You are on page 1of 40

Carrier Network Architecture, Evolution and Challenges P-1

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-2

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-3

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-4

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-5

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-6

• Data refers to information in any format. The format used to encode any information must follow agreed or
standard rules before successful communication between a sender and receiver is possible.
• For example, a picture can be broken down into a number of dots referred to as pixels, each pixel can then be
represented by a number which can then be encoded ready for transmission. The format used to encode the
image data by the sender must be understood by the receiver to enable them to decode and rebuild the
picture.
• Common types of data that can be encoded for transmission include text, numbers, pictures, audio, and
video. many standard ways of encoding the different types of data exist.
• Data communication is the process of exchanging data between two devices through a transmission medium,
such as a wired or wireless network.
• A simple data communication system consists of a message, a sender, a receiver, a (transfer) medium, and a
protocol.
 1. Message: A message contains information that needs to be communicated. This could be text, numbers, a
picture, sound, or video which will be encoded and transmitted as one or more messages.
 2. Sender: The sender is a device or system that transmits the message, this could be a PC, a workstation, a
server, or a mobile phone.
 3. Receiver: The receiver is a device or system that receives the message, this could be a PC, a workstation, a
server, a mobile phone, or a television.
 4. Medium: The medium is a physical or logical connection between the sender and the receiver which is
capable of carrying the message. Typical types of medium are twisted pair cable, coaxial cable, optical fiber
and radio wave.
 5. Protocol: The protocol is the set of rules that controls the way in which data exchanged. The protocol
does not necessarily define what the original data is or how it is encoded, just how it should be exchanged by
two communicating devices. Protocol rules define such things as the speed at which data is transferred and
the size of the data unit that is sent. It will also define when a communication session starts and ends. These
rules can be likened to the rules which define the way we talk to each other or read and write, without such
rules even if we use the same language we cannot communicate.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-7

• A network is any group of people, things or places that are interconnected in


some way. Networks exist everywhere in our life, we have road, rail,
telephone and postal networks which we use on a daily basis.
• A internet network consists of two or more computers and peripheral which
are interconnected by communication lines. The computers in a network can
easily exchange and share information and resources .
• Internet networks were developed to meet increasing requirements for
exchanging information and sharing resources.
• In early internet networks , each computer was an independent device, there
was little or no communication between systems.
• As computer and communication technologies evolved, communication
between different systems was made possible.
• Standard protocols understood by different systems made sharing resources
and data possible and improved resource utilisation.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-8

• DARPA (Defense Advanced Research Project Agency) established ARPAnet, which could achieve the high
redundancy and self-recovering network that was able to achieve the military requirement in war. As long as
there is physical connection between 2 physical nodes, service data transmission can be assured.

• In 1985, the NSF (National Science Foundation) in US established NSFnet. NSF established WAN regional
network and managed to established interconnections with these WAN and the supercomputers in the area.
In June 1990, NSFnet had completely replaced ARPAnet to become the major Internet backbone network. The
major contribution of NSFnet was to make Internet to be opened for public usage; whereas previously,
internet was only limited and restricted for researchers and government agencies’ usage.

• In early 1990, internet has reached its highlight leap year when business sector began to probe into internet
era; soon, business organizations discovered the potential in internet to help in business sector from the
aspect of communication, data searching and customer services etc. This makes internet development has
grown so tremendously and evolved into the era that “everyone can’t leave without internet” internet
dominating society nowadays.

• In year 1995. NSFNET has ended its service; internet backbone network was then being maintained and
operated by a couples of private companies; This marked the begin of the competition era between different
private internet provider companies throughout the world.

• Upon discussing about internet development, Tim Berners-Lee must be honored, who is best known as
the inventor of World Wide Web. Tim Berners-Lee invented the World Wide Web in 1989. He founded
and Directs the World Wide Consortium (W3C) the forum for technical development of the Web. He
founded the Web Foundation whose mission is that the WWW serves Humanity, and co-founded the
Open Data Institute in London.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-9

• The first generation computers used vacuum tubes for circuitry and magnetic drums for memory,
and were often enormous up to a room size. They were bulky, expensive, electricity consuming and
generated a lot of heat that might led to mal-functionality. They relied on the lowest level machine
language to perform operations and could not support multi-tasking. The UNIVAC and ENIAC
computers are examples of first-generation computing devices. The UNIVAC was the first
commercial computer delivered to a business client, the U.S. Census Bureau in 1951.

• Transistor based computers in 2nd generation replaced vacuum tubes computer for its inapplicability.
The transistor based computer was invented in 1947, but was not widely used immediately until late
1950s. It replaces vacuum tube over the size, speed, cost, energy efficiency and reliability. However,
it still relied on punched cards for input and output. Second-generation computers moved from
cryptic binary machine language to symbolic, or assembly, languages, which allowed programmers
to specify instructions in words. High-level programming languages such as COBOL and FORTRAN
were developed at this time too.

• Integrated circuit computers marked the third generation of computers. Transistors were reduced in
size and embedded on silicon chips called semiconductor. This type of computers allowed users to
interact with the computers to perform input and get output through peripherals such as keyboards
and monitors. Multiple applications can be operated simultaneously as there is a central processing
device monitoring over the device memory. This was the first time computers were presented
proudly to public as a smaller and cheaper device.

• The microprocessor brought the fourth generation of computers, as thousands of integrated circuits
were built onto a single silicon chip. The size of a computer was further reduced till the size of a
palm! In 1981, IBM released its first ever home use computer and soon after that in year 1984,
Apple introduced Macintosh.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-10

• Repeater or hub operates at the physical layer to amplify network transmission signal so as to extend the
transmission distance. A hub is working in a collision domain based on the CDMA/CD mechanism to detect
and listen for data forwarding.

• Bridge works at data link layer to connect 2 LAN devices. It can divide or isolate a wide LAN network into two
or more LAN interconnection network logically. MAC address table is used to guide bridge to decide which
port to perform data forwarding. Each physical port is considered as a collision domain and every device will
share bandwidth of the port.

• L2 switch, working on data link layer too, share the basic functions of bridge. Similar to bridge, a switch
device is a broadcast domain and every port is a collision domain. The difference of L2 switch and bridge is
that switch provides more ports, and they can be divided into different VLAN to divide a single broadcast
domain into multiple broadcast domains. Besides, switching is performed on L2 switch hardware and this can
provide faster switching speed compared to bridge processing through software realization.

• L3 switch, is equipped with L3 routing function other than having the functions of a L2 switch. Thus, it is
working on network later. It can be used to manage a large-scale LAN data exchange; it can be used to
perform LAN forwarding or even L3 data forwarding, such as routing table maintenance, routing updates and
route calculations. Calculation and processing is performed through the ASIC chips while data forwarding
process is handled by high speed hardware technologies so as to achieve speed forwarding.

• A data center switches are considered as the highest level switch which is currently used mainly by large
enterprises and cloud providers that rely heavily on virtualization, to build a large scale of data center network.
These switches should be able to perform its switching functions throughout the whole data center which
might be in a multiple level top-down or left-right architecture.

• CSS (Cluster Switch System) is also known as stacking switch, where 2 physical switches can be stacked
together into a virtual logical switching devices. Through this, higher network reliability and higher
forwarding capability can be supported.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-11

•Router is a device used to realize communication of devices between different network. It is


working on network layer in TCP/IP protocol stack, allowing packets to be forwarded towards
destinations across different networks based on route calculation. Normally, a routers can
support various kinds of routing protocols and dynamic routing protocols are commonly used
to perform route calculations and selections.

•SOHO routers are suitable to be used only for small scale PC network to meet the basic need
of a network access due to its low performance, poor stability and limitation of the
supporting devices.

•The low end or mid end routers are already able to meet the network requirements of
schools, government departments, business companies etc. However, there are still restriction
from the aspect of high reliability, security and performance.

•High end routers have a greater improvement over low or mid end routers on its capacity,
high performance and high reliability, make them to be widely used on different areas of IP
network such as IP core backbone network, IP bearer network or IP MAN network.

•As for high-end cluster routers, they are well-known for its large capacity feature which is
normally used in carrier-class IP core backbone network.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-12

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-13

• Fixed network refers to the fixed line communication between fixed points. Telecom
operators provide fixed line telecommunication service such as home broadband, IPTV,
leased line and internet browsing through the investment in fixed line basic network
infrastructure.
• Fixed line broadband services refer to the broadband services provided such as ISDN, ADSL,
ADSL2+, and fiber solution Etc.

• Integrated Services for Digital Network (ISDN) is a set of communication standards for
simultaneous digital transmission of voice, video, data, and other network services over the
traditional circuits of the public switched telephone network. ISDN is a circuit-switched
telephone network system, which also provides access to packet switched networks,
designed to allow digital transmission of voice and data over ordinary telephone copper
wires, resulting in potentially better voice quality than an analog phone can provide. It
offers circuit-switched connections (for either voice or data), and packet-switched
connections (for data), in increments of 64 kbps. In some countries, ISDN found major
market application for Internet access, in which ISDN typically provides a maximum of 128
kbps bandwidth in both upstream and downstream directions.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-15

• IP MAN network is mainly divided into 3 layers: which are listed below
1. Access layer: Provide different access interfaces to user to allow users to flexibly access
into the network. Main equipments in this layer include DSLAM, OLT/ONU, ethernet
switch etc
2. Aggregation later: Perform physical or logical aggregation functions, and also perform
user authentication, authorization and accounting function; main equipments in this layer
include ethernet switches, and MSCG (Multi- Service Control Gateway).
3. Core layer: Perform high speed switching and forwarding and it is mainly comprising of
high end routers.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-16

• Fixed line network applications include PC accessing to HSI (High Speed Internet service),
users use TV set-up box to watch TV programs, leased line phone communication between
corporate enterprises and branches etc.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-17

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-18

• 2G is the abbreviation of “the second generation of mobile communication technology


specification”. 2G technologies enabled the various mobile phone networks to provide
the services such as text messages, picture messages and MMS (multi media
messages).. 2G has been superseded by newer technologies such as 3G or 4G;
however, 2G networks are still used in many parts of the world.

• 3G, short form of third generation, is the third generation of mobile


telecommunications technology. This is based on a set of standards used for mobile
devices and mobile telecommunications use services and networks that comply with
the International Mobile Telecommunications-2000 (IMT-2000) specifications by the
International Telecommunication Union. Three standards of 3G existing in different
regions globally include CDMA2000, WCDMA and TD-SCDMA.

• 4G, short for fourth generation, is the fourth generation of mobile


telecommunications technology, succeeding 3G. A 4G system must provide
capabilities defined by ITU in IMT Advanced. Potential and current applications
include amended mobile web access, IP telephony, gaming services, high-
definition mobile TV, video conferencing, 3D television, and cloud computing.

• 5G (5th generation mobile networks or 5th generation wireless systems) denotes the
next major phase of mobile telecommunications standards beyond the current
4G/IMT-Advanced standards. 5G has speeds beyond what the current 4G can
offer.4G,

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and P-19
Challenges

• Wireless network architecture consists of the a radio access network (RAN) and core
network (CN). The CN are further divided into the CS (Circuit Switched) domain and PS
(Packet Switched) domain.
• The different network scopes in mobile network are explained briefly as listed below:-
1. RAN(Radio Access Network): Located inside the BSS, the RAN refers to the
indispensable ground-based basic architecture used for the 3G radio communication
equipment, including the high-speed mobile access to the Internet. The RAN must be able
to provide diversified services for each 3G subscriber, including access, roaming,
transparent connection to the PSTN and Internet, data service quality management, and
network connection.
2. CN(Core Network):Located inside the NSS, the CN mainly serves to forward the call
requests or data requests sent by subscribers to different networks. Logically, the CN
consists of the CS domain and PS domain.
3. CS(Circuit Switching):The CS domain mainly processes voice services. In a traditional
telecom network, voice services are usually transferred through CS. The CS mode is
implemented as follows: A temporary circuit is first set up between the transmit end and
receive end before the two communication parties talk with each other. In the UMTS
network, the network that processes voice services is called the CS domain.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and P-20
Challenges

 When the mobile network is evolving and developing, moving from traditional 2G, 3G up
to 4G LTE network which is more and more widely used nowadays, however, the method
of how a base station, and a base station controller, for all 2G (Base Transceiver Station to
Base Station Controller) , 3G (node B to RNC) and 4G (eNodeB to aGW network is the
same, which is connected through a RAN (Radio Access Network).
 As for the external interface connected between a base station and base station controller,
the interfaces deployed might be a ATM network or TDM network which use E1
connection or Ethernet network which uses Ethernet connection.
 Different types of equipments can be used to build a RAN network; it can be built using
transmission equipments working in layer 2 or even be built using IP equipments working
in Layer 3. The next slide will further explain in detail on how a RAN network can be built
through different domains.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-21

• The external interfaces provided by different types of base stations (including 2G and 3G) might vary based on
base station types. A base station must be able to support all the 3 possible types of external interface
connection modes, which include TDM mode, ATM mode or Ethernet mode. E1 interfaces are deployed in
both TDM and ATM connection mode while Ethernet interfaces are used in Ethernet mode.

• A mobile backhaul network supports many types of devices and networking solutions. Mobile backhaul
networks can be categorized into transport and router networks by network platform. If a mobile backhaul
network uses the IP packet technology to transmit services, it is called an IP Backhaul. In the narrow sense, an
IP Backhaul is implemented on an IP/MPLS router network.

1. Transmission mode:
 SDH backhaul Solution: On a 2G network, a BTS provides TDM E1 interfaces and uses SDH to
transmit services to the BSC.
 MSTP backhaul Solution: If a BTS provides Ethernet interfaces to transmit services, SDH devices
are required to support Ethernet interfaces to transmit services. In fact, SDH devices change to
MSTP devices which support both SDH and Ethernet interfaces.
 PTN backhaul Solution:Using PTN devices with the packet switching technology based on
statistical multiplexing improves bandwidth usage. In addition, traditional SDH device maintenance
mode is used to maintain networks. Therefore, PTN devices provide both packet switching
functions and SDH maintenance experiences.

2. Route mode:
 ATN&CX backhaul Solution: ATN and CX/NE are router equipment . Using routers with the
statistical multiplexing technology improves bandwidth usage and reduces rent costs. Customers
can customize routers and deploy them based on live network situations to transmit services
flexibly. The MPLS+VPN solution is the mainstream solution for mobile bearer.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-22

• The section previously described about the connection between base station and base
station controller; however, to accomplish a mobile network service, service flow in
between equipments in core network is necessary. For example, when we make a long
distance call, user voice signaling data needs to be sent from local MGW to external MGW
which is located in other region. How are these MGWs being connected? Or in other
words, how are the core network equipments being connected to each other?

• As telecommunication is moving towards all IP era, all core network equipments are now
connected through IP bearer network. IP bearer network is not only responsible for
achieving the communications and connections between all core network equipments, it
also helps to achieve service types isolation successfully so as to improve network security
and enhance network scalability.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-23

• IP bearer network are consisting on access router (AR), aggregation border router (BR) and
core router (CR). Normally, this IP bearer network is applied nationwide in one country.
Normally, there are only a few CRs, located in core regions; normally there is a pair of BRs
located in different regions or different provinces; There will be more access layer routers
in IP bearer network compared to AR and BR.

• All core networks service equipments, such as MSC and MGW are connected to IP bearer
network through Customer Edge (CE) equipments which are comprises of routers
equipments too.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-24

• The summary of telecommunication network is described as below:-


1. Transmission network: Transmission network is needed when two telecommunication
devices are located far from each other and thus they cannot be directly connected to
each other. Depending on the nationwide network scale, transmission network can be
divided different layers’ architecture, for example, provincial level transmission network,
regional transmission backbone network and backbone transmission network. The
transmission network provides interconnection between IP bearer network and LAN
network.

2. IP Core Backbone Network: Most of the network operators provides two backbone
network; one is the IP core network to provide internet access and another one is the IP
bearer network used to provide inter-operability between telecommunication signaling
devices for IP connectivity (for example, interconnection between media gateway and
softswitch). IP core network consists of access router (AR), border router (BR) and core
router (CR). Signaling devices and user access CE (customer edge) equipments will only
be connected to AR; while BR and CR is only used for aggregation layer and core layer
inter-connectivity.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-26

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-27

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-28

• We realize the world is talking about IPv6 now, because the next year is the 2012 of IPv4
address

• Some telcos talk IPv6 as they really meet the IPv4 address issue, some of them talk IPv6
because of the branding and promotion demand, they need to let the world know they are
still the industry leading operators, and some of them talk IPv6 as they really have IPv6
users.

• And governments talk IPv6 because of the country’s strategy request, such as the US
government and European Commission, and Japan Government, as we know IPv6 is not
just a complementary feature, actually IPv6 will be a game-change one from strategy and
competition point of view.

Confidential Information of Huawei. No Spreading Without Permission


P-29
SDN Architecture and Ecosystem(SC)

• Why is the length of an IPv6 address 128 bits?


• According to the chip design, the values are represented by 0 and 1. The data
length that the CPU can process experiences 4 bits, 8 bits, 16 bits, 32 bits, and 64
bits.
• When data can be expressed using binary digits, the data-processing efficiency of
the CPU is highest.
• The length of an IPv4 address is 32 bits because the length of data that the CPU of
a host on the Internet can process is 32 bits at that time.
• Considered data processing efficiency and the future expansion of networks, the length of
an IPv6 is defined to be 128 bits.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-30

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-31

• Compared to other service, the ARPU of the video service keeps increasing compared to
other services such as voice and HSI service. It is clearly shown that carriers nowadays
cannot gain more revenue from the voice service and broadband service even though their
subscriber quantity is increasing. The video service is a wonderful chance for carrier to
boost subscriber quantity and revenues.

• Survey showed that the Compound Annual Growth Rate (CAGR) obtained from video
service dominating over 70% of the traffic of all service.

• Before the 4K video service, most OTT service providers provide services and charge
subscribers directly. Carriers can only lease their pipelines for transmitting content but are
unable to gain revenues from the content of the pipeline.

• In the 4K era, OTT videos set extremely high requirements on network quality. OTT service
providers must cooperate with carriers to achieve a win-win situation.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-32

 4K is a new digital cinema resolution standard that arises from the digital films produced
by Hollywood moviemakers. It is defined by International Telecommunication Union (ITU)
and named as Ultra High Definition or Ultra HD. Common 4K resolutions are 3840*2160
and 4096*2160, both of which have horizontal resolution on the order of 4000 pixels.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-33

• In the 4K era, OTT videos set extremely high requirements on network quality. OTT service
providers must cooperate with carriers to achieve a win-win situation. Thus, 4K era is
going to be the next network trend that would be the main market among the network
provider players.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-34

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-35

Besides the traditional PC which have been used since decades ago, the emergence of Smart
TV and different types of smart terminals have rapidly driven traffic requirement on the fixed
broadband, and thus adds more expectation towards the broadband service provider.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-36

In the operator network, fixed network and mobile network are separated from each
other; Its access, transmission and data channels are maintained separately too. In
order to optimize network resources and unify network control and management to
maximize network revenue, fixed mobile convergence is the best solution.

The FMC2.0 era has come. Below are the flow FMC2.0 network:-
1. Broadband + Content: It is the extension of the existing broadband network
(including fixed broadband and mobile broadband), in order to monetize the
broadband value; There are a few typical application example for this FMC2.0
solution. One of it was the British Telecom directly purchased exclusive content to
provide BT sport channel; Besides, China Telecom and China Unicom also
cooperate with OTT content providers in order to achieve win-win situation for
both parties.
2. Content to Broadband: Players which already hold the content application
market is expanding towards the network side, in order to drive content
development in the other way; in addition to the growing numbers of wired TV
operators providing broadband service, OTT players are also now trying to build
they own broadband networks; for instance, Google’s Google Fiver (1GBps) and
Sony Sonet (2GBps).
3. MBB to FBB: Besides, there are also many mobile network operators extending
their network to build a fixed broadband network, so as to retain their existing
customers, and improve customer’s experience; for example, Vodafone, MTN and
China Mobile.
• Thus, it is clearly shown that FMC2.0 is the main trend that would increase the
long awaiting competition in fixed network.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-37

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-38

• The idea of NFV is to decouple the network function from purpose build hardware, to
become software driven. Through virtualizing these software function and run them on a
common pool of infra, cost reduction may be achieved through the employment of COTS
and elastic control of cloud.

• Bear in mind, virtualization is just first step of NFV where the ultimate target is to build all
these functions on cloud foundation platform. Similarly to the IT cloud infra that already
mature years ago, the Telco Cloud is the new vision to sustain all these Telco network
functions.

• As you can see, when an application of in this case the network function is built on cloud
platform. Things like Cloud Session management also will be employed to ensure session
consistency and data integrity. As one of Cloud’s advantage, we may scale in/out the NE as
per requirement, this is crucial to maintain the user experience.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and Challenges P-39

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and P-40
Challenges

• As traditional network deployed distributed system, each device in the traditional network
perform network control and forwarding, several issues and challenges are faced in
traditional network:-
1. Complicated network protocols and realization makes the O&M difficult –
too many protocols, too many standards and RFC, too many commands lines in
different vendors makes a network engineers need to spend years to master the
whole multi-vendor network.
2. Implementation of new network service feature is slow – take years to
define a standard for new solution in IETF, take years for vendors to develop new
functions version, need time to upgrade hardware, perform configurations
before service deployment!
3. No centralized control on the traffic path calculation – for traditional IP
network, paths are calculated based on SPF, define next hop and can’t be
changed; even if we know there is network congestion in the shortest link and
there is alternative available. MPLS TE also faces the same issue even it can be
used to redirect traffic; MPLS TE paths are built in distributed control plane by
each ingress and paths are built based on sequential order.

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and P-42
Challenges

Confidential Information of Huawei. No Spreading Without Permission


Carrier Network Architecture, Evolution and P-43
Challenges

Confidential Information of Huawei. No Spreading Without Permission

You might also like