Sunteți pe pagina 1din 743

Recommendations

 Huawei Learning Website


 http://learning.huawei.com/en

 Huawei e-Learning
 http://support.huawei.com/learning/NavigationAction!createNavi?navId=MW
000001_term1000025144&lang=en

 Huawei Certification
 http://support.huawei.com/learning/NavigationAction!createNavi?navId=_31
&lang=en

 Find Training
 http://support.huawei.com/learning/NavigationAction!createNavi?navId=_trai
ningsearch&lang=en

More Information
 Huawei learning APP

版权所有© 2018 华为技术有限公司


n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu defined by the ITU-T.
The preceding is the definition of the access network

n
The Access Network (AN) consists of all devices and lines between a local switch and user
iousers and various application systems through

t
terminals. It directly provides services for
a largest part of the telecom network and generally
different transmission media. It iscthe
i
accounts for 1/2 of the network
r tif investment.

C e into narrowband and broadband access networks based on
Access networks are classified
&
the bandwidth. Narrowband and broadband are classified based on the amount of data to
be transmitted.gGenerally, a bandwidth greater than 2 Mbps is a broadband service.
i nservices include voice and fax services. Broadband services include Internet
in
Narrowband
access,avideo, game, and HDTV services.
T r

ei
AN: access network

a w SNI: service node interface


u

H  UNI: user network interface


n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu in life. The communication industry
The last mile refers to the last mile of a long journey

n devices such as user computers.


often uses "last mile" to refer to the connection between the equipment room switch of a
o
ti
communication service provider and terminal

ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 In a MAN, a large number of scattered users use u services through PCs, IADs, or E-
Hvoice
n
phones. How to connect these services to the bearer network?
o
 L2 access:
a ti
Individual broadband usersiccan access the BRAS through the ATM DSLAM, IP DSLAM,
tif

r
Ce users can access the network through ADSL, Ethernet
and LAN.

Enterprise and commercial


& or bare fibers.

switches, MSTP,
n g
i
inthe MAN access layer, the BRAS is used to authenticate users and send user data
 L3 convergence:

a
rto the aggregation router of the Internet or the backbone network of telecom
On
T

ei services based on user characteristics, such as the domain and destination IP address.
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 DSL is short for digital subscriber line.
Hu

o n
DSL is a technology developed by the telecom industry to utilize the copper lines of millions

ti
of kilometers around the world. Therefore, DSL is also called the copper line access
technology.
ic a

if
Let's review the origin and development history of the xDSL technology.
rt

To cater for the accessC


e
The copper line access technology can be traced back to the mid-1970s.
of multiple services, the ITU-T proposes the idea of using the digital
&

subscriber line of the integrated service digital network, that is, the ISDN technology. ISDN
is recognized asgthe first generation DSL technology.
ISDN has n ininterface rates: BRI and PRI. The transmission rate of BRI can reach the 144

Kbps, a i that of the PRI can reach 2.048 Mbps or 1.544 Mbps.
two

T r and

i late 1980s,
etechnology,
By the with the development of digital signal processing technologies, the HDSL

a w that is, the high bit rate digital subscriber line technology, is introduced. The
HDSL technology can provide the transmission rate of 2.048 Mbps or 1.544 Mbps.

Hu  In the early 1990s, engineers from Bell realized that it is possible to provide asymmetric
services, that is, the rate in one direction could be much higher than that in the other
direction.
 This asymmetry is suitable for the video-on-demand test proposed at the time. So the ADSL
technology, namely asymmetric digital subscriber line technology, is developed.
 With the development of the digital subscriber line technology, a technology with a higher
rate than the ADSL is considered.
 In the late 1990s, the VDSL technology came into being, that is, the very high speed digital
subscriber line technology.
 So far, some other DSL technologies are also developed and called xDSL technologies.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu rate, that is, from the central office
ADSL provides asymmetric transmission rates. Downlink

nKbps. The maximum transmission distance is 5


to the user side, can reach 8 Mbps. The upstream rate, that is, from the user side to the
o
i
totrun at a frequency higher than the voice frequency
central office, ranges from 16 Kbps to 640
km. The ADSL is specially designeda
ic as the ordinary telephone service at the same time.
band, and can run on the samefline
i
e rt and asymmetric transmission. The maximum upstream rate
C downstream rate is 52 Mbps. The maximum transmission
 VDSL supports both symmetric

distance can reach&


is 26 Mbps, and the maximum

g 1.5 km. The VDSL service can be transmitted on the same line as the
n service and ISDN service.
i
ordinary telephone

a in (VDSL2) transmission standard is based on the Discrete Multi-tone Modulation


T r technology. In this standard, the ADSL2+ technology is used to provide long-


The G.993.2

i
(DMT)
edistance
a w transmission, and the high data transmission rate of VDSL is enhanced from 70/30

Hu Mbps to symmetric 100 Mbps. To achieve such a high transmission rate in a range of 350
meters, the spectrum of VDSL2 has increased from 12 MHz to 30 MHz. In addition, the
transmission power has increased to 20 dBm to meet the requirements for medium- and
high-ring transmission.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hutraditional analog voice signals (except
The xDSL technology can transmit data signals and
SHDSL) on the same twisted pair.
n
This slide uses ADSL as an example. io

a t
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 OPEX:Operating Expense Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu in network construction:
Large-scale enterprises face the following challenges

A large number of switches occupy n equipment room space, consume much power,
io

and are difficult to cool.


a t
c
The connections betweeniaggregation
f

i routers are complex and occupy pipe space.
rtmaintenance are difficult.
e
Therefore, cabling and
C and difficult to manage, requiring a large maintenance team.
Switches are scattered
&


g
Adding new devices on the network is complex, and the capacity expansion
n is poor.
i
in of PON:
capability

r a
Advantages
T

ei Optical
 cables replace traditional network cables, reducing investment costs and

a w simplifying construction. The optical cables are antioxidant, durable, and easy to

Hu maintain.

 The passive convergence optical splitter greatly reduces the number of aggregation
switches and auxiliary equipment rooms, saving space and power consumption.

 Integrated office: Provide unified bearer for corridor terminals. The PoE is used to solve the
problem of power supply.

 Independent office: One desk and one line, providing 1000 Mbps bandwidth. The cable is
connected the IP phone and then to the PC. The networking is simple.
 Open Office: PoE supplies power to Wi-Fi and cameras. Office services are carried in a
unified manner (telephone).
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu services such as telephone and TV to
The hotel network is evolving from traditional single

n
monitoring, Wi-Fi, intelligent control of guest rooms, and environment awareness,
o
ti
becoming diversified, intelligent, and mobile.

i a
c requirements of smart hotels, such as 4K HD videos,
f
Higher bandwidth: New service
ti

r
require higher bandwidth.
e anytime and anywhere: Seamless connection between guest

C
Access to the network
&
rooms, corridors, lobbies, and conference rooms.

n g
i
Rich value-added services: Video on demand (VoD) and intelligent guest room control
in operation cost: A large number of guest rooms and wide coverage require


a
ra simple network that features easy deployment and O&M.
Economic
T
i Huawei Agile POL Converged Hospitality solution integrates the development of
eThe
aw

Hu
wireless, wired, video, voice, and guest room surveillance services with the concept of all-
optical smart hotel and the service bearing mode of "one room one fiber, and multiple
services" to meet the requirements of various information systems using simplified
networking and management

 One room one fiber simplifies the network and reduces costs.
 Multi-scenario and multi-service coverage: Provides seamless coverage for HSI, voice,
TV, Wi-Fi, and control services in guest rooms, halls, corridors, and restaurants.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu
Cloud education and remote teaching require high-bandwidth and high-reliability campus
networks that support smooth evolution.
o n
t i
Campuses require full wireless coverage, unified authentication for wired and wireless
access, and seamless roaming. ca

t i fi and carries multiple services in a unified manner,



e r
Meets the desktop cloud requirements
C
simplifying the network planning, cabling, and O&M.
& solution uses an optical fiber network to carry full services in
The all-optical campus
g

i n in a unified manner. The passive ODN network provides higher reliability


multiple scenarios

a in flexible capacity expansion (P2MP architecture) and flexible evolution


and supports

T r PON/40G PON).
(PON/10G
i WDM equipment is used to multiplex CATV signals and GPON signals into one optical
eThe
w

u a fiber for transmission to the dormitories and apartments.

H  One optical fiber carries all types of services in classrooms, offices, and outdoor
entertainment areas.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Answers: Hu
1. CD.
o n
2. ABD.
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Brief history of Ethernet development: Hu
n
In 1973, Xerox, a company in Palo Alto Californian, proposed and implemented the original
o
ti

Ethernet. Dr. Robert Metcalfe was recognized as the father of Ethernet, and his lab

ic a
if
prototype system ran at a speed of 2.94 megabits per second (3 Mbps).

r t
e
 In 1980, Digital Equipment Corporation, Intel, and Xerox jointly launched the 10 Mbps DIX
C
Ethernet standard [DIX80]. IEEE 802.3 standards are formulated based on this original
&
Ethernet technology.
g
In 1995, IEEEnofficially passed the 802.3u Fast Ethernet standard.

ni
a i
r
 In 1998, the IEEE802.3z gigabit Ethernet standard was officially released.

i
In T the IEEE802.3ab standard, that is, the 1000BASE-T standard, was released.
1999,
eOn July 18, 2002, IEEE passed the 802.3ae (10 Gbps Ethernet), also known as the 10GE

aw
Hu Ethernet. It includes three physical interface standards: 10GBASE-R, 10GBASE-W, and
10GBASE-LX4.
 In March 2004, IEEE approved the 10G Ethernet standard 802.3ak for copper cables. The
new standard will be implemented as 10GBASE-CX4 to provide a 10 Gbps rate on dual-axis
cables.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Hu layer of the network. The new-
The 10 Mbps Ethernet is usually located at the access

n
generation multimedia, image, and database products can easily overwhelm the Ethernet
o
ti
bandwidth of the 10 Mbps.

ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu802.3 cables also include optical fiber
In addition to coaxial cables and twisted pairs, IEEE

n
10BASE-F. The 10BASE-F has been used at the initial stage, and the transmission distance
o
ti
can reach about 2 km.

ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Hurequirements of network data
The standard Ethernet rate is too low to meet the
transmission in the modern age.
o n
Therefore, IEEE defined a fast Ethernetiwith

a t a data transmission rate of 100 Mbps. The

f ic
standard is IEEE802.3u, and the transmission medium mainly includes optical fibers and
twisted pairs.
r ti
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The fast Ethernet working in full-duplex mode can Hutransmit and receive data at the rate of
n
100 Mbps at the same time. The channels for transmitting and receiving data are
independent of each other. In this way,o
ti
no conflict occurs and the communication

ic
efficiency of the network is improved. a
t i f

r
EIA/TIA: Electronic Industry Alliance/Telecommunications Industry Association

Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The Gigabit Ethernet is an extension of the IEEEH u Ethernet standard. Based on the
802.3

n
Ethernet protocol, the Gigabit Ethernet increases the transmission rate of the fast Ethernet
o
ti
by 10 times to 1 Gbps.

i a
c IEEE802.3z (optical fiber and copper cable) and
f
Gigabit Ethernet has two standards:
IEEE802.3ab (twisted pair) ti

e r
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu 1000BaseT is a gigabit Ethernet
IEEE802.3ab defines the 1000BaseT cable standards.

n
technology that uses Cat. 5 UTP as network transmission media. The longest effective
distance can reach 100 m, the same as o
ti Mbps in the existing fast Ethernet system.
100BASETX. This technology can be used to achieve
smooth upgrade from 100 Mbps toa1000
fic standards:
IEEE802.3z defines 3 types ofticable

e r

C
The 1000BaseCX uses a special type of shielded copper cable with high-quality
&
balanced twisted pairs. The longest effective distance is 25 m, and a 9-core type-D

n
connectorg is used to connect the cable.
i

a in
1000BaseSX is a network medium technology that uses short-wave laser as the signal

T rsource. The laser transmitter with the wavelength of 770–860nm (usually 800 nm)
ei configured on the transceiver does not support single-mode optical fibers and can

a w only drive multi-mode optical fibers.

Hu  1000BaseLX is a network medium technology that uses long-wave laser as signal


source. The laser transmitter with the wavelength of 1270–1355 nm (usually 1300
nm) configured on the transceiver can drive both multi-mode and single-mode
optical fibers.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu (CSMA/CD) is a method for
Carrier Sense Multiple Access with Collision Detection

n
implementing multipoint communication using shared media. The basic rules are as follows:
o
t i Otherwise, go to (2).
(1). If the medium is idle, send data.
a listening to the channel until the channel is idle, and

c
(2) If the medium is busy, ikeep
tif

e r
then send data immediately.

(3) If a collision isCdetected, that is, the swing of the voltage on the line exceeds twice
& a short jamming signal is sent, so that all stations know that a

the normal value,


g
noccurs and stop sending data.
i
collision
(4)in

radataAfter the jamming signal is sent, wait for a random period of time, try to send

i T again, and return to (1) to start again.


e
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Due to the limitation of the CSMA/CD algorithm, u frame length of a 10M half-duplex
Hthe
Ethernet frame cannot be less than 64 bytes.
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu Ethernet, there are 2 types of
During the transition from shared Ethernet to switched
network devices: Repeaters and hubs.
o n
t i may be distorted during transmission,
After the network range is expanded, signals
aof a repeater is to recover distorted signals and amplify

ic
tif
resulting in bit errors. The function
the signals.
r

Ce
Hubs and repeaters are connection devices at the physical layer.
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Hub is an Ethernet device that works based on H theuCSMA/CD mechanism. Its working

n
principle is simple: The data frames (be it unicast or broadcast) received from any port are
all forwarded to any other ports excepto
ti
the source port.

i a
c change the physical topology of the Ethernet. The
f
Therefore, the hub and repeater only
ti is still the bus topology.

r
logical structure of the Ethernet

Ce address, and only replicates and forwards data.
A hub does not use the MAC
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Hu built using hubs and repeaters is a
From the above contents, we can know an Ethernet

n
shared Ethernet. A shared Ethernet has the following disadvantages:
o
 Serious collision
a ti
Broadcast flooding
i f ic
rt

 No security
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 A switch is a bridge device working at the dataH ulayer of the Ethernet. It needs to
link
implement the following basic functions:
o n
 MAC address learning
a ti
Forwarding and filtering ic
tif

r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 In this figure, DMAC represents the MAC address Hofu the destination terminal, SMAC
n
represents the source MAC address, and the LENGTH/TYPE field has different meanings
according to the value. If LENGHT/TYPEo
ti protocol type). If LENGTH/TYPE is less 1500, it
is greater than 1500, it indicates the type of the

c a
data frame (for example, the upper-layer
indicates the length of the datafiframe. DATA/PAD is specific data. The minimum length of
i
rtbe greater than or equal to 64 bytes (calculated according to
the maximum distanceC
e
an Ethernet data frame must
in half-duplex mode). Therefore, if the data length plus the frame
header is less than&64 bytes, the padding content needs to be added to the data part. FCS

n g
i
is a frame check field, which is used to determine whether an error occurs in a data frame.

a in of LENGTH/TYPE is greater than 1500, the MAC sub-layer can directly submit
If the value
r frame to the upper layer protocol according to the value of LENGTY/TYPE. In this

theTdata
i it is unnecessary to implement the LLC sub-layer. This structure is the currently
ecase,
a w popular ETHERNET_II, and most computers support this structure. Note that in this

Hu structure, the data link layer may not implement the LLC sub-layer, but includes only one
MAC sub-layer.

 If the value of LENGTH/TYPE is less than or equal to 1500, this structure is called
ETHERNET_SNAP, which is a standard defined by the 802.3 Committee. Currently, it is not
widely used.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Huit belongs to Ethernet_II (0x0800 is
If an Ethernet frame of the 0800 type is generated,

n
greater than 1500) and is an IP datagram (0800 indicates an IP datagram).
Similarly, if the type is 0806, the data isio

a t the ARP request/response. If the type is 8035, the


data is the RARP request/response.
i f ic

e
The problem is that the field rtindicates the frame length in the 802.3 frame structure. How
C
to indicate the preceding packet types?
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The 802.3 frame format is followed by a 3-byteH u LLC and a 5-byte 802.2 SNAP. The
802.2

nfield is set to 3. The subsequent 3 bytes (org


values of the destination service access point (DSAP) and source service access point (SSAP)
o
ti byte type fields are in the same format as Ethernet
are both set to 0xAA. The value of the Ctrl
codes) are set to 0. The subsequentatwo
i f ic
rt
frames.

C e
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

u
A MAC address contains 48 bits, but it is usuallyHrepresented as a 12-bit dotted
hexadecimal number.
o n
MAC addresses are globally unique and
t i managed and allocated by the IEEE.
a code and serial number. The first 24 bits represent

c
Each address consists of 2 parts:ivendor
tif and allocated by the IEEE. The remaining 24 bits are

r
allocated by each vendor.e
the vendor code, which is managed
C
Special MAC address: &
g

i n48 bits are 1, the address is a broadcast address.


iIfnthe 8th bit is 1, the address is a multicast address.
 1. If all

r a
2.
T

 i a destination address, the 8th bit indicates whether a frame is to be sent to a single
eInstation
a w or a group of stations. In the source address, the 8th bit must be 0. (because a

Hu frame cannot be sent from a group of stations). It is essential that the address of a station
be uniquely determined. The destination of a frame must be clear.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 First let's talk about the MAC address learning. Hu

A bridge forwards data frames based on the n MAC address table. The MAC address table is
io MAC address. The MAC address table of a

learned by the bridge based on the source


t
abetween the MAC address and switch ports.
ic
if
common L2 switch is the mapping

Here we need to emphasizert


Ce listens to the source address of the received data frame.
 that the bridge listens to the source address of the data frame,
and each port of the switch
&the MAC address table of the switch is empty.
During initialization,
g

i nis an example. After receiving a frame from port 1, the switch checks the
in MAC address and then the cached MAC address table on the switch. However,
 The following

a
r address table is empty. What will the switch do? The switch sends the data frame
destination
theTMAC
etoi all ports (except the port 1 which is the source port of the frame). The switch also checks
a w the source MAC address of the frame and maps the MAC address of port 1 to the MAC

Hu address of site A. The source MAC address of the frame is the physical address of site A. In
this way, each station establishes a mapping relationship with a directly connected port, so
as to form a MAC address table.

 If a port is connected to a hub, one port corresponds to multiple MAC addresses. Each port
on a switch corresponds to a collision domain.
 Note: In the case of multicast, an address entry is established through protocols such as
IGMP snooping instead of learning.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hupackets based on destination addresses.
The second basic function of a switch is forwarding

n
The switch queries the MAC forwarding table and forwards packets accordingly. If a
io not exist in the table, the switch forwards the

t
destination address of a packet does
packet in broadcast mode.ca
t i fi using the automatic address learning and aging

e r
The address table is maintained
mechanism.
C
&frame format is not modified (the frame format needs to be modified
Generally, the
g

and a n
i tag must be added in a VLAN).

a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Receive all data frames on a network segment.Hu

Use the source MAC address in the received n data frame to establish the MAC address table
io address aging mechanism to maintain the

t
(source address self-learning) and use the
a
address table.
ic
f the destination MAC address of a data frame. If the
r tifor
destination MAC addresse
 Search the MAC address table
C is found, send the data frame to the corresponding port
&
(excluding the source port). If no destination MAC address is found, send data to all ports
(excluding the g
i n source port).

n
Forwardibroadcast
a
 and multicast frames to all ports (excluding the source port).

T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu Ethernet, but it still has the problem
An L2 switch solves the collision problems in a shared
of broadcast flooding.
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Reference answer: Hu

o n
1. Including coaxial cables, twisted-pair cables, and optical fibers.

ti
 2. Carrier Sense Multiple Access/Collision Detection (CSMA/CD) is an effective

c a
means of multi-point communication through a shared medium. Listening is
i
t if
performed before data is sent to ensure that the line is idle and the chance of
r
Ce
collision is reduced. Data sent by each station may be received by multiple
stations at the same time. In addition, when a collision is detected, the sending is
&
stopped and retried after a random period of time.

ng
ni
 3. An l2 switch is a device working at the data link layer and needs to perform the

a ifollowing functions: learning source MAC addresses and forwarding packets

T r based on destination MAC addresses.

ei
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Traditional LAN uses HUB, HUB has only one bus, Huand a bus is a collision domain. Therefore,
n
the traditional LAN is a flat network, and a LAN belongs to the same conflict domain. Any
packet sent by a host will be received byoall other machines in the same conflict domain.
i is used instead of the hub (HUB). Each port can
tswitch)
Later, the network bridge (two layer a
c conflict domain is restricted to each port, which
ithe
i f
rt of the network sending unicast packet and greatly improves
be regarded as a single bus, and

e
greatly improves the efficiency
the performance of theClayer 2 network. If a host sends a broadcast packet, the device can
& information. We usually call the area that the broadcast packet
also receive the broadcast
g
nthe broadcast packets and send them to the various corners of the network.
i
can reach as a broadcast domain. When the bridge is transmitting the broadcast packet, it
n
ai expansion of network scale, more and more broadcast packets are in the network,
will still copy
Withrthe
i Tmore and more network resources are occupied by the broadcast packet, which
eseriously affects the network performance. This is the problem of the so-called broadcast
and

a w
Hu storm.

 Because of the working principle limitation of the layer two network, the bridge is
powerless for the broadcast storm problem. In order to improve the efficiency of the
network, we usually need to segment the network: divide a large broadcast domain into
several small broadcast domains.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 In the past, LAN was often segmented throughH u the transmission range of the
a router,

n
broadcast message is greatly reduced. This scheme solves the problem of broadcast storm,
but the router separate the network ono
ti difficulty of management and maintenance is
the network layer, the network planning is complex,
it is not flexible on networking, andathe
i f ic LAN segmentation method, the virtual LAN is
rtsolution to solve the problems of large-scale layer two
greatly increased. As an alternative

e
introduced into the network
network environment.C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The Virtual Local Area Network (VLAN) technologyHulogically divides a physical LAN into
n VLANs cannot. In this manner, messages are
multiple VLANs (broadcast domains). As a result, hosts within the same VLAN can
o
i
tcommunication
communicate directly, while hosts in different
broadcast in each VLAN, inter-VLAN
c a is restricted, and network security is
enhanced.
t i fi
e r
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Compared with the traditional LAN, VLAN has the Hufollowing advantages:
Limit the broadcast packet to improve then utilization of bandwidth:
io caused by broadcast storm is effectively

t
abroadcast domain, and the same VLAN member is in
The performance degradation problem
c

i
if by the VLAN, then when a packet has no routing,
solved. A VLAN forms a small
r tidentified
the switch will onlyesend the packet to all other ports that belong to the VLAN, not
the broadcast domain
C
&
all the ports of the switch, so that the packet is limited within a VLAN. To a certain

n g
extent, the bandwidth can be saved.
i

a
Reduce thein of movement and change:
cost

T rThe dynamic management network, that is, when a user moves from one position to
ei another, his network attributes do not need to be reconfigured, but dynamic. This

a w dynamic management network brings great benefits to both the network manager

Hu and the user. One user, wherever he goes, can access the network without changing
configurations. The prospect of access to the network without any modification is
very promising. Of course, not all VLAN definition methods can do this.
 Create a virtual workgroup:
 The ultimate goal of using VLAN is to build a virtual workgroup model. for example,
in an enterprise network, the same department is easy to access and communicate
with each other as on the same LAN, and all the broadcast packets are restricted to
the virtual LAN, without effecting the other VLAN users. If a person move from one
place to another when he is still in the same Department, the user's configuration
does not need to be changed; at the same time, if a person has not changed the
n
office place, but he changed the Department, the network administrator only needs
it o
to change the user's configuration of this user. The goal of this function is to build a
ic a
i
dynamic organizational environment. Of course, it is just an ideal goal. To achieve it,
f
rt
Ce
some other support is needed. Users are not restricted by physical devices. VLAN
users can be anywhere in the network. VLAN has no effect on users' applications.
&
g
 Enhance the security of communication:

n
One VLAN packet will not be sent to another VLAN, so that other inVLAN users can
i information will not

ra
not receive any packets from this VLAN, ensure that the VLAN
be wiretapped by other VLAN people, thus realizing theTinformation secrecy.
ei
 Enhance the robustness of the network:
a w

H u problems often effect the whole


When the network size is larger, some network
network. By using VLAN, some network failures can be limited inside a VLAN.

o n the networking scheme is flexible and


Because VLAN logically divides the network,
the configuration managementtis i simple, which reduces the cost of management and
ic a
maintenance.
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 In this mode, VLANs are classified based on theH u numbers on a switching device. The
port

nThat is, a port belongs to a VLAN by default.


network administrator configures a port default VLAN ID (PVID), that is, the default VLAN
o
i
ittis marked with the PVID if the data frame carries no
ID, for each port on the switching device.
When a data frame reaches a port,a
i f ic with a PVID. If the data frame carries a VLAN tag, the
rta VLAN tag to the data frame even if the port is configured
VLAN tag and the port is configured

with a PVID. C e
switching device will not add

& process VLAN frames in different manners.


g
Different types of ports
Advantages:in


i n It is simple to define VLAN members.
r a

T
Disadvantages: VLANs must be re-configured when VLAN members change locations.

ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 In this mode, VLANs are classified based on theH MACu addresses of network interface cards
n
(NICs). The network administrator configures the mappings between MAC addresses and
o
ttoi be added to the packet according to the MAC
VLAN IDs. In this case, when a switching device receives an untagged packet, it searches
the MAC-VLAN table for a VLAN tag
ic a
i f
rt locations of users change, you do not need to re-configure
address of the packet.
 e
C improves the security of users and increases the flexibility of user
Advantages: When the physical

&
VLANs for the users. This
access.
g
n This mode is applicable to only a simple networking environment where the
i

a in changes.In addition, all members on the network must be pre-defined.


Disadvantages:

r
NIC seldom
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 VLAN IDs are allocated to packets received on an u according to the protocol (suite)
Hinterface
nVLAN IDs.
type and encapsulation format of the packets. The network administrator configures the
o
ti
mappings between types of protocols and

i a
c ised today.
f
This classification of VLANs is barely
ti

r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 When receiving an untagged packet, a switching u adds a VLAN tag to the packet
Hdevice
based on the IP address of the packet.
n
Advantages: Packets sent from specificio

a t network segments or IP addresses are transmitted


in specific VLANs. This decreases c
f i burden on the network administrator and facilitates
management.
r ti
Disadvantages: This modeeis applicable to the networking environment where users are

C
&
distributed in an orderly manner and multiple users are on the same network segment.

n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Hu switches to related switches.
VLAN information can be transmitted across multiple

All VLAN-3 data in the above figure can bencommunicated through intermediate transition
switches, so as the data of VLAN-5. io

a t
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The access link refers to the link between a hostH u a switch. Usually, hosts do not need to
and

n
know which VLAN they belong to, and the host hardware does not necessarily support
frames with VLAN tags. The frames thatothe host requires to send and receive are frames
a ti
fic port, which belongs to one VLAN. This port can not
that are not marked.

 The access link belongs to a t i


rfrom other VLAN, nor can it send packets to other VLAN
specific
e
C of different VLAN must be processed through layer 3 so that it
directly receive information

can be forwarded &


directly. The information

g to this port.
n links that can carry multiple VLAN data. Trunk links are usually used for
i

a in between switches or for connections between switches and routers.


Trunk links are

r
interconnection
T
 i a data frame is transmitted on a trunk link, the switch must identify the VLAN of the
edata
When

a w frame. IEEE 802.1Q defines the VLAN frame format, all the frames transmitted on the

Hu trunk link are tagged frames. Through these tags, the switch can determine which frames
belong to which VLAN.

 Unlike access links, the trunk links are used to carry VLAN data between different devices
(such as switches and routers, switches and switches), so the trunk links belong to no
specific VLAN. By configuring, the trunk link can carry all the VLAN data, or it can be
configured to transmit only the specified VLAN data.

 Although the trunk link does not belong to any specific VLAN, it can configure a PVID(port
VLAN ID). When there is untagged frame transmitting on the trunk link, the switch will add
PVID as VLAN tag to the frame, then handles it.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 The difference between the Hybrid port and theH u port is that the hybrid port allows
Trunk

n hybrid port and trunk port can not coexist.


multiple VLAN packets to be untagged, while the trunk port only allows the default VLAN
o
ti
packet to be untagged. On the same switch,

ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Hu1 is the default VLAN, which can neither
All the default ports belong to VLAN 1, and VLAN
be created nor deleted.
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu so they call VLAN-1 the default
All ports of 802.1Q based switches belong to VLAN-1,
VLAN.
n
Here is a new term called PVID, the fullio

a t name called Port VLAN ID, which represents the

f ic the value of PVID represents the VLAN that the port


VLAN of the port. In the Access port,

r ti that is, the port is divided into VLAN100.


belongs to, such as PVID = 100,

Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Trunk port is responsible for forwarding multiple u data frames between switches, use
HVLAN
n
command “port trunk allow-pass vlan [VID]” to allow the data frames with a specific VLAN
o
ti
to pass.

i a
c VLAN [VID]" to change the PVID value of the Trunk
f
Here is a command "port trunk PVID
i port PVID value is different from the Access port PVID.

port, and the meaning of thetTrunk


r
e a VLAN belongs to the port, but for Trunk port, it represents
C
For Access port, it represents

&
the default VLAN value.

n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The four byte 802.1Q tag header contains 2 byte u protocol identifier (TPID) and 2 byte
Hlabel
label control information (TCI).
o n
TPID (Tag Protocol Identifier) is a new itype

t
a 0x8100.
defined by IEEE, indicating that it is a frame with
802.1Q tag. TPID contains a fixedcvalue
i
f It contains the following elements:
tiframes.
TCI is a control informationrof
e the priority of the frame. There are 8 kinds of priorities, 0-

Cindicate
Priority: the 3 bits
& standard uses these three bits information.

7. The IEEE 802.1Q


g
n of Canonical Format Indicator (CFI):CFI set to 0 means it’s a standard
i
in and 1 means non-standard format.
 The value

a
r VLAN Identified (VLAN ID): This is a 12 bit domain, indicating the ID of VLAN, range
format
T
ei from 0 to 4095, a total of 4096, and the actual range is 1-4094. Each packet sent by

a w
Hu the switch supports the 802.1Q protocol will contain the domain to indicate which
VLAN belongs to.
 In an switched network environment, there are two formats of Ethernet frames: some
frames are not labeled with these four bytes, called untagged frame, and some frames are
added to the four bytes, called the tagged frame.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Access port receive frame Hu
n
If the frame is untagged, the port will add PVID, otherwise, frame will be discarded
o
ti

directly.

ic a
 Access port send frame
rt if

Ethernet frame. Ce
The 802.1Q tag header is stripped out, and the frame that been sent is an ordinary

&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Trunk port receive frame Hu
n
If the frame is untagged, add PVID. Otherwise, receive it.
o
ti

 Trunk port send frame


ic a

r tif strip TAG. Otherwise, send it.


If VLAN ID equals to PVID,

Ce
&
n g
i
a in
T r
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Reference answer: Hu
n
Based on port, based on MAC, based on protocol, based on subnet.
o
i and Access ports send packet without TAG.
1.

Trunk port sends packets withtTAG,


2.

ic a
i f
e rt
C
&
n g
i
a in
T r
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Routers provide a mechanism for interconnecting u
Hheterogeneous networks to transmit

ndestination address of the packet header, and


packets from one network to another. The router selects an appropriate path (a network
o
ti finally the packet will be sent to the destination
include one or more routers) based on the

ic a
then sends the packet to the next router,
i f
rt
host.
Routing is the path from e
Cwill forward packet according to the best route in the routing table.
 the source to the destination of a packet. When there’s multi-

&
routes available, routers

Depending on g

i n the destination of the routing, it can be divided into:


a in Routing: destination is a subnet


Subnet

T rHost Routing: destination is a host


i

eAccording
aw
 to whether the destination is directly connected to the router, it can be divided

Hu
into:

 Direct routing: the destination network is directly connected to the router.


 Indirect Routing: the destination network is not directly connected to the router.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu table. Each router has a routing table
The key of a router to forward packets is the routing

n next router that can reach the path. Packets


,and the route entries inside it will indicate which physical port should be used to send a
o
i
with a destination that do not existaintthe routing table will be discarded.
packet to the network or the host, or which

i f ic in the routing table:


e rt
The following key items are included

C
Destination: identify the destination address or destination network of IP packet.
& with the destination address, it identifies the address of a network
Mask: together
g

i
segment n where the destination host or router is located. The corresponding network
a in information can be obtained after doing “AND” operation to the destination
segment

T raddress and the network mask. The mask is composed of a number of continuous
ei "1", which can be expressed in dot decimal notation or in the continuous number of

a w "1" in the mask.

Hu  Interface: Indicate which interface will be used to forward the IP packet out of the
router.

 Next-Hop: Specify the interface address of the next router that the IP packet will go
through..
 We will introduce some other fields inside the routing table, such as priority, metric
and so on later.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Huindicates the source of the routing, that
There is a Protocol field in the routing table, which

n
is, how the route is generated. There are 3 main sources of routing:
o

a ti
Link layer protocol found routing (Direct)

i f ic no manual maintenance.
Small cost, simple configuration,
rtto local interfaces can only be found.

C e
The routing belonging

&
Manual configuration static routing (Static)

No cost, g

i n simple configuration, manual maintenance.

a infor simple network topologies.


Only
r discovered by dynamic routing protocol(RIP, OSPF, BGP, etc.)

T
ei High cost, complex configuration, no manual maintenance.
 Routing

aw

Hu
 Can be applied to complex network topologies.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 When forwarding data, routers need to select the Huoptimal route in the routing table. When
n
a data packet arrives at the router, the router extracts the destination IP address of the
packet, then looks up the routing table,o
i of a table item in the routing table. The "AND"
tfield
and performs "AND" operation of the packet's
a
icwith the Destination field of the routing table to see if it
destination IP address with the mask
i f
matches or not. After goingrt
operation result will be compared

longest mask. C e through all routing entries, the router will choose one with the

&entries to the network 10.1.1.0 exist with a next-hop of 20.1.1.2.


Forwardingito
g
In the example, two
nthe destination of 10.1.1.1 will result in the longest match principle being
n which the network address 10.1.1.0/30 provides the longest match.
applied, ifor
r a
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 A routing table may contain the routes originatingHufrom multiple protocols to a given
n to the same destination are equal, a
destination. Not all routing protocols are considered equal, and where the longest match
o
ti routing protocol (including static routes) will take
for multiple routes of differing routing protocols

ic
decision must be made regarding which a
i f
rtdifferent requirements for priority of various routing protocols.
precedence.
 e
C Quidway router is shown in the table:
Different manufacturers have

&
The default priority of HUAWEI

n g
The smaller the value, the higher the preference.
i

n to direct routing, the preference of all dynamic routing protocols can be


In iaddition
a

T rmanually configured according to user needs. In addition, the priority of each static
ei route can be different.
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Where the route is unable to be distinguished by u a longest match value or preference,
Heither
n
the cost metric is taken as the decision maker in identifying the route that should be
o
ti
installed in the routing table.

Metric represents the length of a c


i a
f
path to a destination network. Usually, the following
i

factors will affect the routingtmetric.


r
e load, communication overhead, line reliability, hop count and

C
Line delay, bandwidth,
&
maximum transmission unit.
g
n refers to the number of routers that arrive at the destination.
i
Hop count
in refers to the capacity of the link, and the high speed link with low cost.


a
rThe smaller the Metric value, the more priority the routing is.
Bandwidth

i T
eDifferent

aw dynamic routing protocols choose one or more of these factors to calculate the

Hu metric. The metric is only meaningful in the same routing protocol, and the routing metric
between different routing protocols is not comparable and there is no conversion
relationship.

 The OSPF protocol calculate the cost based on bandwidth, so the route with the
Metric=1+1=2 is the optimal route to the destination, and its table item can be found in the
routing table.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 After receiving a packet, the router will check its u
Hdestination IP address and then check the

nnext-hop information indicated by the table item.


routing table. After finding out the matching routing item, the router will forward the
o
ti
packet according to the interface and the

ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 There are many ways to classify routes. There are u sources of routing, Therefore, if
Hthree
n
classify routes according to the source, it can be divided into:
o
Direct routes: Small cost, simpleiconfiguration,

a t routes belong to local interfaces can

ic
if configuration, manual maintenance. When topology
only be found.

r tsimple
Ce won’t change. Only for simple network topologies.
 Static routes: No cost,
changes, static routes
& High cost, complex configuration, no manual maintenance. Can be
Dynamic routes:
g

appliednto complex network topologies. When topology changes, dynamic routes can
i ni
a
change.

T r
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu can be divided into:
According to the application area, routing protocols

IGP(Interior Gateway Protocol):The n routing protocol used to exchange routing


ioIGP. Common protocols such as RIP, OSPF and ISIS

t
information inside AS is called the
belong to IGP protocol. ca
ifi
EGP(Exterior GatewayrtProtocol): The routing protocol used to exchange routing
Ce AS is called the EGP. BGP belongs to the EGP.

information between
& used, the routing protocol can be divided into:
According to the algorithm
g

i n
n
Distance-Vector protocol:include RIP and BGP. BGP is also called Path-Vector
i

r a
protocol.

i T Link-State protocol:include OSPF and IS-IS.


e The main difference between these two algorithms is the method of discovering

a w 

Hu routes and calculating routes: distance vector protocols pay attention to the number
of hops to the destination (the number of forwarding), link state protocol concerns
the topology of the network, and the link resources like bandwidth.

 What is the meaning of the autonomous system(AS) mentioned here?


n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hupolicies and run in a single management
An AS is a set of routers that share similar routing

n routing protocols but belong to the same


domain. An AS can be a set of routers that run a single IGP (internal Gateway Protocol)
o
ti world regards the whole Autonomous System as
protocol, or a set of routers that run different

ic a
organization. In either cases, the outside
i f
rt
an entity.
 Each Autonomous System e
C Its basic idea is to distinguish different AS by different numbers.
has a unique AS number, which is assigned by the Internet

In this way, when &


authorized authority IANA.

g the network administrator does not want his communication data to


nan AS, this numbering method is very useful. For example, the network
pass throughi
a in network can be fully accessible to an AS, but it may be managed by a
administrator's
T r or lack sufficient security mechanism, it should be avoided. By using routing
competitor
i
eprotocols and AS numbers, routers can determine the path and routing information

a w exchange methods.

Hu  The numbering range of AS is 1 to 65535, of which 1 to 65411 are registered Internet


numbers, and 65412 to 65535 are dedicated network numbers.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 According to the working area, routing protocols u be divided into IGP and EGP:
Hcan
IGP(Interior Gateway Protocols): thenmain purpose of IGP is to discover and calculate
io

t
routing information within an AS.
a mainly use routing policy and routing filtering to
ic
tif exchange between AS.
 EGP(Exterior Gateway Protocols):
r
Ce
control routing information

&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 A static route is a special route that is manuallyH u by a network administrator.
configured

n
The disadvantage of static routes is that they cannot adapt to the change in a network
io manual reconfiguration.

automatically, so network changes require


a t
Static routes are fit for networksic

f for a network with a complex structure. Static routes
tiroutes
with comparatively simple structures. It is not advisable to
r
e of bandwidth and CPU resource consumption that occurs
configure and maintain static
C
do however reduce the effect
&
when other protocols are implemented.

n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Static routing can be applied to serial networksH oruEthernet, but configuration is different in
these two networks.
o n
t i
ip route-static ip-address { mask | mask-length } interface-type interface-number [ nexthop-
aspecifies a network or a host address, the parameter

ic
f mask length. The last part specifies the next-hop or out-
address ]. The parameter IP-address
mask specifies a subnet masktior
e r
C
interface.

&
When configuring static routing in a serial network, you can specify only the next-hop
address (such as g
n0/0/2) to configure the out-interface. In HUAWEI ARG3 series routers, the
10.0.12.1), or only use parameters interface-type and interface-number
i
in encapsulates the PPP protocol by default. For this type of interface, the
(such as Serial
a
r address of static routing is the address to the end interface connected to the
serial interface
T
i
next-hop
einterface,
a w so it’s OK to use the interface only when configuring static routing in a serial

Hu network.

 So, what about the configuration on Ethernet ?


n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 When configuring static routing on a broadcastH u the next-hop address must be
interface,

nstatic routing, the router can not forward the


specified explicitly. The network in Ethernet may be connected to multiple routers. If only
o
tiexample, RTA needs to forward the data to the
an interface is specified when configuring
a
ic configuring static routing, you need to specify that the
message to the right next-hop. In this
i f
rt otherwise RTA will not be able to forward the message to
192.168.2.0/24 network, and when

e
next-hop address is 10.0.123.2,
C connected by RTB, because RTA does not know wether RTB
the 192.168.2.0/24 network
or RTC can reach the& destination.
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 When there is no table item in the routing tableH u with the destination address of
matching

n address of the default route is 0.0.0.0 and the


the packet, the device can choose the default route as the forwarding path of the packet.
o
ti
In the routing table, the destination network
mask is also 0.0.0.0. a
ic route to forward packet to an unknown destination
i f

e rtof the default static routing is also 60. In the routing process,
In this example, RTA uses a default

Cfinally matched.
address. The default priority

&
the default route will be

n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 After configuring the default route, you can useH u “display IP routing-table” command to
the
see the details of the routes.
o n
t i
In this example, all packet with the destination address that does not match the routing
ahop address 10.0.12.2 through the GigabitEthernet

ic
tif
table will be forwarded to the next
0/0/1 interface.
r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 VLAN isolated two broadcast domains, and alsoH u isolated layer 2 traffic between
strictly

n
VLAN. Users belonging to different VLAN could not manage Layer 2 communication.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 One way to solve the problem of communication u VLAN is to use layer three
Hbetween
switch:
o n
t i
The Vlanif interface is configured as a gateway on the L3 switch to achieve inter VLAN
aon the network, you need to configure a Vlanif interface

ic
if IP address for each Vlanif interface. The default gateway
routing. If there are multiple VLAN
for each VLAN and configuretan
r
e of the Vlanif interface in the L3 switch. Meanwhile, when
C
set by user PC is the IP address

& the route to the non-direct network segment, which can use the
check the IP routing table of the switch, Only the direct route can be found, so it is

g
necessary to establish
n
i
static routing.

a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Huwhere default routing is used, and the
Static routing is configured on both SWA and SWB,

n
next-hop address respectively points to Vlanif5:10.1.12.2 of SWB and Vlanif5:10.1.12.1 of
o
ti
SWA.

ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Answer: Hu
n
When the routers choose the optimal routing, they will firstly based on the longest
o
ti
1.

mask matching principle; if the length of the mask is consistent, the priority of the

ic a
if
routing protocol is compared; if the priority is the same, then the metric value is

rt
compared. If the metric value is the same, multiple equal routes will achieve load-
e
C
balancing.
2.
&
When configuring the default route, the destination network address is 0.0.0.0,

n g
which represents any network.
i
a in
T r
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Currently, there are many organizations working HonuDSL standards. The most important
n
organizations are the American National Standards Institute (ANSI), the European
Telecommunications Standards Instituteo(ETSI), and the International Telecommunication
a ti is responsible for network interfaces, power, and
ic group is responsible for the standardization of DSL
Union (ITU). In ANSI, the T1E1 committee
i f
rt is responsible for DSL access standards.
protection, and the T1E1.4 working

e
access. In ETSI, the TM6 workgroup
C standard organizations, while ITU is a global standard
& the ITU defines the following DSL standards:
 ANSI and ETSI are regional

g
organization. Currently,
n first generation HDSL standard
i

a in
G.991.1

T rG.991.2 second generation HDSL standard (HDSL2 or SDSL)

ei G.992.1 full-rate ADSL standard (G.dmt)


w

u a  G.992.2 ADSL standard without splitter (G.lite)


H  G.993 is reserved future VDSL standard
 G.994.1 DSL handshake process (G.hs)

 G.995.1 DSL overview

 G.996.1 DSL test process (G.test)


 G.997.1 DSL physical layer maintenance tool (G.oam)
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 G.991.1 first generation HDSL standard Hu
n
G.991.2 second generation HDSL standard (HDSL2 or SDSL)
o
ti


a
G.992.1 full-rate ADSL standard (G.dmt)
c (G.lite)
isplitter
i f
rt standard
 G.992.2 ADSL standard without

C e
G.993 is reserved future VDSL

& process (G.hs)
G.994.1 DSL handshake

G.995.1 DSLn g

i overview
n test process (G.test)
a iDSL

T r
G.996.1

ei
 G.997.1 DSL physical layer maintenance tool (G.oam)

a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Huis a formal standard released by ITU-T
In ITU-T, the standard numbering is G.993.2, which

n
in May 2005. To launch the VDSL2 standard, ITU formulated the RFC3728 MIB standard in
o
ti
October 2004.

ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu rates in the upstream and
ADSL is a DSL technology with asymmetric transmission

n transmission refers to the transmission from


downstream directions. Here, upstream transmission refers to the transmission from the
o
the central office to the user side. at
i
user side to the central office, and downstream

i f ic rate can reach up to 8 Mbps but the maximum


e rist640 Kbps. The downstream rate is far greater than the


The ADSL downstream transmission

C
upstream transmission rate

&
upstream rate.

n g
The ADSL technology can transmit data signals and traditional analog voice signals at the
i

n
aai widely used access technology because of its technical features and ease of use.
same time on the same twisted pair.
ADSLris

i T
e Firstly, asymmetric transmission of ADSL is of special significance. On one hand, in
w

u a many DSL applications, users usually obtain a large amount of data from the

H backbone network, but transmit far less data to the backbone network. For example,
when a user accesses the Internet and video on demand (VoD) services, a large
amount of data needs to be downloaded at a high rate, but only some addresses and
simple commands is sent to the backbone network. On the other hand, asymmetric
transmission can greatly reduce near-end crosstalk.

 Secondly, compared with other DSL technologies, ADSL makes it possible to provide
traditional voice services in the same twisted pair at the same time. In this way, the
cost of cable routing is saved.
 In October 1998, the ITU officially released the recommended ADSL standards. G.992.1
and G.992.2.
 G.992.1 is also called G.dmt. It defines the full rate ADSL technical specifications. The
maximum downstream transmission rate is 6.144 Mbps and the maximum upstream
transmission rate is 640 Kbps.
 G.992.2 is also called G.lite. It defines the ADSL technical specifications without using
signal splitters. In this type of ADSL system, no splitter is required, which reduces the
n
complexity and cost of device installation but brings about the side effect of reduced it o
signal rates. The maximum downstream rate is 1.536 Mbps and the maximum
ic a
if
rt
upstream rate is 512 Kbps.

Ce
&
ing
a in
Tr
ei
a w
Hu
o n
ati
ic
r t if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 This is the structure of an ADSL system complying Huwith the G.dmt standard. The ATU-R
n
refers to the modem at the ADSL subscriber side. The ADSL transmission rate is high
enough to support a home network or o
ti the ATU-R converts the data into signals that can
a small office LAN. The data sent from a PC first
enters the home or office network.a
icline. To transmit data and voice signals on the same
Then
i f
t the ATU-R and telephone are connected to the POTS
be transmitted on the telephone
telephone line at the same rtime,
splitter, and the hybridC
e
transmission of data and voice signals on one twisted pair is
& frequency bands.
implemented in different
g
nat a CO, mixed voice and data signals are separated by a splitter at the CO
i
After arriving
insignals are transmitted through the telephone network, and data signals are

a
side. Voice
r through the high-speed data network. ATU-C refers to the ADSL CO modem.
T
transmitted
eAti the CO side, each subscriber has an independent splitter connected to the ATU-C.
a w Therefore, a DSL network uses point-to-point private line transmission. After passing

Hu through the ATU-C, data is sent to the DSL access multiplexer (DSLAM) which aggregates
multiple subscriber lines to transmit data streams at a higher rate. The DSLAM connects to
the backbone network through high-speed network interfaces such as ATM or STM, and
sends data to servers of network service providers through the high-speed data network.
Currently, DSLAM devices are generally bound to ATU-C devices.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu side to separate data and the
In the G.dmt standard, a splitter is used at the subscriber

n installing a splitter can be very complicated.


voice signals by frequency to ensure that the two different types of signals can be
o
ttoi install and commission the splitter, and the
transmitted in the same twisted pair. However,

ic
Experienced technicians are required a
telephone lines may need to befreconstructed
ADSL can be used without r t i to some extent. Therefore, it is hoped that

implement ADSL with no


e splitter. The G.lite standard is therefore formulated to
C splitter.
& part shows the ADSL system structure in the G.dmt standard, and

g
In this figure, the upper
n shows the ADSL system structure in the G.lite standard. The difference is
i
the lower part

a inADSL has no splitter, out-band signals become interference noise signals, and
that G.lite
T
data rand voice transmission interfere with each other. Due to the influence of the
i
einterference, the transmission rate of the G.lite is much lower than that of the G.dmt. In the

a w ITU G.dmt standard, the maximum downstream and upstream transmission rates are 6.144

Hu Mbps and 640 Kbps respectively. In the G.lite standard, the maximum downstream and
upstream transmission rates are 1.536 Mbps and 512 Kbps respectively. It can be seen that
the downstream transmission rate of the G.lite ADSL is greatly reduced.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 QAM modulation uses a sine and cosine wavesH u the same frequency component to
with

n
transmit information. All waves pass through a single channel at the same time. The
amplitude of each waveform (includingo
tito QAM but has no carrier signal.
direction) represents a binary bit stream to be

ic
transmitted. CAP modulation is similara
t i f
 DMT combines QAM and FDM
line encoding adopts thee
r technologies. In 1995, ANSI T1.413 stipulates that ADSL

C
DMT technology.

&
The DMT modulation and encoding technology improves the frequency utilization and can
transmit signalsgwith higher bit rates in a limited frequency band. It divides the entire
channel intoin
i n a maximum of 256 4.3125 kHz subcarriers, and implements 256-point

r a encoding in each discrete subcarrier according to the respective signal-to-


constellation

i T ratio (SNR). In this way, one symbol in each subcarrier may represent 4 to 8 bits,
noise
egreatly improving the spectrum utilization and enabling a higher ADSL transmission rate.
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 In ADSL, data and voice must be transmitted onH u frequency bands. ADSL uses a
separate

nto separate the data from voice by frequency


frequency band higher than 30 kHz, whereas common voice signals are in a frequency
o
ti
band lower than 4 kHz. Splitters are used
a
fic
band.


r i
A splitter consists of a 3-porttlow-pass/high-pass filter group. The low-pass filter can filter
allows only low-frequency
C evoice signals to pass and suppresses the interference from data
& voice signals. The voice and data signals are filtered by a splitter at
signals. The high-pass filter allows only high-frequency data signals to pass and suppresses

g
the interference from
nside and then transmitted on the same twisted pair in different frequency
i
the subscriber

a in subscriber-side splitter maps a CO-side splitter which separates the voice/data


bands. Each
T
mixedr signals transmitted on the twisted pair. A CO-side splitter also consists of a 3-port
i
elow-pass/high-pass filter group in which the high-pass filter separates data signals while the

a w low-pass filter separates voice signals. After separation, voice signals are transmitted

Hu through the PSTN network, and data signals are transmitted through a dedicated high-
speed data exchange network. In this way, data transmission is not restricted by the PSTN
system, and can reach a rate much greater than 64 Kbps.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The setting of interleaver parameters has a huge u on the performance of the ADSL
Himpact
n using a typical interleaving mode as an
service. To facilitate the understanding of interleaving parameters, we introduce the
o
ti
working principles of an interleaver in detail
example. a
icprocesses data at the transmit end. The elements 1, 2, 3,
i f

e rt come out from a forward error correction (FEC) encoder,


First, let's see how an interleaver

C with 3 rows and 7 columns row by row. After the matrix is full,
4, 5, 6..., and 21 to be transmitted

elements are sent &


and are stored in a matrix

g to the channel column by column. This is the interleaving process of an


nthe receive end, how does the interleaver de-interleave and restore the
interleaver. iAt

a in stream? The receive end writes the received data column by column to a
original data
T
matrixr with the same size. After the matrix is full, the receive end reads the data row by
i restores the original data, and sends the data to the FEC for decoding. This is the de-
erow,
a w interleaving process of an interleaver.

Hu
 So, what is the benefit of an interleaver for processing burst errors? Let's look at this
example.

 The sequence of the elements to be sent is 1, 2, 3, 4, 5, 6..., and21. Assuming that a


burst interference with a length of 3 occurs during transmission and corrupts 3
consecutive bits, the elements reaching the receive end become 1, 2, x, x, x, 6, 7, 8,
9, 10..., and 21 if no interleaving is performed. Three consecutive errors in the
received bit stream can result in an FEC failure.
n
 If interleaving is performed, the sequence of elements reaching the transmit end
it o
becomes 1, 8, 15, 2, 9, 16, 3, 10, 17, 4, 11, 18, 5, 12, 19, 6, 13, 19, 7, 14, and 21.
ic a
After interleaving, if 3 consecutive bit errors occur and elements 15, 2, and 9 are if
rt

e
is 1, x, 3, 4, 5, 6, 7, 8, x, 10, 11, 12, 13, 14, x, 16, 17, 18, 19, 20, and 21. C
affected, the sequence of elements received by the receive end after de-interleaving

&
It can be

ng
seen that consecutive burst errors are separated into 3 non-consecutive errors by the
interleaver. In this way, these errors can be corrected through FEC. i
n of matrix rows
a inumber
 In this example, FEC can correct burst errors no longer than 3. The
is the interleaver depth D (3 in this example), and the numberT
r
einumber of FEC codes.
of matrix columns is
interleaver span N (7 in this example) which is equal to the
a w

u
An actual interleaver usually has larger D and N parameters. Assuming that the FEC
H a D x N interleaver matrix can correct
sequence with N codes can correct B burst errors,
burst errors with a maximum length of B xnD. It can be seen that interleaving enhances the
o system stability, but interleaving causes a
anti-interference capability and bringstibetter

ic a whether to use interleaving and how to set


if be determined based on service requirements.
delay. In actual application scenarios,
interleaving parameters needtto
r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The number of available sub-carriers mentionedH u depends on the result of channel
above

n
analysis during the initialization of the ADSL system. This part describes the process of ADSL
o
ti
initialization in detail.
a
The purpose of ADSL initializationcis to test the performance of the actual channel,
i fi

r t
coordinate the transmission configurations between the ATU-C and ATU-R (such as the
upstream and downstream
C e bandwidths and the number of sub-bands), and exchange
&
various parameters to establish a usable communication link before the ATU-C and ATU-R
start working.
g
n process can be triggered by either the ATU-R or ATU-C.
i

a in
The initialization

T r
In initialization triggered by the ATU-C, the ATU-C sends an activation request and waits for
i response from the ATU-R upon system power-on, signals loss, or self-check completion.
eaThe
a w ATU-C performs this process for a maximum of 2 times. If the ATU-R does not respond,

Hu the ATU-C waits for the ATU-R to send an activation request or waits for the network to
send a retrial instruction.

 In initialization triggered by the ATU-R, the ATU-R sends activation requests continuously
upon power-on or self-check completion to start initialization.
 The ADSL initialization process can be divided into four steps: activation request and
acknowledgment, transceiver training, channel analysis, and parameter exchange.
 In activation request and acknowledgment step, necessary handshake communication is
performed to prepare for the initialization. Generally, initialization is triggered upon system
power-on, signals loss, or self-check completion. In this step, the ATU-R and ATU-C
transceivers are enabled and starts initialization handshake, complying with the G.hs
protocol mentioned above.

 By means of transceiver training and channel analysis, the transceiver can determine the
characteristics of signal transmission and related transmission parameters.
n
 During parameter exchange, a local receiver exchanges its parameters with a remote
it o
transmitter to match the sending and receiving processes. The parameters to be exchanged
ic a
if
rt
include the number of bits modulated by each DMT subcarrier, transmission rate, and so on.

Ce
To ensure optimal system performance, all parameters are determined based on transceiver
training and channel analysis.
&
ng
 After the initialization is complete, the system enters the normal working state.
i
a in
Tr
ei
a w
Hu
o n
ati
ic
r t if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The ADSL2 standard adopts an enhanced modulation Hu mode, which can better reduce the
n bits with an overhead rate of 4–32 Kbps
impact of line noise on signals, obtain higher line encoding gain, and increase the
o
tati 32 Kbps. It can be considered that ADSL2
connection rate. ADSL2 uses variable overhead
a
ic transmission distance by 200 m compared with ADSL
while the ADSL overhead rate is fixed
increases the speed by 50 Kbpsfand
(6% greater coverage area).rt
i
C e
mode to be tested&
 The ADSL2 standard requires the line noise and signal attenuation of each carrier in DMT

also requiresin
g to determine whether ADSL services can be provisioned on the line. It
real-time monitoring over ADSL connections.

a instandard implements traffic-based power control. When a large amount of data


T r to be transmitted, for example, during large file download, the line power increases
The ADSL2

etoi the standard ADSL power level L0. When a small amount of data or no data needs to be
needs

a w
Hu transmitted, for example, during web pages browsing, the power decreases to L2 and L3
specified in the ADSL2 power levels. Decreasing the line power can effectively reduce the
crosstalk between line pairs.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 1. New running modes are added.
Hu

o n
There are 3 ADSL running modes: ADSL over POTS (ADSL annex A in which the POTS

ti
service exists on the same line pair), ADSL over ISDN (ADSL annex B in which the POTS

ic a
service exists on the same line pair), and ADSL annex C (ADSL in the TCM-ISDN crosstalk

if
environment, which is mainly used in Japan). In addition to the preceding 3 modes, the

rt
following modes are added to the ADSL2/ADSL plus:

Ce
Annex I which specifies a full digital mode with a spectrum compatible with that in annex A
(ADSL over POTS). In this mode, there is no POTS service on the line, the upstream
&
spectrum is 3–138 kHz, the number of sub-bands is 31, and the upstream bandwidth is

ng
greater than 1 Mbps.

i ni
Annex J which specifies a full-digital mode with a spectrum compatible with that in annex B
a

r
(ADSL over ISDN). In this mode, there is no ISDN service on the line (used when ADSL over
T
ei
ISDN coexists), the upstream frequency band is extended to 3–276 kHz, a maximum of 64
upstream sub-bands are supported, and the maximum upstream rate reaches 2.3 Mbps.

aw Annex M which extends the upstream bandwidth of ADSL over POTS. In this mode, the

Hu

number of upstream sub-bands starts from 6, and increases to 32, 36, 40, 44,...to 63
depending on the bandwidth requirement. In this way, with the same total transmit power,
Annex M achieves the upstream transmission rate of Annex J, and achieves the
downstream transmission rate of Annex B in overlap and non-overlap modes.
 Annex L (READSL2) which extends the transmission distance.
 In addition, the ADSL standard supports only STM (such as PCM interface) and ATM
(UTOPIA) interfaces, while ADSL2/ADSL plus also provides PTM (packet) interfaces to carry
HDLC on ADSL in non-ATM transmission mode.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 3. Longer transmission distance
Hu

o n
ADSL2/ADSL plus supports a transmission distance no less than 6.5 km at rates of

ti
192 Kbps/96 Kbps.

c a
ADSL2 supports the 1-bit constellation while ADSL supports a minimum constellation
i
of 2 bits.
r tif

Ce
ADSL2 annex L adopts new spectrum division. When the distance exceeds 4 km, the
sub-bands above tone 128 are turned off, and the transmit power of sub-bands with
&
lower tones are increased to extend the transmission distance.

i ng
The frame overhead can be flexibly configured to provide a 28 Kbps bandwidth,

n
which is very important in long-distance transmission.
i
r a tone ordering
The and pilot tones determined by a receiver can reduce the
T

ei
probability of activation failures due to ADSL pilot tones with an excessively low SNR.
In addition, the 2 bits on the pilot tones can increase the bandwidth by 8 Kbps.

a w 4. Lower power consumption


u

H  The noise margin is reduced by reducing the transmit power. In this way,
unnecessary power consumption is saved while the system stability is ensured.
 The new low-power mode L2 reduces the transmit power to 30% of the normal
power when no data is transmitted. In L2 mode, the power is sufficient for
transmitting only necessary management messages and synchronization signals (for
example, 1-bit constellation). The power can be quickly restored when subscriber
data is transmitted.
 The CO and CPE of the ADSL2/ADSL plus provide the power cut back function in the
range of 0–40 dB to effectively reduce the transmit power during normal operation.
(In an ADSL system, only the CO has this function in the range of 0–12 dB.)
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu
5. More stable running and better spectrum compatibility

n
The receiver determines the tone ordering based on the channel analysis result and
o making ADSL connections more stable.
selects the best tone as the pilotitone,

t
atraining. The receive end tests the RF interference (RFI)
Tones are disabled during ithec
tif RFI and reduce the crosstalk to other line pairs.

signal distribution to ravoid

Excellent dynamic
e
Cadaptability: The enhanced bit swap dynamically changes the line
&

rate.

Powerin
g
n
cutback to a maximum of 40 dB in the receiver and transmitter reduces the
i

r a
near-end echo and crosstalk.

i T The receiver determines the pilot tone to prevent activation failures caused by line
e bridge connectors or AM interference.

a w
Hu  The training process is shortened to quickly recover connection synchronization from
errors.
 6. Line diagnosis function

 Supports the dual-end test function. The CO and CPE can be trained, and line
parameters can be obtained through a dedicated line test process.

 7. Dynamic rate adaptation

 The Seamless Rate Adaptive (SRA) technology is used to resolve crosstalk and AM
interference, and adjust the connection rate without being perceived by subscribers
to adapt to environment changes.
 8. Rate binding
 To provide different QoSs for different customers, ADSL2 adopts the IMA technology
to bind two or more copper wires as an ADSL connection, which can flexibly increase
the access rate.
 9. Better interoperability
 The ADSL2/ADSL plus divides the ADSL transceiver into multiple sub-layers according
n
it o
to functions.

 Transmission protocol convergence sublayer (TPS-TC)


ic a
if
rt
 Physical medium convergence sublayer (PMS-TC)
 Physical medium sublayer (PMD)
Ce
Management protocol convergence sublayer (MPS-TC) for network &
ng

management interfaces
i
a in
Each sublayer is encapsulated and messages between sub-layers are defined. In this
Tr

way, devices from different vendors can communicate with each other.
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The preceding two types of DSL technologies, ADSLHu and SHDSL, have a maximum
n
transmission rate of 8 Mbps. VDSL which is short for very high speed digital subscriber line
is a new generation of high-speed DSL o
ti
technology.

i a
c rate of 52 Mbps on common twisted pairs. It
f
VDSL can reach a maximum transmission
provides various transmissiontirates and multiple working modes, including symmetric and

asymmetric transmission,e
r
C is high, the twisted pairs used in VDSL are shorter, usually from
to meet the requirements of different customers. Because the

&length of the twisted pairs is inversely proportional to the transmission


transmission rate of VDSL
300 m to 1 km. The
n g
rate. i
a inwith ADSL, VDSL uses a higher frequency band than PSTN and ISDN frequencies

onT
r
Compared

easi well as ISDN services. VDSL also uses passive filters as signal splitters to support voice
twisted pairs. Therefore, VDSL is compatible with existing traditional telephone services

a w
Hu and ISDN transmission. The basic working principles of VDSL are similar to that of ADSL.

 VDSL is a video and data transmission technology over the voice frequency band. It
provides multiple working modes and can transmit data at a high rate within a short
distance. This technology enables telecom operators to use existing twisted pairs to
transmit broadband services, such as VoD and high-speed Internet access.
 Currently, the internationally recognized VDSL system complies with the American standard
formulated by T1E1.4 and European standard formulated by of ESTI TM6. Both standards
adopt the G.998 standard and DMT/CAP modulation modes. The difference is that the
American standard adopts the G.998 standard for baseband planning to provide a highest
rate of 22 Mbps, while the European standard adopts the G.998 standard for baseband
planning to provide a highest rate of 14 Mbps.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Although the transmission rate of VDSL is high,H theutransmission distance is far less than
n channel characteristics, but the length of
that of ADSL. This is because high-speed transmission requires complex modulation modes,
o
ti on channel performances.
dense constellation encoding, and outstanding
transmission lines can pose negativea
icthe ITU divides VDSL transmission capabilities into long-,
impacts
i f

e rttransmissions in asymmetric and symmetric transmission


At the early stage of VDSL design,

C
medium-, and short-distance

&
modes.

n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 This is the reference model of the VDSL system.H u modules include VDSL devices at the
Basic

n
CO and subscriber sides. Devices at both sides are connected by twisted pairs through their
own splitters. The other end of the CO o
ttoi a network device or a small LAN.
device is connected to an ONU, and the other end
a
ic unit at the ONU, and has the same function as the CO-
of the subscriber device is connected
i f

e rtVTU-R is short for VDSL transceiver unit at the remote, and


VTU-O is short for VDSL transceiver

has the same function C


side modem ATU-C in ADSL.

&
as the subscriber-side modem ATU-R in ADSL.

n g defined by applications: Different data interfaces are used to aggregate


Network interfaces
i

in as required. Data flows are sent to the lower layer for framing. At the same
data from upper-layer protocols to form unified data flows to be transmitted in fast and
a
rapplication independent data frames from the lower layer are split and used by
slow channels
T
i
time,
edifferent
a w application interfaces and protocols.

Hu  In VDSL, a splitter similar to that in ADSL is used to separate data signals from traditional
voice/ISDN signals.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 VDSL2 can provide a higher bandwidth within 1H u (the theoretical rate can reach 100
km

nand support abundant services. However, VDSL2


Mbps), and has become the mainstream access mode of the last mile in an FTTx network. It
o
ti in serious crosstalk between lines. As a result, the
makes high-speed Internet access possible
a
ic decreases significantly compared with that of
occupies a high frequency band, resulting
i f
single-wire interconnection.rt
bandwidth of multi-wire interconnection

C e
& diagram of the two types of crosstalk.
 VDSL2 crosstalk is classified into near-end crosstalk (NEXT) and far-end crosstalk (FEXT).

g
Figure 1 shows a schematic
n signals in a line pair are coupled and sent back to a near-end receiver. For
i

a in in bundles of line pairs, the upstream transmission of one line pair interferes
In NEXT,

T rwith the downstream transmission of another line pair.


example,

ei In NEXT, signals in a line pair are coupled and sent to a far-end receiver. For example,
a w 

Hu in bundles of line pairs, the upstream transmission of one line pair interferes with the
upstream transmission of another line pair.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu (FDM), signals sent in the
Because VDSL2 adopts frequency division multiplexing

n
interference line pair and signals received by interfered line pair in NEXT occupy different
frequency bands. Therefore, the impacto
ti
of the NEXT can be eliminated or greatly reduced
a
fic line pair and signals received by interfered line
by using a filter.

 i
However, signals sent in the tinterference
r frequency band. Therefore, FEXT cannot be eliminated by
e
C VDSL2 transmits data within a short distance (generally no longer
pair in FEXT occupy the same

&frequency band (up to 30 MHz), resulting in more serious FEXT


using a filter. In addition,

g
than 1 km) at a high
n other DSL technologies. Therefore, FEXT becomes the main factor affecting
compared withi
a in of a VDSL2 system. FEXT decreases the SNR, reduces the line transmission
the performance
T
rate, rincreases the bit error rate (BER), and even causes offline errors, severely affecting
i stability and user experience.
esystem
a w
Hu  To eradicate the impact of FEXT on VDSL2, the ITU-T proposed the vectoring standard to
resolve FEXT on VDSL2 lines and improve the multi-wire performance. In this standard, the
crosstalk of one VDSL line is a vector in a set of crosstalk vectors for all other lines in the
same bundle. The vectoring processing system performs matrix calculation based on the
collected vector information and outputs vectorized crosstalk cancellation signals.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 FTTD: fiber to the door Hu
Reverse power supply, 1-8 lines
o n
FTTDp: fiber to the Distribution pointti

ic a

r tif lines
Reverse power supply, 8-16
FTTB: fiber to the buildinge

C
Local/remote & supply, 16-48 lines
power
gthe following scenarios:

G.fast appliesnto
i
in FTTDp, and FTTB where the fiber length to end subscribers is usually less than


a
r200 m
FTTD,
T
ei The twisted pair at the drop cable section can be reused to avoid complex fiber
aw

Hu
routing and greatly reduce the network deployment cost.

 Provides services for generally no more than 50 subscribers.


 Device installation is complex, and onsite power supply is difficult to acquire,
requiring low power consumption devices to support some special power modes,
such as remote power supply or PoE.

 The installation environment, such as electric poles, corridors, and manholes,


demands high environment adaptability and less maintenance. Generally, remote
maintenance needs to be supported.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Currently, the ADSL2+ uses the highest frequency of 2.2
H uMHz to provide a maximum downstream
n must use a higher frequency band to provide
rate of 26 Mbps, while VDSL2 uses the highest frequency of 30 MHz to provide a maximum

o
tispectrum resources must be expanded. In the initial phase,
downstream rate of 100 Mbps. The G.fast technology

i a
a higher access rate. Therefore, the G.fast
c and can be extended to 212 MHz.
f
tifrequency division duplex (FDD) technology which uses different
the highest G.fast frequency is106 MHz,

r
frequency bands to transmitedata downstream and upstream at the same time. The disadvantage is
 ADSL/2/2+ and VDSL2 adopt the

C
& and severely affects the performance of the receiver. In this case, the hybrid
that transmit signals generate echo which enters the receiver. When the frequency band is high, the
g
nbe used for echo suppression. G.fast does not distinguish the upstream and
impact is more obvious,
circuit needs ito

a in frequency bands, and transmits data in the full frequency band in TDM mode in both
r TDD allocates different timeslots for upstream and downstream data transmission. The
downstream

T
directions.
i
etransceiver sends and receives signals in different slots.

a w
u
 As the frequency band width and number of subcarriers increase, the corresponding physical layers

H become more complex. To reduce complexity, the subcarrier spacing needs to be increased to
reduce the number of subcarriers. To be compatible with the traditional DSL technology, the Giga
DSL adopts a subcarrier spacing which is an integer multiple of 4.3125 kHz, where 4.3125 kHz is a
subcarrier spacing used in traditional ADSL/2/2+/VDSL2 8a/12a/17a standards.

 During the upgrade from ADSL/VDSL2 to G.fast, some subscribers may want to retain the existing
DSL services. To ensure smooth network upgrade, G.fast devices also support traditional
VDSL2/ADSL.

 Similar to VDSL2, the G.fast performance is also affected by crosstalk between lines. If the vectoring
technology is not used, the G.fast rate will decrease severely.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Reference answer: Hu
1. ABCD
o n
2. C
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 GPON: gigabit-capable passive optical networkHu

o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 P2MP: point to multiple point Hu
POS: passive optical splitter
o n
ti

ic a
r tif
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 FTTC: fiber to the curb Hu
FTTB: fiber to the building
o n
ti

 FTTH: fiber to the home


ic a
r tif
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 WDM: wavelength division multiplexing Hu
TDMA: time division multiple access
o n
ti

ic a
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Basic concepts of GPON Hu
n
The GPON encapsulation mode (GEM) frame is the smallest service bearing unit in the
o
ti

GPON technology and is the most basic encapsulation structure. All services are

ic a
if
encapsulated in GEM frames for transmission on the GPON line and are identified by GEM

r t
ports. Each GEM port is identified by a unique Port-ID, which is globally allocated by the

Ce
OLT. That is, each ONU/ONT of the OLT cannot use the GEM ports with the same Port-ID.

&
A GEM port identifies the service virtual channel between the OLT and the ONU/ONT, that

ng
is, the channel that carries the service stream. The GEM port is similar to the VPI/VCI
i
identifier in the ATM virtual connection.
n
i
a The T-CONT is the carrier for services in the upstream direction of the GPON. All

r
T-CONT:
T ports are mapped to T-CONTs, and the OLT uses the DBA scheduling mode for
i
GEM
eupstream transmission. A T-CONT is the basic control unit of the upstream service stream in
a w
Hu the GPON system. Each T-CONT is uniquely identified by an Alloc-ID which is globally
allocated by the OLT. That is, each ONU/ONT of the OLT cannot use T-CONTs with the
same Alloc-ID.
 Figure 1 shows the service multiplexing principle in the GPON system. Services are first
mapped to different GEM ports on the ONT. Services carried by GEM ports are then
mapped to different types of T-CONTs for upstream transmission. A T-CONT is the basic
bearer unit in the upstream direction of the GPON line. The T-CONT demodulates the GEM
port unit on the OLT side, sends the GEM port unit to the GPON MAC chip, demodulates
the services in the GEM port payload, and sends the services to the related service
processing unit for processing. Other processing steps are the same as those in switches or
the access network. n
it o
 Figure 2 shows the mapping between services, GEM ports, and T-CONTs. A GEM port is the
ic a
smallest service unit in the GPON system. A GEM port can carry one or more services.
if
rt
Services carried by a GEM port are mapped to the T-CONTs for upstream service scheduling.

Ce
Each ONT supports multiple T-CONTs and can be configured with different service types.

&
One T-CONT can carry one or multiple GEM ports, depending on the specific configuration

ng
of the user. After the data carried by the T-CONT is transmitted upstream to the OLT, the
i
in
GEM port is demodulated, and then the service payload in the GEM port is demodulated
a
Tr
for processing.

ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu whether the PLSu, PLOAMu, or DBRu
The OLT uses the Flag field in the Bwmap to indicate

n and delay requirements of these auxiliary


information is transmitted in each allocation. When setting the transmission period, the OLT
o
ti
scheduler also needs to consider the bandwidth
a
fic is included in the allocation arrangement. Each time an
channels.

The status information of thetiPLOu


e r from another ONU, a copy of the new PLOu data must be


sent. When an ONU is C
ONU takes over a PON medium

&
allocated with two consecutive IDs (the StopTime of one ID is 1 less

ng When the OLT authorizes multiple consecutive Alloc_ID to the ONU, the
than the StartTime of the other), the ONU suppresses the sending of the PLOu data to the
i
second Alloc_ID.

a in can occur multiple times. Note that the continuous OLT allocations to the same
suppression
ONUT rmust have intervals. The allocations must be strictly continuous or for 2 different
i
eONUs.
a w
Hu  User payload data is followed by these overheads during transmission until the position
indicated by the StopTime pointer is reached.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 PLI: payload size, 12 bits. That is, the maximumH u length of each GEM frame is 4095
payload
bytes.
n
PORT ID: 12-bit 4096 GEM PORT IDs. io

a t
c indicates whether the segment is the last segment.
PTI: 3-bit payload type. The last ibit
f

i
rtcontrol.

C e
HEC: 13 bits for header error

&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The PON upstream transmission adopts the TDMA Humode. One OLT can be connected to
n
multiple ONUs. The distance between the ONU and the OLT can range from dozens of
meters to 20 km. Optical fibers are usedoto transmit optical signals with a delay of 5 ps per
ti temperature and the aging of the
kilometer. Due to the change of theaambient
i f ic is also changing. To realize the TDMA access and
rt of each ONU is inserted into the specified timeslots after
components, the transmission delay

e
ensure that the upstream data
Cpublic fiber without collision between ONUs, the OLT must
data is converted on the
accurately measure&the distance between each ONU and the OLT, so as to control the
n g
i
moment at which each ONU sends upstream data.
n the round trip delay (RTD) of each ONU through ranging, and specifies
The OLTiobtains

a
r delay (EqD) to ensure that no conflict occurs on the optical splitter when each
T
equalization
i sends data.
eONU
a w
Hu  In the ranging process, a window needs to be opened, that is, Quiet Zone to suspend the
upstream transmission channels of other ONUs. The OLT opens the window by setting
BWmap to null without authorizing any timeslot.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Hu effective bandwidth utilization.
The GPON system uses the SBA+DBA mode to achieve

TDM services are configured with an bandwidth through SBA to ensure high QoS.
iodynamically allocated through DBA.

a t
Bandwidths for other services are
c

i

r tif is closely related to the QoS guarantee mechanism.


The implementation of DBA

C e dynamic bandwidth allocation through status reporting
The GPON system supports

&
and OLT service monitoring (non-status reporting).

There are threegmechanisms for the GPON to report DBA status:


i n
a in Ind DBA
PLOu-State
rDBRu-Piggy-back DBA

T
ei Payload DBA

aw

Hu
 The implementation mechanism of the DBA function consists of the following parts:

 The OLT or ONU performs congestion detection.


 Report the congestion status to the OLT.

 Update the bandwidth to be allocated by the OLT according to the specified


parameters.

 The OLT sends authorization according to the newly allocated bandwidth and T-
CONT type.
 Manage DBA operations.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu service scheduling process, different
T-CONTs are classified into five types. In the upstream

n
types of T-CONTs are selected for different types of services. Each T-CONT bandwidth type
o
t i
has specific QoS characteristics. QoS characteristics mainly indicate the bandwidth

c
guarantee, including fixed bandwidth, a assured bandwidth, assured/maximum bandwidth,
maximum bandwidth, and hybrid
t i fi mode (corresponding to Type 1 to Type 5 of five T-CONT
types).
e r
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 SN authentication is an authentication mode in which
H u the OLT matches only the SN of an
ONU. The SN+Password authentication mode requires matching both the SN and password
at the same time.
o n
a
After receiving the sequence code response ti message from the ONU, the OLT checks
whether the ONU with the same c

f i SN is online. If an ONU with the same SN is online, the


i reported to the CLI and NMS. Otherwise, the OLT
r t
OLT reports an SN conflict alarm is

Ceoperation state:
directly allocates the specified ONU ID to the ONU.
After the ONU enters the
For the ONU&

n g in SN authentication mode, the OLT does not request the password.


i
The OLT directly configures a GEM port for the ONU to carry OMCI messages and

a inOLT the
enables ONU to go online. The configuration can be automatically performed by

T raddition, the OLT reports an ONU online alarm to the CLI or NMS.
the so that the GEM port carrying OMCI messages is the same as the ONU ID. In

ei For an ONU in SN + password authentication mode, the OLT sends a password


aw

request to the ONU and compares the password returned by the ONU with the

Hu locally configured password. If the password is the same as the locally configured
password, the OLT directly configures a GEM port for the ONU to carry OMCI
messages and enables the ONU to go online, and reports an ONU online alarm to the
CLI or NMS. If the password is different from the local configuration, a password
error alarm is reported to the CLI or NMS. In this case, even if the ONU auto-
discovery function is enabled on the PON port, the OLT does not report the ONU
auto-discovery, and sends the Deactivate_ONU-ID PLOAM message to deregister the
ONU.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu
OMCI: ont terminal management and control interface

SNMP: Simple Network Management Protocol


o n
ti is implemented through OMCI messages.

 ONU management in the GPON system


a
icused for service layer management and maintenance,
i f
rt capability discovery, alarm maintenance information, and
 OMCI messages are mainly

service capabilityC
e
such as device hardware
configuration.
&

g
OMCI is a master-slave management protocol. The OLT is the master device, and an
ONU iisna slave device. After the ONU completes the registration process, an OMCI

a in is established The OLT controls multiple ONUs connected to it through OMCI


rchannels.
channel
T
ei The OMCI supports offline configuration of ONUs. The ONU does not need to save
aw

Hu
the configurations locally, which facilitates service provisioning.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 EMS: element management system Hu
n
Voice services are delivered through the OMCI.
o
ti

ic a
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 EMS: element management system Hu
n
For the voice service, an XML configuration file is downloaded from the NMS through FTP.
o
ti file of the voice service from the NMS in FTP

mode and delivers the file to theic


a
The OLT downloads the XML configuration

i f ONT through the OMCI channel to complete the voice


service configuration.
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 VLAN: virtual local area network Hu
n
MXU services are typically delivered by EMS.
o
ti

ic a
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu service (IP services are used as
VoIP, RG, and PON indicate the VoIP service, gateway

n
examples), and PON link layer management respectively.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 ONT PnP Hu
Zero configuration
o n
ti

 Centralized ONT management


i c a

r tif batch upgrade


ONT remote diagnosis and

Ce and management of the ONT through OAM
Remote maintenance

& provisioning
Automatic ONT service

i ng
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Advantages: The networking, OLT/ONU management, Hu and service provisioning are simple.
n
Disadvantages: If the OLT is faulty, services are interrupted. Optical fibers are usually laid in
io be disconnected at the same time.

t
the same pipe, and two optical fibers may
a services of users, such as enterprise private line
ic
tif private line access services.
 Application scenario: Protects important
r
Ce
access services and base station

&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu to two OLTs to implement remote
Advantages: Two backbone optical fibers are connected
disaster recovery.
o n
t
Disadvantages: The networking is complex, i the cost is high, and the OLT configuration is
a

complex.
f ic
r tiimportant
e
 Application scenario: Protects services such as enterprise private line access
C
services and base station private line access services, especially in scenarios where remote
&
disaster recovery is required.

n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Advantages: The networking and OLT/ONU management Hu is simple.
n
Disadvantages: If the OLT is faulty, services are interrupted. Optical fibers are usually laid in
io be disconnected at the same time.

t
the same pipe, and two optical fibers may
a services of users, such as enterprise private line
ic
tif private line access services.
 Application scenario: Protects important
r
Ce
access services and base station

&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 In dual-homing networking, the two PON lines H u the ONUs and two OLTs are in the
between

n
active/standby state and cannot forward packets at the same time.
o
Advantages: When the upstream link of
t i OLT or OLT is faulty, services can be switched
the
a

ic
tifis complex, the cost is high, and the ONU management is
to the other OLT.

r
Ce
 Disadvantages: The networking
complex.
& Protects power supply as well as enterprise private line access services
Application scenario:
g

i n private line access services.


and base station

a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Answer: Hu
1. ABCD
o n
2. CA
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 The 3 most important access technologies in the u field are APON, EPON, and GPON.
HPON
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Huto locate, synchronize, and mark the
PLOu: This is a physical control header and is used
data of an ONU.
o n
PLOAMu: This is a physical layer OAM imessage

t of the upstream data and is mainly used to
aas the maintenance and management status of the
ic
tif
report management messages such
ONU.
r
e in each frame. Whether to send the frame is determined

C
(This field is not contained
&
by the FLAG indicator of the previous downstream frame.)
g
n the power level sequence which is used by the ONU to adjust the optical

power ofin
i
PLSu: Indicates

a
the optical port.

T r(This field is not contained in each frame. Whether to send the frame is determined
ei by the FLAG indicator of the previous downstream frame.)

a w
Hu  DBRu: It is mainly used to report the status of the T-CONT and apply for the bandwidth for
the next transmission to complete dynamic bandwidth allocation for ONUs.
 (This field is not contained in each frame. Whether to send the frame is determined
by the FLAG indicator of the previous downstream frame.)

 Payload: The data payload can be a data frame or a DBA status report.
 Payload = (DBA report + Pad)/(GEM header + GEM frame)
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 A GPON downstream frame consists of the PCBd H+uPayload.
A downlink frame is fixed at 125 uSnat the frequency of 8000 Hz.
io the downstream frame length is 38880 bytes.

a t
In 2.488 G downstream transmission,
c

i
PCBd: This is a physical controlifblock which implements frame synchronization, positioning,

and bandwidth allocation. r


t
C e

&
(The length varies depending on the number of timeslots allocated this time.)

g
n as the GEM frames in the upstream frames, it bears the upper-layer PDU.
Payload: The same
i

a in physical-layer synchronization information which is used for


Psync: Indicates
r

T
synchronization between the OLT and the ONU. The value is fixed to 0xB6AB31E0.
i Identifier domain
eIdnet:
w

u a  FEC: forward error correction


H  Reserved
 SFupeFrame: Indicates a jumbo frame.
 PLOAMd: This is a physical layer OAM message for downstream data (defines N types of
messages. For details, see the G.984 standard.)

 BIP: Parity check is performed on all bytes between the BIP fields of two frames for bit error
monitoring.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 FTTH: fiber to the home Hu
FTTB: fiber to the building/curb
o n
ti

 FTTC: fiber to the curb


ic a
 FTTO: fiber to the office
r t if

Ce
FTTM: fiber to the mobility base station

&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 50 M@HDTV service Hu
n
High definition television (HDTV): The HDTV program resolution can reach 1920 x
o
ti

1080. Generally, the MPEG2-TS, WMV-HD, and H.264 algorithms are used to

ic a
if
compress and transmit data. Different encoding technologies vary greatly in

rt
compression ratio and image quality. HDTV services with high resolution and high

Ce
bandwidth are the most important services for mainstream carriers in network

&
construction and market promotion.

ng
The optical access network based on GPON lays a foundation for high-bandwidth

ni

i
access of subscribers. In the FTTH network construction mode, the split ratio of 1:64
a
T r is usually adopted. The average downstream bandwidth of each subscriber can reach

ei 40 Mbps. Therefore, the average downstream bandwidth can be increased from 2

aw
Mbps to 30 Mbps or 50 Mbps. The OLT provides 20 Gbps bandwidth for each slot to

Hu
ensure that services on the VDSL2 board and 8GPON service board are forwarded
without converging. The MA5680T/MA5683T uses the Access Node Control Protocol
(ANCP) to interwork with the policy server of a carrier to implement video bandwidth
control for subscribers. In this way, subscriber video bandwidth can be adjusted in
real time based on service requirements, improving the subscriber experience.
 Open access
 Open access is a new mode of optical access. It disrupts the operation mode of end-
to-end services provided by traditional carriers and allows third-party services or
content providers to access the network to provide services for subscribers.

 The FTTx solution provides the open access platform for multiple carriers. In the open
access solution, the optical access network becomes an open "access pipe". Different
service providers can rent the open access resources, and the access network
n
allocates the bandwidth to operators as required. The FTTx solution provides multi-
it o
GE upstream interface boards to meet the requirements of multi-ISP access. The
ic a
if
rt
HQoS function is used to control the ISP service bandwidth, subscriber bandwidth,

Ce
and subscriber service bandwidth. In this way, a hierarchical QoS control mechanism
is established, ensuring that each ISP can use the bandwidth pipe provided by the
open access network fairly. &
Enterprise access service ng i
n

i
Enterprise access is an indispensable application scenario ofaFTTx network

T rbecome a mainstream
ei and interconnection, which
construction. With the rapid development of FTTB, it has

winterconnection.
practice to use optical fibers for enterprise service access
a
Huenterprise access scenarios. It works with
is an effective supplement to traditional Ethernet
 The FTTx solution provides the MA5612 for

o n
the OLT to provide FE/GE/E1/POTS interfaces for enterprise subscribers, and

a
implements enterprise data access,ti voice access, and interconnection between
f
different branch departments
i c through the GPON and EPON networks.
r tireliability, the FTTx solution provides complete enterprise
e QoS control functions to ensure data security and service
 In terms of security and
security and highCreliability
& subscribers.
quality of enterprise

Base station n g line access


i private
inlarge-scale FTTx construction continuously expands the optical fiber coverage,


a
rand gradually becomes the mainstream access mode. The rapid development of
The
T
ei mobile communication services requires mobile base stations to be smaller and
a w deployed with a higher density. To reduce the investment in base station backhaul,

Hu optical access is the best way for base station access.

 The base station private line access solution provided by the FTTx solution solves the
service backhaul problem of base stations such as 2G/3G/LTE/Femtocell, and provides
high-precision clock, time solution, and highly-reliable networking protection to meet
base station access requirements in various scenarios.

 Enterprise self-owned service access

 A typical POL campus network uses PoE, security, and PON protection technologies
to implement data, surveillance, video conferences, and private services.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 In the FTTx network application scenarios, the access
H u modes include FTTH, FTTB, FTTC,
FTTM, and FTTO. In these access scenarios, ONUs/ONT are connected to optical splitters
and then to the OLT through optical fibers.
o nThe optical fibers and optical splitters belong to
the ODN. The OLT is connected upstream
network for upstream transmission.a
ti to the aggregation switch through the IP
i f icApplicable to high-end individual subscribers in new or
rt to provide high-speed access to video, voice, and data
 Fiber To The Home (FTTH):
e
high-end residential buildings
Cthe bottleneck and contradiction of traditional access rate and
services. It breaks
distance.
&
Fiber To g

i n with medium and high density population. The latter applies to scattered
The Building/Curb (FTTB/C): The former is applicable to apartments or office

in buildings and industrial parks. In old urban area reconstruction projects,


buildings
a
rthe MDU can be used to provide the ADSL2+ or VDSL2 access service to subscribers
apartment
T
ei atFDTsa rate of 2–20 Mbps. In this scenario, optical fibers only need to reach buildings or

a w at curbs. Existing copper cable resources can be reused at the subscriber access

u
side to reduce the device investment.

H  Fiber To The Office (FTTO): Applicable to commercial subscribers or government


offices such as governments, banks, and hospitals. SBUs are used to provide
E1/GE/FE/POTS interfaces to meet office requirements.
 Fiber To The Mobility Base Station (FTTM): Applicable to service backhaul scenarios of
the 2G/3G/LTE mobile base stations. The CBU is used to provide FE/E1 interfaces to
meet the mobile backhaul requirements in various scenarios.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Hu FTTO, and FTTM. There are various
FTTx networking solutions include FTTB, FTTC, FTTH,

n types according to the application scenarios.


types of devices, including optical line terminals (OLTs) and optical network units (ONUs).
o
ti
ONUs can be further classified into different

i a
c FTTC, FTTB, FTTH, and various devices at the CO side.
f
The figure shows 3 access scenarios:
i family to meet carriers' requirements for FTTx

Huawei provides a completetproduct


network construction. e
r
C

&
The full series of xPON products include ONTs, MxUs, ONTs, MSANs, DSLAMs, and

n g
complete auxiliary products, meeting carriers' diversified requirements for fiber-in and
i
inU2000.
copper-out construction. In addition, all xPON products can be centrally managed by the
a
r
iManager
T
ei OLT: optical line terminal

a w ONT: optical network terminal


u

H  ONU: optical network unit


 MSAN: multi-service access node

 DSLAM: digital subscriber line access multiplexer

 PON: passive optical network


n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

u
There are 3 types of MA5800/EA5800 products:HMA5800/EA5800-X17/X15,
MA5800/EA5800-X7, and X2.
n
The products feature large broadband,io

a t large capacity, high reliability, and intelligent

f ic ultra-broadband access.
operations, and can provide high-density
ti used on 3 different types of OLTs. The same control board
The same service board canrbe
Ce and X7.

can be used only on the X17


The EA5800 series& products are dedicated enterprise OLTs which work with enterprise
g

ONUs/ONTs.n
i ni
r a
i T
e
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 An MA5800/EA5800-X17 subrack can be fixedH in u
a cabinet by mounting ears. It provides
22 slots and has a fan on the top.
o n
The ESD jack of the MA5800/EA5800-X17
t i service subrack is located on the left side of the
a wrist strap to prevent the ESD from damaging

fan tray. It is used to connect thecESD


i
devices.
r tif
 There are 2 ground points
C eon the MA5800/EA5800-X17 service subrack, one on the side of
&
the subrack and the other under the right mounting ear.
g
n end of the MA5800/EA5800-X17 service subrack is connected with a

i
The power input

a in The central ground point is directly connected to the service subrack, which is
noise filter.
calledr the enclosure ground point (that is, the protection ground). The enclosure must be
i T properly so that induction and leakage can safely flow into the ground to
eimprove the anti-electromagnetic interference capability of the entire system.
grounded

a w
Hu  Use a ground cable to connect the ground point of the service subrack to the ground bar
of the equipment room or ground. It is recommended that the ground resistance of the
equipment room be less than 10 ohms. In addition, refer to the related national and local
regulations.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Control boards: Hu
n
Slots 9 and 10 must be configured with control boards of the same type.
o
ti

 Service boards:
ic a
 Slots 1–8 and 11–19
rt if

Ce
Supports mixed configuration of different service boards.

&
Supports mixed configuration of upstream interface boards, but it is recommended

ng

that upstream interface boards of the same type be used.

i ni

r a
Both control boards and the upstream interface boards can be used for upstream

i T data transmission. It is recommended that control boards be used for upstream

e transmission.

aw Universal interface board (GPIO slot):

Hu

 Slot 0
 Power board:
 Slots 21 and 22
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Control boards: Hu
n
Slots 8 and 9 must be configured with control boards of the same type.
o
ti

 Service boards:
ic a
 Slots 1–7 and 10–17
rt if

Ce
Supports mixed configuration of different service boards.

&
Supports mixed configuration of upstream interface boards, but it is recommended

ng

that upstream interface boards of the same type be used.

i ni

r a
Both control boards and the upstream interface boards can be used for upstream

i T data transmission. It is recommended that control boards be used for upstream

e transmission.

aw Universal interface board (GPIO slot):

Hu

 Slot 0
 Power board:
 Slots 18 and 19
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The ESD jack of the MA5800/EA5800-X7 service u is located at the bottom of the
Hsubrack
n
fan tray. It is used to connect the ESD wrist strap to prevent the ESD from damaging
o
ti
devices.
a
There are 2 ground points on thecMA5800/EA5800-X7 service subrack, one on the left side
i middle of the right mounting ear. The power input end
i fthe

of the subrack and the othertin


e rservice subrack is connected with a noise filter. The central
ground point is directlyCconnected to the service subrack, which is called the enclosure
of the MA5800/EA5800-X7

ground point (that&


g is, the protection ground). The enclosure must be grounded properly so
nand leakage can safely flow into the ground to improve the anti-
that inductioni
a in interference capability of the entire system. Use a ground cable to connect
electromagnetic
r point of the service subrack to the ground bar of the equipment room or
theTground
i It is recommended that the ground resistance of the equipment room be less than
eground.
a w 10 ohms. In addition, refer to the related national and local regulations.

Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Control boards: Hu
n
Slots 8 and 9 must be configured with control boards of the same type.
o
ti

 Service boards:
ic a
 Slot 1–7
r tif

Ce
Supports mixed configuration of different service boards.

&
Universal interface board (GPIO slot):

Slot 0 n g

n i
Powera i

r board:
T Slots 10 and 11
e i 

a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The MA5800/EA5800-X2 service subrack is 2 UH u and 19-inch wide. The fan tray is
high

n
located on the right side of the service subrack and is fixed in the cabinet by mounting ears.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 In the FTTx solution:
Hu

o n
The MA5680T/MA5683T can function as the OLT in the GPON/EPON system to work

ti
with ONTs (ONUs) to bear multiple services.

c a
The MA5680T/MA5683T supports broadband access services such as P2P FE/GE
i
subscribers.
rt if
optical access. It works with the ONTs to provide point-to-point FTTH access for


C e
As an OLT, the MA5680T/MA5683T is the core component of the FTTx solution and has
&
the following features:
Provides g

i nmanagement and fault diagnosis.


excellent management, maintenance, and monitoring functions to facilitate

in carrier-class reliability. The product reliability is considered in the system


routine
a
rdesign, hardware design, and software design to ensure the normal operation of the
Provides
T

ei product.
a w Provides various types upstream interfaces, service interfaces, and maintenance
u

H
interfaces to adapt to different networking environments.
 Provides powerful QoS capability to facilitate the management of various services.
 Provides comprehensive security solutions for system security, subscriber security,
and operation and maintenance (O&M) security.
 Supports flexible networking. As a multi-service access platform, the product
provides multiple access modes and supports multiple networking modes to meet the
networking requirements of different environments and services.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 ETSI: European Telecommunications Standards H u
Institute

o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Huwith control boards of the same type.
Control board slots: Slots 9, 10 must be configured

Upstream interface board slots (GIU): Slotsn19 and 20 support mixed configuration of
different upstream interface boards. It iisorecommended that upstream interface boards of

t
the same type be configured. ca
t i fi that slots 21 and 22 be configured with power
r
boards of the same type.e
 Power board slots: It is recommended
C
Universal interface& board slot (GPIO): 0
g

i nslots: Slots 1–8 and 11–18 support mixed configuration of different service
inis recommended that xPON boards be configured from left to right and other
 Service board

a
rof boards be configured from right to left.
boards. It
T
ei
types

a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 IEC: International Electrotechnical Commission Hu

o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The MA5683T supports the H801MABO and H802MABO Hu backplanes.
Chassis ventilation process: Cold air entersnfrom the left side of the chassis, is blown
io exhausts from the right side of the chassis.

towards the boards to the right side, and


a t
The air filter is installed in the lefticpart of the MA5683T chassis and inserted into a slot on

f air is sucked in from the left side of the chassis by the
ticold
r
fan tray, the air filter can e
the left of the fan tray. When
C effectively filter out dust particles in the air.
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu with control boards of the same type.
Control board slots: Slots 6 and 7 must be configured

Upstream interface board slots (GIU): Slotsn8 and 9 support mixed configuration of different
io that upstream interface boards of the same

t
upstream interface boards. It is recommended
a
ic
tif that slots 10 and 11 be configured with power
type be configured.

r
boards of the same type.e
 Power board slots: It is recommended
C
Universal interface& board slot (GPIO): 12
g

i nslots: Slots 0–5 supports mixed configuration of different service boards.


in
 Service board

r a
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The MA5608T supports the H801MABR backplane. HuWhen the MA5608T is configured in a
n
cabinet, a cable manager must be configured under the MA5608T.
o
t i
There is a fan tray on the left side of the MA5608T, which dissipates heat through air
a

ic
tif air enters from the left side of the chassis, is blown
blowing.

Chassis ventilation process:rCold


Ceright side, and exhausts from the right side of the chassis.

towards the boards to the


&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Main control board (SCU): Hu
n
Slots 2 and 3 must be configured with control boards of the same type.
o
ti

 Power board:
ic a
 Slot 4
rt if
 Service boards:
Ce
&
Slot 0–1 support mixed configuration of different service boards

ng

i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The SmartAX MA5818 multi-service access device Hu(MA5818 for short) is a 2 U high and 19
n
inch-wide product that supports flexible card plug-in. It has four service slots and can be
o
ti
flexibly configured.

i a
c mini DSLAM, or mini MSAN construction scenarios.
f
The MA5818 can be used in FTTC/FTTB,
It can be installed in corridorstior cabinets in indoor and outdoor application scenarios.

e r
 The MA5818 provides UNI
C interfaces such as ADSL2+, VDSL2, SHDSL, POTS, FE, P2P, ISDN,
&
and Combo, and provides dual GPON/EPON/GE auto-sensing NNI interfaces.

n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The MA5818 provides the vectoring feature to support
H u VDSL2 acceleration. Subscribers can
access the network at a higher speed and enjoy richer services and better subscriber
experience through VDSL2 lines.
o n
i
IPv6: Compared with IPv4, IPv6 has atsimplified

ic a packet header format, sufficient address

f
space, hierarchical address structure, flexible extension header, and enhanced neighbor
discovery mechanism.
r ti
Combo card design: This e

C featuretime
space, reduce cable connection
helps carriers reduce construction costs, save deployment
and MDF occupation, and reduce maintenance costs.
&capabilities:

n g
Comprehensive QoS
i
nthe port level.rate limiting based on subscriber ports and traffic shaping for queue
Supports bidirectional
i

a WRED profiles and the binding of queues and WRED profiles.


groups at
r

i T
Supports
eSupports priority marking based on the access control list (ACL).
aw

Hu
 Upstream and downstream services can be mapped to different priority queues based on
priority tags and scheduled accordingly.
 Supports 3 scheduling modes: priority queuing (PQ), weighted round robin (WRR), and
PQ+WRR.
 Excellent maintenance and management functions:
 Supports service pre-deployment and plug-and-play.
 Supports remote fault locating, troubleshooting, and batch upgrade.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The SmartAX MA5821/MA5822 (MA5821/MA5822 Hu for short) is a remote ONU launched by
Huawei.
o n
The MA5821/MA5822 is mainly used in
t i FTTB or FTTC construction scenario. The
the
asurveillance scenarios.

ic
tif 1 SFP upstream optical port which supports 10G GPON,
MA5821 can also be used in video

 The MA5821/MA5822 providesr


e upstream transmission. Users can select the upstream mode as
C
10G EPON, GPON, or EPON
&
required. The product supports 8/16/24 FE electrical ports or 24 GE electrical ports in the

n g
downstream direction. The MA5822 also supports POTS access.
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 The MA5821/MA5822 is classified into products u 8/16/24 FE or 24 GE electrical
Hwith
n
interfaces based on the number of subscribers that can be connected. The MA5822
o
ti
supports POTS access.
a
The MA5821/MA5822 provides 1cSFP upstream optical port which supports 10G GPON,
i fi transmission.

10G EPON, GPON, or EPON t


e r upstream

C function, but the MA5821 does not support voice services.
The MA5822 has the voice
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 There are 3 types of EA5821: 8GE, 24GE, 24GE+PoE.
Hu
 Supports 10G GPON upstream transmission.
o n
 Intelligent PoE power supply
a ti
The EA5821 provides the PoE
f ic function which simplifies power supply. When
ti APs, eliminating power

transmitting data through Ethernet cables, the EA5821 can provide power supply for
e r
terminals such as indoor cable routing requirements.
Abundant service typesC
The EA5821&

n g can implement multiple services such as data and multicast services with
i
solutions. It supports high-performance multicast service.

a in IPv6.
Supports
rProvides comprehensive QoS capabilities.

i T

eExcellent
aw
 maintenance and management functions:

Hu
 Supports various maintenance and management functions, such as on-site software
commissioning, remote acceptance, remote upgrade and patching, and remote fault
locating. Supports one-stop offline deployment and plug-and-play. Configurations
can be automatically obtained from the NMS and take effect automatically. When
the EA5821 goes online, it sends a report message to NMS automatically.
 Remote batch upgrade: Supports automatic batch upgrade and version and data
rollback in case of an upgrade failure, thereby ensuring upgrade security.
 Zero touch routine maintenance: Supports accurate fault locating and remote
troubleshooting. Supports comprehensive information collection, device self-check,
and diagnosis.
 Network performance monitoring: Supports network optimization and subscriber
QoS monitoring.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The MA5616 can be configured with different service
H u boards to provide ADSL2+, VDSL2,
SHDSL, POTS, and ISDN subscriber interfaces, meeting requirements of various FTTB and

o n the MA5616 can be used as a mini DSLAM or


FTTC private line access services. In addition,
MSAN to provide traditional voice, data,
t i video services.
and

i c a0 is configured with a control board, slots 1–4 are


t f and slot 5 is configured with a power board.
In the MA5616 subrack, slot
configured with service iboards,

r
e board EIUD can be configured only in slot 1 or slot 2.

C
A P2P Ethernet access

&
The MA5616 has the following features:
Supportsg
in
 3 types (CCUB/CCUC/CCUE) of control boards.
ThenCCUB/CCUE

i supports the xDSL, ISDN, POTS, ADSL2+, and POTS combo service
a serviceIn addition
T rboards. to the aforesaid service boards, the CCUC also supports FE and

i GE boards.
e Supports xPON and GE upstream ports when configured with different daughter
aw

boards. The CCUE control board can be configured with an XP1A daughter board to

Hu
provide 10G GPON upstream ports.
 Can be installed without onsite software commissioning, accelerating the deployment.
 Supports remote fault locating, commissioning, information collection, and fault
recovery.
 Supports intelligent fan speed adjustment which effectively reduces power
consumption during off-peak hours. The power consumption of a single device can
be reduced by a maximum of 6 w.
 The MA5616 supports AC and DC input. The AC input mode supports battery backup.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The MA5620/MA5626 is a remote ONU launched Huby Huawei to meet customers'
n
requirements for the multi dwelling unit (MDU) in an FTTB network. It works with the OLT
to provide high-speed and high-quality o
ti
data, voice, and video services for FTTB access.

i a
c features:
f
The MA5620/MA5626 has the following
i

r tsupports
e
 The MA5620/MA5626 EPON, GPON, and GE upstream transmission.
C VoIP-based plain old telephone service (POTS) access and
The MA5620 supports
& LAN access.

Ethernet-based
g
n supports Ethernet-based LAN access.
i
inMA5620/MA5626 provides 3 specifications with 8, 16, and 24 ports. The AC
 The MA5626

a
rpower supply mode is adopted.
The
T

ei The MA5620 supports basic services such as voice service, fax service, and modem
a w 

Hu service, as well as value-added services such as 3-party conversation, call waiting, call
transfer, calling line identification presentation (CLIP), and calling number restriction.
 The MA5620/MA5626 supports plug-and-play and remote management without
onsite configuration. It provides excellent management, maintenance, and
monitoring functions, facilitating routine operation management and fault diagnosis.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

H u MDU devices to transmit data signals
Power over Ethernet (PoE): A technology that enables
for terminal devices as well as DC power on existing Ethernet cables.

o n such as WLAN, VoIP, and network video


ti IP phones, and network cameras are widely used.
 With the rapid development of new services
a
surveillance, wireless access points (APs),
ic in places where the AC power supply is difficult to
acquire. The PoE power supplyifsolution solves this problem and enables terminal devices to
Many such terminals need to be installed

e
obtain power when accessing rt the network.
C
PoE has the following features:
&an Ethernet cable has a voltage only when it is connected to a device

n g
In PoE mode,
i
that requires power supply. If connected devices do not require power supply, there
involtage on the Ethernet cable, eliminating the risk of electricity leakage.
is no
a
T rSubscribers can safely use the existing devices and PoE devices on the network.
i

eForward PoE power supply


w

u a  As shown in the figure on the left, the PoE power supply system of the MxU has the

H
following typical applications: connecting to the IP phone, wireless APs in a WLAN,
and network cameras in the video surveillance scenario.
 The MA5626 PoE device functions as a power sourcing equipment (PSE) to connect
to an AC 220 V power supply. Due to the difficulty in centralized power supply, some
terminals are connected to the MA5626 through Ethernet ports to transmit data and
obtain PoE power supply.
 Reverse PoE power supply
 As shown in the figure on the right, the MA5626 reverse PoE device functions as a
powered device (PD) and connects to a PSE power adapter in a subscriber's home
through an Ethernet port to transmit data and obtain PoE power.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The MA5612 has the following features: Hu
n
The MA5612 supports card plugging. It provides two service card slots with natural
o
ti

heat dissipation and no noise.

ic a

r t if
The MA5612 provides GPON, EPON, and GE interfaces on the network side to meet

e
different modes and bandwidth requirements. The upstream ports support triple
C
mode autonegotiation.
&
The MA5612 supports FE, POTS, and radio frequency (RF) interfaces, which can be
ng

i
used for home subscriber access.
n
i
a access and mobile bearing.
r
 The MA5612 supports GE, FE, and E1 interfaces, which can be used for enterprise
T
ei
user

aw
 The MA5612 supports AC and DC power supplies.

Hu
 The MA5612 features an energy-saving backup technology: The POTS short loop is
used to reduce the power consumption by 5%. Supports 12 V AC power backup,
reducing power backup cost by more than 50%.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Bridging device: Hu
n
A bridging ONT only transparently transmits packets, and the LAN-side device
o
ti

obtains the public IP address.

ic a

rt if
A bridging ONT cannot be used as the home control center and needs to be

e
connected to a router. Therefore, the carrier loses the control of the ingress.

Internet services:C
A PC obtains the public IP address through PPPoE dialup to access
the Internet.&

The ONT only transparently transmits data.


g
n The STB directly obtains the public IP address from the DHCP to order
i
in The ONT only transparently transmits data.
 IPTV service:

r a
programs.

i T VoIP service: The ONT functions as a DHCP client to obtain an IP address through
e DHCP. Multiple POTS ports share one IP address.

a w
Hu  Gateway device:

 A gateway ONT obtains the public IPv4 address and assigns a private IPv4 address to
each LAN-side device. NAT is performed to save the public IP addresses.

 A gateway ONT functions as the home interconnection center and connects home
devices through network cables and Wi-Fi. It can be used as the entrance to smart
homes.
 Internet services: The ONT functions as a PPPoE client to obtain a public IP address
through PPPoE dialup. In addition, the ONT functions as a DHCP server to allocate
private IP addresses to PCs connected to the network through L3 LAN ports and Wi-
Fi. Using NAT, private network PCs can share a public IP address to access the
Internet.

 IPTV service: The ONT functions as a DHCP client to obtain a public IP address
through DHCP. In addition, the ONT functions as a DHCP server to allocate private IP
n
it o
addresses to STBs connected to the network through L3 LAN ports. Using NAT, STBs
on the private network can share a public IP address to order programs.
ic a
if
rt
 VoIP service: The ONT functions as a DHCP client to obtain an IP address through
DHCP. Multiple POTS ports share one public IP address.
C e
&
 TR069 service: The ONT functions as a DHCP client to obtain an IP address through
DHCP and establishes a connection with the TR069 server ACS.
g
n in
r ai
i T
e
a w
H u
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Reference answers: Hu
1. FTTH, FTTB, FTTC, FTTO, FTTM
o n
a
2. There are single and modular MxUs,ti applicable to scenarios such as FTTH/B/C.
i f icIPTV, CATV, and Wi-Fi
rt
3. Internet access (data), VoIP,

C e
&
n g
i
a in
T r
ei
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Serial port maintenance mode: Hu
n
A maintenance terminal communicates with the console of the control board
o
ti

through a serial port to operate and maintain devices.

ic a
 Network port maintenance mode:
r tif

Ce
In-band mode: A maintenance terminal communicates with an NE through an
upstream service Ethernet port of a device.
&
ng
 Advantages: The networking is flexible and no additional devices are required,

ni
saving the cost.
i
a Disadvantages: When a service channel is faulty, maintenance cannot be
Tr

ei
performed.

a w  Out-band mode: A maintenance terminal communicates with a device through the

Hu Ethernet maintenance port on the control board.

 Advantages: Provides more reliable device management channels. If a


managed device is faulty, the device on the network can be located in time.

 Disadvantages: A separate network is required to provide maintenance


channels irrelevant to service channels.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The baud rate of the HyperTerminal must be the u as the baud rate of the serial port on
Hsame
n
the MA5680T. By default, the baud rate of the serial port is 9600 bps.
o
t
If garbled characters are displayed afteri log in to the HyperTerminal, the problem is
you
a

probably caused by the baud ratecdifference


f i between the HyperTerminal and the MA5680T.
i another baud rate. The system supports the following
You can log in to the systemtusing
r
e bps, 38400 bps, 57600 bps, and 115200 bps.
C
baud rates: 9600 bps, 19200

&
By default, the default settings are used when you set up a connection between the
HyperTerminalg
i n and a device.

a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 In out-band management mode, non-service channelsHu are used to transmit management
n
information so that management channels are separated from service channels. The out-
band management mode provides moreoreliable device management channels than the in-
band management mode. When anaupstream ti link of the OLT is faulty, the device
i f ic and monitored in real time.
rtboard of an OLT is an auto-sensing port, and can automatically
information can be quickly located
 The ETH port on the controle
C cable when connected to a computer.
&
identify the direct or crossover

n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu messages are transmitted through
In in-band management mode, management interaction

ninconvenient.
a service channel of a device, the networking is flexible, and no additional device is required.
o
ti
This saves the cost but makes maintenance

i a
c with a maintenance terminal or NMS through a VLAN
f
In-band management communicates
L3 virtual interface address. ti

e r
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Command mode classification
Hu

o n
The OLT provides multiple command modes to implement hierarchical protection and

ti
prevent unauthorized access.
 The command modes are as follows:
ic a
 User mode
r tif
 Privilege mode
Ce

Interfaceg
&
Global config mode

n
config mode
i

a in mode
OSPF mode

Tr
 MPLS-LDP

ei  BTV mode

a w Features of command modes


u

H  Downward compatibility: All commands in common user mode can be executed in


privilege mode. All commands in common user mode and privilege mode can be
executed in global config mode.
 Hierarchical protection: This prevents unauthorized users from accessing the network.
Users of different levels can enter different command modes. At the same time, the
commands that can be executed by users of different levels are different even if they
enter the same command mode.
 To exit from the command mode level by level, run the quit command. Run the
return command to quickly exit the privilege mode. To return to the common user
mode from the privilege mode or global config mode, run the disable command.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Comprehensive help Hu
n
In any command mode, type a question mark (?) to obtain all commands in the
o
ti

current command mode and brief command descriptions. Enter a command followed

ic a
if
by a question mark (?) separated by a space to obtain all keywords and descriptions

rt
corresponding to the current position.
e

C
If the position is a parameter, the parameter name, parameter description, value
&
range, default value, input format, and unit are listed.
g
n is complete and you can run the command without entering any
i
If a command
in

a
information, <cr> is displayed, indicating that the command can be executed by

T rpressing Enter.
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Press <TAB> to supplement the keyword. Hu
n
Enter an incomplete keyword and press Tab. If there is a unique keyword that starts
o
ti

with the entered character, the system replaces the original input with the complete

ic a
if
keyword and displays the keyword followed by a space and cursor in a new line.


e rt
Press the space key to supplement the keyword.
C keyword and press the space key. If the matching keyword is
Enter an incomplete
unique, the &

system uses the complete keyword followed by a cursor and space to


g
replacenthe original input. If there are multiple matching keywords, the system waits
forin
i
a supplement the input with the complete keyword.
the user to enter more characters until a unique matching keyword is found, and

T rthen
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Interaction mode Hu
n
When a user enters an incomplete command, the command line system provides the
o
ti

command line interaction mode by default, and displays the next command word

ic a
if
that can be entered and the parameter type of the command word.

rt
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the display history-command commandHu
This command is used to query the n records of recently executed commands. After
io the screen displays the records of the recently

t
the command is executed successfully,
a
ic
tifyou can press ↑ and ↓ to obtain the previous and next
executed commands.


r
e command record, and press Enter to directly execute the
In some Telnet terminals,
C
commands of the current
&
selected command.
g
n records are valid only for the current user. After the user logs out, the
i
The command
in records are cleared.

a
command

T rYou can run the history-command max-size command to set the number of
ei command records to be displayed. The value range is 1–100. By default, the system

a w saves 10 commands.

Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 switch language-mode user guide Hu
n
The system supports multiple languages. Users can select one of the languages to
o
ti

display information.

ic a

r t if
By default, the system supports the common language resource file (English) and a

e
local language resource file. If the local language is not displayed as default
C
languages, you can load a new language resource file (using the load language
&
command) to display information in the required language.
g
n can be switched in all modes.
i
The language
in

a
Tr
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu
Operation users are classified into the 3 levels: administrator, operator, and common user.

n
Different user levels have different system operation rights.
o
Administrators can add users of ilower

a t levels. That is, administrators can add

ic
tif
operators and common users.

r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Command parameters Hu
n
Number of concurrent logins: indicates the maximum number of terminals that can
o
ti

be used by a user to log in to the system at the same time.

ic a

rt if
Additional information about a user: indicates information such as the contact

e
method and address of a user.

Precautions C
&

ng
 By default, the system has 3 profiles: admin, operator, and commonuser.

i ni
The user name of an operator user must be unique and cannot be all or online.
a

T rMultiple operator users can be added consecutively. A maximum of 127 operator


i users can be added in the system.

e
aw A maximum of 10 terminal users can be online at the same time.

Hu

n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Introduction to commands Hu
n
Permission: There are 3 levels: User, Operator, and Admin.
o
User is a common user. ti

ic a

r tif common configuration activities.


An operator can perform

C
An Admin usere is an administrator and can perform a series of management
&
activities.

n g
Status: indicates whether a user is online.
i

a in of concurrent logins: indicates the maximum number of terminals that can


Number
rbe used by a user to log in to the system at the same time.

i T
e Additional information: indicates information such as the contact method and
w

u a address of a user.

H
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Functions of the terminal user level command
Hu

improve the operation rights of ao n to ensure the system security, run this
This command is used to modify the rights of a user. When you need to reduce or
i are reset, the user can perform operations on
command. After the rights of atuser
user
a
the system according to thecpreset rights.
i
An administratortcan
fi change the operation rights of multiple users

r
consecutivelyeuntil confirming that the operation is complete.
C

&terminal user level command to modify the operation rights of the
Run the display terminal user command to obtain the user name, and then
g
run the
n
iuser.

a in Only an administrator can run this command to change the level of a user to
r common user or operator.

i T
eFunctions of the terminal user reenter command
w

u a  This command is used to modify the number of terminals that can be used by a user

H
to log in to the system concurrently. When an account needs to log in to the system
on multiple terminals at the same time, run this command to set the maximum
number of terminals.
 Generally, to ensure device security, the maximum number of concurrent logins
of a user account is set to 1.
 Only administrators can run this command.
 Run the display terminal user command to query the user name, and then
run the terminal user reenter command to change the maximum number of
concurrent logins.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 display client Hu
n
This command is used to query information such as the user ID, IP address, and login
o
ti

time of a user to facilitate security management.

ic a
 client kickoff
rt if

Ce
When you need to forcibly disconnect a terminal user or a type of terminal users, run
this command. After a user is disconnected, the user cannot perform any operation
on the system.&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 display version 0/9 Hu
n
0/9: indicates the subrack ID and slot ID. When you need to query the version of the
o
ti

board in a specified slot, use this parameter.

ic a
 Parameter description
rt if

C e
Version: version information

&
PRODUCT: product name

Uptime: g

i n running time

a in
Tr
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The Network Time Protocol (NTP) is an application Hulayer protocol in the TCP/IP protocol. It
nNTP packets to synchronize clocks between
is used for clock synchronization between a distributed time server and client. Network
o
i
tapplications
devices that support the NTP can exchange

c
them. In this manner, various service a (such as the network management

t i fi are implemented based on a unified time.


system and network charging system)

e r client/server mode, peer mode, broadcast mode, and


C
 NTP supports 4 working modes:

&
multicast mode.

n g
A client and server must have L3 interfaces and IP addresses that can communicate
i

in
with each other.
a
T r In client/server mode, you only need to configure the NTP client. On the NTP
ei

server, only the NTP master clock needs to be configured.

a w In client/server mode, time can be synchronized only from the NTP server to an
u

H NTP client, not otherwise.


 The clock stratum of the synchronizing device must be smaller than that of the
synchronized device. Otherwise, the clock synchronization cannot be performed.

 A device that runs NTP can receive synchronization from other clock sources or
synchronize time to other devices. Devices can synchronize time with each other.
When a device works in client mode, you do not need to set the system time, and
the device automatically synchronizes the system time from a remote server.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Command functions Hu
n
The frame set command is used to set the description of a subrack. When you need
o
ti

to identify a subrack by the subrack description, run this command. After the setting

ic a
if
is successful, you can query the subrack number by the subrack description, and then

rt
perform other operations on devices based on the subrack number.
e

C
The undo frame desc command is used to delete existing subrack descriptions from
&
the system. When you need to clear the description of a subrack, run this command.

User guide n g

ni
a i
r
 After the description of a subrack is set successfully, if you run the frame set

i T command to reset the description of the subrack, the description of the subrack is
e modified.
a w
Hu  After the description of a subrack is set successfully, if you run the undo frame desc
command, the description is cleared.
 If the subrack description contains spaces, use "" to enclose the characters.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Command functions Hu
n
This command is used to query the information about all boards in a subrack or
o
ti

board in a specified slot. When you need to query the slot number, name, status,

ic a
if
daughter board information, port information, or online status of a board after

rt
performing an operation on the board, run this command.
 User guide
Ce
&
If you specify only the subrack number, the system queries the information about all
ng

ni
boards in the entire subrack. The following information can be queried: slot number,

a i
board name, board status, daughter board name, and online status of the board

T rIf you specify the subrack ID and slot ID, the system queries the detailed information
i

e about the board with the specified subrack ID and slot ID. The following information
a w can be queried: board name, board status, and port information of the board

Hu  When querying the activation information about service boards and ports, you can
query the total number of activated and inactive ports.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Command functions Hu
n
This command is used to query the information about all boards in a subrack or
o
ti

board in a specified slot. When you need to query the slot number, name, status,

ic a
if
daughter board information, port information, or online status of a board after

rt
performing an operation on the board, run this command.
 User guide
Ce
&
If you specify only the subrack number, the system queries the information about all
ng

ni
boards in the entire subrack. The following information can be queried: slot number,

a i
board name, board status, daughter board name, and online status of the board

T rIf you specify the subrack ID and slot ID, the system queries the detailed information
i

e about the board with the specified subrack ID and slot ID. The following information
a w can be queried: board name, board status, and port information of the board

Hu  When querying the activation information about service boards and ports, you can
query the total number of activated and inactive ports.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 You can add a board in either of the following H u
ways:

Add a board offline. That is, run thenboard add command to add a board in an
ioalarm indicating that the board is faulty. Then,

t
empty slot. The system reports an
athe corresponding slot. If the type of the inserted
ic
tiftype of the board added offline, the system reports a board
manually insert the board into

r
board is the same as the
e(alarm ID: 0x02310000). If the types are inconsistent, an alarm
C
fault recovery alarm

&
with ID 0x02300082 is reported.

n g
Automatically discover the board. Insert the board into an idle slot. The system
i

inneed to run the board confirm command to confirm the automatically


displays a message indicating that the board is automatically discovered. In this case,
a
T rdiscovered board.
you

ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 board delete
Hu

o n
This command is used to delete a board from a subrack. Run this command to set a

ti
slot to the idle state if the board in the slot is faulty and removed, and no other

ic a
board is registered in the slot. After the board is deleted successfully, you can add a

if
new board in the idle slot.
 board reset
e rt
 This command isC used to reset a board in a specified subrack or slot. Run this

by resetting&
command when locating a fault or when a service is faulty and cannot be recovered

n g the chipset on the board. For example, if you need to set the value of
i
some performance statistics to 0, the setting takes effect only after the board is reset.
in a board is reset successfully, all the data configured on the board is reset to 0.
After
a
r Note: Exercise caution when running this command. Do not reset the board
iT

e
unless necessary. Otherwise, services may be affected.

a w  To reset the control board or the system, run the reboot command instead of the

Hu board reset command.


 board prohibit
 The board prohibit command is used to disable a board. Run this command when
you need to locate, diagnose, and rectify a faulty service board. After a board is
disabled, services on the board are interrupted until the board is enabled.
 Note: Disabling a board interrupts services. Exercise caution when running this
command.
 The undo board prohibit command is used to enable a board that has been
disabled. After a board is enabled, the services on the board are restored.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu are used to transmit management
In out-band management mode, non-service channels

n
information so that management channels are separated from service channels. The out-
band management mode provides moreoreliable device management channels than the in-
band management mode. When anaMA5680T ti
c
quickly located and monitored fini real time.
is faulty, the device information can be

r ti

C
The MA5680T is connected e to a LAN through a straight-through cable. The IP address of
&operation console. Note: You can directly connect the network port of
the maintenance network port of the MA5680T must be in the same network segment as

g
the IP address of the
nconsole to the maintenance network port of the MA5680T control board for
i
the operation
out-bandin
r a management using a crossover cable.
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 interface meth Hu
n
This command is used to enter Meth mode from global config mode. Run this
o
ti

command when you need to configure the parameters such as the IP protocol,

ic a
if
firewall, and duplex status of the maintenance network port.

 ip route-static
e rt
C command is used to configure a static unicast route. If the
The ip route-static
& is simple, you only need to configure static routes to ensure the

network structure
g
normalnoperation of the network. After static routes are created, network devices
i
ncommunicate
a i
can with each other at Layer 3.

T rThe undo ip route-static command is used to delete a static unicast route. If a fault
i

e occurs on the network or the topology changes, the static routes do not change
a w automatically, and you need to run this command to delete the static routes.

Hu  ip route-static user guide


 If the destination IP address and mask are both 0.0.0.0, the configured route is the
default route. If the route matching fails, the default route is used for packet
forwarding.
 Different priorities can be configured to implement different routing management
policies. For example, if multiple routes are configured for the same destination with
the same priority, route load balancing is implemented. If different priorities are
specified, route backup is implemented.
 When configuring a static route, you can specify the transmission interface or next
hop address as required. For an interface or point-to-point interface that supports the
resolution from the network address to the link layer address, you can specify the
transmission interface or the next hop address.

 In some cases, for example, when the link layer is encapsulated by PPP, even if the
peer address is not known, the outbound interface can be specified when the router
is configured. In this way, even if the peer address changes, the configuration of the
n
it o
router does not need to be changed.

 A maximum of 1000 static routes can be configured on the public network.


ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
o n
a ti
ic
r tif
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu messages are transmitted through
In in-band management mode, management interaction

ninconvenient.
a service channel of a device, the networking is flexible, and no additional device is required.
o
ti
This saves the cost but makes maintenance

ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Standard VLAN: One Standard VLAN contains onlyumultiple upstream ports. Ethernet ports

H
in a VLAN can communicate with each other, and Ethernet ports in different VLANs are
isolated from each other.
o n
The interface vlanif command is used
a ti to create a VLAN interface in global config mode
c When you need to configure the virtual L3 interface in

f
and enter the VLAN interface mode.
i
r
VLANIF mode, run this command.
ti

Ce cangroup,
In VLANIF mode, you
group, MPLS command
configure the DHCP command group, firewall, IP command
DHCP server group, and ARP command group of a
&
VLAN interface.

n g

i
You can create a VLAN interface or enter the corresponding VLAN interface mode
onlynafter the VLAN is created.
a i
T rThe system supports a maximum of 32 VLAN L3 interfaces.
i in the system must be unique. An existing VLAN cannot be created again.

eVALNs
w

u a Before deleting a VLAN, you need to delete the L3 interfaces, upstream ports, and service

H
ports of the VLAN. If the MPLS function is enabled in the VLAN, you must disable the MPLS
function before deleting the VLAN.
 Run the undo port vlan command to delete upstream ports.
 Run the undo service-port vlan command to delete service ports.
 Run the undo interface vlanif command to delete L3 interfaces.
 Run the undo mpls command to disable the MPLS function.
 The system supports a maximum of 4000 VLANs. The default VLAN ID is 1 and cannot be
created or deleted.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the display ip interface command Hu

This command is used to query the n IP configuration and statistics of an interface. Run
this command when you need toio

t query the number of packets, bytes, and multicast


aan interface, and the number of broadcast packets
ic
tif and discarded by the interface.
packets received and sent by

r
received, sent, forwarded,

Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Hu users from logging in to the device.
There are multiple methods to prevent unauthorized

n
For example, you can set an access control list or configure the access mode and network
segment. You can also enable multiple o
ti
modes at the same time.

i a
c the packets that access the management interface
f
Configure the system firewall to control
ti

r
of the device to prevent unauthorized users from accessing the system in in-band or out-

Ce
band mode.

&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 1u
Wildcard mask: 0 indicates strict matching, andH indicates random matching. In the

n
permitipsource 10.10.21.0 0.0.0.255 example, terminals whose IP addresses are in the
o
ti
10.10.21.0–255 range can access the system.

ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Functions of the sysman ip-access command Hu
n
This parameter specifies the IP address segment that is allowed to access the device
o
ti

over a specified protocol. Run this command when you need to set a firewall for

ic a
if
users who access the device to prevent unauthorized users from logging in to the

rt
device. After the configuration succeeds, the users who do not meet the address and

Ce
access protocol requirements will be denied access to the device.

&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Reference answers:
Hu
n
1. The advantages and disadvantages are as follows:
o

ati
In-band mode: A maintenance terminal communicates with the host through

c
the upstream service Ethernet port of the device.
i
tif is flexible and no additional devices are required, saving
Advantages: The networking
r
Cea service channel is faulty, maintenance cannot be performed.
the cost.
Disadvantages: When
& mode: A maintenance terminal communicates with a device through

g
Out-band
n Ethernet maintenance port on the control board.
ithe

a in Provides more reliable device management channels. If a managed device


Advantages:

T r the information about the device on the network can be located in time.
is faulty,
i Disadvantages: A separate network is required to provide maintenance channels
eirrelevant
a w to service channels.

Hu 2. Apply an ACL to the in-band (out-band) interface. Use sysman ip-access to filter
addresses and accessed services.
3. Common maintenance methods are classified as follows:
 By maintenance interface:
GUI mode: U2000/eSight NMS
CLI mode: Console/Telnet remote login
 By maintenance port
Serial port maintenance mode: Console (CLI)
Network port maintenance mode: Out-band (CLI or GUI) and in-band (CLI or GUI)
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Key points: Hu
n
OLT opens a window to request ONU SNs.
o
ti

 An ONU reports the SN.


ic a

r tif ID to bind with the SN.


The OLT allocates an ONU
The OLT allocates aemanagement GEM port ID.

C
& a management OMCI channel.
The OLT creates

ngreports the password, and OLT authenticates the password (optional)


i
The ONU
in


r a
Ranging:
T
ei ONUs, the OLT must range the actual physical distance of each ONU and add a
 Different ONUs have different physical distances from the OLT. To synchronize all

a w
Hu different delay compensation for each ONU according to the farthest logical distance.
In this way, the logical distances between ONUs and the OLT are the same, and all
ONUs connected to a GPON port are synchronized.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 DBA: dynamic bandwidth assignment
Hu
 GEM: GPON encapsulation mode
o n
 TCONT: transmission container
ati
ic
if
 OMCI: optical network terminal management and control interface

r t
SNMP: Simple Network Management Protocol
e

 DBA profile
C
&
Defines the upstream traffic parameters of the GPON, and binds to T-CONTs to

ng

control the upstream traffic.

i ni
Line profile
a the bottom-layer line parameters of the ONT, such as the DBA profile used by


r
T a T-CONT, GEM port ID, service mapping mode, service type, QoS, and FEC
Defines

ei
aw
encryption enabling status.

Hu
 Service profile
 Defines the types and number of ONT ports, mapping between port IDs and VLANs,
and switching mode between multicast VLAN and VLAN.
 Referenced when the management mode for an ONT to be added is set to OMCI. A
service profile does not need to be configured for the MDU management mode.
 SNMP profile
 When the upper-layer network manages devices through an NMS server, you need to
set SNMP parameters, including the SNMP version, community name, and
destination IP address.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the display DBA-profile all command Hu
This command is used to query all DBA n profiles in the system.
io

Usage
a t
c

i
if 9 default DBA profiles with IDs ranging from 1 to 9. These

r t
The system provides

e
profiles provide typical traffic parameter values.
C

&
You can query and modify the default DBA profiles but cannot delete them.

n g
When you query a specified DBA profile by specifying the profile ID or profile
i

i n name, the system displays the detailed information about the profile. When all
r a DBA profiles are queried, the DBA profiles are displayed in a list.
i T
e
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Functions of the DBA-profile add command Hu
n
This command is used to add a DBA profile. A T-CONT is a physical resource on an
o
ti

ONT, and can carry services only after being bound to a DBA profile. If the default

ic a
if
DBA profiles cannot meet service requirements, run this command to add a DBA
profile.
r t
 Usage
Ce
&
By default, a T-CONT is bound to DBA profile 1.
g

i n system provides 9 default DBA profiles with IDs ranging from 1 to 9. These
in profiles provide typical traffic parameter values.
The

r a
T
ei
 You can query and modify the default DBA profiles but cannot delete them.

a w  When a DBA profile is added, the input bandwidth is rounded down to an

Hu integer multiple of 64. For example: If the input bandwidth is 1022 Kbps, the
actual bandwidth is 960 Kbps.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the ont-lineprofile command Hu
n
The ont-lineprofile command is used to enter the ONT line profile mode to
o
ti

configure the attributes of an ONT line profile. If you enter the ONT line profile mode

ic a
if
for the first time, a default profile is generated.

 Usage
e rt
CID is specified, the system automatically allocates a profile ID and
If no profile
enters&

the line profile configuration mode.


g
n an ONT line profile is created, all parameters of the profile are set the
niWhen

ai

Tr
default values of the current profile type. You can run the display ont-

ei
lineprofile command to query the parameters.

aw
 By default, the profile name is ont-lineprofile_x, where x is the actual profile ID.

Hu
 The ONT FEC function is disabled.

 The mapping mode of the profile is VLAN.


 The QoS mode of the profile is PQ.

 By default, T-CONT 0 is bound to DBA profile 1.

 The system supports a maximum of 8K PON line profiles.


n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the tcont command
Hu

o n
This command is used to bind a T-CONT to a DBA profile. A T-CONT is a physical

ti
resource on an ONT, and can carry services only after it is bound to a DBA profile.

ic a
After the binding succeeds, the T-CONT can provide flexible dynamic bandwidth

if
assignment schemes according to configurations in the DBA profile.
 Usage
e rt
T-CONT 0 C
 is bound to DBA profile 1 by default in the ONT line profile. The DBA
& of other T-CONTs.
profile bound to T-COUNT0 cannot be modified. You can modify the binding
g
relationships
n can run the display ont-lineprofile command to query the information
niYou
ai

about ONT line profiles.


T r

ei
Functions of the gemport add command

aw
 This command is used to add a GEM port. Before configuring the GPON access
service, you must run this command to add a service transmission channel, that is, a

Hu
GEM port. After a GEM port is added successfully, run the ont gemport bind
command to bind it to a T-CONT of an ONT, and then run the ont gemport
mapping command to set up the mapping between the GEM port and a user service
flow. Then, the service flow can be carried by the GEM port.
 Usage
 When adding a GEM port, you must select the correct attributes according to
the service type. The attribute must be set to TDM when the TDMoGEM service
is carried.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the mapping-mode command
Hu

o n
This command is used to create the mapping between GEM ports and services on the

ti
ONT side, that is, to set up the mapping between GEM ports and the data flows of

ic a
the ONT user interface. GEM ports can carry services only after the mapping is set up

if
using this command.

e rt
By default, an ONT supports the VLAN mapping mode.

C mapping mode can be configured.
Currently, only one
You can run& the display ont-lineprofile command to query the mapping mode
gby an ONT.

Functionsn i n
supported

i of the gem mapping command
a gem mapping command is used to create the mapping between GEM ports and
r
T the services on the ONT side, that is, to set up the mapping between GEM ports and
The
i
e the upstream data flows of the ONT user interface. GEM ports can carry services only
a w after the mapping is set up using this command.

Hu  When configuring the mapping between a GEM port and a user service, if no Traffic
Table ID is specified and the QoS mode of the ONT line profile is FLOW-CAR, Traffic
Table 2 is bound.
 When a service flow of the E1 port is mapped to a specified GEM port, the attribute
of the GEM port must be TDM.
 In the same ONT line profile, the mapping between GEM ports and user services
must match the mapping mode supported by the ONT as configured in the profile.
 A bundle group can be used only in port mapping, port + VLAN mapping, port +
802.1p priority mapping, and port + VLAN + 802.1p priority mapping modes. Ports
in different bundle groups and ports inside and outside a bundle group cannot be
mapped to the same GEM port in the preceding 4 mapping modes.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the qos-mode command Hu
n
This command is used to configure the QoS mode in an ONT line profile, that is, the
o
ti

upstream traffic control mode of the ONT. Run this command when you need to

ic a
if
provide end-to-end quality assurance and control the traffic for a user.

 Usage
e rt
C command to enter the global config mode, and then run the
Run the config
& command to enter the ONT line profile configuration mode.

ont-lineprofile
g
n default, the QoS mode of an ONT line profile is the priority queue
niBy

ai

Tr
scheduling mode.

ei
 You can run the display ont-lineprofile command to query the QoS mode of

a w a profile.

Hu  Functions of the commit command

 The commit command is used to commit the current parameter configurations of a


service profile or line profile. When configurations are committed, the system checks
the validity of the parameters of the service profile or line profile. If the parameters
pass the check, the system uses the new parameter configurations to update the
system running data.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the ont-srvprofile command Hu
n
The ont-srvprofile command is used to enter the ONT service profile mode to
o
ti

configure the attributes of an ONT service profile. If you enter the ONT service profile

ic a
if
mode for the first time, a default profile is generated.

 Usage
e rt
CID is specified, the system automatically allocates a profile ID and
If no profile
enters&

the corresponding service profile configuration mode.


g
n an ONT service profile is created, all parameters of the profile are set the
niWhen

ai

Tr
default values of the current profile type. You can run the display ont-

ei
srvprofile command to query the parameters.

aw
 Default configurations of an ONT service profile are as follows:

Hu
 MAC address learning is enabled.

 ONT transparent transmission is disabled.


 The multicast forwarding mode is unconcern.

 The profile description is ont-srvprofile_x, where x is the profile ID.

 The configuration of the ONT port is null by default.


 The system supports a maximum of 4K ONT service profiles of the PON type.
 When the ONT management mode is OMCI, an ONT service profile must be
bound.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the ont-port command
Hu

o n
This command is used to set the port capability set in an ONT service profile, that is,

ti
to set the number of various ports on an ONT.
 Usage
i c a

r t af port existsof according


When setting the iattributes an ONT port in an ONT service profile, you need
e
to check whether to the specified number of ports. If
you do notCuse this command to set the number of ONT ports, the default
&
number of all types of ports on the ONT is 0.
g
in vlan command is used to configure the VLAN of the User Network
 Functions of the port vlan command
Thenport

a i (UNI) port in an ONT service profile. When you need to manage the
T rattributes of an UNI port of the ONU remotely and add the UNI port to a VLAN, run
Interface

ei this command.
a w Usage
u

H  Supports the VLAN configuration of the Ethernet and MOCA ports, and sets
the VLAN of an ONT port. You can add a port to a VLAN or delete a port from
a VLAN.
 Supports the configuration of the transparent transmission mode of the ONT
and ETH ports. In this case, you do not need to specify the VLAN ID, and just
need to enter the keyword transparent.
 Supports the configuration of VLAN+ switching for the ONT and ETH ports.
Enter the keyword translation, VLAN, priority, and packet encapsulation type
before and after the translation.
 The ONT and ETH port transparent transmission and VLAN translation can be
deleted.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the multicast-forward commandHu

n
This command is used to set attributes such as the multicast forwarding mode and
multicast forwarding VLAN of anio

a t ONT in an ONT service profile.

ic
 Usage
r t if

srvprofileC
e
Run the config command to enter global config mode, and then run the ont-
command to enter ONT service profile configuration mode.
&
g
Functions of the igmp-forward command
in is used to configure the upstream IGMP packet forwarding mode for

Thisncommand

i
aaGPON ONT in an ONT service profile. The mode can be transparent transmission,
T rVLAN translation, or ignore.
ei Usage
a w 

Hu  Run the config command to enter global config mode, and then run the ont-
srvprofile command to enter ONT service profile configuration mode.
 This command is used to set the upstream IGMP packet forwarding mode of a
GPON ONT.

 The default forwarding mode is Ignore. If the translation mode is specified, you
also need to enter the VLAN after the translation.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the snmp-profile add command Hu

This command is used to add an SNMPn management profile. After an SNMP profile is
io take effect when an ONT is bound to the SNMP

t
added successfully, the parameters
a
management profile.
ic
f of an ONT is SNMP, you can bind an SNMP
r timode
Ceto the ONT.
 When the management
management profile
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Functions of the port ont-auto-find commandHu

This command is used to enable or n disable the ONT auto-discovery function of a


GPON port. After the automaticiONT o discovery function is enabled, the OLT

t
aONTs.
ic
tif
periodically searches for new

r
Ce command to enter global config mode, and then run the
 Usage

Run the config


& gpon command to enter GPON mode.

interface
g
n default, the ONT auto-discovery function of a GPON port is disabled.
i
in After a new ONT goes online, the board reports a group of ONT information to
 By

a
r be confirmed to the CLI terminal, and stores the information in an ONT
T

ei
a w registration buffer for confirmation.

Hu  ONTs can be added in 2 modes. You can run the ont add command to add an
ONT offline or run the ont confirm command to confirm an automatically
discovered ONT.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the ont confirm command Hu
n
This command is used to confirm an ONT that is in the auto-discovery state. If the
o
ti

ONT auto-discovery function is enabled on the OLT, after an ONT goes online, the

ic a
if
OLT obtains the registration information about the automatically discovered ONT and

r t
the ONT is in the auto-discovery state. After you run this command to confirm the

Ce
ONT, the ONT enters the normal working state.
 Usage
&
g
n the config command to enter global config mode, and then run the
iRun
in interface gpon command to enter GPON mode.

r a
T
ei
 When confirming an automatically discovered ONT, you must specify the ONT
capability set profile.
a w
Hu  You must select correct and existing profiles for an ONT to be confirmed. The
profiles define the specifications and capabilities of the ONT. If the ONT profiles
are set incorrectly, the ONT fails to work properly after going online.

 It is recommended that you add location and time information to each ONT to
facilitate fault location and maintenance.
 The SNs of ONTs configured in the same system must be unique.
 The OLT can manage ONTs in SNMP or OMCI mode. If an ONU functions as an
independent NE and is managed by the NMS, select the SNMP management
mode. If an ONU is not managed as an independent NE and all its
configurations are managed by the OLT through the OMCI protocol, select the
OMCI management mode.
 For ONUs in SNMP management mode, you only need to configure the GPON
line parameters and management channel parameters on the OLT. This type of
n
it o
ONU supports a maximum of 128 GEM ports.

 For ONUs in OMCI management mode, you need to configure all parameters
ic a
if
rt
(including the line parameters, UNI port parameters, and service parameters)

Ce
required by the ONU on the OLT. This type of ONU supports a maximum of 32
GEM ports and does not support the configuration of management channel
parameters. &
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the ont add command Hu
n
This command is used to add an ONT and specify configuration data for the ONT.
o
ti

Run this command to add an ONT and configure services offline. After the ONT goes

ic a
if
online, the configuration data is delivered to the ONT through the ONT management

r t
protocol to complete the configuration. After an ONT is added successfully, you can

Ce
configure various services for the ONT. When the ONT is not in position, the

&
configurations are temporarily stored on the service board.

Usage
ng
niRun the config command to enter global config mode, and then run the

a i

T r interface gpon command to enter GPON mode.

ei By default, the ONT capability set profiles 1–7 are the ONT capability set profile
w

u a of the default GPON port.

H  When adding an ONT, you must specify an ONT capability set profile.
 A correct and existing ONT service profile needs to be selected for the added
ONT. The profile defines the specifications and capabilities of the ONT. If the
ONT service profile is incorrectly set, the ONT fails to work properly after going
online.

 It is recommended that you add location and time information to each ONT to
facilitate fault location and maintenance.
 The passwords of the ONTs connected to the same port must be unique.
 The SNs of ONTs configured in the same system must be unique.
 The OLT can manage ONTs in SNMP or OMCI mode. If an ONU functions as an
independent NE and is managed by the NMS, select the SNMP management
mode. If an ONU is not managed as an independent NE and all its
configurations are managed by the OLT through the OMCI protocol, select the
OMCI management mode.
n
For ONUs in SNMP management mode, you only need to configure the GPON it o
a

line parameters and management channel parameters on the OLT. This type of
if ic
rt
ONU supports a maximum of 128 GEM ports.


Ce
For ONUs in OMCI management mode, you need to configure all parameters

&
(including the line parameters, UNI port parameters, and service parameters)
required by the ONU on the OLT. This type of ONU supports agmaximum of 32

n in channel
ai
GEM ports and does not support the configuration of management
parameters.
T r
e i
a w
H u
o n
a ti
i f ic
e rt
C
&
n g
ni
a i
Tr
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the vlan command Hu
n
This command is used to add one VLAN or multiple VLANs of the same type in
o
ti

batches. When you need to use a VLAN to communicate with a peer device, run this

ic a
if
command to create a VLAN.

 Usage
e rt
C already exists in the system cannot be created.
A VALN that
&

g
The system supports a maximum of 4000 VLANs. The default VLAN ID is 1 and
n be created or deleted.

nicannot

a i

r
Functions of the port vlan command
T This command is used to add an upstream port to a VLAN. You need to add an
e i 

a w upstream port to a VLAN so that user packets with the VLAN ID can be transmitted

Hu upstream through the upstream port.


n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Functions of the service-port command Hu
n
The service-port command is used to create a service port to connect user devices.
o
ti

A service port is connected to a user device to form a service flow so that the user

ic a
if
can access the service flow. After the command is executed successfully, a service

rt
can be carried on the service port.
e

C
Functions of the ont ipconfig command
& command is used to set the IP address of an ONT. If the ONT
The ont ipconfig
g

i n mode is SNMP, you can run this command to specify the IP address of
management

a inONT and configure the gateway and management VLAN at the same time.
the

T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the ping command
Hu

o n
This command is used to send ping packets to a remote host to check whether the

ti
network host is reachable. It is used to check whether the network connection is

ic a
faulty and check the network line quality. When a target host is reachable, the

if
system returns the number of sent packets, number of packets responded to,

r t
percentage of unresponded packets, and minimum, maximum, and average response

faulty. Ce
time. When a target host is unreachable, the network connection or network line is

Usage &
g

Ifnno response packet is received within the timeout period, "Request time out"
i
in isresponse

displayed. Otherwise, the number of bytes, sequence number, TTL, and


r a time of the response packet are displayed.
T
ei
 The final statistics include the number of sent packets, the number of packets

a w responded to, percentage of unresponded packets, and the minimum,


maximum, and average response time.

Hu  If the network transmission speed is slow, you can increase the timeout period
for waiting for response packets.
 The ping command does not allow users to send ping packets to broadcast
addresses, such as XX.XX.XX.255.
 Telnet Command Function
 This command is used to log in to a remote server or host to configure and maintain
the device.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 display ont info Hu
n
This command is used to query the information about an ONT, including the current
o
ti

status and configurations.

ic a
 Usage
r tif

Ce
Run the config command to enter global config mode, and then run the
interface gpon command to enter PON mode.
&
ng
 An ONT has 3 states: running, configuration, and matching.

i niThe running status of an ONT indicates whether an ONT is currently online and
a whether it can carry services. If the running status of an ONT is DOWN, you

T r
ei cannot query the ONT version, ONT FE, or GEM port statistics of the ONT, and

aw
the ONT cannot carry services. If the running status of an ONT is UP, the ONT is

Hu
online, and whether it can normally forward services depends on the ONT
configuration status.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 display ont capability Hu
n
This command is used to query the actual capabilities of an ONT. After querying the
o
ti

actual capabilities of the ONT, you can create an appropriate ONT capability set

ic a
if
profile accordingly.

 Usage
e rt
C command to enter global config mode, and then run the
Run the config
& gpon command to enter GPON mode.

interface
g
n ONT must be online. Otherwise, the query fails.
niThe

ai

Tr
 You can also run this command to query the hardware capability parameters of

ei
an ONT in the Mismatch state and bind it to a correct ONT capability set profile.

a w  The hardware capability parameters of an ONT include the type and number of

Hu ONT ports and the number of port queues.


n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 display ont capability Hu
n
This command is used to query the actual capabilities of an ONT. After querying the
o
ti

actual capabilities of the ONT, you can create an appropriate ONT capability set

ic a
if
profile accordingly.

 Usage
e rt
C command to enter global config mode, and then run the
Run the config
& gpon command to enter GPON mode.

interface
g
n ONT must be online. Otherwise, the query fails.
niThe

ai

Tr
 You can also run this command to query the hardware capability parameters of

ei
an ONT in the Mismatch state and bind it to a correct ONT capability set profile.

a w  The hardware capability parameters of an ONT include the type and number of

Hu ONT ports and the number of port queues.


n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the display ont config-capabilityH u
command

This command is used to query the n ONT capabilities configured by a user. The
iochecked against the actual capability set of the

t
queried ONT capability set can be
a
ic
tif
ONT for consistency verification.

r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Functions of the display ont version command Hu
This command is used to query the n
information about the ONT version, including the
o manufacturer of the ONT.
software and hardware versionsiand

a t
ic
tif
 The version information can be queried only when an ONT is online.
r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu
Functions of the display ont optical-info command

This command is used to query the n information about an ONT optical module,
io transmit optical power, bias current,

t
including the receive optical power,
a of the ONT received by a PON port.
ic
tifinformation of a single ONT can be queried.
temperature, and optical power

r
Ce
 Only the optical module

&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the ont port native-vlan command u

H

o nthe native VLAN of an ONT port, run this


This command is used to configure the native VLAN of an ONT port in GPON profile

ti of an ONT port is configured successfully:


mode. When you need to re-specify
command. After the native VLAN
If the VLAN ID of an ONTfiport
a
c is the same as the ID of the native VLAN, the packets

r i
of the ONT port do nott contain the VLAN tag (untagged).

e
If the VLAN ID ofCthe ONT port is different from the ID of the native VLAN, the
&
packets of the ONT port contain the VLAN tag.
Usage g

i n the config command to enter global config mode, and then run the
a in interface gpon command to enter GPON mode.
 Run

T r
ei
 By default, all ports on an ONT belong to VLAN 1, and the native VLAN is

a w VLAN 1.

Hu  Before configuring a native VLAN, ensure that the port has been added to the
VLAN. You can run the ont port vlan command to add a port to a VLAN.
 If the native VLAN is configured more than once, the last configuration takes
effect.
 When you configure a service port and the specified user-side VLAN changes:
 If untagged packets are uploaded from the corresponding ONT port, the native
VLAN of the port must be the same as the user-side VLAN.
 If tagged packets are uploaded from the corresponding ONT port, the native
VLAN of the port does not need to be reset.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the ont modify command Hu
n
This command is used to modify the configuration data of an ONT. If the ONT
o
ti

configuration data (such as the authentication mode, serial number, and password) is

ic a
if
different from the actual ONT configurations, the ONT cannot go online. In this case,

rt
run this command to correct the ONT configurations.
 Usage
Ce
&
Run the config command to enter global config mode, and then run the
ng

niThe ONT configurations that can be modified include the serial number,
interface gpon command to enter GPON mode.

a i
Tr

ei
authentication mode, authentication password, and description. The capability
set profile bound to an ONT cannot be modified.
a w
Hu  Only one of the sequence code, authentication mode, authentication password,
and description can be modified at a time.
 Answers:

 1. SN

 2. ont-srvprofile
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Functions of the ont delete command Hu
n
This command is used to delete an ONT. When an ONT is deleted, the ONT
o
ti

configuration information is deleted at the same time, and the ONT is forced offline if

ic a
if
it is online. If the ONT configurations, such as the bound capability set profile and

r t
authentication mode, are incorrect, run the command to delete the ONT and add it
again.
Ce
 Usage
&
g
n the config command to enter global config mode, and then run the
iRun
in interface gpon command to enter GPON mode.

r a
T
ei
 An ONT cannot be deleted if it is configured with services, that is, the T-CONT
of the ONT is bound to a T-CONT profile. To delete such an ONT, run the tcont
a w bind-profile command to unbind the T-CONT profile first.

Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Reference answers: Hu
n
1. Specifies the upstream bandwidth and service types of an ONU.
o
a tiONU cannot be registered. If the service profile is
2. If the line profile is incorrect, the

i f
incorrect, class-A ONU servicesic will be unavailable.
e rt Dying-gasp indicates that an ONU goes offline due to
3. Query the ONU information.
C that the fiber is disconnected or broken.
power off. Los indicates
&
g
4. Modify the SN of the registered ONU to be replaced, and connect the new ONU.
n
i
a in
T r
ei
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hufor point-to-point data transmission on
PPP is a point-to-point link layer protocol. It is used

n
full-duplex synchronous and asynchronous links. The PPP protocol has the following
o
ti
advantages:

i a
c and asynchronous transmission. Data link layer
f
PPP supports both synchronous
i Frame Relay (FR) support only synchronous transmission,

protocols such as X.25tand


r
while SLIP supportseonly asynchronous transmission.
C

&
The PPP protocol has good scalability. For example, when the PPP protocol needs to

n g
be carried on the Ethernet link, the PPP can be extended to PPPoE.
i

a in
PPP provides the Link Control Protocol (LCP) protocol to negotiate link layer

T rparameters.
ei PPP provides various network control protocols (NCPs), such as IPCP and IPXCP, to
w

u a negotiate network layer parameters and better support the network layer protocols.

H  PPP provides the Challenge-Handshake Authentication Protocol (CHAP) and Password


Authentication Protocol (PAP) authentication protocols to ensure network security.

 No-retransmission mechanism, low network overhead, and fast speed.


n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The PPP protocol consists of 3 parts: Link Control u (LCP), Network Control Protocol
HProtocol
nis no longer a bottleneck. Therefore, the
(NCP), and extended PPP protocol (such as Multilink Protocol). With the development of
o
tiis less and less, and people tend to ignore PPP
network technologies, network bandwidth

ic a
application of PPP extension protocols
i f
rt
extension protocols.

C e
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The same as many other commonly used data link Hulayer protocols, the PPP protocol also
n
uses the delimitation frame format of the HDLC protocol which originates from the SDLC
o
ti
protocol for packet encapsulation.

ic a
f
The following describes the encapsulation format of the PPP data frame:
ti ends with a flag byte which is 0x7E.

Each PPP data frame starts rand


Cestart flag byte is the address field, which is 0xFF. We know that a

The byte following to the


network is layered,&

peer layers communicate with each other, and a lower layer provides
g
n upper layer. When peer layers communicate with each other, the party
i
services for the
needs toin
a
learn the address of the peer end. In the data link layer, the address refers to the
MACraddress, X.121 address, and ATM address of the peer. In the network layer, the
i T refers to the IP address and IPX address of the peer. In the transport layer, the
eaddress refers to the protocol port number of the peer. For example, if 2 hosts on an
address

a w
Hu Ethernet network want to communicate with each other, the sender needs to learn the
MAC address of the receiver. The PPP protocol, however, is used on point-to-point links.
Unlike a broadcast or multipoint network, a point-to-point link can uniquely identify a peer.
Therefore, the communication devices at two ends that use the PPP protocol do not need
to know the data link layer address of each other. The corresponding address byte is
meaningless and filled with a broadcast address with all 1s according to the protocol
requirement.
 Same as the address field, the control field of a PPP data frame is meaningless. According
to the protocol, the communication parties fill the content of the byte with 0x03.

 In terms of the PPP protocol, the most concerned content should be its protocol and
information fields. The protocol field can be used to distinguish the content of the data
packet carried by the information field in a PPP data frame. As specified in ISO 3309
address extension mechanism, the content of the protocol field must be an odd number.
That is, the least significant bit (LSB) of the lower byte must be 1, and LSB of the higher
n
byte must be 0. If the protocol field of a PPP data frame does not meet the requirements,
it o
the receive end considers that the data frame to be unidentifiable, and sends a Protocol-
ic a
i
Reject packet filled with the content of the rejected packet at the tail to the transmit end.
f
rt
Ce
 The maximum length of the information field cannot exceed 1500 bytes, including filled
content (not indicated in Figure 2-1 because it belongs to the information field). The size of
&
ng
the 1500 bytes is the default value of the Maximum Receive Unit (MRU) in the PPP protocol.

i
In actual applications, the maximum encapsulation length of the information field can be

a in
negotiated. If the information field is less than 1500 bytes, it can be filled up to 1500 bytes,

Tr
but filling is not mandatory. If the information field is filled, both ends of the

ei
communication must be able to identify useful and useless information for normal
communication.
a w

H u
The Maximum Transmit Unit (MTU) parameter is frequently used in many communication

n depending on the devices of different vendors.


devices. For a device, the MTU and MRU are used at the network layer. Generally, the MRU

i o
is a few bytes longer than that of the MTU,
twhether
ic
The CRC field is mainly used to checka a PPP data frame is correct. Certainly, it is
if guarantee mechanisms in the data frames. However,

t
good to introduce some transmission
r
C e
this increases overheads and the delay of application layer interaction.

&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu
To adapt to complex and changeable network environments, the PPP protocol provides a

n parameter options of the PPP protocol,


Link Control Protocol (LCP) to configure and test data communication links. The LCP
o
tidetect link loops and errors, and terminate links.
protocol can be used to negotiate configuration
a
fic a family of protocols for different network layer. The
process data frames of different sizes,


r i
The NCP protocol of the PPPtprovides
common network controleprotocols include the IPCP for the TCP/IP network and the IPXCP
C The IPCP protocol is most widely used. NCP parameters are
&two ends of a P2P network mainly to communicate the network layer
for the SPX/IPX network.

addresses ofin
g
negotiated between
both ends.

a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

H
If data communication device (routers in this context) u at two ends want to establish P2P
communication through the PPP protocol, either end needs to send LCP data packets to
configure the link (test link). After the LCPn
o
configuration parameters are negotiated, the
two communicating parties can determine
t i the authentication modes at both ends of the
c a
i default, the two parties do not authenticate each other.
link based on the authentication configuration parameters negotiated in the LCP
configuration request packet. By
t i fNCP
r
Instead, they directly negotiate configuration parameter options. After all the
configuration procedureseare complete, the two parties can transmit data packets at the
network layer throughC the established link. The link is then available. A link is disconnected
to shut down the PPP& session when either party receives LCP or NCP link shutdown packets,
n g cannot detect the carrier, or when a management person shuts down the
i
the physical layer

inLCP negotiation or application session phase.


link. Generally, the NCP does not need to shut down a link, and link shutdown packets are
a
r the configuration, maintenance, and termination of a P2P link, PPP goes through
sent in the
T
i following phases:
During
ethe

a w
u
 Link unavailability phase: This phase is sometimes referred to as the physical layer

H unavailable phase. All PPP link starts and ends at this phase. When the two ends of a
communication detect that the physical line is activated (generally, a carrier signal is
detected on the link), the next phase starts (that is, the link setup phase). In short, in
link setup phase, the LCP is used to configure link parameters, and the state machine
of LCP changes with events. When a link is unavailable, the LCP state machine is in
the initial or starting state. Once the physical line is detected to be available, the LCP
state machine changes. After a link is disconnected, state machine goes back to the
initial or starting state. In the actual process, the time spent in this phase is very short
to detect only the presence of peer devices.
 Link setup phase: This is the most critical and complex phase of the PPP protocol. In
this phase, some configuration packets are sent to configure the data link. These
parameters do not include the parameters required by the network layer protocol.
After the data packets are exchanged, the next phase (authentication or network
layer protocol phase) starts. The next phase depends on configurations (usually
configured by users) of devices at both ends of the link. However, the PPP module of
an NAS or BAS device needs to support the PAP or CHAP authentication mode by
default. In this phase, the LCP state machine changes twice. Firstly, the state machine
changes from initial or starting to Request-Sent when the data link layer is available
and receives an UP event from the physical layer. After this change, the LCP sends a n
Config-Request packet to configure the data link. When either party receives a it o
Config-Ack packet, the LCP state machine changes again to the Opened state. The
ic a
party that receives the Config-Ack packet completes the current phase and enters the
if
rt
next phase. Note that the link configuration operations are independent at both ends

Ce
of a communication. Any non-LCP packets received in this phase will be discarded. In
actual configurations, there may be many situations in this phase. The LCP protocol
&
describes theses possible situations in detail. However, some troubleshooting cases

ng
may give you a better understanding.
i

a in
Authentication phase: In most cases, devices at both ends of a link need to be

Tr
authenticated before entering the network layer protocol phase. By default, devices

ei
at both ends do not authenticate each other. In this phase, PAP and CHAP
authentication modes are supported. The authentication mode is determined based

a w
on the negotiation result between the two parties in the link setup phase. Link

Hu
quality detection also occurs at the same time, but the protocol does not allow link
quality detection to delay the authentication process without a time limit. In this
phase, only the link control protocol, authentication protocol, and quality detection
o n
data packets are supported. Other data packets are discarded. If a Config-Request

a ti
packet is received again in this phase, the PPP protocol goes back to the link setup
phase.
i c
f Once PPP completes the previous phases, each
Network layer protocoltiphase:

e
network layer protocolr (IP, IPX, and AppleTalk) performs configurations using the
C control protocols, and each NCP protocol can be enabled
corresponding network
and disabled& at any time. When the state machine of an NCP changes to the Opened
state, PPPgcan start carrying data packets of the network layer on the link. If a
i n
Config-Request packet is received again in this phase, the PPP protocol goes back to
thein
a
link setup phase.

TrLink termination phase: The PPP can terminate the link at any time if the carrier is lost,
ei

the authorization fails, the link quality detection fails, or an administrator shuts down

a w the link manually. In the link setup phase, the link can be shut down by exchanging

Hu LCP termination packets. When a link is shut down, the link layer instructs the
network layer to perform related operations, and forcibly shuts down the link at the
physical layer. The NCP protocol does not need to shut down any PPP links.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 LCP data packets are exchanged during link setup. HuAs the payload of PPP packets, LCP
nto 0xC021, but the information field changes
packets are encapsulated in the information field of PPP data frames. In this case, the
o
ti many types of packets to be distinguished by the
protocol field of a PPP data frame is fixed

c a
during the link setup phase, containing
corresponding fields. The figurefishows a common encapsulation mode for LCP data
rt i
packets.
e
The length of the codeC
&
 field is one byte, which is used to identify the type of an LCP data

ng it sends an LCP Code-Reject packet to the sender.


packet. In the link setup phase, if the receiver receives an LCP packet with a code field that
i
cannot be identified,
n also contains 1 byte, which is used to match request and response packets.
a ifield

T r in the link setup phase, both ends of the communication send several Config-
The flag

i packets which may have the same data fields but different flag fields. The ID of a
Generally,
eRequest
a w
Hu Config-Request packet usually starts from 0x01 and is incremented by 1. After the peer
receives the Config-Request packet, it responds with a packet (Config-Ack, Config-Nak, or
Config-Reject) with the same ID as that in the Config-Request packet. After receiving the
response packet, the sender of the Config-Request packet compares the response packet
with the Config-Request packet to determine the next operation.
 Content of the length field = Total byte length (code field + flag field + length field + data
field). The bytes not indicated by the length field are considered as padding bytes and
ignored. In addition, the content of length field cannot exceed the MRU value.
 The content of the data field varies depending on LCP data packets.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu
Link termination packets are classified into Terminate-Request and Terminate-Reply packets.

n
LCP packets provide a mechanism to shut down a P2P connection. If one party wants to
shut down a link, it continuously sends o
ti After receiving a Terminate-Request packet, the
Terminate-Request packets until receiving a

ic
Terminate-Reply packet from the peer. a
t i f
receiver must respond with a Terminate-Reply packet, wait for the peer end to disconnect
the link, and then completerall the link shutdown operations on the local end.
C e
& packet does not need to carry options of configuration
 The data field of an LCP link termination packet is different from that of a link configuration

g
packet. A link termination
n IDs of link termination packets must also be consistent. A link is terminated
parameter. iThe

a
only when inthe Terminate-Reply packet is received.
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

H u 2 types of packets, and are used to
Link configuration packets are different from the other
negotiate the configuration parameter options of the link. Therefore, the data fields of this

o n
type of packets need to carry various configuration parameter options.

a ti
Link configuration packets include Config-Request, Config-Ack, Config-Nak, and Config-
ic

f
Reject packets.
When a link needs to be set t i
rup between the two communicating parties, either party needs
e

negotiated. C
to send Config-Request packets which carry the configuration parameter options to be

&

n g
Upon receiving a Config-Request packet, the receiver selects one of the remaining 3 packet
i
types to respond to the request packet based on the following conditions:

a in the type fields of all configuration parameter options can be identified. One
Whether
rConfig-Request packet may carry multiple configuration parameter options at the

T
ei necessarily support all configuration options. Even if a configuration option is
same time, but a communication device that supports the PPP protocol does not

a w supported, the function may also be disabled in actual applications. For example, a

Hu device that supports PPP protocol may disable all configuration options and support
only 0x01 and 0x03. In this case, if a Config-Request packet received from the peer
end contains the 0x04 configuration option, the local end regards configuration
parameter option as unidentifiable, and the negotiation of the configuration
parameter option fails.
 Whether the type fields of all configuration parameter options are acceptable. A peer
that can identify configuration parameter options in a received Config-Request
packet does not necessarily accept the negotiation. For example, if one party wants
the magic number to be set to all 0 but the peer end wants to set it otherwise, the
negotiation fails.
 Response packets are selected based on the 2 two conditions to respond to configuration
request packets.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu all configuration parameter options
If the receiver of a Config-Request packet can identify

n
and accepts the parameter options, the receiver places configuration parameter options
without any change in the data field of o
ti According to the protocol, the sequence of
a Config-Ack packet, and sends the Config-Ack
packet as a response to the requestasender.
i f iccannot be changed. After the Config-Request sender
rt from the peer end, the next phase starts.
configuration parameter options

e
receives the Config-Ack packet
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu all configuration parameter options
If the receiver of a Config-Request packet can identify

n parameter options and the acceptable values


but accepts only some of the parameter options, the receiver returns a Config-Nak packet
o
tithe Config-Nak packet, the request sender sends
that contains only unacceptable configuration
a
ic acceptable parameter options the same as those in the
to the request sender. Upon receiving
another Config-Request packetfwith
i
rt parameter options set to the values acceptable to the
receiver (as specified inC
e
previous one and unacceptable
the Config-Nak packet).
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 If the receiver of a Config-Request packet cannot u all configuration parameter
Hidentify
n
options, the receiver returns a Config-Reject packet that contains only parameter options
whose type field cannot be identified toothe request sender. Upon receiving the Config-
a ti another Config-Request packet with identifiable
ic in the previous one and unidentifiable parameter
Reject packet, the request sender sends
parameter options the same asfthose
rt i
options deleted.
e
It can be seen that theC
&
 link configuration phase may involve several rounds of negotiations

ngcomplete the negotiation process of their respective configuration parameter


depending on devices at the two ends of a P2P link. The two parties of a PPP link
independentlyi
options.in
r a
i T
e
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

H
The magic number is negotiated in LCP Config-Request u packets and can be used by other
types of LCP packets, such as Echo-Request, Echo-Reply, and Quality-Protocol packets. The

o
PPP protocol does not require the negotiation n of the magic number. If the magic number is
not negotiated between the two parties
t i needs to be used in some LCP packets, the
but
c a
fi
magic number is filled as 0. If the magic number is negotiated, it is set to the negotiation
result.
t i
The magic number needs tor be negotiated on all current devices, and is sent in the

C e of a Config-Request packet. A magic number is generated


configuration option parameters
&
by a communication device randomly and must be unique in a data link to avoid
g
communication conflicts. Generally, a magic number is the series number, network
nnumberorcannot
i
hardware address, clock of a device. The possibility that the two parties generate the
same magic
of thera
in be eliminated but should be avoided if possible. If two devices
same manufacturer are interconnected, they may generate the same magic number
as T
i the method for generating magic numbers is the same for the devices produced by the
e manufacturer.
same
a w
u
 Magic numbers are used to check whether a loop exists on a link. Upon receiving a Config-

H Request packet, the receiver compares the packet with the Config-Request received last
time. If the two packets contain different magic numbers, no loop exists on the link. If the
magic numbers are the same, the receiver considers that a loop may exist on the link, and
further confirmation is required. In this case, the receiver sends a Config-Nak packet
carrying a new magic number, and does not send any Config-Request packet before
receiving a Config-Request or Config-Nak packet. There are two possibilities in this scenario:
 There is no loop on the link, but the two parties generate the same magic number.
The probability of this scenario is very low. After receiving a Config-Nak packet, the
receiver sends a Config-Request packet containing a magic number the same as that
in the Nak packet. After receiving the Config-Request packet, the peer compares the
received Config-Request packet with the previous one. If the magic numbers are
different, the peer determines that there is no loop on the link.
 A loop exists on the link and a Config-Nak packet returns to its sender after a period
of time. In this case, the sender compares the Config-Nak packet with that sent last

n
time. If the magic numbers in the packets are the same, the possibility of a loop on

it o
the link increases. According to the protocol, if one party receives a Config-Nak

a
packet, it sends another Config-Nak packet with the same magic number as that in
Config-Nak. In this case, the Config-Request and Config-Nak packets are
if ic
rt
continuously generated on the link. After the number of Config-Request and Config-

Ce
Nak packets reaches a certain value, the receiver determines that a loop exists on the
link.

&
However, in actual applications, there are 2 methods for determining whether a loop exists

ng
depending on how a device implements the PPP protocol. The first method is described
i
in
above. This process repeats until the LCP state machine receives a Down event, returns to

a
the initialization phases, and starts a new round of negotiation. The second method does

Tr
not change state of the LCP state machine. Instead, the state machine stays in the request

ei
sending state. In this case, the device that suspects a loop on the link needs to continuously

w
send Echo-Request packets to check whether the link loop is removed. After an Echo-
a
Request packet is received, it is considered that the link loop is removed, and the

Hu
subsequent PPP process may continue.

o n
ati
ic
rt if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu configuration parameters. By default,
The PPP protocol also provides optional authentication

n option at a time (PAP/CHAP as


the two ends of P2P communication do not authenticate each other. An LCP Config-
o
tiwith the PPP device). A device usually supports a
Request packet can carry only one authentication
a
icfor most devices). After receiving a configuration request
configured on a device interconnected
i f
rtwith a Config-Ack packet if it supports the authentication
default authentication mode (PAP

e
packet, the receiver responds
C parameter option; otherwise, it responds with a Config-Nak
mode in the configuration
packet containing & the supported authentication mode. If the request sender receives a
g
in
Config-Ack packet, the authentication starts. If the request sender receives a Config-Nak
packet, itn
a i in the Config-Nak packet. If yes, the request sender responds with a new Config-
responds to the peer depending on whether it supports the authentication mode

T r
proposed
i (containing the authentication protocol proposed in the Config-Nak packet);
eotherwise,
Request

a w the request sender responds with a Config-Reject packet, and the two parties

Hu cannot pass the authentication. In this case, a PPP link cannot be set up.

 PPP supports two authorization protocols: Password Authentication Protocol (PAP) and
Challenge Hand Authentication Protocol (CHAP).
 Before using PAP authentication, the two devices should confirm which party is the
authenticating party and which party is the authenticated party. Actually, the two ends that
use the PPP protocol can act as both the authenticating and authenticated parties.
Generally, PAP executes authentication in only one direction. Before devices at both ends
use the PAP protocol, certain configurations must be performed on the devices. For
broadband engineers, the MA5200 is a most familiar product. By default, the MA5200
functions as the authenticating party. You can run the PAP Authentication PAP/CHAP
command to change the authentication mode. For the authenticated party, you only need
n
to set the user name and password. it o
ic a
 PAP authentication is a 2-way handshake. In the link setup phase, if PAP authentication is
if
used, the authenticating party sends a Config-Request packet carrying the authentication
rt
Ce
configuration parameter option. After receiving the configuration request packet, the

&
authenticated party only needs to return a corresponding packet to the peer end according

ng
to its own situation. If the two devices at both ends use PAP bidirectional authentication,

n i
that is, the authenticated party also needs to authenticate the other party, the
i
a authentication
authenticated party needs to send a request packet containing the
r
T is used during the PPP link
i
configuration parameter options. In short, if PAP authentication
setup between two P2P devices, the authenticating partye
w
must send a Config-Request

u a
packet containing the authentication configuration parameter option with a data field set
to 0xC023.
H
When either party in a communication process n receives the Config-Ack packet from the
iofrom the link setup phase. In this case, the

peer, it enters the authentication phase


t
aaPAP authentication request packet to the
authenticated party needs to send
ic
r t
authenticating. The request packetif carries a user name and a password. After receiving the
C e the authenticating party searches the local database
authentication request packet,
according to the actual content in the packet. If the database has an option that is
consistent with the&
g user name and password, the authenticating party sends an
n response to the peer, indicating that the authentication is successful. If the
i
authentication

a
user nameindoes not match the password, the authenticating party sends a response
T r an authentication failure to the peer. If both ends are configured as
indicating
i
eauthenticating parties, the network layer protocol phase starts only after authentication

a w succeeds in both directions. The link status changes back to link unavailable if the

Hu authentication in either direction fails.


n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Hu is more secure. In PAP
Compared with PAP authentication, CHAP authentication

n
authentication, the user name and password are directly sent to the authenticating party in
o
ti
plain text, which is not the case in CHAP authentication.

i a
c It transmits user names on the network without
f
CHAP is a 3-way handshake protocol.
passwords. Therefore, CHAPtisi more secure than PAP. Unlike PAP which requires the

e ran authentication request packet when the authentication


C authenticating party to send a random packet with its host name.
authenticated party to send

&a challenge. Upon receiving the authentication request, the


starts, CHAP requires the

g
This process is called
nparty extracts the host name, and searches the corresponding key in its
i
authenticated

a in database. Then the authenticated party generates a response packet using the
background
MD5T rencryption algorithm based on the key, packet ID, and random packet received from
i authenticating party. The authenticated party sends the response packet with its host
ethe
a w name to the authenticating party. Upon receiving the response from the authenticated

Hu party, the authenticating party extracts the user name of the authenticated party and
searches the corresponding key in the local database. Then the authenticating party
generates a result using the MD5 encryption algorithm based on the key, reserved packet
ID, and random packet. The authenticating party compares the result with response
returned by the authenticated party. If the information is consistent, the authenticating
party returns an ACK packet; otherwise, it returns a Nak packet.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The IPCP uses the same negotiation mechanismH u packet types as the LCP. Although
and

n
their working process and packets are the same, the IPCP does not invoke the LCP.
o
IP address negotiation can be performed
t i static configuration negotiation and dynamic
in
configuration negotiation modes.ca

As shown in the figure, therIP


fi
tiaddresses
e
 of the two routers are 192.168.0.1/30 and
C
192.168.0.2/30 respectively.
The procedure for & negotiating a static IP address is as follows:
g

i nsends a Configure-Request packet containing the locally configured IP address.


n
1. Each party
ireceiving

r
2. Upona a Configure-Request packet, either party checks the IP address. If the IP
T is a valid unicast IP address and is different from the locally configured IP address

i
address
e(no IP address conflict), the current party considers that the peer can use this address and
a w
Hu responds with a Configure-Ack packet.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Huis as follows:
The procedure for negotiating a dynamic IP address

Router A sends a Configure-Request packet n to router B. The packet contains IP address


iorequested from the peer end.

t
0.0.0.0, indicating that the IP address is
a packet, router B considers that the address (0.0.0.0)
ic
tif and responds with a Configure-Nak packet containing the
 Upon receiving the Configure-Request
r
Ce
contained in the packet is invalid
new IP address 192.168.0.1.
Upon receiving the& Configure-Nak packet, router A updates the local IP address and sends
g

i n
another Configure-Request packet containing the new IP address 192.168.0.1.

a in the Configure-Request packet, router B considers that the IP address


r in the packet is a valid address and returns a Configure-Ack packet.
 Upon receiving
T
eIni addition, router B sends a Configure-Request packet to router A to request the address
contained

aw

Hu
192.168.0.2. Router A considers that the address is valid and returns a Configure-Ack
packet.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu
With the development of broadband network technologies, the applications of mainstream

n
broadband access technologies, such as xDSL, cable modem, and Ethernet, are in full swing.
o
ti
At the same time, network operators are confused. Regardless of which access technology
is used, how to effectively managea
c subscribers get profits from network investment are
fi charging becomes critical for various broadband access
t i
their primary concerns. Therefore,
r Ethernet model, there is no concept of subscriber charging.
e
technologies. In the traditional
C IP addresses to access the Internet, or cannot access the
Subscribers can either obtain
& developed the PPPoE protocol to transmit PPP data packets on the
Internet. IETF engineers
g
nnetwork device manufacturers also launch broadband access servers (BASs)
i
Ethernet (using NAS devices to terminate subscriber PPP packets). After the protocol is
n
ai own brands. These BASs support not only the termination of PPPoE data packets,
established,
with rtheir
i Talso many other protocols.
ebut

a w The PPPoE protocol provides a standard for connecting multiple hosts in a broadcast
u

H network (such as an Ethernet) to a remote access concentrator (also called a broadband


access server). In this network model, each subscriber host needs to independently initialize
its own PPP protocol stack. In addition, using features of the PPP protocol, subscribers can
be charged and managed on a broadcast network. To establish and maintain a P2P
relationship between hosts and access concentrators on a broadcast network, a unique P2P
session must be established between each host and the access concentrator.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

HItunot only needs to determine the one-
The PPPoE initialization process is very important.

n
to-one logical relationship on the broadcast network, but also prepares necessary
o
conditions for the PPPoE session, such as
i history, we will review the encapsulation
tPPPoE
the unique session ID allocated by the access
a
ic data packets are encapsulated in the data fields
concentrator. Before introducing the
i f
rt frames for transmission.
format of Ethernet frames. All PPPoE

e
(payload area) of the Ethernet
C is not strange to most network engineers. Currently, most
& 2.0 version. Therefore, EthernetII is widely used as a factual
 The Ethernet frame format

g
networks use the Ethernet
n
i
industrial standard.

a inEthernet destination address (destination MAC address) and Ethernet source


T

raddress (source MAC address) are the most commonly used data link layer addresses.
The

ei They are classified into unicast addresses, multicast addresses, and broadcast
a w
Hu addresses. Unicast and broadcast addresses are used in the PPPoE protocol. For a
data link layer protocol such as PPP, the layer 2 address communication is different
from common layer 2 communications.

 The Ethernet type field is also one of the most concerned fields. It was maintained by
Xerox before 1997, and was handed over to the IEEE802 team later. Based on the
content of this field, the receiver of a data packet can identify the protocol type
carried in the data field of the Ethernet packet. The two phases of PPPoE are
distinguished by the type field of Ethernet packets. In the PPPoE discovery phase, the
Ethernet type field is set to 0x8863. In the PPPoE session phase, this field is set to
0x8864.
 A data field (payload) carries the data packet indicated by the type field. All PPPoE
data packets in the PPPoE protocol are encapsulated in this field for transmission.

 A verification field is used to ensure the correctness of data frame transmission at the
link layer.

 The fields in the PPPoE protocol are described as follows:


 VER: Indicates the PPPoE version number. The value is 0x01.
n
it o
 Type: Indicates the type. The value is 0x01.

 Code: Indicates the PPPoE packet type. Different values indicate different PPPoE packet
ic a
if
rt
types.

Ce
 PPPoE session ID: Defines a PPPoE session together with the Ethernet SMAC and DMAC.

&
Length: Indicates the payload length of a PPPoE packet, excluding the length of the
Ethernet packet header and PPPoE header.
ing
a in
Tr
ei
a w
Hu
o n
ati
ic
r t if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu session, and session termination.
The PPPoE can be divided into three phases: discovery,

When a host wants to start a PPPoE session, n it needs to perform a discovery process to
o then determine a unique PPPoE session ID. The
identify the MAC address of the peer, iand

t
aa discovery protocol based on the client/server model.
i c
if the Ethernet, the host (client) discovers all access
serve this purpose, the PPPoE uses
Due to the broadcast featuretof
concentrators (servers) ine
r
C
this process, selects one of them, and establishes a P2P

& phase is complete.


connection with the peer according to the obtained information. After a PPP session is set

g
up, the PPPoE discovery
n session phase starts, the host and the access concentrator transmit PPP
i

a inon the PPP protocol to perform PPP negotiation and data transmission. The
After the PPPoE

rpackets transmitted in this phase must always contain the session identifier
data based
T
i
data
edetermined
a w in the discovery phase. In normal cases, the session phase is terminated by the

Hu PPP protocol. However, a PADT packet is also defined in PPPoE to terminate sessions. The
host or access concentrator can terminate a session by sending the packet at any time after
the PPP session starts.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The destination address is the broadcast address u and the source address is the
H0xffffffff,
n
Ethernet address of the host. The value of ETHER_TYPE is 0x8863, the code value is 0x09,
and the value of SESSION-ID is 0x0000.o
ti be any number of other tags. The length of a PADI
TAG_TYPE: Only one Service-Name indicates the
service requested by the host. There a
icSpace needs to be reserved for the Relay-Session-Id TAG
can
i f
rt
packet cannot exceed 1484 bytes.
field.
C e
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 The destination address is the Ethernet addressH of u
the host. The source address is the

nis 0x0000. The value of TAG_TYPE must have an


Ethernet address of the access concentrator. The value of ETHER_TYPE is 0x8863, the code
o
tiof the access concentrator. It must contain a
value is 0x07, and the value of SESSION-ID
AC-Name TAG that contains the name a
ic as the received PADI and any number of other Service-
i f
rt that the concentrator can provide.
Service-Name TAG that is the same

e
Name TAGs indicating the services
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The destination address is the Ethernet addressH of u
the access concentrator, and the source

nis 0x0000. The value of TAG_TYPE must contain


address is the Ethernet address of the host. The value of ETHER_TYPE is 0x8863, the code
o
ti the service requested from the concentrator.
value is 0x19, and the value of SESSION-ID
a TAG of the Service-Name type toa
ictags.
specify
i f
rt
There can be any number of other

C e
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The destination address is the Ethernet addressH of u
the host, and the source address is the

nis a unique value specified by the concentrator


Ethernet address of the access concentrator. The value of ETHER_TYPE is 0x8863, the code
o
ti Contains a tag of the Service-Name type, indicating
value is 0x65, and the value of SESSION-ID
a
ic to the session. There can be any number of other
to identify a PPPoE session. TAG_ TYPE:
i f
rt
the service provided by the concentrator
tags.
e
Cthe PPPoE client and server enter the PPPoE session phase.
&
 After a session is set up,

n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Huat any time after a session is
This packet can be sent by the host or concentrator

nvalue of SESSION-ID is the SESSION-ID of the


established. The destination address is a single Ethernet address. The value of ETHER_TYPE
o
ti
is 0x8863, the code value is 0xa7, and the
session to be terminated. No tag isa
icMAC address is a unicast address, and the session ID is
required.
i f

e rt to be closed. Once a PADT packet is received, the


In a PADT packet, the destination

connection is closed. C
the session ID of the connection

&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu between the host and the access
After a PPPoE session is set up, PPP data is transmitted

n
device based on the PPP protocol. Each Ethernet frame has a single address. The value of
ETHER_TYPE is 0x8864, the code value o
i PPPOE payload field contains a PPP packet.
tThe
is 0x00, and the value of SESSION-ID remains

ic
unchanged during the entire session. a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu basic network configurations before
On a TCP/IP network, each work station must perform

n
accessing the network and its resources. Key parameters to be configured include IP
address, subnet mask, default gateway,o
ti
and DNS. Additional information, such as IP
a
ficall hosts have correct configurations can be a difficult
management policies, may be required.

On a large network, ensuringtithat


e r for dynamic networks that contain roaming users and laptops.


C from one subnet to another and removed from the network.
management task, especially

& or reconfiguration of a large number of computers may take a long


Computers are often moved

g
Manual configuration
n in IP host configuration may cause network communication failures.
i
time, and errors

a ina mechanism is required to simplify IP address configuration and implement


T r IP address management. The Dynamic Host Configuration Protocol (DHCP) is


Therefore,

i
centralized
edesigned
a w by the Internet Engineering Task Force (IETF) for this purpose.

Hu  DHCP can reduce configuration errors.

 The DHCP minimizes the number of errors caused by manual IP address configuration.
For example, the possibility of allocating an IP address in use to another device is
greatly reduced.
 DHCP reduces network management workload.

 TCP/IP configurations are centrally and automatically completed without manual


intervention by a network administrator. A network administrator can define the
TCP/IP configurations of the global network and specific subnets in a centralized
manner. The DHCP options can automatically allocate all additional TCP/IP values to
clients. Client addresses must be frequently updated. For example, a remote access
client may move everywhere, and needs to be configured efficiently and
n
it o
automatically when it is restarted in a new location. In addition, most routers can
forward DHCP configuration requests, reducing the need for setting up a DHCP
ic a
server on each subnet unless other reasons make it necessary.
if

e rt
The basic DHCP protocol architecture consists of 3 roles: DHCP server, DHCP client, and
DHCP relay (optional). C
&
g
n in
rai
i T
e
a w
H u
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 DHCP server: A DHCP server processes requestsH foruaddress allocation, lease renewal, and

n
release from clients or relays, and allocates IP addresses and other network configurations
o
ti
to clients.

ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hua DHCP server to obtain the IP address
DHCP client: A DHCP client exchanges packets with

nDHCP server, facilitating client configuration and


and other network configurations. The DHCP protocol is used to dynamically obtain
o
ti
parameters such as IP addresses from the
centralized management.
ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 P8DHCP Discover: A client broadcasts this packet Htou discover available DHCP servers.
DHCP Offer: A server sends this packet ton respond to the DHCP Discover packet from a
ioparameters to the client.

client and provides various configuration


a t
ic
 DHCP Request
r t if

C e
A client applies for an address and other configuration parameters from a server.

&
A client checks whether the original address and other configuration parameters are

g
correct after restart.
napplies to extend the lease term of the address and other configuration
i

a in from a server.
A client

T r parameters

 i ACK: A server sends the address to be allocated and other configuration parameters
eDHCP
a w to a client.

Hu  DHCP NAK: A server notifies a client that the requested address is invalid or has expired.
 DHCP Decline: A client notifies a server that an allocated address is being used by another
device.

 DHCP Release: A client releases an address used by it.

 DHCP Inform: A client applies for local configuration parameters (after an address has been
allocated) from a server.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu server.
Discovery phase: A DHCP client searches for a DHCP

n
In the discovery phase, a DHCP client searches for a DHCP server by sending a DHCP
io of DHCP servers are unknown to the client, the

t
Discover packet. Because the IP addresses
a packet on the network. All DHCP servers that
DHCP client broadcasts the DHCPcDiscover
i
r
receive DHCP Discover packetstifsend response packets. The DHCP client can then know the
locations of DHCP serverseon the network.
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu for a DHCP client.
Offer phase: The DHCP server provides an IP address

A DHCP server that receives a DHCP Discovern packet from a DCHP client selects an
appropriate IP address from its addressio

t pool, and sends a DHCP Offer packet carrying the IP


aother configuration parameters (such as the gateway
ic
tif address) to the DHCP client.
address, IP address lease term, and

r
address and domain name server

Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu
Selection phase: A DHCP client selects an IP address.

If multiple DHCP servers send DHCP Offern packets to a DHCP client, the DHCP client
ioarrives first. Then, the DHCP client broadcasts a

receives only the DHCP Offer packet that


t
aserver identification (Option54), that is, the IP address of
ic
if client.
DHCP Request packet carrying the
the DHCP server selected by tthe
r
The DHCP Request packeteis sent in broadcast mode to notify all DHCP servers that the

C
&
client selects the IP address provided by the DHCP server indicated in Option54. Other

n
DHCP servers can g therefore reclaim their pre-allocated IP addresses.
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Confirmation phase: A DHCP server confirms that Huan IP address is allocated to a DHCP
client.
n
After receiving a DHCP Request packetio

a t from a DHCP client, the DHCP server searches for

f ic
the corresponding lease record according to the MAC address carried in the DHCP Request

r ti DHCP server sends a DHCP ACK packet containing the IP


packet. If a record is found, the

C
address and other settingseto the client. After receiving the DHCP ACK packet, the DHCP
&the server. If no response is received within a specified period, the
client broadcasts a gratuitous ARP packet to detect whether another host is using the IP

g
address allocated by
nIP address.
i
client uses the

a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 If a DHCP server does not find a lease record after Hureceiving a DHCP Request packet or fails
n is available. The DHCP client then needs to
to allocate an IP address due to certain reasons, the DHCP server sends a DHCP NAK packet
o
ti for a new IP address.
to notify the DHCP client that no IP address
resend the DHCP Discover packet toaapply
f c
iDHCP

r
After obtaining an IP address,t ia client checks the status of the gateway in use before

C e address is incorrect or the gateway is faulty, the DHCP client


going online. If the gateway

&
requests a new IP address in four-step mode.

n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 When an IP address reaches 50% (T1) of the lease Huterm, the DHCP client automatically
n If a DHCP NAK packet is received, the
sends a DHCP Request packet to the DHCP server to renew the lease. If a DHCP ACK packet
o
ti
is received, the lease is renewed successfully.
a
fic (T2) of the lease term, if the DHCP client does not
application process is initiated again.


r i
When an IP address reaches t87.5%
receive any response from e
C servers to renew the IP address lease. If a DHCP ACK packet is
the DHCP server, the DHCP client automatically sends a

received, the lease&


broadcast packet to DHCP

g is renewed successfully. If a DHCP NAK packet is received, the


n is initiated again.
application iprocess

a indoes not receive any response from any server before its IP address lease term

T r the client stops using the IP address and sends a DHCP Discover packet to request
If a client

eai new IP address.


expires,

a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Before the DHCP relay technology is implemented, Huthe DHCP protocol is applicable only
nto be deployed for each subnet, wasting
when DHCP clients and servers are in the same subnet and cannot work across network
o
ti
segments. Therefore, a DHCP server needs
resources. a
iAcDHCP relay agent serves as a relay between DHCP clients
i f

e rt It can relay DHCP packets to destination DHCP servers or


DHCP relay solves this problem.

C segments, allowing DHCP clients on different network


and servers in different subnets.

segments to share&
clients on different network

n g the same DHCP server. This mechanism saves costs and facilitates
i
centralized management.

a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Upon receiving a request packet from a DHCP client
H u to a DHCP server, a DHCP relay agent
processes the packet and sends it to the specified DHCP server on another network
segment in unicast mode. The server returns
o n the configuration information to the client
through the DHCP relay agent according
ti information in the request packet. In this way,
to
dynamic configuration of the clientais complete.
f c performs DHCPv4 initialization, it broadcasts a
iand
t i
Discover packet on the localr network to search for a DHCPv4 server.
 When a DHCPv4 client is started
e
C exists on the local network, the DHCPv4 client can directly obtain
If a DHCPv4 server
&from the DHCPv4 server.

an IP address

n g
i
If no DHCPv4 server exists on the local network, the DHCPv4 relay agent connected
inforwards

to the local network converts the broadcast Discover packet into a unicast packet
r a
and it to a DHCPv4 server on another network segment.

i TDHCPv4 server returns a unicast Offer packet to the DHCPv4 relay agent to confirm
ethat the DHCPv4 client can apply for an IP address. After receiving the Offer packet, the
 The

a w DHCPv4 relay agent converts the unicast packet into a broadcast packet and sends it to the

Hu DHCPv4 client.
 The DHCPv4 client sends a Request packet to request an IP address. After receiving the
Request packet, the DHCPv4 relay agent converts the broadcast packet into a unicast
packet and forwards it to the DHCPv4 server.
 The DHCPv4 server performs the corresponding configurations according to the
information in the received Request packet, and sends the configurations to the DHCPv4
client through the DHCPv4 relay agent to complete the dynamic configuration of the
DHCPv4 client.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 A typical DHCP relay networking consists of theH u roles:
following

DHCP client: A device that dynamically obtainsn IP addresses or other network configuration
io

parameters.
a t
DHCP relay agent: A DHCP clientic
titof obtain the IP address and other network configuration
 communicates with a DHCP server through the broadcast
r
parameters. If the server e
address in the local link range
C and client are on different network segments, DHCP relay is
&
required to forward packets. In this way, a DHCP server does not need to be deployed in

n g
each network segment, which reduces costs and facilitates centralized management.
i

a in A device that allocates IP addresses and other network configuration
DHCP server:

T r to DHCP clients.
parameters

ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 VLAN Definition Hu
n
A virtual local area network (VLAN) is a technology that virtualizes devices in a LAN
o
ti

into different network segments logically instead of physically. The VLAN technology

ic a
if
is a basic technology widely used in various access modes and services, for example,

rt
multicast, triple play, wholesale service, and private line services.
e

C
VLAN management enables carriers to flexibly plan services.
& is mainly used for cascading. Huawei products support the Ethernet
A standard VLAN
g

i n networking. Multi-level access devices can be cascaded through the GE/FE


cascading

a in to effectively extend the network coverage and meet the requirements


interfaces

T rfrom a large number of users.


ei A smart VLAN is used to reduce the number of system VLANs and isolate users.
w

u a  A QinQ VLAN is used to transparently transmit private VLAN packets on the public
H network to implement layer 2 VPN.
 VLAN stacking is mainly used in wholesale services of carriers.

 The specifications of the VLAN management feature are as follows:

 Supports smart VLAN, MUX VLAN, and Standard VLAN.

 Supports 4K VLANs. The value range of VLAN IDs is 2–4093.

 Supports port-based VLANs.


 Supports QinQ and stacking VLANs.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Standard VLAN Hu
n
The ports in a standard VLAN are standard Ethernet ports for interworking. Each port
o
ti

is logically equivalent.

ic a

rt if
Ethernet ports in the same standard VLAN can communicate with each other.

e
Ethernet ports in different standard VLANs are isolated from each other.
C
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Smart VLAN Hu
n
A smart VLAN is a special VLAN. In addition to the features of a standard VLAN, a
o
ti

smart VLAN also has the following features:

ic a

rt if
In a smart VLAN, ports are not equal and are classified into upstream ports and

e
service ports.
C are isolated and cannot communicate with each other.
Service ports
&

g
Upstream ports can directly communicate with each other.
n ports can directly communicate with upstream ports.

ni
ai
Service

T r In a standard VLAN, the broadcast domain of each port covers all ports in the
i

e VLAN. However, in a smart VLAN, only the broadcast domain of an upstream

aw port covers all ports in the VLAN. The broadcast domain of a service port

Hu
covers only upstream ports in the VLAN.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 MUX VLAN Hu
n
An MUX VLAN is a VLAN that contains upstream ports and a service port.
o
ti upstream ports but only one service port.


a
An MUX VLAN can contain multiple
ic VLANs are isolated from each other.
i f
rtone access user. Therefore, MUX VLANs can be used to
 Service flows of different MUX

C
Each MUX VLAN maps e
&
distinguish users.

n g
i
a in
Tr
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Common VLAN Hu
n
Common is the default attribute of a VLAN. That is, the VLAN does not have the
o
ti

QinQ or stacking attribute. A common VLAN can be used as a common layer 2 VLAN.

ic a
if
A layer 3 virtual interface can be created based on a common VLAN for layer 3
forwarding.
r t
 Stacking VLAN
Ce
&
If VLAN stacking is used to increase the number of VLANs or identify users, the BRAS
ng

i
is required to implement double-tagged user authentication.
n
i
a must work in layer 2 mode and forward packets directly based on the VLAN
r
 If VLAN stacking is used to provide private line wholesale services, the upper-layer
T
ei
network
and MAC address.
a w
Hu  QinQ VLAN

 A QinQ VLAN is used to carry private line services or accurately bind users.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Service process of a QinQ VLAN: Hu
n
Users can communicate with each other in the same private network (VLAN 10) in
o
ti

different areas through the QinQ VLAN. User service packets are processed as follows:

ic a

r tif
An HQ user of enterprise A sends an untagged packet upstream.

Ce
The ONU adds a VLAN tag (VLAN 10) of the private network to the packet (or
transparently transmits it) and sends the packet upstream to the OLT.
&
ng
 The OLT adds the public VLAN tag (VLAN 200) to the packet and transmits the

ni
packet to the upper-layer network.
i
a The upper-layer network device transparently transmits the packet according to
Tr

ei
the public VLAN tag (VLAN 200).

a w  After receiving the packet, the peer OLT removes the public VLAN tag (VLAN

Hu 200) and transparently transmits the packet to the ONU.

 The ONU identifies and removes (or transparently transmits) the private VLAN
tag (VLAN 10), forwards the untagged packet to the switch of the private
network which then forwards the untagged packet to a branch user of
enterprise A.
 As mentioned above, the QinQ VLAN can implement the interworking between HQ
and branch users of enterprise A in VLAN 10.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Service process of a stacking VLAN: Hu
n
The OLT uses different stacking VLANs to connect users of enterprise A to ISP1 and
o
ti

users of enterprise B to ISP2. User service packets are processed as follows:

ic a

r t if
A user sends an untagged packet upstream to the OLT through an ONU.

Ce
The OLT adds two VLAN tags to the untagged packet. Users of different ISPs have
different outer VLAN tags.
&
ng
 For user packets from enterprise A, the service VLAN 100 is encapsulated in the

ni
outer VLAN tag, and the user VLAN 10 or 20 is encapsulated in the inner VLAN

a i
r
tag.

i T For user packets from enterprise B, the service VLAN 200 is encapsulated in the
e

aw
outer VLAN tag, and the user VLAN 10 or 20 is encapsulated in the inner VLAN

Hu
tag.

 The switching MAN device forwards the packets to different ISPs according to the
outer VLAN tags.

 After receiving the packets, the devices of ISP1 and ISP2 remove the outer VLAN tags
and differentiate user types in the enterprise according to the inner VLAN tags.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Basic Concepts of GPON
Hu

o n
A GPON encapsulation mode (GEM) frame is the smallest service bearing unit in the

ti
GPON technology and is the most basic encapsulation structure. All services are
a
c
encapsulated in GEM frames for transmission on the GPON line and are identified by

if i
GEM ports. Each GEM port is identified by a unique Port-ID, which is globally
rt
allocated by the OLT. That is, each ONU under the OLT cannot use GEM ports with

Ce
the same Port-IDs. A GEM port identifies a service virtual channel between the OLT

&
and the ONU, that is, the channel that carries the service flow.

ng
A T-CONT is the carrier of services in the GPON upstream direction. Each GEM port is

ni

mapped to a T-CONT which transmits data upstream according to DBA scheduling by


a i
r
the OLT. A T-CONT is the basic control unit of the upstream service flow in the GPON

i T system. Each T-CONT is uniquely identified by an Alloc-ID which is globally allocated


e by the OLT. That is, each ONU under the OLT cannot use T-CONTs with the same

aw
Alloc-ID.

Hu
 Service multiplexing principles of the GPON system
 In the upstream direction, services are first mapped to different GEM ports on the
ONU, and GEM ports are mapped to different types of T-CONTs for upstream
transmission. After receiving a data frame, the OLT decapsulates the GEM port,
extracts the user data, and forwards the data to other modules for processing. In the
downstream direction, all services are encapsulated into GEM ports and broadcast to
all ONUs connected to the GPON port. An ONU filters data according to the GEM
port ID, retains only the data intended for it, processes the data, and then forwards
the data to the user.
 GPON service mapping

 A GEM port is the smallest service unit in the GPON system. A GEM port can carry
one or more services. Services carried by a GEM port need to be mapped to a T-
CONT for upstream service scheduling. Each ONU supports multiple T-CONTs and
can be configured with different service types. Each T-CONT can map multiple GEM
ports or one GEM port, depending on the user configurations.

n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Relationship between T-CONT IDs and Alloc-IDsHu

Alloc-IDs are automatically allocatednby the system. You can manually define Alloc-
IDs by configuring T-CONT IDs. io

a t
T-CONT ID range: 0–127 ic

r t if

C e
GPBC board: Alloc-ID = T-CONT ID x 256 + ONU ID

&
GPBD board: If T-CONT ID < 8, Alloc-ID = T-CONT ID x 256 + ONU ID. If T-CONT ID ≥

g
8, the system automatically allocates the minimum idle Alloc-ID.
n
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Huto specific ONT GEM ports for upstream
Upstream data flows from user ports are mapped

n
transmission. Only one mapping mode can be configured for each ONT.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Introduction to concepts: Hu
n
In a traffic profile, you can configure the rate limit of the traffic and the processing of
o
ti

the packet priority.

ic a

r t if
The dynamic bandwidth allocation (DBA) profile describes the traffic parameters of

e
the xPON. A DBA profile is bound to dynamically allocate the bandwidth and improve
C
the upstream bandwidth utilization.
&
In an ONT line profile, you can configure the attributes related to the ONT line, bind
ng

ni
the DBA profile to T-CONTs, configure the mapping priorities between GEM ports

a i
and the T-CONTs, and between GEM ports and service flows.

T rAn ONT service profile provides a service configuration channel for ONTs managed in
i

e OMCI mode. You need to log in to an ONT to configure services if the ONT (such as
a w the MDU) is managed by the SNMP. The number and types of ports configured for

Hu the ONT must be consistent with the actual product specifications.


 (Optional) ONT alarm profile: In an ONT alarm profile, you can configure a series of
alarm threshold parameters to monitor the performance of an activated ONT line. If a
statistical item reaches the alarm threshold, the system notifies the NE and sends the
alarm information to the log NE and the NMS.
 Service port: Specifies the encapsulation relationships and modes of the service flows,
physical ports, and virtual ports.
 Service forwarding process:
 A user service is connected to an ONT port, classified, and processed based on its
priority (configured in the service profile).

 The service flow is encapsulated into a GEM data frame, buffered in the T-CONT, and
waits for the timeslot for upstream transmission to the OLT (configured in the line
profile).
The GEM data flow is sent to the PON port of the OLT and decapsulated to obtain n
it o

the user data flow which is then forwarded to the upstream board based on the
traffic and priority policies (configured in the service port and traffic profile).
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Service forwarding example Hu
n
A user-side terminal sends an encapsulated ETH data frame to the Ethernet port of
o
ti

the ONT.

ic a

rt if
The ONT port processes the user data by priority and adds the user-side VLAN tag.

Ce
The GPON chip of the ONT encapsulates the VLAN data into a GEM frame and sends
the GEM frame to the OLT through the PON port of the ONT.
&
ng
 The OLT decapsulates the GEM data frame and extracts the VLAN data frame.

i ni
The OLT switches the user VLAN tag to a service VLAN tag, and then forwards the
a

T r user data to the upstream port.

ei
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Principles: Hu
Implement flexible QinQ on the OLT.
o n
ti That is, services of the same type on the same


a
Add different outer tags for services.
ic For example, for PON port 0/2/0, the outer tag of PPPoE
i f
port use the same outer tag.
is 1000, the outer tagrtof VoIP is 2000, and the outer tag of IPTV is 2012.
e
The outer tags ofCdifferent PON ports must be different.
&

n g
The NMS VLAN is not added with an outer tag.
i
a in
Tr
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Parameter description
Hu

o n
Committed information rate (CIR): Indicates the assured information rate. This

ti
parameter is mandatory. The value must be an integer multiple of 64. If the input is

ic a
not a multiple of 64, the value is rounded down to a value which is an integer

if
multiple of 64 and no less than 64.

r t
Committed burst size (CBS): Indicates burst rate. This parameter is optional. If this
e

C
parameter is not specified, the value is obtained based on the formula min (2000 +
CIR x 32, 1024000).
&
ng
 Peak information rate (PIR): Indicates the peak rate. This parameter is optional.

i ni
Peak burst size (PBS): Indicates the peak burst rate. This parameter is optional. If this

r a
parameter is not specified, the value is obtained based on the formula min (2000 +
T 32 x PIR, 10240000).
i Priority: Sets the priority keyword.
e
w

u a  User-cos: Indicates the outer 802.1p priority of incoming packets. This parameter is

H
optional. If the outgoing packet priority needs to be mapped according to the outer
802.1p priority of an incoming packet, this parameter needs to be configured.
 User-tos: Indicates the IP priority of packets. This parameter is optional. If the
upstream packet priority needs to be mapped according to the Type of Service (ToS)
field priority in a user packet, this parameter needs to be configured.
 Priority-policy: Indicates the priority scheduling policy of packets. This parameter is
mandatory. The options include Local-Setting which indicates that packets are scheduled
according to the priorities specified in the traffic profile, and Tag-In-Package which
indicates that packets are scheduled according to the priorities carried in the packets.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 In an ONT alarm profile, you can configure a seriesHuof alarm threshold parameters to
nsends the alarm information to the log NE and
monitor the performance of an activated ONT line. If a statistical item reaches the alarm
o
ti
threshold, the system notifies the NE and
the NMS. a
icalarm threshold profiles.
i f
 The Huawei product supports
e rt 50

C
The system has a default alarm threshold profile whose ID is 1. This profile cannot be
&
deleted but can be modified.

n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Run the dba-profile add command to add a DBA Huprofile. By default, the system has DBA
n
profiles 0–9, which provides typical traffic parameter values. Default profiles cannot be
o
ti
added or deleted.

ic a
f
Note:
i

t to any DBA profile and must be configured. By default,


By default, a T-CONT is notrbound
e

C
LLIDs are bound to DBA profile 9.
When you add a DBA& profile, the bandwidth must be an integral multiple of 64. If the input
g

bandwidth isnnot an integer multiple of 64, it is rounded down to an integer multiple of 64.
i ni
r a
i T
e
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Huexists, the GPON ONT line profile
If the EPON ONT line profile whose ID is 40 already
cannot be added.
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 If the EPON ONT service profile whose ID is 50 H u exists, the GPON ONT service profile
already
cannot be added.
o n
t
You can also set the capability set of thei and POTS ports to adaptive by running the
ETH
a command. The system will then automatically

i c
adapt to the actual capabilitytioff the online ONT.
ont-port eth adaptive pots adaptive

e r
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Hanu ONT offline.
When pre-configuration is required, you can add

n
After the ONT goes online, you can manually confirm the ONT.
io

a t
ic
r tif
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hufor broadband services of carriers.
This is a typical double-tagged VLAN configuration

o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hufor the enterprise network scenario.
This is a typical single-tagged VLAN configuration

The default attribute of a VLAN is Common.


o n
ti

ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Huparameters. For class B/C ONUs, the
A service profile is used for issuing OMCI protocol

n
OMCI only needs to issue IP addresses, and does not need to issue other parameters.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Huexists, the GPON ONT line profile
If the EPON ONT line profile whose ID is 40 already
cannot be added.
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 The port range command is used to configureH theumaximum and minimum logical

n
distances of a GPON port. During the ranging process, proper logical distance values can
avoid affecting normal services of othero
ti
online ONTs for too long.
a
The undo port range commandcis used to restore the ranging compensation distance of a
i fi

r t
GPON port to the default value.
 Configuration notes:
C e
& distance – Minimum distance <= 20 km
GPON board: Maximum
g

i n Maximum distance – Minimum distance <= 40 km


inphysical distance between the OLT and an ONT should be as close to (Maximum
 XG-PON board:

a
r + Minimum distance)/2 as possible.
The actual
T

ei
distance

a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 There are 3 types of ONT status: ONT running status
H u (Run state), ONT configuration status
(Config state), and ONT matching status (Match state). The Run state of an ONT indicates
the current running status of the ONT. n
t ionot passed the authentication. In this case, the ONT

ic a be queried, and the ONT cannot carry services.


Offline: An ONT in the offline state has

if has passed the authentication. In this case, 3 yellow


version and ONT FEC statistics cannot
Online: An ONT in the onlinetstate

r
indicators on the ONT areesteady on, and whether the ONT can normally forward services
C
depends on the ONT configuration status.
The configuration &

are 4 states: n g status of an ONT refers to the configuration restoration of an ONT. There

ni data to the ONT to restore its configurations.


Initial, Config, Normal, and Failed. After an ONT goes online, the OLT issues
i
the configuration
a state is short and followed by the Config state.
r
T Config phase, the OLT issues the ONT configuration data to the ONT to restore the
The Initial
i

eONT configurations. The duration of the Config state depends on the amount of data to be
In the
w

u a configured on the ONT.


H  If the ONT configuration is restored successfully, the ONT status changes to Normal, and
the ONT can forward services normally.
 If the ONT configuration fails to be restored, the ONT status changes to Failed, and the
ONT cannot forward services.
 The ONT matching status indicates whether the service profile bound to the ONT matches
the actual capability of the ONT. The options include Initial, Mismatch, and Match.
 At the beginning, the status is Initial.
 If the configuration status is normal and the service profile bound to the ONT matches the
actual hardware capability of the ONT, the matching status changes to Match; otherwise,
the matching status changes to Mismatch.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 After services are deployed, you can run the display Hu statistics service-port command to
nof service flows, thereby determining whether
query service flow statistics or run the display traffic service-port command to query the
o
ti
real-time receiving and transmitting rates

ic a
services are normal and locating faults.
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Reference answer: Hu
n
1. The VLAN types include Standard, Smart, and Mux, which describe the service port
o
ti
capability of a VLAN. VLAN attributes include Common, QinQ, and Stacking, which
a
ic
if
describe the VLAN tag processing feature for packets.

rt
e
2. A user service flow is mapped to a GEM port for transmission between the OLT and
C
the ONU. A GEM frame is mapped to a T-CONT in the upstream direction for
&
buffering and bandwidth scheduling.
g
n of upstream GEM buffer and bandwidth
i
3. Scheduling
n a class A ONU, you only need to change the SN on the OLT or ONU side.
4. Toireplace
a
rTo replace a class B/C ONU, you need to pre-deploy it on the NMS or manually
i T
e reconfigured it.
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu Because an NGN network is
NGN is the concept of defining and deploying networks.

n
divided into different layers and planes with open interfaces, NGN provides a platform for
service providers and carriers to evolve,o
ti
create, provide, and manage new services.

Advantages of the NGN networkc


i a
i farchitecture.

r t
e
 NGN adopts the layered

NGN provides the Cmedia access layer, core switching layer, network control layer,
&

and service management layer.


g
n control and connection, as well as services and calls.
NGN iseparates
in bearer networks tend to use the unified IP protocol to implement service

a
rconvergence.
NGN
T

ei NGN is a network based on unified protocols.


a w 

Hu  NGN supports multiple services, such as voice, data, and video services.
 NGN has advantages in access and coverage.
 NGN features low construction and maintenance costs.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Background of NGN Hu
n
The NGN system divides the switching equipment into components for call control
o
ti

and media processing using a standard protocol. The call control is pure software

ic a
if
running on a universal hardware platform, and media processing converts TDM into

rt
IP-based media streams.
e

C
The softswitch technology emerges as the core technology of NGN.
Functions of each &layer in an NGN system
g

n layer: Use various access methods to connect various to the network and
Edge iaccess
in the information format into a format that can be transmitted on the network.

a
rCore switching layer: Uses the packet technology to provide a highly reliable
convert
T
ei integrated transport platform with high QoS and large capacity.

a w
Hu  Network control layer: Implements call control. The core technology of the network
control layer is softswitch, which implements basic real-time call and connection
control functions.

 Service management layer: Provides additional value-added services and operation support
after call setup.
 NGN protocol classification

 According to the protocol functions, NGN protocols are classified into the following types:
 Bearer control protocol

 Function: It is used by the media gateway controller (MGC) to control the


media gateway (MG), such as the access media gateway (AMG) and trunk
media gateway (TMG).
n
it o
 Example: MGCP, H248

 MGCP/H.248 is a media gateway control protocol based on the gateway


ic a
if
rt
separation structure. It works in master/slave mode.

Ce
 Call control protocol

&
Function: Controls the establishment, connection, and termination of a call.

Example: SIP and H.323 ngi


n

i
ra used to establish,
Session initial protocol (SIP) is one of the framework protocols of a multimedia
T
ei
communication system. It is an application layer protocol
change, or end multimedia sessions.
a w information transmission for

terminals or other entities based onH


u
H.323 is a protocol that provides multimedia
the packet switched network.

Signaling transmission protocol


o n
ti transmission services for the softswitch.

ic
Function: Provides signalinga
t i f
r
Example: SIGTRAN

C e
The Signaling Transport (SIGTRAN) protocol stack bears the communication

& and transmission.


between the signaling gateway and the MGC. It provides two functions:

n g
adaptation
i
a in
Tr
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Multi-Party Multimedia Working Group put forward Hu two proposals for multimedia
communication in the Internet in 1996:
n
Session Initiation Protocol (SIP) io

a t
i f
Simple Conference Invitation ic Protocol (SCIP)
rt unified in Session Initiation Protocol (SIP).

C e
At last, the two proposals are

&
SIP is a protocol that is being developed and continuously researched. On the one hand, it

g
adopts the design ideologies of other Internet standards and protocols. In style, it complies
n of simplicity, openness, compatibility, and scalability of the Internet, and
i
takes fullin
with the principles

of T r a attention to the security problems in the open and complex network environment

i
the Internet. On the other hand, it also fully considers the support of various services on
etraditional public telephone networks, including IN service and ISDN service.
a w
Hu  In the SIP protocol, a session is created by using a SIP invite message with a session
description, so that the participant can perform media type negotiation through SIP
interaction. It requests the current location of a user through proxy and redirection to
support the mobility of the user. Users can also register their current locations. The SIP
protocol is independent of other conference control protocols. It is designed to be
independent of the underlying transport layer protocols. Therefore, other additional
functions can be flexibly extended.

 The SIP protocol can be used to initiate a session or invite a member to join a session that
has been established in another manner.
 SIP supports text encoding and decoding

 SIP uses the transaction mechanism. Each request triggers an operation method in a server.
A requests and response form a transaction. The transactions are independent of each
other.

 SIP is independent of the underlying transport protocols. It is carried on the IP network. The
network layer protocol is IP. The transport layer protocol can be TCP or UDP. UDP is

n
recommended.

Well-known port number: 5060 it o


a

if ic
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
o n
ati
ic
r t if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Redirection server Hu
n
The redirection server does not receive or reject calls. It implements the routing
o
ti

function and cooperates with the registration process to support the mobility of SIP

ic a
if
terminals.

 Proxy, Proxy sever


e rt
C
Location service/Registrar
&


g
A service that is used by the SIP redirection server or proxy server to obtain the
nof the callee.
i
in
location

r a
User agent
T

ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hasuthe redirection server, proxy server, and
In the Huawei solution, the SoftX3000 functions
Registrar.
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu for each subscriber. The message
The SIP AG sends a Register message to the SoftX3000
contains information such as the user ID.
o n
t i SoftX3000 checks whether the subscriber is
After receiving the Register message, the
a the SoftX3000 returns a 200 message to the SIP AG.

ic
tif
configured on the SoftX3000. If yes,

r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 1: SIP_A picks up the phone and sends an INVITE u to the SoftX3000, requesting
Hmessage
nport number 8766, payload type, and payload
the SoftX3000 to invite SIP_B to join the session. In addition, SIP_A sends the information
o
ti
such as the IP address 191.169.150.101,
type code to the SoftX3000.
c a
iTrying
t i f

r
2: The SoftX3000 returns a 100
e processed.
response to SIP_A, indicating that the request has

C
been received and is being

&
3: The SoftX3000 sends a 407 Proxy Authentication Required message to SIP_A, indicating

n g
that the SoftX3000 needs to authenticate the SIP A. The Proxy-Authenticate field in the
i
in supported by the SoftX3000. The nonce for the authentication is generated,
message carries the authentication mode Digest and the SoftX3000 domain name
a
r
huawei.com
andTthe parameters are sent to SIP A in the response message for subscriber authentication.
e4:i SIP_A sends an ACK message to the SoftX3000, indicating that the final response to the
a

w
Hu INVITE request has been received from the SoftX3000.

 5: SIP_A sends an INVITE message to the SoftX3000 again. The message carries the Proxy-
Authorization field and contains the subscriber ID (phone number) of the authentication
mode DIGEST and SIP_A, domain name of the SoftX3000, NONCE, URI, and RESPONSE.
After receiving the 407 response, SIP_A uses a specific algorithm to generate the encrypted
RESPONSE based on the information returned by the server and subscriber configurations.

 6: The SoftX3000 sends a 100 Trying message to SIP_A, indicating that the request has
been received and is being processed.
 7: The SoftX3000 sends an INVITE message to SIP_B to request SIP_B to join the session.
The INVITE request message carries the session description of the SIP_A.

 8: The SoftX3000 sends a 100 Trying message to SIP_A, indicating that the request has
been received and is being processed.

 9: SIP_B rings and returns a 180 Ringing message to the SoftX3000.


 10: The SoftX3000 returns a 180 Ringing message to SIP_A, and SIP_A hears the ringback
tone. n
it o
 11: SIP_B picks up the phone and returns a 200 OK response to SoftX3000, indicating that
ic a
if
the INVITE request is accepted. In addition, the response message contains the information
such as the IP address 191.169.150.100, port number 8788, payload type, and payload rt
type code of SIP_B to the SoftX3000.
Ce
&
12: The SoftX3000 returns a 200 OK response to SIP_A, indicating that the INVITE request
ng

i
has been successfully processed. The response also contains the session description of the
SIP_B.
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Hu indicating that the final response to
13: SIP_A sends an ACK message to the SoftX3000,

n
the INVITE request has been received from the SoftX3000.
o
t
14: The SoftX3000 sends an ACK messagei to SIP_B, indicating that the final response to
a SIP_B.

ic
tifa BYE message to the SoftX3000 to request the termination
the INVITE request has been received

r
Ce
 15: SIP_A hangs up and sends
of the session.
16: The SoftX3000& returns a 200 OK response to SIP_A, indicating that the session ends.
g

i n sends a BYE message to SIP_B, indicating that the session is ended


in
 17: The SoftX3000

a
r hangs up and returns a 200 OK response to the SoftX3000, indicating that the
successfully.

18:T
i is ended successfully.
SIP_B
esession

a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Configuring a line profile Hu
n
Create a GPON ONT line profile with index 91 and bind T-CONT 1 to DBA profile 2.
o
ticarry Ethernet service flows, and bind GEM port 1 to

 Add a GEM port with index 1 to


ic a
T-CONT 1.
i f
e rt flow on the subscriber-side to GEM port 2.
Map the VLAN 172 service
C


&
Configuring a service profile

A serviceg

i n is used as an example. There are 4 ETH ports and 2 POTS ports.


profile must be consistent with the actual ONT type. Here, the HG850 or

in
HG8245
a
T rMap the VLAN 172 service flow to iphost port which is used by the ONT to process
ei voice services.

a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Adding an ONT Hu
n
Connect the ONT whose ID is 1 and serial number is 323031312E396A41 to GPON
o
ti

port 0/3/0. Set the management mode to OMCI. Bind the ONT to the line and service

ic a
if
profiles whose IDs are both 91.

 Configuring a Native VLAN


e rt
C ID of the iphost port on the ONT to 172. After receiving the
Set the native VLAN
& port removes the 172 tag and forwards the packet to a subscriber.

packet, the iphost


n g
i
a in
Tr
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Hu port
Creating a service VLAN and configuring the upstream

Set the VLAN ID to 172 and VLAN type n to Smart. Add upstream port 0/19/0 to VLAN
io

172.
a t
ic
 Creating a service flow
r t if
Ce
 Set the service VLAN ID to 172, GEM Port ID to 1, and subscriber-side VLAN ID to
172.
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Enable the ARP proxy function. Hu
n
For different subscribers in the same service VLAN, the service ports in the smart
o
ti

VLAN are isolated from each other. As a result, voice media streams cannot be

ic a
if
exchanged normally, and the ARP proxy function of the OLT must be enabled.

rt
e
 ARP proxy must be enabled globally and in interface mode.
C
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu The signaling is communicated with
In an NGN network, control and bearing are separated.

n
the softswitch through a route. The signaling is reachable. The subscriber can obtain the
o
ti
dial tone and ring.

i a
c bearer network. Because the smart VLAN is isolated at
f
The voice is transmitted through the
tiVLAN cannot learn the MAC address of each other. As a

r
L2, different ports in the same
result, the voice betweenesubscribers cannot be transmitted directly, and the subscriber
Cafter hearing ringing cannot hear the voice of the other party.
&
who picks up the phone

Enable the ARPgproxy so that subscribers in the same VLAN can learn the MAC address of

i n the voice can be transmitted.


in
each other and
a
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 In the dialog box that is displayed, configure the u
Hparameters of the WAN interface as
follows:
o n
Select Enable WAN to enable the
t i WAN connection that is newly set up.
a

ic
 Set Service Type to VOIP.
r t if

C e
Set WAN Mode to Route WAN.

&
Set VLAN ID to 172.

n g
Set IP Acquisition Mode to Static, and input the IP address, subnet mask and
i

i n gateway.
default
a
Click rApply.

i T
e
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Create a new WAN interface for voice service. Hu

Click the Voice tab and then choose the VoIP n Basic Configuration from the navigation
io

tree.
t
athe parameters of the SIP-based voice interface as
ic
tif
 In the pane on the right, configure
follows: r
e below Primary Server to 200.200.200.200.
Set Proxy ServerCAddress
&

n g
The default value of the Server Port is 5061.
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Set Region to China. Hu
n
Set Signaling Port and Media Port to 2_VOIP_R_VID_172.
o
ti

 Click Apply.
ic a
r t if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 In the User Basic Parameters area, configure H theuparameters of voice user 1 as follows:

Set Public User Name to 7727001.


o n
ti voice user configuration.


a
Select Enable User to enable the
ic and the Password.
i f
rtto 1.
 Set the Register User Name

C e
Set Associated POTS
 Click Apply. &
g
n the parameters of voice user 2 as follows:
i
Then configure
inPublic User Name to 7727002.


r a
Set
T
ei Set the Register User Name and the Password.
 Select Enable User to enable the voice user configuration.

a w
u

H  Set Associated POTS to 2.

 Click Apply.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Hu from the navigation tree.
Click the Status tab and then choose the Information
 In the right pane, click Restart VoIP.
o n
Wait a moment. Then the UsertStatusi becomes Up.

ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Command description Hu
n
Add GEM port 0 to carry management traffic flows and GEM port 2 to carry voice
o
ti

service flows.

ic a

rt if
Map the management service flows (subscriber-side VLAN 4000) to GEM port 0, and

e
map the voice service flows (subscriber-side VLAN 172) to GEM port 2.
C
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Command description Hu
n
Set the management VLAN to 4000, add an upstream port to VLAN 4000, and set
o
ti

the in-band management IP address to 172.16.246.140/16.

ic a

rt if
Create an in-band service channel, set the management VLAN to 4000, set the GEM

e
Port ID to 0, and set the subscriber-side VLAN to 4000.
C
Set the static management IP address of ONU 2 to 172.16.240.2/16, set the gateway
& and set the management VLAN to 4000.

to 172.16.246.140,
n g
i
a in
Tr
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Command description Hu
n
Create a service VLAN and configure its upstream port. Set the service VLAN ID to
o
ti

172, VLAN type to smart, and add the upstream port 0/19/0 to VLAN 172.

ic a

rtif
Create a service flow. Set the service VLAN ID to 172, GEM Port ID to 2, and

e
subscriber-side VLAN to 172.
C VLAN (172) of the OLT must be the same as the upstream service
The subscriber-side
VLAN of the&

ONU.
n g
i
a in
T r
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The upstream service VLAN (172) of the ONU must Hube the same as the downstream
subscriber-side VLAN of the OLT.
o n
 Note:
a ti
i f
You can configure attributes ic of an MG interface only when the media/signaling IP
t already exist in the corresponding address pool.

addresses of the MGrinterface


e
C IP addresses can be set to different IP addresses according
The media and signaling
to the actual&

networking planning.
n g
After iconfiguring
n
the IP address and static route of the VLAN interface, you can run
i

r a Normally, you can receive the ICMP response messages from the MGC and no
the ping command to check the connectivity between the VLAN interface and the

i T MGC.
e packet is lost during a long-period ping operation. If the ping operation fails, check
a w the link between the MA5620 and the gateway and between the gateway and the

Hu MGC.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 For example, when the SIP protocol is used, theH IPu
address of the SIP terminal is

n
17.1.1.200/8, the gateway is address 17.0.0.1, the subscriber number and subscriber name
o
ti
are 7727082.

ic a
f
Note:
i

A SIP interface can bertregistered by IP address (default) or domain name (same as


Ce

that on the softswitch).


You can run& the protocol support command to implement protocol conversion.
g

i n add: The mgid of a subscriber must be unique on the same SIP interface.
in
 #sippstnuser

r a
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu
This command is used to configure the authentication data of a single account of a

n is executed successfully, the


SIP PSTN user. To configure the authentication data of a single account of a PSTN
o
t i
user, run this command. After this command
authentication data of the PSTN
i a
c user is modified to the specified data.
ti f
r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 display if-sip all Hu
n
When you run this command, the system displays the brief information about all the
o
ti

interfaces that support the SIP protocol in ascending order by SIP interface ID.

ic a

if
Interface attributes not configured are displayed as "-".
rt

C e
If no SIP interface is configured in the system, no information is displayed.

&
You can view information such as state, signaling IP/port, and proxy IP/port/domain
name.
g
nattribute
i

a in
display if-sip

T rThis command is used to query the attributes of a specified SIP interface, including
ei mandatory

and optional attributes. When you need to query the attributes of a SIP

a w interface, run this command.

Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 F/S/P: Indicates the subrack ID, slot ID, and portHIDuof a port.

PTPSrvState: Indicates the running status ofn the physical layer of a port. The possible query
io (2) PowerDeny: low power; and (3) Fault: A fault

t
results are as follows: (1) Normal: normal;
a
ic
tif layer management status of a port. The possible query
occurs.

PTPAdmState: Indicates therphysical


results are as follows: (1) e

C NoLoop, NoTest: No loopback, not tested; (2) Noloop, Test: No


&
loopback, test in progress; (3) LLoop, NoTest: Local loopback, not tested; (4) LLoop, Test:
Local loopback,gtest in progress; (5) RLoop, NoTest: remote loopback, not tested; and (6)
RLoop, Test:in
i n remote loopback, test in progress.
r a Indicates the service running status of a port. The possible query results are as

i T (1) Idle, (2) Offhook; (3) Locked; (4) Ringing; (5) Fault; and (6) – (indicating that no
CTPSrvState:

esubscriber is configured).
follows:

a w
Hu  CTPAdmState: Indicates the service management status of a port. The possible query results
are as follows: (1) LBlock: local blocking; (2) RBlock: remote blocking; (3) StartSvc: starting
Services; and (4) -: no subscriber is configured.

 LineState: Indicates the subscriber line status.


n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Commands on the ONU Side Hu
mgpstnuser del
o n
ti

 Shutdown
ic a
 undo interface h248
r t if

Ce
undo ip address {media | signaling}

&
undo port vlan
g

i n
undo vlan
in on the OLT side


r a
Commands
T
ei undo interface vlanif
 undo ip address

a w
u

H  undo service-port

 undo port vlan


 undo vlan
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Reference answer: Hu
n
SIP: port number, IP address of the registration server, subscriber name and
o
ti

password, and phone number.

ic a
rt if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 ORL: Return loss Hu
n
Insert the optical fiber connector into the optical fiber adapter. The precision is divided into
o
ti

PC plane–blue, UPC spherical–blue, and APC slope–green.

ic a

r t if
An APC connector cannot be interconnected with a PC/UPC connector. APC connectors are

e
mainly used for CATV services.
C
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 PLC: Planar waveguide optical splitter Hu
FBT: Fused tapered optical splitter
o n
The production techniques of the twotitypes of optical splitters are different. For details, see

ic a
tif
the related documents.
r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 In optical fiber systems, an optical power meterHis u
a most basic tool frequently used to

n or optical network, an optical power meter


measure the optical power in an optical link, very much like a multimeter in electronics. By
o
i devices. If the optical power meter is used with
toptical
measuring the absolute power of a transmitter
can evaluate the performance of the a
ic loss and continuity can be measured, and the
i f
rt fiber link can be evaluated.
a stable light source, the connection

e
transmission quality of the optical
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 A stable light source refers to a light source with u output optical power, wavelength,
Hstable
nan optical power meter to measure the optical
and spectral width. A stable light source transmits light with known power and wavelength
o
i optical fiber system, the transceiver of the
texisting
in an optical system. It used together with
a
ic source. If the transceiver cannot work or there is no
loss of an optical fiber system. For an
system may be used as a stableflight
i
rtlight source is required. The wavelength of the stable light
source should be as close
e
transceiver, a separate stable
C to the wavelength of the system transceiver as possible. After a
system is installed,&the end-to-end loss often needs to be measured to determine whether

n g
i
the connection loss meets the design requirements.

a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 OTDR: Optical Time Domain ReflectometerHu

o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu an optical fiber recognition
During maintenance, installation, cabling, and restoration,

nbe used to detect and separate a specific optical


instrument is a necessary tool for maintaining optical fibers. It is used to identify optical
o
tori multi-mode optical fiber. It transmits optical
fibers without interrupting services. It can
a
icsignal at 1310 nm or 1550 nm into the optical fiber at
fiber at any position of a single-mode
i f
rtroute or indicate the service.
signals with a specific modulation

e
one end to recognize a fiber
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hulight source, a visible light detection pen,
A red light pen is also called a light pen, a pen red

n by the shortest detection distance: 5 km, 10


a fiber fault detector, and a fiber fault locator. Most of them are used to detect fiber break
o
i
35tkm, and 40 km.
points. Currently, red light pens are classified
km, 15 km, 20 km, 25 km, 30 km, a
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 A single-mode fiber patch cord is yellow, and aHu
multi-mode fiber patch cord is orange (with
a darker color).
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 The Simple Network Management Protocol (SNMP) Huis a network management protocol
n
widely used on the TCP/IP network. It provides a method for managing network resources
by using a central computer (that is, theonetwork management workstation) that runs the
network management software. at
i
i f ic
 SNMP version:
e rt

C
SNMPv1: Easy to implement and weak in security
SNMPv2c: More& secure and currently widely used
g

i n Defines a management framework and introduces the user security model


in to provide a secure access mechanism for users.
 SNMPv3:

r a
(USM)
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Huof the TCP/IP network. It is the carrier
The SNMP protocol is an application layer protocol

n Data exchange is implemented through


for exchanging information between the NMS and agents using protocol data units (PDUs).
o
ti
SNMP is not responsible for data transmission.

ic
transport layer protocols such as UDP.a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The SNMP protocol exchanges signaling between Huthe network management workstation
and agents.
o n
The network management system
t i (NMS) is the network management software
a A network administrator performs operations on

ic
tif packets to the managed devices to monitor and
running on the NMS workstation.

r
the NMS, and sends request
configure network e
C
devices.

&
The Agent is a proxy process running on a managed device. After receiving a request
from theg
n of the Agent include collecting the device status, responding to
NMS, the managed device responds to the request through the Agent. The
main ifunctions
a in operation requests from the NMS, and sending alarm information to the NMS
T rremote

ei Astatus
 management information base (MIB) is a virtual database which contains a device

a w information set and is maintained on a managed device. The Agent collects

Hu device status information by searching the MIB. The MIB organizes managed devices
according to the hierarchical tree structure and describes the devices in the ASN.1
format.

 If a module status of a managed device is abnormal, the Agent sends a trap message
to the NMS to notify the NMS of the fault. This helps network administrators handle
network problems in a timely manner.

 The implementation of SNMP network management consists of three parts: management


information base (MIB), structure management information (SMI), and SNMP.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 A MIB is an abstract set of all managed objects.H It u
is a device status information set

n
maintained on a managed device. Each Agent maintains such a MIB. The NMS can read or
set the values of objects in the MIB. o
a ti
A MIB is a set of managed objects.
f ic It defines a series of attributes of managed objects,
ti

including:
r
Name of an object e

C
Object access&permission
g

n of an object
Data itype
in

r a
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu managed objects. It defines the
The SMI defines a set of rules for naming and defining

n
types of data that can be used by MIBs, such as Conter and Gauge. It enables talk between
o
ti
SNMP objects.

ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Hu which are used for the interaction
SNMPv1 defines 5 PDUs (also called SNMP packets),
between the NMS and agents.
o n

a ti
The operations of various packets are as follows:

i f
get-request: Extracts one or icmore parameter values from an agent process.
rt the next parameter value that follows the current

parameter valueC
e
get-next-request: Extracts
from an agent process.
&

g
set-request: Sets one or more parameter values of an agent process.
n Returns one or more parameter values. This operation is triggered by
i

a inagent process and is the response to the preceding 3 operations.


get-response:

T ran

ei Trap:
 The agent process sends a trap packet to notify the management process that

a w an event has occurred.

Hu  The following 2 protocol operations are added to SNMPv2c:


 get-bulk request: This operation is equivalent to multiple getnext operations
performed consecutively, and used by the NMS to read information from managed
devices in batches.

 Inform: A managed device sends an alarm to the NMS. The NMS replies with an
Inform response message to acknowledge the receipt.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The SNMP versions include SNMPv1, SNMPv2c,H andu SNMPv3.
SNMPv1 and SNMPv2c use community name-based n authentication. The NMS controls the
io name list. An agent does not check

t
device access permission based on a community
a community name. In addition, SNMP messages are
ic
tif Therefore, the authentication and privacy protection
whether a sender uses an authorized

r
not encrypted before transmission.
measures are inadequate.e
C

&
Based on SNMPv1, SNMPv2c enhances the following functions: Supports more operations,
supports more g
transmissionin
data types, provides richer error processing codes, and supports multiple

i n protocols.
r a security is mainly reflected in data security and access control.

i T
SNMPv3

e SNMPv3 provides message-level data security, including data integrity check, data
w

u a source verification, and data verification.

H  SNMPv3 access control is a security check based on protocol operations and controls
access to managed objects.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Network development and O&M management:Hu

n
The trend of the All IP architecture drives vertical networks that are divided by
io to a flat horizontal network.

t
technologies and services to transfer
a convergence (FMC) comes from improving user
ic
tif and improving efficiency.
 The driving force of the fixed-mobile
experience, reducingrOPEX,
Ce brings O&M management convergence.
Network convergence
&


g
To meet the future network development trend, the U2000 implements the all-IP and FMC
nsolution to centrally manage the bearer and access devices.
i
inU2000 integrates not only the management of devices in multiple domains, but
management

a
ralso the management of the NE layer and the network layer, breaking the
The
T

ei hierarchical management mode and better meeting the transition management


a w
Hu requirements of "vertical network" to "flat horizontal network".

 The U2000 integrates multiple domains, reducing O&M costs and improving network
values.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Hu system of Huawei. It is the main
The U2000 is positioned as the equipment management

n layers.
product and solution of Huawei for future network management. It provides powerful
o
ti
management functions at the NE and network

ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
TMN: telecommunication management network u

H

o nan increasingly important role in improving


With the increase in the scale and complexity of telecommunication networks, the

ti network resources, and reducing network


network management system plays
a
network service quality, managing
ic
f
management costs.
i
rt and standardized management, ITU-T proposes the
To achieve unified, simple,
concept of TMN toesupport the planning, configuration, installation, operation, and

C networks and telecom services.


organization of telecom
&TMN can be classified into the following levels in ascending order:

g
The functions of the
n device layer: Includes some physical NEs. The management software is the
i
in Craff Terminal (LCT).
 Network
a
Local
rNE management layer: Configures and manages a single NE in a centralized manner.
T
ei Network management layer: Manages all NEs in the managed domain, and is

aw

applicable to large-scale and geographically dispersed network management, such as

Hu
T2100. The main functions include: coordinating and controlling the activities of all
NEs from the perspective of the entire network; provisioning, modifying, or
terminating network services; and interacting with the upper service management
layer in terms of network performance and availability.
 Service management layer: Provides complete service operation management,
including service leasing, broadband wholesale, and VPN.
 Transaction management layer: Implements transaction related functions, analyzes
development trends such as quality issues, and provides accounting basics and other
financial reports.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The U2000 is located between the NE management Hu layer and network management layer
n
in the TMN structure. It has all NE- and network-level functions.
o
t i
The U2000 is a typical solution that converges network management applications.
amanagement platform for access, transport, and IP

ic

r if the convergent management of cross-domain


The U2000 provides a unified
trealizes
ebreaks the vertical management mode and realizes the
equipment. It not only
C
equipment, but also
&
convergent management of the network and NE layers. It supports rights- and

n g
domain-based management to separately manage different domains and avoid
i
in
interference between different departments.
a
T r U2000 adapts to the network convergence trend and provides management
The

ei solutions

for multiple networking scenarios. It provides a unified GUI, simple and

a w convenient service provisioning, quick and efficient service monitoring and service

Hu assurance, creating excellent user experience and saving network O&M costs

 The unified northbound interface reduces a large amount of OSS integration work.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Unified ports/abundant northbound interfaces: u

H

o nto meet customers' OSS integration


The U2000 provides northbound interfaces (NBIs) with unified ports, leading

ti
standards, and various types of NBIs
requirements.
a
ic E2E service management
 Unified network management and
t i f
The U2000 managesrtransport,

e access, and IP devices in a unified manner, provides
C capabilities, supports management of third-party routers,
E2E service management
&
and supports ICMP and SNMP protocols.

n g
The following operating systems are supported:
i

ThenU2000 is based on the Huawei unified management application platform (iMAP).


a i U2000 is an independent application that can be installed on different operating


T rsystems and databases, showing excellent compatibility with multiple operating
The

ei systems.
a w Industry-leading scalable network management architecture:
u

H  The U2000 uses the client/server (C/S) structure that is mature and widely used. It
supports distributed and hierarchical database systems, service processing systems,
and client application systems. It adopts a scalable modular architecture and can be
split and co-deployed to meet the management requirements of complex and large-
scale networks.
 User-friendly GUI:
 Provides a unified GUI for alarms, topology, performance, security, and configuration
management. In addition, it provides user-friendly error messages, indicating the
cause of an error and the method of rectifying the fault.
 Visualized management
 Cross-domain E2E service provisioning
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu long-distance, and high-bandwidth
The FTTx access network solution is a large-capacity,

nnetwork devices, including the OLT, ONU, SBU,


optical fiber access solution provided by Huawei. The U2000 provides a complete solution
o
ti
for managing and maintaining FTTx access
and CBU in a unified manner. a
icuses a single fiber to provide voice, data, and video
i f

e rt
The FTTx access network solution

C (FTTO), fiber to the mobile base station (FTTM), fiber to the door
services, meeting the fiber to the curb (FTTC), fiber to the building (FTTB), fiber to the home

&fiber to the service area (FTTS), IP private line interconnection, and


(FTTH), fiber to the office

g
(Fiber To The Door),
n
i
wholesale networking requirements.

a inshows the networking application of the FTTx access NMS.


T r
The figure

ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 In the FTTx access NMS networking application,H u U2000 provides the 3 functions:
the

n
network deployment, service provisioning, and network maintenance.
o
 Network deployment:
a ti
Fast deployment of ONUs:ic
i f Supports automatic ONU deployment and remote
rt based on the ONU plug-and-play policy.

e
software commissioning

MDU service fastCdeployment and remote acceptance: Pre-configures services based


& to implement MDU plug-and-play for PON upstream transmission.

on Excel sheets
g
nsite visits are not required, and results are automatically reported, reducing
Manual
i
a in costs.
O&M

T r and efficient FTTx service provisioning:


ei Automatic provisioning by OSS interconnection
 Flexible

aw

Hu
 Batch provisioning of forms

 FTTx service provisioning profiles, enabling one-click GUI provisioning


 Network maintenance:

 FTTx topology management and hierarchical service assurance

 E2E service query and diagnosis for FTTB & FTTH


 Fast service recovery: MDU replacement and plug-and-play, and PON port service
cutover
 Automatic batch ONT upgrade
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Product features: Hu
n
Multi-vendor device adaptation facilitates unified management of devices on the entire
o
ti

network.

ic a

rt if
The eSight provides open interfaces that can be integrated to support unified

e
management of Huawei servers, storage devices, virtualization devices, switches,
C
routers, WLAN devices, firewalls, PON devices, eLTE devices, unified communications
&
devices, telepresence devices, video surveillance devices, application systems, and

ng
equipment room facilities. It is also pre-integrated with capabilities for managing

i ni
devices from mainstream third parties, such as HP, Cisco, and H3C.

r a

i T
The componentized architecture can be used to construct an enterprise O&M platform as

e
required.

aw The eSight uses a componentized architecture and provides various components on

Hu

the unified eSight management platform. Customers can select components based
on site requirements.

 Lightweight and web-based structure reduces system maintenance and upgrade costs.

 The eSight uses the B/S architecture. Clients do not need to install any plug-ins and
can access the eSight anytime anywhere. During system upgrade or maintenance,
you only need to update the server software, reducing the system maintenance and
upgrade costs.

 Visualized diagnosis and centralized O&M improve O&M efficiency.


n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w

Huprovides various components on the
The eSight uses a componentized architecture and

n management component is a component that


unified eSight management platform. The preceding figure shows the eSight
o
manages PON network devices. at
i
componentized architecture view. The PON

i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Main functions: Hu
n
Service deployment: ONUs support plug-and-play, simplifying engineering
o
ti

deployment.

ic a

if
Resource management: Manages device resources such as OLTs, ONUs, and optical
rt
e
splitters.
C Monitors the device status and GPON fault.
Network monitoring:
&


g
Batch upgrade: Upgrade the OLT/MxU/ONT and install the OLT/MxU patches.
n after replacement: Faulty ONUs can be replaced and the device version can
i

a inupgraded.
Workable

T rbe

e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 In a GPON network, a large number of ONUs need Huto be deployed. The eSight PON
n
supports the ONU plug-and-play function. That is, after the OLT is deployed, the PON
terminal devices (including the MxU andoONT) can be deployed on the network. A network
a ti the software on the installation site. After a
ic can be configured according to the preset plug-and-
administrator does not need to commission
i f
rt
PON terminal is powered on, services

e
play policy, improving the deployment efficiency.
Network planning: C
&

Plan the g
VLAN,in
 device location, upstream interface, management IP address, management

i n and other network and service parameters.


r a

i T
Pre-deployment:

e Configure the ONU plug-and-play policy.


w

u a  Set the parameters related to the OLT and associate the ONU plug-and-play policy.
H  Install and power on a remote device.
 After an ONU is installed and powered on onsite, the ONU automatically sends a go-
online notification to the OLT. The eSight verifies the device and selects deployment
configurations based on the pre-deployment policy, and delivers the pre-deployment
configurations to the ONU through the OMCI channel. After the configurations take
effect, services are automatically enabled.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

H
The eSight PON resource management function centrally u manages PON device resources on
the entire network, including optical splitter resource management, OLT resource
management, and ONU resource management.
o n Key service data is displayed in a
centralized manner to show the network
t i quality in real time.

ic a
if by the system in a resource table. The OLT basic
 OLT resource management
Provides a list of OLTs tmanaged

r
information can beeviewed and filtered.
C

& by name, and view detailed information.
Allows users to synchronize and jump to the physical topology, switch to the OLT
g
device manager
nmanagement
i
in a list of ONUs managed by the system in a resource table. The basic ONU
 ONU resource
a
rinformation can be viewed and filtered.
Provides
T

ei Allows users to move ONUs, replace ONUs, modify ONU aliases, set polling
aw

parameters, jump to an ONU manager by the ONU name, and view detailed

Hu
information.
 Optical splitter resource management
 Provides a list of optical splitters managed by the system in a resource table. The
basic optical splitter information can be viewed and filtered.
 Allows users to add, move, modify, and delete optical splitters, and import optical
splitters in batches.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 More abundant KPIs are provided, making the objectHu manager a 360-degree view of
network maintenance.
o n
 PON electronic label
a ti
i f ic electronic labels in a resource table and supports the
Displays the list of PON device
rt

e
export function.

Device software version Cmanagement


&


g
Allows users to view, upload, modify, and delete device software versions.
ndevice software upgrade tasks based on the selected upgrade options and
i

a in software version files. Provides a list of created tasks in a table, and


Creates

T rdisplays the task progress and status.


uploaded
i
eBackup
aw task for device configuration file management

Hu  Backs up the running configuration files of the devices in tasks by day, week, or
month at a specified time.
 Backs up the configuration of a specified device, or restores the configuration files of
a selected device.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu
GPON network monitoring helps quick fault locating.

n
Lists and displays the OLTs, ONUs, and
o mode.
optical splitters in a centralized manner. Users
can obtain device information inione-stop

t
a in a centralized manner. Users can analyze and
ic
tifand quickly locate the node where a fault has occurred
 Displays device alarm information
r
based on the alarmename, alarm source, and location information.
determine the fault type
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Monitoring the upstream port of the OLT
Hu

o n
Monitors the status of the link between the OLT and upstream devices, the

ti
transmit/receive packet loss rate of the OLT upstream port, and the broadband usage.
 Monitoring the OLT
ic a

r tif caused
Generally, the OLT is located in an equipment room and less likely to become faulty.
e
An OLT fault is commonly by a board fault which is directly reflected on the
Cadvised to monitor the status of the interfaces.
interface. You are
Monitoring the line&between an ONU and the OLT
g is a common cause of faults on a GPON network. You are advised to

i
The linenprofile
n the status of each monitoring point and take preventive measures accordingly.

i
check
a the ONU
 r
T Common faults of an ONU are caused by power failures and board faults. Power
Monitoring
i
e failures can be monitored by the ONU status. Board faults are directly reflected on

a w
Hu the ONU user network interfaces (UNIs).
 Monitoring ONU UNI
 Faults in customer terminals account for 50% of the entire GPON network faults, but
eSight cannot directly monitor the status of terminal devices. The communication
status between a client terminal and the ONU can be indirectly monitored by the
status of the ONU UNI.
 The eSight checks the ONU UNI status using the ONU NE explorer or ONU topology.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Manually upgrading communication devices to H theusame version in batches

Add, modify, and delete versions bynconfiguring a version upgrade task.


io type, and upgrade version using the upgrade

Configure the upgrade object, tupgrade


ic a
r t if
wizard. The eSight supports immediate upgrade and scheduled upgrade.

Ce of the devices.
 Monitor and manage the entire device upgrade process to view the upgrade progress,
structure, and version
&

n g
Query the detailed history records of the device upgrade.
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Fast network recovery: Hu
n
Devices can be upgraded remotely in batches. As many as 300 ONTs can be
o
ti

upgraded per hour, greatly improving the upgrade efficiency.

ic a

rt if
If an ONU needs to be replaced, the MxU configuration file can be backed up in

e
advance so that the new device inherits the configuration data of the original device.
C
In this way, the network can be quickly restored to meet service requirements.
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

u have been pre-installed with an
Pre-installation scheme: The servers delivered byHHuawei
operating system and the eSight system.
o n
t i
New installation scheme: If a server is purchased from another vendor or the eSight system
ainstallation process shown in the figure.

ic
tif
needs to be reinstalled, refer to the

r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Recommended operating system and database H u for the server installation
versions
environment:
o n
Configuration 1: Windows Server
t i R2 Standard (64-bit) (Chinese simplified or
2008
a 2012 R1 Standard (64-bit) (Chinese simplified or

ic
tif5.5 (included in the standard NMS software package)
English version), Windows Server

r
English version) + MySql
e 2008 R2-Standard Edition
C
/Microsoft SQL Server

&
Configuration 2: Novell SuSE LINUX Enterprise Server-Multi-language version -
g
n Edition 11g R2
Enterprise version -11.0 SP3 (Chinese simplified or English version) + Oracle Database
i
in
Standard
a
T r Configuration 2 is recommended if there are more than 20,000 management
Note:

ei nodes.

a w There is no special operating system requirement on the client installation environment. The
u

H browser version and internal storage must meet certain requirements.


n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 eSight server host names: Hu
Must be unique on the network.
o n
ti digits, and hyphens (-). The first character must be

ic a
Consists of letters (case sensitive),
a letter.
i f
e rt
Contains 2 to 24 characters
C


&
eSight server IP address:

Static IP g

i n addresses must be used.

a ineSight supports IPv4, IPv6, and IPv4/IPv6 dual stacks. Plan the IP address based
The
ron the actual networking.

T
ei The server can communicate with the managed devices properly.
w

u a  The server communicates with clients properly.


H  eSight installation path:
 The eSight software cannot be installed in the root directory.
 It is not recommended that eSight be installed in the system partition.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 When installing the SQL Server 2012 database,H youuneed to specify the password of the
SQL Server system administrator account sa.
o n
t i
The password can contain only uppercase and lowercase letters, digits, and the
a

ic
tif
following special characters:

r
Cecontain 8 to 32 characters.
~@#^*()-_+|[{}];,/?

The password must


&


g
After installing the SQL Server 2012 database, you can check whether the installation is
nviewing the information in the SQL Server Configuration Manager.
n
successful byi
a iaddition,
r In you need to make network configurations for the SQL Server. Otherwise,
T the eSight cannot access the database.

e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu to start the installation program. In
Double-click setup in the installation package directory

nselect Read and Accept, and click Install.


this case, select to install the eSight V300R008C00SPC200 software and select English as
o
ti
the language. Read the license agreement,

The system automatically checks c


i a
f
whether the current environment meets the eSight
ti current environment does not meet the eSight installation

r
installation requirements. If the
requirements, the systemedisplays a message. After the fault is rectified, reinstall the eSight.
C

&
Once the installation language is selected, the language cannot be changed after the

n g
installation is complete. You can only reinstall the eSight to change the language.
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Ensure that the eSight software installation pathHisu empty. Otherwise, eSight cannot be
installed.
o n
t i the system asks you whether to create a directory.
If the installation directory does not exist,
acreates the directory.

ic
tif
Click Yes. The system automatically


e r
Installation parameter settings:

IP address type: Cindicates IP address type of the eSight server. The eSight supports
& IP dual-stack. Select a proper type based on network planning.

IPv4, IPv6, and


g
n indicates the default IP address of the current server. If the server has
i
in IP addresses, select an available IP address that can be used by the eSight to
 IP address:

a
rcommunicate with external entities from the drop-down list box.
multiple
T
ei Port: The default port number is 8080. If the port number is occupied, change it to
aw

Hu
another port number.

 Installation path: Indicates the eSight installation path. You can manually change the
path, for example, E:\eSight. The default value is D:\eSight. The eSight software
cannot be installed in the root directory.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hisuinstalled for the first time, enter the user
If the database type is SQL Server and the eSight
name sa and password Changeme123.
n
Database server parameter settings: io

a t
i f ic user name is sa, which is the default administrator
Administrator Name: The default
rt database and has the highest permission on the database.

e
account of the SQL Server
C
You can set a user with the same rights as the sa user if necessary.
&Password: The default value is Changeme123. If the database
Administrator
g

i n is different from the default password, enter the password of the database
password

a in
administrator.

T rDatabase Port: The default port is 1433. If the database port number is different
ei from the default port number, enter the database port number manually.

a w
Hu  SID: Indicates the database instance name. The default value is MSSQLSERVER. If
the actual database instance name is different from the default value, enter the
actual database instance name.

 NMS User Password: The default password of the database NMS user is
Changeme_123.
 Data file directory: indicates the path for storing data files. The default path is
D:\eSightData. You can change the path manually. If the specified directory does not
exist, the system asks you whether to create a directory. Click Yes. The system
automatically creates the directory.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 In the Select Software Components To Be Installed Hu dialog box, select the components
to be installed and click Next.
o n
t i
The functions of the components are controlled by licenses. If a license is not purchased,
abe used after the installation. Different licenses enable

ic
tif
the corresponding function cannot
different components.
r
e Package are mandatory and dimmed by default. Select to

C
The components under Basic
&
install components under Business Management Component according to the actual
situation.
n g
i

a
The eSightin supports incremental component installation. That is, if a component is not

T r during the first installation of the eSight, you can continue to install the
installed
i
ecomponent when installing the eSight for the second time. Ensure that the version number

a w of the installation package during incremental installation is the same as that of the eSight.

Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 On the Summary page, confirm the installationH u and click Next. If the installation
settings

n
setting is incorrect, click Previous to set the installation parameters again.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hutakes about 15 minutes. After the
The system starts to install eSight. The installation

n
installation is complete, click Finish in the Installation Completed dialog box.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hunot select Start eSight Server by
After the installation is complete, the system does

n
default. To start the eSight server immediately, select Start eSight Server and click Finish.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 To start the eSight server, perform the following u
Hsteps:
n
Double-click the eSight Console shortcut icon on the desktop and click Start to start
io

the eSight server.


t
a > eSight > eSight Console, and click Start to start
ic

the eSight server. rt


if
Choose Start > All Programs

On the eSight Console


e click Start. Wait for several minutes. The console is
Cpage,
&

successfully started.

If the eSightin
g
n
server needs to be automatically started when the operating system restarts,
i

r a
perform the following steps: On the main menu, choose Settings > Automatic Startup.

i T
e
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Log in to the eSight from a client browser and check Hu whether the eSight version and
functions are normal.
o n
Open a browser, enter http://eSight
t i server IP address:port number in the address box,
a

ic
if is 10.175.197.60, and the default eSight port
and press Enter.

r taddress
number is 8080. e
 In this example, the IP
C
If the server& has multiple IP addresses, enter the IP address selected during eSight
g

software
i n installation. Otherwise, you cannot log in to the eSight.
If ain

rainstallmessage is displayed indicating that the website security certificate is incorrect,

i T the security certificate first.


e If the server IP address entered in the address box is localhost or 127.0.0.1, the
aw

Hu
security certificate cannot be installed.

 The Windows Internet Explorer 11, Firefox 45 ESR, and Chrome 52 browsers are
recommended.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 If Firefox browser displays a message indicatingH u the security certificate is incorrect, the
that
possible causes are as follows:
o n
t
The security certificate is incorrecti the eSight security certificate is not installed.
or
a

ic
tif
Install a valid security certificate.

r
Cea certificate issued by a CA to eSight.
 Handling method:

Method 1: Deploy
&

g
Method 2: Set the eSight built-in certificate as a browser trusted certificate.
inadvised to use method 1 to deploy the certificate issued by a CA to eSight.

Younare

a i 2 may not take effect in some scenarios due to browser version differences.
T r Method


eIntoi the preceding figure, if a security certificate error occurs in the Firefox browser, you need

a w set the browser trust certificate. On the page that is displayed, click Add Exception. On

Hu the Add Security Exception page that is displayed, click Get Certificate to obtain the
certificate, and then click Confirm Security Exception to confirm the security certificate.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Huthe password as prompted. For example,
After logging in to eSight for the first time, change

n the eSight to restore the default password.


change the password to Huawei123 and keep the new password secure. If the password
o
ti
of the admin user is lost, you need to reinstall

i a
c the correct user name and password.
f
When logging in to the eSight, enter
ti to log in to the eSight and enters incorrect passwords for 5

r
Ce 10 minutes, the login IP address is locked for 10 minutes.
 If an admin user attempts
consecutive times within
If a common& user attempts to log into the system and enters incorrect passwords for
g

i
a numbern of times reaching the account restriction conditions, the account is locked
forin
a
30 minutes by default.

T rA user can log in to the system again after the lockout duration expires. A common
ei user can also contact the administrator to unlock the account and then log in to the

a w system again.

Hu  If a password is about to expire, the eSight prompts you to change the password within
the validity period.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hu
Main menu: Displays main entries for eSight functions.

n
Alarm indicator area: Displays the total number of alarms, uncleared critical alarms,
ioalarms, uncleared warning alarms, and cleared

t
uncleared major alarms, uncleared minor
a
ic
tif the following common eSight information from left to
alarms from left to right.

Common information area:rDisplays


right: user name, logout,e

C global search, website map, help, and about.


& area: Displays the device data status using the protlet. This
Home page customization
g

i
feature enablesn users to detect and handle abnormal device status in a timely manner and
a in device running.
ensure normal

T rThe portlet displays the device status and network-wide status in a list, curve chart,
ei or bar chart in each area on the home page.

a w
Hu  Statistics area: Displays device status and service statistics based on the customized status,
including top N average CPU usage, top N average memory usage, and so on.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Huand select a specific function from the
Navigation tree on the left: Access the main menu

n
navigation tree to access the operation page of the function.
o
t i operations on the eSight.
Page: This area is used to perform specific
a

ic
r tif
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 Choose Start > All Programs > eSight > eSight HuConsole. In the dialog box that is
displayed, click Stop.
o n
t
When the system displays a message i indicating that the status of each process is
a eSight system succeeded is displayed, the

ic
services are stopped. tif
stopped and the message stopping

e r

C
Choose Start > All Programs > eSight > Uninstall eSight to start the uninstallation
program.
&
In the n g

i displayed eSight uninstallation wizard, click Next.
n displayed Confirm dialog box, click Yes.
In ithe

a
rThe system starts uninstalling the eSight. The uninstallation takes about 10 minutes.
T
ei

a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 inu
After the uninstallation is complete, click FinishH the Uninstall Completed dialog box.

In the displayed Confirm dialog box, clicknYes to restart the operating system.
io

a t
ic
r tif
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w

Hudeployment, hierarchical deployment,
The eSight deployment modes include single server
and integration with the OSS system.
n
The eSight Infrastructure Managementio

a t Maintenance Tool uses the browser/server (B/S)


working mode..
i f ic

e rt uses multiple web clients and a single server. Web clients


The single-server system
C
and the eSight server are connected through a LAN or WAN.
After logging&in to the eSight Infrastructure Management Maintenance Tool using a
g

i n on a PC, you can manage and maintain the infrastructure management


web browser

a in server.
system

T rThe single-server system deployment solution applies to scenarios where the network
ei scale is small and reliability requirements are not high.

a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
 The eSight supports hierarchical management to u branch network monitoring
Hmeet
requirements of enterprise headquarters.
o n
t
In hierarchical deployment mode, a user i add lower-layer NMSs to the upper-layer NMS.
can
a

f ic
The system provides links to the lower-layer NMSs. When a user clicks a lower-layer NMS
link, a new browser windowtisi displayed, showing the home page of the lower-layer NMS.
e r
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Operation support system (OSS) is the networkH u
management software running on the

n and configure network devices.


network management center workstation. Network administrators can operate the OSS to
o
ti
send requests to managed devices to monitor

i a
c the OSS are as follows:
f
The advantages of integration with
ti

Improve the networkrmanagement


e
 capability through the OSS.
C
Separate NE management functions from the network management functions.
&

n g
Meet the requirements of the enterprise O&M.
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
 Answers: Hu
1. Yes
o n
ti

 2. C
ic a
rt if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
Recommendations
 Huawei Learning Website
 http://learning.huawei.com/en

 Huawei e-Learning
 http://support.huawei.com/learning/NavigationAction!createNavi?navId=MW
000001_term1000025144&lang=en

 Huawei Certification
 http://support.huawei.com/learning/NavigationAction!createNavi?navId=_31
&lang=en

 Find Training
 http://support.huawei.com/learning/NavigationAction!createNavi?navId=_trai
ningsearch&lang=en

More Information
 Huawei learning APP

版权所有© 2018 华为技术有限公司

S-ar putea să vă placă și