Dual stack with tunneling (DSwT)
...................................................................................................................................................................................................................................
Introduction
The Dual Stack with Tunneling (DSwT) feature provides a way to manage IP devices
through the DCN network.
An IP EMS (Element Management System) is used to manage NEs which use IP based
management protocols (IP NEs).
Dual stack
Dual Stack means adding an IP Router stack to an existing OSI stack.
Tunnel
A tunnel is a unidirectional path through the OSI domain capable of transporting IP
packets. The tunnel consists of an endpoint in the OSI domain (NSAP) and the
encapsulation/decapsulation mechanism to transport an IP packet in an OSI network.
The actual path taken by the encapsulated IP packet is completely determined by the
normal OSI routing mechanisms.
TCP/IP tunneling
This feature is intended to forward IP traffic between IP managed equipment at the
borders of the SDH network and their IP-based management system.
In order to use the tunneling feature it is necessary to provision the following using the
ITM-SC or the ITM-CIT:
• map a “tunnel far-end” to each (masked) IP-destination, where all IP-addresses are
implied that fulfill the most significant bits (non-masked) part of the IP-destination.
Only the far-end of a tunnel needs to be identified through its NSAP address (the
near-end is implicitly this NE). Resources for a maximum of 50 tunnels must be
provided.
• provision its own IP-address in the NE.
• enable IP routing.
• add routing information for forwarding towards an external IP router, when the
IP-destination is not connected to the QLAN of the NE.
• enable (when desired) automatic creation of tunnels, towards all other NE’s in this
area that have automatic creation enabled. Note that manual provisioning of tunnels
as in ”1” is needed for a tunnel that spans a number of areas, while subsequent
tunneling within the destination area can make use of automatically created tunnels.
Network architecture
The network architecture in the figure is used in this example.
Management communication setup
...................................................................................................................................................................................................................................
4-18
Alcatel-Lucent - Proprietary
See notice on first page
365-312-807R7.2
Issue 4, May 2007