Preview

FSP 150EG-X R5.5: Carrier Ethernet Edge Gateway

Satisfactory Essays
Open Document
Open Document
13256 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
FSP 150EG-X R5.5: Carrier Ethernet Edge Gateway
Product Description
FSP 150EG-X R5.5
Carrier Ethernet Edge Gateway

Document Version 1.5
Change History
Version Date

Changes

1.0

08/06/2009 First release of PD for aggregation shelf.

1.1

03/09/2009 R5.1 KD3a updates.

1.2

14/12/2010 R5.1 KD4 updates.

1.3

11/07/2011 R5.1 KD5 updates.

1.4

21/10/2011 R5.5 KD3 updates.

1.5

10/04/2012 R5.5 KD4 updates.

FSP 150EG-X Product Description

Contents:
1

Introduction .................................................................................................... 4
1.1

Product Positioning .................................................................................... 4

1.2

Applications and Deployment Scenarios ....................................................... 5

1.2.1
1.2.2

Broadband bandwidth .......................................................................... 5

1.2.3

Timing Distribution .............................................................................. 6

1.2.4

Business Services ................................................................................ 6

1.2.5
2

Wireless Backhaul ............................................................................... 5

Ethernet over SONET/SDH ................................................................... 7

Product Overview ............................................................................................. 8
2.1

Description of Product ................................................................................ 8

2.2

Chassis and Common Components .............................................................. 9

2.2.1

Mechanics, Power Supplies and Cooling .................................................. 9

2.2.2

Switch Fabric (SWF) ............................................................................ 9

2.2.3

Network Element Management Interface (NEMI) ....................................10

2.2.4

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1310 Unit 3 Exercise 1

    • 443 Words
    • 2 Pages

    Application (in terms of cabling infrastructure) – systems supported by telecommunications cabling; includes Ethernet, Token ring, Fiber Distributed Data Interface (FDDI), and Asynchronous Transfer Mode (ATM)…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt 2580 Project Part 2

    • 1249 Words
    • 5 Pages

    New Egg. (2011). Cisco Small Business SLM2024T-NA Gigabit Smart Switch SG200-26 10/100/1000Mbps 24 x RJ45 + 2 x RJ-45 Uplink + 2 x Combo mini-GBIC. Retrieved october 3, 2011, from www.Newegg.com: http://www.newegg.com/Product/Product.aspx?Item=N82E16833150121…

    • 1249 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    3. FTTH: : Fiber reaches the boundary of the living space, such as a box on the outside wall of a home. Passive optical networks and point-to-point Ethernet are architectures that deliver triple-play services over FTTH networks directly from an operator's central office.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The utilization of networking hardware is used to connect different computers to a server in the case of my company it will be used to connect the different sections within our company. There are many different types of hardware to include bridges, routers, switches, and even networking cards. Our company will use routers, firewalls, and switches. With the routers and firewalls we will protected from threats to a degree by viruses, and attackers. One of the most commonly used is McAfee Antivirus which is the software that I would present to be used as security software. With the routers and firewalls, it will block any unwanted activity coming across the network. The use of the software allows the use of a security firewall that works with the internet firewall increasing our chances of not being attacked or corrupted by viruses, and hackers. It also provides anti-spyware upon the network, indicates safety of websites, and web protection detects and helps rid the network of any spyware, malware, and viruses, phishing and spam when it comes to email, and web usage. Without both networking hardware and software total security cannot exist.…

    • 939 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Fa Mu Lan Analysis

    • 138 Words
    • 1 Page

    Kingston’s mother tells her the story of Fa Mu Lan’s battle with menstruation so that Kingston is able to accept her identity as a woman and the challenges that come with it. Fa Mu Lan, a female character that many people look up to, is a story that was told to many girls. In the story, there is an old couple that trains Fa Mu Lan to become a warrior. When Fa Mu Lan menstruates for the first tell, they explain to her, “You don’t stop shitting and pissing. It’s the same with blood. Let it run” (Kingston 31). Menstruation represents Fa Mu Lan’s womanhood. The old woman teaches her that she has to let her blood flow because she can’t control it. Additionally, her period is a reminder that her identity as a woman cannot be…

    • 138 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    ISP205L lecture

    • 1496 Words
    • 6 Pages

    - An i-clicker for in class participation questions. This is also required for the ISP 205 lecture…

    • 1496 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    A divide and conquer approach permits concerns related to networking hardware to be completely separated from those related to networking software.…

    • 694 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Evolution of Ethernet

    • 558 Words
    • 3 Pages

    When dividing a local network into VLANs, you must obtain switches that support VLAN technology. You can configure all ports on a switch to serve a single VLAN or multiple VLANs, depending on the VLAN topology design.…

    • 558 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hardware Chapter 16

    • 1038 Words
    • 5 Pages

    A. ADSL uses one upload speed from the consumer to an ISP and a faster download speed. SDSL uses equal bandwidths in both directions.…

    • 1038 Words
    • 5 Pages
    Good Essays
  • Good Essays

    It 242 Packet Switching

    • 729 Words
    • 3 Pages

    The old telephone system (PSTN) uses circuit switching to transmit voice data whereas VoIP uses packet-switching to do so. The difference in the way these two types of switching work is the thing that made VoIP so different and successful.…

    • 729 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ethernet or Token Ring

    • 476 Words
    • 2 Pages

    •Saguaro Federal has mainframes for all of its banks and businesses. Must the company use the Ethernet or Token Ring protocol? Explain your choice. Why is this choice appropriate?…

    • 476 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Fast Ethernet and Token Ring

    • 3692 Words
    • 15 Pages

    Local area network is a computer network that spans a relatively small area. Most local area networks are confined to a single building or group of building. A group of computers interconnected in local area network so that they are able to communicate, exchange information and share resources. It means the multiple users can use the same computer resources in the network, regardless of the physical location of the resources. Users can also use the local area network to communicate with each other, by sending email or engaging in chat session. Devices on one local area network can often transmit to the outside world if the local area network is connected to telecommunications link to the internet or corporate network or to another local area network across the country.…

    • 3692 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Network Plan

    • 779 Words
    • 4 Pages

    Every company, no matter how big or small, will need careful attention to detail to ensure that an organization’s information will function properly and will be secure. Some of the things to consider are hardware, software, cost analysis, disaster recovery plans, and authentication policies. When creating a network plan for Acme Sensitive Data, these measures were taken. Their company has two adjacent floors with 20 employees. The other floors of the building contain several other companies that cannot gain access to their network.…

    • 779 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Jodhpur Institute of Engineering & Technology Online National Polling Software Requirements Specification Team Intelligentsia Team Members Ankit Dad Ankit Lakhotiya Arjun Singh Chirag Soni Project Guide Lect. Akash Soni Index & Tables 1) Introduction:..................................................................................... 3 1.1)…

    • 4503 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    cabling study sheet

    • 902 Words
    • 6 Pages

    Designed to use high-speed communication protocols that does not depend on any specific LAN topology…

    • 902 Words
    • 6 Pages
    Good Essays

Related Topics