Documente Academic
Documente Profesional
Documente Cultură
Huawei e-Learning
http://support.huawei.com/learning/NavigationAction!createNavi?navId=MW
000001_term1000025144&lang=en
Huawei Certification
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_31
&lang=en
Find Training
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_trai
ningsearch&lang=en
More Information
Huawei learning APP
n
The Access Network (AN) consists of all devices and lines between a local switch and user
iousers and various application systems through
t
terminals. It directly provides services for
a largest part of the telecom network and generally
different transmission media. It iscthe
i
accounts for 1/2 of the network
r tif investment.
C e into narrowband and broadband access networks based on
Access networks are classified
&
the bandwidth. Narrowband and broadband are classified based on the amount of data to
be transmitted.gGenerally, a bandwidth greater than 2 Mbps is a broadband service.
i nservices include voice and fax services. Broadband services include Internet
in
Narrowband
access,avideo, game, and HDTV services.
T r
ei
AN: access network
ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
In a MAN, a large number of scattered users use u services through PCs, IADs, or E-
Hvoice
n
phones. How to connect these services to the bearer network?
o
L2 access:
a ti
Individual broadband usersiccan access the BRAS through the ATM DSLAM, IP DSLAM,
tif
r
Ce users can access the network through ADSL, Ethernet
and LAN.
switches, MSTP,
n g
i
inthe MAN access layer, the BRAS is used to authenticate users and send user data
L3 convergence:
a
rto the aggregation router of the Internet or the backbone network of telecom
On
T
ei services based on user characteristics, such as the domain and destination IP address.
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
DSL is short for digital subscriber line.
Hu
o n
DSL is a technology developed by the telecom industry to utilize the copper lines of millions
ti
of kilometers around the world. Therefore, DSL is also called the copper line access
technology.
ic a
if
Let's review the origin and development history of the xDSL technology.
rt
subscriber line of the integrated service digital network, that is, the ISDN technology. ISDN
is recognized asgthe first generation DSL technology.
ISDN has n ininterface rates: BRI and PRI. The transmission rate of BRI can reach the 144
Kbps, a i that of the PRI can reach 2.048 Mbps or 1.544 Mbps.
two
T r and
i late 1980s,
etechnology,
By the with the development of digital signal processing technologies, the HDSL
a w that is, the high bit rate digital subscriber line technology, is introduced. The
HDSL technology can provide the transmission rate of 2.048 Mbps or 1.544 Mbps.
Hu In the early 1990s, engineers from Bell realized that it is possible to provide asymmetric
services, that is, the rate in one direction could be much higher than that in the other
direction.
This asymmetry is suitable for the video-on-demand test proposed at the time. So the ADSL
technology, namely asymmetric digital subscriber line technology, is developed.
With the development of the digital subscriber line technology, a technology with a higher
rate than the ADSL is considered.
In the late 1990s, the VDSL technology came into being, that is, the very high speed digital
subscriber line technology.
So far, some other DSL technologies are also developed and called xDSL technologies.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu rate, that is, from the central office
ADSL provides asymmetric transmission rates. Downlink
g 1.5 km. The VDSL service can be transmitted on the same line as the
n service and ISDN service.
i
ordinary telephone
i
(DMT)
edistance
a w transmission, and the high data transmission rate of VDSL is enhanced from 70/30
Hu Mbps to symmetric 100 Mbps. To achieve such a high transmission rate in a range of 350
meters, the spectrum of VDSL2 has increased from 12 MHz to 30 MHz. In addition, the
transmission power has increased to 20 dBm to meet the requirements for medium- and
high-ring transmission.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hutraditional analog voice signals (except
The xDSL technology can transmit data signals and
SHDSL) on the same twisted pair.
n
This slide uses ADSL as an example. io
a t
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
OPEX:Operating Expense Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu in network construction:
Large-scale enterprises face the following challenges
A large number of switches occupy n equipment room space, consume much power,
io
g
Adding new devices on the network is complex, and the capacity expansion
n is poor.
i
in of PON:
capability
r a
Advantages
T
ei Optical
cables replace traditional network cables, reducing investment costs and
a w simplifying construction. The optical cables are antioxidant, durable, and easy to
Hu maintain.
The passive convergence optical splitter greatly reduces the number of aggregation
switches and auxiliary equipment rooms, saving space and power consumption.
Integrated office: Provide unified bearer for corridor terminals. The PoE is used to solve the
problem of power supply.
Independent office: One desk and one line, providing 1000 Mbps bandwidth. The cable is
connected the IP phone and then to the PC. The networking is simple.
Open Office: PoE supplies power to Wi-Fi and cameras. Office services are carried in a
unified manner (telephone).
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu services such as telephone and TV to
The hotel network is evolving from traditional single
n
monitoring, Wi-Fi, intelligent control of guest rooms, and environment awareness,
o
ti
becoming diversified, intelligent, and mobile.
i a
c requirements of smart hotels, such as 4K HD videos,
f
Higher bandwidth: New service
ti
r
require higher bandwidth.
e anytime and anywhere: Seamless connection between guest
C
Access to the network
&
rooms, corridors, lobbies, and conference rooms.
n g
i
Rich value-added services: Video on demand (VoD) and intelligent guest room control
in operation cost: A large number of guest rooms and wide coverage require
a
ra simple network that features easy deployment and O&M.
Economic
T
i Huawei Agile POL Converged Hospitality solution integrates the development of
eThe
aw
Hu
wireless, wired, video, voice, and guest room surveillance services with the concept of all-
optical smart hotel and the service bearing mode of "one room one fiber, and multiple
services" to meet the requirements of various information systems using simplified
networking and management
One room one fiber simplifies the network and reduces costs.
Multi-scenario and multi-service coverage: Provides seamless coverage for HSI, voice,
TV, Wi-Fi, and control services in guest rooms, halls, corridors, and restaurants.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
Cloud education and remote teaching require high-bandwidth and high-reliability campus
networks that support smooth evolution.
o n
t i
Campuses require full wireless coverage, unified authentication for wired and wireless
access, and seamless roaming. ca
T r PON/40G PON).
(PON/10G
i WDM equipment is used to multiplex CATV signals and GPON signals into one optical
eThe
w
H One optical fiber carries all types of services in classrooms, offices, and outdoor
entertainment areas.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Answers: Hu
1. CD.
o n
2. ABD.
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Brief history of Ethernet development: Hu
n
In 1973, Xerox, a company in Palo Alto Californian, proposed and implemented the original
o
ti
Ethernet. Dr. Robert Metcalfe was recognized as the father of Ethernet, and his lab
ic a
if
prototype system ran at a speed of 2.94 megabits per second (3 Mbps).
r t
e
In 1980, Digital Equipment Corporation, Intel, and Xerox jointly launched the 10 Mbps DIX
C
Ethernet standard [DIX80]. IEEE 802.3 standards are formulated based on this original
&
Ethernet technology.
g
In 1995, IEEEnofficially passed the 802.3u Fast Ethernet standard.
ni
a i
r
In 1998, the IEEE802.3z gigabit Ethernet standard was officially released.
i
In T the IEEE802.3ab standard, that is, the 1000BASE-T standard, was released.
1999,
eOn July 18, 2002, IEEE passed the 802.3ae (10 Gbps Ethernet), also known as the 10GE
aw
Hu Ethernet. It includes three physical interface standards: 10GBASE-R, 10GBASE-W, and
10GBASE-LX4.
In March 2004, IEEE approved the 10G Ethernet standard 802.3ak for copper cables. The
new standard will be implemented as 10GBASE-CX4 to provide a 10 Gbps rate on dual-axis
cables.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu layer of the network. The new-
The 10 Mbps Ethernet is usually located at the access
n
generation multimedia, image, and database products can easily overwhelm the Ethernet
o
ti
bandwidth of the 10 Mbps.
ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu802.3 cables also include optical fiber
In addition to coaxial cables and twisted pairs, IEEE
n
10BASE-F. The 10BASE-F has been used at the initial stage, and the transmission distance
o
ti
can reach about 2 km.
ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hurequirements of network data
The standard Ethernet rate is too low to meet the
transmission in the modern age.
o n
Therefore, IEEE defined a fast Ethernetiwith
f ic
standard is IEEE802.3u, and the transmission medium mainly includes optical fibers and
twisted pairs.
r ti
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The fast Ethernet working in full-duplex mode can Hutransmit and receive data at the rate of
n
100 Mbps at the same time. The channels for transmitting and receiving data are
independent of each other. In this way,o
ti
no conflict occurs and the communication
ic
efficiency of the network is improved. a
t i f
r
EIA/TIA: Electronic Industry Alliance/Telecommunications Industry Association
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The Gigabit Ethernet is an extension of the IEEEH u Ethernet standard. Based on the
802.3
n
Ethernet protocol, the Gigabit Ethernet increases the transmission rate of the fast Ethernet
o
ti
by 10 times to 1 Gbps.
i a
c IEEE802.3z (optical fiber and copper cable) and
f
Gigabit Ethernet has two standards:
IEEE802.3ab (twisted pair) ti
e r
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu 1000BaseT is a gigabit Ethernet
IEEE802.3ab defines the 1000BaseT cable standards.
n
technology that uses Cat. 5 UTP as network transmission media. The longest effective
distance can reach 100 m, the same as o
ti Mbps in the existing fast Ethernet system.
100BASETX. This technology can be used to achieve
smooth upgrade from 100 Mbps toa1000
fic standards:
IEEE802.3z defines 3 types ofticable
e r
C
The 1000BaseCX uses a special type of shielded copper cable with high-quality
&
balanced twisted pairs. The longest effective distance is 25 m, and a 9-core type-D
n
connectorg is used to connect the cable.
i
a in
1000BaseSX is a network medium technology that uses short-wave laser as the signal
T rsource. The laser transmitter with the wavelength of 770–860nm (usually 800 nm)
ei configured on the transceiver does not support single-mode optical fibers and can
n
implementing multipoint communication using shared media. The basic rules are as follows:
o
t i Otherwise, go to (2).
(1). If the medium is idle, send data.
a listening to the channel until the channel is idle, and
c
(2) If the medium is busy, ikeep
tif
e r
then send data immediately.
(3) If a collision isCdetected, that is, the swing of the voltage on the line exceeds twice
& a short jamming signal is sent, so that all stations know that a
radataAfter the jamming signal is sent, wait for a random period of time, try to send
ic
tif
resulting in bit errors. The function
the signals.
r
Ce
Hubs and repeaters are connection devices at the physical layer.
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hub is an Ethernet device that works based on H theuCSMA/CD mechanism. Its working
n
principle is simple: The data frames (be it unicast or broadcast) received from any port are
all forwarded to any other ports excepto
ti
the source port.
i a
c change the physical topology of the Ethernet. The
f
Therefore, the hub and repeater only
ti is still the bus topology.
r
logical structure of the Ethernet
Ce address, and only replicates and forwards data.
A hub does not use the MAC
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu built using hubs and repeaters is a
From the above contents, we can know an Ethernet
n
shared Ethernet. A shared Ethernet has the following disadvantages:
o
Serious collision
a ti
Broadcast flooding
i f ic
rt
No security
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
A switch is a bridge device working at the dataH ulayer of the Ethernet. It needs to
link
implement the following basic functions:
o n
MAC address learning
a ti
Forwarding and filtering ic
tif
r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
In this figure, DMAC represents the MAC address Hofu the destination terminal, SMAC
n
represents the source MAC address, and the LENGTH/TYPE field has different meanings
according to the value. If LENGHT/TYPEo
ti protocol type). If LENGTH/TYPE is less 1500, it
is greater than 1500, it indicates the type of the
c a
data frame (for example, the upper-layer
indicates the length of the datafiframe. DATA/PAD is specific data. The minimum length of
i
rtbe greater than or equal to 64 bytes (calculated according to
the maximum distanceC
e
an Ethernet data frame must
in half-duplex mode). Therefore, if the data length plus the frame
header is less than&64 bytes, the padding content needs to be added to the data part. FCS
n g
i
is a frame check field, which is used to determine whether an error occurs in a data frame.
a in of LENGTH/TYPE is greater than 1500, the MAC sub-layer can directly submit
If the value
r frame to the upper layer protocol according to the value of LENGTY/TYPE. In this
theTdata
i it is unnecessary to implement the LLC sub-layer. This structure is the currently
ecase,
a w popular ETHERNET_II, and most computers support this structure. Note that in this
Hu structure, the data link layer may not implement the LLC sub-layer, but includes only one
MAC sub-layer.
If the value of LENGTH/TYPE is less than or equal to 1500, this structure is called
ETHERNET_SNAP, which is a standard defined by the 802.3 Committee. Currently, it is not
widely used.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Huit belongs to Ethernet_II (0x0800 is
If an Ethernet frame of the 0800 type is generated,
n
greater than 1500) and is an IP datagram (0800 indicates an IP datagram).
Similarly, if the type is 0806, the data isio
C e
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
u
A MAC address contains 48 bits, but it is usuallyHrepresented as a 12-bit dotted
hexadecimal number.
o n
MAC addresses are globally unique and
t i managed and allocated by the IEEE.
a code and serial number. The first 24 bits represent
c
Each address consists of 2 parts:ivendor
tif and allocated by the IEEE. The remaining 24 bits are
r
allocated by each vendor.e
the vendor code, which is managed
C
Special MAC address: &
g
r a
2.
T
i a destination address, the 8th bit indicates whether a frame is to be sent to a single
eInstation
a w or a group of stations. In the source address, the 8th bit must be 0. (because a
Hu frame cannot be sent from a group of stations). It is essential that the address of a station
be uniquely determined. The destination of a frame must be clear.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
First let's talk about the MAC address learning. Hu
A bridge forwards data frames based on the n MAC address table. The MAC address table is
io MAC address. The MAC address table of a
i nis an example. After receiving a frame from port 1, the switch checks the
in MAC address and then the cached MAC address table on the switch. However,
The following
a
r address table is empty. What will the switch do? The switch sends the data frame
destination
theTMAC
etoi all ports (except the port 1 which is the source port of the frame). The switch also checks
a w the source MAC address of the frame and maps the MAC address of port 1 to the MAC
Hu address of site A. The source MAC address of the frame is the physical address of site A. In
this way, each station establishes a mapping relationship with a directly connected port, so
as to form a MAC address table.
If a port is connected to a hub, one port corresponds to multiple MAC addresses. Each port
on a switch corresponds to a collision domain.
Note: In the case of multicast, an address entry is established through protocols such as
IGMP snooping instead of learning.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hupackets based on destination addresses.
The second basic function of a switch is forwarding
n
The switch queries the MAC forwarding table and forwards packets accordingly. If a
io not exist in the table, the switch forwards the
t
destination address of a packet does
packet in broadcast mode.ca
t i fi using the automatic address learning and aging
e r
The address table is maintained
mechanism.
C
&frame format is not modified (the frame format needs to be modified
Generally, the
g
and a n
i tag must be added in a VLAN).
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Receive all data frames on a network segment.Hu
Use the source MAC address in the received n data frame to establish the MAC address table
io address aging mechanism to maintain the
t
(source address self-learning) and use the
a
address table.
ic
f the destination MAC address of a data frame. If the
r tifor
destination MAC addresse
Search the MAC address table
C is found, send the data frame to the corresponding port
&
(excluding the source port). If no destination MAC address is found, send data to all ports
(excluding the g
i n source port).
n
Forwardibroadcast
a
and multicast frames to all ports (excluding the source port).
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu Ethernet, but it still has the problem
An L2 switch solves the collision problems in a shared
of broadcast flooding.
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Reference answer: Hu
o n
1. Including coaxial cables, twisted-pair cables, and optical fibers.
ti
2. Carrier Sense Multiple Access/Collision Detection (CSMA/CD) is an effective
c a
means of multi-point communication through a shared medium. Listening is
i
t if
performed before data is sent to ensure that the line is idle and the chance of
r
Ce
collision is reduced. Data sent by each station may be received by multiple
stations at the same time. In addition, when a collision is detected, the sending is
&
stopped and retried after a random period of time.
ng
ni
3. An l2 switch is a device working at the data link layer and needs to perform the
ei
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Traditional LAN uses HUB, HUB has only one bus, Huand a bus is a collision domain. Therefore,
n
the traditional LAN is a flat network, and a LAN belongs to the same conflict domain. Any
packet sent by a host will be received byoall other machines in the same conflict domain.
i is used instead of the hub (HUB). Each port can
tswitch)
Later, the network bridge (two layer a
c conflict domain is restricted to each port, which
ithe
i f
rt of the network sending unicast packet and greatly improves
be regarded as a single bus, and
e
greatly improves the efficiency
the performance of theClayer 2 network. If a host sends a broadcast packet, the device can
& information. We usually call the area that the broadcast packet
also receive the broadcast
g
nthe broadcast packets and send them to the various corners of the network.
i
can reach as a broadcast domain. When the bridge is transmitting the broadcast packet, it
n
ai expansion of network scale, more and more broadcast packets are in the network,
will still copy
Withrthe
i Tmore and more network resources are occupied by the broadcast packet, which
eseriously affects the network performance. This is the problem of the so-called broadcast
and
a w
Hu storm.
Because of the working principle limitation of the layer two network, the bridge is
powerless for the broadcast storm problem. In order to improve the efficiency of the
network, we usually need to segment the network: divide a large broadcast domain into
several small broadcast domains.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
In the past, LAN was often segmented throughH u the transmission range of the
a router,
n
broadcast message is greatly reduced. This scheme solves the problem of broadcast storm,
but the router separate the network ono
ti difficulty of management and maintenance is
the network layer, the network planning is complex,
it is not flexible on networking, andathe
i f ic LAN segmentation method, the virtual LAN is
rtsolution to solve the problems of large-scale layer two
greatly increased. As an alternative
e
introduced into the network
network environment.C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The Virtual Local Area Network (VLAN) technologyHulogically divides a physical LAN into
n VLANs cannot. In this manner, messages are
multiple VLANs (broadcast domains). As a result, hosts within the same VLAN can
o
i
tcommunication
communicate directly, while hosts in different
broadcast in each VLAN, inter-VLAN
c a is restricted, and network security is
enhanced.
t i fi
e r
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Compared with the traditional LAN, VLAN has the Hufollowing advantages:
Limit the broadcast packet to improve then utilization of bandwidth:
io caused by broadcast storm is effectively
t
abroadcast domain, and the same VLAN member is in
The performance degradation problem
c
i
if by the VLAN, then when a packet has no routing,
solved. A VLAN forms a small
r tidentified
the switch will onlyesend the packet to all other ports that belong to the VLAN, not
the broadcast domain
C
&
all the ports of the switch, so that the packet is limited within a VLAN. To a certain
n g
extent, the bandwidth can be saved.
i
a
Reduce thein of movement and change:
cost
T rThe dynamic management network, that is, when a user moves from one position to
ei another, his network attributes do not need to be reconfigured, but dynamic. This
a w dynamic management network brings great benefits to both the network manager
Hu and the user. One user, wherever he goes, can access the network without changing
configurations. The prospect of access to the network without any modification is
very promising. Of course, not all VLAN definition methods can do this.
Create a virtual workgroup:
The ultimate goal of using VLAN is to build a virtual workgroup model. for example,
in an enterprise network, the same department is easy to access and communicate
with each other as on the same LAN, and all the broadcast packets are restricted to
the virtual LAN, without effecting the other VLAN users. If a person move from one
place to another when he is still in the same Department, the user's configuration
does not need to be changed; at the same time, if a person has not changed the
n
office place, but he changed the Department, the network administrator only needs
it o
to change the user's configuration of this user. The goal of this function is to build a
ic a
i
dynamic organizational environment. Of course, it is just an ideal goal. To achieve it,
f
rt
Ce
some other support is needed. Users are not restricted by physical devices. VLAN
users can be anywhere in the network. VLAN has no effect on users' applications.
&
g
Enhance the security of communication:
n
One VLAN packet will not be sent to another VLAN, so that other inVLAN users can
i information will not
ra
not receive any packets from this VLAN, ensure that the VLAN
be wiretapped by other VLAN people, thus realizing theTinformation secrecy.
ei
Enhance the robustness of the network:
a w
with a PVID. C e
switching device will not add
i n It is simple to define VLAN members.
r a
T
Disadvantages: VLANs must be re-configured when VLAN members change locations.
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
In this mode, VLANs are classified based on theH MACu addresses of network interface cards
n
(NICs). The network administrator configures the mappings between MAC addresses and
o
ttoi be added to the packet according to the MAC
VLAN IDs. In this case, when a switching device receives an untagged packet, it searches
the MAC-VLAN table for a VLAN tag
ic a
i f
rt locations of users change, you do not need to re-configure
address of the packet.
e
C improves the security of users and increases the flexibility of user
Advantages: When the physical
&
VLANs for the users. This
access.
g
n This mode is applicable to only a simple networking environment where the
i
r
NIC seldom
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
VLAN IDs are allocated to packets received on an u according to the protocol (suite)
Hinterface
nVLAN IDs.
type and encapsulation format of the packets. The network administrator configures the
o
ti
mappings between types of protocols and
i a
c ised today.
f
This classification of VLANs is barely
ti
r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
When receiving an untagged packet, a switching u adds a VLAN tag to the packet
Hdevice
based on the IP address of the packet.
n
Advantages: Packets sent from specificio
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu switches to related switches.
VLAN information can be transmitted across multiple
All VLAN-3 data in the above figure can bencommunicated through intermediate transition
switches, so as the data of VLAN-5. io
a t
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The access link refers to the link between a hostH u a switch. Usually, hosts do not need to
and
n
know which VLAN they belong to, and the host hardware does not necessarily support
frames with VLAN tags. The frames thatothe host requires to send and receive are frames
a ti
fic port, which belongs to one VLAN. This port can not
that are not marked.
g to this port.
n links that can carry multiple VLAN data. Trunk links are usually used for
i
r
interconnection
T
i a data frame is transmitted on a trunk link, the switch must identify the VLAN of the
edata
When
a w frame. IEEE 802.1Q defines the VLAN frame format, all the frames transmitted on the
Hu trunk link are tagged frames. Through these tags, the switch can determine which frames
belong to which VLAN.
Unlike access links, the trunk links are used to carry VLAN data between different devices
(such as switches and routers, switches and switches), so the trunk links belong to no
specific VLAN. By configuring, the trunk link can carry all the VLAN data, or it can be
configured to transmit only the specified VLAN data.
Although the trunk link does not belong to any specific VLAN, it can configure a PVID(port
VLAN ID). When there is untagged frame transmitting on the trunk link, the switch will add
PVID as VLAN tag to the frame, then handles it.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
The difference between the Hybrid port and theH u port is that the hybrid port allows
Trunk
ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu1 is the default VLAN, which can neither
All the default ports belong to VLAN 1, and VLAN
be created nor deleted.
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu so they call VLAN-1 the default
All ports of 802.1Q based switches belong to VLAN-1,
VLAN.
n
Here is a new term called PVID, the fullio
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Trunk port is responsible for forwarding multiple u data frames between switches, use
HVLAN
n
command “port trunk allow-pass vlan [VID]” to allow the data frames with a specific VLAN
o
ti
to pass.
i a
c VLAN [VID]" to change the PVID value of the Trunk
f
Here is a command "port trunk PVID
i port PVID value is different from the Access port PVID.
&
the default VLAN value.
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The four byte 802.1Q tag header contains 2 byte u protocol identifier (TPID) and 2 byte
Hlabel
label control information (TCI).
o n
TPID (Tag Protocol Identifier) is a new itype
t
a 0x8100.
defined by IEEE, indicating that it is a frame with
802.1Q tag. TPID contains a fixedcvalue
i
f It contains the following elements:
tiframes.
TCI is a control informationrof
e the priority of the frame. There are 8 kinds of priorities, 0-
Cindicate
Priority: the 3 bits
& standard uses these three bits information.
a
r VLAN Identified (VLAN ID): This is a 12 bit domain, indicating the ID of VLAN, range
format
T
ei from 0 to 4095, a total of 4096, and the actual range is 1-4094. Each packet sent by
a w
Hu the switch supports the 802.1Q protocol will contain the domain to indicate which
VLAN belongs to.
In an switched network environment, there are two formats of Ethernet frames: some
frames are not labeled with these four bytes, called untagged frame, and some frames are
added to the four bytes, called the tagged frame.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Access port receive frame Hu
n
If the frame is untagged, the port will add PVID, otherwise, frame will be discarded
o
ti
directly.
ic a
Access port send frame
rt if
Ethernet frame. Ce
The 802.1Q tag header is stripped out, and the frame that been sent is an ordinary
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Trunk port receive frame Hu
n
If the frame is untagged, add PVID. Otherwise, receive it.
o
ti
Ce
&
n g
i
a in
T r
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Reference answer: Hu
n
Based on port, based on MAC, based on protocol, based on subnet.
o
i and Access ports send packet without TAG.
1.
ic a
i f
e rt
C
&
n g
i
a in
T r
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Routers provide a mechanism for interconnecting u
Hheterogeneous networks to transmit
ic a
then sends the packet to the next router,
i f
rt
host.
Routing is the path from e
Cwill forward packet according to the best route in the routing table.
the source to the destination of a packet. When there’s multi-
&
routes available, routers
Depending on g
eAccording
aw
to whether the destination is directly connected to the router, it can be divided
Hu
into:
e rt
The following key items are included
C
Destination: identify the destination address or destination network of IP packet.
& with the destination address, it identifies the address of a network
Mask: together
g
i
segment n where the destination host or router is located. The corresponding network
a in information can be obtained after doing “AND” operation to the destination
segment
T raddress and the network mask. The mask is composed of a number of continuous
ei "1", which can be expressed in dot decimal notation or in the continuous number of
Hu Interface: Indicate which interface will be used to forward the IP packet out of the
router.
Next-Hop: Specify the interface address of the next router that the IP packet will go
through..
We will introduce some other fields inside the routing table, such as priority, metric
and so on later.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Huindicates the source of the routing, that
There is a Protocol field in the routing table, which
n
is, how the route is generated. There are 3 main sources of routing:
o
a ti
Link layer protocol found routing (Direct)
i f ic no manual maintenance.
Small cost, simple configuration,
rtto local interfaces can only be found.
C e
The routing belonging
&
Manual configuration static routing (Static)
No cost, g
T
ei High cost, complex configuration, no manual maintenance.
Routing
aw
Hu
Can be applied to complex network topologies.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
When forwarding data, routers need to select the Huoptimal route in the routing table. When
n
a data packet arrives at the router, the router extracts the destination IP address of the
packet, then looks up the routing table,o
i of a table item in the routing table. The "AND"
tfield
and performs "AND" operation of the packet's
a
icwith the Destination field of the routing table to see if it
destination IP address with the mask
i f
matches or not. After goingrt
operation result will be compared
longest mask. C e through all routing entries, the router will choose one with the
Forwardingito
g
In the example, two
nthe destination of 10.1.1.1 will result in the longest match principle being
n which the network address 10.1.1.0/30 provides the longest match.
applied, ifor
r a
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
A routing table may contain the routes originatingHufrom multiple protocols to a given
n to the same destination are equal, a
destination. Not all routing protocols are considered equal, and where the longest match
o
ti routing protocol (including static routes) will take
for multiple routes of differing routing protocols
ic
decision must be made regarding which a
i f
rtdifferent requirements for priority of various routing protocols.
precedence.
e
C Quidway router is shown in the table:
Different manufacturers have
&
The default priority of HUAWEI
n g
The smaller the value, the higher the preference.
i
T rmanually configured according to user needs. In addition, the priority of each static
ei route can be different.
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Where the route is unable to be distinguished by u a longest match value or preference,
Heither
n
the cost metric is taken as the decision maker in identifying the route that should be
o
ti
installed in the routing table.
a
rThe smaller the Metric value, the more priority the routing is.
Bandwidth
i T
eDifferent
aw dynamic routing protocols choose one or more of these factors to calculate the
Hu metric. The metric is only meaningful in the same routing protocol, and the routing metric
between different routing protocols is not comparable and there is no conversion
relationship.
The OSPF protocol calculate the cost based on bandwidth, so the route with the
Metric=1+1=2 is the optimal route to the destination, and its table item can be found in the
routing table.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
After receiving a packet, the router will check its u
Hdestination IP address and then check the
ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
There are many ways to classify routes. There are u sources of routing, Therefore, if
Hthree
n
classify routes according to the source, it can be divided into:
o
Direct routes: Small cost, simpleiconfiguration,
ic
if configuration, manual maintenance. When topology
only be found.
r tsimple
Ce won’t change. Only for simple network topologies.
Static routes: No cost,
changes, static routes
& High cost, complex configuration, no manual maintenance. Can be
Dynamic routes:
g
appliednto complex network topologies. When topology changes, dynamic routes can
i ni
a
change.
T r
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu can be divided into:
According to the application area, routing protocols
t
information inside AS is called the
belong to IGP protocol. ca
ifi
EGP(Exterior GatewayrtProtocol): The routing protocol used to exchange routing
Ce AS is called the EGP. BGP belongs to the EGP.
information between
& used, the routing protocol can be divided into:
According to the algorithm
g
i n
n
Distance-Vector protocol:include RIP and BGP. BGP is also called Path-Vector
i
r a
protocol.
a w
Hu routes and calculating routes: distance vector protocols pay attention to the number
of hops to the destination (the number of forwarding), link state protocol concerns
the topology of the network, and the link resources like bandwidth.
ic a
organization. In either cases, the outside
i f
rt
an entity.
Each Autonomous System e
C Its basic idea is to distinguish different AS by different numbers.
has a unique AS number, which is assigned by the Internet
a w exchange methods.
t
routing information within an AS.
a mainly use routing policy and routing filtering to
ic
tif exchange between AS.
EGP(Exterior Gateway Protocols):
r
Ce
control routing information
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
A static route is a special route that is manuallyH u by a network administrator.
configured
n
The disadvantage of static routes is that they cannot adapt to the change in a network
io manual reconfiguration.
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Static routing can be applied to serial networksH oruEthernet, but configuration is different in
these two networks.
o n
t i
ip route-static ip-address { mask | mask-length } interface-type interface-number [ nexthop-
aspecifies a network or a host address, the parameter
ic
f mask length. The last part specifies the next-hop or out-
address ]. The parameter IP-address
mask specifies a subnet masktior
e r
C
interface.
&
When configuring static routing in a serial network, you can specify only the next-hop
address (such as g
n0/0/2) to configure the out-interface. In HUAWEI ARG3 series routers, the
10.0.12.1), or only use parameters interface-type and interface-number
i
in encapsulates the PPP protocol by default. For this type of interface, the
(such as Serial
a
r address of static routing is the address to the end interface connected to the
serial interface
T
i
next-hop
einterface,
a w so it’s OK to use the interface only when configuring static routing in a serial
Hu network.
e
next-hop address is 10.0.123.2,
C connected by RTB, because RTA does not know wether RTB
the 192.168.2.0/24 network
or RTC can reach the& destination.
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
When there is no table item in the routing tableH u with the destination address of
matching
e rtof the default static routing is also 60. In the routing process,
In this example, RTA uses a default
Cfinally matched.
address. The default priority
&
the default route will be
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
After configuring the default route, you can useH u “display IP routing-table” command to
the
see the details of the routes.
o n
t i
In this example, all packet with the destination address that does not match the routing
ahop address 10.0.12.2 through the GigabitEthernet
ic
tif
table will be forwarded to the next
0/0/1 interface.
r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
VLAN isolated two broadcast domains, and alsoH u isolated layer 2 traffic between
strictly
n
VLAN. Users belonging to different VLAN could not manage Layer 2 communication.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
One way to solve the problem of communication u VLAN is to use layer three
Hbetween
switch:
o n
t i
The Vlanif interface is configured as a gateway on the L3 switch to achieve inter VLAN
aon the network, you need to configure a Vlanif interface
ic
if IP address for each Vlanif interface. The default gateway
routing. If there are multiple VLAN
for each VLAN and configuretan
r
e of the Vlanif interface in the L3 switch. Meanwhile, when
C
set by user PC is the IP address
& the route to the non-direct network segment, which can use the
check the IP routing table of the switch, Only the direct route can be found, so it is
g
necessary to establish
n
i
static routing.
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Huwhere default routing is used, and the
Static routing is configured on both SWA and SWB,
n
next-hop address respectively points to Vlanif5:10.1.12.2 of SWB and Vlanif5:10.1.12.1 of
o
ti
SWA.
ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Answer: Hu
n
When the routers choose the optimal routing, they will firstly based on the longest
o
ti
1.
mask matching principle; if the length of the mask is consistent, the priority of the
ic a
if
routing protocol is compared; if the priority is the same, then the metric value is
rt
compared. If the metric value is the same, multiple equal routes will achieve load-
e
C
balancing.
2.
&
When configuring the default route, the destination network address is 0.0.0.0,
n g
which represents any network.
i
a in
T r
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Currently, there are many organizations working HonuDSL standards. The most important
n
organizations are the American National Standards Institute (ANSI), the European
Telecommunications Standards Instituteo(ETSI), and the International Telecommunication
a ti is responsible for network interfaces, power, and
ic group is responsible for the standardization of DSL
Union (ITU). In ANSI, the T1E1 committee
i f
rt is responsible for DSL access standards.
protection, and the T1E1.4 working
e
access. In ETSI, the TM6 workgroup
C standard organizations, while ITU is a global standard
& the ITU defines the following DSL standards:
ANSI and ETSI are regional
g
organization. Currently,
n first generation HDSL standard
i
a in
G.991.1
w
a
G.992.1 full-rate ADSL standard (G.dmt)
c (G.lite)
isplitter
i f
rt standard
G.992.2 ADSL standard without
C e
G.993 is reserved future VDSL
& process (G.hs)
G.994.1 DSL handshake
G.995.1 DSLn g
i overview
n test process (G.test)
a iDSL
T r
G.996.1
ei
G.997.1 DSL physical layer maintenance tool (G.oam)
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Huis a formal standard released by ITU-T
In ITU-T, the standard numbering is G.993.2, which
n
in May 2005. To launch the VDSL2 standard, ITU formulated the RFC3728 MIB standard in
o
ti
October 2004.
ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu rates in the upstream and
ADSL is a DSL technology with asymmetric transmission
C
upstream transmission rate
&
upstream rate.
n g
The ADSL technology can transmit data signals and traditional analog voice signals at the
i
n
aai widely used access technology because of its technical features and ease of use.
same time on the same twisted pair.
ADSLris
i T
e Firstly, asymmetric transmission of ADSL is of special significance. On one hand, in
w
u a many DSL applications, users usually obtain a large amount of data from the
H backbone network, but transmit far less data to the backbone network. For example,
when a user accesses the Internet and video on demand (VoD) services, a large
amount of data needs to be downloaded at a high rate, but only some addresses and
simple commands is sent to the backbone network. On the other hand, asymmetric
transmission can greatly reduce near-end crosstalk.
Secondly, compared with other DSL technologies, ADSL makes it possible to provide
traditional voice services in the same twisted pair at the same time. In this way, the
cost of cable routing is saved.
In October 1998, the ITU officially released the recommended ADSL standards. G.992.1
and G.992.2.
G.992.1 is also called G.dmt. It defines the full rate ADSL technical specifications. The
maximum downstream transmission rate is 6.144 Mbps and the maximum upstream
transmission rate is 640 Kbps.
G.992.2 is also called G.lite. It defines the ADSL technical specifications without using
signal splitters. In this type of ADSL system, no splitter is required, which reduces the
n
complexity and cost of device installation but brings about the side effect of reduced it o
signal rates. The maximum downstream rate is 1.536 Mbps and the maximum
ic a
if
rt
upstream rate is 512 Kbps.
Ce
&
ing
a in
Tr
ei
a w
Hu
o n
ati
ic
r t if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
This is the structure of an ADSL system complying Huwith the G.dmt standard. The ATU-R
n
refers to the modem at the ADSL subscriber side. The ADSL transmission rate is high
enough to support a home network or o
ti the ATU-R converts the data into signals that can
a small office LAN. The data sent from a PC first
enters the home or office network.a
icline. To transmit data and voice signals on the same
Then
i f
t the ATU-R and telephone are connected to the POTS
be transmitted on the telephone
telephone line at the same rtime,
splitter, and the hybridC
e
transmission of data and voice signals on one twisted pair is
& frequency bands.
implemented in different
g
nat a CO, mixed voice and data signals are separated by a splitter at the CO
i
After arriving
insignals are transmitted through the telephone network, and data signals are
a
side. Voice
r through the high-speed data network. ATU-C refers to the ADSL CO modem.
T
transmitted
eAti the CO side, each subscriber has an independent splitter connected to the ATU-C.
a w Therefore, a DSL network uses point-to-point private line transmission. After passing
Hu through the ATU-C, data is sent to the DSL access multiplexer (DSLAM) which aggregates
multiple subscriber lines to transmit data streams at a higher rate. The DSLAM connects to
the backbone network through high-speed network interfaces such as ATM or STM, and
sends data to servers of network service providers through the high-speed data network.
Currently, DSLAM devices are generally bound to ATU-C devices.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu side to separate data and the
In the G.dmt standard, a splitter is used at the subscriber
ic
Experienced technicians are required a
telephone lines may need to befreconstructed
ADSL can be used without r t i to some extent. Therefore, it is hoped that
a inADSL has no splitter, out-band signals become interference noise signals, and
that G.lite
T
data rand voice transmission interfere with each other. Due to the influence of the
i
einterference, the transmission rate of the G.lite is much lower than that of the G.dmt. In the
a w ITU G.dmt standard, the maximum downstream and upstream transmission rates are 6.144
Hu Mbps and 640 Kbps respectively. In the G.lite standard, the maximum downstream and
upstream transmission rates are 1.536 Mbps and 512 Kbps respectively. It can be seen that
the downstream transmission rate of the G.lite ADSL is greatly reduced.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
QAM modulation uses a sine and cosine wavesH u the same frequency component to
with
n
transmit information. All waves pass through a single channel at the same time. The
amplitude of each waveform (includingo
tito QAM but has no carrier signal.
direction) represents a binary bit stream to be
ic
transmitted. CAP modulation is similara
t i f
DMT combines QAM and FDM
line encoding adopts thee
r technologies. In 1995, ANSI T1.413 stipulates that ADSL
C
DMT technology.
&
The DMT modulation and encoding technology improves the frequency utilization and can
transmit signalsgwith higher bit rates in a limited frequency band. It divides the entire
channel intoin
i n a maximum of 256 4.3125 kHz subcarriers, and implements 256-point
i T ratio (SNR). In this way, one symbol in each subcarrier may represent 4 to 8 bits,
noise
egreatly improving the spectrum utilization and enabling a higher ADSL transmission rate.
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
In ADSL, data and voice must be transmitted onH u frequency bands. ADSL uses a
separate
r i
A splitter consists of a 3-porttlow-pass/high-pass filter group. The low-pass filter can filter
allows only low-frequency
C evoice signals to pass and suppresses the interference from data
& voice signals. The voice and data signals are filtered by a splitter at
signals. The high-pass filter allows only high-frequency data signals to pass and suppresses
g
the interference from
nside and then transmitted on the same twisted pair in different frequency
i
the subscriber
a w low-pass filter separates voice signals. After separation, voice signals are transmitted
Hu through the PSTN network, and data signals are transmitted through a dedicated high-
speed data exchange network. In this way, data transmission is not restricted by the PSTN
system, and can reach a rate much greater than 64 Kbps.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The setting of interleaver parameters has a huge u on the performance of the ADSL
Himpact
n using a typical interleaving mode as an
service. To facilitate the understanding of interleaving parameters, we introduce the
o
ti
working principles of an interleaver in detail
example. a
icprocesses data at the transmit end. The elements 1, 2, 3,
i f
C with 3 rows and 7 columns row by row. After the matrix is full,
4, 5, 6..., and 21 to be transmitted
a in stream? The receive end writes the received data column by column to a
original data
T
matrixr with the same size. After the matrix is full, the receive end reads the data row by
i restores the original data, and sends the data to the FEC for decoding. This is the de-
erow,
a w interleaving process of an interleaver.
Hu
So, what is the benefit of an interleaver for processing burst errors? Let's look at this
example.
e
is 1, x, 3, 4, 5, 6, 7, 8, x, 10, 11, 12, 13, 14, x, 16, 17, 18, 19, 20, and 21. C
affected, the sequence of elements received by the receive end after de-interleaving
&
It can be
ng
seen that consecutive burst errors are separated into 3 non-consecutive errors by the
interleaver. In this way, these errors can be corrected through FEC. i
n of matrix rows
a inumber
In this example, FEC can correct burst errors no longer than 3. The
is the interleaver depth D (3 in this example), and the numberT
r
einumber of FEC codes.
of matrix columns is
interleaver span N (7 in this example) which is equal to the
a w
u
An actual interleaver usually has larger D and N parameters. Assuming that the FEC
H a D x N interleaver matrix can correct
sequence with N codes can correct B burst errors,
burst errors with a maximum length of B xnD. It can be seen that interleaving enhances the
o system stability, but interleaving causes a
anti-interference capability and bringstibetter
n
analysis during the initialization of the ADSL system. This part describes the process of ADSL
o
ti
initialization in detail.
a
The purpose of ADSL initializationcis to test the performance of the actual channel,
i fi
r t
coordinate the transmission configurations between the ATU-C and ATU-R (such as the
upstream and downstream
C e bandwidths and the number of sub-bands), and exchange
&
various parameters to establish a usable communication link before the ATU-C and ATU-R
start working.
g
n process can be triggered by either the ATU-R or ATU-C.
i
a in
The initialization
T r
In initialization triggered by the ATU-C, the ATU-C sends an activation request and waits for
i response from the ATU-R upon system power-on, signals loss, or self-check completion.
eaThe
a w ATU-C performs this process for a maximum of 2 times. If the ATU-R does not respond,
Hu the ATU-C waits for the ATU-R to send an activation request or waits for the network to
send a retrial instruction.
In initialization triggered by the ATU-R, the ATU-R sends activation requests continuously
upon power-on or self-check completion to start initialization.
The ADSL initialization process can be divided into four steps: activation request and
acknowledgment, transceiver training, channel analysis, and parameter exchange.
In activation request and acknowledgment step, necessary handshake communication is
performed to prepare for the initialization. Generally, initialization is triggered upon system
power-on, signals loss, or self-check completion. In this step, the ATU-R and ATU-C
transceivers are enabled and starts initialization handshake, complying with the G.hs
protocol mentioned above.
By means of transceiver training and channel analysis, the transceiver can determine the
characteristics of signal transmission and related transmission parameters.
n
During parameter exchange, a local receiver exchanges its parameters with a remote
it o
transmitter to match the sending and receiving processes. The parameters to be exchanged
ic a
if
rt
include the number of bits modulated by each DMT subcarrier, transmission rate, and so on.
Ce
To ensure optimal system performance, all parameters are determined based on transceiver
training and channel analysis.
&
ng
After the initialization is complete, the system enters the normal working state.
i
a in
Tr
ei
a w
Hu
o n
ati
ic
r t if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The ADSL2 standard adopts an enhanced modulation Hu mode, which can better reduce the
n bits with an overhead rate of 4–32 Kbps
impact of line noise on signals, obtain higher line encoding gain, and increase the
o
tati 32 Kbps. It can be considered that ADSL2
connection rate. ADSL2 uses variable overhead
a
ic transmission distance by 200 m compared with ADSL
while the ADSL overhead rate is fixed
increases the speed by 50 Kbpsfand
(6% greater coverage area).rt
i
C e
mode to be tested&
The ADSL2 standard requires the line noise and signal attenuation of each carrier in DMT
also requiresin
g to determine whether ADSL services can be provisioned on the line. It
real-time monitoring over ADSL connections.
T r to be transmitted, for example, during large file download, the line power increases
The ADSL2
etoi the standard ADSL power level L0. When a small amount of data or no data needs to be
needs
a w
Hu transmitted, for example, during web pages browsing, the power decreases to L2 and L3
specified in the ADSL2 power levels. Decreasing the line power can effectively reduce the
crosstalk between line pairs.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
1. New running modes are added.
Hu
o n
There are 3 ADSL running modes: ADSL over POTS (ADSL annex A in which the POTS
ti
service exists on the same line pair), ADSL over ISDN (ADSL annex B in which the POTS
ic a
service exists on the same line pair), and ADSL annex C (ADSL in the TCM-ISDN crosstalk
if
environment, which is mainly used in Japan). In addition to the preceding 3 modes, the
rt
following modes are added to the ADSL2/ADSL plus:
Ce
Annex I which specifies a full digital mode with a spectrum compatible with that in annex A
(ADSL over POTS). In this mode, there is no POTS service on the line, the upstream
&
spectrum is 3–138 kHz, the number of sub-bands is 31, and the upstream bandwidth is
ng
greater than 1 Mbps.
i ni
Annex J which specifies a full-digital mode with a spectrum compatible with that in annex B
a
r
(ADSL over ISDN). In this mode, there is no ISDN service on the line (used when ADSL over
T
ei
ISDN coexists), the upstream frequency band is extended to 3–276 kHz, a maximum of 64
upstream sub-bands are supported, and the maximum upstream rate reaches 2.3 Mbps.
aw Annex M which extends the upstream bandwidth of ADSL over POTS. In this mode, the
Hu
number of upstream sub-bands starts from 6, and increases to 32, 36, 40, 44,...to 63
depending on the bandwidth requirement. In this way, with the same total transmit power,
Annex M achieves the upstream transmission rate of Annex J, and achieves the
downstream transmission rate of Annex B in overlap and non-overlap modes.
Annex L (READSL2) which extends the transmission distance.
In addition, the ADSL standard supports only STM (such as PCM interface) and ATM
(UTOPIA) interfaces, while ADSL2/ADSL plus also provides PTM (packet) interfaces to carry
HDLC on ADSL in non-ATM transmission mode.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
3. Longer transmission distance
Hu
o n
ADSL2/ADSL plus supports a transmission distance no less than 6.5 km at rates of
ti
192 Kbps/96 Kbps.
c a
ADSL2 supports the 1-bit constellation while ADSL supports a minimum constellation
i
of 2 bits.
r tif
Ce
ADSL2 annex L adopts new spectrum division. When the distance exceeds 4 km, the
sub-bands above tone 128 are turned off, and the transmit power of sub-bands with
&
lower tones are increased to extend the transmission distance.
i ng
The frame overhead can be flexibly configured to provide a 28 Kbps bandwidth,
n
which is very important in long-distance transmission.
i
r a tone ordering
The and pilot tones determined by a receiver can reduce the
T
ei
probability of activation failures due to ADSL pilot tones with an excessively low SNR.
In addition, the 2 bits on the pilot tones can increase the bandwidth by 8 Kbps.
H The noise margin is reduced by reducing the transmit power. In this way,
unnecessary power consumption is saved while the system stability is ensured.
The new low-power mode L2 reduces the transmit power to 30% of the normal
power when no data is transmitted. In L2 mode, the power is sufficient for
transmitting only necessary management messages and synchronization signals (for
example, 1-bit constellation). The power can be quickly restored when subscriber
data is transmitted.
The CO and CPE of the ADSL2/ADSL plus provide the power cut back function in the
range of 0–40 dB to effectively reduce the transmit power during normal operation.
(In an ADSL system, only the CO has this function in the range of 0–12 dB.)
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
5. More stable running and better spectrum compatibility
n
The receiver determines the tone ordering based on the channel analysis result and
o making ADSL connections more stable.
selects the best tone as the pilotitone,
t
atraining. The receive end tests the RF interference (RFI)
Tones are disabled during ithec
tif RFI and reduce the crosstalk to other line pairs.
Excellent dynamic
e
Cadaptability: The enhanced bit swap dynamically changes the line
&
rate.
Powerin
g
n
cutback to a maximum of 40 dB in the receiver and transmitter reduces the
i
r a
near-end echo and crosstalk.
i T The receiver determines the pilot tone to prevent activation failures caused by line
e bridge connectors or AM interference.
a w
Hu The training process is shortened to quickly recover connection synchronization from
errors.
6. Line diagnosis function
Supports the dual-end test function. The CO and CPE can be trained, and line
parameters can be obtained through a dedicated line test process.
The Seamless Rate Adaptive (SRA) technology is used to resolve crosstalk and AM
interference, and adjust the connection rate without being perceived by subscribers
to adapt to environment changes.
8. Rate binding
To provide different QoSs for different customers, ADSL2 adopts the IMA technology
to bind two or more copper wires as an ADSL connection, which can flexibly increase
the access rate.
9. Better interoperability
The ADSL2/ADSL plus divides the ADSL transceiver into multiple sub-layers according
n
it o
to functions.
management interfaces
i
a in
Each sublayer is encapsulated and messages between sub-layers are defined. In this
Tr
way, devices from different vendors can communicate with each other.
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The preceding two types of DSL technologies, ADSLHu and SHDSL, have a maximum
n
transmission rate of 8 Mbps. VDSL which is short for very high speed digital subscriber line
is a new generation of high-speed DSL o
ti
technology.
i a
c rate of 52 Mbps on common twisted pairs. It
f
VDSL can reach a maximum transmission
provides various transmissiontirates and multiple working modes, including symmetric and
asymmetric transmission,e
r
C is high, the twisted pairs used in VDSL are shorter, usually from
to meet the requirements of different customers. Because the
onT
r
Compared
easi well as ISDN services. VDSL also uses passive filters as signal splitters to support voice
twisted pairs. Therefore, VDSL is compatible with existing traditional telephone services
a w
Hu and ISDN transmission. The basic working principles of VDSL are similar to that of ADSL.
VDSL is a video and data transmission technology over the voice frequency band. It
provides multiple working modes and can transmit data at a high rate within a short
distance. This technology enables telecom operators to use existing twisted pairs to
transmit broadband services, such as VoD and high-speed Internet access.
Currently, the internationally recognized VDSL system complies with the American standard
formulated by T1E1.4 and European standard formulated by of ESTI TM6. Both standards
adopt the G.998 standard and DMT/CAP modulation modes. The difference is that the
American standard adopts the G.998 standard for baseband planning to provide a highest
rate of 22 Mbps, while the European standard adopts the G.998 standard for baseband
planning to provide a highest rate of 14 Mbps.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Although the transmission rate of VDSL is high,H theutransmission distance is far less than
n channel characteristics, but the length of
that of ADSL. This is because high-speed transmission requires complex modulation modes,
o
ti on channel performances.
dense constellation encoding, and outstanding
transmission lines can pose negativea
icthe ITU divides VDSL transmission capabilities into long-,
impacts
i f
C
medium-, and short-distance
&
modes.
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
This is the reference model of the VDSL system.H u modules include VDSL devices at the
Basic
n
CO and subscriber sides. Devices at both sides are connected by twisted pairs through their
own splitters. The other end of the CO o
ttoi a network device or a small LAN.
device is connected to an ONU, and the other end
a
ic unit at the ONU, and has the same function as the CO-
of the subscriber device is connected
i f
&
as the subscriber-side modem ATU-R in ADSL.
in as required. Data flows are sent to the lower layer for framing. At the same
data from upper-layer protocols to form unified data flows to be transmitted in fast and
a
rapplication independent data frames from the lower layer are split and used by
slow channels
T
i
time,
edifferent
a w application interfaces and protocols.
Hu In VDSL, a splitter similar to that in ADSL is used to separate data signals from traditional
voice/ISDN signals.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
VDSL2 can provide a higher bandwidth within 1H u (the theoretical rate can reach 100
km
C e
& diagram of the two types of crosstalk.
VDSL2 crosstalk is classified into near-end crosstalk (NEXT) and far-end crosstalk (FEXT).
g
Figure 1 shows a schematic
n signals in a line pair are coupled and sent back to a near-end receiver. For
i
a in in bundles of line pairs, the upstream transmission of one line pair interferes
In NEXT,
ei In NEXT, signals in a line pair are coupled and sent to a far-end receiver. For example,
a w
Hu in bundles of line pairs, the upstream transmission of one line pair interferes with the
upstream transmission of another line pair.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu (FDM), signals sent in the
Because VDSL2 adopts frequency division multiplexing
n
interference line pair and signals received by interfered line pair in NEXT occupy different
frequency bands. Therefore, the impacto
ti
of the NEXT can be eliminated or greatly reduced
a
fic line pair and signals received by interfered line
by using a filter.
i
However, signals sent in the tinterference
r frequency band. Therefore, FEXT cannot be eliminated by
e
C VDSL2 transmits data within a short distance (generally no longer
pair in FEXT occupy the same
g
than 1 km) at a high
n other DSL technologies. Therefore, FEXT becomes the main factor affecting
compared withi
a in of a VDSL2 system. FEXT decreases the SNR, reduces the line transmission
the performance
T
rate, rincreases the bit error rate (BER), and even causes offline errors, severely affecting
i stability and user experience.
esystem
a w
Hu To eradicate the impact of FEXT on VDSL2, the ITU-T proposed the vectoring standard to
resolve FEXT on VDSL2 lines and improve the multi-wire performance. In this standard, the
crosstalk of one VDSL line is a vector in a set of crosstalk vectors for all other lines in the
same bundle. The vectoring processing system performs matrix calculation based on the
collected vector information and outputs vectorized crosstalk cancellation signals.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
FTTD: fiber to the door Hu
Reverse power supply, 1-8 lines
o n
FTTDp: fiber to the Distribution pointti
ic a
r tif lines
Reverse power supply, 8-16
FTTB: fiber to the buildinge
C
Local/remote & supply, 16-48 lines
power
gthe following scenarios:
G.fast appliesnto
i
in FTTDp, and FTTB where the fiber length to end subscribers is usually less than
a
r200 m
FTTD,
T
ei The twisted pair at the drop cable section can be reused to avoid complex fiber
aw
Hu
routing and greatly reduce the network deployment cost.
o
tispectrum resources must be expanded. In the initial phase,
downstream rate of 100 Mbps. The G.fast technology
i a
a higher access rate. Therefore, the G.fast
c and can be extended to 212 MHz.
f
tifrequency division duplex (FDD) technology which uses different
the highest G.fast frequency is106 MHz,
r
frequency bands to transmitedata downstream and upstream at the same time. The disadvantage is
ADSL/2/2+ and VDSL2 adopt the
C
& and severely affects the performance of the receiver. In this case, the hybrid
that transmit signals generate echo which enters the receiver. When the frequency band is high, the
g
nbe used for echo suppression. G.fast does not distinguish the upstream and
impact is more obvious,
circuit needs ito
a in frequency bands, and transmits data in the full frequency band in TDM mode in both
r TDD allocates different timeslots for upstream and downstream data transmission. The
downstream
T
directions.
i
etransceiver sends and receives signals in different slots.
a w
u
As the frequency band width and number of subcarriers increase, the corresponding physical layers
H become more complex. To reduce complexity, the subcarrier spacing needs to be increased to
reduce the number of subcarriers. To be compatible with the traditional DSL technology, the Giga
DSL adopts a subcarrier spacing which is an integer multiple of 4.3125 kHz, where 4.3125 kHz is a
subcarrier spacing used in traditional ADSL/2/2+/VDSL2 8a/12a/17a standards.
During the upgrade from ADSL/VDSL2 to G.fast, some subscribers may want to retain the existing
DSL services. To ensure smooth network upgrade, G.fast devices also support traditional
VDSL2/ADSL.
Similar to VDSL2, the G.fast performance is also affected by crosstalk between lines. If the vectoring
technology is not used, the G.fast rate will decrease severely.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Reference answer: Hu
1. ABCD
o n
2. C
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
GPON: gigabit-capable passive optical networkHu
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
P2MP: point to multiple point Hu
POS: passive optical splitter
o n
ti
ic a
r tif
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
FTTC: fiber to the curb Hu
FTTB: fiber to the building
o n
ti
ic a
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Basic concepts of GPON Hu
n
The GPON encapsulation mode (GEM) frame is the smallest service bearing unit in the
o
ti
GPON technology and is the most basic encapsulation structure. All services are
ic a
if
encapsulated in GEM frames for transmission on the GPON line and are identified by GEM
r t
ports. Each GEM port is identified by a unique Port-ID, which is globally allocated by the
Ce
OLT. That is, each ONU/ONT of the OLT cannot use the GEM ports with the same Port-ID.
&
A GEM port identifies the service virtual channel between the OLT and the ONU/ONT, that
ng
is, the channel that carries the service stream. The GEM port is similar to the VPI/VCI
i
identifier in the ATM virtual connection.
n
i
a The T-CONT is the carrier for services in the upstream direction of the GPON. All
r
T-CONT:
T ports are mapped to T-CONTs, and the OLT uses the DBA scheduling mode for
i
GEM
eupstream transmission. A T-CONT is the basic control unit of the upstream service stream in
a w
Hu the GPON system. Each T-CONT is uniquely identified by an Alloc-ID which is globally
allocated by the OLT. That is, each ONU/ONT of the OLT cannot use T-CONTs with the
same Alloc-ID.
Figure 1 shows the service multiplexing principle in the GPON system. Services are first
mapped to different GEM ports on the ONT. Services carried by GEM ports are then
mapped to different types of T-CONTs for upstream transmission. A T-CONT is the basic
bearer unit in the upstream direction of the GPON line. The T-CONT demodulates the GEM
port unit on the OLT side, sends the GEM port unit to the GPON MAC chip, demodulates
the services in the GEM port payload, and sends the services to the related service
processing unit for processing. Other processing steps are the same as those in switches or
the access network. n
it o
Figure 2 shows the mapping between services, GEM ports, and T-CONTs. A GEM port is the
ic a
smallest service unit in the GPON system. A GEM port can carry one or more services.
if
rt
Services carried by a GEM port are mapped to the T-CONTs for upstream service scheduling.
Ce
Each ONT supports multiple T-CONTs and can be configured with different service types.
&
One T-CONT can carry one or multiple GEM ports, depending on the specific configuration
ng
of the user. After the data carried by the T-CONT is transmitted upstream to the OLT, the
i
in
GEM port is demodulated, and then the service payload in the GEM port is demodulated
a
Tr
for processing.
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu whether the PLSu, PLOAMu, or DBRu
The OLT uses the Flag field in the Bwmap to indicate
&
allocated with two consecutive IDs (the StopTime of one ID is 1 less
ng When the OLT authorizes multiple consecutive Alloc_ID to the ONU, the
than the StartTime of the other), the ONU suppresses the sending of the PLOu data to the
i
second Alloc_ID.
a in can occur multiple times. Note that the continuous OLT allocations to the same
suppression
ONUT rmust have intervals. The allocations must be strictly continuous or for 2 different
i
eONUs.
a w
Hu User payload data is followed by these overheads during transmission until the position
indicated by the StopTime pointer is reached.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
PLI: payload size, 12 bits. That is, the maximumH u length of each GEM frame is 4095
payload
bytes.
n
PORT ID: 12-bit 4096 GEM PORT IDs. io
a t
c indicates whether the segment is the last segment.
PTI: 3-bit payload type. The last ibit
f
i
rtcontrol.
C e
HEC: 13 bits for header error
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The PON upstream transmission adopts the TDMA Humode. One OLT can be connected to
n
multiple ONUs. The distance between the ONU and the OLT can range from dozens of
meters to 20 km. Optical fibers are usedoto transmit optical signals with a delay of 5 ps per
ti temperature and the aging of the
kilometer. Due to the change of theaambient
i f ic is also changing. To realize the TDMA access and
rt of each ONU is inserted into the specified timeslots after
components, the transmission delay
e
ensure that the upstream data
Cpublic fiber without collision between ONUs, the OLT must
data is converted on the
accurately measure&the distance between each ONU and the OLT, so as to control the
n g
i
moment at which each ONU sends upstream data.
n the round trip delay (RTD) of each ONU through ranging, and specifies
The OLTiobtains
a
r delay (EqD) to ensure that no conflict occurs on the optical splitter when each
T
equalization
i sends data.
eONU
a w
Hu In the ranging process, a window needs to be opened, that is, Quiet Zone to suspend the
upstream transmission channels of other ONUs. The OLT opens the window by setting
BWmap to null without authorizing any timeslot.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu effective bandwidth utilization.
The GPON system uses the SBA+DBA mode to achieve
TDM services are configured with an bandwidth through SBA to ensure high QoS.
iodynamically allocated through DBA.
a t
Bandwidths for other services are
c
i
&
and OLT service monitoring (non-status reporting).
i n
a in Ind DBA
PLOu-State
rDBRu-Piggy-back DBA
T
ei Payload DBA
aw
Hu
The implementation mechanism of the DBA function consists of the following parts:
The OLT sends authorization according to the newly allocated bandwidth and T-
CONT type.
Manage DBA operations.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu service scheduling process, different
T-CONTs are classified into five types. In the upstream
n
types of T-CONTs are selected for different types of services. Each T-CONT bandwidth type
o
t i
has specific QoS characteristics. QoS characteristics mainly indicate the bandwidth
c
guarantee, including fixed bandwidth, a assured bandwidth, assured/maximum bandwidth,
maximum bandwidth, and hybrid
t i fi mode (corresponding to Type 1 to Type 5 of five T-CONT
types).
e r
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
SN authentication is an authentication mode in which
H u the OLT matches only the SN of an
ONU. The SN+Password authentication mode requires matching both the SN and password
at the same time.
o n
a
After receiving the sequence code response ti message from the ONU, the OLT checks
whether the ONU with the same c
Ceoperation state:
directly allocates the specified ONU ID to the ONU.
After the ONU enters the
For the ONU&
a inOLT the
enables ONU to go online. The configuration can be automatically performed by
T raddition, the OLT reports an ONU online alarm to the CLI or NMS.
the so that the GEM port carrying OMCI messages is the same as the ONU ID. In
request to the ONU and compares the password returned by the ONU with the
Hu locally configured password. If the password is the same as the locally configured
password, the OLT directly configures a GEM port for the ONU to carry OMCI
messages and enables the ONU to go online, and reports an ONU online alarm to the
CLI or NMS. If the password is different from the local configuration, a password
error alarm is reported to the CLI or NMS. In this case, even if the ONU auto-
discovery function is enabled on the PON port, the OLT does not report the ONU
auto-discovery, and sends the Deactivate_ONU-ID PLOAM message to deregister the
ONU.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
OMCI: ont terminal management and control interface
service capabilityC
e
such as device hardware
configuration.
&
g
OMCI is a master-slave management protocol. The OLT is the master device, and an
ONU iisna slave device. After the ONU completes the registration process, an OMCI
Hu
the configurations locally, which facilitates service provisioning.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
EMS: element management system Hu
n
Voice services are delivered through the OMCI.
o
ti
ic a
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
EMS: element management system Hu
n
For the voice service, an XML configuration file is downloaded from the NMS through FTP.
o
ti file of the voice service from the NMS in FTP
ic a
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu service (IP services are used as
VoIP, RG, and PON indicate the VoIP service, gateway
n
examples), and PON link layer management respectively.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
ONT PnP Hu
Zero configuration
o n
ti
i ng
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Advantages: The networking, OLT/ONU management, Hu and service provisioning are simple.
n
Disadvantages: If the OLT is faulty, services are interrupted. Optical fibers are usually laid in
io be disconnected at the same time.
t
the same pipe, and two optical fibers may
a services of users, such as enterprise private line
ic
tif private line access services.
Application scenario: Protects important
r
Ce
access services and base station
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu to two OLTs to implement remote
Advantages: Two backbone optical fibers are connected
disaster recovery.
o n
t
Disadvantages: The networking is complex, i the cost is high, and the OLT configuration is
a
complex.
f ic
r tiimportant
e
Application scenario: Protects services such as enterprise private line access
C
services and base station private line access services, especially in scenarios where remote
&
disaster recovery is required.
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Advantages: The networking and OLT/ONU management Hu is simple.
n
Disadvantages: If the OLT is faulty, services are interrupted. Optical fibers are usually laid in
io be disconnected at the same time.
t
the same pipe, and two optical fibers may
a services of users, such as enterprise private line
ic
tif private line access services.
Application scenario: Protects important
r
Ce
access services and base station
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
In dual-homing networking, the two PON lines H u the ONUs and two OLTs are in the
between
n
active/standby state and cannot forward packets at the same time.
o
Advantages: When the upstream link of
t i OLT or OLT is faulty, services can be switched
the
a
ic
tifis complex, the cost is high, and the ONU management is
to the other OLT.
r
Ce
Disadvantages: The networking
complex.
& Protects power supply as well as enterprise private line access services
Application scenario:
g
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Answer: Hu
1. ABCD
o n
2. CA
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
The 3 most important access technologies in the u field are APON, EPON, and GPON.
HPON
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Huto locate, synchronize, and mark the
PLOu: This is a physical control header and is used
data of an ONU.
o n
PLOAMu: This is a physical layer OAM imessage
t of the upstream data and is mainly used to
aas the maintenance and management status of the
ic
tif
report management messages such
ONU.
r
e in each frame. Whether to send the frame is determined
C
(This field is not contained
&
by the FLAG indicator of the previous downstream frame.)
g
n the power level sequence which is used by the ONU to adjust the optical
power ofin
i
PLSu: Indicates
a
the optical port.
T r(This field is not contained in each frame. Whether to send the frame is determined
ei by the FLAG indicator of the previous downstream frame.)
a w
Hu DBRu: It is mainly used to report the status of the T-CONT and apply for the bandwidth for
the next transmission to complete dynamic bandwidth allocation for ONUs.
(This field is not contained in each frame. Whether to send the frame is determined
by the FLAG indicator of the previous downstream frame.)
Payload: The data payload can be a data frame or a DBA status report.
Payload = (DBA report + Pad)/(GEM header + GEM frame)
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
A GPON downstream frame consists of the PCBd H+uPayload.
A downlink frame is fixed at 125 uSnat the frequency of 8000 Hz.
io the downstream frame length is 38880 bytes.
a t
In 2.488 G downstream transmission,
c
i
PCBd: This is a physical controlifblock which implements frame synchronization, positioning,
g
n as the GEM frames in the upstream frames, it bears the upper-layer PDU.
Payload: The same
i
T
synchronization between the OLT and the ONU. The value is fixed to 0xB6AB31E0.
i Identifier domain
eIdnet:
w
BIP: Parity check is performed on all bytes between the BIP fields of two frames for bit error
monitoring.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
FTTH: fiber to the home Hu
FTTB: fiber to the building/curb
o n
ti
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
50 M@HDTV service Hu
n
High definition television (HDTV): The HDTV program resolution can reach 1920 x
o
ti
1080. Generally, the MPEG2-TS, WMV-HD, and H.264 algorithms are used to
ic a
if
compress and transmit data. Different encoding technologies vary greatly in
rt
compression ratio and image quality. HDTV services with high resolution and high
Ce
bandwidth are the most important services for mainstream carriers in network
&
construction and market promotion.
ng
The optical access network based on GPON lays a foundation for high-bandwidth
ni
i
access of subscribers. In the FTTH network construction mode, the split ratio of 1:64
a
T r is usually adopted. The average downstream bandwidth of each subscriber can reach
aw
Mbps to 30 Mbps or 50 Mbps. The OLT provides 20 Gbps bandwidth for each slot to
Hu
ensure that services on the VDSL2 board and 8GPON service board are forwarded
without converging. The MA5680T/MA5683T uses the Access Node Control Protocol
(ANCP) to interwork with the policy server of a carrier to implement video bandwidth
control for subscribers. In this way, subscriber video bandwidth can be adjusted in
real time based on service requirements, improving the subscriber experience.
Open access
Open access is a new mode of optical access. It disrupts the operation mode of end-
to-end services provided by traditional carriers and allows third-party services or
content providers to access the network to provide services for subscribers.
The FTTx solution provides the open access platform for multiple carriers. In the open
access solution, the optical access network becomes an open "access pipe". Different
service providers can rent the open access resources, and the access network
n
allocates the bandwidth to operators as required. The FTTx solution provides multi-
it o
GE upstream interface boards to meet the requirements of multi-ISP access. The
ic a
if
rt
HQoS function is used to control the ISP service bandwidth, subscriber bandwidth,
Ce
and subscriber service bandwidth. In this way, a hierarchical QoS control mechanism
is established, ensuring that each ISP can use the bandwidth pipe provided by the
open access network fairly. &
Enterprise access service ng i
n
i
Enterprise access is an indispensable application scenario ofaFTTx network
T rbecome a mainstream
ei and interconnection, which
construction. With the rapid development of FTTB, it has
winterconnection.
practice to use optical fibers for enterprise service access
a
Huenterprise access scenarios. It works with
is an effective supplement to traditional Ethernet
The FTTx solution provides the MA5612 for
o n
the OLT to provide FE/GE/E1/POTS interfaces for enterprise subscribers, and
a
implements enterprise data access,ti voice access, and interconnection between
f
different branch departments
i c through the GPON and EPON networks.
r tireliability, the FTTx solution provides complete enterprise
e QoS control functions to ensure data security and service
In terms of security and
security and highCreliability
& subscribers.
quality of enterprise
a
rand gradually becomes the mainstream access mode. The rapid development of
The
T
ei mobile communication services requires mobile base stations to be smaller and
a w deployed with a higher density. To reduce the investment in base station backhaul,
The base station private line access solution provided by the FTTx solution solves the
service backhaul problem of base stations such as 2G/3G/LTE/Femtocell, and provides
high-precision clock, time solution, and highly-reliable networking protection to meet
base station access requirements in various scenarios.
A typical POL campus network uses PoE, security, and PON protection technologies
to implement data, surveillance, video conferences, and private services.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
In the FTTx network application scenarios, the access
H u modes include FTTH, FTTB, FTTC,
FTTM, and FTTO. In these access scenarios, ONUs/ONT are connected to optical splitters
and then to the OLT through optical fibers.
o nThe optical fibers and optical splitters belong to
the ODN. The OLT is connected upstream
network for upstream transmission.a
ti to the aggregation switch through the IP
i f icApplicable to high-end individual subscribers in new or
rt to provide high-speed access to video, voice, and data
Fiber To The Home (FTTH):
e
high-end residential buildings
Cthe bottleneck and contradiction of traditional access rate and
services. It breaks
distance.
&
Fiber To g
i n with medium and high density population. The latter applies to scattered
The Building/Curb (FTTB/C): The former is applicable to apartments or office
a w at curbs. Existing copper cable resources can be reused at the subscriber access
u
side to reduce the device investment.
i a
c FTTC, FTTB, FTTH, and various devices at the CO side.
f
The figure shows 3 access scenarios:
i family to meet carriers' requirements for FTTx
n g
complete auxiliary products, meeting carriers' diversified requirements for fiber-in and
i
inU2000.
copper-out construction. In addition, all xPON products can be centrally managed by the
a
r
iManager
T
ei OLT: optical line terminal
f ic ultra-broadband access.
operations, and can provide high-density
ti used on 3 different types of OLTs. The same control board
The same service board canrbe
Ce and X7.
ONUs/ONTs.n
i ni
r a
i T
e
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
An MA5800/EA5800-X17 subrack can be fixedH in u
a cabinet by mounting ears. It provides
22 slots and has a fan on the top.
o n
The ESD jack of the MA5800/EA5800-X17
t i service subrack is located on the left side of the
a wrist strap to prevent the ESD from damaging
a in The central ground point is directly connected to the service subrack, which is
noise filter.
calledr the enclosure ground point (that is, the protection ground). The enclosure must be
i T properly so that induction and leakage can safely flow into the ground to
eimprove the anti-electromagnetic interference capability of the entire system.
grounded
a w
Hu Use a ground cable to connect the ground point of the service subrack to the ground bar
of the equipment room or ground. It is recommended that the ground resistance of the
equipment room be less than 10 ohms. In addition, refer to the related national and local
regulations.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Control boards: Hu
n
Slots 9 and 10 must be configured with control boards of the same type.
o
ti
Service boards:
ic a
Slots 1–8 and 11–19
rt if
Ce
Supports mixed configuration of different service boards.
&
Supports mixed configuration of upstream interface boards, but it is recommended
ng
i ni
r a
Both control boards and the upstream interface boards can be used for upstream
e transmission.
Hu
Slot 0
Power board:
Slots 21 and 22
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Control boards: Hu
n
Slots 8 and 9 must be configured with control boards of the same type.
o
ti
Service boards:
ic a
Slots 1–7 and 10–17
rt if
Ce
Supports mixed configuration of different service boards.
&
Supports mixed configuration of upstream interface boards, but it is recommended
ng
i ni
r a
Both control boards and the upstream interface boards can be used for upstream
e transmission.
Hu
Slot 0
Power board:
Slots 18 and 19
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The ESD jack of the MA5800/EA5800-X7 service u is located at the bottom of the
Hsubrack
n
fan tray. It is used to connect the ESD wrist strap to prevent the ESD from damaging
o
ti
devices.
a
There are 2 ground points on thecMA5800/EA5800-X7 service subrack, one on the left side
i middle of the right mounting ear. The power input end
i fthe
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Control boards: Hu
n
Slots 8 and 9 must be configured with control boards of the same type.
o
ti
Service boards:
ic a
Slot 1–7
r tif
Ce
Supports mixed configuration of different service boards.
&
Universal interface board (GPIO slot):
Slot 0 n g
n i
Powera i
r board:
T Slots 10 and 11
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The MA5800/EA5800-X2 service subrack is 2 UH u and 19-inch wide. The fan tray is
high
n
located on the right side of the service subrack and is fixed in the cabinet by mounting ears.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
In the FTTx solution:
Hu
o n
The MA5680T/MA5683T can function as the OLT in the GPON/EPON system to work
ti
with ONTs (ONUs) to bear multiple services.
c a
The MA5680T/MA5683T supports broadband access services such as P2P FE/GE
i
subscribers.
rt if
optical access. It works with the ONTs to provide point-to-point FTTH access for
C e
As an OLT, the MA5680T/MA5683T is the core component of the FTTx solution and has
&
the following features:
Provides g
ei product.
a w Provides various types upstream interfaces, service interfaces, and maintenance
u
H
interfaces to adapt to different networking environments.
Provides powerful QoS capability to facilitate the management of various services.
Provides comprehensive security solutions for system security, subscriber security,
and operation and maintenance (O&M) security.
Supports flexible networking. As a multi-service access platform, the product
provides multiple access modes and supports multiple networking modes to meet the
networking requirements of different environments and services.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
ETSI: European Telecommunications Standards H u
Institute
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Huwith control boards of the same type.
Control board slots: Slots 9, 10 must be configured
Upstream interface board slots (GIU): Slotsn19 and 20 support mixed configuration of
different upstream interface boards. It iisorecommended that upstream interface boards of
t
the same type be configured. ca
t i fi that slots 21 and 22 be configured with power
r
boards of the same type.e
Power board slots: It is recommended
C
Universal interface& board slot (GPIO): 0
g
i nslots: Slots 1–8 and 11–18 support mixed configuration of different service
inis recommended that xPON boards be configured from left to right and other
Service board
a
rof boards be configured from right to left.
boards. It
T
ei
types
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
IEC: International Electrotechnical Commission Hu
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The MA5683T supports the H801MABO and H802MABO Hu backplanes.
Chassis ventilation process: Cold air entersnfrom the left side of the chassis, is blown
io exhausts from the right side of the chassis.
Upstream interface board slots (GIU): Slotsn8 and 9 support mixed configuration of different
io that upstream interface boards of the same
t
upstream interface boards. It is recommended
a
ic
tif that slots 10 and 11 be configured with power
type be configured.
r
boards of the same type.e
Power board slots: It is recommended
C
Universal interface& board slot (GPIO): 12
g
r a
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The MA5608T supports the H801MABR backplane. HuWhen the MA5608T is configured in a
n
cabinet, a cable manager must be configured under the MA5608T.
o
t i
There is a fan tray on the left side of the MA5608T, which dissipates heat through air
a
ic
tif air enters from the left side of the chassis, is blown
blowing.
Power board:
ic a
Slot 4
rt if
Service boards:
Ce
&
Slot 0–1 support mixed configuration of different service boards
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The SmartAX MA5818 multi-service access device Hu(MA5818 for short) is a 2 U high and 19
n
inch-wide product that supports flexible card plug-in. It has four service slots and can be
o
ti
flexibly configured.
i a
c mini DSLAM, or mini MSAN construction scenarios.
f
The MA5818 can be used in FTTC/FTTB,
It can be installed in corridorstior cabinets in indoor and outdoor application scenarios.
e r
The MA5818 provides UNI
C interfaces such as ADSL2+, VDSL2, SHDSL, POTS, FE, P2P, ISDN,
&
and Combo, and provides dual GPON/EPON/GE auto-sensing NNI interfaces.
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The MA5818 provides the vectoring feature to support
H u VDSL2 acceleration. Subscribers can
access the network at a higher speed and enjoy richer services and better subscriber
experience through VDSL2 lines.
o n
i
IPv6: Compared with IPv4, IPv6 has atsimplified
f
space, hierarchical address structure, flexible extension header, and enhanced neighbor
discovery mechanism.
r ti
Combo card design: This e
C featuretime
space, reduce cable connection
helps carriers reduce construction costs, save deployment
and MDF occupation, and reduce maintenance costs.
&capabilities:
n g
Comprehensive QoS
i
nthe port level.rate limiting based on subscriber ports and traffic shaping for queue
Supports bidirectional
i
Hu
Upstream and downstream services can be mapped to different priority queues based on
priority tags and scheduled accordingly.
Supports 3 scheduling modes: priority queuing (PQ), weighted round robin (WRR), and
PQ+WRR.
Excellent maintenance and management functions:
Supports service pre-deployment and plug-and-play.
Supports remote fault locating, troubleshooting, and batch upgrade.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The SmartAX MA5821/MA5822 (MA5821/MA5822 Hu for short) is a remote ONU launched by
Huawei.
o n
The MA5821/MA5822 is mainly used in
t i FTTB or FTTC construction scenario. The
the
asurveillance scenarios.
ic
tif 1 SFP upstream optical port which supports 10G GPON,
MA5821 can also be used in video
n g
downstream direction. The MA5822 also supports POTS access.
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
The MA5821/MA5822 is classified into products u 8/16/24 FE or 24 GE electrical
Hwith
n
interfaces based on the number of subscribers that can be connected. The MA5822
o
ti
supports POTS access.
a
The MA5821/MA5822 provides 1cSFP upstream optical port which supports 10G GPON,
i fi transmission.
transmitting data through Ethernet cables, the EA5821 can provide power supply for
e r
terminals such as indoor cable routing requirements.
Abundant service typesC
The EA5821&
n g can implement multiple services such as data and multicast services with
i
solutions. It supports high-performance multicast service.
a in IPv6.
Supports
rProvides comprehensive QoS capabilities.
i T
eExcellent
aw
maintenance and management functions:
Hu
Supports various maintenance and management functions, such as on-site software
commissioning, remote acceptance, remote upgrade and patching, and remote fault
locating. Supports one-stop offline deployment and plug-and-play. Configurations
can be automatically obtained from the NMS and take effect automatically. When
the EA5821 goes online, it sends a report message to NMS automatically.
Remote batch upgrade: Supports automatic batch upgrade and version and data
rollback in case of an upgrade failure, thereby ensuring upgrade security.
Zero touch routine maintenance: Supports accurate fault locating and remote
troubleshooting. Supports comprehensive information collection, device self-check,
and diagnosis.
Network performance monitoring: Supports network optimization and subscriber
QoS monitoring.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The MA5616 can be configured with different service
H u boards to provide ADSL2+, VDSL2,
SHDSL, POTS, and ISDN subscriber interfaces, meeting requirements of various FTTB and
r
e board EIUD can be configured only in slot 1 or slot 2.
C
A P2P Ethernet access
&
The MA5616 has the following features:
Supportsg
in
3 types (CCUB/CCUC/CCUE) of control boards.
ThenCCUB/CCUE
i supports the xDSL, ISDN, POTS, ADSL2+, and POTS combo service
a serviceIn addition
T rboards. to the aforesaid service boards, the CCUC also supports FE and
i GE boards.
e Supports xPON and GE upstream ports when configured with different daughter
aw
boards. The CCUE control board can be configured with an XP1A daughter board to
Hu
provide 10G GPON upstream ports.
Can be installed without onsite software commissioning, accelerating the deployment.
Supports remote fault locating, commissioning, information collection, and fault
recovery.
Supports intelligent fan speed adjustment which effectively reduces power
consumption during off-peak hours. The power consumption of a single device can
be reduced by a maximum of 6 w.
The MA5616 supports AC and DC input. The AC input mode supports battery backup.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The MA5620/MA5626 is a remote ONU launched Huby Huawei to meet customers'
n
requirements for the multi dwelling unit (MDU) in an FTTB network. It works with the OLT
to provide high-speed and high-quality o
ti
data, voice, and video services for FTTB access.
i a
c features:
f
The MA5620/MA5626 has the following
i
r tsupports
e
The MA5620/MA5626 EPON, GPON, and GE upstream transmission.
C VoIP-based plain old telephone service (POTS) access and
The MA5620 supports
& LAN access.
Ethernet-based
g
n supports Ethernet-based LAN access.
i
inMA5620/MA5626 provides 3 specifications with 8, 16, and 24 ports. The AC
The MA5626
a
rpower supply mode is adopted.
The
T
ei The MA5620 supports basic services such as voice service, fax service, and modem
a w
Hu service, as well as value-added services such as 3-party conversation, call waiting, call
transfer, calling line identification presentation (CLIP), and calling number restriction.
The MA5620/MA5626 supports plug-and-play and remote management without
onsite configuration. It provides excellent management, maintenance, and
monitoring functions, facilitating routine operation management and fault diagnosis.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
H u MDU devices to transmit data signals
Power over Ethernet (PoE): A technology that enables
for terminal devices as well as DC power on existing Ethernet cables.
e
obtain power when accessing rt the network.
C
PoE has the following features:
&an Ethernet cable has a voltage only when it is connected to a device
n g
In PoE mode,
i
that requires power supply. If connected devices do not require power supply, there
involtage on the Ethernet cable, eliminating the risk of electricity leakage.
is no
a
T rSubscribers can safely use the existing devices and PoE devices on the network.
i
u a As shown in the figure on the left, the PoE power supply system of the MxU has the
H
following typical applications: connecting to the IP phone, wireless APs in a WLAN,
and network cameras in the video surveillance scenario.
The MA5626 PoE device functions as a power sourcing equipment (PSE) to connect
to an AC 220 V power supply. Due to the difficulty in centralized power supply, some
terminals are connected to the MA5626 through Ethernet ports to transmit data and
obtain PoE power supply.
Reverse PoE power supply
As shown in the figure on the right, the MA5626 reverse PoE device functions as a
powered device (PD) and connects to a PSE power adapter in a subscriber's home
through an Ethernet port to transmit data and obtain PoE power.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The MA5612 has the following features: Hu
n
The MA5612 supports card plugging. It provides two service card slots with natural
o
ti
ic a
r t if
The MA5612 provides GPON, EPON, and GE interfaces on the network side to meet
e
different modes and bandwidth requirements. The upstream ports support triple
C
mode autonegotiation.
&
The MA5612 supports FE, POTS, and radio frequency (RF) interfaces, which can be
ng
i
used for home subscriber access.
n
i
a access and mobile bearing.
r
The MA5612 supports GE, FE, and E1 interfaces, which can be used for enterprise
T
ei
user
aw
The MA5612 supports AC and DC power supplies.
Hu
The MA5612 features an energy-saving backup technology: The POTS short loop is
used to reduce the power consumption by 5%. Supports 12 V AC power backup,
reducing power backup cost by more than 50%.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Bridging device: Hu
n
A bridging ONT only transparently transmits packets, and the LAN-side device
o
ti
ic a
rt if
A bridging ONT cannot be used as the home control center and needs to be
e
connected to a router. Therefore, the carrier loses the control of the ingress.
Internet services:C
A PC obtains the public IP address through PPPoE dialup to access
the Internet.&
r a
programs.
i T VoIP service: The ONT functions as a DHCP client to obtain an IP address through
e DHCP. Multiple POTS ports share one IP address.
a w
Hu Gateway device:
A gateway ONT obtains the public IPv4 address and assigns a private IPv4 address to
each LAN-side device. NAT is performed to save the public IP addresses.
A gateway ONT functions as the home interconnection center and connects home
devices through network cables and Wi-Fi. It can be used as the entrance to smart
homes.
Internet services: The ONT functions as a PPPoE client to obtain a public IP address
through PPPoE dialup. In addition, the ONT functions as a DHCP server to allocate
private IP addresses to PCs connected to the network through L3 LAN ports and Wi-
Fi. Using NAT, private network PCs can share a public IP address to access the
Internet.
IPTV service: The ONT functions as a DHCP client to obtain a public IP address
through DHCP. In addition, the ONT functions as a DHCP server to allocate private IP
n
it o
addresses to STBs connected to the network through L3 LAN ports. Using NAT, STBs
on the private network can share a public IP address to order programs.
ic a
if
rt
VoIP service: The ONT functions as a DHCP client to obtain an IP address through
DHCP. Multiple POTS ports share one public IP address.
C e
&
TR069 service: The ONT functions as a DHCP client to obtain an IP address through
DHCP and establishes a connection with the TR069 server ACS.
g
n in
r ai
i T
e
a w
H u
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Reference answers: Hu
1. FTTH, FTTB, FTTC, FTTO, FTTM
o n
a
2. There are single and modular MxUs,ti applicable to scenarios such as FTTH/B/C.
i f icIPTV, CATV, and Wi-Fi
rt
3. Internet access (data), VoIP,
C e
&
n g
i
a in
T r
ei
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Serial port maintenance mode: Hu
n
A maintenance terminal communicates with the console of the control board
o
ti
ic a
Network port maintenance mode:
r tif
Ce
In-band mode: A maintenance terminal communicates with an NE through an
upstream service Ethernet port of a device.
&
ng
Advantages: The networking is flexible and no additional devices are required,
ni
saving the cost.
i
a Disadvantages: When a service channel is faulty, maintenance cannot be
Tr
ei
performed.
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
In out-band management mode, non-service channelsHu are used to transmit management
n
information so that management channels are separated from service channels. The out-
band management mode provides moreoreliable device management channels than the in-
band management mode. When anaupstream ti link of the OLT is faulty, the device
i f ic and monitored in real time.
rtboard of an OLT is an auto-sensing port, and can automatically
information can be quickly located
The ETH port on the controle
C cable when connected to a computer.
&
identify the direct or crossover
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu messages are transmitted through
In in-band management mode, management interaction
ninconvenient.
a service channel of a device, the networking is flexible, and no additional device is required.
o
ti
This saves the cost but makes maintenance
i a
c with a maintenance terminal or NMS through a VLAN
f
In-band management communicates
L3 virtual interface address. ti
e r
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Command mode classification
Hu
o n
The OLT provides multiple command modes to implement hierarchical protection and
ti
prevent unauthorized access.
The command modes are as follows:
ic a
User mode
r tif
Privilege mode
Ce
Interfaceg
&
Global config mode
n
config mode
i
a in mode
OSPF mode
Tr
MPLS-LDP
ei BTV mode
current command mode and brief command descriptions. Enter a command followed
ic a
if
by a question mark (?) separated by a space to obtain all keywords and descriptions
rt
corresponding to the current position.
e
C
If the position is a parameter, the parameter name, parameter description, value
&
range, default value, input format, and unit are listed.
g
n is complete and you can run the command without entering any
i
If a command
in
a
information, <cr> is displayed, indicating that the command can be executed by
T rpressing Enter.
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Press <TAB> to supplement the keyword. Hu
n
Enter an incomplete keyword and press Tab. If there is a unique keyword that starts
o
ti
with the entered character, the system replaces the original input with the complete
ic a
if
keyword and displays the keyword followed by a space and cursor in a new line.
e rt
Press the space key to supplement the keyword.
C keyword and press the space key. If the matching keyword is
Enter an incomplete
unique, the &
T rthen
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Interaction mode Hu
n
When a user enters an incomplete command, the command line system provides the
o
ti
command line interaction mode by default, and displays the next command word
ic a
if
that can be entered and the parameter type of the command word.
rt
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the display history-command commandHu
This command is used to query the n records of recently executed commands. After
io the screen displays the records of the recently
t
the command is executed successfully,
a
ic
tifyou can press ↑ and ↓ to obtain the previous and next
executed commands.
r
e command record, and press Enter to directly execute the
In some Telnet terminals,
C
commands of the current
&
selected command.
g
n records are valid only for the current user. After the user logs out, the
i
The command
in records are cleared.
a
command
T rYou can run the history-command max-size command to set the number of
ei command records to be displayed. The value range is 1–100. By default, the system
a w saves 10 commands.
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
switch language-mode user guide Hu
n
The system supports multiple languages. Users can select one of the languages to
o
ti
display information.
ic a
r t if
By default, the system supports the common language resource file (English) and a
e
local language resource file. If the local language is not displayed as default
C
languages, you can load a new language resource file (using the load language
&
command) to display information in the required language.
g
n can be switched in all modes.
i
The language
in
a
Tr
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
Operation users are classified into the 3 levels: administrator, operator, and common user.
n
Different user levels have different system operation rights.
o
Administrators can add users of ilower
ic
tif
operators and common users.
r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Command parameters Hu
n
Number of concurrent logins: indicates the maximum number of terminals that can
o
ti
ic a
rt if
Additional information about a user: indicates information such as the contact
e
method and address of a user.
Precautions C
&
ng
By default, the system has 3 profiles: admin, operator, and commonuser.
i ni
The user name of an operator user must be unique and cannot be all or online.
a
e
aw A maximum of 10 terminal users can be online at the same time.
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Introduction to commands Hu
n
Permission: There are 3 levels: User, Operator, and Admin.
o
User is a common user. ti
ic a
n g
Status: indicates whether a user is online.
i
i T
e Additional information: indicates information such as the contact method and
w
u a address of a user.
H
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Functions of the terminal user level command
Hu
improve the operation rights of ao n to ensure the system security, run this
This command is used to modify the rights of a user. When you need to reduce or
i are reset, the user can perform operations on
command. After the rights of atuser
user
a
the system according to thecpreset rights.
i
An administratortcan
fi change the operation rights of multiple users
r
consecutivelyeuntil confirming that the operation is complete.
C
&terminal user level command to modify the operation rights of the
Run the display terminal user command to obtain the user name, and then
g
run the
n
iuser.
a in Only an administrator can run this command to change the level of a user to
r common user or operator.
i T
eFunctions of the terminal user reenter command
w
u a This command is used to modify the number of terminals that can be used by a user
H
to log in to the system concurrently. When an account needs to log in to the system
on multiple terminals at the same time, run this command to set the maximum
number of terminals.
Generally, to ensure device security, the maximum number of concurrent logins
of a user account is set to 1.
Only administrators can run this command.
Run the display terminal user command to query the user name, and then
run the terminal user reenter command to change the maximum number of
concurrent logins.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
display client Hu
n
This command is used to query information such as the user ID, IP address, and login
o
ti
ic a
client kickoff
rt if
Ce
When you need to forcibly disconnect a terminal user or a type of terminal users, run
this command. After a user is disconnected, the user cannot perform any operation
on the system.&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
display version 0/9 Hu
n
0/9: indicates the subrack ID and slot ID. When you need to query the version of the
o
ti
ic a
Parameter description
rt if
C e
Version: version information
&
PRODUCT: product name
Uptime: g
i n running time
a in
Tr
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The Network Time Protocol (NTP) is an application Hulayer protocol in the TCP/IP protocol. It
nNTP packets to synchronize clocks between
is used for clock synchronization between a distributed time server and client. Network
o
i
tapplications
devices that support the NTP can exchange
c
them. In this manner, various service a (such as the network management
&
multicast mode.
n g
A client and server must have L3 interfaces and IP addresses that can communicate
i
in
with each other.
a
T r In client/server mode, you only need to configure the NTP client. On the NTP
ei
a w In client/server mode, time can be synchronized only from the NTP server to an
u
A device that runs NTP can receive synchronization from other clock sources or
synchronize time to other devices. Devices can synchronize time with each other.
When a device works in client mode, you do not need to set the system time, and
the device automatically synchronizes the system time from a remote server.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Command functions Hu
n
The frame set command is used to set the description of a subrack. When you need
o
ti
to identify a subrack by the subrack description, run this command. After the setting
ic a
if
is successful, you can query the subrack number by the subrack description, and then
rt
perform other operations on devices based on the subrack number.
e
C
The undo frame desc command is used to delete existing subrack descriptions from
&
the system. When you need to clear the description of a subrack, run this command.
User guide n g
ni
a i
r
After the description of a subrack is set successfully, if you run the frame set
i T command to reset the description of the subrack, the description of the subrack is
e modified.
a w
Hu After the description of a subrack is set successfully, if you run the undo frame desc
command, the description is cleared.
If the subrack description contains spaces, use "" to enclose the characters.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Command functions Hu
n
This command is used to query the information about all boards in a subrack or
o
ti
board in a specified slot. When you need to query the slot number, name, status,
ic a
if
daughter board information, port information, or online status of a board after
rt
performing an operation on the board, run this command.
User guide
Ce
&
If you specify only the subrack number, the system queries the information about all
ng
ni
boards in the entire subrack. The following information can be queried: slot number,
a i
board name, board status, daughter board name, and online status of the board
T rIf you specify the subrack ID and slot ID, the system queries the detailed information
i
e about the board with the specified subrack ID and slot ID. The following information
a w can be queried: board name, board status, and port information of the board
Hu When querying the activation information about service boards and ports, you can
query the total number of activated and inactive ports.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Command functions Hu
n
This command is used to query the information about all boards in a subrack or
o
ti
board in a specified slot. When you need to query the slot number, name, status,
ic a
if
daughter board information, port information, or online status of a board after
rt
performing an operation on the board, run this command.
User guide
Ce
&
If you specify only the subrack number, the system queries the information about all
ng
ni
boards in the entire subrack. The following information can be queried: slot number,
a i
board name, board status, daughter board name, and online status of the board
T rIf you specify the subrack ID and slot ID, the system queries the detailed information
i
e about the board with the specified subrack ID and slot ID. The following information
a w can be queried: board name, board status, and port information of the board
Hu When querying the activation information about service boards and ports, you can
query the total number of activated and inactive ports.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
You can add a board in either of the following H u
ways:
Add a board offline. That is, run thenboard add command to add a board in an
ioalarm indicating that the board is faulty. Then,
t
empty slot. The system reports an
athe corresponding slot. If the type of the inserted
ic
tiftype of the board added offline, the system reports a board
manually insert the board into
r
board is the same as the
e(alarm ID: 0x02310000). If the types are inconsistent, an alarm
C
fault recovery alarm
&
with ID 0x02300082 is reported.
n g
Automatically discover the board. Insert the board into an idle slot. The system
i
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
board delete
Hu
o n
This command is used to delete a board from a subrack. Run this command to set a
ti
slot to the idle state if the board in the slot is faulty and removed, and no other
ic a
board is registered in the slot. After the board is deleted successfully, you can add a
if
new board in the idle slot.
board reset
e rt
This command isC used to reset a board in a specified subrack or slot. Run this
by resetting&
command when locating a fault or when a service is faulty and cannot be recovered
n g the chipset on the board. For example, if you need to set the value of
i
some performance statistics to 0, the setting takes effect only after the board is reset.
in a board is reset successfully, all the data configured on the board is reset to 0.
After
a
r Note: Exercise caution when running this command. Do not reset the board
iT
e
unless necessary. Otherwise, services may be affected.
a w To reset the control board or the system, run the reboot command instead of the
n
information so that management channels are separated from service channels. The out-
band management mode provides moreoreliable device management channels than the in-
band management mode. When anaMA5680T ti
c
quickly located and monitored fini real time.
is faulty, the device information can be
r ti
C
The MA5680T is connected e to a LAN through a straight-through cable. The IP address of
&operation console. Note: You can directly connect the network port of
the maintenance network port of the MA5680T must be in the same network segment as
g
the IP address of the
nconsole to the maintenance network port of the MA5680T control board for
i
the operation
out-bandin
r a management using a crossover cable.
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
interface meth Hu
n
This command is used to enter Meth mode from global config mode. Run this
o
ti
command when you need to configure the parameters such as the IP protocol,
ic a
if
firewall, and duplex status of the maintenance network port.
ip route-static
e rt
C command is used to configure a static unicast route. If the
The ip route-static
& is simple, you only need to configure static routes to ensure the
network structure
g
normalnoperation of the network. After static routes are created, network devices
i
ncommunicate
a i
can with each other at Layer 3.
T rThe undo ip route-static command is used to delete a static unicast route. If a fault
i
e occurs on the network or the topology changes, the static routes do not change
a w automatically, and you need to run this command to delete the static routes.
In some cases, for example, when the link layer is encapsulated by PPP, even if the
peer address is not known, the outbound interface can be specified when the router
is configured. In this way, even if the peer address changes, the configuration of the
n
it o
router does not need to be changed.
ninconvenient.
a service channel of a device, the networking is flexible, and no additional device is required.
o
ti
This saves the cost but makes maintenance
ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Standard VLAN: One Standard VLAN contains onlyumultiple upstream ports. Ethernet ports
H
in a VLAN can communicate with each other, and Ethernet ports in different VLANs are
isolated from each other.
o n
The interface vlanif command is used
a ti to create a VLAN interface in global config mode
c When you need to configure the virtual L3 interface in
f
and enter the VLAN interface mode.
i
r
VLANIF mode, run this command.
ti
Ce cangroup,
In VLANIF mode, you
group, MPLS command
configure the DHCP command group, firewall, IP command
DHCP server group, and ARP command group of a
&
VLAN interface.
n g
i
You can create a VLAN interface or enter the corresponding VLAN interface mode
onlynafter the VLAN is created.
a i
T rThe system supports a maximum of 32 VLAN L3 interfaces.
i in the system must be unique. An existing VLAN cannot be created again.
eVALNs
w
u a Before deleting a VLAN, you need to delete the L3 interfaces, upstream ports, and service
H
ports of the VLAN. If the MPLS function is enabled in the VLAN, you must disable the MPLS
function before deleting the VLAN.
Run the undo port vlan command to delete upstream ports.
Run the undo service-port vlan command to delete service ports.
Run the undo interface vlanif command to delete L3 interfaces.
Run the undo mpls command to disable the MPLS function.
The system supports a maximum of 4000 VLANs. The default VLAN ID is 1 and cannot be
created or deleted.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the display ip interface command Hu
This command is used to query the n IP configuration and statistics of an interface. Run
this command when you need toio
r
received, sent, forwarded,
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu users from logging in to the device.
There are multiple methods to prevent unauthorized
n
For example, you can set an access control list or configure the access mode and network
segment. You can also enable multiple o
ti
modes at the same time.
i a
c the packets that access the management interface
f
Configure the system firewall to control
ti
r
of the device to prevent unauthorized users from accessing the system in in-band or out-
Ce
band mode.
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
1u
Wildcard mask: 0 indicates strict matching, andH indicates random matching. In the
n
permitipsource 10.10.21.0 0.0.0.255 example, terminals whose IP addresses are in the
o
ti
10.10.21.0–255 range can access the system.
ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Functions of the sysman ip-access command Hu
n
This parameter specifies the IP address segment that is allowed to access the device
o
ti
over a specified protocol. Run this command when you need to set a firewall for
ic a
if
users who access the device to prevent unauthorized users from logging in to the
rt
device. After the configuration succeeds, the users who do not meet the address and
Ce
access protocol requirements will be denied access to the device.
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Reference answers:
Hu
n
1. The advantages and disadvantages are as follows:
o
ati
In-band mode: A maintenance terminal communicates with the host through
c
the upstream service Ethernet port of the device.
i
tif is flexible and no additional devices are required, saving
Advantages: The networking
r
Cea service channel is faulty, maintenance cannot be performed.
the cost.
Disadvantages: When
& mode: A maintenance terminal communicates with a device through
g
Out-band
n Ethernet maintenance port on the control board.
ithe
T r the information about the device on the network can be located in time.
is faulty,
i Disadvantages: A separate network is required to provide maintenance channels
eirrelevant
a w to service channels.
Hu 2. Apply an ACL to the in-band (out-band) interface. Use sysman ip-access to filter
addresses and accessed services.
3. Common maintenance methods are classified as follows:
By maintenance interface:
GUI mode: U2000/eSight NMS
CLI mode: Console/Telnet remote login
By maintenance port
Serial port maintenance mode: Console (CLI)
Network port maintenance mode: Out-band (CLI or GUI) and in-band (CLI or GUI)
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Key points: Hu
n
OLT opens a window to request ONU SNs.
o
ti
i
The ONU
in
r a
Ranging:
T
ei ONUs, the OLT must range the actual physical distance of each ONU and add a
Different ONUs have different physical distances from the OLT. To synchronize all
a w
Hu different delay compensation for each ONU according to the farthest logical distance.
In this way, the logical distances between ONUs and the OLT are the same, and all
ONUs connected to a GPON port are synchronized.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
DBA: dynamic bandwidth assignment
Hu
GEM: GPON encapsulation mode
o n
TCONT: transmission container
ati
ic
if
OMCI: optical network terminal management and control interface
r t
SNMP: Simple Network Management Protocol
e
DBA profile
C
&
Defines the upstream traffic parameters of the GPON, and binds to T-CONTs to
ng
i ni
Line profile
a the bottom-layer line parameters of the ONT, such as the DBA profile used by
r
T a T-CONT, GEM port ID, service mapping mode, service type, QoS, and FEC
Defines
ei
aw
encryption enabling status.
Hu
Service profile
Defines the types and number of ONT ports, mapping between port IDs and VLANs,
and switching mode between multicast VLAN and VLAN.
Referenced when the management mode for an ONT to be added is set to OMCI. A
service profile does not need to be configured for the MDU management mode.
SNMP profile
When the upper-layer network manages devices through an NMS server, you need to
set SNMP parameters, including the SNMP version, community name, and
destination IP address.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the display DBA-profile all command Hu
This command is used to query all DBA n profiles in the system.
io
Usage
a t
c
i
if 9 default DBA profiles with IDs ranging from 1 to 9. These
r t
The system provides
e
profiles provide typical traffic parameter values.
C
&
You can query and modify the default DBA profiles but cannot delete them.
n g
When you query a specified DBA profile by specifying the profile ID or profile
i
i n name, the system displays the detailed information about the profile. When all
r a DBA profiles are queried, the DBA profiles are displayed in a list.
i T
e
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Functions of the DBA-profile add command Hu
n
This command is used to add a DBA profile. A T-CONT is a physical resource on an
o
ti
ONT, and can carry services only after being bound to a DBA profile. If the default
ic a
if
DBA profiles cannot meet service requirements, run this command to add a DBA
profile.
r t
Usage
Ce
&
By default, a T-CONT is bound to DBA profile 1.
g
i n system provides 9 default DBA profiles with IDs ranging from 1 to 9. These
in profiles provide typical traffic parameter values.
The
r a
T
ei
You can query and modify the default DBA profiles but cannot delete them.
Hu integer multiple of 64. For example: If the input bandwidth is 1022 Kbps, the
actual bandwidth is 960 Kbps.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the ont-lineprofile command Hu
n
The ont-lineprofile command is used to enter the ONT line profile mode to
o
ti
configure the attributes of an ONT line profile. If you enter the ONT line profile mode
ic a
if
for the first time, a default profile is generated.
Usage
e rt
CID is specified, the system automatically allocates a profile ID and
If no profile
enters&
ai
Tr
default values of the current profile type. You can run the display ont-
ei
lineprofile command to query the parameters.
aw
By default, the profile name is ont-lineprofile_x, where x is the actual profile ID.
Hu
The ONT FEC function is disabled.
o n
This command is used to bind a T-CONT to a DBA profile. A T-CONT is a physical
ti
resource on an ONT, and can carry services only after it is bound to a DBA profile.
ic a
After the binding succeeds, the T-CONT can provide flexible dynamic bandwidth
if
assignment schemes according to configurations in the DBA profile.
Usage
e rt
T-CONT 0 C
is bound to DBA profile 1 by default in the ONT line profile. The DBA
& of other T-CONTs.
profile bound to T-COUNT0 cannot be modified. You can modify the binding
g
relationships
n can run the display ont-lineprofile command to query the information
niYou
ai
ei
Functions of the gemport add command
aw
This command is used to add a GEM port. Before configuring the GPON access
service, you must run this command to add a service transmission channel, that is, a
Hu
GEM port. After a GEM port is added successfully, run the ont gemport bind
command to bind it to a T-CONT of an ONT, and then run the ont gemport
mapping command to set up the mapping between the GEM port and a user service
flow. Then, the service flow can be carried by the GEM port.
Usage
When adding a GEM port, you must select the correct attributes according to
the service type. The attribute must be set to TDM when the TDMoGEM service
is carried.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the mapping-mode command
Hu
o n
This command is used to create the mapping between GEM ports and services on the
ti
ONT side, that is, to set up the mapping between GEM ports and the data flows of
ic a
the ONT user interface. GEM ports can carry services only after the mapping is set up
if
using this command.
e rt
By default, an ONT supports the VLAN mapping mode.
C mapping mode can be configured.
Currently, only one
You can run& the display ont-lineprofile command to query the mapping mode
gby an ONT.
Functionsn i n
supported
i of the gem mapping command
a gem mapping command is used to create the mapping between GEM ports and
r
T the services on the ONT side, that is, to set up the mapping between GEM ports and
The
i
e the upstream data flows of the ONT user interface. GEM ports can carry services only
a w after the mapping is set up using this command.
Hu When configuring the mapping between a GEM port and a user service, if no Traffic
Table ID is specified and the QoS mode of the ONT line profile is FLOW-CAR, Traffic
Table 2 is bound.
When a service flow of the E1 port is mapped to a specified GEM port, the attribute
of the GEM port must be TDM.
In the same ONT line profile, the mapping between GEM ports and user services
must match the mapping mode supported by the ONT as configured in the profile.
A bundle group can be used only in port mapping, port + VLAN mapping, port +
802.1p priority mapping, and port + VLAN + 802.1p priority mapping modes. Ports
in different bundle groups and ports inside and outside a bundle group cannot be
mapped to the same GEM port in the preceding 4 mapping modes.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the qos-mode command Hu
n
This command is used to configure the QoS mode in an ONT line profile, that is, the
o
ti
upstream traffic control mode of the ONT. Run this command when you need to
ic a
if
provide end-to-end quality assurance and control the traffic for a user.
Usage
e rt
C command to enter the global config mode, and then run the
Run the config
& command to enter the ONT line profile configuration mode.
ont-lineprofile
g
n default, the QoS mode of an ONT line profile is the priority queue
niBy
ai
Tr
scheduling mode.
ei
You can run the display ont-lineprofile command to query the QoS mode of
a w a profile.
configure the attributes of an ONT service profile. If you enter the ONT service profile
ic a
if
mode for the first time, a default profile is generated.
Usage
e rt
CID is specified, the system automatically allocates a profile ID and
If no profile
enters&
ai
Tr
default values of the current profile type. You can run the display ont-
ei
srvprofile command to query the parameters.
aw
Default configurations of an ONT service profile are as follows:
Hu
MAC address learning is enabled.
o n
This command is used to set the port capability set in an ONT service profile, that is,
ti
to set the number of various ports on an ONT.
Usage
i c a
a i (UNI) port in an ONT service profile. When you need to manage the
T rattributes of an UNI port of the ONU remotely and add the UNI port to a VLAN, run
Interface
ei this command.
a w Usage
u
H Supports the VLAN configuration of the Ethernet and MOCA ports, and sets
the VLAN of an ONT port. You can add a port to a VLAN or delete a port from
a VLAN.
Supports the configuration of the transparent transmission mode of the ONT
and ETH ports. In this case, you do not need to specify the VLAN ID, and just
need to enter the keyword transparent.
Supports the configuration of VLAN+ switching for the ONT and ETH ports.
Enter the keyword translation, VLAN, priority, and packet encapsulation type
before and after the translation.
The ONT and ETH port transparent transmission and VLAN translation can be
deleted.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the multicast-forward commandHu
n
This command is used to set attributes such as the multicast forwarding mode and
multicast forwarding VLAN of anio
ic
Usage
r t if
srvprofileC
e
Run the config command to enter global config mode, and then run the ont-
command to enter ONT service profile configuration mode.
&
g
Functions of the igmp-forward command
in is used to configure the upstream IGMP packet forwarding mode for
Thisncommand
i
aaGPON ONT in an ONT service profile. The mode can be transparent transmission,
T rVLAN translation, or ignore.
ei Usage
a w
Hu Run the config command to enter global config mode, and then run the ont-
srvprofile command to enter ONT service profile configuration mode.
This command is used to set the upstream IGMP packet forwarding mode of a
GPON ONT.
The default forwarding mode is Ignore. If the translation mode is specified, you
also need to enter the VLAN after the translation.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the snmp-profile add command Hu
This command is used to add an SNMPn management profile. After an SNMP profile is
io take effect when an ONT is bound to the SNMP
t
added successfully, the parameters
a
management profile.
ic
f of an ONT is SNMP, you can bind an SNMP
r timode
Ceto the ONT.
When the management
management profile
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Functions of the port ont-auto-find commandHu
t
aONTs.
ic
tif
periodically searches for new
r
Ce command to enter global config mode, and then run the
Usage
interface
g
n default, the ONT auto-discovery function of a GPON port is disabled.
i
in After a new ONT goes online, the board reports a group of ONT information to
By
a
r be confirmed to the CLI terminal, and stores the information in an ONT
T
ei
a w registration buffer for confirmation.
Hu ONTs can be added in 2 modes. You can run the ont add command to add an
ONT offline or run the ont confirm command to confirm an automatically
discovered ONT.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the ont confirm command Hu
n
This command is used to confirm an ONT that is in the auto-discovery state. If the
o
ti
ONT auto-discovery function is enabled on the OLT, after an ONT goes online, the
ic a
if
OLT obtains the registration information about the automatically discovered ONT and
r t
the ONT is in the auto-discovery state. After you run this command to confirm the
Ce
ONT, the ONT enters the normal working state.
Usage
&
g
n the config command to enter global config mode, and then run the
iRun
in interface gpon command to enter GPON mode.
r a
T
ei
When confirming an automatically discovered ONT, you must specify the ONT
capability set profile.
a w
Hu You must select correct and existing profiles for an ONT to be confirmed. The
profiles define the specifications and capabilities of the ONT. If the ONT profiles
are set incorrectly, the ONT fails to work properly after going online.
It is recommended that you add location and time information to each ONT to
facilitate fault location and maintenance.
The SNs of ONTs configured in the same system must be unique.
The OLT can manage ONTs in SNMP or OMCI mode. If an ONU functions as an
independent NE and is managed by the NMS, select the SNMP management
mode. If an ONU is not managed as an independent NE and all its
configurations are managed by the OLT through the OMCI protocol, select the
OMCI management mode.
For ONUs in SNMP management mode, you only need to configure the GPON
line parameters and management channel parameters on the OLT. This type of
n
it o
ONU supports a maximum of 128 GEM ports.
For ONUs in OMCI management mode, you need to configure all parameters
ic a
if
rt
(including the line parameters, UNI port parameters, and service parameters)
Ce
required by the ONU on the OLT. This type of ONU supports a maximum of 32
GEM ports and does not support the configuration of management channel
parameters. &
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the ont add command Hu
n
This command is used to add an ONT and specify configuration data for the ONT.
o
ti
Run this command to add an ONT and configure services offline. After the ONT goes
ic a
if
online, the configuration data is delivered to the ONT through the ONT management
r t
protocol to complete the configuration. After an ONT is added successfully, you can
Ce
configure various services for the ONT. When the ONT is not in position, the
&
configurations are temporarily stored on the service board.
Usage
ng
niRun the config command to enter global config mode, and then run the
a i
ei By default, the ONT capability set profiles 1–7 are the ONT capability set profile
w
H When adding an ONT, you must specify an ONT capability set profile.
A correct and existing ONT service profile needs to be selected for the added
ONT. The profile defines the specifications and capabilities of the ONT. If the
ONT service profile is incorrectly set, the ONT fails to work properly after going
online.
It is recommended that you add location and time information to each ONT to
facilitate fault location and maintenance.
The passwords of the ONTs connected to the same port must be unique.
The SNs of ONTs configured in the same system must be unique.
The OLT can manage ONTs in SNMP or OMCI mode. If an ONU functions as an
independent NE and is managed by the NMS, select the SNMP management
mode. If an ONU is not managed as an independent NE and all its
configurations are managed by the OLT through the OMCI protocol, select the
OMCI management mode.
n
For ONUs in SNMP management mode, you only need to configure the GPON it o
a
line parameters and management channel parameters on the OLT. This type of
if ic
rt
ONU supports a maximum of 128 GEM ports.
Ce
For ONUs in OMCI management mode, you need to configure all parameters
&
(including the line parameters, UNI port parameters, and service parameters)
required by the ONU on the OLT. This type of ONU supports agmaximum of 32
n in channel
ai
GEM ports and does not support the configuration of management
parameters.
T r
e i
a w
H u
o n
a ti
i f ic
e rt
C
&
n g
ni
a i
Tr
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the vlan command Hu
n
This command is used to add one VLAN or multiple VLANs of the same type in
o
ti
batches. When you need to use a VLAN to communicate with a peer device, run this
ic a
if
command to create a VLAN.
Usage
e rt
C already exists in the system cannot be created.
A VALN that
&
g
The system supports a maximum of 4000 VLANs. The default VLAN ID is 1 and
n be created or deleted.
nicannot
a i
r
Functions of the port vlan command
T This command is used to add an upstream port to a VLAN. You need to add an
e i
a w upstream port to a VLAN so that user packets with the VLAN ID can be transmitted
A service port is connected to a user device to form a service flow so that the user
ic a
if
can access the service flow. After the command is executed successfully, a service
rt
can be carried on the service port.
e
C
Functions of the ont ipconfig command
& command is used to set the IP address of an ONT. If the ONT
The ont ipconfig
g
i n mode is SNMP, you can run this command to specify the IP address of
management
a inONT and configure the gateway and management VLAN at the same time.
the
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the ping command
Hu
o n
This command is used to send ping packets to a remote host to check whether the
ti
network host is reachable. It is used to check whether the network connection is
ic a
faulty and check the network line quality. When a target host is reachable, the
if
system returns the number of sent packets, number of packets responded to,
r t
percentage of unresponded packets, and minimum, maximum, and average response
faulty. Ce
time. When a target host is unreachable, the network connection or network line is
Usage &
g
Ifnno response packet is received within the timeout period, "Request time out"
i
in isresponse
Hu If the network transmission speed is slow, you can increase the timeout period
for waiting for response packets.
The ping command does not allow users to send ping packets to broadcast
addresses, such as XX.XX.XX.255.
Telnet Command Function
This command is used to log in to a remote server or host to configure and maintain
the device.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
display ont info Hu
n
This command is used to query the information about an ONT, including the current
o
ti
ic a
Usage
r tif
Ce
Run the config command to enter global config mode, and then run the
interface gpon command to enter PON mode.
&
ng
An ONT has 3 states: running, configuration, and matching.
i niThe running status of an ONT indicates whether an ONT is currently online and
a whether it can carry services. If the running status of an ONT is DOWN, you
T r
ei cannot query the ONT version, ONT FE, or GEM port statistics of the ONT, and
aw
the ONT cannot carry services. If the running status of an ONT is UP, the ONT is
Hu
online, and whether it can normally forward services depends on the ONT
configuration status.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
display ont capability Hu
n
This command is used to query the actual capabilities of an ONT. After querying the
o
ti
actual capabilities of the ONT, you can create an appropriate ONT capability set
ic a
if
profile accordingly.
Usage
e rt
C command to enter global config mode, and then run the
Run the config
& gpon command to enter GPON mode.
interface
g
n ONT must be online. Otherwise, the query fails.
niThe
ai
Tr
You can also run this command to query the hardware capability parameters of
ei
an ONT in the Mismatch state and bind it to a correct ONT capability set profile.
a w The hardware capability parameters of an ONT include the type and number of
actual capabilities of the ONT, you can create an appropriate ONT capability set
ic a
if
profile accordingly.
Usage
e rt
C command to enter global config mode, and then run the
Run the config
& gpon command to enter GPON mode.
interface
g
n ONT must be online. Otherwise, the query fails.
niThe
ai
Tr
You can also run this command to query the hardware capability parameters of
ei
an ONT in the Mismatch state and bind it to a correct ONT capability set profile.
a w The hardware capability parameters of an ONT include the type and number of
This command is used to query the n ONT capabilities configured by a user. The
iochecked against the actual capability set of the
t
queried ONT capability set can be
a
ic
tif
ONT for consistency verification.
r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Functions of the display ont version command Hu
This command is used to query the n
information about the ONT version, including the
o manufacturer of the ONT.
software and hardware versionsiand
a t
ic
tif
The version information can be queried only when an ONT is online.
r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
Functions of the display ont optical-info command
This command is used to query the n information about an ONT optical module,
io transmit optical power, bias current,
t
including the receive optical power,
a of the ONT received by a PON port.
ic
tifinformation of a single ONT can be queried.
temperature, and optical power
r
Ce
Only the optical module
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the ont port native-vlan command u
H
r i
of the ONT port do nott contain the VLAN tag (untagged).
e
If the VLAN ID ofCthe ONT port is different from the ID of the native VLAN, the
&
packets of the ONT port contain the VLAN tag.
Usage g
i n the config command to enter global config mode, and then run the
a in interface gpon command to enter GPON mode.
Run
T r
ei
By default, all ports on an ONT belong to VLAN 1, and the native VLAN is
a w VLAN 1.
Hu Before configuring a native VLAN, ensure that the port has been added to the
VLAN. You can run the ont port vlan command to add a port to a VLAN.
If the native VLAN is configured more than once, the last configuration takes
effect.
When you configure a service port and the specified user-side VLAN changes:
If untagged packets are uploaded from the corresponding ONT port, the native
VLAN of the port must be the same as the user-side VLAN.
If tagged packets are uploaded from the corresponding ONT port, the native
VLAN of the port does not need to be reset.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the ont modify command Hu
n
This command is used to modify the configuration data of an ONT. If the ONT
o
ti
configuration data (such as the authentication mode, serial number, and password) is
ic a
if
different from the actual ONT configurations, the ONT cannot go online. In this case,
rt
run this command to correct the ONT configurations.
Usage
Ce
&
Run the config command to enter global config mode, and then run the
ng
niThe ONT configurations that can be modified include the serial number,
interface gpon command to enter GPON mode.
a i
Tr
ei
authentication mode, authentication password, and description. The capability
set profile bound to an ONT cannot be modified.
a w
Hu Only one of the sequence code, authentication mode, authentication password,
and description can be modified at a time.
Answers:
1. SN
2. ont-srvprofile
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Functions of the ont delete command Hu
n
This command is used to delete an ONT. When an ONT is deleted, the ONT
o
ti
configuration information is deleted at the same time, and the ONT is forced offline if
ic a
if
it is online. If the ONT configurations, such as the bound capability set profile and
r t
authentication mode, are incorrect, run the command to delete the ONT and add it
again.
Ce
Usage
&
g
n the config command to enter global config mode, and then run the
iRun
in interface gpon command to enter GPON mode.
r a
T
ei
An ONT cannot be deleted if it is configured with services, that is, the T-CONT
of the ONT is bound to a T-CONT profile. To delete such an ONT, run the tcont
a w bind-profile command to unbind the T-CONT profile first.
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Reference answers: Hu
n
1. Specifies the upstream bandwidth and service types of an ONU.
o
a tiONU cannot be registered. If the service profile is
2. If the line profile is incorrect, the
i f
incorrect, class-A ONU servicesic will be unavailable.
e rt Dying-gasp indicates that an ONU goes offline due to
3. Query the ONU information.
C that the fiber is disconnected or broken.
power off. Los indicates
&
g
4. Modify the SN of the registered ONU to be replaced, and connect the new ONU.
n
i
a in
T r
ei
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hufor point-to-point data transmission on
PPP is a point-to-point link layer protocol. It is used
n
full-duplex synchronous and asynchronous links. The PPP protocol has the following
o
ti
advantages:
i a
c and asynchronous transmission. Data link layer
f
PPP supports both synchronous
i Frame Relay (FR) support only synchronous transmission,
n g
be carried on the Ethernet link, the PPP can be extended to PPPoE.
i
a in
PPP provides the Link Control Protocol (LCP) protocol to negotiate link layer
T rparameters.
ei PPP provides various network control protocols (NCPs), such as IPCP and IPXCP, to
w
u a negotiate network layer parameters and better support the network layer protocols.
ic a
application of PPP extension protocols
i f
rt
extension protocols.
C e
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The same as many other commonly used data link Hulayer protocols, the PPP protocol also
n
uses the delimitation frame format of the HDLC protocol which originates from the SDLC
o
ti
protocol for packet encapsulation.
ic a
f
The following describes the encapsulation format of the PPP data frame:
ti ends with a flag byte which is 0x7E.
peer layers communicate with each other, and a lower layer provides
g
n upper layer. When peer layers communicate with each other, the party
i
services for the
needs toin
a
learn the address of the peer end. In the data link layer, the address refers to the
MACraddress, X.121 address, and ATM address of the peer. In the network layer, the
i T refers to the IP address and IPX address of the peer. In the transport layer, the
eaddress refers to the protocol port number of the peer. For example, if 2 hosts on an
address
a w
Hu Ethernet network want to communicate with each other, the sender needs to learn the
MAC address of the receiver. The PPP protocol, however, is used on point-to-point links.
Unlike a broadcast or multipoint network, a point-to-point link can uniquely identify a peer.
Therefore, the communication devices at two ends that use the PPP protocol do not need
to know the data link layer address of each other. The corresponding address byte is
meaningless and filled with a broadcast address with all 1s according to the protocol
requirement.
Same as the address field, the control field of a PPP data frame is meaningless. According
to the protocol, the communication parties fill the content of the byte with 0x03.
In terms of the PPP protocol, the most concerned content should be its protocol and
information fields. The protocol field can be used to distinguish the content of the data
packet carried by the information field in a PPP data frame. As specified in ISO 3309
address extension mechanism, the content of the protocol field must be an odd number.
That is, the least significant bit (LSB) of the lower byte must be 1, and LSB of the higher
n
byte must be 0. If the protocol field of a PPP data frame does not meet the requirements,
it o
the receive end considers that the data frame to be unidentifiable, and sends a Protocol-
ic a
i
Reject packet filled with the content of the rejected packet at the tail to the transmit end.
f
rt
Ce
The maximum length of the information field cannot exceed 1500 bytes, including filled
content (not indicated in Figure 2-1 because it belongs to the information field). The size of
&
ng
the 1500 bytes is the default value of the Maximum Receive Unit (MRU) in the PPP protocol.
i
In actual applications, the maximum encapsulation length of the information field can be
a in
negotiated. If the information field is less than 1500 bytes, it can be filled up to 1500 bytes,
Tr
but filling is not mandatory. If the information field is filled, both ends of the
ei
communication must be able to identify useful and useless information for normal
communication.
a w
H u
The Maximum Transmit Unit (MTU) parameter is frequently used in many communication
i o
is a few bytes longer than that of the MTU,
twhether
ic
The CRC field is mainly used to checka a PPP data frame is correct. Certainly, it is
if guarantee mechanisms in the data frames. However,
t
good to introduce some transmission
r
C e
this increases overheads and the delay of application layer interaction.
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
To adapt to complex and changeable network environments, the PPP protocol provides a
r i
The NCP protocol of the PPPtprovides
common network controleprotocols include the IPCP for the TCP/IP network and the IPXCP
C The IPCP protocol is most widely used. NCP parameters are
&two ends of a P2P network mainly to communicate the network layer
for the SPX/IPX network.
addresses ofin
g
negotiated between
both ends.
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
H
If data communication device (routers in this context) u at two ends want to establish P2P
communication through the PPP protocol, either end needs to send LCP data packets to
configure the link (test link). After the LCPn
o
configuration parameters are negotiated, the
two communicating parties can determine
t i the authentication modes at both ends of the
c a
i default, the two parties do not authenticate each other.
link based on the authentication configuration parameters negotiated in the LCP
configuration request packet. By
t i fNCP
r
Instead, they directly negotiate configuration parameter options. After all the
configuration procedureseare complete, the two parties can transmit data packets at the
network layer throughC the established link. The link is then available. A link is disconnected
to shut down the PPP& session when either party receives LCP or NCP link shutdown packets,
n g cannot detect the carrier, or when a management person shuts down the
i
the physical layer
a w
u
Link unavailability phase: This phase is sometimes referred to as the physical layer
H unavailable phase. All PPP link starts and ends at this phase. When the two ends of a
communication detect that the physical line is activated (generally, a carrier signal is
detected on the link), the next phase starts (that is, the link setup phase). In short, in
link setup phase, the LCP is used to configure link parameters, and the state machine
of LCP changes with events. When a link is unavailable, the LCP state machine is in
the initial or starting state. Once the physical line is detected to be available, the LCP
state machine changes. After a link is disconnected, state machine goes back to the
initial or starting state. In the actual process, the time spent in this phase is very short
to detect only the presence of peer devices.
Link setup phase: This is the most critical and complex phase of the PPP protocol. In
this phase, some configuration packets are sent to configure the data link. These
parameters do not include the parameters required by the network layer protocol.
After the data packets are exchanged, the next phase (authentication or network
layer protocol phase) starts. The next phase depends on configurations (usually
configured by users) of devices at both ends of the link. However, the PPP module of
an NAS or BAS device needs to support the PAP or CHAP authentication mode by
default. In this phase, the LCP state machine changes twice. Firstly, the state machine
changes from initial or starting to Request-Sent when the data link layer is available
and receives an UP event from the physical layer. After this change, the LCP sends a n
Config-Request packet to configure the data link. When either party receives a it o
Config-Ack packet, the LCP state machine changes again to the Opened state. The
ic a
party that receives the Config-Ack packet completes the current phase and enters the
if
rt
next phase. Note that the link configuration operations are independent at both ends
Ce
of a communication. Any non-LCP packets received in this phase will be discarded. In
actual configurations, there may be many situations in this phase. The LCP protocol
&
describes theses possible situations in detail. However, some troubleshooting cases
ng
may give you a better understanding.
i
a in
Authentication phase: In most cases, devices at both ends of a link need to be
Tr
authenticated before entering the network layer protocol phase. By default, devices
ei
at both ends do not authenticate each other. In this phase, PAP and CHAP
authentication modes are supported. The authentication mode is determined based
a w
on the negotiation result between the two parties in the link setup phase. Link
Hu
quality detection also occurs at the same time, but the protocol does not allow link
quality detection to delay the authentication process without a time limit. In this
phase, only the link control protocol, authentication protocol, and quality detection
o n
data packets are supported. Other data packets are discarded. If a Config-Request
a ti
packet is received again in this phase, the PPP protocol goes back to the link setup
phase.
i c
f Once PPP completes the previous phases, each
Network layer protocoltiphase:
e
network layer protocolr (IP, IPX, and AppleTalk) performs configurations using the
C control protocols, and each NCP protocol can be enabled
corresponding network
and disabled& at any time. When the state machine of an NCP changes to the Opened
state, PPPgcan start carrying data packets of the network layer on the link. If a
i n
Config-Request packet is received again in this phase, the PPP protocol goes back to
thein
a
link setup phase.
TrLink termination phase: The PPP can terminate the link at any time if the carrier is lost,
ei
the authorization fails, the link quality detection fails, or an administrator shuts down
a w the link manually. In the link setup phase, the link can be shut down by exchanging
Hu LCP termination packets. When a link is shut down, the link layer instructs the
network layer to perform related operations, and forcibly shuts down the link at the
physical layer. The NCP protocol does not need to shut down any PPP links.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
LCP data packets are exchanged during link setup. HuAs the payload of PPP packets, LCP
nto 0xC021, but the information field changes
packets are encapsulated in the information field of PPP data frames. In this case, the
o
ti many types of packets to be distinguished by the
protocol field of a PPP data frame is fixed
c a
during the link setup phase, containing
corresponding fields. The figurefishows a common encapsulation mode for LCP data
rt i
packets.
e
The length of the codeC
&
field is one byte, which is used to identify the type of an LCP data
T r in the link setup phase, both ends of the communication send several Config-
The flag
i packets which may have the same data fields but different flag fields. The ID of a
Generally,
eRequest
a w
Hu Config-Request packet usually starts from 0x01 and is incremented by 1. After the peer
receives the Config-Request packet, it responds with a packet (Config-Ack, Config-Nak, or
Config-Reject) with the same ID as that in the Config-Request packet. After receiving the
response packet, the sender of the Config-Request packet compares the response packet
with the Config-Request packet to determine the next operation.
Content of the length field = Total byte length (code field + flag field + length field + data
field). The bytes not indicated by the length field are considered as padding bytes and
ignored. In addition, the content of length field cannot exceed the MRU value.
The content of the data field varies depending on LCP data packets.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
Link termination packets are classified into Terminate-Request and Terminate-Reply packets.
n
LCP packets provide a mechanism to shut down a P2P connection. If one party wants to
shut down a link, it continuously sends o
ti After receiving a Terminate-Request packet, the
Terminate-Request packets until receiving a
ic
Terminate-Reply packet from the peer. a
t i f
receiver must respond with a Terminate-Reply packet, wait for the peer end to disconnect
the link, and then completerall the link shutdown operations on the local end.
C e
& packet does not need to carry options of configuration
The data field of an LCP link termination packet is different from that of a link configuration
g
packet. A link termination
n IDs of link termination packets must also be consistent. A link is terminated
parameter. iThe
a
only when inthe Terminate-Reply packet is received.
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
H u 2 types of packets, and are used to
Link configuration packets are different from the other
negotiate the configuration parameter options of the link. Therefore, the data fields of this
o n
type of packets need to carry various configuration parameter options.
a ti
Link configuration packets include Config-Request, Config-Ack, Config-Nak, and Config-
ic
f
Reject packets.
When a link needs to be set t i
rup between the two communicating parties, either party needs
e
negotiated. C
to send Config-Request packets which carry the configuration parameter options to be
&
n g
Upon receiving a Config-Request packet, the receiver selects one of the remaining 3 packet
i
types to respond to the request packet based on the following conditions:
a in the type fields of all configuration parameter options can be identified. One
Whether
rConfig-Request packet may carry multiple configuration parameter options at the
T
ei necessarily support all configuration options. Even if a configuration option is
same time, but a communication device that supports the PPP protocol does not
a w supported, the function may also be disabled in actual applications. For example, a
Hu device that supports PPP protocol may disable all configuration options and support
only 0x01 and 0x03. In this case, if a Config-Request packet received from the peer
end contains the 0x04 configuration option, the local end regards configuration
parameter option as unidentifiable, and the negotiation of the configuration
parameter option fails.
Whether the type fields of all configuration parameter options are acceptable. A peer
that can identify configuration parameter options in a received Config-Request
packet does not necessarily accept the negotiation. For example, if one party wants
the magic number to be set to all 0 but the peer end wants to set it otherwise, the
negotiation fails.
Response packets are selected based on the 2 two conditions to respond to configuration
request packets.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu all configuration parameter options
If the receiver of a Config-Request packet can identify
n
and accepts the parameter options, the receiver places configuration parameter options
without any change in the data field of o
ti According to the protocol, the sequence of
a Config-Ack packet, and sends the Config-Ack
packet as a response to the requestasender.
i f iccannot be changed. After the Config-Request sender
rt from the peer end, the next phase starts.
configuration parameter options
e
receives the Config-Ack packet
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu all configuration parameter options
If the receiver of a Config-Request packet can identify
o
PPP protocol does not require the negotiation n of the magic number. If the magic number is
not negotiated between the two parties
t i needs to be used in some LCP packets, the
but
c a
fi
magic number is filled as 0. If the magic number is negotiated, it is set to the negotiation
result.
t i
The magic number needs tor be negotiated on all current devices, and is sent in the
H Request packet, the receiver compares the packet with the Config-Request received last
time. If the two packets contain different magic numbers, no loop exists on the link. If the
magic numbers are the same, the receiver considers that a loop may exist on the link, and
further confirmation is required. In this case, the receiver sends a Config-Nak packet
carrying a new magic number, and does not send any Config-Request packet before
receiving a Config-Request or Config-Nak packet. There are two possibilities in this scenario:
There is no loop on the link, but the two parties generate the same magic number.
The probability of this scenario is very low. After receiving a Config-Nak packet, the
receiver sends a Config-Request packet containing a magic number the same as that
in the Nak packet. After receiving the Config-Request packet, the peer compares the
received Config-Request packet with the previous one. If the magic numbers are
different, the peer determines that there is no loop on the link.
A loop exists on the link and a Config-Nak packet returns to its sender after a period
of time. In this case, the sender compares the Config-Nak packet with that sent last
n
time. If the magic numbers in the packets are the same, the possibility of a loop on
it o
the link increases. According to the protocol, if one party receives a Config-Nak
a
packet, it sends another Config-Nak packet with the same magic number as that in
Config-Nak. In this case, the Config-Request and Config-Nak packets are
if ic
rt
continuously generated on the link. After the number of Config-Request and Config-
Ce
Nak packets reaches a certain value, the receiver determines that a loop exists on the
link.
&
However, in actual applications, there are 2 methods for determining whether a loop exists
ng
depending on how a device implements the PPP protocol. The first method is described
i
in
above. This process repeats until the LCP state machine receives a Down event, returns to
a
the initialization phases, and starts a new round of negotiation. The second method does
Tr
not change state of the LCP state machine. Instead, the state machine stays in the request
ei
sending state. In this case, the device that suspects a loop on the link needs to continuously
w
send Echo-Request packets to check whether the link loop is removed. After an Echo-
a
Request packet is received, it is considered that the link loop is removed, and the
Hu
subsequent PPP process may continue.
o n
ati
ic
rt if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu configuration parameters. By default,
The PPP protocol also provides optional authentication
e
packet, the receiver responds
C parameter option; otherwise, it responds with a Config-Nak
mode in the configuration
packet containing & the supported authentication mode. If the request sender receives a
g
in
Config-Ack packet, the authentication starts. If the request sender receives a Config-Nak
packet, itn
a i in the Config-Nak packet. If yes, the request sender responds with a new Config-
responds to the peer depending on whether it supports the authentication mode
T r
proposed
i (containing the authentication protocol proposed in the Config-Nak packet);
eotherwise,
Request
a w the request sender responds with a Config-Reject packet, and the two parties
Hu cannot pass the authentication. In this case, a PPP link cannot be set up.
PPP supports two authorization protocols: Password Authentication Protocol (PAP) and
Challenge Hand Authentication Protocol (CHAP).
Before using PAP authentication, the two devices should confirm which party is the
authenticating party and which party is the authenticated party. Actually, the two ends that
use the PPP protocol can act as both the authenticating and authenticated parties.
Generally, PAP executes authentication in only one direction. Before devices at both ends
use the PAP protocol, certain configurations must be performed on the devices. For
broadband engineers, the MA5200 is a most familiar product. By default, the MA5200
functions as the authenticating party. You can run the PAP Authentication PAP/CHAP
command to change the authentication mode. For the authenticated party, you only need
n
to set the user name and password. it o
ic a
PAP authentication is a 2-way handshake. In the link setup phase, if PAP authentication is
if
used, the authenticating party sends a Config-Request packet carrying the authentication
rt
Ce
configuration parameter option. After receiving the configuration request packet, the
&
authenticated party only needs to return a corresponding packet to the peer end according
ng
to its own situation. If the two devices at both ends use PAP bidirectional authentication,
n i
that is, the authenticated party also needs to authenticate the other party, the
i
a authentication
authenticated party needs to send a request packet containing the
r
T is used during the PPP link
i
configuration parameter options. In short, if PAP authentication
setup between two P2P devices, the authenticating partye
w
must send a Config-Request
u a
packet containing the authentication configuration parameter option with a data field set
to 0xC023.
H
When either party in a communication process n receives the Config-Ack packet from the
iofrom the link setup phase. In this case, the
a
user nameindoes not match the password, the authenticating party sends a response
T r an authentication failure to the peer. If both ends are configured as
indicating
i
eauthenticating parties, the network layer protocol phase starts only after authentication
a w succeeds in both directions. The link status changes back to link unavailable if the
n
authentication, the user name and password are directly sent to the authenticating party in
o
ti
plain text, which is not the case in CHAP authentication.
i a
c It transmits user names on the network without
f
CHAP is a 3-way handshake protocol.
passwords. Therefore, CHAPtisi more secure than PAP. Unlike PAP which requires the
g
This process is called
nparty extracts the host name, and searches the corresponding key in its
i
authenticated
a in database. Then the authenticated party generates a response packet using the
background
MD5T rencryption algorithm based on the key, packet ID, and random packet received from
i authenticating party. The authenticated party sends the response packet with its host
ethe
a w name to the authenticating party. Upon receiving the response from the authenticated
Hu party, the authenticating party extracts the user name of the authenticated party and
searches the corresponding key in the local database. Then the authenticating party
generates a result using the MD5 encryption algorithm based on the key, reserved packet
ID, and random packet. The authenticating party compares the result with response
returned by the authenticated party. If the information is consistent, the authenticating
party returns an ACK packet; otherwise, it returns a Nak packet.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The IPCP uses the same negotiation mechanismH u packet types as the LCP. Although
and
n
their working process and packets are the same, the IPCP does not invoke the LCP.
o
IP address negotiation can be performed
t i static configuration negotiation and dynamic
in
configuration negotiation modes.ca
r
2. Upona a Configure-Request packet, either party checks the IP address. If the IP
T is a valid unicast IP address and is different from the locally configured IP address
i
address
e(no IP address conflict), the current party considers that the peer can use this address and
a w
Hu responds with a Configure-Ack packet.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Huis as follows:
The procedure for negotiating a dynamic IP address
t
0.0.0.0, indicating that the IP address is
a packet, router B considers that the address (0.0.0.0)
ic
tif and responds with a Configure-Nak packet containing the
Upon receiving the Configure-Request
r
Ce
contained in the packet is invalid
new IP address 192.168.0.1.
Upon receiving the& Configure-Nak packet, router A updates the local IP address and sends
g
i n
another Configure-Request packet containing the new IP address 192.168.0.1.
aw
Hu
192.168.0.2. Router A considers that the address is valid and returns a Configure-Ack
packet.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
With the development of broadband network technologies, the applications of mainstream
n
broadband access technologies, such as xDSL, cable modem, and Ethernet, are in full swing.
o
ti
At the same time, network operators are confused. Regardless of which access technology
is used, how to effectively managea
c subscribers get profits from network investment are
fi charging becomes critical for various broadband access
t i
their primary concerns. Therefore,
r Ethernet model, there is no concept of subscriber charging.
e
technologies. In the traditional
C IP addresses to access the Internet, or cannot access the
Subscribers can either obtain
& developed the PPPoE protocol to transmit PPP data packets on the
Internet. IETF engineers
g
nnetwork device manufacturers also launch broadband access servers (BASs)
i
Ethernet (using NAS devices to terminate subscriber PPP packets). After the protocol is
n
ai own brands. These BASs support not only the termination of PPPoE data packets,
established,
with rtheir
i Talso many other protocols.
ebut
a w The PPPoE protocol provides a standard for connecting multiple hosts in a broadcast
u
n
to-one logical relationship on the broadcast network, but also prepares necessary
o
conditions for the PPPoE session, such as
i history, we will review the encapsulation
tPPPoE
the unique session ID allocated by the access
a
ic data packets are encapsulated in the data fields
concentrator. Before introducing the
i f
rt frames for transmission.
format of Ethernet frames. All PPPoE
e
(payload area) of the Ethernet
C is not strange to most network engineers. Currently, most
& 2.0 version. Therefore, EthernetII is widely used as a factual
The Ethernet frame format
g
networks use the Ethernet
n
i
industrial standard.
ei They are classified into unicast addresses, multicast addresses, and broadcast
a w
Hu addresses. Unicast and broadcast addresses are used in the PPPoE protocol. For a
data link layer protocol such as PPP, the layer 2 address communication is different
from common layer 2 communications.
The Ethernet type field is also one of the most concerned fields. It was maintained by
Xerox before 1997, and was handed over to the IEEE802 team later. Based on the
content of this field, the receiver of a data packet can identify the protocol type
carried in the data field of the Ethernet packet. The two phases of PPPoE are
distinguished by the type field of Ethernet packets. In the PPPoE discovery phase, the
Ethernet type field is set to 0x8863. In the PPPoE session phase, this field is set to
0x8864.
A data field (payload) carries the data packet indicated by the type field. All PPPoE
data packets in the PPPoE protocol are encapsulated in this field for transmission.
A verification field is used to ensure the correctness of data frame transmission at the
link layer.
Code: Indicates the PPPoE packet type. Different values indicate different PPPoE packet
ic a
if
rt
types.
Ce
PPPoE session ID: Defines a PPPoE session together with the Ethernet SMAC and DMAC.
&
Length: Indicates the payload length of a PPPoE packet, excluding the length of the
Ethernet packet header and PPPoE header.
ing
a in
Tr
ei
a w
Hu
o n
ati
ic
r t if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu session, and session termination.
The PPPoE can be divided into three phases: discovery,
When a host wants to start a PPPoE session, n it needs to perform a discovery process to
o then determine a unique PPPoE session ID. The
identify the MAC address of the peer, iand
t
aa discovery protocol based on the client/server model.
i c
if the Ethernet, the host (client) discovers all access
serve this purpose, the PPPoE uses
Due to the broadcast featuretof
concentrators (servers) ine
r
C
this process, selects one of them, and establishes a P2P
g
up, the PPPoE discovery
n session phase starts, the host and the access concentrator transmit PPP
i
a inon the PPP protocol to perform PPP negotiation and data transmission. The
After the PPPoE
rpackets transmitted in this phase must always contain the session identifier
data based
T
i
data
edetermined
a w in the discovery phase. In normal cases, the session phase is terminated by the
Hu PPP protocol. However, a PADT packet is also defined in PPPoE to terminate sessions. The
host or access concentrator can terminate a session by sending the packet at any time after
the PPP session starts.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The destination address is the broadcast address u and the source address is the
H0xffffffff,
n
Ethernet address of the host. The value of ETHER_TYPE is 0x8863, the code value is 0x09,
and the value of SESSION-ID is 0x0000.o
ti be any number of other tags. The length of a PADI
TAG_TYPE: Only one Service-Name indicates the
service requested by the host. There a
icSpace needs to be reserved for the Relay-Session-Id TAG
can
i f
rt
packet cannot exceed 1484 bytes.
field.
C e
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
The destination address is the Ethernet addressH of u
the host. The source address is the
e
Name TAGs indicating the services
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The destination address is the Ethernet addressH of u
the access concentrator, and the source
C e
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The destination address is the Ethernet addressH of u
the host, and the source address is the
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Huat any time after a session is
This packet can be sent by the host or concentrator
connection is closed. C
the session ID of the connection
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu between the host and the access
After a PPPoE session is set up, PPP data is transmitted
n
device based on the PPP protocol. Each Ethernet frame has a single address. The value of
ETHER_TYPE is 0x8864, the code value o
i PPPOE payload field contains a PPP packet.
tThe
is 0x00, and the value of SESSION-ID remains
ic
unchanged during the entire session. a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu basic network configurations before
On a TCP/IP network, each work station must perform
n
accessing the network and its resources. Key parameters to be configured include IP
address, subnet mask, default gateway,o
ti
and DNS. Additional information, such as IP
a
ficall hosts have correct configurations can be a difficult
management policies, may be required.
g
Manual configuration
n in IP host configuration may cause network communication failures.
i
time, and errors
i
centralized
edesigned
a w by the Internet Engineering Task Force (IETF) for this purpose.
The DHCP minimizes the number of errors caused by manual IP address configuration.
For example, the possibility of allocating an IP address in use to another device is
greatly reduced.
DHCP reduces network management workload.
n
release from clients or relays, and allocates IP addresses and other network configurations
o
ti
to clients.
ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hua DHCP server to obtain the IP address
DHCP client: A DHCP client exchanges packets with
C e
A client applies for an address and other configuration parameters from a server.
&
A client checks whether the original address and other configuration parameters are
g
correct after restart.
napplies to extend the lease term of the address and other configuration
i
a in from a server.
A client
T r parameters
i ACK: A server sends the address to be allocated and other configuration parameters
eDHCP
a w to a client.
Hu DHCP NAK: A server notifies a client that the requested address is invalid or has expired.
DHCP Decline: A client notifies a server that an allocated address is being used by another
device.
DHCP Inform: A client applies for local configuration parameters (after an address has been
allocated) from a server.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu server.
Discovery phase: A DHCP client searches for a DHCP
n
In the discovery phase, a DHCP client searches for a DHCP server by sending a DHCP
io of DHCP servers are unknown to the client, the
t
Discover packet. Because the IP addresses
a packet on the network. All DHCP servers that
DHCP client broadcasts the DHCPcDiscover
i
r
receive DHCP Discover packetstifsend response packets. The DHCP client can then know the
locations of DHCP serverseon the network.
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu for a DHCP client.
Offer phase: The DHCP server provides an IP address
A DHCP server that receives a DHCP Discovern packet from a DCHP client selects an
appropriate IP address from its addressio
r
address and domain name server
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
Selection phase: A DHCP client selects an IP address.
If multiple DHCP servers send DHCP Offern packets to a DHCP client, the DHCP client
ioarrives first. Then, the DHCP client broadcasts a
n
DHCP servers can g therefore reclaim their pre-allocated IP addresses.
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Confirmation phase: A DHCP server confirms that Huan IP address is allocated to a DHCP
client.
n
After receiving a DHCP Request packetio
f ic
the corresponding lease record according to the MAC address carried in the DHCP Request
C
address and other settingseto the client. After receiving the DHCP ACK packet, the DHCP
&the server. If no response is received within a specified period, the
client broadcasts a gratuitous ARP packet to detect whether another host is using the IP
g
address allocated by
nIP address.
i
client uses the
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
If a DHCP server does not find a lease record after Hureceiving a DHCP Request packet or fails
n is available. The DHCP client then needs to
to allocate an IP address due to certain reasons, the DHCP server sends a DHCP NAK packet
o
ti for a new IP address.
to notify the DHCP client that no IP address
resend the DHCP Discover packet toaapply
f c
iDHCP
r
After obtaining an IP address,t ia client checks the status of the gateway in use before
&
requests a new IP address in four-step mode.
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
When an IP address reaches 50% (T1) of the lease Huterm, the DHCP client automatically
n If a DHCP NAK packet is received, the
sends a DHCP Request packet to the DHCP server to renew the lease. If a DHCP ACK packet
o
ti
is received, the lease is renewed successfully.
a
fic (T2) of the lease term, if the DHCP client does not
application process is initiated again.
r i
When an IP address reaches t87.5%
receive any response from e
C servers to renew the IP address lease. If a DHCP ACK packet is
the DHCP server, the DHCP client automatically sends a
a indoes not receive any response from any server before its IP address lease term
T r the client stops using the IP address and sends a DHCP Discover packet to request
If a client
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Before the DHCP relay technology is implemented, Huthe DHCP protocol is applicable only
nto be deployed for each subnet, wasting
when DHCP clients and servers are in the same subnet and cannot work across network
o
ti
segments. Therefore, a DHCP server needs
resources. a
iAcDHCP relay agent serves as a relay between DHCP clients
i f
segments to share&
clients on different network
n g the same DHCP server. This mechanism saves costs and facilitates
i
centralized management.
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Upon receiving a request packet from a DHCP client
H u to a DHCP server, a DHCP relay agent
processes the packet and sends it to the specified DHCP server on another network
segment in unicast mode. The server returns
o n the configuration information to the client
through the DHCP relay agent according
ti information in the request packet. In this way,
to
dynamic configuration of the clientais complete.
f c performs DHCPv4 initialization, it broadcasts a
iand
t i
Discover packet on the localr network to search for a DHCPv4 server.
When a DHCPv4 client is started
e
C exists on the local network, the DHCPv4 client can directly obtain
If a DHCPv4 server
&from the DHCPv4 server.
an IP address
n g
i
If no DHCPv4 server exists on the local network, the DHCPv4 relay agent connected
inforwards
to the local network converts the broadcast Discover packet into a unicast packet
r a
and it to a DHCPv4 server on another network segment.
i TDHCPv4 server returns a unicast Offer packet to the DHCPv4 relay agent to confirm
ethat the DHCPv4 client can apply for an IP address. After receiving the Offer packet, the
The
a w DHCPv4 relay agent converts the unicast packet into a broadcast packet and sends it to the
Hu DHCPv4 client.
The DHCPv4 client sends a Request packet to request an IP address. After receiving the
Request packet, the DHCPv4 relay agent converts the broadcast packet into a unicast
packet and forwards it to the DHCPv4 server.
The DHCPv4 server performs the corresponding configurations according to the
information in the received Request packet, and sends the configurations to the DHCPv4
client through the DHCPv4 relay agent to complete the dynamic configuration of the
DHCPv4 client.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
A typical DHCP relay networking consists of theH u roles:
following
DHCP client: A device that dynamically obtainsn IP addresses or other network configuration
io
parameters.
a t
DHCP relay agent: A DHCP clientic
titof obtain the IP address and other network configuration
communicates with a DHCP server through the broadcast
r
parameters. If the server e
address in the local link range
C and client are on different network segments, DHCP relay is
&
required to forward packets. In this way, a DHCP server does not need to be deployed in
n g
each network segment, which reduces costs and facilitates centralized management.
i
a in A device that allocates IP addresses and other network configuration
DHCP server:
T r to DHCP clients.
parameters
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
VLAN Definition Hu
n
A virtual local area network (VLAN) is a technology that virtualizes devices in a LAN
o
ti
into different network segments logically instead of physically. The VLAN technology
ic a
if
is a basic technology widely used in various access modes and services, for example,
rt
multicast, triple play, wholesale service, and private line services.
e
C
VLAN management enables carriers to flexibly plan services.
& is mainly used for cascading. Huawei products support the Ethernet
A standard VLAN
g
u a A QinQ VLAN is used to transparently transmit private VLAN packets on the public
H network to implement layer 2 VPN.
VLAN stacking is mainly used in wholesale services of carriers.
is logically equivalent.
ic a
rt if
Ethernet ports in the same standard VLAN can communicate with each other.
e
Ethernet ports in different standard VLANs are isolated from each other.
C
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Smart VLAN Hu
n
A smart VLAN is a special VLAN. In addition to the features of a standard VLAN, a
o
ti
ic a
rt if
In a smart VLAN, ports are not equal and are classified into upstream ports and
e
service ports.
C are isolated and cannot communicate with each other.
Service ports
&
g
Upstream ports can directly communicate with each other.
n ports can directly communicate with upstream ports.
ni
ai
Service
T r In a standard VLAN, the broadcast domain of each port covers all ports in the
i
aw port covers all ports in the VLAN. The broadcast domain of a service port
Hu
covers only upstream ports in the VLAN.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
MUX VLAN Hu
n
An MUX VLAN is a VLAN that contains upstream ports and a service port.
o
ti upstream ports but only one service port.
a
An MUX VLAN can contain multiple
ic VLANs are isolated from each other.
i f
rtone access user. Therefore, MUX VLANs can be used to
Service flows of different MUX
C
Each MUX VLAN maps e
&
distinguish users.
n g
i
a in
Tr
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Common VLAN Hu
n
Common is the default attribute of a VLAN. That is, the VLAN does not have the
o
ti
QinQ or stacking attribute. A common VLAN can be used as a common layer 2 VLAN.
ic a
if
A layer 3 virtual interface can be created based on a common VLAN for layer 3
forwarding.
r t
Stacking VLAN
Ce
&
If VLAN stacking is used to increase the number of VLANs or identify users, the BRAS
ng
i
is required to implement double-tagged user authentication.
n
i
a must work in layer 2 mode and forward packets directly based on the VLAN
r
If VLAN stacking is used to provide private line wholesale services, the upper-layer
T
ei
network
and MAC address.
a w
Hu QinQ VLAN
A QinQ VLAN is used to carry private line services or accurately bind users.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Service process of a QinQ VLAN: Hu
n
Users can communicate with each other in the same private network (VLAN 10) in
o
ti
different areas through the QinQ VLAN. User service packets are processed as follows:
ic a
r tif
An HQ user of enterprise A sends an untagged packet upstream.
Ce
The ONU adds a VLAN tag (VLAN 10) of the private network to the packet (or
transparently transmits it) and sends the packet upstream to the OLT.
&
ng
The OLT adds the public VLAN tag (VLAN 200) to the packet and transmits the
ni
packet to the upper-layer network.
i
a The upper-layer network device transparently transmits the packet according to
Tr
ei
the public VLAN tag (VLAN 200).
a w After receiving the packet, the peer OLT removes the public VLAN tag (VLAN
The ONU identifies and removes (or transparently transmits) the private VLAN
tag (VLAN 10), forwards the untagged packet to the switch of the private
network which then forwards the untagged packet to a branch user of
enterprise A.
As mentioned above, the QinQ VLAN can implement the interworking between HQ
and branch users of enterprise A in VLAN 10.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Service process of a stacking VLAN: Hu
n
The OLT uses different stacking VLANs to connect users of enterprise A to ISP1 and
o
ti
ic a
r t if
A user sends an untagged packet upstream to the OLT through an ONU.
Ce
The OLT adds two VLAN tags to the untagged packet. Users of different ISPs have
different outer VLAN tags.
&
ng
For user packets from enterprise A, the service VLAN 100 is encapsulated in the
ni
outer VLAN tag, and the user VLAN 10 or 20 is encapsulated in the inner VLAN
a i
r
tag.
i T For user packets from enterprise B, the service VLAN 200 is encapsulated in the
e
aw
outer VLAN tag, and the user VLAN 10 or 20 is encapsulated in the inner VLAN
Hu
tag.
The switching MAN device forwards the packets to different ISPs according to the
outer VLAN tags.
After receiving the packets, the devices of ISP1 and ISP2 remove the outer VLAN tags
and differentiate user types in the enterprise according to the inner VLAN tags.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Basic Concepts of GPON
Hu
o n
A GPON encapsulation mode (GEM) frame is the smallest service bearing unit in the
ti
GPON technology and is the most basic encapsulation structure. All services are
a
c
encapsulated in GEM frames for transmission on the GPON line and are identified by
if i
GEM ports. Each GEM port is identified by a unique Port-ID, which is globally
rt
allocated by the OLT. That is, each ONU under the OLT cannot use GEM ports with
Ce
the same Port-IDs. A GEM port identifies a service virtual channel between the OLT
&
and the ONU, that is, the channel that carries the service flow.
ng
A T-CONT is the carrier of services in the GPON upstream direction. Each GEM port is
ni
aw
Alloc-ID.
Hu
Service multiplexing principles of the GPON system
In the upstream direction, services are first mapped to different GEM ports on the
ONU, and GEM ports are mapped to different types of T-CONTs for upstream
transmission. After receiving a data frame, the OLT decapsulates the GEM port,
extracts the user data, and forwards the data to other modules for processing. In the
downstream direction, all services are encapsulated into GEM ports and broadcast to
all ONUs connected to the GPON port. An ONU filters data according to the GEM
port ID, retains only the data intended for it, processes the data, and then forwards
the data to the user.
GPON service mapping
A GEM port is the smallest service unit in the GPON system. A GEM port can carry
one or more services. Services carried by a GEM port need to be mapped to a T-
CONT for upstream service scheduling. Each ONU supports multiple T-CONTs and
can be configured with different service types. Each T-CONT can map multiple GEM
ports or one GEM port, depending on the user configurations.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Relationship between T-CONT IDs and Alloc-IDsHu
Alloc-IDs are automatically allocatednby the system. You can manually define Alloc-
IDs by configuring T-CONT IDs. io
a t
T-CONT ID range: 0–127 ic
r t if
C e
GPBC board: Alloc-ID = T-CONT ID x 256 + ONU ID
&
GPBD board: If T-CONT ID < 8, Alloc-ID = T-CONT ID x 256 + ONU ID. If T-CONT ID ≥
g
8, the system automatically allocates the minimum idle Alloc-ID.
n
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Huto specific ONT GEM ports for upstream
Upstream data flows from user ports are mapped
n
transmission. Only one mapping mode can be configured for each ONT.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Introduction to concepts: Hu
n
In a traffic profile, you can configure the rate limit of the traffic and the processing of
o
ti
ic a
r t if
The dynamic bandwidth allocation (DBA) profile describes the traffic parameters of
e
the xPON. A DBA profile is bound to dynamically allocate the bandwidth and improve
C
the upstream bandwidth utilization.
&
In an ONT line profile, you can configure the attributes related to the ONT line, bind
ng
ni
the DBA profile to T-CONTs, configure the mapping priorities between GEM ports
a i
and the T-CONTs, and between GEM ports and service flows.
T rAn ONT service profile provides a service configuration channel for ONTs managed in
i
e OMCI mode. You need to log in to an ONT to configure services if the ONT (such as
a w the MDU) is managed by the SNMP. The number and types of ports configured for
The service flow is encapsulated into a GEM data frame, buffered in the T-CONT, and
waits for the timeslot for upstream transmission to the OLT (configured in the line
profile).
The GEM data flow is sent to the PON port of the OLT and decapsulated to obtain n
it o
the user data flow which is then forwarded to the upstream board based on the
traffic and priority policies (configured in the service port and traffic profile).
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Service forwarding example Hu
n
A user-side terminal sends an encapsulated ETH data frame to the Ethernet port of
o
ti
the ONT.
ic a
rt if
The ONT port processes the user data by priority and adds the user-side VLAN tag.
Ce
The GPON chip of the ONT encapsulates the VLAN data into a GEM frame and sends
the GEM frame to the OLT through the PON port of the ONT.
&
ng
The OLT decapsulates the GEM data frame and extracts the VLAN data frame.
i ni
The OLT switches the user VLAN tag to a service VLAN tag, and then forwards the
a
ei
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Principles: Hu
Implement flexible QinQ on the OLT.
o n
ti That is, services of the same type on the same
a
Add different outer tags for services.
ic For example, for PON port 0/2/0, the outer tag of PPPoE
i f
port use the same outer tag.
is 1000, the outer tagrtof VoIP is 2000, and the outer tag of IPTV is 2012.
e
The outer tags ofCdifferent PON ports must be different.
&
n g
The NMS VLAN is not added with an outer tag.
i
a in
Tr
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Parameter description
Hu
o n
Committed information rate (CIR): Indicates the assured information rate. This
ti
parameter is mandatory. The value must be an integer multiple of 64. If the input is
ic a
not a multiple of 64, the value is rounded down to a value which is an integer
if
multiple of 64 and no less than 64.
r t
Committed burst size (CBS): Indicates burst rate. This parameter is optional. If this
e
C
parameter is not specified, the value is obtained based on the formula min (2000 +
CIR x 32, 1024000).
&
ng
Peak information rate (PIR): Indicates the peak rate. This parameter is optional.
i ni
Peak burst size (PBS): Indicates the peak burst rate. This parameter is optional. If this
r a
parameter is not specified, the value is obtained based on the formula min (2000 +
T 32 x PIR, 10240000).
i Priority: Sets the priority keyword.
e
w
u a User-cos: Indicates the outer 802.1p priority of incoming packets. This parameter is
H
optional. If the outgoing packet priority needs to be mapped according to the outer
802.1p priority of an incoming packet, this parameter needs to be configured.
User-tos: Indicates the IP priority of packets. This parameter is optional. If the
upstream packet priority needs to be mapped according to the Type of Service (ToS)
field priority in a user packet, this parameter needs to be configured.
Priority-policy: Indicates the priority scheduling policy of packets. This parameter is
mandatory. The options include Local-Setting which indicates that packets are scheduled
according to the priorities specified in the traffic profile, and Tag-In-Package which
indicates that packets are scheduled according to the priorities carried in the packets.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
In an ONT alarm profile, you can configure a seriesHuof alarm threshold parameters to
nsends the alarm information to the log NE and
monitor the performance of an activated ONT line. If a statistical item reaches the alarm
o
ti
threshold, the system notifies the NE and
the NMS. a
icalarm threshold profiles.
i f
The Huawei product supports
e rt 50
C
The system has a default alarm threshold profile whose ID is 1. This profile cannot be
&
deleted but can be modified.
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Run the dba-profile add command to add a DBA Huprofile. By default, the system has DBA
n
profiles 0–9, which provides typical traffic parameter values. Default profiles cannot be
o
ti
added or deleted.
ic a
f
Note:
i
C
LLIDs are bound to DBA profile 9.
When you add a DBA& profile, the bandwidth must be an integral multiple of 64. If the input
g
bandwidth isnnot an integer multiple of 64, it is rounded down to an integer multiple of 64.
i ni
r a
i T
e
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Huexists, the GPON ONT line profile
If the EPON ONT line profile whose ID is 40 already
cannot be added.
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
If the EPON ONT service profile whose ID is 50 H u exists, the GPON ONT service profile
already
cannot be added.
o n
t
You can also set the capability set of thei and POTS ports to adaptive by running the
ETH
a command. The system will then automatically
i c
adapt to the actual capabilitytioff the online ONT.
ont-port eth adaptive pots adaptive
e r
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hanu ONT offline.
When pre-configuration is required, you can add
n
After the ONT goes online, you can manually confirm the ONT.
io
a t
ic
r tif
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hufor broadband services of carriers.
This is a typical double-tagged VLAN configuration
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hufor the enterprise network scenario.
This is a typical single-tagged VLAN configuration
ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Huparameters. For class B/C ONUs, the
A service profile is used for issuing OMCI protocol
n
OMCI only needs to issue IP addresses, and does not need to issue other parameters.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Huexists, the GPON ONT line profile
If the EPON ONT line profile whose ID is 40 already
cannot be added.
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
The port range command is used to configureH theumaximum and minimum logical
n
distances of a GPON port. During the ranging process, proper logical distance values can
avoid affecting normal services of othero
ti
online ONTs for too long.
a
The undo port range commandcis used to restore the ranging compensation distance of a
i fi
r t
GPON port to the default value.
Configuration notes:
C e
& distance – Minimum distance <= 20 km
GPON board: Maximum
g
a
r + Minimum distance)/2 as possible.
The actual
T
ei
distance
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
There are 3 types of ONT status: ONT running status
H u (Run state), ONT configuration status
(Config state), and ONT matching status (Match state). The Run state of an ONT indicates
the current running status of the ONT. n
t ionot passed the authentication. In this case, the ONT
are 4 states: n g status of an ONT refers to the configuration restoration of an ONT. There
eONT configurations. The duration of the Config state depends on the amount of data to be
In the
w
ic a
services are normal and locating faults.
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Reference answer: Hu
n
1. The VLAN types include Standard, Smart, and Mux, which describe the service port
o
ti
capability of a VLAN. VLAN attributes include Common, QinQ, and Stacking, which
a
ic
if
describe the VLAN tag processing feature for packets.
rt
e
2. A user service flow is mapped to a GEM port for transmission between the OLT and
C
the ONU. A GEM frame is mapped to a T-CONT in the upstream direction for
&
buffering and bandwidth scheduling.
g
n of upstream GEM buffer and bandwidth
i
3. Scheduling
n a class A ONU, you only need to change the SN on the OLT or ONU side.
4. Toireplace
a
rTo replace a class B/C ONU, you need to pre-deploy it on the NMS or manually
i T
e reconfigured it.
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu Because an NGN network is
NGN is the concept of defining and deploying networks.
n
divided into different layers and planes with open interfaces, NGN provides a platform for
service providers and carriers to evolve,o
ti
create, provide, and manage new services.
r t
e
NGN adopts the layered
NGN provides the Cmedia access layer, core switching layer, network control layer,
&
a
rconvergence.
NGN
T
Hu NGN supports multiple services, such as voice, data, and video services.
NGN has advantages in access and coverage.
NGN features low construction and maintenance costs.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Background of NGN Hu
n
The NGN system divides the switching equipment into components for call control
o
ti
and media processing using a standard protocol. The call control is pure software
ic a
if
running on a universal hardware platform, and media processing converts TDM into
rt
IP-based media streams.
e
C
The softswitch technology emerges as the core technology of NGN.
Functions of each &layer in an NGN system
g
n layer: Use various access methods to connect various to the network and
Edge iaccess
in the information format into a format that can be transmitted on the network.
a
rCore switching layer: Uses the packet technology to provide a highly reliable
convert
T
ei integrated transport platform with high QoS and large capacity.
a w
Hu Network control layer: Implements call control. The core technology of the network
control layer is softswitch, which implements basic real-time call and connection
control functions.
Service management layer: Provides additional value-added services and operation support
after call setup.
NGN protocol classification
According to the protocol functions, NGN protocols are classified into the following types:
Bearer control protocol
Ce
Call control protocol
&
Function: Controls the establishment, connection, and termination of a call.
i
ra used to establish,
Session initial protocol (SIP) is one of the framework protocols of a multimedia
T
ei
communication system. It is an application layer protocol
change, or end multimedia sessions.
a w information transmission for
ic
Function: Provides signalinga
t i f
r
Example: SIGTRAN
C e
The Signaling Transport (SIGTRAN) protocol stack bears the communication
n g
adaptation
i
a in
Tr
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Multi-Party Multimedia Working Group put forward Hu two proposals for multimedia
communication in the Internet in 1996:
n
Session Initiation Protocol (SIP) io
a t
i f
Simple Conference Invitation ic Protocol (SCIP)
rt unified in Session Initiation Protocol (SIP).
C e
At last, the two proposals are
&
SIP is a protocol that is being developed and continuously researched. On the one hand, it
g
adopts the design ideologies of other Internet standards and protocols. In style, it complies
n of simplicity, openness, compatibility, and scalability of the Internet, and
i
takes fullin
with the principles
of T r a attention to the security problems in the open and complex network environment
i
the Internet. On the other hand, it also fully considers the support of various services on
etraditional public telephone networks, including IN service and ISDN service.
a w
Hu In the SIP protocol, a session is created by using a SIP invite message with a session
description, so that the participant can perform media type negotiation through SIP
interaction. It requests the current location of a user through proxy and redirection to
support the mobility of the user. Users can also register their current locations. The SIP
protocol is independent of other conference control protocols. It is designed to be
independent of the underlying transport layer protocols. Therefore, other additional
functions can be flexibly extended.
The SIP protocol can be used to initiate a session or invite a member to join a session that
has been established in another manner.
SIP supports text encoding and decoding
SIP uses the transaction mechanism. Each request triggers an operation method in a server.
A requests and response form a transaction. The transactions are independent of each
other.
SIP is independent of the underlying transport protocols. It is carried on the IP network. The
network layer protocol is IP. The transport layer protocol can be TCP or UDP. UDP is
n
recommended.
if ic
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
o n
ati
ic
r t if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Redirection server Hu
n
The redirection server does not receive or reject calls. It implements the routing
o
ti
function and cooperates with the registration process to support the mobility of SIP
ic a
if
terminals.
g
A service that is used by the SIP redirection server or proxy server to obtain the
nof the callee.
i
in
location
r a
User agent
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hasuthe redirection server, proxy server, and
In the Huawei solution, the SoftX3000 functions
Registrar.
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu for each subscriber. The message
The SIP AG sends a Register message to the SoftX3000
contains information such as the user ID.
o n
t i SoftX3000 checks whether the subscriber is
After receiving the Register message, the
a the SoftX3000 returns a 200 message to the SIP AG.
ic
tif
configured on the SoftX3000. If yes,
r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
1: SIP_A picks up the phone and sends an INVITE u to the SoftX3000, requesting
Hmessage
nport number 8766, payload type, and payload
the SoftX3000 to invite SIP_B to join the session. In addition, SIP_A sends the information
o
ti
such as the IP address 191.169.150.101,
type code to the SoftX3000.
c a
iTrying
t i f
r
2: The SoftX3000 returns a 100
e processed.
response to SIP_A, indicating that the request has
C
been received and is being
&
3: The SoftX3000 sends a 407 Proxy Authentication Required message to SIP_A, indicating
n g
that the SoftX3000 needs to authenticate the SIP A. The Proxy-Authenticate field in the
i
in supported by the SoftX3000. The nonce for the authentication is generated,
message carries the authentication mode Digest and the SoftX3000 domain name
a
r
huawei.com
andTthe parameters are sent to SIP A in the response message for subscriber authentication.
e4:i SIP_A sends an ACK message to the SoftX3000, indicating that the final response to the
a
w
Hu INVITE request has been received from the SoftX3000.
5: SIP_A sends an INVITE message to the SoftX3000 again. The message carries the Proxy-
Authorization field and contains the subscriber ID (phone number) of the authentication
mode DIGEST and SIP_A, domain name of the SoftX3000, NONCE, URI, and RESPONSE.
After receiving the 407 response, SIP_A uses a specific algorithm to generate the encrypted
RESPONSE based on the information returned by the server and subscriber configurations.
6: The SoftX3000 sends a 100 Trying message to SIP_A, indicating that the request has
been received and is being processed.
7: The SoftX3000 sends an INVITE message to SIP_B to request SIP_B to join the session.
The INVITE request message carries the session description of the SIP_A.
8: The SoftX3000 sends a 100 Trying message to SIP_A, indicating that the request has
been received and is being processed.
i
has been successfully processed. The response also contains the session description of the
SIP_B.
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu indicating that the final response to
13: SIP_A sends an ACK message to the SoftX3000,
n
the INVITE request has been received from the SoftX3000.
o
t
14: The SoftX3000 sends an ACK messagei to SIP_B, indicating that the final response to
a SIP_B.
ic
tifa BYE message to the SoftX3000 to request the termination
the INVITE request has been received
r
Ce
15: SIP_A hangs up and sends
of the session.
16: The SoftX3000& returns a 200 OK response to SIP_A, indicating that the session ends.
g
a
r hangs up and returns a 200 OK response to the SoftX3000, indicating that the
successfully.
18:T
i is ended successfully.
SIP_B
esession
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Configuring a line profile Hu
n
Create a GPON ONT line profile with index 91 and bind T-CONT 1 to DBA profile 2.
o
ticarry Ethernet service flows, and bind GEM port 1 to
&
Configuring a service profile
A serviceg
in
HG8245
a
T rMap the VLAN 172 service flow to iphost port which is used by the ONT to process
ei voice services.
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Adding an ONT Hu
n
Connect the ONT whose ID is 1 and serial number is 323031312E396A41 to GPON
o
ti
port 0/3/0. Set the management mode to OMCI. Bind the ONT to the line and service
ic a
if
profiles whose IDs are both 91.
Set the VLAN ID to 172 and VLAN type n to Smart. Add upstream port 0/19/0 to VLAN
io
172.
a t
ic
Creating a service flow
r t if
Ce
Set the service VLAN ID to 172, GEM Port ID to 1, and subscriber-side VLAN ID to
172.
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Enable the ARP proxy function. Hu
n
For different subscribers in the same service VLAN, the service ports in the smart
o
ti
VLAN are isolated from each other. As a result, voice media streams cannot be
ic a
if
exchanged normally, and the ARP proxy function of the OLT must be enabled.
rt
e
ARP proxy must be enabled globally and in interface mode.
C
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu The signaling is communicated with
In an NGN network, control and bearing are separated.
n
the softswitch through a route. The signaling is reachable. The subscriber can obtain the
o
ti
dial tone and ring.
i a
c bearer network. Because the smart VLAN is isolated at
f
The voice is transmitted through the
tiVLAN cannot learn the MAC address of each other. As a
r
L2, different ports in the same
result, the voice betweenesubscribers cannot be transmitted directly, and the subscriber
Cafter hearing ringing cannot hear the voice of the other party.
&
who picks up the phone
Enable the ARPgproxy so that subscribers in the same VLAN can learn the MAC address of
ic
Set Service Type to VOIP.
r t if
C e
Set WAN Mode to Route WAN.
&
Set VLAN ID to 172.
n g
Set IP Acquisition Mode to Static, and input the IP address, subnet mask and
i
i n gateway.
default
a
Click rApply.
i T
e
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Create a new WAN interface for voice service. Hu
Click the Voice tab and then choose the VoIP n Basic Configuration from the navigation
io
tree.
t
athe parameters of the SIP-based voice interface as
ic
tif
In the pane on the right, configure
follows: r
e below Primary Server to 200.200.200.200.
Set Proxy ServerCAddress
&
n g
The default value of the Server Port is 5061.
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Set Region to China. Hu
n
Set Signaling Port and Media Port to 2_VOIP_R_VID_172.
o
ti
Click Apply.
ic a
r t if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
In the User Basic Parameters area, configure H theuparameters of voice user 1 as follows:
a
Select Enable User to enable the
ic and the Password.
i f
rtto 1.
Set the Register User Name
C e
Set Associated POTS
Click Apply. &
g
n the parameters of voice user 2 as follows:
i
Then configure
inPublic User Name to 7727002.
r a
Set
T
ei Set the Register User Name and the Password.
Select Enable User to enable the voice user configuration.
a w
u
Click Apply.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu from the navigation tree.
Click the Status tab and then choose the Information
In the right pane, click Restart VoIP.
o n
Wait a moment. Then the UsertStatusi becomes Up.
ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Command description Hu
n
Add GEM port 0 to carry management traffic flows and GEM port 2 to carry voice
o
ti
service flows.
ic a
rt if
Map the management service flows (subscriber-side VLAN 4000) to GEM port 0, and
e
map the voice service flows (subscriber-side VLAN 172) to GEM port 2.
C
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Command description Hu
n
Set the management VLAN to 4000, add an upstream port to VLAN 4000, and set
o
ti
ic a
rt if
Create an in-band service channel, set the management VLAN to 4000, set the GEM
e
Port ID to 0, and set the subscriber-side VLAN to 4000.
C
Set the static management IP address of ONU 2 to 172.16.240.2/16, set the gateway
& and set the management VLAN to 4000.
to 172.16.246.140,
n g
i
a in
Tr
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Command description Hu
n
Create a service VLAN and configure its upstream port. Set the service VLAN ID to
o
ti
172, VLAN type to smart, and add the upstream port 0/19/0 to VLAN 172.
ic a
rtif
Create a service flow. Set the service VLAN ID to 172, GEM Port ID to 2, and
e
subscriber-side VLAN to 172.
C VLAN (172) of the OLT must be the same as the upstream service
The subscriber-side
VLAN of the&
ONU.
n g
i
a in
T r
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The upstream service VLAN (172) of the ONU must Hube the same as the downstream
subscriber-side VLAN of the OLT.
o n
Note:
a ti
i f
You can configure attributes ic of an MG interface only when the media/signaling IP
t already exist in the corresponding address pool.
networking planning.
n g
After iconfiguring
n
the IP address and static route of the VLAN interface, you can run
i
r a Normally, you can receive the ICMP response messages from the MGC and no
the ping command to check the connectivity between the VLAN interface and the
i T MGC.
e packet is lost during a long-period ping operation. If the ping operation fails, check
a w the link between the MA5620 and the gateway and between the gateway and the
Hu MGC.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
For example, when the SIP protocol is used, theH IPu
address of the SIP terminal is
n
17.1.1.200/8, the gateway is address 17.0.0.1, the subscriber number and subscriber name
o
ti
are 7727082.
ic a
f
Note:
i
i n add: The mgid of a subscriber must be unique on the same SIP interface.
in
#sippstnuser
r a
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
This command is used to configure the authentication data of a single account of a
interfaces that support the SIP protocol in ascending order by SIP interface ID.
ic a
if
Interface attributes not configured are displayed as "-".
rt
C e
If no SIP interface is configured in the system, no information is displayed.
&
You can view information such as state, signaling IP/port, and proxy IP/port/domain
name.
g
nattribute
i
a in
display if-sip
T rThis command is used to query the attributes of a specified SIP interface, including
ei mandatory
and optional attributes. When you need to query the attributes of a SIP
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
F/S/P: Indicates the subrack ID, slot ID, and portHIDuof a port.
PTPSrvState: Indicates the running status ofn the physical layer of a port. The possible query
io (2) PowerDeny: low power; and (3) Fault: A fault
t
results are as follows: (1) Normal: normal;
a
ic
tif layer management status of a port. The possible query
occurs.
i T (1) Idle, (2) Offhook; (3) Locked; (4) Ringing; (5) Fault; and (6) – (indicating that no
CTPSrvState:
esubscriber is configured).
follows:
a w
Hu CTPAdmState: Indicates the service management status of a port. The possible query results
are as follows: (1) LBlock: local blocking; (2) RBlock: remote blocking; (3) StartSvc: starting
Services; and (4) -: no subscriber is configured.
Shutdown
ic a
undo interface h248
r t if
Ce
undo ip address {media | signaling}
&
undo port vlan
g
i n
undo vlan
in on the OLT side
r a
Commands
T
ei undo interface vlanif
undo ip address
a w
u
H undo service-port
ic a
rt if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
ORL: Return loss Hu
n
Insert the optical fiber connector into the optical fiber adapter. The precision is divided into
o
ti
ic a
r t if
An APC connector cannot be interconnected with a PC/UPC connector. APC connectors are
e
mainly used for CATV services.
C
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
PLC: Planar waveguide optical splitter Hu
FBT: Fused tapered optical splitter
o n
The production techniques of the twotitypes of optical splitters are different. For details, see
ic a
tif
the related documents.
r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
In optical fiber systems, an optical power meterHis u
a most basic tool frequently used to
e
transmission quality of the optical
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
A stable light source refers to a light source with u output optical power, wavelength,
Hstable
nan optical power meter to measure the optical
and spectral width. A stable light source transmits light with known power and wavelength
o
i optical fiber system, the transceiver of the
texisting
in an optical system. It used together with
a
ic source. If the transceiver cannot work or there is no
loss of an optical fiber system. For an
system may be used as a stableflight
i
rtlight source is required. The wavelength of the stable light
source should be as close
e
transceiver, a separate stable
C to the wavelength of the system transceiver as possible. After a
system is installed,&the end-to-end loss often needs to be measured to determine whether
n g
i
the connection loss meets the design requirements.
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
OTDR: Optical Time Domain ReflectometerHu
o n
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu an optical fiber recognition
During maintenance, installation, cabling, and restoration,
e
one end to recognize a fiber
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hulight source, a visible light detection pen,
A red light pen is also called a light pen, a pen red
r a
(USM)
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Huof the TCP/IP network. It is the carrier
The SNMP protocol is an application layer protocol
ic
transport layer protocols such as UDP.a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The SNMP protocol exchanges signaling between Huthe network management workstation
and agents.
o n
The network management system
t i (NMS) is the network management software
a A network administrator performs operations on
ic
tif packets to the managed devices to monitor and
running on the NMS workstation.
r
the NMS, and sends request
configure network e
C
devices.
&
The Agent is a proxy process running on a managed device. After receiving a request
from theg
n of the Agent include collecting the device status, responding to
NMS, the managed device responds to the request through the Agent. The
main ifunctions
a in operation requests from the NMS, and sending alarm information to the NMS
T rremote
ei Astatus
management information base (MIB) is a virtual database which contains a device
Hu device status information by searching the MIB. The MIB organizes managed devices
according to the hierarchical tree structure and describes the devices in the ASN.1
format.
If a module status of a managed device is abnormal, the Agent sends a trap message
to the NMS to notify the NMS of the fault. This helps network administrators handle
network problems in a timely manner.
n
maintained on a managed device. Each Agent maintains such a MIB. The NMS can read or
set the values of objects in the MIB. o
a ti
A MIB is a set of managed objects.
f ic It defines a series of attributes of managed objects,
ti
including:
r
Name of an object e
C
Object access&permission
g
n of an object
Data itype
in
r a
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu managed objects. It defines the
The SMI defines a set of rules for naming and defining
n
types of data that can be used by MIBs, such as Conter and Gauge. It enables talk between
o
ti
SNMP objects.
ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu which are used for the interaction
SNMPv1 defines 5 PDUs (also called SNMP packets),
between the NMS and agents.
o n
a ti
The operations of various packets are as follows:
i f
get-request: Extracts one or icmore parameter values from an agent process.
rt the next parameter value that follows the current
parameter valueC
e
get-next-request: Extracts
from an agent process.
&
g
set-request: Sets one or more parameter values of an agent process.
n Returns one or more parameter values. This operation is triggered by
i
T ran
ei Trap:
The agent process sends a trap packet to notify the management process that
Inform: A managed device sends an alarm to the NMS. The NMS replies with an
Inform response message to acknowledge the receipt.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The SNMP versions include SNMPv1, SNMPv2c,H andu SNMPv3.
SNMPv1 and SNMPv2c use community name-based n authentication. The NMS controls the
io name list. An agent does not check
t
device access permission based on a community
a community name. In addition, SNMP messages are
ic
tif Therefore, the authentication and privacy protection
whether a sender uses an authorized
r
not encrypted before transmission.
measures are inadequate.e
C
&
Based on SNMPv1, SNMPv2c enhances the following functions: Supports more operations,
supports more g
transmissionin
data types, provides richer error processing codes, and supports multiple
i n protocols.
r a security is mainly reflected in data security and access control.
i T
SNMPv3
e SNMPv3 provides message-level data security, including data integrity check, data
w
H SNMPv3 access control is a security check based on protocol operations and controls
access to managed objects.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Network development and O&M management:Hu
n
The trend of the All IP architecture drives vertical networks that are divided by
io to a flat horizontal network.
t
technologies and services to transfer
a convergence (FMC) comes from improving user
ic
tif and improving efficiency.
The driving force of the fixed-mobile
experience, reducingrOPEX,
Ce brings O&M management convergence.
Network convergence
&
g
To meet the future network development trend, the U2000 implements the all-IP and FMC
nsolution to centrally manage the bearer and access devices.
i
inU2000 integrates not only the management of devices in multiple domains, but
management
a
ralso the management of the NE layer and the network layer, breaking the
The
T
The U2000 integrates multiple domains, reducing O&M costs and improving network
values.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu system of Huawei. It is the main
The U2000 is positioned as the equipment management
n layers.
product and solution of Huawei for future network management. It provides powerful
o
ti
management functions at the NE and network
ic a
i f
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
TMN: telecommunication management network u
H
aw
Hu
T2100. The main functions include: coordinating and controlling the activities of all
NEs from the perspective of the entire network; provisioning, modifying, or
terminating network services; and interacting with the upper service management
layer in terms of network performance and availability.
Service management layer: Provides complete service operation management,
including service leasing, broadband wholesale, and VPN.
Transaction management layer: Implements transaction related functions, analyzes
development trends such as quality issues, and provides accounting basics and other
financial reports.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The U2000 is located between the NE management Hu layer and network management layer
n
in the TMN structure. It has all NE- and network-level functions.
o
t i
The U2000 is a typical solution that converges network management applications.
amanagement platform for access, transport, and IP
ic
n g
domain-based management to separately manage different domains and avoid
i
in
interference between different departments.
a
T r U2000 adapts to the network convergence trend and provides management
The
ei solutions
a w convenient service provisioning, quick and efficient service monitoring and service
Hu assurance, creating excellent user experience and saving network O&M costs
The unified northbound interface reduces a large amount of OSS integration work.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Unified ports/abundant northbound interfaces: u
H
ti
standards, and various types of NBIs
requirements.
a
ic E2E service management
Unified network management and
t i f
The U2000 managesrtransport,
e access, and IP devices in a unified manner, provides
C capabilities, supports management of third-party routers,
E2E service management
&
and supports ICMP and SNMP protocols.
n g
The following operating systems are supported:
i
ei systems.
a w Industry-leading scalable network management architecture:
u
H The U2000 uses the client/server (C/S) structure that is mature and widely used. It
supports distributed and hierarchical database systems, service processing systems,
and client application systems. It adopts a scalable modular architecture and can be
split and co-deployed to meet the management requirements of complex and large-
scale networks.
User-friendly GUI:
Provides a unified GUI for alarms, topology, performance, security, and configuration
management. In addition, it provides user-friendly error messages, indicating the
cause of an error and the method of rectifying the fault.
Visualized management
Cross-domain E2E service provisioning
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu long-distance, and high-bandwidth
The FTTx access network solution is a large-capacity,
e rt
The FTTx access network solution
C (FTTO), fiber to the mobile base station (FTTM), fiber to the door
services, meeting the fiber to the curb (FTTC), fiber to the building (FTTB), fiber to the home
g
(Fiber To The Door),
n
i
wholesale networking requirements.
T r
The figure
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
In the FTTx access NMS networking application,H u U2000 provides the 3 functions:
the
n
network deployment, service provisioning, and network maintenance.
o
Network deployment:
a ti
Fast deployment of ONUs:ic
i f Supports automatic ONU deployment and remote
rt based on the ONU plug-and-play policy.
e
software commissioning
on Excel sheets
g
nsite visits are not required, and results are automatically reported, reducing
Manual
i
a in costs.
O&M
aw
Hu
Batch provisioning of forms
network.
ic a
rt if
The eSight provides open interfaces that can be integrated to support unified
e
management of Huawei servers, storage devices, virtualization devices, switches,
C
routers, WLAN devices, firewalls, PON devices, eLTE devices, unified communications
&
devices, telepresence devices, video surveillance devices, application systems, and
ng
equipment room facilities. It is also pre-integrated with capabilities for managing
i ni
devices from mainstream third parties, such as HP, Cisco, and H3C.
r a
i T
The componentized architecture can be used to construct an enterprise O&M platform as
e
required.
Hu
the unified eSight management platform. Customers can select components based
on site requirements.
Lightweight and web-based structure reduces system maintenance and upgrade costs.
The eSight uses the B/S architecture. Clients do not need to install any plug-ins and
can access the eSight anytime anywhere. During system upgrade or maintenance,
you only need to update the server software, reducing the system maintenance and
upgrade costs.
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Main functions: Hu
n
Service deployment: ONUs support plug-and-play, simplifying engineering
o
ti
deployment.
ic a
if
Resource management: Manages device resources such as OLTs, ONUs, and optical
rt
e
splitters.
C Monitors the device status and GPON fault.
Network monitoring:
&
g
Batch upgrade: Upgrade the OLT/MxU/ONT and install the OLT/MxU patches.
n after replacement: Faulty ONUs can be replaced and the device version can
i
a inupgraded.
Workable
T rbe
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
In a GPON network, a large number of ONUs need Huto be deployed. The eSight PON
n
supports the ONU plug-and-play function. That is, after the OLT is deployed, the PON
terminal devices (including the MxU andoONT) can be deployed on the network. A network
a ti the software on the installation site. After a
ic can be configured according to the preset plug-and-
administrator does not need to commission
i f
rt
PON terminal is powered on, services
e
play policy, improving the deployment efficiency.
Network planning: C
&
Plan the g
VLAN,in
device location, upstream interface, management IP address, management
i T
Pre-deployment:
u a Set the parameters related to the OLT and associate the ONU plug-and-play policy.
H Install and power on a remote device.
After an ONU is installed and powered on onsite, the ONU automatically sends a go-
online notification to the OLT. The eSight verifies the device and selects deployment
configurations based on the pre-deployment policy, and delivers the pre-deployment
configurations to the ONU through the OMCI channel. After the configurations take
effect, services are automatically enabled.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
H
The eSight PON resource management function centrally u manages PON device resources on
the entire network, including optical splitter resource management, OLT resource
management, and ONU resource management.
o n Key service data is displayed in a
centralized manner to show the network
t i quality in real time.
ic a
if by the system in a resource table. The OLT basic
OLT resource management
Provides a list of OLTs tmanaged
r
information can beeviewed and filtered.
C
& by name, and view detailed information.
Allows users to synchronize and jump to the physical topology, switch to the OLT
g
device manager
nmanagement
i
in a list of ONUs managed by the system in a resource table. The basic ONU
ONU resource
a
rinformation can be viewed and filtered.
Provides
T
ei Allows users to move ONUs, replace ONUs, modify ONU aliases, set polling
aw
parameters, jump to an ONU manager by the ONU name, and view detailed
Hu
information.
Optical splitter resource management
Provides a list of optical splitters managed by the system in a resource table. The
basic optical splitter information can be viewed and filtered.
Allows users to add, move, modify, and delete optical splitters, and import optical
splitters in batches.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
More abundant KPIs are provided, making the objectHu manager a 360-degree view of
network maintenance.
o n
PON electronic label
a ti
i f ic electronic labels in a resource table and supports the
Displays the list of PON device
rt
e
export function.
g
Allows users to view, upload, modify, and delete device software versions.
ndevice software upgrade tasks based on the selected upgrade options and
i
Hu Backs up the running configuration files of the devices in tasks by day, week, or
month at a specified time.
Backs up the configuration of a specified device, or restores the configuration files of
a selected device.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
GPON network monitoring helps quick fault locating.
n
Lists and displays the OLTs, ONUs, and
o mode.
optical splitters in a centralized manner. Users
can obtain device information inione-stop
t
a in a centralized manner. Users can analyze and
ic
tifand quickly locate the node where a fault has occurred
Displays device alarm information
r
based on the alarmename, alarm source, and location information.
determine the fault type
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Monitoring the upstream port of the OLT
Hu
o n
Monitors the status of the link between the OLT and upstream devices, the
ti
transmit/receive packet loss rate of the OLT upstream port, and the broadband usage.
Monitoring the OLT
ic a
r tif caused
Generally, the OLT is located in an equipment room and less likely to become faulty.
e
An OLT fault is commonly by a board fault which is directly reflected on the
Cadvised to monitor the status of the interfaces.
interface. You are
Monitoring the line&between an ONU and the OLT
g is a common cause of faults on a GPON network. You are advised to
i
The linenprofile
n the status of each monitoring point and take preventive measures accordingly.
i
check
a the ONU
r
T Common faults of an ONU are caused by power failures and board faults. Power
Monitoring
i
e failures can be monitored by the ONU status. Board faults are directly reflected on
a w
Hu the ONU user network interfaces (UNIs).
Monitoring ONU UNI
Faults in customer terminals account for 50% of the entire GPON network faults, but
eSight cannot directly monitor the status of terminal devices. The communication
status between a client terminal and the ONU can be indirectly monitored by the
status of the ONU UNI.
The eSight checks the ONU UNI status using the ONU NE explorer or ONU topology.
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Manually upgrading communication devices to H theusame version in batches
ic a
r t if
wizard. The eSight supports immediate upgrade and scheduled upgrade.
Ce of the devices.
Monitor and manage the entire device upgrade process to view the upgrade progress,
structure, and version
&
n g
Query the detailed history records of the device upgrade.
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Fast network recovery: Hu
n
Devices can be upgraded remotely in batches. As many as 300 ONTs can be
o
ti
ic a
rt if
If an ONU needs to be replaced, the MxU configuration file can be backed up in
e
advance so that the new device inherits the configuration data of the original device.
C
In this way, the network can be quickly restored to meet service requirements.
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
u have been pre-installed with an
Pre-installation scheme: The servers delivered byHHuawei
operating system and the eSight system.
o n
t i
New installation scheme: If a server is purchased from another vendor or the eSight system
ainstallation process shown in the figure.
ic
tif
needs to be reinstalled, refer to the
r
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Recommended operating system and database H u for the server installation
versions
environment:
o n
Configuration 1: Windows Server
t i R2 Standard (64-bit) (Chinese simplified or
2008
a 2012 R1 Standard (64-bit) (Chinese simplified or
ic
tif5.5 (included in the standard NMS software package)
English version), Windows Server
r
English version) + MySql
e 2008 R2-Standard Edition
C
/Microsoft SQL Server
&
Configuration 2: Novell SuSE LINUX Enterprise Server-Multi-language version -
g
n Edition 11g R2
Enterprise version -11.0 SP3 (Chinese simplified or English version) + Oracle Database
i
in
Standard
a
T r Configuration 2 is recommended if there are more than 20,000 management
Note:
ei nodes.
a w There is no special operating system requirement on the client installation environment. The
u
ic a
Consists of letters (case sensitive),
a letter.
i f
e rt
Contains 2 to 24 characters
C
&
eSight server IP address:
Static IP g
a ineSight supports IPv4, IPv6, and IPv4/IPv6 dual stacks. Plan the IP address based
The
ron the actual networking.
T
ei The server can communicate with the managed devices properly.
w
ic
tif
following special characters:
r
Cecontain 8 to 32 characters.
~@#^*()-_+|[{}];,/?
g
After installing the SQL Server 2012 database, you can check whether the installation is
nviewing the information in the SQL Server Configuration Manager.
n
successful byi
a iaddition,
r In you need to make network configurations for the SQL Server. Otherwise,
T the eSight cannot access the database.
e i
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu to start the installation program. In
Double-click setup in the installation package directory
r
installation requirements. If the
requirements, the systemedisplays a message. After the fault is rectified, reinstall the eSight.
C
&
Once the installation language is selected, the language cannot be changed after the
n g
installation is complete. You can only reinstall the eSight to change the language.
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Ensure that the eSight software installation pathHisu empty. Otherwise, eSight cannot be
installed.
o n
t i the system asks you whether to create a directory.
If the installation directory does not exist,
acreates the directory.
ic
tif
Click Yes. The system automatically
e r
Installation parameter settings:
IP address type: Cindicates IP address type of the eSight server. The eSight supports
& IP dual-stack. Select a proper type based on network planning.
a
rcommunicate with external entities from the drop-down list box.
multiple
T
ei Port: The default port number is 8080. If the port number is occupied, change it to
aw
Hu
another port number.
Installation path: Indicates the eSight installation path. You can manually change the
path, for example, E:\eSight. The default value is D:\eSight. The eSight software
cannot be installed in the root directory.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hisuinstalled for the first time, enter the user
If the database type is SQL Server and the eSight
name sa and password Changeme123.
n
Database server parameter settings: io
a t
i f ic user name is sa, which is the default administrator
Administrator Name: The default
rt database and has the highest permission on the database.
e
account of the SQL Server
C
You can set a user with the same rights as the sa user if necessary.
&Password: The default value is Changeme123. If the database
Administrator
g
i n is different from the default password, enter the password of the database
password
a in
administrator.
T rDatabase Port: The default port is 1433. If the database port number is different
ei from the default port number, enter the database port number manually.
a w
Hu SID: Indicates the database instance name. The default value is MSSQLSERVER. If
the actual database instance name is different from the default value, enter the
actual database instance name.
NMS User Password: The default password of the database NMS user is
Changeme_123.
Data file directory: indicates the path for storing data files. The default path is
D:\eSightData. You can change the path manually. If the specified directory does not
exist, the system asks you whether to create a directory. Click Yes. The system
automatically creates the directory.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
In the Select Software Components To Be Installed Hu dialog box, select the components
to be installed and click Next.
o n
t i
The functions of the components are controlled by licenses. If a license is not purchased,
abe used after the installation. Different licenses enable
ic
tif
the corresponding function cannot
different components.
r
e Package are mandatory and dimmed by default. Select to
C
The components under Basic
&
install components under Business Management Component according to the actual
situation.
n g
i
a
The eSightin supports incremental component installation. That is, if a component is not
T r during the first installation of the eSight, you can continue to install the
installed
i
ecomponent when installing the eSight for the second time. Ensure that the version number
a w of the installation package during incremental installation is the same as that of the eSight.
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
On the Summary page, confirm the installationH u and click Next. If the installation
settings
n
setting is incorrect, click Previous to set the installation parameters again.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hutakes about 15 minutes. After the
The system starts to install eSight. The installation
n
installation is complete, click Finish in the Installation Completed dialog box.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hunot select Start eSight Server by
After the installation is complete, the system does
n
default. To start the eSight server immediately, select Start eSight Server and click Finish.
o
a ti
i f ic
e rt
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
To start the eSight server, perform the following u
Hsteps:
n
Double-click the eSight Console shortcut icon on the desktop and click Start to start
io
successfully started.
If the eSightin
g
n
server needs to be automatically started when the operating system restarts,
i
r a
perform the following steps: On the main menu, choose Settings > Automatic Startup.
i T
e
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Log in to the eSight from a client browser and check Hu whether the eSight version and
functions are normal.
o n
Open a browser, enter http://eSight
t i server IP address:port number in the address box,
a
ic
if is 10.175.197.60, and the default eSight port
and press Enter.
r taddress
number is 8080. e
In this example, the IP
C
If the server& has multiple IP addresses, enter the IP address selected during eSight
g
software
i n installation. Otherwise, you cannot log in to the eSight.
If ain
Hu
security certificate cannot be installed.
The Windows Internet Explorer 11, Firefox 45 ESR, and Chrome 52 browsers are
recommended.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
If Firefox browser displays a message indicatingH u the security certificate is incorrect, the
that
possible causes are as follows:
o n
t
The security certificate is incorrecti the eSight security certificate is not installed.
or
a
ic
tif
Install a valid security certificate.
r
Cea certificate issued by a CA to eSight.
Handling method:
Method 1: Deploy
&
g
Method 2: Set the eSight built-in certificate as a browser trusted certificate.
inadvised to use method 1 to deploy the certificate issued by a CA to eSight.
Younare
a i 2 may not take effect in some scenarios due to browser version differences.
T r Method
eIntoi the preceding figure, if a security certificate error occurs in the Firefox browser, you need
a w set the browser trust certificate. On the page that is displayed, click Add Exception. On
Hu the Add Security Exception page that is displayed, click Get Certificate to obtain the
certificate, and then click Confirm Security Exception to confirm the security certificate.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Huthe password as prompted. For example,
After logging in to eSight for the first time, change
i a
c the correct user name and password.
f
When logging in to the eSight, enter
ti to log in to the eSight and enters incorrect passwords for 5
r
Ce 10 minutes, the login IP address is locked for 10 minutes.
If an admin user attempts
consecutive times within
If a common& user attempts to log into the system and enters incorrect passwords for
g
i
a numbern of times reaching the account restriction conditions, the account is locked
forin
a
30 minutes by default.
T rA user can log in to the system again after the lockout duration expires. A common
ei user can also contact the administrator to unlock the account and then log in to the
a w system again.
Hu If a password is about to expire, the eSight prompts you to change the password within
the validity period.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hu
Main menu: Displays main entries for eSight functions.
n
Alarm indicator area: Displays the total number of alarms, uncleared critical alarms,
ioalarms, uncleared warning alarms, and cleared
t
uncleared major alarms, uncleared minor
a
ic
tif the following common eSight information from left to
alarms from left to right.
i
feature enablesn users to detect and handle abnormal device status in a timely manner and
a in device running.
ensure normal
T rThe portlet displays the device status and network-wide status in a list, curve chart,
ei or bar chart in each area on the home page.
a w
Hu Statistics area: Displays device status and service statistics based on the customized status,
including top N average CPU usage, top N average memory usage, and so on.
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Huand select a specific function from the
Navigation tree on the left: Access the main menu
n
navigation tree to access the operation page of the function.
o
t i operations on the eSight.
Page: This area is used to perform specific
a
ic
r tif
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Choose Start > All Programs > eSight > eSight HuConsole. In the dialog box that is
displayed, click Stop.
o n
t
When the system displays a message i indicating that the status of each process is
a eSight system succeeded is displayed, the
ic
services are stopped. tif
stopped and the message stopping
e r
C
Choose Start > All Programs > eSight > Uninstall eSight to start the uninstallation
program.
&
In the n g
i displayed eSight uninstallation wizard, click Next.
n displayed Confirm dialog box, click Yes.
In ithe
a
rThe system starts uninstalling the eSight. The uninstallation takes about 10 minutes.
T
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
inu
After the uninstallation is complete, click FinishH the Uninstall Completed dialog box.
In the displayed Confirm dialog box, clicknYes to restart the operating system.
io
a t
ic
r tif
Ce
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
Hudeployment, hierarchical deployment,
The eSight deployment modes include single server
and integration with the OSS system.
n
The eSight Infrastructure Managementio
a in server.
system
T rThe single-server system deployment solution applies to scenarios where the network
ei scale is small and reliability requirements are not high.
a w
Hu
n
it o
ic a
if
rt
Ce
&
ing
a in
Tr
ei
a w
The eSight supports hierarchical management to u branch network monitoring
Hmeet
requirements of enterprise headquarters.
o n
t
In hierarchical deployment mode, a user i add lower-layer NMSs to the upper-layer NMS.
can
a
f ic
The system provides links to the lower-layer NMSs. When a user clicks a lower-layer NMS
link, a new browser windowtisi displayed, showing the home page of the lower-layer NMS.
e r
C
&
n g
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Operation support system (OSS) is the networkH u
management software running on the
i a
c the OSS are as follows:
f
The advantages of integration with
ti
n g
Meet the requirements of the enterprise O&M.
i
a in
T r
ei
a w
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Answers: Hu
1. Yes
o n
ti
2. C
ic a
rt if
Ce
&
ng
i ni
r a
i T
e
aw
Hu
n
it o
ic a
if
rt
Ce
&
i ng
a in
Tr
ei
a w
Hu
o n
ati
ic
rt if
Ce
&
ng
i ni
ra
i T
e
aw
Hu
Recommendations
Huawei Learning Website
http://learning.huawei.com/en
Huawei e-Learning
http://support.huawei.com/learning/NavigationAction!createNavi?navId=MW
000001_term1000025144&lang=en
Huawei Certification
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_31
&lang=en
Find Training
http://support.huawei.com/learning/NavigationAction!createNavi?navId=_trai
ningsearch&lang=en
More Information
Huawei learning APP