No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

NE40E V800R010C00 Configuration Guide - Virtual Access 01

Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Overview of IP RAN Virtual Cluster Access

Overview of IP RAN Virtual Cluster Access

This section describes the background, basic concepts, and implementation of IP radio access network (RAN) virtual cluster access.

NOTE:

NE40E devices can only function as Masters for virtual cluster access deployment. NE40E devices cannot function as access points (APs) for virtual cluster access deployment.

Background

Traditional IP RAN solutions have been developed to maximize carriers' return on investment, reduce network construction costs, and efficiently evolve existing networks into Long Term Evolution (LTE) networks.

However, these IP RAN solutions have disadvantages, as described in Table 2-1.
Table 2-1  Traditional IP RAN solutions and their disadvantages

Solution Type

Disadvantage

Layer 3 solution

  • High-performance access devices must be deployed and must run dynamic signaling protocols, such as the Border Gateway Protocol (BGP), Resource Reservation Protocol (RSVP), and Label Distribution Protocol (LDP). These protocols generate a large number of packets, which consume large amounts of network bandwidth and system process resources.
  • Layer 3 technologies are complex and therefore require highly skilled operation and maintenance (O&M) personnel.

Layer 2 solution

  • Data planning is complex, and a large number of features need to be deployed.
  • Configurations are complex, and a large number of configuration procedures are required.
  • A great deal of manpower is required for routine maintenance, and O&M costs are high.
Fortunately, IP RAN virtual cluster access overcomes the disadvantages of traditional IP RAN solutions. As shown in Figure 2-1, virtual cluster access is deployed on the access ring. The primary and secondary access aggregation gateways (AGGs) perform centralized path calculations, service provisioning, and traffic control for the cell site gateways (CSGs). Virtual cluster access simplifies network deployment and O&M.
Figure 2-1  Virtual cluster access deployment position

Related Concepts

Virtual cluster access: a promising technology for simplifying network operation and maintenance (O&M) and management and for reducing device loads. After virtual cluster access is deployed, the control layers of all network devices are centralized on a single device. This device performs centralized path calculations, service provisioning, and traffic control for all other devices on the network.

Master: a server that performs centralized path calculations, service provisioning, and traffic control for access points (APs). The AGGs shown in Figure 2-1 are masters. Masters are classified as primary or secondary masters.

AP: a client that is connected to base stations. The CSGs shown in Figure 2-1 are APs.

To enhance network reliability, deploy the primary and secondary masters. As shown in Figure 2-2, AP1 belongs to two masters that work in primary/secondary mode.

Figure 2-2  Primary and secondary control planes

Different APs can belong to different primary and secondary masters. For example, AP1 can belong to primary master A and secondary master B, and AP2 can belong to primary master B and secondary master A.

If the primary master becomes faulty, its traffic switches to the secondary master. The secondary master automatically becomes the new primary master for path calculations. If the original primary master recovers, traffic switches back to the original. However, the control layer remains located on the new primary master.

Implementation

Figure 2-3 shows the process for implementing virtual cluster access. All APs flood their own node and topology information to the entire network. The same topology database is established on the APs and masters. The primary master uses the topology database to calculate the forwarding paths between each AP and the primary master and between each AP and the secondary master. Then the primary master advertises the calculation results to the secondary master. Based on these calculation results, the primary and secondary masters generate virtual path (VP) and virtual circuit (VC) forwarding entries and deliver them to the APs to establish VPs and VCs.

Figure 2-3  Process for implementing virtual cluster access
As shown in Figure 2-3, implementing virtual cluster access involves five procedures. Table 2-2 describes the details of each procedure.
Table 2-2  Procedures for implementing virtual cluster access

No.

Procedure

Device Type

AP

Primary Master

Secondary Master

1

AP registration

Each AP registers with the primary and secondary masters and reports its own label space and interface information.

The primary master allocates an AP ID to the AP. Generally, the AP ID is the IP address of the AP.

The secondary master allocates an AP ID to the AP. Generally, the AP ID is the IP address of the AP.

2

Topology information collection

The AP runs Intermediate System to Intermediate System (IS-IS), collects topology information, and floods the collected information to the entire network.

The primary master runs IS-IS, collects topology information, and floods the collected information to the entire network.

The secondary master runs IS-IS, collects topology information, and floods the collected information to the entire network.

3

Path calculation

-

The primary master calculates the forwarding paths between the AP and primary master and between the AP and secondary master and advertises the calculation results to the secondary master.

The secondary master receives the calculation results from the primary master.

4

Tunnel establishment

The AP receives forwarding information such as labels from the primary and secondary masters and generates a local forwarding table.

The primary master allocates labels for interworking with the AP and delivers tunnel forwarding entries to the AP.

The secondary master allocates labels for interworking with the AP and delivers tunnel forwarding entries to the AP.

5

VC establishment

The AP receives VC and VC label information from the primary and secondary masters.

The primary master delivers VC entries to establish a VC to the AP.

The secondary master delivers VC entries to establish a VC to the AP.

Download
Updated: 2018-07-12

Document ID: EDOC1100028541

Views: 7316

Downloads: 92

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next