IP Bearer Training Book
Short Description
IP Bearer Training Manual...
Description
HUAWEI
IP BEARER NETWORK PLANNING AND DESIGN TRAINING
© 2013 Huawei Technologies Co.,Ltd.
All Rights Reserved No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Huawei technologies Co., Ltd
Trademarks HUAWEI, C&C08, EAST8000, HONET, ViewPoint, Intess, ETS, DMC, TELLIN, InfoLink, Netkey, Quidway, SYNLOCK, Radium, M900/M1800, TELESIGHT, Quidview, Musa, Airbridge, Tellwin, Inmedia, VRP, DOPRA, iTELLIN, HUAWEI Optix, C&C08 iNET, NETENGINE, Optix, SoftX, iSite, U-SYS, iMUSE, OpenEye, Lansway, SmartAX are trademarks of Huawei Technologies Co., Ltd. All other trademarks mentioned in this manual are the property of their respective holders.
Notice The information in this manual is subject to change without notice, every effort has been made in the preparation of this manual to ensure accuracy of the contents, but all statements, information, and recommendations in this manual do not constitute a warranty of any kind, express or implied.
TABLE OF CONTENT
IP Network Technologies and Service ……...……...……...…………....1 IP Network Planning and Design Outline……………………..………..22 IP Backhaul Network Planning and Designing Overview…………….52 QoS Technologies for IP Bearer Network………………...…….……...61 IP Bearer Network Planning and Design Case Study………………….90
IP Network Technologies and Service Introduction www.huawei.com
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Foreword With the development of telecom technologies, the IP has taken the place of the ATM and has become the leading technology in existing networks. The bearer of multiple services has become the major trend of the IP network development. This course introduces the services of the IP bearer network.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page1
1
Objectives Upon completion of this course, you will be able to: Know the evolution trend of IP Network Describe the services of IP bearer network Know IP bearer network solutions
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page2
Contents 1.
The evolution trend of IP Network
2.
The services and actuality of IP Bearer Network
3.
IP bearer network solutions
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page3
2
Basic Concept of NGN NGN is a packet switched network, it can provide various telecommunication services, make use of transmission technology with several bandwidth and QoS function to realize the separation of service function and low layer transmission technology, and provide permissive access to different service providers’ network for users.
PSN
Data
Open architecture Separate service、control、bearer respectively Support voice、 data、video
Video Voice
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Network Architecture of NGN OSS
MRS
Service Management
Application
Radius
Policy
Network Control SoftSwitch
IPv6 Router
IPv6 Router
IPv6 Router
IPv6 Router
NGSDH
NGWDM
NGWDM
NGSDH
BroadBand IAD
SoftSwitch
AMG
PLMN
PSTN SG
Core Switch
UMG
MGW
Edge Access
NodeB
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
3
The Carrier-class IP network Evolution Tomorrow
Today
Storage
Directory
Message
Location & Presence
SDH
PDH
Cable ADSL GSM/GPRS CDMA Ethernet
Multi networks merge together IP based
Online Gaming
IP / MPLS FMC Network
ATM
Access
Data
FR IP
PSTN
Voice
Video
Wireless Voice
Message
Wireless Data
Dial-up
High Speed Internet
X.25
Core
Streaming
VoIP
Voice
Service
3G
DSL
FTTP/HFC
Wireless
RAN
Unified network, diversified services Gradually evolution
Lower TCO Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page6
Service Convergence
In order to meet customers' requirements and maintain the lead in the competitive market, operators should provide ubiquitous networks and services in an ICT society.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page7
4
IP Network Transformation ISP/ICP
MGW SGSN/GGSN/P DSN
SoftX
IP Multi-service Bearer Network
IP Internet
SG
AG/TG
IAD
STB
IPTV
Compared with traditional IP Internet, the carrier-class IP bearer network sees revolutionary changes which enable the IP network to become a manageable, maintainable, trustworthy secure network that offers the same QoS as the existing telecom network. The carrier-class IP network is able to support a new value chain system. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page8
Driving Force of IP Bearer Network Cost:Reduce cost Single Multi-service IP bearer network instead of multiple separate network(PSTN/ATM/FR/DDN) Flat IP network structure, reduce the network layer Provide same service cross different network Marketing:Improve the network competed ability Different service provided by different port in same network instead of different network, improve response speed Network components configured according requirement Providing multi-service improve the network values Services:Service binding improve the customer faithfulness
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page9
5
IP Technologies Internet
Telecom Network
WWW
Email
C4
C4
C5
PSTN/ATM/DDN
C5
Service
Connectionless Data Service Low QoS, Reliability and Security
Connection-oriented Telecom Service High QoS, Reliability and Security
Strategy
Best Effort, Compromising QoS is better than Denial of Service
Quality guaranteed by connection oriented, Denial of Service by CAC is better than Compromising QoS
Architecture
FTP
Flat Network Architecture From PE to PE, e2e MPLS TE and VPN Bad Expandability
Layered Network Architecture Local Exchange & Transit Network
Integrate telecom and Internet networks and transform them to a user-centric ALL IP network Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page10
ALL IP network In the age of ALL IP, "IP" is no longer a separate technology, but a technology system on par with TDM. Evolution to ALL IP is an end-to-end system project that involves all layers of the network including service, bearer, access, terminal and BSS/OSS
Technologies requirements QoS/Policy Carrier Ethernet IPV6 Multicast Security ……
End-to-end system IP-based IP-based IP-based IP-based
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
customer environment service network access network bearer network
Page11
6
Contents 1.
The evolution trend of IP Network
2.
The services and actuality of IP Bearer Network
3.
IP bearer network solutions
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page12
Core Technical Requirements of IP Bearer Network Network with carrier-class reliability High HA capability of the core equipment Less than 50ms link protection capability The high HA capability of the network can quickly converge and handle faults.
Strict QoS guarantee The network design complies with the traffic flow planning End-to-end QoS guarantee of services Meeting the IPTN requirements
Network security Equipment and service security Secure access of terminal subscribers
Carrier-class management
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page13
7
Core Service Requirements of IP Bearer Network
IP telecom Signaling service
Strict QoS
Broadband Signaling 3G CS SS7 NGN IPTV IP Leased Line/VPN
Without security
Strict
security Enterprise Leased Line
3G PS
Other Internet service
E-business
Internet Normal QoS
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page14
Internet Service Only Services define networks, telecom service needs telecom network, Internet service needs Internet network
Network
Service
Internet Internet Service
Telecom Telecom Service
Bad service is better than
Rejecting service is better
rejecting service
than Bad service
IP Network Best Effort Connectionless
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Telecom Network Quality guaranteed by connection oriented
Page15
8
Weakness of IP Network
-
Reliability Equipment reliability Link reliability
-
Network reliability
-
Qos End-to-End QoS CAC control
-
Problems of IP network Management
Security -
-
Attack and virus Piracy
-
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Multiple equipments Multiple networks Multiple services
Page16
The QoS requirements of 3G/NGN Definitions of quality levels of the IP bearer network
Network level
One way delay (ms)
Packet loss ratio
Jitter (ms)
Good (customized)
≤50
≤0.1%
≤10
Mean*
≤100
≤1%
≤20
Poor*
≤400
≤5%
≤60
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page17
9
The availability requirements of 3G/NGN Recovery time 2s(Connection loss threshold)
Voice session and dedicated line connection are interrupted.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page18
Reliability actuality of IP Network-Equipment Reliability Network convergence time because of equipment switchover from active to backup reaches 10 seconds or so
Routing protocol
Active engine fails, switchover to backup: ms level
Routing protocol
Active Engine
Standby Engine
FIB
Route interrupts, re-setup neighbor relationship: s level Local route calculation:100ms level
Routing protocol
Local route re-flash time: ms level Route convergence of the whole network: 1s level
Standby Engine
Active Engine FIB
BGP convergence time:10s level LDP re-setup LSP:10s level
Service convergence time: 10s level Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page19
10
Reliability actuality of IP Network-Equipment Reliability Link failure brings route flapping in the network. The convergence time is tens of seconds level. Local interface detection: 10ms level Local route calculation:100ms level Local route re-flash time: ms level Route convergence of the whole network:1s level BGP convergence time:10s level LDP re-setup LSP:10s level
Service convergence time: 10s level
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page20
The Security Requirements of 3G/NGN The security problem must be solved when the IP bearer network is planned. For operators who provide telecom network services, the provided network services must satisfy the following security requirements: Privacy: Only the receiver that the sender desires can identify the communication contents. Data completeness and consistency: The information is not modified by a third party during the transfer between the sender and the receiver. Service availability: The service availability is guaranteed by preventing different malicious attacks against the network.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page21
11
Security actuality of IP network Service security isolation Service piracy and bandwidth piracy Security problem of the NGN core equipment
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page22
Bandwidth Piracy and Service Piracy Service piracy: terminal subscribers can directly interwork without the SoftSwitch Bandwidth piracy: The negotiated bandwidth for connection establishment is 64K, but the actual bandwidth may exceed it. SoftSwitch
Metropolitan area network (MAN)
Bandwidth piracy: The bandwidth is not restricted, more bandwidths can be used.
Service piracy: NGN terminals are always connected. Communication can be carried out without any call.
IAD Internet subscribers
Internet subscribers
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
IAD Page23
12
SoftSwitch Security Problem The SoftSwitch is visible to terminals and terminals can directly access the SoftSwitch. It is necessary to solve the problem about traffic attacks on the SoftSwitch. SoftSwitch The processing capability of the SoftSwitch is limited.
Special equipment sends a large amount of signaling messages
Special equipment
NGN core network
PC Phone
IAD
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Through the equipment filtering rule, the firewall can block messages unrelated to the voice service, but cannot block those related to the voice service.
PC Phone
PC subscribers send a large amount of messages unrelated to the voice service.
Page24
IP leased line service analysis
QOS…
Key requirement
High availability…and Security
… access ability
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page25
13
IP Bearer Network Key Technologies Summary MPLS VPN:Services are isolated and will replace the traditional network. HA technologies:Include device reliability and fast failure switching technologies. Reliability is close to SDH. QoS:From early best effort model to Inter-Serv and to Diff-Serv. Meet the requirement of IPTN. Network security:Improve the security of the network. IPv6:Future IP network
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page26
Road to All IP Network Separate Architecture Build separate architecture in Core Network Realize packet transport in Bearer Network Achieve All IP network including Access Network
Packet Networking
Voice
Content & Apps
IP Platform
All IP
IP Bearer
IP
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page 27
14
Core Network All IP Evolution IMS network is the final target and the suitable evolution path depends on existing network construction & services requirement R4 architecture supports smooth evolution to IMS and also accumulates experience for IMS TDM
IP
SGSN
BSS/UTRAN
GGSN
Internet
PS
PSTN
CS
ATM/TDM GMSC
MSC
Softswitch (R4)
Traditional call to VoIP GGSN
SGSN MSC Server
BSS/UTRAN
MGW
IP
PS
PSTN
CS
GMSC Server
IP/IP over E1
GMGW
IP terminal expand rapidly
IMS
SGSN
IP
MGCF IM-MGW
BSS/UTRAN
Internet
MGW BGCF
PS
Internet
GGSN CSCF
IMS
HSS AGCF
PSTN
MGW
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page 28
Bearer Network All IP Evolution IP Bearer convergence leads the trend of multi-service integrated on one platform Bearer network IP transform extends from core layer to access layer
Voice Voice Data Application
TDM
…
MultiServices sharing one platform
IMS Core
IP/MPLS Backbone ATM/TDM Backbone
Aggregation
DataATM/TDM Metro Network Metro
TDM IP/ATM
… Access
Media Enterprise Voice ICT App App
…
Service Control
Bearer
…
TDM/ATM
…
IP Access PDSN
CDMA
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
GGSN
AC
WiFi/WiMax
GPRS/UMTS
BAS
xDSL/LAN
Page 29
15
Transporting Network All IP Evolution Future network focus on IP based transport & intelligent control plane Optical transport required to expand into access layer gradually Microwave based on IP is also the trend
WDM/OTN
WDM/SDH
GMPLS (ASON)
WDM/OTN SDH /MSTP
Metro
MSTP/NG SDH ->PTN
Aggregation
Microwave /SDH
Access
Microwave /PDH
MSTP/NG SDH ->PTN
WDM/OTN
E2E Network Operating
Cor e
Microwave based on Packet Switching Future
Present
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page 30
Radio Access Network All IP Evolution IP transformation in access network turns to speed up Access network IP alteration from interfaces to kernel Traditional
Iu/A
Gb
ATM
Iur
TDM MGW
BSC/PCU RNC
Iub/Abis
Traditional TDM BTS
ATM/TDM
BSC
ATM NodeB
RNC
SGSN
Dual Stack
Dual Stack
over IP TDM
TDM /IP over TDM
BTS MGW
BSC/PCU
RNC
IP over TDM
ATM IP
ATM/IP NodeB SGSN
IP RNC
IP
RNC
All IP
All IP IP/ IP over TDM BSC/PCU RNC
BSC
ATM/TDM
IP/ IP over TDM BTS
MGW IP
SGSN
ATM/IP NodeB
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
BSC IP IP
RNC RNC
Page 31
16
End to End All IP Solution 1
2
Service Control
Service POP
4
IP+ OTN Trend 1: Better router efficiency Trend 2: Simple transport
NE Router +OSN
Multi Service Edge Node (POP)
CS
MSCG
PS
Carrier-Class Service operating based on network planning Mobile/Fixed convergence
Packet Metro
Metro Packet Network Multi-Service platform
Metro Transport
WiMAX/DVB-H
2G/2.5G/3G/LTE 5 1
GPRS/EDGE
Access
R4/IMS IPTV ICT
ICT
BSS-OSS
3
IPTV
Packet Backbone
6
E2E Service QoS /Cooperation
Packet Backbone
R4/IMS
GPON WiMAX
HSPA/UMTS
HGW LTE
TD-SCDMA
All access technologies based on IP Ethernet/MSTP/GPON /xDSL
xDSL
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page 32
Contents 1.
The evolution trend of IP Network
2.
The services and actuality of IP Bearer Network
3.
IP Bearer network solutions
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page33
17
China Mobile: Leader in the Age of Ideal IP Bearer Network BJ1 XA1
UMG8900 NE40 SD1
SY1 SoftX3000 NE80E NJ1
SH1
BJ2
UMG8900
NE5000E WH1 XA2 GZ1 SD2
SY2
NE40
NJ2 SH2 UMG8900 WH2 NE80E
GZ2
SoftX3000 UMG8900
The NGN service network is oriented to the new telecom services such as 17951 service, SS7 monitoring, VPN private line service, and 3G services. Meanwhile, the NGN service network bears multiple mobile data services. The network covers all provinces in China. In November, 2004, the whole network borne services. In December, 2004, the fault protection was tested in the existing network. The voice was not affected at all, the measured switching time was 25ms. On February 8, 2005 (the New Year’s Eve), the peak traffic was almost three times higher than the usual traffic and the outgoing peak traffic of a TG reaches 1.6 Gbps.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Nationwide IP Bearer Network for China Netcom Northern China BJ
VIP Leased line
North-Western China
North-eastern China
XA SY
SH
CD
Eastern China
South-Western China NGN toll exchange GZ
Southern China
WH
Middle China
NGN toll exchange
This new bearer network will become a nextnext-generation multimulti-service core bearer platform which supports voice, data and video concurrently. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
18
Vodafone Multi-service Bearer Network PEa PEa
PEc PEc PEc
PEa
RR
RR RR PEc PEc PEc PEa PEa PEa
VodafoneVodafone-Connex is the nationwide IP Bearer Network and primarily used for bearing the high-value services such as VPN, 2G/3G. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Spain Jazztel NGN Multi-service Bearer Network DHCP RADIOS
SoftX3000
iManageriManager-N2000
ISPn LNS
Internet
NE80E NE80E
NE80E
NE80E
Route r Madrid
IP/MPLS CORE
NE80E
Barcelona
NE80E
OSPF AREA 0
Valencia Madrid NE5000E
Corporate
NE80E NE80E NE80E
IP/MPLS 2GE
UMG8900
PSTN
IP/MPLS/VPLS OSPF/RSTP 2GE
S8500
S8500 IPDSLAM
AMG
S8500 IPDSLAM AMG
user2@ISPn 1PVC
PPPoE/A POTS DHCP
The NE5000E/NE80E High-End routers were applied to construct the NGN core network, the network would provide NGN, Triple-Play and other new services Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
19
UAE Etisalat Multi-Service IP Bearer Network AMG
AMG
Region 2 Abu Dhabi
AMG
NE40E
M320
M320
2.5G POS 2.5G POS
10G POS AMG
Softswitch
NE40E Softswitch
Region 1 Dubai
AMG
TMG
AMG
AMG
NE40E AMG
2.5G POS Softswitch 2.5G POS
Region 3 West Coast
AMG
TMG
IP TV Head-end Head
NE40E
TMG AMG
Dual service access platforms The added NE40Es acted as PE equipment and formed multiple 2.5G POS rings, covering four regions, Dubai, Al Ain, Abu Dhabi, and West Coast in UAE. The 2.5G POS rings were used for accessing NGN, Triple-Play, IPTV, 3G, and other carrierclass services. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Summary The evolution trend of IP Network The services of IP bearer network
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page39
20
Thank you www.huawei.com
21
IP Bearer Network Planning and Design Outline www.huawei.com
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Foreword How to plan and design a network that is of good reliability, expandability, security, manageability, and maintainability? This course gives a brief look at the network planning in the aspects of topology design, address and naming planning, route selection, security, and network management.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
22
Objectives Upon completion of this course, you will be able to: Outline the basic principle of network planning Master the principle of topology design and addressing Understand how to select routing protocols for the network Outline the basic idea of developing the security strategies Know the development trends of network management system
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Contents 1. Basic Principles of Network Planning 2. Designing a Network Topology 3. Designing Models for Addressing and Naming 4. Selecting Routing Protocols 5. Developing Network Security 6. Developing Network Management System
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
23
Basic Principles of Network Planning Reliability Equipment Network topology
Expandability Equipment performance Scalability IP address and routing protocol planning
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Basic Principles of Network Planning Operability Whether the network can provide rich services Whether reliable security level can be ensured QoS of key services
Manageability Centralized management platform enabling flexible management on various equipment NMS for maintenance of topology management, configuration and backup, software upgrade, and real-time traffic and exception monitor
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
24
Flow of Network Planning Equipment selection Topology planning
Board planning Physical connection
Routing planning
IP connection IP connection
MPLS/VPN planning
QoS planning Advanced routing protocol planning
Policy routing Service isolation and assurance of key services Network security deployment
NM planning Operable, manageable and secure network
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Equipment Selection Reliability Redundancy and reliability of key modules (power and control board)
Forwarding performance Real time Traffic < Throughput / 2
Service capability NAT, VPN, and policy routing in addition to ordinary IP routing (CPU, ASIC and NP)
Port If the ports can meet the requirements
Expandability Support of possible future performance and services by adding boards or software upgrade (CPU, ASIC and NP)
Price Select devices according to the above factors instead of devices with high price.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
25
Contents 1. Basic Principles of Network Planning 2. Designing a Network Topology 3. Designing Models for Addressing and Naming 4. Selecting Routing Protocols 5. Developing Network Security 6. Developing Network Management System
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Features of Network Topology Hierarchy and modularization Network performance maximization Condensed time for deployment and fault removal Cost-effectiveness
Redundant and backup Counteraction of impact by single node failure Load sharing and better network performance Increased network complexity and cost
Security Protection of core router, edge routers, switches, and server Firewall against external attack
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
26
Network Topology Model Plane structure Model No hierarchy and modularization, easy deployment and management Suitable for small networks, and inconvenient for expansion
Plane hierarchy model Common structure for traditional large network, including core layer, convergence layer, access layer
Plane and Space Hierarchy model Hierarchy and plane, different planes for different services Clear structure, good backup capability, and high security Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Hierarchy Model MDNTM Media distribution network Quidway RM9000 Resource Manager
iTELLIN CAMSTM Service platform
The image cannot…
10G/2.5G/RPR MPLS VPN
Core layer Convergence layer
Quidway NetEngine 5000E/80E/40E Quidway NetEngine 40/20
Quidway S9300/8000/6500
Access layer
Quidway NetEngine 16E/08E/05 Quidway Eudemon 100/200/1000
Quidway MA5200 Quidway S2000
iManagerTM N2000/NMS Network management platform
Quidway S3000
Quidway AR4600/2800
Quidway WA1000
Quidway S3500 Quidway S3000
Quidway S5000 The image cannot be The display imag ed. e ca… Your
Quidway S2000
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
27
Plane and Space Hierarchy Model BJ Egress
National backbone IP network
The image cannot be d
BJ IDC
The image cannot be display ed. You
GZ Egress
The image cannot be d
BJ
GZ
SH IDC
SH The image cannot be di
The image cannot be display ed. You
The image cannot be display ed. You
GZ IDC
XA
SH Egress
SY
BJ
CD
GZ
SH
NJ The image cannot be display ed. Your co
WH
The image cannot be display ed. Your co…
The image cannot be display ed. Your co…
The image cannot be display ed. Your computer
The image cannot be display ed. Your computer
The image cannot be display ed. Your computer …
The image cannot be display ed. Your co
The image cannot be display ed. Your computer …
Provincial IP network Metropolitan IP network
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Plane and Space Hierarchy Model
Backbone network 2 (carrier-class services)
Backbone network 2 (network access and data services)
1+1>2
B: :Carrier-class service plane
MAN
A:Internet Service plane
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
28
Redundancy and Backup Principles Basic principles Backup cost ≤ loss caused by equipment failure N+1 backup, through which the network operation will not be affected in case of any fault in key equipment, links, and modules 。 Backup of topology, equipment, and protocols
Access layer backup Usually select the devices without redundancy function in key modules Usually not considering dual-host backup Only provide the dual-uplink for backup if necessary
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Redundancy and Backup Principles Convergence layer backup Usually select devices with redundancy function in key modules 。 Usually considering dual-host backup, dual-uplink backup, and ring connection among convergence layer devices
Core layer backup Usually select devices with carrier-class reliability Considering full mesh or partially mesh topology connection among core layer devices
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
29
Redundancy and Backup Principles Symmetrical backup Equal bandwidth on active and standby links; standby devices or links participating in operation
Asymmetrical backup Less or equal bandwidth on standby links; standby devices or links participating in operation only in case of active link failure
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Designing a Symmetrical Backup To national backbone network 1 10G
Regional center
1 3 2 1 1
1 10G
10G 155M 155M 155M GE
NE40E-X 1 10G NE40E-X
NE40E-X
Hohhot 5 155M
Baotou GSR12012
Erdos
NE80 3 155M
NE80
NE80 2 155M
Xi League GSR12012
5 155M
2 155M 3 155M
NE80
NE80
GSR12012 1 155M
5 155M
Wuhai GSR12012
2 155M
2 155M
Ba League GSR12012 A League Wu League Tongliao Xingan League GSR12012 GSR12012 GSR12012
Chifeng NE80 GSR12012 Hulunbeier GSR12012
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
30
Asymmetrical Backup Municipal office
R
R
Service front end processor group
DCC DCC backup link ATM front end processor
Quidway Router
Quidway Router
PSTN/ISDN
Business office
Active link
Quidway Router
Bank Backbone network
ATM
Service terminal Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Contents 1. Basic Principles of Network Planning 2. Designing a Network Topology 3. Designing Models for Addressing and Naming 4. Selecting Routing Protocols 5. Developing Network Security 6. Developing Network Management System
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
31
Designing Models for Addressing and Naming Unique The same IP address cannot be shared by two hosts in an IP network.
Continuous Continuous addresses can facilitate path coverage, reduce the size of routing tables, and improve the efficiency of routing algorithms in the hierarchical network.
Expandable Some address should be reserved during address assignment on each layer ensure the continuity of address coverage during network expansion.
Meaningful Use the meaningful name
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Designing Models for Addressing Loopback address Concept: logical interface, always UP Address planning A 32-bit mask address is required. Odd number of the last digit for routers, and even number for switches The nearer the devices is to the core, the smaller the loopback address becomes
Interconnection address Concept: address for port connection of two network devices Address planning A 30-bit mask address is required. Use smaller address for core devices Use continuous aggregatable address
Service address Concept: gateway address and address for connecting Ethernet servers and hosts Address planning Use the same last number for all gateway addresses, for example, ".254" for gateway
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
32
Designing Models for Naming Name the devices in the form of AA-B-YYYY-X to facilitate the management. AA: device level and name, usually the name of the region B: name of equipment supplier YYYY: equipment model X: identity numbered by 1, 2... if the previous three items are the same
Examples: Name of the first switch 3526E in Beihai: BH-H3-S3526E-1 Name of the router AR4640 at Chongkou: ChongKB-H3-AR4640
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Designing Models for Naming The description for each port in use should indicate and the peer connection and bandwidth. Naming format: name of peer device bandwidth
Example: description to ZD-H3-NE16E-2 8MThis indicates the standby router NE16E with 8 Mbps bandwidth at the peer end.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
33
Designing Models for Naming Naming of logical interface For MP, Ethernet sub-interface, and VLAN interface, assign meaningful numbers for their names. For MP-group A/B/C, "A" indicates the slot number; "B" indicates card number, which is fixed; "C" is set to a digit that indicates the information of the peer device, for example, an identification digit of peer loopback interface address, or OSPF area number of peer device. Strictly keep Ethernet sub-interface number consistent with the VLAN information. Make a uniform plan for the use of numbers for global VLAN interfaces, for example, 100 and 200 for the VLAN of VPN, and 1000 for NM VLAN. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Contents 1. Basic Principles of Network Planning 2. Designing a Network Topology 3. Designing Models for Addressing and Naming 4. Selecting Routing Protocols 5. Developing Network Security 6. Developing Network Management System
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
34
Comparison Among Routing Protocols Expandabili ty
Convergence time
Resource consumption
Security support and routing certificati on
Hop count
15 hops
Maybe a long time (if no load balance)
Memory: High; CPU: High; Bandwidth: Low
None
Hop count
15 hops
Maybe a long time (if no load balance)
Distance vector or link state
Interior routing/e xterior routing
Classful/ classless
Metric method
RIPv1
Distance vector
Interior
Classful
RIPv2
Distance vector
Interior
Classless
Easiness of setting, configuration, and troubleshooti ng Easy
Memory: High; CPU: High; Bandwidth:
Yes
Easy
Yes
Medium
Yes
Medium
Yes
Medium
Low
OSPF
IS-IS
BGP
Link state
Link state
Path vector
Interior
Interior
Exterior
Classless
Classless
Classless
Reference bandwidth/ physical link bandwidth
Several hundred areas, each area supporting several hundred routers
Maybe a long time (if no load balance)
Configured path, delay, cost, and error
Several hundred areas, each area supporting several hundred routers
Fast (Use of LSA)
1,000 routers
Fast (Use of update and keepalive message and route withdrawal)
Path attributes and other configurabl e parameter s
Memory: High; CPU: High; Bandwidth: Low Memory: High; CPU: High; Bandwidth: Low Memory: High; CPU: High; Bandwidth: Low
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Selection of Distance Vector Protocol and Link State Protocol Distance vector protocol Simple, flat network topology, no need of hierarchy design Simple hub-and-spoke topology Network manager is unfamiliar with link state protocols and unable to shoot troubles in link state database No need to consider convergence time in the worst case
Link state protocol Hierarchical large network Network administrator has rich knowledge about link state protocol Fast convergence is of much importance
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
35
Metric Method Metric result affects scalability Traditional distance vector protocol uses only hop counts Routing protocol of new generation considers delay, bandwidth, and reliability
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Hierarchical and Non-hierarchical Routing Protocols With non-hierarchical routing protocol, all routers must perform the same tasks With hierarchical routing protocol, routers of different roles perform different tasks
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
36
Interior and Exterior Routing Protocols
Interior routing protocol runs within an enterprise network or autonomous system Exterior routing protocol runs between autonomous systems
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Classful and Classless Routing Protocols Classful protocol Discontinuous subnets invisible to each other Not support variable length subnet mask (VLSM)
Classless protocol Support discontinuous subnet and VLSM Support reasonable subnet arrangement for aggregation
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
37
Dynamic, Static, and Default Routing Protocols Static routing protocol Manual configuration, suitable for stub network No protocol messages occupy bandwidth Easy fault removal User has higher control over path selection Difficult to manage in large networks Routing details are not known
Default route Simple; suitable for the network with only one ingress and egress link Routing details are not known
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Routing Protocol Expandability Whether there is any limit on metric Convergence speed upon network changes Frequency and triggering method of route update and Link State Advertisement Information transmission upon route update Bandwidth occupation by route update Advertisement range of route update CPU occupation by routing protocols Whether it supports default and static routes Whether it supports route aggregation
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
38
Selection of Routing Protocol in Hierarchical Network Selection of routing protocol for core layer Support of redundancy links and load sharing Recommended: OSPF, IS-IS Not recommended: RIP
Selection of routing protocol for convergence layer Recommended: OSPF, IS-IS, RIPv2
Selection of routing protocol for access layer Recommended: OSPF, RIPv2, static routing protocol IS-IS is not suitable for access layer
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Redistribution Among Routing Protocols A router runs more than one routing protocol Routing protocols need share routing information Determine boundary of routing areas One-way distribution and two-way distribution One-way distribution refers to distribution of routing information from one protocol to another protocol, and use of static or default route in the reverse direction. Two-way distribution refers to distribution of routing information from one protocol to another protocol or vice versa. Use route filter
Avoid re-advertisement of routes learnt from a protocol back to it Measures of different protocols are different. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
39
Contents 1. Basic Principles of Network Planning 2. Designing a Network Topology 3. Designing Models for Addressing and Naming 4. Selecting Routing Protocols 5. Developing Network Security 6. Developing Network Management System
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Security Policy Access policy Access rights hierarchy
Responsibility policy Responsibility of users, operators, and administrators
Authentication policy Password mechanism
Privacy policy Reasonable privacy monitor, email monitor, and keystroke records
Purchase of computer technologies Computer network configuration, audit, and security policies
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
40
Security Policy Physical security Physical isolation of key network resources Certification and authorization Certificate and authenticate the validity of user identity Limit the range of network resources available for certified users by right control
Data encryption Encrypt original data to prevent data from being read by third-parties Choose a balanced solution between security and performance
No encryption for internal networks Encrypt VPN users and private networks connecting with Internet
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Security Policy Data packet filter Protect network resources from unauthorized use, theft, damage, and attack
Firewall Physical equipment Deploy devices to perform security policies at the border of two or more networks Configure ACL router, dedicated hardware, and software on PC and Unix systems
Firewall types Static packet filter – Check packets one by one; fast forwarding; simple configuration
Dynamic firewall – Trace sessions and make intelligent admission and discard decisions
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
41
Security Policy Intrusion Detecting system (IDS) Usage Detect malicious attacks Take performance statistics and analyze exceptional cases
Type Host IDS: running on a single host and detecting only this host Network IDS: detecting the stream of the whole network
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Contents 1. Basic Principles of Network Planning 2. Designing a Network Topology 3. Designing Models for Addressing and Naming 4. Selecting Routing Protocols 5. Developing Network Security 6. Developing Network Management System
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
42
Traditional Network Management Model FCAPS in TMN model
Configuration management
Fault management
Security management
accounting management
Performance management
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
NM Development Trend More powerful and flexible NM functions Distributed deployment and processing Intellectualized and automated gateway Integrated and customized management of large networks More applications of Web-based NM technologies In-depth analysis of network data Platform and modularization of NMS NMS redundant backup Evolution from IPv4 to IPv6
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
43
IPv4-IPv6 Dual Stack NM IPV6 IPv4-IPv4 route
IPV4 IPV6
IPV6 IPV4
IPV4 Dual stack host
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
NMS Model Integrated NM
Data management
Northbound interface External system
Data operation
Terminal interface
NMS Southbound interface Inband or outband NM
Data collection, alarm, and control NE Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
44
Inband Management
Other NMS
Backup
IP/ATM Core N2000 NMS Firewall Aggregation Layer Aggregation Layer
N2000 Local Terminal
Technology Support (Local Console Configuration) Access Devices
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Outband Management Other NMS
DCN
Backup N2000 NMS Firewall
IP/ATM Core
Aggregation Layer Aggregation Layer
Access Devices
N2000 Local Terminal
Technology Support (Local Console Configuration)
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
45
Two-level NM Provincial terminal
Municipal terminal
Provincial OSS NMS
Municipal OSS NMS
Municipal NE
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Centralized NM Provincial terminal
Intelligent NMS
Municipal terminal
Regional IN NE
SCP/SMP
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
46
Integrated NM Municipa l terminal
Provincial NMS A
Municipa l terminal
Provincial NMS B
Provincial traffic NMS
Municipal OSS
Municipal OMC
Municipa l NE
IN NMS
Municip al NE
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
External Interface
Provincial NM terminal
OSS
DCN/Group/Internet
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
47
Independent NM
Provincial terminal
Municipal terminal
Provincial NMS
Provinci al NE
Municipal NMS
Municipa l NE
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Service Model of NM Network Network infrastructure
NMS
User
User domain
Network domain
• PSTN terminal • Mobile terminal • Third party access
• Internal systems • External interfaces • DMZ
NM network service domain
• Public security service
Service NE
NM domain • • • • •
Provincial NMS sub-domain Simens NMS sub-domain Ericsson NMS sub-domain Municipal NMS sub-domain ……
Cross-subdomain NM network data arrangement
• Public service for external system connection
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
48
Architecture of NM Network Service module 7 Service module 8
Service module 6
Service module 5
Service module 1
Service module 2
Service module 4 Service module 3
Barring backdoor connection Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Implementation of NM Network Provincial NM sub-domain by Huawei Municipal NM sub-domain by Huawei
Provincial NM sub-domain by Ericsson
Municipal NM sub-domain by Ericsson
Provincial traffic NM sub-domain
Municipal traffic NM sub-domain Trusted channel
Public external interface area
MPLS/IP
Public security service domain
Security domain
Security area Risk area Internet
Cross-sub-domain data exchange area
Server Network access authentication Terminal gateway
DMZ区 External risk
Dedicated terminal
PUPV/IP base PUPV/IP base risk area
Internal risk
Dedicated terminal
DCN Third party access area
Dedicated terminal
Third party access area Third party access area
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
49
Developing Management Network System Active authentication Service system 1 Service system 2 Service system 3 Service system 4 gateway
Standby authentication gateway
MA5200F
MA5200F
Standby WPN data exchange area Active WPN data exchange area IDS
Internet Public external
interface area
Network domain
Municipal node 1
DCN
Provincial branch Municipal branch
Municipal node N
MA5200F
MA5200F
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Summary 1. Basic Principles of Network Planning 2. Designing a Network Topology 3. Designing Models for Addressing and Naming 4. Selecting Routing Protocols 5. Developing Network Security 6. Developing Network Management System
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
50
Thank you www.huawei.com
51
IP Backhaul Network Planning and Designing Overview www.huawei.com
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Foreword Nowadays, mobile broadband provides various application, and are moving towards fixed mobile convergence (FMC). Operators urgently need a network which is able to bear for multiservice, includes high-valued service. How to deploy a network which with low cost, high efficiency, easy to expand and O&M is the main concern. Hence, this course will discuss about the objective of implementing the IP Backhaul network and how to design and plan for the network.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page1
52
Objectives Upon completion of this course, you should be able to: Describe the procedure for planning a IP backhaul network. Describe the procedure for designing a IP backhaul network.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page2
Contents 1. IP Backhaul Network Planning and Design 1.1 IP Backhaul Network Planning 1.2 IP Backhaul Network Design
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page3
53
Contents 1. IP Backhaul Network Planning and Design 1.1 IP Backhaul Network Planning 1.2 IP Backhaul Network Design
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page4
IP Backhaul Network Planning and Design Procedure Network design and planning have different stage, High level design (HLD): The HLD focuses on determining an appropriate solution based on analysis of the existing networks and services. This phase is the network planning phase that comes out with the topology, services, protection, and QoS. Low level design (LLD): Based on the outputs of the HLD, a detailed network design is completed in the LLD phase, the network design phase. The outputs of this phase can instruct network construction and service provisioning.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page5
54
Contents 1. IP Backhaul Network Planning and Design 1.1 IP Backhaul Network Planning 1.2 IP Backhaul Network Design
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page6
Huawei IPRAN Single Backhaul Network Solution Huawei’s SingleBackhaul solution provides open service interfaces to overcome the challenges faced by multiservice bearer network. IMS Core HLR/HSS PCRF Backbone layer IP Backhaul +OTN PS domain
Huawei’s Single Backhaul Network
SGSN/ MME
RRU IP Backhaul
RRU
LTE Pico+WiFi iMicro+WiFi
Aggregation layer IP Backhaul+ OTN BSC/RNC Pool
3G
iMicro+WiFi
GSM
Pico+WiFi iMicro+WiFi
iMicro+WiFi
Firewall
Splitter MDU(POE)
GGSN/SG W
GSM/3G/LTE Core Network
AC/BRAS
PS service/ Internet
OLT
Pico+WiFi FTTTX
Multi service access
Single Backhaul bearer network
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Core network
Page7
55
IP Backhaul Network Planning Process (1/2) Step 1
Task
Input
Output
Requirement
Customers network
Service implementation, site
Collection
requirement
location, traffic capacity, QoS,
Topology
Service point location, base station distribution (BTS, NodeB, and eNodeB), transmission resources, optical fiber routes, and site location
IP backhaul network layers Equipment types at each IP backhaul network layer
Interconnection interfaces NE protection requirements
Port plan Board plan NE reliability plan
NM&DCN features NE security requirements
NMS server plan DCN plan NE security strategy
Network management requirements Service features
NE name, management IP address, LSR ID, interface IP address
reliability, clock, security 2
Planning
3
Hardware Planning
4
NM& DCN Planning
5
Parameters Planning
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page8
IP Backhaul Network Planning Process (2/2) Step
Task
Input
Output
6
Network connectivity planning
Network interconnection requirements Routing protocol features
Routing protocol type, protocol deployment mode
7
Tunnel planning
Service isolation Bandwidth for each service Traffic direction
Tunnel protocol Deployment mode Traffic model
8
Service planning
Services to be deployed Service scales
Service bearer technology Service bearer solution
9
QoS planning
Priority mapping of services Service quality requirements, such as bandwidth, delay, jitter, and packet loss
9
High Availability planning
Quick check Availability indicator Delay of protection switching
Service quick check mechanism Service protection switching mechanism
11
Clock planning
Network clock synchronization requirements
Physical-layer clock plan Time synchronization plan
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page9
56
Mapping Relationship between Requirements and Plans Requirement Collection (1)
Service
Interconnected Equipment
Topology Planning (2) Topology
Hardware Planning
NM & DCN Planning
(3)
(4)
Ports & Boards
NM Capacity & DCN
Parameter Planning
Service Planning
(5)
(8) (6)
NE ID/NEIP Node ID/ IP
IGP routes
Topology Bandwidth
(7)
PW& Tunnel Bandwidth
QoS Requirement
(9)
Service QoS
(10)
Service OAM Planning
(11)
Clock Planning
Reliability Requirement
Equipment Protection
Clock Requirement Security Requirement
NE Security
Maintainability Requirement
Maintainability Administration Mode
Construction Cost
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page10
Contents 1. IP Backhaul Network Planning and Design 1.1 IP Backhaul Network Plan 1.2 IP Backhaul Network Design
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page11
57
IP Backhaul Network Design Process (1/2) Step
Owner
Task
Input
1
Plan the topology and hardware
NE introduction Network topology Hierarchical NE type selection Bandwidth and capacity
Installation engineers
2
Design the NM&DCN
NMS server plan DCN plan
Commissioning engineers NM center engineers
3
Design NE parameters and IP addresses
NE name, management IP address, LSR ID, interface IP address
Commissioning engineers NM center engineers
4
Design routes
OSPF (router ID/area) IS-IS (NET/layer/area)
NM center engineers
5
Design tunnels
Source, sink, trail, label
NM center engineers
Page12
IP Backhaul Network Design Process (2/2) Step
Task
Owner
Input
6
Design services
2G TDM PWE3 plan 3G ATM PWE3 plan Ethernet service plan
NM center engineers
7
Design high availability
Service protection switching mechanism
NM center engineers
8
Design QoS
QoS mapping rules on the network side QoS parameters of different services
NM center engineers
9
Design clock synchronization
Clock synchronization plan
NM center engineers
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page13
58
Review(1/2) IP backhaul network planning and designing 10 steps are as follows : Step 1: Collect requirements of network, analyze network service models, and clarify service requirements. Step 2: Consider service implementation and expectation, plan the topology and traffic capacity and select appropriate devices based on available physical resources and investments cost. Step 3: Plan NE parameters and IP addresses to enable the interconnection, communication, and management of NEs. Step 4: Plan the NMS and DCN channels for latter service provisioning. A powerful NMS can help to improve the efficiency of service provisioning and fault detection. Step 5: Focus on logical service functions implementation. Choose a suitable routing protocols and plan nicely for NE interconnection and communication.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page14
Review(2/2) (Cont) IP backhaul network planning and designing 10 steps are as follows : Step 6: Based on the network traffic model and service implementation mode, plan tunnels if the VPN technology is in used to bear services. Step 7: Select appropriate service bearer technologies to complete service planning and produce a good traffic flow model. Step 8: High availability to ensure services reliably and efficiently. Step 9: Plan and design QoS for different services to meet requirements of high-value services. Step 10: Plan and design network-wide clock synchronization to archive service clock requirements.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page15
59
Summary IP Backhaul Network Planning and Design 1.1 IP Backhaul Network Planning 1.2 IP Backhaul Network Design
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page16
Thank you www.huawei.com
60
QoS Technologies for IP Bearer Network
www.huawei.com
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Foreword IP bearer network bears multiple services such as voice, signaling, IPTV and Internet, it encapsulates these services in IP packet. In fact, the importance of these services is different. They should be forwarded differentially to ensure the quality of key service. QoS technologies are used to provide differentia service.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page1
61
Objectives Upon completion of this course, you will be able to: Know the QoS requirement of IP bearer network Master the principle of QoS Know the QoS configuration process on VRP platform
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page2
Contents 1. QoS Basis Review 2. QoS Requirement of IP Bearer Network 3. QoS Realization Principle 4. QoS Configuration Process
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page3
62
Contents 1. QoS Basis Review 2. QoS Requirement of IP Bearer Network 3. QoS Realization Principle 4. QoS Configuration Process
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page4
Basic Concept of QoS Qos (Quality of Service) means expected service quality of subscriber service in case of packet loss, delay, jitter and bandwidth while network communication. Quality of Service (QoS) is used to measure the performance of service providers in meeting client’s requirements. Instead of giving accurate marks, QoS evaluation stresses on analyzing the service performance, which helps to guide service improvement. IP QoS target: Prevent and manage IP network congestion. Reduce the rate of IP message lose. Control IP network traffic. Provide private bandwidth for specific subscribers or service. Support real-time service over IP network. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page5
63
Loss of Packet
? Internet
This
Is John Smith Speaking ……
One party said, …… This Is
…… Smith Speaking
The opposite party heard…… Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page6
Delay Internet
First bit transmitted
Last bit received
A Processing delay
A Network transit delay
Processing delay
time
End-to-end delay
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page7
64
Jitter Internet
3
2
1
3 D3
Sender
2
1
D2
receiver
D1
D3=D2=D1 Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page8
Bandwidth Limit
10M
IP
I want 2M
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page9
65
Three Models of IP QoS Best-Effort model: Best-Effort model do not ensure the quality of service IntServ model: The service sends a signaling to NM to request special QoS. The NM reserves the resource according to the traffic parameter to satisfy the request. DiffServ model: In case of network congestion, control the traffic and forward differently according to the different service level stipulated to solve the congestion.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page10
Best-Effort Model Best-Effort is a single service model Using Best-Effort model can transfer any number of packets at any time without getting previous approval There is no guarantee with respect to time delay and reliability It is implemented by first in and first out (FIFO) queue technology
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page11
66
IntServ Model Provide controllable end-to-end service. Network units support QoS control mechanism. The application applies to NM for specific QoS service. Signaling protocol deploys in network according to QoS request. RSVP is the most frequently used.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page12
Contents 1. QoS Basis Review 2. QoS Requirement of IP Bearer Network 3. QoS Realization Principle 4. QoS Configuration Process
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page13
67
QoS Requirement
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page14
QoS Requirements of Voice Traffic Level
Mean opinion score (MOS)
Customer satisfaction
Good
4.0 4.0--5.0
Good, clear, little delay, smooth communication.
Fair
3.5 3.5--4.0
Fair, clear, a little delay, communication obstructed, noise
Medium
3.0 3.0--3.5
Medium, not too clear, a certain delay, communicable.
Poor
1.5 1.5--3.0
Poor, not too clear, a big delay, communication repeated.
Bad
0-1.5
Bad, not clear, a big delay, communication obstructed.
QoS Requirements of Voice Traffic End-to-end bandwidth guarantee Delay of the bearer network ≤ 50ms, and ≤ 100ms at least Jitter of the bearer network ≤ 10ms, and ≤ 20ms at least Packet loss ratio ≤ 1% Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page15
68
QoS Requirements of Signaling Traffic Packet loss ratio of the IP bearer network < 0.1% Transfer delay < 100ms Jitter < 10ms Independent physical or logical network, and able to prevent different illegal attacks A light network bearer is recommended
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page16
Comprehensive Requirements for QoS Definitions of quality levels of the IP bearer network
Network level
One way delay (ms)
Packet loss ratio
Jitter (ms)
Good (customized)
≤50
≤0.1%
≤10
Mean*
≤100
≤1%
≤20
Poor*
≤400
≤5%
≤60
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page17
69
Contents 1. QoS Basis Review 2. QoS Requirement of IP Bearer Network 3. QoS Realization Principle 4. QoS Configuration Process
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page18
Contents 3. QoS Realization Principle 3.1 QoS Models 3.2 Technologies of Diff-Serv Model 3.3 MPLS QoS
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page19
70
Integrated Service
Path Message: Setup Path to Reserve Bandwidth
Resv Message: Reserve Bandwidth
Int-Serv Domain
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page20
Differentiated Service
Customer Equipment
Diff-Serv Domain PHB PHB
Classify services and Regulate traffic over network borders.
Customer Equipment
PHB PHB
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
DS domain service provides strategic PHB decision.
Page21
71
Contents 3. QoS Realization Principle 3.1 QoS Models 3.2 Technologies of Diff-Serv Model 3.3 MPLS QoS
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page22
QoS Technologies in Diff-Serv Traffic Classification and Marking Traffic Policing Traffic Shaping Congestion Management Congestion Avoidance
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page23
72
Classification and Marking ACL , IP priority
Basis of QoS execution service Based on the ACL and IP priority According to the classification result, pass the message to other modules for processing or marking (toning) before classification by the core network. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Traffic Policing
Page24
Flow classification
Token bucket
drop
CAR is the abbreviation for Committed Access Rate Token barrel algorithm Control the traffic Shaping—Enable packet delay output of traffic flow is in accordance with regulation on service model Dropping—discard packets according to specific rule Marking—Set message DS domain or IP priority Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page25
73
QoS Deploy Suggestion Class
DSCP
A
40
B
MPLS
802.1P
PHB
Service
5
5
EF
Voice
24
3
3
AF3
Group Service
C
16
2
2
AF2
Signaling
D
8
1
1
AF1
Reserved
E
0
0
0
BE
NMS
EXP
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page26
Result of Traffic Policing bps
Rate Limit
Without Traffic Policing
Time
bps
Rate Limit
With Traffic Policing
Time
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page27
74
Traffic Shaping Token
128Kbps
Queue
bucket
Flow classification
256Kbps
128Kbps
FR
GTS (Generic Traffic Shaping) is to solve Interface rates on both sides of the link are not matching GTS limits traffic of messages and buffer the messages which exceeds the traffic limit stipulated Traffic shaping may increase the delay.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page28
Result of Traffic Shaping bps
Rate Limit
Without Traffic Shaping
Time
bps
Rate Limit
With Traffic Shaping
Time
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page29
75
Physical Interface Line Rate Flow classification
256Kbps
QoS queue
128Kbps Bucket
LR limits the total rate for sending packets (including the emergency packet) on a physical interface. LR also utilizes the token bucket to perform the traffic control LR using the QoS queue for congestion management Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page30
Congestion Management Flow classification
Output queue In case of network congestion, ensure messages of different priority levels gain different QoS, such as time delay and bandwidth Put messages into different queues according to their priority levels, and give different dispatch priorities, probabilities or bandwidths to different queues FIFO( First In First Out ) PQ( Priority Queue ) CQ( Custom Queue ) WFQ( Weighted Fair Queuing ) Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page31
76
FIFO Forwarding packet
FIFO (First In First Out) is simple First-In First-Out (FIFO) queuing--concepts of no communication priority and classification FIFO is the default queuing By default, packets in the queue are sent according to the FIFO policy Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page32
PQ Flow classification
High Medium Normal Low
drop
PQ (Priority Queuing) guarantees that the data packet with higher priority can be sent in time PQ is divided into 4 queue:High,Medium, Normal,Low High priority queues will be first dispatched. PQ is designed for mission-critical applications Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page33
77
Flow classification
CQ
…
Queue 0 Queue 1 Queue 2
…
drop
Queue 16
CQ (Custom queuing), that the user can configure the proportion of the bandwidth for the different queue CQ is divided into 17queues: Queue 0 is the system queue; queue 1 to queue 16 is the user queue. Each queue satisfies bandwidth the user configured on statistic Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Flow classification
WFQ
Page34
…
Queue 1 Queue 1 Queue 2
…
drop
Queue N
N=16,32…2048,4096 WFQ (Weighted fair queuing), assures justice to services with identical priority. Maximum number of queues can be configured (16-4096) Use HASH algorithm to dispatches the data flow into different queues The weight is based on the priority Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page35
78
Congestion Avoidance Bandwidth utilization
time
The traditional drop policy utilizes the Tail-Drop method The tail-drop may cause the TCP Global Synchronization
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Flow classification
WRED
Page36
…
Queue 1 Queue 1 Queue 2
…
min-threshold
Max-threshold
drop
Queue N
N=16,32…2048,4096
WRED (Weighted Random Early Detection) WRED avoids the TCP global synchronization through the random drop packets Compare with the queue length to perform the drop Based on the different priority to define the min-threshold and max-threshold The same priority but different queue , the queue longer the packet drop more
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page37
79
Contents 3. QoS Realization Principle 3.1 QoS Models 3.2 Technologies of Diff-Serv Model 3.3 MPLS QoS
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page38
MPLS Diff-Serv In MPLS DiffServ field, set MPLS Exp bit at the edge of the network Do not modify IP DSCP priority, so the final user can hold dependent QoS policy in their network Traffic classification, marking and coloring in the edge, according to source address, destination address, port number, protocol type and COS .
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page39
80
QoS Mapping Between IP Network and MPLS Network Service Type
DSCP Domain
EXP Domain
Reserved
111000(CS7)
7
Reserved
110000(CS6)
6
Service Type 1( real-time
101110(EF)
5
Service Type 2 (fulfil SLS)
011010(AF31)
4
Service Type 2(non-fulfil SLS)
011100(AF32)
3
service)
011110(AF33) Service Type 3(fulfil SLS)
001010(AF11)
2
Service Type 3(non-fulfil SLS)
001100(AF12)
1
001110(AF13) Service Type 4(best-effort)
0(default)
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
0
Page40
MPLS DiffServ Tunnel Type MPLS DiffServ supporting tunnel type: Uniform Model Short-Pipe Model Pipe Model
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page41
81
Uniform Mode In Uniform mode, regard as a whole DiffServ domain, no matter IP network or MPLS network.
When remove the label, the upper EXP value will copy into nether label EXP value will copy into IP DSCP field at second last hop
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page42
Short-Pipe Model The short-pipe model can keep the user’s QoS strategy relatively independent from the service provider’s QoS strategy.
We can find that in POP, EXP=0 is not copied to the DSCP domain of IP. Hence in the short-pipe model, the user and the service provider can use different QoS strategies.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page43
82
Pipe Model The pipe model is similar as the short-pipe model. However, in the pipe model, PHB executed on mpls2ip link is operated according to the removed EXP instead of the DSCP value.
we can find that in POP, EXP=0 is not copied to the IP DSCP domain. But the PHB operation executed in the outgoing link is made according to EXP=0 instead of IP DSCP=40. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page44
LSP Classification MPLS supporting DiffServ model, provide two LSP type: E-LSP(EXP-Inferred-PSC LSPs) L-LSP(Label-Only-Inferred-PSC LSPs)
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page45
83
E-LSP and L-LSP
Ingress LSR
Egress LSR
L-LSP Solution
Ingress LSR
Egress LSR
E-LSP Solution
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page46
Selection of E-LSP and L-LSP Consideration based on link layer: On PPP and LAN, select E-LSP, LLSP or both. On the ATM network, only L-LSP can be used as the EXP domain is not visible Consideration based on traffic: If only E-LSP is used, up to 8 PHBs can be supported; to support more than 8 PHBs, L-LSP or E-LSP mixed with L-LSP should be used Consideration based on network loads: E-LSP is adopted to save the amount of LSP, label resources and signaling loads. L-LSP might relatively waste more resources In general, if the network provides up to 4 types of services, E-LSP can meet the needs. L-LSP is adopted only when there is ATM router, many service types, or QoS network with discarding priority requirements.
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page47
84
QoS Scheduling and Mapping for Upstream and Downstream Traffic in the VPLS Scenario
Copyright © 2008 Huawei Technologies Co., Ltd. All rights reserved.
Page 48
Contents 1. QoS Basis Review 2. QoS Requirement of IP Bearer Network 3. QoS Realization Principle 4. QoS Configuration Process
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page49
85
Network Topology NE80E-1
NE40E-1 G1
UMG8900
NE80E-2
NE40E-2 G0
SHLR
G1
G0
SoftX3000 SG7000 MRS
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page50
QoS Configuration on NE40E Define ACL acl number 3000 // Signaling rule 5 permit source 10.0.109.0 0.0.0.127 acl number 3001 // Voice rule 5 permit source 10.0.38.0 0.0.0.255
Configure Traffic Classification traffic classifier 3000 operator or if-match acl 3000 traffic classifier 3001 operator or if-match acl 3001 traffic classifier 3002 operator or if-match acl 3002
acl number 3002 // Management rule 5 permit source 10.0.37.0 0.0.0.255
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page51
86
QoS Configuration on NE40E Configure Traffic Behavior traffic behavior 3000 remark dscp af21 traffic behavior 3001
Configure Traffic Policy traffic policy Voice classifier 3001 behavior 3001 traffic policy management
remark dscp cs6
classifier 3000 behavior 3000
traffic behavior 3002
classifier 3002 behavior 3002
remark dscp ef
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page52
Interface Configuration on NE40E Apply traffic policy on interface G0 [interface-gigabit0] traffic-policy management inbound
Apply traffic policy on interface G1 [interface-gigabit1] traffic-policy voice inbound
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page53
87
QoS Configuration on NE80E Configure the bandwidth of queues on the related interface queue ef bandwidth pct 60 queue af bandwidth pct 20 queue be bandwidth pct 20
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page54
Summary What are the advantages of Diff-Serv model ? Please list the queue technologies of congestion management. What is the configuration step of CBQ ?
Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.
Page55
88
Thank you www.huawei.com
89
90
91
92
93
94
4 core sites: Islamabad, Karachi, Faisalabad, Lahore. 8 aggregation sites: Islamabad, Karachi, Faisalabad, Lahore, Gujranwala, Hyderabad, Peshawar, Multan.
95
96
This MPLS network was constructed using the above list of equipment.
97
The implementation includes: 4 core sites: Islamabad, Karachi, Faisalabad, Lahore. 8 aggregation sites: Islamabad, Karachi, Faisalabad, Lahore, Gujranwala, Hyderabad, Peshawar, Multan. These 4 Core sites will have the NE40E-X8 installed and connected in full mesh to form the backbone. The IP/MPLS network in core 4 sites is divided into two planes: Plane A and Plane B. Every Plane uses full mesh topology; between different Planes only connect the same site devices. So, this network topology has better redundancy and less links.
98
The IP MPLS core network is designed for multi-services carrier network. This network will carry the following services: Voice traffic (Between different MGW); Signaling traffic (Between MSC Server, HLR, STP[IP]); GPRS traffic (Between GPRS Edge Router); IT Traffic ( LAN/WAN, Billing, Customer Care Center, IP Telephone ); NMS Traffic; LIG, etc.
99
MSC (signaling , LIG, mediation OAM ), MGW (voice, signaling), HLR( signaling ,CRM) . All services will be connected to NE40E-X3 using VPN.
100
The O&M traffic of (STP/MSC Server/MGW) will aggregate on the 2xS9303 switches (CE) with redundancy, then connect to the PE routers; The Billing traffic will aggregate on the 2xS9303 switches as well; While for the signaling of (STP/MSC Server/MGW) and Media of MGW, they will directly connect to the NE40E-X3 routers;
101
In vendor Z site, Huawei will only provide the NE40E-X3 routers, which will provide 48 FE/GE electrical and 48GE optical ports.
102
STP: Signaling Transfer Point Huawei Product SG7000
103
IP NMS server distribution: One server in ISB, three clients for KHI, LHR,FSD . Clients communicate with server using the VPN. Routers in core network should be managed via traffic in-band. The management traffic will use the same links as data traffic. In-band management for NMS should be enabled on all the routers in Core Network. Bandwidth should be allocated to in-band management on all links. Adopt the IP forwarding to carry NMS of IP/MPLS core.
104
105
106
Principle:The equipment name needs to represent the physical location and the role in the network. Physical location means the geographical name of different cities in Pakistan where equipment is placed. Network role means network type and function provided. There are NE40E-X8, NE40E-X3, and NE08E which are used as P, PE and RR separately in MPLS network. Method to differentiate several devices having the same function/role in same location. Proposed Equipment Naming Scheme: - -- refers to city abbreviations refers to responsibility of device, like:P、PE、CE、FW, can combine, like: PRR refers to the network equipment refers to site that is A or B. The A represents the old site, the B represents the new one. refers to sequence number . For example, the first NE40E-X8 router of Islamabad site , it is working as a P router, also RR in this MPLS network is named as the following according the above rule: ISB-PRR-NE40E-X8-A1
107
108
Interface Naming Scheme: : refers to Port type abbreviations; refers to the sequence number of this interface in device. Port type abbreviations are shown in the above table. For example, in ISB-PE-NE40E-X3-A1 router, LPU 8 first port, is named the following according the above rule: ISB-PE-NE40E-X3-A1:GE8/0/0 Interface Description Scheme: Interface description used to note another side equipment and port of link, so we can simple use the mode: To For example, in ISB-PE-NE40E-X3-A1 router, the GE8/0/0 port connect to ISB-PENE40E-X3-A2 GE8/0/0,so can configure as following: Interface GigabitEthernet8/0/0 Description to ISB-PE-NE40E-X3-A2:GE8/0/0 If the other side is not datacom equipment, can use device name. For instance: UMG.
109
Principle: Distribute continued IP address for every POP. It has the benefit of route aggregation and safety control. Adopt VLSM (Variable Length Subnet masks) technology for IP address distribution to improve efficiency of IP address usage. Adopt CIDR in order to reduce the size of routing table, improve convergence speed and reduce routing information broadcast. Use the IP address space adequately and improve IP address efficiency distribution. The IP address pool 10.64.0.0/16-10.87.0.0/16 has been assigned to the MPLS network by network planning department. The interconnect addresses between elements in the MPLS network will have be in the address space of /30 subnets; VRRP link use /29 subnets. The Loopback addresses for router, firewall, and switch will use the IP address range in 10.31.x.x/16. 10.A.B.0 subnets:A refers to different service. B refers to different city.
110
“A” table: Specially, according to manage the mainly services, we also decide to use separate ip address scope for signal, media and oam (including billing, lig, nms etc.) Signaling: 10.64.0.0-10.71.255.255 Media: 10.72.0.0-10.79.255.255 OAM, Billing and LIG: 10.80.0.0-10.87.255.255 Core IP management:10.31.0.0/16
111
112
The equipment of core network connects to IP network, different VLAN ID will adopt various services. The same VLAN ID can be used at different site. Interlink VLAN: 10-19 Media VLAN: 20-29 Signal VLAN: 30-39 NMS VLAN: 40-49 IT VLAN: 50-59 Billing VLAN: 60-69 LIG VLAN: 70-79 Other : 80-4095
113
114
IS-IS is used as IGP routing protocol in this network. The following arguments explain why IS-IS may be a somewhat better protocol for this network. Based on experiences in the industry, IS-IS generally supports a larger a number of nodes (up to 1024) in the same area. OSPF is generally deployed with a much smaller number of nodes (less than 200). Many of the carrier class large scale IP networks use IS-IS. Much of the vendor experience with large scale network is with IS-IS, thus making it easier for the vendor to support. All routers will be ISIS L2-only routers in core network. All routers are put in one area. The NSAP addressing will have the following scheme: Area ID uses 49.0000 System ID is transformed from loopback IP address For example, a router that has the loopback address 10.31.16.1 will have a CLNS address 49.0000.0100.3101.6001.00. Authentication MD5 Authentication can be defined between all ISIS neighbours. Redistribution No re-distribution of routes is recommended either from the IGP to BGP or from BGP into IGP. IS-IS Fast Convergence Partial route calculation and incremental SPF should be deployed to help L3 convergence time. (In Huawei NE40E-X3/NE40E-X8 implementation, I-SPF and PRC is the only algorithm for route calculation)
115
IS-IS TE In core layer network all core routers will be use MPLS TE technology to improve network reliability, so ISIS TE must be used in this area to distribute TE attributions. By default, IS-IS TE is disabled. The IS-IS TE extension uses the sub TLV of IS-reachable TLV (22) to carry the TE properties. Therefore, the Wide Metric feature of IS-IS must be enabled. The mode for the feature is one of wide, compatible or widecompatible. By default, IS-IS only transmits or receives packets that express route metrics in Narrow mode. If the level is not specified when the IS-IS TE is enabled, then IS-IS TE is valid both for Level-1 and Level-2. By default, the sub TLV of BW-constraint is 252; the sub TLV of Local Overbooking Multipliers (LOM) is 253; the sub TLV of unreserved-BW-subpool is 251. All routers will be ISIS L2-only routers in core network. All routers are put in one area. Because IS-IS support up to 1000 routers in one area without affecting the convergence speed. Moreover, to put all routers in L2 is easy for future network expansion. If the network is to be expanded and more routers are added, these added routers will be put into L1 and connected to L2 by L12 router. This expansion has no impact on the old network topology, so it is recommended to put all routers in L2 and one area when the network is newly built.
116
The interfaces that should enable ISIS protocols are: All interfaces in all NE40E-X8, core routers including the loopback interface; All interfaces in NE40E-X3 connected to core routers, interfaces between NE40E-X3 routers and loopback interfaces; All interfaces in NE08E/NE05 connected to NE40E-X3,and interfaces between NE04E/NE05 routers and loopback interfaces.
117
According to the content of “Connectivity Planning and Design of IP Bearer Network” IS-IS cost design. The IS-IS cost should meet the following conditions: C
View more...
Comments