Professional Documents
Culture Documents
4
Product Description
Revision 1, updated in January, 2015
Document Number: PM-000131-02-EN
Notice
This document contains DragonWave proprietary information. Use, disclosure,
copying or distribution of any part of the information contained herein, beyond that
for which it was originally furnished, requires the written permission of
DragonWave Inc.
The information in this document is subject to change without notice and relates
only to the product defined in the introduction of this document. DragonWave
intends that information contained herein is, to the best of its knowledge, correct
and accurate. However, any/all liabilities associated with the use or accuracy of
the information contained herein must be defined in a separate agreement
between DragonWave and the customer/user.
Copyright DragonWave Inc. 2015. All rights reserved.
Contents
1 Preface ................................................................................................... 13
1.1 History of changes ......................................................................................................... 13
1.2 Scope of the document .................................................................................................. 13
1.3 Intended audience .......................................................................................................... 13
1.4 TUV Rheiland factory inspection .................................................................................... 13
1.5 Waste electrical and electronic equipment (WEEE) ....................................................... 14
1.6 RoHS compliance .......................................................................................................... 14
1.7 CE compliance ............................................................................................................... 15
1.8 MEF compliance ............................................................................................................ 15
1.9 FCC compliance ............................................................................................................. 15
1.10 Gost-R compliance ....................................................................................................... 15
1.11 NEBS compliance ........................................................................................................ 15
1.12 VCCI compliance ......................................................................................................... 16
2 Overview ................................................................................................ 17
2.1 Hub800 Introduction ....................................................................................................... 17
2.2 R2.6 introduction ............................................................................................................ 17
2.3 Environmental standards ............................................................................................... 17
3 Features ................................................................................................. 19
3.1 Main features ................................................................................................................. 19
3.6 Synchronization.............................................................................................................. 44
3.6.1 TDM synchronization interface............................................................................................ 45
3.6.2 Synchronous Ethernet ......................................................................................................... 46
3.6.3 ToP IEEE 1588v2 master/boundary clock/ordinary clock ................................................... 46
3.6.3.1 ToP IEEE 1588v2 grand master ......................................................................................................................47
3.6.3.2 ToP IEEE 1588v2 boundary clock ...................................................................................................................48
3.6.3.3 Clock recovery .................................................................................................................................................48
5 Application .............................................................................................. 65
5.1 Site configuration ........................................................................................................... 65
5.1.1 Tail site ................................................................................................................................ 66
5.1.2 Chain site ............................................................................................................................ 66
5.1.3 Hub site ............................................................................................................................... 67
5.1.4 Edge site ............................................................................................................................. 67
5.1.5 Ring site .............................................................................................................................. 68
5.1.6 Ring root site ....................................................................................................................... 68
6 Management .......................................................................................... 71
6.1 Network management using NSN NetAct ...................................................................... 71
6.2 Network management using NSN NetViewer ................................................................ 71
6.3 Network management using WebLCT ........................................................................... 71
6.4 Accessing IDU................................................................................................................ 72
6.5 SNMP agent ................................................................................................................... 72
6.6 SNTP, SFTP and Telnet ................................................................................................ 72
6.7 USB key ......................................................................................................................... 72
6.8 License ........................................................................................................................... 73
8 Standards ............................................................................................... 77
List of Figures
Figure 1 WEEE label ................................................................................................................................ 14
Figure 2 CE Mark ..................................................................................................................................... 15
Figure 3 MEF certified compliant logo...................................................................................................... 15
Figure 4 Equipment appearance .............................................................................................................. 17
Figure 5 E-Line illustration........................................................................................................................ 21
Figure 6 E-Line service application .......................................................................................................... 21
Figure 7 E-LAN service illustration ........................................................................................................... 22
Figure 8 QoS architecture ........................................................................................................................ 23
Figure 9 Bandwidth profiles ...................................................................................................................... 26
Figure 10 N x 64 Kbps grooming to 1 E1 ................................................................................................. 33
Figure 11 N x 64 Kbps grooming application ........................................................................................... 33
Figure 12 STM-1 CEP Function Components .......................................................................................... 35
Figure 13 Mixed protection configuration ................................................................................................. 35
Figure 14 Dual-IDU structure overview .................................................................................................... 36
Figure 15 MSTP illustration ...................................................................................................................... 39
Figure 16 LAG example ........................................................................................................................... 40
Figure 17 End-to-end protection path....................................................................................................... 41
Figure 18 Ethernet ring protection switching architecture - normal condition ........................................... 43
Figure 19 STM-1 MSP protection ............................................................................................................. 44
Figure 20 IEEE 1588 module network application ................................................................................... 46
Figure 21 Hub800 working as GM............................................................................................................ 47
Figure 22 GPS antenna............................................................................................................................ 47
List of Tables
Table 1 History of changes ....................................................................................................................... 13
Table 2 Alternative values for PCP encoding table .................................................................................. 27
Table 3 Alternative values for PCP decoding table .................................................................................. 27
Table 4 Switch time table .......................................................................................................................... 38
Table 5 Hash mode operation .................................................................................................................. 41
Table 6 GPS port performance monitoring ............................................................................................... 50
Table 7 Default password for different user classes ................................................................................. 53
Table 8 Availability of protocols and ports according to the security mode .............................................. 53
Table 9 Dimensions and weight ................................................................................................................ 57
Table 10 Dual-IDU structure dimension.................................................................................................... 57
Table 11 Interfaces ................................................................................................................................... 58
Table 12 Power cable requirement ........................................................................................................... 59
Table 13 Plug-in cards .............................................................................................................................. 62
Table 14 LED indication ............................................................................................................................ 63
Table 15 Accessing IDU ............................................................................................................................ 72
Table 16 Input voltage .............................................................................................................................. 75
Table 17 Mainboard and cards power consumption................................................................................. 75
Table 18 IEEE standards .......................................................................................................................... 77
Table 19 ETSI TM4 standards.................................................................................................................. 77
Table 20 ITUT standards .......................................................................................................................... 77
Table 21 Environmental engineering ........................................................................................................ 78
Table 22 IETF standards .......................................................................................................................... 78
DragonWave Inc.
Preface
1 Preface
1.1 History of changes
The history of changes is shown in the following table:
TABLE 1-1. History of changes
Revision
Update Point
Date
1st revision.
January, 2015
13
Preface
DragonWave Inc.
The correct disposal and separate collection of waste equipment will help prevent potential negative
consequences for the environment and human health. It is a precondition for reuse and recycling of
used electrical and electronic equipment.
The above statements are fully valid only for equipment installed in the countries of the European
Union and is covered by the directive 2002/96/EC. Countries outside the European Union may have
other regulations regarding the disposal of electrical and electronic equipment.
14
DragonWave Inc.
Preface
1.7 CE compliance
The equipment is in compliance with the essential requirements and other relevant provisions of
Directive 1999/5/EC.
FIGURE 1-2. CE Mark
15
Preface
DragonWave Inc.
16
DragonWave Inc.
Overview
2 Overview
2.1 Hub800 Introduction
Hub800 is a reliable and flexible indoor unit (IDU), which can be used for tail, chain, hub and aggregation site application in the mobile backhaul solution.
It is connected to and works with outdoor units (ODUs) to transfer/receive local traffic to/from remote
equipment.
FIGURE 2-1. Equipment appearance
Hub800 uses multi-slots structure to support various plug-in cards with various interfaces.
With the help of small form-factor pluggables (SFPs), plug-in cards and patch panels, Hub800 can
be connected to various interfaces of local traffic, e.g., FE, GE, E1/T1/J1, STM-1 and FlexBus interface.
Additionally, as part of the carrier Ethernet portfolio, it allows a smooth integration in the network,
ensuring end to end Quality of Service (QoS) and easy provisioning.
Hub800 has the peculiarity to be able to work in two different modes, packet and hybrid, via different
software release. Both modes support Ethernet and TDM traffic but the main difference lies in:
In packet mode, TDM traffic is transported over packets with circuit emulation; but
in hybrid mode, TDM traffic is kept separated from packet traffic.
1 + 0;
1 + 1 hot standby/space diversity;
1 + 1 frequency diversity;
2 + 0 frequency diversity;
2 + 0 XPIC; and
2 + 2.
17
Overview
DragonWave Inc.
However, the heating alarm will be triggered when the interior temperature of the device
exceeds the threshold. Refer to Troubleshooting for details on the alarm.
18
DragonWave Inc.
Features
3 Features
3.1 Main features
The following lists the main features of Hub800:
19
Features
DragonWave Inc.
> Protected and unprotected only concerns linear protection (CES and Ethernet
G.8031);
> The system resources are partitioned for CES and Ethernet services, so the number of CES is independent from the number of Ethernet services.
For Dual-IDU mode, the supported service number is no bigger than that in Single-IDU mode. The
formula is as follows:
20
DragonWave Inc.
Features
All the TDM traffic from E1/T1 interfaces on the mainboard and from E1/T1 plug-in card must be
encapsulated into CESoP packet by TDMoP IWF function, and then transmitted as Ethernet frame.
demonstrates the use case of E-Line service.
FIGURE 3-2. E-Line service application
21
Features
DragonWave Inc.
E-LAN service is a multipoint service that can be used for both management plane (management ELAN) and for data plane. For example in 4G networks, all BTS and core network can be managed
via management E-LAN, and packets received from a BTS can be directed either to another BTS or
core network in another E-LAN service. The forwarding decision is based on destination MAC
address matching.
3.2.1.3 Service VLAN manipulation
Customer traffic is classified at UNI port and mapped to either an E-Line or an E-LAN service. A service VLAN tag (S-tag) is added to the customers frames as service delineation by one of the following two modes:
Transparent mode
Customers VLAN tag (C-tag) is intact. S-tag is inserted in front of C-tag at ingress UNI and
removed at egress UNI.
Translation mode
If the classification rules of a service include customer VLAN ID, C-tag is replaced by S-tag at
ingress UNI and S-tag is replaced by any C-tag (which may be the original C-tag) at egress UNI.
At NNI, S-tag of ingress traffic is transmitted transparently.
22
DragonWave Inc.
Features
23
Features
DragonWave Inc.
-Tagged/untagged,
-EtherType,
-Protocol type,
-Source IP address,
-Destination IP address,
-L4 source port,
-L4 destination port, and
-DSCP.
INFO
A combination of the rules can also be used to define a service, e.g., VLAN ID = 100
AND DSCP = 32.
Single-CoS
By default, all the traffic of a service has the same CoS. This means that all the traffic of a service
enters the same priority queue.
Multi-CoS
When Multi-CoS is enabled for a service, the traffic of the service is mapped to different classes
(i.e., priorities) based on CoS mapping rules. Thus the traffic belonging to the same service may
enter different priority queues.
Priority determination
At UNI, after classification, a CoS is assigned to the traffic. Options are:
24
DragonWave Inc.
Features
The definitions and explanations of these parameters can be found in a whitepaper of MEF on its
website:
http://metroehernetforum.org/PDF_Documents/Bandwidth-Profiles-for-Ethernet-Service.pdf.
INFO
Note that MEF uses EIR (EIR information rate) instead of PIR for the same meaning.
INFO
Note that only color-blind mode is supported.
Hub800 supports four types of bandwidth profiles:
25
Features
DragonWave Inc.
A service can be applied with only one type of bandwidth profile. However, a service can have multiple bandwidth profiles of the same type (either the type of per CoS bandwidth profile or the type of
per mapping rule bandwidth profile). Likewise, when there are multiple services on a UNI port, each
service can have its own bandwidth profile of single type except the case where per UNI bandwidth
profile is applied to the UNI port.
Traffic policing
One of the key QoS components to enforce bandwidth profile is traffic policing on UNI port. Other
components include congestion control and queue scheduling.
An Ethernet frame received on UNI port is considered as in-profile if it conforms to the bandwidth
profile, otherwise it is considered out-of-profile. Traffic policing determines whether a frame is in-profile or out-of-profile and marks the result for the frame accordingly so that the other QoS components can handle the frame in the correct way.
Hub800 supports two-rate three-color-marker (TrTCM) mechanism. At the point when a frame is
received on the UNI port, traffic policer calculates the traffic rate by using dual-token-bucket algorithm. The rate is then compared against the bandwidth profile assigned to the service the frame
belongs to and the frame is processed as below depending on the result of policing.
If the rate is below or equal to CIR, the frame is perceived as in-profile and is marked green on
the color-bit allocated to frame. The frame is then sent to the egress queue, waiting for the next
step of processing. Normally, green frames will always get to its destination without being
dropped. This is how CIR is ensured end-to-end.
If the rate is above PIR, the frame is perceived as out-of-profile and is marked red and dropped
right away.
If the rate is between CIR and PIR, the frame is still in-profile (in the sense of PIR) but is marked
yellow and sent to the egress queue waiting for the next step of processing. If the frame does
not experience congestion, it will get to its destination. Otherwise, it may be dropped. In other
words, the delivery of yellow frame is not ensured.
INFO
26
DragonWave Inc.
Features
Priority dropeligible
7DE
6DE
5DE
4DE
3DE
2DE
1DE
0DE
8P0D
7P1D
6P2D
5P3D
PCP
PCP
Priority drop-eligible
8P0D
7P1D
4DE
6P2D
4DE
2DE
5P3D
4DE
2DE
0DE
27
Features
DragonWave Inc.
If the queue is less than the low threshold (minimum), there is minimal or no congestion and the
packet is enqueued;
If the queue depth is between the two thresholds (minimum and maximum), the congestion is
determined to be moderate and the packet will be dropped according to the drop rate; or
If the queue depth is above high threshold (maximum), all the yellow packets are dropped.
sRED only works for yellow frames. The green frames will be dropped only when the buffer
becomes full. All the red frames are dropped.
3.2.2.5 Scheduling
The following scheduling methods are supported in Hub800:
SP
The strict priority method schedules the access to the egress port across the QoS queues from
highest QoS index to lowest. The purpose is to provide lower latency service to the higher QoS
classes of traffic.
WRR
The WRR scheduler provides a weighted packet round robin scheme across the QoS queues. The
purpose is to provide a weighted access to the egress port bandwidth (at a packet level).
DWRR or DRR
An inherent limitation of WRR mode is that the actual bandwidth allocated to a queue depends on
the frame size, but as frame sizes are not known to the scheduler, it is hard to control the bandwidth
allocated to a queue.
To address this issue, DWRR, or DRR, is invented. It is a modified version of WRR.
DRR has two parameters, credit counter (also called deficit counter) and quantum. DRR serves the
frames at the head of every non-empty queue whose credit counter is greater than the frames size.
If the credit counter is lower, the queue is skipped and its credit is increased by a given value called
quantum. Hence, the function of quantum is somewhat like weight but is in bytes. This increased
value is used to calculate the credit counter the next time around when the scheduler examines this
queue for serving its head-of-line frame. If the queue is served, the credit is decremented by the size
of frame being served.
SP + WRR/DRR
The combination of SP + WRR/DRR is supported in Hub800. In this case, strict priority queues are
served first in the order of their QoS numbering, the rest QoS queues are served in WRR/DRR manner.
28
DragonWave Inc.
Features
29
Features
DragonWave Inc.
Unicast ETH-LB
Multicast ETH-LB
3.2.3.3 AIS
Ethernet alarm indication signal function (ETH-AIS) is used to suppress alarms following detection
of detect conditions at the server (sub-)layer. Due to independent restoration capabilities provided
within the spanning tree protocol (STP) environment, ETH-AIS is not expected to be applied in the
STP environment.
3.2.3.4 RDI
Ethernet remote defect indication function (ETH-RDI) can be used by a MEP to communicate to its
peer MEPs that a defect condition has been encountered. ETH-RDI is used only when ETH-CC
transmission is enabled.
3.2.3.5 Ethernet loss measurement (ETH-LM)
OAM functions for performance monitoring allow measurement of different performance parameters. The performance parameters are defined for point-to-point Ethernet connections. Hub800 covers the following performance:
One-way ETH-DM
Each MEP sends a frame with one-way delay measurement information to its peer MEP to facilitate one-way frame delay and/or one-way frame delay variation measurements at peer MEP. If
the clock between the two MEPs is synchronized, one-way frame delay measurement can be carried out. Otherwise, only one-way frame delay variation measurement can be performed.
Two-way ETH-DM
A MEP sends frames with delay measurement request information to its peer MEP and receives
frames with delay measurement reply information from its peer MEP to carry out two-way frame
delay and two-way frame delay variation measurements.
30
DragonWave Inc.
Features
OAM discovery
A mechanism to perform OAM capability discovery.
Remote loopback
A mechanism to support a data link layer frame-level loopback mode.
Link monitoring
A mechanism to support event notification that permits the inclusion of diagnostic information.
3.2.5 LLDP
LLDP is supported in Hub800 to advertise the system key capabilities on the Ethernet LAN and also
learn the key capabilities of other systems on the same Ethernet LAN. Information like system name
and description, IP management address, etc., can be sent or received as LLDPDU (LLDP data
unit) via SNMP MIB for every station to know their neighbors, LLDP frames are sent at a fixed rate
on each port of every station and no acknowledgement is expected from the receiver. It is so-called
one way connectionless data link layer protocol which runs on MAC layer.
LLDP allows the NMS to build the physical topology of the network under is supervision. The NMS
can only get a complete picture of the controlled network when all the NEs support LLDP.
Both Single-IDU and Dual-IDU modes support LLDP.
For detailed information about LLDP, refer to IEEE 802.1 ABTM-2005.
31
Features
DragonWave Inc.
Differential clock,
Loopback; or
Centralized clock (system clock).
Interface
E1/T1, and
STM-1 (only used to hand off or receive E1s over STM-1 interface)
N x 64 Kbps grooming
N x 64 Kbps grooming function encapsulates a configurable number of 64 Kbps time slots from several E1 CESoPSN services into one E1 frame that is then handed off to an E1 port on the mainbaord. This can reduce E1 numbers at core site. The source E1s wanted to be merged together
must be synchronized to the same source.
N x 64 Kbps grooming function requires software licenses and it does not allow the two SFP ports
on the mainboard to be configured as STM-1 ports. N x 64 Kbps grooming is supported only by 16
E1 ports on the mainboard. The 16-port E1/T1 MSC card DOES NOT support this function.
32
DragonWave Inc.
Features
33
Features
DragonWave Inc.
Each E1 tributary or VC12 of STM-1 and T1 can be configured either as SAToP or CESoPSN.
(STM-1 interface also supports SAToP, which is called STM-1 CEP.) The TDM payload field has a
fixed amount of bytes that will be the same for both PWs directions. The TDM payload size can be
configured by the operator, according to RFC4553.
TDM payload size is from 1 to 800 bytes. Ethernet frame type II is supported. The Ethernet frame
includes VLAN tag according to IEEE802.3.
Clock source
The following options are supported to retrieve clock from each TDM interface:
Differential clock,
Loopback, and
Centralized clock (system clock).
Interface
E1/T1, and
STM-1 (only used to hand off or receive E1s over STM-1 interface).
34
DragonWave Inc.
Features
As with all adaptation functions, STM-1 CEP has two distinct components that is adapting STM-1
into a CEP packet stream and converting the CEP packet stream back into the STM-1. The first
function is referred to as CEP packetizer or sender and the second as CEP de-packetizer or
receiver. This terminology is illustrated in the following figure.
FIGURE 3-8. STM-1 CEP Function Components
The CEP de-packetizer requires a buffering mechanism to account for delay variation in the CEP
packet stream. This buffering mechanism is generically referred to as the CEP jitter buffer.
Two STM-1 interfaces can be implemented CEP feature individually on one STM-1/4 MSC Card.
35
Features
DragonWave Inc.
The 1+1 FD/SD protection involves a pair of ODUs, one active and another standby. Traffic is sent
tow both ODUs. In case of any ODU failure, the standby one becomes active.
LPG configuration
Hub800 supports 6 LPGs at most with the help of plug-in cards. Hub800 LPG configuration has the
following characteristics:
If any member port is in link up status, the LPG is in link up; if all member ports are in link
down status, the LPG is in link down status; and
36
DragonWave Inc.
Features
Hub800 dual-IDU provides protection panel, optical splitter, and dual-IDU power injector to build
YPG.
37
Features
DragonWave Inc.
Protection type
LPG
< 500 ms
LAG
< 500 ms
3~4s
E1-YPG
not protected
<1s
via
not protected
3~4s
not protected
3~4s
not protected
3~4s
Electrical GE-YPG
protection panel
38
DragonWave Inc.
Features
Both RSTP and MSTP improve the operation of the spanning tree while maintaining backwards
compatibility with equipment that is based on the (original) 802.1d spanning tree.
BPDU processing
At UNI port, there are three ways to process STP/RSTP/MSTP BPDU:
Peer:
Processed at the UNI. The subscriber network becomes part of the network for which a single
STP is calculated.
Tunneling:
Tunneled by the service. The service is perceived by the subscriber network as a single segment.
In this case, subscriber STP can be created between its sites.
Discarding:
Dropped at the UNI. The subscriber must manually ensure that his network does not contain
loops going through the service.
Faster hello time
In RSTP/MSTP, standard hello time range is from 1 s to 10 s. In order to improve the convergence
time, Hub800 can set Hello Time between 100 ms and 10 s. 100 ms Hello Time will significantly
reduce the convergence time, compared with 1 s Hello Time.
Link OAM for RSTP/MSTP
In the case where Hub800 work together with third party devices that do not support xSTP, it may
take very long (in 10s of seconds) to detect the failures between third party devices. In order to
make RSTP/MSTP detect link fail much faster, Hub800 uses the link layer OAM to detect the link
failing event. At 3.3 ms CCM, the link failing event will be detected by Hub800 within 10 ms (3.3 ms
x 3). RSTP/MSTP will use the link layer OAM CFM event to trigger the RSTP/MSTP info aged event.
When the OAM link layer MEP is configured on a port and the port enabled RSTP/MSTP, the RSTP/
MSTP will monitor the OAM connection fault event on this port.
Through various enhancement to RSTP/MSTP, such as 100 ms Hello Time and link OAM, Hub800
has improved the switch-over performance of RSTP/MSTP while maintaining compatibility with
RSTP/MSTP.
39
Features
DragonWave Inc.
For the detailed information of RSTP/MSTP, refer to IEEE 802.1d, 802.1w and 802.1 respectively.
Increased bandwidth (the capacity of multiple links is combined into one logical link.)
Linearly incremental bandwidth
Increased availability
Load sharing
Automatic configuration
Rapid configuration and reconfiguration
Deterministic behavior
Low risk of duplication or misorder
Support of existing IEEE 802.3 MAC clients
Backwards compatibility with aggregation
Accommodation of different capabilities constraints
No change to IEEE 802.3 frame format
Network management support
Hub 800 can work in both static and dynamic LAG modes. In dynamic mode, Link Aggregation Control Protocol (LACP) provides a standardized means to exchange information between Partner Systems on a link, allowing their Link Aggregation Control instances to reach an agreement on the
identity of the Link Aggregation Group to which the link belongs, to move the link to that LAG, and to
enable its transmission and reception functions in an orderly manner.
With LACPs help, it can provide fully redundant network especially in dual-IDU case. Figure 3-12 is
an example, in which two routers work at MC-LAG and cooperate with dual-IDU. All traffic goes
through the other link if one link fails.
FIGURE 3-12. LAG example
No more than six Ethernet ports on the front panel of Hub800 can be configured to LAG. All of the
member ports of an LAG must locate on either the mainboard or one of the plug-in cards.
40
DragonWave Inc.
Features
The frame distribution has 6 modes (from mode 1 to 6). The mode of frame distribution is configurable per LAG. Mode 3 is the default mode.
TABLE 3-4. Hash mode operation
Mode
Hashing Criteria
CES-T1-B
P2
Protection
P3
Protection
P1
IWF
T1-12
NNI
NNI
Bridge
P3
Working
UNI
T1-12
UNI
IWF
P2
NNI
P1
NNI
Working
Bridge
The allowed number of CES services terminated by one Hub800 is constrained by the following two
requirements:
41
Features
DragonWave Inc.
-In non-revertive mode, when the working path is repaired, traffic will still stay on the protection path.
-Forced switch
This command forces the service to switch to the protection path when there is no failure on
the protection path.
-Manual switch
When there is no failure on either the working path or the protection path, this command
forces the service to switch to the alternative path.
-Clear
This command clears the state resulted from Lockout, Force switch, Manual switch and WTR
expiration.
Hold-off timer
Hold-off timer is used to trigger the switchover once three consecutive CCM messages are found
lost on the working path. If it is set to 0, switchover takes place right away when three consecutive
CCM are lost. Otherwise, switchover takes place when the hold-off timer expires.
The range of hold-off timer is from 0 to 10 s with a step size of 100 ms. The default value is 0. If
the link recovers before the hold-off timer expires, switchover will never take place.
3.5.4.1 G.8031 linear protection interworking with other functions
42
DragonWave Inc.
Features
LPG switchover is required to be faster than G.8031 linear protection when there is a failure on
the common path of LPG and G.8031. However, the switchover time of LPG only depends on its
Hello Time interval whose value is 100 ms. Practically, the switchover time of LPG is around 300
ms to 400 ms regardless of the number of services on the LPG. The switchover time of G.8031
may be faster than LPG if the affected number of services is relatively small. Therefore, attention
must be paid when G.8031 hold-off timer can be configured to a higher value to ensure that LPG
switchover completes before G.8031 switchover is triggered. Otherwise, unexpected result may
arise.
E.g., there are 100 G.8031 protected E-Line services on an LPG port for 1+1 HSBY ODU and
G.8031 hold-off timer is 0 (by default). When LPG switchover process comes to an end, G.8031
may have switched some of the 100 services to the protection path while leaving other services in
the LPG port. But at this moment, CCM LOS is cleared (meaning that CCM resumes) and these
services will remain on the LPG port which is on the working path.
In the case above, if user wants LPG switchover to be completed before G.8031 switchover is
triggered (so that the service remain on the working path to reduce network churn), he has to set
a large G.8031 hold-off timer, e.g., 400 ms.
Only single logical ring protection will be supported on one physical Ethernet port. Ladder topology is not supported. This means that a GE port belongs only to one ring.
43
Features
DragonWave Inc.
INFO
G.8032 only supports 802.1ad mode.
3.5.5.1 G.8032 interworking with STP
Hub800, G.8032 and STP can be enabled on one port at the same time. Some VLANs (e.g., the
management VLAN) can use STP to protect the traffic while some other VLANs (e.g., data traffic
VLAN) can use G.8032 to protect the traffic.
3.5.5.2 G.8032 interworking with LPG
Hub800 supports G.8032 on LPG ring port.
The quality criteria to trigger sink end section includes signal failure (SF) and signal degrade (SD).
Each pair of SFP ports on the mainboard or on the STM-1/4 card is designed to function as one
STM-1 in one 1+1 MSP when they are configured as STM-1.
3.6 Synchronization
Hub800 synchronization subsystem is composed of a synchronization processing unit and a clock
unit. The processing unit performs the clock selection based on synchronization alarms and on the
quality level extracted from received synchronization status message (SSM) according to ITU-T
44
DragonWave Inc.
Features
G.781 standard. Hub800 can also generate SSM messages towards downlink devices and communicates with the SNMP agent.
Source of system clock (user configurable) are:
any Ethernet port running synchronous Ethernet, except for SFP ports with electrical SFPs
inserted (electrical SFP does not support synchronous Ethernet, but optical SFP does).
quality level,
signal failed, and
priority.
The selecting algorithm applies:
Select the reference with the higher quality level, which is not experiencing a signal failure condition. The clock with the higher quality level will be connected to the reference clock of DPLL with
the higher priority and then this clock will be selected by the DPLL.
If multiple inputs have the same highest quality level, the input with the highest priority is selected.
It is not allowed to set the same priority for different interfaces.
If no input could be selected, the system has to go into the holdover (if it is locked) or tree-run (if it
is not locked).
Hub800 system can operate in two modes of synchronization:
Normal mode
In normal mode, if on E1 or one Ethernet interface is selected as synchronization source, when
the source fails, the system goes to internal source (holdover or free-run state). Priority can be
configured to the candidate clock sources. And the sync source selection algorithm applies to the
normal mode (and SSM mode as well).
45
Features
DragonWave Inc.
When a E1/T1 port is used as TDM synchronization input interface, the system detects alarms
related to the TDM synchronization input interface as in the following:
46
DragonWave Inc.
Features
Hub800 IEEE 1588 supports slave mode. In the mobile backhaul network, Hub800 must provide ELine and E-LAN service for IEEE 1588.
When IEEE 1588 is configured as E-Line/E-LAN service in Hub800, user must provide SVID and
service ID.
E-Line service
-E-Line service is created between each master and slave.
-Classification to service is according to destination IP of the master/slave at each end point.
E-LAN service
-E-LAN service is used for connecting multiple slave/masters.
Classification to service is according to destination IP of the master/slave at each end point.
3.6.3.1 ToP IEEE 1588v2 grand master
In some scenarios, Hub800 is required to be act as 1588 grandmaster when the core network is
noisy and has big PDV. At this hub site, Hub800 should work as 1588 master, and select GPS clock
as clock source. In order to realize this feature, GPS card should be equipped on Hub800, and GPS
antenna should be installed with good satellite view. The interface between GPS card and GPS
antenna is HDMI.
One application example is illustrated as the following picture:
FIGURE 3-17. Hub800 working as GM
GPS antenna, integrated GPS receiver, receives satellite signals and produces 1PPS and time
information, then transmits to GPS card. Hub800 will lock this 1PPS and generate system clock, and
use this GPS time as PTP time if 1588 master required. At the same time, Hub800 can distribute
47
Features
DragonWave Inc.
clock to other devices through E1/T1/STM-1/sync-E interfaces or 1588 information. Hub800 can
support maximumly 64 slaves, worked in one-way or two-way modes.
3.6.3.2 ToP IEEE 1588v2 boundary clock
In some scenario, Hub800 is required to realize 1588 boundary clock to get higher performance and
make 1588 network topology clearer. More microwave hops will lead to higher PDV, which will make
slave more difficulty to recover clock and time. One example of topology is shown in the following
picture:
FIGURE 3-19. Boundary clock topology
When working in boundary clock, Hub800 has two roles: slave to its own master, and master to its
slaves. For BC1 device, it acts as slave to grandmaster device, as master to BC2. It recovers clock
and PTP time from grandmaster 1588 information, at the same time distribute 1588 information
based on this recovered time and clock. Hub800 also can support 64 slaves.
SyncE + 1588 mixed mode
In some case, clock can be distributed to next stages or slaves through synchronized Ethernet.
SyncE + 1588 mixed mode is recommended. In this mode, clock is synchronized through Sync-E,
and time is recovered through 1588 message. Because clock is already synchronized through physical layer, it can get higher performance, smaller locking time and stand higher PDV.
3.6.3.3 Clock recovery
The following options are supported to retrieve clock of each TDM interface in Hub800:
Loop timing
The E1/T1 TX clock is derived from E1/T1 RX clock directly.
3.7 OAM
The performance management is based on 15 minutes and 24 hours intervals.
48
DragonWave Inc.
Features
The actual start of the 15-minutes/24-hours interval is synchronized to the system date and time of
the EMS.
Due to its large size, performance management data are transferred by means of a file transfer
instead of MIB. NE is required to save performance management data into an XML file. The files are
retrieved by the manager via FTP protocol.
When the user is using the OAM LM function, the performance management will be rejected
during this time period, vice versa.
49
Features
DragonWave Inc.
Stray packets;
Malformed packets;
Excessive packet loss rate;
Buffer overrun; and
Remote packet loss.
Item
Performance monitor
Received total message
Transmitted total message
Received error message
R-GPS interface
Agent basic software support both SNMPv2c and SNMPv3 protocols until security features are
enabled. This means that the Agent is able to simultaneously respond to SNMPv2c or SNMPv3
messages with no Authentication no Privacy flavor.
The basic MIB contains all the structures necessary to configure the security feature.
The mechanism for logging user access is made available already in the basic software.
50
DragonWave Inc.
Features
Security features are delivered via a dedicated software package on top of the software application.
They are enabled via a dedicated license. This package includes:
As soon as the package is available inside NE and the security license is enabled, the node shall
keep on working as before. But it makes a special user for configuring all the basic security items.
Once all security items are configured completely, the system will realize the upgrading from basic
mode to secure mode. There are two kinds of secure modes: light mode and strong mode.
Light mode
SNMPv3 is available. SNMPv2c is still available, but answers to public community are no more
available;
The account of the user who installed the security package can be manually removed from the
system as soon as the command of security startup is issued.
Strong mode
The account of the user who installed the security package is automatically removed from the
system as soon as the command of security startup is issued.
Regarding the upgrading of security features, one temporary administrator user is used to add the
first users privilege. As soon as this special user has been created and the first installation is ended,
a command is to be available to trigger the security startup: Hub800 is to be warm-rebooted and
start working in the configured mode. And the temporary user will be deleted from the system. The
following steps describe the upgrade procedure from basic mode to secure mode:
Upgrading steps
1.
Get the license and add-on security package, then download them to the NE.
2.
3.
3.8.1 SSH/SFTP
Once the security feature is enabled and the security add-on is installed, Hub800 will support SSH
(secure shell) which is based on TCP/IP protocol stack. SSH allows data to be exchanged between
two network devices in secure channel. It is a substitute for Telnet and supports the security file
transferring together with SFTP (secure file transfer protocol). SSH authenticates the user login from
a shell on a remote host and encrypts the traffic exchanged between two parties in order to improve
the security of the communication. SSH does not implement file transfer by itself, instead, it start the
remote file transfer agent and talk to it (SFTP) after the connection to the remote host is established.
Authentication and encryption mechanism
The server drives the authentication by telling the client which authentication methods can be used
to continue the exchange at any given time. The client has the freedom to try the methods listed by
51
Features
DragonWave Inc.
the server in any order. This gives the server complete control over the authentication process and
at the same time it gives enough flexibility for the client to use the methods that it supports or that
are most convenient for the user, when multiple methods are offered by the server.
The only mandatory authentication method is the public key. and the encryption algorithms have to
be DSA and RSA.
SSH server in Hub800 does not support any compression method. Files to be transferred are
already compressed when really necessary, so compression at SSH level is useless.
ReadOnly user
Any user of this class cannot modify any parameter in the NE except the registration data for
receiving notifications. Anonymous users are also allowed with the same privileges of ReadOnly
users, but the password is not required.
ReadWrite user
Any user of this class may read and write all the MIB fields whose property list is READWRITE,
with the exceptions:
52
DragonWave Inc.
Features
User class
Password string
Protocol map
Admin
sysmanager
ReadWrite
readwrite
SNMPv2c, SNMPv3
ReadOnly
readonly
SNMPv2c, SNMPv3
ReadOnly (Anonymous)
SFTP, FTP
Account log
Hub800 embedded software stores a list of (up to 120) records regarding log actions (login and
logout) performed by the user. All successful log actions will be recorded. Each record includes the
following information fields:
Once an alarm is triggered, it needs to be downloaded and cleared from EMS. Then NE clears the
alarm in the following procedure.
1.
2.
3.
NE clears log entry after successful transfer of the log file to EMS.
4.
Protocol
Basic mode
Light mode
Strong mode
20-TCP
(1)
FTP
Yes
No
No
20-TCP
SFTP(1)(2)
No
Yes
Yes
21-TCP
FTP
Yes
No
No
21-TCP
SFTP(2)
No
Yes
Yes
22-TCP
No
Yes
Yes
23-TCP
Telnet
Yes
No
No
80-TCP
HTTP
Yes
No
No
123-UDP
SNTP
Yes
Yes
Yes
53
Features
DragonWave Inc.
TABLE 3-7. Availability of protocols and ports according to the security mode
Protocol
Basic mode
Light mode
Strong mode
161-UDP
SNMPv2c
Yes
No
No
161-UDP
Yes
No
No
161-UDP
No
Yes
No
161-UDP
No
Yes
No
443-TCP
HTTPS
No
Yes
Yes
1007-TCP
Dual-IDU
Yes
Yes
Yes
(1) Default port opened to support file transfer. It can be different if already in use.
(2)This port is open inside the SSH connection to support file transfer application.
2.
3.
If the IDU is set to dual-IDU mode out of the shroud, it will turn into idle status and trigger an alarm
on WebLCT and light alarm LED on the faceplate. In principle, under dual-IDU mode, the user is not
allowed to remove IDU from shroud without powering off. It will reset and turn into idle no matter
what role (active/standby) it was. The other one in the shroud will become active no matter what role
(active/standby) it was.
When rebooting, the IDU in lower position waits for maximumly 3 minutes to make sure that the
upper one finish boot-up first. So by default, the upper IDU works in active status, while the lower in
standby status. It can be switched over via manual switch on WebLCT if needed.
Only one public IP is assigned to dual-IDU structure, and this IP address must be assigned to active
IDU.
Normally, the DCN port on active IDU will be enabled automatically, and it can be managed by DCN
network. The DCN port on slave IDU will be disabled automatically. Two DCN ports are recommended to be connected with DCN network in order to make the NE to be managed when IDU
switch occurs. The active IDU is managed through its DCN public IP address and the standby one is
managed through its connection with the active one. Hub800 dual-IDU only supports non-revertive
mode. When manual switch between the two IDUs is applied, the active one will check the status of
the standby one. If the standby one works normally, switching will be done. Otherwise, no switch will
happen. This command can only be done on active IDU. Once this command is executed, the two
IDUs will synchronize the configurations first, and then do the switch. When the active IDU has criti-
54
DragonWave Inc.
Features
cal errors and fail to send out signal, the standby one will become active. The new active IDU will
take over all the traffic, management and control. In some case when CPU on the active one is
dead, the standby one will not switch to active status even through it can receive signals. The active
IDU will be reset when the hardware watchdog is overbriming, then the standby one will switch to
active once the old active one resets. The IDU switchover can be finished in 4 seconds for TDM service or 3 seconds for Ethernet service. This time length begins from when the NE becomes out of
management via DCN to when the it is back to management.
When starting up and configuring the dual-IDU system, the configuration information is synchronized from the active IDU to the standby.
During the dual-IDU running, once the configuration information is changed in the active IDU, the
configuration information must also be synchronized to standby one.
The periodic synchronization takes place every 10 seconds between active one to standby one.
55
Features
DragonWave Inc.
G.8031 license,
G.8032 license,
CES linear protection license,
n x 64 Kbps grooming into E1 on MB (mainboard),
Software license for dual-IDU,
1588v2 boundary clock mode license.
56
DragonWave Inc.
Property
Value
Height
42 mm
Width
Depth
247 mm
Weight
* Weight does not include daughter card, blue-tooth card and cables.
Property
Value
Height
87.9 mm
Width
Depth
253 mm
4.2 Interfaces
Figure 4-1 and Figure 4-2 display the appearance of Hub800.
FIGURE 4-1. Base system (front and back)
2 MM CONNECTOR
57
DragonWave Inc.
1PPS&ToD OoB
2 x 100/1000Base-X (SFP)
GE or STM-1
DC input
Slot 1
Slot 2
Alarm
DCN
Fan Tray
16 E1/T1
4 x 10/100/1000 Base-T
Hub800 has a multi-slot structure for at most two plug-in cards (optional).
Most of the interfaces of Hub800 are located in the faceplate. The faceplate accommodates the user
interface, management interface, power supply interface, alarm interface. The grounding point is on
the lateral side. And the backplate accommodates the stacking and protection interface for dual-IDU
structure.
TABLE 4-3. Interfaces
Description
Connector
DC input (-48 V)
Interface
2
Quantity
OoB port
RJ45 connector
DCN port
RJ45 connector
Alarm port
RJ45 connector
1PPS&ToD port
RJ45 connector
10/100/1000 BaseT
electrical GE port
RJ45 connector
SFP port
Small form pluggable module port for optical GE SFP module or optical STM-1 SFP
module
E1/T1
16
MDR68 connector
USB
A type
LED on the faceplate indicates the status of different type of signal or connection, for the detailed
information on LEDs, refer to Page 63 LED indication.
58
DragonWave Inc.
Hub800 continuously performs a load control to detect abnormal working condition. Short circuit protection of Hub800 prevents the system from over-voltage.
TABLE 4-4. Power cable requirement
Cable
Connector
Phoenix 4-pin
Temperature
-20 oC ~ +80 oC
59
DragonWave Inc.
IDU configuration;
IDU software load;
ODU configuration; and
ODU software load.
Use one cable (with P+E function) to connect GE port 3 or 4 on the mainboard to the ODU, e.g.,
ODU 1 or 2 in Figure 4-5.
Use one cable (with P+E function) to connect an ODU port on 2-port Power Injector Card to the
ODU and another cable (no P+E requirement) to connect the corresponding Ethernet port on the
card to GE port 1 or 2 on the mainboard, e.g., ODU 3 or 4 in Figure 4-5.
For dual-IDU structure, through (cascaded) Power Injector Panel connection. See Figure 4-6. In
this case, ODUs are powered by the Power Injector Panel. And when one Power Injector Panel is
not enough, another one can be cascaded onto it.
INFO
For details on Power Injector Panel, refer to IDU Accessories Product Description.
For details on ODU connection, refer to customer documents for ODU.
60
DragonWave Inc.
Hub800 provides power feeding to connected ODUs (of specific types). The IDU forwards the DC
battery voltage towards the central terminal of the Ethernet transformers. See Figure 4-7.
FIGURE 4-7. Power supply illustration to ODU
61
DragonWave Inc.
Card
Interface
Note
16 channels of E1/T1
interfaces
4x10/100/1000BaseT
electrical interfaces
4x100/1000BaseFX
optical interfaces with
SFP module
2x10/100/1000BaseT
Ethernet electrical interfaces & 2 ODU interfaces
2 FB optical interfaces
1 R-GPS interface
1 1PPS&ToD
interface
1 Clock interface
1 Rcvd 1PPS
interface
INFO
For details on plug-in cards, refer to IDU Accessories Product Description.
62
DragonWave Inc.
Type
Base system
Name
Color
State
Funtion
PWR
Green
On
Power on of PWR
A or PWR B or
PWR A & PWR B
Mode
Blue/Green
On
Blue indicates
Hybrid mode;
ALM
Red/Yellow
Blink 1 HZ 50%
Blinking indicates
the test condition
is active (e.g.,
loopback, protection forcing)
On
Red indicates
the Critical/
Major alarm;
Red
On
ODU failure in at
least one of the
connected ODUs
including both on
mainboard
and
plug-in cards
Ethernet electrical
interface
Link (left)
Green
On
Interface link
Active (right)
Green
Blink 1 HZ 50%
Data presence on
Tx or Rx
SFP interface
Link
Green
On
Interface link
Active
Green
Blink 1 HZ 50%
Data presence on
Tx or Rx
STM-1/4 interface
Active
Green
On
Data presence on
Tx or Rx no LOS
FlexBus interface
LOS/LOF
Red
On
Loss of signal or
loss of frame
Connection
Green
On
PWR
Green
On
Board is powered
Surveying
Green
Blink 2 HZ
GPS is surveying
star
Surveyed
Green
Blink 0.5 HZ
R-GPS interface
63
DragonWave Inc.
4.4 Installation
Single Hub800 is a standard sub-rack compatible with standard ETSI N3 and 19-inch rack.
In dual-IDU structure, two Hub800 are installed in a shroud which is compatible with standard ETSI
N3 and 19-inch rack.
INFO
For the detailed installation instructions, refer to IDU Installation Guide.
64
DragonWave Inc.
Application
5 Application
In typical wireless backhaul network, every Node B/BTS must transmit its traffic towards RNC/BSC.
The Node B/BTS towards RNC/BSC direction can also be called as uplink direction (or north direction). Its impossible that every Node B/BTS directly connects to the RNC/BSC. Node B/BTS, which
is called tail site because its located on the tail of the network, must first upload its traffic data to
small convergent site, which is called chain site. Chain site can combine the traffic of tail site and its
own traffic and upload them to the upper level site, hub site. Hub site uploads its traffic to edge site.
Edge site is the edge of wireless backhaul network and aggregation/backbone network. And step by
step, the site is more and more convergent. A large hub/edge site can converge more than 100
BTS.
Figure 5-1 provides a complete mobile backhauling solution.
FIGURE 5-1. A complete mobile backhauling solution
n x (1+0);
n x (1+1) on single IDU; and
n x (2+0) on single IDU.
65
Application
66
DragonWave Inc.
DragonWave Inc.
Application
67
Application
DragonWave Inc.
68
DragonWave Inc.
Application
69
Application
70
DragonWave Inc.
DragonWave Inc.
Management
6 Management
6.1 Network management using NSN NetAct
NSN NetAct is the central network management system for collecting alarms and measurement
data from Hub800 and associated FPR in the network. Communication between NetAct and the network elements is enabled via IP DCN.
Fault and performance management data is collected to NetAct via NetViewer-NetAct connector
which is integrated in NevViewer EMS.
INFO
For more information on NetAct, refer to customer documents of NetAct.
NE management,
Interface management,
Ethernet configuration,
Service management,
Clock synchronization settings,
Performance management,
Maintenance,
OAM settings,
Protection settings, and
Security management.
INFO
71
Management
DragonWave Inc.
Connection port
OoB port
IP address
192.168.254.100
Changeability
fixed
Note
This always allows the
user to access the device
when the out-band public
address is not known.
It cannot be reached from
a different IP subnet since
no default gateway is
assignable to this port.
DCN port
192.168.255.100
changeable
72
DragonWave Inc.
Management
6.8 License
The user who wants to use certain features has to purchase the corresponding license. A license
can be purchased together with the hardware and the application software when the system is initially purchased, or it can be later purchased and installed onto an already operating system.
Hub800 is delivered to the customer with the basic license pre-installed, so essential functions are
enabled. If additional features need to be activated, the customer can acquire an upgrading license.
Hub800 is delivered to the customer together with a dedicated software release (via eMedia or
CD), providing the basic and essential functions required in the field. This is the basic license
configuration. There are additional features that may be required, for instance, when the network scales up, or network security is required, etc.
The basic license configuration is:
Enabling all the E1, STM-1 and Ethernet ports on the mainboard.
Hub800 provides the following upgrading licenses:
Advanced security license supports the encryption functions of following secure management protocols:
SNMPv3,
SSH,
SFTP, and
HTTPS.
If the upgrading licenses are ordered together with the equipment, licenses are installed during
commissioning.
In-field license upgrading is also supported, which can be performed by customer service staff or
by the user. Upgrading can be performed locally or remotely through the element management
system, while the equipment is running. There is an EMS upgrading window in WebLCT to
transmit/receive license upgrading parameters.
License is implemented using secure plain text message generated and authorized by NSN. If
the license message is lost or corrupted, the valid licensed user can get a replacement from
NSN without paying for the feature twice. The license is bound to the units serial number and
cannot be used in another unit. If radio hardware is swapped by NSN in a hardware failure case,
a new license file will be generated.
When the unit is not managed remotely, make sure that the license has been retrieved for the
equipment before going to the site. There are no emergency licenses available.
73
Management
DragonWave Inc.
74
DragonWave Inc.
Technical specifications
7 Technical specifications
7.1 Power requirement
The following table describes the input voltages and maximum power consumption of Hub800.
TABLE 1. Input voltage
Property
Nominal
voltage
input
Value
Note
-40.5 ~ -57.6
VDC
To support the maximum ODU cable length of 100 m, make sure the
power supply voltage is not below -43 V.
Item
IDU mainboard
16-port
Card
E1/T1
Multi-Service
25
30
10
n.a.
n.a.
12
15
13
16
6.4
6.9
INFO
The ODU power consumption needs to be considered in IDU dimensioning battery when the
IDU provides power feeding to connected ODUs.
75
Technical specifications
76
DragonWave Inc.
DragonWave Inc.
Standards
8 Standards
Hub800 is in compliance with the following standards.
TABLE 8-1. IEEE standards
Recommendation
Recommendation name
IEEE 802.3-2005
IEEE 802.1Q
Virtual LANs
IEEE 802.1ad
IEEE 802.1ah
IEEE P802.3at/D1.0
Enhanced data terminal equipment (DTE) power via media dependent interface (MDI) enhancements
IEEE 802.1ag-2007
A precision clock synchronization protocol for networks measurement and control systems
Recommendation
Recommendation name
Recommendation
Recommendation name
ITUT G.8261/Y.1361
ITUT G.8262/Y.1362
ITUT G.826
ITUT G.704
Synchronous frame structures used at 1544, 6312, 2048, 8448 and 44 736 Kbit/s
hierarchical levels
ITUT G.707/Y.1322
ITUT G.781
Synchronization layer
ITUT Y.1731
ITUT G.703
77
Standards
DragonWave Inc.
Recommendation
Recommendation name
ITUT G.957
Optical interfaces for equipment and systems relating to the synchronous digital
hierarchy (SDH)
ITUT G.664
ITUT G.707/Y.1322
ITUT G.8032
Specifies protection switching mechanisms and protocol for Ethernet layer network
(ETH) Ethernet rings
Recommendation
Recommendation name
CENELEC EN
60297-5
Mechanical structure for electric equipment - Dimensions of mechanical structures of the 482.6 mm (19 in) series - Part 5
EN 300 132-2
Environmental engineering (EE); Power supply interface at the input to telecommunications equipment; Part 2: Operated by direct current (dc)
Recommendation
Recommendation name
Structure of management information for version 2 of the simple network management protocol (SNMPv2) - January 1996
Simple network time protocol (SNTP) version 4 for IPv4, IPv6 and OSI
Recommendation
MEF 8
78
Recommendation name
Implementation agreement for the emulation of PDH circuit over metro Ethernet networks
DragonWave Inc.
Standards
Recommendation
Recommendation name
Electromagnetic compatibility and radio spectrum matters (ERM); Telecommunication network equipment; Electromagnetic compatibility (EMC) requirements
ITUT K.20
ITUT K.44
ITUT K.45
Resistibility of telecommunication equipment installed in the access and trunk networks to overvoltages and overcurrents
ITUT K.48
ITUT K.56
IEC 55022
IEC CISPR22
IEC 61000-3-2
Electromagnetic compatibility (EMC) - Part 3-2: Limits - Limitation for harmonic current emissions (equipment input current <= 16 A per phase)
IEC 61000-3-3
IEC 61000-3-11
IEC 61000-3-12
Electromagnetic compatibility (EMC) - Part 3-12: Limits - Limits for harmonic currents produced by equipment connected to public low-voltage systems with input
current > 16 A and <= 75 A per phase
IEC 61000-4-2
IEC 61000-4-3
Electromagnetic compatibility (EMC) - Part 4-3: Testing and measurement techniques - Radiated, radio-frequency, electromagnetic field immunity test
IEC 61000-4-4
Electromagnetic compatibility (EMC) - Part 4-4: Testing and measurement techniques - Electrical fast transient/burst immunity test
IEC 61000-4-5
Electromagnetic compatibility (EMC) - Part 4-5: Testing and measurement techniques - Surge immunity test
IEC 61000-4-6
Electromagnetic compatibility (EMC) - Part 4-6: Testing and measurement techniques - Immunity to conducted disturbances, induced by radio-frequency fields
IEC 61000-4-11
Electromagnetic compatibility (EMC) - Part 4-11: Testing and measurement techniques - Voltage dips, short interruptions and voltage variations immunity tests
IEC 61000-4-29
Electromagnetic compatibility (EMC) - Part 4-29: Testing and measurement techniques - Voltage dips, short interruptions and voltage variations and d.c. input power
port immunity tests
IEC 61000-6-1
IEC 61000-6-2
IEC 61000-6-3
Electromagnetic compatibility (EMC) - Part 6-3: Generic standards - Emission standard for residential, commercial and light-industrial environments
79
Standards
DragonWave Inc.
Recommendation
Recommendation name
IEC 60060-1
IEC 50081-1
IEC 50082-1
Recommendation
Recommendation name
IEC 60950-1
Implementation agreement for the emulation of PDH circuits over metro Ethernet
networks
IEC 60950-22
IEC 60529
IEC 60215
IEC 60825-1
IEC 60825-2
CENELEC EN 50385
Product standard to demonstrate the compliance of radio base stations and fixed
terminal stations for wireless telecommunication systems with the basic restrictions on the reference levels related to human exposure to radio frequency electromagnetic fields (110 MHz - 40 GHz) - General public
CENELEC EN 50265-1
Common test methods for cables under fire conditions - Test for resistance to vertical flame propagation for a single insulated conductor or cable - Part 1: Apparatus
IEC 60332-1-1
Tests on electric and optical fiber cables under fire conditions - Part 1-1: Test for
vertical flame propagation for a single insulated wire or cable - Apparatus
IEC 60332-1-2
Tests on electric and optical fiber cables under fire conditions - Part 1-2: Test for
vertical flame propagation for a single insulated wire or cable - Procedure for 1
kW premixed flame
IEC 60332-1-3
Tests on electric and optical fiber cables under fire conditions - Part 1-3: Test for
vertical flame propagation for a single insulated wire or cable - Procedure for
determination of flaming droplets/particles
CENELEC EN 502672-1
Common test methods for cables under fire conditions - Tests on gases evolved
during combustion of material from cables - Part 2-1: Procedures; determination
of the amount of halogen acid gas
CENELEC EN 502672-2
Common test methods for cables under fire conditions - Tests on gases evolved
during combustion of material from cables - Part 2-2: Determination of degree of
acidity of gases for materials by measuring PH and conductivity
CENELEC EN 502672-3
Common test methods for cables under fire conditions - Tests on gases evolved
during combustion of material from cables - Part 2-3: Determination of degree of
acidity of gases for cables by determination of the weighted average of PH and
conductivity
IEC 61034-2
IEC 60708-1
80
Recommendation
Recommendation name
DragonWave Inc.
Standards
Recommendation
Recommendation name
Equipment engineering (EE); Power supply interface at the input to telecommunications equipment; Part 2: Operated by direct current (DC)
EN50419
Marking of electric and electronic equipment in accordance with Article 11(2) of Directive 2002/96/EC (WEEE)
81
Standards
82
DragonWave Inc.