Technical specifications Connect Ethernet

Delivery of junction

Connect Ethernet is offered as both UNI-UNI and UNI-NNI type connections.

The transmission between two transfer points on the basis of the defined connection features is defined as a connection. We distinguish between UNI-UNI and UNI-NNI type connections.


A UNI-UNI type connection is a dedicated connection between two transfer points/ physical interfaces. The transfer interface at the transfer points depends on the chosen cegecom product. Transmission takes place transparently and at the defined quality.


With a UNI-NNI type connection individual connections are transferred to a NNI (multiplex connections on NNI type). Transmission takes place transparently and at the defined quality. The transfer point at the remote end / site of the connection is formed by a UNI interface.

Optical LX 1310 nm
Single ModeOkOk
Optical SX 850 nm
(auf Anfrage)
Electrical RJ4510/100/1000 BaseTOkOk
Tableau 3: Interfaces disponibles (UNI, NNI)

The following table shows cegecom’s standard port settings for 1 GBit/s; different settings may be agreed during realization.

Paramétrage de portParamétre
Flow ControlActivé
Tableau4: Paramétrages de port

Connection properties

For these products cegecom offers and guarantees the connection properties set out in the table below for the relevant connection types.

objetPropriétés / Exigences
Type de connexionEPL UNI-UNIConnexion point à point

Service basé sur le port via UNI
EPL UNI-ENNIConnexion point à point

Service basé sur le port via UNI multiplexing EPL via ENNI
Redondance (optionel)Planification sur des points de transmission spatialement séparés
Interconnexion sur des sites distincts, au moins séparés spatialement lors du deuxième raccordement maison
Chemins à bords et à nœuds disjoints
Profil de largeur de bande

Exigences faisant référence au débit brut de la connexion pour les tailles
lt Tableau 2
Largeur de bandeConformément au tableau 1
Upgrade de la capacitéUpgrade au sein du type d’interface Ethernet physique via UNI (10/100 ou 1000Mbit/s)
AR ≤ 10Mbit/s≤ 4 ms
Paramètres de qualité
Exigences faisant référence au débit brut de la connexion pour les tailles 64 Byte ≤ taille ≤ 9218 Byte
Frame Delay
(one way)
10 Mbit/s < AR ≤ 100 Mbit/s
≤ 2 ms
AR > 100 Mbit/s< 2 ms
Frame Delay Variation (one way)< 1 ms
Frame Loss Ratio (one way)< 0,04%
Transmission transparenteFrame Typeselon IEEE 802.3tunnels
Adresses MACtunnels
VLAN intégrée
VLAN-TAG tunnels
VLAN-TAG Priority conformément à 802.1ptunnels
Layer 2 Control Protocol (L2CP)selon IEEE 802.1, IEEE802.2 et IEEE802.3 ainsi que protocoles Cisco (voir tableau 21)Tunnels
Pas d’évaluation / Utilisation des adresses MAC et d’informations de type Ether et Sub au sein du réseau du provider pour la transmission du trafic
Protocoles au-dessus de Layer 2Tunnels
Preuve des propriétés de connexion sur base RFC 2544
Paramètres de qualité
(Frame Delay
Frame Delay Variation
Frame Loss Ratio)

Débits brut et net
Pour les tailles de 64, 128, 256, 512, 1024, 1280, 1518, 1596 et 9000 Byte
Protocole de mesure lors de la :
Mise en service

Tableau5: propriétés de connexion

Additional services

In accordance with the agreement and within the scope of existing technical and operational possibilities cegecom will provide the following additional services for an additional charge:


Service availability in the event of failures of individual components can be secured by duplication of these components at the connection point. Other redundancy scenarios are possible, depending on availability requirements: double end-device, double power-unit, double access-line, double house lead-in permanent 2-way-routing; etc.

These are not part of the product and must be commissioned by the customer and planned by cegecom separately following individual advice and inspection of the premises.


To protect your network against a “man-in-the-middle attack” it is possible on request to encrypt the connection. Connect Ethernet 256 bit AES (Advanced Encryption standard) encryption is based on the Diffie-Hellman key-agreement protocol. It stands out in particular for the protection of complete user data, including headers and checksums. Every Bit transferred is encrypted, so there is no attack surface for data theft.