Professional Documents
Culture Documents
A3118-X652-R67-02 2 / 297
ULAF+ ACCEED 2202 Manual
Contents
1 Notes on product safety ................................................................................................................. 12
1.1 Representation conventions................................................................................................. 13
1.2 Product Safety...................................................................................................................... 14
1.2.1 Notes on protection against laser radiation ..................................................................... 14
1.3 EMC ..................................................................................................................................... 15
1.4 Device handling.................................................................................................................... 16
1.4.1 Electrostatic Sensitive Devices (ESD)............................................................................. 16
1.4.2 Inserting/ removing plug in units ...................................................................................... 16
1.4.3 Stacking the desktop units............................................................................................... 16
1.4.4 Disposal of equipment and units...................................................................................... 17
1.5 Over voltage protection ........................................................................................................ 18
1.5.1 Protection of a network element ...................................................................................... 18
2 Introduction..................................................................................................................................... 19
2.1 ULAF+ documentation structure .......................................................................................... 20
2.2 ACCEED 2202 Manual Structure......................................................................................... 23
2.3 Representation conventions................................................................................................. 24
2.3.1 ACCEED manual naming conventions ............................................................................ 24
2.4 ULAF+ System overview...................................................................................................... 25
2.4.1 Service Interfaces ............................................................................................................ 26
2.4.2 Transmission Interfaces................................................................................................... 26
2.4.3 MEF Carrier Ethernet Services attributes........................................................................ 26
2.4.4 Management Systems ..................................................................................................... 27
2.4.5 ULAF+ Product Range..................................................................................................... 28
3 Application overview....................................................................................................................... 31
3.1 ACCEED 2202 overview ...................................................................................................... 32
3.1.1 Gigabit EFM fiber demarcation, transmission and aggregation unit................................ 32
3.1.2 Technical data.................................................................................................................. 33
3.2 Typical ACCEED 2202 applications..................................................................................... 34
3.2.1 Business Access.............................................................................................................. 34
3.2.2 Wholesale Carrier Ethernet Demarcation........................................................................ 36
3.2.3 Backhaul .......................................................................................................................... 36
3.3 System configurations.......................................................................................................... 37
3.3.1 Mechanics........................................................................................................................ 39
3.3.2 HW options ...................................................................................................................... 39
3.3.3 ACCEED 2202 applications............................................................................................. 39
3.3.4 Uplink interface ................................................................................................................ 40
4 Quick Start Guide ........................................................................................................................... 42
4.1 Introduction .......................................................................................................................... 43
4.2 HW setup.............................................................................................................................. 44
4.2.1 Central Office Setup ........................................................................................................ 44
4.2.2 Remote Terminal Setup................................................................................................... 44
4.2.3 Wiring............................................................................................................................... 44
4.3 EFM link configuration.......................................................................................................... 45
4.3.1 LCT+ installation .............................................................................................................. 45
4.3.2 Remote management configuration ................................................................................ 45
4.3.3 EFM-Link configuration.................................................................................................... 45
5 Installation ...................................................................................................................................... 46
5.1 General requirements/check list .......................................................................................... 47
5.2 Power supply........................................................................................................................ 49
5.2.1 Power supply to the plug in unit....................................................................................... 49
5.2.2 Power supply to the desktop unit..................................................................................... 49
5.3 Grounding concept............................................................................................................... 53
5.4 Interfaces / pinning............................................................................................................... 54
5.4.1 SHDSL interface .............................................................................................................. 55
5.4.2 Ethernet interfaces (10Base-T/100Base-Tx/1000Base-Tx) ............................................ 55
5.4.3 SFP slot interface ............................................................................................................ 55
A3118-X652-R67-02 3 / 297
ULAF+ ACCEED 2202 Manual
A3118-X652-R67-02 4 / 297
ULAF+ ACCEED 2202 Manual
A3118-X652-R67-02 5 / 297
ULAF+ ACCEED 2202 Manual
A3118-X652-R67-02 6 / 297
ULAF+ ACCEED 2202 Manual
A3118-X652-R67-02 7 / 297
ULAF+ ACCEED 2202 Manual
Figures
A3118-X652-R67-02 8 / 297
ULAF+ ACCEED 2202 Manual
A3118-X652-R67-02 9 / 297
ULAF+ ACCEED 2202 Manual
Figure 8-23 Egress Tagging Mode: Inner Secondary, Outer Primary................................................. 151
Figure 8-24 VLAN DB example ........................................................................................................... 152
Figure 8-25 Packet flow process: Service/Queuing ............................................................................ 158
Figure 8-26 Layer2 packet description ................................................................................................ 158
Figure 8-27 Layer3/4 packet description ............................................................................................. 159
Figure 8-28 Rules: Packet Classification............................................................................................. 160
Figure 8-29 color unaware: Single Rate, Three colors........................................................................ 163
Figure 8-30 color unaware: Two Rate, Three colors ........................................................................... 163
Figure 8-31 color aware: Single Rate, Three colors............................................................................ 164
Figure 8-32 color aware: Two Rate, Three colors ............................................................................... 164
Figure 8-33 Bandwidth Profile ............................................................................................................. 165
Figure 8-34 Ingress Service ................................................................................................................ 166
Figure 8-35 Ingress Port Service Assignment..................................................................................... 168
Figure 8-36 Egress Service ................................................................................................................. 168
Figure 8-37 Egress Port Service Assignment ..................................................................................... 170
Figure 8-38 Trust mode, port CoS and port remark defaults .............................................................. 172
Figure 8-39 QoS port profile ................................................................................................................ 172
Figure 8-40 Ingress CoS profiles......................................................................................................... 173
Figure 8-41 Ingress DSCP profiles...................................................................................................... 174
Figure 8-42 Ingress service profiles .................................................................................................... 175
Figure 8-43 Ingress yellow frame profiles ........................................................................................... 175
Figure 8-44 Egress queue parameter profile....................................................................................... 176
Figure 8-45 Egress queue profile and DEI remark.............................................................................. 176
Figure 8-46 Egress queue parameters................................................................................................ 177
Figure 8-47 Egress port shaping ......................................................................................................... 177
Figure 8-48 Statistics Overview........................................................................................................... 179
Figure 9-1: Ethernet OAM Layers ....................................................................................................... 194
Figure 9-2 Service OAM definitions..................................................................................................... 194
Figure 9-3 Service OAM example ....................................................................................................... 195
Figure 9-4 Service OAM maintenance levels ...................................................................................... 196
Figure 9-5 Service OAM MEP orientation ........................................................................................ 196
Figure 9-6 Service OAM Linktrace Replies ...................................................................................... 207
Figure 9-7 Two-way vs. one-way measurement ................................................................................. 208
Figure 9-8 Service OAM PM session and responder principle ........................................................ 209
Figure 9-9 Service OAM Round trip delay measurement principle .................................................. 211
Figure 9-10 Service OAM Delay Measurement Bin ......................................................................... 212
Figure 9-11 Service OAM Inter-frame delay variation measurement principle ................................ 214
Figure 9-12 Service OAM Frame loss ratio (FLR) measurement principle ...................................... 221
Figure 9-13 Service OAM Availability definition ............................................................................... 223
Figure 9-14 Service Activation Test example...................................................................................... 225
Figure 9-15 Service Activation Test Principle...................................................................................... 226
Figure 9-16 SAT sequence.................................................................................................................. 227
Figure 9-17 Service Activation Test example...................................................................................... 231
Figure 9-18 SAT Test CoS Instance ................................................................................................... 232
Figure 9-19 SAT Results ..................................................................................................................... 234
Figure 9-20 SAT Test Report .............................................................................................................. 236
Figure 10-1 CES standards overview.................................................................................................. 239
Figure 10-2 The CES principle ............................................................................................................ 240
Figure 10-3 Structure of the CES Control Word.................................................................................. 242
Figure 10-4 CES functional components............................................................................................. 243
Figure 10-5 Format of CESoETH and CESoMPLS frames................................................................. 244
Figure 10-6 CES operation overview .................................................................................................. 245
Figure 10-7 ACCEED 2202 CES Application Overview................................................................... 249
Figure 10-8 ACCEED CES Network ................................................................................................... 250
Figure 10-9 CES Alarm locations ........................................................................................................ 257
Figure 11-1 Clock sources example.................................................................................................... 270
Figure 11-2 LT Synchronization .......................................................................................................... 272
Figure 11-3 NT Synchronization.......................................................................................................... 272
Figure 11-4 Synchronization configuration model............................................................................... 273
A3118-X652-R67-02 10 / 297
ULAF+ ACCEED 2202 Manual
A3118-X652-R67-02 11 / 297
ULAF+ 1 - Notes on product safety ACCEED 2202 Manual
1
Notes on product safety
A3118-X652-R67-02 12 / 297
ULAF+ 1 - Notes on product safety ACCEED 2202 Manual
Information
Information gives useful notes which pertain to particular situations and specifically draw
the readers attention to them. Information will be highlighted in the text using an
information symbol.
Warning
Other symbols not related to product safety are defined in chapter 2.3.
A3118-X652-R67-02 13 / 297
ULAF+ 1 - Notes on product safety ACCEED 2202 Manual
Ignoring this and the warnings given can result in personal injury or in damage to property/
environment.
Before opening the ACCEED desktop unit interrupt the power feed and also disconnect all
interface connectors. You have to guarantee easy access to the main socket.
All work on the open unit may only be performed by authorized personal (maintenance staff).
Considerable danger (electric shock, fire) for maintenance staff and the user can be harmed with
unauthorized opening of or improper work on the unit.
Non-adherence to specifications or modifications to setup (for example, the use of SFP modules not
approved for this product) can lead to violation of security provisions. This would invalidate the
Declaration of Conformity. Liability for any associated problems then lies with the person responsible
for the modifications or for non-adherence to specifications.
Normal operation
Only class1 SFPs shall be used
Dangerous fault
The ACCEED unit corresponds to the Laser class 1 for all disturbances.
A3118-X652-R67-02 14 / 297
ULAF+ 1 - Notes on product safety ACCEED 2202 Manual
1.3 EMC
The EC declaration of conformity for the product is met when the installation and cabling is carried out
in compliance with the instructions in the ULAF+ ACCEED 2202 Manual (chapter 5). Where
necessary, project specific documents should be taken into account.
Deviations from the specifications or irregular installation modifications (e.g. the use of cable types
with a lower shielding mass), can lead to violations to the EC protection requirements. In such cases
the declaration of conformity will be invalidated. Responsibilities for any problems that may occur
thereafter then lie with the person responsible for deviating from the specifications.
A3118-X652-R67-02 15 / 297
ULAF+ 1 - Notes on product safety ACCEED 2202 Manual
Units that bear the ESD symbol are equipped with electrostatic sensitive units, i.e. the
appropriate safety precautions must be kept while handling these units.
A wrist band must always be worn when unpacking, packing, touching, removing or inserting units
bearing the ESD symbol, see Figure 1-1. This wrist band must be grounded while working with these
ULAF+ units. This will ensure that components sensitive to electrostatic discharge are not damaged.
Basically the conductor tracks or components on the units may not be touched. The units may only be
held by the edges.
Once they have been removed, place the units in the conductive plastic envelope provided and then
store them or dispatch them special transport cases bearing ESD symbol.
To avoid further damage, defective units are to be handled with as much care as new units.
Units located in an enclosed, unopened housing are always protected.
If neither the ULAF+ desktop unit nor the terminal device is earthed, prevent electrostatic
discharge by connecting the terminal device before switching on the ULAF+ desktop unit.
A3118-X652-R67-02 16 / 297
ULAF+ 1 - Notes on product safety ACCEED 2202 Manual
The disposal of all electrical and electronic products should be done separately from the municipal
waste stream via designated collection facilities appointed by the government or the local authorities.
The correct disposal and separate collection of the old equipment will help prevent potential negative
consequences for the environment and human health. It is a precondition for reuse and recycling of
used electrical and electronic equipment.
For more detailed information about disposal of the old equipment, please contact your Albis
Technologies Ltd partner.
A3118-X652-R67-02 17 / 297
ULAF+ 1 - Notes on product safety ACCEED 2202 Manual
Figure 1-3 shows an example with a SHDSL loop with some inserted BSRUs. Over voltage (2) caused
by i.e. lightning or mains can occur anywhere on the loop. For ACCEED units with fiber interfaces,
these threads do not apply.
A3118-X652-R67-02 18 / 297
ULAF+ 2 - Introduction ACCEED 2202 Manual
2
Introduction
This chapter gives an overview of the ULAF+ system and the product
range.
A3118-X652-R67-02 19 / 297
ULAF+ 2 - Introduction ACCEED 2202 Manual
ACCEED manuals: contain all information relative to a specific ACCEED product: technical
description, installation, configuration, operation and troubleshooting instructions.
- ACCEED 1416 Manual
- ACCEED 1404 Manual
- ACCEED 2202 Manual
- ACCEED 1102/04 Manual
AccessIntegrator documents:
Documentation related to the AccessIntegrator (ULAF+ Management System (NMS)).
- Installation Manual (IMN)
The Installation Manual is intended for anyone involved in the installation and
configuration of the AccessIntegrator. It describes the procedures for installation of a new
version of the AccessIntegrator software.
- Administration Manual (ADMN)
The Administration Manual is intended to be used by anyone who configures the
AccessIntegrator for other users. It describes the tasks which must be performed in order
to guarantee trouble-free and reliable management of the network elements using the
AccessIntegrator.
- Operation Manual (OMN)
Intended for use by anyone who uses AccessIntegrator to monitor and maintain network
elements.
A3118-X652-R67-02 21 / 297
ULAF+ 2 - Introduction ACCEED 2202 Manual
A3118-X652-R67-02 22 / 297
ULAF+ 2 - Introduction ACCEED 2202 Manual
Chapter 2 gives an overview of the ULAF+ system and the product family.
Chapter 3 provides an overview of the ACCEED 2202 unit, describes typical applications and
system configurations and gives an introduction to the ACCEED 2202 architecture. The
aim of this chapter is to show the capabilities of the system and to facilitate network
planning.
Chapter 4 gives step by step instructions to quickly set up a typical EFM link using ACCEED 2202
and LCT+. The chapters contain links to other chapters to get specific detailed
information if necessary. The aim of this chapter is to help rapidly set up a first running
configuration and get familiar with ACCEED 2202.
Chapter 5 gives detailed information and instructions about ACCEED 2202 and LCT+ installation.
It contains a description of the mechanic, the power supply options, the pinning of the
different interfaces, the cabling including the management access, the DIP switches and
LEDs, the installation of the LCT+ and instructions about the necessary on site
configurations. The aim of this chapter is to facilitate the installation of ACCEED 2202
for different possible system configurations.
Chapter 6 this chapter gives detailed information and instructions about how to configure and
operate ACCEED 2202 and LCT+. It contains a description of both ACCEED 2202 and
LCT+ features. It shows how to setup the desired configuration with typical examples.
Further it contains a description of all the alarms and performance management
counters. A special section is dedicated to the LCT+. The chapter follows the structure
of the LCT+ dialogues.
Chapter 7 gives an overview of the EFMC capabilities and the configuration and fault management
options
Chapter 8 explains the wide range of the Ethernet switch capabilities based on a building block
model. This covers the switch and port control options and describes the VLAN and
QoS configurations possibilities.
Counter and utilization are explained.
Chapter 9 gives detailed information about the different Operation and Maintenance modes. It
covers Link OAM, Service OAM and Service Activation Testing.
Chapter 10 explains the optional CES Interworking function of the ACCEED 2202 unit.
Chapter 11 describes the general information and settings of the ACCEED 2202 unit. This covers
inventory and logging information and explains how the alarm configuration is done.
Management access and synchronization options for the ACCEED 2202 are detailed.
Chapter 12 gives some practical help to quickly identify faults and solve them. The chapter contains
a list of all LEDs and alarms, describing possible causes and suggesting possible
solutions. The aim of this chapter is to facilitate trouble shooting.
A3118-X652-R67-02 23 / 297
ULAF+ 2 - Introduction ACCEED 2202 Manual
Information
Information gives useful notes which pertain to particular situations and specifically draw
the readers attention to them. Information will be highlighted in the text using an
information symbol.
Warning
Naming Convention
This symbol indicates a naming convention used in the manual, i.e. a specification about a
specific terminology used in the manual.
Under Construction
This symbol indicates that the chapter, paragraph, table or figure is still in progress.
A3118-X652-R67-02 24 / 297
ULAF+ 2 - Introduction ACCEED 2202 Manual
ULAF+ is the All-in-One Platform to offer Ethernet and TDM services over packet or TDM networks
exploiting existing copper or fiber access infrastructure.
ULAF+ offers the flexibility to provide versatile and comprehensive services out of the same sub rack
traditional E1, data (V.35, V.36, X.21) and Ethernet services can share the same subscriber line and
desktop unit.
A3118-X652-R67-02 25 / 297
ULAF+ 2 - Introduction ACCEED 2202 Manual
2Mbit/s E1
G.703 unstructured, G.704 structured or fractional E1, ISDN PRI
Synchronization
2MHz clock and 2Mbit/s
Synchronous Ethernet (SyncE)
Copper
ETSI/ITU-T compliant with SHDSL.bis, up to 6.4 Mbps per wire pair
up to 8 regenerators per wire pair
bonding of up to 16 wire pairs with line protection
Spectral compatibility with POTS, ISDN, HDSL, ADSL, VDSL etc.
Fiber
up to 1Gbit/s two or single fiber systems
concurrent TDM and Ethernet transmission
SFP slots allow for flexible choice of optical interfaces
sub 50ms line protection with LAG
Standardized Services
E-Line, E-LAN and E-Tree Services
TDM Circuit Emulation Service (CES)
Scalability
10/100/1000Mbit/s User Network Interfaces (UNIs)
per flow bandwidth profiles and SLA enforcement
up to 64 customers per shelf, thousands of customers per network
Quality of Service
`Hard`-QoS - guaranteed bandwidth profile per service
Minimum delay and jitter
Reliability
A3118-X652-R67-02 26 / 297
ULAF+ 2 - Introduction ACCEED 2202 Manual
Service Management
Fast and flexible service provisioning
Ethernet Link- and Service-OAM
CLI
Command line console, Telnet and SSH
A3118-X652-R67-02 27 / 297
ULAF+ 2 - Introduction ACCEED 2202 Manual
Subracks
Subrack V3
19 and ETSI rack suitable 16 + 1 slots
Ethernet and TDM backplane
Clock and Alarm In-/Outputs
Compact Shelf
19 and ETSI rack or desktop use 2+1 slots or 3+0 slots
Ethernet and TDM backplane
Clock and Alarm In-/Outputs
MCU
SNMP Management Unit for
local or remote control of up to
64 access links
Ethernet and serial interfaces
MCU-S
Management and Concentrator Unit with additional Carrier Ethernet
Switch with 2x GbE up-links and 16x FE backplane ports
MCU-CES
Management and Concentrator Unit with Carrier Ethernet Switch and
Circuit Emulation Service for up to 32x E1 services over packet networks
BSTU
SHDSL Termination Unit for 1x or 2x wire pairs (11.4Mbit/s)
TDM and Ethernet interfaces
Integrated Ethernet switch
QSTU
Quad SHDSL Termination Unit
4 E1 interfaces
1-, 2- or 4-wire pair mode
A3118-X652-R67-02 28 / 297
ULAF+ 2 - Introduction ACCEED 2202 Manual
BSTU4
SHDSL Termination Unit for advanced Ethernet services.
4 wire pair bonding (22.8Mbit/s)
4 port Ethernet switch (VLAN, CoS)
BSRU/BSRU+
2 wire pairs SHDSL Regenerator Unit
Up to 8 BSRU cascadable
Remote or local power feeding
ACCEED 1102
EFMC-LR (SHDSL) Ethernet Demarcation Device
1x RJ45 / 2 copper wire pair SHDSL.bis (30.6 Mbit/s)
4x RJ45 10/100Base-T ports, Carrier Ethernet switch
2x RJ45 G.703 120/75 Ohm port for E1 or reference clock in/out (optional)
ACCEED 1104
EFMC-LR (SHDSL) Ethernet Demarcation Device
1x RJ45 / 4 copper wire pair SHDSL.bis (61.2 Mbit/s)
4x RJ45 10/100Base-T ports, Carrier Ethernet switch
2x RJ45 G.703 120/75 Ohm port for E1 or reference clock in/out (optional)
1x Data Module Slot for X.21, V.35, V.36 (optional)
ACCEED 1404
EFMC-LR (SHDSL) Ethernet Demarcation Device with
1x RJ45 / 4 copper wire pair SHDSL.bis (61.2 Mbit/s)
3x RJ45 10/100/1000Base-T ports, 1x SFP, Carrier Ethernet switch
1x RJ45 G.703 120/75 Ohm port for E1 or reference clock in/out (optional)
Power over Ethernet (optional)
ACCEED 1416
EFMC-LR (SHDSL) Termination Unit with
Carrier Ethernet switch and bonding of up to 16 wire pairs (102.4 Mbit/s)
1x RJ45 / 4 copper wire pair SHDSL.bis (61.2 Mbit/s)
3x RJ45 10/100/1000Base-T ports, 1x SFP, Carrier Ethernet switch
1x RJ45 G.703 120/75 Ohm port for E1 or reference clock in/out (optional)
Power over Ethernet (optional)
BOTU
Fiber Optical Termination Unit for Ethernet and TDM services
4x E1, Ethernet switch (VLAN, CoS)
2x SFP module slots
ACCEED 2202
EFMF (optical) Termination Unit with Carrier Ethernet switch
2x SFP module slots for protected GbE or FE services
2x RJ45 10/100/1000Base-T ports
1x RJ45 G.703 120/75 Ohm port for E1 or refence clock in/out (optional)
Power over Ethernet (optional)
A3118-X652-R67-02 29 / 297
ULAF+ 2 - Introduction ACCEED 2202 Manual
Interface converters
BGTU
Flexible interface converter for
Ethernet over E1 or fractional E1 and data over E1 services
1x Dataslot module for X.21, V.35, V.36
GTU4
Inverse multiplexer unit for
Ethernet services over TDM networks. Bundling of up to 4 E1
4 port Ethernet switch
EIU
Quad E1 Insertion Unit for structured or unstructured E1 emulations
services with MCU-CES
Interface Modules
Various Interface Modules
(V.35, V.36, X.21, Ethernet Bridge, Ethernet Router)
Clock and Alarm Module
A3118-X652-R67-02 30 / 297
ULAF+ 3 - Application overview ACCEED 2202 Manual
3
Application overview
A3118-X652-R67-02 31 / 297
ULAF+ 3 - Application overview ACCEED 2202 Manual
As Carrier Ethernet Network Interface Device (NID), ACCEED 2202 provides comprehensive service
demarcation.
ACCEED line card and desktop units allow the implementation of a broad variety of crucial
applications in the promising field of carrier grade Ethernet.
Following the successful ULAF+ product philosophy, the ACCEED EFM family has been designed to
be fully compatible with the installed ULAF+ base preserving customer investment and pave the way
for successful migration to Carrier Ethernet services.
The desktop unit can also be deployed as standalone device connected to an aggregation- or edge
switch.
A3118-X652-R67-02 32 / 297
ULAF+ 3 - Application overview ACCEED 2202 Manual
A3118-X652-R67-02 33 / 297
ULAF+ 3 - Application overview ACCEED 2202 Manual
1. E-LAN service
Port based
Ethernet private LAN (EP-LAN)
VLAN based (EVC identified by VLAN-ID)
Ethernet virtual private LAN (EVP-LAN)
A3118-X652-R67-02 34 / 297
ULAF+ 3 - Application overview ACCEED 2202 Manual
2. E-Line service
Port based
Ethernet private line (EPL)
VLAN based (EVC identified by VLAN-ID)
Ethernet virtual private line (EVPL)
3. E-Tree service
Port based
Ethernet private Tree (EP-Tree)
VLAN based (EVC identified by VLAN-ID)
Ethernet virtual private Tree (EVP-Tree)
A3118-X652-R67-02 35 / 297
ULAF+ 3 - Application overview ACCEED 2202 Manual
ACCEED 2202 best fits in any network demarcation applications thanks to its advanced functionalities
such as in band management, standard compliant Link- and Service-OAM, extensive packet counters.
In wholesales applications ACCEED 2202 can be used to provide connectivity to a third party operator
(OLO) over an optical fiber allowing to fully monitor and control the service quality at the NNI interface
using the extensive management and OAM functionalities of ACCEED 2202.
3.2.3 Backhaul
ACCEED 2202 allows implementing reliable backhaul solutions with Gigabit Ethernet speed over
optical fibers with the possibility to protect the optical fiber link with a second fiber connection.
The following picture shows the backhaul of a NodeB via an active and protection link..
A3118-X652-R67-02 36 / 297
ULAF+ 3 - Application overview ACCEED 2202 Manual
Optical Line
A optical connection between LT and NT over single or dual fiber
EFM Link
A EFM connection between LT and NT over optical fiber
EVC:
An endpoint Ethernet tunnel that covers a couple of services
Service:
A endpoint to endpoint connection with defined service attributes, like dedicated
bandwidth, priority (QoS)
A3118-X652-R67-02 37 / 297
ULAF+ 3 - Application overview ACCEED 2202 Manual
A3118-X652-R67-02 38 / 297
ULAF+ 3 - Application overview ACCEED 2202 Manual
3.3.1 Mechanics
Both the plug in and the desktop units can be used as LT (or CM = Connection Master) and as NT (or
CS = Connection Slave).
3.3.2 HW options
Synchronous
Ethernet (P1)
Power over
part number mechanic
Ethernet
ACCEED 2202 can be configured via the front panel DIP-switch to work as Configuration Master
(CM) or Configuration Slave (CS). The CM controls the slave unit and provides the management
access to the CS. In the standalone application the ACCEED 2202 unit must be configured as CM.
A3118-X652-R67-02 39 / 297
ULAF+ 3 - Application overview ACCEED 2202 Manual
For the link OAM configuration please refer to chapter Fehler! Verweisquelle konnte nicht gefunden
werden.
A3118-X652-R67-02 40 / 297
ULAF+ 3 - Application overview ACCEED 2202 Manual
The above example shows a Subrack V3 equipped with a MCU-S and three ACCEED 2202 units. The
MCU-S unit concentrates the traffic of the three 100bT Subrack V3 interfaces.
A3118-X652-R67-02 41 / 297
ULAF+ 4 - Quick Start Guide ACCEED 2202 Manual
4
Quick Start Guide
A3118-X652-R67-02 42 / 297
ULAF+ 4 - Quick Start Guide ACCEED 2202 Manual
4.1 Introduction
This chapter demonstrates how to set up an EFM link from scratch using ACCEED 2202, with the help
of an exemplary configuration.
The exemplary EFM link consists of 2 ACCCED 2202 desktop units connected via optical fiber.
A3118-X652-R67-02 43 / 297
ULAF+ 4 - Quick Start Guide ACCEED 2202 Manual
4.2 HW setup
4.2.1 Central Office Setup
Setup the sub rack according to the ULAF+ Installation Manual ([2]).
Equip the ACCEED 2202 plug in unit in the sub rack, and make sure that the DIP switch is set to the CM
position (connection master)
Securely fit the plug in unit in the sub rack
Connect the sub rack to ground
Connect the sub rack to a power source
Power up the sub rack (the green power LED the ACCEED unit must be ON)
ACCEED 2202 needs about 2 minutes to complete the boot process. During the boot
phase all LED are flashing to indicate that the boot is in progress. During this time the unit
is not in operation and cannot be managed.
4.2.3 Wiring
Connect the wires as indicated by the picture Figure 4-2
By default the all interfaces (P1...P3, SFP, NMS and Sync) are deactivated, i.e. the alarm
LEDs are always turned off. To check the correct cabling some on site configuration is
necessary. See chapter 4.3.1.
A3118-X652-R67-02 44 / 297
ULAF+ 4 - Quick Start Guide ACCEED 2202 Manual
In order to perform the configurations necessary to setup the EFM link the LCT+ is required.
Further details about the LCT+ installation can be found in chapter 5.7.
For a first quick start, it is recommended to use the serial LCT interface.
Ethernet Ports
In order to set up an EFM link at least one UNI port has to be enabled on the CM side and one on the
CS side.
The Ethernet ports P1 is enabled on the ACCEED 2202 units by factory default.
A3118-X652-R67-02 45 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
5
Installation
A3118-X652-R67-02 46 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
The following tasks must be carried out for each system component before/during installation:
ACCEED 2202 is the Gigabit Ethernet First Mile Fibber (EFMF) demarcation, transmission and
aggregation unit of the ULAF+ system for active fiber Carrier Ethernet Access applications. Please
refer to chapter 3.2
ACCEED 2202 is available as plug in for use in 16 + 1 Subracks and in the Compact Shelf as well as
desktop.
A3118-X652-R67-02 47 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
LCT+
LCT+ is the Local Craft Terminal used to configure and operate the ULAF+ devices. LCT+ is a Java
based SW application. For more details on the LCT+ please refer to chapter 6.2.
A3118-X652-R67-02 48 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
Power is supplied to the plug in unit via the Subrack backplane. The input voltage is nominal 48 VDC or
60 VDC (valid range 40 - 72 VDC).
The fuses have a protective function and must be replaced by fuses with exactly the same
electrical specifications.
Local power supply with 110 VAC or 230 VAC (valid range 95 260 VAC)
Local power supply with 48 VDC or 60 VDC (valid range 40 72 VDC)
A3118-X652-R67-02 49 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
Figure 5-3 Location of desktop power supply terminals and selection jumpers
Modifications to the type of supply and grounding may only be made by trained personnel.
A3118-X652-R67-02 50 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
1. Disconnect the power cord and also disconnect all interface cables
2. Release the screws on the bottom of the unit
3. Open the housing by removing the top of the unit
4. Remove the power cord connector or replace the existing power cord with a battery cable
5. Close the housing
6. Screw the screws on the bottom of the unit into the housing
The input voltage of desktop devices is monitored in order to generate a power fail alarm
in case of power failure. If the input voltage drops below the threshold value (about 100V),
the power fail alarm is raised. Desktops configured as NT additionally send a so-called
`dying gasp` message to the LT device via transmission interface.
In case of utilization of a DC power source (<100V) the power-fail signaling can be
suppressed using the LCT+.
Not applicable
A3118-X652-R67-02 51 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
The fuses have a protective function and must be replaced by fuses with exactly the same
electrical specifications.
A3118-X652-R67-02 52 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
ACCEED desktops must be grounded via a cable of at least 0,75mm2, if remotely fed with a voltage
120VDC (only applicable for SHDSL units).
The symbol located on the type label must also be made invisible (e.g. covering with
adhesive paper).
A3118-X652-R67-02 53 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
1 3 5 7 9
2 4 6 8
Figure 5-5 ACCEED 2202 plug in and desktop front panel interfaces and LEDs
A3118-X652-R67-02 54 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
Not applicable
ACCEED 2202 has 2x RJ45 Ethernet plugs located on the front panel: P1 and P2. Depending on the
HW option only one or both of these front panel interfaces are usable:
The front connector P2 of Plug In units has no function, because this switch port is used
as backplane port. Through this interface the Ethernet traffic of the Subrack V3 (or the
Compact Shelf) can be aggregated by the MCU-S unit. The backplane interface cannot be
used in the Subrack V2.
The signals of the Ethernet interfaces depend on the interface configuration (10/100Base-T or
1000Base-T). The pinning corresponds to the 802.3ab standard.
If necessary, send and receive data can be automatically swapped by the Ethernet Port
(Configuration: Auto MDI/MDI-X or fix MDI or fix MDI-X).
A3118-X652-R67-02 55 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
ACCEED 2202 is equipped with two MSA compliant SFP slots on the front panel.
There are plenty of possibilities of different Ethernet SFPs that can be used:
- FE and GbE Ethernet are supported
- BiDi and triple rate SFPs are supported
- SFPs with extended data block (Temperature, Rx Power, )
The following table shows how these interfaces are used depending on the system configuration:
A3118-X652-R67-02 56 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
Each 2 MHz or G.704 clock interface can be configured to 75 or 120 impedance via the NMS.
The clock interface is available on ACCEED 2202 models with the SyncE option only (see
Table 1).
A3118-X652-R67-02 57 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
The serial interface runs at the speed of 115.2 kBaud with 8 data bits, 1 start, 1 stop bit and with
neither parity nor handshake.
A3118-X652-R67-02 58 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
CS/CM Switch
The upper switch (CS/CM) determines the mode of the unit:
right position CM Configuration Master, through this unit it is possible to fully manage the
remote device/devices (default)
left position CS Configuration Slave.
LCT Switch
The lower switch (LCT) determines the interface used for local configuration:
right position LCT Local management via LCT over serial interface on front panel
Management access via backplane interface (respectively MCU/OMI
left position
SNMP) (default)
By default the switch is in the left position (Management via MCU/OMI SNMP).
CS/CM Switch
The switch (COT/RT) determines the mode of the unit:
upper position COT Configuration Master, through this unit it is possible to
fully manage the remote device/devices
lower position RT Configuration Slave. (default)
A3118-X652-R67-02 59 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
1 3 5 7 9
2 4 6 8
A3118-X652-R67-02 60 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
on link up
blinking traffic (rx/tx)
off SFP port disabled
SFP1
yellow/red yellow on full duplex
red on SFP not inserted (interface enabled)
Table 12 ACCEED 2202 visual signaling
1 sec.
on
off
1 sec.
Figure 5-8 ACCEED 2202 slow blinking LED
200 ms
on
off
200 ms
Figure 5-9 ACCEED 2202 fast blinking LED
A3118-X652-R67-02 61 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
ACCEED can also be managed with AccessIntegrator Version 5.0 and higher. Refer to [9]
for information regarding the installation of AccessIntegrator.
HW:
CPU: Pentium 4 (2 GHz) or Athlon XP (2000+) processor or higher
Memory: 1GB RAM
Operating system:
Windows 2000
Windows XP
Windows Vista
Windows 7
For all Windows operating systems it is advisable to always use the newest available service pack.
Graphics:
at least 1024x768 resolution
Connectivity:
Serial Interface or USB with external serial to USB converter
10/100BaseT Interface
It is advisable to install the LCT+ SW always with the same user account (e.g.
Administrator) on the same system. This ensures proper de-installation and installation of
the LCT+ SW.
A3118-X652-R67-02 62 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
1 Double click on the setup icon. The following installation dialogue is displayed
2 Press `Next >` to continue with the upgrade (or `cancel` to abort the installation).
A3118-X652-R67-02 63 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
The installer allows to setup both the LCT+ and the legacy equipment LCT or just the LCT. The
selection occurs at this stage of the installation. The installer window contains the following
information:
list of available components to install (1)
A description of the selected component (2)
The space required for the installation (3)
A3118-X652-R67-02 64 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
You can choose if shortcuts for LCT+ and/or LCT should be created on your desktop.
6 Press `Install` to complete the installation or `Cancel` to abort the operation.
A3118-X652-R67-02 65 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
2 Press `Next >` to continue with the upgrade (or `cancel` to abort the installation).
A3118-X652-R67-02 66 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
The presence of a LCT+ SW has been detected. Before proceeding with the installation the former
installed version has to be removed. It is possible to abort the update procedure and keep the current
LCT+.
3 Press `Next >` to continue with the upgrade (or `cancel` to abort the installation).
The installer allows to setup both the LCT+ and the legacy equipment LCT or just the LCT. The
selection occurs at this stage of the installation. The installer window contains the following
information:
list of available components to install (1)
A description of the selected component (2)
The space required for the installation (3)
A3118-X652-R67-02 67 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
You can choose if shortcuts for LCT+ and/or LCT should be created on your desktop.
7 Press `Install` to complete the installation or `Cancel` to abort the operation.
A3118-X652-R67-02 68 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
A3118-X652-R67-02 69 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
3 Select uninstall options and press `Next >` to continue (or `cancel` to abort)
A3118-X652-R67-02 70 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
A3118-X652-R67-02 71 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
The aim is to guarantee that once the installation has been completed, the equipment can be
managed remotely and there is no need to return to the equipment location.
5.8.1 LCT+
ACCEED 2202 needs about 2 minutes to complete the boot process. After power up
during the boot phase all LED are flashing to indicate the boot activity. During this time the
unit is not in operation and cannot be managed.
For on site installation it is recommended to use the serial interface. Please use the serial
cable with the pinning as described in 5.4.6
Information about access via OMI SNMP management card can be found in [1], [3] and [5].
Information about access via MCU / MCU-S / MCU-CES management card can be found in [2], [4]
and [5].
A3118-X652-R67-02 72 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
The serial interface runs at the speed of 115200 Bit/s on MCU, MCU-S, MCU-CES and
ACCEED, at 9600 Bit/s on OMI SNMP. The PC interface is automatically set up. No
manual configuration is necessary.
A3118-X652-R67-02 73 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
To be able to access the device via NMS port, the port must be enabled and must have a valid IP-
address (with IP-Netmask and Default Gateway).
A3118-X652-R67-02 74 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
The Default Gateway parameter is common for the NMS and in-band port and is located in
Board\Local\Management Access:
LCT connections to the network element via NMS or in-band port utilize a TCP connection
(Port 2101).
A3118-X652-R67-02 75 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
The Default Gateway parameter is common for the NMS and inband port and is located in
Board\Local\Management Access:
LCT connections to the network element via NMS or in-band port utilize a TCP connection
(Port 2101).
Not applicable.
Not applicable.
Not applicable.
A3118-X652-R67-02 76 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
For both ACCEED 2202 plug in and desktop units a HW option supporting power over Ethernet
according to 802.3af is available.
ACCEED 2202 is designed as endpoint PSE (Power Sourcing Equipment) Alternative A, Class 0
To use Power over Ethernet please order an ACCEED 2202 version that supports this
feature.
Power over Ethernet is not available on desktops with 48VDC power supply!
A3118-X652-R67-02 77 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
In `Manual` mode the button `Set Date and Time` is available. Pressing this button a pop up
dialogues opens, which permits to manually set date and time (note: the pop up dialogue
contains the current date and time).
In `NTP Unicast` mode the IP address of a Time Server must be configured. The button
`Synchronize with server` is available to force immediate synchronization with the NTP
server.
A3118-X652-R67-02 78 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
The yellow maintenance LED and the maintenance field on the LCT+ status bar indicate
the activation of any of the maintenance functions.
5.9.1 Loopback
ACCEED 2202 features the following loopbacks:
5.9.1.1 Loopback 1a
Not applicable.
5.9.1.2 Loopback 3a
Not applicable.
Not applicable.
A3118-X652-R67-02 79 / 297
ULAF+ 5 - Installation ACCEED 2202 Manual
A3118-X652-R67-02 80 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
6
Configuration and operation
A3118-X652-R67-02 81 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
The configuration of the management access is described in the installation chapter. Refer to chapter
5.8.2.
A3118-X652-R67-02 82 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
6.2 LCT+
6.2.1 Introduction
The Local Craft Terminal (LCT+) is a Java based software application which can be used to manage
the ULAF+ system either locally (via serial interface) or remotely (via a TCP connection over a
dedicated network or in-band).
The LCT+ Graphical User Interface (GUI) has been designed to support the user allowing an intuitive
and easy to learn management of the ULAF+ network elements.
Make sure the LCT+ is connected to the network element. The following options are available:
Serial interface (RS-232)
Network Management System (NMS) Ethernet interface
In band
A3118-X652-R67-02 83 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
Start the ULAF+ LCT+ either by double clicking the ULAF+ LCT+ shortcut on the desktop or via the
Start menu item ULAF+ LCT+ in StartProgramsAlbis TechnologiesLCT.
After the Albis Technologies Splash Screen, the following window will be opened:
Choose which interface has to be used to establish a connection to the network element:
COM (serial interface)
TCP interface
If `COM` is selected, The COM Port which is used by LCT+ must be selected.
For a `TCP` connection the IP address of the network element must be entered.
The portserver option applies to legacy ULAF+ equipment, without Ethernet connectivity
A3118-X652-R67-02 84 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
A3118-X652-R67-02 85 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
The title bar is described in chapter 6.2.4, the menu bar is described in chapter 6.2.5 and the status
bar is described in chapter 6.2.6.
A3118-X652-R67-02 86 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
A3118-X652-R67-02 87 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
Since this command will replace all configurations including the management access
configuration (e.g. the IP address and passwords) with the default values, the remote
connectivity to the network element will be lost.
To prevent an accidental reset of all device configurations, the user is requested to confirm this
command.
LCT+ automatically detects disconnections (e.g. cable pulled out) and notifies the user by
a pop up window.
A3118-X652-R67-02 88 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
This command opens the Save Configuration window, which permits to define which parameters will
be stored in the file. The window is vertically divided in two parts:
The left part of the window corresponds to the current configuration of the network element. The
window contains the data structure of the selected unit in a tree format (the same format used in
the tree area). A green checkmark on a configuration parameter or a configuration node indicates
that the configuration parameter respectively the configuration node will be saved into the
configuration file.
The right part of the window corresponds to the content of the configuration file. The window
contains the data structure in a tree format (the same format used in the tree area). The
configuration parameters / nodes marked with a green checkmark will be saved into the
configuration file and the grayed out configuration parameters / nodes will not. Green Square ()
marked parameters / nodes indicate partial configuration.
Each single configuration parameter / node of the network element can be selected and added to the
configuration file by clicking on the right arrow button ().
Each single configuration parameter / node of the configuration file can be selected and removed by
clicking on the right left arrow button ().
To save the entire configuration of the network element, select the upper most directory
(e.g. `ACCEED 2202` and click on the right arrow button ().
A3118-X652-R67-02 89 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
The creation of the configuration file can be aborted at any time (`Cancel` button).
The choice of parameters to be transferred to the configuration file can be reset with the `Reset`
button.
The file is created by clicking on the `Save` button, opening the save file dialog. To complete the
creation of the configuration file, a name must be entered in the file name field. Optionally the store
path may be changed.
A3118-X652-R67-02 90 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
First the configuration file needs to be opened. It can be selected by double clicking in the open file
dialog.
Once the configuration file has been selected, the Load Configuration window is opened. This panel
permits to define which parameters of the configuration file will be transferred to the network element.
The window is vertically divided in two parts:
The left part of the window corresponds to the configuration data stored in the configuration file.
The window contains the data structure of the configuration file in a tree format (the same format
used in the tree area). A green checkmark on a configuration parameter or a configuration node
indicates that the configuration parameter respectively the configuration node will be transferred to
the network element.
The left part of the window corresponds to the network element. The window contains the data
structure in a tree format (the same format used in the tree area). The configuration parameters /
nodes marked with a green checkmark will be transferred to the configuration file and the grayed
out configurations / nodes remains unchanged.
A3118-X652-R67-02 91 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
The transfer to the network element can be aborted at any time (`Cancel` button).
The choice of parameters to be transferred to the network element can be reset with the `Reset`
button.
A3118-X652-R67-02 92 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
The Preview mode is useful to configure devices, which are not yet physically available (for instance to
configure the CS, before it is connected to the CM).
To enter the Preview mode the LCT+ must be connected to one CM device. After setting the
connection to `Preview`, the LCT+ makes the virtual line model available.
A3118-X652-R67-02 93 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
Connection preferences
- IP Address History
This option allows defining how many IP addresses used to connect to network elements should
be remembered by the LCT+. This avoids annoying re-typing of IP addresses.
The range of remembered addresses goes from 3 up to 15.
The address history can be cleared pressing the `Clear History` button.
A3118-X652-R67-02 94 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
Confirmation
- Clear Alarm Log
- Show prohibited parameters
- MAC Table Flush
Some LCT+ operations result in deleting data without any `undo` possibility. These operations
therefore generate popup warnings. The command is only executed once the user confirms the
intention to proceed.
Since these warnings may get annoying for some users, these can be disabled. in the `Confirmation`
option dialogue.
Each single warning can be individually disabled.
Logging
C:\ \
A3118-X652-R67-02 95 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
The command `Trap Log` enable / disable adds the tab Tap Log to display all generated
traps by the network element in the table view since last login.
The Trap Log is displayed in the table view and can be deleted (`Clear` button) or saved as a
*.csv file (`Save As ` button).
- System Log
The System Log is a log file containing a trace of the information exchanged between LCT+
and the network elements. This file has debugging purpose and can be used to analyze
management sessions.
By default the file is located on the user application data directory. A different location can be
defined.
Export
A3118-X652-R67-02 96 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
The `About` item delivers version and copyright information about the LCT+ application
1. Progress bar
The progress bar informs about the state of data synchronization between LCT+ and the
connected unit.
`Idle` indicates that currently no data is exchanged/pending between LCT+ and network element.
During data transfer the progress bar indicates the types of data being exchanged as well as a
percent indication of the progress.
2. Preview
The Preview field indicates whether the LCT+ is in `preview mode` (display of a generic virtual line
model composed of a LT array and a NT array) or not (display of units physically connected to
LCT+). The preview mode is useful to configure devices, which are not yet physically available (for
instance to configure NT Ethernet parameters, before it is connected to the LT). More information
about the preview mode can be found in chapter 6.2.5.
In preview mode the preview field of the status bar turns blue as indicated by the following picture.
A single left click on this field toggles the preview mode like a button.
A3118-X652-R67-02 97 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
3. Token
The token state indicates whether the LCT+ has the write access permission. Since the system
allows multiple user access to the network elements (for example more than one LCT+ connection
or LCT+ and AccessIntegrator), a mechanism to prevent concurrent write access has been
implemented. If LCT+ doesnt have the write permission (token state is red), it is not possible to
change configurations, because another user is connected to the device (via LCT+ or
AccessIntegrator).
The write access will be automatically granted (token state green), as soon as the concurrent
access session is terminated (other user closed the connection to the network element).
4. Alarm
The alarm state shows the alarm summary of the connected device. A single left click on this field
shows all alarms in one list (sets the Tree path to the root and the table section to Fault/Alarms).
The color indication corresponds to the alarm LED of the unit in the following way:
Red alarm state indicates the presence of a critical alarm.
Orange alarm state indicates the presence of a major alarm.
Yellow alarm state indicates the presence of a minor alarm.
Green alarm state indicates the presence of a warning.
Gray alarm state indicates the absence of alarms.
5. Maintenance
The maintenance state shows the current maintenance state of the connected device. This
indication corresponds to the maintenance LED of the unit. A single left click on this field shows
the origin of the maintenance state (path: Board/Local/Maintenance, Tabs: Fault/Maintenance)
A yellow maintenance state indicates that a maintenance function is currently active. More
information about maintenance indication can be found in chapter 5.6.
The (yellow) summary area is located in the upper left corner of the work area and contains the
following dialogues.
A3118-X652-R67-02 98 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
6.2.7.1 Connection
The connection dialogue is described in chapter 6.2.2.
With MCU / MCU-S / MCU-CES the passwords must be of at least 8 characters. The
empty password is only allowed if SNMP V3 is not used.
A3118-X652-R67-02 99 / 297
ULAF+ 6 - Configuration and operation ACCEED 2202 Manual
6.2.7.3 Download
The Download function allows updating the firmware of the network elements.
To reduce the risk of configuration loss when updating the firmware it is recommended to
always save the configuration to a file before each download.
All ULAF+ network elements are equipped with 2 program memory banks:
the active memory bank, containing the code currently running on the NE
the passive memory bank, which can contain a second FW image
The download dialogue displays both the active and the passive FW of the network element. These
are characterized by:
the FW-ID (an identification number unique for each device type)
the FW version
Local download
The local download allows upgrading the FW of LT or NT (depending on which network element the
LCT+ is connected to). The local download is performed according to the following procedure:
To initiate a download the file containing the FW (*.dwl file) must be opened. This is done by
1
clicking the Browse button.
The `dwl` file is checked to ensure that only allowed FW can be downloaded.
Depending on the connection type (e.g. serial management connection) the time needed for the
download procedure to the network varies. The download progress is displayed in the progress bar.
It is possible to manage the unit (e.g. add/remove lines, change configurations) while
performing the FW download
The download can be aborted at any time. After aborting the passive bank is empty. A new download
can be restarted at any time.
To activate the new FW, the `Reboot` button must be pressed and the `Swap` checkbox must
3
be enabled. This will load the downloaded FW in the active bank.
Remote download
Remote download is the procedure needed to update the FW of the ACCEED 2202 CS device (if the
LCT+ is not directly attached to it, but via a CM device)
The remote download dialogue displays active and passive FW type and version.
NT remote download
To remotely download a CS unit perform the following steps:
It is possible to manage the device (e.g. change configurations) while performing the FW
download. After starting the download, it runs in the background without any support or
need of the management system.
The download can be aborted at any time. After aborting the passive bank is empty. A new download
can be restarted at any time.
To activate the new FW, the Reboot button must be pressed and the Swap checkbox must be
5
enabled. This will load the downloaded FW in the active bank.
The (blue) view area is located in the upper right corner of the work area and contains the following
views.
The Rack view is only available if connected via a management card, i.e. OMI SNMP,
MCU, MCU-S or MCU-CES.
The MCU / MCU-S / MCU-CES management units are located in the middle of the rack,
but have the slot number zero.
Rack
The Rack area allows selecting the sub rack to be accessed. This configuration is needed in case of
sub rack cascading and / or extended slot addresses. See the sub rack installation manual [1] and [2]
for more information.
Slot Info
This field provides the following information for the selected slot (blue colored unit):
(HW) part number
active FW-ID and FW Version
passive FW-ID and FW Version
Device Description (Board/Local/Information) or User Data (older plug in units, e.g. BSTU)
It is possible to directly jump to the corresponding management area of the tree and table
areas (see chapters 6.2.9 and 6.2.10) by clicking on the corresponding functional block or
interface.
The (green) tree area is located in the lower left corner of the work area and contains the structure of
the network elements data model. This is a representation model of all network element parameters
(configurations, inventory, alarms, performance counters ). The structure is represented as a `tree`.
The tree area itself doesnt contain any parameters but shows the hierarchical structure of the grouped
parameters.
It is possible to navigate the structure expanding and collapsing the groups with the mouse or the
cursor. Selecting a folder in the tree area changes all contents of the table area with the corresponding
parameters. The handling is very similar to the windows explorer: groups are like folders, parameters
like files.
Ethernet
This group contains layer 2 parameters for the local switch and if
applicable for the remote switch (Switch CS). Both contain the
following subgroups:
- LAN, SFP and Backplane (for plug in only) ports defining user
port attributes
- WAN ports defining transmission port attributes
- VLAN, QoS profiles, EVC, Policing, Mirroring, Service
Qualification and Service OAM for logical tasks.
One stage below all parameters for VLAN manipulation, Port
Isolation, protocol detection and handling, link OAM, queue
definition, metering process, rate shaping and many more can be
found.
CES IWF
This group contains circuit emulation service parameters for the
E1/Clock (TDM) interface.
Board
This group contains generic parameters and contains among
others the following groups:
Alarm Configuration (Severity, Logging)
Local (Information, Maintenance, Time Settings, Management
Access, Clocking)
CS (Information, Management Access, Clocking).
To facilitate trouble shooting, alarms are displayed in the tree view as colored circles escalated
hierarchically along the path to the highest instance. The default colors match the following alarms:
The (red) table area is located in the lower right corner of the work area and contains the network
element parameters organized in tab panels. The structure is divided into two levels.
The first level contains Fault, Configuration and Performance management. The second level breaks
down the management areas into further partitions in order to improve clarity. Empty tabs are
automatically set invisible.
Go to parent directory
directory
directory with array view
Alarm
Configuration parameter (editable)
Locked configuration parameter (read-only)
Information (read-only)
Performance counter (read-only)
Table 1 Table area symbols
The table area is linked to the tree area. The parameters displayed in the table panels correspond to
the data structure selected in the tree area as demonstrated by the following example:
Example
To enable Ethernet Port `P1`on the LT device:
first select the corresponding parameter on the tree view: Ethernet/Switch Local/LAN Ports/P1
(or click on `P1` in the Ethernet view).
then select the Configuration tab and the ACCEED 2202 tab
enable Port 1
finally click on `Apply`
The tree area allows grouping of parameters and easy access to them by navigating
through the tree.
By selecting a specific branch or leave in the tree area, the corresponding subset of parameters is
displayed in the table.
At the bottom of the table an Alarm Filter is present. This can be used to select which alarm
priorities should be displayed. By default the filter is set to `All Alarms`.
The Alarm Log shows the timestamp of the Alarm change, the severity, the device where the
alarm occurred, the alarm state transition and the path in the tree area.
The Alarm Log can be locally saved as *.txt file on the PC where the LCT+ is running.
It is possible to configure, the alarms stored in the Alarm Log. See chapter 11.2.2
Maintenance
The maintenance table contains the maintenance functions (Loopbacks, ) of the selected
structure group / element. The table contains editable fields (e.g. set loop) and read only
parameters (e.g. loop state).
Maintenance parameters changed in the table are marked in blue (as shown in Figure 6-45). The
number of parameters changed in the table is displayed in the `Apply` button (in brackets).
SOAM Loopbacks
SOAM Loopbacks are a sort of Ethernet Ping. A SOAM loopback is started on a MEP; possible
targets are MEPs and MIPs in the same domain (MEG/MA). Destination is either a Unicast- [IEEE,
ITU-T] or Multicast-MAC address [ITU-T].
SOAM loopbacks are described in chapter 9.2.9
The ACCEED 2202 configuration table contains all configuration and inventory parameters of
ACCEED 2202. The table contains both editable fields and read only fields.
Configuration parameters changed in the table are marked in blue (as shown in Figure 6-45). The
number of configuration changed in the table is displayed in the `Apply` button (in brackets).
Summary
The summary configuration table contains a summary of all configuration changes which have not
yet been applied. This allows checking the configuration before it is transferred to the network
element. In particular the summary table can be used together with the `Load Configuration`
function described in chapter 6.2.5.1.5. After the configuration has been loaded from a file, the
summary table displays all configuration changes stored in the file. It is easy to get direct access
to the changed parameters in the summary table.
Plausibility Conflicts are shown in the color orange. As long as the conflicts are not resolved
manually, the configuration cannot be applied to the unit.
Every time the Apply button is clicked, the configuration is written to the device and the summary
table is deleted.
Utilzation
Utilization provides information on data rates and utilization of a port or service and displays it in a
graph.
The ACCEED built in Service Activation Testing (SAT) feature allows to evaluate layer 2 key
performance figures for a service that is planned to be implemented.
For more information please refer to chapter 8.10
SOAM
Service-OAM describes a set of OAM functions and mechanisms that are not limited to a link, but
can be set up between two or more points in an entire Ethernet network. Service-OAM is defined
in the following standards:
IEEE 802.1ag Connectivity Fault Management
ITU-T Y.1731 OAM functions and mechanisms for Ethernet based networks
For more information please refer to chapter 8.11.2
7
EFMC Aggregation
8
Ethernet Switch
8.1 Introduction
The ACCEED uses a powerful packet processor that fits for access and aggregation applications.
The built in feature highlights are:
Highly flexible VLAN manipulation
Powerful ingress and egress Policy Engines
Low Latency, low Jitter
QoS
Ethernet OAM
Traffic Shaping
Traffic Counting
Switch control
Aging enable/disable
Aging time configurable
MAC table 16k, self-learning
MAC table readout
Port isolation
VLAN
802.1Q (VLAN)
- 4095 C-VLANs
- Port VID explicit settable
802.1ad (Provider Bridge)
- Provider VID
- Provider Ethertype
- Multiple customer services (different C-VLANs to P-VLANs) on same customer port
TR-101 VLAN manipulations
- Inner/outer swap
- 1:1 translation
- Port-based stacking
- VLAN-based stacking
Classification
Predefined criteria:
- Ingress Port
- Destination MAC-Address
- Source MAC-Address
- Ethertype
- VLAN-ID
- VLAN Priority
- Destination IP-Address
- Source IP-Address
- IP Priority (DSCP)
- IP Datagram Protocol
- TCP/UDP Destination Port
- TCP/UDP Source Port
Flows identified by any criteria in the first 128 bytes of the packet
QoS/Policing
Prioritization based on:
ingress port
802.1p (L2)
DSCP (L3)
any other criteria (flow)
MEF10.2 Ethernet Services Attributes: ingress and egress bandwidth profiles with
Committed Information Rate (CIR)
Excess Information Rate (PIR)
Committed Burst Size (CBS)
Excess Burst Size (EBS)
Peak Burst Size (PBS)
Color mode (CM)
Metering acc. to RFC2697, 2698 and 3290 with single or two rate three color marking
8 priority queues per egress port
Per color queue size
Hard QoS (guaranteed traffic profile)
Strict priority (SP), weighted fairness algorithms (WFQ, WRR, SDWRR)
Per port shaping (rate and burst size)
Per queue shaping (rate and burst size)
Random early detection (RED)
Flexible L2/L3 remarking
Flexible traffic class assignment
Counters
Per port packet and byte counters (RMON Etherstats)
Per ingress and egress service counters
Transmit queue counters
Per service counters (EVC)
History for all packet counters
OAM
Link OAM (802.3ah)
Service OAM (802.1ag, Y.1731)
Depending on the solution to be implemented, the functions in these building blocks are applied to the
packets.
MAC
This first stage represents the physical port of the ACCEED devise connected to the switch. The
Medium Access Control defines the speed and duplex operation of the port. At this stage the packet is
reassembled from its serial form to a full packet stored in a memory buffer. Its FCS is checked.
Port
In this mandatory stage the packet is analysed regarding the VLAN information and the primary and
secondary VLAN tag assignment is done. The primary and secondary VLAN tag information is further
used as decision criteria in the upcoming stages.
The ports can be configured with port specific VLAN and QoS settings.
VLAN Translation
The "Primary VLAN translation" is an optional stage and can be performed on the ingress and egress
path (see also stage 7).
Service
In addition to the port based configuration settings, each packet flow can be assigned to an ingress
service. The service assignment is done via packet matching rules.
The ingress services can be applied for filtering, metering, VLAN- and QoS manipulation.
Bridge
The packets entering the bridge are switched to the egress side according to the primary VLAN ID and
the switching criteria defined in the VLAN database. This database defines the VLAN membership of
the physical ports.
Queuing
On the egress path the packets are enqueued in the transmit queues according to the mapping
scheme that has been applied on the ingress path. Shaping of the egress transmit queues are
configured in the port settings.
VLAN Translation
On the egress path an optional translation of the primary VLAN ID can be applied. This post process
allows the changing of the primary tag.
Service
On the egress path, an egress service can be assigned to the ports applying filtering, metering, VLAN
manipulation and QoS manipulation. The service assignment is done via packet matching rules.
Port
Before the packet is leaving the Ethernet switch on the egress port, VLAN and QoS settings can be
changed on the port level according to the requirement for the packet delivery.
MAC
The leaving packet is prepared for delivery on the egress port. The Medium Access Control therefore
sets the speed and duplex operation of the port.
The upcoming chapters describe the functionality in more detail and make reference to the GUI
representation in the LCT+.
The Ethernet Switch settings can be found in the Tree- or the View area of the LCT+.
The graphical representation of the ACCEED LT and NT in the View area is linked to the Tree Area.
By clicking on the descriptions (Switch, VLAN, etc.) in the graphical view, the respective tree structure
is opened and the Table area with the current settings is shown.
The Ethernet Switch chapter describes the "Switch Local" (LT) configuration. The configuration for the
respective "Switch EFM-NT" has the equal settings.
The figure below shows a simplified generic switch model with all possible ports that can be configured
with the ACCEED products. Ports that are not available for configuration for the ACCEED 2202 are
greyed out.
Please note that accessible switch ports are P1, P2, P3 and the SFP1 and SFP2 port. The WAN and
BPL (backplane port) are internal switch ports.
Figure 8-4 Overview switch ports ACCEED 2202 CM (plug-in) and CS (desktop) device
Maximum Frame Size values in ACCEED 2202: [1522, 2048 or 10240 Bytes]
If the maximum frame size is set to 1522 Bytes, untagged frames up to 1518 Bytes are
processed. This applies to the VLAN Unaware and VLAN Aware mode.
The Power Save mode is applicable only for twisted pair cables up to 30m
Enable
Enables or shuts down the port
Mode
Defines port speed and duplex operation
Auto Negotiation port speed and duplex operation is negotiated with peer port
10MBit/s Full Duplex port speed and duplex operation is forced to these values
10MBit/s Half Duplex port speed and duplex operation is forced to these values
100MBit/s Full Duplex port speed and duplex operation is forced to these values
100MBit/s Half Duplex port speed and duplex operation is forced to these values
Port Type
RJ45 interface pinout definition
Auto-MDI/MDIX Automatically detects the required cable connection type (straight-through or
crossover) and configures the connection appropriately
MDI Port Medium Dependent Interface port, typically used on the end devices
MDIX Port Medium Dependent Interface Crossover port, typically used on switches
Description
Port description with up to 64 characters (where is this description used SNMP ?)
Advertised Modes
Restrict port speed and duplex operation combinations for negotiation with the link partner
Only applicable when the Auto Negotiation mode is enabled
Flow Control
Enables the Flow Control mechanism by sending out "PAUSE" frames (full duplex operation) or
using backpressure (half duplex operation)
Please note that in case of electrical SFPs, flow control is available but the flow control status is
void.
LFP Target
The LFP target group which will be notified if the link of this port goes down.
The possible LFP target groups are: [none, A, B, C, D, E] ( 8.4.2.2)
LFP Sources
All selected LFP sources are monitored. If at least one LFP source is active, this port will be set to
down to signal the counter device on this Ethernet link an LFP alarm. Additionally the LFP alarm
is raised.
If all selected LFP sources change to inactive, this Ethernet link will be restored and the LFP
alarm cleared.
With the "Ingress Rate Limit Configuration" the ingress traffic type is analysed and the packets with the
selected traffic type are discarded in case the ingress rate limit is exceeded.
Traffic Types are recognised based on the destination MAC address of the packets.
The sources to trigger an LFP and therefore initiate a forced link down of Ethernet ports are:
LAN, SFP, BPL and LAG ports (no link alarm)
WAN ports (aggregation loss or partial aggregation loss alarm)
SOAM-MEP (SOAM-RemoteCCM alarm)
LFP Target: The LFP group configured here is notified if the connectivity on the path
between the MEPs is interrupted and shuts down the Ethernet ports in the selected target
group.
LFP Example:
The example in the above figure shows an ACCEED unit with the WAN1 interface being the LFP
source. Port P1 and P2 are assigned to the LFP group A.
If a loss is detected on interface WAN1 as indicated with the red cross, the port P1 and P2 are shut
down and report a forced shutdown state accordingly.
8.4.2.3 LAG
LAG (Link Aggregation Group) in ACCEED 2202 allows to combine 2 links to increase the throughput
and provide redundancy in case one link fails.
ACCEED 2202 provides LAG on the two SFP interfaces and the electrical ports P1 and P2 on the
desktop.
The LAG is a logical entity and all switch settings are done on the LAG level. The members of the LAG
therefore have no switch port settings. Flow control is the only parameter that can be configured on
the port level of the LAG members.
Packets sent to the LAG are distributed over the 2 ports according to the LAG hash algorithm.
The distribution algorithm is based on the combined L2/L2/L4 packet header information. The
algorithm can not be configured by the user but is defined in the ACCEED system.
LAG is configured by enabling the LAG function on both ends of the link at the same time. The link
OAM of all involved ACCEED 2202 ports in the LAG are automatically enabled and set to
configuration mode.
Note: It can take up to 3 Minutes until the LAG is visible in the LCT+.
The figure below shows a LAG configuration between two ACCEED 2202 desktop units as it is
presented in the LCT+
Discard
tunnel
peer
Types of Ethernet frames / layer 2 control protocols
Multicast frames
Multicast address: 01-80-C2-00-00-3x (x is between 0 - F)
IEEE 802.1D und 802.1D-2004 - MAC bridges and Spanning Tree Protocol - STP
IEEE 802.1w - Rapid Spanning Tree Protocol (RSTP)
IEEE 802.1s Multiple Spanning Tree Protocol (MSTP)
IEEE 802.1Q - Virtual LANs
IEEE 802.1Qay
IEEE 802.1p - Traffic Class Expediting and Dynamic Multicast Filtering
IEEE 802.1ag - Ethernet Service OAM - Connectivity Fault Management (CFM)
IEEE 802.1ag - Ethertype 0x8902
ITU-T Y.1731 - OAM Functions and Mechanisms for Ethernet-based Networks
IEEE 802.1ah Provider Backbone Bridges (MAC-in-MAC)
IEEE 802.1ad Provider Bridges (Q-in-Q, VLAN Stacking) 1
IEEE 802.1X - Port Based Network Access Control
IEEE 802.3ad - Link Aggregation Control Protocol (LACP)
IEEE 802.3ah - Ethernet in the First Mile (EFM) / Ethernet Link OAM
IEEE 802.3x - Flow Control
Generic Attribute Registration Protocol (GARP)
Cisco VTP
CDP
Table 2 ACCEED 2202 Layer 2 Control Protocol handling
1
VLAN aware mode
A3118-X652-R67-02 133 / 297
ULAF+ 8 - Ethernet Switch ACCEED 2202 Manual
The Power over Ethernet (PoE) control panel can be found in:
Ethernet/Switch Local/xxx Ports/P1/Power Over Ethernet
In VLAN Unaware mode one MAC address table stores the source MAC addresses learned from the
packets received on all ports of the switch. The related VLAN ID is always 1 which is the default VLAN
ID. This MAC address table can store up to 16k MAC addresses. The switching is done solely based
on the MAC address. This behavior is also known as Shared VLAN Learning (SVL)
In VLAN Aware mode, for each VLAN ID that is defined, a MAC address table is maintained. The sum
of all MAC addresses in these VLAN related MAC address tables can not exceed the 16k. The
switching is done based on the MAC address and the related VLAN ID. This behavior is also known
Independent VLAN Learning (IVL).
The ACCEED 2202 MAC table can be read out with the LCT+ and saved as text file. It can also be
manually flushed (all entries are deleted).
The `MAC Table` and `MAC Table Flush` buttons are located in the LCT+ dialogue `Switch
Local` and `Switch EFM-NT`
If the maximal number of 16k MAC addresses in the data base is reached, packets arriving
with addresses not yet in the MAC address table are flooded to all ports within the same
VLAN.
The MAC address learning can be switched off by choosing Learning Disabled as MAC Table Aging
Time. With this setting the switch becomes transparent and acts like a hub.
The value range for MAC table aging time is [Learning Disabled, 10 300 600] seconds
The example (Figure 8-12) shows that the traffic of customer 1 (orange) connected on WAN1 using
transmit ports P1 and SFP1 is separated from the traffic of customer 2 (green) connected on WAN2
using transmit ports P2 and P3.
To separate traffic of different customers using the same switch port, VLANs must be used. Please
refer to chapter 8.6.1
Port isolation can be configured per port in the LCT+ found at Ethernet/Switch Local/xxx
Ports/2202/Port Isolation
Please note that the port isolation must be configured for all ports belonging to the isolated
group.
The example below shows the port isolation configuration for port WAN1 of the orange
customer in the above figure. Port P1 and SFP1 must be configured accordingly to complete
the isolation.
To separate traffic of different customers using the same switch port, VLANs must be used. Please
refer to chapter 8.6.1
If Link OAM is turned on for a specific port, this port must be enabled in its own port isolation
table.
ACCEED supports port-based mirroring. All packets without MAC-level errors of the mirror source port
are duplicated and sent to the mirror analyzer port.
Port mirroring can be configured in the LCT+ in the Switch dialogues (local and EFM-NT)
Switch Local/Mirroring
8.6 VLAN
This chapter describes the VLAN modes and the port based VLAN manipulation options. The
reference model below shows the respective stages that are addressed.
Changing the configuration from VLAN aware to VLAN unaware does not erase the
VLAN database but all ports are configured to be member of VLAN1.
The VLAN mode can be configured in the LCT+ in the Switch dialogues (local and EFM-NT)
Bridging decisions in ACCEED are always done based on the Primary tag.
VLAN ID 1 is the default value and is always present in the VLAN Database.
VLAN ID 0 will be overwritten with the port VLAN ID without loosing the 1.p bits information.
VLAN ID 4095 is reserved according to IEEE 802.1Q and can therefore not be used.
Additionally to the VLAN ID definition, the "egress tagging mode" for each port and VLAN relation
needs to be set.
Please note that the setting in the LCT+ reflects the modification done to the packets on the egress
port.
The packets arriving on the egress port can have various tagging formats (e.g. untagged, single
tagged, double tagged). These packets are modified according to the egress tagging mode.
The result of the applied "egress tagging mode" to the possible tagging formats of the packets arriving
on the egress port are explained in the tables on the next pages.
The port based VLAN settings are only applicable if the VLAN aware mode is enabled.
The Egress direction offers a sub set of these parameters only as shown in the picture below
Port VLAN ID
[VLAN 1 all VLAN IDs defined in the VLAN database can be assigned]
The global TPID list ( 8.6.3.3) defines the values that are offered to define the primary and
secondary TPIDs for this specific port.
The ingress TPID list contains 4 Primary and 4 Secondary TPID values that can be set
Default value for primary and secondary TPID1 is 0x8100
The egress TPID list has 1 Primary and 1 Secondary TPID value that can be set
Default value for primary and secondary TPID is 0x8100
VLAN translation
VLAN translation
MAC
Scheduler
Shaper
VLAN
Policy
Policy
VLAN
VLAN
VLAN
QoS
QoS
QoS
QoS
To get to the first flow metering process you need to define a packet classification rule
and a bandwidth profile. Attach both to a new created Ingress Service and assign this
service to at least one ingress port. If necessary adjust the Queue mechanism at the
egress port.
At the ingress port each arriving packet is analysed separately and gets an individual assignment
of the transmit queue number, the packet color, the CoS and DSCP value. These four parameters can
be modified with the help of Ingress Policing Services. This gives the possibility to pre-define the
importance of different streams. Those streams are then ordered, prioritized and shaped in the
queuing engine. For post-processing it is possible to use Egress Policing Services to assign new
CoS and DSCP values or drop out unqualified flows. At the egress port the remarking of CoS and
DSCP bits is done.
It is also possible to look deeper into the Packet structure, e.g. IP and TCP/UDP streams:
A Rule has an ID, this is it internal number, and optional a name assigned in the description field. If no
rule name is applied, the name Rule ID #<IDnum> is used. The corresponding Service Configuration
uses a dropdown box that shows all available rules. We recommend using rule names, which describe
the matching parameters. E.g. a rule that matches on IEEE802.1p Priority bits with COS value 4 could
be described dot1p=4.
Create a new Rule by navigating to Switch/Policing/Rules and press Add Button in the
Configuration->ACCEED 2202 tab
Now the new rule template is created and ready to be filled with your demands
Flows = series of frames with a common attribute (e.g. VLAN ID, QoS, )
Service = treatment of a flow
Criteria Enable all relevant matching criteria. These are combined by mathematical and.
8.8.2 Policing
Policing is a mechanism that identifies e.g. the bandwidth of a traffic flows and defines the treatment of
traffic exceeding this bandwidth. To each flow a traffic profile can be attached within the corresponding
service. This traffic profile consists of a guaranteed and a peak bandwidth that can be shared with
other services.
Each packet within this policed stream is taken into account for the calculation of the used bandwidth.
The mechanism results in different colors that are attached to each packet of the stream:
Green = within the guaranteed bandwidth limit (CIR)
Yellow = outside the guaranteed, but within the exceeding bandwidth limit (PIR)
Red = outside the exceeding bandwidth limit
Later on it can be decided to transmit/change/drop/mirror the packets based on their color.
8.8.2.1 Color decision process
There are two different modes of color dependent policing: color aware and color blind. These
modes describe, if the incoming packets already carries information about the color (within the VLAN
tag or the IP/DSCP bits) or not.
The Color Mode can be set in the Bandwith Profile which is assigned to the Ingress Service.
Initial colored green packets take green tokens. If not available yellow and then red
tokens. Initial colored yellow packets take only yellow tokens, red if no yellowed are
available.
In color blind mode Step 1 and Step 2 are skipped. Each packet is assumed to have the initial color
green
The picture shows an example of a 5 packet burst. Let us assume that we do not get additional tokens
during this burst and the bucket is full with tokens. Each packet passing by the bucket will take a token
from it, starting with the green ones and continue with the yellows. If no tokens are in the bucket
anymore, the color of the packet gets red.
This picture shows an example of a 5 packet burst. Let us assume that we do not get additional tokens
in any bucket during this burst and the buckets are full. Each packet passing the yellow bucket picks a
yellow token from the yellow bucket. If no token is available anymore the packet gets red. Then the
packet passes the green bucket, picks a green token, if available, and changes its color to green
(yellow color is lost). Note: The CIR is a part of the PIR, that assures, that in case of an empty yellow
bucket the green is also empty. Therefore it will never happen that red packets change their color to
green.
A3118-X652-R67-02 163 / 297
ULAF+ 8 - Ethernet Switch ACCEED 2202 Manual
This example demonstrates that a burst with initial colored yellow packets empties the yellow bucket
before the green and leads to red packets with still green available tokens. Compared to the color
blind mode we may now exactly drop the right initial colored packets (3 and 6)
This example shows a 6 packet burst with different initial colors. As the green bucket get empty the 3rd
packet gets the replace color yellow, because it has already got a yellow token. The 5th and 6th packet
cannot get any yellow tokens therefore they replace their color with red.
Color Mode
Color blind: color decision is done according to chapter 8.8.2.2
Color aware: initial color information is transported within the packets ( 8.8.2.3)
Metering Mode
Single Rate, Three Colors: one guaranteed bit rate (CIR) with a covered burst (CBS) colored in
green and an exceeding burst (EBS) colored in yellow
Two Rates, Three Colors: two separate bit rates, one for guaranteed (CIR) and one for
maximum (PIR) bit rate. Burst sizes are divert, too (CBS and PBS)
Frame Command
Forward: All packets matching one of the Rules will be forwarded via the bridge
Drop: All packets matching one of the Rules will be dropped
Redirect: All packets matching one of the Rules will be moved to redirect port
Redirect with MAC swap: All packets matching one of the Rules will be redirected to redirect
port and their source and destination MAC will be swapped
Redirect Port defines destination port to redirect packets
Mirror to Analyzer Port A copy of each packet of this ingress service will be additionally sent
to global ingress mirroring analyzer port Switch/Mirroring
Service QoS Profile Service profile ID #1#16 defining queue assignment, CoS & DSCP
value and packet color Switch/QoS/Ingress/Service Profiles
If None is selected, the queue assignment and the initial packet color
is used from the ingress port <port>/QoS/Ingress/Port Profile
Remark CoS
No: do nothing
Yes: remark the priority bits (.1p) of the primary VLAN tag with the assigned
CoS value of service QoS profile
Switch/QoS/Ingress/Service Profiles
Keep Port Remark Decision: CoS remark decision has higher priority than the ingress service
<port>/QoS/Ingress/Port Profile
Remark DSCP
No: do nothing
Yes: remark the DSCP bits of the IP Header with the Assigned DSCP Value of Service QoS
Profile Switch/QoS/Ingress/Service Profiles
Keep Port Remark Decision: DSCP remark decision has higher priority than the Ingress Service
Bandwidth Profile Name of the bandwidth profile (Color Mode, Metering Mode, CIR, CBS,
PIR, PBS) used for the matching packets of this Ingress Service.
Switch/Policing/Bandwidth Profiles
Dedicated Bandwidth Profile
An instance of the selected bandwidth profile is created and attached to this service. This
bandwidth profile runs independently of other services
Share bandwidth profile with all Services that refer the same Bandwidth Profile ID
Yellow Frames Command
Transmit unchanged: no change to the packet transmission process
Drop: Discard all packets that are marked yellow
Assign Yellow Frames QoS Profile: Queue assignment, CoS / DSCP value
Switch/QoS/Ingress/Metering Yellow Frames Profiles
Yellow Frames QoS Profile Yellow Frames Profile ID #1#16 defining Queue Assignment,
CoS & DSCP value
Switch/QoS/Ingress/ Metering Yellow Frames Profiles
Red Frames Command
Transmit unchanged: transmit anyway
Drop: Discard all packets that are marked red
Assign Red Frames QoS Profile: Queue assignment, CoS / DSCP value
Switch/QoS/Ingress/Metering Red Frames Profiles
Remark CoS Yellow Red
No: do nothing
Yes: remark the priority bits (.1p) of the primary VLAN tag with the
assigned CoS value of metering Yellow Frame Profile
Switch/QoS/Ingress/Metering Yellow Frames Profiles
Keep Port Remark Decision: CoS remark decision has higher priority than the ingress service
<port>/QoS/Ingress/Port Profile
Remark DSCP Yellow Red
No: do nothing
Yes: remark the DSCP bits of the IP packets with the assigned CoS value
of metering Yellow Frame Profile
Switch/QoS/Ingress/Metering Yellow Frames Profiles
Keep Port Remark Decision: DSCP remark decision of the ingress port has higher priority than
the ingress service
<port>/QoS/Ingress/Port Profile
VLAN Command All matching packets of this ingress service will have
Force Primary VLAN ID: VLAN ID of the primary tag remarked by value of primary VLAN ID
Enable VLAN Tunneling: added outer tag with VLAN ID of primary VLAN ID
Primary VLAN ID [14094] Value of the primary VLAN ID tag for force and tunneling rules
Rule #1 #4 Select up to 4 ingress matching rules from rules pool. Rule #1 has the highest
priority. The first match leads to the execution of this Ingress Service
Service #1 #8 Assigns up to 8 ingress services to the physical port. Each ingress packet on
that port will run through the assigned services till it gets a match. The
corresponding service is then executed and all following services are skipped
for this ingress packet.
Frame Command
Forward: All packets matching one of the Rules will be forwarded via the Bridge
Drop: All packets matching one of the Rules will be dropped
Bandwidth Profile Name of the bandwidth profile (Color Mode, Metering Mode, CIR, CBS,
PIR, PBS) used for the matching packets of this Ingress Service.
Switch/Policing/Bandwidth Profiles
Dedicated Bandwidth Profile
An instance of the selected Bandwidth Profile is created and attached to this Service. This
bandwidth profile runs independently of other services
Share bandwidth profile with all Services that refer the same Bandwidth Profile ID
Yellow Frames Command Assign Yellow Frames QoS Profile: CoS and DSCP Value
Switch/QoS/Egress/Metering Yellow Frames Profiles
Red Frames Command Drop
Remark CoS Yellow
No: do nothing
Yes: remark the priority bits (.1p) of the outer VLAN Tag with the Remarked CoS Value
Switch/QoS/Egress/Metering Yellow Frames Profiles
Remark DSCP Yellow
No: do nothing
Yes: remark the DSCP bits of the IP Header with the Remarked DSCP Value
Switch/QoS/Egress/Metering Yellow Frames Profiles
VLAN Command All matching packets of this ingress service will have
Force Outer VLAN ID: VLAN ID of the outer tag remarked by the value of Outer VLAN ID
Outer VLAN ID [14094] Value of the Outer VLAN ID tag for Force and Tunneling rules
Rule #1 #4 Select up to 4 ingress matching rules from rules pool. Rule #1 has the highest
priority. The first match leads to the execution of this Ingress Service
Service #1 #4 Assigns up to 4 egress services to this physical port. Each egress packet on
that port will run through the assigned services till it gets a match. The
corresponding service is then executed and all following services are skipped
for this egress packet.
8.8.3 Queuing
There are many traffic situations in modern Ethernet networks which lead to overload conditions of the
traffic interfaces. In situations where traffic drops should be prevented to get a high throughput
(TCP/IP) large packet buffers are a good solution. In case of low latency traffic (e.g. VoIP, Video)
buffers should be minimized and this traffic should be prioritized against other services. To solve this
conflict, the best solution is using a flexible queuing mechanism that can be individually configured for
the customer demand.
The packet processor of the ACCEED 2202 has an integrated a flexible queuing engine. Compared to
standard switches you can combine strict priority and weighted fairness on the same port and the
scheduling distribution amongst the queues is done on bandwidth ratio and not on inaccurate packet
ratio.
Before packet streams are stored in the queues they need to be assigned to the selected queue. This
can be done through Class of Service profiles (802.1p prio bits + DEI bit and/or DiffServ Code Points
DSCP within the IP) or within policing services.
The egress interface is a constant data rate sink limited through the physically (UNI) or the logically
(rate shaping) defined port capacity. Packet streams from different ingress ports and traffic bursts may
lead to a congestion situation on that link and will fill the corresponding buffers of the queues.
Each egress port has a shaped deficit weighted round robin (SDWRR) mechanism with 8 independent
queues.
The following parameters can be individually configured per queue:
- Strict priority (SP) or weighted fairness queuing (WFQ) with different weights
- Queue buffer size for low latency (16x256 bytes) or high burst coverage (224x256 bytes)
- Threshold value to early drop yellow and red packets
- Shaper with queue data rate and the maximum burst size
This scheduling mechanism starts from the highest (#7) to the lowest priority (#0) queue and handles
its queued packets with the following manner:
1) strict priority
As long as there are packets in this queue and no packets in a higher queue are processed,
this queue will send its packets until the queue is empty.
2) WFQ Weight x
All Queues with mode WFQ Weight x share the available bandwidth in the configured
bandwidth ratios.
Example: available bandwidth is 8 Mbit/s. There are 3 queues with different weights 2, 4 and
10. Result: The first queue will get 1MBit/s, the second 2MBit/s and the third 5Mbit/s.
Recommendation: configure the highest priority queues with strict priority and the rest in WFQ.
Use short queue buffer sizes for strict priority queues to get lowest latency.
Figure 8-38 Trust mode, port CoS and port remark defaults
Trust Mode select the profile parameter set for QoS for this ingress port
Untrusted: use Port Profile parameter set
<port>/QoS/Ingress/Port Profile
Trust CoS Values only: use the CoS Profiles
Switch/QoS/Ingress/CoS Profiles
Trust DSCP Values only: use the DSCP Profiles
Switch/QoS/Ingress/DSCP Profiles
Trust DSCP/CoS Values: use the DSCP Profiles for IP Packets, then the CoS Profiles for
tagged packets
Switch/QoS/Ingress/DSCP Profiles
Switch/QoS/Ingress/CoS Profiles
Trusted VLAN Tag CoS and DEI value for the CoS Service Profile selection is taken from
Primary VLAN Tag:
Secondary VLAN Tag:
Remark CoS
No: do nothing
Yes: remark the priority bits (.1p) of the primary VLAN Tag with the value of the profile
Remark DSCP
No: do nothing
Yes: remark the DSCP bits of the IP Header with the value of the profile
Default CoS CoS value for untagged packets
8.8.3.2 Configuration Settings: QoS Assignment with the port profile (Untrusted
Mode)
Assigned Queue assign transmit queue number for any egress ports
Assigned CoS Value set CoS value for remarking or rule matching
Assigned DSCP Value set DSCP value for remarking or rule matching
Assigned Initial Color set initial ingress packet color
8.8.3.3 Configuration Settings: QoS Assignment with CoS profiles (Trust CoS Values
only)
Each ingress packet that is tagged has a CoS value and a DEI bit. All 16 possibilities are covered with
this profile list. According to CoS and DEI bit of the primary tag the following attributes are set:
Assigned Queue assign transmit queue number for the egress ports
Assigned CoS Value set CoS value for remarking or rule matching
Assigned DSCP Value set DSCP value for remarking or rule matching
Assigned Initial Color set initial ingress packet color (typically DEI=0 green, DEI=1 yellow)
8.8.3.3.1 Configuration Settings: QoS Assignment with DSCP profiles (Trust DSCP
Values only)
Each ingress packet that is an IP packet has a DSCP value. All 64 possibilities are covered with this
profile list. According to the six DSCP bit of the IP header the following attributes are set:
Assigned Queue assign transmit queue number for the egress ports
Assigned CoS Value set CoS value for remarking or rule matching
Assigned DSCP Value set DSCP value for remarking or rule matching
Assigned Initial Color set initial ingress packet color (typically all green)
Each packet that matches an ingress service and is within the policing range of green (CIR/CBS) may
override the existing QoS set. There are 16 individually defined Service Profiles attribute sets
available. Each of them with the QoS set:
Assigned Queue assign transmit queue number for the egress ports
Assigned CoS Value set CoS value for remarking
Assigned DSCP Value set DSCP value for remarking
Assigned Color set packet color (typically green)
8.8.3.7 Configuration Settings: port queue profile assignment & DEI bit Remark at
Egress
This section defines the queue profile that should be attached to this physical port. Additionally the
Drop Eligibility Indicator located in the VLAN tag of the primary tag maybe remarked. If remark is
enabled, the DEI bit carries then the color information based on the policing process: 0 = green, 1 =
yellow.
Transmit Queue Profile Assigns one of the 4x predefined queue profiles to the egress port for
the parameter selection queue number, buffer size, threshold and
scheduling
Remark DEI Bit Remarks Drop Eligibility Indicator with packet color (green=0, yellow=1).
This indicator transports the packet color information from this network
instance to another one. The DEI bit is located in the primary VLAN tag
(Figure 8-26)
MaximumShapingDelay[ms]
ShapingBurstSize[kByte]
8 10 3
ShapingRate[kbit / s ]
These statistics groups are explained in more detail in the following chapters.
The figure below shows an overview of the port, service and EVC statistics.
The RMON port counters are always enabled and presented in bytes and packets (or events).
The Service Counters and the Transmit Queue Counters must be enabled for counting.
The total number of counter groups that can run in parallel is limited in the ACCEED unit. Therefore
only 2 of the following 3 global counter groups can be enabled in parallel:
The metering counters (ingress and egress) are always enabled, but must be globally configured to
either count bytes or packets.
Please refer to chapter 8.4.1 for more information.
Please note that all counter values of all groups are displayed even if the global counter
setting of a given group is set to 'Disabled'. The values for the disabled counters remain 0
(zero).
If metering counters are globally set to 'Bytes', the metering packet counters remain 0
(zero). If metering counters are globally set to 'Packets', the metering byte counters remain
0 (zero) accordingly.
If the Statistics Current is not active, the performance value are displayed as Inactive
ACCEED supports group 1 of the RMON MIB parameters (Ethernet Statistics Group). This group
contains statistics measured by the probe for each monitored Ethernet interface on this device.
Individual RMON statistics are available for each switch port of the ACCEED LT and NT (LAN-Ports
and WAN Ports). Additionally the HC-RMON MIB overflow counters (High Capacity) are implemented
to cover overflows of the 32 bit RMON counters.
The content of the Ethernet Statistics Group is listed and described in the etherStatsTable
(see Table 13).
(Alignment Error).
The best estimate of the total number of collisions on this
etherStatsCollisions
Ethernet segment.
The total number of events in which packets were dropped
by the probe due to lack of resources. Note that this number
etherStatsDropEvents
is not necessarily the number of packets dropped; it is just
the number of times this condition has been detected.
The total number of packets (including bad packets) received
etherStatsPkts64Octets that were 64 octets in length (excluding framing bits but
including FCS octets).
The total number of packets (including bad packets) received
etherStatsPkts65to127Octets that were between 65 and 127 octets in length inclusive
(excluding framing bits but including FCS octets).
The total number of packets (including bad packets) received
etherStatsPkts128to255Octets that were between 128 and 255 octets in length inclusive
(excluding framing bits but including FCS octets).
The total number of packets (including bad packets) received
etherStatsPkts256to511Octets that were between 256 and 511 octets in length inclusive
(excluding framing bits but including FCS octets).
The total number of packets (including bad packets) received
etherStatsPkts512to1023Octets that were between 512 and 1023 octets in length inclusive
(excluding framing bits but including FCS octets).
The total number of packets (including bad packets) received
etherStatsPkts1024to1518Octets* that were between 1024 and 1518* octets in length inclusive
(excluding framing bits but including FCS octets).
Table 13 Ethernet Statistics Group content
* In ACCEED this counter is not limited to 1518 bytes but defined by the globally configured maximum
frame size.
Additionally to the RMON counters listed above, the following counters are available for each port:
"Total Packets Sent"
"Total Octets Sent"
"Total Packets Dropped"
For all switch ports, the above listed packet counters can be displayed also in the LCT+.
Counter values of the other ports (LAN, WAN, SFP, BPL) are presented in the same way by
choosing the appropriate port in the tree area.
The Refresh button reads out the latest counters and updates the values in the GUI.
Reset zeroes all counters of the respective port currently being displayed
Statistics: Countinuous or the Historic statistics is displayed.
Additional overflow counters exist for some RMON counters to meet the requirements for
HC-RMON. HC-RMON counters are 64 bits wide, compared to RMON counters, which are
For every service the total counted frames and bytes are displayed.
Please note that the global Ingress/Egress Policy Counters must be enabled and
Ingress/Egress Metering counters must be set to Bytes or Packets. If set to Packets, the
Green,Yellow and RED frames are counted, when set to Bytes, the Green, Yellow and Red
Bytes are counted accordingly. please
Counter values of the other ports (LAN, WAN, SFP, BPL) are presented in the same way by
choosing the appropriate port in the tree area.
The figure below shows the continuous egress statistics for Policy 1 of the port WAN1. The
global egress metering counters are set to Bytes.
The Refresh button reads out the latest counters and updates the values in the GUI.
Reset zeroes all counters of the respective port currently being displayed
Statistics: Countinuous or the Historic statistics is displayed.
For every transmit queue of a port the total amount of transmitted frames and bytes as well as
the total amount of dropped frames and bytes are displayed.
Counter values of the egress queues of the other ports (LAN, WAN, SFP, BPL) are presented
in the same way by choosing the appropriate port in the parameter tree.
The Refresh button reads out the latest counters and updates the values in the GUI.
Reset zeroes all counters of the respective port currently being displayed
Statistics: Countinuous or the Historic statistics is displayed.
For every service the total counted frames and bytes are displayed.
Please note that the global Ingress/Egress Policy Counters must be enabled and
Ingress/Egress Metering counters must be set to Bytes or Packets. If set to Packets, the
Green,Yellow and RED frames are counted, when set to Bytes, the Green, Yellow and Red
Bytes are counted accordingly.
Counter values of the other ports (LAN, WAN, SFP, BPL) are presented in the same way by
choosing the appropriate port in the tree area.
The figure below shows the continuous ingress bandwidth profile statistics of the port WAN1.
The global ingress metering counters are set to Bytes.
The Refresh button reads out the latest counters and updates the values in the GUI.
Reset zeroes all counters of the respective port currently being displayed
Statistics: Countinuous or the Historic statistics is displayed.
Please note that the global Ingress/Egress Policy Counters must be enabled and
Ingress/Egress Metering counters must be set to Bytes or Packets. If set to Packets, the
Green,Yellow and RED frames are counted, when set to Bytes, the Green, Yellow and Red
Bytes are counted accordingly.
The Refresh button reads out the latest counters and updates the values in the GUI.
Reset zeroes all counters of the respective port currently being displayed
Statistics: Countinuous or the Historic statistics is displayed.
8.10.7 Utilization
Utilization provides information on data rates in kbit/s and link or service utilization in percent [%].
The data rates and utilization can be displayed in a real time diagram which is updated regularly. The
data rates and utilization are derived from the counter values.8.9
Utilization information for the other listed points above can be accessed the same way by
selecting the respective point in the tree area.
Refresh computes the actual values and updates them in the GUI.
Diagram opens the window to select the values to be shown in the graph (see below)
Ok opens the Realtime Diagram window and starts displaying the selected data (see below)
Cancel closes this windows and returns back to the main utilization window
Clear deselect all selected data
The graphs in the Bitrate and Utilization diagram to be displayed can be selected on the right
side of the diagrams.
Maximal 10 graphs can be displayed concurrently in the bitrate and utilization diagram. The
graphs are updated every 4 seconds.
9
Operation and
Maintenance
The OAM entities communicate over a dedicated protocol packets (OAMPDUs) with a rate of one up
to ten packets per second. This means that every second at least one OAMPDU packet containing
information flags is exchanged between OAM entities.
The OAMPDUs are terminated by the OAM entities or are discarded if there is no OAM layer
implemented. OAMPDUs are never forwarded to other links.
Loopbacks:
The Link OAM parameters can be found in: Ethernet\Switch Local\xxx Ports\Py\Link OAM
The active entity initiates the Link OAM; at least one entity of a link must therefore be active. The other
may be passive, but it can be active also.
An entity in the active mode detects automatically if the remote entity supports OAM. It discovers also
which specific capabilities are supported.
The management communication between ACCEED 2202 CM and CS is realized trough the link OAM
channel.
ACCEED 2202 therefore has a proprietary Link OAM mode named Configuration Mode. This mode
must be set in every CM CS configuration to allow management communication. The management
communication is required to e.g. see the CS via LCT+ or to perform a FW download.
Capabilities
If the Remote Loopback capability is enabled, the remote peer can initiate a loopback on that port.
Service OAM
Services
(Y.1731, 802.1ag)
Service OAM is an Operations, Administration and Maintenance mechanism defined for an Ethernet
network (Service OAM Domain).
The example in Figure 9-3 shows a network with 3 endpoints and the 3 possible endpoint-to-endpoint
connections.
In the general case of n MEPs there exist n x (n-1)/2 MEs. These MEs constitute a ME Group (MEG)
[ITU-T] respectively a Maintenance Association (MA) [IEEE].
Every MEG / MA has a unique MEG ID [ITU-T] / MAID [IEEE] for differentiation from neighboring
MEGs / MAs
MEGs / MDs on higher levels are larger (or at least equal) than those on the lower levels.
The example in Figure 9-4 illustrates how the level can be used to differentiate the maintenance level:
Customer level
Service provider level
Operator level
Ethernet link level
Customer Customer
Operator A Operator B
Equipment Equipment
Provider domain
Link OAM
1) Domains
In this section the domain configurations are set up. This includes the definition of the maintenance
points (MEP or MIP) and the assigned client maintenance points (CMP).
Additionally, the fault management functions can be configured and performed. This includes CCM,
AIS, LCK and also loopback and linktrace.
2) Delay Measurement
The delay measurement section consists of the frame delay measurement (FD) and the inter frame
delay variation (IFDV) measurement.
To set up a delay measurement a respective session is configured on the local unit and the
corresponding responder on the remote device. Thresholds for each session can be defined to raise
an alarm, when the defined criterias are met. The results can be stored in up to 32 user definable
intervals and can be displayed in a table.
3) Loss Measurement
The loss measurement section consists of the frame loss ratio (FLR) measurement and the Availability
measurement.
Single- or dual ended loss measurement sessions can be set up.
Single ended loss measurement sessions are based on the exchange of LMM (Loss Measurement
Message) sent out by the initiating session and LMR (Loss Measurement Reply) sent by the
responder.
Dual ended loss measurement sessions are based on CCMs (Continuity Check Message) messages.
Two corresponding sessions are therefore set up.
To set up a loss measurement, a respective session is configured on the local unit and the
corresponding responder on the remote device.
Single-Ended with LMM/LMRs session and corresponding responder,
Dual-Ended with CCMs two corresponding sessions, no responders
Thresholds for each session can be defined to raise an alarm when the defined criteria are met. The
results can be stored in up to 32 user definable intervals and can be displayed in a table.
Domain parameters:
Maintenance Domain Name Format:
[No Maintenance Domain Name Present, Character String]
If the format is set to NO, then only the Short MA Name can be configured with up to 45
characters.
If the format is set to Character String, then the Maintenance Domain Name can be set with up
to 43 characters. Additionally the Short MA Name can be set but the field length of 43 is reduced
by the length of the configured Maintenance Domain Name.
Short MA Name Format: [Character String, ICC based Format]
The Maintenance Domain Name Length is automatically determined. (read only value)
Short MA Name [SOAM Domain x, max. length is 45 characters]
Maintenance Domain Name: [Maintenance Domain x, max. length is 43 characters]
Only available, if the maintenance domain name format is set to Character String
Associated VLAN [ ]
Before a Source Associated VLAN can be assigned to the maintenance domain, the respective
VLAN need to be defined in the Associated VLAN table.
VLAN double-tagging (tunnel VLAN tag and domain associated source VLAN tag) is supported for
the frames of the following SOAM protocols:
- Ethernet Continuity Check (CCM)
- Ethernet Loopback (LBM, LBR)
- Ethernet Linktrace (LTM, LTR)
- Ethernet Alarm Indication Signal (AIS)
- Ethernet Locked Signal (LCK)
- Ethernet Loss Measurement (LMM, LMR)
The SOAM VLAN double-tagging is only supported under certain constraints for Ethernet Delay
Measurement (DMM, DMR).
The following scenarios are supported:
- Adding and removing a tunnel VLAN tag to a delay frame between the initiating and
responding MEP.
- Starting and terminating a tunnel in the device processing the delay frames, but the
ingress/egress port is not a tunnel port
The tunnel VLAN tag has to be the outer and the primary VLAN tag.
If tunnelling is applied, make sure the to configure the following parameters accordingly:
- Ingress policies
- VLAN egress tagging commands in the VLAN DB
- Ingress/Egress TPIDs of the tunnel port
For each measurement end point the expected remote MEPs must be entered in the CCM database.
CCM messages received from unknown MEPs (MEP not present in the CCM database), raise
an XconCCM alarm. Invalid CCM messages (e.g. with unexpected CCM interval) which are
received raise an ErrorCCM alarm.
Lack of messages from MEPs (No CCM message received within 3.5 times the CCM interval)
present in the CCM database, also raise a RemoteCCM alarm.
MEPs are entered in the CCM data base by clicking the Add button and entering a valid MEP-
ID.
MEPs are removed from the CCM database by clicking the Remove or Remove All button.
For each MEP in the CCM Database the following (read-only) information are available:
MEP ID
ID of the remote MEP
State
The following states are possible:
- Idle Continuity Check not yet started
- Start Continuity Check starting
- Failed No Continuity Check Messages received from remote MEP
- OK Continuity Check Messages received from remote MEP
Last State Change
This parameter indicates the time and time at which the remote MEP last entered the Failed or Ok
state or 0 (zero) if it has not yet entered either state.
MAC Address
MAC address of the remote MEP
RDI
This parameter reports the state of the Remote Defect Indication (RDI) flag in the received
Continuity Check Messages (CCM).
LFP Target
Defines the LFP target group, which will be notified if the connectivity to this MEP has failed (3
consecutive CCM have been lost)
The ports defined in this LFP group are forced down accordingly.
Please refer to 8.4.2.2 for more information on LFP (Link Failure Propagation)
Client MP parameters:
Client MPs are configured to forward AIS and LCK signal of the domain the problem occurred, to the
higher level domain MP.
Up to 4 client MPs can be assigned to one MEP where as the client MPs of a MEP resides always on
the same ACCEED unit as the MEP itself. The client MP can be a MEP or MIP.
Please refer to the AIS and LCK chapter in the Service OAM fault management chapter 9.2.9 for client
MP examples.
Client MP are entered by clicking the Add button on the Client MP[] level.
For each Client MP, the Service Domain and the corresponding Maintenance Point on that
domain level (can be MEP or MIB) must be assigned.
AIS is initiated if a defect condition on an MEP appears and AIS is enabled on this MEP. This MEP
forwards the AIS to all configured client MPs on the higher MEG levels. The client MPs (MIP) then
send AIS frames in the defined period.
Please refer to chapter 9.2.8.5 for AIS configuration information on the domain level.
Client MP configuration is explained in chapter 9.2.8.6.
Note:
Domains[Y]/Locked_Signal Enables the transmission of LCK frames and the forwarding of the LCK
signal to a client maintenance point)
9.2.9.3 Loopback
SOAM Loopbacks are a sort of "Ethernet Ping". A SOAM loopback is started on a MEP; possible
targets are MEPs and MIPs (only with unicast messages) in the same domain (MEG/MA).
9.2.9.4 Linktrace
Linktrace is an on-demand Service OAM function which is used for path discovery between an
initiating MEP and a remote maintenance point. Fault locations can be determined by sending a
LTM (Link Trace Message) and the analysis of the LTRs (Link Trace Reply). This works
analogous to the IP traceroute function.
SOAM linktrace are available on Switch Local, Switch EFM-NT and Switch CS in the
following node:
SOAM\Domains\Domain X\MPs\MP Y\Linktrace
The linktrace replies are automatically presented in a window that opens when the trace has been
finished. It can also be read out and displayed by clicking the Read Linktrace Replies button.
TTL: TTL value after being decremented each time the LTM frame has been forwarded
by a MP. Starting from the configured TTL value
hwOnly: if 1, the filtering database (MAC table) of the switch is used only to determine the
egress port of the LTM frame (this applies to each forwarding MP on the route from
initiating MEP to the target MP). Otherwise, the optional MIP CCM database can
additionally be used to determine the egress port of the LTM frame.
fwdYes: the FwdYes flag is set if a modified LTM is forwarded
terminalMep: the TerminalMEP flag is set, if the MP in the reply egress TLV (or reply ingress TLV
if the egress TLV is not present) is a MEP
lastEgressId: The implementation in ACCEED is based on Y.1731 where the EgressID is defined
as 8 Byte value. The first 2 Bytes are ZEROs and the following 6 Bytes are the MAC
address of the last LTM-responder.
nextEgressId: The implementation in ACCEED is based on Y.1731 where the EgressID is defined
as 8 Byte value. The first 2 Bytes are ZEROs and the following 6 Bytes are the MAC
address of the actual LTM-responder.
relayAction: RlyHit: The MPs MAC address matches the target MAC address of
the LTM frame. RlyFDB: The egress port was determined using the filtering
database/MAC table
RlyMPDB: The egress port was determined using the MIP CCM database
ingressAction: IngOK or empty = unknown
ingressAddress: MAC address of the associated port of the ingress MP
egressAction: EgrOK or empty = unknown
egressAddress: MAC address of the associated port of the egress MP
The purpose of Service OAM performance monitoring is to verify that SLAs are met in terms of the
contracted performance attributes. According to Section 6.9 EVC Related Performance Service
Attributes of MEF 10.2 [16] the following attributes can be specified for a service:
The protocols and mechanisms required for the measurements are defined in ITU-T Y.1731 [17].
These are:
The loss measurements are used for both FLR and availability performance. The definition of
availability is thereby left out of scope of the Y.1731 Recommendation.
Also the delay measurements are used for both FD and IFDV performance.
The measurement protocols always run between two MEPs. If the measurement is dual-ended it
means that both MEPs can gather results. If it is single-ended only the initiating MEP can gather
results. A one-way measurement is similar to dual-ended measurement while two-way is akin to
single-ended. However it is also possible to get (at least approximate) one-way results from two-
way measurement. They are then known as forward and backward, see Figure. The details are
explained later on.
Two-way measurement
Forward1
MEP A MEP B
Backward1
Round-trip
One-way measurement
MEP A MEP B
1
As seen from MEP A
Figure 9-7 Two-way vs. one-way measurement
The performance monitoring functions in ACCEED are grouped in two parts the delay measurement
(DM) and the loss management (LM).
Before the actual delay or loss measurement can be started, a measurement session and responder
need to be configured on the respective devices.
Up to eight sessions and responders can be defined per ACCEED unit for delay and loss
measurement.
Each of the sessions requires a responder on the far end MEP to be configured. The responder adds
the required measurement information and makes sure the data is sent back towards the MEP where
the session was started.
All performance measurements are specific to a domain and consist of a session and a responder.
The picture below illustrates the session and responder principal.
Delay measurement responders are available on Switch Local, Switch EFM-NT and Switch
CS in the following node:
SOAM\Domains\DM Responders\Responder x
Every delay measurement results is assigned to one of maximal 5 intervals called bins, whose
corresponding counter is increased.
The range of bin x is defined by the lower threshold (thld) assigned to bin x and the lower threshold
assigned to bin (x+1).
Measurements with a delay greater then 5 sec are not considered and therefore discarded.
Up to 5 Round-Trip Bins can be configured for each DM session, whereas the threshold of Bin 1 is a
permanent list entry. Bins 2 to 5 can be added with the respective Add button.
In order to supervise the delay of a service and generate an alarm if a defined limit is exceeded within
a measurement interval, for each DM session an Objective Round-Trip delay and a Percentile Round-
Trip delay can be configured.
An SOAM-FD Objective Alarm is raised if less percent of the measurements defined by the
Percentile Round-Trip are below the round trip delay defined by the Objective Round-Trip.
The Objective Round-Trip is defined by choosing the respective Bin. Default value: None
The Percentile Round-Trip range is from 0 to 100%. Default value: 95%
Delay measurement in ACCEED provides the frame delay measurement information of the current
interval and the past up to 32 intervals in a history. The interval duration is configurable in the range of
1 to 1440 minutes.
The frame delay measurement results of the respective interval are accessed via the
Performance tab and the following path SOAM\DM Sessions\Session x\FD
If historic statistics is configured and enabled, these values can be seen by selecting the
respective interval in the Statistic pull down menu as shown at the bottom in the picture
below.
If the Round-trip values show unknown and the completed and valid measurements are
zero, then a possible communication problem between the DM session and responder might
cause the failure. Verify the session and responder settings and the communication path in-
between.
If the value is showing Inactive, this indicates that the current statistics counter is not
enabled. To enable the statistics counter go to
SOAM\DM Sessions\Session x\FD\Statistics\Current
Every frame delay measurement is assigned to the respective Bin and counted there. The Bin
counters can be accessed via the Performance tab and the following path:
SOAM\DM Sessions\Session x\FD\Round-Trip Bins[]
If historic statistics is configured and enabled, these values can be seen by selecting the
respective interval in the Statistic pull down menu as shown at the bottom in the picture
below.
Every IFDV measurement results is assigned to one of maximal 5 intervals called bins, whose
corresponding counter is increased. This is performed in forward and backward direction accordingly.
For more information on the Bin principle please refer to chapter 9.2.10.3
Up to 5 Forward and 5 Backward Bins can be configured for each DM session, whereas Bin 1 is a
permanent list entry. Bins 2 to 5 can be added with the respective Add button.
In order to supervise the inter-frame delay variation of a service and generate an alarm if a defined
limit is exceeded within a measurement interval, for each DM session objectives and percentiles for
forward and backward inter-frame delay variation can be configured.
An SOAM-IFDV Objective Alarm is raised if less percent of the measurements defined by the
Percentile Forward / Backward are below the inter-frame delay variation defined by the Objective
Forward- and Backward parameter.
The Objective Forward and Backward is defined by choosing the respective Bin. Default
value: None
The Percentile Forward and Backward range is from 0 to 100%. Default value: 95%
Inter-frame delay variation measurement in ACCEED provides the measurement information of the
current interval and the past up to 32 intervals in a history. The interval duration is configurable in the
range of 1 to 1440 minutes.
The inter-frame delay variation measurement results of the respective interval are accessed
via the Performance tab and the following path SOAM\DM Sessions\Session x\IFDV
If historic statistics is configured and enabled, these values can be seen by selecting the
respective interval in the Statistic pull down menu as shown at the bottom in the picture
below.
Every inter-frame delay variation measurement is assigned to the respective Bin and
counted there. The Bin counters can be accessed via the Performance tab and the
following path:
SOAM\DM Sessions\Session x\IFDV\Forward Bins[] and \Backward Bins[]
If historic statistics is configured and enabled, these values can be seen by selecting the
respective interval in the Statistic pull down menu as shown at the bottom in the picture
below.
One History can be added and enabled for up to 32 intervals. The interval duration is taken
from the current statistics setting.
History settings can be accessed under:
SOAM/DM Sessions/Session x/Statistics/Historic[]
If the Statistics Current is not active, the performance value are displayed as Inactive
Dual-ended frame loss measurements are based on the LM type CCM and therefore on
each end a LM session need to be configured.
Single-ended frame loss measurements are based on the LM type LMM. These
configurations consist of a LM Session on the initiating MEP and a LM Responder on the
other MEP.
Common limitation of the loss measurement is that it does not support point-to-multipoint
connections.
If there is no customer traffic on the service to be monitored, the loss measurement does
not deliver any results.
Only frames marked as green are considered for the FLR and Availability measurement.
Only the Ingress and Egress Metering Counters need to be set to Packets for LM sessions. The
Ingress and Egress Policy Counters can be configured independently of the LM sessions!!
Any VID defined in the VLAN DB can be selected here and therefore can be different than the
domain source associated VLAN ID. The LMR VID must be the same as configured for LMM
frames.
Attention: The LMR VID can be different than the domain source associated VLAN ID and
must be configured additionally in the Associated VLAN list of the respective domain if it is
not yet contained.
LMR CoS [CoS 0 .. CoS 7]
LMR Queue [Queue#0 .. Queue#7]
Two measurement types are possible. Single-ended (only the initiating MEP gathers results) using
loss measurement messages (LMM) and loss measurement replies (LMR)
Dual-ended (both MEPs gather results) using continuity check messages (CCM)
If there is no traffic (e.g. TxFwd = 0) or the previous counters are zero/unknown, then the FLR is
unknown (and the measurement is considered as completed, but not valid).
Figure 9-12 Service OAM Frame loss ratio (FLR) measurement principle
FLR Configuration
9.2.10.10 Availability
The Availability is defined by the frame loss ratio during a sequence of consecutive time intervals (n)
and the last availability state.
A sliding window of size n = {1, , 10} contains the information concerning the FLR compared to the
FLR-threshold C of the last n consecutive time intervals.
LM session statistics are configured the same way as DM session statistics with the following
exceptions:
- FLR and Availability can be configured independently where as the FD and IFDV is a
combined configuration.
- Interval duration range is larger in case of FLR and Availability [1..525600 min]
Please refer to 9.2.10.5 for information on how to configure the statistics and history section.
SAT can be performed prior to deploying the "live service for verifying the quality requirements of a
MEF service. These requirements are:
At the end of the measurement, a report is generated with the results, and PASS/FAIL is indicated.
The qualification measurement can also be performed in service, in parallel with running traffic
belonging to previously installed services on the ACCEED unit.
No additional equipment is required to perform SAT measurements with ACCEED. Traffic generator
and analyzer are built in functions of the ACCEED unit.
Up to 4 different customer traffic flows (Test CoS Instances) are emulated on the ACCEED unit, sent
out through the defined testport to the destination network element. The destination network element
has looped back activated which sent back these traffic flows with swapped source and destination
MAC addresses. At arrival on the SAT flow injecting ACCEED the flows are terminated and evaluated.
The necessary layer 2 loopback with MAC swapping can be performed with an ACCEED unit or any
rd
capable 3 party equipment. Note: A loopback without MAC swapping would also work, but may lead
to unpredictable traffic conditions (e.g. Port locks due to STP or overload conditions of MAC learning
events on old switching devices)
This methodology of measuring traffic during the activation phase of a service is based on the Y.1564
standard (formerly known as Y.156sam).
It closes the gap between RFC2544 method and the todays service demand, by
Testing services along the network and not the maximum limit of just one network element
Verifying CIR and EIR profiles
Doing recurring frame delay and frame delay variation measurements
Measuring frame loss and availability
This advanced set of actions enables the network planners and service teams to bring up services
quickly and to troubleshoot in case of Service Level Agreement violations.
Y.1564 is separated in 2 phases: the Service Configuration Test, verifying the configuration of the
bandwidth profile parameters, and the Service Performance Test, proving the long term stability of the
new service.
This test traffic is then forwarded via the WAN interface (or any other configured test port) to Carrier
Ethernet network to the remote Ethernet demarcation unit. This unit must be capable of swapping the
Source with the Destination MAC and loop the packets back to the local EDD.
On its way the test packets pass the egress policy of the local WAN, the ingress policy of the remote
WAN, the egress policy of the remote WAN and before passing the ingress policy of the local WAN
they are trapped to the analyser.
In most cases services are defined by ingress policies. Therefore, by default only the ingress policy of
the remote ingress is tested with SAT. If the ingress policy of the service at the local EDD should be
tested, the ACCEED has the ability to use the same ingress policy of the LAN port. This is done by
applying the corresponding ingress modifier of the LAN port to the SAT/Test CoS Instance/Applied
Modifier.
Always take all ingress and egress bandwidth profiles along the SAT stream into account.
They may influence your measurement by additional bandwidth restrictions (smallest
information rate wins) or burst sequence cuts (smallest burst size wins)
For trustful measurements it is recommended to start with one bandwidth profile, the one
with the highest CIR/PIR values and to measure the throughput. Then add step by step the
other bandwidth profiles in decreasing bandwidth order and measure each time.
In principle initiating SAT measurements from both sides provide the most accurate results.
The test stream consists of performance packets for evaluating the maximum bandwidth based on
CIR and EIR, which is accumulated in color blind mode to one PIR, and timing packets for measuring
the roundtrip delay.
The format of the test frames is described in 9.3.3
The performance parameters FLR, Availability, frame delay, inter-frame delay variation are based on
measurements of CIR frames only.
This test will PASS, if the following parameters are matched for each instance
This test will PASS, if the following parameters are matched for each instance
rxIFDV IFDVThreshold
The sum of all txRates shall not exceed 100 Mbit/s. This allows the maximum for this test case of
(CIR+EIR) = 100 Mbit/s.
9.3.2.3 Traffic Policing Test
Goal of this test case is to overshoot (by up to 25%) the throughput service limits and test the
limitation capabilities of the bandwidth profile rules. For each of the configured Test CoS Instance a
throughput and delay stream is created. The transmit rate depends on the ratio between CIR and EIR:
If CIR (5 EIR) (true for most 2 rate three colour bandwidth profiles)
txRate CIR ( EIR 125%)
Else (true for most single rate three colour bandwidth profiles)
txRate (CIR 125%) EIR
The sum of all txRates shall not exceed 100 Mbit/s. This allows the maximum for this test case of
(CIR+EIR) = 80 Mbit/s.
This test is especially designed to get into congestion of the bandwidth profile under test. Therefore
not only the bandwidth parameters (CIR and EIR) need to be taken into account, but also the burst
buffer sizes (CBS and EBS). They define how many traffic bursts are allowed, before the bandwidth
profile starts dropping traffic.
Therefore the Y.1564 introduced a correction factor called MFactor adjusting the upper bandwidth limit.
Its range is between 0% and 25% and it depends on the burst buffer size, the test duration and the
txRate. The default value of the MFactor on the ACCEED is 10%. It can be roughly calculated with the
following formula, where the CBS&EBS are in [Bytes] and CIR&EIR in [kbit/s] for the Bandwidth profile
under test:
CBS EBS 1 8
M Factor %
CIR EIR SingleTestDuration 10
The maximum received data rate shall not exceed the sum of CIR and EIR corrected by the MFactor and
its lower limit is the CIR with its allowed frame loss ratio. The configured thresholds for frame delay
(FD) and inter frame delay variation (IFDV) need to be matched, too.
This test will PASS, if the following parameters are matched for each instance
This test will PASS, if the following parameters are covered for each instance
rxAvailability AvailabilityThreshold
MAC DA 6 Bytes
MAC Header
MAC SA 6 Bytes
Tunnel sTag Primary TPID 2 Bytes
(optional) .1p bits + VLAN ID 2 Bytes
TPID = 0x8100 (fix) 2 Bytes
VLAN cTag (optional)
.1p bits + VLAN ID 2 Bytes
Ethertype 0x88B7 2 Bytes
Albis OUI (0x00'1A'D0) 3 Bytes
Protocol Identifier
Albis Ethertype (0x0011) 2 Bytes
Sequenznummer 4 Bytes
Payload
Padding (0x00) variable
FCS 4 Bytes
Table 14 Format of Test Frames for throughput measurement
MAC DA 6 Bytes
MAC Header
MAC SA 6 Bytes
Primary TPID 2 Bytes
Tunnel sTag (optional)
.1p bits + VLAN ID 2 Bytes
TPID = 0x8100 (fix) 2 Bytes
VLAN cTag (optional)
.1p bits + VLAN ID 2 Bytes
Ethertype 0x88B7 2 Bytes
OUI (0x00'1A'D0) 3 Bytes
Protocol Identifier Albis Ethertype 2 Bytes
(0x0090, 0x0091, 0x0092)
TxTimeStampf 8 Bytes
(like DMM)
Payload RxTimeStampf 8 Bytes
(like DMM)
Padding (0x00) variable
FCS 4 Bytes
Table 15 Format of delay measurement frames
The SAT can be executed by pressing the Start button. It can be terminated any time during the test
phase by pressing the Abort button.
The test report can be displayed anytime during the tests showing the current status of the test cases
by pressing the Test Report button.
At the end of the test the test report automatically pops up with the final results. It can be stored as a
text or pdf file by pressing the Save As button on the bottom of the test report window.
Enable
enables this test traffic instance with the following parameters
Description
this description is printed into the test report after the Test CoS Instance x: label
CIR [0, 64 .. 100000 kbit/s]
Committed information rate of the test traffic
EIR [0 .. 100000 kbit/s]
Excess information rate of the test traffic
M Factor [0 .. 25 %]
Correction factor added on CIR+EIR threshold to compensate the start up effects of the burst
buffer settings (CBS and EBS)
FLR Threshold [0 .. 100.000 %]
Maximum Frame Loss Ratio Threshold to detect a PASS
Availability Threshold [0 .. 100.000 %]
Minimum Availability Threshold to detect a PASS
Availability Consecutive Measurements [1 .. 10]
Number of successful Availability Measurements necessary to get an accountable result
Availability FLR Threshold [0 .. 100.000 %]
This setting defines valid availability intervals in dependency of the FLR.If the Frame Loss Ratio is
below this threshold, the availability is accounted. See 9.2.10.10
FD Threshold [0 .. 5000000 us]
Maximum Frame Delay acceptable for a PASS
IFDV Threshold [0 .. 5000000 us]
Maximum inter frame delay variation acceptable for a PASS
VLAN Tagged
enabled: a VLAN Tag is attached to all test frames configured in this Test CoS Instance.
enabled is the default setting for Instance 2, 3 and 4.
disabled: test frames are untagged
Assigned VLAN ID [1 .. 4094]
This VLAN ID value is always attached to the VLAN Tag in case VLAN tagging is enabled,
otherwise for untagged frames it defines the internally assigned VLAN ID
Assigned CoS Value [0 .. 7]
This .1p value is always attached to the VLAN Tag in case VLAN tagging enabled
Applied Modifier
To test the ingress modifier of the local LAN port, the same modifier policy of this LAN port can be
selected from the dropdown menu
Frame Pattern
Fixed Size: All test frames do have the same length
EMIX: Frames are sent in a repeating sequence of configurable frames with sizes 64B, 128B,
256B, 512B, 1024B, 1280B, 1518B or 2048B
EMIX Frame Sizes
Selectable frame sizes 64B, 128B, 256B, 512B, 1024B, 1280B, 1518B or 2048B
Frame Size [64 .. 2048 bytes]
Sets the frame length of all test frames, if frame pattern is Fixed size
9.3.7 Results
In the first section the basic configuration of the System (Date and Time, Firmware Version, Hardware
ID and Slot number) and the test port (Test groups enabled, color mode, color method, port name,
MACs and Tunnel VID) are printed. It is followed by the configuration of each Test CoS Instance, that
is enabled (CIR, EIR, M, FLR, Availability, FD, IFDV, Pattern, Size, VID and CoS).
The second section contains the results of each single test parameter. The headline of each test
section (service configuration test or service performance test) shows the overall result.
A FAIL of one of the test parameters leads to a FAIL of the whole Test Cos Instance and is shown in
the headline. This FAIL leads then to a FAIL of he whole test section.
Additionally, the results for each single EMIX frame size are displayed if the detailed test reports are
enabled. The results are not assessed with a FAIL/PASS.
At the end of the test, the test report automatically pops up with the final results. It can be stored as a
text file by pressing the Save As button.
10
CES Circuit
Emulation for TDM
Services
Payload Type
TDM signals can be divided in structured and unstructured signals.
Structured (structure aware) TDM consists of a framing with time slots as defined in ITU-T G.704
where as unstructured (structure agnostic) TDM is a bit stream with no framing information.
The TDM payload type therefore needs to be defined in the CES IWF (Inter-Working Function).
Structure aware TDM payload is referred to as
CESoPSN Circuit Emulation Service over Packet Switched Network
With CESoPSN the configured subscriber rate (nx64kbit/s) is transmitted by the CES IWF.
Time slot zero is not transported over the packet network. The time slot zero is generated at the
far end IWF and added to the TDM frame. The maximum subscriber rate with CESoPSN is 31 TS
or 1984 kbit/s (time slot 1 ..32).
Example: A service with 512 kbit/s (8 TS) should be transmitted via CESoPSN. The TDM service
must arrive in timeslot 1-9 at the ACCEED. All information in TS0 (e.g. SA-Bits) are not forwarded.
With SAToP the complete TDM (32 TS) bit stream is transmitted and the data rate is 2048kbit/s.
Encapsulation
The encapsulation defines the network layer protocol and adaption function used to transport the
TDM payload.
The Figure 10-1 gives an overview of the network layer and adaption function options.
ACCEED supports Ethernet and MPLS encapsulation as indicated by the red frame below.
The adaption function consists of a service ID, a control word and an optional RTP part.
The 4 Byte service ID is the ECID (Emulated Circuit Identifier) in case of Ethernet encapsulation and
the pseudo wire label in case if MPLS encapsulation to identify the CES service (the pseudo wire).
The service ID must be configured for both directions source and destination CES IWF.
The 32 Bit ECID consists of a 20 Bit user definable value followed by the last 12 Bit which are
reserved and are set to 0x102 in order to interwork with an MPLS-based circuit emulation service.
The Emulated circuit identifiers have local significance only, and are associated with the source MAC
address of the CES stream.
The 32 Bit MPLS pseudo wire ID has also a 20 Bit user definable value, followed by the S-Bit, 3 bit for
the traffic class (Experimental Bit EXP) and the 8 Bit Time to Live (TTL) value.
The 4 Byte long control word allows detecting packet loss and wrong packet order by the sequence
number. It also contains defect indication information coded in the L, R and M bit..Please see also the
CES control word structure in the figure below.
The control word is automatically generated by the CES IWF.
L and M bit
The local TDM failure indicates a TDM defect impacting the TDM data.
When the L bit is set, the payload of the CES packet is set to 1 (one).
The M bit is set to supplement the meaning of the L bit.
The following local TDM failure indication are mapped to the L- and M-bit with ACCEED:
L M
Bit 4 Bit 6 Bit 7 Interpretation
0 0 0 Indicates no local TDM defect detected.
0 1 0 Reports the receipt of RAI or RDI at the local TDM interface in case the
framer is set to termination or monitoring. CES-RAI is raised at the remote
IWF.
1 0 0 Indicates a local TDM defect that triggers CES-AIS generation at the remote
CES IWF.
Local TDM defect is LOS in case the framer is set to transparent operation
and LOS, AIS, or LFA in case the framer is set to termination or monitoring.
R bit
When the R bit is received, it indicates that the remote IWF did not receive the CES frame and
consequently has raised a LOF alarm. AIS is sent the TDM interface.
Thus the setting of the R bit indicates failure of the connection in the opposite direction. This indicates
congestion or other network related faults.
The fragmentation bits (FRG) are not used with ACCEED and are set to 0 (zero).
Simplified, the CES feature can be divided in 2 components as shown in Figure 10-4, the CES IWF
and the optional Framer. It has an interface to the TDM and packet side.
Both interfaces are explained below.
Framer
The Framer is an optional component that operates on the TDM interface and produces the service
(e.g. G.704 or n*64 kbit) that is emulated across the packet network.
In case of ACCEED the framer can be configured to operate the following modes:
Transparent: frames pass unchanged (LOS, AIS)
Monitoring: frames pass unchanged, CRC4 errors are evaluated (BER, LFA, RDI)
Termination: frame is regenerated, CRC4 section is terminated (alarms per section)
There are two basic interfaces in the TDM domain. These are indicated in the
TDM Interface
At this interface the actual TDM service is handed off to the customer or TDM network operator. It
therefore provides a physical connector. In case of ACCEED it is a RJ-45 connector for the E1
service. The TDM service can be transported in two ways, structure-agnostic or structure-aware. See
also chapter 10.1.11.
Ethernet Interface
The Ethernet interface is the transport interface where the CES packets are sent to and received from.
The CES frame format is shown in
Figure 10-5.
The Ethernet interface in ACCEED is referred to as Egress Port and can be configured as any switch
port of the ACCEED unit (Px, SFPx and WANx).
Packetization
The size of TDM payload per packet influences the following parameter:
Bandwidth Efficiency
The larger the payload per CES packet, the lower the overhead ratio. Larger packets therefore
result in better bandwidth efficiency. The maximum Bandwidth Efficiency is 100% (without
overhead).
PayloadSize [ Bytes]
BandwidthEffciencyCESoEth [%]
30 PayloadSize [ Bytes]
PayloadSize [ Bytes]
BandwidthEffciencyCESoMPLS [%]
34 PayloadSize [ Bytes]
SubscriberRate[kBits / s] * 100
TotalBandwidth[kBit / s ]
BandwidthEffciency [%]
Packetization Delay
The packetization delay is dependant on the choosen payload size per packet and the TDM
subscriber rate.
PayloadSize [ Bytes]
PacketizationDelay [ms]
8 * SubscriberRate[TS ]
Note: in case of SAToP payload type, the subscriber rate is always equal to 32 time slots [TS]
The optimal compromise between bandwidth efficiency and packetization delay is depending on the
operators requirements.
Example:
The default CES packet payload size in ACCEED is 256 Bytes which results in a packetization delay
of 1ms for a subscriber rate of 32TS (2048 kBit/s). The resulting Bandwidth Efficiency is 89.5% for
CESoEth and 88.3% for CESoMPLS. This equals 2288 kBit/s and 2320 kBit/s respectively on the
Ethernet transmission interface.
Jitter Buffer
When packets arrive at the far end CES IWF, they can be out of sequence or arrive too early to be
delivered to the TDM interface. The jitter buffer allows the reordering of the packets to compensate the
packet delay variation (PDV) to a certain extent, depending on the chosen jitter buffer size.
The reordering of the packet is based on the sequence number contained in the control word of each
CES packet. When a packet is received, the sequence number is verified and reordering is done if
applicable.
The jitter buffer is initialized to work at a fill grade of 50%. This leads to an initial delay caused by the
jitter buffer of 50% of the maximum delay variation that can be compensated by the jitter buffer.
The amount of delay and PDV can change dynamically in the packet network depending on e.g. the
load in the network elements.
To compensate this effect, ACCEED applies an algorithm which automatically adjusts the delay of
each packet to achieve a constant delivery of CES packets to CES IWF. This automatic adjustment of
the jitter buffer delay does not change the maximal size of the jitter buffer.
Note: In case of increased packet delay, the compensation of the packet delay variation is smaller
than in case of decreased packet delay.
The optimal jitter buffer size can only be set, if the maximum PDV is known. Since the PDV is
dynamic, the max. PDV need to be monitored over a period. Refer to chapter 10.4.2 for information on
how to read out the max. PDV with the LCT+
Knowing the maximal PDV, the jitter buffer size can be set to compensate this maximum jitter.
The jitter buffer size can be calculated according to the following formula:
Example:
According to MEF 5, the CES IWF should be capable of compensating a frame delay variation (PDV)
of up to 10 ms. That means the maximum PDV is 10 ms.
The subscriber rate is 512 kbit/s with CESoPSN payload type.
The calculated jitter buffer size is:
10[ms] 512[kbit / s ]
JitterBuffer[ Bytes] 640 Bytes
8
The minimal Jitter Buffer size must be at least 2 times the configured payload size.
Please note that packets with large MTU size being transported over a low speed SHDSL
link can add high jitter and therefore can be critical for a correct operation of the CES
service. A packet with MTU = 1500Bytes being transported over a single copper wire pair at
SHDSL data rate of 1Mbit/s, introduces a jitter of 12ms to the CES packets.
Therefore carefully plan the jitter buffer size in context of all traffic being sent over the
SHDSL link. In-band Management and OAM traffic also need to be taken into account.
Operator Hint:
Since the maximum PDV is normally not know when configuring the CES IWF for ACCEED, the
following procedure could be followed to define the jitter buffer size:
1. Establish the CES service with the default jitter buffer size of 4096 Bytes.
Read out the measured maximum PDV after the value has reached the maximum as
described in chapter 10.4.2.
2. Calculate the jitter buffer with the formula below. The
2 * max .PDV [ms ] SubscriberRate[kbit / s]
JitterBuffer[ Bytes]
8
3. Round up the calculated jitter buffer size to the next multiple of the payload size and enter the
jitter buffer size in the packet settings.
Example: the calculated value is 591 Bytes. The configured payload size is 256 Bytes.
The recommended jitter buffer size therefore is 768 Bytes.
A3118-X652-R67-02 246 / 297
ULAF+ 10 - CES Circuit Emulation for ACCEED 2202 Manual
4. Monitor the CES performance if there are any jitter buffer overflows or under runs.
5. In case of overflows/under runs, increase the jitter buffer size by multiples of the payload size.
Actual values of the packetization- and jitter buffer delay are provided by the ACCEED unit. For more
information please refer to chapter 10.3.2 for packetization delay and chapter 10.4.2 for jitter buffer
delay.
Mobile Backhauling
CES can be deployed where no TDM network access is available or the TDM network will be
dismantled. In addition to the E1 traffic, the Ethernet traffic can also be transported on the same
access link. By this way, a hybrid mobile backhaul access solution can be realized.
TDM PBX
Many voice services today are still transported over TDM leased line services from the PBX at the
customer site to the central voice switch location.
Alternatively to these costly leased lines, CES can replace the leased lines by still providing the same
TDM interface towards the customer (PBX).
A migration from the TDM voice to VoIP at a later point is supported by the very same ACCEED unit.
This is achieved by using the Ethernet instead of the TDM/CES interface.
Enabling the CES function and the TDM interface can be done here:
CES IWF/Local/TDM/TDM1
Mode [Clock, TDM] Clock: 2 MBit or 2048 kHz clock, see chapter 11.4.5
TDM: 2 MBit/s clock
Impedance [120, 75 Ohm] Impedance of TDM interface
Please refer to chapter 10.1.13 for more information on jitter buffer- and payload size.
Destination MAC The MAC address of the destination (remote) CES function
Source MAC Displays the MAC address of the CES function that is assigned to the physical
port (egress port). Source MAC address is read only.
Note: The source MAC address is specific to the selected egress port. If the
egress port is changed, the destination MAC address of the remote CES IWF
need to be updated accordingly.
Assigned VLAN ID [1, list of all defined VLANs in the VLAN database]
Assigned CoS Value [0 .. 7]
Assigned Queue [0 .. 7], assigned egress transmit queue
Jitter Buffer Size [2 ..4096 .. 8192] Please refer to 10.1.13 for more information
Maximum PDV Compensation The maximal possible PDV compensation based on the
configured jitter buffer size. This value is calculated and
therefore read only.
Payload Size [1 .. 256 .. 1023] Please refer to 10.1.13 for more information
Packetization Latency Delay caused by the packetization. This value is calculated
and therefore read only.
The assigned VLAN ID and CoS value must be same in the local and remote packet
configuration of the IWF.
If the clock for the CES function is provided via front panel clock input, the framing must be
set to termination and CRC4 TDM must be activated.
ET Elapsed Time
BE Block Errors (A block in which one or more bits are in error)
BBE Background Block Error (An errored block not occurring as part of a SES)
ES Errored Seconds (A one-second period with one or more errored blocks or at
least one defect
SES Severely Errored Seconds (A one-second period which contains 30% BE or at least
one defect)
UAS Unavailable Seconds (counts if more than 10 seconds SES occurred)
The CES IWF packet performance is consisting of the packet statistic counters and the CES
jitter buffer performance.
The Packet Statistics can be displayed as a continuous counter and as history counter with
definable interval duration and stored number of intervals.
Up to 5 history counters can be added. Refer to chapter 10.4.3 for the activation and
configuration of the packet statistics.
The packet and jitter buffer performance can be found here:
CES IWF/Local/TDM/TDM1/Packet
Please note, that the statistics view can be switched between Continuous and the defined
historic counters.
CES IWF/Local/TDM/TDM1/Packet/Statistics/Historic[]
The alarms are only seen in the system when they are present and cleared when the problem is
resolved. Please refer to the Alarm Log to see the alarm history.
The alarms presented by the ACCEED unit provide a good entry point for CES trouble shooting.
See chapter 10.4.4 for all alarms related to CES and TDM.
For the CES alarms (CES LOF), various problems might be present.
SHDSL data rate is not sufficient (CES LOF).
See utilization of CES egress port. Refer to chapter 8.10.7 for port utilization
The Packet configuration (Encapsulation and Payload Type) must match between both CES
IWF. Example: VID=22, CoS=7, CESoPSN, Payload Size=256
Verify CES packet and jitter buffer performance, see chapter 10.4.2
Statistics: are the lost, early or late frames counted?
CES: are jitter buffer overflows, under runs counted?
Adjust the jitter buffer size accordingly, see chapter 10.1.13
Verify that the CES packets are sent to the correct egress queue and no packets are dropped
in this egress queue.
The CES stream generated by the IWF is directly sent to the egress queue of the egress
port configured in the packet section. Egress modifiers therefore do not apply to the CES
packets.On the ingress direction, the CES stream is directly linked to the CES IWF before
any ingress modifier can be applied. Consequently, statistics and utilization which base on
11
General Board
settings
The board chapter provides general information of the ACCEED unit and
explains how to configure equipment specific settings like clocking, alarm
configuration, time settings and management access.
System Log lists the events on the ACCEED and can be used as source for trouble
shooting.
Entries listed under NVD entries are critical events stored to a non volatile memory since
the first start of the ACCEED unit.
actual entries lists all events since the last startup of the ACCEED device.
The events are listed in chronological order with the most recent at the button of the list.
The example below shows a System Log excerpt of an ACCEED 1416 unit.
11.1.2 Ressources
The resource information provides insight in the ACCEED units for trouble shooting
purposes.
Up time and system load a process list and memory usage are displayed..
In case of the ACCEED desktop units, temperature and fan information are displayed
additionally
11.1.3 Inventory
The inventory lists all devices in the aggregation and the array respectively.
The information listed under Inventory is depending on the ACCEED unit and application.
The example below shows an ACCEED 1416 plug in (LT) to desktop (NT) application with 4
SHDSL ports being aggregated and assigned to PAF A.
Suppress Power Failure when enabled, no alarm is raised in case of a DC power failure
Minimum Trap Level when an alarm is raised and the defined severity of this alarm is
equal or above the trap level, a respective alarm trap is generated. The trap level is applied to
the whole ACCEED unit.
11.2.1 Severity
11.2.2 Logging
The logging of alarms can be configured individually. Per default all alarms are logged.
Please note that an alarm trap is only generated, if the logging for the respective alarm is enabled.
Disable logging of alarms not being of importance for fault management help reduce the size of the
alarm log. 11.4
11.3 Local
11.3.1 Information
The board information are accessible under Board/Local/Information
The values of the active and passive FW version reflect the actual FW loaded on the
ACCEED unit.
The housing is depending on the ACCEED unit variant, being a desktop or plug in module.
The CLEI (Common Language Equipment Identification) code is individual for each ACCEED
unit type and allows to identify and track the network equipment.
The example blow represents an ACCEED 1416 plug in unit.
11.3.3 Maintenance
Possible maintenance reasons for ACCEED 2202 are:
Link OAM Loop Active: local or remote loopback is active
Service OAM Loop Active: SOAM Loop activated from remote side
Service OAM Ethernet Locked: Lock messages are sent from remote side
Ethernet Port Loopback Active: All transmitted frames are looped back to port
Ethernet Port Mirroring Active: Port mirroring on one of the Ethernet ports is active
Traps Disabled
Trap Level Low
MAC Table Aging Disabled
ZeroTouch Provisioning Active
Writing Configuration To Flash: flash writing is in progress
TDM/DMS Loop Active: Loopback enabled on TDM interface, on CES interworking function,
on data interface 3c or 2b
The maintenance information are accessible under Board/Local/Maintenance
Select the Fault folder to see the actual maintenance reasons.
An active maintenance state is also indicated by the yellow maintenance box in the lower
right corner of the LCT+ window.
The example below indicates that a line loop and a BER measurement is active.
11.4 Synchronization
11.4.1 Introduction
ACCEED 2202 is an Ethernet device. Due to Ethernets asynchronous packet character there is no
need for synchronization for basic data transmission service. However timing critical applications like
mobile or DSLAM backhaul require accurate synchronization on remote location. This is why the
ACCEED offers a comprehensive feature set to provide high quality timing to customer locations.
Network synchronization can be derived from 2MHz or SyncE physical reference clocks
Others
Input: - SHDSL to transmit the clock from LT to NT (with symbol clock).
Selection of available SHDSL interfaces is done automatically.
- SCC to get synchronization form other ACCEEDs in the array
Output: - SCC to transmit synchronization to other ACCEEDs in the array
Clock source quality information is assigned by configuration or a prior knowledge (e.g. internal clock
= SEC).
In case of SyncE data (Ethernet ports P1...P3, SFP) the quality can be defined by the Ethernet
Synchronization Messaging Channel (ESMC). The messages in the ESMC are equal to the messages
of the TDM Synchronization Status Message (SSM). the SyncE clock quality is also configurable via
LCT+.
Clock source priority is assigned by configuration. The priorities determine which clock sources are
allowed for the clock extraction and in what order, if several sources have the same clock quality.
ACCEED selects and forwards the clock source with best quality available. If sources with equal
quality are available, clock selection is based on priority.
If both the quality and the priority are equal, the following pre-programmed succession is applied:
Clock input
Ethernet
SHDSL
SCC
internal
If one source fails an automatic switch over to the next clock source with the best quality and the
highest priority is implemented.
If there is no external source available, the internal oscillator changes to the mode holdover. In this
mode the ACCEED retains the clock frequency of the source to which it had been synchronized before
the failure. The holdover mode is revertive. Once the original clock source with the previously highest
priority will work correctly the ACCEED synchronizes after a wait to restore time back to the original
clock source.
Priority
Clock priorities configured via the NMS correspond to the following values:
Range: 0..255
0 defines the highest priority
255 represents the lowest priority
Q/P
SCC SCC Q/P
Q/P Clock
SHDSL 1...4 Q / P of the
Source
selected
Selection
Q/P clock source 2 MHz clock out Q/P
Internal /
Holdover
In case of 100FD or 1000FD operation, the SSM packets are transmitted periodically on all Ethernet
ports (LT and NT) except on LT port configured as input. The quality corresponds to the assigned QL
value of the current active clock source.
11.4.11.1 LT configuration
Clocking
Clocking can be found in Board\Local
In this folder you can find the currently active clock source as well as the according quality
and priority levels displayed as read only values.
This area is also used to configure the SSM handling for the SyncE ports.
Trust SSM
Send SSM
The settings are global (for all SycE Ports)
Internal
Internal can be found in Board\Local\Clocking
This area presents status messages concerning the internal clock. All parameters are read only.
Clock-In
Clock-In can be found in Board\Local\Clocking
This area is used to configure settings relating to the incoming clock.
Quality
Priority
Impedance 2
2
Only available on ACCEED desktop units
A3118-X652-R67-02 275 / 297
ULAF+ 11 - General Board settings ACCEED 2202 Manual
Ethernet
Ethernet can be found in Board\Local\Clocking
This area is used to configure settings relating to the incoming clock on Ethernet interfaces.
Source Port
(in the example below P1 is selected as Source Port. It means that P1 is a clock input)
Quality (Quality level assigned to that input port manually)
Quality Reported By SSM (Quality level assigned to this clock source using SSM)
Priority (Priority assigned to this clock source)
This area is also used to enable the SSM generation and to define the minimum quality level to
transmit to transmit the clock.
Send SSM
Output Squelch Threshold
12
Troubleshooting
This chapter gives some practical help to quickly identify faults and solve
problems. The chapter contains a list of all alarms, describing possible
causes and suggesting possible solutions.
1 3 5 7 9
2 4 6 8
If the green PWR LED is OFF and the red Alarm is ON then the device is in a
"forced shutdown" condition because of over temperature condition. This mode
prevents the equipment to be permanently damaged.
Possible causes could be:
- Too high environment temperature
- FAN failure
To find out the exact alarm cause the LCT+ must be utilized. Information about
debugging with LCT+ can be found in chapter 12.3.
This alarm is raised, when the active clock source fails. No alarm is raised if
a backup clock fails.
Example:
Priority sequence (from top priority): clock-in, SyncE
If clock-in fails -> Clock Not Available alarm is raised
If SyncE fails -> Clock Not Available alarm is not raised.
Check the PAF / SHDSL line alarms and the LFP configuration
If the fan is in operation, the temperature alarm is raised at about 65C environment
temperature and the device is shut down at about 80C.
If the fan is out of order the temperature alarm will likely occur at any environment
temperature and the device is shut down at about 20C.
The device is specified up to 55C environment temperature and must never be used at
higher temperatures
13
References
[6] ULAF+ User Manual (UMN) for the Advanced Bridge and Router Module
Albis Technologies Ltd
A3118-X300-H100-*-7619
[15] ETSI TS 101 524 - Symmetric single pair high bit rate digital subscriber line (SDSL)
transmission system on metallic local lines
[17] ITU-T Recommendation Y.1731 - OAM functions and mechanisms for Ethernet
based networks
14
Glossary
Term Explanation
AcI Access Integrator the ULAF+ Network Management System
BER Bit Error Rate
BERT Bit Error Rate Test
BiDi Bidirectional transmission over a single fiber
The Bundling service attribute enables two or more VLAN IDs to be
mapped to a single EVC at a UNI. With bundling, the provider and
subscriber must agree on the VLAN IDs used at the UNI and the
Bundling
mapping between each VLAN ID and a specific EVC.
A special case of bundling is where every VLAN ID at the UNI interface
maps to a single EVC. This service attribute is called all-to-one bundling.
Committed Burst Size, CBS is a bandwidth profile parameter. It limits the
CBS maximum number of bytes available for a burst of service packets sent
at the UNI speed to remain CIR-conformant.
CCM Continuity Check Message (Service OAM)
CE Customer Edge, Equipment on the Subscriber side of the UNI.
CES Circuit Emulation Service
CF is a bandwidth profile parameter. The Coupling Flag allows the
CF choice between two modes of operation of the rate enforcement
algorithm.
Committed Information Rate, CIR is a bandwidth profile parameter. It
defines the average rate in bits/s of service packets up to which the
CIR
network delivers service packets and meets the performance objectives
de-fined by the CoS Service Attribute.
A set of service packets that have a commitment from the Service
Class of Service
Provider to receive a particular level of performance.
Information derivable from a) the EVC to which the service packet is
mapped, b) the combination of the EVC to which the service packet is
mapped and a set of one or more CE-VLAN CoS values, c) the
Class of Service Identifier combination of the EVC to which the service packet is mapped and a set
of one or more DSCP values, or d) the combination of the EVC to which
the service packet is mapped and a set of one or more tunneled Layer 2
Control Protocols.
Color Mode, CM is a bandwidth profile parameter. The color mode
CM parameter indicates whether the color-aware or color-blind property is
employed by the bandwidth profile
CFM Continuity Fault Management
A Bandwidth Profile property where a pre-determined level of Bandwidth
Color-aware Profile compliance for each service packet is taken into account when
determining the level of compliance for each service packet.
A bandwidth profile property where a pre-determined level of bandwidth
Color-blind profile compliance for each service packet, if present, is ignored when
determining the level of compliance for each service packet.
CoS Class of service, corresponds to IEEE 802.1p priorities
DNU Do Not Use (for synchronization)
DSCP Diffserv Codepoints, extended priority field in IPv4 header
Extended Burst Size, EBS is a bandwidth profile parameter. It limits the
maximum number of bytes available for a burst of service packets sent
EBS
at the UNI speed which are colored yellow. This setting is only available
in single rate policing mode
EFM Ethernet in the First Mile, IEEE 802.1ah
Egress Outbound direction
EOC Embedded Operating Channel
EPL Ethernet Private Line, P2P connection via one EVC
E-Service Ethernet-Service (transmission of Ethernet packets)
ESMC Ethernet Synchronization Message Channel
QL Quality Level
QoS Quality Of Service
A multipoint EVC in which each UNI is designated as either a Root or a
Leaf. Ingress service packets at a Root UNI can be delivered to one or
Rooted-Multipoint EVC
more of any of the other UNIs in the EVC. Ingress service packets at a
Leaf UNI can only be delivered to one or more Root UNIs in the EVC.
RSTP Rapid Spanning Tree Protocol
SCC System Cross Connect. Connection between ACCEED units in an array.
SEC SDH Equipment Clock
An Ethernet packet transmitted across the UNI toward the Service
Service Packet Provider or an Ethernet packet transmitted across the UNI toward the
Subscriber.
Service multiplexing is used to support multiple instances of EVCs on the
Service Multiplexing same physical connection. This allows the same customer to have
different services with the same Ethernet wire.
Service Provider The organization providing Ethernet Service(s).
SFP Small Form factor Pluggable
SHDSL Single-Pair High-speed Digital Subscriber Line
SLA Service Level Agreement
SNMP Simple Network Management Protocol
According to ITU-T G.781: an action that cuts-off (i.e. shuts down) an
Squelch output signal. For some signals (e.g. 2 Mbit/s) squelching may be
realized by means of inserting AIS, instead of shutting down the signal.
SrTcm Single Rate Two Color Mode
SSM Synchronization Status Message / Synchronization Status Messaging
SSU Synchronization Supply Unit
SSU-A Primary Level SSU
SSU-B Second Level SSU
STP Spanning Tree Protocol
Subscriber The organization purchasing and/or using Ethernet Services.
SyncE Synchronous Ethernet
TLS Transparent LAN Service
TOS Type Of Service, Priority field in IPv4 Header
TPID Tag Protocol Identifier, corresponds to the Ethertype of the VLAN tag
TrTcm Two Rates Three Color Mode
User Network Interface, The physical demarcation point between the
UNI responsibility of the Service Provider and the responsibility of the
Subscriber
WAN Wide Area Network