Professional Documents
Culture Documents
V600R003C00
Product Description
Issue 02
Date 2011-08-12
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Purpose
This document describes the product positioning and features, product architecture, link features,
service features, application scenarios, operation and maintenance, and technical specifications
of the HUAWEI NetEngine40E device.
This document provides an overall description of the HUAWEI NetEngine40E device, which
helps intended readers get a general understanding of all the product features.
Related Versions
The following table lists the product versions related to this document.
Intended Audience
This document is intended for:
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Change History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
Contents
3 Product Architecture.....................................................................................................................5
3.1 Physical Architecture..........................................................................................................................................6
3.2 Logical Architecture...........................................................................................................................................6
3.3 Software Architecture.........................................................................................................................................7
3.4 Data Forwarding Process....................................................................................................................................9
4 Technical Specifications.............................................................................................................11
5 Boards............................................................................................................................................14
5.1 FPIC..................................................................................................................................................................15
5.2 LPUI-40............................................................................................................................................................18
5.3 LPUI-41............................................................................................................................................................18
5.4 LPUI-100..........................................................................................................................................................19
5.5 LPUS-41...........................................................................................................................................................19
5.6 SPU...................................................................................................................................................................20
6 Link Features................................................................................................................................21
6.1 E1/CE1/T1/CT1/E3/T3/CT3 Link Features.....................................................................................................22
6.2 Ethernet Link Features......................................................................................................................................22
6.3 POS Link Features............................................................................................................................................23
6.4 CPOS Link Features.........................................................................................................................................24
6.5 ATM Link Features..........................................................................................................................................25
6.6 FR Link Features..............................................................................................................................................26
7 Service Features...........................................................................................................................27
7.1 Ethernet Features..............................................................................................................................................28
7.1.1 Layer 2 Ethernet Features........................................................................................................................28
7.1.2 Layer 3 Ethernet Features........................................................................................................................28
7.1.3 QinQ Features..........................................................................................................................................28
7.1.4 Flexible Access to VPNs.........................................................................................................................29
8 Applicable Environment............................................................................................................66
8.1 Application on an IP Bearer Network..............................................................................................................67
8.2 Application on an IPTV Bearer Network.........................................................................................................68
8.3 Application on a Multi-Service IP MAN.........................................................................................................69
8.4 Application on an IPv6 Backbone Network.....................................................................................................70
8.5 IP RAN Solution...............................................................................................................................................71
8.6 iVSE Solution...................................................................................................................................................73
9.7 NQA..................................................................................................................................................................80
9.8 In-Service Debugging.......................................................................................................................................80
9.9 Upgrade Features..............................................................................................................................................81
9.10 License............................................................................................................................................................81
9.11 Other Operation and Maintenance Features...................................................................................................81
10 NMS.............................................................................................................................................83
A Acronyms and Abbreviations..................................................................................................85
2 Product Positioning
NE40E-X3(AC) NE40E-8
3 Product Architecture
All systems except the network management system (NMS) are located in an integrated cabinet.
The power distribution system consists of power modules working in 1+1 backup mode.
The functional host system comprises the system backplane, /Main Processing Units (MPUs),
Line Processing Units (LPUs), and Switch and Fabric Units (SFUs). It is connected to the NMS
through NMS interfaces. The functional host system processes data as well as monitors and
manages the entire system, including the power distribution system and heat dissipation system.
Figure 3-1 shows the functional host system of the NE40E.
SFU module
(1) The link connects to the managment bus switching unit of another MPU
l Data plane
l Control and management plane
l Monitoring plane
Figure 3-2 shows the logical architecture.
Monitoring Monitoring
unit unit
Monitoring
plane System
monitoring unit Monitoring
Monitoring unit
unit
Management Management
System
unit unit
Control and controlling unit
management
plane Management Management
Switching
unit unit
network
control unit
Forwarding Forwarding
unit unit
Data plane
Switching
Forwarding network Forwarding
unit unit
LPU LPU
l The data plane is responsible for high speed processing and non-blocking switching of data
packets. It encapsulates or decapsulates packets, forwards IPv4/IPv6/MPLS packets,
performs QoS as well as scheduling and internal high-speed switching, and collects
statistics.
l The control and management plane completes all control and management functions for
the system and is the core of the entire system. Control and management units process
protocols and signals, and maintain, manage, report on, and control system status.
l The monitoring plane monitors the ambient environment to ensure secure and stable
operation of the system. It detects voltage levels, controls system power-on and-off,
monitors temperature, and controls fan modules. When a unit fails, the monitoring plane
isolates the faulty unit promptly so that other parts of the system can continue to run
normally.
Power FAN
Monitoring Monitoring
RPS RPS
SNMP
Master Slave
IPC
LPU
FSU FSU FSU FSU
EFU EFU
EFU EFU
Software of the NE40E consists of the Routing Process System (RPS), power monitoring system,
fan monitoring system, Forwarding Support Unit (FSU), and Express Forwarding Unit (EFU).
l The RPS, which includes IPOS software, VRP software, and product-adaptation software,
is the control and management module that runs on the MPU. The RPS on the active MPU
and the one on the standby MPU back up each other. RPSs support IPv4/IPv6, MPLS, LDP,
and routing protocols, calculate routes, establish LSPs and multicast distribution trees,
generate unicast, multicast, and MPLS forwarding tables, and they deliver information
concerning all the preceding mentioned to the LPU.
l The FSU implements the functions of the link layer and some functions of the IP protocol
stack on interfaces.
l The EFU performs hardware-based IPv4/IPv6 forwarding, multicast forwarding, MPLS
forwarding, and has a statistics functions.
PIC
Datagram Datagram
Congestion Queue
QoS in the management scheduling QoS in the
upstream Queue Congestion downstream
scheduling management
TM Multicast replication
As shown in Figure 3-4, the Packet Forwarding Engine (PFE) adopts a Network Processor (NP)
or an Application Specific Integrated Circuit (ASIC) to implement high-speed packet routing.
External memory types include Static Random Access Memory (SRAM), Dynamic Random
Access Memory (DRAM), and Net Search Engine (NSE). The SRAM stores forwarding entries;
the DRAM stores packets; the NSE performs non-linear searching.
Data forwarding processes can be divided into upstream and downstream processes based on
the direction of the data flow.
l Upstream process: The Physical Interface Card (PIC) encapsulates packets to frames and
then sends them to the PFE. On the PFE of the inbound interface, the system decapsulates
the frames and identifies the packet types. It then classifies traffic according to the QoS
configurations on the inbound interface. After traffic classification, the system searches the
Forwarding Information Base (FIB) for the outbound interfaces and next hops of packets
to be forwarded. To forward an IPv4 unicast packet, for instance, the system searches the
FIB for the outbound interface and next hop according to the destination IP address of the
packet. Finally, the system sends the packets containing information about outbound
interfaces and next hops to the traffic management (TM) module.
l Downstream process: Information about packet types that have been identified in the
upstream process and about the outbound interfaces is encapsulated through the link layer
protocol and the packets are stored in corresponding queues for transmission. If an IPv4
packet whose outbound interface is an Ethernet interface, the system needs to obtain the
MAC address of the next hop. Outgoing traffic is then classified according to the QoS
configurations on the outbound interfaces. Finally, the system encapsulates the packets
with new Layer 2 headers on the outbound interfaces and sends them to the PIC.
4 Technical Specifications
Heat dissipation 21089 BTU/ 10707 BTU/ 3569 BTU/ 7137 BTU/
hour hour hour hour
Forwarding capacity 3200 Mpps 1600 Mpps 300 Mpps 400 Mpps
Interface capacity 3.2 Tbit/s 1.6 Tbit/s 240 Gbit/s 320 Gbit/s
(bidirectional) (bidirectional) (bidirectional) (bidirectional) (bidirectional)
Flash 32 MB 32 MB 32 MB 32 MB
5 Boards
5.1 FPIC
5.2 LPUI-40
5.3 LPUI-41
5.4 LPUI-100
5.5 LPUS-41
5.6 SPU
5.1 FPIC
LPUF-10 and Its FPICs
The LPUF-10 provides four sub-slots and supports a maximum of 10 Gbit/s bandwidth.
The LPUF-10 FPICs support hot swapping and automatic configuration restoration. The
LPUF-10 support installation of different types of FPICs.
FPIC Remarks
FPIC Remarks
FPIC Remarks
5.2 LPUI-40
The LPUI-40 can be used only on the NE40E-X16, NE40E-X8 and NE40E-X3.
5.3 LPUI-41
The LPUI-41 can be used only on the NE40E-X16, NE40E-X8, NE40E-X3.
5.4 LPUI-100
The LPUI-100 can be used only on the NE40E-X16 and NE40E-X8.
5.5 LPUS-41
The LPUS-41 can be used only on the NE40E-X16, NE40E-X8 and NE40E-X3.
5.6 SPU
Table 5-9 SPU
Board Name Remarks
6 Link Features
l PPP
l HDLC
l CRTP/ECRTP
l Interface loopback, including local loopback and remote loopback
l Configuration of the MTUs for IPv4 and MPLS packets
E1/CE1/T1/CT1 interfaces and their serial interfaces support the following link protocols:
l ATM
l TDM
l ATM IMA
l LCP
l IPCP
l MPLSCP
l PAP
l CHAP
E-Trunk, that is, Eth-Trunk interface whose member interfaces reside on different devices
l Association between Eth-Trunk links and BFD
l LACP defined in 802.3ad
The Link Aggregation Control Protocol (LACP) maintains link status according to interface
status. LACP adjusts or disables link aggregation in the case of aggregation changes.
l Virtual Ethernet interfaces
The NE40E supports virtual Ethernet (VE) interfaces. After an ATM Permanent Virtual
Circuit (PVC) is mapped to a manually-created VE interface, Ethernet frames can be
transmitted over the ATM Adaptation Layer (AAL5). This enables the VE interface to
provide Layer 2 switched services and Layer 3 IP services.
l Ethernet clock synchronization
l 1588v2 clock
l VLAN sub-interfaces
l Interface loopback, including local loopback and remote loopback
l SDH/SONENT encapsulation
l Point-to-Point Protocol (PPP) on POS interfaces
PPP supports the following protocols:
– Link Control Protocol (LCP)
– Internet Protocol Control Protocol (IPCP)
– Multi-Protocol Label Switching Control Protocol (MPLSCP)
– Password Authentication Protocol (PAP)
– Challenge Handshake Authentication Protocol (CHAP)
l High-level Data Link Control (HDLC) on POS interfaces
l FR on POS interfaces
l POS sub-interfaces
POS sub-interfaces support point-to-point (P2P) .
l IP-Trunk
The NE40E supports the following IP bundling modes:
– Inter-board IP bundling
– Inter-chassis IP bundling
– IP bundling of channels of different rates
– Dynamic creating and removing of IP-Trunk interfaces
– Bundling of a physical channel into an IP-Trunk by using commands on physical
interfaces
l Interface loopback, including local loopback and remote loopback
l Configuration of the MTUs for IPv4, IPv6, and MPLS packets
POS interfaces support SDH alarms at the section layer, line layer, and path layer.
l A POS interface prompts a fault and then notifies the control software on the board of the
fault.
l The control software of the board confirms the fault, updates the interface status, and then
notifies the MPU of the interface status.
l The MPU instructs the routing protocol to perform route convergence.
To ensure fast route convergence and network stability, the SPF timer and LSP timer need to be
configured on the POS interface to function together with route convergence.
l Channelization
The channelization granularity of CPOS interfaces is as follows:
– A 155 Mbit/s CPOS interface can be channalized into 63 E1 channels, 84 T1 channels,
or N x 64 kbit/s channels.
– A 155 Mbit/s CPOS interface can be channelized into 3 E3/T3 channels.
The E1 interface channalized from a CPOS interface, in compliance with SAToP, can
transparently transmit unstructured TDM services through PWs on an MPLS network.
The E1 interface channalized from a CPOS interface, in compliance with CESoPSN, can
transparently transmit structured TDM services through PWs on an MPLS network.
l PPP/HDLC/ATM/TDM/ATM IMA
The NE40E provides CPOS interfaces at 155 Mbit/s. At the link layer, CPOS interfaces
support the following protocols:
– PPP
– HDLC
– TDM
– ATM
– ATM IMA
– FR
PPP on CPOS interfaces supports the following protocols:
– LCP
– IPCP
– MPLSCP
– MP
– PAP
– CHAP
l CRTP/ECRTP on 155 Mbit/s CPOS interfaces and 64 kbit/s, E1, T1, T3, and E3 interfaces
channelized from a 155 Mbit/s CPOS interface
l Interface loopback, including local loopback and remote loopback
l SDH/SONENT encapsulation
ATM interfaces on the NE40E support SONET/SDH encapsulation and the SONET/SDH
overhead configuration and physical layer alarms.
l Permanent Virtual Path (PVP) or PVC
PVPs or PVCs can be created on ATM interfaces:
– VP/VC-based traffic shaping
– User-to-Network Interface (UNI) signaling
– Multiprotocol Encapsulation over ATM Adaptation Layer 5 in RFC 1483
– Classical IP and ARP over ATM in RFC 1577
– F4 or F5 End to End Loopback OAM
OAM functions in detecting the status of PVPs or PVCs.
– AAL5
– Nonreal-time Variable Bit Rate (nrt_VBR)
– Unspecified Bit Rate (UBR)
– Real-time Variable Bit Rate (rt_VBR)
– Constant Bit Rate (CBR)
l IPoA
The NE40E supports the following modes in setting up the mapping between a PVC and
the IP address of the peer device:
– Static mapping
– Inverse Address Resolution Protocol (InARP)
l IPoEoA access
l ATM sub-interfaces
l 1483B
1483B supported by the NE40E is applicable to IPoEoA. IPoEoA indicates that Ethernet
packets are carried over AAL5 and IP packets are carried over the Ethernet. This
implements Layer 2 forwarding of IPoEoA packets between the Ethernet and PVC. By
converging the ATM backbone network and the IP network, IPoEoA supports various
Ethernet and IP services.
l ATM cell relay
The NE40E supports PVC-based or PVP-based ATM cell relay and AAL5 SDU relay. The
NE40E supports the following ATM cell relay modes:
– Interface-based ATM cell relay
– 1-to-1 VCC cell relay
– N-to-1 VCC cell relay
– 1-to-1 VPC cell relay
– N-to-1 VPC cell relay
7 Service Features
l Default VLAN
l VLAN trunk
l VLANIF interfaces
l VLAN aggregation
l Inter-VLAN port isolation
l Ethernet sub-interfaces
l VLAN aggregated sub-interfaces
l Port number-based VLAN division
l VLAN mapping
l VLAN stacking
l MAC address limit
l Unknown unicast/multicast/broadcast suppression
l Spanning Tree Protocol (STP)/Rapid Spanning Tree Protocol (RSTP)
l Multiple Spanning Tree Protocol (MSTP)
l RRPP with switching time less than 50 ms
l IPv4
l IPv6
l MPLS
l Multicast
l VLAN sub-interfaces
l QoS
l Ethernet sub-interfaces
l VLAN aggregation sub-interfaces
l Identification of double VLAN tags (inner VLAN tag and outer VLAN tag)
tag is used for multiple services. In this case, the access device may add service access
information to the 802.1p or DSCP field. Then, the NE40E connected to the access device needs
to use the 802.1p or DSCP value to identify access users. This helps configure the accesses to
different VPNs and set up different QoS scheduling policies.
7.2 IP Features
7.2.1 IPv4/IPv6 Dual Stack
The IPv4/IPv6 dual stack can be easily implemented and can smoothly interoperate with other
protocols. Figure 7-1 shows the structure of the IPv4/IPv6 dual stack.
IPv4/IPv6 Application
TCP UDP
IPv4 IPv6
Link Layer
IPv4/IPv6 dual stack (including dual-stack VPN) is supported on the same interface.
l TCP/IP protocol suite, including ICMP, IP, TCP, UDP, socket (TCP/UDP/Raw IP), and
ARP
l Static DNS and specified DNS server
l FTP server/client and TFTP client
l DHCP relay agent and DHCP server
l Suppression of DHCP flooding
l Ping, tracert, and NQA
NQA can detect the status of ICMP, TCP, UDP, DHCP, FTP, HTTP, and SNMP services
and test the response time of the services. The system supports NQA in UDP jitter and
ICMP jitter tests by sending and receiving packets on LPUs. The minimum interval at which
packets are transmitted can be 10 ms. Each LPU supports up to 100 concurrent jitter tests.
The entire system supports up to 1000 concurrent jitter tests.
l IP policy-based routing (PBR) and flow-based next hop to which packets are forwarded
l IP PBR-based load balancing
l Load balancing in unequal cost multiple path (UCMP) mode
l Configuration of secondary IP addresses for all physical and logical interfaces
Each interface can be configured with a maximum of 255 secondary IP addresses with 31-
bit masks.
l IPv6 PBR
l Telnet and SSH
7.2.4 GRE
Generic Routing Encapsulation (GRE) is applicable to the following:
When applying a GRE tunnel, ensure that the NE40E is installed with a GRE license file and an
SPUC, and the service mode of the SPUC is set to tunnel. GRE tunnels are independent of
physical interfaces.
7.2.6 IPSEC
The NE40E supports the following functions:
The formula for calculating the bandwidth occupies by LSAs on interfaces in the same area is
as follows:
Assume that there are 10000 routes, Ethernet interfaces are used, and the MTU of the Ethernet
interfaces is 1500 bytes. In this case, the Ethernet frame header is of 18 bytes, and each LSA is
of 44 bytes. Each LSA carries information about a route.
(1500-18)/44=44. The preceding formula indicates that an Ethernet frame can carry information
about 33 routes. In this case, 228 Ethernet frames are required to carry information about 10000
routes.
l Multicast protocols
Multicast protocols include the Internet Group Management Protocol (IGMP) ( IGMPv1,
IGMPv2 and IGMPv3), Protocol Independent Multicast-Dense Mode (PIM-DM), Protocol
Independent Multicast-Sparse Mode (PIM-SM), Multicast Source Discovery Protocol
(MSDP), and Multi-protocol Border Gateway Protocol (MBGP).
l Reverse Path Forwarding (RPF)
l PIM-SSM
l Anycast RP
l IPv6 multicast routing protocols
l Multicast VLAN
The NE40E supports multicast VLAN and VLAN-based 1+1 protection of multicast traffic.
l Multicast over GRE
l Multicast VPN
For details, see section "7.5 VPN Features".
l Multicast CAC
The NE40E supports multicast Call Admission Control (CAC). When multicast CAC rules
are configured, the number of multicast groups and bandwidth are restricted for IGMP
snooping on interfaces or the entire system.
7.4 MPLS
The NE40E supports MPLS features, and static and dynamic LSPs. Static LSPs require that the
administrator configure the Label Switch Routers (LSRs) along the LSPs and set up LSPs
manually. Dynamic LSPs are set up dynamically in accordance with the routing information
through the Label Distribution Protocol (LDP) and RSVP-TE.
The delay for MPLS packets can be controlled in the following aspects:
l In the case that there is no traffic congestion, the NE40E adopts a high-speed processor to
ensure line-rate forwarding and low delay.
l In the case of traffic congestion, the NE40E ensures preferential forwarding and low delay
for traffic with high priority through mechanisms such as QoS, HQoS, MPLS TE, and DS-
TE.
MPLS is supported on all interfaces of the NE40E.
forwarding, IP packet forwarding over LDP LSPs (including L3VPN), and packet
forwarding on P nodes
l Management functions such as the LSP loop detection mechanism
l MPLS QoS, mapping from the ToS field in IP packets to the EXP field in MPLS packets,
and MPLS uniform, pipe, and short pipe modes
l Static configuration of LSPs and label forwarding based on traffic classification
l MPLS trap function
l Modification of MPLS MTUs
l Association between LDP and IGP, which shortens traffic loss to the minimum through the
synchronization between the LDP status and IGP status in case of network faults
l NE40E functioning as a Label Edge Router (LER) or an LSR
An LER is an edge device on an MPLS network that connects the MPLS network to other
networks. The LER classifies services, distributes labels, encapsulates or removes multi-
layer labels. When functioning as an egress, the NE40E supports PHP. That is, the
NE40E allocates an explicit null label or an implicit null label to the penultimate hop.
An LSR is a core router on an MPLS network. The LSR switches and distributes labels.
l Establishment of LSPs between NE40Es of different IS-IS levels and between the
NE40E and non-Huawei devices through LDP
l MPLS supported by the NE40E complies with the following standards:
– RFC 3031
– RFC 3032
– RFC 3034
– RFC 3035
– RFC 3036
– RFC 3037
The NE40E supports CR-LDP and RSVP-TE and can interoperate with non-Huawei
devices through CR-LDP or RSVP-TE.
MPLS TE
The MPLS TE technology combines the MPLS technology with traffic engineering. It can
reserve resources by setting up LSP tunnels for a specified path in an attempt to avoid network
congestion and balance network traffic.
In the case of resource scarcity, MPLS TE allows the preemption of bandwidth resources of
LSPs with low priorities. This meets the demands of important services or the LSPs with large
bandwidth. When an LSP fails or a node is congested, MPLS TE can ensure smooth network
communication through the backup path and the fast reroute (FRR) function. Through automatic
re-optimization and bandwidth adjustment, MPLS TE improves the self-adaptation capability
of tunnels and properly allocates network resources.
The process of updating the network topology through the TEDB is as follows: When a link
goes Down, the CSPF failed link timer is enabled. If the IGP route is deleted or the link is changed
within the timeout period of the CSPF failed link timer, CSPF deletes the timer and then updates
the TEDB. If the IGP route is not deleted or the link is not changed after the timeout period of
the CSPF failed link timer expires, the link is considered Up.
– The Non-IETF (non-standard) mode supports two CTs (CT0 and CT1), eight priorities
(0-7), and two bandwidth constraint models (RDM and MAM).
The CT here refers to the class type of a corresponding service flow. The priority here
refers to the LSP preemption priority.
– The IETF (standard) mode supports eight CTs (CT0 through CT7), eight priorities (0-7),
and three bandwidth constraint models (RDM, MAM, and Extended).
DS-TE supports TE FRR, hot standby, protection switchover, and CT-based traffic
statistics collection.
MPLS OAM
MPLS OAM functions are as follows:
l LSPs
l GRE tunnels
l TE tunnels
VLL
The NE40E supports the following VLL functions:
l Martini VLL
The Martini mode supports double labels. The inner label adopts extended LDP for
signaling in compliance with RFC 4096.
The type of VC FEC is 128. VC encapsulation types include 0x0004 Ethernet Tagged Mode,
0x0005 Ethernet, and 0x000B IP Layer2 Transport.
l Kompella VLL
VC encapsulation types of Kompella VLL include ATM-1to1-VCC, ATM-1to1-VPC,
ATM-AAL5-SDU, ATM-nto1-VCC, ATM-nto1-VPC, ATM-trans-cell, FR, Ethernet,
HDLC, PPP, VLAN, and IP-interworking.
Kompella VLL supports the local inter-board switching of packets in 802.1Q mode.
Kompella VLL supports inter-AS VPN.
l CCC VLL
CCC VLL supports the local inter-board switching of packets in 802.1Q mode
l SVC VLL
l VLL heterogeneous interworking
VLL heterogeneous IP-interworking is used when the link types of CEs on both ends of an
L2VPN link are different. In MPLS L2VPN heterogeneous IP-interworking, after receiving
a frame from a CE, a PE decapsulates the link-layer packet and transmits the IP packet
across an MPLS network. The IP packet is transparently transmitted to the peer PE. The
peer PE re-encapsulates IP packet according to its link layer protocol and transmits the
packet to the connected CE. The link-layer control packet sent by the CE is processed by
the PE and is not transmitted through the MPLS network. All non-IP packets such as MPLS
and IPX packets are discarded.
l Transparent transmission of certain types of link layer protocol packets
Interfaces can be configured to transparently transmit certain types of link layer protocol
packets, such as BPDUs, STP packets, LLDP packets, UDLD packets, CDP packets, and
HGMP packets.
l Inter-AS VLL
– SVC VLL, Martini VLL, and Kompella VLL can implement inter-AS L2VPN Option
A (VRF-to-VRF).
– Option B requires the switching of both inner and outer labels on the ASBR, and is
therefore not suitable for the VLL.
– Option C is the best solution.
l VLL over TE ECMP
VPLS
In a VPLS network, PEs can be all connected to each other and enabled with split horizon to
prevent Layer 2 loops.
The implementations of VPLS control plane through BGP and LDP are called Kompella VPLS
and Martini VPLS respectively.
l Kompella VPLS
Kompella VPLS has good scalability. With Kompella VPLS, BGP is adopted for signaling,
and VPN targets are configured to implement automatic discovery of VPLS members.
Therefore, the addition or deletion of PEs requires few additional operations.
l Martini VPLS
Martini VPLS has poor scalability. With Martini VPLS, LDP is adopted for signaling, and
the peers of a PE need to be manually specified. PEs in a VPLS network are all connected
to each other. Therefore, adding a new PE requires configurations on all the other associated
PEs to be modified.A pseudo wire (PW) is actually a point-to-point link. This means that
using LDP to create, maintain, and delete the PW is more effective.
The NE40E supports the following VPLS functions:
l Access to the VPLS network in QinQ mode
l HVPLS
l IGMP snooping for VPLS
l One MAC address space for each VSI
l VPLS learns MAC addresses in the following modes:
– Unqualified mode: In this mode, a VSI can contain multiple VLANs sharing a MAC
address space and a broadcast domain. When learning MAC addresses, VPLS also needs
to learn VLAN IDs.
– Qualified mode: In this mode, a VSI has only one VLAN, which has an independent
MAC address space and a broadcast domain. When learning MAC addresses, VPLS
does not need to learn VLAN IDs.
l VPLS/HVPLS equal-cost load balancing
l Fast switching of multicast traffic
l mVPLS
l STP over PW
l STP over VPLS
l Transparent transmission of certain types of link layer protocol packets
Interfaces can be configured to transparently transmit certain types of link layer protocol
packets, such as BPDUs, STP packets, LLDP packets, UDLD packets, CDP packets, and
HGMP packets.
l Ethernet loop detection
PWE3
The NE40E supports the following PWE3 functions:
l Virtual Circuit Connectivity Verification PING (VCCV-PING)
The NE40E supports the manual LDP PW connectivity detection on the UPE, including
the connectivity of static PWs, dynamic PWs, single-hop PWs, and multi-hop PWs.
l PW template
The NE40E supports the binding between a PW and a PW template, and the reset of PWs.
The NE40E supports heterogeneous interworking.
Currently, the NE40E supports the transparent transmission of the following packets
through PWE3: ATM AAL5 SDU VCC transport, Ethernet, HDLC, ATM n-to-one VCC
cell transport, IP Layer 2 transport, and ATM one-to-one VCC cell mode.
l ATM cell relay
l PW redundancy
l ATM IWF
ATM IWF runs on an L2VPN in CCC local connection mode or an L2VPN in PW mode.
l The NE40E supports the circuit emulation service (CES) by using Pseudo-Wire Emulation
Edge to Edge (PWE3).
The CES is classified into the Structure-aware TDM Circuit Emulation Service over Packet
Switched Network (CESoPSN) and Structure-Agnostic TDM over Packet (SAToP)
service.
7.6 QoS
On the NE40E, you can collect traffic statistics on the packets on which QoS is performed and
view the statistics result through corresponding display commands.
Diff-Serv Model
Multiple service flows can be aggregated into a Behavior Aggregate (BA) and then processed
based on the same Per-Hop Behavior (PHB). This simplifies the processing and storage of
services.
On the Diff-Serv core network, packet-specific QoS is provided. Therefore, signaling processing
is not required.
Traffic Policing
CAR is mainly used for rate limit. In the implementation of CAR, a token bucket is used to
measure the data flows that pass through the interfaces on a router so that only the packets
assigned with tokens can go through the router in the specified time period. In this manner, the
rates of both incoming and outgoing traffic are controlled. In addition, the rate of certain types
of data flows can be controlled based on the information such as the IP address, port number,
and priority. Rate limit is not performed on the data flows that do not meet the specified
conditions, and such data flows are forwarded at the original interface rate.
CAR is mainly implemented at the edge of a network to ensure that core devices on the network
process data properly. The NE40E supports CAR for both incoming and outgoing traffic.
Queue Scheduling
The NE40E supports FIFO, PQ, and WFQ for queue scheduling on interfaces.
The NE40E maps packets of different priorities to different queues and adopts Round Robin
(RR) on each interface for queue scheduling.
Priority Queues (PQs) are classified into four types: top PQs, middle PQs, normal PQs, and
bottom PQs. They are ordered in descending order of priorities. When packets leave queues, PQ
allows the packets in the top PQ to go first. Packets in the top PQ are sent as long as there are
packets in this PQ. The NE40E sends packets in the middle PQ only when all packets in the top
PQ are sent. Similarly, the NE40E sends packets in the normal PQ only when all packets in the
middle PQ are sent; the NE40E sends packets in the bottom PQ only when all packets in the
normal PQ are sent. As a result, the packets in the PQ of a higher priority are always sent
preferentially, which ensures that packets of key services are processed preferentially when the
network is congested. Packets of common services are processed when the network is idle. In
this manner, the quality of key services is guaranteed, and the network resources are fully
utilized.
Weight Fair Queuing (hereinafter referred to as WFQ) is a complex queuing process, which
ensures that the services with the same priority are fairly treated and the services with different
priorities are weighted. The number of WFQ queues can be pre-set and is allowed to range from
16 to 4096. WFQ weights services based on their requirements for the bandwidth and delay. The
weights are determined by the IP precedence in the IP packet headers. With WFQ, the NE40E
implements dynamic traffic classification based on quintuples or ToS values. The packets with
the same quintuple (source IP address, destination IP address, source port number, destination
port number, and protocol number) or ToS value belong to the same flow. Packets in one flow
are placed in one queue through the Hash algorithm. When flows enter queues, WFQ
automatically places different flows into different queues based on the Hash algorithm. When
flows leave queues, WFQ allocates bandwidths to flows on the outbound interface based on
different IP precedence of the flows. The smaller the precedence value of a flow, the smaller the
bandwidth of the flow. In this manner, services of the same precedence are treated fairly; services
of different precedence are treated based on their weights.
Congestion Avoidance
Congestion avoidance is a traffic control mechanism used to avoid network overload by adjusting
network traffic. With this mechanism, the NE40E can monitor the usage of network resources
(such as queues and buffers in the memory) and discard packets when the network congestion
intensifies.
Random Early Detection (RED) or Weighted Random Early Detection (WRED) algorithms are
frequently used in congestion avoidance.
The RED algorithm sets the upper and lower limits for each queue and specifies the following
rules:
l When the length of a queue is below the lower limit, no packet is discarded.
l When the length of a queue exceeds the upper limit, all the incoming packets are discarded.
l When the length of a queue is between the lower and upper limits, the incoming packets
are discarded randomly. A random number is set for each received packet, and the random
number is compared with the drop probability of the current queue. The packet is discarded
when the random number is larger than the drop probability. The longer the queue, the
higher the drop probability. The drop probability, however, has an upper limit.
Unlike RED, the random number in WRED is based on the IP precedence of IP packets. WRED
keeps a lower drop probability for the packets that have a higher IP precedence.
RED and WRED employ the random packet drop policy to avoid global TCP synchronization.
The NE40E adopts WRED to implement congestion avoidance.
The NE40E supports congestion avoidance in both inbound and outbound directions of an
interface. The WRED template is applied in the outbound direction; the default scheduling policy
in the system is applied in the inbound direction. In addition, WRED can be applied to the
Multicast Tunnel interface (MTI) that is bound to the distributed multicast VPN on the
NE40E.
The NE40E supports congestion avoidance based on services. The NE40E reserves on each
interface eight service queues, that is, BE, AF1, AF2, AF3, AF4, EF, CS6, and CS7. The
NE40E colors packets with red, yellow, and green to identify the priorities of packets and discard
certain packets.
HQoS
The NE40E supports the following HQoS functions:
QPPB
QPPB is the abbreviation of QoS Policy Propagation Through the Border Gateway Protocol.
The receiver of BGP routes performs the following operations:
l Sets QoS parameters such as IP precedence and traffic behavior for a BGP route based on
the attributes of the route.
l Classifies traffic according to QoS parameters and sets the QoS policy for the classified
traffic.
l Forwards packets according to the locally configured QoS policies to propagate QoS
policies through BGP.
The receiver of BGP routes can set QoS parameters (IP precedence and associated traffic
behavior) based on the following attributes:
l ACL
l AS path list in routing information
l Community attribute list in routing information
l Metrics in routing information
l IP prefix list
ATM QoS
The NE40E supports the following ATM QoS functions:
MPLS HQoS
MPLS QoS is a complete L2VPN/L3VPN QoS solution. It resorts to various QoS techniques to
meet the diversified and delicate QoS demands of VPN users. MPLS QoS provides relative QoS
on the MPLS Diff-Serv network and end-to-end QoS on the MPLE TE network. In actual
applications, the following QoS policies are supported.
l QPPB applied to an L3VPN
l MPLS Diff-Serv applied to an L2VPN/L3VPN
l MPLS TE applied to an L2VPN/L3VPN
l MPLS DS-TE applied to an L2VPN/L3VPN
l VPN-based QoS applied to the network side of an L2VPN/L3VPN
due to manual configuration of new member links or the status changes of member links. When
the bandwidth of a logical interface changes, traffic is automatically load-balanced based on the
new bandwidth proportion.
l In traffic classification, the system can collect statistics on the traffic that matches rules
and fails to match rules.
l The traffic statistics function for traffic policing is implemented in the following manners:
– Collects the statistics on the total traffic that matches the CAR rule.
– Collects the statistics on the traffic that is permitted or discarded by the CAR rule.
– Supports the interface-based traffic statistics.
– Supports interface-based CAR traffic statistics when the same traffic policy is applied
to different interfaces.
l Statistics on the number of forwarding packets, bytes, and discarded packets of a user queue
which includes eight flow queues of different priorities
l Statistics on the number of forwarded packets, bytes, and discarded packets of a user group
queue
l Statistics on the number of forwarded packets, bytes, and discarded packets of eight queues
of different priorities on an interface
7.9 MSE
IPv4-Based IPoX User Access
The NE40E supports the following IPv4-based IPoX user access functions:
l IP over Ethernet over VLAN (IPoEoVLAN) and IP over Ethernet over QinQ (IPoEoQ)
l ARP trigger, IP trigger, and DHCP trigger, which indicate the modes for triggering user
access by sending ARP packets, IP packets, and DHCP packets respectively
l Web authentication, fast authentication, bind authentication
l Default domain and roaming domain
l Typical options such as Option 60 and Option 82
l Static users
l IPv4 address allocation
l Captive portal
AAA
The NE40E supports the following Authentication, Authorization, and Accounting (AAA)
functions:
RADIUS
The NE40E supports flexible RADIUS/RADIUS+ authentication, authorization, and
accounting.
Address Management
The NE40E supports the following address management functions:
l IPv4 address pool management through the DHCP server, DHCP relay agent, and DHCP
proxy
Reliability
The NE40E supports the following reliability functions:
l User access through a trunk interface whose member interfaces reside on the same LPU
User Security
The NE40E supports the following user security functions:
7.10 iVSE
The NE40E supports the following iVSE functions:
l Fast channel change (FCC) and retransmission (RET) of BTV programs on L3/L3VPN/
VPLS networks
l Video Quality of Experience (VQE), including Media Delivery Index (MDI) and V-MOS
2.0
l Integrated quality monitoring of BTV and VOD programs on L3/L3VPN/L2VPN networks
l Interconnection with other Huawei devices in providing IPTV services
l Simple Object Access Protocol (SOAP)
l Entitlement Control Message Protocol (ECMP)
l Dynamic Inspection Protocol (DIP)
l Processing FCC requests scheduled by the Request Routing Server (RRS)
l Selective transmission of video data through FCC
l Distributed MDI quality monitoring of BTV and VOD programs on the LPUF-21/
LPUF-40/LPUF-41 on L3/L3VPN/L2VPN networks
l Distributed VMOS2.0 quality monitoring of BTV and VOD programs on the LPUF-41 on
L3/L3VPN/L2VPN networks
l Configuration of BTV channels
l Configuration of VOD programs
l AAA
l PAP and CHAP in PPP
l Plain text authentication and MD5 encrypted text authentication supported by routing
protocols that include RIPv2, OSPF, IS-IS, and BGP
l MD5 encrypted text authentication supported by LDP and RSVP
l SNMPv3 encryption and authentication
URPF
The NE40E supports URPF for IPv4/IPv6 traffic.
MAC entries in a MAC address table are classified into three types:
l Dynamic entries
Dynamic entries are learnt by interfaces and stored in hardware of LPUs. Dynamic entries
age. Dynamic entries will be lost in the case of the system reset, LPU hot swap, or LPU
reset.
l Static entries
Static entries are configured by users and delivered to LPUs. Static entries do not age. After
static entries are configured and saved, they are not lost in the case of the system reset, LPU
hot swap, or LPU reset.
l Blackhole entries
Blackhole entries are used to filter out the data frames that contain specific destination
MAC addresses. Blackhole entries are configured by users and delivered to LPUs.
Blackhole entries do not age. After blackhole entries are configured and saved, they will
not be lost in the case of the system reset, LPU hot swap, or LPU reset.
In this manner, the network bandwidth is reasonably used and the network security is guaranteed.
IGMP Snooping
The NE40E supports IGMP snooping on Layer 2 interfaces, Layer 3 interfaces, QinQ interfaces,
STP topologies, RRPP rings, and VPLS PWs.
DHCP Snooping
DHCP snooping is mainly used to prevent DHCP Denial of Service (DoS) attacks, bogus DHCP
server attacks, ARP middleman attacks, and IP/MAC spoofing attacks when DHCP is enabled
on the NE40E.
The working mode of DHCP snooping varies with the attack type, as shown in Table 7-1.
DoS attack by changing the value of the Check on the CHADDR field in DHCP packets
Client Hardware Address (CHADDR) field
l Whitelist
l Blacklist
l CPU Total CAR
l IGMP VLAN CAR
l User-defined flow
l Active link protection (ALP)
The NE40E protects the TCP-based application-layer data such as session data with the
whitelist function.
l Uniform configuration of CAR parameters
The NE40E provides the following methods of configuring CAR parameters:
– Same CAR parameters configured on different LPUs
– Same configuration interface for users
– Configuration of protocol-specific CAR parameters, making the user interface more
friendly
l Smallest packet compensation
The NE40E can efficiently defend the network against the attacks of small packets with
the smallest packet compensation function. After receiving packets, the system checks the
lengths of packets before sending them to the CPU.
– If the packet length is smaller than the preset minimum packet length, the system
calculates the sending rate with the pre-set minimum length.
– If the packet length is greater than the pre-set minimum packet length, the system
calculates the sending rate with the actual packet length.
l Association between the application layer and lower layers
l Local URPF
GTSM
On the current network, attackers forge valid packets to attack routers, which overloads the
routers and consumes limited resources such as the CPU on the MPU. For example, an attacker
forges BGP protocol packets and continuously sends them to a router. After the LPU of the
router receives the packets, it finds that the packets are destined to itself and then sends the
packets directly to the BGP processing module on the MPU without checking the validity of the
packets. As a result, the system is abnormally busy processing these forged valid packets and
the CPU usage is high.
To guard against the preceding attacks, the NE40E provides the Generalized TTL Security
Mechanism (GTSM). The GTSM protects services above the IP layer by checking whether the
TTL value in the IP header is within a specified range. In actual applications, the GTSM is mainly
used to protect the TCP/IP-based control plane such as the routing protocol against attacks of
the CPU-utilization type such as CPU overload.
The NE40E supports BGP GTSM, OSPF GTSM, and LDP GTSM.
The system checks whether the destination IP address of the ARP packet received on the
interface is correct. If the destination IP address is correct, the packet is sent to the CPU;
otherwise, the packet is discarded.
l ARP bidirectional isolation
l Filtration of invalid ARP packets
The NE40E filters out the following types of ARP packets:
– Invalid ARP packets
Invalid ARP packets include ARP request packets with the destination MAC addresses
being unicast addresses, ARP request packets with the source MAC addresses being
non-unicast addresses, and ARP reply packets with the destination MAC addresses
being non-unicast addresses.
– Gratuitous ARP packets
– ARP request packets with valid MAC addresses
You can use commands to filter out one or more previously mentioned invalid packets.
l Dynamic CAR for ARP packets
Local Mirroring
In local mirroring, an LPU can be configured with a physical observing port, multiple logical
observing ports, and multiple mirrored ports.
Local mirroring can be inter-LPU mirroring, which means that the observing port and mirrored
port reside on different LPUs.
Remote Mirroring
The NE40E provides MPLS LSPs, MPLS TE tunnels, and GRE tunnels for remote mirroring.
In remote mirroring, an LPU can be configured with multiple observing ports and mirrored ports.
In remote mirroring, mirroring packets can be intercepted.
Netstream
NetStream provides the following functions:
l Accounting
l Network planning and analysis
l Network monitoring
l Application monitoring and analysis
l Abnormal traffic detection
NetStream involves three devices: the NetStream Data Exporter (NDE), the NetStream Collector
(NSC), and the NetStream Data Analyzer (NDA).
The NE40E functions as an NDE to sample packets and aggregate and output flows. NetStream
on the NE40E is classified into distributed NetStream and integrated NetStream based on where
to collect packets and process flows.
l Distributed NetStream
Certain LPUs can sample packets and aggregate and output flows by themselves.
l Integrated NetStream
Certain LPUs do not process flows. They only sample packets and send the sampled packets
to the NetStream SPU for integrated flow aggregation and output.Integrated NetStream
supports load balancing among multiple NetStream boards.
The NE40E supports the following functions in terms of sampling:
l Sampling on the inbound and outbound interfaces
l Certain LPUs support sampling on only inbound interfaces.
l Interface-based sampling and traffic-classification-based sampling
l Sampling of the IPv4 unicast/multicast packets, fragmented packets, MPLS packets, MPLS
L3VPN packets, and L2VPN VLL packets
l Regular packet sampling, random packet sampling, sampling at regular time, and sampling
at random time
l Sampling on various types of physical and logical interfaces such as POS interfaces,
Ethernet interfaces, VLAN sub-interfaces, serial/MP/FR PVC/FR MP interfaces
channelized from CPOS interfaces, ATM interfaces, FR interfaces, trunk interfaces,
VLANIF interfaces, and GRE interfaces
The NE40E provides the following functions in terms of aggregation and output:
l IPv4 packets can be aggregated based on the AS number, AS-ToS, protocol-port, protocol-
port-ToS, source-prefix, source-prefix-ToS, destination-prefix, destination-prefix-ToS,
prefix, prefix-ToS, and VLAN ID.
l MPLS packets can be aggregated based on Layer 3 labels.
l The generated statistics can be output in v5, v8, or v9 format with 16-bit or 32-bit AS
numbers, which can be set through commands. When packets are output in the v9 format,
both the 16-bit and 32-bit interface indexes are supported, and can be set through commands
as required.
l Each type of aggregated flows can be output to two NMS servers if configured.
NE40E supports NetStream IPv4 and NetStream IPv6.
Lawful Interception
Lawful interception indicates that law enforcement agencies lawfully intercept user information
after being authorized.
Lawful interception on the NE40E is used to listen to the devices on operators' networks. The
NE40E provides X1 and X3 interfaces that are connected to the signaling and data interfaces
respectively on Lawful Interception Gateways (LIGs). The X3 interfaces on the NE40E can be
connected to a maximum of 10 LIGs.
SSHv2
The NE40E supports the STelnet client and server and the SFTP client and server. Both support
SSH 1.5 and SSH 2.0.
The plug-and-play function only can be configured on the X3 models of the NE40E.
Plug-and-Play (PNP) enables new devices to be automatically identified by the NMS and be
commissioned remotely by using the NMS.
On an IP RAN network deployed with a large number of devices, the device deployment costs,
especially the costs of on-site software commissioning, are high. This greatly harms the growth
of profits. To address this issue, Huawei puts forward the PNP solution.
The PNP feature effectively reduces the on-site software commissioning time, frees engineers
from working in bad outdoor environments, and greatly speeds up the project process and
improves project quality.
Y.1731
Y.1731 supports the following functions:
l Single-ended frame loss statistics collection, two-ended frame loss statistics collection,
one-way frame delay, two-way frame delay and one-way jitter
l VLL Alarm Indication Signal (AIS) and VPLS AIS
l Multicast MAC ping
MPLS-TP OAM
MPLS-TP OAM supports the following functions:
l NSR OSPF
l NSR LDP
l NSR RSVP-TE
l NSR PIM
l NSR PPP
l NSR ARP
l NSR LACP
l NSR for L2VPN
l NSR for L3VPN
l ISIS/ISIS6 NSR
l BGP/BGP4+ NSR
l Multicast (PIM/MSDP) NSR
l NSR for IPv6
APS
The NE40E supports the following Automatic Protection Switching (APS) functions:
FRR
The NE40E provides multiple fast reroute (FRR) features. You can deploy FRR as required to
improve network reliability.
l IP FRR
FRR switching can be complete in 50 ms. In this manner, the data loss caused by network
failures is minimized to a great extend.
FRR supported by the NE40E enables the system to monitor and save the status of LPUs
and interfaces in real time and to check the status of interfaces during packet forwarding.
When faults occur on an interface, the system can rapidly switch the traffic to another pre-
set route, thus reducing time between failures and the packet loss ratio.
l LDP FRR
LDP FRR switching can be complete in 50 ms.
l Hybrid FRR
Hybrid FRR is a combination of IP FRR and VPN FRR of IP routes and VPN routes in a
same VPN instance.
On a bearer network where a CE is dual-homed to two PEs, IP FRR is deployed between
the CE and each PE. If there are multiple voice VPNs and the two PEs are connected through
a POS link, you cannot bind sub-interfaces to different VPN instances to provide a backup
link for the traffic, because the NE40E does not support POS sub-interfaces.
In this case, a BGP VPNv4 peer relationship can be set up between the two PEs. Therefore,
the backup path, in the form of a private route, is exchanged between the two PEs. The
VPNv4 route then functions as a backup of the IP routes between the CE and each PE. This
implements FRR and switches traffic within 50 ms.
l TE FRR
TE FRR is an MPLS TE technology used to protect local networks. Only the interfaces
with a transmission rate of over 100 Mbit/s support TE FRR. TE FRR switching can be
complete within 50 ms. It can minimize data loss when network failures occur.
TE FRR protects traffic only temporarily. When the protected LSP becomes normal or a
new LSP is established, traffic is switched back to the original protected LSP or the newly
established LSP.
When a link or a node on the LSP fails, traffic is switched to the protection link and the
ingress node of the LSP attempts to establish a new LSP, if an LSP is configured with TE
FRR.
With different protected objects, TE FRR is classified into the following types:
– Link protection
– Node protection
l Auto FRR
Auto FRR is an extension of MPLS TE FRR. It automatically creates a bypass tunnel that
meets the requirements for the LSP through the configuration of the attributes of the bypass
tunnel, global auto FRR attributes, and interface-based auto FRR attributes on the interface
of the primary tunnel. When the primary tunnel changes to another path, the previous bypass
tunnel is automatically deleted. Then, a bypass tunnel that meets the requirements is set up.
l VLL FRR
VLL FRR switching can be complete in 50 ms.
l VPN FRR
VPN FRR switching can be complete in 50 ms.
l The NE40E-X16 has two MPUs that work in 1:1 backup mode.
l The NE40E-X16 has four SFUs that work in 3+1 backup mode. When one SFU becomes
faulty, the other three are responsible for data switching on the device. Traffic switching
on SFUs does not cause LPUs to be reset, or trigger the re-calculation of routes.
l The NE40E-X16 has eight PEMs on the back, working in 4+4 backup mode.
l NE40E-X16 has four fan modules. Each fan module contains a fan. The NE40E-X16 has
two heat dissipation areas. Each heat dissipation area has two fan modules working in 1+1
backup mode. If one of the fan modules becomes faulty and the ambient temperature is
below 40°C, the system can still work properly in a short period.
l The NE40E-X8 has two SRUs that work in 1:1 backup mode.
l The NE40E-X8 has three SFUs working in 2+1 backup mode. Two of the SFUs are
integrated on two SRUs. When one SFU becomes faulty, the other two are responsible for
data switching on the device. Traffic switching on SFUs does not cause LPUs to be reset,
or trigger the re-calculation of routes.
l The NE40E-X8 has four PEMs on the back, working in 2+2 backup mode.
l NE40E-X8 has two fan modules. Each fan module contains a fan. The fan modules work
in 1+1 backup mode. When one module becomes faulty and the ambient temperature is
below 40°C, the system can still work properly in a short period.
The NE40E-X3 has two MPUs that work in 1:1 backup mode.
The NE40E can be equipped with one MPU/SRU or two MPUs/SRUs. The MPUs support hot
backup. If the device is configured with two MPUs/SRUs, the master MPU/SRU works and the
slave MPU/SRU is in the standby state. The management network interface on the slave MPU/
SRU cannot be accessed by users, and the console and AUX interfaces cannot be configured
with any command. The slave MPU/SRU exchanges information (including heartbeat messages
and backup data) with only the master MPU/SRU.
The system supports two types of master/slave switchover of MPUs/SRUs: failover and
switchover. The failover is triggered by serious faults in the master MPU/SRU or the reset of
the master MPU/SRU. The switchover is triggered by commands that are run on the console
interface. You can also forbid the master/slave switchover of the MPUs/SRUs by using
commands on the console interface. The system generates alarms, records the faults in the log
file, and reports the alarms to the NMS. The cause of the master/slave switchover and the
associated operations are recorded in the system diagnosis information base for users to analyze.
The system provides two clock boards in master/slave backup mode. If the system detects that
the master clock board becomes faulty or is reset through a command, the system automatically
performs the master/slave switchover of clock boards. The master/slave switchover of clock
boards does not result in phase offsets or interrupt services.
The master/slave switchover time of each key part is less than 100 us.
l Customizes alarms. This can specify the alarms that can cause the change of the interface
status.
l Suppresses alarms. This can filter out the burr and prevent the network from frequently
flapping.
By using performance management tools, the ISP can monitor the network status in real time
through the NMS. The ISP then check whether the forwarding capacity of the network complies
with the Service Level Agreement (SLA) signed with users and locate faults. The ISP does not
need to carry out detection on the user side, which greatly decreases maintenance costs.
VRRP
VRRP dynamically associates the virtual router with a physical router that carries services. When
the physical router fails, another router is elected to take over services. Failover is transparent
to users and thus the internal network and the external network can communicate without
interruption.
l mVRRP
l VGMP
l E-VRRP
l VRRP For IPv6
GR
Graceful Restart (GR) is a key technology in implementing HA. It is designed based on NSF.
GR switchover and subsequent restart can be performed by the administrator or triggered by
faults. GR neither deletes the routing information from the routing table or the FIB nor resets
the board during the switchover when faults occur. This prevents the service interruption of the
entire system.
l BGP GR
l OSPF GR
l IS-IS GR
l MPLS LDP GR
l Martini VLL GR
l Martini VPLS GR
l L3VPN GR
l RSVP GR
l PIM GR
BFD
BFD is a detection mechanism used uniformly in an entire network. It is used to rapidly detect
and monitor the connectivity of links or IP routes in a network.
BFD sends detection packets at both ends of a bidirectional link to check the link status in both
directions. The defect detection is implemented at the millisecond level. The NE40E supports
single-hop BFD and multi-hop BFD.
The system uses BFD to detect and monitor the connectivity of links or IP routes in a
network. The rapid VRRP switchover is thus triggered.
l BFD for FRR
– BFD for LDP FRR
– LDP FRR switchover is triggered after BFD detects faults on protected interfaces.
– BFD for IP FRR and BFD for VPN FRR
– IP FRR and VPN FRR are triggered after BFD detects faults and reports fault
information to the upper layer applications.
l BFD for static routes
l BFD for IS-IS
The NE40E supports detection on the IS-IS adjacency by using the BFD session that is
configured statically.
BFD detects the fault of the link between the adjacent IS-IS nodes and rapidly reports the
fault to IS-IS. Thus fast convergence of IS-IS routes is performed.
l BFD for OSPF/BGP
The NE40E supports OSPF and BGP in dynamically setting up and deleting the BFD
session.
l BFD for PIM
BFD detection on IP-Trunks and Eth-Trunks
On the NE40E, BFD can detect a trunk and the member links of the trunk independently.
That is, it can detect the connectivity of the trunk and that of an important member link of
the trunk.
l BFD for LSP
BFD for LSP performs fast fault detection of the LSP, the TE tunnel, and the PW. In this
manner, BFD for LSP implements fast switchover of MPLS services such as VPN FRR,
TE FRR, and VLL FRR.
l BFD for Dot1q sub-interface
l BFD for mVSI
l Multi-hop BFD
l BFD For IPv6
BFD for OSPFv3, BFD for ISISv6, BFD for BGP4+, and BFDv6 for default IPv6
l BFD for VPLS PW
l BFD for VPLS/VLL PW
7.14 Clock
The NE40E supports the following clock features:
l CES ACR
l CES DCR
l Ethernet clock synchronization
l The Ethernet interfaces on the LPUF-10 and LPUF-21 of the NE40E provide Ethernet clock
synchronization so that the clock quality and stratum of the network can be guaranteed.
l 1588v2
– Access authority
The NE40E provides four levels of access control. After receiving an NTP access
request packet, the NE40E matches it from the lowest access control level to the highest
access control level. The first successfully matched access control level takes effect.
The matching order is as follows:
peer: indicates the minimum access control. The remote end can send a time request
and a control query to the local end. The local clock can also be synchronized with the
clock of the remote server.
server: indicates that the remote end can send a time request and a control query to the
local end. The local clock, however, is not synchronized with the clock of the remote
server.
synchronization: indicates that the remote end can only send a time request to the local
end.
query: indicates the maximum access control. The remote end can only send a control
query to the local end.
l Authentication
When configuring NTP authentication, note the following rules:
The NTP authentication must be configured on both the client and the server; otherwise,
the authentication does not take effect. If NTP authentication is enabled, keys must be
configured and declared reliable.
The server and the client must be configured with the same key.
l Internal clock
The NE40E provides an internal clock and can extract clock information from LPUs. The
clock precision reaches 4.6 ppm, that is, 0.00002s.
8 Applicable Environment
Convergence layer
Access layer
CR
NE5000E
BR
NE80E SoftX3000
AR
NE40E
SoftX3000
UMG8900
Directed at the condition of the existing bearer network and oriented at the NGN bearer network
and the 3G services, it is necessary for carriers to set up a core bearer network to carry NGN
multi-services. In the new market competition environment, with the development of new
services and technologies, the newly built bearer network will become the next-generation multi-
service bearer platform that supports voice, data, and video transmission. Specifically, the newly
built bearer network will carry NGN, video conference, video phone, streaming media, enterprise
interconnection, and 3G services. It will bring about the milestone of network transformation
and network convergence for carriers.
In this solution, the NE5000E acts as the core router to forward data at a high speed and ensure
high reliability; the NE80E/40E acts as the convergence router to converge NGN voice,
signaling, NMS, and customer services.
This application has the following characteristics:
l The core layer uses double planes. The NE5000Es are fully meshed.
l The NE80E is dual-homed to the NE5000Es.
l Two devices are deployed at an important node to back up each other.
l MPLS VPN is uniformly planned, which implements user isolation and service isolation.
CS NMS
BAS
ES
NE80E
/NE40E
QinQ, 4K x 4K VLANs,
isolated unicast services, Convergence Selective QinQ, dedicated
secure access switch multicast VLAN,avoiding
replication on the gateway
Multicast replication on
Multicast switch,
the edge, ensuring high
saving reconstruction
efficiency and
expense
controllable multicast
DSLAM Multicast switch
End switch
Home Home
gateway gateway
TV PC TV PC
– In the early phase of the development of IPTV services, normal services and IPTV
services access the same BRAS and traffic streams are distributed. In this manner, little
change is performed on the entire network and new services are deployed promptly.
– With the deployment of large-scale services, dedicated IPTV BRASs are required.
Broadband access services access the original BRAS; IPTV services access the
dedicated IPTV BRAS. In this manner, IPTV services and other services are free from
interacting on each other; the requirements of high-volume traffic of IPTV services are
satisfied. In addition, the powerful control capability of the BRAS ensures the secure
access of IPTV services. IPTV services and other services are distributed on the
convergence-layer devices.
Backbone Internet
network backbone IP bearer
network network
MAN core
ASBR-PE
network
BRAS USR
Access
IP broadband access network network Customer and NGN access
network
Broadband Customer
NGN service
access service
As shown in Figure 8-3, an IP MAN is classified into the core layer, service control layer, and
access layer.
The NE40E is usually deployed as the core node on IP backbone networks, IP MANs, and large-
scale IP networks. In this application, the NE80E is deployed on the egress of an IP MAN core
network.
The NE40E is usually deployed as the core or convergence node on IP MANs. In this application,
theNE40E is deployed as the convergence node on an IP MAN core network. The core layer is
responsible for high-performance and large-capacity data forwarding. It requires a simple
network structure and secure and reliable transmission of multiple services. Huawei enables IP/
MPLS at the core layer and allows a physical network to implement multiple logical service
bearer planes through the MPLS VPN technology. To ensure network security and reliability,
Huawei adopts many reliability techniques at the core layer, such as high reliability of devices
and networks, and inter-AS high reliability. Huawei provides core-layer devices of large
capacities, high-density interfaces, and high forwarding performance, answering the
requirements of the core layer.
The NE40E provides the following features that can answer the demands of the core layer of
the MAN:
l The NE40E has a powerful switching capacity. The interface capacity of a single system
reaches 640 Gbit/s. The NE40E provides 10-Gbit/s interfaces at line speed and high-density
GE interfaces. This meets the requirements for large-capacity and high-performance
forwarding on the core network.
l The NE40E provides powerful routing capabilities and various routing protocols. The
NE40E supports IP/MPLS and provides multiple VPN solutions such as BGP/MPLS
L3VPN and MPLS L2VPN. In this manner, multiple services are carried over the logical
bearer plane of the core network. Service isolation and security are thus implemented.
l The NE40E supports inter-AS VPN Option A/B/C. This guarantees the reliable running of
inter-AS services.
l The NE40E provides carrier-class reliability, such as redundancy of key modules and in-
service patching. In addition, the NE40E provides various FRR techniques, such as IP FRR,
LDP FRR, and TE FRR.
PE PE
NE80E NE80E
IPv6 Internet
IPv6/IPv4 NE80E
NE5000E/80E
IPv6 Core 5000E/80E
PE PE
NE5000E/80E
NE80E/40E NE80E/40E IPv4 Internet
IPv6
IPv6 EDGE
L3 Switch L3 Switch
MA 5200 L2 Switch
The IPv6 application on a backbone network does not affect the original IPv4 services such as
IPv4 forwarding and MPLS VPN. The application needs to solve the following problems:
l Interconnection between IPv6 islands
l Interworking between IPv6 and IPv4 networks
To address the preceding problems, The NE40E applies IPv6 key technologies in the following
combinations:
l All the routers on the backbone network support the IPv4/IPv6 dual stack. In this case, IPv4
services are forwarded over IPv4, whereas IPv6 services are forwarded over IPv6. Both
problems can be solved.
l The interconnection between IPv6 islands can be implemented through L3 tunnels by
applying manually configured tunnels or 6to4 tunnels. The core router needs to support
only IPv4 forwarding and does not need to be upgraded.
l The interconnection between IPv6 islands can be implemented through MPLS L2 tunnels
by applying MPLS L2VPN techniques such as VPLS and CCC. The core router needs to
support only MPLS forwarding. The interworking between IPv6 and IPv4 networks can be
implemented by configuring NAT-PT on gateways.
E1
TD
M*
N Router
Router
E1 TDM E1 TDM*N
BSC
MPLS over SDH/ME
Deploying devices on a Metro Ethernet-based MPLS network can solve the problem of
bandwidth multiplexing. Node B is connected to the NE40E that supports E1 IMA interfaces.
After the NE40E terminates IMA, the high-speed ATM cell flow is transparently transmitted
through ATM PWE3 to the NE40E at the RNC side. Then, the NE40E at the RNC side divides
the high-speed ATM cell flow into n x E1 links, and sends multiple channels of low-speed cells
to the RNC. For the Node B and RNC, the NE40E and MPLS network are transparent. That is,
multiple E1 interfaces on the Node B and RNC are directly connected through the TDM link.
GPS GPS
POS
BC BC
1588v2 1588v2
GE GE
BC BC
FE E1 E1 FE
1588v2 1588v2
IP/MPLS Core
NE40E
IP/MPLS Edge
soft switch
NE40E NE40E
VoIP
VoD server
gateway
Metro
Network PSTN
L3
DSLAM DSLAM
IAD IAD
After detecting packet loss according to received channel data, the STB sends the retransmission
request to the NE40E. Then, the NE40E searches the cached channel data for the packets to be
retransmitted and retransmits these packets to the STB.
The iVSE-capable NE40E can monitor video quality by calculating the quality data of video
from the source and then drawing a conclusion on video quality on the NE40E. The result
contains the quality of video flows on the NE40E.
Distribution I n t e rn e t
node
BRAS Internet
DSLAM
CMTS Aggregafion
P/PE
Node
P/PE SoftX
VoD ES
Distribution P/PE
node
AccSwitch PE VoD CS
As the aggregation node and distribution node, the NE40E accesses the IPTV service and
forwards IPTV packets on Layer 3. In this scenario, after iVSE is applied to the aggregation
node and distribution node, fast switchover of videos, retransmission of lost video packets, and
monitoring of video quality can be provided.
l When the user switches channels, the STB sends a fast switchover request to the iVSE-
capable NE40E. Then, the NE40E fast pushes channel data to the STB and reports new
channels. The STB sends the IGMP adding request to the DSLAM or multicast switch.
Finally, the DSLAM or multicast switch pushes multicast data of new channels to the STB.
l After detecting packet loss according to received channel data, the STB sends the
retransmission request to the NE40E. Then, the NE40E searches the cached channel data
for the packets to be retransmitted and retransmits these packets to the STB.
l In addition, the iVSE-capable NE40E can monitor video quality by calculating the quality
data of program flows from the source and then drawing a conclusion on video quality on
the NE40E.
As the aggregation node and distribution node, the NE40E accesses the IPTV service and then
transparently transmits IPTV packets to the BRAS or integrated PEs through VPLS. In this
scenario, after monitoring of video quality is applied to the aggregation nodes and distribution
nodes separately, end-to-end monitoring of video quality can be provided.
l When monitoring of video quality is deployed on a distribution node, the IPTV flows are
monitored and calculated before they enter the VPLS tunnel. The calculated result shows
the quality of the IPTV flows on the distribution node.
l When monitoring of video quality is deployed on an aggregation node, the IPTV flows are
monitored and calculated after they leave the VPLS tunnel. The calculated result shows the
quality of the IPTV flows on the aggregation node.
l When monitoring of video quality is deployed on both distribution nodes and aggregation
nodes, you can deploy monitoring of video quality on the ingress and egress of VPLS
tunnels, that is, distribution nodes and aggregation nodes, to check video quality on each
segment. By checking video quality on each segment, you can locate the causes of poor
video quality.
You can configure the NE40E by using command lines through the following:
l Console interface
l Auxiliary (AUX) port
l Telnet
As a command input interface, the console interface can send command lines to the control plane.
As a debugging interface, the console interface can receive debugging information from the
control plane and data plane, and deliver debugging commands and control commands.
The NMS configuration supports the configuration through the SNMP-based NMS.
Syslog is a sub-function of the information center. Syslog is over UDP. It outputs log information
to the log host through port 514.
The information center receives and processes the following types of information:
l Log information
l Debugging information
l Trap information
Information is classified into eight severity levels. The lower the level, the higher the severity.
The following table shows the detailed information.
0 Emer A fatal exception occurs on the device. The system is unable to function
gency properly and must be restarted. For example, the device is restarted due to
program exceptions or memory usage errors are detected.
1 Alert A serious exception occurs on the device, which requires immediate actions.
For example, the memory usage of the device reaches the upper threshold.
2 Critic A critical exception occurs on the device, which needs to be handled and
al analyzed. For example, the memory usage exceeds the alarm threshold; the
temperature exceeds the alarm threshold; and Bidirectional Forwarding
Detection (BFD) detects that a device is unreachable or detects error messages
generated by the local device.
4 Warn An abnormality that may cause the device to malfunction occurs on the
ing device, which requires attention. For example, a routing process is disabled
by the user; BFD detects packet loss; and error protocol packets are detected.
5 Notic A key operation is performed to keep the device running normally. For
e example, the user runs the shutdown command on the interface, a neighbor
is discovered, and the protocol state machine changes status.
6 Infor A routine operation is performed. For example, the user runs a display
matio command.
nal
The information center supports 10 channels, of which channels 0 through 5 each have a default
channel name. By default, the six channels correspond to six directions in which information is
output. The log information on the CF card is output to log files through Channel 9 by default.
This means that a total of seven default output directions are supported.
When multiple log hosts are configured, you can configure log information to be output to
different log hosts through one channel or multiple channels. For example, you can configure
some log information to be output to a log host through Channel 2 (loghost), and some log
information to a log host through Channel 6. In addition, you can change the name of Channel
6 to implement the desired channel management.
The NE40E stores all alarms in a log file, and provides the CF card to store the log file. How
long the alarms can be stored depends on the number of the alarms. Generally, the alarms can
be stored for months.
9.4 HGMP
The NE40E supports the Huawei Group Management Protocol (HGMP). HGMP is a cluster
management protocol developed by Huawei.
HGMP is used to group Layer 2 devices that are connected to the NE40E into a unified
management domain, that is, a cluster. HGMP supports automatic collection of network
topologies and provides integrated maintenance and management channels. In this manner, a
cluster uses only one IP address for external communications, simplifying device management
and saving IP addresses.
When voice services on the network deteriorate, or mosaics appear in some videos, the
NE40E may have sent or received incorrect packets or have lost packets. You can capture packets
to locate the problems. The packet capture function can be used to capture the packets sent to
the CPU, and the packets forwarded in the inbound or outbound direction. Compared with the
port mirroring function, the packet capture function is easier and faster to configure.
9.7 NQA
The NE40E supports Network Quality Analysis (NQA).NQA measures the performance of
different protocols running on the network. In that case, carriers can collect the operation index
of networks in real time, such as:
l Total delay of the HTTP
l Delay in TCP connection
l Delay in DNS resolution
l File transmission speed
l Delay in FTP connection
l DNS resolution error ratio Taking control of these indexes, carriers can provide network
services of different levels and charge differently. NQA is also an effective tool for
diagnosing and locating a network fault.
NQA supports the following functions:
l PWE3 tracert
l Multicast ping
l Multicast tracert
l CE-ping (ping the host from a VPLS PW)
l VPLS MAC ping and VPLS MAC trace
l VPLS MAC purge and VPLS MAC populate
l LSP ping, LSP tracerout, and MPLS jitter
l Verification of DNS functions through DISMAN-NSLOOKUP-MIB
l NMS management over all NQA functions through NQA-MIB
l Transmission of consecutive 3000 simulated voice packets in one test
l Minimum transmission intervals at 10 ms
The rollback function provided by the NE40E prevents the services from being affected by the
failure in system upgrade.
9.10 License
With the variation of the NE40E software functions and higher ratio of software cost occupying
the overall cost, the current service mode cannot satisfy the development requirements of
customers and carriers.
To satisfy the requirements of different users, the NE40E needs to implement the flexible
authorization to service modules.
For the authorization control of service modules, the NE40E provides the License authorization
management platform through the Global Trotter License (GTL). Through the License
authorization mode:
l Common users can purchase service modules as required and reduce the purchase cost.
l Upgrade and expansion users can expand the capacity, and support and maintain the
functions by applying for a new License.
10 NMS
SNMP
The NE40E supports device operation and management by the network management station
through SNMP.
The NE40E supports SNMPv1, SNMPv2c, and SNMPv3.
l SNMPv1
SNMPv1 supports community name-based and MIB view-based access control.
l SNMPv2c
SNMPv2c supports community name-based and MIB view-based access control.
l SNMPv3
SNMPv3 inherits the basic functions of SNMPv2c, defines a management frame, and
introduces a User-based Security Model (USM) to provide a more secure access control
mechanism for users.
SNMPv3 supports user groups, user group-based access control, user-based access control,
and authentication and encryption mechanisms.
NMS
The NE40E adopts Huawei iManager U2000 network management system. It supports
SNMPv1/v2c/v3 and the client/server architecture. The network management system can run
independently on many operation systems, such as Windows NT/2000/XP, UNIX (Sun, HP, and
IBM). The NE40E also provides a multi-lingual graphical user interface.
LLDP
The Link Layer Discovery Protocol (LLDP) is a Layer 2 protocol defined in IEEE 802.1ab.
LLDP specifies that the status information is stored on all interfaces and the device can send its
status to the neighbor stations. The interfaces can also send information about changes in the
status to the neighbor stations as required. The neighbor stations then store the received
information in the standard SNMP MIB. The NMS can search for Layer 2 information in the
MIB. As specified in the IEEE 802.1ab standard, the NMS can also discover unreasonable Layer
2 configurations based on information provided by LLDP.
When LLDP runs on the devices, the NMS can obtain Layer 2 information about all the devices
to which it connects and detailed network topology information. This is helpful to the rapid
expansion of the network and acquirement of detailed network topologies and changes. LLDP
also helps discover unreasonable configurations on networks and reports the configurations to
the NMS. This removes incorrect configurations in time.
A
AAA Authentication, Authorization and Accounting
AAL5 ATM Adaptation Layer 5
AC Access Controller
ACL Access Control List
AF Assured Forwarding
ANSI American National Standard Institute
AP Access Point
ARP Address Resolution Protocol
ASBR Autonomous System Boundary Router
ASIC Application Specific Integrated Circuit
ATM Asynchronous Transfer Mode
AUX Auxiliary (port)
B
BE Best-Effort
BGP Border Gateway Protocol
BGP4 BGP Version 4
C
CAR Committed Access Rate
CBR Constant Bit Rate
CE Customer Edge
D
DAA Destination Address Accounting
DC Direct Current
DHCP Dynamic Host Configuration Protocol
DNS Domain Name Server
DS Differentiated Services
E
EACL Enhanced Access Control List
EF Expedited Forwarding
EMC EElectroMagnetic Compatibility
F
FCC Fast Channel Change
FE Fast Ethernet
FEC Forwarding Equivalence Class
FIB Forward Information Base
FIFO First In First Out
FR Frame Relay
FTP File Transfer Protocol
G
GE Gigabit Ethernet
GRE Generic Routing Encapsulation
GTS Generic Traffic Shaping
HA High availablity
HDLC High level Data Link Control
HTTP Hyper Text Transport Protocol
I
iVSE Integrated Value-added Service Engine
ICMP Internet Control Message Protocol
IDC Internet Data Center
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
IGMP Internet Group Management Protocol
IGP Interior Gateway Protocol
IP Internet Protocol
IPoA IP Over ATM
IPTN IP Telephony Network
IPTV Internet Protocol Television
IPv4 IP version 4
IPv6 IP version 6
IPX Internet Packet Exchange
IS-IS Intermedia System-Intermedia System;
ISP Interim inter-switch Signaling Protocol
ITU International Telecommunication Union - Telecommunication
Standardization Sector
L
LAN Local Area Network
LCD Liquid Crystal Display
LCP Link Control Protocol
LDP Label Distribution Protocol
LER Label switching Edge Router
LPU Line Processing Unit
LSP Label Switched Path
LSR Label Switch Router
M
MAC Media Access Control
MBGP Multiprotocol Border Gateway Protocol
MD5 Message Digest 5
MIB Management Information Base
MP Multilink PPP
MPLS Multi-protocol Label Switch;
MSDP Multicast Source Discovery Protocol
MSTP Multiple Spanning Tree Protocol
MTBF Mean Time Between Failures
MTTR Mean Time To Repair
MTU Maximum Transmission Unit
N
NAT Network Address Translation
NLS Network Layer Signaling
NP Network Processor
NTP Network Time Protocol
NVRAM Non-Volatile Random Access Memory
O
OSPF Open Shortest Path First
P
PAP Password Authentication Protocol
PE Provider Edge
PFE Packet Forwarding Engine
PIC Parallel Interference Cancellation
PIM-DM Protocol Independent Multicast-Dense Mode
PIM-SM Protocol Independent Multicast-Sparse Mode
POP Point Of Presence
Q
QoE Quality of Experience
QoS Quality of Service
R
RADIUS Remote Authentication Dial in User Service
RAM Random-Access Memory
RED Random Early Detection
RFC Requirement for Comments
RH Relative Humidity
RIP Routing Information Protocol
RMON Remote Monitoring
ROM Read Only Memory
RP Rendezvous Point
RPR Resilient Packet Ring
RSVP Resource Reservation Protocol
RSVP-TE RSVP-Traffic Engineering
S
SAP Service Advertising Protocol
SCSR Self-Contained Standing Routing
SDH Synchronous Digital Hierarchy
SDRAM Synchronous Dynamic Random Access Memory
SFU Switch Fabric Unit
SLA Service Level Agreement
SNAP SubNet Attachment Point
T
TCP Transfer Control Protocol
TE Traffic Engineering
TFTP Trivial File Transfer Protocol
TM Traffic Manager
ToS Type of Service
TP Topology and Protection packet
U
UBR Unspecified Bit Rate
UDP User Datagram Protocol
UNI User Network Interface
UTP Unshielded Twisted Pair
V
VBR-NRT Non-Real Time Variable Bit Rate
VBR-RT Real Time Variable Bit Rate
VC Virtual Circuit
VCI Virtual Channel Identifier
VDC Variable Dispersion Compensator
VLAN Virtual Local Area Network
VLL Virtual Leased Line
VPI Virtual Path Identifier
VPLS Virtual Private LAN Service
W
WAN Wide Area Network
WFQ Weighted Fair Queuing
WRED Weighted Random Early Detection
WRR Weighted Round Robin