Escolar Documentos
Profissional Documentos
Cultura Documentos
……
Provide communications
7 Application layer
between applications
Application layer
Session layer
upper layer
Application layer
data
upper layer Transport layer Segment
TCP header
data
upper layer
IP header Network layer
data Packet
upper layer Router
LLC header FCS
data
Data link layer Frame
upper layer
MAC header FCS
data Switch
Physical layer Bit
0101110101001000010
HUB
Host B
G E F Host B
Host A A B
C D
Application Application
Layer PDU on the application layer Layer
Transmission Transmission
PDU on the transmission layer
Layer Layer
Network Layer Network Layer
PDU on the network layer
Data Link Layer PDU on the data link layer Data Link Layer
Each layer defines its own protocol and these protocols, independent to some extent,
associate with each other. The Ethernet technology is the technology on the data link layer of
the TPC/IP protocol.
SOHO
Intranet
Server
IP Hotel Mobile
network
Network
End Equipment
Interface equipment between users
and communication network
Transfers System
Channel used to transfer electric
signal
Including wire,wireless,fiber etc
Switching Equipment
Routing choice
Switch control
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page10
Evolution of Network
WAN
Intra-network
interconnectio
n
1980’s –
Host
Network based
Connections
1970’s – 1980’s
Host
Simple Connections
1960’s – 1970’s Low speed lines
Host Network
LAN
LAN
LAN
LAN
LAN
WAN WAN
Characteristics
Short distance
Low delay
High bandwidth
Reliable transmission
Definition headquarters
A WAN covers a larger geographic scope
A WAN connects LANs that are far from
each other
Types Internet
FR : Frame Relay
DDN: Digital Data Network
X.25 Public Packet Switched Network
branches
ISDN: Integrated Services Digital Network
ATM: Asynchronous Transfer Mode
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved
Page14
Typical Structure of IP Network
Internet backbone Telecom Services backbone
network
Backbone network PE
NGN
Core layer 3G
IP private leased line
IDC
MAN ASBR
Convergence layer
MPLS VPN
PE
Access layer
BA BA BA AR/P BA AR/P BA AR/P BA AR/PE
S S S E S E S E S
Dark Fiber
Access network IP DSLAM L2 MSTP Home
RTU Gateway
Twisted-pair Ethernet
LAN
LAN
LAN
LAN
LAN
WAN WAN
HUB
Switch
Router
ATM Switch
1. LAN Introduction
2. Ethernet Principles
3. Ethernet Port Technology
4. EoS Introduction
5. VLAN Basics and Port Attributes
6. QoS Introduction and Application
Minimum Frame
64 Bytes
Maximum Frame
1518 Bytes
Maximum Transmission Distance
7 0 7 0 7 0 7 0 7 0 7 0
7 0 7 0 7 0 7 0 7 0 7 0
Multicast Bit=1
Application Data
7 1 6 6 2 46-1500 4
Bytes Bytes Bytes Bytes Bytes Bytes Bytes
10BASE-F
10BASE-2
10BASE-5
10BASE-T
Three media types
802.3 – 1BASE-5
802.3 – 10Broad-36
Twisted
Fiber
Coax
Transmission
Type Description
distance
100BASE-X - 1995
100Mbps MAC
Four PHY versions
Three media types
100BASE-FX
100BASE-TX
100BASE-T4
100BASE-T2
802.3u - 1995 100BASE-TX
Cat 3 M
M
Cat 5 F
Transmission
Type Description
distance
1000BASE-CX
1000BASE-SX
1000BASE-LX
Four media types
1000BASE-T MM SM
Cat 5 Coax
Fiber Fiber
10GBASE-LRM
10GBASE-LX4
10GBASE-SR
10GBASE-ER
10GBASE-LR
10GBASE-T
3 WAN PHY versions
1. LAN Introduction
2. Ethernet Principles
3. Ethernet Port Technology
4. EoS Introduction
5. VLAN Basics and Port Attributes
6. QoS Introduction and Application
Half-duplex
Full-duplex
Full-duplex allows full speed in each direction simultaneously, therefore
twice of the throughput
Transmit
Receive
……
Fast link pulse includes a series of clock/digital
sequence comprised of link integration test pulse.
Half-Duplex Full-Duplex
1000M - Support
10G - Support
If one device can not support auto-negotiation, another device that can
support auto-negotiation will work at the default work method.
PC LAN Switch
DA Type
01-80-C2-
SA 0x8808 Data FCS
00-00-01
backpressure
Data Frame
Data
IP Header + Payload
Many bytes in the SDH frame overhead bytes are reserved. For data communication, however,
the overhead bytes are added.
• Concatenation: The VCs of the same granularity form a larger container, virtual
concatenation group (VCG), to provide higher bandwidth.
• LCAS (Link Capacity Adjustment Scheme): be used to increase, decrease or change the
capacity of a container that is transported in an SDH/OTN network using Virtual
Concatenation. In addition, the scheme will automatically decrease the capacity if a
member experiences a failure in the network, and increase the capacity when the
network fault is repaired. The scheme is applicable to every member of the Virtual
Concatenation group.
• GFP (Generic Framing Procedure): GFP provides a generic mechanism to adapt traffic
from higher-layer client signals over a transport network.Ethernet signals are
outburst, non-fixed length and different with SDH frame which are strictly synchronous.
So we need proper protocol to realize frame mapping from Ethernet frame to SDH
frame. GFP is one of those protocols.
x4
x1
Contiguous Concatenation Services
x1
STM-64 AUG-64 AU-4-64c VC-4-64c C-4-64c
x4
x1
x1
STM-16 AUG-16 AU-4-16c VC-4-16c C-4-16c
x4
x1 x1
STM-4 AUG-4 AU-4-4c VC-4-4c C-4-4c
x4
x1 x1
STM-1 AUG-1 AU-4 VC-4 C-4
x3 x1
x3 TUG-3 TU-3 VC-3
x1 C-3
STM-0 AU-3 VC-3
x7 x7
x1
TUG-2 TU-2 VC-2 C-2
Pointer Processing x3
TU-12 VC-12 C-12
Multiplexing
x
Aligning 4
TU-11 VC-11 C-11
The process the summing the bandwidth of X containers( C-i )into larger container.This provides a
bandwidth X times bigger than C-i. It is well indicated for the transport of big payloads requiring a container
greater than VC-4 but it is also possibleto concatenate low capacity containers, such VC-11, VC-12 or VC-
12 .
Types of Concatenation
N×270 Byte
N×261 Byte C
N×261 Byte
Port
VC Trunk
Collecting alarm
and performance
event
Cross-connect unit
VC4
N×VC12/VC3/
GFP-F
FE
concatenation
VC4 Virtual
N×VC12/VC3/
FE
GE
VCTRUNK
Port
Note: Both of the external and internal ports can process Tag flag
Interface Card
8×FE(Electrical Port)
Approaches
Only one path is available from end to end, without service delay.
STM-N
3 RSOH
1 N*AU-PTR J1
B3
MSOH C2
5
G1
Redun
F2 dancy C-4-Xc VC-4-Xc
Bytes
H4
F3
K3
N1
1 X-1 X*260
X=N
Frame structure in SDH contiguous concatenation
J1
B3
J1 C2
B3 G1
C2 F2 VC-4-#X
G1 H4
VC-4-Xv
F2 VC-4-#1
F3
H4 K3
F3 N1 125us
K3
N1 125us
MF:0
P
MF:0
O P
H O MF:1
MultiFrame
P H
O MF:1
H
P
O
MF:15
P H
O
MF:15
P
H
O MF:0
P H
O MF:0
H
SQ:X-1
SQ:0
Sequence Indicator
MST
P
OptiX MSTP
NE2
NE1
Normal
status
MSTP OptiX
OptiX
NE2
NE1
Part link faulty status
LCAS ( link capacity adjustment scheme) should be used to increase, decrease or
change the capacity of a container that is transported in an SDH/OTN network using
Virtual Concatenation. In addition, the scheme will automatically decrease the
capacity if a member experiences a failure in the network, and increase the capacity
when the network fault is repaired. The scheme is applicable to every member of the
Virtual Concatenation group.
MFI_a MST_z(p)
VCG_a SQ_n RS-Ack_z
member_n CTRL_n information sent in control packet x
GID_a of member_n in VCG_a
CRC_x
Note 3 CTRL=ADD
CTRL=ADD connectivity
check
connectivity
Note 4 MST=OK check
Note 5
CTRL=NORM CTRL=EOS
Note 6 MST=OK
Note 7
CTRL=NORM CTRL=EOS
The time sequence diagram above shows an example of adding two members after
the current last member. The example shows new member (a) responding with MST
= OK before new member (a + 1). This is arbitrary and the first member to respond
with MST = OK shall be allocated the SQ = n, then the next new member to respond
with MST = OK shall be allocated SQ = n + 1 etc. If for any reason a member being
added does not respond with MST = OK within the time-out period then the LCASC
shall report a fail for that member
Note 3
CTRL=IDLE CTRL=IDLE CTRL=EOS
SQ=4 SQ=5 SQ=3
Note 4
Note 5 MST=FAIL
RS-Ack inverted
MST=FAIL
RS-Ack inverted
The example above shows two members being removed with a simultaneous IDLE
command from the LCASC (Source). Reassembly at the sink ceases to use the
“removed” members immediately upon receipt of the IDLE command. SQ should
be changed and the general rule for SQ adjustment is as follow:
All unwanted members are re-allocated a SQ greater than the SQ of the
member sending the EOS control word.
All remaining required members are re-allocated consecutive SQs below the
un-required members.
Note 2
Note 3
Note 2 MST=FAIL
Note 4
Note 3
Fail status CTRL=DNU
Note 5
Note 6 MST=OK
Note 7
CTRL=NORM
The generic framing procedure is used to load frames of variable length in the
synchronization transmission paths. The GFP is a generic procedure to
adapt the user information on a high layer into the transmission network.
The Ethernet signals always burst and are of variable length. This is totally
different from the SDH frames, which require strict synchronization. Hence,
a proper protocol is required for the frame mapping from the Ethernet to
the SDH. The GFP is such a protocol.
Features:
Core header
GFP Payload Area:
Payload area 4 to 65535 bytes
GFP Encapsulated
Frame Format
4 to 65535 bytes
Payload
Bit # 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7
Layer 2 switching:
Conflict Domain
• A conflict domain is
confined to a single port.
• A broadcast domain is not
restricted.
• The security is enhanced.
HUB
Broadcast
Domain
Conflict domain
Conflict domain Conflict domain
HUB:
• Serious conflict
Switch
• Broadcast
Conflict domain
flooding Conflict domain Conflict domain
• No security
Port based
MAC address based VLAN:1 VLAN:2
L3 protocol based
TPI TCI
Switch Switch
Port 1 Port 10
Port 3
Port 7
Switch Switch
Advantage
Disadvantage
VLAN divides a physical network into several small logic
networks. The hosts in different VLANs cannot
communicate with each other.
Only accept the frame with VLAN ID, normally connect with
Tag Aware
switches
UNI
Access Can not identify VLAN ID, normally connect with PC
Identify and process the server VLAN ID, considering the outer
S-Aware
VLAN ID in the Ethernet frame as S-VLAN.
ports
Access
Tag Aware
Hybrid
Data
Tag Flag Untag Flag
Port
•VLAN ID
The VLAN ID is carried by the Ethernet frame and identifies the VLAN for
the Ethernet frame.
• PVID
For a specific Ethernet port, the VLAN for it should be specified. The
Ethernet switching is performed in the same VLAN.
Default VLAN ID
Ethernet Board
6 6 2 2 N
VLAN Frame
Ethernet
DA SA TPID (8100) S-VLAN TPID (8100) C-VLAN
data/PAD
6 6 2 2 2 2 N
QinQ Frame
C-VLAN C-VLAN
100 100
NE1 S- C- NE2
Department A Department A
VLAN VLAN
30 100
Department B
S- PSN C- Department B
VLAN VLAN
31 100
Branch 1 Branch 2
UNI NNI QinQ Link
C-VLAN
S-VLAN
Advantages of QinQ technology:
What’s QinQ?
Application Application
layer layer
Presentatio Presentatio
n layer n layer
Session The emergence of L2 Session
layer makes Ethernet evolve layer
into the switching mode.
Transport Transport
layer layer
Network Layer 2 switch Network
layer layer
PORT1 PORT3
PORT2 PORT4 D
B switch 1234.ABCD.0004
A P1 P2 B
P3 P4
Switch
C MAC 1 P1 D
MAC 2 P2
• PC-A sends a packet in which
• PC-B sends a packet in which
DA is MAC4 and SA is MAC1.
DA is MAC1 and SA is MAC2.
• The switch cannot find the
• The switch finds P1 that MAC1
corresponding port of MAC4 in
corresponds to in the MAC
the MAC address forwarding
address forwarding table and
table and broadcasts the packet
unicasts the packet to P1.
to each port.
• The switch learns P2 that MAC2
• The switch learns P1 that MAC1
corresponds to.
corresponds to.
Blacklist
Transparent bridge
Virtual bridge (VB-VLAN)
UNI port type Tag Aware/ Access Tag Aware /Access/ Hybrid
VCTRUNK1
VCTRUNK2
Tag
Port VCTRUNK3
Untag
VCTRUNK4
PORT PORT
Switc MAC A MAC D ……
3 4
h
MAC Port
MAC A 1
MAC B 2
MAC C 3
MAC D 4
4. MPLS Technology
4.1 MPLS overview
4.2 Key Technologies in Implementing MPLS
4.3 Application of MPLS
UNI
UNI
NNI NNI
VC VP VC
switching switching switching
+ =
Router ATM Switch MPLS Router
IP
node that do LER LSR LSR
not run MPLS
LER
LSP
LSR
MPLS node that do
not run MPLS
LER
IP IP IP
1024 Data 1029 Data 1039 Data
Header Header Header
RTA RTB RTC RTD
LSP
LER LER
Header
Header
LSR LSR
IP
IP
RTE
Data
Data
MPLS Domain
LSR
IP Network IP Network
Label Switching
Label the packet, forward packets by label switching instead
of IP forwarding
Frame
MPLS label IP Header Payload
Header
0 19 22 23 31
IP L1 IP L2 IP L3 L2 IP L4 L2 IP L2 IP IP
MPLS domain
L1 label
A set of data flows with the same attributes. These data flows are
processed in the same way by LSRs during transmission
FECs can be identified by the address, service type, and QoS
During IP forwarding according to the longest match algorithm,
packets with the same destination belong to an FEC
The path that an FEC passes through in the MPLS network is called
the LSP
The LSP is a unidirectional path from the ingress to the egress
MPLS domain
LSP
Push
Swap
Pop
PHP(Penultimate Hop Popping)
− OptiX Hybrid MSTP equipment does not support PHP
IP Packet IP Packet
To:3.3.3.3 Label:300 Label:200 Label:100 To:3.3.3.3
IP Packet IP Packet IP Packet
To:3.3.3.3 To:3.3.3.3 To:3.3.3.3
Uniform Mode
CE PE P PE CE
MPLS domain
MPLS
TTL254
IP TTL MPLS
254 TTL253
IP TTL IP IP TTL
255 TTL 252
254
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page143
MPLS Forwarding Process(Cont.)
Processing MPLS TTL
Pipe Mode
CE PE P PE CE
MPLS MPLS
TTL100 TTL 99
IP TTL IP TTL
254 254
IP TTL IP TTL
255 253
Static Distribution
VPNA VPNA
CE CE
PE P P PE
VPNB VPNB
CE CE
CE PE P P PE
CE
VPNA VPNA
CE MPLS Domain CE
VPNB VPNB
Layer 2 and Layer 3 VPN Services are offered from the edge of a
network
Layer 3 VPN Link Comprised of IP
Traffic Passed Over IP Backbone
VPNA VPNA
CE PEA PEB CE
Site A Site B
CE P P CE
VPNB VPNB
Layer 2 VPN which passes Ethernet, ATM,
Frame Relay, PPP,HDLC Traffic over IP
Backbone
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page148
MPLS Application(Cont.)
MPLS L2 and L3 VPN Comparison
PE stores private routing infor for each PE only stores CE host routing
VPN which causes higher memory cost information
BRAS ISP B
HIS ISP A
BTV Service
Service
RTD
RTC
5. PWE3 Technology
5.1 PWE3 Overview
5.2 Classification of PWE3
5.3 Ethernet Service to PWE3
5.4 TDM E1 Service to PWE3
5.5 ATM Service to PWE3
5.6 Application of PWE3
MPLS
PE1 PE2
P
CE2 CE4
VPN2
Site1 VPN2
Site2
Functions of PW
PE1 P PE2
CE1 CE3
Tunnel Label
PW Label and control word AC MPLS Tunnel
Terms of PWE3
AC(Attachment Circuit)
Tunnels
PW Signaling(Pseudo-Wire Signaling)
PW(Pseudo Wire)
CE(Custom Edge router )
PE(Provider Edge router)
By Implementation Scheme
Static PW
− PWs specify the parameters through command rather
than negotiate parameters by using signaling
Dynamic PW
− Dynamic PWs are PWs that are set up through
signaling
By Networking
Single-Hop PW
− Only one PW exists between U-PEs
Multi-Hop PW
− multiple PWs exist between U-PEs
− PW requires to switch labels at the PW label level on
the S-PE CO., LTD.
HUAWEI TECHNOLOGIES All rights reserved Page158
Classification of PWE3(Cont.)
Single-Hop PW
CE3 VPN1
VPN1 CE1 Site2
Site1
MPLS
PE1 PE2
P
CE4
CE2
VPN2
Site1 VPN2
Site2
Data
PW Label
Tunnel
Label
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page159
Classification of PWE3(Cont.)
Multi-Hop PW
CE1 VPN1
VPN1 CE3
Site2
Site1
MPLS
U-PE1 U-PE2
S-PE P
CE2 CE4
VPN2
Site1 VPN2
Site2
Data
PW Label A
PW Label
B
Tunnel Label
PE1 PE2
IP/MPLS
Eth Service Eth Service
Eth Service
Ethernet Payload
( Variable length )
OptiX Hybrid MSTP equipment supports setting of Control Word (option)
1-65535 Bytes
Control Word parameter may be set up manually in PE
Unframed E1
Service Types :
UNI to UNI
UNI to NNI
RTP Header(optional)
Time Stamp
SSRC Identifier
E1 Frame 1
E1 Frame 2
RTP Header(optional)
Time Stamp
SSRC Identifier
CE1 CE2
ATM
ATM
Network
Network
PE1 IP/MPLS PE2
ATM Service ATM Service
Forwarder Forwarder
N-to-1 VCC
…
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Page172
ATM PWE3——Encapsulation Format(Cont.)
VCI
M V RE PTI C VCI
S
VCI
E-Line Service
Point-to-point service
E-LAN Service
Multipoint-to-multipoint service
E-AGGR Service
E-Line Service
Tunnel Header
PW Header(Label=A)
Company
Company A Company (VID=5) A
A
Company Company
B B
Tunnel Header
PW Header(Label=B)
City 1 B Company (VID=5) City 2
E-AGGR Service
NodeB 1
FE1
VLAN forwarding table for NE1 and NE2: VLAN forwarding table for NE3:
Parameter NE1 NE2 Parameter NNI for NE1 NNI for NE2
Source Port Type V-UNI V-UNI V-UNI V-UNI Source Port Type V-NNI V-NNI V-NNI V-NNI
Source Port FE1 FE2 FE1 FE2 Source Port Port1 Port1 Port2 Port2
Source VLAN 100 100 100 100 Source VLAN 1 2 3 4
Sink Port Type V-NNI V-NNI V-NNI V-NNI Sink Port Type V-UNI V-UNI V-UNI V-UNI
Sink Port Port1 Port1 Port1 Port1 Sink Port GE1 GE1 GE1 GE1
Sink VLAN 1 2 3 4 Sink VLAN 100 200 300 400
E1 PE1
BTS1
PW
PE3 BSC
IP/MPLS
PW C STM-1
E1
PW
PE2
E1
BTS2
CE
CE ATM
ATM
Network
Network
PVP: VPI 1 PVP: VPI 1
CE PE IP/MPLS PE CE
ATM
ATM
PVP:VPI 2 Network
Network PVP:VPI 2
CE PVP: VPI 3
ATM PVP: VPI 3 ATM
Network Network
CE
What’s PWE3?
Best Effort
Using Best-Effort model can transfer any number of packets at any time
without getting previous approval
There is no guarantee with respect to time delay and reliability
Perform PHB
according to
marking……
DS Domain
CIR
CBS
srTCM
(Tc) EBS Algorithm
Classification (Te)
PIR CIR
Forward
Classification
Pass
CIR
Tc CBS
Buffer Queue (Tc)
Flow Classification
CAR Shaping
Egress of a network.
Ingress of a network.
Traffic shaping adjusts the
Application CAR restricts the bandwidth burst size of the service
Scenario and the burst size of the packet flow meter to ensure
traffic entering a network. that service packets are
transmitted at an even rate.
When a packet is unable to When a packet is unable to
Operation
be sent, it is discarded. be sent, it is buffered.
SP(Strict-Priority Queue)
WRR(Weighted Round Robin)
Flow
classificati
on
Egress flow
…
Flow
Queue
Classification
0
Packet emergency increases from left to ri
…
Flow
Queue
Classification 1
0
One queue adopts the SP algorithm, which guarantees the QoS of key
services.
The other queues adopt the WRR algorithm, which guarantees that all
other services are served.
Scheduling principles: