0% found this document useful (0 votes)
31 views131 pages

Ipasolink 200 and 400 Presentation V1

The document provides an overview of the iPASOLINK modular network element from NEC, detailing its various models (200, 400, and 1000) and their features such as redundancy, scalability, and support for both microwave and optical transmission. It highlights the system's capabilities in handling diverse traffic types, including TDM and IP, and emphasizes its flexibility in configuration and management. Additionally, it outlines advanced features like VLAN support, QoS, and redundancy configurations, making it suitable for modern telecommunications networks.

Uploaded by

Fabrice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views131 pages

Ipasolink 200 and 400 Presentation V1

The document provides an overview of the iPASOLINK modular network element from NEC, detailing its various models (200, 400, and 1000) and their features such as redundancy, scalability, and support for both microwave and optical transmission. It highlights the system's capabilities in handling diverse traffic types, including TDM and IP, and emphasizes its flexibility in configuration and management. Additionally, it outlines advanced features like VLAN support, QoS, and redundancy configurations, making it suitable for modern telecommunications networks.

Uploaded by

Fabrice
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 131

NEC Confidential

NEC Confidential
iPASOLINK is a modular network element that integrates a number of crossconexión
switches, packet switching and microwave and optical functionalities, resulting in
reduced costs and a long life. Losw following teams make up the family iPASOLINK and
cover from the access layer to the backbone.

iPASOLINK 200
 2-Way Radio
 Redundancy
 Compact Design

iPASOLINK 400
 4-way Nodal
 Redundancy
 Pay as grow architecture

iPASOLINK 1000
12-way Nodal
 Redundancy
 High Speed INTF
 SDH and All IP
with CWDM

iPASOLINK Introduction
3 NEC Confidential
Convergent Radio with package management for LTE and next generation backhaul

Designed for:

 Optimized performance, scalable and high


capacity
iPASOLINK 200
 Optical and Microwave Transmission
 Easy migration from TDM to pure IP environment full.
 Flexibility of applications and software update

Numerous features in a compact

▐ Packet oriented radio capable configurable. iPASOLINK 400


▐ AMR Hitless modulation up to 256QAM with adaptive QoS.
▐ Ring Supports Ethernet over TDM and redundancy
▐ Management is timing (TDM Sync Eth)
▐ PWE handling Supports TDM and IP traffic
▐ Supports Ethernet OAM
▐ Wide range of interfaces: E1, STM-1, FE, GbE iPASOLINK 1000

NEC Confidential
iPASOLINK200
Microwave
Microwave Radio
Radio Equipment
Equipment
1U generation
generation
Versatile
Versatile and
and compact
compact

iPASOLINK400

Aggregation
Aggregation with
with Nodal
Nodal Solution
Solution
1U Features
Features Multi
Multi Service
Service

iPASOLINK1000
Nodal
Nodal Solution
Solution for
for High
High Density
Density
Integration
Integration // Network
Network Convergence
Convergence
3U Optical
Optical and
and Microwave
Microwave Radio
Radio

Page 5 © NEC Corporation 2010 NEC Confidential


Access Aggregation Metro Core
2G/3G/LTE

E1
BTS/Node-B

iPASOLINK 200 iPASOLINK 200


Ethernet iPASOLINK 1000 BSC/
eNB iPASOLINK RNC/
1000 MME

WiMAX iPASOLINK 400 iPASOLINK AGW


400/1000
iPASOLINK
1000 iPASOLINK
Ethernet
1000
Internet
iPASOLINK 200 iPASOLINK 200
BS

Packet network
MS5000

: Dual Native
: All IP (Hybrid) : Hybrid Split : Off Load : CWDM

NEC Confidential
Transmission Specifications
Frequency Bands: 6-38 GHz
Radio Broadcast Capacity:
・ QPSK/16/32/64/128/256 QAM
・ Hitless-AMR
・ LDPC FEC
・ MTPC / ATPC
Traffic mix SDH / PDH / LAN:
Interface 10/100/1000 Base-T
1000 Base-SX / LX
16 x E1,
1 STM-1 through or channeled

Advanced Features Ethernet Scalability and Flexibility

VLAN ・ Port-based VLAN Concept Pay as you grow:


・ 802.1Q Tag-based VLAN - Software Upgrade
・ 802.1ad Q in Q (Tunnel) Flexible configuration
QoS ・ 802.1p CoS / ToS /Diffserv - 1+0, 1+1 HS/SD/FD,XPIC,2+0
・ Advanced QoS (for AMR) - 126xE1 Cross Connect SW
Synchronous Ethernet - PWE
RSTP
Ethernet OAM
TDM Ring Protection (SNCP)

NEC Confidential
Transmission Specifications
Frequency Bands : 6 a 38 GHz
Radio Broadcast Capacity :
・ QPSK/16/32/64/128/256 QAM
・ Hitless-AMR
・ LDPC FEC
・ MTPC / ATPC
Traffic mix SDH / PDH / LAN:
Interface 10/100/1000 Base-T
1000 Base-SX / LX
16 x E1,
2 STM-1 through o 1 STM-1 channeled

Advanced Features Ethernet Scalability and Flexibility

VLAN ・ Port-based VLAN Concept Pay as you grow:


・ 802.1Q Tag-based VLAN - Software Upgrade
・ 802.1ad Q in Q Flexible configuration
QoS ・ 802.1p CoS / ToS /Diffserv - 1+0, 1+1 HS/SD/FD,XPIC,2+0
・ MPLS EXE - 168xE1 Cross Connect SW
・ Advanced QoS (for AMR) - PWE
Synchronous Ethernet / IEEE1588v2
RSTP, ITU-T G.8031, 8032V2
Ethernet OAM, IEE802.1ag, ITU-T Y1731
TDM Ring Protection (SNCP)

NEC Confidential
NEC Confidential
* E1 to Ethernet transmission :

* STM1 transmission with Ethernet :

NEC Confidential
• Redundancy Configurations in IDU
(1+0) No Protection (to 4 with IP400)
(1+1) Hot Standby (to 2 Grupos with IP400)
(1+1) Hot Standby with Space Diversity (1+0)
(1+1) Twin Path (Frequency Diversity, 2 grupos)
• Other configurations in IDU
(1+0) x 2 Repeater (1+0) x 4 Nodal (IP400)
(2+0) x Dual Polarization with XPIC (IP200) (1+1) HS

(2+0) x Dual Polarization with XPIC (1+0) 2 Groups


(2+0) x Dual Polarization with XPIC (1+1) 1 Group

(1+1) HS / SD

(1+0) x 2 (2+0) CCDP (XPIC) (1+1) Twin Path

NEC Confidential
Hot Stand By with one antenna

MOD M
ODU-1 ODU-1 MOD
M M M
(TX) F1 F1' (TX)
P P P P

DEM X ODU-1 ODU-1 DEM


X
(RX) F1' F1 F1 (RX)
X X

HL HL
HYB HYB
SW SW
ODU-2 ODU-2
DEM M M
(RX) F1'
F1' (RX) M M DEM
F1
P P P P
ODU-2 ODU-2
MOD X X X X MOD
(TX) F1 F1' (TX)

Hot Stand By with two antennas

ODU-1 ODU-1
MOD M M
(TX) F1 F1 F1' (TX)
M M MOD
P P P P

DEM X X ODU-1 ODU-1 DEM


(RX) F1' F1' F1 (RX)
X X

HL HL
SW SW
ODU-2 ODU-2
DEM M M M M DEM
(RX) F1' F1 (RX)
P P F1' F1 P P
ODU-2 ODU-2
MOD X X X X MOD
(TX) F1 F1' (TX)

Space Diversity
NEC Confidential
Single Antenna Twin Path System

MOD M
ODU-1 ODU-1 MOD
M M M
(TX) F1 F1' (TX)
P P P P

DEM X X ODU-1 F1 ODU-1 X X DEM


(RX) F1' (RX)
F1' F1

HL HL
SW
HYB F2 HYB
SW
ODU-2 F2' ODU-2
DEM M M F2 M M DEM
(RX) F2` (RX)
P P P P
ODU-2 ODU-2
MOD X X X X MOD
(TX) F2 F2` (TX)

Two Antenna Twin Path System


ODU-1 ODU-1 MOD
MOD M M
(TX) M M

P P
(TX) F1 F1 F1'
P P

X ODU-1 ODU-1 DEM


X X X
DEM F1 (RX)
(RX) F1' F1'
HL HL
SW SW
ODU-2
DEM M M
ODU-2 F2 F2 (RX) M M
DEM
(RX) F2'
P P P P
ODU-2
MOD X X
ODU-2 F2' F2' (TX)
X X MOD
(TX) F2

Frequency Diversity
NEC Confidential
*Hot StandBy groups

*Groups for Twin Path

NEC Confidential
NEC Confidential
NEC Confidential
ODU IHG (iPASOLINK High Gain)

•High Gain (Output Power) that NHG2


•Compatible with Pole Mounting Bracket HYB and
Current

NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
No universal slot OPTION CARDS
(All units are to be fixed before Shipment)
16 x E1 INTFC
Ch STM-1 (or STM-1)
ODU Interface LED Indication LCT / NMS AUX HK DI/DO Multi Service Engine PS input
(1+0)/(1+1)/XPIC) (Status/Alarms)

Main Board Not


Changeable USB Memory Slot NE1 / NE2 SFP ALM / SC/CLK 16 x E1 INTFC Power Supply FAN Unit
Back-to-Back 2 x GbE
LAN Ports
2 x Fast Ether OR 2 FE + 2 GbE
4x 10/100/1000Base-T Option

NEC Confidential
Option-2 Option-1 Option-3

GbE SFP (Port-5/6)


1000BASE-SX
AUX-S 16E1-S PS-S
1000BASE-LX

Blank Cover

STM1-S

STM-1 SFP
Optical S-1.1

The top cover must be


removed for the installation of Optical L-1.1

option cards Electrical

NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
SW

SW

NEC Confidential
NEC Confidential
If a fan alarm, should be replaced immediately.
This unit must be replaced with the power on.

NEC Confidential
NEC Confidential
NEC Confidential
The initial menu screen
displays LCT current
machine status.

Open your Internet browser and enter the


URL: http://172.17.254.253/weblct/ leg
opening welcome screen Web LCT
Now, you must enter the username and
password information in the appropriate
boxes and then click on the OK button.
Username : Admin
Password: 12345678

NEC Confidential
Cerrar sesión con este botón antes
de desconectar el cable LAN.

Give Click on the Logout button located in the


upper right to log off the computer.
When the confirmation Logout, Confirm with
OK.

By taking this action, the Home screen


appears. At this point you should close your
Internet browser.

NEC Confidential
Username Alarm indicators Remote End Mantenance Logout

Indicates the user which is Indicate LSI ODU alarm exists, IDU, AUX I / O, For remote site maintenance on or off Close Session
connected TCN, and if the team is in maintenance. connection link.

Block diagram

Specify ODUs and


interfaces connected to
the IDU.

Drop down menu Alarms detail

LCT main menu Indicates alarms in detail and its state


depending on the tab where it is located.

NEC Confidential
Version F/W IP adress and Name Remote Site

Indicates the current ndicates the name assigned to the computer To connect to the
firmware version and your IP address remote radio

Connecting to remote radio

Click on "Opposite site links" and select


the location where you want to connect.
This will open the home screen remote
radio in a new window.

NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
Click the « + » to expand
each main menu folder
and see the sub-menu
items

NEC Confidential
NEC Confidential
NEC Confidential
Click the Equipment Setup menu
and select Equipment
Configuration. Equipment
configuration screen is displayed
with the current equipment
configuration settings.
Click the Setup icon to open the
Setup wizard to select the
Equipment configuration or
modify the Equipment
configuration. Click Next on each
configuration window

NEC Confidential
1- Click the Equipment Setup menu 2- Click the Setup icon to open (1)
and select Radio Configuration to Detailed MODEM Seting of
open the Equipment Setup – Radio SW/XPIC GRP or slot unit window
Configuration screen.

NEC Confidential
3- Enter the radio parameters
Specification and
information of the ODU
connected to the selected
Green border on the Set Modem
Position section modem
configuration show the
selected modem Select the channel
spacing of the radio
signal

Select the
Modulation of the
Current setup of the radio signal
selected modem’s radio
configuration

Select the radio


mode

Enter TX frequency

Enter the radio


signal Frame ID
(1-32)

Select the TX Power Control Mode

NEC Confidential
Confirmation screen shows the changes in blue
background. Confirm the setting and click OK

NEC Confidential
Set the AMR Modulation for Modem Slot
indicated by the green border. Click Next
to set the AMR priority trafic for Modem 1
& click Next to set the next Modem

NEC Confidential
NEC Confidential
Click General Setting from the Network Management
Configuration menu. NE primary IP si dispalyed

Click the Setup icon. General stting window opens

Enter the primary IP address for the NE (Bridge1), Subnet


Mask and Default Gateway for the Bridge1

NEC Confidential
Select General Setting (Detail)
from the Network Management
Configuration Menu. General
Setting Detail screen opens
showing the network parameter
setting

NEC Confidential
To change Network
parameters, Click the Setup
icon, General Setting (Detail)
window opens

After changing modifying the


parameters, click OK button

NEC Confidential
NEC Confidential
NEC Confidential
Select Modem Function Setting
on the provisionning menu and
click on the Modem Port
setting.

Click MODEM (Slot01),


MODEM (Slot02) or MODEM
(Slot03) to open the Modem
portname setting window.

Enter the Modem Port Name


(32 characters)

Click the OK button to close


the window

NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
CH USAGE : Select E1 channels to be used by selecting the USED
radio button. NOT USED radio button inhibit alarms from the
selected channel.

CH USAGE ERROR REPORT : Select REPORT radio button to


raise an alarm when an E1 signal is detected at the input of a
channel selected as not used

E1 PORT IMPEDENCE : Select the impedence of the E1 channels


to be 120 Ohms or 75 Ohms. Select the appropriate radio buttons

SERVICE NAME : Enter the service name for each E1 channel (Max
32 characters)

NEC Confidential
NEC Confidential
NEC Confidential
SELECT EQUIPMENT CLOCK FROM THE
PROVISIONNING EQUIPMENT CLOCK /
SYNCHRONIZATION SETTING MENU

CURRENT EQUIPMENT CLOCK MODE AND SELECTED


CLOCK SOURCE IS INDICATED

CLICK THE Modify ICON TO SET / CHANGE EQUIPMENT


CLOCK SETTING

AFTER SELECTING THE EQUIPMENT CLOCK SETTING,


CLICK THE OK BUTTON

NEC Confidential
SELECT EQUIPMENT CLOCK FROM THE
PROVISIONNING EQUIPMENT CLOCK /
SYNCHRONIZATION SETTING MENU

CURRENT EQUIPMENT CLOCK MODE AND SELECTED


CLOCK SOURCE IS INDICATED

CLICK THE Modify ICON TO SET / CHANGE EQUIPMENT


CLOCK SETTING

AFTER SELECTING THE EQUIPMENT CLOCK SETTING,


CLICK THE OK BUTTON

NEC Confidential
SELECT EQUIPMENT CLOCK FROM THE
PROVISIONNING EQUIPMENT CLOCK /
SYNCHRONIZATION SETTING MENU

CURRENT EQUIPMENT CLOCK MODE AND SELECTED


CLOCK SOURCE IS INDICATED

CLICK THE Modify ICON TO SET / CHANGE EQUIPMENT


CLOCK SETTING

AFTER SELECTING THE EQUIPMENT CLOCK SETTING,


CLICK THE OK BUTTON

NEC Confidential
NEC Confidential
EQUIPMENT CLOCK MODE : SELECT THE CLOCK MODE
TO BE USED IN THE IDU.

Sync ETH : ENABLE OR DISABLE THE SYNCETH


FUNCTION. WHEN ENABLE SUNCETH CLK CAN BE
RECEIVED OR SENT OVER THE GbE LINE.

THREE TIMING SOURCES DEPENDS ON THE OPTION


CARDS MOUNTED. N°1 AND 2 CAN SELECT FROM THE
FOLLOWING SOURCES :
IF E1 CHANNEL ARE USED E1 LINE CLOCK IS AVILABLE
SA A TIMING SOURCE (select from CH1 to CH16)
MODEM (slot#) CAN BE SELECTED AS A TIMING SOURCE

NEC Confidential
NEC Confidential
NEC Confidential
* IF Loop

*E1 local Loop

* E1remote Loop

NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
NEC Confidential
IPASOLINK 200 - 400

NEC Confidential
NEC Confidential
NEC Confidential
The link layer is the same for 10
BASE-X, 100 BASE-X, 1000
BASE-X (GE) or 10G BASE-X
(10GE​​). This layer corresponds to
the media access control. This
layer builds the basic format of
Ethernet data.

NEC Confidential
NEC Confidential
The IEEE 802.3u 100Mb introduced what were previously only
10Mb Ethernet / s. By the time the PCs had the option to choose
how fast they wanted to communicate, it was necessary to
introduce a procedure to handle this decision.

With the introduction of a third-speed Gigabit Ethernet 1000Mb/so,


this process still took more relevant.

Thus was created the auto-negotiation protocol

NEC Confidential
Auto-negotiation is an extremely important parameter in the
wired Ethernet networks today. For a link to work properly,
the devices at both ends of the cable must be configured in
the same way, either both must be configured to use auto-
negotiation or both must be permanently set the same
parameters of speed and duplex.

NEC Confidential
In an environment in which a device is configured to auto-
negotiate and the other device is configured to use a fixed
speed and duplex, auto-negotiation algorithm can detect
the speed and fix it correctly, but the duplex setting of the
remote device can be determined by the device performing
the auto-negotiation. And following the IEEE, the device
configured to auto-negotiate will switch to half-duplex.

NEC Confidential
Finally, it should be remembered that, according to the
IEEE, the use of Gigabit Ethernet requires the use of auto-
negotiation, so 1000Mb / s is not a valid fixed
configuration on a network device that faithfully follow
IEEE.

NEC Confidential
With the introduction of the standard IEEE 802.3u Fast
Ethernet became possible simultaneous bidirectional
communication. If we do not have physical wiring problems
or hardware failure, incorrect allocation of the duplex is the
most common cause of problems on a network link.

NEC Confidential
The introduction of twisted pair cabling also opened the
possibility of connecting the cable in multiple ways.
LADO A LADO B CABLE
MDI MDIX Cable directo
MDI MDI Cable cruzado
MDIX MDIX Cable cruzado
MDIX MDI Cable directo

Media Dependent Interface (MDI Medium-Dependant


Interface) is the orientation in which a computer card is wired
normally and medium dependent interface - cross (Medium
Dependant Interface crossover - MID-X) orientation is used
in a switch or other network device.

NEC Confidential
A link will be saturated when the connection between two
devices have more data to transmit to the bandwidth to
transmit data.

This introduces the need to control the flow of data, process


that enables a device to request the other to stop the
transmission so you can process the packets.

NEC Confidential
Utilization: This term is determined Throughput: This concept is a
by comparing the rate of packets similar measure to use.
against total bandwidth passing However, the throughput
through an Ethernet link. For example, measures the number of
a link to 100Mega bits (100 BASE-X) packets sent to the number of
has an available bandwidth of packets received. Is a measure
100Mbps. If the packet rate is of the quality of service. If 100
40Mbps, the use of channels is 40%. packets are sent and 90 of them
The use may vary according to the go to the other extreme, the
operation of the network and the data system throughput is 90%.
that are going through it, depending on
the activity of the user traffic in a given
time, the use can range from 0% to
100% and vice versa in a short time.

NEC Confidential
Round Trip Delay / Latency : Counting Frames: This term
These are measures of time to an indicates how many frames have
ethernet network. The first time passed through an Ethernet
you spend erl indicates a packet interface. Each packet that is
to get from one point in the received is counted. Also be
network and return to it. Latency is labeled as a good package n (good
the time spent by the packet to get FCS) or bad package (FCS error).
from one point to another. Latency Occasionally, packets are counted
can be measured in a single by their size.
element (router) or a full road
network.

NEC Confidential
Payload : the payload of a
packet is seen from the upper
layers, as is the frame portion There is confusion between these two
which carries the information, ie, terms. MTU (Maximum transmission unit)
removing the header and other is configured on the network equipment
control information as the maximum size that can pass
through an interface and the generation
of frames. As we saw, Frame Size, is the
Frame Size : Is measured from full size of the plot.
the beginning of an Ethernet
packet to the end. The range of There are the jumbo frames, which come
Ethernet frame size is from 64 with frame size up to 9600 bytes.
bytes to 1518 bytes in a
standard frame. If you add
VLAN information is up 4 bytes
in size.

NEC Confidential
A VLAN is a virtual local area network,
which comprises two sections, a value
tag (0 to 4095) and a VLAN priority (0 to
7). A VLAN is a way to separate traffic
from a LAN in different subgroups. Each
VLAN traffic handled differently and
behaves like a LAN. There are two
reasons why you create VLANs on a
network: routing of traffic and traffic
prioritization.

NEC Confidential
Traffic Routing: The VLAN tags Traffic prioritization: if a
allow faster routing in high speed network contains voice
networks. When the VLAN tag option information and data at a time,
is enabled, it means that you can voice traffic should unaz trpafico
work with VLANs, in this case, the higher priority than data. Many
element that performs routing need networks use VLANs to
not review the information layer 3 to differentiate these types of traffic
find the target computer, saving and and assign a different priority. If
reduced processing time routing of the network is congested,
each packet. The traffic that is routed routers discard equipment with
VLAN tag where appropriate. lower priority traffic (data) and
the voice will.

NEC Confidential
VLAN VLAN10 VLAN20

Broadcast is broadcast
Broadcast is transmitted
on all ports except the only between the
one who sent him. members of the VLAN.

NEC Confidential
One of the most commonly used to test Ethernet links RFC2544 test.

This is a test set formed as a specification that was developed to describe and
define an Ethernet switch capabilities. This test has been adopted to characterize
and test all Ethernet links.

The test suite consists of 4. which are:

-Throughput
- Latency
- Loss of frame
- Frames back-to-back

NEC Confidential
*Throughput: This test identifies *Latency: This test consists of
the maximum bandwidth that can measuring the round trip delay
operate an Ethernet link. This of Ethernet frame. This value is
value must be the same or commonly given in
slightly greater than the speed milliseconds.
set on the port.

NEC Confidential
*Loss of Frames: This test runs an *Frames Back-to-back: This test
analysis of frame loss at the rate is used in the time of manufacture
specified by the throughput test. The of the equipment to determine the
expected result is zero lost frames buffering capacity of an element.
at the set speed. For a bond as such, this test is not
required and can be omitted.,
Since it does not provide useful
information.

NEC Confidential
The frame transmission in Ethernet Switch iPASOLINK is by MAC address learning.

MAC address table - Forwarding Data Table


(FDB)
The size of the FDB is 32KByte iPASOLINK Port MAC address

FDB default Aging Time: 300 seconds


1 A 00-00-00-00-00-01
4 D 00-00-00-00-00-04

1 2 3 4

Dst MAC: D Dst MAC: A


Src MAC: A Src MAC: D

MAC A
MAC B MAC C MAC D 00-00-00-00-00-04
00-00-00-00-00-01
NEC Confidential
Port Based VLAN
1 2 3 4 5 6 7 8 9 10 11 12
VLAN
Switch

VLAN 1 VLAN 2 VLAN 3

(VLAN ID 10)
Tag Based VLAN
VLAN VLAN
SW 1 SW 1 (VLAN ID 10)
2 2
3 3
(VLAN ID 20) 4 4
5 5
6 6 (VLAN ID 20)

Tag 10
Tag 20
NEC Confidential
Extended VLAN (Q in Q)
This type of port, VLAN extended, is under the standard IEEE802.1ad where
add 2 additional bytes to include additional VLAN information.

Company A Company B

VLAN100 VLAN100
Data 100 Data 100

Data 100200 Common Network Data 100300

Data 100 Data 100


VLAN100 VLAN100

Company A Company B

NEC Confidential
FE1/GbE
Modem1

1.Access FE2/GbE Trunk


VLAN VLAN

FE3/GbE
2.Trunk L2 SW
VLAN
FE4/GbE
3.Tunnel
Trunk
VLAN
GbE5 VLAN
Modem 2
GbE6

NEC Confidential
When applications require large plot sizes, the team must support the call Jumbo
Frame. For example when using VLAN tag, extended VLAN or MPLS label.

IPASOLINK supports Jumbo Frame 1996 bytes in Fast Ethernet and Giga
Ethernet 9596 bytes.

Ethernet Header:18 bytes


Max 1518 Bytes
Conventional
Max MTU Size = 1500bytes (Ethernet Standard)
ETH Plot 1500 18 Max Frame Size = 1518bytes

Max 1522 Bytes


Plot ETH
Max MTU Size = MTU1500bytes + 4 bytes VLAN Tag
802.1q 1500 4 18 Max Frame Size = 1522 Bytes

Max 1526 Bytes Max MTU Size = MTU1500bytes + (2 x 4 bytes VLAN


Plot ETH Q Tag)
Max Frame Size = 1526 Bytes
in Q 1500 4 4 18

NEC Confidential
In this menu you can configure the basic settings iPASOLINK Layer 2 switch

NEC Confidential
At this point is configured for each port parameters such as speed, duplex, MDI,
flow control, among others.

NEC Confidential
Setup Menu VLANS on different ports ETH

VLAN creation menu in iPASOLINK

NEC Confidential
Other configurations of Ethernet Ports

NEC Confidential
1) IP Packet

ToS (3bit) IP ECN Explicit Congestion Notification

Version Header TOS IP address etc.


Length

8bits

To MAC Fm MAC Type TCI Type IP Header IP data FCS


Address Address

2Bytes
CFI: Canonical Format Indicator
FCS: Frame Check Sequence
VLAN Tag Priority CFI VLAN
bit ID TCI: Tag Control Information
TOS: Type Of Service
3bits COS: Class Of Service
(802.1q CoS)

NEC Confidential
The traffic prioritization is reviewed with the value set in the User Priority field given by the
Standard IEEE 802.1p (CoS: Class of Service).

CoS value can be assigned in a range from 0 to 7 (8 kinds) in the VLAN tag field.

Preamble Destination Source MAC VLAN Length Data FCS


MAC address address tag / type
8byte (DA) (SA) 4byte 46 - 1500byte 4byte
6byte 6byte 2byte

Ejemplo: Priorización de tráfico


802.1q tag type TCI field 7(high) Traffic management
2byte 2byte
6 Voice

5 Video

CoS Priority CFI VLAN-ID


4 Control signal

Value 3bit 1bit 12bit 3 Excellent effort

0 Best effort

2 Reserved

1 (low) Background

NEC Confidential
 CIR (Committed Information Rate) -
Guaranteed minimum bandwidth for an Ethernet service.
 Policing is the application of CIR CIR OK
 CIR of zero means the best (No guaranteed bandwidth) Traffic ≤ CIR
 The traffic that is above the CIR is marked.

 EIR (Exceeded Information Rate) -


 Marked with yellow frames can be delivered but there is no EIR
commitment to do so. Conformant
Traffic ≥ CIR

 PIR (Peak Information Rate) -


Máxima tasa en que los paquetes serán enviados.
 PIR = CIR + EIR (greater or equal to the CIR) No traffic
 Packets that exceed the PIR are marked with red and discarded Traffic ≥ PIR
immediately.

NEC Confidential
Discard Markdown

(2)Max Band Control

Violating Frames
[Amount of Traffic]

(1)Min Band Monitor

Complying Frames

[Time]

NEC Confidential
Configuration parameters for Policyng:
CIR: 0 a 1000000 kbps
EIR: 0 a 1000000 kbps
EBS: 0 a 128kbyte
CBS: 1 a 64 kbyte

Recommendation : EBS: 48 bytes, CBS: 24 bytes

•EBS and CBS parameters are measured in bytes and must be configured with a value
greater than zero.
•EBS is the maximum number of bytes that are allowed for packets income above the
EIR and remain marked as yellow.
•CBS is the maximum number of bytes that are allowed for packets above the CIR
income and remain marked green.

Note: Color Blind and Color Aware Rate Metering ( iPASO200 is color blind system)

NEC Confidential

You might also like