/
Use Case of I2RS in Mobile Backhaul Network Use Case of I2RS in Mobile Backhaul Network

Use Case of I2RS in Mobile Backhaul Network - PowerPoint Presentation

megan
megan . @megan
Follow
66 views
Uploaded On 2023-07-08

Use Case of I2RS in Mobile Backhaul Network - PPT Presentation

draftzhangi2rsmbbusecase00 Li Zhang Zhenbin Li Huawei Technologies Dapeng Liu China Mobile IETF 88 Vancouver BC Canada Service Requirements for MBB Configuration E2E PWE3 ID: 1006819

lsp network route requirements network lsp requirements route protection tools tunnel i2rs policy mbb monitoring service vpn path information

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Use Case of I2RS in Mobile Backhaul Netw..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

1. Use Case of I2RS in Mobile Backhaul Network draft-zhang-i2rs-mbb-usecase-00Li Zhang, Zhenbin Li (Huawei Technologies)Dapeng Liu (China Mobile)IETF 88, Vancouver,BC, Canada

2. Service Requirements for MBB ConfigurationE2E PWE32G TDM PW3G ATM PW3G ETH VRFLTE VRF S1LTE VRF X2TDM/ATM ApplicationEthernet ApplicationMultiple Applications across 2G to LTE, various network architectures, different service carriers make MBB configuration more arduous Traditional configuration and diagnoses mechanisms base on device-level management tools and manual processing are ill-suited to meet the requirements of today‘s scalable, flexible, and complex mobile backhaul network.ATM RNCLast MileAccessAggregationRNC/SGW/MMERSGRSGCSGBTSNodeB / eNBE1Eth.IP RNC/S-GW/MMEATNATNATNPEPENodeBATMBSCSTM-1STM-1GEAGGAGGPCSGCSGATNCSGATNCSGMulti-segment PWE3Seamless MPLSMPLS LDPMPLS TERoute PolicyE2E L3VPNHVPNNetwork MonitoringProtection mechanismMPLS TP

3. Usecase1: Application configurationChallengesvarious radio access modes: TDM/ATM-based and IP-based across 2G to 5Gvarious radio applications: OM, voice, data, video with different SLAsvarious network architectures: multiple IGP areas and ASFlexible Configurationwhere the T-LDP should be configured, where the BGP peer should be established, where the VPN instance should be deployed, and where the BGP LSP should be set upI2RS RequirementsStore a global mobile backhaul network solution provisioning information in a central locationDistribute MBB configuration from the central location automatically

4. Usecase2: Route Policy EnforcementRoute policy focus on:Avoiding route advertisement across entire networksupporting best route selection for VPN FRR or ECMPallowing On-demand route advertisementDynamic enforcementDifferent network devices has individual route policy details in a network-wide route policyI2RS requirements:Use common APIs to collect network information dynamicallyPush route policy centralized and automatically

5. Usecase3: Service Tunnel ImplementationService tunnel types:MPLS LDP LSP: DU, DoD, Longest length match, policy for LSP controlMPLS-TE LSP: multiple path control attributes and multiple protection modesMPLS-TP LSP: multiple LSP types, static LSP is need in MBBHierarchical deploymentservice tunnel implementation is not constant and unique across access/aggregate/core network in MBBkinds of LSPs could be used separately or simultaneously in the whole MBB I2RS requirements:Acquire the ability of network devices automaticallyGet the requirements of services on control plane to calculate and set up the LSP centrally.

6. Usecase4: Protection MechanismHierarchical Protection Mechanism :tunnel protection : LDP FRR (LFA, Remote-LFA, MRT, e.g.), MPLS-TE LSP HSB and TE FRR, MPLS-TP LSP Line or ring protectionservice protection : dual-homing attachment is suitable with PW Redundancy and VPN FRR or VPN ECMP Flexible designSelection of service and tunnel, as well as the protection mode I2RS requirements:Get the whole information about tunnel and serviceControl and manage protection design centrally

7. Usecase5: Network MonitoringMultiple monitoring tools:Tools: Different monitoring tools for different monitoring objects, such as NQA, MPLS-TP OAM, IPFPMTraffic path: get exact traffic path is useful for point-to-point detectionAccurate deploymentDeploy appropriate monitoring tools and accurate detection I2RS requirements:Get and store the entire topology and routing information centralizedCalculate and store the traffic path naturally Deploy accurate network monitoring tools automatically

8. Next StepsSolicit comments and feedbackRevise the draft