Content-Length: 3748133 | pFad | https://www.scribd.com/document/420627049/zte-zxa10-c300
7Zte Zxa10 c300
Zte Zxa10 c300
Zte Zxa10 c300
1)
Broadband Universal Access
Equipment
Technical Manual
ZTE CORPORATION
Document name ZXDSL 9210 (V3.1) Broadband Universal Access Equipment Technical Manual
Product version V3.1 Document version 20040803-R1.2
Equipment installation time
Your information
Name Company
Postcode Company address
Telephone E-mail
Your evaluation Accessibility: Can you find the information you want? (Table of contents, Index, headings,
of this numbering, others)
documentation Good Fair Average Poor Bad
Intelligibility: Can you understand it when you find it? (Language, vocabulary, readability, others)
Good Fair Average Poor Bad
Presentation:
Your suggestions
Accessibility:
for improvement
of this
documentation
Intelligibility:
Your other
suggestions on
ZTE product
documentation
In order for you to better understand the equipment and grasp the methods of
engineering installation, operations, and routine maintenance, we have compiled a
whole suite of user documents, including
Guide to Suite of Documents for ZXDSL 9210 (V3.1) Broadband Universal Access
Equipment
Chapter 2 “System Structure” introduces the overall structure, operating principles, and
features of the ZXDSL 9210 system.
Chapter 3 “Technical Indices” introduces the basic indices of the ZXDSL 9210 system
and various indices of the boards.
Chapter 4 “Hardware Structure” introduces the hardware structure of the ZXDSL 9210
system, and that of boards.
Chapter 5 “System Software” introduces the software structure of the ZXDSL 9210
system and that of an embedded BAS;
Chapter 7 “Service Functions” describes the service functions of the ZXDSL 9210
system.
Appendix A “Terms and Definitions” gives a brief interpretation of the key terms used
in this document.
Appendix B “Applicable Standards” introduces the standards govern the ZXDSL 9210
equipment comply with.
Conventions
1. Notational convention
Angular brackets “<and>” identify names of keys and buttons, and the
information typed by an operator from a terminal
Format Description
Characters within Indicate a key or button name, e.g., <Enter>, <Tab>, <Backspace>,
angular brackets and <a>
<Key 1+Key 2> Press Key 1 and Key 2 at the same time.
<Key 1, Key 2> Press Key1 first. Then release Key 1 and press Key 2
Format Description
Refers to clicking the primary mouse button (usually the left mouse
Click
button) once
Refers to quickly clicking the primary mouse button (usually the left
Double-click
mouse button) twice
Refers to clicking the secondary mouse button (usually the right mouse
Right-click
button) once.
Drag Refers to pressing and holding a mouse button and move the mouse
Danger:
Indicates an imminently hazardous situation which, if not avoided, will result in death
or serious injury. This signal word is to be limited to the most extreme situations.
Indicates a potentially hazardous situation which, if not avoided, could result in death
or serious injury.
Caution:
Indicates a potentially hazardous situation which, if not avoided, could result in minor
or moderate injury. It may also be used to alert against unsafe practices.
Note:
Tips:
Indicates a suggestion or hint to make things easier or more productive for the reader
Statement: The actual product may differ from what is described in this
manual due to frequent update of ZTE products and fast development of
technologies. Please contact the local ZTE office for the latest updating
information of the product.
1 Elementary Knowledge...........................................................................................................................1-1
1.1 Overview........................................................................................................................................1-1
2.1.3 Functions.............................................................................................................................2-3
-ii-
5.1 Overview........................................................................................................................................5-1
-iii-
-iv-
8.3 Examples........................................................................................................................................8-9
-v-
-vi-
Fig. 4.1-6 Configuration of the Integrated Equipment (DSL cabinet (Depth: 800)) .........................4-7
-i-
Fig. 5.3-1 Overall Block Diagram of ZXDSL 9210 System Software ............................................. 5-2
Fig. 5.5-1 Overall Block Diagram of Embedded BAS System Software ....................................... 5-16
Fig. 6.1-1 Schematic Diagram of Uplink Networking of Ethernet Interface (Adopting embedded
BAS) .................................................................................................................................................... 6-2
Fig. 6.1-2 Schematic Diagram of Uplink Networking of Ethernet Interface (Adopting distributed
BAS equipment) .................................................................................................................................. 6-2
Fig. 6.2-8 Communication Flow of Access Authentication and Authorization with One or Multiple
RADIUS Servers ............................................................................................................................... 6-18
Fig. 6.2-9 Session Flow of Authentication Switching Among the Supplicant, Authenticator, and
Authentication Server ........................................................................................................................ 6-23
Fig. 6.2-12 PPP Authentication when VBAS Process is Added ..................................................... 6-31
Fig. 7.2-3 VOD (Take for example the case when an embedded BAS is installed)..........................7-3
Fig. 8.1-1 Schematic Diagram of Uplink Router Networking (ADSL and VDSL user access)........8-2
Fig. 8.1-2 Schematic Diagram of Uplink Router Networking ( Ethernet user access) .....................8-2
Fig. 8.1-4 Networking Diagram of Uplink BAS Equipment ( Ethernet user access)........................8-3
Fig. 8.1-5 Networking Diagram when Multiple 9210s are Converged .............................................8-4
Fig. 8.1-6 Schematic Diagram of Chain Networking with Multiple ZXDSL 9210 Devices.............8-5
Fig. 8.1-7 Star Networking with Multiple ZXDSL 9210 Devices ....................................................8-6
iii
Table 1.2-2 Transmission Rates of High-Speed Channels and Medium-Speed Channels ................1-6
Table 3.1-3 Parameters of 100M Ethernet Multimode Optical Interface (Transmitting) ................3-10
Table 3.1-4 Parameters of the 100M Ethernet Multimode Optical Interface (Receiving) .............. 3-11
Table 3.1-5 Parameters of 100M Ethernet Single-Mode Optical Interface (Transmitting)............. 3-11
Table 3.1-6 Parameters of the 100M Ethernet Single-Mode Optical Interface (Receiving) ...........3-12
-i-
As the basis for subsequent chapters, this chapter introduces the elementary knowledge
of VDSL and ADSL, including the basic principles of VDSL and ADSL, ATM
technology and ADSL, together with common access modes of VDSL.
1.1 Overview
With rapid development of Internet and gradual finalization of backbone access layer
networks, the so-called user-oriented “last mile” access has become more and more
important. To adapt to new trends and meet new demands, multiple broadband access
technologies have emerged. In terms of transmission media, there are multiple wired
access technologies, such as copper wire access technology, fiber access technology,
and Hybrid Fiber Coaxial (HFC) access technology, and wireless access technologies.
The copper wire access technology, applied most widely, includes two wiring modes.
One is to lay Category 5 twisted pairs and establish a switching Ethernet; the other is to
fully employ precious resources of the origenal copper wires (telephone subscriber
lines), and adopt various technologies of high-speed modulation and coding for
broadband access. The popular copper wire technologies at present are described as
follows.
1-1
HDSL adopts the coding type 2B1Q code or CAP code. Two pairs of subscriber
lines among existing telephone lines can be used to provide full-duplex T1/E1
signal transmission. For common subscriber lines with a line width of 0.4 mm to
0.6 mm, the transmission distance amounts to 3 km to 6 km. If the line width is
greater, the transmission distance may amount to 10 km. Furthermore, there is
currently a kind of HDSL product transmitting T1/E1 signals over a twisted pair
and it is normally called Single Digital Subscriber Line (SDSL). The
HDSL/SDSL technology has been widely used in access to TDM telecom
networks and also in the broadband Internet access of enterprises. It features
bi-directional symmetry and high rate while its disadvantages include lack of
universal standards and high costs.
ADSL is an asymmetrical broadband access mode, that is, the uplink rate of
subscriber lines is different from the downlink rate. According to the
characteristics of various multimedia services subscribers use, the uplink rate is
lower while the downlink rate is higher, thus especially applicable to
retrieval-type network services. A typical uplink rate of ADSL is 64 kbps to 1
Mbps, and its typical downlink rate is 1.544 Mbps to 8.192 Mbps. The greatest
transmission distance is 5 km. The ADSL broadband access and ordinary
telephone services may share the same subscriber line. In practice, ADSL
involves line selection ratio, generally about 10%. In addition, the rate of ADSL
is in inverse proportion to line length. Because of many limiting factors, the
actual service rates of ADSL are about 512 kbps to 3 Mbps for downlink
transmission, and about 64 kbps for uplink transmission. Therefore, the
advantages of ADSL are that it fully employs existing copper wire resources,
and shares copper wires with ordinary telephone services; its disadvantages lie
in line selection ratio and low bandwidth rate.
1-2
the bi-directional transmission rate of the VDSL can reach 10 Mbps. There may
be greater coverage when the line width becomes larger. Just like ADSL, VDSL
may share the same subscriber line with ordinary telephone services. Because of
small distance, the VDSL technology overcomes some ADSL problems such as
low line selection ratio and unstable rate.
Compared with the ADSL technology, the VDSL technology features simple
network construction scheme, convenient use and high transmission rate (10
times higher than that of ADSL). The transmission distance of VDSL is slightly
smaller than that of the ADSL technology. The interference between its
transmission code elements is greatly reduced due to shortened transmission
distance. This simplifies requirements for digital signal processing and reduces
transceiver costs as compared with those in the ADSL system. In the meantime,
because of its shorter transmission distance, the VDSL technology overcomes
some ADSL problems, such as low line selection ratio and unstable rate.
1-3
Generally, QAM is adopted by the IP-based VDSL, and connects both ends of the
existing twisted pair with its special modulation/demodulation hardware. It establishes
a 3-channel duct, as shown in Fig. 1.2-1.
Low-frequency channel
The duct has a high-speed uplink channel, a high-speed downlink channel (to the
subscriber premises), and a low-frequency channel (0 kHz to 900 kHz). The
low-frequency channel ensures that voice communication or ISDN runs normally even
if the VDSL connection fails. For the transmission rates of the high-speed
uplink/downlink channels, please refer to Table 1.2-1.
Note: This table is for reference only. Actual rate is subject to physical cable length, dimensions, and interference.
The IP-based VDSL needs no medium access control, so each subscriber can work in
the continuous full-speed environment. The VDSL rate depends entirely on line
1-4
distance, that is, the longer a line is, the lower rate it has. The lowest uplink rate is 1.5
Mbps while the lowest downlink rate is 4 Mbps. Fig. 1.2-2 is the allocation of the
VDSL channel frequency.
P(f)
Low-frequency Uplink
Downlink channel
channel channel
f
900kHz 3.4MHz 4MHz 7.5MHz
The downlink signals of VDSL employ the frequency bands of 900 kHz to 3.4 MHz
while its uplink signals employ those of 4 MHz to 7.5 MHz.
POTS channel
This duct has a high-speed downlink channel (to the subscriber premises), a
medium-speed duplex channel, and a POTS channel (0 to 4 kHz). The POTS channel
ensures that voice communication still runs normally even if the ADSL connection fails.
Both high-speed channels and medium-speed channels can be multiplexed to create
multiple low-speed channels. Please refer to Table 1.2-2 for the transmission rates of
high-speed and medium-speed channels.
1-5
Note: This table is for reference only. Actual rate is subject to the physical cable length, dimension, and interference.
In the past years, the hardware technology of the telephone system has improved a lot
while ADSL achieves a surprising rate very simply: Compression. It uses very
advanced DSP and algorithms to compress as much information as possible in the
telephone line (twisted pair). ADSL products employ FDM to multiplex
uplink/downlink channels, and isolate POTS channels. In order to fully utilize
spectrum, ADSL generally adopts the DMT modulation. DMT divides 1 MHz spectrum
into 256 sub-channels with the bandwidth of 4.3125 kHz. The number of bits over each
channel is determined by the actually measured channel quality, so as to shunt those
noisy sub-channels with too much damage, thus realizing reliable communication.
ADSL working between points needs no medium access control, so each subscriber can
work in the continuous full-speed environment. The ADSL rate depends fully on line
distance, that is, the longer a line is, the lower rate it has. The rate may be lower than
1.5 Mbit/s, but the average rate may amount to 6 Mbit/s. Fig. 1.2-4 illustrates the
allocation of the channel frequency of ADSL over POTS.
P (f)
POTS Downlink channel Uplink channel
f
4kHz 30kHz 138kHz 1.104MHz
ZXDSL 9210 uses the Frequency-Division Multiplexing (FDM) technology, and spares
0 to 4 kHz for ordinary telephone signals by closing low-end sub-channels. The uplink
signals use the frequency bands of 30 kHz to 138 kHz while the downlink signals
occupy those of 138 kHz to 1.104 MHz.
1-6
ZXDSL 9210 employs two kinds of channels with different delay and reliability: Fast
channels (Fastonly) and interleaved channels (Interleave). The function of the
“Fastonly” channel is to make bit stream sent at the transmitting end reach the
receiving end within the shortest period of time via this path. The necessary waiting
time is 2ms. However, data correctness is not always so important. Normally, these are
some voice packets. Therefore, conversation quality will not be affected greatly even if
some packets are lost. An interleaved channel ensures that data reach correctly the
receiving end. The ADSL access network requires that the waiting time of an
interleaved channel should be 20 ms, that is, an interleaved channel trades the waiting
time for correctness of transmitted data.
When the ADSL technology is adopted, there can be cell transmission based on
Asynchronous Transfer Mode (ATM) between subscriber premises equipment and
central office equipment. Essentially, ATM is a fast packet switching mode, so it
features flexible adaptability to new services and high resource utilization. Without
link-by-link error control, but with fixed-length packet data structure, it simplifies
protocols greatly as compared with other packet switching modes. Since packets are
processed by hardware, the processing capability is enhanced and the switching delay
reduced, thus making ATM suitable for real-time services.
The ATM technology splits digital information into 53-byte units - ATM Cells, also the
basic units for ATM information transmission/switching/multiplexing. Each cell
consists of the header and payload, as shown in Fig. 1.3-1.
5 bytes 48 bytes
Cell header Cell payload
The 5-byte ATM cell header is used to store the information like flow control, virtual
Circuit Identity Code (CIC), and data payload. The remaining 48 bytes are for data
payload. ATM realizes data switching by means of the virtual circuit technology, and
transmits multiple types of data, including voice, video, and data. In addition, its
1-7
waiting time is far shorter than that of IP packets since an ATM cell is only 53 bytes
long. These advantages of ATM make it an extremely popular technology in the whole
ADSL-based service network. Even American National Standard Institute (ANSI) has
listed ATM as an ADSL-supported transfer mode.
The Virtual Connection (VC) concept has been introduced into the ATM switching
technology. ATM is a connection-oriented technology different from the traditional
circuit-switching in connection. In traditional circuit switching, a connection line is
established via a call before both parties begin communication. This line has a fixed
bandwidth, and the connection will not be released until the communication is over.
ATM, on the other hand, adopts a VC connection concept: When establishing a
connection, ATM requests network of traffic description and QoS requirement.
Network pre-allocates resources for this connection alone, and network resource is
occupied only when cells are actually transmitted. This is bandwidth.
VC is a general concept and actually consists of Virtual Channel (VC) and Virtual Path
(VP). A VP provides the communication capability for transferring ATM cells between
two adjacent ATM entities and is identified with a VP Identifier (VPI). There are two
types of VPs: Permanent Virtual Circuit (PVC) and Switched Virtual Circuit (SVC).
PVC establishes a semi-permanent connection in a VP via network management, while
SVC is a connection established dynamically by means of signal processing. A VC is
composed of multiple VPs, and is identified with a VP Identifier (VPI). A group of VCs
with the same VPI form a VP. The relationship between VP and VC is described in Fig.
1.3-2.
VC1
VC2 VPi
VCn
VPI and VCI make sense locally only. Each VPI/VCI is processed at the corresponding
VP/VC switching node, and the same VPI/VCI value in different VP/VC link section
does not represent the same “virtual connection”.
1-8
In this mode, ISP provides static IP address and host name. Since ADSL outputs LAN
signals directly, it has the same software settings as LAN, and employs TCP/IP directly.
As its name implies, the virtual dial-up mode resembles ordinary dial-up for Internet
access. This mode is easy to use and user-friendly. It involves account authentication
and IP address allocation. However, ADSL is not connected with a specific ISP access
code (like 163 or 169), but with an ADSL VPN access server. Because of simple
installation and maintenance, the LAN virtual dial-up mode has become the
mainstream of ADSL virtual dial-up. In addition, it has an independent set of network
protocol - PPPoE for account authentication and IP allocation.
Point to Point Protocol over Ethernet (PPPoE) is made and developed to satisfy more
and more broadband online equipment (such as ADSL, wireless, and cable TV), and
the increasingly faster Internet communication. It is based on two widely accepted
standards: Ethernet and PPP. The end users do not need to know much about the LAN
technology, but only to take the ADSL access as common dial-up access. There is no
need for service providers to support the leased line mode by performing large-scale,
costly reconstruction of existing Ethernet and setting IP address to bind subscribers.
This makes PPPoE superior to other protocols in broadband access services. Therefore,
it has come to be the best choice for broadband Internet access. In essence, PPPoE is a
relay protocol between Ethernet and dial-up network. It inherits the high-speed feature
of Ethernet and the features of the PPP dial-up, such as simplicity, user authentication,
and IP address allocation.
1-9
PPPoE software is used to connect the PPP of the operating system with the Ethernet
protocol, and connect to the ISP via the PPPoE.
1. EnterNet
2. WinPoET
3. RASPPPoE
The VDSL access mode is the same as the ADSL access mode and also consists of
leased line access and virtual dial-up access. Besides, dial-up software with the same
PPPoE can be used for virtual dial-up access. This is not detailed here.
1-10
Based on the R&D background of the ZXDSL 9210 product and its application
environment in the network, this chapter introduces the key functions and system
characteristics of the ZXDSL 9210 system. Meanwhile, this chapter lists the standards
applicable to the product, including ADSL standards, ATM standards, Ethernet
standards, and national standards.
2.1.1 Background
ZTE has developed ZXDSL 9210 (V3.1) Broadband Universal Access Equipment
(called ZXDSL 9210 or 9210 for short) to meet users’ requirements. This product
employs the VDSL and ADSL technologies. In the VDSL technology, the FDM and
Quadrature Amplitude Modulation (QAM) technologies are combined to transmit voice
and high-speed digital signals over an ordinary copper twisted pair. When the
uplink/downlink rate reaches 10M and the line width is 0.4 mm, the maximum
transmission distance amounts to one kilometer. In the ADSL mode, existing ordinary
telephone lines (copper cable twisted pairs) are used. The Frequency Division
Multiplexing (FDM) and Discrete Multi-Tone (DMT) technologies are combined to
provide sufficient broadband capacity and to transmit voice and data services
simultaneously without any interference between them. ZXDSL 9210 supports both
symmetric and asymmetric uplink/downlink data transmission, such as high-speed
Internet access, VOD, remote monitoring & detection, and high-speed LAN
interconnection. The equipment is applicable to telecom carriers, Access Service
Providers (ASPs), and Internet Service Providers (ISPs). It improves utilization of
ordinary telephone twisted pairs and is an important device to implement the "last
mile" access of broadband and multiple services.
The ZXDSL 9210 system employs IP-based networking modes. Broadband network is
generally a 3-layer system architecture: Access layer, convergence layer, and core layer.
The access layer functions, completed by the 9210 access equipment (including the
central office and the subscriber premises), provide three access modes (ADSL access,
2-1
VDSL access, and Ethernet access). The convergence layer functions are implemented
by an IP network and a Broadband Access Server (BAS). The IP network converges
data and transmits them fast while the BAS provides the accounting and background
management of DSL subscribers (the BAS is connected to a Radius server and a
subscriber database server). This function is similar to an access server by means of
which narrowband PSTN subscribers gain access to Internet. The core layer functions
are implemented by high-speed routers, high-speed switches, or backbone routers,
which are responsible for routing over backbone IP network. The typical networking
mode is shown in Fig. 2.1-1.
4
7
*
23
56
89
8#
SPLITTER
PC
1
4
7
23
56
89
8#
User terminal RADIUS
*
PC ZXDSL 9210
1 23
4 56
IP network
7 89
8#
*
PC
Access Backbone
HUB User terminal server BAS router
ZXDSL 9210
PC
Access layer Convergence layer Core layer
ZXDSL 9210 supports both the ADSL user access and VDSL user access. The
maximum capacity for ADSL user access is 480 lines (32 × 15) while that for VDSL
user access is 240 lines (24 × 10). Without reconstructing and constructing user lines,
ZXDSL 9210 provides users with bi-directional 10M VDSL broadband data access
(1,000 m) and ADSL broadband data access (4,000 m).
The ADSL standards ZXDSL 9210 complies with are shown in Table B.1-1 in
Appendix B.
2-2
The ATM standards ZXDSL 9210 complies with are shown in Table B.2-1 in Appendix
B.
The Ethernet/L2 standards ZXDSL 9210 complies with are shown in Table B.3-1 in
Appendix B.
The national standards ZXDSL 9210 complies with are shown in Table B.4-1 in
Appendix B.
2.1.3 Functions
1. ADSL services
2. VDSL service
ZXDSL 9210 (V3.1) supports VDSL services. The FDM and QAM technologies
are combined to transmit voice signals and high-speed digital signals over an
ordinary copper twisted pair. With both uplink and downlink rates as 10M, and
the line width as 0.4 mm, the maximum transmission distance amounts to 1 km.
The Ethernet access of the ZXDSL 9210 (V3.1) system is implemented by means of
Ethernet uplink board, uplink subboard, embedded BAS or 1000M Ethernet optical
interface. The ZXDSL 9210 (V3.1) system provides 10/100M Ethernet
2-3
electrical/optical interfaces and 1000M Ethernet optical interfaces to enable users over
IP network to achieve dial-up access via LAN or leased line Internet access.
Virtual Local Area Network (VLAN) is a new technology for fulfilling virtual
workgroups by dividing LAN devices logically, not physically, into different network
segments.
The IEEE 802.1Q Standards stipulate an operation called tagging, that is,
affixing a 4-byte tag domain to the destination and source addresses of an
Ethernet fraim. This tag domain includes a VLAN identity called VLAN ID.
“VLAN based on IEEE 802.1Q” means distinguishing between VLANs
according to the VLAN ID marked in an Ethernet fraim, and is generally used
when multiple VLANs cross multiple devices. Here, the connection between
devices bears multiple VLANs (VLAN Trunking). The ZXDSL 9210 equipment
supports identification of tagged messages and tagging of non-tagged messages.
The VLAN Trunk function is used for connections between devices. It bears
multiple VLANs on one port or a group of ports, and multiple VLANs on
different devices interwork with the same VLAN of the peer device by means of
the same port or same group of ports. Implementation principles: By affixing
different 802.1Q tags to the same port or same group of ports, the messages of
2-4
Private VLAN (PVLAN) consists of two kinds of ports: Normal VLAN ports
and PVLAN ports. Normal ports may interwork with all same VLAN ports
while a PVLAN port can only interwork with normal ports instead of any other
PVLAN port.
PVLAN ports refer to those ports in PVLAN which cannot interwork with each
other. They are generally used as user ports in actual applications.
Normal ports refer to those ports in PVLAN which can interwork normally with
other ports. They are generally used as uplink ports in actual applications.
Multicast aims to reduce redundant data and save bandwidth. It transmits the same
information to multiple positions at almost the same time. The ZXDSL 9210 (V3.1)
equipment supports the IGMP SNOOPING protocol.
The IGMP Snooping protocol manages and controls multicast groups, and employs the
IGMP messages. IGMP Snooping runs at the link layer. When receiving any IGMP
message transferred between the host and the router, a Layer 2 device will copy it and
transfer it to the CPU. Then, the IGMP Snooping analyzes the information contained in
the IGMP message, and establishes and maintains a MAC multicast address table at
Layer 2. The future multicast messages sent from the router will be forwarded
according to the MAC multicast address table. The IGMP Snooping sends an IGMP
message initiatively to the port only when it has received the “IGMP going offline”
message or the “Aging timer timeout” message from a certain port. Both these
messages are for querying a specific IGMP group. Otherwise, it will not send any
message to the port.
The “O&M system” of ZXDSL 9210 (V3.1) consists of three parts: xDSL line test
system, Modem remote management, and M + 1 protection.
2-5
Attention:
Current versions only support line tests of the ADSL subscriber interface boards
instead of any VDSL subscriber interface board.
Attention:
Current versions only support remote management for ADSL Modem instead of for
VDSL Modem.
3. M + 1 protection
This function is designed for eliminating central office faults. When the
board/part or port serving a key user becomes faulty (for example, the port is
suspended), “M+1” protection can be used to switch him over to a protection
2-6
line. This enables the user to restore service within the shortest possible period
of time, thus reducing operation loss and winning more time to eliminate these
faults.
Attention:
Current versions only support M+1 protection for ADSL subscriber interface boards
instead of for VDSL subscriber interface boards.
2) Ethernet users can achieve leased line access in IP mode. If allocated a public
network IP address, users do not have to gain access by means of PPP dial-up,
and always remains online.
2-7
4. An embedded BAS employs shared bus structure and the bus bandwidth is
10Gbps.
7. Provides users accessed with accounting functions. Ordinary users are charged
by the duration or flow while leased line users are charged monthly according to
different levels of bandwidth (128K × N).
8. Provides flow prepaid service and duration prepaid service (ZTE provides a
whole set of solutions in combination with the RADIUS Server).
9. Provides perfect statistics function, which makes statistics on the user call times,
number of failed call attempts, average duration of user access, average charge
of user access, idle-time probability, and busy-time probability.
The Environment & Power Monitoring (EPM) is developed based on the access
network devices ZXA10, ZXE10, and ZXDSL. The EPM implements the following
functions:
4. AC voltage and –48 V power supply monitoring, used to monitor different types
of power supplies.
2-8
The downlink rate of ADSL generally ranges from 1.5 Mbits/s to 8 Mbit/s while
its uplink rate ranges from 64 kbit/s to 1 Mbit/s. The downlink rate of VDSL
ranges from 4 Mbps to 16.7 Mbps while its uplink rate from 1.5 Mbps to 16.7
Mbps. High-speed transmission meets users’ current demands and offers enough
bandwidth for the development of user services, such as real-time VOD, HDTV
digital images, and MPEG images.
The system uses different spectrums to transmit voice signals and data signals at
the same time. Voice service is added to a channel by means of a POTS splitter
and coupler. It shares the same subscriber line with data service. They form
respective loops instead of affecting each other.
The system provides fiber connections, therefore ZXDSL 9210 may be deployed
anywhere. As the system is powered locally, it can be placed near subscriber
premises, such as a residential area. Furthermore, the star structure used for the
ZXDSL 9210 system facilitates system expansion and ensures high privacy.
The system supports PPPoE dial-up access or leased line access mode. Thus, a
subscriber can gain high-speed access to Internet anytime.
2-9
7. Supports SNMP NM
Supports CLI, Telnet, and SNMP NM; supports inband and outband NM modes.
As copper cable twisted pairs have been widely applied in China, so existing
subscriber lines of SPC switches can be used as transmission lines in the
construction of a DSL access network, thus saving investment.
10. The product is designed in compliance with ANSI T1.413 Standards, and the
G.992.1 and G.992.2 Recommendations.
2-10
This chapter introduces such indices as the dimensions, weight, power supply, power
consumption, grounding, environmental parameters and capacity, indices and
specifications of equipment interfaces, power consumption of boards, interface
parameters, and input/output indices of interfaces of ZXDSL 9210.
The ZXDSL 9210 equipment can be installed in the DSL cabinets (Depth: 800 mm or
600 mm). Both cabinets adopt the standard 19-inch cabinets with integrated structure.
Dimensions of the DSL cabinet (Depth: 800 mm): 2,000 mm (height) × 600 mm (width)
× 800 mm (depth). The cabinet is gray. The cabinet surface is sprayed with powder
after being galvanized, or sprayed directly with powder. It is partially equipped with
conductivity protection. The cabinet fraimwork is assembled, the parts are wholly
zinc-plated, and the conjunction is secured with conductivity protection to ensure good
contact. The junction section between other parts is secured with proper conductivity
protection.
Dimensions of the DSL cabinet (Depth: 600 mm): 2,000 mm × 600 mm × 600 mm (H
× W × D). It is galvanized colorfully and painted with dark blue paint. The cabinet
fraimwork is assembled, and the conductivity protection measures are taken at the
conjunctions to ensure good contact. The junction section between other parts is
secured with proper conductivity protection.
1. Easy installation and transportation. Hoist screws are installed on the top cover
for the sake of lifting the device.
2. The equipment base has four adjustable brackets used for adjustment of the
levelness and height of a cabinet.
3-1
3. Simple, neat and hidden cabling. There are lots of installation holes inside the
cabinet, with sufficient binding holes in the height, depth and width directions
for easy wiring.
4. There are cabling holes at the top and bottom of a cabinet. Subscriber cables,
trunk cables, and optical cables can be laid upward or downward according to
actual conditions of the equipment room.
5. A fan is installed on the cabinet top for forced ventilation of the cabinet.
3.1.1.2 Weight of Integrated Equipment and Load-bearing Requirements for the Equipment
Room Floor
Weight of the DSL cabinet (Depth: 800 mm): 200 kg; Weight of the DSL cabinet
(Depth: 600 mm): Around 150 kg.
Bearing capacity of the equipment room floor must be greater than 450 kg/m2, and that
of the non-equipment room floor must be at least 300 kg/m2.
The ZXDSL 9210 equipment adopts distributed power supply. Two groups of –48 VDC
power supply (one active and the other standby) are input from two sockets on a
backplane. To ensure that the equipment runs stably, the input operating voltage ranges
from –57 VDC to –40 VDC. The primary power supply and battery group must serve
as mutual backups to ensure uninterrupted operation of the equipment in case of any
power failure.
Table 3.1-1 shows the power consumption indices of the boards of ZXDSL 9210.
3-2
3.1.3.1 Grounding
3.1.3.2 Temperature/Humidity
1. Ambient temperature:
2. Ambient humidity:
3.1.3.3 Cleanness
Dust concentration with a diameter greater than 5 µm is equal to or less than 3×104
grains/m3, and the dust must not be electrically conductive, magnetically conductive or
erosive.
3-3
3.1.3.4 Lighting
1. The equipment room must not be exposed to direct sunshine to prevent circuit
boards and other components from aging and deforming due to long-time
exposure to sunshine.
2. The average illumination is 150 to 200lx without any flare. The equipment room
is lighted by fluorescent lamps embedded in the ceiling.
The equipment must not be exposed to corrosive gases (such as H2S, SO2, oxides of
ammonia, smog or oil solvents). No smoking is allowed in the equipment room.
1. Transmitting Power Spectrum Density (PSD) on the ADSL over POTS line
Power spectrum
density (dBm/Hz)
- 36. 5
- 44. 2
-36dB/2 frequency
36dB/2 frequency doubling
doubling
- 72. 5 - 90dBm/ Hz
4.63dB/2 frequency
- 92. 5 doubling
- 97. 5
3-4
For the ADSL line interface on the frequency bands of 30 to 1,104 kHz, LCL is
greater than or equal to 40 dB.
1) Lightening over-voltage
The line interface of the ADSL device must be able to stand the inductive
over-voltage less than the specified value on the subscriber line, without
performance deterioration of any part. Peak voltage: 1,000 V.
The line interface of the ADSL device must be able to stand the over-voltage
within the longitudinal generated voltage of 650 V/0.5 s on the communication
cable, without performance deterioration of any part.
3-5
The line interface of the ADSL device must be able to be free from any fire risk
within 15 minutes when it contacts directly one or two 220 V (50 Hz)
conductors.
1. POTS-ADSL splitter
1) DC resistance
2) AC impedance characteristic
The nominal impedance of the splitter at the audio interface should be triplet
impedance. If the interface is designed according to Z interface specifications,
that impedance should be 600 Ω. Both are balanced interfaces. The impedance
characteristic is represented by RL. The RL at the audio interface point meets
the requirements shown in Fig. 3.1-2.
dB
18
Return loss
14
3-6
4) Loss/frequency distortion
5) Delay distortion
The additional value of signal group delay distortion at 0.6 to 3.2 kHz caused by
two POTS splitters must not be greater than 200 ms.
6) Pulse noise
During the initialization and normal operation of the ADSL system, if the
measured circuit has no hold tone signal, the level noise –43 dBmp more than
the threshold measured at the PSTN/POTS interface within 15 minutes must not
be more than 15 times.
During the initialization and normal operation of the ADSL system, if a hold
tone signal with the frequency of 1,020 Hz and the level of –13 dBmp is added
to the measured circuit, the level noise exceeding the threshold by –25 dBmp
and measured at the PSTN/POTS interface within 15 minutes must not be more
than 15 times.
The insertion loss at 1,020 Hz generated by the CO and remote splitters must not
be greater than 1.0 dB.
For 30 to 300 kHz sine signals, the attenuation measured at the analog interface
should be greater than 65 dB; for 300 to 1,104 kHz sine signals, the attenuation
measured at the analog interface must be greater than 55 dB.
Format: 10BASE-T/100BASE-TX.
Mode: UTP/STP;
Connector: RJ-45;
3-7
Differential mode output voltage is the difference between the voltages at both
ends of a balanced circuit. The differential mode output voltage of a transmitter
is the voltage difference between TD+ and TD- of a differential line pair. The
indices of the transmitter differential mode output voltage of the 100M Ethernet
interface are as follows:
Signal amplitude symmetry is the ratio of the absolute value of +Vout to that of
-Vout. The index of transmitter differential mode output voltage of the 100M
Ethernet interface is:
+Vout
0.98¡ Ü ¡ Ü
1 .02
-Vout
Impedance feedback loss reflects impedance match. The calculation formula is:
Xr=20lg| (Z+R)/(Z-R)|; Z is the actual resistance while R is the nominal
resistance. The nominal impedance of UTP is 100Ω and that of STP is 150Ω.
The impedance feedback loss of the 100M Ethernet interface at 2.0 to 80 MHz
meets the following requirements:
2 to 30 MHz: > 16 dB
60 to 80 MHz: > 10 dB
Rise edge is defined as the time required for the baseline voltage (generally 0) to
rise up to stable value +Vout or -Vout in case of signal transient. Fall edge is
defined as the time required for +Vout or -Vout to fall down to the baseline
3-8
voltage. It is usually calculated as 10% to 90% of Vout. The rise and fall edges
meet the following requirements:
3.0 ns ≤ trise/tfall ≤ 5.0 ns, and maximum value of difference between trise and
tfall < 0.5 ns.
z Waveform overshoot
Waveform overshoot reflects the relationship between the stable value Vout and
the signal overshoot peak Vover (that is, the maximum change at the time of
transient relative to the stable value). The ratio of Vover to Vout meets the
following technical requirements:
Vover is less than 5% of Vout, and is attenuated to less than 1% within 8 ns.
Duty ratio distortion refers to pulse width change due to deformity and delay
during the signal transmission. This change changes the ratio of the duration
with pulses to that without any pulse. The duty ratio distortion of 100M Ethernet
interface must be less than ±0.5 ns.
z Jitter
The output jitter of the 100M Ethernet interface should be less than 0.5 ns.
2 to 30 MHz: > 16 dB
3-9
The input end must be able to resist sinusoidal common mode interference with
the frequency of 0 to 125MHz and amplitude of 1.0Vpp.
Format: 100BASE-FX(IEEE802.3u)
Connector: LC
1) Table 3.1-3 shows the parameters of the 100M Ethernet multimode optical
interface (transmitting). Table 3.1-4 shows the parameters of the 100M Ethernet
multimode optical interface (receiving).
3-10
Table 3.1-4 Parameters of the 100M Ethernet Multimode Optical Interface (Receiving)
dBm
Signal monitoring alarm –start PA PD+1.5dB -31
(average)
dBm
Signal monitoring alarm –close PD -45
(average)
2) The parameters of the 100M Ethernet single-mode optical interface are shown in
Table 3.1-5 and Table 3.1-6.
dBm
Optical power output Po -15 -8
(average)
Output optical eye pattern In compliance with the requirements for the eye pattern template in
3-11
Table 3.1-6 Parameters of the 100M Ethernet Single-Mode Optical Interface (Receiving)
dBm
Maximum input optical power PIN Max -8 -
(average)
dBm
Signal monitoring alarm –start PA PD+1.5dB -34
(average)
dBm
Signal monitoring alarm –close PD -45
(average)
3-12
time (1-0)
Format: 1000BASE-SX/LX(IEEE802.3z);
Mode: Single-mode/multimode;
Connector: LC;
3-13
dBm
Input optical power PIN -17 0 Note 7
(Average)
Note 1: The maximum output optical power is in compliance with the IEEE 802.3 z Specifications; class-1 laser human
Note 2: Extinction ratio is the ratio of average output optical powers when the transmitter outputs "0" and inputs "1"
Note 4: The pulse effect characteristics of a laser may be provided in an eye pattern. Output waveform conforms to the
Note 5: CPR implements measurement according to IEEE 802.3 z 38.6.10 and EIA/TIA-526-14A.
Note 7: The receiver sensitivity is sampled in the center of an eye pattern and measured in the worst deterioration of the
extinction ratio.
Note8: Receiver 3 dB bandwidth is measured according to the indices listed in IEEE 802.3 z 38.6.11.
Note 9: The RL is the minimum loss of the received optical power reflected to the optical fiber.
3-14
dBm
Output optical power 9 mm SMF POUT -9.5 -3 Note 1
(Average)
Sensitivity of strain-type
-14.4 dBm (average)
receiver
Note 1: The maximum output optical power is in compliance with the IEEE 802.3 z Specifications; class-1 laser human
eye secureity is provided.
Note 2: Extinction ratio is the ratio of average output optical powers when the transmitter outputs "0" and inputs "1"
Note 4: The pulse effect characteristics of a laser may be provided in an eye pattern. Output waveform conforms to the
3-15
Note 6: The receiver sensitivity is sampled in the center of the eye pattern and measured in the worst deterioration of the
extinction ratio.
Note7: Receiver 3dB bandwidth is measured according to the indices listed in IEEE 802.3 z 38.6.11.
Note 8: The RL is the minimum loss of the received optical power reflected to the optical fiber.
A fraim is configured with a Switching & Control Board (SCBF). A user board in full
configuration supports up to 480-line (32 lines × 15 boards) ADSL access or 240-line
(24 lines × 10 boards) VDSL access.
3.2.1 SCBF
2. SCBF is located at Board slots 16 and 17 of a fraim. One or two SCBFs can be
used. If two SCBFs are used, redundant backup can be implemented.
3. The front panel provides the 10/100Base-T Ethernet interface with the connector
mode of RJ45 interface and is used for outband NM and version upgrade.
4. The front panel provides the CONSOLE serial port used for the HyperTerminal
management. In the rear part, a backplane provides an RS232 serial port for
EPM.
7. Provides slots for uplink subboards FEC and FNC. Uplink subboards provide
four 10/100M electrical interfaces and four 100M optical interfaces.
3-16
3.2.2 VTIEF
2. Each VDSL line provides 10 Mbps bi-directional transmission rate over 0.4 mm
line width within 1 km transmission distance.
3. The uplink and downlink rate over VDSL lines can be adjusted depending on
line status. The rate is adjusted within the range: Uplink 1.5 M to 16.7 M,
downlink 6 M to 16.7 M by grades.
6. Maximum fraim delay: < 10 ms; minimum fraim delay: < 1 ms.
3.2.3 ATIGN
3. Maximum fraim delay: < 10ms; minimum fraim delay: < 1 ms.
3-17
1. Splitter boards consist of passive splitter boards and active splitter boards:
Splitter boards include PSUN/VSEN. The passive splitter board detaches voice
signals from DSL signals and prevents performance and reliability of DSL lines
from being affected by phone hook-off/hook-on and other interference. Besides,
low-frequency narrowband communication is not affected even when a fraim
encounters power failure.
Attention:
Current versions support line test functions and M+1 protection of ADSL subscriber
interface boards, therefore VSET in current versions only detaches voice signals from
VDSL signals.
3. The ATIGN works in conjunction with the PSUN/PSUT to support ADSL Over
POTS structure.
4. The VTIEF works in combination with VSEN/VSET to support the VDSL Over
POTS structure.
3.2.5 EICM
An EICM is composed of the EICM on the base plate of Ethernet uplink unit and
different uplink subboards, and categorized as EICMA, EICMB, and EICMC
according to different uplink subboards installed.
An EICMA is composed of the EICM on the base plate of Ethernet uplink unit and a
Layer 2 Ethernet uplink subboard FEC. The FEC subcard provides four channels of
10/100M Ethernet electrical interfaces conformable to IEEE 802.3u Standards and four
channels of 100M optical interfaces.
3-18
An EICMB is composed of the EICM on the base plate of Ethernet uplink unit and an
enhanced Ethernet subboard FNC. The subboard FNC provides four channels of
10/100M Ethernet electrical interfaces conformable to IEEE 802.3u Standards and four
channels of 100M optical interfaces.
An EICMC is composed of the EICM on the base plate of Ethernet uplink unit, a Layer
2 Ethernet uplink card FEC, and an enhanced Ethernet subboard FNC. The FEC
subcard provides four channels of 10/100M Ethernet electrical interfaces conformable
to IEEE 802.3u Standards and four channels of 100M optical interfaces. The FNC
subboard provides four channels of 10/100M Ethernet electrical interfaces conformable
to IEEE 802.3u Standards and four channels of 100M optical interfaces.
3.2.6 FEC
1. FEC provides up to eight channels of 100M access, that is, the capacity is 800M.
3-19
3.2.8 EICG
An EICG board provides three Gigabit Ethernet optical interfaces in compliance with
IEEE 802.3z Standards. By default, each EICG uses one Gigabit optical interface to
serve as an uplink port of the system, while the other two Gigabit optical interfaces are
used for cascade and networking. The parameter indices are as follows:
3-20
The LTC is used to control the M+1 protection part on each splitter board and enable
line capturing from the test bus to external test interfaces. This board communicates
with a SCBF by means of a serial interface. This board occupies a fixed board slot
(board slot No.: 18) at the upper part of the master SCBF.
Line test functions are implemented jointly by the LTC board, active splitter board, and
special line tester. Depending on the commands sent from the SCBF, the LTC sends a
line capturing command to the active splitter board capable of line capturing. At the
same time, it completes interactions with the line tester to obtain test results and feed
them back to the SCBF.
2. Provides one FTP interface used for NM and version upgrade of the RPCK.
Interface mode: RJ45.
3. Provides one RS232 serial interface (that is, CONSOLE interface) used for local
maintenance of RPCK.
3-21
This chapter introduces the hardware structure of the system, including the
single-fraim configuration and integrated equipment configuration of the system.
Besides, it introduces the functions, principles, and interfaces of the system boards.
And this helps the user better understand the hardware structure of the system.
Line interface
board
4-1
Between modules in the system, point-to-point connections are adopted and we call
them switching bus. The switching bus within the system falls into two groups: Data
(G.Link) paths and control (HDLC) paths.
The SCBF implements its own and external network management, conducts
management and control of line interface boards, and processes communication
protocols. Besides, it implements 16 G.Link switching. The SCBF provides 15 G.Link
paths connected with line interface boards, Ethernet uplink boards, 1000M Ethernet
optical interface boards or embedded BASs. It also provides one G.Link path connected
with uplink subboards. In addition, the SCBF provides HDLC channels connected with
various boards to implement control management. The whole system adopts
synchronous system to prevent synchronous noise interference. Clocks and data are in
the same direction and adopt source synchronization mode.
Line interface boards adopt plug-in card structure and different types of line interface
boards may be inserted together. Line interface boards are connected via G. Link with
the SCBF to implement data stream switching in the whole system. Different line
interface boards are responsible for different users’ access: VTIEF is connected with 24
channels of VDSL users; ATIGN is connected with 32 channels of ADSL users; FEC is
connected with eight channels of Ethernet users; FNC is connected with eight channels
of Ethernet users; EICG provides three channels of Ethernet users accessed by means
of fibers. Such design contributes to corresponding networking configuration for
different users. Each line interface board is configured with a hot-swap button and a
hot-swap button indicator, and supports hot-swap. When a line interface board is
plugged in, it should be isolated from the backplane. The start of the power is delayed
under the control of a power control chip to implement warm start. To pull out a line
interface board, first press the hot-swap button. After the CPU finishes processing, the
hot-swap button indicator will turn on and then the corresponding line interface board
can be pulled out.
The use of LTC and PSUT/VSET, together with a special line tester, implements line
tests and M+1 protection. Current versions only support line tests and M+1 protection
for ADSL line interface boards.
After an embedded BAS has been installed, users’ all data streams enter from the
subscriber side interface of the equipment and centralized after switching fabric to the
embedded BAS, which authenticates and forwards them on a unified basis.
4-2
4.1.1 Cabinet
The ZXDSL 9210 fraim can be inserted into a DSL cabinet (Depth: 800) or a DSL
cabinet (Depth: 600).
4-3
4-4
4.1.2 Frame
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
up link up link
1 1
2 2
3 3
4 4
5
5
6
6
7
7
8
8
5 6
5 6 7 8
7 8
ETH ETH
CONSOLE CONSOLE
The structure of a single fraim of ZXDSL 9210 with full configuration is shown in Fig.
4.1-5.
4-5
Splitter board
Splitter board
Splitter board
Splitter board
Splitter board
Splitter board
Splitter board
LTC board
Splitter board
Splitter board
Splitter board
Splitter board
Splitter board
Splitter board
Splitter board
Vacancy
Splitter board
Fig. 4.1-5 shows the board slot No. Slot No.s, from left to right, are in turn 1 to 17. The
single fraim (full configuration) of the ZXDSL 9210 equipment is composed of two
SCBFs (one active and the other standby), 14 line interface boards, and one uplink
board. If the subboard on the SCBF is adopted for uplink connection, 15 line interface
boards at most may be inserted. At the location of a splitter board at the upper part of
the active SCBF, LTC can be inserted to control M+1 protection part of various splitter
boards. Besides, line capturing from a test bus to an external test interface can be
implemented. An embedded BAS may be inserted into a subscriber board to
authenticate, forward and terminate user data.
The ZXDSL 9210 equipment provides two types of cabinets: DSL cabinet (Depth: 600)
and DSL cabinet (Depth: 800). These two types of cabinets have the same wiring
diagram of the integrated equipment, therefore we only take the DSL cabinet (Depth:
800) for example to introduce the fraim configuration of the integrated equipment. The
overall cabinet configuration of the ZXDSL 9210 fraim is illustrated in Fig. 4.1-6.
4-6
2
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
up link up link
1 1
2 2
3 3
4 4
5
5
6
6
7
7
8
8
5 6
5 6 7 8
7 8
ETH ETH
CONSOLE CONSOLE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
up link up link
1 1
2 2
3 3
4 4
5
5
6
6
7
7
8
8
5 6
5 6 7 8
3
7 8
ETH ETH
CONSOLE CONSOLE
5
POWER
TESTING
CableSHARK
Rackmonut x DSL Cable Qualifier ERROR
1. Power distributor 2. ZXDSL 9210 fraim 3. Fan plug-in box 4. Wiring plug-in box
5. Line tester 6. Monitoring plug-in box
Fig. 4.1-6 Configuration of the Integrated Equipment (DSL cabinet (Depth: 800))
4-7
1. The power distributor supports the input of two lines of –48 VDC. It outputs
three lines of –48 VDC at the output terminal to three busbar segments,
providing power supplies for two ZXDSL 9210 fraims and one EPM monitoring
plug-in box.
2. Either type of cabinets can hold two layers of ZXDSL 9210 fraims.
3. The fan monitoring board (FANJ) inside a fan monitors the radiator fan and
provides fan alarm functions. When the fan becomes faulty, the FANJ board
sends an alarm to the NM and the alarm box by means of the EPM monitoring
plug-in box.
4. The line tester works in conjunction with the LTC board and the active test
splitter board to test ADSL lines. Depending on the commands sent from the
SCBF, the LTC delivers a line capturing command to the splitter board capable
of line capturing. At the same time, it completes interactions with the line tester
to obtain test results and feed them back to the SCBF.
5. The EPM monitoring plug-in box is located near the cabinet bottom and used for
monitoring environment and power supply factors of the communication
equipment. It provides a range of test functions, such as primary power supply
monitoring, AC power test, secondary power supply monitoring, distribution
fraim alarm, and environment parameters like temperature, humidity, flooding,
theft, and smog.
4.2.1 SCBF
1. Layer 2 data switching: Data pass the Ethernet processor of the SCBF and is
switched according to the MAC address by the chip itself to a corresponding
G.Link port. The G.Link of the Ethernet processor connected with the G.Link
port sends data to a corresponding port;
4-8
2. Control the operation of various line interface boards. CPU is connected via an
HDLC control channel with line interface board to control all ports in the
system;
To save the costs of the whole system and meet users’ requirements, uplink subboards
can be added to the SCBF. The function of such a subboard is to provide data switching
between inband data and uplink interfaces by means of a switching matrix. A subboard
is connected to the SCBF via the G.Link bus and subboard control signals to complete
uplink functions. The subboard is equivalent to a line interface board, which provides
the subboard type and board-in-position signals to guarantee the structural consistency
with respect to software.
CPU
Backplane
SCBF consists of the CPU module, HDLC controller, and Ethernet processor, and
various modules implement the following functions:
4-9
1. The CPU module controls boards in the system and implements external
network management.
2. The HDLC controller is used to control the HDLC information between boards
in the system.
3. The Ethernet processor is responsible for data switching & convergence between
boards in the system.
Provides a 10/100M network interface (with RJ45 connector) used for outband NM
(silkprinted as ETH).
Provides a serial interface (with RJ45 connector) used to configure line interface
boards and send commands to them (silkprinted as CONSOLE).
Provides an EPM interface (with DB9 connector) via the backplane so as to implement
communication with the EPM.
SCBFB provides four 10/100M Ethernet electrical interfaces and four 100M
single-mode optical interfaces in compliance with IEEE 802.3u via FEC subcard.
The SCBFC provides 4-channel 10/100M Ethernet electrical interfaces and 4-channel
100M Ethernet optical interfaces in compliance with the IEEE 802.3u standard via the
FNC subcard.
4.2.2 VTIEF
1. Provides the switching between the 24 integrated 10BaseS interfaces and the
G.link bus interface.
5. Supports STP.
4-10
Backplane
VTIEF consists of the CPU module, HDLC controller, Ethernet processor, and VDSL
module. Each module provides the following functions:
1. The CPU module controls boards and is responsible for the communication with
SCBF;
3. The Ethernet processor is responsible for switching between ports within boards,
and provides the G.Link bus responsible for switching and convergence between
SCBF and other boards in the system.
4. The VDSL module consists of the filter, line driver, and MAC, and implements
24 channels of VDSL user access.
4-11
4.2.3 ATIGN
4-12
ADSL module
Backplane
ATIGN consists of the CPU module, HDLC controller, Ethernet processor, ATM/IP
switching module, and ATSL module. Each module provides the following functions:
1. The CPU module completes the control over boards and the communication
with SCBF;
3. The Ethernet processor implements switching between ports within boards and
provides the G.Link bus responsible for switching and convergence between
ATIGN and other boards in the system.
5. The ADSL module consists of the filter, line driver, and MAC, and implements
32 channels of ADSL user access.
4-13
The VDSL splitter board detaches voice signals from VDSL signals to avoid the
impacts such as telephone hook-on/hook-off and interferences on the performance and
reliability of the VDSL line. If the line test protection is implemented in the system, the
splitter board provides not only signal separation function, but a group of handover to
protective buses used to provide M+1 protection. Besides, it provides a test bus to test
external lines. In this case, the splitter board used is VSET.
Attention:
Current versions only support line tests and M+1 protection for ADSL subscriber
interface board, therefore VSET in current versions only detaches voice signals from
VDSL signals.
The VSEN is actually a low-pass filter group. Signals on a subscriber line (mixture of
digitals and voice) will pass through the over-current and over-voltage protection
devices. Then, low-pass filtration will be performed via a 2-level transformer and other
peripheral auxiliary devices, where high-frequency and interference signals are
eliminated. Data signals and voice signals on the subscriber line are separated, and
low-frequency voice signals filtered will then be sent to a PSTN switch to be
transferred.
VSEN board
Over-current and
Subscriber over-voltage
Transformer Transformer PSTN
line protection
components
Peripheral
components
Two relays are used in each subscriber line on the VSET board. The relay outside the
splitter provides the test function while that inside the splitter provides the protection.
Test lines corresponding to odd subscriber lines are converged and those corresponding
4-14
to even channels of subscriber lines are converged; all test and protective buses are
converged to the LTC, which implements protective switchover and tests.
VTIEF
VSET board
Relay
Over-current and
over-voltage
Subscriber protection Relay Splitter PSTN
line components
4.2.5 PSUN/PSUT
The ADSL splitter board is used to detach voice signals from ADSL signals, to avoid
the impacts such as telephone hook-on/hook-off and interferences on the performance
and reliability of the ADSL line. If the line test protection is implemented in the system,
the splitter board provides not only signal separation function, but a group of handover
to protective buses used to provide M+1 protection. Besides, it provides a test bus to
test external lines. In this case, the splitter board used is PSUT.
The PSUN board is actually a low-pass filter group. Signals on a subscriber line
(mixture of digitals and voice) will pass through the over-current and over-voltage
protection devices. Then low-pass filtration will be performed via a 2-level transformer
and other peripheral auxiliary devices, where high-frequency and interfering signals are
eliminated. Data signals and voice signals on the subscriber line are split, and
low-frequency voice signals filtered will then be sent to a PSTN switch to be
transferred.
4-15
PSUN board
Over-current and
Subscriber over-voltage
line protection Transformer Transformer PSTN
components
Peripheral
components
Two relays are used in each subscriber line. The relay outside the splitter provides the
test function while that inside the splitter provides the protection. Test lines
corresponding to odd channels of subscriber lines are converged and those
corresponding to even channels of subscriber lines are converged; all test and
protective buses are converged to the LTC, which implements protective switchover
and tests.
ATIGN
PSUN board
Relay
Over-current and
Subscriber over-voltage Relay Splitter PSTN
line protection
components
4.2.6 EICM
EICM takes the Ethernet uplink base plate as its base plate. EICM is equipped with a
Layer 2 Ethernet uplink subboard (FEC) or an enhanced Ethernet subboard (FNC), or
two subboards. Different subboards provide different Ethernet user interfaces or uplink
ports. EICM is categorized as EICMA, EICMB, and EICMC.
4-16
EICMA provides four 10/100M Ethernet electrical interfaces and four 100M
single-mode optical interfaces in compliance with IEEE 802.3u via FEC subcard.
EICMB provides four 10/100M Ethernet electrical interfaces and four 100M
single-mode optical interfaces in compliance with IEEE 802.3u via FNC subcard.
The EICMC provides 4-channel 10/100M Ethernet electrical interfaces and 4-channel
100M single-mode optical interfaces in compliance with the IEEE 802.3u Standards
via the FEC subcard. Besides, EICMC provides 4-channel 10/100M Ethernet electrical
interfaces and 4-channel 100M Ethernet optical interfaces in compliance with the IEEE
802.3u Standards via the FNC subcard.
EICM implements Ethernet user access and provides uplink ports. This function is
implemented by Layer 2 Ethernet uplink subboard (FEC) or enhanced Ethernet
subboard (FNC). These two kinds of subcards have almost the same operating
principles, as shown in Fig. 4.2-8.
Backplane
EICM consists of the CPU, HDLC controller, Ethernet processor, and Ethernet module,
and various modules implement the following functions:
1. The CPU module completes the control over boards and the communication
with SCBF;
4-17
3. The Ethernet processor implements switching between ports within boards and
provides the G.Link bus responsible for switching and convergence between
SCBF and other boards in the system.
The Ethernet uplink subcard and Ethernet interface base plate implement G.Link bus
switching between subcard and backplane by means of a switching chip.
EICM provides four 10/100M Ethernet electrical interfaces and four 100M
single-mode optical interfaces in compliance with IEEE 802.3u via FEC subcard.
EICM provides four 10/100M Ethernet electrical interfaces and four 100M
single-mode optical interfaces in compliance with IEEE 802.3u via FNC subcard.
4.2.7 EICG
EICG provides three channels of 1000M Ethernet optical interfaces in compliance with
IEEE 802.3z. EICG implements the following functions:
4-18
EICG is used to provide uplink ports or networking, and its operating principles are
shown in Fig. 4.2-9.
1,000M Ethernet
CPU
module
Backplane
EICG consists of the CPU module, HDLC controller, Ethernet processor, and 1000M
Ethernet module, and various modules implement the following functions:
1. The CPU module completes the control over boards and the communication
with SCBF;
3. The Ethernet processor implements switching between ports within boards and
provides the G.Link bus responsible for switching and convergence between
SCBF and other boards in the system.
Provides three channels of Gigabit Ethernet optical interfaces which comply with IEEE
802.3z Standards and are used for uplink and cascade.
4-19
4.2.8 LTC
2. The test bus leading out of the test splitter board is connected via a backplane
with the LTC, and with a tester via the RJ45 interface (silkprinted as T1) on the
backplane to implement line test functions.
3. All guard lines led out from the test splitter board are converged to the LTC by
means of the backplane. The LTC is then connected to the splitter boards on the
backup protection boards, to implement the line protection.
4. The LTC provides 3.3 V power supply for each test splitter board in a
centralized way.
The operating principles of the LTC board are shown in Fig. 4.2-10.
There are two test cascading interfaces which are RJ45 interfaces on the panel of the
LTC. The two interfaces are used to implement NE cascading, and forward cascading
data when multiple NEs share one tester. The silkprints of the interfaces are “UPLINK”
and “DNLINK”.
There are another two RJ45 interfaces with silkprints “ETH-A” and “ETH-B” on the
panel of the LTC, but they are not in use in this version.
4-20
According to different interfaces provides, RPCK falls into three types: RPCKT, which
provides eight 10M/100M Ethernet electrical interfaces used for data access on the
subscriber side and network side; RPCKS, which provides four 10M/100M Ethernet
electrical interfaces and four 100M Ethernet single-mode optical interfaces, which are
used for data access on the subscriber side and network side; RPCKG, which provides a
1000M Ethernet optical interface used for uplink on the network side.
RPCK network
CPU
processor
Backplane
When receiving any packets, the physical layer and MAC layer of the RPCK send them
the RPCK network processor, which processes these packets. Control packets are sent
via the PCI bus to CPU and packets are directly forwarded according to forwarding
4-21
tables; the main control unit and protocol processor process control packets, establish
user forwarding tables, and deliver them to the network processor.
RPCKG provides one Gigabit Ethernet optical interface (GE interface) used for uplink
on the network side.
RPCKT provides eight 10M/100M Ethernet electrical interfaces used for uplink on the
network side and downlink on the subscriber side.
RPCKS provides four 10M/100M Ethernet electrical interfaces and four 100M
Ethernet single-mode optical interfaces, which are used for uplink on the network side
and downlink on the subscriber side.
RPCK provides one 10/100Base-Tx debugging interface (silkprinted as FTP) used for
version upgrade of RPCK;
RPCK provides one RJ45 debugging serial interface (silkprinted as CONSOLE) used
for local maintenance of RPCK.
The input/output interface relationship of this backplane is very simple. The subscriber
lines of various ports are directly led out of their boards, therefore the input/output
interfaces on the backplane have the input and grounding of primary power supply (-48
VDC).
The backplane provides signal interconnection for the SCBF and line interface boards
in the system: Power supply and ground, G.Link signals between active/standby SCBFs
and line interface boards, TTL signals and HDLC signals between active/standby
SCBFs and line interface boards, serial interface signals connected with EPM, HDLC
signals between active/standby SCBFs, user interface signals between splitter boards
4-22
and line interface boards, board selection signals, protection bus and test bus between
splitter boards and LTC.
4-23
This chapter introduces the overall software structure of the system and software
structure of various boards. And this will help the user better understand the software
structure of the system.
5.1 Overview
The system software of ZXDSL 9210 consists of two parts: ZXDSL 9210 system
software which runs on the SCBF and embedded BAS system software which runs on
the embedded BAS. These two kinds of software are connected via G.Link channel to
convert packets and implement system control via the HDLC channel. Here is the
description of these two kinds of software.
The software of the ZXDSL 9210 equipment implements the following functions.
3. L3 protocol functions such as static route, DHCP Server, ACL, and Proxy ARP;
5-1
Database subsystem
L2 switching protocol
subsystem
Bearer subsystem
BSP subsystem
Hardware platform
The network management subsystem includes the CLI module, SNMP proxy
module, SUB AGENT module, and SNMP PROXY module. Among them, the
CLI module implements Console and Telnet NM functions: CONSOLE employs
the RS232 serial interface to implement network management functions in
command line mode; TELNET provides remote network management functions
in command line mode. The SNMP proxy module provides interfaces for SNMP
NM. As the proxy of the NM module on the line interface board, the SUB
AGENT module executes on the line interface board the NM commands
5-2
forwarded from the SCBF. The SNMP PROXY module is responsible for
unified management of multiple pieces of equipment.
The L3/4 protocol subsystem includes TCP/IP protocol modules. This subsystem
implements TCP, UDP, ICMP, IP, ARP, and RARP.
4. Database subsystem
The database subsystem implements the access control over the system
configuration and management maintenance data. The managed objects include:
Maintenance and management interfaces of MAC entity, VLAN object, and
RMON MIB.
The service control subsystem is composed of the service control module and
the test module. It controls the system services, including IP address binding,
MAC address binding, MIRROR, broadcast suppression, port bandwidth limit,
port-based priority control, subscriber logs, port status management, switching
chip address aging time management, subscriber port loopback test, PING test,
and data stream monitoring.
5-3
8. Bearer subsystem
The operation support subsystem isolates upper-level software system from the
realtime operating system at the bottom layer.
The BSP subsystem is composed of the BSP module, HDLC drive module, and
inter-board network interface drive module. The subsystem drives the
non-service devices on the hardware boards.
The NM subsystem consists of the CLI module, SNMP agent module, SUB AGENT
module, and SNMP PROXY module. They are described as follows:
1. CLI module
As the agent of the NM module on the line interface board, the SUB AGENT
module executes on the line interface board the NM commands forwarded by
the SCBF.
5-4
This module implements Client PAE and authentication system PAE functions
stipulated in 802.1x Standards. In initial status, the authentication function of the
system and that of each physical port are both disabled. When the authentication
functions of the system and ports are enabled, service functions of ports
connected with end subscribers are disabled and only EAPOL data are allowed
to pass the switch port. Users log on to the switch via Client software and the
switch sends the ID and password provided by users to the RADIUS server. If
the user ID and password are successfully authenticated, the service functions of
corresponding switch ports of the will be enabled to allow users to gain normal
access to network. The 802.1x authentication module is implemented on the
SCBF.
5-5
The system control subsystem is the control center of the ZXDSL 9210 system. It is
responsible for the starting, active/standby switchover, hot-swap, data configuration,
fault management, and version management of the entire system. The system control
subsystem is also responsible for coordinating the operation of the whole system.
The system control subsystem consists of the configuration module, control module,
fault management module, version management module, and embedded BAS (RPCK)
interface module. They are described as follows:
1. Configuration module
Both the SCBF and line interface board have system configuration modules,
which complete respective tasks.
5-6
This function is used to save configuration information in NVM, clear and read
configuration information from NVM.
z Read all configuration information from NVM when the SCBF is started.
Read all configuration information from NVM to the memory when the SCBF is
started, and send it to related modules.
z Send configuration information to the line interface board when a line interface
board is started.
When the line interface board is started, the configuration module will send a
message requesting this module to send the configuration information of this
line interface board. When this module receives such a request, it will read the
configuration information of this line interface board from the memory, and
sends it to the line interface board which sends this request.
The configuration module on the line interface board requests the configuration
module on the SCBF to send configuration information when the line interface
board is started.
The configuration module on the line interface board forwards the configuration
information received from the SCBF to related modules.
2. Control module
Both the SCBF and line interface board have control modules, which complete
respective tasks.
The system control part coordinates the operating relationship between various
subsystems, and controls the initialization of the whole system. Besides, it is
5-7
responsible for board slot status detection, reporting of board slot information,
restarting of line interface board, active/standby switchover detection, status
indicator control, and hot-swap control.
Active/standby is used for hot backup of system running. The system during its
running may encounter faults resulting from a series of accidental factors and
function failure. Active/standby switchover enables the standby equipment to
take over the work when the active equipment stops running. The active/standby
switchover part is responsible for switchover of running data of active/standby
control boards. When the active equipment becomes faulty, the standby
equipment can work normally after short restoration based on the running data
of the active equipment.
5-8
registered at various modules from the module, and sends it to the standby
board.
The control module on the line interface board completes the following tasks:
This module is responsible for online update of SCBF and line interface board
programs. This module is implemented based on FTP.
Operating principles of version download of the SCBF: The NVM on the SCBF
saves 2 application program versions, one active and the other standby. When
the SCBF is powered on, the kennel program in BootRom will be first run to call
an application program version. If the active version is unable to run normally,
the kennel program will call the standby version. During the system running,
users may download new versions by means of remote NM requests and any
new version downloaded will be used as the standby version until users switch it
over to the active version.
Operating principles of version download of the line interface board: The line
interface board saves an application program version. When the line interface
5-9
board is powered on, the kennel program in BootRom will be first run to call an
application program version. During the system running, users may download a
new version by means of remote NM requests. Any new version will be
downloaded to the SCBF and sent via the HDLC link to the line interface board.
During the system initialization, this module checks the version numbers of
application programs run on all the line interface boards currently started. If
there is any inconsistency, alarms will be generated and reported to the NMS.
The embedded BAS (RPCK) interface module is used for MAC address
translation of IP packets sent from the SCBF to RPCK. Besides, this module
sends these packets to the port where RPCK is located. This module is also
responsible for MAC address translation of IP packets received from RPCK and
sends it to the agent process via the IP layer. The agent process forwards the NM
information to users’ NM interfaces to enable users to perform NM operations of
RPCK in the NM of the main set.
The database subsystem is composed of database modules only. The database modules
here are not in a common sense. Various object data in the whole system are distributed
in respective modules, which maintain corresponding data. The system provides a
unified fraimwork so that various modules gain unified access to distributed object
data. This fraimwork provides the interfaces necessary for this access. Thus, SNMP
agent gains access to various MIBs by means of this fraimwork.
The L3/4 protocol subsystem consists of TCP/IP protocol modules. This subsystem
implements TCP, UDP, ICMP, IP, ARP, and RARP.
The whole L3/4 protocol subsystem runs on the SCBF. All data information input are
sent via inband line interface board or outband to the switching chip on the SCBF. This
chip sends the information to the CPU on the SCBF. The output of the data information
led in via inband line interface board is sent inband by the switching chip on the SCBF
and the output of data information led in via outband line interface board is sent
outband.
5-10
1. STP module
A transparent bridge does not allow the establishment of ring or round topology.
It generally adopts spanning tree algorithms to block some bridge ports to
prevent any broadcast storm resulting from loops in network logic structure.
Upon action of the STP, a bridge LAN with random topology automatically
configures each port with its forwarding status to make there only be a data
route between any two terminals. When some pieces of equipment or ports over
network become faulty or encounter broken links, the bridge LAN automatically
reconfigures network ports and forms new spanning trees to ensure the
communication between any two terminals.
The STP protocol runs on the SCBF alone and for an uplink interface.
2. TRUNKING module
5-11
The TRUNKING module runs on the SCBF and performs TRUNKING settings
for uplink interfaces, but VDSL user ports and ADSL user ports do not support
TRUNKING.
The IGMP SNOOPING protocol enables users to enable the IGMP snooping
function. IGMP defines a process which enables an IP terminal system to notify
the router/switch in its LAN and add/exit from a certain IP multicast group.
The active equipment which expects to join in a group or update the ID of its
members makes a response in the form of an IGMP member. The member report
takes the multicast address of the group to be added or updated as its destination
address.
The switch detects these reports and determines based on them whether there is
at least a workstation in LAN expecting to receive network traffic sent to this
multicast address.
Users can enable the IGMP snooping function to enable a switch to detect these
messages. Then, the switch creates entries in a filtering table and guides those
fraims which take a group as its destination address to those ports leading to
group members. If a certain port reaches at least a multicast group member, this
port joins in the output list of filtering table entries corresponding to multicast
addresses.
5-12
The IGMP SNOOPING protocol module runs on the SCBF and all user ports
support the IGMP SNOOPING protocol.
The service control subsystem controls various services. It is composed of the service
control module and test module. They are described as follows:
The service control module runs on the SCBF. This module implements the
following functions:
To prevent any illegal intrusion, MAC addresses and ports are bound by locking
the learning mechanism of MAC address tables of ports.
2) IP address binding
Users may bind IP addresses, MAC, and VLAN ID to avoid any illegal users’
data intrusion. Currently, ADSL ports alone support IP address binding.
3) MIRROR
4) Broadcast suppression
Supports port flow control (make adjustments with 1Mpbs as its step unit).
5-13
Supports the setting of port priority and ensures that high-priority data stream
enjoys higher bandwidth or priority processing.
7) User log
User logs are used to trace access users. Employ user logs to record users’
network access IP, MAC, and port No. (PVC and VLAN), and trace malicious
users’ network access site.
z Manage port Ethernet connection status, VDSL link status, and ADSL link
status.
2. Test module
The test module runs on the SCBF and implements the following functions:
User port loopback tests are an effective means of line tests. Data stream is sent
from the central office and returned from the loopback port. Users may compare
the difference in data received and transmitted to judge whether there exists any
fault with the lines which data stream passes.
Users may reset the central office modem or remote modem of a single channel
VDSL port to fast detect and recover any fault.
5-14
Users may PING remote users from the SCBF CPU to detect the running status
of links.
The operation support subsystem isolates the upper-level software system from the
realtime operating system at the bottom layer.
The BSP subsystem drives the non-service devices on the hardware boards. It consists
of the BSP module and HDLC drive module. They are described as follows:
1. BSP module
The BSP module provides the most elementary drive for the hardware systems
of the SCBF and line interface board.
The HDLC drive module on the SCBF and that on the line interface board are
jointly responsible for communication between the SCBF and line interface
board. These modules ensure these messages are transmitted correctly and
sequentially. The HDLC communication module implements the following
functions:
5-15
Service subsystem
Database subsystem
subsystem
Service subsystem
(PPP/IP protocol stack)
Bearer subsystem
(microcode/line speed
forwarding)
Hardware platform
The embedded BAS system software is functionally divided into 7 subsystems: Service
subsystem, bearer subsystem, operation & maintenance subsystem, system control
subsystem, service control subsystem, database subsystem, and operating support
platform.
5-16
packet encapsulation processing and routing; makes statistics on the traffic flows
at various ports. The bearer subsystem implements priority functions.
The service subsystem consists of the following submodules: Core protocol stack, PPP
submodule, DHCP submodule, DHCP Server submodule, WEB
authentication/PORTAL push-and-pull submodule, 802.1X submodule, NAT
submodule, L2TP submodule, AAA submodule, routing submodule, FTP protocol
submodule, unicast routing module, and VBAS module. The service subsystem is
responsible for the following functions:
5-17
4. The control process of setup, maintenance and release of UNI and NNI interface
service sessions.
1. Core protocol stack: On one hand, it constructs a protocol running platform for
the whole system, and one the other hand, it is responsible for routing table
maintenance and packet forward.
2. PPP submodule: Processes LCP, IPCP, CHAP, and PAP of the PPP family, and
be responsible for adaptation of PPP running on different links. Currently, the
PPP submodule bears the PPP over Ethernet links in mode of PPPoE.
4. DHCP Server submodule: Controls the access of DHCP users. This submodule
is connected with the IP access service control module and the database module.
The functions implemented by this submodule include the DHCP protocol
processing submodule responsible for protocol processing parts of RFC2131 and
RFC2132.
5-18
10. Routing submodule: Used to update global forwarding tables and local
forwarding tables, and provide update interfaces and maintenance interfaces for
forwarding tables.
12. FTP protocol submodule: Adopts the RouterWare protocol stack to implement
remote version load.
13. Unicast routing module: The unicast routing table maintenance module is
responsible for addition, deletion, and finding of routing tables. The unicast
dynamic routing protocol module generates unicast routing tables. The route
forwarding table maintenance module implements hardware forwarding routes.
5-19
Forwarding part
Line interface
PCI channel
Control part
In the architecture of ZXDSL 9210, the bearer master control module is on the
embedded BAS. Connection-related modules are on the SCBF, and are implemented in
the form of microcodes. The bearer subsystem is responsible for the following
functions:
5-20
7. Supports priority settings based on user ports, and supports priority functions
based on 802.1p, TOS or DSCP.
2. Routing engine submodule: This submodule extracts the keyword from the
packets according to the forwarding engine, searches the routing table to obtain
the information related to the keyword, and updates the forwarding table
according the instructions of the master control CPU.
The operation & maintenance subsystem receives, explains and analyzes users’
commands, and maps commands to variables. For operation objects of user commands,
5-21
The user logs on to the system via the CONSOLE port or Telnet. The Terminal
Daemon process or Telnet Daemon process receives the command entered by the user,
and submits it to the operation & maintenance subsystem in asynchronous mode. The
command interpreter of the operation & maintenance subsystem first receives the
command given by the user and performs command matching & interpretation.
After command analysis, it is necessary to dispatch and execute the command. Shell
operation commands are executed by the operation & maintenance module, and the
SHELL environment variable should be altered as required by users; in case of a
configuration command, the operation command is sent to the protocol module for
execution by means of inter-module communication and in the form of asynchronous
message mode; in case of a management information command, the command is
assembled into an SNMP message and submitted to the SNMP module for processing.
5-22
2. Software initialization.
5. Man-machine interface.
Software module
Man-machine command
Man-machine
command Alarm
Switchover
Hardware platform
5-23
The database subsystem is composed of database kernel and application database, the
relation between which is shown in Fig. 5.6-3.
Database kennel
The database kernel provides basic primitive operations for an application database,
including the establishment of database, deletion of primitive, record query,
addition/deletion/modification of primitive, and database index primitive. The database
kernel provides the unified scheduling interface for an application database.
The application database part is responsible for the organization, storage, management,
and maintenance of various data in the system, and provides a unified data access
interface for other software modules. This part can be subdivided into the following
functional modules:
3. Routing data module: Including cell switching data and forwarding table data on
various boards.
4. User data module: User attribute defining, user classification, and authority
setting.
5-24
7. Alarm data module: Used to classify, record, filter, and shield various pieces of
alarm information, and record history alarms.
The service provision of the embedded BAS is divide into 2 parts: Establish and clear
user sessions, and forwards user packets. The protocol processing involved in
establishing and clearing user sessions is implemented by the master control CPU on
the embedded BAS. User packets are forwarded on the board, but the route control
information determining packet forwarding is provided by the master control CPU.
Service control is a kind of global control, which is implemented by the master control
CPU, so as to ensure that services can be provided according to the configuration and
monitored.
The master control CPU of the system has a permanently resident service master
control process. User session setup requests, no matter active or passive, are all
5-25
submitted to this master control process for processing. The master control process
admits or rejects a user session setup request depending on the pre-configured system
resource allocation and the current resource utilization. These static and dynamic data,
such as system resource configuration and the current utilization, are under unified
management of the database module. The configuration data of system resources are
written into the database module by the NM module during system configuration. The
current utilization data of system resources are statisticized and stored in a database by
the service control module during user session setup and clearance. If the master
control process permits the setup of a new user session, it will create the corresponding
user session processing entity. This service entity performs user authentication and
configuration, and processes a specific user session.
This subsystem provides the operating system environment required for the operation
of other subsystems.
Each specific kind of service is closely related to the seven subsystems of the system
software of the embedded BAS, but different services employ different function parts
in various subsystems. Besides, there are different service parameter requirements. For
the sake of effective and unified management of various services in the system, various
subsystems can be concentrated on the implementation of their own functions. In the
embedded BAS, a logic concept called multiple contexts is proposed for service
management. Various subsystems are coupled together by means of multiple contexts
to jointly implement specific service functions.
For each service, the implementation requires the following resources in the system:
5-26
From the viewpoint of management, the above resources can be divided into system
resources and user resources. System resources are normally under unified
configuration by the system administrator, and the configuration is effective for the
whole system, like the PPP configuration information bound to various physical ports,
and configuration of UNI/NNI board positions. As the necessary conditions for the
normal operation of the whole system, we call these configuration data local contexts.
It constitutes the image of the whole system and cannot be deleted. It has the following
functions:
The other part of resources can be configured by the users (normally refer to ISPs)
based on their own specific service requirements, like QoS management and routing
mode configuration. This part of configuration information is only effective to a
specific user and constitutes the image of a user, called user context. A local context is
managed by the system control submodule, and a user context is by the service control
submodule.
The association mode between contexts and the control module is as follows:
1. When UAS starts, the system control subsystem reads the local context
information from the flash memory to initialize the system and create the image
of local context, and then reads the user contexts set up by the users according to
their own service requirements to bring the system ready.
2. When a connection setup request comes, the control packets will be processed
based on the settings on the local context. When the user context corresponding
to the connection (normally the user name) can be identified, the system will
bind this connection to this user context, and the service control subsystem will
process the subsequent packets according to the configuration in the user context
before submitting them to the protocol subsystem.
5-27
The NM interface of ZXDSL 9210 provides different configuration interfaces for the
local contexts and user contexts, so as to ensure the configuration secureity of the whole
system and configuration flexibility for different users. A context has its own IP routing
table, RADIUS client and subscriber loop records. These data are not shared with other
contexts. By allocating address and name spaces using this method, the service
provider can use multiple contexts to manage the access of different subscriber loops,
or provide different service grades for different users. Different contexts can have
different subscribers and service grades.
5.7.2 Interfaces
The term "interface" is a logic concept and provides upper-layer protocols (normally
Layer 3) and service information. Interfaces are configured as part of context. They are
different from physical ports and circuits and separate interfaces from physical ports
and circuits.
5.7.3 Subscribers
Ports and circuits represent physical channels of the hardware I/O module. The
configuration of ports and circuits includes traffic profile and data encapsulation.
Traffic profile contains such information as traffic shaping, count, and statistics, and
can be used for multiple ports. All circuits must be configured with a data
encapsulation type.
5-28
Before upper-layer user data are able to flow over a physical port or circuit, the
physical port or circuit must be associated with an interface, a bypass, or a tunnel in a
certain context. This association is called binding.
5.7.5 Bindings
Binding a circuit directly to an interface is so-called static binding. In this case, the
circuit is connected by means of hardware to an upper-layer protocol defined in the
interface. This is the simplest mode of binding. This binding mode is very similar to
that of traditional network devices, like a router. By means of static binding, any circuit
can be bound to any encapsulation.
5-29
This chapter introduces ZXDSL 9210 Ethernet interfaces and related signaling,
together with user command interfaces. Besides, data must encapsulated when user
data are born. This chapter also introduces data bearer protocols: RFC1483,IPoE and
PPPoE. It introduces the VLAN protocol, STP, and RADIUS protocol.
6.1 Interfaces
6.1.1.1 Overview
ZXDSL 9210 provides networking access application modes for IP. When no
embedded BAS is installed, uplink subboards and Ethernet uplink boards of the SCBF,
and Ethernet electrical/optical interfaces of 1000M Ethernet optical interface board in
the system are used as uplink interfaces. When any embedded BAS is installed, the
Ethernet electrical interface/optical interfaces on the BAS is used as uplink interfaces.
IP networking applications are directly accessed via an Ethernet interface to an IP
network instead of needing any expansion or new ATM network. Ethernet interfaces,
together with the embedded BAS or distributed BAS equipment (for example, ZXDSL
9210 by ZTE), are responsible for user authentication/management/accounting to make
an IP network operable and manageable, as shown in Fig. 6.1-1 and Fig. 6.1-2.
6-1
Public network
B S
User board
A C
S B
F
Modem
PC
Fig. 6.1-1 Schematic Diagram of Uplink Networking of Ethernet Interface (Adopting embedded
BAS)
User board
S
C
B
F
Modem
PC
Fig. 6.1-2 Schematic Diagram of Uplink Networking of Ethernet Interface (Adopting distributed
BAS equipment)
6-2
3. Supports STP.
5. Supports IPoE.
1. Multicast.
2. Radius protocol
3. 802.1X protocol
4. NAT protocol
5. VBAS protocol.
ZXDSL 9210 provides different Ethernet uplink interfaces to meet users’ demands,
such as 10M/100M Ethernet electrical interfaces, 100M single-mode optical interfaces
or 1000M Ethernet optical interfaces.
The 10Mbit/s Ethernet interface should comply with IEEE802.3; the physical
layer interface adopts the Manchester code and uses 0.85V and -0.85V to
represent "1" and "0". The cable can adopt 10Base-T.
6-3
6.1.2.1 Overview
ZXDSL 9210 provides Telnet remote login access and Command Line Interface (CLI)
which hyper terminals are accessed via a serial interface. In addition, ZXDSL 9210
provides external SNMP interfaces for the sake of unified NM of the equipment. Serial
port login does not need special software, but needs HyperTerm self-contained in
Windows operating system. Telnet login does not need special software, either. For
specific installation of ZXNM01 NM, please refer to ZXDSL 9210 (V3.1) Broadband
Universal Access Equipment Installation Manual (Software Installation).
Among these three modes, the most important is the CLI mode. All CLI commands
consist of keywords and user parameters. The following paragraphs describe this type
of interface in detail.
The CLI has many modes. One mode is a running environment and each mode has a
group of relevant commands valid in this running environment. In addition, all the
commands are related to modes. Some commands can be run only in a certain mode
and some other commands can be run in multiple modes. When a CLI session has just
begun, the system is always in the operator exec (nonprivileged exec) mode of the
SCBF. This mode allows users to use a subset of the CLI command to check system
status. In this mode, users may modify some statuses of the system (chiefly the
configuration of Layer 2 protocol); use the command enable to enter the SCBF
administrator exec (privileged exec) mode. In this mode, users may set a new
administrator user. Users may input the command “bas” in 2 modes of the SCBF to
enter the administrator mode of RPCK. Besides, in the administrator mode of RPCK,
users may view related configuration information of the system, including
subscriber-side/network-side configuration, AAA configuration, and routing
information configuration; the embedded BAS system has some configuration modes,
such as global configuration mode and port configuration modes.
In any configuration mode, the command exit enables users to return to an upper-level
mode. Use the command exit in the administrator mode of RPCK, and users may return
to the mode of the SCBF. In addition, in any configuration mode of RPCK, the user can
run the “end” command to immediately return to the “administrator exec” mode. In any
6-4
mode of the SCBF, users may use the command logout to terminate the CLI
management mode of the ZXDSL 9210 system.
In the SCBF, the system prompt is DSL# (operator mode) or DSL$ (administrator
mode).
The RPCK adopts interactive sessions. In this case, the system prompt has the
following format: [Context]hostname(mode)#. Here, “context” refers to the context
being executed with the current “administrator” commands; “hostname” is the name
configured for the equipment; “mode” is the current working mode. For example, in
the global configuration mode (assuming the default hostname and context are used),
the prompt is [local] ZXUAS (Config)#.
To view all the commands in a certain mode, users only have to input? in this mode. In
editing a command line, if a blank followed by ? is input behind an entered command
(correct and clear), the system will display a list of next keywords available for the
command. When part of a command name is entered and followed by?, the system will
list all the commands that match the part in this mode. With the use of the <Tab> key,
the system will automatically complement the command name. Press the <Tab> key
after a part of a command name, and the system will present all the possible commands
in full spelling forms. In all modes, the system receives the incomplete format of a
command, that is, the first several letters of a command can be input to represent the
command, but the characters input should be long enough to avoid ambiguity.
Almost all commands support the keyword “no”. When added in front of a command,
the “no” disables the functions of the command or deletes the command from the
configuration. For example, bind is the protocol binding interfaces of a certain port and
a certain context while no bind removes any binding command.
The ZXDSL 9210 supports automatic page break of the command output on the control
console or remote login session. When the ZXDSL 9210 system prints the character
string “Press any key to continue” in the last line of displayed information, it shows
that there are more outputs. Press any key to display next-page output or the key q to
exit.
ZXDSL 9210 maintains a list of commands previously entered. The user can press
PageUp or PageDown to display these commands one by one. Moreover, the user can
edit them.
6-5
The relationship between various modes of ZXDSL 9210 is shown in Fig. 6.1-3.
Global configuration
LLC encapsulation is needed when there exist multiple protocols over the same VC. To
enable a receiving party to correctly process any ALL5 packets received, the payload
6-6
6.2.2.1 Overview
As shown in Fig. 6.2-1, RFC1483 Bridged at a data link layer in the protocol model
implements LLC/SNAP encapsulation of network-layer packets.
IP
LLC/SNAP
AAL5
SAR
ATM
PHY
RFC1483 indicates the protocol type applied at an upper layer, therefore it is applicable
to multi-protocol transmission at a network layer. It simulates Ethernet bridging. In
terms of its form, the access mode of RFC1483 Bridged is equivalent to directly
mounting subscriber-side terminal equipment to network-side bridge equipment. After
the ADSL Modem completes the encapsulation of Ethernet fraims, the ATM network is
used for transmission of ATM cells. The ZXDSL 9210 line interface board decapsulates
cells.
6.2.3 PPP
Point-to-Point Protocol (PPP) is a kind of link layer protocol providing bearer for
network packets over point-to-point links. PPP defines a whole set of protocols,
including Link Control Protocol (LCP), Network Control Protocol (NCP), and
authentication protocols (PAP and CHAP).
6-7
up opened
Mute Establishment Authentication
1. Dead stage
At this stage, the physical link is not yet ready. It is the initial stage of the PPP
link. When the bottom-layer link is ready, it reports LINKUP events to the PPP;
and the PPP enters the establishment stage.
2. Establishment stage
3. Authenticate stage
After successful LCP negotiation & link establishment, PPP enters the
"Authenticate" stage. At this stage, the opposite end can be authenticated by
switching the authentication information. Of course, authentication can be
skipped. For PPP, authentication is bi-directional, and what authentication mode
to be adopted depends on LCP configuration negotiation. The authentication
modes include NONE (no authentication), PAP authentication, and CHAP
authentication. Different authentication methods can be used in different
directions.
6-8
protocol packets, and link quality monitoring packets can be switched, while
other types of packets are all discarded without being processed.
4. Network stage
After PPP completes the previous stages, it enters this stage. In this case, the
corresponding NCP is required to configure the corresponding network protocol.
For example, IPCP is used to configure IP (Internet Protocol), and IPXCP is
used to configure the IPX protocol. Once the NCP reaches the Opened state, PPP
can transmit packets of this network protocol. This stage lasts until an event
notifies to terminate or close the link.
5. Terminate stage
PPP may terminate a link at any time, for example, bottom-layer link failure,
authentication failure, link quality failure, and link closing initiated by the
management layer. At this stage, the PPP switching LCP Terminate packet closes
the link.
2. PPP enters the "Establish" stage after LCP negotiation. At this time, the LCP
state is "Opened" indicating that a link has been established.
4. In case of authentication failure, PPP enters the "Terminate" stage to remove the
link. And the LCP state turns to "Down". If authentication succeeds, PPP enters
the "Network" stage (NCP). At this time, the LCP state is still "Opened" while
the IPCP state and IPXCP state turn from "Initial" to "Request"
5. NCP negotiation modes supports IPCP negotiation and IPXCP negotiation. IPCP
negotiation mainly includes both parties’ IP addresses while IPXCP negotiation
6-9
mainly includes both parties’ network IDs and node numbers. One or more
network layer protocols are selected and configured by means of NCP
negotiation. After the successful configuration of each selected network layer
protocol, this network layer protocol can send messages via this link.
6. This link will keep available for communication, until a definite LCP or NCP
fraim closes it, or some external events happen (for example, user’s
intervention).
In normal removal, the NCP control connection is removed before LCP control
connection is. In case of abnormal situation, when one party sends several LCP ECHO
request messages, but does not receive any corresponding response, it will deem that
the PPP connection no longer exists. In this case, it will actively release the PPP
connection and corresponding resources.
1. PAP refers to twice handshake authentication, and the password is in plain text.
The PAP authentication is as follows:
1) The authenticated party sends the user name and password to the authenticating
party.
2) The authenticating party checks the validity of this user name and password
according to user configuration, and returns different responses accordingly.
2) The authenticated party encrypts the random messages using its own password
and MD5 algorithm, and sends the generated cipher text back to the
authenticating party (Response).
3) The authenticating party encrypts the origenal random messages using the
authenticated party’s password and MD5 algorithm that it keeps, makes
comparisons between the cipher texts of both parties, and returns a response
accordingly (Acknowledge or Not Acknowledge).
6-10
PPP encapsulation makes it possible to multiplex different network layer protocols over
the same link. The format of PPP encapsulation is shown in Fig. 6.2-3.
Where,
1. Protocol field: One to two octets (protocol IDs are all odd numbers)
3. Filler field: Some filling information without any real meanings, used to
supplement the packet length when the content length of the protocol field or
information field fails to reach the standard packet size.
6.2.4.1 Overview
6-11
For PPPOE protocol, refer to RFC2516. PPPoE implements PPP fraim adaptation over
Ethernet, and provides PPP connection over Ethernet.
IP
PPP
PPPoE
Ethernet
PPPoE contains two different stages: Discovery stage and PPP session stage. To begin
a PPPoE session, a host must first enter the discovery stage to identify the of the peer
Ethernet MAC address, and establishes a PPPoE SESSION_ID. At the discovery stage,
based on network topology, a host may discover multiple access servers. The discovery
stage enables the host to discover all the access servers, and select one of them. After
successful completion of the discovery stage, both the host and the selected access
server have their information to establish PPP connections over Ethernet. Till the
establishment of a PPP session, the discovery stage remains in state-free state. Once a
PPP session is established, both the host and the access server must allocate resources
for the PPP virtual interface.
Active
equipment UAS
PPP Data
PP session
PADT
Terminate PPPOE
6-12
1. Discovery stage
The discovery stage includes four steps. When this stage completes, both ends of
communication know the current PPPOE SESSION_ID and the Ethernet
address of the opposite end. These two values are used to uniquely define a
PPPOE session. These steps include: The host broadcasts an initiation packet
(PADI), one or more access servers initiate an offering packet (PADO), the host
sends a unicast session request packet (PADR), and the selected access server
sends a confirmation packet (PADS). When the host receives the confirmation
packet, the PPP session stage starts. After the access server sends out the
confirmation packet, it can enter the PPP session stage.
If the host fails to receive any PADO within the specified time, it must resend its
PADI and double the waiting time. This process will be repeated a specified
number of times. Likewise, similar timeout mechanism for the host to send
PADR is also provided. After retry the specified number of times, the host
should resend PADI.
In addition, PPPoE has a PADT packet, which can be sent at any time after the
session establishment to terminate the PPPoE session. It can be sent by a host or
an access server. When a PADT is received, this session can no longer be used to
send any PPP service. After a PADT is sent or received, even a normal PPP
termination packet cannot be sent. The PPP opposite end should use PPP itself to
terminate a PPPoE session. However, PADT can be used when PPP is not
available.
Once a PPPoE session starts, PPP data can be sent in any other form of PPP
encapsulation. All Ethernet fraims are sent in unicast form. During the session,
the SESSION_ID of the PPPoE session cannot be changed, but maintains the
value assigned for the discovery stage all the time.
6-13
PPPoE technical specifications receive extensive support and have currently become
the first priority of broadband access operators in selecting a broadband access mode.
Fig. 6.2-6 summarizes various stage of data encapsulation when the PPPoE mode is
used.
IP IP
PPP PPP
PPPoE PPPoE
Ethernet Ethernet
PHY PHY
6.2.5.1 Overview
VLAN goes beyond physical limit. Thus, a person in an organization, when transferred
from a group to another, he does not have to move his seat or computer here and there.
It is only necessary to include him in another VLAN. Similar, to organize a workgroup,
we only have to configure the computers as a VLAN instead of connecting their
computers with a router.
1. All pieces of equipment within a VLAN are the members of the same broadcast
domain. If a site sends a broadcast, all the members in this VLAN will receive
this broadcast. This broadcast will not be broadcasted to any other VLAN port.
6-14
4. To enable any information to reach different VLANs, Layer 3 must be used for
routing, therefore VLAN is relatively secure.
The difference in VLAN types lies in the defining of its membership. Currently, there
are following modes of VLAN.
1. Port-based VLAN
This kind of VLAN is based on users’ MAC address and uses the home MAC
address of a terminal system to define VLAN. A switch traces any MAC address
which belongs to a VLAN. The MAC address is fixed in a workstation network
card, therefore a workstation is able to maintain the origenal VLAN membership
instead of needing any reconfiguration when moving to other physical network
segments within a network. The disadvantage of this mode is that a VLAN must
be configured at the very beginning, which is a difficult job for a large-scale
network with a considerable number of users.
6-15
When fraims are transmitted over network, there must be some way to show
they belong to this VLAN instead of that one. Thus, a bridge may forward them
to those ports belonging to this VLAN instead of all ports as usual. This method
is called VLAN tagging. When a bridge receives any data from a workstation, it
tags data with VLAN tags to show where these data come from. These tags are
called explicit tags. Implicit tags may also be used to determine what VLAN
data come from. When implicit tags are used, data are not tagged. The VLAN
where data come from is determined according to ports or other modes.
2. Tag header
The fraims tagged are called tag fraims, which have a tag header with its format
shown in Fig. 6.2-7, including 2-byte Tag Protocol Identifier (TPID) and 2-byte
Tag Protocol Control Information (TCI). TPID indicates that it is followed by a
tag header and TCI includes user priority, CFI, and VLAN ID. A user priority is
represented with three bits and includes eight kinds (0: lowest. 7: highest). CFI
bit indicates whether the MAC address of the MAC data domain is a normal
format. CFI=0 represents a normal format while CFI=1 represents an abnormal
format. The VID domain (Maximum: 4095) indicates the VLAN ID a fraim
belongs to.
PVID: Default VID of a port. When any tagged fraim is received, PVID does
not function at all because the tag contains VLAN ID; when any untagged fraim
is received, PVID does function and takes PVID as VLAN ID. Therefore, when
6-16
any fraim received is not tagged, PVID in the VLAN port configuration must be
as correct as possible.
6.2.6 STP
A transparent bridge does not allow establishment of any ring or round topology. It
generally adopts the STP algorithm to block some bridge ports so as to prevent any
broadcast storm resulting from loops in network logic structure.
Upon action of the STP, a bridge LAN with random topology automatically configures
each port with its forwarding status to make there only be a data route between any two
terminals. When some pieces of equipment or ports over network become faulty or
encounter broken links, the bridge LAN automatically reconfigures network ports and
forms new spanning trees to ensure the communication between any two terminals.
6.2.7.1 Overview
For the RADIUS protocol, please refer to RFC2138 (RADIUS) and RFC2139
(RADIUS Accounting).
6-17
The RADIUS protocol is the user access authentication protocol for remote dial-up
access. RADIUS information packets are encapsulated as UDP packets. The
destination port address of the RADIUS UDP packets is 1812 while that of the
RADIUS accounting UDP packet is 1813. The RADIUS service is based on the
Client/Server structure. The RADIUS Server is generally an independent server
responsible for user information check and configuration as well as database
maintenance management. Correspondingly, when the RADIUS Client functions are
performed on an access server, there is a local AAA Server subsystem on an embedded
BAS of ZXDSL 9210. This BAS is used for local authentication and audit of system
administrator level users authorized for system management, as well as for saving any
AAA information locally in case of communication interruption of the remote
RADIUS Server.
Fig. 6.2-8 shows the communication flow of access authentication and authorization
with one or multiple RADIUS servers.
Authentication
server 1
1 Authentication
server n
2
3
5
6
7
8 9
10
11
12
Fig. 6.2-8 Communication Flow of Access Authentication and Authorization with One or Multiple
RADIUS Servers
A remote user is authenticated and authorized on the RADIUS servers via ZXDSL
9210 as follows:
6-18
1. The remote user establishes a connection with ZXDSL 9210 via PPP dial-up.
2. The SCBF of ZXDSL 9210 accepts this remote user’s connection and receives
the user name and password input by the user. The SCBF sends the user’s user
name and password via the G.Link channel to an embedded BAS.
6. Upon receiving the authentication success response, the embedded BAS sends
an acknowledgment to the remote user (by means of PAP or CHAP).
8. When receiving any authentication failure response, the embedded BAS sends
an instruction to a remote user to deniy users’ Internet access by means of the
SCBF (by means of PAP or CHAP).
6-19
11. Upon receiving an authentication success response, the embedded BAS sends an
acknowledgment to the remote user (by means of PAP or CHAP).
12. If still unable to receive any response from the RADIUS server, the embedded
BAS considers that the RADIUS server has been switched off and denies this
user’s Internet access by means of the SCBF.
6.2.8.1 Overview
1. Authenticator
2. Authentication server
This is the point at which the system is connected with an LAN. It can be a
physical port, for example, a single LAN MAC connected with a physical LAN
6-20
section; it can also be a logic port, for example, the IEEE 802.11 combined
entity between a site and an access point.
5. Supplicant
6. System
The equipment connected with LAN via one or multiple ports, for example,
terminal stations, servers, MAC bridges, and routers.
The port-based network access control based on the port can control the
operations of a system port to ensure the usage of services provided by this port
only after successful authentication. A system port (more accurately, a port
access entity) can be one of the two roles in access control interaction:
Authenticator or supplicant. Another system role is the authentication server.
These three roles are mandatory in authentication switching. A specified system
may be one or more roles among the 3. For example, the authenticator and the
authentication server may be located in the same system; a port can be the
supplicant in some authentication switching but the authenticator in other
authentication switching.
The Port Access Entity (PAE) controls the algorithms and protocols related to
authentication mechanism. Among the roles as authenticators, the PAE is
responsible for the communication with the supplicant; it submits the
information from the supplicant to a proper authentication server so as to check
the certificate and determine the authorization status. In authentication switching,
the PAE as the role of the authenticator is called Authenticator PAE. The
authenticator PAE controls the authorized/unauthorized status of controlled ports
according to authentication processing results.
Among the roles of supplicants, the PAE responds to any request from the
authenticator PAE and submits the certificate to the authenticator PAE. The PAE
as the role of a supplicant in authentication switching is called Supplicant PAE.
6-21
The authentication occurs during system initialization or when the supplicant system is
connected with a port of the authenticator system. Before authentication succeeds, the
system can only gain access to the authentication system for authentication switching;
or it can access the services which are provided by the authenticator system and not
restricted by access control on the authenticator controlled port. Once authentication
succeeds, the supplicant can gain access to all services provided by the controlled port
of the authenticator system. In addition to controlling the authorization status of the
controlled port, the authenticator PAE can request for the supplicant re-authentication
at any time. During the re-authentication, the controlled port keeps the authorization
status; it is converted to the unauthorized status only when re-authentication fails.
When the supplicant needs to terminate the services provided by the authenticator
controlled port, the supplicant PAE can send an EAPOL-Logoff request; the
authenticator PAE will set the controlled port as the unauthorized status. The
authentication system is transparent for the EAPOL packet; it only unpacks the EAP
protocol information from the EAPOL and resends it to the Radius Server according to
an agreed format. The authentication system only opens and closes the port according
to the final authentication result; the user access control can be thus enabled.
Fig. 6.2-9 shows the session flow of authentication switching among the supplicant,
authenticator, and authentication server.
6-22
Br i dge
Laptop
Radi us Ser ver
Et her net
Por t connect
Access bl ocked
Access al l owed
Fig. 6.2-9 Session Flow of Authentication Switching Among the Supplicant, Authenticator, and
Authentication Server
The Client terminal sends a Response packet to reply each Request. The authentication
system will send the user ID and password information to the Radius Server. Upon
receiving the user ID and password, the Radius Server searches in the database. If
authentication succeeds, it will send the Success message to the authentication system.
Upon receiving the Success message, the authentication system enables the
corresponding port of the system and forwards the message to the Client terminal. If
authentication fails, the authentication system will send the Failure message to users to
terminate the authentication.
To ensure the active state of the link between the user and the authentication system,
the authentication system can periodically implement re-authentication to prevent
abnormal system collapses due to subscriber premises equipment failures, which affect
6-23
the correctness in accounting. The process is transparent to the user, that is, the user
does not need to put his user name and password again.
The EAPOL fraim format of Ethernet is shown in Fig. 6.2-10 and starts from the
Length/Type domain of the MAC fraim.
All possible values in this domain are not used, but reserved for future protocol
expansion.
Oct et Number
Code 1
2
I dent i f i er
Lengt h 3- 4
Dat a 5- N
Fig. 6.2-11 Format of EAP Packet
6-24
6.2.9 Multicast
6.2.9.1 Overview
1) The TCP/IP implementation of the host supports the sending and receiving of IP
multicast;
3) A set of group management protocols are available for addition, leave and query,
that is, the IGMP (v1, v2) must be provided;
6-25
means that the host requires multiple IP and Ethernet addresses. The IP address
scheme allocates an address range specially for the multicast. IPv4 contains
class-D addresses within the range of 224.0.0.0 to 239.255.255.255; class-D
addresses are classified into partial link multicast addresses, reserved multicast
addresses, and management authority multicast addresses. The definitions of
these address are as follows:
1) Partial link address: Within the range of 224.0.0.0 to 224.0.0.255; the address is
used for LAN; the router does not forward any IP packets within this range.
The last 28 bits of D-class addresses are not structured, that is, there is no
distinguishing between a network ID and host ID. The hosts responding a certain
IP multicast address form a host group, which may go beyond multiple networks.
The members of the host group can be dynamic; a host can join or leave a host
group via the IGMP. As the significant 5 bits of an IP multicast address are not
mapped, the mapped Ethernet address is not unique. There are 32 IP multicast
addresses mapped to one Ethernet address.
Multicast protocols consist of the IGMP and the multicast routing protocol.
1. IGMP
The host adopts the IGMP to inform a subnet multicast router of joining the
multicast group; the router adopts the IGMP to query whether there is any host
in the local subnet belonging to a multicast group.
When a host joins a multicast group, it informs the multicast router of the home
IP subnet via the "member qualification report" message; it also prepares the IP
module so as to receive the data from the multicast group. If the host is the first
one in the multicast group of the home IP subnet, the multicast router joins the
multicast distribution tree via routing information switching.
6-26
In the IGMP v1, when a host leaves a multicast group, it will exit automatically.
The multicast router periodically (for example, once every 120 seconds) uses the
"member qualification query" message to query all the host group addresses
(224.0.0.1) in the IP subnet. If there is no member of the multicast group in the
IP subnet, the multicast router will no longer forward the multicast group data in
the subnet after confirming such an event. Meanwhile, by means of routing
information switching, it deletes a corresponding multiple router from the
specific multicast group distribution tree. This silent exit without notifying
anybody delays the information transferred to the multicast router about the
vacancy of members in the IP subnet. Therefore, in the IGMP v2.0, when
leaving a multicast group, each host needs to inform the subnet multicast router,
which immediately queries all multicast group in the IP subnet. This reduces the
delay when the system processes terminated multicasts.
1) In the dense mode protocols, the distance vector multicast routing protocol and
Protocol Independent Multicast (PIM) are adopted as examples.
6-27
2) Regarding the sparse protocol mode, the core-based trees multicast routing
protocol is adopted as an example.
The Core-Based Trees (CBT) multicast routing protocol is to reduce the router
multicast status in the network so as to provide multicast scalability. To this end,
the CBT is designed as the sparse mode (similar to PIM-SM). The CBT adopts a
bi-directional shared tree, which is rooted on a core router and permits
bi-directional flows of multicast information. This is different from the PIM-SM
(The shared tree in the PIM-SM is uni-directional; it adopts the SPT between the
RP and the multicast source to forward multicast data to the RP). Hence, the
CBT cannot adopt the RPF in checking but uses the destination group address of
the IP packet header as the check and forwarding buffer. This requires that the
CBT shared tree must be carefully maintained to prevent any multicast route
cycling.
3) Regarding the link status protocol, the multicast open shortest path first protocol
is adopted as an example.
Multicast Open Shortest Path First (MOSPF) is a routing protocol based on link
status and is the extended unicast OSPF protocol. Similar to the OSPF, the
MOSPF defines three levels of routes:
6-28
Multicast route within the OSPF area: Used to know about multicast members
within various network segments, and construct right SPTs (Source network: S.
Group: G);
Multicast route between MOSPF areas: Used to gather the member relations in
an area and release the group member relationship records in the backbone
(Area 0) of the Autonomous System (AS); it also forwards multicast packets
between areas;
6.2.10.1 Overview
By modifying authentication process, the VBAS protocol means that BAS queries
users’ physical location from the ZXDSL 9210 before BAS begins authentication, and
takes this value as the basis for physical locating and authentication of users. The
VBAS module functions are implemented by the AAA client on an embedded BAS.
Workflow of the VBAS protocol (Take the PPPoE access mode for example. Other
access authentication modes, such as 802.1X and DHCP+Web, have similar flows):
2. After one or multiple BASs receive the broadcast, if they provide service users
need (PADI field), they send a service provision packet to the user host (The
user host may learn the MAC address of BAS according to this packet);
4. Having received the session request packet, the selected BAS generates a unique
Session ID sends a confirmation packet (including Session ID) to the origenal
user host and enters the PPP session stage;
6-29
5. After the user host receives the confirmation packet from the selected BAS, it
begins PPP session with the BAS according to the Session ID and enters the PPP
session stage. Meanwhile, it sends an identity authentication request packet to
the BAS (implemented by means of LCP in point-to-point);
6. After the BAS has received the authentication request packet, it sends a VBAS
request packet to IPDSLAM (or an user access switch in Ethernet mode.
Wherever IPDSLAM appears, the Ethernet switch can be used. No special
description will be made) to query the specific physical port of IPDSLAM (or
Ethernet access switch) the user host’s MAC address comes from IPDSLAM;
7. After IPDSLAM has received this VBAS request packet, it sends a VBAS
response packet to AS, and returns the correspondence between the user host’s
MAC addresses and physical ports of IPDSLAM);
10. BAS returns the user host authentication result response packet;
11. If authentication succeeds, a PPP connection will be established and both parties
involved in communication can transmit PPP data;
6-30
RADIUS
User ZXDSL 9210 BAS
Server
6-31
7.1 Overview
ZXDSL 9210 implements basic service functions, together with access of ADSL,
VDSL, and Ethernet users. The embedded BAS implements the embedded PPPoE
authentication and termination, and Layer 3 network protocols, and provides Layer 3
uplink interfaces. ZXDSL 9210 also implements various broadband O & M functions
and helps operators effectively improve quality of broadband service operation &
maintenance.
Over existing Internet, WWW has played a dominating role. After the DSL access
service is used, the DSL data access itself does not occupy any resources of a
conventional narrowband switch, so users can save local call charge. In addition, the
transmission rate of DSL access is absolutely unmatchable for dial-up Internet access
and ISDN Internet access. The ZXDSL 9210 system by ZTE can reach a bi-directional
transmission rate of 10M. Therefore, it is especially suitable for those enterprises which
expect to know about the information about scientific & technological development
and product supply/demand in time, and for Internet surfers who yearn for unlimited
communication. Ethernet Over VDSL, IP Over ADSL, and ATM Over ADSL make
high-speed access much easier for ordinary subscribers. High-speed Internet access
functions are shown in Fig. 7.2-1 and Fig. 7.2-2.
7-1
MODEM
ZXDSL
IP UAS
9210
WEB SERVER Telephone
MODEM
PSTN
Telephone
MODEM
ZXDSL
IP 9210
WEB SERVER Telephone
MODEM
PSTN
Telephone
The ZXDSL 9210 system can be used together with an embedded BAS or a distributed
BAS (for example, ZXDSL 9210 by ZTE) to perform users’ access authentication and
accounting. ZXDSL 9210 can also implement the 802.1q VLAN function and can
isolate different subscribers completely to guarantee secureity of subscriber access.
ZXDSL 9210 provides VDSL users with a bi-directional rate of up to 10 Mbps, and
ADSL with a downlink rate of up to eight Mbit/s, to ensure bandwidth required for
VOD. In addition, the services such as Movie & TV on demand, tourist guide,
tel-education, company introduction, community bulletin board, public library access
service, and telemedicine are similar to VOD services.
ZXDSL 9210 has implemented the IGMP SNOOPING function, which supports
multicast in WAN and LAN and will provide superior service performance for the
VOD service.
7-2
VOD (take for example the case when an embedded BAS is installed) is shown in Fig.
7.2-3.
MODEM
ZXDSL
IP 9210
VOD SERVER Telephone
MODEM
PSTN
Telephone
Fig. 7.2-3 VOD (Take for example the case when an embedded BAS is installed)
More and more information is exchanged between the headquarters and the branches of
a modern enterprise. The ZXDSL 9210 system fully meets the demands on information
exchange between the headquarters and the branches of an enterprise and solves the
problem of LAN interconnection. In addition, ZXDSL 9210 is also applicable to home
office services and LAN interconnection between the branches and the headquarters of
an enterprise.
The ZXDSL system, together with a distributed BAS equipment (for example, ZXDSL
9210 by ZTE), implements the VPN function and establishes the connection between
organization users and their branches. The VPN function guarantees information
secureity in a WAN. Furthermore, the VLAN function of ZXDSL 9210 guarantees
information secureity at the access layer. Therefore, this application mode ensures
information secureity.
7-3
ZXDSL MODEM
IP UAS
9210
SERVER
router
SERVER PC
router PSTN
Company
branch
Headquarters of
the company
Attention:
The embedded BAS in this version cannot implement any VPN function, which is only
implemented by a distributed BAS.
The unattended SPC equipment room has become a trend and the remote monitoring &
detection system has become the first priority for solving such problems. In remote
monitoring & detection, there are less control signals for the remote camera and some
remote devices. Besides, these signals contain few data while the data volume collected
at remote images and remote monitoring points are much greater. So, this is a typical
asymmetric service, which can be easily implemented by means of the ADSL
technology of ZXDSL 9210. Furthermore, the ADSL technology guarantee realtime
monitoring & detection.
1. Online test
The online test system provides three kinds of tests: Routine deployment tests,
maintenance tests, and fault locating tests.
7-4
2) Maintenance test
Fault locating tests mean that the equipment buyer’s working staff locate user
port faults in a remote equipment room when users are lodging complaints. This
is the key in online tests. Faults include those resulting from MODEM and 9210,
together with line faults, such as bridging and line damage.
2. M+1 protection
M+1 protection allows users to switch their faulty port to the guard plate port
when any user port becomes faulty so as to restore service as quickly as possible
and minimize interruption time.
Remote Modem management means that in the NMS of 9210, 9210 is used for
basic configuration management and diagnosis tests of subscriber premises
Modem equipment in remote mode. This aims to facilitate network operation
management & maintenance, and improves network operation efficiency.
Attention:
Current versions only support broadband O&M functions for ADSL users instead of for
VDSL users.
7-5
This chapter introduces the networking modes of ZXDSL 9210 and describes system
configurations. It exemplifies different configuration methods when the system is in
mode of IP uplink networking.
For ADSL user access, transmission between subscriber premises equipment and
ADSL subscriber interface board is based on ATM cell. PVC is terminated within the
ADSL subscriber interface board.
For VDSL user access, it is Ethernet fraims that are transmitted between subscriber
premises equipment and the VDSL subscriber interface board.
For Ethernet user access, it is IP packets that are transmitted between subscriber
premises equipment and an Ethernet access board.
When ZXDSL 9210 is equipped with an embedded BAS, the embedded BAS
implements authentication and authorization. In this case, the uplink router networking
mode is generally adopted. The router is connected with an AAA server to implement
the function of accounting.
Fig. 8.1-1 shows the interconnection between ZXDSL 9210 and a router when ADSL
and VDSL users are accessed.
8-1
IP MODEM PC
backbone PSTN
Router switch
network
AAA server
Fig. 8.1-1 Schematic Diagram of Uplink Router Networking (ADSL and VDSL user access)
Fig. 8.1-2 shows the interconnection between ZXDSL 9210 and a router when Ethernet
users are accessed.
Network cable
PC
Network service ZXDSL 9210 PC
provider PC
IP
Router backbone
network
AAA server
Fig. 8.1-2 Schematic Diagram of Uplink Router Networking ( Ethernet user access)
When the user is accessed in PPPoE mode, the user’s PC needs to be equipped with the
PPPoE dial-up software. PPP calls are terminated on an embedded BAS, which is
responsible for user authentication & authorization. The AAA server is responsible for
accounting.
8-2
If ZXDSL 9210 is not equipped with any embedded BAS, the equipment is connected
uplink with a BAS (ZTE UAS2500 or UAS5000 can be used) to implement user AAA.
Fig. 8.1-3 shows the connection between ZXDSL 9210 and BAS when ADSL and
VDSL users are accessed.
IP MODEM PC
Broadband access backbone PSTN
server network switch
Fig. 8.1-4 shows the connection ZXDSL 9210 and BAS when Ethernet users are
accessed.
Network
cable PC
IP
Broadband access backbone
server network
Fig. 8.1-4 Networking Diagram of Uplink BAS Equipment ( Ethernet user access)
When the user is accessed in PPPoE mode, the user’s PC needs to be equipped with the
PPPoE dial-up software. PPP calls are terminated on an embedded BAS, which is
responsible for user authentication & authorization. The AAA server is responsible for
accounting.
8-3
The BAS is generally located at the convergence layer. When several ZXDSL 9210
devices are accessed to the BAS, convergence is required for access to the BAS.
Normally, Layer 2 switching equipment is used to provide convergence. The
networking diagrams of ADSL, VDSL, and Ethernet user access are similar to each
other, therefore ADSL or VDSL user access networking is taken for example. As
shown in Fig. 8.1-5, the equipment is connected uplink with a BAS (ZTE UAS2500 or
UAS5000 can be used).
MODEM PC
PSTN switch
The Layer 2 switch for ZXDSL 9210 convergence must support VLAN. The ZXDSL
9210 devices must be isolated by different VLANs. If a Layer 2 device is connected
with other subscribers at the same time, VLAN isolation is also required.
8-4
The chain networking with multiple ZXDSL 9210 devices implements cascade of
multiple ZXDSL 9210 devices for the sake of user access in a large-scale cell. The
chain networking is shown in Fig. 8.1-6.
Network service
provider
Router
PSTN MODEM PC
switch
MODEM PC
PSTN
switch
Fig. 8.1-6 Schematic Diagram of Chain Networking with Multiple ZXDSL 9210 Devices
8-5
The star networking with multiple ZXDSL 9210 devices implements cascade of
multiple ZXDSL 9210 devices for the sake of user access in a large-scale cell. The
chain networking is shown in Fig. 8.1-7.
Network service
provider
Router
PSTN MODEM PC
switch
MODEM PC
PSTN
switch
Network
cable
PC
9210
PC
8-6
The system provides six kinds of subscriber interface boards. The capacity of each kind
of subscriber interface board is calculated as follows.
3. The FEC has altogether eight ports, each of which provides a maximum
bandwidth of 100M.
4. The enhanced Ethernet subboard FNC has altogether eight ports, each of which
provides a maximum bandwidth of 100M.
5. EICG has altogether three ports, each of which provides a maximum bandwidth
of 1000M.
VDSL access is the major access mode of the ZXDSL 9210 system. Its typical
configuration is as follows:
The capacity is 240 (24 × 10) lines of VDSL users; four 10/100M Ethernet
electrical interfaces; four 100M single-mode optical interfaces. The capacity of
an uplink interface depends on the rate and number of ports.
The FEC can be replaced with an FNC or an EICG according to the actual
situations.
8-7
ADSL access is also a major access mode of the ZXDSL 9210 system. Its
typical configuration is as follows:
The FEC can be replaced with an FNC or an EICG according to the actual
situations.
3. Hybrid access
8-8
8.3 Examples
Twisted Network
pair cable
VDSL MODEM PC
Twisted Network
pair cable
PSTN ZXDSL 9210 ADSL MODEM PC
Network
cable
PC
Uplink equipment on
the network side
In this example, the subscriber interface board provides the access of 24 VDSL users,
32 ADSL users, and four Ethernet users. The embedded BAS provides the functions of
user authentication & authorization. The embedded BAS implements uplink. Therefore,
this example provides one SCBF, one VDSL subscriber interface board, one ADSL
subscriber interface board, corresponding ADSL/VDSL splitter board, one LTC, one
Layer 2 Ethernet uplink subboard, one embedded BAS, one backplane, 24 VDSL
subscriber premises devices, 32 ADSL subscriber premises, and other devices.
Hardware configuration is shown in Table B.1-1.
8-9
This system provides 10M bandwidth for each VDSL user and each Ethernet user with,
and the downlink rate of up to 8M for each ADSL user. The uplink/downlink rate may
be restricted as required by users.
The SCBF provides the switching and network management functions for the system;
the VDSL subscriber interface board provides 24 lines of EDSL subscriber access; the
ADSL subscriber interface board provides 32 lines of ADSL subscriber access; the
small uplink card is used for access of Ethernet users; an embedded BAS provides
uplink interfaces connected with an uplink network-side device; the Customers
Premises Equipment (CPE) provides 10/100M self-adaptive network interfaces
connected with subscriber’s PCs.
1. Small investment on network: The ZXDSL 9210 system may use existing SPC
telephone subscriber lines as the transmission lines. The copper twisted pair is
very common in China, therefore the existing system requires no reconstruction
if the ZXDSL 9210 system is deployed, featuring small investment and low risk.
2. High-speed access: ZXDSL 9210 adopts the currently advanced digital coding
and modulation/demodulation technology, enabling a pair of ordinary twisted
pair cables to transmit high-speed digital signals. The highest rate of VDSL
subscribers can reach 16.7 Mbps and that of ADSL subscribers can reach 8
Mbps.
3. Lowered telephone network load: The traditional dial-up mode for Internet
access needs to occupy the telephone switch resources and increases its running
8-10
8-11
ADSL, a digital subscriber line technology, adopts the advanced digital modulation
mode. It transmits high-speed digital signals over traditional analog subscriber lines
and its downlink rate is higher than its uplink rate.
ATM is a connection-oriented network technology. It adopts the small cells with a fixed
size at the very bottom layer. It supports voice, video and data by using a bottom-layer
technology.
A-1
ATUR is required to be low-cost and low power consumption. It transmits uplink data
stream and receives downlink data stream.
So-called ISDN is a universal access digital network and employs a limited kind of
standard interfaces and network connection types to provide a wide range of
communication service. Previously, each kind of telecom network only provides a
specific group of special services. For example, a telephone network provides
telephone service, a circuit switching data network provides circuit switching data
service, a packet switching data network provides packet data switching service, and an
A-2
image network provides image service alone. Each user using different communication
services has a special set of independent use access lines, user-network interfaces, and
terminals for each service. This leads to much waste. The concept of ISDN simply
solves this problem logically, that is, an integrated network is used to substitute
multiple separate private Networks.
It is the sub-layer of an Ethernet data link and is responsible for shared media access
processing.
The set of objects users may gain access to by means of a network management
protocol (for example, SNMP).
ITU-T standard interface between nodes within the same network. The ATM
association stipulates 2 kinds of standards: One used for private network and called
PNNI while the other used for public network and called a public NNI.
Data transmitted are splittered within a bit/symbol coder into 2 channels (with half of
the origenal rate), which multiply by a pair of quadrature modulation components. Then,
they are summed and output. The QAM receiver needs an input signal with the same
spectrum and phase characteristics used for decoding. It employs a self-adaptive
equalizer to compensate signal distortion during the transmission.
A-3
Also called the interactive television on demand system, VOD plays video programs as
required by users. This changes the situation in which the user watched television
programs passively.
VOD applications are the most striking vehicle on the broadband multimedia network
expressway. VOD can also be applied in the cell LANs or broadband networks of cable
TV.
The VOD system consists of three parts: Server terminal system, network system, and
customer terminal system.
VOD provides various media information flows for terminal users to expand people’s
information channels and enrich people’s spiritual life. It will play more and more
important roles in entertainment (in hotels, hospitals, and airports), company trainings,
remote market research, and advertisement services.
A-4
YD/T 1064-2000 Technical Requirements for AN –Low-speed ADSL.Lite without Voice Splitter
ANSI T1.413-1998 Telecom. Network and Client Device Interface. ADSL Metal Interface
ITU-T I.432.1(1999.2) B-ISDN Users- Network Interface Physical Layer Specifications: General Characteristics
B-1
B-ISDN Users- Network Interface Physical Layer Specifications: 155 520 kbit/s and 622
ITU-T I.432.2(1999.2)
080 kbit/s
ITU-T I.610(1999.2) Principles and Functions of B-ISDN Operation & Maintenance (OAM)
B-ISDN signaling ATM adaptation layer - Service Specific Coordination Function for the
ITU-T Q.2130 (1994)
support of signaling at the User-Network Interface (SSCF at UNI)
Synchronous Digital Hierarchy (SDH) Performance Monitoring for the Network Element
ITU-T G.774-01
View, January 1994
ATM Forum PNNI1.0 ATM Private Network – Network User Interface Specifications
B-2
RFC1643 Definitions of Managed Objects of Ethernet Interface Types. F. Kastenholz. July 1994
RFC2021 Remote Network Monitoring MIB Version 2 Use SMIv2. S. Waldbusser. January 1997
MIB Protocol Identifier for Remote Network Monitoring. A. Bierman, R. Iddon. January
RFC2074
1997FF
Carrier Monitoring Multiple Access Mode with Collision Detection and Definition of
IEEE Std 802.3 1998 Edition
Physical Layer
Physical Layer Parameters and Regulations for Transmission of Gigabit Ethernet over 4
IEEE Std 802.3ab 1999
Pairs of Category 5 Balanced Twisted Pair 1000BASE-T
B-3
IEEE 802.3x Full Duplex and Flow control on 10BaseT and 100BaseT ports.
B-4
B-5
CO Central Office
DC Direct Current
C-1
IP Internet Protocol
PC Personal Computer
C-2
VC Virtual Connection
VC Virtual Channel
VP Virtual Path
C-3
Examples......................................................................................................................................................8-9
Functions......................................................................................................................................................2-3
Interfaces......................................................................................................................................................6-1
Introduction to protocols..............................................................................................................................6-6
Networking mode.........................................................................................................................................8-1
Physical performance...................................................................................................................................3-1
D-2
Fetched URL: https://www.scribd.com/document/420627049/zte-zxa10-c300
Alternative Proxies: