Huawei MA5616 IP DSLAM CCUB CCUC CCUD Supports ADLE ADPE ASRP ASPB
Short Description:
10G gigabit-capable passive optical network (GPON) | 10G GPON is a next-generation PON standard defined by International Telecommunication Union - Telecommunication Standardization Sector (ITU-T). It provides asymmetric upstream and downstream rates, with a maximum upstream rate of 2.5 Gbit/s and a maximum downstream rate of 10 Gbit/s. 10G GPON uses the following key technologies: Burst optical/electric Ranging Forward error correction (FEC) Line encryption Dynamic bandwidth assignment (DBA) |
Vectoring | The Vectoring technology uses Vectoring algorithms to cancel inter-line crosstalk for multi-pair very-high-speed digital subscriber line 2 (VDSL2) lines so that VDSL2 line bandwidths can be increased significantly. In this technology, the Vectoring control entity (VCE) uses various technologies to cancel inter-line crosstalk in upstream and downstream directions: Downstream: pre-coding technology Upstream: canceling technology |
Layer 2 management | MAC address management Virtual local area network (VLAN) management Flow bundle Layer 2 forwarding policies Outer VLAN+MAC forwarding Service VLAN (SVLAN)+customer VLAN (CVLAN) forwarding Layer 2 isolation Layer 2 bridging Transparent transmission of protocol packets 1:1 virtual MAC address (VMAC) |
Quality of service (QoS) | Priority processing Congestion management Traffic policing Service priority marking Queue scheduling Queue buffering Traffic shaping Access control list (ACL) policies |
Emulation services | Point-to-Point Protocol over Ethernet (PPPoE) dialup emulation Dynamic Host Configuration Protocol (DHCP) dialup emulation Multicast service emulation |
Layer 3 features | VLAN Layer 3 interface Address Resolution Protocol (ARP) Domain name service (DNS) client Static route |
Voice services | Voice over IP (VoIP) Public switched telephone network (PSTN) Integrated services digital network (ISDN) basic rate access (BRA) Fax over IP Modem over IP |
Networking features | Multiple Spanning Tree Protocol (MSTP) Link Aggregation Control Protocol (LACP) PON type B protection |
User security | Policy Information Transfer Protocol (PITP) DHCP option82 Anti-MAC address flapping Anti-MAC address spoofing Anti-IP address spoofing Access user isolation Ring check |
System security | Source IP address filtering Source MAC address filtering Destination MAC address filtering Anti-denial of service (DoS) attack Anti-IP packet attack Anti-Internet Control Message Protocol (ICMP) packet attack Source route filtering Firewall Blacklist |
Operation and maintenance security | User account and password management Authentication, encryption, and access control based on Simple Network Management Protocol (SNMP) v3 Setting of an independent security administrator Encryption for file transfer Encryption for remote management and connection Logging of security events |
Line security | Advanced Encryption Standard (AES) 128 encryption for GPON downstream transmission |
xxxxxxx.