HCNA-transmission Practice Guide
-
Upload
amirsalahibrahim -
Category
Documents
-
view
41 -
download
5
description
Transcript of HCNA-transmission Practice Guide
-
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential 1
The privilege of HCNA/HCNP/HCIE: With any Huawei Career Certification, you have the privilege on http://learning.huawei.com/en to enjoy: 1Comprehensive E-Learning Courses
ContentAll Huawei Career Certification E-Learning courses
Methods to get the E-learning privilege : submit Huawei Account and email being used for Huawei Account registration to [email protected] .
2 Training Material Download
Content: Huawei product training material and Huawei career certification training material
MethodLogon http://learning.huawei.com/en and enter HuaWei Training/Classroom Training ,then you can download training material in the specific training introduction page.
3 Priority to participate in Huawei Online Open Class(LVC)
ContentThe Huawei career certification training covering all ICT technical domains like R&S, UC&C, Security,
Storage and so on, which are conducted by Huawei professional instructors
MethodThe plan and participate method please refer to LVC Open Courses Schedule 4Learning Tool: eNSP
eNSP (Enterprise Network Simulation Platform) is a graphical network simulation tool which is developed by Huawei and free of charge. eNSP mainly simulates enterprise routers, switches as close to the real hardware as
it possible, which makes the lab practice available and easy without any real device. In addition, Huawei has built up Huawei Technical Forum which allows candidates to discuss technical issues with
Huawei experts , share exam experiences with others or be acquainted with Huawei Products( http://support.huawei.com/ecommunity/
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Content
SDH Network Topologies....................................................................Page 2
Survivable networks and their protection mechanisms.Page 14
Confidential Information of Huawei. No Spreading Without Permission
P-1
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Through this course, trainees should be able to:
List the SDH different topologies structures, features and applications.
Have idea about the basic concept of the SDH network protection. And understand
the network objectives, application architecture, switching initialization and
restoration criteria, characteristics, network capacity of different types of network
protection.
References
ITU-T Recommendation G.841 (Oct, 1998) Types and characteristics of SDH
network protection architectures
ITU-T Recommendation G.810 (Aug, 1996) Definitions and terminology for
synchronization networks ITU-T Recommendation G.803
ITU-T Recommendation G.803 (Aug, 2003) Architecture of transport networks
based on the synchronous digital hierarchy (SDH)
Confidential Information of Huawei. No Spreading Without Permission
P-2
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Confidential Information of Huawei. No Spreading Without Permission
P-3
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Confidential Information of Huawei. No Spreading Without Permission
P-4
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
The network topology, the geometrical layout of SDH network nodes and transmission
lines, reflects the physical connection of the network. The network topology is important
in the sense that it determines the performance, reliability and cost-effectiveness of an SDH
network.
Confidential Information of Huawei. No Spreading Without Permission
P-5
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Confidential Information of Huawei. No Spreading Without Permission
P-6
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
The chain network is simple and economical at the initial application stage of SDH
equipment. For a chain network, its more difficult and more expensive to protect the
traffic, compared with a ring network. The chain network is used in cases where the traffic
is unimportant or where the traffic load is small so that we dont have to care about the
traffic protection.
Confidential Information of Huawei. No Spreading Without Permission
P-7
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
In the star network, the hub node selects routes and passes through the traffic signals for
all the other nodes. As a result, the hub node is able to manage the bandwidth resources
thoroughly and flexibly. On the other hand, there is the possibility of a potential bottleneck
of bandwidth resources. Besides, the equipment failure of the hub node may result in the
breakdown of the entire network.
Confidential Information of Huawei. No Spreading Without Permission
P-8
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
A tree structure can be considered as the combination of chain and star structures. It is
suitable for broadcast service. However, due to the bottleneck problem and the optical
power budget limit, it is not suitable for bidirectional traffic.
Confidential Information of Huawei. No Spreading Without Permission
P-9
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
The ring network is the most widely used network for SDH transmission networks.
In such a structure, any traffic between two adjacent nodes can be directly add/drop
between them. For traffic between two non-adjacent nodes, we have to configure the
add/drop traffic at the source node and the sink node. And the pass-through traffic in
between those two nodes must be created as well.
The ring network is highly survivable. The most obvious advantage of a ring network is its
high survivability that is essential to modern optical networks with large capacity. Thus, the
ring network enjoys very broad applications in SDH networks.
Confidential Information of Huawei. No Spreading Without Permission
P-10
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Mesh networks are such communications networks in which many nodes are
interconnected with each other via direct routes. In such topological structure, if direct
routes are used in the interconnection of all the nodes, this structure is considered as an
ideal mesh topology. In a non-ideal mesh topological structure, the service connection
between nodes that are not connected directly is established through route selection and
transiting via other nodes.
In a mesh network, no bottle neck problem exists. Since more than one route can be
selected between any nodes, when any equipment fails, services can still be transmitted
smoothly through other routes. Thus, the reliability of service transmission is increased.
However, such networks are more complicated, costly and difficult to manage. Mesh
networks are very suitable for those regions with large traffic.
Confidential Information of Huawei. No Spreading Without Permission
P-11
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Tangent ring networks / Intersectant ring networks/ Not protection chain.
In selecting a topological structure, many factors should be considered. For example, the
network should be highly survivable, easy to configure, suitable to add new services, and
simple to mange. In a practical communications network, different layers adopt different
topological structures.
Confidential Information of Huawei. No Spreading Without Permission
P-12
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
The advantage of sub-network can simplify the big network, make it easy to maintenance.
Confidential Information of Huawei. No Spreading Without Permission
P-13
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
The concept of sub-network is introduced in Huawei OptiX series equipment and network
management systems in order to facilitate network topology management, security
management, tributary interface expansion, and traffic management.
In practical applications, it simplifies the topology structure of complicated networks and
thus enables hierarchical management.
Confidential Information of Huawei. No Spreading Without Permission
P-14
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Confidential Information of Huawei. No Spreading Without Permission
P-15
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Confidential Information of Huawei. No Spreading Without Permission
P-16
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Modern society is getting more and more dependent on communications with the
development of science and technologies, and so higher requirements to network security
are being brought forward. Thus the concept of survivable network comes into being. The
following will deal with the concepts of survivable network.
Confidential Information of Huawei. No Spreading Without Permission
P-17
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Please pay attention to that the network can only restore services here. It cannot repair the
failure in the network, which cannot do without human intervention.
So there should have protection channels to carry over the services in the working
channels. The first requirement for survivability of network is there should have protection
routes or standby routes.
A survivability also need something else. Nodes in the network must have the intelligence
to check out the failure occurred and inform corresponding units of doing relative
protection operation. And the nodes also should have powerful cross-connect capability to
implement the protection operation.
For the survivable network, the protection object can be the physical or electronic.
Confidential Information of Huawei. No Spreading Without Permission
P-18
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Confidential Information of Huawei. No Spreading Without Permission
P-19
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Unidirectional traffic and bidirectional traffic are named regarding the traffic flow
directions in the ring. A unidirectional ring means that traffic travel in just one direction,
e.g. clockwise or counter-clockwise. While in a bidirectional ring, traffic signals go in two
directions, one opposite to another.
Protection modes can be divided into two kinds: 1+1 and 1:N. In 1+1 protection mode,
every working system is protected by a dedicated protection system. But in 1:N protection
mode, N systems share one protection system; and when the system is in normal operation,
the protection system can also transmit extra traffic. Thus a higher efficiency can be
obtained than that of 1+1 system.
For multiplex section protection ring, traffic protection is based on multiplex section.
Switching or not is determined by signal qualities of the multiplex section between each
span of nodes.
Confidential Information of Huawei. No Spreading Without Permission
P-20
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
The network has two channels (two pairs of fibers): working (active) channel and
protection (standby) channel.
When the network is normal (i.e. no failure on working channel), working channel is used
to transport the traffics.
When the working channel is failed, use the protection channel.
Linear Multiplex Section (MS) protection is one of multiplex section protections. Linear
multiplex section protection switching can be a dedicated or shared protection mechanism.
It protects the multiplex section layer, and applies to point-to-point physical networks. One
protection multiplex section can be used to protect the normal traffic from a number (N) of
working multiplex sections. It cannot protect against node failures. It can operate in a
unidirectional or bidirectional manner, and it can carry extra traffic on the protection
multiplex section in bidirectional operation.
Confidential Information of Huawei. No Spreading Without Permission
P-21
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Source node: concurrent sending
Sink node: selective receiving
Confidential Information of Huawei. No Spreading Without Permission
P-22
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Out of 1+1 linear multiplex section protections, some modes require APS protocol during
the switching process, some dont require. For 1 1 unidirectional switching, the signal
selection is based on the local conditions and requests. Therefore each end operates
independently of the other end, and bytes K1 and K2 are not needed to coordinate switch
action.
Confidential Information of Huawei. No Spreading Without Permission
P-23
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
When the network has no failure, N working channels can transmit the normal traffic while
the protection channel transmits extra (unimportant) traffic or it transmits no traffic.
Suppose the fiber from NE A to NE B of the working channel 1 is broken. NE B detects
R_LOS alarm and sends a request to NE A to switch the services on the failed channel to
the protection channel.
Upon receiving the request, NE A bridges the service on the failed channel to the
protection channel.
NE B get the information from NE A and switch to select the service from the protection
channel.
NE A switches to select the service from the protection channel. This step completes the
switching of the service on the faulty channel to the protection channel for both directions.
Confidential Information of Huawei. No Spreading Without Permission
P-24
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
When the working channel 1 repaired, the _RLOS alarm disappears. NE B sets the K1 byte
to Wait-To-Restore (WTR) state. If WTR state lasts for a special time (10 minutes by
default), it switches to select the signal from the working channel and sends No Request
signal to the NE A using K1 byte.
NE A releases the bridge and replies with the same indication on K1 byte. The selector at
the NE A is also released.
Receiving this K1 byte causes the NE B to release the bridge. This step completes the
protection recovery.
Confidential Information of Huawei. No Spreading Without Permission
P-25
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
In 1+1 protection mode, every working system is protected by a dedicated protection
system. But in 1:N protection mode, N systems share one protection system; and when the
system is in normal operation, the protection system can also transmit extra traffic. Thus a
higher efficiency can be obtained than that of 1+1 system, but a more complicated APS
protocol is needed. This protection mode mainly protects the normal traffic in case optical
cable of the working multiplex section is cut off or multiplex section performance degrades.
Confidential Information of Huawei. No Spreading Without Permission
P-26
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Answer
Linear 1+1 MS
Linear M:N (M=1)
Confidential Information of Huawei. No Spreading Without Permission
P-27
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
In OSN networking application, there is no PP ring. But when we need to create a
protection sub-net when using the NMS T2000.
The protection switching principle of two-fiber bidirectional path protection ring is
basically the same as that of unidirectional path protection ring, except that in two-fiber
bidirectional path protection ring, the route of receiving signals is consistent with that of
sending signals
Two-fiber unidirectional MS dedicated protection ring is composed of two fibers. Working
channels and protection channels are carried over different optical fibers. Of course, fiber
P1 can be used to carry extra traffic when not used for protection. The two-fiber
unidirectional Multiplex Section dedicated protection ring is seldom used in actual
applications since it has no advantages over either the two-fiber unidirectional path
protection ring or two-fiber bidirectional multiplex section shared protection.
Confidential Information of Huawei. No Spreading Without Permission
P-28
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
The orderwires can be passed through used the backboard in the dual slots
When we are facing the sub-rack, the left hand side is the West line board, the right hand
side is the East line board
The W was used for the source node
The E was used for the sink node
Confidential Information of Huawei. No Spreading Without Permission
P-29
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
On each fiber, half the channels are defined as working channels and half are defined as
protection channels. The normal traffic carried on working channels in one fiber are
protected by the protection channels in another fiber traveling in the opposite direction
around the ring. This permits the bidirectional transport of normal traffic. Only one set of
overhead channels is used on each fiber.
Confidential Information of Huawei. No Spreading Without Permission
P-30
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
For example, a STM-16 system shall assign #1--- #8VC4 as the working channels, #9---#16
as the protection channels. One fiber of #9---#16 are to protect #1---#8 of another fiber.
Confidential Information of Huawei. No Spreading Without Permission
P-31
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
For two-fiber bidirectional multiplex section protection rings, as their traffic have uniform
routes and are sent bidirectional, time slots in the ring can be shared by all nodes, so the
total capacity is closely related to the traffic distribution mode and quantity of nodes on
the ring.
Confidential Information of Huawei. No Spreading Without Permission
P-32
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
When a node determines that a switch is required, it sources the appropriate bridge
request in the K-bytes in both directions, i.e. the short path and long path.
The destination node is the node that is adjacent to the source node across the failed span.
When a node that is not the destination nodes receives a higher priority bridge request, it
enters the appropriate pass-through state. In this way, the switching nodes can maintain
direct K-byte communication on the long path. Note that in the case of a bidirectional
failure such as a cable cut, the destination node would have detected the failure itself and
sourced a bridge request in the opposite direction around the ring.
When the destination node receives the bridge request, it performs the bridge and bridges
the channels that were entering the failed span onto the protection channels in the
opposite direction. In addition, for signal fail-ring switches, the node also performs the
switch to protection channels.
Confidential Information of Huawei. No Spreading Without Permission
P-33
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
WTR: wait to restore
Confidential Information of Huawei. No Spreading Without Permission
P-34
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
APS requests are also initiated based on multiplex section and equipment performance
criteria detected by the NE. All the working and protection channels are monitored
regardless of the failure or degradation conditions (i.e. after a switch has been completed,
all appropriate performance monitoring is continued). The NE initiates the following bridge
requests automatically: Signal Failure (SF), Signal Degrade (SD), Reverse Request (RR), and
Wait to Restore (WTR). The bridge requests are transmitted from NE to NE (not from NMS
to NE).
Confidential Information of Huawei. No Spreading Without Permission
P-35
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
The APS controller is responsible for generating and terminating the APS information
carried in the K1K2 bytes and implementing the APS algorithm. With the switching state of
each NE, the APS controller status is also changed.
Confidential Information of Huawei. No Spreading Without Permission
P-36
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
For two-fiber bidirectional multiplex section protection rings, as their traffic have uniform
routes and are sent bidirectional, time slots in the ring can be shared by all nodes, so the
total capacity is closely related to the traffic distribution mode and quantity of nodes on
the ring. The network capacity for two-fiber bidirectional multiplex section ring is
*M*STM-N (M is the number of nodes on the ring, STM-N is the STM level). If we count
the protection channels as well, the maximum traffic load that a two-fiber bidirectional MS
shared protection ring can carry is M*STM-N. Nevertheless, half of the traffic would not be
protected in case of fiber failures.
Confidential Information of Huawei. No Spreading Without Permission
P-37
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Four-fiber MS shared protection rings require four fibers for each span of the ring.
Working and protection channels are carried over different fibers: two multiplex sections
transmitting in opposite directions carry the working channels while two multiplex sections,
also transmitting in opposite directions, carry the protection channels. This permits the
bidirectional transport of normal traffic. The multiplex section overhead is dedicated to
either working or protection channels since working and protection channels are not
transported over the same fibers.
Confidential Information of Huawei. No Spreading Without Permission
P-38
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
In the normal situation, the services will be transmitted on the working fibers
Confidential Information of Huawei. No Spreading Without Permission
P-39
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
When the fibers between two nodes broken, the switching will happen between these
two nodes
In the other sections, the services will be transmit on the original routes
Confidential Information of Huawei. No Spreading Without Permission
P-40
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
When all the fibers between two NEs broken, the ring switch happens
All the services will go to the protection fibers
Confidential Information of Huawei. No Spreading Without Permission
P-41
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
APS requests are also initiated based on multiplex section and equipment performance
criteria detected by the NE. All the working and protection channels are monitored
regardless of the failure or degradation conditions (i.e. after a switch has been completed,
all appropriate performance monitoring is continued). The NE initiates the following bridge
requests automatically: Signal Failure (SF), Signal Degrade (SD), Reverse Request (RR), and
Wait to Restore (WTR). The bridge requests are transmitted from NE to NE (not from NMS
to NE).
Confidential Information of Huawei. No Spreading Without Permission
P-42
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Confidential Information of Huawei. No Spreading Without Permission
P-43
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
For four-fiber bidirectional multiplex section protection rings, as their traffic have uniform
routes and are sent bidirectional, time slots in the ring can be shared by all nodes, so the
total capacity is closely related to the traffic distribution mode and quantity of nodes on
the ring. The network capacity for four-fiber bidirectional multiplex section ring is M*STM-
N (M is the number of nodes on the ring; STM-N is the STM level). If we count the
protection channels as well, the maximum traffic load that a four-fiber bidirectional MS
shared protection ring can carry is 2*M*STM-N. Nevertheless, half of the traffic would not
be protected in case of fiber failures.
Confidential Information of Huawei. No Spreading Without Permission
P-44
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
K1 bits 1-4 carry bridge request codes. K1 bits 5-8 carry the destination node ID for the
bridge request code indicated in K1 bits 1-4.
Confidential Information of Huawei. No Spreading Without Permission
P-45
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
As network structures are becoming more and more complicated, the sub-network
connection protection (SNCP) is the only traffic protection mode that can be adapted to
various network topological structures with a fast switching time.
The protection mechanism of SNCP is similar to the PP ring. But for SNCP, the protection
function will be completed in the cross-connect unit not PDH unit.
Confidential Information of Huawei. No Spreading Without Permission
P-46
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
As shown in the figure , SNCP uses the 1+1 protection mode. Traffics are simultaneously
sent on both the working and protection sub-network connection. When the working sub-
network connection fails, or when its performance deteriorates to a certain level, at the
receiving end of the sub-network connection, the signal from the protection sub-network
connection is selected according to the preference selection rule. Switching usually takes
the unidirectional switching mode, thus it needs no APS protocol.
Confidential Information of Huawei. No Spreading Without Permission
P-47
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Confidential Information of Huawei. No Spreading Without Permission
P-48
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
The protection mechanism of SNCP ring is concurrent sending in the transmitting end and
selective receiving in the receiving end.
Here is a ring chain combination network with 5 nodes. The ring network is SNCP ring.
Suppose that there have E1 services from node A to the end node of the chain. The
services will concurrently sent to both working SNC and protection SNC. After passing
through subnetwork1 and subnetwork2 separately, they both reach node C. there is a
selector in node C, the SNC termination node. Normally, node C will receive the service
from the working SNC, then pass through to the line unit in the chain.
Confidential Information of Huawei. No Spreading Without Permission
P-49
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
TU-LOM (HP-LOM): tributary unit loss of multi-frame, a consecutive of 2-10 frames of H4
are not in the order of the multi-frame or have invalid H4 values.
TU-LOP: tributary unit loss of pointer, a consecutive of 8 frames receives invalid pointers or
NDF.
HP-TIM: higher order path trace identifier mismatch, what J1 should receive is not
consistent with it actually receives, generating this alarm in this terminal.
HP-SLM: higher order path signal label mismatch, what C2 should receive is not consistent
with it actually receives, generating this alarm in this terminal.
Confidential Information of Huawei. No Spreading Without Permission
P-50
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
If the signal failure recovers in any way, node C would switch back to receive services from
working SNC after 10 minutes.
10 minutes is the default restoration time. It can be set from 5 to 12 minutes.
Confidential Information of Huawei. No Spreading Without Permission
P-51
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Confidential Information of Huawei. No Spreading Without Permission
P-52
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Confidential Information of Huawei. No Spreading Without Permission
P-53
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Confidential Information of Huawei. No Spreading Without Permission
P-54
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Confidential Information of Huawei. No Spreading Without Permission
P-55
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OptiX SDH Networking and Self-Healing Protection
Confidential Information of Huawei. No Spreading Without Permission
P-56
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
Confidential Information of Huawei. No Spreading without Permission
ii
Ethernet Configuration Practice Guide
ISSUE 1.00
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
iii
Table of Contents
Course Instruction ........................................................................................................................ 1 About this course .........................................................................................................................1 Course objectives ........................................................................................................................1 Learning Notes .............................................................................................................................1 Relevant Materials .......................................................................................................................1
Chapter 1 EPL Service Configuration using Station by Station Method ...................................... 2 1.1 Laboratory Network Topology Introduction ............................................................................2 1.2 Service Requirement .............................................................................................................3 1.3 Parameters Description .........................................................................................................3 1.4 Configuration Procedure ........................................................................................................5 1.5 Test Service Configuration ................................................................................................. 19
Chapter 2 EVPL Service Configuration using Station by Station Method (PORT-Shared) ....... 20 2.1 Laboratory Network Topology Introduction ......................................................................... 20 2.2 Service Requirements ........................................................................................................ 21 2.3 Parameters Description ...................................................................................................... 21 2.4 Configuration Procedure ..................................................................................................... 25 2.5 Test Service Configuration ................................................................................................. 48
Chapter 3 EVPL Service Configuration using Station by Station Method (VCTRUNK Shared)50 3.1 Laboratory Network Topology Introduction ......................................................................... 50 3.2 Service Requirements ........................................................................................................ 51 3.3 Parameters Description ...................................................................................................... 51 3.4 Configuration Procedure ..................................................................................................... 54 3.5 Test Service Configuration ................................................................................................. 67
Chapter 4 EPLAN Service Configuration using Station by Station Method ............................... 70 4.1 Laboratory Network Topology Introduction ......................................................................... 70 4.2 Service Requirement .......................................................................................................... 71 4.3 Parameters Description ...................................................................................................... 71 4.4 Configuration Procedure ..................................................................................................... 74 4.5Test Service Configuration .................................................................................................. 94
Chapter 5 EVPLAN Service Configuration using Station by Station Method ............................ 97 5.1 Laboratory Network Topology Introduction ......................................................................... 97 5.2 Service Requirement .......................................................................................................... 98 5.3 Parameters Description ...................................................................................................... 98 5.4 Configuration Procedure ................................................................................................... 103 5.5 Test Service Configuration ............................................................................................... 131
Chapter 6 EPL Configuration by Trail Method ......................................................................... 134 6.1 Laboratory Network Topology Introduction ....................................................................... 134 6.2 Service Requirement ........................................................................................................ 135 6.3 Parameters Description .................................................................................................... 135 6.4 Configuration Procedure ................................................................................................... 137
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
Confidential Information of Huawei. No Spreading without Permission
iv
6.5 Test Service Configuration ............................................................................................... 144
Chapter 7 EVPL Configuration by Trail Method (VCTRUNK Shared) ..................................... 145 7.1 Laboratory Network Topology Introduction ....................................................................... 145 7.2 Service Requirements ...................................................................................................... 146 7.3 Parameters Description .................................................................................................... 146 7.4 Configuration Procedure ................................................................................................... 149 7.5 Test Service Configuration ............................................................................................... 158
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
1
Course Instruction
About this course
This course is applicable to Huawei OptiX OSN 3500 product;
This course is mainly used for OptiX OSN 3500 Transmission Network Academy Certification Training purpose.
Course objectives
Upon completion of this course, you will be able to:
To get familiarize with the hardware device through the basic equipment configuration operation;
To get familiarize with the theory of Ethernet Service through different Ethernet service configuration;
To get familiarize with U2000 station by station configuration method for EPL, EVPL, EPLAN and EVPLAN;
To get familiarize with U2000 trail configuration method for EPL and EVPL.
Learning Notes
According to lab equipment availability, this lab experiment will be carried out in group rotation. You should be well prepared before the lab experiment in order to save time. There will be 5 sets of OptiX OSN 3500 and 1 set U2000 NMS computer. For the ID of each NE, please refer to the actual NE ID allocation.
Before doing any service configuration for this practice guide, you should be familiar with the basic operation of U2000 and PDH service configuration.
Relevant Materials
OptiX OSN 3500 product documentation
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
2
Chapter 1 EPL Service Configuration using Station by Station Method
1.1 Laboratory Network Topology Introduction
The network topology diagram is as follows, the network elements (NEs) consist of 5 OptiX OSN 3500. The basic topology is form from a four NEs two-fiber bidirectional multiplex section protection ring with a non-protection chain. Pair slot of slot #7 and #12 is used in each NE in the ring network; slot #7 is connected to slot #12 in the next NE. A non-protection chain is form from NE A slot #6 connected to NE E slot #12. The GNE and board slot number can be changed according to the actual situation during the configuration. One N2EFS4 board is configured in every NE and the actual slot number for each board is shown as follows. The slot number can be flexibly adjusted according to actual configuration situation.
Network Elements Ethernet board slot number
NE A #5
NE B #5
NE C #5
NE D #5
NE E #5
Mo
re
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
3
1.2 Service Requirement
Service requirement descriptionCompany H has two branches located at NE A and NE C needed an Ethernet service communication with 6Mbits/s bandwidth.
1.3 Parameters Description
EPL service of company H
SDH service link time slot number 1 to 3 of VC-12 in VC-4 #1 VC4-1:VC12:1-3is used for NE A and NE C, while service in NE B is configures as pass-through.
Time slot 1 to 3 of VC-12 in VC-4 #4 of N2EFS4 board in slot number 4 VC4-4:VC12:1-3 of NE A and NE C is used.
Parameters of external ports on the Ethernet board:
Parameter NE A NE C
Board N2EFS4 N2EFS4
Port PORT1 PORT1
Enabled/Disabled Enable Enable
Entry Detection Enable Enable
TAG Access Access
Default VLAN ID 100 100
Port Type PE PE
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
4
Parameters of internal ports on the Ethernet boards:
Parameter NE A NE C
Board N2EFS4 N2EFS4
Internal Port VCTRUNK1 VCTRUNK1
Bound Path VC4-4:VC12-1VC12-3 VC4-4:VC12-1VC12-3
Entry Detection Enable Enable
TAG Tag Aware Tag Aware
Port Type PE PE
Parameters of the EPL serviceSame parameters on A and C:
Parameters EPL service of Company H
Board N2EFS4
Service Type EPL
Service Direction Bidirectional
Source Port PORT1
Source C-VLAN
(e.g. 1,3-6)
Null
Sink Port VCRTUNK1
Sink C-VLAN (e.g. 1,3-6) Null
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
5
1.4 Configuration Procedure
Configuration at NE A Step 1 Configure Ethernet Port Parameters:
1 Login to U2000 Main Topology.
2 Right click on NE A to select NE Explorer.
3 Select N2EFS4 board from the Board List.
Mo
re
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
6
4 From the Function Tree select Configuration> Ethernet Interface Management> Ethernet Interface.
5Select External Port.
6The diagram below shows the 4 external port of the Ethernet board, all the ports are disabled by default. Port 1 need to be enabled manually by double-click on the Enabled/Disabled tab for Port 1 and select Enabled as shown below.
After selecting, click the Apply button at the right bottom of the panel.
7Next, click on the TAG Attributes tab.
8At the TAG column, double-click and select Access for Port 1 follow by changing the Default VLAN ID to 100. After done selecting,
remember to click on the Apply button at the bottom right of the panel to activate the changes.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
7
Step 2 Configure Ethernet Line Service:
1At the Function Tree, select Configuration> Ethernet Service> Ethernet Line Service.
2As shown on the diagram below, at this moment there is not any service at this board. Click on the New button to create a new Ethernet Line service.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
8
3As shown in the diagram below is the Create Ethernet service configuration panel. Select PORT1 at the Source Port and VCTRUNK1 as the sink port. No changes are needed for the rest of the option as shown below.
4At this moment, the Bound Path panel is empty. We need to configure a bound path for the VCTRUNK1. Click the Configuration button, and the below diagram will be shown. Click on the >> button to
bound the timeslot needed to VCTRUNK1. At this time, we click 3 times on the >> button, as we have assigned 3 timeslots at the beginning of
the configuration which is VC4-4:VC12:1~3; total of 3 VC12s. Make sure the correct timeslot is bounded then click on the OK button at the bottom right of the panel and return to the Create Ethernet Line configuration panel.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
9
5Make sure the Ethernet Line configuration is configured correctly and click the OK button.
6System prompt will show that the configuration is successful. Confirm and close the system prompt dialog box.
7Finally the Ethernet Line service has been successfully created and the Ethernet service will be displayed in the Ethernet Line panel.
Step 3 Configure SDH service:
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
10
1To configure a SDH service is to create a cross-connection between the Ethernet board and Line board. Select NE A at the NE explorer.
2 At the Function Tree, select Configuration> SDH Service Configuration.
3There should not have any service created yet at the SDH Service Configuration panel. Click on the Create button to create a new SDH
service.
Mo
re
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
11
4At the Create SDH service panel, select the correct information from the options. (In this case, VC4-4 is selected for N2EFS4 board because only VC4-4 can support for VC-12 level virtual concatenation). After obtaining display as shown below, (The Source Slot and the Sink Slot position have to be the same as the actual board slot number), click OK.
5At this moment, the system will show a newly created SDH service on the panel, the necessary configuration at NE A station is done, you can now close the NE explorer of NE A.
Mo
re
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
12
Configuration at NE B At station NE B, there is no add/drop of Ethernet service, therefore station NE B only need to create a pass-through SDH service. Configuration service steps is the same as previous, therefore only final result of the configured service is shown at diagram below.
Configuration at NE C Step 1 Configure Ethernet Port Parameters:
1Login to U2000 Main Topology.
2Right click on NE C to select NE Explorer.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
13
3Select N2EFS4 board from the Board List.
4From the Function Tree select Configuration> Ethernet Interface Management> Ethernet Interface.
5Select External Port.
6The diagram below shows the 4 external port of the Ethernet board, all the ports are disabled by default. Port 1 need to be enabled manually by double-click on the Enabled/Disabled tab for Port 1 and select Enabled as shown below.
After selecting, click the Apply button at the right bottom of the panel.
7Next, click on the TAG Attributes tab.
8At the TAG column, double-click and select Access for Port 1 follow by changing the Default VLAN ID to 100. After done selecting,
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
14
remember to click on the Apply button at the bottom right of the panel to activate the changes.
Step 2 Configure Ethernet Line service :
1At the Function Tree, select Configuration> Ethernet Service> Ethernet Line Service.
2As shown in the diagram below is the Create Ethernet service configuration panel. Select PORT1 at the Source Port and VCTRUNK1 as the sink port. No changes are needed the options as
shown below.
3At this moment, the Bound Path panel is empty. We need to configure a bound path for the VCTRUNK1. Click the Configure button,
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
15
and the below diagram will be shown. Click on the >> button to bound
the timeslot needed to VCTRUNK1. At this time, we click 3 times on the >> button, as we have assigned 3 timeslots at the beginning of the configuration which is VC4-4:VC12:1~3; total of 3 VC12s. Make sure the correct timeslot is bounded then click on the OK button at the bottom
right of the panel and return to the Create Ethernet Line configuration panel .
5Make sure the Ethernet Line configuration is configured correctly and click the OK button.
Mo
re
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
16
6System prompt will show that the configuration is successful. Confirm and close the system prompt dialog box.
7Finally the Ethernet Line service has been successfully created and the Ethernet service will be displayed in the Ethernet Line panel .
Step 3 Configure SDH service:
1To configure a SDH service is to create a cross-connection between the Ethernet board and Line board. Select NE C at the NE Explorer.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
17
2 At the Function Tree, select Configuration> SDH Service Configuration.
3There should not have any service created yet at the SDH Service Configuration panel. Click on the Create button to create a new SDH
service.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
18
4At the Create SDH service panel, select the correct information from the options. (In this case, VC4-4 is selected for N2EFS4 board because only VC4-4 can support for VC-12 level virtual concatenation). After obtaining display as shown below, (The Source Slot and the Sink Slot position have to be the same as the actual board slot number), click OK.
5At this moment, the system will show a newly created SDH service on the panel, all the necessary configuration at NE C station is done, you can now close the NE explorer of NE C.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
19
1.5 Test Service Configuration
When all the configuration has been completed, the configurations have to be tested to make sure it works.
In order for us to test, two PCs are needed. Each PC is connected to port 1 of NE A and NE C. In the command prompt, use the ping command to test whether the services are configured successfully.
PCs with IP addresses of 188.20.7.100 and 188.20.7.101 were used for the ping test in this case. The results below show the EPL service is working normally.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
20
Chapter 2 EVPL Service Configuration using Station by Station Method (PORT-Shared)
2.1 Laboratory Network Topology Introduction
The network topology diagram is as follows, the network elements (NEs) consist of 5 OptiX OSN 3500.
The basic topology is form from a four NEs two-fiber bidirectional multiplex section protection ring with a non-protection chain. Pair slot of slot #7 and #12 is used in each NE in the ring network; slot #7 is connected to slot #12 in the next NE. A non-protection chain is form from NE A slot #6 connected to NE E slot #12.
One N2EFS4 board is configured in every NE and the actual slot number for each board is shown as follows. The slot number can be flexibly adjusted according to actual configuration situation.
Network Elements Ethernet board slot number
NE A #5
NE B #5
NE C #5
NE D #5
NE E #5
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
21
2.2 Service Requirements
The headquarters of company H; H1 is located to NE A, while there are two branches which are H2 and H3 are located to NE B and NE D each. Both branches needed to have Ethernet communication with the headquarters and a bandwidth of 2Mbits/s is needed each.
2.3 Parameters Description
The network planning is shown below:
1. EVPL service between company H headquarters, H1 and branch H2;
2. EVPL service between company H headquarters, H1 and branch H3;
EVPL service between company H headquarters, H1 and branch H2:
Use VC-12 timeslot number 4 of VC4 number 1 for SDH link between NE A and NE BVC4-1:VC12:4.
Use VC-12 timeslot number 4 of VC4 number 4VC4-4:VC12:4 of N2EFS4 board for NE A and VC-12 timeslot number 1 of VC4 number 4 VC4-4:VC12:1of N2EFS4 board for NE B to add drop services.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
22
Parameters of external Ethernet ports on the Ethernet boards:
Parameters NE A NE B
Board N2EFS4 N2EFS4
Port PORT2 PORT1
Enabled/Disabled Enabled Enabled
Entry Detection Enabled Disabled
TAG Tag Aware Tag Aware
Default VLAN ID
Port Type PE PE
Parameters of internal ports on the Ethernet boards:
Parameters NE A NE B
Board N2EFS4 N2EFS4
Internal Port VCTRUNK2 VCTRUNK2
Bound Path VC4-4:VC12-4 VC4-4:VC12-1
Entry Detection Enabled Disabled
TAG Access Tag Aware
Default VLAN ID 100
Port Type PE PE
EPL Service Parameters (NE A station parameters):
Parameters EPL service of company H
Board N2EFS4
Service Type EPL
Service Direction Bidirectional
Source Port PORT2
Source Port C-VLAN(e.g.1,3-6)
100
Sink Port VCRTUNK2
Sink C-VLAN(e.g. 1,3-6) 100
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
23
EPL Service Parameters (NE B station parameters):
Parameters EPL service of company H
Board N2EFS4
Service Type EPL
Service Direction Bidirectional
Source Port PORT1
Source Port C-VLAN(e.g.1,3-6)
100
Sink Port VCRTUNK2
Sink C-VLAN(e.g. 1,3-6) 100
EVPL service between company H headquarters, H1 and branch H3:
Use VC-12 timeslot number 1 of VC4 number 1 for SDH link between NE A and NE DVC4-1:VC12:1.
Use VC-12 timeslot number 5 of VC4 number 4VC4-4:VC12:5 of N2EFS4 board for NE A and VC-12 timeslot number 1 of VC4 number 4 VC4-4:VC12:1of N2EFS4 board for NE D to add drop services.
Parameters of external Ethernet ports on the Ethernet boards:
Parameters NE A NE D
Board N2EFS4 N2EFS4
Port PORT2 PORT1
Enabled/Disabled Enabled Enabled
Entry Detection Enabled Disabled
TAG Tag Aware Tag Aware
Default VLAN ID
Port Type PE PE
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
24
Parameters of internal ports on the Ethernet boards:
Parameters NE A NE D
Board N2EFS4 N2EFS4
Internal Port VCTRUNK3 VCTRUNK1
Bound Path VC4-4:VC12-5 VC4-4:VC12-1
Entry Detection Enabled Disabled
TAG Access Tag Aware
Default VLAN ID 200
Port Type PE PE
EPL Service Parameters (NE A station parameters):
Parameters EPL service of company H
Board N2EFS4
Service Type EPL
Service Direction Bidirectional
Source Port PORT2
Source C-VLAN(e.g. 1,3-6) 200
Sink Port VCRTUNK3
Sink C-VLAN(e.g. 1,3-6) 200
EPL Service Parameters (NE D station parameters):
Parameters EPL service of company H
Board N2EFS4
Service Type EPL
Service Direction Bidirectional
Source Port PORT1
Port C-VLAN(e.g. 1,3-6) 200
Sink Port VCRTUNK3
Sink C-VLAN(e.g. 1,3-6) 200
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
25
2.4 Configuration Procedure
Configuration at NE A Step 1 Configure Ethernet Port Parameters:
1 Login to U2000 Main Topology.
2 Right click on NE A to select NE Explorer.
3Select N2EFS4 board from the Board List.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
26
4From the Function Tree select Configuration> Ethernet Interface Management> Ethernet Interface.
5select External Port.
6The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 2 needs to be enabled
manually by double-click on the Enabled/Disabled tab for Port 2 and
select Enabled as shown below.
After selecting, click the Apply button at the right bottom of the panel.
7Select Internal Port. Change TAG Attributes of VCTRUNK1 and VCTRUNK2 to Access with VLAN ID of 100 and 200 respectively.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
27
Step 2 Configure Ethernet Line Service:
1At the Function Tree, select Configuration> Ethernet Service>
Ethernet Line Service.
2As shown on the diagram below, there is an existing EPL service which is created in Chapter 1. As for now, click New to create a new
EVPL service between NE A and NE B.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
28
3In the Create Ethernet Service configuration panel, select PORT2 as Source Port , VCTRUNK2 as Sink Port and type in 100 for the
Source VLAN and Sink VLAN as shown below.
4At this moment, the Bound Path panel is empty. To configure a bound path to VCTRUNK2, click Configure button. At the Bound Path
panel, select VCTRUNK2 and click >> button. Click the OK button at the bottom right of the panel and return to the Create Ethernet Line configuration panel.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
29
5Make sure the Ethernet Line configuration is configured correctly and click the OK button.
6System prompt will show that the configuration is successful. Confirm and close the system prompt dialog box.
7Finally the Ethernet Line service has been successfully created and the Ethernet service will be displayed in the Ethernet Line panel.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
30
8After configuring the EVPL service between NE A and NE B, now we have to configure EVPL service between NE A and NE D with VLAN ID 200 by clicking New and select the options as shown below.
9Click Configure , select VCTRUNK3 and bound VC12-5 by clicking >> button. Click OK when done.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
31
10Make sure the Ethernet Line configuration is configured correctly and click the OK button.
11The Ethernet Line service has been successfully created and you will see 3 EPL Ethernet service in the Ethernet Line panel.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
32
Step 3 Configure SDH service:
1To configure a SDH service is to create a cross-connection between the Ethernet board and Line board. Select NE A at the NE explorer.
2 At the Function Tree, select Configuration> SDH Service
Configuration.
3There is an existing SDH service from the configuration in Chapter 1, Click on the Create button to create another new SDH service.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
33
4At the Create SDH service panel, select the correct information from
the options for NE A. (In this case, VC4-4 is selected for N2EFS4 board
because only VC4-4 can support for VC-12 level virtual concatenation).
After obtaining display as shown below, (The Source Slot and the
Sink Slot position have to be the same as the actual board slot
number), click OK.
5Then, configure SDH service for Ne D as shown below and click OK.
6The SDH service created will be displayed as shown below.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
34
Configuration at NE B Step 1 Configure Ethernet Port Parameters:
1Login to U2000 Main Topology.
2Right click on NE B to select NE Explorer.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
35
3Select N2EFS4 board from the Board List.
4From the Function Tree select Configuration> Ethernet Interface Management> Ethernet Interface.
5select External Port.
6The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 1 need to be enabled manually
by double-click on the Enabled/Disabled tab for Port 1 and select
Enabled as shown below.
After selecting, click the Apply button at the right bottom of the panel.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
36
7Next, click on the TAG Attributes tab. At the TAG column, double-click and select Access for Port 1 follow by changing the Default VLAN ID to 100. After done selecting, remember to click on the
Apply button at the bottom right of the panel to activate the changes.
8Select Internal Ports and change the Entry Detection of VCTRUNK 2 to Disabled.
Step 2 Configure Ethernet Line Service:
1At the Function Tree, select Configuration> Ethernet Service> Ethernet Line Service.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
37
2Click New, select PORT 1 as the Source Port and VCTRUNK2 as the sink port. Fill in 100 for both Source VLAN and Sink VLAN.
3Click Configure and click on >> button to bound VC12-1 into VCTRUNK1 and click OK.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
38
4 After verifying the Bound Path at the Create Ethernet Service configuration, click OK.
6System prompt will show that the configuration is successful. Confirm and close the system prompt dialog box.
Step 3 Configure SDH service:
1To configure a SDH service is to create a cross-connection between the Ethernet board and Line board. Select NE B at the NE explorer.
2 At the Function Tree, select Configuration> SDH Service
Configuration.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
39
3 To create a new SDH service, click on the Create button.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
40
4At the Create SDH service panel, select the correct information from
the options for NE B. (In this case, VC4-4 is selected for N2EFS4 board
because only VC4-4 can support for VC-12 level virtual concatenation).
After obtaining display as shown below, (The Source Slot and the
Sink Slot position have to be the same as the actual board slot
number), click OK.
5The SDH service has been successfully created and the SDH service
is shown as below in the panel.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
41
Configuration at NE D Step 1 Configure Ethernet Port Parameters:
1Login to U2000 Main Topology.
2Right click on NE D to select NE Explorer.
3Select N2EFS4 board from the Board List.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
42
4From the Function Tree select Configuration> Ethernet Interface Management> Ethernet Interface.
5select External Port.
6The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 1 need to be enabled manually
by double-click on the Enabled/Disabled tab for Port 1 and select
Enabled as shown below.
After selecting, click the Apply button at the right bottom of the panel.
7Next, click on the TAG Attributes tab. At the Entry Detection column, change the Entry Detection of Port 1 to Disabled.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
43
8Select Internal Ports and change VCTRUNK3 Entry Detection to Disabled.
Step 2 Configure Ethernet Line Service:
1At the Function Tree, select Configuration> Ethernet Service> Ethernet Line Service.
2Click New, select PORT 1 as the Source Port and VCTRUNK3 as the sink port. Fill in 200 for both Source VLAN and Sink VLAN.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
44
3Click the Configure button and select VCTRUNK3. Click on >> button to bound VC12-1 into VCTRUNK3 and click OK.
4After verifying the Bound Path at the Create Ethernet Service configuration, click OK.
5System prompt will show that the configuration is successful. Confirm and close the system prompt dialog box.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
45
Step 3 Configure SDH service:
1To configure a SDH service is to create a cross-connection between
the Ethernet board and Line board. Select NE D at the NE explorer.
2 At the Function Tree, select Configuration> SDH Service
Configuration.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
46
3To create a new SDH service, click on the Create button.
4At the Create SDH service panel, select the correct information from
the options for NE D. (In this case, VC4-4 is selected for N2EFS4 board
because only VC4-4 can support for VC-12 level virtual concatenation).
After obtaining display as shown below, (The Source Slot and the
Sink Slot position have to be the same as the actual board slot
number), click OK.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
47
5The SDH service has been successfully created and the SDH service
is shown as below in the panel.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
48
2.5 Test Service Configuration
When all the configuration has been completed, the configurations have to be tested to make sure it works. First, you must make sure the Tag Attributes of the external port of NE A is configured as Access (PCs cannot ping each other when the ports are in Tag Aware mode as PCs do not have VLAN IDs.
Test Ethernet Service between NE A and NE B: Two PCs are needed to test the connectivity, connect two PCs to port 2 of Ethernet board in NE A and port 1 of Ethernet board in NE B each.
PCs with IP addresses of 188.20.7.100 and 188.20.7.101 were used for the ping test in this case. The results below show the EPL service is working
normally.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
49
Test Ethernet Service between NE A and NE D: Two PCs are needed to test the connectivity, connect two PCs to port 2 of Ethernet board in NE A and port 1 of Ethernet board in NE D each.
PCs with IP addresses of 188.20.7.100 and 188.20.7.101 were used for the ping test in this case. The results below show the EPL service is working normally.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
50
Chapter 3 EVPL Service Configuration using Station by Station Method (VCTRUNK Shared)
3.1 Laboratory Network Topology Introduction
The network topology diagram is as follows, the network elements (NEs) consist of 5 OptiX OSN 3500.
The basic topology is form from a four NEs two-fiber bidirectional multiplex section protection ring with a non-protection chain. Pair slot of slot #7 and #12 is used in each NE in the ring network; slot #7 is connected to slot #12 in the next NE. A non-protection chain is form from NE A slot #6 connected to NE E slot #12.
One N2EFS4 board is configured in every NE and the actual slot number for each board is shown as follows. The slot number can be flexibly adjusted according to actual configuration situation.
Network Elements Ethernet board slot number
NE A #5
NE B #5
NE C #5
NE D #5
NE E #5
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
51
3.2 Service Requirements
Branch H1 of company H and branch G1 of Company G are both located at NE A. While branch H2 of company H and branch G2 of company G are both located at NE B. Both companies needed an Ethernet service of bandwidth of 6Mbits/s to communicate with each other.
The services of company H need to be isolated from the services of company G. Traffic of company H and G, however, is complementary in terms of bandwidth.
3.3 Parameters Description
The network planning is shown below:
1. EVPL service for Company H between branch H1 and branch H2;
2. EVPL service for Company G between branch G1 and branch G2;
EVPL service for Company H between branch H1 and branch H2:
Use VC-12 timeslot 1 to 3 of VC-4 number 1 for SDH link between NE A and NE B VC4-1:VC12:1-3
Use VC-12 timeslot number 1 to 3 of VC-4 number4VC4-4:VC12:1-3of N2 EFS4 board for both NE A and NE B.
Parameters of external Ethernet ports on the Ethernet boards:
Parameters NE A NE B
Board N2EFS4 N2EFS4
Port PORT1 PORT1
Enabled/Disabled Enabled Enabled
Entry Detection Enabled Enabled
TAG Access Access
Default VLAN ID 100 100
Port Type PE PE
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
52
Parameters of internal ports on the Ethernet boards:
Parameters NE A NE B
Boards N2EFS4 N2EFS4
Internal Port VCTRUNK1 VCTRUNK1
Bound Path VC4-4:VC12-1~3 VC4-4:VC12-1~3
Entry Detection Enabled Enabled
TAG Tag Aware Tag Aware
Default VLAN ID
Port Type PE PE
EPL Service Parameters (NE A and NE B station parameters):
Parameters EPL service of company H
Board N2EFS4
Service Type EPL
Service Direction Bidirectional
Source Port PORT1
Source Port C-VLAN(e.g.1,3-6)
100
Sink Port VCRTUNK1
Sink C-VLAN
(e.g. 1,3-6)
100
EVPL service for Company G between branch G1 and branch G2:
Use VC-12 timeslot number 4-6 of VC4 number 1 for SDH link between NE A and NE BVC4-1:VC12:4-6.
Use VC-12 timeslot number 4 to 6 of VC-4 number 4VC4-4:VC12:4-6of N2 EFS4 board for both NE A and NE B.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
53
Parameters of external Ethernet ports on the Ethernet boards:
Parameters NE A NE B
Board N2EFS4 N2EFS4
Port PORT2 PORT2
Enabled/Disabled Enabled Enabled
Entry Detection Enabled Enabled
TAG Access Access
Default VLAN ID 200 200
Port Type PE PE
Parameters of internal ports on the Ethernet boards:
Parameters NE A NE B
Board N2EFS4 N2EFS4
Internal Port VCTRUNK1 VCTRUNK1
Bound Path VC4-4:VC12-1~3 VC4-4:VC12-1~3
Entry Detection Enabled Enabled
TAG Tag Aware Tag Aware
Default VLAN ID
Port Type PE PE
EPL Service Parameters (NE A and NE B station parameters):
Parameters EPL service of company G
Board N2EFS4
Service Type EPL
Service Direction Bidirectional
Source Port PORT2
Source Port C-VLAN(e.g.1,3-6)
200
Sink Port VCTRUNK1
Sink C-VLAN
(e.g. 1,3-6)
200 Mo
re
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
54
3.4 Configuration Procedure
Configuration at NE A Step 1 Configure Ethernet Port Parameters:
1Login to U2000 Main Topology.
2 Right click on NE A to select NE Explorer.
3Select N2EFS4 board from the Board List.
4From the Function Tree select Configuration> Ethernet Interface Management> Ethernet Interface.
5 select External Port.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
55
6The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 1 and Port 2 needs to be
enabled manually by double-click on the Enabled/Disabled tab for Port
1 and 2 and select Enabled as shown below.
After selecting, click the Apply button at the right bottom of the panel.
7Click on the TAG Attributes tab, change the TAG to Access for Port 1 and Port 2 follow by changing the Default VLAN ID to 100 for Port 1
and VLAN ID to 200 for Port 2. Click Apply button to activate
changes.
Step 2 Configure Ethernet Line Service:
1At the Function Tree, select Configuration> Ethernet Service> Ethernet Line Service.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
56
2On the panel, select New button to create new EVPL service between NE A and NE B for company H. In the Create Ethernet Service configuration panel, select PORT 1 as Source Port, VCTRUNK1 as Sink Port and type in 100 for the Source VLAN and Sink VLAN as shown below.
3At this moment, the Bound Path panel is empty. To configure a bound path to VCTRUNK1, click Configure button follow by >> button
for 3 times to bound VC12-1 to 3. Click the OK button at the bottom right of the panel and return to the Create Ethernet Line configuration panel.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
57
4Make sure the Ethernet Line configuration is configured correctly and click the OK button.
5System prompt will show that the configuration is successful. Confirm and close the system prompt dialog box.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
58
7Now, configure EVPL service for company G. Click New button and select PORT2 as Source Port , VCTRUNK1 as Sink Port and type in 200 for the Source VLAN and Sink VLAN as shown below.
8Finally the Ethernet Line service has been successfully created and the Ethernet service for both company H and G will be displayed in the Ethernet Line panel.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
59
Step 3 Configure SDH service:
1To configure a SDH service is to create a cross-connection between the Ethernet board and Line board. Select NE A at the NE explorer.
2 At the Function Tree, select Configuration> SDH Service
Configuration.
3At the SDH Service Configuration panel, click New to create
cross-connection service for company H and G.
More
Learning
Resources:
http://l
earning.h
uawei.c
om/e
n
-
OHCNATS11 Ethernet Configuration Practice Guide
Confidential Information of Huawei. No Spreading without Permission
60
4At the Create SDH service panel, select the correct information from
the options for NE A as shown below. (In this case, VC4-4 is selected for
N2EFS4 board because only VC4-4 can support for VC-12 level virtual
concatenation). Click OK . (The Source Slot and the Sink Slot
position have to be the same as the actual board slot number).
5The SDH service created will be displayed as shown below.
Mo
re
Learn