This document provides information about ZTE's iTC (Integrated Transcoder Concentrator) system. It describes the purposes and benefits of applying the iTC in networks, including saving transmission resources, sharing transcoder resources, improving utilization of TCU resources, and providing disaster recovery through flexible Ater/A interfaces. It also outlines the hardware structure and shelf configurations of the ZXG10 iTC system and provides examples of system configurations using E1 and STM-1 interfaces on the Ater and A interfaces.
an industrial training taken at BSNL CTTC Kolkata covered the whole syllabus of the training (Switching system, SDH, Optical Fibre Cable, GSM, CDMA, ISDN, IN networks, PCM, Broadband DSL Technology, IP fundamentals) Overviews of the total topics all the advantages and Disadvantages.
-Dhrubajyoti Adak(Camellia Institute of Technolgy)
WE2012 adalah Produk terbaru ZTE dalam melayani konsumen khususnya diindonesia untuk fasilitas WiFi dan Access Control. Perangkat ini sangat cocok digunakan di Ruangan kerja Perkantoran, Kampus, Hotel, Rumah Sakit. dan Perumahan.
Deangan satu perangkat yang kecil dan smart, tidak terlihat lagi bentangan-bentangan kabel didalam dinding ruangan.
Perangkat ini sudah mensuport layanan jaringan telefon, 2 Port LAN, 1 Port USB dan menghidupkan ruangan anda dengan WiFi Hotspot.
APSC Mock Test 2015 series and online coaching material.
APSC Online Coaching Material.
Assam Public Service commission online coaching
APSC exam mock test
Trial result HSDPA over IuR. Without this feature, DSCR (Direct Signaling Connection Re-establishment ) will occur when HSDPA user will move to another RNC
In this keynote, we will talk about how to transform from virtualization to full-scale cloudification and in Huawei’s view how OPNFV can develop into a full-scale cloud platform. We will explain this in five aspects: 1) cloudification of the software architecture; 2) cloudification of the networks; 3) cloudification of the network operations; 4) cloudification of the VNFs; 5) NFVI platform cloudification. Then a summarization of Huawei’s contribution in OPNFV is provided including code authors, labs, key roles, projects, code commits, etc. In the end, we will also briefly introduce our demos in this summit and welcome everyone to our booth.
Fibre optic FTTH FTTX network design, engineering and planning solutions,van den Dool Dick
Fibre optic FTTH FTTX network software solutions to design, engineer & plan FTTH / FTTX networks cost optimized automatically. Shows the required input, design phase and output to Autocad etc.
Cisco Network Proposal Part 1by Jesse HolmesSubmission d.docxclarebernice
Cisco Network Proposal Part 1
by Jesse Holmes
Submission dat e : 12- No v- 2017 09:15AM (UT C- 0500)
Submission ID: 87 7 204 057
File name : Cisco _Netwo rk_Pro po sal_Part_1_Updated_Jesse_Ho lmes.do cx (21.17 K)
Word count : 7 58
Charact e r count : 5134
90%
SIMILARIT Y INDEX
22%
INT ERNET SOURCES
0%
PUBLICAT IONS
90%
ST UDENT PAPERS
1 90%
Exclude quo tes Of f
Exclude biblio graphy Of f
Exclude matches Of f
Cisco Network Proposal Part 1
ORIGINALITY REPORT
PRIMARY SOURCES
Submitted to University of Maryland, University
College
St udent Paper
Cisco Network Proposal Part 1by Jesse HolmesCisco Network Proposal Part 1ORIGINALITY REPORTPRIMARY SOURCES
Jesse HolmesComment by Jeanette: IEEE format is required for this assignment. IEEE include a Table of Content, Introduction and Abstract.
November 12th 2017
CMIT 350 7982: Interconnecting Cisco Devices
Professor Jeanette Boyd
Cisco Network Proposal Part 1: Springfield Device and STP Configurations
Springfield Site Device and STP Configurations
The Springfield site requirements are innovating device hostnames by implementing, banners and secure device passwords. These are all basic initial configurations that should be made prior to connecting the switch. Spanning-Tree Protocol prevents loops from forming when switches or bridges are interconnected. The advantages are that you can add another link between the switches or bridges that provides fault tolerance. The link can also provide port bundling that will increase the speed by twice its capacity. Whenever you are configuring spanning tree after the adding the additional link, it stops switching loop by making sure there is only one active path between the links. Switching loop will keep the circling around the network which can take down. Since the administrators are having some problems placing switch 1 as the root, there will be a reconfiguration to the spanning tree configurations. The mode best suited for the environment will be chosen. Also, there will a test of multiple security measures that can be implemented to protect the devices. Comment by Jeanette: Why? Don’t just make statements, explain why they are the basic initial configurations that should be made prior to connecting the switch? These have nothing to do with the switches operation so why do you think this?Comment by Jeanette: What do you mean by “the best mode suited for the environment will be chosen?
Device Configurations
To correctly word Message of the Day and login banners, it is best to consult with the legal department first before proceeding. Once the verbiage is approved and carefully considered, it can be implemented into these banners. Switch 2 is configured as the root. In order to fix the problem the administrators are having, there will need to be configuration of switch 1 by changing the priority number to force it to become the root switch. Comment by Jeanette: Why does someone need the MOTD? Why pr ...
Security Plus Training Event for ITProcamp Jacksonville 2016. Helping those new to the IT Security get prepared. Understand how to complete your DOD 8570.m requirements.. Discussion about Exam Objectives
an industrial training taken at BSNL CTTC Kolkata covered the whole syllabus of the training (Switching system, SDH, Optical Fibre Cable, GSM, CDMA, ISDN, IN networks, PCM, Broadband DSL Technology, IP fundamentals) Overviews of the total topics all the advantages and Disadvantages.
-Dhrubajyoti Adak(Camellia Institute of Technolgy)
WE2012 adalah Produk terbaru ZTE dalam melayani konsumen khususnya diindonesia untuk fasilitas WiFi dan Access Control. Perangkat ini sangat cocok digunakan di Ruangan kerja Perkantoran, Kampus, Hotel, Rumah Sakit. dan Perumahan.
Deangan satu perangkat yang kecil dan smart, tidak terlihat lagi bentangan-bentangan kabel didalam dinding ruangan.
Perangkat ini sudah mensuport layanan jaringan telefon, 2 Port LAN, 1 Port USB dan menghidupkan ruangan anda dengan WiFi Hotspot.
APSC Mock Test 2015 series and online coaching material.
APSC Online Coaching Material.
Assam Public Service commission online coaching
APSC exam mock test
Trial result HSDPA over IuR. Without this feature, DSCR (Direct Signaling Connection Re-establishment ) will occur when HSDPA user will move to another RNC
In this keynote, we will talk about how to transform from virtualization to full-scale cloudification and in Huawei’s view how OPNFV can develop into a full-scale cloud platform. We will explain this in five aspects: 1) cloudification of the software architecture; 2) cloudification of the networks; 3) cloudification of the network operations; 4) cloudification of the VNFs; 5) NFVI platform cloudification. Then a summarization of Huawei’s contribution in OPNFV is provided including code authors, labs, key roles, projects, code commits, etc. In the end, we will also briefly introduce our demos in this summit and welcome everyone to our booth.
Fibre optic FTTH FTTX network design, engineering and planning solutions,van den Dool Dick
Fibre optic FTTH FTTX network software solutions to design, engineer & plan FTTH / FTTX networks cost optimized automatically. Shows the required input, design phase and output to Autocad etc.
Cisco Network Proposal Part 1by Jesse HolmesSubmission d.docxclarebernice
Cisco Network Proposal Part 1
by Jesse Holmes
Submission dat e : 12- No v- 2017 09:15AM (UT C- 0500)
Submission ID: 87 7 204 057
File name : Cisco _Netwo rk_Pro po sal_Part_1_Updated_Jesse_Ho lmes.do cx (21.17 K)
Word count : 7 58
Charact e r count : 5134
90%
SIMILARIT Y INDEX
22%
INT ERNET SOURCES
0%
PUBLICAT IONS
90%
ST UDENT PAPERS
1 90%
Exclude quo tes Of f
Exclude biblio graphy Of f
Exclude matches Of f
Cisco Network Proposal Part 1
ORIGINALITY REPORT
PRIMARY SOURCES
Submitted to University of Maryland, University
College
St udent Paper
Cisco Network Proposal Part 1by Jesse HolmesCisco Network Proposal Part 1ORIGINALITY REPORTPRIMARY SOURCES
Jesse HolmesComment by Jeanette: IEEE format is required for this assignment. IEEE include a Table of Content, Introduction and Abstract.
November 12th 2017
CMIT 350 7982: Interconnecting Cisco Devices
Professor Jeanette Boyd
Cisco Network Proposal Part 1: Springfield Device and STP Configurations
Springfield Site Device and STP Configurations
The Springfield site requirements are innovating device hostnames by implementing, banners and secure device passwords. These are all basic initial configurations that should be made prior to connecting the switch. Spanning-Tree Protocol prevents loops from forming when switches or bridges are interconnected. The advantages are that you can add another link between the switches or bridges that provides fault tolerance. The link can also provide port bundling that will increase the speed by twice its capacity. Whenever you are configuring spanning tree after the adding the additional link, it stops switching loop by making sure there is only one active path between the links. Switching loop will keep the circling around the network which can take down. Since the administrators are having some problems placing switch 1 as the root, there will be a reconfiguration to the spanning tree configurations. The mode best suited for the environment will be chosen. Also, there will a test of multiple security measures that can be implemented to protect the devices. Comment by Jeanette: Why? Don’t just make statements, explain why they are the basic initial configurations that should be made prior to connecting the switch? These have nothing to do with the switches operation so why do you think this?Comment by Jeanette: What do you mean by “the best mode suited for the environment will be chosen?
Device Configurations
To correctly word Message of the Day and login banners, it is best to consult with the legal department first before proceeding. Once the verbiage is approved and carefully considered, it can be implemented into these banners. Switch 2 is configured as the root. In order to fix the problem the administrators are having, there will need to be configuration of switch 1 by changing the priority number to force it to become the root switch. Comment by Jeanette: Why does someone need the MOTD? Why pr ...
Security Plus Training Event for ITProcamp Jacksonville 2016. Helping those new to the IT Security get prepared. Understand how to complete your DOD 8570.m requirements.. Discussion about Exam Objectives
Chapter 03 - Network Protocols and CommunicationsYaser Rahmati
Chapter 3: Objectives
----------------------------------------------------------
After completing this chapter, you will be able to:
Explain how rules are used to facilitate communication.
Explain the role of protocols and standards organizations in facilitating interoperability in network communications.
Explain how devices on a LAN access resources in a small to medium-sized business network.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
Chapter 3 : Network protocols and communicationsteknetir
After completing this chapter, you will be able to:
1) Explain how rules are used to facilitate communication.
2) Explain the role of protocols and standards organizations in facilitating interoperability in network communications.
3) Explain how devices on a LAN access resources in a small to medium-sized business network.
Today, we talk about the 3 IoT connection challenges, the power consumption, the bandwidth, and the security.
Connectivity is the key to IoT devices. After all, connectivity makes simple things part of the Internet of Things.
Connectivity enables data collected by IoT devices to be analyzed, organized, and actually used.
When developing new IoT devices in the laboratory, it is very easy to achieve seamless, low-latency connections, but these are laboratory conditions.
In the real world, connectivity is critical to the performance of new devices, so you need to handle it properly.
So, what are the main challenges of providing reliable IoT connections? There are three main aspects to consider.
Chapter 5: Objectives
-----------------------------------------------------------
Upon completion of this chapter, you will be able to:
Describe the operation of the Ethernet sublayers.
Identify the major fields of the Ethernet frame.
Describe the purpose and characteristics of the Ethernet MAC address.
Describe the purpose of ARP.
Explain how ARP requests impact network and host performance.
Explain basic switching concepts.
Compare fixed configuration and modular switches.
Configure a Layer 3 switch.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
Upon completion of this chapter, you will be able to:
1) Describe the operation of the Ethernet sublayers.
2) Identify the major fields of the Ethernet frame.
3) Describe the purpose and characteristics of the Ethernet MAC address.
4) Describe the purpose of ARP.
5) Explain how ARP requests impact network and host performance.
6) Explain basic switching concepts.
7) Compare fixed configuration and modular switches.
8) Configure a Layer 3 switch.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
1. ZTE University univ.zte.com.cnuniv.zte.com.cn
The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
Welcome to ZTE University
2. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
iTC Overview
3. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
iTC Service Networking
4. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Purposes of applying iTC in the network are:
Save Transmission resources
Share Transcoder resources among iBSCs
Improve the utilization rate of TCU
resources
Flex Ater/A interfaces provide disaster
recovery.
5. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Interface Indices
A-interface uses the following media:
1. E1-link - 256-1 / 768-2 / 1024-3 / 1536-4
2. STM1-link – 4-1 /12-2 / 16-3 /24
A-ter interface uses the following media:
1. E1-link – 64 -1 / 192-2 / 256-3 / 384 - 4
2. STM1-link – 1-1 / 3-2 / 4 - 3 / 6-4
6. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
ZXG10 iTC System Composition
7. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Hardware Structure of ZXG10 iTC
8. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
iTC Shelves Description
9. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
iTC Shelf Configurations
Control Shelf is configured in the second shelf of
the third cabinet if needed. For one or two Cabinet iTC
configurations, control shelf’s boards are distributed
in other shelves.
Packet Switching Shelf and Circuit Switching Shelf should
be configured in the fourth and first shelves respectively.
10. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Connection Description
Clock Distribution of Combined Cabinet
11. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Ethernet Connections of Combined Cabinets
12. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
User Plane connections of combined cabinet (GLI)
13. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
User Plane connections of combined cabinet (TFI)
14. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
iTC External Connections
15. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Structure of Resource Shelf
16. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Structure of Circuit Switching Shelf
17. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Structure of Packet Switching Shelf
18. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Structure of Control Shelf
19. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
External Interfaces
20. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Clock Distribution
21. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
User Plane Signaling flow
22. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Control Plane Signaling flow
23. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Service Networking
A-ter Interface Networking A-interface Networking
24. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Maintenance System Networking
25. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Configuration principles
System configuration principles for Ater interface
TDM access modes are:
iTC supports 1 to 4 Rack configurations
One SPB supports 128 no.7 Signaling. There are 2
SPB boards that can process 256 no.7 signaling.
Resource shelf = AIU + TCU + Ater
2 Resource shelves = one PRCBU
System capacity expansion is very easy, only needs
to stack PRCBU
26. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Contd..
For Full rate Ater GUP can process 3360 voice
channels.
For Half rate, Ater GUP can process 4200 voice
channels.
Normally average value supported by Ater Gup is
3600 voice channels.
TC GUP supports 840 Traffic channels (14 DSP x
60)
Multiplexing ratio for cabling E1 or STM-1
Interface at Ater-interface is 1:4 for FR; 1:8 for
HR.
27. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
iTC System Configuration (Ater Interface
TDM)
28. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Example to calculate no. of boards required in
One PRCBU
1 PRCBU = 2 shelves
To support 1024 Trx,
At A-interface, 256 E1 required ie 8 DTB
At A-ter, 64 E1 required ie. 2 DTB
Total= 10 DTB.
One TC GUP supports, 840 TCs
For 1024 TRX, 8192 TCs ie 10 GUPs
At Ater- 8192/4 =2048 TCs=3 GUPs
Total =13 GUPs.
29. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Detailed System Configuration.
iTC can have a maximum of 4 Racks in
various configurations according to
different situations such as Ater uses E1 or
STM-1 and A-interface uses E1 or STM-1.
Integrated T-Network and Integrated IP
switch are mutually inclusive in iTC
configuration ie either use both or none
30. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Detailed System Configuration
Dual Shelf iTC Stack Configuration
31. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Single Rack Configuration (A/Ater uses E1)
32. The information contained in the file is solely property of ZTE corporation. Any kind of disclosing without permission is prohibited.
ZTE University univ.zte.com.cnuniv.zte.com.cn
Dual Rack configuration( Ater/A-interface uses E1 )
Editor's Notes
<number>
The Circuit Switching shelf is used to construct large capacity iTC and to implement smooth expansion of switching capacity.
ETSN offers the circuit switching function with smooth expansion from 64K to 256K
ERSN has 128 K Switching Capacity supporting 8 Resource shelves while STSN has 256K Switching Capacity supporting 16 Resource shelves. STSN is used if no. of resource shelves are more than 8 or can become more than 8 in future capacity expansions. Each Resource shelf provides 16 K time slot switching with circuit switching shelf implementing full T network Switching.
TFI is an interface of a subsystem; It implements the Hardware (HW ?) interface function between ETSN and UIMT.
TFI supports 64K timeslot switching and could connect four resource shelf at present.
SBCX board can be configured in control shelf or resource shelf when there is no separate control shelf.
PRCBU = Pool resource Configuration Basal Unit.
UIMT= Universal Interface Module for TSN (TDM Switch Network)
SBCX= Single Board computer of X86
UIMT= Universal Interface Module for TSN (TDM Switch Network)
SBCX= Single Board computer of X86
ETSN=Ehanced TDM Switch Network Board
TFI= TDM fiber Interface
STSN=Super TDM Switch Network board.