System Description Manual 3HH13800BAAATQZZA10
System Description Manual 3HH13800BAAATQZZA10
System Description Manual 3HH13800BAAATQZZA10
3HH-13800-BAAA-TQZZA
Issue: 10
December 2018
2 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Table of contents
1 Preface...........................................................................................41
1.1 Scope ........................................................................................................41
1.2 Audience....................................................................................................41
1.3 Required knowledge..................................................................................41
1.4 Acronyms and initialisms ...........................................................................41
1.5 Safety information......................................................................................41
1.6 Documents ................................................................................................41
1.7 Product Naming.........................................................................................42
1.8 Special information ....................................................................................42
1.9 Release notes............................................................................................42
2 Introduction...................................................................................43
2.1 General......................................................................................................43
2.2 Supported Network Interfaces ...................................................................44
2.3 Supported User Interfaces.........................................................................45
2.4 Integrated DSL, Voice, Point-to-point Ethernet, GPON and
Universal NG-PON system........................................................................46
2.5 Document Structure...................................................................................46
3 System interface overview...........................................................47
3.1 General......................................................................................................47
3.2 Overview....................................................................................................48
3.2.1 Link transmission technology ....................................................................48
3.2.2 Transfer modes .........................................................................................49
3.2.3 Bonding .....................................................................................................50
3.3 Multi-ADSL ................................................................................................50
3.3.1 ADSL1 .......................................................................................................50
3.3.1.1 Asymmetric nature of ADSL ......................................................................51
3.3.1.2 Bidirectional transport................................................................................51
3.3.1.3 ADSL services ...........................................................................................51
3.3.1.4 Operational modes ....................................................................................52
3.3.2 ADSL2 .......................................................................................................52
3.3.2.1 Operational modes ....................................................................................53
3.3.3 ADSL2plus.................................................................................................54
3.3.3.1 Operational modes ....................................................................................54
3.3.4 Reach Extended ADSL2............................................................................54
3.3.4.1 Operational modes ....................................................................................54
3.4 VDSL .........................................................................................................55
3.4.1 VDSL1 .......................................................................................................55
3.4.2 VDSL2 .......................................................................................................55
3.4.2.1 VDSL2 features .........................................................................................55
3.4.2.2 VDSL2 Operational Modes........................................................................56
3.4.2.3 VDSL2 profile parameter overview............................................................56
3.5 SHDSL.......................................................................................................57
3.5.1 Regional settings .......................................................................................58
3.5.2 Payload rates.............................................................................................58
Issue: 10 3HH-13800-BAAA-TQZZA 3
System Description for FD 100/320Gbps NT and FX
NT
4 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Issue: 10 3HH-13800-BAAA-TQZZA 5
System Description for FD 100/320Gbps NT and FX
NT
6 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Issue: 10 3HH-13800-BAAA-TQZZA 7
System Description for FD 100/320Gbps NT and FX
NT
8 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Issue: 10 3HH-13800-BAAA-TQZZA 9
System Description for FD 100/320Gbps NT and FX
NT
10 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Issue: 10 3HH-13800-BAAA-TQZZA 11
System Description for FD 100/320Gbps NT and FX
NT
12 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Issue: 10 3HH-13800-BAAA-TQZZA 13
System Description for FD 100/320Gbps NT and FX
NT
14 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Issue: 10 3HH-13800-BAAA-TQZZA 15
System Description for FD 100/320Gbps NT and FX
NT
16 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Issue: 10 3HH-13800-BAAA-TQZZA 17
System Description for FD 100/320Gbps NT and FX
NT
18 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Issue: 10 3HH-13800-BAAA-TQZZA 19
System Description for FD 100/320Gbps NT and FX
NT
20 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Issue: 10 3HH-13800-BAAA-TQZZA 21
System Description for FD 100/320Gbps NT and FX
NT
22 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Issue: 10 3HH-13800-BAAA-TQZZA 23
System Description for FD 100/320Gbps NT and FX
NT
24 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
List of figures
2 Introduction...................................................................................43
Figure 1 ISAM Network Architecture .......................................................................44
3 System interface overview...........................................................47
Figure 2 IMA ............................................................................................................65
4 Failure protection and redundancy provisions in ISAM ...........73
Figure 3 Link protection with active/standby external NT link..................................78
Figure 4 Link protection with load-sharing external NT links ...................................79
Figure 5 Link protection with load-sharing external NT links ...................................80
Figure 6 NT equipment protection with distributed external links ............................81
Figure 7 NT equipment protection with distributed external links (load
aggregation) ..............................................................................................82
Figure 8 Independent load sharing external link and NT protection with NT ...........84
Figure 9 NTIO operating in Active/Active mode.......................................................85
Figure 10 Example of an ISAM subtending star topology..........................................86
Figure 11 Example of an ISAM subtending daisy chain topology..............................87
Figure 12 Example of an ISAM subtending ring topology..........................................88
Figure 13 Example of layer3-based protection ..........................................................89
Figure 14 Type-B PON Protection .............................................................................92
Figure 15 Protection switching via autonomous ONU re-tuning on a TWDM
PON system (normal operation) ................................................................94
Figure 16 Protection switching via autonomous ONU re-tuning on a TWDM
PON system (at failure) .............................................................................94
Figure 17 Protection switching via autonomous ONU re-tuning on a TWDM
PON system (protected mode) ..................................................................95
5 Management..................................................................................97
Figure 18 ISAM management....................................................................................98
Figure 19 Secure and insecure management interfaces ...........................................99
Figure 20 SSH client-server architecture in the NE .................................................107
Figure 21 Management via a Layer 3 SAP - external management v-VPLS
(VLAN).....................................................................................................115
Figure 22 Management via a Layer 3 SAP - No external management v-
VPLS .......................................................................................................116
Figure 23 Management via an IP interface directly connected to a network
port ..........................................................................................................117
Figure 24 Temporal alarm by quantity .....................................................................124
Figure 25 Temporal alarm by time...........................................................................125
Figure 26 Zero Touch Provisioning..........................................................................134
6 Line testing features...................................................................137
Figure 27 Position line testing capabilities for DSL - POTS/ISDN lines...................139
Figure 28 Embedded OTDR main advantages........................................................159
7 Network timing reference support in ISAM ..............................161
Figure 29 Overview of possible NTR support on some LTs and some NTs in
the FD 100/320Gbps ISAM NT family .....................................................164
Issue: 10 3HH-13800-BAAA-TQZZA 25
System Description for FD 100/320Gbps NT and FX
NT
26 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Issue: 10 3HH-13800-BAAA-TQZZA 27
System Description for FD 100/320Gbps NT and FX
NT
28 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Figure 123 ISAM Voice : Private VLAN / IP address topology - Subtending Voice
access node ............................................................................................331
Figure 124 ISAM Voice : Private VLAN / IP address topology - Remote Voice
access node ............................................................................................331
Figure 125 ISAM Voice : Distributed IP address Architecture - Shared VLAN
topology ...................................................................................................333
Figure 126 ISAM Voice : Distributed IP address Architecture - Distinct VLAN
topology ...................................................................................................334
Figure 127 ISAM Voice : Centralized IP address Architecture - Distinct VLAN
topology ...................................................................................................336
Figure 128 7363 ISAM MX : Centralized IP address Architecture - Distinct
VLAN topology.........................................................................................336
Figure 129 ISAM Voice : Centralized IP address Architecture - Shared VLAN
topology ...................................................................................................337
Figure 130 7363 ISAM MX : Centralized IP address Architecture - Shared
VLAN topology.........................................................................................338
Figure 131 ISAM Voice : Distributed IP address Architecture - Shared VLAN/IP
address topology .....................................................................................340
Figure 132 ISAM Voice : Distributed IP address Architecture - Distinct VLAN/IP
address topology .....................................................................................342
Figure 133 ISAM Voice : Centralized IP address Architecture - Distinct VLAN/IP
address topology .....................................................................................344
Figure 134 ISAM Voice : Centralized IP address Architecture - Shared VLAN/IP
address topology .....................................................................................346
Figure 135 H.248 signaling protocol stack - Voice POTS access node as
Switching Device .....................................................................................347
Figure 136 H.248 signaling protocol stack - Voice POTS access node as
Routing Device ........................................................................................347
Figure 137 H.248 signaling protocol stack - Subtending Voice POTS access
node as Switching Device - HUB Voice access node as Switching device...
348
Figure 138 H.248 signaling protocol stack - Subtending Voice POTS access
node as Switching Device - HUB access node as Routing Device .........348
Figure 139 H.248 signaling protocol stack - Remote Voice POTS access node
as Switching Device - HUB Voice access node as Routing Device ........348
Figure 140 H.248 signaling protocol stack - Remote Voice POTS access node
as Switching Device - HUB Voice access node as Routing Device ........349
Figure 141 ISDN BRA signaling protocol stack - HUB Voice access node as
Switching Device .....................................................................................349
Figure 142 ISDN BRA signaling protocol stack - HUB Voice access node as
Routing Device ........................................................................................350
Figure 143 ISDN BRA signaling protocol stack - Subtending Voice access
node as Switching Device - HUB Voice access node as Switching Device ..
350
Figure 144 ISDN BRA signaling protocol stack - Subtending Voice access
node as Switching Device - HUB Voice access node as Routing Device351
Figure 145 ISDN BRA signaling protocol stack - Remote Voice access node as
Switching Device - HUB Voice access node as Switching Device ..........351
Issue: 10 3HH-13800-BAAA-TQZZA 29
System Description for FD 100/320Gbps NT and FX
NT
Figure 146 ISDN BRA signaling protocol stack - Remote Voice access node as
Switching Device - HUB Voice access node as Routing Device .............351
Figure 147 SIP signaling protocol stack - Distributed IP address Architecture -
HUB Voice access node as Switching Device - POTS Line....................352
Figure 148 SIP signaling protocol stack - Distributed IP address Architecture -
HUB Voice access node as Routing Device - POTS Line ......................352
Figure 149 SIP signaling protocol stack - Centralized IP address Architecture -
Upstream - HUB Voice access node as Switching Device - POTS
Line..........................................................................................................353
Figure 150 SIP signaling protocol stack - Centralized IP address Architecture -
Upstream - HUB Voice access node as Routing Device - POTS
Line..........................................................................................................353
Figure 151 SIP signaling protocol stack - Centralized IP address Architecture -
Downstream - HUB Voice access node as Switching Device -
POTS Line ...............................................................................................353
Figure 152 SIP signaling protocol stack - Centralized IP address Architecture -
Downstream - HUB voice access node as Routing Device - POTS
Line..........................................................................................................354
Figure 153 ISDN PRA to SIP signaling protocol stack - Centralized/Distributed
IP address Architecture - ISDN PRA Line ...............................................354
Figure 154 CAS R2 to SIP signaling protocol stack - Centralized/Distributed IP
address Architecture - CAS R2 Line........................................................354
Figure 155 RTP/RTCP protocol stack - Upstream/Downstream ...............................355
Figure 156 Megaco Integrated Voice Service Conceptual Management Model........361
Figure 157 SIP Protocol and Network Conceptual Management model ...................364
Figure 158 Performance Monitoring Conceptual Management Model - POTS .........365
Figure 159 CDE File Conceptual Management model ..............................................366
Figure 160 Narrowband Line Test Conceptual Management Model .........................366
Figure 161 CESoPSN Conceptual Management model............................................371
Figure 162 LOCAL and GEO redundancy .................................................................381
Figure 163 Single MGC and single ASP....................................................................382
Figure 164 Single MGC and two ASPs......................................................................382
Figure 165 Local MGC switch-over ...........................................................................384
Figure 166 Local ASP switch-over.............................................................................384
Figure 167 GEO MGC switch-over ............................................................................385
Figure 168 GEO ASP switch-over (caused by GEO MGC switch-over)....................385
Figure 169 SIP Server redundancy ...........................................................................388
Figure 170 SIP GEO redundancy ..............................................................................394
Figure 171 SIP ESA redundancy...............................................................................395
Figure 172 LSA Server Conceptual Management Model ..........................................400
Figure 173 SIP overload handling .............................................................................410
Figure 174 H.248 Integrated Voice Service - Switched device - External
Packet Forwarding enabled.....................................................................421
Figure 175 H.248 Integrated Voice Service - Switched device - External
Packet Forwarding disabled ....................................................................422
Figure 176 SIP Integrated Voice Service - Switched device - External Packet
Forwarding enabled.................................................................................424
Figure 177 SIP Integrated Voice Service - Switched device - External Packet
Forwarding disabled ................................................................................425
30 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Figure 178 Device connected directly to the Voice access node ..............................426
Figure 179 Device connected remotely to the Voice access node ............................426
Figure 180 Voice upgrade/migration cluster (centralized topology)...........................428
Figure 181 Voice upgrade/migration cluster (distributed topology) ...........................429
14 Integrated Narrowband Support................................................433
Figure 182 SIP ISAM Voice Performance Monitoring Result Post-Processing .........475
Figure 183 SIP Integrated Voice Service - ISDN PRA ..............................................486
Figure 184 SIP Integrated Voice Service ISDN PRA protocols .................................487
Figure 185 ISDN PRA User Connections ..................................................................488
Figure 186 SIP Integrated Voice Service CAS R2.....................................................504
Figure 187 SIP Integrated Voice Service CAS R2 protocols .....................................505
Figure 188 Structured (Nx64) E1 Leased Line (PW3) in ISAM via ISDN PRA
LT Board..................................................................................................520
15 Layer 2 forwarding......................................................................525
Figure 189 Untagged and tagged/priority-tagged Ethernet frames ...........................526
Figure 190 Example of VLAN ....................................................................................527
Figure 191 ISAM as an Access Device .....................................................................528
Figure 192 The generic L2 forwarder ........................................................................529
Figure 193 A VLAN cross-connect ............................................................................532
Figure 194 Dual-Tag S+C-VLAN cross-connect........................................................532
Figure 195 L2 multiservice by means of VLAN ports.................................................537
Figure 196 VLAN ports hiding the line transport technology .....................................538
Figure 197 Multi-VLAN and VLAN translation example.............................................541
Figure 198 MPLS as network encapsulation technique.............................................542
Figure 199 ISAM support for VULA operations .........................................................543
Figure 200 Distributed Layer 2 Forwarding in ISAM (GPON/XGS-PON /
TWDM-PON OLT-ONT) ..........................................................................545
Figure 201 Layer 2 Forwarding in ISAM ....................................................................546
Figure 202 Subtended network elements ..................................................................549
Figure 203 Three stage forwarding for ISAM operating as a VULA node .................551
Figure 204 iBridge with direct network VLAN encapsulation .....................................552
Figure 205 VLAN Cross-connect with direct network VLAN encapsulation...............553
Figure 206 iBridging using with MPLS pseudo-wires towards the NSP ....................554
Figure 207 C- and S-VLAN cross-connect with MPLS pseudo-wires and E-
PIPE ........................................................................................................555
Figure 208 Full Bridge emulation (direct Network VLAN encapsulation shown) .......556
Figure 209 Combining forwarders on uplink/downlink LTs for VULA operations.......557
Figure 210 Combining forwarders on uplink LT and UNI/NNI on downlink LTs
for VULA operations ................................................................................557
Figure 211 Subscriber access interface model for iBridges and VLAN cross-
connect ....................................................................................................561
Figure 212 Support for Jumbo frames .......................................................................562
Figure 213 VLAN with two ISAMs..............................................................................570
Figure 214 Hub-ISAM with iBridge ............................................................................571
Figure 215 Finding out the right L2 forwarder for an Ingress Frame .........................576
Figure 216 Possible Manipulations on Frames VLAN Tag by VLAN ports................577
Figure 217 Forwarding untagged/priority-tagged frames in an iBridge (iBridge
shown with only one subscriber) .............................................................578
Issue: 10 3HH-13800-BAAA-TQZZA 31
System Description for FD 100/320Gbps NT and FX
NT
Figure 218 Protocol-based VLAN selection (iBridge shown with only one
subscriber)...............................................................................................579
Figure 219 Subscriber-side VLAN-IDs with a network-wide scope (iBridge
shown with only one subscriber) .............................................................580
Figure 220 Support for VLAN translation (iBridge shown with only one
subscriber)...............................................................................................581
Figure 221 C-VLAN cross-connect concept ..............................................................589
Figure 222 S+C-VLAN cross-connect concept ..........................................................590
Figure 223 S-VLAN cross-connect model concept....................................................592
Figure 224 Tunnel-VLAN, C-VLAN and S+C-VLAN cross-connects on same
bridge port ...............................................................................................592
Figure 225 Use of transparent VLAN cross-connect .................................................594
Figure 226 One transparent VLAN cross-connect per PVC/EFM..............................596
Figure 227 IP network model for business cross-connect .........................................597
Figure 228 IP network model for residential cross-connect using IP
connectivity..............................................................................................598
Figure 229 IP network model for residential cross-connect using PPP
connectivity..............................................................................................599
Figure 230 IP network model for business IPoA cross-connect ................................602
Figure 231 Ethernet network model for business IPoA cross-connect ......................603
Figure 232 Enhanced iBridge architecture ................................................................605
Figure 233 iBridge .....................................................................................................610
Figure 234 iBridge with vMAC enabled .....................................................................610
Figure 235 General PPP cross-connect engine ........................................................617
Figure 236 Subscriber access interface stack for PPP client ports ...........................618
Figure 237 Accepted ATM encapsulation for PPP cross-connect Forwarding
with MAC address concentration.............................................................618
Figure 238 PPP cross-connect inside the ISAM........................................................619
16 Protocol handling in a Layer 2 forwarding model ...................621
Figure 239 Link aggregation ......................................................................................624
Figure 240 Link aggregation support .........................................................................626
Figure 241 Active / standby subgroup for aggregation ..............................................627
Figure 242 Spanning Tree between NE and EMAN ..................................................629
Figure 243 Ethernet Ring Topology...........................................................................632
Figure 244 Normal state of Ethernet Ring Protection ................................................632
Figure 245 Path Failure and R-APS message flow to RPL Owner Node ..................633
Figure 246 Reconfiguration to protected path ...........................................................633
Figure 247 CFM on the access aggregation network ................................................637
Figure 248 MEPs supported on ISAM equipped with DSL or P2P GE LTs...............640
Figure 249 MEPs supported on ISAM equipped with DSL or P2P 10 GE LTs..........640
Figure 250 802.1X in the ISAM..................................................................................644
Figure 251 Layer 2 DHCP relay implementation) ......................................................647
Figure 252 PPPoE Relay Implementation .................................................................653
Figure 253 Network Topology....................................................................................654
17 IP routing .....................................................................................661
Figure 254 IPv4 routing - Base router with IES service .............................................668
Figure 255 IPv6 routing - Base router with IES service .............................................668
Figure 256 IPv4 routing - VPRN service....................................................................671
32 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Issue: 10 3HH-13800-BAAA-TQZZA 33
System Description for FD 100/320Gbps NT and FX
NT
34 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Issue: 10 3HH-13800-BAAA-TQZZA 35
System Description for FD 100/320Gbps NT and FX
NT
36 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
List of tables
3 System interface overview...........................................................47
Table 1 ADSL operational modes...........................................................................52
Table 2 ADSL2 operational modes.........................................................................53
Table 3 ADSL2plus operational modes ..................................................................54
Table 4 READSL2 operational modes....................................................................55
Table 5 VDSL2 operational modes.........................................................................56
Table 6 VDSL2 profile parameter overview............................................................57
Table 7 SHDSL regional settings ...........................................................................58
4 Failure protection and redundancy provisions in ISAM ...........73
Table 8 Overview of link protection options in function of the Ethernet LT
interface types ...........................................................................................91
5 Management..................................................................................97
Table 9 Contents ....................................................................................................97
Table 10 Message type and log severity parameters.............................................110
Table 11 Supported SSH and SNMP Authentication and Encryption
Schemes..................................................................................................112
6 Line testing features...................................................................137
Table 12 NBLT type categories ..............................................................................150
Table 13 NBLT type categories on ISDN ...............................................................155
7 Network timing reference support in ISAM ..............................161
Table 14 Specific clock requirements per application ............................................162
Table 15 ISAM used as VULA node.......................................................................166
Table 16 G.8275.1 profile .......................................................................................187
Table 17 G.8265.1 profile .......................................................................................188
Table 18 CCSA profile............................................................................................188
Table 19 Customer profile ......................................................................................188
8 ADSL/VDSL features ..................................................................191
Table 20 Supported xDSL features ........................................................................192
Table 21 Supported VDSL2 profiles .......................................................................192
Table 22 Supported VDSL2 bandplans ..................................................................193
13 Integrated Voice Service ............................................................257
Table 23 Supported Features.................................................................................259
Table 24 SIP ISDN PRA: Supported number manipulation rules...........................375
Table 25 SIP ISDN PRA: Supported number manipulation rules...........................376
Table 26 SIP CAS R2: Supported number manipulation rules...............................378
Table 27 Supported DHCP options ........................................................................414
14 Integrated Narrowband Support................................................433
Table 28 ISAM Access Node as OFFER side (DTMF audio).................................438
Table 29 ISAM Access Node as OFFER side (DTMF RFC2833). .........................439
Table 30 ISAM Access Node as OFFER side (DTMF both)...................................440
Table 31 ISAM Access Node as OFFER side (Mandatory audio)..........................441
Table 32 ISAM Access Node as ANSWER side (DTMF audio). ............................442
Issue: 10 3HH-13800-BAAA-TQZZA 37
System Description for FD 100/320Gbps NT and FX
NT
38 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX
NT
Issue: 10 3HH-13800-BAAA-TQZZA 39
System Description for FD 100/320Gbps NT and FX
NT
40 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Preface
NT
1 Preface
This preface provides general information about the documentation set for the
7302 Intelligent Services Access Manager (7302 ISAM), the 7330 Intelligent
Services Access Manager Fiber to the Node (7330 ISAM FTTN) and the 7360 ISAM
FX.
1.1 Scope
This documentation set provides information about safety, features and functionality,
ordering, hardware installation and maintenance, CLI and TL1 commands, and
software upgrade and migration procedures.
1.2 Audience
This documentation set is intended for planners, administrators, operators, and
maintenance personnel involved in installing, upgrading, or maintaining the
7302 ISAM, the 7330 ISAM FTTN or the 7360 ISAM FX.
1.6 Documents
Refer to the Product Information document for your product to see a list of all the
relevant customer documents and their part numbers for the current release.
Issue: 10 3HH-13800-BAAA-TQZZA 41
Preface System Description for FD 100/320Gbps NT and FX
NT
42 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Introduction
NT
2 Introduction
2.1 General
2.1 General
This document provides the system description for the following products:
• 7302 Intelligent Services Access Manager (ISAM) equipped with an FD 100 or
320Gbps NT
• 7330 ISAM Fiber To The Node (FTTN) equipped with an FD 100 or 320Gbps NT
• 7360 Intelligent Services Access Manager (ISAM) FX
For specific product details on each of these systems, see the:
• 7302 ISAM Product Information
• 7330 ISAM FTTN Product Information
• 7360 ISAM FX Product Information
The ISAM is a frame-based Multi Service Access Platform, offering high-density
copper and fiber connections for multimedia, high-speed internet access, voice and
business services.
The position of the ISAM in the network is visualized in Figure 1, showing on the left
side the different types of user interfaces that terminate on the Line Termination (LT)
boards in the system.
The ISAM can be deployed with numerous interfaces and in different network
environments.
The ISAM network architecture is shown in Figure 1.
Issue: 10 3HH-13800-BAAA-TQZZA 43
Introduction System Description for FD 100/320Gbps NT and FX
NT
Ethernet
NSP IP backbone
Switch
ISAM
xDSL
Ethernet FE/GE/10GE/100GE
Wi-Fi
NSP IP backbone
ISAM
ISAM shelf
xDSL
xDSL LT
FE/GE/10GE/100GE
DS1/E1 Eth
LT GENERIC UPLINKS
Ethernet
Voice NT FE/GE/10GE/100GE
LT
Voice FE/GE/10GE
Eth
LT VULA UPLINKS
Video ONT/ OMCI GPON
ONU GPON LT FE/GE/10GE
Wi-Fi
ONT/ WM Universal
CEx
ONU NG-PON
LT
ISAM OLT
44 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Introduction
NT
More details on every of these interfaces are available in chapter “System interface
overview”.
Issue: 10 3HH-13800-BAAA-TQZZA 45
Introduction System Description for FD 100/320Gbps NT and FX
NT
46 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX System interface overview
NT
3.2 Overview
3.3 Multi-ADSL
3.4 VDSL
3.5 SHDSL
3.6 Ethernet
3.7 GPON
3.8 TWDM-PON
3.1 General
This chapter provides a general description of the system interfaces.
The ISAM can be deployed with numerous interfaces and in different network
environments. In a basic deployment, the ISAM is used to provide High-Speed
Internet (HSI), Video, and Voice over IP (VoIP) services to subscribers.
A specific use of the ISAM is to provide classic telephony services to subscribers
being connected with classic Plain Old Telephone Service (POTS) or Integrated
Services Digital Network (ISDN) lines, and to convert within the ISAM the
corresponding signals to VoIP signaling and data packets. This specific use of the
ISAM is known as ISAM Voice.
Issue: 10 3HH-13800-BAAA-TQZZA 47
System interface overview System Description for FD 100/320Gbps NT and FX
NT
In case a Passive Optical Network (PON) is used as physical access technology, the
GPON LT or TWDM-PON LT connects via fiber interfaces to the PON and physically
terminates into the Optical Network Units (ONUs) that provides the user interfaces
for all services.
ONUs are access devices that are located at the user/customer premises. Several
types of ONU exist, more details are described in a dedicated section further in this
document
It should be clear that, due to the positioning of the ONU, this device provides the
actual user interfaces and is, together with the GPON LT respectively TWDM-PON
LT fully ISAM-internal.
Note 1 — Throughout this document, the terminology as
defined in Rec. ITU-T G.984.1 (03/2008) will be adopted for
GPON and TWDM-PON. The Optical Network Unit (ONU) is
the generic term denoting a device that terminates any one of
the distributed (leaf) endpoints of an Optical Distribution
Network, implements a PON protocol, and adapts PON PDUs
to subscriber service interfaces. In some contexts, an ONU
implies a multiple-subscriber device. The Optical Network
Termination (ONT) is a single subscriber device and is a
special case of an ONU.
Note 2 — Throughout this document, GPON is generally meant
to convey ITU based PON families (2.5/1.25G GPON, 10/2.5G
and 10/10G XGS-PON / TWDM-PON).
3.2 Overview
The following section provides an overview of the different relevant aspects for
subscriber links.
Note 1 — For ease of understanding, the ISAM Voice links are
described separately, see section “Overview of ISAM Voice
interfaces”.
Note 2 — For a clear delineation, Optical Network Unit
(ONU)-based user-facing interfaces (UNIs) are also discussed
separately, see section “Overview of ONU Based UNI and
Service Interfaces”.
48 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX System interface overview
NT
The Ethernet subscriber links can also be terminated on the Network Termination
(NT) boards or the NT I/O boards.
In addition, Gigabit-capable Passive Optical Network (GPON) line boards provide
ISAM OLT interfaces to ONU to deliver high quality voice, video, and data services
to both single-family, multi-dwelling residential and business subscribers. The ISAM
OLT implementation is based on ITU-T and IEEE specifications, see
sections “GPON” and “TWDM-PON”.
Different boards are involved in supporting the following interfaces :
• Network links (ISAM uplinks) are terminated by the NT boards or the NTIO boards
or an Ethernet Line Termination board operating in VULA uplink mode.
• Subtending links (to the subtended ISAM) or inter-shelf links (ISAM downlinks
from the host shelf to standalone remote shelves or Remote Expansion Modules
(7356 ISAM FTTB REMs)) are terminated by the NT boards, by the NTIO boards
or by an Ethernet Line Termination board operating in
Network-to-Network-Interfacing (NNI) modus
• Expansion links to Remote Expansion Modules (7356 ISAM FTTB REMs)
operated in distributed mode are terminated by the NTIO boards.
Issue: 10 3HH-13800-BAAA-TQZZA 49
System interface overview System Description for FD 100/320Gbps NT and FX
NT
3.2.3 Bonding
A number of methods exist to combine multiple physical links that apply the
preceding transmission types and transfer modes to a single logical subscriber
interface. This allows increasing either:
• the available service bandwidth for a subscriber
• the distance across which a standard service bandwidth package can be offered,
in case of transmission types for which the achievable link bandwidth depends
strongly on the length of the local loop
• a combination of the preceding two methods.
The same methods of combining multiple physical links can also be used to provide
a bonded copper backhaul pipe for backhaul of a subtended access node (typically
a smaller micro-node) to a hub access node.
Bonding of multiple links is possible at different levels in the ISAM, where the traffic
of DSL links is aggregated. The broader the scope of the bonding capability, the
more flexibility an operator has to configure bonding groups.
The following bonding methods are defined within the standards:
• Inverse Multiplexing for ATM (IMA): ATM Forum Specification af-phy-0086.001
• ATM Bonding: ITU-T G.998.1
• PTM Bonding: ITU-T G.998.2
• M-pair operation for SHDSL: ITU-T G.991.2
3.3 Multi-ADSL
The ISAM supports multi-ADSL subscriber lines. This section describes the different
supported ADSL types.
3.3.1 ADSL1
Asymmetric Digital Subscriber Line (ADSL) is used on existing metallic twisted pairs
(one per subscriber) between the Customer Premises Equipment (CPE) and a
Central Office (CO) exchange.
50 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX System interface overview
NT
The chosen rate depends on the bidirectional services to be supported and the loop
characteristics.
This transmission type allows high-bandwidth services, for example, digital audio
and video (multimedia), Ethernet interconnection to the customer, and so on.
Issue: 10 3HH-13800-BAAA-TQZZA 51
System interface overview System Description for FD 100/320Gbps NT and FX
NT
G.992.1 Annex A Also known as G.dmt; operation over POTS non-overlapped spectrum
G.992.2 Annex A Also known as G.lite; operation over POTS non-overlapped spectrum. This standard is
a medium bandwidth version of ADSL that allows Internet access at up to 1.5 Mb/s
downstream and up to 512 kb/s upstream.
3.3.2 ADSL2
The ADSL2 family of ADSL standards adds features and functionality that boost the
performance, improve interoperability, and support new applications, services, and
deployment scenarios.
ADSL2 includes the following:
• Better rate and reach:
Improved modulation efficiency, improved initialization state machine, enhanced
signal processing algorithms, reduced framing overhead, and framing extension
allowing higher coding gain.
• Loop diagnostics:
Real-time performance-monitoring capabilities provide information regarding line
quality and noise conditions at both ends of the line (see chapter “Line testing
features”, section “Single-Ended Line Testing”). In addition, ADSL2 provides
Carrier Loop diagnostics based on Dual-Ended Line Testing (DELT) (see
chapter “Line testing features”, section “Dual-ended line testing”).
• Packet-based services:
ADSL2 amendment 1 brings native transport of packets such as Ethernet
• Impulse Noise Protection (INP):
See chapter “ADSL/VDSL features”, section “Configurable impulse noise
protection”.
• Physical Layer Retransmission (RTX):
See chapter “ADSL/VDSL features”, section “Physical Layer Retransmission
(G.INP)”.
52 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX System interface overview
NT
• Bonding:
ADSL2 also specifies IMA. However, this has been replaced by bonding support
as per G.998.1; see section “ATM/PTM bonding”.
• Low-power modes (L2/L3):
See chapter “ADSL/VDSL features”, section “Low-power modes”.
• Seamless Rate Adaptation (SRA):
See chapter “ADSL/VDSL features”, section “Seamless rate adaptation”.
• Carrier masking:
The carrier mask allows the suppression of each individual carrier in the upstream
and downstream direction.
• Mandatory receiver support of bit swapping:
Bit swapping reallocates data and power (that is, margin) among the allocated
subcarriers without modification of the higher layer features of the physical layer.
After a bit swapping reconfiguration, the total data rate is unchanged and the data
rate on each latency path is unchanged.
• Radio Frequency Interference (RFI) egress control and means for RFI ingress
control:
To minimize the impact of radio frequency interference from and with AM radio
and radio amateurs, multi-ADSL provides RFI egress control and means for RFI
ingress control.
G.992.3 Annex M Extended upstream operation (up to 3 Mb/s) over POTS non-overlapped spectrum
G.992.3 Annex J All Digital Mode operation with non-overlapped spectrum and extended upstream band
(spectrally compatible with ADSLx over ISDN)
A license counter keeps track of all the installed lines on which G.992.3 or G.992.5
Annex M is enabled.
A license counter keeps track of all the installed lines on which G.992.3 or G.992.5
Annex J is enabled.
Issue: 10 3HH-13800-BAAA-TQZZA 53
System interface overview System Description for FD 100/320Gbps NT and FX
NT
3.3.3 ADSL2plus
A number of applications, such as some video streams or combinations of video and
data streams, can benefit from higher downstream rates than are currently possible
with ADSL2. By doubling the ADSL frequency range up to 2.2 MHz, downstream bit
rates of up to about 25 Mb/s can be provided.
G.992.5 Annex M Extended upstream operation (up to 3 Mb/s) over POTS non-overlapped spectrum
G.992.5 Annex J All Digital Mode operation with non-overlapped spectrum and extended upstream band
(spectrally compatible with ADSLx over ISDN)
A license counter keeps track of all the installed lines on which G.992.3 or G.992.5
Annex M is enabled.
A license counter keeps track of all the installed lines on which G.992.3 or G.992.5
Annex J is enabled.
54 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX System interface overview
NT
G.992.3 Annex L (WIDE) Operation over POTS non-overlapped spectrum, Range-Extended Mode 1
G.992.3 Annex L (NARROW) Operation over POTS non-overlapped spectrum, Range-Extended Mode 2
3.4 VDSL
Very high bit rate Digital Subscriber Line (VDSL) allows very high speed data
transmission on a metallic twisted pair between the operator network and the
customer premises. This service is provisioned by using the existing unshielded
copper twisted pairs, without requiring repeaters. By using a Frequency Division
Multiplexing (FDM) technique, the existing POTS or ISDN services can still be
provided on the same wires. VDSL transceivers use Frequency Division Duplexing
(FDD) to separate upstream and downstream transmission.
3.4.1 VDSL1
VDSL1 mode is not supported.
3.4.2 VDSL2
The VDSL2 standard (G.993.2) is an enhancement to VDSL1. VDSL2 specifies
Discrete Multi-Tone (DMT) modulation and is reusing concepts of G.993.1 (VDSL1)
and G.992.3 (ADSL2) recommendations, using also the G.994.1 handshake
procedure.
Issue: 10 3HH-13800-BAAA-TQZZA 55
System interface overview System Description for FD 100/320Gbps NT and FX
NT
• VDSL2 supports higher bit rates than VDSL1; up to 100 Mb/ symmetrical.
The attainable maximum data rate depends on the VDSL2 profile used. Support
of 100 Mb/s requires the 30 MHz profile. Other profiles are better suited for
operation on longer loops, but with reduced maximum bit rate.
• VDSL2 offers improved performance over VDSL1:
• addition of Trellis coding
• increased maximum allowable transmit power
• VDSL2 features provide better support for triple play over VDSL
• improved Impulse Noise Protection (INP)
• physical layer retransmission (RTX)
• virtual noise (optional)
• VDSL2 has some ADSL2-like features:
• similar: loop diagnostics
• improved: PSD shaping
• improved management with regard to VDSL1
56 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX System interface overview
NT
Max. aggregate DS transmit power (dBm) 17.5 20.5 11.5 14.5 14.5 14.5 14.5 17
Max. aggregate US transmit power (dBm) 14.5 14.5 14.5 14.5 14.5 14.5 14.5 14.5
US0 support(2) M M M M M O O M
Annex A (998) DS upper frequency (MHz) 8.5 8.5 8.5 8.5 8.5 8.5 17.664 N/A
Annex B (997) DS upper frequency (MHz) 7.05 7.05 7.05 7.05 7.05 7.05 N/A N/A
Annex B DS upper frequency (MHz) 7.05 7.05 7.05 7.05 7.05 7.05 14 N/A
(997E)
US upper frequency (MHz) 8.832 8.832 5.1 8.832 12 12 17.664 N/A
Annex B DS upper frequency (MHz) 8.5 8.5 8.5 8.5 8.5 8.5 17.664 N/A
(998E)
US upper frequency (MHz) 5.2 5.2 5.2 5.2 12 12 14 N/A
Annex B DS upper frequency (MHz) 8.5 8.5 8.5 8.5 8.5 8.5 17.664 N/A
(998ADE)
US upper frequency (MHz) 5.2 5.2 5.2 5.2 12 12 12 N/A
Annex B DS upper frequency (MHz) N/A N/A N/A N/A N/A N/A N/A 35.3
(998E35)
US upper frequency (MHz) N/A N/A N/A N/A N/A N/A N/A 14
Annex B DS upper frequency (MHz) N/A N/A N/A N/A N/A N/A N/A 35.3
(998ADE35)
US upper frequency (MHz) N/A N/A N/A N/A N/A N/A N/A 12
Notes
(1) US=upstream; DS=downstream
(2) M=Mandatory; O=Optional; N=Not supported
3.5 SHDSL
The Symmetric High-speed Digital Subscriber Line (SHDSL) technology is a physical
layer standard based on the ITU-T Recommendation G.991.2 (G.shdsl). The
recommendation describes a versatile transmission method for data transport in the
telecommunication access networks. SHDSL supports ATM, TDM, PTM and EFM
transport.
SHDSL transceivers are designed primarily for duplex operation over mixed gauges
of two-wire twisted metallic pairs. Four-wire and M-pair operations can be used for
extended reach or bit rate. M-pair operation is supported for up to four pairs.
The use of signal regenerators for both the two-wire and multi-wire operations is
optional.
Issue: 10 3HH-13800-BAAA-TQZZA 57
System interface overview System Description for FD 100/320Gbps NT and FX
NT
Multiple SHDSL circuits may be combined to support higher bandwidth using Inverse
Multiplexing for ATM (IMA) interface or the payload can be shared by multiple circuits
(using the M-pair mode). IMA and M-pair do not work simultaneously over the same
port or circuit. Generally, an SHDSL LT in the system can support ATM or IMA, or
ITU-T G.991.2 PTM or IEEE 802.3ah EFM on a per-port basis. On certain SHDSL
LTs a number of the SHDSL ports is capable of TDM (ITU G991.2 Annex E.1 to E.8)
transport.
SHDSL transceivers are capable of supporting selected symmetric user data rates
ranging from 192 kb/s to 2312 kb/s, and optional up to 5696 kb/s, using Trellis Coded
Pulse Amplitude Modulation (TCPAM) line code. For spectral compatibility with
legacy services (including ADSLx), reach limitations can be imposed (typically by the
national regulator) in function of the SHDSL bit rate.
SHDSL transceivers support Cross-Talk Cancellation (CTC).
SHDSL transceivers do not support the use of analogue splitting technology for
coexistence with either POTS or ISDN.
Standards Description
G.991.2 Annex A/F Standards applicable for North America (region 1) (ANSI)
3.6 Ethernet
The ISAM supports the following Ethernet interfaces:
• Fast Ethernet (FE): supported on NT boards, NT I/O boards, and LT boards.
• Gigabit Ethernet (GE): supported on NT boards, NT I/O boards, and LT boards.
• 2.5 Gigabit Ethernet (2.5GE): supported on LT boards.
58 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX System interface overview
NT
The ISAM NTs supports both modes and can adapt to either mode by way of
auto-negotiation or manual configuration.
The ISAM Ethernet LTs only support the full duplex mode.
Issue: 10 3HH-13800-BAAA-TQZZA 59
System interface overview System Description for FD 100/320Gbps NT and FX
NT
Using auto-negotiation, the ISAM can determine the operational mode (full or half
duplex) and the speed (only for electrical interfaces) to be applied to the link.
Note 1 — It is also possible to manually configure the
transmission mode and speed on the link.
Note 2 — Auto-negotiation is supported for both optical and
electrical GE.
See the ISAM Product Information manual for supported dual speed optical SFP
modules per board type.
60 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX System interface overview
NT
3.7 GPON
The GPON interface is an optical interface that provides the ability to transport data
between the Optical Line Termination (OLT) and the Optical Network Units (ONUs).
Each GPON interface is shared by up to 128 ONUs. Some ONUs are used to
connect individual residential or business subscribers: the Single Family Unit (SFU);
others connect more residential or business subscribers: the Multi-Dwelling Unit
(MDU) and Multi-Tenant Unit (MTU).
The GPON interfaces must be considered as internal (user) interfaces while the
ONU/ONT service interfaces are the actual (external) user interfaces in this specific
case.
GPON interfaces can also be configured as subtending interfaces, similar to
subtending interfaces as offered on NT and NT I/O ports. See L2 Forwarding section
for additional details
All ISAM implementations of ONU and OLT are based on the following GPON ITU-T
standards:
• G.984.1 (GPON Service requirements)
• G.984.2 (GPON PMD layer)
• G.984.2 (GPON PMD layer) amendment 1
• G.984.3 (GPON TC Layer)
• G.984.3 (GPON TC Layer) amendments 1 and 2
• G.988 (GPON OMCI)
• G.988 (GPON OMCI) amendments 1 and 2
Issue: 10 3HH-13800-BAAA-TQZZA 61
System interface overview System Description for FD 100/320Gbps NT and FX
NT
3.7.1 Encapsulation
Data sent over the GPON interface is encapsulated in the GEM header, where GEM
stands for GPON Encapsulation Method. The GEM header includes a “GEM port” ID
which uniquely identifies a traffic flow or group of traffic flows for a specific UNI. GEM
port IDs are not exposed to the operator, but are assigned, for example, when a
VLAN port is created on a UNI. In the ONU, a GEM port ID is associated with a
specific traffic queue towards the PON. Thus the GEM port can be conceptualized
as identifying a specific traffic class within a UNI.
3.7.5 OMCI
ONT Management and Control Interface (OMCI) is the ITU-T G988 based open
interface definition that provides the management model for provisioning and
surveillance related functions between OLT and ONU.
62 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX System interface overview
NT
3.8 TWDM-PON
The TWDM-PON interface is an optical interface that provides the ability to transport
data between the Optical Line Termination (OLT) and the Optical Network Unit
(ONU) over different wavelength pairs (also known as Channel Pairs).
Each TWDM-PON interface can be shared by up to 256 TWDM-PON ONUs. Each
wavelength pair can be shared by up to 128 TWDM-PON ONUs. Similar to GPON,
different kinds of ONUs can be distinguished: ONUs that connect individual
residential or business subscribers: the Single Family Unit (SFU) or Single Business
Unit (SBU); ONUs that connect more residential or business subscribers - the
Multi-Dwelling Unit (MDU) and Multi-Tenant Unit (MTU).
Initially, the TWDM-PON interfaces are considered to be direct user interfaces from
a capabilities and scaling perspective. In the future use of the TWDM-PON interface
as a subtending-type interface is envisioned similar to such interfaces offered on NT
and NT I/O ports. See L2 Forwarding section for additional details.
The TWDM-PON interfaces must be considered as internal (user) interfaces while
the TWDM-PON ONU/ONT service interfaces are the actual (external) user
interfaces in this specific case.
All the ISAM implementations of TWDM-PON ONU and OLT are based on the
following ITU-T standards:
• G.989.1 (NG-PON2 Service requirements)
• G.989.2 (NG-PON2 Physical media dependent (PMD) layer specification)
• G.989.3 (NG-PON2 TC Layer)
• G.988 (OMCI)
3.8.1 Encapsulation
Data sent over the TWDM-PON interface is encapsulated in the XGEM header. The
XGEM header includes a “XGEM port” ID which uniquely identifies a traffic flow or
group of traffic flows for a specific UNI. XGEM port IDs are not exposed to the
operator, but are assigned, for example, when a VLAN port is created on a UNI. In
the ONU, an XGEM port ID is associated with a specific traffic queue towards the
PON. Thus the XGEM port can be conceptualized as identifying a specific traffic
class within a UNI.
Issue: 10 3HH-13800-BAAA-TQZZA 63
System interface overview System Description for FD 100/320Gbps NT and FX
NT
3.8.5 OMCI
ONT Management and Control Interface (OMCI) is the ITU-T G988 based open
interface definition that provides the management model for provisioning and
surveillance related functions between OLT and ONU.
64 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX System interface overview
NT
Figure 2 IMA
Physical link #1
PHY PHY
Single ATM Cell stream Original ATM Cell
from ATM layer stream to ATM layer
Physical link #2
PHY PHY
IMA requires that all bonded links operate at the same nominal rate. The original cells
are not modified, and control (ICP) cells are inserted for OAM communication
between the two ends.
• In the Tx direction, the ATM cells are distributed across the links in a round robin
sequence.
• In the Rx direction, the ATM cells are recombined into a single ATM stream.
The IMA type of bonding is supported on SHDSL LT boards.
Issue: 10 3HH-13800-BAAA-TQZZA 65
System interface overview System Description for FD 100/320Gbps NT and FX
NT
PTM bonding applies to DSL links with or without identical transmission speed,
because PTM implies the use of variable size PDUs, which make the use of IMA
techniques impossible. PTM bonding is applied to combine EFM-based transmission
links with limited or reach- dependent bandwidth, specifically VDSL2, SHDSL, and
ADSL2(+). This technique adds sequence information to transmitted frames or frame
fragments, and thus allows resequencing, that is, delay variation due to speed
variations or to PDU size variations, or both, across multiple physical links in one
bonding group. Up to 8 transmission links can be combined in one bonding group
with VDSL2 or ADSL2(+) PTM bonding.
3.11.1 POTS
The POTS interface is the Z interface, that is, an analog subscriber line for
connecting, for example, a POTS line. However, also other equipment such as faxes
can be connected. The principles of this interface are as standardized in ITU-T Q.551
and Q.552.
The Z interface carries signals such as speech, voice band analog data,
multi-frequency push button signals, and so on. In addition, the Z interface must
provide for DC feeding of the subscriber set and ordinary functions such as DC
signaling, ringing, metering, and so on, where appropriate.
The characteristics of this interface are as standardized in ITU-T Q.551 and Q.552.
It is recognized that the characteristics of analog interfaces vary considerably from
country to country and therefore the characteristics other than those defined in
Recommendations Q.551 and Q.552 are not subject to ITU-T Recommendations.
Within the ISAM, these are typically handled with the concept of a CDE profile.
3.11.2 ISDN BA
The ISDN BA interface corresponds to the U reference point of the Digital
Transmission System.
66 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX System interface overview
NT
The interface provides full-duplex and bit-independent transmission via two wires at
a net bit rate of 144 kb/s. The net bit rate of 144 kb/s offers 1 D-channel of 16 kb/s
and 2 B-channels of 64 kb/s.
The ISDN BA layer 1 specification is given in ITU-T I.430. Both 2B1Q and 4B3T
encoding are applied through the use of different HW variants.
The D-channel signaling procedures are defined in the Q.920 and Q.930-Series, for
the basis particularly in Q.921 and Q.931.
Issue: 10 3HH-13800-BAAA-TQZZA 67
System interface overview System Description for FD 100/320Gbps NT and FX
NT
Next to a GPON uplink towards the ISAM GPON port, the Nokia ONU products
provide the following end-user interfaces:
• Ethernet UNIs (IEEE 802.3)
• xDSL UNIs (ITU-T G.993.2 VDSL2)
• DS1/E1 UNIs (Structured and Unstructured) in CES encapsulation with MEF-8
compliant packetization format
• Voice interworking function from analog POTS lines to the VoIP/Ethernet layer
(SIP)
• RF Video for Overlay Service
68 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX System interface overview
NT
3.13.5 RF Video
The ONU provides RF video service through the video overlay function. The function
operates downstream in the 1550 nm optical band. Signals sent over the overlay
network are presented to the subscriber as RF signals from a video F-type connector
in the ONU.
This service is an alternative to IGMP-based in-band video provided over HSI
services supported on Ethernet and VDSL2 UNIs.
Additional details are provided in chapter “ISAM Support for the GPON ONU”.
3.14.1 Purpose
ISAM supports dedicated interfaces for the remote management of co-located
third-party equipment through Ethernet connections.
Examples are power supplies, timing supplies, Automatic Distribution Frames,
environment monitoring and conditioning equipment.
Issue: 10 3HH-13800-BAAA-TQZZA 69
System interface overview System Description for FD 100/320Gbps NT and FX
NT
70 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX System interface overview
NT
The ISAM itself does not support detection of malfunctions on the FD-REM external
equipment management port, and will not generate alarms related to usage of this
port
Issue: 10 3HH-13800-BAAA-TQZZA 71
System interface overview System Description for FD 100/320Gbps NT and FX
NT
72 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Failure protection and redundancy provisions in ISAM
NT
4.1 Overview
When you provide protection for system functions and subsystems by use of
redundancy, you improve the reliability of those parts of the ISAM, and hence the
availability of the whole ISAM.
Issue: 10 3HH-13800-BAAA-TQZZA 73
Failure protection and redundancy provisions in ISAM System Description for FD 100/320Gbps NT and FX
NT
The advantage is that the redundant resource can be fully preconfigured, and that
protection normally takes a minimal time. Also, the configuration data (static, or
dynamic, or both) necessary for the redundant resource can be kept on the
redundant resource itself.
The disadvantage is that each essential resource has to be duplicated, which adds
to the cost, the space requirements, and the power consumption.
Dynamic:
A redundant resource can replace any one resource out of a group of identical
essential resources (notation N:1 or N+1, or N:M or N+M in general).
Because each essential resource does not have to be duplicated, one or a few
additional resources can protect a much larger group of identical essential resources.
The disadvantage is that this scheme only is applicable when multiple identical
essential resources are present in the ISAM. In many cases, the redundant resource
cannot be fully preconfigured. The redundant resource can only be configured after
the failing resource has been identified, which means the time for protection has to
be increased by the configuration time. Also, an up-to-date copy of the static and/or
dynamic configuration data for the multiple essential resources has to be kept in a
location which is not affected by failure of the related resource. This requires either
additional storage on the redundant resource, or a more complex data storage
mechanism across all the protected resources.
74 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Failure protection and redundancy provisions in ISAM
NT
All resources (reflected in the data path, control path and/or management path) are
active or operational, normally in a load-sharing mode, but the number of resources
in the ISAM exceeds the minimum needed to perform all the necessary processing
by one, or more (notation 1+1, N+1, or N+M in general). Some resources can be
implemented in load-sharing mode, while others are implemented in active/standby
mode (see “Redundancy provision” for more information and practical examples).
If one or more of the active resources fail, the remaining resources take over the
whole processing load. Also, all the resources can be monitored in operational
conditions, and dormant faults cannot occur.
The advantage of this type of redundancy is that the ISAM performance increases
while no faults occur, by virtue of the more-than-necessary active resources.
The disadvantages are that the ISAM usually becomes more complex. A dispatching
or processing load distribution function is necessary, which must be fair (that is, the
load must be shared evenly over all the resources) and must be able to recognize
resource failures in time and to respond to them. Also, this function must not
constitute a (significant) single-point-of-failure in itself.
Issue: 10 3HH-13800-BAAA-TQZZA 75
Failure protection and redundancy provisions in ISAM System Description for FD 100/320Gbps NT and FX
NT
76 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Failure protection and redundancy provisions in ISAM
NT
Note that if an NT fails in this Active/Active mode then also the corresponding NTIO
ports will be out of service, that is, EPS and APS are no longer decoupled.
NTs with a throughput equal or higher than 320Gbps may also connect to the
network through an Ethernet LT operating in "VULA uplink" mode. These "uplink
Ethernet LTs" have a reduced set of redundancy options compared with the NT
uplinks: path and equipment redundancy can be achieved by using LAG (within the
same LT or across two different LTs) or IP routing (from the NT through different
uplink Ethernet LTs). STP, ERPS and MPLS options are not supported on VULA
uplinks.
Some LT boards are only capable of sending/receiving traffic to/from a single NT
board (that is, the “active” NT board). Consequently, no loadsharing is possible
between the NT board and these LTs. This means that all traffic to/from these LTs
will pass through the “active” NT board. Other LT boards (predominantly fiber line
cards) are capable of sending/receiving traffic to/from both NT boards. Hence,
loadsharing is possible between the NT board and these LTs.
The control plane is managed on the active NT board but the control plane is fully
synchronized between the two NT boards. The control plane is fully synchronized for
the following protocols:
• L1: port state configuration synchronization and port state changes are forwarded
and handled by the active control plane
• L2: MAC learning, LACP, 802.1X and IGMP snooping
• 802.1X sessions recover after switchover. That is, all the users that have been
authenticated remain authenticated.
• L3:
• static routes, IP interfaces and ARP
• Routing protocols: OSPF, IS-IS, BGP, PIM-SSM
• DHCPv4 and DHCPv6 state information
• QoS, ACLs and security configuration, that is, filters.
Issue: 10 3HH-13800-BAAA-TQZZA 77
Failure protection and redundancy provisions in ISAM System Description for FD 100/320Gbps NT and FX
NT
4.2.1 Single NT
When using a single NT board in the ISAM shelf, only redundancy for external
(network or subtending) links is available, and hence only external link protection is
possible. None of the central functions and resources are duplicated, except for the
external Ethernet interfaces on the faceplate of the NT board itself. The actual
number of these interfaces may vary with the NT type, but equals at least two. This
implies that one or more external network or subtending links can be configured to
protect other network or subtending links on the same NT board.
It must be clear that this link-only protection model does not protect equipment. If the
NT board fails, connectivity on all the links will be lost. The supported mechanisms
are described below.
LT1 NT
Active
PHY
Standby
µP PHY
LTn
78 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Failure protection and redundancy provisions in ISAM
NT
LT1 NT
PHY 1
µP PHY 2
LTn
If an external link for a single NT with multiple external links in a load-sharing group
is lost, the traffic is redistributed across the remaining links of the load-sharing group,
by means of the link failure detection capability of the Link Aggregation Control
Protocol (LACP).
Issue: 10 3HH-13800-BAAA-TQZZA 79
Failure protection and redundancy provisions in ISAM System Description for FD 100/320Gbps NT and FX
NT
NTIO
PHY
PHY
LTn PHY
PHY
PHY
PHY
80 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Failure protection and redundancy provisions in ISAM
NT
LT1 NT
Active
PHY
µP PHY
LTn
LT1 NT
Active
PHY
µP PHY
LTn
NT protection, that is, switchover of control and management traffic from the active
NT board to the standby NT board, and a related status change for both NT boards,
is only triggered by the failure or removal of the NT board itself, detected by means
of a dedicated protection interface between both NT boards.
This means that a failure of the active NT board or the standby NT board will have
an impact on the data traffic over the external links that can be active on both NT
boards (this can be protected by configuration of a LAG protection group over the
faceplate ports of the two NT boards, though, see “NT equipment protection with
distributed external links”), but also that a failure of the external faceplate links will
have no influence on the switchover between the active NT board and the standby
NT board.
Issue: 10 3HH-13800-BAAA-TQZZA 81
Failure protection and redundancy provisions in ISAM System Description for FD 100/320Gbps NT and FX
NT
LT1 NT
PHY 1
µP PHY 2
LTn
LT1 NT
PHY 3
µP PHY 4
LTn
NT protection, that is, switchover of control and management traffic from the active
NT board to the standby NT board, and a related status change for both NT boards,
is only triggered by the failure or removal of the NT board itself, detected by means
of a dedicated protection interface between both NT boards.
This means that a failure of the active NT board or the standby NT board will have
an impact on the data traffic over the external links that can be active on both NT
boards (protected by the LAG), but also that a failure of the external faceplate links
will have no influence on the switchover between the active NT board and the
standby NT board.
82 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Failure protection and redundancy provisions in ISAM
NT
Issue: 10 3HH-13800-BAAA-TQZZA 83
Failure protection and redundancy provisions in ISAM System Description for FD 100/320Gbps NT and FX
NT
LT1 NT
PHY
µP PHY
NTIO
PHY Active
PHY
PHY 1
LTn
PHY 2
LT1 NT PHY
PHY PHY
µP PHY
LTn
84 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Failure protection and redundancy provisions in ISAM
NT
LT1 NT
µP
NTIO
PHY Active
PHY
PHY 1
LTn
PHY 2
LT1 NT PHY
PHY
µP
PHY
PHY
LTn
4.2.6 LT Loadsharing
In a redundant NT configuration, the backplane links from the LT to the two NTs are
able to loadshare the upstream and downstream traffic.
In downstream the load sharing NTs should be capable of splitting the traffic across
the backplane links towards the LT and in upstream direction the loadsharing LT
should be capable of distributing the traffic towards the NT, thus doubling the
backplane capacity.
Issue: 10 3HH-13800-BAAA-TQZZA 85
Failure protection and redundancy provisions in ISAM System Description for FD 100/320Gbps NT and FX
NT
The following topologies show some examples for cascading of ISAM equipment
with protection:
• star topology; see Figure 10
• daisy-chain topology; see Figure 11
• ring topology: daisy chain with the last node connected to the first; see Figure 12.
Up to three levels of cascading can be supported by the ISAM. It depends on the
operator network requirements what the actual appropriate number can be in
practice.
The last ISAM in the cascaded system can be any DSLAM, such as:
• a 7302 ISAM
• a 7300 ASAM with a FENT or GENT
• a 7325 Remote Unit
• a 7330 ISAM FTTN
• a 7360 ISAM FX
PHY
μP NT PHY
N
PHY
T
PHY PHY
PHY
NT
μP PHY
PHY
NTIO
PHY
PHY
PHY Network
μP NT PHY
N
PHY links
T
PHY PHY
PHY
NT
μP PHY
PHY
NTIO LAG
PHY
PHY
PHY Subtending
μP NT PHY links
N
PHY
T
PHY PHY
PHY
86 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Failure protection and redundancy provisions in ISAM
NT
PHY
PHY
NT
LAG
μP N
PHY
PHY
T
PHY PHY
PHY
NT NT
μP PHY μP PHY
PHY PHY
NTIO LAG NTIO
PHY PHY
PHY PHY
PHY PHY
μP NT PHY μP NT PHY
N
PHY N
PHY
T
PHY PHY T
PHY PHY
PHY PHY
Network
NT
links
μP PHY
PHY
NTIO
PHY
PHY
PHY LAG
μP NT PHY
N
PHY
T
PHY PHY
PHY
Issue: 10 3HH-13800-BAAA-TQZZA 87
Failure protection and redundancy provisions in ISAM System Description for FD 100/320Gbps NT and FX
NT
PHY
μP NT PHY
N
PHY
T
PHY PHY
PHY
NT NT
μP PHY μP PHY
PHY PHY
NTIO NTIO
PHY PHY
PHY PHY
PHY PHY Network
μP NT PHY μP NT PHY links
N
PHY N
PHY
T
PHY PHY T
PHY PHY
PHY PHY
NT
μP PHY
PHY
NTIO
PHY
PHY
PHY
μP NT PHY
N
PHY
T
PHY PHY
PHY
88 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Failure protection and redundancy provisions in ISAM
NT
Subnet 2
L3 switching and
OSPF enabled
LT n
Issue: 10 3HH-13800-BAAA-TQZZA 89
Failure protection and redundancy provisions in ISAM System Description for FD 100/320Gbps NT and FX
NT
• RSTP/MSTP:
Any link (including a logical link corresponding to a LAG) can be associated with
an xSTP instance provided they share the same interface type (NNI) and are
located onto the same LT board (intra-card xSTP). The following additional
constraints apply:
• xSTP is only supported with the iBridge model (not with VLAN cross-connect)
• xSTP on the Ethernet LT assumes the LT interface to be root bridge and must be
configured accordingly by the operator.
NT and LT xSTP instances are split, that is the NT links and the LT links are not
part of the same protection domain. A link event failure at the LT side is not
signaled by the NT towards the network and inversely meaning that cross-LT or
cross-ISAM link protection schemes are not supported
90 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Failure protection and redundancy provisions in ISAM
NT
• RSTP/MSTP:
Any link, including a logical link corresponding to a LAG, can be associated with
an xSTP instance provided they share the same interface type (NNI) and are
located onto the same LT (intra-card xSTP). Following additional constraints
apply:
• xSTP is only supported with the i-bridge model (no VLAN-CC)
• xSTP on the Ethernet LT assumes the LT interface to be root bridge and must be
configured accordingly by the operator.
NT and LT xSTP instances are split: the NT and LT links are not part of the same
protection domain (that is, a link event failure at the LT side is not signaled by the
NT towards the network and inversely meaning that cross-LT or cross-ISAM link
protection schemes are not supported)
Intra-LT Inter-LT
UNI Y N Y Y N.A.
NNI Y Y Y Y N
Large bundles of feeders in a cable or duct increase the risk of intolerable repair
times in case of a breach or an accident.
Issue: 10 3HH-13800-BAAA-TQZZA 91
Failure protection and redundancy provisions in ISAM System Description for FD 100/320Gbps NT and FX
NT
PON
LT (1)
PON
LT (0)
ONU #N
PON LT
The ports (or channel-pairs) of the ISAM can be configured in Protection Groups (that
is a pair of ports protecting each other) on the LT boards across the shelf. In case of
failure of the active PON link, all traffic is switched to the associated protecting PON
link without loss of service. At any time, only one of the two ports will transmit on the
fiber in downstream (active-standby), while both will monitor the upstream signal
coming from the ONTs.
From the topology point of view, the Type-B PON protection arrangement can be
achieved by connecting two fibers from their respective ISAM PON interface to the
first level 2:N optical splitter. Link failure on the active PON feeder is detected by a
"Loss of Signal" condition. Note that the operator also has the ability to trigger a
manual PON switchover.
In the current ISAM implementation, inter-card protection among the LT boards of the
same type is supported. This is the most logical use case from an equipment
protection perspective. It implies that:
• two ports belonging to the same board cannot be paired into protection groups,
• the PONs in a protection group must be terminated by LT boards of the same
type.
92 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Failure protection and redundancy provisions in ISAM
NT
The system can raise an alarm if it detects that the standby side is not in condition to
take over all traffic and services immediately in case of active PON failure.
A license counter keeps track of the number of configured Protection Groups, with a
current maximum of 62 configurable protection pairs allowed in the same OLT
system.
Issue: 10 3HH-13800-BAAA-TQZZA 93
Failure protection and redundancy provisions in ISAM System Description for FD 100/320Gbps NT and FX
NT
Next to protecting the channel attachment fiber, this feature can also protect the
ONUs from OLT equipment failure (that is a linecard failure): if the board hosting the
active channel-pair of a set of protected ONUs fails, the affected ONUs will
autonomously re-tune their transceiver to their respective standby channel-pair,
hosted by a different linecard. This is the reason why, for each ONU, its "preferred"
and "protection" channel-pair attributes must be terminated by two different
linecards. Additionally, this feature can also be useful to minimize the service
interruption during maintenance operations.
Figure 15 up to Figure 17 show the protection mechanism.
Figure 15 Protection switching via autonomous ONU re-tuning on a TWDM PON system
(normal operation)
OLT
WM
1 λ
λ1u,d
3 λ
λ2u,d
λ3u,d
λ4u,d
Figure 16 Protection switching via autonomous ONU re-tuning on a TWDM PON system (at
failure)
OLT
WM λ
1
λ1u,d
3 λ
λ2u,d
λ3u,d
λ4u,d
94 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Failure protection and redundancy provisions in ISAM
NT
Figure 17 Protection switching via autonomous ONU re-tuning on a TWDM PON system
(protected mode)
OLT
WM
1
λ1u,d
3
λ2u,d
λ3u,d
λ4u,d
This protection feature can be enabled at a per-ONU granularity. Multiple ONUs can
share the same "preferred" and/or "protection" channel-pair attributes. Also, a same
channel-pair may be configured as "preferred" channel-pair for a particular (set of)
ONU(s) and in parallel be configured as "protection" channel-pair for another
(non-overlapping set of) ONU(s).
Note 1 — In the current release, this feature is supported on
FWLT-A in combination with FANT-F and covers protection for
cross-connect services when MAC address learning is disabled
in the NT.
Note 2 — The system does not support the consistent
equalization delay method (cf. G.989.3 - section VII.2) in the
current release. Consequently, to avoid a re-ranging of the
ONUs upon automatic re-tuning, the channel attachment fiber
(the individual pieces of fiber connecting an TWDM PON
OLT-port to each WM input) must have the same length for all
the channel-pairs sharing the same subchannel-group.
Issue: 10 3HH-13800-BAAA-TQZZA 95
Failure protection and redundancy provisions in ISAM System Description for FD 100/320Gbps NT and FX
NT
96 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Management
NT
5 Management
5.1 Overview
5.1 Overview
This chapter describes various management related topics of the ISAM. Table 9
below lists the information available in this chapter.
Table 9 Contents
Contents Section
Management interfaces 5.2
Issue: 10 3HH-13800-BAAA-TQZZA 97
Management System Description for FD 100/320Gbps NT and FX
NT
TL1
CLI
CLI SNMP
TL1 xFTP
Local TL1
ISAM
CT CLI
Nokia has an extensive management suite of products available (5520, 5529, 5530
range of Nokia products) to allow an efficient management of an ISAM network.
Southbound, towards the ISAM, it takes care of all ISAM specifics and related
protocols, while northbound it provides standard SOAP/XML interfaces for an easy
and smooth integration with any other OSS applications, shielding from the DSLAM
complexity.
Of course a direct interaction with the ISAM itself, using CLI or TL1, remains
possible, either directly connected to the ISAM or using a remote Craft terminal.
98 3HH-13800-BAAA-TQZZA Issue: 10
System Description for FD 100/320Gbps NT and FX Management
NT
These management interfaces are all supported “inband”. This means that the
management interface is supported on top of an Ethernet / IP stack for which the
Ethernet links are the Ethernet network links as mentioned in chapter “System
interface overview”. If one such network link or uplink is dedicated only for
management traffic, outband management can be realized as well.
RS232
serial interface
CLI TL1 SNMP File transfer
CLI Agent TL1 Agent SNMP SNMP Client Server Client Server Client
v1/v2 v3 TFTP SFTP FTP
SNMP
Telnet SSH Telnet SSH 161/162
server server server server 13001
23 22 1023 1022 69 115 20
UDP
TCP TCP UDP UDP TCP
Mutually exclusive
5.2.1 SNMP
The Simple Network Manager Protocol (SNMP) is used by network management
applications like the 5520 AMS, the 5529 Statistics and Data Collector, or the 5530
Network Analyser to manage the ISAM.
Issue: 10 3HH-13800-BAAA-TQZZA 99
Management System Description for FD 100/320Gbps NT and FX
NT
5.2.1.1 SNMPv3
The security mechanisms defined in SNMPv3 protect against threats such as
masquerade, modification of information, message stream modification, and
disclosure.
The SNMPv3 security mechanisms provide:
• data origin authentication
• data integrity checks
• timeliness indicator
• encryption
SNMPv3 allows for three different security levels in that messages between agent
and manager can be:
• unauthenticated and unencrypted
• authenticated but unencrypted
• both authenticated and encrypted
Two security-related capabilities are defined in SNMPv3:
1 User-based Security Model (USM):
The USM provides authentication and privacy (encryption) functions and
operates at the message level. In addition, the USM includes a key management
capability that provides for key localization and key updates. The USM is used to
authenticate entities, and provides encryption services to secure communication
between agents and managers. Each agent keeps track of the authorized user
access via an internal table of user/secrets/access entries. Both authentication
and encryption utilize symmetric keys, which can be generated from a password.
Localization of the authentication, and encryption of keys by hashing the
generated key with the ID of each agent entity is strongly recommended.
2 View-based Access Control Model (VACM):
The VACM verifies whether a given user is allowed to access a particular MIB
object and perform particular functions (MIB views: read, write or notify access).
The VACM makes an access control decision on the basis of:
• the principal asking for access
• the security model and security level used for communicating the request
• the context to which access is requested
• the type of access requested (read, write, notify)
• the actual object to which access is requested.
5.2.2 TL1
The ISAM supports Transaction Language 1 (TL1) as management interface. This
cross-vendor, cross-technology man-machine language is supported over UDP,
telnet and SSH.
Please check the following documents for the full list and details of all the supported
TL1 commands and events in the ISAM:
• Operations and Maintenance Using TL1 for FD 100/320Gbps NT and FX NT
• TL1 Commands and Messages Guide for FD 100/320Gbps NT and FX NT
In total, maximum 16 TL1 parallel sessions are supported. The following restrictions
and conditions apply depending on the type of session:
A maximum of 10 TL1 sessions that can be of the following type:
• two sessions are reserved for CRAFT/Serial access
• up to five parallel TL1 sessions over Telnet (TCP) can be used
• up to five parallel TL1 sessions over SSH (TCP) can be used
In addition another maximum of 6 UDP sessions are supported.
When using TL1 scripts, it is recommended to strictly limit the number of active,
parallel TL1 scripts to two. Anyway the TL1 response should be awaited before
launching a new TL1 command to the ISAM.
An alarm is raised whenever a TL1 user logs in (successful or not), indicating the IP
address, account name and timestamp of the login trial. Severity, reporting and so
on of this alarm can be configured as with any other alarm. If the login was not
successful, the corresponding alarm needs to be cleared manually by the operator.
To avoid an overflow of failed login alarms (for example, due to a malicious user), a
new failed login alarm will only be generated either when 3 minutes have passed
since the last failed login alarm or when 90 failed logins occurred, whichever comes
first.
The TL1 login banner is configurable.
5.2.3 CLI
The ISAM supports a Command Line Interface (CLI) as management interface. This
interface is primarily intended as a man-machine interface for the ISAM and is
supported over telnet, SHH, and using the serial interface (Craft).
Please check the following documents for the full list and details of all the supported
CLI commands and events in the ISAM:
• Operations and Maintenance using CLI for FD 100/320Gbps NT and FX NT
• CLI Command Guide for FD 100/320Gbps NT and FX NT
The ISAM supports up to ten parallel CLI sessions, be it over telnet or over SSH.
There can only be 1 local Craft session.
An alarm is raised whenever a CLI user logs in (successful or not), indicating the IP
address, account name and timestamp of the login trial. Severity, reporting and so
on of this alarm can be configured as with any other alarm. If the login was not
successful, the corresponding alarm needs to be cleared manually by the operator.
To avoid an overflow of failed login alarms (for example, due to a malicious user), a
new failed login alarm will only be generated either when 3 minutes have passed
since the last failed login alarm or when 90 failed logins occurred, whichever comes
first.
5.2.4 xFTP
TFTP is the simplest of the 3 file transfer protocols, but lacks reliability and security
capabilities. It runs on top of UDP and does not require any username-password
combination. There is also no encryption of data. The ISAM supports both a TFTP
client and server. In server mode, the ISAM can handle up to 14 TFTP sessions.
FTP also lacks any encryption, but requires a username-password identification
(“anonymous” access is not allowed) and runs on top of TCP/IP. The ISAM only
supports an FTP client.
SFTP has been introduced as part of the SSH implementation. When the ISAM acts
as an SFTP client towards an external SFTP server, the ISAM uses an
operator-configured username and password. The security settings like encryption,
hashing and signature protocols can be configured by the operator via CLI or
SNMPv3. The ISAM supports both an SFTP client and server. In server mode, the
ISAM supports two SFTP sessions simultaneously. Also, in SFTP server mode, the
user authentication coincides with the SSH authentication, that is, the same
username/password or username/key-pair combinations apply. This means that
once the operator has been configured for CLI or TL1 with a username/password or
for SSH with a username/key pair, the same username can be used for setting up an
SFTP session with the ISAM.
In case of SFTP, only one account can be specified. This account will be used
towards all external xFTP servers.
In case of FTP, up to 8 external servers/accounts can be specified, each with their
own account.
In case of TFTP, no account is required, so also none (0) can be specified.
5.2.5 xNTP
The ISAM system time can be set in three ways:
• the system time can be retrieved using the SNTP protocol to retrieve the time from
a (S)NTP time server
• the system time can be retrieved using the NTP protocol to retrieve the time from
(S)NTP time servers
• the system time can be set manually by the operator
This is a system wide setting in the ISAM. While SNTP and NTP is mutually exclusive
(that is, either SNTP or NTP can be enabled, but not both at the same time), the
ISAM system time can always be set manually by the operator, even if SNTP or NTP
is enabled.
5.2.6 SSH
Secure Shell (SSH) is a protocol that provides authentication, encryption, and data
integrity to secure network communications. On top of this protocol, SSH
implementations offer secure replacements for rsh, rlogin, rcp, ftp, and telnet, all of
which transmit data over the network as clear text. In addition, it offers secure
data-tunneling services for TCP/IP-based applications.
SSH has a client-server architecture. The ISAM can act both as an SSH server or an
SSH client; see Figure 20.
Figure 20 SSH client-server architecture in the NE
SFTP
Secure link for Server
Secure link for the transfer
SW&DB from FileServer to NE (SW&DB)
Critical CR
Error ER
Warning WN
Notice NO
Information IN
Debug DBG
Apart from xFTP, which is a system-wide, exclusive setting, the system allows both
the secure and the insecure variant of a management interface to coexist, so that the
operator is still able to contact the system in case the security setup would fail.
Simple Network Time Protocol (SNTP) does not have a secure variant. It is
configured to listen to a single SNTP server (for example the Element Management
System). This configuration is done via one of the management interfaces listed
above. Since the operator can secure these interfaces, the SNTP configuration can
be secured.
Note
(1) The username/password combinations of SSH and SNMPv3 cannot be reused.
For security purposes, the default username and password must be changed as
soon as possible. The system prompts the operator to do this when he or she logs in
for the first time.
5.4.1 Introduction
In most deployment models, the ISAM will use a specific management VLAN for
management. Management access security in this case is guaranteed as follows:
• Any management access to the ISAM via a VLAN which is not the management
VLAN is not possible. Such traffic will be dropped.
• There is a clear separation between management traffic and user traffic.
• Management access is only possible via network ports. The aggregation and core
network should be designed in such a way that non-authorized users cannot get
access to the management VLAN on the network port.
IES v-VPLS
iBridge
VLAN 23
VLAN 23
Phy v-VPLS
(No VLAN
LAG VLAN 11
CPU filter translation
Phy shown
on user side)
OBC
LT
NT
ISAM
Phy
v-VPLS
VLAN 11
IES v-VPLS
iBridge
VLAN 23
VLAN 23
Phy (No VLAN
LAG CPU filter translation
Phy shown
on user side)
OBC
LT
NT
ISAM
IPv6 control plane traffic that ingresses at the IES/VPRN/Base router interface on
Network ports can be filtered so that the CPU load can be managed with added
security. IPv6 ACLs can be configured to include IPv6 CPU filters.
Figure 23 Management via an IP interface directly connected to a network
port
Management traffic
User traffic
L3
Network IP SAP
Port interface
Phy v-VPLS
IES VLAN 23
iBridge
VLAN 23
(No VLAN
translation
Phy v-VPLS CPU filter shown
VLAN 11
on
user side)
Access OBC
LT
Port NT
ISAM
See the CLI Commands for FD 100/320Gbps NT and FX NT and the TL1 Commands
and Messages for FD 100/320Gbps NT and FX NT documents for alarm
management command definitions.
Alarms use the same definition method that consists of two main parts:
• the alarm type, which provides a general definition of the type of alarm; for
example, an xDSL alarm.
• the alarm number, which identifies a specific alarm within that type; for example,
a near-end LOS alarm
You can view alarm types and definitions as they are recorded in alarm lists and logs
using the TL1, CLI or an EMS like the 5520 AMS. See the Operation and
Maintenance Using CLI for FD 100/320Gbps NT and FX NT and Operation and
Maintenance Using TL1 for FD 100/320Gbps NT and FX NT document for a
complete listing of all alarms, along with their definitions. Alarm definitions are not
user configurable.
In addition to the individual alarm reporting control above, the operator has the
capability to select which alarm severity he wants to see spontaneously reported.
This is useful to avoid being overwhelmed by a flood of non-important alarms. There
are five levels available for the minimum severity which alarms must have to be
reported, listed in ascending order of severity:
• indeterminate
• warning
• minor
• major
• critical
When the severity level of an alarm equals or exceeds the (system-wide) minimum
severity level, that particular alarm is forwarded to the alarm reporting and logging
filters where it is reported and logged as defined for that particular alarm.
For TCA alarms, when the TCA feature is enabled for an xDSL subscriber line, alarm
indications are always sent to the alarm reporting and logging filters. Whenever a
minor, major, or critical alarm is received, the corresponding alarm LED, on the
faceplate of the alarm control unit installed in the shelf, is activated as well.
You can configure the (system-wide) minimum alarm severity level and the individual
severity level of an alarm using CLI, TL1 or an Element Management System. See
the 7302 ISAM | 7330 ISAM FTTN CLI Commands and 7302 ISAM | 7330 ISAM
FTTN Operations and Maintenance Using TL1 documents for alarm management
command definitions.
Changing the severity level for an alarm only affects new alarm events and does not
affect alarm indications that have already passed through the alarm reporting and
logging filters.
Note that when the severity level of an alarm is set to ignore (lowest level), these
alarms are completely ignored by the system and no processing will happen
whatsoever - the ISAM will behave as if this alarm just does not exist.
Resetting an alarm severity delta logging list empties the contents of that list.
Alarm filtering applies to both non-interface related alarms, such as equipment failure
alarms, and to interface related alarms, such as ATM and xDSL interfaces. It is
possible to enable and disable alarm filtering for individual alarms.
Figure 24 shows how a temporal alarm filter raises a derived alarm after the
configured threshold is reached (in this case set to 3). In the first case only 2 alarm
events occur during the filtering window time T, so no derived alarm is raised. In the
other cases, 3 alarm events occur in the window T, and a derived alarm is raised.
Figure 24 Temporal alarm by quantity
Only 2 events in time T:
no temporal alarm is
raised
Alarm
event
T T T
Threshold = 3
Temporal
alarm
Figure 25 shows how a temporal alarm filter raises a derived alarm when the alarm
event is active for at least the filtering window time T. In the first case the alarm event
is cleared before T, so no derived alarm is generated; in the second case an alarm
event remains active for more then T, in which case the derived alarm is raised.
Alarm
event
T T
Threshold = 3
Temporal
alarm
So the temporal alarm is always raised when the condition is met, and cleared
whenever the alarm event, triggering the alarm filter condition, is cleared,
independent of the filtering window time. See also Figure 24 and Figure 25.
A temporal alarm filter becomes active whenever the alarm event is raised on an
ISAM object (for example, on a port, ONT, …), i.e. at that moment timer T is started
(see figures above) and the number of occurrences is counted. Each such filter can
be activated (by the alarm event) on at most 50 different objects at a time. A filter
becomes inactive again for a certain object whenever the condition is cleared (and
so no derived alarm is generated, or the derived alarm is cleared).
Temporal alarm filters are useful for, for example, TCA alarms that can be raised
frequently. Using temporal alarm filters, you can filter out minor TCA alarm
indications and provide better visibility of major TCA alarm conditions.
Using spatial alarm filters, you can create a unique alarm condition such that when
a specified group of individual alarms are raised, a derived alarm is reported. This is
used to identify alarm conditions that are characterized by a certain set of alarm
conditions occurring simultaneously. Say, for example, that 100 objects in the system
can experience the same alarm condition. A spatial alarm can be configured on top
of the basic alarm. The spatial alarm is generated (that is, derived alarm-ON
condition) at the moment that a predefined number of these objects are in alarm (that
is, basic alarm-ON condition).
Identification of alarm filters and derived alarms consists of two main parts: a type
identifier and a number. Temporal and spatial alarm filters have a unique filter type
identifier. Derived alarms have a unique alarm type identifier. The number used in
the identification of derived alarms matches the number assigned to the alarm filter
that generates the derived alarm. Additionally, each derived alarm entry recorded in
alarm reporting and logging lists contains the identification of the affected
component. In the case of an interface related derived alarm, the identification of the
affected interface is provided.
The state change of a derived alarm must pass through the alarm reporting and
logging filters before being added to the alarm reporting lists (current and snapshot
alarm lists) and the alarm severity delta logging lists respectively. A derived alarm
that is generated from a temporal filter is identified as an interface-related alarm if the
basic alarm, referenced by the filter, is also an interface-related alarm. The derived
alarms generated from spatial alarm filters are always identified as
non-interface-related alarms.
You can change these settings for the derived alarm, but not if the alarm filter is
active. You must first deactivate the alarm filter.
After the filter is deactivated, you can configure the filtering threshold, filtering
window, and the alarm to which the filter applies. Once configured, you must
manually reactivate the alarm filter.
The PBMT is supported on both a Sparc and x86 platform (Solaris OS), delivered as
one installation package. At run tim, the correct libraries and executables will be
selected. Support is only provided for migrations to the target release (that is, the
release for which the PBMT is delivered).
Some remarks:
• The maximum size of the ONT Software image that can be actively managed
through 7360 ISAM FX or 7362 ISAM DF OLTs is 64 MB.
• The ONT software is pre-downloaded to the ONTs using the OMCI channel, prior
to the activation of the new OSWP.
• The ONT software activation is triggered by the ISAM, also using the OMCI
channel.
• ISAM and ONT software activation are not coupled: ISAM and ONT software can
be upgraded independently if required.
• The behavior with respect to service continuity at the ONT when the planned ONT
SW at the ISAM is different from the active ONT SW, is user defined on a per
system basis. (That is, service flow may be blocked or allowed in such cases via
a per-system management option)
Note that migrations and software upgrades do not have to be between consecutive
software releases/streams: the necessary functionality has been provided to be able
to 'skip' intermediate upgrade/migration steps. While no point for software upgrades,
this is less evident for migrations.
Also, in case of a failure to upgrade, the ISAM will automatically switch back to the
OSWP and resume services. This also implies that the ONT will also re-start with the
old, previous software, as the ONT software activation is triggered by the ISAM,
following the configuration settings done before. If the ONT itself fails to start with the
new software load, the ONT will also re-start autonomously with the previous, old
software load. The ISAM software will NOT be restarted in that case. This implies
that the ONT will not be able to support the services and features of the correct, new
load, but, as the ONT becomes active again, a new load can be downloaded and the
restart of the ONT retried.
Note — Due to the introduction of a new version of the IPD
stack (SROS ed.08) in R4.3.01, a R4.3.01 (or higher) ISAM
database is NOT backwards compatible with a R4.3 ISAM
database!
The necessary functionality has been added to make sure the
R4.3 OSWP, with related (R4.3) database, can still be activated
again, even after a successful R4.3.01 upgrade. The changes
done with R4.3.01 will of course be lost as the R4.3 OSWP can
-not- work with a R4.3.01 (or higher) version of the database.
R4.3.01 (or higher) can work with any R4.3.x database; in case
R4.3.01 (or higher) starts with a R4.3 version of the ISAM
database, the R4.3 database will be upgraded first.
The 7360 ISAM FX supports different OSWP upgrade procedures. Their applicability
depends on the ISAM equipment, configuration and state (that is, single NT/dual NT,
NT redundancy status, LT board type, parameter used for OSWP activation).
Please refer to the "Software Upgrade and Migration Application Procedures"
document (SUMAP) and to the "Software Installation" document (SWI) for more
information.
The configuration data of the ISAM is autonomously saved to the ISAM database on
the NT CF at different criteria:
• IACM: the database changes are cached in the system and autonomously saved
to the CF
• Every 60 seconds, and/or
• Whenever the cache of 5K is full (corresponds to 22 database updates), and/or
• On request of an IACM application, for example to safeguard some critical data
(software steered), and/or
• As part of an ISAM database backup request
• xVPS: the database changes are autonomously saved to CF
• Every 10 minutes if the xVPS configuration has changed indeed and the last xVPS
configuration change is at least 1 minute ago, and/or
• As part of an ISAM database backup request
• IHUB: the database changes are autonomously saved to CF
• Every 10 minutes if the IHUB configuration change, and/or
• As part of an ISAM database backup request
The IHUB configuration data can be saved to NT CF (database) at operator request
as well, for example, at the end of a IHUB configuration script. This is however not
possible for the IACM data.
Note — Due to the introduction of a new version of the IPD
stack (SROS ed.08) in R4.3.01, a R4.3.01 (or higher) ISAM
database is NOT backwards compatible with a R4.3 ISAM
database!
This implies that R4.3 can only work with a R4.3 version of the
ISAM database and it is NOT possible to start R4.3 with a
R4.3.01 (or higher) version of the database.
R4.3.01 (or higher) can work with any R4.3.x version of the
ISAM database; in case a R4.3 version of the database is
detected, it will be upgraded to a higher version first.
Practically this implies that R4.3 backups can also work with
R4.3.01 or higher, but R4.3.01 (or higher) backups cannot work
with R4.3.
This approach is supported on Nokia Single Family Unit (SFU) and Multi-Dwelling
Unit (MDU) ONTs that do not use TR-069 for voice provisioning.
Only read access is provided for these parameters and none of the threshold
temperature parameters can be changed by the operator. They are fine-tuned by
Nokia in function of the actual board type and board variant.
The thermal sensor data as specified above can be retrieved via CLI, TL1 and/or
using an Element Management System, and are always the actual values as
measured at the moment of the request.
5.9.1 Introduction
Broadband access (such as G.fast) nodes are evolving towards smaller nodes,
installed closer to the end-user. The size of the nodes, number of subscribers per
node, is getting smaller, but the number of nodes in the access network is increasing.
Hence there is a need to simplify the installation of the small, remote micro-nodes.
Customers are looking at truck roll-out deployments where a micro-node is installed
and commissioned and brought into service without the installer needing to apply any
configuration command on-site by connecting a portable PC (for example via craft).
This process is called Zero Touch Provisioning (ZTP) as shown on Figure 26,
depicting the entire turn-up flow automation while the installer can focus on
mechanical mounting, cable connection, turn-up and progress monitoring.
Figure 26 Zero Touch Provisioning
6.5 ATM F5
6.1 Overview
This chapter describes the various line testing features within the ISAM and ISAM
Voice.
All line testing capabilities provide a means to execute pro-active and/or re-active
measurements to diagnose (potential) issues with the deployed equipment. As such
they can:
• bring OPEX savings such as the ability to save on buying external test equipment,
avoiding truck rolls
• increase customer satisfaction due to decreased service degradations or
interrupts.
The line testing capabilities depend upon the type of interface. For an overview of the
different types of interfaces (both for ISAM and ISAM Voice), see chapter “System
interface overview”.
ISAM supports line testing for:
• Ethernet network and subtending interfaces
• DSL interfaces (ATM or PTM mode) at the subscriber side
• Active Ethernet interfaces
• POTS and ISDN lines at the subscriber side
• xPON interfaces
But before considering the line test capabilities of these lines, we have to consider
the nature of DSL versus POTS and ISDN.
DSL is a transmission technology that works in overlay with POTS or ISDN lines:
• “narrowband” is used for the POTS or ISDN signals
• “broadband” is used for the DSL signal.
Both narrowband and broadband signals can be transported simultaneously on one
physical line and a splitter technology is used to multiplex or split these signals. The
part of the ISAM processing broadband is named the DSL line. The part of the ISAM
Voice processing narrowband is named the POTS line or the ISDN line. Therefore,
although a DSL line and a POTS or ISDN line are distinct lines from the perspective
of the ISAM or the ISAM Voice, they can correspond to one physical line.
Therefore, some tests will test the DSL line (broadband), other tests will test the
POTS or ISDN line (narrowband), but some tests will affect both.
The splitter technology can be integrated or can be outside of the ISAM or the ISAM
Voice (refer to the 7302 ISAM Product Information or the 7330 ISAM FTTN Product
Information). If integrated, this technology is supported by dedicated boards
(appliques) that are managed from the ISAM, or is integrated within the DSL board.
The splitter boards work in conjunction with the DSL LT boards. The physical lines,
carrying both broadband and narrowband, are identified with the same identifier as
the DSL line.
The overview of the line testing features:
• tests for a DSL line:
• Single-Ended Line Test (SELT)
• Dual-Ended Line Test (DELT)
• Metallic-Ended Line Testing (MELT)
• the DSL line can be of ATM or of PTM mode:
• For DSL lines of ATM mode: ATM F5
• For DSL lines of PTM mode: Link related Ethernet OAM
• tests for a POTS or ISDN line:
• Narrowband Line testing
• tests for an Ethernet subscriber line:
• Link related Ethernet OAM
• SFP diagnostics
• tests for an Ethernet network or subtending interface:
• SFP diagnostics
• tests for an xPON interface:
• SFP diagnostics
• Embedded OTDR
DSL applique
RTU (MTA)
Relays Subscriber line
Note — See the 5530 Network Analyzer User Guide for more
information about SELT using the 5530 NA.
SELT can be performed from the DSL LT board without need for support by the CPE
or for a craftsman to be present at the customer premises.
SELT is based on Frequency Domain Reflectometry (FDR). An excitation signal is
sent on the line and its echo response is analyzed. Processing of the echo response
is done in the 5530 NA. The polarity and position of the reflections indicate the loop
length, attenuation, presence of a gauge wire change, and an open, short, or bridged
tap and its distance from the DSL LT board of the line under test.
SELT provides a line test tool built inside the xDSL modem to measure the loop
characteristics between the U-C and the U-R interface and allows for:
• detection and location of metallic faults (open/short).
• detection, location and length of bridge taps.
• noise measurement and detection of interferences.
• measurement of the line attenuation.
• estimation of the maximum achievable bit rate.
• estimation of the line length.
The operator can check the presence and quality of, for example, a wire termination
Main Distribution Frame (MDF) or SAI / DFI (Service Area / Feeder Distribution
Interface). This feature can be of help in situations where this interconnection is
being provisioned by a third party.
MELT works together with external data analysis software, such as the Nokia 5530
Network Analyzer (5530 NA), to provide loop pre-qualification and maintenance of
the network. Also basic management, to start measurements and report results, is
provided through CLI.
Note — See the 5530 Network Analyzer User Guide for more
information about MELT using the 5530 NA.
MELT is performed from the DSL LT board without need for support by the CPE or
for a craftsman to be present at the customer premises.
The MELT functionality is based on the technology for the narrowband POTS
subscriber lines.
MELT provides a line test tool built inside the ISAM to measure the loop
characteristics between the U-C and the U-R interface and allows for:
• detection and location of metallic faults (open/short/bad contacts)
• detection of cable degradation (for example, due to cable moisture)
• detection of external voltages
• line pair identification
• detection of signature topologies
• Foreign DC voltage:
Measures foreign DC voltage of a/Earth, b/Earth, and a/b.
Result values:
• Measured DC Voltage of a/Earth, b/Earth, and a/b
• Capacitance:
Measures capacitance of a/Earth, b/Earth, and a/b
Result values:
• Measured capacitance of a/Earth, b/Earth, and a/b
• Measurement AC voltage used for determining the capacitance of a/Earth, b/Earth,
and a/b
• Measurement AC voltage frequency used for determining the capacitance of a/Earth,
b/Earth, and a/b
• On-board capacitance used for correcting the measured capacitance value of
a/Earth, b/Earth, and a/b
• Insulating resistance:
Measures insulating resistance of a/Earth, b/Earth, a/b and b/a.
Result values:
• Measured resistance of a/Earth, b/Earth, a/b and b/a
• Measurement DC voltage used for determining the resistance of a/Earth, b/Earth, a/b
and b/a.
• Measurement DC current used for determining the resistance of a/Earth, b/Earth, a/b
and b/a.
• Capacitance of Signature
• Resistance of Ringer
• Cable Pair identification (search tone generation)
• Hazardous voltage (DC>120V or AC>50V).
• Galvanic Signature Detection (For ADSL/VDSL; not for SHDSL).
• End Device Capacitance Detection.
• PPA Detection (ppa / ppa-invers / ppa-not-detected / analysis-not-available)
• ROH Detection (For ADSL/VDSL, not for SHDSL)
• Conductance (a/Earth, b/Earth and a/b).
• Susceptibility (a/Earth, b/Earth and a/b).
• Zener Resistance (For ADSL/VDSL, not for SHDSL)
• Zener Voltage (For ADSL/VDSL, not for SHDSL)
The MELT Group test capability supports the following execution modes:
• Legacy MELT Group test including
• Foreign DC Voltage
• Insulating Resistance
• Capacitance
• Capacitance Of Signature
• Resistance of Ringer
and only providing the MELT test results.
• MELT Group test with extended reporting including
• Foreign DC Voltage
• Insulating Resistance
• Capacitance
• Capacitance Of Signature
• Resistance of Ringer
and providing the MELT test result values together with the conditions (Used
AC/DC voltage, frequency, calibration capacitance) under which the tests were
executed
• MELT Collective Group test including
• Foreign AC Voltage
• Foreign DC Voltage
• Insulating Resistance
• Capacitance
• Capacitance Of Signature
• Resistance of Ringer
• Conductance
• Susceptibility
• PPA Detection
• Galvanic Signature Detection
• End Device Capacitance Detection
• ROH-Detection
• Zener Resistance
• Zener Voltage
and providing the MELT test result values together with the conditions (Used
AC/DC voltage, frequency, calibration capacitance) under which the tests were
executed
6.5 ATM F5
On ATM based DSL interfaces it is possible to use ATM F5 loopback. The following
functionality, as is specified in ITU-T I.610, is supported:
• active: the operator asks for a loopback test
• passive: the CPE triggers a loopback test and the ISAM responds
6.6.1 Introduction
Link-Related Ethernet OAM (IEEE 802.3 clause 57 standard) enables network
operators to monitor the health of the network and quickly determine the location of
failing links or fault conditions. The feature allows remote side information to be
retrieved for a link connected with a node for which SNMP may not be available as
default.
The feature does not include functions such as station management, bandwidth
allocation or provisioning functions, which are considered outside the scope of IEEE
802.3 section-clause 57 standard.
Link-Related Ethernet OAM is active between the ISAM subscriber side and the
CPE.
6.6.3.1 Discovery
The first phase of Link Related Ethernet OAM is discovery. This phase is started
when the operator enables the Link Related Ethernet OAM feature.
Discovery has 3 main functions:
• provide a mechanism to detect the presence of an OAM sub-layer
• identify the devices in the network, along with OAM capabilities
• setup of the OAM link
During this discovery procedure the ISAM always negotiates to become the active
DTE. The ISAM never accepts to become the passive DTE. The ISAM never accepts
the peer DTE to become active (the standard allows both sides to be active).
The ISAM does not support Event notifications: it does not generate Event
Notifications and ignores received Event Notifications.
The ISAM allows the manager to initiate a Variable Request to retrieve remote CPE
data to know the current link status. It supports to retrieve:
• Physical Medium Entity (PME) data
• PME Aggregation Function (PAF) data
By forcing the peer side to be in passive mode, the ISAM does not support the peer
side to retrieve data from the ISAM through Variable Requests / Responses.
The ISAM Ethernet line card supports a method to invoke remote loopback at the
peer end. The looped back traffic can be monitored using performance counters at
the Ethernet physical layer of the line card. ISAM does not support generation of test
traffic towards the peer and relies on network traffic (or an upstream device) to be
used during loopback.
As an active DTE, ISAM ignores any remote loopback request received from the
peer.
GPON / DSL LT boards do not support invocation of remote loopback at the peer
end.
• Talking
• Line Reverse
• Private Meter Pulse
• Ring Subscriber
• DP / DTMF Signal
• Resistance of User Loop
• Capacitance Of Signature (NPOT-B/C only)
• Resistance Of Ringer (NPOT-B/C only)
• Longitudinal Current (NPOT-B/C only)
• Conductance (NPOT-B/C only)
• Susceptance (NPOT-B/C only)
• Hazardous Voltage (NPOT-B/C only)
• Capacitive End Device (NPOT-B/C only)
• PPA Variant (NPOT-B/C only)
• Receiver Off-Hook (NPOT-B/C only)
• Electric Ringer (NPOT-B/C only)
• Zener Resistance (NPOT-B/C only)
• Zener Voltage (NPOT-B/C only)
• Forced Ringing (NPOT-B/C only)
• Diagnosis Call
The following NBLT types can be executed for H.248 POTS ports:
• Feeding AC/DC Voltage: between a/Earth, b/Earth and a/b wires.
• Foreign AC/DC Voltage: between a/Earth, b/Earth and a/b wires.
• Feeding Current
• Insulating Resistance: between a/Earth, b/Earth, a/battery, b/battery and a/b
wires
• Capacitance: between a/Earth, b/Earth, and a/b wires.
• Impedance: between a/Earth, b/Earth, and a/b wires.
• Low Capacitance Phone detection
• Dial Tone Delay
• M-Socket Detection
• AC Current : between a/Earth, b/Earth, and a/b wires.
• DC Current : between a/Earth, b/Earth, and a/b wires.
• Noise Level
• Howler Tone
• Status Monitoring
• Cable Pair Identification
• Talking
• Line Reverse
• Private Meter Pulse
• Ring Subscriber
• DP / DTMF Signal
• Resistance of User Loop
• Forced Ringing (NPOT-B/C only)
• Diagnosis Call
Feeding DC Private
Voltage Meter
Pulse
Foreign DC Ring
Voltage Subscrib
er
Feeding DP /
Current DTMF
Signal
Resistance
Of User Loop
Insulating
Resistance
Capacitance
Impedance
Low
Capacitance
Phone Detect
M-socket
Capacitance
Of Signature
Resistance
Of Ringer
Conductance
(1 of 2)
Susceptance
Hazardous
Voltage
Capacitance
End Device
PPA Variant
Receiver
Off-Hook
Electronic
Ringer
Zener
Resistance
Zener
Voltage
Noise Level
AC current
DC current
(2 of 2)
The Group test with extended reporting (SIP integrated voice service only), providing
the raw NBLT test results together with the conditions (Used AC/DC voltage,
frequency, calibration capacitance) under which the tests were executed, supports
the execution of the following NBLT test types:
• Foreign DC Voltage (tr, tg, rg)
• Foreign AC Voltage (tr, tg, rg)
• Insulating Resistance (tr, rt, tg, rg)
• Capacitance (tr, tg, rg)
The Collective Group test (SIP integrated voice service only), providing the raw
NBLT test results together with the conditions (Used AC/DC voltage, frequency,
calibration capacitance) under which the tests were executed, supports the
execution of the following NBLT test types:
• Foreign DC Voltage (tr, tg, rg)
• Foreign AC Voltage (tr, tg, rg)
• Insulating Resistance (tr, rt, tg, rg)
• Capacitance (tr, tg, rg)
• Capacitance Of Signature
• Resistance Of Ringer
• Conductance (tr, tg, rg)
• Susceptance (tr, tg, rg)
• PPA Detection
• Termination Electronic Ringer Detection
• Zener Resistance
• Zener Voltage
Starting a new NBLT test at a particular port with the busy-overwrite parameter set
to "true”:
• While another NBLT test is still running at the same voice LT board (same or
different POTS port), this will cause the new NBLT test request to be rejected.
• While a call is ongoing at the same POTS port, this will cause the ongoing call to
be aborted if that new NBLT test cannot concurrently execute with an ongoing call
at that same port before the new NBLT test starts executing.
Foreign DC Voltage
Insulating Resistance
Capacitance
Loopback is done with the full bit stream (all B channels and D channel)
Once a loopback test session has started, outgoing calls are blocked and incoming
calls are rejected.
A loop back test session can only be started when all B channels of an E1 interface
are in idle state. Ongoing calls cannot be interrupted by a loop back test.
An ISDN PRA termination cannot be deleted nor locked/unlocked while a loop back
test is running.
A loop back test can run regardless of the ISDN PRA termination administrative and
operational state.
Loopback is done with the full bit stream (all B channels and D channel)
Once a loopback test session has started, outgoing calls are blocked and incoming
calls are rejected.
A loop back test session can only be started when all B channels of an E1 interface
are in idle state. Ongoing calls cannot be interrupted by a loop back test.
A CAS R2 termination cannot be deleted nor locked/unlocked while a loop back test
is running.
A loop back test can run regardless of the CAS R2 termination administrative and
operational state.
Analysis OTDR
tool 1310 1490 1625 nm
GPON
OLT
Splitter
F1
F2
Embedded OTDR
SFP
ONT
Network
1310 1490
analyzer
Also used as λ OTDR
The ISAM supports SFPs for GPON interfaces that have an embedded OTDR
capability, allowing OTDR measurements without the requirement for expensive
external test equipment. Therefore, the measurement capability is always available,
is non-service affecting and does not require an operator to be on-site.
The 5530 NA-Fiber provides the necessary support to interpret the results of the
OTDR measurements.
7.1 Introduction
.
7.1.1 Scope
This chapter describes the different clock systems and Network Timing Reference
(NTR) and ‘Phase and ToD’ synchronization capabilities of the ISAM. The
capabilities depend on the hardware variants. A specific ISAM board will not support
all of these capabilities. To know which of these functions are supported on a specific
ISAM board, refer to the Product Information document and/or the Unit Data Sheet
(UDS) of that board.
A summary of NTR and ‘Phase and ToD’ capabilities of the most advanced board
variants in each family is given in Figure 29 and Figure 30. In many cases, less
advanced board variants with fewer or no NTR and ‘Phase and ToD’ capabilities are
available. These can be used for deployments where these capabilities are not
needed. The next section will clarify this at a high level.
Each access technology (ADSL, VDSL2, SHDSL, Ethernet, PON) may have its
specific clock requirements to guarantee synchronization and proper functioning
between both ends (CO and end-user). However, in general, these clock
requirements are taken care of in the design of line boards (LTs) for that specific
access technology, and do not impose any restrictions on the specific NTs which can
be used. Some exceptions exist (for example, voice over POTS line) and they will be
covered in the section on that access technology. Clock requirements or restrictions
related to a specific access technology, are in general not in the scope of this
chapter.
Table 14 Specific clock requirements per application
High Speed Internet (HSI), External NTR source: not required All LTs are suited, that is, no
Video, Local Clock Accuracy: low (32 or 50 specific clock requirements
ppm is sufficient) on LT.
Packet Voice
Voice via POTS line External NTR source: not required All voice LTs are suited, that
Local Clock Accuracy: 4.6 ppm is is, no specific clock
required requirements on LT.
Long fax or modem calls via POTS External NTR source: SyncE In or All voice LTs are suited, that
line BITS In is, no specific clock
requirements on LT.
NTR distribution from network node • External NTR source: SyncE In or NT or NTIO output can be
to network node (for example, to BITS In used, and then no
other DSLAMs) • NTR Out: SyncE Out or BITS Out requirements on LT.
Alternatively, SyncE output
on an Ethernet LT.
Mobile backhaul data offload External NTR source: not required All LTs are suited, that is, no
Local Clock Accuracy: low (32 or 50 specific clock requirements
ppm is sufficient) on LT.
Full mobile backhaul (with frequency External NTR source: SyncE In or • DSL LTs: NTR on VDSL2
synchronization) BITS In or IEEE1588v2 In or SHDSL (Note: NTR on
ADSL is not supported on
DSL-LTs)
• Ethernet LTs: SyncE out
• PON LTs: no specific
clock requirements on LT
(Note: ONT with BITS out
or SyncE out needed)
Full mobile backhaul with phase External NTR and ‘Phase and ToD’ PON LTs: ToD out on LT
synchronization or ToD requirement source: IEEE1588v2 In or 1PPS+ToD
in
Note: Phase synchronization or ToD is
only required for some mobile
applications, and even then in most
cases an alternative option exists
which does not require these features.
Alternative solution: Provide Mobile
Backhaul data offload only, with phase
sync or ToD via a different channel (for
example, GPS/ GNSS receiver)
(1 of 2)
Packet-based Business applications External NTR source: not required All LTs are suited, that is, no
Local Clock Accuracy: low (32 or 50 specific requirements on LT.
ppm is sufficient)
Business applications with NTR External NTR source: SyncE In or • DSL LTs: NTR over
requirements (for example, TDM BITS In SHDSL or VDSL2
leased lines) • Ethernet LTs: SyncE out
• PON LT: no specific clock
requirements on LT
(2 of 2)
Note
(1) DSL is a generic term in this chapter referring to ADSL, ADSL2, ADSL2plus, VDSL2 and SHDSL. PON is a
generic term in this chapter referring to both GPON and XGS-PON / TWDM-PON
a somewhat more expensive ISAM NT board with SyncE or BITS support will then
probably be better than having to deploy a more expensive receiver with ACR at
every end-user. Secondly, the larger buffers needed for ACR increase the
end-to-end delay and may therefore require echo-cancellation for interactive
services (for example, voice or video calls).
DSL
8 kHz Sync Eth NTR
LT
Eth
CTRL
Sync Eth
DSL
8 kHz NTR
NT
LT
Voice
GE PHY 8 kHz
backplane DSL
backplane
NTIO
POTS/ISDN
Voice
8 kHz
SEM/Distributed REM
backplane POTS/ISDN
Sync Eth
GPON
GE PHY 8 kHz GPON PHY
Sync Eth Sync Eth backplane GPON
BITS or Sync Eth
GE PHY
GE PHY GE PHY
NTIO Sync Eth
8 kHz
Eth
Hub ISAM Sync Eth Optional GE backplane GE PHY
GE PHY network
DSL
8 kHz NTR
NT
LT
G.703
backplane DSL
NT
Voice
8 kHz
backplane POTS/ISDN
Optional BITS Sync Eth
NT
NT
GE PHY 8 kHz GPON PHY
backplane GPON
Eth
IEEE1588
backplane GE PHY
GE
GPON
8 kHz GPON PHY
GE PHY backplane GPON
Sync Eth Sync Eth
BITS or Sync Eth
GE PHY
GE PHY GE PHY
NTIO
GPON
8 kHz GPON PHY
Hub ISAM Sync Eth Optional GE backplane GPON
GE PHY network
IEEE1588
NT
GPON
IEEE1588 8 kHz GPON PHY
GE
G.703
GE backplane GPON
Eth
NT
backplane GE PHY
Optional BITS Sync Eth
PDH/SDH G.703 GE PHY
NT
network
Outdoor ISAM
Collocated ISAM shelves
The 1.28 Tbps NT (FX) has the same NTR capabilities as the 480 Gbps NT (FX)
The 320G and 480G NT variants can be deployed in ISAMs used as a VULA node,
a configuration where Content Providers directly interface with the ISAM network
interfaces. This scenario requires SLA enforcement on the traffic received from the
Content Providers, enforcement performed by a 10GE Ethernet LT hosting the uplink
interfaces. When combining this network model with an NTR distributed over the
network (SyncE / IEEE ToD), the 10G Ethernet LT can be involved in retrieving the
network clock if there is no NT interface connected to the network. This can be the
case when:
• The Access Provider belongs to an organization that also owns a Content
Provider, whose traffic must be handled in exactly the same way as other Content
Providers by regulation (that is, through the 10GE Ethernet LT)
• Some network simplification wants to be achieved by reusing the interface
established between the Access and Content Providers belonging to same
organization, that is, where NTR can be considered trusted
In order to support this specific scenario, the 10G Ethernet LT, operating in uplink
mode, allows to retrieve SyncE from its first Ethernet port (position hard coded, GE
or 10GE rates are both supported through provisioning) and passes the retrieved
clock to the NT card(s) using a dedicated cable connected to the NT BITS interfaces,
allowing to fully reuse the NT BITS operations.
NT 10GE
P2P LT
NT
• “Legacy" mode, that is the same as using an
external BITS sources
NT FELT
FELT
NT
NT Y BITS-cable • “Legacy" mode, that is the same as using an
external BITS sources
NT
NT FELT
• “Legacy" mode, that is the same as using an
external BITS sources
If the ISAM is operating as a VULA node using a 10GE Ethernet LT as uplink, the
remaining of this chapter still applies, considering the 10GE Ethernet LT as an
"external NTR" source interfaced with the NT BITS interface.
Although not shown in these figures, also deployments with a mix of nodes are
possible from both figures. For example, a standalone REM connected via SyncE to
an Ethernet output on an Hub ISAM with NT from the FD 100/320Gbps NT and FX
NT family.
… SFP-f on ISAM
T
renc
… … backplane
=R
R ef e
Note:
RJ45-a is the connector for BITS-A on NT-A
RJ45-b is the connector for BITS-B on NT-B
The operator needs to configure which of these ports are valid inputs for NTR in his
network deployment. Maximum two ports can be configured for this (T and U in
Figure 31).
The ISAM clock subsystem will then dynamically select one of these two ports as
NTR reference, according to the actual quality of the NTR signals on these ports,
configured priority of these ports, and so on, according to the ITU Rec G.871 section
5.6 criteria and selection algorithm.
Figure 29 and Figure 30 give a high-level view of the possible interfaces to external
NTR sources for both the 100G and 320G NT (FD) respectively the 480G and 1.28T
NT (FX) family. More detailed information on the actual capabilities of specific boards
is available in the Product Information document for your product and/or the UDS.
Also there one can find which ports on these boards can be used as external NTR
sources (and which ones not).
SFP
NT Front plate LT 1
1 GE Ethernet Sync Eth out
Sync Eth out µP
SFP
NT Front plate
1 / 10 GE SFP+
Sync Eth in
SFP
NTIO Front plate
1 GE Sync Eth out
SFP
LT 18
PHY
NTIO Front plate SFP Sync Eth out
1 GE Sync Eth in PHY
SFP PTP
selection
T3 : BITS /SSU 1 in
T0 8 kHz
S
NTIO Front plate NTR 1 to
XFP E
LT 1 -18
10 GE Sync Eth in L TC/
Sync Eth out OC XO
XFP
10 GE NTIO Single NT
The 8 kHz NTR signal generated by the internal system NTR clock is distributed to
the subscriber interface logic on the LT boards.
Up to two ports can be configured as valid external NTR input ports (see “High level
description of the external port selection for NTR”). One will be the reference, and the
other one is for protection (see “Clock protection: Overview”).
If all available external NTR clock sources fail, then this clock will switch to Hold-over
mode, if locking to the external NTR clock source was completed at the time of
failure.
In case no valid external NTR clock source is connected during system start-up, the
internal NTR clock will remain in free-running mode, that is, it will adapt to the output
frequency of its local oscillator.
Figure 33 States and state transitions for the internal NTR clock
AUTONOMOUS MODE
Actively tracking two redundant Grand Masters will require a redundant NT pair.
Resilience with respect to L2 connectivity can be guaranteed via the usual means
like LAG.
If two PTP Masters need to be actively tracked, then each NT in a redundant
configuration has to track one of those two.
Any mix of BITS and SyncE is supported when both inputs are on the same NT, or
on one NT and NTIO. For example, BITS as the reference for NTR, while SyncE as
NTR source protection.
However, such combinations are expected to be less common in the field, since
either the long-existing BITS on the PDH/SDH network is used, or else this network
has been completely outphased and the network has moved fully to metro Ethernet
aggregation and uses SyncE or IEEE1588.
Once the redundant NT has taken over from the failing NT and has arrived in a stable
state, the NTR function will be compliant to the typical related standards. These
standards also define the maximum allowed phase jump during a transient effect.
Switch-over from a failing NT to a redundant NT is one of these transient effects, and
ISAM does exceed in that case the maximum allowed phase jump. Since such NT
switch-overs are exceptional, and since phase jumps may be filtered to some extent
by end-user equipment, the impact on services is expected to be limited.
• The QL value applied for an external NTR clock source, in the algorithm that
performs the selection of one external NTR clock source from up to two
configured as nominated, and in case reception of SSM for that NTR clock source
is disabled.
The default setting for the value is equal to “QL-PRC” (code 0010b) for ETSI, and
“QL-STU” (code point 0000b) for ANSI.
• The target QL value that is applied as minimum threshold for eligibility of an
external NTR clock source, in the algorithm that performs the selection of one
external NTR clock source from up to two configured as nominated, and in case
reception of SSM for that NTR clock source is enabled.
The default setting for the value is equal to “QL- DNU” (code 1111b).
• The static relative priority to be applied for an external NTR clock source, in the
algorithm that performs the selection of one external NTR clock source from up to
two configured as nominated, in case the respective Quality Levels (QL) of the
two sources are identical. The QL for each of both NTR clock sources can be
either communicated via the Synchronization status Messages, or is fixed to a
default value.
• Revertive or non-revertive operation of the external NTR clock signal selection.
The default setting is “Revertive mode”
• Override of synchronization to any external NTR clock source, and forcing of
free-running or hold-over mode for the internal NTR clock function.
• The target QL to be applied as minimum threshold for the internal system NTR
clock, for generating an SSU / BITS out signal.
The default setting for this target QL value is equal to “QL- DNU” (code 1111b).
The system performs the following autonomous NTR clock management functions:
• Monitoring of the signal status (signal present, frequency within the capture
range) and the QL of up to two external NTR clock sources that are configured by
the operator as nominated.
• Selection of the external NTR clock source that fits best the selection criteria, from
up to two sources configured as nominated. Selection happens as specified
further.
• Disabling of the SSU / BITS output signal(s) in case the QL, which can be
attributed to the internal system NTR clock, drops below the configured threshold.
In the default NTR switching mode (revertive mode), the ISAM selects the most
appropriate NTR clock source for synchronizing its output NTR signals, and for
protecting against failure of external NTR clock sources, as follows:
• In case two external NTR clock sources have been configured by the operator as
nominated, and both are active, then selection of the external NTR clock source,
to which the internal system NTR clock will synchronize, is subject to the following
rules:
• The external NTR clock with highest Quality Level (QL), is selected as actual
reference for the internal NTR clock. The QL of an external NTR clock source is
communicated by means of SSM messages received on the interface related to the
source. If SSM reception is not supported, or disabled on that interface, then a QL
value configured by the operator, or a default QL value is applied, as described
above.
• In case both external NTR clock sources exhibit the same QL, then their relative
priority is determined by the external NTR clock source priority list as configured by
the operator.
• After restoration or upgrading of an external NTR clock source, the selection
depends on revertive or non-revertive mode setting, as configured by the
operator.
• In case only one external NTR clock source has been configured by the operator
as nominated, or in case only one is active, then the internal system NTR clock
will switch to hold-over mode when this external NTR clock source fails, or is
removed.
In hold-over mode, the internal system NTR clock maintains application of the last
stored correction values which describe the deviation of the own free-running
oscillator signal relative to the external NTR clock source signal which was
applied last.
The system factory default is “none”: no external clocks are selected. In this case the
system automatically selects the internal free-run system NTR clock for downstream
NTR timing.
High-stability
clock on NT Leased lines
Network Timing Reference
Cost-effective central
BITS interface clock for synchronization
on NT of all CPEs
NTR support
Voice
on LTs
High-stability clock for
long-lasting fax and
modem calls
The typical options provided for delivering NTR to other network nodes are:
• BITS out on some NT boards
• SyncE out on some Ethernet interfaces on some NT, NTIO and Ethernet LT
boards.
This can be supported on optical Ethernet interfaces only, and not on electrical
ones. Secondly, it can be supported at speeds of 1 Gbps and 10 Gbps, but not at,
for example, 2.5 Gbps and 100 Mbps.
In the normal default case, the BITS out on the NT board is filtered by the SETG
function (see Annex 7 in G.8262/G8264) in order to achieve compliance to G.813
option 1 for BITS out. But alternative configurations of the ISAM clock system are
possible as suggested in Annex7 in G.8262/G8264, allowing that the SyncE input(s)
are passed through unfiltered to the BITS output. Typically the unfiltered BITS output
will then be connected to an SSU device.
The typical options provided for delivering NTR to access lines or end-users are:
• NTR on VDSL2
• NTR on ADSL/ADSL2/ADSL2plus is not supported
• NTR on SHDSL
• SyncE out with SSM on some Ethernet interfaces on some NT, NTIO and
Ethernet LT boards.
This can be supported on optical Ethernet interfaces only, and not on electrical
ones. Secondly, it can be supported at speeds of 1 Gbps and 10 Gbps, but not at,
for example, 2.5 Gbps and 100 Mbps.
• NTR on GPON or XGS-PON.
SyncE with SSM out from GPON or XGS-PON ONT (For supported ONT, please
check the ONT datasheet)
• NTR on TWDM-PON
To know which specific NT, NTIO, or LT boards do support the above NTR
distribution on their outgoing interfaces, refer to the Product Information document
and/or the UDS. A high-level view of the capabilities of the 24G, 100Gbps, 320G,
480G and 1,28T NT family and the FX NT family is represented in Figure 29 and
Figure 30 respectively.
Phase and time synchronization in ISAM is limited to the ISAM 7360 FX product line
only.
IEEE1588v2 is supported from Network side via PON OLT and from subscriber side
via the PON ONU (see Section 11.1):
• Using 1588v2 PTP following ITU-T G.8275.1 profile with SyncE/BITs as Layer 1
companion for full path timing support.
• Using G.984.3 Amd 2 ToD over GPON or G.9807.1 ToD over XGS-PON between
OLT and ONT to resolve the high radom jitter due to PON asymmetry
characteristic
ONU
ONU Cell
GPON
Cell
1588v2 1588v2PTP
Master
Cell
backplane FTTBusiness
FANT-F FGLT
BITS GPON
1pps + TOD Time pulse B-ONT
SyncE 8 kHz
1588v2
1588v2 PTP slave 7360 ISAM FX
27576
The IEEE1588v2 protocol is a distributed protocol that specifies how the real-time
clocks in the system synchronize with each other. These clocks are organized into a
master slave synchronization hierarchy with the clock at the top of the hierarchy the
grandmaster clock determining the reference time for the entire system. The
synchronization is achieved by exchanging PTP timing messages, with the slaves
using the timing information to adjust their clocks to the time of their master in the
hierarchy.
The IEEE 1588v2 protocol provides a means to synchronize the frequency (NTR),
time phase (1PPS) and absolute time (ToD) setting of the system clock of the NE
across an asynchronous packet network, to an IEEE1588v2 GrandMaster (GM) or
Boundary Clock (BC) deeper in the upstream network and to a subtending BC or
SOOC (Slave Only Ordinary Clock) in the downstream network, using an in-band
packet data stream.
In 7360 ISAM FX PON access system, both OLT and ONU work together as a
distributed BC, OLT acts as SOOC to terminate the PTP stream while ONU side acts
as MOOC (Master Only Ordinary Clock) to initiate a new PTP stream.
On the NT, acting as a PTP slave, the system supports 1PPS and ToD extraction
based on IEEE1588 input PTP packets, coming from the GM or BC deeper in the
network, computes the absolute time and generates a system clock from it.
Then this time information is distributed to the PON LT(s) through the backplane and
can be transported over a PON link towards ToD-capable ONU(s), following G.988
and G.984.3 Amd2. A master port can be created on the ONU UNI to deliver PTP
packets to subtending slaving elements.
IEEE 1588v2 has the advantage that timing information can be conveyed in-band
through an asynchronous packet network to any NE or CPE connected to that
network. It has the disadvantage that the accuracy of the Time and Frequency
derived from the packet stream depends very much on the Packet Delay Variation
(PDV), that is, on the traffic load, and on possible structural or long term packet delay
asymmetries in the packet network.
For this reason, state-of-the-art equipment for regeneration of a local Time and
frequency clock from the IEEE 1588v2 Sync packet stream (Receiver part of an OC
or BC) can support two modes:
• Pure packet mode: the receiver Time and Frequency clock regeneration only uses
the PTP Synchronization event packets to interact with the GM/Master.
• Hybrid mode: the receiver Time and Frequency clock regeneration uses both the
OSI layer 2/3 PTP Synchronization event packets to interact with the GM/Master,
and an OSI Layer 1 based network reference clock received via different means
(BITS / SSU, Synchronous Ethernet).
Each NT can support up to three external PTP sources as inputs over LAG and lock
with the best of three based on BMCA. One will be a reference, the other works as a
backup. The selection depends on ClockClass and Priority.
• An internal ToD wall clock free-running mode in case no valid external ToD source
is connected during system start-up, that is, it will adapt to the output
frequency/phase of its local oscillator.
• When an NT switches over:
• In case the ToD wall clock is used as reference on the active NT, switch to the backup
reference on the standby NT and revert when the switch-over has been done.
• In case the ToD wall clock reference on the standby NT is used, there is no impact.
• At a type-B switch-over, the system will trigger a new ToD message to the ONU
for resynchronization.
• E2E mode
The PTP slave port on the NT and master port on the ONU uses by default the
end-to-end (e2e) delay mechanism to compute the mean path delay between the
client and the PTP master in the network
The system currently does not support the peer-to-peer (p2p) delay mechanism.
• One step/Two Steps
The system supports the PTP slave/master clock that provides the time
information using a single event message (one-step) or using the combination of
an event message and a subsequent general message (two-steps).
• Configurable Packet Rate
The Delay Req messages are sent by the PTP slave device on the NT to the
Master. The permitted mean time interval between successive messages is
configurable between 1/16 per second to 128 per second, This parameter is
applicable when the PTP device is configured to use the e2e delay mechanism.
The Announce and Sync messages are sent by the PTP master device on the
ONU. The interval indicates the mean time interval between successive
messages. The permitted mean time interval between successive announce
messages is configurable between 1/16 per second to 16 per second. The
permitted mean time interval between successive Sync messages is configurable
between 1/16 per second to 256 per second.
• Leap second
A leap second is a second which is added to UTC in order to synchronize atomic
clocks with astronomical time to within 0.9 seconds. The reason we have to add
a second every now and then, is that Earth's rotation around its own axis, is
gradually slowing down whereas Atomic clocks are programmed to tick away at
pretty much the same speed over millions of years.
The 7360 ISAM FX supports configurable leap second adjustment and dynamic
leap second adjustment. For configurable mode, before leap second adjustment,
the operator shall set the correct leap second in the system.
• Phase compensation.
Due to PTP asymetric path, different Ethernet speed, 1pps+ToD link length, extra
phase deviation is likely to be introduced.
7360 ISAM FX supports time delay compensation per NT level and per link level
for 1,2T NT and 10GE Ethernet LT
• PTP monitoring.
In order to assist an operator to troubleshoot network timing sync, ISAM supports
PTP packet statistics, external master information retrieval and ISAM clock status
show on the various interfaces.
8 ADSL/VDSL features
8.1 Overview
8.13 Vectoring
8.17 VDSL2-LR
8.1 Overview
Table 20 lists the different features described in this chapter, indicating for which
xDSL mode the feature is supported on xDSL LT boards and ONUs.
RFI Notching X X X
Low-power modes X X X X X
L2 low-power mode X X X
L3 idle mode X X X X X
UPBO policing X
Equal RXPSD UPBO X X
Vectoring X
VDSL2 35b X
VDSL2-LR X
Table 21 gives an overview of the supported VDSL2 profiles. Each profile defines
normative values for a set of parameters, as defined by G.993.2.
Table 21 Supported VDSL2 profiles
12a, 12b X
17a X X
30a X
(1 of 2)
(2 of 2)
Region B 998E X X
Region B 998ADE X X
Region B 997 X
Region B 997E X
Region B 998E35 X
Region B 998ADE35 X
Notes
(1) Region A = North America
(2) Region B = Europe
The standards include several provisions to reduce the number of errors that occur
due to impulse noise. The primary one is interleaving combined with Forward Error
Correction (FEC) using Reed-Solomon (RS) error correcting codes.
8.2.1 Reed-Solomon
Reed-Solomon (RS) adds extra bytes to a group of data bytes when it is sent. These
bytes are also known as the “RS word”. When data corruption is detected at
reception, the RS decoder is able to use the extra bytes to locate the errors and to
recover the original message. However, this only is effective up to a certain
maximum number of errored bytes. In order to correct impulse noise errors, RS
needs to be combined with interleaving.
8.2.2 Interleaving
Instead of transmitting the RS words directly on the line, the different RS words are
first mixed and spread over time. This process is called “interleaving”. This has the
advantage that when a burst of errors occurs on the line, it will hit bytes of different
RS words. After reconstruction of the original RS words (by the de-interleaver), the
errors will be spread over multiple RS words, such that each RS word is only affected
by a small amount of errors and is therefore much easier to correct. The RS word can
be corrected if its number of errors is within the RS correction boundaries.
The main disadvantage of interleaving is an extra “interleaving delay”. Constructing
the blocks that will finally be transmitted over the line takes time, as the modems
have to wait for a while before they can actually start transmitting. At the receiving
side, it also costs extra time to reconstruct the original RS word. The first original RS
word cannot be reconstructed before all of its bytes have been received.
Using smaller interleaving depths, that is, by taking bigger chunks of the original RS
words, can lead to a lower interleaving delay. This has the disadvantage that errors
will be spread over less RS words on the receiving side, with the possibility that they
cannot be corrected.
In the case that a high INP together with a low delay is required, extra RS bytes will
have to be added to increase the RS correction capability. This however can lead to
reduced bit rates.
It becomes clear from the above that when configuring the INP, a trade-off has to be
made between:
• robustness of the line against impulse noise
• interleaving delay
• achievable bit rate
Exit out of L2 mode into L0 mode can also be triggered from the CPE end, in case of
significantly changed channel conditions.
With the support of the enhanced L2 defined in ITU-T G.992.3 (2009) Amendment 4,
it is now possible to use:
• Extended range of Lp values in the L2 low power mode:
This allows to support higher bit rates in low power mode, thus limiting the delay
incurred by delay-sensitive services, or to support higher bit rate services while
maintaining high levels of power saving.
• Extended range for the Gi gain scaling in L2 low power mode:
This provides finer control of power reduction via Gi scaling, leading to better
power savings than previously possible with flat power reduction only.
The dynamic rate adaptive mode is also called “Seamless Rate Adaptation” (SRA).
This feature is supported in all ADSL2x (ADSL2, ADSL2plus, READSL2) modes of
operation and in VDSL2 mode of operation.
SRA improves the stability of the line (that is, reduces the number of spontaneous
retrains) by dynamically reducing the bit rate, without loss of data and without bit
errors, in case of a slow decrease of the SNR to an SNR below a preset value. SRA
can also assure that at any moment in time the line operates at the maximum
achievable bit rate by dynamically increasing the bit rate, without loss of data and
without bit errors, in case the SNR increases above a preset value.
SRA enables the modem to change the data rate of the connection while in operation
without any service interruption. The modem detects changes in the channel
conditions (for example, increase in noise level) and adapts the data rate to the new
channel condition without a need to resynchronize the line.
The upshift and downshift noise margin thresholds and time intervals for SRA are
fully configurable.
Figure 37 illustrates SRA.
0 dB Margin
The upshift and downshift rate adaptation events due to SRA are counted in
15-minute and 24-hour Performance Monitoring (PM) intervals.
SRA can encounter upshift and downshift limitations on lines activated with
interleaving:
• ADSL2(+):
The SRA protocol can only change parameter L (number of bits per DMT symbol).
SRA downshifts are limited by the configured maximum interleaving delay as SRA
downshift results in an increase of the delay.
SRA upshifts are limited by the configured minimum impulse noise protection as
SRA upshift results in a decrease of the impulse noise protection.
• VDSL2:
The SRA protocol can change both parameter L (number of bits per DMT symbol)
and parameter D (interleaving depth). This allows to keep the delay and impulse
noise protection constant after a rate adaptation. When all allocated interleaving
memory is used, upshift rate adaptations are still limited by the configured
minimum impulse noise protection.
FEXT CPE
long loop
It allows to reduce the upstream transmit PSD on short lines in order not to impact
the upstream performance on longer lines unreasonably. Without UPBO, the nearby
CPE would transmit at full power and would inject excessive FEXT in the upstream
receiver of the long line.
The Equal FEXT UPBO can be explained as first applying the equal RXPSD method
but adding a loop-length-dependent delta FEXT factor, thereby equalizing the impact
among the lines. This equalization is executed with respect to a reference FEXT
level, characterized by a reference electrical length (kl0_ref). This parameter is
configurable for each upstream band. Alternatively an automatic configuration mode
is available: if the Equal FEXT parameters for all bands are all set to automatic, the
modem uses a dedicated mechanism to automatically calculate good values for the
Equal FEXT parameters, without manual configuration by the operator.
The equal FEXT UPBO method is standardized in G.993.2 Amendment 2, and is
supported in the ISAM.
CO NT
PSD
Remote Terminal
PSD
PSD
frequency frequency
INM PM
Impulse Noise INM Anomaly
counters
Sensor Counters 15min and 24h
Indication of xTU-R
Severely
Degraded Data DS
Symbols
EOC INM PM
Impulse Noise anomalies INM Anomaly
counters
Sensor Counters 15min and 24h
VDSL2
[Loop
attenuation]
CPE
Forward Error Correction (FEC) is the traditional error correction technique to deal
with impulse noise, as defined in the ADSL, ADSL2(Plus) and VDSL2 standards.
FEC is very well suited to protect against REIN, but due to the fixed overhead, FEC
is not very efficient to protect against SHINE.
An alternative technique for impulse noise protection is to use retransmission.
Because there is no fixed overhead, retransmission is best suited to protect against
SHINE. Retransmission is available at the higher layers (TCP-IP retransmission for
HSI, End-to-end retransmission for video), but is now also defined for the DSL
physical layer.
ITU-T recommendation G.998.4 (G.inp) specifies techniques beyond those defined
in the existing DSL recommendations to provide enhanced protection against
impulse noise or to increase the efficiency of providing impulse noise protection. Both
REIN and SHINE are handled efficiently on the DSL physical layer.
G.998.4 defines downstream retransmission both for VDSL2 mode and ADSL2(Plus)
mode. Support of retransmission in upstream is optional and only defined for VDSL2
mode.
The concept of DSL physical layer retransmission is illustrated in Figure 42:
• The transmitter groups user data in Data Transfer Units (DTUs) and adds a Cyclic
Redundancy Check (CRC) and sequence number.
• The receiver uses the CRC to detect errors and requests a retransmission of a
DTU when in error.
??
DTU CPE
DTU
DSLAM
The configuration parameters for retransmission are defined within a separate RTX
profile. The RTX profile is optional when configuring an xDSL port. If no RTX profile
is assigned, retransmission will be disabled.
A specific set of Performance Monitoring (PM) parameters is defined, monitoring the
quality of the line when retransmission is enabled.
XDSL Profiles
Parameter 1
Parameter 2 Actual
configuration
… Parameter 3
… Parameter 1
Parameter N
Parameter 2
merge
Parameter 3
XDSL per-line …
overrule parameters Parameter N
Parameter 2
Parameter N
This allows fine-tuning the configuration of individual lines, deviating from the overall
settings configured via the profiles.
When using this feature, one should take care that the overruled parameter values
do not result in an inconsistency with the parameters that are configured via the
profiles.
For bonded xDSL lines, the data rate, impulse noise protection and delay
configuration of the individual lines are derived from the bonding profile parameters.
A subset of the per-line configuration overrule parameters related to data rate,
impulse noise protection or delay will also be taken into account for bonded lines:
with RTX not active:
• Maximum data rate
• Minimum INP (Impulse Noise Protection)
with RTX active:
• Maximum ETR (Expected Throughput) and Maximum NDR (Net Data Rate)
• Minimum INP for SHINE and Minimum INP for REIN
• SHINE ratio
• LEFTR threshold
8.13 Vectoring
VDSL2 vectoring takes full advantage of existing copper binders by making
conditions in the field as close to ideal as possible. Vectoring is not a method for
raising the theoretical maximum transport speeds. Instead, this noise-cancellation
technology addresses the gap between the theoretical maximum rate and the
speeds that service providers can deliver in typical field conditions.
In most deployments, telephone lines that carry VDSL2 signals are part of cables
(sometimes partitioned in smaller cable bundles) that contain 10 to a few hundred
lines positioned very closely together. This close proximity results in crosstalk, and
the higher the number of lines in a cable (bundle), the more crosstalk is generated.
Crosstalk is the main reason why lines in the field perform significantly lower than
their theoretical maximum. Vectoring enables each line to perform as if it is alone,
that is, without crosstalk. In a dynamic process, vectoring continually measures and
cancels this “crosstalk”, so all lines can operate at much higher capacity, as shown
in Figure 44.
80
Mbps
Near-optimal
field performance
60
with vectoring
40
Reduced field
performance due
20
to crosstalk
0
100 200 300 400 500 600 700 800 900 1000 1100 1200
Although most of the processing and necessary intelligence for vectoring resides in
the Digital Subscriber Line Access Multiplexer (DSLAM), minimal support is needed
at the Customer Premises Equipment (CPE) for the efficient estimation of the
crosstalk from the line into the neighboring lines and vice versa. This additional
functionality at the CPE side is defined by the International Telecommunication
Union (ITU) vectoring standard, G.993.5 (G.vector).
In order to achieve the full vectoring gain, all VDSL2 lines in the cable need to
participate in the crosstalk estimation. Otherwise, the crosstalk from some lines will
remain un-cancelled, reducing bit rates on vectored lines. The ultimate situation is
where all VDSL2 lines operate in G.vector mode.
Most of the existing VDSL2 CPEs in the field can be software upgraded to support
vectoring, or to be at least “vectoring-friendly”. The latter has been defined by the ITU
in Annexes X and Y of the VDSL2 standard (G.993.2) and allows the crosstalk from
the legacy line into the neighboring vectored lines to still be measured. Annex X
defines requirements for downstream friendliness such that the crosstalk from the
legacy line into the neighboring vectored lines can be estimated and cancelled in
downstream direction only. Annex Y defines requirements for full friendliness,
allowing estimation of crosstalk from the legacy line into the neighboring vectored
lines in up- and downstream direction. In principle, “friendly” customers do not benefit
from vectoring gains but their equipment no longer impairs vectoring for subscribers
who are paying for this enhancement.
For legacy VDSL2 CPEs that cannot be upgraded to support vectoring or
vector-friendliness, optionally the ZTV (Zero-Touch Vectoring) feature can be
enabled to cancel the crosstalk from such legacy line into the neighboring vectored
lines, in downstream direction only. To protect the neighboring vectored lines in
upstream, optionally the legacy UPBO feature can be enabled. When this feature is
enabled, legacy lines will be forced to use the legacy UPBO profile settings instead
of the normal UPBO settings configured on the line.
Depending on the deployment scale (that is, the considered VDSL2 lines in the cable
binder) two vectoring types can be distinguished:
• Board Level Vectoring (BLV):
• Vectoring on one LT board (for example, 48 lines) and consequently only suited for
deployment scenario with deep fiber penetration where small remotes are installed.
• Only the crosstalk between the lines on the same board can be cancelled.
• System Level Vectoring (SLV):
• Vectoring over multiple LT boards and consequently suited for deployment scenarios
where bigger cabinets are installed.
• Crosstalk between lines on different LTs can be cancelled
The main additional functional blocks for a vectoring system (compared to a
non-vectoring VDSL2 system) are the following:
• Vectoring Control Entity (VCE):
The VCE will control the Vectoring state machine and will use the incoming error
samples to do the calculation of the crosstalk coefficients.
The VCE is located on the LT board for BLV, whereas it is on the Vector
Processing board for SLV.
• Pre-/Post-coder
The Pre-/Post-coder will perform the actual crosstalk cancellation by manipulating
the outgoing/incoming signals from the different DSPs.
To configure vectoring on the ISAM you have to create two new profiles: the
vectoring profile and the VCE profile. The VCE profile is assigned to the board
containing the VCE (LT board for BLV and Vector Processing board for SLV) while
the vectoring profile is assigned to the lines.
In case of SLV, the Vector Processing board is communicating with the LT boards by
means of dedicated front cabling. There are two modes of operation:
1 Auto-discovery mode disabled on VP and LT boards (default mode):
When auto-discovery is disabled, the connection between the VP links and LT
boards has to be configured. This is a precondition for being able to assign a
vectoring profile to an LT port. Failures of the VP-LT cable are reported on the
corresponding VP link.
2 Auto-discovery mode enabled on VP and LT boards:
When auto-discovery is enabled, there is no need any more to configure the
connection between the VP links and LT boards. Once auto-discovery is enabled
on the LT, vectoring profiles can be assigned to the LT ports. Failures of the
VP-LT cable are reported on the corresponding LT.
Vectoring operation requires synchronization between the LT and the VP card. When
installing the VP-LT cable, this synchronization will automatically be executed in case
at least one LT port has been configured in vectored mode. In case all LT ports are
still configured in non-vectored mode, the synchronization will be postponed until a
vectoring profile gets assigned to at least one port of this LT. The VP-LT
synchronization results in a resynchronization of all DSL lines of this LT.
A System Level Vectoring group can be composed of VP and SLV LT boards located
in different ISAM shelves, managed as separate network elements. This type of
setup is called Cross-DSLAM Level Vectoring (XDLV) and is shown in Figure 45.
Because of the limited VP-LT cable length, the equipment still has to be collocated.
Figure 45 Cross-DSLAM Level Vectoring
ISAM 1
VP
NT LT
LT
QSFP
cables
ISAM 2
LT
NT
LT
Constraints:
• XDLV is only possible when auto-discovery mode is enabled. Without
auto-discovery, the VP and the LT boards have to be managed by the same
ISAM.
• XDLV requires compatible SW releases for the VP and LT boards. In case a SW
incompatibility is detected, a VP/LT mismatch alarm will be raised. By default, the
xDSL LT ports with a vectoring profile will not synchronize anymore, but the
system can be configured to autonomously switch such lines to a fall-back VDSL2
configuration with limited spectrum usage.
Vectoring restrictions:
• For bonded legacy VDSL2 lines, ZTV support is limited to 2-pair bonding.
• ZTV lines do not perform automoding with an open VDSL2 profile (17a, 12a, …),
similar to G.Vect lines.
• The reported QLN is always without crosstalk cancellation.
• VDSL2 special Loop Diagnostics mode (that is robust initialization without
transition to showtime) is not supported on vectored lines or lines operating in ZTV
mode.
• VDSL 997 bandplan is not supported in vectored mode.
The definition of the fall-back configuration as well as the enabling of the fall-back
mechanism can be specified at xDSL LT board level.
For bonded lines, additionally a fall-back bonding configuration can be specified.
Save Our Showtime (SOS) prevents the line from retraining when the external noise
suddenly increases. A retrain may take 60 seconds or more during which time the
physical link is disrupted. The higher layers may be disrupted as well and may take
also some time to recover. Such disruptions are undesirable for QoS of IPTV and
many other services.
• SOS allows the application to maintain at least a minimal connection during a
period of degradation. The goal of SOS is to avoid a full system retrain while
maintaining the minimum required quality of service.
• After a SOS procedure, if the noise condition improves, SRA optimizes the data
rate to match the new noise condition. Depending on the noise condition, SRA
may even fully recover to the data rate that was present before the SOS
procedure was activated. Therefore, compared with a full retrain, the combination
of SOS and SRA avoids interruption of service in the presence of a sudden noise
event.
Figure 46 illustrates the typical performances that can be expected expect from
VDSL2 vectoring, G.fast, and VDSL2 35b. Aggregate bit rates (upstream +
downstream) are used for a fair comparison between technologies. G.fast
performance is based on the ITU-T standard (G.9701 12/2014), that is, using up to
106 MHz of spectrum, and excluding VDSL2 (17a) spectrum to allow a mixed
technology deployment.
Figure 46 VDSL2 35b fills the gap between VDSL2 vectoring and G.fast
VDSL2 35b
In terms of bit rate, VDSL2 35b fills the gap between VDSL2 vectoring and G.fast. At
loop lengths between 250 and 550 meters. VDSL2 35b delivers 200+Mbps up to
500m and outperforms both VDSL2 vectoring and G.fast.
At shorter distances (less than 250m) VDSL2 35b does not match G.fast's speeds,
but still delivers over 300Mbps. So even on short loops, VDSL2 35b makes a strong
case for operators who need to deliver up to 300Mbps.
On longer loops, VDSL2 35b falls back to VDSL2 17a vectoring performance.
Figure 47 VDSL2 35b mixed vectoring with VDSL2 17a
VDSL2 30a
138 kHz to 30 MHz
No vectoring possible between 17a and 30a
VDSL2 17a
25 kHz to 17 MHz
VDSL2 35b
25 kHz to 35 MHz
35 MHz VDSL2 but with the same tone spacing as 17a
Vectoring possible between 17a and 35b lines
Using higher frequencies for VDSL2 has already been applied with the VDSL2 30a
standard profile. However, the 30a tone spacing is different from the 17a tone
spacing preventing crosstalk cancellation between 17a and 30a lines as shown in
Figure 47). This makes upgrades of the existing 17a deployments to 30a unattractive
as it would require a full swap of the VDSL2 CPE installed base.
VDSL2 35b overcomes this limitation by using the same tone spacing as 17a. This
allows vectoring across VDSL2 35b and 17a lines, and thus mixed deployments and
a smooth introduction of VDSL2 35b. Since only tone spacing changes, existing 30a
band plans could in principle be reused. However, on request of operators new
VDSL2 35b band plans reaching out to 35MHz have been adopted by ITU-T (in
Annex B of the VDSL2 standard).
VDSL2 35b is described in a new Annex Q of Amendment 1 of the VDSL2 standard
(G.993.2 2015).
For operators that already deploy VDSL2 17a vectoring, VDSL2 35b offers a fast and
cost effective upgrade path to 300Mbps services on short loops without the need for
bonding or deploying new cabinets. As existing VDSL2 vectoring and VDSL2 35b
lines can be mixed in the same cable without performance impact, only subscribers
that sign up for the premium VDSL2 35b service need to change CPE.
8.17 VDSL2-LR
VDSL2-LR or VDSL2-Long Reach is a technology that enables VDSL2 to have an
ADSL like reach, while preserving VDSL2 performances on shorter loops. It
increases throughput by avoiding the ATM cell tax (overhead due to ATM
encapsulation) and support of vectoring.
As VDSL2-LR is vectoring capable, it can be mixed with other VDSL2 vectored lines
resulting in an overall data rates increase of the whole vectoring group, by removing
the 'ADSL' crosstalk from the binder and allowing vectoring also in the ADSL DS
frequency band.
At the same time VDSL2-LR simplifies the management of the network by removing
the need for separate ADSL and VDSL specific profiles.
It is thus the technology of choice for migrating ADSL lines towards a single
technology vectored VDSL2 network.
For VDSL2 lines, it removes the need for configuring multiple VDSL2 profiles (e.g.
17a and 8b automoding) as VDSL2-LR automatically controls the bandwidth and
transmit power depending on loop distance.
VDSL2-LR has three operating modes: Short, Medium and Long loop. The selection
of the operating mode is automatic during an additional probing phase.
The management system can overrule this automatic selection and can also report
the actual operating type(mode).
Figure 48 provides an example of the VDSL2-LR mode selection and downstream
performance on PE04 wire compared to ADSL2plus. The VDSL2-LR line was
configured for 17a operation with all VDSL2-LR modes allowed.
Figure 48 Example Mode selection and Performance of VDSL2-LR
VDSL2 35b
9 ADSL/VDSL Bonding
9.1 Overview
9.1 Overview
xDSL bonding allows multiple physical xDSL lines to be combined into one logical
link to increase the bit rate capacity to the subscriber and/or extend the reach of
existing services. Figure 49 illustrates both deployment scenarios for 2-pair xDSL
bonding. This xDSL bonding chapter covers both ADSLx and VDSL2 bonding.
Figure 49 xDSL bonding deployment scenarios
double the bit rate at the same reach extend reach for the same bit rate
The ISAM supports bonding groups of two up to eight pairs. The type and level of
bonding support (ATM/PTM and number of pairs) is xDSL line card dependent.
ATM bonding is compliant with ITU-T ATM-based multi-pair bonding standard
G.998.1:
• Supported for ADSL, ADSL2 and ADSL2plus mode of operation
• Maximum 2-pair bonding supported
PTM bonding is compliant with ITU-T Ethernet-based multi-pair bonding G.998.2:
• Supported for VDSL2, ADSL2 and ADSL2Plus mode of operation
• Maximum 8-pair bonding supported
At initial startup of the bonding group, a probe training is executed. Each line of the
bonding group is trained to determine its maximum bit rate capacity. This information
is used to make an optimal selection of lines and to calculate an optimal split of the
configured bonding group bit rates. The algorithm guarantees that at any time the
lines will be operating within a maximum bit rate ratio of 4:1.
Besides the bit rates configured at bonding group level, the bandwidth split algorithm
additionally takes into account a subset of the bit rate parameters of the configuration
profiles of the individual lines:
• xDSL lines configured in RA Mode 1 (MANUAL) are forced to operate at the
planned bit rate configured at line level.
• xDSL lines configured in RA Mode 2 (AT_INIT), 3 (DYNAMIC) or 4 (SOS) are only
allowed to operate at a bit rate higher than or equal to the minimum bit rate
configured at line level. The maximum bit rate configured at line level is ignored.
The final initialization phase of the bonding group will only include the selected lines
during the probe training, using the bit rate configuration calculated by the bandwidth
split algorithm. Lines which are not selected will not be able to contribute to the
bonding group. This decision is maintained until the next full initialization of the
group, which includes a new probe training. The bonding group is only brought into
service if the configured minimum group bit rate is reached.
For ATM bonding, the probe training will be executed during each initialization of the
bonding group. For PTM bonding, the bonding group will first try to become
operational using the bandwidth split parameters calculated during a previous
successful initialization, unless the planned bonding group bit rate was not achieved.
Reconfiguring the bonding group or setting the bonding group admin down/up will
always result in a full re-initialization of the bonding group (hence including a new
probe training).
For odd-even pair bonding, if either line of the bonded pair is out of service during
probe training, the bonding group will not initialize. This contrasts with board-level
bonding, for which the bonding group can be brought in service even if only a subset
of the lines is available during probe training, depending on the configured bonding
group assembly timer. This timer limits the duration of the probe training phase.
Besides the bit rates configured at bonding group level, the bandwidth split algorithm
additionally takes into account all bit rate parameters of the configuration profiles of
the individual lines:
• xDSL lines configured in RA Mode 1 (MANUAL) are forced to operate at the
planned bit rate configured at line level.
• for xDSL lines configured in RA Mode 2 (AT_INIT), 3 (DYNAMIC) or 4 (SOS), the
minimum and maximum bit rates at line level are set as follows:
• the minimum bit rate actually configured on the line is the maximum of the minimum
bit rate configured at line level and 1/Nth of the minimum bit rate configured at group
level.
• the maximum bit rate actually configured on the line is the minimum of the maximum
bit rate configured at line level and 1/Nth of the maximum bit rate configured at group
level.
Exception: When the maximum bit rate configured at line level is 0, this value is not
taken into account (that is, considered as infinite)
The bonding group is brought into service when at least one of its lines is operational,
even when the configured minimum group rate is not reached.
All configured lines of the bonding group are always selected for bonding, even lines
that were failing during initial start-up of the bonding group. These lines can join the
group at any time, without a need for a re-initialization of the group.
10.5 Protection
Nokia also provides a wide variety of ONU equipment which works seamlessly
together with the ISAM (P-OLT) products to form a fiber access network capable of
delivering high quality voice, video, and data services to both single-family or
multi-dwelling residential subscribers and business subscribers.
This model is shown in Figure 50.
Optional RF
RF Video router
1,550 nm
provider V-OLT/EDFA
network
Ethernet IPTV
MDU
1,490 nm
WDM 1,550 nm 2.4 Gb/s
PSTN
Voice
gateway
EMS/NMS
Class 5 Softswitch
switch
1 The maximum optical link length depends on the specific equipment and deployment conditions
10.2.1 Standards
The Nokia GPON network is developed based on the following ITU-T standards:
• G.984.1 (GPON Service requirements)
• G.984.2 (GPON PMD layer)
• G.984.2 (GPON PMD layer) amendment 1
• G.984.3 (GPON TC Layer)
• G.984.3 (GPON TC Layer) amendment 1 and 2
• G.984.4 (GPON OMCI)
• G.984.4 (GPON OMCI) amendments 1 and 2
PLOAM OMCI
TC Adaptation sub-layer
OMCI adapter
VPI/VCI Port-ID
filter filter
ATM TC GEM TC
adapter adapter
PLOAM Frame
ATM partition GEM partition
partition header
• In downstream direction, the GEM frames are carried in the GEM partition, and
arrive at all the ONUs. The ONU framing sublayer extracts the frames, and the
GEM TC adapter filters the GEM fragment based on their 12-bit port ID. Only
frames with the appropriate port IDs are allowed through to the GEM client
function at the ONU.
• In upstream direction, the GEM traffic is carried over one or more Transmission
Containers (T-CONTs). The OLT receives the transmission associated with the
T-CONT, and the frames are forwarded to the GEM TC adapter, and then to the
GEM client function at the OLT.
One ONU can be served by one or several T-CONTs, but a given T-CONT can only
be used by a single ONU. Also, a given T-CONT can transport traffic from several
GEM ports, but traffic from a given GEM port can only be carried by a single T-CONT.
Both GEM ports and T-CONTs are internal GPON protocol constructs/abstractions
that are not directly exposed to the operator for convenience and ease of
management.
Upstream
In the basic concept, downstream frames indicate permitted locations for upstream
traffic and upstream frames synchronized with downstream frames as outlined in
Figure 52.
The ISAM sends pointers in the frame header Physical Control Block downstream
(PCBd). The pointers indicate the time at which each ONU must begin and end its
upstream transmission. In this way, only one ONU can access the GPON at any time,
and there is no contention in normal operation. The pointers are 2 bytes long and
given in units of bytes, allowing the OLT to control the GPON at an effective static
bandwidth granularity of 64 kb/s. The size of the GTC frame is 125 µs. The
downstream payload contains GEM packets that are uniquely destined to some
specific T-CONT/ONUs. The ONUs examine the GEM header and only process the
GEM packets which port IDs match its own.
TP-Frame = 125 µS
"Pure" ATM cells TDM & Data Fragments over GEM
Section Section
N x 53 bytes
ONT A ONT B
PLI
12 Inter Packet Gap
Port-ID 5 Bytes
7 Preamble PTI
1 SFD CRC
6 DA
6 SA
2 Length/Type GEM Payload
MAC client Data
4 FCS
1 EOF
Reed-Solomon (RS) is a block-based code, which takes a data block of constant size
and adds extra “redundant” bits at the end, thus creating a code word. Using those
extra bits, the FEC decoder processes the data stream, discovers errors, corrects
errors, and recovers the original data. Reed-Solomon code is specified in CMTT
recommendation CCIR 723.
When using a block-based FEC, original data is preserved. Therefore, by ignoring
the parity bits, even if the other side does not support FEC, the original data can be
processed.
However, block-based FEC error correction is not efficient for very high BER levels
(for example, for 10-3 BER, a decoding error will be generated).
10.3.8 Security
ISAM uses Advanced Encryption Standard (AES) for security. Internally AES is
enabled/disabled by ISAM for individual port IDs in conformance with the GPON
protocol standards. However, management model granularity is provided on a
per-ONU basis.
Advanced Encryption Standard is a block cipher that operates on 16 byte (128 bit)
blocks of data. It accepts 128, 192, and 256 bit keys. This algorithm is described in
documents published by the National Institute of Standards and Technology (NIST)
in the USA.
There are several modes of operation for this standard. However, only the “Counter”
(CTR) mode is used by ISAM. In this mode, the cipher generates a stream of 16-byte
pseudorandom cipher blocks which are exclusive-ORed with the input clear-text to
produce the output of cipher-text. The cipher-text is exclusive-ORed with the same
pseudorandom cipher blocks to regenerate the clear-text. The key length is fixed at
128 bits.
In the normal operating state, all the transmissions can be used for monitoring the
phase of the arriving transmission. Based on the monitoring transmission phase
information, the equalization delay can be updated.
10.3.11 OMCI
The ONT Management and Control Interface (OMCI) is the ITU-T G984.4-based
open interface definition that provides the management model for provisioning and
surveillance related functions between ISAM and ONUs.
10.5 Protection
ISAM supports Type-B protection per ITU-T specification G984.1. Refer to
section “Subscriber interface redundancy” in chapter “Failure protection and
redundancy provisions in ISAM” for further information.
11.1 Introduction
The Optical Network Unit (ONU) in conjunction with the ISAM OLT products work
seamlessly together to form a fiber access network capable of delivering high quality
voice, video, and data services to both single-family or multi-dwelling residential
subscribers and business subscribers
This chapter describes the ONU support in ISAM on a high level. For more details
consult the 7368 ISAM ONT product overview.
Figure 57 ISAM GPON Network Architecture
Optional RF
RF Video router
1,550 nm
provider V-OLT/EDFA
network
Ethernet IPTV
MDU
1,490 nm
WDM 1,550 nm 2.4 Gb/s
PSTN
Voice
gateway
EMS/NMS
Class 5 Softswitch
switch
1 The maximum optical link length depends on the specific equipment and deployment conditions
• G.988 (OMCI)
• OIG Implementers Guide
12.4 OMCI
12.1 Introduction
An Optical Distribution Network (ODN) based consists of two main parts that may be
implemented by network equipment that can be categorized as follows:
• Optical Line Termination (OLT):
This unit provides central processing, switching, and control functions. This
equipment is located at the network side of the Optical Distribution Network. Nokia
Universal NG-PON OLT platforms and linecards are capable of supporting
XGS-PON and/or TWDM-PON.
• Optical Network Unit (ONU):
This unit is located at the subscriber premises as distributed end-points of the
ODN. This equipment implements the PON protocol and adapts the PON Protocol
Data Units to subscriber service interfaces.
Note that there is a specific case for ONU equipment that is generally referred to
as Optical Network Termination (ONT). This specific term is generally used to
designate a single-user subscriber premise equipment.
Nokia also provides ONU equipment which works seamlessly together with the ISAM
(P-OLT) to form a fiber access network capable of delivering high quality voice,
video, and data services to single-family subscribers, multi-dwelling residential
subscribers and business subscribers
This model is shown in Figure 58.
1,490 nm
RF Video
1,310 nm
provider GPON
network
1,524 nm -
PSTN 1,544 nm
Voice
gateway
EMS/NMS
Class 5 Softswitch
switch
1 The maximum optical link length depends on the specific equipment and deployment conditions
The Nokia Universal NG-PON solution is developed based on the following ITU-T
standards:
• G.989 (NG-PON2: Definitions, abbreviations and acronyms)
• G.989.1 (NG-PON2 General Requirements)
• G.989.2 (NG-PON2 PMD layer Requirements)
• G.989.3 (NG-PON2 TC Layer Requirements)
• G.9807.1 (XGS-PON specification, including General/PMD layer/TC layer
Requirements)
• G.988 (OMCI Requirements - common for
GPON/XG-PON1/XGS-PON/NG-PON2)
The Nokia Universal NG-PON OLT currently supports a maximum fiber distance and
maximum differential fiber distance of respectively 20 km and 40 km using N1 (29dB)
class optics. 40 km differential fiber distance capability depends on having at least
40 km capable optics.
TC Layer
(3)
TWDM TC functions:
PM User Data OMCI
PLOAM Security key mgmt Adapter Adapter
processor ONU power mgmt
TWDM channel mgmt
Protection XGEM Engine
(2)
Upstream
Bandwidth mgmt
AMCC DBA Control FS
framing frame burst
PLOAM
Embedded header fields XGEM partition
partition
(1)
AMCC
PHY burst timing
PHY
and profile control
adaptation
PMD Layer
The sublayer (1) is the PHY adaptation sublayer and encompasses the functions that
modify the bitstream modulating the optical transmitter with the goal to improve the
detection, reception and delineation properties of the signal transmitted over the
optical medium. The sublayer (2) is the framing sublayer, responsible for the
construction and parsing of the overhead fields that support the necessary PON
management functionality. The sublayer (3) is the service adaptation sublayer,
responsible for upper layer service data unit (SDU) encapsulation, multiplexing and
delineation.
In the downstream, the traffic multiplexing functionality is centralized at the OLT. The
OLT multiplexes XGEM frames onto the transmission medium using XGEM Port-IDs.
The XGEM Port IDs delineate the respective XGEM frames that belong to different
downstream logical connections. XGEM frames are carried in the XGEM partition,
and arrive at all the ONUs. The ONU framing sublayer extracts the frames, and the
XGEM TC adapter filters the XGEM fragment based on their 16-bit XGEM Port-ID.
Only frames with the appropriate XGEM Port-IDs are allowed through to the XGEM
client function.
In the upstream, the traffic multiplexing functionality is distributed between the OLT
and the ONU. The OLT controls the upstream bandwidth allocation while the ONU
responds to the allocation by transmitting upstream traffic that is the recipient of the
bandwidth allocation. The XGEM traffic is carried over one or more T-CONTs (traffic
container). One ONU can be served by one or several T-CONTs, but a given
T-CONT can only be used by a single ONU. A given T-CONT can transport traffic
from several XGEM Port-IDs, but traffic from a given XGEM Port-ID can only be
carried by a single T-CONT. The OLT receives the transmission associated with the
T-CONT, and the frames are forwarded to the XGEM TC adapter, and then the
XGEM client.
Both XGEM ports and T-CONTs are internal PON protocol constructs/abstractions
that are not directly exposed to the operator for convenience and ease of
management.
OLT Bitmap
ONU X
Alloc-ID X Alloc-ID 1050
Burst of ONU X
ONU Y
Alloc-ID Y
Burst of ONU Y
The OLT controls and manages the upstream media access for all ONUs on the
PON. The OLT inserts specific ONU upstream bandwidth maps in its downstream
frames. These bandwidth maps indicate the permitted locations for upstream ONU
transmissions. They contain a number of allocation structures, each allocation
structure being addressed to a particular Alloc-ID (associated to a given T-CONT) of
a specific ONU.
For each bandwidth allocation, the OLT sends a start pointer and grant size field in
the PHY frame header. The start pointers and grant size indicate the time at which
the respective ONU must begin and end its upstream transmission. In this way, only
one ONU can access the PON at any time, and there is no contention in normal
operation. The start pointers and grant sizes are expressed in units whose
granularity depend on the upstream line rate of the target ONU: one word (4 bytes)
for an ONU transmitting at 2.48832 Gbps in upstream, and one block (16 bytes) for
an ONU transmitting at 9.95328 Gbps in upstream.
The duration of a PHY frame is always 125 µs. The downstream payload contains
XGEM frames that are uniquely destined to a specific ONU. The ONUs will examine
all of the XGEM headers and only process the XGEM frames with port-IDs that
belong to it. In the upstream direction, each ONU transmits a series of relatively short
PHY bursts and remains silent, disabling the transmitter, in-between the bursts.
Upstream frames are synchronized with downstream frames as outlined in
Figure 60.
ONU X
Downstream PHY frame at ONU j
ONU Y
XGTC
XGTC payload
header
Figure 62 shows the upstream frame format (with FEC enabled) for next generation
PON technologies.
PSBu PSBu
PSBu
PLI KI
12 Inter-packet gap
XGEM Port-ID
8
Options
7 Preamble
LF
1 SFD HEC
6 DA
6 SA
2 Length/type
N + 18
XGEM Payload
N MAC client data
4 FCS
Padding 0-3
SDU SDU
fragment A fragment B
12.3.5 Security
The ISAM Universal NG-PON system is protected by two different types of security
features: Authentication and Advanced Encryption Standard (AES).
12.3.5.1 Authentication
Authentication security includes the use of Registration-ID, executed in the course of
ONU activation. Upon authentication failure, the OLT may undertake measures to
restore functionality and to prevent a potential security breach, which may include
repeating authentication using the same or alternative mechanism, blocking
upstream and downstream traffic, deactivating or disabling the offending ONU. This
registration-based authentication mechanism provides a basic level of authentication
of the ONU to the OLT.
Additionally, the PLOAM (Physical Layer Operation, Administration and
Maintenance) messaging channel is verified and protected by the use of the 8-byte
Message Integrity Check (MIC) field of the PLOAM message format. The MIC field
of the PLOAM message format is generated using the cipher-based message
authentication code (CMAC) algorithm specified in [NIST SP800-38B] with AES-128
encryption algorithm [NIST FIPS-197] as the underlying block cipher.
Additionally, the OMCC is verified and protected by the use of the 4-byte Message
Integrity Check (MIC) field of the OMCI message format. The MIC field of the PLOAM
message format is generated using the cipher-based message authentication code
(CMAC) algorithm specified in [NIST SP800-38B] with AES-128 encryption algorithm
[NIST FIPS-197] as the underlying block cipher.
There are several modes of operation for this AES standard. The ISAM supports the
"Counter" (CTR) mode, where the cipher generates a stream of 16-byte
pseudo-random cipher blocks which are XOR-ed with the input clear-text to produce
the output of cipher-text. The cipher-text is XOR-ed with the same pseudo-random
cipher blocks to regenerate the clear-text. The key length is fixed at 128 bits.
3) Ranging phase:
• ONU responds to directed ranging grants. A ranging grant is an allocation
structure that is addressed to the default Alloc-ID of the ONU and has the
PLOAMu flag set.
• OLT measures round-trip delay, the ONU calculates respective equalization delay
(EqD), and communicates it to the ONU.
• ONU adjusts the start of its upstream PHY frame clock based on equalization
delay received from OLT
• ONU completes activation; regular operation proceeds
• This procedure is performed by the exchange of upstream and downstream flags
and PLOAM messages.
In the normal operating state, all transmissions can be used for monitoring the phase
and BER of the arriving transmission. Based on monitoring transmission phase
information, the equalization delay can be updated dynamically by OLT.
Since the Serial-Number request is broadcast to all ONUs in the Serial-Number
state, a response from more than one ONU might be produced. A problem may occur
when more than one Serial-Number transmission arrives at the same time at the
OLT, thus causing a collision. The Random Delay Method is used to resolve this
problem.
Based on the Random Delay Method, each Serial-Number transmission is delayed
by a random number of delay units generated by each ONU. Following each
response to a Serial-Number request, the ONU generates a new random number,
thus collisions are easily and efficiently prevented.
The Random delay range is measured from the beginning of the earliest possible
transmission to the end of the latest possible transmission.
Except during their activation process or in case of protection switching, ONUs that
are in service on a given channel-pair don't decide to re-tune autonomously: they
typically follow instructions from the OLT, that are conveyed via standardized
Tuning_Control PLOAM messaged. The decision to force a given ONU to re-tune to
a different wavelength pair than its operating one can be driven by different factors,
for instance, equalize the number of end-subscribers on the channel-pairs, equalize
the bandwidth utilization on the channel-pairs, re-group ONUs on a channel-pair to
allow maintenance actions affecting the other channels and so on.
Moving an ONU from a channel-pair to another can be the result of a decision logic
algorithm implemented at the Management Layer (typically referred to as a
Wavelength Mobility Manager, cf. BBF WT-352); but it can also be an
operator-triggered action.
In this release, the ISAM 7360 FX only supports individual ONU wavelength
re-assignment between two channel-pairs hosted by two TWDM-PON OLT ports
situated on two different linecards.
The ONU movement sequence can be triggered via the OLT Management Interface
and always targets a specific ONU.
12.4 OMCI
The ONU Management and Control Interface (OMCI) is the ITU-T G.988-based open
interface definition that provides the management model for provisioning and
surveillance related functions between ISAM and ONUs via the ONU Management
and Control Channel (OMCC). This layer is common across the different ITU-T PON
technologies.
For more information about the Protection Schemes supported by the ISAM OLT,
please refer to Chapter “Failure protection and redundancy provisions in ISAM”.
Nokia is not developing a CEx unit, but has provided certain industry partners with
CEx specifications developed by Nokia for use in XGS-PON and TWDM-PON
systems. Two definitions have been developed: a basic CEx that facilitates
coexistence with GPON, XG-PON1/XGS-PON, and TWDM-PON; and an Enhanced
CEx that also adds capabilities for PtP WDM PON and External (1650nm) OTDR.
With Nokia Universal NG-PON solution operators can migrate from one deployment
scenario to the other without needing to change the OLT equipment, simply by
adapting the type of optical module used at the OLT.
13.1 Introduction
The integrated VoIP service provides classic telephony services to subscribers being
connected with classic POTS or ISDN BRA / ISDN PRA / CAS R2 lines and to
convert the corresponding signals to VoIP signaling and data packets.
The integrated VoIP service provides POTS or ISDN BRA or ISDN PRA or CAS R2
service to subscribers over copper and fiber together or without xDSL service.
The voice information is converted to VoIP in the access device and forwarded to and
from the service provider's Ethernet and IP network over optical fibers along with the
HSI and IPTV services carried by the access device
VoIP networks are subject to standardization. Within standardization there are two
different approaches for the signaling:
• A set of standards driven by ITU-T, centered around ITU-T document H.248. In a
nutshell: a network based on this standard uses RTP for the voice and Megaco
for the signaling.
• A set of standards driven by IETF SIP. In a nutshell: a network based on this
standard uses RTP for the voice and SIP for the signaling.
The Integrated VoIP Service supports both signaling methods and can be deployed
in the corresponding network topologies.
In addition, the integrated VoIP service supports CESoPSN (Cicuit Emulation
Service over Packet Switched Network). That is a method for encapsulating
structured (PW3: NxDS0) Time Division Multiplexed (TDM) signals as pseudowires
over packet-switching networks (PSNs).
Note 1 — Voice over Broadband (VoBB) is not in the scope of
this "Integrated Voice Service" Chapter.
Note 2 — The "Integrated Voice Service" chapter describes the
behaviour and characteristics of the POTS and ISDN ports
associated with the ALU access devices offering the integrated
voice service.
H.248 : ISDN BRA interface Yes (not for 7360 ISAM FX)
(1 of 3)
SIP: LSA SIP Server / LSA Fail-Over / LSA Fail-Back Yes (7356 supports FO to/ FB
from LSA server but cannot
host LSA server)
(2 of 3)
(3 of 3)
Subtending
ISAM Voice
Softswitch
PSTN
RTP
TGW P I
MGC ASP O S
T D
S N
Central Office
ISAM Voice POTS /
Servers ISDN
IP Network
H.248 / SIGTRAN
. P
O
T
L2 Aggregation M
S
IP G
BAS Network
edge
POTS/
ISDN
Remote
ISAM Voice
P I
P I O S
O S T D
T D S N
S N
POTS/ POTS/
ISDN ISDN
Remote
ISAM Voice
Megaco Integrated Voice Service connects legacy Narrow Band (NB) user
interfaces, including Plain Old Telephone Services (POTS) and Integrated Services
Digital Network (ISDN) BRA, to the NGVN.
Megaco Integrated Voice Service supports centralized configurations, where the NB
user interfaces and MG are integrated in the same access node, and distributed
configurations, where the MG is located in a hub access node and the NB user
interfaces in remote access nodes. The remote access nodes can be subtended to
the hubb access node acting as an MG, or located within the layer 2 aggregation or
IP network.
A voice cluster is the aggregation of a Voice packet server (pair), residing in the hub
access node, together with its voice associated access nodes, that is, together with
the access nodes that contain Voice Line Termination (LT) boards that are managed
by that particular Voice packet server (pair). A voice cluster supports maximum 5K
subscribers. These subscribers may be scattered over maximum 32 access nodes
and maximum 104 Voice LT boards.
An access node can be equipped with:
• one or multiple physical voice packet servers running in simplex mode,
• one or multiple pairs of physical voice packet servers running in full redundant
active/standby mode,
• one virtualized voice packet server running in simplex mode,
• a pair of virtualized voice packet servers running in non-redundant active/standby
mode.
The physical voice packet server requires a single dedicated physical board or a pair
of dedicated physical boards to be planned and inserted at the LT slot position, at
which the H.248 MG SW image is downloaded and running.
In case of an active/standby configuration, hitless redundancy is supported between
the active and standby physical voice packet server board.
Up to eight physical voice packet servers running in simplex mode or up to eight pairs
of physical voice packet servers running in full redundant active/standby mode can
be planned in an access node (the hub access node). Or in other words, a hub
access node may be the hub node for up to eight different Voice Clusters.
The physical voice packet server supports a voice cluster with maximum 5K
subscribers and these subscribers may be scattered over maximum 32 access
nodes and maximum 104 voice LT boards.
The virtualized voice packet server requires a single dedicated virtual board or a pair
of dedicated virtual boards to be planned on top of the present multi-core NT
configuration, at which the H.248 MG SW image is downloaded and running.
In case of a simplex multi-core NT configuration, the H.248 MG runs also in simplex
mode.
In case of an active/standby multi-core NT configuration, the H.248 MG may run in
simplex or 'paired' mode. 'Paired' mode means that in case of an NT switch-over, the
H.248 MG service can be continued, however the service starts again from its
initialization phase since the MSAN does not support redundancy between the active
and the standby virtualized voice packet server board.
Only one virtualized voice packet server (pair) can be planned in an access node and
supports a maximum of 1.2K subscribers all hosted at the local access node (with
maximum 16 LT boards).
The key benefit of this virtualized voice packet server board is that it allows for a
higher density (there are no longer LT slots required to plan and insert the voice
packet server).
From a H.248 MG point of view, full feature parity is guaranteed between the
virtualized and physical voice packet server for POTS subscribers.
The virtualized voice packet server does not support the ISDN BRA service.
In subsequent chapters the generic term 'voice packet server’ will be used and the
voice packet server will be shown as a separate logical block in all drawings.
The hub access node, combined with the subtending and remote access node(s),
provides the view of a unique centralized MG. In subtending or remote
configurations, the connection to the hub is via Fast or Gigabit Ethernet (optical or
electrical). The Trunk MG links the NGVN with a legacy PSTN network.
The Softswitch is responsible for call control and charging, and communicates with
the Media Gateways (Megaco Integrated Voice Service) via the Media Gateway
Control (Megaco) protocol H.248.
SIGTRAN is used for ISDN BRA users, that is, Q921 is terminated in the access node
and SIGTRAN is implemented to transfer Q931 messages transparantly between the
access node and the ASP.
Other IP Networks
Mj Gq'
Gm Mx
SIP/Gm P-CSCF Mg
SGF
MRFC MGCF Ie
PSTN/ISDN
Gq' Gq'
Ut Mp Mn
Resource and Admission Control Subsystem
VGW
Z MRFP T-MGF
DHCP
Mgmt DN S
Se r ve r
Pla tfo r m Se r ve r
PSTN
SG F/ T-MG F
S_CSCF
MG CF ISAM Voice
AS I_CSCF
P P U
O O A
P_CSCF RTP T T
S S
POTS
ER
O th e r IP P
O
P U
O
T A
Networks Se rve rs
T
S S
ISAM Voice POTS
P I PBX
O SU POTS
T DA
S N
BAS
ISDN PRA (E1)
Each of access the nodes connected to the layer 2 aggregation or IP network has the
SIP UA locally integrated on the Voice LT. The local instance of the SIP UA serves
all NB user interfaces connected to a Voice LT.
The Call Session Control Function (CSCF) establishes, monitors, supports and
releases multimedia sessions and manages the user's service interactions. The
CSCF can act as Proxy CSCF (P-CSCF), Serving CSCF (S-CSCF) or Interrogating
CSCF (I-CSCF):
• The P-CSCF is the first contact point for the access node within the IM subsystem
(IMS).
• The S-CSCF fulfils the role of registrar and handles the session states in the
network.
• The I-CSCF is mainly the contact point within an operator's network for all IMS
connections destined to a subscriber of that network operator, or a roaming
subscriber currently located within that network operator's service area.
The Home Subscriber Server (HSS) is a master user database that supports the IMS
network entities that handle calls. It contains the subscription-related information
(user profiles), performs authentication and authorization of the user, and can
provide information about the user's physical location.
Interconnection with legacy PSTN networks is guaranteed at the signaling level via
the Signaling Gateway Function (SGF) (transport) and the Media Gateway Control
Function (MGCF) (call and service control). Interconnection at the media level is
provided by the Trunk Media Gateway Function (T-MGF).
Interconnection with other IP-based service subsystems (including other IMS
subsystems) is performed via the Intermediate Breakout Control function (IBCF) at
the signaling level and the Interconnection-Border Gateway Function (I-BGF) at the
media level.
Very often, to support lawful intercept, Voice traffic is switched along the Legal
Intercept gateway.
ISAM
Voice
DHCP
SNMP/
CLI/TL1 P I
O S POTS
IP T D
S N
ISDN
SIP PRA
(E1)
RTP / RTCP PBX
Media
Gateway Back-toBack
server
The access node connects legacy Narrow Band (NB) user interfaces, the Plain Old
Telephone Services (POTS) and/or ISDN PRA and/or CAS R2, to a non-IMS
compliant network.
Each of the access nodes connected to the IP network has the SIP UA locally
integrated on the Voice LT. The local instance of the SIP User Agent (UA) serves all
NB user interfaces connected to a Voice LT.
ETH/IP/MPLS
ISA M ETH/IP/MPLS
DTE/DCE
e1
Wir
udo
SHDSL
16x G.SHDSL
NT
LT Board
Pse 2
PSN
(PTM/ATM)
So W ire
CE
PTM
Business and udo
ATM
N Pse
S
oP e3 DTE/DCE
customer C ES Wir
8x G.SHDSL
udo
environment (PTM/ATM/TDM) Pse
PSN
PTM T
2 o
ATM D CE S
TDM TDM M
l
CPE*
s hds
/G. DTE/DCE
TDM T
DTE/DCE
D
E1
Le M TDM bus
as
ed 4x 2xE1
Lin
e E1 front
ISDN PRA
cable
LT Board
LL -
PBX IW
1 4x 2xE1
Pseudo Wire
PSN Tunnel
Native Native
Service (TDM) Service (TDM)
Attachment PW1
CE1 Circuit PE1 PE2 Attachment
Circuit CE2
(e.g. E1) ISAM1 ISAM 2 (e.g. E1)
PW2
Provider Provider
Customer Edge 1 Edge 2
Customer
Edge 1 Edge 2
MG MG MG
pair 1 pair 2 pair 8
Main shelf
MG MG MG
pair 1 pair 2 pair 3
Main shelf
MG MG MG
pair 1 pair 2 pair 8
Main shelf
13.5.1 H.248
The H.248 (Megaco) based integrated voice service is supported for the following
products:
• 7302 ISAM:
• POTS and ISDN BRA services supported.
• Maximum 18 Voice LT slot positions (with single NT).
• 7330 ISAM FTTN:
• POTS and ISDN BRA services supported.
• Maximum 10 Voice LT slot positions (with single NT).
• 7360 ISAM FX:
• POTS services supported.
• Maximum 16 Voice LT slot positions.
13.5.2 SIP
The SIP based integrated voice service is supported in:
• 7302 ISAM:
• POTS / ISDN PRA / CAS R2 services supported.
• Maximum 18 Voice LT slot positions (with single NT).
• 7330 ISAM FTTN:
• POTS / ISDN PRA / CAS R2 services supported.
• Maximum 10 Voice LT slot positions (with single NT).
• 7360 ISAM FX:
• POTS / ISDN PRA / CAS R2 services supported.
• Maximum 16 Voice LT slot positions.
In addition, for the voice cluster topology, an additional traffic type applies i.e. the
XLES signaling :
• The Internal signaling traffic, also called "XLES" traffic, is exchanged between the
Media Gateway and its associated Voice LT board hosted in either the hub,
subtending or remote access node and allows the Media Gateway.
• To monitor the voice LT board operational status
• To exchange events with the voice LT board, and vice versa, in the course of the
protocol stack convertion between H.248 signaling and the Z-Interface.
Each LT slot position gets assigned a fixed transport protocol port range. The xHub
port that connects to a LT slot position LT inherits this fixed transport protocol port
range mapping
The transport protocol port range for free usage (IANA) that is, 49153 - 65535 is
divided in 32 equal portions and the lower part of each portion (256 ports) is mapped
to the different xHub ports. The mapping of the 32 transport protocol portions to the
xHub ports is fixed and identical for every access node.
Upon receipt of a downstream packet within a layer 4 forwarding assigned VLAN and
with the destination IP address bound to this VLAN, the destination port value of the
transport protocol header included in the packet is compared against all defined
transport protocol ranges. When a match is found, the corresponding xHub port
mapping is looked-up and the packet is forwarded to the voice LT that connects to
this xHub port.
As described, the layer 4 forwarding uses the combination {VRF-ID + destination IP
address + destination Transport Protocol port} to decide about the further
downstream forwarding of an IP packet..
Layer 4 forwarding is applied to both signaling and media traffic.
Layer 4 forwarding supports packet fragmentation at IP layer because, unlike Voice
traffic, SIP signaling traffic may be fragmented at the IP layer.
The described algorithm is schematically shown in Figure 78.
xHub
Ingress N Egress
Layer 4 forwarding
Layer 3 IP table
Signaling VLAN
IP address
XLES
Voice NT
server
IP address
signalling
IP address
XLES
Voice NT
Internal
server signaling
IP address VLAN
signalling
The conceptual architecture shows different VLANs carrying H.248 signaling and
RTP/RTCP/XLES traffic at the network side than at the user side (VLAN) of the VRF.
The internal VLAN that carries RTP/RTCP/XLES traffic performs L4 forwarding in
downstream direction.
At the IHub:
• VRF user side: a numbered IP interface is configured on top of the internal voice
VLAN for the following reasons:
• This IP interface is used as the destination IP address for RTP/RTCP/XLES packets
addressed to the voice LT board. For this purpose, the Voice subnet is advertised (as
host subnet) to the upstream network.
• The IHub is considered as the first next hop for the RTP/XLES packets sent in the
upstream direction by the NVPS
• VRF user side: A numbered IP interface is configured on top of the internal
signaling VLAN. The IHub is seen as the first next hop for the H.248 signaling
traffic that originates from the Media Gateway running at the NVPS board.
The signaling subnet is advertised (as host subnet) to the upstream network.
In the upstream direction, the selection of the network interface/VLAN will happen as
the result of the IP DA look-up in the L3 forwarding table, and this for all the voice
service related traffic (H.248 signaling, XLES, RTP and RTCP).
In the downstream direction, voice-service-related traffic (H.248 signaling, XLES,
RTP and RTCP) may be received at any network interface/VLAN. The IHub must
perform the further L3 forwarding to:
• the appropriate internal VLAN
• and to the destined NVPS
• and to the destined voice LT board (by L4 forwarding)
From a downstream forwarding perspective, seen from the edge router, the voice
access node is configured as the next-hop.
Signaling Network
v-VPLS IP address v-VPLS 2
signalling /VLAN 2
NT
NT
The conceptual architecture shows different VLANs carrying SIP signaling and
RTP/RTCP traffic at the network and the user side (VLAN) of the VRF.
Both internal VLANs perform L4 forwarding in downstream direction.
At the IHub:
• IHub VRF user side: A numbered IP interface is configured on top of the internal
voice VLAN. This IP address is used as destination IP address for RTP/RTCP
packets addressed to the voice LT board. For this purpose, the Voice subnet is
advertised (as host subnet) to the upstream network.
• IHub VRF user side: A numbered IP interface is configured on top of the internal
signaling VLAN. This IP address is used as destination IP address for SIP
signaling packets addressed to the voice LT board. For this purpose, the signaling
subnet is advertised (as host subnet) to the upstream network.
• IHub VRF network side: A numbered IP interface is configured on top of the
network voice VLAN.
• IHub VRF network side: A numbered IP interface is configured on top of the
network signaling VLAN.
In the upstream direction, the selection of the network interface/VLAN will happen as
the result of the IP DA look-up in the L3 forwarding table. And this for all the voice
service related traffic (SIP signaling, RTP and RTCP).
In the downstream direction, voice service related traffic (SIP signaling, RTP and
RTCP) may be received at any network interface/VLAN. The IHub must perform the
further L3 forwarding to the appropriate internal VLAN and to the destined voice LT
board (by L4 forwarding)
From a downstream forwarding perspective, seen from the edge router, the access
node is configured as the next-hop.
Figure 83 shows the SIP Integrated Voice Service (distributed architecture) switched
model.
Figure 83 SIP Integrated Voice Service (distributed architecture): switched
model
NT
NT
The conceptual architecture shows different VLANs carrying SIP signaling and
RTP/RTCP traffic at the network and the user side (VLAN) of the VRF.
At the IHub:
• VRF user side: A numbered IP interface is configured on top of the internal voice
VLAN.
Note — The IP address configured at the voice LT board is
used as destination IP address for RTP/RTCP packets
addressed to the voice LT board. For this purpose, the Voice
subnet is advertised (as host subnet) to the upstream network.
• VRF user side: A numbered IP interface is configured on top of the internal
signaling VLAN.
Note — The IP address configured at the voice LT board is
used as destination IP address for SIP signaling packets
addressed to the voice LT board. For this purpose, the
signaling subnet is advertised (as host subnet) to the upstream
network.
• VRF network side: A numbered IP interface is configured on top of the network
voice VLAN.
• VRF network side: A numbered IP interface is configured on top of the network
signaling VLAN.
The IHub will be considered as the first next hop for the SIP signaling and for the
RTP/RTCP traffic that originates from the voice LT board. For this reason, a
numbered IP interface is configured on both the internal signaling VLAN and the
internal RTP/RTCP VLAN at the VRF user side.
In upstream direction, the selection of the network interface/VLAN will happen as the
result of the IP DA look-up in the L3 forwarding table. And this for all voice service
related traffic (SIP signaling, RTP and RTCP).
In downstream direction, voice service related traffic (SIP signaling, RTP and RTCP)
may be received at any network interface/VLAN. The IHub must perform the further
L3 forwarding to the appropriate internal VLAN and to the destined voice LT board.
From a downstream forwarding perspective, seen from the edge router, the access
node is configured as the next-hop.
NT
Subtending ISAM
Fast path VRF
NT
Figure 86 shows the MEGACO/SIP Integrated Voice Service subtended topology for
the routed model.
IP address
IP address
network 1
User 1
IP address IP address
User 2 network 2
IP address IP address
NT sub 1 sub 2
NT
The subtending access node remains configured as a switching device. Only the
main access node fulfills the routing service.
The conceptual traffic forwarding models depicted above for the IHub based system
without Remote Expansion Module also apply to the IHub based system with Remote
Expansion Module. (The physical position of the voice LT board, locally connected
in the host access node or remotely connected by means of a REM, is transparent
to the operational behavior of the VoIP service)
• Megaco Integrated Voice Service:
• Remote Expansion Module may host 1 or 2 voice LT boards: Voice LT board can be
planned for both the “master” (72-line LT board only) and the “non-Master” (48-line
and 72-line LT board) slot position.
• Remote Expansion Module cannot host the Voice packet server.
• SIP Integrated Voice Service:
• Remote Expansion Module may host 1 or 2 voice LT boards: Voice LT board can be
planned for both the “master” (72-line LT board only) and the “non-Master” (48-line
and 72-line LT board) slot position.
NT board Signaling
NT board L2 forwarding IP address Voice
XLES server
IP address
IHub Voice IHub Voice
Voice LT IP address IP address Voice LT
board L2 board
aggregation
network
L4 forwarding
NT board NT board
L3
aggregation
network
IHub Voice IHub Voice
Voice LT IP address IP address Voice LT
board board
L4 forwarding
MGC ASP
SoftSwitch
XLES traffic
XLES traffic originates at the Voice packet server or at the Voice LT board and
terminates respectively at the Voice LT board or the Voice packet server.
• XLES traffic originating at the Voice packet server and destined to the Voice LT
board (see Figure 88):
The destined Voice LT board is connected either to the local access node, to an
access node subtending to the local access node, or to an access node
connected via a layer 2 aggregation network with the local access node.
The destination (IHub) IP address of the packet can directly be reached in the
local subnet: the Voice packet server performs ARP for the destination (IHub) IP
address and forwards the IP packet to this (IHub) IP address.
The destined Voice LT board is reachable via a layer 3 aggregation network. The
Voice packet server determines the IP next hop for the destination (IHub) IP
address of the packet, performs ARP for the next hop IP address and forwards
the IP packet appropriately.
The (destined) IHub that connects the destined Voice LT performs layer 4
forwarding.
Any potential intermediate IHub in between the Voice packet server and the
destined IHub performs layer 2 forwarding.
• XLES traffic originating at the Voice LT board and destined to the Voice packet
server (see Figure 89):
The Voice LT board forwards the XLES packet to the local IHub.
• The access node of the Voice LT board and the access node of the Voice packet
server are the same or
• The access node of the Voice LT board subtends to the access node of the Voice
packet server or
• The access node of the Voice LT board is connected via a layer 2 aggregation
network with the access node of the Voice packet server
The local IHub detects that the destination IP address of the packet can directly
be reached via the local subnet. The local IHub performs ARP for the destination
IP address and forwards the IP packet appropriately.
The destined Voice packet server is reachable via layer 3 aggregation network:
The local IHub determines the IP next hop for the destination IP address of the
packet, performs ARP the next hop IP address and forwards the IP packet
appropriately.
The IHub that connects the Voice packet server performs layer 2 forwarding.
Any potential intermediate IHub in between the Voice LT's local IHub and the
Voice packet server L2 forwarding.
NT board Signaling
NT board L2 forwarding IP address Voice
XLES server
IP address
IHub Voice IHub Voice
Voice LT IP address IP address Voice LT
board L2 board
aggregation
network
L4 forwarding
NT board NT board
L3
aggregation
network
IHub Voice IHub Voice
Voice LT IP address IP address Voice LT
board board
L4 forwarding
MGC ASP
SoftSwitch
NT board Signaling
NT board L2 forwarding IP address Voice
XLES server
IP address
IHub Voice IHub Voice
Voice LT IP address IP address Voice LT
board L2 board
aggregation
network
L3 forwarding
NT board NT board
L3
aggregation
network
IHub Voice IHub Voice
Voice LT IP address IP address Voice LT
board board
L3 forwarding
MGC ASP
SoftSwitch
Voice traffic
Voice traffic originates at the Voice LT board and is destined to a voice termination
point either at the same Voice LT board, another Voice LT board in the same Voice
cluster or outside the voice cluster.
In some cases the voice traffic is sent along the Voice packet server (to support some
supplementary services or an optimized IP addressing scheme).
Voice traffic is relayed to the IHub prior to the forwarding to the destined voice
termination point. This relay is either done by the Voice LT board (voice traffic that
may not pass the Voice packet server) or the Voice packet server (voice traffic that
must pass the Voice packet server).
A. Voice traffic not passing the Voice packet server:
• Voice traffic destined to an external termination point:
• The voice LT board forwards the voice traffic to the local IHub.
• The local IHub determines the IP next hop for the voice traffic destination IP address.
• The local IHub performs ARP for the next hop IP address and forwards the IP packet
appropriately.
• Any potential intermediate IHub between the local IHub and the next hop performs
layer 2 forwarding.
• Voice traffic destined to a voice termination point at the same Voice LT board in
the local access node:
• The voice LT board forwards the upstream voice traffic to the local IHub.
• The local IHub detects that the destination IP address of the voice traffic is identical
to the own Voice IP address and treats the voice traffic locally.
• The local IHub performs layer 4 forwarding to the Voice LT board from which the
voice traffic originated.
• Voice traffic destined to a voice termination point residing at a different Voice LT
board in the local access node:
• The voice LT board forwards the upstream voice traffic to the local IHub.
• The local IHub detects that the destination IP address of the voice traffic is identical
to the own Voice IP address and treats the voice traffic locally.
• The local IHub performs layer 4 forwarding to the Voice LT board to which the
destined voice termination point is connected.
• Voice traffic destined to a voice termination point residing at a Voice LT in another
access node of the voice cluster:
• The voice LT forwards the upstream voice traffic to the local IHub.
• One of the following takes place:
1. The destined Voice termination point is reachable via a layer 3 aggregation
network:
The local IHub determines the IP next hop for the destination IP address of the voice
traffic. The local IHub performs ARP the next hop IP address and forwards the voice
traffic appropriately.
2. The destined Voice termination point reachable via a layer 2 aggregation network:
The local IHub detects that the destination of the voice traffic is reachable via the
local subnet. The local IHub performs ARP the destination IP address and forwards
the voice traffic appropriately.
• Any potential intermediate IHub between the local IHub and the destined IHub
performs layer 2 forwarding.
• The IHub that connects the destined voice termination point (Voice LT board)
performs layer 4 forwarding.
• Voice traffic relayed by the Voice packet server to a voice termination point
outside the voice cluster:
• The Voice packet server determines the IP next hop for the destination of the voice
traffic, performs ARP for the next hop IP address and forwards the voice traffic
appropriately.
• Any potential intermediate IHub in between the Voice packet server and the next hop
performs layer 2 forwarding.
NT board Signaling
NT board L2 forwarding IP address Voice
XLES server
IP address
IHub Voice IHub Voice
Voice LT IP address IP address Voice LT
board L2 board
aggregation
network
L3 forwarding
NT board NT board
L3
aggregation
network
IHub Voice IHub Voice
Voice LT IP address IP address Voice LT
board board
L4 forwarding L3 forwarding
MGC ASP
SoftSwitch
NT board Signaling
NT board L2 forwarding IP address Voice
XLES server
IP address
IHub Voice IHub Voice
Voice LT IP address IP address Voice LT
board L2 board
aggregation
network
L2 forwarding
L2 forwarding
Remote node Subtending node
NT board NT board
L3
aggregation
network
IHub Voice IHub Voice
Voice LT IP address IP address Voice LT
board board
L3 forwarding
MGC ASP
SoftSwitch
OAM traffic
The management platform of the customer forwards the Voice OAM traffic to the
public OAM IP address of the access node hosting the Voice packet server.
Voice OAM traffic is distinguishable by a Voice specific SNMP community
string/context identifier from non-Voice OAM traffic and in addition distinguishable
through the same SNMP community string/context identifier amongst the Voice
packet server pairs (maximum 8) that may be hosted in the same access node.
Internally, the voice-specific OAM traffic is relayed to the Voice packet server.
Voice OAM responses generated by the Voice packet server are internally passed to
the ISAM SNMP agent that forwards them to the management platform of the
customer.
Any potential intermediate IHub performs layer 2 forwarding and this in both
directions.
Refer also to chapter “Management”.
In the upstream direction, the Voice packet server determines the IP next hop for the
destination IP address of the packet, performs ARP for the next hop IP address and
forwards the IP packet appropriately.
The local IHub is configured as the next hop for signaling packets originating at the
Voice packet server.
The local IHub performs layer 3 forwarding in upstream and downstream direction.
Figure 92 Megaco Integrated Voice Service - Routed: signaling forwarding
L3 forwarding Main node
Remote node
NT board NT board
IHub network
IP address
MGC ASP
SoftSwitch
XLES traffic
XLES traffic originates at the Voice packet server or at the Voice LT board and
terminates respectively at the Voice LT board or the Voice packet server.
• XLES traffic originating at the Voice packet server and destined to the Voice LT
board:
The destined Voice LT board is connected:
• to the local access node, or
• to an access node subtending to the local access node, or
• to an access node connected via a L3 aggregation network with the local access
node.
In the upstream direction, the Voice packet server determines the IP next hop for
the destination IP address of the packet, performs ARP for the next hop IP
address / destination IP address and forwards the IP packet appropriately.
The local IHub is configured as the next hop for the XLES packets originating at
the Voice packet server (in case the destined voice LT board connects to the local
access node, the local IHub IP address is equal to the destination IP address).
The (destined) IHub that connects the destined Voice LT board performs layer 3
followed by layer 4 forwarding.
• XLES traffic originating at the Voice LT board and destined to the Voice packet
server:
The Voice LT board relays the XLES packet to the local IHub.
The access node of the Voice LT board and the access node of the Voice packet
server are the same: the local IHub detects that the destination IP address of the
packet can directly be reached via the local subnet. The local IHub performs ARP
for the destination IP address and forwards the IP packet appropriately.
The access node of the Voice LT board subtends to the access node of the Voice
packet server: The local IHub determines the IP next hop for the destination IP
address of the packet, performs ARP for the next hop IP address and forwards
the IP packet appropriately.
The access node of the Voice LT Board is connected via a layer 3 aggregation
network with the access node of the Voice packet server: The local IHub
determines the IP next hop for the destination IP address of the packet, performs
ARP for the next hop IP address and forwards the IP packet appropriately.
The IHub that connects the Voice packet server performs layer 3 forwarding.
NT board NT board
IHub network
IP address
L4 forwarding
L3 forwarding
MGC ASP
SoftSwitch
NT board NT board
IHub network
IP address
L3 forwarding
MGC ASP
SoftSwitch
Voice traffic
Voice traffic originates at the Voice LT board and is destined to a voice termination
at the same Voice LT board, a voice termination at another Voice LT board in the
Voice cluster or a voice termination outside the voice cluster.
In some cases the voice traffic must be sent along the Voice packet server (to
support some supplementary services or an optimized IP addressing scheme).
In all cases, voice traffic is relayed to the IHub prior to the forwarding to the destined
voice termination. This relay is either done by the Voice LT board (voice traffic that
does not pass the Voice packet server) or the Voice packet server (voice traffic that
passes the Voice packet server).
A) Voice traffic not passing the Voice packet server.
• Voice traffic destined to a termination outside the voice cluster:
• The voice LT board relays the upstream voice traffic to the local IHub.
• The local IHub determines the IP next hop for the voice traffic destination.
• The local IHub performs ARP for the next hop IP address and forwards the IP packet
appropriately.
• Voice traffic destined to a voice termination connected to the same Voice LT
board in the local access node:
• The Voice LT board relays the upstream voice traffic to the local IHub.
• The local IHub detects that the destination of the voice traffic equals the local Voice
IP address and treats the voice traffic locally.
• The local IHub performs layer 4 forwarding to the Voice LT board from which the
voice traffic originated.
• Voice traffic relayed by the Voice packet server to a voice termination outside the
voice cluster:
• The Voice packet server determines the IP next hop for the destination of the voice
traffic, performs ARP the next hop IP address and forwards the voice traffic
appropriately.
NT board NT board
IHub network
IP address
L3 forwarding L3 forwarding
L4 forwarding
MGC ASP
SoftSwitch
NT board NT board
IHub network
IP address
L3 forwarding
MGC ASP
SoftSwitch
OAM traffic
The management platform of the customer forwards the Voice OAM traffic to the
public OAM IP address of the access node hosting the Voice packet server.
Voice OAM traffic is distinguishable by a Voice specific SNMP community
string/context identifier from non-Voice OAM traffic and in addition distinguishable
through the same SNMP community string /context identifier amongst the Voice
packet server pairs (maximum eight) that may be hosted in the same access node.
Internally, the voice specific OAM traffic is relayed to the Voice packet server.
Voice OAM responses generated by the Voice packet server are internally passed to
the SNMP agent that forwards them to the management platform of the customer.
Refer also to chapter “Management”.
NT board NT board
L2 forwarding
NT board NT board
L3
aggregation
IHub Voice IHub Voice
network
IP address IP address
Voice LT Voice LT
IHub signaling IHub signaling
board IP address IP address board
S-CSCF L3 forwarding
I-CSCF
AS
IP
HSS IMS
MRF Core
NT board NT board
L2 forwarding
NT board NT board
L3
aggregation
IHub Voice IHub Voice
network
IP address IP address
Voice LT Voice LT
IHub signaling IHub signaling
board IP address IP address board
S-CSCF L4 forwarding
I-CSCF
AS
IP
HSS IMS
MRF Core
Voice Voice
IP address L2 IP address
aggregation
network
Voice Voice
IP address IP address
S-CSCF L3 forwarding
I-CSCF
AS
L2 forwarding
IP
HSS IMS
MRF Core
Voice Voice
IP address L2 IP address
aggregation
network
Voice Voice
IP address IP address
S-CSCF L2 forwarding
I-CSCF
AS
IP
HSS IMS
MRF Core
Voice traffic
Voice traffic originates at the Voice LT board.
For both the centralized as well as the distributed architecture, the forwarding of the
voice traffic in upstream as well as in downstream direction is identical as shown
above for the signaling traffic.
• Voice traffic exchanged between a local and a remote voice termination:
The forwarding behavior is identical to signaling traffic.
• Voice traffic exchanged between two voice terminations connected to the same
voice LT board:
The forwarding behavior depends on the destination IP address received from the
IMS core, for example, all the voice traffic might be forced to be forwarded along
a voice gateway.
Should the IMS core have decided that the voice traffic may be switched internally
in the access node then this voice traffic will be switched either internally on the
Voice LT board or along the local IHub depending on the Voice LT board type
being planned.
• Voice traffic exchanged between two voice terminations connected to different
voice LT boards in the same access node:
The forwarding behavior depends on the destination IP address received from the
IMS core, for example, all the voice traffic might be forced to be forwarded along
a voice gateway.
Anyhow, switching voice traffic between Voice Terminations, connected to the same
Voice LT board, along the local IHub is only possible in the centralized SIP
architecture, not in the distributed SIP architecture.
Centralized SIP architecture:
• The voice LT board forwards the voice packet to the local IHub.
• The local IHub detects that the destination IP address of the packet is identical to
the own Voice IP address and treats the packet locally.
• The local IHub performs layer 4 forwarding to the Voice LT board to which the
destined voice termination point is connected (that is, the Voice LT board from
which the voice packet originated).
Summarized, the SIP Integrated Voice Service forwards the voice traffic in
accordance with the destination IP address dictated by the SIP signaling and the
Voice LT board type.
The external Packet Forwarding facility serving Lawful Intercept is not supported,
neither for the Distributed, nor for the Centralized SIP architecture.
OAM traffic
The management platform of the customer forwards the Voice OAM traffic to the
management IP address of the access node hosting the Voice packet server.
Voice OAM responses generated by the Voice packet server are internally passed to
the SNMP agent that forwards them to the management platform of the customer.
Any potential intermediate IHub performs layer 2 forwarding and this in both
directions.
Refer also to chapter “Management”.
IHub netw.
Voice LT Voice Voice LT
board IHub netw. IP address
IHub user IHub user
board
Voice
Voice IP address Voice
L3
IP address IHub IP address
aggregation subtending
network IP address
Voice LT Voice LT
IHub Voice
board IHub netw. IP address board
IHub user Voice
Voice IP address
IP address
S-CSCF L3 forwarding
I-CSCF
AS
IP
HSS IMS
MRF Core
IHub netw.
Voice LT Voice Voice LT
board IHub netw. IP address
IHub user IHub user
board
Voice
Voice IP address Voice
L3
IP address IHub IP address
aggregation subtending
network IP address
Voice LT Voice LT
IHub Voice
board IHub netw. IP address board
IHub user Voice
Voice IP address
IP address
S-CSCF L4 forwarding
I-CSCF
AS
IP
HSS IMS
MRF Core
Voice Voice
IHub netw.
IP address IP address
Voice
IHub user
IP address
Voice
IP address
S-CSCF L3 forwarding
I-CSCF
L2 forwarding
AS
IP
HSS IMS
MRF Core
Voice LT Voice LT
NT board IHub netw. NT board
board Signaling board
IHub user IP address
Signaling Signaling
Signaling
IP address IP address
IP address
Voice Voice
IHub netw. IP address
IP address Voice
IHub user
Voice IP address
IP address
S-CSCF L2 forwarding
I-CSCF
AS
IP
HSS IMS
MRF Core
Voice traffic
Voice traffic originates at the Voice LT board.
For both the centralized as the distributed architecture, the forwarding of the voice
traffic in upstream as well as in downstream direction is identical as shown above for
the signaling traffic:
• Voice traffic exchanged between a local and a remote voice termination: The
forwarding behavior is identical to signaling traffic.
• Voice traffic exchanged between two voice termination connected to the same
voice LT board: The forwarding behavior depends on the destination IP address
received from the IMS core, for example, all the voice traffic might be forced to be
forwarded along a voice gateway.
Should the IMS core have decided that the voice traffic may be switched internally
in the access node then this voice traffic will be switched either internally on the
Voice LT board or along the local IHub depending on the Voice LT board type
being planned.
• Voice traffic exchanged between two voice terminations connected to different
voice LT boards in the same access node: The forwarding behavior depends on
the destination IP address received from the IMS core, for example, all the voice
traffic might be forced to be forwarded along a voice gateway.
Switching voice traffic between Voice Terminations, connected to the same Voice LT
board along the local IHub is only possible in the Centralized SIP architecture, not in
the Distributed SIP architecture.
Centralized SIP architecture:
• The Voice LT board forwards the voice packet to the local IHub.
• The local IHub detects that the destination IP address of the packet is identical to
the own Voice IP address and treats the packet locally.
• The local IHub performs layer 4 forwarding to the Voice LT board to which the
destined voice termination point is connected (that is, the Voice LT board from
which the voice packet originated).
Summarized, the SIP Integrated Voice Service forwards the voice traffic in
accordance with the destination IP address dictated by the SIP signaling and the
Voice LT board type.
The External Packet Forwarding facility serving Lawful Intercept is not supported,
neither for the Distributed, nor for the Centralized SIP architecture.
OAM traffic
The management platform of the customer forwards the Voice OAM traffic to the
management IP address of the access node hosting the Voice packet server.
Voice OAM responses generated by the Voice packet server are internally passed to
the SNMP agent that forwards them to the management platform of the customer.
Refer also to chapter “Management”.
Figure 105 ISAM Voice : Distinct VLAN topology - HUB Voice access node
MG
In te r n a l O AM VLAN
Vo ice Se r ve r 1
Exte r n a l O AM VLAN
MG
IACM
Vo ice Se r ve r N
Vo ice LT 1
IHub
NT
VO ICE VLAN
Public O AM IP Address
Public Signa ling IP Address
Public Voice / XLES IP Address
Priva te O AM IP Address
Vo ice LT M
Public Voice IP Address
Figure 106 ISAM Voice : Distinct VLAN topology - Subtending Voice access
node
Exte r n a l O AM VLAN
IACM
Vo ice LT 1
IHub
NT
VO ICE VLAN
Public O AM IP Address
Public Voice IP Address Vo ice LT M
Figure 107 ISAM Voice : Distinct VLAN topology - Remote Voice access
node
Exte r n a l O AM VLAN
IACM
Vo ice LT 1
IHub
NT
VO ICE VLAN
Public O AM IP Address
Public Voice IP Address Vo ice LT M
MG
O AM VLAN
VO ICE VLAN
Interworking Vo ice LT 1
Fumction (IWF)
O AM IP Address
Signa ling IP Address
Voice IP Address
Vo ice LT M
Figure 109 ISAM Voice : Shared VLAN topology - HUB Voice access node
MG
In te r n a l O AM VLAN
Vo ice Se r ve r 1
Exte r n a l O AM VLAN
MG
IACM
Vo ice Se r ve r N
Vo ice LT 1
IHub
NT
Public O AM IP Address
Public Voice IP Address
Public shared Signaling/Voice/XLES IP Address
Vo ice LT M
Priva te O AM IP Address
Figure 110 ISAM Voice : Shared VLAN topology - Subtending Voice access
node
Exte r n a l O AM VLAN
IACM
Vo ice LT 1
IHub
NT
Vo ice LT M
Figure 111 ISAM Voice : Shared VLAN topology - Remote Voice access
node
Exte r n a l O AM VLAN
IACM
Vo ice LT 1
IHub
NT
Vo ice LT M
O AM VLAN
SHARED SIGNALING/
VO ICE VLAN
Interworking Vo ice LT 1
Fumction (IWF)
O AM IP Address
Shared Signaling/Voice IP Address
Vo ice LT M
• Upstream packet forwarding in shared VLAN for signaling and Voice/XLES traffic:
• Signaling traffic originating at the Voice packet server:
layer 3 forwarding at the Voice packet server and layer 2 forwarding at the xHub.
• Voice/XLES traffic originating at the Voice packet server:
layer 3 forwarding at the Voice packet server and layer 2 forwarding at the xHub.
• Voice/XLES traffic originating at the remote Voice access node (Figure 115 - CASE
A):
Voice/XLES packet internally relayed from the Voice LT to the xHub and layer 3
forwarding at the xHub.
• Downstream packet forwarding in shared VLAN for signaling and Voice/XLES
traffic:
• Signaling traffic destined to the Voice packet server:
layer 2 forwarding at the xHub.
• Voice/XLES traffic destined to the Voice packet server:
layer 2 forwarding at the xHub.
• Voice/XLES destined to the Voice LT in Remote Voice access node (Figure 115 -
CASE A):
layer 4 forwarding from the xHub to the Voice LT.
• Upstream packet forwarding in the private Voice VLAN:
• Voice/XLES traffic:
Voice/XLES packet internally relayed from Voice LT to the xHub and layer 3
forwarding at the xHub.
• Downstream packet forwarding in the private Voice VLAN:
• Voice/XLES traffic:
layer 4 forwarding from the xHub to the Voice LT.
• Case A: Shared public signaling/Voice/XLES VLAN:
• Configurable.
• Ports associated with this VLAN are the ASAM port(s) connecting the Voice packet
server in the Hub Voice access node, the ASAM port(s) connecting the voice LT
boards in the remote Voice access node, and the network port(s).
• The shared VLAN terminates at the Voice packet server and at the Voice LT in the
Remote Voice access nodes. It carries:
* Megaco and SIGTRAN signaling traffic exchanged between the MGC (Call Server)/
ASP (Application Server Process) and the MG (Voice access node).
* RTP traffic originated from or destined to end users connected to a remote Voice
access node.
* RTP traffic originated from an external end user and destined to an end user
connected to the hub access node or subtending access node.
* RTP traffic originated from an end user connected to the hub or Subtending access
node and destined to an external end user.
* RTCP traffic
* XLES traffic (internal signaling, control and management) exchanged between the
Voice packet server and the Voice LT hosted in the remote Voice access node.
The basic layer 2/layer 3 addressing topology with IP subnet reduction and IP
address reduction is shown in the following figures:
• For a hub Voice access node, see Figure 113.
• For a subtending Voice access node, see Figure 114.
• For a remote Voice access node, see Figure 115.
Figure 113 ISAM Voice : Private VLAN topology - HUB Voice access node
MG
In te r n a l O AM VLAN
Vo ice Se r ve r 1
Exte r n a l O AM VLAN
MG
IACM
Vo ice Se r ve r N
Vo ice LT 1
IHub
NT
Shared SIGNALING/VO ICE VLAN
Public O AM IP Address
Private Voice IP Address
Public shared Signaling/Voice / XLES IP Address
Priva te O AM IP Address
Vo ice LT M
Private XLES IP Address
Figure 114 ISAM Voice : Private VLAN topology - Subtending Voice access
node
Exte r n a l O AM VLAN
IACM
Vo ice LT 1
IHub
NT
Public O AM IP Address
Private Voice IP Address
Vo ice LT M
Figure 115 ISAM Voice : Private VLAN topology - Remote Voice access node
CASE A
Exte r n a l O AM VLAN
IACM
Vo ice server N
Vo ice LT 1
IHub
NT
Vo ice LT M
CASE B
Exte r n a l O AM VLAN
IACM
Vo ice server N
Vo ice LT 1
IHub
NT
Vo ice LT M
* XLES traffic exchanged between the Voice packet server and the subtending Voice
LT board(s)
MG
Internal OAM VLAN
Voice Server 1
Voice LT 1
Network VLAN
NT
Voice LT M
Subtending
VLAN
VOICE VLAN
Fast-path VRF
Voice LT 1
NT
Subtending VLAN
Figure 118 ISAM Voice : Distinct VLAN / IP address topology - Remote Voice
access node
Voice LT 1
NT
VOICE VLAN
Public OAM IP Address
Public Voice IP Address
Network IP address Voice LT M
Figure 119 ISAM Voice : Shared VLAN / IP address topology - HUB Voice
access node
MG
Internal OAM VLAN
Voice Server 1
Shared SIGNALING
Voice Server N
/VOICE VLAN
Voice LT 1
NT
Subtending
VLAN
VOICE VLAN
Fast-path VRF
Voice LT 1
NT
Voice LT M
Figure 121 ISAM Voice : Shared VLAN / IP address topology - Remote Voice
access node
Voice LT 1
NT
VOICE VLAN
Public OAM IP Address
Public Voice IP Address
Network IP address Voice LT M
MG
Internal OAM VLAN
Voice Server N
Private VOICE VLAN
Fast-path VRF
Network VLAN
Voice LT 1
NT
Voice LT M
Subtending
VLAN
Public OAM IP Address Private XLES IP Address
Private Voice IP Address Network IP address
Public shared Signaling/XLES IP Address User IP address
Private OAM IP Address Subtending IP address
Voice LT 1
NT
Voice LT M
Figure 124 ISAM Voice : Private VLAN / IP address topology - Remote Voice
access node
External OAM VLAN
Shared SIGNALLING
/VOICE VLAN
Voice server N
Voice LT 1
NT
• Shared IP interface for signaling and Media traffic at the voice LT board
• Configurable.
• IP interface per voice LT board
• Upstream packet forwarding:
• Layer 3 forwarding of signaling/media packet at the Voice LT.
• Layer 2 forwarding of signaling/media packet at the IHub.
• Layer 2 forwarding of signaling/media packet from subtending to network side.
• Downstream packet forwarding:
• Layer 2 forwarding of signaling/media packet at the IHub.
• Layer 2 forwarding of signaling/media packet from network to subtending side.
Figure 125 shows the addressing topology for this model.
Figure 125 ISAM Voice : Distributed IP address Architecture - Shared VLAN
topology
SIP UA
Voice LT 1
OAM VLAN
SIP UA
Voice LT K
Shared SIGNALING/VOICE VLAN
Fast-path VRF SIP UA
Voice LT L
NT SIP UA
OAM IP Address
Shared signaling/Voice IP Address
Voice LT X
Subtending
node
• Voice VLAN:
• Configurable.
• Ports associated with this VLAN are the ASAM port(s) connecting the Voice LT, the
network port(s) and the subtending port(s).
• The Voice VLAN terminates at the Voice LT and carries the RTP traffic exchanged
between end users and RTCP traffic.
Distinct IP interfaces for signaling and media traffic at the Voice LT.
• Signaling interface:
• Configurable.
• IP interface per Voice LT board,
• Voice IP address:
• Configurable.
• IP interface per Voice LT board,
Upstream packet forwarding:
• Layer 3 forwarding of signaling/media packet at the Voice LT.
• Layer 2 forwarding of signaling/media packet at the xHub.
• Layer 2 forwarding of signaling/media packet from subtending to network side.
Downstream packet forwarding:
• Layer 2 forwarding of signaling/media packet at the xHub
• Layer 2 forwarding of signaling/media packet from network to subtending side.
Figure 126 shows the addressing topology for this model.
Figure 126 ISAM Voice : Distributed IP address Architecture - Distinct VLAN
topology
SIP UA
SIP UA
SIGNALING VLAN
SIP UA
Voice LT L
VOICE VLAN
NT SIP UA
Voice LT 1
Voice LT K
SIGNALING VLAN
Fast-path VRF
SIP UA
Voice LT L
NT
Voice LT X
Voice LT 1
External OAM VLAN
VOICE VLAN
Voice LT 2
SIGNALING VLAN
Interworking
function Voice LT N
NT
Voice LT 1
External OAM VLAN
SIP UA
SIP UA
NT Voice LT L
OAM IP Address
Shared Signaling/Voice IP Address
SIP UA
Subtending Voice LT X
node
Voice LT 1
External OAM VLAN
SHARED SIGNALING/
MEDIA VLAN
Voice LT 2
Interworking
function Voice LT N
NT
Vo ice LT 1
Exte r n a l O AM v-VPLS
SIP UA
IACM
Vo ice LT K
SIP UA
Vo ice LT L
IHub
NT
Network v-VPLS
SIP UA
Public O AM IP Address
Shared Signaling/Voice IP Address at user v-VPLS
Network IP Address at network v-VPLS
User IP address Vo ice LT X
Subtending IP address
subtending node
• Voice VLAN:
• Configurable.
• Ports associated with this VLAN are the ASAM port(s) connecting the Voice LT
• The Voice VLAN terminates at the Voice LT and carries:
* RTP/RTCP traffic exchanged between end users.
Distinct VLANs for signaling and media traffic at the network side of the fast path
VRF.
Distinct IP interfaces for signaling and media traffic at the Voice LT board.
Distinct subtending VLANs for signaling and media traffic at the user side of the fast
path VRF.
• Signaling/Voice VLAN:
• Configurable.
• Ports associated with these VLANs are the subtending port(s).
• The subtending signaling/Voice VLAN terminates at the Voice LT(s) connected to the
subtending Voice access node and carries:
* SIP signaling traffic exchanged between the SIP server and the SIP UA (Voice
access node).
* RTP / RTCP traffic exchanged between end users
Next Hop IP interface on top of the signaling VLAN at the user side of the fast path
VRF
Next Hop IP interface on top of voice VLAN at the user side of the fast path VRF
Next Hop IP interface on top of the signaling VLAN at the network side of the fast
path VRF.
Next Hop IP interface on top of the voice VLAN at the network side of the fast path
VRF.
Next Hop IP interface on top of the subtending signaling VLAN at the user side of the
fast path VRF.
Next Hop IP interface on top of the subtending voice VLAN at the user side of the fast
path VRF.
Upstream packet forwarding:
• Layer 3 forwarding of signaling/media packet at the Voice LT.
• Layer 3 forwarding of signaling/media packet at the IHub.
• Layer 3 forwarding of signaling/media packet from subtending to network side.
Downstream packet forwarding:
• Layer 3 forwarding of signaling/media packet at the IHub.
• Layer 3 forwarding of signaling/media packet from network to subtending side
Figure 132 shows the routing model.
Exte r n a l O AM v-VPLS
SIP UA
IACM
Vo ice LT K
SIP UA
Network v-VPLS
Vo ice LT L
IHu b
NT
SIP UA
Public O AM IP Address
Signaling IP Address at user v-VPLS
Voice IP Address at user v-VPLS
Public Voice IP Address at network v-VPLS
Vo ice LT X
User IP address
Subtending IP address subtending node
Next Hop IP interface on top of the signaling VLAN at the network side of the fast
path VRF.
Next Hop IP interface on top of the media VLAN at the network side of the fast path
VRF.
Next Hop IP interface on top of the subtending signaling VLAN at the user side of the
fast path VRF.
Next Hop IP interface on top of the subtending media VLAN at the user side of the
fast path VRF.
Upstream packet forwarding:
• signaling/media packet internally relayed from Voice LT to xHub
• Layer 3 forwarding of signaling/media packet at the IHub.
• Layer 3 forwarding of signaling/media packet from subtending to network side.
Exte r n a l O AM v-VPLS
SIP UA
IACM
Vo ice LT K
SIP UA
Network v-VPLS
Vo ice LT L
IHu b
NT
SIP UA
Public O AM IP Address
Signaling IP Address at user v-VPLS
Voice IP Address at user v-VPLS
Public Voice IP Address at network v-VPLS
Vo ice LT X
User IP address
Subtending IP address subtending node
Shared VLAN for signaling and media traffic at the network side of the fast path VRF.
A single IP interface at the user side of the VRF at the xHub
Subtending VLAN shared by signaling and media traffic at the user side of the fast
path VRF
• Signaling/media VLAN:
• Configurable.
• Ports associated with these VLANs are the subtending port(s).
• The subtending signaling/Voice VLAN terminates at the Voice LT(s) connected to the
subtending Voice access node and carries:
* SIP signaling traffic exchanged between the SIP server and the SIP UA (Voice
access node).
* RTP / RTCP traffic exchanged between end users
Next Hop IP interface on top of the signaling/media VLAN at the network side of the
fast path VRF.
Next Hop IP interface on top of the subtending VLAN at the user side of the fast path
VRF.
Upstream packet forwarding:
• signaling/media packet internally relayed from Voice LT to xHub
• Layer 3 forwarding of signaling/media packet at the IHub.
• Layer 3 forwarding of signaling/media packet from subtending to network side.
Downstream packet forwarding:
• Layer 3 followed by Layer 4 forwarding of signaling/media packet from the xHub
to the Voice LT..
• Layer 3 forwarding of signaling/media packet from network to subtending side
Figure 134 shows the routing model.
SHARED SIGNALING/
VO ICE user VLAN
Vo ice LT 1
Exte r n a l O AM VLAN
SIP UA
IACM
Vo ice LT K
SIP UA
Network VLAN
Vo ice LT L
xHu b
NT
SIP UA
Public O AM IP Address
Shared Signaling/Voice IP Address
Public Voice IP Address at network v-VPLS
Vo ice LT X
Subtending IP address
subtending node
H.248 and XLES signaling packets are encapsulated with UDP, IP and layer 2
frames. SIGTRAN signaling packets are encapsulated with SCTP, IP and layer 2
frames. The layer 2 frames are formatted according to Ethernet II format (that is,
using the type field) and VLAN 802.1Q tagged including priority setting according to
IEEE 802.1p.
H.248, SIGTRAN and XLES signaling packets include configured DSCP and .1P
values.
Voice Cluster topology:
• HUB access node : The Z interface is terminated at the Voice LT. User events like
for example hook off, hook on, are converted into XLES/LAPV5 packets which are
sent to the Media Gateway.
• Subtending and remote access node : The Z interface is terminated at the Voice
LT residing at the remote/subtending access node. Information transfer between
the remote/subtending access node and the Media Gateway happens through the
proprietary XLES/LAPV5 protocol.
• The Media gateway in turn converts the internal proprietary XLES/LAPV5 protocol
into Megaco messages sent to the MGC.
Figure 135 H.248 signaling protocol stack - Voice POTS access node as
Switching Device
(Hub) Voice access Voice
XLES XLES
H.248 H.248
LapV5 LapV5
IP IP IP IP IP
L3 IP
Figure 136 H.248 signaling protocol stack - Voice POTS access node as
Routing Device
(Hub) Voice access node
XLES XLES
H.248 H.248
LapV5 LapV5
IP IP IP IP IP IP
L3 IP
Figure 137 H.248 signaling protocol stack - Subtending Voice POTS access
node as Switching Device - HUB Voice access node as Switching
device
Subtending Voice Hub Voice access node
access node
XLES XLES
H.248 H.248
LapV5 LapV5
IP IP IP IP IP
L3 IP
Termination Voice LT IWF IWF Media gateway IWF EMAN Edge Router MGC
Figure 138 H.248 signaling protocol stack - Subtending Voice POTS access
node as Switching Device - HUB access node as Routing Device
Subtending Voice Hub Voice access node
access node
XLES XLES
H.248 H.248
LapV5 LapV5
IP IP IP IP IP IP
L3 IP
Termination Voice LT IWF IWF Media Gateway IWF EMAN Edge Router MGC
Figure 139 H.248 signaling protocol stack - Remote Voice POTS access
node as Switching Device - HUB Voice access node as Routing
Device
Remote Voice Hub Voice access node
access node
XLES XLES
H.248 H.248
LapV5 LapV5
IP IP IP IP IP
L3 IP
Termination Voice LT IWF EMAN IWF Media gateway IWF EMAN Edge Router MGC
Figure 140 H.248 signaling protocol stack - Remote Voice POTS access
node as Switching Device - HUB Voice access node as Routing
Device
Remote Voice Hub Voice access node
access node
XLES XLES
H.248 H.248
LapV5 LapV5
IP IP IP IP IP
L3 IP
IP
Termination Voice LT IWF EMAN IWF Media Gateway IWF EMAN Edge Router MGC
For ISDN BRA terminations, the Media Gateway behaves as the signaling Gateway
(SG). It communicates with the ASP through the SIGTRAN protocol. The D-channel
layer 2 protocol (Q.921) is terminated at the Voice LT. The D-channel layer 3 protocol
(Q.931) is fully transparent to the Media Gateway. Q.931 is encapsulated with
SIGTRAN and fully transparently forwarded to the ASP.
The Voice access node still acts as the MG for the call control in calls involving
B-channels.
Figure 141 ISDN BRA signaling protocol stack - HUB Voice access node as
Switching Device
Hub Voice access node
Q931 Q931
XLES XLES
IUA IUA
Q921 Q921 LapV5 LapV5
IP IP IP IP IP
L3 IP
Figure 142 ISDN BRA signaling protocol stack - HUB Voice access node as
Routing Device
Hub Voice sccess node
Q931 Q931
XLES XLES
IUA IUA
Q921 Q921 LapV5 LapV5
IP IP IP IP IP IP
L3 IP
Q931 Q931
XLES XLES
IUA IUA
Q921 Q921 LapV5 LapV5
IP IP IP IP IP IP
I410 I410 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q
Generic
PHY
802.3 802.3 802.3 802.3 802.3 802.3 802.3 802.3 802.3
Termination Voice LT IWF IWF Media gateway IWF EMAN Edge Router MGC
Figure 144 ISDN BRA signaling protocol stack - Subtending Voice access
node as Switching Device - HUB Voice access node as Routing
Device
Subtending Voice Hub Voice access node
access node
Q931 Q931
XLES XLES
IUA IUA
Q921 Q921 LapV5 LapV5
IP IP IP IP IP IP IP
I410 I410 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q
Generic
PHY
802.3 802.3 802.3 802.3 802.3 802.3 802.3 802.3 802.3
Termination Voice LT IWF IWF Media Gateway IWF EMAN Edge Router MGC
Figure 145 ISDN BRA signaling protocol stack - Remote Voice access node
as Switching Device - HUB Voice access node as Switching
Device
Remote Voice Hub Voice access node
access node
Q931 Q931
XLES XLES
IUA IUA
Q921 Q921 LapV5 LapV5
IP IP IP IP IP IP
I410 I410 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q
Generic
PHY
802.3 802.3 802.3 802.3 802.3 802.3 802.3 802.3 802.3 802.3
Termination Voice LT IWF EMAN IWF Media Gateway IWF EMAN Edge Router MGC
Figure 146 ISDN BRA signaling protocol stack - Remote Voice access node
as Switching Device - HUB Voice access node as Routing Device
Remote Voice Hub Voice access node
access node
Q931 Q931
XLES XLES
IUA IUA
Q921 Q921 LapV5 LapV5
IP IP IP IP IP IP IP IP IP
I410 I410 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q 802.1Q
Generic
PHY
802.3 802.3 802.3 802.3 802.3 802.3 802.3 802.3 802.3 802.3
Termination Voice LT IWF EMAN IWF Media gateway IWF EMAN Edge Router MGC
SIP SIP
UDP/ UDP/
TCP TCP
IP IP IP
L3 IP
Termination SIP User Agent IWF EMAN Edge Router SIP Server
SIP SIP
UDP/ UDP/
TCP TCP
IP IP IP IP
L3 IP
Termination SIP User Agent IWF EMAN Edge Router SIP Server
SIP SIP
UDP/ UDP/
TCP TCP
IP IP IP IP
L3 IP
Termination SIP User Agent IWF EMAN Edge Router SIP Server
SIP SIP
UDP/ UDP/
TCP TCP
IP IP IP IP
L3 IP
Termination SIP User Agent IWF EMAN Edge Router SIP Server
SIP SIP
Termination SIP User Agent IWF EMAN Edge Router SIP Server
SIP SIP
Termination SIP User Agent IWF EMAN Edge Router SIP Server
3%; ,6'1VLS,:)
SIP
4 4 6,3
UDP/
8'3 L3 TCP
7&3 IP IP IP
4 4 IP
,3
802.1Q 802.1Q
T 802.1Q Gen. Gen.
, , 802.3 802.3 PHY PHY
802.3
3%; &$65VLS,:)
SIP
6,3
RTP/ RTP/
RTCP RTCP
UDP UDP
IP IP IP IP
L3 IP
In case the customer decides to make use of the FLAT termination ID format, then
such termination id is to be configured for each of the terminations.
The FLAT termination ID can be provisioned in two different ways:
• By initiating a single “create” command per termination and provisioning the value
for the Flat Termination ID.
• By initiating a batch “create” command for a series of terminations (typically within
the limits of a voice LT board). In this case, the operator doesn't provision a value
for the Flat termination ID parameter. The system autonomously creates the
terminations for a voice LT board and assigns autonomously the value of the Flat
Termination ID, starting from 1 or previously successfully completed “create”
command. and increment it by 1 for every subsequent termination being created.
1 1 0..1
POTS ISDN Signaling Line Id Syntax
LT Board LT Board Gateway 1..2 Profile
Voice
LT Board
1 1
Line Test
Session Voice Server
Parameters 1..1024 1
1 1
1 1
1..72 1
Available
Line Identity Session
1..N
Session
Report
• The classes “SYSTEM”, “NT”, “LT Board” and “Voice Server” reflect the Access
Node, the Network Termination, the Line Termination and Voice server hardware
being involved in the integrated voice service.
The class “Media Gateway” includes the attributes and methods that allow the
provisioning of the H.248 protocol, L2 and L3 network connection and the network
redundancy parameters as well as the quality of service characteristics for the
signaling as well as the voice stream.
The class “H.248 Termination” includes the attributes and methods that allow the
provisioning of the individual POTS or ISDN termination characteristics.
The class “XLES” includes the attributes and methods that allow the provisioning of
the internal Voice cluster signaling characteristics.
The class “Signaling Gateway” includes the attributes and methods that allow the
provisioning of the L3/L4 and network redundancy characteristics of the Assignment
Source Point (ASP).
The Class “Line Id Syntax Profile” includes the attributes and methods that allow the
provisioning of the POTS and / or ISDN termination ID format.
The classes “POTS CDE Profile”, “ISDN CDE Profile” and “Voice Server CDE
Profile” include the attributes and methods that allow the provisioning of the physical
subscriber line, the Z-interface, the tone pattern, the protocols that run at the end
user side and LT board hardware characteristics.
1 0..144 0..1296
Session Timer [1] VSG [1..17]
RW 0..1 1 RW ISDN PRA / CAS R2 POTS
1 TerminationRW TerminationRW
Dial Plan [1..16]
1 0..1 0/1/2
RW
1 1 1
1
1 ISDN PRA / CAS R2 POTS
User Agent [1..16]
1..256 (Max 4K) RW Line Line
96 1920 1
Stats Previous N Stats Previous Stats Previous Stats Configurfed
15 min RO 15 min RO 15 min RO Available Ports RO
1
1 Stats Current 20 Stats Configured
Stats Current
15 min RO 15 min RO UnAvailable Ports RO
3 60 1
Stats Previous Stats Previous Stats Spare Ports
1 day RO 1 day RO RO
1 20
Stats Current Stats Current
1 day RO 1 day RO
1 1
Stats Performance Stats Performance
Info RO Info RO
1 0..144 0..1296
SIP SIP
SIP Service Profile VSG [1..17]
1 RW Termination RW Termination RW
1
0..1 0..1
1 1
1
POTS CDE Profile ISDN PRA / CAS R2 POTS
Line Line
8 48/72
1
1..18
CAS R2
CDE Profile POTS
LT Board
1
1..18
ISDN PRA / CAS R2
LT Board
CDE Profile
ISDN PRA
1 CDE Profile
1..18
Voice
LT Board
LT
Board
NT
NBLT Parameters
[1024] RW
0..N
Vendor Info
[256] RO
NBLT Report
[57600] RO
0..N
Busy Port
[1152] RO
1..N
• The classes “NT” and “LT Board” reflect the Network Termination and the Line
Termination hardware being involved in the integrated voice service.
These classes are not further elaborated in subsequent sections.
The class “Transport Protocols” includes the attributes and methods that allow to
configure the underlying transport protocol for SIP as well as the L4 port to which the
SIP User Agent will listen to for incoming SIP requests.
The class “Registration” includes the attributes and methods that allow to configure
the SIP Register URI and other parameters.
The class “Network Redundancy” includes the attributes and methods that allow to
configure the SIP first hop redundancy parameters, including with the expected SIP
User Agent redundancy behaviour.
The classes “User Agent” and “User Agent Access Point” includes the attributes and
methods that allow to configure the L2/L3 network connection parameters as well as
the QOS settings for the signaling and voice streams.
The class "TCA Threshold " includes the attributes and methods that allow to
configure the alarm crossing threshold per SIP termination.
The class "Stats Configuration" includes the attributes and methods that allow to
configure the performance monitoring parameters.
The class "DHCP Authentication" includes the attributes and methods that allow to
configure the DHCP authentication parameters.
The class "SIP Port State" includes the attributes and methods that allow to display
the SIP termination line/call state.
The classes “POTS Termination”, “ISDN PRA Termination” and “CAS R2
Termination” include the attributes and methods that allow to configure the SIP
POTS / ISDN PRA / CAS R2 termination and its parameters.
The class "Multiple Service Profile" includes the attributes and methods that allow to
display the SIP Service Profiles that are downloaded and activated in the access
node.
The class "DHCP server" includes the attributes and methods that allow to display
the SIP First Hop Server IPaddress/FQDN retrieved via DHCP Option 120.
The class "LSA server" includes the attributes and methods that allow to
enable/disable the LSA server system and to configure the overall system
parameters.
The class "LSA server Instance" includes the attributes and methods that allow to
configure a Local Stand Alone SIP server instance and its parameters.
The class "Per-Port Stats History 15 min" includes the attributes and methods that
allow to retrieve the per-port statistics for the past 96 15-min intervals.
The class "Per-Port Stats Current 1 day" includes the attributes and methods that
allow to retrieve the per-port statistics during the current 1-day interval.
The class "Per-Port Stats History 1 day" includes the attributes and methods that
allow to retrieve the per-port statistics for the past 3 1-day intervals.
The class "Per-Board Stats Current 15 min" includes the attributes and methods that
allow to retrieve the per-board statistics during the current 15-minutes interval.
The class "Per-Board Stats History 15 min" includes the attributes and methods that
allow to retrieve the per-board statistics for the past 96 15-min intervals.
The class "Per-Board Stats Current 1 day" includes the attributes and methods that
allow to retrieve the per-board statistics during the current 1-day interval.
The class "Per-Board Stats History 1 day" includes the attributes and methods that
allow to retrieve the per-board statistics for the past 3 1-day intervals.
The class "Per-Call Stats History 15 min" includes the attributes and methods that
allow retrieving the per-call measured values for the past 96 15-minutes intervals.
The classes "Per-System Stats Configured Available Ports", "Per-System Stats
Configured Unavailable Ports" and "Per-System Stats Spare Ports" include the
attributes and methods that allow to retrieve the degree of allocation of SIP
terminations in the access node as well as the actual service state of the allocated
SIP terminations.
The classes "Per-Port Stats Performance Info" and "Per-board Stats Performance
Info" include the attributes and methods that allow to retrieve the validity and duration
of the measurements done during the several intervals.
The class “ISDN PRA CDE Profile” includes the attributes and methods that allow to
provision the physical subscriber line, the Z-interface (E1), the tone pattern, the
protocols that run at the end user side and the voice LT board HW characteristics.
The class “CAS R2 CDE Profile” includes the attributes and methods that allow to
provision the physical subscriber line, the Z-interface (E1), the tone pattern, the
protocols that run at the end user side and the voice LT board HW characteristics.
Upon the planning of a voice POTS LT board, the Interface Manager auto-creates
the necessary entries (with default values) in the ifTable, ifXTable, ifStackTable,
ifInvStackTable and the asamIfExtTable. The number of voiceFXS interface entries
created in the IF-MIB for a particular voice POTS LT board equals the number of
physical POTS ports available at that same voice POTS LT board.
A voiceFXS interface entry in the IF-MIB cannot be manually deleted by the operator
The VoiceFXS interface entries of a voice POTS LT board become auto-deleted by
the system at the moment the voice POTS LT board gets un-planned
The LinkUp, LinkDown and ChangeOccurred trap is supported for the voiceFXS
interface.
CESoPSN PW CESoPSN PW
Port 1
1
0..1
1
E1 interface
1
1..18
ISDN PRA
CESoPSN
CDE Profile LT Board
CDE Profile
1
1..18
Voice
LT Board
LT
Board
NT
• The classes “NT” and “LT Board” reflect the Network Termination and the Line
Termination hardware being involved in the integrated voice service.
These classes are not further elaborated in subsequent sections.
• The class “Voice LT Board” is an instantiation of the class “LT Board”.
This class is not further elaborated in subsequent sections.
• The class “ISDN PRA LT Board” is an instantiation of the class “Voice LT Board”.
This class is not further elaborated in subsequent sections.
• The class “CESoPSN PW” is an instantiation of the class “E1 Interface”.
The class “CESoPSN PW” is elaborated in subsequent sections.
• The class “CESoPSN CDE Profile” is an instantiation of the class “CDE Profile”.
The class “CESoPSN CDE Profile” is elaborated in subsequent sections.
Only one SIP POTS termination can make an outgoing or incoming call at a time.
While one SIP POTS termination is involved in a call, the other SIP POTS termination
becomes internally blocked, meaning that if that other SIP termination goes off-hook,
then it hears silence (no dial tone is put at that line) and an incoming call for that
internally blocked SIP termination is rejected by the system.
When one of the SIP terminations is involved in a call, an incoming call for the other
SIP termination is rejected with a 486 'Busy Here'.
An incoming call is received only by one SIP termination: only the phone of the SIP
termination whose number has been dialed will ring.
The two POTS phones have different directory numbers, different configurations,
and the prime term will implement the prime termination specific together with the
common configuration while the secondary term will implement the secondary
termination specific configuration.
Operators can configure at maximum 82 SIP POTS terminations at a voice LT board
regardless the mixture of shared line and non-shared line connections.
The registration of the SIP terminations configured on top of a shared subscriber line
as well as the supported services are identical to SIP terminations configured on top
of a non-shared subscriber line, with following exceptions:
• The "Line Power Feeding when not registered" feature is not supported.
• NBLT is not supported for a shared subscriber line.
• Per-Port / Per-call / Per-Board and Per-System PM statistics are not supported at
voice LT boards with shared subscriber lines being configured.
Only one H.248 POTS termination can make an outgoing or incoming call at a time.
While one H.248 POTS termination is involved in a call, the other H.248 POTS
termination becomes internally blocked, meaning that if that other H.248 termination
goes off-hook, then it hears silence (no dial tone is put at that line) and an incoming
call for that internally blocked H.248 termination is rejected by the system.
An incoming call is received only by one H.248 termination: only the phone of the
H.248 termination whose number has been dialed will ring.
The supported services are identical to H.248 POTS terminations configured on top
of a non-shared subscriber line, with following exception:
• NBLT is not supported for a shared subscriber line.
out-dialedprefix- Replace the dialled prefix with out-prefix of calling number Yes No
outprefix Defined as termination-specific rule
Parameters:
<Dialled Prefix>
<Out Prefix>
inc-add-phone- Convert number in 'From' and "phone-context" tag into calling No Yes
context-to- number with a prefix.
number If the calling number in the "From" header is a local or national
number, then add the phone-context value (country code or
country-area code) to the calling number.
The inc-add-phone-context-to-number" rule is only applicable
in case of TEL URI.
inc-short-number- Replace number in 'To' tag by the extension of the called No Yes
len number.
Parameter:
<Short Number
Length>
outg-use-default- Replace the calling number by the 'pilot number' (default PBX Yes No
pbx-number number).
Parameter: Only when the calling party number is invalid and the rule is
<Numeric Value> configured as 'outg-use-default-pbx-number:1', the calling
number is replaced by the default PBX number.
The rules outg-use-default-pbx-number and
outg-add-prefix-in-cpn are Mutual Exclusive, that is, both rules
must not be simultaneously associated with a SIP ISDN PRI
termination created on behalf of an ISDN PRI PBX that
provides a "partial" calling party number.
outg-add-country- Add phone-context to the 'To' tag (number itself is not Yes No
area-code-in-pho changed)
ne-context • For local number, add country-area code in phone context.
Parameters: • For national number, add country code in phone context
<Country Code> • For international number, don't add phone context
<Area Code> parameter.
The rule applies to SIP INVITE requests with the 'TEL URI'
scheme only.
This rule is mutual exclusive with the
'outg-add-domain-name-in-phone-context' meaning that it
cannot be assigned to an ISDN-PRA termination together with
the 'outg-add-domain-name-in-phone-context'.
(1 of 2)
(2 of 2)
When a matching rule is found and executed, the system proceeds with checking for
that particular termination, whether system-wide or termination-specific rules with
other key-phrases might apply.
Overview of the supported CAS R2 system-wide and termination-specific rules:
Table 26 SIP CAS R2: Supported number manipulation rules
inc-short-number- Replace number in 'To' tag by the extension of the called No Yes
len number.
Parameter:
<Short Number
Length>
inc-del-local-coun Remove digits from the calling and called party received in No Yes
try-code-in-cpn order to send it via R2 address signaling. For the calling party
Parameter: number, the "+CC" will be deleted before sending it in the R2
signaling. For the called party number, the number of digits to
<countrycode> be deleted may be more than just "+CC". In some cases, only
the last four digits of the called party are requested to be sent
in the R2 signaling.
outg-add-country- Add digits to the calling party number received via R2 address Yes No
area-code-in-cpnt signaling in order to populate the appropriate headers in SIP
Parameters: with a full E.164 number. Since the subscriber number format
has a fixed length the provisioning will be restricted by defining
<Country Code> if the received number will be appended with "+CC" or "+CC
<Area Code> Area Code".
One Media Gateway is active while the other runs in standby mode. In case the
active Media Gateway encounters a hardware or a software problem, the standby
Media Gateway takes over and becomes the active Media Gateway for the voice
cluster.
Upon switchover, the recovery time is less than 7 s for call signaling and less than 3
s for voice traffic.
Stable calls are not lost during the switchover. Non-stable calls, that is, calls in the
set-up phase may be lost due to a Media Gateway switchover. This applies to both,
POTS and ISDN BRA calls.
The system autonomously notifies the operator about control association changes
via SYSLOG notifications.
A SYSLOG notification is sent upon:
• The control association being lost due to:
• Timer expiry
• Heartbeat expiry
• The control association being administratively locked by the operator.
• The control association being disconnected due to a handoff, forced, graceful
service change method initiated by MG / MGC or disconnect service change
method initiated by the MG.
• The control association being established with the MGC
A failure of the current control association may be detected as described hereafter:
• Upon no reply received on a transaction request initiated by the MG:
Megaco Integrated Voice Service allows to provision the maximum number of
retries per transaction together with the retry mode. The latter being either the
fixed retry interval mode or the increasing retry interval mode. In the latter case,
the retry interval doubles for each subsequent retry.
• Through the support of the Inactivity Timer package:
The purpose of this package event is to allow the MG to detect periods of silence
of messaging from the MGC. Once the period of silence exceeds a threshold, the
MG assumes a control connection failure with that MGC.
• Active Heartbeat mode:
The MG checks the connectivity with the MGC at regular time interval by means of
the “notify” package. The following modes are supported:
- Configured heartbeat interval: The interval by which the “notify” packages are
initiated by the MG is provisioned.
- Learnt heartbeat interval: The interval by which the “notify” packages are initiated
by the MG is learnt from the “Inactivity Timer” package notification of the MGC.
The system decides upon a failure of the current control association from the moment
7 subsequent “notify” packages were not replied by the MGC.
A “Notify” package is sent on the condition that no other Megaco message is received
from the MGC within the learnt/configured heartbeat interval.
• Passive Heartbeat mode:
The MGC checks the connectivity with the MG at regular time interval by means of
the “audit” package. The following modes are supported:
- Configured heartbeat interval: The interval by which the “audit” packages are
initiated by the MGC is provisioned.
- Learnt heartbeat interval: The interval by which the “audit” packages are initiated by
the MGC is dynamically learnt by the MG. The MG awaits 3 consecutive “audit”
packages from the MGC to calculate the heartbeat interval.
The system decides upon a failure of the current control association from the moment
8 subsequent heartbeat intervals have passed without receiving neither an “audit”
nor a regular Megaco package from the MGC.
H.248 control
associaon
Site 1 10.190.28.36:2944 Site 2 10.190.28.56:2944
LOCAL Redundancy
ALU MSAN
10.190.19.54:2944 10.190.19.54:9900
Network Geo-Redundancy implies the provisioning, at the Voice access node side,
of :
• One MGC per GEO site.
Each GEO site supports network local redundancy, this is an active and standby
MGC per site sharing the same IP address.
And :
• A single ASP per GEO site.
At the network side, both instances of the MGC together with both instances of
the ASP share the same IP address.
Upon MGC / ASP switch-over, the Integrated Voice service supports preservation of
stable calls on the condition that a MGC / ASP becomes active prior to recovery timer
T(r) expiry.
New POTS / ISDN calls cannot be established during the time period that the
recovery timer T(r) is running.
A network local redundancy MGC switch-over is triggered by the MGC and is fully
transparent to the MG, while a GEO switch-over can be triggered by both, the MGC
as well as the MG and is not transparent to the MG.
A network local redundancy / GEO redundancy ASP switch-over is always triggered
by the ASP and neither the Local redundancy nor the GEO redundancy ASP
switch-over are transparent to the MG (Voice access node).
Usually the following scenario is followed:
• Upon ASP/SCTP switch-over, the new active SCTP instance initiates an SCTP
INIT to the MG.
• Upon the receipt of such SCTP-INIT, the MG starts the recovery timer T(r), does
not remove any termination context and starts queuing Q.931 messages for
terminations involved in a stable ISDN call (Q.931 messages from terminations
involved in calls that have not reached the stable phase are NOT queued).
• In compliancy to RFC4233, the recovery timer T(r) can be configured to a value
in the range 1 - 5 s in the CDE profile
• The MG is able to buffer Q.931 messages for up to 564 stable ISDN calls with the
restriction that only the most recent Q.931 data message is queued.
• Upon the receipt of “ASP active” notification, prior to T(r) expiry, all the buffered
Q.931 messages are sent to the active ASP. The MG gradually forwards the
messages to the new active ASP as to avoid ASP overload.
• Should the recovery timer expire prior to the receipt of an ASP active notification,
then the Voice access node turns the signaling gateway status to operational
down, drops the queued Q.931 messages, removes all ISDN termination contexts
and sends Service Change “904” for all ISDN terminations
Site X
10.190.28.36:2944
MGC MGC
Acve Standby
H248
Control
Associaon
ALU MSAN
10.190.19.54:2944
ASP ASP
Acve Standby
SCTPLNK1 SCTPLNK2
ALU MSAN
10.190.19.54:9900
Switch-over
H248
Control
Associaon
ALU MSAN
10.190.19.54:2944
SCTPLNK2 SCTPLNK3
SCTPLNK4
SCTPLNK1
ALU MSAN
10.190.19.54:9900
The capability of the ESA-MGC to poll only one MGC or multiple MGCs does not
have any impact on the access node in its capacity as MG. This may only influence
the time period after which the usual voice service can be resumed.
In normal H.248 operation, this internal DN will not be used, just the subscriber
termination identifier.
Working in Co-Located ESA mode, one local port connected to the voice access
node can be configured to receive emergency calls during isolation. The following
points must be considered when working in Co-Located ESA mode:
• Only basic calls are considered under this functionality. Ssupplementary services
are not provided during Co-Located ESA mode activation. .
• This functionality is applicable for POTS services. Integrated Services Digital
Network (ISDN) is not supported in Co-Located ESA mode.
• Co-Located ESA is only supported for local user ports. User ports located on
remote units that are hubbed into the voice access node via VoIP hubbing
functionality are not covered by the Co-Located ESA feature.
I-CSCF HSS
The SIP User Agent supports the interworking with a group of “first hop SIP servers”
that form a SIP server redundancy group and whereby all SIP servers get assigned
a different priority. The SIP server with the highest priority acts as the primary SIP
server, while the rest of the SIP servers act as secondary SIP servers. A “first hop
SIP Server” is to be understood as the SIP Server being selected by the SIP User
Agent to send the initial REGISTER/INVITE requests. Such SIP server redundancy
group consist of a primary and one or multiple secondary SIP servers.
A SIP server redundancy group can be provisioned by means of:
• A Domain Name whereby the IP address of the individual SIP servers must be
resolved through the Domain Name Service NAPTR, SRV and A resource record
look-up,
• A list of Fully Qualified Domain Names whereby the IP address of the individual
SIP servers must then be resolved through the Domain Name Service A resource
record look-up,
• A list of IP addresses of the individual SIP Servers.
The SIP User Agent triggers autonomously a SIP server Fail-over upon the failure of
the actually selected first hop SIP server. A failure is to be understood as a situation
where a reply is no longer received for an out-of-dialog SIP request or the receipt of
an unsuccessful response code to an out-of-dialog SIP request. In the course of a
SIP Server Fail-Over, the SIP terminations that are currently registered via the failing
SIP server are moved to another SIP server within the same redundancy group.
The SIP server Fail-over trigger default conditions can be customized by means of
SIP Service Profile provisioning.
Once the failed primary SIP server is back in service, the SIP User Agent triggers
autonomously a SIP server Fail-back. In the course of a SIP server Fail-back, the SIP
terminations that are currently registered via a secondary SIP server are moved to
the primary SIP server within the same redundancy group.
The SIP server fail-back is performed gracefully meaning that the SIP User agent
triggers a fail-back for a SIP termination from the moment it has the on-hook state.
Neither ongoing dialogs nor ongoing transactions are interrupted.
Neither for the SIP server Fail-over nor for the SIP server fail-back ongoing dialogs
and transactions are transferred to the selected fail-over / fail-back SIP server, and
this neither at the signaling plane (SIP) nor at the media plane (RTP).
Once it has been detected that the currently addressed SIP server has failed, the SIP
User Agent triggers a fail-over. Subsequently, the auto-server-failover timer is
started and the SIP User Agent registers the POTS SIP terminations that are in "idle"
state to a newly selected SIP server (Might be the SOS SIP server).
The POTS SIP terminations involved in an ongoing call at the moment the fail-over
is triggered, 'remain connected' to the original signaling and media path and the RTP
traffic will be maintained along that original media path till a subscriber or protocol
event is detected that results in the call to be terminated or the auto-server-failover
timer expiry.
The fail-over for these POTS terminations is until the call has completed or the
auto-server-failover timer has expired.
For SIP Server Fail-over and Session-Refresh, if the session-refresh service is
enabled and in case a fail-over is triggered, the session-refresh timer (if any) will be
restarted and auto-server-failover timer is started.
• Case 1: the session-refresh timer expiry happens prior to the auto-server-failover
timer expiry:
• Upon the session-refresh timer expiry and being the 'refresh' TX-side:
the SIP user agent sends a re-invite/update.
• Upon the session-refresh timer expiry and being the 'refresh' RX-side:
the SIP user agent releases the call immediately.
• If calls (established via the failed SIP server) are no longer ongoing, the
auto-server-failover timer is stopped.
• Case 2: the auto-server-failover timer expiry happens prior to the session-refresh
timer expiry:
• Upon the auto-server-failover timer expiry, the ongoing call(s) (established via the
failed SIP server) are immediately released and the session-refresh timer is stopped.
Foreground Service Health Monitoring helps the SIP User Agent to rapidly detect
whether the currently selected first hop SIP server can still be addressed for new SIP
requests. Foreground Service Health Monitoring makes use of either the SIP
REGISTER or the SIP OPTIONS Method.
• In case the SIP register method applies, one termination out of the group of
terminations re-registers with a configurable high frequent interval (typically 90 s)
while the rest of the terminations re-register with the usual frequency. The group
of terminations must have the following in common (SIP Termination Group):
• These SIP terminations get the same service route returned upon successful
registration
• These SIP terminations addressed the same First Hop SIP server for their initial
registration.
• In case the SIP options method applies, the SIP User agent will periodically send
(period typically equals 90 s) a SIP options request to the active SIP first hop
server.
Passive Heartbeat
As opposed to Foreground Service Health Monitoring, the main purpose of the
Passive Heartbeat is to help the SIP first hop server to rapidly detect whether a SIP
user Agent can still be addressed for new SIP requests.
When Passive Heartbeat is enabled, the SIP User Agent must reply to the SIP
OPTIONS request that is periodically sent by the SIP first hop server.
The Passive Heartbeat interval configured at and used by the SIP first hop server can
also provisioned at the access node side.
By watching the regular receipt of a SIP OPTIONS request from the SIP first hop
server, the SIP User Agent is able to detect whether the SIP first hop server is still
up and running.
In order to allow the SIP User Agent to distinguish accidental from persistent error
conditions and as such to prevent connection toggling between first hop SIP servers
within a redundancy group, a Fail-over Hysteresis Threshold can be configured.
A SIP Server Fail-over is triggered from the moment the amount of error conditions
has exceeded the Fail-Over Hysteresis Threshold.
Stable Operation Observation Period
Stable operation observation intends to observe the stability of the SIP server once
this SIP server has resumed service after having failed.
Should an observed SIP server remain uninterrupted in-service from the start till the
expiry of the (configurable) stable operation observation period, then this SIP server
is declared stable and ready to be a fail-over / fail-back candidate SIP server.
The stable-operation observation starts from the moment a failed SIP server has
resumed operation, detected by the SIP User Agent via the background service
health monitoring.
Deliberate Update
For reason of maintenance activities, a SIP server may be temporarily put out of
service. To avoid service interruption, the SIP UA allows to announce such upcoming
activity by an update of the list of SIP servers being part of a redundancy group:
• Update of DNS zone file
• Update of list of SRV resource records
• Update of list of A resource records
• Update of IP address in an A resource record
• Update of the SIP server table
In case such update is recognized by the SIP User Agent and the removed SIP
server is a SIP server via which SIP terminations are registered, then the SIP User
Agent will transfer the SIP terminations to the highest priority SIP Server still present
in the list.
A Deliberate Update is performed gracefully meaning that the SIP User agent
triggers a fail-over for a SIP termination from the moment it has the on-hook state.
Neither ongoing dialogs nor ongoing transactions are interrupted.
(De-)Registration at Fail-Over / Fail-Back / Deliberate Update.
By means of pre-configuration in the SIP Service Profile, the following behaviour is
possible upon fail-over, fail-back or deliberate update:
• Upon fail-over, whether or not de-registration of a SIP termination is required to
the NEWLY selected SIP first hop server prior to the initial registration of that
same SIP termination to the NEWLY selected SIP first hop server.
• Upon fail-over, whether or not an initial registration of a SIP termination is required
to the NEWLY selected SIP first hop server.
I-CSCF HSS
I-CSCF HSS
The SIP User Agent supports the interworking with a first hop Geo-redundant SIP
server topology.
A Geo-redundant SIP server topology can be provisioned by means of:
• The Domain Names of the geo primary and geo back-up site whereby the IP
address of the individual SIP servers of these sites must be resolved through the
Domain Name Service NAPTR, SRV and A resource record look-up,
• A list of Fully Qualified Domain Names for both the geo primary and the geo
back-up site whereby the IP address of the individual SIP servers must then be
resolved through the Domain Name Service A resource record look-up,
• A list of IP addresses of the individual SIP Servers for both the geo primary and
the geo back-up site.
The SIP User Agent triggers a Geo Fail-Over / Geo Fail-Back upon explicit request
of the operator. See the related documents for detailed information and the detailed
command definitions for initiating such Geo Fail-Over / Geo Fail-back (ISAM
Operations and Maintenance Guide Using CLI).
The SIP User Agent supports manually triggered GRACEFUL GEO Fail-over /
Fail-Back, meaning that a SIP termination is individually moved to the GEO Back-Up
/ Primary site on the condition that the SIP termination has the call state “on-hook”.
For any other call state, the system will defer the GEO Fail-Over for this SIP
termination till the call state has become “on-hook”.
The SIP User Agent supports manually triggered FORCED GEO Fail-over /
Fail-Back, meaning that all ongoing dialogs and transactions are immediately
aborted and that all SIP terminations become immediately moved to the GEO
Back-up / Primary site (The system does not await the “on-hook” call state of the SIP
termination to perform the GEO Fail-over / Fail-Back).
Neither in the graceful, nor in the forced GEO Fail-over / Fail-back, ongoing dialogs
and transactions are transferred, and this neither at the signaling plane (SIP) nor at
the media plane (RTP).
I-CSCF HSS
ESA redundancy
The SIP User Agent triggers an autonomous ESA Fail-Over at the moment that the
connectivity with the ESA Primary Site has completely been lost (none of the First
Hop SIP servers at the ESA primary sites are still addressable).
A SIP termination is individually moved to the ESA Back-Up site on the condition that
the SIP termination is not involved in a stable call. For any other call state, the system
will defer the ESA Fail-Over for this SIP termination till the call state has become
“on-hook”.
The SIP User Agent does not support the DNS location service for the ESA Back-up
site.
The SIP User Agent triggers an autonomous ESA Fail-Back at the moment that at
least one of the SIP servers located at the ESA Primary Site can again be addressed.
A SIP termination is individually moved to the ESA Primary site on the condition that
the SIP termination has the call state “on-hook”. For any other call state, the system
will defer the ESA Fail-Back for this SIP termination till the call state has become
“on-hook”.
The SIP User Agent does not transfer neither ongoing dialogs nor ongoing
transactions to the ESA Primary / Back-up site, and this neither at the signaling plane
(SIP) nor at the media plane (RTP).
• The LSA SIP server supports the POTS / ISDN PRA basic call service amongst
subscribers registered to the LSA SIP server regardless of their usual "home"
Service Gateway.
• The ISDN PRA service supports Direct In-Dialing when running in LSA mode. The
SIP User Agent includes the PUID list that was received from the register server
at the moment the SIP ISDN PRA termination did register to the usual register
server, in the registration request that is sent to the LSA server-LSA mode.
For the LSA SIP server hosted at a virtual voice packet server board:
• The LSA SIP server is supported for a single NE, for a HUB + subtending topology
as well as for a clustered topology, that is several NEs associated with a single
LSA SIP server hosted in a particular NE of that cluster.
• The LSA SIP server is hosted at a the virtual voice packet server board planned
on top of the multi-core NT in the NE. At most 1 LSA SIP server can run at the NE.
• Configuration of the LSA SIP server happens via the common CLI/SNMP agent
present at the NT board.
• The LSA SIP server supports the POTS / ISDN PRA basic call service amongst
subscribers registered to the LSA SIP server regardless of their usual "home"
Service Gateway.
• The ISDN PRA service supports Direct In-Dialing when running in LSA mode. The
SIP User Agent includes the PUID list that was received from the register server
at the moment the SIP ISDN PRA termination did register to the usual register
server, in the registration request that is sent to the LSA server-LSA mode.
A SIP User Agent and its SIP terminations can connect to a LSA SIP server on the
condition that it gets authorized by the LSA SIP server. Authorization will be allowed
when the Lsa-md5-realm and lsa-md5-password are configured with the same value
as the SIP User Agent and the LSA SIP server.
The LSA SIP server periodically monitors the terminations registered at the LSA SIP
server and checks whether the termination register period has expired. If expired, the
termination is removed from the LSA register table.
Once the SIP UA has connected to the LSA SIP server, it keeps on polling the usual
SIP server pool with a frequency that allows to detect as soon as possible the
availability of the usual SIP server. This polling happens on a per individual Service
Gateway and on a per individual voice LT board / SIP UA basis.
The SIP UA decides to make a fail-back to the usual SIP server pool, from the
moment one of the SIP servers of the usual SIP server pool is again reachable and
in service.
A SIP termination is subject for fail-back from the moment it is in "idle" state. Ongoing
dialogs and transactions are not transferred to the usual SIP server, and this neither
at the signaling plane (SIP) nor at the media plane (RTP).
It is possible to enable/disable the LSA SIP server and to configure its properties and
attributes by means of the usual CLI/SNMP management interface and this on a per
individual Service Gateway.
LSA server redundancy is not supported.
The LSA SIP server is able to establish a basic call amongst SIP Terminations for
which their SIP UAs are connected via different signaling VLANs to the LSA server.
For SIP terminations usually assigned to different Service Gateways and these
Service Gateways are configured with different media VLANs, once these SIP
terminations are registered to the LSA SIP server, it is possible to establish a basic
call amongst these SIP terminations and exchange media traffic amongst them.
In order to allow subscribers of different Service Gateways to speak to each other via
a call established by a LSA SIP server, a common Media VLAN is to be configured.
SIP POTS voice service: LSA Emergency Call Support
ISAMV supports emergency call treatment when running in LSA mode, that is, the
Local Stand-Alone server is able to detect and accept Emergency Calls with
Emergency or Priority Header in SIP.
Overall configuration approach:
• At most 4 emergency entries can be configured per VSG.
• An emergency entry allows to configure both an emergency number and the
emergency service center to which a call for this emergency number can be
routed.
The PUID list will be deleted in case the associated SIP ISDN PRA termination is
deleted or in case of LT board HW replacement.
The class “LSA Server System” includes the attributes and methods that allow to
configure LSA server system attributes: country code, area code and position of the
LSA server in the NE.
The class “LSA Server Instance” includes the attributes and methods that allow to
configure the several LSA server instances together with their attributes: Signaling
IP address, Port, VLAN and Gateway, associated VSG, MD5 realm and password.
The class “LSA Emergency Service” includes the attributes and methods that allow
to configure the emergency number together with its emergency service provider.
For those ISDN PRA / CAS R2 terminations, for which a call is ongoing at the
moment the fail-over is triggered:
• The B-channels involved in the ongoing calls 'remain connected' to the original
media path and the RTP traffic will be maintained along that original media path
till a subscriber or protocol event is detected that results in the call to be
terminated or till the timer expiry.
• Upon the expiry of the auto-server-failover timer, a forced SOS fail-over is
triggered, that is, the PBX is requested to release the ongoing calls and
subsequently the B-channels that became idle are associated with the SOS SIP
server.
• New calls can only be established via the idle B-channels that are associated with
the SOS SIP server.
Regarding the ISDN PRA / CAS R2 SIP terminations for which a call is ongoing at
the moment the fail-back is triggered:
• The fail-back for these ISDN PRA / CAS R2 SIP terminations is postponed.
• These ISDN PRA / CAS R2 SIP terminations remain registered to the SOS SIP
server till a subscriber or protocol event is detected that results in the call to be
terminated, that is, the ISDN PRA / CAS R2 SIP termination becomes 'idle' or till
the auto-server-failback timer expiry.
• Upon the expiry of the auto-SOS-failback timer, a forced SOS fail-back is
triggered, that is, the PBX is requested to release the ongoing call and
subsequently the ISDN PRA / CAS R2 SIP termination is registered to SIP server
that is back in service.
An overload situation is reached when the board that hosts the Voice Service
application runs at 100% of its CPU capacity. In such a situation, the received
Megaco packets get a priority treatment; Received Line events (off-hook, on-hook,
flash-hook, dialed digits…) run the risk to be ignored. This depends on the
robustness level being applicable at that moment:
• Robustness Level 1: reached when the board that hosts the Voice Service
application remains running at 100% of its CPU capacity during the next 40
seconds.
• A Megaco “ADD” command being received from the MGC is replied with error 510
(Insufficient Resources).
• Any incoming “auditvalue” or “auditcapability” command is discarded (this includes
the “heartbeat” audit too).
• Robustness level 2: reached when the board that hosts the Voice Service
application runs in Level 1 mode and remains running at 100% of its CPU capacity
during the next 160 seconds.
• Any new Megaco command (Add, Modify, Subtract, Move, AuditValue,
AuditCapabilities and ServiceChange) being received from the MGC is discarded by
the Voice server.
• Intra voice subsystem polling intervals are enlarged (This also includes the intervals
to establish / maintain the XLES connection with the voice LT boards)
• Commands been received from the MGC but not yet replied by the Voice server, are
treated with long timer timeout; no “pending” will be sent for those transactions.
• Robustness level 3: reached when the board that hosts the Voice Service
application runs in Level 2 mode and remains running at 100% of its CPU capacity
during the next 320 seconds.
• The Voice server initiates a board reset.
Outgoing Megaco packets as well as outgoing internal signaling (XLES) packets
remain treated as is the case when the Voice server runs in a non-overload situation.
MG Control Overload package
An additional overload mechanism based on CPU load monitoring and in line with
H.248.11 (MG Control Overload Package) is implemented (ocp).
This package protects an MG from processing overload that prevents the timely
execution of Megaco transactions.
The MGC, supporting the MG Control Overload Package, adaptively throttles the
rate it sets up calls to maximize the MG's effective throughput whilst bounding its
response times
It does this by throttling the rate at which transactions that set-up new calls or that
new call legs are sent to the overloaded MG, so the rate of overload notifications
which the MGC receives from the overloaded MG converges to a suitably low level.
To prevent a toggling between CPU-overload and end-of-CPU-overload, an (End of)
Overload Persistency Time has been introduced.
The Overload Persistency Time is the time period the CPU load of the Voice access
node Server must exceed the High-Water-Mark before it can enter the CPU overload
state.
Similarly, the End of Overload Persistency Time is the time period the CPU load of
the Voice access node Server must be below the Low-Water-Mark before it leaves
the CPU overload state.
The End of Overload Persistency Time is set larger than the Overload Persistency
time to ensure that the CPU load is for a sufficient long time below the
Low-Water-Mark as not to immediately cause a new CPU overload situation.
• CPU load monitoring:
• Monitors the overall CPU load of the board that hosts the Voice Service application
by measuring the run time of the IDLE task.
• Informs registered software applications in case of overload detection
• Upon being notified of an overload situation, the software application takes action to
reduce the load.
• CPU load monitoring parameters (not configurable):
• High water (percentage): 95% (5% IDLE task)
• Low water (percentage): 93% (7% IDLE task)
• Overload persistency (time): 2000 ms
• End of overload persistency (time): 3000 ms
* Sample interval (time): 1000 ms (each sample period, the CPU load as a function
of the time given to the idle task) is measured)
• Upon the receipt of Overload-condition notification, the Voice server takes the
following actions:
• If requested by MGC and after having received and replied to a Megaco “ADD”
command, report the ocp/mg_overload event (irrespective of the events reporting
settings being configured in the H.248 MIB.
• If not requested by the MGC, reports the ocp/mg_overload event if the MG-Overload
event is enabled in the H.248 MIB (after having received and replied to a Megaco
“ADD” command).
• Raise the MG-Overload alarm.
• Upon the receipt of Overload-condition-Ended notification, the Voice server takes
the following actions:
• Stop the reporting ocp/mg_overload event.
• Clear the MG-Overload alarm
Limiting the total number of simultaneous active transactions at the board that hosts
the SIP User Agent has proven to be an effective way to safeguard the system. By
introducing a Maximum Transaction Limit (MaxTx), the board that hosts the SIP User
Agent becomes protected against consuming all the available system resources
when high loads of incoming SIP traffic need to be processed.
The MaxTx value is an internal system dimensioning parameter set by ALU in
accordance with the engineered capacity of the system. However, if MaxTx Limit is
reached, the system does not simply react by gently rejecting all new, incoming,
out-of-dialog SIP requests by sending a 503 “Service Unavailable” response
including a Retry-After header.
Instead, the following rules were incorporated as a local prioritization policy when
applying the MaxTx Limit:
• Requests for ongoing sessions have priority over requests that setup a new
session.
• Response messages are not be targeted by overload protection.
• Requests that relieve stress from the system are not targeted by overload
protection mechanisms
• Outgoing calls/requests are not subjected to MaxTx
The following incoming SIP requests are considered “priority” requests:
• Session refreshes (in-dialog INVITE requests with Session-Expires header)
• in-dialog requests such as BYE, PRACK, UPDATE and INFO
• CANCEL requests
• out-of-dialog OPTIONS requests (typically used for heartbeat/polling)
Total Tx Limit
margin Zone 2
MaxTx limit
Zone 1
time
• Zone 1: Incoming traffic stays below Max Tx Limit: All incoming SIP requests are
accepted
• Zone 2: Incoming traffic rises above MaxTx but below Total Tx Limit: All
low-priority SIP requests are rejected with a 503 Service Unavailable response;
High priority requests are still handled
• Zone 3: Incoming traffic reaches Total Tx Limit: No more SIP transactions
available in the system; All incoming SIP requests are rejected with a 503 Service
Unavailable response
When the "Multiple Service Gateway" license key is enabled, the license limits the
number of SIP terminations that can be created in the customer's voice network.
The SIP termination configuration threshold is watched by means of a network wide
threshold counter calculated by the 5520 AMS.
The license counter is maintained per access node (shelf) and counts the number of
SIP terminations configured at the access node (shelf).
The 5520 AMS retrieves periodically the individual access node counters and checks
whether the network wide license threshold has become exceeded.
Should the license threshold be exceeding, a license violation alarm will appear at
the 5520 AMS screen.
The license violation alarm cannot be cleared and it keeps appearing on the AMS as
long as the license threshold remains exceeded.
When the "LSA server" and/or "LSA emergency call service" license key is enabled,
the license limits the number of SIP terminations (POTS, ISDN PRA and CAS R2)
that can be created in the customer's voice network.
The SIP termination configuration threshold is watched by means of a network wide
threshold counter calculated by the 5520 AMS.
The license counter is maintained per access node (shelf) and counts the number of
SIP terminations configured at the access node (shelf).
The 5520 AMS periodically retrieves the individual access node counters and checks
whether the network wide license threshold has become exceeded.
Should the license threshold be exceeded, a license violation alarm will appear at the
5520 AMS screen.
The license violation alarm cannot be cleared and it keeps appearing on the AMS as
long as the license threshold remains exceeded.
For VoIP to be deployed so that users receive an acceptable level of voice quality,
VoIP traffic must be guaranteed certain compensating bandwidth, latency, and jitter
requirements. QOS ensures that VoIP voice packets receive the preferential
treatment they require.
P-bit marking (layer 2) and DSCP marking (layer 3) for signaling and voice (including
fax and modem) traffic are supported.
The p-bit as well as the DSCP values are configurable for signaling and voice traffic
Option Name
1 Subnet-Mask
3 Router
(1 of 2)
Option Name
6 Domain Name Server
81 Client FQDN
82 Client ID (1)
90 Authentication
120 SIP Servers
(2 of 2)
Note
(1) The insertion of Option 82 by the DHCP client at the voice LT board can be enabled/disabled through
configuration.
Only the sub-option “Remote-ID” is supported.
The content of the “Remote-ID” is configurable. The default value equals the Physical LT Board-ID i.e.
rack/shelf/slot.
(2) The routes specified in the option 121 are installed, except if specified in the Local Subnet Routes section.
Both the classless static route option (option 121) and the Router option (option 3) can be in the DHCP
Parameter Request List.
If the DHCP server returns both option 121 and option 3, option 3 must be ignored.
In the latter case, either the Domain Name or the Fully Qualified Domain Name
(FQDN) must be specified to allow the system to resolve the related IP address by
making use of the Domain Name Service.
To resolve Domain names and/or Fully Qualified Domain Names, the Integrated
Voice service supports the NAPTR, SRV and/or A resource record look-up to
recursive Domain Name Servers.
To support the Domain Name Service for GEO redundant network topologies, the
ISAM allows to provision a separate list of DNS servers for the Geo Primary and the
Geo Back-up site.
The ISAM caches the retrieved NAPTR, SRV and A resource records for a period
equals
{MIN {DNS Purge Time; MIN of [NAPTR,SRV,A] TTL values for a particular DN}}
whereby the provisionable DNS Purge Timer allows to limit the TTL value, should
some of the resource records own an excessively long TTL value.
In order to reduce the call set-up elapse time and/or to reduce the burden on the
network, where possible, the DNS Resolver limits the number of DNS queries to a
strict minimum. This is achieved by supporting the “additional section” in the DNS
server reply.
NT board Signaling
NT board IP address Voice
XLES server
IP address
IWF Voice IWF Voice
Voice LT IP address IP address Voice LT
board L2 board
aggregation
network
NT board NT board
L3
aggregation
network
IWF Voice IWF Voice
Voice LT IP address IP address Voice LT
board board
NT board Signaling
NT board IP address Voice
XLES server
IP address
IWF Voice IWF Voice
Voice LT IP address IP address Voice LT
board L2 board
aggregation
network
NT board NT board
L3
aggregation
network
IWF Voice IWF Voice
Voice LT IP address IP address Voice LT
board board
MGC ASP
SoftSwitch
When EPF is enabled, all voice traffic that originates from a voice termination point
A connected to the Voice access node and destined to a voice termination point B,
either connected to the same Voice access node, or connected to a Voice access
node that subtends to the former Voice access node, or connected to a Voice access
node that together with the former Voice access node subtends to the same Hub
Voice access node, is forwarded in upstream direction to the external device as
being pointed to by the configured IP address prior to the downstream forwarding to
the destined voice termination point.
Local ISAM Voice RTP traffic switching:
To allow the support of the External Packet Forwarding facility, the RTP traffic will
always be switched along the IHub, even if the 2 voice terminations among which the
RTP traffic is to be exchanged are connected to the same voice LT board.
This RTP switching model applies to the SIP Centralised Model only.
(SIP Distributed model: when RTP traffic is to be exchanged among 2 voice
terminations connected to the same voice LT board, the RTP traffic is switched
internally at the voice LT board.)
Restrictions:
1 The External Packet Forwarding facility is supported on all equipment practices.
2 The External Packet Forwarding facility is supported on the HUB and Subtending
Voice access nodes.
3 The External Packet Forwarding facility is supported for the SIP Centralized
model only.
4 The External Packet Forwarding facility is supported on VLANS of type
“Voice-VLAN”/V-VPLS.
5 The External Packet Forwarding facility supports L2 aggregated network links
through static L2 aggregation group configuration.
6 The External Packet Forwarding facility supports L2 aggregated network links
through LACP.
7 The External Packet Forwarding facility supports xSTP.
8 The External Packet Forwarding facility is supported for POTS as well as for
ISDN PRI.
9 The External Packet Forwarding facility is supported in case the Voice Access
node connects directly or by means of (an) intermediate Voice access node(s) to
the external EPF device by means of a L2 switching network.
10 The External Packet Forwarding facility shall only be enabled for the VLAN that
carries the RTP traffic (might be a VLAN sharing both RTP and signaling traffic).
11 The External EPF device must allow to disable the ICMP Redirect facility.
Figure 176 SIP Integrated Voice Service - Switched device - External Packet
Forwarding enabled
Remote node Main node
NT board NT board
NT board NT board
L3
aggregation
network
IHub Voice IHub Voice
Voice LT IP address IP address Voice LT
board board
Figure 177 SIP Integrated Voice Service - Switched device - External Packet
Forwarding disabled
Remote node Main node
NT board NT board
NT board NT board
L3
aggregation
network
IHub Voice IHub Voice
Voice LT IP address IP address Voice LT
board board
MGC ASP
SoftSwitch
S-VLAN
Capturing
ISAM Voice
device
L2
S-VLAN Aggregation S-VLAN
Network
Capturing
ISAM Voice
device
In order for the integrated voice service to work correctly, the same software package
must be downloaded to all Voice access nodes of a Voice cluster, that is, in particular
with focus on the integrated voice service, the software (maintenance) release on the
voice LT boards must be the same as the software (maintenance) release on the
Voice server and this for the complete Voice cluster.
The same applies within one Voice access node. Only one software (maintenance)
release can be active at a Voice access node at the same time.
This implies that all Voice server pairs in the hub Voice access node must run the
same software (maintenance) release. As a consequence, for the integrated voice
service to work, all Voice access nodes within the same upgrade/migration cluster
must be on the same software (maintenance) release.
The above rules imply that for both a software upgrade and a software migration, the
upgrade/offline migration procedure for the full upgrade/migration cluster must be
completed in a single maintenance window.
The main logical steps to be taken in the H.248 to SIP functional migration are:
1 Configure the SIP voice database
2 Check the ongoing calls and the emergency calls for graceful shutdown
3 Lock the H.248 MGI interface
4 Disconnect the Voice server at L2 from the voice LT boards
5 (re-)Configure the L2/L3 topology to run in SIP mode
6 Unplan the voice LT boards (configured with capability profile = H.248-profile)
7 Replan the voice LT boards with capability profile = SIP-profile
8 Reload the voice LT board with the SIP software package
9 Perform a SIP voice database NT-LT audit
10 Register the SIP terminations
11 Verify the SIP-based voice service
12 Unplan the Voice server (the Voice server must be kept running till the verification
has proven that the SIP-based voice service behaves correctly)
• The same Signaling VLAN ID remains used at the IACM part of the Voice access
before and after the migration from “switching” to “routing” device.
• The same RTP VLAN ID remains used at the IACM part of the Voice access
before and after the migration from “switching” to “routing” device.
• The same source / destination Signaling IP address remains configured at the
IHub.
• The same source / destination RTP IP address remains configured at the IHub.
The main logical steps to be taken in the switching to routing functional migration are:
1 Configure the routing protocol (OSPF / RIP)
2 Optional: Configure the static routes
3 (re-)Configure L2/L3 topology to run in route mode.
4 Reset the NT pair.
14.2 Coverage
14.1 Introduction
The integrated VoIP service provides classic telephony services to subscribers being
connected with classic POTS / ISDN BRA / ISDN PRA /CAS R2 lines, and to convert
the corresponding signals to VoIP signaling/data packets.
The integrated voice service provides POTS or ISDN BRA/ISDN PRA or CAS R2
service to subscribers over copper pairs together or without xDSL service.
The voice information is converted to VoIP in the ISAM Voice access node and
forwarded to/from the service provider's Ethernet/IP network over optical fibers along
with the HSI and IPTV services carried by the access device.
VoIP networks are subject to standardization. Within standardization there are two
different approaches for the signaling:
• A set of standards driven by ITU-T, centered around ITU-T document H.248. In a
nutshell: a network based on this standard uses RTP for the voice and Megaco
for the signaling.
• A set of standards driven by IETF SIP. In a nutshell: a network based on this
standard uses RTP for the voice and SIP for the signaling.
The integrated VoIP Service supports both signaling methods and can be deployed
in the corresponding network topologies.
Note 1 — Voice over Broadband (VoBB) is not in the scope of
this chapter
Note 2 — The “Integrated Voice Service” chapter describes the
behavior and characteristics of the POTS/ ISDN ports
associated with the Nokia access devices offering the
integrated voice service.
14.2 Coverage
The following chapters summarize the VoIP service features supported by the
different Nokia Voice access products: 7302 ISAM-V and 7330 ISAM-V FTTN.
It is the aim to offer the customer a common feature set and common voice end-user
experience at all Nokia access products offering the integrated VoIP service.
Nevertheless, slight differences in product roadmaps and product's feature
prioritization might result in deviations from the listed feature set and external
behavior. Please contact the responsible Nokia Copper /Fiber Product Units for
further details.
14.3.1 Registration
The Voice Server acting as Media Gateway (MG) announces its existence to the
Media Gateway Controller by means of a registration (Service Change) command.
This registration instantiates a control association between MG and Media Gateway
Controller (MGC).
The Voice Server notifies the MGC that a termination or group of terminations is
about to be taken out of service or has just been returned to service. A situation
where such notification is to be done simultaneously for multiple terminations might
create an overload situation at the MGC.
To guarantee that all terminations are “registered” at the MGC with the correct state,
the Voice Server invokes the termination-state-notify recovery procedure that verifies
the termination state at periodic time interval and that initiates “state change” retries
when necessary.
• T.38 fax
• Softswitch is responsible of voice/T.38 call control and charging.
• Fax over IP according in compliancy to ITU-T Rec. T.38
• Between 2 Group 3 facsimile terminals.
• UDP transport.
• V21 flag detection.
• Byte based and frame based
• FEC and redundancy
• 2400 bps, 4800 bps, 7200 bps, 9600 bps, 12200 bps, 14400 bps.
• Maximum speed is 14400bps depending on network situation.
• ISDN: Support of T.38 MGC Transitioning method. (T.38 Autonomous transitioning
method is NOT supported.)
• Port allocation:
* When the call is switched from voice to T.38 fax and MGC does not offer an UDP
port (set UDP port as $) in the local media description, the same UDP port is
allocated for the fax stream as was allocated for voice; this port is notified to MGC as
UDP port for T.38 fax.
* When the call is switched from voice to T.38 fax and MGC offers the same UDP port
as for voice in the media description, the UDP port is reused for the fax stream; this
port is notified to MGC as UDP port for T.38 fax.
* Once the T.38 fax stream has completed, the switch back from T.38 fax to voice
happens by means of the same UDP port.
• T30 fax/modem, requiring full control at the MGC:
• Detected tones reported to MGC
• Switch to VBD mode upon receipt of MGC command.
• Transparent modem/fax service (v.150 VBD mode).
• Capability to detect fax/modem tones from network side or local side.
• In-band tones in compliancy to RFC 2833.
• The flexibility is provided to set the required DTMF tone RFC2833 mode and the
required fax/modem tone RFC2833 mode simultaneously via separated
configuration inputs.
• “In-band tone detection” of fax/modem/text tones from remote side (voice band
codecs, commonly G.711, etc.), which serves as both a VBD stimulus and a
coordination technique to guarantee autonomous behavior.
• In-band fax/modem tones trigger integrated VoIP service to switch to VBD mode.
• For H.248, only tone detected from local side will be reported to MGC in case of
T30/modem full control by MGC.
• Support of the reception of all RFC4734 NTE events, allowing to swap to VBD.
• Support of enhanced fax/modem in-band tone detection from local / IP side with
additional tones treated in compliancy with RFC4733 (when defined). Additional
fax/modem tones support together with IP side in-band tone detection can be
activated simultaneously however by causing some density decrease (Density of
48-lines voice LT board becomes 40 instead of 48). IP-side in-band tone detection
can be turned off via CDE Profile.
• Fax: V.21, V.17, V.27ter, V.29, V.34
• Modem (or text phone): V.18, V.21, V.22, V.22bis, V.23, V.32, V.32bis, V.32ext,
V.34, V.90, V.92, Baudot, Bell103, Bell 212A, V.25/V.8/V.8bis compliance.
Distinctive Ringing ✓
Fixed Destination Call HotLine ✓ ✓
(FDC)
WarmLine ✓ ✓
(1 of 2)
Message Waiting Indication (MWI): with special dial tone connection, no VMWI ✓
Outgoing Call Screening (OCS) ✓
Call Park ✓
Emergency Call ✓
Change Password ✓
VoiceMail ✓
VMessage Waiting Indication (MWI) announcement via Huawei proprietary H.248 package ✓
SG{x_nvaft/x_mwt} followed by cg/dt (with locally stored .wav file)
(The subscriber line shall only ring once when receiving MWI set/clear command from
MGC)
(2 of 2)
(1 of 2)
(2 of 2)
Three RTP QOS Metrics Threshold Crossing Alarms (TCA) have been defined :
• Low-QOS-Packet-Loss :
• Raised in case the Packet Loss threshold is exceeded.
• Alarm content : Peer IP-address ,Packet loss (%) in "Additional info" section of the
alarm.
• Low-QOS-Jitter :
• Raised in case the Interarrival Jitter threshold is exceeded.
• Alarm content : Peer IP-address , Jitter (msec) in "Additional info" section of the
alarm.
• Low-QOS-Delay :
• Raised in case the Round Trip Delay threshold is exceeded.
• Alarm content : Peer IP-address , Delay (msec) in "Additional info" section of the
alarm.
All three RTP QOS Metric thresholds are checked upon call completion.
All three RTP QOS Metric thresholds are checked against the statistics collected in
the scope of RTCP.
Alarm-ON reporting :
• On a per call basis.
• Upon call completion in case a threshold is exceeded
• A RTP QOS Metrics Threshold Crossing Alarm can only be reported once during
a call.
• Up to three different RTP QOS Metrics Threshold Crossing Alarm identities can
be reported per call (upon call completion).
Alarm RESET :
• A RTP QOS Metrics Threshold Crossing Alarm is autonomously reset by the
system.
• A RTP QOS Metrics Threshold Crossing Alarm is immediately reset after this RTP
QOS Metrics Threshold Crossing Alarm has been reported.
14.4.3 Registration
From a system perspective, the registration of SIP terminations is done by all SIP
UAs in parallel.
From a SIP UA perspective, as a general rule, SIP terminations are registered on an
individual basis and in the order that the SIP terminations become administratively
enabled.
• SIP Registration method in compliancy to RFC3261 (including de-registration and
re-registration)
• Header fields: Call ID, CSeq, From tag, Path, Service-Route, Random contact
• Response codes: 200/404/413/480/486/500/503/401/407/423.
• “reg” event package in compliancy with RFC3680. (Event header present in
SUBSCRIBE and NOTIFY requests.)
• Subscription upon successful registration
• Subscribe / Notify dialog complies to RFC 3265.
• Anti-avalanche register procedure as to avoid stressing the register server.
• MD5 digest encryption of registration password.
The SIP UA allows (can be enabled/disbled) to play a pre-configurable tone
sequence when the subscriber goes off-hook and its line is not registered due to:
• First Hop SIP server unavailability
• First Hop server fail-over
• Initial registration failure (Incorrect MD5 username/password,... )
14.4.4.1 General
• Analogue Z interface.
• Configurable line feeding
• Symmetrical programmable ringing
• Metering tone insertion
• Polarity reversal
• Programmable line impedance with echo cancellation.
• Overvoltage protection
• Integrated Narrowband Line Test facility
• Configurable end-of-dialling indicator: *, #, * and #
• Tone generation: Ring tone, Dial Tone, Special (Information) Dial Tone, Ring
Back Tone, Congestion Tone, Busy Tone, and Howler tone.
• Echo cancellation:
• Voice (per subscriber line): configurable as enabled/disabled
• low speed voice band data (per subscriber line)
• In compliancy to G.168
• Echo tail length up to 128 ms.
• Silence suppression:
• Detection of silence descriptors in the bearer channel
• Voice Activity Detection
• Transmission of comfort noise to (near-end) customer interface when silence
suppression is activated at the far end packet voice transmitter
• Voice activity detection, comfort noise, and packet loss concealment.
• CLIP mode: FSK / DTMF (Provisionable per subscriber line).
• Telcordia FSK and ETSI FSK simultaneously supported per voice access node.
• Formatting SIP signaling messages in compliancy to RFC3261 (including
escaped characters in SIP URI).
• Incoming call rejection: Lack of DSP resource, CODEC not supported, Line busy,
Termination not known, not supported media type in SDP offer body, Termination
with administrative state = down.
Response codes: 400, 404, 420, 480, 481, 486, 488, 500
• Line busy: 486.
• Not supported media type in SDP offer: 488 (warning header included).
• Termination not known: 404.
• Termination with administrative state = down: 480.
• Timer A, B, C and F in compliancy to RFC3261
• Authentication challenges in compliancy to RFC3261 and RFC 2617.
• Line Polarity Reverse for incoming as well as for outgoing call.
• Support of polarity reverse for the line of the originating coin-box when the
terminating party answering the call.
• Polarity reverse triggered by the access node i.e. without any special signaling
required from the AS.
• Polarity reverse enabled/disabled provisionable per line.
• Polarity reverse cannot be triggered on non-coin box lines.
• Usual polarity applied to the line upon the receipt of on-hook event.
• SIP OPTIONS method in compliancy to RFC3261 (Tightly and Loosely couple
mode)
• Support for receipt of In-dialog INFO or OPTIONS method originating at network
side to confirm connectivity with integrated voice service during an ongoing call.
• Support for receipt of in-dialog UPDATE or OPTIONS method originating at
network side for session and audit refresh.
• Support for local or remote ring-back tone depending on P-Early-Media header
settings (Tightly and Loosely coupled mode).
• Support for Reliability of Provisional Responses in compliancy to RFC 3262.
• Support for TEL URI scheme in compliancy to RFC 3961.
• Support of “isub-encoding” parameter in compliancy to RFC 4715.
• Support of TEL URI to SIP URI conversion in compliancy to RFC 3261.
• Support for 300 / 302 response code to new INVITE.
• Provisionable Dial Plan / Digit Map.
• Configurable "Digit Map Match" Mode :
• Maximum Digit Map match mode (Inter-digit timer expiry mode).
• Minimum Digit Map match mode.
• Digit Map restrictions :
• A Digit Map pattern must not exceed 100 bytes.
• The total amount of Digit Map patterns must not exceed 50.
• The total Digit Map size must not exceed 4 Kbytes.
• ZTE SIP server specific : Support for proprietary SIP message "MESSAGE" to
play the dial tone a second time when the subscriber dials the prefix as received
in the body of the SIP message "MESSAGE" :
• “Content-Type: text/plain Second-Dial-Tone:yes;Intra-Group-Outgoing-Call-Prefix:9"
• CODECs:
• G.711 A/u law (10ms, 20ms, 30ms), G.729AB (10ms, 20ms, 30ms, 40ms, 50ms,
60ms), G.723.1 (30ms), T.38, RFC2833
• Packet loss concealment capability for G.711
• End-to-End codec negotiation at call set-up. In case codec information is absent, the
system shall use the default codec and ptime settings: (default codec and ptime
setting is provisionable in the CDE profile).
• RTCP:
• SR, RR, SDES and BYE supported
• The deterministic calculated interval Td is set to 5 s.
• No support for RTP session membership
• Support of PreConditions in compliancy to RFC 4032:
• Enable/disable SIP Preconditions.
• Backwards compatibility (remote party not supporting SIP Preconditions).
• Segmented QoS precondition - basic call origination:
• Resource reservation before sending initial INVITE.
• Indicate the support of SIP preconditions in the Supported header of the INVITE.
• Prevent media stream from flowing until the SIP preconditions are met.
• Segmented QoS precondition - basic call termination:
• Resource reservation before returning SDP answer.
• Hold ringing the callee until the preconditions are met.
• Hold call waiting tone and/or CLIP for incoming call until the required SIP
preconditions are met.
• Prevent media stream from flowing until SIP preconditions are met.
• Segmented QoS precondition - supplementary services:
• Hold ringing, call waiting tone and/or CLIP for incoming call until the required SIP
preconditions are met.
• Segmented QoS precondition - early dialog:
• Only when the SIP preconditions are met, the system decides whether to present
the received early media to the user.
• Reduce power feed in case the subscriber line is detected to be in Off-Hook state
for a longer time period without being involved in a call; provisionable delay to
enter reduced power feed state.
• Flexible SIP URI provisioning.
• Flexible Termination ID provisioning.
• Jitter Buffer monitoring on a per subscriber line.
• Configurable DSCP & 802.1p bit value for signalling and voice traffic.
• Domain Name Service (DNS) support.
• Dynamic Host Configuration Protocol (DHCP) support.
The characteristics of the hold tone to be generated are specified in the CDE profile.
14.4.4.6 Media
• Dynamic payload type kept unchanged during a session.
• Support of Early-Dialog Handling. SDP handling in 18x with different/same to-tag.
• Generation of audible ringing upon receipt of 180-Ringing response.
• Media update upon receipt of RE-INVITE or UPDATE methods with new SDP.
• RFC 2833 (Tightly and Loosely coupled mode)
• Digit collection by detection of DTMF tones / Pulse dialing (Tightly and Loosely
coupled mode)
• Dynamic payload negotiation is compliant with RFC 2833 / RFC 3264.
14.4.4.9 Metering
• 12/16 Khz metering.
• Support of metering parameters in XML body in compliancy to ETSI TS 183 047.
• Periodic / Burst pulsing
• For 2-party and multi-party calls
• For multi-party calls: to generate the pulses for the sum of the two rates on the line
• Up to 30 pulses per 10 sec and 300 ms >= Tpulse + Tpauze <= 320 ms
• Burst pulsing in compliancy to ETSI TS 0373_96 part 6.
• Supported modes:
• Periodic pulsing only.
• Burst once then Periodic pulsing.
• Periodic Bursts.
• Periodic bursts with Periodic Pulsing in between the bursts.
• Burst once at the begin of a call.
• Support of tariff type changes during a call.
• Changing from the current tariff type to a new tariff type
• Rate change within a tariff type
• Support of “Free Charge” POTS metering mode.
• Support of Metring types: “Override” & “Period of Day”.
• Support of enable/disable reverse polarity prior to sending of metering pulse.
• Support of sending a 12/16 KHz metering pulse to the originating coin-box when
the terminating party answering the call
• Metering pulse autonomously generated by the access node i.e. without any special
signaling required from the AS.
• Single metering pulse enabled/disabled provisionable per line.
• Single metering pulse cannot be sent on non-coin box lines.
14.4.6.1 General
Table 39 lists the representative supplementary services that work in conjunction
with the Nokia IMS solution. More extensive treatment of the supplementary services
supported is available in the associated Nokia IMS documentation.
Table 39 Overview of the supported supplementary services
CWID service ✓
Malicious Call Identification (MCID): Permanent / After call ended ✓
Special dial tone in case Message waiting service activated and new ✓
waiting messages at VMS for the user's account.
SIP based Integrated VoIP access device supports the TS183 043 ✓
standardized solution (Annex A) for dial tone management based on
unsolicited NOTIFY SIP messages using the ua-profile XML body
Distinctive Ringing ✓
(1 of 2)
(2 of 2)
Interoperability of the SIP based Integrated VoIP access device with a 3rd party
Voice Application Server can be supported through commercial agreement. Please
contact the ISAM PU for the supported supplementary services list.
• “Call Hold”:
• Complies with ETSI TS183043 C.9.1/C.16.1 Loose Coupling, 3GPP ES 23.228 chap
5.11.1, ES 24.228 chap10.1, and China Mobile specification. Generate re-INVITE
message when the supplementary service becomes activated due to pressing the
hook-flash.
• The user can hold the initial call and initiate an enquiry call to a 3rd party by making
a hook-flash event and dial the 3-party number. Once the enquiry call is established
the user can switch between two calls by making a subsequent hook-flash event.
Following flavours are supported:
• Simplified Call hold with HF-only: the user can continuously switch between two
calls by making a Hook-flash event
• Call Hold with Hook-flash + SOC: user makes a hook-flash event and gets dial
tone. User dials a 1 digit SOC to either:
• Release held call and continue with current active call
• Go back to held call with release of current active call
• Switch continuously between both calls
• Join both calls into a 3-way-call conference
• Support of provisionable Call Hold Failure option "call release and play dial tone":
• SIP server replies with error response in case a subscriber tries to hold a call whilst
the supplementary service is enabled for the same subscriber.
• Upon the receipt of the SIP error response, the SIP UA releases the call and
subsequently plays the dial tone.
• ANSI: Full Consultive Call Hold support via feature code.
• “3 Party Conference”:
• Compliant to both TISPAN and NON-TISPAN specification, noted that the Y-function
hosts in the MRF/MS, not in SIP based Integrated VoIP access device. Although, the
72 lines Voice LT board is also able to do audio mixing. (NON-TISPAN
implementation only supports IOT with Broadworks FS.)
• Supported with the media-stream mixing being done at the IMS core MRF, in
compliancy with 3GPP specification TS24.147 subclauses 5.3.1.3.2 “Conference
creation with a conference factory URI”, 5.3.1.3.3 “Three-way session creation”,
5.3.1.5.3 “User invites other user to conference by sending a REFER request to the
conference focus” and 5.3.1.6.1 “Conference participant leaving a conference”.
• Supported in compliancy with ETSI TS183 043 C.14.2 Loose Coupling option 1 (with
local RTP-stream mixing at the SIP based Integrated VoIP access device) and option
3 (with RTP-stream mixing at the MRF of the core under control of the core
application server).
• The user can hold the initial call and initiate an inquiry call to a 3th party by making a
hook-flash event and dial the 3-party number. Once the enquiry call is established
the user can join both calls into 3-way conference by a subsequent Hook-flash event.
• Support of “Isfocus” parameter in compliancy with GR-577-CORE - LSSGR:
Three-Way Calling, FSD 01-02-1301, with contact header of the form
“username3wc@host” where username is the configured username of the line / user
part of address_of_record appended with the string “3wc”.
14.4.8 SMS
• Fixed Line SMS service.
• FSK Data transmission in compliancy to ETSI EN 300 659 - 2.
• TE-altering signal (TAS) used to signal the data transmission and to force the
receiver to switch to VBD mode.
• UE-originating case :
If available to the UE (as defined in the access technology specific annexes for
each access technology), the UE shall insert a P-Access-Network-Info header
field into any request for a dialog, any subsequent request (except ACK requests
and CANCEL requests) or response (except CANCEL responses) within a dialog
or any request for a standalone method (see subclause 7.2A.4).
• UE-terminating case :
If available to the UE (as defined in the access technology specific annexes for
each access technology), the UE shall insert a P-Access-Network-Info header
field into any response to a request for a dialog, any subsequent request (except
CANCEL requests) or response (except CANCEL responses) within a dialog or
any response to a standalone method (see subclause 7.2A.4).
(Thus : PANI-header not included ACK, (response to) CANCEL, 100 Trying,
(response to) session refresh request).
Following formats are supported:
Format 1:
• Format = P-Access-Network-Info: ADSL; dsl-location=”quoted string”
• The PANI header (dsl location) is based on part of the ISAM System Id and used
by the IMS core to identify the originating access device of a SIP request.
Format 2:
• Format = P-Access-Network-Info : <AccessType>; dsl-location=
"$LineID;$IPsip;$UserID;;;"
• The PANI header (dsl location) is based on part of the ISAM Termination Line Id.
Authentication by the IMS core is based on IMPU (=RN) (From) & Access-Id
(PANI Line-Id)
Format 3:
• Format = P-Access-Network-Info: <AccessType>; dsl-location=
"line-id=<MSAN-SIP-IP>;cc=39;oc=204;lac=<MSAN-LAC>;ali=;";network-provid
ed
• The LDN list feature is enabled when the regular rule "x.T" is present in the dial
plan.
• The LDN list feature is disabled when the regular rule "x.T" is missing in the dial
plan.
• Additional regular rules, different from "x.T", with full match, must be added to the
dial plan for those DNs that should not be stored in the LDN list.
• A dialed DN is a candidate DN to be stored in the LDN list on the condition that it
matches the "x.T" rule.
• The following SIP responses to the SIP INVITE are considered "valid" responses
resulting in the storage of the dialed DN in the LDN list:
• 200 OK
• 180 ringing (only 180 (with/without SDP) is considered, other 18x messages are
excluded),
• 486 busy
• The dialed DN shall be removed from the LDN list (on the condition that the DN
was already stored because of a "valid" response received to the initial INVITE
request) in case subsequently one of the following SIP response messages
should be received:
• ‘no service'(404),
• ‘non-existing number' (484).
• The LDN list of a subscriber line or multiple subscriber lines can be manually reset
by means of one of the following operator / subscriber actions :
• Lock / unlock the subscriber line (operator action)
• Lock / unlock the VSP (operator action)
• Lock / unlock the SIP UA (operator action)
• Lock / unlock the SIP server (redundancy = disabled) (operator action)
• Any change to the digit map, e.g. remove x.T, add new rule, etc… (operator action)
• Reboot LT board (operator action)
• The dialing of the special "ScForLDNErase" service code e.g. **#93# (subscriber
action).
At a successful erase of the LDN list via the service code, a 60 sec congestion tone
gets played (followed by parking tone in case the subscriber remains off-hook)
• The LDN list of all subscriber lines shall autonomously be reset by the MSAN upon
• SW Upgrade
• SW Migration
• System reset
• LDN list per line structured as a sequentially accessed array
• Last dialed DN not present in the list and list not full: add last dialed DN at the top
• Last dialed DN not present in the list and list full: remove last DN in list and add last
dialed DN at the top
• Last dialed DN present in the list and list not full: move last dialed DN to the top
• Last dialed DN present in the list and list full: Move last dialed DN to the top
• The minimum number of digits of a DN that shall be stored in the LDN list is
preprovisioned in the CDE file.
Recent 15 min interval N-1 Recent 15 min interval N Recent 15 min interval N+1
The SIP based Integrated VoIP Service supports voice related per-line, per-board
and per call statistics / counters.
For the per-line statistics and counters, the current 15 min / 24 hours interval together
with a set of 96 x 15 min and 3 x 24 hours history intervals is supported. (Only a
subset of the per-line statistics and counters is supported for the 15 min interval)
For the per-call statistics and counters, a set of 96 x 15 min history intervals is
supported (The current 15 min interval is not supported).
For the per-board statistics and counters, the current 15 min / 24 hours interval
together with a set of 96 x 15 min and 3 x 24 hours history intervals is supported.
(Only a subset of the per-line statistics and counters is supported for the 15 min
interval)
For a history interval, the interval number, interval start time stamp, measured time
and invalid data flag attributes are supported.
For a current interval, the measured time and invalid data flag attributes are
supported.
The SIP based Integrated VoIP Service supports TCA handling. The TCA can be
enabled / disabled for each individual subscriber line. Both the high and the low TCA
threshold are configurable.
Statistics can be explicitly enabled / disabled by means of the regular management
channel. The system does not allow to enable/disable a particular performance
monitoring category. Either PM is enabled for all categories (per-Line, per-Board,
per-Call) or PM is disabled for all categories (per-Line, per-Board, per-Call).
Statistics Description
Packets Sent The number of RTP packets sent by a SIP termination during a single
Packets Received The number of RTP packets received by a SIP termination during a single
interval
Octets Sent The number of octets sent by a SIP termination during a single interval
Octets Received The number of octets received by a SIP termination during a single interval
Average Inter-Arrival Jitter The average Inter-Arrival Jitter for (an) RTP data stream(s) of a SIP
termination in a single interval.
Peak Inter-Arrival Jitter The peak Inter-Arrival Jitter measured for (an) RTP data stream(s) exchanged
by a SIP termination during a single interval.
Average Round Trip Delay The average Round Trip Delay for (an) RTP data stream(s) of a SIP
termination during a single interval
Peak Round Trip Delay The peak Round Trip Delay measured for (an) RTP data stream(s) exchanged
by a SIP termination during a single interval
Average Jitter Buffer Fill level The average jitter buffer fill level for a SIP termination during a single interval
Average Jitter Buffer Fill level The average jitter buffer fill level measured during the receipt of (an) RTP
G711a stream(s), encoded with G711_a by a SIP termination during a single interval
Average Jitter Buffer Fill level The average jitter buffer fill level measured during the receipt of (an) RTP
G711u stream(s), encoded with G711_u by a SIP termination during a single interval
Average Jitter Buffer Fill level The average jitter buffer fill level measured during the receipt of (an) RTP
G723 stream(s), encoded with G723 by a SIP termination during a single interval
Average Jitter Buffer Fill level The average jitter buffer fill level measured during the receipt of (an) RTP
G729 stream(s), encoded with G729 by a SIP termination during a single interval
Total Packet Loss The total (absolute) amount of packets lost for a SIP termination during a
single interval.
Successful (Re-) Register The number of (re-)registration requests which are successfully replied in this
requests interval i.e. a response = 200 OK with expire header time = 0 or expire header
<> 0 has been returned by the Registrar.
Failed (Re-) Register requests The number of (re-)registration requests which failed in this interval i.e a
response <> 200 OK was returned by the SIP First Hop server / Registrar or
that SIP transaction timed-out.
Active Registrations The number of registrations being active at a subscriber port at the start of the
interval. In the current implementation, only 1 registration can be active at a
subscriber port at a time. An active registration is counted when a registration
request has been successfully completed in the past (200 OK received to
register request with “expire header” time <> 0) and the register expiration
interval hasn't expired.
Outgoing Calls Answered The number of outgoing call attempts in this interval for which an initial INVITE
(Outgoing Calls Connected) request is sent AND for which a response is received. The system allows to
provision what kind of response must be received as to be counted as a
successful outgoing call attempt. The system offers the following options:
• Any response received (irrespective of whether this is a successful or
unsuccessful response).
• A successful response received (180 or 200 response only).
• A 200 OK response received.
(1 of 3)
Statistics Description
Incoming Calls Answered The number of incoming call attempts in this interval for which a SIP response
(Incoming Calls Connected) is sent being the result of the off-hook event been detected. The system allows
to provision the kind of response that will be considered as to be counted as
a successful incoming call attempt. The system offers the following options:
• Any response sent.
• 180 response sent.
• 200 OK response sent.
Outgoing Call Attempts The number of off-hooks being detected and considered as being the starting
event to make an outgoing call attempt (The detection of an off-hook event as
the result of an incoming call attempt must not be considered).
This counter counts both the off-hook events detected as being the starting
event of an outgoing call attempt in the scope of a basic call and the
Hook-flashes as being the starting event of a new outgoing call attempt in the
scope of a conference call.
Outgoing Call Seizure Duration The port seizure time for outgoing call attempts. This counter is only
applicable to the outgoing call attempts whereby the subscriber dials a valid
digit before the starting dial timer expiry.
(With "valid digit" is to be understood a digit that at least partially matches one
digit map pattern in the configured digit map.)
Incoming Call Attempts The total number of incoming SIP INVITE requests, considered as being a SIP
INVITE request for a new incoming call attempt, and this regardless of
whether the incoming call attempt has successfully been processed / replied
or not.
Incoming Call Seizure Duration The port seizure time for incoming call attempts. The port seizure duration is
the time elapsed from the moment the called subscriber gets notified that an
incoming call attempt has arrived (ringing / call-waiting tone put at the line till
one of the following events is detected:
• the receipt of the off-hook or
• the receipt of the flash-hook event or
• the receipt of the SIP CANCEL request or
• the expiry of the ringing tone sequence or
• the expiry of the (call forwarding no reply) "No Answer Timeout" or
• the receipt of the call-waiting tone sequence.
Accepted RTP Packets The number of ACCEPTED RTP packets equals the number of expected RTP
packets minus the number of missed RTP packets minus the number of defect
RTP packets minus the number of doubled RTP packets minus the number of
later arrived RTP packets minus the number of early received RTP packets.
Or in other words, the number of ACCEPTED RTP packets equals the number
of RTP packets used for voice generation at the receiving side.
Expected RTP Packets The number of RTP packets EXPECTED is defined to be the extended last
sequence number received, less the initial sequence number received.
Discarded RTP Packets The number of DISCARDED RTP packets other than late or early arrived
equals the number of received but not used downstream RTP packets which
can be assigned to the port and without early or late package loss.
Equals the number of defect RTP packets plus the number of duplicated RTP
packets.
(2 of 3)
Statistics Description
RTP Packets lost due to Early The number of DISCARDED RTP packets due to early or late arrival equals
or Late Arrival the number of received RTP packets which can be assigned to the port but are
received too early (Jitter buffer over-flow) or too late (Jitter buffer under-run)
and that are consequently not used for the generation of the voice stream.
Equals the number of early received RTP packets plus the number late
received RTP packets.
Port Registration Duration The total amount of time that, from an MSAN point of view, a SIP termination
configured at a voice LT board is considered to be successfully registered at
the IMS core.
Port Availablility Duration The total amount of time that a SIP termination configured at a voice LT board
is considered to be administratively available, that is, the elapse time that the
port's administrative state as well as its higher layer object's administrative
status (SIP User Agent admin state, SIP User Agent Access Point admin
state, Voice Service Provider admin state) are all set to "unlocked".
Outgoing call attempts that The number of outgoing call attempts that could not successfully be
failed due to a lost seizure completed because of a lost seizure with the control network.
towards the control network Or in other words, the number of outgoing call attempts that fail because of an
access failure to the voice network.
Incoming call attempts that The number of received incoming call attempts that could not successfully be
failed due to a lost seizure completed because of a lost seizure with the control network.
towards the control network Or in other words, the number of incoming call attempts that fail because of an
access failure to the voice network.
Outgoing Successful Invites The number of initial SIP INVITE requests that are replied by the IMS core with
a 100-Trying followed by:
Or in other words, the number of outgoing call attempts that fail because of an
access failure to the voice network.
• A 180-Ringing Provisional Response
• A 183-Session Progress Provisional Response.
• A 200 OK (No 18x Provisional Response in between the receipt of the
100-trying and the 200 OK)
(3 of 3)
Statistics Description
Packets Sent The number of RTP packets sent by a SIP termination since the call is
established/ the start of the interval and the end of the call/ the expiry of the
interval
Packet Received The number of RTP packets received by a SIP termination since the call is
established/ the start of the interval and the end of the call/ the expiry of the
interval
Octets Sent The number of octets sent by a SIP termination since the call is established /
the start of the interval and the end of the call/ the expiry of the interval
Octets Received The number of octets received by a SIP termination since the call is
established/ the start of the interval and the end of the call/ the expiry of the
interval
Average Inter-Arrival Jitter The average Inter-Arrival Jitter for the RTP data stream since the call is
established/ the start of the interval and the end of the call/ the expiry of the
interval.
(1 of 2)
Statistics Description
Peak Inter-Arrival Jitter The peak Inter-Arrival Jitter for the RTP data stream since the call is
established/ the start of the interval and the end of the call/ the expiry of the
interval.
Average Round Trip Delay The average Round Trip Delay for the RTP data stream since the call is
established/ the start of the interval and the end of the call/ the expiry of the
interval.
Peak Round Trip delay The peak Round Trip Delay for the RTP data stream since the call is
established/ the start of the interval and the end of the call/ the expiry of the
interval.
Total Packet Loss The total (absolute) amount of packets lost for the RTP data stream since the
call is established/ the start of the interval and the end of the call/ the expiry of
the interval.
Total Packet Loss due to Jitter The total (absolute) amount of packets lost due to Jitter Buffer Overrun for the
Buffer Overrun RTP data stream since the call is established/ the start of the interval and the
end of the call/ the expiry of the interval.
(2 of 2)
Statistics Description
Packets Sent The number of RTP packets sent by all SIP terminations of an LT board during
a single interval
Packets Received The number of RTP packets received by all SIP terminations of an LT board
during a single interval
Octets Sent The number of octets sent by all SIP terminations of an LT board during a
single interval
Octets Received The number of octets received by all SIP terminations of an LT board during
a single interval
Average Inter-Arrival Jitter The average Inter-Arrival Jitter for (an) RTP data stream(s) exchanged by an
LT board during a single interval.
Peak Inter-Arrival Jitter The peak Inter-Arrival Jitter measured for (an) RTP data stream(s) exchanged
by an LT board during a single interval.
Average Jitter Buffer Fill level The average jitter buffer fill level for an LT board during a single interval
Average Round Trip Delay The average Round Trip Delay for (an) RTP data stream(s) exchanged by an
LT board during a single interval
Peak Round Trip Delay The peak Round Trip Delay measured for (an) RTP data stream(s) exchanged
by an LT board during a single interval
Total Packet Loss The total (absolute) amount of packets lost by an LT board during a single
interval.
Average Jitter Buffer Fill level The average jitter buffer fill level measured during the receipt of (an) RTP
stream(s), encoded with G711_a for an LT board during a single interval
Average Jitter Buffer Fill level The average jitter buffer fill level measured during the receipt of (an) RTP
G711u stream(s), encoded with G711_u for an LT board during a single interval
Average Jitter Buffer Fill level The average jitter buffer fill level measured during the receipt of (an) RTP
G723 stream(s), encoded with G723 for an LT board during a single interval
(1 of 3)
Statistics Description
Average Jitter Buffer Fill level The average jitter buffer fill level measured during the receipt of (an) RTP
G729 stream(s), encoded with G729 for an LT board during a single interval
Spare POTS Ports Total amount of POTS ports, which are not configured in the SIP termination
Table, but present at the LT board. The value is taken at the beginning of the
respective interval
Active POTS Ports Total amount of available configured (configured and not administratively
blocked) POTS ports (independent of line status and registration) at the LT
board. The value is taken at the beginning of the respective interval
Inactive POTS Ports Total amount of not-available configured (configured and administratively
blocked) POTS ports (independent of line status and registration) at the LT
board. The value is taken at the beginning of the respective interval.
Average CPU Load Average CPU load measured at an LT board during a single interval
Average Memory Utilization Average amount of semi and dynamic memory being used at an LT board /
NT board) during a single interval. Expressed as a percentage.
Average Free Memory Average amount of free semi and dynamic memory measured at an LT board
/ NT board during a single interval. Expressed in MB.
Average Memory Used Average amount of semi and dynamic memory being used at an LT board /
NT board) during a single interval. Expressed in MB.
Total Memory The total amount of semi and dynamic memory available at an LT board / NT
board. Expressed in MBytes
Successful (Re-) Register The number of (re-)registration requests which are successfully replied in this
requests interval i.e. a response = 200 OK with expire header time = 0 or expire header
<> 0 has been returned by the Registrar.
Failed (Re-) Register requests The number of (re-)registration requests which failed in this interval i.e a
response <> 200 OK was returned by the SIP First Hop server / Registrar or
that SIP transaction timed-out.
Active Registrations The number of registrations being active at a subscriber port at the start of the
interval. In the current implementation, only 1 registration can be active at a
subscriber port at a time. An active registration is counted when a registration
request has been successfully completed in the past (200 OK received to
register request with “expire header” time <> 0) and the register expiration
interval hasn't expired.
Outgoing Calls Answered The number of outgoing call attempts in this interval for which an initial INVITE
request is sent AND for which a response is received. The system allows to
provision what kind of response must be received as to be counted as a
successful outgoing call attempt. The system offers the following options:
• Any response be received (irrespective of whether this is a successful or
unsuccessful response).
• A successful response received (180 or 200 response only).
Incoming Calls Answered The number of incoming call attempts in this interval for which a SIP response
is sent being the result of the off-hook event been detected. The system
allows to provision the kind of response that will be considered as to be
counted as a successful incoming call attempt. The system offers the
following options:
• Any response sent.
• 180 response sent.
Port Registration Duration The total amount of time that, from an MSAN point of view, a SIP termination
configured at a voice LT board is considered to be successfully registered at
the IMS core.
(2 of 3)
Statistics Description
Port Availablility Duration The total amount of time that a SIP termination configured at a voice LT board
is considered to be administratively available, that is, the elapse time that the
port's administrative state as well as its higher layer object's administrative
status (SIP User Agent admin state, SIP User Agent Access Point admin
state, Voice Service Provider admin state) are all set to "unlocked".
Number of Broken Ports The number of ports that, due to a HW failure, cannot be operational.
The counter is event driven, upon both HW fault detection and HW fault
resolved/disappearing.
The counter cannot be reset upon the beginning of a new current interval
since the HW fault event for an already existing HW fault is not going to be
received once again at the start of a new interval. (HW faults that were
detected in an earlier interval and that were still not resolved).
The following fault events can be detected by the SW at the voice LT board
• /** Device detected battery fault */
• /** Device detected clock fault */
• /** Thermal Overload condition */
• /** DC Fault detected on line */
• /** AC Fault detected on line */
• /** SLAC Synchronization fault */
• /** Low loop resistance while on-hook */
• /** Sealing current error */
• /** Watchdog timer fault */
• /** event queue overflow fault */
• /** VCP2 system fault */
The previous interval reflects the number of broken ports at the Line Card at
the start of the current interval for which this previous interval has been
created.
Number of Active Connections The number of incoming or outgoing stable call connections that are active at
the Line Card.
An active connection is considered a call in stable phase regardless of
whether this call is on hold (3 party call) or not on hold (basic call and 3 party
call).
In the scope of this counter, a connection is considered to be "active" from the
moment an outgoing or incoming call attempt is replied with a "200 OK" (200
OK sent to an incoming call attempt or 200 OK received on an outgoing call
attempt.
The previous interval contains a snapshot of the number of connections that
were active at the Line Card at the at the start of the current interval for which
this previous interval has been created.
(3 of 3)
Statistics Description
Average CPU Load The average CPU load for a particular LT board (180 s)
Detailed CPU load Detailed list of the CPU load measured with a 1 s interval over a total period
of 180 s
Absolute Memory Utilization The absolute value of the total amount of memory resources utilized by a
particular LT board.
Percentage of Memory The percentage of memory resource utilization compared to the available
Utilization dynamic memory resources for a particular LT board
Statistics Description
Non-Configured Lines The amount of planned/equipped subscriber lines for which no entry could be
found in the SIP Termination Table.
Operational Configured Lines The amount of subscriber lines configured in the SIP Termination Table and
for which the operational state equals “up”.
Non-Operational Configured The amount of subscriber lines configured in the SIP Termination Table and
Lines for which the operational state equals “down”.
3 A SIP request gets accepted on the condition that it originates from one of the
SIP first hop servers that are maintained in the locally created SIP first hop server
White List. This “White List” includes all configured (IP@, FQDN, DN) and
administratively enabled SIP first hop servers (primary + secondary) in the SIP
Server Table (SIP MIB).
A SIP request received from SIP first hop server other than the SIP first hop
servers appearing in the White List is rejected with response code “403”.
The system allows to check the origin of a received SIP response message.
A SIP response message gets dropped if it does not originate from the Active SIP
server / a SIP first hop server appearing in the White List.
P0 Not created Port exists but is not configured and initialized by the system management
system.
(1 of 2)
P2 Outgoing seizure From closure of DC loop in terminal device until reception of initial dial
information
P2.1 IExtended dialing Initial address information has been acknowledged by returning a response
"183 - Session Progress" and a dialog is set up.
P3 Incoming seizure Port is ready to operate; call resources are available and SIP message INVITE
was received from the Call Control
P4.2 Hold 2 In addition to an already held connection, another (now active) connection has
been set up completely.
P4.3 Service A hookflash signal was detected in HOLD state. The system is waiting for the
entry of procedure digits.
P4.4 Conference There are two active connections at at port, which are interconnected into a joint
conference.
P5.1 Release A connection setup attempt has failed; the subscriber busy tone or all trunks
request 1 busy tone has been applied.
There is no further connection in HOLD state.
P5.2 Release A connection setup attempt has failed or an event terminating the
request 2 communication has occurred. Another connection is in HOLD state.
P6 Port blocked Port was blocked by the system management for operational reasons
(2 of 2)
14.5.1 General
The MSAN supports eight E1 ISDN PRA interfaces at an ISDN PRA voice LT board.
The ISDN PRA voice LT board behaves as "stand-alone" meaning that the E1 loop
is directly connected to the end-user.
The Q.921 and Q.931 protocols are terminated at the ISDN PRA voice LT board. See
Figure 184.
The MSAN configures an ISDN PRA port in point-to-point mode, meaning that, at
layer 1 for each direction, only one source (transmitter) and one sink (receiver) is
connected to the E1 interface.
The maximum reach of the E1 interface in such point-to-point configuration is limited
by the specification of the electrical characteristics of transmitted and received
pulses and the type of interconnecting cable.
There can be only one signaling entity present at the ISDN PRA port.
The L1 layer interface for the ISDN PRA port is kept active at all times.
The ISDN PRA port may be connected to a short-haul or long-haul E1 loop. The
registers of the E1 chip set are fixed configured to long-haul mode.
1
2 SIP SIP
DDI -Ext 1
V UA Term
DDI -Ext 2 G
ISDN PRA voice LT
1 DDI-ext
DDI -Ext 3 E 8 board
List IMS Core Registrar
1
DDI -Ext 4 1
2 SIP SIP
UA Term DDI-ext m
C V
ISDN PRA l G ISDN PRA voice LT
2 8 board
PBX u
The IMS Core Registrar stores in a dynamic way
s and per DDI-ext, the list of SIP User Agent contact
t addresses (and oponally the Q-value for in case
SIP Forking applies).
e 1
SIP SIP
2
The MSAN supports three different connection modes for an ISDN PRA "user":
• Mode_1: An ISDN PRA user connected by means of a single E1 interface.
The ISDN PRI user is managed by the ISDN PRA voice LT board local SIP User
Agent instance.
Specific IMS core requirements: none.
Required input to the IMS core: none.
• Mode_2: An ISDN PRA user connected to one ISDN PRA voice LT board with two
up to maximum eight E1 interfaces.
The ISDN PRA user is managed by the NIAT-A local SIP User Agent instance.
Specific IMS core requirements: none.
Required input to the IMS core: none.
• Mode_3: An ISDN PRA user is connected to multiple ISDN PRA voice LT boards
planned and equipped in a single or multiple MSANs. (one up to eight E1
interfaces per ISDN PRA voice LT board and maximum 32 E1 interfaces in total).
The E1 interfaces connected to an ISDN PRA voice LT board are managed by the
ISDN PRA voice LT board local SIP User Agent instance. Each ISDN PRA voice
LT board behaves totally independent from the other. The connection to multiple
ISDN PRA voice LT boards by one ISDN PRA user is known to the IMS core only,
that is fully transparent to the MSAN.
Specific IMS core requirements: parallel and/or sequential SIP Forking.
Required input to the IMS core: Q-value in SIP Register request.
All three modes require the configuration of an ISDN PRA SIP termination at each of
the involved ISDN PRA voice LT boards.
The MSAN supports the following deployment and registration alternatives:
• An ISDN PRA SIP termination on top of a single E1 interface:
• The implicit registration of the ISDN PRA SIP termination (GDN-ext Directory
Number / URI).
• The list of implicit registered DDI-EXTs is returned by the register server.
• An ISDN PRA SIP termination on top of an E1 cluster that consists of only one E1
interface (only applicable to 100/320 Gbps NT and FX NT):
• The explicit registration of the GDN-ext directory number / URI and all configured
DDI-EXTs associated with the ISDN PRI SIP termination.
• The configuration of the DDI-EXT list is mandatory.
• An ISDN PRA SIP termination on top of an E1 cluster that consists of only 1 E1
interface:
• The implicit registration of the ISDN PRA SIP termination (GDN-ext Directory
Number / URI).
• No DDI-EXT list is configured.
• The list of implicit registered DDI-EXTs is returned by the register server.
• An ISDN PRA SIP termination on top of an E1 cluster that consists of two up to
eight E1 interfaces (only applicable to 100/320 Gbps NT and FX NT):
• The explicit registration of the GDN-ext directory number and all configured
DDI-EXTs of the ISDN PRA SIP termination.
• The configuration of the DDI-EXT list is mandatory.
• An ISDN PRA SIP termination on top of an E1 cluster that consists of two up to
eight E1 interfaces:
• The implicit registration of the ISDN PRA SIP termination (GDN-ext Directory
Number / URI).
• No DDI-EXT list is configured.
• The list of implicit registered DDI-EXTs is returned by the register server.
• Multiple ISDN PRA SIP terminations with each ISDN PRA SIP termination created
on top of one Virtual E1 Group (one up to eight E1 interfaces) and all Virtual E1
Groups belonging to the same E1 cluster (only applicable to 100/320 Gbps NT
and FX NT):
• Each ISDN PRA SIP termination performs the explicit registration of the GDN-ext
directory number and all configured DDI-EXTs.
• The configuration of the DDI-EXT list is mandatory.
• Multiple ISDN PRA SIP terminations with each ISDN PRA SIP termination created
on top of one Virtual E1 Group (1 up to 8 E1 interfaces) and all Virtual E1 Groups
belonging to the same E1 cluster:
• Each ISDN PRA SIP termination performs the implicit registration of the ISDN PRA
SIP termination (GDN-ext Directory Number / URI).
• No DDI-EXT list is configured.
• The list of implicit registered DDI-EXTs is returned by the register server to each of
the SIP terminations.
The amount of DDI-EXTs that can be configured for an ISDN PRA user (PBX) is not
fixed. The only limitation is the overall maximum number of DDI-ext entries (for all E1
clusters together) that can be configure, that is 45K DDI-exts.(only applicable to
100/320 Gbps NT and FX NT)
For the use case whereby the E1 interfaces of an E1 cluster are connected to
different ISDN PRA voice LT boards (multiple Virtual E1 Groups), each of the SIP
User Agent instances must register the GDN-ext and the entire DDI-EXT list to the
IMS core.(The configuration of the DDI-EXT list is only applicable to 100/320 Gbps
NT and FX NT)
The NOKIA MSAN cabinet supports ISDN PRA PBXs with a maximum of 10 K
subscribers.
The following E1 interface hunting methods (the method by which an E1 interface is
selected within a Virtual E1 Group upon the receipt of an incoming call attempt) are
supported:
• E1 interface sequential hunting:
Selection of a candidate E1 interface always starts with the same E1 interface and
then follows a fixed order until all E1 interfaces in the E1 cluster have been
searched or a candidate E1 interface is found:
• Forward: fixed order is from low to high (sequential_forward_fl)
• Reverse: fixed order is from high to low (sequential_reverse_fl)
• Fully Loaded: The next E1 interface in the ordered series of E1 interfaces is selected
if all B-channels of the one used last are busy.
• E1 interface cyclic hunting:
Selection of a candidate E1 interface always starts at the next in the ordered
series of E1 interfaces following the one used last, and follows a fixed order. When
the first/last E1 interface in the E1 cluster is reached, the search continues from
the end/beginning of the E1 cluster until all E1 interfaces in the E1 Cluster have
been searched:
• Forward: fixed order is from low to high (cyclic_forward)
• Reverse: fixed order is from high to low (cyclic_reverse)
• E1 interface random hunting:
Selection of a candidate E1 interface from across the entire search space (the E1
cluster) using a uniform probability distribution. Each future selected E1 interface
is independent of the selected E1 interfaces that come before it in that same E1
cluster.
In case the randomly selected E1 interface cannot handle the call, the selection
of a new candidate E1 interface starts at the next in the ordered series of E1
interfaces following the one being randomly selected, and follows a fixed order.
When the first/last E1 interface in the E1 cluster is reached, the search continues
from the end/beginning of the E1 cluster until all E1 interfaces in the E1 Cluster
have been searched.
• Forward: fixed order is from low to high (random_forward)
• Reverse: fixed order is from high to low (random_reverse)
The same E1 interface selection mechanism applies to all Virtual E1 Groups of an
E1 Cluster.
The MSAN allows to configure ISDN PRA Termination Line Identifier Profile:
pra/Channel/Port/Slot/Frame/Rack/Access_Node_ID
Where:
• <pra> is a fix ed prefix
• <channel> uniquely identifies each of the ISDN-PRA B channels,
• <Port> uniquely identifies the port at the ISDN PRA voice LT board
• <Slot> uniquely identifies the slot id of the ISDN PRA voice LT board
• <Frame> uniquely identifies the shelf in which the ISDN PRA voice LT board is
equipped
• <Rack> uniquely identifies the rack in which the shelf is equipped
• <Access_Node_ID> uniquely identifies the node
The MSAN allows to display the SIP User Contact Info (The SIP Line Id Syntax
Pattern cannot be configured as 'PhysicalLineId' when the ISDN PRA SIP
termination is configured on top of multiple E1 interfaces) as well as, at any moment
in time, the number of B-Channels that are in use or in idle state for a ISDN PRA
termination (Number of B-channels depends on the number of E1 interfaces that are
associated with the ISDN PRI SIP termination).
In case of explicit registration, the register failure alarms can be raised for the
GDN-EXT as well as for the DDI-EXTs.
Scenario 2 (DDI):
• Multiple AORs to be registered for an ISDN PRA SIP termination supporting DDII,
that is enabling a subscriber to directly call another subscriber on an integrated
services private branch exchange or other private system without attendant
intervention.
The MSAN generates a SIP REGISTER request using a mutually agreed GDN-EXT
(typically based on the PBX's main attendant-/reception-desk number). The
GDN-EXT is often in the domain of the Service Provider, and both the To and From
URIs used for the REGISTER request identify that GDN-EXT. In all respects, it
appears on the wire as a "normal" SIP REGISTER request, however, it implicitly
registers all DDI-EXTs associated with the PBX.
The 200 OK response to the REGISTER request, sent after a successful
authentication challenge, contains one or multiple P-Associated-URI (PAU)
[RFC3455] header fields listing the other SIP URIs or TEL URIs (that is phone
numbers) of the PBX, which are the implicitly registered DDI-EXTs.
The registered DDI-EXTs are in the P-associated-URI via exhaustive list or using a
wildcard.
As the MSAN SIP stack limits the maximum number of header fields in a SIP
message, the exhaustive list of implicitly registered DDI-EXts that can be contained
in a REGISTER response is limited. (Regardless of the implicitly registered
DDI-EXTs returned in different P-Associated-URI header fields or returned as
different values in a single P-Associated-URI header field, each implicitly registered
DDI-EXT is counted as a separate header field).
The MSAN SIP supports up to 80 implicitly registered DDI-EXTs that can be returned
in the REGISTER response. If the number of implicitly registered DDI-EXTs would
exceed 80, it is suggested to use the wildcard instead of using exhaustive list.
A "wildcard" syntax model is defined [3GPP.23.003], that uses a regular expression
syntax in the user field of the URI to express multiple DDI-EXTs in a compressed
manner.
The registered reachability information from the REGISTER request will be used to
reach not only the single explicitly registered GDN_EXT but also each of the implicitly
registered DDI-EXTs.
If there is more than one sip phone extension contained in the P-Associated-URI
header (explicit list of implicit registered DDI-EXTs or wildcard ), then the ISDN PRA
SIP termination will be treated with DDI enabled.
If there is only one phone extension found in the P-Associated-URI header or even
no P-Associated-URI header, the ISDN PRA SIP termination will be treated with DDI
disabled.
The MSAN allows to display DDI-EXTs returned in the 200 OK response to the
Register request. The DDI-EXTs are displayed with the same format as returned in
the P-Associated URI header.
The entire SIP Registration method is in compliance with RFC3261 and RFC5947.
The ISDN Layer1/Layer2 status does not have an influence on the ISDN PRA SIP
termination register status. The ISDN PRA SIP register status can be "up" even if the
ISDN layer1 status is inactive.
Information Element. Upon the receipt of the SENDING COMPLETE indicator, the
MSAN sends the CALL PROCEEDING message to the user and stops collecting
digits.
The interworking requirements for the basic call service are specified in TS 183 036.
14.5.11.1 Codecs
The MSAN supports the following codecs for the basic call:
• G.711 A/u law (10ms, 20ms, 30ms packetization length), including support for
• Packet Loss Concealment (PLC)
• Support of Silence suppression by using Voice Activity Detection (VAD) and Comfort
Noise Generation (CNG).
• G.729AB (10ms, 20ms, 30ms, 40ms, 50ms, 60ms packetization length)
• G.723.1 (5.3kbps, 6.3kbs, with 30ms packetization length)
• Detection of the 2100 Hz (with periodic phase reversals) echo canceller disabling
tone (ANS or ANSam tone) to identify a data modem call or a V.34-modulated fax
call; in compliance to GR-909 Sec. 5.2.1.5.3, R5-17.
• Disable voice band echo cancellers upon detection of a 2100 Hz tone (with
periodic phase reversals); in compliancy to GR-909 Sec. 5.2.1.3, R5-10.
• CNG detection upon the receipt of a 1100 Hz tone [0.5 sec. ON; 3 sec. OFF] in
compliancy to T.30.
• Support for automatic upspeed to G.711 when fax and data modem tones are
detected.
• Detection of 2225 Hz Bell 103 modem tone, used with security panels and other
very low bit rate devices, with automatic upspeed to G.711.
• Detection of 2300 Hz tone causing automatic disabling RFC 2833 DTMF transport
if it was active during the call.
• In the transition from voice to T.38, the ability to re-use the audio media stream
and UDP port for the T.38 image media stream.
• In the transition from T.38 to voice, The same UDP port used with the T.38 image
media shall be used with the SDP offer for the audio.
• Transition to T.38 upon detection of V.21 flags received at the POTS port.
• Fax: V.21, V.17, V.27 ter, V.29, V.34 compliance.
• Modem (or textphone): V.18, V.21, V.22, V.22bis, V.23, V.32, V.32bis, V.32ext,
V.34,V.90, V.92, Baudot, Bell103, Bell 212A, V.25/V.8/V.8bis compliance.
• Configurable T.38 Error Correction Mode (ECM): enable / disabled.
• When T.38 ECM is disabled, the system intercepts the analog DIS/DTC signal
received from the fax terminal and resets the ECM (Error Correction Mode) bit (bit
#27).
• When T.38 ECM is enabled. the system transmits the T.4 ECM packet in smaller
packets in accordance to the provisioned packetization time.
* Put the channel in ECM mode (set the ECM bit #27)
* When the parameter T38_ECM_Ptime is set to 0, the T.38 channel will transmit the
T.4 ECM packet as one packet.
* when the parameter T38_ECM_Ptime is set to a value <> 0, then the system
transmits the T.4 ECM packet in smaller packets in accordance with the provisioned
packetisation time (20, 30, 40 ms).
Service Description
CW Call Waiting
CH Call Hold
CR Call retrieve
MCID Malicious Call Identification
NP Number Portability
The following services are fully transparent for the ISAM access node:
• Outgoing call Barring
• Three Party Call
• Number Portability
• Call Waiting
Thus: PANI-header not included ACK, (response to) CANCEL, 100 Trying,
(response to) session refresh request.
Following formats are supported:
• Format 1:
• Format = P-Access-Network-Info: ADSL; dsl-location="quoted string”
• The PANI header (dsl-location) is based on part of the ISAM System Id and used by
the IMS core to identify the originating access device of a SIP request.
• Format 2:
• Format = P-Access-Network-Info : <AccessType>; dsl-location=
"$LineID;$IPsip;$UserID;;;"
• The PANI header (dsl-location) is based on part of the ISAM Termination Line Id.
Authentication by the IMS core is based on IMPU (=RN) (From) & Access-Id (PANI
Line-Id)
• Format 3:
• Format = P-Access-Network-Info: <AccessType>; dsl-location=
"line-id=<MSAN-SIP-IP>;cc=39;oc=204;lac=<MSAN-LAC>;ali=;";network-provided
3 A SIP request gets accepted on the condition that it originates from one of the
SIP first hop servers that are maintained in the locally created SIP first hop server
White List. This “White List” includes all configured (IP@, FQDN, DN) and
administratively enabled SIP first hop servers (primary + secondary) in the SIP
Server Table (SIP MIB).
A SIP request received from SIP first hop server other than the SIP first hop
servers appearing in the White List is rejected with response code “403”.
The system allows to check the origin of a received SIP response message.
A SIP response message gets dropped if it does not originate from the Active SIP
server / a SIP first hop server appearing in the White List.
14.6.1 General
The MSAN supports eight E1 CAS R2 interfaces at a CAS R2 voice LT board.
The CAS R2 voice LT board behaves as "stand-alone" meaning that the E1 loop is
directly connected to the end-user.
The CAS R2 protocols are terminated at the voice LT board. See Figure 187.
,3 ,3
T T
, ,
One CAS R2 termination per E1 port (E1 loop). All users behind the CAS R2
termination share the same set of services.
There can be only one signaling entity present at the E1 port.
Supported features:
• Implicit SIP registration
• Basic Call (Originating & Terminating)
• En-bloc dialing
• Direct Dialing In (DDI)
• Codecs : G.711, G729/G.723.
• Play Ring-Back Tone
• Play Busy Tone
No 2833 payload type will be included in SDP offer and answer. Always send DTMF
and telephone event tones by audio.
Where:
• <r2> is a fix ed prefix
• <channel> uniquely identifies each of the B channels,
• <Port> uniquely identifies the port at the CAS R2 voice LT board
Scenario 2 (DDI):
• Multiple AORs to be registered for a SIP CAS R2 termination (E1 interface)
supporting DD, that is, enabling a subscriber to directly call another subscriber on
an integrated services private branch exchange or other private system without
attendant intervention.
The MSAN generates a SIP REGISTER request using a mutually agreed SIP AOR
(typically based on the PBX's main attendant-/reception-desk number). The AOR is
often in the domain of the Service Provider and both the To and From URIs used for
the REGISTER request identify that AOR. In all respects, it appears on the wire as a
"normal" SIP REGISTER request, however, it generally implicitly registers other
AORs associated with the PBX.
After receiving the complete R2 signaling information from the originating R2 peer,
that is the Calling Party Number, Calling Party's Category and Called Party Number,
the ISAMV shall send an INVITE.
Trunk idle - - 1 0 1 0 -
Call establishment - - 0 0 1 1 -
in progress
Call established - - 0 0 0 1 -
Call established Charge signal Backward 0 0 1 1 Pulse of (150 +/- 30ms) in the
charging bit ab that goes from "0' to "1"
Disconnection Backward 1 0 1 0 -
acknowledgement
signal
(1 of 2)
(2 of 2)
Group I Group II
9 DIGIT 9 SPARE
10 DIGIT 0 SPARE
11 ORIGIN ECHO SEMI-SUPRESSOR TRANSFERRED CALL
INSERTION
(1 of 2)
Group I Group II
14 DESTINATION ECHO SPARE
SEMI-SUPRESSOR INSERTION OR
INTERNATIONAL TRAFFIC
INDICATION
(2 of 2)
Use-case 2:
Table 50 Supported R2 Interregister Signals (Forward, use-case 2)
Group A Group B
4 CONGESTION CONGESTION
10 SPARE SPARE
12 SPARE SPARE
Use-case 2:
1 SEND GROUP I SIGNAL SUBSCRIBER LINE SEND GROUP III SIGNAL FIRST
SEND NEXT DIGIT FREE, AND NEXT DIGIT FOR SIGNAL
CHARGE AND CHANGE TO RECEPTION
OF GROUP A
2 SEND GROUP I SIGNAL SUBSCRIBER LINE BUSY SEND GROUP I SIGNAL FIRST
SEND NEXT DIGIT DIGIT AND CHANGE TO
RECEPTION OF GROUP A
14.6.7.5 Codecs
The MSAN supports the following codecs for the basic call:
• G.711 A/u law (10ms, 20ms, 30ms packetization length), including support for
• Packet Loss Concealment (PLC)
• Support of Silence suppression by using Voice Activity Detection (VAD) and Comfort
Noise Generation (CNG).
• G.729AB (10ms, 20ms, 30ms, 40ms, 50ms, 60ms packetization length)
• G.723.1 (5.3kbps, 6.3kbs, with 30ms packetization length)
• CNG detection upon the receipt of a 1100 Hz tone [0.5 sec. ON; 3 sec. OFF] in
compliancy to T.30.
• Support for automatic upspeed to G.711 when fax and data modem tones are
detected.
• Detection of 2225 Hz Bell 103 modem tone, used with security panels and other
very low bit rate devices, with automatic upspeed to G.711.
• Detection of 2300 Hz tone causing automatic disabling RFC 2833 DTMF transport
if it was active during the call.
• In the transition from voice to T.38, the ability to re-use the audio media stream
and UDP port for the T.38 image media stream.
• In the transition from T.38 to voice, The same UDP port used with the T.38 image
media shall be used with the SDP offer for the audio.
• Transition to T.38 upon detection of V.21 flags received at the POTS port.
• Fax: V.21, V.17, V.27 ter, V.29, V.34 compliance.
• Modem (or textphone): V.18, V.21, V.22, V.22bis, V.23, V.32, V.32bis, V.32ext,
V.34,V.90, V.92, Baudot, Bell103, Bell 212A, V.25/V.8/V.8bis compliance.
• Configurable T.38 Error Correction Mode (ECM): enable / disabled.
• When T.38 ECM is disabled, the system intercepts the analog DIS/DTC signal
received from the fax terminal and resets the ECM (Error Correction Mode) bit (bit
#27).
• When T.38 ECM is enabled. the system transmits the T.4 ECM packet in smaller
packets in accordance to the provisioned packetization time.
* Put the channel in ECM mode (set the ECM bit #27)
* When the parameter T38_ECM_Ptime is set to 0, the T.38 channel will transmit the
T.4 ECM packet as one packet.
* when the parameter T38_ECM_Ptime is set to a value <> 0, then the system
transmits the T.4 ECM packet in smaller packets in accordance with the provisioned
packetisation time (20, 30, 40 ms).
Service Description
Thus: PANI-header not included ACK, (response to) CANCEL, 100 Trying,
(response to) session refresh request.
Following formats are supported:
• Format 1:
• Format = P-Access-Network-Info: ADSL; dsl-location="quoted string”
• The PANI header (dsl-location) is based on part of the ISAM System Id and used by
the IMS core to identify the originating access device of a SIP request.
• Format 2:
• Format = P-Access-Network-Info : <AccessType>; dsl-location=
"$LineID;$IPsip;$UserID;;;"
• The PANI header (dsl-location) is based on part of the ISAM Termination Line Id.
Authentication by the IMS core is based on IMPU (=RN) (From) & Access-Id (PANI
Line-Id)
• Format 3:
• Format = P-Access-Network-Info: <AccessType>; dsl-location=
"line-id=<MSAN-SIP-IP>;cc=39;oc=204;lac=<MSAN-LAC>;ali=;";network-provided
The system allows to check the origin of a received SIP response message.
A SIP response message gets dropped if it does not originate from the Active SIP
server / a SIP first hop server appearing in the White List.
ETH/IP/MPLS
ISA M ETH/IP/MPLS
DTE/DCE
e1
Wir
udo
SHDSL
16x G.SHDSL
NT
LT Board
Pse
(PTM/ATM)
oP SN e2
Wir
C ES
PTM
do
Business and seu
NP
ATM
S
o P e3 DTE/DCE
customer C ES Wir
8x G.SHDSL
udo
environment (PTM/ATM/TDM) PTM N Pse
2 T
oPS
ATM D C ES
TDM TDM M
l
CPE*
.s hds
M/G DTE/DCE
DTE/DCE TD T
D
E1
Le M TDM bus
as
ed 4x 2xE1
Lin
e E1 front
ISDN PRA
cable
LT Board
LL -
PBX IW
1 4x 2xE1
The ISDN PRA LT board allows to terminate Nx64 E1 Leased Line in the ISAM node:
• 8xE1 baseband interfaces (G.703/G.704).
• 1 Nx64 E1 Leased Line per E1 interface.
• 1 E1 interface per CESoPSN Pseudo Wire.
14.9.1 Megaco
• RFC768, RFC791, RFC792, RFC826, RFC894, RFC919, RFC920, RFC950,
RFC1157, RFC2327, RFC2960, RFC3057, RFC3389, RFC3550, RFC4233,
RFC4734
• IEEE Std 802.3, IEEE Std 802.1Q, IEEE Std 802.1P
• ITU-T Study Group 16: H.248.1v2, H.248.1v3 annex F, H.248.2, H.248.3,
H.248.8, H.248.11, H.248.14, H.248.16, H.248.23, H.248.26, H.248.27,
H.248.34, H.248.45
• ITU-T Study Group II: Basic Call Progress Tones Generator with Directionality,
Expanded Call Progress Tones Generator Package, Basic Services Tones
Generation Package.
• ITU-T Recommendation Q.921, ITU-T T.38 Recommendation fax over IP,
• ITU-T recommendation V.23 (FSK), ITU-T recommendation Q.552: Transmission
characteristics at a 2-wire analogue interface of digital exchanges
• ITU-T Recommendation Q.1950: Bearer independent call bearer control protocol,
• ITU-T Recommendation V.152: Procedures for supporting voice-band data over
IP networks
• ITU-T I.603 SERIES I: INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
Maintenance principles; Application of maintenance principles to ISDN basic
accesses
• Telcordia Bell 202 (FSK)
• ETSI EN 300 659-1 V1.3.1 DTMF for on-hook data transmission
• ETSI EN 300 659-1 V1.3.1, ETSI EN 300 659-2 V1.3.1, ETSI EN 300 659-3
V1.3.1: Subscriber line protocol over the local loop for display (and related)
services.
• ETSI EMC 300 386 v1.3.1: Electromagnetic Compatibility Requirements
• ETSI ES 283 002: H.248 Profile
• Telcordia recommendation GR-30 LSSR: “LSSR: Voice band Data Transmission
Interface (FSD 05-01-0100)”, 1998
• Calling Line Identification service SIN 227, issue 3.2. British Telecom
specification, 2002
14.9.2 SIP
• RFC768, RFC791, RFC792, RFC950, RFC919, RFC920, RFC2131, RFC2327,
RFC2833, RFC2976, RFC3261 (ETSI TS102 027-1), RFC3262, RFC3263,
RFC3264, RFC3265, RFC3311,RFC3321, RFC3323, RFC3325, RFC3326,
RFC3389, RFC3515, RFC3550, RFC3551, RFC3665, RFC3680, RFC3725, RFC
3842, RFC3891, RFC3892, RFC3959, RFC3960, RFC4028, RFC4244,
RFC4780, RFC5009, RFC5366, RFC5806
• Draft-kaplan-sip-session-id-02: A Session Identifier for the Session Initiation
Protocol (SIP)
• Draft-ietf-sipping-sip-offer/answer: SIP (Session Initiation Protocol) Usage of the
Offer/Answer Model
• ITU-T Recommendation V.152: Procedures for supporting voice-band data over
IP networks
• 3GPP ETSI TS 23.167: IP Multimedia Subsystem (IMS) emergency sessions
• 3GPP ETSI TS 23.228: IP Multimedia Subsystem (IMS)
• 3GPP ETSI TS 24.228: Signalling flows for the IP multimedia call control based
on Session Initiation Protocol (SIP) and Session Description Protocol (SDP)
• 3GPP ETSI TS 24.229: IP multimedia call control protocol based on Session
Initiation Protocol (SIP) and Session Description Protocol (SDP)
• 3GPP ETSI TS 24.406: Message Waiting Indication (MWI)
• 3GPP ETSI TS 24.407: Originating Identification Presentation (OIP) and
Originating Identification Restriction (OIR)
• 3GPP ETSI TS 24.408: Terminating Identification Presentation (TIP) and
Terminating Identification Restriction (TIR)
• 3GPP ETSI TS 24.410: Communication HOLD (HOLD)
• 3GPP ETSI TS 24.447: Advice Of Charge (AOC)
• 3GPP ETSI TS 24.504: Communication Diversion (CDIV)
• 3GPP ETSI TS 24.505: Conference (CONF)
• 3GPP ETSI TS 24.529: Explicit Communication Transfer (ECT)
• 3GPP ETSI TS 24.615: Communication Waiting (CW) using IP Multimedia (IM)
Core Network (CN) subsystem
• 3GPP ETSI TS 183.043: IMS-based PSTN/ISDN Emulation
• 3GPP ETSI TS 183.047: NGN IMS Supplementary Services; Advice Of Charge
(AOC)
• Q.931: ISDN user-network interface layer 3 specification for basic call control,
May 1998
• Q.932: Generic procedures for the control of ISDN supplementary services, May
1998
• 3GPP ETSI TS 183.036: TISPAN ISDN/SIP Interworking, Protocol specification,
version 3.4.1, Feb 2011
• ITU-T Q4xx: Specifications of signaling system R2
• ETSI TS 183 036 - TISPAN; ISDN/SIP interworking: Protocol specification
15 Layer 2 forwarding
15.1 Introduction
15.6 iBridges
15.1 Introduction
This chapter focuses on L2 forwarding, consistent with the standards of the Electrical
and Electronics Engineers (IEEE).
Concretely in the ISAM this involves the iBridge and VLAN cross-connect and
E-PIPE forwarding mode.
Note — Strictly speaking, only iBridge and VLAN
cross-connect forwarding modes can be considered as L2
forwarding in term of IEEE context. For practical reasons
however, this chapter will also cover an additional forwarding
mode not really part of L2 forwarding family but still closely
related: PPP cross-connect forwarding. Although PPP
cross-connect mode has distinctive differences with iBridge
and VLAN cross-connect, it has also similarities. See
section “PPP cross-connect mode”.
(priority-)tagged frame
MAC client
dest src 802.1q VLAN
preamble SFD length data + pad FCS
addr addr tag tag
type
7 1 6 6 2 2 2 46...1500 4
By using the frames VLAN tags as VLAN discriminator, end-stations and frame
forwarders within a given VLAN have no contact with end-stations or frame
forwarders operating in another VLAN even when they share the same physical
infrastructure. Figure 190 shows an example of VLANs.
Figure 190 Example of VLAN
e VLAN A
on 8
9
c kb i tch 7
Ba
6
Sw 5
4
2
3
VLAN B
1
9
h 8
itc 7
Sw 6 VLAN C
5
4
3
2
1
NNIs
UNIs
EMAN
Forwarder
Instances
ISAM
One will also note that in case of subtending ISAM, the access functionality is spread
over the Hub and Subtending ISAMs. Much of the subscriber related functionality will
obviously be performed in the subtending ISAM, alleviating the hub ISAM
requirements to that respect. For what concerns frame forwarding, the Hub ISAM will
just perform a simpler aggregation of subtending traffic. To reflect the difference in
the handling of subscriber traffic vs. subtended traffic, one has introduced the notion
of UNI (User Network Interface) for the links connected to individual subscribers and
NNI for links connected to subtending ISAMs.
Note 1 — Throughout this document and generally in all ISAM
documentation User and Subscriber are synonyms and are
indifferently used.
Note 2 — Even if features on UNI and NNI sometimes differ, L2
Forwarding concepts apply similarly to UNI and NNI.
Because of this asymmetry, the functions on the subscriber side are generally
different from those on the network side, in particular considering privacy and
security aspects.
Beyond the obvious capability of terminating of DSL and PON circuits, much of the
added value of the ISAM compared with utility Ethernet switches resides in its unique
capability to exploit and preserve the difference between user side and network side,
in particular around L2 forwarding.
L2 Forwarder
Forwarder
Forwarding
Identifier Forwarder
data
(Network Vlan for Interfaces
structures
the NSP Service)
E.g. FDB,
Network VLAN PortTable,
NSP for etc…
Server this NSP Service
Generic
L2 Forwarder
EMAN
It makes use of the following data structures which form its operational context:
• Forwarder Identifier:
This is reflecting the fact that the ISAM typically hosts several instances of L2
forwarders, one per NSP Service. Each L2 forwarder instance operates within the
context of a dedicated network VLAN used to identify the forwarder. Depending
on the network deployment strategy, this VLAN can be identified by one of the
following:
• a single VLAN tag (say C-VLAN): this can be for instance when an NSP only provides
one service, say HSI. The forwarder is then a single tag forwarder.
• a dual tag (say S+C-VLAN): this can be for instance when the S VLAN tag identifies
a multiservice-NSP and the C VLAN tag identifies a given service offered by this NSP
(alternate VLAN tag usage are possible as well, e.g. where the C VLAN tag identifies
the individual subscriber rather than a service). The forwarder is then a dual tag
forwarder (sometimes also called a stacked forwarder).
Some L2 Forwarding properties can generally be configured at L2 forwarder level
(e.g. vMAC, downstream broadcast traffic enable, secure forwarding, etc.… see
further)
• Forwarder Interfaces:
Forwarder Interfaces are the access points of the forwarder to the external world,
typically the subscribers and the NSPs. It is through these Interfaces that the
forwarder receives or transmits frames.
Some L2 Forwarding properties can generally be configured on an individual
interface basis (e.g. VLAN Translation,… see further)
• Forwarding Data Structures:
This is the means by which the forwarder knows to which egress forwarder
interface a frame should be directed to. This data structure typically consists in an
FDB (Forwarding DataBase) containing the associations between MAC address
and the VLAN ports on which they were learned (or statically configured).
It should be emphasized that consistent with the concept of VLAN isolation seen in
section “VLAN Tagging as a Means to support Virtual LAN (VLAN)”, each L2
forwarder has its own private context. For instance, a L2 forwarder interface cannot
belong to two L2 forwarders and each L2 forwarder has its own private FDB.
The iBridge is derived from the standard self-learning IEEE 802.1q-Bridge which
makes use of destination MAC addresses lookup to discriminate subscribers from
each other. A standard bridge however is not suitable for residential DSL access
because it lacks a number of essential security and privacy features. Adding those
features turns a standard bridge into an iBridge (also known as Intelligent Bridge).
Since the ISAM has the notion of user side and network side, it has the capability to
deviate from a normal standard bridge in particular in term of controlling traffic
switching (or flooding) and controlling MAC address learning.
On the other side, due to its very 1:1 nature a VLAN cross-connect does not rely on
MAC address lookup to identify a given subscriber, the network VLAN ID is sufficient.
Note however that in case of several uplinks, an FDB is still needed for the VLAN
cross-connect to find out the right uplink. So actually, a VLAN cross-connect usually
exhibits a bridge behavior on the network side.
Although privacy is not as a concern as for iBridges, VLAN cross-connects are also
aware of user side versus network side for other access related features (e.g. DHCP
Opt82).
A typical VLAN cross-connect is shown in Figure 193.
Network VLAN
for User Vlan
NSP FDB
this NSP Service (19)
Server
(17)
VLAN Cross-Connect (17)
EMAN
Because they are both affiliated to the same L2 Generic forwarder iBridges and
VLAN cross-connect follow the same configuration model despite their differences.
Moreover most of L2 access related features apply to both of them as well (e.g. VLAN
translation, DHCP Opt 82, …). This will be further detailed in later sections.
Dual-tag
Network VLAN User VLAN
NSP for this NSP Service FDB (19)
Server (100,19)
EMAN
The ISAM can support these various deployment models by means of the generic L2
concepts detailed in the next section.
• VLAN port:
a VLAN port is a generic tagged Ethernet interface on a bridge port, more
specifically it is only related to the frames tagged with a specific VLAN ID on this
bridge port. In the ingress direction, a VLAN port can be best seen as picking-up
frames with a specific VLAN tag received from the bridge port. For all practical
purposes, a VLAN port is the ISAM implementation of the L2 Forwarder Interface
So in summary, a L2 forwarder interacts with the external world, i.e. subscribers and
EMAN by means of VLAN ports, whatever line technology is used (PVC, EFM,
Ethernet, and so on) and whatever L2 forwarder type, iBridge or VLAN
cross-connect.
In Figure 195 below, one VLAN port is created for each service on a given
subscriber's line.
Similarly, if VULA uplinks are used for interfacing the ISAM with the network,
VlanPorts are also created on these VULA uplinks.
Figure 195 L2 multiservice by means of VLAN ports
VlanPort
L2 Fwd1
NSP1 BridgePort
VLAN 1
EFM
NSP2 VLAN 2 L2 Fwd2
VLAN 3
EMAN
NSP3
L2 Fwd3
Figure 196 illustrates some examples on how VLAN ports and bridge ports help to
make abstraction of the line transport technology and frame encapsulation.
PVID Untag_Serv1
PVID Untag_Serv2
PVID Untag_Serv3
PVID
Tag_Serv1
Tag_Serv2
Tag_Serv3
EFM Tag_Serv1
Untag_Serv2 (PPP)
IP-VID Untag_Serv3 (other)
PVID
This partitioning is handy to deal with the ISAM functional asymmetry emphasized at
the beginning of section “The ISAM is an Access Device”
• Subscriber side processing:
This involves the functions related to VLAN ports on the user side. Depending on
configuration:
• support of various underlying user frame encapsulation types, e.g. Ethernet PVCs,
Ethernet VDSL EFM, Ethernet Phy, IPoA PVC, PPPoA PVC,...
• support of various VLAN tagging mode: untagged, priority tagged, single tagged or
multiple tagged
• User VLAN tag manipulations: preserve/translate user VLAN IDs, add (upstream) or
remove (downstream) an extra VLAN tag to a specific user frame.
Note: these VLAN translations are not supported on the GE Ethernet LT NNI
interfaces.
• IPoA to IPoE conversion (see further).
• find out which forwarder instance a received upstream frame has to be submitted to.
This takes place by matching the frame VLAN tag(s) to a VLAN port configured on
the bridge port on which the frame has been received.
Of course, the ISAM performs additional functions on the user side but they are
considered outside the scope of this Chapter because not related or only indirectly
related to L2 Forwarding:
• subscriber management related functions like Opt 82, PPP relay tag, QOS, Filters,…
• redundancy mechanisms like Link Aggregation, Spanning tree,...
• L2 Forwarding:
The role of the L2 forwarder is essentially to decide on which outgoing forwarder
interface(s) an ingress frame has to be sent out. Naturally the iBridge and VLAN
CC use different mechanism to forward frames.
• Network side processing:
This involves the functions related to VLAN ports on network side:
• The ISAM only supports Ethernet frames on the network side: they can be single- or
multiple-tagged (untagged and priority tagged frames are normally never deployed).
• Finding-out which L2 forwarder instance a received downstream stream frame has
to be submitted to.
• Note that no VLAN translation is supported on the network side
Of course, the ISAM performs additional functions on the network side but they are
considered outside the scope of this chapter because not related or only indirectly
related to L2 Forwarding:
• Termination/Relaying of various subscriber or network related protocols (GMP,
DHCP, PPPoE, Routing protocols, OAM, Link aggregation, Spanning Tree …)
• QoS-related functions
To conclude, here is a typical scenario for an operator to establish the connectivity
between subscribers and NSP Servers:
• for each NSP, create an iBridge or VLAN cross-connect L2 forwarder associated
to the NSP's VLAN
• attach network uplinks to the L2 Forwarder(s) (see further for details)
Figure 197 shows an example of multi-VLAN access with VLAN translation. In this
example, there are two VDSL access lines: EFM1 and EFM2. PVCs supporting
multi-VLANs are also shown. Note that this example applies to ADSL, VDSL, P2P
ETH, GPON and XGS-PON / TWDM-PON subscriber access lines.
Figure 197 Multi-VLAN and VLAN translation example
PVC2-VLAN2
Tr
MAC PVC3
GE1-VLAN2 FDB PVC3-VLAN17 DSL
NSP2 Tr
Phy
iBridge EFM1-VLAN2
Tr
Eth EFM1
DSL
Phy Phy
GE1-VLAN3 EFM1-VLAN3
NSP3 Vlan CC Tr
GE1-VLAN4 EFM2-VLAN34
NSP4 Vlan CC Tr EFM2
DSL
Phy
GE1-VLAN5 EFM2-VLAN5
NSP5 Vlan CC Tr
EMAN ISAM
Ethernet
T PVC1_VLAN1
MPLS_PW1 Ethernet
NSP 1 VLAN MAC T PVC2_VLAN1
ports FDB
Ethernet
iBridge T EFM1_VLAN1
Ethernet
T PVC1_VLAN2
MPLS_PW2 VLAN MAC Ethernet
NSP 2 T PVC3_VLAN17
ports FDB
iBridge Ethernet EFM2_VLAN2
T
MPLS_PW3 Ethernet
NSP 3 VLAN CC T EFM1_VLAN3
MPLS_PW4 Ethernet
NSP 4 VLAN CC T EFM2_VLAN34
MPLS_PW5 Ethernet
NSP 5 VLAN CC T EFM1_VLAN5
RGW CPE
N x GE
RGW CPE
2 x GE Or 10G
DPU CP 1
RGW CPE
RGW CPE
Dow nlink OLT VULA
Uplink
DPU N x GE
RGW CPE Or 10G
CP N
RGW ONT
GPON
NGPON2
RGW ONT
The VULA uplink interfaces being untrusted interfaces, they will differ from the
standard uplink interfaces in the sense they will support a very similar L2 forwarding
feature set as the user interfaces, but with a much higher scalability:
• Highly flexible VLAN operations, including the ability to translate VLANs (both
single and dual tagged VLANs)
• Highly flexible QoS operations, allowing to remark and police a large amount of
traffic flows received from the Content Providers and identified by their single or
dual tagged VLANs.
The distributed Layer 2 forwarding in ISAM also applies to GPON and XGS-PON /
TWDM-PON access solutions. In this case, the OLT - ONT sub-system is acting as
a single ISAM LT entity. This is shown in Figure 200.
VDSL
LT
NT
xDSL
GLT-ONT
Eth
POTS
L2 Fwdr
NSP A
L2 Fwdr
NSP B
L2 Fwdr LT
Phy NSP A
L2 Fwdr
Phy NSP A
L2 Fwdr
NSP B
L2 Fwdr
NT NSP B
LT
ISAM
The basic strategy for the layer 2 forwarding data plane is that:
• When subscribers are connected to LT boards (directly or via the ONT), the NT
board forwards downstream frames to the proper LT board(s) and the LT board
forwards downstream frames to the proper subscriber line/VLAN (directly or via
the ONT).
• It is the LT board that implements the difference between the VLAN
cross-connect, the iBridge mode and the stacked iBridge mode. The NT board
behavior is identical for the iBridge and VLAN cross-connect.
Note — When MPLS pseudo-wires are used on the network
side, the NT board can be optimized to directly support
cross-connect forwarding (called E-PIPE service) next to the
regular iBridging (VPLS service)
• The LT board translates user VLAN into network VLAN (optionally). In case of
GPON and XGS-PON / TWDM-PON access, there are two alternative modes for
VLAN translation:
• ‘Remote' translation: the ONT translates user VLAN into network VLAN
• ‘Local' translation: the GPON LT translates user VLAN into network VLAN
The configuration of remote or local translation mode is possible at the ONT level.
The default mode is remote translation, that is, VLAN translation performed at the
ONT.
• The NT board behaves as much as possible as a standard bridge (except when
it performs E-PIPE forwarding). However, some restrictions may be required or
desired for a consistent interworking with the specific LT boards forwarding
modes, iBridge or VLAN cross-connect. User security and privacy may also
require specific rules in the NT board, as further developed below.
• In some cases, the operator only wants to accept single-tagged Ethernet frames
from end-users. This is possible by combining VLAN handling on the LT board
with additional filtering on the NT board. The LT board can be configured to use a
forwarding model that adds a second tag to the incoming customer traffic (for
example, S/C VLAN cross-connect). By attaching the VLAN to an SAP on a
VPLS, the NT board can be configured to only accept Ethernet frames having 2
C-VLANs (using Ethertype 0x8100). If the user sends untagged traffic, it will arrive
at the NT board as a single-tagged frame and will be discarded.
• The NT board and the LT board behave as much as possible as two independent
Layer 2 systems. For example, they both will learn and age independently on
MAC addresses. Note that the ageing timer is independent in the NT board and
the LT boards but for proper operation it should be configured identical. There is
one ageing timer common for all LT boards. Note that in case of GPON and
XGS-PON / TWDM-PON, the term "LT" refers to the combination of the line card
plus the ONT, as shown in figure 200
Although the NT board is originally derived from a standard bridge, its behavior will
typically be constrained to fit access network requirements such as for instance
security and privacy. For that purpose the ISAM makes the distinction between ports
facing users and ports facing the EMAN network side:
• Ports connected to subtending ISAMs, to LT boards or directly facing users
instantiate the so-called “user side”. Such ports are considered untrusted.
• Ports connected to the EMAN or directly to service provider equipment (for
example, BRAS) instantiate the so-called “network side”. Such ports are
considered trusted.
With the notion of User side and Network side, the NT board has the capability to
deviate from a normal standard bridge in particular in term of controlling traffic
switching (or flooding) and controlling MAC address learning.
Obviously, when the network VLAN is directly mapped to an NSP, every NT bridge
instance operates within the context of a single distinct VLAN. Only tagged frames
matching the VLAN of a bridge will be handled by that bridge. If the frame is multiple
tagged, only the most exterior VLAN tag is used to determine whether the frame
should be handled by a given bridge or not.
When a frame is received from a pseudo-wire, it is the inner VC label that defines the
NT bridge instance.
Another strategy employed to enable ISAM to participate in a maximum of network
deployments scenarios is to subtend network elements (such as remote ISAM)
directly from the LT, as shown in Figure 202.
UNI port
L2 Fwder
NSP A
L2 Fwder
NSP B UNI port
L2 Fwder LT
NSP A
L2 Fwder
NSP A
L2 Fwder L2 Fwder
L2 Fwder
NSP A
NSP B NSP A
L2 Fwder
L2 Fwder
NSP B L2 Fwder
NT NSP B
NSP B
LT
LT NT
ISAM Subtended ISAM
NNI port
The connection between the Hub ISAM and the subtended ISAM can be over an
Ethernet interface (optical, electrical), or alternatively, over a bonded copper
backhaul interface.
Figure 203 Three stage forwarding for ISAM operating as a VULA node
L2 Forwarder
From 3FQ-90082-0062-DTZZA
Phy Link
Vlan19
L2 Fwdr
Vlan19
L2 Fwdr
Vlan19 L2 Fwdr
Phy Link
L2 Forwarder
Vlan23
or LAG Uplink LT
L2 Fwdr
L2 Fwdr Vlan23
Vlan 23
L2 Fwdr
Vlan19
L2 Fwdr
L2 Fwdr
L2 Forwarder
Vlan47
Vlan 47
Vlan47
L2 Fwdr
Vlan47
ISAM NT
Downlink LT
ISAM
Logical view Actual Implementation
Though the ISAM operating in VULA mode is supporting all forwarding models from
a black box point of view, the actual forwarding at the uplink LT is currently simplified,
that is, all forwarders are internally converted into "transparent VLAN
cross-connects" by the uplink LT data plane. Practically speaking, this means that
the traffic received from the Content Providers is directly passed to the NT (after
potential VLAN/QoS manipulation) only based on the VLAN tag(s) without any other
forwarding processing, that is:
• There is no MAC learning and consequently, no MAC based forwarding and/or
limit
• There is no subscriber related protocol handling like DHCP, PPP, IGMP.
One can see the "VULA uplink" as a kind of NT interface enhanced with extra
QoS/VLAN features: the traffic is passed from the Content Provider to the NT card,
where the standard processing described in the previous paragraph applies again
(VLAN bridging, VLAN cross-connect, protocol handling, …)
• Ports connected to subtending ISAMs, to LT boards or directly facing users
instantiate the so-called “user side”. Such ports are considered untrusted.
• Ports connected to the EMAN or directly to service provider equipment (for
example, BRAS) instantiate the so-called “network side”. Such ports are
considered trusted.
This current simplification of the uplink LT forwarding introduces the restriction that
a Content Provider cannot be connected through dual homed interfaces using L2
resilience techniques (dual homing or ring using MSTP or G.8032 ERPS).
Note — Dual homing or ring configurations are possible using
IP routing at the NT but this is in contradiction with the L2
paradigm defined by the VULA concept
RB
VLAN 19
Regular v-VPLS on v-VPLS Residential
Ports network VLAN SAPs Ports
RB
VLAN 23
v-VPLS LT
Phy VLAN 19
RB
Phy VLAN 19
v-VPLS
VLAN 23
RB
NT_IHUB VLAN 23
LT
ISAM_IHUB
To configure a bridge for a given VLAN in the NT, the operator needs to:
• Create a v-VPLS operating in this VLAN
• Configure SAPs on this v-VPLS for each appropriate Regular or Residential port
C 11
v-VPLS C-VLAN CC
VLAN CC
VLAN 11
S17 +C23
v-VPLS S+C-VLAN CC
VLAN CC
VLAN 17
LT
(No VLAN translation
shown on user side)
S 13
v-VPLS S-VLAN CC
VLAN 19 VLAN CC
LT
NT
C-, S+C- or
ISAM S-VLAN CC
RB
Residential
VLAN 19
Network VPLS access
ports VPLS SAPs ports
RB
VLAN 23
VPLS LT
NSP_a
Phy PW NSP_a
MPLS tunnel
RB
NSP_b Phy VLAN 19
VPLS
Wholesale provider NSP_b
access point
RB
NT VLAN 23
Mapping of MPLS tunnel
on physical network port is LT
not shown
ISAM
Generally speaking, similar to the direct Network VLAN encapsulation, the iBridge
configuration model is applicable as well to the case of VLAN cross-connect except
for the LT configuration. The case of C-VLAN can however be optimized as shown
in section “VLAN Cross-connect Configuration Model with MPLS Pseudo-wire
Encapsulation and E-PIPE”.
Note — In general, it is not possible to combine an MPLS
pseudowire with another VLAN bridged or IP routed service on
the same physical port. However, starting from ISAM R5.2.01,
it is possible to configure an ISAM uplink port in "network mode"
for MPLS services, and also support PIM-SSM multicast
routing on the same port. In this model it is not needed to create
a separate VLAN or L2 SAP on the interface. In other words, an
IP routed IES service is configured but instead of having to
create a separate v-VPLS, the PIM-SSM routing is natively
supported on the uplink interface. In this model, the IES can
implicitly use the base L3 interface to forward multicast traffic.
Residential
Network EPIPE access
EPIPE C-VLAN
ports SAPs ports
CC
VLAN 19
EPIPE LT
NSP_a
Phy PW NSP_a
MPLS tunnel
NSP_b Phy
EPIPE S-VLAN
Wholesale provider NSP_b CC
access point
VLAN 23
NT
Mapping of MPLS tunnel
on physical network port is LT
not shown
ISAM
VLAN-CC VLAN 1
DSL
VPLS VLAN x
LT n
VLAN-CC VLAN 2
VLAN-CC VLAN 3
DSL
l2fwder-vlan
Downlink LT NT Uplink LT
l2fwder-vlan
Downlink LT NT Uplink LT
UNI S+ C UNI
S+ C S
NNI Zoom NNI
UNI S S+ C UNI
S+ C S+ C
Downlink
C-CC No No No No No No
C-RB No Yes No No No No
S-CC No No No No No No
Uplink
C-CC Yes No No No No No
C-RB No Yes No No No No
In order to achieve fine grain VLAN/QoS processing combined with a high scalability,
the 10GE Ethernet supports stacked VlanPorts on its interfaces, that is the VlanPort
is now defined by the combination of the S-VLAN and C-VLAN tags. When using a
stacked VlanPort, the VLAN/QoS processing now focuses on the S+C VLAN flow,
the C-VLAN tag becoming the reference for QoS operations.
Uplink Fwd
The operator can configure each PVC in such a way that either:
• one single encapsulation only is allowed on the PVC. This is called static
encapsulation mode. Only the frames matching this encapsulation will be
accepted.
• several encapsulations are allowed on the PVC. In this case, the PVC works in
auto-detect encapsulation mode: the ISAM adapts itself to the encapsulation
selected by the CPE. If the encapsulation of the received frame matches one of
the allowed encapsulations, the frame is accepted. Otherwise, the frame is
discarded. This mode allows the subscriber to change his CPE without requiring
the operator to reconfigure the ISAM.
Of frame tag or
Managed
VLAN port PVID if untagged VLAN port (from PVID) by IWL
frame
3, 4
DSL line
Ethernet MAC larger subscriber Ethernet payload
specific
DA, SA,
SA Qtags, Type/Length, FCS
Edge
1 2 3, 4
MPLS & larger subscriber Ethernet payload
Ethernet MAC (with additional VLAN tags)
other blue sky
DA, SA, Qtags, type/length, FCS
15.6 iBridges
For the sake of clarity, this section only considers the case of network VLAN
encapsulation directly mapped to NSP. This discussion can however be generalized
to the cases where MPLS pseudo-wire encapsulation is used instead.
A stacked VLAN iBridge is considered to be a VLAN aware bridge, where each N:1
VLAN (S-Bridge) is a separate Virtual Bridge (VB) instance. Each VB performs
independent source MAC address learning and frame forwarding processing.
The ISAM with a stacked VLAN iBridge offers two modes of operations:
• S+C iBridge; and
• S-iBridge
The S+C iBridge mode allows C-VLAN tag operations, such as C-VLAN translation,
in addition to adding/removing an S-VLAN header. This forwarding mode requires
the operator to configure a VLAN port for each C-VLAN.
The S-iBridge mode supports two sub-modes of operation:
• S-Tunnel iBridge mode
• S-VLAN mapped mode.
The S-Tunnel iBridge mode allows the operator to minimize provisioning by creating
a tunnel VLAN port on a specific bridge port. On this bridge port all tagged / untagged
customer frames which match the tunnel VLAN port are encapsulated by an S-VLAN
header.
The S-VLAN mapped mode is used on Hub-ISAM NNI ports. See “VLAN tagging
modes in the iBridge (Hub-ISAM LT NNI ports concept)” for further details.
Note 1 — The GPON, XGS-PON / TWDM-PON and P2P
Ethernet LTs allow the same S-VLAN ID to be shared between
an S-iBridge and S+C iBridge or S+C cross-connect. For other
interfaces, S-VLAN ID cannot be shared between S+C iBridge
and S- iBridge.
Note 2 — The S-tunnel iBridge mode is currently supported on
GPON access solutions. It is also supported on the NNI ports
of the Ethernet LTs. It is currently not supported on the
XGS-PON / TWDM-PON access solution.
Note 3 — The S-VLAN mapped mode is supported on the NNI
ports of the GPON, XGS-PON / TWDM-PON, GE/10GE
Ethernet LTs, on the NNI ports of LTs supporting bonded
copper backhaul and on the VULA uplinks.
This behavior is also true when the iBridge mode is used to forward traffic from
Hub-ISAM LT NNI ports: All upstream traffic will be sent towards the network and
never to another NNI port.
configured to do so, the multicast frames from the network will be broadcasted to all
users. As for the handling of broadcast packets (see “Prevention of broadcast
problems”), there are the two modes available: using the incidental broadcast GEM
port, or using the dedicated GEM port of each member port in the VLAN. As for the
broadcast traffic, the multicast traffic is placed on the dedicated incidental
broadcast/multicast queue on the PON, and there exists the option to shape this
queue.
The following different multicast protocols forwarding controls are possible:
• Allow, upstream and downstream, IPv4 multicast traffic on user ports
• Allow, upstream and downstream, IPv6 multicast traffic on user ports
• Allow, upstream and downstream, Ethernet multicast traffic on user ports
• Allow, upstream and downstream, Protocols specific multicast traffic on user ports
This control is ignored for NNI ports, in which case the behavior depends on whether
there is any multicast VLAN configured on the NNI port. If no multicast VLAN is
configured, then IPv4 multicast traffic will be forwarded. If a multicast VLAN is
configured, then IPv4 multicast traffic will be forwarded according to the multicast
tree structure (i.e. if the corresponding multicast stream has been joined on the NNI
port). Note however that group addresses in the range 224.0.0.0/24 will always be
forwarded.
This control is ignored for NNI ports where IPv6 multicast traffic is always forwarded.
This control is ignored for NNI ports where Ethernet multicast traffic is always
forwarded.
This control is ignored for NNI ports where protocol specific multicast traffic is always
forwarded.
Other upstream frames, including multicast data frames, will be discarded (see
section “Protocol Specific Multicast traffic control” on multicast traffic control).
In the context of hub-ISAM LT NNI ports, in iBridge mode, only the following frame
types are accepted from the NNI ports:
• IP over Ethernet (IPoE) (IPv4)/ARP/Reverse Address Resolution Protocol
(RARP)
• IPv6 over Ethernet (IPv6oE)
• PPPoE
• all Ethernet types
Other frames, including multicast data frames, will be sent towards the network and
never to another NNI port.
Sharing the same VLAN between two ISAMs would allow inter-ISAM user-to-user
traffic to by-pass the NSP, which is undesirable. Figure 213 details this scenario:
• The Ethernet switch will learn all subscriber MAC addresses. If subscriber A can
obtain the MAC address of subscriber C, then subscriber A can send traffic
directly to subscriber C without the traffic going to the NSP IP router. This is direct
user-to-user communication and should be prevented in iBridge mode.
• In such a configuration, an ISAM would receive all broadcast/flooded frames from
any ISAM in the VLAN. This causes potential performance problems and should
not be allowed in iBridge mode.
A
EMAN
B VLAN
NSP
ISAM 2
An operator may still choose to deploy such a configuration for VLAN scalability
reasons. In these scenario's care must be taken to prevent undesirable user-to-user
traffic by:
• enabling split horizon functionality in aggregation network, or
• enable vMAC on ISAMs and use vMAC filters at the ISAM to discard ingress
network traffic with vMAC source addresses.
F
UNI
A
UNI
S-ISAM 1
NNI
NSP IP B
EMAN
Backbone UNI
C
UNI
S-ISAM 1
NNI
D
UNI
• If the MAC address is learned from a residential port, but the same MAC address
is already learned from the EMAN network, the MAC address is not learned and
the frame is dropped (MAC address duplication).
• If the MAC address is learned from a residential port, but the same MAC address
was already on another residential port, the new MAC address is not learned and
the frame is dropped (MAC address duplication).
• If the MAC address is first learned on a residential port, and then learned from the
EMAN network, this movement is accepted and the MAC address is learned. This
means that the MAC address is removed from the residential port (MAC address
movement, that is, the last learned MAC address takes priority).
• If the MAC address is first learned on a subtending, user or internal LT port and
then on another subtending, residential or internal LT port, then the MAC address
is not learned on the second port (that is, no MAC address movement is
performed)
• Well-known MAC addresses (for example, multicast MAC addresses, MAC
addresses allocated for IEEE protocols, and so on) are not learned.
These principles apply also for subtending ports. In this context, a subtending port
behaves at the same level as a residential (user) port.
The committed number of MAC addresses per port is the number of entries reserved
in the forwarding database for that port(not supported by Ethernet GE LT HC-UNI
and NNI ports). This number of entries can be used by the subscriber connected to
that port at all times, that is, independent of any activity of other subscribers. Note
that, for GPON, the committed number of MAC addresses can only be configured at
the UNI level, not at the VLAN port level.
However, if not all the available entries on an LT board have been assigned to a port,
then the remaining entries are dynamically assigned to ports based on MAC address
learning with the protection that the total number of entries per port cannot exceed
the configured maximum number of MAC entries per port.
The ISAM LT boards also provide protection against duplicate MAC addresses in the
VLAN context of the forwarder.
When a frame is received on a subscriber port with a source MAC address which was
already learned on another port for this VLAN, this generates a duplicate MAC
address alarm and:
• On layer 2 LT boards, the frame is discarded and the MAC address is not moved
from the original port. Moreover, the offending end-subscriber PVC gets locked.
The subscriber port is unlocked again (and the duplicate MAC address alarm is
cleared) after a time period equal to three times the MAC address aging time.
• On layer 3, point-to-point Ethernet, GPON/ONT and XGS-PON /
TWDM-PON/ONT LT boards, the frame is discarded and the MAC address is not
moved from the original port. The port carrying the offending frame remains fully
operational for frames received with non-offending source MAC address. The
alarm is cleared after a time period free of MAC address conflict.
• As such, the MAC address learning and the associated duplicate MAC address
alarming does apply to UNI and NNI ISAM LT ports with the same level of
precedence between the two port types.
The GPON LT also supports enabling of MAC movement within the same LT.
Enabling or disabling of MAC movement can be configured per iBridge, with the
default being 'disabled'. The feature is useful to allow a wireless device to move from
one UNI to another within a Wi-Fi 'hot spot'. MAC movement is not permitted
between LTs. Movement is only permitted for dynamically learned MAC addresses,
statically configured MAC addresses are not permitted to move. When MAC
movement is performed, the MAC address is deleted from the old port and relearned
on the new port. In this case no duplicate MAC alarm is raised.
Note — MAC addresses are never learned for VLAN
cross-connects configured on NNI ports of the GE Ethernet LT,
and this independently of the MAC learning mode defined at the
interface level.
Consequently, the maximum amount of MACaddresses that
may be learned per GE Ethernet LT NNI port is only applied for
the iBridge forwarders.
It is important that the MAC aging time is properly configured, otherwise data-plane
connectivity may get lost between the network and the ISAM subscribers (due to the
fact that traffic is not flooded to these subscribers when their MAC address is no
longer present in the forwarding database):
• For PPPoE traffic, the MAC aging time can be kept small, because PPP has a
built-in keep-alive mechanism.
• For DHCP-based service scenarios (IPv4 or IPv6), the MAC aging time must be
taken in the same order of magnitude as the DHCP lease time (unless there is
another time that can be used, for example, an ARP refresh interval with secure
forwarding and ARP relay enabled, an application-layer keep-alive time, and so
on).
The MAC aging time is configurable between 10 s and 1.000.000 s with a default
value of 300 s.
A MAC aging time can be configured per L2 forwarding instance as for some services
the MAC aging time should be kept low, while for other services (for example,
DHCP-based services) the MAC aging time should be increased.
Figure 215 shows the flowchart which provides the formal details about this process.
Figure 215 Finding out the right L2 forwarder for an Ingress Frame
Exists a PVID Do as if Frame
Frame is
Untagged or applicable was tagged with
received on Process frame
Frame ? ProtoVID on BrPort:PVID or Frame Dual-tags
BridgePort Dual-tag by the Dual-tag
Bridgeport ? BrPort:ProtoVID matching a Dual-tagged
Frame ? iBridge/VlanCC
VlanPort on Bridgeport ?
pointed by Vlanport
Discard Frame
Process frame
Frame Outer-tag
by the Single-tag
Matching a Single-tagged
iBridge/VlanCC
VlanPort on BridgePort?
pointed by Vlanport
Discard Frame
? yes
Process frame
Frame Outer-tag
no Single-tag by the Single-tag
Matching a Single-tagged
Frame ? iBridge/VlanCC
VlanPort on BridgePort?
pointed by Vlanport
Discard Frame
The important thing to note in this figure is that in a dual-tagged frame - say with
(100,17) - would match both a dual-tag VLAN port (100,17) and a single-tag VLAN
port (100). The rule is that the dual-tag VLAN port is the only one to consider for this
frame because it is a better match.
Since the VLAN port is at the junction between the external world and the L2
forwarder, it is the VLAN port configuration data which will drive this process. In
figurative terms, “the VLAN port makes the frame fit to the L2 forwarder
environment”.
Of course, the reverse process is done on egress.
Figure 216 illustrates several examples of VLAN tag manipulations on user iBridge
interfaces in ISAM. Remember the following when looking at the figure:
• PVID configuration is systematically indicated but it is optional
• Protocol VID are optional and not indicated in the figure
• PVID and Protocol VID can coexist on the same bridge port
• The figure illustrates one VLAN port per subscriber. Of course, several VLAN
ports could belong to the same subscriber.
(31,13) i-Bridge + VlanId (13) 13, *, Data Single-Tag VlanPort for “VlanId”
- Ut, Data
Tr
PVID with Vlan translation and
NetVlan (31,13) 31, 13, *, Data d FDB31,13 with upstr_add/dwnstr_removal
+- 17, *, Data of extra tag
Tr VlanId (17)
PVID Ut, Data
Dual-tag VlanPort for “VlanId”
d with no tag manipulation
(No VlanPort) 666, *, Data
BP1:PVID = 0,C1
Si,X (any i) or
Ut,Cj (j ≠ 1)
Figure 218 Protocol-based VLAN selection (iBridge shown with only one
subscriber)
Network-side Configured VLAN
User-side traffic
traffic ports
Si,X (any i) or
Ut,Cj (j ≠ 1,2)
• In case of VLAN translation, the network-side and subscriber-side VLAN IDs are
different. iBridging, in combination with VLAN translation, is typically used when a
loose coupling is needed between the C-VLAN IDs used on the access link and
the C-VLAN IDs used in the aggregation network; see Figure 220.
BP1: no PVID
Si,X (any i) or
Ut,Cj (j ≠ 1,2) or
Ut,Ut
Figure 220 Support for VLAN translation (iBridge shown with only one
subscriber)
Network-side Configured VLAN
User-side traffic
traffic ports
BP1: no PVID
Si,X (any i) or
Ut,Cj (j ≠ 3,4) or
Ut,Ut
15.6.5.1 Concepts
The concepts of Bridge Ports and VLAN ports defined on the subscriber side and
used by iBridges and VLAN cross-connects are also valid for stacked iBridge modes.
This forwarding mode resembles the ISAM S+C VLAN cross-connect forwarding
model. The main difference is that in the S+C iBridge mode, the C-VLAN ID can be
shared across multiple UNIs. This is not the case for the S+C cross-connect mode,
whereby a C-VLAN ID is restricted to a single UNI.
Note 1 — The S+C iBridge mode supports both
protocol-unaware and protocol-aware modes of operations. For
example, DHCP option 82 insertion, PPPoE Intermediate
Agent and secure forwarding (ARP Relay, DHCP Snooping, IP
anti-spoofing) are supported for protocol-aware S+C iBridge
access solutions.
Protocol awareness is supported for customer untagged and
single-tagged frames.
Protocol unaware is supported for customer untagged,
single/dual/multi -tagged frames.
In context of GPON and XGS-PON / TWDM-PON access
solutions, some restrictions may apply on the ONT for the
ability to support dual and multi-tagged frames.
Note 2 — A given S-VLAN ID can only be shared between S+C
iBridge and S-iBridge for GPON and XGS-PON / TWDM-PON
access. Other interfaces do not support sharing.
Note 3 — DSL LT boards support stacked iBridge mode for
unicast traffic only.
Note 4 — Multicasting traffic by means of an IGMP proxy is not
supported by stacked iBridges, a standard iBridge must be
used instead.
Note 5 — The following restrictions apply to GE Ethernet LTs:
15.6.6.1 Concepts
The concepts of bridge ports and VLAN ports defined on the subscriber side and
used by iBridges and VLAN cross-connects are also valid for iBridges defined on NNI
ports.
As noted earlier, the Hub-ISAM LT NNI ports concept is currently supported on the
GE and 10GE Ethernet LTs, on the GPON and XGS-PON / TWDM-PON LT and on
LTs supporting bonded copper backhaul. For the GPON LT, the NNI interface
supports connection to the 7353 MDU.
There are three VLAN iBridge models supported on NNI ports:
• C-VLAN iBridge: Basic VLAN bridge mode (as defined in “VLAN tagging modes
in the iBridge”)
• S+C iBridge: As described in “VLAN tagging modes in the stacked iBridge
modes”, but only supported on GPON and 10GE Ethernet line boards.
• S-VLAN iBridge: Supporting Mapped and Tunnel VLAN bridge modes (Tunnel
mode is described in “VLAN tagging modes in the stacked iBridge modes” and a
description of Mapped mode follows).
For GPON NNI ports, the concept of transparent mode versus non-transparent mode
is introduced. Transparent mode provides a simplified interface between the OLT
and the ONT that connects to the subtending system. It is currently supported for the
7353 MDU and can be summarized as follows:
• All packets will be transparently forwarded without VLAN translation, EtherType
filtering, P-bit marking, and so on.
• The GEM ports are allocated according to P-bit only.
• The maximum number of VLAN ports per NNI port is 512.
In contrast, the non-transparent mode re-uses the UNI interface between OLT and
ONT. Therefore packet manipulations are possible but the number of VLAN ports per
NNI is restricted to 8.
Note that, in transparent mode, the P-bit to traffic class mapping used is the system
level mapping, rather than the per forwarder mapping normally used for GPON.
Both the Tunnel mode and the Mapped mode can co-exist simultaneously in the
ISAM. Whether a frame has to be handled in S-VLAN Tunnel or Mapped iBridge
results from a comparison between the most external frame tag (if any) and the
Bridge port PVID.
Thus the NNI port S-iBridge forwarding behaviors can be summarized as follows:
• When upstream traffic on a given NNI bridge port does not match a defined
S-VLAN port attached to a given S-ibridge and no S-VLAN port default VLAN
exists on that bridge port, then this traffic is dropped.
• When upstream traffic on a given NNI bridge port matches a defined S-VLAN port
attached to a given S-ibridge and no S-VLAN port default VLAN exist on that
bridge port, then this traffic is accepted into the VB instance for bridging functions.
In this case, no new tag will be added on upstream egress. This mode of operation
is called mapped mode.
• When an S-VLAN port default VLAN has been defined on an NNI bridge port, then
all traffic is accepted into the VB instance for bridging functions and this traffic will
be added an S-VLAN tag on upstream egress. This mode of operation is called
tunnel mode.
Note — For the sake of clarity, this section only considers the
case of direct VLAN encapsulation on the EMAN. This
discussion can however be generalized to the cases where
MPLS pseudo-wire encapsulation is used in the EMAN instead.
In addition to the configuration above, the operator configures on the Bridge Port a
PVID or a Port-protocol-default VLAN that points to the VLAN port. When The ISAM
receives untagged or priority-tagged frames on a given Bridge Port it adds a Vlan tag
to the frame corresponding to the PVID and forwards the frames in the context of the
C-VLAN CC.
Note that in GPON and XGS-PON / TWDM-PON, a Bridgeport is configured on an
ONT UNI.
In case of GPON and XGS-PON / TWDM-PON access, there are two alternative
modes for VLAN translation: ONT based translation and ISAM based translation; see
“L2 forwarding on the NT board and the LT boards”.
11, *, Data
NetVlan (11) 11, *, Data CC: 1-1 VlanId (11)
Ut, Data
PVID
NetVlan (21) 21, *, Data CC: 1-1 Tr VlanId (11) 11, *, Data
12, *, Data
31, 12, *, Data CC: 1-1 +- VlanId (12)
NetVlan (31,12) PVID Ut, Data
While on the LT boards, each S+C VLAN cross-connect defines a distinct forwarding
context, and hence there cannot be any MAC address conflict, this is not true on the
NT board. The NT board acts as an S-VLAN bridge, unaware of the C-VLANs so
traffic of multiple end-users that share the same S-VLAN ID is treated in the same
forwarding context. If a given MAC address is learned on a 1st LT port and later on
a 2nd LT port, then no MAC movement occurs, but instead a “duplicate MAC
address” alarm is raised by the NT board.
Figure 223 shows the S-VLAN cross-connect model (DSL, Ethernet or GPON case
shown).
It should be noted that a Tunnel-VLAN cross-connect can coexist with C-VLAN and
S+C-VLAN based forwarders (i.e. VLAN Cross-Connect or i-Bridge) on the same
bridge port. When this is the case, upstream user traffic is preferably sent to the C-
or S+C-VLAN forwarders if the user VLAN matches the corresponding VLAN ports.
The rest of the upstream traffic is sent by default through the Tunnel-VLAN
cross-connect. Figure 224 illustrates this case.
Figure 224 Tunnel-VLAN, C-VLAN and S+C-VLAN cross-connects on same
bridge port
NetVlan 31,23 31, 23, *, Data CC: 1-1 +- Tr VlanId (13) 13, *, Data
“*, Data “
here means any frame except
with outertag = 11 or 13
LAG
LAG
Br
Br L2CP:LACP Br
L2CP
VLAN1
Br
Br x x Br
Br
Br
Br VLAN2 L2CP Br
Br
x x
LAG
LAG
LAG
LAG
Br
Br VLAN3 L2CP Br
Br
x x
EMAN
Assu m p tio n :
EMAN tr a n sp a r e n t to ta g g e d L2 CP traffic
L2CP
PVID = VLAN1
EMAN
CPE PVC/EFM x
L2CP
VLAN1
x
PVC/ EFM CPE
x
VLAN2
VRF
VL
VRF
Services VRF
VRF
VRF
Customer
premises
IP subnet IP address VLAN IP subnet
• Residential cross-connect:
This mode provides a connectivity scheme compatible with a fully centralized
subscriber management where each individual subscriber is connected to an IP
edge (IP connectivity; see Figure 228) or a BRAS (PPP connectivity; see
Figure 229) through a single bit pipe. In this configuration, the subscribers are
sharing the same subnet for scalability reasons and (normally) do not present
their private network configuration to the network.
VLAN-CC
Services VRF
VLAN-CC
IP PPP
Services Routing Termina-
tion
IP subnet IP address
PPP session VLAN
• Subscriber identification:
• A single (C-VLAN) or a stacked (S+C-VLAN) VLAN tag towards the network is
associated to a single residential subscriber.
• Optional addition of the PPPoE relay tag (that is, the line ID parameter) in the PPPoE
control messages.
• Optional addition of the DHCP Option 82 (that is, the line ID parameter) in the DHCP
messages.
• Optional addition of the DHCPv6 Option 18 and/or Option 37 (that is, the interface ID
and the relay agent remote ID parameters) in the DHCPv6 messages.
• These subscriber identification options are transparent on the NNI ports of the GE
Ethernet line board. The NNI ports of the GPON line board will add the OLT part of
the line ID in these options, based on the syntax configuration.
• Security features:
• 802.1X authentication allowing to allow or disallow the traffic (PPPoE and IPoE)
through the pre-configured VLAN cross-connect in function of the connected CPEs
(this is not supported however on the hub-ISAM LT HC-UNI and NNI ports)
• Optional limitation of the number of MAC addresses per VLAN cross-connect
• ACLs: though this should typically be done by the IP edge, it might happen that the
latter does not own enough processing capacity to support that feature
• IP address anti-spoofing: this should ideally be done centrally in the network, but IP
address anti-spoofing might not always be available centrally and/or might suffer
from some dimensioning/performance issues when used for a large amount of
subscribers
• Service enforcement:
• Policing per end-subscriber VLAN port
• Further detailed policing actions based on CoS and/or ACL results should be typically
performed centrally where the service awareness is present.
• QoS policy: in case a single PVC is used to carry multiple services and the CPE is
not generating priority tagged frames, segregating services is then only possible at
IP level using the QoS policies offered by the ISAM QoS Policy framework. For
instance, one can define IP sub-flows based on, for example, DSCP values, IP
source or destination addresses or even UDP/TCP port addresses. Each of these
sub-flows can then have its QoS parameters re-marked and/or can be policed. The
same applies for VDSL ports that only carry untagged frames.
• Service selection: performed centrally
• Service accounting: performed centrally
• Local multicast handling: driven by IGMP
See also “Protocol handling in a Layer 2 forwarding model” for more information.
In any case, the subnet configuration at the subscriber side (behind the CPE) is
transparent to the ISAM. The ISAM only sees the IP address of the CPE and the IP
address of the edge router; see Figure 230 and Figure 231.
Figure 230 IP network model for business IPoA cross-connect
NE CPE
IP
100.100.100.9 100.100.100.8 /30 Network CPE 100.100.100.10
side side
CPE
Edge IP
100.100.100.13 100.100.100.12 /30 100.100.100.14
Router
CPE
100.100.100.17 100.100.100.16 /30 IP 100.100.100.18
IP PVC11
C_VLAN1 CPE1
PVC12
Edge PVC21
Router S_VLAN IP
C_VLAN2 CPE2
PVC22
PVC31
C_VLAN3 IP
CPE3
PVC32
= L2 interface
Secure forwarding relies on DHCP snooping (for more information on DHCP, see
chapter “Protocol handling in a Layer 2 forwarding model” and chapter “Protocol
handling in a Layer 3 forwarding model”.
The operator can enable or disable the secure forwarding feature per iBridge / VLAN
cross-connect.
When secure forwarding is applied to iBridges, it is sometimes referred to as
Enhanced iBridge forwarding.
Figure 232 Enhanced iBridge architecture
IS AM
Useer r
Us CPE L
LT
DHCP s nooping/ ARP
Useer r
Us CPE S tatic config. Relay
VLAN IP Subnet
Useer r
Us CPE iBridge
Useer r
Us CPE L
LT NT
DHCP s nooping/ ARP
Useer r
Us Relay EMA IP
CPE S tatic config. IP
network
Useer r
Us iBridge Bridge IP edge
CPE
Useer r
Us CPE L
LT
DHCP s nooping/ ARP
Useer r
Us CPE S tatic config. Relay
Useer r
Us CPE iBridge
The ISAM keeps the IP session information (that is, IP address and associated
subnet of the subscriber, lease time, default gateway IP address, DHCP server IP
address, and so on) during the lifetime of the DHCP session.
The IP session information is used during ARP relay and to install IP anti-spoofing
filters.
• Non-local ARP messages received from the subscribers are broadcast to all
network bridge ports.
ARP messages coming from a subscriber, provided they are not targeted to the
same subscriber, are simply broadcast to all network interfaces, allowing the edge
routers to reply with their own MAC address. To avoid bothering the network with
ARP messages intended for hosts located on the local network of the subscriber,
the ISAM discards any ARP messages, whose targeted IP address belong to the
list of IP addresses and/or subnets defined for IP address anti-spoofing on that
subscriber’s interface.
Because iBridging in the ISAM does not allow user-to-user traffic, the edge router
must support local ARP proxy and IP traffic hair-pinning (that is, traffic received
on a given interface that must be forwarded to the same interface based on the
routing table) if user-to-user traffic is needed.
15.10.4 ICMPv6
The details of ICMPv6 protocol handling are captured in chapter “Protocol handling
in a Layer 2 forwarding model”.
The concept of virtual MAC (vMAC) offers a complete solution by replacing the MAC
address of the subscriber with a MAC address defined by the operator (and
therefore, fully controlled). Enabling vMAC allows improving layer 2 forwarding
models in the following two areas:
• Security:
Translating the MAC address of the subscriber by an operator-defined MAC
address ensures, by definition, the uniqueness of the MAC address across the
whole access network, automatically alleviating all issues related with duplicate
MAC addresses.
• Scalability:
By guaranteeing that a MAC address is unique across the whole access network,
an operator can now choose to connect multiple DSLAMs to the edge router
through the same network VLAN. By doing so, the operator increases the number
of subscribers sharing the same subnet and, consequently, improves the pooling
effect when allocating IP addresses.
I-Bridge
VRF Bridge
I-Bridge
IP subnet IP address
Activating vMAC support in iBridge removes the preceding constraint and allows
sharing a same network VLAN across multiple DSLAMs. This network VLAN sharing
improves the scalability of the access network regarding IP address allocation; see
Figure 234.
Figure 234 iBridge with vMAC enabled
Edge EMAN ISAM CPE
vMAC
bridge
VRF Bridge
vMAC
bridge
vMAC can also be used in conjunction with IP routing where the NT board acts as IP
router and the LT board as iBridge.
vMAC support together with the IP routing model (and LT board acting as iBridge) is
advised, so that any issues with duplicate MAC addresses are avoided. This is what
you would expect with a black box IP router DSLAM (that is, the IP router should still
work even if all subscribers were using the same MAC address).
When unused, vMAC are freed based on the standard MAC address aging process.
Bit 47...45 Yes DSLAM ID part 1 (3 Most Significant Bits). Remaining bits: see Bit
39…27
(1 of 2)
(2 of 2)
When the PPP session is terminated, the ISAM deletes the marked session
information.
A property of PPP cross-connect is that the ISAM sends PPPoE packets to the
network using its own MAC address as source address. Thus, for the network, the
ISAM looks like the PPP client itself and actually performs user MAC address
concentration.
The general model of a PPP cross-connect engine with MAC address concentration
is quite intuitive. It is shown in Figure 235.
Figure 235 General PPP cross-connect engine
iBridge VLAN
PPPoE
PPPoE
or PPPCCE
PPPCCE
Server
Server
CC VLAN
PPPoA
&
PPPoE
In case of PVC
The VLAN which is attached to a PPP cross-connect Engine on the network side
must be of iBridge or VLAN cross-connect type. Of course, when the VLAN is of type
cross-connect, only one user is attached to the engine.
The type of interface on the user side on which a PPP client port can be configured
must be one of the following:
• EFM interface for untagged PPPoE traffic
• PVC for PPPoA and/or untagged PPPoE traffic
• Ethernet interface for untagged PPPoE traffic
• VLAN port interface for tagged PPPoE traffic
The interfaces stack for PPP client ports is shown in Figure 236.
Figure 236 Subscriber access interface stack for PPP client ports
PPP client port PPP client port PPP client port PPP client port
VLAN port
Bridge port
ATM ATM
All the supported encapsulations for PVCs are shown in Figure 237.
Figure 237 Accepted ATM encapsulation for PPP cross-connect Forwarding
with MAC address concentration
asamAtmVclEncapsAutodetect
Client
Client Port
Port disabled(1) or
autoDetectPPPoA(4)
PPPCCE
PPPCCE PPPoA
VC
VC asamAtmVclEncapsType
llcNlpid(3) or
vcMuxPppoa(6)
Client
Client Port
Port
Untagged
PPPCCE
PPPCCE
PPPoE
VC
VC asamAtmVclEncapsAutodetect
disabled(1),
asamAtmVclEncapsType
Client
Client Port
Port llcSnapBridged(1) or
Tagged vcMuxBridged(4)
PPPCCE
PPPCCE
PPPoE
VlanPortBridgePort VC
VLANPort VC
asamAtmVclEncapsAutodetect
autoDetectPPP(3) or
Client
Client Port autoDetectIpoePpp (5)
Port PPPoA
PPPCCE
PPPCCE
or asamAtmVclEncapsType
Untagged llcSnapBridged(1),
VC
VC
PPPoE llcNlpid(3),
vcMuxBridged(4),
vcMuxPPPoA(6)
The object model of a PPP cross-connect depicted in Figure 235 is quite simple:
• a PPP cross-connect engine applying PPP cross-connect forwarding rules
• one network VLAN
• one or several client ports on top of PVCs, VLAN port interfaces, EFM interface
or Ethernet interface to attach users
L2 Fwd PPPCCE
PPPCCE
EMAN L2 Fwd
LT
NT
DSLAM
16.7 ARP
16.8 DHCP
16.9 IGMP
16.10 PPPoE
16.11 DHCPv6
16.12 ICMPv6
16.13 LLDP
16.1 Introduction
Layer 2 protocol handling can be divided into two parts:
• Layer 2 Control Protocol handling:
Layer 2 Control Protocols are protocols defined for use within the Layer 2 network.
They are defined to influence the forwarding behavior within this Layer 2 network
and/or to maintain and troubleshoot this Layer 2 network. This includes protocols
that have an individual or group of interfaces as scope, and it includes protocols
that have the end-to-end connectivity within this Layer 2 network as scope.
• Application protocol handling:
These are protocols defined at a layer higher than Layer 2. They are used for
communication between nodes connected to the Layer 2 network and/or nodes
deeper in the IP (Layer 3) network. Participation of the ISAM - being the boundary
node of the service provider network - in processing these protocols, enables the
general network or nodes deeper in the network to provide better services to
subscribers.
Rapid Spanning Tree Protocol and Multiple Spanning Tree Protocol 16.3
802.1X 16.6
ARP 16.7
DHCP 16.8
IGMP 16.9
PPPoE 16.10
DHCPv6 16.11
ICMPv6 16.12
LLDP 16.13
These protocols play an important role in the way subscribers establish connectivity
and/or access broadband services. The ISAM supports a set of protocol processing
features in order to maintain network security and allow customer identification and
troubleshooting. These are defined in the next sections.
The use of these control protocols can lead to security issues when malicious users
try to perform a (Distributed) Denial of Service attack towards the systems handling
the user-generated control traffic (for example, a BRAS, an Edge Router or a DHCP
server). In order to protect these systems, the ISAM can be configured to perform
upstream policing for the following protocols: ARP, DHCP, DHCPv6, IGMP, ICMPv6,
PPPoE and Connectivity Fault Management. The policing rate and maximum burst
size can be configured separately for each of the mentioned protocols.
Note that the protocol policer operates in a specific way for IGMP packets: rather
than policing on the number of IGMP packets, it will take into account the fact that
one IGMP packet may include requests for several multicast groups. Hence, the
protocol policer will calculate the equivalent number of "virtual IGMP packet" and use
this as input to the policer.
NE
ADSL
m x FE/GE
FE/GE n x FE/GE
EMAN NSP IP backbone
Link Aggregation
Group 2
NSP IP backbone
Link Aggregation is defined for use between any type of Ethernet nodes (that is, both
bridges and end stations). The binding of links into Link Aggregation Groups may be
under manual control by an operator. In addition, automatic determination,
configuration, binding, and monitoring may occur through the use of a Link
Aggregation Control Protocol (LACP).
If enabled by the operator, the cost of the Link Aggregation Group, as used by OSPF
for making routing decisions, is based on the available aggregated operational
bandwidth.
GE LT UNI, NNI -
10GE LT VULA Uplink, NNI, UNI VULA Uplink, NNI, UNI
The ISAM NT interacts with the network side by means of SAPs and/or MPLS
Pseudowires:
• SAPs facing the network side are configured on regular access ports, not on
network ports.
• MPLS Pseudo Wires are always facing the network side and are exclusively
configured on genuine network ports.
The ISAM NT exclusively interacts with the subscriber side (that is, LT boards,
directly attached subscribers or subtending ISAMs) by means of SAPs:
• SAPs facing the subscriber side are configured on residential access ports.
LAG is currently supported only on regular access ports and those residential access
ports used for subtending.
Link Aggregation Groups are defined by configuring individual physical links with
identical link aggregation parameters. Especially the parameter actor-key is
important as the Link Aggregation Group is defined as the set of links with the same
value for this parameter.
The use of the LACP protocol can be enabled or disabled.
Load balancing across links is supported. Depending on the type of traffic (L2, IP,
MPLS) the load balancing is based on the combination of traffic parameters like
SrcMAC, DstMAC,SrcIP, DstIP, Tunnel/Service Label, Physical Port and/or
TCP/UDP Port numbers.
This load balancing algorithm is not user configurable.
Figure 240 shows link aggregation support.
Figure 240 Link aggregation support
Network Subscriber
side side
SDP
bindings
SDPs
EMAN LAG
EMAN
LAG
LT
LT
NT
Network port
SAP
APS
L
Logic A EMAN
G
Standby
Subgroup Upstream
NE 2
In non-revertive mode of static LAG the current active subgroup will continue to carry
traffic as long as the threshold is not reached. Once the threshold is reached, a
switchover is initiated by bringing down links of current active subgroup. This is
followed by designating the standby subgroup as active and the links of the newly
active subgroup are enabled.
In case the number of links, coming up during the switchover, is less than the
threshold, the newly designated active subgroup continues to be active. This
condition is cleared if the operator forces a manual switchover to a subgroup or the
number of links in the newly active subgroup exceeds the threshold.
If during switchover no ports / links are active on the standby side for a pre-configured
time, then the switchover is aborted.
Ethernet
NSP IP backbone
Bridge
NE m x FE/GE
ADSL
FE/GE
EMAN NSP IP backbone
n x FE/GE
16.3.1 RSTP
The Rapid Spanning Tree Protocol (RSTP) as defined in IEEE 802.1D-2004, clause
17, is a Layer 2 Control Protocol that provides path redundancy while preventing
undesirable loops in the network.
Providing path redundancy starts with having a physical redundant network topology.
Multiple active paths between end stations cause L2 loops in the network. If a loop
exists in the network topology, the potential exists for duplication of messages.
Therefore, the task of RSTP is defining a single active path between each pair of end
stations.
To realize this single active path, RSTP forces certain redundant data paths into a
standby (blocked) state. The logical topology that is realized in this way is a single
tree with a selected root end station and with the other end stations at leave
positions. Ethernet Bridges are involved in selecting the active path and blocking the
standby paths. After a network node or link has become unavailable, RSTP will run
again to define a new tree topology.
16.3.2 MSTP
If the network contains more than one VLAN, the logical network configured by a
single RSTP would work, but better use can be made of the available redundant
nodes by using an alternate spanning tree for different (groups of) VLANs.
Multiple Spanning Tree Protocol (MSTP), which uses RSTP for rapid convergence,
enables VLANs to be grouped into a spanning-tree instance. Each instance has a
spanning-tree topology independent of other spanning-tree instances. This
architecture provides multiple forwarding paths for data traffic, enables load
balancing and limits the number of spanning-tree instances required to support a
large number of VLANs. MSTP is defined in IEEE 802.1Q clause 13.
In some network topologies the use of RSTP or MSTP will not provide any benefit.
This is the case when the single active path is already realized at physical level. An
example is that the user equipment connected to LT boards (must) have already by
construction a single physical interface and inherently this will form a single active
path. Therefore and because of this RSTP and MSTP are not supported on these
interfaces. Other examples are the use of a single link (aggregation group) between
a hub and a subtending ISAM. Therefore, RSTP and MSTP can be enabled or
disabled per Ethernet interface of the ISAM. As an example, RSTP and MSTP shall
be disabled on the network interface of the subtending ISAM in case it is disabled on
the corresponding subtending interface in the Hub ISAM.
Note 1 — The 7302 ISAM supports RSTP and MSTP towards
DSLAMs in a ring.
Note 2 — The 7302 ISAM and the 7330 ISAM FTTN supports
STP (IEEE 802.1D-1998, clause 8) for inter-operability with
older routers.
Note 3 — The terminology of network links, subtending links,
and subscriber links is not used on the management interface
of the ISAM. The operator configures a link as “regular” to make
it behaving as a network link and configures it as “residential” to
make it behaving as subtending or subscriber link.
Note 4 — RSTP and MSTP shall only be supported in the
m-VPLS. Only a single m-VPLS can be configured. RSTP and
MSTP do not run concurrently on the system.
Note 5 — No Spanning Tree protocol is supported on MPLS
Pseudo Wires (on Network links).
A B
F C
RPL Link
Data VLANs
E D
ERP VLAN
RPL owner
Two modes of protection switching have been defined in G.8032: revertive mode and
non-revertive mode.
In the revertive mode after the condition(s) causing a switch-over has (have been)
cleared, the traffic path on the ring is restored to the normal working state, that is,
blocked on the RPL. Note that switching back to the normal state causes an
additional traffic interruption.
In the non-revertive operation, the traffic channel continues to use the RPL, if it has
not failed, after a switch condition has cleared. The operator has to block the RPL
link manually in order to restore the ring to the normal state.
Figure 244 Normal state of Ethernet Ring Protection
A B
F C
E D
RPL owner
Figure 245 Path Failure and R-APS message flow to RPL Owner Node
A B R-APS
F C
R-APS E D
RPL owner
Each time a link failure occurs that affects reachability, the nodes that detect the
failure initiate R-APS messages on either side of the ring. The nodes that initiate
R-APS (Signal Fail abbreviated as SF) also flush their FDBs on the ring links. Every
node that receives the R-APS (SF) message also flushes the FDB. The RPL owner
unblocks the RPL link when it receives the R-APS message and initiates its own
R-APS messages in either direction. Every node that receives the R-APS messages
from the RPL owner once again flushes the FDB. The nodes that are connected to
the failed link periodically transmit the R-APS messages as long as the Signal Fail
condition persists.
Figure 246 Reconfiguration to protected path
A B
F C
E D
RPL owner
MA An MA is defined as an OAM maintenance entity per service instance per MD. The service
instance could be a VLAN or a set of VLANs. The OAM maintenance entity scope is defined
by a set of associated Maintenance end Points (MEP). The MEPs define a closed segment
of the VLAN in the Layer 2 network. The segment matches the scope or involvement of a
particular administrative OAM domain (operator) in that VLAN.
As such, MDs/MAs allow network operators to test the segment of a given VLAN that is within
their own scope. For example, it allows them to perform a test on all links and nodes of their
own network and being used by the VLAN or service. Typically, the set of operator segments
are all at the same MD level and then the MDs/MAs cannot overlap.
MDs/MAs also allow network operators to divide a network into separate hierarchical
administrative OAM domains. An MD/MA at a higher level has no visibility inside an MD/MA
at a lower level. Also at the higher level the same concepts apply: the scope is delimited by
MEPs and the MDs/MAs at the same higher level cannot overlap.
There may be one or more MA, that is, service instances, per MD. There may be multiple
MAs for the same service instance (VLAN) if these are within different MDs and the lower
level MDs/MAs are terminated with MEPs.
(1 of 2)
MEPs are points that identify the border of a maintenance entity. MEPs can initiate or
terminate CFM messages.
MIPs are points inside the network segment that is defined as a maintenance entity. MIPs
can respond to and allow the transit of CFM frames originated from another MP.
(2 of 2)
Broadband Forum TR-101 section 7 defines the usage of the OAM entities and
procedures in a Layer 2 Access Network. Broadband Forum TR-156 section 6
defines the OAM-related requirements in the context of a (G)PON Access Network.
Broadband Forum TR-167 section 8 defines the OAM-related requirements in the
context of a (G)PON Aggregation Network.
An access aggregation network typically has the following MD levels (in decreasing
order):
• Customer domain, spanning from the BNG up to the CPE/RG
• Carrier domain, spanning from the BNG (in case of normal broadband access
model) or Ethernet Aggregation node (in case of broadband access with
wholesale services model) up to the user access port on the Access Node;
• Intra-carrier domain, spanning from the BNG (in case of normal broadband
access model) or Ethernet Aggregation node (in case of broadband access with
wholesale services model) up to the network uplink (WAN port) on the Access
Node;
• Access link domain, spanning from the user access port on the Access Node up
to the CPE/RG.
There are eight possible MD levels in total, numbered 0-7. The values are not
imposed by the standards, however the following constraints must be respected: the
Customer level must have a higher value than the Carrier level, which must have a
higher value than the Intra-Carrier level, which must have a higher value than the
Access Link level.
Note that in the context of GPON Access, the Access Node designates the
combination of the OLT and the ONU, with an ODN connecting the two entities (as
opposed to only one DSLAM device in a DSL Access context).
Figure 247 represents those entities in a typical access and aggregation network,
with a DSLAM as an Access Node. Note that the MD level values shown are typical,
but illustrative.
When a customer contacts the service provider helpdesk because of lack of service,
the service provider can run a test in the service provider domain from the BNG
toward the CPE/RG. If the fault is isolated to a specific section, the service provider
can notify the owner of that section who can run tests at a lower level within his
domain. This continues until the failing point is identified.
MD Intra-carrier
MD level 3
Access link MD
MD level 1
CPE
Ethernet
access Regional
network network
RG Ethernet
DSLAM
switch BNG
The above Fault Monitoring (FM) functions are defined in both IEEE 802.1ag and
ITU-T Y.1731 standards. The Performance Monitoring (PM) functions, such as loss
and delay measurement, are defined in ITU-T Y.1731. The ISAM supports a number
of FM and PM functions on the different NT and LT boards, depending on the
transport technology used.
• Remarks:
• loss measurements supported in either of two modes: per pbit or per VLAN
(aggregate of all dot1p priorities);
• for (SLM- or LMM-based) loss measurement tests, support calculation of frame loss
and frame loss ratio
• for proactive measurements, maintain historical counters for 15 minute and 1 day
intervals.
The system also supports MIPs at the DSL ports, GE UNI ports, GE NNI ports and
GE HC-UNI ports for the following functions:
• Receive and respond to LBM and to LTM from the network
On DSL LTs, the system also supports network-facing MEPs at the LT uplink
(Down-MEPs). Within these MEPs the ISAM can receive LBMs and LTMs coming
from the network and respond with LBRs and LTRs, respectively.
Figure 248 MEPs supported on ISAM equipped with DSL or P2P GE LTs
Up MEPs
Down MEPs DSL (PTM)/
PVC (ATM)
Up MEPs
DSL (PTM)/
DSL-LT PVC (ATM)
Up MEPs
GE UNI
Eth Phy
Uplink
Up MEPs
GE UNI
Down MEPs
NT
(No Up MEP
support)
GE NNI/
(No Down MEP HC UNI
support)
ISAM
(No Up MEP
support)
GE NNI/
HC UNI
NELT-B LT
This feature, combined with the Facility MEP supported by the NT card (see section
16.5.3.4), allows to inform the end user device about any network failure, triggering
that device to enable end-to-end path protection, that is:
• Network failures result in sending AIS to the ISAM, ending up at the LT interfaces.
• Uplink failures result in internally generating AIS from the NT to LT interfaces.
• The LT interface either propagates the AIS or shutdown the Ethernet port in
function of the configuration options.
• The end user device, triggered by receiving either an AIS or detecting its uplink
failure, starts looking for alternate route.
For voice services via ONT RJ-11 & ETH UNI, the ISAM supports CFM on an iBridge
VLAN. Please refer to the ONT user documentation for a more complete description
of the supported CFM functions on the optical network units.
• support for15 min and 1 day historical counters for Y.1731 tests
• support for generation and processing of CCM Messages on Down-MEPs on
network facing V-VPLS SAPs and VPLS SDPs
LT IHub Ethernet ER
16.7 ARP
The IETF RFC 826 defined Address Resolution Protocol (ARP) is a protocol defined
within the context of using IP over Ethernet. An IP node uses the ARP protocol to
obtain the Ethernet MAC address of another IP node identified by a known IP
address and connected to the same Layer 2 network.
The ISAM provides ARP handling functionality sufficient to prevent broadcast storms
toward the subscribers. This is achieved in the following ways:
• iBridge mode
• When an ARP request is received from a user port, the ARP request is broadcast to
the Ethernet network interface only. This deviates from the standard Ethernet
broadcast because the ARP request is not broadcast to the other user ports. This
behavior is also true for the GE Ethernet LT board NNI ports.
• When an ARP request is received from an Ethernet network interface, the ARP
request is only broadcast in the VLAN when downstream broadcast is enabled in the
VLAN. Otherwise, the ARP request is dropped. In case of P2P Ethernet and PON LT
board NNI ports, the ARP request is always broadcast in the VLAN (not
configurable).
For GPON and TWDM-PON access solutions, the above description is also
applicable to stacked iBridge mode.
• ARP reply messages receive no special treatment compared to any other data
packet.
• in VLAN cross-connect mode:
ARP requests are forwarded transparently downstream and by default are policed
upstream using the control protocol packet policer. A system level configuration
allows RIP/ARP frames to be either policed by control packet policer or be treated
as data frames for upstream session based policing.
16.8 DHCP
The Dynamic Host Configuration Protocol (DHCP) is a client-server protocol that
enables DHCP Servers to configure internet hosts. The DHCP protocol is defined on
top of UDP/IP. DHCP simplifies the configuration of a host since no IP addresses,
subnet masks, default gateways, domain names, or DNSs must be locally configured
within the host. Instead, with DHCP, this information is dynamically leased from the
DHCP Server for a predefined amount of time. Because the information is stored on
a server, it centralizes IP address management, it reduces the number of IP
addresses to be used, and it simplifies maintenance. DHCP is defined in IETF RFC
2131.
A problem to solve when using this technology is that the DHCP Client must be able
to communicate to the DHCP Server. This is achieved by the DHCP Client starting
the communication with a broadcast message. The DHCP Server will receive this
message in case the server is connected to the same Layer 2 network as the client.
IETF RFC 2131 and RFC 3046 define a DHCP Relay Agent for when this is not the
case. Then a DHCP Relay Agent connected to the Layer 2 network of the Client will
convert the broadcast message to a unicast message and send it to a server further
in the IP network. In doing so, the DHCP Relay Agent can add 'option 82' information.
That information can be used by the DHCP Server to identify the subscriber, and
when mirrored back in reply messages it helps the DHCP Relay Agent to forward the
replies to the correct client. In its definition this DHCP Relay Agent is a function within
a router for which it can be referred to as a 'Layer 3' DHCP Relay Agent.
Broadband Forum TR-101 defines a “Layer 2” DHCP Relay Agent, that is, a Relay
Agent functionality in the middle of the Layer 2 Access Network. The Layer 2 DHCP
Relay Agent is assigned to be a responsibility of the DSLAM. It shall add option 82
information (which allows the server to identify the subscriber) but leaves the
broadcast message a broadcast message. Converting the broadcast message to a
unicast message is not needed when the DHCP Server is connected directly to the
Layer 2 Access Network, or is the responsibility for a real Layer 3 DHCP Relay Agent
at the edge of the Layer 2 Access Network.
The ISAM provides Layer 2 DHCP Relay Agent functionality when it is configured for
Layer 2 forwarding and a full Layer 3 DHCP relay when it acts as an IP Router.
LT IHub Ethernet ER
IP
DHCP client network
LT NT
CPE DHCP
server
US/DS: DHCP boadcast US: adds option 82 and sends packet to xHub
or unicast packet DS: remove option 82 and send on to correct user port
The DHCP client can send broadcast or unicast DHCP messages. These will be
forwarded in the upstream direction:
• if the insertion of option 82 is enabled, the ISAM verifies the DHCP message and
adds option 82 to a valid DHCP message as described further on.
• if the insertion of option 82 is disabled, the ISAM still verifies the DHCP message
as described further but does not add an option 82.
Again, note that, with or without option 82 insertion, in a Layer 2 DHCP Relay Agent,
the broadcast message remains a broadcast message, the unicast message
remains a unicast message. For more information on the handling and configuration
of DHCP Option 82; see section “Option 82 handling”.
In the downstream direction the DHCP Relay within the Edge Router (or the DHCP
server in case it is directly connected to the Layer 2 Access Network) sends
broadcast or a unicast DHCP messages. The choice between broadcast or unicast
depends on the broadcast flag inside the DHCP message sent from the DHCP
Client. In all cases the Layer 2 DHCP Relay Agent will forward the DHCP message
to the correct user only. For a unicast DHCP message the user is identified from the
MAC address in the Ethernet header. For broadcast DHCP messages the user is
identified from the payload of the DHCP messages, for example, chaddr. In any case
the option 82 is removed before forwarding the DHCP message.
16.8.1.3 Customer ID
The Customer ID is fully configurable for each DSL line, ATM PVC, Ethernet
interface or VLAN port by the operator (string with a length between 0 and 64 bytes).
In case the Customer ID is configured for one user at various levels, for example, at
ATM PVC and at DSL line level, then the most fine grained level will be used. In the
example the Customer ID configured for an ATM PVC will take precedence over the
customer ID configured at the DSL line.
It is possible to configure a system-level Customer ID. When doing so, the system
has the following behavior:
• If the customer ID at the interface level (VLAN port, UNI) is set to the default value
“available”, then the customer ID configured at system-level will be used for that
interface. This can be useful in case an operator wants to use the same Customer
ID on all UNIs, without having to configure it on each individual UNI.
• In case a specific user value is configured for a UNI or VLAN port, it takes
precedence over the system-level customer ID setting.
• LzQVID: VLAN ID on user interface with 4 digits and leading zeroes (for example,
VLAN ID 1 denoted as 0001, VLAN ID 10 denoted as 0010, VLAN ID 100 denoted
as 0100 and VLAN ID 1000 denoted as 1000).
• I-VID: Refers to the second or inner VLAN-id in dual-tagged Ethernet frames.
16.9 IGMP
For more information about IGMP, see chapter “Multicast and IGMP”.
16.10 PPPoE
Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for
encapsulating Point-to-Point Protocol (PPP) frames inside Ethernet frames. PPP is
the commonly used protocol in dialup connections. PPPoE allows to connect one or
multiple PPP Client computer subscribers through an Ethernet LAN to a PPP Server.
PPPoE is defined in IETF RFC 2516.
PPPoE traffic
LT IHub Ethernet ER
PPPoE traffic
CPE
LT NT
CPE
ATM
termination
IP Edge
PPP-L2TP
interworking
The initial PPP request packet and all further packets sent within the established
PPPoE session are sent with a VLAN tag with the priority configured for the PPP
client port.
During the session, every upstream PPP packet is encapsulated in PPPoE, where
the MAC address of the ISAM is used as MAC source address. Downstream, the
reverse operation takes place and the MAC layer is stripped. From a BRAS
perspective, the session looks like any normal standard PPPoE session.
To give the Access Service Provider (ASP) the maximum information that can help
him to accept a PPPoE session establishment or to silently ignore the request, the
ISAM provides the PPPoE Server with access loop identification and line rate
information just as for PPPoE Relay.
Beside all these similarities there is still something special:
The ISAM can inform the PPPoE Server that the PPPoE session being established
is an “interworked session, that is, a session established on behalf of a user. This
could be useful for the BRAS, for example, to use a different approach for limiting the
number of sessions per client. This information is provided through the insertion of
the BBF-IWF-tag sub-option in the PPPoE vendor specific tag. This sub-option is
defined in BBF TR-101.
Adding this sub-option can be enabled or disabled per PPP cross-connect Engine.
A second special thing relates to the Maxim Transmit Unit (MTU). In this scenario the
PPP Client is a PPPoA user and it assumes it can send PPP packets of 1500 bytes.
To encapsulate these frames in Ethernet, the interworking function shall add 8 bytes
of PPPoE header and as such the frame does no longer fit in a standard Ethernet
frame with a maximum payload of 1500 bytes. The normal procedure then requires
the PPP Client and the PPP Server to negotiate about the MTU. To facilitate the
convergence of this negotiation, the ISAM supports Ethernet frames that are 8 bytes
longer than standard Ethernet. This facility is signaled in the PADI message to the
PPPoE Server by adding the PPP-Maximum-Payload tag. This tag is defined in IETF
RFC 4638.
Adding this tag can be enabled or disabled per PPP cross-connect Engine.
The ISAM actively participates in the PPP connection release phase. When the PPP
session is terminated, the ISAM also terminates the corresponding PPPoE session.
The involved PAD-T message is sent with a VLAN tag with priority 7.
Normally, when a DSL line has gone out of service, the PPPoE session will only
time-out in the BRAS after a certain time (typically 3 minutes). This delay is
considered too long, for example, by service providers that offer a PPP-based HSI
service with time-based billing.
Therefore, the ISAM removes state for an interworked PPPoE session and sends a
PPPoE PAD-T message to the BRAS upon a loss-of-connectivity to the subscriber
(this can be indicated by loss of DSL synchronization on the associated subscriber
line).
Note — PPPoA to PPPoE interworking is not supported on the
GPON and TWDM-PON LT, nor on the Ethernet LTs. It is also
not supported on a stacked iBridge on DSL LTs.
16.11 DHCPv6
This section provides information about the lightweight DHCPv6 relay agent,
bandwidth, DHCPv6 trusted/untrusted port configuration, DHCPv6 relay agent, and
DHCPv6 snooping.
Ethernet line cards support the lightweight DHCPv6 relay agent on following
interfaces:
• GE Ethernet LT: UNI and HC-UNI.
• 10GE Ethernet LT: UNI and NNI, but the latter in the context of auto-provisioning
a trusted node subtended from the card. Option 53 for Relay-ID is added to the
DHCPv6 client packets received on the NNI. Relay-ID takes the format of
DUID-LL.
16.12 ICMPv6
ICMPv6 includes Neighbor Discovery (ND) messages as well as Multicast Listener
Discovery (MLD) messages. In general, upstream and downstream ICMPv6
messages are handled transparently without specific processing. This means that
downstream multicast ICMPv6 messages are typically flooded by default.
The filtering of ICMPv6 unicast and multicast ICMPv6 packets in an iBridge or VLAN
cross-connect forwarder can be enabled or disabled. This allows fine tuning of the
ICMPv6 message handling for security purposes.
When enabled, the following ND and MLD messages must be discarded:
• Downstream Router Solicitation (RS)
• Upstream Router Advertisement
• Upstream Redirect
• Upstream MLD Multicast Listener Queries
• ND messages which are not originated from the local network, that is those with
a hop limit less than 255
When using MAC address translation or virtual MAC addresses, the MAC address
field present in the ICMPv6 Neighbor Discovery message payload must be
translated. See section “Virtual MAC” for more information on virtual MAC
addresses.
16.13 LLDP
ISAM supports advertising using Link Layer Discovery Protocol (LLDP) (IEEE
802.1AB 2009) on its uplink ports, this allows upstream node to discover ISAM as
part of network topology.
LLDP Implementation on ISAM can be configured on a per uplink port basis to
advertise to following destinations:
• 'nearest bridge' MAC Address (01-80-C2-00-00-0E)
• 'nearest non-Two Port MAC Relay bridge' MAC Address (01-80-C2-00-00-03)
• 'nearest customer bridge' MAC Address (01-80-C2-00-00-00)
Each uplink port on ISAM can be configured to advertise different TLVs to different
destination MAC address. A maximum of 3 LLDP sessions i.e. one per destination
MAC address can be configured.
ISAM shall process any untagged LLDP PDUs received on network/access ports if
corresponding LLDP destination MAC bridge is enabled on that port. Any tagged
LLDP PDUs are forwarded in the context of the service associated.
LLDP packets are not blocked due to xSTP or LACP port states.
17 IP routing
17.1 Introduction
17.1 Introduction
The IP routing model of the ISAM is a typical router implementation with increased
security and scalability, allowing to use cheaper devices (that is, simple Ethernet
switches) in the aggregation network. It can be characterized as follows:
• Packets are forwarded based on the IP Destination Address (DA) with the ISAM
acting as a next hop.
• IP connectivity towards the end user can be established statically by the operator
or learned dynamically by inspecting the DHCP messages exchanged between
the subscriber and the DHCP server during the IP session establishment.
• IP connectivity towards the network and the subtending nodes can be established
statically by the operator or dynamically by routing protocols.
• Service Level Agreement (SLA) enforcement can be achieved by means of
policing and Access Control List (ACL), and this at various granularity levels.
• Improved security:
• Subscriber MAC addresses are never propagated to the network
• ARP messages do not cross the ISAM leading to not broadcasting ARP messages
to all subscribers
• IP address anti-spoofing and ACL
• Improved scalability
• The ISAM presents a single MAC address towards the network
• The broadcast message load generated by the subscribers towards the network is
reduced by either handling them locally (for example, ARP) or by converting them
into unicast messages (for example, L3 DHCP relay).
More details on the DHCPv6 processing can be found in chapter “Protocol handling
in a Layer 2 forwarding model” and chapter “Protocol handling in a Layer 3
forwarding model”.
The ISAM can automatically manage the forwarding parameters associated with the
interfaces of the subscribers by snooping the DHCP messages exchanged with
these subscribers (populate the snooped IP address of the subscriber, remove that
IP address once the snooped IP address lease time is elapsed). This basically
reduces the operator's cost of operation since the connectivity establishment is
performed dynamically at IP session set-up time without any involvement of the
operator.
However, an operator may still configure subscribers statically if desired (for
example, business users). Static configuration is required whenever a subnet needs
to be assigned to a subscriber, while ISAM only supports dynamic subscriber's IP
address allocation for an individual IP address.
In the case of IPv6, DHCPv6 snooping is performed to learn the subscriber routes:
• When DHCPv6 is used for Prefix Delegation, the IPv6 forwarding table is
populated with the delegated prefix, indicating this is a non directly attached
subnet. These are so-called “DHCPv6 managed routes”. The ISAM maintains the
relation between the delegated IPv6 prefixes, its lease time and the
corresponding subscriber-facing interfaces.
• In case of stateful DHCPv6 address assignment, managed (DHCPv6) entries are
created in the Neighbor Cache for the /128 IPv6 addresses that are assigned to
the IPv6 hosts. The ISAM maintains the relation between the IPv6 address, its
lease time and the corresponding MAC address.
• When Prefix Delegation is used, it is also possible to preserve the prefix when a
subscriber moves from one location to another. For this to be possible, the DHCP
server must detect that the subscriber has moved and assign the same prefix at
the new location. This feature is known as Prefix Stability. This new location can
be connected to the same 7360 ISAM FX node or to a different 7360 ISAM FX
node. If the new location connects to the same 7360 ISAM FX node, the ONU
status on the line is used to confirm the subscriber movement.
When the subscriber has moved to a new OLT, the prefix will be populated as a
route in the IPv6 forwarding table of that OLT. For a short time this route will exist
in parallel at both the old and the new OLTs. However, the new OLT will advertise
this route and when the route is distributed to the old OLT, it will remove and
replace the old route with the new route (or) keep the old route - based upon the
ONU status on the line and based upon the hold-timer started after the route is
seen from the other OLT (for handling flaps). If at both OLTs, the ONUs status
indicates no subscriber movement, an alarm is reported to indicate this condition.
17.2.13 MTU
The L2 MTU size is fixed to 2048 and not configurable.
The L3 MTU size can be configured per interface. The default value is 2030, but if
required a lower value can be configured.
Implementation notes:
• The ISAM does not perform IP packet fragmentation for forwarded packets
(packets generated by the ISAM itself are subject to fragmentation)
• Packets received with a length larger than the MTU are discarded.
17.2.14 ECMP
Up to eight Equal Cost Multi Path (ECMP) next-hops are supported per route.
Subscribers can also access the services offered via the public IP network domain.
In this case, Internet Enhance Service (IES) needs to be explicitly created and needs
to be enabled on the subscriber access interfaces. The IES service provides a way
to attach subscribers to the base router since the base router cannot have IP
interfaces directly on the subscriber interfaces. These concepts are illustrated in
Figure 254 and Figure 255.
Even if it is not required to provide public network access to subscribers, still IES
service needs to be explicitly configured to attach the base router to the public
domain.
iBridge
VLAN
RG ONT SAP
IES Service
……
v-VPLS
v-VPLS
(DSL/PVC) (facing users) network
IP edge
IPoA - IPoE vMAC can Virtual port
IPoE user interface interworking be enabled
(DSL/PVC/VLAN
or DSL/VLAN)
LT User gateway Network
v-VPLS v-VPLS L2 switch
CPE IPoA/IPoE
iBridge
Not applicable
ISAM
for IPv6
Bridged, routed or
NT
routed unnumbered
LT Base Router
User gateway IP interface
Interface Local ARP DHCP Routing facing network
CPE IPoA/IPoE
Proxy Relay Agent Protocols
iBridge
VLAN
CPE SAP
……
IP
v-VPLS
Physical port
CPE (VLAN attached to user facing network
gateway interface)
CPE
iBridge VLAN with secure
forwarding enabled
User IP address part of the IPoE user interface
802.1x authentication
user gateway interface (DSL/PVC or DSL),
can be enabled
subnet untagged
IP routing with IES service is achieved by enabling “Base router”, “IES service” and
“iBridge” components in ISAM.
• Base router:
• IP interfaces facing the network (on ports of mode network) need to be configured
• Routing protocols can be enabled on the IP interfaces which are defined directly on
the ports of mode network or which have been created as part of the IES service in
order to dynamically learn network routers and/or advertise the subscriber routes to
the network (refer to chapter “Protocol handling in a Layer 3 forwarding model”).
• Supported IPv4 routing protocols: BGP, IS-IS, OSPF, RIP, PIM-SSM
• Supported IPv6 routing protocols: BGP, OSPFv3, IS-ISv6
• IES service:
• IP interfaces facing the network (on ports of mode access) need to be configured in
the IES service.
• In the context of the IES service: a User gateway IP interface (containing the subnet
of the subscriber) needs to be configured on top of the user gateway v-VPLS, on
behalf of the iBridge VLAN).
• The subnet of the subscriber gateway IP interface is shared among the subscribers
connected to the iBridge VLAN on the LT boards. The IP address of the subscriber
gateway interface is used as the gateway IP address for the subscribers directly
attached to the subnet of the subscriber gateway interface.
Multi-netting is also supported for the subscriber gateway interface to allow multiple
subscriber subnets.
• DHCP relay agent can be enabled on the user gateway IP interface in order to allow
subscribers to retrieve their IP addresses dynamically from DHCP servers (refer to
chapter “Protocol handling in a Layer 3 forwarding model”).
• Local ARP proxy or local Neighbor Discovery proxy needs to be enabled on the user
gateway interface in order to enable user-to-user communication (refer to
chapter “Protocol handling in a Layer 3 forwarding model”).
• ARP anti-spoofing security feature can be enabled on IP interface to detect ARP
spoofing and to prevent ARP cache poisoning.
• iBridge:
• iBridge VLAN needs to be enabled on those subscriber interfaces which need to get
access to the IES services.
• Secure forwarding needs to be configured for the iBridge VLAN: Secure forwarding
enables IP anti-spoofing (in upstream, that is, packets received from users) and
dynamic learning of the IP addresses assigned to subscribers via DHCP snooping
(refer to chapter “Layer 2 forwarding” and chapter “Protocol handling in a Layer 2
forwarding model”).
• Adding DHCP Option-82 can be enabled for the iBridge VLAN (refer to
chapter “Protocol handling in a Layer 2 forwarding model”).
• Adding DHCPv6 Option 18 and/or option 37 can be enabled for the iBridge VLAN
(refer to chapter “Protocol handling in a Layer 2 forwarding model”).
• 802.1X/RADIUS authentication can be enabled for IPoE subscriber interfaces (refer
to chapter “Protocol handling in a Layer 2 forwarding model”).
• vMAC shall be enabled when IPoE subscribers do not have unique MAC address
• IPoA/IPoE interworking needs to be configured on those IPoA subscriber interfaces
which need to get access to the IES services. Note that IPoA is supported for IPv4
only.
iBridge
VLAN
RG ONT SAP
……
v-VPLS
v-VPLS
(DSL/PVC) (facing users) network
IP edge
IPoA - IPoE vMAC can Virtual port
IPoE user interface interworking be enabled
(DSL/PVC/VLAN
or DSL/VLAN)
LT User gateway Network
v-VPLS v-VPLS L2 switch
CPE IPoA/IPoE
iBridge
Physical port
CPE (VLAN attached to user facing network
gateway interface)
CPE
iBridge VLAN with secure
forwarding enabled
User IP address part of the IPoE user interface
802.1x authentication
user gateway interface (DSL/PVC or DSL),
can be enabled
subnet untagged
Not applicable
ISAM Multiple VPRN
instances
for IPv6
NT
Bridged, routed or
routed unnumbered
LT VPRN Service
User gateway IP interface
Interface Local ARP DHCP Routing facing network
CPE IPoA/IPoE
Proxy Relay Agent Protocols
iBridge
VLAN
CPE SAP
CPE
……
IP
v-VPLS
Physical port
CPE (VLAN attached to user facing network
gateway interface)
CPE
iBridge VLAN with secure
forwarding enabled
User IP address part of the IPoE user interface
802.1x authentication
user gateway interface (DSL/PVC or DSL),
can be enabled
subnet untagged
ONT
RG
R
Aggregation
Network
DHCP
Relay
L2
LT NT
EiB R
LT NT
Identical LT configuration
EiB B in Hub and Sub ISAMs
Sub ISAM
EiB: Enhanced iBridge
IGP
L3
IGP
Aggregation
L3 Network
IGP
L3
18.3 ARP
18.1 Introduction
This section addresses layer 3 protocols in the scope of a layer 3 forwarded model
as described in chapter “IP routing”.
Layer 3 protocols can be divided into two parts:
• routing protocols: see section “IPv4 Routing Protocols” and “IPv6 routing
protocols”
• user access protocols:
• ARP: see section “ARP”
• DHCP Relay: see section “DHCP relay agent”
• DHCP: see section “DHCP snooping”
• Neighbour Discovery (ICMPv6): refer to section “Neighbour Discovery (ICMPv6)”
• DHCPv6 Relay: refer to section “DHCPv6 Relay Agent”
• DHCPv6 Snooping: refer to section “DHCPv6 Snooping”
The ISAM will report alarms to inform the Manager about lack of resources, major
issues and state transitions in the protocol.
18.3 ARP
The IETF RFC 826 defined Address Resolution Protocol (ARP) is a protocol defined
within the context of using IP over Ethernet. An IP node uses the ARP protocol to
obtain the Ethernet MAC address of another IP node identified by a known IP
address and connected to the same Layer 2 network.
This section describes ARP handling in ISAM in case of an IP routing model.
ARP protocol tracing can be enabled on a few subscriber interfaces. The system can
provide the list of messages exchanged with the subscriber to the ISAM syslog utility
that will determine the destination of the traces (that is, CLI screen, remote server,
local file).
Subscribers connected to the same interface may get IP addresses in the same
subnet or from different subnets. User-to-user communication between those
subscribers would be via the ISAM.
LT 1 NT
VLAN 1
LT x VPRN / IES
LT16 VLAN 2
Usually, the NT board does not need to perform DHCP snooping except for the
following two cases:
• The Lawful Intercept functionality is enabled on the system. In this case, the NT
board snoops DHCP messages in order to establish filters in the data plane for
specific customer traffic. More details can be found in chapter “Resource
management and authentication”.
• IPv6 routing is enabled on the system. In this case, the NT board snoops DHCPv6
messages to learn the IPv6 prefixes assigned to the subscribers attached to the
ISAM and to dynamically populate the IPv6 routing table (FIB).
TWAMP Light session-reflector function is supported for both base router and virtual
router instances.
ISAM supports a maximum of 32 TWAMP Light sessions and can reflect up to a
maximum of 10 TWAMP packets/second per session.
18.8.1 OSPFv3
All features that relate to OSPFv2 in the context of an IPv4 routed network remain
applicable to OSPFv3.
OSPFv3 for distribution of IPv6 routes is supported in the Base Router only.
18.8.2 IS-ISv6
The ISAM supports "IS-ISv6" which refers to advertising IPv6 routes using two IS-IS
TLVs: the reachability TLV and the interface address TLV. These enable distributing
the necessary IPv6 information throughout a routing domain. Using this method,
IPv4 and IPv6 routes can both be routed in the same domain.
The ISAM supports "Multi Topology IS-IS", which allows to maintain multiple distinct
IP topologies. This can be used amongst others for maintaining a different IPv4 and
IPv6 routing topology in the same domain.
The following (pre-)RFCs are supported:
• draft-ietf-isis-ipv6-05 (pre-draft of IETF RFC 5308)
• draft-ietf-isis-wg-multi-topology-xx (pre-draft of IETF RFC 5120)
18.8.3 BGP-4
All BGP features used for IPv4 remain applicable to IPv6. In addition, the following
RFCs are supported:
• RFC 4760 - Multiprotocol Extensions for BGP-4
• RFC 2545 - Use of BGP-4 Multiprotocol Extensions for IPv6 Inter-Domain Routing
BGP-4 is supported in the Base Router as well as in VPRNs.
18.9.1 Proxy ND
Proxy Neighbor Discovery (ND) is similar to local proxy ARP. This feature is useful
in a residential bridging environment where end users are not allowed to
communicate to each other directly, even when they would belong to the same
globally routable IPv6 subnet.
Proxy ND can be enabled per IPv6 interface of a VPRN or IES (base router), and
when enabled, the router will behave as follows:
• Respond to all neighbor solicitation messages received on the interface for IPv6
addresses in the subnet(s) with system MAC address as Link-layer address.
• Forward traffic between hosts in the subnet(s) of the interface.
• Drop traffic between hosts if the link-layer address information for the IPv6
destination has not been learned.
last 64 bits of the IPv6 address hold the “Interface Identifier”; the Interface ID is
typically based on the interface MAC address and therefore not of relevance to
the IPv6 anti-spoofing function.
• IPv6 address or prefix lease:
The ISAM also monitors the IPv6 address or prefix lease. The relation between
the subscriber IPv6 address or prefix and the subscriber interface is removed
when the lease time is expired.
The ISAM supports BFD for fast failure detection with the following protocols:
• Static routing (for example, configured routes)
• OSPF
• IS-IS
• BGP
• PIM-SSM
• MPLS Pseudowires (T-LDP)
• RSVP-TE
• Ethernet Link Aggregation Group (LAG)
BFD can operate either over a single IP hop, or over multiple hops, for example,
across different routing areas. The latter is the case, for example, when protecting a
BGP session running between two routers that are not directly attached.
The ISAM can configure the message rate for each BFD session. Multiple BFD
sessions can be supported in parallel (for example, one BFD session per IP
interface, terminated on the directly attached peer). The BFD message rate can be
configured according to the required detection speed: high message rates provide
for faster failure detection. It is an operator decision to select the balance between
the number of BFD sessions and the message rate.
The configuration of the BFD polling interval should take into account the time
required for the packet to reach the destination. For instance, when using multi-hop
BFD, the polling interval may be set higher than one second to avoid the BFD
session from timing out before the packets reach the destination.
When using multi-hop BFD over an Ethernet LAG, one should take care that the
failure detection time is set greater than the LAG failure detection time of one second.
Otherwise, the BFD session would time out too soon, which would defeat the
purpose of using an LAG.
19.1 Overview
Multicast is the simultaneous transmission from a single device (such as a video
head end) to a group of recipients (such as video Set Top Boxes) using the most
efficient strategy to deliver the data over each link of the network only once.
The ISAM supports IP Multicast based on VLAN bridging (layer 2) technology.
Internet Group Management Protocol (IGMP) is the control protocol for multicast in
a layer 2 network. It is used between the recipients (hosts) and multicast routers to
join and leave a group.
By default, bridges flood multicast frames as well as IGMP packets between the
multicast router and the hosts. This not only creates a security issues when end
users can see each other's IGMP messages, but also the resulting bandwidth waste
is unacceptable on relatively low bandwidth interfaces like xDSL. Bridges can
optimize the bandwidth usage by snooping the IGMP control packets exchanged
between hosts and multicast router. Efficient multicast trees are constructed from the
learned information. The ISAM supports IGMP proxy, which serves as an alternative
variant for IGMP snooping.
Bridge IP network
Bridged
Member group A VLAN
Member group B
data
IGMP
Member group B
In Figure 262, the multicast forwarder is shown as segregated from the unicast
forwarder for the same VLAN. Multicasting, as opposed to flooding, is only supported
in VLANs that have IGMP enabled, so-called multicast VLANs.
Figure 262 Multicast data plane
DSL interfa ce Port P2
Unicast forwarding VLAN Port GE interface
iBridge
IGMP can only be enabled on network VLANs whose unicast forwarder is an iBridge,
but not a cross-connect VLAN.
IGMP can also be enabled on a network VLAN terminated in an IP interface. But
then, for multicast traffic, this network VLAN must have user-side ports besides
network-side ports, see Figure 262.
ISAM
Edge Router
IHub
LT
CPE
VRF VLAN B
Edge Router
VLAN A
If IGMP is not enabled, then the forwarder is either transparent for or discards IGMP
packets and multicast frames. Refer to Table 64.
IGMP
R Proxy H
upda te
join 240.0.10.1
join 240.0.10.2 Multica st Fwd
join 240.0.10.1
VLAN port
By default, IGMP version 2 as well as IGMP version 3 are supported. The system can
be configured to only accept IGMPv3 and drop incoming IGMPv2 messages.
IGMPv1 messages will always be dropped.
Multicast services are configured on subscriber ports by creating an IGMP channel
on top of the subscriber port. This enables IGMP proxy on the subscriber port.
By enabling IGMP on a network VLAN, that is, making it a multicast VLAN, IGMP
snooping is enabled on all the network ports and the subtending ports that are in that
VLAN.
When IGMP is encapsulated over PPP, it is handled transparently.
IGMP proxy as an alternate to PIM-SSM is enhanced to provide multicast
forwarding/routing with interface level redundancy. Active/Active or Active/Standby
redundancy states for IGMP Proxy version 2/3 support is enabled once configured
on Proxy enabled IES interfaces. Hashing of Multicast traffic distribution occurs in a
simple round-robin manner spread across all active proxy interfaces. ISAM does
aggregation of joins/leaves from IES interfaces as well as converts them to
appropriate IGMPv2/v3 report type before sending in upstream direction to PIM
enabled Routers.
IGMP static
Branch Root
dynamic
In cross-VLAN multicasting, when the subscriber joins a channel, the ISAM finds the
multicast VLAN from the preconfigured multicast channel. If the requested multicast
IP address, possibly extended with source IP address (see Section “Source Specific
Multicasting”) is not in the list of multicast channels, then the join is handled in the
scope of the subscriber VLAN. In case the subscriber VLAN forwarder is an iBridge
(that is, multicasting is supported), the join is proxied as a “best-effort” video service.
Otherwise, the join is transparently forwarded or is discarded, see Table 64.
STB Edge
router
Fwd BTV VLAN 15
BTV + VOD
Fwd VOD VLAN 16
Multicast
channel list
Multicast
VLAN
IP address
240.0.10.1 15
240.0.10.2 15
Note 1 — The method to use SSM in the control plane but not
in the data plane of L2 networks is specified in BBF TR-101.
Note 2 — For GPON and XGS-PON / TWDM-PON access
IGMPv3-SSM is supported for selected ONTs only.
Figure 268 Source Specific Multicasting
Aggregation network Video
ISAM
Head End
STB
Edge
(240.0.10.1,140.20.20.1) router
Fwd 140.20.20.1
BTV VLAN 15
(240.0.10.1,144.30.30.1)
Fwd
VOD VLAN 36
144.30.30.1
Multicast Multicast
Fws table channel list
Multicast Multicast Source
VLAN VLAN
IP address IP address IP address
240.0.10.1 15 240.0.10.1 140.20.20.1 15
240.0.10.1 36 240.0.10.1 144.30.30.1 36
Fwd
BTV S-VLAN 16
The “fixed Multicast VLAN per IGMP channel” mode is defined at system level and
cannot be used simultaneously with other modes where multiple Video Service
Providers can be selected by the subscribers by means of either the “Group Address”
(ASM) or the “Source Address” (SSM).
Zapping behavior is such that the host which left the multicast channel does not wait
until the multicast channel is stopped and immediately joins another multicast
channel. During a short time, both the old and the new multicast channel are
therefore present on the subscriber port. For xDSL lines, which bandwidth is often
tailored to accommodate a limited number of multicast channels, the extra bandwidth
from the old channel may lead to frame loss.
With fast leave, the ISAM keeps track of all the hosts that joined a certain multicast
channel and immediately knows when the last host on the subscriber port has left the
multicast channel. If that is the case, then the ISAM immediately updates the
Multicast Fwd table to stop replication on that port.
Fast leave can be enabled per multicast channel.
Figure 270 Fast leave on subscriber ports
normal leave fast leave
ISAM ISAM
STB STB
CPE CPE
bandwidth bandwidth
240.0.0.1 240.0.0.1
time time
Packages can also be used to give limited preview access to multicast channels. The
set of multicast packages that are allowed to be previewed is then configured per
IGMP channel. With preview access, subscribers can view the multicast channel
during a short time period.
Join 240.0.0.
1
Query
Querier
MR SAP
The ISAM is able to process IGMP query messages having a source IP address
0.0.0.0. These messages may be sent by an Ethernet switch acting as IGMP proxy,
which does not have an allocated IP address. Processing such IGMP messages is
useful to speed up network convergence for network topologies with ISAMs
connected in a ring that is connected to a separate Ethernet switch acting as a Root
of the Spanning Tree or acting as the Ring Protection Owner.
To be effective in avoiding overload issues, the operator should make sure that these
forked IGMP packets are not snooped/proxied in the ISAM or elsewhere in the
aggregation network. In particular, the operator should:
• choose a BTV VLAN different from any unicast forwarding VLAN in which forked
packets are inserted
• not deploy non-configured (best effort) multicast service in any unicast VLAN in
which forked packets are inserted
• not deploy L2 LT boards in the ISAM (because such cards apply IGMP proxy on
ALL the network VLANs, even on unicast VLANs that may carry forked IGMP
traffic)
19.2.12 PIM-SSM
The ISAM implements the PIM Source Specific Multicast (PIM-SSM) variant of
PIM-SM (PIM Sparse Mode) because it is better suited for the one-to-many topology
typically used for IPTV deployments.
ISAM supports PIM-SSM on network interfaces according to RFC 4601 with the
following remarks:
• Due to the location of the ISAM in the network, the PIM-SSM roles supported by
the ISAM are limited to “Designated Router” (DR) and “Last Hop Router” (LHR).
• PIM-SSM is only supported for the base router (that is, not supported for VPRNs)
As LHR, the ISAM is responsible for converting IGMP messages received from the
subscribers into PIM-SSM ones. In order to support subscribers generating “Any
Source Multicast” (ASM) messages (that is, IGMPv2 or IGMPv3-SSM), the ISAM
provides an “SSM translation function” that will convert ASM messages into SSM
ones by adding an IP source address selected in function of the “Group Address”,
provided the “Group Address” belongs to the ASM range as indicated in Figure 273.
Figure 273 SSM Translate Overview
SSM txl
Provider A1 IPSA1
ASM
Group IP Address
Provider A2 IPSA2
Provider A3 IPSA3
SSM
Multicast routing using PIM-SSM enables source-based tree approach for multicast
traffic forwarding with PIM neighbors established via IP connectivity discovered
using unicast routing protocols such as OSPF/ISIS/BGP. Reverse path forwarding is
performed using the Source-Unicast address to validate the upstream interface for
the given multicast source. MP-BGP is capable of supporting two sets of routing
information, one set for unicast routing and another for multicast routing.
Using AFI=1 SAFI=2 BGP exchanges IPv4 prefixes used for RPF checks against
each multicast packet to verify the upstream interface to be the one in which the
multicast source is advertised and reachable.
For GPON and XGS-PON / TWDM-PON based access, the ISAM performs the same
functions as a DSL LT, but in this case the multicast forwarder replicates multicast
packets to the various OLT ports, that is the various PON interfaces. The PON
technology itself, due to its point-to-multipoint nature, ensures that all ONTs coupled
to the PON receive all multicast streams that were forwarded onto the PON. The
ONT also acts as a multicast forwarder, which replicates multicast streams to the
correct ONT ports (UNIs).
There are two basic models for configuring the ONT multicast forwarding table:
1 The ONT is transparent for IGMP messages. IGMP messages are handled on
the OLT in the IGMP proxy, and once an IGMP JOIN is accepted, possibly after
performing a RAC check on the subscriber port or an Access Control check, the
ONT is instructed to create multicast branches to the right UNIs via a
Nokia-proprietary ONT-to-OLT signaling
2 The ONT performs IGMP snooping in order to learn what multicast branches it
needs to create towards the UNIs. Depending on the ONT Management Control
Interface (OMCI) capabilities supported by the ONT, two sub-modes can be
considered:
• RAC/Access rights management by OMCI not supported:
In this mode, no RAC checks on the subscriber port are done on the ONT, neither
Access Control checks. Next the IGMP messages are further sent to the OLT where
they are processed in the IGMP proxy.
• RAC/Access right management by OMCI supported:
In this mode, the OLT delegates some part of the RAC and access rights control to
the ONT by provisioning through OMCI a set of rules (“multicast ACLs”) specifying:
* The list of allowed channels
* The bandwidth associated to the channel
* The default behavior for unconfigured channels
Once those rules are provisioned on the ONT, the ONT snooper can directly apply
those rules to check if an IGMP join can be granted or not. If granted, the IGMP join
is passed to the OLT for further processing (and it might happen that RAC / access
right controls at OLT level leads to decide not to grant the join).
This approach is a fully standard and therefore interoperable approach for managing
multicast services on ONTs.
Note that the “channel preview” cannot be provisioned through OMCI standards and
consequently, the feature cannot be used together with that ONT management
model.
Proxy
3
Proprietary
Join
Proxy
2 3
Join Join
Snooper
Proxy
mcast fwd
Multicast VLANs
Multicast channels
Multicast VLANs Multicast bundles
Multicast channels Router ports
IGMP channels Multicast trees
Multicast packages
mcast fwd
ONT IHub
Multicast IGMP Snooper
VLAN Aggregation
LT mcast fwd
network
IGMP Proxy
mcast fwd
Multicast VLANs
Multicast channels
Multicast VLANs Multicast bundles
Multicast channels Router ports
IGMP channels Multicast trees
Multicast packages
mcast fwd
ONT IHub
Multicast IGMP Snooper
VLAN Aggregation
LT mcast fwd
network
IGMP Proxy
mcast fwd
Multicast VLANs
Multicast channels
Multicast VLANs Multicast bundles
Multicast channels Router ports
IGMP channels Multicast trees
Multicast packages
Forwarder to which the IGMP channel not IGMP channel created, IGMP channel created,
user is linked for unicast created requested multicast requested multicast
traffic channel not in list channel in list
VLAN Cross-Connect IGMP and mcast IGMP and mcast IGMP proxy and mcast
transparent transparent replication
iBridge (IPoE) IGMP and mcast IGMP proxy and mcast IGMP proxy and mcast
discarded replication replication
UNI
Sub 1 NNI LT
NT
UNI
Sub 2
Subtending
NT Port
End-to-end multicast features are fully supported when using such a cascaded
network architecture where each switching state is equipped with either an IGMP
proxy or snooper to maximize the multicast scalability.
Note however that the IGMP proxy in charge of the UNI will support features
associated with subscriber management for multicast services while the NNI proxy
will focus on setting up the multicast infrastructure, mimicking the NT behavior.
The functional split is shown in Table 65.
Table 65 Multicast support per port type
Cross-VLAN multicast Y N N
Fast leave Y Y Y
Forking Y N N
20 Quality of Service
20.1 Introduction
20.1 Introduction
In addition to delivering best-effort, high-speed Internet services, xDSL access
networks are evolving to multiservice access networks that must be capable of
supporting a whole range of services, such as:
• conversational services (Voice over IP (VoIP), video telephony)
• video services (Video on Demand (VoD), Broadcast TV)
• transparent LAN services for business customers
• data services for business customers
• data services for residential customers
These services must be delivered with the appropriate level of QoS. In the case of
xDSL access networks with Ethernet aggregation, there are a number of network
elements, for example, BRAS, IP edge routers, ISAM, or CPE, that must each give
the correct priority treatment to the various application flows. Network performance
objectives for the different service types are documented in the ITU-T
Recommendation Y.1541 (Network performance objectives for IP-based services).
This is achieved by classifying these application flows at the ingress of the network
into a limited set of aggregate flows that are characterized by certain QoS markings.
The different network elements will then provide per-QoS class queuing and
scheduling for these aggregate flows.
As explained in the “Layer 2 forwarding” chapter, the ISAM, operating as a VULA
node, will connect to the network through untrusted uplinks where SLA enforcement
will be performed on traffic received from the network to guarantee fairness between
the various Content Providers directly interfacing with the ISAM. The result of the
SLA enforcement is then propagated downstream through the whole Access
Network by remarking either the p-bit or DEI fields of the packets.
This SLA enforcement is performed by an Ethernet LT hosting the network
interfaces, that is, the so-called "VULA uplinks".
The following section provides an overview of the role played by the ISAM in
end-to-end QoS.
20.2.1 Overview
Figure 279 shows the standard QoS model which includes a configurable
system-wide p-bit to traffic class mapping, four queues and a fixed scheduling
scheme. Some LT board types support an eight-queue model, as explained in the
following notes. If an LT board type is not explicitly mentioned in the following, then
it only supports the standard QoS model.
The GE and 10 GE Ethernet LT board always supports 8 queues.
Figure 279 Qos Overview - Standard Model
ISAM Traffic
.1p
queues Classes
TC7 111
Voice TC6 110
TC5 101
GE/FE WRR
Video TC4 100
WFQ
TC3 011
CL TC2 010
WRR
WFQ TC1 001
BE TC0 000
DSCP to P-bits
Traffic Classes
Classification
p-bit marking
Mapping of
Scheduling
Mapping to
Mapping to
queues
The flexible model can be configured for GPON and XGS-PON / TWDM-PON
subscribers. Both the standard model and the flexible model are described in more
detail in the following sub-sections.
The same model, but a fixed number of 8 queues, is also supported by the 10GE
Ethernet LT board.
Figure 280 QoS Overview - Flexible Model
.1p
ISAM Traffic
queues classes
110 VoIP
VLAN 1
Queue7 TC 7 101
Queue6 TC 6
Queue5 TC 5
GigE/FE
SP+WFQ Queue4 TC 4
Scheduler
Queue3 TC 3 001 HSI #1
VLAN 2
Queue2 TC 2 000
Queue1 TC 1
001 HSI #2
Queue0 TC 0 VLAN 3
000
20.2.2 Classification
The purpose of classification is to identify flows or streams of traffic which need a
different treatment, that is, which require a different quality of service.
Figure 281 QoS: classification
1. Voice
classification
For the Standard Model of Figure 279, four main traffic classes have been identified:
Voice, Video, Controlled Load (CL) and Best Effort (BE). These traffic classes are
listed in Table 66, together with their application and recommended 802.1p value.
For LT boards that only support four queues, the eight traffic classes are mapped to
four queues, according to a fixed scheme. See “Mapping and queueing” for details.
For LT boards that support 8 queues, each traffic class is mapped to its own queue.
This approach segregates network control, voice and video-telephony into the
highest priority queue, broadcast video and video-on-demand into the second
queue, business customer data traffic into a third queue, and residential customer
data traffic into the fourth.
Table 66 Classes, application, and recommended 802.1p value
When the outcome of classification is “discard”, we are dealing with Traffic filtering
by means of Access Control Lists (ACLs). In this way, it is possible to filter out certain
packet flows based on multi-field classification at layer 3/4 or layer 2.
Control plane and management plane traffic is separately classified based on
protocol type.
20.2.3 Marking
Marking is defining the value of:
• layer 2: p-bits - part of the VLAN-tag
• layer 3: DSCP - part of the IP packet header
111
110
101
100
011
010
001
000
In addition to the above policies it is also possible to align the p-bits, i.e. p-bits are
derived from the DSCP codepoint, or IPv6 Traffic Class field. The upstream mapping
of DSCP codepoint to p-bit value can be achieved in two ways:
• Using a system-wide p-bit alignment table, or
• Associating a p-bit alignment profile with a subscriber
The second option is only available for GPON and XGS-PON / TWDM-PON
subscribers, but has the advantage that different mappings can be used for different
groups of subscribers. This is useful, for example, if the ISAM is used in a wholesale
environment where different mappings are needed for different service providers.
For stacked VLANs, there are some additional points to note related to p-bit marking
• In case of S+C VLAN cross-connect or S+C VLAN RB, following four options can
be configured separately for S+C cross-connect and S+C iBridge and for
upstream and downstream direction.
• In upstream direction:
* both S and C-VLAN p-bits are set to the same value.
* For tagged traffic C VLAN p-bit is left untouched and only S VLAN p-bit is marked.
For untagged traffic both S and V VLAN will be marked with same value.
• In downstream direction:
* S-VLAN p-bit is used as input for determining the downstream p-bit and related
scheduling.
* C-VLAN p-bit is used as input for determining the downstream p-bit and related
scheduling.
• In case of S-VLAN CC tunnel or S-VLAN RB tunnel, the C-VLAN p-bit is never
modified. The S-VLAN p-bit is set according to the preceding explanation. The
default behavior for tagged frames is to copy the C-VLAN p-bit, if no other marking
is specified.
P-bit marking for the S-VLAN CC tunnel can optionally be modified to provide
backward compatibility with the so-called "wildcard flow" option offered by the
7342 FTTU platform. If this mode is enabled, the p-bit marking rule assigned to
the S-VLAN tunnel takes as input the received p-bit, and the resulting p-bit is set
on both C-VLAN and S-VLAN.
Some limitations apply to tunnel VLANs for GPON and XGS-PON / TWDM-PON
subscribers:
• For S-VLAN tunnel, the S-VLAN p-bit is set to the VLAN port default p-bit when it
is enabled (that is, VLAN port marking policy = 'regenerated p-bit'). When the
VLAN port default p-bit is not enabled, then the p-bit is copied from the C-VLAN
p-bit (tagged frames) or is set to the bridge port default p-bit (untagged frames).
Note that other methods of marking the S-VLAN p-bit are not supported for GPON
and XGS-PON / TWDM-PON S-VLAN (for example, deriving the p-bit from the
DSCP codepoint).
• For S-VLAN RB tunnel, the p-bit contract enforcement/re-marking is not
supported on most ONT types.
The p-bit marking of protocol frames is handled in a different way to data plane traffic.
The handling differs according to the protocol.
Handling of protocol frames for non-GPON and XGS-PON / TWDM-PON
subscribers:
• IGMP frames sent by the ISAM are always marked with highest priority, that is,
p-bits=7.
• DHCP frames:
• When traffic is received with p-bits marked at user side, the marking is left
unchanged.
• When unmarked traffic is received, the default p-bit marking for the given VLAN is
applied.
• PPP control frames (for example, PADI/PADO) are marked with fixed p-bits=7.
The CDE option exists to configure in the same way as done for DHCP:
• When traffic is received with p-bits marked at user side, the marking is left
unchanged.
• When unmarked traffic is received, the default p-bit marking for the given VLAN is
applied.
• ARP frames are tagged always with highest priority (p-bit=7)
Handling of protocol frames for GPON and XGS-PON / TWDM-PON subscribers:
The VLAN port, on which a protocol frame is forwarded, may not have p-bit 7
configured. Some additional accommodation must be made to ensure that the
protocol frames are correctly forwarded.
• For IGMP frames generated by the LT board, the p-bit used is the highest p-bit
configured for the VLAN. This is true for both upstream and downstream packets.
• For ARP and DHCP, the p-bit marking follows the same rules as used for the data
plane traffic.
• PPP control frames are marked with fixed p-bit=7. There is also a CDE option to
configure in the same way as done for DHCP. The p-bit marking follows the same
rules as used for the data plane traffic.
20.2.4 Policing
Subscribers are subject to certain traffic contracts that specify how much traffic they
can send towards the network. Policers are installed to enforce these contracts.
A policer may apply to an entire subscriber interface, a VLAN or to QoS subflows
within the subscriber interface. In this context, a QoS subflow (or subclass) is defined
as the aggregate of packets flowing through the interface that are bound by a
subcontract and require a specific common treatment.
The 10GE Ethernet LT supports QoS subflows across multiple VLANs and/or
interfaces of the same LT allowing, for instance, to police multiple VLANs as a single
aggregate (for example business services implementing path redundancy using two
VLANs located on the same or different physical ports and operating in
active/standby mode).
Two types of policer are supported:
• single token bucket policer
• two-rate three-color policer (supported only on GE and 10GE Ethernet LT boards,
GPON and XGS-PON / TWDM-PON LT boards)
Figure 284 illustrates the policing feature implementation for a single token bucket
policer.
Figure 284 Policing implementation framework
L2 filter
CIR L3 filter
CBS Policy-action=
Policer-Profile
Per-SAP policing
Subflow policing
Figure 285 shows the different QoS queues for the standard QoS model, employing
four traffic classes and four queues. The configurable mapping of p-bits to traffic
class is system-wide. The mapping of traffic class to queue is non-configurable on
the LT boards and on the FD 100Gbps NT, but is configurable on the FD 320Gbps
NT and the FX NT.
Figure 285 QoS queues for standard model
ISAM Traffic
.1p
queues Classes
TC7 111
Voice TC6 110
TC5 101
DSCP to P-bits
Traffic Classes
Classification
p-bit marking
Mapping of
Mapping to
Mapping to
queues
The eight traffic classes are mapped either to four queues or to eight queues. The
selection of which mapping to use is hardware dependent, depending on how many
hardware queues are supported by a specific LT board type. Again this mapping is
non-configurable on the LT boards and on the FD 100Gbps NT, but is configurable
on the FD 320Gbps NT and the FX NT. The non-configurable mappings (used on the
LT boards and the FD 100Gbps NT) are as shown in Table 67. Details of the default
mappings used on the FD 320Gbps NT and the FX NT can be found in Table 75 and
Table 76.
Table 67 Mapping of Traffic Classes into Queues
7 3 7
6 3 6
5 2 5
4 2 4
3 1 3
2 1 2
(1 of 2)
0 0 0
(2 of 2)
For UNI ports on a GE Ethernet LT board, it is advised to align the p-bit to traffic class
mapping per forwarder, for use in the downstream direction, to the system-wide
mapping. This alignment must be done explicitly because the mapping per forwarder
is not explicitly defaulted to the system-wide mapping when not programmed. This
explicit alignment is not needed when the system-wide mapping is kept identical to
the default configuration. Refer to “QoS on a GE Ethernet LT board” for further
details.
The GPON, XGS-PON / TWDM-PON and 10G Ethernet LT boards also use a
configurable per forwarder p-bit to traffic class mapping. However, for these boards,
the per forwarder mapping is required, since the system-wide mapping is not used.
It is also optionally possible to define a mapping of p-bits to color marking. There are
two types of color marking available:
• Policer color marking (green, yellow, or red)): based on received p-bit value,
applicable to the GE Ethernet LT board
• Per forwarder color marking (green, yellow, red): based on re-marked p-bit value,
applicable to the GPON, XGS-PON / TWDM-PON and 10GE Ethernet LT boards.
An option exists to mark the color based on the DEI bit in the packet, rather than
the p-bits.
The NT card provides a similar behavior, that is, the ability to map a p-bit value to
a color on a per-forwarder basis with the option to use the DEI in place of the p-bit
for that purpose.
• System wide Drop Precedence (DP) color marking (either green or yellow), based
on re-marked p-bit value, applicable to other LT board types. The GE Ethernet LT
board also supports the option to use DEI in place of the p-bit value to mark the
color.
The color marking is used as input to color-aware BAC. See “Queue configuration
and queue profile” for description of color-aware BAC. The policer color marking is
used as input to color-aware policing.
TC7 111
Voice TC6 110
TC5 101
GE/FE WRR
Video TC4 100
WFQ
TC3 011
CL TC2 010
WRR
WFQ TC1 001
BE TC0 000
DSCP to P-bits
Traffic Classes
Classification
p-bit marking
Mapping of
Scheduling
Mapping to
Mapping to
queues
Video SP
CL
WFQ
BE
Scheduling is work-conserving, that is, lower QoS classes can occupy bandwidth
that is not actually consumed by higher QoS classes.
This model implies that both voice and video traffic are very well contained and only
trusted sources are allowed to use the high-priority traffic classes.
20.2.8 MPLS
VPLS/EPIPE L2 VPN services allow to pass Ethernet frames from a user in a
transparent manner over an MPLS network using pseudo-wires (PWs). The LSRs in
the MPLS network use the EXP bits of the outer label to define the QoS handling.
Therefore the ISAM offers the possibility to configure the setting of these EXP bits.
Two models are supported:
• Fixed EXP value per service provider
• EXP value derived from the forwarding class
Note — The EXP bits of the outer label (transport) and the inner
label (service) are set identical. In case the MPLS packets are
sent tagged, the p-bit of the added DLC header will be set equal
to the EXP value.
Figure 288 PW data packet
20.3.1 Classification
Same capabilities as for upstream QoS handling (see “Classification”) with the
following addition for MPLS PW packets:
For packets entering a VPLS/EPIPE via a PW the classification can be based on the
EXP value of the inner service label or the p-bit of the encapsulated Ethernet frame.
20.3.2 Marking
In the downstream direction, frames usually arrive in the ISAM with DSCP or p-bits
properly marked by service-aware edge devices (such as BRAS, edge router,
application gateway, and so on). If this is not practical for some reason, the p-bits can
be aligned to the DSCP found in the packet IP header.
For GPON and XGS-PON / TWDM-PON subscribers, if a priority contract profile is
used to map the p-bits in the upstream direction, then the inverse mapping is applied
in the downstream direction. For example, if p-bit 1 is mapped to p-bit 2 upstream,
then p-bit 2 is mapped to p-bit 1 downstream.
For GPON and XGS-PON / TWDM-PON subscribers, there is also a CDE option
that, when enabled, will result in downstream p-bit being unchanged, so that the
inverse mapping will not be applied.
Further, multi-field based marking is supported in downstream; SAP-based marking
is only supported in upstream.
Same capabilities for marking of protocol frames as for upstream QoS handling
(see “Marking”) with the following addition for MPLS PW packets:
When a PW is defined of type ether, then a VLAN and p-bits need to be added. These
p-bits are then derived from the forwarding class defined by the classification logic.
20.3.3 Policing
No traffic engineering will be done at ingress on the network interfaces. The idea
here is that ingress policing and ACLs at the service provider level have already been
applied in a (access provider-owned) box deeper in the network.
However, after the forwarding decision egress policing may apply. Subscribers are
subject to certain traffic contracts that specify how much traffic they can receive on
their connection. Policers are installed to enforce these contracts. A policer may
apply to an entire subscriber interface or to a QoS subflow within the subscriber
interface.
As for upstream, it is possible to configure either single token bucket policers or
two-rate three-color policers.
The following QoS features are supported in the IHub switch hardware:
• Mapping packets to a flow class based on DSCP, PREC, p-bits/DEI or LSP EXP
(MPLS)
• Per service egress or ingress rate limitation
• Mapping of flow classes to egress queues
• Mapping of flow classes to LSP EXP value (MPLS)
• Buffer acceptance and scheduling at egress port side
• Per-port egress rate limitation
upstream
Segregation into DSL
GE output buffers
Per-DSLline
Per-DSL li Input ATM or EFM
aggregate (802.1P aggregates) Policing processing
processing reassembly
The input-processing entity stands for all the protocol and forwarding-plane
processing functions. Each frame received from the network interface will have a
handler or meta-data that will contain all the fields needed by subsequent
QoS-related functions.
The next phase is the classification, policing and segregation process within a DSL
link; see Figure 291.
Session rate limitation is achieved by way of policing. Policing can be done at
different subscriber SAPs: bridge port, VLAN port, IP interface, or PPP CC client port.
BAC is either Tail Drop or RED per downstream queue (optionally DP-aware).
A WFQ scheduler ensures fair redistribution of the remaining bandwidth between CL
and BE traffic. Some boards also support shaping per downstream queue.
Figure 292 shows the Ethernet-to-ATM QoS transition.
Figure 292 Ethernet-to-ATM QoS transition
Frame Domain Cell Domain
Segmentation
VOICE buffers VC1
Add correct
1 frame VPI/VCI VC2
VIDEO
SP
SP fields
VC3
CL Rate limitation to
WFQ
WFQ DSL bandwidth
DSL
BE
Ethernet (frame level)
scheduler
Scheduling is done solely on the Ethernet frame level, even for ATM-based DSL
transmission types.
The queuing decision (within a DSL port) is independent from the forwarding
decision. There is no explicit fairness between different PPPoE or IPoE sessions
within a DSL link. Their peak rate is enforced independently by way of policing, and
then they share the same First In First Out (FIFO) per traffic class.
Marking is generally applicable upstream, although with the policy framework, it is
possible to modify downstream p-bit and DSCP values. Packets may arrive from user
ports tagged, untagged, or priority-tagged. At the bridge port and VLAN port level,
the ISAM supports a re-marking table which maps all user-defined P-values to
allowed values. Untagged frames can be marked based on subscriber SAP defaults
(statically configured).
The ISAM allows also DSCP-marking for various subscriber SAPs. DSCP-to-DSCP
re-marking is also possible, just like p-bit re-marking for tagged and priority-tagged
frames. Finally, a global DSCP-to-p-bit alignment table is provided to align
DSCP-marked traffic on selected interfaces to p-bits, as traffic segregation still relies
on p-bits.
PPP-session marking for p-bits is possible based on the QoS session profile
attributes.
The bit used for marking upstream frames is also used for downstream prioritization
of unicast traffic (the priority level equals p-bits/2).
Figure 293 GPON and XGS-PON / TWDM-PON LT and ONT combined into a
single management entity
xDSL
NE xDSL
LT
Eth
Network NT Eth
LT
DSL
GPON ONT ETH
LT ONU CES
POTS
Packets can also be marked at the GPON and XGS-PON / TWDM-PON line card as
outlined here:
• The GPON and XGS-PON / TWDM-PON linecard can be configured to perform
upstream DSCP to p-bit alignment, for untagged and tagged IPv4 and IPv6 traffic.
Both encapsulation in PPPoE as well as in plain Ethernet are supported. The
DSCP to p-bit alignment on the GPON and XGS-PON / TWDM-PON linecard
must be based on the system level DSCP to p-bit alignment table
• Marking of p-bits as a policy action is supported at the GPON and XGS-PON /
TWDM-PON line card (i.e. a p-bit value can be set as a filter action). However,
marking of DSCP as a policy action is not supported. Also note the that:
• Since the subflow p-bit marking is applied in the ISAM, upstream QoS actions on the
ONT and on the PON will not use the subflow marking.
• The subflow p-bit marking is applied as follows to the different forwarder types:
* S+C forwarder: applied to both S tag and C tag
* S forwarder: applied only to S tag
* C forwarder: applied to C tag
Policing
As for DSL subscribers, policing is possible for GPON and XGS-PON / TWDM-PON
subscribers, both in the upstream and downstream directions. Downstream policing
is always performed by the ISAM; upstream policing can also be performed by the
ISAM, except VLAN port policing for MDU subscribers, which is performed by the
MDU itself. Note that for GPON and XGS-PON / TWDM-PON, a policer can be
attached to a VLAN port or to a bridge port. As for DSL subscribers, for GPON and
XGS-PON / TWDM-PON a policer can also be attached to a filter.
Upstream scheduling and shaping
Inherent to the GPON and XGS-PON / TWDM-PON network architecture, upstream
transmission introduces an additional challenge as multiple ONTs share a common
medium: transmissions could collide if they were transmitted at random times. For
this, a TDMA-based Dynamic Bandwidth Allocation (DBA) mechanism has been
implemented at the GPON and XGS-PON / TWDM-PON control plane as part of the
of the Transmission Convergence (TC) layer. This layer thus manages the upstream
bandwidth efficiency, and provides support for differentiated services. Therefore, the
actual mapping of the traffic into queues and possible scheduling of the queues
within a certain traffic subflow should be understood with reference to the underlying
TC layer parameters. Two key entities used in the TC layer are the Traffic Container
(T-CONT) and the port ID of the GPON Encapsulation Method, or GEM port id, as it
is known for GPON, respectively XGEM port is as it is known for XGS-PON /
TWDM-PON.
The T-CONT can be thought of as a bandwidth pipe. At the egress of the UNI
interfaces towards the PON link, rate shaping is activated on the T-CONT level and
triggered by the DBA mechanism. The DBA will issue grants to ensure that the rate
allocated to a T-CONT will not exceed its provisioned traffic contract (reflected by
CIR, AIR and EIR). For example, for a fixed bandwidth T-CONT (Type 1), the rate is
limited to the CIR; for a best effort bandwidth T-CONT (Type 4), the rate is limited to
the EIR. The Nokia GPON and XGS-PON / TWDM-PON solution supports all
T-CONT types, from 1 to 5.
EIR
Best-Effort Bandwidth
Additional
Bandwidth
Non-Assured Bandwidth DBA
AIR
Assured Bandwidth
Guaranteed CIR
Bandwidth Statically
Fixed Bandwidth reserved
Data sent over the PON is encapsulated in the GEM header. The GEM header
includes the GEM port id which uniquely identifies a traffic flow or group of traffic
flows for a specific UNI. In the ONT, a GEM port is associated with a specific traffic
queue towards the PON.
By default, GEM ports are allocated for each VLAN port, with a separate GEM port
allocated for each traffic class used (defined by the p-bit to traffic class mapping,
see “Ingress QoS profile (p-bit to traffic class mapping)”). There is also an option,
configurable at the UNI level, to share the same GEM ports for all VLAN ports on the
UNI. When this option is used, the p-bit to traffic class mapping used for the VLAN
ports must be ‘non-conflicting’. For example, it is not possible to have p-bit 1 map to
TC1 for one VLAN port and have p-bit 1 map to TC2 for a second VLAN port.
The main features of the upstream scheduling and shaping are as follows.
• Each UNI on a PON is allocated either four or eight queues. (The number is
configurable per ONT.) These queues are located on the ONT. Each queue is
configured with priority and weight parameters. A T-CONT is also associated with
each queue. There is also an option to share the queues between all UNIs on an
ONT.
• An option exists to configure the upstream ONT queues on the VLAN port level,
rather than on a UNI or ONT level. In this case, T-CONTs are also allocated at the
VLAN port level. This has he benefit that bandwidth parameters can be configured
individually for each VLAN port.
• The characteristics of the T-CONT are configured in a bandwidth profile and
include rate parameters CIR, AIR, EIR. Grants are issued by the GPON and
XGS-PON / TWDM-PON LT to the ONTs on the PON, to ensure for each
T-CONT, the committed rate and (on average) the assured rate. Also, for each
T-CONT, the traffic is shaped to the maximum of CIR, AIR and EIR.
• Queues are scheduled using strict priority or WFQ algorithms, within the T-CONT,
according to the configured priorities and weights. It is also possible to configure
a mixture of strict priority and WFQ. The WFQ queues should all be configured
with the same priority. Note that more than one WRR group in a mixed SP+WRR
scheduling mode is not supported. When more than one WRR group is
config-ured in a mixed SP+WRR mode, the OLT will use the configured weights
to support a pure WRR mode. In other words, the configured priorities will be
ignored by the OLT and only the weights will be used.
• The 'bandwidth profile sharing' attribute allows a T-CONT to be shared by multiple
queues within a UNI and also across multiple UNIs within the same ONT.
However, a T-CONT cannot be shared between ONTs.
• When queues are configured at the VLAN port level, bandwidth profile sharing
can be set to 'vlan-port-sharing' which will result in a single T-CONT for each
VLAN port, shared by all queues for the VLAN port.
• When the upstream traffic is forwarded from the LT to the NT, a simple,
non-configurable queuing mechanism is used. Traffic enters a single queue per
uplink and is classified as critical, high or low priority. Critical priority is reserved
for internal LT-to-NT communications and other traffic is classified as high or low
priority based on p-bits. The queue fill level has two thresholds: when the queue
fills to the lower threshold, low priority traffic is dropped; when the queue fills to
the higher threshold, low and high priority traffic is dropped.
• For some ONT types, there is the option to perform shaping of upstream traffic for
individual queues, before the traffic reaches the T-CONT. In this way, when a
T-CONT serves multiple queues, a hierarchical shaping is achieved by shaping at
the queue level and also at the T-CONT level. This option is supported for queues
both at the UNI level and at the VLAN port level. It is configured by associating a
shaper profile to the upstream queue.
Figure 295 illustrates the mapping of traffic to queues and the TC layer parameters,
as well as bandwidth profile sharing.
Figure 295 Upstream traffic mapping to queues and TC layer parameters
Different priorities: SP
BW profile Identical priorities: WFQ BW profile sharing
ENABLED
-> T-CONT
GEM
SP
T-CONT Pbitx
WFQ .
GEM Pbit-to-queue .
mapping .
Pbitz
T-CONT GEM
BW profile sharing
DISABLED
When shaping is performed at multiple levels (for example, queue level and UNI
level) it is advised to set the rate at the lower level to a lower value than the rate
at the higher level. For example, in the case that queue and UNI level shaping are
configured, the queue rate should be configured to a lower value than the UNI
rate. Not following this rule can lead to unexpected behavior because the
operation of the two shapers is not synchronized.
Voice
R SP
Voice
Hig h Pr io r ity
R SP
Low Priority R WFQ
Multicast streams R SP
broadcasts and R SP
Bincidental multicasts
TC w
R
R WFQ
TC w
R
TC z
R
UNI level
scheduler
ONT level
scheduler
PON level
scheduler
The GPON and XGS-PON / TWDM-PON LT board supports both tail drop and
color-aware RED buffer admission control. The GPON and XGS-PON / TWDM-PON
ONT only supports tail drop
For many ONT types, the downstream queues on the ONT are not configurable. The
exact implementation varies by ONT type. The number of queues used can be eight
(for example, Freescale ONT), four, or two (for example, Broadcom ONT). Generally,
traffic is assigned to the queues based on p-bit marking, and traffic with higher p-bit
values is scheduled ahead of traffic with lower p-bit values.
Some ONT types support configuration of priority and weight for the downstream
queues. To distinguish these queues from the downstream queues on the ISAM,
they are referred to as “remote queues”. Per UNI, either four or eight remote queues
may be configured with priority and weight. Scheduling is performed in accordance
with the configured priorities and weights.
2) Service-based flat scheduling
In addition to the above model, the FGLT-B and FWLT-A/B boards also offer a
scheduling option called "service-based flat scheduling". The model is shown in
Figure 297.
Figure 297 Service-based flat scheduling
Traffic prioritization
only on p-bit for ALL
customers, not per
Multicast and ONT
Unicast VOD to use
same queue 010G
P1,
Pbit 5
P2,
GPON B-010G
Pbit 3, 6, 7 010G
ALL TRAFFIC
W1
Pbit 2, 4
SP
P3,
WFQ
010G
B-010G
Pbit 0, 1
W2
This model uses service-based scheduling across all subscribers, using a flat
class-based scheduler and aggregated queues associated with the PON port. In
other words, traffic prioritization is not done per ONT, but is done per p-bit for all
customers connected to the same PON port.
The model uses 8 queues per PON port, and all downstream traffic is mapped to the
appropriate queue based on the p-bit (depending on the configuration some queues
can remain unused if desired).
Downstream multicast traffic is not sent using a dedicated queue. Instead, multicast
traffic is treated in the same way as unicast traffic: it is mapped to one of 8 queues
based on the p-bit. This also implies that unicast video and multicast video share the
same queue.
Traffic prioritization is done based on the p-bit for ALL customers, not per ONT. The
QoS behavior is the same for ALL customers, both residential as well as business
customers.
Configuration of priorities and weights is done in a similar way to the
subscriber-based hierarchical scheduler, but limited to a single scheduling level.
Table 68 QoS capabilities of UNI ports and NNI ports on GE Ethernet LT boards
Legend:
BP: supported at Bridge Port level
VP: supported at VLAN port level
Notes
(1) VLAN-based p-bit to queue mapping is only supported in the downstream direction. System level mapping is recommended
(2) Upstream only
(3) Downstream limited to VLAN Cross-connect models
• CAC checks are made using the aggregate bandwidth of the LAG, not the
bandwidth of the individual physical ports.
• QoS counters apply to the LAG, not to the individual physical ports of the LAG.
Scheduler Queues 8
(1 of 2)
VLAN shaping N
(2 of 2)
Notes
(1) Supported on UNI / NNI only
WRED (3 colors) Y Y
Hierarchical N X
Notes
(1) Supported on NNI only
The 10GE Ethernet LT is fully modeling the LAG as a logical interface while
performing Traffic Management operations. In other words, forwarding and QoS
operations (queuing, scheduling, shaping, remarking, policing, …) are all performed
on the LAG logical interface and not on the individual LAG link members.
R1
O1 O-F O2
(1 of 2)
R1
C1 S+C-F C2 S
Inner based QinQ The received inner tag p-bit is taken as reference for a single
single rule remarking rule. The resulting p-bit is applied to both egress
inner and outer tags. If R1 does not modify the p-bit value,
this mode allows to copy the inner tag p-bit to the outer tag.
R1
C1 S1 S+C-F C2 S2
Dual remark .1Q The received outer tag (by definition of the .1Q VLAN port)
p-bit is taken as reference for a double remarking :
• R1: Remarking to egress inner tag
• R1: Remarking to egress outer tag
R1
C1 S+C-F C2 S
R2
QinQ The received inner tag p-bit is taken as reference for a double
remarking :
• R1: Remarking to egress inner tag
• R1: Remarking to egress outer tag
R1
C1 S1 S+C-F C2 S
R2
(2 of 2)
In order to support all these options, the QoS Session Profile described in
section “Session profile” is extended with a new "Ingress Outer Marker" Profile on top
of the existing "QoS Up Marker" Profile.
Figure 298 QoS session profile on the VULA uplink
QoS Policer
Profile Up
QoS Policer
Profiles
QoS Policer
Profile Down CIR, CBS L2 Filter
EIR, EBS
Mode, …
Dest MAC@
QoS Session Profile
Src MAC@
QoS Up VLAN Id
Marker Profile Ethertype
QoS Marker
OR Pbit
Profiles
Ingress Outer
Marker Profile L3 Filter
Pbit
DSCP
Dest IP@
Src IP@
Dest Port Range
Src Port Range
1…16 Protocol Id
QoS Policy
DSCP
List Up
QoS Policy Policy Action
QoS Policy List
Down Discard / Pass
1…4
Set Pbit
Set DSCP
Police
Up Ingress Outer
None None Transparently forward the ingress inner and outer tag p-bits
Present Pass inner tag p-bit transparently
Mark outer tag p-bit according to the Ingress Outer Marker Profile
Present None Mark both inner and outer tag p-bits according to the Up Marker Profile
Restrictions:
• The only Ingress Outer Marker Profile being currently supported is a p-bit
regeneration profile where all p-bits are remarked to the same value
For all trTCM variants, one can specify the actions to be taken in function results:
• Set the internal color
• Set the internal color and remark the p-bit (both S- and C-VLAN in case double
tagged traffic
• Set the internal color and remark the DEI (both S- and C-VLAN in case double
tagged traffic)
• Set the internal color and remark the DEI of the outer tag only.
The policing algorithms of the CoS based trTCM are extended in such a way that the
token bucket sizes (CBS/PBS or CBS/EBS) are virtually split in function of the packet
CoS parameters (that is, p-bit value) so that high priority packet would see the full
bucket size while lower priority ones would only see a smaller bucket size. This
allows to somehow prioritize packets in function of their CoS while using a single
policer, for example packets with low priority will be marked yellow or red sooner than
high priority packets.
The priority based trTCM policer is defined as follows :
• Up to 8 priorities can be defined
• A burst size percentage ("priority threshold") is associated with each priority (for
example 100% for p-bit 7, … 40% for p-bit 0). The same percentage is applied to
both trTCM buckets
• Packets are marked yellow / red whenever the bucket filling level > Burst Size x
the Burst Size percentage associated with that packet
• Token buckets are updated as usual based on in-profile/out-profile result of the
trTCM taking into account the percentage defined above
100% 2 100%
Additionally, the access network being agnostic to the delivered services, the
priorities defined by the service providers and/or their associated Residential
Gateway must be passed transparently between the Service Provider and the end
users. This is achieved by encapsulating the user traffic (C-VLAN) into an extra
VLAN (S-VLAN) so the Access Network Provider can apply its own p-bit marking
rules on the S-VLAN while keeping the C-VLAN untouched. According to this
scheme, traffic prioritization is then based on :
• S-VLAN pbit on all interfaces shared by multiple subscribers (and therefore
multiple service providers)
• C-VLAN p-bit on the interface attached to the subscribers (UNI), that is, queuing
is then performed into the context of that single subscriber, that is, using the p-bit
defined by the Content Provider
trTCM
CPE Remote DSLAM Hub-ISAM
Downlink P2P LT NT Uplink 10GE P2P LT
Upstream QoS processing reuses the generic upstream QoS features (see
section 20.2):
• Characterization of a subscriber flow based on the C-VLAN and p-bit
• Traffic remarking where inner and outer tags will be remarked using different
rules, both based on the C-VLAN (most often the C-VLAN p-bit is passed
transparently into the S-VLAN)
• Peak policing at the remote DSLAM UNI
• P-bit based queuing all the way upstream
Summarizing the downstream QoS features specific for an ISAM operating as a
VULA node:
• QoS handling based on S+C VLAN Port
• Dedicated remarking rules for S and C-VLAN
• TrTCM with color propagation at S-VLAN level (default is to propagate at both C
and S-VLAN levels), most typically using DEI (more flexibility)
For other LT board types, and UNI in the upstream direction, and NNI and HC-UNI
ports of the GE Ethernet LT boards, there is a single configurable system-wide
mapping table that maps p-bits to traffic class.
For the GE Ethernet LT board:
• NNI ports use the system-wide mapping table
• UNI ports use the system-wide mapping table if no ingress QoS profile has been
configured.
For the 10GE Ethernet, GPON and XGS-PON / TWDM-PON LT board, the ingress
QoS profile also defines how p-bits are mapped to color. The color marking is used
for color-aware policing and color-aware RED. There is also an option to use the DEI
bit in the packet to mark color, rather than using the p-bits.
Discard
probability
Arriving frames are accepted as long as the average queue filling level remains
below the minimum threshold. Frames received at the moment the minimum
threshold is exceeded will be dropped with a probability as indicated by the RED
curve.
For tail drop queues, only a max queue size has to be configured. Queue size is set
as the number of frames that can be stored in the queue. Arriving frames are queued
as long as the queue is not full. After the queue is full, all incoming frames are
discarded until the queue can transmit a frame over the subscriber line and space in
the queue is made available
In the case of color-aware BAC, a separate curve must be configured for each color.
That means, in the case of color-aware RED, that MinThreshold, MaxThreshold and
DropProbability are configured separately for each color. In the case of color-aware
tail drop, only MaxThreshold needs to be configured for each color. The following two
figures illustrate the three color WRED and the three color tail drop, respectively.
100%
Averaged queue
filling level
100%
Actual queue
filling level
For some GPON and XGS-PON / TWDM-PON ONT types, it is possible to configure
the maximum queue size for the upstream queues on the ONT. A queue profile is
used for that purpose. Due to a hardware limitation in the ONT types that support this
feature, currently all upstream queues on the ONT must use the same maximum
queue size. Therefore, all queues on an ONT should be configured with the same
queue profile.
Note 1 — BAC configuration for upstream queues on LT is
fixed, except for the 10GE Ethernet LT where it can be
provisioned.
Note 2 — L3 LT boards support buffer oversubscription.
The T-CONT type is determined by the CIR, AIR and EIR configuration; see
Table 73).
Table 73 Mapping CIR, AIR and EIR to T-CONT type
EIR No Provisioned EIR = AIR EIR = AIR EIR > AIR EIR EIR ≥ AIR
Logical Flow QoS Policer QoS Policer QoS Marker QoS Policy QoS Policy
Type Profile Up Profile Down Profile Up List Up List Down
The logical flow type is a mandatory parameter but is ignored from R4.0 onwards,
that is, the logical flow type is always considered null (generic). Hence, the QoS
Session profile can be attached to any interface, provided that the settings inside the
profile can be configured on the target hardware. Unsupported fields/actions are
silently ignored at run-time.
QoS Session profiles are assigned statically, as specified by the operator.
The scope of a QoS Session profile is always a user logical interface or Service
Access Point (SAP). The following are examples of such “logical interface” types
supported:
• PVC: all frames on a PVC
• 802.1X session: all frames on a bridge port that was opened via a 802.1X
authentication
• PVC.VLAN: all frames on a bridge port with the same VLAN ID
• IPoE VLAN CC: all IPoE frames in a VLAN CC interface
• PPPoE iBridge: all PPPoE frames in iBridge interface
• GPON UNI: all frames on a UNI of an ONT
• GPON VLAN port: all frames on a UNI with the same VLAN ID
All types of marker profile are supported in the upstream direction. The marker profile
is not supported in downstream direction.
Only the following types of marker profile are supported for IPv6 packets:
• a fixed value imposed for p-bit
• d1p-alignment
See the CLI Commands for FD 100/320Gbps NT and FX NT and the Operations and
Maintenance Using CLI for FD 100/320Gbps NT and FX NT documents for more
information about marker profiles.
• Committed Burst Size (CBS) up to a maximum of 128 Mbyte. Note that the
maximum is dependent on the LT type:
• L3 LT based on Intel or CATE: 256 KB
• NELT-A: 2 MB
• L3 DSL LT based on CATAN: 64 MB
• NELT-B:
• UNI downstream: 64 MB
• UNI upstream: 128 MB
• NNI upstream/downstream: 128 MB
• GPON and XGS-PON / TWDM-PON LT: 64 MB
• 10GE LT: 64 MB
The GE and 10GE Ethernet LT, the GPON and XGS-PON / TWDM-PON LT board
also support the two-rate Three Color Marker (trTCM). This is a type of policer that
marks each packet with a color - green, yellow, or red.
• For 10GE Ethernet LT, GPON and XGS-PON / TWDM-PON LT board, per color,
a marker profile of type “dot1p re-mark” can be associated. This allows re-marking
of p-bit as a function of the color output of the policer
• The 10GE Ethernet LT supports the option to remark the outer VLAN only
The trTCM is intended to be used in conjunction with the color-aware BAC types
described in “Queue configuration and queue profile”. The color-aware mode makes
use of the color marking described in “Mapping and queueing”. The color marking
can be green, yellow or red. The coupling flag is defined in the MEF 10.1 and only is
applicable for color-aware mode.
You need to create a separate policer profile for each direction. When you create and
configure a session profile, you have the option to associate both an upstream and
a downstream policer profile with that session profile. Once configured and
associated, policing is applied to all the frames within the session with which the
policer profiles are associated. As such, rate enforcement is performed uniformly for
all subscriber lines that are associated with that session profile.
In addition to this fast path policer, there is also a slow path policer that limits the
number of (upstream) control frames that are excepted to the on-board processor for
each subscriber line. This mechanism has been put in place to protect this shared
resource against DoS attacks from malicious users.
The slow path policer is also a single token bucket policer with Committed
Information Rate expressed in terms of packets per second and Committed Burst
Size expressed in terms of number of packets. This policer type is not subject to
profiling.
For GPON and XGS-PON / TWDM-PON, the OLT can instruct the ONT to either
police upstream DHCP, ARP and IGMP packets at a specific rate, or disable policing
of these protocols.
If an IGMP channel is configured, then IGMP packets are rate limited to the same
CIR as the slow path policer (described above).
Two types of L3 filters are supported: filters applicable to IPv4 traffic and filters
applicable to IPv6 traffic. The type of traffic is explicitly mentioned in the L3 filter
definition with default applicable to IPv4 traffic. For the sake of simplicity, IPv4
terminology is used for the different fields in an IPv4 filter and an IPv6 filter. As such
DSCP refers to DSCP in IPv4 and traffic class in IPV6. The protocol field refers to
protocol field in IPv4 and the next header field in IPv6.
Figure 305 shows the policy building blocks.
Figure 305 Policy building blocks
P-bits DSCP
A set of non-conflicting actions can be grouped in a Policy Action list. This includes
a default disposition (permit/deny statement for ACL functionality), setting p-bit,
DSCP and policing. All packets identified by way of the associated filter can be rate
limited by a policer instance. Some subflow policies can share common attributes,
such as policing. The “Sharing” property of a policy action table enables or disables
policer sharing. Policer sharing will be used when the same policy action list is
referenced more than once on the same SAP in the same direction, and if the
Sharing attribute was set to “enable”.
The ISAM LT boards support more policies in the upstream direction than in the
downstream direction. This is in line with the typical requirements, as more security
policies are required in the ingress direction, while in the egress, mostly only traffic
class rate limitation applies.
In the downstream direction, p-bit/DSCP code point modifications can only be
realized by means of a policy action.
Alarms are useful to observe events that occur rarely. QoS alarms have been defined
to detect in part traffic misbehaviors and in part system performance issues. While
queue counters can be used for device-under-study testing, alarms are useful to
detect conditions that occur rarely and would cost too much to be tracked by OAM
engineers.
The counters and threshold crossing alarms (TCAs) can be divided in two categories:
line/ queue based and line-card based.
Figure 306 QoS Counters and TCAs on layer 3 Boards
Queue Counters:
Passed Bytes/Frames
Dropped Bytes/Frames
OBC counters: Load
Dropped OBC frames US
Dropped OBC frames DS Queue TCAs:
OBC Dropped Frames
OBC TCAs: Load
Dropped OBC frames US
Dropped OBC frames DS
Tx
SP
WFQ System Bus Counters
(per Traffic Class):
Passed Bytes/Frames
Load
Memory Pool Master
Tx
Downstream
System Bus TCA):
Load
SP
WFQ
Tx
Aggregate buffer counters:
Dropped frames US
Dropped frames DS
Dropped low prio frames High
priority Line Counters:
Passed Bytes/Frames
Aggregate buffer TCAs: threshold Droppedd Bytes/Frames
Dropped frames US Load
Dropped frames DS
Dropped low prio frames
The 10GE Ethernet LT also supports queue monitoring on its backplane interface.
For the GPON and XGS-PON / TWDM-PON LT board, downstream queue based
counters are enabled/disabled on a per UNI basis, being disabled by default. The
counters can be enabled on up to 32 UNIs per PON. Packets passed/dropped, and
bytes passed/dropped are counted. Load per queue is not calculated. There is also
a, per queue, threshold crossing alarm for dropped packets.
For the non-GPON and non-XGS-PON / TWDM-PON LT boards, the following
line/queue based counters and alarms are supported:
• number of packets passed (per queue/line)
• number of packets dropped (per queue/line)
• number of bytes passed (per queue/line)
• number of bytes dropped (per queue/line)
• threshold crossing alarm for dropped packets (per queue)
• queue load meter per queue (sync rate vs. bytes passed in this queue)
• total load meter per line (sync-rate vs. bytes passed per line)
• threshold crossing alarm for the load inflicted by traffic in one queue on the parent
physical interface (taking into account sync rate and encapsulation format)
In addition to the color blind counters listed above, the 10GE Ethernet LT, GPON,
XGS-PON / TWDM-PON LTs support the following color aware counters per
queue/line:
• number of passed packets per color (green, yellow, red)
• number of discarded packets per color (green, yellow, red)
• number of passed bytes per color (green, yellow, red)
• number of discarded bytes per color (green, yellow, red)
The queue/line loads and counters are calculated on a 15-minute basis. No long
history is kept; only the current and previous 15-minute counters are retrievable.
The total buffer pool is divided in two regions: a common region and a region saved
for high-priority traffic (that is, voice or video packets). The preliminary buffer pool
threshold can be specified in terms of percentage of total buffer pool, above which
only high-priority traffic is permitted into the buffer pool (both upstream and
downstream).
Figure 307 Buffer pool regions on IXP boards
Max usage of a queue
Total Physical Packet from the total pool (no
memory guaranteed minimum
on L3 boards)
For upstream and downstream (which share the same pool on L3 cards) there are
dedicated threshold crossing alarms that can be triggered when more than a
programmable number of OBC, resp. non-OBC packets are dropped. Packet loss in
the total buffer pools may occur when:
• the egress queue sizes have been enlarged to a large extent, and many egress
ports on multiple queues suffer large backlogs
• when exceptionally high loads with smallest packet sizes persist over a long
duration (basically several hundreds of packets at gigabit speeds with less than
100 bytes each)
OBC-directed packets (that is, control packets) are also tracked for packet loss and
associated threshold crossing alarms can be activated. The queues towards the
OBC may overflow when:
• there are large bursts of control frames in the downstream direction
• there are large and correlated bursts on many ingress lines in the upstream
direction
Due to the fact that each subscriber line has a programmable packet policer for
control traffic it is inconceivable that the OBC-directed queues should overflow as a
result of just one subscriber line.
For the GPON and XGS-PON / TWDM-PON LT board, the following line-card level
counters are supported:
• high-priority packets to the OBC, dropped packets and bytes,
• low-priority packets to the OBC, dropped packets and bytes,
• high-priority packets towards the NT-LT link, dropped packets and bytes,
• low-priority packets towards the NT-LT link, dropped packets and bytes.
The system maintains 32 15-minute counter sets and one previous and current 1-day
counter set related to aggregate buffer overflow (aggregate upstream, aggregate
downstream, aggregate upstream OBC, aggregate downstream OBC and partial
buffer pool overflow).
Fan-out load per traffic class is useful to trigger operator attention to unusually high
load conditions per LT board. In case the system bus gets overloaded (via normal
but rare or abnormal load conditions) this information can be used to take action in
terms of limiting the number of subscribers provisioned per LT board or finding
problems with multicast sources. The system automatically calculates fan-out loads
(that is, the load that goes down the system bus after multicast replication has
occurred) vs. the actual system bus bandwidth (as this varies with hardware
versions).
For fan-out load the system keeps 96 15-minute counters sets (load, pass
bytes/frames per Traffic Class) and one previous and current 1-day counter set (pass
bytes/frames) in addition to rolling counters. The 15-minute history counters are
useful for tracking system load evolutions over the day. Since the load is calculated
per traffic class, not only per LT board, this information can be used to track the
system load and bandwidth usage for the multicast video service (as this could not
possibly be tracked deeper in the network).
The mapping of packets to forwarding class and color can be based on combinations
of customer QoS markings, including IEEE 802.1p bits (with the option to derive the
color from DEI in place of p-bit), DSCP (IPv4 or IPv6), and TOS precedence
codepoints (IPv4 or IPv6).
In case ingress access policies are configured for a v-VPLS and this v-VPLS is
associated with a VPRN/IES service, then the VPRN/IES service ingress access
policy takes precedence.
The mapping of packets to forwarding class and color is based on service label EXP
value or based on the IEEE 802.1p bits of the encapsulated Ethernet packet.
Each service is associated at creation time a default ingress network policy.
In case a packet matches an egress rate limit for both a V-VPLS and a VPRN/IES
service, the VPRN/IES rate limit shall always have priority over the per V-VPLS rate
limit (so the latter will not be applied). For the type (2) rate limiter, the CoS is identified
by a p-bit or by multiple p-bits. Both type (1) and type (2) rate limiting can co-exist on
the same service. However, traffic that matches a type (2) rate limiter will not be
included in the type (1) rate limiter, since only a single rate limiter can be applied to
a packet.
The metering is based on two rate, three color marking. Lower priority packets will
be dropped first. The packets will be marked green (in profile) or yellow (out of profile)
using a configurable system-wide mapping of p-bit to color. The metering will then
update the color (green can change to green, yellow, or red; yellow can change to
yellow or red). The per-service rate limiter function will include an action to drop the
red packets.
It is possible to re-mark the p-bit after policing has occurred, based on the color
determined by the policer. There is a configurable system-wide mapping for each
(p-bit, color) combination. Each network port can be configured to enable or disable
this re-marking.
When the NT uplink redundancy is distributed with traffic egressing out of both NTs
, then separate rate limiting is required in both NT boards. In this case, the configured
rate limit is split between each NT board, according to the configuration via the CLI
command configure qos-servicerouter active-nt-loadshare. Normally, this should be
set to 50%-50% for the two NT boards.
As for the per service egress rate limiting, the ingress rate limiting uses metering
based on two rate, three color marking. See “Per-service egress rate limit” for details.
The mapping of packets to forwarding class and color can be based on combinations
of network QoS markings, DSCP (IPv4 or IPv6), and TOS precedence codepoints
(IPv4 or IPv6).
Note 1 — Untagged packets will be assigned a default p-bit
codepoint. This codepoint is also configurable in the policy.
Note 2 — This policy is similar as the service access ingress
policy associated with a VPRN/IES service.
Note 3 — The policy is applicable for all network interfaces.
Video 4, 5 2
Voice 6, 7 3
Video 4, 5 2 2
Voice 6, 7 3 3
be 0 0 0
l2 1 4 0
af 2 1 1
l1 3 5 1
h2 4 2 2
ef 5 6 2
h1 6 3 3
nc 7 7 3
Drop Probability
100%
In profile
max. probability
=
Out profile 50%
max. probability
Average queue
filling level
In profile In profile
av. start av. maximum
Drop Probability
100%
Average queue
filling level
70% 90%
For the FD 320Gbps NT and FX NT, it is possible to configure the queue priorities
and weights. Weighted queues are treated as the lowest priority. There are default
configurations for both 4 queue and 8 queue modes, as shown in Figure 311 and
Figure 312. Note that there are separate queues for unicast and multicast traffic.
Each multicast queue is always scheduled in a round robin fashion with the
corresponding unicast queue. For example, multicast queue 3 and unicast queue 3
are scheduled together as a round robin group.
In the 4 queue default, the unicast/multicast queue 3 are scheduled at highest
priority, then the unicast/multicast queue 2, and finally unicast/multicast queue 1 and
queue 0, in a 2:1 weighted fashion.
UC Q1 W=2 WRR
RR
MC Q1
SP
UC Q2 SP
RR
SP
MC Q2
SP
UC Q3
RR
MC Q3
UC Q4 SP
UC Q1
RR SP
MC Q1
SP
UC Q5 SP
SP
UC Q2
RR
MC Q2 SP
UC Q6 SP
SP
UC Q3
RR
MC Q3
UC Q7
In the 8-queue mode, there are 8 unicast queues but still only 4 multicast queues
(queues 0, 1, 2 and 3). As for the 4-queue case, each multicast queue is always
scheduled in a round robin fashion with the corresponding unicast queue. The 4 extra
unicast queues are numbered queue 4, 5, 6 and 7. In the 8-queue default, all queues
are scheduled in strict priority (except for the round robin grouping for each pair of
unicast/multicast queues). In terms of queue priorities, the 4 extra queues are
interleaved with the 4 paired queues. At first sight, this order of prioritization looks
strange as it means queue 7 is scheduled first priority, then queue 3, then queue 6,
then queue 2, and so on (as shown in Figure 312). One would expect instead queue
7, then queue 6, then queue 5, and so on. However, such an order of prioritization
would imply that 4 unicast queues would be scheduled at a higher priority than any
multicast queue. The interleaving of the extra unicast queues avoids this problem.
For each port, connected to the network or connected to a subtending ISAM, a port
rate limiter function may be applied. The port rate limiter parameters are:
• Port egress rate
• Burst size
VPLS/EPIPE VPLS/EPIPE/VPRN/IES
FC1
Access port FC2
regular
FC8
Port
SERVICE SAP
ISAM
SDP binding
VPLS/EPIPE VPLS/EPIPE/VPRN/IES
Application Egress Port Rate Limiter
- CIR, PIR, CBS, PBS
Access port Self-Generated
regular Traffic Policy 1
4
1 Access port
Network 4 Residential
port 1
4
FC1
FC2 Defines characteristics of each
FC8 egress COS queue:
SERVICE - CBS, MBS, CIR, PIR
System-wide definition of scheduling
ISAM
over egress queues: SP,WRR,..
Egress Port
Application
Rate Limiter
Self-Generated
Traffic Policy
Network
port FCx
Port
Base router IP interface
ISAM
Egress Port
Egress Queue Queue Policy
Slope Policy FC Queue
WRED Map Policy
Defines characteristics
of each [1..4] queue ISAM wide
21.1 Introduction
Remote Authentication Dial-in User Service (RADIUS) is a standardized method of
information exchange between a device that provides network access to users
(RADIUS clients) and a device that contains authentication and profile information for
the users (RADIUS server). The ISAM supports RADIUS for both layer 2 and layer 3
forwarding.
Authentication via RADIUS provides the following advantages:
• password management is centralized so there are fewer password databases and
passwords to maintain.
• support of strong authentication in a cost-effective way. The same RADIUS server
or a back-end authentication server supports strong authentication. In the case of
local authentication, strong authentication may not be feasible.
The ISAM supports RADIUS authentication via base router and VPRN services.
• NAS-Port
• NAS-Port-Id
Typically, the local database only contains the administrator account in case
RADIUS is used. To prevent isolation, one default local operator profile can be
configured, which applies when RADIUS is not reachable and when the operator is
not configured in the local database.
The ISAM supports a mixed deployment for RADIUS and TACACS+. For example,
RADIUS is used for authentication and authorization while TACACS+ is used for
accounting. ISAM supports three combinations:
• RRN: indicates to authenticate and authorize using RADIUS, without any
accounting server(s)
• TTT: indicates to authenticate, authorize and account using TACACS+. There are
some limitations for TACACS+ protocol such as only "Inbound ASCII Login"
authentication mode and "AUTHEN_METH_TACACSPLUS" authentication
method in authorization requests.
• RRT: indicates to authenticate and authorize using RADIUS while accounting is
done via TACACS+. Note that only "stop-only" is supported in an accounting
request.
For each AAA component, multiple servers should be available for redundancy and
network failures. The ISAM selects the server via the configured priority, and
switches to the backup server once the unavailability of the active service is
detected. The newly inactive server will not be selected during the 'dead' period in
order to avoid frequent switchover. In the case where all servers are unreachable,
the ISAM will fall back to local CLI user configuration. The local user configuration
may have a different passwords and command profile than the remote servers. Note
that for both RADIUS and TACACS, if authentication reverts to local due to
unreachable server(s), authorization also falls back to local. TACACS accounting, if
configured and reachable, will continue in local authentication and authorization
case, since the local default ‘syslog auth’ file and TACACS accounting should be
kept synchronized for audit purposes.
The ISAM supports dynamically changing the combination mode. As such a change
occurs, the ISAM will terminate all existing CLI sessions automatically and force all
online operators to login again with the updated mode.
22 MPLS
22.1 Introduction
22.8 QoS
22.1 Introduction
Multi-protocol Label Switching (MPLS) is a label switching technology that provides
the ability to set up connection-oriented paths over a connectionless IP network.
MPLS sets up a specific path for a sequence of packets. The packets are identified
by a label inserted into each packet.
MPLS is used in the ISAM as a building block to support L2 VPN services like Virtual
Leased Line (VLL) and Virtual Private LAN Service (VPLS). In this case, the ISAM is
acting as Label Edge Router (LER) and the distribution/reception of MPLS transport
labels is based on Label Distribution Protocol (LDP).
MPLS can also be used in the ISAM to support deploying an MPLS ring. In that case,
the ISAM is acting as a Label Switch Router (LSR) and the distribution/reception of
the MPLS transport labels is based on Resource Reservation Protocol (RSVP-TE)
and LDP.
In both cases, the ISAM originates and terminates pseudo-wires (PWs) to support
VLL/VPLS services. The distribution/reception of service labels to identify these
pseudo-wires is based on Targeted LDP (T-LDP) or the Border Gateway Protocol
(BGP).
eLER iLER
LSR LSR
As MPLS is introduced as a vehicle to support L2 VPN services, one can state that
MPLS data traffic will mostly carry two labels:
• the first label is the transport label (received via LDP or statically configured)
• the second label is a service demultiplexer as described in PWE3 (received via
T-LDP,BGP or statically configured).
Label switched paths (LSPs) are either configured statically or are setup via LDP or
RSVP-TE. Transit LSPs can be established using RSVP-TE or LDP.
For troubleshooting of LSPs, the system will respond to LSP ping messages and
traceroute messages received from remote peers.
• The ISAM supports LDP message reception, requesting to use the explicit NULL
label towards the directly attached LER. This allows the ISAM to be interoperable
with peering LERs that require MPLS packet reception having an MPLS tunnel
label of value 0.
• The ISAM supports LDP message reception, requesting to use the implicit NULL
label towards the directly attached LER for the purpose of Penultimate Hop
Popping (PHP). This allows the ISAM to be fully interoperable with peering LERs
that require MPLS packet reception having no MPLS tunnel label. The ISAM as
an LDP LSR does not support PHP.
LDP session
ISAM
LSR
LIB
RIB
LSR
LDP session
LDP DoU
Routing protocol
• When receiving a Label Mapping message from an LSR for a Prefix or Host
Address FEC Element (for example, the system IP address of another access
node) the ISAM can use the label for forwarding even when its routing table (RIB)
does not contain an entry that exactly matches the FEC Element. The ISAM
supports so-called aggregated prefix matching, meaning that it is sufficient for the
routing table to contain a longest matching prefix entry for the corresponding FEC
Element. Population of the ISAM routing table (RIB) can be done manually but
due to the large number of host addresses it is preferred to have a routing protocol
activated (OSPF, RIP,…) on the ISAM node. The RIB is the database where all
received or configured routes are stored.
• When there are multiple LSPs that contain a Host Address FEC element (for
example the system IP address of another access node) which is identical to the
destination address of the packet, then the packet is mapped to one of those
LSPs. The choice of LSP is made based on the IGP next-hop for that host
address. In case there are multiple equal-cost IGP next-hops available (that is,
several equal-cost tunnel LSPs that allow to reach the same Provider Edge node)
then the ISAM will select one of those LSPs. This selection is performed on a
per-service base in order to allow load balancing of upstream traffic
Features Description
RSVP-TE LSP with Traffic engineering and LSP CSPF constraints can be used to control
Constrained-based Shortest Path the LSP setup
First (CSPF)
RSVP-TE Primary and secondary The LSP can be setup using path constraints (for example, hop-limit)
Parameter support for primary and secondary paths
RSVP-TE BFD BFD support for RSVP interface to speed up failure detection
Note — The RSVP-TE, the MPLS Fast Reroute (FRR) and the
MPLS LSR functionality can also be applied to non-ring
networks. However, the ISAM currently only supports
one-to-one backup tunnels (that is, detour LSPs). This means
that in large networks, the number of LSPs may become large.
Care should be taken to keep the total number of LSPs under
control.
AC3
DATA
LTn
DATA
ISAM Service 1
Service 2
The T-LDP session is set up between the ISAM (using the configured system IP
address) and each configured far-end IP address that terminates service tunnels.
To define which LSP is used for a particular service tunnel, the ISAM uses the
concept of Service Delivery Points (SDPs). An SDP identifies the IP address of the
end of the tunnel and the LSP to reach that endpoint. The LSP can be either static
or dynamic (when LDP is enabled on it). An SDP binding is created by associating a
service instance (VLL, VPLS) with an SDP (this is in fact nothing else than a
pseudo-wire.
When using T-LDP, the ISAM has the following T-LDP characteristics:
• FEC128 is used for reception and distribution of service labels
• the configured VC-TYPE of the SDP binding is passed: ether or VLAN
• Manual discovery:
In this model, Target LDP signaling is used and the PWid FEC element (the
so-called FEC 128) is used to identify the Pseudowire at both endpoints of the
connection.
• Auto discovery:
In this model, BGP is used to automatically find all the PEs that participate in a
given VPLS instance. This model has two sub-variants:
• Pseudowire setup using T-LDP: in this model, BGP-AD is only used for
auto-discovery and the actual Pseudowire signaling is done using T-LDP, using the
Generalized FEC (so-called FEC 129). This model is defined in RFC 6074.
• Pseudowire setup using BGP: in this mode, BGP is used to establish the
corresponding Pseudowires for the VPLS instance, as described in RFC 4761.
In all of the above models, the signaling of the MPLS transport tunnel is supported
on ISAM using LDP.
When BGP-AD is used, the SDP bindings will be automatically instantiated using the
information advertised by BGP-AD. This is done for every auto-discovered SDP
binding through the use of the "pseudowire template" concept. A pseudowire
template contains a list of specific layer 2 VPN parameters that are relevant for the
pseudowire setup. Each VPLS service that is configured to use BGP-AD, will also be
configured with a binding to a suitable pseudowire template.
The BGP-based SDP binding is programmed as a spoke-SDP by default. This allows
forwarding traffic between the Pseudowires within the same service.
The ISAM BGP-AD implementation has the following restrictions:
• To support mesh topology split horizon group configuration is mandatory to avoid
traffic loop.
• The use of transport tunnel signaling based on RSVP-TE and MPLS FRR is not
supported in combination with BGP-AD or LDP FEC 129 signaling.
• No Inter-AS support
• Related to BGP-AD (RFC 6074):
• BGP-AD is not supported for VPWS/EPIPE services.
• No support for Distributed VPLS (Pseudowire splicing).
• No simultaneous support of mesh and spoke pseudowires (as part of H-VPLS)
• Related to BGP for Auto-Discovery and Signaling (RFC 4761):
• No multi-homing support for VPLS.
DSL
LT NT
PW
VLAN cross-connect Tunnel VLAN 1
VLL1
(Tunnel)
LSP 1
SDP
DSL 1
VLAN cross-connect PW
Mapped VLAN VLL2
(Mapped) 2
SDP
iBridge VLAN B 2 PW
VPLS1 LSP 2
3
VLAN B SDP
3
iBridge
VPLS2
PW
4
LSP 3
SAP PW
5
SDP binding
22.8 QoS
QoS details can be found in chapter “Quality of Service”.
In a nutshell, two types of PW-related policies can be configured:
• Service egress network policy:
allows to define the setting of the EXP and the outer p-bits based on the
forwarding class
• Service ingress network policy:
allows to derive the forwarding class from the EXP or the inner p-bit.
The current system allows MPLS support in a duplex configuration, that is, with two
NT boards. This is supported in combination with static routing or dynamic routing via
OSPF.
Control traffic (that is, LDP), L2 VPN data traffic and IP traffic can be
received/transmitted on the links of both NT boards.
eLER eLER
iLER iLER
Optimized
path
Local
switchover
- Using detour LSPs to guide traffic around the link failure - Re-optimize path to avoid traffic loops
- Very fast, local protection - Improves bandwidth usage and QoS
In Step 1, Fast ReRoute is used to recover from the failure. Once this has been done,
the node that detected the failure will inform the ingress LER (usually by means of
RSVP-TE Path Error messages).
This is the trigger for the ingress LER to calculate a new optimal path and reconfigure
the network to use a different LSP. This process is called “Make-Before-Break”,
referring to the principle of first establishing the new path and afterwards performing
the switchover to this path. By doing so, the outage in the second step can be
minimized or even completely avoided.
The MPLS flow label insertion/removal can be configured per SDP binding.
To support insertion / removal of the MPLS flow label, the NANT-D CB NT board
variant is required.
In addition to the NANT-D CB board variant, flow label insertion/removal is also
supported on the NCNC-H. This NTIO board can be freely combined with any of the
existing NANT-D or NANT-E NT boards.
In order to achieve the last configuration (that is, supporting a VRF on top of a
V-VPLS (doing L3 forwarding), which in turn is connected to a VPLS (doing the
MPLS encapsulation/decapsulation)), the operator needs to associate the V-VPLS
and the VPLS to the same physical port using SAPs with different encapsulation
values. The port itself must be placed in loopback, so that packets are sent from the
V-VPLS SAP to the VPLS SAP and vice versa.
The port chosen to be placed in loopback can be any of the faceplate ports of either
the NT or the NTIO board. As a consequence, this port can no longer be used for
external network connectivity.
23.4 QoS
23.1 Introduction
When migrating from an ATM-based access network to an Ethernet packet-based
access network, operators are faced with the challenge to maintain their existing
ATM-based services. Many ATM services are based on AAL5 encapsulation (that is,
these services are packet-based) and are rather straightforward to migrate by
terminating the AAL5 layer in an Ethernet Access Node. However, also
non-AAL5-based ATM services are commonly used, in which case this is not
possible. Moreover, an operator offering wholesale services to 3rd party service
providers has no view on the legacy ATM services that are used by the wholesaler.
The ISAM supports ATM Pseudowire (ATM PWE3) technology on a number of
ADSL2plus and SHDSL LT boards. This enables the transport of legacy ATM
services over a packet-based access network.
ATM
VLAN or S-VLAN
PWE3
MPLS Pseudowire
VLAN
IP DSLAM ATM PVC
PWE3 in N:1
8/35 mode with N > 1
80/32
PWE3 GW
Residential
8/35
80/33
Aggregation Network
8/35
80/32
80/34 80/33
80/34
8/35 90/32
OLO with shared
90/32
bandwidth
92/32 92/33
8/35
OLO with dedicated
bandwidth/business
92/33 93/33
8/36
8/35 93/33 94/33
8/35 94/33
PWE3 in N:1
mode with N = 1
The “ATM Pseudowire” feature is based on IETF RFC 4717, and is also referred to
as ATM Pseudowire Emulation Edge to Edge (ATM PWE3). In this mode, the ISAM
can receive upstream ATM traffic from DSL subscribers and encapsulate this traffic
into one or more ATM Pseudowires sent over an MPLS tunnel towards the
aggregation network. On the other side of the network, a Pseudowire Gateway (for
example, the Nokia 7750) terminates the ATM Pseudowires from several ISAMs and
aggregates the traffic on one or more STM-1 interfaces connected to the ATM core
network.
In downstream direction, the PWE3 Gateway encapsulates the received ATM traffic
into the corresponding ATM Pseudowires, and sends them in MPLS tunnels towards
the different ISAMs. The ISAM terminates the MPLS tunnels and ATM Pseudowires,
extracts the ATM cells and sends them on the correct DSL line.
The feature co-exists with the standard ISAM L2 forwarding behavior, that is, on the
same ISAM LT board some user ports can be configured as regular Ethernet / AAL5
lines while other user ports can be configured for ATM Pseudowire handling.
Each ATM Pseudowire can be configured to either carry traffic from a single ATM
PVC or from multiple ATM PVCs:
• “N-to-One mode, with N=1”: the ATM Pseudowire only carries traffic from a single
ATM PVC. Each ATM Pseudowire packet either contains a single ATM cell, or
multiple ATM cells all using the same VPI/VCI
• “N-to-One mode, with N>1”: the ATM Pseudowire carries traffic from multiple ATM
PVCs. Each ATM Pseudowire packet either contains a single ATM cell, or multiple
ATM cells using the same or different VPI/VCIs
In order to establish the MPLS tunnels and ATM Pseudowires, the ISAM supports
the necessary commands to configure the connections.
It should be noted that the ATM Pseudowire functionality is supported on the DSL LT
board, with no intervention of the NT card. As a result of this, each DSL LT board
which offers ATM Pseudowire services will have to be configured with one or more
separate IP interfaces and MPLS tunnels. This increases the total number of MPLS
tunnels at the system level. For instance, if each DSL LT board would be configured
with one MPLS tunnel, then there will be 16 MPLS tunnels at system level.
23.4 QoS
The QoS implementation is based on the regular DSL LT QoS framework. All QoS
features are packet-based, not ATM cell-based. QoS is based on the use of the
Ethernet priority bits and the MPLS Exp bits. This means there is no ATM QoS, no
cell-based QoS, and no F4/F5 termination. Different service types can be defined
which are identified with different Ethernet p-bits or MPLS Exp bits. This allows
mixing Residential/shared bandwidth and Business/dedicated bandwidth services
over the ATM Pseudowires.
When mapping ATM cells into an ATM Pseudowire packet, the ISAM supports
setting the p-bits and MPLS Exp bits of those packets according to a two-rate Three
Color Marker. Policing can be done on a combination of the Committed Information
Rate (CIR) and the Excess Information Rate (EIR).
In downstream direction, color-aware RED can be applied to the different queues, in
order to discard traffic with a relative lower priority.
24.3 Benefits
24.1 Introduction
The ISAM high-capacity NT cards (NANT-E and FANT-F) introduce the ISAM
Application Intelligence Platform (AI Platform), as a generic capability for hosting
applications in the ISAM.
The AI Platform enables the ISAM base node functionality to be enhanced with
future, generic or customer specific application level functionalities.
Target fields for enhanced application level functionality in ISAM may exploit the
location and unique knowledge and control of the access node for such value-add
features as active and passive traffic/triple play QoE monitoring, service assurance,
troubleshooting agents, management and provisioning helper agents, virtualization
of home network functions, and so on.
Dedicated applications on the ISAM AI Platform may be developed by Nokia or by
Nokia customers and/or third parties, in cooperation with Nokia.
For any proposals on porting application level functionality on the ISAM AI Platform,
please contact your local Nokia sales representative.
NT on-board processor
Flash RAM
Packet dispatcher
LTs
The concept and design of the ISAM AI Platform is such that applications running on
the AI platform will not impact the operation of the base node in terms of stability and
performance. This is enabled by virtue of dedicated processing resources for
applications, isolated from the ISAM core forwarding and control functions, as well
as by careful design and testing of the interfaces between applications and the core
ISAM.
In this way, the AI Platform enables the life cycle of applications to be fully decoupled
from the release cycle of the ISAM base software, meaning that applications can be
updated without a dependency to the ISAM base release.
Applications will be made available as separately downloadable executables, with an
independent life cycle (see Figure 323).
Figure 323 ISAM Applications life cycle management
AI Platform Software on core0&1 AI Platform Software on core2&3
• Manage AI platform • Start/stop/restart application instances
• Download&install applications on AI platform • Bind network interface to application instances
• Enable external communication • (optional) Application Management (SNMP/CLI)
• (optional) Application Management relay (SNMP/CLI)
ISAM Rx.y
Application Utilities
AI platform
Application_1
subject
to
ISAM licensing
Application_n
ISAM Applications
(individually downloadable executables)
= versioned
24.3 Benefits
Benefits of the ISAM AI Platform include:
• Enabling applications to make use of the location and unique knowledge and
control of the access node.
• Leveraging cost-effective and industrially rated hardware, as well as centralized
platform management, for hosting applications.
• Dedicated hardware resources and carefully controlled interfaces between
applications and the core ISAM, ensuring stability and security of the core ISAM
functions.
• Base system control over hosted applications, such as application download and
install, start and stop, access to ISAM forwarders, health monitoring and recovery.
• Application life cycle management, fully decoupled from the ISAM base release,
enabling agile fast-track application development and shorter life-cycles for
applications.
25 Cross-domain solutions
25.1 Overview
25.1 Overview
This section provides a description of various applications for which the ISAM
provides an effective solution.
25.2.1 Scope
This section describes solutions for backhaul of 2G/3G and LTE mobile base stations
over 7302 ISAM, 7330 ISAM FTTN or 7360 ISAM FX.
Mobile backhaul over (bonded) ADSL2plus, over (bonded) SHDSL, over (bonded)
VDSL2, over point-to-point Ethernet (FE/GE) and over GPON is included, covering
solutions for data off-load as well as full backhaul of voice and data.
Apart from the 7302 ISAM, 7330 ISAM FTTN or 7360 ISAM FX node, the solution
also proposes the cell site devices (residential DSL CPE/ONT, dedicated DSL
CPE/ONT for business/mobile backhaul, 7705 SAR-F/7705 SAR-M) for which the
solution is validated.
Apart from this, an end-to-end mobile backhaul solution also requires an aggregation
network and a gateway device that interfaces to the mobile gateways. These are not
specified here. Please refer to the Nokia Mobile Backhaul Blueprint Solutions for a
description of Nokia end-to-end mobile backhaul solutions.
25.2.2 Introduction
Mobile backhaul (mobile backhaul) is about transporting traffic between mobile base
stations (2G BTS, 3G NodeB, LTE eNodeB) and a centralized mobile gateway (2G
BSC, 3G RNC, LTE S-GW).
Mobile backhaul comes from a legacy of 2G base stations, carrying low volumes of
traffic (voice and low BW data) and backhauled over a TDM (PDH/SDH) network,
with first mile access to the TDM network typically over 1 or 2 copper (or microwave)
E1/T1. The TDM network inherently provided synchronization as well as resilience
and QoS for mission critical services.
With the growth of data services in 3G and LTE, traffic volumes are increasing rapidly
and exponentially and mobile operators need more bandwidth fast. On the other
hand, mobile ARPU is more or less flat and consequently there is pressure on the
cost per bit, also for backhaul. The legacy TDM backhaul infrastructure cannot scale
in a cost effective way.
The following evolutions are happening:
• transition from copper (and TDM microwave) to fiber (and packet microwave) in
mobile backhaul access, at a pace allowed by investment levels
• transition from TDM transport to packet transport (carrier Ethernet, IP/MPLS)
• convergence of residential/business/mobile backhaul over a common transport
infrastructure (the High Leverage Network)
In this context there is a clear incentive for fixed access operators to leverage
residential broadband assets (existing or new rollouts) for mobile backhaul.
Using broadband access technologies for mobile backhaul allows to re-use existing
outside plant (copper and GPON feeder fiber). Moreover, broadband access
technologies (DSL, GPON, point-to-point Ethernet) are existing, cost optimized
platforms and will enable significantly reduced port cost per mobile base
station/mobile site.
25.2.3.1 Bandwidth
Mobile backhaul bandwidth requirements have evolved from 1-2 E1/T1 (2-4Mbps)
for a 2G site to more than 250Mbps for a full blown multi-provider, multi-generation
2G/3G/LTE site.
With respect to this bandwidth evolution, the different broadband access
technologies can be positioned as follows:
• (bonded) ADSL2plus and (bonded) SHDSL can be positioned as short-to-mid
term tactical solutions for 3G bandwidth relief. For example, 4-pair bonded
g.SHDSL.bis can support symmetrical bandwidth up to 22.8 Mbps. ADSL2plus
deployment will in practise be limited to data off-load, while SHDSL can and will
typically be used in full off-load scenarios (*). For SHDSL, ATM IMA and EFM
bonding are preferred for reasons of resiliency (if one pair goes down, the group
will not be impacted). Of the two, EFM bonding is superior with respect to
bandwidth efficiency, provisioning and flexibility in data rates for the different
pairs.
• With bandwidths of, for example, ~ 400/100 Mbps downstream/upstream at
500m, 250/50 Mbps downstream/upstream at 1000m for 8-pair bonded VDSL2,
bonded VDSL2 is a strategic, rather than a tactical solution for evolution to and
including LTE. VDSL2 could be deployed in off-load scenarios but definitely have
full backhaul as the final goal (*).
• GPON and point-to-point fiber are full-blown solutions capable of supporting all
scenarios to LTE. Again, GPON and point-to-point fiber could be deployed in
off-load scenarios but definitely have full backhaul as the final goal (*).
Note — (*): See section “QoS and High Availability for mission
critical traffic” for distinction between data off-load and full
backhaul.
25.2.3.3 Synchronization
Base stations with legacy E1 interfaces need frequency synchronization for the
purpose of TDM transport (that is, to avoid frame slips).
All base stations also need frequency synchronization for the purpose of providing
an accurate wireless carrier frequency.
In addition, TDD (time division duplex) base stations need phase synchronization for
the TDD mechanism to operate. FDD (frequency division duplex) systems may also
need phase synchronization for specific advanced wireless features like MBMS and
network MIMO, but deployment of these must be considered longer term and is of no
immediate concern.
Base stations can be synchronized in multiple ways:
• using a synchronized E1/T1 from a TDM network (frequency synchronization
only)
This is the synchronization method in the legacy TDM network. It is also the
synchronization method in a data off-load approach, where synchronization (and
voice) remain to be transported by the TDM network, but data is off-loaded to the
packet network.
• using an on-site GPS (frequency and phase synchronization)
This is the synchronization mechanism in CDMA and will most likely be the first
synchronization mechanism in TDD and FDD deployments requiring phase sync.
• using synchronization from the packet network
These synchronization methods classify in 2 flavours:
• Physical layer mechanisms
These provide end-to-end synchronization on the physical layer. Several physical
layer synchronization mechanisms are standardized: NTR for DSL, GPON PHY for
GPON, SyncE for Ethernet.
• Packet layer mechanisms
These include NTP, 1588v2 point-to-point, ACR, DCR. Of these, 1588v2 is the more
forward looking with evolution to provide phase synchronization as well as frequency
sync.
access node to the aggregation network is essential for protecting the second mile
(with LAG or xSTP) and the first aggregation node (with multi-chassis LAG or
xSTP).
For PON access, ISAM provides enhanced Type-B protection shortly in a future
release.
DSL bonding inherently provides a level of resiliency for a first mile over bonded
DSL.
TDM
ATM AGG GTW
ETH
CSG AN L2 aggregation
AGG GTW
Base station Controller
IP/MPLS or Carrier
Ethernet repair mechanisms
25.2.3.5 Demarcation
End-to-end OAM features and SLA monitoring (including the first mile) are typically
handled by the cell site gateway device, either by IP/MPLS mechanisms or by carrier
Ethernet mechanisms. 802.1ag and Y.1731 can be used between the cell site device
and the gateway device for end-to-end checks of connectivity, loss and delay, either
on a continuous basis or on-demand. Optionally, 802.1ag MEPs and MIPs can be
placed in ISAM for further troubleshooting and fault isolation.
SAR-M xDSL
point-to-point Ethernet (FE|GE) (o) offload only
SAR-M/SAR-F
Data ONT (o)
GPON
SAR-M GPON
Business ONT
TDM TDM
ATM ATM
ETH ETH
CSG AN AGG L2 tunnel (IP/MPLS) GTW
Mixed
TDM TDM
ETH ETH
CSG AN AGG L2 tunnel (IP/MPLS) GTW
Carrier Eth
TDM TDM
ETH Carrier Ethernet ETH
CSG AN AGG GTW
• The aggregation network can be carrier Ethernet based or IP/MPLS based. In the
latter case IP/MPLS from the cell site gateway is typically tunneled in a L2
IP/MPLS service. A flat IP/MPLS model is also possible in principle, but requires
hybrid (access/MPLS) interfaces on the first aggregation node.
• A controller side Gateway Device (GTW), peering with the cell site gateway on the
pseudo wire level and interfacing to the mobile controller(s) over TDM STM-x,
ATM STM-x or Ethernet interfaces.
Access nodes can be dual homed to redundant aggregation nodes and mobile
controllers can be dual homed to redundant gateway devices for High Availability
purposes.
Figure 327 and Figure 328 show the physical layer synchronization architecture of
ISAM.
Figure 327 ISAM physical layer synchronization architecture (DSL and
point-to-point)
Optical GE SyncE E1
FE/GE
PTP
GE LT
7705 SAR-M
8 kHz
backplane Optical GE SyncE Optical GE SyncE
to 7354 REM direct connection to base station
7302/7330 ISAM
BITS G.703 E1
GPON
GigE ODN
LT
SyncE FE/GE
Business ONT
unsynchronized
Base station interface
NT 8 kHz
backplane
E1
7302/7330 ISAM
FE/GE
7705
SAR-M
Physical layer synchronization can be fed into ISAM either via BITS or via SyncE
from the network through synchronization-capable dedicated NT variants. If no BITS
or SyncE is available in the CO, we recommend to terminate 1588v2 in an external
client in the CO, to feed the output of that client into the BITS of the ISAM and to go
with physical layer synchronization from there.
Synchronization can then be propagated over the first mile to a
synchronization-capable cell site gateway through a physical layer mechanism:
SHDSL NTR, VDSL2 NTR, GPON PHY or SyncE (GE point-to-point LT board).
Finally, the cell site gateway provides synchronization to the base station either
through a synchronized E1 or through a SyncE interface.
The physical layer synchronization entails frequency synchronization only.
Apart from physical layer synchronization, the Business ONT also provides ACR and
DCR clock recovery mechanisms.
25.3.1 Scope
This section describes solutions for emulation of (E1/T1) leased line services with
access over ISAM:
• over SHDSL, using 3rd party SHDSL CPEs (single or multiple E1/T1 interface).
• over GPON, using the Business ONT (up to four E1/T1 interfaces)
In principle, E1/T1 leased lines can also be emulated over point-to-point ethernet
access, with a dedicated fiber CPE.
25.3.2 Introduction
Operators may benefit from consolidation of legacy (E1/T1) leased line services on
broadband access equipment rolled out for residential (and business) services.
This may allow them to, for example, decommission dedicated line systems for
(E1/T1) leased line access. It may also be an element in an ongoing
decommissioning (partial or full) of the legacy TDM network in favour of a packet
switched network.
SHDSL is a low latency technology that complies to delay requirements for leased
line, and so is GPON.
Tuning of the payload size and de-jitter buffer size of the pseudowire allows to meet
delay and loss requirements under background network packet delay variation
(PDV).
25.3.3.4 Synchronization
Both ends of an E1/T1 leased line connection need to be synchronized to avoid
frame slips in the TDM transport (that is, wander needs to comply to the ITU-T G.823
traffic mask).
This solution assumes a network clock is imposed upon the customer TDM
equipment.
For leased line emulation, the clock reference has to be distributed through the
packet network. As discussed in the mobile backhaul section, this can be done via
physical layer mechanisms (SHDSL NTR, GPON PHY, SyncE) or via packet layer
mechanisms (NTP, 1588v2 PTP, ACR, DCR).
It is recommended to use physical layer synchronization mechanisms whenever
available. For instance, BITS or SyncE into the ISAM in CO and physical layer
synchronization (NTR, GPON PHY, SyncE) from there to the business site.
If no BITS or SyncE is available in the CO, we recommend to terminate 1588v2 in an
external client in the CO, to feed the output of that client into the BITS of the ISAM
and to go with physical layer synchronization from there.
Access node features:
• NT with BITS/SyncE/1588v2 in
• SHDSL NTR/GPON PHY on the last mile.
GPON
4* E1/T1 (+Eth)
7302/7330 ISAM
Business ONT
3rd party SHDSL business CPEs provide circuit emulation for a single or multiple
E1/T1 (possibly in conjunction with Ethernet access) over SHDSL (single pair
g.SHDSL at max 2.3Mbps Mbps up to 4-pair EFM bonded g.SHDSL.bis at max 22.8
Mbps). The pseudo wire encapsulation is IP/MPLS with static MPLS labels. SAToP
and CESoPSN encapsulations are supported.
The Business ONT provides circuit emulation for up to 4 E1/T1 (possibly in
conjunction with Ethernet access) over GPON. The pseudo wire encapsulation is
MEF-8. SAToP and CESoPSN encapsulations are supported.
Figure 330 shows the logical end-to-end topologies for leased line emulation
between 2 business customer sites.
Customer Customer
TDM equipment TDM equipment
Customer Customer
TDM equipment TDM equipment
Two connectivity models can be envisaged and will possibly be deployed in parallel:
• A business CPE/ONT connected back-to-back over an end-to-end pseudo wire to
a peer business CPE/ONT, without crossing an SDH/PDH segment.
• A business CPE/ONT connected over a pseudowire to a core SDH/PDH network
(typically groomed over an STM1/STM4 interface). The pseudo wire could cover
the access segment only (with the pseudo wire terminated and dropped on TDM
equipment in the CO). Alternatively, it could span the full metro Ethernet
aggregation network (TDM equipment in a centralized PoP location).
Access nodes can be dual homed to the aggregation network and SDH equipment
can be dual homed to redundant gateway devices for High Availability purposes.
In this solution, the customer TDM equipment is timed by the network clock. In the
second connectivity model, this is also the clock of the core TDM network. As per the
Nokia synchronization strategy, an end-to-end physical layer synchronization is
preferred. This means that physical layer synchronization is fed into ISAM either via
BITS or via SyncE from the network through synchronization capable dedicated NT
variants.
If no BITS or SyncE is available in the CO, we recommend to terminate 1588v2 in an
external client in the CO, to feed the output of that client into the BITS of the ISAM
and to go with physical layer synchronization from there.
Synchronization can then be propagated over the first mile to the business CPE/ONT
over SHDSL NTR/GPON.
Finally, the business CPE/ONT provides a synchronized E1/T1 to the customer TDM
equipment.
25.4.1 Scope
This chapter describes the ISAM capabilities to terminate E1 TDM lines or ISDN PRA
(PRI) on an ISAM faceplate port. A similar approach is taken as in the previous
section “E1/T1 Leased Line Replacement (SHDSL/PON)”but with this difference that
we are not using a CPE or ONT to terminate the E1 but an SFP (Small Form-factor
Pluggable) instead. The E1 or the ISDN PRA is directly terminated on the ISAM. The
ISAM can be in a central office location or in a remote outdoor cabinet.
The E1 TDM SFP is terminating the TDM circuits and carrying the TDM data via
Ethernet packets through the ISAM and across a packet switched network (i.e. using
pseudowire technology). We are NOT referring to Trunking Gateway functionality
where PSTN data is converted into VoIP.
25.4.2 Introduction
The SFP (SmartSFP) used in this solution is a dual-channel TDM SFP, capable of
terminating up to two E1 ports. The SFP is MSA compliant and fits into a standard
Gigabit Ethernet SFP cage.
E1
SFP cage
VLAN ECID PAYLOAD
CES
CES
E1 VLAN ECID PAYLOAD
RJ45 GE
shielded
connector
Via its build-in TDM pseudowire interworking function (CES), the SFP is
encapsulating/extracting TDM traffic into/from Ethernet packets. The Metro Ethernet
Forum standard (MEF-8) payload format and pseudo-wire (PW) technology is used
to allow interoperability with third-party CES interworking devices.
Figure 332 E1/PRA Termination (pseudowire) in ISAM: MEF8 interworking
Using an SFP-based approach provides a flexible and scalable solution for legacy
interfaces on the ISAM. No dedicated board is required, it is a port-based solution:
any GE SFP port can be converted in an E1/PRA port by plugging in the E1 TDM PW
SFP.
Fully integrated in the ISAM management system, the E1 TDM PW SFP can be
provisioned and monitored via ISAM TL1 and through the 5520 AMS.
25.4.3.3 Synchronization
To meet the TDM wander requirements (per ITU-T G.823), both ends of the
pseudowire connection need to be synchronized.
Different options exist to provide an end-to-end solution to synchronize the
interconnected circuits (E1/PRA). The solution requires a PRC-traceable network
clock to be provided to the E1 TDM SFP. There are several ways in providing the
network clock (derived from PRC) to the SFP. This is depending on the node (NT)
features where the SFP is residing. Depending on the controller type of the ISAM,
the NT can be synchronized via BITS, SyncE or IEEE1588v2. Through the
backplane clock circuit, all boards in the shelf are being synchronized. The
synchronization of the SFP itself is done via SyncE (SERDES) to provide the network
timing from the NE (ISAM).
The network clock can be imposed upon the customer TDM network, both tributaries
of the SFP can be synchronized from the SFP (host) clock which is derived from the
network clock via SyncE, as described above.
Alternatively, the SFP can take one of the E1s as clock source.
The 2E1-SFP solution in ISAM does not support the transport of the E1 service clock
across the packet network.
An overview of the different synchronization options in an end-to-end solution is
provided in Figure 333.
Figure 333 E1 TDM SFP, End-to-End Synchronization options
25.4.3.4 Alarms
E1 and TDM related alarms detected by the SFP are autonomously reported to the
ISAM and AMS. On request the operator can also retrieve the active alarms on the
SFP through the ISAM.
Depending on the configuration of the E1 line interface, whether in framed or
unframed mode additional alarm detection and reporting is supported. In unframed
mode, the SFP supports LOS and AIS detection. In the framed mode, the SFP can
also detect RDI, REI, LOF, LOMF and CRC4 bit failure on top of the LOS and AIS.
Besides the alarm detection and reporting, the SFP allows also the forwarding of
alarms, either towards the network via circuit emulation (MEF8) or towards the line
interface (E1). The forwarding of alarms can be configured per alarm (AIS, RDI and
REI) and for each direction (network or E1) independently.
SERDES
ETH-ITF
CESoP
SGMII
(IWF)
LIU
E1 ISAM (PSN)
FRAMER
SERDES
ETH-ITF
CESoP
SGMII
(IWF)
LIU
E1 ISAM (PSN)
25.5.1 Scope
This section describes solutions for Ethernet business access over ISAM:
• Over (bonded) SHDSL, using a 7230 BG 3Se Series Cellpipe CPE, 1521 CLIP,
7705 SAR-M(E) combo or a third party SHDSL business CPE/NTU at the
customer premises.
• Over point-to-point ethernet, using the ISAM Gigabit Ethernet LT board + 1522
FLIP, 1850 TSS-3, 7705 SAR-F/SAR-M(E) or a third party fiber business
CPE/NTU at the customer premises.
• Over GPON, using an indoor or outdoor data ONT at the customer premises.
25.5.2 Introduction
Access and service providers are gradually migrating the delivery of business access
services, originally dominated by TDM and ATM-based offerings, to Ethernet access.
25.5.3.1 Bandwidth
Ethernet business access subscribers may have bandwidth requirements varying
anywhere from a few Mbps up to 1Gbps. A scalable solution tailored to the bandwidth
needs is required. Bandwidth requirements for Ethernet business access are mostly
symmetric (except for business internet access).
ISAM provides high symmetrical bandwidth over SHDSL by means of g.SHDSL.bis
(up to 5.7 Mbps per copper pair over 3km nominally) and g.SHDSL.bis bonding (up
to 8 pairs for ATM IMA; up to 4 pairs for PTM (providing a bandwidth of 22.8 Mbps
nominally)). Of the bonding flavors, ATM IMA and PTM bonding are preferred for
reasons of resiliency: if one pair goes down, the group will not be impacted. Of the
two, PTM bonding is superior with respect to bandwidth efficiency, provisioning
simplicity and flexibility in data rates for the different pairs.
With GPON and point-to-point Ethernet, ISAM can provide bandwidth scaling up to
hundreds of Mbps and 1Gbps respectively.
Access node features:
• g.SHDSL.bis and SHDSL bonding
• GPON
• Gigabit Ethernet LT
In each of these service models, the function of the business CPE/NTU/ONT and the
access node is to provide a layer 2 access spoke to an aggregation network
implementing the layer 2 service (L2 VPN) or connecting to the layer 3 router (L3
VPN, BIA).
Figure 337 Ethernet Business Service Delivery
inter-metro
CPE L2 VPN
ETH
or AN AGG L2 aggregation inter-metro
NTU
L3 VPN
Customer
router internet
BIA
L2 access segment L2 aggregation
virtual line or virtual LAN
carrier Ethernet or IP/MPLS
Ethernet business services may be offered with varying levels of functionality and
quality; from low-end basic connectivity to high-end service delivery governed by
stringent SLAs.
For L2 VPNs (and in extrapolation also for the layer 2 access to L3 VPN and BIA
services), the Metro Ethernet Forum (MEF) provides a framework for the definition of
layer 2 services at the UNI between the customer equipment and the service
provider, and this for all but the more basic connectivity services.
MEF Service Requirements at the UNI (MEF6.1, MEF10.2) specify such things as:
• Service types: E-LINE, E-LAN, E-TREE.
• Service multiplexing and service selection: all:1, 1:1, n:1 VLAN mapping.
• Transparency for customer frames (VLANs, MTUs, L2CP, multicast/broadcast
and so on)
• Layer 2 control protocol (L2CP) handling: discard, tunnel, peer
• Ingress and Egress bandwidth profiles and - rate limiting.
Service Requirements at the UNI (MEF of other) can be implemented by either of two
architectures:
• In the UNI model, the UNI requirements are implemented by the access node LT
board. The customer premises device connecting to the customer router can be
a simple CPE or media convertor with basic functionality.
• In the NTU model, the UNI requirements are implemented by a dedicated,
operator managed NTU/ONT at the customer premises. The NTU/ONT has
enhanced demarcation features over a simple CPE/media convertor and is
possibly MEF-certified. The access node should be transparent in this model.
Customer site
UNI-N
ETH
CPE/MC AN L2 aggregation
Customer
router
NTU model
UNI
Customer site
UNI-N
ETH
NTU AN L2 aggregation
Customer
router
As a particular instance of the service requirements at the UNI, full transparency for
customer frames is required for particular L2 VPN service delivery models (for
example, Ethernet private lines). Transparency requirements may pertain to such
features as preservation of customer VLAN tags (including 802.1q p-bits), support of
customer MTUs, transparency for multicast/broadcast and for L2CP protocols that
the customer wants to use to manage his network end-to-end (like LACP, (m)STP
and so on).
ISAM implements full transparency for customer frames, by making use of
transparent VLAN cross-connect forwarding mode.
Alternatively, ISAM can initiate an IP/MPLS based VLL providing full transparency.
Access node features:
• UNI model: transparent VLAN cross-connect (1:1, tunneling mode, mapping
mode) or MPLS PE (VLL), L2CP handling (discard, tunnel), MTUs, ingress rate
limiting
• NTU model: transparency of VLAN cross-connect or MPLS PE (VLL)
AGG
CPE/
NTU AN L2 aggregation
AGG
Customer
router
IP/MPLS or Carrier
Ethernet repair mechanisms
25.5.3.4 QoS
Business services come with more or less stringent SLAs governing QoS KPIs of
bandwidth, loss, delay and jitter for the service or services presented at the UNI. In
general, business traffic will have to compete with residential traffic (and possibly
mobile backhaul traffic) running in the same access node.
The ISAM access node, being already engineered for triple play services is well
positioned to provide differentiated QoS for business traffic streams of varying
nature, also in competition with residential and mobile traffic in the same node.
Access node features: Ingress policing/color marking, four queues per port, QoS
marking.
SAR-ME combo
point-to-point Ethernet (FE|GE)
1850 TSS-3
7302/7330 ISAM
or 1522 FLIP
or 3rd party fiber NTU/CPE
SAR-ME fiber
or SAR-F
Data ONT
GPON
SAR-ME GPON
Low-end SHDSL CPEs are low-cost solutions for basic ethernet business access
services, using UNI-N functionality of the ISAM SHDSL LT board.
1521 CLIP, 7705 SAR-ME combo and dedicated 3rd party SHDSL NTUs can be
positioned as mid-range to high-end solutions for SHDSL access in an NTU
architecture.
1522 FLIP, 1850 TSS-3, 7705 SAR-F, 7705-SAR-ME fiber, and dedicated 3rd party
fiber NTUs can be positioned as mid-range to high-end solutions for fiber access in
an NTU architecture.
Simpler 3rd party fiber CPEs/media convertors can be positioned, using UNI-N
functionality of the ISAM GE LT board.
The Nokia indoor or outdoor residential type data ONT, or a more feature-rich 7705
SAR-ME GPON is positioned for GPON access.
For the logical end-to-end topologies for Ethernet business services (L2VPN,
L3VPN, BIA), see Figure 337.
The solution components are:
• A customer router that connects to the L2 VPN/L3 VPN/BIA service. The
customer router is beyond the responsibility of the business access provider.
• A provider managed NTU at the customer premises, or a simpler CPE/media
convertor.
In the NTU model, the service selection is fully performed by the NTU, adding a
per-service VLAN. The NTU also performs other UNI-N functions (L2CP handling,
ingress rate limiting …) as well as non-UNI-N functions required for service
assurance (connectivity monitoring, SLA monitoring …).
• The access node (AN) cross-connects customer traffic, either to a per-service
VLAN or to a per-service MPLS VLL.
In the NTU model, this is a 1:1 cross-connect of the service VLAN added by the
NTU. In both VLAN cross-connect mode and MPLS VLL mode, full transparency
for customer frames is assured.
In the UNI model, the service selection (all:1, 1:1, n:1) is performed by the ISAM
LT board, along with other UNI-N functions.
For SHDSL, ATM IMA bonding and PTM bonding inherently provide a level of
resiliency for the first mile.
In terms of QoS, the ingress bandwidth enforcement (optionally including color
marking) is performed by the NTU in the NTU-model and by the ISAM LT board in
the UNI-model. The regular ISAM QoS features enable differentiated treatment of
business traffic in competition with residential and mobile traffic inside the node as
well as correct marking of packets for further QoS treatment in the aggregation
network (upstream) or in the NTU (downstream).
In terms of OAM, end-to-end monitoring of the business access service (including the
first mile) is typically handled between an NTU at the customer premises and either
a peer NTU (for L2 VPN) or the edge router at the PoP location (for L3 VPN, BIA).
802.1ag and Y.1731 can be used for end-to-end checks, either on a continuous basis
(connectivity fault monitoring, SLA monitoring) or on-demand (troubleshooting). The
ISAM should be transparent for end-to-end 802.1ag/Y.1731 PDUs. Optionally,
802.1ag MEPS and MIPS can be placed in ISAM for further troubleshooting and fault
isolation.
For MPLS PE in the access node, LSP ping/traceroute and VCCV ping can be used
to troubleshoot the MPLS segment of the service.
25.6.1 Introduction
The absence of fiber may not be blocking for remote ISAM deployments. Also in
fiber-poor areas, ISAMs for DSL broadband access can be deployed. Taking the
approach of backhauling the fiber-link (point-to-point Gigabit Ethernet) by an
alternative transport technology leaves no further constraints deploying the ISAM in
rural areas or other markets where the exclusive use (dark-fiber) of fiber is not
possible to connect the ISAM.
Depending on the market, available regional or national infrastructure or customer
requirements, we can distinguish possible domains:
• Rural areas (Broadband for all)
• Early/fast deployments in emerging markets re-using legacy (incumbent) network
• Re-use of high-capacity national infrastructure
• Complementing fiber based FTTN deployment
7330 ISAM RA
Ethernet
7357 ISAMSEM
Corporations
and Residences
7302 ISAM CO
ISP 1
7354/7324 ISAM RU
Converter
Converter
Aggregation
Network Transport
ISP 2 Network
7330 ISAM CO
7356 ISAM REM
7330 ISAM RA
Ethernet
7357 ISAMSEM
Corporations
and Residences
A converter will be required at the Central Office location and at the Remote/Cabinet
location. These converters can be point-to-point, where one Ethernet link
corresponds to one link in the transport network or they can be point-to-multipoint
where Ethernet frames are bridged between one Gigabit Ethernet link on the ISAM
side and multiple transport links on the backhaul network side (for example,
ML-PPP).
25.6.2.1 Bandwidth
In many cases the backhaul transport network cannot offer the full 1 Gbps
connection which is supported on the ISAM product family. This is typically not an
issue for rural areas where the number of remote subscribers to be served are limited
per rural site with a limited total amount of bandwidth need, or for emerging markets
where connectivity with a rather limited bandwidth is the primary requirement. An
assessment must be made on a case-by-case base to see whether the network
capacity is sufficient in the backhaul transport network for the target end-user
services (Voice, High Speed Internet, and so on). Possibly, multiple links need to be
bundled to increase the bandwidth.
In industrialized countries with subscriber dense areas and high bandwidth per user
(for example, 20 Mbit/s), where typically fiber is being used for FTTN deployments,
higher capacities are required for the backhaul link. The backhaul approach is taken
for those locations which cannot be served by fiber (fiber black spots) to obtain 100%
user coverage with ISAM based broadband access.
25.6.2.2 Transparency
The backhaul connection between the remote ISAM and CO ISAM must provide a
transparent Ethernet service. The bridging function between the network port of the
ISAM (uplink and/or subtended link) and the backhaul transport network can be done
by an external converter. The converters and backhaul transport network must
ensure that, both the remote ISAM and the CO node, are able to extract the original
frames sent by the other side, in the same order as they were sent, that is, no
frame-reordering or fragmentation.
Congestion is likely to occur on the backhaul link between the remote ISAM and the
CO node due to the limited available bandwidth on this link. The buffer-acceptance,
queuing and scheduling in the upstream direction on the remote ISAM and in the
downstream direction on the CO node are particularly important.
Next to the queuing and scheduling mechanisms, proper service classification must
be done on the backhaul link. At least the p-bits in the VLAN-tag should be
configurable as a means to map VLAN-tagged traffic in the appropriate queues.
To overcome congestion and eventually packet drop (high priority traffic) on the
backhaul link we can use the buffer mechanism of the ISAM, in both upstream and
downstream direction. Using the interface rate-limiting capabilities of the ISAM
network ports, uplink at the remote ISAM and subtended link at the CO node, service
differentiation can be done based on the available bandwidth on the backhaul link.
The port rate-limiting allows traffic scheduling (queue handling) to be done at a speed
(bit rate) matching the available bandwidth in the backhaul transport network. The
dimensioning of the rate-limited on ISAM network ports will depend on the
encapsulation overhead added by framing mechanism implemented on the backhaul
transport equipment (that is, converters) and the Ethernet frame sizes used by the
data services. When forwarding the Ethernet frames over the transport link, headers
and trailers are added to the Ethernet frame. This results in a lower Ethernet packet
throughput than natively supported by the backhaul link. The overhead, headers and
trailers added, depends on the encapsulation method used. Figure 342 gives an
example of the header/trailer bytes added by the GFP and HDLC encapsulation
method.
Figure 342 Encapsulation overhead GFP versus HDLC
As a result the port rate-limit will be set to a rate according the supported packet
bit-rate and not to bit-rate natively (on the wire) supported by the transport network,
which can be a lot lower, depending the Ethernet frame sizes. See below an example
based on GFP-F on E1 to illustrate this.
Table 79 GFP Encapsulation overhead calculation
64 1670 15,83 26
In a second step packet buffers and schedulers of the converters can be used to deal
with service differentiation when sudden bandwidth drop occurs on the backhaul link
(for example, link failure). The priority scheduler in the converter will ensure high
priority traffic (for example, voice) gets precedence over other concurrent traffic in
case of congestion. This is illustrated in Figure 343.
Figure 343 ISAM backhaul with point-to-multipoint converter
DSL
1
E1
VoIP VoIP
VoIP VoIP
shaping
GE UP
shaping
SP SP
NW Ctrl FE/ NW Ctrl
FE/ NW Ctrl SP SP NW Ctrl
GE ... GE
GE
WRR HSI HSI WRR
HSI HSI
E1
VoIP DOWN
NW Ctrl SP
WRR DSL
HSI 48
NT
GE
Mgmt IP
In case of point-to-point converters (see Figure 344), the ISAM ensures the service
differentiation. Flushing the queues will be done at the rate of the available bit-rate
on the link giving precedence to the frames in the highest priority queue.
NT NT LT
Protocol based
VoIP
VLAN tag. + Pbit
VoIP
shaping
SP SP
shaping
NW Ctrl NW Ctrl
shaping
SP GE
NW Ctrl SP UP
shaping
NW Ctrl
GE E1 E1 GE
WRR
L WRR
HSI L HSI
A
A
GE G VoIP
VoIP G VoIP DOWN
shaping
shaping
NW Ctrl SP
NW Ctrl SP SP
NW Ctrl
GE E1 E1 GE
WRR DSL
WRR WRR
HSI
HSI HSI 48
VoIP VoIP
NT
shaping
SP SP
shaping
NW Ctrl NW Ctrl
GE E1
E1 GE
GE
WRR WRR Mgmt IP
HSI HSI
25.6.2.4 Resiliency
To limit the impact of single failures, the backhaul solution should provide the
necessary resiliency at all levels of the architecture. Depending on the backhaul
transport network different resiliency mechanisms apply: ML-PPP, EFM bonding,
SDH VCAT (Virtual Concatenation), APS (Automatic Protection Switching), and so
on. On top packet based link-aggregation can be done using LACP (LAG) or path
redundancy using RSTP.
Bonding or aggregation functions do not only allow a level of resiliency but also offer
the means to provide more aggregated bandwidth on the backhaul link.
As shown in Figure 344, the LAG function of the ISAM is being used to aggregate 4x
E1 based backhaul links into one pipe. Figure 343 shows an example where the
bonding of the backhaul link is done in the transport network using ML-PPP (typically
16xE1).
The end-to-end path resiliency will only work when “fault-propagation” is supported
by the converters and any other intermediate node. Any link-failure causing a service
outage in the path must be propagated in the forward and backward direction
towards the connected ISAM. The CO ISAM will take proper measures when the
link-failure (operational down) is detected: an alternative route might be chosen
based on the implemented resiliency function (for example, LAG) and a port-down
alarm (LOS) is presented to the management system. In a non-redundant backhaul
scenario the alert should indicate that the remote site is no longer reachable.
25.7.1 Introduction
Many hotels and retirement homes are wired with Category3 cable which was very
popular in the 1990's. The Cat3 twisted pair is mainly used to provide hotel and public
telephony services for the hotel guests, in the room and in public areas, and the hotel
staff.
With the emergence of broadband internet access, Wi-Fi (shared) hotspots were
made available to which the hotel guest can connect. In many cases the internet
hotspot belongs to an ISP. The user connects to the internet via the user registration
portal of the ISP after paying a connection fee (pre-paid) via a credit card.
Figure 346 Standard offering for voice and internet access in hotel guest
rooms
HSI: 1 - 5 Mb/s
All the data-streams described in Figure 352 can run over a single DSL copper pair.
In the ISAM and the DSL gateway in the room the proper quality of service
provisioning is done for each of the services. Policing and rate-limiting might apply
depending on the guest profile and service package subscribed to.
The available DSL bandwidth on the copper pair depends on the DSL technology
used:
• ADSL2plus with a theoretical maximum downstream bandwidth of 25 Mb/s.
• Supports longer loops than VDSL2
• Typically 15-20 Mb/s
• VDSL2 (17a profile) has a theoretical maximum downstream bandwidth of 100
MB/s
• Due to the use of higher frequencies on the copper pair the distance is limited
• Typically 25-40 Mb/s
• Virtual Noise increases stability
Other factors influencing the actual copper and therefore the bandwidth are:
• Cable type: Gauge, twisted-pair, shielding, and so on
• Distance: loop length limits, especially for VDSL2
• Bridged Taps: copper pairs that are interconnected together are causing reduced
DSL performance
• Environment Interference: air-conditioning, elevator engines, and so on
• Interference by cross-talk: caused by other services on adjacent pairs.
Global or individual DSL line settings can be applied on the ISAM to minimize the
impact of the different factors described above by configuring DSL profiles
accordingly. DSL profiles can be DSL line specific or uniform across a line card
and/or ISAM chassis.
25.8.1 Introduction
End-user's expectations on access to Broadband connectivity are becoming nearly
as widespread as for the classic commodities (water, gas, electricity, telephony). Not
just private end-users but also businesses and local authorities need broadband
access. However, the geographical coverage by the classic operators is not total,
and not all greenfield opportunities are covered. Backed by government incentives,
more and more local authorities are considering the deployment of a
community-wide access network to fill the gaps and ensure digital attractiveness of
their locality (for social and economic reasons). This is the Smart community
concept, whereby there is a variety of levels for the “community”: building site,
campus or estate, city district, and complete city. One important aspect for
attractiveness is the openness to multiple service providers, promoting service
competition rather than access competition. The applications include but go beyond
the classic triple play, also encompassing business services and specific services for
public authorities like municipalities.
The aim of the Open Community Broadband solution is to offer a way for those new
entrants to build out, deploy and manage such a single access and aggregation
infrastructure at their local level, which can then be opened to and shared by multiple
third party service providers, from which the end-users can select a mix of
applications. In other words, to offer a very flexible wholesaling framework.
The OCB solution as such comprises the passive infrastructure, the active
infrastructure, the management sub-system, and the professional services for
guidance of the local authority to roll out the infrastructure. OCB is part of the wider
context of Smart Communities, developed by Strategic Industries. The scope is
greenfield deployments, encompassing FTTH networks (point-point Ethernet and
GPON) and other flavours of FTTx depending on the case-by-case needs.
The converged ISAM can play a prominent and competitive role in the OCB solution,
by offering a variety of access technologies (point-point optical, GPON access,
FTTx) in a single platform with the necessary mechanisms to create and manage the
connectivities in an open context. Other advantages of the ISAM are port density, the
modular approach (extend-as-you-grow with LTs), and high temperature range.
25.8.2.1 Wholesaling
Three layers can be identified in the delivery of broadband access. The first is the
passive infrastructure (ducts, cables, fibers, splitters). The active infrastructure
consists of all network equipment, and uses the passive infrastructure for giving
connectivity between the end-users and the applications. Finally, the service layer
uses the active and passive infrastructure to deliver the applications.
In traditional networks the approach is a vertically integrated one; the different
incumbent operators integrate all layers, competing with each other on access
infrastructure and less on the services offered.
It is possible to introduce wholesaling to this situation, splitting the responsibilities
over multiple roles, to varying degrees, as illustrated in Figure 353. In the passive
wholesale case, a single passive network is shared and made accessible to multiple
vertical service providers. In the active wholesale case, a single vertical infrastructure
provider offers connectivity to multiple retail service providers (RSPs). Finally, in the
most separated case, a single passive provider gives access to its infrastructure to
the active network operated by a single network operator which connects towards
multiple service providers. Note that even here a single player can combine the roles
of active infrastructure owner and service provider (by offering its own services), but
the important point is that it remains open to third party retail service providers.
Figure 353 OCB: roles and wholesaling levels
25.8.3.1 Requirements
The OCB network must carry residential (triple play + RF video), business (L2 VPN,
L3 VPN, Business Internet Access) and public applications (VPN, e-care, and so on)
with the corresponding levels of security, availability and QoS differentiation. It can
hence be based on existing converged network architectures for residential and
business applications (public applications can be mostly considered as business
services). There are some new requirements though with respect to existing
environments, namely the level of wholesaling and the need for an integrated
management approach:
• each end-user is able to select applications from multiple service providers
simultaneously
• the network operator can sell white label services to third-party service providers
who can then include this service next to their own into their commercial bundle
towards the end-user
• the network operator must have the management tools to operate the network,
the users and their selection of services in the most integrated possible way. A
certain level of dynamism is introduced by allowing end-users to select the
services per service provider via a self-provisioning portal.
• The network operator needs to provide the ability for Retails Service Providers
(RSP) to offer competitive and differentiating service offerings. The OCB network
has to support a very granular configuration of bandwidth and QoS per RSP per
end-user.
Figure 355 L2 access architecture for OCB (residential user depicted with 1
RGW per RSP)
The dedicated EMS platforms take care of the initial user provisioning and
consolidated alarm management.
26 RADIUS Attributes
26.1 RADIUS Attributes
26.1.1 NAS-Port
The system sets the NAS-port attribute as described below:
• 802.1X sessions:
The NAS-port attribute contains the ifIndex of underlying bridge port.
• PPPoE sessions:
The NAS-port attribute contains the ifIndex of the PPPoE sessions.
26.1.2 NAS-Port-Id
The system sets the NAS-Port-Id attribute according to the following text format:
atm <rack>/<shelf>/<slot>/<DSL-Line>:<VPI>.<VCI>
The fields indicated between “<” and” “>” is the information retrieved from the
management model:
• Rack & shelf:
Rack and shelf number of the board that terminates the DSL line. Each item is
represented with 1 ASCII character.
26.2.1 General
Vendor ID 637 is used for ISAM.
The “Vendor type” field has a length of two bytes where the highest byte is the project
ID and the lowest byte is the project specific attribute ID.
The “Vendor length” field has a length of one byte.
The project ID 7 is assigned to ISAM project. This means that the vendor specific
attribute range from 1792 to 2047 will be used for the ISAM.
Note — If the radius server supplies the 7330 with VSA
privileges in the authentication response for a CLI operator, the
response must contain a VSA and privilege level for all
supported VSA's on the 7330. Otherwise, the 7330 will use the
default values for ALL attributes as set in the default-profile on
the ISAM. The default-profile settings can be viewed in CLI
using the info configure system security default-profile
command.
26.2.2 VRF-Name
26.2.3 VLAN-ID
26.2.4 QoS-Profile-Name
The QoS-Profile-Name is a character string of maximum 32 characters identifying
the QoS user profile configured in the system. The QoS user profile contains both
marker and policer information.
Note: This attribute cannot be specified together with QoS-Parms attribute.
• Vendor Type: 1794
• Vendor Length: 4 < length < 35
• Vendor Value: STRING
• Packet: Access-Accept
26.2.5 QoS-Parms
Note: This attribute cannot be specified together with QoS-Profile-Name attribute.
• Vendor Type: 1795
• Vendor Length: 4 < length < 249
• Vendor Value: STRING
• Packet: Access-Accept
The possible values for each domain are (except for domain SLOT-NUMBERING
and CONFIRM_PROMPT):
• 0: no privilege
• 1: read privileges
• 2: write privileges
• 3: read-write privileges
Customer documentation
Customer Documentation Welcome Page
Technical Support
Customer Documentation Technical Support
Documentation feedback
Customer Documentation Feedback
Copyright 2016-2018. Nokia
3HH-13800-BAAA-TQZZA