Compared with thedocument issue for the VRC01 product version, this issue has the following updates:. About This Document See Full Reader. Post on Jan views.
Category: Documents 59 download. Tags: huawei trademarks huawei proprietary huawei industrial basebantian product versionoptix multilevel menus additional information high level product versions applicable.
Founded by ex-Huawei employee, we have rich experience and well reputation in the field over 3 years. This document is intended for:l Network planning engineersl Data configuration engineersl System maintenance engineers Symbol ConventionsThe symbols that may be found in this document are defined as follows. Indicator and Specifications. Huawei may change the information at any time without notice. After a RADIUS server verifies that the user name and password of a user are valid, the server allows a certain authority for the user, and provides services to the user.
If the verification fails, a login error is reported. The OptiX OSN supports the shielding function when being connected to a network port management device. In security, FTP transmits plain text and supports only password authentication, whereas SFTP transmits cipher text and supports both password authentication and cipher key authentication. Authentication by cipher key is safer than authentication by password.
Uniqueness and complexity of accounts: All accounts held in an NE are unique. An account consists of 4 to 16 characters. Length and complexity of passwords: A password consists of 8 to 16 characters and contains all the following types of characters: lowercase character, uppercase character, digit, and special character.
A password cannot be any of the five recently used passwords, the user name, or reversed user name. Active periods of passwords: Each password has an active period.
After the active period of a password expires, the password can be used for only three logins. For a common user's password, the shortest active period is one day. A common user can change the password only after the shortest active period expires. Storage of encrypted passwords: Encrypted by using the message digest algorithm 5 MD5 or SHA, passwords are held in a system. SHA is used by default when a user is created or the system password is changed. By querying the system security log, an administrator can trace and check operations of users.
Different information is transmitted to the Syslog server in a format compliant with the Syslog protocol so that maintenance personnel can monitor NEs easily.
Configuration of multiple Syslog servers and transmission of logs to multiple servers at the same time. Figure illustrates log transmission on a network by means of the Syslog protocol. To ensure the security of system logs, at least two Syslog servers are required on a transmission network.
NEs communicate with Syslog servers by running the IP protocol. A Syslog server is a workstation or server that stores the system logs of all NEs on a network. The NE transmits the system log to two Syslog servers by using the automatic routing function of the IP protocol. You do not need to configure any forwarding gateway NE. The logs of these NEs need to be transmitted to the gateway NEs that can communicate with Syslog servers directly.
Then, the gateway NEs forward the logs to Syslog servers. Therefore, you need to configure forwarding gateway NEs. In the case of OptiX OSN equipment, power consumption is generally transformed into heat consumption. Table Packet system performance specifications. Numbe r of mainten ance associat ion interme diate points MIPs. NOTE Format of optical port type is defined as follows: transmission distance-signal rate.
Explanation for optical port type "L Table Specifications for the single-fiber bidirectional optical interfaces of the STM-1 optical ports. Table Specifications of the FE two-fiber bidirectional optical ports. Table Specifications of the FE single-fiber bidirectional optical ports Parameter. With different SFP modules, the equipment provides GE optical ports with different types and transmission distances.
Table Specifications of the GE single-fiber bidirectional optical ports. Permitted frequency deviation at the input port Allowed attenuation at the input port Input jitter tolerance. Table provides status explanation for indicators on the boards that the OptiX OSN supports. Software is being loaded to the board during the power-on or resetting process of the board. The board software is in BIOS boot state during the power-on or resetting process of the board.
The rectifier module is faulty. In normal situations, the indicator is off. The entire power system is faulty. The port is connected correctly link up , but is not receiving or transmitting data. The port is connected correctly link up , and is receiving and transmitting data.
Waterproofing Requirements Requirements for storing equipment on site: Generally, the equipment must be stored indoors. No water should remain on the floor or leak into equipment crates. The equipment should be placed away from areas where water leakage is possible for example, do not place near automatic fire-fighting extinguishing and heating systems.
Ensure that all the following four conditions are met if the equipment is stored outdoors: l. The air must be free from explosive, electric-conductive, magnetic-conductive, or corrosive dust.
Table Density requirements for chemically active substances Chemically Active Substance. Mechanical Stress Table lists requirements for mechanical stress. Table Requirements for mechanical stress Item. NOTE Static load is the pressure from the upside that the packaged equipment can tolerate when equipment is stacked in the specified manner. Climate Table lists climate requirements. Table Climate requirements Item. Waterproofing Requirement Ensure that the following conditions are met when transporting the equipment: l.
NOTE A shock response spectrum is a graphical representation of an arbitrary transient acceleration input, such as shock in terms of how the equipment responds to that input.
Static load is the pressure from the upside that the packaged equipment can tolerate when equipment is stacked in the specified manner. Climate Table and Table list climate requirements. Table Requirements on temperature and humidity during operation Operating Temperature. NOTE The temperature and humidity are measured 1.
Longterm operating indicates that the continuous operating time of the equipment does not exceed 96 hours and the accumulated annual operating time does not exceed 15 days.
Extended operating indicates that the continuous operating time of the equipment does not exceed 4 hours per day and the accumulated annual operating time does not exceed 90 days.
To improve equipment reliability, ensure that the equipment room is equipped with a precise air conditioner, which controls temperature and humidity within the following ranges: l.
Do not install an air conditioner right above equipment, to prevent air blowing directly from the air conditioner vent into the equipment. Install an air conditioner as far away from a window as possible, to prevent humid air blowing from the window to the equipment. Between m and m of altitude, the equipment operating temperature decreases by 1C for every increase of m in altitude.
If a cabinet is installed indoors or in a corridor that is free from rain, the cabinet must meet the requirements of IP31 rating protection. The first numeral "3" indicates that the cabinet can prevent a solid object with a diameter equal to or greater than 2. The second numeral "1" indicates that vertically falling drops shall have no harmful effects.
Ensure that there is no mouse in an equipment room, preventing mouse urine from entering a cabinet. Table lists the density requirements for mechanically active substances during equipment operation. Table Density requirements for mechanically active substances during equipment operation Mechanically Active Substance. Sites must be kept away from pollution sources.
If pollution sources cannot be avoided, sites must be located in the perennial upwind direction of the pollution sources, or cabinets providing sufficient protection must be used. For sources of heavy pollution such as metal smelting plants and coal mines, keep a minimum distance of 5 km. For sources of medium pollution such as chemical factories, rubber factories, electroplating factories, agricultural fertilizer factories, paper mills, and power plants, keep a minimum distance of 3.
For sources of light pollution such as food factories, leather factories, daily necessities factories, and livestock farms, keep a minimum distance of 2 km. Equipment rooms must be kept 3. If this requirement cannot be met, cabinets providing sufficient protection must be used.
Do not install network boxes in underground garages or other garages. If a network box can be installed only in a garage, install it at a well-ventilated place and avoid car exhausts, or select a network box providing sufficient protection.
Table shows the content limits on corrosive gases. Table Content limits on corrosive gases Item. The requirements for relative humidity at equipment's air intake vents are provided as follows: NOTE.
Fan cooling. To be specific, fans start Therefore, it is at high temperature and stop at low recommended that temperature. It is recommended that fans fans stop when the start when the temperature at cabinets' air temperature at outlets exceeds 40C and stop when the cabinets' air outlets temperature is lower than 35C. Water resistance requirements for network boxes are provided as follows: If a network box is installed indoors or in a corridor that is free from rain, the network box must meet the requirements of IP31 rating protection.
The first numeral "3" indicates that the network box can prevent a solid object with a diameter equal to or greater than 2. If a network box is installed in a corridor that is exposed to rain, the network box must meet the requirements of IP55 rating protection.
The first numeral "5" indicates the rating for preventing solid objects from entering network boxes. That is, ingress of dust is not totally prevented, but dust shall not penetrate in a quantity to interfere with satisfactory operation of equipment or to impair safety.
The second numeral "5" indicates the rating for preventing water from entering network boxes. That is, water projected in jets against the enclosure from any direction shall have no harmful effects. Requirements for installing network boxes are provided as follows: Equipment must be installed in a position away from water drips outdoor units and water pipes of air conditioners, sewer pipes, or windows. Equipment must be installed in a position not exposed to rain.
Equipment must not be installed in light-current wells or directly on the corridor ground on the first floor. Equipment must not be mounted on a wall that is near to windows.
Dust Resistance For dusty areas, network boxes with air filters are recommended to improve equipment reliability and the network boxes must meet the requirements of IP51 rating protection. Table Density requirements for mechanically active substances during equipment operation.
If pollution sources cannot be avoided, sites must be located in the perennial upwind direction of the pollution sources, or network boxes providing sufficient protection must be used.
Installation sites must be kept 3. If this requirement cannot be met, network boxes providing sufficient protection must be used. Table Content limits on corrosive gases. In addition, the temperature at network boxes' air outlets is higher than the ambient temperature. Therefore, it is recommended that fans stop when the temperature at network boxes' air outlets is lower than 35C. To be specific, fans start at high temperature and stop at low temperature.
It is recommended that fans start when the temperature at network boxes' air outlets exceeds 40C and stop when the temperature is lower than 35C. Environmental Protection The equipment is designed according to the requirements of environmental protection. The equipment complies with RoHS directive. The equipment is amply packaged while materials as conserved. The size of the package containing the equipment and accessories is at most three times the size of the net equipment.
The product is also designed for easy unpacking. All hazardous substances contained in the packaging decompose easily. All components and packages of the equipment are provided with standard labels for recycling. Plugs and connectors are easy to find, and the associated operations can be performed by using simple tools. Certain types of identifying information, such as silkscreens, are printed on front panels or subracks.
Frame alignment and cyclic redundancy check CRC procedures relating to basic frame structures defined in Recommendation G. Timing requirements of slave clocks suitable for use as node clocks in synchronization networks.
An architectural framework for support of quality of service QoS in packet networks. Table IETF standards. Definitions of textual conventions for multiprotocol label switching MPLS management.
A differentiated service two-rate, three-color marker with efficient handling of in-profile traffic. Requirements for edge-to-edge emulation of time division multiplexed TDM circuits over packet switching networks. Table IEEE standards.
Table Environment related standards Standard. Environmental Engineering EE Environmental conditions and environmental tests for telecommunications equipment Part Classification of environmental conditions: Storage Class 1.
Environmental Engineering EE Environmental conditions and environmental tests for telecommunications equipment Part Classification of environmental conditions: Transportation Class 2. Environmental Engineering EE Environmental conditions and environmental tests for telecommunications equipment Part Classification of environmental conditions: Stationary use at weatherprotected locations Class 3.
Classification of environmental conditions - Part 3: Classification of groups of environmental parameters and their severities - Section 1: Storage.
Classification of environmental conditions - Part 3: Classification of groups of environmental parameters and their severities - Section 3: Stationary use at weatherprotected locations. Restriction of the use of certain hazardous substance in electrical and electronic equipment. Table MEF standards Standard. Requirements and framework for Ethernet service protection in metro Ethernet networks. Table Safety standards. Electrical safety; Classification of interfaces for equipment to be connected to telecommunication networks.
Table EMC related standards Standard. Electromagnetic compatibility-Part Testing and measurement techniques-Electrostatic discharge immunity test. Information technology equipment-immunity characteristicsLimits and methods of measurement. Electromagnetic compatibility and Radio spectrum Matters ERM ; Radiated emission testing of physically large telecommunication systems.
Power supply interface at the input to telecommunications equipment; Part 2: Operated by direct current dc. Table Protection related standards.
Resistibility of telecommunication switching equipment to overvoltages and overcurrents. Resistibility of internal interfaces of telecommunication centers to surge overvoltages.
A backup method in which two components mirror each other. If the active component goes down, the standby component takes over services from the active component to ensure that the system service is not interrupted. It may have one extra service signal.
Insertion of AIS in a channel with excessive errors to indicate that it is unavailable. For tributary board at the E3 level or higher, it can be set whether to insert AIS when there are excessive errors in the B3 byte. A protection architecture that comprises one protection facility and one working facility and performs switchover by using the Automatic Protection Switching APS protocol.
Normally, signals are sent only over the working facility. If an APS switchover event is detected by the working facility, services are switched over to the protection facility.
The AAL provides a conversion function to and from ATM for various types of information, including voice, video, and data. If the monitoring connections switch over, the whole VPG will switch over to quicken the ATM protection switching as quick as the protection switching of the SDH layer. The address resolution is a process by which the host converts the target IP address into a target MAC address before transmitting a frame.
A mechanism for configuring authentication, authorization, and accounting security services. Authentication refers to the verification of user identities and the related network services; authorization refers to the granting of network services to users according to authentication results; and accounting refers to the tracking of the consumption of network services by users. A link between the customer and the telecommunication network.
Many technologies, such as the copper wire, optical fiber, mobile, microwave and satellite, are used for access. A list of entities, together with their access rights, which are authorized to access a resource. A layer that connects the end users or last mile to the ISP network. The access layer devices are cost-effective and have high-density interfaces.
In an actual network, the access layer includes the devices and cables between the access points and the UPEs.
Any entity that has station functionality and provides access to the distribution services, via the wireless medium WM for associated stations. The discovery and remote loopback can only be initiated by the interface in the active mode. A technology that is used to automatically adjust the modulation mode according to the channel quality.
When the channel quality is favorable, the equipment uses a highefficiency modulation mode to improve the transmission efficiency and the spectrum utilization of the system. When the channel quality is degraded, the equipment uses the low-efficiency modulation mode to improve the anti-interference capability of the link that carries high-priority services.
A portion of the local routing information which pertains to the reachability of a single neighbor ES or IS over a single circuit.
Adjacencies are used as input to the Decision Process for forming paths through the routing domain. A separate adjacency is created for each neighbor on a circuit, and for each level of routing i. A channel configuration method, which uses two adjacent channels a horizontal polarization wave and a vertical polarization wave to transmit two signals. The information structure that enables adaptation between the higher order path layer and the multiplex section layer.
The administrative unit consists of an information payload the higher order VC and an AU pointer, which indicates the offset of the payload frame start relative to the multiplex section frame start. One or more administrative units occupying fixed, defined positions in an STM payload. The interface between the cellular phone set or wireless modem usually portable or mobile and the active base station.
A message reported when a fault is detected by a device or by the network management system during the device polling process. Each alarm corresponds to a clear alarm. After a clear alarm is received, the corresponding alarm is cleared. A device that reflects the status of an alarm in visual-audio mode. The alarm box notifies you of the alarm generation and alarm severity after it is connected to the Signaling Network Manager server or client and the related parameters are set.
A process to analyze correlated alarms. For example, if alarm 2 is generated within five seconds after alarm 1 is generated, and it complies with the conditions defined in the alarm correlation analysis rule, you can either mask the alarm or raise the level of alarm 2 according to the behavior defined in the alarm correlation rule. An alarm management method. Alarms are detected and reported to the NMS system, and whether the alarm information is displayed and saved is decided by the alarm filtering status.
A mechanism to indicate the alarm status of equipment. On the cabinet of an NE, four differently-colored indicators specify the current status of the NE. When the green indicator is on, the NE is powered on. When the red indicator is on, a critical alarm has been generated.
When the orange indicator is on, a major alarm has been generated. When the yellow indicator is on, a minor alarm has been generated. The ALM alarm indicator on the front panel of a board indicates the current status of the board. A mode for an NE that indicates whether the port is automatically restored to the normal status after the service is accessed or the fault is removed.
There are three alarm inversion modes: normal, revertible and non-revertible. A method to suppress alarms for the alarm management purpose. Alarms that are suppressed are no longer reported from NEs. A synchronous clock encoding technique which uses bipolar pulses to represent logical 1 values.
A signal in which information is represented with a continuously variable physical quantity, such as voltage. Because of this constant changing of the wave shape with regard to its passing a given point in time or space, an analog signal might have a virtually indefinite number of states or values. This contrasts with a digital signal that is expressed as a square wave and therefore has a very limited number of discrete states. Analog signals, with complicated structures and narrow bandwidth, are vulnerable to external interference.
It is suitable for certain key data services that require assured bandwidth and short delay. For traffic within the bandwidth limit, AF assures quality in forwarding. For traffic that exceeds the bandwidth limit, AF degrades the service class and continues to forward the traffic instead of discarding the packets. An attempt to bypass security controls in a system with the mission of using that system or compromising it.
An attack is usually accomplished by exploiting a current vulnerability. A device used to increase the attenuation of an Optical Fiber Link. Generally used to ensure that the signal at the receive end is not too strong. A technique procedure to automatically shutdown the output power of laser transmitters and optical amplifiers to avoid exposure to hazardous levels. A network set that uses the same routing policy and is managed by the same technology administration department. Each AS has a unique identifier that is an integer ranging from 1 to The identifier is assigned by IANA.
An AS can be divided into areas. A capability of providing services at any time. The probability of this capability is called availability. ABR only provides possible forwarding service and applies to the connections that does not require the real-time quality. It does not provide any guarantee in terms of cell loss or delay.
A semiconductor photodetector with integral detection and amplification stages. APDs can detect faint signals but require higher voltages than other semiconductor electronics. A performance indicator indicating the average RTT of multiple ping operations or other probe operations.
It is expressed in milliseconds. A fast and independent hello protocol that delivers millisecond-level link failure detection and provides carrier-class availability. After sessions are established between neighboring systems, the systems can periodically send BFD packets to each other.
If one system fails to receive a BFD packet within the negotiated period, the system regards that the bidirectional link fails and instructs the upper layer protocol to take actions to recover the faulty link. A network that forms the central interconnection for a connected network. The communication backbone for a country is WAN.
The backbone network is an important architectural element for building enterprise networks. It provides a path for the exchange of information between different LANs or subnetworks. A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas.
Generally, the backbone network's capacity is greater than the networks connected to it. An electronic circuit board containing circuits and sockets into which additional electronic devices on other circuit boards or cards can be plugged.
A periodic operation performed on data stored in a database for the purposes of recovering the data if an error occurs. The backup also refers to the data synchronization between active and standby boards. A function that the sink node of a LSP, when detecting a defect, uses to inform the upstream end of the LSP of a downstream defect along the return path. A range of transmission frequencies a transmission line or channel can carry in a network.
In fact, the bandwidth is the difference between the highest and lowest frequencies in the transmission line or channel.
The greater the bandwidth, the faster the data transfer rate. An area of radio coverage consisting of cells served by one or more Base Transceiver Stations BTSs in the same base station site. It provides the following functions: radio resource management, base station management, power control, handover control, and traffic measurement. A form of modulation in which the information is applied directly onto the physical transmission medium. A network used to carry the messages of a transport-layer protocol between physical devices.
A traditional IP packet transport service. In this service, the diagrams are forwarded following the sequence of the time they reach. All diagrams share the bandwidth of the network and routers. The amount of resource that a diagram can use depends of the time it reaches.
BE service does not ensure any improvement in delay time, jitter, packet loss ratio, and high reliability. A unitary and simple service model. Without being approved, but after notifying the network, the application can send any number of packets at any time. The network tries its best to send the packets, but delay and reliability cannot be ensured. Best-Effort is the default service model of the Internet.
An incompatibility between a bit in a transmitted digital signal and the corresponding bit in the received digital signal. A method of error monitoring.
With even parity, the transmitting equipment generates an X-bit code over a specified portion of the signal in such a manner that the first bit of the code provides even parity over the first bit of all X-bit sequences in the covered portion of the signal, the second bit provides even parity over the second bit of all X-bit sequences within the specified portion, and so forth.
Even parity is generated by setting the BIP-X bits so that an even number of 1s exist in each monitored partition of the signal. A monitored partition comprises all bits in the same bit position within the X-bit sequences in the covered portion of the signal. The covered portion includes the BIP-X. Divide a frame is into several blocks with 8 bits one byte in a parity unit and then arrange the blocks in matrix. Compute the number of "1" or "0" over each column. Then fill a 1 in the corresponding bit for the result if the number is odd, otherwise fill a 0.
A method of filtering packets based on their source IP addresses. Compared with ACL, the match condition for the black list is much simpler. Therefore, the black list can filter packets at a higher speed and can effectively screen the packet sent from the specific IP address. A parallel path with several serial paths bundled together. It improves the data throughput capacity. A device that connects two or more networks and forwards packets among them.
Bridges operate at the physical network level. Bridges differ from repeaters because bridges store and forward complete packets, while repeaters forward all electrical signals.
Bridges differ from routers because bridges use physical addresses, while routers use IP addresses. BPDU packets contain information on ports, addresses, priorities, and costs, and they ensure that the data reaches its intended destination.
BPDU messages are exchanged across bridges to detect loops in a network topology. These loops are then removed by shutting down selected bridge interfaces and placing redundant switch ports in a backup, or blocked, state. The act of simultaneously transmitting identical traffic on the working and protection channels. A means of delivering information to all members in a network. The broadcast range is determined by the broadcast address. A network address in computer networking that allows information to be sent to all nodes on a network, rather than to a specific network host.
A group of network stations that receives broadcast packets originating from any device within the group. The broadcast domain also refers to the set of ports between which a device forwards a multicast, broadcast, or unknown destination frame.
In the situation of multiple synchronous nodes or communication devices, one can use a device to set up a clock system on the hinge of telecom network to connect the synchronous network as a whole, and provide satisfactory synchronous base signals to the building integrated device. This device is called BITS. That is, the OSN products can add or drop several wavelengths directly.
A process of forming data into a block of the proper size, uninterruptedly sending the block in a fast operation, waiting for a long time, and preparing for the next fast sending. A multiframe set up based on timeslot Among the 8 bits of timeslot 16 in the first frame, the first 4 bits are used for multiframe synchronization.
The multiframe alignment signal MFAS for synchronization is Bits C1 to C4 of a check block can check the previous check block. A signaling system used in telephone networks that separates signaling information from user data. A specified channel is exclusively designated to carry signaling information for all other channels in the system.
A transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to send that frame again.
The CPU has the ability to fetch, decode, and execute instructions and to transfer information to and from other resources over the computer's main data-transfer path, the bus. The channel can be established through wire, radio microwave , fiber, or any combination of the three. The amount of information transmitted per second in a channel is the information transmission speed, expressed in bits per second.
The center-to-center difference in frequencies or wavelengths between adjacent channels in a WDM device. A set of rules for checking and analyzing device echo information. The check criteria for an alarm collection item need to be set through the configuration file. At the transmission end, the interface module packs timeslot data into ATM cells. An algorithm used for selecting the best clock for clock synchronization.
For different peers multiple servers or peers configured for a client , a peer sends clock synchronization packets to each server or passive peer. After receiving the response packets, it uses the clock selection algorithm to select the best clock.
A process of synchronizing clocks, in which the signal frequency traces the reference frequency, but the start points do not need to be consistent. This process is also known as frequency synchronization.
The method of keeping the time on each node synchronized with a clock source in the network. A channel configuration method, which uses a horizontal polarization wave and a vertical polarization wave to transmit two signals. The Co-Channel Dual Polarization has twice the transmission capacity of the single polarization.
A signal transmission technology that multiplexes widely-spaced optical channels into the same fiber. CWDM spaces wavelengths at a distance of several nm. CWDM does not support optical amplifiers and is applied in short-distance chain networking. A condition in which two packets are being transmitted over a medium at the same time. Their interference makes both unintelligible.
A parameter used to define the capacity of token bucket C, that is, the maximum burst IP packet size when information is transferred at the committed information rate.
This parameter must be greater than 0 but should be not less than the maximum length of an IP packet to be forwarded. An IP multimedia session that have two or more participants. Each conference has a focus and can be identified uniquely. Extra intra-network or inter-network traffic resulting in decreased network service efficiency. A flow control measure to solve the problem of network resource competition.
When the network congestion occurs, it places packets into the queue for buffer and determines the packet forwarding order. An association of transmission channels or telecommunication circuits, switching and other functional units set up to provide for the transfer of signals between two or more network points, to support a single communication.
A control process in which the network takes actions in the call set-up phase or call renegotiation phase to determine which connection request is admitted. A reference point where the output of a trail termination source or a connection is bound to the input of another connection, or where the output of a connection is bound to the input of a trail termination sink or another connection.
The connection point is characterized by the information which passes across it. A bidirectional connection point is formed by the association of a contradirectional pair.
Pertaining to a method of data presentation. The data has a complete destination address and is delivered by the network on a best-effort basis, independent of other data being exchanged between the same pair of users. CBR transfers cells based on the constant bandwidth. Transmission Equipment Transmission Osn. Optix Osn Osn Huawei -? Quote one board together with four single-mode LC optical fibers and two single-fiber bidirectional optical modules.
Select an appropriate board based on the valid slot. Two ohm or ohm 21xE1 power cables are quoted. Added the description about that TDM ports are quoted huwei. Deleted typical configurations for China, and typical auxiliary packages for China and overseas. Configure one FE port license for each optical module. Copyright Huawei Technologies Co. If TDM optical ports are quoted independently, quote the combination of finished board and optical module. Configuring partConfigure 20 pieces if the required PVC trough length is less than or equal to 2 m.
If a ohm cable manuxl required, deliver the cable whose part number is Configuring partConfigure one item for each AC-powered chassis. For the part numbers of particular optical modules, see the PDM database or the configurator. Quote this board together with: The port impedance is ohms, and air cooling design is used.
One ohm E1 cable, eight optical fibers, and one meter network cable are quoted. Uonel is responsible for transporting goods to port. One F2 serial port cable assembled on site part number: The comparisons on left-angled female uuawei straight female power cables between different countries are as follows. One ohm E1 cable, four optical fibers, and one meter network cable are quoted.
0コメント