Thursday, May 25, 2017

Huawei GPON Protocol Stacks

ITU-T Recommendation G.984.3 defines a new set of frame structures, which consider traditional voice, video, and Ethernet packets as payloads of Huawei GPON frames. Figure 2-10 shows the structure of GPON protocol stacks.
GPON protocol stacks involve the physical medium dependent (PMD) layer and GPON transmission convergence (GTC) layer.
PMD Layer
The GPON PMD layer corresponds to the GPON interfaces between Huawei OLTs and Huawei ONUs. Parameter values of the GPON interfaces specify the maximum reach and split ratio for a GPON system.
GTC Layer
The GTA layer is used to encapsulate payloads using ATM cells or GEM frames, and GEM frames are commonly used in GPON systems. GEM frames can carry Ethernet, POTS, E1, and T1 cells.
GTC is the core GPON layer, where media access is controlled for upstream service flows and ONUs are registered. Ethernet frame payloads are encapsulated into GEM frames and then packetized as GTC frames. These GTC frames are converted to binary codes for transmission based on interface parameters configured at the physical layer. The process is reversal on the receive end. Specifically, the receive end decapsulates the data to obtain GTC frames, GEM frames, and then payloads for data transmission.
The GTC layer is classified as TC adaptation sub-layer and GTC framing sub-layer by structure.

The TC adaptation sub-layer involves the ATM, GEM TC, and optical network terminal management and control interface (OMCI) adapters and dynamic bandwidth assignment (DBA) control module. ATM and GEM TC adapters identify OMCI channels by virtual path identifier (VPI)/virtual channel identifier (VCI) or GEM port ID. OMCI adapters

can exchange OMCI channel data with the ATM and GEM TC adapters and send the OMCI channel data to OMCI entities. The DBA control module is a common functional module, which generates ONU reports and controls DBA allocation.
On the GTC framing sub-layer, GTC frames include GEM blocks, PLOAM blocks, and embedded OAM blocks. The GTC framing sub-layer supports the following functions:
− Multiplexes and demultiplexes data. Specifically, the GTC framing sub-layer multiplexes PLOAM and GEM data into downstream TC frames based on the boundary information specified in the frame header. In addition, the GTC framing sub-layer demultiplexes PLOAM and GEM data from upstream TC frames based on frame header instructions.
− Generates frame headers and decodes data. The GTC framing sub-layer generates the TC header of downstream frames in a specified format and decodes the frame header of upstream frames. In addition, the GTC framing sub-layer terminates the embedded OAM data encapsulated into the GTC header and uses the OAM data to control this sub-layer.
− Routes data internally based on alloc-IDs. The GTC framing sub-layer routes the data sent by or to the GEM TC adapters based on internal alloc-IDs.

The GTC layer consists of plane C/M and plane U based on functions.
The protocol stacks of plane C/M include embedded OAM, PLOAM, and OMCI. Embedded OAM and PLOAM channels are used for managing PMD and GTC sub-layer functions. OMCI provides a unified system for upper-layer sub-layer management.
− Embedded OAM channels are defined in GTC frame headers for determining bandwidths, exchanging data, and dynamically allocating bandwidths.
− Dedicated space is reserved in GTC frames for format-based PLOAM channels. The PLOAM channels carry the PMD and GTC management information that does not pass through the embedded OAM block.
− OMCI channels are used for managing services.
Service flows on plane U are identified based on service flow types (ATM or GEM) and port ID/VPI. Port IDs identify GEM service flows and VPIs identify ATM service flows. In T-CONTs, bandwidths are allocated and QoS is controlled using the timeslots that can be adjusted.

Wednesday, May 24, 2017

Huawei GPON Networking Applications

GPON is a passive optical transmission technology that applies in FTTx solutions, including fiber to the building (FTTB), fiber to the curb (FTTC), fiber to the door (FTTD), fiber to the home (FTTH), fiber to the mobile base station (FTTM), fiber to the office (FTTO), and fiber to the WLAN (FTTW), for voice, data, video, private line access, and base station access services.
Figure 2-7 shows FTTx networking applications.
Huawei FTTx network applications in GPON access have the following in common: The data, voice, and video signals of terminal users are sent to ONUs, where the signals are converted into Ethernet packets and then transmitted over optical fibers to the OLT using the GPON uplink ports on the ONUs. Then, the Ethernet packets are forwarded to the upper-layer IP network using the uplink port on the OLT.

  • FTTB/FTTC: The OLT is connected to ONUs in corridors (FTTB) or by the curb (FTTC) using an optical distribution network (ODN). The ONUs are then connected to user terminals using xDSL. FTTB/FTTC is applicable to densely-populated residential communities or office buildings. In this scenario, FTTB/FTTC provides services of certain bandwidth for common users.
  • FTTD: uses existing access media at user homes to resolve drop fiber issues in FTTH scenarios.
  • FTTH: The OLT such as Huawei MA5600T connects to ONTs at user homes using an ODN network. FTTH is applicable to new apartments or villas in loose distribution. In this scenario, FTTH provides services of higher bandwidth for high-end users.
  • FTTM: The OLT is connected to ONUs using an ODN network. The ONUs are then connected to wireless base stations using E1. The OLT connects wireless base stations to the core IP bearer network using optical access technologies. This implementation mode is not only simpler than traditional SDH/ATM private line technologies, but also drives down the costs of base station backhaul. FTTM is applicable to reconstruction and capacity expansion of mobile bearer networks. In this scenario, FTTM converges the fixed network and the mobile network on the bearer plane.
  • FTTO: The OLT is connected to enterprise ONUs using an ODN network. The ONUs are connected to user terminals using FE, POTS, or Wi-Fi. QinQ VLAN encapsulation is implemented on the ONUs and the OLT. In this way, transparent and secure data channels can be set up between the enterprise private networks located at different places, and therefore the service data and BPDUs between the enterprise private networks can be transparently transmitted over the public network. FTTO is applicable to enterprise networks. In this scenario, FTTO implements TDM PBX, IP PBX, and private line service in the enterprise intranets.
  • FTTW: The OLT connects to ONUs like Huawei HG8546M using an ODN network, the ONUs connect to access points (APs) using GE for WLAN traffic backhaul. FTTW is the trend in Wi-Fi construction.

Tuesday, May 23, 2017

Configuring IPv6 Services in the FTTB/C (No HGWs) Scenario

Application Scenarios
The FTTB/C (no HGW) networking supports the access of IPv6 HSI services. Generally, no
IPTV services will be deployed when there is no HGW.
As shown in Figure below, the ONU, which is installed in a corridor or street optical
distribution box, transmits services to users through category-5 cables (LAN access) or
twisted pairs (xDSL access). Huawei OLT MA5600T and ONU work with upper-layer devices to support
Huawei DS+NAT+PPPoE/DS+NAT+IPoE HSI IPv6 solutions.

  • For voice services: The ONU with a built-in voice module can directly provide VoI services for users. The ONU processes VoIP services using the IPv4 protocol instead of the IPv6 protocol.
  • For Internet access services: Users connect to the ONU through category-5 cables (LAN access) or the modem and twisted pairs (xDSL access). The PC and BRAS support the IPv4/IPv6 DS and can be connected in the PPPoE or IPoE mode. Huawei OLT and Huawei ONU implement Layer 2 forwarding, irrespective of whether the access service is IPv4 or IPv6. Service configurations for IPv4 and IPv6 are the same. Only the ACL, anti-IP spoofing, and DHCP option configurations for IPv4 and IPv6 are different
Data Planning
This section describes the security, device management data, QoS, Internet service data, and
voice service data planning.
Security Planning
Security planning includes system security, user security, and service security, ensuring that
user services are provided properly from different dimensions.
In the FTTB/C (no HGW) networking scenario, the data for IPv6 and IPv4 security planning
differs only in anti-IP spoofing and DHCP option.
Anti-IP spoofing: This function needs to be configured separately for IPv6 services.
The anti-IP spoofing function can be enabled or disabled at three levels. This function takes
effect only when it is enabled at all the three levels.
1. Global level: Run the security anti-ipv6spoofing enable command in global config
mode.
2. VLAN level: Run the security anti-ipv6spoofing enable command in VLAN service
profile mode.
3. Service port level: Run the security anti-ipv6spoofing service-port serviceport-id
enable command.
DHCP option: The DHCP option for IPv4 is DHCPv4 option 82 and for IPv6 is DHCPv6
option 18/37.
The DHCPv6 option18 and option37 functions can be enabled or disabled at two levels. This
function takes effect only when it is enabled at both levels.
1. Global level: Run the dhcpv6 option enable command in global config mode.
2. VLAN level: Run the dhcpv6 option enable command in VLAN service profile mode.


Monday, May 22, 2017

How to Switch the NM Server's Operation Mode from Serial Port Mode to Terminal Mode?

Issue Description
Q:
How to switch the NM server's operation mode from serial port mode to terminal mode (monitor, keyboard and mouse)?
Alarm Information
Null
Handling Process
A:
1. Under the command line terminal, run the following commands:
    #eeprom output-device=screen
    #eeprom input-device=keyboard
   Chang I/O mode;
2. Close the computer by running the init5 command.
3. Remove the serial port.
4. Restart the computer.
Root Cause
Null
Suggestions
Null

 The most popular Huawei OLT as below:

MA5683T Platinum Line


Sunday, May 21, 2017

Why is the Link Status on N2000 NMS Displayed as Normal When the Status of the GE Port of the MA5600 Device is Offline?

Issue Description
Q: 
Why is the link status on N2000 NMS displayed as normal when the status of the GE port of the MA5600 device is offline?
Alarm Information
Null
Handling Process
A:
The query result from the Ethernet port window of the NMS complies with the result displayed on the host. Operation status indicates whether the port is activated; the green icon means the port has been activated; Online status shows whether the physical connection of the port to the external device is normal or not. The display on the NMS interface is consistent with the host. The engineer in charge of the host confirms that the normal connection of the port to the external device is not necessary for the port activation.
The color setting policy for the connection lines between the MA5300 devices is applicable to the connection lines between Huawei MA5600 devices in the NMS. If the port is activated, the connection line is green; if the port is not activated, the connection line is gray. Therefore, even though the physical connection is disconnected, the connection line is still green on the NMS. Thus the problem occurs.
We have two solutions to the above-mentioned problem:
1. Make corresponding modifications on the NMS side. Thus the color for the connection between the NMS devices depends on the connection status of the host.
2. .Modifications of the host Huawei MA5600 is the same as the modification of the network card and Huawei DSLAM MA5300. The port can be activated only when the network line is correctly connected to it.
After discussion, the engineers determine that the problem can be resolved by making corresponding modifications on the NMS side. Thus the color for the connection between the NMS devices depends on the connection status of the host. The problem can be resolved by the patch V200R006B02D030SP10.
Root Cause
Null
Suggestions
Null

Telephone: 852-30623083
           Supports@Thunder-link.com            

IPv6 Configuration on Huawei OLT MA5800

IPv6 Networking

The FTTH IPv6 solution is part of the Huawei fixed broadband solution for IPv6, supporting
the access of the IPv6 high speed Internet (HSI) service and IPTV service.
The Huawei FBB solution for IPv6 includes the following scenarios based on service access
modes. Since "HSI scenario: IPv4/IPv6 DS+PPPoE+L2TP" and "HSI scenario: IPv4/IPv6 DS
+NAT+PPPoE" in this solution are the same as those in Huawei FTTx solution, they are not
elaborated in this document.


  • HSI scenario: IPv4/IPv6 DS+NAT+PPPoE
  • HSI scenario: IPv4/IPv6 DS+NAT+IPoE
  • HSI scenario: IPv4/IPv6 DS+PPPoE+L2TP
  • HSI scenario: DS-Lite+PPPoE
  • IPTV scenario: IPv4/IPv6 DS+IPoE
  • IPTV scenario: IPv4/IPv6 DS+PPPoE

The access network devices still use IPv4, instead of IPv6, to implement voice services.

Configuration Difference Between IPv6 and IPv4

The main configuration difference between the IPv6 and IPv4 services lies in the
configurations on Huawei OLT, MDU, and ONT.

Configuration Differences Between IPv6 and IPv4 on the OLT

Configurations between IPv6 and IPv4 on the OLT vary in the ACL, security feature, and
IPTV multicast service.

ACL
ACL configurations on the OLT are different for IPv6 and IPv4 on the network which runs
both IPv4 and IPv6 services, irrespective of the networking scenarios and service
implementation schemes. When configuring basic and advanced IPv6 ACLs, ensure that the
keyword "ipv6" is included in the configuration command.

Security Feature
Anti-IP spoofing configurations for IPv6 and IPv4 are different on the network which runs
both IPv4 and IPv6 services, irrespective of the networking scenarios and service
implementation schemes. If the IPoE and DHCP protocols are used, DHCP option
configurations for IPv6 and IPv4 are also different.

The IP addresses in anti-IP spoofing configurations are different for the two services.
In the IPv4 configuration, DHCP option is DHCPv4 option 82. In the IPv6
configuration, DHCP option is DHCPv6 option 18/37.
The DHCP option function is used together with the RAIO function, which enables the
Huawei MA5800 MA5600T to include physical information (including RID and CID) of the user, such as the subrack/slot/port. In this way, the BRAS or DHCP server is able to perform user
authentication and tracing. When DHCPv4 is in use, the OLT includes RID and CID to
the option 82 field. When DHCPv6 is in use, the OLT includes the RID to the option 37
field in the DHCPv6 packet and the CID to the option 18 field. The sub option 7 and sub
option 9 functions of DHCPv4 option 82 are not supported by DHCPv6.

IPTV Multicast Service

The IGMP protocol configurations (used to implement the IPTV multicast service) for IPv6
and IPv4 on the OLT are different. IPv4 uses the IGMP protocol while IPv6 uses the MLD
protocol (the IGMP protocol for IPv6). The IPv4 multicast service can share VLANs with the
IPv6 multicast service; therefore, you can deploy the IPv6 multicast service in existing IPv4
MVLANs only by adding IPv6 multicast programs in the IPv4 MVLANs and in right profiles.
The configured parameters such as the bound right profiles and MVLANs can remain
unchanged.



Wednesday, May 17, 2017

How to adding an ONU to an OLT?

Services can be configured for an ONU only after the ONU is successfully added to an OLT.
Context
When an ONU is added, desired profiles, including the dynamic bandwidth allocation
(DBA) profile, line profile, and alarm profile, must be bound to the ONU. For details
about functions and configuration methods for these profiles
Procedure

Step 1 Configure GPON ONU profiles.
1. Configure a DBA profile.
2. Configure an ONU line profile.
a. Add GPON ONU line profile 10 fttb(c).
b. In the line profile mode, bind the T-CONT to the DBA profile.
c. In the line profile mode, create a GEM port for each T-CONT.
d. Configure mapping between the GEM port and the ONU-side service.
e. After the configuration is completed, run the commit command to make the configured parameters take effect.
3. (Optional) Add an alarm profile.
– The ID of the default Huawei GPON alarm profile is 1. The thresholds for all the alarm parameters in the default alarm profile are 0, which indicates that no alarm is generated.
– In this example, the default alarm profile is used and therefore the configuration of the alarm profile is not required.

Step 2 Add an Huawei ONU to an Huawei OLT.
Assume that the ID of GPON port 0/2/1 is 1, SN is 32303131B39FD641, management mode
is SNMP, and the bound line profile is fttb(c). Connect the ONU to such a GPON port through
the optical splitter.
There are two modes to add an ONT: add an ONT offline and confirm an automatically
discovered ONU.

  • Add an ONU offline.
  • Confirm an automatically discovered ONU.

1. (Optional) Bind the alarm profile to the ONU.
By default, alarm profile 1 automatically bound to an ONU. A non-default alarm profile
is bound manually only when the default one does not meet the requirement.
In this example, default alarm profile 1 is used and therefore the configuration of the
alarm profile is not required.

Step 3 Check the ONU status.

After Huawei ONU is added, run the display ont info command to query the current status of the
ONU. Ensure that Config flag of the ONU is active, Run State is online, and Config state is

normal.
Follow-up Procedure
When Config state is failed, Run state is offline, or Match state is mismatch:
If Control flag is deactive, run the ont active command in GPON mode to activate the
ONU.
If Run state is offline, a physical line may be broken or the optical module may be
damaged. Check the line and the optical module.
lIf Config state is failed, the configured ONU capability exceeds the actual ONU
capability. In this case, run the display ont failed-configuration command in the
diagnose mode to check the failed configuration item and the failure cause. Then, rectify
the fault accordingly.
If the ONU does not match (Match state is mismatch), the port types and number of
ports do not match the actual port types and number of ports supported by the ONU. In
this case, run the display ont capability command to query the actual capability of the
ONU, and then select one of the following modes to modify the ONU configuration:
– Create a proper ONU profile according to the actual capability of the ONU, and
then run the ont modify command to modify the configuration data of the ONU.
– Modify the ONU profile according to the actual capability of the ONU and save the
modification. Then, the ONU automatically recovers the configuration successfully.


Tuesday, May 16, 2017

How to Modify the Size of Data Storage in Environmental Monitoring Database?

Q:
The data storage in the environmental monitoring database is generally defaulted as 500 thousand records. If the data is exceeded, the earliest data will be deleted. However, when managed network elements are rather many, 500 thousand records are only equivalent to the data in one to two days. When more data is needed to be saved, how to modify?
Alarm Information
Null
Handling Process
A:
1.Open the file \n2000\server\conf\main\enpowerdm\enpowerdm.cfg;
Find # to save the maximal historical data
SaveHisDataMax = 500000
Change 500000 to the data required, such as 2000000, and save the file.
What needs to be noted is that it is not recommended to use large data, which may take enormous data space.
If the saved data exceeds 10 million strips, it may result in the abnormity of environmental database.
2.Open the NM sysmonitor, find the background of environmental monitoring, and close the background of environmental monitoring.
3.Restart the background of environmental monitoring.
Root Cause
Nul
Suggestions

The environmental monitoring database mainly saves some changing data of environment parameters. Generally, the data is not required to be saved in large quantity. The environment alarm can be queried by querying the alarm database for failure history

Telephone: 852-30623083
           Supports@Thunder-link.com            

Principle of Security Data Plan on Huawei MA5800

The security plan involves system security plan, user security plan, and service security plan.
Security policy ensures service security from different aspects.

The device provides complete security measures, but not all security measures need to be deployed. Only the security measures that meet the following requirements need to be deployed:

  • The security measures can be used on the live network.
  • The security measures are easy to deploy.
  • The security measures are effective.
  • Different ONUs support different security features. Select the security feature recommended in this topic according to actual Huawei ONU/ONT capabilities.
System Security

Security Vulnerability: DoS attack
Solution: Enable the anti-DoS-attack function Huawei OLT and MDU.
Description and Usage Suggestion:After the anti-DoS-attack function is enabled, control packets are
monitored and those exceeding the number threshold are discarded. Use this solution for new site deployment.

Security Vulnerability: IP attack
Solution: Enable the anti-IP-attack function Huawei OLT and MDU.
After the anti-IP-attack function is enabled, a device discards the IP packets received from the user side whose destination IP address is the IP address of the device, and therefore the system is protected. Use this solution for new site deployment.

User Security
MAC spoofing
Enable the anti-MAC duplicate function for Huawei MA5800 and MDU.
After anti-MAC-duplicate is enabled, the system records the first MAC address learnt from the port
and binds the MAC address to the port and VLAN. If receiving packets sent from the host that has the same MAC address with the port, the system discards the packets directly. In this case, it can prevent users from forging MAC addresses to perform malicious attacks. Use this solution for new site deployment.

MAC attack
Enable the anti-MAC spoofing function Huawei OLT and MDU.
After anti-MAC spoofing is enabled, the system can prevent users from forging IP addresses to perform malicious attacks. Use this solution for new site deployment.

IP spoofing
Enable the anti-IP spoofing function for MDU.
After anti-IP spoofing is enabled, the system can prevent users from forging IP addresses to perform
malicious attacks. Use this solution for new site deployment.


Sunday, May 14, 2017

Basic Principles and Planning NE IDs of Planning the DCN

When constructing the DCN, select proper communication protocols according to the actual
networking situation, and follow the planning principles.
The principles for planning the DCN are as follows:

  • When Huawei OptiX OSN 2500 constructs a network with other Huawei equipment, the HWECC or IP over DCC protocol is recommended. Use the same communication protocol in the entire DCN network.
  • When the OptiX OSN 2500 constructs a hybrid network with equipment from other vendors, use the IP over DCC or OSI over DCC protocol according to the protocol supported by the equipment from other vendors.
  • The OptiX OSN 2500 constructs a hybrid network with equipment from other vendors. In this case, if the equipment from other vendors do not support the IP over DCC or OSI over DCC, use the DCC bytes or the Ethernet service channels to transparently transmit the management information.
  • When a communication protocol is used to construct the DCN network, properly set the DCN network scale and divide the network according to the network situation. Thus, the effect of large network scale on the DCN network can be reduced.
  • The DCN network should be of the ring type to ensure the reliability of the network communication. Thus, route protection can be provided when fiber cuts or NE abnormalities occur. If fibers of the equipment cannot form a ring, extra DCN channels should be constructed to form a ring, and thus the route protection function can be realized.
NE IDs are used to identify Huawei transmission equipment. Thus, the NE IDs should be
configured when the DCN network uses the HWECC, IP over DCC, and OSI over DCC
protocols.

The principles for planning the NE IDs are as follows:
  • The ID of each NE should be unique.
  • In the same DCN network, the ID of each NE should be unique.
  • An NE ID is 24 bits in binary, which can be divided into the former eight bits and the latter 16 bits.
– The former eight bits indicate the extended ID (the default value is 9), also called the subnet number, which identifies different subnets. The subnet number cannot be 0 or 0xFF (255 in decimal).
    – The latter 16 bits indicate the basic ID. The value of the basic ID cannot be 0 or 0xBFF0(49136 in decimal), or be greater than 0xBFF0.

    In the ring network, the NE IDs should be increased one by one in the same direction along
    the ring network.

    A complex network should be divided into rings and chains. First set IDs for NEs on the
    ring from 1 to N, and then set the IDs for NEs on the chain as N+1, N+2,…




    Thursday, May 11, 2017

    How to Modify the Size of Data Storage in Environmental Monitoring Database?

    Issue Description
    Q:
    The data storage in the environmental monitoring database is generally defaulted as 500 thousand records. If the data is exceeded, the earliest data will be deleted. However, when managed network elements are rather many, 500 thousand records are only equivalent to the data in one to two days. When more data is needed to be saved, how to modify?
    Alarm Information
    Null
    Handling Process
    A:
    1.Open the file \n2000\server\conf\main\enpowerdm\enpowerdm.cfg;
    Find # to save the maximal historical data
    SaveHisDataMax = 500000
    Change 500000 to the data required, such as 2000000, and save the file.
    What needs to be noted is that it is not recommended to use large data, which may take enormous data space.
    If the saved data exceeds 10 million strips, it may result in the abnormity of environmental database.
    2.Open the NM sysmonitor, find the background of environmental monitoring, and close the background of environmental monitoring.
    3.Restart the background of environmental monitoring.
    Root Cause
    Nul
    Suggestions

    The environmental monitoring database mainly saves some changing data of environment parameters. Generally, the data is not required to be saved in large quantity. The environment alarm can be queried by querying the alarm database for failure history.

    Telephone: 852-30623083
               Supports@Thunder-link.com            

    Wednesday, May 10, 2017

    QoS Planning Principles

    QoS plan for FTTB is in E2E mode, and it can be divided into following policies: traffic
    classification, marking, scheduling, traffic monitoring, and DBA policies.

    Traffic Monitoring and DBA Policies

    T-CONT (used only in GPON networks):Use different T-CONTs for different services.
    DBA type: Select a DBA type based on service types. For example, select Type1 for
    the management and voice services, and Type3 or Type4 for the Internet access and IPTV services.
    DBA bandwidth planning: Configure the DBA bandwidth according to the user's bandwidth
    package. The assured bandwidth is the maximum bandwidth required by management packets, VoIP, and IPTV upstream packets. The maximum bandwidth is greater than or equal to the maximum bandwidth that users apply.
    Rate limit on ONU uplink port: Set ONU port rate limit or Huawei xDSL line rate limit as required.
    Rate limit on ONU downlink port: Set ONU port rate limit or xDSL line rate limit as required.

    VoIP service: The upstream bandwidth and the downstream bandwidth of VoIP service are
    symmetrical. The actual bandwidth varies with the coding format. This bandwidth is calculated for two POTS ports.

    IPTV service (common program): IPTV service mainly occupies the downstream bandwidth. The actual bandwidth depends on the coding format, the picture in picture information, 10% bandwidth burst traffic, and the number of programs that can be concurrently watched by one user (in the case of multi STBs access). The upstream bandwidth is mainly used for transmitting IGMP packets, which
    requires little bandwidth and can be neglected.

    Rate limit on the BRAS or SR is recommended. Huawei OLT and ONU do not limit rates on
    service flows. If the BRAS does not support rate limit, OLTs can limit rates on service
    flows using traffic profiles.

    l The sum of assured bandwidth of all ONTs under a PON port and the fixed bandwidth of
    OMCI management channel must be smaller than Huawei GPON upstream bandwidth. Some
    bandwidth must be reserved for future service expansion.


    Tuesday, May 9, 2017

    Configuring FTTH Service (P2P Access)

    Users connected to the OLT through an ONT, and are therefore provided with the Internet,
    VoIP, and IPTV service through a same port.

    Service Requirements

    • ONT_1 and ONT_2 are provided with the triple play service through Huawei FTTH.
    • The Internet access service is provided in the PPPoE access mode.
    • The IPTV user connected to ONT_1 can watch all the programs, and the IPTV user connected to ONT_2 can watch only program BTV-1.
    • The VoIP service and the IPTV service are provided in the DHCP mode and obtain IP, addresses from the DHCP server in the DHCP option-60 mode.
    • After receiving different traffic streams, the OLT provides different QoS guarantees to the traffic streams according to the priorities of the traffic streams.
    • Traffic streams are differentiated on the OLT by the user-side VLAN (C-VLAN).

    Example network of the optical fiber access service in the single-port for multiple
    services mode
    Prerequisite
    • Huawei OLT is connected to the upper-layer devices such as the BRAS, multicast server, SoftX3000, and DHCP server.
    • The VLAN of the LAN switch port connected to the OLT is the same as the upstream VLAN of the OLT.
    Procedure
    Configure the Internet access service on the OLT.
    a. Create a VLAN and add an upstream port to the VLAN.
    The VLAN ID is 100, and the VLAN is a smart VLAN. The upstream port is 0/9/0.
    b. Configure a traffic profile.
    Because the VoIP, IPTV, and Internet access services are provided through the same
    port, you must set the 802.1p priority of each service. Generally, the priorities are in a descending order for the VoIP service, IPTV service, and Internet access service.
    In this example, set the traffic profile index to 7 and the priority of the Internet access service to 1.
    c. Configure a service port.
    Add a service port to the VLAN and use traffic profile 7. The user-side VLAN ID is 2.
    d. Configure queue scheduling.
    Use the 3PQ+5WRR queue scheduling. Queues 0-4 adopt the WRR mode, with the
    weights of 10, 10, 20, 20, and 40 respectively; queues 5-7 adopt the PQ mode.
    Configure the mapping between queues and 802.1p priorities. Priorities 0-7 map
    queues 0-7 respectively.
    e. Save the data.
    Configure the VoIP service on Huawei MA5600T.
    a. Create a VLAN and add an upstream port to the VLAN.
    The VLAN ID is 200, and the VLAN is a smart VLAN. The upstream port is0/9/0.
    b. Configure a traffic profile.
    The traffic profile index is 8, and the 802.1p priority of the VoIP service is 5.
    c. Configure a service port.
    Add a service port to the VLAN and use traffic profile 8. The user-side VLAN ID is 3.
    d. Configure the DHCP relay.
    The VoIP service and the IPTV service are provided in the DHCP mode. The DHCP
    option 60 domain is used to differentiate service types.
    The DHCP domain of the VoIP service is voice.
    The IP addresses of VoIP DHCP server group 1 are 20.1.1.2 and 20.1.1.3.
    The IP address of the Layer 3 interface of VLAN 200 is 10.1.1.1/24.
    The gateway IP address of the DHCP domain is 10.1.1.1/24.
    e. Save the data.
    Configure the IPTV service on the OLT.
    a. Create a VLAN and add an upstream port to the VLAN.
    The VLAN ID is 1000, and the VLAN is a smart VLAN. The upstream port is0/9/0.
    b. Configure a traffic profile.
    The traffic profile index is 9, and the 802.1p priority of the IPTV service is 4.
    c. Configure a service port.
    Add a service port to the VLAN and use traffic profile 9. The user-side VLAN ID is d. Configure the DHCP relay.
    The VoIP service and the IPTV service are provided in the DHCP mode. The DHCP
    option 60 domain is used to differentiate service types.
    The DHCP domain of the IPTV service is video.
    The IP addresses of IPTV DHCP server group 2 are 20.2.2.2 and 20.2.2.3.
    The IP address of the Layer 3 interface of VLAN 1000 is 10.2.2.1/24.
    The gateway IP address of the DHCP domain is 10.2.2.1/24.4.
    e. Create a multicast VLAN and select the IGMP mode.
    Select the IGMP proxy mode.
    f. Set the IGMP version.
    Set the IGMP version of the multicast VLAN to IGMP v3.
    g. Configure the program library.
    Configure the program names to BTV-1 and BTV-2, multicast IP addresses of the
    programs to 224.1.1.10 and 224.1.1.20, source IP address of the programs to
    10.10.10.10, and priority to 4.
    h. Configure the right profile.
    Configure the profile name to profile0, with the right of watching program BTV-1.
    i. Configure the multicast users.
    Add service ports 200 and 300 as multicast users.
    j. Save the data.

    How to Set the Memory Size of the SQL Server to Improve the Server Performance?

    Issue Description
    Q:
    How to set the memory size of the SQL database to improve the server performance?
    Alarm Information
    Null
    Handling Process
    A:
    1. Choose Procedure>Microsoft SQL Server>Enterprise Manager in the Start menu.
    2. The SQL Server Enterprise Manager window is displayed.
    3. Select current computer under SQL Server Group, right-click and select Property, and the SQL Server Property dialog box is displayed. Click Memory, click Use Fixed Memory Size (MB), drag the glide bar and select certain memory size. The advised values are shown in the following table (instruction part). Click OK to complete the configuration of memory use. After the configuration is complete, it is required to restart the database server to make the modification effective.
    Memory Size of Current Computer (MB)   Fixed Memory Size Allocated to Database (MB)
    256                                     40
    512                                     80
    1024                                 160
    ...............
    The rest is on the analogy of this.
    Root Cause
    Null
    Suggestions

    This method is applicable to the NM server with poor hardware performance. If the server has good performance, no modification is necessary.
    Telephone: 852-30623083
               Supports@Thunder-link.com