Escolar Documentos
Profissional Documentos
Cultura Documentos
V800R007C10SPC100
Product Description
Issue 07
Date 2017-02-28
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Purpose
This document describes the NE20E in terms of its product positioning and features,
architecture, technical specifications, supported FPICs, link features, service features, usage
scenarios, and operation and maintenance.
NOTICE
Note the following precautions:
l The encryption algorithms DES/3DES/SKIPJACK/RC2/RSA (RSA-1024 or
lower)/MD2/MD4/MD5 (in digital signature scenarios and password encryption)/SHA1
(in digital signature scenarios) have a low security, which may bring security risks. If
protocols allowed, using more secure encryption algorithms, such as AES/RSA
(RSA-2048 or higher)/SHA2/HMAC-SHA2 is recommended.
l Do not set both the start and end characters of a password to "%^%#". This causes the
password to be displayed directly in the configuration file.
l To further improve device security, periodically change the password.
Related Version
The following table lists the product version related to this document.
U2000 V200R015C50
Intended Audience
This document is intended for:
l Network planning engineers
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
Convention Description
Change History
Updates between document issues are cumulative. Therefore, the latest document issue
contains all updates made in previous issues.
Contents
2 Product Architecture..................................................................................................................... 4
2.1 Physical Architecture......................................................................................................................................................5
2.2 Logical Architecture....................................................................................................................................................... 6
2.3 Software Architecture.....................................................................................................................................................7
2.4 Data Forwarding Process................................................................................................................................................9
3 Technical Specifications.............................................................................................................11
4 Board Specifications................................................................................................................... 15
5 Energy Conservation and Emission Reduction..................................................................... 17
6 NMS............................................................................................................................................... 19
A Acronyms and Abbreviations.................................................................................................. 21
The NE20E-S2 run on the Versatile Routing Platform (VRP) operating system developed by
Huawei and use hardware-based forwarding. The NE20E-S2 feature carrier-class reliability,
line-speed forwarding capability, perfect quality of service (QoS) mechanism, service
processing capabilities, and good extensibility.
The NE20E-S2 provide strong capabilities in network access, Layer 2 switching, and
transmission of Ethernet over Multiprotocol Label Switching (EoMPLS) services. The
NE20E-S2 also support rich interface types and provide broadband access, triple play, IP
leased line, and virtual private network (VPN) services. The NE20E-S2 can also work in
conjunction with the CX, NE, and ME devices developed by Huawei to set up a hierarchical
metro Ethernet that provides rich services for customers.
NE20E-S2E DC:
NE20E-S2E AC:
NE20E-S2F DC:
NE20E-S2F AC:
2 Product Architecture
Monitoring
power 3.3 V
Monitor bus
48 V/ 220 V Monitor bus
48V power
RTN 48V power
PWRB
FAN
Monitoring Monitoring
power 3.3 V power
48 V power
Monitoring
power 3.3 V
Backpl 48 V power
Clock ane
Monitoring
power Physical
PIC0 Monitor bus interface
t
Data bus Clock
IPU
Management bus Monitor bus
Data bus
Service
48 V power Management interface
bus
Monitoring
power 3.3 V
Clock
PIC1
Monitor bus
Data bus
Management bus
Monitoring
System System
plane
monitoring unit monitoring unit
System System
Control and monitoring unit monitoring unit
management
plane
Management PIC
Management unit management
unit unit
Data
Forwarding
plane
unit
l The data plane is responsible for high speed processing and non-blocking switching of
data packets. It encapsulates or decapsulates packets, forwards IPv4/IPv6/MPLS packets,
performs QoS as well as scheduling and internal high-speed switching, and collects
statistics.
l The control and management plane completes all control and management functions for
the system and is the core of the entire system. Control and management units process
protocols and signals, configure and manage the system, and display the system status.
l The monitoring plane monitors the ambient environment to ensure the secure and stable
operation of the system. It detects voltage levels, controls system power-on and power-
off, monitors the temperature, and controls fan modules. If a unit fails, the monitoring
plane isolates the faulty unit promptly so the other units remain unaffected.
F F
OI I M T o o
B V B R P T U A P H V R rw rw
SSI RG S a a N
S P G I IP C D R P DL U rd rd
P I PMM D E
A N P M P P P P L A N in
g
in
g C S T X
F S P P C N
K L N C P
I M O L
SSP SMP P
N
BOS DRIVER F
NP LOGIC
PIC
Datagram Datagram
Packet
PFE IPv4 unicast Searching the
IPv4 unicast encapsulation
MPLS routing table to and forwarding in
forward packets MPLS
IPv6 the downstream
IPv6
MAC direction
Congestion Queue
scheduling QoS in the
QoS in the management
downstream
upstream Queue Congestion
direction
scheduling management
TM
Packet reassembly
As shown in Figure 2-4, the packet forwarding engine (PFE) uses a network processor (NP)
or an application-specific integrated circuit (ASIC) to implement high-speed packet routing.
External memory types include the static random access memory (SRAM), dynamic random
access memory (DRAM), and net search engine (NSE). The SRAM stores forwarding entries;
the DRAM stores packets; the NSE performs non-linear searching.
The data forwarding process can be classified as an upstream or downstream process based on
the direction of the data flow.
l Upstream process: The Physical Interface Card (PIC) encapsulates packets into frames
and sends them to the PFE. The inbound interface processing module on the PFE
decapsulates the frames and identifies the packet types. Then the upstream traffic
classification module classifies traffic based on QoS configurations on the inbound
interface. After traffic classification, the PFE searches for forwarding entries to
determine where to forward the packets. For example, to forward IPv4 unicast packets,
the PFE searches the forwarding information base (FIB) for the outbound interfaces and
next hops for the packets. Finally, the PFE sends the packets and the scheduling and
forwarding information to the traffic management (TM) module.
l Downstream process: The PFE encapsulates link-layer information in the packets based
on the packet type and outbound interface type. For example, for an IPv4 packet with an
outbound Ethernet interface, the PFE obtains the MAC address of the next hop. Then the
downstream traffic classification module classifies traffic based on the QoS
configurations on the outbound interface. The outbound interface processing module
encapsulates the packets with new Layer 2 headers and sends them to the PIC.
3 Technical Specifications
Physical Specifications
Weight(Typical 8.0 kg
configuration)
Maximum 90 V AC to 290 V AC
voltage
range
Item Description
Item Description
Weight(Typical 8.1kg
configuration)
Maximum 90 V AC to 290 V AC
voltage
range
Item Description
System Configurations
SDRAM 4 GB
Flash 32 MB
eUSB 2 GB
Switching capacity 80 GB
SDRAM 8 GB
Flash 32 MB
eUSB 2 GB
4 Board Specifications
Regulation Compliance
The NE20E complies with the following energy conservation and emission reduction
regulations:
l Directive 2002/95/EC on the Restriction of the Use of Certain Hazardous Substances in
Electrical and Electronic Equipment (RoHS)
l Regulation (EC) No 1907/2006 concerning the Registration, Evaluation, Authorization
and Restriction of Chemicals (REACH)
l Directive 2002/96/EC on waste electrical and electronic equipment (WEEE)
l ATIS-0600015.03.2009 Energy Efficiency for Telecommunications Equipment:
Methodology for Measurement and Reporting for Router and Ethernet Switch Products
l Directive 2009/125/EC establishing a framework for the setting of ecodesign
requirements for energy-related products (recast)
6 NMS
SNMP
The NE20E supports device operation and management through the NMS using SNMP.
l SNMPv1
SNMPv1 supports community name-based and MIB view-based access control.
l SNMPv2c
SNMPv2c supports community name-based and MIB view-based access control.
l SNMPv3
In addition to all basic SNMPv2c functions, SNMPv3 defines a management frame and
introduces a user-based security model (USM) to provide a more secure access control
mechanism for users.
SNMPv3 supports user groups, user group-based access control, user-based access
control, and authentication and encryption mechanisms.
NETCONF
The NE20E supports device operation and management through the NMS using NETCONF,
complying with RFC 4741 and RFC 4742.
l Writable-Running
l Candidate Configuration
l Rollback on Error
l Distinct Startup
l get-config
l get
l edit-config
l copy-config
l delete-config
l commit
l discard-changes
l lock
l unlock
l close-session
The NE20E supports the following Huawei-specific extended operations:
l sync-full
l sync-increment
l get-next
l execute-action
l active
l update
NMS
The NE20E uses Huawei iManager U2000 network management system. It supports
SNMPv1/v2c/v3 and the client/server model. The NMS can run independently on many
operating systems, such as Windows NT/2000/XP and UNIX (Sun, HP, and IBM). The
NE20E also provides a multi-lingual graphical user interface.
LLDP
The Link Layer Discovery Protocol (LLDP) is a Layer 2 discovery protocol defined in IEEE
802.1ab. LLDP specifies that the status information is stored on all interfaces and the device
can send its status to the neighbor stations. The interfaces can also send information about
status changes to the neighbor stations as required. The neighbor stations then store the
received information in the standard SNMP MIB. The NMS can search for Layer 2
information in the MIB. As specified in the IEEE 802.1ab standard, the NMS can also
discover inappropriate Layer 2 configurations based on information provided by LLDP.
When LLDP runs on devices, the NMS can obtain Layer 2 information about all the devices
to which it connects and detailed network topology information. This is helpful for rapid
network expansion and acquisition of detailed network topologies and changes. LLDP also
helps discover inappropriate network configurations and reports the configurations to the
NMS so incorrect configurations can be removed in time.
A
AAA Authentication, Authorization and Accounting
AAL5 ATM Adaptation Layer 5
AC Access Controller
ACL Access Control List
AF Assured Forwarding
ANSI American National Standard Institute
AP Access Point
ARP Address Resolution Protocol
ASBR Autonomous System Boundary Router
ASIC Application Specific Integrated Circuit
ATM Asynchronous Transfer Mode
B
BE Best-Effort
BGP Border Gateway Protocol
BGP4 BGP Version 4
C
CAR Committed Access Rate
CBR Constant Bit Rate
CE Customer Edge
CHAP Challenge Handshake Authentication Protocol
D
DC Direct Current
DHCP Dynamic Host Configuration Protocol
DNS Domain Name Server
DS Differentiated Services
E
EACL Enhanced Access Control List
EF Expedited Forwarding
EMC ElectroMagnetic Compatibility
F
FE Fast Ethernet
FEC Forwarding Equivalence Class
FIB Forward Information Base
FIFO First In First Out
FTP File Transfer Protocol
G
GE Gigabit Ethernet
GRE Generic Routing Encapsulation
GTS Generic Traffic Shaping
H
HA High availability
HDLC High level Data Link Control
HTTP Hyper Text Transport Protocol
I
ICMP Internet Control Message Protocol
IDC Internet Data Center
IEEE Institute of Electrical and Electronics Engineers
IETF Internet Engineering Task Force
IGMP Internet Group Management Protocol
IGP Interior Gateway Protocol
IP Internet Protocol
IPoA IP Over ATM
IPTN IP Telephony Network
IPTV Internet Protocol Television
IPv4 IP version 4
IPv6 IP version 6
IPX Internet Packet Exchange
IS-IS Intermediate System to Intermediate System
ISP Interim inter-switch Signaling Protocol
ITU International Telecommunication Union - Telecommunication
Standardization Sector
L
LAN Local Area Network
LCD Liquid Crystal Display
LCP Link Control Protocol
LDP Label Distribution Protocol
LER Label switching Edge Router
LPU Line Processing Unit
LSP Label Switched Path
LSR Label Switch Router
M
MAC Media Access Control
MBGP Multiprotocol Border Gateway Protocol
MD5 Message Digest 5
N
NLS Network Layer Signaling
NP Network Processor
NTP Network Time Protocol
NVRAM Non-Volatile Random Access Memory
O
OSPF Open Shortest Path First
P
PAP Password Authentication Protocol
PE Provider Edge
PFE Packet Forwarding Engine
PIM-SM Protocol Independent Multicast-Sparse Mode
POP Point Of Presence
POS Packet Over SDH/SONET
PPP Point-to-Point Protocol
PQ Priority Queue
PT Protocol Transfer
PVC Permanent Virtual Channel
Q
QoE Quality of Experience
R
RADIUS Remote Authentication Dial in User Service
RAM Random-Access Memory
RED Random Early Detection
RFC Request for Comments
RH Relative Humidity
RIP Routing Information Protocol
ROM Read Only Memory
RP Rendezvous Point
RSVP Resource Reservation Protocol
RSVP-TE RSVP-Traffic Engineering
S
SAP Service Advertising Protocol
SCSR Self-Contained Standing Routing
SDH Synchronous Digital Hierarchy
SDRAM Synchronous Dynamic Random Access Memory
SLA Service Level Agreement
SNAP SubNet Attachment Point
SNMP Simple Network Management Protocol
SONET Synchronous Optical Network
SP Strict Priority
SPI4 SDH Physical Interface
SSH Secure Shell
STM-16 SDH Transport Module -16
SVC Switching Virtual Connection
T
TCP Transfer Control Protocol
TE Traffic Engineering
U
UBR Unspecified Bit Rate
UDP User Datagram Protocol
UNI User Network Interface
UTP Unshielded Twisted Pair
V
VBR-NRT Non-Real Time Variable Bit Rate
VBR-RT Real Time Variable Bit Rate
VC Virtual Circuit
VCI Virtual Channel Identifier
VDC Variable Dispersion Compensator
VLAN Virtual Local Area Network
VLL Virtual Leased Line
VPI Virtual Path Identifier
VPLS Virtual Private LAN Service
VPN Virtual Private Network
VRP Versatile Routing Platform
VRRP Virtual Router Redundancy Protocol
W
WAN Wide Area Network
WFQ Weighted Fair Queuing
WRED Weighted Random Early Detection
WRR Weighted Round Robin