSR). The network domain formed by LSR is
called MPLS Domain.
The LSR located at the edge of MPLS domain and connecting other networks is called
Label Edge Router (LER); the LSR inside MPLS domain is called Core LSR. If an LSR
has one or more adjacent nodes that do not run MPLS, this LSR is LER. If all the
adjacent nodes of an LSR run MSLS, this LSR is a core LSR.
The MPLS system architecture of ZXCTN 6150 complies with the standard: Multiprotocol
Label Switching Architecture (RFC 3031).
The label stack architecture of ZXCTN 6150 complies with the standard MPLS Label
Stack Encoding (RFC 3032).
In the intermediate node of LSP, perform label SWAP operation for messages.
3.5.4 LDP
MPLS system has multiple label distribution protocols. LDP (Label Distribution Protocol)
is one of the basic signaling of MPLS, mainly processing establishment and maintenance
of LSP/PW. It is the most commonly used LSP/PW signaling protocol in the current
network. In case of hybrid network of the equipment and traditional IP/MPLS router, the
LSP of LDP is established by interconnection of LDP and IP/MPLS router in the current
network.
LDP specifies various messages and related processing procedure during label
distribution. It is mainly used for LSR to negotiate session parameters and distribute
labels and established label switching path (LSP). LSR connects the incoming label,
next-hop node and outgoing label corresponding to a certain FEC in the local forwarding
table together and thus forms the label switching path that crosses the whole MPLS
domain.
After LDP session is established, LDP protocol begins to switch information such as label
mapping to establish LSP. RFC5036 defines label advertisement mode, label distribution
control mode and label retention mode to decide how LSR advertises and manages
labels.
In MPLS system, the downstream LSR distributes the labels to specific FEC and then
notifies the upstream LSR. The label is designated by the downstream LSR and is
distributed in the direction from downstream to upstream.
Downstream Unsolicited
DU (Downstream Unsolicited) means for a specific FEC, LSR performs label
distribution without getting label request message from upstream.
Downstream on Demand
DoD (Downstream on Demand) means for a specific FEC, LSR performs label
distribution after getting label request message from upstream.
The downstream LSR feedback label mapping message depends on the label
control mode used by this LSR.
Label Distribution Control Mode refers to the processing mode when LSR distributes
labels during the establishment of LSP.
Label Retention Mode refers to the processing mode for label mapping received by LSR
that will not be used for the time being.
The procedure of establishing LSP on ZXCTN 6150 equipment is to bind FEC and label,
and notify this binding to the adjacent LSR on LSP. This procedure is realized by LDP.
The following is a description of the major procedure for Downstream Unsolicited
Advertisement Mode and Ordered Label Distribution Control Mode.
When the network route changes, if an edge node finds a new destination address
in its route table, and this address does not belong to any existing FEC, this edge
node needs to establish a new FEC for this destination address.
If the outlet node of MPLS network has labels to be distributed, it distributes a label
to the FEC and sends label mapping message to the upstream initiatively. The label
mapping message includes the label distributed and the bound FEC.
The LSR receiving label mapping message adds a corresponding item in its label
forwarding table and sends label mapping message of the specified FEC to the
upstream LSR initiatively.
When the LSR in the inlet node receives label mapping message, it also needs to
add a corresponding item in its label forwarding table. At this time, LSP
establishment is completed. Next the data packet corresponding to this FEC can be
forwarded.
To increase the safety of LDP protocol, some safety measures should be taken for it.
One of the measures is MD-5 certification.
MD-5 certification is encryption certification. A key and a key ID are configured on each
piece of equipment. LDP transmits messages using TCP protocol which calculates the
digest by MD-5 algorithm and adds the digest to the end of the message. TCP protocol at
the receiving end also calculates digest by MD-5 algorithm and them compares it with the
digest calculated at the transmit end. If the two are consistent, LDP passes the
certification, otherwise, it fails.
The control plane configures TCP MD-5 configuration options separately for each LDP
peer. The options include:
LDP TCP MD-5 encryption design of ZXCTN 6150 should comply with the requirements
of RFC 3036.
For the label data forwarding problems caused by the restart of LSR control plane,
especially those caused by the restart of LDP control plane, ZXCTN 6150 solves them by
LDP Graceful Restart mechanism.
Configuration mechanism: The user can enable and disable LDP GR (disabled by
default) and relevant timer.
LSR can remain forwarding state upon session restart, node restart or LDP
signaling restart.
Other non-LDP faults such as board reset and interface down will not trigger GR.
3.5.5 RSVP-TE
Resource Reservation Protocol (RSVP) is designed for integrated service model, used
for resource reservation on the nodes of an LSP. RSVP works on the transport layer but
does not participate in application data transport. It is a network control protocol, and
similar to ICMP.
Simply speaking, RSVP has the following major features: the receiver-oriented, the
receiver originates the request for resource reservation and maintains resource
reservation state. Soft state mechanism is used to maintain resource reservation
information.
The extended message can not only carry label binding information but also
limitation information, so as to support the constrained routing function of CR-LSP.
RSVP of ZXCTN 6150, after extension, can support distribution of MPLS labels and carry
resource reservation information while transporting label binding information. The
extended RSVP is called RSVP-TE, used to establish LSP tunnel as a signaling protocol
to implement the following function.
Removal of TE LSP
Error notification
For basic functions of RSVP-TE, the following functions defined in relevant standard
should be supported:
RSVP-TE message supports designation function of LSP node and can establish explicit
path. By explicit path technology, it can specify the paths that must be passed and those
that are not passed to arrive at a destination. The LSP paths planned can be calculated
dynamically by taking explicit path as a constraint.
For explicit path function, ZXCTN 6150 supports the following modes:
Strict explicit path: the next hop and the previous hop are connected directly.
Loose explicit path: the loose mode can specify which node the path must pass, but
there can be other nodes between this node and the previous hop.
The interface with RSVP-TE enabled supports multiple message digest algorithms. The
major ones are hmac-md5 and hmac sha-1, which can be selected by the administrator
and the default one is MD5. The certification is only directed for the interface and not for
the neighbor. Each interface supports one key.
The interface bandwidth resource can be partly or fully distributed to TE for LSP
establishment. This information need be managed and distributed in the network via
OSPF-TE/ISIS-TE.
For interface type, only ordinary physical interface supports this function. Interface
TE bandwidth management is not required for VLAN sub-interface and bound
interface.
Provide interface for OSPF-TE and ISIS-TE to enable them to get bandwidth
information of TE interface and perform the flooding function.
To improve the network performance and protection capability, ZXCTN 6150 supports
establishment of bidirectional LSP, supports bidirectional same routing and supports
bidirectional LSP management in NMS as one entity.
In the application of ZXCTN 6150, in some case, cross-domain (AS) service dispatching
may be needed. For example, if the service of NodeB needs to be transported to the
remote RNC via the core layer router network, and if the core layer network also supports
cross-domain RSVP-TE, RSVP-TE can be used to establish cross-domain (AS) E2E
LSP.
When the service of NB1 needs to be dispatched to the remote RNC2, E2E RSVP-TE
LSP need be established, which is PE1->PE3->SR1->SR2->PE4.
RSVP-TE can specify cross-domain edge node, define loose ER-Hop, calculate path
using CSPF in the domain, establish an E2E cross-domain LSP in this way and thereby
provide PW service between PE1 and PE4.
3.5.5.7 RSVP-TE GR
Restart of RSVP-TE control plane will cause LSR restart and data flow interruption of its
neighbor. RSVP-TE Graceful Restart mechanism can be used to reduce the impact of
RSVP-TE control plane restart.
Configuration mechanism: The user can enable and disable RSVP-TE GR and
relevant timer.
LSR can remain forwarding state when RSVP-TE control plane is restarted.
When the number of messages loss is detected exceed the limit, RSVP-TE GR will
also be triggered. Other non-LDP faults such as board reset and interface down will
not trigger GR.
The head node, intermediate node and end node of the link established by
RSVP-TE all support RSVP-TE GR.
3.6.1 VPWS
VPWS (Virtual Private Wire Service) is a L2 tunnel technology under MPLS technology,
used to provide point-to-point virtual private wire service. The PE equipment at the edge
of operator’s network and P equipment inside the operator’s network are all equipment to
be maintained and managed by the operator. The customer edge (CE) equipment
access the system via Ethernet link. VPWS transmits user L2 data transparently point to
point in MPLS networks.
Access AC types support: port, port + VLAN, port + QinQ, AC access of ATM
service and TDM service is supported.
For VPWS NNI-side interfaces, all NNI interfaces including Ethernet should be
supported.
Extended LDP protocol also supports the following functions besides the basic
functions:
Support TLV that extends standard LDP to carry PW ID, including 128
types PW ID FEC TLV and 129 type general PW ID FEC TLV.
VPWS tunnel technology can base on static LSP, LDP LSP or RSVP-TE LSP.
3.6.2 VPLS
VPLS (Virtual Private LAN Service), integrating the advantages of Ethernet and MPLS
technology, is a multipoint-to-multipoint L2 VPN technology. VPLS emulates all functions
of traditional LAN, with a purpose to connect multiple Ethernet sites that is scattered in
area via the operator’s IP/MPLS backbone network and make them work like a LAN.
Comply with LDP extension protocol RFC 4762 to support establishment and
maintenance of different types of PW and so support VPLS service.
VPLS tunnel technology can base on static LSP, LDP LSP or RSVP-TE LSP.
Support controlling the number of MAC address tables under each VPN
Support static MAC; Enable and disable MAC address learning function.
VPLS requires full connection between PE. As a result, when VPLS network scale is
large, the number of PWs is huge; PW signaling overhead is high; and network
management and expansion will be very complicated. H-VPLS divides PE to UPE and
NPE. UPE is mainly used to connect CE and service provider network as MTU to access
VPN; NPE is located at the edge of the core areas of VPLS network, providing
transparent transmission of user messages on core network. UPE need not be
connected with all NPE; full connection only needs be established between NPE. By
classification, H-VPLS reduces the number of PW and signaling load.
As aggregation equipment MTU, UPE is accessed to the link U-PW only by a virtual
connection (to establish U-PW, establish VSI instance on NPE and UPE equipment,
specify peers and the PWID on the two devices must be the same), and no virtual
connection is established between UPE and other opposite ends.
UPE sends the message from CE to NPE 1 and places in VC label corresponding to
U-PW (VC label distributed to NPE 1 as a multi-PW multiplexing separation sign).
After receiving the message, NPE 1 first decides VSI of the message according to
the VC label, and then presses in VC label corresponding to N-PW according to the
destination MAC and then forwards this message.
After receiving the message from N-PW side, NPE 1 presses in VC label
corresponding to U-PW and sends the message to UPE, and then UPE forwards
the message to CE.
When data exchange between CE 1 and CE 2 is one between local CEs, if UPE has
bridging capability, UPE will complete message forwarding between the two directly
without sending the message to NPE 1. However, for the first data message or broadcast
message with destination MAC unknown, UPE will still forward the message to NPE1 via
U-PW while broadcasting the data to CE2 and then NPE copies the message and
forwards it to the opposite-end CE.
Pseudo-wire is usually in single segment E2E mode. However, in the following three
cases, a single-segment pseudo-wire cannot meet the requirement:
The source and sink PEs of the service are not in the same domain (AS) and
signaling connection or tunnel cannot be established between the two PEs.
The source and sink PEs of the service run different signaling, for example, one end
runs LDP and the other run RSVP.
If the access equipment can run MPLS but cannot establish substantial LDP
sessions, UFPE (User Facing Provider Equipment) can be used as U-PE;
high-performance equipment S-PE can be used as the switching node of LDP
sessions, like a signaling reflector to realize tunnel aggregation of pseudo-wire.
Multi-Segment Pseudo-Wire means there are multiple segmented PWs between U-PE
and U-PE, as shown in the Figure 3-18.
When LDP is used as PW signaling, when access chain AC is down, LDP signaling will
notify the neighbor to remove PW label. When AC is up again, LDP will negotiate again
to create PW label. This mechanism will lead to repeated deletion and creation of PW
label when AC chain oscillates, which will affect network stability.
To prevent PW label oscillates with the oscillation of AC, PE state notification technology
can be used. It is required that PW label created by LDP should not be affecte3d by AC
chain state. The notification does not serve as the standard for creation and deletion of
LDP PW label. The way to realize this is: on the basis of Martini, dynamic PW adds
optional state parameters in mapping message and supports Notification message.
When the network is unstable, Notification message can reduce message exchange. For
example, when AC chain oscillation occurs on PE equipment, it only needs to send
Notification message notifying the state of this AC; and the opposite end will not remove
VC when receiving this message. On the contrary, in Martini mode, when AC chain
oscillation occurs on PE equipment, it will send Withdraw message continuously, which
leads to repeated creation and deletion of PW.
ZXCTN 6150 conforms to RFC4364 protocol with its L3 VPN adopting BGP/MPLS VPN.
The basic network architecture is shown in the Figure 3-19.
3.7.1 VRF
VPN functions are mainly implemented on PE, which sets up VRF (Virtual Routing and
Forwarding) table for each VPN. Any customer and station belong to VPN can access to
the VRF table of this VPN to realize routing and forwarding separation of different VPN
customers. ZXCTN 6150 completely support VRF forwarding instances.
ZXCTN 6150 supports distributing VRF per route mode as shown in Figure 3-20. PE1
distributes a different L3VPN label (ingress label) with each routing item it distributes to
PE2. The private network label corresponds to VPN route R1 is L1, and that corresponds
to R2 is L2. PE2 determines next-hop and egress based on the popping-up VPN label
matching VRF IP routing item. In this way forwarding from PE to CE can be directly
implemented.
CE is client edge equipment. Acting as VPN managed by the operators, L3 VPN asks for
nothing special from CE equipment. CE can be host, Ethernet switch or router. PE-based
BGP/MPLS IP VPN is especially for IP services (the so-called L3 VPN services).
Customers can get access to operator’s network via any L2 services, which have been
terminated at the edge of operator’s network however.
P is the core node in MPLS network. It uses common MPLS protocol and process.
ZXCTN 6150 supports the following three ways to pre-set up LSP tunnel between PE.
In L3 VPN network PE and CE have to exchange route information. ZXCTN 6150 can
implement customer route learning in the following three ways as shown in Figure 3-21.
Static route
After learning CE routes, PE transmit VPN composition message and VPN-IPv4 routes
via MP-BGP, which uses VPN-IP addresses (composed of RD and IPv4 address). Thus
different VPN can use the overlapped IPv4 address and avoid VPN-IP addresses
conflict.
ZXCTN 6150 supports control over VPN route launching via RT (Router Target). ZXCTN
6150 supports egress RT and ingress RT configuration. With RT control, it can easily
implement L3 VPN networking such as Intranet VPN, Extranet VPN and Hub-Spoke
VPN.
Usually MPLS VPN system architecture runs in an autonomous system. VPN routing
information can be only distributed on demands in the autonomous system. ZXCTN 6150
supports the following methods to implement cross-domain VPN:
ZXCTN 6150 supports complete VPN FRR, making end-to-end service convergence
recovery time independent from the scale of private network route, and to achieve
reliable and easily deployed networks.
ZXCTN 6150 provides standard-based support for DiffServ, including traffic classification,
policing, shaping, congestion control, queue scheduling, etc. Network carrier configures
the different QoS for access services to provide DiffServ.
The equipment supports 8 PHBs (Per-hop Behavior) defined in the standards, e.g., BE,
AF1, AF2, AF3, AF4, EF, CS6 and CS7, to enable network carrier to provide DiffServ for
users and transport data, voice and video services at the same time.
If there is no QoS or traffic classification or a message does not match any classification
rule, this message will be processed in the BE (Best-Effort) way.
Traffic classification
ZXCTN 6150 supports the classification based on port, L2, L3 and L4 packet head,
e.g., physical interface, source address, destination address, MAC address, IP or
applications port number.
Policing
ZXCTN 6150 supports traffic policing and CAR (Committed Access Rate), uses
ACL to control service access, and implements traffic-based CIR, CBS, EIR and
EBS. Message can be discarded or colored under some certain conditions. It also
supports ingress and egress policing.
Queue scheduling
ZXCTN 6000 employs mixed queue scheduling which has the following functions.
Shaping
Traffic shaping limits the traffic and the burst of a connection out of a network so
that the messages are transmitted at a smooth rate.
H-QoS
ZXCTN 6150 supports adequate flexible management hardware queues, which can
support multi-level HQOS scheduling, which matches precise user’s demands for
multi-service and QoS management.
ZXCTN 6150 supports the MPLS QoS based on DiffServ model. MPLS QoS fulfills
priority mapping among MPLS, IP and Ethernet messages, and differentiates data flows
of different services according to EXP value in the label to provide DiffServ and assure
QoS of voice, video, etc. ZXCTN 6150 supports two types of carrier MPLS QoS tunnels:
Uniform Tunnel
Pipe Tunnel
MPLS QoS based on DiffServ model supports good scalability and implements ETE QoS
via tunnel. The congestion certainly leads to delay and packet loss, which will affect QoS
of some services which are sensitive to delay and packet loss. MPLS-TE efficiently
manages bandwidth resources to improve network QoS, so as to prevent out-tunnel
congestion from affecting in-tunnel service. The bandwidth management and MPLS-TE
tunnel can implement the scheduling based on CoS. For example, when EF, AF and BE
services are in the same MPLS-TE tunnel, EF and AF services will be affected seriously.
ZXCTN 6150 combines MPLS-TE and DiffServ to enable IP/MPLS core network to
identify different services and create tunnels accordingly, so as to guarantee the
bandwidth of high-priority service. ZXCTN 6150 supports the QoS scheduling in MPLS
VPN and the Diff-Serv scheduling in VPN, so as to forward VPN key services in high
priority.
ZXCTN 6150 supports service based PW and maps and the PW to the corresponding
MPLS tunnel to implement service-based ETE QoS. It supports simple and easy
deployment, bandwidth planning & management to offer differentiated multiservice
management and operation.
MPLS Tunnel OAM provides MPLS network with complete failure detection and
positioning mechanisms, and network performance monitoring at Tunnel layer.
MPLS Tunnel OAM mechanism can effectively detect, confirm and position the cache
and monitor network performance within MPLS layer. The equipment can use OAM
detection status to trigger protection switching and realize fast failure detection & service
protection.
ZXCTN series equipment supports MPLS Tunnel OAM functions such as Ping and
Traceroute etc.
LSP BFD
LSP Ping expands the checkout of data layer while BFD defines a light-load
checkout measurement of data layer (the fixed frame length of BFD suits
implementation by hardware).
BFD for LSP carries BFD packets on the detected LSP tunnel. The gone-through
BFD packets data must be exactly the same with that for LSP path. When they go
out at the LSP egress, BFD packets are submitted to the upper layer module for
checkout.
If BFD is adopted to detect LSP defects and FRR is implemented for protection,
BFD detection period should be set larger than FRR protection speed. When FRR
protects LSP, it may cause BFD packet jitter or even loss. So when FRR completes
LSP protection, it’s not necessary for the upper layer to detect LSP failure.
Otherwise it may leads to frequent switching between upper and lower layers.
If BFD for LSP is not used with LSP Ping, parameters in BFD configuration process
should be manually specified.
3.9.1.2 PW OAM
PW OAM mechanism can effectively detect, confirm and position the defects, and
monitor network performance in PW layer. The equipment can use OAM detecting status
to trigger protection switching and implement fast failure detecting and service protection.
ZXCTN series equipment supports PW OAM functions such as Ping and Traceroute.
PW BFD
The specific requirements and processing process of BFD for PW is similar to BFD
for LSP. The major difference lies in the fact that BFD is encapsulated under PW.
OAM functions which are implemented by TMS, TMP and TMC of MPLS-TP are shown
in the following table. Please refer to IETF draft-bhh-mpls-tp-oam-y1731-04.txt needs for
OAM functions.
ZXCTN 6150 MPLS-TP performance management functions are shown in the Table 3-9.
Y.1731-based MPLS-TP
Based on IETF GACH coding format, referring to OAM PDU format definition of
ITU-T Y.1731 Ethernet service, OAM PDU coding format in ZXCTN network is
shown in Figure 3-23.
Continuity check
and connectivity
Support Support Support
verification
(CC/CV)
Active Failure
Remote Defect
OAM management Support Support Support
Indication (RDI)
Alarm suppression
NA Support Support
(FDI/AIS)
Customer Signal
NA Support Support
Failure (CSF)
Loss
Performance
Measurement Support Support Support
monitoring
(LM)
LoopBack (LB)
Support Support Support
Failure (OAM packets)
management
Trace(LT) NA Support Support
and
Test (TST) Support Support Support
positioning
Lock (LCK) Support Support Support
OAM on
demand Loss
Measurement Support Support Support
Performance (LM)
monitoring Delay
Measurement Support Support Support
(DM)
As shown in the above figure, Ethernet OAM is divided into the following two levels:
Link-level Ethernet OAM: mainly applied between PE-CE-user equipment (last mile)
Ethernet physical link to monitor the link status between user network and
operator’s network. The typical protocol is EFM OAM.
The typical Ethernet OAM protocol for each level is shown in the Table 3-11.
Application Protocol
Protocol name Description
level standard
Application Protocol
Protocol name Description
level standard
This section gives an introduction to ZXCTN 6150 network-level Ethernet OAM functions.
The next section will shed light on link-level OAM functions.
ZXCTN 6150 supports IEEE 802.1ag and ITU-T Y.1731 at the same time to realize fault
management and performance monitoring of Ethernet services, as shown in Table 3-12.
LT Link Track
ETH-LB Loopback
Bi-directional packet
Bi-directional LM dropping ratio
measurement ITU-T Y.1731
Bi-directional delay
Bi-directional DM
measureent
ZXCTN 6150 supports 802.3ah-based Ethernet link layer OAM functions to realize
loopback and link monitoring of Ethernet access link.
Loopback command
OAM remote loopback
sending and responding
3.9.5 BFD
BFD (Bidirectional Forwarding Detection) is a kind of failure detection function with light
load and short duration. It can implement failure detection on any type of channels
between systems including directly-connecting physical link, virtual circuit, tunnel, and
multi-hop route.
BFD can implement fast detection of communication failure between adjacent systems. It
sends detection packets regularly on the channel where BFD session is set up between
a pair of systems. If a system hasn’t received the detection packets from the peer end in
Providing failure detection with light load and short duration for channels with BFD
session set up.
Implementing real-time detection of any media and any protocol layer with a single
mechanism.
Usually OSPF implements route convergence by using OSPF Hello frames detection
mechanism to determine link status. With this method, Hello frame sending period limits
cause slow route convergence in case of topology change. BFD is a universal fast
detection mechanism. Initiating BFD between OSPF neighbors can dramatically improve
failed link detection rate, so as to improve route recovery convergence rate.
At this time BFD encapsulation is delivered by signaling channel in the normal way of
IP/UDP. BFD session setting up process is established by management plane based on
OSPF instance interface.
BFD session detects alarm message and then notifies OSPF instance.
ISIS relies on ISIS protocol frame detection mechanism to determine link status when it
implements route convergence. With this method, ISIS protocol frame sending period
limits cause slow route convergence in case of topology change. BFD is a universal fast
detection mechanism. Initiating BFD between ISIS neighbors can dramatically improve
failed link detection rate, so as to improve route recovery convergence rate.
At this time BFD encapsulation is delivered by signaling channel in the normal way of
IP/UDP. BFD session setting up process is established by management plane based on
ISIS interface.
VRRP group main/standby nodes check whether the other side has failures or not by
slow hello protocol. With this method, hello packets sending period limits cause second
level failures. BFD is a universal fast detection mechanism. Initiating BFD detection
between VRRP main/standby equipment can dramatically improve failed link detection
rate, so as to improve VRRP switching rate.
At this time BFD encapsulation is delivered by signaling channel in the normal way of
IP/UDP. BFD session setting up process is established by management plane based on
VRRP group interface.
BFD session detects alarm message and then notifies VRRP group to take switching.
SME card consists of CONTROL unit, switching unit, clock unit and other communication
units. SME 1+1 protection is available when two cards are installed.
ZXCTN 6150 SME 1+1 protection parameters are shown in the following table:
CONTROL unit
Protected unit Switching unit
Clock unit
Restoration
Non-return mode
mode
Protection
< 50ms
time
ZXCTN 6150 is equipped with two -48V DC power boards both of which act as hot
backup for each other. When one power board fails, the other will keep the equipment in
normal operation.
Hot-standby LSP initiates set-up after main tunnel LSP is created. When main tunnel
LSP failure message is delivered to ingress router, the traffic will be switched to
Hot-standby path LSP. When main tunnel LSP recovers, the traffic will be switched back.
Because of permanent Merge dual-receiving at destination end for path protection based
on single directional MPLS tunnel, it is unnecessary to implement APS protocol for
switching. Sending port is determined at source end based on the failure status of work
path and protection path.
Checking methods:
FRR (Fast Reroute) is a protection implemented by reserving extra resource for fast local
protection. It is usually deployed in network with high reliability requirement. When there
is a local failure in network, FRR can quickly switch the traffic to Bypass Tunnel with little
impact on data service.
PLR: Point of Local Repair. Head node of Bypass LSP. It must be on the
main LSP path and not be the tail node.
MP: Merge Point. Tail node of Bypass LSP. It must be on the main LSP
path and not be the head node.
Link protection: there is a link directly connecting PLR and MP. Main LSP
goes through this link. When the link fails, traffic can be switched to
Bypass LSP.
Bypass Tunnel is a Tunnel without FRR attribute. When the tunnel is designated to
protect other Tunnels going through a physical interface, the Tunnel becomes
Bypass Tunnel. Bypass Tunnel setup is triggered by manual configuration on PLR.
That is to say, this Tunnel cannot be embedded and protected by FRR.
Bypass is shown in the above figure. The blue one is main LSP and the red one is
Bypass Tunnel. FRR protects link and node connecting to PLR. When the link or
node fails, data on main Tunnel will be switched to Bypass Tunnel. After the
switching, the original LSP path information will be deleted.
Head node can configure multiple optional paths for protection LSP and
permit re-optimization of LSP. The principle of path optimization is less
hops, more available resource, and smaller metric.
In Tunnel 1+1 protection, services are transmitted simultaneously in both working &
protection channels and received selectively. When a fault occurs to working channel,
the receiving end selectively receives the services from protection channel for service
switching.
In 1+1 architecture, the protection tunnel is private for each working tunnel. The working
tunnel bridges the protection tunnel at the source end of the protection domain. 1+1
tunnel protection is a kind of unidirectional switchover, which means only the links under
affection switches over to the protection tunnel. To avoid single-point fault, the working
tunnel and protection tunnel should use independent routes.
Figure 3-28 Unidirectional 1+1 Tunnel Protection Switching (Working Link Fault)
Tunnel 1:1 protection reserves unidirectional service sending and receiving. Extension
APS protocol is transferred via the protection tunnel, sending mutual protocol status and
switchover status. Devices of both sides implement service switchover as per protocol
and switchover status.
In 1:1 architecture, the protection tunnel is private for each working tunnel. The
switchover of 1:1 path protection is bidirectional switchover. In other words, the affected
connections and unaffected connections are switched over to the protection tunnel. To
avoid single-point fault, the working tunnel and the protection tunnel should follow
independent routes.
Figure 3-30 Bidirectional 1:1 Tunnel Protection Switching (Working Connection Z-A
Fails)
When ZXCTN 6150 configures PW 1+1/1:1 protection, it supports services with the sink
source but different sink destination. According to customer service failure signal, it
implements protection switchover.
When ZXCTN 6150 configures 1:1 protection, it usually allows the protection tunnel to
bear services.
Ring protection saves fiber and network resource, and fulfills protection switching within
50ms in compliance with strict protection time requirements of the transport network.
ZXCTN 6150 supports Wrapping and Steering ring protection, and shared ring
protection.
Wrapping Protection
When network node is found failed, the neighbor node of the fault will send
switchover request to the neighbor node via APS protocol. When one node inspects
fault or switchover request, common services sent to the invalid node will be
switched over to another direction (far from the invalid node). When the network
recovers or APS protocol request disappears, services will be restored to the
original path. The protection principle is as shown in the following table.
Dual homing is a network topology in which base station services go through the bearer
network and then terminate at two service access point equipments, both of which
connect the RNC. Based on this network topology, dual homing protection is
implemented by employing some related technique to provide protection for the service
access point equipments and access links. When failures occur in the main access point
equipment or access link, service frames can be transported to the RNC through the
redundant access point device or access link.
As shown above, the bearer network connects to the main and redundant GE interfaces
of the RNC through two access devices, of which one is working (device B here) and the
other is redundant (device C here). In normal state, the working path is shown as red real
line by NodeB-A-B-RNC. When a failure occurs at device B or on the access link
between device B and the RNC, related OAM frames will sent to device A. Dual homing
protection works and switchover happens at device A. Meanwhile the RNC detects the
failure and switches to device C for transmitting and receiving service frames. The
working path now is shown as the red dashed line.
In the case bearer networks employ ring protection mechanisms, two architectures can
be deployed when two rings interwork with each other, one of which is single node
interconnection and the other one is dual-node interconnection. There is only one
interworking node in the single node interconnection case, so this architecture is fragile
and the interconnection services will interrupt when the interworking node fails. Therefore
dual-node interconnection (DNI) can be deployed to enhance the reliability of the
interconnection services. In the architecture two rings interwork through dual nodes with
the redundant mechanism, DNI can be adopted to ensure that the interconnection
services between the two rings be transported through the redundant interconnection
node in case that the working one fails.
ZXCTN 6150 supports DNI protection of two architecture models shown as above, and
provides protection against interconnection node defects, link defects and multi-node
failures.
Ethernet LAG protection can share or not share port load. In load sharing mode, the
device will share services to multiple physical ports of the aggregation group
automatically. When one physical port fails, the traffic on this port will be shared to other
physical ports automatically. When the failure recovers, the traffic will be redistributed to
make sure the load shared by all aggregated ports. In non-load sharing mode, services
only exist in the active link in the aggregation group and the LAG is only a backup
mechanism. When the active link of the aggregation group fails, the system will activate
the standby link to protect the traffic of the failed link.
STP (Multiple Spanning Tree Protocol) can be used to eliminate network loop. STP
blocks some redundant paths with some algorithms and break down loop networks into
no-loop tree networks to prevent messages from growing and unlimitedly recycling in
loop network to avoid broadcast storm. The main difference between MSTP and STP &
RSTP is that MSTP can carry out the forwarding according to VLAN message and
balance VLAN load.
Provide BITS external clock input and output interfaces. ZXCTN 6150 has
1*external clock input/output interface (2.048 Mbit/s).
Support GPS interface function and provide one GPS antenna interface to connect
GPS receiver, which can be used to provide the system clock and distribute clock
for other systems.
Support network clock synchronization via E1 interface and provide clock signal
compliant with ITU-T G.813.
Clock unit supports SSM for clock synchronization to automatic select the
high-priority clock and avoids time loop.
ZXCTN 6150 supports Synchronous Ethernet clock at physical layer compliance with
G.8261.
Synchronous Ethernet extracts clock from physical-layer bit stream to obtain SDH-like
clock precision for network clock synchronization. The accuracy of Synchronous
Ethernet clock is related to physical layer but is independent to Ethernet link-layer load
and packet forwarding delay.
ZXCTN 6150 supports IEEE 1588v2 protocol for clock and time synchronization.
IEEE 1588v2 is a precise time synchronization protocol (PTP protocol for short). It is a
master/slave synchronization system. In system synchronization, the master equipment
periodically releases PTP protocol and time information, and the slave clock port
receives the time stamp information from master clock port. The system calculates time
delay on the cable and the time difference between master and slave, and adjusts local
time according to this difference. As a result, the slave equipment time can follow the
both frequency and phase of the master equipment time.
Most vendors in the industry use IEEE 1588v2 for time synchronization. With deep
research in clock synchronization and data networks area, ZTE thinks that 1588
message may has uncontrolled jitter and asymmetry in complex data network scenarios,
which will cause some difficulties in restoring clock and time precision. Combining
several packet synchronization technologies, ZTE proposes unique "time
synchronization Ethernet" solution, which carries out 1588V2 time synchronization over
synchronization Ethernet, and insert & extract of 1588 protocol precise time stamp over
hardware so as to improve time synchronization precision.
ZXCTN 6150 supports 1588v2-based frequency recovery function and implements the
clock synchronization via frequency recovery of the 1588v2 protocol frames.
Employing this function, the clock synchronization reference can be transported through
the asynchronous switch networks to implement clock synchronization.
To ensure the performance of CES operations, ZXCTN 6150 supports the following CES
clock restoring mechanisms:
Adaptive mode
Retiming mode
3.12 Security
The equipment offers different AAA functions for different user authentication policies.
According to different access authentication requirement, different access authentication
policy can be configured to provide different authentication and authorization for different
users.
Direct trust authorization: Direct authorization made due to the trust in users,
without account.
ZXCTN 6150 enables a user to make Telnet login via Ethernet interface. The equipment
needs to authenticate login users for the consideration of security. Only authenticated
users can log in and perform configuration & maintenance operations.
ZXCTN 6150 supports hierarchical protection for operation and maintenance command
lines. The command lines have 4 levels: visit, supervision, configuration and
administration, and the login users have the corresponding 4 levels. After logging in
ZXCTN 6000, the user can only operation the commands which are equal to lower than
the lever of the user.
ZXCTN 6150 can extend command levels and user levels (level mapping) to map 4
levels to 16 levels, so as to make fine management of user levels.
ZXCTN 6150 has different protocol security authentication functions for SSH, PPP,
routing protocol, SNMP, etc.
ZXCTN 6150 isolates interfaces with VLAN and extension technologies such as PVLAN
and QinQ to shield client network from carrier network for the security of client service
network, and to control unnecessary broadcast to increase network throughput.
IP VPN based on IP/MPLS MPLS-TP can isolate services very well with good QoS,
scalability and manageability.
ZXCTN 6150 filters illegal messages with "VLAN+MAC" to improve network security. The
administrator adds static table item to MAC address table and binds a specific MAC
address to an interface to prevent the attack based on MAC address spoofing.
ZXCTN 6150 can filter illegal MAC. When the maintenance staff is aware of the
possibility of the attack by the message of a MAC address, the MAC will be configured
manually to illegal MAC. When the equipment receives a message, it will compare the
source or destination MAC address of the message with the items in the MAC address. If
the MAC is illegal MAC in the table, the message will be discarded and the source will not
be notified.
In addition, ZXCTN 6150 applies ACL to port. By analyzing the information such as
VLAN, IP address, port number and protocol number, it can automatically filter illegal
messages to prevent network attack.
ZXCTN 6150 also supports the following check and features to against attack:
LAND
Smurf
Teardrop
Ping of Death
4 System structure
ZXCTN 6150 adopts the large-capacity rack structure. Its hardware system comprises
chassis, backplane, fan plug-in box, power module, SME and LIC
Subrack
Structure and slot: ZXCTN 6150 horizontal-insertion subrack consists of LIC area, SME
area, power board area and fan area.
Slot allocation
ZXCTN 6150 subrack has 11 board slots: 6 for LIC, 2 for SME, 2 for power board and 1
for fan
ZXCTN 6150 adopts the centralized switching structure. For ordinary service flow, after
processed by physical-layer chip, packets are directly sent to the switching chip of SME
and then to the corresponding board ports via the switching network. For some special
service messages, e.g. 1588 PTP message or OAM message, before sent to the
switching network, packets are pre-processed by the boards and then sent to the
switching chip of SME for termination or forwarding.
ZXCTN 6150 hardware system comprises SME, service boards, power, fan and
backplane. It adopts the centralized structure. The core is 1+1 SME which have main
control, switching and clock functions and communicate with other components via
backplane. ZXCTN 6150 working principle is shown:
Data channel
There is data channel between service board and active/standby SME via bidirectional
serdes bus.
Control channel
Active SME provides service board with management control channel connected to
standby SME. Control information connection diagnoses service board, power and fan,
controls information access and monitors alarms, e.g., access PHY-layer status, control
port indicator, and monitor the signals of board type, board in-position, resetting,
disconnection and fan abnormality.
Clock control
Line restoration clock reference and 1588 clock information sent from service board to
SME.
2M BITS clock, GPS PPS (Pulse per Second) and TOD signals received by SME.
4.2.1.1 Overview
ZXCTN 6150 have processing boards (including protection board), SME, fan control
board and power control board. ZXCTN 6150 board type and function are shown inTable
4-1.
1. XGEx2(O)
XGEx2(O) is 2-Port 10 Gigabit Ethernet Optical interface Board which has 2*10GE
SFP+ optical interface. It supports the following function:
Function and
Description
feature
LAG Support
ii. Panel
XGEx2 has 6indicators on the panel. 2 port indicators below each optical
interface indicate port link and data transmission. RUN and ALM indicate
board operation.
2. XGEx1(O)
XGEx1(O) is 1-Port 10 Gigabit Ethernet Optical interface Board which has 1*10GE
SFP+ optical interface. It supports the following function:
Function and
Description
feature
LAG Support
Function and
Description
feature
ii. Panel
XGEx1(O) has 4 indicators on the panel. 2 port indicators below the optical
interface indicate port link and data transmission. RUN and ALM indicate
board operation.
3. GEx8(O)
This section introduces GEx8(O) (8-Port Gigabit Ethernet Optical Interfaces Board)
function and feature, principle, panel, slot, etc.
GEx8(O) is the Gigabit Ethernet board which has 8-port Gigabit SFP optical
interface. It supports the following function:
Function and
Description
feature
Intra/inter-LAG Support
ii. Panel
GEx8(O) has 8-port pluggable Gigabit SFP optical interface supporting several
transmission distances.
GEx8(O) has 18 indicators on the panel. 16 indicators of port 1-8 indicate port
link and data transceiving. RUN and ALM indicate board operation.
4. GECHx4(O)
GECHx4(O) is the enhanced Combo board which has 4 Gigabit SFP optical
interfaces and 4 Gigabit Ethernet electrical interfaces. Optical interface and
electrical interface of the same number cannot be used at the same time. For
example, when No.1 electrical interface is used, No.1 SFP optical interface will
be disabled. It supports the following function:
Function and
Description
feature
Intra/inter-LAG Support
d) Synchronization Ethernet
c) Forced mode
e) a) Cable test
f) Synchronization Ethernet
ii. Panel
5. GECx4(O)
This section introduces GECx4 V2(Enhanced Gigabit Ethernet Combo interface Board)
function, panel, slot, etc.
GECx4(O) is the Combo board which has 4 Gigabit SFP optical interfaces
and 4 Gigabit Ethernet electrical interfaces. The difference between
GECHx4(O) and GECx4(O) is that GECx4(O) adopts the new generation
chips. Optical interface and electrical interface of the same number cannot be
used at the same time. For example, when No.1 electrical interface is used,
No.1 SFP optical interface will be disabled. It supports the following function:
Function and
Description
feature
Function and
Description
feature
Intra/inter-LAG Support
d) Synchronization Ethernet
c) Forced mode
e) b) Cable test
f) Synchronization Ethernet
iv. Panel
6. FEx8(E)
This section introduces FEx8(E) (8-Port Fast Ethernet Electrical Interface Board) function
and feature, principle, panel, slot, etc.
FEx8(E) is the 8 Port Fast Ethernet Electrical Interface Board which has 8
RJ45 electrical interfaces. It supports the following function:
Function and
Description
feature
Intra/inter-LAG Support
ii. Panel
FEx8(E) has 18 indicators on the panel. 16 indicators of port 1-8 indicate port link and
data transceiving. RUN and ALM indicate board operation.
7. FEx8(OE)
This section introduces FEx8(OE) (Fast Ethernet Optical & Electrical Interface Board)
function, panel, slot, etc.
FEx8(OE) is the enhanced Combo board which has 4 Fast Ethernet SFP
optical interfaces and 4 RJ45 electrical interfaces. It supports the following
function:
Function and
Description
feature
Intra/inter-LAG Support
Function and
Description
feature
d) Synchronization Ethernet
c) Forced mode
e) c) Cable test
f) Synchronization Ethernet
ii. Panel
FEx8(OE) has 18 indicators on the panel. 16 indicators are above 4 electrical interfaces
and 4 optical interfaces. RUN and ALM indicate board operation.
8. STM-1x4(O)
b) CES supports timeslot compression. The user selects any two or more
among 1 ~ 31 timeslots of channelized E1 to transmit services.
c) Support LMSP 1+1 and 1:1 protection. Switching time is smaller than
50ms. When inter-board LMSP protection is configured, optical interface
numbers should be consistent.
ii. When the port is configured as CEP STM-1, STM-1x4 board maps VC4 data to
PW to support CEP and the following functions
b) The default payload length is 783 bytes (TUG0-3), the length can be
configured between 783 bytes and 9170 bytes.
c) Support LMSP 1+1 and 1:1 protection. Switching time is smaller than
50ms. When inter-board LMSP protection is configured, optical interface
numbers should be consistent.
iii. Panel
10. E1x16-75
E1x16-75, the E1 circuit emulation board, has 16 *E1 75 ohm interfaces and supports
TDM E1 function. TDM E1 supports structured or unstructured circuit emulation.
h) Support adaptive clock restoration and CES output clock drift control.
E1x16-75 accesses at most 16 *E1 via interface board to support CES with
features as below.
a) Each board supports at most 16*E1 CES and one CES is related to one
PW.
b) CES supports timeslot compression. The user selects any two or more
among 1 ~ 31 timeslots of channelized E1 to transmit services.
ii. Panel
11. E1x16-120
E1x16-120, the E1 circuit emulation board, has 16 *E1 120 ohm interfaces and supports
TDM E1 function. TDM E1 supports structured or unstructured circuit emulation.
h) Support adaptive clock restoration and CES output clock drift control.
E1x16-120 accesses at most 16 *E1 via interface board to support CES with
features as below.
a) Each board supports at most 16*E1 CES and one CES is related to one
PW.
b) CES supports timeslot compression. The user selects any two or more
among 1 ~ 31 timeslots of channelized E1 to transmit services.
ii. Panel
E1x16-120 has 1 circuit emulation jacks and supports 16*E1 interfaces. E1x16-120 V2
has 2 indicators: RUN and ALM indicate board operation
12. GPCB
GPCB, the GPCB (GPS PTP Clock) board, has 1 port GPS antenna interface, 1 port 2M
output interface and 1 port 2M input interface.
iii. Panel
GPCB has 6 indicators: MOD, Rx, LA, SP, ALM & RUM indicate board operation
4.2.1.3 SME
The ZXCTN 6150 SME, consists of control unit, switching unit and clock synchronization
unit. The system core board adopts 1+1 backup. SME units carry out such functions as
system control, routing, NM protocol, forwarding table maintenance, service data
forwarding and clock synchronization. SME in 1+1 redundant configuration can make
active/standby switching.
1. Panel
SME has 5 RJ45 functional interfaces, e.g., BTS/GPS, GPS, ALM (external alarm
input/output), LCT (local management interface) and Qx (NM interface),.
SME has 6 indicators, e.g., RUN, ALM, MST, CLK,GPS1 & GPS2.
1. DC power Supply
1. Brief introduction
ZXCTN 6150 has several fans drawing cool air from right intake vent to left outtake vent.
The cool air dissipates the heat from boards which employ aluminum heat-sink parts.
The air filter at the vent can be taken down for maintenance and cleanness.
ZXCTN 6150 FAN panel has 2 indicators. “RUN” indicates the fan operation status and
“ALM” indicates the fan fault. FAN has control circuit controlling fan speed. SME monitors
the temperature of the whole system and controls fan speed with FAN control circuit.
ZXCTN 6150 system software structure comprises three planes which are management
plane, control plane and data plane. Board software runs on various planes based on
functions, and implements management and control of boards, NEs and the whole
network.
ZXCTN 6150 software is designed with a hierarchical architecture. Each layer performs
specific functions and serves its upper layer.
The EMS software NetNumen U31 is used to manage and monitor ZXCTN 6150 NEs. It
provides the functions of configuration management, fault management, performance
management, maintenance management, end-to-end circuit management, security
management, system management and report management. The following figure
illustrates the architecture of NetNumen U31 EMS software.
Manager
Also called "Server", Manager acts as the service of GUI. It exchanges information
with Agent via Qx interface. Manager provides the following fucntions:
Receive requests from GUI, analyze the requests and forward related
information to Agent or just send the information to Database.
Receive information from Agent, analyze the information and then forward
it to Database or GUI.
GUI
Database
Name Description
Name Description
ZXCTN 6150 leverages on ZXROS (Router Operation System) platform to offer varieties
service functions and performances required by metro Ethernet switch. Its software
architecture is shown in following figure.
Diagnosis and
Alarm log VPWS VPLS ACL QOS
debugging
Monitoring and
S NMP PBB - TE MPLS - TP Routing tunnel IP VPN
maintenance
Equipment Cluster
Remote logon IPTV ETHoTDM TDMoE
management management
File L2L3
Command line VLAN MAC ZESR
management multicast
System
System service
management Business & service
Hardware & drive: provide software drive for main control board, line card,
backplane, fan and power supply;
System service: provide command line CLI, remote logon (telnet and ssh), SNMP
(Simple Network Management Protocol) and alarm log; diversified system service
offerings ease equipment operation and maintenance;
Good encapsulation
Provide fast fault localization; fully ensure the high stability of product
version.
IEEE 802.1w Rapid Spanning Tree IEEE 802.3ag Service Layer OAM
9216 bytes jumbo frame forward on IEEE 802.1ab LLDP(Link Layer Discovery
Ethernet and pos interface Protocol)
RFC 2328 TFTP Blocksize Option RFC 2347 TFTP option Extension
draft-ietf-bfd-mib-00.txt Bidirectional
draft-ietf-bfd-base-02.txt Bidirectional
Forwarding Detection Management
Forwarding Detection
Information Base
RFC 2370 Opaque LSA Support RFC 2740 OSPF for IPv6(OSPFv3)
RFC 1397 BGP Default Route RFC 1772 Application of BGP in the
Advertisement Internet
RFC 1965 Confederations for BGP RFC 1997 BGP Attribute Communities
draft-ietf-idr-rfc2796bis-02.txt draft-ietf-idr-rfc2858bis-09.txt
RFC 4724 Graceful Restart Mechanism RFC 4760 Multi-protocol Extensions for
for BGP-GR helper BGP
6. ISIS standard:
ISIS standard
RFC 1142 OSI IS-IS Intra-domain Routing RFC 1195 Use of OSI IS-IS for
Protocol (ISO 10589) routing in TCP/IP & dual environments
ISIS standard
RFC 3847 Restart Signaling for IS-IS-GR RFC 4205 for Shared Risk Link Group
helper (SRLG) TLV
draft-ietf-isis-igp-p2p-over-lan-05.txt
7. VRRP standard:
VRRP standard
8. LDP standard:
LDP standard
9. IPV6 standard
IPV6 standard
RFC 2464 Transmission of IPv6 Packets RFC 2529 Transmission of IPv6 over IPv4
over Ethernet Networks Domains without Explicit Tunnels
RFC 2545 Use of BGP-4 Multi-protocol RFC 2710 Multicast Listener Discovery
Extension for IPv6 Inter-Domain Routing (MLD) for IPv6
IPV6 standard
RFC 4007 IPv6 Scoped Address RFC 4193 Unique Local IPv6 Unicast
Architecture Addresses
RFC 1112 Host Extensions for IP RFC 2236 Internet Group Man-agement
Multicasting(Snooping) Protocol
RFC 4601 Protocol Independent RFC 4604 Using IGMPv3 and MLDv2 for
Multicast-Sparse Mode(PIM-SM) Source-Specific Multicast
draft-rosen-vpn-mcast-08.txt draft-ietf-mboned-msdp-mib-01.txt
MPLS standard
RFC 4182 Removing a Restriction on the RFC 4379 Detecting Multi-Protocol Label
use of MPLS Explicit NULL Switched (MPLS) Data Plane Failures
RFC 2702 Requirements for Traffic RFC 4090 Fast reroute Extensions to
Engineering over MPLS RSVP-TE for LSP Tunnels
RFC 1990 The PPP Multilink RFC 2516 A Method for Transmitting
Protocol(MP) PPP Over Ethernet
ATM standard
RFC 1626 Default IP MTU for use over RFC2684 Multi-Protocol Encapsulation
ATM AAL5 over ATM Adaptation Layer 5
GR-1113-CORE-Asynchronous Transfer
Mode (ATM) and ATM Adaptation AF-ILMI-0065.000 Integrated Local
Layer(AAL) Protocols Generic Management Interface(ILMI) Version4.0
equirements,IssuE1
18. PW standard:
PW standard
RFC 3916 Requirements for PWE3 RFC 4446 IANA Allocations for PWE3
PW standard
RFC 4619 Encapsulation Methods for RFC 4717 Encapsulation Methods for
Transport of Frame Relay over MPLS Transport ATM over MPLS Networks
Networks(draft-ietf-pwe3-frame-relay-07.txt) (draft-ietf-pwe3-atm-encap-10.txt)
RFC 4816 PWE3 ATM Transparent Cell RFC 5085,Pseudowire Virtual Circuit
Transport Connectivity Verification (VCCV):A
Service(draft-ietf-pwe3-cell-transport-04.txt) Control Channel for Pseudowires
draft-ietf-l2vpn-vpws-iw-oam-02.txt draft-ietf-pwe3-oam-msg-map-05-txt
draft-ietf-l2vpn-arp-mediation-04.txt draft-ietf-pwe3-ms-pw-arch-02.txt
draft-hart-pwe3-segmented-pw-vccv-0
draft-ietf-pwe3-segme nted-pw-05.txt
2.txt
draft-muley-dutta-pwe3-redundancy-bit-02.t
draft-muley-pwe3-redundancy-02.txt
xt
MFA Forum 9.0.0 The Use of Virtual trunks MFA Forum 12.0.0 Multiservice
for ATM/MPLS Control Plane Interworking Interworking-Ethernet over MPLS
19. NM standard:
NM standard
NM standard
NM standard
YD/T 852-1996 TMN General Design YD/T 871-1996 TMN Generic Information
Principle model
NM standard
draft-ietf-disman-alarm-mib-04.txt draft-ietf-ospf-mib-update-04.txt
draft-ietf-isis-wg-mib-05.txt draft-ietf-mpls-lsr-mib-06.txt
draft-ietf-mpls-te-mib-04.txt draft-ietf-mpls-ldp-mib-07.txt
Attribute Description
Equipment
Subrack mm (width *
physical 482.6*88.9*199
height * depth) (with ear)
dimensions
Attribute Description
Operating environment
-10°C~+50°C
temperature
Storage environment
-40°C~+70°C
temperature
Environment
requirements Relative humidity 5%~95%, non-congealing
Noise <55dB
Reliability ≥99.999%
Type Performance
Transmission
<15km <40km <80km
distance
Mean transmitting
-15~-8 dBm -5~0 dBm -5~0dBm
power
Minimum extinction
8.2dB 10.2dB 10.2dB
ratio
Receiver overload
-8dBm -10dBm -10dBm
optical power
Allowable frequency
deviation of optical >±20 ppm
input interface
Type Performance
Transmission
<15km <40km <80km
distance
Mean transmitting
-15~-8 dBm -3~2 dBm -3~2dBm
power
Minimum extinction
8.2dB 10dB 10dB
ratio
Receiver overload
-8dBm -8dBm -8dBm
optical power
Allowable frequency
deviation of optical >±20 ppm
input interface
Type Performance
Interface RJ45
Maximum transmission
100m
distance
Type Performance
Connector
LC LC LC LC LC
type
wavelength(n
850 1310 1310 1550 1550
m)
Transmitting
power -9.5~-4 -9~-3 -4~5 0~5 0~5
range(dBm)
receiving
sensitivity(dB ≤-17 ≤-20 ≤-22 ≤-22 ≤-30
m)
Type performance
Connector
LC LC LC LC
type
wavelength(
850 1310 1550 1550
nm)
Transmitting
power -7.3~-1 -5~-1 0~2 1~4
range(dBm)
Type performance
receiving
sensitivity(d ≤-11.1 ≤-14 ≤-16.5 ≤-26
Bm)
5.3.1 L2 Feature
Attribute Description
VLAN Support port-based VLAN
Attribute Description
Support unknown unicast/multicast designating
forwarding port
5.3.2 L3 Feature
Attribute Description
Attribute Description
Support ECMP
Attribute Description
Attribute Description
Service
Support AAA authentication
management
5.3.5 Reliability
GE interface
STM-N Link 1:1/1+1,
dual-homing < 50ms
return/non-return
protection
Intermediate node
has additional
/ < 50ms
assistant protection
group
STP
MSTP (Multi STP)
(Spanning Tree < 250ms
protection
Protocol) protection
Attribute Description
Attribute Description
PWE3 circuit SupportE1 and Ethernet FE/GE interface PWE3
PWE3
emulation circuit emulation.
feature
TDM circuit Support self-adaptive clock recovery
Attribute Description
timeslot Support E1 retiming
Attribute Description
Attribute Description
filtration service
Attribute Description
Support command line service
Support hierarchical management authority
Support password aging and confirmation service
Support console management service
Support user access service management service
Support SSH, TELNET, WEB, SNMP and SSL
remote access service.
Support multiple sorts of alarm (audio and light
alarm platform)
Cluster
LLDP
management
Attribute Description
ZXCTN 6150 employs NetNumen U31 to perform unified management and monitoring
for all NEs, offering configuration management, fault management, performance
management, Maintenance management, ETE circuit management, security
management, system management and report management functions.
NetNumen U31 is the network management system based on distributed and plug-in
design, serving as the unified management platform for all ZTE optical transmission
series. With multiple network management techniques, the system is designed and
developed in line with ITU-T TMN concept, enabling management and control of NE and
regional network on basis of ensuring transmission equipment functions. It offers robust
NE management function, end-to-end management function and flexible networking
capability.
Support remote access via SSH. Support remote access via SSH V1/V2, and allow
NM server to communicate with the equipment.
Provide FTP/Telnet interface. The equipment has FTP/Telnet server and client
functions.
NE communication management.
Unified NM function.
ZXCTN 6150 can perform equipment monitoring, management and maintenance via
multiple options, enable the equipment to perform corresponding exception handling in
case of the occurrence of various exceptions, and offer user with all running parameters
during equipment operation.
Offer four external alarm input/output interfaces, to ease equipment operation and
maintenance
Running, alarm state indicators are available at power supply, fan, main control and
all service boards, helping network administrator localize and handle failures in time
Support automatic online optical power detection and automatic shutdown of laser
for optical interface
The system monitors the software running state, and performs line card restart or
master-slave switching of main control board in case of the equipment’s normal
operation affected by the occurrence of exceptions
Support packet loading and remote loading of board and host software, and provide
mis-loading prevention and segmented download functions.
ZXCTN 6000 provides multiple diagnosis and debug measures, allowing users to
have a wider variety of methods and acquire more debug information during
equipment debug.
Ping and TraceRoute: check whether network connection is reachable; record the
transmission route of packet online, serving as reference for fault localization.
Debugging: provide rich debug commands targeting each software feature, each
debug command supports multiple debug parameters under flexible control. Debug
command can be used to output in details the processing, message
transmitting/receiving and error checking information during running of the feature.
Mirror function: support port-based mirror function, the messages from input, output
or both directions of observed interface are copied intact to the observing interface.
Main control board can be upgrade with main control unit redundant protection to avoid
disconnecting services during upgrade.
When upgrading other boards (in addition to main control board) with redundant
protection, the services will not be disconnected typically, or the disconnection time is
less than 50ms.
Support mis-loading prevention for software, rollback when upgrade fails, and the
reversible upgrade process.
7 Environment indices
7.1 Storage
The climate requirements for equipment storage are described in Table 7-1.
Item Index
Altitude ≤5000 m
Item Index
There must be no water on the storage room floor, so that the water will not leak on the
packing container of the equipment. Furthermore, the storage position should be far
away from the leaking places of the firefighting equipment and heating system.
If the equipment has to be stored outside, the requirements are listed as follows:
Ensure that the packing of the equipment is in good condition without any damages.
Rainwater-proof measures should be taken, so that the rainwater can not damage
the pack of the equipment.
Ensure no water in the storage place, so that the packing container of the
equipment will not be leaked.
7.2 Transportation
The climate requirements for equipment transportation are described in Table 7-2.
Item Index
Altitude ≤4000 m
There must be no water on the floor during the transportation so that the water will not
leak on the packing container of the equipment. Furthermore, the storage position should
be far away from the leaking places of the firefighting equipment and heating system.
Ensure that the packing of the equipment is in good condition without any damages.
7.3 Running
The environment temperature and relative humidity requirements for equipment running
are described in Table 7-3, other climate environment requirements are described in
Table 7-3.
Item Specifications
Note: temperature and humidity are measured 1.5m above the floor and 0.4m in front of
the equipment. Short term running means that the equipment working continuously for no
more than 96 hours and works for no more than 15 days in one year.
Item Index
Altitude ≤4000 m
Wind speed ≤5 m /s
7.4.1 Criteria
The following four criteria for test results should be determined before describing the
requirements for electromagnetic compatibility, as shown in the following table.
Criteria Description
Criteria Description
Digital signal port: The equipment runs normally in the test. The bit
error quantity does not exceed the maximum limit of the normal
requirement after single electromagnetic interference (The
Performance A maximum is 0 here).
Analog audio signal port: The connection is always normal in the
test. The noise signal of the test equipment (EUT), measured with
600Ohm impedance, does not exceed -40 dBm.
7.4.2 Anti-interference
8 kV 15 kV Performance R
iii. Signal line and control line port immunity (using capacitor coupling pliers)
Signal line and control line port immunity index is shown in Table 7-10.
Internal
Test mode Test voltage Criterion for test results
resistance
Line-to-line 2Ω ±4 kV Performance B
Line-to-ground 12 Ω ±6 kV Performance B
Internal
Test mode Test voltage Criterion for test results
resistance
Line-to-ground 40 Ω ±2 kV Performance B
Internal
Test mode Test voltage Criterion for test results
resistance
Line-to-ground 42 Ω ±1 kV Performance B
AC transient voltage dip and short interruption immunity index are shown in Table
7-16.
Note: The index is only applied to AC power supply (PWB board). It is compliant with
IEC61000-4-11 and GB/T 17626.11-1999.
DC transient voltage dip and short interruption immunity index are shown in Table 7-17.
0.1 - Performance A
80%
Voltage 10 - Performance A
variation 0.1 - Performance A
120%
10 - Performance A
Note: The index is only applied to DC power supply (PWA board). It is compliant with
IEC61000-4-11 and GB/T 17626.11-1999.
7.4.3 Interference
The interference consists of conducted emission and radiated emission. The indexes are
compliant with CISPR 22 and GB 9254 Class A.
1. Conducted emission
0.15~0.50 79 66
0.50~30.00 73 60
0.50~30.00 87 74
2. Radiated emission
30~230 40 50
230~1000 47 57
8 Abbreviation
Abbreviation Full name
AG Access Gateway
CE Carrier Ethernet
CV Connectivity Verification
FR Frame-relay Protocol
GR Graceful restart
NE Network Element
PRV Preview
PW Pseudo-wire
RP Rendezvous Point
TM Traffic Manager
9.1 IETF
RFC 3086 Definition of Differentiated Services Per Domain Behaviors and Rules for
their Specification
RFC 3247 Supplemental Information for the New Definition of the EF PHB (Expedited
Forwarding Per-Hop Behavior)
RFC 4127 Russian Dolls Bandwidth Constrains Model for Diffserv-aware MPLS
Traffic Engineering.
RFC 5086 Structure-aware TDM Circuit Emulation Service over Packet Switched
Network (CESoPSN)
9.2 ITU-T
G.704 Synchronous frame structures used at 1544, 6312, 2048, 8448 and 44 736
kbit/s hierarchical levels
G.706 Frame alignment and cyclic redundancy check (CRC) procedures relating
to basic frame structures defined in Recommendation G.704
G.707 Network Node Interface for the Synchronous Digital Hierarchy (SDH)
(V2003)
G.7042 Link capacity adjustment scheme (LCAS) for virtual concatenated signals
G.812 Timing requirements of slave clocks suitable for use as node clocks in
synchronization networks
G.823 Control of Jitter and Wander within Digital Networks Which Are Based on
the 2048 KBIT/S Hierarchy Series
G.824 Control of Jitter and Wander within Digital Networks Which are Based on
the 1544 kbit/s Hierarchy
G.825 The control of jitter and wander within digital networks which are based on
the synchronous digital hierarchy (SDH)
G.826 Error performance parameters and objectives for international, constant bit
rate digital paths at or above the primary rate
G.957 Optical interfaces for equipments and systems relating to the synchronous
digital hierarchy
G.958 Digital line systems based on the synchronous digital hierarchy for use on
optical fiber cables
9.3 IEEE
IEEE 802.3 Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
Access Method and Physical
IEEE 802.1ag Virtual Bridged Local Area Networks - Connectivity Fault Management
IEEE 802.3ah Media Access Control (MAC) Parameters, Physical Layers and
Management Parameters for Subscriber Access Networks
9.4 MEF
MEF 8 PDH circuit emulation service transport specification over Metro Ethernet