HCNA-Transmission Training Material

May 4, 2017 | Author: Dung Phan Van | Category: N/A
Share Embed Donate


Short Description

HCNA-Transmission Training Material for Huawei Certificate...

Description

The privilege of HCNA/HCNP/HCIE: With any Huawei Career Certification, you have the privilege on http://learning.huawei.com/en to enjoy: 

1、e-Learning Courses: Logon http://learning.huawei.com/en and enter Huawei Training/e-Learning 

i e aw



If you have the HCIE certificate: You can access all the e-Learning courses which marked for HCIE Certification Users.



Methods to get the HCIE e-Learning privilege : Please associate HCIE certificate information with your Huawei account, and

hu . g

email the account to [email protected] to apply for HCIE e-Learning privilege.

n i rn a le

2、 Training Material Download 

Content: Huawei product training material and Huawei career certification training material.



Method:Logon http://learning.huawei.com/en and enter Huawei Training/Classroom Training ,then you can download training material in the specific training introduction page.



n

If you have the HCNA/HCNP certificate:You can access Huawei Career Certification and Basic Technology e-Learning courses.



m o .c

/e

t t :h

3、 Priority to participate in Huawei Online Open Class (LVC) 

// : p

The Huawei career certification training and product training covering all ICT technical domains like R&S, UC&C, Security,

s e rc

Storage and so on, which are conducted by Huawei professional instructors. 



4、Learning Tools:

u o s e R



eNSP :Simulate single Router&Switch device and large network.



WLAN Planner :Network planning tools for WLAN AP products.

g n ni

In addition, Huawei has built up Huawei Technical Forum which allows candidates to discuss technical issues with Huawei experts , share exam experiences with others or be acquainted with Huawei Products.



L e r

Statement:

r a e

This material is for personal use only, and can not be used by any individual or organization for any commercial purposes.

o

M

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

1

Basic Optical Communications Technology

P-1

/e m o i.c

e w a u .h



t t :h

Content :

r a le

g n ni

// : p

1. Preparatory Knowledge························································································4

s e c r u o s e R

2. Optical Fiber ·········································································································8 3. Passive components·····························································································26

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-2

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-3

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-4

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-5

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Light rays propagate within different media at a different velocities. The characteristics that describes property of a media is called refractive index.



Refractive index n is determined by the following formula: n=с/ν.



In figure1: θ1 is the angle of incidence, θ3 is the angle of reflection, and θ2 is the angle of refraction. The relationship among these angles depends on the medium the light rays strikes: θ1=θ3, n1 sinθ1=n2 sinθ2.



In figure2: When the angle of incidence θ reaches a value, the refraction angle equals 90°, the light will not enter another medium (air in this example), and the angle of incidence then is called the critical angle θc. If we continue to increase the angle of incidence θ to make θ>θc, all light will be reflected back into the incident medium. This phenomenon is called total reflection because all light is reflected back to the medium of

g n ni

s e c r u o s e R

r a e

L e

or

incidence.

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-6

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

Light is a kind of transverse wave, that is, the direction of vibration of the electromagnetic field of light is vertical to the direction of propagation. If the direction of vibration of light wave remains constant, and the amplitude of the light wave varies with phase, such light is called linearly polarized light.

s e c r u o s e R

In the propagation course of natural light, light intensity varies with the direction of vibration due to external influence, and light intensity at a direction prevails over that at other directions. Such light is called partially polarized light.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-7

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The material of the prism (glass) or water has different indices of refraction (n) for light of different wavelengths (corresponding to different colors). As a result, the propagation velocity and the refractive angle of the light differ and lights of different colors spread across the space.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-8

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-9

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-10

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Fiber is of cylindrical form and consists of the core, cladding and coating.



Core is lying at the center of the fiber, it is made from high purity silicon dioxide, mixing with a small amount of doping agent to increase the refractive index (n1) of core.



Cladding is around the core and is also made from high purity silicon dioxide mixing with a trivial amount of doping agent. The doping agent here is to reduce the refractive index (n2) of the cladding and make it slightly lower than that of the core.



Step index fiber: the refractive indices of the core and cladding are evenly distributed along the radius of the fiber, and the refractive rate changes abruptly at the interface between the core and the cladding.



Graded index fiber: the refractive index of the core is not constant, but reduces gradually with the increase of the coordinate along the radius of core to the extent that it ultimately

g n ni

s e c r u o s e R

r a e

L e

or

equals the refractive index of the cladding.

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-11

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

Light is propagated in the fiber as an independent group of light ray. In other words, we will find out, if we could look into the fiber, that a group of light beam propagates at different angles ranging from zero to critical angle αc. The light with an angle larger than αc will pass through the core into the cladding. These different light beams are modes.

s e c r u o s e R

The mode of propagation strictly following the central axis of the fiber is called zero-order mode, or fundamental mode; other beams which propagate along an angle from the central axis are called high-order modes.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-12

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



When the size of the fiber (mainly the diameter of core d1) is far larger than the optical wavelength (about 1 micrometer), there will be tens of or even hundreds of transmission modes in fiber. Such fiber is called multimode fiber.



When the size of the fiber (mainly the diameter of core d1) is comparatively small and at the same order of magnitude as the optical wavelength (e.g. d1 is within the range of 5 to 10 micrometers), the fiber allows only one propagation mode (fundamental mode) and cuts off other high-order modes. Such fiber is called single-mode fiber.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-13

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Attenuation or loss is an important constraint factor of fiber for the propagation of optical signal. Loss of fiber restricts the propagation distance of optical signal without optical amplification. Loss of fiber mainly depends on absorption loss, scattering loss and bending loss.

s e c r u o s e R



Absorption loss of fiber results from the material of fiber, which includes ultraviolet absorption, infrared absorption and impurity absorption.



Scattering loss resulting from the inhomogeneity of materials is called Rayleigh scattering loss.



Bending of fiber tends to cause radiation loss.



Loss is one of major characteristics of fiber and the major parameter used to describe such loss is attenuation coefficient.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-14

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Different frequencies and modes in the optical pulse have different group velocities. Therefore, these frequency components and modes reach the fiber terminals at different time, and result in optical pulse stretching, which is the dispersion of fiber.



Light beams of different modes in multimode fiber have different group velocities and they have different time delays in transmission, dispersion arising from which is called mode dispersion. Mode dispersion is mainly associated with multimode fiber.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-15

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Chromatic dispersion is the sum of material dispersion and waveguide dispersion. All two depend on wavelength. Chromatic dispersion is the different light speed in fiber according to the light wavelength. In vacuum, the light propagate at the same speed, in a certain medium, such as quartz crystal silicon dioxide, however, different wavelength has different propagation speed. This diagram is the dispersion curve of the different SMF.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-16

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Light can be polarized in vertical and horizontal. Because of geometric imperfection of the fiber. PMD is caused by slight fiber asymmetry. Different Polarization travel at different speed. PMD is statistical in nature. Large variation in PMD values can be observed during the life cycle of a fiber. Additional stress can be applied to a fiber during transportation and cabling. Effects of temperature and vibration are still regarded as potential problem by operator. Cable can be crushed, stressed, or physically damaged during installation. Cable handling causes variations in PMD.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-17

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

Optical pulse from LD is not monochromatic, it is composed of many wavelengths or colors. The chromatic dispersion in the fiber causes different wavelength to travel at different speed, cause different of propagation delay, and, at the receiver, arrive at the different time.

s e c r u o s e R

The adjacent optical pulse overlap. It causes inter-symbol interference and bit error.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-18

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

When actual wavelength is smaller than cutoff wavelength, there will be several modes transmitted in the SMF, thus assuming multimode characteristics. To avoid mode noise and mode dispersion, the cutoff wavelength of the minimum fiber length of actual system fiber should be smaller than the minimum operating wavelength of the system. Cutoff wavelength conditions can ensure single-mode transmission in minimum fiber length, inhibit the generation of high-order modes, or reduce the cost of generated high-order mode noise power to such an extent that it can be neglected.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-19

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



In fiber, not all luminous energy is transmitted via core, but some luminous energy is transmitted via cladding. MFD is the parameter used to describe the concentration of luminous energy in SMF.



MFD and effective area mainly relate to the density of energy passing through the fiber. The smaller the MFD, the greater the energy density passing through the cross section of the fiber. Excessively large energy density of the fiber will lead to the non-linear effects, lower the optical SNR, and greatly affect the system performance. Therefore, as for the MFD (or effective area) of the transmission fiber, the larger the better.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-20

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

G.652 fiber is one of the single-mode optical fiber defined by recommendation G.652. this fiber also be called conventional SMF. G.652 fiber has the zero-dispersion wavelength around 1310nm and it is optimized for use in the 1310nm wavelength region. G.652 fiber can also be used in 1550nm wavelength region.

s e c r u o s e R



G.653 fiber, also known as dispersion shifted fiber (DSF), refers to the fiber whose zero point of dispersion is close to 1,550nm. It is called so because its zero point of dispersion has shifted compared with standard SMF (G.652).



G.654 fiber refers to the SMF with shifted cutoff wavelength. It’s is mainly applicable to submarine fiber communications where long regenerator section distance is required.



G.655: DWDM system working at zero dispersion wavelength is easily subject to four-wave mixing effect (as described in the following section), which seriously affects the system

g n ni

r a e

L e

M

or

performance. To avoid such effect, the zero point of dispersion will be shifted out of the operating wavelength of DWDM close to 1550nm. This kind of fiber is non-zero dispersion shifted fiber (NZDSF).

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-21

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

All media are non-linear in nature. However, on most occasions, the non-linear characteristics are rather negligible to be perceived. However, the non-linear characteristics of the fiber will become stronger and stronger when an optical amplifier or laser is employed in the fiber communication system. The reason is that the optical signal of SMF is confined to the mode field and the effective area of SMF is rather small. As a result, optical power density is very high and such high power density will remain over a long distance due to low loss.

g n ni

s e c r u o s e R

Non-linear effects of SMF is usually divided into: stimulated non-elastic scattering, Kerr effect and four-wave mixing.

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-22

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Assume that the frequency of incident light is ω1, and the molecular vibration frequency of the medium is ωv, then the frequency of scattered light ωs=ω1-ωv and ωas=ω1+ωv. This phenomenon is called stimulated Raman scattering.



Stimulated Brillouin scattering is very similar to stimulated Raman scattering in the physical process. The pump with the incident frequency of ωp transfers part of the energy to the Stokes wave with the frequency of ωs, and emits phonons with the frequency of Ω.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-23

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



We call the phenomenon that the refractive index of a medium changes with the variation of light intensity “Kerr effect”. In a single-mode fiber, Kerr effect appears as self-phase modulation and cross phase modulation.



Due to Kerr effect, an instant change of signal light intensity tends to lead to the phase change of optical pulse. This effect is called self-phase modulation (SPM).



In a multi-channel system, when changes of the light intensity cause phase changes, the phase modulation will generally broaden the signal spectrum as a result of interaction between adjacent channels. The extent of spectrum broadening caused by XPM is related to the channel spacing.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-24

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The frequency of the new wavelength is the combination of the tree, as shown in the following formula: flnm=fl±fn±fm.



occurrence of FWM requires phase match of signal lights. When various signal lights are transmitted near zero dispersion of the fiber, the group velocities of optical signals with different wavelengths are nearly the same. Therefore, the phase match condition is quite easy to satisfy, and thus FWM effect is likely to occur.



FWM effect is much more serious on a G.653 fiber than on G.652 and G.655 fibers, and the transmission loss caused thereby is bigger. Appropriate dispersion can suppress the occurrence of FWM.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-25

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-26

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-27

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-28

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



A dielectric thin film filter is composed of several dozens of layers of dielectric films with different materials, different refractive indices and different thickness.



film interfering filter can provide a pass band to a certain range of wavelengths, and provide a block band to other wavelengths, so as to form the filter characteristics as required.



The main characteristics of the dielectric thin film filter are: a miniaturized device with stable structure, flattened and polarization independent signal pass band, low insertion loss, reasonable path interval and stable temperature which is better than 0.0005nm/°C.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-29

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

Fiber grating is formed by means of manual introduction of a periodic refractive index variation along the length of a section of fiber. Fiber grating is a space phase fiber grating formed in the core by means of the optical sensitivity of the fiber material (the permanent change of refractive index caused by the interaction between the external incident photons with the core).

s e c r u o s e R

According to the distribution mode of the refractive index on the fiber axial direction, the fiber grating can be divided into uniform grating and non-uniform grating. Uniform grating refers to the grating with constant optical cycle (the product of the effective refractive index and the refractive index modulation depth) along the fiber axial direction, such as Bragg grating and long-cycle grating. Non-uniform grating refers to the grating with optical cycle varies along the fiber axial direction, such as chirped grating

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-30

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

Arrayed waveguide grating (AWG) is a plane waveguide device on the basis of optical integration technology. The typical manufacturing process is to d brought into the lab for eposite a layer of thin silica glass on a piece of silica, and then form the pattern and shape by means of the optical scoring technology.

s e c r u o s e R

The AWG optical multiplexer/demultiplexer features small wavelength interval, large number of channels and flattened passband etc., making it very suitable for the superhighspeed and large-capacity DWDM system.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-31

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

The basic working principle of this device is shown in the figure above. Input light with an interval of 50G can be divided into odd and even groups by means of an interleaver with an interval of 50G, with the interval of each group being 100G; and then the input light is divided into four groups with an interval of 200G by means of two interleavers with an interval of 100G; finally, the input light is demultiplexed by means of a common demultiplexer with an interval of 200G. Of course, at the second stage, the input light can be demultiplexed into a single-wavelength optical signal directly by means of an AWG or a thin film filter with an interval of 100G.

g n ni

s e c r u o s e R

By means of this device, the toll trunk can be conveniently upgraded to the DWDM system with an interval of 50G, without wasting the existing multiplexer and demultiplexer with an interval of 100G, thus it is cost efficient.

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-32

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Optical coupler is a device for combining the lights from different fibers; and optical splitter, just as it name implies, is a device for splitting the optical signals to several fibers.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-33

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

In fiber-optic communication links, light is reflected from any components -connector, passive device and receiver and so on – inserted into the optical path. If the backreflection light enters a laser or optical amplifier, the performance of this device will degrade. Isolator is to isolate the laser or optical amplifier from the reflected light. The isolator must allow the forward light pass through with minimal loss (ideally, 0), and block backreflection light with maximum loss (ideally, infinity). Insertion loss of a modern isolator can be as low as 0.15dB, while isolation can be as high as 70dB.

g n ni

s e c r u o s e R

Circulator is a kind of one way device. It direct a light signals from one port to another sequentially in only one direction. The light inputted from port1 can be only outputted from port2 (isolation between port1 and port2); the light inputted from port2 can be only outputted from port3; and the light inputted from port3 can be only outputted from port1

r a e

L e

or

.

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-34

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



It is the basic device for optical communication, the optical switches have many applications. These applications mainly include:



Automatic protection switch: In the case of fiber broken or sending device failure, the optical switch can be used to realize the protective switchover. The signals are switched to the standby protection fiber or transmitter through the optical switch. This is the most basic application of the optical switch, which is generally realized by a 12 or 1N switch.



Dynamic Optical Add/Drop Multiplexer (OADM): The dynamic OADM can add/drop one wavelength from multiple wavelengths without OEO conversion. In the future, the dynamic OADM will be applied to both long-haul system and MAN, especially applied to the MAN to construct ring network. Optical switch is not mandatory for OADM. However, the OADM with optical switch can be switched to optical channel flexibly, and provides

g n ni

s e c r u o s e R

r a e

L e

or

dynamic upload and download functions, that means, the selected wavelengths to be downloaded can be done through software intervention. To meet the network requirements, OADM can be connected with 22 optical switch or 1616 optical switch (for MAN) or 6464 (for toll trunk).



Optical cross connection (OXC): It represents a new core technology in the network. OXC means the high density network and any end-to-end optical cross connection. It can

M

implement many functions, from simple network protection to dynamic optical path management.

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-35

/e m o i.c

e w a u .h



t t :h

Answer: 1)

Dielectric Thin Film Filter

2)

Fiber Grating

3)

Arrayed Waveguide Grating-AWG

4)

Comb Filter

5)

Optical Coupler and Optical Splitter

g n ni

6) 7)

r a e

r a le

g n ni

// : p

s e c r u o s e R

Isolator and Circulator Optical Switch

For their functions, please refer to the above contents.

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-36

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Basic Optical Communications Technology

P-37

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-1

/e m o i.c

e w a u .h



t t :h

Contents

r a le

g n ni

// : p

SDH Overview……………………………...……………………………..…..……..Page3

s e c r u o s e R

Frame Structure & Multiplexing Methods…………………………….……..……Page11 Overheads & Points……………………………………………………......………Page26

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-2

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-3

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-4

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



SDH is the abbreviation of Synchronous Digital Hierarchy.



SDH is a transmission system (protocol) which defines the characteristic of digital signals, including frame structure, multiplexing method, digital rates hierarchy, and interface code pattern, and so on.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-5

/e m o i.c

e w a u .h



No universal standards for optical interfaces. All PDH equipment manufacturers use their own line codes to monitor the transmission performance in the optical links. So equipment at the two ends of a transmission link must be provided by the same vendor. This causes many difficulties for network structuring, management and network interconnection.

g n ni

SDH electrical interfaces 

M



s e c r u o s e R

r a e

L e

or

There are only some regional standards: European Series, North American Series and Japanese Series, instead of universal standards for electrical interface. Each of them has different electrical interface rate levels, frame structures and multiplexing methods. This makes it difficult for international interconnection.

PDH optical interfaces 



// : p

PDH (Plesiochronous Digital Hierarchy) electrical interfaces 



t t :h

r a le

g n ni

SDH system provides universal standards for network node interfaces (NNI), including standards on digital signal rate level, frame structure, multiplexing method, line interface, etc. So SDH equipment of different vendors can be easily interconnected.

SDH optical interfaces 

Line interfaces (here refers to optical interface) adopt universal standards. Line coding of SDH signals is only universal scrambling. Therefore the opposite-terminal equipment can be interconnected with SDH equipment of different vendors via standard descrambler alone.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-6

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

As PDH system adopts asynchronous multiplexing method, the locations of the low-rate signals are not regular nor fixed when they are multiplexed into higher-rate signals. That is to say, the locations of the lower signals are unable to be identified from the higher speed

s e c r u o s e R

signals. Therefore, low-rate signals can not be directly added/dropped from PDH high-rate signals. For example, 2Mb/s signals can not be directly added/dropped from 140Mb/s signals. Here arise two problems: 

M



g n ni

r a e

L e

or

Adding/dropping low-rate signals from high-rate signals must be conducted level by level. This not only enlarges the size and increases cost, power consumption and complexity of equipment, but also decreases the reliability of the equipment.



Since adding/dropping low-rate signals to high-rate ones must go through many stages of multiplexing and de-multiplexing, impairment to the signals during

multiplexing/de-multiplexing processes will increase and transmission performance will deteriorate. This is unbearable in large capacity transmission. That's the reason why the transmission rate of PDH system has not being improved further.

No universal network management interface in PDH system 

Different parts of the network may use different network management systems, which are obstacles in forming an integrated telecommunication management system (TMN).

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-7

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

As low-rate SDH signals are multiplexed into the frame structure of high-rate SDH signals via byte interleaved multiplexing method, their locations in the frame of high-rate SDH signal are fixed and regular, or say, predictable. Therefore, low-rate SDH signals, e.g.

s e c r u o s e R

155Mb/s, (Synchronous Transport Module STM-1 ), can be directly added to or dropped from high-rate signals, e.g., 2.5Gb/s (STM-16 ). This simplifies the multiplexing and demultiplexing processes of signals and makes SDH hierarchy especially suitable for high rate and large capacity optical fiber transmission systems. 

g n ni

As synchronous multiplexing method and flexible mapping structure are employed, PDH low-rate tributary signals (e.g., 2Mb/s ) can also be multiplexed into SDH signal frame (STM-N). Their locations in STM-N frame are also predictable. So low-rate tributary signals can be directly added to or dropped from STM-N signals. Note that this is different from

r a e

L e

M

or

the above process of directly adding/dropping low-rate SDH signals to/from high-rate SDH signals. Here it refers to direct adding/dropping of low-rate tributary signals, such as 2Mb/s, 34Mb/s, and 140Mb/s, to/from SDH signals. This saves lots of multiplexing/de-multiplexing equipment (back-to-back equipment), enhances reliability, and reduces signal impairment, and the cost, power consumption and complexity of the equipment. Adding/dropping of services is further simplified.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-8

/e m o i.c

e w a u .h



t t :h

PDH OAM function 

r a le

g n ni

// : p

In the frame structure of PDH signals, there are few overhead bytes used for operation, administration and maintenance (OAM). The fact that few overhead

s e c r u o s e R

bytes are used for the OAM of PDH signals is also a disadvantage for layered management, performance monitoring, real-time service dispatching, bandwidth control, and alarm analyzing and locating of the transmission network. 

SDH OAM function 

r a e

L e

or

g n ni

Abundant overhead bits for operation, administration and maintenance (OAM) functions are arranged in the frame structures of SDH signals. This greatly enforces the network monitoring function, i.e. automatic maintenance. Some redundancy bits must be added during line coding for line performance monitoring because

few overhead bytes are arranged in PDH signals. For example, in the frame structure of PCM30/32 signals, only the bits in TS0 and TS16 time slots are used for OAM function.

M



The abundant overheads in SDH signals account for 1/20 of the total bytes in a frame. It greatly enhances the OAM function and reduces the cost of system maintenance that occupies most of the overall cost of telecommunication equipments. The overall cost of SDH system is less than that of PDH system and estimated to be only 65.8% of that of the later.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-9

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

SDH has high compatibility, which means that the SDH transmission network and the existing PDH transmission network can work together while establishing SDH transmission network. SDH network can be used for transmitting PDH services, as well as signals of

s e c r u o s e R

other hierarchies, such as asynchronous transfer mode (ATM) signals and FDDI signals. 

How does the SDH transmission network achieve such compatibility? The basic transport module (STM-1) of SDH signals in SDH network can accommodate three PDH digital signal hierarchies and other hierarchies such as ATM, FDDI and DQDB. This reflects the forward and backward compatibility of SDH and guarantees smooth transitions from PDH to SDH network and from SDH to ATM.

g n ni

r a e



How does SDH accommodate signals of these hierarchies? It simply multiplexes the lowrate signals of different hierarchies into the frame structure of the STM-1 signals at the

or

boundary of the network (e.g. SDH/PDH start point) and then de-multiplexes them at the boundary of the network (end point). In this way, digital signals of different hierarchies can be transmitted in the SDH transmission network.

L e

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-10

/e m o i.c

e w a u .h



t t :h

Low bandwidth utilization ratio 

r a le

g n ni

// : p

One significant advantage of SDH is that system reliability is greatly enhanced (highly automatic OAM) since many overhead bytes for OAM function are

s e c r u o s e R

employed in SDH signals. To transmit the same amount of valid information, PDH signals occupy less frequency bandwidth (transmission rate) than SDH signals, i.e. PDH signals use lower rate. In other words, STM-1 occupies a frequency bandwidth larger than that needed by PDH E4 signals (they have the same amount of information). 

Complex mechanism of pointer justification

r a e

L e

or



The pointer constantly indicates the location of low-rate signals so that specific low-rate signals can be properly de-multiplexed in time of "unpacking". However,

the pointer function increases the complexity of the system. Most of all, it generates a kind of special jitter in SDH system ---- a combined jitter caused by pointer justification. This jitter will deteriorate the performance of low-rate signals being de-multiplexed.

M



g n ni

Influence of excessive use of software on system security 

One of the features of SDH is its highly automatic OAM, which means that software constitutes a large proportion in the system. As a result, SDH system is vulnerable to computer viruses, manual mis-operation and software fault on network layer.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-11

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-12

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



ITU-T defines the frames of STM-N as rectangle block frame structure in unit of byte (8bit).



The frame structure of STM-N signals is 9 rows× 270×N columns. The N here is equal to the N in STM-N, ranging from 1, 4, 16, 64, and 256. The N indicates that this signal is

s e c r u o s e R

multiplexed by N STM-1 signals via byte interleaved multiplexing. This explains that the frame structure of STM-1 signals is a block structure of 9 rows ×270 columns. When N STM-1 signals are multiplexed into STM-N signal via byte interleaved multiplexing, only the columns of STM-1 signals are multiplexed via byte interleaved multiplexing. While the number of rows remains constantly to be 9. It is known that signals are transmitted bit-bybit in lines. Then what is the sequence of transmission? The principle for SDH signal frame transmission is: the bytes (8-bit) within the frame structure is transmitted bit-by-bit from left to right and from top to bottom. After one row is transmitted, the next row will follow.

g n ni

r a e

L e

M

or



After one frame is completed, the next frame will start. ITU-T defines the frequency to be 8000 frames per second for all levels in STM hierarchy. That means the frame length or frame period is a constant value of 125us. Constant frame period is a major characteristic of SDH signals. The constant frame period makes the rates of STM-N signals regular. For example, the data rate of STM-4 transmission is constantly 4 times as that of STM-1, and STM-16 is 4 times of STM-4 and 16 times of STM-1. Such regularity of SDH signals makes it possible to directly add/drop low-rate SDH signals to/from high-rate SDH signals, especially for high-capacity transmission.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-13

/e m o i.c

e w a u .h



t t :h

The frame of STM-N consists of three parts 

r a le

g n ni

// : p

Section Overhead (including Regenerator Section Overhead --- RSOH and Multiplex Section Overhead ---- MSOH)

s e c r u o s e R



Administrative Unit Pointer---- AU-PTR



Information Payload

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-14

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The Information Payload is a place in the STM-N frame structure to store various information code blocks to be transmitted by STM-N. It functions as the "wagon box" of the truck---STM-N. Within the box are packed low-rate signals ---- cargoes to be shipped.

s e c r u o s e R

To monitor the possible impairment to the cargoes (the packed low-rate signals) on a realtime basis during transmission, supervisory overhead bytes ---- Path Overhead (POH) bytes are added into the signals when the low-rate signals are packed. As one part of payload, the POH, together with the information code blocks, is loaded onto STM-N and transmitted on the SDH network. The POH is in charge of monitoring, administrating and controlling (somewhat similar to a sensor) the path performances for the packed cargoes (the low-rate signals).

g n ni

r a e

L e

What is a path? Let's take the following example. STM-1 signals can be demultiplexed into

or

63× 2Mb/s signals. In other words, STM-1 can be regarded as a transmission path divided into 63 bypaths. Each bypath, which is equal to a low-rate signal path, transmits corresponding low-rate signals. The function of the Path Overhead is to monitor the transmission condition of these bypaths. The 63 2Mb/s paths multiplex and form the path of STM-1 signals that can be regarded as a "section" here. Paths refer to corresponding low-rate tributary signals. The function of POH is to monitor the performance of these lowrate signals transmitted via the STM-N on the SDH network. This is consistent with the analogy in which the STM-N signal is regarded as a truck and the low-rate signals are packed and loaded onto the truck for transmission.

M



Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-15

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The Section Overhead (SOH) refers to the auxiliary bytes which is necessary for network operation, administration and maintenance (OAM) to guarantee normal and flexible transmission of Information Payload. For example, the Section Overhead can monitor the

s e c r u o s e R

impairment condition of all "cargoes" in STM-N during transmission. The function of POH is to locate the certain impaired cargo in case impairments occurred. SOH implements the overall monitoring of cargoes while the POH monitors a specific cargo. 

The Section Overhead is further classified into Regenerator Section Overhead (RSOH) and Multiplex Section Overhead (MSOH). They respectively monitor their corresponding sections and layers. Then, what's the difference between RSOH and MSOH? In fact, they have different monitoring domains. For example, if STM-16 signals are transmitted in the fiber, the RSOH monitors the overall transmission performance of STM-16 while the MSOH

g n ni

r a e

L e

M

or



monitors the performances of each STM-1 of the STM-16 signals. RSOH, MSOH and POH provide SDH signals with monitoring functions for different layers. For a STM-16 system, the RSOH monitors the overall transmission performance of the STM-16 signal; the MSOH monitors the transmission performances of each STM-1 signal; and the POH monitors the transmission performances of each packaged low-rate tributary signal (e.g. 2Mb/s) in STM-1. Through these complete monitoring and management functions for all levels, you can conveniently conduct macro (overall) and micro (individual) supervision over the transmission status of the signal and easily locate and analyze faults.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-16

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The Administrative Unit Pointer within column 9 × N of row 4 of the STM-N frame is 9 × N bytes in total. What's the function of AU-PTR? We have mentioned before those lowrate tributaries (e.g. 2Mb/s) could be added/dropped directly from high-rate SDH signals.

s e c r u o s e R

Because the locations of low-rate signals within a high-rate SDH frame structure are predictable, i.e. regular. The predictability can be achieved via the pointer overhead bytes function in the SDH frame structure. The AU-PTR indicates the exact location of the first byte of the information payload within the STM-N frame so that the information payload can be properly extracted at the receiving end according to the value of this location indicator (the value of the pointer). Let's make it easier. Suppose that there are many goods stored in a warehouse in unit of pile. Goods (low-rate signals) of each pile are regularly arranged (via byte interleaved multiplexing). We can locate a piece of goods within the warehouse by only locating the pile this piece of goods belongs to. That is to say, as long as the location of the first piece of goods is known, the precise location of any piece within the pile can be directly located according to the regularity of their arrangement. In this way you can directly carry (directly add/drop) a given piece of goods (low-rate tributary) from the warehouse. The function of AU-PTR is to indicate the location of the first piece of goods within a given pile.

g n ni

r a e

L e

or

M



In fact, the pointer is further classified into higher order pointer and low order pointer. The higher order pointer is AU-PTR while the lower order pointer is TU-PTR (Tributary Unit Pointer). The function of TU-PTR is similar to that of AU-PTR except that the former indicates smaller "piles of goods".

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-17

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

SDH multiplexing includes three types: multiplexing of lower-order SDH signals into higherorder SDH signals and multiplexing of low-rate tributary signals (e.g. 2Mb/s, 34Mb/s and 140Mb/s) into SDH signals ----STM-N, and other hierarchy signals to SDH Signals. 

s e c r u o s e R

The second type of multiplexing from Low to high rate SDH signals is conducted mainly via byte interleaved by multiplexing four into one, e.g. 4×STM-1-->STM-4 and 4×STM-4-->STM-16. after the multiplexing, the rate of the higher-level STM-N signals is 4 times that of the next lower-level STM-N signals. During the byte interleaved multiplexing, the information payload, pointer bytes of each frame are multiplexed via interleaved multiplexing based on their original values.

r a e

L e

or

g n ni





The second type of multiplexing is mostly used for multiplexing of PDH signals into the STM-N signals.

The last one is other hierarchy signals e.g. IP or ATM signals to SDH Signals.

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-18

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

ITU-T defined a complete multiplexing structure, through which digital signals of three PDH hierarchies can be multiplexed into STM-N signals. 

s e c r u o s e R

This multiplexing structure includes some basic multiplexing units: C - Container, VC - Virtual Container, TU - Tributary Unit, TUG - Tributary Unit Group, AU Administrative Unit, and AUG - Administrative Unit Group. The suffixes of these multiplexing units denote their corresponding signal levels.





M

g n ni

r a e

Low-rate tributaries are multiplexed into STM-N signals through three procedures: mapping, aligning and multiplexing.

L e

or

The multiplexing route used in a country or an area must be unique. The route on the slide is the most usual and adopted in most of countries.



SDH mapping is a procedure by which tributaries are adapted into virtual

containers at the boundary of an SDH network, e.g. E1 into VC-12. 



SDH aligning is a procedure to add TU-PTR or AU-PTR into the VC-12, VC-3 or VC4. The pointer value constantly locates the start point of VC within the TU or AU. So that the receiving end can correctly separate the corresponding VC. SDH multiplexing, a relatively simple concept, is the procedure by which the TUs are organized into the higher order VC or the AUs are organized into STM-N via byte interleaving.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-19

/e m o i.c

e w a u .h







M

// : p

First, the 140Mb/s PDH signals are adapted via bit rate justification (bit stuffing method) into C-4, which is a standard information structure used to accommodate 140Mb/s PDH signals. After being processed via bit rate justification techniques, service signals of various rates involved in SDH multiplexing must be loaded into a standard container corresponding to the rate level of the signal: 2Mb/s---C-12, 34Mb/s---C-3 and 140Mb/s---C-4. The main function of a container is for bit rate justification. The frame structure of C-4 is block frame in unit of bytes, with the frame frequency of 8000-frame per second.

g n ni

s e c r u o s e R

r a e

From C4 to VC4

L e

or

t t :h

From 140Mb/s to C4

r a le

g n ni



A column of path overhead bytes (higher-order path overhead VC-4-POH) shall be added in front of the C-4 block frame during multiplexing in order to monitor the 140Mb/s path signals. Then the signals become a VC-4 information structure. The virtual container, a kind of information structure whose integrity is always maintained during transmission on the SDH network, can be regarded as an independent unit (cargo package). It can be flexibly and conveniently added/dropped at any point of the path for synchronous multiplexing and crossconnection processing. Now you might get the idea that VC-4 is in fact the information payload of the STM-1 frame. The process of packing PDH signals into C and adding the corresponding path overhead to form the information structure of VC is called mapping.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-20

/e m o i.c

e w a u .h



t t :h

From VC4 to AU4 

r a le

g n ni

// : p

By adding an Administrative Unit Pointer --- AU-PTR before the VC-4, the signal is changed from VC-4 into another information structure--- Administrative Unit AU-4.

s e c r u o s e R

The function of AU-PTR is to indicate the location of the higher order VC within the STM frame. Under the pointer function, the higher order VC is allowed to "float" within the STM frame, i.e. the frequency offsets and phase differences to a certain degree between VC-4 and AU-4 are tolerable. Because the AU-PTR is outside of the payload area and co-located with the section overhead instead. This guarantees that the AU-PTR can be accurately found in the corresponding location. Then the VC-4 can be localized by the AU pointer and disassembled from STM-N signals.

g n ni

r a e

L e



or

From AU4 to AUG (N) 

M



One or more AUs with fixed locations within the STM frame form an AUG ---Administrative Unit Group. The location of the first byte of the VC-4 with respect to the AU-4 pointer is given by the pointer value. The AU-4 is placed directly in the AUG.

From AUG (N) to STM-N 

The last step is to add corresponding SOH to AU-4 to form STM-N signals. During being multiplexed, the N AUGs are one-byte interleaved into this structure and have a fixed phase relationship with respect to the STM-N.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-21

/e m o i.c

e w a u .h







t t :h

From 34Mb/s to C3

// : p

Similarly, 34Mb/s signals are first adapted into the corresponding standard container -- C-3 through bit rate justification.

From C3 to VC3 

r a le

g n ni

s e c r u o s e R

After adding corresponding POH, the C-3 is packed into VC-3 with the frame structure of 9 rows × 85 columns.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-22

/e m o i.c

e w a u .h



t t :h

From VC3 to TU3 

r a le

g n ni

// : p

For the convenience of locating VC-3 at the receiving and separating it from the high-rate signals, a three-byte pointer, TU-PTR (Tributary Unit Pointer), is added to

s e c r u o s e R

the VC-3 frame. Then what is the function of a tributary pointer? The TU-PTR is used to indicate the specific location of the first byte of the lower order VC within the tributary unit TU. It is similar to an AU-PTR that indicates the location of the first byte of the VC-4 within the STM frame. Actually, the operating principles of these two kinds of pointers are similar. 

From TU3 to TUG3

r a e

L e

or



M

g n ni



The TU-3 frame structure is incomplete. First fill the gap to form the frame structure of TUG3.

From TUG3 to C4, VC4 and STM-N 



Three TUG-3 can be multiplexed into the C-4 signal structure via byte interleaved multiplexing method. The TUG-3 is a 9-row by 86-column structure. Two columns of stuffed bits are added to the front of the composite structure of 3× TUG-3 to form a C-4 information structure. The last step is to multiplex C-4 into STM-N. This is similar to the process of multiplexing 140Mb/s signals into STM-N signals: C-4-->VC-4-->AU-4-->AUG->STM-N.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-23

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



At present, the most frequently used multiplexing method is multiplexing of 2Mb/s signals into STM-N signals. It is also the most complicated method of multiplexing PDH signals into SDH signals.



From 2Mb/s to C12 

s e c r u o s e R

First, the 2Mb/s signal shall be adapted into the corresponding standard container C-12 via rate adaptation.



From C12 to VC12 

r a e

L e

or

notch in the top left corner of each basic frame. Since the VC can be regarded as an independent entity, dispatching of 2Mb/s services later is conducted in unit of VC-12.

M



g n ni

To monitor on a real-time basis the performance of each 2Mb/s path signal during transmission on SDH network, C-12 must be further packed ---- adding corresponding path overhead (lower order overhead)---- to form a VC-12 information structure. The LP-POH (lower order path overhead) is added to the

From VC12 to TU12 

For correct aligning of VC-12 frames in the receiving end, a four-byte TU-PTR is added to the four notches of the VC-12 multi-frame. Then the information structure of the signal changes into TU-12 with 9 rows×4 columns. The TU-PTR indicates the specific location of the start point of the first VC-12 within the multiframe.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-24

/e m o i.c

e w a u .h







t t :h

From TU12 to TUG2

r a le

g n ni

// : p

Three TU-12 forms a TUG-2 via byte interleaved multiplexing. The TUG-2 has the frame structure of 9 rows by 12 columns.

s e c r u o s e R

From TUG2 to TUG3 

Seven TUG-2 can be multiplexed into a TUG-3 information structure via byte interleaved multiplexing. Note that this information structure formed by the 7× TUG-2 is 9-row by 84-column. Two rows of fixed stuff bits shall be added in front of the structure. The TUG-3 is a 9-row by 86-column structure with the first two columns of fixed stuff.



r a e

From TUG3 to C4, VC4 and STM-N

L e

or

g n ni



The procedures of multiplexing the TUG-3 information structure into STM-N are the same as mentioned before.

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-25

/e m o i.c

e w a u .h







t t :h

The frame of STM-N consists of three parts

r a le

g n ni

// : p

Section Overhead (including Regenerator Section Overhead ---- RSOH and Multiplex Section Overhead ---- MSOH)

s e c r u o s e R



Administrative Unit Pointer---- AU-PTR



Information Payload with POH

There are 9 rows and 270N columns in the STM-N frame, which will be transmitted 8000 times per second. Here the value of N equals to 4 for STM-4. 

g n ni

9 (rows) X 270 X 4 (columns) X 8 (bits) X 8000 (frame/second) = 622080000 bits/second. It is so called 622 Mbits/s

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-26

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-27

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

As mentioned before, the functions of overhead are to implement layered monitoring management for SDH signals. The monitoring is classified into section layer monitoring and path layer monitoring. The section layer monitoring is further classified into regenerator

s e c r u o s e R

section layer monitoring and multiplex section layer monitoring while the path layer monitoring is further classified into higher order path layer and lower order path layer. Thus the layered monitoring for STM-N is implemented. For example, in a STM-16 system, the regenerator section overhead monitors the overall STM-16 signal while the multiplex section overhead further monitors each of the 16 STM-1. Furthermore, the higher order path overhead monitors the VC-4 of each STM-1 and the lower order path overhead can monitor each of the 63 VC-12 in the VC-4. Hence the multistage monitoring functions from 2.5Gb/s to 2Mb/s are implemented.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-28

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Then, how are these monitoring functions implemented? They are implemented via different overhead bytes.



The overhead of each layer, including RSOH, MSOH, HPOH, and LPOH consists of some

s e c r u o s e R

different bytes for different OAM function. Especially, several overhead bytes e.g. K1 and K2 bytes are very important for maintenance and troubleshooting. According to ITU-T recommendation, there are some overhead bytes reserved for national use.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-29

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Like a pointer, the function of the frame bytes is alignment. The first step is to properly extract each STM-N frame from the received continuous signal stream at the receiver. The function of the bytes A1 and A2 is to locate the start of the STM-N frame. So the receiver

s e c r u o s e R

can align and extract the STM-N frame from the information stream via these two bytes and further align a specific lower-rate signal within the frame via the pointers. 

How does the receiver align the frames via the A1 and A2 bytes? The A1 and A2 have fixed value, i.e. fixed bit patterns: A1: 11110110 (f6H) and A2: 00101000(28H). The receiver monitors each byte in the stream. After detecting 3N successive f6H bytes followed by 3N 26H bytes (there are three A1 and three A2 bytes within an STM-1 frame), the receiver determines that an STM-N frame starts to be received. By aligning the start of each STM-N frame, the receiver can identify different STM-N frames and disassemble them.

g n ni

r a e

L e

or



M

STM-N signals shall be scrambled before being transmitted via the line so that the receiver can extract timing signals from the line. But the A1 and A2 framing bytes shall not be scrambled for the receiver to properly align them. Thus it is convenient to extract the timing from the STM-N signals and disassemble the STM-N signals at the receiver.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-30

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

If the receiver doesn't receive A1 and A2 bytes within five or more successive frames (625us), i.e. it can't identify the start of five successive frames (identify different frames), it will enter out-of-frame status and generate out-of-frame alarm ---- OOF. If the OOF keeps

s e c r u o s e R

for 3ms, the receiver will enter loss-of-frame status ---- the equipment will generate lossof-frame alarm ---- LOF. Meanwhile, an AIS signal will be sent downward and the entire services will be interrupted. Under LOF status, if the receiver stays in normal frame alignment status again for successive 1ms or more, the equipment will restore the normal status.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-31

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

One of the features of SDH is its highly automatic OAM function which can conduct commands issue and performance auto poll to the networks element via NMT Network Management Terminals. SDH has some functions which are not possessed by PDH

s e c r u o s e R

systems, such as real-time service allocation, alarm fault location and on-line performance testing. Where are these OAM data arranged to transmit? The data used for OAM functions, such as sent commands and checked alarm performance data, are transmitted via D1-D12 bytes within the STM-N frame. Thus the D1-D12 bytes provide a common data communication channel accessible to all SDH network elements. As the physical layer of the embedded control channel (ECC), the D1-D12 bytes transmit OAM information among the network elements and form a transmission channel of the SDH management network (SMN).

g n ni

r a e

L e

or



M

The DCC has a total rate of 768kb/s that provides a powerful communication base for SDH network management. D1, D2 and D3 are regenerator section DCC bytes (DCCR) with a rate of 3×64kb/s = 192kb/s and are used to transmit OAM information among regenerator section terminals. D4-D12 are multiplex section DCC bytes (DCCM) with a sum rate of 9×64kb/s=576kb/s and are used to transmit OAM information among multiplex section terminals.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-32

/e m o i.c

e w a u .h



// : p

E1 is part of the RSOH and may be accessed at regenerators. E2 is part of the MSOH and man be accessed at multiplex section terminations. Each of these two bytes provides a 64kb/s orderwire channel for voice communication, i.e. voice information is transmitted via these two bytes.



t t :h

r a le

g n ni

s e c r u o s e R

The orderwire provides a convenient communication function during maintenance and troubleshooting.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-33

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



This B1 byte is allocated for regenerator section error monitoring (Byte B1 is located in the regenerator section overhead). What is the mechanism for monitoring? First, we'll discuss the BIP-8 parity.



Suppose that a signal frame is composed of 4 bytes: A1=00110011, A2=11001100, A3=10101010 and A4=00001111. The method of providing BIP-8 parity to this frame is to divide it into 4 block with 8 bits (one byte) in a parity unit (each byte as a block because one byte has 8 bits, the same as a parity unit) and to arrange these blocks. Compute the number of "1" over each column. Then fill a 1 in the corresponding bit of the result (B) if the number is odd, otherwise fill a 0. That is, the value of the corresponding bit of B makes the number of "1" in the corresponding column of A1A2A3A4 blocks even. This parity method is called BIP-8 parity. In fact this is an even parity since it guarantees that the number of "1" is even. B is the result of BIP-8 parity for the A1A2A3A4 block.



g n ni

s e c r u o s e R

r a e

The mechanism for B1 byte is: the transmitting equipment processes BIP-8 even parity over all bytes of the previous frame (1#STM-N) after scrambling and places the result in byte B1 of the current frame (2#STM-N) before scrambling. The receiver processes BIP-8 parity over all bits of the current frame (1#STM-N) before de-scrambling and compares the parity result and the value of B1 in the next frame (2#STM-N) after de-scrambling. The different bit means the error block. According to the number of different bits, we can monitor the number of error blocks occurred in 1#STM-N frame during transmission.

L e

or

M



If the B1 of the receive end has detected error blocks, the number of error blocks detected by the B1 will be displayed in receive end performance event RS-BBE (Regenerator Section Background Block Error). When the error bits detected by the receive end exceed a given threshold, the equipment will report corresponding alarms. When the error bit ratio (EBR) is greater than 10E-6, the given alarm is B1-SD. When the error bit ratio (EBR) is greater than 10E-3, B1-EXC (another name B1-OVER) will be given.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-34

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

B2 is similar to B1 in operation mechanism except that it monitors the error status of the multiplex section layer. The B1 byte monitors the transmission error of the complete STMN frame signal. There is only one B1 byte in an STM-N frame. There are N*3 B2 bytes in an

s e c r u o s e R

STM-N frame with every three B2 bytes corresponding to an STM-1 frame. The B2 monitoring adopts BIP-24 (three bytes) method, which can at most monitor 24 error blocks one time. 

Since error performance of higher rate signals is reflected via error blocks, the error status of STM-N signals is actually the status of error blocks. As can be seen from the BIP-24 parity method, each bit of the parity result is corresponding to a bit block. So three B3 bytes can at most monitor 24 error blocks from an STM-N frame that occur during transmission (The result of BIP-24 is 24 bits with each bit corresponding to a column of bits

g n ni

r a e

L e

M

or



---- a block). If the B2 of the receive end has detected error blocks, the number of error blocks detected by the B2 will be displayed in this end performance event MS-BBE (Multiplex Section Background Block Error). At the same time, M1 will be used to report to the transmit end that error blocks have been detected, and the transmit end will report MS-FEBBE (Multiplex Section Far End Background Block Error) performance event and MS-REI (Multiplex Section Remote Error Indication) alarm. When the error bits detected by the receive end exceed a given threshold, the equipment will report corresponding alarms. When the error bit ratio (EBR) is greater than 10E-6, the given alarm is B2-SD. When the error bit ratio (EBR) is greater than 10E-3, B2-EXC will be given.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-35

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

If the B2 of the receive end has detected error blocks, the number of error blocks detected by the B2 will be displayed in this end performance event MS-BBE (Multiplex Section Background Block Error). At the same time, M1 will be used to report to the transmit

s e c r u o s e R

end that error blocks have been detected, and the transmit end will report MS-FEBBE (Multiplex Section Far End Background Block Error) performance event and MS-REI (Multiplex Section Remote Error Indication) alarm. 

This is a message returned to its transmit end by the receive end so that the transmit end can get the receiving error status of the receive end. For STM-N levels this byte conveys the count (in the range of [0, 255]) of interleaved bit blocks that have been detected in error by the BIP-24N (B2). For rates of STM-16 and above, this value shall be truncated to 255.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-36

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Two bytes are allocated for APS signaling for the protection of the multiplex section. For the bit assignments for these bytes and the bit-oriented protocol, please refer to G.783, G.841 (10/98).

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-37

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

This is an alarm message, returned to the transmit end (source) by the receive end (sink), which means that the receive end has detected an incoming section defect or is receiving the Multiplex Section Alarm Indication Signal (MS-AIS). That is, when the receive end

s e c r u o s e R

detects receiving deterioration, it returns an Multiplex Section Remote defect Indication (MS-RDI) alarm signal to the transmit end so that the later obtains the status of the former. If the received b6-b8 bits of the K2 is 110, it means that this signal is an MSRDI alarm signal returned by the opposite end. If the received b6-b8 bits of the K2 is 111, it means that this signal is an MS-AIS alarm signal received by current end. Meanwhile, the current end is required to send out MS-RDI signal to the opposite end, i.e. insert 110 bit pattern into the b6-b8 of the K2 within the STM-N signal frame to be sent to the opposite end. Not all deterioration results in returning MS-RDI. Current end equipment returns MSRDI only upon receiving R-LOS, R-LOF, and MS-AIS alarm signals.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-38

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



We can use the extended SSM for clock protection. In this case, the different value of bits 1 ~ 4 of byte S1 indicates the different clock source.



Bits 5 to 8 of byte S1 are allocated for Synchronization Status Messages. Table 3-1 gives

s e c r u o s e R

the assignment of bit patterns to the four synchronization levels agreed to within ITU-T. Two additional bit patterns are assigned: one to indicate that quality of the synchronization is unknown and the other to signal that the section should not be used for synchronization. The remaining codes are reserved for quality levels defined by individual Administrations. Different bit patterns, indicating different quality levels of clocks defined by ITU-T, enable the equipment to determine the quality of the received clock timing signal. This helps to determine whether or not to switch the clock source, i.e. switch to higher quality clock source. The smaller the value of S1 (b5-b8), the higher the level of clock

g n ni

r a e

L e

or

quality.

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-39

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The Section Overhead is responsible for section layer OAM functions while the Path Overhead for path layer OAM functions. Like transporting the cargoes loaded in the container: not only the overall impairment status of the cargoes (SOH) but also the

s e c r u o s e R

impairment status of each cargo (POH) shall be monitored. 

According to the "width" of the monitored path (the size of the monitored cargo) , the Path Overhead is further classified into Higher Order Path Overhead and Lower Order Path Overhead. In this curriculum the Higher Order Path Overhead refers to the monitoring of VC-4 level paths within the STM-N frame. The Lower Order Path Overhead implements the OAM functions for VC-12 path level, i.e. monitoring the transmission performance of 2Mb/s signals within the STM-N frame.

g n ni

r a e

L e



or

The Higher Order Path Overhead, consisting of 9 bytes, is located in the first column of the

VC-4 frame.

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-40

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The AU-PTR pointer indicates the specific location of the start of the VC-4 within the AU-4, i.e. the location of the first byte of the VC-4, so that the receive end can properly extract VC-4 from the AU-4 according to the value of this AU-PTR. The J1 is the start of the VC-4,

s e c r u o s e R

so the AU-PTR indicates the location of the J1 byte. 

The J1 byte is used to transmit repetitively a Higher Order Path Access Point Identifier so that a path receiving terminal can verify its continued connection to the intended transmitter (this path is under continued connection). This requires that the J1 bytes of the received and transmit ends match. The default transmit/receive J1 byte values of the equipments provided by Huawei Company are “HuaWei SBS”. Of course the J1 byte can be configured and modified according to the requirement.

g n ni

r a e

L e



or

The received J1 should match or be same with the expected J1. If not, HP-TIM alarm will

be generated, which perhaps interrupts the service within the VC4 sometimes.

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-41

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The B3 byte is allocated for monitoring the transmission error performance of VC-4. Its monitoring mechanism is similar to that of the B1 and B2 except that it is used to process BIP-8 parity for the VC-4 frame.



Once the receive end detects error blocks, the number of error blocks will be displayed in the performance monitoring event ---- HP-BBE (Higher Order Path Background Block

s e c r u o s e R

Error) of the received end. At the same time, G1 (b1-b4) will be used to report to the transmit end that error blocks have been detected, and the transmit end will report HPFEBBE (Higher-order Path Far End Background Block Error) performance event and HP-REI (Higher-order Path Remote Error Indication) alarm.

g n ni

r a e



When the error bits detected by the receive end exceed a given threshold, the equipment will report corresponding alarms. When the error bit ratio (EBR) is greater than 10E-6, the

or

given alarm is B3-SD. When the error bit ratio (EBR) is greater than 10E-3, B3-EXC will be given.

L e

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-42

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The C2 is allocated to indicate the composition of multiplexing structure and information payload of the VC frame, such as equipped or unequipped status of the path, the type of loaded services and their mapping method. For example, C2=00H indicates that this VC-4

s e c r u o s e R

path is unequipped. Then the payload TUG-3 of the VC-4 is required to be inserted all "1" --- TU-AIS and the higher order path unequipped alarm ---- HP-UNEQ appears in the equipment. C2=02H indicates that the payload of the VC-4 is multiplexed via a TUG structure multiplexing route. In China, the multiplexing of 2Mb/s signals into VC-4 adopts the TUG structure. To configure the multiplexing of 2Mb/s signals for Huawei equipments, the C2 is required to be configured as TUG structure. 

g n ni

r a e

The received C2 should match or be same with the expected C2. If not, HP-SLM alarm will be generated, which interrupts the service within the VC4 sometimes.

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-43

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The LPOH here refers to the path overhead of the VC-12 that monitors the transmission performance of the VC-12 path level, i.e. monitors the transmission status of 2Mb/s PDH signals within the STM-N frame. Where is the LPOH located within the VC-12? The lower

s e c r u o s e R

order POH is located in the first byte of each VC-12 basic frame. An LP-POH consists of four bytes denoted V5, J2, N2 and K4. Usually, V5 byte is the most important in LPOH. 

The V5 provides the functions of error checking, signal label and path status of the VC-12 paths. So this byte has the functions of the G1, B3 and C2 bytes within the higher order path overhead. If the V5 (b1b2) of the receive end have detected error blocks, the number of error blocks detected by the V5 (b1b2) will be displayed in this end performance event LP-BBE (Lower-order Path Background Block Error). At the same time, V5 (b3) will be used to report to the transmit end that error blocks have been detected, and the transmit end

g n ni

r a e

L e

or

will report LP-FEBBE (Lower-order Path Far End Background Block Error) performance event and LP-REI (Lower-order Path Remote Error Indication) alarm. When the error bits detected by the receive end exceed a given threshold, the equipment will report corresponding alarms. When the error bit ratio (EBR) is greater than 10E-6, the given alarm is BIP-SD. When the error bit ratio (EBR) is greater than 10E-3, BIP-EXC will be given.



Bit 8 of the V5 is allocated for the VC-12 Path Remote Defect Indication. An LP-RDI (Lower

M

Order Path Remote Defect Indication) is sent back to the source if either a TU-12 AIS signal or signal failure condition is being detected by the sink. Notes: In this curriculum, RDI is called remote deterioration indication or remote defect indication.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-44

/e m o i.c

e w a u .h



// : p

The function of the pointers is aligning via which the receiver can properly extract the corresponding VC from the STM-N and then disassemble the VC and C packages and extracts the lower rate PDH signals, i.e. directly drop lower rate tributary signals from the STM-N signal.



t t :h

r a le

g n ni

s e c r u o s e R

What is aligning? Aligning is a procedure by which the frame offset information is incorporated into the Tributary Unit or the Administrative Unit, i.e. via the Tributary Unit Pointer (or Administrative Unit Pointer) attached to the VC to indicate and determine the start of the lower order VC frame within the TU payload ( or the start of the higher order VC frame within the AU payload). When relative differences occur in the phases of the frames and make the VC frames "float", the pointer value will be justified to ensure that it constantly and properly designates the start of the VC frame. For a VC-4, its AU-PTR

g n ni

r a e

L e

M

or

indicates the location of the J1 byte while for a VC-12; its TU-PTR indicates the location of the V5 byte. The TU pointer or AU pointer provides a method of allowing flexible and dynamic alignment of the VC within the TU or AU frame because these two pointers are able to accommodate differences, not only in the phases of the VC and the SDH, but also in the frame rates.

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-45

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The AU-PTR, located in row 4 of columns 1 to 9 within the STM-1 frame, is used to indicate the specific location of the fist byte J1 of the VC-4 within the AU-4 payload so that the receiver can properly extract the VC-4. The AU-4 pointer provides a method of

s e c r u o s e R

allowing flexible and dynamic alignment of the VC-4 within the AU-4 frame. Dynamic alignment means that the VC-4 is allowed to "float" within the AU-4 frame. Thus, the pointer is able to accommodate differences, not only in the phases of the VC-4 and the SOH, but also in the frame rates. The pointer contained in H1 and H2 designates the location of the byte where the VC-4 begins. The last ten bits (bits 7-16) of the pointer word carry the pointer value.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-46

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The TU pointer is used to indicate the specific location of the first byte V5 of the VC-12 within the TU-12 payload so that the receiver can properly extract the VC-12. The TU pointer provides a method of allowing flexible and dynamic alignment of the VC-12 within

s e c r u o s e R

the TU-12 multi-frame. The TU-PTR is located in the bytes denoted V1, V2, V3 and V4 within the TU-12 multi-frame. 

The TU pointer of TU3 consists of H1, H2 and H3. Their function is similar to that of AUPTR.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-47

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



K2 byte is used to monitor the status of MS, which might generate MS-AIS or MS-RDI alarm.



If the receiver doesn't receive A1 and A2 bytes within five or more successive frames

s e c r u o s e R

(625us), i.e. it can't identify the start of five successive frames (identify different frames), it will enter out-of-frame status and generate out-of-frame alarm ---- OOF. If the OOF keeps for 3ms, the receiver will enter loss-of-frame status ---- the equipment will generate lossof-frame alarm ---- LOF. Meanwhile, an AIS signal will be sent downward and the entire services will be interrupted. Under LOF status, if the receiver stays in normal frame alignment status again for successive 1ms or more, the equipment will restore the normal status.

g n ni

r a e

L e



or

The BIP-8 parity.

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-48

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

SDH Principle

P-49

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-1

/e m o i.c

e w a u .h



t t :h

Contents

r a le

g n ni

// : p

WDM Overview……………………………...…………………………...…..……..Page4

s e c r u o s e R

WDM Transmission Media .....................…………………………….……..……Page16 WDM Key Technologies ………………………………………………......………Page24 Technology Specifications for WDM System..................................................... Page48

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-2

/e m o i.c

e w a u .h



t t :h

About this course: 

r a le

g n ni

// : p

This course mainly introduces the basic knowledge of WDM technologies, expounds key technologies and optical transmission specification of WDM. Through this course, you will have a relatively complete understanding of the WDM knowledge and the development orientation of optical transmission networks.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-3

/e m o i.c

e w a u .h



t t :h

Reference:  

OTC000003 WDM principle

r a le

g n ni

// : p

s e c r u o s e R

ITU-T G.694.1 and G.694.2 (about the wavelength distribution)



ITU-T G.671 (about the optical passive components)



ITU-T G.652 , G.653 and G.655 (about the fiber)

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-4

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-5

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



SDM increases the transmission capacity linearly by adding the number of optical fibers, and the transmission equipment will be increased linearly, too.



TDM keeps the same transmission medium but increases the bit rate. The equipment is getting more and more complicated and expensive. Additionally, the maximum transported capability over a fiber pair is in the range of a few 10Gbps.



The way to scale to higher transported capacity is WDM. This technology keeps the same fiber, the same bit rate, but uses multiple colours to multiply transported capacity.



WDM is widely used in the national and metro backbone transmission systems.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-6

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

Legend:  Freeway: Fiber  Patrol Car: Supervisory Signal  Gas Station: Optical Relay  Gray Car: Client Service  Colored Car: Service in different channels (wavelength)  Driveway: Optical Wavelength Wave Division Multiplexing is a technology that utilizes the properties of refracted light to both combine and separate optical signals based on their wavelengths within the optical spectrum.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-7

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The Greek letter lambda (  ) , is often used to designate individual wavelengths.



Key word in the content is specific wavelength. How specific ? Please refer to ITU-T series recommendations in chapter 4.



WDM allows for a more efficient use of existing fiber by providing multiple optical paths along a single (pair of) fiber (s).



WDM allows for a greater range of protocol transmission better suited than legacy network for data centric applications. (E.g.. GE, ESCON, Fiber Channel, D1 video)

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-8

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



OTU: Access the client service and convent the wavelength complied with ITU standards.



OMU: Multiplex several services with different wavelength into one main path signal



ODU: Demultiplex one main path signal into several individual signals.



OA: Amplifies the optical signal.



OLA: Optical Line Amplifier



OSC: Optical Supervisory Channel



ESC: Electrical Supervisory Channel

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-9

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Unidirectional WDM system adopts two optical fibers. One only implements the transmission of signals in one direction while the other implements the transmission of the signals in the opposite direction.



This tansmission mode is widely used in the worldwide.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-10

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Bi-directional wave WDM system utilizes only one optical fiber. The single fiber transmits optical signals in both directions simultaneously, and the signals in the different directions should be assigned on different wavelengths



Note:

s e c r u o s e R



To MUX/DEMUX the signals in one fiber, circulator is recommended.



This mode is usually used in the CWDM system to reduce the cost

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-11

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Integrated system does not adopt the wavelength conversion technology, instead, it requires that the wavelength of the optical signals at the multiplex terminal conforms to the specifications for the WDM system



The optical interface in the client equipment that could provide standard wavelength is called colored interface. Huawei series OSN products could support this function

 Thought: 

s e c r u o s e R

Can some channels use OTU and some channels use colored interface?

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-12

/e m o i.c

e w a u .h

t t :h



Up to know the capacity is 1920Gbps at most.



Data Transparency Transmission: 

r a le

g n ni

// : p

s e c r u o s e R

WDM doesn’t change the structure or any byte in the frame for the client signal



Long Haul transmission: 5000km without REG / 230km long hop.



Smooth expansion: modularization and no affect the existing services

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-13

/e m o i.c

e w a u .h



t t :h



No amplification=a lower-cost system and distance-limited system

Comparison between CWDM and DWDM

g n ni

r a e

L e

M

s e c r u o s e R

Fewer channels=cheaper hardware

Types Channel Spacing

or

// : p

CWDM greatly reduces the system cost while providing certain amount of wavelengths and transmission distance within 100 km. 



r a le

g n ni

CWDM 20nm

DWDM 100GHz/50GHz/25GHz C-band: 1529nm~1561nm L-band: 1570nm~1603nm

Band

1311~1611nm

Capacity Laser

16 x 2.5Gb/s = 40G Un-cooled Laser

192 x 10Gb/s = 1920G Cooled Laser

Cost

70%

100%

Application

100km

5000km

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-14

/e m o i.c

e w a u .h



t t :h

Fill in the blanks:

r a le

g n ni

// : p

1. WDM System includes:________, _________, _________ and __________;

s e c r u o s e R

2. CWDM system could use optical amplifiers (True or False) __________; 3. ESC means____________________________________. Need additional wavelength to transmit in the fiber (True or False) _________. 4. Single fiber bidirectional transmission (can or can not )_________ use the same wavelength for transmitting and receiving.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-15

/e m o i.c

e w a u .h



OTU, MUX/DeMUX, OA,OSC



False



Electrical Supervisory Channel,False



Can not

g n ni

t t :h

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-16

/e m o i.c

e w a u .h



t t :h

Objectives for this chapter:

// : p



List the characteristics of the fiber



Classify different types of the fiber



Outline the methods to against the factors

g n ni

r a le

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-17

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

An optical fiber consists of two different types of solid glass —the core and cladding—that are mixed with specific elements to adjust their refractive indices. The difference between the refractive indices of the two materials causes most of the transmitted light to bounce off the cladding and stay within the core. The critical angle requirement is met by controlling the angle at which the light is injected into the fiber. Two or more layers of protective coating around the cladding ensure that the glass can be handled without damage.

g n ni

s e c r u o s e R

N1 and N2, which one is larger ?

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-18

/e m o i.c

e w a u .h



Band

Wavelength



Original

1260~1360



Extended

1360~1460

100



Short

1460~1525

65



Conventional

1525~1565

40



Long

1565~1625

60



Ultra long

1625~1675

50

M

or

// : p

Bandwidth (nm)

s e c r u o s e R

100

n r a

Combining the above losses, the attenuation constant of single mode fiber at 1310nm and 1550nm wavelength areas is 0.3~0.4dB/km (1310nm) and 0.17~0.25dB/km (1550nm), respectively. As defined in ITU-T Recommendation G.652, the attenuation constant at 1310nm and 1550nm should be less than 0.5dB/km and 0.4dB/km, respectively.

e L e



g n i

t t :h

r a le

g n ni

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-19

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Dispersion in fiber refers to a physical phenomenon of signal distortion caused when various modes carrying signal energy or different frequencies of the signal have different group velocity and disperse from each other during propagation

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-20

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



G.652 fiber is currently a single mode fiber for widely use, called 1310nm property optimal single mode fiber and also called dispersion unshifted fiber



G.653 fiber is called dispersion shifted fiber or 1550nm property optimal fiber. By designing the refractive index cross section, the zero dispersion point of this kind of fiber is shifted to the 1550nm window to match the minimum attenuation window. This makes it possible to implement ultrahigh speed and ultra long distance optical transmission



G.655 fiber, a nonzero dispersion shifted single mode optical fiber, is similar to G.653 fiber and preserves certain dispersion near 1550nm to avoid four-wave mixing phenomenon in DWDM transmission. It is suitable for DWDM system applications

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-21

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



DCF is one special kind of optical fiber, with the negative dispersion at 1550nm window



The dispersion coefficient is -90~-120ps/nm.km



DCF can counter act positive dispersion while bring new insertion loss and increasing of PMD

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-22

/e m o i.c

e w a u .h



t t :h

Fill in the blanks:

r a le

g n ni

// : p

1. The attenuation coefficient of G.652 fiber is __________; approximately ________ for engineering planning

s e c r u o s e R

2. The dispersion coefficient of G.655 at 1550nm window is_______________ 3. The dispersion coefficient of G.652 at 1310nm window is__________; at 1550nm window is___________

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-23

/e m o i.c

e w a u .h

t t :h



Coating, Cladding, Core



G.652, G.653, G.655



Attenuation, Dispersion, Nonlinear effect

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-24

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-25

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-26

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-27

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Output laser is controlled by input current. The variation of the modulation current causes the variation of output wavelength



This variation, called modulation chirp, is actually a kind of wavelength (frequency) jitter inevitable for direct modulation of the sources. The chirp broadens the bandwidth of the emitting spectrum of the laser, deteriorates its spectrum characteristics and limits the transmission rate and distance of the system



Transmission rate is limited to 2.5Gbit/s, and transmission distance is less than 100km



Similar Specification –This kind of modulator is Widely used in CWDM system

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-28

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



EA modulator adopts different structure, use stable DC current to let LD output a standard wavelength (complied with ITU-T). EA module act as a door that open only happens to the current change. In this way, the information is modulated into the wavelength



Less chirp = Support long haul transmission (2.5Gb/s > 600km)



High Dispersion tolerance (2.5Gb/s: 7200~12800ps/nm)



Most widely used in DWDM

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-29

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

This modulator separates the light input into two equal signals which enter the two optical branches of the modulator respectively. These two optical branches employ an electrooptical material whose refractive index changes with the magnitude of the external electrical signal applied to it. Changes of the refractive index of the optical branches will result in the change variation of the signal phases. Hence, when the signals from the two branches recombine at the output end, the combined optical signal is an interference signal with varying intensity. With this method, the frequency chirp of the separated external modulated laser can be equal to zero

g n ni

s e c r u o s e R



Long dispersion limited distance



High cost with good performance



Negligible chirp



Not widely used

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-30

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

As a maturing technology, direct modulator and indirector modulator are widely used in WDM system

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-31

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The EDFA amplifier is widely used in WDM system

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-32

/e m o i.c

e w a u .h



t t :h

Principle: 





r a le

g n ni

// : p

The outer electrons of Er ions have 3 energy levels, where E1 is the basic state energy level, E2 is the metastable state energy level and E3 is the high energy level

s e c r u o s e R

When high-energy pump lasers are used to excite the EDF, lots of bound electrons of the erbium ions are excited from E1 to E3 level, then soon dropped to the E2 level via a non-radiation decay process (i.e. no photon but heat is released) When a signal with the wavelength of 1550nm passes through this erbium-doped fiber, particles in the metastable state are transited to the basic state via stimulated radiation and generate photons identical to those in the incident signal light

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-33

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



TAP is used to spilt out a little part of energy and send it to the PD to detection



ISO is used to make sure the signal transmit in one direction



Pump laser has two type: with 980nm and with 1480nm



If we want to get a high gain, we could cascade EDF and pumping laser

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-34

/e m o i.c

e w a u .h







t t :h

Advantage:

// : p

Fortunately, 1550nm is in the low attenuation window, the emergence of EDFA greatly activate the development of WDM

Disadvantage: 

r a le

g n ni

s e c r u o s e R

Gain un-flatness

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-35

/e m o i.c

e w a u .h

t t :h

// : p



If we cannot control the gain, optical surge generates



With AGC function:



r a le

g n ni

s e c r u o s e R



When add wavelengths from 1 to 40, the gain will be not changed



When drop wavelengths from 40 to 1, the gain will be not changed also

Key Component is the DSP that makes the nonlinear calculation

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-36

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Principle:



Fiber has wide SRS gain spectrum and a wide gain peak around a frequency 13THz lower than that of the pumping light. If a weak signal and a strong pumping light wave are transmitted through the fiber at the same time, and the wavelength of the weak signal is set within the Raman gain bandwidth of the strong pumping light, the weak signal can be amplified. Such SRS-based OA is call Raman optical amplifier. Raman optical amplifier’s gain is the switch gain, that is, the difference between the output power when the amplifier is on and that when the amplifier is off

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-37

/e m o i.c

e w a u .h



// : p



The gain wavelength is determined by the pumping light wavelength



The gain medium is the transmission fiber itself, low noise





t t :h

Advantage:

r a le

g n ni

s e c r u o s e R

As the amplification is distributed along the fiber with the comparatively low signal power, it reduces the interference from non-linear effect, especially FWM effect

Disadvantage:

g n ni



High power is harmful for body



Be careful when put operation on Raman

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-38

/e m o i.c

e w a u .h



t t :h

According to its application: 





r a le

g n ni

// : p

BA: Booster amplifier, mainly used in the transmit end. For the hardware description, you will see OBU card

s e c r u o s e R

LA: Line amplifier, mainly used in the amplifier station, could be recognized as BA+PA. For the hardware description, you will see OAU card PA: Pre-amplifier, mainly used in the receive end. For the hardware description, you will see OPU card

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-39

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

For all the optical lights are bidirectional, the mechanisms of multiplexer and demultiplexer are the same. Here in after we just discuss about the multiplexer, if you reverse the direction, it could also be considered as a demultiplexer

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-40

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Film Filter offers good stability and isolation between channels at moderate cost, but with a high insertion loss



So the number of dropping wavelength is limited

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-41

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The waveguides are connected to cavities at the input and output. When the light enters the input cavity, it is diffracted and enters the waveguide array. There the optical length difference of each waveguide introduces phase delays in the output cavity, where an array of fibers is coupled. The process results in different wavelengths having maximal interference at different locations, which correspond to the output ports

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-42

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

OSC is often used in the backbone wavelength system, and ESC is normally used in metropolitan system

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-43

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Pumping wavelength of OA: 980nm or 1480nm.



1310nm already defined by ITU-T for future use.



OA fails, all signal lost, requires the supervisory signal continue to transmit alarms and other indications.



The receive sensitivity of the OSC unit is very good, up to -48dBm.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-44

/e m o i.c

e w a u .h

t t :h

// : p



FA: Frame alignment



E1 E2 : Orderwire



ALC: Automatic Level Control.



F1 F2 F3 : transparent serials data



D1-D12: DCC bytes, data communication channel

g n ni

r a le

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-45

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The optical transponder unit (OTU) multiplexes the supervisory information into the service channel for transmission



The ESC reduces the investment of the OSC. It also deletes the insertion loss of the FIU. This lowers the cost and the power budget of optical channels

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-46

/e m o i.c

e w a u .h



t t :h

Fill in the blanks:

r a le

g n ni

// : p

1. EDFA means:______________________; its pumping wavelength is___________; We can calculate noise figure by _________。

s e c r u o s e R

2. AWG means:______________________; TFF means:________________________; 3. OSC signal’s frame structure is_____________, (can, can not) by amplified by OA. 4. ESC support OLA station ?_______(True, False)

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-47

/e m o i.c

e w a u .h



LD, EA, M-Z



EDFA, Raman



TFF, AWG



OSC, ESC

g n ni

t t :h

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-48

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-49

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

ITU-G.692 – Optical Interfaces for Multi-Channel Systems with Optical Amplifiers 

This recommendation specifies multi-channel optical line system interfaces for the purpose of providing future transverse compatibility among such systems. The current recommendation defines interface parameters for systems of four, eight, and sixteen channels operating at bit rates of up to STM-16 on fibers, as described in Recommendations G.652, G.653, and G.655 with nominal span lengths of 80 km, 120 km, and 160 km and target distances between regenerators of up to 640 km. A frequency grid anchored at 193.1 THz with inter-channel spacing at integer multiples of 50 GHz and 100 GHz is specified as the basis for selecting channel central frequencies

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-50

/e m o i.c

e w a u .h









S1…Sn: The reference points on the fiber at transmitter optical output connector in channels 1…n

s e c r u o s e R

RM1 RMn: The reference points on the fiber at OM/OA optical input connector in channels 1…n MPI-S: A reference point on the optical fiber just behind the OM/OA optical output connector

g n ni

S': A reference point on the optical fiber behind the optical output connector of the optical line amplifier

r a e

L e

M

// : p

The WDM system in the above figure has the following reference points: 

or

t t :h

r a le

g n ni





R': A reference point on the optical fiber in front of the optical input connector of the optical line amplifier MPI-R: A reference point on the optical fiber in front of the OA/OD input optical connector



SD1…SDn: The reference points at the OA/OD optical output connector



R1…Rn: The reference points at receiver optical transmitter input connector

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-51

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-52

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

WDM Principle

P-53

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-1

/e m o i.c

e w a u .h



t t :h

Contents

r a le

g n ni

// : p

Optical transport hierarchy ………………...………………………………………….Page4

s e c r u o s e R

OTN interface structure………………………...………………………………………Page8 Multiplexing/mapping principles and bit rates………..……...……………………...Page15 Overhead description…………………………………..………………………..……Page28 Maintenance signals and function for different layers………….…………………..Page48

g n ni

Alarm and performance events ……………………………………..……………….Page59

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-2

/e m o i.c

e w a u .h



t t :h

This Course is mainly based on:

r a le

g n ni

// : p



ITU-T G.872

Architecture of optical transport networks



ITU-T G.709

Interfaces for the Optical Transport Network (OTN)



ITU-T G.874

Management aspects of the optical transport network element



ITU-T G.798

Characteristics of optical transport network hierarchy equipment

s e c r u o s e R

functional blocks

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-3

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-4

/e m o i.c

e w a u .h



t t :h

Objectives for the first chapter:

r a le

// : p



Describe the features of OTN



Outline the protocols which supports OTN system

g n ni

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-5

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



One important feature of OTN is that the transmission setting of any digital customer signal is independent of specific features of the customer, that is, independence of customer.



According to the requirements given in Rec. G.872.



The optical transport network supports the operation and management aspects of optical

s e c r u o s e R

networks of various architectures.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-6

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Compared with SDH/SONET, the benefits of OTN are as follows: 

Strong scalability of the capacity: The cross-connect capacity can be expanded to dozens of T bit/s.

s e c r u o s e R



The customer signal transparency covers payload and clock information.



The asynchronous mapping eliminates restriction on the synchronization in the whole network, with stronger FEC. The simplified system design can decrease the networking costs.





r a e

Compared with the traditional WDM:

L e

M

or

g n ni

Up to 6-level TCM monitoring management capability.

 

Effective monitoring capability: OAM&P and network survivability

Flexible optical/electrical grooming capability, carrier-class, manageable, and operable networking capability.

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-7

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

G.874, management features of optical transmission NE, describes the management feature of the OTN NE and transmission function of one or more network layers in the OTN. The management of the optical layer network is separated from the management of

s e c r u o s e R

the customer layer network. Therefore, the same management method that is independent of the customer can be used. G.874 defines fault management, configuration management, billing management, and performance monitoring. G.874 describes the management network architecture model between the NE EMS and optical NE equipment management functions. 

g n ni

G.798, feature of equipment function block of the optical transport network, defines the function requirements of the optical transmission network in the NE equipment.

r a e

L e



M

or



G.709, OTN interface, defines OTM-n signal requirements of OTN, including OTH, support

of multi wavelength optical network overhead, frame structure, bit rate, and format of mapping customer signals. G.872, OTN architecture, defines the relation between OTN hierarchical architecture, feature information and customer/service layer, and the function description of the network topology and layer network.

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-8

/e m o i.c

e w a u .h



t t :h

Objectives for this chapter:

r a le

g n ni

// : p



Draw the frame structure of OTN;



Outline the function of each part in OTN frame;



Brief introduce the difference between OTM-n.m and OTM-0.m;



Describe how does a client signal are encapsulated to OTN frame.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-9

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



OPUk: Optical channel Payload Unit-k



ODUk: Optical channel Data Unit-k



OTUk: completely standardized Optical channel Transport Unit-k



OTUkV: functionally standardized Optical channel Transport Unit-k



OCh: Optical Channel with full functionality



OChr: Optical Channel with reduced functionality



OMS: Optical Multiplex Section



OTS: Optical Transmission Section



OPS: Optical Physical Section



OTM: Optical Transport Module

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-10

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Now we introduce the basic information contained in OTM-n.m, OTM-nr.m, and OTM-0.m. The rates and frame formats comply with ITU-T G.709 recommendations.



The figure on the right shows the composition of the OTM-n.m signals of the OTM interface with complete function. The OTM-n.m is composed of up to n multiplexing wavelengths and OTM overhead signals that support the non-associated overhead. Where, m can be 1, 2, 3, 12, 23, or 123.”m=1” indicates the bearer signals are OTU1/OTU1V. m=2: indicate the bearer signals are OTU2/OTU2V. “m=3” indicates the bearer signals are OTU3/OTU3V. “m=12” indicates partial bearer signals are OTU1/OTU1V and partial bearer signals are OTU2/OTU2V. “m=23” indicates partial bearer signals are OTU 2/OTU2V and partial bearer signals are OTU3/OTU3V. “m=123” indicates partial bearer signals are OTU 1/OTU1V, partial bearer signals are OTU2/OTU2V, and partial bearer signals are OTU3/OTU3V. The physical optical feature specifications of OTM-n.m signals are determined by the suppliers. The recommendations do not have specific specifications.

g n ni

s e c r u o s e R

r a e

L e



M

or

The signal mapping or multiplexing of each layer is introduced in the above. Here, we will not repeat it.



Note: The optical layer signal OCh is composed of OCh payload and OCh overhead. After the OCh is modulated to the OCC, multiple OCC time division multiplexes (TDM) constitute the OCG-n.m unit. OMSn payload and OMSn overhead constitute the OMU-n.m. OTSn payload and OTSn overhead constitute the OTM-n.m unit.



The overhead and generic management information of the optical layer units constitute the OTM overhead signal (OOS), which is transmitted by 1-channel independent OSC in the non-associated overhead.



The overhead of electrical layer units such as OPUk, ODUk, and OTUk are the associated channel overheads, which are transmitted together with the payload.

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-11

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The OTM-nr.m signals are composed of up to n optical channel multiplexing, and does not support the non-associated overhead. At present, m of OTM-16r.m can be 1, 2, 3, 12, 23, or 123, where, the physical optical feature specifications of OTM-16r.1 and OTM-16r.2 are

s e c r u o s e R

defined in G959.1 of ITU-T. The physical optical feature specifications of other four signals are in need of the further study. 

The electrical layer signal structures of OTM-nr.m and OTM-n.m are the same. The optical layer signals do not support the non-associated overhead OOS, without the optical monitor channel. Therefore, it is called the OTM interface with the reduced function.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-12

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

OTM-0.m is composed of the single optical channel. It does not support the associated overhead OOS and is without specific wavelength configuration. Only one optical channel is contained; therefore, m can be 1, 2, or 3 only. The physical optical feature specifications

s e c r u o s e R

of OTM-0.1, OTM-0.2, and OTM-0.3 are defined in G.959.1 and G.693. 

The electrical layer signal structure of three OTM interfaces are the same, the electrical layer signals are monitored through the associated overhead. The difference is: The OTMn.m optial layer signals supports the transmission of the non-associated overhead through 1-channel OSC. The OTM-nr.m and OTM-0.m do not support the optical layer overhead.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-13

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-14

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Now, we introduce the OTN network interface. As shown in the figure, the interface between user A and network operator B is the UNI, and the interface between different OTN networks is NNI. G.872 defines two OTN network interfaces: IrDI and IaDI. The IrDI

s e c r u o s e R

refers to the network interface between different operators, for example, the interface between operators B and C as shown in the figure. The IaDI refers to the network interface within the same operator. According to the suppliers, the IaDI includes the interface between different supplier equipment IrVI (for example, the interface between supplier equipment X and supplier equipment Y in operator B’s domain as shown in the figure) and the subnet interface of the same supplier equipment IaVI (for example, the interface between supplier equipment X subnet and supplier equipment Y subnet).

g n ni

r a e

L e



M

or

The OTUk and OTUkV provide the transparent network connection between 3R

regenerator points. The OTUk is applicable to OTM IrDI and IaDI. The OTUkV is applicable to OTM IaDI only.

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-15

/e m o i.c

e w a u .h



t t :h

Objectives for this chapter:

r a le

g n ni

// : p



Draw the mapping route of OTM;



List the rate of all types of OTUk,ODUk and OPUk signals;



Describe how does a lower rate ODUk multiplex to a higher rate ODUk.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-16

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-17

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-18

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-19

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-20

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-21

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Now we introduce the frame rate of OPU/ODU/OTU. The size of OTUk is fixed, that is, OTU1, OTU2, and OTU3 are 4-line and 4080-column. For OTU1 frames, from Column 1 to Column 16, there are OTU1, ODU1, and OPU1 overhead. From Column 17 to Column 3824 (with 3808 columns in total), there are customer signals. From column 3825 to column 4080 (with 256 columns in total), there are FEC areas. Assume the customer signals are STM-16 SDH signals, the rate is 2 488 320kbit/s, the calculations are as follows:

s e c r u o s e R



Customer signal size/OTU frame size = Customer signals rate / nominal OTU frame rate



3808/4080 = 2 488 320 / nominal OTU1 frame rate



That is, nominal OTU1 frame rate = 255/238 x 2 488 320 kbit/s



For OTU2 frames, four ODU1s are combined to ODTUG2 through the TDM. Four ODU1s operate as the OPU2 payload, occupying 3808 columns. In OPU2 payload, there are 16 columns of OTU1, ODU1, and OPU1 overhead. Therefore, the customer signals are 3792 columns. The calculation is as follows:

g n ni

r a e

L e

M

or



3792/4080 = 2 488 320 x 4 / nominal OTU2 frame rate



That is, nominal OTU2 frame rate = 255/237 x 9 953 280 kbit/s



The nominal OTU3 frame rate = 255/236 x 39 813 120 kbit/s



For OTU1/2/3 frame rate, the conclusion is as follows:



OTUk rate = 255/(239-k) x STM-N frame rate



Where, k=1, 2, 3 correspond to the frame rate of STM-16, STM-64, and STM-256 respectively.



The OTU bit rate tolerance is ± 20 ppm.

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-22

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

NOTE – The nominal ODUk rates are approximately: 2 498 775.126 kbit/s (ODU1), 10 037 273.924 kbit/s (ODU2), 40 319 218.983 kbit/s (ODU3), 104 794 445.815 kbit/s (ODU4) and 10 399 525.316 kbit/s (ODU2e).

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-23

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

NOTE – The nominal OPUk payload rates are approximately: 1 238 954.310 kbit/s (OPU0 Payload), 2 488 320.000 kbit/s (OPU1 Payload), 9 995 276.962 kbit/s (OPU2 Payload), 40 150 519.322 kbit/s (OPU3 Payload), 104 355 975.330 (OPU4 Payload) and 10 356

s e c r u o s e R

012.658 kbit/s (OPU2e Payload). The nominal OPUk-Xv Payload rates are approximately: X × 2 488 320.000 kbit/s (OPU1-Xv Payload), X × 9 995 276.962 kbit/s (OPU2-Xv Payload) and X × 40 150 519.322 kbit/s (OPU3-Xv Payload).

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-24

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-25

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-26

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

First of all, we introduce how four ODU1 multiplex to one ODU2. Use the frame alignment overhead to expand one ODU1 signal, and use the JOH to map them asynchronously to the optical channel data tributary units 1 and 2 (ODTU12). Then, four ODTU12 is combined

s e c r u o s e R

to ODTUG2 in the TDM mode, and ODTUG2 is mapped to the OPU2. Finally, the OPU2 is mapped to the ODU2.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-27

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The second TDM: Multiplex the ODU1 signal or ODU2 to ODU3 signals, or ODU1 and ODU2 are multiplexed to ODU3 signals.



The multiplexing includes two steps:



Procedure 1: For the ODU1 signal, use the frame alignment overhead to expand one ODU1 signal, and asynchronously map to the ODTU13 by using the JOH.



Procedure 2: For the ODU2 signals, use the frame alignment overhead to expand one ODU2 signal, and use the JOH to asynchronously map them to the ODTU23; then, j ODTU23 (0  j  4) and (16-4j) ODTU13 signal are combined to ODTUG3 in the TDM mode. Then, ODTUG3 is mapped to the OPU3. Finally, the OPU3 is mapped to the ODU3. In this way, the TDM from ODU1 and ODU2 to ODU3 is completed.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-28

/e m o i.c

e w a u .h



t t :h

Objectives for this chapter:

// : p



List the overheads in OTN frame;



Describe the function of each overhead.

g n ni

r a le

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-29

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The OPUk is in the area from row 15 to row 3824, where, OPUk overhead area is from column 15 to column 16, OPUk payload area is from column 17 to column 3824, customer signals are in the OPUk payload area.



The ODUk is in the block structure with 4 lines and 3824 columns, which is composed of ODUk overhead and OPUk, where ODUk overhead area is from row 1 to row 4 and from

s e c r u o s e R

column 1 to column 14. The frame alignment overhead area is from column 1 to column 7 in the first line. Column 8 to 14 in the first line are all-zero. 

g n ni

The OTUk overhead area is from column 8 to column 14 in the first line, and the FEC area is from column 3825 to column 4084 (256 columns in total) on the right of the frame. The frame alignment overhead area is from Column 1 to column 7 of the first line in the frame header.

r a e

L e

or



The customer signal rate corresponding to OTU1/2/3 is respectively 2.5G/10G/40Gbits/s. The OTUk frame structure of each level is the same. The OTUk signals at the ONMI must have the sufficient bit timing information. Therefore, the OTUk provides the scramble function, to construct an appropriate bit pattern by using a scrambler, with the avoidance of long “1” or long “0” series. With the consideration of the framing, the OTUk overhead FAS should not be scrambled. The scrambling operation is performed after FEC calculation and insertion of OTUk signals.



The transmission sequences of the bytes in the OTUk frame is from left to right, from top down

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-30

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The figure shows the overall electrical layer overhead, include frame alignment overhead, OTUk layer overhead, ODUk layer overhead, and OPUk layer overhead.



The frame alignment overhead is used for the framing. It is composed of 6-byte frame

s e c r u o s e R

alignment signal overhead FAS and 1-byte multi-frame alignment overhead MFAS. 

OTUk layer overhead supports the transmission operation function connected through one or more optical channel. It is composed of 3-byte SM, 2-byte GCC0, and 2-byte RES. It is terminated at the OTUk signal assembly and dissemble places.



g n ni

ODUk layer overhead is used to support the operation and maintenance of the optical channel. It is composed of 3-byte PM for end-to-end ODUk channel monitoring, 6-level TCM1-TCM6 with 3 bytes respectively, 1-byte TCMACT, 1-byte FTFL, 2-byte EXP, 2-byte GCC1, 2-byte GCC2, 4-byte APS/PCC, and 6-byte reservation overhead. The ODUk

r a e

L e

M

or



overhead is terminated at the ODUK assembly and disassemble places. TC overhead is added at the source, and is terminated at the sink. OPUk overhead is used to support the customer signal adaptation. It is composed of 1byte PSI, 3-byte JC, 1-byte NJO, and 3-byte reservation overhead. It is terminated at the OPUk assembly and disassemble places.

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-31

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Frame Alignment Signal (FAS) is used for the frame alignment and positioning, with the length of six bytes. It is located in Column 1 to Column 6 of Line 1. The contents are shown in the figure: three OA1 plus three OA2 series. The value of OA1 is 0xF6, and the

s e c r u o s e R

value of OA2 is 0x28.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-32

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Multi-Frame Alignment Signal (MFAS) follows the FAS. Some OTUk and ODUk overheads, for example, TTI, should cross multiple OTUk/ODUk frames. These overheads must implement the OTUk/ODUk frame alignment and multi-frame alignment processing. The

s e c r u o s e R

MFAS is used for the multi-frame alignment. 

The length of the overhead is one byte, and is located in Line 1 Column 7.



The value of the MFAS bytes increases with the increase of the OTUk/ODUk basic frame number, from 0 to 255 (with up to 256 basic frames). For the overhead of each multiframe structure, the length can be adjusted. For example, if an overhead uses the multiframe structure with 16 basic frames, bit1-bit4 are not calculated when the multi-frame signals are extracted.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-33

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The SM overhead is composed of three bytes.



The trail trace identifier (TTI), with the length of one byte, is located in the first byte of the SM overhead. It is used to transmit 64-byte OTUk-level trail trace identifier signals. The

s e c r u o s e R

content sequence of 64 bytes are: 

Byte 0 includes SAPI[0] character, with the fixed value of all zeroes.



Byte 1-byte5 include 15-character SAPI.



Byte 16 includes DAPI[0] character, with the fixed value of all zeroes.



Byte 17-byte 31 include 15-character DAPI.



Byte 32- byte 63 are the contents designated by the operator.

g n ni

r a e

L e



or

The 64-byte TTI signal should align with the OTUk multi-frame. Transmit for four times in each multi-frame. Each multi-frame contains 256 frames.

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-34

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Bit Interleaved Parity-8 (BIP-8) byte is used for the detection of the OTUk-level bit error detection. The code is in the even parity inserted among bits. Its length is one byte, located in the second byte of the SM overhead. For BIP8 parity, calculate the bit in the whole

s e c r u o s e R

OPUK frame area of the No.i OTUk frame to obtain the OTUk BIP-8. Insert the results to No.(i+2) OTUk frame OTUk BIP-8 overhead position. In No.(i+2) frame, as shown in the figure, compare this value with the DIP8 calculation results of the current frame. If both values mismatch, detect the bit error block of the near end.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-35

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Backward Error Indication (BEI) and Backward Incoming Alignment Error (BIAE) are used to return the detected bit errors to the upstream of the OTUk-level and to introduce the IAE. The length is four bits. It is located in the most significant four bits of the third byte of the

s e c r u o s e R

SM overhead. In the IAE status, the field is set to 1011. The bit error number and non IAE state is omitted, insert the bit error number (0-8). Other six values may be caused by some irrelevant status. It should be explained as 0 bit error and BIAE inactivation. 

The backward defect indication (BDI) is used for OTUk-level to return the signal invalidity status detected in the terminal sink function. The length is one bit. It is located in Bit5 of byte3 of the SM overhead. When the BDI is set to 1, it indicates OTUk backward defect. Otherwise, it is set to 0.

g n ni

r a e

L e



or

M

The Incoming Alignment Error (IAE) is used for the OTUk-level S-CMEP at the ingress point

to notify the peer S-CMEP at the egress point that the alignment error is detected in the introduction signals. The S-CMEP egress point can use this information to stress the bit error number. These bit error may be caused by the ODUk frame phase change at the TC ingress point. The IAE length is one bit. It is located in bit6 of byte 3 of the SM overhead. The IAE bit is set to 1 to indicate the frame alignment error. Otherwise, it is set to 0.



The last two bits of the SM is reserved, and is set to “00”.



S-Connection Monitoring End Point (CMEP): Section-Connection monitoring end-points represent end points of trails and correspond as such with the trail termination functions.

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-36

/e m o i.c

e w a u .h



// : p

General Communication Channel 0 (GCC0) is used to support the general communication between OTUk terminals. The length is two bytes. It is located in Column 11 to Column 12 of line 1. The GCC0 is the transparent channel. The format specification is not discussed here in this course.



t t :h

r a le

g n ni

s e c r u o s e R

Then, it is the 2-byte OTUk reserved overhead, for the international standardization. It is located in column 13-column 14 of line 1. The reserved overhead is set to all zeroes.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-37

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The PM is similar to the SM.



The PM overhead is composed of three bytes. It is located in column 10-column 12 of line 3. The PM is composed of 1-byte TTI, 1-byte BIP-8, 4-bit BDI, 1-bit BEI, and 3-bit STAT.

s e c r u o s e R

The definitions of TTI / BIP-8 / BEI / BDI are similar to those in SM. These parts support the channel monitor. 

The PM overhead does not support IAE and BIAE function. In addition, BIP-8 of the PM overhead is parity of the whole OPUk frame (column 15- 3824). But, the parity position is in the PM overhead, which differs from the BIP regenerated node in the BIP8.The BEI field needs not to support the BIAE function. Therefore, one value is less that of the SM overhead to indicate the return of the IAE state. Four bits of BEI fields in the PM overhead have nine effective values in total. 0-8 indicates 0-8 bit errors respectively. The other seven

g n ni

r a e

L e

or

values are caused by some irrelevant status, which can be interpreted as 0 bit error.

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-38

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The STAT field is used for the maintenance signals of ODUk channel level. The length is 3 bits. It is located in the least significant 3 bits of Column 12 of Line 3.



The table describes the meaning of the STAT field.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-39

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The ODUk overhead defines TCM1-TCM6 of six domains. The Tandem Connection Monitoring (TCM) overhead supports the monitoring of the ODUk connection. It is used to the scenarios such as one or more optical UNI to UNI, NNI to NNI serial line connection

s e c r u o s e R

monitoring, linear and ring protection switch sub-layer monitoring, the fault location of the optical channel serial line connection, and the service delivery quality acceptance. TCM6TCM1 are located in Column 5-Column 13 of line 2, Column 1-Column 9 of Line 3. Its format is similar to the SM of the OTUk overhead and the PM of the ODUk overhead. 

g n ni

TTIi / BIP-8i / BEIi / BIAEi / BDIi support the TCMi sub-layer monitoring, where, i ranges from 1 to 6. The definitions and functions of these parts are the same as the corresponding parts in SM. But, only the monitoring levels are different.

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-40

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



STAT is used for the maintenance signal of TCMi sub layer, whether the IAE error exists in the source TC-CMEP, whether the source TC-CMEP is activated. The length is 3 bits. It is located in the least significant 3 bits of the TCMi field.



It indicates the meaning of the STAT field.



TCMi overhead has more BIAE function than PM overhead. In the maintenance signals in

s e c r u o s e R

the STAT field, there are more two meanings: No source TC, and TC in use but with IAE error.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-41

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Along one ODUk trail, the monitored connections range from 0 to 6. The monitored multilevel connections can be overlay, nesting, or cascading. At present, the overlay mode is applicable to the test only. Each TC-CMEP inserts or extracts the TCM overhead from six

s e c r u o s e R

TCMi overhead domains. The corresponding network operator, network management system or switching control platform provides the TCMi overhead domain contents. 

As shown in the figure, the monitored connects A1-A2, B1-B2, and C1-C2 are nested, A1A2 and B3-B4 are nested, B1-B2 and B3-B4 are cascaded.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-42

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

As shown in the figure, the monitored connects B1-B2 and C1-C2 are overlaid, A1-A2 and B1-B2 are nested, A1-A2 and C1-C2 are nested.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-43

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

GCC1 and GCC2 can be used to access to the ODUk frame structure (that is, located in 3R regeneration points) between any two NEs. The length is 2 bytes, respectively located in Column 1-2 and Column 3-4 of Line 1. It is the transparent channel. Its function is similar

s e c r u o s e R

to OTUk overhead GCC0. The ESC function can be applied to the product.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-44

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



TCM Activation/Deactivation (TCMACT) overhead is 1-byte long, and is located in Column 4 of Line 2. Its definition is not determined yet.



Automatic Protection Switching (APS)/Protection Communication Control (PCC) overhead is

s e c r u o s e R

applicable to the protection protocol communication, with the length of four bytes. This field can appear in up to 8-level nested APS/PCC signals. It can be used by multiple protection mechanisms. In the multi-frame, the first eight basic frames (for MFAS, it is 0-7) APS/PCC are sequentially allocated to ODUk channel layer, ODUk TCM1-TCM6 sub layers, and OTUk section layer. 

g n ni

The ODUk overhead defines 2-byte EXP, which allows the equipment supplier or network operator to use the extra ODUk overhead on the subnet. The specific function of the EXP is not limited to the standard, which is not defined within G.709 range.

r a e

L e

or



M

The ODUk overhead is allocated with one byte to transmit total 256-byte Fault Type & Fault Location (FTFL). The FTFL message is composed of forward area and backward area, with 128 bytes in each area, respectively containing the forward and backward fault type, operator identifier, and operator designated domain.

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-45

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The OPUk overhead defines 1-byte payload structure identifier (PSI) overhead to transmit the 256-byte PSI to indicate the OPUk signal type. The PSI overhead is in Column 15 of Line 4. The 256-byte PSI signal aligns with the ODUk multi-frame. PSI[0] is a 1-byte

s e c r u o s e R

payload type (PT); PSI[1]-PSI[255] are used for the mapping and cascading; PSI[1] is reserved, and PSI[2]-PSI[17] is the multiplex structure identifier (MSI). The MSI includes the ODU type and transmitted ODU tributary port number information. For OPU2, there are only four ODU1 tributary port number. Therefore, only four bytes PSI[2]-PSI[5] are needed, and the last 12 bytes of the MSI are set to 0.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-46

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The OOS is the non-associated overhead, which is transmitted through the OSC. The optical layer overhead function should comply with the standard. The recommendation defines overheads and corresponding functions contained in the optical layer, and does

s e c r u o s e R

not define the frame rate or frame structure. The optical layer overhead include OTS, OMS, OCh overheads, and generic management information overhead defined by the supplier, where, 

The OTS overhead is used to support the maintenance and operation function of the optical transmission section, and is terminated at the OTM signal assembly and dissemble places, including:

r a e

L e

or

M

g n ni



TTI: Transmit the TTI consisting of 64-byte character string. The TTI includes the source access point indication, destination access point indication, and information

designated by the operator.







BDI-P: Transmit the OTSn payload signal invalidity status detected from the OTSn terminal sink function to the upstream. BDI-O: Transmit the OTSn overhead signal invalidity status detected from the OTSn terminal sink function to the upstream. PMI: It is used to transmit the status of payload that is not added at the upstream of the OTS signal source terminal to the downstream, to suppress subsequent reporting of loss of signal.



To be continued in the next page

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-48

/e m o i.c

e w a u .h



t t :h

Objectives for this chapter:

r a le

g n ni

// : p



List the maintenance signals type;



Describe the function and application of maintenance signals.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-49

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



OTS, OMS, OCh are all optical layer trails and OTUk, ODUk, Client are all electrical layer trails.



OSC trail is independent, which is related to supervisory signal.



OTUK use SM section to send maintenance signals.



ODUK use PM and TCM to send maintenance signals.



OTS,OMS,OCh ,OSC send different optical layer maintenance signals.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-50

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



OCh client trail sets the source/sink port at the client side of OTU. LQG, as an example, it is GE service trail of the client port.



OCh trail sets the source/sink port at the WDM side of OTU. LQG, as an example, it is the wavelength trail.



s e c r u o s e R

OMS trail sets the source/sink port at the OUT/IN port of MUX/DeMUX. It is a trail of the multiplex signal.



OTS trail is the fiber connection between adjacent OM/OD/OA in the main path.



OSC trail is independent, which is related to supervisory signals.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-51

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The FDI is the signal sent to the downstream in OMS and OCh layers, to indicate the detected upstream defects. FDI-P indicates the payload forward defect, and FDI-O indicates the overhead forward defect.



OMS-FDI-P indicates the OMS servcie layer dfect of the OTS network layer.



OMS-FDI-O indicates that the transmission of the OMS overhead transmitted through the

s e c r u o s e R

OOS is interrupted owing to the signal invalidity status of the OOS. 

OCh-FDI-P indicates the OCh service layer defect in the OMS network layer. When the OTUk is terminated, OCh-FDI-P serves as the ODUk-AIS signal to continue.



OCh-FDI-O indicates that the transmission of the OCh overhead transmitted through the OOS is interrupted owing to the signal invalidity status of the OOS.

g n ni

r a e

L e



M

or



The FDI signal is generated in the adaptation sink function. In the trail terminal sink function, it is generated to suppress the downstream defects and invalidities detected owing to the transmission interruption of the upstream signals. The FDI is similar to AIS. When the signal is in the optical domain, use the FDI. When the signal is in the digital domain, use the AIS. The FDI served as the non-associated overhead is transmitted in the OTM overhead signal (OOS)

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-52

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

AIS is the electrical layer OTUk, ODUkP, ODUkT, and customer layer CBR sent to downstream to indicate the detected upstream defect, to suppress the downstream defects and invalidities detected due to the interruption of upstream signal transmission.

s e c r u o s e R

The AIS of ODUkP and ODUkT layer uses the ASI with all-1 pattern. 

Note: 

OTUk-AIS supports the new service layer in future. At present, only the signal is required to be detected, instead of the generation of this signal. According to this recommendation, Huawei equipment only supports the detection of the OTUk-AIS, instead of inserting OTUk_AIS. CBR AIS is generated in the the ODUk/CBRx adaptation sink function. If the SDH receives this signal, it is detected as the LOF.

g n ni

L e

r a e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-53

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The AIS of ODUkP and ODUkT level uses the all-1 pattern, as shown in the figure.



When we introduce the PM and TCMi overhead, we have learnt that the value 111 of STAT field of PM or TCMi indicates the detected ODUk_AIS signals. When ODUkP or

s e c r u o s e R

ODUkT detects the AIS, it only concerns about the value of the STAT of the corresponding level. For example, to detect the AIS of the TCM1, check whether the STAT corresponding bit of the TCM1 is 111; To check the AIS of the PM, check whether the STAT corresponding bit of the PM is 111. 

g n ni

To insert the AIS, the ODUkP or ODUkT is not distinguished. For either of them, insert to PM or 6-level PCM overhead area or all payloads (excluding FTFL byte). Therefore, it is called the insertion of ODUk-AIS signals. The ODUk_AIS may be generated in the adaptation sink function from OTU to ODU or in the ODUkT termination sink function. For

r a e

L e

or

the adaptation sink function from OTU to ODT, insert the ODUk_AIS owing to the invalidity of the service layer. For the ODUkT termination sink function, when the TCM is in the operation mode, insert ODUk_AIS owing to the detection of the LCK, OCI, and TIM. Whether the TIM is inserted with the AIS can be set.



When the AIS is cleared, 111 of the STAT of the local area is cleared also. For example, for the TCM1 source function, change the STAT of the TCM1 from 111 to 001.

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-54

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The Backward Defect Indication (BDI) includes the OTS of the optical layer, the BDI of the OMS layer, OTUk and ODUkP of the electrical layer, and the BDI of the ODUkT layer.



The BDI-P indicates the payload backward defect. The BDI-O indicates the overhead

s e c r u o s e R

backward defect. If the remote defect of the BDI inserting the OOS detected consecutively in X ms, the BDI is generated. If the BDI-P upstream defect inserted by OOS detected within the consecutive Y ms is cleared, clear the BDI-P. The values of X and Y needs the further study. 

g n ni

For the electrical layer OTUk, ODUkP and ODUkT layer’s BDI, we have learnt the electrical layer overhead part. If the BDI bit of the SM/PM/TCMi overhead domain of the consecutive five frames (bit 5 of byte 3) is 1, generate the dBDI. If the BDI bit of the SM/PM/TCMi overhead domain of the consecutive five frames (bit 5 of byte 3) is 0, clear the dBDI.

r a e

L e

or



If the signal is invalid, the BDI should be cleared.

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-55

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The Open connection indication (OCI) is used for the optical layer OCh, electrical layer ODUkP, and ODUkT to indicate that the upstream signal does not connect to the trail terminal source signals. The OCI signal is generated in the connection function. Through

s e c r u o s e R

the connection function, output at any output connection point that is not connected to any input connection point. The OCI signals are detected in the trail terminal sink function. 



For the OCh layer, if the input and output is detected in the consecutive X ms, generate the OCI. If the input and output connection is normal or the overhead signal is invalid in the consecutive Y ms, clear OCI. The values of X and Y are still under the research.

g n ni

As shown in the figure, it is the OCI pattern of the ODUkP and ODUkT layer. Detect the OCI, which is similar to the detection of the AIS. Check whether the corresponding bit of the STAT is 110. For example, check the OCI of the TCM1 to check whether the STAT

r a e

L e

M

or



corresponding bit of the TCM1 is 110. Detect the OCI of the PM, to check whether the STAT corresponding bit of the PM is 110. Insert the OCI, and insert to PM and 6-level TCM area and all payloads. Clear the OCI to clear 110 of this area STAT. For example, for TCM1, it means to change the STAT of the TCM1 from 110 to 001. If the data signal is invalid, the OCI should be cleared.

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-56

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



To support the operator's requirement of locking the user access point signal, ODUkP and PDUkT layer provide the LCK maintenance signals to indicate the upstream connection is the locked signal, without signals passing.



When the operator performs sets up the test, the customer signals are replaced by the locked (LCK) fixed digital signals. It is generated through the service layer adaptation sink

s e c r u o s e R

and source function, and is sent to the downstream. The downstream termination sink function allows the report of the LCK alarm, indicating that the upstream connection is locked and no signals pass. 

g n ni

As shown in the figure, it is the LCK pattern of the ODUkP and ODUkT layer. Detect the LCK, and check whether the corresponding bit of the STAT is 101. For example, check the LCK of the TCM1 to check whether the STAT corresponding bit of the TCM1 is 101. Detect

r a e

L e

M

or

the LCK of the PM, to check whether the STAT corresponding bit of the PM is 101.



Insert the LCK, and insert to PM and 6-level TCM area and all payloads. Clear the LCK to clear 101 of this area STAT. For example, for TCM1 source function, change the STAT of the TCM1 from 101 to 001.



The priority of inserting the LCK is higher than that of the AIS. That is, if a user sets the insertion of the LCK and meets the condition of automatic insertion of the ASI, the result is insertion of the LCK.

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-57

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Incoming Alignment Error (IAE) and Backward Incoming Alignment Error (BIAE). The electrical layer OTUk and ODUkT provide the maintenance signals of IAE and BIAE. IAE and BIAE are not the fault reasons. The IAE is used to suppress the near end performance of

s e c r u o s e R

the OTUk and ODUkT (EBC and DS). The BIAE is used to suppress the remote performance of the OTUk and ODUkT. 

For the IAE of the OTUk, if the IAE bit in the consecutive 5-frame SM overhead domain (bit 6 of byte 3) is 1, generate the dIAE. If the IAE bit in the consecutive 5-frame SM overhead domain (bit 6 of byte 3) is 0, clear the dIAE. For the IAE of the ODUkT, if the received STAT information is 010, generate the dIAE. If the received STAT information is not 010, clear the dIAE.

g n ni

r a e

L e



or



M

If the signal is invalid, the dIAE and dBIAE should be cleared.

For the signals sent to the upstream by the BIAE, if the BEI/BIAE bit of the consecutive 3frame SM/TCMi overhead domain (bit1-bit4 of byte 3) is 1011, generate dBIAE. If the BEI/BIAE bit of the consecutive 3-frame SM/TCMi overhead domain (bit1-bit4 of byte 3) is 1011, clear dBIAE.

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-58

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



For the framing and monitoring, the OTUk and ODUkP support to obtaining the LOF and LOM through the detection of the FAS and MFAS. The ODUkP is applicable to the scenario from the low-level ODU multiplexing to the high-level ODU signals.



For the continuity monitoring, three layers support the TTI signals of the corresponding level.



For the information maintenance, three layers support AIS, BDI, and BEI signals. The ASI of the OTUk layer is the generic AIS signal. In ODUkP and ODUkT, there are all-1 AIS signals.



ODUkP and ODUkT layers support OCI and LCK signals.



The ODUkT layer supports the LTC signals. Note: LTC indicates there is no TCM source.

g n ni

s e c r u o s e R

r a e

OTUk and ODUkT support the IAE/BIAE signals.

L e



or



M

For the monitoring of the signal quality, three layers support the performance detection based on the BIP-8 calculation. That is, check the OPUk frames. But the check location and layers are different.

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-59

/e m o i.c

e w a u .h



t t :h

Objectives for this chapter:

r a le

// : p



Classify the alarms into the corresponding layer;



Outline the suppression mechanism of alarms.

g n ni

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-60

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Firstly,about the OTN alarm of each electrical layer, for the alarms of OTUk layer, except the BEFFEC_EXC alarm related to the FEC, other alarm names start with “OTUk”. For the ODUkP layer, except ODUk_LOFLOM, other alarms start with “ODUk_PM”. For ODUkT

s e c r u o s e R

layer alarms, the name starts with “ODUk_TCMi”. The OPUk layer alarm starts with “OPUk”.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-61

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

This table lists OTN performance events in the OTUk, ODUk_PM, and ODUk_TCMi layers. For definitions related to the performances, see ITU-T G.8201.



far end ES. 

s e c r u o s e R

ES: Errored Second: When one or more bit error blocks are found in one second, it is called ES. FEES: SES: Severely Errored Second: In one second period, include ≥ 15% bit error blocks, or, there is at least one defect (OCI/AIS/LCK/IAE/LTC/TIM/PLM). FESES: far end severely errored second.



SESR: Severely Eroded Second Ratio: It indicates the ratio between the SES and total seconds in the

g n ni

available time within the fixed test interval. FESESR: far end Severely Eroded Second Ratio. 

BBE: Background Block Error: It indicates the bit error block beyond the severely eroded second.

r a e

FEBBE: far end background block error.

L e



M

or



BBER: Background block error ratio. It indicates the ratio between the BBE and total blocks in the available time within the fixed test interval. The total number of the blocks excludes the number of the blocks in the SES. FEBBER: far end background block error ratio. UAS: Unavailable second: It starts from 10 consecutive SES events. The 10 seconds are considered as a part of the unavailable second. The new available time period starts from 10 consecutive nonSES events. Ten seconds can be considered as one part of the available time. FEUAS: Far end unavailable second.



IAES: Incoming Alignment Error Second: When the IAE error exists in one second, the second is the incoming alignment error second. BIAES: backward Incoming Alignment Error Second.



After the FEC is used, the definitions of all performance events are after the FEC. That is, the detection of the performance event (for example, BBE and SES) is after all error corrections.

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-62

/e m o i.c

e w a u .h



// : p

Which kinds of the components does the OTM-n.m have? 



t t :h

r a le

g n ni

OTSn, OMSn, OCh, OTUk/OTUkV, ODUk, OPUk

s e c r u o s e R

What’s the difference between SM and PM? 

SM is in the OTUk OH,PM is in the ODUk OH.



SM contains TTI/BIP-8/BEI/BIAE/BDI/IAE/RES,PM contains TTI/BIP-8/BEI/BDI/STAT.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-63

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-64

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-65

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-66

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-67

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-68

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-69

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OTN Principle

P-70

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-1

/e m o i.c

e w a u .h



t t :h

Content:

r a le

g n ni

// : p

LAN Introduction……………………………………………………………………Page 4

s e c r u o s e R

Ethernet Principles…………………………………………………………….……Page10 Ethernet Port Technology…………………………………………………….……Page29 EoS Introduction…………………………………………………………………..Page39 VLAN Basics and Port Attributes………………………………………….……….Page57

g n ni

QoS Introduction and Application……………………………………….………. Page76

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-2

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-3

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-4

/e m o i.c

e w a u .h



// : p

A network is a complex system interconnected formed by interconnected people or things. Networks exist everywhere in our life, for example, the telephony network and telegraph network. There are also many network systems in one's body, for example, the nerve

s e c r u o s e R

system and the digestive system.



t t :h

r a le

g n ni

The computer network is a large-scale and powerful system that connects computers and peripheral devices in different areas through communication lines. In the computer network, substantive computers can exchange information and share information resources. The computer network was developed to meet the requirement for exchanging information and sharing information resources.

g n ni

r a e

L e

or



M

In the initial stage of the computer network, each computer is an independent device. Computers work independently and do not communicate with each another. Combination of the computing technology and communication technology brings a far-reaching influence to the organization of the computer system and makes possible the communication among computers. Computers of different types use the same protocol to communicate, and thus the computer network comes into being.

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-5

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The Internet is a large network formed by networks and devices. Based on the covered geographic scope, networks are classified into LAN, WAN, and



Metropolitan Area Network (MAN) whose size is between the LAN and WAN.



Local Area Network (LAN) 

s e c r u o s e R

A LAN is formed by connected communication devices in a small area. A LAN covers a room, a building, or an industry garden. A LAN covers several kilometers. It is a combination of computers, printers, modems, and other devices interconnected through various mediums within several kilometers.



r a e

Wide Area Network (WAN)

L e

M

or

g n ni



A WAN covers a larger geographic scope, such as a state or a continent. It provides the data communication service in a large area and is used to connect LANs. The China Packet Network (CHINAPAC), China Data Digital Network (CHINADDN), China Education and Research network (CERnet), CHINANET, and China Next Generation Internet (CNGI) are all WANs. A WAN connects LANs that are far from each other.

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-6

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



LAN is a network that connect all kinds of communication devices together, within a room, building or garden. The distance is usually only several miles. It has features such as short distance, low delay, high rate and reliability and so on.



Standard is a set of rules or program that are widely used or defined by organization. It defines the protocols, and performance set. IEEE 802.X is the most common used standard.



In China, the common local network is Ethernet, ATM (Asynchronous Transfer Mode). They are different in topology, transmission medium, signal rate, frame structure, and so on. Ethernet is widely used because it’s the most economical one and it develops very quickly.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-7

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-8

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Common devices used in LAN:



Cable:Enlarging the transmission distance, e.g. fiber, twisted pair, coax and so on。



NIC,Network Interface Card: Seated in the main board of the computer,converting the

s e c r u o s e R

user data into special forms that other network devices can read. 

HUB is a multiple ports device. When one of the cable is broken, others will not be affected.

g n ni



Switch is also a multiple ports device. Every two ports have private service bus, so switch has a higher ability to forward the signals.



Router is an important device that can connect LAN, WAN and Internet together. The router can analyze route information and choose a best route for packets, and forwards them in order.

r a e

L e

M

or



ATM is a special switching device used in ATM network. It is only applied in back-bone network because of its special techniques.

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-9

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-10

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-11

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Carrier Sense Multiple Access / Collision Detect (CSMA/CD) is an effective method for multi-point communication under the condition of medium sharing.

s e c r u o s e R

1) If the medium is idle, the transmission will be made; otherwise, it goes to step 2. 2) If the medium is busy, the channel will be monitored till it is idle and the transmission will be made at once. 3) If collision is detected during the transmission, a short and small jamming signal will be sent to let all the stations know that conflict occurs and stop the transmission.

g n ni

4) After sending the jamming signal and waiting for a random time, the transmission will be tried again and it will go to step 1 to start again.

r a e

The CSMA/CD technology adopted by the Ethernet may reduce the waste of the channel caused by the conflict to the minimum extent. However, it cannot ensure the transmission

L e



or

efficiency in case of high network load.

M

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-12

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



As limited by the CSMA/CD algorithm, an Ethernet frame cannot be shorter than 64 bytes, which is determined by the maximum transmission distance and the mechanism of collision detection.



The limitation of the frame length can prevent the situation that a station finishes sending the last bit; however, the first bit does not reach the remote destination. The remote

s e c r u o s e R

station believes the line is idle and continues to send data. The conflict, therefore, occurs. 

The upper layer must guarantee that the Data field contains a minimum of 46 bytes. If the Data field is shorter than 46 bytes, the upper layer must fill the filed. The 46-byte Data field, 14-byte Ethernet header, and 4-byte check code consist of a 64-byte frame, which is a frame of minimum length.

g n ni

r a e

L e



The maximum length of the Data field is 1500 bytes.



The maximum transmission distance is determined by factors such as line quality and signal attenuation.

M

or

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-13

/e m o i.c

e w a u .h



t t :h

MAC: media access control 

r a le

g n ni

// : p

The MAC address is the physical address of each device connected to the network. MAC address assignments are administrated by IEEE and are be globally unique.

s e c r u o s e R

Each address is composed of two parts, the OUI which is the Organization Unique Identifier which is the address space assigned to the provider, the remainder of the address space is assigned by each organization. 

The first 24 bits denotes the provider code and the last 24 bit is assigned at the provider’s discretion.

r a e 

L e

or

g n ni



MAC address includes 48 bits and it is shown as 12 dotted hexadecimal notations MAC address is exclusive globally which is allotted and managed by IEEE. Every MAC address is composed of two parts. The first 24 bits part is the vendor code

and the other 24 bits part is serial number

M

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-14

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



All 1’s in the address otherwise written as FF-FF-FF-FF-FF-FF in hexadecimal denotes a broadcast address, which will be read by all attached stations.



If 48 bits are all “1”, it means the address is used for broadcast



If the 8th bit is “1”, it means the address is used for multicast

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-15

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The destination address in the Ethernet header can be one of three forms: 





Unicast address: Only the specified host will process the frame e.g. a frame sent from PC to Server

s e c r u o s e R

Broadcast address: This frame will be processed by every host (PC, Printer, server, etc) Multicast address: All hosts that are members of the specified multicast group will process this frame e.g. a router to other routers

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Ethernet Technologies

P-16

/e m o i.c

e w a u .h







M

Preamble: 7 bytes of 10101010 to allow timing synchronisation between sender and receiver

s e c r u o s e R

SFD: Start Frame Delimiter 10101011 to tell the receiver the next byte is the start of the frame DMAC: destination MAC address, 6bytes



SMAC: source MAC address, 6bytes



Length/Type: 2bytes, it has the following meanings:

g n ni

r a e











// : p



L e

or

t t :h

Ethernet Frame Fields

r a le

g n ni

if Length/Type > 1500 ,this field indicates the type of the upper protocol of an Ethernet_II frame

if Length/Type = 1. Supports all the AAL types.



The VPI/VCI is encapsulated.

Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-94

n e / m o i.c

e w a u .h



c r ou



L e r

 



The first four bits must be 0, which indicates that the data is the PW data. The packet must be ignored by the PE that receives the packet.

g n i n

r a e



s e R

The following describes the meaning of each field in the CW: 

o M

// : p

The CW, which is optional, is inserted before the ATM payload. If the MPLS PSN supports the equal-cost multiple path (ECMP), the packets may not reach the destination in the sending order. The Sequence Number field in the CW can be used to restore the correct order of the packets. If the MPLS PSN does not support the ECMP, or the network has no strict requirement for the packet order, the CW is optional.

: s e



t t h

g n i n r lea

Flags: It is of four bits. In some cases, the network strips off the Layer 2 header at the ingress and re-adds the header at the egress. Res: It is of two bits. It is the reserved field and is often set to 0. Length: It is of six bits. The Length field is not used in N-to-1 cell transport mode. It is set to 0. Sequence Number: It is of 16 bits. It is used to guarantee the packet order. This field is optional. If the Sequence Number is 0, it means the packet order check is disabled.

An ATM Service Payload is of 52 bytes: 4-byte ATM Header and 48-byte ATM Cell Payload. A common ATM Cell is of 53 bytes. Compared with the common ATM cell, the ATM Service Payload discards a 1-byte Header Error Check (HEC) contained in the common ATM header, that is, 53 -1 = 52 bytes. Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-95

n e / m o i.c

e w a u .h



t t h

g n i n r lea

// : p

The CW, which is optional, is inserted before the Pseudo wire Header. The ATM Specific Header is inserted before the ATM Cell Payload.



: s e

The following describes the meaning of each field in the ATM Specific Header:

c r ou

M: It is of one bit. It indicates the transmission mode. That is, a packet contains an ATM cell or a frame payload. The value of 0 indicates that the packet



s e R

contains an ATM cell; the value of 1 indicates that the packet contains a frame payload.

g n i n



r a e

o M

L e r



V: It refers to the VCI flag, which is of one bit. It indicates whether a packet contains the VCI field or not. The value of 0 indicates that the packet does not

contain the VCI; the value of 1 indicates that the packet contains the VCI. The VCC is an ATM connection that is switched by the VCI value in the ATM cell header. Therefore, the VCI is not needed for a VCC. Resvd: It refers to the reserved field, which is of two bits. This field is set to 0 when it is transmitted and is ignored when it is received.



The number of ATM cells to be encapsulated is negotiated between the ingress device and the egress device. Each encapsulated ATM cell has the 1-byte ATM Specific Header. Therefore, the ATM cell information of 53 bytes can be regarded as being encapsulated in 49 bytes.

Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-96

n e / m o i.c

e w a u .h

t t h

g n i n r lea

// : p



The CW, which is mandatory, is inserted before the Pseudowire Header. The ATM Specific Header is inserted before the ATM Cell Payload.



For a common ATM VPC, the egress PE cannot change the VCI field in a packet. In VPC cell transport, the egress PE can set a VCI value that is different from the VCI value on the ingress. The VCI set by the egress PE is determined only by the PW Header.



The following describes the meaning of each field in the ATM Specific Header:

: s e

c r ou

g n i n



r a e

eL

or M







s e R

M: It is of one bit. It indicates the transmission mode. That is, a packet contains an ATM cell or a frame payload. The value of 0 indicates that the packet contains an ATM cell; the value of 1 indicates that the packet contains a frame payload. V: It refers to the VCI flag, which is of one bit. It indicates whether a packet contains the VCI field or not. The value of 0 indicates that the packet does not contain the VCI; the value of 1 indicates that the packet contains the VCI. The VPC is an ATM connection that is switched by the VPI value in the ATM cell header. Therefore, the VCI is needed for a VPC, and is transmitted in each cell. VCI: It is of 16 bits. This filed indicates that VCI value after the ATM cell is encapsulated.

The number of ATM cells to be encapsulated is negotiated between the ingress device and the egress device. Each encapsulated ATM cell has the 1-byte ATM Specific Header. Therefore, the ATM cell information of 53 bytes can be regarded as being encapsulated in 51 bytes. Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-97

n e / m o i.c

e w a u .h

t t h

g n i n r lea

// : p



Number of ATM Cells Encapsulated in PWE3 Packets



The number of ATM cells encapsulated in PWE3 packets is determined by the parameters Maximum Number of Concatenated Cells and Loading Time.



The number of ATM cells in a ATM service is determined by the parameters Maximum Number of Concatenated Cells and ATM Cell Concatenation Waiting Time. 



: s e

c r ou

When Maximum Number of Concatenated Cells is set to 1, each PWE3 packet contains only one ATM cell. Specifically, an ATM cell is directly encapsulated into a PWE3 packet after the PE receives an ATM cell from the AC.

s e R

When Maximum Number of Concatenated Cells is set to a value greater than 1, the PE uses the timer ATM Cell Concatenation Waiting Time. If the PE receives the maximum number of ATM cells from the AC before the timer expires, the PE encapsulates all the received ATM cells into a PWE3 packet and resets the timer. If the timer expires, the PE encapsulates all the received ATM cells into a PWE3 packet and resets the timer, even if the maximum number of ATM cells is not reached.

g n i n

r a e

or M

eL 

QoS of ATM PWE3



The QoS requirements depend on the category of the ATM service. As such, set the PHB service level of an ATM PWE3 packet based on the category of the emulated ATM service to ensure specific QoS objectives.



Specify an appropriate PHB service level for an ATM service based on its category. The following table provides the default mapping relationships between ATM service categories and PHB service levels.



The OptiX OSN equipments perform QoS for ATM PWE3 packets as follows.



Ingress node The PHB service class of an ATM PWE3 packet can be manually specified. When a packet leaves an ingress node, the EXP value of the packet is determined according to the mapping (between PHB service classes and EXP values) defined by the DiffServ domain of the egress port.



Transit node When a packet enters a transit node, the PHB service class of the packet is determined according to the mapping (between EXP values and PHB service classes) defined by the DiffServ domain of the ingress port. When a packet leaves a transit node, the EXP value of the packet is determined according to the mapping (between PHB service classes and EXP values) defined by the DiffServ domain of the egress port.

Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-98

n e / m o i.c

e w a u .h

: s e

t t h

g n i n r lea

// : p

c r ou

g n i n

s e R

r a e

o M

L e r

Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-99

n e / m o i.c

e w a u .h



// : p

The MSTP products supports various Ethernet services and provides ideal L2VPN solutions.



t t h

g n i n r lea

: s e

A virtual private network (VPN) is a private network constructed on the basis of the

c r ou

public network. The L2VPN is the VPN based on technologies of the link layer. The VPN constructed on the public network can provide the same security, reliability and

s e R

manageability as the existing private networks.

r a e

eL

or M



Service providers can provide the VPN value-added service for enterprises to

g n i n



fully use the existing network resources and to increase the service volume. In addition, service providers can consolidate long-term partnership with

enterprises. For VPN users, the cost to lease the network is saved. The flexibility of the VPN networking makes the network management easier for enterprises. As the network security and encryption technology develops, the private data can be transmitted over the public network with security.



For the MSTP products, the Ethernet service has the following forms. 

Point-to-point service: E-Line service



Multipoint-to-multipoint service: E-LAN service



Multipoint-to-point converging service: E-Aggr service Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-100

n e / m o i.c

e w a u .h



t t h

g n i n r lea

// : p

Company A and Company B have departments in City 1 and City 2, which need to communicate with each other respectively. The communication of Company A should be isolated from that of Company B. For such an application, the E-Line service carried

: s e

c r ou

by the PW should be created.

Create two PWs carrying the services of Company A and Company B



s e R

respectively.

The two PWs can use one tunnel, and share bandwidth of the same tunnel.

g n i n



r a e

o M

L e r

Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-101

n e / m o i.c

e w a u .h



t t h

g n i n r lea

// : p

The three user side networks respectively access the carrier networks through the PE. Each user side network has its own VLAN tag. The user side networks require access between each other. The user side networks can communicate with each other

: s e

c r ou

through the configuration of the E-LAN service. 

On each PE node, the accessed data is forwarded through the target MAC address or

s e R

target MAC address + VLAN. At the network side, the data is transparently transmitted to the opposite PE equipment through the created MPLS tunnel. 

g n i n

In this case, the entire transport network, which exchanges different data at the user sides, equals a Layer 2 switch. In other words, the transport network is transparent to

r a e

the user network.

o M

L e r

Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-102

n e / m o i.c

e w a u .h



t t h

g n i n r lea

// : p

Node B connected to NE1 and Node B connected to NE2 need communicate with the RNC connected to NE3. In this case, NE1 and NE2 can aggregate the services accessed from Node B to two MPLS tunnels respectively. The two MPLS tunnel then transports

: s e

c r ou

the services to NE3, which then aggregates the services to the RNC. All services of Node B have VLAN, whose value is 100. 

s e R

Node B is connected to the equipment through the FE interface. RNC is connected to the equipment through the GE interface. The NEs are connected through the STM-4

g n i n

POS interfaces for networking.

r a e

o M

L e r

Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-103

n e / m o i.c

e w a u .h



t t h

g n i n r lea

// : p

Between BTS and BSC, the CES service is transported through the MSTP equipment. A CES service is available between BTS and BSC that are connected to PE1. Two CES services are available between BTS and BSC that are connected to PE2.

: s e

c r ou



BTS1 uses one E1 connection connected to PE1, BTS2 uses two E1 connections connected to PE2. PE3 uses one channelized STM-1 connection connected to BSC.



So, we need create one PW between PE1 and PE3, and two PWs between PE2 and PE3.

g n i n

s e R

r a e

o M

L e r

Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-104

n e / m o i.c

e w a u .h



t t h

g n i n r lea

// : p

In N-to-1 VPC ATM cell transport, a PW bears cells of multiple ATM VPCs. This mode supports all the AAL types. The tunnel packets carry the VPI/VCI value.



: s e

In this mode, multiple VPs can be set up between a PE and a CE. The data transmission

c r ou

on VPs is independent of each other. 

In N-to-1 VPC ATM cell transport, multiple VPs of an ATM sub-interface can be

s e R

mapped to a PW. Multiple VPs of different ATM sub-interfaces cannot be mapped to a PW. In addition, multiple VPs of different service boards cannot be mapped to a PW. 

g n i n

N-to-1 VPC ATM cell transport has two types: remote N-to-1 VPC ATM cell transport and local N-to-1 VPC ATM cell transport.

r a e

o M

L e r



Remote N-to-1 VPC ATM cell transport 

ATM cells are transparently transmitted across the entire PSN and each PW bears cells of multiple ATM VPCs , as shown in Figure .



Local N-to-1 VPC ATM cell transport. 

ATM cells are forwarded through the PE rather than transparently transmitted across the entire PSN.

Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-105

n e / m o i.c

e w a u .h



t t h

g n i n r lea

// : p

In 1-to-1 VCC ATM cell transport, a PW bears cells of an ATM VCC. This mode supports all the AAL types. The tunnel packets do not carry the VPI/VCI value.



: s e

In this mode, the VPI/VCI switching is supported without any switching configuration

c r ou

on the PE because the MPLS PW is considered as an ATM switch. 

1-to-1 VCC ATM cell transport has two types: remote 1-to-1 VCC ATM cell transport

s e R

and local 1-to-1 VCC ATM cell transport.

r a e

o M

L e r



Remote 1-to-1 VCC ATM cell transport

g n i n





ATM cells are transparently transmitted across the entire PSN and each PW bears cells of only one ATM VCC , as shown in Figure .

Local 1-to-1 VCC ATM cell transport. 

ATM cells are forwarded through the PE rather than transparently transmitted across the entire PSN.

Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-106

n e / m o i.c

e w a u .h



t t h

g n i n r lea

// : p

PWE3 is a technology that bears Layer 2 services. PWE3 emulates the basic behaviors and characteristics of the services such as ATM , Frame Relay (FR) , Ethernet, lowspeed TDM circuit, and SONET or SDH in a PSN.



: s e

c r ou

List the difference between SAToP and CESoPSN. In the SAToP mode:





s e R

The equipment regards TDM signals as constant rate bit flows, instead of sensing structures in the TDM signals. The entire bandwidth of TDM

g n i n

signals is emulated.

o M

re

Le

ar 



The overhead and payload in the TDM signal are transparently transmitted.

In the CESoPSN mode: 



The MSTP equipment senses frame structures, frame alignment modes and timeslots in the TDM circuit. The MSTP equipment processes the overhead and extracts the payload in TDM frames. Then, the MSTP equipment delivers the timeslot of each channel to the packet payload according to certain sequence. As a result, the service in each channel in the packet is fixed and visible.



Typical applications of PWE3 have the following types:Ethernet Service to PWE3,TDM E1 Service to PWE3 and ATM Service to PWE3. Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-107

n e / m o i.c

e w a u .h

: s e

t t h

g n i n r lea

// : p

c r ou

g n i n

s e R

r a e

o M

L e r

Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-108

n e / m o i.c

e w a u .h

t t h

g n i n r lea

// : p



VPN :Virtual Private Network



LDP :Label Distribution Protocol



PDU : Protocol Data Unit



STB : Set Top Box



HG :Home Gate



DSLAM :Digital Subscriber Line Access Multiplexer



BRAS :Broadband Remote Access Server



ISP :Internet Service Provider



VoIP :Voice over IP



HSI :High Speed Internet



BTV :Broadband TV



BTS:Base Transceiver Station



BSC:Base Station Controller



RNC: Radio Network Controller



CIDR:Classless Inter-Domain Routing



DHCP:Dynamic Host Configuration Protocol

g n i n

: s e

c r ou

s e R

r a e

Internet

or M

eL

Confidential Information of Huawei. No Spreading Without Permission

Packet Switch Principle

P-109

n e / m o i.c

e w a u .h

: s e

t t h

g n i n r lea

// : p

c r ou

g n i n

s e R

r a e

o M

L e r

Confidential Information of Huawei. No Spreading Without Permission

OptiX SDH Equipment Hardware

P-1

/e m o i.c

e w a u .h



t t :h

Content

r a le

g n ni

// : p

1. Product Introduction ....................................................................................Page 3

s e c r u o s e R

2. Cabinet, Sub-rack .........................................................................................Page 6 3. Boards ...................................................................................................... Page 16 4. Common Network Elements and Configuration ......................................... Page 52 5. Features .....................................................................................................Page 57

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-2

/e m o i.c

e w a u .h



t t :h

References

r a le

// : p



OptiX OSN 3500 Hardware Description manual



OptiX OSN 3500 Product Description manual

g n ni

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-3

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-4

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



OptiX OSN 1500/2500 mainly used in Optical convergence or access switching system.



OptiX OSN 3500 mainly used in Optical convergence and core switching system.



OptiX OSN 7500 mainly used in Optical core switching system.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-5

/e m o i.c

e w a u .h







// : p

Tributary unit (TU): access low rate signal (PDH, Ethernet, ATM, and so on) & process it.

s e c r u o s e R

Line unit (LU): access optical high rate signal (STM-1/4/16/64 SDH signal) & process it.



Cross-connect Unit: change VC-4,VC-3,VC-12 level signal’s direction & channel.



Timing Unit: provide timing signal for the system.



g n ni

Auxiliary Unit: provide kinds of Auxiliary interfaces to monitor the equipment & signals’ status.

r a e

L e

or

t t :h

Totally six main units:

r a le

g n ni



SCC Unit: collect alarm and performance events & communicate with another HUAWEI’S SDH equipment in the same network.

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-6

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-7

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The OptiX OSN series sub-rack can be installed in a 300-mm or 600-mm deep ETSI cabinet.



The external case-shaped devices can be installed in the cabinet as required.  



COA

s e c r u o s e R

Fiber management spool, which is used to spool the redundant fibers inside the cabinet.

For 600MM depth cabinet two sub-racks can not be installed as back to back. It is just to say the same height cabinet installed the same kind equipment’s sub-rack number are the same.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-8

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The indicators on the ETSI cabinet are power supply indicators and alarm severity indicators.

s e c r u o s e R



If alarm occurs, indicators will be on, not flashing.



If alarm indicator is on, alarm occurs on one or more sub-racks inside the cabinet.



The cabinet indicators are driven by the sub-rack. The cabinet indicators can be lit only after the cables are correctly connected and the sub-rack is powered on.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-9

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The PDU, TN81PDU, is installed at the top of the cabinet, and is divided into two parts, namely, part A and part B that back up each other.



The TN81PDU provides eight power output interfaces, supplying power to the subracks inside the cabinet.



s e c r u o s e R

Power output area: On both sides of the DC PDU, there are respectively four output terminal blocks that are used to connect to the power cables of subracks.



Power input area: The TN81PDU supports corresponding power input capability based on the power supply capacity of the telecommunications room.

g n ni

r a e

When the telecommunications room provides four power inputs not less than 32 A, part A and part B can respectively be connected to four -48 V DC power cables and four power ground cables, that is, eight -48 V DC power cables and eight power ground cables in total  When the telecommunications room provides two power inputs not less than 63 A, part A and part B can respectively be connected to two -48 V DC power cables and two power ground cables, that is, four-48 V DC power cables and four power ground cables in total Power switch area: On both sides of the DC PDU, there are respectively four power output switches that correspond to the output terminal blocks. The power output switches control power supply to the corresponding subracks. 

L e

or

M



Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-10

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



On the top of the ETSI cabinet, there are cabinet indicators and a DC power distribution unit (PDU). The OptiX OSN series supports the input of –48 V or –60 V DC power supply.



The Voltage range of input power supply should be –38.4 V to –57.6 V or –48 V to –72 V.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-11

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The sub-rack of the OptiX OSN 3500 adopts a two-tier structure. The structure is divided into board area, fan area, and fiber routing area.



Interface board area: for various OptiX OSN 3500 interface boards.



Fan area: for three fan modules, enabling heat dissipation function.



Processing board area: for all processing boards of the OptiX OSN 3500.



Fiber routing area: for fiber routing.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-12

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The sub-rack of the OptiX OSN 3500 has two tiers. The upper tier gives 16 slots for interface boards. The lower tier gives 18 slots, 15 slots of them for processing boards.



Slots for Interface Boards: slots 19–26, slots 29–36.



Slots for Processing Boards: slots 1–8 and slots 11–17.



Slots for Other Boards.

or



XCS boards: slots 9–10



GSCC boards: slots 17–18 (Slot 17 can also hold a service processing board)



Power interface boards: slots 27–28



Auxiliary interface boards: slot 37

g n ni

r a e

L e



s e c r u o s e R

Dual slot can pass though the DCC byte and orderwire byte by hardware if the SCC board is offline.

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-13

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The OptiX OSN 3500 offers a 200 Gbit/s, 80 Gbit/s or 40 Gbit/s cross-connect capacity according to the type of cross-connect boards. 

s e c r u o s e R

622M x 8+2.5G x 4+10G x 2=35G

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-14

/e m o i.c

e w a u .h



t t :h

1.25G x 7+2.5G x 4+10G x 4=58.75G

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-15

/e m o i.c

e w a u .h



t t :h

5G x 7+10 G x 4+ 20 G x 4=155G

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-16

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-17

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-18

/e m o i.c

e w a u .h

// : p



We can not use the processing board solely. Because on processing board there are no interface to access the signal, so we should use the corresponding interface board together to provide specific interface to access the signal.



CAUTIONS: 



L e

or





Wear the anti-static wrist strap when holding the board with hands. Make sure that the anti-static wrist strap is well grounded. Otherwise, the static discharge may cause damage to the board.

g n ni

Do not directly insert the attenuators into the level optical modules. If the attenuators are required, use the attenuators at the ODF side. If a board requires an attenuator, insert the attenuator in the IN interface instead of the OUT interface. When performing the loopback, use attenuators to prevent damage to the optical modules.

Laser Safety Class  



s e c r u o s e R

r a e 

M

t t :h

r a le

g n ni

The safety class of the laser on the board is CLASS 1. The maximum launched optical power of the optical interfaces is lower than 10 dBm (10 mW).

DANGER 

Avoid direct eye exposure to laser beams launched from the optical interface board or optical interfaces. Otherwise, damage may be caused to the eyes.

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-19

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-20

/e m o i.c

e w a u .h

t t :h

// : p



LC: Lucent connector.



A: support SFP module



F: support FEC (Forward Error Correction) function



I-64.2: I: Internal



L: Long distance



S: Short distance



64: STM-64 16:STM-16



1: Wavelength is 1310nm, used for G.652 fiber



2: Wavelength is 1550nm used for G.652 fiber



3: Wavelength is 1550nm used for G.653 fiber

r a e

L e

or

s e c r u o s e R



g n ni

r a le

g n ni

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-21

/e m o i.c

e w a u .h



SL64/SF64 cannot support SFP module



SFP: Small Form-Factor Pluggable

g n ni

t t :h

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-22

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



SLH1 is a 16 x STM-1 electrical signal processing board.



SEP1 is a 2 x STM-1 electrical signal processing board, with two STM-1 electrical interfaces on the front panel.



SEP1 is an 8 x STM-1 electrical signal processing board with interface board, in this case, the SEP1 we should create it on NMS as SEP.



EU08, EU04 and OU08 are interface boards of the SEP&SLH1. The TSB8 and TSB4 are electrical interface switching and bridging boards.



When used with different interface boards and electrical interface switching and bridging boards, the SEP1 and SLH1 have different access ability.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-23

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The optical interface of the N1OU08 uses the LC connector. The optical interface of the N2OU08 uses the SC connector. The N1OU08 uses the pluggable optical module. The N2OU08 does not use the pluggable optical module.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-24

/e m o i.c

e w a u .h









L e

or

M

// : p

The O/E conversion module includes E/O (O/E) conversion and MUX/DEMUX part. The O/E conversion converts the received 2.666 Gbit/s FEC optical signals into electrical signals and detects R_LOS alarms.

s e c r u o s e R

The DEMUX part demultiplexes the high rate electrical signals into multiple parallel electrical signals, and recovery the clock signal at the same time. The multiple electrical signals demultiplexed are transferred to the digital packet encapsulation and FEC processing module to have FEC packets decapsulated and SDH overheads processed.

g n ni

The SDH overhead processing module extracts overhead byte from the received multiple electrical signals, performs pointer processing, and then sends the signals to the crossconnect unit through backplane bus. R_LOF, R_OOF, AU_LOP and AU_AIS alarms are detected in this module.

r a e 



t t :h

Receiving direction:

r a le

g n ni

Transmitting direction 





After being inserted with overhead bytes in the SDH overhead processing module, the parallel electrical signals from the cross-connect unit are then sent to the digital packet encapsulation and FEC processing module. The digital packet encapsulation and FEC processing module performs FEC coding and SDH overhead inserting to the multiple signals, and then sends it to the O/E conversion module. The O/E conversion module multiplexes the received parallel electrical signals into high rate electrical signals through the MUX part, converts the signals into SDH optical signals. Signals are then sent to fibres for transmission.

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-25

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Different boards have different appearance and dimensions.



The barcode on the front panel of the board indicates the board version, name and board features.



Two types of barcodes are used for the boards of the OSN series. 

16-character manufacturing code + board version + board name + board feature code





s e c r u o s e R

g n ni

20-character manufacturing code + board version + board name + board feature code

r a e

For details on the board feature code, please refer to the section that describes the board feature code for each board on equipment hardware manuals.

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-26

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-27

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-28

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-29

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



PDH service processing boards include the boards which can process E1/T1, E3/DS3, E4/STM-1 services.



Naming rules of PDH service processing boards: 

S - SDH



P - PDH



M - MIX

g n ni

s e c r u o s e R



PL3A has three pairs of 75-ohm unbalanced SMB interfaces, and can work without interface board; PL3 must work with C34S.



D75S - 75 means the interface impedance is 75Ω; D12S – 12 means 120 Ω.

r a e

L e



or

The difference between D12S and D12B is: D12S supports TPS configuration, while D12B does not.

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-30

/e m o i.c

e w a u .h



t t :h

Indicators of SPQ4: 

STAT: Board hardware status indicator



ACT: Board activation status indicator



PROG: Board software status indicator



SRV: Service status indicator

r a le

g n ni

// : p

s e c r u o s e R



MU04 is the interface board for SPQ4 with SMB connector, for E4/STM-1 signal.



There is no indicator on MU04.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-31

/e m o i.c

e w a u .h



t t :h

Functions of PQ1: 

Receiving Direction 

r a le

g n ni

// : p

s e c r u o s e R

The E1 signal enters through the interface module, the decoder where HDB3 or B8ZS data signal and clock signal are recovered. Then, the signal is sent to the mapping module.



In the mapping module, the E1 signal is mapped asynchronously to C-12, and formed as VC-12 after channel overhead processing, as TU-12 after pointer processing, and finally as VC-4 through multiplexing. Then, the signal is sent to the cross-connect unit.

g n ni

L e

r a e

M

or



Transmitting Direction 

The de-mapping module extracts binary data and clock signals from the VC-4 signal from the cross-connect unit, and sends the signal to the encoder, where E1 signals are output.

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-32

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



There are two types of PQ1: PQ1A (75Ω) and PQ1B (100Ω/120Ω).



Warm reset will not affect the running service, while cold reset may affect the service.



TPS: Tributary Protection Switching. It is intended to protect several (N) tributary

s e c r u o s e R

processing boards through a standby tributary processing board . 

PRBS: Pseudo-Random Binary Sequence. The PRBS function is mainly used for network selftest and maintenance. An NE that provides the PRBS function can work as a simple device used to analyze if a service path is faulty. Such analysis can be performed for the NE and the entire network. During deployment or troubleshooting, the PRBS function realizes the test without a real test device.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-33

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

If there is no interface port on the board, then the board must work with an interface board.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-34

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-35

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-36

/e m o i.c

e w a u .h









s e c r u o s e R

Collect alarm and performance events.



GFP: Generic Framing Procedure.

Receiving Direction

The interface module accesses 100BASE-SX/LX/ZX signals from external Ethernet equipment (such as LAN switch and router) and performs decoding and serial or parallel conversion to the signals. Then it sends signals to the service processing module for frame delimitation, preamble field code stripping, cyclic redundancy code (CRC) termination and Ethernet performance statistics. At the encapsulation module, HDLC, LAPS or GFP-F encapsulation is done to the Ethernet frame. After that, the services are mapped into VC-3 or VC-4 at the mapping module and then sent to the cross-connect unit.

g n ni

r a e

L e

M

// : p

Convert Ethernet signal to VC-4 or VC-4 concatenated signal and convert VC-4 or VC-4 concatenate signal back to standard Ethernet signal.





or

t t :h

Function of EFS4

r a le

g n ni

Transmitting Direction 

De-map the VC-3 or VC-4 signals from the cross-connect unit and send them to the encapsulation module for decapsulation. The service processing module determines the route according to the level of the equipment; it also provides frame delimitation, adding preamble field code, CRC calculation and performance statistics. Finally, the interface module performs parallel or serial conversion and encoding to the signals and then sends them out from the Ethernet interface.

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-37

/e m o i.c

e w a u .h

t t :h

// : p



LCAS: Link Capacity Adjustment Scheme.



Testing frame only for GFP protocol.



EPL: Ethernet Private Line.



EPLAN: Ethernet Private Local Area Network.



EVPL: Ethernet Virtual Private Line.



EVPLAN: Ethernet Virtual Private Local Area Network.

g n ni

r a le

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-38

/e m o i.c

e w a u .h



t t :h

XCE can be used in extended sub-rack only.

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-39

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Note: When OptiX OSN 3500 is configured as an extended sub-rack, the EXT port of AUX board should be connected to the one of main sub-rack.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-40

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Standard SSM mode: A mechanism for synchronization management in SDH network, is loaded in the lower four bits of S1 byte in SDH overhead. It allows the exchange of the quality information of clock source among nodes. Thus, the Timing Unit can automatically

s e c r u o s e R

choose the clock source of the highest quality and priority to prevent clock mutual tracing. 

Extended SSM mode: Huawei raises the concept of clock source ID, which is defined using the higher four bits of S1 byte and is transmitted with SSM together. When a node receives the S1 byte, it checks the clock source ID to determine if it is originated from this station. If so, the clock source is unavailable, thus the clock loop can be avoided when the clock tracing trail is configured as a ring.



g n ni

r a e

Stop SSM mode: The Timing Unit selects and switches the clock source based on the priority table. The available clock source with highest priority is selected as the tracing

L e

or

source.

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-41

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-42

/e m o i.c

e w a u .h







t t :h

Control Module

r a le

g n ni

// : p

The control module configures and manages boards and NEs, collect alarms and performance events, and backs up important data.

s e c r u o s e R

Communication Module 

The communication module provides 10 Mbit/s and 100 Mbit/s compatible Ethernet interface for the connection between the NE and the T2000, F&f interface for managing external devices such as COA, and the OAM interface.



r a e 

L e

M

or

g n ni

Overhead Processing Module The overhead processing module receives overhead signals from the line slot and processes such bytes as E1, E2, F1 and serials 1-4. The overhead processing module also sends overhead signals to the line board, and externally provides one orderwire interface, two SDH NNI audio interfaces, interface F1, and the broadcast data interfaces serials 1-4.

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-43

/e m o i.c

e w a u .h









// : p

The power monitoring module comprises –48 V power monitoring and working power.

s e c r u o s e R

The working power provides the GSCC with working voltage and detects and switches the active and standby 3.3 V power supply (which is provided through AUX).

The –48 V power monitoring module monitors the +3.3 V power alarm of AUX, monitors fan alarms, monitors and manages the PIU, and processes sixteen housekeeping alarm inputs and four housekeeping alarm outputs as well as the cabinet alarm indicator signal, monitors the over-voltage of -48v and produces corresponding power alarm.

g n ni

r a e

L e

or

t t :h

Power Monitoring Module

r a le

g n ni

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-44

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-45

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

If there are two subnets which are not connected by fibers, ethernet cables can be applied to establish the extended ECC communication. In this way, the U2000 can manage these equipment in a centralized manner. One NE will work as a server and anther one is a client.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-46

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The mdb is in the dynamic random-access memory (RAM), saving the current databases. The drdb is saved in flash RAM and D RAM. When power failure occurs to NE, the databases will be recovered in the order of drdb® fdb0® fdb1. The drdb will be checked

s e c r u o s e R

first for configuration data. If the configuration data are safe in drdb, they will be recovered to mdb from drdb; if they are damaged, data will be recovered from fdb0 or fdb1, depending on which saves the latest data. If data in fdb0 are also damaged, fdb1 is used for data recovery. Therefore, it is important to back up data to fdb0 and fdb1 and compare the data in them.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-47

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The AUX, EOW, SAP and SEI are the system auxiliary interface board, providing the system with various auxiliary interfaces, management interfaces, central backup of the +3.3 V board power supply, orderwire interface and broadcast data interface.



The BA2 is a 2-port booster amplifier board. The BPA is a booster amplifier & pre-amplifier board.



The COA, a case-shape optical amplifier, integrates the EDFA module, drive circuit and communication circuit in an aluminium case. Three types of COA are available: 61COA, N1COA and 62COA.



The DCU is the dispersion compensation board. It can compensate for the optical signal dispersion accumulated during transmission in the 10 Gbit/s system. In addition, it compresses the optical signal and works with the booster amplifier to achieve long distance optical transmission.

g n ni

s e c r u o s e R

r a e

L e

or



M



The PIU is a power interface board. It functions power access, lightening protection and filtering.



The uninterruptible power module (UPM), numbered GIE4805S, is a special power supply system. It can convert 110 V/220 V AC power supply directly to –48 V DC needed by transmission equipment, such as OptiX OSN 2500. It is suitable for telecom carriers who do not have –48 V DC power supply equipment or who require storage batteries.



The OptiX OSN equipment uses the modularized fan. The FAN is a fan control board, responsible for fan speed adjustment, fan failure detection and failure report, as well as report of the fan not-in-position alarm.

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-48

/e m o i.c

e w a u .h









s e c r u o s e R

Provide the U2000 interface for active/standby SCCs, OAM interface for remote maintenance, and interfaces for inter-board communication.

Interface Module

g n ni



Provide various auxiliary interfaces, such as F&f, OAM, F1 and clock input/output.



The N1 AUX and R1/R2 AUX provide different auxiliary interfaces.

r a e

Power Module

L e

or

// : p

The AUX consists of communication module, interface module and power module.

Communication Module 



t t :h

Principle Of AUX

r a le

g n ni



Provide the AUX with working power, and other boards on the subrack with +3.3 V centralised backup power.

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-49

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-50

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The DCU is used to compensate the accumulated dispersion during the transmission of the 10 Gbit/s system, suppress optical pulse signals, recover optical signals, and realize the long-haul transmission with optical regeneration when used with optical amplifier board.



During the long-haul transmission (more than 80 km) of 10 Gbit/s signals, the pulse width of optical signals is expanded and signals are distorted because of dispersion. As a result,

s e c r u o s e R

the optical signals cannot be normally received by the optical receiver. Thus, the DCU should be used to compensate the dispersion.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-51

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-52

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-53

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-54

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-55

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-56

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-57

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-58

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-59

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



TPS of E1/T1 service does not need TSB4/TSB8 board.



1:8 TPS of E1/T1 board: slot1 is for protection board,while slot2 - slot5 and slot13 slot16 are for working boards.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-60

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-61

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Equipment Hardware

P-62

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-1

/e m o i.c

e w a u .h

t t :h

Content

r a le

g n ni

// : p



SDH Network Topologies...............................................……………….....................Page 2



Survivable networks and their protection mechanisms…………………….…………Page 14

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-2

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Through this course, trainees should be able to: 

List the SDH different topologies structures, features and applications.



Have idea about the basic concept of the SDH network protection. And understand

s e c r u o s e R

the network objectives, application architecture, switching initialization and restoration criteria, characteristics, network capacity of different types of network protection. 

References 

r a e

L e

M

or

g n ni

ITU-T Recommendation G.841 (Oct, 1998) Types and characteristics of SDH network protection architectures





ITU-T Recommendation G.810 (Aug, 1996) Definitions and terminology for synchronization networks ITU-T Recommendation G.803 ITU-T Recommendation G.803 (Aug, 2003) Architecture of transport networks based on the synchronous digital hierarchy (SDH)

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-3

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-4

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-5

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The network topology, the geometrical layout of SDH network nodes and transmission lines, reflects the physical connection of the network. The network topology is important in the sense that it determines the performance, reliability and cost-effectiveness of an SDH network.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-6

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-7

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The chain network is simple and economical at the initial application stage of SDH equipment. For a chain network, it’s more difficult and more expensive to protect the traffic, compared with a ring network. The chain network is used in cases where the traffic

s e c r u o s e R

is unimportant or where the traffic load is small so that we don’t have to care about the traffic protection.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-8

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

In the star network, the hub node selects routes and passes through the traffic signals for all the other nodes. As a result, the hub node is able to manage the bandwidth resources thoroughly and flexibly. On the other hand, there is the possibility of a potential bottleneck

s e c r u o s e R

of bandwidth resources. Besides, the equipment failure of the hub node may result in the breakdown of the entire network.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-9

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

A tree structure can be considered as the combination of chain and star structures. It is suitable for broadcast service. However, due to the bottleneck problem and the optical power budget limit, it is not suitable for bidirectional traffic.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-10

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The ring network is the most widely used network for SDH transmission networks.



In such a structure, any traffic between two adjacent nodes can be directly add/drop between them. For traffic between two non-adjacent nodes, we have to configure the

s e c r u o s e R

add/drop traffic at the source node and the sink node. And the pass-through traffic in between those two nodes must be created as well. 

The ring network is highly survivable. The most obvious advantage of a ring network is its high survivability that is essential to modern optical networks with large capacity. Thus, the ring network enjoys very broad applications in SDH networks.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-11

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Mesh networks are such communications networks in which many nodes are interconnected with each other via direct routes. In such topological structure, if direct routes are used in the interconnection of all the nodes, this structure is considered as an

s e c r u o s e R

ideal mesh topology. In a non-ideal mesh topological structure, the service connection between nodes that are not connected directly is established through route selection and transiting via other nodes. 

In a mesh network, no bottle neck problem exists. Since more than one route can be selected between any nodes, when any equipment fails, services can still be transmitted smoothly through other routes. Thus, the reliability of service transmission is increased. However, such networks are more complicated, costly and difficult to manage. Mesh networks are very suitable for those regions with large traffic.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-12

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Tangent ring networks / Intersectant ring networks/ Not protection chain.



In selecting a topological structure, many factors should be considered. For example, the network should be highly survivable, easy to configure, suitable to add new services, and

s e c r u o s e R

simple to mange. In a practical communications network, different layers adopt different topological structures.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-13

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The advantage of sub-network can simplify the big network, make it easy to maintenance.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-14

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The concept of sub-network is introduced in Huawei OptiX series equipment and network management systems in order to facilitate network topology management, security management, tributary interface expansion, and traffic management.



In practical applications, it simplifies the topology structure of complicated networks and thus enables hierarchical management.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-15

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-16

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-17

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Modern society is getting more and more dependent on communications with the development of science and technologies, and so higher requirements to network security are being brought forward. Thus the concept of survivable network comes into being. The

s e c r u o s e R

following will deal with the concepts of survivable network.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-18

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Please pay attention to that the network can only restore services here. It cannot repair the failure in the network, which cannot do without human intervention.



So there should have protection channels to carry over the services in the working

s e c r u o s e R

channels. The first requirement for survivability of network is there should have protection routes or standby routes. 



A survivability also need something else. Nodes in the network must have the intelligence to check out the failure occurred and inform corresponding units of doing relative protection operation. And the nodes also should have powerful cross-connect capability to implement the protection operation.

g n ni

r a e

For the survivable network, the protection object can be the physical or electronic.

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-19

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-20

/e m o i.c

e w a u .h



// : p

Unidirectional traffic and bidirectional traffic are named regarding the traffic flow directions in the ring. A unidirectional ring means that traffic travel in just one direction, e.g. clockwise or counter-clockwise. While in a bidirectional ring, traffic signals go in two

s e c r u o s e R

directions, one opposite to another. 

t t :h

r a le

g n ni

Protection modes can be divided into two kinds: 1+1 and 1:N. In 1+1 protection mode, every working system is protected by a dedicated protection system. But in 1:N protection mode, N systems share one protection system; and when the system is in normal operation, the protection system can also transmit extra traffic. Thus a higher efficiency can be obtained than that of 1+1 system.



g n ni

r a e

For multiplex section protection ring, traffic protection is based on multiplex section. Switching or not is determined by signal qualities of the multiplex section between each

L e

or

span of nodes.

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-21

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The network has two channels (two pairs of fibers): working (active) channel and protection (standby) channel.



When the network is normal (i.e. no failure on working channel), working channel is used

s e c r u o s e R

to transport the traffics. 

When the working channel is failed, use the protection channel.



Linear Multiplex Section (MS) protection is one of multiplex section protections. Linear multiplex section protection switching can be a dedicated or shared protection mechanism. It protects the multiplex section layer, and applies to point-to-point physical networks. One protection multiplex section can be used to protect the normal traffic from a number (N) of working multiplex sections. It cannot protect against node failures. It can operate in a unidirectional or bidirectional manner, and it can carry extra traffic on the protection

g n ni

r a e

L e

or

multiplex section in bidirectional operation.

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-22

/e m o i.c

e w a u .h



Source node: concurrent sending



Sink node: selective receiving

g n ni

t t :h

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-23

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Out of 1+1 linear multiplex section protections, some modes require APS protocol during the switching process, some don’t require. For 1  1 unidirectional switching, the signal selection is based on the local conditions and requests. Therefore each end operates

s e c r u o s e R

independently of the other end, and bytes K1 and K2 are not needed to coordinate switch action.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-24

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



When the network has no failure, N working channels can transmit the normal traffic while the protection channel transmits extra (unimportant) traffic or it transmits no traffic.



Suppose the fiber from NE A to NE B of the working channel 1 is broken. NE B detects

s e c r u o s e R

R_LOS alarm and sends a request to NE A to switch the services on the failed channel to the protection channel. 

Upon receiving the request, NE A bridges the service on the failed channel to the protection channel.



NE B get the information from NE A and switch to select the service from the protection channel.



NE A switches to select the service from the protection channel. This step completes the switching of the service on the faulty channel to the protection channel for both directions.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-25

/e m o i.c

e w a u .h



// : p

When the working channel 1 repaired, the _RLOS alarm disappears. NE B sets the K1 byte to “Wait-To-Restore (WTR)” state. If WTR state lasts for a special time (10 minutes by default), it switches to select the signal from the working channel and sends “No Request”

s e c r u o s e R

signal to the NE A using K1 byte. 

t t :h

r a le

g n ni

NE A releases the bridge and replies with the same indication on K1 byte. The selector at the NE A is also released.



Receiving this K1 byte causes the NE B to release the bridge. This step completes the protection recovery.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-26

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

In 1+1 protection mode, every working system is protected by a dedicated protection system. But in 1:N protection mode, N systems share one protection system; and when the system is in normal operation, the protection system can also transmit extra traffic. Thus a

s e c r u o s e R

higher efficiency can be obtained than that of 1+1 system, but a more complicated APS protocol is needed. This protection mode mainly protects the normal traffic in case optical cable of the working multiplex section is cut off or multiplex section performance degrades.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-27

/e m o i.c

e w a u .h



t t :h

Answer 

Linear 1+1 MS



Linear M:N (M=1)

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-28

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



In OSN networking application, there is no PP ring. But when we need to create a protection sub-net when using the NMS T2000.



The protection switching principle of two-fiber bidirectional path protection ring is

s e c r u o s e R

basically the same as that of unidirectional path protection ring, except that in two-fiber bidirectional path protection ring, the route of receiving signals is consistent with that of sending signals 

Two-fiber unidirectional MS dedicated protection ring is composed of two fibers. Working channels and protection channels are carried over different optical fibers. Of course, fiber P1 can be used to carry extra traffic when not used for protection. The two-fiber unidirectional Multiplex Section dedicated protection ring is seldom used in actual applications since it has no advantages over either the two-fiber unidirectional path

g n ni

r a e

L e

or

protection ring or two-fiber bidirectional multiplex section shared protection.

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-29

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The orderwires can be passed through used the backboard in the dual slots



When we are facing the sub-rack, the left hand side is the West line board, the right hand side is the East line board



The W was used for the source node



The E was used for the sink node

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-30

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

On each fiber, half the channels are defined as working channels and half are defined as protection channels. The normal traffic carried on working channels in one fiber are protected by the protection channels in another fiber traveling in the opposite direction

s e c r u o s e R

around the ring. This permits the bidirectional transport of normal traffic. Only one set of overhead channels is used on each fiber.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-31

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

For example, a STM-16 system shall assign #1--- #8VC4 as the working channels, #9---#16 as the protection channels. One fiber of #9---#16 are to protect #1---#8 of another fiber.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-32

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

For two-fiber bidirectional multiplex section protection rings, as their traffic have uniform routes and are sent bidirectional, time slots in the ring can be shared by all nodes, so the total capacity is closely related to the traffic distribution mode and quantity of nodes on the ring.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-33

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



When a node determines that a switch is required, it sources the appropriate bridge request in the K-bytes in both directions, i.e. the short path and long path.



The destination node is the node that is adjacent to the source node across the failed span.

s e c r u o s e R

When a node that is not the destination nodes receives a higher priority bridge request, it enters the appropriate pass-through state. In this way, the switching nodes can maintain direct K-byte communication on the long path. Note that in the case of a bidirectional failure such as a cable cut, the destination node would have detected the failure itself and sourced a bridge request in the opposite direction around the ring. 

g n ni

When the destination node receives the bridge request, it performs the bridge and bridges the channels that were entering the failed span onto the protection channels in the opposite direction. In addition, for signal fail-ring switches, the node also performs the

r a e

L e

or

switch to protection channels.

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-34

/e m o i.c

e w a u .h



t t :h

WTR: wait to restore

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-35

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

APS requests are also initiated based on multiplex section and equipment performance criteria detected by the NE. All the working and protection channels are monitored regardless of the failure or degradation conditions (i.e. after a switch has been completed,

s e c r u o s e R

all appropriate performance monitoring is continued). The NE initiates the following bridge requests automatically: Signal Failure (SF), Signal Degrade (SD), Reverse Request (RR), and Wait to Restore (WTR). The bridge requests are transmitted from NE to NE (not from NMS to NE).

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-36

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The APS controller is responsible for generating and terminating the APS information carried in the K1K2 bytes and implementing the APS algorithm. With the switching state of each NE, the APS controller status is also changed.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-37

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

For two-fiber bidirectional multiplex section protection rings, as their traffic have uniform routes and are sent bidirectional, time slots in the ring can be shared by all nodes, so the total capacity is closely related to the traffic distribution mode and quantity of nodes on

s e c r u o s e R

the ring. The network capacity for two-fiber bidirectional multiplex section ring is ½ *M*STM-N (M is the number of nodes on the ring, STM-N is the STM level). If we count the protection channels as well, the maximum traffic load that a two-fiber bidirectional MS shared protection ring can carry is M*STM-N. Nevertheless, half of the traffic would not be protected in case of fiber failures.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-38

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Four-fiber MS shared protection rings require four fibers for each span of the ring. Working and protection channels are carried over different fibers: two multiplex sections transmitting in opposite directions carry the working channels while two multiplex sections,

s e c r u o s e R

also transmitting in opposite directions, carry the protection channels. This permits the bidirectional transport of normal traffic. The multiplex section overhead is dedicated to either working or protection channels since working and protection channels are not transported over the same fibers.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-39

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

In the normal situation, the services will be transmitted on the working fibers

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-40

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



When the fibers between two nodes broken, the switching will happen between these two nodes



In the other sections, the services will be transmit on the original routes

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-41

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



When all the fibers between two NEs broken, the ring switch happens



All the services will go to the protection fibers

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-42

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

APS requests are also initiated based on multiplex section and equipment performance criteria detected by the NE. All the working and protection channels are monitored regardless of the failure or degradation conditions (i.e. after a switch has been completed,

s e c r u o s e R

all appropriate performance monitoring is continued). The NE initiates the following bridge requests automatically: Signal Failure (SF), Signal Degrade (SD), Reverse Request (RR), and Wait to Restore (WTR). The bridge requests are transmitted from NE to NE (not from NMS to NE).

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-43

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-44

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

For four-fiber bidirectional multiplex section protection rings, as their traffic have uniform routes and are sent bidirectional, time slots in the ring can be shared by all nodes, so the total capacity is closely related to the traffic distribution mode and quantity of nodes on

s e c r u o s e R

the ring. The network capacity for four-fiber bidirectional multiplex section ring is M*STMN (M is the number of nodes on the ring; STM-N is the STM level). If we count the protection channels as well, the maximum traffic load that a four-fiber bidirectional MS shared protection ring can carry is 2*M*STM-N. Nevertheless, half of the traffic would not be protected in case of fiber failures.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-45

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

K1 bits 1-4 carry bridge request codes. K1 bits 5-8 carry the destination node ID for the bridge request code indicated in K1 bits 1-4.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-46

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



As network structures are becoming more and more complicated, the sub-network connection protection (SNCP) is the only traffic protection mode that can be adapted to various network topological structures with a fast switching time.



The protection mechanism of SNCP is similar to the PP ring. But for SNCP, the protection function will be completed in the cross-connect unit not PDH unit.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-47

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

As shown in the figure , SNCP uses the 1+1 protection mode. Traffics are simultaneously sent on both the working and protection sub-network connection. When the working subnetwork connection fails, or when its performance deteriorates to a certain level, at the

s e c r u o s e R

receiving end of the sub-network connection, the signal from the protection sub-network connection is selected according to the preference selection rule. Switching usually takes the unidirectional switching mode, thus it needs no APS protocol.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-48

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-49

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The protection mechanism of SNCP ring is concurrent sending in the transmitting end and selective receiving in the receiving end.



Here is a ring chain combination network with 5 nodes. The ring network is SNCP ring.



Suppose that there have E1 services from node A to the end node of the chain. The services will concurrently sent to both working SNC and protection SNC. After passing

s e c r u o s e R

through subnetwork1 and subnetwork2 separately, they both reach node C. there is a selector in node C, the SNC termination node. Normally, node C will receive the service from the working SNC, then pass through to the line unit in the chain.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-50

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



TU-LOM (HP-LOM): tributary unit – loss of multi-frame, a consecutive of 2-10 frames of H4 are not in the order of the multi-frame or have invalid H4 values.



TU-LOP: tributary unit loss of pointer, a consecutive of 8 frames receives invalid pointers or NDF.



s e c r u o s e R

HP-TIM: higher order path trace identifier mismatch, what J1 should receive is not consistent with it actually receives, generating this alarm in this terminal.



HP-SLM: higher order path signal label mismatch, what C2 should receive is not consistent with it actually receives, generating this alarm in this terminal.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-51

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



If the signal failure recovers in any way, node C would switch back to receive services from working SNC after 10 minutes.



10 minutes is the default restoration time. It can be set from 5 to 12 minutes.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-52

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-53

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-54

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-55

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

OptiX SDH Networking and Self-Healing Protection

P-56

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-1

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



1. Architecture and Main Features of U2000 …………………..……………………….… 3



2. Directory Structure of U2000……………………………………………………….….…19



2.Main Functions of U2000 ……..…………………………………………………….….…22

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-2

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-3

iManager NMS system introduction

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Upon completion of this chapter, you will be able to: 

List 8 pieces of main functions of U2000.



Describe the realization means of U2000



Perform some basic operations of U2000.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-4

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-5

iManager NMS system introduction

/e m o i.c

e w a u .h



M



// : p

This is the position figure of the U2000 in telecommunication management network (TMN). There are 5 layers of TMN as follows:

s e c r u o s e R



Network element layer, whose management software is local craft terminal (LCT)



Element management layer, which manages and configures individual NE as a whole.



Network management layer, which is used to manage a large scale or distributed network.



Service management layer, which supports integrated service operation management including service lease, bandwidth wholesale, VPN etc.



Business management layer, which provides the customer relationship capabilities that include billing, customer care, and service-level agreements. This layer is also primarily where internal business management applications share information with external applications.

g n ni

r a e

L e

or

t t :h

r a le

g n ni

Traditional Operations Support Systems (OSS) contain three layers of management: (i) a Business Management Layer, (ii) a Service Management Layer, and (iii) a Network Management Layer. OSS is a part of business and operation support systems (BOSS).

Confidential Information of Huawei. No Spreading Without Permission

n

P-6

iManager NMS system introduction

/e m o i.c

e w a u .h



M

// : p



The U2000 provides a unified platform for managing transport equipment, Access equipment, and datacom equipment (routers, switches, and security equipment), thus realizing integrated management on cross-domain equipment. In addition, the U2000 breaks the restrictions of the vertical management mode and realizes integrated management on the equipment at the network layer and NE layer.



The U2000 meets the network integration trend and can provide management schemes for multiple types of networking scenarios. With unified and consistent GUIs, simple and convenient service deployment, and effective service monitoring and assurance, the U2000 brings good user experience and greatly reduces network operation and maintenance costs.

g n ni

s e c r u o s e R

r a e

L e

or

t t :h

The features of the U2000 are as follows:

r a le

g n ni



The U2000 is blessed by the good cooperation relationships between Huawei and many mainstream OSS vendors. The U2000 can provide abundant NBIs and

powerful NBI customization support, protecting user investment to the largest extent.

Confidential Information of Huawei. No Spreading Without Permission

n

P-7

iManager NMS system introduction

/e m o i.c

e w a u .h





t t :h

The Characteristic of New Architecture:

r a le

g n ni

// : p



Core modules split from single Process to multi Process.



E2E modules split mutil Process by service.



NEs manager modules split independent NE manager.



System stronger than before, single Process failed doesn’t affect other Process.

s e c r u o s e R

The advantages of the architecture: NE manager, E2E service management adopted independent Process, which can support system distributed deployment and expended management capability smoothly.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-8

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

// : p



The client of U2000 implement the workstation function (WSF) of TMN, by which the user can operate and manage any transaction on the network.



The server of U2000 implement the operating system function (OSF) of TMN, save the network data, provide performs all kinds of management function on the network.



The client and server of U2000 can be installed on PC or workstation. But it is recommended to run the client on the Windows platform. The operating system and database versions should be as follows: 

or



g n ni

s e c r u o s e R

UNIX operating system version on SUN workstation is Solaris 10 and the database version is Sybase 15.0;

r a e

L e

M

r a le

g n ni



PC operating system supports Windows Server 2003, while the database is Microsoft SQL Server 2000 Standard.



Linux operating system version is SUSE Linux 10 SP2 while the database is SYBASE 12.5.

Key features of U2000 architecture: 

Excellent system structure;



Standard interfaces and high integration;



High efficiency and robustness.

Confidential Information of Huawei. No Spreading Without Permission

n

P-9

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



TMN defines northbound interface (NBI) to be used in connecting upper level system while southbound interface (SBI) connecting lower level system or equipment.



Corba (Common Object Request Broker Architecture) interface is one of the standard

s e c r u o s e R

interfaces, by which U2000 can communicate with the NMS developed by other vendors 

SNMP (Simple Network Management Protocol) interface is one of the standard interfaces used in the industry.



The U2000 communicates with transmission GNE by Qx/TL1 interface of TCP/IP protocol,

g n ni

or OSI protocol interface. 

r a e

U2000 supports syslog protocol and radius authentication.

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-10

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

Datacom ME MA5200E/F/G, ME60 SIG SIG9810/9820 SIG9800-server Router NE40, NE80, NE40E, NE80E, NE5000E, NE05, NE08,NE08E, NE16E, NE20, NE20E AR18, AR19, AR28, AR29, AR46, AR49 Switch S8505, S8505E, S8508, S8512,S8016,S6502, S6503, S6506R, S6506, S5000, S5500, S5600, S3000, S3500, S3900 S2000,S2400,S2300, S3300, S5300, S9300,S7800E PTN PTN 910, PTN 912, PTN 950 PTN 1900, PTN 3900 Security Eudemon300, Eudemon500, Eudemon1000/E, Eudemon8040, Eudemon8080/E, Eudemon8160E,Eudemon200E_C, Eudemon200E_F CX CX200, CX200C/D, CX300 CX380, CX600

g n ni

L e

r a e

M

or

// : p

r a le

g n ni

Transmission

Access

SDH OptiX 155C, OptiX 155S, OptiX 1556/622, OptiX 2500, OptiX 2500 REG OSN OptiX OSN 500, OptiX OSN 1500, OptiX OSN 2000, OptiX OSN 2500, OptiX OSN 2500 REG, OptiX OSN 3500, OptiX OSN 7500,OptiX OSN 9500 MSTP OptiX Metro 100, OptiX Metro 200, OptiX Metro 500, OptiX 155/622H(Metro 1000), OptiX Metro 1000V3, OptiX Metro 1050, OptiX Metro 1100, OptiX 155/622(Metro 2050), OptiX 2500+(Metro 3000), OptiX Metro 3100, OptiX 10G(Metro 5000) NG WDM OptiX OSN 1800 OptiX OSN 3800, OptiX OSN 6800,OptiX OSN 8800 Metro WDM OptiX Metro 6020, OptiX Metro 6040, OptiX Metro 6100, OptiX OSN 900 LH WDM OptiX BWS OAS, OptiX BWS OCS, OptiX BWS OIS, OptiX BWS 320GV3, OptiX BWS 1600G, OptiX BWS 1600G OLA, OptiX OTU40000 Submarine OptiX BWS 1600S RTN OptiX RTN 605, OptiX RTN 610, OptiX RTN 620, OptiX RTN 910, OptiX RTN 950

BSL ISN8850/ESR8825 MA5100V1 MA5606T MA5620E MA5620G MA5626E MA5626G MA5651 MA5651G MA5680T MD5500 Radium8750 UA5000 MA5105 MA5200E/F MA5200G MA5300V1 MA5600 MA5600T MA5605

s e c r u o s e R

Confidential Information of Huawei. No Spreading Without Permission

n

P-11

iManager NMS system introduction

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The U2000 evaluates the management capability of different hardware platforms according to the maximum number of managed equivalent NEs and the concurrently accessed clients.



s e c r u o s e R

Currently, a set of U2000 can manage up to 15,000 physical NEs, 20,000 equivalent NEs, and 100 clients. This result is provided after tests are performed under a certain environment and can be used to show the actual management capability of the U2000.



Number of IP equivalent NEs = Number of IP NEs of type 1 x Equivalent coefficient + ...... + Number of IP NEs of type n x Equivalent coefficient



g n ni

NOTE: For example, in the case of 5 NE5000E NEs (equivalent coefficient 10), 200 S5300 NEs (equivalent coefficient 1.25), and 1,000 CX200 NEs (equivalent coefficient 0.625), the calculation

r a e

method is as follows: Number of IP equivalent NEs = 5 x 10 + 200 x 1.25 + 1,000 x 0.625 = 925 

The basic unit of the U2000 equivalent NE is OptiX Metro 1000.



The relation between the U2000 equivalent NE and the equivalent NE in each domain is as follows:

L e

M

or





1 transport equivalent NE = 1 U2000 equivalent NE



4 IP equivalent NEs = 1 U2000 equivalent NE

The management scale of the U2000 is defined as follows: 

Small-scale management scenario: 2,000 U2000 equivalent NEs



Medium-scale management scenario: 6,000 U2000 equivalent NEs



Large-scale management scenario: 15,000 U2000 equivalent NEs



Super large-scale management scenario: 20,000 U2000 equivalent NEs.

Confidential Information of Huawei. No Spreading Without Permission

n

P-12

iManager NMS system introduction

/e m o i.c

e w a u .h



t t :h

Typical Software Requirement of HA

s e c r u o s e R

OS& DB

U2000 V1R1

Remote HA Solaris

g n i

Windows

n r a Linux

e L e

r a le

g n ni

// : p

U2000 V1R2

U2000 V1R3

Veritas 5.0 MP3

Veritas 6.0

1: N HA

Remote 1:N Cold backup

Local HA

Windows Cluster

Remote HA

/

Veritas 5.0 MP3

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-13

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Centralize the administration of multifold service and equipments.



Function as subnetwork management system, provide powerful capability in end-to-end trail management.



Support several open external interfaces, such as CORBA, SNMP, and XML.



NMS operation is independent of the operation system. Windows, Solaris and SUSE Linux platforms are supported, on which the same operations are provided.



Adopt the Client-Server structure;



Provide Java-based graphical user interface with iLOG style in a structure of "tree on the left and table on the right“ both for Windows and Unix platform.

g n ni

s e c r u o s e R

r a e

L e



M

or

In the U2000, ‘3 in 1 View Filter’ makes the Fiber layer, Trail layer, and Protection layer in one view layer. That is to say, you can check the physical topology, server and service trail and protection view simultaneously in just one window, which dispenses with the switch of working windows. Different display condition can be set in the Filter Tree depends on your factual requirement.

Confidential Information of Huawei. No Spreading Without Permission

n

P-14

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The U2000 manages different function modules by using processes. After starting the U2000 server, you can view each process in the user interface of the System Monitor client.



In the U2000, you can deploy the processes of the NE management service, network service, and NBI service independently by the Network Management System Maintenance Suite.



In the System Monitor client, you can also get the information of database, hard disk, component, log and server status.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-15

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



MSuite: The MSuite is a graphical maintenance tool developed for the Huawei iManager U2000 (U2000), a type of Huawei network product. The MSuite is used to debug, maintain, and redeploy the U2000.



The NMS maintenance suite focuses on functions of adding and deleting instances, and backing up and restoring the information about deployed instances and subsystems, installing and uninstalling the subsystems, NBI configuration.



The MSuite can also backup, restore and initialize the database.



The entrance for the NMS maintenance suite:

g n ni

s e c r u o s e R

r a e 

Login the MSuite client. The default user and password are both admin.

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-16

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

// : p



The license file is used to control the functions and resources of the U2000. If the license file is unavailable, some U2000 processes can not start and the functions of the U2000 are limited.



The menu to check license information is Help-> License Information for U2000 V100R002.



The menu to check license information is Help--> About --> License for U2000 V100R001.



Precautions

or

g n ni

s e c r u o s e R



The U2000 license file naming format is: licenseXXXXXXX.dat.



One license file corresponds to the MAC address of a network interface card in an NMS computer and can be used only on the corresponding computer.



For a server with multiple network interface cards, you need to apply for the license of only the primary network interface card of the U2000.



Do not make any change to the license file. Otherwise, the license becomes invalid.



The license control items vary according to the versions of the U2000. When you fill in the application form, use the template that matches the intended version of the U2000.



The license folder contains only one license file in the U2000\server\etc\conf\license

r a e

L e

M

r a le

g n ni

directory of the U2000 V100R002. 

The license file path is U2000\server\license for U2000V100R001.

Confidential Information of Huawei. No Spreading Without Permission

n

P-17

iManager NMS system introduction

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Upon completion of this chapter, you will be able to: 

List 8 pieces of main functions of U2000.



Describe the realization means of U2000



Perform some basic operations of U2000.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-18

iManager NMS system introduction

/e m o i.c

e w a u .h



r a e

L e

M

es

c r u o s e R

├─client │ └─log │ └─lib │ └─patch │ └─sysmoni │ └─version ├─common │ └─tomcat │ └─SVG ├─server ├─notify ├─cau └─uninstall

g n ni



// : p

You can get the document folders as the figure shows above after the U2000 is successfully installed on your computer (Maybe a little difference): Directory

or

t t :h

r a le

g n ni

Description U2000 Client U2000 client log U2000 client files U2000 patch and information U2000 sysmonitor files U2000 client version information Third party software Tomcat SVG view software U2000 Server Remote Notify Service CAU Uninstall

Tips: 

The installation of the folders is optional which depends on the practical requirement.



Drawings and reports are saved in U2000\client\report by default.



There are ‘HWENGR’ and ‘HWNMSJRE’ folders in root path or C disk after installation.

Confidential Information of Huawei. No Spreading Without Permission

n

P-19

iManager NMS system introduction

/e m o i.c

e w a u .h

Directory

r a le

g n ni

// : p

Description U2000 Server ├─server Third Party Tools │ ├─3rdTools Execute Files, such as U2000 start/stop script │ ├─bin Configure Files │ ├─etc Configure Files of iMAP Platform │ │ ├─conf U2000 License │ │ │ ├─license Configure Files of U2000 System │ ├─conf U2000 log │ ├─log The ENV setting script of U2000 │ ├─svc_profile.sh Output data of U2000 running time │ ├─var Data backup │ │ ├─backup Running time data of broadcast │ │ ├─broadcast Database temp data │ │ ├─dbdata Running time data of fault subsystem │ │ ├─fm U2000 log for iMAP platform │useful │ ├─logs The link of U2000 (The installation path is D:\ as example.) Tools │ └─tools U2000server D:\U2000\server\bin\startnms.bat

t t :h

g n ni

s e c r u o s e R

r a e

L e

M

or



D:\U2000\server\bin\stopnms.bat 

U2000sysmonitor

D:\U2000\client\startup_sysmonitor_global.bat



U2000client

D:\U2000\client\startup_all_global.bat



Msuiteclient

C:\HWENGR\engineering\startclient.bat



Msuiteserver

C:\HWENGR\engineering\startserver.bat C:\HWENGR\engineering\stopserver.bat

Confidential Information of Huawei. No Spreading Without Permission

n

P-20

iManager NMS system introduction

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

Upon completion of this chapter, you will be able to: 

List 8 pieces of main functions of U2000.



Describe the realization means of U2000



Perform some basic operations of U2000.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-21

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-22

iManager NMS system introduction

/e m o i.c

e w a u .h



t t :h

Tips:

r a le

g n ni

// : p



Please accustom yourself to often use the right click of the mouse and F1 key on the keyboard during the operation, you can get some useful shortcuts and help.



Right click on different objectives can lead you to the entrances of many frequently used operations.



Using F1 key can make you get correlative help information or description in different operation windows.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-23

iManager NMS system introduction

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

In topology management, the managed equipment and their connection status are displayed in a topological view. The managed objects are organized in submaps and views. You can browse the

s e c r u o s e R

topological view to know the status of the entire network in real time. 

The U2000 provides the physical view, L2 view, RPR view, IP view, cluster view, and MPLS TE view. Therefore, users can browse the required information in different views and also monitor and learn information about the running status of the entire network.



Function of Topological View



An U2000 topological view consists of a navigation tree on the left and a view on the right. The

g n ni

navigation tree directly reflects the network hierarchy. The view displays the objects at different

r a e

coordinates in the background map. 

The topological view provides you with the following functions:

L e

M

or



Add, delete, modify, cut, move to and paste a submap.



Add, delete, modify, cut, copy, copy to, move to, and paste a topology node.



Zoom in or out on topological views.



Set a background map. You can know the position of an equipment node through its icon in the background map.



Find topology objects globally. You can identify an object.



Provide a navigation tree through which you can quickly switch between views.



Provide the aerial view, print function, and filter function.



Support the custom view. You can define and organize different views according to the actual requirements.

Confidential Information of Huawei. No Spreading Without Permission

n

P-24

iManager NMS system introduction

/e m o i.c

e w a u .h



t t :h

s e c r u o s e R



NE Status



Verify Configuration



NE Time Synchronization



Synchronize Current Alarms



Browse Current Alarms



Clear Alarm Indication



Browse Performance



Refresh Board Status



Backup NE Database to SCC



There is an blank area at the bottom of NE Panel, when you left click on a board, the corresponding information of the board is displayed.



Right click on the board and you can get the entrances of many frequently used

g n ni

r a e

M



// : p

The NE Panel displays the slots, boards, and ports of the subrack in different colors. You can check the legend (click the corresponding shortcut icon at the top of the NE Panel) and get the status of the slots, board and ports. Most of the operations such as equipment configuration, monitoring, and maintenance are performed in the NE Panel.

L e

or

r a le

g n ni

Tips:

operations.

Confidential Information of Huawei. No Spreading Without Permission

n

P-25

iManager NMS system introduction

/e m o i.c

e w a u .h





t t :h

M



// : p

NE Explorer is the main operation interface of the U2000. For easy navigation, the NE Explorer window presents an expandable directory tree (Function Tree) in the lower left pane. The configuration, management and maintenance of the equipment are accessed here.

s e c r u o s e R

NE functions include: 

Configuration



Alarm



Performance



Communication



Security



ASON (Automatic Switched Optical Network)

g n ni

r a e

L e

or

r a le

g n ni

Board functions include: 

Configuration



Alarm



Performance

Confidential Information of Huawei. No Spreading Without Permission

n

P-26

iManager NMS system introduction

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

For this course, we take a window of SDH service configuration as an example, which is applied to the following scenarios:

s e c r u o s e R



Create SDH service in Single Station method.



Query and maintain the cross-connection of a single station.

Tips: The cross-connection created in End-to-End Trail method is still displayed in this interface.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-27

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



In the ‘Overhead Management’, you can query and configure the overhead bytes including J0, J1, J2, C2 and Overhead Termination.



This operation is commonly applied to interconnecting with the equipment provided by a third party.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-28

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



You can configure the parameters of each boards including interface boards. U2000 provides the parameters configuration such as loopback, service load, laser switch etc, which are important and helpful to maintenance work.



Tips: Generally speaking, the parameters of Ethernet board should be changed based on different services, while other cards, the PDH board and SDH board, for example, can work in the default configuration.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-29

iManager NMS system introduction

/e m o i.c

e w a u .h



M

or

// : p

This operation is mainly applied to NE communication. The function sub-tree includes: 

Communication Parameters



ECC Management



OSI Management



Access Control



NE ECC Link Management



DCC Management

g n ni

s e c r u o s e R



IP Protocol Stack Management



Inband DCN System Management

r a e

L e



t t :h

r a le

g n ni

Tips: You can check the communication parameters, NE ECC channels and DCC parameters when the NE communication malfunction happens caused by faulty ECC, which is helpful to allocate and solve the problem.

Confidential Information of Huawei. No Spreading Without Permission

n

P-30

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



You should create the protection subnet according to actual network protection demand before the service configuration.



Protection subnet management supports protection subnet search, browse, creation and maintenance.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-31

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



In this user interface, you can maintain and manage protection subnets such as starting or stopping the MSP protocol, protection switching, or checking the protection status. There would be some slight change during the operation for different protection subnet type.



Tips: Before MSP testing, you can perform exercise switching to check if the APS protocol can normally work.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-32

iManager NMS system introduction

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

In the Clock View, you can create a virtual clock device, create a virtual clock link, search for clock links.

s e c r u o s e R



Virtual clock devices and virtual clock links are for the third party equipments which U2000 can’t manage.



Searching for clock links: You can search for clock links of NEs network-wide to learn the clock tracing relationships between NEs. In this function, you can specify the search scope based on the NE or clock link types, which including 1588v2, SDH, PON, Synchronous ETH.

g n ni

r a e

The broken line represents clock priority configuration, while the real link represents the current synchronization status

L e



or

Caution: There should be no clock trace loopback or clock ring in normal SDH network.

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-33

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



In the user interface of DCN Management, you can assign the gateway NE for NEs, which ensures the DCN connectivity.



DCN protection includes:

s e c r u o s e R



Automatic switch of Gateway NE. You can assign one primary and three standby GNEs at most.



Configure the Revertive Mode for switch.



Configure GNE type and IP address.



NE connectivity test.



Query the NEs connected with the GNE in DCN management interface.

g n ni

r a e

L e



M

or

In GNE management interface, you can take a view of GNE attributes, modify GNE IP address, and test GNE connectivity.



NSAP (Network Service Access Point) address is used for OSI protocol while the TSAP (Transport layer Service Access Point) is the protocol port of OSI protocol.



An NE and GNE can be converted each other.



Cautions: The recommended number of non-gateway NEs (including non-gateway NEs that connects to the GNE by using the extended ECC) that connect to each GNE is fewer than 50. Do not connect more than 60 non-gateway NEs to a GNE.

Confidential Information of Huawei. No Spreading Without Permission

n

P-34

iManager NMS system introduction

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

U2000 supports powerful E2E functions for transmission network: 

SDH E2E



Ethernet Service E2E



WDM E2E



RTN E2E



ASON E2E



Hybrid MSTP E2E

g n ni

s e c r u o s e R

The E2E functions are controlled by the license file.

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-35

iManager NMS system introduction

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

The U2000 provides a powerful and flexible trail creation function for SDH, Ethernet, ATM, WDM, etc. In this SDH trail creation interface, for example, you can allocate timeslot, protection priority strategy and resource usage strategy for the service trails. The service route can also be automatically calculated by system or be manually assigned via the ‘Route Constraint’ function.

s e c r u o s e R

The U2000 supports the service granularities based on VC12, VC3, VC4, VC4-4C, VC4-8C, VC4-16C, and VC4-64C. The VC4 server trail must be created before the VC12 and VC3 services configuration.

g n ni



The ‘Trail Creation’ can avoid the discrete services.



Tips: During a new deployment of the equipment, certain alarms that are reasonable but meaninglessly occur. For example, when you configure an SDH trail without the physical connection of cables, the corresponding LOS alarm is generated. If the ‘Alarm Reversion’ is checked, the alarm will not be displayed. This does not affect the network monitoring

r a e

L e

M

or

performed by maintainers. The alarm reversion is unavailable for VC4 server trail.

Confidential Information of Huawei. No Spreading Without Permission

n

P-36

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The Trail Management interface comprises four parts: part A is the table of trails, part B is the function buttons area, part C is the detailed trail route area, and Part D is the graphic area.



In this user interface, you can set filter criteria for trail display, check the status of the service trail and correlative information, alarms or abnormal performance.



The U2000 supports the maintenance operation based on trails, such as alarm supppression and alarm reversion, overhead bytes modification, loopback, etc. You can also export the table of trails and print out.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-37

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Entrance: Choose Service > Tunnel > Create Tunnel from the main menu.



OptiX equipment supports the MPLS tunnel, which is a tunneling technology using the MPLS-protocol-based encapsulation.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-38

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Entrance: Choose Service > Tunnel > Manage Tunnel from the main menu.



You can view the VPN service carried on a Tunnel.



You can view the topology of a Tunnel.



You can view the performance and alarms of a Tunnel.



You can monitor the running status of a Tunnel.



You can diagnose a Tunnel by performing the LSP ping and LSP tracert tests.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-39

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Entrance: Choose Service > PWE3 Service > Create PWE3 Service from the main menu.



You can create a CES PWE3 service tunnel for transmitting TDM signals in trail configuration mode. By using the trail configuration mode, you can directly configure the source and sink nodes of a CES service and the PW attributes on the GUI of the U2000. In this manner, the CES service can be created quickly.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-40

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Entrance: Choose Service > PWE3 Service > Manage PWE3 Service from the main menu.



You can view the service topology of a PWE3 service, learn the topology structure and running status of the service in real time.



You can also monitor the performance and alarm of a PWE3 service.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-41

iManager NMS system introduction

/e m o i.c

e w a u .h







M

// : p

U2000V1R5 supports quick PID service configuration. 

Search and automatic creation of OCH trails



PID service configuration

s e c r u o s e R

U2000V1R5 supports quick OTN service configuration. 

Service package configuration



Cross-layer service creation, modification and replication



One-station configuration

g n ni

U2000V1R5 supports centralized trail maintenance.

r a e

L e

or

t t :h

r a le

g n ni



Centralized information displays in GUIs, including alarms, optical power, MCA spectrum analysis data, bit errors, etc



Automatic analysis of fault location on trails, improving troubleshooting efficiency



U2000V1R5 supports the trail configuration of ODUflex service.



U2000V1R6 supports the trail configuration of 40G/100G coherent boards.

Confidential Information of Huawei. No Spreading Without Permission

n

P-42

iManager NMS system introduction

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

In alarm management, you can monitor network exceptions in real time. It provides various management methods such as alarm statistics, alarm identification, alarm notification, alarm redefinition, and alarm correlation analysis so that the network administrator can take proper measures to recover the normal operation of the network.

s e c r u o s e R



The U2000 supports the powerful fault management function which helps us for the routine maintenance, most of the operation such as fault browse, alarms synchronization, etc, are implemented by this function.



Alarms browse is the important operation for routine maintenance.



Choose one piece of the alarms and right click, you can check the Alarm Affected Trails and Alarm Affected Customers, you can also remove the faults with the of ‘Fault Diagnosis’ wizard.

g n ni

r a e

L e

or



M

Choose one piece of the records, you can get the alarm details and handling suggestion, which is helpful to deal with the faults, click the link you can get more detailed help.

Confidential Information of Huawei. No Spreading Without Permission

n

P-43

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

// : p



In the interface of ’Fault>Settings> NE Alarm/Event Config‘, you can set alarm severity, automatic reporting, and alarm suppression status and apply an alarm attribute template to NEs, subnet and boards.



Explanation for the ‘Status’

or

s e c r u o s e R



Report: Alarm detected by NE is reported to the NMS.



Not Report: The alarm detection is still carried on by NE, but not reported to the NMS.



Suppressed: Detected alarm is suppressed and the NE does not monitor the suppressed alarm anymore.



Not suppressed: Vice versa.

g n ni

r a e

L e



M

r a le

g n ni

Caution: The system usually works with the default Alarm Attribute which cannot be modified, but you can modify and save it as another template and apply it to NEs, subnet and boards.

Confidential Information of Huawei. No Spreading Without Permission

n

P-44

iManager NMS system introduction

/e m o i.c

e w a u .h



M

// : p

Alarm management mainly includes the following operations: 

Customizing Alarm Template



Synchronizing Alarms



Monitoring Network Alarms



Handling an Alarm



Setting the Alarm Auto Processing



Setting the Alarm Filtering

g n ni

s e c r u o s e R



Setting Audible and Visual Alarm Notification



Setting Alarm Remote Notification



Analyzing the Root Alarm of a Fault



Dumping Alarms or Events



Suppressing Alarms



Setting Alarm Reversion



Setting Automatic Alarm Reporting



Modifying Alarm Severity



Diagnosing Faults



Alarm Time Localization

r a e

L e

or

t t :h

r a le

g n ni

Confidential Information of Huawei. No Spreading Without Permission

n

P-45

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



The U2000 supports the powerful performance management function which helps us for the routine maintenance, most of the operation for alarms are implemented by this function.



Performance browse is the important operation for routine maintenance. You can check the current and history performance data, UAT events and performance threshold crossings record in the browse window, you can also select the options in the frame of ‘Performance Event Type’ to get the performance information that you expect.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-46

iManager NMS system introduction

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The U2000 can monitor the key indexes of a network in real time, and provide statistics on the collected performance data. It provides a graphical user interface (GUI) to facilitate network performance management.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-47

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

// : p



Management on physical inventories, fibers and cables, fiber and cable pipes, link resources, and interface resources.



Physical Resource

or

s e c r u o s e R



Telecommunications Room



Rack



NE



Shelf



Board



Port



Slot



Fiber/Cable

g n ni

r a e

L e

M

r a le

g n ni

Confidential Information of Huawei. No Spreading Without Permission

n

P-48

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

// : p



The U2000 provides the inventory management function that allows you to query and collect statistics on physical and logical resources.



Logical Resource

or

s e c r u o s e R



Connection



Gateway



Virtual Local Area Network (VLAN)



Multicast



Quality of service (QoS) and access control list (ACL)



Protocol



Link



Link group



Interface Resource

g n ni

r a e

L e

M

r a le

g n ni

Confidential Information of Huawei. No Spreading Without Permission

n

P-49

iManager NMS system introduction

/e m o i.c

e w a u .h



L e





s e c r u o s e R

Project Document 

Clock Tracing Diagram



Networking Diagram



Timeslot Allocation Diagram



Board Manufacturer Information

g n ni

r a e 

M

// : p

For convenient information browse and management, U2000 supports the following main reports: 

or

t t :h

r a le

g n ni

SDH Report 

Port Resource Report



Statistics Report of SDH Tributary Port Resources



Lower Order Cross-Connection Statistics Report

Microwave Report 

Microwave Link Report



Microwave License Capacity Report

WDM Statistics Report 

WDM Protection Group Switching Status Report



WDM NE Master/Slave Subrack Info Report

Confidential Information of Huawei. No Spreading Without Permission

n

P-50

iManager NMS system introduction

/e m o i.c

e w a u .h



t t :h

M

// : p

The security management function includes authentication, authorization, and access control, to ensure that users can perform operations according to their respective authorities. The U2000 adopts an authority-based and domain-based security management policy, and a security mechanism including access control and encrypted text transmission. This ensures the security of the U2000 system and the transport network data.

s e c r u o s e R



Authentication Management:Support NM user authentication and NE security management.



Authority Management: Support authority management of NM user and remote maintenance user.

g n ni

r a e

L e

or

r a le

g n ni



Network Security Management: Support the Security Socket Layer (SSL) protocol and encrypting the user name and password that are used to log in to an NE



System Security Management: Support monitoring system status and user login management.



Log Management: Support the log operations query and log events restoration.

Confidential Information of Huawei. No Spreading Without Permission

n

P-51

iManager NMS system introduction

/e m o i.c

e w a u .h





User Management



User Group Management



Operation Set Management



Access Management



Equipment Set Management



Security Policy Management

g n ni

// : p

s e c r u o s e R



Client Lockout



ACL

r a e

L e

or

t t :h

Security management function

r a le

g n ni

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-52

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



Database management includes the management of NE and U2000 databases. To ensure data security, you need to back up the database periodically.



MSuite is a tool for U2000 database backup, restoration or initialization.



You can backup or restore the U2000 network configuration data by importing or exporting script files through U2000 client.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-53

iManager NMS system introduction

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The U2000 provides SNMP, CORBA, FTP performance NBI and XML NBIs. The U2000 can be interconnected with different third-party NMSs flexibly through NBIs, to provide the information about physical inventory and alarms to the upper-layer NMSs.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-54

iManager NMS system introduction

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

If the U2000 needs to be accessed to the upper-level network management system, the corresponding northbound interface such as CORBA, XML, and SNMP northbound interfaces should be configured.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-55

iManager NMS system introduction

/e m o i.c

e w a u .h



t t :h

Answers:

// : p



NEL, EML, NML, SML, BML.



Q3, XML, SNMP, CORBA, TXT interfaces

g n ni

r a le

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-56

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

P-57

iManager NMS system introduction

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-1

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p



1 Basic Concepts.................................................................................. Page 3



2 Ethernet Service Classification............................................................Page 9

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-2

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

Reference:



r a le

// : p



ITU-T Recommendation G.8011/Y.1307



ITU-T Recommendation G.8010/Y.1306



ITU-T Recommendation G.7041/Y.1303 (GFP)



ITU-T Recommendation G.7042/Y.1305 (LCAS)

g n ni

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-3

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p

The basic concepts about Ethernet over SDH (EOS) will be mentioned in chapter 1 including External port, VCTRUNK, Tag attribute etc.



s e c r u o s e R

Chapter 2 is the introduction of Ethernet service classification, the definitions, applications and related functions of Ethernet services will be described.



g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-4

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

// : p

For OptiX Ethernet unit, we mainly focus on L2. VLAN (Virtual local area network) is used to isolated different Ethernet signals which are carried by the same physical link, for example the same port or VCTRUNK.



s e c r u o s e R

Frame structure of IEEE 802.1Q frame (VLAN)



DA

SA

PT= 0X8100

VLAN

Ethernet Data

6

6

2

2

N

g n ni

r a e

L e

or

M

r a le

g n ni





The protocol type (PT) of IEEE 802.1Q frame is 0X8100, it is the identification of the signal;

In two bytes VLAN label: 

Priority 3 bits, 0~8 levels;



CFI 1 bit, Token-Ring encapsulation;



VLAN ID 12 bits, the range of VLAN ID is 0~4095.

Confidential Information of Huawei. No Spreading Without Permission

n

Page-5

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

// : p

Port is the external physical port of Ethernet unit. For example, in the front panel of EFS4 there are four external physical ports (RJ45).











s e c r u o s e R

The working modes of the FE external port are Auto-negotiation, 10Mbps (Half/Full duplex) and 100Mbps (Half/Full duplex); For GE optical port the working modes are Auto-negotiation and 1000Mbps Full duplex.

g n ni

For 10GE optical port the working modes are 10GE Full duplex LAN (10.3125 Gbit/s) and 10GE Full duplex WAN (9.953 Gbit/s).

r a e

VCTRUNK is the logical internal port. One Ethernet unit provides several VCTRUNKs connect with XCS unit.

L e

or

M

t t :h

r a le

g n ni





VCTRUNK is built by VC (virtual container), for example if we bind five VC12 into one VCTRUNK the rate of SDH side is around 10Mbps (2Mbps*5); Normally virtual concatenation (VCAT) technology is used to bind VC into VCTRUNK. VCAT is much more flexible than contiguous concatenation (CCAT), all of the members’ status can be monitored by Ethernet unit. If some of the members are failed, the LCAS (link Capacity Adjustment Scheme) function executes the bandwidth adjustment immediately without service interruption, however CCAT can not provide this function, all of the bandwidth will be unavailable when member failure in one group.

Confidential Information of Huawei. No Spreading Without Permission

n

Page-6

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

FE or GE signal is accessed by external port then the GFP-F encapsulation protocol will adopt the Ethernet signal to VCTRUNK.

s e c r u o s e R

Two types of GFP encapsulation protocols: 

GFP-F (Frame-mapped GFP)



For Ethernet service, e.g. FE/GE. GFP-T (Transparent GFP) 

g n ni

For SAN (Storage Area Network) service, e.g. ESCON/FICON/Fiber channel. Both of the external and internal ports can process Tag flag. 



r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-7

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

r a le

// : p



All of the EFGS series boards can process the Tag flag.



Tag flag is used to identify the type of frames:

s e c r u o s e R



Tag frame: Signal contains VLAN;



Untag frame: Signal doesn’t contain VLAN.

g n ni

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-8

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h



t t :h

s e c r u o s e R

The VLAN ID of the frame accessed from the external port is 10, please fill the blanks. If the frame doesn’t contain VLAN ID please fill with “-”.



g n i

rn

ea

L e

M

// : p

Most of the Ethernet boards provide three types of tag attributes: Tag aware, Access and Hybrid. But some of the boards in Metro series can not provide Hybrid, e.g. ET1.

 Thought:

or

r a le

g n ni

Board Port

Port types

VCTRUNK

Port Tag attribute

EFS0

Access

EFS4

Tag

Board





Hybrid

VCTRUNK PVID

Tag attribute

PVID

11

Access

12

Access

12

Hybrid

10

Hybrid

12

10

①’s VID

EGS2 Tag

Confidential Information of Huawei. No Spreading Without Permission

②’s VID

n

Page-9

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-10

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-11

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

From ITU-T recommendation:



r a le

g n ni

// : p



EPL: Ethernet Private Line



Feature: Point to point transmission without sharing. EVPL: Ethernet Virtual Private Line



Feature: Point to point transmission with port or VCTRUNK sharing. EPLAN: Ethernet Private LAN





g n ni

s e c r u o s e R

Feature: Multi-points to multi-points transmission without sharing, based on L2 switching. EVPLAN: Ethernet Virtual Private Line 

L e

r a e

M

or







Feature: Multi-points to multi-points transmission with port or VCTRUNK sharing, based on L2 switching; Bandwidth utilization ratio is low.

Confidential Information of Huawei. No Spreading Without Permission

n

Page-12

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p

In the case of EPL services, a bandwidth is exclusively occupied by the service of a user and the services of different users are isolated. In addition, the extra QoS scheme and security scheme are not required.



g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-13

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p

Services A & B access with different external ports then cross-connect to different VCTRUNKs.



s e c r u o s e R

Point to point transmission without sharing, it provides the low latency and high security point to point transmission.



The bandwidth for customers can be guaranteed, the max. bandwidth of point to point EPL depends on the bandwidth of VCTRUNK.



g n ni

Application: Private line for VIP user for example bank and government private line.



r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-14

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p

If the resource of port or Vctrunk is not enough, different users should share the same port or Vctrunk. Hence, VLAN ID division/MPLS/QinQ technology should be adopted to isolate different services.



g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-15

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p

In ITU-T the “V” of EVPL stands for sharing. Share the external port or VCTRUNK with different VLAN ID, MPLS label or S-VLAN.



g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-16

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

Services access by NE 1will be transmitted by the same external port then cross-connect to different VCTRUNKs, these two services are isolated with different VLAN ID.



s e c r u o s e R

Different customers occupy different VCTRUNK, the bandwidth of VCTRUNK can be guaranteed.



More than one customers share with one external port, so we should control the bandwidth allocation of this external port.



L e

or

g n ni

r a e 



// : p

Service which is from the headquarters have to be transmitted to different department.



M

r a le

g n ni



For example two customers share with one FE port, if one customer use 90% bandwidth of the FE port then another one just can use 10%. Normally we use CAR (Committed Access Rate) function to solve the problem. We can manually configure the committed information rate (CIR) for each of customer.

Application: the quantity of external port is limited, if the external ports are not enough then we can try to implement the port shared EVPL service.

Confidential Information of Huawei. No Spreading Without Permission

n

Page-17

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

s e c r u o s e R

Different customers occupy different external ports, the bandwidth of external port can be guaranteed.



More than one customers share with one VCTRUNK, so we should control the bandwidth allocation of this VCTRUNK.





or

g n ni

For example two customers share with one VCTRUNK, if one customer use 90% bandwidth of this VCTRUNK then another one just can use 10%.

r a e

L e



// : p

Services A & B access with different external ports then cross-connect to the same VCTRUNKs, these two services are isolated with different VLAN ID in the same VCTRUNK.



M

r a le

g n ni



Normally we use CAR (Committed Access Rate) function to control the rate of external port. We can manually configure the committed information rate (CIR) for each of customer.

Application: the max. bandwidth of VCTRUNK is limited, if the total bandwidth is not enough then the VCTRUNK shared EVPL can be used (Different users should have different VLAN ID).

Confidential Information of Huawei. No Spreading Without Permission

n

Page-18

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h



MartinioE Format SA

0x8847(0x8848 broadcast)

Tunnel

VC

Ethernet Data

6

6

2

4

4

N



For the MartinoE encapsulation protocol totally 22 bytes add to the original frame;



The value of protocol type is 0x8847 for MPLS, this is the indication of MPLS;

M

g n ni

Totally there are two labels in one MatinoE frame, Tunnel and VC, each of them is 4 bytes. In the tunnel and VC there are 20 bits used as the label function. So the available range of label is 16~(220-1), 0~15 is reserved by the system.

r a e

L e

or

s e c r u o s e R

// : p

DA





t t :h

The frame structure of MPLS:

r a le

g n ni

The port attribute of MPLS is P or PE: 

PE: the edge of MPLS network, it is used to access the signal without MPLS;



P: the internal port of MPLS network;



The operation of PE and P ports: 

PE->P (Ingress): Add MPLS label;



P->PE (Egress): Discard MPLS label;



P->P (Transit): Exchange MPLS label.

Confidential Information of Huawei. No Spreading Without Permission

n

Page-19

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p

When we configure the EVPL (MPLS) service, the default MPLS encapsulation is MartinoE. It provides two stackable labels Tunnel and VC;



s e c r u o s e R

Different values of VC and Tunnel are used to isolate several Ethernet signal with the same VLAN ID.



g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-20

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

// : p

QinQ technology is a VLAN stacking technology, which conforms to the recommendation for S-VLAN in IEEE 802.1ad and is an expansion of VLAN technology.



s e c r u o s e R

Advantages of QinQ technology:







Expands VLAN and alleviates VLAN resource insufficiency. For example, a VLAN providing 4096 VLAN IDs can provide 4096 x 4096 VLANs after VLAN stacking; Extends LAN service to WAN, connecting the client network to the carrier network and supporting transparent transmission.

g n ni

r a e

QinQ frame format:



L e

or

M

t t :h

r a le

g n ni

DA

SA

TYPE(8100)

S-VLAN

TYPE(8100)

C-VLAN

Ethernet

(6B)

(6B)

(2B)

(2B)

(2B)

(2B)

Data



Customer VLAN label, defined as C-VLAN;



Server layer VLAN label, defined as S-VLAN.

Confidential Information of Huawei. No Spreading Without Permission

n

Page-21

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

From NE1 to NE2, traffic flow from Dept.A and Dept.B with the same C-VLAN-100, two different S-VLAN be attached on the two access ports of NE1 separately, hence, the two traffic flows can be transported in the same channel, on the destination site NE2, the two

s e c r u o s e R

S-VLAN tag be unloaded, to recover the original traffic.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-22

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-23

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p

EPLAN service can provide multi-point to multi-point transmission without sharing.



g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-24

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h



t t :h



g n ni

s e c r u o s e R

If NE3’s VB is failed, what will happen to the EPLAN service?

r a e



L e

M

// : p

EPLAN is based on L2 switching, so in NE2, 3, 4 we should manually configure the VB (Virtual bridge), it is the logical L2 lanswitch. So the traffic between NE2 and NE4 will be forwarded by this VB, and it’s no need to configure the point to point VCTRUNK between NE2 to NE4 any more. Also this solution can increase the bandwidth utilization ratio. Compared with EPL service we need less point to point VCTRUNKs.

 Thought:

or

r a le

g n ni



If NE3’s VB is failed, then the LAN service will be interrupted, the VB in NE3 can not forward the data any more. Normally we should configure another backup VB to prevent the VB failure. For example we could configure a backup VB in NE1, and if NE3’s VB is failed the traffic can still go through with NE1’s VB. However, there is another problem which is called “Broadcast storm”. After we configure 2 VBs in different NEs then loop occurs. STP (Spanning Three Protocol) is used to solve this problem.

Confidential Information of Huawei. No Spreading Without Permission

n

Page-25

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

 

t t :h

// : p

VB is the logical L2 switch, it provides MAC address self-learning function. MAC address self-learning function obviously improves the data forwarding efficiency. How? 

s e c r u o s e R

There is a CAM table in the L2 switch. Initially the CAM table is empty, when the port of L2 switch receives the frame it will broadcast the frame to all the other ports, at the same time it records the source MAC address of the frame into the CAM table. The CAM table records the relation between MAC address and port No.;

g n ni

r a e 

L e

or

r a le

g n ni

After the relation of MAC address and port is established, and the L2 switch will forward frames based on the destination address.

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-26

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h



t t :h

r a le

g n ni

// : p

The working mechanism of VB is the same as L2 switch, the ports of this logical L2 switch are called LP.

g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-27

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h





t t :h

r a le

g n ni

// : p

The spanning tree protocol (STP) blocks certain ports to avoid the loop. Hence, this can solve problems.

s e c r u o s e R

In addition, after being enabled, the STP logically modifies the network topology structure to avoid broadcast storms.

g n ni

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-28

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-29

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p

EVPLAN Service can provide multi-point to multi-point transmission with sharing. In order to identify data from different users, VLAN/MPLS/QinQ technology should be adopted.



g n ni

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-30

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

// : p

The MAC address self-learning and data forwarding of EPLAN service will be based on VB + MAC address. It’s no need to configure the VLAN filter table.





s e c r u o s e R

UNI port type of SVL VB: Tag Aware and Access

EVPLAN service forwards data through VB + MAC Address + VLAN/S-VLAN. The VLAN filter table is necessary.





UNI port type of IVL VB: Tag Aware, Access and Hybrid

g n ni

Ingress Filtering:



r a e 

L e

or

M

t t :h

r a le

g n ni



Enabled: The ingress filtering depends on the setting of the bridge switching mode. When the bridge switching mode is set to IVL/Enable Ingress Filtering, the ingress filtering is jointly enabled. Disabled: The ingress filtering depends on the setting of the bridge switching mode. When the bridge switching mode is set to SVL/Disable Ingress Filtering, the ingress filtering is jointly disabled.

Confidential Information of Huawei. No Spreading Without Permission

n

Page-31

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

r a le

g n ni

// : p

The configuration of EVPLAN (802.1q) service is quite similar with EPLAN service. The only difference is the VLAN filter table is necessary in EVPLAN (802.1q) service.



s e c r u o s e R

IEEE 802.1q bridge supports isolation by using one layer of VLAN tags. It checks the contents of the VLAN tags that are in the data frames and performs Layer 2 switching according to the destination MAC addresses and VLAN IDs.



In NE 3, the LPs of VB is port 1, port 2, VCTRUNK 1 and VCTRUNK 2. Data forwarding will be based on different VLAN ID.



 Thought:

r a e

L e

or

g n ni



Is it necessary to configure VB in NE 2 and NE 4? If no, what kind of service should be configured in these two stations?

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-32

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

// : p

The IEEE 802.1ad bridge supports data frames with two layers of VLAN tags. It adopts the outer S-VLAN tags to isolate different VLANs and supports only the mounted ports whose attributes are C-Aware or S-Aware. This bridge supports the following switching modes:







s e c r u o s e R

This bridge does not check the contents of the VLAN tags that are in the packets and performs Layer 2 switching according to the destination MAC addresses of the packets.

g n ni

This bridge checks the contents of the VLAN tags that are in the packets and performs Layer 2 switching according to the destination MAC addresses and the SVLAN IDs of the packets.

r a e

L e



or

M

r a le

g n ni

In this case, the VoIP services need to be isolated from the HSI services. User M does not need to communicate with user N. Since the C-VLAN of VoIP and HIS service from user M and user N are the same, different S-VLAN should be assigned to isolated the services.

Confidential Information of Huawei. No Spreading Without Permission

n

Page-33

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-34

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-35

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

Thank you!



g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

Page-36

Ethernet Services and Networking Applications

/e m o i.c

e w a u .h

t t :h

g n ni

r a le

g n ni

// : p

s e c r u o s e R

r a e

L e

or

M

Confidential Information of Huawei. No Spreading Without Permission

n

The privilege of HCNA/HCNP/HCIE: With any Huawei Career Certification, you have the privilege on http://learning.huawei.com/en to enjoy: 

1、e-Learning Courses: Logon http://learning.huawei.com/en and enter Huawei Training/e-Learning 

i e aw



If you have the HCIE certificate: You can access all the e-Learning courses which marked for HCIE Certification Users.



Methods to get the HCIE e-Learning privilege : Please associate HCIE certificate information with your Huawei account, and

hu . g

email the account to [email protected] to apply for HCIE e-Learning privilege.

n i rn a le

2、 Training Material Download 

Content: Huawei product training material and Huawei career certification training material.



Method:Logon http://learning.huawei.com/en and enter Huawei Training/Classroom Training ,then you can download training material in the specific training introduction page.



n

If you have the HCNA/HCNP certificate:You can access Huawei Career Certification and Basic Technology e-Learning courses.



m o .c

/e

t t :h

3、 Priority to participate in Huawei Online Open Class (LVC) 

// : p

The Huawei career certification training and product training covering all ICT technical domains like R&S, UC&C, Security,

s e rc

Storage and so on, which are conducted by Huawei professional instructors. 



4、Learning Tools:

u o s e R



eNSP :Simulate single Router&Switch device and large network.



WLAN Planner :Network planning tools for WLAN AP products.

g n ni

In addition, Huawei has built up Huawei Technical Forum which allows candidates to discuss technical issues with Huawei experts , share exam experiences with others or be acquainted with Huawei Products.



L e r

Statement:

r a e

This material is for personal use only, and can not be used by any individual or organization for any commercial purposes.

o

M

HUAWEI TECHNOLOGIES CO., LTD.

Huawei Confidential

1

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF