Sie sind auf Seite 1von 174

OTA105104 OptiX OSN

1500/2500/3500 Networking
Application

ISSUE 1.0

Optical Network Curriculum


Development Section

1
Objectives

Upon completion of this course, you will be able to:

 Understand the basic SDH networks and


basic SDH network elements

 Understand the common survivable


networks and synchronization

 Understand the orderwire and ECC


networking application
2
Confidential Information of
Huawei. Security Level: Internal
Course Contents

Chapter 1 Common SDH Network Topologies

Chapter 2 Common Network Elements

Chapter 3 Introduction to SDH Network Protection

Chapter 4 Synchronization of SDH networks

Chapter 5 Orderwire and Data Interface Application

Chapter 6 ECC Networking Application

3
Confidential Information of
Huawei. Security Level: Internal
Chapter 1 Common SDH Network Topologies

 Chain Network

 Star Network

 Tree Network

 Ring Network

 Mesh Network

4
Confidential Information of
Huawei. Security Level: Internal
Network Topology

 What does a Network Topology consists of?


 Network Elements
 Transmission Lines
 Importance of Network Topology
 Availability of Channels
 Reliability of Network
 Efficiency of Network

5
Confidential Information of
Huawei. Security Level: Internal
Types of Basic Network Topology

 Do you know the following types of network topology?


 Chain (Line) Network
 Star Network
 Tree Network
 Ring Network
 Mesh Network

6
Confidential Information of
Huawei. Security Level: Internal
Chain Network

 Features of chain network:


 All the nodes are connected one after the other
 Both ends open

A B C D E

7
Confidential Information of
Huawei. Security Level: Internal
Chain Network

 Advantages of chain network:


 Cheap to build
 Easy to operate, administrate and maintain
 Disadvantages of chain network:
 Services are difficult to protect
 Applications of chain network
 Railway Lines
 Power Supply Lines

8
Confidential Information of
Huawei. Security Level: Internal
Star Network

 Features of star network


 A special node connected directly with other nodes
 No direct connections between other nodes

A C

D E

9
Confidential Information of
Huawei. Security Level: Internal
Star Network

 Advantages of star network:


 Capable of managing bandwidth
 Disadvantages of star network:
 Potential bottle neck
 Equipment failure at the hub node
 Applications of star network:
 Access Networks
 Rural Telephone Networks
 Network elements are scattered
 Services are unimportant
10
Confidential Information of
Huawei. Security Level: Internal
Tree Network

 Features of tree network


 Combination of chain network and star network

B C

D E
11
Confidential Information of
Huawei. Security Level: Internal
Tree Network

 Advantages of star network:


 Similar to that of chain and star
 Disadvantages of tree network:
 Potential bottle neck
 Not suitable to provide bi-direction services
 Applications of tree network:
 Broadcast Services

12
Confidential Information of
Huawei. Security Level: Internal
Ring Network

 Features of ring network


 All nodes are connected together
 Connect the two end nodes of a chain network to form a ring
network
A

B E

C D

13
Confidential Information of
Huawei. Security Level: Internal
Ring Network

 Advantages of ring network:


 Highly-reliable
 Highly-survivable
 Disadvantages of ring network:
 Complicated
 Applications of ring network:
 Widely used
 The most common network of modern SDH system

14
Confidential Information of
Huawei. Security Level: Internal
Mesh Network

 Features of mesh network


 Many nodes are interconnected together via direct routes

B D
E

15
Confidential Information of
Huawei. Security Level: Internal
Mesh Network

 Advantages of mesh network:


 No bottle neck
 Very reliable
 Disadvantages of mesh network:
 Expensive
 Complicated
 Difficult to manage
 Applications of mesh network:
 Regions with large traffic
 High hierarchy communication networks
16
Confidential Information of
Huawei. Security Level: Internal
Questions

 When do we need the line topology?


 What are the features of a ring network?
 Where is the mesh network used?

17
Confidential Information of
Huawei. Security Level: Internal
Summary

 Ring network is very reliable


 Line is cheap, but it’s difficult to protect the traffic
 Star, tree networks are not common
 Mesh, the most reliable one, and the most expensive. It’s used
for the national backbone systems, for example

18
Confidential Information of
Huawei. Security Level: Internal
Course Contents

Chapter 1 Common SDH Network Topologies

Chapter 2 Common Network Elements

Chapter 3 Introduction to SDH Network Protection

Chapter 4 Synchronization of SDH networks

Chapter 5 Orderwire and Data Interface Application

Chapter 6 ECC Networking Application

19
Confidential Information of
Huawei. Security Level: Internal
Chapter 2 Common Network Elements

 2.1 Terminal Multiplexer (TM)

 2.2 Add/Drop Multiplexer (ADM)

 2.3 MADM

20
Confidential Information of
Huawei. Security Level: Internal
TM

 Functions and Features:


 PDH low rate signals <->STM-N
 SDH signals<->STM-N
 Electrical signals<-> Optical signals

21
Confidential Information of
Huawei. Security Level: Internal
TM

 Applications:
 Point-to-point Network TM TM
 Chain Network
 Ring-chain Combination TM ADM TM

ADM

ADM ADM TM

ADM

22
Confidential Information of
Huawei. Security Level: Internal
Physical Configuration of OSN 3500 TM

 Configure an OSN 3500 TM:


 Tributary Unit : 63X2M
 Line Unit : STM-16 S S S S S S S S S S S S S S S S S S S
1 2 2 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3
9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7
D D
7 7

AUX
PIU

PIU
5 5
S S
FAN FAN FAN
S S S S S S S S S
S S S S S S S S S
1 1 1 1 1 1 1 1 1
1 2 3 4 5 6 7 8 9
0 1 2 3 4 5 6 7 8

GXCS
GXCS
SL16
Q

SCC
SCC
1

23
Confidential Information of
Huawei. Security Level: Internal
Physical Configuration of OSN 2500 TM

 Configure an OSN 2500 TM:


 Tributary Unit : 252X2M
 Line Unit : STM-4

24
Confidential Information of
Huawei. Security Level: Internal
Physical Configuration of OSN 1500 TM

 Configure an OSN 1500 TM:


 Tributary Unit : 64X2M
 Line Unit : STM-4

SLOT14
PIU
SLOT18
D75S SLOT15

SLOT16
PIU
SLOT19
D75S SLOT17

SLOT1 SLOT11 PD1 SLOT6

SLOT2 SLOT12 PD1 SLOT7


FAN
SLOT3 SLOT13 PD1 SLOT8
SLOT20
CXL4 SLOT4 SLOT9
AUX
SLOT5
SLOT10
25
Confidential Information of
Huawei. Security Level: Internal
Chapter 2 Common Network Elements

 2.1 Terminal Multiplexer (TM)

 2.2 Add/Drop Multiplexer (ADM)

 2.3 MADM

26
Confidential Information of
Huawei. Security Level: Internal
ADM
 Functions and Features:
 PDH low rate signals <->STM-N
 SDH signals<->STM-N
 Electrical signals<->Optical signals
 Cross connections:
 Tributary unit<->Eastward Line unit;
 Tributary unit<-> Westward Line unit;
 Eastward Line unit<->Westward Line unit

27
Confidential Information of
Huawei. Security Level: Internal
ADM

 Applications:
 Chain Network TM ADM ADM TM

 Ring Network ADM


 Hub Network
ADM ADM

TM TM ADM

ADM

TM TM

28
Confidential Information of
Huawei. Security Level: Internal
Physical Configuration of OSN 3500 ADM

 Configure an OSN 3500 ADM:


 Tributary Unit : 63X2M
 Line Unit : STM-16

D D
7 7
5 5
S S

P
Q
1

29
Confidential Information of
Huawei. Security Level: Internal
Physical Configuration of OSN 2500 ADM

 Configure an OSN 2500 ADM:


 Tributary Unit : 252X2M
 Line Unit : STM-4

30
Confidential Information of
Huawei. Security Level: Internal
Physical Configuration of OSN 1500 ADM

 Configure an OSN 1500 ADM:


 Tributary Unit : 64X2M
 Line Unit : STM-4

SLOT14
PIU
SLOT18
D75S SLOT15

SLOT16
PIU
SLOT19
D75S SLOT17

SLOT1 SLOT11 PD1 SLOT6

SLOT2 SLOT12 PD1 SLOT7


FAN
SLOT3 SLOT13 PD1 SLOT8
SLOT20
CXL4 SLOT4 SLOT9
AUX
CXL4 SLOT5
SLOT10 31
Confidential Information of
Huawei. Security Level: Internal
Chapter 2 Common Network Elements

 2.1 Terminal Multiplexer (TM)

 2.2 Add/Drop Multiplexer (ADM)

 2.3 MADM

32
Confidential Information of
Huawei. Security Level: Internal
MADM
 Functions and Features:
 MADM is a multi-ADM NE
 function a core unit for constructing various networks

33
Confidential Information of
Huawei. Security Level: Internal
Physical Configuration of OSN 3500 MADM

 Configure an OSN 3500 MADM:


 Tributary Unit : 63X2M
 Line Unit : STM-64

D D
7 7
5 5
S S

P
Q
1

34
Confidential Information of
Huawei. Security Level: Internal
Physical Configuration of OSN 2500 MADM

 Configure an OSN 2500 ADM:


Line Unit : STM-4 and STM-16

S S S S S S S S S S S S S S S
L L L L L L L L L L L L L L L
S S
O O O O O O O O O O O S O O O O
L L
T T T T T T T T T T T L T T T T
O O
1 2 3 4 5 6 7 8 11 12 13 O 1 1 1 1
T T
T 5 6 7 8
9 10
14
C C
S
SLD4 X X

SLD4
SL16

SL16
SL16
SL4
SL4

A
L L
P
16 16

35
Confidential Information of
Huawei. Security Level: Internal
Physical Configuration of OSN 1500 MADM

 Configure an OSN 1500 ADM:


Tributary Unit : 64X2M
Line Unit : STM-4 and STM-16

SLOT14
PIU
SLOT18
D75S SLOT15

SLOT16
PIU
SLOT19
D75S SLOT17

SLOT11 PD1 SLOT6

SL4 SLOT12 PD1 SLOT7


FAN
SL4 SLOT13 PD1 SLOT8
SLOT20
CXL16 SLOT4 SLOT9
AUX
CXL16 SLOT5
SLOT10
36
Confidential Information of
Huawei. Security Level: Internal
Choosing the NE Type

 How to choose the NE type:


 Location of NE in ring or point to point
 Traffic being added and dropped
 Network management

37
Confidential Information of
Huawei. Security Level: Internal
Hybrid networking Example

38
Confidential Information of
Huawei. Security Level: Internal
Questions

 What is a TM and ADM?


 How to configure an ADM using OSN
3500/2500 equipment?

39
Confidential Information of
Huawei. Security Level: Internal
Summary

 The SDH equipment have three NE types: TM, ADM and MADM
 TM is used at the end stations
 ADM is used at the intermediate stations
 MADM is a multi-ADM NE, functioning as core unit for constructing
various networks.

40
Confidential Information of
Huawei. Security Level: Internal
Course Contents

Chapter 1 Common SDH Network Topologies

Chapter 2 Common Network Elements

Chapter 3 Introduction to SDH Network Protection

Chapter 4 Synchronization of SDH networks

Chapter 5 Orderwire and Data Interface Application

Chapter 6 ECC Networking Application

41
Confidential Information of
Huawei. Security Level: Internal
Chapter 3 Introduction to SDH Network
Protection

 3.1 Basic Concepts

 3.2 Types of Survivable Network


 3.2.1 Linear MS Protection

 3.2.2 Protection Rings

 3.2.3 SubNetwork Connection Protection

 3.2.4 Comparison of the Network Protection

42
Confidential Information of
Huawei. Security Level: Internal
Basic Concepts

 Survivable Network
 A network that is capable of restoring traffic in the event of a
failure.
 Automatically restore services
 Within very short time (50ms)
 Without manual intervention

43
Confidential Information of
Huawei. Security Level: Internal
Basic Concepts

 Bidirectional Traffic
 Traffic flow direction along the ring
 Clockwise or counter-clockwise

Thetrafficsharesthesame
equipment andlink

44
Confidential Information of
Huawei. Security Level: Internal
a) Uniformly routed
Basic Concepts
Thetrafficsh
aresth
esa
m e
e
qu ip
m e ntan
dlink

 Unidirectional Traffic
 Traffic flow direction along the ring
a
)Un
ifo
rmlyr
oute
d
 Clockwise and counter-clockwise

T h
etrafficison
d
iffe
renteq uipme
nt
andlink s

T
15166
7 0
-94 45
Confidential Information of b
)Div
erse
lyr ou t
e d Internal
Huawei. Security Level:
Types of Survivable Networks

 Linear Multiplex Section Protection:


 1+1 Linear MS Protection
 1:N Linear MS Protection
 Protection Rings
 2-fiber Unidirectional Path Protection Ring
 2-fiber Bidirectional Path Protection Ring
 2-fiber Bidirectional Multiplex Section Shared Protection Ring
 2-fiber Unidirectional Multiplex Section Dedicated Protection Ring
 4-fiber Bidirectional Multiplex Section Shared Protection Ring
 SubNetwork Connection Protection
46
Confidential Information of
Huawei. Security Level: Internal
Chapter 3 Introduction to SDH Network
Protection

 3.1 Basic Concepts

 3.2 Types of Survivable Network


 3.2.1 Linear MS Protection

 3.2.2 Protection Rings

 3.2.3 SubNetwork Connection Protection

 3.2.4 Comparison of the Network Protection

47
Confidential Information of
Huawei. Security Level: Internal
1+1 Linear MS Protection

 Structure of 1+1 Linear MS Protection System:

Working

Double Double
TM TM

Protection

48
Confidential Information of
Huawei. Security Level: Internal
1+1 Linear MS Protection

 Protection mechanism of 1+1linear MS protection system:


 Concurrent sending  permanent bridging
 Selective receiving  switching

selective receiving selective receiving


switch
concurrent concurrent
sending sending

switch
TU traffic TU traffic

49
Confidential Information of
Huawei. Security Level: Internal
1+1 Linear MS Protection

 Switching modes of 1+1 linear MS protection system:


 Unidirectional switching or Bidirectional switching
 Revertible mode or Non-revertible mode
 As a result:
 Unidirectional switching in revertible mode
 Unidirectional switching in non-revertible mode
 Bidirectional switching in revertible mode
 Bidirectional switching in non-revertible mode
 APS protocol necessity
 Unidirectional switching in non-revertible mode unnecessary
 Other modes necessary 50
Confidential Information of
Huawei. Security Level: Internal
1:N Linear MS Protection

 Structure of 1:N Linear MS Protection:


A B
Protection section (Transmit)
Protection section (Receive)

Working section 1(Transmit)


Working section 1(Receive)

Working section 2(Transmit)


Working section 2(Receive)

Working section N(Transmit)


Working section N(Receive)

Bridging Selector Selector Bridging

51
Confidential Information of
Huawei. Security Level: Internal
1:1 Linear MS Protection

 Structure of 1:1 Linear MS Protection:

Working

Double Double
TM TM

Protection

52
Confidential Information of
Huawei. Security Level: Internal
1:1 Linear MS Protection

 Protection mechanism of 1:1 linear MS protection system:


 Normal traffic flow

Working

Protection

53
Confidential Information of
Huawei. Security Level: Internal
1:1 Linear MS Protection

 Protection mechanism of 1:1 linear MS protection system:


 Traffic flow after protection switching

Working
switch
switch

Protection
TU traffic TU traffic

54
Confidential Information of
Huawei. Security Level: Internal
1:N Linear MS Protection

 Switching modes of 1:N linear MS protection system:


 Bidirectional switching, Revertible mode
 APS protocol necessity
 Necessary

55
Confidential Information of
Huawei. Security Level: Internal
1:N Linear MS Protection

 Switching details:
 Tail end detects SF or SD and sends bridging request to the
head end
 Head end performs the requested bridge and send reverse
bridge request to the tail end
 Tail end performs the switching (receives from the protection
channels) and bridging (sends traffic to the protection channels)
 Head end performs the switching and finishes the bidirectional
switching

56
Confidential Information of
Huawei. Security Level: Internal
Summary for Linear MS Protection

 Linear MS protection is based on the MS (STM-1 within STM-N)


 Protection switching criteria are SF and SD
 SF (Signal Fail) includes RLOS, RLOF, MS-AIS, etc.
 SD (Signal Degrade) includes B2-EXC, B2-SD
 APS Necessity
 Those requiring the APS protocol
 1:N linear MS protection
 uni- or bi-directional 1+1 linear MS protection in revertible modes
 bidirectional 1+1 linear MS protection in non-revertible mode

 This not requiring the APS protocol


 unidirectional 1+1 linear MS protection
57
Confidential Information of
Huawei. Security Level: Internal
Summary for Linear MS Protection

 APS Protocol
 Automatic Protection Switching
 Carried in K1K2 bytes along the protection channels
 Switching Completion Time
 About 25ms for 1:N linear MS protection,
 About 25ms for unidirectional 1+1 linear MS protection in
revertible modes
 About 25ms for bidirectional 1+1 linear MS protection in revertible
modes
 About 25ms for bidirectional 1+1 linear MS protection in non-
revertible mode
 About 15ms for unidirectional 1+1 linear MS protection
58
Confidential Information of
Huawei. Security Level: Internal
Summary for Linear MS Protection

 Network Capacity
 The maximum traffic load that a network carries
 NSTM-N for 1:N linear MS protection without extra traffic or
(1+N) STM-N with extra traffic
 STM-N for 1+1 linear MS protection regardless of the switching
modes

59
Confidential Information of
Huawei. Security Level: Internal
Questions

 Which linear MS protection will you select?


 Which one has the fastest switching speed?
 Which one can carry extra traffic?

60
Confidential Information of
Huawei. Security Level: Internal
Chapter 3 Introduction to SDH Network
Protection

 3.1 Basic Concepts

 3.2 Types of Survivable Network


 3.2.1 Linear MS Protection

 3.2.2 Protection Rings

 3.2.3 SubNetwork Connection Protection

 3.2.4 Comparison of the Network Protection

61
Confidential Information of
Huawei. Security Level: Internal
Classifications of Protection Rings

 Protected Traffic
 Path protection ring
 Multiplex section protection ring
 Traffic Direction
 Unidirectional protection ring
 Bidirectional protection ring
 Number of Optical Fibers
 Two-fiber protection ring
 Four-fiber protection ring

62
Confidential Information of
Huawei. Security Level: Internal
Difference between Path and Multiplex
Section

Multiplex section

Physical Layer
e.g. Optical fiber
Path

63
Confidential Information of
Huawei. Security Level: Internal
Difference between Unidirectional and
Bidirectional

B D

64
Confidential Information of
Huawei. Security Level: Internal
What Protection Rings Can We Have

 Protection Rings
 Two-fiber unidirectional path protection ring
 Two-fiber bidirectional path protection ring
 Two-fiber unidirectional multiplex section protection ring
 Two-fiber bidirectional multiplex section protection ring
 Four-fiber bidirectional multiplex section protection ring

65
Confidential Information of
Huawei. Security Level: Internal
Other Names of Protection Rings (ITU-T)

 More Names for Protection Rings (ITU-T)


 Two-fiber unidirectional multiplex section protection ring
<-->Two-fiber unidirectional multiplex section dedicated
protection ring
 Two-fiber bidirectional multiplex section protection ring
<-->Two-fiber bidirectional multiplex section shared protection
ring
 Four-fiber bidirectional multiplex section protection ring
<-->Four-fiber bidirectional multiplex section shared protection
ring

66
Confidential Information of
Huawei. Security Level: Internal
Two-fiber uni-directional path protection
ring

 Structure:
 One fiber is the working ring - S1
 The other the protection ring - P1
 The service directions of the two rings are opposite

67
Confidential Information of
Huawei. Security Level: Internal
Two-fiber uni-directional path protection
ring

 Protection mechanism:
 Concurrent sending (transmit end)
 Selective receiving (receive end)

68
Confidential Information of
Huawei. Security Level: Internal
Two-fiber uni-directional path protection
ring

 Traffic flow when network is normal:

S1

P1
A

B D

69
Confidential Information of
Huawei. Security Level: Internal
Two-fiber uni-directional path protection
ring

 Protection switching mechanism:


 Switching criteria
 Transmission quality of each individual channel deteriorates
 Usually TU-AIS, TU-LOP alarms

S1

P1
A

B D

70
Confidential Information of
Huawei. switch Security Level: Internal
Two-fiber uni-directional path protection
ring

 Protection switching mechanism:


 Exploded view of node C

71
Confidential Information of
Huawei. Security Level: Internal
Two-fiber uni-directional path protection
ring

 Protection Restoration:
 Restoration time - 10 minutes (not provisionable)

S1 S1

P1 P1
A A

B D B D

C C

switch

72
Confidential Information of
Huawei. Security Level: Internal
Two-fiber uni-directional path protection
ring

 Features of two-fiber unidirectional path protection ring:


 Advantages:
 High speed(≤15ms)
 Traffic flow is clear and simple
 Easy to operate, administrate and maintain

 Disadvantages:
 Time slots can not be reused
 Network capacity is limited

73
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional path protection
ring
 Structure:
 Two fibers
 The traffic directions of the two rings are same

B D

74
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional path protection
ring
 Protection mechanism:
 Concurrent sending (transmit end)
 Selective receiving (receive end)

75
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional path protection
ring

 Traffic flow when network is normal:

B D

76
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional path protection
ring
 Protection switching mechanism:
 Switching trigger conditions:
 Transmission quality of each individual channel
 Usually TU-AIS, TU-LOP alarms

77
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional path protection
ring

 Protection switching mechanism:


 Exploded view of node C

78
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional path protection
ring
 Protection Restoration:
 Restoration time - 10 minutes (not provisionable)

B D

79
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional path protection
ring

 Features of two-fiber unidirectional path protection ring:


 Advantages:
 High speed(≤15ms)
 Traffic flow is clear and simple
 Easy to operate, administrate and maintain

 Disadvantages:
 Time slots can not be reused
 Network capacity is limited

80
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional Multiplex Section
Shared Protection Ring
 Structure:
 No active ring or standby ring
 First half time slots are to carry normal traffic
 The other half time slots are to protect the normal traffic on
another fiber

81
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional Multiplex Section
Shared Protection Ring
 Structure:
 Diagrammatic view

82
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional Multiplex Section
Shared Protection Ring
 Traffic flow when network is normal:
 Working channels=1~N/2 AU4
 Protection channels=N/2+1~N AU4

B D

Protection channels
Working channels
83
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional Multiplex Section
Shared Protection Ring
 Traffic flow when network is broken:
 Working channels=1-N/2 AU4
 Protection channels=N/2+1-N AU4

84
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional Multiplex Section
Shared Protection Ring

 Protection switching trigger conditions:


 Automatic protection switching
 SF (Signal Failure): R-LOS, R-LOF, MS-AIS, AU-LOP
 SD (Signal Degrade): B2-EXC, B2-SD

 External initiated protection switching


 Forced switch
 Manual switch
 Exercise switch

 Lockout
 Lockout of working channels
 Lockout of protection

85
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional Multiplex Section
Shared Protection Ring

 Protection switching restoration:


 Automatic protection switching
 Clear of SF (Signal Failure): R-LOS, R-LOF, MS-AIS, AU-LOP
 Clear of SD (Signal Degrade): B2-EXC, B2-SD
 WTR (Wait to Restore): 10 minutes (5-12 minutes provisionable)

 External initiated protection switching


 Clear of Forced switch
 Clear of Manual switch
 Exercise switch (no switch)
 Restore immediately, no WTR

86
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional Multiplex Section
Shared Protection Ring

 APS controller:
 Meaning:
 The APS controller is responsible for generating and terminating the
APS information carried in the K1K2 bytes and implementing the
APS algorithm.
 APS controller status
 Idle
 Switching
 Pass-through
 WTR

87
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional Multiplex Section
Shared Protection Ring

 APS controller:
 Transition of APS controller status:

88
Confidential Information of
Huawei. Security Level: Internal
Two-fiber bidirectional path protection
ring

 Features of two-fiber bidirectional MS shared protection ring:


 Advantages:
 Time slots can be reused
 High network capacity ½*M*STM-N

 Disadvantages:
 Switching slow - 25ms
 Mechanism complicated

 Application:
 Mainly for STM-4 and STM-16 or above system
 Scattered traffic distribution

89
Confidential Information of
Huawei. Security Level: Internal
Two-fiber Unidirectional Multiplex
Section Dedicated Protection Ring
 Structure:
 One fiber is the working ring - S1
 The other the protection ring - P1
 The traffic directions of the two rings are opposite

90
Confidential Information of
Huawei. Security Level: Internal
Two-fiber Unidirectional Multiplex
Section Dedicated Protection Ring
 Structure:
 Diagrammatic view

91
Confidential Information of
Huawei. Security Level: Internal
Two-fiber Unidirectional Multiplex
Section Dedicated Protection Ring

 Traffic flow when network is normal:

92
Confidential Information of
Huawei. Security Level: Internal
Two-fiber Unidirectional Multiplex
Section Dedicated Protection Ring

 Traffic flow when network is broken:

93
Confidential Information of
Huawei. Security Level: Internal
Two-fiber Unidirectional Multiplex
Section Dedicated Protection Ring

 Protection switching trigger conditions:


 Automatic protection switching
 SF (Signal Failure): R-LOS, R-LOF, MS-AIS, AU-LOP
 SD (Signal Degrade): B2-EXC, B2-SD

 External initiated protection switching


 Forced switch
 Manual switch
 Exercise switch

 Lockout
 Lockout of working channels
 Lockout of protection

94
Confidential Information of
Huawei. Security Level: Internal
Two-fiber Unidirectional Multiplex
Section Dedicated Protection Ring

 Protection switching restoration:


 Automatic protection switching
 Clear of SF (Signal Failure): R-LOS, R-LOF, MS-AIS, AU-LOP
 Clear of SD (Signal Degrade): B2-EXC, B2-SD
 WTR (Wait to Restore): 10 minutes (5-12 minutes provisionable)

 External initiated protection switching


 Clear of Forced switch
 Clear of Manual switch
 Exercise switch (no switch)
 Restore immediately, no WTR

95
Confidential Information of
Huawei. Security Level: Internal
Two-fiber Unidirectional Multiplex
Section Dedicated Protection Ring

 APS controller:
 Meaning:
 The APS controller is responsible for generating and terminating the
APS information carried in the K1K2 bytes and implementing the
APS algorithm.
 APS controller status
 Idle
 Switching
 Pass-through
 WTR

96
Confidential Information of
Huawei. Security Level: Internal
Two-fiber Unidirectional Multiplex
Section Dedicated Protection Ring

 APS controller:
 Transition of APS controller status:

97
Confidential Information of
Huawei. Security Level: Internal
Two-fiber Unidirectional Multiplex
Section Dedicated Protection Ring

 Features of two-fiber unidirectional MS dedicated ring:


 Advantages:
 Can protect traffic between ring and line

 Disadvantages:
 Switching slow - 25ms
 Network capacity limited-STM-N (with extra traffic 2*STM-N)
 Mechanism complicated

 Application:
 Mainly for STM-1 system

98
Confidential Information of
Huawei. Security Level: Internal
Four-fiber bidirectional Multiplex
Section Shared Protection Ring
 Structure:
 Four fibers
 Working channels--S1,S2, carry normal traffic
 Protection channels--P1,P2, protect normal traffic

CA AC

S1
P1
S2
P2
A
D B
C
P2
S2
P1
S1

CA AC 99
Confidential Information of
Huawei. Security Level: Internal
Four-fiber bidirectional Multiplex
Section Shared Protection Ring

 Structure:
 Diagrammatic view

100
Confidential Information of
Huawei. Security Level: Internal
Four-fiber bidirectional Multiplex
Section Shared Protection Ring
 Traffic flow when network is normal:
 Working channels=S1, S2
 Protection channels=P1, P2

B D

Protection channels
Working channels
101
Confidential Information of
Huawei. Security Level: Internal
Four-fiber bidirectional Multiplex
Section Shared Protection Ring
 Traffic flow after the working channel (s) is (are) broken:
 Span switching

B D

Protection channels(Protection fibers)


Working channels(Working fibers)
102
Confidential Information of
Huawei. Security Level: Internal
Four-fiber bidirectional Multiplex
Section Shared Protection Ring
 Traffic flow after the working and protection channels are
broken:
 Ring switching

CA AC
S1
P1
S2
P2
A
D B
P2 C
S2
P1
S1
Switching
CA AC 103
Confidential Information of
Huawei. Security Level: Internal
Four-fiber bidirectional Multiplex
Section Shared Protection Ring

 Protection switching trigger conditions:


 Automatic protection switching
 SF (Signal Failure): R-LOS, R-LOF, MS-AIS, AU-LOP
 Signal Fail- Ring
 Signal Fail -Span

 SD (Signal Degrade): B2-EXC, B2-SD


 Signal Degrade - Ring
 Signal Degrade - Span

104
Confidential Information of
Huawei. Security Level: Internal
Four-fiber bidirectional Multiplex
Section Shared Protection Ring

 Protection switching trigger conditions:


 External initiated protection switching
 Forced switch to Protection - Ring
 Forced switch to Protection - Span
 Manual switch to Protection - Ring
 Manual switch to Protection - Span
 Exercise switch to Protection - Ring
 Exercise switch to Protection - Span

 Lockout
 Lockout of working channels
 Lockout of protection

105
Confidential Information of
Huawei. Security Level: Internal
Four-fiber bidirectional Multiplex
Section Shared Protection Ring

 Protection switching restoration:


 Automatic protection switching
 Clear of SF (Signal Failure): R-LOS, R-LOF, MS-AIS, AU-LOP
 Clear of SD (Signal Degrade): B2-EXC, B2-SD
 WTR (Wait to Restore): 10 minutes (5-12 minutes provisionable)

 External initiated protection switching


 Clear of Forced switch
 Clear of Manual switch
 Exercise switch (no switch)
 Restore immediately, no WTR

106
Confidential Information of
Huawei. Security Level: Internal
Four-fiber bidirectional Multiplex
Section Shared Protection Ring

 APS controller:
 Meaning:
 The APS controller is responsible for generating and terminating the
APS information carried in the K1K2 bytes and implementing the
APS algorithm.
 APS controller status
 Idle
 Switching
 Pass-through
 WTR

107
Confidential Information of
Huawei. Security Level: Internal
Four-fiber bidirectional Multiplex
Section Shared Protection Ring

 APS controller:
 Transition of APS controller status:

108
Confidential Information of
Huawei. Security Level: Internal
Four-fiber bidirectional Multiplex
Section Shared Protection Ring

 Features of four-fiber bidirectional MS shared protection ring:


 Advantages:
 Time slots can be reused
 High network capacity M*STM-N

 Disadvantages:
 Switching slow - 25ms
 Mechanism complicated
 Expensive

 Application:
 Mainly STM-16 or above system
 Scattered traffic distribution
 Backbone system 109
Confidential Information of
Huawei. Security Level: Internal
Chapter 3 Introduction to SDH Network
Protection

 3.1 Basic Concepts

 3.2 Types of Survivable Network


 3.2.1 Linear MS Protection

 3.2.2 Protection Rings

 3.2.3 SubNetwork Connection Protection

 3.2.4 Comparison of the Network Protection

110
Confidential Information of
Huawei. Security Level: Internal
SubNetwork Connection Protection

 Description:
 Protection one SubNetwork Connection
 Can be adapted to all networks

111
Confidential Information of
Huawei. Security Level: Internal
SubNetwork Connection Protection

 Normal condition for unidirectional SNCP:


 Concurrent sending (transmit end)
 Selective receiving (receive end)

112
Confidential Information of
Huawei. Security Level: Internal
SubNetwork Connection Protection

 Failure in working channels for unidirectional SNCP:


 Concurrent sending (transmit end)
 Selective receiving (receive end)

113
Confidential Information of
Huawei. Security Level: Internal
SubNetwork Connection Protection

 Normal condition for bidirectional SNCP:


 Concurrent sending (transmit end)
 Selective receiving (receive end)

114
Confidential Information of
Huawei. Security Level: Internal
SubNetwork Connection Protection

 Failure in working channels for bidirectional SNCP:


 Concurrent sending (transmit end)
 Selective receiving (receive end)

115
Confidential Information of
Huawei. Security Level: Internal
SubNetwork Connection Protection

 Traffic flow when network is normal (unidirectional):

S1

P1
A

B D

116
Confidential Information of
Huawei. Security Level: Internal
SubNetwork Connection Protection

 Traffic flow when network is abnormal(unidirectional):

S1

P1
A

B D

switch 117
Confidential Information of
Huawei. Security Level: Internal
SubNetwork Connection Protection

 Traffic flow when network is normal (bidirectional):

S1

P1
A

B D

118
Confidential Information of
Huawei. Security Level: Internal
SubNetwork Connection Protection

 Traffic flow when network is abnormal (bidirectional):


switch
S1

P1 A

B D

switch
119
Confidential Information of
Huawei. Security Level: Internal
SubNetwork Connection Protection

 Protection switching criteria:


 Default
 R-LOS, R-LOF, MS-AIS, B2-EXC, AU-LOP, AU-AIS, TUAIS,
TULOP, HP-LOM, HP-UNEQ, B3-EXC, Unplug the line card
 Optional
 B2-SD, HP-TIM, B3-SD, LP-TIM, LP-SLM, LP-UNEQ, BIP-EXC,
BIP-SD

120
Confidential Information of
Huawei. Security Level: Internal
SubNetwork Connection Protection

 Protection Restoration:
 Restoration time - 10 minutes (provisionable on the order of 5-12
minutes)

S1 S1

P1 P1
A A

B D B D

C C

switch

121
Confidential Information of
Huawei. Security Level: Internal
SubNetwork Connection Protection

 Features of SNC protection:


 Advantages:
 Can be used for all networks
 Relatively high speed
 Traffic flow is clear and simple

 Disadvantages:
 Time slots can not be reused
 Network capacity is limited
 The more traffic, the more time to finish the switching

122
Confidential Information of
Huawei. Security Level: Internal
Optical Path Shared MSP

Multiple MSP groups share the same optical fiber and optical interface.

OptiX OSN 3500 or other


transmission equipment

STM-1/4/16 fiber
STM-1/4/16 fiber
STM-1/4/16
shared MSP ring

OptiX OSN STM-16/64 fiber OptiX OSN


3500 3500

STM-1/4/16
shared MSP ring
STM-1/4/16 fiber STM-1/4/16 fiber

OptiX OSN 3500 or other


transmission equipment 123
Confidential Information of
Huawei. Security Level: Internal
Optical Path Shared MSP
Prerequisite:
The SDH board can process multiple sets of independent K bytes.
The SL16 and SL64 boards of the OptiX OSN 3500 support the function.

MSP ring 1
MSP ring 1
STM-16
STM-16

X STM-64 X STM-16
MSP ring 2 STM-16
MSP ring 2 STM-16

MSP ring 1
STM-4

X STM-16
MSP ring 2 STM-4

124
Confidential Information of
Huawei. Security Level: Internal
Chapter 3 Introduction to SDH Network
Protection

 3.1 Basic Concepts

 3.2 Types of Survivable Network


 3.2.1 Linear MS Protection

 3.2.2 Protection Rings

 3.2.3 SubNetwork Connection Protection

 3.2.4 Comparison of the Network Protection

125
Confidential Information of
Huawei. Security Level: Internal
Summary for Protection Rings

 Protected Traffic
 PP: protects locally dropped paths (VC12) tributaries.
 MSP: protects line traffic at the level of MS
 SNCP: protects the SubNetwork Connection, which is applicable
to all the protections.
 Protection switching criteria
 Path protection: TUAIS, TULOP
 MS protection: SF (Signal Fail) and SD (Signal Degrade)
 SF includes RLOS, RLOF, MS-AIS, etc.
 SD (Signal Degrade) includes B2-EXC, B2-SD, which is an optional
criterion
126
Confidential Information of
Huawei. Security Level: Internal
Summary for Protection Rings

 APS necessity
 PP: unnecessary
 MSP: necessary
 SNCP: dependent
 Revertive - necessary
 Non-revertive - unnecessary

 Protection switching implementing board (s)


 PP: Tributary boards (PQ1, PD1)
 MSP: SCC, LU, XC
 LU detects SF of SD
 SCC generates/terminates the APS carried in K1K2
 XC implements the traffic switch
127
Confidential Information of
Huawei. Security Level: Internal
Summary for Protection Rings

 Switching Completion Time


 About 15ms for PP ring
 About 25ms for MSP ring
 Less than 50ms for SNCP
 The more traffic, the longer the switching completion time

 Restoration Time of Traffic


 10 minutes for PP ring (not provisionable)
 5-12 minutes for MSP ring (provisonable)
 5-12 minutes for SNCP (provisonable)

128
Confidential Information of
Huawei. Security Level: Internal
Summary for Protection Rings

 Network Capacity
 STM-N for PP
 1/2  NSTM-N for 2-fiber bi-directional MS shared protection
ring
 NSTM-N for 4-fiber bi-directional MS shared protection ring
 STM-N for 2-fiber uni-directional MS dedicated protection ring

129
Confidential Information of
Huawei. Security Level: Internal
Summary for Protection Rings
 Application
 PP for concentrated traffic distribution
 appropriate for STM-1 or STM-4 systems

 2/4-fiber bidirectional MS shared protection ring for scattered


traffic distribution
 appropriate for STM-16 or above systems

 2-fiber unidirectional MS dedicated protection ring for special


case
 mostly for ring-line network at the level of STM-1

 SNCP for complicated network


 tangent rings
 ring interworking
 DNI (Dual Node Interconnection)
130
Confidential Information of
Huawei. Security Level: Internal
Questions

 Which differences can you find between a


unidirectional ring and a bidirectional one?
 What’s the difference between a PP and an
MSP?
 Which one can carry extra traffic?

131
Confidential Information of
Huawei. Security Level: Internal
Chapter 4 Synchronization of SDH
Networks

 4.1 Basic Concepts

 4.2 Synchronization Networks Aspects

 4.3 OptiX Equipment Implementation of


Synchronization

132
Confidential Information of
Huawei. Security Level: Internal
Basic Concepts

 Time
 Time is used to specify an instant (time of the day) or as a
measure of time interval.
 Clock
 An equipment that provides a timing signal.
 Master clock
 A generator which generates an accurate frequency signal for the
control of other generators.
 Slave clock
 A clock whose timing output is phase-locked to a reference timing
signal received from a higher quality clock.
133
Confidential Information of
Huawei. Security Level: Internal
Basic Concepts

 Asynchronous mode
 A mode where clocks are intended to operate in free running
mode.
 Master slave mode
 A mode where a designated master clock is used as a frequency
standard which is disseminated to all other clocks which are
slaved to the master clock.
 Plesiochronous mode
 A mode where the essential characteristic of time scales or
signals such that their corresponding significant instants occur at
nominally the same rate, any variation in rate being constrained
within specified limits.
134
Confidential Information of
Huawei. Security Level: Internal
Basic Concepts

 Pseudo-synchronous mode
 A mode where all clocks have a long-term frequency accuracy
compliant with a primary reference clock as specified in
Recommendation G.811 under normal operating conditions. Not
all clocks in the network will have timing traceable to the same
PRC.
 Synchronous network
 A network where all clocks have the same long-term accuracy
under normal operating conditions

135
Confidential Information of
Huawei. Security Level: Internal
Basic Concepts

 Synchronization network
 A network to provide reference timing signals.
 Locked mode
 An operating condition of a slave clock in which the output signal
is controlled by an external input reference such that the clock's
output signal has the same long-term average frequency as the
input reference, and the time error function between output and
input is bounded. Locked mode is the expected mode of
operation of a slave clock.
 When the clock source detection module of the timing unit
detects that the clock reference source being traced is available,
the clock unit will enter into locked work mode.
136
Confidential Information of
Huawei. Security Level: Internal
Basic Concepts

 Holdover mode
 An operating condition of a clock which has lost its controlling
reference input and is using stored data, acquired while in
locked operation, to control its output. The stored data are used
to control phase and frequency variations, allowing the locked
condition to be reproduced within specifications.
 Holdover begins when the clock output no longer reflects the
influence of a connected external reference, or transition from it.
Holdover terminates when the output of the clock reverts to
locked mode condition.
 When all traceable clock reference sources have been lost, the
clock unit will enter into holdover mode.
137
Confidential Information of
Huawei. Security Level: Internal
Basic Concepts

 Free running mode


 An operating condition of a clock, the output signal of which is
strongly influenced by the oscillating element and not controlled
by phase-locking techniques.
 Free running begins when the clock output no longer reflects the
influence of a connected external reference, or transition from it.
Free running terminates when the clock output has achieved
lock to an external reference.
 When all clock reference sources being traced are lost more
than 24 hours or when the control data saved during locked
mode are all used up, the clock unit will turn from holdover mode
into free running work mode. 138
Confidential Information of
Huawei. Security Level: Internal
Chapter 4 Synchronization of SDH
Networks

 4.1 Basic Concepts

 4.2 Synchronization Networks Aspects

 4.3 OptiX Equipment Implementation of


Synchronization

139
Confidential Information of
Huawei. Security Level: Internal
Synchronization Network Aspects

 Synchronization Modes
 synchronous
 pseudo-synchronous
 plesiochronous
 asynchronous.
 Synchronization of national networks
 Fully synchronized, controlled by one or several primary
reference clocks
 Fully plesiochronous
 mixed

140
Confidential Information of
Huawei. Security Level: Internal
Synchronization Network Aspects

 Synchronization of nodal clocks


 Master-slave
 Mutual synchronization
 Hierarchies of the clocks
 G.811 PRC
 G.812 Transit
 G.812 Local
 G.813 SEC (SDH equipment clock)

141
Confidential Information of
Huawei. Security Level: Internal
Synchronization Network

 Synchronization Network
 Intra-station
 Star topology
 Within the station, derive timing from the highest level
 Only the highest level clock recover synchronization from other
stations
 Timing outside the station boundary is distributed via SDH
transmission medium
 Inter-station
 Tree-like topology
 Lower levels only accept timing from higher hierarchies
 Timing loop should be avoided
142
Confidential Information of
Huawei. Security Level: Internal
Synchronization Network

 Intra-station Distribution

143
Confidential Information of
Huawei. Security Level: Internal
Synchronization Network
 Inter-station Distribution

144
Confidential Information of
Huawei. Security Level: Internal
Synchronization Network Reference Chain

 K=10
 N=20
 Total number
of SDH node
clocks limited
to 60

145
Confidential Information of
Huawei. Security Level: Internal
Synchronization Network Reference Chain

 K=10
 N=20
 Total number
of SDH node
clocks limited
to 60

146
Confidential Information of
Huawei. Security Level: Internal
Chapter 4 Synchronization of SDH
Networks

 4.1 Basic Concepts

 4.2 Synchronization Networks Aspects

 4.3 OptiX Equipment Implementation of


Synchronization

147
Confidential Information of
Huawei. Security Level: Internal
Synchronous Clock Sources for OptiX
Equipment

 Reference Clock Sources for OptiX Equipment


 External clock (2Mbits/s or 2MHz)
 Optical interface (Westward or Eastward)
 Tributary interface
 Internal clock
 Clock Unit Working Modes
 Locked mode
 Holdover mode
 Free running mode

148
Confidential Information of
Huawei. Security Level: Internal
Working Mode Transition

 Three working modes transition

149
Confidential Information of
Huawei. Security Level: Internal
Synchronization Protection for OptiX
Equipment

 Synchronization Status Message (SSM):


 A group of codes representing the clock quality
 To indicate the clock quality levels

150
Confidential Information of
Huawei. Security Level: Internal
Synchronization Protection for OptiX
Equipment

 Automatic Protection Switching Protocol of Synchronization


 A node can have many clock sources (priority table)
 According to the value of S1, the node selects the highest-
quality clock
 Transmitting clock quality to downstream stations
 Transmitting clock unavailable to upstream station
 When the traced source lost, it selects the next highest-quality
clock

151
Confidential Information of
Huawei. Security Level: Internal
Synchronization Protection for OptiX
Equipment

 Timing Loop and Prevention

BITS

SSU-A(0x04) SSU-A(0x04)
NE1 QL_DNU(0x0f) NE2
w e w e

Other NEs

152
Confidential Information of
Huawei. Security Level: Internal
Synchronization Protection for OptiX
Equipment

 Clock ID
 Lower four bits with S1 byte
 Avoid the timing loop

153
Confidential Information of
Huawei. Security Level: Internal
Synchronization Protection for OptiX
Equipment
 Configuration of Clock ID
 External clock sources
 intersection points

BITS
BITS
ID=1

id=1
NE m
SETS IID=2 NE 1
SETS
id=2
STM-N
ID=4 id=3
. . . . . id=1 ......
NE 1 . NE n IID=5 NE m
SETS IID=3 SETS id=4 NE 1
SETS
id=5 SETS
IID=6 2Mb/2MHz id=6
IID=4
Subnet m id=7
Subnet n
PRC BITS

154
Confidential Information of
Huawei. Security Level: Internal
Implementation of Synchronization
Protection for OptiX Equipment
 Clock Configuration:
 NE1: External/Westward/Eastward/Internal
 NE2: Westward/Eastward/Internal
 NE3: Westward/Eastward/Internal
 NE4: Westward/Eastward/External/Internal
 NE5: Eastward/Westward/Internal
 NE6: Eastward/Westward/Internal

155
Confidential Information of
Huawei. Security Level: Internal
Synchronization Compensation after Long
Distance OptiX Equipment

 For the synchronization reference chain, K=10, N=20

156
Confidential Information of
Huawei. Security Level: Internal
Questions

 What are the three working modes of the


clock unit?
 How to synchronize the node clock?
 Write down the synchronization reference
chain.
 What is SSM? What’s the difference between
SSM and S1 byte?

157
Confidential Information of
Huawei. Security Level: Internal
Chapter 5 Orderwire Networking Application

 6.1 Orderwire planning

 6.2 A Example of Orderwire


Networking Application

158
Confidential Information of
Huawei. Security Level: Internal
Orderwire planning

Principles for network orderwire planning

No. Principle

1 The orderwire signaling in the network must be the same or


compatible.
2 The orderwire parameters of respective nodes in the network must be
consistent.

3 The increase of orderwire No. and that of the node ID must be


consistent.
4 When orderwire interworking is required at where there is no optical
path connection, orderwire outgoing subnet connection can be made
for the purpose.

159
Confidential Information of
Huawei. Security Level: Internal
Orderwire planning

 Note:
The consistency of the orderwire parameters includes the following aspects:
 The length of telephone numbers of all nodes is the same.
And four digits are recommended.
 The number for conference calls in the whole network is the same and
is larger than the orderwire number.9999 is recommended.
 The orderwire numbers are not repeated.
 The dialing mode for all nodes is set to dual tone multi frequency (DTMF).
 The call waiting time for all NEs is the same. When the number of nodes is
less than 30, 5s is recommended. Otherwise, 9s is recommended.

 Note:
The rule for setting orderwire No. is as follows:
Ring No. (1 digit) + user-defined No. (3 digits).

160
Confidential Information of
Huawei. Security Level: Internal
A Example of Orderwire Networking Application

161
Confidential Information of
Huawei. Security Level: Internal
Chapter 6 ECC Networking Application

 6.1 Basic Concepts

 6.2 ECC Networking Application

162
Confidential Information of
Huawei. Security Level: Internal
Ways of communication between stations
over SDH network:

 TCP/IP Protocol
 ECC Protocol

GNE NE NE NE NE
TCP/IP
Protocol
DCC Channel (ECC Protocol)
TMN
OAM Messages: Performance, Alarm,
Operation commands

163
Confidential Information of
Huawei. Security Level: Internal
Node ID and IP

 Node ID
 Identify different nodes in ECC protocol
 Identify different nodes in database on NMS
 Node IP
 The address for TCP/IP protocol
 Relationship between ID and IP
 If the ID of one node is:0X090004, then the IP will be 129.9.0.4
 If the IP is: 129.9.A.B, then ID=A*256+B

164
Confidential Information of
Huawei. Security Level: Internal
Meaning of ID

 Meaning of ID
 0xQQAABB
 0X --- Hexadecimal
 QQ --- Sub-network identifier, or extended ID
 AABB --- basic ID, which can be configured

 Functions of extended ID
 Basic ID may be limited
 When different networks are connected together to form one bigger
network, we don't have to change the ID of each node, only to
change QQ in each network.

165
Confidential Information of
Huawei. Security Level: Internal
Ethernet Cable

166
Confidential Information of
Huawei. Security Level: Internal
Connection Mode between Gateway and
NMS Computer

 LAN Connection via Crossover Cable

167
Confidential Information of
Huawei. Security Level: Internal
Connection Mode between Gateway and
NMS Computer
 LAN Connection via Standard Cable

NMS

HUB

TCP/IP

GNE GNE
......
NE NE NE NE

NE NE

168
Confidential Information of
Huawei. Security Level: Internal
Connection Mode between Gateway and
NMS Computer
 Wan Connection

169
Confidential Information of
Huawei. Security Level: Internal
Connection Mode between Gateway and
NMS Computer
 Remote Maintenance Connection

170
Confidential Information of
Huawei. Security Level: Internal
Gateway Backup

 NE1 is the main gateway


 NE3 is the backup gateway

171
Confidential Information of
Huawei. Security Level: Internal
Extended ECC

 Solid line means optical fiber connection


 Dashed line shows Ethernet cable connection (extended ECC)

172
Confidential Information of
Huawei. Security Level: Internal
Questions

 How can you change the node ID?


 If the node IP is 129.9.0.78, then what should
be the ID of this node?
 How many ways can you think of to connect
the NMS computer with the gateway?

173
Confidential Information of
Huawei. Security Level: Internal
174
Confidential Information of
Huawei. Security Level: Internal

Das könnte Ihnen auch gefallen