ip ran planning basics
DESCRIPTION
IP RAN Planning BasicsTRANSCRIPT
04/11/2023
IP RAN Network Planning Basics
Contents
• IP RAN Overview• Key Technologies of IP RAN
Page 4
RAN Overview
Page 5
Positioning of the RAN in a UMTS
Page 6
RAN Architecture• A RAN is composed of RNCs, NodeBs, and
the M2000. RNCs and NodeBs are network elements; the M2000 is an Element Management System (EMS). RNCs, NodeBs, and the M2000 are connected to each other, forming a RAN.
Page 7
Outward Interfaces of the RANThe RAN provides outward interfaces that comply with 3GPP standards such as Uu, Iu, and Itf-N interfaces. Uu and lu are open interfaces and devices made by different vendors can interconnect through them. Itf-N interfaces are private interfaces.
Page 8
Inward Interfaces of the RANThe RAN provides interfaces that comply with 3GPP standards such as Iub, Iur, and Itf-S interfaces to interconnect the devices inside the RAN. Iub and Iur are open interfaces and devices made by different vendors can interconnect through them. Itf-S interfaces are private interfaces.
Page 9
RAN Services• Session services: have very high requirements for real-time
transmission and allow error codes to a certain extent. Session services include the voice service and video phone service.
• Flow services: have high requirements for real-time transmission and are transmitted through stable and continuous data flows. An example of flow services is the multi-media service.
• Interaction services: have only moderate requirements for real-time transmission but require integrity and accuracy of data. Interaction services include webpage browsing and location-based services.
• Background services: do not require real-time transmission but require integrity and accuracy of data. An example of background services is the e-mail service.
Page 10
NodeB Overview
Being a base station in the UMTS, a NodeB can transmit RF signals to a UE or receive RF signals from a UE to implement wireless coverage. A NodeB is connected to an RNC through an Iub interface.
Page 11
RNC OverviewPhysically, an RNC can be divided into the hardware and software; logically, an RNC can be divided into the switching sub-system and service processing system. The hardware of an RNC is composed of a switching cabinet, service cabinet, Local Maintenance Terminal (LMT), and alarm console. Besides ports for inputting power and clock signals, an RNC provides ports for communicating with NodeBs, Serving GPRS Support Nodes (SGSNs), Mobile Switching Center (MSCs), other RNCs, and the M2000.The software system of an RNC is composed of several pieces of software which supports the operation of the entire system. The RNC software adopts a distributed structure design, including the foreground host software and BAM software, which can communicate with each other. The switching sub-system and service processing sub-system form the host system (also called foreground administration module). The operation and maintenance sub-system includes the background administration module (BAM) and LMT.
Page 12
IP RAN
Page 13
What Is an IP RAN? On an IP RAN, Iub interfaces can transmit traffic based on IP. At present, Iu and Iur/Iub earth interfaces of RANs based on WCDMA R99 and R4 perform ATM transmission. In addition, RNCs and NodeBs are tightly coupled. Consequently, both the CapEx and OpEx are high. To effectively protect carriers' investment, reduce CapEx, and achieve smooth evolution of 3G networks, IP will be introduced for RANs in the WCDMA R5 phase. The IP RAN solution aims to fix these issues. In summary. Summarily, on an IP RAN, IP replaces ATM as the transmission technique.
Page 14
Why IP RAN?
• Due to the growth of the mobile broadband service, the bandwidth of bearer networks are multiplied about 50 times, and the cost of backbone networks are multiplied about 10 times. In the mobile broadband era, data services have consumed more resources than ever, whereas the profit per bit decreases. Reducing the cost of backbone networks becomes a big challenge to carriers.
2002-2003
64-144 Kbps
2003-2004 2005-2006 2006-2007 2008-2010 2010-2012
64-384 Kbps384 K-5 Mbps
3-20 Mbps
10-50 Mbps
20-100 Mbps
Air Interface Technology
Service Bandwidth
Video Phone & Mobile
streaming
Multimedia Mobile
broadband Internet
3G(R99/R4)UL: 384 KbpsDL: 384 Kbps
3G+HSDPA(R5)UL: 384 KbpsDL: 14.4 Mbps
3G+HSxPA(R6/R7)UL: 5.76 MbpsDL: 14.4 Mbps
3G+E-HSPA(R8?)UL: 12.5 Mbps?DL: 25 Mbps?
LTEUL: 50 MbpsDL: 100 Mbps
Higher Quality Mobile
Experience
Page 15
Why IP RAN?
Sharing the rich access resources of IP datacom networks
– Being the mainstream of datacom networks, IP datacom networks are of large scales and provide a great variety of access modes.
– By introducing the IP RAN function, carriers can efficiently use the resources of IP networks and perform Iub-based networking.
Benefiting the low CapEx of IP transmission networks
Compared with the ATM transmission technology, IP transmission gains support from more equipment vendors because of its low CapEx.
Following the network evolution trend and protecting carriers' investment
IP transmission is the prevailing technology of datacom networks and is the direction for the further development of datacom networks. Introducing the IP RAN technology, you can follow the network evolution trend and protect your investment.
Page 16
IP RAN Typical Networking
FE
RNC
RNC
FE Fiber
TDM E1 E1
RNC
RNCGSM BTS
BSC
TDM PWE3
Adaptive clock recoveryor Synchronous Ethernet
Ethernet/IP/MPLS
TDM E1
NodeB
ADSLModem
DSLAM
FE
NodeB
FE Fiber
Copper
Page 17
Contents
• IP RAN Overview• Key Technologies of IP RAN
Page 18
Key Technologies of IP RAN
• PWE3• Clock• QoS• OAM
Page 19
PWE3
• Introduction to PWE3• TDM to PWE3• ATM to PWE3• Eth to PWE3• Applications of PWE3• PWE3 for PTN devices• PTN planning rules
Page 20
What is PWE3 ?• PWE3
Pseudo Wire Emulation Edge-to-Edge
PEPE
PE
CECE
CE
AC
PW1
PW2
PW3
Page 21
PWE3 Reference Model
PE1
CE1 Tunnel CE2
Emulated ServicePseudo
WirePSN Tunnel
PE2
Native
Service
Native
Service
Custom
Edge 1
Custom
Edge 2
Provider
Edge 2
Provider
Edge 1
AC AC
AC: Attachment Circuit
Page 22
PWE3
• Introduction to PWE3• TDM to PWE3• ATM to PWE3• ETH to PWE3• Applications of PWE3• PWE3 for PTN devices• PTN planning rules
Page 23
TDM PWE3 Reference Model
•SAToP•CESoPSN
Page 24
SAToP
• SAToP: is short for Structure Agnostic TDM over PSN
E1
E1 data flow being transmitted over a PSN
Payload
PTN
Ch1Ch31 … Ch0
Header E1 data
Header E1 data
Ch1Ch31 … Ch0
Page 25
Features of SAToP
The features of SAToP are as follows:
1. Does not need to protect the integrity of the structure, or explain or control the channels.
2. Applicable to PSNs of higher transmission performance.
3. Does not need to distinguish channels and disrupt TDM signaling.
Page 26
SAToP EncapsulationThree optional PW external tunnel encapsulation modes are listed in RFC 4553:
IP/UDP mode, L2TPv3 mode, and MPLS mode.
In IP/UDP and L2TPv3 modes, a SAToP PW can be carried on an IPv4/IPv6 PSN.
If the PSN is an MPLS network, the carrying mechanism in MPLS mode is adopted.
At present, TDM emulation on PTN devices supports the MPLS mode.
Page 27
CESoPSN Transmission Mode
• CESoPSN: is short for Circuit Emulation Services over PSN
E1
PTNCh1Ch31 … Ch0
Channels may come from any E1 stream
Payload (IP/UDP/RTP/PW)
Header … Ch21Ch31 Ch22 … Ch0Ch20 Ch1
Page 28
Features of CESoPSN
The features of CESoPSN are as follows:
1. When services are sent to PSN, TDM structure needs to be protected.
2. The transmission of sensible structure can be applied to PSN network with lower performance.
The mode can improve the reliability of the transmission.
Page 29
CESoPSN EncapsulationThree optional PW external tunnel encapsulation modes are available for CESoPSN:
IP/UDP mode, L2TPv3 mode, and MPLS mode.
Different from that of SAToP, the TDM data borne by PW through CESoPSN adopts a frame structure. Domain M is added to the PW control field in the PW packet to indicate the detection of AC-side signaling.
Huawei TDM transparent transmission devices support CESoPSN of the MPLS mode.
Page 30
Key Technologies of TDM PWE3Data Jitter Buffer
After traversing a PSN and reaching the egress PE, PW packets may have different arrival intervals or packet disorder may occur.
To reconstruct TDM service flows on the egress PE, you need to maintain the intervals of receiving PW packets through the jitter buffer technology and rearrange the sequence of distorted PW packets.
The jitter buffer of a larger capacity can accept a greater jitter in the transmission interval of packets on the network, but causes a longer delay in the reconstruction of TDM service flows. A jitter buffer can be configured by users under different delay and jitter conditions.
At present, the TDM circuit emulation boards of Huawei PTN devices allow you to set the jitter buffer capacity through commands.
Page 31
Key Technologies of TDM PWE3Analysis of data delay
Encapsulation Delay
Encapsulation delay occurs when TDM service flows are encapsulated into PW packets.
Service Processing Delay
Service processing delay refers to the delay when the device processes packets, including packet legality check, packet filtering, check and calculation, packet encapsulation, packet receiving, and packet sending. This delay is related to the service processing capacity of devices, and is therefore, remains unchanged.
Network Transmission Delay
Page 32
Key Technologies of TDM PWE3
• Clock recovery mode
Adaptive Clock Recovery (ACR)
External clock
• QoS processing
TDM services require low delay, low jitter, and fixed bandwidth, that is, high priority of QoS and forwarding. On a PTN, TDM services are forwarded with the priority of EF.
Page 33
PWE3
Introduction to PWE3 TDM to PWE3 ATM to PWE3 ETH to PWE3 Applications of PWE3 PWE3 for PTN devices PTN planning rules
Page 34
ATM PWE3 Encapsulation Format
No. PW Type Indication
3 0x0003 ATM transparent cell transport (V1R2)
9 0x0009 ATM n-to-one VCC cell transport
10 0x000A ATM n-to-one VPC cell transport
12 0x000C ATM one-to-one VCC Cell Mode
13 0x000D ATM one-to-one VPC Cell Mode
0 1 2 3
PSN Transport Header
Pseudo Wire Header
ATM Control Word
ATM Service Payload
The OptiX PTN supports the following encapsulation types:
Page 35
Encapsulation Mode
N-to-one ATM cell encapsulation mode
This mode is a standard-defined encapsulation mode and allows one or more ATM connections to be mapped to one PW.
In this mode, the CW is optional. Tunnel Label EXP S TTL
PW Label EXP S TTL0000 rsv Length Sequnce Number
ATM payload(48bytes)
FlagsVCIVPI PTI C
ATM payload(48bytes)
VCIVPI PTI C
Tunnel Label EXP S TTLPW Label EXP S TTL
0000 rsv Length Sequnce Number
ATM payload(48bytes)
FlagsVCIVPI PTI C
ATM payload(48bytes)
VCIVPI PTI C
Page 36
Encapsulation ModeOne-to-one ATM cell encapsulation mode
In this mode, one PW can bear one VPC/VCC.
One or more cells can be encapsulated to improve bandwidth usage.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
PSN Transport Header in PWE3
Pseudo Wire Header in PWE3
0 0 0 0 Resvd Sequence Number M V RES PTI C
Payload ( 48 octets )
M V RES PTI C
Payload ( 48 octets )
CV PTIRESM VCI
Payload ( 48 octets )
Payload ( 48 octets )
VCI
VCI
Sequence Number CPTIRESVMResvd0 0 0 0
Pseudo Wire Header in PWE3
PSN Transport Header in PWE3
10987654321098765432109876543210
3210
VCC VPC
Page 37
Key Technologies of ATM PWE3
• Analysis of data delay
Packet encapsulation delay, service processing delay, and network transmission delay
QoS processing mechanism
The ATM service transmission capability depends on the requirements for delay and jitter. Generally, the forwarding classes are as follows:
- CBR service flow: EF
- RT-VBR service flow: AF3
- NRT-VBR service flow: AF2
- UBR service flow: BE
Page 38
PWE3
Introduction to PWE3 TDM to PWE3 ATM to PWE3 ETH to PWE3 Applications of PWE3 PWE3 for PTN devices PTN planning rules
Page 39
Eth PWE3 Reference Model
Emulated Ethernet(including VLAN)
Service
Demultiplexer
PSNMPLS/IP
Physical
Emulated Ethernet (including VLAN)
Service
Demultiplexer
PSNMPLS/IP
Physical
Emulated Service
Pseudo Wire
PSN Tunnel
PSN
Page 40
Eth PWE3 Encapsulation Format
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
PSN Transport Header in PWE3
Pseudo Wire Header in PWE3
0 0 0 0 Reserved Sequence Number
ETH Payload
Page 41
PWE3 Introduction to PWE3 TDM to PWE3 ATM to PWE3 ETH to PWE3 Applications of PWE3 PWE3 for PTN devices PTN planning rules
Page 42
E1
CESoPSNSAToP
Abis
TDM
PWE3
MPLS
PPP/
ML-PPP
HDLC
POS/E1
PSN
Abis
TDM
E1
STM-1
Abis
TDM
E1/ch
STM-1
Abis
TDM
PWE3
Tunnel
Line Interface
Line InterfaceNetwork Interface
E1
E1
MAC
GE
TS# 1-9
Idle TS suppression
--
TS# 1-6
Idle TS suppression
TS# 1-8
Idle TS suppression
--
--
------
1+1/1:1 APS
E1/POS/GE/ch STM1
MSPPoC3 PoC1
--
----
idle timeslot regenerated
2G BTS
BSC
Bearing of Multi-services: TDM Solution
Page 43
E1
E1
E1
E1
lub UP
AAL2
ATM
PWE3
MPLS
---
Line Interface
Line InterfaceNetwork Interface
E1
E1
PoC3
lub UP
AAL2
ATM
IMA
E1
lub UP
AAL2
ATM
PWE3 N:1 ATM PWE3 Encapsulation
lub UP
AAL2
ATM
STM-1
PSN
STM-1
EF
AF3
BE
Legend
1+1/1:1 APS
Tunnel
PoC1
E1/POS/GE
3G Node B
RNC
3G Node B
Bearing of Multi-services: ATM/IMA Solution
IMA is short for Inverse Multiplexing for ATM. As shown in the above figure, the sender schedules and distributes a high speed ATM cell stream to multiple low speed physical links for transmission, and then the receiver schedules and recombines them into one cell stream and submits the cell stream to the ATM layer.
Page 44
lub UP
802.1Q
Eth
PWE3
MPLS
---
Line Interface
Line InterfaceNetwork Interfacelub UP
802.1Q
Eth
N:1 Eth PWE3 Encapsulation
PSN
EF
AF3
BE
Legend
1+1/1:1 APS
Tunnel
lub UP
802.1Q
Eth
PWE3
GE/FE
lub UP
802.1Q
Eth
GE
PoC3 PoC1
E1/POS/GE
3G Node B
RNC
Bearing of Multi-services: IP/Eth Traffic Solution
Page 45
PWE3 Introduction to PWE3 TDM to PWE3 ATM to PWE3 ETH to PWE3 Applications of PWE3 PWE3 for PTN devices PTN planning rules
Page 46
PTN’s Support to PWE3
• PWE3 supports all kinds of streams such TDM, ATM, and ETH
• MPLS and PWE3 provide a unified mobile backhaul network solution
• MPLS TE provides a service high QoS solution• MPLS and PWE3 provide carrier-class
protection
Page 47
PWE3 Signal: RSVP TE and LDP
• Using LDP to establish an end-to-end PW• RSVP TE for LSP signaling• Routing protocol that supports IS-IS
Page 48
PWE3
Introduction to PWE3 TDM to PWE3 ATM to PWE3 ETH to PWE3 Applications of PWE3 PWE3 for PTN devices PTN planning rules
Page 49
PWE3 planning rules To sense the structure of an E1 frame, you can select CESoPSN. Timeslots are not fully occupied;
therefore, you can compress timeslots to save link bandwidths.
If you do not need to sense the structure of an E1 frame, you can adopt transparent transmission to simulate TDM services of every type. In this case, you can select SAToP.
The PTN device provides three CES service clock synchronization schemes: CE synchronization, PE synchronization, and adaptive synchronization.
• The adaptive synchronization mode applies to an entire bearer network rather than a synchronization network. The PE connected to the CE recover and synchronizes clocks according to the simulation CES. There cannot be more than five intermediate nodes and the jitter must be lower than 1 ms.
• The PE synchronization mode: The entire bearing network is a synchronous network (or synchronization sources are introduced to PEs at both ends); the CE clock is synchronized to the PE clock.
• The CE synchronization mode: A synchronization source is introduced to the CE; the PE clock is synchronized to the CE clock.
• The PE synchronization mode is much common; the adaptive synchronization mode requires high network performance and is a complementary only.
• You can configure TPS protection on LPUs according to the service significance.
• The default forwarding class of services is EF; you need not set a bandwidth. Instead, the network elements work out and assure bandwidth automatically.
• You need to set the packet frame assembly time (1 ms recommended) and jitter buffer time (5 ms recommended) as required.
• At present, only the point-to-point service emulation type is supported. That is, services of only one E1 interface can be mapped to the PW.
Page 50
Key Technologies of IP RAN
• PWE3• Clock• QoS• OAM
Page 51
Clock
• Brief Introduction• TOP• Clock Synchronization at the Ethernet Physical Layer• IEEE 1588v2• Clock Planning
Page 52
Basic Concepts• What Is Clock Synchronization
– Clock synchronization: refers to a strict relationship between signals based on
a constant frequency offset or phase offset, in which signals are sent or
received at an average rate in an epoch. That is, the difference of phases
between signals is a constant value.
• Frequency synchronization
• Clock synchronization (phase synchronization)
• Why Clock Synchronization
– Frequency offset causes a clock slip.
– Clock offset causes base station switching.
Page 53
Implementing clock synchronization through a PSN
With the fast growth in data services, PSNs are widely applied. The PSN, however, was developed to transfer asynchronous data. If you want to transmit TDM, IPTV, and 3G services on PSNs, you have to considers the high synchronization requirements of these services. This leads to the integration of packet switching technologies and the conventional TDM system. It is required that PSNs should implement clock synchronization.
Page 54
Precision Requirements
The frequency variance between Clock 1 and Clock 2 must be less than 50 ppb; the clock variance between Clock 1 and Clock 2 must be less than 3 us.
Clock1
Clock2
Page 55
Clock
• Brief Introduction• TOP• Clock Synchronization at the Ethernet
Physical Layer• IEEE 1588v2• Clock Planning
Page 56
Timing Over Packet-switching network (TOP)
TOP is a clock recover technique in which local clock information in a certain encapsulation format is transmitted through a packet. The receiver can recover the clock from the received packet. In this manner, the clock is not affected during the transmission over a PSN.
The device that supports TOP can implement clock synchronization on an entire PSN and on a synchronous PSN connected to an asynchronous PSN.
Page 57
TOP Technologies
Recovering clock through the timing information in a packet
Timing packet
queue
Time
Stamp
Frequency recovery
TOP Client
PSN
Generating a packet
which carries timing
information
Page 58
TOP Technologies
TOP supports the following operation modes:
1. Adaptive
2. Differential
Page 59
Application of TOP
TOP Server
TOP Client TOP Client
Conventional PSNTOP Packets
TOP Packets
TOP allows you to synchronize the clocks on the devices at the two ends of a PSN.
Page 60
TOP Technology• Advantages
Supports PSN transparent transmission; the intermediate devices do not have to support TOP; can be applied flexibility.
Many chip vendors support TOP; Huawei has developed TOP technologies.
• Limitations
The clock recovery precision depends on the performance of the PSN. The clock is likely to be affected by network delay, packet loss, and disordering. High QoS has to be ensured.
No standard for TOP has ever been published. Device compatibility is limited.
In addition, clock synchronization is not supported.
Page 61
Clock
• Brief Introduction• TOP• Clock Synchronization at the Ethernet
Physical Layer• IEEE 1588v2• Clock Planning
Page 62
Synchronization at the Ethernet Physical Layer
• It is another technique to implement synchronization on a PSN. This
technique transforms existing asynchronous networks and synchronizes
every node on a PSN.
• Unlike TOP, this technique adopts an SDH-like mode and uses the
feature of the physical layer of an Ethernet. In addition, this technique
recovers clocks from serial data flows, thus synchronizing clocks to the
upstream device. This technique is unrelated to upper layer services.
• This technique adopts clock quality classification information that is
similar to SDH. Instead of being transmitted over the packet cost, this
technique uses a special type of packet to transmit the Synchronous
Status Message (SSM).
Page 63
Synchronization at the Ethernet Physical Layer
PHY
PHY
PHY
Clock Board
Obtaining clock signals
System clock
The Ethernet physical layer is capable of recovering clock from serial flows and extracting the source clock.
Page 64
Synchronization at the Ethernet Physical Layer (Synchronization on the Entire
PSN)
Implementing synchronization on the entire PSN
PRC
PSN
SSM
Page 65
Synchronization at the Ethernet Physical Layer
Advantages• The clock synchronization quality is close to SDH. • Unaffected by the PSN.• The system clock architecture is similar to SDH. The
technique is mature.
Limitations
• Needs to be deployed on the entire network.
• Not all Ethernet interfaces allow clock recovery.
• In addition, clock synchronization is not supported.
Page 66
Clock
• Brief Introduction• TOP• Clock Synchronization at the Ethernet Physical Layer• IEEE 1588v2• Clock Planning
Page 67
IEEE 1588v2Why IEEE 1588v2
The techniques of clock synchronization at the Ethernet Physical Layer and TOP can implement only frequency synchronization instead of clock synchronization.
What is IEEE 1588v2
IEEE 1588 is a precision clock synchronization standard for the network measuring and control system. IEEE 1588 is based on Precision Time Protocol (PTP) and can achieve a clock precision of milliseconds. This standard aims to unify dependently running clocks in the measurement and control system.
Page 68
IEEE 1588v2
The key points of IEEE 1588 are as follows:
• Best master clock (BMC) algorithm
• Master/slave synchronization principle
• Transparent clock (TC) model
Page 69
IEEE 1588v2
Three models are defined in the network architecture of the IEEE 1588:
• Original Clock (OC)
• Boundary Clock (BC)
• Transparent Clock (TC)
Page 70
Principle of IEEE1588v2
Adopting the handshake mode and using precise timestamps to achieve time synchronization
Page 71
IEEE1588v2 (simultaneous synchronization of frequency and clock)
Implementing simultaneous synchronization of frequency and clock between NodeBs and RNCs
1588 Master 1588 Slave
TCTC TC
TC
PSNRNC
Page 72
IEEE 1588v2• Advantages
– Can implementing clock synchronization– The clock synchronization quality is high, and the effect of
PSNs is limited.– A standard has been released to support this technology.
Devices of various vendors can interwork with one another.
• Limitations
- All the devices along clock links need to support IEEE 1588.
- The protocol has been finalized. This technique has not been commercially used.
Page 73
TOP Based on IEEE 1588v2• IEEE 1588 is developed based on entire
network synchronization. The master and slave clocks implement synchronization by means of handshaking.
• Using the packets defined in IEEE 1588 and synchronization process, you can implement clock frequency synchronization on an asynchronous PSN.
• It is a means to implement TOP.• The clock recovery precision depends on the
performance of the PSN. The clock is likely to be affected by network delay, packet loss, and disordering. High QoS has to be ensured.
Page 74
Comparison of the Three TechniquesTechnique Advantages Disadvantage Usage scenarios
Ethernet Synchronization
Easy to implement. The impact of PSNs is slight. The quality of clock synchronization is close to SDH. The architecture is similarly to that of SDH. The technique is mature.
Every node on the network needs to support synchronization Ethernet to achieve clock synchronization on the entire network. The number of PHYs that allow clock extraction is limited.
PSN frequency synchronization
TOP
Can transmit clocks transparently across networks. Not all the nodes on the network need to support processing of TOP packets. The application is flexible.
Likely to be affected by the PSNs; to be standardized; devices of various vendors could hardly interwork with one another.
Inter-network synchronization and service clock transparent transmission on PSNs
IEEE1588 V2
The clock frequency can be recovered accurately. A standard is published to approve this technique. Devices of various vendors could interwork with one another with ease.
There is little impact from the PSN. Each node on the network needs to support IEEE 1588.
Use this technique to synchronize clock on the PSN.
Page 75
Clock
• Brief Introduction• TOP• Clock Synchronization at the Ethernet Physical Layer• IEEE 1588v2• Clock Planning
Page 76
Clock Planning Rules The clock for the backbone and aggregation layer of a network must be well protected. In
addition, the clock needs to work in master/slave mode. Generally, at the access layer, only one clock source needs to be set at the central station. The other stations track the clock of the central station. The clock of the central node or at a high-reliability station provides clock sources. If a BITS or a high-precision external clock is available, it is recommended that a network element adopts the external clock. If no BITS or high-precision external clock is available, it is recommended that a network element adopts the line clock. The internal clock acts as a clock of the lowest tracking level. Plan the clock synchronization network properly. Avoid clock inter-locking and clock loops. Line clock tracing needs to follow the rule of the shortest path. For a ring network composed of less than six network elements, you can trace clock source from one direction. For a ring network composed of at least six network elements, the shortest path needs to be tracked. That is, if a network is composed of N network elements, N/2 network elements should track the benchmark clock from one direction; the rest of network elements track the benchmark clock from another direction. For a long link of clocks, clock compensation must be offered. There are at most 10 slave G.812 clocks along a transmission link. There are at most 20 units of G.813 clocks between two slave G.812 clocks. There are at most 20 units of G.813 clocks between G.812 and G.811 clocks. There are at most 60 G.813 clocks. If SSM is not set, do not set clocks to a ring on an network element. The attenuation of received SSM information must be within a certain range. Otherwise, SSM information fails to be received. A site needs to obtain clocks from STM-N rather than branch signals.
Page 77
OptiX PTN Clock ProtectionIf SSM is disabled, the choosing and switchover of clock sources are based on the priority table. In this case, do not add the two clocks of both directions of a network element to the priority table. Otherwise, a lock ring is formed.
When standard SSM is enabled, the priority table needs to be set. This is to ensure that the OptiX PTN automatically selects the clock source with the best quality and priority and no clock ring is generated.
When extended SSM is enabled, bits 5 to 8 of the S1 byte indicate the clock source quality; bits 1 to 4 of the S1 byte indicate the clock source ID. This aims to prevent clock loops. When setting the clock ID, obey the below rules:
- Every BITS needs to be assigned an ID.
- The internal clock source of every node connected to a BITS needs to assigned a clock ID.
- If a node enters a ring network from a link or another link network, its internal clock source needs to be assigned an ID.
- If a node enters a ring network from a link or another link network, its line clock source needs to be assigned an ID, if the clock tracking level is a line clock source.
Page 78
Clock configuration for a link network
If SSM is enabled, clock inter-locking does not occur on a link network. If a link network includes more than 20 nodes, the BITS clock needs to be introduced for compensation.
Page 79
Clock Configuration for a Tangent Ring
For a tangent ring, you can configure BITS on the tangent point as the benchmark clock for the network.
Page 80
Clock Configuration for a Tangent Ring
• For a intersectant ring, you can configure master BITS on one intersectant point as the benchmark clock for the network; configure slave BITS on another intersectant point for switchover.
Page 81
Key Technologies of IP RAN
• PWE3• Clock• QoS• OAM
Page 82
Key Technologies and Planning Rules of QoSClassification and marking technique: DSCP, IP precedence, and NBAR
When simple flow classification is performed for the access services of the V-UNI user side, you are recommended not to set the traffic forwarding class to a level higher than EF. CS7 and CS7 are reserved for internal protocol packets of the device and network control packets only.
When accessing the CES service, by default, the device offers QoS of the EF level for it.
When accessing the ATM service, you are recommended to adopt the default service class in the default template 1. That is, the forwarding class of the CBR service is EF; the forwarding class of the rt -VBR service is AF3; the forwarding class of the nrt -VBR service is AF2; the forwarding class of the UBR service is BE.
For the PTN devices on the border nodes in the DS domain, the recommenced mapping for PHB is as follows: For the service flows from non-DS domains, you are recommended to use complex traffic classification for PHB mapping on the V-UNI. For the service flows from other domains, you are recommended to use simple traffic classification for PHB mapping on the V-UNI.
On the intermediate nodes of the DS domain, perform forwarding based on PHB and performs QoS configuration. The nodes in a DS domain need to use the same simple classification rule.
For user services without configured bandwidth, you need to set the forwarding class to BE, and the discarding priority is not limited (green by default).
Congestion avoidance mechanism: policy and shaping
For V-UNI, you are recommenced to set the CAR to limit the access services.
When the rate of service flows of the same user or CQ queues on interfaces, the maximum rate variance must be within 100 times.
Page 83
Key Technologies and Planning Rules of QoSCongestion avoidance mechanisms: FIFO, PQ, and WFQ
- When planning interface bandwidth, 10% of the bandwidth needs to be reserved for protocol packets. This is to ensure that the control layer and management layer can work efficiently.
- It is recommended that the traffic volume of high-priority services (for example, service flows of the EF class) over a PW should not exceed 25% of the PW bandwidth. This is to ensure that low-priority services can pass through the PW.
- The tunnel bandwidth must be specified. In addition, the total bandwidth of the TE tunnels over an interface cannot exceed the max. physical bandwidth of the interface.
- Bandwidth allocation for the V-UNIs in a V-UNI group must meet the following rules:
The sum of CIRs of all V-UNIs cannot exceed the CIR of the V-UNI Group.
The PIR of any V-UNI cannot exceed the PIR of the V-UNI Group.
Bandwidth allocation for the PWs of a TE-Tunnel must meet the following rules:
- The sum of CIRs of all PWs cannot exceed the rate of the TE tunnel.
- The PIR of a PW cannot exceed the rate of the TE tunnel.
Congestion avoidance mechanisms: RED and WRED
You are recommended to adopt WRED rather than dropping at the queue tail as the congestion avoidance measure for V-UNI, PW, QinQ, and CQ (port queue). DO not change the default WRED threshold.
Page 84
Key Technologies of IP RAN
• PWE3• Clock• QoS• OAM
Page 85
OAM
• MPLS OAM• Ethernet interface OAM• Ethernet service OAM• ATM OAM
Page 86
Functions of MPLS OAM
The main function of MPLS OAM is to manage and maintain MPLS LSPs and involves the
following operations:
- Connectivity Verification (CV) and Fast Failure Detection (FDD): for proactive connectivity
verification
- Forward Defect Indication (FDI) and Backward Defect Indication (BDI): for forward and
backward defect indication
- LSP ping: for on-demand detection of MPLS LSP connectivity
- LSP TraceRoute: for on-demand tracing of MPLS LSPS and fault location
- PM and LSP detection: detection of delay, jitter, and packet loss rate
OAM packets can detect the connectivity of service channels. Different sites
communicate with each other through APS packets and perform switchover.
The switchover time reaches the carrier class of less than 50 ms.
Page 87
Ethernet interface OAM can automatically detect the connectivity and performance of the physical links below the MAC layer. Ethernet interface OAM performs maintenance based on interfaces. It is mainly applied in a scenario where Ethernet physical interfaces are directly connected. Ethernet interface OAM does not perform end-to-end detection across network elements.
Ethernet interface OAM
Page 88
Functions of Ethernet service OAM
The major function of Ethernet Service OAM is to manage and maintain end-to-
end Ethernet virtual links. Ethernet Service OAM involves the following operations:
(1) Fault Management
Continuity Check (CC): for end-to-end proactive continuity check
Loopback (LB): for on-demand connectivity check
Link Trace (LT): for on-demand Ethernet link tracing and fault location
Ethernet remote defect indication (RDI): for indication of remote defects
(2) Performance Monitoring
Performance Monitoring (PM): for detecting the performance such as packet loss ratio, delay, jitter, and throughput of point-to-point Ethernet virtual links.
OAM packets are distinguished by Ethernet Type and passes the same path with service packets.
Page 89
ATM OAM Overview
ATM OAM can monitor the operation of ATM links and verifies the connectivity of services without interrupting services. When a link fails, you can locate the fault.
ATM OAM can provide certain information about the network by adding OAM cells with a standard cell structure to user cell flows.
ATM OAM can provide end-to-end OAM for services and can detect the quality of ATM links that cross multiple cells.
Page 90
Terms
• BITS - Building Integrated Timing Supply System
• BSC - Base Station Controller
• BTS - base transceiver station
• CS - Circuit Switched
• IMA - Inverse Multiplexing on ATM
• Iub - an interface between an RNC and a NodeB
• NodeB - 3G BTS
• PS - Packet Switched
• PTN - Packet Transport Network
• RAN - Radio Access Network
• RNC - Radio Network Controller
• SSM - Synchronization Status Message
• TDM - Time Division Multiplex(ing)
Page 91
Thank you.www.huawei.com