Table of Contents
1. INTRODUCTION AND PURPOSE .........................................................................................................5
1.1 ATM Based Architectures ................................................................................................................5
1.2 Scope of this Document...................................................................................................................6
1.3 Additional Clarifications to the Scope..............................................................................................8
1.4 Motivation for Migration to Ethernet Based DSL Aggregation .......................................................8
1.5 Requirements ...................................................................................................................................8
1.6 Key Terminology ..............................................................................................................................9
2. GENERAL REQUIREMENTS.............................................................................................................. 11
3. FUNDAMENTAL ARCHITECTURAL AND TOPOLOGICAL ASPECTS ......................................... 11
4. NETWORKING AND INTERWORKING FUNCTIONS....................................................................... 11
4.1 Customer Separation .................................................................................................................... 11
4.1.1 VLANs .................................................................................................................................... 11
4.2 DSLAM Forwarding Principles...................................................................................................... 12
4.3 QoS ................................................................................................................................................ 12
4.3.1 Mapping between ATM and Ethernet CoS........................................................................... 12
4.3.2 Queuing Scheduling and Shaping ........................................................................................ 12
4.3.3 Policing................................................................................................................................... 12
4.4 Protocol Translation Functions ..................................................................................................... 12
4.4.1 PPPoE over ATM (U-interface)............................................................................................. 12
4.4.2 IPoE over ATM (U-interface)................................................................................................. 12
4.4.3 IP over ATM (U-interface) .................................................................................................... 12
4.4.4 PPP over ATM (U-interface).................................................................................................. 13
4.5 Security Considerations ................................................................................................................ 13
4.5.1 Broadcast Handling ............................................................................................................... 13
4.5.2 L2 Peer to Peer (“hair-pin”) Forwarding................................................................................ 13
4.5.3 Traffic Separation .................................................................................................................. 13
4.5.4 Source MAC Spoofing ........................................................................................................... 13
4.5.5 Source MAC Flooding ........................................................................................................... 13
4.5.6 Secure ARP ........................................................................................................................... 13
4.5.7 Filtering................................................................................................................................... 13
4.5.8 Source IP Spoofing................................................................................................................ 13
4.6 DSL Line Identification and Traceability....................................................................................... 13
4.7 OAM............................................................................................................................................... 14
4.7.1 Ethernet OAM ........................................................................................................................ 14
4.7.2 Interworking between Ethernet and ATM OAM.................................................................... 14
5. NETWORK MANAGEMENT................................................................................................................ 14
6. DEPLOYMENT AND MIGRATION SCENARIOS .............................................................................. 14
APPENDIX A – MULTICAST SERVICES SUPPORT ............................................................................... 14