MODULE 4-NIB II Project 2.2 PDF
MODULE 4-NIB II Project 2.2 PDF
BSNL
ES & IT FACULTY
COURSE CODE – BRBCOIF114
1
JTO PH-II ―DATA NETWORK‖
INDEX
BRBRAITT : Jun-2011 2
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 3
JTO PH-II ―DATA NETWORK‖
OVERVIEW OF NIB-II
General
BSNL has planned to setup NIB-II to provide world class infrastructure to offer
various value added services to a broader customer base county-wide that will help to
accelerate the Internet revolution in India. Moreover the NIB-II will create a platform,
which enables e-governance, e-banking, e-learning, etc. with the key point of Service
Level Agreements & Guarantee in tune with Global standards and customer
expectations.
NIB-II has been grouped into following three major projects.
Project 1: - MPLS based IP Network infrastructure covering 71 cities along
with associated NMS, PMS, Firewall and Caching platforms.
Project 2.1: Access Gateway platform using Dialup comprising of narrow
band RAS and DSL equipment.
Project 2.2: Access Gateway platform comprising of Broadband RAS and
DSL equipment.
Project 3: Messaging and Storage platform and Provisioning, Billing and
Customer care and Enterprise management system.
The network shall seamlessly integrate with the already existing network
infrastructure comprising of the TCP/IP based NIB-I and MPLS VPN network. The
NIB-II project comprises of Technology solutions from different product
manufacturers with the provision for future expansion.
Services planned through Project 2.2
Primary source of Internet bandwidth for retail users for application such as
Web browsing, e-commerce etc
Multicast video services, video on demand etc through Broadband Remote
Access Server (BRAS).
Allow wholesale BRAS ports to be assigned to smaller ISPs through the
franchises model wherein the later has a separate network of DSLAMs, AAA,
LDAP through a revenue scheme of BSNL.
Dialup VPN (VPDN) user connects to NIB-II through the Narrow band RAS
and is connected to its private network through a secure L2TP tunnel
established between Narrowband RAS and Broadband RAS.
Support for both prepaid and postpaid Broadband services.
BRBRAITT : Jun-2011 4
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 5
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 6
JTO PH-II ―DATA NETWORK‖
BRAS: called as Broadband Remote Access Server. It is the first intelligent device in
the whole chain. It terminates the customer session, authenticates, allots IP addresses
and keeps track of user session for billing along with RADIUS.
SSSS: It is called as Subscriber Service Selection System. When customer logs in he
will be welcomed with this customized screen from where he can select various range
of services. This provides on-demand service without manual intervention.
RADIUS: This, in conjunction with BRAS, authenticates customer, uploads customer
profile in the SSSS and keeps track of billing.
LDAP: It stores customer database viz. username, password and the default services
that it can subscribe to.
Provisioning: This is the most critical component for ensuring quick delivery of
service. It ensures end-to-end provisioning of service right from DSL CPEs to
DSLAM to Switch to BRAS to LDAP.
Network Architecture of Project 2.2
All 198 cities will have DSLAMs and Tier2 LAN switches (for aggregation of
DSLAM). All A cities and Noida (Total 23 cities) will have one BRAS, one SSSS and
one Tier 1 LAN switch. There will be no BRAS, SSSS and Tier 1 LAN switch in any
other cities. All DSLAM are initially aggregated using Tier 2 LAN switch, through
one pair of dark fibre. The 240 port DSLAM will have two numbers of FE interfaces.
The FX or GBIC module in DSLAM and LAN switch should be capable of driving up
to 10kms on a single mode fibre. The SX or GBIC module in LAN switch used for
connecting Tier2 to Tier1 will support 40kms distance. In bigger cities like A1, A2,
A3 and A4, one BRAS per city will be deployed initially. There will be no BBRAS at
B1 and B2 cities. The DSLAMs in B1, B2 and other lower hierarchical cities will be
aggregated through Layer 2 switches, and will be connected to the nearest BRAS of A
cities on Ethernet over SDH. The BRAS shall terminate the PPP sessions initiated by
the customer and extend the connection further to MPLS VPN/Internet as desired by
the customer. The DSLAM will in general be colocated with existing PSTN
exchange, which provides last mile access to customers over copper wire up to
average span lengths of 3 kms. All DSLAM will be aggregated through Fast Ethernet
(FE) interface except 480 port DSLAM, which will be aggregated through Gigabit
Ethernet (GigE) interface.
The Salient points of the broadband deployment are
The broadband Services are planned in 198 cities
The cities are categorized under A1 (3 cities), A2 (3 cities), A3 (6 cities), A4
(10 cities), B1 (21 cities), B2 (26 cities) and others (129 cities).
Delhi and Mumbai will not have any broadband equipment under Project 2.2
of NIB-II.
All A cities + NOIDA (Total 23 cities) will have one BRAS, one SSSS and
one Tier 1 LAN Switch.
There will be no BRAS, SSSS and Tier 1 LAN Switch in any other cities.
All 198 cities will have DSLAMs and Tier 2 LAN Switch (for aggregating
DSLAM)
All DSLAMs are initially aggregated using Tier 2 LAN Switch, through one
pair of dark fibre. The DSLAMs and Switch Ethernet Interface are optical,
BRBRAITT : Jun-2011 7
JTO PH-II ―DATA NETWORK‖
single mode at 1550 nm. The maximum distance between DSLAM and LAN
Switch shall not exceed 10 km
DSLAMs of 480 ports, 240 ports, 120 ports, 64 ports, 48 ports and 24 ports
type are planned. While DSLAM of 480 ports will have Gigabit Ethernet
interface, other type of DSLAMs will have Fast Ethernet Interface.
The Tier 2 LAN Switch in A city + NOIDA will be further aggregated at Tier
1 LAN Switch, deployed in the same city, through one pair of dark fibre, on
Gigabit Ethernet optical, single mode Interface at 1550 nm. The maximum
distance between Tier 2 LAN Switch and Tier 1LAN Switch shall not exceed
40 km.
The Tier 2 LAN Switch in B cities and other cities will be connected to the
nearest A city using Fast Ethernet over SDH (FEoSDH). For this
connectivity, the Fast Ethernet interface at Tier 2 LAN Switch in B or other
cities can be either electrical or optical whereas Fast Ethernet interface at
Tier 1 LAN Switch in A cities or Noida shall be optical.
It may be mentioned here that in each B1 and B2 city, two Tier 2 LAN Switch
are planned. Thus, Fast Ethernet over SDH will be originating from two
different places in B cities and getting terminated on the Tier 1 LAN Switch.
So, two STM-1 links are required for each B1 and B2 city.
The Tier 1 LAN Switch in A city and Noida is connected to BRAS on Gigabit
Ethernet (GigE) interface, which in turn is connected to the Core Router of
Project 1 of NIB-II.
The broadband Network will have Network Operation Centre (NOC) with
main NOC at Bangalore and Disaster Recovery (DR) NOC at Pune. In
addition, five Regional POPs (for network management) are also planned.
They are Bangalore, Pune, Kolkatta,Chennai and NOIDA..
BRBRAITT : Jun-2011 8
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 9
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 10
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 11
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 12
JTO PH-II ―DATA NETWORK‖
The service provider converged voice and data network promises to be implemented
as nodes in a neighborhood or remote switches in regional locations.
The Internet, e-mail, web sites, software downloads, file transfers: they are all now
part of the fabric of doing business. But until now, it has not been possible for
businesses to fully take advantage of the benefits that technology can truly deliver.
The reason for this is a simple one - a lack of bandwidth. Even for small businesses,
narrowband dial-up access is no longer sufficient. It simply takes too long to do basic
tasks, like downloading a large file, and is increasingly being recognized as
insufficient and inconvenient.
Kim Maxwell in his book-"Residential Broadband: An Insider's Guide to the Battle
for the Last Mile" has grouped potential residential broadband applications into three
general categories: "professional activities " (activities related to users' employment),
"entertainment activities " (from game playing to movie watching), and "consumer
activities " (all other non-employment and non-entertainment activities). as follows:
Professional Activities:
Telecommuting (access to corporate networks and systems to support working
at home on a regular basis)
Video conferencing (one-to-one or multi-person video telephone calls)
Home-based business (including web serving, e-commerce with customers,
and other financial functions)
Home office (access to corporate networks and e-mail to supplement work at a
primary office location)
Entertainment Activities:
Web surfing (as today, but at higher speeds with more video content)
Video-on-demand (movies and rerun or delayed television shows)
Video games (interactive multi-player games)
BRBRAITT : Jun-2011 13
JTO PH-II ―DATA NETWORK‖
Consumer Activities:
Shopping (as today, but at higher speeds with more video content)
Telemedicine (including remote doctor visits and remote medical analyses by
medical specialists)
Distance learning (including live and pre-recorded educational presentations)
Public services (including voting and electronic town hall meetings)
Information gathering (using the Web for non-entertainment purposes)
Photography (editing, distributing, and displaying of digital photographs)
Video conferencing among friends and family
These applications have different bandwidth requirements, and some of them are still
out of reach today. For example, all of the "professional" activities will likely be
supported with less than 1.0 Mbps of bandwidth. Similarly, web surfing and home
shopping will be supported with less than 1.0 Mbps of bandwidth.
Movies and video, however, demand more bandwidth. Feature length movies can
probably be delivered with 1.5 Mbps of bandwidth, but broadcast quality video will
probably require more— perhaps as much as 6.0 Mbps. Moreover, if high definition
television ("HDTV") is widely accepted as a new broadcast standard, that quality of
video would require almost 20.0 Mbps of bandwidth — much higher than the current
broadband technologies will support. Thus, although the technology is moving toward
flexible, high-quality video-on-demand, the necessary speed is probably still more
than a few years away from becoming a reality.
The Internet is poised to spin off thousands of specialized broadband services. The
access network needs to provide the platform for delivery of these services. Following
are the various applications or services, which are very popular in society and needs
broadband connectivity: -
Virtual Networks
The private virtual networks (LAN/WAN) can be used in an ample variety of
multimedia services, like bank accounts and central offices.
Education by distance
Education will not have any limits to reach from source to destination. Along with the
traditional school a concept of remote leaning center is emerged out and popular for
various courses. There is no limit of distance, area or location in such distance
learning. The student situated in the remote station can intervene directly to his class
with a double system via videoconference, whilst this happens, simultaneously, the
file ex change
BRBRAITT : Jun-2011 14
JTO PH-II ―DATA NETWORK‖
Telework
Organization firm workers that incorporate communication systems via satellite, can
work remotely connecting directly to their head offices Internet by a high speed
connection that permits users to work efficiently and comfortable.
Telemedicine
Doctors situated in different clinics can stay in contact and consult themselves directly
to other regional medical centers, using videoconference and the exchange of high
quality images, giving out test results and any type of information. Also rural zone
can have the opinion of specialists situated in remote hospitals quickly and efficiently.
Electronic commerce
Electronic commerce is a system that permits users to pay goods and services by
Internet. Thanks to this service, any person connected to the network can ad quire
such services with independence from the place that he is situated and during the 24
hours, simply using a portable computer.
Technology options for broadband services
Communication of data with different throughput is feasible by following
technologies: -
Narrow Band
2.4 kbps – 128kbps
Broadband
256kbps – 8000kbps
LAN
1000kbps – 100Mbps / Giga Ethernet Various Access Technologies
are used for the delivery of broadband services.
Broadband communications technology can be divided broadly in to following
categories: -
Wireline Technology
Wireless Technologies
Service providers according to available technology and access provide the broadband
services to customers. The access technologies that are adopted by the services
providers are mainly Optical Fiber Technologies, DSL on copper loop, Cable TV
Network, Satellite Media, cellular and fixed wireless, Terrestrial Wireless etc.
Technology options for broadband services may be classified according to the mode
of access.
BRBRAITT : Jun-2011 15
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 16
JTO PH-II ―DATA NETWORK‖
Satellite is used to service rural areas where population densities are low
Once newer technologies are available in the market, ISDN becomes relatively less
important. Established telephone companies are calculating the economics of
converting the Last Mile of existing networks to all-digital systems. Hong Kong and
Singapore citizens already have broadband access, such as movies on demand,
through their local telecom network. Cable-TV operators, too, are venturing into high-
speed Internet access through modified networks and end-user "cable modems."
Advances in wireless communications means that people starts surfing the net with
cell phones at speeds comparable to or greater than current home access.
Summary
There are tremendous changes in the telecommunication technologies. With the
evolution of Internet telecom world has merged rapidly in computer network.
Broadband Internet connections allow users to download web pages and data many
times faster than conventional 'narrowband' Internet access. Broadband services are
'always-on' - the computer is connected to the Internet continuously. Users pay a flat
rate independent of how long they spend on the Internet or the amount of data
downloaded. Broadband users typically spend four times as long online as
narrowband customers and broadband take-up has been faster than many comparable
technologies, competitiveness. Broadband is needed in the present scenario due to
new technologies and emerging out various types of Data communication
applications.
It is around the Professional activities, Entertainment activities, and Consumer
Activities. These applications have different bandwidth requirements and most of
them need more bandwidth.
Various technologies are available to service providers by which they can extend the
Broadband services to customers. These technologies are mainly classified under two
categories i.e. Wire line and Wireless technologies. Existing infrastructure used to
access telecom services is exploits for broadband as an economical aspects and faster
development. DSL on copper loops, Optical fiber, cable TV are the popular
technologies for Broadband. World has also entered in the field of wireless to provide
the broadband through GSM, CDMA, LMDS, MMDS, WiMax and Wi-Fi.
The public sector will be one of the key drivers of broadband demand. Pooling
requirements from hospitals, schools etc. could permit more cost effective
procurement and stimulate broadband rollout.
BRBRAITT : Jun-2011 17
JTO PH-II ―DATA NETWORK‖
Review Questions
1. What do you understand with the term broadband?
2. What are the factors which are responsible for the evolution of broadband
References
The National Academies Press ―Broadband: Bringing Home the Bits‖
Dutta-Roy, Amitava, "Cable: It's Not Just for TV," IEEE Spectrum, May 1999
FCC Resource Guide: ―Broadband Internet Access‖
http://www.fcc.gov/broadband/
http://www.ncseonline.org
BRBRAITT : Jun-2011 18
JTO PH-II ―DATA NETWORK‖
ADSL TECHNOLOGY
Overview
xDSL Refers collectively to all types of digital subscriber lines, in which the two
main categories: the asymmetric DSL (ADSL) and the symmetric DSL (SDSL).
Other important types of xDSL technologies are High-data-rate DSL (HDSL) and
Very high DSL (VDSL). xDSL is technology backed by telephone companies to
provide next generation high bandwidth services to the home and business using the
existing telephone cooper cabling infrastructure.
xDSL to the home over existing phone lines promises bandwidths up to theoretically
8.448 megabits per second and more, but distance limitations and line quality
conditions can reduce the data rate.
xDSL technologies uses a greater range of frequencies over the telephone cable than
the traditional telephone services have used. This in turn allows for greater bandwidth
with which to send and receive information, enabling for example continuous
transmission of motion video, audio, and even 3-D effects.
xDSL technology has evolved greatly over the past few years, and is still in
development toward achieving even a greater bandwidth as demand rises. Driving
this market is the competition from competing access providers for the consumers
hard earned cash.
History
Traditional phone service (sometimes called POTS for "plain old telephone service")
connects our home or small business to a telephone company office over copper wires
that are wound around each other and called twisted pair. Traditional phone service
was created to let you exchange voice information with other phone users and the type
of signal used for this kind of transmission is called an analog signal. An input device
such as a phone set takes an acoustic signal (which is a natural analog signal) and
converts it into an electrical equivalent in terms of volume (signal amplitude) and
pitch (frequency of wave change). That's why our computer has to have a modem - so
that it can demodulate the analog signal and turn its values into the string of 0 and 1
values that is called digital information.
Because analog transmission only uses a small portion of the available amount of
information that could be transmitted over copper wires, the maximum amount of data
that you can receive using ordinary modems is about 56 Kbps (With ISDN, which one
might think of as a limited precursor to DSL, you can receive up to 128 Kbps)
The ability of our computer to receive information is constrained by the fact that the
telephone company filters information that arrives as digital data, puts it into analog
form for our telephone line, and requires our modem to change it back into digital. In
other words, the analog transmission between our home or business and the phone
company is a bandwidth bottleneck.
BRBRAITT : Jun-2011 19
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 20
JTO PH-II ―DATA NETWORK‖
The Constellation Encoder maps the incoming data into two stream a1..an and b1..bn.
Those streams are then passed to the two filters which are designed so that their
impulse response form a hilbert pair( i.e. one signal is phase-shifted by 90 degree
regarding the other).
CAP splits the data into two bit streams and alters both symbol rate and modulation
levels to change the bit rate, causing modems to be symbol rate adaptive to varying
line condition. The carrier itself is suppressed before transmission (it contains no
information, and can be reconstructed at the receiver), hence the adjective carrierless.
CAP also uses frequency division multiplexing to eliminate the need for echo
cancellation techniques.
Another advantage is the cost element implementing the technology, which is
relatively low.
DMT modulation
The input data is buffered, and each bit is assigned or mapped into one of
N complex (QAM) multi-level sub-channel symbols by the DMT symbol encoder.
Since these are complex numbers, they can be treated as discrete frequency-domain
representation of the signal. using IFFT we can convert it to its time-domain
representation (the receiver will use FFT to convert it back). The resulting time
domain function is then sent serially through the D/A converter and line filter.
DMT upstream and downstream channels overlap; therefore, echo cancellation
techniques are needed. Discrete Wavelet Multitone (DWMT), a developmental
variant of DMT, will provide better subchannel isolation by using a digital wavelet
transform instead of the Fourier transform used in standard DMT.
DMT xDSL transceivers based on the Standard have been proven to provide high-
grade performance in the field, are more reliable, and considered the preferred
Modulation Technique for DSL.
BRBRAITT : Jun-2011 21
JTO PH-II ―DATA NETWORK‖
FMT modulation
FMT ( Filtered MultiTone) is a multicarrier modulation scheme which can be viewed
as a combination of the other two methods. The modulation is achieved by splitting
the data into several streams, each of them applied to one of the inputs of a filter-
bank. Because of implementation complexity, the number of channels is considerably
less than in DMT.
BRBRAITT : Jun-2011 22
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 23
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 24
JTO PH-II ―DATA NETWORK‖
Broadband equipments from M/s Huawei and Utstarcom are implemented in BSNL
core network for broadband services. M/s Huawei supplied BRAS, MA5200G, is
based on the architecture of the advanced fifth-generation router adopts high-
performance Network Processors (NPs) and large-scale Application Specific
Integrated Circuits (ASICs), and features high forwarding performance and flexible
service processing capabilities.
The MA5200G provides powerful user management and service control functions,
including flexible and leading user access technologies, user authentication and
management, security guarantee, user-based and policy-based access control, QoS
guarantee, multicast management, and so on. The MA5200G can also provide
sufficient accounting information and support multiple accounting modes.
The MA5200G is applicable to various access networks, including Ethernet, x Digital
Subscriber Line (xDSL) network, Hybrid Fiber-Coaxial (HFC) network, and Wireless
LAN (WLAN). It provides the functions of user management, accounting control,
address management, service control, and security management with carrier-class
reliability.
The MA5200G is located at the access layer or convergence layer of a network which
requires user management and security management. It implements control and
management of users (subscribers), and provides various functions such as user
management, authentication, accounting, address management, and security control.
The MA5200G can be widely applied in the carrier‘s Metropolitan Area Networks
(MANs), government data networks, enterprise networks and intelligent office
buildings to satisfy different requirements for user management and network security.
BSNL has commissioned a world class, multi-gigabit, multi-protocol, convergent IP
infrastructure through National Internet Backbone–II (NIB-II), that will provide
convergent services through the same backbone and broadband access network. The
Broadband services are available on DSL technology (on the same copper cable that
is used for connecting telephone), on a countrywide basis spanning 198 cities under
NIB-II Project 2.2
The location of BBRAS in the core infrastructure is shown below in which the
broadband services are deployed through DSL technology.
Architecture Of Broadband Remote Access Server
Broadband Remote Access Server MA5200G has the following production models: -
MA5200G-8
MA5200G-4
MA5200G-2
The MA5200G adopts compact chassis structure and can be installed in a 19-inch
standard rack or placed on the desktop.
Hardware Architecture
The hardware structure includes the following:-
Integrated chassis
BRBRAITT : Jun-2011 25
JTO PH-II ―DATA NETWORK‖
The MA5200G uses a 19-inch standard chassis, which is integrated with one
high-speed passive backplane, two power modules and one fan module. All
the boards, power modules and fan module of the MA5200G can be plugged
in or pulled out from the front of the chassis, and all the interfaces are
provided in the front of the chassis, thus facilitating maintenance.
Passive backplane
Fan module
Power modules
Boards.
The MA5200G-8 has a dimension of 482.6mm 420mm 797.3mm (width depth
height).
BRBRAITT : Jun-2011 26
JTO PH-II ―DATA NETWORK‖
The MA5200G-8 adopts vertical board design and front lead-out cabling mode. That
is, all the boards of the MA5200G-8 are plugged in vertically, and all the cables are
led out from the front of the chassis. The MA5200G-8 provides two SMU slots and
eight SFU slots. As a high-performance broadband access server, the MA5200G-8 is
specially used for broadband user access and service control on large-scale networks.
It has a 256Gbps high-speed backplane, and is configured with 64Gbps high-speed
switching and forwarding engines (SMUs). With "1+1" redundancy backup
capabilities, the SMUs can achieve high reliability. The eight SFU slots of the
MA5200G-8 are compatible with all the service boards of the MA5200G series
The MA5200G series adopt the hardware structure, as shown below: -
Hardware structure of the MA5200G
The MA5200G adopts non-blocking switching structure, so non-blocking data switch
can be realized between all the interfaces of the equipment. In addition, by separating
the data channel from the management bus, it ensures that data packets are separated
from control packets.
The MA5200G uses distributed multiprocessor framework and distributed network
processors, thereby ensuring high performance for the system and high flexibility for
the services.
With carrier-class reliability, the MA5200G is designed with a passive backplane,
redundant system management modules, redundant power modules and fans to ensure
the high availability of the system.
Hardware configuration of Broadband Remote Access Server, MA5200G, is designed
as given below: -
Passive backplane and bus redundancy
The system uses a high-reliability passive backplane. Moreover, it has two
system management buses, which work in "1+1" redundancy hot backup
mode.
Redundant system management modules
The SMU module includes an independent main control system, the switching
system and the clock system. With SMU redundancy backup capabilities, the
MA5200G-8 and MA5200G-4 can be optionally configured with one or two
SMU modules. When two SMU modules are configured, the two SMUs
respectively work in active and standby mode. The active SMU implements all
the functions this module, whereas, the standby SMU only communicates with
the active SMU for the purposes of keep alive contact and data backup. When
the active SMU becomes faulty or is reset, the standby SMU will immediately
take over all the work of the active SMU, and act as the active board.
BRBRAITT : Jun-2011 27
JTO PH-II ―DATA NETWORK‖
The SMU module provides one debugging network port and two debugging serial
ports to the outside.
BRBRAITT : Jun-2011 28
JTO PH-II ―DATA NETWORK‖
SFU module
A high-performance network processor (NP) is adopted in the SFU module of the
MA5200G.
CPU Control
(Control) channel
Control
Internal
channel
interface
Extermal Data
NP Data
interface channel (Policy-based
channel
forwarding)
Structure
of the SFU module
The SFU module is composed of the CPU subsystem and NP subsystem. The CPU
subsystem is responsible for the processing of routing protocols, user access control
packets and user access procedures. Besides, it manages the SFU module, and
controls the user service management policies of the NP subsystem. The NP
subsystem processes user data packets according to the defined policies, and queries
the routing table for packet forwarding.
The NP-based system has three characteristics:
High performance
Service flexibility
Complicated service processing capabilities.
The MA5200G can provide various types of interfaces through different SFU
modules.
Ethernet interfaces
ATM interfaces
POS interfaces.
Ethernet interface
The Fast Ethernet (FE) and Gigabit Ethernet (GE) interfaces supported by the
MA5200G are described below: -
SFU
Description
module
BRBRAITT : Jun-2011 29
JTO PH-II ―DATA NETWORK‖
ATM interface
ATM interfaces supported by the MA5200G is given below: -
.
SFU
Description
module
CR- 4-port 155M ATM optical interface circuit board (single mode,
A4CS 1310nm, 15km, LC)
CR- 8-port 155M ATM optical interface circuit board (single mode,
A8CS 1310nm, 15km, LC)
BRBRAITT : Jun-2011 30
JTO PH-II ―DATA NETWORK‖
POS interface
The POS interfaces supported by the MA5200G are given below: -
SFU
Description
module
Software Architecture
The MA5200G logically consists of three modules: -
Service management module
Routing forward control module
Service control module
Service management module
The Service Management Unit (SMU) module includes the main control system, the
switching system and the clock system. As the core module of the system, this module
mainly provides the functions of system management, equipment maintenance,
routing management, data switch, and the provisioning of clock signals. It is an
indispensable module of the MA5200G, and supports hot plugging and "1+1" hot
backup.
The functions of this module mainly include managing equipment, managing system
resources, monitoring the system running status, providing a control interface (such as
command line, Telnet and NM interface), and providing the functions of logging,
alarm management, patching, loading, and so on.
BRBRAITT : Jun-2011 31
JTO PH-II ―DATA NETWORK‖
The MA5200G connects with various kinds of layer-2 access equipment through the Ethernet/ATM
interfaces, and implements access control and management of users as shown in figure in last page.
A
ccess
via
Ether
net
A
ccess
via
WLA
N
A
ccess
via
ADS
L
A
ccess
via
VDS
L
BRBRAITT : Jun-2011 32
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 33
JTO PH-II ―DATA NETWORK‖
MA5200G MA5200G
PORT1 PORT2
LAN Switch
PORT1 PORT1 PORT2 PORT2
VLAN1 VLAN2 VLAN1 VLAN2 +VLAN1 +VLAN2 +VLAN1 +VLAN2
BRBRAITT : Jun-2011 34
JTO PH-II ―DATA NETWORK‖
Logical ports
Through the logical ports, the MA5200G can effectively control and manage the
access of users. According to various access technologies and access requirements,
the MA5200G supports the two types of users.
Individual user
It is mainly the user that directly accesses the MA5200G through a layer 2
network. For this type of user, the MA5200G records the user's IP address, MAC
address and VLAN ID. Moreover, each user has independent service attributes,
and is authenticated and charged separately.
Leased line user
It is mainly a group of users that access the MA5200G through a layer 2 or layer
3 network. Such users share the same service attributes, and are authenticated and
charged in a unified manner.
User Authentication
The MA5200G supports the following user authentication modes.
Binding authentication
In this mode, the MA5200G detects a user‘s access request, and directly
generates an account for authentication automatically according to the access
port and VLAN/PVC information. For the user, there is no explicit
authentication process. The user can get offline by turning off the computer or
disconnecting from the network. This mode is applicable to users that get
online from fixed ports.
BRBRAITT : Jun-2011 35
JTO PH-II ―DATA NETWORK‖
Web authentication
In this mode, after accessing the Web authentication page through a Web
browser, a user must enter the user name and password, and the MA5200G
will authenticate the user according to the input information. Before
authentication, the user accessing any other Web page can be forcibly
redirected to the Web authentication page.
Fast authentication
In this mode, after accessing the Web authentication page through a Web
browser, a user can directly click the button for authentication, and the
MA5200G will automatically generate an account for authentication
according to the access port and VLAN information.
PPP authentication
Based on the Point-to-Point Protocol (PPP), the MA5200G authenticates
users through the Password Authentication Protocol (PAP) or the Challenge
Handshake Authentication Protocol (CHAP). For the Ethernet and ATM
access technologies, the MA5200G supports dial-up authentication through
PPPoE, PPPoEoA and PPPoA, and can automatically differentiate PPPoEoA
and PPPoA.
For different users, flexible authentication modes can be selected, and can be
configured on each port. Moreover, on the same port, the MA5200G supports PPP
authentication, Web authentication, and fast Web authentication.
The MA5200G supports remote authentication based on the standard Remote
Authentication Dial-In User Service (RADIUS) protocol and the Extended RADIUS
protocol. Working with an external authentication server, the MA5200G can
implement PAP and CHAP authentication functions.
User Accounting
The MA5200G can accurately collect a user‘s accounting information, including
online duration and traffic volume. It also supports the accounting information carbon
copy (cc) function.
The MA5200G can send the user's accounting information to the RADIUS server
through the RADIUS protocol or the Extended RADIUS protocol. It supports interim
accounting, and thereby ensures the accuracy of accounting information. It also
supports the accounting protection mechanism. Through redundancy, backup,
handshake detection, retransmission, and local storage of CDRs, the MA5200G
ensures that no CDR will be lost and no error CDR will be generated in the case of a
link fault.
The MA5200G supports various accounting policies, including no charging, postpaid
charging and prepaid charging.
For the prepaid service, the MA5200G supports duration-based prepaid service and
traffic-based prepaid service. Working with the RADIUS server, the MA5200G can
implement comprehensive prepaid service that is based on both duration and traffic,
and can support the switching of charging rates in different time segments.
For a virtual carrier (for example, in the IP Hotel service, a hotel can be regarded as a
virtual carrier), the MA5200G provides the accounting information cc function. The
BRBRAITT : Jun-2011 36
JTO PH-II ―DATA NETWORK‖
MA5200G can send a copy to the virtual carrier when it sends accounting information
to the carrier. It supports two cc modes, that is, the cc mechanism can either be based
on the virtual ISP of a user, or based on an access logical port (port+VLAN/PVC).
User Management
The MA5200G can greatly enhance the granularity of user control and management
based on the logical ports (port+VLAN/PVC).
Based on the logical ports, the MA5200G can control and manage users in the
following aspects.
Access user types on the logical ports: The MA5200G can specify access user
types for the logical ports, such as WLAN user, ADSL user and Ethernet user.
Moreover, it can apply different control policies to various users, and report
the user types to the authentication and accounting server, so that the users can
be charged at different rates.
Authentication modes on the logical ports: The MA5200G supports multiple
authentication modes on the same logical port, and can also restrict the
authentication modes based on the logical ports. On the MA5200G,
appropriate authentication modes can be selected for different users.
Quantity of access users using the logical ports: Based on this function, the
MA5200G can effectively prevent the access of spoofing users, and
effectively protect network resources such as address resources.
User access based on the logical ports: The MA5200G can automatically
identify the users that access the network through the logical ports. And
according to the port attributes, the MA5200G can automatically authenticate
the users and provide access services.
Leased line access based on the logical ports: The MA5200G supports leased
line access based on the logical ports. Moreover, the MA5200G can have an
appropriate control over the leased line users.
Quantity of online users sharing the same account: Assisted by the RADIUS
server, the MA5200G can limit the quantity of online users that share the same
account.
Binding user accounts based on the logical ports: Assisted by the RADIUS
server, the MA5200G can bind accounts with the logical ports, thus effectively
preventing illegal use of user accounts (for example, preventing the user
accounts of the monthly-fee charging policy from being used by other types of
users).
User group based access: The MA5200G can classify users into different
UCL-groups, and apply different Access Control List (ACL) rules to various
UCL-groups. Thereby, for user access control, group management can be
achieved effectively.
User group based mutual access: The MA5200G can classify users into
different mutual access control groups (InterGroup). The mutual access
authorities within an Inter Group and between Inter Groups are configurable.
Thereby, for user mutual access control, group management can be achieved
effectively.
Bandwidth: The MA5200G provides Committed Access Rates (CARs) in the
up and down line transmission for the access users. For the leased line users, it
BRBRAITT : Jun-2011 37
JTO PH-II ―DATA NETWORK‖
can implement centralized control over the traffic of all the access users under
the leased line.
Address Management
The MA5200G allows a user to access the network with a configured static IP address
or with a dynamic IP address. For the users that obtain IP addresses dynamically, the
MA5200G can manage the dynamic IP addresses through its built-in address
management function.
The MA5200G can organize IP addresses into address pools for management. The
MA5200G has defined two kinds of address pools:
Local address pool: It is configured on the MA5200G and is managed by the
MA5200G itself. The MA5200G is responsible for address management,
including allocation, renewing, and reclaiming.
Remote address pool: It is managed by an external DHCP/BOOTP server. The
MA5200G initiates a request to the external DHCP/BOOTP server on behalf
of the user or relays the user‘s request. In this way, the user can request an IP
address, and can renew or release the IP address.
The MA5200G supports the built-in DHCP server, DHCP relay and DHCP proxy, and
provides the address pool management function. It can allocate an address to the user
from the local address pool or remote address pool. In addition, under the support of
the MA5200G, the IP address can be allocated to the user through the RADIUS
server.
For a layer-2 access user, the MA5200G can allocate an IP address through DHCP or
BOOTP. The MA5200G can act as the DHCP server to allocate an IP address to the
user from the local address pool, and can also act as the DHCP relay to allocate an IP
address to the user from the external DHCP server.
For a PPP dial-up access user, the MA5200G allocates an IP address through IPCP.
This address can either be allocated by the RADIUS server, or be allocated from the
local address pool. In addition, the MA5200G can act as the DHCP proxy to obtain an
address for the user from the external DHCP server.
The MA5200G supports up to 4K address pools, and can maximally manage 96K IP
addresses in the local and remote address pools.
Security Management
The MA5200G can perform security management for access users, protect network
resources, and provide basic guarantee for carrying out other network security
measures.
The MA5200G adopts special packet binding check technology. After a user passes
authentication, the MA5200G checks the binding relation of the IP address, MAC
address, logical port (port+VLAN/PVC) and PPPoE session ID in each packet of this
user, and the packets that do not match will be discarded. In this way, the MA5200G
can completely prevent various spoofing attempts, thus ensuring basic network
security.
The MA5200G provides sophisticated ACL functions, including standard ACL,
Extended ACL (EACL), and user-based ACL (UCL) rules. The standard ACL rule is
based on the destination IP address and mask. The EACL rule is based on a quintuple
BRBRAITT : Jun-2011 38
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 39
JTO PH-II ―DATA NETWORK‖
group at any time. There is no limit to the location and quantity of members. Each
host can belong to one or more multicast groups.
The MA5200G supports various multicast protocols, including PIM-SM, PIM-DM,
MBGP, MSDP and IGMP V1/V2. It supports the multicast service, providing a basis
for application of broadband value-added services such as Web TV.
After receiving a user‘s request for joining an IGMP multicast group, the MA5200G
directly adds this user to the multicast group. At the same time, it establishes a
multicast tree to the multicast source through the multicast protocol. For the multicast
service, it is required that the lower-layer switch should support the IGMP Snooping
protocol.
QoS Guarantee
The MA5200G has perfect QoS, and supports the Differentiated Services (DiffServ)
model.
The MA5200G supports eight levels of user priorities, and can schedule and forward
user packets based on the priorities. It also supports the mapping between Class of
Service (CoS) codes and Differentiated Services Code Point (DSCP) codes.
According to different user priorities, differentiated services will be carried out by the
layer 2 access equipment based on 802.1p and by the layer 3 routers based on DSCP.
For user data packets, the MA5200G supports complex traffic classification. And
according to the classification result, it can provide differentiated services to the same
user, thus enhancing the QoS capability of the system.
The MA5200G supports CARs. On the MA5200G, the peak rate, average rate and
basic rate can be configured for users. According to the configured parameters, the
MA5200G can limit the traffic rate for a user. The range of control is 8Kbps to
1Gbps. The bandwidth control granularity is 8Kbps.
The MA5200G supports six levels of priority queues. It provides differentiated
services and implements traffic shaping for the AF1–AF4, EF and BE services. The
MA5200G supports 802.3x-based traffic control, and the Weight Random Early
Detection (WRED) algorithm. Thereby, congestion can be avoided from occurrence.
Summary
Broadband Remote Access Servers (B-RAS) are multi service platforms installed at
the edge of the network, upstream of the DSLAM, to terminate PPP sessions from the
customer premises, maintain quality of service (QOS), enforce class of service (COS),
provision services, and provide a central collection point for data that can be used to
bill customers for their network and service usage. B-RAS equipment often started
life as something else -- an edge router, IP service switch, subscriber management
system, or even a plain old ATM switch.
Broadband Remote Access Servers (B-RAS) connects with various kinds of layer 2
access equipment through the Ethernet/ATM interfaces, and implements access
control and management of users.
BRAS provides more flexible service provisioning because subscriber services can be
handled within a single managed network, rather than being provisioned on a one-to-
one basis through to the NSP or ASP.
BRBRAITT : Jun-2011 40
JTO PH-II ―DATA NETWORK‖
On the access side, the BRAS provide an aggregation point for a variety of services.
These include traditional ATM-based offerings and newer, more native IP-based
services, such as support for Point-to-Point Protocol over ATM (PPPoA), PPP over
Ethernet (PPPoE) and direct IP services encapsulated over an appropriate Layer 2
transport.
The NSP and ASP connections can support an assortment of high bandwidth
connections. At the physical layer this could be: traditional DS1/E1 through to
DS3/E3; SONET or SDH capabilities; OC3c/STM1 through to OC48c/STM16; and
10/100/1000 Ethernet (physical layer), for hosting and co-location for example.
Numerous options, including ATM, must be supported at the data link level, Layer 2,
to maintain compatibility with existing systems, Ethernet, Packet Over SONET (POS)
and Frame Relay.
As these services are predominantly IP-based, the BRAS must perform basic IP-
routed network functions, very similar to those of an edge router. This includes
support for Open Shortest Path First (OSPF) and Border Gateway Protocol Type 4
(BGP4), along with traffic engineering functions. As traffic is increasingly aggregated
into high speed uplink connections to NSPs and ASPs, Multi-Protocol Label
Switching (MPLS) can provide traffic engineering characteristics, and, in conjunction
with BGP4, Provider Provisioned VPNS (PP-VPNs).
BRAS performed these functions with the help of System Management module and
Service Forwarding module.
The BRAS concept described above has been placed in the context of DSL access.
However, it is easy to see that as new services are introduced, the range of features
supported by BRAS applies to any type of access technology. These could include
cable, wireless, Wi-Fi and WiMAX. New services will include: multicast video and
audio services incorporating video on demand; interactive gaming; network-based
security features that reside alongside traditional voice and best-effort Internet access.
BRBRAITT : Jun-2011 41
JTO PH-II ―DATA NETWORK‖
REVIEW QUESTIONS
What is the role of Broadband Access Server?
Where the BRAS is located?
What are the main components of BRAS?
What are the service functions of BRAS?
What are the different applications of BRAS?
References
M/s Huawei Technologies Co., Ltd. ―Broadband Access Server Operation
Manual‖ http://www.huawei.com
http://www.greenberg.on.ca/
BRBRAITT : Jun-2011 42
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 43
JTO PH-II ―DATA NETWORK‖
Switching Technologies
The switch has the potential to radically change the way nodes communicate with
each other. Switches usually work at Layer 2 (Data or Data link) of the OSI
Reference Model, using MAC addresses, while routers work at Layer 3 (Network)
with Layer 3 addresses (IP, IPX or AppleTalk, depending on which Layer 3 protocols
are being used). The algorithm that switches use to decide how to forward packets is
different from the algorithms used by routers to forward packets. One of these
differences in the algorithms between switches and routers is how broadcasts are
handled. On any network, the concept of a broadcast packet is vital to the operability
of a network. Whenever a device needs to send out information but doesn't know who
it should send it to, it sends out a broadcast. For example, every time a new computer
or other device comes on to the network, it sends out a broadcast packet to announce
its presence. The other nodes (such as a domain server) can add the computer to their
browser list (kind of like an address directory) and communicate directly with that
computer from that point on. Broadcasts are used any time a device needs to make an
announcement to the rest of the network or is unsure of who the recipient of the
information should be.
A hub or a switch will pass along any broadcast packets they receive to all the other
segments in the broadcast domain, but a router will not. Think about our four-way
intersection again: All of the traffic passed through the intersection no matter where it
was going. Now imagine that this intersection is at an international border. To pass
through the intersection, you must provide the border guard with the specific address
that you are going to. If you don't have a specific destination, then the guard will not
let you pass. A router works like this. Without the specific address of another device,
it will not let the data packet through. This is a good thing for keeping networks
separate from each other, but not so good when you want to talk between different
parts of the same network.
LAN switches rely on packet switching. The switch establishes a connection between
two segments just long enough to send the current packet. Incoming packets (part of
an Ethernet frame) are saved to a temporary memory area (buffer); the MAC address
contained in the frame's header is read and then compared to a list of addresses
maintained in the switch's lookup table. In an Ethernet-based LAN, an Ethernet
frame contains a normal packet as the payload of the frame, with a special header that
includes the MAC address information for the source and destination of the packet.
Packet-based switches use one of three methods for routing traffic:
Cut-through
Store-and-forward
Fragment-free
Cut-through switches read the MAC address as soon as a packet is detected by the
switch. After storing the 6 bytes that make up the address information, they
immediately begin sending the packet to the destination node, even as the rest of the
packet is coming into the switch.
A switch using store-and-forward will save the entire packet to the buffer and check
it for CRC errors or other problems before sending. If the packet has an error, it is
BRBRAITT : Jun-2011 44
JTO PH-II ―DATA NETWORK‖
discarded. Otherwise, the switch looks up the MAC address and sends the packet on
to the destination node. Many switches combine the two methods, using cut-through
until a certain error level is reached and then changing over to store-and-forward.
Very few switches are strictly cut-through, since this provides no error correction.
A less common method is fragment-free. It works like cut-through except that it
stores the first 64 bytes of the packet before sending it on. The reason for this is that
most errors, and all collisions, occur during the initial 64 bytes of a packet.
LAN switches vary in their physical design. Currently, there are three popular
configurations in use:
Shared memory - This type of switch stores all incoming packets in a
common memory buffer shared by all the switch ports (input/output
connections), then sends them out via the correct port for the destination node.
Matrix - This type of switch has an internal grid with the input ports and the
output ports crossing each other. When a packet is detected on an input port,
the MAC address is compared to the lookup table to find the appropriate
output port. The switch then makes a connection on the grid where these two
ports intersect.
Bus architecture - Instead of a grid, an internal transmission path (common
bus) is shared by all of the ports using TDMA. A switch based on this
configuration has a dedicated memory buffer for each port, as well as an ASIC
to control the internal bus access.
BRBRAITT : Jun-2011 45
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 46
JTO PH-II ―DATA NETWORK‖
System Architecture
The S8016 complies with the modular design. The modular interfaces are organized
reasonably in the system, and the functional modules are standard and relatively
independent. It adopts the distributed frame design. The whole system consists of
seven parts: -
Routing Process System (RPS)
The Routing Process System (RPS) is a control management unit running on the
MPU. It is the control and management center of the system. The main tasks of RPS
are as follows: -
Unicast route control, MPLS LSP control and Multicast route control
Creates and maintains a virtual lease line between two Customer Edges
Transfers route and label information between CE and PE or between PEs
The RPS controls parameter configuration according to traffic of VPN service
and configures queue resources and traffic control parameters for Diff-Serv
Class of Service (CoS).
Command line, network management, equipment management, system
monitoring, fault diagnosis and service statistics.
Forwarding Support Unit (FSU)
Its main work includes management (configuration and monitoring) of the service
interface, forwarding of the data needed, link control, and negotiation of link
parameters.
Express Forwarding Unit (EFU)
Responsible for Layer 2 switching and express forwarding of IP packets. Besides the
Layer 3 forwarding and VLAN capability, such as VLAN aggregation, VLAN trunk.
The EFU has also QoS functions such as, traffic classification, traffic measurement,
traffic policing, traffic shaping, traffic scheduling, avoidance and control of
congestion. The EFU can implement the service characteristics such as Diff-Serv and
packet filtering, and perform data forwarding such as Layer 2/Layer 3 forwarding,
MPLS forwarding and multicast forwarding.
FSU on the NAT runs on the central processor of the NAT
It is responsible for all link-layer protocols, organizes data to be forwarded by
forwarding module, and assists RPS in system management.
EFU on the NAT implements translation among the datagram port numbers
Responsible for Layer 2 switching and express forwarding of IP packets. Besides the
Layer 3 forwarding and VLAN capability, such as VLAN aggregation, VLAN trunk.
NET card monitors the internal switching network in the system.
NMS performs centralized maintenance and control of the equipment with Huawei
Integrated NMS.
The S8016 supports the following physical interfaces:
Fast Ethernet interface (FE)
Gigabit Ethernet interface (GE)
BRBRAITT : Jun-2011 47
JTO PH-II ―DATA NETWORK‖
POS interface
ATM interface
RPR interface
Loop back interface
Null interface
VLAN interface
Introduction TO PPP
A Point-to-Point Protocol (PPP) is a link layer protocol that bears network layer
packets on a point-to-point link. It is widely applied for its capability of providing
user authentication, easy extension and supporting synchronous and asynchronous
communication.
PPP defines a complete suite of protocols, including Link Control Protocol (LCP),
Network Control Protocol (NCP) and authentication protocols (PAP and CHAP), etc.,
of which:
Link Control Protocol, LCP for short, is used to negotiate some link parameters and is
responsible for establishing and maintaining links.
Network Control Protocol, NCP for short, is used to negotiate parameters of network
layer protocols.
PPP Authentication
PAP is a 2-way handshake authentication protocol, and the password is in plain text.
The process of PAP authentication is as follows:
The peer sends the username and the password to the authenticator.
The authenticator checks if there is such a user and if the password is correct
according to the user configuration, and then returns different responses
(Acknowledge or Not Acknowledge).
BRBRAITT : Jun-2011 48
JTO PH-II ―DATA NETWORK‖
CHAP Authentication
CHAP is a 3-way handshake authentication protocol, and the password is in encrypted
text. The process of CHAP authentication is as follows:
The authenticator sends some packets generated at random to the peer (Challenge).
The peer encrypts the random packets by using its own password and MD5 algorithm,
and returns the encrypted text generated to the authenticator (Response).
The authenticator encrypts the original random packets using the peer‘s password it
saves and MD5 algorithm, compares the two encrypted texts, and then returns
different responses according to the result of the comparison (Acknowledge or Not
Acknowledge).
Overview of S6500 SWITCH
Quidway S6500 Series Ethernet Switch is a series of large capacity, modularized wire
speed L2/L3 Ethernet switches. They are mainly designed for IP MAN, large-sized
enterprise network and campus network users. The series include the following main
types of switches:
S6506 Ethernet Switch
S6503 Ethernet Switch
S6506R Ethernet Switch
Quidway S6500 Series Switches have an integrated chassis structure. The chassis
contains card area, fan area, power supply area, and power distribution area.
For S6506, in the card area, there are seven slots. Slot 0 is prepared specially for
SRPU (Salience I or Salience II). The other six are LPU slots.
For S6503, in the card area, there are four slots. Slot 0 is prepared specially for SRPU
(iSalience I). The other three are LPU slots.
For S6506R, in the card area, there are eight slots. Slot 0 and slot 1 are prepared
specially for SRPU (Salience II) and they operate redundantly. The other six are LPU
slots. User can select required LPUs for different networks and the slots support
mixed insertion.
Quidway S6500 Series Ethernet Switches support the following services:
Internet broadband access
MAN, enterprise/campus networking
Provide multicast service and multicast routing function and support audio and
video multicast service.
BRBRAITT : Jun-2011 49
JTO PH-II ―DATA NETWORK‖
Function Features
Features Description
Broadcast
Supports Broadcast Suppression
Suppression
BRBRAITT : Jun-2011 50
JTO PH-II ―DATA NETWORK‖
Features Description
Link
Supports link aggregation
aggregation
BRBRAITT : Jun-2011 51
JTO PH-II ―DATA NETWORK‖
Features Description
Protocol (TFTP)
BRBRAITT : Jun-2011 52
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 53
JTO PH-II ―DATA NETWORK‖
Based on the operated objects, the file system can be divided as follows:
Directory operation
File operation
Storage device operation
Set the prompt mode of the file system
Directory Operation
The file system can be used to create or delete a directory, display the current working
directory, and display the information about the files or directories under a specified
directory. You can use the following commands to perform directory operations.
Operation Command
File Operation
The file system can be used to delete or undelete a file and permanently delete a file.
Also, it can be used to display file contents, rename, copy and move a file and display
the information about a specified file. You can use the following commands to
perform file operations. Perform the following configuration in user view.
Operation Command
BRBRAITT : Jun-2011 54
JTO PH-II ―DATA NETWORK‖
Operation Command
BRBRAITT : Jun-2011 55
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 56
JTO PH-II ―DATA NETWORK‖
Introduction
To enable DSL technology, service providers must have a DSLAM located in their
networks to interact with the customer premises equipment (CPE) at the end user
location.
DSLAM is an integrated hardware and software system that allows the user to access
Broadband services as well as originate and terminate telephone calls over the same
single pair of copper wires
A Digital Subscriber Line Access Multiplexer (DSLAM) delivers exceptionally high-
speed data transmission over existing copper telephone lines
A DSLAM separates the voice-frequency signals from the high-speed data traffic and
controls and routes digital subscriber line (xDSL) traffic between the subscriber's end-
user equipment (router, modem, or network interface card [NIC]) and the network
service provider's network. A DSLAM takes connections from many customers and
aggregates them onto a single, high-capacity connection to the Internet. DSLAMs are
generally flexible and able to support multiple types of DSL in a single central office,
and different varieties of protocol and modulation, both CAP and DMT, in the same
type of DSL. The DSLAM may provide additional functions including routing or
dynamic IP address assignment for the customers.
The DSLAMs is in general be collocated with existing PSTN exchanges which
provide last mile access to customers over copper wire up to average span lengths of 3
kms.
Features of DSLAM
A digital subscriber line access multiplexer (DSLAM) delivers exceptionally high-
speed data transmission over existing copper telephone lines. A multiservice DSLAM
is a broadband-access network element (NE) that combines support for multiple DSL
transmission types. When coupled with high-capacity asynchronous transfer mode
(ATM) switching, multiservice DSLAMs deliver scalability, port density, and a
redundant architecture for reliability. Multiservice DSLAMs, together with various
CPE elements, can enable the relatively efficient deployment of broadband networks
for high-speed Internet access as well as voice and video applications. Such DSLAMs
often allow for full ATM switching, traffic management, and quality of service (QoS),
in addition to the delivery of a full range of services. These services include analog,
ISDN, IDSL, SDSL, rate-adaptive DSL–competitive access provider (RADSL–CAP),
BRBRAITT : Jun-2011 57
JTO PH-II ―DATA NETWORK‖
Implementation of DSLAM
Broadband connectivity is extended to these DSLAM through the core network via
the LAN switch. Commonly it is available with 480, 240, 120, 64, 48 and 24 ports.
DSLAMs are generally aggregated through a Fast Ethernet or Gigabit Ethernet
BRBRAITT : Jun-2011 58
JTO PH-II ―DATA NETWORK‖
Interface. The connectivity of these DSLAM according to the location and capacity is
planned in NIB-II Project 2.2. DSLAMs are available with different types of access
modules and capacities. The FX or GBIC module in DSLAM and LAN switch should
be capable of driving up to 10km on a single mode fibre. The SX or GBIC module in
LAN Switch used for connecting Tier2 to Tier1 will support 40km. In bigger cities
like A1, A2, A3 and A4, one BBRAS per city will be deployed initially. There will
be no BBRAS at B1 and B2 cities. The DSLAMs in B1.B2 and other lower
hierarchical cities will be aggregated through Layer 2 switches, and will be connected
to the nearest BBRAS of A cities on Ethernet over SDH.
M/s HTL and M/s UTStarComm have supplied DSLAM equipments for Project 2.2
of NIB-II. Following types of DSLAMs are introduced: -
Huawei SMARTEX MA 5300 480, 240, 120 ports DSLAM
Huawei SMARTEX MA 5300 64, 48 and 24 ports DSLAM
UTStarComm AN2000 IB IPDSLAM 480, 240, 120 ports DSLAM
UTStarComm AN2000 B-100 Mini DSLAM 64, 48, 24 ports DSLAM
Connectivity of DSLAM
DSLAM is connected to ATM or IP based core network through the networking
elements. It aggregates the data traffic of all the users provided to it and extends to
core network. The telephone traffic of each user is separated by splitter available in it
and transmits to PSTN network. DSLAM provides user access through user access
layer and Connectivity to IP backbone is provided through IP convergence layer.
BRBRAITT : Jun-2011 59
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 60
JTO PH-II ―DATA NETWORK‖
In the service frame, the backplane and the ESM are mandatory. Other service boards
are flexibly configured based on service types and traffic volumes. All boards adopt
front access mode, in which cables are led out from the front panel.
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
E E
E E E E E E E E E E E E V V
V V V V V V V V V V V V D D
D D D D D D D D D D D / /
D E E
/ / / / / / / / / / / / A A
D D
E E E E E E E E E E E E E E / /
E E
A A A A A A A S S A A A A A S S
D D D D D D D M M D D D D D H H
/ /
/ / / / / / / / / / / / E E
E E E E E E E E E E E E I I
U U
S S S S S S S S S S S S / /
H H H H H H H H H H H H I I
S S
U U
BRBRAITT : Jun-2011 61
JTO PH-II ―DATA NETWORK‖
The SPMA communicates with the MA5300‘s ESM board through the serial port
using APP. It also controls the ESPC board to capture lines.
In addition, the SPMA provides ports to connect to the external test meter and
broadband test management system. In this way, the SPM facilitates line capture
under the control of broadband test management system, as well as test of xDSL lines
captured through an external tester meter.
MA5300‘s boards can be divided to the following types:
Main control board
Service board
Built-in ISU board
Ethernet uplink board (EIU)
Splitter board
Table below describes the functions and external ports of various boards.
BRBRAITT : Jun-2011 62
JTO PH-II ―DATA NETWORK‖
Etherne
ETHA 12 FE ports Provides Ethernet access.
t board
BRBRAITT : Jun-2011 63
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 64
JTO PH-II ―DATA NETWORK‖
ADSL2+
SHDSL
ADSL/ADSL2+ hybrid broadband access
ADSL/SHDSL hybrid broadband access
ADSL2+/SHDSL hybrid broadband access
The MA5105 is an open system in strict accordance with relevant international
standards. By working with upper layer network devices, it provides subscriber
management and service support functions, and thus maintains an operable,
manageable, and profitable network with sustainable development.
Hardware Structure
The MA5105 can be installed in a 19-inch cabinet, or mounted on the top of a table.
The dimensions (W D H) of the MA5105 are:
436.00 mm 400.00 mm 44.40 mm
436.00 mm 300.00 mm 44.40 mm
SLOT0 DC -48V
SLOT1 Service board
Uplink board SLOT2 Service board ©G
The MA5105 provides three slots. The one at the left hand side is used to
accommodate the uplink boards, and the two at the right hand side are used to
accommodate the service boards. The sizes of the slots for the uplink boards and
service boards are different. This helps to prevent mis-operations in installation.
On the panel of the MA5105, there are two LEDs:
PWR: A green indicator that lights up when the power is on, and turns off when the
power is off.
FAN: A red indicator that lights up when the fan fails, and extinguishes when the fan
runs normally.
The MA5105 consists of the chassis, power supply module, backplane, and fans for
heat dissipation, service boards, and uplink boards. Different service boards and
uplink boards are configured flexibly according to the different services to be
provided, while other components are mandatory. Table below describes the
mandatory components of the MA5105 hardware.
BRBRAITT : Jun-2011 65
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 66
JTO PH-II ―DATA NETWORK‖
Table below lists the uplink and service boards that are available for the MA5105.
Service board
BRBRAITT : Jun-2011 67
JTO PH-II ―DATA NETWORK‖
Based on a modular design, the MA5105 meets the demands for different networking
modes through its diverse control and service boards and interfaces. Through FE
(100Base-TX) interfaces, up to four MA5105 devices can be subtended in three
levels, as shown in Figure below. In this case, the uplink boards must be
MFCE/MFCS/MFCM.
Uplink
BRBRAITT : Jun-2011 68
JTO PH-II ―DATA NETWORK‖
1×MFCE+1×ADLx+1×SHDA
1×MFCE+1×ADLx+1×ADCE
1×MFCE+1×ADCE+1×SHDA
Level 3 MA5105:
1×MFCE/MIFE+2×ADLx
1×MFCE/MIFE+2×ADCE
1×MFCE/MIFE+2×SHDA
1×MFCE/MIFE+1×ADLx+1×SHDA
1×MFCE/MIFE+1×ADLx+1×ADCE
1×MFCE/MIFE+1×ADCE+1×SHDA
Level 3 MA5105:
1×MFCE/MIFE+2×ADLx
1×MFCE/MIFE+2×ADCE
1×MFCE/MIFE+2×SHDA
1×MFCE/MIFE+1×ADLx+1×SHDA
1×MFCE/MIFE+1×ADLx+1×ADCE
1×MFCE/MIFE+1×ADCE+1×SHDA
BRBRAITT : Jun-2011 69
JTO PH-II ―DATA NETWORK‖
Software Structure
Figure below shows the overall software structure of the MA5105.
BRBRAITT : Jun-2011 70
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 71
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 72
JTO PH-II ―DATA NETWORK‖
Contents
Introduction to Command Line Operations
Basic System Configuration
Port Configuration
VLAN Service Configuration
Multicast Service Configuration
VLAN interface
interface
configuration mode
vlan-interface
MA5300(config-vlan-interface1)#
1
VLAN interface
vlan 1
configuration mode
MA5300(config-vlan1)#
line 0
Line configuration
MA5300(config-line0)#
mode
Command Line Basis
Command line help
By entering ―?‖ , you can get list of commands with a brief description under any
command mode
MA5300#show ?
Key word matching
MA5300#conf<space> ---- MA5300#configure
BRBRAITT : Jun-2011 73
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 74
JTO PH-II ―DATA NETWORK‖
workstation
LAN MA5300
LAN
MA5300
Telnet WAN
terminal
LAN
Remote router
workstation
BRBRAITT : Jun-2011 75
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 76
JTO PH-II ―DATA NETWORK‖
Board Management
Query a Board MA5300#show board 0
MA5300#show board 0/2
Add a board MA5300(config)#board add 0/1 eada
Confirm a Board MA5300(config)#board confirm 0
Delete a board MA5300(config)#board delete 0/2
Reset a Board MA5300(config)#board reset 0/1
Equipment management
Reset the system MA5300(config)#reboot
Show CPU Occupancy Ratio MA5300>show cpu 0/7
Display the system time MA5300> show time
Set the system time MA5300#time HH:MM:SS YYYY/MM/DD
Display the system version MA5300(config)#show version 0/7
Setting hostname MA5300(config)#hostname MA5300
BRBRAITT : Jun-2011 77
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 78
JTO PH-II ―DATA NETWORK‖
Interface-number:
Format: slot No /sub-slot No /port No.
Example:
Ethernet 7/1/0, Adsl 2/0/1, Vdsl 3/0/23
BRBRAITT : Jun-2011 79
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 80
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 81
JTO PH-II ―DATA NETWORK‖
Upper network
7/1/0
MA5300
Upper network
7/1/0
MA5300
Configuration steps:
ADSL link configuration
Create a vlan domain according to the requirement, which should include the
corresponding client port (ADSL port)
Add an upstream trunk port, and set vlans that are permitted to pass
BRBRAITT : Jun-2011 82
JTO PH-II ―DATA NETWORK‖
Upper network
VLAN:128~1023
MA53
00A
VLAN:1024~1919
MA53
00B
BRBRAITT : Jun-2011 83
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 84
JTO PH-II ―DATA NETWORK‖
Video stream
VOD Server
Video stream
MA5300
BRBRAITT : Jun-2011 85
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 86
JTO PH-II ―DATA NETWORK‖
MT800 OVERVIEW
Appearance
MT800 provides the small and private network with simple, secure, and cost-efficient
ADSL Internet connection. It enables many interactive multi-media applications.
MT800 has considered the household arrangements, enabling horizontal and vertical
positions as well as hanging on the wall.
Appearance of MT800
Parts of MT800
Front Panel
Place the MT800 in a location where the LED indicators can be easily viewed.
The LEDs on the front panel of MT800 are shown as below:
LED
Status Description
Indicator
ADSL
Steady green light A valid ADSL connection.
LINK
ADSL
Blinking green light There is traffic over ADSL line.
ACT
BRBRAITT : Jun-2011 87
JTO PH-II ―DATA NETWORK‖
Rear Panel
All cable connections to the MT800 are made at the rear panel. Rear panel of MT800
is shown as below.
Note:
There might be different power adapter used in different regions. Please make sure
that your power adapter is in conformity with the sign in the rear panel (9V AC 1A or
9V DC 1A).
External Splitter
Using splitter can reduce disturbance signals in the telephone line. MT800 has to use
an external splitter, which has three ports: LINE, PHONE and MODEM port.
LINE: Connecting to the telephone jack.
PHONE: Connecting to the telephone.
MODEM: Connecting to ADSL modem with RJ-11 telephone line.
MT800 Features
Data rates up to 8 Mbps for downstream and 896 kbps for upstream.
Friendly Web-based graphical user interface for configuration and
management.
Supporting up to eight simultaneous virtual connections.
Various LED indicators facilitating the troubleshooting and maintenance of
the device.
Widest range of DSLAM interoperability.
Built-in firewall and filter rule for users‘ information security protection.
Upgradeable firmware through TFTP.
Easy to install and use.
BRBRAITT : Jun-2011 88
JTO PH-II ―DATA NETWORK‖
Hardware Installation
In this chapter you will learn about the various connections you need to make in order
to use the MT800.
Preparations
Connecting MT800
Power on MT800
Preparations
Checking Computer Configuration
Item Requirement
Web browser
Enable JavaScript
settings
NIC adapter
Ethernet port
Enable TCP/IP
Connecting MT800
Connecting ADSL Line
Simply plug one end of the twisted-pair telephone cable into the Modem port of the
splitter and insert the other end into the ADSL port on the rear panel of MT800.
Use another telephone cable to connect the splitter and the Phone Jack in the wall.
Connecting the computer to MT800
Use a straight-through cable to connect your computer and MT800. You can connect
the MT800 directly to a 10/100Base-TX Ethernet adapter card on your PC with the
provided Ethernet cable as shown in this diagram.
BRBRAITT : Jun-2011 89
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 90
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 91
JTO PH-II ―DATA NETWORK‖
Once the computer has IP settings that allow it to access the Web-based configuration
manager, you can change the factory default settings to enable the MT800 to connect
to the Internet.
BRBRAITT : Jun-2011 92
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 93
JTO PH-II ―DATA NETWORK‖
Note:
Do not confuse the user name and password used to access the Web-based manager
with the ADSL account and password needed for PPP connections to access your
ISP‘s network.
Web-based Management
This chapter describes how to use the web-based management software to configure
the MT800, which introduces the signification of parameters and method of setting in
the configuration interface. The order of sectors is listed according to the functional
configuration interfaces.
Manager Interface Layout
The MT800 initially presents the System View page shown below when you first log
in.
The left part of the page is wizard column, and you can enter the web page of
configuration or management through the hyperlink in wizard column.
The right part of the page is the practical domain of configuration and
management.
BRBRAITT : Jun-2011 94
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 95
JTO PH-II ―DATA NETWORK‖
ATM Setting
Click the hyperlink ―ATM Setting‖ in wizard column to open the ATM setting page.
There are three basic configuring modes for selection in this web page: RFC2684
Bridged, RFC2684 Routed (IPoA) and PPP.
RFC2684 Bridged Connection
Bridged connections include three modes: Pure Bridge, Static IP and DHCP.
PVC: System provides 8 PVCs. Generally you can leave this set at the default value
0. This option is also used to create and configure new PVCs.
VPI: If you need any modification, please enter the VPI value provided by ISP. See
the attached table for all the VPI default value of PVC.
VCI: If you need any modification, please enter the VCI value provided by ISP. See
the attached table for all the VCI default value of PVC.
Operation Mode: This also should be left at the default setting Enabled. This enables
the PVC used for the initial connection.
Encapsulation: You can select the mode LLC or VC MUX.
Address Type: The bridged connection modes include Pure Bridge, Static IP and
DHCP.
Pure Bridge
The setting page displayed as below will appear while you chose Pure Bridge mode.
The gray items don‘t need configuration.
BRBRAITT : Jun-2011 96
JTO PH-II ―DATA NETWORK‖
BRBRAITT : Jun-2011 97
JTO PH-II ―DATA NETWORK‖
To save these configuration changes permanently, enter the Save & Reboot page,
select Save and click Submit button to save new settings.
Diagnostics
The diagnostics feature executes a series of test of your system software and hardware
connections. Use this feature when working with your ISP to solve problems. Click
the Diagnostics of Advance Function in the Wizard column to perform the basic
diagnostics for system.
Diagnostics window
Select the Virtual Circuit and click the Submit button. A message will appear,
informing you whether the loop test succeeded or failed.
The diagnostics utility will run a series of test to check whether the device's
connections are up and working. This takes only a few seconds. The program reports
whether the test passed or failed. A test may be skipped if the program determines that
no suitable interface is configured on which to run the test.
Save & Reboot
Click the Save & Reboot in Wizard column to specify the method of restart.
BRBRAITT : Jun-2011 98
JTO PH-II ―DATA NETWORK‖
Caution:
Do not reboot the device using the Reset button on the back panel of the MT800 to
activate new changes. This button resets the device settings to the manufacturer‘s
default values. Any custom settings will be lost.
RFC 2684 Bridged (Pure Bridge) Configuration
Configurations on MT800
Operation
Select ―Enable‖.
Mode
ATM Setting
The value shall be provided by
Encapsulation your ISP. Usually you can keep
the default value: LLC.
Connection
Select ―RFC2684 Bridged‖.
Type
BRBRAITT : Jun-2011 99
JTO PH-II ―DATA NETWORK‖
Troubleshooting
Quick Troubleshooting
Failures Instructions
FAQs
Q: Why can’t my computer access the Internet, even when the physical links are
well connected?
Check first whether the LEDs are in normal status. If they do, you have to find help to
adjust the settings on the MT800.
Q: I forget the username and password when I am to log into the Web-based
Configuration Manager. Or I just can’t access the Web-based Configuration
Manager.
Please press reset button at the rear panel for 3 seconds to restore the factory default
settings of MT800.
Indicate your NIC IP address to 192.168.1.3
Disable Proxy service.
Launch your Web browser and type in http://192.168.1.1
Use the default user name: admin and password: admin
Q: My configuration is gone after rebooting MT800.
If you want to keep your settings after reboot MT800. Please go to Web-based
Configuration Manager ―Save & Reboot‖ ―Save‖ to save your configurations.
Q: I can’t upgrade with the new firmware.
Please make sure the file that you have downloaded is valid.
Q: Why can’t I access the Internet by using virtual dialing through Microsoft’s
Internet Gateway?
Internet Gateway supports PPPoE itself. No other PPPoE terminal software shall be
installed again.
Q: Why does my PC fall off line sometimes even with all LEDs are in normal
status?
There are several scenarios might cause this problem.
Be disconnected by the ISP.
Some ISPs will have idle timeout setting to avoid wasting IP. When the end user
connects to the Internet too long without any packet, the ISP will drop the connection.
Please contact with your ISP about this problem.
Some ISPs don‘t provide a good quality ADSL signal line. Therefore, when the
ADSL line is unstable, your connection will be dropped. Try with a telephone and
find the status of your ADSL signal line.
If you have contacted the ISP and they promised the quality of ADSL line, it may be
the hardware issue and please contact your vendor.
Q: When can I use the “Restore Factory Default Setting” button?
If you changed some setting unconsciously in the Web Management Interface and you
forgot the detailed values that you modified, please use the ―Restore Factory Default
Setting‖ button to recover the factory default settings.
Q: How many methods can be used to restore the factory default setting?
Totally two methods:
By the restore button on the rear panel of the device. Push it for 3 seconds to take the
factory default setting into effect;
Select the option Factory Setting Reboot in the page of Save & Reboot and then click
Submit button.
Q: How to connect multiple phones?
Follow the figures below to complete the installation. Note that the MT800 needs the
splitter for proper working.
(1) Phone (2) Phone Socket (3) Phone (4) RJ-11 Tel Cable
(5) Micro-filter (6) RJ-11 Tel Cable (7) Phone Socket (8) RJ-11 Tel Cable
(9) Splitter (10) RJ-11 Tel Cable (11) Phone Jack (12) MT800
General Specifications
ITU-T G.992.1
(G.dmt) ITU-T G.994.1 (G.hs)
Standards:
ITU-T G.992.2 ANSI T1.413 Issue # 2
(G.lite)
Power Adapter: 9 V AC 1A
Power
Max. 9W
Consumption:
Operating
0 to 40 C ( 32 to 104 F)
Temperature:
Weight: 180g
Note:
There might be different power adapter used in different regions. Please make
sure that your power adapter is in conformity with the sign in the rear panel
(9V AC 1A or 9V DC 1A).
Waterproof should be used during the storage, transportation and running of
the equipment.Appendix
Factory Default Settings
104
JTO PH-II ―DATA NETWORK‖
Password admin
IP address 192.168.1.1
NAT Enable
Abbreviations
Abbreviation Description
IP Internet Protocols
Abbreviation Description
Introduction
The 3Com Switch 7700 is a large capacity, modularized wire speed layer 2/layer 3 Switch. It
is designed for IP metropolitan area networks(MAN), large-sized enterprise network and
campus network users.
The Switch 7700 has an integrated chassis structure. The chassis contains a card area, fan
area, power supply area, and a power distribution area. In the card area, there are Eight slots.
Slot 0 and 1 is prepared specially for the switch Fabric module. The other six slots are for
interface modules. You can install different interface modules for different networks and the
slots support a mixed set of modules.
1) Redundant Switch fabric Module ( controller card )
2) 48-port 10/100BASE-T Auto-sensing FE Module
3) 20-Port 1000BASE-X-SFP Module
Switching Fabric
3Com Switch 7700R 8-Slot Redundant Fabric
Payload slots
Total 6; Free 2
3Com Switch 7700 48-port 10/100BASE-TX
3Com Switch 7000 20-port SFP Module
Power Supply
3Com Switch 7700 DC Redundant Power Supply
Controller Card
Connects the I/O modules through the backplane and forwards Layer 2 and Layer 3 data
Manages and calculates routing
Fulfills the switch‘s software upgrade and system reset functions
Monitors system power and the fan frame
Plug the DB-9 or DB-25 female plug of the console cable into the serial port of the PC or the
terminal where the switch is to be configured.
NOTE: In the above example it is assume that the Management Vlan is 3 and
Ethernet port 4/0/1 is the uplink port.
NOTE: By default, a password is required for authenticating the Telnet user to login
the Switch 7700. If a user logs in by Telnet without a password, the user sees the
message: P a s s w o r d r e q u i r e d , b u t n o n e s e t .
Enter system view, return to user view by pressing Ctrl+Z.
<SW7700> system-view
[SW7700] user-interface vty 0 4
[SW7700-ui-vty0] set authentication password simple/cipher xxxx
(xxxx is the preset login password of Telnet user)
At most, 5 Telnet users are allowed to log on to the Switch 7700 Switch
simultaneously the appropriate commands to configure the Switch 7700 or to monitor
the running state. Enter ? to get the immediate help .
Different Views
Views
The command line provides the following views:
User view
System view
Ethernet Port view
VLAN view
VLAN interface view
Local-user view
User interface view
FTP client view
Cluster view
PIM view
RIP view
OSPF view
OSPF area view
Route policy view
Basic ACL view
Advanced ACL view
Interface-based ACL view
Layer-2 ACL view
RADIUS server group view
ISP domain view
AN2000-IB IP DSLAM
The AN-2000 IB™ is a carrier class IP-based DSLAM that delivers always-on, high-
speed Internet data and video services to subscribers over a wireline network. The
AN-2000 IB interfaces directly with the IP MAN (metropolitan area network) to
deliver broadband data services cost-effectively and eliminate the need for costly
ATM infrastructure. Service providers to protect their investment and strengthen
customer relationships by offering their customers a wide variety of creative
interactive services and applications.
This low-cost, high-performance IP-based solution seamlessly migrates the access
network from narrowband voice-only services to full broadband capabilities.
traditional ATM-based access technology to the more cost effective IP-based access
technology. With traditional end-to-end ATM-based DSL access networks, many
service providers experienced problems in provisioning and maintenance, equipment
cost, and network scalability. When the subscriber base grows to hundreds of
thousands and millions of subscribers, network scalability becomes a critical issue to
many service providers. In the global DSL broadband market, UTStarcom is a leading
provider of DSLAM equipment and the leading provider of IP-based DSL access
solutions. UTStarcom‘s AN-2000 IP-DSLAM product not only offers advanced IP
based solutions, but also provides interfaces to traditional ATM-based backbone
networks to allow service providers to gradually transition from ATM to IP. The AN-
2000 IP-DSLAM gives service providers the ability to offer true IP-based DSL
services and to better utilize each network component to maximize return on
investment. This white paper describes the advantages of the unique IP solutions
offered by the AN-2000 IP-DSLAM with the IP Services Module (ISM) and the
benefits of using the AN- 2000 rather than traditional ATM-based DSLAMs.
The AN-2000 IP-DSLAM consists of three types of service modules:-
IP Concentration Module (ICM)
IP Services Module (ISM)
DSL Line Card Module.
IP Services Module (ISM)
The ISM is an IP application blade that enables the service provider to offer advanced
IP services to DSL subscribers. It brings advanced bridging and routing functions,
layer-two and layer-three QoS features, and subscriber management capabilities to the
AN-2000 IP-DSLAM. Most importantly, the unique features offered by the ISM bring
excellent scalability to the IP access network. ISM also provides interfaces to
traditional ATM-based access network to allow service providers to gradually migrate
from ATM to IP.
Advanced IP Features
Bridging
The ISM supports full-featured bridging functions at layer 2. It supports both 802.1d
and 802.1q bridging with up to 4095 bridge groups. Additionally, the ISM supports
VLAN aggregation where subscriber traffic carried on different VLANs can be
merged onto a single VLAN.
Routing
At layer three, the ISM supports static, dynamic (RIP and OSPF), and policy-based
routing. Policy-based routing is implemented through multiple Virtual Routing
Domains (VRDs). Each VRD is a separate routing context in which the routing
decision for a subscriber packet is based on the routing entries of the VRD that the
subscriber belongs to. The ISM also supports inter-VLAN routing.
Access Control and Session Tracking
The ISM has a rich set of subscriber authentication and session tracking capabilities.
The subscriber is authenticated either through a local user database on the ISM or
through a RADIUS server.
At layer two, ISM can apply access control based on the subscriber‘s MAC address.
The ISM supports IEEE 802.1x port-based access control and RADIUS proxy for
IEEE 802.1x based wireless access points. With these capabilities, the AN-2000 IP-
DSLAM can be deployed to offer wireless hotspot services in conference rooms,
coffee shops, hotels, airports, and elsewhere.
Layer-three access controls are more appropriate when service providers find it
difficult to control subscriber MAC addresses. The ISM supports PPP Authentication
Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) for PPP
subscribers, and IP address authentication for static IP subscribers.
Layer-three access controls are difficult to apply in cases where DHCP is utilized
because IP addresses are typically shared among DHCP subscribers. The ISM‘s web
authentication mechanism solves this problem by forcing the user to provide their
login and password through a security portal after receiving an IP address via DHCP.
In addition, when desired by the service provider, the ISM also provides the capability
to track and limit the number of concurrent subscriber sessions. The ISM keeps track
of each admitted subscriber session and collects usage information such as subscriber
MAC addresses, IP addresses, DHCP lease times, and PPPoA/PPPoE sessions. It also
maintains a set of counters that tracks each subscriber‘s byte counts and online times.
The statistics collected by ISM can be accessed via SNMP and RADIUS accounting.
The ISM also supports sophisticated packet filters via the Access Control List (ACL)
function, allowing the service provider to block unauthorized subscriber applications.
Subscriber Isolation
Subscriber isolation is one of the capabilities most frequently requested by service
providers. To support security and billing, they typically require that the DSLAM
prevent cross-talk between DSL subscribers and forward all subscriber traffic to the
aggregation router. The ISM can provide subscriber isolation at both layer two and
layer three. When layer-two subscriber isolation is enforced in the AN-2000 IP-
DSLAM, two subscribers cannot communicate with each other without going through
the upstream aggregation router, even if they are in the same bridge group. At layer
three, VRDs can also provide subscriber isolation. Subscribers belonging to different
VRDs are prohibited from communicating with each other within the DSLAM.
In addition, similar to layer two subscriber isolation, the ISM can enforce strict
isolation between two (or more) subscribers belonging to the same VRD. When strict
subscriber isolation is enforced, two subscribers in the same VRD can only
communicate with each other through the upstream aggregation router.
QoS
The AN-2000 IP-DSLAM supports both layer-two and layer-three packet
classification, priority queuing, and perflow traffic policing.
IP Virtual Private Networking
A Virtual Private Network (VPN) is a private network constructed using a public
network infrastructure such as the global Internet. The fundamental motivation for
using VPNs lies in the economics of communications. A collection of virtual
networks implemented on a common public network infrastructure is cheaper to
operate than an equivalent collection of smaller physically discrete communications
infrastructures, each servicing a single network client. VPNs must enforce traffic
segregation such that the information carried within a VPN is restricted to a defined
set of entities, and third parties cannot gain access. VPNs also allow for private
addressing and routing across the public Internet. It is important to mention that
Service Level Agreements (SLAs) have become a key aspect of VPN deployments.
SLAs are negotiated contracts between service providers and their subscribers. SLAs
specify the QoS attributes of each VPN—packet loss, jitter, latency, throughput and
more. The AN-2000 IP-DSLAM supports both layer 2 (link-layer) and layer 3
(network-layer) IP VPNs.
Link-layer VPN
At the link layer, the AN-2000 IP-DSLAM supports VLAN-based VPNs. The AN-
2000 IP-DSLAM enforces traffic segregation by selectively applying VLAN tags to
groups of DSL subscribers that belong to the same VPN. VLAN tags are applied
when subscriber traffic enters the DSLAM. Priority queuing and traffic policing is
applied to each VLAN to ensure conformance to the SLA provided to the VPN
subscribers.
functionality and WAN uplink through its Ethernet and ATM interfaces. The L/C
comprises 24 DSL ports for DSL connections to subscriber CPE. Multiple types of
ADSL and SHDSL L/C modules are supported to provide different line standards and
line rates for various market needs.
Figure depicts the network architecture enabled by the AN-2000 IP-DSLAM system.
This system is capable of supporting up to 384 DSL ports per chassis with mixed
ADSL and SHDSL line cards. DSL subscribers are served with SLA-specific
bandwidth and QoS . For example, subscribers who want to use data, voice and video
services over the same DSL connection can subscribe a Triple Play service that
provides the required bandwidth and QoS. Other subscribers may use low-bandwidth
connections with best-effort QoS. The flexible QoS capabilities of the AN-2000 IP-
DSLAM enable simultaneous support of different types of customizable services
within a single system.
On the WAN side, the IP-DSLAM may be configured for ATM, Ethernet or both. The
AN-2000 IP-DSLAM supports the following configurations:
L/C modules, ICM module(s), and ISM module(s) with ATM WAN uplink
L/C modules, ICM module(s) and ISM module(s) with Gigabit Ethernet WAN
uplink
L/C modules and ICM module(s) with Gigabit Ethernet
Key Benefits
Unlimited scalability
Build out the network as needed with the AN.2000 IB modular, high-density
architecture. The product scales gracefully from 24 to 2,424 subscribers per system.
All subscribers can be provisioned easily through dynamic provisioning.
Open interface
Interoperates with third-party gear and networks as needed; the AN.2000 IB solution
uses an open architecture interface and supports multiple ADSL standards.
New revenue generating services
Supports IP multicasting for video and value-added services, and deliver always-on
broadband data and video, high-speed Internet access, VPNs, distance learning, and
enterprise networking to business and residential customers.
High-speed remote access
Provides the satellite-to-headquarters connectivity many of your business customers
need with an economical AN.2000 IB high-speed LAN. Interface solution that
delivers higher network speeds than leased-line or dial-up solutions.
The AN.2000 IBTM DSLAM is a carrier class, high- performance IP-based DSLAM
access network solution that delivers always-on, high-speed Internet data and video
services to subscribers over a wireline network.
The AN.2000 IB interfaces directly with the IP MAN (metropolitan area network)
with a WAN interface to deliver broadband data services cost-effectively and
eliminate the need for costly ATM infrastructure. It enables service providers to
protect their investment and strengthen their customer relationships by offering their
customers a wide variety of creative interactive services and applications.
This low-cost, high-performance IP-based solution seamlessly migrates the access
network from narrowband voice-only services to full broadband capabilities.
MAJOR FEATURES:
Next Generation Solution
IP Based solution suitable for migration to full IP Networks
Low cost and feature rich
High performance - throughputs in the range of 4 Mbps per subscriber
Modular High Density Architecture
Modular design: Scalable from 24 to 2,424 subscriber lines per rack by
chaining together up to 6 sub-racks per rack (reduced to 3 when equipped
with 3 POTS splitter sub- racks in the same rack).
High density: Up to 408 ports per sub-rack (17 modules with 24 ports per
module).
Summary
DSLAM is an integrated hardware and software system that allows the user to access
Broadband services as well as originate and terminate telephone calls over the same
single pair of copper wires
A Digital Subscriber Line Access Multiplexer (DSLAM) delivers exceptionally high-
speed data transmission over existing copper telephone lines.
A DSLAM takes connections from many customers and aggregates them onto a
single, high-capacity connection to the Internet. DSLAMs are generally flexible and
able to support multiple types of DSL in a single central office, and different varieties
of protocol and modulation, both CAP and DMT, in the same type of DSL. The
DSLAM may provide additional functions including routing or dynamic IP address
assignment for the customers. DSLAM provides Access from 128Kbps to 8Mbps.
Typically used DSLAM in a network serves to cater users traffic to core network
through switches. It has an additional function of allocation of dynamic IP address,
routing, VLAN configuration, and Multicasting.
DSLAM are employed according to the capacity of product.
RJ11 Connector
Network Side Line impedance: 100 Ohms
Connection loop: Single pair (two-wire)
RJ11 Connector
Line impedance: 100 Ohms
Network Side
Connection loop: Single pair (two-wire)
Interoperability complies with TR-48
RJ11 Connector
Line impedance: 100 Ohms
Network Side
Connection loop: Single pair (two-wire)
Interoperability complies with TR-48
RJ11 Connector
Line impedance: 100 Ohms
Network Side
Connection loop: Single pair (two-wire)
Interoperability complies with TR-48
RJ11 Connector
Line impedance: 100 Ohms
Network Side
Connection loop: Single pair (two-wire)
Interoperability complies with TR-48
Interfaces:
Customer
RJ45 Connector (10/100Base-T Ethernet )
Side
RJ11 Connector
Network Line impedance: 100 Ohms
Side Connection loop: Single pair (two-wire) Interoperability
complies with TR-48
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 PSU1 PSU2
Trunk Cards
FAULT 2 2 TRANSMIT
U
+
T
100 % I
SPAN SPAN MONITOR L
+
U DS3 NIC I SPAN 1
T 3 3 CHANNEL RECEIVE Z
I A
L T
I
SPAN TX I
Z CHANNEL O
A 4 N
T +
I 0%
O
N TX TX TX
RX
+
0% RX RX
CHANNEL RX
SELECT SELECT
Trunk Cards
DSP Multispan, DS-3 Ingress and HiPer DSP
Description The tree different card sets shown on the facing page are available to
terminate PSTN T1/E1 spans.
Currently, only two of the NACs perform modem functions – the DSP
Multispan and the HiPer DSP.
Trunk Cards
DSP Multispan
DSP
Multispan
NIC NAC
RN/FL +
SPAN
1 2
CAR ARC DC DC
Access NMC PSU PSU
ALM
Router 130A 130A
LPBK/
DALM
3 4 PSU RN/FL PSU RN/FL
RN/FL RN/FL PSI RN/FL PSI RN/FL
CAR
LAN TX HUB
ALM STATUS
LAN RX
LPBK/ LAN
DALM WAN TX
TX LAN
FAULT WAN RX
RX WAN
TX
STAT 1 TX
100 %
WAN
WAN
+ STAT 2 RX
U STAT 3
T R
I
L A
I S
Z 1
A
HUB
T NUMBER/
I STATUS
O
N
+
0%
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 PSU1 PSU2
Trunk Cards
DSP Multispan
Description PSTN calls are passed to/from the DSP Multispan NAC either by:
DSP Multispan T1 or E1 NIC via a front to back TDM bus.
DS-3 Ingress NAC via midplane TDM bus spanning slots 1-16.
Calls terminate on highly integrated NAC modems (96 T1 and 90 E1).
Modem processes (demodulates) analog or digital call from the PSTN
and passes the data over the packet bus to the ARC. Modem density is
twice the density of the DSP chips used on the HiPer DSP NAC.
The ARC formats the information, performs standard routing
functions and sends the call data out of the chassis via an Ethernet
connection to a LAN for termination or further routing to the
Internet/Intranet.
Hardware and software is scalable to allow increase in modem port
density. Cards are hot swappable and software upgradeable.
NAC is physically comprised of baseboard and modem modules.
Each modem module provides a co-processor and DSP subsystem.
A single DSP can handle multiple modem sessions, ISDN processing
and PPP co-processing. NFAS (multiple PRI lines use the same D-
channel for signaling), SS7 and v.34, v.90, and v.92 connections are
supported.
NAC interfaces include:
TDM bus to its own NIC and DS-3 Ingress NAC.
Packet bus to ARC.
Management bus to NMC.
PCI bus to 4 modem co-processor and modem modules (daughter
boards).
RISC CPU subsystem interface for PowerPC and NAC board manager
supervisor support.
LED interfaces to several LEDs on NAC front plate.
Compatible with DS-3 Ingress, ARC, HiPer ARC (expanded
memory), NMC, and HiPer NMC (P5) card sets. Managed by TCM
(8.2.6) or CEM.
Can coexist with HiPer DSP card set when TDM bus (DS-3 Ingress
card) is not used.
TRUNK CARDS
DSP Multispan NAC
NIC NAC
RN/FL + Run/Fail NIC and NAC LEDs
SPAN
1 2 Spans 1 and 2 LEDs
CAR Carrier
ALM Alarm
LPBK/ Loopback / D-channel Alarm
Spans 3 and 4 LEDs DALM
3 4
Carrier CAR
Alarm ALM
Loopback / D-channel Alarm LPBK/
DALM
Face Plate
Trunk Cards
DSP Multispan NAC
Description Same NAC with different code can be used for T1 and E1
applications.
Generally, NAC and NIC can occupy any chassis slot except slot
17. When used in conjunction with DS-3 Ingress, NAC must be
installed in slots 3-9 with slot 10 reserved for future redundant
NAC.
LEDs identify channel utilization and board-level status. LEDs
are available for all (4) T1 or (3) E1 spans.
Shares common code base with HiPer DSP.
LED Indications
RN/FL green Card has completed the Power On Self Test (POST).
Trunk Cards
DSP Multispan T1 NIC
DSP Remote PC
Multispan T1
Console port, user 12 ft. RS-232 Cable Modem
interface (UI), RJ-45 CONSOLE (provided by 3Com)
DTE port, unbalanced CLI
PSTN
RS-232, fixed 9600 bps
Null Modem Adapter Local PC
AUXPORT (provided by 3Com)
Auxiliary, RJ-45 DTE
SDL Com
port, fixed 115,200 bps Port 1
2 PCM
T1 Span ports (4), RJ-48C,
SPAN Framing: ESF or D4 (SF)
Line Coding: B8ZS, AMI, zero code suppre ssion
3 Interfaces: DS-1 long haul or DSX-1 short haul
SPAN
Link LED Not Populated
4
Monitor LED - solid yellow indicates Bantam
jack is monitoring this span.
TX
Bantam Monitor Jack for connecting equipment to monitor TX
RX
(transmit) and/or receive (RX) activity on the different T1 span s.
MONITOR
Used to change span line to be monitored.
SELECT
Circuit Board
Face Plate
Trunk Cards
DSP Multispan T1 NIC
Trunk Cards
HiPer DSP
HiPer
DSP
RN/FL
CAR
ALM ARC DC DC
Access NMC PSU PSU
LPBK Router 130A 130A
LAN TX HUB
STATUS
LAN RX
LAN
100 % WAN TX
TX LAN
+ WAN RX
U RX WAN
T TX
STAT 1 TX
I WAN
WAN
L STAT 2 RX
I STAT 3
Z R
A
T A
I S
O 1
N
+ HUB
NUMBER/
0% STATUS
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 PSU1 PSU2
Trunk Cards
HiPer DSP
Description The HiPer DSP card set provides a purely digital connection with
24 dial-up modems for T1 and 30 dial-up modems for E1.
Span line channels can be permanently assigned to specific
modem channels or they can be configured to find an available
modem.
Like the DSP Multispan, the HiPer DSP supports several different
PSTN switches, frame types, and line coding for channelized T1,
E1/R2, T1/PRI, and E1/PRI. Unlike the DSP Multispan, DS-3 is
not supported.
The HiPer DSP NAC is used with the HiPer DSP T1/E1 NIC,
which terminates a single T1 span or E1 span. For the DSP
Multispan, separate NICs were required for T1 and E1.
Unlike the DSP Multispan NAC, which is identical in terms of
PCB hardware used for T1 and E1 applications, the HiPer DSP
NAC requires additional (6) modems for E1 applications.
However, as with the DSP Multispan, the NAC does require
different operating code for T1 and E1.
Contains a fully programmable Digital Signal Processing (DSP)
chip or engine. Can be reconfigured for new modem technologies
and applications.
HiPer DSP modem density is half the density of the DSP chips
used on the DSP Multispan NAC.
Supports SS7, NFAS, V.Everything®, and V.92 technologies as
well as the most common communications standards.
Supports digital data for end-to-end transmission over ISDN
including Sync PPP, ITU-T V.120/I.462 (U.S.), ITU-T
V.110/I.463 (Europe and Japan), 64 Kbps and 56 Kbps clear
channel HDLC, X./75 (Germany), and 32Kand 64K PIAFS.
Compatible with the ARC, HiPer ARC, NMC and HiPer NMC
card sets. Not compatible with the DS-3 Ingress card set. Can
coexist with DSP Multispan card set when TDM bus is not used.
Cards are hot swappable and software upgradeable.
Trunk Cards
HiPer DSP NAC
HiPer
DSP
100 %
+ 100
U
T 90
I 80
L 70
I
60
Z (Modem) Utilization % LEDs
A 50
T 40
I
O
30
N 20
+ 10
0%
Trunk Cards
HiPer DSP NAC
Description Different NAC with different hardware and software code are
used for T1 and E1 applications.
Always used with a NIC and card set can occupy any chassis slot
except slot 17.
LEDs identify channel utilization and board level status. LED
indications are interpreted as follows.
LED Indications
RN/FL green Card has completed the Power On Self Test (POST).
Trunk Cards
HiPer DSP T1/E1 NIC
J9
AIS LPBK
T1 OFF
E1 ON
HiPer DSP
T1/E1 NIC
Remote PC
Console port, user
interface (UI), RJ-45 12 ft. RS-232 Cable Modem
DTE port, unbalanced (provided by 3Com)
CLI
RS-232, max 9600 bps PSTN
CONSOLE
PORT Null Modem Adapter Local PC
(provided by 3Com)
Auxiliary, RJ-45 DTE Com
port, max 115,200 bps SDL Port 1
PCM
T1 Span port, RJ-48C,
Framing: ESF or D4 (SF)
SPAN 1 Line Coding: B8ZS, AMI, zero code suppre ssion
Interfaces: DS -1 long haul or DSX-1 short haul
TX
RX Bantam Monitor Jack for connecting equipment to monitor TX
(transmit) and/or receive (RX) activity on the T1 span.
MONITOR
Circuit Board
Face Plate
Trunk Cards
HiPer DSP T1/E1 NIC
AIS T1
AIS T1/E1 (Default) AIS E1
J9
AIS LPBK E1 ON
E1 ON E1 ON
T1 OFF
E1 LPBK ON
LPBK OFF T1 LPBK ON
E1 ON
T1 OFF
T1 OFF T1 OFF
E1 ON
E1 ON E1 ON
Trunk Cards
DS-3 Ingress
DS3
INGRESS
NIC NAC
RN/FL +
ALM ARC DC DC
Access NMC PSU PSU
LPBK Router 130A 130A
LAN TX HUB
STATUS
LAN RX
LAN
WAN TX
TX LAN
WAN RX
RX WAN
TX
STAT 1 TX
WAN
WAN
MONITOR STAT 2 RX
STAT 3
CHANNEL R
A
TX S
CHANNEL
1
HUB
NUMBER/
STATUS
RX
CHANNEL
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 PSU1 PSU2
Trunk Cards
DS-3 Ingress
Trunk Cards
DS-3 Ingress NAC
NIC NAC
RN/FL + Run/Fail NIC and NAC LEDs
4
Monitor Port LED
characters
MONITOR
Face Plate
Trunk Cards
DS-3 Ingress NAC
Trunk Cards
DS-3 Ingress NIC
DS3 Remote PC
INGRESS
NIC 12 ft. RS-232 Cable Modem
(provided by 3Com)
CLI
PSTN
CONSOLE
Null Modem Adapter Local PC
(provided by 3Com)
SDL Com
Port 1
Telco Switch
DS3 NIC
RECEIVE
BITS IN
Face Plate
Trunk Cards
DS-3 Ingress NIC
Gateway Cards
ARC or HiPer ARC
NAC NAC NIC
RS-232
LAN TX LAN TX
LAN RX LAN RX
ETHERNET 2
TX/RX
LINK
10/100 BaseT
Gateway Cards
ARC or HiPer ARC
Description Ethernet and frame relay connections between the RAS TC 1000
4.5 chassis and a LAN or WAN are made via gateways.
There are two types of gateway cards:
ARC
HiPer ARC (with expanded memory)
The ARC and HiPer ARC interface to one or two Ethernet
networks via the Dual 10/100 PCI Ethernet NIC.
At least one gateway card set is required in the RAS TC 1000 4.5
chassis.
LAN protocol support include IP, IPX and DHCP address
assignment.
The router cards also provide WAN support PPP, SLIP, Frame
Relay, and ATM DS3. PAP, CHAP and MS-CHAP is supported
for authentication.
Distributed security services allow dial-in user authentication
across multiple router cards.
The router cards work with a RADIUS server for password
encryption, dial-back and other security measures to protect
network services. Encryption is optional.
Per-user filtering provides additional security once a user is
granted access to the network.
Gateway Cards
ARC or HiPer ARC
ARC
Access
Router
RN/FL
DSP DC DC
Multi- LAN TX NMC PSU PSU
span 130A 130A
NIC NAC
LAN RX
RN/FL + PSU RN/FL PSU RN/FL
WAN
SPAN RN/FL PSI RN/FL PSI RN/FL
1 2
TX
CAR WAN HUB
ALM STATUS
RX LAN
LPBK/
DALM TX
3 4 STAT 1 LAN
CAR
RX
ALM
LPBK/
STAT 2 WAN
TX
DALM
WAN
FAULT STAT 3 RX
100%
+
U R
T
I A
L
I S
Z
A
T
1
I HUB
O NUMBER/
N
STATUS
+
0%
1 2 3 4 5 6 7 8 9 10 11 12 13 14 17 PSU1 PSU2
Gateway Cards
ARC or HiPer ARC
The ARC and HiPer ARC perform identical functions.
Description
Multi-protocol dial-up router and terminal server commonly
described as a remote access server.
Serves as a software-based router for incoming call traffic
terminated on DSP Multispan or HiPer DSP NACs.
Receives incoming traffic from the DSP Multispan or HiPer DSP
via a packet bus on the chassis midplane.
Formats and forwards the information to a LAN connected to one
of the Ethernet ports on its NIC.
NAC and NIC communicate via front-to-back PCI bus.
The ARC and HiPer ARC have many configurable parameters to handle a
wide variety of applications and features.
The ARC and HiPer ARC can be configured and managed using the CLI
over a Telnet connection or a direct serial line (RS-232) connection.
You can also configure and manage either NAC using the UTStarcom
Common Element Manager (CEM) and SNMP.
Redundant and load sharing ARCs support up to 672 analog or ISDN calls.
For the HiPer ARCs, 450 analog or ISDN calls.
Gateway Cards
ARC or HiPer ARC NAC
LED Indications
Run/Fail (RN/FL) at Startup Run/Fail (RN/FL) after Startup
Red = Power On Self Test Off = Power off
(slow flashing) Amber = SDL check Green = Power on
(rapid flashing) Green = Load Application into RAM Red = Critical failure
HiPer (solid) Green = Normal Operation
Side View
Midplane
OFF
ON
DIP Switch
1 2 3 4 5 6 7 8 910
Positions
Face Plate
Gateway Cards
ARC or HiPer ARC
DIP switches There is a bank of ten DIP switches located behind the faceplate at
the bottom right side as you view the card from the front.
The switches are small, cream-colored, and somewhat difficult to
access. The switches and their settings are the same for the ARC
and HiPer ARC.
The factory default settings for these switches are all OFF.
As indicated on the facing page, DIP switches 1 and 2 set the
baud rate for the RS-232 Console or UI port on the ARC or HiPer
ARC NIC.
If you plan to connect a modem to the Console port on the ARC
or HiPer ARC NIC, set DIP5 to the ON position to enable carrier
detect.
All other DIP switches are reserved for UTStarcom use.
You can use the CLI show board settings command to view
current DIP switch settings.
LEDs Eight LEDs are provided on the front plate for viewing card
operation.
LED indications are described on the facing page and they are
identical for the ARC and HiPer ARC NACs.
Note that the WAN and STAT (status) LEDs are not used.
Gateway Cards
ARC or HiPer ARC Dual 10/100 PCI Ethernet NIC
Remote
PC
Dual 10/100
PCI Ethernet 12 ft. RS-232 Cable Modem 3
NIC (provided by 3Com)
PSTN
Console port, user
interface (UI), RJ-45
DTE port, unbalanced CLI Null Modem Adapter
RS-232, 115,200 bps (provided by 3Com)
max.
RS-232 Com Port 1
1
12 ft. RS -232 Cable RS-232 Cable
(provided by 3Com) (not provided by 3Com) Local
ETHERNET 1 PC
TX/RX
Ethernet 1, 10/100 Mbps Activi ty LED - flashe s green when receiving data,
auto-negotiated, RJ-45 and yellow when sending data.
Link LED - solid green to indicate link is connected
LINK and receiving valid link pulses.
10/100 BaseT
CEM/TCM
Management Local
Station PC
Telnet to
ETHERNET 2
4 HiPer ARC 2
TX/RX or ARC
Ethernet 2, 10/100 Mbps
IP address
auto-negotiated, RJ-45
Ethernet Ethernet
LINK Port Port
10/100 BaseT
Ethernet LAN
Face Plate
Gateway Cards
ARC or HiPer ARC
There are four ways to access the ARC or HiPer ARC for configuration,
Description
management, and troubleshooting purposes:
Connect an RS-232 cable from a PC (within 50 feet) through a
Null Modem Adapter to the Console port on the ARC‘s or HiPer
ARC‘s NIC and establish communication using HyperTerminal
(or equivalent) terminal emulation software.
Telnet from a PC via an Ethernet connection to one of the LAN
ports on the ARC‘s or HiPer ARC‘s NIC.
Dial-in from a remote PC via an external (or chassis) modem.
Use CEM software from a management station attached to ARC‘s
or HiPer ARC‘s NIC Ethernet port.
For initial configuration, you must access the ARC or HiPer ARC via
method 1 above.
Gateway Cards
ARC or HiPer ARC Dual 10/100 PCI Ethernet NIC
Dual 10/100
PCI Ethernet
NIC
Console port, user
interface (UI), RJ-45
DTE port, unbalanced
RS-232, 115,200 bps Face Plate
max.
RS-232
Ethernet and Crossover
switches in down position
ETHERNET 1 Switches
2 1
C
TX/RX Shunt
Ethernet 1 Crossover O
Ethernet 1, 10/100 Mbps
Up N
3
auto-negotiated, RJ-45
J5 N
Down E
LINK
Ethernet 1 Normal C
10/100 BaseT
T
Ethernet 2 Crossover
O
Up
R
Down
Ethernet 2 Normal
ETHERNET 2
TX/RX
Ethernet 2, 10/100 Mbps
auto-negotiated, RJ-45 Side View
LINK
Midplane
10/100 BaseT
Face Plate
Gateway Cards
ARC or HiPer ARC
LAN ports Two high-speed ports, Ethernet 1 and Ethernet 2, provide for
connection to a LAN. Each port is capable of auto-
sensing10Base-T and 100Base-TX.
The Ethernet1 and Ethernet 2 ports are each quipped with a LINK
LED, and a TX/RX (transmit/receive) LED that operate as
follows:
LINK LED lights green when there is a valid Ethernet
connection.
TX/RX LED flashes green when receiving data, flashes
yellow when sending data, and remains unlit when there is
no activity.
Jumper Shunt pins 1 and 2 on jumper J5. This allows this NIC to be used
setting with a NAC other than the NMC or HiPer NMC NAC.
If this NIC were to be used with an NMC or HiPer NMC NAC,
pins 2 an3 should be shunted.
Other ARC Quad T1 Frame Relay with one 10/100 Ethernet port.
or HiPer Dual V.35 Frame Relay with one 10/100 Ethernet port.
ARC DS-3 ATM NIC.
NICs
Management Cards
NMC or HiPer NMC
CONSOLE
RN/FL RN/FL
HUB HUB
STATUS STATUS
LAN LAN
TX TX WAN
LAN LAN
RX RX
WAN WAN
TX TX ETHERNET
WAN WAN 10/100
RX RX
R R
A A 1
S S IN
1 1 0
HUB HUB IN
NUMBER/ NUMBER/ 1
STATUS STATUS
OUT OP
0
OUT CL
0
8
AUX I/O
Management Cards
NMC or HiPer NMC
Description One management card set is required in the RAS TC 1000 EDS
4.5 chassis.
There are two types of network management cards:
NMC (Pentium II 333)
HiPer NMC (Pentium processor)
The NMC and HiPer NMC interface to an Ethernet network via
the 10/100 Ethernet AUX I/O NIC.
Management Cards
NMC or HiPer NMC
NMC
RN/FL
DSP ARC DC DC
HUB
Multi- Access STATUS PSU PSU
span Router 130A 130A
LAN
NIC NAC TX
RN/FL + PSU RN/FL PSU RN/FL
SPAN RN/FL LAN PSI RN/FL PSI RN/FL
1 2 RX
CAR
LAN TX WAN
ALM
LPBK/ LAN RX
TX
DALM
3 4 WAN WAN
CAR TX RX
ALM WAN
LPBK/ RX
DALM
STAT 1
FAULT R
STAT 2
100%
+ STAT 3 A
U
T
I
S
L
I
1
Z
A
T
HUB
I NUMBER/
O NUMBER/
N STATUS
+
0%
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 PSU1 PSU2
Management Cards
NMC or HiPer NMC
Management Cards
NMC (333) NAC
NMC
Run/Fail RN/FL
Face Plate
HUB Status HUB
STATUS
LAN Transmit LAN Reset
TX DIP Switch Description
LAN Receive LAN 1-2 OFF Baud rate of UI port - 9600 bps.
RX
C
3-4 OFF Baud rate if WAN port - 9600 bps. O
WAN Transmit WAN
TX 5 OFF Load from NVRAM. N
WAN Receive WAN ON Load from factory default. N
RX 6 OFF SLIP & UI PW configurable. PW enable E
& disable configurable in UI mode. C
ON SLIP & UI PW disabled. Operates only in T
R UI mode when PW disabled. O
4- character A 7-9 OFF CommWorks use only R
LED display S 10 OFF NMC console redirection disabled.
1
HUB
NUMBER/
Side View
STATUS Midplane
OFF
ON
DIP Switch
Side View
1 2 3 4 5 6 7 8 910
Positions
Face Plate
Management Cards
NMC (333) NAC
DIP switches DIP switch setting are shown on the facing page.
and LEDs Factory default settings are all OFF.
LED Indications
RN/FL green Normal/diagnostics mode/boot-up self-test.
Management Cards
HiPer NMC NAC
HiPer
NMC
Run/Fail RN/FL
Face Plate
HUB Status HUB ST
ON
DIP Switch
Side View
1 2 3 4 5 6 7 8 910
Positions
Face Plate
Description The HiPer NMC, a.k.a. HiPer NMC (P5), has a Pentium
processor with 16 MB of DRAM and 8 Mb of Flash ROM.
Provides AutoResponse, a tool that allows a user to program a
script of responses to be executed when card specific and system
wide events occur.
Supports RADIUS security and accounting.
Management Cards
HiPer NMC NAC
Description Supports V.90/ISDN link rates, cellular operations and extended V.34 link
rates and country codes.
Reports traps to any SNMP alarm server for specific events or faults that
may occur with a card or the chassis.
Compatible with the 10/100 NMC NIC, while not supporting any ISA is-
based Ethernet or Token Ring NICs.
Supports the software download utility, SDL-2, from the UI port on its
NIC.
DIP switches DIP switch settings are identical to the NMC (333) NAC with the exception
and LEDs that DIP 10 on the HiPer NMC is reserved and not used.
LED Indications
RN/FL green Normal/diagnostics mode/boot-up self-test.
Management Cards
NMC and HiPer NMC 10/100 Ethernet AUX I/O NIC
Null Modem Adapter Local PC
(provided by 3Com)
Com
Port 1
Activity LED
ETHERNET
10/100 flashes green when receiving data, NAC
Ethernet, 10/100 Mbps and yellow when sending data.
Shunt C
auto-negotiated, RJ-45 NMC O
J2 N
N
1 Link LED E
IN solid green indicates link is connected C
0 and receiving valid link pulses. T
IN O
Auxiliary Input/Output 1 R
Interface - Not Used
OUT OP
0
OUT CL
0
8 Side View
AUX I/O
Midplane
Management Cards
NMC and HiPer NMC
Description Provides two standard RS-232 DTE ports – Console and WAN, one 10/100
Mbps Ethernet port and one auxiliary I/O ports.
WAN port can be used to manage the NMC through a remote SLIP
connection to a management station running CEM or TCM management
software, or another SNMP program. This port can also be used for a
modem connection to a remote management station.
Auxiliary I/O ports. Provides two auxiliary inputs and two auxiliary
outputs on an 8-pin terminal block for alarm event monitoring and
triggering.
Installation Summary
Notes and Precautions
Racks Three options for mounting 19‖ and 23‖ racks - standard mount, mid-mount
and rear-mount.
Never operate chassis without a working fan tray. Doing so even for short
periods of time can potentially cause damage to chassis cards.
DC and international fan trays have 9 fans each and come completely
assembled. If need be, they can be removed/re-installed from front or rear.
For DC fan tray, complete all connections at the rear of the chassis and fan
tray before cabling the chassis to a DC power source. The tray is powered
continuously – unless the power source is turned off or disconnected.
When cabling DC fan tray safety requirements stipulate that the plastic
cover be replaced over terminals after any connection is made.
The individual fans may continue to spin as you remove the tray. Grip the
sides of the tray, and do not touch the fans until they stop spinning.
Grounding Failure to install proper grounding may cause personnel injury and/or
damage to equipment.
Install only one connector attachment per earthing stud. Install two-hole
compression connectors for connections to flat surfaces.
Power Supplies Power supplies can be AC or DC. Do not mix in the same chassis.
Power supplies may be 70A or 130A. Do not mix in the same chassis.
To reduce the risk of electric shock, install safety panels over unused
PSU/PSI slots.
Wait 10 seconds after power has been removed from PSU/PSI to allow
capacitors on the units to discharge. Do not touch PSU/PSI during this
period. After 10 seconds the RN/FL LED turns off and the PSU can be
removed. Some components may still be very hot so be careful.
Safety requires that the plastic cover be placed over the terminals and
screwed down after any connections are made.
Powering AC Each AC PSU/PSI ships with its own power cord. If using two PSU/PSIs,
Chassis two power cords are required.
To prevent accidental removal of the power cord from the chassis, use
strain reliefs to secure the cord.
The AC input voltage version of the PSU/PSI has a wide range of input
voltage capabilities and can accept any voltage between 90 and 264 VAC.
Each PSU/PSI has LEDs that indicate if power is on. The PSU has an
additional LED indicating operational status of the PSI.
PSU/PSI LEDs should light green when units are installed and powered up.
All Cards Observe ESD precautions when handling NAC/NIC. There are three
chassis ESD plugs – two on the front mounting flange and one on the rear.
Trunk Cards: Verify that NAC and NIC are compatible with each other and with other
HiPer DSP chassis cards. Not compatible with DS-3 Ingress card set.
Install NIC after verifying AIS and LPBK jumper settings on PCB.
After installation and power-up verify that RN/FL LED and CAR LED are
solid green. Other LEDs are off.
Trunk Cards: Verify that NAC and NIC are compatible with each other and with other
DSP Multispan chassis cards.
For DS-3 support, DSP Multispan NIC is not required and DS-3 Ingress
card set must be installed in slot 1. Slot 2 should be reserved for redundant
DS-3 Ingress card set.
For DS-3 support, if DSP Multispan NIC is installed even though it is not
required, then the NAC must be configured to accept DS-3 terminations.
After installation and power-up verify that RN/FL LED and CAR LED are
solid green. Other LEDs are off.
Trunk Cards: Verify that NAC and NIC are compatible with each other and with other
DS-3 Ingress chassis cards.
DS-3 Ingress is not compatible with HiPer DSP, HiPer ARC, and HiPer
NMC cards. NAC does not support channelized T1/E1 or E1 PRI.
DSP Multispan NACs are required to provide modem processing for the
DS-3 Ingress NAC.
DS-3 Ingress card set must be installed in slot 1. Slot 2 should be reserved
for redundant DS-3 Ingress card set.
After installation and power-up verify that the RN/FL NIC and NAC LEDs
are solid-green. Other LEDs are off.
Gateway Cards: Verify that NAC and NIC are compatible with each other and with other
ARC or HiPer chassis cards. ARC and HiPer ARC can be used in the same chassis. For
ARC DS-3 applications HiPer ARC cannot be used.
Install NIC after verifying Ethernet and Crossover switch settings on PCB.
Also that the jumper is set for NAC and not NMC operation.
Connect Ethernet cable to Ethernet 10/100 port on NIC, verify that Link
LED on port turns green. If connecting to ―live‖ LAN, Activity LED
should flash yellow-green to indicate port is sending and receiving.
After installation and power-up verify that RN/FL LED is solid green.
Management Verify that NAC and NIC are compatible with each other and with other
Cards: NMC or chassis cards. For DS-3 applications HiPer NMC cannot be used.
HiPer NMC
Install NIC into rear slot 17 after verifying that jumper on PCB is set for
NMC and not NAC operation.
Install NAC into front slot 17 after verifying that DIP switch 5 is set to off
position to allow the card to boot from NVRAM.
Connect Ethernet cable to Ethernet 10/100 port on NIC, verify that Link
LED on port turns green. If connecting to ―live‖ LAN, Activity LED
should flash yellow-green to indicate port is sending and receiving.
After installation and power-up verify that RN/FL LED and Hub Status
LED are solid green. Other LEDs are off. At power-up LEDs are solid red
for a short period of time.
After initial configuration verify that the management card can talk to the
management station.
Installation Recommended steps are listed below. Some steps may not be necessary:
Process
1. Install chassis.
2. Install fan tray.
3. Install power supply units.
4. Install network manager card set.
5. Apply chassis power.
6. Initialize network management card.
7. Install CEM or TCM management software.
8. Install access router card set(s).
9. Initialize access router card(s).
10. Install DS-3 Ingress NAC/NIC and DSP Multispan NACs for
DS-3 application, or install DSP Multispan NAC/NIC card sets as
needed.
11. Initialize DSP Multispan card sets.
Introduction
The SuperStack 3 Switch 4400 labs contain 12 labs. These labs will take you through
configuration steps using CLI, Web management and 3Com Network Supervisor.
Minimum hardware requirements are:
SuperStack 3 Switch 4400
SuperStack 3 Switch 3300 (or comparable switch)
PC's
RJ-45 cables
List of Labs
Lab1 Basic Configuration
Lab 2 SuperStack 3 Switch 4400 Web Interface
Lab 3 SuperStack 3 Switch 3300 Web Interface
Lab 4 Spanning Tree Protocol
(Optional Rapid Spanning Tree Protocol included)
Lab 5 Resilient Links
Lab 6 Virtual LANs (VLANs)
Access the command line interface (CLI) of the Switch 4400 via console port. Default
login name is admin with no password. You should get the main menu of the Switch
4400.
After logging in again to CLI, issue the following commands to reset the IP address of
the Switch 4400 to factory defaults:
protocol ip initializeConfig
You will then get the following message:
WARNING: This change will lock out all SNMP, Telnet and Web based management
access.
Do you wish to continue (yes/no) [no]: yes
Type in yes and the IP configuration of the Switch 4400 will reset to factory defaults.
Configure your PCs to be in the same subnet (Class C) as your switches. Use
the following IP addresses:
Note: Be sure to define the gateway for the PC connected to the Switch 4400 as the
Switch 4400's IP address
protocol ip ping
Lab 2: SuperStack 3 Switch 4400 Web Interface
Invoke a browser
Enter the IP address of the Switch 4400 in the URL field
The Summary option allows you to view the management parameters configured for
It is in this view that you will do most of the configuration for the rest of the labs.
Click under each of the folders to determine which parameters can be configured.
For example:
By clicking on the System folder, Management folder and then Setup you can
edit the system name, location and contact information displayed in the
Summary view.
By clicking on the System folder, Management folder and then Alert you can
create an alert message to be sent out via email or pager when certain SNMP
event occurs.
Log into the Switch 3300 via a console connection using admin as the login
name and no password.
Menu options: -------------3Com SuperStack II Switch 3300SM-------------
bridge - Administer bridging/VLANS
ethernet - Administer Ethernet ports
feature - Administer system features
ip -Administer IP
logout - Logout of the Command Line Interface
snmp - Administer SNMP
system - Administer system-level functions
Reset the Switch 3300 to factory defaults by issuing the following commands:
system initialize
You will get the following message:
Initializes the system to factory defaults and causes a reset. Do you wish to continue
(yes,no) [no] yes
Type yes. The Switch 3300 will then initialize to factory defaults and reset.
Once you log back into the Switch 3300 through CLI, issue the following
commands to assign an IP address to Switch 3300
ip interface define
Use the following IP addresses, a Class C subnet (255.255.255.0) and do not define a
gateway.
Team 1: 192.168.1.202
Team 2: 192.168.2.202
Team 3: 192.168.3.202
Team 4: 192.168.4.202
Using the PC not connected to the Switch 4400, connect it into port 1 to test
out the connection between the PC and Switch 3300. What do the LED's look
like?________
Ping the Switch 3300 from the PC 's MS-DOS prompt.
Ping the PC from the Switch 3300 by issuing the following CLI commands:
ip ping
By default, the Spanning Tree Protocol on the Switch 4400 is enabled using Rapid
Spanning Tree (802.1w) and the Switch 3300 has Spanning Tree Protocol disabled
using the standard version (802.1D)
Using a RJ-45 cable, connect the 2 switches together via port 2 of each switch.
Create a continuous ping from PC to PC from each PC
Through the web browser on the Switch 4400, click on the Bridge folder,
Spanning Tree folder and then Setup to confirm that Spanning Tree is enabled.
Through the Web browser on the Switch 3300 login into the Switch 3300,
click on the configuration hot link or icon. Advanced Stack Setup pop up
screen appears, enable Spanning Tree and apply the change.
Access the Switch 4400 through CLI to find out the Spanning Tree state of
port 2 and port 3 by issuing the following commands:
bridge port summary
While viewing the continuous ping, disconnect the cable where both ports are
in forwarding mode and count how many seconds it takes for
the ping traffic to transfer to the other cable?
______________________________
Discontinue the continuous ping.
2 switches that support Rapid Spanning Tree Protocol execute the following
steps to test out Rapid Spanning Tree Protocol.
Enable Spanning Tree on both units
Select Rapid Spanning Tree as the version of choice
bridge spanningTree stpversion
Connect 2 cables to port 2 and port 3 of each unit
Create a continuous ping from each PC
Disconnect one of the cables.
How many seconds did it take for the ping traffic to transfer to the other link?
_______________
Remove the two RJ-45 links connecting the two switches together in the previous
lab.
On the Switch 4400, click on the Bridge folder, Resilient Links folder, and
Summary to ensure that there are no other resilient links defined.
To add a resilient link pair, click on the Create wizard located in the Resilient
Link folder under the Bridge folder.
When you try to create a resilient link, the following message appears informing
you that resilient links can not be defined while Spanning Tree is enabled.
Disable Spanning Tree by clicking on the Bridge folder, Spanning Tree folder,
Setup and selecting disable for state. Click OK to continue.
Once again, click on the Create wizard under the Resilient Link folder under
the Bridge folder. Click Next.
Select the operating mode and administrative mode of the resilient link pair.
For this lab, leave the settings as they are and click Next.
Operating Mode
Symmetric - manually switch back to the mail link from the standby link
Switch-back- automatically revert back to the main link from the standby link
Administrative mode
Enable - initially enable the link
Disable - initially disable the link
The next page summarizes the configuration of the resilient link pair you just
defined. Click Finish to complete the configuration.
Verify the definition of the resilient link pair by clicking on Summary. You
will see the links as failed since you have not connected the links to the switch
3300 yet.
Connect ports 17 and 18 of the switch 4400 to ports 17 and 18 of the Switch
3300. Display the summary of resilient links again.
What is the status of the LEDs of the ports of the resilient link pair on the Switch
4400?
LED of port 17 ____________
LED of port 18 ____________
This lab will show how to setup VLANs on the Switch 4400 and Switch 3300. You
will create VLAN2 that contains ports 19-24 on both switches.
Reset to factory defaults on the Switch 4400 and Switch 3300 using the Web
management interface. On the Switch 4400 click the following commands:
system control initialize
You will get the following pop up screen message. Click OK to continue.
Provide a single connection between the Switch 4400 and Switch 3300 via
port 24 of their respective switches.
On the Switch 3300, create VLAN 2 with a VLAN tag of 2. The VLAN
configuration page can be found in the configuration pages under VLANs
Once VLAN 2 is created, add port 24 as an 802.1Q-tagged port for the switch.
This is done by selecting port 24 on the left window and clicking on Add >> while
VLAN 2 is selected.
Add ports 19 – 23 on the Switch 3300 to VLAN 2. You must add them using
the device view of the Switch 3300. This is done by clicking on the specific
port on the device view and assigning the untagged port VLAN membership to
VLAN 2 and clicking on Apply. An example for port 19 is shown below.
Configuring VLANs on the Switch 4400 can be done presently only via the
CLI. Log into the Switch 4400 via CLI through a telnet session or the console
port.
The CLI will ask you what is the VLAN ID and the name of the VLAN. Use a
VLAN ID 2 and VLAN Name VLAN 2.
Add port 24 as a tagged member of VLAN 2 by issuing the following
commands:
bridge vlan modify addPort
Test out your VLANs by connecting a PC into port 6 of the Switch 4400 and a
PC into port 21of the Switch 3300 and issuing a ping
command.
Did it work? _____________________________
Connect both PCs to VLAN 2.
Did it work? _____________________________
Disconnect the RJ-45 cables used for this lab.
Project 3
[Messaging and Storage Service Platform, Provisioning, Billing & Customer
care, Enterprise Management System (EMS) and Security System.]
The Core messaging system shall be the heart of NIB-II that will enable BSNL to add
users across varied value added services. This shall envisage design and up gradation
of the current messaging system to grow from the existing infrastructure in NIB-I
supporting 650,000 users to support the increasing user base. The messaging systems
and associated Storage will be implemented in phases, in accordance with phased
induction of Access equipment.
The system shall be an integrated provisioning, billing, customer care and accounting
platform and shall support billing for the complete range of IP based services
mentioned and meet next-generation requirements as well.
The salient aspects of the projects are summarized as follows:
Setting up proven, robust, scalable Messaging Solution with best in class
security components.
Roll out across the country supported by 5 Messaging & associated storage
systems at Delhi, Mumbai, Bangalore, Chennai and Kolkata.
Designed with High Availability architecture with no single point of failure.
Storage platform
Security Systems
These include the following.
Load Balancers
Firewall Appliances
Intrusion Detection System
Antivirus system, etc.
Network Operation Center (NOC)
The NOC shall provide facility for centralized Network Management and end-to-end
Provisioning of multiple services, giving a single view of the entire network services
being delivered countywide. The servers for the NOC shall be connected through a
Gigabit Ethernet link from Core router with three zones of firewall within the Centre.
The network shall be centrally managed from Network Operation Centre (NOC)
located at two sites, one of them being master and the other the disaster recovery site.
The main NOC is at Bangalore with Disaster Recovery is at Pune. Interface to the
NMS back-office facility shall be provided along with Firewall security in the Data
Centre. All customer databases shall reside centrally at NOC.
The NMS of NIB-II project 1 is the comprehensive NMS for entire NIB-II including
NIB-I, MPLS VPN, Project 2.1, Project 2.2, which will support entire F (Fault), C
(Configuration), A (Accounting including Access/Inventory), P (Performance) and S
(Security functionality). The conceptual view of eMS, NMS OSS/BSS for NIB-II is
given in figure 1 and the connectivity Architecture of NOC at Bangalore is shown in
figure 2.
Web Collocation
Necessary Security measures will be implemented both from customer and
BSNL‘s perspective
Billing for this will be done on the basis of usage
One of the service differentiator will be bandwidth on which the server is
collocated.
Security Solution
Anti-Virus solution: It will provide a mechanism to detect unknown virus. The
solution will protect any Gateway and SMTP traffic from virus
Notification: For mails containing repeated complaints regarding abuse from
the same IP address, mail will be sent automatically to the technical contact of
the assignee of that IP address
Network Intrusion detection System: The NIDS will detect unauthorized
internal/external intrusion attempts into the data centers of NIB-II and will
enable to apply appropriate policies on the firewall so as to prevent such
attacks in real time. Suitable alarms will also be sent to the Security Control
Console
Anti Control System: It is provided for Database servers, Messaging Stores,
Web-Hosting Servers and NIDS
Self-protection: Must be able to prevent hackers with
root/administrator access from circumventing or shutting down the
security engine
Resource protection: Must allow controlling of access to all system
resources including data files, devices, processes/services and audit
files
Rights delegation: Must provide the ability to designate specific users
as administrators, auditors and password managers etc with appropriate
rights
Program Controls: Must provide protection against Back Doors and
Trojan Horses
Enterprise Management System
Objective of EMS is to provide a snap-shot graphical view of the health of
NIB-II IT infrastructure as a whole including networking equipment, servers
and services (business and process view)
Reporting system will be able to generate customized reports such as event-
level, performance -level and service-level reports grouped by specific data
fields such as time period, location, customer, series type, device type etc
Security Management will display alarm and events specified by the criteria
such as alarm type, vendor, service, location, source of attack, type of attack
and impacted services
Event Management will capture all the events that are being generated across
the complete IT infrastructure, correlates them and initiate corrective actions
automatically, as defined
System& Application Management will measure the availability and
performance of heterogeneous host systems on a 24x7x365 basis and initiate
preventive and corrective actions automatically
System& Application Management will monitor and manage multiple
attributes (such as status, memory usage, size and resident size, process time,
threads, response time, average throughput and CPU utilization etc) of a
running process and problems and perform restart when processes go down. It
will generate reports on QOS and capacity planning
Database Management will be able to manage tables including database, table
space, buffer pool, processes and session summaries. It will be able to look at
thresholds of objects like free space, process page faults, transaction rates and
average wait time
Service Management will be able to measure Availability /response time of
applications (Basic services, Email services, Web services, Mission critical
applications). It will be possible to specify SLA for the applications and
monitor them
EMS will have tool to monitor SLA .It will provide alerts for SLA violations
and violation trends, for proactively correcting service level problems
Asset Management will store hardware and software inventory information of
all the servers and desktops& creating, tracking and maintaining records for
the assets and components
Objective of Operation Support System (OSS)
OSS ARCHITECTURE
Database DB
Rating
ticketing/Help desk
DB
management
Payment Reporting
Provisioning
Accounting
Subscriber
Trouble
Order
GL &
others
Enterprise Management
Database
Voucher Management
Fault Management
Service Activation
Network Inventory
Mediation
Database
system
system
NIB-II Network Infrastructure (NE&NEManagers) All NIB-II Servers (Networking and
procured in project 1,2.1,2.2 Security Appliances and their Element
Managers)
Figure 3
Web Portal
Web Portal will be the gateway for customer and CSR based on their
authorizations for accessing various system, services etc
Portal will have an integration, with NMS, EMS and OSS for providing
services to the BSNL‘s customer service representatives (direct, indirect,
helpdesk, supervisor) and account managers
Portal services Ranging from business, process, network, customer specific
maps/views, trouble-ticketing, pre-sales query, post-sales order-booking, order
tracking, trouble –shooting etc
Portal will integrate with components like Service Provisioning, Order
Management, Billing, Customer Care, EMS and Messaging etc. to provide a
unified view of the network and services to the customers and CSRs for all the
front office functions and some back office functions
Order status and history provide both subscribers and the customer service
representatives with sufficient data to fully manage and monitor the service
selection and delivery process
It will be possible to provide a user friendly interface for customers to plan
and schedule their bandwidth for Band width on Demand services
Services provided by portal to the customers
Customer registration services for both pre-paid and post-paid customer
Self-registration for getting information about products and services
Self-registration for availing services such as post-paid dialup service based on
telephone number authentication
Shopping cart for procuring services
Access to services such as messaging, web-hosting, storage and content-
services etc. This will include on demand services like video on demand and
online gaming etc
Booking an order for services. Allow the user to submit, and track service
requests online at any time
View current bill status in real time including billed, unbilled and pre-billed
services, payment-details and other related information
Reporting a problem by opening a fault docket and tracking its solution
View the status of related network and services subscribed
View the status of SLA compliance, SLA resolution and rebates applied
through integration with billing and NMS
ORDER MANAGEMENT
OM will have
Customer Interface Management
Order Entry and Validation
Workflow Management
Customer Interface Management & Order Entry and Validation:
Order will be entered through Web-portal by CSR or Customer directly
CSR will accept the order after completion of signed order form by the
customer. He will scan it and attach it with the online order form
All orders will be checked against the feasibility from the RMS For all
committed orders, check will be made for customers credit worthiness/default
and the billing system will generate a unique ID for the customer
It will be possible to query the status of order, service, billing etc. on the basis
of unique ID
OM will track the order status
OM will inform the billing system of successful provisioning or else it will
roll back all the steps
Record all the transactions between OM and customer
DATABASE
Billing engine will cater to all the billing requirements of BSNL include Retail
Billing (Prepaid and Postpaid), Wholesale and third party billing, Inter connect
and content billing, Dealers and Agents Commissions etc
Billing system will support the preparation of detailed bill, Differential tariff,
Cross product discounting, Sponsored/split billing. Bundled accounting, Hot
billing/On-demand billing, Hierarchy/ Corporate billing, Discounts &
Promotions, Taxes, Notification system, Dealers and Agent commissions,
Content Billing
Billing system will allow customers the option of receiving complete event
details along with their invoice or view them online through the Web portal.
Provision will also be available for the customer to print the event-details from
the Web portal in a printable format
Content Billing
System will provide BSNL subscribers to access services provided by external
content providers and be able to handle the revenue sharing with the content
provider within the single billing platform
System will allow content providers who do not have their own customer care
and billing system to use the billing system of BSNL
Authentication, Authorization and Accounting
Irrespective of mode of access (such as Dial-up Internet access, outsourced
remote access, managed VPNs, Broadband etc), it will manage the
Authentication of all users/customers- both locally and via proxy RADIUS-
and deliver the appropriate level of service to each customer
It will enable defining access schemes by time-of days, days-of-week, call
type (PSTN, ISDN and DSL etc.), calling number and called number etc
It will be capable of authenticating through CLI, DNIS, Voucher number, pin
code etc
Radius server will be able to handle at least 10,000 concurrent sessions per
second
It will integrate with Billing server for providing real time pre-paid balance
management and session management across multiple sessions of multiple services of
a user.