OptiX PTN 960 V100R007C10 Installation Guide 02
OptiX PTN 960 V100R007C10 Installation Guide 02
OptiX PTN 960 V100R007C10 Installation Guide 02
Series
V100R007C10
Installation Guide
Issue 02
Date 2017-03-10
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: [email protected]
Related Versions
The following table lists the product versions related to this document.
Intended Audience
This document describes the installation process of the OptiX PTN 960 in terms of
preparations for installation and system installation.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Symbol Description
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Change History
Updates between document issues are cumulative. Therefore, the latest document issue
contains all updates made in previous issues.
Update Description
Contents
A Glossary......................................................................................................................................131
This section describes the general equipment installation process. Before installing
equipment, you need to determine the installation mode according to installation environment.
After unpacking and inspecting the equipment, you need to install the chassis, boards, fibers,
and cables in sequence, and then check the installation result. After determining that the
installation is correct, you can power on the equipment and then check fiber connections.
Figure 1-1 shows the installation flow.
Checking cable
After installing cables, check the cables connections.
connectivity
NOTE
When the equipment is installed in an indoor cabinet, a network cabinet, or an outdoor cabinet, the references
for each step in the preceding installation process vary. The references are as follows:
l When installing the equipment in a 19-inch cabinet, an N63E cabinet, or a T63 cabinet, see the OptiX
PTN 960 Quick Installation Guide.
l When installing the equipment in an IMB network cabinet, see 3 Equipment Installation Guidelines
(IMB Network Cabinet).
l When installing the equipment in an outdoor APM30 cabinet, see the OptiX PTN 960 Quick Installation
Guide (Outdoor).
When installing OptiX PTN 960 NEs in a 300-mm-deep indoor cabinet, note that a maximum of five OptiX
PTN 960 NEs can be installed in the cabinet, with a distance of not smaller than 300 mm between adjacent
NEs. In addition, the total power consumption of the cabinet must be lower than 1000 W.
When installing both OptiX PTN 960 NEs and OptiX PTN 3900 NEs in a 300-mm-deep indoor cabinet, note
that only one OptiX PTN 960 NE and one OptiX PTN 3900 NE can be installed in the cabinet, with a
distance of not smaller than 560 mm between the two NEs.
2 Installation Preparation
Before installation, plan installation space, build telecommunications rooms, and determine
the installation mode according to requirements of the equipment for running environment.
This ensures that the equipment can be properly installed and commissioned, and then can run
stably. The equipment can run in various environment, and the running environment can be
classified into three types, that is, running environment A, B, and C. This section describes
the three types of environment.
In environment A, B, and C, installation modes are different. For details on how to choose
equipment installation modes and references, see Table 2-1.
Runnin
g Installati
Description Example Reference
Environ on Mode
ment
The
equipment
Indoor
is installed
environment For details on the
Standard central in a 19-
Running where installation mode,
telecommunications inch
environ temperature see the OptiX PTN
room or communication cabinet, an
ment A and humidity 960 Quick
shelter N63E
are under Installation Guide.
cabinet, or
control
a T63
cabinet.
Runnin
g Installati
Description Example Reference
Environ on Mode
ment
Room where
temperature is not under
control such as an attic
in a residential building
and humidity Simple
are partially telecommunications
under control room,
or without telecommunications
control, or room reconstructed
common from a cottage, or
outdoor telecommunications 2.2.10 Selection of
environment room reconstructed a standard the Network
with a simple from a common network Cabinet for details
shelter such as residential building cabinet. on the installation
an awning, or mode.
common (In such a
outdoor telecommunications
environment room, air conditioners
where humidity and mains are available,
reaches 100% but sealing conditions
occasionally are poor.)
Runnin
g Installati
Description Example Reference
Environ on Mode
ment
l Outdoor
area close
to a
pollution
source
l Environmen
t with only
simple
shields such
as awnings
l Place on the
sea
NOTE
An area close APM30H
to a pollution
source refers to
cabinet
an area where OMB
saline water cabinet (It
such as the sea is
or a salina is For details on the
within 3.7 km Outdoor or an attic in a applicable
away from it, residential building when the installation mode,
where a heavy installation see 2.3
Running Area complying with
pollution environme Requirements for
environ environment B but close
source such as nt such as Running
ment C a metallurgical to the sea or a pollution
the Environment C
plant, coal source
undergrou and Installation
mine, or Underground garage
thermal power nd garage Planning.
plant is within has
3 km away limitations
from it, where a on the
medium equipment
pollution
source such as
size.)
a chemical
plant, a rubber
plant, or an
electroplating
factory is
within 2 km
away from it,
or where a light
pollution
source such as
a food factory,
leather factory,
or heating
boiler is within
1 km away
from it.
facilities. In addition, the alkalized soil cannot be used as the construction material.
Otherwise, the equipment applicable in atrocious environment must be adopted.
l The historical livestock room or the chemical fertilizer warehouse cannot be used as the
equipment room.
l The equipment room should be solid enough to withstand wind and downpour.
l The equipment room should be kept away from the road or sand field with dusts flying
around. If this requirement cannot be satisfied, the windows and doors of the equipment
room should be kept away from the sources of pollution.
l Ensure that there are no cracks or holes on the walls or floors. Fix the cracks and holes
on the walls and floors if there are any. The wall surface must be smooth, abrasion-
resistant, and dustproof. In addition, the walls must provide sound-proof, unflammable,
heat sink, dust-proof, electromagnetic shielding functions for the equipment room.
Main
SPC Power
Distribution
Switching Distribution Battery Room
Frame
Room Room
(MDF) room
Power line
Communication line
Network line
The construction of the equipment room shall meet the requirements listed in Table 2-2.
Area The equipment room should be able to house all the devices of the
terminal office at least.
Net height Minimum indoor height refers to the net height under the roof
beam or under the ventilation pipe. Normally it is no less than 3 m.
Indoor floor The floor of the equipment room should be semi-conductive and
not dust-arousing. Generally, ESD raised floor is required. The
floor boards should be laid tightly and firmly. For each square
meter of floor space, the horizontal tolerance should not be greater
than 2 mm. If no raised floor is available, electrostatic conductive
floor material with a volume resistivity ranging 1.0x107 ohms -
1.0x1010 ohms should be laid. The electrostatic conductive floor
material or the ESD raised floor should be grounded well. It can be
connected to the grounding device through a current limiting
resistor and a connection wire. Resistance of the current limiting
resistor should be 1 megaohm.
NOTICE
If thermal insulation cotton is required under the support for the floor, or an
ESD raised floor is required, do not use the thermal insulation cotton and
the ESD raised floor containing sulfur to prevent devices from being
corroded.
Doors and windows Doors are single-leaf, 2 m high and 1 m wide. All doors and
windows should be sealed with dust-proof rubber strips. Double-
layer glass is recommended for windows.
Wall The wall can be covered with wallpaper or lusterless paint, but not
the paint that is apt to get pulverized or peeled.
NOTICE
If organic materials such as soundproof cotton are required, use materials
that do not contain sulfur.
Indoor ducts Indoor ducts are used for cabling. The inside of the ducts should be
smooth and clean. The reserved length and width (margins) as well
as the number, position and size of the holes should comply with
the relevant requirements for placing the optical synchronous
transmission equipment.
Water supply and The service pipes, drain pipes and rain pipes should not pass
drainage through the equipment room. Fire hydrants should not be placed in
the equipment room, but in corridors or the place near the staircase
where they can be easily seen and accessed to.
Water-proof Devices must be installed away from indoor places with water
requirements sources, such as outdoor part of the air conditioner, water pipes,
and ducts.
Item Requirements
Internal partition wall The place where the equipment is installed is separated from the
equipment room door. The partition wall can hold back some
dusts, as be shown in Figure 2-2.
Installation position The air conditioner should be installed in the place where the
of the air conditioner discharged air from the air conditioner shall not be directed to the
equipment. The air conditioner must be away from a window to
prevent the air conditioner blowing moisture on the window to
devices in the equipment room when the window is not securely
closed.
Air conditioner
Equipment
Partition wall
Table 2-3 Limits of dust diameter and density in the equipment room
Mechanical Active Substances Amount
Sand ≤300mg/m3
The equipment room shall be guarded against dust and corrosion by harmful gases such as
SO2, H2S, NH3, and NO2. 2.1.6 Corrosive Gas Control Requirements shows the limits for
them.
To meet the above requirements, take the following measures:
l Keep the equipment room far away from pollution sources, Smoking is prohibited in the
equipment room.
l Seal the doors and windows.
l Use dust-proof materials for floors, walls, and roofs.
l Install window and screens for the windows and doors facing outdoors, and ensure that
the outer window can filter out dust.
l Clean the equipment room and air filters every 3 to 6 months.
l Always wear clean lab coat and protective footwear before getting into the equipment
room.
l Cover the ceiling and walls of the equipment room with wallpapers or lusterless paint
(pulverized paint prohibited) to prevent dust flake-off.
when the relative humidity is too low, the captive screws will become loose as the insulation
washer may get dry and shrink. Meanwhile the static electricity generated in the dry climate
may damage the circuits of the equipment. Too high indoor temperature will greatly reduce
the reliability of the equipment. If the equipment runs in such a high temperature environment
for a long period, its life will be shortened because over high temperature will accelerate
aging of the insulation materials.
SO2 ≤ 0.30
H2S ≤ 0.10
N02 ≤ 0.50
HF ≤ 0.01
NH3 ≤ 1.0
Cl2 ≤ 0.10
HCl ≤ 0.10
O3 ≤ 0.05
To fulfill the above requirements, take the following measures for the equipment room:
l Build the equipment room away from places with high-density corrosive gases such as
mines, metallurgical plants, tire plants, rubber plants, and chemical plants.
l Keep the equipment room far away from sewers, effluent pipes, shafts, dumps, and
septic tanks. The air intake of the equipment room should be at the opposite side to the
pollution source.
l Do not use sulfur-containing organic materials to decorate the equipment room. These
materials include ESD pads, thermal insulation cotton, and soundproof cotton that are
made up from sulfur-containing rubber.
l Do not store diesels or gasoline engines in the equipment room where devices are placed.
When an oil-fired engine is outside the equipment room, ensure that the exhaust of the
engine is in the downstream direction of the equipment room and the engine is far away
from the air intake vent of the air conditioner for the equipment room.
l Place storage batteries isolated from one another. You are suggested to put one battery in
a room.
l Make an agreement with a professional monitoring company to monitor the environment
regularly.
l Build the equipment room way from electric transformers, high-voltage power lines and
other equipment or devices with high current. For example, you may build it 20 meters
or more away from the transformer, or more than 50 meters from high-voltage power
lines.
l Build the room way from high-power radio transmitters. For example, build it at a place
free of high-power radio transmitters within 500 meters.
l If there is a mobile communication transmitter in the comprehensive building, make sure
its interference level complies with the corresponding standard. Shielding and isolation
measures can be taken for further protection if necessary.
l Release and execute stipulations that forbid any personnel using wireless handy
communication devices close to equipment in the equipment room.
Table 2-7 shows the requirements for surge protection and grounding.
Item Description
On structure of Build the equipment room with steel and concrete. The equipment room
the equipment should be equipped with facilities such as surge protector to protect it
room against direct lightning strokes. Make sure the surge protection
grounding of the equipment room, or that of devices such as the surge
protector, shares the same grounding body with the protection
grounding of the building where the room is located in.
Use TN-S for Equip the communication office with special electric transformers and
AC power metal-jacketed or insulation-jacketed power cable. The power cable is to
supply pass through a steel pipe and buried in the earth before entering the
office. Both ends of both the metal jacket and the steel pipe should be
grounded by proximate. Make sure the buried length is no less than 15
meters. Each of the three live cables at the low-voltage side of the AC
transformer should be equipped with a gapless zinc oxide arrester
respectively. The chassis, the AC neutral cable of the low-voltage side,
and the metal jacket of the cable connected to the chassis should all
proximately grounded.
Item Description
Equip the Do not lead in or lead out the AC/DC power cables aerially for the
incoming power office. Equip the in-room low-voltage power cable with a surge
cable with a protector in the voltage regulator or in the AC panel. The arrester should
surge protector be grounded proximately. If the office is located in the city, it is
recommended to use an arrester with the nominal discharge current no
less than 20 kA. If it is located in the suburb of intermedial lightning
danger level or higher, an arrester with the surge current higher than 60
kA is recommended. If located in an isolated huge building in the city or
in the mountain area where lightning strokes occur often, please use an
arrester that has a surge current more than 100 kA. The ground cable
should be less than 1 meter in length.
DC power The working ground of the office, that is, the anode of a -48 V DC
supply power supply or the cathode of a 24 V power supply, should be led from
grounding the in-door grounding bus line by proximate. The ground cable should
satisfy the maximum load of the equipment. The power supply facilities
for the office are to possess a DC working neutral line, which is
introduced from the general grounding bus line or the protection ground
bar of the equipment room.
On the < 10 ohms. The upper end of the grounding body should be 0.7 meters
grounding or more underground. In cold areas, the grounding body should be
resistor buried in the frozen layer or lower. Make regular monitor efforts on the
grounding resistor to make sure the grounding is always valid.
On routing of Signal cables should be led into the communication office from
the signal cable underground. Aerial routing of signal cables is forbidden. The leadin or
leadout communication cable should be metal-jacketed. Otherwise, they
should be routed in metal pipes. The ground cable of the arrester should
be as short as possible. The empty pairs in the cable should be
connected to the protection ground in the equipment room.
Item Description
On the The general grounding bus line can be grounding loop or bar. The
grounding bus ground cable should be not of aluminum material. If interconnection
line occurs between different metal connectors, take measures to avoid by
electric chemical corrosion. Generally, the cross-sectional area is a
copper bar of no less than 120 mm2 or zinc-plated flat steel of the same
resistance. The grounding bus line should be kept insulated from the
construction steel.
On the The grounding lead-in should be no longer than 30 meter. As for the
grounding lead- material, it is recommended to use zinc plated flat steel with the cross-
in wire sectional area being 40 mm x 4 mm or 50 mm x 5 mm.
Storage battery
Storage battery is an essential component of the DC power distribution system of the OptiX
transmission equipment. Functionally, it serves to:
l Stabilize the voltage for the transmission equipment to work reliably.
l Store energy. In the case of outage of mains, the storage battery can feed power for a
period of time, which depends on its capacity, so that the communication will not be
interrupted immediately.
l Filter for large capacitors. The storage batteries are useful for absorbing surge voltage
from rectifiers and preventing noise and power frequency interference from getting into
the communication equipment.
l Automatically shut down. When the voltage of the storage battery drops to below -43 V,
the control circuit can automatically shut down the output.
The storage battery of OptiX optical transmission equipment is charged and discharges under
a low, constant voltage. Table 2-8 shows the relevant requirements.
magnetic interference and the interference from the equipment itself and the ground cables.
The shorter the duration of the transient pulse, the larger values of such transient noises can be
allowed. For the allowable values, see Figure 2-3.
100V
10V
1V
0.1V T
l When the power supply equipment fails or works abnormally, visual and audible alarms
should be given. Such alarm information should be able to be sent to the operation and
maintenance center.
l In case short circuit occurs in a tributary of the power supply system, the whole power
distribution system should not be affected by the sharp voltage reduction. And the peak
striking voltage should not cause any breakdowns to the transmission equipment.
ESD protection
The equipment-affecting electrostatic induction comes from the external electric field such as
outdoor high voltage transmission line or lightning. It also comes from the internal system
such as indoor environment, floor materials or equipment structure.
Static electricity may damage the chips on integrated circuit boards and cause faults in
software and electronic switch. Statistics shows that 60 percent of the damaged circuit boards
are caused by static electricity. It is essential to take effective ESD protection measures.
Interference prevention
With the development of technologies and social economy, more and more electromagnetic
signals are transmitted in the air. They may affect the communication quality by causing
cross-talk and stray noise, and even result in communication interruption. The
electromagnetic interference (EMI) sources include:
l The corona discharge of the electric transmission line
l The transformer
l Switches
l Waveform distortion of the power supply network caused during the operation of large
equipment
l Radio frequency (RF) interference
l Natural interference sources such as terrestrial magnetic field and external radiation
The interference, from either inside or outside the equipment or the application system, affects
the equipment through conductive modes such as capacitance coupling, inductance coupling,
electromagnetic wave radiation, common impedance (including grounding system) and cable
(power and signal cables). In terms of external relationships of the equipment, interference is
from the signal cable, power cable, grounding system and spatial electromagnetic wave.
Integrated circuits (ICs) have the interference resistance capability to a degree. However when
the external noises go beyond their anti-interference tolerance, corrupted signals and even
system malfunction will be caused. It is impossible to eliminate or shield all the interference
sources, but the following measures can be taken to suppress the interference signals:
l High frequency interference in the power supply network is generated when the primary
coil of the power supply transformer is coupled to the secondary coil through distributed
capacitors. To suppress such interference, we can use an appropriate transformer, and
install a low-pass filter at the inlet of the power supply cable.
l The interference of the transient voltage in the power supply network can be reduced by
inputting power directly from the primary transformer with a filter capacitor for the
optical synchronous transmission equipment.
l When the optical synchronous transmission equipment works in the 50 Hz mains power
supply network with the above interference, the surge voltage caused by the power
supply network and the over-voltage generated by lightening will be passed to the power
supply of the optical synchronous transmission equipment, which leads to computing
errors of the processors. Therefore, before directly using the mains supply, effective
measures against interference from power supply network should be taken.
l The key to eliminate the interference from the grounding system is to avoid loops among
various grounds, such as the signal ground (including analog and digital grounds),
BGND, PGND and shield ground, or loops formed by large distributed capacitors.
Otherwise, the common impedance interference from the grounding system may affect
the operation of the equipment. In buildings other than high-rises, the working ground of
the optical transmission equipment should be separated as far as possible from the
ground for electricity equipment and surge protection device.
l Prevent electromagnetic radiation interference from the surroundings to the equipment.
In some integrated communication buildings, if there is a high frequency transmitter
there, its influence on the optical transmission equipment should meet the relevant
requirements. Independent power supplies are recommended for them.
l EMI from the telecommunications line should be restrained. Influenced by high
frequency electromagnetic field (external interference), high longitudinal voltage will
occur in the core and sheath of the communication cable. Because of the asymmetry of
cores in the cables, the longitudinal voltage will generate a horizontal noise voltage at
the ends of the cores. When both ends of the cable sheath are grounded, the sheath will
function as a shield layer, greatly reducing the longitudinal voltage and reducing the
interference voltage. Other effective methods include: reduce the voltage or current of
the interference source; reduce the line length and the spacing of the conducting wires to
reduce the area of the affected loop; directly place the insulated conducting wires on the
grounded floor; use a special grounding feedback cable to avoid co-impedance; or twist
the signal cable and the feedback cable together to offset partial peripheral
electromagnetic interference, and so on.
Fire protection
For small equipment rooms, a certain number of portable fire extinguishers should be
equipped in each room for an initial fire control. In large equipment rooms, fire extinguishing
facilities should be equipped. An automatic fire alarm system should also be equipped in the
equipment room. All telecom buildings with fire alarm system should have fire emergency
lighting system and evacuation instruction marks at important places, paths and gateways.
Anti-earthquake demand
The designed anti-earthquake intensity of the telecom equipment room must be one degree
(Richter scale) higher than that for the common buildings. The equipment room building that
cannot meet the requirement should be reinforced. When installing the OptiX optical
transmission equipment, the following anti-earthquake measures should be taken.
l Use steel framework for the cabinet of the equipment. There are locking devices to fix
the boards in the cabinet.
l The cabinet is reinforced with guide rail on the top and supports at the bottom.
Surge protection
Chimneys, antennas or other things that are over 15 m tall on the top of the equipment room
building should be designed according to the surge protection requirements for civil buildings.
Measures should be taken against direct flash and intrusion of lightning current. In the main
high-rise transmission building, protective measures should be taken to prevent side lightning
strokes, especially in frequent lightning areas. Therefore designers should take actual
conditions into consideration and take appropriate measures. For example, connect the metal
external window frame to the surge protection wire; along the height of the building, place the
surge protection metal bands at a definite spacing on the outside wall, and so on.
The main equipment-room building should be provided with the following surge protection
measures:
l The building must have surge arrester nets or bands installed at the positions susceptible
to lightning strokes. Lightning prevention wires or lightning rods should be installed on
the top of chimneys and antennas that are protruding from the building. The cross-
sectional area of the grounding wire of the surge protection device should not be smaller
than 120 mm2, while the space between the wires not larger than 30 m.
l The earth resistance of the earthing/grounding system is recommended to be less than 10
ohms, and the equipment grounding should be in accordance with national and local
electrical codes as well.
l Outdoor cables and metal pipes should be grounded before entering the building, and the
outdoor overhead cables should be equipped with lightening protection devices at the
inlet of the building.
l It is suggested to use roof plates, beams and pillars made of reinforced concrete and the
reinforcement bar as the ground cables of lightening arresters.
In the past surge protection grounding of the building was separate from the grounding for
telecom system and power supply system, and a large distance was required between the
grounding objects. However, the distance requirement is not satisfied due to small space of
the building. In fact, they cannot be separated in most cases, so joint grounding system is
recommended for the lightening protection grounding of the building. The joint grounding
system shall connect the telecom BGND, PGND, surge protection grounding of the building,
and grounding of the power frequency AC power supply system. A high earth resistance of
the joint grounding system is required. The earth resistance required by telecommunication is
far lower than 10 ohms, and the grounding requirements for different telecom devices vary, so
the resistance of the joint grounding system should be determined according to the minimum
resistance required for the grounding device.
It is recommended to use steel bars in the walls and pillars of the building as ground cables
for lightening protection. These wires should be electrically connected so as to equalize the
electric potential in the building.
When selecting a site for equipment, make sure that the site satisfies the following
requirements:
entering the equipment. The second number "0" indicates that the waterproof function is not
provided.
Install the device in a place that is free from flooding and prevent foreign objects such as
screw and cable end from entering the heat-dissipation hole of the device. Otherwise, the
device may be burnt due to short circuit.
In regions with heavy dust, it is recommended that customers add air filters to their
customized network cabinets to improve the reliability of the network cabinet.
In regions with heavy dust, it is recommended that customers add air filters to their
customized network cabinets to improve the reliability of the network cabinet.
l Ensure that the walls on which the device hangs have no windows.
l Ensure that the device is installed in a place away from rain or wind.
l When installing a device in the basement, check the local draining design and ensure that
the device is protected against waterflooding.
l When installing a device on the low-lying first floor of a building, ensure that the device
is away from the weak current well or is not directly installed on the ground.
l Do not route cables into the network box directly from the top or side. Ensure that water-
proof measures have been taken for cables that enter the network box to prevent water
from entering the cabinets along cables.
Table 2-10 lists requirements for concentration of corrosive gas in installation environment.
SO2 ≤ 0.2
H2S ≤ 0.006
NH3 ≤ 0.05
Cl2 ≤ 0.01
The equipment installation environment cannot be surrounded with pollution sources such as
drainage ditches, coal-fired power plants, smokestacks, fertilizer plants, paper mills, or daily
commodity factories.
1. When the PTN equipment is installed in a network cabinet, the temperature at the air
intake vent cannot exceed the maximum temperature permitted by the equipment to run
normally, and the network cabinet must be capable of dissipating the heat generated by
all the equipment installed in the network cabinet.
2. The permitted temperature at the air intake vent of the network cabinet ranges from -5ºC
to 45ºC.
3. Fans need to have the backup function. After a fan fails, the other fans can still work
normally. A failed fan needs to be replaced in time. For more information about the air
volume of fans, see the air volume of an indoor cabinet.
4. The heat dissipation capability of a network cabinet without fans is greater than the
maximum total heat dissipation consumption of the equipment in the network cabinet,
and the internal temperature of the network cabinet is lower than the maximum working
temperature of the equipment.
Table 2-11 Requirements for a network cabinet with natural heat dissipation where the OptiX
PTN 960 is installed horizontally
Sets of equipment 1 2
that can be housed
in a network cabinet
Sets of equipment 1 2
that can be housed
in a network cabinet
Positions of the air The air intake vent is located on the left panel of the network
vents on the network cabinet and the air exhaust vent is located on the right panel of
cabinet the network cabinet.
Requirem Requirem It is recommended that the air vents on the equipment face the
ents for ents for air vents on the network box, and the distance between the
the the width equipment and a side panel of the network box be at least 20
position mm. In this manner, the heat air can be directly exhausted.
where the If air vents are blocked, the blocked area of the air vents does
PTN not exceed 10% of the total area of the air vents.
equipment
is installed After installation, the fans on the equipment are on the left.
in the When the fans are rotating, the air flows from left to right, in the
network same direction as the air ducts of the network cabinet.
cabinet Requirem The equipment needs to be stacked without any space.
ents for The distance between the equipment and the ODF or power
the height supply on the top or in the bottom of the network cabinet is at
least 45 mm.
Table 2-12 Requirements for a network cabinet with natural heat dissipation where the OptiX
PTN 960 is installed vertically
Supported Vertical installation
installation mode
Positions of the air Air exhaust vents are close to the top of the network cabinet and
vents on the network air intake vents are close to the bottom of the network cabinet.
cabinet
Table 2-13 Requirements for a network cabinet with fan cooling where the OptiX PTN 960 is
installed
Sets of equipment 1 2 3
that can be housed
in the network
cabinet
Dimensions (mm): H x 100 x 580 x 500 200 x 580 x 500 300 x 580 x 500
WxD
Fan positions The fans need to be arranged in the diagonal direction of the
entrance on the network cabinet.
Sets of equipment 1 2 3
that can be housed
in the network
cabinet
Requirem Requirem The distance between each side (left or right side) of the
ents for ents for equipment and the corresponding side panel of the network
the the width cabinet is at least 40 mm.
position If air vents are blocked, the blocked area of the air vents does
where the not exceed 10% of the total area of the air vents.
PTN
equipment Requirem The equipment needs to be stacked without any space.
is installed ents for The distance between the equipment and the ODF or power
in the the height supply on the top or in the bottom of the network cabinet is at
network least 45 mm.
cabinet
Figure 2-5 Recommended air ducts for a network cabinet with natural heat dissipation
In the case of a network cabinet with fan cooling, arrange air intake vents and fans properly so
that air flows evenly without forming an air reflow zone.
A network cabinet with fan cooling also enables air to flow in three typical modes, that is,
bottom in top out, bottom in side out, and side in side out, as shown in Figure 2-6.
Figure 2-6 Recommended air ducts for a network cabinet with fan cooling
The fan tray assembly must match the design of vents on a network cabinet and generate
sufficient air volume.
A general rule to design vents is to determine the area of vents based on the size of the fan
tray assembly. This ensures a minimum of 30% of the maximum air volume generated by
fans.
For example, a fan tray assembly with dimensions of 120 mm x 120 mm x 25 mm generates
144 CFM air volume to the maximum. In this case, when the area of vents is 14400 mm 2 (40
mm x 360 mm or 120 mm x 120 mm), the system can obtain 57.6 CFM air volume at least.
space for installation, the cabling space in front of the equipment must be no less than 75
mm.
l When installing the PTN equipment in an outdoor cabinet, you also need to follow the
standard of installing the equipment in a 19-inch cabinet. There must be at least 3 U
space for installation, the cabling space in front of the equipment must be no less than 75
mm.
l When a network cabinet is installed on a wall, sufficient space must be left around the
cabinet. For more information regarding the space requirements of a network cabinet,
refer to 3.3 Dimensions and Installation Clearance Requirements, which describes
space requirements of an IMB network cabinet.
– At least 800 mm space must be left in front of the network cabinet.
– At least 200 mm space must be left at the rear of the network cabinet.
– At least 200 mm space must be left on the top of the network cabinet.
– At least 300 mm space must be left below the network cabinet.
The OptiX PTN 960 supports external AC power supply. By default, it supports the
EPS30-4815AF power system.
The OptiX PTN 960 (extended chassis) supports internal AC power supply with voltage of
110/220 V AC (100 V AC to 240 V AC).
DANGER
When routing power cables or service cables connected to equipment to the outdoor area, do
not route them overhead.
1. Ground the equipment in compliance with national regulations, industry standards, and
carrier regulations.
NOTE
l When the device is installed inside the building, and the subscriber cable and power cable are
routed in the overhead cabling mode, install an elementary surge protection device on the input side
of the AC power system and ensure that the surge protection rating is not smaller than 5 kA (8/20
μs).
2. If the building has installation environment with a dedicated grounding system, use the
grounding system of the building directly to ground the device. Do not use the downlead
of the lightning belt or lightning rod of the building to ground the device.
3. If the building does not have installation environment with a dedicated grounding
system, it is recommended that you use the protective earthing (PE) of the AC power
distribution system of the building to ground the device.
4. If the building does not have any dedicated installation environment for grounding
devices or the PE of the AC power distribution system, construct a new grounding
system. It is recommended that you install the network cabinet on a lower floor of the
building to reduce the grounding cost.
5. Routing the aerial open wire into the network cabinet is prohibited. Use the cable with
metallic jacket and route the cable underground into the network cabinet.
6. After the power supply enters the network cabinet, use a surge protection bar.
7. Connect all devices and metal parts in the network cabinet to the ground bar in the
network cabinet in an equipotential manner. Connect the ground bar in the network
cabinet to the external ground device by using a ground cable.
TN-C-S/TN-S AC Power System (N Wire and PE Wire Are Combined into One
Wire on the Lightning Protection Bar or N Wire and PE Wire Are Provided
Separately)
It is recommended that you use the PE wire of the AC power cable to ground the equipment.
The prerequisite is that the PE wire of the AC power cable for the corridor of the building is
already grounded properly.
DANGER
The PE wire of the AC power cable must be grounded. Otherwise, electrical leakage may
occur on the device and cause personnel injury.
Figure 2-7 shows the grounding connections of the TN-C-S AC power system.
Figure 2-8 shows the grounding connections of the TN-S AC power system.
Use a ground cable (the cross-sectional area of the ground cable must be at least 6 mm2) to
connect all devices in the network cabinet to the ground bar of the network cabinet. Connect
the ground bar to the network cabinet in an equipotential manner through a metallic structure.
Use a ground cable to connect the grounding point of the reinforcing rib of the optical fiber to
the ground bar. You can also connect this grounding point to the network cabinet in an
equipotential manner through a metallic structure.
Use a ground cable (the cross-sectional area of the ground cable must be at least 16 mm2) to
connect the ground bar of the network cabinet to the PE wire of the corridor AC power
supply.
TT AC Power System (Provide Only L Line and N Line and Directly Ground the
Device)
It is recommended that an external ground device be adopted. For example, use the dedicated
ground device (such as the ground flat steel sheet, ground post, and ground bar) of the
building or the base concrete bar of the reinforcement concrete of the building, or deploy a
new earth screen.
Figure 2-9 shows the grounding connections of the TT AC power system.
Use a ground cable (the cross-sectional area of the ground cable must be at least 6 mm2) to
connect all devices in the network cabinet to the ground bar of the network cabinet. Connect
the ground bar to the network cabinet in an equipotential manner through a metallic structure.
Use a ground cable to connect the grounding point of the reinforcing rib of the optical fiber to
the ground bar. You can also connect this grounding point to the network cabinet in an
equipotential manner through a metallic structure.
Use a ground cable (the cross-sectional area of the ground cable must be at least 16 mm2) to
connect the ground bar of the network cabinet to an external ground device.
NOTE
l In an installation environment with dedicated ground devices, the corridor ground device is
recommended for grounding.
l In an installation environment without dedicated ground devices, it is recommended that the base
concrete bar of the reinforcement concrete of the building be used or a new earth screen be deployed
for grounding.
The network cabinet is generally installed in a basement or corridor. The network cabinet
needs to support the wall-installation mode and AC power distribution, and must be capable
of obtaining power from the power system inside the building. Its EMC and noise must
comply with standards. When an ONU is running, the network cabinet must ensure that the
noise is lower than 5 dB to avoid disturbing residents.
l For the AC-powered cabinet, it is recommended that you reserve a surge protection bar
and ensure that the surge protection rating is not smaller than 5 kA (8/20 μs).
l The network cabinet must provide a ground bar for grounding all devices in the cabinet
in a unified way. The resistance of the PGND cable must be smaller than 10 ohms.
Connect the ground cable to the ground bar. It is recommended that you use the metal
tube that is grounded to route cables out of
the outdoor cabinet.
Do not use the cabinet that is not waterproof Ground subscriber cables in a unified way.
outdoors. The protection rating of the
outdoor cabinet must reach IP55.
Use a dedicated surge protection bar. The device does not have any ground cable.
Seal the cable apertures of the cabinet Ensure that the cabinet door is locked when
properly to prevent dust or insects from the device is running.
entering the cabinet.
Ensure that the ventilation openings of the The ends of the optical fiber that is not used
network cabinet are free of obstacle. must be protected with dustproof caps.
Replace the air filter if its holes are too The corrugated tube does not enter the
small for the wind to enter the device. network cabinet and the cut of the
Regularly clean or replace the air filter in corrugated tube is not smoothened.
the area with heavy dust.
The metal wire of the optical cable that is Signal cables must be routed separately
not in the overhead mode must be fastened. from power cables.
When the device is installed on a wall, Ensure that cable connectors and ports do
instead of using plastic or other parts, use not face upwards.
the mounting brackets and expansion bolts
delivered with the device to fasten the
device.
When the device is installed indoors, if the When the device is installed in overhead/
device is close to the sewer or heating line, side cabling mode network cabinet, the
water may easily damp or enter the device. water may enter the device through cables.
It is recommended that route cables under
the aperture, keep the distance about 100
mm.
Overhead/side
Cabling Mode
Network Cabinet Aperture
Cable
≥100mm
When installing a device outdoors, add an outdoor cabinet whose protection standard is higher
than or equal to IP55 to protect the device.
When installed in environment C, the equipment needs to be installed in an APM30H or
OMB outdoor cabinet, which keeps the equipment fully isolated from the outside
environment. Environment C involves the following cases:
l Outdoor area close to a pollution source
l Environment with only simple shields such as awnings
l Place on the sea
NOTE
An area close to a pollution source refers to an area where saline water such as the sea or a salina is within 3.7
km away from it, where a heavy pollution source such as a metallurgical plant, coal mine, or thermal power
plant is within 3 km away from it, where a medium pollution source such as a chemical plant, rubber plant, or
electroplating factory is within 2 km away from it, or where a light pollution source such as a food factory,
leather factory, or heating boiler is within 1 km away from it.
Ensure that all cable apertures for external cables are sealed properly. Waterproof plugs must
be used when the device is installed in an outdoor cabinet.
If the cabinet is installed outdoors or in a corridor that is exposed to rain, the cabinet must
meet the requirements of IP55 rating protection. ("IP" indicates International Protection
Rating. The first number "5" refers to the rating for preventing the solid particle from entering
the cabinet. That is, ingress of dust is not totally prevented, but dust shall not penetrate in a
quantity to interfere with satisfactory operation of apparatus or to impair safety. The second
number "5" refers to the rating for preventing water from entering the cabinet. That is, water
projected in jets against the enclosure from any direction shall have no harmful effects.)
For example, test conditions/parameters of IP X5: flow: 12.5 L/minute±5%; distance: 2.5 - 3
m; spray duration: 1 minute/m2, at least 3 minutes.
The space for routing power cables, optical fibers, and subscriber cables are planned properly
in the outdoor cabinet. Various types of cables are routed separately and the cables do not
cross over each other. The positions of the MDF and the ODF are proper to ensure that the
cable length is proper after the device is installed.
The fiber management tray is installed in a proper position beyond the air exhaust vent.
When devices are installed in an outdoor cabinet, they cannot block the internal air vents. A
distance of at least 50 mm must be reserved between adjacent devices.
Place the battery and device in different compartments of the outdoor cabinet to protect the
device against corrosion.
An APM30H cabinet must run with ambient temperature ranging from -40ºC to 45ºC. If the
cabinet has to run with ambient temperature below -20ºC, a heater is required.
This chapter describes the installation process and installation mode of the PTN equipment in
an IMB network cabinet.
3.1 Tools and Instruments
This section describes the tools and instruments that need to be prepared before installation.
3.2 Overview of IMB Network Cabinet
This section describes the IMB Network Cabinet.
3.3 Dimensions and Installation Clearance Requirements
This section describes the dimensions, installation clearance requirements and minimum
clearance for the IMB mounted on the wall.
3.4 Installation Process
This section describes the process of installation.
3.5 Installing the IMB on the Wall
The IMB can be side-mounted or back-mounted on the wall.
3.6 Installing Devices in the IMB
3.7 Installing and Routing Cables
This section describes the cable installation process and the expected effect of cables
installation.
3.8 Hardware Installation Checklist
After the IMB is installed, you must check the hardware installation.
3.9 Power-On Inspection
After installation, you need to inspect the equipment after powering on it. For the inspection
method, see the description about equipment power-on in the OptiX PTN 960 Quick
Installation Guide.
3.10 Installing the Cover Plate for the IMB
This section describes the procedure for installing the cover plate for the IMB.
Adjustable wrench (capacity Socket wrench (M10 and Torque wrench (30 N·m to
≤ 19 mm) M12) 50 N·m)
(1) NO STEPPING sign (2) Protection plate (3) Slot assignment label (4) Cover plate
Dimensions
Figure 3-2 shows the dimensions of the IMB.
Figure 3-3 Installation clearance requirements for the IMB right-side-mounted on the wall
Figure 3-4 Installation clearance requirements for the IMB left-side-mounted on the wall
Figure 3-5 Installation clearance requirements for the IMB back-mounted on the wall
Install cables
Powering On the
Equipment
End
The IMB can be side-mounted or back-mounted on the wall. The side-mounted mode can be
classified into left-side-mounted mode and right-side-mounted mode. Figure 3-7 shows the
installation options.
(a) Right-side-mounted on the wall (b) Left-side-mounted on the wall (c) Back-mounted on the wall
Context
NOTE
The installation procedure of the IMB left-side-mounted on the wall is the same as the procedure of the
IMB right-side-mounted on the wall. The following description is based on the IMB right-side-mounted
on the wall.
Procedure
Step 1 Remove the protection plate from the bottom of the IMB, as shown in Figure 3-8.
NOTE
After all cables are routed, cut parts of the protection plate to seal cable holes if there is spare space in
the cable holes.
Step 2 Install the mounting ears on the IMB, as shown in Figure 3-9.
Step 3 Use a level to check that the two anchor holes on the marking template are on a horizontal
plane, place the marking template against the wall, and then use a marker to mark anchor
points, as shown in Figure 3-10.
Holes marked A are used as anchor points. The distance between the marking plate and the
ground is 1000-1200 mm.
NOTICE
The bolts in the wall must bear a stress of a minimum of 1.25 kN.
Step 4 Drill holes at the anchor points, and then install expansion bolt assemblies, as shown in
Figure 3-11.
Figure 3-11 Drilling holes at the anchor points and installing expansion bolt assemblies
Step 5 Place the IMB onto the two bolts at the upper anchor points, and then use a torque wrench to
pre-tighten the two bolts until a 20-30 mm length of each bolt is reserved out of the wall, as
shown in Figure 3-12.
NOTE
Tighten the two bolts at the lower anchor points prior to the bolts at the upper anchor points, and ensure
that the subrack is vertical.
Step 6 Align the mounting ears at the lower part of the IMB with the anchor holes, and then use a
torque wrench to tighten the bolts, as shown in Figure 3-13.
Figure 3-13 Tightening the bolts at the lower part of the IMB
----End
Procedure
Step 1 Remove the protection plate from the bottom of the IMB, as shown in 3.5.2 Installing the
IMB on the Wall (Side-Mounted).
Step 2 Install the mounting ears on the IMB, as shown in Figure 3-14.
Step 3 Use a level to check that the two anchor holes on the marking template are on a horizontal
plane, place the marking template against the wall, and then use a marker to mark anchor
points, as shown in Figure 3-15.
Holes marked B are used as anchor points. The distance between the marking plate and the
ground is 1000-1200 mm.
NOTICE
The bolts in the wall must bear a stress of a minimum of 1.25 kN.
Step 4 Drill holes at the anchor points, and then install expansion bolt assemblies, as shown in 3.5.2
Installing the IMB on the Wall (Side-Mounted).
Step 5 Place the IMB onto the two bolts at the upper anchor points, and then use a torque wrench to
pre-tighten the two bolts until a 20-30 mm length of each bolt is reserved out of the wall, as
shown in Figure 3-16.
NOTE
Tighten the two bolts at the lower anchor points prior to the bolts at the upper anchor points, and ensure
that the subrack is vertical.
Step 6 Align the mounting ears at the lower part of the IMB with the anchor holes, and then use a
torque wrench to tighten the bolts, as shown in Figure 3-17.
Figure 3-17 Tightening the bolts at the lower part of the IMB
----End
Procedure
Step 1 Slide the chassis along the guide rails into the corresponding slot on the right of IMB until it
is fully engaged, and then tighten the four M6x12 bolts on the panel, as shown in Figure
3-18.
NOTICE
Make sure that the fan unit of the PTN equipment is on the top of the PTN equipment.
----End
Procedure
Step 1 Slide the AC/DC power device along the guide rails into the corresponding slot on the left of
IMB until it is fully engaged, and then tighten the four M6 x 12 bolts on the panel, as shown
in Figure 3-19.
NOTICE
Ensure that the port for external power input is at the bottom of the AC/DC power device.
NOTE
In the DC power supply scenario, the PTN device is required. In the AC power supply scenario, the AC/DC
power device and PTN device are required.
----End
Start
Installing Fibers
End
NOTICE
l You must prepare cables according to actual cable routes during the installation.
l On site, tailor the 10 m long ground cable and make a suitable connector at each end, as
required.
l Attach engineering labels to both ends of each cable after the cable is installed.
Figure 3-21 Cable connections in the external AC/DC power supply scenario
7
6
2 1
NOTE
During equipment installation, bundle power cables if they are too long.
1. Install ground cable for the IMB network cabinet. Then install ground cable for the
AC/DC power device and PTN equipment.
2. Install external power cables for the AC/DC power device.
3. Install power cables between the AC/DC power device and PTN equipment.
4. Install E1 cables.
Figure 3-22 Cable connections in the embedded AC/DC power supply scenario
6
5 7
1. Install ground cable for the IMB network cabinet. Then install ground cable for PTN
equipment.
2. Install power cables for PTN equipment.
3. Install E1 cables.
4. Install Ethernet cables.
5. Install fibers.
(1) Ground cable for the IMB (2) External power (3) Ground cable for the
network cabinet cables PTN equipment
(4) Power cables for the PTN (5) E1 cables (6) Ethernet cables
equipment
(7) Fibers - -
NOTICE
l During equipment installation, all signal cables need to be routed in underfloor mode and
then be led out of the chassis. If the cables are routed in overhead mode, water vapor is
condensed to water, which flows to the cabinet along the cables and then corrodes the
boards. As a result, the boards are short-circuited.
l When the IMB network cabinet is installed on the wall, the bending radius of the fibers let
out of the network cabinet must be no less than 40 mm so as to avoid over-bending.
l When routing the power and PGND cables on the bottom of the IMB network cabinet,
ensure that the holes for heat dissipation are not covered.
l After routing the cables for the equipment, bundle all the cables at the outlet of the cabinet,
avoiding stress generated on the internal cable connectors when the external cables are
pulled.
l Lead fibers out of the cabinet outlet using winding pipes and bundle the winding pipes
instead of the fibers using cable ties.
SN Item
2 The devices are securely installed, and all the bolts are tightened.
3 All the power cables and PGND cables are not short-circuited or
reversely connected. In addition, no damaged or broken parts exist.
5 The lugs at both ends of the power cable or the PGND cable are securely
soldered or crimped.
SN Item
6 The bare wire and OT terminal at the wiring terminal are tightly
wrapped with the insulation tape or heat shrink tubing.
7 The working grounding and protection grounding of the base station and
the surge protection grounding of the building share one group of
grounding conductors.
9 The distance between the bundled fiber and the BBU panel is between
40 mm and 70 mm.
10 Labels are correct, legible, and complete on both ends of each cable.
Procedure
Step 1 Fit the tabs on the cover plate into the slots in the IMB, as shown in Figure 3-23.
Step 2 Tighten the M3×8 bolt on the bottom of the cover plate for the IMB to 0.3 N·m using a
Phillips torque screwdriver, as shown in Figure 3-24.
----End
This chapter describes the general installation guidelines on unpacking and inspecting
equipment, checking optical fiber connections, equipment grounding regulations, engineering
labels, cable routing and bundling, and making and testing cable connectors.
4.1 Unpacking Inspection
When a project starts, the project supervisor should work with the customer to unpack and
inspect the delivered equipment.
4.2 Installing Chassis
The installation modes for chassis vary with installation environment.
4.3 Installing Boards
Generally, the chassis for delivery has boards installed. If boards need to be delivered
separately, install the boards by following guidelines stated in this chapter.
4.4 Checking Tail Fiber Connection
This section describes how to check the fiber connection by using an optical interface.
4.5 Grounding Specifications
Suitable grounding helps to avoid accidental personal injury and guarantee the safe running of
the equipment, and provide EMC shielding to improve the quality of service (QoS).
4.6 Engineering Labels
Engineering labels are affixed to both ends of various cables to identify the physical positions
of cables on different devices. There are two types of engineering labels, specialized for the
power cables and signal cables respectively.
4.7 Requirements of Cabling and Bundling
This chapter describes the requirements of cabling and bundling the cables.
4.8 Binding Strap
This chapter introduces the architecture and usage of the binding strap, as well as precautions
for bundling the optical fibers.
4.9 Assembling and Testing the Cable Connector
This section describes how to assemble the cable connector and how to test the connectivity
of the cable.
Prerequisites
The chassis must be delivered to the site.
Precautions
NOTICE
l Integrated circuits (ICs) are sensitive to electrostatic discharge from the human body.
When handling boards or metallic parts of the equipment, wear ESD gloves and hold only
the edges of the boards during operation.
l If the equipment is transported from a cold and dry place to a warm and damp place, wait
at least 30 minutes before unpacking it. Otherwise, the moisture condenses on the board
surface and damages the components.
Procedure
Step 1 Transport the packing box to the equipment room.
Step 2 Check the packing box, and stop unpacking it in any of the following cases:
l The outer package is severely damaged.
l There is water leakage on the outer package.
Find the causes and provide feedback to the local representative office of Huawei.
Step 3 Observe the labels on the carton to check the equipment configuration and take a record.
Step 4 Cut the strap with the diagonal plier and then split the adhesive tape properly along the seam
between the cover and the body of the box with the paper knife. Do not scratch the articles
inside the box. See Figure 4-1.
Step 5 Open the carton and take out the chassis box from the carton.
Step 6 Open the chassis box and take out the chassis. Then, check whether the chassis is damaged.
----End
Prerequisites
None
l Paper knife
Background Information
Generally, the board has been installed in the chassis properly before delivery and is shipped
together with the chassis. If a carton is used to pack boards for shipping, unpacking and
checking are necessary when the boards arrive at the destination. (Generally, a carton is used
when boards are required for capacity expansion.) The boards are put into shielding bags for
transportation. Take ESD protection measures when you unpack the boards to prevent damage
to them.
Precautions
NOTICE
Electronic circuits and components are extremely sensitive to electrostatic discharge (ESD).
When handling circuit boards, make sure that you wear a securely grounded ESD wrist strap
or ESD gloves, and only hold the edge of boards during operation.
Procedure
Step 1 Wear a securely grounded ESD wrist strap (or ESD gloves) and make sure that it is securely
grounded. Check the packing box of the board and make sure it is intact without any damage.
Step 2 Cut the straps with diagonal pliers and use a paper knife to split the tape along the seam
between the cover and the box body. See Figure 4-2.
NOTICE
Do not cut too deep into the carton with the paper knife. Otherwise, the knife might scratch
the articles inside.
Board box
Strap
Carton label
Cushon foam
Board box
Board Shielding bag
NOTE
l Each board is packed in both a cushion foam and a shielding bag. Keep the bags properly. They can
be used later for keeping the boards or packing the damaged boards returned for repair.
l The ambient temperature and humidity may have an impact on the boards. In each shielding bag
there is a small bag of desiccant, which shall not be thrown away.
l Wait for at least 30 minutes before unpacking if the board is just moved from a cold, dry place to a
warm, damp place. Otherwise, moisture will condense on the board surface and damage the
components.
Step 3 Open the carton and check whether the number and type of the boards are consistent with
what is marked on the carton label.
Step 4 Check that there is no evident damage on the board package.
Step 5 Open the board box and take the board out of the shielding bag.
l Hold the bottom of the shielding bag with the left hand.
l Take the board out of the bag gently by its front panel with the right hand.
l Do not touch any electronic component on the board surface to avoid damage.
l Keep the bags properly.
Step 6 Check whether the board is physically damaged or is not in line with the packing list. Table
4-1 lists the checklist. In this case of any damage to the board, contact local representatives of
Huawei.
Step 7 If no problem is found, put the board back into the board box and put it in the place specified
by the customer.
l If you are going to install the board right after unpacking, place the board on an ESD
surface to discharge the static electricity.
l If you are going to install the board at a later time, pack the board using the original
materials and place them at a cool dry place without direct sunshine or strong
electromagnetic radiation.
----End
NOTE
For details on the structure and dimensions of each mounting ear, see the OptiX PTN 960 Hardware.
Prerequisites
The chassis must be installed correctly.
Procedure
Step 1 Connect the ESD wrist strap to the ESD jack on the chassis. Then, wear the ESD wrist strap.
Step 2 If a slot is covered with a filler panel, loosen the two captive screws using a screwdriver until
the screws spring out. Then, remove the filler panel.
Step 3 Rotate the ejector levers on the front panel of the board to the open position with both hands.
Step 4 Push the board gently into the slot along the guide rails. Then, push the front panel of the
board up to end when the board engages with the socket on the backplane. See Figure 4-4.
Button
Step 5 Rotate the ejector levers to the close position. Figure 4-5 shows the expected insertion of the
board.
Step 6 Tighten the captive screws on the board, as shown in Figure 4-5. Installation of the board is
complete.
----End
Prerequisites
The fibers or cables connected to the board must be removed.
Precautions
CAUTION
Removing a working board may affect the equipment or interrupt services.
Procedure
Step 1 Wear the ESD wrist strap properly.
Step 2 Loosen the captive screws on the front panel with the Phillips screwdriver until the screws
spring out. Then, rotate the ejector levers of the board to the open position with two hands
when the board disconnects to the socket. See Figure 4-6.
Step 3 Remove the board with stable force. See Figure 4-6.
Button
Step 4 The removed board must be put into an ESD box or ESD bag. If the empty slot does not
house any other board, install a filler panel onto the slot according to 4.3.3 Installing a Filler
Panel.
----End
Prerequisites
None
Procedure
Step 1 Cover the filler panel onto the empty slot.
----End
Prerequisites
The fiber must be installed and routed from the optical interface to the ODF.
On the power supply device side, the power switch must be turned on.
Short fiber
Precautions
DANGER
Avoid direct eye exposure to laser beams when connecting the fiber.
Figure 4-7 Connection diagram for checking fiber connection by using an optical interface
External cable
Fiber jumper
connected to
the out port
ODF
Procedure
Step 1 On the chassis side, remove the fiber that connects to the OUT port of an optical interface
board.
Step 2 Connect the optical power meter to the OUT port of the optical interface through the fiber.
Step 3 Turn on the optical power switch and set the working wavelength according to the optical
interface type. The optical power meter reads that the launched optical power of the optical
interface board is A.
Step 4 Recover the fiber connection to the OUT port.
Step 5 On the ODF side, remove the fiber that connects to the OUT port. Connect the fiber to the
optical power meter. The tested optical power is B.
Step 6 Remove the fiber from the corresponding OUT port of the optical interface board. The optical
power meter reads the LO state and receives no optical signals.
Step 7 Compare A with B.
l If the deviation between A and B is less than 1 dB, it indicates that the fiber is correctly
connected and the attenuation of the fiber is within the normal range.
l If the deviation between A and B is more than 1 dB, make sure the fiber is fine and
correctly routed, and then check whether the fiber terminal is clean.
NOTICE
If the fiber is connected through a flange, the deviation between A and B should be less than 2
dB. Otherwise, it indicates that the fiber is incorrectly connected and the attenuation of the
fiber is not within the normal range. Make sure that the fiber is fine and correctly routed, and
then check whether the fiber terminal is clean.
Step 9 Recover the fiber connections on the chassis side and ODF side.
----End
No. Description
2 Cable racks, equipment frames and enclosures, metallic air ducts and doors and
windows in the equipment room should be grounded.
3 All the metallic equipment units that are normally neutral should be grounded.
4 The ground cables should firmly contact with the ground bar in the equipment.
No. Description
1 Usually, the earth resistance of the telecommunication site where the base station
equipment is located is recommended to be less than 10 ohm. It also should comply
with the relative stipulation of the country.
2 The PGND of the equipment should be connected to the nearby ground bar (user-
supplied). Copper-core conducting cable with green-yellow plastic insulation cover
should be used.
3 The grounding terminals at the front door, rear door and side panels of the cabinet
should be separately connected to the grounding post of the cabinet.
5 The cabinets contact the adjacent cabinets in a row through the fixing bolts and
washers on the cabinet top.
6 When the cabinets of the same type are connected, cables not longer than 300 mm
should be used to connect the ground busbars of adjacent cabinets, if these busbars
exist. The cross-sectional area of the short cables is required to be 6 mm2. Two ends
of the short cable should be secured to the terminals of the ground bar.
2 A C-level AC lightning protector with rated current not less than 20 KA should be
installed at the AC power cable inlet of the equipment room.
No. Description
6 The working ground and PGND of DC power system and the PGND of switching
equipment should finally connect to the same grounding electrode. Grounds of
telecommunications equipment and office power in equipment room should be
bonded to the ground bar in the same equipment room.
No. Description
1 In the case that the digital trunk line of the transmission equipment connects to the
wireless base station, no matter directly or indirectly, then E1 lightning protector
should be installed in the corresponding interface of the transmission equipment.
2 The outside cable should have metallic protection cover and two ends of the cover
should be well grounded. The end in the equipment room can be connected to the
ground bar in the equipment room. Lightning protector should be installed in the
interface connecting the coming cable. The ground cable of the lightning protector
should be as short as possible.
3 Both the outer conductor of coaxial cable and the metal shield of shielded cable
should firmly contact with the metal surface of the target equipment.
4 Idle wire pair in the signal cable should be grounded in the equipment room.
5 The TDA tone cable should pass through the main distribution frame (MDF) that
has a security unit before it goes out the office. Metal shield of the cable should
connect to the PGND of the MDF. The MDF and the cabinet should share the same
grounding electrode.
6 Overhead signal cables in the telecommunications office or mobile base station area
is not allowed.
2 Ground cables should not be routed into the equipment room through overhead
cable trays. They should be routed under ground or inside the room.
4 The PGND cable should use copper-core conducting cable with green-yellow
plastic insulation cover.
5 The neutral wire of the AC power cable should not connect to the PGNDs of the
telecommunications equipment in the equipment room.
6 The PGND cable should be as short as possible (no more than 30 m). Otherwise, the
user should adjust the position of ground bar.
NOTE
In case there is special requirement from the user of the equipment on the description method of the
labels, the labels should be printed accordingly. However, this must be stated in the self-check report.
4.6.1.1 Material
This section describes the requirements for the thickness, color, materials, ambient
temperature, and fill-in method of the labels.
l Material: Polyester (PET), with UL and CSA certifications
l Color: chalk white
l Thickness: 0.09 mm
l Ambient temperature: - 29 to 149 degrees Celsius
l Laser printing or handwriting with oiliness markers
84.0
7.5
7.0
5.5
5.5 (2)
11.0 10.0
11.0 TO:
1.5
(2)
(1)
0.6
5.5
5.5
7.0 1.0
7.5
(1)
37.0 2.0
Unit:mm
The dividing lines on the label help to specify more clearly the position of a cable. For
example, there is one between the cabinet number and the frame number and another one
between the frame number and the slot number. The dividing line is 1.5 mm x 0.6 mm in size
with the color of PONTONE 656c (light blue).
The cut dotted line helps to fold the label when affixing it to the cable, and its size is 1.0 mm
x 2.0 mm.
There is a mark "TO:" (upside down in the figure) at the lower right corner of the label. The
mark is used to identify the opposite end of the cable on which the label is affixed.
10 R1.0
26.2
TO:
12.2 11
0.6 (2) 25
(1) 1.5
100
0.6
(3)
Area 1 Area 3
Area 2 TO:
Seen from the cabling end of the equipment, the text part of the label is on the right side of the
cable. The side with "TO:" that is facing outside carries the location information of the
opposite end, and the other side carries the location information of the local end. Therefore,
the information in Area 1 at one end is the same as the information in Area 2 at the other end
of the cable, and vice versa. In other words, the local information at one end is called the
opposite information at the other end.
4.6.2.3 Remarks
To use labels, focus on the following points.
l When printing/writing and affixing labels, pay attention to keep the labels clean.
l Since the label paper is made of moistureproof and waterproof material, ink-jet printers
and ink pens are forbidden for printing and writing labels.
l Labels should be affixed with good order in alignment.
l Cable ties should be bundled in the same position of power cables, with identification
plates on the same side.
l The positions of "up", "down", "right" or "left" are all based on the viewpoint of the
engineering person who is working on the label.
1. Cell 2. Cell
l The settings of centered characters, direction, and fonts should not be changed.
l When there are too many characters to be filled in, zoom out the characters, but make
sure the printouts are clear and legible.
To merge the cells, you should first recover the table structure (if gridlines are displayed, you
can start from Step 3 directly).
1. Select the menu item Edit >Select All.
2. Select the menu item Format > Borders and Shading >Borders. Select Box and click OK.
3. Drag the mouse to select the cells to be merged and select the menu item Table > Merge
Cells.
If two merged cells are still not enough to accommodate the characters, use multiple lines.
3. If the warning prompt as shown in Figure 4-12 appears before printing, click Ignore to
continue the printing.
If the printout conforms to the requirement, print it to label paper. If the printout does not
conform, adjust the page setup and try the printing again, until the correct printout is
produced. The method of adjusting the page setup is as follows:
After the page setup has been made correct, save it for future use. This page setup is only
necessary the first time you use the template to print the labels.
l All the printouts must be on the label, and nothing should be printed on the bottom page
of the label.
l Contents in the cells should be aligned in the center. In a single-line printout, the
dividing lines and the mark "TO:" should not be covered by the printed characters.
l When the cells are merged and the printouts are made in multiple lines, avoid covering
the mark "TO:" when printing the texts by using the space bar to move the printing
contents to the next line.
NOTICE
Different from the ordinary paper, the label paper is composed of two pages. No matter what
model of printer you are using, feed in the labels one after another by hand. Never use the
auto-feed mode in order to avoid jamming the labels. Different models of printers may have
different feeding modes, make sure to feed in the labels correctly.
Writing pen
Use the black oiliness markers to write the labels.
In special cases, black ball-pens are allowed, although not recommended. When writing with
the ball-pen, take care not to leave the oil on the label, which may contaminate the label and
blur the words.
NOTE
The delivered marker has two nibs. Make sure to use the smaller nib to write the labels.
Handwriting
For easy recognition and good-looking, the font in handwriting should be close to the
standard typeface as much as possible. Table 4-9 shows the standard typeface.
9 A B C D E F G H
I J K L M N O P Q
R S T U V W X Y Z
The font size depends on the number of figures and letters. The words must be medium-sized,
legible, tidy and good-looking.
Writing direction
Write the characters in proper size, and the direction is shown in Figure 4-13.
TO:
The steps to attach the label to the cable are shown in Figure 4-14 The finished labels should
be on the right or top of the cables, according to different cabling methods. The left part of the
figures shows the method to attach the label when the cable is laid vertically, while the right
part of the figures shows the method to attach the label when the cable is laid horizontally.
NOTE
In special cases, for example, to avoid cable bent or affecting other cables, other positions are allowed to
attach the labels.
l Stick the label to the proper position on the cable, fold the narrow part of the label
according to the directions shown in Figure 4-14.
Figure 4-14 Sticking the label onto proper position of the signal cable
2
TO:
A03 33 33 33 33
1. Cable 2. Label
The length of the narrow part is based on an external cable diameter of 2.6 mm, after this part
has been stuck to the back of the label, it may not overlap the entire printed part.
l Fold the printed part along the dotted line according to the directions shown in Figure
4-14.
l After the printed part of the label has been folded, the narrow part of the label should be
covered completely, as shown in Figure 4-14.
Cable
TO:
B03
TO:
B03 -48V2
-48V2
Cable
l All cables should be arranged neatly, with their sheaths remaining intact.
l Communication cables, such as alarm cables, network cables and clock cables, should be
arranged separately with the power cable and optical fibers.
l Turnings of the cable should be smooth, with the bend radius reaching 60 mm or above.
l Any damage to the insulation layer of the conducting line is not allowed.
l The cable arrangement should take the future maintenance and capacity expansion into
consideration.
NOTICE
To avoid any human-caused accidents, read this chapter carefully before bundling the fiber
jumpers.
4.8.1.1 Architecture
The binding strap fulfills its locking function by cooperation of these two sides.
The binding strap for optical fiber is 12.7 mm wide, with one hook side (transparent
polypropylene material) and one mat side (black nylon material).
Prerequisites
None
Precautions
NOTE
When you use a binding strap, keep the mat side inside and the hook side outside.
Procedure
Step 1 Arrange the optical fibers into a bundle.
Step 2 Cut off a piece of binding strap of appropriate length according to the size of the bundle.
Step 3 Hold the fiber bundle with one hand and press one end of the binding strap on the bundle with
the thumb.
Step 4 Strain the binding strap by the other end with the other hand, as shown in Figure 4-18.
Step 5 Turn the binding strap around the fiber bundle with appropriate strain till the mat side adhibits
the hook side snugly, as shown in Figure 4-19.
----End
4.8.2.3 Precautions
Bundle the fibers as the follow items.
l It is only the mat side of the binding strap that contacts the optical fiber.
l Arrange the optical fibers tidily into a bundle before bundling.
l Bundle the optical fibers with appropriate tightness. Never bind them too tight.
l The space between two binding straps should not exceed 25 cm.
4.9.1.1 Assembling the Straight BNC Male Connector with the Coaxial Cable
This section describes how to assemble the straight BNC male connector with the coaxial
cable.
Prerequisites
None
Crimping sleeve
Connector
External conductor of
the coaxial cable
Protection tube of the coaxial cable
Internal conductor
of the coaxial cable
Procedure
Step 1 Strip off the sleeve of the coaxial cable according to the coaxial cable materials and sizes
shown in Figure 4-22. The external conductor, insulation layer and internal conductor should
be exposed as shown in Figure 4-22. Table 4-10 lists the recommended length of the reserved
external conductor (L1), reserved insulation layer (L2) and stripped sleeve (L3).
External conductor
of the coaxial cable
Insulation layer of
the coaxial cable Protection tube of
the coaxial cable
Internal conductor L1
of the coaxial cable L2
L3
NOTICE
l When stripping off the sleeve of the coaxial cable, do not scratch the external conductor.
l You can also determine the stripping size according to the size of the connector. Refer to
Figure 4-23.
Figure 4-23 Size of the straight BNC male connector and the stripping size of the coaxial
cable
L1 L1
L2 L2
L3 L3
Step 2 Successively lead the heat shrink tubing and crimping sleeve through the coaxial cable, as
shown in Figure 4-24.
Figure 4-24 Leading the heat shrink tubing and crimping sleeve
Protection tube of
the coaxial cable
External conductor Heat shrink tube
of the coaxial cable
Crimping sleeve
Step 3 Unfold the external conductor of the coaxial cable to a trumpet shape, as shown in Figure
4-25.
NOTE
If the diameter of the cable that matches the connector plug is 2.2 mm and that of the coaxial cable is 1.6 mm,
twist the external conductors of the coaxial cable as one. You do not need to unfold the external conductor.
Otherwise, it cannot be crimped tight.
External conductor
of the coaxial cable
Step 4 Insert the insulation layer and internal conductor into the connector plug of the coaxial cable.
The external conductor of the coaxial cable partly wraps the external conductor of the
connector, as shown in Figure 4-26.
Figure 4-26 Inserting the straight BNC male connector into the coaxial cable
Connetor
Step 5 Use a welding tool to weld the internal conductor of the coaxial cable with the internal
conductor of the coaxial cable connector, as shown in Figure 4-27.
Connector
Welding
Step 6 Push the crimping sleeve toward the connector. Crimp the external conductor of the coaxial
cable tight. Use a crimping tool to tighten the crimping sleeve and coaxial cable connector, as
shown in Figure 4-28.
NOTE
If the diameter of the cable that matches the connector plug is 2.2 mm and that of the coaxial cable is 1.6 mm,
crimp the external conductor of the coaxial cable twice by using the crimper with a jaw of 2.5 mm. That is,
crimp the external connector, rotate it by 90 degree, and then crimp it again.
Crimping sleeve
Step 7 Use a heat gun to blow the heat shrink tubing so that the tube can be tightly clad with the
crimping sleeve, as shown in Figure 4-29. In this way, the straight BNC male connector is
assembled with the coaxial cable.
----End
4.9.1.2 Assembling the L9-M Male Connector with the Coaxial Cable
This section describes how to assemble the L9-M male connector with the coaxial cable.
Prerequisites
None
Protection tube
of the connector
Crimping sleeve
Connector
External conductor
of the coaxial cable
Internal conductor Protection tube of
of the coaxial cable the coaxial cable
Insulation layer of
the coaxial cable
Procedure
Step 1 Strip off the sleeve of the coaxial cable according to the coaxial cable materials and sizes
shown in Figure 4-31. The external conductor, insulation layer and internal conductor should
be exposed. See Figure 4-31. Table 4-10 lists the recommended length of the reserved
external conductor (L1), reserved insulation layer (L2) and stripped sleeve (L3).
External conductor
of the coaxial cable
Insulation layer of
Protection tube of
the coaxial cable
the coaxial cable
Internal conductor of L1
the coaxial cable
L2
L3
NOTICE
l When stripping off the sleeve of the coaxial cable, do not scratch the external conductor.
l You can also determine the stripping size according to the size of the connector. Refer to
Figure 4-32.
Figure 4-32 Size of the connector and stripping size of the coaxial cable
L1 L1
L2 L2
L3 L3
Step 2 Lead the protection tube and crimping sleeve through the coaxial cable, as shown in Figure
4-33.
Protection tube
of the connector
Crimping
sleeve
Step 3 Unfold the external conductor of the coaxial cable into a trumpet shape, as shown in Figure
4-34.
NOTE
If the diameter of the cable that matches the connector plug is 2.2 mm and that of the coaxial cable is 1.6 mm,
twist the external conductors of the coaxial cable as one. You do not need to unfold the external conductor.
Otherwise, it cannot be crimped tight.
External conductor
of the coaxial cable
Step 4 Insert the insulation layer and internal conductor into the connector of the coaxial cable. The
external conductor of the coaxial cable partly wraps the external conductor of the connector,
as shown in Figure 4-35.
Figure 4-35 Inserting the coaxial connector into the coaxial cable
Connector
Step 5 Use a welding tool to weld the internal conductor of the coaxial cable with the internal
conductor of the coaxial connector, as shown in Figure 4-36.
Internal conductor
of the coaxial cable
Welding
Step 6 Push the crimping sleeve toward the connector. Crimp the external conductor of the coaxial
cable tight. Use a crimping tool to tighten the crimping sleeve and the coaxial cable connector.
See Figure 4-37. In this way, the straight L9-M male connector is assembled with the coaxial
cable.
NOTE
If the diameter of the cable that matches the connector plug is 2.2 mm and that of the coaxial cable is 1.6 mm,
crimp the external conductor of the coaxial cable twice by using the crimper with a jaw of 2.5 mm. That is,
crimp the external connector, rotate it by 90 degree, and then crimp it again.
Crimping 1
sleeve
----End
4.9.1.3 Assembling the Straight SMB Female Connector with the Coaxial Cable
This section describes how to assemble the straight BNC female connector with the coaxial
cable.
Prerequisites
None
Straight SMB female connector, whose components are shown in Figure 4-38.
Crimping sleeve
Connector
Protection tube of
the coaxial cable
External conductor
of the coaxial cable
Insulation layer of
the coaxial cable
Internal conductor
of the coaxial cable
Procedure
Step 1 Strip off the sleeve of the coaxial cable according to the coaxial cable materials and sizes
shown in Figure 4-39. The external conductor, insulation layer and internal conductor should
be exposed. See Figure 4-39. Table 4-10 lists the recommended length of the reserved
external conductor (L1), reserved insulation layer (L2) and stripped sleeve (L3). Then, twist
the external conductors of the coaxial cable as one.
External conductor
of the coaxial cable
Insulation layer of
Protection tube of
the coaxial cable
the coaxial cable
Internal conductor of L1
the coaxial cable
L2
L3
NOTICE
l When stripping off the sleeve of the coaxial cable, do not scratch the external conductor.
l You can also determine the stripping size according to the size of the connector, as shown
in Figure 4-40.
Figure 4-40 Size of the connector and the stripping size of the coaxial cable
L1 L1
L2 L2
L3 L3
Step 2 Lead the crimping tube through the coaxial cable, as shown in Figure 4-41.
Protection tube of
the coaxial cable
Crimping
sleeve
Step 3 Unfold the external conductor of the coaxial cable into a trumpet shape, as shown in Figure
4-42.
NOTE
If the diameter of the cable that matches the connector plug is 2.2 mm and that of the coaxial cable is 1.6 mm,
twist the external conductors of the coaxial cable as one. You do not need to unfold the external conductor.
Otherwise, it cannot be crimped tight.
External conductor of
the coaxial cable
Step 4 Insert the insulation layer and internal conductor into the connector of the coaxial cable. The
external conductor of the coaxial cable partly wraps the external conductor of the connector as
shown in Figure 4-43.
Figure 4-43 Inserting the coaxial connector into the coaxial cable
Connector
Step 5 Use a welding tool to weld the internal conductor of the coaxial cable with the internal
conductor of the coaxial connector, as shown in Figure 4-44.
Connector
Welding
Step 6 Push the crimping sleeve toward the connector. Crimp the external conductor of the coaxial
cable tight. Use the crimper to tighten the crimping sleeve and the coaxial cable connector, as
shown in Figure 4-45. In this way, the straight SMB female connector is assembled with the
coaxial cable.
NOTE
If the diameter of the cable that matches the connector plug is 2.2 mm and that of the coaxial cable is 1.6 mm,
crimp the external conductor of the coaxial cable twice by using the crimper with a jaw of 2.5 mm. That is,
crimp the external connector, rotate it by 90 degree, and then crimp it again.
Crimping
sleeve
----End
Prerequisites
During the process of routing or bundling cables, and installing the connector, the circuit on
the cable may become open or broken. Hence, after the preceding procedures are completed,
test the connectivity of cables.
Background Information
In this section, the cable has an Anea 96 connector at one end and a group of SMB connectors
at the other, as shown in Figure 4-46. This section describes how to test the cable
connectivity by using a multimeter.
Procedure
Step 1 Set the multimeter to the resistance gear.
Step 2 On the SMB connector side, connect the two probes of the multimeter to the internal and
external conductors respectively.
Step 3 According to the pin sequence table of the connector, use a shorting stub to cause a short
circuit between the two pins corresponding to the SMB connectors. See Figure 4-46.
R0
Step 5 Remove the shorting stub from the connector. Observe the multimeter, which should read
resistance of infinite ohms.
Step 6 Repeat Steps 2 - 5 to test the other SMB connectors.
----End
4.9.2 Assembling the RJ45 Connector with the Ethernet Cable and
Testing the Connectivity
This section describes how to assemble the RJ45 connector with the shielded Ethernet cable
or non-shielded Ethernet cable, and how to test the cable connectivity and network cable
connection.
Figure 4-47 shows the pin assignment of the straight through network cables.
White or White or
Pin 1 orange orange Pin 1
White or White or
Pin 3 Pin 3
green green
White or White or
Pin 5 blue blue Pin 5
White or White or
Pin 7 Pin 7
brown brown
Pin 8 褐色
Brown Brown Pin 8
Table 4-13 lists the pin assignment of the straight through network cables.
White or White or
Pin 1 orange green Pin 1
White or White or
Pin 3 orange Pin 3
green
White or White or
Pin 5 blue blue Pin 5
White or White or
Pin 7 Pin 7
brown brown
Pin 8 褐色
Brown Brown Pin 8
Pin8
Pin1
4.9.2.2 Assembling the RJ45 Connector with the Shielded Ethernet Cable
This section describes the materials of the RJ45 connector for the shielded Ethernet cable and
the procedures of assembling the RJ45 connector with the shielded Ethernet cable.
Prerequisites
None
B
C
D
E
F
G
A Connector external sleeve B Connector metal sleeve C Connector cable tray D Connector plug
E Network cable sleeve F Network cable shield layer G Twisted pair cable - -
Procedure
Step 1 Lead the network cable through the connector external sleeve A, as shown in Figure 4-52.
Figure 4-52 Leading the network cable through the connector external sleeve
Step 2 Strip a 300 mm length of the external sleeve E and cut the nylon rip cord inside the external
sleeve. Make a 5 mm cut on the cable external sleeve, as shown in Figure 4-53.
Figure 4-53 Stripping the external sleeve of the twisted pair cable
E
Max.5
30.0
NOTICE
l When stripping the sleeve of the twisted pair cable, do not scratch the shield layer.
l When stripping the shield layer, do not scratch the insulation layer covering the twisted
cores.
Step 3 Lead the connector metal sleeve B through the twisted pair cable. The sleeve should envelop
the shield layer F, as shown in Figure 4-54.
Step 4 Lead the connector metal sleeve to the root of the twisted pair cable sleeve. Cut the shield
layer and aluminum foil straight along the edge of the metal sleeve without leaving any
aluminum wires. Expose the twisted pair G, which is about 20 mm long, as shown in Figure
4-55.
Figure 4-55 Stripping the shield layer of the twisted pair cable
20.0
Step 5 Lead the four pairs of twisted cables, which are marked in different colors, through the
connector cable tray C respectively according to the colors. See Figure 4-56 and Figure 4-57.
Figure 4-56 Leading twisted pair cables through connector cable tray
White-Orange
Orange
White-Green Blue
Green White-Blue
White-Brown
Brown
Step 6 Align the four pairs of twisted cables G on the connector cable tray C according to the
illustrated colors. See Figure 4-58 and Figure 4-59.
Figure 4-58 Aligning the four pairs of twisted cables on the connector cable tray
G C
Step 7 Cut the cables straight along the edge of the connector cable tray C, as shown in Figure 4-60.
G C
Step 8 Lead the connector cable tray through the connector body D, and rotate the metal shield shell
90 degree to push the cable tray inward, as shown in Figure 4-61.
Figure 4-61 Inserting the cable tray through the connector body
CAUTION
Make sure the connector cable tray is inserted to the bottom of the connector body.
Step 9 Move the connector metal shell B toward the connector body to envelop the connector body
and connector cable tray. Then, use the crimper to crimp the connector, as shown in Figure
4-62.
Step 10 Move the connector external sleeve A toward the connector body until the external sleeve A
hitches the connector metal shell. Then, the cable components at one end are made. See
Figure 4-63.
Step 11 A network cable may be either a crossover cable or a straight-through cable. Which
operations should be performed at the other end depends on the network cable type.
l To assemble a straight-through cable, repeat Steps 1-10 to make the cable components at
the other end.
l To assemble a crossover cable, perform the following operations.
a. Repeat Steps 1-4.
b. Repeat Steps 5-6. In Steps 5-6, for the wire sequence, refer to the mapping of the
crossover cables in Table 4-14.
c. Repeat Steps 7-10 to make the cable components at the other end.
----End
4.9.2.3 Assembling the RJ45 Connector with the Non-Shielded Ethernet Cable
This section describes the materials of the RJ45 connector for the non-shielded Ethernet cable
and procedures of assembling the RJ45 connector with the non-shielded Ethernet cable.
Prerequisites
None
Procedure
Step 1 Strip the twisted pair cable according to the illustrated size and cut a 16 mm length off the
sleeve, as shown in Figure 4-65.
.0
16 B
Step 2 Align the twisted pairs in sequence and match the colors according to Figure 4-66. Cut the
ends of the twisted pairs straight.
C
White-Orange
Orange
White-Green
Blue
White-Blue
Green
White-Brown
Brown
16
Step 3 Insert the cable B with the aligned twisted pairs into the connector plug A and crimp the
connector with a crimper, as shown in Figure 4-67.
Step 4 A network cable may be either a crossover cable or a straight-through cable. Which
operations should be performed at the other end depends on the network cable type.
l To assemble a straight-through cable, repeat Steps 1-3 to make the cable components at
the other end.
l To assemble a crossover cable, perform the following operations.
a. Repeat Step 1.
b. Repeat Step 2. In Step 2, for the wire sequence, refer to the mapping relationship of
the crossover cables in Table 4-14.
c. Repeat Step 3 to make the cable components at the other end.
----End
Prerequisites
None
Procedure
Step 1 Hold the crimped RJ45 connector and observe the side from the front. Check the height of
each metal contact slice. The standard height is 6.02 mm ± 0.13 mm. If no special test
instrument is available on site, compare the RJ45 connector with another well crimped RJ45
connector. Figure 4-68 and Figure 4-69 show an unqualified RJ45 connector and a qualified
RJ45 connector respectively.
NOTE
If the RJ45 connector does not meet the requirement, crimp the RJ45 connector again and make sure the
RJ45 connector meets the requirement.
Step 2 Hold the RJ45 connector and slant it to a 45-degree angle. Side-glance the top edge of each
metal contact slice. Figure 4-70 an unqualified RJ45 connector.
Step 3 Hold the RJ45 connector. Observe the side and front of the metal contact slice, and check for
any perceptible object, dirt or rust. Remove the perceptible object, dirt or rust, if there is any.
If the removal fails, replace RJ45 connector and assemble the connector again. Otherwise, the
connector is unqualified. See Figure 4-71.
Figure 4-71 Metal contact slices with perceptible object, dirt or rust on the surface
Step 4 Hold the RJ45 connector. Observe the side and front of the metal contact slices, and observe
the plastic spacers. Make sure they are intact and do not tilt. If they tilt or are not intact,
rectify the RJ45 connector. If the rectification fails, replace the RJ45 connector and assemble
the connector again. Otherwise, the connector is unqualified. See Figure 4-72.
Step 5 Hold the RJ45 connector and observe the side to check whether you can see the core section.
Make sure that the end of the cable core is close to the face of the cable trough of the
connector. The metal contact should be higher than the end of the cable core, and be properly
crimped to the cable core. If the RJ45 connector does not meet this requirement, replace the
RJ45 connector and assemble the connector again. Otherwise, the RJ45 connector is intact.
See Figure 4-73.
----End
Prerequisites
During the process of routing or bundling cables, and assembling the connectors, the circuit
on the cable may become open or broken. Hence, after the preceding procedures are
completed, test the connectivity of the cable.
Background Information
You can also use a multimeter to test the connectivity of the network cable according to the
core connections. For details, see 4.9.1.4 Testing Cable Connectivity.
Procedure
Step 1 Insert the RJ-45 connectors at the two ends of the assembled network cable into the RJ-45
female ports of the network cable tester in sequence.
Step 2 Make sure the RJ-45 connectors are inserted properly. Turn on the network cable tester and
start the test. In the case of the crossover cable and straight through network cable, the test
procedures are the same but the indicators at the two ends turn on in different sequences. Test
the crossover cable according to the core connections.
l In the case of the straight through network cable, the indicators at points 1, 8 and G turn
on in sequence. This indicates that the connectivity is fine and core connections are
correct.
l In the case of the crossover cable, the indicators at points 1, 8 and G of the main end turn
on in sequence, and the indicators at points 3, 6, 1, 4, 5, 2, 7, 8 and G of the subsidiary
end turns on in sequence. This indicates that the connectivity of the crossover cable is
proper.
NOTE
Turn the switch to position S to extend the interval for indicators to turn on. In this way, you can observe the
change more accurately. See Figure 4-74.
Step 3 Slightly shake the RJ45 connector of the assembled network interface and repeat Step 2.
Make sure that each metal contact slice of the RJ45 connector reliably contacts the core and
contacts the contact point of the female network port of the network cable tester.
----End
Prerequisites
none.
Heat gun
The components of ring terminals and power cables are shown in Figure 4-75.
A. Heat shrink tubing B. Ring terminal C. Insulation layer of power cable D. Conductor of power cable
Procedure
Step 1 Peel a part of the insulation layer C of a power cable according to the cross-section area of the
cable conductor. The conductor D with length L1 appears, as shown in Figure 4-76. The
recommended values of L1 are shown in Table 4-16.
C
L1
NOTICE
l When peeling the insulation layer of a power cable, do not hurt the metal conductor of the
cable.
l If the bare press-fitting terminal is not provided by Huawei, adapt the value of L1
according to the actual value L of the terminal. L1 = L + (1-2) mm.
1, 1.5, 2.5 7
4 8
6 9
10 11
16 13
Step 2 Put the power cable into heat shrink tubing A, as shown in Figure 4-77.
Step 3 Put the cable conductor into a ring terminal. And keep the ring terminal close to the insulation
layer C of the power cable, as shown in Figure 4-77.
Figure 4-77 Inserting the cable conductor into the ring terminal
L2
C
NOTICE
After the conductor is put into the ring terminal, the L2 part will extrude. The value of L2
should be less than or equal to 2 mm.
Step 4 As shown in Figure 4-78, press-fit the joint parts of the bare press-fitting terminal and the
conductor by a press-fitting tool.
Figure 4-78 Press-Fitting joint parts of a bare press-fitting terminal and a conductor
NOTE
The shapes of press-fit parts may vary with the types of the press-fitting dies.
Step 5 Push the heat shrink tubing A towards the connector till the tube covers the press-fit part.
Heat the heat shrink tubing using a heat gun, as shown in Figure 4-79.
NOTICE
Do not heat the heat shrink tubing for too long time. Otherwise, the insulation layer may be
damaged.
----End
Prerequisites
none.
A. Cold soldering terminal B. Insulation layer of power cable C. Conductor of power cable
B
C
A
Procedure
Step 1 Peel a part of the insulation layer B of a power cable according to the cross-sectional area of
the cable conductor. The conductor C with length L1 appears, as shown in Figure 4-82. The
recommended values of L1 are shown in Table 4-17.
L1
B
C
A
NOTICE
When peeling the insulation layer of a power cable, do not hurt the metal conductor of the
cable.
1, 1.5, 2.5 7
4 8
6 9
10 11
16 13
Step 2 Put the cable conductor into the cord end terminal A. Align the conductor with the edge of the
cord end terminal, as shown in Figure 4-83.
NOTICE
After the cord end terminal is assembled, the exposed part of the conductor should not be
more than 1 mm.
Step 3 Press-fit the joint parts of the cord end terminal and the conductor using soldering tool, as
shown in Figure 4-84.
Rough Flat
Step 4 After press-fitting the terminal, check the maximum width of the press-fit part. The width of
the tubular terminal after press-fit should be less than the maximum width described in Table
4-18
0.25 1
0.5 1
1.0 1.5
1.5 1.5
2.5 2.4
4 3.1
6 4
10 5.3
16 6
----End
A Glossary
Numerics
1+1 hot backup A backup mode in which two systems with the same functions are deployed, one in
the active state and the other in the standby state with power on. The standby system
backs up the data of the active system automatically. Once the active system
encounters a fault, the standby system takes over the service of the active system
automatically or by manual intervention.
1000BASE-T Twisted cable with the transmission speed as 1000 Mbit/s and the transmission
distance as 100 m.
100BASE-TX IEEE 802.3 Physical Layer specification for a 100 Mb/s CSMA/CD local area
network over two pairs of Category 5 unshielded twisted-pair (UTP) or shielded
twisted-pair (STP) wire.
10BASE-TX IEEE 802.3 Physical Layer specification for a 10 Mb/s CSMA/CD local area network
over two pairs of Category 5 unshielded twisted-pair (UTP) or shielded twisted-pair
(STP) wire.
A
AAL See ATM Adaptation Layer
ABR See available bit rate
AC See attachment circuit
access control list A list of entities, together with their access rights, which are authorized to have access
to a resource.
ACL See access control list
active link In the link aggregation group, the links connected to active interfaces are active links.
active/standby A troubleshooting technology. When an active device becomes faulty, services and
switchover control functions are automatically switched over to the standby device to ensure the
normal running of the services and functions.
address pool A set of IP addresses assigned by Internet Assigned Number Authority (IANA) or an
organization tied to IANA.
Address Resolution Address Resolution Protocol (ARP) is an Internet Protocol used to map IP addresses
Protocol to MAC addresses. It allows hosts and routers to determine the link layer addresses
through ARP requests and ARP responses. The address resolution is a process in
which the host converts the target IP address into a target MAC address before
transmitting a frame. The basic function of the ARP is to query the MAC address of
the target equipment through its IP address.
administrative unit The information structure which provides adaptation between the higher order path
layer and the multiplex section layer. It consists of an information payload (the higher
order VC) and an AU pointer which indicates the offset of the payload frame start
relative to the multiplex section frame start.
Administrator A user who has authority to access all the Management Domains of the EMLCore
product. He has access to the whole network and to all the management
functionalities.
ADSL See asymmetric digital subscriber line
advanced ACL An advanced ACL can define ACL rules based on the source addresses, target
addresses, protocol type, such as TCP source or target port, the type of the ICMP
protocol, and message codes.
AF See assured forwarding
aggregated link Multiple signaling link sets between two nodes.
aggregation A collection of objects that makes a whole. An aggregation can be a concrete or
conceptual set of whole-part relationships among objects.
AIS See alarm indication signal
alarm automatic When an alarm is generated on the device side, the alarm is reported to the Network
report Management System (NMS) . Then, an alarm panel prompts and the user can view the
details of the alarm.
alarm cascading The shunt-wound output of the alarm signals of several subracks or cabinets.
alarm cause A single disturbance or fault may lead to the detection of multiple defects. A fault
cause is the result of a correlation process which is intended to identify the defect that
is representative of the disturbance or fault that is causing the problem.
alarm clearance An operation performed on an alarm. Through this operation, the status of an alarm is
changed from uncleared to cleared, which indicates that the fault causing the alarm has
been rectified.
alarm indication signal A code sent downstream in a digital network as an indication that an upstream failure
has been detected and alarmed. It is associated with multiple transport layers.
alarm inversion For the port that has already been configured but has no service, this function can be
used to avoid generating relevant alarm information, thus preventing alarm
interference. The alarm report condition of the NE port is related to the alarm inverse
mode (not inverse, automatic recovery and manual recovery) setting of the NE and the
alarm inversion status (Enable and Disable) setting of the port. When the alarm
inversion mode of NE is set to no inversion, alarms of the port will be reported as
usual no matter whatever the inversion status of the port is. When the alarm inversion
mode of the NE is set to automatic recovery, and the alarm inversion state of the port
is set to Enabled, then the alarm of the port will be suppressed. The alarm inversion
status of the port will automatically recover to "not inverse" after the alarm ends. For
the port that has already been configured but not actually loaded with services, this
function can be used to avoid generating relevant alarm information, thus preventing
alarm interference. When the alarm inverse mode of the NE is set as "not automatic
recovery", if the alarm inversion status of the port is set as Enable, the alarm of the
port will be reported.
alarm mask On the host, an alarm management method through which users can set conditions for
the system to discard (not to save, display, or query for) the alarm information meeting
the conditions.
alarm name Alarm name is a brief description of the symptom of the failure related to this alarm.
Alarm notification When an error occurs, the performance measurement system sends performance
alarms to the destination (for example, a file and/or fault management system)
designated by users.
alarm parameter Alarm parameters describe the location where the fault has occurred. For example, for
an alarm on a board, the parameters include the shelf ID, slot ID and port ID.
alarm severity The significance of a change in system performance or events. According to ITU-T
recommendations, an alarm can have one of the following severities: Critical, Major,
Minor, Warning.
alarm status The devices in the network report traps to the Network Management System (NMS),
which displays the alarm statuses in the topological view. The status of an alarm can
be critical, major, minor and prompt.
alarm suppression A function used not to monitor alarms for a specific object, which may be the
networkwide equipment, a specific NE, a specific board and even a specific function
module of a specific board.
ALS See automatic laser shutdown
APS See automatic protection switching
ARP See Address Resolution Protocol
AS See Autonomous System
assured forwarding One of the four per-hop behaviors (PHB) defined by the Diff-Serv workgroup of IETF.
It is suitable for certain key data services that require assured bandwidth and short
delay. For traffic within the bandwidth limit, AF assures quality in forwarding. For
traffic that exceeds the bandwidth limit, AF degrades the service class and continues
to forward the traffic instead of discarding the packets.
asymmetric digital A technology for transmitting digital information at a high bandwidth on existing
subscriber line phone lines to homes and businesses. Unlike regular dialup phone service, ADSL
provides continuously-available, "always on" connection. ADSL is asymmetric in that
it uses most of the channel to transmit downstream to the user and only a small part to
receive information from the user. ADSL simultaneously accommodates analog
(voice) information on the same line. ADSL is generally offered at downstream data
rates from 512 Kbps to about 6 Mbps.
asynchronization Asynchronization does not use the exact data signals timed by the clock. The signals
have different frequencies and phases. The asynchronization usually encapsulates the
bits into the control flag, which specifies the beginning and end of the bits.
Asynchronous A protocol for the transmission of a variety of digital signals using uniform 53 byte
Transfer Mode cells. A transfer mode in which the information is organized into cells; it is
asynchronous in the sense that the recurrence of cells depends on the required or
instantaneous bit rate. Statistical and deterministic values may also be used to qualify
the transfer mode.
ATM See Asynchronous Transfer Mode
ATM Adaptation An interface between higher-layer protocols and the Asynchronous Transfer Mode
Layer (ATM). The AAL provides a conversion function to and from ATM for various types
of information, including voice, video, and data.
ATM PVC ATM permanent virtual circuit
attachment circuit The physical or virtual circuit attaching a CE to a PE.
attenuation Reduction of signal magnitude or signal loss, usually expressed in decibels.
AU See administrative unit
auto-negotiation An optional function of the IEEE 802.3u Fast Ethernet standard that enables devices
to automatically exchange information over a link about speed and duplex abilities.
automatic laser A technique (procedure) to automatically shutdown the output power of laser
shutdown transmitters and optical amplifiers to avoid exposure to hazardous levels.
automatic protection Capability of a transmission system to detect a failure on a working facility and to
switching switch to a standby facility to recover the traffic.
Autonomous System A network set that uses the same routing policy and is managed by the same
technology administration department. Each AS has a unique identifier that is an
integer ranging from 1 to 65535. The identifier is assigned by IANA. An AS can be
divided into areas.
available bit rate A kind of service categories defined by the ATM forum. ABR only provides possible
forwarding service and applies to the connections that does not require the real-time
quality. It does not provide any guarantee in terms of cell loss or delay.
B
B-ISDN See Broadband Integrated Services Digital Networks
backward Pertaining to signals or operations propagating in the opposite direction relative to the
call set-up.
backward defect When detecting a defect, the sink node of an LSP uses backward defect indication
indication (BDI) to inform the upstream end of the LSP of a downstream defect along the return
path.
base station controller A logical entity that connects the BTS with the MSC in a GSM network. It interworks
with the BTS through the Abis interface, the MSC through the A interface. It provides
the following functions: radio resource management, base station management, power
control, handover control, and traffic measurement. One BSC controls and manages
one or more BTSs in an actual network.
base transceiver A Base Transceiver Station terminates the radio interface. It allows transmission of
station traffic and signaling across the air interface. The BTS includes the baseband
processing, radio equipment, and the antenna.
Basic ACL A basic ACL can define ACL rules based on only source addresses.
basic input/output A firmware stored in the computer mainboard. It contains basic input/output control
system programs, power-on self test (POST) programs, bootstraps, and system setting
information. The BIOS provides hardware setting and control functions for the
computer.
bayonet-neill- A connector used for connecting two coaxial cables.
concelman
BC See boundary clock
BDI See backward defect indication
BE See best effort
BER See bit error rate
best effort A traditional IP packet transport service. In this service, the diagrams are forwarded
following the sequence of the time they reach. All diagrams share the bandwidth of
the network and routers. The amount of resource that a diagram can use depends of the
time it reaches. BE service does not ensure any improvement in delay time, jitter,
packet loss ratio, and high reliability.
BFD See bidirectional forwarding detection
BGP See Border Gateway Protocol
bidirectional A simple Hello protocol, similar to the adjacent detection in the route protocol. Two
forwarding detection systems periodically send BFD detection messages on the channel between the two
systems. If one system does not receive the detection message from the other system
for a long time, you can infer that the channel is faulty. Under some conditions, the
TX and RX rates between systems need to be negotiated to reduce traffic load.
BIOS See basic input/output system
BIP See bit-interleaved parity
bit error An incompatibility between a bit in a transmitted digital signal and the corresponding
bit in the received digital signal.
bit error rate Ratio of received bits that contain errors. BER is an important index used to measure
the communications quality of a network.
bit-interleaved parity A method of error monitoring. With even parity an X-bit code is generated by the
transmitting equipment over a specified portion of the signal in such a manner that the
first bit of the code provides even parity over the first bit of all X-bit sequences in the
covered portion of the signal, the second bit provides even parity over the second bit
of all X-bit sequences within the specified portion, and so on. Even parity is generated
by setting the BIP-X bits so that there is an even number of 1s in each monitored
partition of the signal. A monitored partition comprises all bits which are in the same
bit position within the X-bit sequences in the covered portion of the signal. The
covered portion includes the BIP-X.
BITS See building integrated timing supply
BMC best master clock
BNC See bayonet-neill-concelman
Border Gateway An interautonomous system routing protocol. An autonomous system is a network or
Protocol group of networks under a common administration and with common routing policies.
BGP is used to exchange routing information for the Internet and is the protocol used
between Internet service providers (ISP).
boundary clock A clock with a clock port for each of two or more distinct PTP communication paths.
BPDU See bridge protocol data unit
bridge protocol data The data messages that are exchanged across the switches within an extended LAN
unit that uses a spanning tree protocol (STP) topology. BPDU packets contain information
on ports, addresses, priorities and costs and ensure that the data ends up where it was
intended to go. BPDU messages are exchanged across bridges to detect loops in a
network topology. The loops are then removed by shutting down selected bridges
interfaces and placing redundant switch ports in a backup, or blocked, state.
Broadband Integrated A standard defined by the ITU-T to handle high-bandwidth applications, such as
Services Digital voice. It currently uses the ATM technology to transmit data over SONNET-based
Networks circuits at 155 to 622 Mbit/s or higher speed.
broadband TV Broadband TV involves accessing multimedia content via a broadband connection and
viewing it on a normal TV.
broadcast address In computer networking, a broadcast address is a network address that allows
information to be sent to all nodes on a network, rather than to a specific network host.
broadcast domain A group of network stations that receives broadcast packets originating from any
device within the group. Broadcasts do not pass through a router, which bound the
domains. In addition, the set of ports between which a device forwards a multicast,
broadcast, or unknown destination frame.
BSC See base station controller
BTS See base transceiver station
BTV See broadband TV
building integrated In the situation of multiple synchronous nodes or communication devices, one can use
timing supply a device to set up a clock system on the hinge of telecom network to connect the
synchronous network as a whole, and provide satisfactory synchronous base signals to
the building integrated device. This device is called BITS.
bus A path or channel for signal transmission. The typical case is that, the bus is an
electrical connection that connects one or more conductors. All devices that are
connected to a bus, can receive all transmission contents simultaneously.
C
cable distribution plate A component which is used to arrange the cables in order.
cable tie The tape used to bind the cables.
CAR See committed access rate
carrier sense multiple A network access method in which devices that are ready to transmit data first check
access/ collision the channel for a carrier. If no carrier is sensed, a device can transmit. If two devices
detection transmit at once, a collision occurs and each computer backs off and waits a random
amount of time before attempting to retransmit. This is the access method used by
Ethernet.
CBR See constant bit rate
CBS See committed burst size
CC See connectivity check
CCF See connection control function
CCM See continuity check message
CDR clock and data recovery
CDV cell delay variation
CDVT See cell delay variation tolerance
CE See customer edge
cell delay variation This parameter measures the tolerance level a network interface has to aggressive
tolerance sending (back-to-back or very closely spaced cells) by a connected device, and does
not apply to end-systems.
cell loss priority Field in the ATM cell header that determines the probability of a cell being dropped if
the network becomes congested. Cells with CLP = 0 are insured traffic, which is
unlikely to be dropped. Cells with CLP = 1 are best-effort traffic, which might be
dropped.
CEP circuit emulation over packet
CES See circuit emulation service
CF See compact flash
CFM See connectivity fault management
chain network One type of network that all network nodes are connected one after one to be in series.
channel A telecommunication path of a specific capacity and/or at a specific speed between
two or more locations in a network. The channel can be established through wire,
radio (microwave), fiber or a combination of the three. The amount of information
transmitted per second in a channel is the information transmission speed, expressed
in bits per second.
CID See connection identifier
CIR See committed information rate
circuit emulation A function with which the E1/T1 data can be transmitted through ATM networks. At
service the transmission end, the interface module packs timeslot data into ATM cells. These
ATM cells are sent to the reception end through the ATM network. At the reception
end, the interface module re-assigns the data in these ATM cells to E1/T1 timeslots.
The CES technology guarantees that the data in E1/T1 timeslots can be recovered to
the original sequence at the reception end.
CIST See common and internal spanning tree
CLNP connectionless network protocol
clock synchronization A type of high-decision clock defined by the IEEE 1588 V2 standard. The IEEE 1588
compliant with V2 standard specifies the precision time protocol (PTP) in a measurement and control
precision time protocol system. The PTP protocol ensures clock synchronization precise to sub-microseconds.
clock tracing The method to keep the time on each node being synchronized with a clock source in a
network.
CLP See cell loss priority
coarse wavelength A signal transmission technology that multiplexes widely-spaced optical channels into
division multiplexing the same fiber. CWDM widely spaces wavelengths at a spacing of several nm.
CWDM does not support optical amplifiers and is applied in short-distance chain
networking.
colored packet A packet whose priority is determined by defined colors.
committed access rate A traffic control method that uses a set of rate limits to be applied to a router interface.
CAR is a configurable method by which incoming and outgoing packets can be
classified into QoS (Quality of Service) groups, and by which the input or output
transmission rate can be defined.
committed burst size committed burst size. A parameter used to define the capacity of token bucket C, that
is, the maximum burst IP packet size when the information is transferred at the
committed information rate. This parameter must be larger than 0. It is recommended
that this parameter should be not less than the maximum length of the IP packet that
might be forwarded.
committed information The rate at which a frame relay network agrees to transfer information in normal
rate conditions. Namely, it is the rate, measured in bit/s, at which the token is transferred to
the leaky bucket.
common and internal The single spanning tree calculated by STP and RSTP together with the logical
spanning tree continuation of that connectivity by using MST Bridges and regions, calculated by
MSTP to ensure that all LANs in the bridged local area network are simply and fully
connected.
common spanning tree A single spanning tree that connects all the MST regions in a network. Every MST
region is considered as a switch; therefore, the CST can be regarded as their spanning
tree generated with STP/RSTP.
compact flash Compact flash (CF) was originally developed as a type of data storage device used in
portable electronic devices. For storage, CompactFlash typically uses flash memory in
a standardized enclosure.
congestion An extra intra-network or inter-network traffic resulting in decreasing network service
efficiency.
congestion A flow control measure to solve the problem of network resource competition. When
management the network congestion occurs, it places the packet into the queue for buffer and
determines the order of forwarding the packet.
connection control The set of functions used for setting up, maintaining and releasing a communication
path between two or more users or a user and a network entity, for example a dual tone
multi-frequency receiver.
connection control A functional entity in the distributed functional plane of the intelligent network (IN)
function conceptual model, which provides the basic call services of the bearer (telecom)
network and the advanced switch-based services with the call processing and
controlling functions.
connection identifier The MAC layer defined in the IEEE802.16 protocol is based on connection. Each
connection is uniquely identified with a CID.
connectivity check Ethernet CFM can detect the connectivity between MEPs. The detection is achieved
by each MEP transmitting a Continuity Check Message (CCM) periodically.
connectivity fault Ethernet connectivity fault management (CFM) is an end-to-end per-service-instance
management Ethernet layer operation, administration, and management (OAM) protocol. It includes
proactive connectivity monitoring, fault verification, and fault isolation for large
Ethernet metropolitan-area networks (MANs) and WANs.
constant bit rate A kind of service categories defined by the ATM forum. CBR transfers cells based on
the constant bandwidth. It is applicable to service connections that depend on precise
clocking to ensure undistorted transmission.
constraint shortest An extension of shortest path algorithms like OSPF and IS-IS. The path computed
path first using CSPF is a shortest path fulfilling set of constrains. It simply means that it runs
shortest path algorithm after pruning those links that violate a given set of constraints.
A constraint could be minimum bandwidth required per link (also know as bandwidth
guaranteed constraint), end-to-end delay, maximum number of links traversed and so
on. CSPF is widely used in MPLS Traffic Engineering. The routing using CSPF is
known as Constraint Based Routing (CBR).
constraint-based An Label Switched Path set up based on certain constraints is called Constraint-based
routed label switched Routed Label Switched Path (CR-LSP).
path
continuity check CCM is used to detect the link status.
message
control plane The control plane performs the call control and connection control functions. Through
signaling, the control plane sets up and releases connections, and may restore a
connection in case of a failure. The control plane also performs other functions in
support of call and connection control, such as routing information dissemination.
control word A 4-byte encapsulated packet header. It is used to transmit packets in an MPLS packet
switching network.
convergence layer The convergence layer is a "bridge" between the access layer and the core layer. It
provides the convergence and forwarding functions for the access layer. It processes
all the traffic from the access layer devices, and provides the uplinks to the core layer.
Compared with the access layer, the convergence layer devices should have higher
performances, fewer interfaces and higher switching rate. In the real network, the
convergence layer refers to the network between UPEs and PE-AGGs.
core layer The core layer functions as the backbone of high speed switching for networks, and it
provides high speed forwarding communications. It has a backbone transmission
structure that provides high reliability, high throughput, and low delay. The core layer
devices must have a good redundancy, error tolerance, manageability, adaptability, and
they support dual-system hot backup or load balancing technologies. In a real
network, the core layer includes the IP/MPLS backbone network consisting of NPEs
and backbone routers.
CPE See customer premises equipment
CPN customer premises network
CR-LSP See constraint-based routed label switched path
CRC See cyclic redundancy check
crossover cable A twisted pair patch cable wired in such a way as to route the transmit signals from
one piece of equipment to the receive signals of another piece of equipment, and vice
versa.
CSMA/CD See carrier sense multiple access/ collision detection
CSPF See constraint shortest path first
CST See common spanning tree
CTD cell transfer delay
current alarm An alarm not handled or not acknowledged after being handled.
current performance Performance data stored currently in a register. An NE provides two types of registers,
data namely, 15-minute register and 24-hour register, to store performance parameters of a
performance monitoring entity. The two types of registers stores performance data
only in the specified monitoring period.
customer edge A part of BGP/MPLS IP VPN model. It provides interfaces for direct connection to
the Service Provider (SP) network. A CE can be a router, switch, or host.
customer premises Customer Premises Equipment (CPE) is equipment located at an end-user's premises.
equipment Most CPEs are telephones or other service equipment. A CPE can be a Mobile Station
(MS) or a Subscriber Station (SS). An MS is mobile equipment, and an SS is fixed
equipment.
CV connectivity verification
CW See control word
CWDM See coarse wavelength division multiplexing
cyclic redundancy A procedure used in checking for errors in data transmission. CRC error checking uses
check a complex calculation to generate a number based on the data transmitted. The sending
device performs the calculation before transmission and includes it in the packet that it
sends to the receiving device. The receiving device repeats the same calculation after
transmission. If both devices obtain the same result, it is assumed that the transmission
was error free. The procedure is known as a redundancy check because each
transmission includes not only data but extra (redundant) error-checking values.
data communication A communication network used in a TMN or between TMNs to support the Data
network Communication Function (DCF).
data communications The data channel that uses the D1-D12 bytes in the overhead of an STM-N signal to
channel transmit information on operation, management, maintenance and provision
(OAM&P) between NEs. The DCC channels that are composed of bytes D1-D3 is
referred to as the 192 kbit/s DCC-R channel. The other DCC channel that are
composed of bytes D4-D12 is referred to as the 576 kbit/s DCC-M channel.
data connection Data connection equipment including analog, DSL, ISDN, cable modem circuits.
equipment
data link layer Layer 2 in the open system interconnection (OSI) architecture; the layer that provides
services to transfer data over the transmission link between open systems.
data terminal A user device composing the UNI. The DTE accesses the data network through the
equipment DCE equipment (for example, model) and usually uses the clock signals produced by
DCE.
Datagram A kind of PDU which is used in Connectionless Network Protocol, such as IP
datagram, UDP datagram.
DC See direct current
DCC See data communications channel
DCE See data connection equipment
DCN See data communication network
DDF See digital distribution frame
DDN See digital data network
DE See discard eligible
DEI See drop eligible indicator
delay variation A component of cell transfer delay, which is induced by buffering.
dense wavelength Technology that utilizes the characteristics of broad bandwidth and low attenuation of
division multiplexing single mode optical fiber, employs multiple wavelengths with specific frequency
spacing as carriers, and allows multiple channels to transmit simultaneously in the
same fiber.
desired Min Tx The minimum interval that the local system would like to use when transmitting BFD
interval control packets.
Detection multiplier The desired detect time multiplier for BFD control packets. It determines the session
detection time together with the DMTI and RMRI.
DHCP See Dynamic Host Configuration Protocol
DHCP Relay Dynamic Host Configuration Protocol relay (DHCP relay) is a function that enables
forwarding of DHCP data between the device that requests the IP address and the
DHCP server.
DHCP Server A program that allocates the IP addresses of the local address pool to the users at the
user side and allocates the IP addresses of the relay address pool to the users that pass
through the DHCP proxy at the network side.
differentiated services A service architecture that provides the end-to-end QoS function. It consists of a series
of functional units implemented at the network nodes, including a small group of per-
hop forwarding behaviors, packet classification functions, and traffic conditioning
functions such as metering, marking, shaping and policing.
DS interior node A DS node located at the center of a DS domain. It is a non-DS boundary node.
DS node A DS-compliant node, which is subdivided into DS boundary node and ID interior
node.
DSL See digital subscriber line
DSLAM See digital subscriber line access multiplexer
DTE See data terminal equipment
dual homing A network topology in which a device is connected to the network at two independent
access points. One point is the primary connection and the other a standby connection
that is activated in the event of a failure of the primary connection.
dual node DNI provides an alternative physical interconnection point, between the rings, in case
interconnection of an interconnection failure scenario.
dual-ended switching A protection operation method which takes switching action at both ends of the
protected entity (for example "connection", "path"), even in the case of a
unidirectional failure.
DWDM See dense wavelength division multiplexing
Dynamic Host Dynamic Host Configuration Protocol (DHCP) is a client-server networking protocol.
Configuration Protocol A DHCP server provides configuration parameters specific to the DHCP client host
requesting, generally, information required by the host to participate on the Internet
network. DHCP also provides a mechanism for allocation of IP addresses to hosts.
dynamic service A term used in IEEE (Institute of Electrical and Electronic Engineers) 802.16
networks to describe a set of messages and protocols that allow a base station and
subscriber station to add, modify, or delete the characteristics of s service flow.
E
E-LAN See Ethernet LAN
E-Tree See Ethernet-tree
E1 A European standard for high-speed data transmission at 2.048 Mbit/s. It provides 32
x 64 kbit/s channels.
EBS See excess burst size
ECC See embedded control channel
Edge LSR The basic unit of the MPLS network is LSR. The network composed by LSR is named
MPLS domain. LSR is located at the edge of the MPLS domain. LSR used to connect
other user network is named Label Edge Router (LER). The LSR in the core of the
internal area is the core LSR. The core LSR can be the router that supports MPLS and
be the ATM-LSR generated after the ATM switch is ungraded. LSRs in the domain
communicated by MPLS.
EF See expedited forwarding
EFM See Ethernet in the first mile
EGP See Exterior Gateway Protocol
Egress The group is transferred along the LSP consisting of a series of LSRs after the group
is labeled. The egress LER is named Egress.
Ethernet virtual An Ethernet service type, which carries Ethernet characteristic information over a
private LAN service shared bridge, point-to-multipoint connections, provided by SDH, PDH, ATM, or
MPLS server layer networks.
Ethernet-tree An Ethernet service type that is based on a Point-to-multipoint Ethernet Virtual
Connection.
ETS European Telecommunication Standards
ETSI See European Telecommunications Standards Institute
European A standards-setting body in Europe. Also the standards body responsible for GSM.
Telecommunications
Standards Institute
EVPLAN See Ethernet virtual private LAN service
EVPLn See Ethernet virtual private LAN
excess burst size A parameter related to traffic. In the single rate three color marker (srTCM) mode, the
traffic control is achieved by the token buckets C and E. Excess burst size is a
parameter used to define the capacity of token bucket E, that is, the maximum burst IP
packet size when the information is transferred at the committed information rate. This
parameter must be larger than 0. It is recommended that this parameter should be not
less than the maximum length of the IP packet that might be forwarded.
Exercise Switching An operation to check if the protection switching protocol functions normally. The
protection switching is not really performed.
EXP See experimental bits
expedited forwarding The highest order QoS in the Diff-Serv network. EF PHB is suitable for services that
demand low packet loss ratio, short delay, and broad bandwidth. In all the cases, EF
traffic can guarantee a transmission rate equal to or faster than the set rate. The DSCP
value of EF PHB is "101110".
experimental bits A field in the MPLS packet header, three bits long. This field is always used to
identify the CoS of the MPLS packet.
Extended ID The number of the subnet that an NE belongs to, for identifying different network
segments in a WAN. The extended ID and ID form the physical ID of the NE.
Exterior Gateway A protocol for exchanging routing information between two neighbor gateway hosts
Protocol (each with its own router) in a network of autonomous systems.
extra traffic The traffic that is carried over the protection channels when that capacity is not used
for the protection of working traffic. Extra traffic is not protected.
F
fair queue A mechanism for queue scheduling in which network resource is allocated equally and
delay and jitter time of all traffic are optimized.
fast Ethernet Any network that supports transmission rate of 100Mbits/s. The Fast Ethernet is 10
times faster than 10BaseT, and inherits frame format, MAC addressing scheme, MTU,
and so on. Fast Ethernet is extended from the IEEE802.3 standard, and it uses the
following three types of transmission media: 100BASE-T4 (4 pairs of phone twisted-
pair cables), 100BASE-TX (2 pairs of data twisted-pair cables), and 100BASE-FX (2-
core optical fibers).
fast reroute A technology to locally protect MPLS TE network. Only the interface with the speed
of 100 Mbps can support FRR. If the switching speed of FRR can reach 50ms, the
packet loss decreases when some faults occur on the network. FRR is applicable to
services that are very sensitive to packet loss and delay. When a fault is detected at the
lower layer, the lower layer informs the upper routing system of the fault. Then the
routing system forwards packets through a backup link. In this manner, the impact of
the link fault on services is minimized. FRR is local and temporary. Once the
protected LSP recovers or a new LSP is set up, traffic is switched to the original or the
new LSP. After you configure FRR on LSP and some link or some node on LSP is
invalid, traffic is switched to the protected link and a new LSP is trying to be set up on
the LSP ingress.
FDI See forward defect indication
FE See fast Ethernet
FEC See forwarding equivalence class
FF See fixed filter style
FFD fast failure detection
FFD packet FFD is a path failure detection method independent from CV. Different from a CV
packet, the frequency for generating FFD packets is configurable to satisfy different
service requirements. An FFD packet contains information the same as that in a CV
packet. The destination end LSR processes FFD packets in the same way for
processing CV packets.
FIB See forward information base
fiber patch cord A kind of fiber used for connections between the subrack and the ODF, and for
connections between subracks or inside a subrack.
field programmable A type of semi-customized circuit used in the Application Specific Integrated Circuit
gate array (ASIC) field. It is developed on the basis of the programmable components, such as
the PAL, GAL, and EPLD. It not only remedies the defects of customized circuits, but
also overcomes the disadvantage of the original programmable components in terms
of the limited number of gate arrays.
FIFO See first in first out queuing
File Transfer Protocol A member of the TCP/IP suite of protocols, used to copy files between two computers
on the Internet. Both computers must support their respective FTP roles: one must be
an FTP client and the other an FTP server.
filler panel A piece of board to cover vacant slots, to keep the frame away from dirt, to keep
proper airflow inside the frame, and to beautify the frame appearance.
first in first out A queuing policy that features that the packet reaching earlier can be allocated
queuing resource firstly.
fixed filter style On an MPLS network, an RSVP node creates a distinct reservation for data packets
from a particular sender. This sender does not share its resource reservation with other
senders.
flash memory A type of special electrically erasable programmable read-only memory (EEPROM)
and can be erased and rewritten in blocks at a time instead of only one byte. The data
shored in flash memory will not be lost if the flash memory is powered off.
flow control A set of mechanisms used to prevent the network from being overloaded by regulating
the input rate transmissions.
flow queue The same type of services of a user is considered one service flow; HQoS performs
queue scheduling according to the services of each user. The service flows of each
user are classified into four FQs, namely, CS, EF, AF, and BE. CS is assigned a traffic
shaping percentage for Priority Queuing (PQ); EF, AF, and BE are assigned weights
for Weighted Fair Queuing (WFQ). The preceding two scheduling modes occupy a
certain bandwidth each; they can act at the same time without interfering each other.
Forward It is the direction that traffic flows along the detected LSP.
forward defect Forward defect indication (FDI) is generated and traced forward to the sink node of
indication the LSP by the node that first detects defects. It includes fields to indicate the nature of
the defect and its location. Its primary purpose is to suppress alarms being raised at
affected higher level client LSPs and (in turn) their client layers.
forward information In data communication, a table of information that provides network hardware
base (bridges and routers) with the directions needed to forward packets of data to locations
on other networks. The information contained in a routing table differs according to
whether it is used by a bridge or a router. A bridge relies on both the source
(originating) and destination addresses to determine where and how to forward a
packet.
forwarding As a class-based forwarding technology, MPLS classifies the packets with the same
equivalence class forwarding mode, and the process is called Forwarding Equivalence Class. Packets
with the same FEC are processed similarly on an MPLS network. It is flexible to
divide FECs, and it can be a combination of the source address, the destination
address, the source port, the destination port, the protocol type, the VPN, and so on.
Forwarding plane Also referred to as the data plane. The forwarding plane is connection-oriented, and
can be used in Layer 2 networks such as an ATM network.
FPGA See field programmable gate array
FPS PW fast protection switching (FPS) achieves dual-homing protection for E-Line
services.
FQ See fair queue
FR See frame relay
frame relay A packet-switching protocol for use on WANs (wide area networks). Frame relay
transmits variable-length packets at up to 2 Mbps over predetermined, set paths known
as PVCs (permanent virtual circuits). It is a variant of X.25 but dispenses with some of
X.25's error detection for the sake of speed. See also ATM (definition 1), X.25.
Free-run mode An operating condition of a clock, the output signal of which is strongly influenced by
the oscillating element and not controlled by servo phase-locking techniques. In this
mode the clock has never had a network reference input, or the clock has lost external
reference and has no access to stored data, that could be acquired from a previously
connected external reference. Free-run begins when the clock output no longer reflects
the influence of a connected external reference, or transition from it. Free-run
terminates when the clock output has achieved lock to an external reference.
FRR See fast reroute
FTP See File Transfer Protocol
G
Gateway IP When an NE accesses a remote network management system or NE, a router can be
used to enable the TCP/IP communication. In this case, the IP address of the router is
the gateway IP. Only the gateway NE requires the IP address. The IP address itself
cannot identify the uniqueness of an NE. The same IP addresses may exist in different
TCP/IP networks. An NE may have multiple IP addresses, for example, one IP
address of the network and one IP address of the Ethernet port.
gateway network A network element that is used for communication between the NE application layer
element and the NM application layer
GE See gigabit Ethernet
generic framing A framing and encapsulated method which can be applied to any data type. It has been
procedure standardized by ITU-T SG15.
generic routing Applied to the encapsulation of IP datagrams tunneled through the internet, GRE is a
encapsulation mechanism for encapsulating any network layer protocol over any other network.
GRE serves as a Layer 3 tunneling protocol, and provides a tunnel for transparently
transmitting data packets.
GFP See generic framing procedure
gigabit Ethernet GE adopts the IEEE 802.3z. GE is compatible with 10 Mbit/s and 100 Mbit/s
Ethernet. It runs at 1000 Mbit/s. Gigabit Ethernet uses a private medium, and it does
not support coaxial cables or other cables. It also supports the channels in the
bandwidth mode. If Gigabit Ethernet is, however, deployed to be the private
bandwidth system with a bridge (switch) or a router as the center, it gives full play to
the performance and the bandwidth. In the network structure, Gigabit Ethernet uses
full duplex links that are private, causing the length of the links to be sufficient for
backbone applications in a building and campus.
Global Positioning A global navigation satellite system. It provides reliable positioning, navigation, and
System timing services to worldwide users.
global system for The second-generation mobile networking standard defined by ETSI (European
mobile Telecommunications Standards Institute).
communications
GND Ground
GNE See gateway network element
GPS See Global Positioning System
GR See graceful restart
graceful restart In IETF, protocols related to Internet Protocol/Multiprotocol Label Switching (IP/
MPLS) such as Open Shortest Path First (OSPF), Intermediate System-Intermediate
System (IS-IS), Border Gateway Protocol (BGP), Label Distribution Protocol (LDP),
and Resource Reservation Protocol (RSVP) are extended to ensure that the forwarding
is not interrupted when the system is restarted. This reduces the flapping of the
protocols at the control plane when the system performs the active/standby
switchover. This series of standards is called graceful restart.
graphical user A visual computer environment that represents programs, files, and options with
interface graphical images, such as icons, menus, and dialog boxes, on the screen.
GRE See generic routing encapsulation
GSM See global system for mobile communications
GUI See graphical user interface
I/O input/output
IANA See Internet assigned numbers authority
ICMP See Internet Control Message Protocol
IE See information element
IEC See International Electrotechnical Commission
IEEE See Institute of Electrical and Electronics Engineers
IETF See Internet Engineering Task Force
IGMP See Internet Group Management Protocol
IGMP snooping A multicast constraint mechanism running on a layer 2 device. This protocol manages
and controls the multicast group by listening to and analyze the Internet Group
Management Protocol (IGMP) packet between hosts and layer 3 devices. In this
manner, the spread of the multicast data on layer 2 network can be prevented
efficiently.
IGP See Interior Gateway Protocol
IGRP See Interior Gateway Routing Protocol
IMA See inverse multiplexing over ATM
IMA frame The IMA frame is used as the unit of control in the IMA protocol. It is a logical frame
defined as M consecutive cells, numbered 0 to M-l, transmitted on each of the N links
in an IMA group.
information element An Information Element is a group of information which may be included within a
signaling message or data flow which is sent across an interface. Examples may
include QoS (Quality of Service) definitions, setup parameters, user identifiers and so
on.
Ingress The group is transferred along the LSP consisting of a series of LSRs after the group
is labeled. The ingress LER is named Ingress.
Inloop A method of looping the signals from the cross-connect unit back to the cross-connect
unit.
Institute of Electrical A society of engineering and electronics professionals based in the United States but
and Electronics boasting membership from numerous other countries. The IEEE focuses on electrical,
Engineers electronics, computer engineering, and science-related matters.
integrated services A network defined in CCITT, providing comprehensive transmission service for the
digital network voice, video, and data. The ISDN enables the voice, video, and data transmission on a
small number of data channels simultaneously, thus implementing a comprehensive
transmission service.
Interior Gateway A routing protocol that is used within an autonomous system. The IGP runs in small-
Protocol sized and medium-sized networks. The commonly used IGPs are the routing
information protocol (RIP), the interior gateway routing protocol (IGRP), the
enhanced IGRP (EIGRP), and the open shortest path first (OSPF).
Interior Gateway A routing protocol from Cisco that was developed in 1988 to overcome the
Routing Protocol shortcomings of RIP. IGRP takes bandwidth, latency, reliability and current traffic
load into consideration. It is typically used within an autonomous system, such as an
Internet domain. IGRP was superseded by Enhanced IGRP (EIGRP).
internal spanning tree A segment of CIST in a certain MST region. An IST is a special MSTI whose ID is 0.
International The International Electrotechnical Commission (IEC) is an international and non-
Electrotechnical governmental standards organization dealing with electrical and electronical
Commission standards.
International A United Nations agency, one of the most important and influential recommendation
Telecommunication bodies, responsible for recommending standards for telecommunication (ITU-T) and
Union radio networks (ITU-R).
Internet assigned The organization operated under the IAB. IANA delegates authority for IP address-
numbers authority space allocation and domain-name assignment to the NIC and other organizations.
IANA also maintains a database of assigned protocol identifiers used in the TCP/IP
suite, including autonomous system numbers.
Internet Control A network-layer (ISO/OSI level 3) Internet protocol that provides error correction and
Message Protocol other information relevant to IP packet processing. For example, it can let the IP
software on one machine inform another machine about an unreachable destination.
See also communications protocol, IP, ISO/OSI reference model, packet (definition 1).
Internet Engineering A worldwide organization of individuals interested in networking and the Internet.
Task Force Managed by the Internet Engineering Steering Group (IESG), the IETF is charged
with studying technical problems facing the Internet and proposing solutions to the
Internet Architecture Board (IAB). The work of the IETF is carried out by various
working groups that concentrate on specific topics, such as routing and security. The
IETF is the publisher of the specifications that led to the TCP/IP protocol standard.
Internet Group The protocol for managing the membership of Internet Protocol multicast groups
Management Protocol among the TCP/IP protocols. It is used by IP hosts and adjacent multicast routers to
establish and maintain multicast group memberships.
Internet Protocol The TCP/IP standard protocol that defines the IP packet as the unit of information sent
across an internet and provides the basis for connectionless, best-effort packet delivery
service. IP includes the ICMP control and error message protocol as an integral part.
The entire protocol suite is often referred to as TCP/IP because TCP and IP are the
two fundamental protocols. IP is standardized in RFC 791.
Internet protocol In the Internet Protocol Television (IPTV) system, video is transmitted in IP packets.
television Also called "TV over IP", IPTV uses streaming video techniques to deliver scheduled
TV programs or video-on-demand (VOD). Unlike transmitting over the air or through
cable to a TV set, IPTV uses the transport protocol of the Internet for delivery and
requires either a computer and software media player or an IPTV set-top box to
decode the images in real time.
Internet Protocol The current version of the Internet Protocol (IP). IPv4 utilizes a 32bit address which is
version 4 assigned to hosts. An address belongs to one of five classes (A, B, C, D, or E) and is
written as 4 octets separated by periods and may range from 0.0.0.0 through to
255.255.255.255. Each IPv4 address consists of a network number, an optional
subnetwork number, and a host number. The network and subnetwork numbers
together are used for routing, and the host number is used to address an individual host
within the network or subnetwork.
Internet protocol A update version of IPv4. It is also called IP Next Generation (IPng). The
version 6 specifications and standardizations provided by it are consistent with the Internet
Engineering Task Force (IETF). IPv6 is also called. It is a new version of the Internet
Protocol, designed as the successor to IPv4. The difference between IPv6 and IPv4 is
that an IPv4 address has 32 bits while an IPv6 address has 128 bits.
Internet service An organization that offers users access to the Internet and related services.
provider
interworking A way to connect telecom devices so that they can communicate with each other.
inverse multiplexing The ATM inverse multiplexing technique involves inverse multiplexing and de-
over ATM multiplexing of ATM cells in a cyclical fashion among links grouped to form a higher
bandwidth logical link whose rate is approximately the sum of the link rates. This is
referred to as an IMA group.
IP See Internet Protocol
IP address A 32-bit (4-byte) binary number that uniquely identifies a host (computer) connected
to the Internet for communication with other hosts in the Internet by transferring
packets. An IP address is expressed in dotted decimal notation, consisting of the
decimal values of its 4 bytes, separated with periods; for example, 127.0.0.1. The first
three bytes of the IP address identify the network to which the host is connected, and
the last byte identify the host itself.
IP Protocol IP protocol refers to a protocol suite consisting of a series of standards that enables a
data packet to be transmitted to its destination through the Internet. IP protocol
provides a connectionless data packet transmission mechanism, shields physical
network transmission, addresses IP, and selects routes.
IPTV See Internet protocol television
IPv4 See Internet Protocol version 4
IPv6 See Internet protocol version 6
ISDN See integrated services digital network
ISP See Internet service provider
IST See internal spanning tree
ITU See International Telecommunication Union
J
jumper A connection wire for connecting two pins.
L
L2VPN See Layer 2 virtual private network
Label distribution Packets with the same destination address belong to an FEC. A label out of an MPLS
label resource pool is allocated to the FEC. LSRs record the relationship of the label
and the FEC. Then, LSRs send a message and advertises to upstream LSRs about the
label and FEC relationship in message. The process is called label distribution.
Label Distribution A protocol defined for distributing labels in MPLS network. It is the set of procedures
Protocol and messages by which Label Switched Routers (LSRs) establish Label Switched
Paths (LSPs) through a network by mapping network-layer routing information
directly to data-link layer switched paths. More information about the applicability of
LDP can be found in [RFC3037].
label edge router A device that sits at the edge of an MPLS domain, that uses routing information to
assign labels to datagrams and then forwards them into the MPLS domain.
Label space Value range of the label allocated to peers.
label switched path A sequence of hops (R0...Rn) in which a packet travels from R0 to Rn through label
switching mechanisms. A label-switched path can be chosen dynamically, based on
normal routing mechanisms, or through configuration.
label switching router Basic element of MPLS network. All LSRs support the MPLS protocol. The LSR is
composed of two parts: control unit and forwarding unit. The former is responsible for
allocating the label, selecting the route, creating the label forwarding table, creating
and removing the label switch path; the latter forwards the labels according to groups
received in the label forwarding table.
LACP See Link Aggregation Control Protocol
LAG See link aggregation group
LAN See local area network
LAN switch It is a piece of equipment used to allocate communication links in a LAN.
Layer 2 Multicast When Ethernet is used as the link layer, Layer 2 multicast uses multicast MAC
addresses for traffic transmission. Therefore, a technology must exist to map the IP
multicast address to the multicast MAC address.
layer 2 switch A data forwarding method. In LAN, a network bridge or 802.3 Ethernet switch
transmits and distributes packet data based on the MAC address. Since the MAC
address is the second layer of the OSI model, this data forwarding method is called
layer 2 switch.
Layer 2 virtual private A virtual private network achieved by Layer 2 switching technologies in the packet
network switched (IP/MPLS) network.
LB See loopback
LBM See loopback message
LBR See loopback reply
LC Lucent connector
LCT local craft terminal
LDP See Label Distribution Protocol
LDP peer Two LSRs that use LDP to exchange labels or FEC mappings. LDP sessions exist
between them.
LER See label edge router
limit rate A traffic management technology used to limit the total rate of packet sending on a
physical interface or a Tunnel interface. LR is directly enabled on the interface to
control the traffic passing the interface.
line rate The maximum packet forwarding capacity on a cable. The value of line rate equals the
maximum transmission rate capable on a given type of media.
Link Aggregation A method of bundling a group of physical interfaces together as a logical interface to
Control Protocol increase bandwidth and reliability. For related protocols and standards, refer to IEEE
802.3ad.
link aggregation group An aggregation that allows one or more links to be aggregated together to form a link
aggregation group so that a MAC client can treat the link aggregation group as if it
were a single link.
Link Control Protocol In the Point-to-Point Protocol (PPP), the Link Control Protocol (LCP) establishes,
configures, and tests data-link Internet connections.
Link Group According to some principles, links are divided into the set in the logical term. A set
of links is called the link group. The division makes management more convenient.
Link Layer Discovery The Link Layer Discovery Protocol (LLDP) is an L2D protocol defined in IEEE
Protocol 802.1ab. Using the LLDP, the NMS can rapidly obtain the Layer 2 network topology
and changes in topology when the network scales expand.
Link Monitoring Link monitoring is a mechanism for an interface to notify the peer of the fault when
the interface detects that the number of errored frames, errored codes, or errored frame
seconds reaches or exceeds the specified threshold.
Link Protection Protection provided by the bypass tunnel for the link on the working tunnel. The link
is a downstream link adjacent to the PLR. When the PLR fails to provide node
protection, the link protection should be provided.
link state The link in LSA is any type of connection between OSPF routers, while the state is the
advertisement condition of the link.
link state database A database containing the states of all the links.
Link status The running status of a link, which can be Up, Down, backup, or unknown.
linktrace message The message sent by the initiator MEP of 802.1ag MAC Trace to the destination MEP
is called Linktrace Message(LTM). LTM includes the Time to Live (TTL) and the
MAC address of the destination MEP2.
linktrace reply For 802.1ag MAC Trace, the destination MEP replies with a response message to the
source MEP after the destination MEP receives the LTM, and the response message is
called Linktrace Reply (LTR). LTR also includes the TTL that equals the result of the
TTL of LTM minus 1.
LLC See logical link control
LLDP See Link Layer Discovery Protocol
LLID locate loopback ID
LMP link management protocol
LMSP linear multiplex section protection
load sharing A device running mode. Two or more hardware units can averagely share the system
load according to their processing capabilities when they work normally. When a
hardware unit becomes faulty, the other units fulfill the tasks of the faulty unit on the
precondition of guaranteeing the system performance, for example, few call loss.
local area network A network formed by the computers and workstations within the coverage of a few
square kilometers or within a single building. It features high speed and low error rate.
Ethernet, FDDI, and Token Ring are three technologies used to implement a LAN.
Current LANs are generally based on switched Ethernet or Wi-Fi technology and
running at 1,000 Mbit/s (that is, 1 Gbit/s).
Lock status Services are not switched to the protection board or channel when a fault occurs, if
currently no switching takes place. If currently the switching takes place, after the
working board or channel recovers to normal, the services are not switched back to the
working board or channel.
Locked switching When the switching condition is satisfied, this function disables the service from being
switched from the working channel to the protection channel. When the service has
been switched, the function enables the service to be restored from the protection
channel to the working channel.
LOF See Loss Of Frame
logical link control According to the IEEE 802 family of standards, Logical Link Control (LLC) is the
upper sublayer of the OSI data link layer. The LLC is the same for the various
physical media (such as Ethernet, token ring, WLAN).
LOM loss of multiframe
loopback A troubleshooting technique that returns a transmitted signal to its source so that the
signal or message can be analyzed for errors.
loopback message The loopback packet sent by the node that supports 802.2ag MAC Ping to the
destination node. LBM message carries its own sending time.
loopback reply For 802.2ag MAC Ping, the destination MEP replies with a response message to the
source MEP after the destination MEP receives the LBM, and the response message is
called Loopback Reply. The LBR carries the sending time of LBM, the receiving time
of LBM and the sending time of LBR.
LOP See loss of pointer
LOS See Loss Of Signal
Loss Of Frame A condition at the receiver or a maintenance signal transmitted in the PHY overhead
indicating that the receiving equipment has lost frame delineation. This is used to
monitor the performance of the PHY layer.
loss of pointer Loss of Pointer: A condition at the receiver or a maintenance signal transmitted in the
PHY overhead indicating that the receiving equipment has lost the pointer to the start
of cell in the payload. This is used to monitor the performance of the PHY layer.
Loss Of Signal Loss of signal (LOS) indicates that there are no transitions occurring in the received
signal.
low priority queuing LPQ is performed after WFQ. It also means the device schedules queues strictly based
on the priority of queues.
Lower subrack The subrack close to the bottom of the cabinet when a cabinet contains several
subracks.
Lower Threshold When the performance event count value is smaller than a certain value, a threshold-
crossing event occurs. The value is the lower threshold.
LP lower order path
LPQ See low priority queuing
message The MCF is composed of a protocol stack that allows exchange of management
communication information with their prs.
function
message digest A hash function that is used in a variety of security applications to check message
algorithm 5 integrity. MD5 processes a variable-length message into a fixed-length output of 128
bits. It breaks up an input message into 512-bit blocks (sixteen 32-bit little-endian
integers). After a series of processing, the output consists of four 32-bit words, which
are then cascaded into a 128-bit hash number.
message dispatch The MDP roughly processes the received messages, and then sends the messages to
processor the destinations.
metropolitan area A metropolitan area network (MAN) is a network that interconnects users with
network computer resources in a geographic area or region larger than that covered by even a
large local area network (LAN) but smaller than the area covered by a wide area
network (WAN). The term is applied to the interconnection of networks in a city into a
single larger network (which may then also offer efficient connection to a wide area
network). It is also used to mean the interconnection of several local area networks by
bridging them with backbone lines. The latter usage is also sometimes referred to as a
campus network.
MGW See media gateway
microwave The portion of the electromagnetic spectrum with much longer wavelengths than
infrared radiation, typically above about 1 mm.
minimum cell rate Minimum Cell Rate (MCR). Parameter defined by the ATM Forum for ATM traffic
management. MCR is defined only for Available Bit Rate (ABR) transmissions, and
specifies the minimum value for the ACR.
MIP See maintenance association intermediate point
mirror It is an action to store a copy of a file to another archive site to release the load of the
original site, or to provide an archive site closer to the users geographically.
MLD See multicast listener discovery
MLPPP See Multi-link Point to Point Protocol
MP See merge point
MP See maintenance point
MP-BGP See Multi-protocol Extensions for Border Gateway Protocol
MPLS L2VPN The MPLS L2VPN provides the Layer 2 VPN service based on an MPLS network. In
this case, on a uniform MPLS network, the carrier is able to provide Layer 2 VPNs of
different media types, such as ATM, FR, VLAN, Ethernet, and PPP.
MPLS OAM The MPLS OAM provides continuity check for a single LSP, and provides a set of
fault detection tools and fault correct mechanisms for MPLS networks. The MPLS
OAM and relevant protection switching components implement the detection function
for the CR-LSP forwarding plane, and perform the protection switching in 50 ms after
a fault occurs. In this way, the impact of a fault can be lowered to the minimum.
MPLS TE tunnel In the case of reroute deployment, or when traffic needs to be transported through
multiple trails, multiple LSP tunnels might be used. In traffic engineering, such a
group of LSP tunnels are referred to as TE tunnels. An LSP tunnel of this kind has two
identifiers. One is the Tunnel ID carried by the SENDER object, and is used to
uniquely define the TE tunnel. The other is the LSP ID carried by the
SENDER_TEMPLATE or FILTER_SPEC object.
MS See multiplex section
MSP See multiplex section protection
MST See multiplex section termination
MSTI See multiple spanning tree instance
MSTP See Multiple Spanning Tree Protocol
MTBF See Mean Time Between Failures
MTTR See Mean Time To Repair
MTU See maximum transmission unit
Multi-link Point to A protocol used in ISDN connections. MLPPP lets two B channels act as a single line,
Point Protocol doubling connection rates to 128 kbit/s.
Multi-protocol A multi-protocol extension of BGP-4. MP-BGP supports multiple network layer
Extensions for Border protocols and identifies the protocols based on address families. MP-BGP transmits
Gateway Protocol VPN composition information and VPN-IPv4 routes between PEs.
Multicast A process of transmitting packets of data from one source to many destinations. The
destination address of the multicast packet uses Class D address, that is, the IP address
ranges from 224.0.0.0 to 239.255.255.255. Each multicast address represents a
multicast group rather than a host.
multicast group A set of members participating in the packet multicast service. The multicast group is
defined by a rule (or set of rules) which identifies a collection of members implicitly
or explicitly. This rule may associate members for the purpose of participating in a
call, or may associate members who do not participate in data transfer but do
participate in management, security, control, and accounting for the multicast group.
multicast listener The MLD is used by the IPv6 router to discover the multicast listeners on their
discovery directly connected network segments, and set up and maintain member relationships.
On IPv6 networks, after MLD is configured on the receiver hosts and the multicast
router to which the hosts are directly connected, the hosts can dynamically join related
groups and the multicast router can manage members on the local network.
multiple spanning tree Multiple spanning tree instance. One of a number of Spanning Trees calculated by
instance MSTP within an MST Region, to provide a simply and fully connected active
topology for frames classified as belonging to a VLAN that is mapped to the MSTI by
the MST Configuration. A VLAN cannot be assigned to multiple MSTIs.
Multiple Spanning Multiple spanning tree protocol. The MSTP can be used in a loop network. Using an
Tree Protocol algorithm, the MSTP blocks redundant paths so that the loop network can be trimmed
as a tree network. In this case, the proliferation and endless cycling of packets is
avoided in the loop network. The protocol that introduces the mapping between
VLANs and multiple spanning trees. This solves the problem that data cannot be
normally forwarded in a VLAN because in STP/RSTP, only one spanning tree
corresponds to all the VLANs.
Multiple Spanning The MST region consists of switches that support the MSTP in the LAN and links
Tree Region among them. Switches physically and directly connected and configured with the
same MST region attributes belong to the same MST region. The attributes for the
same MST region are as follows: Same region name Same revision level Same
mapping between the VLAN ID to MSTI
multiplex section The trail between and including two multiplex section trail termination functions.
multiplex section A function, which is performed to provide capability for switching a signal between
protection and including two multiplex section termination (MST) functions, from a "working" to
a "protection" channel.
multiplex section The function performed to generate the MSOH in the process of forming an SDH
termination frame signal and terminates the MSOH in the reverse direction.
Multiplexing A procedure by which multiple lower order path layer signals are adapted into a higher
order path or the multiple higher order path layer signals are adapted into a multiplex
section.
Multiservice capability It specifies whether multiple services can be independently processed during a session.
N
NA See network address
NCP See Network Control Protocol
NE database There are three types of database on NE SCC board as following: (1) DRDB: a
dynamic database in a dynamic RAM, powered by battery; (2) SDB: a static database
in a power-down RAM; (3) FDB0, FDB0: permanently saved databases in a Flash
ROM. In efficient operation, the NE configuration data is saved in DRDB and SDB at
the same time. Backing up an NE database means backing up the NE configuration
data from SDB to FDB0 and FDB1. When an NE is restarted after power-down, the
NE database is restored in the following procedures: As the SDB data is lost due to
power-down, the main control restores the data first from DRDB. If the data in DRDB
is also lost due to the exhaustion of the battery, the data is restored from FDB0 or
FDB1.
NE ID An ID that indicates a managed device in the network. In the network, each NE has a
unique NE ID.
NE side The NE configuration data saved on the SCC board of the equipment, which can be
uploaded to the network management system and then stored in databases on the
network management system NE side.
network address On the Internet, addresses are based on the IP protocol, which uses a 32-bit code in the
IP header to identify host addresses.
Network Control This is the program that switches the virtual circuit connections into place, implements
Protocol path control, and operates the Synchronous Data Link Control (SDLC) link.
Network diameter The maximum of network bridges that the communication passes through between
any two terminal devices in the switched network.
Network entity Network entity refers to the universal basic devices used to describe the functions and
structure of the transmission network, which considerably facilitates the description of
the network. The network entities include transmission object and sub-network.
network layer The network layer is layer 3 of the seven-layer OSI model of computer networking.
The network layer provides routing and addressing so that two terminal systems are
interconnected. In addition, the network layer provides congestion control and traffic
control. In the TCP/IP protocol suite, the functions of the network layer are specified
and implemented by IP protocols. Therefore, the network layer is also called IP layer.
Network Management A system in charge of the operation, administration, and maintenance of a network.
System
network node interface The interface at a network node which is used to interconnect with another network
node.
network segment A part of an Ethernet or other network, on which all message traffic is common to all
nodes, that is, it is broadcast from one node on the segment and received by all others.
network service access A network address defined by ISO, through which entities on the network layer can
point access OSI network services.
network storm A phenomenon that occurs during data communication. To be specific, mass broadcast
packets are transmitted in a short time; the network is congested; transmission quality
and availability of the network decrease rapidly. The network storm is caused by net
Network Time The Network Time Protocol (NTP) defines the time synchronization mechanism. It
Protocol synchronizes the time between the distributed time server and the client.
network unit layer The logical layer that implements the configuration, failure and performance for a
single network element in the layered management architecture of the telecom
network management system.
NMS See Network Management System
NHOP next-hop
NNI See network node interface
Node Protection A parameter of the FRR protection. It indicates that the bypass tunnel should be able
to protect the downstream node that is involved in the working tunnel and adjacent to
the PLR. The node cannot be a merge point, and the bypass tunnel should also be able
to protect the downstream link that is involved in the working tunnel and adjacent to
the PLR.
NPC network parameter control
NRT non-real-time
NSAP See network service access point
NSF not stop forwarding
NTP See Network Time Protocol
O
OAM See operation, administration and maintenance
OAMPDU oam protocol data unit
ODF See optical distribution frame
OOF See out of frame
open shortest path first A link-state, hierarchical interior gateway protocol (IGP) for network routing.
Dijkstra's algorithm is used to calculate the shortest path tree. It uses cost as its routing
metric. A link state database is constructed of the network topology which is identical
on all routers in the area.
Open Systems A framework of ISO standards for communication between different systems made by
Interconnection different vendors, in which the communications process is organized into seven
different categories that are placed in a layered sequence based on their relationship to
the user. Each layer uses the layer immediately below it and provides a service to the
layer above. Layers 7 through 4 deal with end-to-end communication between the
message source and destination, and layers 3 through 1 deal with network functions.
operation log The Operations Log is a list of information about operation events.
operation, A group of network support functions that monitor and sustain segment operation,
administration and activities that are concerned with, but not limited to, failure detection, notification,
maintenance location, and repairs that are intended to eliminate faults and keep a segment in an
operational state and support activities required to provide the services of a subscriber
access network to users/subscribers.
optic fiber connector A device installed at the end of a fiber, optical source or receive unit. It is used to
couple the optical wave to the fiber when connected to another device of the same
type. A connector can either connect two fiber ends or connect a fiber end and a
optical source (or a detector).+
optical distribution A frame which is used to transfer and spool fibers.
frame
optical fiber A thin filament of glass or other transparent material, through which a signal-encoded
light beam may be transmitted using total internal reflection.
OSI See Open Systems Interconnection
OSPF See open shortest path first
out of frame An NE transmits an OOF downstream when it receives framing errors in a specified
number of consecutive frame bit positions.
Outloop A method of looping back the input signals received at a port to an output port without
changing the structure of the signals.
overcurrent protection A circuit protection technology. When there is a great volume of traffic on a circuit
and the current is stronger than the protection threshold, the circuit is cut off after the
circuit protector timer expires.
overhead cabling Cables or fibers connect the cabinet with other equipment from the top of the cabinet.
P
P A backbone device that is located in the service provider network. A P device is not
directly connected to the CE devices. The P devices only need the basic MPLS
forwarding capability and do not maintain information about a VPN.
P2P See point to point service
packet loss The discarding of data packets in a network when a device is overloaded and cannot
accept any incoming data at a given moment.
packet over SDH/ A MAN and WAN technology that provides point-to-point data connections. The POS
SONET interface uses SDH/SONET as the physical layer protocol, and supports the transport
of packet data (such as IP packets) in MAN and WAN.
Packet rate The number of bits or bytes passed within a specified time. It is expressed in bits/s or
bytes/s.
packet switching A network technology in which information is transmitted by means of exchanging
packets and the bandwidth of a channel can be shared by multiple connections.
parity A method for character level error detection. An extra bit added to a string of bits,
usually a 7-bit ASCII character, so that the total number of bits 1 is odd or even (odd
or even parity). Both ends of a data transmission must use the same parity. When the
transmitting device frames a character, it counts the numbers of 1s in the frame and
attaches the appropriate parity bit. The recipient counts the 1s and, if there is parity
error, may ask for the data to be retransmitted.
pass-through The action of transmitting the same information that is being received for any given
direction of transmission.
path layer A layer within an SDH entity that supports the SDH based network transport services,
e.g. multiplexing, cross-connection, regeneration. The network element function is
modeled by managed objects.
PBS See peak burst size
PCB See printed circuit board
PCI bus PCI (Peripheral Component Interconnect) bus. A high performance bus, 32-bit or 64-
bit for interconnecting chips, expansion boards, and processor/memory subsystems.
PCR See peak cell rate
PDH See plesiochronous digital hierarchy
PDU See protocol data unit
PE See provider edge
peak burst size A parameter used to define the capacity of token bucket P, that is, the maximum burst
IP packet size when the information is transferred at the peak information rate. This
parameter must be larger than 0. It is recommended that this parameter should be not
less than the maximum length of the IP packet that might be forwarded.
peak cell rate The maximum rate at which an ATM connection can accept cells.
peak information rate Peak Information Rate. A traffic parameter, expressed in bit/s, whose value should be
not less than the committed information rate.
Peer BGP speakers exchanging information with each other.
penultimate hop Penultimate Hop Popping (PHP) is a function performed by certain routers in an
popping MPLS enabled network. It refers to the process whereby the outermost label of an
MPLS tagged packet is removed by a Label Switched Router (LSR) before the packet
is passed to an adjacent Label Edge Router (LER).
per-hop behavior IETF Diff-Serv workgroup defines forwarding behaviors of network nodes as per-hop
behaviors (PHB), such as, traffic scheduling and policing. A device in the network
should select the proper PHB behaviors, based on the value of DSCP. At present, the
IETF defines four types of PHB. They are class selector (CS), expedited forwarding
(EF), assured forwarding (AF), and best-effort (BE).
Performance register Performance register is the memory space for performance event counts, including 15-
min current performance register, 24-hour current performance register, 15-min
history performance register, 24-hour history performance register, UAT register and
CSES register. The object of performance event monitoring is the board functional
module, so every board functional module has a performance register. A performance
register is used to count the performance events taking place within a period of
operation time, so as to evaluate the quality of operation from the angle of statistics.
permanent virtual Virtual path that consists of PVCs.
path
PGND protection ground
phase-locked loop A circuit that consists essentially of a phase detector which compares the frequency of
a voltage-controlled oscillator with that of an incoming carrier signal or reference-
frequency generator; the output of the phase detector, after passing through a loop
filter, is fed back to the voltage-controlled oscillator to keep it exactly in phase with
the incoming or reference frequency.
PHB See per-hop behavior
PHP See penultimate hop popping
physical layer Physical layer is the Layer 1 in the Open System Interconnection (OSI) architecture;
the layer that provides services to transmit bits or groups of bits over a transmission
link between open systems and which entails electrical, mechanical and handshaking
physical link The physical link refers to the link between two physical NEs. When the user creates
NEs or refreshes the device status, the system automatically creates the physical link
according to the topology structure information on the device. The physical link can
modify the remarks information. It cannot be deleted.
Ping Test A test that is performed to send a data packet to the target IP address (a unique IP
address on the device on the network) to check whether the target host exists
according to the data packet of the same size returned from the target host.
PIR See peak information rate
plesiochronous digital A multiplexing scheme of bit stuffing and byte interleaving. It multiplexes the
hierarchy minimum rate 64 kit/s into the 2 Mbit/s, 34 Mbit/s, 140 Mbit/s, and 565 Mbit/s rates.
PLL See phase-locked loop
PLR See point of local repair
point of local repair The ingress node of the bypass tunnel. The head-end node of a backup tunnel or a
detour tunnel.
point to multipoint A communications network that provides a path from one location to multiple
locations (from one to many).
point to point service A service between two terminal users. In P2P services, senders and recipients are
terminal users.
Point-to-Point Protocol A protocol on the data link layer, provides point-to-point transmission and
encapsulates data packets on the network layer. It is located in layer 2 of the IP
protocol stack.
policy template To define the calculation rules of a charging event, for example, rating, debiting and
accumulating. A policy template may contain the parameters to be instantiated. They
can be used when the attributes of the condition judgment, calculation method, and
action functions are carried out.
port forwarding Forwarding of interface-based TCP application data through SSL-encrypted tunnels.
Port priority The priority used when a port attaches tags to Layer 2 packets. Packets received on
ports with higher priorities are forwarded preferentially.
POS See packet over SDH/SONET
power up To start up a computer; to begin a cold boot procedure; to turn on the power
PPP See Point-to-Point Protocol
PPS See pulse per second
PQ See priority queue
PQ See priority queuing
PRBS See pseudo random binary sequence
PRC primary reference clock
Precision Time Precision clock synchronization protocol for networked measurement and control
Protocol systems, the 1588 standard stipulated by IEEE.
Preemption During the process of establishing CR-LSP, if you cannot fine one path that satisfies
requirements, you can remove another established path and take up its bandwidth
resource. That is called preemption. CR-LSP check whether the path can be preempted
according to two priority features, that is, Setup Priority and Holding Priority.
Preemption is activated by the Resv message of RSVP-TE. Only when the priority of
Path1, which you want to set up, is higher than that of Path2, you can preempt the
bandwidth source of Path2 for Path1.
printed circuit board A board used to mechanically support and electrically connect electronic components
using conductive pathways, tracks, or traces, etched from copper sheets laminated
onto a non-conductive substrate.
priority queue A priority queue is an abstract data type in computer programming that supports the
following three operations: (1) InsertWithPriority: add an element to the queue with an
associated priority (2) GetNext: remove the element from the queue that has the
highest priority, and return it (also known as "PopElement(Off)", or "GetMinimum")
(3) PeekAtNext (optional): look at the element with highest priority without removing
it
priority queuing The Priority Queuing (PQ) is a queue scheduling algorithm based on the absolute
priority. According to the PQ algorithm, services of higher priorities are ensured with
greater bandwidth, lower latency, and less jitter. Packets of lower priorities must wait
to be sent till all packets of higher priorities are sent. In this manner, services of higher
priorities are handled earlier than others.
protection channels The channels allocated to transport the working traffic during a switch event. When
there is a switch event, traffic on the affected working channels is bridged onto on the
protection channels.
protection ground bar A bar connecting the PGND cable of the cabinet so that the cabinet and the earth are
in the same equipotential level.
protection ground A cable which connects the equipment and the protection ground bar. Usually, one
cable half of the cable is yellow; while the other half is green.
Protection path A specific path that is part of a protection group and is labeled protection.
Protection service A specific service that is part of a protection group and is labeled protection.
protocol data unit It is a data packet at the network layer of the OSI model.
provider edge A device that is located in the backbone network of the MPLS VPN structure. A PE is
responsible for VPN user management, establishment of LSPs between PEs, and
exchange of routing information between sites of the same VPN. During the process, a
PE performs the mapping and forwarding of packets between the private network and
the public channel. A PE can be a UPE, an SPE, or an NPE.
pseudo random binary A sequence that is random in a sense that the value of an element is independent of the
sequence values of any of the other elements, similar to real random sequences.
pseudo wire emulation A type of end-to-end Layer 2 transmitting technology. It emulates the essential
edge-to-edge attributes of a telecommunication service such as ATM, FR or Ethernet in a Packet
Switched Network (PSN). PWE3 also emulates the essential attributes of low speed
Time Division Multiplexed (TDM) circuit and SONET/SDH. The simulation
approximates to the real situation.
PSTN See public switched telephone network
PTMP See point to multipoint
PTN packet transport network
PTP See Precision Time Protocol
public switched A telecommunications network established to perform telephone services for the
telephone network public subscribers. Sometimes called POTS.
pulse per second Pulse per second, which, strictly speaking, is not a time synchronization signal. This is
because 1PPS provides only the "gauge" corresponding to the UTC second, but does
not provide the information about the day, month, or year. Therefore, 1PPS is used as
the reference for frequency synchronization. On certain occasions, 1PPS can also be
used on other interfaces for high precision timing.
PVP See permanent virtual path
PWE3 See pseudo wire emulation edge-to-edge
QinQ A layer 2 tunnel protocol based on IEEE 802.1Q encapsulation. It encapsulates the tag
of the user's private virtual local area network (VLAN) into the tag of the public
VLAN. The packet carries two layers of tags to travel through the backbone network
of the carrier. In this manner, the layer 2 virtual private network (VPN) is provided for
the user.
QoS See quality of service
quality of service A commonly-used performance indicator of a telecommunication system or channel.
Depending on the specific system and service, it may relate to jitter, delay, packet loss
ratio, bit error ratio, and signal-to-noise ratio. It functions to measure the quality of the
transmission system and the effectiveness of the services, as well as the capability of a
service provider to meet the demands of users.
R
R99 Release 1999
radio access network The network that provides the connection between CPEs and the CN. It isolates the
CN from wireless network.
radio frequency A type of electric current in the wireless network using AC antennas to create an
electromagnetic field. It is the abbreviation of high-frequency AC electromagnetic
wave. The AC with the frequency lower than 1 kHz is called low-frequency current.
The AC with frequency higher than 10 kHz is called high-frequency current. RF can
be classified into such high-frequency current.
radio network An equipment in the RNS which is in charge of controlling the use and the integrity of
controller the radio resources.
RAN See radio access network
random early detection A packet loss algorithm used in congestion avoidance. It discards the packet according
to the specified higher limit and lower limit of a queue so that global TCP
synchronization resulted in traditional Tail-Drop can be prevented.
Rapid Spanning Tree An evolution of the Spanning Tree Protocol, providing for faster spanning tree
Protocol convergence after a topology change. The RSTP protocol is backward compatible with
the STP protocol.
rated current The input current of the equipment as declared by the manufacturer.
RDI See remote defect indication
Re-optimization Re-optimization refers to the dynamic optimization of CR-LSPs, namely, the periodic
calculation of CR-LSP routes. If the recalculated route is better than the current route,
a new CR-LSP is created. Traffic switches from the original CR-LSP to the new CR-
LSP, and then the original CR-LSP is deleted.
Real Time Protocol Real-time Transport Protocol (RTP) is a host-to-host protocol. It is used to deliver
real-time services such as audio and video over the IP network.
real time variable bit The rt-VBR is intended for real-time applications, such as compressed voice over IP
rate (VoIP) and video conferencing. The rt-VBR is characterized by a peak cell rate (PCR),
sustained cell rate (SCR), and maximum burst size (MBS). You can expect the source
device to transmit in bursts and at a rate that varies with time.
Real-time Transport A type of host-to-host protocol used in real-time multimedia services such as Voice
Protocol over IP (VoIP) and video.
reboot To start the system again. Programs or data will be reloaded to all boards.
RED See random early detection
reference clock A kind of stable and high-precision autonous clock providing frequencies for other
clocks for reference.
REI See remote error indication
remote defect A signal transmitted at the first opportunity in the outgoing direction when a terminal
indication detects specific defects in the incoming signal.
remote error A remote error indication (REI) is sent upstream to signal an error condition. There
indication are two types of REI alarms: Remote error indication line (REI-L) is sent to the
upstream LTE when errors are detected in the B2 byte. Remote error indication path
(REI-P) is sent to the upstream PTE when errors are detected in the B3 byte.
remote maintenance For the other devices in the same MA, their MEPs are called the Remote Maintenance
association end point association End Points (RMEPs).
remote monitor A widely used network management standard defined by the IETF, and it enhances the
MIB II standard greatly. It mainly functions to monitor the data traffic over a network
segment or the entire network. RMON is completely based on the SNMP architecture,
including the NMS and the Agent running on each network device.
Request For A document in which a standard, a protocol, or other information pertaining to the
Comments operation of the Internet is published. The RFC is actually issued, under the control of
the IAB, after discussion and serves as the standard. RFCs can be obtained from
sources such as InterNIC.
required Min Rx The minimum interval between received BFD control packets that the local system is
interval capable of supporting.
Resource Reservation The Resource Reservation Protocol (RSVP) is designed for Integrated Service and is
Protocol used to reserve resources on every node along a path. RSVP performs on the transport
layer; however, RSVP does not transport application data. RSVP is a network control
protocol like Internet Control Message Protocol (ICMP).
reverse pressure A traffic control method. In telecommunication, when detecting that the transmit end
transmits a large volume of traffic, the receive end sends signals to ask the transmit
end to slow down the transmission rate.
RF See radio frequency
RFC See Request For Comments
ring network A type of network topology in which each node connects to exactly two other nodes,
forming a circular pathway for signals.
RIP See Routing Information Protocol
RMEP See remote maintenance association end point
RMON See remote monitor
RMRI See required Min Rx interval
RNC See radio network controller
RoHS restriction of the use of certain hazardous substances
rollback A return to a previous condition through cancelation of a certain operation.
Root alarm An alarm directly caused by anomaly events or faults in the network. Some lower-
level alarms always accompany a root alarm.
Route restriction The constraint conditions for calculating a route. When creating a trail, the user can
specify the explicit route and the NEs that the trail cannot pass. The explicit route and
the NEs are the constraints for calculating the route. The inevitable trail only functions
when the number of routes is calculated as 1. Double-click the NE icon can set the NE
as an NE that cannot be passed, and double-clicking it again can cancel the setting.
Routing Information A simple routing protocol that is part of the TCP/IP protocol suite. It determines a
Protocol route based on the smallest hop count between source and destination. RIP is a
distance vector protocol that routinely broadcasts routing information to its
neighboring routers and is known to waste bandwidth.
routing policy Routing policies are implemented to filter routing information, mainly through the
change of route properties.
routing protocol A formula used by routers to determine the appropriate path onto which data should
be forwarded.
routing table A table that stores and updates the locations (addresses) of network devices. Routers
regularly share routing table information to be up to date. A router relies on the
destination address and on the information in the table that gives the possible routes--
in hops or in number of jumps--between itself, intervening routers, and the destination.
Routing tables are updated frequently as new information is available.
RS232 In the asynchronous transfer mode and there is no hand-shaking signal. It can
communicate with RS232 and RS422 of other stations in point-to-point mode and the
transmission is transparent. Its highest speed is 19.2kbit/s.
RS422 The specification that defines the electrical characteristics of balanced voltage digital
interface circuits. The interface can change to RS232 via the hardware jumper and
others are the same as RS232.
RSTP See Rapid Spanning Tree Protocol
RSVP See Resource Reservation Protocol
rt-VBR See real time variable bit rate
RTP See Real-time Transport Protocol
RTP See Real Time Protocol
S
S-VLAN service VLAN
S1 byte In an SDH network, each network element traces step by step to the same clock
reference source through a specific clock synchronization path, thus realizing the
synchronization of the whole network. If a clock reference source traced by the NE is
missing, this NE will trace another clock reference source of a lower level. To
implement protection switching of clocks in the whole network, the NE must learn
about clock quality information of the clock reference source it traces. Therefore, ITU-
T defines S1 byte to transmit network synchronization status information. It uses the
lower four bits of the multiplex section overhead S1 byte to indicate 16 types of
synchronization quality grades. Auto protection switching of clocks in a synchronous
network can be implemented using S1 byte and a proper switching protocol.
SC See square connector
SCR sustainable cell rate
SD See signal degrade
SDH See synchronous digital hierarchy
SDP serious disturbance period
security alarm A message generated when a security-related event that is defined by security policy
as being an alarm condition has been detected. A security alarm is intended to come to
the attention of appropriate entities in a timely manner.
security level The classification of the security according to its significance.
security log Security logs record the security operations on the NMS, such as logging in to the
server, modifying the password, and exiting from the NMS server.
Switching restoration It refers to the period of time between the start of detecting and the moment when the
time line is switched back to the original status after protection switching occurs in the
MSP sub-network.
Synchronization Status A message that carries quality levels of timing signals on a synchronous timing link.
Message Nodes on an SDH network and a synchronization network acquire upstream clock
information through this message. Then the nodes can perform proper operations on
their clocks, such as tracing, switching, or converting to holdoff, and forward the
synchronization information to downstream nodes.
Synchronize Alarm When synchronizing the alarms, the network management system checks the alarms in
the network management system database and the alarms in the NE. If they are
inconsistent, the alarms in the NE are uploaded to the network management system
database and overwrite the old ones.
synchronize NE time To send the system time of the server of the network management system to NEs so as
to synchronize all NEs with the server.
synchronous digital A transmission scheme that follows ITU-T G.707, G.708, and G.709. It defines the
hierarchy transmission features of digital signals such as frame structure, multiplexing mode,
transmission rate level, and interface code. SDH is an important part of ISDN and B-
ISDN. It interleaves the bytes of low-speed signals to multiplex the signals to high-
speed counterparts, and the line coding of scrambling is only used only for signals.
SDH is suitable for the fiber communication system with high speed and a large
capacity since it uses synchronous multiplexing and flexible mapping structure.
synchronous The SEMF converts performance data and implementation specific hardware alarms
equipment into object-oriented messages for transmission over DCCs and/or a Q interface.
management function
synchronous The SETS function provides timing reference to the relevant component parts of
equipment timing multiplexing equipment and represents the SDH network clement clock.
source
synchronous optical A high-speed network that provides a standard interface for communications carriers
network to connect networks based on fiberoptic cable. SONET is designed to handle multiple
data types (voice, video, and so on). It transmits at a base rate of 51.84 Mbps, but
multiples of this base rate go as high as 2.488 Gbps (gigabits per second).
Synchronous source A clock providing timing services to connected network elements. This would include
clocks conforming to Recommendations G.811, G.812 and G.813.
SYSLOG Syslog is an industry standard protocol for recording device logs.
Syslog Service Syslog service is used to manage the device to send the log information to the host. It
is used on the sending-information port.
system logging System log tracks miscellaneous system events like startup, shutdown and events like
hardware and controller failures.
Tail drop A congestion management mechanism, in which packets arrive later are discarded
when the queue is full. This policy of discarding packets may result in network-wide
synchronization due to the TCP slow startup mechanism.
tangent rings It is a concept in geometry. There is a public node between two ring networks. The
public node often brings in single-point failure.
token ring The IEEE 802.5 standard for a token-passing ring network with a star-configured
physical topology. Internally, signals travel around the network from one station to the
next in a ring. Physically, each station connects to a central hub called a multistation
access server.
tolerance Permissible degree of variation from a pre-set standard.
topology management Topology management displays static configuration objects on a graphic interface, as
well as the status data, monitoring data, and alarm data on the objects. It also enables
users to perform operations on the GUI. The topology management is integrated with
the EAM, fault, and security NBI common service subsystems to provide the domain-
based element management solution.
Topology Object A basic element in the NMS topology view, which includes submap, node, connection,
and so on.
Topology view A basic component for the human-machine interface. The topology view directly
displays the networking of a network as well as the alarm and communication statuses
of each network element and subnet. In this manner, the topology view reflects the
basic running conditions of the network.
ToS See type of service
ToS priority A ToS sub-field (the bits 0 to 2 in the ToS field) in the ToS field of the IP packet
header.
TPS See tributary protection switch
TPS protection The equipment level protection that uses one standby tributary board to protect N
tributary boards. When a fault occurs on the working board, the SCC issues the
switching command, and the payload of the working board can be automatically
switched over to the specified protection board and the protection board takes over the
job of the working board. After the fault is cleared, the service is automatically
switched to the original board
TR See token ring
traffic channel Indicates the channel that carries voice coding information or user data. Traffic
channels are classified into voice traffic channels and data traffic channels.
traffic classification Traffic classification enables you to classify traffic into different classes with different
priorities according to some criteria. Each class of traffic has a specified quality of
service (QoS) in the entire network. In this way, different traffic packets can be treated
differently.
traffic engineering A technology that is used to dynamically monitor the traffic of the network and the
load of the network elements, to adjust in real time the parameters such as traffic
management parameters, route parameters and resource restriction parameters, and to
optimize the utilization of network resources. The purpose is to prevent the congestion
caused by unbalanced loads.
Traffic frame discard It is the traffic frame discard control. Two options are provided: enable and disable. It
flag indicates the means by which the NE discards cells when the network is congested.
When the frame discard mark is closed, the cells will be discarded at the cell level;
when it is opened, they will be discarded at the frame level. Here, "frame" refers to the
AAL protocol data unit.
traffic management Traffic management refers to the process of monitoring user traffic on a network and
redistributing/rerouting it when necessary in order to ensure optimal network
performance
traffic policy A full set of QoS policies formed by association of traffic classification and QoS
actions.
trail termination The trail termination source identifier (TTSI) of the LSP is used to uniquely identify
source identifier an LSP on a network.
transit The group is transferred along the LSP consisting of a series of LSRs after the group
is labeled. The middle node is named Transit.
transit delay The period from the time when a site starts to transmit a data frame to the time when
the site finishes the data frame transmission or to the time when all data frames are
received by the receiver.
Transmission Control The protocol within TCP/IP that governs the breakup of data messages into packets to
Protocol be sent via IP (Internet Protocol), and the reassembly and verification of the complete
messages from packets received by IP. A connection-oriented, reliable protocol
(reliable in the sense of ensuring error-free delivery), TCP corresponds to the transport
layer in the ISO/OSI reference model.
Transmission Control Common name for the suite of protocols developed to support the construction of
Protocol/Internet worldwide internetworks.
Protocol
transparent A process during which the signaling protocol or data is not processed in the content
transmission but encapsulated in the format for the processing of the next phase.
transport plane The transport plane provides bidirectional or unidirectional transfer of user
information, from one location to another. It can also provide transfer of some control
and network management information. The transport plane is layered; it is equivalent
to the transport network defined in ITU-T Rec. G.805.
tributary protection Tributary protection switching, a function provided by the equipment, is intended to
switch protect N tributary processing boards through a standby tributary processing board.
tributary unit group One or more Tributary Units, occupying fixed, defined positions in a higher order VC-
n payload is termed a Tributary Unit Group (TUG). TUGs are defined in such a way
that mixed capacity payloads made up of different size Tributary Units can be
constructed to increase flexibility of the transport network
trTCM See two rate three color marker
trunk cable The main (often large diameter) cable of a coaxial cable system.
trunk line A transmission channel between two switching centers or nodes. It is used to connect
the exchange to the network.
TTL See time to live
TTSI See trail termination source identifier
TU tributary unit
TUG See tributary unit group
Tunnel A channel on the packet switching network that transmits service traffic between PEs.
In VPN, a tunnel is an information transmission channel between two entities. The
tunnel ensures secure and transparent transmission of VPN information. In most cases,
a tunnel is an MPLS tunnel.
twisted pair It is a four-pair wire medium-composed of pairs of wires - used in a variety of
networks.
two rate three color The trTCM meters an IP packet stream and marks its packets based on two rates, Peak
marker Information Rate (PIR) and Committed Information Rate (CIR), and their associated
burst sizes to be either green, yellow, or red. A packet is marked red if it exceeds the
PIR. Otherwise it is marked either yellow or green depending on whether it exceeds or
doesn't exceed the CIR.
type of service A field in an IP packet (IP datagram) used for quality of service (QoS). The TOS field
has 8 bits in length, which is divided into five subfields.
U
U-VLAN A VLAN attribute indicating that the current VLAN is a user VLAN of an M-VLAN.
Multicast services are copied from the M-VLAN to the user VLAN.
UAS unavailable second
UAT See unavailable time event
UBR See unspecified bit rate
UBR+ Unspecified Bit Rate Plus
UDP See User Datagram Protocol
unavailable time event A UAT event is reported when the monitored object generates 10 consecutive severely
errored seconds (SES) and the SESs begin to be included in the unavailable time. The
event will end when the bit error ratio per second is better than 10-3 within 10
consecutive seconds.
underfloor cabling The cables connected cabinets and other devices are routed underfloor.
UNI See user network interface
unicast The process of sending data from a source to a single recipient.
unspecified bit rate No commitment to transmission. No feedback to congestion. This type of service is
ideal for the transmission of IP datagrams. In case of congestion, UBR cells are
discarded, and no feedback or request for slowing down the data rate is delivered to
the sender.
UPC/NPC See usage parameter control/network parameter control
Upper subrack The subrack close to the top of the cabinet when a cabinet contains several subracks.
Upper threshold The critical value that can induce unexpected events if exceeded.
UPS uninterruptible power supply
usage parameter Usage Parameter Control/Network Parameter Control. During the communication, the
control/network UPC is implemented to monitor the actual traffic on each virtual circuit that is input to
parameter control the network. Once the specified parameter is exceeded, measures will be taken to
control. NPC is similar to the UPC in function. The difference is that the incoming
traffic monitoring function is divided into UPC and NPC according to their positions.
The UPC locates at the user/network interface, while the NPC at the network
interface.
User Datagram A TCP/IP standard protocol that allows an application program on one device to send
Protocol a datagram to an application program on another. User Datagram Protocol (UDP) uses
IP to deliver datagrams. UDP provides application programs with the unreliable
connectionless packet delivery service. Thus, UDP messages can be lost, duplicated,
delayed, or delivered out of order. UDP is used to try to transmit the data packet, that
is, the destination device does not actively confirm whether the correct data packet is
received.
user network interface The interface between user equipment and private or public network equipment (for
example, ATM switches).
User operation log Record the operation of the user for the convenience of analysis and query.
V
V-NNI See virtual network-network interface
V-UNI See virtual user-network interface
variable bit rate One of the traffic classes used by ATM (Asynchronous Transfer Mode). Unlike a
permanent CBR (Constant Bit Rate) channel, a VBR data stream varies in bandwidth
and is better suited to non real time transfers than to real-time streams such as voice
calls.
VBR See variable bit rate
VC See virtual channel
VCC See virtual channel connection
VCCV virtual circuit connectivity verification
VCI See virtual channel identifier
VCTRUNK A virtual concatenation group applied in data service mapping, also called the internal
port of a data service processing board
virtual channel Any logical connection in the ATM network. A VC is the basic unit of switching in
the ATM network uniquely identified by a virtual path identifier (VPI)/virtual channel
identifier (VCI) value. It is the channel on which ATM cells are transmitted by the
switching.
virtual channel The VC logical trail that carries data between two end points in an ATM network. A
connection logical grouping of multiple virtual channel connections into one virtual connection.
virtual channel A 16-bit field in the header of an ATM cell. The VCI, together with the VPI, is used to
identifier identify the next destination of a cell as it passes through a series of ATM switches on
its way to its destination.
virtual circuit A channel or circuit established between two points on an ATM /a network. Virtual
circuits can be Permanent Virtual Circuits (PVCs) or Switched Virtual Circuits
(SVCs).
virtual leased line A point-to-point, layer-2 channel that behaves like a leased line by transparently
transporting different protocols with a guaranteed throughput.
virtual local area A logical grouping of two or more nodes which are not necessarily on the same
network physical network segment but which share the same IP network number. This is often
associated with switched Ethernet.
W
WAN See wide area network
Wander The long-term variations of the significant instants of a digital signal from their ideal
position in time (where long-term implies that these variations are of frequency less
than 10Hz).
wavelength The distance between successive peaks or troughs in a periodic signal that is
propagated through space. Wavelength is symbolized by the Greek letter lambda and
can be calculated as speed divided by frequency.
wavelength division A technology that utilizes the characteristics of broad bandwidth and low attenuation
multiplexing of single mode optical fiber, uses multiple wavelengths as carriers, and allows
multiple channels to transmit simultaneously in a single fiber.
WDM See wavelength division multiplexing
weighted fair queuing A fair queue scheduling algorithm based on bandwidth allocation weights. This
scheduling algorithm allocates the total bandwidth of an interface to queues, according
to their weights and schedules the queues cyclically. In this manner, packets of all
priority queues can be scheduled.
weighted random early A packet loss algorithm used for congestion avoidance. It can prevent the global TCP
detection synchronization caused by traditional tail-drop. WRED is favorable for the high-
priority packet when calculating the packet loss ratio.
WFQ See weighted fair queuing
wide area network A network composed of computers which are far away from each other which are
physically connected through specific protocols. WAN covers a broad area, such as a
province, a state or even a country.
winding pipe A tool for fiber routing, which acts as the corrugated pipe.
Working path The channels allocated to transport the normal traffic.
WRED See weighted random early detection
error packets The packets with received messages not translated or translated incorrectly.
X
X digital subscriber A family of bandwidth-efficient modulation techniques, developed to achieve
line extremely high data transfer rates over twisted- pair cables. While the letter "X"
represents a variable, DSL stands for "Digital Subscriber Line". XDSL techniques
may offer several benefits such as, capability to offer high-speed data services to
customers, low cost by using existing infrastructure and switching congestion relief
caused by existing data users.
xDSL See X digital subscriber line