Professional Documents
Culture Documents
Legal notice
Brief description
• Feature introduces 10 Gigabit Ethernet interface external connectivity for the
mcRNC based on the IEEE 802.3-2008 standard
• 10GBase-SR and 10GBase-LR SFP+ modules are supported
• New site solution options are developed for 1 Gigabit Ethernet and 10 Gigabit
Ethernet external interfaces.
S3-B2
S3-B2 Module #3 Module #4
Module #3 Module #4
DCN OMS
DCN OMS
RAN2696 RAN2550
RAN2240 mcRNC 10 OSPF
mcRNC HW Enhancements
Gigabit Ethernet
release2 in mcRNC and
Based Network
support Flexi Direct BTS
Connectivity
RAN2257
Virtual Routing
and Forwarding
BCN-A1 BCN-B2
Configurations Configurations
10Base-T/
IEEE 802.3 10GBase-SR/
100Base-TX/ 1000Base-LX 1000Base-SX
interface subtype 10GBase-LR
1000Base-T
2x USB
Software download
1x RJ-45
Hardware maintenance
Debugging
interfaces
10GE external
ports
SFP+ 11, SFP+ 12
Number
Interface of Printed
type interface label
s
Backplane External 1GE network connectivity is implemented
ports SFP1 – based
6
(Internal SFP6
10GE) on the following standards:
• 1000Base-TX, electrical transmission via SFP
External SFP7 –
16 with RJ-45 connector
1GE SFP22
• 1000Base-SX/LX, optical transmission via SFP
External with LC-type connector
0
10GE External 10GE network connectivity is implemented
based
Trace port 1
on the following standards:
• 10GBASE-SR acc. IEEE 802.3-2008 Clause 49
and 52.5
• 10GBASE-LR acc. IEEE 802.3-2008 Clause 49
and 52.6
14 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Technical details
BCN-B hardware interface specification
Number
Interface Printed
of
type label
interfaces
Backplane
ports SFP0 –
7
(Internal SFP6
10GE) External 1GE network connectivity is implemented based
on the following standards:
External SFP13 –
10 • 1000Base-TX, electrical transmission via SFP with RJ-
1GE SFP22
45 connector
• 1000Base-SX/LX, optical transmission via SFP with LC-
External SFP+ 11 type connector
2
10GE SFP+ 12
External 10GE network connectivity is implemented based
on the following standards:
Trace port 1 • 10GBASE-SR acc. IEEE 802.3-2008 Clause 49 and 52.5
• 10GBASE-LR acc. IEEE 802.3-2008 Clause 49 and 52.6
OSPF
Iu/Iur Control plane backbone
• RAN2156 introduces Rapid Spanning Tree Protocol (according to IEEE 802.1D – 2004) in BTS
• Protection against link/node breaks in pure ETH network based on RSTP
• Reduces service unavailability and avoids immediate site visits
• Main RAN2156 applications:
• Deploying BTS as part of microwave radio or fiber based Ethernet ring topologies
• Redundant fiber access to a cell site
• Deploying multiple BTS at a single cell site (local ring instead of chain topology)
• Resolving connection errors by avoiding Ethernet loops
• RSTP is typically able to respond to topology changes within about 3s (based on minimum Hello
Time Interval of 1s) or less than 1s if connectivity failure causes a LOS to the switch and switch
supports Fast LOS detection which is the case with Flexi Multiradio 10 BTS
Aggregation
ring
Packet
Network Local ring
Active path
Cell site
Passive path
RAN2156 RAN2156
Not activated Activated
Packet
Network
Packet Packet
Network Network
OR
• Pure ETH physical ring topology not • ETH ring protection topology
supported, or supported without a need for external
• ETH ring protection topology requires cell-site device (RSTP implemented in
external cell-site device supporting BTS integrated ETH switch)
RSTP
Feature requirements:
OR
• At least two active transport ETH interfaces RAN1769 RAN1847
are needed, so one of the features below is QoS Aware Basic Ethernet
mandatory: Ethernet Switching Switching
• RU30EP1 RAN1769 QoS Aware Ethernet
Switching
• RU10 RAN1847 Basic Ethernet Switching
• It is strongly recommended to use
RAN1769 (where egress scheduling is RAN2156
supported), in order to preserve high priority Rapid Spanning
traffic when traffic is switched to alternative Tree (RSTP) in
path with limited bandwidth BTS
Hardware requirements:
• Supported WCDMA transport units (number of available ETH interfaces in brackets):
• FSMr2: FTIA (3), FTJA (3), FTIB (2), FTFB (4), FTLB (3)
• FSMr3 (indoor) without transport module (2)
• FSMr3 with transport module: FTIF (3), FIIF (3), FTLF (3)
FlexiBTS1.0
FlexiBTS2.0
FlexiBTS3.0
Flexi HW2.1
Flexi HW2.2
Root / Forwarding
Designated / Forwarding
Alternate / Discarding
Backup / Discarding
Blocked links
• RSTP convergence time (recalculating spanning tree topology upon link/node failure) in ring
topology depends on:
• Failure detection time (D)
• BPDU Hello based 3 * BPDU hello timer (6 s using default 2 s BPDU hello timer)
• LOS based less than 2 s, depending on HW capabilities (in optimal cases, e.g. FSMr3, ~100 ms)
• Number of bridges (which is equal to number of links) in the ring (N)
• Distance between actual failure point and link blocked by RSTP in stable network conditions (M)
• Number of RSTP steps required to converge: 2*M + N
• 5 ms is assumed per each step
• Total convergence time (C) can be estimated by the following formula:
• To achieve shortest convergence times BPDU messages should use the highest scheduling
priority if RAN1769 QoS Aware Switch is enabled
• Convergence time estimated above is not taking into account Root Bridge election
procedure. It is recommended that ring aggregation device is elected as Root Bridge (by
manual configuration), so any RSTP topology change will not trigger Root Bridge election
procedure (unless the ring aggregation device is down, which will anyway cut the traffic for
entire ring).
• Exemplary case for 6 nodes in the ring (N=6), LOS based detection time at 1 s
• For typical ring deployments (up to 6 nodes), failure detection time is the
most contributing factor to total RSTP convergence time
Minimum convergence time (link failure Maximum convergence time (link failure
next to link blocked by RSTP) distant from link blocked by RSTP)
M=1 1.04 s M=5 1.08 s
• RSTP control messages called Bridge Protocol Data Units (BPDUs) are
used to exchange information about bridge Bridge Identifiers (including
Bridge Identifier Priority) and root path costs.
• A bridge sends a BPDU frame using the unique MAC address of the port
itself as a source address, and a destination address of the STP multicast
address 01:80:C2:00:00:00.
• BPDU frames are not forwarded (broadcasted) by bridges (these frames are
exchanged between directly connected ETH interfaces)
• Two main types of control messages are exchanged:
• Configuration Messages (can be encoded as Configuration BPDU or
RST BPDU) aka BPDU Hello messages
• Topology Change Notification (TCN) Messages (can be encoded as
TCN BPDU or RST BPDU)
• Configuration BPDUs and TCN BPDUs encoding is supported to
provide backward RSTP compatibility with STP
• BPDUs are exchanged regularly (every 2 seconds by default, according to
configured Hello timer) and enable switches to keep track of network
changes and to start and stop forwarding at ports as required.
INTER_RAT_HANDOVER_INFO_TRANSFERRED
INTER RAT HANDOVER INFO
RRC CONNECTION SETUP COMPLETE
UE CAPABILITY INFORMATION
UE radio access capability
IPsec
IPsec allows verification of identities without exposing that
Identity spoofing Authentication information to an attacker ensuring that traffic is coming from the
authorized BTS and RNC
Packet filtering IPsec uses IP packet filtering to allow or block traffic based on IP
DoS attack address ranges, IP protocols, or even specific TCP/UDP ports
While typical implementations of ATM networks are regarded secure, the use of IP
transport opens new possibilities for transport networks which cannot be regarded as
secure anymore.
The benefit of IP transport is a possibility of using public networks for backhaul
connectivity. In this case security risks become an important issue, that can be
resolved with implementation of IPsec protocol suite.
Securing interfaces
Benefits:
It allows to use
transport networks that
cannot be fully trusted
It implements
embedded IP security
functions for Iub
interface, so that an
external Security
Gateway (SeGW) at
the BTS site is not
needed (as IPsec is
not supported on the
RNC, SeGW is
required on that end)
It complements the
RAN security solution
For the controller site (Iub, Iur, Iu-PS, Iu-CS, Iu-BC, Iu-PC, O&M)
IP security is provided by means of an external Security Gateway.
The solution can be used for all controller generations as there is
no strict dependency to it.
The same Security Gateway solution can be used for the Core Network site and
for I-HSPA.
IP Security IP Security
Not activated Activated
SGSN
L2 or L3 L2 or L3
service provider service provider Core Network
MGW
L2 or L3
service provider
Attacker
Secure IP Network
Synchronization Management Plane
• synchronization threat may lead to • Natively protected with TLS (Transport
system performance degradation Layer Security) protocol
• synchronization traffic is optionally • additionally with RAN1747
encrypted, integrity protected, and Management traffic (incl. including NTP
authenticated, although not and site support equipment traffic) is
recommended due to the possible effect encrypted, integrity protected, and
on the synchronization performance authenticated
Traffic of a collocated legacy 2G BTS, DHP traffic and traffic to/from the Certificate
aggregated with WCDMA IP traffic towards a Authority shall not be secured by IPsec.
common Ethernet backhaul can also be
encrypted and authenticated
All implementations of AH and ESP must support Security Association (SA). SA runs on top
of IP and is identified by a given Security Parameters Index (SPI). SA represents a policy
contract between two peers and describe how they use IPsec security services. SA contains:
• Authentication/Encryption algorithm, and keys used with Authentication/Encryption
• Key lifetime
• Type of network traffic being applied
• IPsec encapsulation protocol (AH or ESP, or both at the same time)
• Source Address of the SA
IKEv1 IKEv2
• RFC 2407, RFC 2408, RFC • RFC 5996
2409, RFC 4109, RFC 4995 • Two phases
• Two phases • Identity is always hidden
• Phase 1: Main Mode and • All messages are acknowledged
Aggressive mode and sequenced
• Peer identity is hidden only in • Extensible
Main Mode Authentication Protocol (EAP)
• No messages reliability used for authentication
• No authentication build in
Encrypted
Registration
Certificate
Certificate The certificates are presented during the IKE
Authority Repository negotiation as a proof of identity
For most efficient operation the Security Gateway
should be based on the Public Key Infrastructure (PKI)
and be interoperable with the NSN Certification
Authority solution as well
End entity (NB) For interoperation with other devices not supporting
PKI, the Security Gateways need to support
authentication based on Pre-Shared Keys (PSK) in
addition to certificates
Registration Authority (RA) - responsible for the registration and initial authentication of subjects
(subscribers in case of humans) asking for a public certificate
Certification Authority (CA) - responsible for establishing the identities and creating and signing the
digital certificates
Certificate Repository - public available repository, place to publish public certificates, usually LDAP
directories
Certificate Server - Machine or server responsible for certificate issuing
RA, CA and Repository may share the same server or different machines
53 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Traffic security steps (1/5)
2 IKE Phase 1
2 IKE Phase 1
2 IKE Phase 1
3 IKE Phase 2
The purpose of IKE Phase 2 is to negotiate
IPsec SAs to set up the IPsec tunnel. IKE
Phase 2 performs the following functions:
4 Information exchange via IPSec
Tunnel •Negotiation of IPsec SA parameters
protected by an existing IKE SA
5 IPSec Tunnel termination •Establishing IPsec SA’s
•Periodical renegotiation of IPsec SAs to
ensure security
•Optionally performs an additional Diffie-
Hellman exchange
2 IKE Phase 1
2 IKE Phase 1
Introduction
This feature provides a basic solution for splitting the Iub bandwidth in case
of Network Sharing by multiple operators. The feature provides:
• a fixed Iub bandwidth split for UL+DL / DL traffic for maximum 2 operators or
operator groups.
• a fixed Iub bandwidth split for DL for maximum 4 operators or operator groups.
• a dynamic transport split for UL and DL traffic for maximum 2 operators covering
NRT HSPA traffic.
Operator 1
RAN2647
CN
Not activated
Operator 2
CN
Iub 1
Operator 3 Iub 2
CN
Operator 4
CN
Operator 3
CN
Operator 4
CN
Feature Requirements:
• RAN74: The feature enables the use of native IP and Ethernet transport. RAN2647 Iub Transport Solution
for Network Sharing works only with IP Iub transport mode.
• RAN1253: The feature enables the Transport QoS Mapping. Feature RAN2647 requires in the RNC the
license of RAN1253 in the dynamic transport sharing use case because enables TQM object configuration
for operator specific DSCP assignments.
• RAN1634: The feature enables the use of native IP and Ethernet transport for UltraSite WCDMA BTS.
• RAN1709/RAN2197: The features enable the VLAN interface specific scheduling. Feature RAN2647
requires in the BTS/mcRNC the license of RAN1709/RAN2199 when VLAN based UL traffic separation is
applied.
RAN74 RAN1634
IP Based Iub for IP Based Iub for
RAN1253
Flexi WCDMA BTS UltraSite WCDMA BTS
Iub transport QoS
Features Requirements:
• RAN2.0042: The feature allows up to four operators to share RNCs and BTSs. With the MORAN feature
the resources of one cell belong to one operator and subscribers of different operators use cells in different
frequencies.
• RAN966: The feature introduces 3GPP solution for RAN sharing. With the MOCN several operators can
share the resources of one cell.
• RAN834: The feature allows one RNC to be connected to several CN (16 CS-CN and 16 PS-CN) nodes
inside one Core Network (operator).
RAN834
Flexible Iu
Service
Service Platforms
Operator A Several core network operators can be
Platforms Operator B connected to the same RNC sharing fully all
HLR
RAN resources
HLR
• Operators can have shared RAN and own dedicated RAN networks
(in this case Multiple PLMN support feature must be in use)
• The available Core Network Operators in the shared radio access network are
broadcast in the system information (SI) at RAN
Operator 2
CN Shared RNC ell 1
Service
Service Platforms
Operator A Sharing one or more physical RNC and
Platforms Operator B NodeB between multiple operators
HLR
HLR
Dedicated carrier unit per operator in NodeB
MSC/SGSN
Own PLMN-id’s and frequencies
Own cell level parameters
MSC/SGSN
Common site level parameters
Dedicated Dedicated
Operator A Operator B
frequencies frequencies
Operator 1
CN Shared
Site
Shared lub Frequency set 1
Frequency set 2
Operator 2
CN Shared RNC
Downlink:
• Up to 4 fixed bandwidth pipes can be configured per BTS Iub user plane connection
(the limitation orginates from MOCN / MORAN features)
• Implementation method is based on the IP Based Route level scheduling with separate
IPBR instances. L3 IP and VLAN connectivity options are supported at the RNC end.
Uplink:
• Up to 2 bandwidth pipes can be configured per BTS Iub user plane connection
(the limitation orginates from RAN1709 feature which supports 2 user plane VLANs)
• Implementation method is based on the VLAN interface specific scheduling.
Requires VLAN configuration in BTS and RAN1709 feature license.
1. RAN2647 feature needs PLMN id for transport pipe mapping (IP Based Route instance,
VLAN). L3 can deliver core network PLMN id information to TRM during:
– Common channel setup (in case of MORAN configuration)
– Signalling Radio Bearer, Radio Bearer setup
2. PLMN delivery:
• RNC sets PLMN identity for RRC connection setup based on cell PLMN.
• PLMN identity of the cell is received by RRC/MCC in the rrc_connection_request_s
message.
• The same PLMN identity is used for all Iub transport connections.
• Each cell in shared RAN shall broadcast information of available core network operators in
the shared area and a Common PLMN that will be used by Non-supporting UEs.
• Multiple PLMN List is received by RRC/MCC in the rrc_connection_request_s message.
• MOCN Supporting UE decodes Multiple PLMN List and take the information concerning
available CN operators in network and cell (re-)selection procedures.
• Non-Supporting UEs are only able to read PLMN Identity which is the “Common PLMN” in
the shared RAN area
SRB / RAB /
Common channel
setup, NRM checks the transport
L3 checks if the resource index from the IUO
PLMN id is known that match to PLMN id.
for the cell Transport resource index IUO -
IubTransportSharingInd
indicates which of the WBTS
object IPBR / TQM references
is selected. Select the IPBR and
L3 requests TQM reference with
transport resources given index
from NRM and NRM checks if the given IPBR /
passes the PLMN id NRM checks if the PLMN id is
given, if given then TQM reference with given
if known index is configured in the
NRM checks if the WBTS, if configured then
transport sharing is The first IPBR/TQM
activated: WBTS - reference WBTS -
IubTransportSharing IPBasedRouteId /
, if activated then Proceed with current IP transport WBTS - TQMId is
NRM checks WBTS bearer setup with taking into In case the PLMN id is not selected.
- IubTransportMedia account all possible existing defined the first IPBR/TQM
attribute: if IP setup feature combinations (IP Iub, Dual reference WBTS -
then Iub, Transport fallback, VLAN IPBasedRouteId / WBTS -
Proceed with ATM traffic differentiation) TQMId is selected.
transport bearer
reservation
DL direction only
Operator 1
CN
Operator 2
CN
Operator 3
CN
Operator 4
CN
Assumptions:
• The Iub IP transport can be either L3 or L2 based.
• The available Iub BW is 30Mbps at IP layer and 2:1:1:1 share ratio between the operators.
• Operators configure four IP Based Route instances per BTS where the transport sharing
takes place.
• The operator 1 has agreed to take the load from the common channels into its share
(MOCN case)
IP CAC IP CAC
Operator 1 IPBR
PLMN id 1 Scheduler
IPBR
Operator 2 Scheduler
PLMN id 2
Interface
Scheduler
Operator 3 IPBR
PLMN id 3 Scheduler
Operator 4 IPBR
PLMN id 4 Scheduler
IP Scheduling BW Scheduling BW
Introduction
Hybrid Backhaul is supported by means of IP as the single transport
technology. Traffic can be selectively transmitted over either IP/ML-PPP path
or IP/ETH path.
TDM Network
RAN2648
Not activated
ATM
interface
Ethernet is needed
IP Router
Ethernet Ethernet
cRNC
The activation of RAN1449: Dual Iub
for Flexi WCDMA BTS feature
in RNC is requiered
PPP/ML-PPP
Activated
Ethernet
Ethernet
Ethernet
The recommended traffic path assignment per application in the BTS for the
hybrid scenario is the following:
• High Priority User Plane (every U-Plane traffic type except for HSPA NRT):
via the TDM path over PPP/ML-PPP.
• Low Priority User Plane (HSPA NRT): via the Ethernet path.
• Control Plane: via the TDM path over PPP/ML-PPP.
• Management Plane: most likely over the TDM path over PPP/ML-PPP,
but can as well use the Ethernet path
Benefits
• This feature brings in ToP Master redundancy and thus
makes synchronization plane more reliable.
• Since ToP Masters can be deployed in different locations, not
only does this feature protect against ToP Master failures but
also against Mobile Backhaul network outages.
Sync Messages
~ Reference
Clock
ToP Master
WBTS/I-BTS #2
Announce Messages
~
• More than one IEEE1588-2008 ToP Master can be addressed by each ToP Slave.
• Supported protection schemes are:
– 1+1 (one ToP Master to protect another single ToP Master)
– N:1 (one ToP Master to protect a pool of N ToP Masters)
– protection with load sharing (each ToP Master acts as a primary ToP Slave for a number of ToP Slaves and as a
protecting ToP Master for another group of ToP Slaves)
• ToP Slave selects one ToP Master from the Acceptable Masters Table according to configurable priority
and received Clock Quality Levels.
• Only the selected ToP Master is requested to grant for Sync Messages.
• In case the connection to the selected ToP Master fails, the alternative ToP Master is requested to grant
for Sync messages.
RAN2191
Activated
Sync Messages
~
IP@ #1
Reference
Clock
Packet
PRC
Network
WBTS/I-BTS ToP Master #2
~
ToP Master Acceptance Table:
IP@ #1
IP@ #2 Announce Messages IP@ #2
Transport modes:
• ATM Iub, Dual Iub and IP Iub over ML-PPP
• Media conversion for chained or collocated BTS (CESoPSN, ML-PPP)
When using the optional transmission sub-module (FTIF) the following number of interfaces
(provided by both System Module and FTIF) is possible:
3 x GE electrical
2 x GE electrical + 1 x GE optical
1 x GE electrical + 2 x GE optical
2 x GE optical
• Routing in RNC and BTS has been done using mainly static
routes
– Only few using OSPF in RNC, partly due to limited functionality
• Routes specify gateway addresses with respect to destination
IP subnets/host
100 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Source Based Routing in the NPGE (RAN2190)
• The feature does not bring only the possibility of source based routing, but
also other improvements in use of default routes
• To improve configuration simplicity and flexibility in case operators are
configuring traffic separation (different VLANs for Iu-PS/CS user plane and
control plane) between RNC and the RNC site routers
• Feature enables
– The RNC allows configuring multiple routes to the same destination, or from
the same source subnet when source-based routing is used
– It is also possible to configure different source-based routes attached to
overlapping source subnets
– The user plane related part of the feature enables to configure a routing
restriction for user plane traffic separation (see next slide)
▪ Source IP selection in the RNC is performed per transport bearer during bearer
establishment phase,
▪ Routing decision is done independently for each egress IP packet, a packet with
certain source IP address can be transmitted via another interface with different IP
address.
101 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
ECMP Basics
I-BTS RNC
102 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
ECMP
RNC
103 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Use Cases for Source Based Routing - 1
• In this use case, RNC shall be configured to send data to an SGSN via
two different IP interfaces on the same NPGE(P). Two static routes
towards the SGSN IP address are configured, leading to an ECMP
scenario.
• RNC shall transmit all packets originating from IP address 10.1.1.4 via the
green VLAN, while all packets originating from address 10.1.2.4 shall be
transmitted via the red VLAN.
PRFILE
parameter
enable/disable
ECMP routing
restriction
The following routing table shall be applied in NPGE(P) (Both routes shall have
the same preference.) :
10.9.1.1 via 10.1.1.2
10.9.1.1 via 10.1.2.2
104 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Use Cases for Source Based Routing - 1
In this use case, RNC shall be configured to send data to an SGSN via two
different IP interfaces on the same NPGE(P).
Two static routes towards the SGSN IP address are configured, leading to
an ECMP scenario.
The following routing table shall be applied in NPGE(P):
•10.9.1.1 via 10.1.1.2
•10.9.1.1 via 10.1.2.2
•(Both routes shall have the same preference.)
RNC shall transmit all packets originating from IP address 10.1.1.4 via the
green VLAN, while all packets originating from address 10.1.2.4 shall be
transmitted via the red VLAN.
By limiting the route selection in this way, ECMP situation is completely
avoided and unambiguous routing is provided.
105 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Use Cases for Source Based Routing - 2
The following routing table shall be applied in NPGE(P) (Both routes shall have
the same preference.) :
default via 10.1.1.2
default via 10.1.2.2
106 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Use Cases for Source Based Routing - 3
• This use case adds handling of control plane traffic to the previous
one
• SCTP packets from ICSU shall be transmitted by NPGE(P) via the
correct VLAN interface, according to source IP address in each
packet
The following routing table shall be applied in NPGE(P) (Both routes shall have
the same preference.) : Dst=default GW=10.1.1.2
Dst=default GW=10.1.2.2
Src=10.2.2.0/24 GW=10.1.3.2
Src=10.2.3.0/24 GW=10.1.4.2
107 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Use Cases for Source Based Routing - 4
• This use case utilizes source based routing to support asymmetric SCTP
multi-homing via a single NPGE unit
• The intention of multi-homing is to guarantee different transmission routes
for primary and secondary SCTP traffic paths as much as possible
• Without source based routing in NPGE this is impossible as long as the
remote side offers only a single IP address (asymmetric SCTP multi-
homing).
The following routing table shall be applied in NPGE(P) (Both routes shall have
the same preference.) :
Src=10.2.2.0/24 GW=10.1.1.2
Src=10.2.3.0/24 GW=10.1.2.2
108 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Routing
109 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Exercise-1
110 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Exercise-1: Iu- PS with Direct Tunnel
RNC GGSNs
HSRP OSPF
ICSU 00
GGSN#5
SGSN#3
10.0.2.3 /32
GGSN#6
• No
• IUPSIP
– Destination IP address 0.0.0.0/0.0.0.0 , IPQM=1, IP based route ID=1
112 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Summary
113 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
3GTPL IP Features
114 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN1879: Dynamic Routing by OSPF
working
NPGE
IF 1 Other nodes
Virtual IP Network
IP
IF 2 e.g. SGSN
OSPF
• Finds shortest path.
protecting • Sends link-state messages
• Sends hello messages.
RNC
• The functionality was only in the RNC providing interface protection for
NPGE
• It was not possible to use VLANs in the RNC at the same time as OSPF
• RAN1879 for RNC does not replace RAN1510: OSPF for Redundancy but
extends its capabilities
– BTS, cRNC and mcRNC
116 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN1879 Dynamic Routing by OSPF
117 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN1879 Dynamic Routing by OSPF, cont.
118 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
AS A AS B
OSPF Basics
Abbreviations:
AS – Autonomous System
BA – Backbone Area
SA – Stub Area
IR Area 2 ASBR
NSSA – Not-So-Stubby Area
IR – Internal Router NSSA
ABR – Area Border Router
ASBR – Autonomous System
ABR
Boundary Router
Area 0
cRNC
BA
ABRs
Area 4 (SA) ABR
L2 Backhaul Area 3
IR
SA
119 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
OSPF Basics, cont.
Open Shortest Path First (OSPF) is a link-state dynamic routing protocol in IP
networks. It belongs to a group of interior gateway protocols (IGP), operating
within a single autonomous system (AS).
OSPF uses a Link State Database that describes the topology of the AS, inside of
which it is deployed.
120 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Basic Concepts of OSPF - 1
• OSPF area:
– OSPF uses a 2 level hierarchical model
– Areas defined with 32 bit number which is configured in IP address format, but can also
be configured using single decimal value (ie. Area 0.0.0.0, or Area 0)
– Area 0.0.0.0 (or area 0) is reserved for the backbone area
– All areas must connect to area 0
– Stub area is an area which does not receive external route advertisements. It may be
configured to reduce many route advertisements into an area
▪ Instead of the external routes, a default route is advertised to the stub area.
– A totally stubby area (TSA) is an area does not allow summary routes
▪ The only way for traffic to get routed outside of the area is a default route.
– A not-so-stubby area (NSSA) is a type of stub area that can import autonomous system
external routes and send them to other areas, but still cannot receive AS external routes
from other areas
▪ NSSA is an extension of the stub area feature that allows the injection of external routes in a
limited fashion into the stub area.
121 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Basic Concepts of OSPF - 2
• OSPF Algorithm
– Network changes generates LSAs, LSAs are exchanged periodically
– All routers exchange LSAs to build and maintain a consistent database
– The router calculates the shortest-path tree for the area, with this router itself as root by
the Dijkstra algorithm
122 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Example for cRNC
123 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Use case: OSPF in BTS, HSRP at RNC site routers
L3 RNC
Area 1
Area 0 NetAct
Area 11 IP
Backbone
DCN
124 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Use case: OSPF in BTS, HSRP at RNC site routers,
cont.
•L3 backhaul network is deployed between BTS and RNC site routers
•OSPF is configured in BTS and in L3 backhaul network
•BTS subnets are automatically advertised in L3 backhaul network by OSPF
•In case link failure between BTS and RNC site routers occurs, new path (if
available) is calculated by OSPF basing on new topology
•Optionally BFD support for OSPF can be enabled (to speed-up failure discovery
or to limit OSPF Hello packets bandwidth needs on shared Ethernet segment)
•HSRP is configured at RNC side (no OSPF support for Iub)
125 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Configuration of Failure Detection
• The last mile for each BTS is still a single link in this
configuration
– It is sufficient to operate OSPF with a hello timer of 10 seconds
– Sufficient to recognize that there is a problem and to raise an alarm.
– Any shorter values would not help to resolve a connectivity break, as
there is no protecting link
• Among the routers in the backhaul it is recommended to use
BFD, or fast hello to recognize link breaks quickly and to
trigger rerouting.
126 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Use case: OSPF in BTS and mcRNC
Area 100
RNC – Box 1
User plane
10.1.1.1
Router A User plane
10.1.2.1
Virtual IP Interface IP Trsp
Ctrl plane
Address Address 1.1.1.1/26
4.1.1.1/30
IP Address
10.1.3.x
OSPF 4.1.1.2/30
OSPF
OMU (WO)
10.1.5.1
3.1.1.1/32 1.1.1.3/26 Eth L3
FTM
OSPF Router B User plane
BTS OSPF
Trsp 10.2.1.1
1.1.1.2/26
IP Address
User plane
4.1.1.66/30
10.2.2.1
4.1.1.65/30
Ctrl plane
10.2.3.x
Area 1
OMU (SP)
10.1.5.1
RNC – Box 2
IP backbone
Area 0
127 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Use case: OSPF in BTS and mcRNC, cont.
128 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
OSPF configuration
129 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
OSPF in the BTS
130 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Application, Network Interface and Virtual IP
addresses
O&M Subnet
Exit. Site
Support
MP @ Ethernet Equipment
Transport Subnet
Interface
Network
Ethernet Interface
Interface IP@
IP CP @
Transport
Network
Transport Subnet
UP @ Application addresses
Network
Ethernet Interface
Interface IP@
SP @
Virtual
IP@
131 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Application, Network Interface and Virtual IP
addresses
132 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Virtual IP Addresses
133 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Routing Table in the BTS
134 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Summary
137 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2359: OSPF Enhancements in BTS
139 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Background, cont.
The OSPF support for fast hello packets feature provides a way to send
hello packets in intervals less than 1 second. Such a configuration would
result in faster convergence in an OSPF network.
When fast hello packets are configured on the interface, the hello interval
in the hello packets is set to 0. The hello interval in the hello packets
received over this interface shall be ignored.
Note: OSPF with fast hello packets isn’t yet a standard or rfc draft. And
both hello interval and dead interval must be the same for all routers
attached to a common network.
140 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2359: OSPF enhancements: Functionality
141 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2359: OSPF enhancements: Functionality
•When OSPF detects a new, fully adjacent neighbor it starts the BFD module
and requests for the establishment of a BFD session between the neighbors.
•The link supervision is established only between fully adjacent neighbors (in
case of Ethernet between DR and BTS) to speed up routing table update.
•It also minimizes the required number of BFD sessions and reduces the
load of BFD control packets over the network.
•When a session is established and no BFD control packet is received from
the peer within the BFD interval, BFD notifies a failure to OSPF.
•OSPF then terminates the neighbor relationship on the link. With BFD link
supervision the overall network convergence time can be reduced.
•Note! The BFD link supervision is to be established only between fully
adjacent DR and BDR in case of an Ethernet broadcast connection between
the BTS and the peers.
142 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Parameters to Configure for BFD and OSPF
• Both OSPF Hello and BFD packets timers used for network
failure detection are configurable.
• Usually when 4 OSPF/BFD Hello packets are missed on
receiving side the link is considered down (this is also
configurable).
• OSPF timers:
– Failure_detection_time [s] = DeadInterval
– Packet_sending_rate [pps] = 1 / HelloInterval
• BFD timers:
– Failure_detection_time [s] = Remote_DetectMult *
MAX(Local_RequiredMinRxInterval,
Remote_DesiredMinTxInterval)
– Packet_sending_rate [pps] = 1 / DesiredMinTxInterval
143 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Bandwidth Comparison between BFD and Hello
• Conclusions
– OSPF bootstrapped BFD session for link monitoring configuration consumes
significantly less bandwidth than only OSPF Hello based configuration, when
the same failure detection times are assumed
– In case OSPF bootstrapped BFD session for link monitoring configuration
cannot be used, VLANs should be configured to limit number of BTSes per
shared Ethernet L2 domain
147 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Summary
148 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
3GTPL IP Features
149 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2440: Fast IP Rerouting
151 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Overview
152 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Fast IP Rerouting
The primary route in the routing table of the router R1 (downlink) and the
BTS (uplink) is connected to the BFD session.
Router 1
NPGEP 00
(WO)
1.1.1.1/26
Lo:6.1.1.1
Towards RNC the routers implement a virtual router using HSRP. Router R1 can
be configured as primary router for the one group of BTSs, the router R2 can be
the primary router for the other group of BTSs.
154 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Configuration in the BTS
155 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Gateway Protection
• You could configure ECMP with Fast IP routing in case there is no HSRP
and dual routers
• You can bind static route with single-hop BFD session in RNC as well
• Additionally you can add ICMP session to check the destination reachability
• Combining the scenario with NPGE protection could be complicated (testing
recommended)
BFD session1
NPGE SGSN
Router
NPGE
ICMP session1
BFD session2
156 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Exercise-2
157 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Exercise-2
158 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Summary
160 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN1769: QoS Aware Ethernet Switching
• Improvements are
– QoS classification and shaping
– VLAN aware switching
– no external base-station switch needed for collocation or chaining
162 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RU30 RAN 1769 QoS aware Ethernet Switching
QoS transport functions in BTS-switch
• Ingress rate limiting possibility
• BTS-switch is VLAN aware
– Default VLAN-ID configurable
– VLAN IDs are manually configured for each port
– Discard un-tagged traffic configurable
• Egress Scheduling and Shaping (below)
163 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Summary
164 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
3GTPL IP Features
165 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN1886: Efficient Transport for Small IP
Packets
• For small frame sizes (e.g. as with voice) the overhead from the IP and
UDP headers leads to a high transport inefficiency.
167 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Functionality
• In RU30 EP1 with feature Efficient Transport for Small IP Packets, this
packets can be multiplexed together into one IP Packet reducing the
transport network overhead.
• All IP packets with the same IP address and the same DSCP code are
applicable to be multiplexed together.
Multiplexed
packets
Multiplex
packet
168 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Actual IP and Ethernet Level Capacity Gain vs No.
of Parallel AMR Calls
RAN1886 multiplexing gain vs No. of 12.2kbps AMR calls
gain
60,00%
on IP level
40,00%
30,00%
20,00%
10,00%
0,00%
20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100
No. of calls
Estimation assumptions:
– DL 12.2kbps AMR calls only
– muxDelay parameter set to default value = 2ms
– activity factor for AMR = 0.6
– SRB FP PDUs also contribute to the overall multiplexing gain since SRBs are normally
mapped to the same DSCP as AMR service
169 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Network Design Impact with Iub loadsharing
IP@1 NPGE1
calls 1 to 8
calls 1 to 8
IP@2 NPGE2
IP based route
IP@3 NPGE3
WBTS
IP@4 NPGE4
RAN1886-multiplexed traffic flow
RNC
RAN1886 multiplexing/demultiplexing engine
170 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Summary
171 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
3GTPL IP Features
172 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2338: Loadsharing with Protected
NPGEs
• Load sharing with NPGEs will support creating the IP based routes with IP
addresses over different NPGEP units for both Iub and Iu interfaces
• IFC is not supported
• For Iub load sharing the NPGE protection is required due to save the calls
and common channels
NPGEP0 GE0
(WO) GE1 Sıte router
NPGEP1 GE0 Last mile without
Iub IP based route 1 GE1 bandwidth limitation
(SP)
(no IFC) WBTS 1
NPGEP2 GE0
(WO) GE1 Traffic-prioritization-
NPGEP3 GE0 capable device
(SP) GE1
Iub IP based route 2 Transport
(no IFC) Network
ESA24
WBTS 2
ESA24 DCN
Iub IP based route 3
(IFC) NPGEP4 GE0
GE1 Sıte router
(WO)
Bandwidth-limited WBTS 3
NPGEP5 GE0 last mile
(SP) GE1
RNC
174 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Iu Load Sharing with NPGEs
Sıte router
Bandwidth-limited
Sıte router links
MGW
175 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Load Sharing with NPGEs
176 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Connection Admission Control
– On Iub interface
▪ IP Based Route Committed Bit Rate >= Σ Bit rate of IP connection + IP
Based Route Signaling Committed Bit Rate + IP Based Route DCN
Committed Bit Rate
179 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2523: BTS Backhaul over Physically
Separated VLAN Interfaces
181 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
BTS Backhaul over Physically Separated VLAN
Interfaces (RAN2523)
• More than one VLAN interface can be used in the BTS to transport Iub
traffic on physically separated ports
182 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Traffic Separation and Load Distribution
One Ethernet IF in BTS
• Applications, UP2+CP+SP,
are bounded to the virtual IP
address, A2
• Application UP1 is bounded to BFD for VLAN1
virtual IP address A1
BTS SR1 RNC
• M1, M2 belong to a separate VLAN1
subnet VLAN1
VRRP/HSRP
• BTS routing entries towards VLAN2
RNC using both routers as
gateways SR2
VLAN2
BFD for VLAN2
VLAN1 = user plane 1
VLAN2 = other planes (fallback
for UP1)
183 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Traffic Separation and Load Distribution, cont.
One Ethernet IF in BTS
Pre-requisites:
• RAN1709 + RAN2440 (Traffic separation and load distribution)
Configuration BTS:
• Two network Interfaces (VLAN Interfaces) are configured: VLAN1, I1 ; VLAN2, I2
• Applications, UP2+CP+SP, are bounded to the virtual IP address, A2
• Application UP1 is bounded to virtual IP address A1
• M1, M2 belong to a separate subnet
• BTS routing entries:
• Primary route: src A1, dest RNC, gw SR1
• Secondary route: src A1, dest RNC, gw SR2
• Primary route: src A2, dest RNC, gw SR2
• Secondary route: src A2, dest RNC, gw SR1
• Primary route; src M, dest RNC, gw SR1
• Secondary route: src M, dest RNC, gw SR2
• BFD session: I1 <-> SR1. BFD session: I2 <-> SR2
• VLAN1, VLAN2 assignment to EIF1
Configuration Site Router 1:
• Primary route: dest A1, gw I1
• Secondary route: dest A1, over SR2
• Primary route: dest A2, over SR2
• Secondary route: dest A2, gw I1
Configuration Site Router 2:
• Primary route: dest A1, over SR1
• Secondary route: dest A1, gw I1
• Primary route: dest A2, gw I2
• Secondary route: dest A2, over SR1
184 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Traffic Separation and Load Distribution
Two Ethernet IF in BTS
Node B EIF1
• Pre-requisites: UP1
– RAN2523 + RAN2440 (Traffic A1
VLAN1
separation and load distribution) UP2 I1
CP A2 I2
• Configuration BTS:
SP VLAN2
– Two network Interfaces (VLAN
SSE M1
Interfaces) are configured: VLAN1, I1 SSE
SSE
M2 EIF2
; VLAN2, I2
– Applications, UP2+CP+SP, are
bounded to the virtual IP address, A2
– Application UP1 is bounded to virtual
IP address A1
BFD for VLAN1
– M1, M2 belong to a separate subnet
– BTS routing entries towards RNC as BTS SR1 RNC
both site routers as gateways VLAN1
VLAN1
– BTS switch VLAN-aware: VRRP/HSRP
185 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Traffic Separation and Load Distribution
Two Ethernet IF in BTS
Pre-requisites:
• RAN2523 + RAN2440 (Traffic separation and load distribution)
Configuration BTS:
• Two network Interfaces (VLAN Interfaces) are configured: VLAN1, I1 ; VLAN2, I2
• Applications, UP2+CP+SP, are bounded to the virtual IP address, A2
• Application UP1 is bounded to virtual IP address A1
• M1, M2 belong to a separate subnet
• BTS routing entries:
• Primary route: src A1, dest RNC, gw SR1
• Secondary route; src A1, dest RNC, gw SR2
• Primary route: src A2, dest RNC, gw SR2
• Secondary route: src A2, dest RNC, gw SR1
• Primary route: src M, dest RNC, gw SR1
• Primary route: scr M, dest RNC, gw SR2
• BFD session: I1 <-> SR1. BFD session: I2 <-> SR2
• BTS switch VLAN-aware:
• EIF1, VLAN1
• EIF2, VLAN2
Configuration Site Router 1:
• Same as case 4
Note: It shall be included in the Use Case that no plain Ethernet is foreseen -> loops
186 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Traffic Separation and Redundant VLANs in
Different ETH IFs Increased complexity 4
VLANs needed per BTS,
• Pre-requisites: at least 2xBFD sessions
– RAN2523 + RAN2440 (NO LOAD between site Node B
router and EIF1
DISTRIBUTION!! ) BTS I1 VLAN1
– Note that this case will not apply if the I2 VLAN2
UP
same VLANs are configured in both Eth
CP A1
Interfaces I3 VLAN3
SP
• Configuration BTS: I4 VLAN4
SSE
SSE
SSE
M1
– Four network Interfaces (VLAN M2 EIF2
Interfaces) are configured: VLAN1, I1 ;
VLAN2, I2 ; VLAN3, I3 ; VLAN4, I4
– Applications, UP+CP+SP, are bounded
to the virtual IP address, A1
– M1, M2 belong to a separate subnet BFD for VLAN1
BFD for VLAN2 RNC
– BTS routing entries towards RNC using BTS SR1
VLAN1
both site routers and VLANs:
VLAN1 VLAN2
– BFD session: I1 <-> SR1/VLAN1, I2 <-> VLAN2
VRRP/HSRP
SR1/VLAN2
VLAN3
– BTS switch VLAN-aware: VLAN4 VLAN3
SR2
▪ EIF1, VLAN1, vLAN2 VLAN4
187 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Traffic Separation and Redundant VLANs in
Different ETH Ifs, cont.
Pre-requisites:
• RAN2523 + RAN2440 ( !!NO LOAD DISTRIBUTION!! )
• Note that this case will not apply if the same VLANs are configured in both Eth Interfaces
Configuration BTS:
• Four network Interfaces (VLAN Interfaces) are configured: VLAN1, I1 ; VLAN2, I2 ; VLAN3, I3 ; VLAN4, I4
• Applications, UP+CP+SP, are bounded to the virtual IP address, A1
• M1, M2 belong to a separate subnet
• BTS routing entries:
• Primary route: src A1, dest RNC, gw SR1/VLAN1
• Secondary route: src A1, dest RNC, gw SR2/VLAN3
• Primary route: src M, dest RNC, gw SR1/VLAN2
• Secondary route: src M, dest RNC, gw SR2/VLAN4
• BFD session: I1 <-> SR1/VLAN1, I1 <-> SR1/VLAN2
• BTS switch VLAN-aware:
• EIF1, VLAN1, vLAN2
• EIF2, VLAN3, VLAN4
Configuration Site Router 1:
• Primary route: dest A1, gw I1
• Primary route; dest M, gw I2
• Secondary route: dest A1, over SR2
• Secondary route: dest M, over SR2
Configuration Site Router 2:
• Primary route: dest A1, over SR1
• Primary route: dest M, over SR1
• Secondary route: dest A1, gw I3
• Secondary route: dest M, gw I4
188 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Limitations in BTS Backhaul over Physically
Separated VLAN Interfaces
• No different MAC@ per ETH interface (the same BTS
internal ETH MAC only available for traffic
originated/terminated in BTS)
• Chaining scenario not supported by FTIB or Flexi 10 without
optional transport module (only 2 active ETH available)
• Assigning both BTS backhaul ETH interfaces to the
same VLAN should be avoided (to prevent potential L2
loops)
189 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Summary
190 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
3GTPL IP Features
191 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN1878: IP over ML-PPP on E1/T1
Interfaces
193 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
IP over ML-PPP on E1/T1 Interfaces with
Redundant RNC Site Solution
The (ML)PPP function
is not resilient, but only
distributed
between both
gateways
194 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
IP over ML-PPP on E1/T1 Interfaces with Ethernet
Backhaul
• This hybrid scenario allows parallel use of TDM and Ethernet
backhaul, using IP as a common transport technology,
• High priority traffic uses the ML-PPP path, including
synchronization for the BTS.
Next hop router/
Cisco 76xx./ Tellabs 86xx
195 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN1878 IP over ML-PPP on E1/T1
Hardware with supported E1/T1 modules
(ML)PPP is used in the last mile, running between Flexi WCDMA BTS
and the next hop IP router (e.g. Cisco76xx or Tellabs 86xx).
The functionality is supported in the following transport cards:
196 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Comparison between ATM and ML-PPP Efficiency
ML-PPP + Efficient
Traffic ATM [kbps] ML-PPP [kbps]
transport [kbps]
197 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Summary
198 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
3GTPL IP Features
199 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2083: ProxyARP in BTS
201 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2083 Proxy ARP for BTS, cont.
Introduction
Brief description
1.Routers by default do not forward ARP broadcasts, ProxyARP was implemented
to enable devices that are separated
into physical network segments connected by a router in the same IP network to
resolve the IP-to-MAC addresses.
2. Thanks to ProxyARP feature which is enable at the NodeB’s external IP/Ethernet
interfaces, the static/dynamic routing
on the Next-hop router does not have to be configured towards the BTS’s O&M
internal subnet.
202 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2083 Proxy ARP for BTS
Proxy ARP general description
With proxyARP, the router will recognize the ARP request for the
host D, which is on a different physical segments but in the same
subnet. It will reply with its own MAC address to the ARP requests
from host A. In the following, host A will send the IP packets for host D
to the MAC address of the router. The router will forward the IP
packets to host D
203 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2083 Proxy ARP for BTS, cont.
Proxy ARP general description
How does the ProxyARP work ?
On the presented diagram we see two physical segments (two subnet, subnet A
and subnet B) separated by the router. The particular interest are here the
netmasks. Host A has a /16 subnet mask, while Host B and D have /24. It means
that Host A believes that it is directly connected to all of network 172.16.0.0. When
Host A (172.16.10.100) needs to send packet to Host D (172.16.20.200) it will send
ARP broadcast to all devices into the network A to get MAC address of Host D, but
the ARP broadcast doesn’t reach the Host D, as it is behind the router. In this case
the Proxy ARP which is enabled on the FA 0/0 will respond on behalf of Host D with
its own MAC address and IP address of the Host D.
204 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2083 Proxy ARP for BTS
Functional description
205 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Activation and Configuration
directly
connected
Next-hop router
NodeB 10.1.4.0/28
NodeB Supernet
10.1.4.14/28 network
10.1.4.0/29 10.1.4.8/29 FE0/0
Subnet Subnet
O &M C /U
10.1.4.1/29 10.1.4.9/29 00:17:42:13:C2:E4
ProxyARPList
10.1.4.1 The O&M and transport subnets of
BTS are combined in one supernet
10.1.4.2
SSE
10.1.4.2/29
The O&M and transport subnets of the BTS are combined in one supernet.
The O&M subnet 10.1.4.0/29 and the transport subnet 10.1.4.8/29 are included into
one supernet 10.1.4.0/28.
The next-hop router has the IP 10.1.4.14 with 28 bits netmask. It means that it
believes that is is directly connected to whole
Supernet. When the packet comes to the next-hop router dedicated to 10.1.4.1/29
(M-Plane Agent). Next-hop router will do ARP broadcast to find out the MAC.
Broadcast will reach the NodeB’s external Ethernet interface where the proxyARP is
running. If the requested IP address exists on the list the proxy reply to the next-hop
router with its own MAC.
The main benefit of that solution is that no static or dynamic routing need to be
configured on the next-hop router to reach
The O&M subnet.
This scheme does not support traffic separation between U/C plane and O&M traffic.
208 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2083 Use Case #2
O&M Supernet across several BTSs
11. 129.0.0/ 21
O& M supernet Ip route 11.129.0.0 255.255.248.0 interface FE 0/0
U/ C plane
NodeB
FE0/0
11. 129.0.0/28 10.1.4.0/29
10.1.4. 254/24 M plane
O& M C/ U 10.1.4.1/29
11. 129.0.1/28
NodeB
The O&M and transport subnets are
11. 129.0.16/28 10.1.4.8/29 terminated on the same
next-hop interface, but the networks are splited
O& M C/ U 10.1.4.9/29 and create two independent supernets. The
11. 129.0.17/28 O&M subnets of several BTSs are combined
in one supernet. The second supernet creates
the transport network of BTSs
ProxyARPList
SSE 11. 129.0.17
This Use Case is for those operators which
11. 129.0.18/28 11. 129.0.18 want to have traffic separation, but are not
going to deploy VLANs for M-plane
209 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2083 Use Case #2, cont.
O&M Supernet across several BTSs
In this usecases the O&M subnets of several BTSs are combined in a single O&M
supernet, which is urelated to the subnet for the U/C plane
Addresses.
To reach the Ip address in the O&M supernet the static route is configured in the router.
Each IP packet to the O&M supernet is sent out via the FE 0/0 interface.
210 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2083 Use Case #3
O&M supernet on separate VLAN
11. 129.0.0/ 17
O& M supernet U/ C plane
10.1.4.6/29
NodeB 2001
C/ U 10.1.4.1/29 10.1.4.14/29
11. 129.0.0/28
11.129.255.254/16 M plane
O& M 4001
M 11. 129. 128.1/17
11. 129.0.1/28
Note: splitting the /16 subnet into
two /17 subnets have to be done carefully.
The IP addresses used for transport at the
NodeB BTS need to be in the 'upper' subnet,
2002
C/ U 10.1.4.9/29 such that the router and the BTSs are
11. 129.0.16/28 directly connected.
O& M 4001
11. 129.0.17/28 M 11. 129. 128.17/17
This use case provides logical traffic
ProxyARPList separation between M-plane and U/C
11. 129.0.17 plane traffic with VLAN support.
SSE
11. 129.0.18/28 11. 129.0.18
No static route on the router is needed. The O&M subnet on VLAN 4001
is directly connected to the router.
211 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2083 Use Case #3, cont.
O&M supernet on separate VLAN
1. In this use case the O&M supernet and C/U (Transport) supernet are
separated and mapped to different VLANs.
2. The O&M supernet is splitted into two subnets with 17 bits netmasks. Upper
subnet 11.129.128.0/17 is forseen to Transport
purposes and second subnet 11.129.0.0/17 is forseen for O&M.
3. This use case provides logical traffic separation between M-plane and U/C
plane traffic with VLAN support.
4. No routing is needed on next-hop router
212 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
Feature performance impact
213 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
3GTPL IP Features
214 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2071: Synchronous Ethernet
Generation
• With this feature a co-located site and/or another chained tail site can be
synchronized via SyncE (e.g. when building Flexi Packet Radio networks).
• The frequency synchronization of the SyncE outgoing signal can be
derived from a number of synchronization sources.
• Synchronization capabilities are improved, by allowing:
– Synchronous Ethernet based synchronization across a few chained WCDMA
BTS nodes,
– A co-located device to be synchronized as well via a SyncE line
NOTE!
Available for
FTLB, FTFB only
(not FTIB)
217 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.
RAN2071 Synchronous Ethernet Generation
Benefits
218 RN30032EN40GLA0 ©2014 Nokia Solutions and Networks. All rights reserved.