Professional Documents
Culture Documents
NEC Confidential
197
Each device using STP/RSTP send BPDU frames, and root bridge, root port, designated port,
backup port and alternate port are decided by BPDU frame.
Widely used in the enterprise network
Protection Switching Time; STP < 60sec / RSTP < 2~3 sec
Topology is no limitation (Ring, Tree, etc)
Blocking
Failure
Forwarding
Forwarding
Blocking
Forwarding
Forwarding
Forwarding
Forwarding
Forwarding
Root Bridge
Root Bridge
Forwarding
Forwarding
Blocking
Forwarding
MSTI 2
VLAN: 201 - 300
Forwarding
Blocking
For MSTI1
Double
capacity
Blocking
For MSTI2
Root Bridge
MSTI 1
VLAN: 101 - 200
198
Bridge Priority
2bytes
6bytes
Cost
10Gbps
1Gbps
100Mbps
19
10MBps
100
Root Bridge
100Base-Tx
1000Base-T
0+4=4
4+19 =23
0+19 =19
100Base-Tx
10Base-T
19+100 =119
199
Bridge: A
Bridge: B
Bridge ID 32768
Bridge ID 32768
Forwarding
Port 1
Forwarding RP
DP
Port 2
Port 1 as
DP
DP
Root port
Was Blocked
Now forwarding
Forwarding
Port 1 as
BPDU
Root port
Forwarding
RP
Port 2
3. Learning
4. Forwarding
5. Disabled
Bridge: C
Bridge ID 32768
MAC Address 00-00-00-00-00-02
NEC Confidential
200
RSTP
STABLE
TOPOLOGY
PORT ROLES
ROOT (FORWARDING)
DESIGNATED (FORWARDING)
NON-DESIGNATED (BLOCKING)
ROOT (FORWARDING)
DESIGNATED (FORWARDING)
ALTERNATE (DISCARDING)
BACKUP ( DISCARDING)
PORT STATES
TOPOLOGY
CHANGES
TRANSITION
TOPOLOGY
CHANGE
CHANGE ROOT
NEC Confidential
201
MSTP Setting
M1
iPaso200-D
M1
P1
Revision:0
M2
M2
M1
M2
iPaso400-F
P1
iPaso400-B
P2
P1
IDU No.
Bridge Priority (MSTI1)
Bridge Priority (MSTI2)
Instance No. (MSTI1)
Instance No. (MSTI2)
1
4096
20480
1
2
2
8192
12288
1
2
3
8192
20480
1
2
MSTI2
MODEM 1
MODEM 2
IDU 1
IDU 2
IDU 3
After Failure condition mark the status of each modem Forwarding or Discarding
MSTI1
MODEM1
MODEM 2
MSTI2
MODEM 1
MODEM 2
IDU 1
IDU 2
IDU 3
NEC Confidential
202
MSTP Setting
NEC Confidential
203
MSTP Setting
Click the Modify STP Port icon on the RSTP/MSTP Setting display. And set
the parameters for MSTP. Select each tab IST, MSTPI1 to MSTI4 as
required and set the parameters.
NEC Confidential
204
MSTP Setting
Enter the Region Name (32 Characters). This should be same on all
members of the MSTP Region.
Enter the Revision Number (0 - 65535). Of the configuration. All
members of the MSTP region must have the same Revision No.
The MSTP revision level is the revision number of the configuration. All
switches in an MSTP region must have the same revision level configured
BPDU Guard Timer Usage: to use this function, select the Used radio
Button. This function prevent external BPDUs from changing the
topology.
If BPDU Guard Timer usage is selected as Use, then enter the Timer
value in seconds ( 10 1000000). When unwanted BPDU is detected
in the port, it will block the port for the timer period preventing the
BPDU to pass.
M1
iPaso200-D
M1
If BPDU Guard Timer usage is selected as Use, then enter the Timer
value in seconds ( 10 1000000). When unwanted BPDU is detected
in the port, it will block the port for the timer period preventing the
BPDU to pass.
Revision:0
M2
M2
M1
M2
iPaso400-F
P1
iPaso400-B
P2
P1
NEC Confidential
205
CIST Setting
Every Region has a Common Internal Spanning Tree (CIST) that forms a single
spanning tree instance including all the members in the region. CIST operates
across the MSTP region and create a loop free topology across regions. In
each region several MSTP Instances (up to 4) can be created with each
instance catering for a group of VLANs. MSTP instance operates within the
Region.
Select the tab IST to configure the CIST. Enable the ports that is makes the STP. If
any port is an Edge port select Enable from the drop down list.
For each of the ports selected:
STP Port Path Cost: select Auto for automatically detect the path Cost or select
Manual and enter the Path cost value
STP Port Priority: select port priority value from the drop down list (default is 128)
BPDU Guard: select from the drop down list enable to enable BPDU Guard function
for the Port.
Root Guard: select from the drop down list enable to enable Root Guard function for
the Port.
Click the Member VLAN and select the VLANs for each instance (IST, MSTI# ).
NEC Confidential
206
MSTI Setting
Configure the MSTP instances in the selected region
by clicking on the MSTI# tabs.
Select Enable radio button on the selected MSTI#.
MSTI Regional Root Bridge Priority /ID will be
automatically selected on the MAC address, Bridge
Priority
Enter the Instance number for the selected MSTP
Instance.
Select the Bridge Priority (MSTI) from the drop down
list. This selection can force the Bridge ID to be
higher or lower to select as root Bridge for the
selected instance.
Click on the Member VLAN and select the VLANs for
the selected MSTI from the VLAN List and the radio
buttons.
Select the port associated with MSTP in the region
from the check boxes.
Select the STP Port Path Cost and STP Port Priority
from the respective drop down lists.
NEC Confidential
207
MSTP Setting
NEC Confidential
208
Item
Parameter
Description
0 to 61440
6 to 40 s
1s
2s
4 to 30 s
1 to 10
1 to 40
See below
The MSTP maximum hop count value is the maximum number of hops in the region. The MSTI root bridge sends BPDUs with the hop
count set to the maximum value. When a bridge receives this BPDU, it decrements the remaining hop count by one and propagates this
hop count in the BPDUs it sends. When a bridge receives a BPDU with a hop count of zero, the bridge discards the BPDU
NEC Confidential
209
NEC Confidential
210
Client #1
Signal
Traffic
separation
with VLAN
Tag
ETH-CC
RPL
(Ring Protection Link)
Client #2
Signal
RPL
(Ring Protection Link)
NEC Confidential
211
Unblock
blocking Port
Blocking
Port
Client Traffic
1) Normal Condition
NEC Confidential
Submission of
FDB Flush,
Unblock blocking Port
2) Failure Event
3) Switchover Condition
212
Failure monitoring
G.8032 utilizes the following monitoring functions to detect link / node failures certainly.
Physical layer: Link down detected by Ethernet PHY (Optical/Electrical), etc.
Link layer: ETH-CC defined on Y.1731/802.1ag between adjacent ring nodes.
Messaging interval: 3.33msec at minimum
MEP-2
MEP-1
MEP-3
cc
MEP-4
MEP-1
MEP-8
cc
MEP-7
MEP-3
MEP-5
MEP-6
1) Normal Condition
cc
Client Traffic
MEP-4
Submission of
FDB Flush,
Unblock blocking Port
LOC
MEP-8
cc
MEP-5
MEP-7
LOC
MEP-6
cc
cc
2) Failure Event
cc
LOC
cc
cc
3) Switchover Condition
LOC
213
Multiple instance
Several logical rings can be configured in the physical ring
(G.8032V2)
Each logical ring can have a group of user VLANs (instances)
and can place a block port at a different point respectively
Load balancing can be achieved in normal condition, and the
higher priority traffic can be protected even in case of failure
Instance#2
(Middle & Low priority)
block port for
instance#2
High priority
Middle priority
Low priority
Double
capacity
Instance#1
(High priority)
Instance#2
(Middle & Low priority)
Failure
Instance#1
Unblocked for (High priority)
instance#1
Drop
NEC Confidential
Low priority
traffic is
dropped based
on QoS
214
NEC Confidential
Physical
Instance #1
Instance #2
Instance #3
215
Node-A
Node-B
Node-C
Node-D
Node-E
Node-G
RPL Owner
Node-F
1
NORMAL
STATE
failure
2
3
4
PROTECTION
STATE
Flush
5
6
7
SF
SF
SF
Flush
Flush
SF
SF
SF
Flush
Flush
SF
Flush
Flush
50 ms
SF
SF
SF
SF
Message source
Client ch block
R-APS ch block
216
Scenario B recovery
Node-A
Node-B
Node-C
Node-D
Node-E
Node-F
Node-G
RPL Owner
failure
SF
SF
SF
11
SF
SF
NR
NR
NR
recovery
NR
NR
Confirmation time
PROTECTION
STATE
9
10 NR
SF
12
13
NORMAL
STATE
NR,
RPL Blocked
Flush
Flush
NR,
RPL Blocked
Flush
Flush
Flush
15
NR,
RPL Blocked
Flush
Flush
NR,
RPL Blocked
50 ms
14
NR,
RPL Blocked
NR,
NR Blocked
RPL
14. When the Guard timer at Node C and D expire they may start receiving
new R-APS messages
15. At the expiration of WTR timer, RPL owner blocks its end of of the
RPL link, sends NR RB message
16. Each node after re3ceivng the NR RB message flushes its FDB.
17. When Node c and D receive the NR RB message, they remove the
block on their blocked ports
18 . Stable normal condition all nodes go to Idle state
217
Signal Degrade (SD): local signal degrade (local SD) will be submitted to protection trigger
module once a signal degrade is detected
External commands
Manual switch (MS): Maintenance command for temporarily switching normal traffic to
working transport entity or protection transport entity, unless a higher priority switch request
(i.e., FS, or SF) is in effect.
Forced switch (FS): Maintenance command for temporarily switching normal traffic from
working transport entity to protection transport entity, unless a higher priority switch request is
in effect.
Clear: This maintenance command clears all of the externally initiated switch
commands listed above clearing the Maintenance command.
NEC Confidential
218
219
NEC Confidential
220
Sub Ring
Flexible placement of RPL
The shortest path per user traffic can be selected in normal
condition.
Sub-Ring and Sub-Ring (inter connected node) is available only in iPasolink 1000
NEC Confidential
221
NEC Confidential
222
ERP
iPASO 200D
iPASO 400F
iPASO 200E
Item
PORT1
M1
M1
M2
M1
ETH Port1
NEC /(7)/3.3ms
NEC /(7)/3.3ms
NEC /(7)/3.3ms
NEC /(7)/3.3ms
NEC /(7)/3.3ms
NEC /(7)/3.3ms
12
10
11
11
10
12
1 / Ring-1
2 / Ring-2
1 / Ring-1
2 / Ring-2
1 / Ring-1
2 / Ring-2
ERP Ver
8032v2
8032v2
8032v2
8032v2
8032v2
8032v2
Ring Port-0
P1
P1
M1
M1
P1
P1
Ring Port-1
M1
M1
M2
M2
M1
M1
Enable / 0
Enable / 1
Revertive/WTR
Revertive/1
Revertive/1
Guard Time
500msec
500msec
500msec
500msec
500msec
500msec
Control VLAN
1001
1002
1001
1002
1001
1002
MEG Lev
Traffic VLAN
100/300
200/400
100/300
200/400
100/300
200/400
:01
:02
:01
:02
:01
:02
LOC Det
enable
enable
enable
enable
enable
enable
Ring Port-0
Ring Port-1
M1
M2
100/200/300/400
400-F
100/200/300/400
P1
200-D
RING2 RPL
100/200/300/400
200-E
M1
M1
Tester
100/200/300/400
P1
NEC Confidential
P1
P2
RING1 RPL
223
ERP
iPASO 200A
iPASO 1000C
iPASO 400B
Item
PORT1
M1
M1
M2
M1
ETH Port1
NEC /(7)/3.3ms
NEC /(7)/3.3ms
NEC /(7)/3.3ms
NEC /(7)/3.3ms
NEC /(7)/3.3ms
NEC /(7)/3.3ms
12
10
11
11
10
12
1 / Ring-1
2 / Ring-2
1 / Ring-1
2 / Ring-2
1 / Ring-1
2 / Ring-2
ERP Ver
8032v2
8032v2
8032v2
8032v2
8032v2
8032v2
Ring Port-0
P1
P1
M1
M1
P1
P1
Ring Port-1
M1
M1
M2
M2
M1
M1
Enable / 0
Enable / 1
Revertive /WTR
Revertive/1
Revertive/1
Guard Time
500msec
500msec
500msec
500msec
500msec
500msec
Control VLAN
1001
1002
1001
1002
1001
1002
MEG Lev
Traffic VLAN
100/300
200/400
100/300
200/400
100/300
200/400
:01
:02
:01
:02
:01
:02
LOC Det
enable
enable
enable
enable
enable
enable
Ring Port-0
Ring Port-1
1000-C
M1
100/200/300/400
M2
100/200/300/400
P1
200-A
RING2 RPL
400-B
100/200/300/400
M1
Tester
M1
100/200/300/400
P1
P2
100/200/300/400
P1
NEC Confidential
RING1 RPL
224
MEP6
NE3
MEP5
MEP12
NE3
MEP11
MEP1
NE1
Blocking
Port
MEP4
NE2
MEP7
NE1
MEP10
NE2
MEP2
MEP3
MEP8
MEP9
NEC Confidential
OAM(Ring1)VLAN 15
Traffic(Ring1)
Traffic(Ring2)
225
NEC Confidential
226
opens.
Select the Ring ID from the drop down list (01 to 16)
Enter the Ring Name (up to 32 characters)
Select the ERP Version radio button G.8032v1 or G.8032v2 as appropriate
Select the Ring Port 0 item (Interface /Modem) and the port from the drop down List
Select the Ring Port 1 item (Interface /Modem) and the port from the drop down List
Port name of the assigned port will appear if a name is given to the port.
In RPL Owner Setting select Enable radio button if one of the selected Rings port is
for the ring. Port0 or Port 1 by selecting the appropriate radio button
Select protection switching is to be Revertive or Non-Revertive. Click the appropriate
radio button
If Revertive is selected in the previous item, select the Wait-To-Restore (WTR) timer
NEC Confidential
227
used for different instances of the same physical ring. MAC address should be
different fro multiple physical rings. Change the last two digits of the MAC address
for each ring
Select the R-APS Message Priority (0 tom7 0 from the drop down List
Select the R-APS Message MEG Level from the drop down List
Enable the Traffic VLAN IDs from the VLAN list by selecting the appropriate Check
boxes. If the required VLAN ID is not in the list click on the Add VLAN ID button and
enter the VLAN ID and the VLAN Service Name, VLAN ID will appear in the list, enable
the check box to select it. The VLANs grayed out in the list are already assigned to a
different ring and cannot be selected
Click the Next button to go to Step3 ERP LOC Detection MEP Index Setting window.
NEC Confidential
228
Confirmation Screen
NEC Confidential
229
NEC Confidential
230
NEC Confidential
231
ERP Control-1
Select Maintenance Mode First
Loop Detection Restart reset the receive counter of own RAPS control frame.
No traffic loss occurs when Loop Detection Restart.
232
ERP Control-2
Maintenance Control-Protection Control ERP Control screen
provides manual switching of the Ethernet Rings.
Click the Ring ID number of the ring to be manually switched. ERP
Control (RING ID#) window opens for the selected ring.
Select the Manual control to applied from the drop down List..
Available Options are:
Forced SW:
Manual SW:
Clear: Clear the Maintenance Control
Select the Blocked Port to be switched to forwarding, Ring Port 0 or
Ring Port 1,
Click the OK button to apply the maintenance control
Maintenance control is applied is indicated by the yellow highlighting
of the controlled Ring ID number.
Ring Port status# indicate switching status.
NEC Confidential
233
Radio Aggregation
NEC Confidential
234
l L3 based
Source IP Address
Destination IP Address
VLAN ID
Ether Type
NEC Confidential
l MPLS based
MPLS label
235
Aggregation
Group1
Aggregation
Group1
GRP1
MODEM#2
Port-1
L2SW
MODEM#3
Port-n
MODEM#4
Aggregation
Group1
MODEM#1
MODEM#2
Aggregation
Group1
GRP1
MODEM#3
Port-1
L2SW
MODEM#4
Port-n
236
Aggregation
Group1
Aggregation
Group1
GRP1
MODEM#3
GRP2
Aggregation
Group2
NEC Confidential
MODEM#2
MODEM#4
Port-1
L2SW
Port-n
Aggregation
Group2
237
Byte5
Byte5
VLAN ID
Ether Type
Byte4
Byte3
Byte2
Byte1
15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
Byte1
15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
Byte1
7 6 5 4 3 2 1 0
Bits
LAG
Byte1
10
Byte2
16
17
18
Byte3
25
Byte1
Byte1
Byte2
24
Byte2
47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
Byte2
Port ID
Byte3
47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
Byte6
Destination MAC Address
Byte4
26
Byte4
Exclusive OR
Results
Source
MAC
Address
Two
modems
Three
modems
Four
modems
Output Modem #
0
(000)
(001)
32
33
34
Byte5
40
41
42
Byte6
(010)
(011)
(100)
(101)
(110)
(111)
Byte1
10
Byte2
16
17
18
Byte3
24
25
26
Byte4
32
33
34
Byte5
40
41
42
Byte6
Byte1
10
Byte2
Byte1
10
Byte2
NEC Confidential
Byte1
Destination
MAC
Address
VLAN ID
Ether Type
Port No.
Exclusive OR results
MODEM#1
MODEM#2
Port1
MODEM#3
MODEM#4
IPv4
Byte5
Byte4
Byte3
Byte2
Byte1
47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
Byte12
Byte11
Byte10
Byte9
Byte8
Byte7
95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47
Byte16
Byte15
Byte14
Byte13
127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99
Byte6
Byte5
Byte4
Byte3
IPv4
Byte2
98
97
96
Byte1
47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
Destination IP Address
Byte12
Byte11
Byte10
Byte9
Byte8
Byte7
95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47
Byte16
Byte15
Byte14
Byte13
127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99
Byte2
Source TCP Port No.
Byte1
Byte2
15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
Byte1
10
Byte2
16
17
18
Byte3
24
25
26
Byte4
Byte1
10
Byte2
16
17
18
Byte3
24
97
Byte1
15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
Bits
0
98
LAG
Source IP
Address
MODEM#1
Two
modems
Three
modems
Four
modems
MODEM#2
Output Modem #
Destination IP
Address
(000)
(001)
25
26
Byte4
(010)
Byte1
(011)
10
Byte2
(100)
Byte1
(101)
10
Byte2
(110)
(111)
Exclusive OR Results
Port1
MODEM#3
MODEM#4
239
96
00000000
000
Byte1
01
00000001
001
Byte2
02
00000010
010
Byte3
03
00000011
011
Byte4
04
00000100
100
Byte5
05
00000101
101
Byte6
00
00000000
000
Byte1
05
00000101
101
Byte2
06
00000110
110
Byte3
07
00000111
111
Byte4
08
00001000
000
Byte5
09
00001001
001
Byte6
64H
01100100
100
Byte1
Source MAC
Address
Destination
MAC Address
00000000
000
Byte1
00001000
000
Byte2
00000001
001
Byte1
001
VLAN ID
Byte2
0800H
LAG
MODEM#1
MODEM#2
Ether Type
ethertype= 800(hex)
Port1
Port No.
MODEM#3
Exclusive OR results
MODEM#4
Two
modems
Three
modems
Four
modems
Output Modem #
0
(000)
(001)
(010)
(011)
(100)
(101)
(110)
(111)
NEC Confidential
(1)
Source MAC Address XOR Result = (000) XOR (001) XOR (010) XOR (011) XOR
(100) XOR (101) = 001(bin)
(2)
Destination MAC Address XOR Result = (000) XOR (101) XOR (110) XOR (111)
XOR (000) XOR (001) = 101(bin)
(3)
(4)
(5)
240
11000000
000
Byte1
168
10101000
000
Byte2
00000000
000
Byte3
100
01100100
100
Byte4
192
11000000
000
Byte1
168
10101000
000
Byte2
00000001
001
Byte3
200
11001000
000
Byte4
80
00000000
000
Byte1
00001000
000
Byte2
00000000
000
Byte1
00001000
000
Byte2
80
101
Source IP
Address
Destinati
on IP
Address
TCP
Source
Port
LAG
TCP
Destinati
on port
MODEM#1
Exclusive OR Results
MODEM#2
Two
modems
Three
modems
Four
modems
Port1
MODEM#3
Output Modem #
0
(000)
IP SA= 192.168.0.100
(001)
(010)
IP DA= 192.168.1.200
(011)
TCP SRC= 80
(100)
(101)
TCP DST= 80
(110)
(111)
NEC Confidential
MODEM#4
(1)
Source IP Address XOR Result = (000) XOR (000) XOR (000) XOR (100) = 100(bin)
(2)
Destination IP Address XOR Result = (000) XOR (000) XOR (001) XOR (000) = 001(bin)
(3)
(4)
241
Corresponding Label
127:112
111:96
95:0
All 0
LAG
Port ID
0
1
2
3
MODEM#1
0
1
2
3
Port ID 0
MODEM#2
Port ID 1
Port1
MODEM#3
Port ID 2
Label
Decimal
Remainder
2 Modems
3Modems
F59c
9c
156
B6db
Db
219
Ca3b
3b
59
897c
7c
124
3520
20
32
d667
67
103
NEC Confidential
242
MODEM#1
Port1
Port1
MODEM#2
MODEM#2
56MHz, 258QAM
Stream-1
Ethernet
Stream-2
Tester
Stream
No.
VLAN ID
ethertype
Stream-1
00:00:00:01:00:02
00:00:00:02:00:01
10 (hex:0A)
0800
Stream-2
00:00:00:01:00:02
00:00:00:01:00:01
10 (hex:0A)
0800
Stream-1:
Distribution Result = (011) XOR (011) XOR (010) XOR (000) XOR (001) = 011(bin) 3(dec)
Stream-2:
Distribution Result = (011) XOR (000) XOR (010) XOR (000) XOR (001) = 000(bin) 0(dec)
NEC Confidential
Distribution
Result
Output
port
0 (000)
MODEM#1
1 (001)
MODEM#2
2 (010)
MODEM#1
3 (011)
MODEM#2
4 (100)
MODEM#1
5 (101)
MODEM#2
6 (110)
MODEM#1
7 (111)
MODEM#2
243
MODEM#1
Port1
Port1
MODEM#2
MODEM#2
56MHz, 256QAM
Stream-1
Ethernet
Stream-2
Tester
Stream
No.
Dst
MAC
Src MAC
VLAN ID
Dst IP
Address
Src IP
Address
Src TCP
port
Stream-1
Any
Any
Any
192.168.1.1
192.168.1.11
80
80
Stream-2
Any
Any
Any
192.168.1.1
192.168.1.12
80
80
Stream-1:
Distribution Result = (010) XOR (000) XOR (000) XOR (000) = 010(bin) 2(dec)
Stream-2:
Distribution Result = (101) XOR (000) XOR (000) XOR (000) = 101(bin) 5(dec)
NEC Confidential
Distribution
Result
Output
port
0 (000)
MODEM#1
1 (001)
MODEM#2
2 (010)
MODEM#1
3 (011)
MODEM#2
4 (100)
MODEM#1
5 (101)
MODEM#2
6 (110)
MODEM#1
7 (111)
MODEM#2
244
MODEM#1
Port1
Port1
MODEM#2
MODEM#2
28MHz, 256QAM
Stream-1
Ethernet
Stream-2
Stream No.
Tester
Dst MAC
Src MAC
EXP
Stream-1
Any
Any
Any
Distribute
Stream-2
Any
Any
Any
Distribute
NEC Confidential
245
Notes (1/2)
(example)
Stream
No.
VLAN ID
ethertype
XOR result
Stream-1
00:00:00:01:00:02
00:00:00:02:00:01
10
(hex:0A)
0800
3(dec)
Stream-2
00:00:00:01:00:02
00:00:00:02:00:11
10
(hex:0A)
0800
3(dec)
(example)
NEC Confidential
Stream
No.
VLAN ID
ethertype
XOR result
Stream-1
00:00:00:01:00:02
00:00:00:02:00:01
10
(hex:0A)
0800
3(dec)
Stream-2
00:00:00:01:00:02
00:00:00:01:00:02
10
(hex:0A)
0800
3(dec)
246
14MHz/128QAM
RTA
300Mbps
NEC Confidential
Distribute rate
1:2
200Mbps
Link#2
28MHz/128QAM
56MHz/512QAM
515Mbps
100Mbps
Link#1
RTA
XPIC
Link#1
V
H
1Gbps
515Mbps
247
MAC: c MAC: b
Link#1
MAC: a
VLAN: a
Flexible efficient
Fragmentation
Link#2
7
PRTA operation
Capacity
Capacity
MODEM
A B
RTA
Modem
Modem
MODEM
Modem
Capacity B
A+B
RTA
MCA4
MCA4
MODEM
RTA
Capacity A
MODEM
Modem
RTA
249
MODEM
PRTA
Modem
MODEM
PRTA
Modem
Capacity B
Modem
MODEM
MODEM
Modem
Modem
PRTA
Modem
Capacity D
PRTA
MODEM
Capacity
C+D
MODEM
PRTA
MODEM
Modem
Capacity C
Capacity
A+B
PRTA
MCA4(L2 SW)
MCA4L2 SW)
PRTA
Capacity A
Capacity
C+D
MODEM
Modem
PRTA
250
iPASOLINK 400
Modem Slot1
Modem Slot2
Modem slot3
Modem slot4
Not used
Not used
Group1
Group1
Not used
Group1
Group1
NEC Confidential
Group2
251
Ethernet Tester
P1
iPaso200-E
Mod1
Mod2
P1
iPaso400-F
Mod1
Mod2
P1
STM-1
iPaso400-B
MSE
Mod1
16E1
Mod2
P1
STM-1
MSE
16E1
E1
Ethernet Tester
NEC Confidential
252
RADIO CONFIGURATION (1 of 4)
1
253
RADIO CONFIGURATION (2 of 4)
3
Enter the radio parameters and TDM mapping for the Modem (Slot 01).
NEC Confidential
254
RADIO CONFIGURATION (3 of 4)
4
NEC Confidential
255
RADIO CONFIGURATION (4 of 4 )
Modem radio configuration
NEC Confidential
Item
Parameter
Description
Channel Spacing
Reference
Modulation
7/14/28/56 [MHz]
QPSK
16/32/64/128/256[QAM]
Radio Mode
High Capacity
High System Gain
E1 Mapping
0 to 86 [CH] 28MHz
For High System Gain : 0
Menu
STM-1 Mapping
0 to 2 [CH]
ETH Bandwidth
[Mbps]
TX RF Frequency
xxxxx.xxx [MHz]
RX RF Frequency
xxxxx.xxx [MHz]
Frame ID
1 - 32
Set frame ID
TX Power Control
Radio Traffic
Aggregation
MTPC/ATPC
Not used/ Radio GRP 1~6
Support Version
Distribution Mode
256
Select VLAN setting from the Provisioning ETH Function Setting Menu
Select the LAG Radio group1 and assign the VLANs to the
aggregation group as well as the ETH Ports to be used.
Confirm that the VLANs are assigned to the Radio Aggregation Group and
the ETH port(s)
4
2
NEC Confidential
257
3
2
258
When the Links in the aggregation loop are normal Radio Traffic aggregation Port Status indicate as Active,
It shows as Standby the links that are down.
When at least one link in the Radio aggregation group is normal Radio Traffic Aggregation Link status is
shown as Normal. If all the links in the radio aggregation Group are down then the Radio Traffic Aggregation
Link Status is shown as Alarm
NEC Confidential
259
NEC Confidential
260
iPaso200-D
Mod1
Mod2
P2
P1
P2
Ethernet Tester
P1
iPaso200-E
P3
Mod1
Mod2
P1
P2
iPaso400-F
Mod1
Mod2
STM-1
iPaso400-B
MSE
Mod1
Mod2
STM-1
16E1
P1
P2
MSE
16E1
P1
P3
P2
P3
Ethernet Tester
NEC Confidential
261
NEC Confidential
262
NEC Confidential
263
NEC Confidential
Link Aggregation
264
NEC Confidential
265
3
4
5
6
Two sides of the aggregation link should be set to : 7
NEC Confidential
266
NEC Confidential
267
NEC Confidential
268
iPASOLINK
MAC Header Compression
NEC Confidential
269
MAC SA
6
VLAN
4
L
2
IP
V4/V6
Packet
46 -1500
FCS
4
Ethernet Frame
20bytes
First
compression
MAC DA
6
MAC SA
6
VLAN
4
L
2
IP
V4/V6
Packet
46 -1500
FCS
4
12bytes
VLAN
4
Second
compression
L
2
IP
V4/V6
Packet
46 -1500
FCS
4
Third
compression
Packet
46 -1500
Packet
46 -1500
FCS
4
QPSK
16QAM
17
34
34
69
69
139
86
172
139
280
32QAM
64QAM
43
51
86
104
174
209
216
259
350
420
256QAM
60
69
121
138
244
279
303
346
490
560
512QAM
1024QAM
313
349
388
432
628
700
2048QAM
384
476
770
L2
compression 128QAM
NEC Confidential
Mbps
Mbps
Mbps
Mbps
Mbps
Mbps
Mbps
Mbps
Mbps
270
Select Modem Function Setting on the provisioning menu and click on the
Modem Port setting.
Click MODEM (Slot#), to open the Modem port name setting window
Enter the Modem Port Name ( 32 Characters)
Click the Header Compression Mode drop down list and select the
type of compression to be used
Click the Enhanced Mode Check Box to use this mode (see table below)
Click the OK button to close the window
MAC+MPLSHigh
Enhanced MAC+IPv4
Enhanced MAC+IPv6
Enhanced MAC+MPLS
L2 header
MAC
VLAN
L3&L4 header
IPv4
IPv6
MPLS
Label
FCS
remove
271
NEC Confidential
272
L1 Throughput (Mbps)
BW=28MHz
256QAM
273
NEC Confidential
274
TDM
Equipment
Carrier PSN
TDM to
Packet
Time
Stamp
Primary
Reference
Source
TDM
Equipment
Queue
Packet
to TDM
T1/E1
Time
Stamp
Service
Clock
Encode
NEC Confidential
Slave Node
In-Band
E1
fReference
Customer
Premises
Filter
Service
275
Modem-1
Modem-2
E1
Ethernet BUS
Modem
XC
MB
16E1
PWE CH1
MSE
L2SW
PWE CH64
STM-1 -Chanellized
NEC Confidential
FE / GbE Ports
276
PWE-Setting
Expand the provisioning menu and
click on the PWE Setting. PWE setting
window for the MSE card appears
showing the current PWE setting.
Click the Add PWE icon to open the PWE Setting wizard
NEC Confidential
277
7
2
3
For CH 17 - 64
7
8
9
NEC Confidential
278
PWE Setting
Item
PWE No.
PWE Service Name
MSE E1 CH
Jitter Buffer
Clock Mode
Assign CH
Capsule E1 frame Size
RTP Header
CoS
ECID
Destination MAC Address
NEC Confidential
Parameter
1 to 256
0 to 32
1 to 64
2ms, 4ms, 8ms,16ms, 32ms, 64ms, 128ms
MSE E1 CH No. 1 to 16
NE Clock , ACR, SYNC E1
MSE E1 CH No. 17 to 64
NE Clock, ACR Slave, Sync E1
1 to 16
1 to 8
On / Off
0 to 7
1 to 1048575
Opposite MSE or broadcast MAC address
Description
Service number of PWE
Service name of PWE
E1 cross connect CH
Jitter Buffer (8MS means +/_ 4ms jitter buffer
Transmit TDM synchronization source clock select.
Refer to the figures below
279
Enter the Class of Service (CoS) Priority levels for the PWE
packets
11
12
13
Select the radio button of the VLAN ID for the Packets sent
out for this PWE circuit.
14
If the required VLAN ID is not in the list, click the Add VLAN
ID icon. From the add VLAN ID window enter the VLAN ID
and VLAN Service name Click ok to add the VLAN to the
VLAN list.
15
Click the Next button to get the PWE Wizard Step3 Setting
Confirmation window
14
10
11
12
13
14
15
NEC Confidential
280
16
Confirm the setting for this PWE circuit and click OK. If not
click Back and change the setting.
16
16
17
NEC Confidential
281
NEC Confidential
282
PWE Setting
iPaso200-E
Mod1
Mod2
23GHz
P1
P1
ODU-Back
iPaso200-A
Mod1
Mod2
M2
P1
P1
22484 / 21252
M1 H
ODU-2
7GHz
7310/7156
iPaso400-F
Mod1
Mod2
P1
STM-1
H
M1
Mod1
MSE
iPaso400-B
Mod2
P1
16E1
STM-1
MSE
16E1
E1
E1
TDM Tester
Ethernet Tester
NEC Confidential
283
NEC Confidential
284
NEC Confidential
285
NEC Confidential
286
NEC Confidential
287
NEC Confidential
288
Select Port Isolate Setting from the ETH Function Setting Menu
Click on the Port# to be Isolated. Select the Enable radio button on
the Port Isolate Setting window and click the OK button
Click on the next Port# to be Isolated. Select the Enable radio
button on the Port Isolate Setting window and click the OK button
VLAN 100
VLAN 100
VLAN 100
289
NEC Confidential
290
291
292
NETWORK MANAGEMENT
NEC Confidential
293
GENERAL SETTING
Select the General Setting from the
Network Management Configuration
menu..
General setting current setting screen
appears.
Click the Edit icon to open the General
setting edit window.
This window allows the setting of bridge1
IP address, Subnet Mask and Default
Gateway..
Select the radio Button Yes or No for the
Connect NMS port to NMS setting
Click the OK button to apply the setting
Item
Parameter
Description
x.x.x.x
x.x.x.x
Yes
No
294
NEC Confidential
295
Parameter
Description
x.x.x.x
Used
Not Used
9600
19200
Inband Management VLAN Setting
Inband Management 1 to 16
Inband Management
VLAN usage
VLAN ID
1 ~ 4094
CoS
0 to 7
Used
Not Used
Enable
Disable
LLDP Mode
Standard
Proprietary MAC
NEC Confidential
296
Item
Parameter
Description
NE Branch Setting
Default Gateway
x.x.x.x
Bridge No.
Modem Ports
Inband
Management #
is selected as used
Mask
M-Plane Bandwidth Limitation
Bandwidth
Enable or Disable
Limitation
Bandwidth (Kbps) 500 to 10000 Kbps Set the BW for the SV signal over the
radio
M-Plane Priority
CoS
0-7
Connect NMS
YES or No
Port to NMS
the port
LCT Port Setting
Restrict LCT
Any
Connection
Only to Local NE
NEC Confidential
297
298
PNMSj
NE-A
10.8.0.5
NE-B
10.8.0.6
NE-C
10.8.0.7
Port01
Port01
Port01
iPASO
VID 100
NE-D
10.8.0.8
iPASO
VID 4095
Inband VID
NE-A (10.8.0.5)
Inband Management VLAN: 100
Port01: Trunk Link
MODEM1: Trunk Link
299
NEC Confidential
300
IN-BAND DCN
NEC Confidential
301
NMS
Radio
Radio
Radio
Out of Band
Bridge1: 192.168.1.2
PNMS:172.10.0.2.
Bridge1: 192.168.1.4
Bridge2 : 172.10.0.1
GW:172.10.0.1
GW:192.168.1.2.
Bridge1: 192.168.1.6
Bridge1: 192.168.1.7
GW:192.168.1.2.
GW:192.168.1.2.
GW:172.10.0.2.
Out of Band
NMS
NMS
Bridge1: 192.168.1.2
PNMS:172.10.0.2.
GW:172.10.0.1
NEC Confidential
Back-to-Back
Radio
Bridge2 : 172.10.0.1
Bridge1: 192.168.1.4
GW:192.168.1.2.
Out of Band
Radio
NMS
Bridge1: 192.168.1.6
GW:192.168.1.2.
Bridge1: 192.168.1.7
GW:192.168.1.2.
GW:172.10.0.2.
302
Inband DCN
Port1
Access
VLAN10
Out of Band
Radio
NMS
Radio
NMS
In Band
Bridge1: 192.168.1.2
Bridge2 : 172.10.0.1
PNMS:172.10.0.2.
GW:172.10.0.2.
GW:172.10.0.1
IB-MNG1 : Bridge2-VLAN10
Bridge1: 192.168.1.4
Bridge1: 192.168.1.6
GW:192.168.1.2.
GW:192.168.1.2.
Bridge1: 192.168.1.7
GW:192.168.1.2.
Port1 : Access-VLAN10
Port1
Access
VLAN10
Radio
Port-1
Port-1
Radio
Out
In of
Band
Band
In Band
PNMS:172.10.0.2.
GW:172.10.0.1
Bridge1: 192.168.1.2
IB-MNG1 : Bridge1-VLAN10
IB-MNG1 : Bridge1-VLAN10
Bridge2 : 172.10.0.1
IB-MNG1-auto discover
IB-MNG1-auto discover
GW:172.10.0.2.
Port1 : Trunk-VLAN10
Port1 : Trunk-VLAN10
IB-MNG1 : Bridge2-VLAN10
Port1 : Access-VLAN10
NEC Confidential
303
NEC Confidential
304
CLIENT:172.10.0.2.
GW:172.10.0.1
Radio
Bridge1: 192.168.1.2
Bridge2 : 172.10.0.1
Radio
Radio
Bridge1: 192.168.1.4
Bridge1: 192.168.1.6
GW:192.168.1.2.
GW:192.168.1.2.
Bridge1: 192.168.1.7
GW:192.168.1.2.
GW:172.10.0.2.
DHCP Sever
DHCP No.1
Bridge No.1 (192.168.1.2/24)
IP Range (192.168.1.10 -192.168.1.15)
Exceptions: none
Security : any
Client-2
Reservations You can setup certain IPs to be handed out for certain MAC
addresses (a MAC address is the unique number for a network adapter). This
is generally used for clients or devices that must always have the same IP but
you still want to manage through DHCP Server for other options (DNS or
Gateway for example
Exceptions An exception is either a single IP or range that you do not want
managed by the DHCP server. You would do this for the IPs that you would
assign statically to devices like Servers that should always have the same.
NEC Confidential
305
NEC Confidential
306
Click the DHCP No. 1-3 for Server Setting and DHCP No.4-16 for Relay Setting
Click the DHCP No. 1-3 for Server Setting
Click on the Detail to set the DHCP Server Detail
Setting
NEC Confidential
307
NEC Confidential
308
For example
l DHCP Option 54 can specify DHCP Server Address. Therefore, in the above case,
DHCP Client can recognize DHCP Server Address.
l You can confirm DHCP Server Address by using ipconfig /all at command prompt.
NEC Confidential
309
When a client receives an IP address, the client appears in the DHCP Client Table. If the client
is not preregistered, Add is indicated at the end of the row for that client in the table.
Click on the Add MAC Address icon to
register the Client MAC addresses.
310
CLIENT:172.10.0.2.
GW:172.10.0.1
Radio
Bridge1: 192.168.1.2
Bridge2 : 172.10.0.1
Radio
Bridge1: 192.168.1.4
Radio
Bridge1: 192.168.1.7
Bridge1: 192.168.1.6
GW:192.168.1.2.
GW:192.168.1.2.
GW:192.168.1.2.
GW:172.10.0.2.
DHCP Sever
DHCP No.1
Bridge No.1 (192.168.1.2/24)
IP Range (192.168.1.10 -192.168.1.15)
Exceptions: none
Security : any
Client-1
Client-2
Client-3
Client-4
Client-1
Client-2
Client-3
Client-1: unable to contact DHCP Server and will get request has timed out
Client-2: will get the IP address 192.168.1.10
Client-3: will get the IP address 192.168.1.12 Fixed address
Client-4: will get the IP address if the security setting is Any. If only
Registered it will not be assigned an IP Address.
NEC Confidential
311
Click on the Add indication in any of the listed MAC addresses that are not pre-registered to
register them. Select the distribution method . If it is fixed then enter the IP address to be
assigned. Click OK to register the selected MAC address.
NEC Confidential
312
Equipment Utility
NEC Confidential
313
3
4
NEC Confidential
314
315
NEC Confidential
316
NEC Confidential
317
Introduction
Upgrade
PNMSj
SKA Client
Relocation
Allocator(SKA)
PNMSj Client
HUB
HUB
Proxy,
Firewall
Router
NEC
SKSS
NEC Confidential
318
Allocator(SKA)
OS : Windows 7
PNMSj Client
Internet Explorer 8
HUB
2
SKA Client
HUB
Proxy,
Firewall
3
NEC
SKSS
NEC Confidential
319
Without SKA
GLN / Local staff
SKSS
NE
Customer
Download Upgrade Key
NEC
Customer Network
With SKA
Customer
SKSS
Issue Upgrade Key
NEC
NEC Confidential
SKA
NE
Customer Network
320
You can extract current keys from NEs within DCN and
store the key information.
You can relocate a current key stored in the SKA to
another NE within DCN.
Extraction
Relocation
User
User
SKA
NE
SKA
NE
Software Key Extraction
Pool Software
Key
NEC Confidential
Relocate
Software Key
321
1
Customer Network (NMS)
PNMSj
PNMSj Client
HUB
2. Supported NE type
iPASOLINK Series
->iPASOLINK 100/100E/200/400/1000
5000iP Series (*Only Upgrade Function)
2
Customer Network (NE)
Router
NEC Confidential
322
PNMSj
HUB
iPASO400 IDU
[No.002]
iPASO400 IDU
[No.001]
SKA
SKSS
SKA Client
Screen shows the
control of SKA client.
NEC Confidential
323
Demonstration
There are NEs which have no upgrade SW Key.
Select the another NE, and relocate the Software Key which is
extracted. (It takes 20 seconds around.)
You can confirm when Relocate is finished in journal log.
NEC Confidential
324
Select 100Mbps!
NEC Confidential
325
Future Support(2/2)
Extract
Upgrade
& Allocate *Note *Note
Reference
Setting
Administrator
User
New
N/A
N/A
Extract
Upgrade
& Allocate *Note *Note
N/A
Reference
Setting
Administrator
User
NEC Confidential
Selectable
Selectable
N/A
326
NEC Confidential
327
ABBREVIATIONS-1
Adjacent Channel Alternate
CIR
DMM
Polarization
CKT
Circuit
DMR
ACCP
CLK
Clock
DO
Data-out
ACK
Acknowledgement
CMF
DSCP
AGC
CMI
DUP
Duplexer
AIS
CONV
Converter
DXC
ALM
Alarm
CORBA
E1
E-carrier level 1
ALS
Architecture
EBS
AMR
CoS
Class of Service
EIR
ANT, Ant.
Antenna
CPU
EMC
Critical
ACAP
APS
CR
EML
ATT
Attenuator
CRC
EMS
ATPC
CS
Channel Separation
EOW
C Order Wire
AU
Administrative Unit
CTRL
Control
EPS
ETH-Protection Switch
AUX
Auxiliary
CV
EQL
Equalizer
Ave
Average
CW
Carrier Wave
ERP
BBE
DA
Destination Address
ES
Errored Seconds
BER
DADE
ETH-CC
BPF
DB
Database
ETH-LB
ETH-Loopback function
BS
Base Station
DC
Direct Current
ETH-LBM
ETH-Loopback Message
BSC
DCN
ETH-LBR
ETH-Loopback Reply
BTS
DEG
Degraded
ETH-LB
ETH-Loopback function
CAPEX
Capital Expenditure
DEI
ETH-LT
CBS
DEM
Demodulator
ETH-LTM
CCDP
Des(Dest)
Destination
ETH-LTR
CCM
DI
Data-in
ETH-OAM
DL
Download
Telecommunication Administration
DM
Delay Measurement
CEPT
NEC Confidential
and Maintenance
328
ABBREVIATIONS-2
ETH-OAM LB
ETH-OAM Loopback
ETH-OAM LT
ETH-RDI
ETSI
European Telecommunications
Standards Institute
EXC
E-to-E.
End-to-End
Fail
Failure
F/B
FCS
FDB
Forwarding Database
FE
Fast Ethernet
FEC
FEBBE
FEES
FESES
FEUAS
FPGA
F/W
Firmware
GbE, GBE
Gigabit Ethernet
3GPP
GUI
Horizontal
HDB
HK
House Keeping
HP
HYB
Hybrid
H/W
Hardware
NEC Confidential
ID
Identification
IDU
Indoor Unit
IE
Internet Explorer
IEC
IEEE
I/F
Interface
IF
Intermediate Frequency
IHG
IN
Input
INTFC
Interface
I/O
Input/Output
IP
Internet Protocol
ITU
ITU-R
ITU-T
L2SW
Layer2-Switch
LAN
LB
Loopback
LBM
Loopback Message
LCD
LCT
LDPC
LED
Lev.
Level
LLF
LM
Loss Measurement
LMM
LNA
LO
Local Oscillator
LOC
Loss of Continuity
LOF
Loss of Frame
LOM
Loss of Multiframe
LOP
Loss of Pointer
LO REF
LOS
Loss of Signal
LP
LPM
LT
Link Trace
LTI
LTM
MAC
MAIN
Main
MAINT
Maintenance
MAX
Maximum
Mdev
Mean Deviation
MDCPU
MODEM CPU
MDI
MDIX
MD4
MD5
MEG
MEM
Memory
MEP
329
ABBREVIATIONS-3
MIN
Minimum
Octs
Octets
PMC
MIP
ODU
Out-Door Unit
PMON
Performance Monitor
MIX
Mixer
OFS
PNMSj
MJ
Major
OMT
Ortho-Mode Transducer
MMC
OPEX
Operational expenditure
PPI
MME
OPP
Opposite
ppm
MMG
Mismerge
OPR
Operation
PPP
Point-to-Point Protocol
MN
Minor
OPT
Optical
PPS
MOD
Modulator
OSPF
PQ
Priority Queuing
MODEM
Modulator Demodulator
OSS
PRM
Parameter
MON
Monitor
OUT
Output
PROT
Protection
MPX
Multiplexer
OW
Oder Wire
PS
Power Supply
MS
Multiplex Section
PA
Power Amplifier
PSC
MSC
PBR
PSD
MSDU
square Rectangular
PWR
Power
MSP
PCP
QAM
MTBF
PDH
QoS
Quality of Service
MTPC
PDU
QPSK
MUX
Multiplexing Equipment
PGM
Program
RCVR
Recover
N/A
Not Applicable
PHY
Physical
REF
Reference
NBI
Northbound Interface
PIR
REM
Remote
NE
Network Element
PJE
RDI
NML
PJE-N
RF
Radio Frequency
NMS
PJE-P
RFS
OAM
PKG
Package
RL
Relay
Maintenance
Pkts
Packets
RMON
Occur
PLM
RNC
OCR
NEC Confidential
330
ABBREVIATIONS-4
RPL
SUB
Substitute
UNEXP
Unexpected
RS
Regenerator Section
SW
Switch
Unicast DMR
RS-232
S/W
Software
UNM
Unexpected MEP
RSL
SWG
Switch Group
UNP
Unexpected Period
RST
SYNC
Synchronous
USB
RSTP
TCI
Vertical
RX
Receiver
TCN
Volt
SC
Service Channel
TDM
VC
Virtual Channel
SD
Space Diversity
TDMoP
VLAN
Virtual LAN
SDH
TEMP
Temperature
VP
Virtual Path
SEG
Segment
TERM
Terminal
VPN
SEP
TF
Transmit Fail
VSWR
SES
TIM
WDM
SFP
TLV
Web
SGMI
TM
Through Mode
WG
Waveguide
Interface
TNC
WR
Warning
SMS
ToS
Type of Service
WRR
SMU
TPID
WS
Wayside
SNCP
TQC
XCTRL
XPIC Control
SNMP
TTL
Time To Live
X-DEM
XPIC Demodulator
XFP
SP
Strict Priority
TU
Tributary Unit
SPD
Speed
TX
Transmitter
SRC
UAE
UAS Event
XIF
XPIC IF
STAT
Status
UAS
Unavailable Seconds
XPD
XPIC
STD
Standard
UL
Upload
STM
UNEQ
Unequipped
STP
NEC Confidential
XREF
XPIC Reference
331