Technical Specifications Connect Wave

Below is a description of the basis for the definition of the features of Connect Wave.

Delivery of junction

Connect Wave is offered as dedicated (UNI-UNI) type connection at both transfer points. The transmission between two transfer points on the basis of the defined connection features is defined as a connection.

The transfer interface at the transfer points depends on the chosen cegecom product. Transmission takes place transparently and at the defined quality.

Interface type at transfer point

Cegecom offers the SFP (Small Form-factor Pluggable) interfaces for Connect Wave as defined in Table below.

InterfaceTransmission effectuée selon
OptiqueModeType de connexion
LX 1310 nm
Single ModeDédiée (UNI)
SX 850 nmMulti ModeDédiée (UNI)
ZX 1550 nmSingle Mode(sur demande)Dédiée (UNI)
Tableau 4: Connect Wave: interfaces (UNI) disponibles

The following table shows cegecom’s standard port settings; different settings may be agreed during realization.

Paramétrage de portParamètre
Flow ControlActivé
Tableau 5: Connect Wave: Paramétrages de port

Connection properties

For these products cegecom offers and guarantees the connection properties set out in the table below for the relevant connection types.

objetPropriétés / Exigences
Type de connexionEPL UNI-UNIConnexion point à point

Service basé sur le port via UNI
EPL UNI-ENNIConnexion point à point

Service basé sur le port via UNI multiplexing EPL via ENNI
Redondance (optionel)Planification sur des points de transmission spatialement séparés
Interconnexion sur des sites distincts, au moins séparés spatialement lors du deuxième raccordement maison
Chemins à bords et à nœuds disjoints
Profil de largeur de bande

Exigences faisant référence au débit brut de la connexion pour les tailles
lt Tableau 2
Largeur de bandeConformément au tableau 1
Upgrade de la capacitéUpgrade au sein du type d’interface Ethernet physique via UNI (10/100 ou 1000Mbit/s)
AR ≤ 10Mbit/s≤ 4 ms
Paramètres de qualité
Exigences faisant référence au débit brut de la connexion pour les tailles 64 Byte ≤ taille ≤ 9218 Byte
Frame Delay
(one way)
10 Mbit/s < AR ≤ 100 Mbit/s
≤ 2 ms
AR > 100 Mbit/s< 2 ms
Frame Delay Variation (one way)< 1 ms
Frame Loss Ratio (one way)< 0,04%
Transmission transparenteFrame Typeselon IEEE 802.3tunnels
Adresses MACtunnels
VLAN intégrée
VLAN-TAG tunnels
VLAN-TAG Priority conformément à 802.1ptunnels
Layer 2 Control Protocol (L2CP)selon IEEE 802.1, IEEE802.2 et IEEE802.3 ainsi que protocoles Cisco (voir tableau 21)Tunnels
Pas d’évaluation / Utilisation des adresses MAC et d’informations de type Ether et Sub au sein du réseau du provider pour la transmission du trafic
Protocoles au-dessus de Layer 2Tunnels
Preuve des propriétés de connexion sur base RFC 2544
Paramètres de qualité
(Frame Delay
Frame Delay Variation
Frame Loss Ratio)

Débits brut et net
Pour les tailles de 64, 128, 256, 512, 1024, 1280, 1518, 1596 et 9000 Byte
Protocole de mesure lors de la :
Mise en service

Tableau5: propriétés de connexion

Additional services

In accordance with the agreement and within the scope of existing technical and operational possibilities cegecom will provide the following additional services for an additional charge:

Redundancy / diversification

Securing the availability of the service against failures of individual components is possible by duplication of these components. Depending on security requirements various redundancy or diversification scenarios are possible.

These are not part of the product and must be commissioned by the customer and planned by cegecom separately following individual advice and inspection of the premises.


To protect your network against a “man-in-the-middle attack” it is possible on request to encrypt the connection Connect Wave 256 bit AES (Advanced Encryption standard) encryption is based on the Diffie-Hellman key-agreement protocol. It stands out in particular for the protection of complete user data, including headers and checksums. Since our data encryption is at the lowest level, all higher layer protocols can be transparently transferred (Ethernet for instance). Every Bit transferred is encrypted, so there is no attack surface for data theft.