multiple-line binding, and other functional support is poor.
Application and analysis of VDSL2 technology
Although VDSL2 is not mature yet, as a competitive xDSL technology, it is still worth focusing on the technical characteristics and technical status of comprehensive VDSL2.
VDSL2 in a short distance (generally
balancing to improve the speed, distance, and stability of the line. The principle is to meet the performance and stability requirements (speed, margin, and error rate) in this case, signals are sent at the minimum power, and a series of methods are used to centrally manage, optimize various parameter configurations, and send PSD, even the Vector or bonding method is used to coordinate the sending and receiving of the same cable bundle (binder) to maximize the performance of the entire cable bu
communication quality of leased line users; other users can flow to GE upstream DSLAM equipment.
2) For DSLAM with FE upstream, if the number of users is less than 200, or in remote areas, the uplink resources are limited, the original uplink mode can be retained; if the number of users exceeds 200, you can merge multiple DSLAM users into one
resources are limited, the original uplink mode can be retained; if the number of users exceeds 200, you can merge multiple DSLAM users into one DSLAM device based on the actual situation, and use GE uplink.
3) the original use of STM-1, E1 and FE cascade DSLAM, can be removed according to the specific circumstances, and according to the above principles using d
business broadband network, the broadband access network is undergoing profound changes. On the one hand, xDSL technology gradually from adsladsl2adsl2+ to provide a higher bandwidth VDSL2 upgrades, which also requires vdsl2dslam closer to the user side. With the increase of the number of VDSL2 Zhi, the requirement of efficient aggregation of large quantities of dslam
-333) this. width = screen. width-333 ">
User network topology.
Each junction box leads to four to six wiring cables. The wiring cable is connected to the incoming cable through the "cable box. Each binning box connects 4 to 12 users. Wiring cables are directly buried. The optical fiber can be laid from the center to three different locations: To the transfer box FTTN), to the distribution box FTTC) or directly to the FTTP ). The closer the optical fiber to the user, the wider the bandwidth the
availability and sustainable development capability.
The cost is relatively low, the scale effect is obvious.
The network runs stably and is not affected by the objective environment.
High safety performance, strong maintenance capability.
The equipment has simple structure and less intermediate links.
As can be seen from the above points, wired technology has more advantages than wireless technology, especially in terms of bandwidth delivery capabilities, so the mainstream of wired techno
At present, the high-bandwidth access networking mode is mainly PON-based FTTX access. The main aspects and assumptions involved in cost analysis are as follows:
Device cost of the access segment (including various access devices and lines, and average to each first-line user)
Construction cost (including construction cost and other overhead cost, Usually 30% of the total device price)
Operation and maintenance costs (generally about 8% of the total cost per year)
Regardless of the actual instal
small DSLAM applications.
Supports ADSL2 +, VDSL2, POTS, LAN, SHDSL, and other types of broadband access; supports GE/FE, EPON/GPON, 10G-EPON, and many other uplink connections; supports point-to-point (P2P) and point-to-point (P2MP) applications, supports star, chain, ring and other networking methods.
A lot of data is mosaic.The appearance of the previous graph is long.
This is how it is split.
Well,
ATM host. LUNI is the network interface of the LAN simulation user. LEC and server are connected through LUNI and ATM. The four LEC and the server form a simulated lan lane.V. Application of ATM technology in computer communication networks II: DSLAMDSLAMDigital Subscriber Liner Access Multiplexer) is defined as a digital user line Access multiplexing, local device, to complete the convergence and distribution of ADSL Access services.The data signal uploaded by the atm
.
Introduce MPLS to the access layer
With the advancement of FTTx, on the one hand, the traditional leased line service is also faced with the dilemma of the ATM switch return. A large number of leased line services need to be accessed with high quality and quality. If a single access is built to carry this service, it will bring a huge burden to operators. On the other hand, the traditional DSLAM mode service configuration mainly uses VLAN configurat
, on the other hand, VDSL technology has unparalleled advantages in bidirectional symmetry and high bandwidth within a short distance, so people may look forward to VDSL technology. It can be said that the choice of the two technologies is very contradictory. In the long run, Using DMT modulation is the only way to develop VDSL technology. The compatibility between VDSL2 and ADSL2 + gives the industry a clear idea of DSL technology development: prior
SoftX3000 through TMG8010, the Softswitch is used to process V5 signaling and complete V5 user access. TMG8010 supports downstream V5 access. After TMG8010 ends V5 signaling, it is converted to H.248 and reported to the softswitch for processing, access V5 users.
For the voice access of traditional xDSL users, the DSLAM device enables comprehensive access to user-side voice and data, implements voice and data separation on the
In the process of construction of metropolitan Area Network, the construction of broadband access network, namely user Resident network, is a hotspot. As a form of broadband access, information community access is being widely concerned by operators. In practice, the current popular broadband access technologies are: ADSL, Ethernet, home PNA, APON, LMDS, HFC and so on, and more mature and reliable, universal implementation of access to two types: ADSL broadband access Mode (mixed-type
, authorization, billing, network management and security issues.2. ADSL AccessAt present, most of the old residential areas without integrated wiring, use of the user's existing ordinary telephone line (do not change existing user facilities) using ADSL access: The user telephone line via ADSL modem connected to the area of the DSLAM equipment, this way investment may be larger, but simple operation, Xiang see below v introduction.Third, broadband ac
.
(2) pppoe provides a dynamic IP Address Allocation Method. You do not need to configure any IP addresses, and the network management is easy to maintain. You can solve the IP address shortage problem without adding devices, it can well locate users' activities on this website.
(3) users can access the Internet by entering their usernames and passwords through free pppoe client software (such as enternet), similar to the traditional dial-up Internet access, which maximizes the user habits,
check that the user is offline. You can collect statistics on the user's duration or traffic through the establishment and release of a PPP session. The billing method is flexible and convenient.
(2) PPPoE provides a dynamic IP Address Allocation Method. You do not need to configure any IP addresses, and the network management is easy to maintain. You can solve the IP address shortage problem without adding devices, it can well locate users' activities on this website.
(3) users can access the
. There are two ways to support Ethernet users at the ADSL-NT end: one is to load PPP over Ethernet (for example, the local L2TP tunneling method ). The other is to close the PPP (and ATM) on the ADSL-NT end. The two methods are discussed below.(1) local L2TP TunnelSince PPP is designed for serial connections, it requires new ideas and technologies to work on Ethernet. A technology that extends PPP to Ethernet is a local L2TP tunnel.The ADSL-NT maps PPP groups from an L2TP tunnel (between each P
or traffic statistics, billing method is flexible and convenient.
(2) PPPoE can provide dynamic IP address allocation, the user does not need any configuration, network management maintenance is simple, no need to add equipment to solve the problem of IP address, at the same time, according to the assigned IP address, can well locate the user's activities in the network.
(3) Users through the free PPPoE client software (such as enternet), input user name and password can be used to access the
Flexible QinQ configuration for the Huawei S8500 switch I. Simple introduction of the principle although common QinQ can solve VLAN expansion and simple L2 VPN functions, however, only a fixed outer TAG can be added to a port, which cannot meet the requirements of adding different outer VLAN tags to users of different services. For example, VLAN 100 ~ 200 for a business user, the outer label 10 is required; VLAN 201 ~ 300 for another service, the outer tag 20 is required; VLAN 10 ~ 20 business r
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.