This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
UA5000 Technical Manual Contents
Issue 04 (2007-03-20) Huawei Technologies Proprietary i
Contents
1 System Overview .......................................................................................................................1-1 1.1 Product Orientation .......................................................................................................................................1-2 1.2 Features and Benefits ....................................................................................................................................1-4
1.2.1 Multi-Service Access Platform ............................................................................................................1-4 1.2.2 High-Density Subscriber Line Access .................................................................................................1-5 1.2.3 Powerful Service Processing Capabilities............................................................................................1-6 1.2.4 Operable Broadband Video Service .....................................................................................................1-6 1.2.5 Flexible Networking Modes.................................................................................................................1-6 1.2.6 Carrier-Class Reliability.......................................................................................................................1-6 1.2.7 Range of UA5000 Models ...................................................................................................................1-7 1.2.8 Element Management System..............................................................................................................1-7
1.3 Major Service Offerings................................................................................................................................1-8 1.3.1 PSTN Voice Services ...........................................................................................................................1-8 1.3.2 Next Generation Voice Services...........................................................................................................1-9 1.3.3 Broadband Services .............................................................................................................................1-9 1.3.4 Private Circuit Services......................................................................................................................1-10
2.3.1 Cabinet Specifications..........................................................................................................................2-4 2.3.2 Power Supply System and Environmental Monitor System ................................................................2-4
3 Service Implementation............................................................................................................3-1 3.1 VoIP Service ..................................................................................................................................................3-2
5 Equipment Management ..........................................................................................................5-1 5.1 Management Through the CLI ......................................................................................................................5-2 5.2 Management Through the EMS ....................................................................................................................5-2
5.2.1 Hardware and Software Configuration ................................................................................................5-2 5.2.2 Management Functions ........................................................................................................................5-3 5.2.3 Networking Modes Between the N2000 and UA5000.........................................................................5-4
6.2 Performance and Capacity Specifications .....................................................................................................6-3 6.2.1 System Performance Specifications.....................................................................................................6-3 6.2.2 Port Types and Numbers ......................................................................................................................6-5
6.4 Service Features and Specifications ............................................................................................................6-13 6.4.1 Features and Specifications of the IP Service ....................................................................................6-13 6.4.2 Features and Specifications of the ATM Service................................................................................6-16 6.4.3 Features and Specifications of the AG Service ..................................................................................6-16 6.4.4 Features and Specifications of Terminal Management and Line Test ................................................6-18
Figure 3-8 The implementation of the ARP proxy ...........................................................................................3-20
Figure 3-9 ToS field of the IP header ...............................................................................................................3-24
Figure 3-10 DS field of the IP header...............................................................................................................3-24
Figure 3-11 Frame structure of 802.1Q ............................................................................................................3-25
Figure 3-12 Schematic diagram of PQ .............................................................................................................3-26
vi Huawei Technologies Proprietary Issue 04 (2007-03-20)
Tables
Table 1-1 Description of the UA5000 broadband subsystems............................................................................1-4
Table 1-2 Description of the UA5000 narrowband subsystem ...........................................................................1-5
Table 2-1 Specification of the cabinets that can house the UA5000 frame ........................................................2-4
Table 2-2 Description of the power supply system.............................................................................................2-4
Table 2-3 Description of control cards .............................................................................................................2-16
Table 2-4 Description of narrowband line cards...............................................................................................2-17
Table 2-5 Description of broadband line cards .................................................................................................2-17
Table 2-6 Description of broadband and narrowband combo line cards...........................................................2-18
Table 2-7 Description of other cards.................................................................................................................2-18
Table 3-1 Bit rates and packetization delays of the codec standards ..................................................................3-3
Table 3-2 The codec standards and the bandwidth requirement .........................................................................3-4
Table 6-1 Dimensions of the UA5000 cabinets ..................................................................................................6-2
Table 6-2 Dimensions of the UA5000 frames ....................................................................................................6-2
Table 6-3 Weights of the UA5000 cabinets ........................................................................................................6-2
Table 6-4 The running environment of the UA5000 in different cabinets ..........................................................6-3
Table 6-5 Voltage specification of the power supply systems ............................................................................6-3
Table 6-6 System performance specifications ....................................................................................................6-3
Table 6-7 Types and numbers of the management interfaces .............................................................................6-5
Table 6-8 Types and numbers of the network interfaces.....................................................................................6-5
Table 6-9 Types and numbers of the user interfaces ...........................................................................................6-5
Table 6-10 Technical specifications of the STM-1 optical port ..........................................................................6-6
Table 6-11 Technical specifications of the 100Base-TX port .............................................................................6-7
Table 6-12 Technical specifications of the 100Base-FX port .............................................................................6-7
UA5000 Technical Manual Tables
Issue 04 (2007-03-20) Huawei Technologies Proprietary vii
Table 6-13 Technical specifications of the 1000Base-SX port ...........................................................................6-8
Table 6-14 Technical specifications of the 1000Base-Lx port ............................................................................6-8
Table 6-15 Technical specifications of the 1000Base-Zx port ............................................................................6-9
Table 6-16 Technical specifications of the E3 port .............................................................................................6-9
Table 6-17 Technical specifications of theT3 port............................................................................................6-10
Table 6-18 Technical specifications of the ADSL port .....................................................................................6-10
Table 6-19 Technical specifications of the ADSL2+ port .................................................................................6-11
Table 6-20 Technical specifications of the SHDSL port...................................................................................6-11
Table 6-21 Technical specifications of the VDSL port .....................................................................................6-12
Table 6-22 Technical specifications of the E1 port ...........................................................................................6-12
Table 6-23 Technical specifications of the V.35 port ........................................................................................6-13
Table 6-24 Features and specifications of the IP service ..................................................................................6-13
Table 6-25 Features and specifications of the ATM service .............................................................................6-16
Table 6-26 AG service features.........................................................................................................................6-16
Table 6-27 Features and specifications of terminal management and line test .................................................6-18
The following table lists the contents of this chapter.
Section… Describes…
1.1 Product Orientation The orientation of the UA5000
1.2 Features and Benefits The multi-service access platform, high-density subscriber line access, powerful service processing, and flexible networking modes of the UA5000
1.3 Major Service Offerings The major services that the UA5000 provides, such as PSTN voice service, next generation voice, broadband service, and private circuit service
1.1 Product Orientation With an increasing demand in telecommunications services such as voice, data, video and multi-media, the need for an access network that can provide multiple large-capacity, high-speed and high-quality services has become imperative.
The Huawei UA5000 Universal Access Unit (referred to as the UA5000) provides the legacy voice access, broadband access, voice over IP (VoIP) and multimedia services.
The UA5000 allows you to construct an access network that keeps pace with the technological advances in fiber access networks, broadband networks and the evolution to the next generation network (NGN).
The UA5000 meets both the current and future customer requirements through its advanced technical features, such as:
High performance bus for integrated services access Multi-Service Transport Platform (MSTP) Integration of copper access and fiber access
Therefore, the UA5000 is the choice of the integrated access equipment for broadband and narrowband services. Figure 1-1 shows the UA5000 solution.
: UA5000 : Media Gateway Controller (MGC) PSTN: Public Switched Telephone Network DDN: Digital Data Network ATM: Asynchronous Transfer Mode IP: Internet Protocol STM-1: Synchronous Transfer Mode 1 FE: Fast Ethernet GE: Gigabit Ethernet CPE: Customer’s Premises Equipment VDSL: Very High Speed Digital Subscriber Line POTS: Plain Old Telephone Service ADSL: Asymmetric Digital Subscriber Line ISDN: Integrated Services Digital Network SHDSL: Single-pair High-speed Digital Subscriber Line LAN: Local Area Network
1.2 Features and Benefits This section describes the features and benefits of the UA5000.
1.2.1 Multi-Service Access Platform The UA5000 consists of the broadband and narrowband subsystems. The control cards of the broadband subsystem are IPMB and APMB and that of the narrowband subsystem are PVM and PVU.
You can select any combination of the broadband and narrowband subsystems to fit your needs.
Table 1-1 Description of the UA5000 broadband subsystems
Downstream ports: POTS ISDN BRI ISDN PRI TDM SHDSL 2/4-wire VF 64 k VF E&M Z FE1 E1 V.35 V.24
Upstream port: E1
1.2.2 High-Density Subscriber Line Access The UA5000 allows a high-density subscriber line access. The maximum number of ports provided by UA5000 in a single cabinet is
1920 for pure narrowband configuration 480 for pure broadband configuration 960 for narrowband and broadband combination configuration
1.2.3 Powerful Service Processing Capabilities The UA5000 supports TDM, ATM and IP technologies, and features powerful service processing capabilities.
The APMB card supports 5 Gbit/s ATM switching capability. The IPMB card supports 34 Gbit/s Ethernet switching capability. The PVM card supports 8 k x 8 k TDM switching capability. The backplane capacity reaches 100 Gbit/s. The IPMB card provides two GE upstream ports. The IPMB card supports 1024 multicast channels. The master frame, slave frame and extended frame are connected through high-speed star
buses.
1.2.4 Operable Broadband Video Service When the UA5000 adopts the IPMB card as its broadband control card, it supports multicast protocols and managed multicast for broadband video services.
The features of the UA5000 for the multicast services are as follows:
GE ports for video services and a high-speed extended bus to guarantee non-blocking forwarding of video streams
Fast switching between channels Channel preview function Audience statistics function Controlled channel access Connection to the Service Management System (SMS)/Operating Support System (OSS)
through the transaction language 1 (TL1) interface on the EMS to support service auto provisioning
Guaranteed Quality of Service (QoS) to forward video streams
1.2.5 Flexible Networking Modes The UA5000 adapts to various access network scenarios. You can use the UA5000 in complex topologies and challenging engineering environments.
The UA5000 networking features include:
Structure: supports the 2-layer structure (the Optical Line Terminal (OLT) and the Optical Network Unit (ONU)), and the 1-layer structure (ONU independent).
Topology: supports the ring, star and tree topologies, or a combination of them. Broadband upstream interface: supports the ATM and IP upstream interfaces. Bearing technology: supports the MSTP bearing technology. Subtending: supports local subtending through a star bus, and remote subtending through
the FE, E1, E3, STM-1 and SHDSL ports.
1.2.6 Carrier-Class Reliability The UA5000 adopts reliability design in terms of system, hardware and software to ensure the robustness of the system.
System Reliability Design The features of the system reliability design are as follows:
Redundant backup of the control systems, switching fabrics, clocks, service processing modules and upstream line cards
Multiple clock references Redundant fan configuration with intelligent control and alarm functions Redundant backup of the primary power supplies and the secondary power supplies. Both
power supplies work in the load-sharing mode. The power supplies support the real-time monitoring and alarm function, and overvoltage and undervoltage protection.
Load sharing of the Digital Signal Processing (DSP) resource of the PVM card
Software Reliability Design The features of the software reliability design are as follows:
Modularization and platform design Advanced design technologies based on the object, error tolerance, error correction and
auto recovery Capability maturity model (CMM) compliance
Networking Reliability Design The features of the networking reliability design are as follows:
MSTP networking to prevent single point of failures 1+1 Automatic Protection Switching (APS) protection for the STM-1 ports Rapid Spanning Tree Protocol (RSTP) protection and trunk for FE/GE ports Sub-network Connection Protection (SNCP) and Multiplex Section Protection (MSP) of
Synchronous Digital Hierarchy (SDH) ports Support of dual homing. One UA5000 can register in two MGCs. If one MGC is faulty, the
UA5000 switches over to the other.
1.2.7 Range of UA5000 Models The UA5000 provides a wide range of models for a variety of situations.
Capacities ranging from dozens of ports to thousands of ports Indoor and outdoor cabinets for mild and harsh climates Large and small sized (cabinet, chassis and desktop) units Front-access and rear-access cabinets A wide variety of terminals
1.2.8 Element Management System The UA5000 adopts the Huawei iManager N2000 Fixed Network Integrated Management System as its Element Management System (EMS).
The following describes the features of the Huawei iManager N2000.
Uniform management mode: The iManager N2000 provides a centralized management for the narrowband and broadband services of the UA5000.
Rich interfaces: The iManager N2000 provides various southbound interfaces such as Telnet, Man Machine Language (MML) and Simple Network Management Protocol (SNMP) to connect to the managed devices. It also provides standard SNMP and TL1 northbound interfaces (including alarm, topology, service, inventory resource, and test) to connect to the OSS. The iManager N2000 helps the carriers to build an integrated and automatic OSS platform at the network layer.
Security management: The iManager N2000 provides abundant user management and authentication functions down to the shelves and cards of the managed devices.
In-service upgrade and maintenance: The iManager N2000 supports the online reporting of hardware and software versions, supports the in-service upgrade and loading of card software and host software, as well as the in-service loading and management of patches.
Environment monitor: The environment monitoring unit (EMU) carries out the real-time monitoring and generates remote alarms with regard to humidity, temperature, door status sensors and power systems.
Performance measurement: The iManager N2000 provides the functions to collect, query and analyse the performance data.
1.3 Major Service Offerings The UA5000 supports multiple services including voice, broadband and private circuit through different main control cards. The PVM or PVU card supports the voice and narrowband private circuit services, the APMB or IPMB card supports the broadband access and broadband private circuit services, and the PVM card supports the Voice over IP (VoIP) services.
1.3.1 PSTN Voice Services The UA5000 supports the standard V5.1 and V5.2 protocols, and provides E1 ports to connect to Local Exchanges (LEs) to access PSTN services.
The major features of the PSTN voice service are as follows:
POTS The UA5000 provides POTS ports to support the access of analog subscribers and PBXs. The UA5000 supports supplementary services such as Central Exchange (CENTREX) and Caller Identification Display (CID).
ISDN The UA5000 provides ISDN BRI (2B+D) ports and ISDN PRI (30B+D) ports, and supports various N-ISDN services, including:
Video conferencing Videotext G4 facsimile E-mail Data retrieval
The UA5000 also supports ISDN supplementary services. These ISDN supplementary services include:
Direct dial-in (DDI) Multi-subscriber number (MSN) Calling line identification presentation (CLIP)
The UA5000 supports a mixed configuration of ISDN subscribers and analog telephone subscribers.
Direct-Dial-In The UA5000 provides DDI subscriber ports to support the subscriber line extension service. This service enables the external analog subscriber ports of other exchanges to be transparently extended inside the access network.
1.3.2 Next Generation Voice Services Working as an access media gateway (AMG), the UA5000 provides the following services under the control of a MGC.
VoIP services for POTS subscribers VoIP services for ISDN BRI subscribers Fax over IP (FoIP) in the G.711 transparent transmission mode FoIP in the T.38 mode Modem over IP (MoIP) in the transparent transmission mode DDI services The major features of the next generation voice services are as follows: Supports all PSTN basic services, complementary services, and intelligent services Supports the G.711 (a-law/ μ-law), G.723.1 and G.729 (A/B) codecs Supports the emergency standalone capability Supports echo cancellation complying with ITU-T G.165/G.168 Supports pulse metering and polarity reversal metering Provides QoS assurance for voice traffics with functions including priority queuing, jitter
buffering, IP Type of Service (ToS), Differentiated Service Code Point (DSCP), and 802.1Q VLAN
Supports separate gain control of the transmission and reception streams
1.3.3 Broadband Services
Broadband service port The UA5000 provides the following broadband service ports:
The UA5000 provides the following broadband upstream ports:
IP ports including FE and GE ATM ports including STM-1, ATM E3, ATM T3 and IMA E1
Subscriber Security Management The UA5000 provides various methods to guarantee the security of the subscriber data and network.
Subscriber isolation at layer 2 through the VLAN Host number restriction of each port Port searching by a MAC address Binding of a MAC address and a port Binding of an IP address and a port MAC address filtering Controlled number of multicast groups to access a port CAR control for each connection
Layer 2 and Layer 3 Features The UA5000 provides a complete TCP/IP protocol stack through its IPMB card.
The layer 2 and layer 3 features of the UA5000 include:
DHCP relay ARP proxy PPPoE+ DHCP Option82 Protocol conversion between IPoA and IPoE Protocol conversion between PPPoA and PPPoE ACL RIP OSPF
1.3.4 Private Circuit Services The UA5000 provides rich private circuit services to meet the needs of group customers. The major private circuit service offerings of the UA5000 are as follows:
Local and remote DDN access through DDN ports such as E1, V.35, V.24, SHDSL (in the TDM mode) and 2/4-wire VF
SHDSL access through ATM SHDSL ports Private circuit data at a symmetric rate of 10 Mbit/s within 1.5 km through VDSL ports Broadband private circuit LAN interconnection through FE ports
The UA5000 supports a wide range of cabinet and frame models to be used in different situations. This chapter describes the structure and specifications of the cabinets, frames and cards.
Section… Describes…
2.1 Logical Structure The logical structure of the UA5000 and the modules that the UA5000 consists
2.2 Software Structure The card software and host software of the UA5000
2.3 Cabinets The specifications, power supply system and environmental monitor system of the UA5000
2.4 Frames The front-access frames and the rear-access frames that used in the UA5000
2.5 Cards The control cards, broadband line cards, narrowband line cards, and the broadband and narrowband combo line cards used in the UA5000
2.1 Logical Structure Figure 2-1 shows the logical structure of the UA5000. The UA5000 consists of the following modules:
TDM control and switching module Packet control and switching module Packet voice processing module Network-network interface (NNI) module User-network interface (UNI) module
Figure 2-1 The UA5000 logical structure
TDM control andswitching module
POTSISDN
E1TDM SHDSL
V.24V.35
N x 64 k Packet voiceprocessing
module
STM-1ATM E3ATM T3IMA E1
FE/GE
E1
ADSL
ADSL2+
VDSL
ATM SHDSL
Ethernet
Packet control andswitching module
NN
I module
FE
ADSL
ADSL2+
VDSL
ATM SHDSL
Ethernet
UN
I module
2/4-wire VFE&M trunk
The following describes the UA5000 logical structure.
The TDM control and switching module implements the switching and convergence of narrowband services through the TDM switching fabric.
The packet control and switching module implements the switching and convergence of broadband services through the packet switching fabric.
The packet voice processing module converts the voice stream to IP packets through voice encoding and sends them to the NGN.
The NNI module provides various network ports including the ATM STM-1, ATM E3/T3, V5, TDM E1, IMA E1, FE and GE ports.
The UNI module provides various service ports including POTS, ISDN BRI (2B+D), ISDN PRI (30B+D), V.24 sub-rate, V.24/V.35 64 kbit/s, V.35/FE1 N x 64 kbit/s, E1, ADSL, ADSL2+, VDSL, SHDSL (TDM/ATM), Ethernet, 2/4-wire VF and E&M trunk ports.
2.2 Software Structure Figure 2-2 shows the software structure of the UA5000 system. The UA5000 software consists of the card software and host software.
Figure 2-2 The UA5000 software architecture
Serial portterminal
Telnet
Host software
Cardsoftware 1
Cardsoftware 2
Boardsoftware
...
Communication control bus
Inband/outband Inband/outbandSerial port connection
NMS
Cardsoftware N
Card Software The card software runs on a line card, an interface card or a monitor card. The software drives the card and implements service management, data management, alarm management and fault diagnosis for the card.
Host Software The host software runs on a control card. The software consists of four layers, some of which are further subdivided into modules.
Refer to "2.5 Cards" for details about the control cards.
The name and functions of each of the layers are as follows:
System support layer: drives the system hardware. System service layer: provides basic services for the software running. Its fundamental
module is the operating system. System management layer: provides users with the means to manage the equipment and
services. Service control layer: interprets user commands and provides various services. This layer
consists of the voice control, ATM control and IP control modules.
Table 2-1 lists the cabinets that can house the UA5000 frame.
Table 2-1 Specification of the cabinets that can house the UA5000 frame
Max. Ports* Model Type Frame Configuration
POTS Only
ADSL Only
POTS and ADSL Combo
ONU-F01D200 Outdoor, front-access
One HABD 384 192 192
ONU-F01D500 Outdoor, front-access
One HABD + one HABF
960 480 480
One HABD + one HABE+ one HABF
1408 480 704 ONU-F01D1000
Outdoor, front-access
Two HABDs + one HABF
1344 672 672
One HABC + one HIB
800 192 800
One HABA 960 480 480
ONU-F02A Indoor, rear-access
Two HABAs 1920 960 960
One HABD + one HABF
960 480 480
One HABD + one HABE+ two HABFs
1920 480 960
ONU-F02AF Indoor, front-access
Two HABDs + two HABFs
1920 960 960
2.3.2 Power Supply System and Environmental Monitor System
Power Supply System The power supply system used by the UA5000 can be any one of the GEPS4860, GEPS4845 or a DC distribution unit. Refer to Table 2-2 for details.
Table 2-2 Description of the power supply system
Parameter GEPS4860 GEPS4845 DC Distribution Unit
Input voltage 220 VAC 220 VAC or 110 VAC –48 VDC (two inputs)
Front-access cabinet Front-access cabinet and rear-access cabinet
Features Stable and reliable running, flexible configuration; Outstanding power supply and battery management, and environment and power supply monitoring
The rectifier unit supports backup; Safe and reliable power supply and DC distribution functions; Outstanding environment, and power monitor and battery management
NA
Environmental Monitoring System The UA5000 has powerful environmental monitoring functions to monitor the following items:
Environmental parameters inside and outside the cabinet Power supply Fan Battery
The EMUs include:
Environmental monitoring card Environmental monitoring box Power monitoring unit Built-in monitor card in the power distribution unit
Environmental Monitoring Card The environmental monitoring card includes the H303ESC and H304ESC cards. Here, the H304ESC card is taken as an example to introduce the functions and features. Note that although the H303ESC and H304ESC cards have the same basic features, the H304ESC card has a battery management function, but no humidity monitoring function.
The H304ESC card communicates with the control card through serial ports. The H304ESC card can monitor 8 analog parameters, 22 digital parameters, and multiple types of intelligent power supply through serial ports. The detailed functions of the H304ESC are as follows:
Analog parameter monitoring: The H304ESC card has built-in temperature and humidity sensors, which monitor the temperature and humidity in the cabinet. It also provides six analog signal interfaces to connect external analog sensors. For each monitor signal, you can set the alarm upper and lower limits and the sensor properties.
Digital parameter monitoring: The H304ESC card monitors the power distribution unit and door status. It also provides 20 digital sensor interfaces to connect various external digital sensors. The external sensors use a 12 V or 24 V power supply. You can define the effective level of the sensors.
Fan monitoring: The H304ESC card provides the power supply interfaces for the cabinet’s fan frame and controls the fan speed with respect to the temperature. It can also monitor the running status of each fan through the fan monitor card.
Intelligent power supply monitoring: The H304ESC card monitors and manages multiple types of intelligent power supplies through its serial port.
Battery management function: The H304ESC card monitors and manages the powering on, powering off and the equalized charging of batteries.
Environmental Monitoring Box The environmental monitoring box consists of the H304ESC card, the H601ESBB plane and the H601ESFB front panel. The box has the following functions:
Monitors various environmental parameters, such as temperature, humidity, smoke, water, door status and main distribution frame (MDF)
Provides multiple types of extended monitoring interfaces Monitors the power system when connected to the monitoring unit of the GEPS4845
power module.
Power Monitoring Unit The power monitoring unit includes PSM-B9 and PSM-B5. The unit has following functions:
Monitors the power supply in real time Automatically manages the battery based on the configuration Obtains the running parameter values of the power supply system Configures and controls the power supply system
Built-in Monitor Card in the PDU The built-in monitor card can monitor the following parameters:
Lightning protection components, input voltage, output voltage, shunt protection switch Temperature and humidity in the power distribution unit The card provides eight digital monitor interfaces to detect the environment parameters,
2.4 Frames There are two types of frames: the front-access frame and the rear-access frame. This section details these frames.
2.4.1 Rear-Access Frames The HABA and HABC are the master frames of the rear-access UA5000.
HABA Frame The HABA frame is the master frame of the rear-access UA5000, which stands at a height of 16 U (1 U=44.55 mm). The HABA frame can subtend the other HABA frame and aggregate services from the subordinate frames.
The HABA frame provides 36 slots, of which 30 are available for line cards. However, you must insert the TSSB/TSSC card in the positions shown in Figure 2-3. The remaining six slots are reserved for other types of cards.
You can insert narrowband line cards and broadband line cards in any of the 30 line card slots.
The two narrowband control cards and the two broadband control cards in the frame support backup in the event of a primary controller failure.
The HABA frame can use a minimum of one and a maximum of two PWX cards. The two PWX cards in the frame share the power supply load, and if one PWX fails, the other has the capacity to dynamically provide the necessary power.
When HABA subtend HABA frame, the subordinate HABA frame is equipped with only broadband control cards and as many as 30 line cards.
PWX: Secondary power supply card xPMB: Broadband control card (APMB/IPMB) PVx: Narrowband control card (PVU8/PVU4/PVM) RSUx: Remote subscriber unit (RSU8/RSU4) AIUB: ATM interface card xSL: Service line card (ASL/DSL/ADMB/VDLA/SDLB…) TSSB: Test card
HABC Frame The HABC frame is the master frame of the rear-access UA5000, which stands at a height of 8 U (1 U=44.55 mm).
The HABA frame provides 18 slots, of which 12 are available for line cards. However, you must insert the TSSB card in the positions shown in Figure 2-4.
The two narrowband control cards and the two broadband control cards in the frame support backup in the event of a primary controller failure.
The two PWX cards in the frame share the power supply load, and if one PWX fails, the other has the capacity to dynamically provide the necessary power.
PWX: Secondary power supply card IPMB: Broadband control card PVx: Narrowband control card (PVU8/PVU4/PVM) TSSx: Test card TSSB RSUx: Remote subscriber unit (RSU8/RSU4) xSL: Service line card (ASL/DSL/ADMB/VDLA/SDLB…)
2.4.2 Front-Access Frames There are four models of rear-access frames: the HABD (master frame), HABE (slave frame), HABF (extended frame) and HABL (mini frame).
HABD Frame The HABD frame is the master frame of the front-access UA5000, which stands at a height of 10 U. The HABD frame can be subtended with multiple slave frames, and the HABD frame can aggregate the services from the subordinate frames.
The HABD provides 18 slots, of which 12 are available for line cards. However, if you are using the AIUB and TSSB, you must insert the AIUB cards and the TSSB card in the positions shown in Figure 2-5. The remaining six slots are for other types of cards.
You can insert narrowband line cards and broadband line cards in any of the 12 line card slots.
The two narrowband control cards and the two broadband control cards in the frame support backup in the event of a primary controller failure.
The HABD frame can use a minimum of one and a maximum of two PWX cards. The two PWX cards in the frame share the power supply load, and if one PWX fails, the other has the capacity to dynamically provide the necessary power.
The HABD can also serve as a slave frame. In this case, the HABD frame is equipped with only broadband control cards and as many as 12 line cards.
PWX: Secondary power supply card xPMB: Broadband control card (APMB/IPMB) PVx: Narrowband control card (PVU8/PVU4/PVM) RSUx: Remote subscriber unit (RSU8/RSU4) xSL: Service line card (ASL/DSL/ADMB/VDLA/SDLB…) AIUB: ATM interface card TSSB: Test card
HABE Frame The HABE frame is the slave frame of the front-access UA5000, which stands at a height of 10 U.
The HABE frame operates under the control of the HABD frame. The HABE frame can be subtended with the HABF frame.
The HABE frame provides 18 slots, of which 14 are reserved for service line cards.
The HABE frame can use a minimum of one and a maximum of two PWX cards. The two PWX cards in the frame share the power supply load, and if one PWX fails, the other has the capacity to dynamically provide the necessary power.
PWX: Secondary power supply card xSL: Service line card (ASL/DSL/…)
HABF Frame The HABF frame is the extended frame of the front-access UA5000, which stands at a height of 10 U.
The HABF frame operates under the control of either the HABD frame or the HABE frame. The serving HABD or HABE frame provides the power supply to the HABF frame.
The HABF frame provides 18 slots. You can insert narrowband line cards and broadband line cards as desired.
Master Frame (HABA, HABD, HABC) Figure 2-8 shows the hardware structure of the master frame.
Figure 2-8 Hardware structure of the master frame
TDM busBroaband bus
DSL
xDSL
EAU
To subordinate frameNNI
UNI
Master Frame
PVx
IPMB
ASL
Test bus
TSSB
CSM
The master frame is the control core of the UA5000. The frame controls the subtended slave and the extended frames.
The master frame switches, aggregates and transmits services upstream for the master frame, slave frame and extended frame.
The master frame can be subtended with slave frames and extended frames to share resources between frames. The frame can also be connected with subscriber cables.
The service handling process of the UA5000 is as follows:
The narrowband line cards send services to the narrowband control card (PVU8, PVU4 and PVM) through the TDM bus. After carrying out the protocol processing and time slot crossing, the PVU8/PVU4/PVM forwards these services upstream through the NNI.
The broadband line cards send services to the broadband control card (APMB/IPMB) through the high speed bus, and the APMB/IMPB aggregates and forwards these services upstream through the NNI.
The line card management of the UA5000 is as follows:
The narrowband control card manages the narrowband line cards and test card in this frame, the slave frame and the extended frame.
The broadband control card manages the broadband line cards, interface cards and test card in this frame, the slave frame, and the extended frame.
When the UA5000 acts as a component of the NGN, the PVM converts the TDM signals of all narrowband service data into IP packets and sends the IP packets to the IPMB card. The IPMB then forwards these packets upstream to the IP network along with the broadband services.
The TSSB card tests the line cards, and reports the test results to the control cards.
Slave Frame (HABE) Figure 2-9 shows the hardware structure of the slave frame.
Figure 2-9 Hardware structure of the slave frame
To master or extended frame
DSL
UNI
Slave frame
ASL
CSM
TDM bus
Test bus
The slave frame is typically designated as a subscriber access unit. It can extend its bus to the extended frame to enable sharing between frame resources.
Services from the narrowband line cards are converged by the intra-frame TDM bus, and forwarded upstream to the master frame through the conversion card or the backplane.
Extended Frame (HABF) Figure 2-10 shows the hardware structure of the extended frame.
Figure 2-10 Hardware structure of the extended frame
To master or slave frame
TDM busBroadband bus
DSL
xDSL
EAU
UNI
Extended frame
ASL
Test bus
CSM
The extended frame operates as a subscriber access unit. Services from the narrowband line cards are converged by the intra-frame TDM bus, and forwarded upstream to the master or the slave frame through the conversion card or the backplane.
Services from the broadband line cards are converged by the intra-frame high speed bus, and forwarded upstream to the master or the slave frame through the conversion card or the backplane.
The RSU8/RSU4 card: Controls the narrowband line cards in the remote subscriber frame
Subtends the narrowband services with the UA5000 master frame
Provides upstream E1 ports for narrowband services
Supports the active/standby backup
RSUG Remote subscriber processing unit
The RSUG card: Serves the ONU-60A multi-service access unit Connects the G.SHDSL interface card on the central office side to forward the primary and secondary node signaling
Manages the secondary nodes
Table 2-4 Description of narrowband line cards
Abbr. Name Full Name Function Description
ASL POTS line card Provides 16 POTS ports
A32 POTS line card Provides 32 POTS ports
DSL ISDN BRI line card Provides eight ISDN BRI ports
VFB 2/4-wire VF line card Provides sixteen 2-wire VF ports or eight 4-wire VF ports
CDI Direct dial-in line card
Provides 16 DDI ports
ATI Analog trunk interface card
Provides six 2/4-wire E&M trunk ports
SDL SHDSL line card Provides four TDM SHDSL ports and four E1 ports
Table 2-5 Description of broadband line cards
Abbr. Name Full Name Function Description
SDLB SHDSL line card The SDLB card supports: 16 ATM SHDSL ports
ADLB ADSL line card The ADLB card supports: 16 ADSL ports a built-in splitter
TSSB Test card The TSSB is used to test the narrowband line cards.
ESC Environment and power supply monitor card
The ESC card controls or monitors: temperature humidity door sensor fan status battery status power supply status
This card reports the above information to the control card through a serial port.
PWX Secondary power supply card
The PWX card occupies one slot. A frame can use a minimum of one and a maximum of two PWX cards. The PWX cards support inter-card and inter-frame load-sharing.
3.1 VoIP Service The UA5000 can act as an Access Gateway (AG) in NGN to provide the VoIP service under the control of a Media Gateway Controller (MGC).
The UA5000 supports the following VoIP features:
Voice Codecs Echo Cancellation Tone Generation Digit Collection Message Waiting Indicator Service Equipment Authentication Emergency Standalone Capability DDI and Escape Channel Dual Homing Hairpin Connection Overload Control
Introduction The UA5000 supports these audio coder-decoder (codec) standards as defined by ITU-T:
G.711 G.729 (AB) G.723.1
Table 3-1 lists t the bit rate, packetization delay, and description of the codec standards.
Table 3-1 Bit rates and packetization delays of the codec standards
Voice Codecs Bit Rate Packetization Delay Codec Techniques
64 kbit/s 5 ms PCM
64 kbit/s 10 ms PCM
64 kbit/s 20 ms PCM
G.711
64 kbit/s 30 ms PCM
8 kbit/s 10 ms CS-ACELP G.729
8 kbit/s 20 ms CS-ACELP
5.3 kbit/s 30 ms CELP G.723.1
6.3 kbit/s 30 ms MP-MLQ CELP: Code-Excited Linear Prediction CS-ACELP: Conjugate Structure Algebraic Code-Excited Linear Prediction MP-MLQ: Multi-Pulse Maximum Likelihood Quantization PCM: Pulse code modulation
Bandwidth Required by the Codec Standards The following example shows how to calculate the actual bandwidth required by a codec mode in an Ethernet network. In the example:
B: bandwidth L: Length of packet N: Number of packets per second D: Delay caused by the packetization Le: Length of the Ethernet header Li: Length of the IP header Lu: Length of the UDP header Lr: Length of the RTP header
Table 3-2 lists the bandwidth required by the codec standards.
Table 3-2 The codec standards and the bandwidth requirement
Codec Bit Rate Packetization Delay Required Bandwidth
64 kbit/s 5 ms 169.6 kbit/s
64 kbit/s 10 ms 116.8 kbit/s
64 kbit/s 20 ms 90.4 kbit/s
G.711
64 kbit/s 30 ms 81.6 kbit/s
8 kbit/s 10 ms 60.8 kbit/s G.729
8 kbit/s 20 ms 34.4 kbit/s
5.3 kbit/s 30 ms 22.9 kbit/s G.723.1
6.3 kbit/s 30 ms 23.9 kbit/s
3.1.2 Echo Cancellation An echo is a reflection of sound that arrives at the speaker some time after the direct sound. In telephony service, people are conscious of the echo if the end-to-end delay of a session exceeds 50 ms.
The UA5000 supports the echo cancellation by adding the echo canceller (EC) resource to a session.
The UA5000 supports the electrical echo canceller (EC) and the acoustic echo canceller (AEC)
3.1.3 Tone Generation The UA5000 provides the tone resource, and the resource can also be provided by a Media Resource Server (MRS).
In a call session, the UA5000 activates its internal tone resources under the control of the MGC. The UA5000 can play basic tones, including:
Busy tone Mute tone Ring-back tone Dialing tone Second dialing tone Special dialing tone Howler tone
The MRS supports the generation of intelligent tones.
3.1.4 Digit Collection When a customer dials a telephone number, the UA5000 collects the number and reports the number to the MGC for analysis.
The UA5000 supports collection of pulse number and DTMF number.
During a call session, the UA5000 receives and generates DTMF tones.
Pulse Digit Collection The UA5000 collects the pulse digits to complete the call connection and associated intelligent services when subscriber terminals work in the pulse mode.
The pulse digit collection is carried out by the POTS line card. The line card extracts the dialed digits from the received signals, and then reports the digits to the service module. The service module then sends the digits to the MGC.
DTMF Digit Collection The UA5000 collects the DTMF digits to complete the call connection and associated intelligent services when subscriber terminals work in the DTMF mode.
The DTMF digit collection is carried out by the DSP of the UA5000. The DSP receives the dialed DTMF digits, and then reports the digits to the service module. The service module matches the digits against the digitmap delivered by the MGC, and reports the result to the MGC.
3.1.5 Message Waiting Indicator Service The UA5000 supports the Message Waiting Indicator (MWI) service under the control of the MGC. The MWI service provides visual signals to indicate that there are messages in the voice mailbox.
The UA5000 provides two means to activate the MWI, depending on the phone set of the customer:
Voltage ascending mode Frequency Shift Keying (FSK) mode
Voltage Ascending Mode Under the control of the MGC, the UA5000 sends a message to the MWI analog line card (VMS) of the customer to activate the service. The VMS increases the voltage on the subscriber line to light up the message indicator on the telephone set.
FSK Mode Under the control of the MGC, the UA5000 sends special FSK signals to the telephone set on a specified timeslot of the voice circuit. After receiving the data, the telephone set lights up the message indicator.
3.1.6 Equipment Authentication Equipment authentication prevents registration of illegal access gateways onto the MGC. The UA5000 supports authentication through the H.248 protocol.
The prerequisite for the authentication is that both the UA5000 and the MGC is configured with a same static key.
The equipment authentication steps are as follows:
Step 1 The UA5000 requests registration to the MGC.
Step 2 The MGC generates a random number, and then encrypts the MG_ID and the key using the MD5 algorithm.
Step 3 The MGC sends the random number, the MG_ID and the key to the UA5000.
Step 4 Upon receiving the random number, the MG_ID and the key, the UA5000 encrypts the random number and its own MG_ID using the same MD5 algorithm, and then compares the results. If the two results match, the UA5000 thinks the MGC is a valid one. If not, the UA5000 sends back a failure message.
Step 5 The UA5000 calculates another encryption result and sends it to the MGC.
Step 6 The MGC calculates a corresponding encryption result, and compares it with the received one. If these two results are consistent, the MGC thinks the UA5000 is a valid device.
Step 7 By now, the equipment authentication is complete, and the call service can be started.
----End
3.1.7 Emergency Standalone Capability If the communication between the UA5000 and the MGC is interrupted, the emergency standalone capability enables the UA5000 to operate as a standalone switch for calls between customers of the sameUA5000 device.
The emergency standalone capability has the following features:
The dialing method is the same as that of a normal case. The ongoing calls are retained after the communication between the MGC and the
UA5000 resumes, and the UA5000 registers to the MGC again. The emergency standalone capability is enabled or disabled by setting the parameters. No bill is generated for the calls that occur during the emergency standalone period.
In the emergency standalone status, the customers of the UA5000 can call the PSTN customers through the CDI card.
3.1.8 DDI and Escape Channel The CDI card on the UA5000 provides the FXO interfaces. Through the FXO interfaces, the UA5000 supports the following two applications:
DDI (Enterprise 1) The UA5000 connects the PBX of Enterprise 1 through the FXO interface to provide the DDI function for the PBX customers. With this function, you can directly call a subscriber of the PBX by dialing the access code of the enterprise and the extension number of the PBX subscriber.
Escape Channel (Enterprise 2) The UA5000 connects to the PSTN exchange through the FXO interface to provide an escape channel for narrowband subscribers. When the communication between the UA5000 and the MGC is broken, the subscribers of the UA5000 can still call out through the escape channel. The numbers that can be called are decided by the preset digitmaps. The escape channel supports only the outgoing calls.
3.1.9 Dual Homing Dual homing means that one UA5000 registers to one MGC (primary MGC) while taking one or more MGCs as standby. When the signaling link between the UA5000 and the primary MGC is broken, a standby MGC takes over the control of the UA5000. Dual homing improves the network availability.
1. The UA5000 sends consecutive heartbeat detection messages (Notify) to the currently active MGC (MGC1) at an interval of T seconds. If the UA5000 receives no reply after N messages are sent, the UA5000 regards the MGC as faulty.
2. The UA5000 sends a registration request message ServiceChange (Method = Failover, Reason = 909) to the first standby MGC (MGC2) in the standby MGC list.
3. If the UA5000 receives a Reply from MGC2, the registration to MGC2 is successful and the process is complete. If the UA5000 does not receive a Reply from MGC2 after sending out N consecutive ServiceChange messages, registration to MGC2 fails.
4. If there are other candidate MGCs in the standby MGC list, steps 2 and 3 will be repeated on the next MGC. If no candidate MGC exists in the list, the UA5000 sends a new ServiceChange (Method = Disconnected, Reason = 909) message to MGC1 after a random delay.
5. If the UA5000 receives a Reply from MGC1, the registration succeeds. If the UA5000 does not receive a Reply after N consecutive ServiceChanges requests are sent to MGC1, registration to MGC1 fails and the UA5000 proceeds with Step 2.
3.1.10 Hairpin Connection In a Hairpin connection the internal calls of a UA5000 are connected through the TDM fabric without consuming the DSP resource. The calls in the hairpin connection mode are still controlled by the MGC.
The hairpin connection must be enabled on the MGC before the UA5000 carries out the function. The implementation of hairpin connection is as follows:
1. When the MGC finds that the caller and the called are under the same UA5000, the MGC places the TIDs of the caller and the called into the same context.
2. When the UA5000 finds that there are two physical terminations in the context, the UA5000 uses the TDM fabric, instead of using the DSP resource, to set up the connection.
3.1.11 Overload Control The UA5000 supports overload control through the H.248 protocol. With this function, the UA5000 ensures successful connection of emergency calls even when overload occurs.
The UA5000 supports the following overload control functions:
Processing capacity overload control DSP overload control Upstream bandwidth overload control
Processing Capacity Overload Control When the processing capacity reaches the preset threshold, the UA5000 gives preference to the connection of emergency calls and calls of higher priorities according to the different overload levels.
DSP Overload Control The UA5000 supports the DSP reservation function to ensure the connection of emergency calls in case of DSP overload.
You can configure the number of the reserved DSP channels.
Upstream Bandwidth Overload Control The UA5000 supports the statistics function for the upstream bandwidth. When the upstream bandwidth becomes insufficient, the UA5000 controls the normal calls to ensure the connection of the emergency calls and the calls of higher priorities.
3.2 FoIP Service To transmit a fax signal over the Internet, you need to place a gateway between the PSTN and the Internet to convert the fax signals into IP packets, and IP packets into fax signals.
The UA5000 can act as such a gateway. The UA5000 supports two fax modes: the G.711 transparent transmission and the T.38 fax.
G.711 transparent transmission mode is also called Fax over G.711. In this mode, the UA5000 encodes the fax signals using the G.711 codec, and the two gateways (the UA5000 or the IAD) must both support the G.711 codec.
The two gateways (the UA5000 or the IAD) do not process the original T.30 packets. They just provide a transparent transmission channel for the packets. The T.30 packets are processed on the fax machines.
The T.38 fax is also called fax relay. In this mode, the gateway (the UA5000 or the IAD) terminates the T.30 fax packet, extracts the fax data, encapsulates the fax data into T.38 packets and then sends the packets to the peer gateway.
The peer gateway extracts the fax data from the T.38 packet, encapsulates the fax data into T.30 fax packets and then sends the packets to the fax machine.
T.38 is an IP based protocol, which takes account of packet loss, delay and jitter that may occur in an IP network. The T.38 fax uses data redundancy mechanism to address the packet loss. In a T.38 fax packet, fax messages sent in the previous N packets (the value of N can be as much as 4) are also contained for redundant backup. With this approach, fax messages are intact when you receive one T.38 fax packet, even if the previous N packets are lost.
The T.38 fax is not so dependent on the quality of the IP network. But the G.711 transparent transmission mode is preferred in a good-quality IP network because the relay mode of the T.38 fax concerns the compatibility of the fax machines.
3.3 MoIP Service Figure 3-5 depicts the implementation of the MoIP service.
Figure 3-5 Implementation of the MoIP service
IP backbonenetwork
PC
TMG8010
MGC
UA5000
modem
Access server
MoIP
Modem traffic
PSTN
Modem traffic
The UA5000 supports two MoIP modes:
Transparent transmission mode Relay mode
In the transparent transmission mode, the modem signal is transmitted transparently in the IP network through voice channels using the G.711 codec. This mode requires an IP bearer network in a good condition to ensure the service quality.
In the relay mode, redundant messages are transmitted to address the packet loss and jitter. This mode ensures normal running of services when the IP bearer network is not in good condition.
Introduction to VLAN Virtual Local Area Network (VLAN) is a division of a local area network by software rather than by physical arrangement of cables. VLAN makes it possible to divide a physical LAN into different broadcast domains logically. IEEE 802.1Q specifies the VLAN implementation scheme.
Port types In the description of the VLAN features, the following ports may be involved:
Standard port
A standard port refers to a physical port of the control card, namely, an FE or GE port of the IPMB card. The standard port is also called the upstream port.
Service virtual port
A service virtual port refers to a service connection of a user-side physical port such as an xDSL or an Ethernet port. The service virtual port is also called the access port.
For example, for an ADSL/SHDSL port, two PVCs correspond to two service virtual ports. For an Ethernet port, two VLANs correspond to two service virtual ports.
VLAN Types on the UA5000 On the basis of the IEEE 802.1Q standard, the UA5000 extends four types of VLANs. They are:
Standard VLAN MUX VLAN Smart VLAN Super VLAN
Refer to the following sections for detailed descriptions about these VLANs.
VLAN Features The UA5000 supports the following VLAN features:
Common QinQ Stacking
The VLAN with the Common feature enabled can act as a normal layer 2 VLAN or a layer 3 virtual interface. The QinQ and Stacking features are detailed in "3.4.7 QinQ" and "3.4.8 Stacking."
What is a Standard VLAN A standard VLAN in the UA5000 refers to the VLAN defined by the IEEE 802.1Q standard. A standard VLAN has the following features:
The ports in one VLAN are interconnected at layer 2. The ports in different VLANs are isolated at layer 2.
When to Use The standard VLAN is used to limit the broadcast domains of the standard ports.
On the UA5000, the standard VLAN can contain only the standard ports (namely, FE or GE ports of the IPMB card), but not the service virtual ports (such as the ADSL and SHDSL ports).
3.4.3 MUX VLAN
What is a MUX VLAN A MUX VLAN in the UA5000 is a special VLAN that contains one service virtual port and multiple standard ports.
A MUX VLAN has the following features:
A MUX VLAN can contain two types of interfaces: standard port and service virtual port. A MUX VLAN can contain multiple standard ports while only one service virtual port.
After a service virtual port is added to a MUX VLAN, the UA5000 creates a connection between the service virtual port and the standard port to realise the layer 2 interconnection.
There is a one to one mapping relationship between the VLAN ID and the access user.
When to Use The MUX VLAN is used to isolate and identify the access users. One MUX VLAN corresponds with one access connection. The equipment at the upper layer identifies different access users through the VLAN IDs.
3.4.4 Smart VLAN
What is a Smart VLAN A Smart VLAN in the UA5000 is a special VLAN that contains the standard ports and the service virtual ports. The Smart VLAN has the following features:
A Smart VLAN can contain two types of ports: standard port and service virtual port. A Smart VLAN can contain one or multiple ports of these two types.
The broadcast domain of a standard port includes all ports in the Smart VLAN; while the broadcast domain of a service virtual port includes only the standard ports.
When to Use The Smart VLAN is used to partition user groups, where each user group is associated with one Smart VLAN. The Smart VLAN also isolates the access users in one VLAN to ensure the privacy of the users and the security of the network.
The Smart VLAN helps to provide the access service where multiple users are connected through one VLAN. When the available VLANs on the UA5000 are limited, you can define the Smart VLANs to support more access users. The Smart VLAN is often used for the community access service.
3.4.5 Super VLAN
What is a Super VLAN The Super VLAN in the UA5000 is a special VLAN that has the following features:
A Super VLAN corresponds to no physical port. A Super VLAN may contain multiple Sub VLANs. (The Sub VLANs can be the standard
VLANs, MUX VLANs and Smart VLANs.) A Super VLAN has a layer 3 interface that acts as the default gateway for the hosts within
the Sub VLANs. If desired, a Super VLAN can enable communication between hosts that are members of
different Sub VLANs through the ARP Proxy.
When to Use The Super VLAN can be used to implement the VLAN aggregation for efficient IP address allocation.
Another usage of the Super VLAN is to work together with the ARP Proxy to enable the communication between different Sub VLANs.
Refer to "3.5 ARP and ARP Proxy" for further details.
VLAN Aggregation VLAN aggregation is a mechanism that enables the hosts residing in the same physical switched equipment, but different virtual broadcast domains, to be in the same IPv4 subnet and share one default gateway.
The UA5000 implements the VLAN aggregation function through the Super VLAN.
A Super VLAN uses multiple Sub VLANs to separate the layer 2 broadcast domains. A Super VLAN corresponds with a virtual layer 3 interface. Hosts that are members of all
the Sub VLANs share this layer 3 interface as their default gateway.
With Super VLAN, you do not have to configure a subnet for each Sub VLAN. By this, the efficiency of IP address allocation is increased.
Generally, if you are to use a layer 3 interface, instead of Super VLAN, to enable the communication between different VLANs, you must configure a subnet for each VLAN. This will lead to waste of IP addresses, because:
The subnet number, directed broadcast address, and default gateway all consume IP addresses. The IP addresses reserved for the consideration of the growth of hosts within one VLAN cannot be
used by other VLANs.
Communication between Sub VLANs If desired, the communication between the Sub VLANs belong to a Super VLAN can be enabled through ARP Proxy.
For further details, refer to "3.5 ARP and ARP Proxy."
3.4.6 Comparisons Between Different VLANs
Super VLAN Versus other VLANs The Super VLAN can contain the three other types of VLANs, and the three other types of VLANs cannot contain any VLAN.
Standard VLAN Versus MUX VLAN and Smart VLAN The differences between them are as follows:
The Standard VLAN contains only the standard ports. All ports in a Standard VLAN are logically equal to each other.
The MUX VLAN and Smart VLAN contain two types of ports: standard port and service virtual port. The standard port acts as the upstream port, and the service virtual port as the access port. The VLAN sets up an internal connection between the upstream port and the access port.
MUX VLAN Versus Smart VLAN A MUX VLAN can contain only one service virtual port, while a Smart VLAN can contain multiple service virtual ports.
Application Differences between Different VLANs Different VLANs have different features, and their application scenarios are also different.
The Standard VLAN is used to limit the broadcast domain of the standard ports, and to enable the communication between the standard ports that are the members of the VLAN.
The MUX VLAN is used in the case when the access users are required to be identified using VLAN IDs.
The Smart VLAN is used to identify user groups through VLAN IDs, and to disable the communication between the users within a group. Using the Smart VLAN can save the VLAN ID resource of the UA5000.
The Super VLAN is used to increase the efficiency of IP address allocation, and to enable the communication between Sub VLANs that belong to one Super VLAN.
What is QinQ 802.1Q in 802.1Q (QinQ) is a VLAN feature that allows the UA5000 to add a VLAN tag to a tagged frame.
The implementation of QinQ is to add a public VLAN tag to a frame that carries a private VLAN tag, so that the frame carries two layers of VLAN tags. The public VLAN tag enables the frame to be forwarded over the service provider’s backbone network. By using QinQ, you can build up a simple layer 2 VPN tunnel for enterprise networks.
On the UA5000, the QinQ feature is implemented as follows:
On the UA5000, the implementation of the QinQ feature is as follows:
After receiving a frame that carries a private VLAN tag from the customer side, the UA5000 adds a public VLAN tag before the private VLAN tag in the frame, and sends the frame to the upper layer network.
After receiving a frame that carries two layers of VLAN tags from the network side, the UA5000 removes the public VLAN tag to restore the original user frame and then sends the frame to the CPE.
When to Use The QinQ feature is used to extend the coverage of a private network, or to save the VLAN resource of the public network.
Figure 3-6 shows the application of the QinQ feature.
As shown in Figure 3-6, the UA5000 enables the communication between customers in VLAN 1 or VLAN 2 of the same private network spanning different geographic areas.
In the feature, the QinQ feature is implemented as follows:
1. The PC sends an untagged frame. 2. The LAN switch adds a private VLAN tag (VLAN 1 or VLAN 2) to the frame, and sends
the frame to the UA5000. 3. The UA5000 adds a public VLAN tag (VLAN 3) to the frame, and sends the frame to the
upper layer network. 4. The frame is forwarded through the upper layer network according to the public VLAN
tag. 5. Upon receiving the frame, the peer end UA5000 removes the public VLAN tag from the
frame, and sends the frame to the downstream LAN switch. 6. The LAN switch removes the private VLAN tag (VLAN 1 or VLAN 2) from the frame,
and sends the frame to the end users that are members of the VLAN (VLAN 1 or VLAN 2).
By this, the communication between user 1 and user 2 of VLAN 1, and the communication between user 3 and user 4 of VLAN 2 are realized.
3.4.8 Stacking
What is Stacking Stacking is a VLAN feature that allows the UA5000 to add two 802.1Q VLAN tags to a frame, so that the frame can be transported over the backbone network of the service provider. When the frame reaches the BRAS, the BRAS authenticates the frame based on the two layers of VLAN tags, or removes the outer VLAN tag and identifies the customer according to the inner VLAN tag.
On the UA5000, the Stacking feature is implemented as follows:
When the UA5000 receives an untagged frame from the CPE, it adds two layers of VLAN tags to the frame and then sends the frame to the upper layer network.
When the UA5000 receives a frame with two layers of VLAN tags from the network side, it removes the VLAN tags and sends the frame to the CPE.
When to Use The Stacking feature helps to increase the VLAN space and to provision the private circuit wholesale service.
By adding two VLAN tags, the VLAN space is increased. Private circuit wholesale service: with the stacking feature, the outer VLAN tag identifies
the serving Internet Service Provider (ISP) of a customer and the inner VLAN tag identifies a customer. By this, customers are connected to the respective ISPs in batches.
To increase the VLAN space with the Stacking feature, the associated BRAS must support the authentication of the two-layer VLAN tags. For the private circuit wholesale service, the upper network must operate at layer 2, and forward the packets based on the VLAN tag and MAC address.
Figure 3-7 shows an application of the Stacking feature.
Figure 3-7 VLAN stacking application
MAN
L2/L3
Modem
UA5000
Modem
Enterprise A
ISP2ISP1
SP VLAN 1 C VLAN 2 SP VLAN 2 C VLAN 2
SP VLAN 2 C VLAN 1SP VLAN 1 C VLAN 1
Enterprise B
SP VLAN: Service Provider VLAN C VLAN: Customer VLAN
As shown in Figure 3-7, the UA5000 sends the frames from hosts in Enterprise A and Enterprise B to ISP 1 and ISP 2 respectively.
In the feature, the Stacking feature is implemented as follows:
1. A host sends an untagged frame to the UA5000 through a modem. 2. The UA5000 adds two VLAN tags (SP VLAN and customer VLAN) to the frame.
Different SP VLAN tags correspond with different ISPs. − The frames from the hosts of Enterprise A are encapsulated with SP VLAN1 as their
outer VLAN, and with corresponding customer VLANs as their respective inner VLAN.
− The frames from the hosts of Enterprise B are encapsulated with SP VLAN2 as their outer VLAN, and with corresponding customer VLANs as their respective inner VLAN.
3. The frame is forwarded through the MAN according to the SP VLAN tag. 4. The destination ISP device removes the SP VLAN tag from the received frame and
identifies the customer type according to the customer VLAN tag.
Introduction The ARP function is used to carry out the mapping between an IP address and an MAC address. There are static ARP entries and dynamic ARP entries.
When the broadcast domain of two hosts in the same subnet is isolated by a network device, to enable the two hosts to obtain each other’s MAC address, you must enable the ARP Proxy on the network device to answer the ARP requests from any of the host.
The UA5000 supports the ARP and ARP Proxy functions.
The ARP Proxy function of the UA5000 is used to enable the communication between the hosts of different Sub VLANs that belong to the same Super VLAN, and between the hosts of the same Smart VLAN.
For more details about the Super VLAN, refer to "3.4.5 Super VLAN."
Implementation of ARP Proxy Figure 3-8 shows the implementation of the ARP proxy.
Figure 3-8 The implementation of the ARP proxy
PC1IP: 1.1.1.2
MAC: 00-e0-fc-00-00-02
PC2 IP: 1.1.1.15
MAC: 00-e0-fc-00-00-15
Sub VLAN 2
Super VLAN
Communication
Isolation
Layer 2
Layer 3
ARP Proxy
Sub VLAN 1
ARP Proxy
Gateway IP: 1.1.1.1/24MAC: 00-e0-fc-00-00-11
Virtualinterface
AS shown in Figure 3-8, PC1 and PC2 are in VLAN1 and VLAN2 respectively. They are isolated at layer 2. PC1, PC2 and the virtual layer 3 interface are in the same subnet.
In the figure the communication between PC1 and PC2 is implemented as follows:
1. Since PC1 and PC2 are in the same subnet, when PC1 attempts to send packets to PC2, PC1 broadcasts ARP packets directly to request the MAC address of PC2. However, because PC1 and PC2 are in different broadcast domains, PC1 does not receive the ARP response packet from PC2.
2. Upon receiving the ARP request, the UA5000 with the ARP proxy enabled sends the MAC address of its virtual layer 3 interface to PC1, and searches its ARP table to find the MAC address of PC2.
3. If the ARP table contains the MAC address entry of PC2, the packets from PC1 can be forwarded to PC2 through the virtual layer 3 interface.
4. If the ARP table does not contain the MAC address entry of PC2, the UA5000 broadcasts the ARP request packets through its virtual layer 3 interface to request the MAC address of PC2.
5. Upon receiving the ARP response packets from PC2, the UA5000 adds the MAC address of PC2 to its ARP table. PC1 and PC2 are interconnected through the UA5000.
3.6 Multicast Multicast is a technology that enables the sending of data streams from one source to many destinations. The key function of the multicast technology is to carry out packet duplication at a node as close to the destination as possible.
The concept of a group is very important to the implementation of multicast. A multicast group is defined by a class D IP address (224.0.0.0 to 239.255.255.255). When a source sends out a multicast packet to the address of a group, only the members of the group receive the packet.
Multicast helps the customer to:
Reduce the load on the server, because the server need not handle the request for each user. Save the network bandwidth and reduces the investment in the network device. Adapt to various user quantities and avoid pressure on the network when you increase the
number of users.
3.6.1 IGMP Proxy The UA5000 supports the Internet Group Management Protocol (IGMP) proxy function. With the IGMP proxy function, the UA5000 does not perform routing for multicast packets. The routing is carried out by the upper layer multicast router.
From the perspective of a multicast host, the UA5000 is a multicast router implementing the functions of a router as defined in the IGMP. The UA5000 receives the IGMP requests from its downlink users for joining or leaving a multicast group. The UA5000 also queries at a regular interval whether a downstream port has multicast group users. By doing so, the UA5000 obtains multicast group membership information on the downstream ports.
From the perspective of a multicast router, the UA5000 is a multicast host which sends IGMP requests to the multicast router for joining or leaving a designated multicast group.
The UA5000 controls the multicast group demanded by the user. The UA5000 then forwards the multicast traffic from the upstream port to the downstream port based on its group membership information.
The upstream and the downstream ports may not belong to the same VLAN. That is, inter-VLAN multicast forward is supported. However, an upstream port cannot forward the multicast data received from its downstream ports, or forward multicast data to other upstream ports.
3.6.2 Managed Multicast The UA5000 enables managed multicast in full compliance with the standard multicast protocols.
The managed multicast means that the multicast message is under control. The managed multicast is used in the multicast user management, the services management and the accounting.
The managed multicast involves:
Multicast authentication and accounting Multicast monitor and analysis Multicast QoS Multicast encryption Multicast address allocation
With multicast authentication, the UA5000 authenticates a user before the user joins a multicast group.
With multicast accounting, the UA5000 starts accounting on the multicast user who passes the authentication. The accounting is based on the multicast group, or the traffic volume of the group, or the duration of the user to stay in the group.
The UA5000 sends queries to the multicast members at regular interval to decide whether to continue accounting on a user:
If a membership report is received from the user, the UA5000 continues the accounting on the user.
If no response is received from the user, the UA5000 disconnects the user from the multicast group and stops accounting on the user.
If a leave message is received from the user, the UA500 disconnects the user from the multicast group and stops accounting on the user.
3.6.3 Multicast Implementation The multicast service on the UA5000 is implemented as follows:
1. To order a video program, an IGMP user sends IGMP requests to the UA5000 to apply to join the multicast group that offers the video program.
2. After receiving the requests, the UA5000 authenticates the user. If the user has the right to watch or preview the program, the UA5000 adds the user to the corresponding multicast group. Otherwise, the UA5000 rejects the requests from the user.
3. The UA5000 sends the general quest message to all online IGMP users at regular interval. If no response is received from an IGMP user for a period of time, the UA5000 considers that the user has left the multicast group, and deletes the user from the group.
4. When leaving a multicast group, the IGMP user sends leave messages to the UA5000. If the user is enabled with quick-leave, the UA5000 deletes the user from the multicast group immediately. If the user is not enabled with quick-leave, the UA5000 sends the specific query message to the multicast group. If no response is received from the user for a period of time, the UA5000 deletes the user from the multicast group.
5. The UA5000 also responds to the general query messages from the upper layer IGMP routers to report the current state of the multicast service.
Related Concept An important concept relating to QoS is flow classification. Flow classification is intended to identify appropriate packets by certain rules.
The rules may be quite simple. For example the flows are classified according to ToS field in an IP header. The rules may also be complicated. For example, the flows are classified according to combination of MAC address, IP protocol type, source address, destination address and port number.
3.7.1 Precedence Tagging
Overview Precedence tagging is a policy to re-tag the precedence of a packet that matches the corresponding ACL rule. The precedence is tagged at the related precedence fields.
The UA5000 supports tagging the following precedence fields:
IP precedence Differentiated Services Code Point (DSCP) precedence 802.1p precedence
IP Precedence IP precedence refers to the precedence information contained in the ToS field of the header of an IP packet.
The definition of the ToS field is shown in Figure 3-9. Where,
Precedence: 3 bits. It contains the setting of the IP precedence. Delay (D): 1 bit. Prompt delivery is important for packets with this indication. Throughput (T): 1 bit. High data rate is important for packets with this indication. Reliability (R): 1 bit. A higher level of effort to ensure delivery is important for packets
with this indication. Cost (C): 1 bit. Indicating to select a route of low cost.
The UA5000 supports the setting of the precedence field.
Figure 3-9 ToS field of the IP header
Version IHL ToS Total Length
bit 0 4 8 16 31
Precedence0 1 2 3 4 5 6 7
D T R C Not used
DSCP Precedence DSCP precedence is defined by the Differentiated Services (DS) field of the IP header. The DS field uses the IPv4 ToS octet. Currently, only the six most significant bits of the ToS octet are used and the other two bits are reserved.
Figure 3-10 shows the DS field of the IP header.
Figure 3-10 DS field of the IP header
Version IHL DS Total Length
bit 0 4 8 16 31
DSCP0 1 2 3 4 5 6 7
Not used
The UA5000 can configure the DSCP precedence for the packets that match the corresponding ACL rule.
The DSCP-based flow classification is also called the differentiated services.
802.1p Precedence The tag field of the 802.1Q frame includes the following contents:
Tag protocol identity (TPID): 16 bits. For the Ethernet, the TPID is 0x8100 Priority: 3 bits, indicating the frame precedence (0–7) Canonical Format Indicator (CFI): 1 bit, used to indicate the frame format VLAN ID: 12 bits, indicating the VLAN uniquely
The UA5000 supports the setting of the priority field.
As an integrated AG, the UA5000 differentiates the voice service from data service, and tags voice traffics with VLANs of higher priorities to ensure the quick forwarding of the voice traffics.
3.7.2 Traffic Policing Traffic policing is used to limit traffic flows within a valid range. The traffic policing monitors the incoming traffic flow on an ingress port. The packets whose rate exceeds the agreed value are discarded or tagged.
3.7.3 Port Rate Limiting Port rate limiting controls the bandwidth of a flow within an agreed range at the egress port.
After a rate limit is specified at the egress port, packets exceeding the threshold are discarded.
3.7.4 Queue Scheduling
Introduction Queue scheduling offers a solution to the network resource contention when multiple packets are forwarded at the same time. The UA5000 supports the strict priority queuing (PQ) algorithm and the Weighted Round Robin (WRR) algorithm.
PQ aims at giving a strict priority to important traffic. The important traffic is given absolute preference over low-priority queues.
In PQ, each packet is placed in one of the four priority queues: high, medium, normal or low, which are indicated by 3, 2, 1 and 0 in the order (3 means high priority).
The traffic with a higher priority gets preference over that of a lower priority. Therefore, mission-critical traffic is served earlier than the less important traffic.
A disadvantage of PQ is that the lower priority traffic may be underserved for a long time during network congestion.
WRR Algorithm By WRR algorithm, the traffic on a port is divided into four or eight output queues. Each queue takes its turn in queue scheduling, so that all queues can be served for some time. Each queue is assigned with a weighted value among w3, w2, w1 and w0.
Take a 100 Mbit/s port for instance. Assign the weighted value of its WRR algorithm to 50, 30, 10, and 10 (corresponding to w3, w2, w1 and w0 in turn). This aims at guaranteeing the minimum bandwidth of 10 Mbit/s to the lowest PQ. In this way, the packets in the lower PQ can be served.
The advantages of WRR algorithm are as follows:
The long-time underserved circumstance that may occur in the application of PQ algorithm is avoided.
Time allocated to each WRR queue is not fixed. When no packet is sent from a queue, the bandwidth resource of the queue is allocated to the next queue immediately.
3.7.5 Traffic Mirroring The traffic mirroring function is to copy the packets on the monitored port to monitor the specific traffic flow. The function is used for testing and troubleshooting.
Introduction to RTCP The Real-time Transport Control Protocol (RTCP) is used to monitor QoS and control a Real-time Transport Protocol (RTP) session, transmit the quality parameter carried on the real-time signal, and provide the QoS monitor mechanism.
The RTCP defines packet types such as sender report (SR), receiver report (RR), source description (SDES), BYE and APP.
SR and RR are used to feed back the data receiving quality. The feedback helps the UA5000 to monitor the QoS and diagnose the network problems, and provides evidence to adjust the sending mode.
The feedback information is divided into three categories:
Accumulated information Instant information Time information
The difference of accumulated information between two receiving reports is used to monitor the long-term performance. The instant information can be used to measure the short-term performance. The time information can be used to calculate the ratio index.
RTCP Implementation on the UA5000 The PVM card provides the following functions through the RTCP.
Information reporting at the termination of a call Passive test and active test
The reported information at the termination of a call includes:
Packet loss rate Time delay Jitter Number of packets received Number of packets sent
Passive Test The passive test only monitors the services without intruding actual services of the network. It obtains the monitor data by analyzing traffic flows.
The passive test process is as follows:
1. The EMS sends the statistics test tasks to two MGs. 2. The MGs collect the related statistics, and report them to the EMS.
The statistics include the number of sent packets, number of received packets, maximum time delay, maximum jitter and average packet loss ratio.
3. After receiving the above statistics, the EMS draws related curves.
Active Test The active test intrudes into the network. In the active test, the test traffic flow comes into the network and is analyzed to obtain the test data.
The active test procedure is as follows:
1. The EMS sends the test command. 2. The MGC initiates a call to set up a connection between two MGs. 3. The MGs send the test voice samples to each other through the connected channel. 4. After the MGs receive the tested traffic flow, they extract parameters from the RTP flow,
such as time delay, packet loss ratio, and jitter. The MGs then report these parameters to the MGC.
5. The MGC summarizes the data and reports the data to the EMS. 6. The EMS draws the flow/network quality curves.
3.8 MAC Address Management The control card on the UA5000 maintains a MAC address table. The table contains the MAC address, the VLAN ID and the port number.
The UA5000 supports the static and dynamic MAC address entries. You can configure the static MAC address entries on the UA5000.
The UA5000 learns new MAC addresses. If the source MAC address of a received packet is not in the MAC address table, the UA5000 adds the MAC address and the ID of the port receiving the packet to the address table as a new entry. Such an entry is called a dynamic MAC address entry.
The UA5000 deletes the dynamic MAC address entries that are not used in a preset ageing period.
3.9 STP and RSTP
STP Spanning Tree Protocol (STP) provides a loop-free network. The STP detects the network topology by exchanging a specific packet between devices. This packet is referred to as the ‘configuration message’ in IEEE 802.1D. The configuration message contains the information necessary for the spanning tree calculation.
RSTP Rapid Spanning Tree Protocol (RSTP) is an enhanced version of STP. Here, rapid means the time delay is greatly reduced for the root port or the specified port to enter the forwarding status when the network device or the link changes.
Functions of Terminal Management The terminal management function of the UA5000 enables you to configure and manage ADSL terminals with “zero touch”.
The UA5000 working with the EMS can carry out the following functions:
Configure PVC and the protocol for the terminal Monitor the terminal status in real time Test the terminal to locate a fault quickly Manage and maintain all terminals in the network management center of the central office
Composition of the Terminal Management System The terminal management system consists of three parts: the EMS, the UA5000 and the terminal.
The EMS associates the subscriber port with actual network components. The UA5000 converts SNMP packets between the EMS and the terminal. The terminal carries out the access control to the SNMP agent and the terminal MIB.
On the EMS, you can access the terminal MIB through the UA5000 and manages the terminals.
Handling of the Terminal Management Packets The UA5000 handles the terminal management as follows:
Upon receiving a request from the EMS, the proxy in the UA5000 converts the request and then forwards it to the line card connecting the terminal.
After receiving a response from the line card, the proxy converts the message and sends it back to the EMS.
Similarly, after receiving a Trap from a line card, the proxy converts the Trap and sends it to the EMS.
4.1 Overview The UA5000 adapts to various accesses network scenarios. You can use the UA5000 in complex topologies and challenging engineering environments.
You can select the most suitable networking solution based on the requirements of transmission resources, ATM/IP network resources, service types, QoS and security.
The following lists the equipment icons used in the networking diagrams below.
Add/Drop Multiplexer (ADM)
UA5000
Terminal Multiplexer (TM) MD5500
Multiple Add/Drop Multiplexer (MADM) MGC
4.2 Typical Networking Topologies When the broadband network at the upper layer is an IP network, the UA5000 can use the "MSTP Networking" or "SDH+FE/GE Networking."
When the broadband network at the upper layer is an ATM network, the UA5000 can use the "SDH+STM-1 ATM Networking."
4.2.1 MSTP Networking In the MSTP networking, all services of the UA5000 are sent upstream through the MSTP equipment.
Networking Description Table 4-1 describes the MSTP networking.
Service stream Broadband services and narrowband services are accessed and transmitted together.
Services are sent to the PSTN, DDN or IP network on the central office side through the MSTP.
The VoIP services are sent to the IPMB card through an FE port of the PVM card, and then to the MSTP equipment through an FE or GE port of the IPMB.
Based on the aggregation state of the narrowband services, MSTP networking falls into two modes: single-level networking and two-level networking.
Single-level networking
The UA5000 at the remote end sends the narrowband and broadband services to the central office through the MSTP transmission ring. The central office forwards the services to the BRAS/L3, PSTN switch or DDN node without convergence.
Two-level networking
The narrowband services are sent to the PSTN or DDN through the MD5500 or UA5000 at the central office. When there are many remote nodes and subscribers, select the MD5500 in the central office to converge services. When there are a few remote nodes and subscribers, select the UA5000 to converge services.
The broadband services are aggregated and forwarded to the BRAS/L3 by the transmission equipment at the central office.
Networking Features The MSTP networking has the following features:
Suitable for the scenarios where the narrowband E1 and the broadband FE/GE resources coexist
Saving the optical fibers by accessing and transmitting both the narrowband and broadband services
Supporting multiple capacity specifications to meet various networking requirements Suitable for the IPTV service deployment
4.2.2 SDH+FE/GE Networking In the SDH+FE/GE networking, narrowband services are transmitted through the SDH equipment, and broadband services through optical fibers.
Networking Description Table 4-2 describes the SDH+FE/GE networking.
Table 4-2 SDH+FE/GE networking description
Item Description
Upper layer network PSTN, DDN and IP
Access network topology Narrowband: ring, ring with chain, and tangent rings Broadband: star
Access network equipment SDH equipment, UA5000 and MD5500 (optional)
Service stream Broadband and narrowband services are accessed together but transmitted separately. Narrowband services are transmitted to the central office through the SDH network, and then upstream to PSTN and DDN. The broadband services are transmitted to the upper-layer network through the FE ports of the IPMB card.The VoIP services are sent to the IPMB card from the PVM card through its internal FE port. The services are then sent to the MSTP equipment through an FE or GE port of the IPMB.
The SDH+FE/GE networking falls into two modes: single-level networking and two-level networking.
Single-level networking
The narrowband and broadband services are sent to the BRAS/L3, PSTN switch or DDN node directly. Neither of them is aggregated within the access network.
Two-level networking
The MD5500 or the UA5000 at the central office aggregates the narrowband services and then sends them to PSTN or DDN.
When there are many remote nodes and subscribers, select the MD5500 in the central office to aggregate the V5 interfaces. When there are a few remote nodes and subscribers, select the UA5000 in the central office to aggregate the V5 services.
The broadband services are sent to the IP network through the FE or GE ports directly.
Networking Diagram Figure 4-3 and Figure 4-4 show the SDH+FE/GE networking. You can replace the MD5500 in Figure 4-4 with a UA5000.
Access network topology Narrowband: ring, ring with chain, and tangent rings Broadband: star
Access network equipment SDH equipment, UA5000 and MD5500 (optional)
Service stream Broadband and narrowband services are accessed together but transmitted separately. The narrowband services are transmitted to the central office through the SDH network, and then upstream to PSTN and DDN. The broadband services are transmitted to the upper-layer network through an STM-1 port of the APMB card.
The SSDH+STM-1 ATM networking falls into two modes: single-level networking and two-level networking.
In the single-level networking, neither narrowband nor broadband services are aggregated within the access network.
In the two-level networking, the central office aggregates the services from the V5 and ATM interfaces and then sends them to PSTN or ATM network.
Networking Diagram Figure 4-5 and Figure 4-6 show the SDH+STM-1 ATM networking.
Networking Features The SDH+ STM-1 ATM networking has the following features:
Suitable for the networks with the SDH equipment, ATM switches and abundant optical fibers.
The broadband service channel is separated from the narrowband service channel, while their EMS channels are integrated.
4.3 Typical Application Scenarios Typical application scenarios of the UA5000 include:
NGN Consolidation Private Circuit Service Triple Play
4.3.1 NGN Consolidation The UA5000 acts as an AG to serve the NGN consolidation. In addition, the UA5000 can also send the broadband and narrowband services to IP and PSTN networks respectively.
Figure 4-7 depicts the NGN consolidation scenario.
In this scenario, the UA5000 carries out:
The access of broadband and narrowband services over the same copper wire, such as FAX service and POTS service
The access of VoIP, FoIP and MoIP under the control of a MGC
The ISDN BRA and ISDN PRA services The ADSL broadband network access and SHDSL broadband private circuit
interconnection services
Figure 4-7 NGN consolidation
IP MAN
PSTN
BRAS
L2/L3
UA5000
MGC
Internet
FE/GEE1
FAXPOTS/VoIPADSLSHDSL
NT1
Modem Splitter
ISDN BRA
ADSL2+SHDSL
ISDN PRA
ISDN PRI
PBX
ISDNBRI
Modem
4.3.2 Private Circuit Service The UA5000 supports rich private circuit services to suit the group customers. Figure 4-8 depicts the scenario that provides the private circuit service.
In this scenario, the UA5000 carries out:
The narrowband private circuit interconnection of narrowband services through E1 and V.35 interfaces provided by TDM SHDSL
The high speed private circuit interconnection through broadband ports such as FE and ATM SHDSL
QinQ VLAN and VLAN stacking for broadband services
4.3.3 Triple Play The UA5000 is able to offer narrowband, data, and video services to end users simultaneously with appropriate QoS. Such a scenario is also called the Triple Play.
Figure 4-9 shows this scenario. In this scenario, the UA5000 carries out:
The access of both the broadband and narrowband services over the same copper wire The VoIP service under the control of a MGC Broadband network access and broadband private circuit services through the xDSL ports IP TV service through the IGMP proxy and managed multicast mechanism
Overview The management functions of the iManager N2000 include:
Topology management Performance monitoring and traffic measurement Fault management Security management Batch service provisioning Backup and uploading of NE data Database management Environment and power supply monitoring Configuration management
Topology Management The iManager N2000 can display the network elements (NE) in the whole network in one topology view. Through a unified management platform, it can monitor and manage all NEs in the network. This simplifies network maintenance.
Performance Monitoring and Traffic Measurement The iManager N2000 helps you to monitor system performance and collect traffic statistics of all NEs or a specified NE in the network, so that the network resources can be efficiently used.
Fault Management The iManager N2000 offers an overall network alarm management solution, enabling fast fault locating and troubleshooting.
In addition, to simplify the troubleshooting, the iManager N2000 supports window switching. For example, it allows shift from the topological window to the alarm window, or shift from the alarm window to the faulty port.
Security Management The iManager N2000 manages the network based on different user authorities and different domains. It can divide users’ authorities based on users, user groups, operations, applications or ACLs. It can enable automatic lock, forced disconnection and user operation logging on the clients.
Batch Service Provisioning The iManager N2000 supports batch service processing to shorten the time in deploying the service and responding to customers’ demands.
Backup and Uploading of NE Data The iManager N2000 provides manual or timed backup or uploading of data of all NEs or a specified NE in the network. This greatly enhances security of the NE data in the network and eases your burden in large scale software upgrade in the network.
Database Management The iManager N2000 provides a tool to carry out the backup and recovery of the EMS database. This enhances security of the system data.
The iManager N2000 also provides a monitoring terminal to monitor the running status of the EMS server and the usage of the EMS database.
In addition, the iManager N2000 supports the remote dual system backup scheme to ensure the database safety.
Environment and Power Supply Monitoring The iManager N2000 monitors environment and power supply of the NEs in a centralized manner. This function helps you to know about the situation of the environment and the power supply timely.
Configuration Management The EMS provides multiple equipment management and configuration functions for the UA5000.
5.2.3 Networking Modes Between the N2000 and UA5000
Overview The EMS server and the UA5000 can communicate through in-band or out-band EMS channels. These two modes are usually used together.
Inband Networking Inband networking means that the management is carried out using the service transmission channel of the UA5000. In this fashion, the EMS messages are transmitted through the service channel.
Outband Networking Outband networking means that the management is carried out using a channel separated from the service channel.
Figure 5-3 shows the outband EMS networking.
Figure 5-3 Outband EMS networking
EMS Server
EMS Client
RTU
EMS Client
UA5000
UA5000
RTU
Serviceside
Managementside
IP
Features of the outband networking are as follows:
Advantage: The EMS channel is more reliable than that of the inband EMS. When the service channel is interrupted, you can still manage the UA5000 through the outband EMS.
Disadvantage: Additional devices are required to set up an EMS channel separated from the service channel.
CAR CAR based on the subscriber PVC Upstream and the downstream CAR The granularity is 64 kbit/s. The minimum is 64 kbit/s and the maximum is 128 Mbit/s.
Queue scheduling Eight queue priorities Supporting the PQ scheduling Supporting the WRR scheduling
Subscriber layer 2 isolation
Layer 2 PVC/VLAN isolation
IP address binding Supporting the binding of “IP + MAC + Subscriber PVC”. Each subscriber PVC can be bound with up to eight “IP + MAC”.
MAC address number control
The MAC address number for each subscriber is in the range of 1–255.
MAC address entry query
Inputting the MAC address to locate the subscriber port quickly
Multicast group control Restricting the number of the multicast groups that each subscriber can join
Broadcast suppression Suppression of broadcast packets, unknown unicast packets and unknown multicast packets
Supporting the suppression traffic adjustment by the traffic percentage
DHCP Option82 During the STB authentication, the user port information can be contained in the DHCP message and sent to the DHCP server/BRAS.
PPPoE Relay Agent (PPPoE+)
During the PPPoE authentication, the user port information can be contained in the PPPoE message and sent to the BRAS.
Security
ARP Proxy Enabling or disabling the function Enabling or disabling the interconnection of subscribers at one layer 3 interface
STP/RSTP Compliant with IEEE 802.1D and IEEE 802.1w
6.4.3 Features and Specifications of the AG Service
Table 6-26 AG service features
Category Feature Specification
Gateway control protocol H.248 Protocol
Voice encoding/decoding G.711 (a-law/μ-law), G.723.1 and G.729 (A/B)
Basic and supplementary PSTN services
None
Transparent fax and T.38 fax services
None
Transparent transmission modem serv1ice VBD Modem service
The VBD modem uses the G.711 transparent transmission mode. It also uses the redundant message mechanism to protect against the packet loss and jitter.
Emergency standalone If the emergency standalone is enabled, users on a UA5000 can call each other when the connection between the UA5000 and the MGC is interrupted.
Service
Hairpin connection under the MGC control
The call between subscribers of one UA5000 is switched over the TDM switching network. It does not occupy the DSP resource.
12KC/16KC billing and the reversal polarity billing
None
Message waiting indicator None
ISDN-BRI None
TOS/DSCP label None
801.1Q None
802.1p None
QoS
Voice quality technology The following technologies are provided: Voice activation detection (VAD) Comfortable noise generation (CNG) Jitter buffer dynamic adjustment Echo cancellation (compliant with ITU-T
G.165/G.168) Packet loss compensation DTMF detection/generation Optional TX/RX gain control
Voice index Quality index Objective voice assessment: When the network condition is good, the PSQM average is less than 1.5.
When the network condition is normal, the PSQM is less than 1.8. (Given that the packet loss ratio is 1%, the jitter is 20 ms and the time delay is 100 ms.)
When the network condition is poor, the PSQM is less than 2.0. (Given that the packet loss ratio is 5%, the jitter is 60 ms and the time delay is 400 ms.)
Subjective voice assessment: When the network condition is good, the MOS is greater than 4.0.
When the network condition is normal, the MOS is greater than 3.5. (Given that the packet loss ratio is 1%, the jitter is 20 ms and the time delay is 100 ms.)
When the network condition is poor, the MOS is greater than 3.0. (Given that the packet loss ratio is 5%, the jitter is 60 ms and the time delay is 400 ms.)
Test items: POTS loop line and card circuit, test card self detection, call emulation, telephone test and external meter test
ISDN loop line and card circuit, terminal test and external meter test
Narrowband line test
Subscriber line test
Testing the voltage, resistance, capacitance, loop resistance and reverse polarity resistance for the loop line through the TSSB card
ADSL2+ self-test Test items: Loop length Estimate attainable up/down stream rate Termination identification In band noise
External CQT test Test items: Frequency Response (FR) test Time Domain Reflectometry (TDR) test Discrete Multi-Tone (DMT) test Noise test Longitudinal balance
Broadband line test
Meter test Providing interfaces for external test meters such as a multimeter or a line analyzer
6.5 Standards Compliance Table 6-28 lists the standards compliance.
Table 6-28 Standards compliance
Standard Description
AF-PHY-0086.000 Inverse Multiplexing for ATM (IMA) Specification version 1.0
AF-PHY-0086.001 Inverse Multiplexing for ATM (IMA) Specification version 1.1
ANSI T1.413 issue 1 and issue 2
Asymmetrical Digital Subscriber Line (ADSL) Metallic Interface Specification (issue 1 and issue 2 )
ITU-T G.783 Characteristics of Synchronous Digital Hierarchy (SDH) equipment functional blocks
ITU-T G.785 Characteristics of a flexible multiplexer in a synchronous digital hierarchy environment
ITU-T G.797 Characteristics of a flexible multiplexer in a plesiochronous digital hierarchy environment
ITU-T G.803 Architecture of transport networks based on the Synchronous Digital Hierarchy (SDH)
ITU-T G.804 ATM cell mapping into Plesiochronous Digital Hierarchy (PDH)
ITU-T G.811 Timing requirements at the outputs of primary reference clocks suitable for plesiochronous operation of international digital links
ITU-T G.812 Timing requirements of slave clocks suitable for use as node clocks in synchronization networks
ITU-T G.813 Timing characteristics of SDH equipment slave clocks (SEC)
ITU-T G.821 Error performance of an international digital connection operating at a bit rate below the primary rate and forming part of an integrated services digital network
ITU-T G.823 The control of jitter and wander within digital networks which are based on the 2048 kbit/s hierarchy
ITU-T G.824 The control of jitter and wander within digital networks which are based on the 1544 kbit/s hierarchy
ITU-T G.826 Error performance parameters and objectives for international constant bit rate digital paths at or above the primary rate
ITU-T G.902 Framework recommendation on functional access networks (AN): architecture and functions, access type, management and service node aspects
ITU-T G.957 Optical interfaces for equipments and systems relating to the synchronous digital hierarchy
ITU-T G.958 Digital line systems based on the synchronous digital hierarchy for use on optical fibre cables
ITU-T G.960 Access digital section for ISDN basic rate access
ITU-T G.961 Digital transmission system on metallic local lines for ISDN basic rate access
ITU-T G.962 Access digital section for ISDN primary rate at 2048 kbit/s
ITU-T G.964 V-interfaces at the digital local exchange (LE) V5.1-interface (based on 2048 kbit/s) for the support of access network (AN)
ITU-T G.965 V-interfaces at the digital local exchange (LE) V5.2-interface (based on 2048 kbit/s) for the support of access network (AN)
ITU-T Q.931 ISDN user-network interface layer 3 specification for basic call control
ITU-T T.30 Procedures for document facsimile transmission in the general switched telephone network
ITU-T T.38 Procedures for real-time group 3 facsimile communication over IP networks
ITU-T V.24 List of definitions for interchange circuits between Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE)
ITU-T V.36 Modem using the 60-108 kHz frequency band for synchronous data transmission
ITU-T V.90 A digital modem and analogue modem pair for use on the Public Switched Telephone Network (PSTN) at data signaling rates of up to 56 000 bit/s downstream and up to 33 600 bit/s upstream
ITU-T Y.1310 Transport of IP over ATM in public networks
RFC 0768 User Datagram Protocol
RFC 0783 The TFTP Protocol (revision 2)
RFC 0791 Internet Protocol
RFC 0792 Internet Control Message Protocol
RFC 0793 Transmission Control Protocol
RFC 0826 An Ethernet Address Resolution Protocol (ARP)
RFC 0854 Telnet Protocol
RFC 0894 A standard for the transmission of IP datagrams over Ethernet networks
RFC 1112 Host extensions for IP multicasting
RFC 1155 Structure and Identification of Management Information for TCP/IP-based Internets, Network Working Group, May 1990