Sei sulla pagina 1di 58

Information

SURPASS hiD 6610 S311 R1.0


System Description (SYD)

A50010-Y3-B100-2-7618
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

Important Notice on Product Safety


Elevated voltages are inevitably present at specific points in this electrical equipment. Some of the
parts may also have elevated operating temperatures.

Non-observance of these conditions and the safety instructions can result in personal injury or in
property damage.

Therefore, only trained and qualified personnel may install and maintain the system.

The system complies with the standard EN 60950-1 / IEC 60950-1. All equipment connected has to
comply with the applicable safety standards.

The same text in German:

Wichtiger Hinweis zur Produktsicherheit

In elektrischen Anlagen stehen zwangsläufig bestimmte Teile der Geräte unter Spannung. Einige
Teile können auch eine hohe Betriebstemperatur aufweisen.

Eine Nichtbeachtung dieser Situation und der Warnungshinweise kann zu Körperverletzungen und
Sachschäden führen.

Deshalb wird vorausgesetzt, dass nur geschultes und qualifiziertes Personal die Anlagen installiert
und wartet.

Das System entspricht den Anforderungen der EN 60950-1 / IEC 60950-1. Angeschlossene Geräte
müssen die zutreffenden Sicherheitsbestimmungen erfüllen.

Trademarks:

All designations used in this document can be trademarks, the use of which by third parties for their
own purposes could violate the rights of their owners.

Copyright (C) Siemens AG 2005-2006.


Issued by the Communications Group
Hofmannstraße 51
D-81359 München

Technical modifications possible.


Technical specifications and features are binding only insofar as
they are specifically and expressly agreed upon in a written contract.

2 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

Reason for Update


Summary: Updated for Issue 2

Details:

Chapter/Section Reason for Update

All Documentation template changed


1.6 UL safety compliance added
2 System Overview updated
3 Mechanical Information updated
4.7.1 IGMP Snooping updated
4.8.4 Scheduling updated
4.18 Stacking added
4.19 Jumbo Frame Capacity added
5 Operation and Maintenance updated
6 Product Overview added

Issue History
Issue Date of Issue Reason for Update
Number
01 03/2005 Initial release
02 04/2006 Updated for Issue 2

A50010-Y3-B100-2-7618 3
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

This document consists of a total of 58 pages. All pages are issue 2.

Contents
1 Introduction ......................................................................................................... 8
1.1 Audience............................................................................................................. 8
1.2 Document Structure............................................................................................ 8
1.3 Protective Measures ........................................................................................... 9
1.3.1 General Notes..................................................................................................... 9
1.3.2 Protection Against Excessive High Contact Voltages....................................... 10
1.3.3 Protection Against Escaping Laser Light .......................................................... 10
1.3.4 Protection Against Fire in Racks or Housings .................................................. 10
1.3.5 Components Subject to Electrostatic Discharge .............................................. 10
1.3.6 Handling Modules (General)..............................................................................11
1.3.7 Handling Optical Fiber Connectors and Cables ................................................11
1.3.8 Virus Protection .................................................................................................11
1.4 GPL/LGPL Warranty and Liability Exclusion .................................................... 12
1.5 CE Declaration of Conformity ........................................................................... 13
1.6 UL Safety Compliance ...................................................................................... 13

2 System Overview.............................................................................................. 14
2.1 System Architecture.......................................................................................... 15
2.2 Service Scenario............................................................................................... 15
2.3 System Features............................................................................................... 17
2.3.1 System.............................................................................................................. 17
2.3.2 Functionalities................................................................................................... 17
2.3.3 Interfaces .......................................................................................................... 17

3 Mechanical Information .................................................................................... 19


3.1 Overview........................................................................................................... 19
3.2 Design............................................................................................................... 21
3.3 Interface Layout ................................................................................................ 21
3.4 Power Supply.................................................................................................... 24
3.5 Connector Assignment ..................................................................................... 25
3.6 Technical Data .................................................................................................. 26

4 Function ............................................................................................................ 28
4.1 Bridging............................................................................................................. 28
4.2 VLAN ................................................................................................................ 29
4.2.1 VLAN Stacking with Double Tagging (Q-in-Q) .................................................. 30
4.2.2 Simultaneous Support of VLANs and SVLANs ................................................ 30
4.3 Spanning Tree Protocol .................................................................................... 31
4.4 Link Aggregation ............................................................................................... 32
4.5 Flow Control...................................................................................................... 32
4.6 DHCP Relay Agent (Option 82) ........................................................................ 33
4.7 Switched Digital Video Broadcasting................................................................ 34
4.7.1 IGMP Snooping ................................................................................................ 34
4.7.2 IGMP Proxy ...................................................................................................... 35
4.8 Traffic Management.......................................................................................... 35
4.8.1 Ingress / Egress Rate Limit .............................................................................. 36
4.8.2 Class of Service................................................................................................ 36
4.8.3 Queuing ............................................................................................................ 37

4 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

4.8.4 Scheduling.........................................................................................................37
4.9 Ethernet Ring Protection (ERP) ........................................................................39
4.10 Link Layer Discovery Protocol (LLDP) ..............................................................40
4.11 Concentration and Cascading ...........................................................................40
4.12 Security..............................................................................................................42
4.12.1 Access Control Lists ..........................................................................................42
4.12.2 DOS Prevention.................................................................................................42
4.13 Routing Functionality .........................................................................................42
4.13.1 RIP Routing Protocol .........................................................................................42
4.13.2 OSPF Routing Protocol .....................................................................................42
4.13.3 BGP Routing Protocol .......................................................................................43
4.13.4 PIM-SM Routing Protocol ..................................................................................43
4.14 Redundancy ......................................................................................................44
4.15 Port Mirroring.....................................................................................................44
4.16 Temperature Controlling ....................................................................................44
4.17 Powering and Grounding...................................................................................45
4.18 Jumbo Frame Capacity .....................................................................................45
4.19 Stacking .............................................................................................................46

5 Operation and Maintenance ..............................................................................46


5.1 Network Management .......................................................................................46
5.2 Management Network Environment of hiD 6610 S311 .....................................47
5.2.1 FTP Server ........................................................................................................48
5.2.2 DHCP Server .....................................................................................................48
5.2.3 Management Operating System ACI-E EM DX R2.0 ........................................49
5.2.4 Advanced Provisioning Manager (APM-E)........................................................49
5.2.5 Configuration via Command Line Interface (CLI)..............................................49
5.2.6 Security Concept ...............................................................................................49
5.2.7 Traffic Statistics..................................................................................................49
5.2.8 Operating States and Alarms.............................................................................50
5.3 Operation, Administration and Maintenance (OAM)..........................................50
5.3.1 Remote Fault Indication.....................................................................................51
5.3.2 Link Monitoring ..................................................................................................51
5.3.3 Remote Loopback .............................................................................................52
5.4 Maintenance Manual .........................................................................................52
5.4.1 Directly Branching into Maintenance Manual ....................................................52
5.4.2 Maintenance Manual via Main Menu “Help”......................................................52
5.4.3 Maintenance Manual in PDF Format.................................................................53

6 Product Overview ..............................................................................................54

7 Abbreviations.....................................................................................................56

A50010-Y3-B100-2-7618 5
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

Illustrations
Fig. 1.1 UL Mark ......................................................................................................... 13
Fig. 2.1 SURPASS hiD 6610 S311............................................................................. 14
Fig. 2.2 hiD 6610 S311 System Architecture.............................................................. 15
Fig. 2.3 Network Service Scenario-Ring Core Network ............................................. 16
Fig. 3.1 Front View of hiD 6610 S311......................................................................... 19
Fig. 3.2 Front Interfaces of hiD 6610 S311................................................................. 21
Fig. 3.3 Interfaces of hiD 6610 S311 .......................................................................... 22
Fig. 3.4 Port Status LEDs of hiD 6610 S311 .............................................................. 23
Fig. 3.5 3W3 D-Sub Connector (DC).......................................................................... 24
Fig. 3.6 AC Power Connector (AC) ............................................................................ 24
Fig. 3.7 RPU ............................................................................................................... 25
Fig. 3.8 RJ-45 Connector ........................................................................................... 25
Fig. 4.1 802.1Q Packet Encapsulation ....................................................................... 29
Fig. 4.2 Double-Q Tagged Packet Encapsulation....................................................... 30
Fig. 4.3 Spanning Tree Protocol ................................................................................. 31
Fig. 4.4 DHCP Relay Agent - Message Flow ............................................................. 33
Fig. 4.5 IGMP Snooping ............................................................................................. 35
Fig. 4.6 Traffic Management....................................................................................... 36
Fig. 4.7 Traffic Classification ...................................................................................... 37
Fig. 4.8 Strict Priority Scheduling Mechanism............................................................ 38
Fig. 4.9 Weighted Round Robin Scheduling Mechanism........................................... 38
Fig. 4.10 Weighted Fair Queuing Scheduling Mechanism ........................................... 39
Fig. 4.11 Protection Mechanism................................................................................... 40
Fig. 4.12 Cascading with hiD 6610 S311 ..................................................................... 41
Fig. 4.13 Example of stacking configuration................................................................. 46
Fig. 5.1 Management Network Environment.............................................................. 47
Fig. 5.2 OSI Layers including OAM Support in Layer 2 ............................................. 51

6 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

Tables
Tab. 1.1 Overview of Chapters.......................................................................................9
Tab. 2.1 SFP Modules..................................................................................................18
Tab. 3.1 Status LEDs on Fast Ethernet Interface.........................................................22
Tab. 3.2 Status LEDs for Giga Ethernet Interface ........................................................22
Tab. 3.3 Operating Status LEDs on hiD 6610 S311 .....................................................23
Tab. 3.4 Status LEDs on Console ................................................................................23
Tab. 3.5 3W3 D-Sub Connector (DC) ..........................................................................24
Tab. 3.6 hiD 6610 S311 Electrical Characteristics .......................................................25
Tab. 3.7 Pin Assignment of Console port .....................................................................26
Tab. 5.1 Ethernet Statistic Counters.............................................................................50

A50010-Y3-B100-2-7618 7
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

1 Introduction

1.1 Audience
This manual is intended for SURPASS hiD 6610 S311 single-board access switch opera-
tors and maintenance personnel for providers of Fast Ethernet services. This manual as-
sumes that you are familiar with the following:
• Ethernet networking technology and standards
• Internet topologies and protocols
• Usage and functions of graphical user interfaces.

1.2 Document Structure


The following information and references provide an overview of the available documen-
tation and are intended to facilitate use of the operation documentation for the hiD 6610
S311.

The following manuals are relevant for the hiD 6610 S311 system:
• System description (SYD)
• Installation manual (IMN)
• User manual (UMN:CLI)
• Maintenance manual (MMN)
• ACI-E manual:
– Installation manual IMN for ACI-E EM DX R2.0
– Administration manual ADMN for ACI-E EM DX R2.0
– Operator Guidelines OGL for ACI-E EM DX R2.0

SYD The system description provides an overview of the structure, functions and design of the
system and its components. It provides information about the management structure and
gives a common product overview.

IMN This manual describes the equipping and mounting of the hiD 6610 S311 system and
contains an overview about the required tools and cables.

UMN:CLI The user manual is intended for those personnel involved in the configuration and super-
vision of the hiD 6610 S311. It contains step-by-step instructions for performing the vari-
ous configuration and supervision tasks by means of the command line interface (CLI).

MMN The maintenance manual contains all information of the maintenance procedures carried
out after a failure has been occurred.
This can be assisted by the special feature “Branch to Maintenance”, an ACI-E based
online help. A guideline for using this feature is described in the MMN as well and in this
system description Section 5.4.

ACI-E Manual The ACI-E manual contains all information needed for the configuration and supervision
of the hiD 6610 S311 by means of the ACI-E EM DX R2.0. It contains step-by-step in-
structions for installation (ACI-E IMN), operation (ACI-E OGL) and administration (ACI-E
ADMN) of the ACI-E EM DX R2.0.

8 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

Tab. 1.1 briefly describes the structure of this document.

Chapter Description

1 Introduction Introduces the overall information of the document and handing the
system.
2 System Overview Introduces the hiD 6610 S311 system and its components. It also
lists the features of the system.
3 Mechanical Information Describes the mechanical information of the hiD 6610 S311 system.
4 Function Describes functions of the hiD 6610 S311 system. This includes
Ethernet features, redundancy and clock supply.
5 Operation and Maintenance Describes the operation and management features of the hiD 6610
S311 system.
6 Product Overview Lists all available parts of the hiD 6610 S311 system, part numbers,
and dimensions.
7 Abbreviations Lists all abbreviations and acronyms which appear in this docu-
ment.

Tab. 1.1 Overview of Chapters

1.3 Protective Measures

1.3.1 General Notes


This section contains a summary of the most important requirements with regard to pro-
tection of people and equipment. It lays no claim to completeness. The installation in-
structions listed are shown in detail in the relevant Installation Manuals.

All assembly, installation, operation and repair work may only be undertaken by properly
trained and qualified personnel.
In the event of any injury (e.g. burns and acid burns) being sustained, seek medical help
immediately.

SURPASS hiD 6610 S311 is designed for indoor operation only and must be installed in
temperature-controlled locations. The indoor switches are intended for operation accord-
ing to EN 300 019-1-3 class 3.1E.

The system hiD 6610 S311 is intended for installation locations with access authorization.

The system is multiple power supplied:


! For completely disconnection from the power supply, note to disconnect also the redun-
dant power supply. Switch off all concerning disconnect devices!
The operating voltages are routed via the fuse panel which is located in the terminal panel
of the rack. The fuse panel contains the circuit breakers.
Make sure that the circuit breakers are switched OFF throughout installation!

Pay attention also to the high leakage current:


! Earth connection is essential before connecting the system with the telecommunication
network.

A50010-Y3-B100-2-7618 9
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

1.3.2 Protection Against Excessive High Contact Voltages


When handling the power supply or working on it, observe the safety measures described
in the specifications of the European Norm EN 50110, part 1 and part 2 (Operation of
electrical systems) and the valid national country specific standards.

1.3.3 Protection Against Escaping Laser Light


When working on optical modules, note the regulations covering radiation safety on laser
light units (EN 60825).

The following points should be noted here:


For operation in closed systems the laser light units comply with Laser class 1.

To guard against any possible hazards, all optical transmitters are equipped with an
automatic laser shutdown circuit. This trips if an input signal is missing at the relevant op-
tical receiver, e.g. if the connection is interrupted.

Note, the laser safety shutdown must be always activated.


!
This preventive measure should also be followed to avoid any damage to health by mak-
ing sure that escaping laser light is not directed towards the eye.

When breaking laser connections, the following procedure should be followed, despite the
presence of the laser shutdown circuit:
• Pull out the plug-in unit about 5 cm
• Disconnect optical fiber
• Pull out unit completely.

1.3.4 Protection Against Fire in Racks or Housings


If the system is used in housing, the system must comply with the conditions for fire pro-
tection housing according to DIN EN 60950-1.

To comply with fire protection standards as defined in DIN EN 60950-1, a protective plate
(C42165-A320-C684) must be fitted into the floor of 19-inch standard rack. The rack must
also meet the requirements of a fire-resistant housing as defined in DIN EN 60950-1.

1.3.5 Components Subject to Electrostatic Discharge


When packing or unpacking, touching, installing the switch bearing the ESD symbol, it is
essential to wear a grounding bracelet which should be grounded to a rack when working
on it. This ensures that the units are not subject to electrostatic discharge.

Under no circumstances should the printed conductors or components of modules be


touched. Take hold of modules by the edge only. In order to avoid further damage to de-
fective modules, they should be treated with the same degree of care as new ones.

Modules which are accommodated in a closed and intact housing are protected anyway.

10 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

European standard EN50082-1 provides information on the proper handling of compo-


nents which are subject to electrostatic discharge.

1.3.6 Handling Modules (General)


When working with modules, the following points should be noted:

• Existing ventilation equipment must not be changed. The sufficient air circulation
must not be obstructed.

Beware of rotating parts.


!
• All slide-in units can be removed or inserted with the power still applied. To remove
and insert the units you should use the two levers fitted to the front of the unit. A type
label is fixed to one of the two levers providing information on the hardware and
software version of the unit.

• A label with the words “HOT AREA” is fixed to hot surfaces. This indicates a severe
danger of injury.

• Cables may never be disconnected by pulling on the cable. Disconnection/connection


may only be undertaken by pushing in/pulling out the connector involved.

1.3.7 Handling Optical Fiber Connectors and Cables


Optical connectors are precision-made components and must be handled accordingly.
To ensure faultless functioning, the following points must be observed:
• The minimum bending radius for optical fibers is 30 mm!
• Mechanical damage to the surfaces of optical connectors impairs transmission quality
by higher attenuation.
– For this reason, do not expose the connectors to impact and tensile load.
– Always fit optical fiber connectors with protective caps to guard against mechanical
damage and contamination. The protective dust caps should only be removed im-
mediately prior to installation.
– Once the protective dust caps have been removed, you must check the surfaces of
an optical fiber connectors to ensure that they are clean, and clean them if neces-
sary. For cleaning, a clean, lint-free cellulose cloth or chamois leather is suitable.
Isopropyl alcohol can be used as cleaning fluid.

1.3.8 Virus Protection


To prevent a virus infection you may not use any software other than that which is re-
! leased for the Operating System (OS based on Basis Access Integrator), Local Craft
Terminal (LCT) and transmission system.

Even when exchanging data via network or external data media (e.g. floppy disks) there
is a possibility of infecting your system with a virus. The occurrence of a virus in your sys-
tem may lead to a loss of data and breakdown of functionality.

The operator is responsible for protecting against viruses, and for carrying out repair pro-
! cedures when the system is infected.

A50010-Y3-B100-2-7618 11
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

You have to do the following:


• You have to check every data media (used data media as well as new ones) for virus
before reading data from it.
• You must ensure that a current valid virus scanning program is always available. This
program has to be supplied with regular updates by a certified software.
• It is recommended that you make periodic checks against viruses in your OS.
• At the LCT it is recommended to integrate the virus scanning program into the startup
sequence.

1.4 GPL/LGPL Warranty and Liability Exclusion


The Siemens product, SURPASS hiD 6610 S311, contains both proprietary software and
“Open Source Software”. The Open Source Software is licensed to you at no charge un-
der the GNU General Public License (GPL) and the GNU Lesser General Public License
(LGPL). This Open Source Software was written by third parties and enjoys copyright pro-
tection. You are entitled to use this Open Source Software under the conditions set out in
the GPL and LGPL licenses indicated above. In the event of conflicts between Siemens
license conditions and the GPL or LGPL license conditions, the GPL and LGPL conditions
shall prevail with respect to the Open Source portions of the software.

The GPL can be found under the following URL:


http://www.gnu.org/copyleft/gpl.html

The LGPL can be found under the following URL:


http://www.gnu.org/copyleft/lgpl.html

The Open Source Software source code, including related copyright notices, can be
found under the following URL:
http://now-portal.c-lab.de/projects/

In addition, if the source code to the Open Source Software has not been delivered with
this product, you may obtain the source code (including the related copyright notices) by
sending your request to the following e-mail address: opensrc@dasannetworks.com

You will, however, be required to reimburse Siemens for its costs of postage and copying.
Any source code request made by you must be sent within 3 years of your purchase of
the product. Please include a copy of your sales receipt when submitting your request.
Also please include the exact name and number of the device and the version number of
the installed software.

The use of Open Source Software contained in this product in any manner other than the
simple running of the program occurs at your own risk, that is, without any warranty
claims against Siemens. For more information about the warranties provided by the au-
thors of the Open Source Software contained in this product, please consult the GPL and
LGPL.

You have no warranty claims against Siemens when a defect in the product is or could
have been caused by changes made by you in any part of the software or its configura-
tion. In addition, you have no warranty claims against Siemens when the Open Source
Software infringes the intellectual property rights of a third party.

Siemens provides no technical support for either the software or the Open Source Soft-
ware contained therein if either has been changed.

12 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

1.5 CE Declaration of Conformity


The CE declaration of the product will be fulfilled if the construction and cabling is under-
taken in accordance with the manual and the documents listed there in, e.g. mounting in-
structions, cable lists where necessary account should be taken of project-specific docu-
ments.

Deviations from the specifications or unstipulated changes during construction, e.g. the
use of cable types with lower screening values can lead to violation of the CE require-
ments. In such case the conformity declaration is invalidated and the responsibility
passes to those who have caused the deviations.

1.6 UL Safety Compliance


UL is the United States' original product safety certification organization. Any information
involving UL mark services is provided on behalf of Underwriters Laboratories Inc.
Throughout the world our family of companies evaluates product samples to applicable
US product safety requirements for access to any region in the United States. The UL
Mark is the most widely recognized and accepted evidence of a product's compliance
with US and Canadian safety requirements. To any consumers in the world, code and
regulatory authorities as well as manufacturers it is the most valued product safety sym-
bol. More than 17 billion UL Marks appear on new products every year.

Fig. 1.1 UL Mark

A50010-Y3-B100-2-7618 13
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

2 System Overview
Ethernet presents a ubiquitous technology for Local Area Network and Wide Area Net-
work which enjoys a high degree of standardization. Nowadays, Ethernet interfaces are
very common and widespread, with almost every network device being equipped with
some type of Ethernet interface. Due to its pervasiveness, Ethernet components are very
cost-efficient. In combination with Virtual LAN technology and/or MPLS switching,
Ethernet can deliver the same degree of QoS as required from residential and business
services that are handled today by SDH/Sonet or ATM/Frame Relay systems. Apart from
its cost-saving effects and flexibility, carrier Ethernet will allow network providers to offer
new services that can be tailored to the individual needs of the customer.

SURPASS hiD 6610 S311 is cost effective single-board Fast Ethernet switch. Based on
the latest IEEE 802.3ah Ethernet First Mile (EFM) standard, each unit within the family
has been specifically designed to fulfill a function within a carrier class Ethernet access
network. Thanks to their reliability, feature richness and cost-effectiveness, the hiD 6610
S311 can be used for a variety of new, revenue-generating applications, for example as
L2/L3 Ethernet LAN switches in high rise buildings or as DSLAM traffic consolidation and
aggregation switches. Additionally, hiD 6610 S311 switch helps to enhance network effi-
ciency through offering dedicated L3 functionality and support of IP-Multicast features to
optimize TV broadcast networks.

The hiD 6610 S311 single-board Fast Ethernet switch provides 24 electrical Fast Ethernet
interfaces of 10/100Base-T as the subscriber’s ports and 2 electrical and 2 optical GE in-
terfaces as the uplink connection. GE interfaces can be used as uplink towards the core
network or they are used either to cascade other switches. In order to use the optical up-
links separate pluggable modules (SFPs) have to be delivered for the interfaces.

The following different network scenarios with and without subtending of network ele-
ments are possible:
• Point-to-point networks
• Ring networks
• Meshed networks.

Fig. 2.1 SURPASS hiD 6610 S311

14 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

2.1 System Architecture


The hiD 6610 S311 is a single-board Fast Ethernet switch that provides 24 electrical Fast
Ethernet interfaces as a gateway in the customer premises of enterprises. And it provides
2 electrical and 2 optical GE interfaces.

A switch capacity of 13 Gbps (full duplex) allows for a throughput of 9.5 Mpps. So the
switch can handle full line rate traffic on all ports (unrestricted non-blocking switch). High
availability is providing protection of interfaces, power supplies, central control, switching
buses, and synchronization.

Fig. 2.2 hiD 6610 S311 System Architecture

The hiD 6610 S311 is a 19” rack mountable pizza type switch. The base unit provides 24
100Base-T ports with 2 SFP ports and 2 1000Base-T copper ports as uplink interfaces.
The system architecture is formed by the switching chip which supports a 24-port Fast
Ethernet with 4 Gigabit ports switch controller and 3 Octal PHYs with an 8-port 100Base-
T transceiver. One QUAD PHY is a Combo version transceiver to support SFP type con-
nection. The switching chip is connected to CPU via a 33MHz PCI bus. The Host system
includes 256 MB SDRAM, 24MB Flash, RTC, Watchdog timer, Thermal detector, FAN
failure detector, LED control circuit and other glue logic.

2.2 Service Scenario


The SURPASS hiD 6610 S311 is a part of the new SURPASS hiD 6600 product family
and part of the SURPASS Carrier Ethernet Solution. Aimed at next-generation carrier
networks, the SURPASS family provides an end-to-end packet based solution - including
various Ethernet in the first mile access options for flexible, cost effective and rapid resi-
dential and business broadband rollout, as well as high capacity, powerful metro aggrega-
tion and metro core switching infrastructure, with robust, end-to-end network and service
management.

A50010-Y3-B100-2-7618 15
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

The hiD 6610 S311 is typically serving as a gateway in the customer premises of enter-
prises. It can aggregate voice, video and data traffic and prioritize each with their own
QoS and SLA.

Fig. 2.3 Network Service Scenario-Ring Core Network

Access Integrator Ethernet (ACI-E) EM DX R2.0 is the element manager for all pieces
from Siemens carrier Ethernet solution. It enables the operators to benefit from the whole
feature set supported by the products. ACI-E supports FCAPS-functionality (fault man-
agement, configuration management, accounting management, security management
and performance management). Mass provisioning tables, topological maps and wide
network alarm tables are further value added services that facilitate operators’ daily work.

ACI-E EM DX R2.0 can also be integrated into any existing network management plat-
form via SNMP or CORBA Northbound interface, providing the wide feature set com-
prised by the element manager.

16 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

2.3 System Features

2.3.1 System
The hiD 6610 S311 supports the following system features:

• 13 Gbps switching capacity and 9.5 Mpps throughput


• 24 electrical 10/100Base-TX Fast Ethernet ports
• 2 optical 1000Base-X Gigabit Ethernet ports
• 2 electrical 10/100/1000Base-T Gigabit Ethernet ports
• Built-in with RPU support
• LED indicators
• 1 console interface for management access

2.3.2 Functionalities
The hiD 6610 S311 provides the following functionalities:

• Link aggregation acc. to 802.3ad based on MAC or IP


• Spanning tree (STP, RSTP, MSTP, PVSTP and PVRSTP)
• Ethernet ring protection (ERP)
• Cascading based on electrical and optical Gigabit Ethernet interfaces
• Enhanced L2 functionalities
• Layer 3 routing functionality (Static, RIP, OSPF, BGP, PIM-SM)
• Multicast capabilities (IGMP Proxy, Snooping, termination, filtering)
• DHCP relay agent, simplified DHCP option82 and filtering
• 8 queues per port policing and shaping
• Managing 16 K MAC addresses in MAC table
• Access control lists based on port, MAC, EtherType, IP SA/DA, IP multicast address,
L4 info
• IEEE 802.1Q tagged frame supporting 4 K VLANs
• IEEE 802.3ah EFM OAM
• VLAN single/double tagging
• VLAN translation
• VLAN mapping acc. to port, TOS/DSCP, MAC, IP SA/DA
• QoS/CoS mapping acc. to ingress port, 802.1q, 802.1p, TOS/DSCP, IP SA/DA, L4
info
• Broadcast storm control
• Link layer discovery protocol (LLDP)

2.3.3 Interfaces
The hiD 6610 S311 provides standardized interfaces, thus facilitating rapid and trouble-
free integration into the existing network infrastructures.

A50010-Y3-B100-2-7618 17
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

Network Interfaces

The following interface units are used as the network interface:

• 2 fixed electrical GE interfaces providing electrical GE uplink


– 2 x Ethernet 100/1000Base-T interfaces IEEE 802.3z compliant
• 2 fixed optical GE interfaces for SFP modules providing optical GE uplink
– 2 x Ethernet 1000Base-SX MMF interface or 1000Base-LX SMF IEEE 802.3z com-
pliant

The following different optical SFP modules are available and can be inserted into the
dedicated slots of the switch fabric. Each SFP module contains one port.

SFP Module Description

SFP-GE-SX SFP GE SX
- Wavelength : 850 nm / Distance : 550 m / Mode : multi-mode
- Connector : LC / Data rate : 1.25Gbit/s / Core type : Dual Core
- Operating Temperature : 0 °C ~ 70 °C
SFP-GE-LX10 SFP GE LX10
- Wavelength : 1310 nm / Distance : 10 km / Mode : single-mode
- Connector : LC / Data rate : 1.25 Gbit/s / Core type : Dual Core
- Operating Temperature : 0 °C ~ 70 °C
SFP-GE-LX20 SFP GE LX20
- Wavelength : 1310 nm / Distance : 20 km / Mode : single-mode
- Connector : LC / Data rate : 1.25 Gbit/s / Core type : Dual Core
- Operating Temperature : 0 °C ~ 70 °C
SFP-GE-LX40 SFP GE LX40
- Wavelength : 1310 nm / Distance : 40 km / Mode : single-mode
- Connector : LC / Data rate : 1.25 Gbit/s / Core type : Dual Core
- Operating Temperature : 0 °C ~ 70 °C
SFP-GE-ZX80 SFP GE ZX80
- Wavelength : 1550 nm / Distance : 80 km / Mode : single-mode
- Connector : LC / Data rate : 1.25 Gbit/s / Core type : Dual Core
- Operating Temperature : 0 °C ~ 70 °C

Tab. 2.1 SFP Modules

Subscriber Interfaces

The following interfaces on the subscriber side are supported:

• 24 fixed Fast Ethernet interfaces providing electrical connection.


– 24 x Ethernet 10/100Base-TX interfaces

Management Interfaces

Interfaces for management are the following:


• Console command line interface (CLI) via RS232
• Inband management via the uplink interface (SNMP v1, v2, v3)

18 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

3 Mechanical Information
The hiD 6610 S311 system is single-board Fast Ethernet switch which is installed as a
stand alone or cascaded switch with others. The hiD 6610 S311 is equipped 24 100Base-
T ports as Fast Ethernet interfaces with 4 Gigabit Ethernet ports as uplink interface. The 4
Gigabit ports were configured as two SFP ports and two copper ports.

3.1 Overview
There are 24 ports of 10/100Base-TX interfaces equipped on the front panel of the switch.
Each 10/100Base-TX port is capable of operating with 10/100Mbps full duplex or half du-
plex and full auto-negotiation with flow control capability. And auto MDI/MDI-X is enabled
for this interface.

There are 2 ports of 1000Base-TX interfaces equipped on the right side of front panel.
These 2 ports will operate only full duplex mode supported at the speed 1000Mbps. There
are 2 SFP ports of 100Base-FX or 1000Base-X interface located on the bottom of right
hand side.

The console interface is located on the front panel with embedded LED for TX/RX indica-
tion. It only supports the capability for remote management via CLI.

There are only 3 components on the rear panel. You can choose proper power supply ei-
ther AC type or DC type according to your installation environment. In case of power input
type, a universal AC-Inlet or DC-Inlet will be located on the corner and near by a switch
button. The next, there are one RPS DC input connector.

Fig. 3.1 shows the front view of the hiD 6610 S311.

Fig. 3.1 Front View of hiD 6610 S311

A50010-Y3-B100-2-7618 19
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

Interface Part

The interface part provides the fast or gigabit interfaces that mean the ports can be used
as optical or electrical port. All internal data interfaces are based on Fast Ethernet. The
distribution of Ethernet frames is provided by a Layer 2 switch.

The interface part contains the following components:


• Layer 2/3 switch
• Fast Ethernet interface
24 fast Ethernet interfaces (port 1 to 24) are provided as electrical Fast Ethernet
(10/100Base-TX) interface.
• Gigabit Ethernet interface
The hiD 6610 S311 consists of 4 Gigabit Ethernet interfaces (port 25 to 28). Each of
them is provided as optical Gigabit (1000Base-SX/LX/ZX) or electrical Gigabit
Ethernet (1000Base-T) interface.
• 1 x RS232 interface for console access

Controller Core

The hiD 6610 S311 contains the central controller function for all interfaces in the switch
and for the configuration and control of the hiD 6610 S311 on-board components. The
system internal communication is implemented as inband communication.

The hiD 6610 S311 controller core consists of the following components:
• Microprocessor including the following components:
– RAM and flash memory
– Real time clock (RTC) circuit
• Glue FPGA, which provides the system interface, interrupt processing, LED control,
I2C support, processor bus adaptation, reset control and GPIO for hiD 6610 S311
hardware control
• Digital thermometer for board temperature measurement
• A serial EEPROM for storage of product identification data

The controller core performs the following functions:


• Internal communication to all interfaces
• Central SW maintenance (including SW download)
• Central HW maintenance (including reset generation) for all interfaces on the switch
• On-board configuration, maintenance and supervision for the hiD 6610 S311
• Reset generation for all interfaces on the switch (output of the glue logic)
• Collection of performance monitoring data
• On-board fault detection (online, diagnosis, routing)

Power Supply and Fan Control

The power supply unit generates all internal voltages used on the hiD 6610 S311 by
DC/DC or AC/DC converting. The power supply and fan control block consists of a
DC/DC or AC/DC converter for the generation of unit internal voltages. The power supply
block provides power feeding for the fans.

The fan control block decides fan operation, depending on measurement results of the
switch temperature.

20 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

The DC/DC or AC/DC converter provides a power-on reset signal, which is used for the
generation of the cold reset for the board controller and glue FPGA.

3.2 Design
The hiD 6610 S311 is designed to be installed in 19” rack only. You can use a rack door to
prevent unauthorized access, and to protect against damage.

Note the following restrictions:


• Free space above the switch: 50 mm
• Free space below the switch: 25 mm
• Air flow direction: air inlet on the right side of the switch
air outlet on the left side of the switch

The hiD 6610 S311 is a front access switch meaning the interface connections are lo-
cated on the front of the single-board. Connection to the IP network uses the optical or
electrical connectors directly on the front panel. A console interface for CLI access as well
as a RJ-45 interface for the management of the system.

The hiD 6610 S311 provides single DC or AC power input with RPU, which means the
switch has a different rear panel according to its power input type.

3.3 Interface Layout

Fig. 3.2 Front Interfaces of hiD 6610 S311

A50010-Y3-B100-2-7618 21
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

Fig. 3.3 and Fig. 3.4 shows the LEDs of the hiD 6610 S311 with front access design.

Fig. 3.3 Interfaces of hiD 6610 S311

Port Status LEDs on hiD 6610 S311 for Port 1 to Port 24

The hiD 6610 S311 also uses LEDs to indicate the status of each Ethernet interface (port
1 to 24). There are two LEDs for each port. These two LEDs to indicate the status of the
Ethernet interface. The green LED “LNK” displays the line link status. The meaning of the
LEDs is shown in Tab. 3.2

Label Color Status Description

L/A Green On Link Up


(1-24) Blinking A transmit or receive activity is present on the Ethernet line.
Off Link Down
100M Amber On Ethernet transmit rate is 100Mbps.
(1-24) Off Ethernet transmit rate is 10Mbps or Link down.

Tab. 3.1 Status LEDs on Fast Ethernet Interface

Port Status LEDs on hiD 6610 S311 for Port 25 to Port 28

The hiD 6610 S311 also uses LEDs to indicate the status of each Ethernet interface (port
25 to 28). There are two LEDs for each port. These LEDs are used for line uplink informa-
tion such as link integrity, traffic activity, and transmit rate. The green LED “L/A” displays
the line link status and traffic activity, and the amber LED “1G” displays the Ethernet
transmit rate. The meaning of the LEDs is shown in Tab. 3.2

Label Color Status Description

L/A Green On Link Up


(25-28) Blinking A transmit or receive activity is present on the Ethernet line.
Off Link Down
1G Amber On Ethernet transmit rate is 1Gbps.
(25-28) Off Ethernet transmit rate is 10 or 100Mbps or Link Down.

Tab. 3.2 Status LEDs for Giga Ethernet Interface

22 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

Fig. 3.4 Port Status LEDs of hiD 6610 S311

Operating Status LEDs on hiD 6610 S311

The hiD 6610 S311 is equipped with three LEDs to indicate the operating status of the
unit. The meaning of the LEDs is shown in Tab. 3.3.

Label Color Status Description


RUN Green On The switch is starting up to boot
Blinking The switch is running without errors.
Off The switch is not supplied with power.
Amber Blinking CPU load is high.
RPU Green On The switch is supplied with power via RPU.
Off The switch is not supplied with power via RPU from RPS.
Amber On RPU error has occurred. It could be the Fan fault or thermal fault.
Blinking SPS fault occurs while RPS is providing.
DIAG Amber Blinking FAN error has occurred
Off The switch has no error

Tab. 3.3 Operating Status LEDs on hiD 6610 S311

Status LEDs on Console

The console interface connector includes two LEDs to indicate the status of the console
interface. The green LED “TX” displays a transmit activity status, and the other green
LED “RX” displays a receive activity status. The meaning of the LEDs is shown in Tab.
3.4

Label Color Status Description

TX Green Blinking A transmit activity is present on the console.


Off No transmit activity is present on the console.
RX Green Blinking A receive activity is present on the console.
Off No receive activity is present on the console.

Tab. 3.4 Status LEDs on Console

A50010-Y3-B100-2-7618 23
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

3.4 Power Supply


The hiD 6610 S311 provides single power supply either DC type or AC type with RPU, so
you can choose proper power supply according to installation environment. The power
inputs to the switch must be protected by circuit breakers in the terminal panel of the rack.

In case of DC type hiD 6610 S311, 3W3 D-Sub connector for main power supply is lo-
cated on the rear panel of the switch. For redundant power supply, the redundant power
unit (RPU) on the same place has to be used.

The hiD 6610 S311 is supplied with a voltage of 12 V regulated on the rear panel of the
switch. The power is fed to the hiD 6610 S311 via each type of power connectors on the
rear panel of the switch.

Fig. 3.5 3W3 D-Sub Connector (DC)

Fig. 3.6 AC Power Connector (AC)

Pin Main Power Supply Signal Description Electrical Interface

A1 − Not connected −
A2 M48V1 Negative input voltage -48 to -60 V DC voltage 1.6 / 1.1 A
A3 P48V1 Return of negative input voltage Connected to GND_S outside of the
system on the external power supply.

Tab. 3.5 3W3 D-Sub Connector (DC)

The power is then supplied to the switch through DC/DC or AC/DC converter located in
the switch which converts the input power to the proper voltages. The power input is fuse-
protected.

24 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

Tab. 3.6 lists the electrical characteristics of the hiD 6610 S311.

Characteristic Value

Nominal DC power supply - 48 V / - 60 V


DC power input tolerance 40.5 V to 72 V
Nominal AC power supply 100 V to 240 V (50 / 60Hz)
Max power dissipation 38 W

Tab. 3.6 hiD 6610 S311 Electrical Characteristics

The hiD 6610 S311 provides a redundant power connector which prevents unexpected
power failure. Redundant power unit (RPU) does not operate when the nominal power
voltage is fed via DC/AC power supply, but it automatically starts to run when the power
feeding via DC/AC power supply is blocked or failed.

To use the redundant power unit (RPU) on the rear panel of the switch, you should re-
move the cover. The following Fig. 3.7 shows the RPU after removing the cover.

Fig. 3.7 RPU

RPU cable has two different types of connectors. One is connected to the Redundant
Power Supply via a 12-pin 3.96” pitch wafer and the other end is connected to a small
adapter board via a 14-pin 2 x 7 3.96” RPU connector. This adapter is used to convert the
RPU from wire to the board on RPS.

3.5 Connector Assignment


LED Indicator 1)
8
7
6
5
4
3
2
1
LED Indicator 1)

Fig. 3.8 RJ-45 Connector

A50010-Y3-B100-2-7618 25
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

Tab. 3.7 shows the pin assignment of RS-232 connector.

Connector Type RJ45 DB 9

Pin Allocation 2: - RS-233 RX

3: RS-232 TX RS-232 TX

4: GND -

5: GND GND

6: RS-233 RX -

Supported Interface 10Base-T, 100Base-TX Ethernet

Tab. 3.7 Pin Assignment of Console port

3.6 Technical Data


Mechanics

Dimensions (W x H x D) 440 mm x 43 mm x 240 mm


Weight 3.6 Kg
Minimum free space above shelf 50 mm
Minimum free space below shelf 25 mm
Frequency 50/60Hz
Operating Temperature -20°C ~ 60°C
Operating Humidity Range 0% to 90% Non-condensing
Heat transfer
Air inlet − on the right side of the unit
Air outlet − on the left side of the unit

Power Supply

DC power voltage -48 V / -60 V


AC power voltage 100 V / 240 V
Maximum power consumption 38 W

Operating Indicators

System LEDs RUN / RPU / DIAG


Fast Ethernet i/f LEDs L/A, 100M
Giga Ethernet i/f LEDs L/A, 1G
Console RX / TX

Interface Parameter

Fast Ethernet i/f 24 x 10/100Base-TX (RJ-45)


Giga Ethernet i/f (electrical) 2 x 100/1000Base-TX (RJ-45)
Giga Ethernet i/f (optical) 2 x 1000Base-X (SFP)

26 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

Serial i/f, Console 1 x RS232

Certification Status

CE (Class B) EMC-CE-0728 (AC Type)


EMC-CE-0552 (DC Type)
SCR053S-021 (AC type)
SCR056S-062 (DC type)
CB (DE 3-53550)
FCC (Class A) EMC-FCC-0359 (AC Type / DC Type)
UL E216845 (AC Type / DC Type)

A50010-Y3-B100-2-7618 27
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

4 Function
The hiD 6610 S311 provides the following functions:
• Bridging
• VLAN
• Spanning Tree Protocol
• Link Aggregation
• Flow Control
• DHCP Relay Agent (Option 82)
• Switched Digital Video Broadcasting
• Traffic Management
• Ethernet Ring Protection (ERP)
• Link Layer Discovery Protocol (LLDP)
• Concentration and Cascading
• Security
• Routing Functionality
• Redundancy
• Port Mirroring
• Temperature Controlling
• Powering and Grounding
• Stacking
• Jumbo Frame Capacity

4.1 Bridging
The bridging mode of the hiD 6610 S311 is an advanced carrier mode bridging technique
which supports features suitable in Ethernet environment. Bridging provides secure and
efficient networking environment among subscribers or cascaded network elements.
Within same VLAN port isolation is guaranteed in upstream direction. With carrier mode
bridging in downstream direction, the destination MAC address of unicast Ethernet
frames is compared with the MAC table. Then the frame is forwarded to the appropriate
Ethernet port. Frames with a so far unknown destination address are discarded.

This is in contrast to standard IEEE 802.1D Ethernet bridges which would request flood-
ing to every port which is not secure in case of unicast flooding. It will also congest the
available traffic capacity with unsolicited data. In standard IEEE 802.1D bridges, broad-
cast and multicast frames are copied and forwarded to every port. With bridging tech-
nique ports of users are blocked that may never have requested any broadcast traffic. As
a result, bridging of Ethernet frames to another port is only possible, after a user has sent
an Ethernet frame towards the network and makes his MAC address known to the system
in this way.

Forwarding database (FDB) or MAC address table is updated automatically on every re-
ceived upstream packet. Every source MAC address of any Ethernet frame received from
the user side is copied into this table, because this MAC address is definitely located at
the customer premises.

The entries in the table are deleted after a certain time (default 300 seconds, configurable
by ACI-E EM DX R2.0 or CLI) unless re-used as source MAC address from any network
element. The MAC filter table contains 16K addresses together for all ports. When ex-

28 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

ceeding this limit, a further MAC address cannot be learned before one older entry is de-
leted from the MAC table due to its age. Until the first MAC address ages out of the filter
table, the system will flood all frames with a new MAC address to all ports.

As long as a certain MAC address is in use, this MAC address is associated to one
Ethernet port and not aged. It must be learned for one Ethernet port, which should be
done to prevent a MAC address from being hijacked by a malicious subscriber at least for
the duration of a session.

In bridging mode, filtering of broadcast, unicast and multicast frames allows for different
configurable rules for the customer traffic forwarding; thus e.g. in downstream direction
the broadcast messages can be prohibited from forwarding except ARP requests.

4.2 VLAN
Using VLAN technology, a bridged LAN can be virtually segmented to multiple virtual
bridged LANs. VLAN traffic is confined only to network segments that are part of this
VLAN. Traffic between VLANs is restricted. VLAN bridges will forward unicast, multicast
and broadcast frames only on VLAN ID’s member ports. Only layer 3 devices (e.g.,
router) can forward traffic between VLANs.

VLANs are used for:


• Separating traffic of logical sub-networks (e.g., IP subnets) that share the same physi-
cal bridged network.
• Identifying different logical interfaces of an IP router.
• Separating traffic of different customers sharing the same provider bridged network.
• Identifying different services within the provider bridged network.

It is defined in IEEE 802.1Q standard as follows:

Fig. 4.1 802.1Q Packet Encapsulation

VLANs are used to be assigned based on port, 802.1p priority, TOS/DSCP, protocol, MAC
address and IP source/destination addresses information. Port isolation within VLAN is
also supported by the hiD 6610 S311. VLAN operation also addresses security and traffic
isolation requirements of installations. Virtual Local Area Networks (VLANs) provide sepa-
ration of Local Area Networks (LANs) and provide broadcast/multicast control over
switched Ethernet environments. Each VLAN defines a fully separated broadcast domain.
Users assigned to specific VLAN domains can be offered more benefits from the allo-
cated bandwidth once broadcast frames generated from other users, from different VLAN
domains, are no longer forwarded to them.

A50010-Y3-B100-2-7618 29
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

4.2.1 VLAN Stacking with Double Tagging (Q-in-Q)


VLAN stacking is used mainly to increase the number of available VLANs which will help
service providers to provision more transparent L2 VPN services across the network.
VLAN stacking with double tagging solves the scalability problem of VLANs in access
networks. However as double tagging follows a hierarchical method network scalability
issues can also be handled by double tagging implementation in L2 aggregation network.

One important benefit of using VLAN stacking is that it hides and protects the customer
VLAN IDs. If a tagged packet comes from a certain port, the hiD 6610 S311 performs
forced tagging and does not change customer VLAN IDs. Double tagging is shown in the
following figure:

Fig. 4.2 Double-Q Tagged Packet Encapsulation

VLAN stacking with double tagging in the system simply adds another tag to the 802.1Q
tagged packets that enter the network. The purpose is to expand the VLAN space by tag-
ging the tagged packets, thus producing a "double-tagged" frame. The expanded VLAN
space allows the service provider to provide certain services over the entire network (L2
metro Ethernet aggregation and core network), such as Internet access on specific
VLANs for specific customers, and yet still allows the service provider to provide other
types of services such as (E-Line, E-LAN, BTV, VoD, VoIP) for their other customers on
other VLANs.

Generally the service provider's customers require a range of VLANs to handle multiple
applications. Service providers can allow their customers to use this feature to safely as-
sign their own VLAN IDs on subscriber interfaces because these subscriber interface
VLAN IDs are encapsulated within a service-provider designated VLAN ID for that cus-
tomer. Therefore there is no overlap of VLAN IDs among customers, nor does traffic from
different customers become mixed.

VLAN Translation

The hiD 6610 S311 supports VLAN translation for untagged packets. VLAN translation
can be used to do flexible service multiplexing based on Ethernet type, 802.1p or incom-
ing VLAN ID.

4.2.2 Simultaneous Support of VLANs and SVLANs


Single tagged frames or double tagged frames can be sent simultaneously dependent on
the application at the uplink ports of the hiD 6610 S311. All frames are already single
tagged through the interface unit. The chip on the hiD 6610 S311 is programmed in the
double tagged mode. That means that always a SP-VLAN (Service-provider VLAN) is

30 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

added to the received frame. If there is an untagged frame received then the SP-VLAN is
added and the frame is sent tagged with that SP-VLAN. It is also possible to translate the
SP-VLAN into another SP-VLAN through the FFP (Fast Filtering Processor). For already
tagged frames the same procedure is applied and the frame is sent with two tags.

For the mixed operation it is necessary now, to adjust for dedicated ports that the frame is
sent without outer tag. The broadcom switching chip offers the possibility in the VLAN ta-
ble to configure for each VLAN ID if the frame can be transmitted without a tag header or
with a tag header. Therefore it is possible to send single tagged frames where the single
tag is already set through the interface unit in parallel to double tagged frames.

4.3 Spanning Tree Protocol


Spanning-Tree Protocol (STP) as defined in IEEE 802.1D is a link management protocol
that provides path redundancy while preventing undesirable loops in the network. For an
Ethernet network to function properly, only one active path can exist between two stations.
Loops occur in networks for a variety of reasons. The most common reason you find
loops in networks is the result of a deliberate attempt to provide redundancy in case one
link or switch fails, another link or switch can take over.

Router/Switch

Router/Switch Router/Switch

STP running

Uplink Uplink

hiD 6610

Fig. 4.3 Spanning Tree Protocol

STP is a technology that allows bridges to communicate with each other to discover
physical loops in the network. The protocol then specifies an algorithm that bridges can
use to create a loop-free logical topology. In other words, STP creates a tree structure of
loop-free leaves and branches that spans the entire Layer 2 network.

Operators might connect hiD 6610 S311 to different switches to provide a full redundant
path towards the ISP. One potential problem can be the occurrence of loops in such to-
pologies. Loops could be generated by broadcast traffic. An example is the mechanism of
the Address Resolution Protocol, ARP. Users send ARP requests in L2 domains to learn
the destination MAC address from a specific IP host they want to access. This request is
a broadcast frame that is flooded into every interface from a specific LAN or VLAN do-
main. Let’s assume that the switch is connected to 2 switches. It forwards the ARP re-

A50010-Y3-B100-2-7618 31
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

quest generated by the user to one switch which sends this request to all interfaces ex-
cept to the interface where the request was first received (interface connected to the
switch) – normal switching procedure. At some point, the other switch also connected to
the switch, might receive the same request from another interface. This request will then
be flooded into all other interfaces and, consequently, reach the switch. The sequence
starts again and the loop has been established.

Spanning Tree Protocol, Rapid Spanning Tree and Multiple Spanning Tree are mecha-
nisms supported by the hiD 6610 S311 which avoid such loops in the network.

4.4 Link Aggregation


Link Aggregation is an Ethernet feature that allows the grouping of multiple physical inter-
faces as one single logical interface. The traffic load is shared between the physical links
and rerouted to the remaining links in case of failure of one or more physical links. The
link aggregation standard defines LACP protocols for the communication between both
link aggregation peers. The purpose of LACP is to provide automatic configuration of ag-
gregation groups. LACP is a state full peer-to-peer protocol. No commands are ex-
changed but states. LACP operates on a per-link basis and treats each link independently
of any other. State information is exchanged periodically. The LACP control packets are
trapped by the software according to their well known multicast destination address and
processed by the Ethernet application software on the hiD 6610 S311. LACP uses peer
exchanges across links to determine, on an ongoing basis, the aggregation capability of
various links, and continuously provides the maximum level of aggregation capability
achievable between a given pair of systems. LACP automatically determines, configures,
binds and monitors the binding of ports to aggregators within the system.

The implementation is based on IEEE 802.3ad standard and allows to aggregate up to 8


ports to one logical group.

4.5 Flow Control


Flow control as described in IEEE 802.3x is supported by both Broadcom switching chip
and Conexant Columbia.

The switch is able to handle 802.x flow control request coming from other interfaces. For
that it is needed to perform the “Receive Operation” role, as it described in IEEE 802.x,
318.3.3. The hiD 6610 S311 with Broadcom switching chip has not enough memory ca-
pacity to store all upstream data to be forwarded during a PAUSE condition. So the
PAUSE request and all other 802.3x flow control requests should be forwarded to the in-
terfaces in order to let the interfaces block/forward the traffic. On the interfaces the traffic-
to-memory ratio is much better, which decreases the probability to loose any traffic.

Unicast and multicast addressing is accepted.

32 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

4.6 DHCP Relay Agent (Option 82)


A possibility to authenticate the subscribers and assign them an IP address is the func-
tionality DHCP relay agent option 82. This option is required for operators that don’t want
to deploy Broadband Remote Access Servers (BRAS) in their networks. Dynamic Host
Configuration Protocol (DHCP) implementations support host configuration (assignment
of IP address, default gateway, DNS) but do not allow operators to authenticate the users,
once no user information is forwarded in the request. To allow authentication, switches
support DHCP relay agent option 82. This standard defines methods for adding informa-
tion about the port/users to the regular DHCP request, so that the operator can uniquely
identify the subscriber and authenticate him to use the service.

Benefits:
• Enhances security by DHCP server access rights
• Logging of user access data can be used for network optimization purposes and for
error tracking
• Number of users per port can be easily restricted
• Prevents MAC spoofing
• Simplifies user authentication and reduces network costs, since more costly BRAS
functionality is not needed in the network

Fig. 4.4 DHCP Relay Agent - Message Flow

A50010-Y3-B100-2-7618 33
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

Before any client connected to the switch via Ethernet successfully requests an IP ad-
dress via DHCP, forwarding of Ethernet frames is not possible. The client initially broad-
casts a DHCP-REQUEST message on his local LAN. This broadcast is sent to the switch
and processed by the DHCP relay agent. The DHCP relay agent relays the request add-
ing an options field (Agent Remote ID or Agent Circuit ID) to notify the DHCP server on
which of the switch’s interfaces this DHCP request has originally been received. With this
information the DHCP server is able to perform a basic user authentication and to provide
host configuration data for the client.

As you know, DHCP option 82 is used in Layer 3 network only. SURPASS hiD 6610 S311
provides DHCP Option 82 function in Layer 2 interface. User is able to enable DHCP op-
tion 82 function in Layer2 with simplified DHCP option 82 command. You can use simpli-
fied-option82 function when DHCP-relaying/assigning DHCP IP address using option82
field (remote-id and circuit-id) in Layer 2 network without having the complex DHCP relay
agent configured.

4.7 Switched Digital Video Broadcasting


The hiD 6610 S311 supports video broadcasting. The complete implementation consists
of the video head-end, which encapsulates and transports the video streams using
UDP/IP transport protocol, hiD 6610 S311 containing the Gigabit Ethernet interfaces and
operating the multicast, and the set-top box terminating the subscriber’s line at the cus-
tomer’s home.

The hiD 6610 S311 provides multicast capabilities by implementing IGMP snooping or
IGMP proxy. The basic difference between both is that in the IGMP snooping implementa-
tion, the switch is transparent to the IGMP router which receives from the same interface
requests from different users, whereas in IGMP proxy implementations, the IGMP router
sees the switch as one single user requesting multiple channels.

The hiD 6610 S311 supports IGMP v2, which defines the following messages:

Switch/router to set-top box:


• General query
• Group-specific query

Set-top box to switch/router:


• Membership report
• Leave group

4.7.1 IGMP Snooping


In IGMP snooping implementations, messages are generated from the STB and from the
multicast router located on the edge of the IP network. The system only snoops the IGMP
requests from the users. All messages are forwarded to the multicast/IGMP router. By
snooping the messages the system can notice which channels do the users want to sub-
scribe to. By doing so, the system can replicate channels currently being delivered to new
requesting users.

IGMP snooping is a method by which Layer 2 switches can “listen in” on IGMP conversa-

34 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

tions between hosts and routers. When a switch hears a group join message from a host,
it notes which switch interface it heard the message on, and adds that interface to the
group. Similarly, when a Layer 2 switch hears a group leave message or a response timer
expires, the switch will remove that host’s switch interface from the group. IGMP snooping
can provide a simply yet effective means of reducing unwanted traffic from the network. If
hiD 6610 S311 enable globally with IGMP snooping, it will forward IP multicast traffic only
to interfaces with group members attached.

IGMP
Snooping

IGMP
Snooping

There are no multicast client on line card 2

Client – Line card - switch

Fig. 4.5 IGMP Snooping

4.7.2 IGMP Proxy


In IGMP proxy implementations, the hiD 6610 S311 terminates the IGMP requests origi-
nated from the users and replicates them to the multicast/IGMP router pretending to be
the client. By doing so, the system spares the number of MAC addresses that have to be
learned in the L2 metropolitan network. It also allows most popular channels to be deliv-
ered constantly to the system without receiving requests from the users, decreasing sig-
nificantly the zapping time for these channels but still saving resources from the L2 met-
ropolitan network. The subscriber is assigned one or more channel packages.

4.8 Traffic Management


Traffic management assures the quality of service and the flexibility to allocate bandwidth
to the desired service/user meeting the service level agreements agreed between opera-
tors and end users.

The mechanisms supported by the hiD 6610 S311 to provide traffic management are in-
put rate limit, CoS, queuing and scheduling mechanisms.

A50010-Y3-B100-2-7618 35
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

Classification Metering/Marking Queue Queuing


Policing/Shaping Manager Scheduling

Flow1 Meter Queue1


Shaper
Marker Policer
Flow2 Queue2

Flow3 Meter Queue3

Classifier
Shaper
Flow4 Marker Policer Queue4

Flow5 Meter Queue5


……

Shaper
Marker Policer Queue6

Flow... Queue7
Meter
Shaper Queue8
Marker Policer

Fig. 4.6 Traffic Management

4.8.1 Ingress / Egress Rate Limit


The hiD 6610 S311 utilizes two types of rate limit: ingress rate limit and egress rate limit.
Ingress rate limit can be used to process ingress traffic, while egress rate limit works
egress traffic. Ingress traffic is policed, and egress traffic is shaped using the rate limiter
in steps of 64 kbps.

The rate limiting can be set for a port.

4.8.2 Class of Service


The hiD 6610 S311 supports CoS based on IEEE 802.1p. This L2 standard reserves 3
bits for QoS settings. Up to 8 priorities can be configured using these bits. The CoS clas-
sifies and assigns the packets to output queues of differing priority. These queues are
supported by the switches in the L2 domain.

The hiD 6610 S311 supports a flexible way of setting these priority bits:
• Port based
• L2 based (MAC, IEEE 802.1p, Ether type, VLAN)
• IP based (ToS/DSCP, IP DA, IP SA)
• L4 based (TCP/UDP)

36 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

1. Physical Port Number

2. MAC Address and EtherType


Type/Length
MAC-DA(6B) MAC-SA(6B) IP Datagram FCS
(2B)

3. IEEE 802.1p and VLAN ID


Prior VLAN ID Type/Length
MAC-DA(6B) MAC-SA(6B) TPID CFI IP Datagram FCS
(3b) (12b) (2B)

4. IP Address
Type/Length
MAC-DA(6B) MAC-SA(6B) IP-SA(4B) IP-DA(4B) FCS
(2B)

5. TCP/UDP Port Number


Type/Length
MAC-DA MAC-SA IP-Datagram TCP/UDP Port Number FCS
(2B)

Fig. 4.7 Traffic Classification

4.8.3 Queuing
Queues are located in the switch. The hiD 6610 S311 supports 8 queues. The traffic is
distributed to the different queues based on the 802.1p settings and delivered according
to the scheduling mechanisms. PAUSE frames can be sent to the interfaces in case of
congestion.

4.8.4 Scheduling
Traffic management of the hiD 6610 S311 supports policing (rate-control) of ingress traffic
to equal or lower than the physical line rate. It also supports shaping (i.e., rate-control and
buffer) of egress traffic. Rate limitation is done in 64 kbps steps and determines whether
or not a frame is forwarded, discarded, or forwarded with some higher drop precedence in
case of a filled queue. At the network interface 8 queues can be utilized by a strict priority
scheduler only. There are two side effects of this strict priority queuing scheme. In case of
oversubscription traffic could suffer from starvation. The other side effect is that traffic in
higher-priority queues interferes with other traffic in lower-priority queues with the result
that the lower-priority traffic may be delayed longer due to the unfairness of the strict pri-
ority scheme. When mapping services to queues, voice should become the highest prior-
ity, and then video/multicast traffic. Regular IP data should be carried forward as best ef-
fort and some “silver” or other data traffic should be handled between voice and best ef-
fort.

8 queues can be bidirectionally utilized. The scheduler can be set to work as a SP (Strict
Priority), WRR (Weighted Round Robin) or WFQ (Weighted Fair Queuing).

A50010-Y3-B100-2-7618 37
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

Fig. 4.8 Strict Priority Scheduling Mechanism

If more than one priority queue exists for each port, Strict Priority (SP) scheduling is the
simplest to implement. Whenever the outgoing link is available for a new packet, the
highest priority queue is examined. If there is a packet ready to be sent out in this queue,
it is selected. Otherwise, the next most important queue is examined, and so on, until the
highest priority packet is found. The most obvious problem with strict priority is that low
priority queues can be starved out and not allowed to send any packets. As long as
higher priority packets arrive faster than the outgoing link send packets, no lower priority
packets will be sent out.

Fig. 4.9 Weighted Round Robin Scheduling Mechanism

Weighted Round Robin (WRR) is one of the mechanisms for output scheduling on the hiD
6610. WRR allows the bandwidth between queues to be distributed according to weights.
Every time a non-empty queue is examined, it may send as many packets as its weight
indicates. Here, each queue has bandwidth allocated when all other queues have been
visited according to their weights. Again, in WRR, there is only one metric to adjust per
queue - its weight. The queues for WRR are emptied in a round-robin fashion, and you
can assign the weight 1 value to 15 for each queue or unlimited weight. By default, ports
have 8 queues on the hiD 6610.

Fig. 4.9 shows a WRR mechanism which providing the service with the number of pack-
ets ratio. The high-number weight of queue sends one more packet than the two other
queues.

38 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

Fig. 4.10 Weighted Fair Queuing Scheduling Mechanism

Weighted Fair Queuing (WFQ) is called one of the most complex traditional schedulers
based on bandwidth algorithm handling variable length packets. The behavior of WFQ at-
tempts to emulate GPS (General Processor Sharing). Each packet is tagged on the in-
gress with a value identifying the time that the last bit of the packet should be transmitted
according to GPS. This value is set through complex calculations based upon the current
queue contents and configured weights. Each time the port is available to send a packet,
the packet with the lowest tag value is selected. However, WFQ has the advantage over
SP and WRR of having a time-awareness built into the algorithm.

4.9 Ethernet Ring Protection (ERP)


The ERP is a Siemens protection protocol and procedure to protect Ethernet ring topolo-
gies. ERP provides for optimal loop prevention and optimal failover performance of a ring
configuration optimized for fast failure detection and recovery on Ethernet rings.

The ERP is implemented in Siemens Carrier Ethernet Products which are part of the
metro network ring configurations.

The main characteristics of the ERP are as follows:


• It requires no additional underlying protection mechanism within the ring configuration,
the complete functionality is implemented on the interface units of the system and
does not require additional dedicated hardware which may raise network complexity
and costs
• It is a unique robust functionality which runs on every network element involved in the
ring configurations (SURPASS switches and SURPASS DSLAMs). It means each
system is active part of the ring protection mechanism. Therefore it guarantees a
maximum of 50 msecs to switchover towards a new configuration after link or system
failures.

The failure detection is done on two different methods:


• Fast detection is based on the active elements which detects and reports every
network failure immediately towards a Master ERP system which initiates the
switchover to the new ring configuration.
• Slow detection of failures occurs due to the loopback packets which are send in the
ring configuration continuously. These packets are sent by the ring master within a
certain time interval (e.g. 10 msec) to check the ring integrity. If a malfunction of the
ring is detected a recovery procedure is started and the ring will be reconfigured like it

A50010-Y3-B100-2-7618 39
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

is done with fast detection mechanism.


!
Link down

!
Link down

Master ERP Switch


ERP: Failure Detection
Ring
reconfiguration

Ring
reconfiguration

Master ERP Switch

ERP: Ring reconfigured

Fig. 4.11 Protection Mechanism

Fig. 4.11 illustrates the protection mechanism. In the case of a failure between two net-
work elements involved in the ring configurations, a ring reconfiguration will be done.
Then the packets can be sent over the connections between the other network elements
involved in the ring configurations.

4.10 Link Layer Discovery Protocol (LLDP)


The harmonious operation of the various networking devices in a LAN requires correct
and valid configuration of the protocols and applications that are enabled in these devices.
As the numbers and type of devices enabled in a LAN steadily increase, it is difficult for a
network or IT manager to statically monitor and configure each device on a network. At
the same time, it takes IT managers a significant amount of time to find and rectify con-
figuration problems.

An emerging standard, dubbed the IEEE 802.1ab Link Layer Discovery Protocol (LLDP),
provides a solution for the configuration issues caused by expanding LANs with the hiD
6610 S311.

4.11 Concentration and Cascading


The hiD 6610 S311 can concentrate multiple switches in order to spare the number of
FE/GE interfaces connected to the metropolitan network.

40 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

The hiD 6610 S311 provides 4 Gigabit Ethernet interfaces with optical and electrical inter-
faces. Any interface can be configured as a network interface, connecting the switches to
the metropolitan network, or as a user interfaces, aggregating switches and/or other
DSLAMs towards the network. Moreover, multiple physical interfaces can be configured
as one logical interface using LACP (link aggregation control protocol). These “bundled”
interfaces can also be configured as user or network interfaces allowing the operator to
flexibly assign more bandwidth towards the user/network. To aggregate collocated
switches, electrical interfaces can be used whereas to aggregate remote switches, optical
interfaces can be used.

The hiD 6610 S311 supports star topologies, tree topologies and chain topologies. There
is no fixed limitation regarding the number of switches that can be cascaded to a master
switch. The limitation is actually the available bandwidth and the number of MAC ad-
dresses that can be learnt by the master switch (16K). Please mind that physical inter-
faces from different groups can’t be grouped as one logical interface.

Router/Switch

Router/Switch
Router/Switch Router/Switch

Router/Switch Router/Switch

hiD 6610 Uplink

Uplink Uplink

hiD 6610 hiD 6610 Uplink Uplink

hiD 6610 hiD 6610

Router/Switch Router/Switch

Uplink

hiD 6610

Fig. 4.12 Cascading with hiD 6610 S311

A50010-Y3-B100-2-7618 41
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

4.12 Security

4.12.1 Access Control Lists


Access Control Lists are rules that can be configured in network elements to allow or
deny the forwarding of specific traffic. The hiD 6610 S311 supports ACLs which can be
configured based on different parameters:
• Port
• MAC Address (list, range)
• Ether type
• Destination and source IP address
• L4

4.12.2 DOS Prevention


To avoid DOS Attacks and MAC spoofing the following mechanisms are implemented:
• Limiting of the number of MAC addresses per port
• Storm control
• Suppression of broadcast and multicast frames
• Port isolation (i.e. avoids connectivity between subscriber ports)

4.13 Routing Functionality


To improve the scalability of the switched network and enhance the possibilities of han-
dling traffic L3 routing functionalities are introduced. This includes static routing, RIP ver-
sion 1 and 2, OSPF and BGP version 4.

4.13.1 RIP Routing Protocol


Routing Information Protocol (RIP) is a relatively old, but still commonly used, interior
gateway protocol (IGP) created for the use in small, homogeneous networks. It is a clas-
sical distance-vector routing protocol using hop counts. RIP is documented in RFC 1058.

RIP uses broadcast user datagram protocol (UDP) data packets to exchange routing in-
formation. The hiD 6610 software sends routing information updates every 30 seconds.

The metric that RIP uses to rate the value of different routes is hop count. The hop count
is the number of routers that can be traversed in a route. A directly connected network
has a metric of zero; an unreachable network has a metric of 16. This small range of met-
rics makes RIP an unsuitable routing protocol for large networks. The hiD 6610 S311
supports RIP version 1 and 2.

4.13.2 OSPF Routing Protocol


Open Shortest Path First (OSPF) is an IGP developed by the OSPF working group of
Internet Engineering Task Force (IETF). This routing protocol is based on link-state rout-
ing algorithm.

42 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

OSPF has been designed for IP networks including the support of Classless Inter-Domain
Routing (CIDR) and the tagging of externally-derived routing information. Moreover, it
provides the authentication of routing updates and transmits/receives routing information
using IP multicast. It is most convenient to operate OSPF on a layered network.

The hiD 6610 S311 supports OSPF version 2 (RFC 2328).

4.13.3 BGP Routing Protocol


Border Gateway Protocol (BGP) is, as defined in RFC 1163, 1267, an exterior gateway
protocol (EGP) to connect to an exterior network. BGP manages routing information in a
network so that any autonomous system (AS) can transmit and receive routing informa-
tion. BGP consists of the network number, the information which packet is passed through
and the autonomous system number.

The hiD 6610 S311 supports BGP version 4 defined in RFC 1771. BGP version 4 pro-
vides an aggregate route by using CIDR to reduce the size of the routing table. CIDR
provides the IP prefix which is the network address instead of the IP address on the BGP
network. OSPF and RIP can also transmit CIDR paths.

4.13.4 PIM-SM Routing Protocol


Protocol Independent Multicast-Sparse Mode (PIM-SM) is a protocol for efficiently routing
to multicast groups that may span wide-area (WAN and inter-domain) internets. PIM-SM
is not dependent on any particular unicast routing protocol, and is designed to support
sparse groups. PIM-SM uses the traditional IP multicast model of receiver-initiated mem-
bership, supports both shared and shortest-path trees, and uses soft-state mechanisms
to adapt to changing network conditions.

PIM-SM was designed to support the following goals:


• Maintain the traditional IP multicast service model of receiver-initiated multicast group
membership.
• Leave the host model unchanged. PIM-SM is a router-to-router protocol, which
means that the hosts don't have to be upgraded, but that PIM-SM-enabled routers
must be deployed in the network.
• Support both shared and source distribution trees.
• Maintain independence from any specific unicast routing protocol (see above).
• Use soft-state mechanisms to adapt to changing network conditions and multicast
group dynamics. Soft-state means that, unless it is refreshed, the router's state con-
figuration is short-term and expires after a certain amount of time.

A50010-Y3-B100-2-7618 43
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

4.14 Redundancy
Power Supply Redundancy

The power feeding of the hiD 6610 S311 is provided by two types of power supply con-
nector, which are nominal DC/AC power supply connector as a main power and external
Redundant Power Unit (RPU) connector. A failure of the feeding line (e.g. due to an ex-
ternal fuse break) does not cause a system breakdown.

4.15 Port Mirroring


Port mirroring is a method of monitoring network traffic that forwards a copy of each in-
coming and outgoing packet from one port of a network switch to another port where the
packet can be studied. A network administrator uses port mirroring as a diagnostic tool or
debugging feature, especially when fending off an attack. It enables the administrator to
keep close track of switch performance and alter it if necessary. Port mirroring can be
managed locally or remotely.

An administrator configures port mirroring by assigning a port from which to copy all
packets and another port where those packets will be sent. A packet bound for or heading
away from the first port will be forwarded onto the second port as well. The administrator
places a protocol analyzer on the port receiving the mirrored data to monitor each seg-
ment separately. The analyzer captures and evaluates the data without affecting the client
on the original port.

The monitor port may be a port on the same Switch Module with an attached RMON
probe, a port on a different Switch Module in the same hub, or the Switch Module proces-
sor.

Port mirroring can consume significant CPU resources while active. Better choices for
long-term monitoring may include a passive tap like an optical probe or an Ethernet re-
peater.

Both the received and transmitted packets on the mirrored ports can be sent to the mir-
rored-to ports. The type of traffic that gets mirrored is programmable. The amount of traf-
fic sent to the mirrored-to port can be controlled by setting up additional rules, such as:
• Forward ingress only: Frames coming from a specified port.
• Forward egress only: Frames going out on a specified port.

4.16 Temperature Controlling


The hiD 6610 S311 supports heat management with temperature controlled fans.

The targets of heat management are:


• to guarantee a sufficient forced ventilation in all traffic situations and under all re-
quired environmental conditions.
• to guarantee the desired turn-on characteristics under all required environmental
conditions, and especially an improved cold start of the system.
• to minimize the background noise produced by the system.
• to minimize the mechanical stress on the fans and so prolong the operational life of
the fans.
• to supervise the proper operation of all fans and to generate an alarm when a fault
has been detected.

44 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

Forced Ventilation

Forced ventilation is carried out by two fan units which contain four independent fans re-
spectively. All fans are mounted in a replaceable unit. A single fan failure does not force
the complete switch off of the other fans, so forced ventilation will be reduced for the
complete shelf. During replacement time, forced ventilation will be reduced for the com-
plete shelf due to the missing fan unit.

The fan unit is equipped on the left side of the switch. The air inlet is on the right side of
the switch, and the air outlet is on the left side of the switch. The fans are controlled in
accordance with the measured temperature inside the system. The temperature sensor is
located in the system, and the measured values are evaluated and the operation of the
fan controlled accordingly. All fans receive the same fan voltage

Temperature Management

Beside the fan control there is additional temperature management to prevent the system
for overheating. The hiD 6610 S311 has a temperature sensor and can read its sensors
only via its own processor. This means that necessary decisions about temperature can
be made and temperature information provided to the management system even in cases
of minimum system availability. If the temperature exceeds the upper limit, the system
sends SNMP trap message.

4.17 Powering and Grounding


The hiD 6610 S311 contains two power inputs (+/−48/60 VDC or 100/240 VAC as main
power supply and 12 VDC as redundant power supply). These two power supply connec-
tors are located on the rear panel of hiD 6610 S311. Each of the power inputs is con-
nected with the local power supply via a separate fuse, located in the rack outside the
switch.

The supply voltage is potential free. To ensure that the EMC requirements are met, the
DC/DC converter has a filter unit with the EMC filters for input voltages. An over-voltage
protection is located behind the EMC filter unit to minimize the voltage peaks caused by
surges on the DC/AC input.

4.18 Jumbo Frame Capacity


Jumbo Frame support is designed to the enhance Ethernet networking throughput and
significantly reduce the CPU utilization of large file transfers like large multimedia files or
large data files by enabling more efficient larger payloads per packet. By sending larger
payloads per packet, fewer packets need to be routed, reducing the overhead on the CPU
and potentially improving networking throughput.

SURPASS hiD 6610 S311 allows the sending and receiving of jumbo frame size packets
which are up to 6 times the size of standard Ethernet packets. The hiD 6610 S311 sup-
ports the default Jumbo Frame which delivers up to 9000 byte packets instead of a 1518
byte packet for standard Ethernet, which consists of a 1500 byte payload + 14 bytes for
header + FCS (Frame Check Sequence) 4 bytes.

A50010-Y3-B100-2-7618 45
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

4.19 Stacking
Switch stacking technology available in the industry today provides two main benefits to
customers. The first benefit is the ability to manage a group of switches using a single IP
address. The second benefit is the ability to interconnect two or more switches to create a
distributed fabric, which behaves in the network as a unified system. The hiD 6610 S311
provides the stacking technology’s benefits for the customer.

Switch

Internet

Master Switch
Switch Switch
Switch A
Manage with the same
IP address

Slave Switch

Switch B

Slave Switch

Fig. 4.13 Example of stacking configuration

5 Operation and Maintenance

5.1 Network Management


Carrier Ethernet networks encompass a considerable diversity of network element types
and corresponding technologies which have to be properly managed in order to ensure
that the various service types are provided to both the residential and business customer
segments.

There can be distinguished between the following main operational tasks:


• Network provisioning - which means setting up the network topology including VLAN
management prior to service provisioning
• Service provisioning, in the following also called service management which means
provisioning of end user services by configuring the subscriber port, assigning or con-
figuring the VLAN and assigning the customer.
• Network supervision - where events about errors in the equipment are shown in
alarm lists, in the topology map and correlated to VLAN and services.

In carrier Ethernet networks, the operation of the network is supported by a modular solu-
tion comprising an element management and a network management.

46 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

This means that some configurations are intentionally not supported in the network man-
agement system, since the concept is that the operator invokes these configurations at
the element management system via a GUI cut-through. In most – if not all – cases the
specified function split is derived from the following set of guidelines:
• All configuration done once only (e.g. during hardware installation) shall be done via
the Access Integrator Ethernet element manager (ACI-E) EM DX R2.0.
• All configuration specifically related to end-to-end topology shall be done via the
Advanced Provisioning Manager Ethernet (APM-E)
• All configuration specifically related to service provisioning shall be done via APM-E
• Configuration related to end-to-end topology or service provisioning, but not depend-
ing on the individual end-to-end connection or service, shall be preconfigured via the
ACI-E EM DX R1.0 and/or CLI scripts (where applicable).

5.2 Management Network Environment of hiD 6610 S311


The hiD 6610 S311 requires a management network environment in order to properly
manage the system. Fig. 5.1 illustrates an example management network environment.

(T)FTP server(s) Configuration


necessary for (Database)
SW download
but might be not
Data Operator’s Operating system
connected persistent
(Software) Network controls the NEs
(Protected) via SNMP or
Telnet/CLI
DHCP/Bootp server
necessary for startup
but might be not
Router
available persistent
Inband or separate
management channel

hiD 6610 S311


LCT with optional
(T)FTP and opt.
Bootp server

Fig. 5.1 Management Network Environment

The hiD 6610 S311 can connect to the management network through the access network
(inband). It can even connect using a combination of the two; for example, a cascaded
hiD 6610 S311 connects inband to the cascading switch, and then from the cascading
switch to the management network through the interface. Through the management net-
work, the hiD 6610 S311 can connect to the following:
• FTP server(s)
• Management operating system

These server functions can exist on a single server host, but for larger networks, you
should divide these functions among several hosts. Your network system may require ad-
ditional servers to host, for example, a primary domain controller, CORBA naming service,
or other network infrastructure services.

The inband management is configured via a dedicated VLAN – say VLAN ID which is as-

A50010-Y3-B100-2-7618 47
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

signed for the hiD 6610 S311 by default. This management VLAN is terminated in the
system. The service class for the VLAN is EF, or user_priority = 7. When installing a new
network element during the basic setup if necessary the VLAN ID has to be configured
accordingly via LCT.

The network operator has to ensure correct VLAN membership for all relevant NNI ports
throughout the entire network. This can be done using ACI-E EM DX R2.0 or LCT.

For security reasons, the inband VLAN ID must not be assigned to the subscriber ports.

5.2.1 FTP Server


The hiD 6610 S311 needs access to an FTP server. The FTP server stores configuration
information for the hiD 6610 S311. It is also used to backup the database and store logs
and other data uploaded from the system. The following information is stored on the FTP
server:
• Configuration file
This file identifies the location of the FTP servers, configures routing tables, and de-
fines management OS access.
• Database backup
The hiD 6610 S311 database is backed up to this server.
• Log files
Through the management OS you can command the hiD 6610 to upload log files and
other data to the FTP data server. This enables you to access and analyze the data.

The FTP server is used as a repository for the hiD 6610 S311 software loads. When you
need to load new software for hiD 6610 S311, you can download the software from the
FTP server.

The application program SW (APS) of a whole access network is provided on a software


FTP server. On this server may be one or more APS with all required files in a software
APS (S-APS) directory. On the file server can be more than one S-APS directory. After in-
stallation and start-up, each NE and its modules is loaded with the appropriate software
version.

Beside of the APS we distinguish between system APS (SAPS) that is the SW for an NE
and all its components and customer APS (CAPS) as special production for a customer.

5.2.2 DHCP Server


The DHCP server is optional but most configurations use one. If a DHCP server answers
the request on one of the clients, that port becomes the management interface. The
DHCP server is used to assign an IP address to the hiD 6610 S311 management inter-
face as well as supply other configuration information, such as the IP address of the data
FTP server. If you do not want to use a DHCP server, you can perform a standalone
startup and manually enter the data which the DHCP server provides automatically. For
more information about the switch startup and configuration, refer to the user manual
(UMN).

48 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

5.2.3 Management Operating System ACI-E EM DX R2.0


Access Integrator Ethernet (ACI-E) EM DX R2.0 can be the element manager for all
pieces from the Carrier Ethernet network. It enables the operators to benefit from the
whole feature set supported by the products. EM DX R2.0 supports FCAPS-functionality
(fault management, configuration management, accounting management, security man-
agement and performance management). Mass provisioning tables, topological maps and
wide network alarm tables are further value added services that facilitates operators’ daily
work. The EM DX R2.0 can also operate in standalone mode providing the complete ele-
ment management system level FCAPS functional set.

The EM DX R2.0 can be integrated into any existing network management platform via
SNMP or CORBA Northbound interface, providing the wide feature set offered by the
element manager. EM DX R2.0 element management systems serve as mediators be-
tween the APM-E and the network elements, thereby cloaking the technologies and
commands required for their configuration.

5.2.4 Advanced Provisioning Manager (APM-E)


APM-E offers a scalable solution for small to large networks through integration of the in-
dividual number of needed element management systems. Flexibility of element man-
agement inter-working copes with the scalability issues which are characteristic of access
and metro networks.

The principles of the APM-E include all common functions as well as the seamless inte-
gration of element management layer and network management layer functionality for all
supported network elements. Having both functionalities at your fingertips within one sys-
tem accelerates operations, and saves costs, because network element specific jobs on
the element layer can be complemented by service-oriented tasks on the network layer.

5.2.5 Configuration via Command Line Interface (CLI)


It is easy for users who administer system by using Telnet or Console port to configure
the functions for system operating through hiD 6610 S311 based on CLI. The hiD 6610
S311 is easy to configure the needed functions after looking for available commands by
help menu.

5.2.6 Security Concept


Applying user classes can control the rights of operator access to the functions of the OS.
A specific set of functions is assigned to each user.

5.2.7 Traffic Statistics


The hiD 6610 S311 supports Ethernet traffic statistics counters for every port. These
counters provide you with the information whether frames are transmitted and received.
The table below lists the Ethernet traffic statistics counters and shows which counters are
available for receive and transmit direction.

A50010-Y3-B100-2-7618 49
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

Ethernet Statistics Counters Receive Transmit

EtherStatsDropEvents ×
EtherStatsOctets × ×
EtherStatsPkts × ×
EtherStatsBroadcastPkts ×
EtherStatsMulticastPkts ×
EtherStatsCRCAlignErrors ×
EtherStatsUndersizePkts ×
EtherStatsOversizePkts ×
EtherStatsFragments ×
EtherStatsJabbers ×
EtherStatsCollisions ×

Tab. 5.1 Ethernet Statistic Counters

5.2.8 Operating States and Alarms


The current operating states are displayed on the system by means of light emitting di-
odes (LEDs). In addition, the network elements continually report their current operating
states to the OS, where they can be retrieved at any time.

Every alarm report received by the OS from the NEs is indicated visually and color-coded
to indicate its severity. Each alarm is also logged in an alarm list which is continuously
updated. In addition the operator has the option of generating and exporting log files for
offline analysis.

5.3 Operation, Administration and Maintenance (OAM)


In the enterprise, Ethernet links and networks have been managed via Simple Network
Management Protocol (SNMP). Although SNMP provides a very flexible management so-
lution, it is not always efficient and is sometimes inadequate to the task.

First, using SNMP assumes that the underlying network is operational because SNMP re-
lies on IP connectivity; however, you need management functionality even more when the
underlying network is non-operational. Second, SNMP assumes every device is IP ac-
cessible. This requires provisioning IP on every device and instituting an IP overlay net-
work even if the ultimate end-user service is an Ethernet service. This is impractical in a
carrier environment.

For these reasons, carriers look for management capabilities at every layer of the network.
The Ethernet layer has not traditionally offered inherent management capabilities, so the
IEEE 802.3ah Ethernet in the First Mile (EFM) task force added the Operations, Admini-
stration and Maintenance (OAM) capabilities to Ethernet like interfaces. These manage-
ment capabilities were introduced to provide some basic OAM function on Ethernet media.

EFM OAM is complementary, not competitive, with SNMP management in that it provides
some basic management functions at Layer 2, rather than using Layer 3 and above as
required by SNMP over an IP infrastructure. OAM provides single-hop functionality in that

50 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

it works only between two directly connected Ethernet stations. SNMP can be used to
manage the OAM interactions of one Ethernet station with another.

OSI 7 Layers
Reference Model

Application

Presentation

Session
LAN
CSMA/CD Layers
Transport

Network Logical Link Control or other MAC Client


OAM (Optional)
Data
Data Link
Link
MAC Control (Optional)
Physical Media Access Control

Fig. 5.2 OSI Layers including OAM Support in Layer 2

The main functions provided by 802.3ah EFM OAM are:


• Remote Fault Indication
• Link Monitoring
• Remote Loopback

5.3.1 Remote Fault Indication


Remote fault indication provides a mechanism for one end of an Ethernet link to signal
the other end that the receive path is non operational. Some Ethernet physical layers of-
fer mechanisms to signal this condition at the physical layer.

EFM OAM added a mechanism so that some Ethernet physical layers can operate in uni-
directional mode, allowing frames to be transmitted in one direction even when the other
direction is non-operational. Traditionally, Ethernet PHYs do not allow frame transmission
in one direction if the other direction is not operational. Using this mode, EFM OAM al-
lows frame-based signaling of remote fault conditions while still not allowing higher layer
applications to be aware of the unidirectional capability.

5.3.2 Link Monitoring


EFM OAM includes event signaling capability so that one end of an Ethernet link can in-
dicate the occurrence of certain important events to the other end of the link. This hap-
pens via a Layer 2 protocol. EFM OAM also includes mechanisms for one Ethernet sta-
tion to query another directly connected Ethernet station about the status of its Ethernet
interface variables and status.

A50010-Y3-B100-2-7618 51
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

5.3.3 Remote Loopback


Remote loopback is a link state where the peer Ethernet entity echoes every received
packet (without modifications) back into the link. This function helps you ensure the qual-
ity of links during installation or troubleshooting.

5.4 Maintenance Manual


Access Integrator Element Manager (ACI-E) EM DX R2.0 for Central Operation

For central operation and maintenance purposes, the Access Integrator Ethernet (ACI-E)
EM DX R2.0 for SURPASS hiD 6610 S311 is provided for maintenance personnel.

Indication of the Alarm Reports

Any alarms which occur are indicated on the operator PC in the following manner:
• Visually by a change of color in an alarm status window of the ACI-E EM DX R2.0
• In an alarm list

For more information about the ACI-E EM DX R2.0, refer to the relevant ACI-E documen-
tation (see Section 1.2)

5.4.1 Directly Branching into Maintenance Manual


For fault clearance the tool “branch to maintenance” is integrated in the ACI-E. The fault
clearance procedures are in HTML format. The HTML files are installed in the same direc-
tory as the Access Integrator.

A link will be activated by clicking an alarm type in the alarm list. The appropriate fault
clearance procedure will be displayed in the browser.

Opening the Maintenance Manual via the Alarm List

The ACI-E EM DX R2.0 offers the possibility of directly branching into the maintenance
manual. If you select an alarm in the alarm list you can open the maintenance manual
with the appropriate fault clearance procedure via the context menu. This then eliminates
manual searching for the correct procedure.

Open the maintenance procedures from the “Alarm List” by the following method:
• Select an alarm in the alarm list with a click with the left mouse button.
• To open a context menu, click on the selected alarm in the alarm list using the right
mouse button.
• Then select the item “Maintenance Manual” in the context menu.

5.4.2 Maintenance Manual via Main Menu “Help”


Open the main menu “Help”:
• Select in the context menu “Maintenance Manual” with a double click with the left
mouse button.
• Navigate to the relevant functional unit and alarm type.

52 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

5.4.3 Maintenance Manual in PDF Format


The maintenance manual in PDF format can be ordered separately according to the
needs of the customer. The ordering number is: A50010-Y3-B100-*-7620.

A50010-Y3-B100-2-7618 53
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

6 Product Overview

Designation Product Number Dimensions Weight


in mm in kg
WxHxD

Bases

hiD 6610 S311-AC-256 DDJ:A-S-5524E0-21 440 x 43 x 240 3.6


24-port: FE interface
Single AC power & RPU
40MB Flash / 256MB DRAM
Layer 2/3 supported

hiD 6610 S311-DC-256 DDJ:A-S-5524E0-31 440 x 43 x 240 3.6


24-port: FE interface
Single DC power & RPU
40MB Flash / 256MB DRAM
Layer 2/3 supported

Redundant Power Options

RPS-PWR-AC DDJ:A-M-RPSAC0-01
AC input/ DC output

RPS-Cable DDJ:A-M-RPSCB0-01
Power connection cable

Software Options

Basic-SW-S321 DDJ:A-M-5524SW-01

SFP Options

SFP GE-SX DDJ:A-M-SFPSX0-01 10 x 13 x 63


LC connector, Optical GE, Multi-
mode
550 m, 0/+70°C

SFP GE-LX10 DDJ:A-M-SFPSX0-21 10 x 13 x 63


LC connector, Optical GE, Single-
mode
10 km, 0/+70°C

SFP GE-LX20 DDJ:A-M-SFPSX0-31 10 x 13 x 63


LC connector, Optical GE, Single-mode
10 km, 0/+70°C

54 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

Designation Product Number Dimensions Weight


in mm in kg
WxHxD

SFP Options

SFP GE-LX40 DDJ:A-M-SFPSX0-41 10 x 13 x 63


LC connector, Optical GE, Single-mode
40 km, 0/+70°C

SFP GE-ZX80 DDJ:A-M-SFPSX0-51 10 x 13 x 63


LC connector, Optical GE, Single-mode
80 km, 0/+70°C

A50010-Y3-B100-2-7618 55
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

7 Abbreviations

AC Alternating Current

ACI Access Integrator

ACI-E ACI Ethernet

ACL Access Control List

APM-E Advanced Provisioning Manager Ethernet

APS Application Program Software

ARP Address Resolution Protocol

ATMN Acceptance Test Manual

BGP Border Gateway Protocol

BRAS Broadband Remote Access Server

CAPS Customer APS

CE Communauté Européenne

CIDR Classless Inter Domain Routing

CLI Command Line Interface

CORBA Common Object Request Broker Architecture

CoS Class of Service

CRC Cyclic Redundancy Check/Code

D Depth

DA Destination Address

DC Direct Current

DHCP Dynamic Host Configuration Protocol

DRAM Dynamic Random Access Memory

DSCP Differentiated Service Code Point

DSLAM Digital Subscriber Line Access Multiplexer

EFM Ethernet in the First Mile

EGP Exterior Gateway Protocol

E-LAN Ethernet Local Area Network

E-Line Ethernet Line

EMC Electro-Magnetic Compatibility

EN Europäische Norm (European Standard)

ERP Ethernet Ring Protection

56 A50010-Y3-B100-2-7618
Information System Description (SYD)
SURPASS hiD 6610 S311 R1.0

FCAPS Fault, Configuration, Account, Performance and Security

FDB Filtering Data Base

FE Fast Ethernet

FPGA Field Programmable Gate Array

FTP File Transfer Protocol

FW Firmware

GB Gigabyte

GE Gigabit Ethernet

HW Hardware
2
IC Inter - Integrated Circuit interface

ID Identifier

IEC International Electrotechnical Commission

IEEE 802 Standards for Local and Metropolitan Area Networks

IEEE 802.1 Glossary, Network Management, MAC Bridges, and Internetworking

IEEE Institute of Electrical and Electronic Engineers

IETF Internet Engineering Task Force

IGMP Internet Group Management Protocol

IMN Installation Manual

IP Internet Protocol

ISP Internet Service Provider

ITU International Telecommunication Union

ITU-T International Telecommunication Union -


Telecommunications standardization sector

L2 Layer 2

LACP Link Aggregation Control Protocol

LAN Local Area Network

LCT Local Craft Terminal

LED Light Emitting Diode

LLDP Link Layer Discover Protocol

LLID Logical Link ID

MAC Medium Access Control

MMN Maintenance Manual

NE Network Element

A50010-Y3-B100-2-7618 57
System Description (SYD) Information
SURPASS hiD 6610 S311 R1.0

NNI Network-to-Network Interface

OAM Operation, Administration and Maintenance

OSPF Open Shortest Path First

PC Personal Computer

PHY Physical Layer

QoS Quality of Service

RFC Request for Comments

RIP Routing Information Protocol

RPU Redundant Power Unit

RPS Redundant Power Supply

RSTP Rapid Spanning Tree

RTC Real Time Clock

SA Source Address

SAPS System APS

SFP Small Form Factor Pluggable

SNMP Simple Network Management Protocol

STB Set Top Box

STP Spanning Tree Protocol

SYD System Description

TCP Transmission Control Protocol

TFTP Trivial FTP

TMN Telecommunication Management Network

TOS Type of Service

UDP User Datagram Protocol

UMN User Manual

VDC Volt Direct Current

VID VLAN ID

VLAN Virtual Local Area Network

VPN Virtual Private Network

W Width

WRR Weighted Round Robin

58 A50010-Y3-B100-2-7618

Potrebbero piacerti anche