IP Bearer Training Book

June 11, 2016 | Author: Elonai Agbevenu | Category: Types
Share Embed Donate


Short Description

IP Bearer Training Manual...

Description

HUAWEI

IP BEARER NETWORK PLANNING AND DESIGN TRAINING

© 2013 Huawei Technologies Co.,Ltd.

All Rights Reserved No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Huawei technologies Co., Ltd

Trademarks HUAWEI, C&C08, EAST8000, HONET, ViewPoint, Intess, ETS, DMC, TELLIN, InfoLink, Netkey, Quidway, SYNLOCK, Radium, M900/M1800, TELESIGHT, Quidview, Musa, Airbridge, Tellwin, Inmedia, VRP, DOPRA, iTELLIN, HUAWEI Optix, C&C08 iNET, NETENGINE, Optix, SoftX, iSite, U-SYS, iMUSE, OpenEye, Lansway, SmartAX are trademarks of Huawei Technologies Co., Ltd. All other trademarks mentioned in this manual are the property of their respective holders.

Notice The information in this manual is subject to change without notice, every effort has been made in the preparation of this manual to ensure accuracy of the contents, but all statements, information, and recommendations in this manual do not constitute a warranty of any kind, express or implied.

TABLE OF CONTENT

IP Network Technologies and Service ……...……...……...…………....1 IP Network Planning and Design Outline……………………..………..22 IP Backhaul Network Planning and Designing Overview…………….52 QoS Technologies for IP Bearer Network………………...…….……...61 IP Bearer Network Planning and Design Case Study………………….90

IP Network Technologies and Service Introduction www.huawei.com

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Foreword With the development of telecom technologies, the IP has taken the place of the ATM and has become the leading technology in existing networks. The bearer of multiple services has become the major trend of the IP network development. This course introduces the services of the IP bearer network.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page1

1

Objectives Upon completion of this course, you will be able to: Know the evolution trend of IP Network Describe the services of IP bearer network Know IP bearer network solutions

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page2

Contents 1.

The evolution trend of IP Network

2.

The services and actuality of IP Bearer Network

3.

IP bearer network solutions

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page3

2

Basic Concept of NGN NGN is a packet switched network, it can provide various telecommunication services, make use of transmission technology with several bandwidth and QoS function to realize the separation of service function and low layer transmission technology, and provide permissive access to different service providers’ network for users.

PSN

Data

Open architecture Separate service、control、bearer respectively Support voice、 data、video

Video Voice

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Network Architecture of NGN OSS

MRS

Service Management

Application

Radius

Policy

Network Control SoftSwitch

IPv6 Router

IPv6 Router

IPv6 Router

IPv6 Router

NGSDH

NGWDM

NGWDM

NGSDH

BroadBand IAD

SoftSwitch

AMG

PLMN

PSTN SG

Core Switch

UMG

MGW

Edge Access

NodeB

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

3

The Carrier-class IP network Evolution Tomorrow

Today

Storage

Directory

Message

Location & Presence

SDH

PDH

Cable ADSL GSM/GPRS CDMA Ethernet

Multi networks merge together IP based

Online Gaming

IP / MPLS FMC Network

ATM

Access

Data

FR IP

PSTN

Voice

Video

Wireless Voice

Message

Wireless Data

Dial-up

High Speed Internet

X.25

Core

Streaming

VoIP

Voice

Service

3G

DSL

FTTP/HFC

Wireless

RAN

Unified network, diversified services Gradually evolution

Lower TCO Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page6

Service Convergence

In order to meet customers' requirements and maintain the lead in the competitive market, operators should provide ubiquitous networks and services in an ICT society.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page7

4

IP Network Transformation ISP/ICP

MGW SGSN/GGSN/P DSN

SoftX

IP Multi-service Bearer Network

IP Internet

SG

AG/TG

IAD

STB

IPTV

Compared with traditional IP Internet, the carrier-class IP bearer network sees revolutionary changes which enable the IP network to become a manageable, maintainable, trustworthy secure network that offers the same QoS as the existing telecom network. The carrier-class IP network is able to support a new value chain system. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page8

Driving Force of IP Bearer Network Cost:Reduce cost Single Multi-service IP bearer network instead of multiple separate network(PSTN/ATM/FR/DDN) Flat IP network structure, reduce the network layer Provide same service cross different network Marketing:Improve the network competed ability Different service provided by different port in same network instead of different network, improve response speed Network components configured according requirement Providing multi-service improve the network values Services:Service binding improve the customer faithfulness

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page9

5

IP Technologies Internet

Telecom Network

WWW

Email

C4

C4

C5

PSTN/ATM/DDN

C5

Service

Connectionless Data Service Low QoS, Reliability and Security

Connection-oriented Telecom Service High QoS, Reliability and Security

Strategy

Best Effort, Compromising QoS is better than Denial of Service

Quality guaranteed by connection oriented, Denial of Service by CAC is better than Compromising QoS

Architecture

FTP

Flat Network Architecture From PE to PE, e2e MPLS TE and VPN Bad Expandability

Layered Network Architecture Local Exchange & Transit Network

Integrate telecom and Internet networks and transform them to a user-centric ALL IP network Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page10

ALL IP network In the age of ALL IP, "IP" is no longer a separate technology, but a technology system on par with TDM. Evolution to ALL IP is an end-to-end system project that involves all layers of the network including service, bearer, access, terminal and BSS/OSS

Technologies requirements QoS/Policy Carrier Ethernet IPV6 Multicast Security ……

End-to-end system IP-based IP-based IP-based IP-based

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

customer environment service network access network bearer network

Page11

6

Contents 1.

The evolution trend of IP Network

2.

The services and actuality of IP Bearer Network

3.

IP bearer network solutions

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page12

Core Technical Requirements of IP Bearer Network Network with carrier-class reliability High HA capability of the core equipment Less than 50ms link protection capability The high HA capability of the network can quickly converge and handle faults.

Strict QoS guarantee The network design complies with the traffic flow planning End-to-end QoS guarantee of services Meeting the IPTN requirements

Network security Equipment and service security Secure access of terminal subscribers

Carrier-class management

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page13

7

Core Service Requirements of IP Bearer Network

IP telecom Signaling service

Strict QoS

Broadband Signaling 3G CS SS7 NGN IPTV IP Leased Line/VPN

Without security

Strict

security Enterprise Leased Line

3G PS

Other Internet service

E-business

Internet Normal QoS

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page14

Internet Service Only Services define networks, telecom service needs telecom network, Internet service needs Internet network

Network

Service

Internet Internet Service

Telecom Telecom Service

Bad service is better than

Rejecting service is better

rejecting service

than Bad service

IP Network Best Effort Connectionless

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Telecom Network Quality guaranteed by connection oriented

Page15

8

Weakness of IP Network

-

Reliability Equipment reliability Link reliability

-

Network reliability

-

Qos End-to-End QoS CAC control

-

Problems of IP network Management

Security -

-

Attack and virus Piracy

-

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Multiple equipments Multiple networks Multiple services

Page16

The QoS requirements of 3G/NGN Definitions of quality levels of the IP bearer network

Network level

One way delay (ms)

Packet loss ratio

Jitter (ms)

Good (customized)

≤50

≤0.1%

≤10

Mean*

≤100

≤1%

≤20

Poor*

≤400

≤5%

≤60

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page17

9

The availability requirements of 3G/NGN Recovery time 2s(Connection loss threshold)

Voice session and dedicated line connection are interrupted.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page18

Reliability actuality of IP Network-Equipment Reliability Network convergence time because of equipment switchover from active to backup reaches 10 seconds or so

Routing protocol

Active engine fails, switchover to backup: ms level

Routing protocol

Active Engine

Standby Engine

FIB

Route interrupts, re-setup neighbor relationship: s level Local route calculation:100ms level

Routing protocol

Local route re-flash time: ms level Route convergence of the whole network: 1s level

Standby Engine

Active Engine FIB

BGP convergence time:10s level LDP re-setup LSP:10s level

Service convergence time: 10s level Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page19

10

Reliability actuality of IP Network-Equipment Reliability Link failure brings route flapping in the network. The convergence time is tens of seconds level. Local interface detection: 10ms level Local route calculation:100ms level Local route re-flash time: ms level Route convergence of the whole network:1s level BGP convergence time:10s level LDP re-setup LSP:10s level

Service convergence time: 10s level

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page20

The Security Requirements of 3G/NGN The security problem must be solved when the IP bearer network is planned. For operators who provide telecom network services, the provided network services must satisfy the following security requirements: Privacy: Only the receiver that the sender desires can identify the communication contents. Data completeness and consistency: The information is not modified by a third party during the transfer between the sender and the receiver. Service availability: The service availability is guaranteed by preventing different malicious attacks against the network.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page21

11

Security actuality of IP network Service security isolation Service piracy and bandwidth piracy Security problem of the NGN core equipment

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page22

Bandwidth Piracy and Service Piracy Service piracy: terminal subscribers can directly interwork without the SoftSwitch Bandwidth piracy: The negotiated bandwidth for connection establishment is 64K, but the actual bandwidth may exceed it. SoftSwitch

Metropolitan area network (MAN)

Bandwidth piracy: The bandwidth is not restricted, more bandwidths can be used.

Service piracy: NGN terminals are always connected. Communication can be carried out without any call.

IAD Internet subscribers

Internet subscribers

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

IAD Page23

12

SoftSwitch Security Problem The SoftSwitch is visible to terminals and terminals can directly access the SoftSwitch. It is necessary to solve the problem about traffic attacks on the SoftSwitch. SoftSwitch The processing capability of the SoftSwitch is limited.

Special equipment sends a large amount of signaling messages

Special equipment

NGN core network

PC Phone

IAD

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Through the equipment filtering rule, the firewall can block messages unrelated to the voice service, but cannot block those related to the voice service.

PC Phone

PC subscribers send a large amount of messages unrelated to the voice service.

Page24

IP leased line service analysis

QOS…

Key requirement

High availability…and Security

… access ability

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page25

13

IP Bearer Network Key Technologies Summary MPLS VPN:Services are isolated and will replace the traditional network. HA technologies:Include device reliability and fast failure switching technologies. Reliability is close to SDH. QoS:From early best effort model to Inter-Serv and to Diff-Serv. Meet the requirement of IPTN. Network security:Improve the security of the network. IPv6:Future IP network

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page26

Road to All IP Network Separate Architecture Build separate architecture in Core Network Realize packet transport in Bearer Network Achieve All IP network including Access Network

Packet Networking

Voice

Content & Apps

IP Platform

All IP

IP Bearer

IP

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page 27

14

Core Network All IP Evolution IMS network is the final target and the suitable evolution path depends on existing network construction & services requirement R4 architecture supports smooth evolution to IMS and also accumulates experience for IMS TDM

IP

SGSN

BSS/UTRAN

GGSN

Internet

PS

PSTN

CS

ATM/TDM GMSC

MSC

Softswitch (R4)

Traditional call to VoIP GGSN

SGSN MSC Server

BSS/UTRAN

MGW

IP

PS

PSTN

CS

GMSC Server

IP/IP over E1

GMGW

IP terminal expand rapidly

IMS

SGSN

IP

MGCF IM-MGW

BSS/UTRAN

Internet

MGW BGCF

PS

Internet

GGSN CSCF

IMS

HSS AGCF

PSTN

MGW

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page 28

Bearer Network All IP Evolution IP Bearer convergence leads the trend of multi-service integrated on one platform Bearer network IP transform extends from core layer to access layer

Voice Voice Data Application

TDM



MultiServices sharing one platform

IMS Core

IP/MPLS Backbone ATM/TDM Backbone

Aggregation

DataATM/TDM Metro Network Metro

TDM IP/ATM

… Access

Media Enterprise Voice ICT App App



Service Control

Bearer



TDM/ATM



IP Access PDSN

CDMA

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

GGSN

AC

WiFi/WiMax

GPRS/UMTS

BAS

xDSL/LAN

Page 29

15

Transporting Network All IP Evolution Future network focus on IP based transport & intelligent control plane Optical transport required to expand into access layer gradually Microwave based on IP is also the trend

WDM/OTN

WDM/SDH

GMPLS (ASON)

WDM/OTN SDH /MSTP

Metro

MSTP/NG SDH ->PTN

Aggregation

Microwave /SDH

Access

Microwave /PDH

MSTP/NG SDH ->PTN

WDM/OTN

E2E Network Operating

Cor e

Microwave based on Packet Switching Future

Present

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page 30

Radio Access Network All IP Evolution IP transformation in access network turns to speed up Access network IP alteration from interfaces to kernel Traditional

Iu/A

Gb

ATM

Iur

TDM MGW

BSC/PCU RNC

Iub/Abis

Traditional TDM BTS

ATM/TDM

BSC

ATM NodeB

RNC

SGSN

Dual Stack

Dual Stack

over IP TDM

TDM /IP over TDM

BTS MGW

BSC/PCU

RNC

IP over TDM

ATM IP

ATM/IP NodeB SGSN

IP RNC

IP

RNC

All IP

All IP IP/ IP over TDM BSC/PCU RNC

BSC

ATM/TDM

IP/ IP over TDM BTS

MGW IP

SGSN

ATM/IP NodeB

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

BSC IP IP

RNC RNC

Page 31

16

End to End All IP Solution 1

2

Service Control

Service POP

4

IP+ OTN Trend 1: Better router efficiency Trend 2: Simple transport

NE Router +OSN

Multi Service Edge Node (POP)

CS

MSCG

PS

Carrier-Class Service operating based on network planning Mobile/Fixed convergence

Packet Metro

Metro Packet Network Multi-Service platform

Metro Transport

WiMAX/DVB-H

2G/2.5G/3G/LTE 5 1

GPRS/EDGE

Access

R4/IMS IPTV ICT

ICT

BSS-OSS

3

IPTV

Packet Backbone

6

E2E Service QoS /Cooperation

Packet Backbone

R4/IMS

GPON WiMAX

HSPA/UMTS

HGW LTE

TD-SCDMA

All access technologies based on IP Ethernet/MSTP/GPON /xDSL

xDSL

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page 32

Contents 1.

The evolution trend of IP Network

2.

The services and actuality of IP Bearer Network

3.

IP Bearer network solutions

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page33

17

China Mobile: Leader in the Age of Ideal IP Bearer Network BJ1 XA1

UMG8900 NE40 SD1

SY1 SoftX3000 NE80E NJ1

SH1

BJ2

UMG8900

NE5000E WH1 XA2 GZ1 SD2

SY2

NE40

NJ2 SH2 UMG8900 WH2 NE80E

GZ2

SoftX3000 UMG8900

The NGN service network is oriented to the new telecom services such as 17951 service, SS7 monitoring, VPN private line service, and 3G services. Meanwhile, the NGN service network bears multiple mobile data services. The network covers all provinces in China. In November, 2004, the whole network borne services. In December, 2004, the fault protection was tested in the existing network. The voice was not affected at all, the measured switching time was 25ms. On February 8, 2005 (the New Year’s Eve), the peak traffic was almost three times higher than the usual traffic and the outgoing peak traffic of a TG reaches 1.6 Gbps.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Nationwide IP Bearer Network for China Netcom Northern China BJ

VIP Leased line

North-Western China

North-eastern China

XA SY

SH

CD

Eastern China

South-Western China NGN toll exchange GZ

Southern China

WH

Middle China

NGN toll exchange

This new bearer network will become a nextnext-generation multimulti-service core bearer platform which supports voice, data and video concurrently. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

18

Vodafone Multi-service Bearer Network PEa PEa

PEc PEc PEc

PEa

RR

RR RR PEc PEc PEc PEa PEa PEa

VodafoneVodafone-Connex is the nationwide IP Bearer Network and primarily used for bearing the high-value services such as VPN, 2G/3G. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Spain Jazztel NGN Multi-service Bearer Network DHCP RADIOS

SoftX3000

iManageriManager-N2000

ISPn LNS

Internet

NE80E NE80E

NE80E

NE80E

Route r Madrid

IP/MPLS CORE

NE80E

Barcelona

NE80E

OSPF AREA 0

Valencia Madrid NE5000E

Corporate

NE80E NE80E NE80E

IP/MPLS 2GE

UMG8900

PSTN

IP/MPLS/VPLS OSPF/RSTP 2GE

S8500

S8500 IPDSLAM

AMG

S8500 IPDSLAM AMG

user2@ISPn 1PVC

PPPoE/A POTS DHCP

The NE5000E/NE80E High-End routers were applied to construct the NGN core network, the network would provide NGN, Triple-Play and other new services Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

19

UAE Etisalat Multi-Service IP Bearer Network AMG

AMG

Region 2 Abu Dhabi

AMG

NE40E

M320

M320

2.5G POS 2.5G POS

10G POS AMG

Softswitch

NE40E Softswitch

Region 1 Dubai

AMG

TMG

AMG

AMG

NE40E AMG

2.5G POS Softswitch 2.5G POS

Region 3 West Coast

AMG

TMG

IP TV Head-end Head

NE40E

TMG AMG

Dual service access platforms The added NE40Es acted as PE equipment and formed multiple 2.5G POS rings, covering four regions, Dubai, Al Ain, Abu Dhabi, and West Coast in UAE. The 2.5G POS rings were used for accessing NGN, Triple-Play, IPTV, 3G, and other carrierclass services. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Summary The evolution trend of IP Network The services of IP bearer network

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page39

20

Thank you www.huawei.com

21

IP Bearer Network Planning and Design Outline www.huawei.com

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Foreword How to plan and design a network that is of good reliability, expandability, security, manageability, and maintainability? This course gives a brief look at the network planning in the aspects of topology design, address and naming planning, route selection, security, and network management.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

22

Objectives Upon completion of this course, you will be able to: Outline the basic principle of network planning Master the principle of topology design and addressing Understand how to select routing protocols for the network Outline the basic idea of developing the security strategies Know the development trends of network management system

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Contents 1. Basic Principles of Network Planning 2. Designing a Network Topology 3. Designing Models for Addressing and Naming 4. Selecting Routing Protocols 5. Developing Network Security 6. Developing Network Management System

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

23

Basic Principles of Network Planning Reliability Equipment Network topology

Expandability Equipment performance Scalability IP address and routing protocol planning

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Basic Principles of Network Planning Operability Whether the network can provide rich services Whether reliable security level can be ensured QoS of key services

Manageability Centralized management platform enabling flexible management on various equipment NMS for maintenance of topology management, configuration and backup, software upgrade, and real-time traffic and exception monitor

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

24

Flow of Network Planning Equipment selection Topology planning

Board planning Physical connection

Routing planning

IP connection IP connection

MPLS/VPN planning

QoS planning Advanced routing protocol planning

Policy routing Service isolation and assurance of key services Network security deployment

NM planning Operable, manageable and secure network

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Equipment Selection Reliability Redundancy and reliability of key modules (power and control board)

Forwarding performance Real time Traffic < Throughput / 2

Service capability NAT, VPN, and policy routing in addition to ordinary IP routing (CPU, ASIC and NP)

Port If the ports can meet the requirements

Expandability Support of possible future performance and services by adding boards or software upgrade (CPU, ASIC and NP)

Price Select devices according to the above factors instead of devices with high price.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

25

Contents 1. Basic Principles of Network Planning 2. Designing a Network Topology 3. Designing Models for Addressing and Naming 4. Selecting Routing Protocols 5. Developing Network Security 6. Developing Network Management System

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Features of Network Topology Hierarchy and modularization Network performance maximization Condensed time for deployment and fault removal Cost-effectiveness

Redundant and backup Counteraction of impact by single node failure Load sharing and better network performance Increased network complexity and cost

Security Protection of core router, edge routers, switches, and server Firewall against external attack

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

26

Network Topology Model Plane structure Model No hierarchy and modularization, easy deployment and management Suitable for small networks, and inconvenient for expansion

Plane hierarchy model Common structure for traditional large network, including core layer, convergence layer, access layer

Plane and Space Hierarchy model Hierarchy and plane, different planes for different services Clear structure, good backup capability, and high security Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Hierarchy Model MDNTM Media distribution network Quidway RM9000 Resource Manager

iTELLIN CAMSTM Service platform

The image cannot…

10G/2.5G/RPR MPLS VPN

Core layer Convergence layer

Quidway NetEngine 5000E/80E/40E Quidway NetEngine 40/20

Quidway S9300/8000/6500

Access layer

Quidway NetEngine 16E/08E/05 Quidway Eudemon 100/200/1000

Quidway MA5200 Quidway S2000

iManagerTM N2000/NMS Network management platform

Quidway S3000

Quidway AR4600/2800

Quidway WA1000

Quidway S3500 Quidway S3000

Quidway S5000 The image cannot be The display imag ed. e ca… Your

Quidway S2000

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

27

Plane and Space Hierarchy Model BJ Egress

National backbone IP network

The image cannot be d

BJ IDC

The image cannot be display ed. You

GZ Egress

The image cannot be d

BJ

GZ

SH IDC

SH The image cannot be di

The image cannot be display ed. You

The image cannot be display ed. You

GZ IDC

XA

SH Egress

SY

BJ

CD

GZ

SH

NJ The image cannot be display ed. Your co

WH

The image cannot be display ed. Your co…

The image cannot be display ed. Your co…

The image cannot be display ed. Your computer

The image cannot be display ed. Your computer

The image cannot be display ed. Your computer …

The image cannot be display ed. Your co

The image cannot be display ed. Your computer …

Provincial IP network Metropolitan IP network

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Plane and Space Hierarchy Model

Backbone network 2 (carrier-class services)

Backbone network 2 (network access and data services)

1+1>2

B: :Carrier-class service plane

MAN

A:Internet Service plane

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

28

Redundancy and Backup Principles Basic principles Backup cost ≤ loss caused by equipment failure N+1 backup, through which the network operation will not be affected in case of any fault in key equipment, links, and modules 。 Backup of topology, equipment, and protocols

Access layer backup Usually select the devices without redundancy function in key modules Usually not considering dual-host backup Only provide the dual-uplink for backup if necessary

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Redundancy and Backup Principles Convergence layer backup Usually select devices with redundancy function in key modules 。 Usually considering dual-host backup, dual-uplink backup, and ring connection among convergence layer devices

Core layer backup Usually select devices with carrier-class reliability Considering full mesh or partially mesh topology connection among core layer devices

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

29

Redundancy and Backup Principles Symmetrical backup Equal bandwidth on active and standby links; standby devices or links participating in operation

Asymmetrical backup Less or equal bandwidth on standby links; standby devices or links participating in operation only in case of active link failure

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Designing a Symmetrical Backup To national backbone network 1 10G

Regional center

1 3 2 1 1

1 10G

10G 155M 155M 155M GE

NE40E-X 1 10G NE40E-X

NE40E-X

Hohhot 5 155M

Baotou GSR12012

Erdos

NE80 3 155M

NE80

NE80 2 155M

Xi League GSR12012

5 155M

2 155M 3 155M

NE80

NE80

GSR12012 1 155M

5 155M

Wuhai GSR12012

2 155M

2 155M

Ba League GSR12012 A League Wu League Tongliao Xingan League GSR12012 GSR12012 GSR12012

Chifeng NE80 GSR12012 Hulunbeier GSR12012

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

30

Asymmetrical Backup Municipal office

R

R

Service front end processor group

DCC DCC backup link ATM front end processor

Quidway Router

Quidway Router

PSTN/ISDN

Business office

Active link

Quidway Router

Bank Backbone network

ATM

Service terminal Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Contents 1. Basic Principles of Network Planning 2. Designing a Network Topology 3. Designing Models for Addressing and Naming 4. Selecting Routing Protocols 5. Developing Network Security 6. Developing Network Management System

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

31

Designing Models for Addressing and Naming Unique The same IP address cannot be shared by two hosts in an IP network.

Continuous Continuous addresses can facilitate path coverage, reduce the size of routing tables, and improve the efficiency of routing algorithms in the hierarchical network.

Expandable Some address should be reserved during address assignment on each layer ensure the continuity of address coverage during network expansion.

Meaningful Use the meaningful name

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Designing Models for Addressing Loopback address Concept: logical interface, always UP Address planning A 32-bit mask address is required. Odd number of the last digit for routers, and even number for switches The nearer the devices is to the core, the smaller the loopback address becomes

Interconnection address Concept: address for port connection of two network devices Address planning A 30-bit mask address is required. Use smaller address for core devices Use continuous aggregatable address

Service address Concept: gateway address and address for connecting Ethernet servers and hosts Address planning Use the same last number for all gateway addresses, for example, ".254" for gateway

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

32

Designing Models for Naming Name the devices in the form of AA-B-YYYY-X to facilitate the management. AA: device level and name, usually the name of the region B: name of equipment supplier YYYY: equipment model X: identity numbered by 1, 2... if the previous three items are the same

Examples: Name of the first switch 3526E in Beihai: BH-H3-S3526E-1 Name of the router AR4640 at Chongkou: ChongKB-H3-AR4640

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Designing Models for Naming The description for each port in use should indicate and the peer connection and bandwidth. Naming format: name of peer device bandwidth

Example: description to ZD-H3-NE16E-2 8MThis indicates the standby router NE16E with 8 Mbps bandwidth at the peer end.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

33

Designing Models for Naming Naming of logical interface For MP, Ethernet sub-interface, and VLAN interface, assign meaningful numbers for their names. For MP-group A/B/C, "A" indicates the slot number; "B" indicates card number, which is fixed; "C" is set to a digit that indicates the information of the peer device, for example, an identification digit of peer loopback interface address, or OSPF area number of peer device. Strictly keep Ethernet sub-interface number consistent with the VLAN information. Make a uniform plan for the use of numbers for global VLAN interfaces, for example, 100 and 200 for the VLAN of VPN, and 1000 for NM VLAN. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Contents 1. Basic Principles of Network Planning 2. Designing a Network Topology 3. Designing Models for Addressing and Naming 4. Selecting Routing Protocols 5. Developing Network Security 6. Developing Network Management System

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

34

Comparison Among Routing Protocols Expandabili ty

Convergence time

Resource consumption

Security support and routing certificati on

Hop count

15 hops

Maybe a long time (if no load balance)

Memory: High; CPU: High; Bandwidth: Low

None

Hop count

15 hops

Maybe a long time (if no load balance)

Distance vector or link state

Interior routing/e xterior routing

Classful/ classless

Metric method

RIPv1

Distance vector

Interior

Classful

RIPv2

Distance vector

Interior

Classless

Easiness of setting, configuration, and troubleshooti ng Easy

Memory: High; CPU: High; Bandwidth:

Yes

Easy

Yes

Medium

Yes

Medium

Yes

Medium

Low

OSPF

IS-IS

BGP

Link state

Link state

Path vector

Interior

Interior

Exterior

Classless

Classless

Classless

Reference bandwidth/ physical link bandwidth

Several hundred areas, each area supporting several hundred routers

Maybe a long time (if no load balance)

Configured path, delay, cost, and error

Several hundred areas, each area supporting several hundred routers

Fast (Use of LSA)

1,000 routers

Fast (Use of update and keepalive message and route withdrawal)

Path attributes and other configurabl e parameter s

Memory: High; CPU: High; Bandwidth: Low Memory: High; CPU: High; Bandwidth: Low Memory: High; CPU: High; Bandwidth: Low

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Selection of Distance Vector Protocol and Link State Protocol Distance vector protocol Simple, flat network topology, no need of hierarchy design Simple hub-and-spoke topology Network manager is unfamiliar with link state protocols and unable to shoot troubles in link state database No need to consider convergence time in the worst case

Link state protocol Hierarchical large network Network administrator has rich knowledge about link state protocol Fast convergence is of much importance

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

35

Metric Method Metric result affects scalability Traditional distance vector protocol uses only hop counts Routing protocol of new generation considers delay, bandwidth, and reliability

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Hierarchical and Non-hierarchical Routing Protocols With non-hierarchical routing protocol, all routers must perform the same tasks With hierarchical routing protocol, routers of different roles perform different tasks

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

36

Interior and Exterior Routing Protocols

Interior routing protocol runs within an enterprise network or autonomous system Exterior routing protocol runs between autonomous systems

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Classful and Classless Routing Protocols Classful protocol Discontinuous subnets invisible to each other Not support variable length subnet mask (VLSM)

Classless protocol Support discontinuous subnet and VLSM Support reasonable subnet arrangement for aggregation

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

37

Dynamic, Static, and Default Routing Protocols Static routing protocol Manual configuration, suitable for stub network No protocol messages occupy bandwidth Easy fault removal User has higher control over path selection Difficult to manage in large networks Routing details are not known

Default route Simple; suitable for the network with only one ingress and egress link Routing details are not known

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Routing Protocol Expandability Whether there is any limit on metric Convergence speed upon network changes Frequency and triggering method of route update and Link State Advertisement Information transmission upon route update Bandwidth occupation by route update Advertisement range of route update CPU occupation by routing protocols Whether it supports default and static routes Whether it supports route aggregation

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

38

Selection of Routing Protocol in Hierarchical Network Selection of routing protocol for core layer Support of redundancy links and load sharing Recommended: OSPF, IS-IS Not recommended: RIP

Selection of routing protocol for convergence layer Recommended: OSPF, IS-IS, RIPv2

Selection of routing protocol for access layer Recommended: OSPF, RIPv2, static routing protocol IS-IS is not suitable for access layer

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Redistribution Among Routing Protocols A router runs more than one routing protocol Routing protocols need share routing information Determine boundary of routing areas One-way distribution and two-way distribution One-way distribution refers to distribution of routing information from one protocol to another protocol, and use of static or default route in the reverse direction. Two-way distribution refers to distribution of routing information from one protocol to another protocol or vice versa. Use route filter

Avoid re-advertisement of routes learnt from a protocol back to it Measures of different protocols are different. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

39

Contents 1. Basic Principles of Network Planning 2. Designing a Network Topology 3. Designing Models for Addressing and Naming 4. Selecting Routing Protocols 5. Developing Network Security 6. Developing Network Management System

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Security Policy Access policy Access rights hierarchy

Responsibility policy Responsibility of users, operators, and administrators

Authentication policy Password mechanism

Privacy policy Reasonable privacy monitor, email monitor, and keystroke records

Purchase of computer technologies Computer network configuration, audit, and security policies

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

40

Security Policy Physical security Physical isolation of key network resources Certification and authorization Certificate and authenticate the validity of user identity Limit the range of network resources available for certified users by right control

Data encryption Encrypt original data to prevent data from being read by third-parties Choose a balanced solution between security and performance

No encryption for internal networks Encrypt VPN users and private networks connecting with Internet

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Security Policy Data packet filter Protect network resources from unauthorized use, theft, damage, and attack

Firewall Physical equipment Deploy devices to perform security policies at the border of two or more networks Configure ACL router, dedicated hardware, and software on PC and Unix systems

Firewall types Static packet filter – Check packets one by one; fast forwarding; simple configuration

Dynamic firewall – Trace sessions and make intelligent admission and discard decisions

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

41

Security Policy Intrusion Detecting system (IDS) Usage Detect malicious attacks Take performance statistics and analyze exceptional cases

Type Host IDS: running on a single host and detecting only this host Network IDS: detecting the stream of the whole network

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Contents 1. Basic Principles of Network Planning 2. Designing a Network Topology 3. Designing Models for Addressing and Naming 4. Selecting Routing Protocols 5. Developing Network Security 6. Developing Network Management System

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

42

Traditional Network Management Model FCAPS in TMN model

Configuration management

Fault management

Security management

accounting management

Performance management

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

NM Development Trend More powerful and flexible NM functions Distributed deployment and processing Intellectualized and automated gateway Integrated and customized management of large networks More applications of Web-based NM technologies In-depth analysis of network data Platform and modularization of NMS NMS redundant backup Evolution from IPv4 to IPv6

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

43

IPv4-IPv6 Dual Stack NM IPV6 IPv4-IPv4 route

IPV4 IPV6

IPV6 IPV4

IPV4 Dual stack host

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

NMS Model Integrated NM

Data management

Northbound interface External system

Data operation

Terminal interface

NMS Southbound interface Inband or outband NM

Data collection, alarm, and control NE Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

44

Inband Management

Other NMS

Backup

IP/ATM Core N2000 NMS Firewall Aggregation Layer Aggregation Layer

N2000 Local Terminal

Technology Support (Local Console Configuration) Access Devices

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Outband Management Other NMS

DCN

Backup N2000 NMS Firewall

IP/ATM Core

Aggregation Layer Aggregation Layer

Access Devices

N2000 Local Terminal

Technology Support (Local Console Configuration)

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

45

Two-level NM Provincial terminal

Municipal terminal

Provincial OSS NMS

Municipal OSS NMS

Municipal NE

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Centralized NM Provincial terminal

Intelligent NMS

Municipal terminal

Regional IN NE

SCP/SMP

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

46

Integrated NM Municipa l terminal

Provincial NMS A

Municipa l terminal

Provincial NMS B

Provincial traffic NMS

Municipal OSS

Municipal OMC

Municipa l NE

IN NMS

Municip al NE

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

External Interface

Provincial NM terminal

OSS

DCN/Group/Internet

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

47

Independent NM

Provincial terminal

Municipal terminal

Provincial NMS

Provinci al NE

Municipal NMS

Municipa l NE

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Service Model of NM Network Network infrastructure

NMS

User

User domain

Network domain

• PSTN terminal • Mobile terminal • Third party access

• Internal systems • External interfaces • DMZ

NM network service domain

• Public security service

Service NE

NM domain • • • • •

Provincial NMS sub-domain Simens NMS sub-domain Ericsson NMS sub-domain Municipal NMS sub-domain ……

Cross-subdomain NM network data arrangement

• Public service for external system connection

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

48

Architecture of NM Network Service module 7 Service module 8

Service module 6

Service module 5

Service module 1

Service module 2

Service module 4 Service module 3

Barring backdoor connection Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Implementation of NM Network Provincial NM sub-domain by Huawei Municipal NM sub-domain by Huawei

Provincial NM sub-domain by Ericsson

Municipal NM sub-domain by Ericsson

Provincial traffic NM sub-domain

Municipal traffic NM sub-domain Trusted channel

Public external interface area

MPLS/IP

Public security service domain

Security domain

Security area Risk area Internet

Cross-sub-domain data exchange area

Server Network access authentication Terminal gateway

DMZ区 External risk

Dedicated terminal

PUPV/IP base PUPV/IP base risk area

Internal risk

Dedicated terminal

DCN Third party access area

Dedicated terminal

Third party access area Third party access area

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

49

Developing Management Network System Active authentication Service system 1 Service system 2 Service system 3 Service system 4 gateway

Standby authentication gateway

MA5200F

MA5200F

Standby WPN data exchange area Active WPN data exchange area IDS

Internet Public external

interface area

Network domain

Municipal node 1

DCN

Provincial branch Municipal branch

Municipal node N

MA5200F

MA5200F

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Summary 1. Basic Principles of Network Planning 2. Designing a Network Topology 3. Designing Models for Addressing and Naming 4. Selecting Routing Protocols 5. Developing Network Security 6. Developing Network Management System

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

50

Thank you www.huawei.com

51

IP Backhaul Network Planning and Designing Overview www.huawei.com

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Foreword Nowadays, mobile broadband provides various application, and are moving towards fixed mobile convergence (FMC). Operators urgently need a network which is able to bear for multiservice, includes high-valued service. How to deploy a network which with low cost, high efficiency, easy to expand and O&M is the main concern. Hence, this course will discuss about the objective of implementing the IP Backhaul network and how to design and plan for the network.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page1

52

Objectives Upon completion of this course, you should be able to: Describe the procedure for planning a IP backhaul network. Describe the procedure for designing a IP backhaul network.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page2

Contents 1. IP Backhaul Network Planning and Design 1.1 IP Backhaul Network Planning 1.2 IP Backhaul Network Design

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page3

53

Contents 1. IP Backhaul Network Planning and Design 1.1 IP Backhaul Network Planning 1.2 IP Backhaul Network Design

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page4

IP Backhaul Network Planning and Design Procedure Network design and planning have different stage, High level design (HLD): The HLD focuses on determining an appropriate solution based on analysis of the existing networks and services. This phase is the network planning phase that comes out with the topology, services, protection, and QoS. Low level design (LLD): Based on the outputs of the HLD, a detailed network design is completed in the LLD phase, the network design phase. The outputs of this phase can instruct network construction and service provisioning.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page5

54

Contents 1. IP Backhaul Network Planning and Design 1.1 IP Backhaul Network Planning 1.2 IP Backhaul Network Design

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page6

Huawei IPRAN Single Backhaul Network Solution Huawei’s SingleBackhaul solution provides open service interfaces to overcome the challenges faced by multiservice bearer network. IMS Core HLR/HSS PCRF Backbone layer IP Backhaul +OTN PS domain

Huawei’s Single Backhaul Network

SGSN/ MME

RRU IP Backhaul

RRU

LTE Pico+WiFi iMicro+WiFi

Aggregation layer IP Backhaul+ OTN BSC/RNC Pool

3G

iMicro+WiFi

GSM

Pico+WiFi iMicro+WiFi

iMicro+WiFi

Firewall

Splitter MDU(POE)

GGSN/SG W

GSM/3G/LTE Core Network

AC/BRAS

PS service/ Internet

OLT

Pico+WiFi FTTTX

Multi service access

Single Backhaul bearer network

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Core network

Page7

55

IP Backhaul Network Planning Process (1/2) Step 1

Task

Input

Output

Requirement

Customers network

Service implementation, site

Collection

requirement

location, traffic capacity, QoS,

Topology

Service point location, base station distribution (BTS, NodeB, and eNodeB), transmission resources, optical fiber routes, and site location

IP backhaul network layers Equipment types at each IP backhaul network layer

Interconnection interfaces NE protection requirements

Port plan Board plan NE reliability plan

NM&DCN features NE security requirements

NMS server plan DCN plan NE security strategy

Network management requirements Service features

NE name, management IP address, LSR ID, interface IP address

reliability, clock, security 2

Planning

3

Hardware Planning

4

NM& DCN Planning

5

Parameters Planning

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page8

IP Backhaul Network Planning Process (2/2) Step

Task

Input

Output

6

Network connectivity planning

Network interconnection requirements Routing protocol features

Routing protocol type, protocol deployment mode

7

Tunnel planning

Service isolation Bandwidth for each service Traffic direction

Tunnel protocol Deployment mode Traffic model

8

Service planning

Services to be deployed Service scales

Service bearer technology Service bearer solution

9

QoS planning

Priority mapping of services Service quality requirements, such as bandwidth, delay, jitter, and packet loss

9

High Availability planning

Quick check Availability indicator Delay of protection switching

Service quick check mechanism Service protection switching mechanism

11

Clock planning

Network clock synchronization requirements

Physical-layer clock plan Time synchronization plan

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page9

56

Mapping Relationship between Requirements and Plans Requirement Collection (1)

Service

Interconnected Equipment

Topology Planning (2) Topology

Hardware Planning

NM & DCN Planning

(3)

(4)

Ports & Boards

NM Capacity & DCN

Parameter Planning

Service Planning

(5)

(8) (6)

NE ID/NEIP Node ID/ IP

IGP routes

Topology Bandwidth

(7)

PW& Tunnel Bandwidth

QoS Requirement

(9)

Service QoS

(10)

Service OAM Planning

(11)

Clock Planning

Reliability Requirement

Equipment Protection

Clock Requirement Security Requirement

NE Security

Maintainability Requirement

Maintainability Administration Mode

Construction Cost

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page10

Contents 1. IP Backhaul Network Planning and Design 1.1 IP Backhaul Network Plan 1.2 IP Backhaul Network Design

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page11

57

IP Backhaul Network Design Process (1/2) Step

Owner

Task

Input

1

Plan the topology and hardware

NE introduction Network topology Hierarchical NE type selection Bandwidth and capacity

Installation engineers

2

Design the NM&DCN

NMS server plan DCN plan

Commissioning engineers NM center engineers

3

Design NE parameters and IP addresses

NE name, management IP address, LSR ID, interface IP address

Commissioning engineers NM center engineers

4

Design routes

OSPF (router ID/area) IS-IS (NET/layer/area)

NM center engineers

5

Design tunnels

Source, sink, trail, label

NM center engineers

Page12

IP Backhaul Network Design Process (2/2) Step

Task

Owner

Input

6

Design services

2G TDM PWE3 plan 3G ATM PWE3 plan Ethernet service plan

NM center engineers

7

Design high availability

Service protection switching mechanism

NM center engineers

8

Design QoS

QoS mapping rules on the network side QoS parameters of different services

NM center engineers

9

Design clock synchronization

Clock synchronization plan

NM center engineers

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page13

58

Review(1/2) IP backhaul network planning and designing 10 steps are as follows : Step 1: Collect requirements of network, analyze network service models, and clarify service requirements. Step 2: Consider service implementation and expectation, plan the topology and traffic capacity and select appropriate devices based on available physical resources and investments cost. Step 3: Plan NE parameters and IP addresses to enable the interconnection, communication, and management of NEs. Step 4: Plan the NMS and DCN channels for latter service provisioning. A powerful NMS can help to improve the efficiency of service provisioning and fault detection. Step 5: Focus on logical service functions implementation. Choose a suitable routing protocols and plan nicely for NE interconnection and communication.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page14

Review(2/2) (Cont) IP backhaul network planning and designing 10 steps are as follows : Step 6: Based on the network traffic model and service implementation mode, plan tunnels if the VPN technology is in used to bear services. Step 7: Select appropriate service bearer technologies to complete service planning and produce a good traffic flow model. Step 8: High availability to ensure services reliably and efficiently. Step 9: Plan and design QoS for different services to meet requirements of high-value services. Step 10: Plan and design network-wide clock synchronization to archive service clock requirements.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page15

59

Summary IP Backhaul Network Planning and Design 1.1 IP Backhaul Network Planning 1.2 IP Backhaul Network Design

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page16

Thank you www.huawei.com

60

QoS Technologies for IP Bearer Network

www.huawei.com

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Foreword IP bearer network bears multiple services such as voice, signaling, IPTV and Internet, it encapsulates these services in IP packet. In fact, the importance of these services is different. They should be forwarded differentially to ensure the quality of key service. QoS technologies are used to provide differentia service.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page1

61

Objectives Upon completion of this course, you will be able to: Know the QoS requirement of IP bearer network Master the principle of QoS Know the QoS configuration process on VRP platform

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page2

Contents 1. QoS Basis Review 2. QoS Requirement of IP Bearer Network 3. QoS Realization Principle 4. QoS Configuration Process

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page3

62

Contents 1. QoS Basis Review 2. QoS Requirement of IP Bearer Network 3. QoS Realization Principle 4. QoS Configuration Process

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page4

Basic Concept of QoS Qos (Quality of Service) means expected service quality of subscriber service in case of packet loss, delay, jitter and bandwidth while network communication. Quality of Service (QoS) is used to measure the performance of service providers in meeting client’s requirements. Instead of giving accurate marks, QoS evaluation stresses on analyzing the service performance, which helps to guide service improvement. IP QoS target: Prevent and manage IP network congestion. Reduce the rate of IP message lose. Control IP network traffic. Provide private bandwidth for specific subscribers or service. Support real-time service over IP network. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page5

63

Loss of Packet

? Internet

This

Is John Smith Speaking ……

One party said, …… This Is

…… Smith Speaking

The opposite party heard…… Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page6

Delay Internet

First bit transmitted

Last bit received

A Processing delay

A Network transit delay

Processing delay

time

End-to-end delay

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page7

64

Jitter Internet

3

2

1

3 D3

Sender

2

1

D2

receiver

D1

D3=D2=D1 Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page8

Bandwidth Limit

10M

IP

I want 2M

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page9

65

Three Models of IP QoS Best-Effort model: Best-Effort model do not ensure the quality of service IntServ model: The service sends a signaling to NM to request special QoS. The NM reserves the resource according to the traffic parameter to satisfy the request. DiffServ model: In case of network congestion, control the traffic and forward differently according to the different service level stipulated to solve the congestion.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page10

Best-Effort Model Best-Effort is a single service model Using Best-Effort model can transfer any number of packets at any time without getting previous approval There is no guarantee with respect to time delay and reliability It is implemented by first in and first out (FIFO) queue technology

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page11

66

IntServ Model Provide controllable end-to-end service. Network units support QoS control mechanism. The application applies to NM for specific QoS service. Signaling protocol deploys in network according to QoS request. RSVP is the most frequently used.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page12

Contents 1. QoS Basis Review 2. QoS Requirement of IP Bearer Network 3. QoS Realization Principle 4. QoS Configuration Process

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page13

67

QoS Requirement

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page14

QoS Requirements of Voice Traffic Level

Mean opinion score (MOS)

Customer satisfaction

Good

4.0 4.0--5.0

Good, clear, little delay, smooth communication.

Fair

3.5 3.5--4.0

Fair, clear, a little delay, communication obstructed, noise

Medium

3.0 3.0--3.5

Medium, not too clear, a certain delay, communicable.

Poor

1.5 1.5--3.0

Poor, not too clear, a big delay, communication repeated.

Bad

0-1.5

Bad, not clear, a big delay, communication obstructed.

QoS Requirements of Voice Traffic End-to-end bandwidth guarantee Delay of the bearer network ≤ 50ms, and ≤ 100ms at least Jitter of the bearer network ≤ 10ms, and ≤ 20ms at least Packet loss ratio ≤ 1% Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page15

68

QoS Requirements of Signaling Traffic Packet loss ratio of the IP bearer network < 0.1% Transfer delay < 100ms Jitter < 10ms Independent physical or logical network, and able to prevent different illegal attacks A light network bearer is recommended

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page16

Comprehensive Requirements for QoS Definitions of quality levels of the IP bearer network

Network level

One way delay (ms)

Packet loss ratio

Jitter (ms)

Good (customized)

≤50

≤0.1%

≤10

Mean*

≤100

≤1%

≤20

Poor*

≤400

≤5%

≤60

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page17

69

Contents 1. QoS Basis Review 2. QoS Requirement of IP Bearer Network 3. QoS Realization Principle 4. QoS Configuration Process

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page18

Contents 3. QoS Realization Principle 3.1 QoS Models 3.2 Technologies of Diff-Serv Model 3.3 MPLS QoS

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page19

70

Integrated Service

Path Message: Setup Path to Reserve Bandwidth

Resv Message: Reserve Bandwidth

Int-Serv Domain

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page20

Differentiated Service

Customer Equipment

Diff-Serv Domain PHB PHB

Classify services and Regulate traffic over network borders.

Customer Equipment

PHB PHB

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

DS domain service provides strategic PHB decision.

Page21

71

Contents 3. QoS Realization Principle 3.1 QoS Models 3.2 Technologies of Diff-Serv Model 3.3 MPLS QoS

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page22

QoS Technologies in Diff-Serv Traffic Classification and Marking Traffic Policing Traffic Shaping Congestion Management Congestion Avoidance

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page23

72

Classification and Marking ACL , IP priority

Basis of QoS execution service Based on the ACL and IP priority According to the classification result, pass the message to other modules for processing or marking (toning) before classification by the core network. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Traffic Policing

Page24

Flow classification

Token bucket

drop

CAR is the abbreviation for Committed Access Rate Token barrel algorithm Control the traffic Shaping—Enable packet delay output of traffic flow is in accordance with regulation on service model Dropping—discard packets according to specific rule Marking—Set message DS domain or IP priority Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page25

73

QoS Deploy Suggestion Class

DSCP

A

40

B

MPLS

802.1P

PHB

Service

5

5

EF

Voice

24

3

3

AF3

Group Service

C

16

2

2

AF2

Signaling

D

8

1

1

AF1

Reserved

E

0

0

0

BE

NMS

EXP

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page26

Result of Traffic Policing bps

Rate Limit

Without Traffic Policing

Time

bps

Rate Limit

With Traffic Policing

Time

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page27

74

Traffic Shaping Token

128Kbps

Queue

bucket

Flow classification

256Kbps

128Kbps

FR

GTS (Generic Traffic Shaping) is to solve Interface rates on both sides of the link are not matching GTS limits traffic of messages and buffer the messages which exceeds the traffic limit stipulated Traffic shaping may increase the delay.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page28

Result of Traffic Shaping bps

Rate Limit

Without Traffic Shaping

Time

bps

Rate Limit

With Traffic Shaping

Time

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page29

75

Physical Interface Line Rate Flow classification

256Kbps

QoS queue

128Kbps Bucket

LR limits the total rate for sending packets (including the emergency packet) on a physical interface. LR also utilizes the token bucket to perform the traffic control LR using the QoS queue for congestion management Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page30

Congestion Management Flow classification

Output queue In case of network congestion, ensure messages of different priority levels gain different QoS, such as time delay and bandwidth Put messages into different queues according to their priority levels, and give different dispatch priorities, probabilities or bandwidths to different queues FIFO( First In First Out ) PQ( Priority Queue ) CQ( Custom Queue ) WFQ( Weighted Fair Queuing ) Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page31

76

FIFO Forwarding packet

FIFO (First In First Out) is simple First-In First-Out (FIFO) queuing--concepts of no communication priority and classification FIFO is the default queuing By default, packets in the queue are sent according to the FIFO policy Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page32

PQ Flow classification

High Medium Normal Low

drop

PQ (Priority Queuing) guarantees that the data packet with higher priority can be sent in time PQ is divided into 4 queue:High,Medium, Normal,Low High priority queues will be first dispatched. PQ is designed for mission-critical applications Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page33

77

Flow classification

CQ



Queue 0 Queue 1 Queue 2



drop

Queue 16

CQ (Custom queuing), that the user can configure the proportion of the bandwidth for the different queue CQ is divided into 17queues: Queue 0 is the system queue; queue 1 to queue 16 is the user queue. Each queue satisfies bandwidth the user configured on statistic Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Flow classification

WFQ

Page34



Queue 1 Queue 1 Queue 2



drop

Queue N

N=16,32…2048,4096 WFQ (Weighted fair queuing), assures justice to services with identical priority. Maximum number of queues can be configured (16-4096) Use HASH algorithm to dispatches the data flow into different queues The weight is based on the priority Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page35

78

Congestion Avoidance Bandwidth utilization

time

The traditional drop policy utilizes the Tail-Drop method The tail-drop may cause the TCP Global Synchronization

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Flow classification

WRED

Page36



Queue 1 Queue 1 Queue 2



min-threshold

Max-threshold

drop

Queue N

N=16,32…2048,4096

WRED (Weighted Random Early Detection) WRED avoids the TCP global synchronization through the random drop packets Compare with the queue length to perform the drop Based on the different priority to define the min-threshold and max-threshold The same priority but different queue , the queue longer the packet drop more

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page37

79

Contents 3. QoS Realization Principle 3.1 QoS Models 3.2 Technologies of Diff-Serv Model 3.3 MPLS QoS

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page38

MPLS Diff-Serv In MPLS DiffServ field, set MPLS Exp bit at the edge of the network Do not modify IP DSCP priority, so the final user can hold dependent QoS policy in their network Traffic classification, marking and coloring in the edge, according to source address, destination address, port number, protocol type and COS .

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page39

80

QoS Mapping Between IP Network and MPLS Network Service Type

DSCP Domain

EXP Domain

Reserved

111000(CS7)

7

Reserved

110000(CS6)

6

Service Type 1( real-time

101110(EF)

5

Service Type 2 (fulfil SLS)

011010(AF31)

4

Service Type 2(non-fulfil SLS)

011100(AF32)

3

service)

011110(AF33) Service Type 3(fulfil SLS)

001010(AF11)

2

Service Type 3(non-fulfil SLS)

001100(AF12)

1

001110(AF13) Service Type 4(best-effort)

0(default)

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

0

Page40

MPLS DiffServ Tunnel Type MPLS DiffServ supporting tunnel type: Uniform Model Short-Pipe Model Pipe Model

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page41

81

Uniform Mode In Uniform mode, regard as a whole DiffServ domain, no matter IP network or MPLS network.

When remove the label, the upper EXP value will copy into nether label EXP value will copy into IP DSCP field at second last hop

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page42

Short-Pipe Model The short-pipe model can keep the user’s QoS strategy relatively independent from the service provider’s QoS strategy.

We can find that in POP, EXP=0 is not copied to the DSCP domain of IP. Hence in the short-pipe model, the user and the service provider can use different QoS strategies.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page43

82

Pipe Model The pipe model is similar as the short-pipe model. However, in the pipe model, PHB executed on mpls2ip link is operated according to the removed EXP instead of the DSCP value.

we can find that in POP, EXP=0 is not copied to the IP DSCP domain. But the PHB operation executed in the outgoing link is made according to EXP=0 instead of IP DSCP=40. Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page44

LSP Classification MPLS supporting DiffServ model, provide two LSP type: E-LSP(EXP-Inferred-PSC LSPs) L-LSP(Label-Only-Inferred-PSC LSPs)

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page45

83

E-LSP and L-LSP

Ingress LSR

Egress LSR

L-LSP Solution

Ingress LSR

Egress LSR

E-LSP Solution

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page46

Selection of E-LSP and L-LSP Consideration based on link layer: On PPP and LAN, select E-LSP, LLSP or both. On the ATM network, only L-LSP can be used as the EXP domain is not visible Consideration based on traffic: If only E-LSP is used, up to 8 PHBs can be supported; to support more than 8 PHBs, L-LSP or E-LSP mixed with L-LSP should be used Consideration based on network loads: E-LSP is adopted to save the amount of LSP, label resources and signaling loads. L-LSP might relatively waste more resources In general, if the network provides up to 4 types of services, E-LSP can meet the needs. L-LSP is adopted only when there is ATM router, many service types, or QoS network with discarding priority requirements.

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page47

84

QoS Scheduling and Mapping for Upstream and Downstream Traffic in the VPLS Scenario

Copyright © 2008 Huawei Technologies Co., Ltd. All rights reserved.

Page 48

Contents 1. QoS Basis Review 2. QoS Requirement of IP Bearer Network 3. QoS Realization Principle 4. QoS Configuration Process

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page49

85

Network Topology NE80E-1

NE40E-1 G1

UMG8900

NE80E-2

NE40E-2 G0

SHLR

G1

G0

SoftX3000 SG7000 MRS

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page50

QoS Configuration on NE40E Define ACL acl number 3000 // Signaling rule 5 permit source 10.0.109.0 0.0.0.127 acl number 3001 // Voice rule 5 permit source 10.0.38.0 0.0.0.255

Configure Traffic Classification traffic classifier 3000 operator or if-match acl 3000 traffic classifier 3001 operator or if-match acl 3001 traffic classifier 3002 operator or if-match acl 3002

acl number 3002 // Management rule 5 permit source 10.0.37.0 0.0.0.255

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page51

86

QoS Configuration on NE40E Configure Traffic Behavior traffic behavior 3000 remark dscp af21 traffic behavior 3001

Configure Traffic Policy traffic policy Voice classifier 3001 behavior 3001 traffic policy management

remark dscp cs6

classifier 3000 behavior 3000

traffic behavior 3002

classifier 3002 behavior 3002

remark dscp ef

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page52

Interface Configuration on NE40E Apply traffic policy on interface G0 [interface-gigabit0] traffic-policy management inbound

Apply traffic policy on interface G1 [interface-gigabit1] traffic-policy voice inbound

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page53

87

QoS Configuration on NE80E Configure the bandwidth of queues on the related interface queue ef bandwidth pct 60 queue af bandwidth pct 20 queue be bandwidth pct 20

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page54

Summary What are the advantages of Diff-Serv model ? Please list the queue technologies of congestion management. What is the configuration step of CBQ ?

Copyright © 2013 Huawei Technologies Co., Ltd. All rights reserved.

Page55

88

Thank you www.huawei.com

89

90

91

92

93

94

4 core sites: Islamabad, Karachi, Faisalabad, Lahore. 8 aggregation sites: Islamabad, Karachi, Faisalabad, Lahore, Gujranwala, Hyderabad, Peshawar, Multan.

95

96

This MPLS network was constructed using the above list of equipment.

97

The implementation includes: 4 core sites: Islamabad, Karachi, Faisalabad, Lahore. 8 aggregation sites: Islamabad, Karachi, Faisalabad, Lahore, Gujranwala, Hyderabad, Peshawar, Multan. These 4 Core sites will have the NE40E-X8 installed and connected in full mesh to form the backbone. The IP/MPLS network in core 4 sites is divided into two planes: Plane A and Plane B. Every Plane uses full mesh topology; between different Planes only connect the same site devices. So, this network topology has better redundancy and less links.

98

The IP MPLS core network is designed for multi-services carrier network. This network will carry the following services: Voice traffic (Between different MGW); Signaling traffic (Between MSC Server, HLR, STP[IP]); GPRS traffic (Between GPRS Edge Router); IT Traffic ( LAN/WAN, Billing, Customer Care Center, IP Telephone ); NMS Traffic; LIG, etc.

99

MSC (signaling , LIG, mediation OAM ), MGW (voice, signaling), HLR( signaling ,CRM) . All services will be connected to NE40E-X3 using VPN.

100

The O&M traffic of (STP/MSC Server/MGW) will aggregate on the 2xS9303 switches (CE) with redundancy, then connect to the PE routers; The Billing traffic will aggregate on the 2xS9303 switches as well; While for the signaling of (STP/MSC Server/MGW) and Media of MGW, they will directly connect to the NE40E-X3 routers;

101

In vendor Z site, Huawei will only provide the NE40E-X3 routers, which will provide 48 FE/GE electrical and 48GE optical ports.

102

STP: Signaling Transfer Point Huawei Product SG7000

103

IP NMS server distribution: One server in ISB, three clients for KHI, LHR,FSD . Clients communicate with server using the VPN. Routers in core network should be managed via traffic in-band. The management traffic will use the same links as data traffic. In-band management for NMS should be enabled on all the routers in Core Network. Bandwidth should be allocated to in-band management on all links. Adopt the IP forwarding to carry NMS of IP/MPLS core.

104

105

106

Principle:The equipment name needs to represent the physical location and the role in the network. Physical location means the geographical name of different cities in Pakistan where equipment is placed. Network role means network type and function provided. There are NE40E-X8, NE40E-X3, and NE08E which are used as P, PE and RR separately in MPLS network. Method to differentiate several devices having the same function/role in same location. Proposed Equipment Naming Scheme: - -- refers to city abbreviations refers to responsibility of device, like:P、PE、CE、FW, can combine, like: PRR refers to the network equipment refers to site that is A or B. The A represents the old site, the B represents the new one. refers to sequence number . For example, the first NE40E-X8 router of Islamabad site , it is working as a P router, also RR in this MPLS network is named as the following according the above rule: ISB-PRR-NE40E-X8-A1

107

108

Interface Naming Scheme: : refers to Port type abbreviations; refers to the sequence number of this interface in device. Port type abbreviations are shown in the above table. For example, in ISB-PE-NE40E-X3-A1 router, LPU 8 first port, is named the following according the above rule: ISB-PE-NE40E-X3-A1:GE8/0/0 Interface Description Scheme: Interface description used to note another side equipment and port of link, so we can simple use the mode: To For example, in ISB-PE-NE40E-X3-A1 router, the GE8/0/0 port connect to ISB-PENE40E-X3-A2 GE8/0/0,so can configure as following: Interface GigabitEthernet8/0/0 Description to ISB-PE-NE40E-X3-A2:GE8/0/0 If the other side is not datacom equipment, can use device name. For instance: UMG.

109

Principle: Distribute continued IP address for every POP. It has the benefit of route aggregation and safety control. Adopt VLSM (Variable Length Subnet masks) technology for IP address distribution to improve efficiency of IP address usage. Adopt CIDR in order to reduce the size of routing table, improve convergence speed and reduce routing information broadcast. Use the IP address space adequately and improve IP address efficiency distribution. The IP address pool 10.64.0.0/16-10.87.0.0/16 has been assigned to the MPLS network by network planning department. The interconnect addresses between elements in the MPLS network will have be in the address space of /30 subnets; VRRP link use /29 subnets. The Loopback addresses for router, firewall, and switch will use the IP address range in 10.31.x.x/16. 10.A.B.0 subnets:A refers to different service. B refers to different city.

110

“A” table: Specially, according to manage the mainly services, we also decide to use separate ip address scope for signal, media and oam (including billing, lig, nms etc.) Signaling: 10.64.0.0-10.71.255.255 Media: 10.72.0.0-10.79.255.255 OAM, Billing and LIG: 10.80.0.0-10.87.255.255 Core IP management:10.31.0.0/16

111

112

The equipment of core network connects to IP network, different VLAN ID will adopt various services. The same VLAN ID can be used at different site. Interlink VLAN: 10-19 Media VLAN: 20-29 Signal VLAN: 30-39 NMS VLAN: 40-49 IT VLAN: 50-59 Billing VLAN: 60-69 LIG VLAN: 70-79 Other : 80-4095

113

114

IS-IS is used as IGP routing protocol in this network. The following arguments explain why IS-IS may be a somewhat better protocol for this network. Based on experiences in the industry, IS-IS generally supports a larger a number of nodes (up to 1024) in the same area. OSPF is generally deployed with a much smaller number of nodes (less than 200). Many of the carrier class large scale IP networks use IS-IS. Much of the vendor experience with large scale network is with IS-IS, thus making it easier for the vendor to support. All routers will be ISIS L2-only routers in core network. All routers are put in one area. The NSAP addressing will have the following scheme: Area ID uses 49.0000 System ID is transformed from loopback IP address For example, a router that has the loopback address 10.31.16.1 will have a CLNS address 49.0000.0100.3101.6001.00. Authentication MD5 Authentication can be defined between all ISIS neighbours. Redistribution No re-distribution of routes is recommended either from the IGP to BGP or from BGP into IGP. IS-IS Fast Convergence Partial route calculation and incremental SPF should be deployed to help L3 convergence time. (In Huawei NE40E-X3/NE40E-X8 implementation, I-SPF and PRC is the only algorithm for route calculation)

115

IS-IS TE In core layer network all core routers will be use MPLS TE technology to improve network reliability, so ISIS TE must be used in this area to distribute TE attributions. By default, IS-IS TE is disabled. The IS-IS TE extension uses the sub TLV of IS-reachable TLV (22) to carry the TE properties. Therefore, the Wide Metric feature of IS-IS must be enabled. The mode for the feature is one of wide, compatible or widecompatible. By default, IS-IS only transmits or receives packets that express route metrics in Narrow mode. If the level is not specified when the IS-IS TE is enabled, then IS-IS TE is valid both for Level-1 and Level-2. By default, the sub TLV of BW-constraint is 252; the sub TLV of Local Overbooking Multipliers (LOM) is 253; the sub TLV of unreserved-BW-subpool is 251. All routers will be ISIS L2-only routers in core network. All routers are put in one area. Because IS-IS support up to 1000 routers in one area without affecting the convergence speed. Moreover, to put all routers in L2 is easy for future network expansion. If the network is to be expanded and more routers are added, these added routers will be put into L1 and connected to L2 by L12 router. This expansion has no impact on the old network topology, so it is recommended to put all routers in L2 and one area when the network is newly built.

116

The interfaces that should enable ISIS protocols are: All interfaces in all NE40E-X8, core routers including the loopback interface; All interfaces in NE40E-X3 connected to core routers, interfaces between NE40E-X3 routers and loopback interfaces; All interfaces in NE08E/NE05 connected to NE40E-X3,and interfaces between NE04E/NE05 routers and loopback interfaces.

117

According to the content of “Connectivity Planning and Design of IP Bearer Network” IS-IS cost design. The IS-IS cost should meet the following conditions: C
View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF