Documente Academic
Documente Profesional
Documente Cultură
Series
V100R005C01
Installation Guide
Issue
02
Date
2013-08-10
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website:
http://www.huawei.com
Email:
support@huawei.com
Issue 02 (2013-08-10)
Version
V100R005C01
V100R009C00
Intended Audience
This document describes the installation process of the OptiX PTN 950 in terms of preparations
for installation and system installation.
This document describes the installation flow and method.
This document is intended for:
l
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol
Description
DANGER
WARNING
CAUTION
Issue 02 (2013-08-10)
ii
Symbol
Description
TIP
TIP indicates a tip that may help you solve a problem or save
time.
NOTE
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention
Description
Boldface
>
Change History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
Description
Whole manual
Description
Whole manual
iii
Update
Description
Whole manual
Issue 02 (2013-08-10)
iv
Contents
Contents
About This Document.....................................................................................................................ii
1 Compliance and Safety.................................................................................................................1
1.1 Warning and Safety Symbols.........................................................................................................................................2
1.2 Safety Precautions for Using the Equipment..................................................................................................................2
1.2.1 Safety Symbols............................................................................................................................................................3
1.2.2 Electrical Safety...........................................................................................................................................................3
1.2.3 Battery.........................................................................................................................................................................7
1.2.4 Laser and Fibers...........................................................................................................................................................9
1.2.5 High-Altitude Operations............................................................................................................................................9
1.2.6 Installing and Removing Boards...............................................................................................................................10
1.2.7 Miscellaneous............................................................................................................................................................10
Contents
vi
Contents
vii
Contents
A Glossary......................................................................................................................................146
Issue 02 (2013-08-10)
viii
Issue 02 (2013-08-10)
Indication
This symbol is for anti-static protection.
A notice with this symbol indicates that you
should wear an anti-static wrist strip or
gloves when you touch a board. Otherwise,
damage might be caused to the board.
CLASS 1
LASER
PRODUCT
Issue 02 (2013-08-10)
CAUTION
l Before performing any operation on the equipment, read the operation instructions and
precautions carefully; during the operation, follow the equipment-specific precautions and
operation instructions provided by Huawei strictly to minimize the occurrence of accidents.
l When performing any operation on the equipment, follow the safety regulations of the local
areas. The safety precautions described in the manual are only supplements to the local safety
regulations.
l The texts introduced by the word "Caution", "Warning", or "Danger" in each manual do not
cover all the safety precautions that must be followed. They are only supplements to the
safety precautions for operations.
l The engineers that are responsible for installing and maintaining Huawei equipment must be
equipped with the general knowledge of safety operation. Therefore, they must have
completed relevant training to familiarize themselves with the proper operation methods and
safety precautions. In addition, they must possess relevant working certificates.
Meaning
DANGER indicates a hazard with a high
level or medium level of risk which, if not
avoided, could result in death or serious
injury.
WARNING indicates a hazard with a low
level of risk which, if not avoided, could
result in minor or moderate injury.
CAUTION indicates a potentially hazardous
situation that, if not avoided, could result in
equipment damage, data loss, performance
deterioration, or unanticipated results.
Issue 02 (2013-08-10)
High Voltage
DANGER
The high voltage power supply supplies power to the device so that it can operate. Direct or
indirect contact (through damp objects) with high voltage and AC mains supply may result in a
fatal accident.
l
When installing the AC power supply facility, comply with the local safety regulations.
The personnel who install the AC facility must be qualified for performing high voltage
and AC operations.
Do not wear articles that conduct electricity, such as watches, chains, bracelets and rings
when performing high voltage operations.
Switch off the power supply immediately, if you find water in the rack or if the rack is
damp.
Make sure that the device is kept away from water when being operated in a damp
environment.
WARNING
Non-standard and improper high voltage operations can result in fire and electric shock.
Therefore, you must abide by the local rules and regulations when bridging and wiring AC cables
through a certain area. The personnel who perform high voltage operations must be qualified
for performing high voltage and AC operations.
Power Cable
WARNING
Do not install or remove a live line. Transient contact between the core of the power cable and
the conductor may generate electric arc or spark, which can cause fire or injury to the eye.
l
Before bringing the power cable into the power distribution frame (PDF), bind the bare
parts of the power cable with insulating tapes.
Before installing or removing the power cable, turn off the power switch.
Before connecting the power cable, make sure that the power cable and label conform to
the requirements of the actual installation.
Short Circuit
The short circuit makes the components fail to work normally and even causes damage to the
entire equipment. During the component replacement, avoid the short circuit that may occur
when you do not operate the tools or boards properly.
Issue 02 (2013-08-10)
Use tools such as a screwdriver according to the regulations. Do not place any tools on the
honeycomb plate of the equipment.
CAUTION
Prevent any screws from falling into the equipment and causing short circuit.
Tools
WARNING
Use special tools when performing high voltage and AC operations.
Drilling Holes
WARNING
Do not drill on the rack without permission. Drilling on the racks does not conform to the related
requirements and may damage the wires and cables inside the rack. If the metal shavings from
the drilling enter the rack, it may result in short-circuit of the circuit boards. It may also damage
the Electromagnetic Compatibility (EMC) performance of the cabinet.
l
Before drilling a hole on the rack, wear insulation gloves, and then remove the cables inside
the rack away.
During the drilling, ensure that your eyes are completely protected. The hot metal shavings
may cause injury to your eyes.
Nonstandard drilling may damage the electromagnetic shielding performance of the rack.
Thunderstorm
DANGER
High voltage and AC operations, or operations on a steel tower and a mast when there is a
thunderstorm are prohibited.
When there is a thunderstorm, the electromagnetic field generated in the thunderstorm area may
cause damage to electronic components. To prevent the device from being damaged by lightning,
use proper grounding.
Issue 02 (2013-08-10)
Electrostatic Discharge
The electronic components on the board can be damaged by the electrostatic discharge. Thus,
when replacing the board, make sure that the equipment is properly grounded and take proper
measures to protect the components against electrostatic discharge. For example, wear the ESD
wrist strap during the operation.
CAUTION
The static electricity generated by the human body can damage the electrostatic sensitive
components on the circuit board, such as the large-scale integrated circuit (LIC).
Take the following measures to protect the components against electrostatic discharge:
l
Make sure that the equipment is properly grounded according to the equipment grounding
requirement.
Before touching the equipment, board or integrated circuit (IC) chip, you must wear the
ESD wrist strap to prevent the electrostatic discharge on the human body from damaging
the static-sensitive components, and ensure that the other end of the strap is properly
grounded. Figure 1-1 shows how to wear the ESD wrist strap.
Figure 1-1 Wearing the ESD wrist strap
CAUTION
Make sure that the metallic portion of the ESD wrist strap is in contact with the skin and
the other end of the ESD wrist strap is properly connected to the ESD jack.
NOTE
Issue 02 (2013-08-10)
When correctly wearing an ESD wrist strap, make sure that the resistance value of the ESD
wrist strap range from 0.75 Mohms to 10 Mohms. The validity period of the ESD wrist
strap is two years. When the resistance of the ESD wrist strap fails to meet the requirement,
you need replace the ESD wrist strap.
Avoid touching the boards with clothing because this may generate static electricity that
cannot be defended by the ESD wrist strap.
Use the ESD pad when replacing the board. Wear the ESD wrist strap properly and use
ESD tweezers or extraction tools to take, remove, or insert chips. Do not touch chips,
circuits, or pins with bare hands.
Keep boards and other static-sensitive parts that are not installed in ESD bags. Place some
desiccant inside the bag to keep the board dry.
Place the boards or parts that are temporarily removed on the ESD pad or other ESD
materials. Do not use non-ESD materials such as white foams, common plastic bags, or
paper bags to pack boards. Keep these materials away from boards.
Wear an ESD wrist strap when operating the ports of boards because they are also staticsensitive. Discharge the static electricity of cables and protective sleeves before connecting
them to the ports.
Reserve some board package materials, such as vacuum forming box and ESD bags in the
equipment room for future use.
1.2.3 Battery
When installing or maintaining the battery, follow relevant safety precautions for the battery to
ensure the safety of human beings and the equipment.
DANGER
Before handling the battery, read the safety precautions and the procedure for connecting the
batteries.
Electrolyte overflow can cause potential damage to the device. It can lead to the corrosion of
metal parts and circuit boards, and damage the device and cause short-circuit of the circuit boards.
General Operations
Before installing and maintaining the battery, pay attention to the following:
l
Do not wear metallic articles, such as a watch, hand chain, bracelet and ring.
Always keep the electrode upright when handling the battery. Do not place the battery
upside down or tilt it.
Issue 02 (2013-08-10)
Short Circuit
CAUTION
Short-circuit in a battery may cause injury. Though the voltage of a battery is low, high transient
current generated by a short-circuit releases a large amount of power.
Keep metal objects that can cause battery short-circuit away from the batteries. If metal objects
have to be used, first disconnect the batteries in use and then perform any operations.
Harmful Gas
CAUTION
Do not use unsealed lead-acid battery, because the gas emitted from the battery may result in
inflammation or device corrosion. Place the battery horizontally and then fix it properly.
The battery in use may emit flammable gas. Therefore, store the battery in a place with good
ventilation, and take precautions against fire.
High Temperature
CAUTION
High temperature may result in distortion, damage and electrolyte overflow in the battery.
When the temperature of the battery exceeds 60 centigrade, check whether there is acid overflow.
If yes, clean the acid immediately.
Acid Liquid
CAUTION
In the case of acid overflow, absorb and neutralize the liquid immediately.
When moving or replacing a leaky battery, observe the damage caused by the acid. When acid
spill is found, use the following materials to absorb and neutralize it.
l
When using antacids, strictly follow the guide provided by the battery supplier.
Issue 02 (2013-08-10)
Laser
DANGER
The laser beam launched by the optical interface board or by a fiber can cause damage to your
eyes! Do not stare into the fiber connector without wearing protective glasses during the
installation or maintenance of the fiber.
Special cleaning solvent (Isoamylol is preferred, propyl alcohol is the next, alcohol and
formalin is forbidden.)
Special cleaning roll, used with cleaning solvent listed in the first item
Replacing Fibers
When replacing a fiber, cap the fiber connector of the unused fiber with the protective cap.
Connecting Fibers
Take the following precautions when connecting fibers.
l
If the optical power is excessively high, an optical attenuator should be used to protect the
optical interfaces from being damaged.
When the fiber connector does not match the optical interface, use an adapter to connect
the connector to the optical interface. In addition, ensure that the optical power meets the
specification requirement of the optical interface after the adapter is used because the use
of an adapter introduces certain attenuation.
WARNING
When working at a height, prevent objects from falling down.
When working at a height, comply with the following requirements:
l
The operating machines and tools should be carried and handled safely to prevent them
from falling.
Safety measures should be taken such as wearing a helmet and a safety belt.
In cold areas, wear warm clothes before performing any high-altitude operation.
Appliances used for lifting objects must be checked and ensured to be intact before
performing any high-altitude operation.
DANGER
Do not remove the power cable and the PIU board when the power is on.
CAUTION
l Before installing or removing a board, wear an ESD glove or ESD wrist strap.
l When holding a board, never touch the circuits, components, cable connectors, and cabling
trough on the board.
l Before inserting a board, make sure that the protective tube on the backplane has been taken
off.
l Before inserting a board, make sure that no fiber or cable is connected to the board.
l Insert a board gently to prevent bending of the pins on the backplane.
l Insert a board along the guide rail of each slot to prevent the components on the board from
touching each other and causing short circuit.
l The interval for removing and inserting a board should be longer than 10 seconds.
After a board is inserted into the equipment, it takes several minutes for the board to enter the
normal running state after the startup.
1.2.7 Miscellaneous
When installing or maintaining Huawei network equipment, you also need to follow the safety
precautions for lifting heavy objects, operating sharp-cornered objects and binding signal cables
to ensure the safety of human beings and the equipment.
Issue 02 (2013-08-10)
10
WARNING
Do not stand or walk under heavy objects when they are being lifted.
WARNING
When carrying the device, wear protection gloves to prevent injuries that can be caused by sharp
objects.
CAUTION
Bundle the signal cables separately from the strong current cables or high voltage cables. The
space between two adjacent ties must be at least 30 mm.
Issue 02 (2013-08-10)
11
This section describes the general equipment installation process. Before installing equipment,
you need to determine the installation mode according to installation environment. After
unpacking and inspecting the equipment, you need to install the chassis, boards, fibers, and
cables in sequence, and then check the installation result. After determining that the installation
is correct, you can power on the equipment and then check fiber connections.
Table 2-1 lists the general installation process.
Table 2-1 Equipment installation process
Installation Process
Issue 02 (2013-08-10)
Description
Installation preparation
Installing chassis
Installing boards
Testing E1 cable
connections
Checking installation
12
Installation Process
Description
NOTE
When the equipment is installed in an indoor cabinet, a network cabinet, or an outdoor cabinet, the references
for each step in the preceding installation process vary. The references are as follows:
l When installing the equipment in a 19-inch cabinet, an N63E cabinet, or a T63 cabinet, see the OptiX
PTN 950 Quick Installation Guide.
l When installing the equipment in an IMB network cabinet, see 4 Equipment Installation Guidelines (IMB
Network Cabinet).
When installing OptiX PTN 950 NEs in a 300-mm-deep indoor cabinet, note that a maximum of five OptiX
PTN 950 NEs can be installed in the cabinet, with a distance of not smaller than 300 mm between adjacent NEs.
In addition, the total power consumption of the cabinet must be lower than 1000 W.
When installing both OptiX PTN 950 NEs and OptiX PTN 3900 NEs in a 300-mm-deep indoor cabinet, note
that only one OptiX PTN 950 NE and one OptiX PTN 3900 NE can be installed in the cabinet, with a distance
of not smaller than 560 mm between the two NEs.
Issue 02 (2013-08-10)
13
3 Installation Preparation
Installation Preparation
Issue 02 (2013-08-10)
Description
Running
environ
ment A
Indoor
environment
where
temperature
and humidity
are under
control
Running
environ
ment B
Indoor
environment
where
temperature
Example
Installati
on Mode
Standard central
telecommunications
room or communication
shelter
The
equipment
is installed
in a 19inch
cabinet, an
N63E
cabinet, or
a T63
cabinet.
The
equipment
can be
installed in
If a Huawei IMB
network cabinet is
used, see this
document and 3.2.10
Reference
14
Runnin
g
Environ
ment
Description
3 Installation Preparation
Example
Installati
on Mode
Reference
Room where
temperature is not under
control such as an attic in
a residential building
and humidity
are partially
under control or
without control,
or common
outdoor
environment
with a simple
shelter such as
an awning, or
common
outdoor
environment
where humidity
reaches 100%
occasionally
a standard
network
cabinet.
Selection of the
Network Cabinet
for details on the
installation mode.
Issue 02 (2013-08-10)
15
Runnin
g
Environ
ment
Description
3 Installation Preparation
Example
Installati
on Mode
Reference
l Outdoor
area close to
a pollution
source
l Environmen
t with only
simple
shields such
as awnings
l Place on the
sea
Running
environ
ment C
NOTE
An area close to
a pollution
source refers to
an area where
saline water
such as the sea
or a salina is
within 3.7 km
away from it,
where a heavy
pollution source
such as a
metallurgical
plant, coal
mine, or
thermal power
plant is within 3
km away from
it, where a
medium
pollution source
such as a
chemical plant,
a rubber plant,
or an
electroplating
factory is within
2 km away from
it, or where a
light pollution
source such as a
food factory,
leather factory,
or heating
boiler is within
1 km away from
it.
Outdoor or an attic in a
residential building
APM30H
cabinet
16
3 Installation Preparation
This section describes the requirements for running environment A (environment under full
control) and requirements for installation planning.
3.2 Requirements for Running Environment B and Installation Planning
This section describes the requirements for equipment location selection, dustproof and
waterproof, surge protection and grounding, heat dissipation, cooperation between air ducts,
power supply of equipment, cabling space, selection of network cabinets and outdoor cabinets,
and corrosion protection when equipment is installed in running environment B.
3.3 Requirements for Running Environment C and Installation Planning
In environment C, you need to install equipment in an APM30H outdoor cabinet. When
equipment is installed in an APM30H outdoor cabinet, the temperature at the air intake vents
on the outdoor cabinet must range from -40 C to 50 C.
Issue 02 (2013-08-10)
17
3 Installation Preparation
The site should be kept away from pollution sources. For sources of heavy pollution such
as the smeltery and coal mine, keep a distance of 5 km. For sources of medium pollution
such as the chemical, rubber and galvanization industries, keep a distance of 3.7 km. For
sources of light pollution such as food and tanner industries, keep a distance of 2 km. If
these sources of pollution cannot be avoided, the equipment room must be in the perennial
upwind direction of the pollution sources. In addition, quality equipment room or protection
product must be adopted.
The ventilation port for air exchange of the equipment room must be kept away from the
exhaust of city waste pipes, big cesspools and sewage treatment tanks. The equipment room
should be kept in the positive pressure state lest the corrosive gases enter the equipment
room and erode components and circuit boards.
The equipment room should be kept away from the industrial and heating boilers.
The equipment room is located on the second floor or the higher floor. If this requirement
cannot be satisfied, the ground for equipment installation in the equipment room shall be
at least 600 mm above the maximum flood level in the local record.
The equipment room should be kept away from livestock farms. If this requirement cannot
be satisfied, it should be located in the perennial upwind direction of the livestock farms.
The equipment room should be kept 3.7 km away from the seaside or salt lake. If this
requirement cannot be satisfied, the equipment room should be airtight with cooling
facilities. In addition, the alkalized soil cannot be used as the construction material.
Otherwise, the equipment applicable in atrocious environment must be adopted.
Issue 02 (2013-08-10)
18
3 Installation Preparation
The historical livestock room or the chemical fertilizer warehouse cannot be used as the
equipment room.
The equipment room should be solid enough to withstand wind and downpour.
The equipment room should be kept away from the road or sand field with dusts flying
around. If this requirement cannot be satisfied, the windows and doors of the equipment
room should be kept away from the sources of pollution.
Main
Distribution
Frame
(MDF) room
Control Room
Diesel Room
SPC
Switching
Room
Power
Distribution
Room
Transmission Room
Transformer Room
Battery Room
Power line
Communication line
Network line
Meet the requirements for wiring and maintaining the communication cable and power
cable.
Avoid line roundabout for convenient maintenance, thus lowering the cable cost, reducing
communication failures and improving the work efficiency.
Install the transmission equipment in a separate room close to the MDF room, or near the
switch.
Issue 02 (2013-08-10)
19
3 Installation Preparation
Requirements
Area
The equipment room should be able to house all the devices of the
terminal office at least.
Net height
Minimum indoor height refers to the net height under the roof beam
or under the ventilation pipe. Normally it is no less than 3 m.
Indoor floor
Load-bearing
capacity of floor
>450 kg/m2
Doors are single-leaf, 2 m high and 1 m wide. All doors and windows
should be sealed with dust-proof rubber strips. Double-layer glass is
recommended for windows.
Wall
The wall can be covered with wallpaper or lusterless paint, but not
the paint that is apt to get pulverized or peeled.
CAUTION
If organic materials such as soundproof cotton are required, use materials that
do not contain sulfur.
Issue 02 (2013-08-10)
Indoor ducts
Indoor ducts are used for cabling. The inside of the ducts should be
smooth and clean. The reserved length and width (margins) as well
as the number, position and size of the holes should comply with the
relevant requirements for placing the optical synchronous
transmission equipment.
The service pipes, drain pipes and rain pipes should not pass through
the equipment room. Fire hydrants should not be placed in the
equipment room, but in corridors or the place near the staircase where
they can be easily seen and accessed to.
20
3 Installation Preparation
Item
Requirements
Installation position
of the air conditioner
Other requirements
Air conditioner
Equipment
Partition wall
21
3 Installation Preparation
Table 3-3 Limits of dust diameter and density in the equipment room
Maximum Diameter(mm)
0.05
14x105
7x105
24x104
13x104
The equipment room shall be guarded against dust and corrosion by harmful gases such as
SO2, H2S, NH3, and NO2. 3.1.6 Corrosive Gas Control Requirements shows the limits for
them.
To meet the above requirements, take the following measures:
l
Always wear clean lab coat and protective footwear before getting into the equipment room.
Cover the ceiling and walls of the equipment room with wallpapers or lusterless paint
(pulverized paint prohibited) to prevent dust flake-off.
Issue 02 (2013-08-10)
Temperature
Humidity
- 20C to 60C
Long-term
operating condition
Short-term operating
conditions
22
Temperature
3 Installation Preparation
Humidity
10% - 90%
5% - 95%
NOTE
The temperature and humidity are measured 1.5 m above the floor and 0.4 m ahead of chassis when it
works under normal environment conditions (without any protection plate in front of the cabinet).
The short-term operating conditions indicate that the successive working time of the equipment does not
exceed 96 hours, and the accumulated annual working time does not exceed 15 days.
SO2
ppb
10
H2S
ppb
NH3
ppb
500
Cl2
ppb
N02
ppb
50
HF
ppb
O3
ppb
To fulfill the above requirements, take the following measures for the equipment room:
l
Build the equipment room away from places with high-density corrosive gases such as
mines, metallurgical plants, tire plants, rubber plants, and chemical plants.
Keep the equipment room far away from sewers, effluent pipes, shafts, dumps, and septic
tanks. The air intake of the equipment room should be at the opposite side to the pollution
source.
Do not use sulfur-containing organic materials to decorate the equipment room. These
materials include ESD pads, thermal insulation cotton, and soundproof cotton that are made
up from sulfur-containing rubber.
Do not store diesels or gasoline engines in the equipment room where devices are placed.
When an oil-fired engine is outside the equipment room, ensure that the exhaust of the
engine is in the downstream direction of the equipment room and the engine is far away
from the air intake vent of the air conditioner for the equipment room.
Issue 02 (2013-08-10)
23
3 Installation Preparation
Place storage batteries isolated from one another. You are suggested to put one battery in
a room.
Parameter
Frequency (Hz)
50 to 20 000
10 to 0.025
Frequency (MHz)
0.009 to1000
Frequency (GHz)
1 to 20
Build the equipment room way from electric transformers, high-voltage power lines and
other equipment or devices with high current. For example, you may build it 20 meters or
more away from the transformer, or more than 50 meters from high-voltage power lines.
Build the room way from high-power radio transmitters. For example, build it at a place
free of high-power radio transmitters within 500 meters.
Release and execute stipulations that forbid any personnel using wireless handy
communication devices close to equipment in the equipment room.
Control the humidity in the room to reduce the impact from static electricity.
Issue 02 (2013-08-10)
24
3 Installation Preparation
Use ESD tools such as ESD wrist straps, ESD tweezers and extraction tools when dealing
with the equipment.
Keep non-ESD materials (such as common bags, foams, and rubbers) at least 30 cm away
from boards and ESD-sensitive components.
Issue 02 (2013-08-10)
Item
Description
On structure of
the equipment
room
Build the equipment room with steel and concrete. The equipment room
should be equipped with facilities such as surge protector to protect it
against direct lightning strokes. Make sure the surge protection grounding
of the equipment room, or that of devices such as the surge protector,
shares the same grounding body with the protection grounding of the
building where the room is located in.
Equip the
incoming power
cable with a
surge protector
Do not lead in or lead out the AC/DC power cables aerially for the office.
Equip the in-room low-voltage power cable with a surge protector in the
voltage regulator or in the AC panel. The arrester should be grounded
proximately. If the office is located in the city, it is recommended to use
an arrester with the nominal discharge current no less than 20 kA. If it is
located in the suburb of intermedial lightning danger level or higher, an
arrester with the surge current higher than 60 kA is recommended. If
located in an isolated huge building in the city or in the mountain area
where lightning strokes occur often, please use an arrester that has a surge
current more than 100 kA. The ground cable should be less than 1 meter
in length.
25
Issue 02 (2013-08-10)
3 Installation Preparation
Item
Description
DC power
supply
grounding
The working ground of the office, that is, the anode of a -48 V DC power
supply or the cathode of a 24 V power supply, should be led from the indoor grounding bus line by proximate. The ground cable should satisfy
the maximum load of the equipment. The power supply facilities for the
office are to possess a DC working neutral line, which is introduced from
the general grounding bus line or the protection ground bar of the
equipment room.
Equipotent
connection
General
requirements on
grounding
On the
grounding
resistor
< 10 ohms. The upper end of the grounding body should be 0.7 meters or
more underground. In cold areas, the grounding body should be buried in
the frozen layer or lower. Make regular monitor efforts on the grounding
resistor to make sure the grounding is always valid.
On routing of the
signal cable
Lightning-proof
requirements of
outdoor cables
On the
grounding bus
line
The general grounding bus line can be grounding loop or bar. The ground
cable should be not of aluminum material. If interconnection occurs
between different metal connectors, take measures to avoid by electric
chemical corrosion. Generally, the cross-sectional area is a copper bar of
no less than 120 mm2 or zinc-plated flat steel of the same resistance. The
grounding bus line should be kept insulated from the construction steel.
26
3 Installation Preparation
Item
Description
On the
grounding leadin wire
Storage battery
Storage battery is an essential component of the DC power distribution system of the OptiX
transmission equipment. Functionally, it serves to:
l
Store energy. In the case of outage of mains, the storage battery can feed power for a period
of time, which depends on its capacity, so that the communication will not be interrupted
immediately.
Filter for large capacitors. The storage batteries are useful for absorbing surge voltage from
rectifiers and preventing noise and power frequency interference from getting into the
communication equipment.
Automatically shut down. When the voltage of the storage battery drops to below -43 V,
the control circuit can automatically shut down the output.
The storage battery of OptiX optical transmission equipment is charged and discharges under a
low, constant voltage. Table 3-8 shows the relevant requirements.
Table 3-8 DC charge/discharge status and voltage requirements
Issue 02 (2013-08-10)
Power
Supply
Category
Mains
Supply
Status
Battery
Charge /
Discharge
DC Voltage
Value
Terminal
Voltage of
Each
Storage
Battery
The
Number of
Storage
Batteries in
Each
Group
DC-
Normal
Floating
charged by
the rectifier
Floating charge
voltage reaches
53.5 V.
2.23 V
24 PCS
27
Power
Supply
Category
3 Installation Preparation
Mains
Supply
Status
Battery
Charge /
Discharge
DC Voltage
Value
Terminal
Voltage of
Each
Storage
Battery
Outage
Discharge
Discharge
voltage reaches
43.2 V.
1.8 V
Resumed
Under
loading
conditions,
automaticall
y charged
with a
current 0.1
to 0.15 times
of the
battery
capacity.
When the
charging voltage
reaches 56.4 V, it
automatically
changes to
constant voltage
mode, that is
changes the
charging status to
floating charge.
2.35 V
The
Number of
Storage
Batteries in
Each
Group
Primary power supplies shall be able to operate in parallel, and there should be current
equalizing device between them.
The primary power supplies should be equipped with a current limiting device.
The output voltage of the primary power supply should meet the requirement for initial
charging of storage batteries, that is 2.35 x 24= 56.4 V DC (when the power supply is -48
V DC)
A DC voltmeter and an ammeter should be installed for the primary power supplies.
The efficiency of the primary power supply should be more than 85% and its power factor
more than 0.8.
Natural cooling is recommended for the primary power supply. The primary power supply
should be able to work continuously with full load within 0C - 40C.
The output noise voltage (measured with a psophometer, plus weighing factors) of the
primary power supply should meet the requirements shown in Table 3-9.
The primary power supply should be able to automatically shut down the output at a low
voltage.
Issue 02 (2013-08-10)
Item
- 48
- 38.4 to - 57.6
28
Item
Noise
voltage
3 Installation Preparation
300 Hz - 3400Hz
Broadband:
100 mV effective
value
Broadband: 30
mV effective
value
500 kHz - 30
MHz
The capacity of the primary power supply should be designed according to the power
consumption of the transmission equipment of the terminal office, and a certain margin
should be reserved. Generally, high frequency switching power supplies with a high
switching efficiency should be adopted, which should work in N+1 hot standby mode.
There should be an output current equalizer for each power module. The failure of a single
power module will not affect the normal operation of the whole DC power distribution
system.
Each control panel can access a minimum of two groups of storage batteries. When one of
them fails, the other can supply power instead.
The power supply equipment should be capable of automation, so as to satisfy the nonattendant requirement.
When the primary power supply charges the storage batteries in floating charge mode, the
number of primary power supplies put into operation depends on the load. When one
primary power supply becomes faulty, it will drop out automatically, while the standby
primary power supply will automatically go into operation.
In the case of mains outage, storage batteries will discharge. When the mains resumes, it
will automatically recharge the discharged storage batteries with a current 0.1 to 0.15 times
of the battery capacity. When the charging voltage reaches 56.4 V, it will automatically
change to constant-voltage charging.
When the storage batteries are fully charged, they will automatically change to floating
charge.
The OptiX optical transmission equipment also has critical restriction on random transient
noises, which include the abnormal operation noise of the equipment caused by external
magnetic interference and the interference from the equipment itself and the grounding cables.
The shorter the duration of the transient pulse, the higher values of such transient noises can be
allowed. For the allowable values, see Figure 3-3.
Issue 02 (2013-08-10)
29
3 Installation Preparation
100V
10V
1V
0.1V
0.1 m s
1 ms
1 0 ms
100 m s
1 000 m s
When the power supply equipment fails or works abnormally, visual and audible alarms
should be given. Such alarm information should be able to be sent to the operation and
maintenance center.
In case short circuit occurs in a tributary of the power supply system, the whole power
distribution system should not be affected by the sharp voltage reduction. And the peak
striking voltage should not cause any breakdowns to the transmission equipment.
Backup lighting system, which is powered by backup power supply (diesel electric
generator) of the office.
Emergency lighting system, which is powered by storage batteries when the mains supply
has been interrupted but the backup power supply has not yet started to supply power.
ESD protection
The equipment-affecting electrostatic induction comes from the external electric field such as
outdoor high voltage transmission line or lightning. It also comes from the internal system such
as indoor environment, floor materials or equipment structure.
Static electricity may damage the chips on integrated circuit boards and cause faults in software
and electronic switch. Statistics shows that 60 percent of the damaged circuit boards are caused
by static electricity. It is essential to take effective ESD protection measures.
The following measures are recommended:
l
Issue 02 (2013-08-10)
Ground the equipment well. While laying the raised floor covered with semiconductive
materials, copper foil should be used for grounding at a number of points on the floor (the
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
30
3 Installation Preparation
copper foil should be placed between the concrete ground and the semiconductive floor
and should be connected with the ground cable).
l
Take dust-proof measure. Dust may do great harm to the optical synchronous transmission
equipment. Dusts or other particles getting into the equipment room may cause poor
connection between connectors or metal connecting points. When the humidity in the room
is high, dust can cause electrical leakage. It is found in maintenance that the equipment
failure is often caused by accumulated dusts. Especially, when the humidity in the room is
very low, electrostatic adherence is likely to occur.
Keep proper temperature and humidity. Too high humidity may make the metal components
rusty, while too low humidity may induce static electricity.
Always wear an ESD wrist strap and lab coat when touching a circuit board to prevent
electrostatic damage to the equipment.
Interference prevention
With the development of technologies and social economy, more and more electromagnetic
signals are transmitted in the air. They may affect the communication quality by causing crosstalk and stray noise, and even result in communication interruption. The electromagnetic
interference (EMI) sources include:
l
The transformer
Switches
Waveform distortion of the power supply network caused during the operation of large
equipment
Natural interference sources such as terrestrial magnetic field and external radiation
The interference, from either inside or outside the equipment or the application system, affects
the equipment through conductive modes such as capacitance coupling, inductance coupling,
electromagnetic wave radiation, common impedance (including grounding system) and cable
(power and signal cables). In terms of external relations of the equipment, interference is from
the signal cable, power cable, grounding system and spatial electromagnetic wave.
Integrated circuits (ICs) have the interference resistance capability to a degree. However when
the external noises go beyond their anti-interference tolerance, corrupted signals and even system
malfunction will be caused. It is impossible to eliminate or shield all the interference sources,
but the following measures can be taken to suppress the interference signals:
l
High frequency interference in the power supply network is generated when the primary
coil of the power supply transformer is coupled to the secondary coil through distributed
capacitors. To suppress such interference, we can use an appropriate transformer, and install
a low-pass filter at the inlet of the power supply cable.
The interference of the transient voltage in the power supply network can be reduced by
inputting power directly from the primary transformer with a filter capacitor for the optical
synchronous transmission equipment.
When the optical synchronous transmission equipment works in the 50 Hz mains power
supply network with the above interference, the surge voltage caused by the power supply
network and the over-voltage generated by lightening will be passed to the power supply
of the optical synchronous transmission equipment, which leads to computing errors of the
Issue 02 (2013-08-10)
31
3 Installation Preparation
processors. Therefore, before directly using the mains supply, effective measures against
interference from power supply network should be taken.
l
The key to eliminate the interference from the grounding system is to avoid loops among
various grounds, such as the signal ground (including analog and digital grounds), BGND,
PGND and shield ground, or loops formed by large distributed capacitors. Otherwise, the
common impedance interference from the grounding system may affect the operation of
the equipment. In buildings other than high-rises, the working ground of the optical
transmission equipment should be separated as far as possible from the ground for
electricity equipment and surge protection device.
EMI from the telecommunications line should be restrained. Influenced by high frequency
electromagnetic field (external interference), high longitudinal voltage will occur in the
core and sheath of the communication cable. Because of the asymmetry of cores in the
cables, the longitudinal voltage will generate a horizontal noise voltage at the ends of the
cores. When both ends of the cable sheath are grounded, the sheath will function as a shield
layer, greatly reducing the longitudinal voltage and reducing the interference voltage. Other
effective methods include: reduce the voltage or current of the interference source; reduce
the line length and the spacing of the conducting wires to reduce the area of the affected
loop; directly place the insulated conducting wires on the grounded floor; use a special
grounding feedback cable to avoid co-impedance; or twist the signal cable and the feedback
cable together to offset partial peripheral electromagnetic interference, and so on.
Fire protection
For small equipment rooms, a certain number of portable fire extinguishers should be equipped
in each room for an initial fire control. In large equipment rooms, fire extinguishing facilities
should be equipped. An automatic fire alarm system should also be equipped in the equipment
room. All telecom buildings with fire alarm system should have fire emergency lighting system
and evacuation instruction marks at important places, paths and gateways.
Anti-earthquake demand
The designed anti-earthquake intensity of the telecom equipment room must be one degree
(Richter scale) higher than that for the common buildings. The equipment room building that
cannot meet the requirement should be reinforced. When installing the OptiX optical
transmission equipment, the following anti-earthquake measures should be taken.
l
Use steel framework for the cabinet of the equipment. There are locking devices to fix the
boards in the cabinet.
The cabinet is reinforced with guide rail on the top and supports at the bottom.
Surge protection
Chimneys, antennas or other things that are over 15 m tall on the top of the equipment room
building should be designed according to the surge protection requirements for civil buildings.
Measures should be taken against direct flash and intrusion of lightning current. In the main
high-rise transmission building, protective measures should be taken to prevent side lightning
strokes, especially in frequent lightning areas. Therefore designers should take actual conditions
into consideration and take appropriate measures. For example, connect the metal external
Issue 02 (2013-08-10)
32
3 Installation Preparation
window frame to the surge protection wire; along the height of the building, place the surge
protection metal bands at a definite spacing on the outside wall, and so on.
The main equipment-room building should be provided with the following surge protection
measures:
l
The building should be installed with surge arrester nets or bands at the positions susceptible
to lightning strokes. Lightning prevention wires or lightning rods should be installed on the
top of chimneys and antennas that are protruding from the building. The cross-sectional
area of the grounding wire of the surge protection device should not be smaller than 120
mm2, while the space between the wires not larger than 30 m.
Outdoor cables and metal pipes should be grounded before entering the building, and the
outdoor overhead cables should be equipped with lightening protection devices at the inlet
of the building.
It is suggested to use roof plates, beams and pillars made of reinforced concrete and the
reinforcement bar as the ground wires of lightening arresters.
In the past surge protection grounding of the building was separate from the grounding for
telecom system and power supply system, and a large distance was required between the
grounding objects. However, the distance requirement is not satisfied due to small space of the
building. In fact, they cannot be separated in most cases, so joint grounding system is
recommended for the lightening protection grounding of the building. The joint grounding
system shall connect the telecom BGND, PGND, surge protection grounding of the building,
and grounding of the power frequency AC power supply system. A high earth resistance of the
joint grounding system is required. The earth resistance required by telecommunication is far
lower than 10 ohms, and the grounding requirements for different telecom devices vary, so the
resistance of the joint grounding system should be determined according to the minimum
resistance required for the grounding device.
It is recommended to use steel bars in the walls and pillars of the building as ground wires for
lightening protection. These wires should be electrically connected so as to equalize the electric
potential in the building.
33
3 Installation Preparation
Equipment is kept away from a tree or other plants. Otherwise, insects may be absorbed
by fans, resulting in damage to fans.
Equipment is installed at least 500 m away from the seashore. If the network cabinet or
outdoor cabinet is configured with fans, ensure that the air intake vents do not face the
direction in which the sea wind blows.
In an area prone to snow or rain, the vents of the network cabinet or outdoor cabinet are at
least one meter higher than the position with accumulated water or snow.
Equipment is installed in a position away from water drips (outdoor part of an air
conditioner and dripping eave).
The AC power system feeds power stably and no other devices with high power
consumption are operating. The rated voltage of the AC power system is 220 V and the
voltage on the power grid fluctuates within 10%. After equipment is installed, the voltage
between L and N is 220 V, the voltage between L and PE is lower than 220 V, and the
voltage between N and PE is lower than 5 V. Otherwise, electrical leakage may occur on
the equipment and the user may fall victim to electric shock.
Equipment does not face directly to windows of residential buildings. A network cabinet
is at least 5 m away from windows and an outdoor cabinet is at least 10 m away from
windows.
When equipment is installed on a wall, the equipment is at least one meter above the ground.
This distance keeps equipment beyond the reach of residents.
The air intake vents on equipment are far away from outlets of a sewer, large digestion
tank, or sewage treatment pool. Equipment is under positive pressure, which helps block
aggressive gas. Aggressive gas may erode electronic components or PCBs.
34
3 Installation Preparation
Protection Rating. The first number "5" refers to the rating for preventing the solid particle from
entering the network cabinet. That is, ingress of dust is not totally prevented, but dust shall not
penetrate in a quantity to interfere with satisfactory operation of apparatus or to impair safety.
The second number "5" refers to the rating for preventing water from entering the network
cabinet. That is, water projected in jets against the enclosure from any direction shall have no
harmful effects.)
In regions with heavy dust, it is recommended that customers add air filters to their customized
network cabinets to improve the reliability of the network cabinet.
SO2
ppb
10
H2S
ppb
NH3
ppb
500
Cl2
ppb
The equipment installation environment cannot be surrounded with pollution sources such as
drainage ditches, coal-fired power plants, smokestacks, fertilizer plants, paper mills, or daily
commodity factories.
Issue 02 (2013-08-10)
When the PTN equipment is installed in a network cabinet, the temperature at the air intake
vent cannot exceed the maximum temperature permitted by the equipment to run normally,
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
35
3 Installation Preparation
and the network cabinet must be capable of dissipating the heat generated by all the
equipment installed in the network cabinet.
2.
The permitted temperature at the air intake vent of the network cabinet ranges from -20 C
to 50 C.
3.
Fans need to have the backup function. After a fan fails, the other fans can still work
normally. A failed fan needs to be replaced in time. For more information about the air
volume of fans, see the air volume of an indoor cabinet.
4.
The heat dissipation capability of a network cabinet without fans is greater than the
maximum total heat dissipation consumption of the equipment in the network cabinet, and
the internal temperature of the network cabinet is lower than the maximum working
temperature of the equipment.
Dimensions (mm): H x
WxD
The air intake vent is located on the left panel of the network
cabinet and the air exhaust vent is located on the right panel of the
network cabinet.
Cross-sectional area of
the air vents on the
network cabinet (cm2)
230
Requirem
ents for the
position
where the
PTN
equipment
is installed
in the
network
cabinet
It is recommended that the air vents on the equipment face the air
vents on the network box, and the distance between the equipment
and a side panel of the network box be at least 20 mm. In this
manner, the heat air can be directly exhausted.
Requirem
ents for the
width
If air vents are blocked, the blocked area of the air vents does not
exceed 10% of the total area of the air vents.
After installation, the fans on the equipment are on the left. When
the fans are rotating, the air flows from left to right, in the same
direction as the air ducts of the network cabinet.
Requirem
ents for the
height
Issue 02 (2013-08-10)
460
36
3 Installation Preparation
Table 3-12 Requirements for a network cabinet with natural heat dissipation where the OptiX
PTN 950 is installed vertically
Supported
installation mode
Vertical installation
Dimensions (mm): H x
WxD
Air exhaust vent are close to the top of the network cabinet and air
intake vents are close to the bottom of the network cabinet.
Cross-sectional area of
the air vents on the
network cabinet (cm2)
230
Requirem
ents for the
position
where the
PTN
equipment
is installed
in the
network
cabinet
Requirem
ents for the
width
Requirem
ents for the
height
The directions of the air intake vent and the air exhaust vent on
two sides of the equipment need to be the same as the vent
directions of the network cabinet. This ensures that the heat air can
be directly exhausted out of the network cabinet.
460
The distance between the equipment and the ODF or power supply
on the top or at the bottom of the network cabinet is at least 45
mm.
If air vents are blocked, the blocked area of the air vents does not
exceed 10% of the total area of the air vents.
After installation, the fans on the equipment are in the lower part.
When the fans are rotating, the air flows from bottom to top, in the
same direction as the air ducts of the network cabinet.
Issue 02 (2013-08-10)
Sets of equipment
that can be housed in
the network cabinet
Dimensions (mm): H x
WxD
42
84
126
37
3 Installation Preparation
Sets of equipment
that can be housed in
the network cabinet
One 9 cm fan or
two 8 cm fans
connected in
parallel mode (Air
volume =
Maximum air
volume of a single
fan x 0.5 x Number
of fans)
One 15 cm fan or
two 12 cm fans
connected in
parallel mode (Air
volume = Maximum
air volume of a
single fan x 0.5 x
Number of fans)
Fan positions
Cross-sectional area of
the air vents on the
network cabinet (cm2)
81
Requirem
ents for the
position
where the
PTN
equipment
is installed
in the
network
cabinet
The distance between each side (left or right side) of the equipment
and the corresponding side panel of the network cabinet is at least
40 mm.
Requirem
ents for the
width
144
225
If air vents are blocked, the blocked area of the air vents does not
exceed 10% of the total area of the air vents.
Requirem
ents for the
height
Issue 02 (2013-08-10)
38
3 Installation Preparation
In the case of a network cabinet with fan cooling, arrange air intake vents and fans properly so
that air flows evenly without forming an air reflow zone.
A network cabinet with fan cooling also enables air to flow in three typical modes, that is, bottom
in top out, bottom in side out, and side in side out, as shown in Figure 3-6.
Figure 3-6 Recommended air ducts for a network cabinet with fan cooling
The fan tray assembly must match the design of vents on a network cabinet and generate
sufficient air volume.
A general rule to design vents is to determine the area of vents based on the size of the fan tray
assembly. This ensures a minimum of 30% of the maximum air volume generated by fans.
For example, a fan tray assembly with dimensions of 120 mm x 120 mm x 25 mm generates 144
CFM air volume to the maximum. In this case, when the area of vents is 14400 mm 2 (40 mm
x 360 mm or 120 mm x 120 mm), the system can obtain 57.6 CFM air volume at least.
Issue 02 (2013-08-10)
39
3 Installation Preparation
When installing the PTN equipment in a network cabinet, you need to follow the standard
of installing the equipment in a 19-inch cabinet. There must be at least 3 U space for
installation, the cabling space in front of the equipment must be no less than 75 mm.
When installing the PTN equipment in an outdoor cabinet, you also need to follow the
standard of installing the equipment in a 19-inch cabinet. There must be at least 3 U space
for installation, the cabling space in front of the equipment must be no less than 75 mm.
When a network cabinet is installed on a wall, sufficient space must be left around the
cabinet. For more information regarding the space requirements of a network cabinet, refer
to 4.3 Dimensions and Installation Clearance Requirements, which describes space
requirements of an IMB network cabinet.
At least 800 mm space must be left in front of the network cabinet.
At least 200 mm space must be left at the rear of the network cabinet.
At least 200 mm space must be left on the top of the network cabinet.
At least 300 mm space must be left below the network cabinet.
DANGER
When routing power cables or service cables connected to equipment to the outdoor area, do not
route them overhead.
1.
Issue 02 (2013-08-10)
Ground the equipment in compliance with national regulations, industry standards, and
carrier regulations.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
40
3 Installation Preparation
NOTE
l When the device is installed inside the building, and the subscriber cable and power cable are routed
in the overhead cabling mode, install an elementary surge protection device on the input side of the
AC power system and ensure that the surge protection rating is not smaller than 5 kA (8/20 s).
2.
If the building has installation environment with a dedicated grounding system, use the
grounding system of the building directly to ground the device. Do not use the downlead
of the lightning belt or lightning rod of the building to ground the device.
3.
If the building does not have installation environment with a dedicated grounding system,
it is recommended that you use the protective earthing (PE) of the AC power distribution
system of the building to ground the device.
4.
If the building does not have any dedicated installation environment for grounding devices
or the PE of the AC power distribution system, construct a new grounding system. It is
recommended that you install the network cabinet on a lower floor of the building to reduce
the grounding cost.
5.
Routing the aerial open wire into the network cabinet is prohibited. Use the cable with
metallic jacket and route the cable underground into the network cabinet.
6.
After the power supply enters the network cabinet, use a surge protection bar.
7.
Connect all devices and metal parts in the network cabinet to the ground bar in the network
cabinet in an equipotential manner. Connect the ground bar in the network cabinet to the
external ground device by using a ground cable.
TN-C-S/TN-S AC Power System (N Wire and PE Wire Are Combined into One Wire
on the Lightning Protection Bar or N Wire and PE Wire Are Provided Separately)
It is recommended that you use the PE wire of the AC power cable to ground the equipment.
The prerequisite is that the PE wire of the AC power cable for the corridor of the building is
already grounded properly.
DANGER
The PE wire of the AC power cable must be grounded. Otherwise, electrical leakage may occur
on the device and cause personnel injury.
Figure 3-7 shows the grounding connections of the TN-C-S AC power system.
Issue 02 (2013-08-10)
41
3 Installation Preparation
Figure 3-8 shows the grounding connections of the TN-S AC power system.
Figure 3-8 Grounding connections of the TN-S AC power system
Use a ground cable (the cross-sectional area of the ground cable must be at least 6 mm2) to
connect all devices in the network cabinet to the ground bar of the network cabinet. Connect the
ground bar to the network cabinet in an equipotential manner through a metallic structure.
Use a ground cable to connect the grounding point of the reinforcing rib of the optical fiber to
the ground bar. You can also connect this grounding point to the network cabinet in an
equipotential manner through a metallic structure.
Use a ground cable (the cross-sectional area of the ground cable must be at least 16 mm2) to
connect the ground bar of the network cabinet to the PE wire of the corridor AC power supply.
TT AC Power System (Provide Only L Line and N Line and Directly Ground the
Device)
It is recommended that an external ground device be adopted. For example, use the dedicated
ground device (such as the ground flat steel sheet, ground post, and ground bar) of the building
or the base concrete bar of the reinforcement concrete of the building, or deploy a new earth
screen.
Figure 3-9 shows the grounding connections of the TT AC power system.
Issue 02 (2013-08-10)
42
3 Installation Preparation
Use a ground cable (the cross-sectional area of the ground cable must be at least 6 mm2) to
connect all devices in the network cabinet to the ground bar of the network cabinet. Connect the
ground bar to the network cabinet in an equipotential manner through a metallic structure.
Use the ground cable to connect the grounding point of the reinforcing rib of the optical fiber to
the ground bar. You can also connect this grounding point to the network cabinet in an
equipotential manner through a metallic structure.
Use a ground cable (the cross-sectional area of the ground cable must be at least 16 mm2) to
connect the ground bar of the network cabinet to an external ground device.
NOTE
l In an installation environment with dedicated ground devices, the corridor ground device is
recommended for grounding.
l In an installation environment without dedicated ground devices, it is recommended that the base
concrete bar of the reinforcement concrete of the building be used or a new earth screen be deployed
for grounding.
Issue 02 (2013-08-10)
The electrical continuity between parts of the network cabinet must be satisfactory to
provide reliable grounding, safety, and protection performance. Ensure that the resistance
between any two connected points is less than 0.1 ohm. You can use a multimeter to measure
the resistance.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
43
3 Installation Preparation
For the AC-powered cabinet, it is recommended that you reserve a surge protection bar and
ensure that the surge protection rating is not smaller than 5 kA (8/20 s).
The network cabinet must provide a ground bar for grounding all devices in the cabinet in
a unified way. The resistance of the PGND cable must be smaller than 10 ohms.
The water that enters the cabinet must be within the amount that may affect the normal
operation and safety performance of the cabinet. Water must not accumulate on the
insulating parts that may cause electrical leakage within the creepage distance. Water must
not enter the electrical parts or enter the winding (resistance) that cannot be used in the
damp state. No water accumulates around the cable head or enters the cable.
When the wall is not flat, the network cabinet can be leveled so as to be installed reliably
(the recommended adjustable scope is 10 mm at least).
The space for routing power cables, optical fibers, and subscriber cables are planned properly
in the network cabinet. Various types of cables are routed separately and the cables do not cross
over each other. The positions of the MDF and the ODF are proper to ensure that the cable length
is proper after the device is installed.
44
3 Installation Preparation
Issue 02 (2013-08-10)
45
Issue 02 (2013-08-10)
3 Installation Preparation
46
3 Installation Preparation
Aperture
Cable
100mm
An area close to a pollution source refers to an area where saline water such as the sea or a salina is within 3.7
km away from it, where a heavy pollution source such as a metallurgical plant, coal mine, or thermal power
plant is within 3 km away from it, where a medium pollution source such as a chemical plant, rubber plant, or
electroplating factory is within 2 km away from it, or where a light pollution source such as a food factory,
leather factory, or heating boiler is within 1 km away from it.
Issue 02 (2013-08-10)
47
3 Installation Preparation
The electrical continuity between parts of the outdoor cabinet must be satisfactory to
provide reliable grounding, safety, and protection performance. Ensure that the resistance
between any two connected points is less than 0.1 ohm.
The AC power system must be installed with an elementary surge protection device and
the surge protection rating must not be smaller than 20 kA (8/20 s).
The MDF must be installed with protective units and the surge protection rating must not
be smaller than 1 kA (8/20 s).
The cabinet must provide an internal ground bar for grounding all devices in the cabinet in
a unified way. The resistance of the PGND cable must be smaller than 10 ohms.
48
3 Installation Preparation
The water that enters the cabinet must be within the amount that may affect the normal
operation and safety performance of the cabinet. Water must not accumulate on the
insulating parts that may cause electrical leakage within the creepage distance. Water must
not enter the electrical parts or enter the winding (resistance) that cannot be used in the
damp state. No water accumulates around the cable head or enters the cable.
When installed on a concrete floor, the cabinet can be leveled so as to be installed reliably
(the recommended adjustable scope is 10 mm at least).
The space for routing power cables, optical fibers, and subscriber cables are planned properly
in the outdoor cabinet. Various types of cables are routed separately and the cables do not cross
over each other. The positions of the MDF and the ODF are proper to ensure that the cable length
is proper after the device is installed.
The fiber management tray is installed in a proper position beyond the air exhaust vent.
When devices are installed in an outdoor cabinet, they cannot block the internal air vents. A
distance of at least 50 mm must be reserved between adjacent devices.
Place the battery and device in different compartments of the outdoor cabinet to protect the
device against corrosion.
Issue 02 (2013-08-10)
49
50
This section describes the procedure for installing the cover plate for the IMB.
Issue 02 (2013-08-10)
51
Diagonal pliers
Issue 02 (2013-08-10)
Crimping tool
Wire clippers
Rubber mallet
Wire stripper
Heat gun
Level
Multimeter
Measuring tape
Vacuum cleaner
ESD gloves
Hydraulic pliers
52
IMB
Figure 4-1shows an IMB.
Figure 4-1 Overview of IMB
When the OptiX PTN 950 equipment uses an external chassis, the AC/DC power supply equipment has
already been secured in the chassis and does not need to be installed separately.
Issue 02 (2013-08-10)
53
AC/DC Device
When only AC power is available on site, you can use the EPS30-4815AF power system to
convert the AC power into the DC power for the OptiX PTN 950. To ensure that the power
supply of the equipment is not interrupted, you can also connect the device to batteries. Then,
if the mains supply is interrupted, the device can be powered by batteries.
Figure 4-4 shows the appearance of the EPS30-4815AF power system.
Figure 4-4 Appearance of the EPS30-4815AF power system
Figure 4-5 shows the fuses of the output tributary and the output terminals of the EPS30-4815AF
power system.
Figure 4-5 Fuses of the output tributary and output terminals of the EPS30-4815AF power
system
Issue 02 (2013-08-10)
54
Table 4-1shows the mapping between the fuses of the output tributaries and the load tributaries.
Table 4-1 Mapping between the fuses of the output tributaries and the load tributaries
Fuse for the Output Tributary
Load Tributary
FU-1 (10 A)
LOAD1 (10 A)
FU-2 (20 A)
LOAD2 (20 A)
FU-BT (20 A)
BATT (20 A)
Figure 4-6 shows the connections of the EPS30-4815AF power system and batteries that supply
power to the ONU alternatively.
A storage battery array consists of four 12 V -40 Ah storage batteries. The dimensions of each
storage battery are 197 mm (W) x 165 mm (D) x 170 mm (H).
Figure 4-6 Connections of the EPS30-4815AF power system and batteries
Connect the device to the EPS30-4815AF power system with a monitoring cable, which is a
standard non-shielded network cable, so that the NMS can detect the working status of the power
system. Figure 4-7 shows pin assignment of a monitoring cable.
Issue 02 (2013-08-10)
55
Twisted
pair
Twisted
pair
None
White/orange
RJ-45 connector
PIN1
PIN2
None
Orange
PIN2
PIN3
White/blue
None
PIN3
PIN4
White/brown
Blue
PIN4
PIN5
Brown
White/blue
PIN5
PIN6
Blue
None
PIN6
PIN7
Orange
White/brown
PIN7
Brown
PIN8
PIN8
White/orange
Connect one end of a monitoring cable to the CLK1/TOD1 port on the device and the other end
to an RJ45 port on the monitoring module of the EPS30-4815AF power system (the RJ45 port
on the left is recommended).Figure 4-8 shows the connections.
Figure 4-8 Connections of the monitoring cable
56
Dimensions
Figure 4-9 shows the dimensions of the IMB.
Figure 4-9 Dimensions of the IMB
Issue 02 (2013-08-10)
57
Issue 02 (2013-08-10)
58
Figure 4-12 Installation clearance requirements for the IMB back-mounted on the wall
Issue 02 (2013-08-10)
59
Install cables
Powering On the
Equipment
End
Issue 02 (2013-08-10)
60
Context
NOTE
The installation procedure of the IMB left-side-mounted on the wall is the same as the procedure of the
IMB right-side-mounted on the wall. The following description is based on the IMB right-side-mounted
on the wall.
Procedure
Step 1 Remove the protection plate from the bottom of the IMB, as shown in Figure 4-15.
Issue 02 (2013-08-10)
61
NOTE
After all cables are routed, cut parts of the protection plate to seal cable holes if there is spare space in the
cable holes.
Step 2 Install the mounting ears on the IMB, as shown in Figure 4-16.
Figure 4-16 Installing mounting ears
Issue 02 (2013-08-10)
62
Step 3 Use a level to check that the two anchor holes on the marking template are on a horizontal plane,
place the marking template against the wall, and then use a marker to mark anchor points, as
shown in Figure 4-17.
Holes marked A are used as anchor points. The distance between the marking plate and the
ground is 1000-1200 mm.
Figure 4-17 Marking anchor points
(1) Level
CAUTION
The bolts in the wall must bear a stress of a minimum of 1.25 kN.
Step 4 Drill holes at the anchor points, and then install expansion bolt assemblies, as shown in Figure
4-18.
Issue 02 (2013-08-10)
63
Figure 4-18 Drilling holes at the anchor points and installing expansion bolt assemblies
Step 5 Place the IMB onto the two bolts at the upper anchor points, and then use a torque wrench to
pre-tighten the two bolts until a 20-30 mm length of each bolt is reserved out of the wall, as
shown in Figure 4-19.
TIP
Tighten the two bolts at the lower anchor points prior to the bolts at the upper anchor points, and ensure
that the subrack is vertical.
Issue 02 (2013-08-10)
64
Step 6 Align the mounting ears at the lower part of the IMB with the anchor holes, and then use a torque
wrench to tighten the bolts, as shown in Figure 4-20.
Issue 02 (2013-08-10)
65
Figure 4-20 Tightening the bolts at the lower part of the IMB
----End
Procedure
Step 1 Remove the protection plate from the bottom of the IMB, as shown in 4.5.2 Installing the IMB
on the Wall (Side-Mounted).
Step 2 Install the mounting ears on the IMB, as shown in Figure 4-21.
Issue 02 (2013-08-10)
66
Step 3 Use a level to check that the two anchor holes on the marking template are on a horizontal plane,
place the marking template against the wall, and then use a marker to mark anchor points, as
shown in Figure 4-22.
Holes marked B are used as anchor points. The distance between the marking plate and the
ground is 1000-1200 mm.
Issue 02 (2013-08-10)
67
(1) Level
CAUTION
The bolts in the wall must bear a stress of a minimum of 1.25 kN.
Step 4 Drill holes at the anchor points, and then install expansion bolt assemblies, as shown in 4.5.2
Installing the IMB on the Wall (Side-Mounted).
Step 5 Place the IMB onto the two bolts at the upper anchor points, and then use a torque wrench to
pre-tighten the two bolts until a 20-30 mm length of each bolt is reserved out of the wall, as
shown in Figure 4-23.
TIP
Tighten the two bolts at the lower anchor points prior to the bolts at the upper anchor points, and ensure
that the subrack is vertical.
Issue 02 (2013-08-10)
68
Step 6 Align the mounting ears at the lower part of the IMB with the anchor holes, and then use a torque
wrench to tighten the bolts, as shown in Figure 4-24.
Issue 02 (2013-08-10)
69
Figure 4-24 Tightening the bolts at the lower part of the IMB
----End
Procedure
Step 1 Slide the chassis along the guide rails into the corresponding slot on the right of IMB until it is
fully engaged, and then tighten the four M6x12 bolts on the panel, as shown in Figure 4-25.
Issue 02 (2013-08-10)
70
CAUTION
Make sure that the fan unit of the PTN equipment is on the top of the PTN equipment.
----End
Procedure
Step 1 Slide the AC/DC power device along the guide rails into the corresponding slot on the left of
IMB until it is fully engaged, and then tighten the four M6 x 12 bolts on the panel, as shown in
Figure 4-26.
Issue 02 (2013-08-10)
71
CAUTION
Ensure that the port for external power input is at the bottom of the AC/DC power device.
NOTE
In the DC power supply scenario, the PTN device is required. In the AC power supply scenario, the AC/DC
power device and PTN device are required.
----End
Issue 02 (2013-08-10)
72
Installing Fibers
End
CAUTION
l You must prepare cables according to actual cable routes during the installation.
l On site, tailor the 10 m long ground cable and make an suitable connector at each end, as
required.
l Attach engineering labels to both ends of each cable after the cable is installed.
Issue 02 (2013-08-10)
73
Figure 4-28 Cable connections in the external AC/DC power supply scenario
3
6
7
NOTE
During equipment installation, bundle power cables if they are too long.
Install ground cable for the IMB network cabinet. Then install ground cable for the AC/
DC power device and PTN equipment.
2.
3.
Install power cables between the AC/DC power device and PTN equipment.
4.
Install E1 cables.
Issue 02 (2013-08-10)
74
5.
6.
Install fibers.
4
2
7
5
6
Install ground cable for the IMB network cabinet. Then install ground cable for PTN
equipment.
2.
3.
4.
Install E1 cables.
5.
6.
Install fibers.
Issue 02 (2013-08-10)
75
Figure 4-30 Cable connections in the embedded AC/DC power supply scenario
6
5
7
2
Install ground cable for the IMB network cabinet. Then install ground cable for PTN
equipment.
2.
3.
Install E1 cables.
4.
5.
Install fibers.
Issue 02 (2013-08-10)
(2) External power cables (3) Ground cable for the PTN
equipment
76
(5) E1 cables
(7) Fibers
CAUTION
l During equipment installation, all signal cables need to be routed in underfloor mode and
then be led out of the chassis. If the cables are routed in overhead mode, water vapor is
condensed to water, which flows to the cabinet along the cables and then corrodes the boards.
As a result, the boards are short-circuited.
l When the IMB network cabinet is installed on the wall, the bending radius of the fibers let
out of the network cabinet must be no less than 40 mm so as to avoid over-bending.
l When routing the power and PGND cables on the bottom of the IMB network cabinet, ensure
that the holes for heat dissipation are not covered.
l After routing the cables for the equipment, bundle all the cables at the outlet of the cabinet,
avoiding stress generated on the internal cable connectors when the external cables are pulled.
l Lead fibers out of the cabinet outlet using winding pipes and bundle the winding pipes instead
of the fibers using cable ties.
Issue 02 (2013-08-10)
SN
Item
The devices are securely installed, and all the bolts are tightened.
All the power cables and PGND cables are not short-circuited or reversely
connected. In addition, no damaged or broken parts exist.
The lugs at both ends of the power cable or the PGND cable are securely
soldered or crimped.
The bare wire and OT terminal at the wiring terminal are tightly wrapped
with the insulation tape or heat shrink tubing.
77
SN
Item
The working grounding and protection grounding of the base station and
the surge protection grounding of the building share one group of
grounding conductors.
The connector of the signal cable is intact, and no damaged or broken parts
exist on the cable.
The distance between the bundled fiber and the BBU panel is between 40
mm and 70 mm.
10
Labels are correct, legible, and complete on both ends of each cable.
Procedure
Step 1 Fit the tabs on the cover plate into the slots in the IMB, as shown in Figure 4-31.
Figure 4-31 Installing the cover plate
Step 2 Tighten the M38 bolt on the bottom of the cover plate for the IMB to 0.3 Nm using a Phillips
torque screwdriver, as shown in Figure 4-32.
Issue 02 (2013-08-10)
78
----End
Issue 02 (2013-08-10)
79
Issue 02 (2013-08-10)
80
This section describes how to assemble the cable connector and how to test the connectivity of
the cable.
Issue 02 (2013-08-10)
81
Prerequisites
The chassis must be delivered to the site.
Antistatic gloves
Diagonal pliers
Paper knife
Precautions
CAUTION
l Integrated circuits (ICs) are sensitive to electrostatic discharge from the human body. When
handling boards or metallic parts of the equipment, wear ESD gloves and hold only the edges
of the boards during operation.
l If the equipment is transported from a cold and dry place to a warm and damp place, wait at
least 30 minutes before unpacking it. Otherwise, the moisture condenses on the board surface
and damages the components.
Procedure
Step 1 Transport the packing box to the equipment room.
Step 2 Check the packing box, and stop unpacking it in any of the following cases:
l The outer package is severely damaged.
l There is water leakage on the outer package.
Find the causes and provide feedback to the local representative office of Huawei.
Step 3 Observe the labels on the carton to check the equipment configuration and take a record.
Step 4 Cut the strap with the diagonal plier and then split the adhesive tape properly along the seam
between the cover and the body of the box with the paper knife. Do not scratch the articles inside
the box. See Figure 5-1.
Issue 02 (2013-08-10)
82
1
2
5
6
2. Strapping band
3. Carton label
4. Packing box
6. Foam protector
7. Chassis
Step 5 Open the carton and take out the chassis box from the carton.
Step 6 Open the chassis box and take out the chassis. Then, check whether the chassis is damaged.
----End
Prerequisites
None
Diagonal pliers
Issue 02 (2013-08-10)
83
Paper knife
Background Information
Generally, the board has been installed in the chassis properly before delivery and is shipped
together with the chassis. If a carton is used to pack boards for shipping, unpacking and checking
are necessary when the boards arrive at the destination. (Generally, a carton is used when boards
are required for capacity expansion.) The boards are put into shielding bags for transportation.
Take ESD protection measures when you unpack the boards to prevent damage to them.
Precautions
CAUTION
Electronic circuits and components are extremely sensitive to electrostatic discharge (ESD).
When handling circuit boards, make sure that you wear a securely grounded ESD wrist strap or
ESD gloves, and only hold the edge of boards during operation.
Procedure
Step 1 Wear a securely grounded ESD wrist strap (or ESD gloves) and make sure that it is securely
grounded. Check the packing box of the board and make sure it is intact without any damage.
Step 2 Cut the straps with diagonal pliers and use a paper knife to split the tape along the seam between
the cover and the box body. See Figure 5-2.
CAUTION
Do not cut too deep into the carton with the paper knife. Otherwise, the knife might scratch the
articles inside.
Issue 02 (2013-08-10)
84
Strap
Foam plate
Label on the
board box
Board box
Carton label
Cushon foam
Board box
Board
Shielding bag
NOTE
l Each board is packed in both a cushion foam and an shielding bag. Keep the bags properly. They can
be used later for keeping the boards or packing the damaged boards returned for repair.
l The ambient temperature and humidity may have an impact on the boards. In each shielding bag there
is a small bag of desiccant, which shall not be thrown away.
l Wait for at least 30 minutes before unpacking if the board is just moved from a cold, dry place to a
warm, damp place. Otherwise, moisture will condense on the board surface and damage the
components.
Step 3 Open the carton and check whether the number and type of the boards are consistent with what
is marked on the carton label.
Step 4 Check that there is no evident damage on the board package.
Step 5 Open the board box and take the board out of the shielding bag.
l Hold the bottom of the shielding bag with the left hand.
l Take the board out of the bag gently by its front panel with the right hand.
l Do not touch any electronic component on the board surface to avoid damage.
l Keep the bags properly.
Step 6 Check whether the board is physically damaged or is not in line with the packing list. Table
5-1 lists the checklist. In this case of any damage to the board, contact local representatives of
Huawei.
Issue 02 (2013-08-10)
85
Requirement
Outer view
Connector
Step 7 If no problem is found, put the board back into the board box and put it in the place specified
by the customer.
l If you are going to install the board right after unpacking, place the board on an ESD surface
to discharge the static electricity.
l If you are going to install the board at a later time, pack the board using the original materials
and place them at a cool dry place without direct sunshine or strong electromagnetic radiation.
----End
After the goods are inspected complete and intact, both the engineering supervisor and the
customer must sign the Packing List. After that, the customer takes over the goods.
During the inspection, if some equipment is stated undelivered in the Packing List, directly
report the situation to the order management engineer of the local office of Huawei for
subsequent handling. Both the engineering supervisor and the customer shall sign the
Packing List to confirm the situation.
If any short, wrong, extra or damaged equipment is found during the inspection, both parties
shall sign the Unpacking Memo and the Packing List. The project supervisor shall fill in
the Equipment Problem Report and send it to the order management engineer of the local
office of Huawei within three days.
Issue 02 (2013-08-10)
86
Cabinet
Model
Cabinet
Standard
Description of
the Mounting
Ear
l 19-inch
cabinet
IEC60297
The device
already has
mounting ears
installed.
l 19-inch open
rack
OptiX PTN 950
ETSI cabinet
ETSI300-119
Bridge
mounting ears
are delivered
with the device
and can be
installed on the
already installed
mounting ear.
l 19-inch
cabinet
IEC60297
The device
already has
mounting ears
installed.
l 19-inch open
rack
Image of the
Mounting Ear
NOTE
For details on the structure and dimensions of each mounting ear, see the OptiX PTN 950 Hardware
Description.
Prerequisites
The chassis must be installed correctly.
87
Procedure
Step 1 Connect the ESD wrist strap to the ESD jack on the chassis. Then, wear the ESD wrist strap as
shown in Figure 5-3.
Figure 5-3 Expected connection of the ESD wrist strap
Step 2 If a slot is covered with a filler panel, loosen the two captive screws using a screwdriver until
the screws spring out. Then, remove the filler panel.
Step 3 Rotate the ejector levers on the front panel of the board to the open position with both hands.
Step 4 Push the board gently into the slot along the guide rails. Then, push the front panel of the board
up to end when the board engages with the socket on the backplane. See Figure 5-4.
Figure 5-4 Inserting a board
Button
Step 5 Rotate the ejector levers to the close position. Figure 5-5 shows the expected insertion of the
board.
Step 6 Tighten the captive screws on the board, as shown in Figure 5-5. Installation of the board is
complete.
Issue 02 (2013-08-10)
88
----End
Prerequisites
The fibers or cables connected to the board must be removed.
Precautions
WARNING
Removing a working board may affect the equipment or interrupt services.
Procedure
Step 1 Wear the ESD wrist strap properly according to Figure 5-3.
Step 2 Loosen the captive screws on the front panel with the philips screwdriver until the screws spring
out. Then, rotate the ejector levers of the board to the open position with two hands when the
board disconnects to the socket. See Figure 5-6.
Step 3 Remove the board with stable force. See Figure 5-6.
Figure 5-6 Removing a board
Button
Issue 02 (2013-08-10)
89
Step 4 The removed board must be put into an ESD box or ESD bag. If the empty slot does not house
any other board, install a filler panel onto the slot according to 5.3.3 Installing a Filler Panel.
----End
Prerequisites
None
Procedure
Step 1 Cover the filler panel onto the empty slot.
Step 2 Drive on the captive screws on the filler panel according to Figure 5-5.
----End
Prerequisites
The fiber must be installed and routed from the optical interface to the ODF.
On the power supply device side, the power switch must be turned on.
Precautions
DANGER
Avoid direct eye exposure to laser beams when connecting the fiber.
Issue 02 (2013-08-10)
90
ODF
Fiber jumper
connected to
the out port
ODF side
Chassis side
Procedure
Step 1 On the chassis side, remove the fiber that connects to the OUT port of an optical interface board.
Step 2 Connect the optical power meter to the OUT port of the optical interface through the fiber.
Step 3 Turn on the optical power switch and set the working wavelength according to the optical
interface type. The optical power meter reads that the launched optical power of the optical
interface board is A.
Step 4 Recover the fiber connection to the OUT port.
Step 5 On the ODF side, remove the fiber that connects to the OUT port. Connect the fiber to the optical
power meter. The tested optical power is B.
Step 6 Remove the fiber from the corresponding OUT port of the optical interface board. The optical
power meter reads the LO state and receives no optical signals.
Step 7 Compare A with B.
l If the deviation between A and B is less than 1 dB, it indicates that the fiber is correctly
connected and the attenuation of the fiber is within the normal range.
l If the deviation between A and B is more than 1 dB, make sure the fiber is fine and correctly
routed, and then check whether the fiber terminal is clean.
Issue 02 (2013-08-10)
91
CAUTION
If the fiber is connected through a flange, the deviation between A and B should be less than 2
dB. Otherwise, it indicates that the fiber is incorrectly connected and the attenuation of the fiber
is not within the normal range. Make sure that the fiber is fine and correctly routed, and then
check whether the fiber terminal is clean.
Step 8 Check the fiber of the IN port in the same way.
Step 9 Recover the fiber connections on the chassis side and ODF side.
Step 10 Repeat Steps 1 - 9 to check fiber connections to other optical interfaces.
----End
Description
Working ground, protection ground (including shielding ground and lightning ground)
should be bonded to the same grounding electrode.
Cable racks, equipment frames and enclosures, metallic air ducts and doors and
windows in the equipment room should be grounded.
All the metallic equipment units that are normally neutral should be grounded.
The ground cables should firmly contact with the ground bar in the equipment.
Connection to the already grounded equipment for grounding purpose is not allowed.
Issue 02 (2013-08-10)
92
Description
Usually, the earth resistance of the telecommunication site where the base station
equipment is located is recommended to be less than 10 ohm. It also should comply
with the relative stipulation of the country.
Description
The PGND of the equipment should be connected to the nearby ground bar (usersupplied). Copper-core conducting cable with green-yellow plastic insulation cover
should be used.
The grounding terminals at the front door, rear door and side panels of the cabinet
should be separately connected to the grounding post of the cabinet.
The cabinets contact the adjacent cabinets in a row through the fixing bolts and
washers on the cabinet top.
When the cabinets of the same type are connected, cables not longer than 300 mm
should be used to connect the grounding busbars of adjacent cabinets, if these busbars
exist. The cross-sectional area of the short cables is required to be 6 mm2. Two ends
of the short cable should be secured to the terminals of the ground bar.
Issue 02 (2013-08-10)
93
Description
A C-level AC lightning protector with rated current not less than 20 KA should be
installed at the AC power cable inlet of the equipment room.
PGNDs of the office power and telecommunications equipment should finally connect
to the same grounding electrode. Grounds of telecommunications equipment and
office power in equipment room should be bonded to the ground bar in the same
equipment room.
The working ground and PGND of DC power system and the PGND of switching
equipment should finally connect to the same grounding electrode. Grounds of
telecommunications equipment and office power in equipment room should be bonded
to the ground bar in the same equipment room.
Issue 02 (2013-08-10)
No.
Description
In the case that the digital trunk line of the transmission equipment connects to the
wireless base station, no matter directly or indirectly, then E1 lightning protector
should be installed in the corresponding interface of the transmission equipment.
The outside cable should have metallic protection cover and two ends of the cover
should be well grounded. The end in the equipment room can be connected to the
ground bar in the equipment room. Lightning protector should be installed in the
interface connecting the coming cable. The ground cable of the lightning protector
should be as short as possible.
Both the outer conductor of coaxial cable and the metal shield of shielded cable should
firmly contact with the metal surface of the target equipment.
Idle wire pair in the signal cable should be grounded in the equipment room.
94
No.
Description
The TDA tone cable should pass through the main distribution frame (MDF) that has
a security unit before it goes out the office. Metal shield of the cable should connect
with the PGND of the MDF. The MDF and the cabinet should share the same
grounding electrode.
Overhead signal cables in the telecommunications office or mobile base station area
is not allowed.
Description
Ground cables should not be routed into the equipment room through overhead cable
trays. They should be routed under ground or inside the room.
The PGNG cable must be a jointless copper-core cable. Installing connectors, splices
or breakers to ground cables is not allowed.
The PGND cable should use copper-core conducting cable with green-yellow plastic
insulation cover.
The neutral wire of the AC power cable should not connect with the PGNDs of the
telecommunications equipment in the equipment room.
The PGND cable should be as short as possible (no more than 30 m). Otherwise, the
user should adjust the position of ground bar.
Issue 02 (2013-08-10)
95
NOTE
In case there is special requirement from the user of the equipment on the description method of the labels,
the labels should be printed accordingly. However, this must be stated in the self-check report.
5.6.1.1 Material
This section describes the requirements for the thickness, color, materials, ambient temperature,
and fill-in method of the labels.
l
Thickness: 0.09 mm
5.5
10.0
11.0
11.0
TO:
1.5
(2)
(1)
0.6
5.5
5.5
1.0
7.0
7.5
(1)
2.0
37.0
Unitmm
1.Dividing line
Issue 02 (2013-08-10)
96
The dividing lines on the label help to specify more clearly the position of a cable. For example,
there is one between the cabinet number and the frame number and another one between the
frame number and the slot number. The dividing line is 1.5 mm x 0.6 mm in size with the color
of PONTONE 656c (light blue).
The cut dotted line helps to fold the label when affixing it to the cable, and its size is 1.0 mm x
2.0 mm.
There is a mark "TO:" (upside down in the figure) at the lower right corner of the label. The
mark is used to identify the opposite end of the cable on which the label is affixed.
26.2
TO:
11
12.2
(2)
0.6
25
1.5
(1)
100
(3)
1.Cable tie
R1.0
2.Label
0.6
Issue 02 (2013-08-10)
97
Area 2 (with the mark "TO:") contains the location information of the opposite end of the
cable.
Printed parts on the label for signal cables, as shown in Figure 5-10.
Figure 5-10 Label for signal cables
Area 1
Area 3
TO:
Area 2
Seen from the cabling end of the equipment, the text part of the label is on the right side of the
cable. The side with "TO:" that is facing outside carries the location information of the opposite
end, and the other side carries the location information of the local end. Therefore, the
information in Area 1 at one end is the same as the information in Area 2 at the other end of the
cable, and vice versa. In other words, the local information at one end is called the opposite
information at the other end.
5.6.2.3 Remarks
To use labels, focus on the following points.
l
When printing/writing and affixing labels, pay attention to keep the labels clean.
Since the label paper is made of moistureproof and waterproof material, ink-jet printers
and ink pens are forbidden for printing and writing labels.
Cable ties should be bundled in the same position of power cables, with identification plates
on the same side.
The positions of "up", "down", "right" or "left" are all based on the viewpoint of the
engineering person who is working on the label.
Issue 02 (2013-08-10)
98
1.Cell
2.Cell
The settings of centered characters, direction, and fonts should not be changed.
When there are too many characters to be filled in, zoom out the characters, but make sure
the printouts are clear and legible.
To merge the cells, you should first recover the table structure (if gridlines are displayed, you
can start from Step 3 directly).
1.
2.
Select the menu item Format > Borders and Shading >Borders. Select Box and click OK.
Issue 02 (2013-08-10)
99
3.
Drag the mouse to select the cells to be merged and select the menu item Table > Merge
Cells.
If two merged cells are still not enough to accommodate the characters, use multiple lines.
Cover the blank paper onto the whole page of label paper, and check whether the page setup
conforms to the requirement.
2.
Make sure the printer properties, such as "paper size" and "direction", have been set
correctly.
3.
If the warning prompt as shown in Figure 5-12 appears before printing, click Ignore to
continue the printing.
If the printout conforms to the requirement, print it to label paper. If the printout does not
conform, adjust the page setup and try the printing again, until the correct printout is produced.
The method of adjusting the page setup is as follows:
1.
2.
3.
4.
Set Header and Footer to 0, and adjust the values of Top, Bottom, Left, and Right.
After the page setup has been made correct, save it for future use. This page setup is only
necessary the first time you use the template to print the labels.
All the printouts must be on the label, and nothing should be printed on the bottom page
of the label.
Contents in the cells should be aligned in the center. In a single-line printout, the dividing
lines and the mark "TO:" should not be covered by the printed characters.
Issue 02 (2013-08-10)
100
When the cells are merged and the printouts are made in multiple lines, avoid covering the
mark "TO:" when printing the texts by using the space bar to move the printing contents
to the next line.
CAUTION
Different from the ordinary paper, the label paper is composed of two pages. No matter what
model of printer you are using, feed in the labels one after another by hand. Never use the autofeed mode in order to avoid jamming the labels. Different models of printers may have different
feeding modes, make sure to feed in the labels correctly.
Writing pen
Use the black oiliness markers to write the labels.
In special cases, black ball-pens are allowed, although not recommended. When writing with
the ball-pen, take care not to leave the oil on the label, which may contaminate the label and blur
the words.
NOTE
The delivered marker has two nibs. Make sure to use the smaller nib to write the labels.
Handwriting
For the sake of easy recognition and good looking, the font in handwriting should be close to
the standard typeface as much as possible.Table 5-9 shows the standard typeface.
Table 5-9 Standard typeface for handwriting
0
The font size depends on the number of figures and letters. The words must be medium-sized,
legible, tidy and good-looking.
Writing direction
Write the characters in proper size, and the direction is shown in Figure 5-13.
Issue 02 (2013-08-10)
101
TO:
In special cases, for example, to avoid cable bent or affecting other cables, other positions are allowed to
attach the labels.
Stick the label to the proper position on the cable, fold the narrow part of the label according
to the directions shown in Figure 5-14.
Figure 5-14 Sticking the label onto proper position of the signal cable
2
TO:
A03 33 33 33 33
(1)
1. Cable
Issue 02 (2013-08-10)
(2)
(3)
2. Label
102
The length of the narrow part is based on an external cable diameter of 2.6 mm, after this part
has been stuck to the back of the label, it may not overlap the entire printed part.
l
Fold the printed part along the dotted line according to the directions shown in Figure
5-14.
After the printed part of the label has been folded, the narrow part of the label should be
covered completely, as shown in Figure 5-14.
B03
TO:
TO:
B03
-48V2
-48V2
Cable
Issue 02 (2013-08-10)
103
For equipment room installed with supports and ESD protection floor, cables can be
arranged in downward mode. That is, all cables can be routed through the interlayer of the
floor or the cable trough. If the overhead cabling mode is adopted, cabling tray is required
above the cabinet for holding cables.
The specifications and cross-sectional area of the cable, and the route and position for
cabling should be designed beforehand.
All cables should be arranged neatly, with their sheaths remaining intact.
Communication cables, such as alarm cables, network cables and clock cables, should be
arranged separately with the power cable and optical fibers.
Turnings of the cable should be smooth, with the bend radius reaching 60mm or above.
Any damage to the insulation layer of the conducting line is not allowed.
The cable arrangement should take the future maintenance and capacity expansion into
consideration.
Bundling of the cable should be tidy, clear and elegant. As a general rule, cables are grouped
by types, or grouped as needed when they are in a large number. Bind them with cable ties
and route them in either upward or underfloor cabling mode in the cabling area at the two
sides of the cabinet.
Cables must be bundled when arranged in ducts. Bind the cables closely with appropriate
tightness. The space between the cable ties should be even and the overall appearance of
the cabling nice.
You may not bind the cables when arranged in cable troughs. But they should be placed
tidy and straight in the trough with no crossover. Moreover, the cables can not overflow
the trough. At two ends and turnings of the trough, use a plastic clip for the cables.
Cables both inside and outside the cabinet must be bundled. Keep the cables bundled closely
and neatly.
Use cable ties of different specifications for cables according to actual circumstances.
Do not connect two cable ties in bundling. Otherwise, the binding strength will be
weakened.
After the bundling, cut the remaining part of the cable tie smoothly, removing all burrs.
The space between the cable ties is even and is three or four times the size of the bundle
diameter.
When making turning for the bundled cable, keep the bend radius as big as possible to avoid
breaking the cable cores at the turning.
104
2. Cable tie
3. Burr
4. Cut smoothly
CAUTION
To avoid any human-caused accidents, read this chapter carefully before bundling the fiber
jumpers.
Issue 02 (2013-08-10)
105
5.8.1.1 Architecture
The binding strap fulfills its locking function by cooperation of these two sides.
The binding strap for optical fiber is 12.7 mm wide, with one hook side (transparent
polypropylene material) and one mat side (black nylon material).
The architecture of the binding strap ,as shown in Figure 5-17.
Figure 5-17 Binding strap
2
1. Hook side
2. Mat side
5.8.1.2 Cutting
This procedure cutting the binding strap after installing the fiber jumpers.
Prerequisites
None
Cutterbar
Binding strap
Precautions
NOTE
Procedure
Step 1 Install the binding strap on the plastic axis of the cutterbar, as shown in Figure 5-18.
Issue 02 (2013-08-10)
106
1. Binding strap
2. Plastic axis
3. Cutterbar
Step 2 Roll the binding strap and allow it to pass through the guiding trough of the cutterbar.
Step 3 Cut the binding strap into appropriate length by slantly hauling the binding strap towards the
cutter tooth of the cutterbar, as shown in Figure 5-19.
Figure 5-19 Cut the binding strap
3
1. Binding strap
2. Guiding trough
3. Cutter tooth
----End
107
Prerequisites
None
Optical fiber
Binding strap
Precautions
NOTE
When you use a binding strap, keep the mat side inside and the hook side outside.
Procedure
Step 1 Arrange the optical fibers into a bundle.
Step 2 Cut off a piece of binding strap of appropriate length according to the size of the bundle.
Step 3 Hold the fiber bundle with one hand and press one end of the binding strap on the bundle with
the thumb.
Step 4 Strain the binding strap by the other end with the other hand, as shown in Figure 5-20.
Figure 5-20 Step 2 of bundling optical fiber
Step 5 Turn the binding strap around the fiber bundle with appropriate strain till the mat side adhibits
the hook side snugly, as shown in Figure 5-21.
Issue 02 (2013-08-10)
108
----End
5.8.2.3 Precautions
Bundle the fibers as the follow items.
l
It is only the mat side of the binding strap that contacts the optical fiber.
Bundle the optical fibers with appropriate tightness. Never bind them too tight.
The space between two binding straps should not exceed 40 cm.
Issue 02 (2013-08-10)
109
5.9.1.1 Assembling the Straight BNC Male Connector with the Coaxial Cable
This section describes how to assemble the straight BNC male connector with the coaxial cable.
Prerequisites
None
Procedure
Step 1 Strip off the sleeve of the coaxial cable according to the coaxial cable materials and sizes shown
in Figure 5-24. The external conductor, insulation layer and internal conductor should be
exposed as shown in Figure 5-24. Table 5-10 lists the recommended length of the reserved
external conductor (L1), reserved insulation layer (L2) and stripped sleeve (L3).
Issue 02 (2013-08-10)
110
Protection tube of
the coaxial cable
L1
Internal conductor
of the coaxial cable
L2
L3
CAUTION
l When stripping off the sleeve of the coaxial cable, do not scratch the external conductor.
l You can also determine the stripping size according to the size of the connector. Refer to
Figure 5-25.
External
Diameter
of the
Coaxial
Cable
L1 (mm)
L2 (mm)
L3 (mm)
Remarks
SYFVZ-751-1(A)
2.2 mm
5-6
7-9
10-12
SYV-75-22
3.9 mm
5-6
7-9
10-12
National
trunk 155MI
SYV-75-42
6.7 mm
5-6
7-9
10-12
National
trunk 155MIII
SFYV-75-2
-1
3.2 mm
5-6
7-9
10-12
National
trunk -II
SFYV-75-2
-2
4.4 mm
5-6
7-9
10-12
National
trunk 155MII
Label for
the NM
cable
Issue 02 (2013-08-10)
111
Figure 5-25 Size of the straight BNC male connector and stripping size of the coaxial cable
L1
L1
L2
L2
L3
L3
Step 2 Successively lead the heat shrink tube and crimping sleeve through the coaxial cable, as shown
in Figure 5-26.
Figure 5-26 Leading the heat shrink tube and crimping sleeve
Protection tube of
the coaxial cable
External conductor
of the coaxial cable
Step 3 Unfold the external conductor of the coaxial cable to a trumpet shape, as shown in Figure
5-27.
Figure 5-27 Unfolding the external conductor of the coaxial cable
External conductor
of the coaxial cable
Step 4 Insert the insulation layer and internal conductor into the connector plug of the coaxial cable.
The external conductor of the coaxial cable partly wraps the external conductor of the connector,
as shown in Figure 5-28.
Issue 02 (2013-08-10)
112
Figure 5-28 Inserting the straight BNC male connector into the coaxial cable
Connetor
Step 5 Use a welding tool to weld the internal conductor of the coaxial cable with the internal conductor
of the coaxial cable connector, as shown in Figure 5-29.
Figure 5-29 Welding the internal conductor
Internal conductor of
the coaxial cable
Connector
Welding
Step 6 Push the crimping sleeve toward the connector. Crimp the external conductor of the coaxial
cable tight. Use a crimping tool to tighten the crimping sleeve and coaxial cable connector, as
shown in Figure 5-30.
Figure 5-30 Crimping the external conductor
Crimping sleeve
Issue 02 (2013-08-10)
113
Step 7 Use a heat gun to blow the heat shrink tube so that the tube can tightly clad the crimping sleeve,
as shown in Figure 5-31. In this way, the straight BNC male connector is assembled with the
coaxial cable.
Figure 5-31 Blowing the heat shrink tube
----End
5.9.1.2 Assembling the L9-M Male Connector with the Coaxial Cable
This section describes how to assemble the L9-M male connector with the coaxial cable.
Prerequisites
None
Issue 02 (2013-08-10)
114
Protection tube
of the connector
Crimping sleeve
Connector
External conductor
of the coaxial cable
Internal conductor
of the coaxial cable
Protection tube of
the coaxial cable
Insulation layer of
the coaxial cable
Procedure
Step 1 Strip off the sleeve of the coaxial cable according to the coaxial cable materials and sizes shown
in Figure 5-33. The external conductor, insulation layer and internal conductor should be
exposed. See Figure 5-33. Table 5-10 lists the recommended length of the reserved external
conductor (L1), reserved insulation layer (L2) and stripped sleeve (L3).
Figure 5-33 Stripping off the coaxial cable
External conductor
of the coaxial cable
Insulation layer of
the coaxial cable
Internal conductor of
the coaxial cable
Protection tube of
the coaxial cable
L1
L2
L3
Issue 02 (2013-08-10)
115
CAUTION
l When stripping off the sleeve of the coaxial cable, do not scratch the external conductor.
l You can also determine the stripping size according to the size of the connector. Refer to
Figure 5-34.
Figure 5-34 Size of the connector and stripping size of the coaxial cable
L1
L1
L2
L3
L2
L3
Step 2 Lead the protection tube and crimping sleeve through the coaxial cable, as shown in Figure
5-35.
Figure 5-35 Leading the protection tube and crimping sleeve
Crimping
sleeve
Protection tube
of the connector
Step 3 Unfold the external conductor of the coaxial cable into a trumpet shape, as shown in Figure
5-36.
Issue 02 (2013-08-10)
116
External conductor
of the coaxial cable
Step 4 Insert the insulation layer and internal conductor into the connector of the coaxial cable. The
external conductor of the coaxial cable partly wraps the external conductor of the connector, as
shown in Figure 5-37.
Figure 5-37 Inserting the coaxial connector into the coaxial cable
Connector
Step 5 Use a welding tool to weld the internal conductor of the coaxial cable with the internal conductor
of the coaxial connector, as shown in Figure 5-38.
Issue 02 (2013-08-10)
117
Internal conductor
of the coaxial cable
Welding
Step 6 Push the crimping sleeve toward the connector. Crimp the external conductor of the coaxial
cable tight. Use a crimping tool to tighten the crimping sleeve and the coaxial cable connector.
See Figure 5-39. In this way, the straight L9-M male connector is assembled with the coaxial
cable.
Figure 5-39 Crimping the external conductor
2
Crimping
sleeve
----End
5.9.1.3 Assembling the Straight SMB Female Connector with the Coaxial Cable
This section describes how to assemble the straight BNC female connector with the coaxial
cable.
Prerequisites
None
118
Crimping sleeve
Connector
Protection tube of
the coaxial cable
External conductor
of the coaxial cable
Insulation layer of
the coaxial cable
Internal conductor
of the coaxial cable
Procedure
Step 1 Strip off the sleeve of the coaxial cable according to the coaxial cable materials and sizes shown
in Figure 5-41. The external conductor, insulation layer and internal conductor should be
exposed. See Figure 5-41. Table 5-10 lists the recommended length of the reserved external
conductor (L1), reserved insulation layer (L2) and stripped sleeve (L3). Then, twist the external
conductors of the coaxial cable as one.
Figure 5-41 Stripping off the coaxial cable
External conductor
of the coaxial cable
Insulation layer of
the coaxial cable
Internal conductor of
the coaxial cable
Protection tube of
the coaxial cable
L1
L2
L3
Issue 02 (2013-08-10)
119
CAUTION
l When stripping off the sleeve of the coaxial cable, do not scratch the external conductor.
l You can also determine the stripping size according to the size of the connector, as shown
inFigure 5-42.
Figure 5-42 Size of the connector and the stripping size of the coaxial cable
L1
L1
L2
L2
L3
L3
Step 2 Lead the crimping tube through the coaxial cable, as shown in Figure 5-43.
Figure 5-43 Leading the crimping sleeve
Protection tube of
the coaxial cable
Crimping
sleeve
Step 3 Unfold the external conductor of the coaxial cable into a trumpet shape, as shown in Figure
5-44.
Figure 5-44 Unfolding the external conductor of the coaxial cable
External conductor of
the coaxial cable
Issue 02 (2013-08-10)
120
Step 4 Insert the insulation layer and internal conductor into the connector of the coaxial cable. The
external conductor of the coaxial cable partly wraps the external conductor of the connector as
shown in Figure 5-45.
Figure 5-45 Inserting the coaxial connector into the coaxial cable
Connector
Step 5 Use a welding tool to weld the internal conductor of the coaxial cable with the internal conductor
of the coaxial connector, as shown in Figure 5-46.
Figure 5-46 Welding the internal conductor
Internal conductor
of the coaxial cable
Connector
Welding
Step 6 Push the crimping sleeve toward the connector. Crimp the external conductor of the coaxial
cable tight. Use the crimper to tighten the crimping sleeve and the coaxial cable connector, as
shown in Figure 5-47. In this way, the straight SMB female connector is assembled with the
coaxial cable.
NOTE
Crimp the external conductor of the coaxial cable twice by using the crimper with a jaw of 2.5 mm. That is,
crimp the external connector, rotate it by 90 degree, and then crimp it again.
Issue 02 (2013-08-10)
121
Crimping
sleeve
----End
Prerequisites
During the process of routing or bundling cables, and installing the connector, the circuit on the
cable may become open or broken. Hence, after the preceding procedures are completed, test
the connectivity of cables.
Background Information
In this section, the cable has a Anea 96 connector at one end and a group of SMB connectors at
the other, as shown in Figure 5-48. This section describes how to test the cable connectivity by
using a multimeter.
Procedure
Step 1 Set the multimeter to the resistance gear.
Step 2 On the SMB connector side, connect the two probes of the multimeter to the internal and external
conductors respectively.
Step 3 According to the pin sequence table of the connector, use a shorting stub to cause a short circuit
between the two pins corresponding to the SMB connectors. See Figure 5-48.
Issue 02 (2013-08-10)
122
R0
DDF side
Chassis side
5.9.2 Assembling the RJ45 Connector with the Ethernet Cable and
Testing the Connectivity
This section describes how to assemble the RJ45 connector with the shielded Ethernet cable or
non-shielded Ethernet cable, and how to test the cable connectivity and network cable
connection.
Issue 02 (2013-08-10)
123
Connector X1
Pin 1
White or
orange
White or
orange
Pin 1
Pin 2
Orange
Orange
Pin 2
Pin 3
White or
green
White or
green
Pin 3
Blue
Pin 4
White or
blue
Pin 5
Pin 4
Pin 5
Blue
White or
blue
Pin 6
Green
Green
Pin 6
Pin 7
White or
brown
White or
brown
Pin 7
Pin 8
Brown
Brown
Pin 8
Table 5-11 lists the pin assignment of the straight through network cables.
Table 5-11 Pin assignment of the straight through network cables
Connector
X1
Connector X2
Color
Relation
X1.1
X2.1
White or orange
Twisted pair
X1.2
X2.2
Orange
X1.3
X2.3
White or green
X1.6
X2.6
Green
X1.4
X2.4
Blue
X1.5
X2.5
White or blue
X1.7
X2.7
White or brown
X1.8
X2.8
Brown
Twisted pair
Twisted pair
Twisted pair
Figure 5-50 shows the pin assignment of the FE crossover network cables.
Issue 02 (2013-08-10)
124
Connector X1
White or
green
Pin 1
Orange
Green
Pin 2
White or
green
White or
orange
Pin 3
Blue
Pin 4
White or
blue
Pin 5
Pin 1
White or
orange
Pin 2
Pin 3
Pin 4
Pin 5
Blue
White or
blue
Pin 6
Green
Orange
Pin 6
Pin 7
White or
brown
White or
brown
Pin 7
Pin 8
Brown
Brown
Pin 8
Table 5-12 lists the pin assignment of the FE crossover network cables.
Table 5-12 Pin assignment of the FE crossover network cables
Connector
X1
Connector X2
Color
Relation
X1.6
X2.2
green
Twisted pair
X1.3
X2.1
White or green
X1.1
X2.3
White or orange
X1.2
X2.6
orange
X1.4
X2.4
Blue
X1.5
X2.5
White or blue
X1.7
X2.7
White or brown
X1.8
X2.8
Brown
Twisted pair
Twisted pair
Twisted pair
Figure 5-51 shows the pin assignment of the GE crossover network cables.
Issue 02 (2013-08-10)
125
Connector X1
PIN1
White or orange
White or green
PIN1
PIN2
Orange
Green
PIN2
PIN3
White or green
White or orange
PIN3
PIN4
Blue
White or brown
PIN4
PIN5
White or blue
Brown
PIN5
PIN6
Green
Orange
PIN6
PIN7
White or brown
Blue
PIN7
PIN8
Brown
White or blue
PIN8
Table 5-13 lists the pin assignment of the GE crossover network cables.
Table 5-13 Pin assignment of the GE crossover network cables
Connector
X1
Connector X2
Color
Relation
X1.1
X2.3
White or orange
Twisted pair
X1.2
X2.6
orange
X1.3
X2.1
White or green
X1.6
X2.2
Green
X1.4
X2.7
Blue
X1.5
X2.8
White or blue
X1.7
X2.4
White or brown
X1.8
X2.5
Brown
Twisted pair
Twisted pair
Twisted pair
Pin8
Pin1
Issue 02 (2013-08-10)
126
5.9.2.2 Assembling the RJ45 Connector with the Shielded Ethernet Cable
This section describes the materials of the RJ45 connector for the shielded Ethernet cable and
the procedures of assembling the RJ45 connector with the shielded Ethernet cable.
Prerequisites
None
A
B
C
D
E
F
G
- -
Procedure
Step 1 Lead the network cable through the connector external sleeve A, as shown in Figure 5-54.
Issue 02 (2013-08-10)
127
Figure 5-54 Leading the network cable through the connector external sleeve
Step 2 Strip a 300 mm length of the external sleeve E and cut the nylon rip cord inside the external
sleeve. Make a 5 mm cut on the cable external sleeve, as shown in Figure 5-55.
Figure 5-55 Stripping the external sleeve of the twisted pair cable
Max.5
F
30.0
CAUTION
l When stripping the sleeve of the twisted pair cable, do not scratch the shield layer.
l When stripping the shield layer, do not scratch the insulation layer covering the twisted cores.
Step 3 Lead the connector metal sleeve B through the twisted pair cable. The sleeve should envelop
the shield layer F, as shown in Figure 5-56.
Issue 02 (2013-08-10)
128
Step 4 Lead the connector metal sleeve to the root of the twisted pair cable sleeve. Cut the shield layer
and aluminum foil straight along the edge of the metal sleeve without leaving any aluminum
wires. Expose the twisted pair G, which is about 20 mm long, as shown in Figure 5-57.
Figure 5-57 Stripping the shield layer of the twisted pair cable
20.0
Step 5 Lead the four pairs of twisted cables, which are marked in different colors, through the connector
cable tray C respectively according to the colors. See Figure 5-58 and Figure 5-59.
Figure 5-58 Leading twisted pair cables through connector cable tray
Issue 02 (2013-08-10)
129
White-Orange
Orange
White-Green
Green
Blue
White-Blue
White-Brown
Brown
Step 6 Align the four pairs of twisted cables G on the connector cable tray C according to the illustrated
colors. See Figure 5-60 and Figure 5-61.
Figure 5-60 Aligning the four pairs of twisted cables on the connector cable tray
G C
Step 7 Cut the cables straight along the edge of the connector cable tray C, as shown in Figure 5-62.
Issue 02 (2013-08-10)
130
G C
Step 8 Lead the connector cable tray through the connector body D, and rotate the metal shield shell
90 degree to push the cable tray inward, as shown in Figure 5-63.
Figure 5-63 Inserting the cable tray through the connector body
WARNING
Make sure the connector cable tray is inserted to the bottom of the connector body.
Step 9 Move the connector metal shell B toward the connector body to envelop the connector body and
connector cable tray. Then, use the crimper to crimp the connector, as shown in Figure 5-64.
Issue 02 (2013-08-10)
131
Step 10 Move the connector external sleeve A toward the connector body until the external sleeve A
hitches the connector metal shell. Then, the cable components at one end are made. See Figure
5-65.
Figure 5-65 Hitching the connector external sleeve
Step 11 A network cable may be either a crossover cable or a straight-through cable. Which operations
should be performed at the other end depends on the network cable type.
l To assemble a straight-through cable, repeat Steps 1-10 to make the cable components at the
other end.
l To assemble a crossover cable, perform the following operations.
1.
2.
Repeat Steps 5-6. In Steps 5-6, for the wire sequence, refer to the mapping relation of
the crossover cables in Table 5-12.
3.
Repeat Steps 7-10 to make the cable components at the other end.
----End
5.9.2.3 Assembling the RJ45 Connector with the Non-Shielded Ethernet Cable
This section describes the materials of the RJ45 connector for the non-shielded Ethernet cable
and procedures of assembling the RJ45 connector with the non-shielded Ethernet cable.
Issue 02 (2013-08-10)
132
Prerequisites
None
B
C
A
Connector plug
Sleeve
Procedure
Step 1 Strip the twisted pair cable according to the illustrated size and cut a 16 mm length off the sleeve,
as shown in Figure 5-67.
Figure 5-67 Stripping the twisted pair cable
.0
16
B
C
Step 2 Align the twisted pairs in sequence and match the colors according to Figure 5-68. Cut the ends
of the twisted pairs straight.
Issue 02 (2013-08-10)
133
16
Step 3 Insert the cable B with the aligned twisted pairs into the connector plug A and crimp the connector
with a crimper, as shown in Figure 5-69.
Figure 5-69 Crimping the connector
Step 4 A network cable may be either a crossover cable or a straight-through cable. Which operations
should be performed at the other end depends on the network cable type.
l To assemble a straight-through cable, repeat Steps 1-3 to make the cable components at the
other end.
l To assemble a crossover cable, perform the following operations.
1.
Repeat Step 1.
2.
Repeat Step 2. In Step 2, for the wire sequence, refer to the mapping relation of the
crossover cables in Table 5-12.
3.
----End
Prerequisites
None
134
The metal contact slices should be of the same height and are of the required sizes. The
crimp part should properly contact the core conductor.
The metal contact slices should be basically parallel with a deviation of not more than five
degrees. The top edges should be basically parallel with the axes of the RJ45 connector
with a deviation of not more than 10 degrees. This ensures reliable contact.
No perceptible object, dirt or rust should be present on the surface of the metal contact slice.
Otherwise, the conductivity is affected.
The metal contact slices should reliably contact the RJ45 connector socket. The plastic
spacers should remain the same before and after the crimping, and should have the same
spacing between each other. Each of them should be straight and intact.
The crimping blade of the metal contact slice should exceed the core end. The core end
should tightly contact the trunking side of the RJ45 connector. The contact spacing should
not exceed 0.5 mm.
Procedure
Step 1 Hold the crimped RJ45 connector and observe the side from the front. Check the height of each
metal contact slice. The standard height is 6.02 mm 0.13 mm. If no special test instrument is
available on site, compare the RJ45 connector with another well crimped RJ45 connector. Figure
5-70 and Figure 5-71 show an unqualified RJ45 connector and a qualified RJ45 connector
respectively.
Figure 5-70 Metal contact slices of inconsistent height
Issue 02 (2013-08-10)
135
NOTE
If the RJ45 connector does not meet the requirement, crimp the RJ45 connector again and make sure the
RJ45 connector meets the requirement.
Step 2 Hold the RJ45 connector and slant it to a 45-degree angle. Side-glance the top edge of each metal
contact slice. Figure 5-72 an unqualified RJ45 connector.
Figure 5-72 Metal contact slices of inconsistent parallelism and height
Step 3 Hold the RJ45 connector. Observe the side and front of the metal contact slice, and check for
any perceptible object, dirt or rust. Remove the perceptible object, dirt or rust, if there is any. If
the removal fails, replace RJ45 connector and assemble the connector again. Otherwise, the
connector is unqualified. See Figure 5-73.
Figure 5-73 Metal contact slices with perceptible object, dirt or rust on the surface
Step 4 Hold the RJ45 connector. Observe the side and front of the metal contact slices, and observe the
plastic spacers. Make sure they are intact and do not tilt. If they tilt or are not intact, rectify the
Issue 02 (2013-08-10)
136
RJ45 connector. If the rectification fails, replace the RJ45 connector and assemble the connector
again. Otherwise, the connector is unqualified. See Figure 5-74.
Figure 5-74 RJ45 connector with tilted plastic spacers
Step 5 Hold the RJ45 connector and observe the side to check whether you can see the core section.
Make sure that the end of the cable core is close to the face of the cable trough of the connector.
The metal contact should be higher than the end of the cable core, and be properly crimped to
the cable core. If the RJ45 connector does not meet this requirement, replace the RJ45 connector
and assemble the connector again. Otherwise, the RJ45 connector is intact. See Figure 5-75.
Figure 5-75 Cable core not pushed to the proper position
----End
Prerequisites
During the process of routing or bundling cables, and assembling the connectors, the circuit on
the cable may become open or broken. Hence, after the preceding procedures are completed,
test the connectivity of the cable.
137
Background Information
You can also use a multimeter to test the connectivity of the network cable according to the core
connections. For details, see 5.9.1.4 Testing Cable Connectivity.
Procedure
Step 1 Insert the RJ-45 connectors at the two ends of the assembled network cable into the RJ-45 female
ports of the network cable tester in sequence.
Step 2 Make sure the RJ-45 connectors are inserted properly. Turn on the network cable tester and start
the test. In the case of the crossover cable and straight through network cable, the test procedures
are the same but the indicators at the two ends turn on in different sequences. Test the crossover
cable according to the core connections.
l In the case of the straight through network cable, the indicators at points 1, 8 and G turn on
in sequence. This indicates that the connectivity is fine and core connections are correct.
l In the case of the crossover cable, the indicators at points 1, 8 and G of the main end turn on
in sequence, and the indicators at points 3, 6, 1, 4, ,5 2, 7, 8 and G of the subsidiary end turns
on in sequence. This indicates that the connectivity of the crossover cable is proper.
NOTE
Turn the switch to position S to extend the interval for indicators to turn on. In this way, you can observe the
change more accurately. See Figure 5-76.
Step 3 Slightly shake the RJ45 connector of the assembled network interface and repeat Step 2. Make
sure that each metal contact slice of the RJ45 connector reliably contacts the core and contacts
the contact point of the female network port of the network cable tester.
----End
Issue 02 (2013-08-10)
138
Prerequisites
none.
A
B
C
B Ring terminal
Procedure
Step 1 Peel a part of the insulation layer C of a power cable according to the cross-section of the cable
conductor. The conductor D with length L1 appears, as shown in Figure 5-78. The recommended
values of L1 are shown in Table 5-14.
Issue 02 (2013-08-10)
139
L1
CAUTION
l When peeling the insulation layer of a power cable, do not hurt the metal conductor of the
cable.
l If the bare press-fitting terminal is not provided by Huawei, adapt the value of L1 according
to the actual value L of the terminal. L1 = L + (1-2) mm.
Value of L1(mm)
1, 1.5, 2.5
10
11
16
13
Step 2 Put the power cable into heat shrink tube A, as shown in Figure 5-79.
Step 3 Put the cable conductor into a ring terminal. And keep the ring terminal close to the insulation
layer C of the power cable, as shown in Figure 5-79.
Issue 02 (2013-08-10)
140
Figure 5-79 Inserting the cable conductor into the ring terminal
L2
C
A
CAUTION
After the conductor is put into the ring terminal, the L2 part will extrude. The value of L2 should
be less than or equal to 2 mm.
Step 4 As shown in Figure 5-80, press-fit the joint parts of the bare press-fitting terminal and the
conductor by a press-fitting tool.
Figure 5-80 Press-Fitting joint parts of a bare press-fitting terminal and a conductor
NOTE
The shapes of press-fit parts may vary with the types of the press-fitting dies.
Step 5 Push the heat shrink tube A towards the connector till the tube covers the press-fit part. Heat the
heat shrink tube using a heat gun, as shown in Figure 5-81.
Issue 02 (2013-08-10)
141
CAUTION
Do not heat the heat shrink tube for too long time. Otherwise, the insulation layer may be
damaged.
----End
Prerequisites
none.
Issue 02 (2013-08-10)
142
B
C
A
Procedure
Step 1 Peel a part of the insulation layer B of a power cable according to the cross-sectional area of the
cable conductor. The conductor C with length L1 appears, as shown in Figure 5-84. The
recommended values of L1 are shown in Table 5-15.
Figure 5-84 Peeling a power cable
L1
B
C
A
Issue 02 (2013-08-10)
143
CAUTION
When peeling the insulation layer of a power cable, do not hurt the metal conductor of the cable.
Value of L1(mm)
1, 1.5, 2.5
10
11
16
13
Step 2 Put the cable conductor into the cord end terminal A. Align the conductor with the edge of the
cord end terminal, as shown in Figure 5-85.
Figure 5-85 Putting a cable into a cord end terminal
CAUTION
After the cord end terminal is assembled, the exposed part of the conductor should not be more
than 1 mm.
Step 3 Press-fit the joint parts of the cord end terminal and the conductor using soldering tool, as shown
in Figure 5-86.
Issue 02 (2013-08-10)
144
Rough Flat
Step 4 After press-fitting the terminal, check the maximum width of the press-fit part. The width of the
tubular terminal after press-fit should be less than the maximum width described in Table 5-16
Table 5-16 Maximum width of tubular terminal after press-fit
Cross-Sectional Area of Tubular
Terminal(mm2)
0.25
0.5
1.0
1.5
1.5
1.5
2.5
2.4
3.1
10
5.3
16
----End
Issue 02 (2013-08-10)
145
A Glossary
Glossary
Numerics
1+1 hot backup
A backup mode in which two systems with the same functions are deployed, one in the
active state and the other in the standby state with power on. The standby system backs
up the data of the active system automatically. Once the active system encounters a fault,
the standby system takes over the service of the active system automatically or by manual
intervention.
1000BASE-T
Twisted cable with the transmission speed as 1000 Mbit/s and the transmission distance
as 100 m.
100BASE-TX
IEEE 802.3 Physical Layer specification for a 100 Mb/s CSMA/CD local area network
over two pairs of Category 5 unshielded twisted-pair (UTP) or shielded twisted-pair
(STP) wire.
10BASE-TX
IEEE 802.3 Physical Layer specification for a 10 Mb/s CSMA/CD local area network
over two pairs of Category 5 unshielded twisted-pair (UTP) or shielded twisted-pair
(STP) wire.
A
AAL
ABR
AC
A list of entities, together with their access rights, which are authorized to have access
to a resource.
ACL
active link
In the link aggregation group, the links connected to active interfaces are active links.
active/standby
switchover
address pool
Issue 02 (2013-08-10)
146
A Glossary
Address Resolution
Protocol
administrative unit
The information structure which provides adaptation between the higher order path layer
and the multiplex section layer. It consists of an information payload (the higher order
VC) and an AU pointer which indicates the offset of the payload frame start relative to
the multiplex section frame start.
Administrator
A user who has authority to access all the Management Domains of the EMLCore
product. He has access to the whole network and to all the management functionalities.
ADSL
advanced ACL
An advanced ACL can define ACL rules based on the source addresses, target addresses,
protocol type, such as TCP source or target port, the type of the ICMP protocol, and
message codes.
AF
aggregated link
aggregation
AIS
alarm automatic report When an alarm is generated on the device side, the alarm is reported to the Network
Management System (NMS) . Then, an alarm panel prompts and the user can view the
details of the alarm.
alarm cascading
alarm cause
A single disturbance or fault may lead to the detection of multiple defects. A fault cause
is the result of a correlation process which is intended to identify the defect that is
representative of the disturbance or fault that is causing the problem.
alarm clearance
alarm indication signal A code sent downstream in a digital network as an indication that an upstream failure
has been detected and alarmed. It is associated with multiple transport layers.
Issue 02 (2013-08-10)
147
A Glossary
alarm inversion
For the port that has already been configured but has no service, this function can be
used to avoid generating relevant alarm information, thus preventing alarm interference.
The alarm report condition of the NE port is related to the alarm inverse mode (not
inverse, automatic recovery and manual recovery) setting of the NE and the alarm
inversion status (Enable and Disable) setting of the port. When the alarm inversion mode
of NE is set to no inversion, alarms of the port will be reported as usual no matter whatever
the inversion status of the port is. When the alarm inversion mode of the NE is set to
automatic recovery, and the alarm inversion state of the port is set to Enabled, then the
alarm of the port will be suppressed. The alarm inversion status of the port will
automatically recover to "not inverse" after the alarm ends. For the port that has already
been configured but not actually loaded with services, this function can be used to avoid
generating relevant alarm information, thus preventing alarm interference. When the
alarm inverse mode of the NE is set as "not automatic recovery", if the alarm inversion
status of the port is set as Enable, the alarm of the port will be reported.
alarm mask
On the host, an alarm management method through which users can set conditions for
the system to discard (not to save, display, or query for) the alarm information meeting
the conditions.
alarm name
Alarm name is a brief description of the symptom of the failure related to this alarm.
Alarm notification
When an error occurs, the performance measurement system sends performance alarms
to the destination (for example, a file and/or fault management system) designated by
users.
alarm parameter
Alarm parameters describe the location where the fault has occurred. For example, for
an alarm on a board, the parameters include the shelf ID, slot ID and port ID.
alarm severity
alarm status
The devices in the network report traps to the Network Management System (NMS),
which displays the alarm statuses in the topological view. The status of an alarm can be
critical, major, minor and prompt.
alarm suppression
A function used not to monitor alarms for a specific object, which may be the
networkwide equipment, a specific NE, a specific board and even a specific function
module of a specific board.
ALS
APS
ARP
AS
assured forwarding
One of the four per-hop behaviors (PHB) defined by the Diff-Serv workgroup of IETF.
It is suitable for certain key data services that require assured bandwidth and short delay.
For traffic within the bandwidth limit, AF assures quality in forwarding. For traffic that
exceeds the bandwidth limit, AF degrades the service class and continues to forward the
traffic instead of discarding the packets.
Issue 02 (2013-08-10)
148
A Glossary
asymmetric digital
subscriber line
asynchronization
Asynchronization does not use the exact data signals timed by the clock. The signals
have different frequencies and phases. The asynchronization usually encapsulates the
bits into the control flag, which specifies the beginning and end of the bits.
Asynchronous
Transfer Mode
A protocol for the transmission of a variety of digital signals using uniform 53 byte cells.
A transfer mode in which the information is organized into cells; it is asynchronous in
the sense that the recurrence of cells depends on the required or instantaneous bit rate.
Statistical and deterministic values may also be used to qualify the transfer mode.
ATM
ATM Adaptation
Layer
ATM PVC
attachment circuit
attenuation
AU
auto-negotiation
An optional function of the IEEE 802.3u Fast Ethernet standard that enables devices to
automatically exchange information over a link about speed and duplex abilities.
automatic laser
shutdown
automatic protection
switching
Autonomous System
A network set that uses the same routing policy and is managed by the same technology
administration department. Each AS has a unique identifier that is an integer ranging
from 1 to 65535. The identifier is assigned by IANA. An AS can be divided into areas.
A kind of service categories defined by the ATM forum. ABR only provides possible
forwarding service and applies to the connections that does not require the real-time
quality. It does not provide any guarantee in terms of cell loss or delay.
B
B-ISDN
backward
backward defect
indication
When detecting a defect, the sink node of a LSP uses backward defect indication (BDI)
to inform the upstream end of the LSP of a downstream defect along the return path.
Issue 02 (2013-08-10)
149
A Glossary
A logical entity that connects the BTS with the MSC in a GSM network. It interworks
with the BTS through the Abis interface, the MSC through the A interface. It provides
the following functions: radio resource management, base station management, power
control, handover control, and traffic measurement. One BSC controls and manages one
or more BTSs in an actual network.
base transceiver station A Base Transceiver Station terminates the radio interface. It allows transmission of traffic
and signaling across the air interface. The BTS includes the baseband processing, radio
equipment, and the antenna.
Basic ACL
A basic ACL can define ACL rules based on only source addresses.
basic input/output
system
bayonet-neillconcelman
BC
BDI
BE
BER
best effort
A traditional IP packet transport service. In this service, the diagrams are forwarded
following the sequence of the time they reach. All diagrams share the bandwidth of the
network and routers. The amount of resource that a diagram can use depends of the time
it reaches. BE service does not ensure any improvement in delay time, jitter, packet loss
ratio, and high reliability.
BFD
BGP
bidirectional
forwarding detection
A simple Hello protocol, similar to the adjacent detection in the route protocol. Two
systems periodically send BFD detection messages on the channel between the two
systems. If one system does not receive the detection message from the other system for
a long time, you can infer that the channel is faulty. Under some conditions, the TX and
RX rates between systems need to be negotiated to reduce traffic load.
BIOS
BIP
bit error
Ratio of received bits that contain errors. BER is an important index used to measure the
communications quality of a network.
Issue 02 (2013-08-10)
150
A Glossary
bit-interleaved parity
A method of error monitoring. With even parity an X-bit code is generated by the
transmitting equipment over a specified portion of the signal in such a manner that the
first bit of the code provides even parity over the first bit of all X-bit sequences in the
covered portion of the signal, the second bit provides even parity over the second bit of
all X-bit sequences within the specified portion, etc. Even parity is generated by setting
the BIP-X bits so that there is an even number of 1s in each monitored partition of the
signal. A monitored partition comprises all bits which are in the same bit position within
the X-bit sequences in the covered portion of the signal. The covered portion includes
the BIP-X.
BITS
BMC
BNC
See bayonet-neill-concelman
Border Gateway
Protocol
boundary clock
A clock with a clock port for each of two or more distinct PTP communication paths.
BPDU
The data messages that are exchanged across the switches within an extended LAN that
uses a spanning tree protocol (STP) topology. BPDU packets contain information on
ports, addresses, priorities and costs and ensure that the data ends up where it was
intended to go. BPDU messages are exchanged across bridges to detect loops in a
network topology. The loops are then removed by shutting down selected bridges
interfaces and placing redundant switch ports in a backup, or blocked, state.
Broadband Integrated A standard defined by the ITU-T to handle high-bandwidth applications, such as voice.
Services Digital
It currently uses the ATM technology to transmit data over SONNET-based circuits at
Networks
155 to 622 Mbit/s or higher speed.
broadband TV
broadcast address
broadcast domain
A group of network stations that receives broadcast packets originating from any device
within the group. Broadcasts do not pass through a router, which bound the domains. In
addition, the set of ports between which a device forwards a multicast, broadcast, or
unknown destination frame.
BSC
BTS
BTV
See broadband TV
building integrated
timing supply
In the situation of multiple synchronous nodes or communication devices, one can use
a device to set up a clock system on the hinge of telecom network to connect the
synchronous network as a whole, and provide satisfactory synchronous base signals to
the building integrated device. This device is called BITS.
bus
A path or channel for signal transmission. The typical case is that, the bus is an electrical
connection that connects one or more conductors. All devices that are connected to a
bus, can receive all transmission contents simultaneously.
Issue 02 (2013-08-10)
151
A Glossary
C
cable distribution plate A component which is used to arrange the cables in order.
cable tie
CAR
A network access method in which devices that are ready to transmit data first check the
channel for a carrier. If no carrier is sensed, a device can transmit. If two devices transmit
at once, a collision occurs and each computer backs off and waits a random amount of
time before attempting to retransmit. This is the access method used by Ethernet.
CBR
CBS
CC
CCF
CCM
CDR
CDV
CDVT
CE
This parameter measures the tolerance level a network interface has to aggressive
sending (back-to-back or very closely spaced cells) by a connected device, and does not
apply to end-systems.
Field in the ATM cell header that determines the probability of a cell being dropped if
the network becomes congested. Cells with CLP = 0 are insured traffic, which is unlikely
to be dropped. Cells with CLP = 1 are best-effort traffic, which might be dropped.
CEP
CES
CF
CFM
chain network
One type of network that all network nodes are connected one after one to be in series.
channel
CID
CIR
circuit emulation
service
A function with which the E1/T1 data can be transmitted through ATM networks. At the
transmission end, the interface module packs timeslot data into ATM cells. These ATM
cells are sent to the reception end through the ATM network. At the reception end, the
interface module re-assigns the data in these ATM cells to E1/T1 timeslots. The CES
technology guarantees that the data in E1/T1 timeslots can be recovered to the original
sequence at the reception end.
Issue 02 (2013-08-10)
152
CIST
CLNP
A Glossary
clock synchronization A type of high-decision clock defined by the IEEE 1588 V2 standard. The IEEE 1588
compliant with
V2 standard specifies the precision time protocol (PTP) in a measurement and control
precision time protocol system. The PTP protocol ensures clock synchronization precise to sub-microseconds.
clock tracing
The method to keep the time on each node being synchronized with a clock source in a
network.
CLP
coarse wavelength
division multiplexing
colored packet
A traffic control method that uses a set of rate limits to be applied to a router interface.
CAR is a configurable method by which incoming and outgoing packets can be classified
into QoS (Quality of Service) groups, and by which the input or output transmission rate
can be defined.
committed burst size. A parameter used to define the capacity of token bucket C, that is,
the maximum burst IP packet size when the information is transferred at the committed
information rate. This parameter must be larger than 0. It is recommended that this
parameter should be not less than the maximum length of the IP packet that might be
forwarded.
committed information The rate at which a frame relay network agrees to transfer information in normal
rate
conditions. Namely, it is the rate, measured in bit/s, at which the token is transferred to
the leaky bucket.
common and internal
spanning tree
The single spanning tree calculated by STP and RSTP together with the logical
continuation of that connectivity by using MST Bridges and regions, calculated by MSTP
to ensure that all LANs in the bridged local area network are simply and fully connected.
common spanning tree A single spanning tree that connects all the MST regions in a network. Every MST region
is considered as a switch; therefore, the CST can be regarded as their spanning tree
generated with STP/RSTP.
compact flash
Compact flash (CF) was originally developed as a type of data storage device used in
portable electronic devices. For storage, CompactFlash typically uses flash memory in
a standardized enclosure.
congestion
congestion
management
A flow control measure to solve the problem of network resource competition. When
the network congestion occurs, it places the packet into the queue for buffer and
determines the order of forwarding the packet.
connection control
The set of functions used for setting up, maintaining and releasing a communication path
between two or more users or a user and a network entity, e.g. a dual tone multi-frequency
receiver.
connection control
function
A functional entity in the distributed functional plane of the intelligent network (IN)
conceptual model, which provides the basic call services of the bearer (telecom) network
and the advanced switch-based services with the call processing and controlling
functions.
Issue 02 (2013-08-10)
153
A Glossary
connection identifier
The MAC layer defined in the IEEE802.16 protocol is based on connection. Each
connection is uniquely identified with a CID.
connectivity check
Ethernet CFM can detect the connectivity between MEPs. The detection is achieved by
each MEP transmitting a Continuity Check Message (CCM) periodically.
connectivity fault
management
A kind of service categories defined by the ATM forum. CBR transfers cells based on
the constant bandwidth. It is applicable to service connections that depend on precise
clocking to ensure undistorted transmission.
constraint shortest path An extension of shortest path algorithms like OSPF and IS-IS. The path computed using
first
CSPF is a shortest path fulfilling set of constrains. It simply means that it runs shortest
path algorithm after pruning those links that violate a given set of constraints. A
constraint could be minimum bandwidth required per link (also know as bandwidth
guaranteed constraint), end-to-end delay, maximum number of link traversed etc. CSPF
is widely used in MPLS Traffic Engineering. The routing using CSPF is known as
Constraint Based Routing (CBR).
constraint-based
routed label switched
path
continuity check
message
control plane
The control plane performs the call control and connection control functions. Through
signaling, the control plane sets up and releases connections, and may restore a
connection in case of a failure. The control plane also performs other functions in support
of call and connection control, such as routing information dissemination.
control word
convergence layer
The convergence layer is a "bridge" between the access layer and the core layer. It
provides the convergence and forwarding functions for the access layer. It processes all
the traffic from the access layer devices, and provides the uplinks to the core layer.
Compared with the access layer, the convergence layer devices should have higher
performances, fewer interfaces and higher switching rate. In the real network, the
convergence layer refers to the network between UPEs and PE-AGGs.
core layer
The core layer functions as the backbone of high speed switching for networks, and it
provides high speed forwarding communications. It has a backbone transmission
structure that provides high reliability, high throughput, and low delay. The core layer
devices must have a good redundancy, error tolerance, manageability, adaptability, and
they support dual-system hot backup or load balancing technologies. In a real network,
the core layer includes the IP/MPLS backbone network consisting of NPEs and backbone
routers.
CPE
CPN
CR-LSP
CRC
Issue 02 (2013-08-10)
154
A Glossary
crossover cable
A twisted pair patch cable wired in such a way as to route the transmit signals from one
piece of equipment to the receive signals of another piece of equipment, and vice versa.
CSMA/CD
CSPF
CST
CTD
current alarm
current performance
data
customer edge
A part of BGP/MPLS IP VPN model. It provides interfaces for direct connection to the
Service Provider (SP) network. A CE can be a router, switch, or host.
customer premises
equipment
CV
connectivity verification
CW
CWDM
cyclic redundancy
check
A procedure used in checking for errors in data transmission. CRC error checking uses
a complex calculation to generate a number based on the data transmitted. The sending
device performs the calculation before transmission and includes it in the packet that it
sends to the receiving device. The receiving device repeats the same calculation after
transmission. If both devices obtain the same result, it is assumed that the transmission
was error free. The procedure is known as a redundancy check because each transmission
includes not only data but extra (redundant) error-checking values.
D
data communication
network
data communications
channel
The data channel that uses the D1-D12 bytes in the overhead of an STM-N signal to
transmit information on operation, management, maintenance and provision (OAM&P)
between NEs. The DCC channels that are composed of bytes D1-D3 is referred to as the
192 kbit/s DCC-R channel. The other DCC channel that are composed of bytes D4-D12
is referred to as the 576 kbit/s DCC-M channel.
data connection
equipment
Data connection equipment including analog, DSL, ISDN, cable modem circuits.
Layer 2 in the open system interconnection (OSI) architecture; the layer that provides
services to transfer data over the transmission link between open systems.
data terminal
equipment
A user device composing the UNI. The DTE accesses the data network through the DCE
equipment (for example, model) and usually uses the clock signals produced by DCE.
Issue 02 (2013-08-10)
155
A Glossary
Datagram
DC
DCC
DCE
DCN
DDF
DDN
DE
DEI
delay variation
dense wavelength
division multiplexing
Technology that utilizes the characteristics of broad bandwidth and low attenuation of
single mode optical fiber, employs multiple wavelengths with specific frequency spacing
as carriers, and allows multiple channels to transmit simultaneously in the same fiber.
desired Min Tx interval The minimum interval that the local system would like to use when transmitting BFD
control packets.
Detection multiplier
The desired detect time multiplier for BFD control packets. It determines the session
detection time together with the DMTI and RMRI.
DHCP
DHCP Relay
Dynamic Host Configuration Protocol relay (DHCP relay) is a function that enables
forwarding of DHCP data between the device that requests the IP address and the DHCP
server.
DHCP Server
A program that allocates the IP addresses of the local address pool to the users at the
user side and allocates the IP addresses of the relay address pool to the users that pass
through the DHCP proxy at the network side.
differentiated services
A service architecture that provides the end-to-end QoS function. It consists of a series
of functional units implemented at the network nodes, including a small group of perhop forwarding behaviors, packet classification functions, and traffic conditioning
functions such as metering, marking, shaping and policing.
DiffServ
A high-quality data transport tunnel that combines the digital channel (such as fiber
channel, digital microwave channel, or satellite channel) and the cross multiplex
technology.
digital distribution
frame
A type of equipment used between the transmission equipment and the exchange with
transmission rate of 2 to 155 Mbit/s to provide the functions such as cables connection,
cable patching, and test of loops that transmitting digital signals.
A technology for providing digital connections over the copper wire or the local
telephone network. DSL performs data communication over the POTS lines without
affecting the POTS service.
A network device, usually situated in the main office of a telephone company that
receives signals from multiple customer Digital Subscriber Line (DSL) connections and
puts the signals on a high-speed backbone line using multiplexing techniques.
Issue 02 (2013-08-10)
156
A Glossary
direct current
Electrical current whose direction of flow does not reverse. The current may stop or
change amplitude, but it always flows in the same direction.
discard eligible
A bit in the frame relay header. It indicates the priority of a packet. If a node supports
the FR QoS, the rate of the accessed FR packets is controlled. When the packet traffic
exceeds the specified traffic, the DE value of the redundant packets is set to 1. In the
case of network congestion, the packets with DE value as 1 are discarded at the node.
Discrete service
The cross-connection that exists on an NE but cannot form trails on the network
management system.
dispersion
DLL
DMTI
DNI
DNS
A hierarchical naming system for computers, services, or any resource connected to the
Internet or a private network. It associates various information with domain names
assigned to each of the participants. The Domain Name System distributes the
responsibility of assigning domain names and mapping those names to IP addresses by
designating authoritative name servers for each domain.
DRDB
DEI indicates the eight transmission precedence in the PRI field can be combined with
drop precedence.
DS
DS boundary node
DS domain
DS interior node
DS node
A DS-compliant node, which is subdivided into DS boundary node and ID interior node.
DSL
DSLAM
DTE
dual homing
dual node
interconnection
DNI provides an alternative physical interconnection point, between the rings, in case
of an interconnection failure scenario.
dual-ended switching
A protection operation method which takes switching action at both ends of the protected
entity (e.g. "connection", "path"), even in the case of a unidirectional failure.
DWDM
Issue 02 (2013-08-10)
157
A Glossary
Dynamic Host
Dynamic Host Configuration Protocol (DHCP) is a client-server networking protocol.
Configuration Protocol A DHCP server provides configuration parameters specific to the DHCP client host
requesting, generally, information required by the host to participate on the Internet
network. DHCP also provides a mechanism for allocation of IP addresses to hosts.
dynamic service
A term used in IEEE (Institute of Electrical and Electronic Engineers) 802.16 networks
to describe a set of messages and protocols that allow a base station and subscriber station
to add, modify, or delete the characteristics of s service flow.
E
E-LAN
E-Tree
See Ethernet-tree
E1
EBS
ECC
Edge LSR
The basic unit of the MPLS network is LSR. The network composed by LSR is named
MPLS domain. LSR is located at the edge of the MPLS domain. LSR used to connect
other user network is named Label Edge Router (LER). The LSR in the core of the
internal area is the core LSR. The core LSR can be the router that supports MPLS and
be the ATM-LSR generated after the ATM switch is ungraded. LSRs in the domain
communicated by MPLS.
EF
EFM
EGP
Egress
The group is transferred along the LSP consisting of a series of LSRs after the group is
labeled. The egress LER is named Egress.
electromagnetic
compatibility
electromagnetic
interference
electromagnetic
shielding
The process of limiting the coupling of an electromagnetic field between two locations.
Typically, it is applied to enclosures, separating electrical circuits from external
surroundings, and to cables, separating internal wires from the surroundings that the
cable passes through.
electrostatic discharge
The sudden and momentary electric current that flows between two objects at different
electrical potentials caused by direct contact or induced by an electrostatic field.
embedded control
channel
A logical channel that uses a data communications channel (DCC) as its physical layer,
to enable transmission of operation, administration, and maintenance (OAM)
information between NEs.
EMC
EMI
Issue 02 (2013-08-10)
158
A Glossary
EMS
Engineering label
EPL
EPLAN
error tolerance
The ability of a system or component to continue normal operation despite the presence
of erroneous inputs.
ESD
ESD jack
Electrostatic discharge jack. A hole in the cabinet or shelf, which connect the shelf or
cabinet to the insertion of ESD wrist strap.
ETH-LT
Last mile access from the broadband device to the user community. The EFM takes the
advantages of the SHDSL.b is technology and the Ethernet technology. The EFM
provides both the traditional voice service and internet access service of high speed. In
addition, it meets the users' requirements on high definition television system (HDTV)
and Video On Demand (VOD).
Ethernet LAN
A type of Ethernet service that is provided with dedicated bandwidth and point-to-point
connections on an SDH, PDH, ATM, or MPLS server layer network.
Ethernet virtual
private LAN
Ethernet virtual
private LAN service
An Ethernet service type, which carries Ethernet characteristic information over a shared
bridge, point-to-multipoint connections, provided by SDH, PDH, ATM, or MPLS server
layer networks.
Ethernet-tree
ETS
ETSI
European
Telecommunications
Standards Institute
A standards-setting body in Europe. Also the standards body responsible for GSM.
EVPLAN
EVPLn
Issue 02 (2013-08-10)
159
A Glossary
A parameter related to traffic. In the single rate three color marker (srTCM) mode, the
traffic control is achieved by the token buckets C and E. Excess burst size is a parameter
used to define the capacity of token bucket E, that is, the maximum burst IP packet size
when the information is transferred at the committed information rate. This parameter
must be larger than 0. It is recommended that this parameter should be not less than the
maximum length of the IP packet that might be forwarded.
Exercise Switching
EXP
expedited forwarding
The highest order QoS in the Diff-Serv network. EF PHB is suitable for services that
demand low packet loss ratio, short delay, and broad bandwidth. In all the cases, EF
traffic can guarantee a transmission rate equal to or faster than the set rate. The DSCP
value of EF PHB is "101110".
experimental bits
A field in the MPLS packet header, three bits long. This field is always used to identify
the CoS of the MPLS packet.
Extended ID
The number of the subnet that an NE belongs to, for identifying different network
segments in a WAN. The extended ID and ID form the physical ID of the NE.
Exterior Gateway
Protocol
A protocol for exchanging routing information between two neighbor gateway hosts
(each with its own router) in a network of autonomous systems.
extra traffic
The traffic that is carried over the protection channels when that capacity is not used for
the protection of working traffic. Extra traffic is not protected.
F
fair queue
A mechanism for queue scheduling in which network resource is allocated equally and
delay and jitter time of all traffic are optimized.
fast Ethernet
Any network that supports transmission rate of 100Mbits/s. The Fast Ethernet is 10 times
faster than 10BaseT, and inherits frame format, MAC addressing scheme, MTU, and so
on. Fast Ethernet is extended from the IEEE802.3 standard, and it uses the following
three types of transmission media: 100BASE-T4 (4 pairs of phone twisted-pair cables),
100BASE-TX (2 pairs of data twisted-pair cables), and 100BASE-FX (2-core optical
fibers).
fast reroute
A technology to locally protect MPLS TE network. Only the interface with the speed of
100 Mbps can support FRR. If the switching speed of FRR can reach 50ms, the packet
loss decreases when some faults occur on the network. FRR is applicable to services that
are very sensitive to packet loss and delay. When a fault is detected at the lower layer,
the lower layer informs the upper routing system of the fault. Then the routing system
forwards packets through a backup link. In this manner, the impact of the link fault on
services is minimized. FRR is local and temporary. Once the protected LSP recovers or
a new LSP is set up, traffic is switched to the original or the new LSP. After you configure
FRR on LSP and some link or some node on LSP is invalid, traffic is switched to the
protected link and a new LSP is trying to be set up on the LSP ingress.
FDI
FE
FEC
FF
Issue 02 (2013-08-10)
160
A Glossary
FFD
FFD packet
FFD is a path failure detection method independent from CV. Different from a CV
packet, the frequency for generating FFD packets is configurable to satisfy different
service requirements. An FFD packet contains information the same as that in a CV
packet. The destination end LSR processes FFD packets in the same way for processing
CV packets.
FIB
A kind of fiber used for connections between the subrack and the ODF, and for
connections between subracks or inside a subrack.
field programmable
gate array
FIFO
A member of the TCP/IP suite of protocols, used to copy files between two computers
on the Internet. Both computers must support their respective FTP roles: one must be an
FTP client and the other an FTP server.
filler panel
A piece of board to cover vacant slots, to keep the frame away from dirt, to keep proper
airflow inside the frame, and to beautify the frame appearance.
first in first out queuing A queuing policy that features that the packet reaching earlier can be allocated resource
firstly.
fixed filter style
On an MPLS network, an RSVP node creates a distinct reservation for data packets from
a particular sender. This sender does not share its resource reservation with other senders.
flash memory
flow control
A set of mechanisms used to prevent the network from being overloaded by regulating
the input rate transmissions.
flow queue
The same type of services of a user is considered one service flow; HQoS performs queue
scheduling according to the services of each user. The service flows of each user are
classified into four FQs, namely, CS, EF, AF, and BE. CS is assigned a traffic shaping
percentage for Priority Queuing (PQ); EF, AF, and BE are assigned weights for Weighted
Fair Queuing (WFQ). The preceding two scheduling modes occupy a certain bandwidth
each; they can act at the same time without interfering each other.
Forward
forward defect
indication
Forward defect indication (FDI) is generated and traced forward to the sink node of the
LSP by the node that first detects defects. It includes fields to indicate the nature of the
defect and its location. Its primary purpose is to suppress alarms being raised at affected
higher level client LSPs and (in turn) their client layers.
forward information
base
Issue 02 (2013-08-10)
161
A Glossary
forwarding equivalence As a class-based forwarding technology, MPLS classifies the packets with the same
class
forwarding mode, and the process is called Forwarding Equivalence Class. Packets with
the same FEC are processed similarly on an MPLS network. It is flexible to divide FECs,
and it can be a combination of the source address, the destination address, the source
port, the destination port, the protocol type, the VPN, and so on.
Forwarding plane
Also referred to as the data plane. The forwarding plane is connection-oriented, and can
be used in Layer 2 networks such as an ATM network.
FPGA
FPS
PW fast protection switching (FPS) achieves dual-homing protection for E-Line services.
FQ
FR
frame relay
A packet-switching protocol for use on WANs (wide area networks). Frame relay
transmits variable-length packets at up to 2 Mbps over predetermined, set paths known
as PVCs (permanent virtual circuits). It is a variant of X.25 but dispenses with some of
X.25's error detection for the sake of speed. See also ATM (definition 1), X.25.
Free-run mode
FRR
FTP
full-duplex
G
Gateway IP
When an NE accesses a remote network management system or NE, a router can be used
to enable the TCP/IP communication. In this case, the IP address of the router is the
gateway IP. Only the gateway NE requires the IP address. The IP address itself cannot
identify the uniqueness of an NE. The same IP addresses may exist in different TCP/IP
networks. An NE may have multiple IP addresses, for example, one IP address of the
network and one IP address of the Ethernet port.
gateway network
element
A network element that is used for communication between the NE application layer and
the NM application layer
GE
generic framing
procedure
A framing and encapsulated method which can be applied to any data type. It has been
standardized by ITU-T SG15.
Issue 02 (2013-08-10)
162
A Glossary
generic routing
encapsulation
GFP
gigabit Ethernet
GE adopts the IEEE 802.3z. GE is compatible with 10 Mbit/s and 100 Mbit/s Ethernet.
It runs at 1000 Mbit/s. Gigabit Ethernet uses a private medium, and it does not support
coaxial cables or other cables. It also supports the channels in the bandwidth mode. If
Gigabit Ethernet is, however, deployed to be the private bandwidth system with a bridge
(switch) or a router as the center, it gives full play to the performance and the bandwidth.
In the network structure, Gigabit Ethernet uses full duplex links that are private, causing
the length of the links to be sufficient for backbone applications in a building and campus.
Global Positioning
System
GND
Ground
GNE
GPS
GR
graceful restart
graphical user interface A visual computer environment that represents programs, files, and options with
graphical images, such as icons, menus, and dialog boxes, on the screen.
GRE
GSM
GUI
H
half-duplex
Hardware loopback
A connection mode in which a fiber jumper is used to connect the input optical interface
to the output optical interface of a board to achieve signal loopback.
HDSL
Issue 02 (2013-08-10)
163
A Glossary
hello packet
In an SDH network, the higher order path layers provide a server network from the lower
order path layers.
History Performance
Data
The performance data that is stored in the history register or that is automatically reported
and stored in the NMS.
Hold priority
The priority of the tunnel with respect to holding resources, ranging from 0 (indicates
the highest priority) to 7. It is used to determine whether the resources occupied by the
tunnel can be preempted by other tunnels.
hot plugging
hot standby
HP
HSB
HSDPA
I
I/O
input/output
IANA
ICMP
IE
IEC
IEEE
IETF
IGMP
IGMP snooping
IGP
IGRP
Issue 02 (2013-08-10)
164
A Glossary
IMA
IMA frame
The IMA frame is used as the unit of control in the IMA protocol. It is a logical frame
defined as M consecutive cells, numbered 0 to M-l, transmitted on each of the N links
in an IMA group.
information element
Ingress
The group is transferred along the LSP consisting of a series of LSRs after the group is
labeled. The ingress LER is named Ingress.
Inloop
A method of looping the signals from the cross-connect unit back to the cross-connect
unit.
Institute of Electrical
and Electronics
Engineers
A society of engineering and electronics professionals based in the United States but
boasting membership from numerous other countries. The IEEE focuses on electrical,
electronics, computer engineering, and science-related matters.
integrated services
digital network
Interior Gateway
Protocol
A routing protocol that is used within an autonomous system. The IGP runs in smallsized and medium-sized networks. The commonly used IGPs are the routing information
protocol (RIP), the interior gateway routing protocol (IGRP), the enhanced IGRP
(EIGRP), and the open shortest path first (OSPF).
Interior Gateway
Routing Protocol
A routing protocol from Cisco that was developed in 1988 to overcome the shortcomings
of RIP. IGRP takes bandwidth, latency, reliability and current traffic load into
consideration. It is typically used within an autonomous system, such as an Internet
domain. IGRP was superseded by Enhanced IGRP (EIGRP).
International
Electrotechnical
Commission
The International Electrotechnical Commission (IEC) is an international and nongovernmental standards organization dealing with electrical and electronical standards.
International
Telecommunication
Union
A United Nations agency, one of the most important and influential recommendation
bodies, responsible for recommending standards for telecommunication (ITU-T) and
radio networks (ITU-R).
Internet assigned
numbers authority
The organization operated under the IAB. IANA delegates authority for IP address-space
allocation and domain-name assignment to the NIC and other organizations. IANA also
maintains a database of assigned protocol identifiers used in the TCP/IP suite, including
autonomous system numbers.
Internet Control
Message Protocol
A network-layer (ISO/OSI level 3) Internet protocol that provides error correction and
other information relevant to IP packet processing. For example, it can let the IP software
on one machine inform another machine about an unreachable destination. See also
communications protocol, IP, ISO/OSI reference model, packet (definition 1).
Issue 02 (2013-08-10)
165
A Glossary
Internet Engineering
Task Force
Internet Group
Management Protocol
The protocol for managing the membership of Internet Protocol multicast groups among
the TCP/IP protocols. It is used by IP hosts and adjacent multicast routers to establish
and maintain multicast group memberships.
Internet Protocol
The TCP/IP standard protocol that defines the IP packet as the unit of information sent
across an internet and provides the basis for connectionless, best-effort packet delivery
service. IP includes the ICMP control and error message protocol as an integral part. The
entire protocol suite is often referred to as TCP/IP because TCP and IP are the two
fundamental protocols. IP is standardized in RFC 791.
Internet protocol
television
Internet Protocol
version 4
The current version of the Internet Protocol (IP). IPv4 utilizes a 32bit address which is
assigned to hosts. An address belongs to one of five classes (A, B, C, D, or E) and is
written as 4 octets separated by periods and may range from 0.0.0.0 through to
255.255.255.255. Each IPv4 address consists of a network number, an optional
subnetwork number, and a host number. The network and subnetwork numbers together
are used for routing, and the host number is used to address an individual host within the
network or subnetwork.
Internet protocol
version 6
A update version of IPv4. It is also called IP Next Generation (IPng). The specifications
and standardizations provided by it are consistent with the Internet Engineering Task
Force (IETF). IPv6 is also called. It is a new version of the Internet Protocol, designed
as the successor to IPv4. The difference between IPv6 and IPv4 is that an IPv4 address
has 32 bits while an IPv6 address has 128 bits.
Internet service
provider
An organization that offers users access to the Internet and related services.
interworking
A way to connect telecom devices so that they can communicate with each other.
inverse multiplexing
over ATM
The ATM inverse multiplexing technique involves inverse multiplexing and demultiplexing of ATM cells in a cyclical fashion among links grouped to form a higher
bandwidth logical link whose rate is approximately the sum of the link rates. This is
referred to as an IMA group.
IP
IP address
A 32-bit (4-byte) binary number that uniquely identifies a host (computer) connected to
the Internet for communication with other hosts in the Internet by transferring packets.
An IP address is expressed in dotted decimal notation, consisting of the decimal values
of its 4 bytes, separated with periods; for example, 127.0.0.1. The first three bytes of the
IP address identify the network to which the host is connected, and the last byte identify
the host itself.
Issue 02 (2013-08-10)
166
A Glossary
IP Protocol
IPTV
IPv4
IPv6
ISDN
ISP
IST
ITU
J
jumper
L
L2VPN
Label distribution
Packets with the same destination address belong to an FEC. A label out of an MPLS
label resource pool is allocated to the FEC. LSRs record the relationship of the label and
the FEC. Then, LSRs sends a message and advertises to upstream LSRs about the label
and FEC relationship in message. The process is called label distribution.
Label Distribution
Protocol
A protocol defined for distributing labels in MPLS network. It is the set of procedures
and messages by which Label Switched Routers (LSRs) establish Label Switched Paths
(LSPs) through a network by mapping network-layer routing information directly to
data-link layer switched paths. More information about the applicability of LDP can be
found in [RFC3037].
A device that sits at the edge of an MPLS domain, that uses routing information to assign
labels to datagrams and then forwards them into the MPLS domain.
Label space
Basic element of MPLS network. All LSRs support the MPLS protocol. The LSR is
composed of two parts: control unit and forwarding unit. The former is responsible for
allocating the label, selecting the route, creating the label forwarding table, creating and
removing the label switch path; the latter forwards the labels according to groups
received in the label forwarding table.
LACP
LAG
LAN
LAN switch
Issue 02 (2013-08-10)
167
A Glossary
Layer 2 Multicast
When Ethernet is used as the link layer, Layer 2 multicast uses multicast MAC addresses
for traffic transmission. Therefore, a technology must exist to map the IP multicast
address to the multicast MAC address.
layer 2 switch
A data forwarding method. In LAN, a network bridge or 802.3 Ethernet switch transmits
and distributes packet data based on the MAC address. Since the MAC address is the
second layer of the OSI model, this data forwarding method is called layer 2 switch.
Layer 2 virtual private A virtual private network achieved by Layer 2 switching technologies in the packet
network
switched (IP/MPLS) network.
LB
See loopback
LBM
LBR
LC
Lucent connector
LCT
LDP
LDP peer
Two LSRs that use LDP to exchange labels or FEC mappings. LDP sessions exist
between them.
LER
limit rate
A traffic management technology used to limit the total rate of packet sending on a
physical interface or a Tunnel interface. LR is directly enabled on the interface to control
the traffic passing the interface.
line rate
The maximum packet forwarding capacity on a cable. The value of line rate equals the
maximum transmission rate capable on a given type of media.
Link Aggregation
Control Protocol
link aggregation group An aggregation that allows one or more links to be aggregated together to form a link
aggregation group so that a MAC client can treat the link aggregation group as if it were
a single link.
Link Control Protocol
In the Point-to-Point Protocol (PPP), the Link Control Protocol (LCP) establishes,
configures, and tests data-link Internet connections.
Link Group
According to some principles, links are divided into the set in the logical term. A set of
links is called the link group. The division makes management more convenient.
The Link Layer Discovery Protocol (LLDP) is an L2D protocol defined in IEEE 802.1ab.
Using the LLDP, the NMS can rapidly obtain the Layer 2 network topology and changes
in topology when the network scales expand.
Link Monitoring
Link monitoring is a mechanism for an interface to notify the peer of the fault when the
interface detects that the number of errored frames, errored codes, or errored frame
seconds reaches or exceeds the specified threshold.
Link Protection
Protection provided by the bypass tunnel for the link on the working tunnel. The link is
a downstream link adjacent to the PLR. When the PLR fails to provide node protection,
the link protection should be provided.
link state
advertisement
The link in LSA is any type of connection between OSPF routers, while the state is the
condition of the link.
Issue 02 (2013-08-10)
168
A Glossary
Link status
The running status of a link, which can be Up, Down, backup, or unknown.
linktrace message
The message sent by the initiator MEP of 802.1ag MAC Trace to the destination MEP
is called Linktrace Message(LTM). LTM includes the Time to Live (TTL) and the MAC
address of the destination MEP2.
linktrace reply
For 802.1ag MAC Trace, the destination MEP replies with a response message to the
source MEP after the destination MEP receives the LTM, and the response message is
called Linktrace Reply (LTR). LTR also includes the TTL that equals the result of the
TTL of LTM minus 1.
LLC
LLDP
LLID
locate loopback ID
LMP
LMSP
load sharing
A device running mode. Two or more hardware units can averagely share the system
load according to their processing capabilities when they work normally. When a
hardware unit becomes faulty, the other units fulfill the tasks of the faulty unit on the
precondition of guaranteeing the system performance, for example, few call loss.
A network formed by the computers and workstations within the coverage of a few square
kilometers or within a single building. It features high speed and low error rate. Ethernet,
FDDI, and Token Ring are three technologies used to implement a LAN. Current LANs
are generally based on switched Ethernet or Wi-Fi technology and running at 1,000 Mbit/
s (that is, 1 Gbit/s).
Lock status
Services are not switched to the protection board or channel when a fault occurs, if
currently no switching takes place. If currently the switching takes place, after the
working board or channel recovers to normal, the services are not switched back to the
working board or channel.
Locked switching
When the switching condition is satisfied, this function disables the service from being
switched from the working channel to the protection channel. When the service has been
switched, the function enables the service to be restored from the protection channel to
the working channel.
LOF
According to the IEEE 802 family of standards, Logical Link Control (LLC) is the upper
sublayer of the OSI data link layer. The LLC is the same for the various physical media
(such as Ethernet, token ring, WLAN).
LOM
loss of multiframe
loopback
A troubleshooting technique that returns a transmitted signal to its source so that the
signal or message can be analyzed for errors.
loopback message
The loopback packet sent by the node that supports 802.2ag MAC Ping to the destination
node. LBM message carries its own sending time.
loopback reply
For 802.2ag MAC Ping, the destination MEP replies with a response message to the
source MEP after the destination MEP receives the LBM, and the response message is
called Loopback Reply. The LBR carries the sending time of LBM, the receiving time
of LBM and the sending time of LBR.
Issue 02 (2013-08-10)
169
A Glossary
LOP
LOS
Loss Of Frame
loss of pointer
Loss Of Signal
Loss of signal (LOS) indicates that there are no transitions occurring in the received
signal.
LPQ is performed after WFQ. It also means the device schedules queues strictly based
on the priority of queues.
Lower subrack
The subrack close to the bottom of the cabinet when a cabinet contains several subracks.
Lower Threshold
When the performance event count value is smaller than a certain value, a thresholdcrossing event occurs. The value is the lower threshold.
LP
LPQ
LPT
LR
LSA
LSDB
LSP
LSP tunnel
For an LSP, after a label is assigned to an FEC on the ingress, the label determines the
traffic forwarding. The traffic is transparent to the intermediate nodes. In this sense, an
LSP can be regarded as an LSP tunnel.
LSR
LSS
LT
linktrace
LTM
LTR
M
MA
MAC
MAC address learning Service that characterizes a learning bridge, in which the source MAC address of each
received packets is stored so that future packets destined for that address can be
forwarded only to the bridge interface on which that address is located. Packets destined
for unrecognized addresses are forwarded out every bridge interface. This scheme helps
minimize traffic on the attached LANs. MAC address learning is defined in the IEEE
802.1 standard.
Issue 02 (2013-08-10)
170
A Glossary
main distribution
frame
mains supply
The commercial power supply of a nation. In China, the nominal voltage of the mains
supply is 220 V AC and the frequency is 50 Hz.
maintenance
association
maintenance
association end point
A MEP is an actively managed CFM Entity, associated with a specific DSAP of a Service
Instance, which can generate and receive CFM frames and track any responses. It is an
end point of a single Maintenance Association, and terminates a separate Maintenance
Entity for each of the other MEPs in the same Maintenance Association.
maintenance
association
intermediate point
A CFM Entity, associated with a specific pair of ISS Service Access Points or EISS
Service Access Points, which reacts and responds to CFM frames. It is associated with
a single Maintenance Association, and is an intermediate point within one or more
Maintenance Entities.
maintenance domain
The network or the part of the network for which connectivity is managed by CFM. The
devices in an MD are managed by a single ISP.
maintenance point
MAN
Management right
The right enabling a user to manage the specified devices and boards or the group of a
user to manage specified domains.
manual switch
Switches normal traffic signal to the protection section, unless a failure condition exists
on other sections (including the protection section) or an equal or higher priority switch
command is in effect, by issuing a manual switch request for that normal traffic signal.
master-slave
synchronization
In the master-slave mode, a designated master clock disseminates its frequency reference
to all other slave clocks.
maximum transmission The largest packet of data that can be transmitted on a network. MTU size varies,
unit
depending on the network, 576 bytes on X.25 networks, for example, 1500 bytes on
Ethernet, and 17,914 bytes on 16 Mbps Token Ring. Responsibility for determining the
size of the MTU lies with the link layer of the network. When packets are transmitted
across networks, the path MTU, or PMTU, represents the smallest packet size (the one
that all networks can transmit without breaking up the packet) among the networks
involved.
MBS
MCF
MCR
MD
MD5
MDF
MDP
The average time that a device will take to recover from a failure.
Issue 02 (2013-08-10)
171
A Glossary
A protocol at the media access control sublayer. The protocol is at the lower part of the
data link layer in the OSI model and is mainly responsible for controlling and connecting
the physical media at the physical layer. When transmitting data, the MAC protocol
checks whether to be able to transmit data. If the data can be transmitted, certain control
information is added to the data, and then the data and the control information are
transmitted in a specified format to the physical layer. When receiving data, the MAC
protocol checks whether the information is correct and whether the data is transmitted
correctly. If the information is correct and the data is transmitted correctly, the control
information is removed from the data and then the data is transmitted to the LLC layer.
media gateway
A logical entity that converts the format of the media of a network to meet the format
requirement of another network. It can process audio services, video services and data
services, and convert the media format in full duplex mode. In addition, it can play certain
audio and video signals, and provide the IVR function and media conference.
MEP
merge point
The LSR where one or more backup tunnels rejoin the path of the protected LSP
downstream of the potential failure. The same LSR may be both an MP and a PLR
simultaneously.
message
communication
function
message digest
algorithm 5
message dispatch
processor
The MDP roughly processes the received messages, and then sends the messages to the
destinations.
metropolitan area
network
A metropolitan area network (MAN) is a network that interconnects users with computer
resources in a geographic area or region larger than that covered by even a large local
area network (LAN) but smaller than the area covered by a wide area network (WAN).
The term is applied to the interconnection of networks in a city into a single larger
network (which may then also offer efficient connection to a wide area network). It is
also used to mean the interconnection of several local area networks by bridging them
with backbone lines. The latter usage is also sometimes referred to as a campus network.
MGW
microwave
The portion of the electromagnetic spectrum with much longer wavelengths than infrared
radiation, typically above about 1 mm.
Minimum Cell Rate (MCR). Parameter defined by the ATM Forum for ATM traffic
management. MCR is defined only for Available Bit Rate (ABR) transmissions, and
specifies the minimum value for the ACR.
MIP
mirror
It is an action to store a copy of a file to another archive site to release the load of the
original site, or to provide an archive site closer to the users geographically.
MLD
MLPPP
Issue 02 (2013-08-10)
172
A Glossary
MP
MP
MP-BGP
MPLS L2VPN
The MPLS L2VPN provides the Layer 2 VPN service based on an MPLS network. In
this case, on a uniform MPLS network, the carrier is able to provide Layer 2 VPNs of
different media types, such as ATM, FR, VLAN, Ethernet, and PPP.
MPLS OAM
The MPLS OAM provides continuity check for a single LSP, and provides a set of fault
detection tools and fault correct mechanisms for MPLS networks. The MPLS OAM and
relevant protection switching components implement the detection function for the CRLSP forwarding plane, and perform the protection switching in 50 ms after a fault occurs.
In this way, the impact of a fault can be lowered to the minimum.
MPLS TE tunnel
MS
MSP
MST
MSTI
MSTP
MTBF
MTTR
MTU
Multi-link Point to
Point Protocol
A protocol used in ISDN connections. MLPPP lets two B channels act as a single line,
doubling connection rates to 128 kbit/s.
Multi-protocol
Extensions for Border
Gateway Protocol
Multicast
A process of transmitting packets of data from one source to many destinations. The
destination address of the multicast packet uses Class D address, that is, the IP address
ranges from 224.0.0.0 to 239.255.255.255. Each multicast address represents a multicast
group rather than a host.
multicast group
A set of members participating in the packet multicast service. The multicast group is
defined by a rule (or set of rules) which identifies a collection of members implicitly or
explicitly. This rule may associate members for the purpose of participating in a call, or
may associate members who do not participate in data transfer but do participate in
management, security, control, and accounting for the multicast group.
multicast listener
discovery
The MLD is used by the IPv6 router to discover the multicast listeners on their directly
connected network segments, and set up and maintain member relationships. On IPv6
networks, after MLD is configured on the receiver hosts and the multicast router to which
the hosts are directly connected, the hosts can dynamically join related groups and the
multicast router can manage members on the local network.
Issue 02 (2013-08-10)
173
A Glossary
multiple spanning tree Multiple spanning tree instance. One of a number of Spanning Trees calculated by MSTP
instance
within an MST Region, to provide a simply and fully connected active topology for
frames classified as belonging to a VLAN that is mapped to the MSTI by the MST
Configuration. A VLAN cannot be assigned to multiple MSTIs.
Multiple Spanning
Tree Protocol
Multiple spanning tree protocol. The MSTP can be used in a loop network. Using an
algorithm, the MSTP blocks redundant paths so that the loop network can be trimmed
as a tree network. In this case, the proliferation and endless cycling of packets is avoided
in the loop network. The protocol that introduces the mapping between VLANs and
multiple spanning trees. This solves the problem that data cannot be normally forwarded
in a VLAN because in STP/RSTP, only one spanning tree corresponds to all the VLANs.
Multiple Spanning
Tree Region
The MST region consists of switches that support the MSTP in the LAN and links among
them. Switches physically and directly connected and configured with the same MST
region attributes belong to the same MST region. The attributes for the same MST region
are as follows: Same region name Same revision level Same mapping relation between
the VLAN ID to MSTI
multiplex section
The trail between and including two multiplex section trail termination functions.
multiplex section
protection
A function, which is performed to provide capability for switching a signal between and
including two multiplex section termination (MST) functions, from a "working" to a
"protection" channel.
multiplex section
termination
The function performed to generate the MSOH in the process of forming an SDH frame
signal and terminates the MSOH in the reverse direction.
Multiplexing
A procedure by which multiple lower order path layer signals are adapted into a higher
order path or the multiple higher order path layer signals are adapted into a multiplex
section.
Multiservice capability It specifies whether multiple services can be independently processed during a session.
N
NA
NCP
NE database
There are three types of database on NE SCC board as following: (1) DRDB: a dynamic
database in a dynamic RAM, powered by battery; (2) SDB: a static database in a powerdown RAM; (3) FDB0, FDB0: permanently saved databases in a Flash ROM. In efficient
operation, the NE configuration data is saved in DRDB and SDB at the same time.
Backing up an NE database means backing up the NE configuration data from SDB to
FDB0 and FDB1. When an NE is restarted after power-down, the NE database is restored
in the following procedures: As the SDB data is lost due to power-down, the main control
restores the data first from DRDB. If the data in DRDB is also lost due to the exhaustion
of the battery, the data is restored from FDB0 or FDB1.
NE ID
An ID that indicates a managed device in the network. In the network, each NE has a
unique NE ID.
NE side
The NE configuration data saved on the SCC board of the equipment, which can be
uploaded to the network management system and then stored in databases on the network
management system NE side.
network address
On the Internet, addresses are based on the IP protocol, which uses a 32-bit code in the
IP header to identify host addresses.
Issue 02 (2013-08-10)
174
A Glossary
Network Control
Protocol
This is the program that switches the virtual circuit connections into place, implements
path control, and operates the Synchronous Data Link Control (SDLC) link.
Network diameter
The maximum of network bridges that the communication passes through between any
two terminal devices in the switched network.
Network entity
Network entity refers to the universal basic devices used to describe the functions and
structure of the transmission network, which considerably facilitates the description of
the network. The network entities include transmission object and sub-network.
network layer
The network layer is layer 3 of the seven-layer OSI model of computer networking. The
network layer provides routing and addressing so that two terminal systems are
interconnected. In addition, the network layer provides congestion control and traffic
control. In the TCP/IP protocol suite, the functions of the network layer are specified
and implemented by IP protocols. Therefore, the network layer is also called IP layer.
Network Management A system in charge of the operation, administration, and maintenance of a network.
System
network node interface The interface at a network node which is used to interconnect with another network node.
network segment
A part of an Ethernet or other network, on which all message traffic is common to all
nodes, that is, it is broadcast from one node on the segment and received by all others.
network service access A network address defined by ISO, through which entities on the network layer can
point
access OSI network services.
network storm
Network Time Protocol The Network Time Protocol (NTP) defines the time synchronization mechanism. It
synchronizes the time between the distributed time server and the client.
network unit layer
The logical layer that implements the configuration, failure and performance for a single
network element in the layered management architecture of the telecom network
management system.
NMS
NHOP
next-hop
NNI
Node Protection
A parameter of the FRR protection. It indicates that the bypass tunnel should be able to
protect the downstream node that is involved in the working tunnel and adjacent to the
PLR. The node cannot be a merge point, and the bypass tunnel should also be able to
protect the downstream link that is involved in the working tunnel and adjacent to the
PLR.
NPC
NRT
non-real-time
NSAP
NSF
NTP
Issue 02 (2013-08-10)
175
A Glossary
O
OAM
OAMPDU
ODF
OOF
open shortest path first A link-state, hierarchical interior gateway protocol (IGP) for network routing. Dijkstra's
algorithm is used to calculate the shortest path tree. It uses cost as its routing metric. A
link state database is constructed of the network topology which is identical on all routers
in the area.
Open Systems
Interconnection
operation log
operation,
administration and
maintenance
A group of network support functions that monitor and sustain segment operation,
activities that are concerned with, but not limited to, failure detection, notification,
location, and repairs that are intended to eliminate faults and keep a segment in an
operational state and support activities required to provide the services of a subscriber
access network to users/subscribers.
A device installed at the end of a fiber, optical source or receive unit. It is used to couple
the optical wave to the fiber when connected to another device of the same type. A
connector can either connect two fiber ends or connect a fiber end and a optical source
(or a detector).+
optical distribution
frame
optical fiber
OSI
OSPF
out of frame
Outloop
A method of looping back the input signals received at an port to an output port without
changing the structure of the signals.
overcurrent protection A circuit protection technology. When there is a great volume of traffic on a circuit and
the current is stronger than the protection threshold, the circuit is cut off after the circuit
protector timer expires.
overhead cabling
Issue 02 (2013-08-10)
Cables or fibers connect the cabinet with other equipment from the top of the cabinet.
176
A Glossary
P
P
A backbone device that is located in the service provider network. A P device is not
directly connected with the CE devices. The P devices only need the basic MPLS
forwarding capability and do not maintain information about a VPN.
P2P
packet loss
The discarding of data packets in a network when a device is overloaded and cannot
accept any incoming data at a given moment.
A MAN and WAN technology that provides point-to-point data connections. The POS
interface uses SDH/SONET as the physical layer protocol, and supports the transport of
packet data (such as IP packets) in MAN and WAN.
Packet rate
The number of bits or bytes passed within a specified time. It is expressed in bits/s or
bytes/s.
packet switching
parity
A method for character level error detection. An extra bit added to a string of bits, usually
a 7-bit ASCII character, so that the total number of bits 1 is odd or even (odd or even
parity). Both ends of a data transmission must use the same parity. When the transmitting
device frames a character, it counts the numbers of 1s in the frame and attaches the
appropriate parity bit. The recipient counts the 1s and, if there is parity error, may ask
for the data to be retransmitted.
pass-through
The action of transmitting the same information that is being received for any given
direction of transmission.
path layer
A layer within an SDH entity that supports the SDH based network transport services,
e.g. multiplexing, cross-connection, regeneration. The network element function is
modeled by managed objects.
PBS
PCB
PCI bus
PCI (Peripheral Component Interconnect) bus. A high performance bus, 32-bit or 64-bit
for interconnecting chips, expansion boards, and processor/memory subsystems.
PCR
PDH
PDU
PE
A parameter used to define the capacity of token bucket P, that is, the maximum burst
IP packet size when the information is transferred at the peak information rate. This
parameter must be larger than 0. It is recommended that this parameter should be not
less than the maximum length of the IP packet that might be forwarded.
Peak Information Rate. A traffic parameter, expressed in bit/s, whose value should be
not less than the committed information rate.
Peer
Issue 02 (2013-08-10)
177
A Glossary
penultimate hop
popping
per-hop behavior
Performance register
Performance register is the memory space for performance event counts, including 15min current performance register, 24-hour current performance register, 15-min history
performance register, 24-hour history performance register, UAT register and CSES
register. The object of performance event monitoring is the board functional module, so
every board functional module has a performance register. A performance register is
used to count the performance events taking place within a period of operation time, so
as to evaluate the quality of operation from the angle of statistics.
protection ground
phase-locked loop
A circuit that consists essentially of a phase detector which compares the frequency of
a voltage-controlled oscillator with that of an incoming carrier signal or referencefrequency generator; the output of the phase detector, after passing through a loop filter,
is fed back to the voltage-controlled oscillator to keep it exactly in phase with the
incoming or reference frequency.
PHB
PHP
physical layer
Physical layer is the Layer 1 in the Open System Interconnection (OSI) architecture; the
layer that provides services to transmit bits or groups of bits over a transmission link
between open systems and which entails electrical, mechanical and handshaking
physical link
The physical link refers to the link between two physical NEs. When the user creates
NEs or refreshes the device status, the system automatically creates the physical link
according to the topology structure information on the device. The physical link can
modify the remarks information. It cannot be deleted.
Ping Test
A test that is performed to send a data packet to the target IP address (a unique IP address
on the device on the network) to check whether the target host exists according to the
data packet of the same size returned from the target host.
PIR
plesiochronous digital
hierarchy
A multiplexing scheme of bit stuffing and byte interleaving. It multiplexes the minimum
rate 64 kit/s into the 2 Mbit/s, 34 Mbit/s, 140 Mbit/s, and 565 Mbit/s rates.
PLL
PLR
The ingress node of the bypass tunnel. The head-end node of a backup tunnel or a detour
tunnel.
point to multipoint
A communications network that provides a path from one location to multiple locations
(from one to many).
Issue 02 (2013-08-10)
178
A Glossary
A service between two terminal users. In P2P services, senders and recipients are
terminal users.
Point-to-Point Protocol A protocol on the data link layer, provides point-to-point transmission and encapsulates
data packets on the network layer. It is located in layer 2 of the IP protocol stack.
policy template
To define the calculation rules of a charging event, for example, rating, debiting and
accumulating. A policy template may contain the parameters to be instantiated. They
can be used when the attributes of the condition judgment, calculation method, and action
functions are carried out.
port forwarding
Port priority
The priority used when a port attaches tags to Layer 2 packets. Packets received on ports
with higher priorities are forwarded preferentially.
POS
power up
PPP
PPS
PQ
PQ
PRBS
PRC
Precision Time
Protocol
Preemption
During the process of establishing CR-LSP, if you cannot fine one path that satisfies
requirements, you can remove another established path and take up its bandwidth
resource. That is called preemption. CR-LSP check whether the path can be preempted
according to two priority features, that is, Setup Priority and Holding Priority.
Preemption is activated by the Resv message of RSVP-TE. Only when the priority of
Path1, which you want to set up, is higher than that of Path2, you can preempt the
bandwidth source of Path2 for Path1.
priority queue
A priority queue is an abstract data type in computer programming that supports the
following three operations: (1) InsertWithPriority: add an element to the queue with an
associated priority (2) GetNext: remove the element from the queue that has the highest
priority, and return it (also known as "PopElement(Off)", or "GetMinimum") (3)
PeekAtNext (optional): look at the element with highest priority without removing it
priority queuing
The Priority Queuing (PQ) is a queue scheduling algorithm based on the absolute priority.
According to the PQ algorithm, services of higher priorities are ensured with greater
bandwidth, lower latency, and less jitter. Packets of lower priorities must wait to be sent
till all packets of higher priorities are sent. In this manner, services of higher priorities
are handled earlier than others.
protection channels
The channels allocated to transport the working traffic during a switch event. When there
is a switch event, traffic on the affected working channels is bridged onto on the
protection channels.
Issue 02 (2013-08-10)
179
A Glossary
A bar connecting the PGND cable of the cabinet so that the cabinet and the earth are in
the same equipotential level.
protection ground
cable
A cable which connects the equipment and the protection groud bar. Usually, one half
of the cable is yellow; while the other half is green.
Protection path
Protection service
provider edge
A device that is located in the backbone network of the MPLS VPN structure. A PE is
responsible for VPN user management, establishment of LSPs between PEs, and
exchange of routing information between sites of the same VPN. During the process, a
PE performs the mapping and forwarding of packets between the private network and
the public channel. A PE can be a UPE, an SPE, or an NPE.
pseudo random binary A sequence that is random in a sense that the value of an element is independent of the
sequence
values of any of the other elements, similar to real random sequences.
pseudo wire emulation A type of end-to-end Layer 2 transmitting technology. It emulates the essential attributes
edge-to-edge
of a telecommunication service such as ATM, FR or Ethernet in a Packet Switched
Network (PSN). PWE3 also emulates the essential attributes of low speed Time Division
Multiplexed (TDM) circuit and SONET/SDH. The simulation approximates to the real
situation.
PSTN
PTMP
PTN
PTP
public switched
telephone network
Pulse per second, which, strictly speaking, is not a time synchronization signal. This is
because 1PPS provides only the "gauge" corresponding to the UTC second, but does not
provide the information about the day, month, or year. Therefore, 1PPS is used as the
reference for frequency synchronization. On certain occasions, 1PPS can also be used
on other interfaces for high precision timing.
PVP
PWE3
Q
QinQ
A layer 2 tunnel protocol based on IEEE 802.1Q encapsulation. It encapsulates the tag
of the user's private virtual local area network (VLAN) into the tag of the public VLAN.
The packet carries two layers of tags to travel through the backbone network of the
carrier. In this manner, the layer 2 virtual private network (VPN) is provided for the user.
QoS
Issue 02 (2013-08-10)
180
quality of service
A Glossary
R
R99
Release 1999
The network that provides the connection between CPEs and the CN. It isolates the CN
from wireless network.
radio frequency
radio network
controller
An equipment in the RNS which is in charge of controlling the use and the integrity of
the radio resources.
RAN
random early detection A packet loss algorithm used in congestion avoidance. It discards the packet according
to the specified higher limit and lower limit of a queue so that global TCP synchronization
resulted in traditional Tail-Drop can be prevented.
Rapid Spanning Tree
Protocol
An evolution of the Spanning Tree Protocol, providing for faster spanning tree
convergence after a topology change. The RSTP protocol is backward compatible with
the STP protocol.
rated current
RDI
Re-optimization
Real-time Transport Protocol (RTP) is a host-to-host protocol. It is used to deliver realtime services such as audio and video over the IP network.
The rt-VBR is intended for real-time applications, such as compressed voice over IP
(VoIP) and video conferencing. The rt-VBR is characterized by a peak cell rate (PCR),
sustained cell rate (SCR), and maximum burst size (MBS). You can expect the source
device to transmit in bursts and at a rate that varies with time.
Real-time Transport
Protocol
A type of host-to-host protocol used in real-time multimedia services such as Voice over
IP (VoIP) and video.
reboot
To start the system again. Programs or data will be reloaded to all boards.
RED
reference clock
A kind of stable and high-precision autonous clock providing frequencies for other clocks
for reference.
REI
Issue 02 (2013-08-10)
181
remote defect
indication
A Glossary
A signal transmitted at the first opportunity in the outgoing direction when a terminal
detects specific defects in the incoming signal.
remote error indication A remote error indication (REI) is sent upstream to signal an error condition. There are
two types of REI alarms: Remote error indication line (REI-L) is sent to the upstream
LTE when errors are detected in the B2 byte. Remote error indication path (REI-P) is
sent to the upstream PTE when errors are detected in the B3 byte.
remote maintenance
association end point
For the other devices in the same MA, their MEPs are called the Remote Maintenance
association End Points (RMEPs).
remote monitor
A widely used network management standard defined by the IETF, and it enhances the
MIB II standard greatly. It mainly functions to monitor the data traffic over a network
segment or the entire network. RMON is completely based on the SNMP architecture,
including the NMS and the Agent running on each network device.
Request For Comments A document in which a standard, a protocol, or other information pertaining to the
operation of the Internet is published. The RFC is actually issued, under the control of
the IAB, after discussion and serves as the standard. RFCs can be obtained from sources
such as InterNIC.
required Min Rx
interval
The minimum interval between received BFD control packets that the local system is
capable of supporting.
Resource Reservation
Protocol
The Resource Reservation Protocol (RSVP) is designed for Integrated Service and is
used to reserve resources on every node along a path. RSVP operates on the transport
layer; however, RSVP does not transport application data. RSVP is a network control
protocol like Internet Control Message Protocol (ICMP).
reverse pressure
A traffic control method. In telecommunication, when detecting that the transmit end
transmits a large volume of traffic, the receive end sends signals to ask the transmit end
to slow down the transmission rate.
RF
RFC
ring network
A type of network topology in which each node connects to exactly two other nodes,
forming a circular pathway for signals.
RIP
RMEP
RMON
RMRI
RNC
RoHS
rollback
Root alarm
An alarm directly caused by anomaly events or faults in the network. Some lower-level
alarms always accompany a root alarm.
Route restriction
The constraint conditions for calculating a route. When creating a trail, the user can
specify the explicit route and the NEs that the trail cannot pass. The explicit route and
the NEs are the constraints for calculating the route. The inevitable trail only functions
when the number of routes is calculated as 1. Double-click the NE icon can set the NE
as an NE that cannot be passed, and double-clicking it again can cancel the setting.
Issue 02 (2013-08-10)
182
A Glossary
Routing Information
Protocol
A simple routing protocol that is part of the TCP/IP protocol suite. It determines a route
based on the smallest hop count between source and destination. RIP is a distance vector
protocol that routinely broadcasts routing information to its neighboring routers and is
known to waste bandwidth.
routing policy
Routing policies are implemented to filter routing information, mainly through the
change of route properties.
routing protocol
A formula used by routers to determine the appropriate path onto which data should be
forwarded.
routing table
A table that stores and updates the locations (addresses) of network devices. Routers
regularly share routing table information to be up to date. A router relies on the
destination address and on the information in the table that gives the possible routes--in
hops or in number of jumps--between itself, intervening routers, and the destination.
Routing tables are updated frequently as new information is available.
RS232
RS422
The specification that defines the electrical characteristics of balanced voltage digital
interface circuits. The interface can change to RS232 via the hardware jumper and others
are the same as RS232.
RSTP
RSVP
rt-VBR
RTP
RTP
S
S-VLAN
service VLAN
S1 byte
In an SDH network, each network element traces step by step to the same clock reference
source through a specific clock synchronization path, thus realizing the synchronization
of the whole network. If a clock reference source traced by the NE is missing, this NE
will trace another clock reference source of a lower level. To implement protection
switching of clocks in the whole network, the NE must learn about clock quality
information of the clock reference source it traces. Therefore, ITU-T defines S1 byte to
transmit network synchronization status information. It uses the lower four bits of the
multiplex section overhead S1 byte to indicate 16 types of synchronization quality
grades. Auto protection switching of clocks in a synchronous network can be
implemented using S1 byte and a proper switching protocol.
SC
SCR
SD
SDH
SDP
Issue 02 (2013-08-10)
183
A Glossary
security alarm
security level
security log
Security logs record the security operations on the NMS, such as logging in to the server,
modifying the password, and exiting from the NMS server.
SEMF
sequence number
service data
The user and/or network information required for the normal functioning of service.
SETS
Setup Priority
The priority of the tunnel with respect to obtaining resources, ranging from 0 (indicates
the highest priority) to 7. It is used to determine whether the tunnel can preempt the
resources required by other backup tunnels.
SFP
shaping
The process of delaying packets within a traffic stream to cause it to conform to certain
defined traffic profile.
SHDSL
signal cable
Common signal cables cover the E1 cable, network cable, and other non-subscriber
signal cable.
signal degrade
A signal indicating the associated data has degraded in the sense that a degraded defect
(e.g., dDEG) condition is active.
signaling stream
Simple Network
Management Protocol
A network management protocol of TCP/IP. It enables remote users to view and modify
the management information of a network element. This protocol ensures the
transmission of management information between any two points. The polling
mechanism is adopted to provide basic function sets. According to SNMP, agents, which
can be hardware as well as software, can monitor the activities of various devices on the
network and report these activities to the network console workstation. Control
information about each device is maintained by a management information block.
Simple Traffic
Classification
Simple traffic classification (STC) organizes data packets into multiple priorities or
multiple service classes. A network administrator can set STC policies. An STC policy
can include the IP precedence or the DSCP value of an IP packet, the EXP value of an
MPLS packet, the ToS field in the IP packet header or the 802.1p value of a VLAN
packet.
single-ended switching A protection operation method which takes switching action only at the affected end of
the protected entity (e.g. "trail", "subnetwork connection"), in the case of a unidirectional
failure.
Issue 02 (2013-08-10)
184
A Glossary
A symmetric digital subscriber line technology developed from HDSL, SDSL, and
HDSL2, which is defined in ITU-T G.991.2. The SHDSL port is connected to the user
terminal through the plain telephone subscriber line and uses trellis coded pulse
amplitude modulation (TC-PAM) technology to transmit high-speed data and provide
the broadband access service.
Slicing
small form-factor
pluggable
SMB
sub-miniature B
Smooth upgrade
SNMP
SONET
Spanning Tree Protocol STP is a protocol that is used in the LAN to remove the loop. STP applies to the redundant
network to block some undesirable redundant paths through certain algorithms and prune
a loop network into a loop-free tree network.
SPE
SPF
SQN
square connector
SSM
SSMB
static ARP
A protocol that binds some IP addresses to a specified gateway. The packet of these IP
addresses must be forwarded through this gateway.
static route
A route that cannot adapt to the change of network topology. Operators must configure
it manually. When a network topology is simple, the network can work in the normal
state if only the static route is configured. It can improve network performance and ensure
bandwidth for important applications. Its disadvantage is as follows: When a network is
faulty or the topology changes, the static route does not change automatically. It must
be changed by the operators.
A static routing table is constructed manually by the system administrator using the route
command.
Statistical multiplexing A multiplexing technique whereby information from multiple logical channels can be
transmitted across a single physical channel. It dynamically allocates bandwidth only to
active input channels, to make better use of available bandwidth and allow more devices
to be connected than with other multiplexing techniques. Compare with TDM.
STP
subnet mask
The technique used by the IP protocol to determine which network segment packets are
destined for. The subnet mask is a binary pattern that is stored in the client machine,
server or router and is matched with the IP address.
Issue 02 (2013-08-10)
185
A Glossary
superstratum provider The SPE devices are core devices that are located within a VPLS full-meshed network.
edge
The UPE devices that are connected with the SPE devices are similar to the CE devices.
The PWs set up between the UPE devices and the SPE devices serve as the ACs of the
SPE devices. The SPE devices must learn the MAC addresses of all the sites on UPE
side and those of the UPE interfaces that are connected with the SPE. SPE is sometimes
called NPE.
Switching restoration
time
It refers to the period of time between the start of detecting and the moment when the
line is switched back to the original status after protection switching occurs in the MSP
sub-network.
Synchronization Status A message that carries quality levels of timing signals on a synchronous timing link.
Message
Nodes on an SDH network and a synchronization network acquire upstream clock
information through this message. Then the nodes can perform proper operations on their
clocks, such as tracing, switching, or converting to holdoff, and forward the
synchronization information to downstream nodes.
Synchronize Alarm
When synchronizing the alarms, the network management system checks the alarms in
the network management system database and the alarms in the NE. If they are
inconsistent, the alarms in the NE are uploaded to the network management system
database and overwrite the old ones.
synchronize NE time
To send the system time of the server of the network management system to NEs so as
to synchronize all NEs with the server.
synchronous digital
hierarchy
A transmission scheme that follows ITU-T G.707, G.708, and G.709. It defines the
transmission features of digital signals such as frame structure, multiplexing mode,
transmission rate level, and interface code. SDH is an important part of ISDN and BISDN. It interleaves the bytes of low-speed signals to multiplex the signals to high-speed
counterparts, and the line coding of scrambling is only used only for signals. SDH is
suitable for the fiber communication system with high speed and a large capacity since
it uses synchronous multiplexing and flexible mapping structure.
synchronous
equipment
management function
The SEMF converts performance data and implementation specific hardware alarms into
object-oriented messages for transmission over DCCs and/or a Q interface.
synchronous
equipment timing
source
The SETS function provides timing reference to the relevant component parts of
multiplexing equipment and represents the SDH network clement clock.
synchronous optical
network
Synchronous source
A clock providing timing services to connected network elements. This would include
clocks conforming to Recommendations G.811, G.812 and G.813.
SYSLOG
Syslog Service
Syslog service is used to manage the device to send the log information to the host. It is
used on the sending-information port.
system logging
System log tracks miscellaneous system events like startup, shutdown and events like
hardware and controller failures.
Issue 02 (2013-08-10)
186
A Glossary
T
Tail drop
A congestion management mechanism, in which packets arrive later are discarded when
the queue is full. This policy of discarding packets may result in network-wide
synchronization due to the TCP slow startup mechanism.
tangent rings
It is a concept in geometry. There is a public node between two ring networks. The public
node often brings in single-point failure.
TCH
TCP
TCP/IP
TDD
TDM
TE
Telecommunication
A protocol model defined by ITU-T for managing open systems in a communications
Management Network network. An architecture for management, including planning, provisioning, installation,
maintenance, operation and administration of telecommunications equipment, networks
and services.
threshold-crossing
throughput
The maximum transmission rate of the tested object (system, equipment, connection,
service type) when no packet is discarded. Throughput can be measured with bandwidth.
TIM
In Time Division Duplex (TDD) system, the uplink and downlink links use different
timeslots. They usually share the same frequency.
time division
multiplexing
A multiplexing technology. TDM divides the sampling cycle of a channel into time slots
(TSn, n=0, 1, 2, 3, ...), and the sampling value codes of multiple signals engross time
slots in a certain order, forming multiple multiplexing digital signals to be transmitted
over one channel.
Time Slot
Continuously repeating interval of time or a time period in which two devices are able
to interconnect.
time to live
A technique used in best-effort delivery systems to prevent packets that loop endlessly.
The TTL is set by the sender to the maximum time the packet is allowed to be in the
network. Each router in the network decrements the TTL field when the packet arrives,
and discards any packet if the TTL counter reaches zero.
timing loop
TM
TM
TMN
Issue 02 (2013-08-10)
187
A Glossary
token bucket algorithm The token bucket is a container for tokens. The capacity of a token bucket is limited, and
the number of tokens determines the traffic rate of permitted packets. The token bucket
polices the traffic. Users place the tokens into the bucket regularly according to the preset
rate. If the tokens in the bucket exceed the capacity, no tokens can be put in. Packets can
be forwarded when the bucket has tokens, otherwise they cannot be transferred till there
are new tokens in the bucket. This scheme adjusts the rate of packet input.
token ring
The IEEE 802.5 standard for a token-passing ring network with a star-configured
physical topology. Internally, signals travel around the network from one station to the
next in a ring. Physically, each station connects to a central hub called a multistation
access server.
tolerance
topology management
Topology Object
A basic element in the NMS topology view, which includes submap, node, connection,
and so on.
Topology view
A basic component for the human-machine interface. The topology view directly
displays the networking of a network as well as the alarm and communication statuses
of each network element and subnet. In this manner, the topology view reflects the basic
running conditions of the network.
ToS
ToS priority
A ToS sub-field (the bits 0 to 2 in the ToS field) in the ToS field of the IP packet header.
TPS
TPS protection
The equipment level protection that uses one standby tributary board to protect N
tributary boards. When a fault occurs on the working board, the SCC issues the switching
command, and the payload of the working board can be automatically switched over to
the specified protection board and the protection board takes over the job of the working
board. After the fault is cleared, the service is automatically switched to the original
board
TR
traffic channel
Indicates the channel that carries voice coding information or user data. Traffic channels
are classified into voice traffic channels and data traffic channels.
traffic classification
Traffic classification enables you to classify traffic into different classes with different
priorities according to some criteria. Each class of traffic has a specified quality of service
(QoS) in the entire network. In this way, different traffic packets can be treated
differently.
traffic engineering
A technology that is used to dynamically monitor the traffic of the network and the load
of the network elements, to adjust in real time the parameters such as traffic management
parameters, route parameters and resource restriction parameters, and to optimize the
utilization of network resources. The purpose is to prevent the congestion caused by
unbalanced loads.
Issue 02 (2013-08-10)
188
A Glossary
It is the traffic frame discard control. Two options are provided: enable and disable. It
indicates the means by which the NE discards cells when the network is congested. When
the frame discard mark is closed, the cells will be discarded at the cell level; when it is
opened, they will be discarded at the frame level. Here, "frame" refers to the AAL
protocol data unit.
traffic management
Traffic management refers to the process of monitoring user traffic on a network and
redistributing/rerouting it when necessary in order to ensure optimal network
performance
traffic policy
A full set of QoS policies formed by association of traffic classification and QoS actions.
trail termination source The trail termination source identifier (TTSI) of the LSP is used to uniquely identify an
identifier
LSP on a network.
transit
The group is transferred along the LSP consisting of a series of LSRs after the group is
labeled. The middle node is named Transit.
transit delay
The period from the time when a site starts to transmit a data frame to the time when the
site finishes the data frame transmission or to the time when all data frames are received
by the receiver.
Transmission Control
Protocol
The protocol within TCP/IP that governs the breakup of data messages into packets to
be sent via IP (Internet Protocol), and the reassembly and verification of the complete
messages from packets received by IP. A connection-oriented, reliable protocol (reliable
in the sense of ensuring error-free delivery), TCP corresponds to the transport layer in
the ISO/OSI reference model.
Transmission Control
Protocol/Internet
Protocol
Common name for the suite of protocols developed to support the construction of
worldwide internetworks.
transparent
transmission
A process during which the signaling protocol or data is not processed in the content but
encapsulated in the format for the processing of the next phase.
transport plane
tributary protection
switch
One or more Tributary Units, occupying fixed, defined positions in a higher order VCn payload is termed a Tributary Unit Group (TUG). TUGs are defined in such a way that
mixed capacity payloads made up of different size Tributary Units can be constructed
to increase flexibility of the transport network
trTCM
trunk cable
trunk line
TTL
TTSI
TU
tributary unit
TUG
Issue 02 (2013-08-10)
189
A Glossary
Tunnel
A channel on the packet switching network that transmits service traffic between PEs.
In VPN, a tunnel is an information transmission channel between two entities. The tunnel
ensures secure and transparent transmission of VPN information. In most cases, a tunnel
is an MPLS tunnel.
twisted pair
The trTCM meters an IP packet stream and marks its packets based on two rates, Peak
Information Rate (PIR) and Committed Information Rate (CIR), and their associated
burst sizes to be either green, yellow, or red. A packet is marked red if it exceeds the
PIR. Otherwise it is marked either yellow or green depending on whether it exceeds or
doesn't exceed the CIR.
type of service
A field in an IP packet (IP datagram) used for quality of service (QoS). The TOS field
has 8 bits in length, which is divided into five subfields.
U
U-VLAN
A VLAN attribute indicating that the current VLAN is a user VLAN of an M-VLAN.
Multicast services are copied from the M-VLAN to the user VLAN.
UAS
unavailable second
UAT
UBR
UBR+
UDP
unavailable time event A UAT event is reported when the monitored object generates 10 consecutive severely
errored seconds (SES) and the SESs begin to be included in the unavailable time. The
event will end when the bit error ratio per second is better than 10-3 within 10 consecutive
seconds.
underfloor cabling
The cables connected cabinets and other devices are routed underfloor.
UNI
unicast
UPC/NPC
Upper subrack
The subrack close to the top of the cabinet when a cabinet contains several subracks.
Upper threshold
UPS
usage parameter
control/network
parameter control
Issue 02 (2013-08-10)
190
User Datagram
Protocol
A Glossary
A TCP/IP standard protocol that allows an application program on one device to send a
datagram to an application program on another. User Datagram Protocol (UDP) uses IP
to deliver datagrams. UDP provides application programs with the unreliable
connectionless packet delivery service. Thus, UDP messages can be lost, duplicated,
delayed, or delivered out of order. UDP is used to try to transmit the data packet, that is,
the destination device does not actively confirm whether the correct data packet is
received.
user network interface The interface between user equipment and private or public network equipment (for
example, ATM switches).
User operation log
Record the operation of the user for the convenience of analysis and query.
V
V-NNI
V-UNI
One of the traffic classes used by ATM (Asynchronous Transfer Mode). Unlike a
permanent CBR (Constant Bit Rate) channel, a VBR data stream varies in bandwidth
and is better suited to non real time transfers than to real-time streams such as voice calls.
VBR
VC
VCC
VCCV
VCI
VCTRUNK
A virtual concatenation group applied in data service mapping, also called the internal
port of a data service processing board
virtual channel
Any logical connection in the ATM network. A VC is the basic unit of switching in the
ATM network uniquely identified by a virtual path identifier (VPI)/virtual channel
identifier (VCI) value. It is the channel on which ATM cells are transmitted by the
switching.
virtual channel
connection
The VC logical trail that carries data between two end points in an ATM network. A
logical grouping of multiple virtual channel connections into one virtual connection.
virtual channel
identifier
A 16-bit field in the header of an ATM cell. The VCI, together with the VPI, is used to
identify the next destination of a cell as it passes through a series of ATM switches on
its way to its destination.
virtual circuit
A logical grouping of two or more nodes which are not necessarily on the same physical
network segment but which share the same IP network number. This is often associated
with switched Ethernet.
Issue 02 (2013-08-10)
191
A Glossary
virtual path
A bundle of virtual channels, all of which are switched transparently across an ATM
network based on a common VPI.
The field in the ATM (Asynchronous Transfer Mode) cell header that identifies to which
VP (Virtual Path) the cell belongs.
A type of point-to-multipoint L2VPN service provided over the public network. VPLS
enables geographically isolated user sites to communicate with each other through the
MAN/WAN as if they are on the same LAN.
virtual private network A system configuration, where the subscriber is able to build a private network via
connections to different network switches that may include private network capabilities.
virtual private wire
service
A technology that bears Layer 2 services. VPWS emulates services such as ATM, FR,
Ethernet, low-speed TDM circuit, and SONET/SDH in a PSN.
VRF performs the function of establishing multiple virtual routing devices on one actual
routing device. That is, the L3 interfaces of the device are distributed to different VRFs,
performing the function of establishing multiple virtual route forwarding instances on
the device.
virtual switch instance An instance through which the physical access links of VPLS can be mapped to the
virtual links. Each VSI provides independent VPLS service. VSI has Ethernet bridge
function and can terminate PW.
virtual user-network
interface
VLAN
VLAN ID
Namely, it is the virtual LAN identifier. One Ethernet port can support 4K VLAN routes,
and one NE can support up to 8K VLAN routes.
VLAN mapping
A technology that enables user packets to be transmitted over the public network by
translating private VLAN tags into public VLAN tags. When user packets arrive at the
destination private network, VLAN mapping translates public VLAN tags back into
private VLAN tags. In this manner, user packets are correctly transmitted to the
destination.
One of the properties of the MST region, which describes the relationship between
VLANs and spanning tree instances.
VLL
voice over IP
An IP telephony term for a set of facilities used to manage the delivery of voice
information over the Internet. VoIP involves sending voice information in a digital form
in discrete packets rather than by using the traditional circuit-committed protocols of the
public switched telephone network (PSTN).
VoIP
VP
VPI
VPLS
VPN
VPWS
VRF
Issue 02 (2013-08-10)
192
VSI
A Glossary
W
WAN
Wander
The long-term variations of the significant instants of a digital signal from their ideal
position in time (where long-term implies that these variations are of frequency less than
10Hz).
wavelength
The distance between successive peaks or troughs in a periodic signal that is propagated
through space. Wavelength is symbolized by the Greek letter lambda and can be
calculated as speed divided by frequency.
wavelength division
multiplexing
A technology that utilizes the characteristics of broad bandwidth and low attenuation of
single mode optical fiber, uses multiple wavelengths as carriers, and allows multiple
channels to transmit simultaneously in a single fiber.
WDM
weighted random early A packet loss algorithm used for congestion avoidance. It can prevent the global TCP
detection
synchronization caused by traditional tail-drop. WRED is favorable for the high-priority
packet when calculating the packet loss ratio.
WFQ
A network composed of computers which are far away from each other which are
physically connected through specific protocols. WAN covers a broad area, such as a
province, a state or even a country.
winding pipe
Working path
WRED
wrong packets
X
X digital subscriber line A family of bandwidth-efficient modulation techniques, developed to achieve extremely
high data transfer rates over twisted- pair cables. While the letter "X" represents a
variable, DSL stands for "Digital Subscriber Line". XDSL techniques may offer several
benefits such as, capability to offer high-speed data services to customers, low cost by
using existing infrastructure and switching congestion relief caused by existing data
users.
xDSL
Issue 02 (2013-08-10)
193