Академический Документы
Профессиональный Документы
Культура Документы
Issue Draft A
Date 2014-01-20
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Contents
2 Engineering Guidelines...............................................................................................................3
2.1 WRFD-050402 IP Transmission Introduction on Iub Interface.....................................................................................3
2.1.1 When to Use................................................................................................................................................................3
2.1.2 Required Information..................................................................................................................................................3
2.1.3 Planning.......................................................................................................................................................................3
2.1.3.1 Network Planning.....................................................................................................................................................3
2.1.3.2 Hardware Planning...................................................................................................................................................4
2.1.4 Deployment.................................................................................................................................................................4
2.1.4.1 Process......................................................................................................................................................................4
2.1.4.2 Requirements............................................................................................................................................................5
2.1.4.3 Data Preparation.......................................................................................................................................................6
2.1.4.4 Activation.................................................................................................................................................................6
2.1.4.5 Activation Observation.............................................................................................................................................7
2.1.4.6 Deactivation..............................................................................................................................................................8
2.1.4.7 Reconfiguration........................................................................................................................................................8
2.1.5 Performance Monitoring..............................................................................................................................................9
2.1.6 Parameter Optimization...............................................................................................................................................9
2.1.7 Troubleshooting...........................................................................................................................................................9
2.2 WRFD-050409 IP Transmission Introduction on Iu Interface.....................................................................................10
2.2.1 When to Use..............................................................................................................................................................10
2.2.2 Required Information................................................................................................................................................10
2.2.3 Planning.....................................................................................................................................................................11
2.2.3.1 Network Planning...................................................................................................................................................11
2.2.3.2 Hardware Planning.................................................................................................................................................11
2.2.4 Deployment...............................................................................................................................................................11
2.2.4.1 Process....................................................................................................................................................................11
2.2.4.2 Requirements..........................................................................................................................................................12
2.2.4.3 Data Preparation.....................................................................................................................................................13
2.2.4.4 Activation...............................................................................................................................................................13
2.2.4.5 Activation Observation...........................................................................................................................................14
2.2.4.6 Deactivation............................................................................................................................................................14
2.2.4.7 Reconfiguration......................................................................................................................................................14
2.2.5 Performance Monitoring............................................................................................................................................14
2.2.6 Parameter Optimization.............................................................................................................................................14
2.2.7 Troubleshooting.........................................................................................................................................................14
2.3 WRFD-050410 IP Transmission Introduction on Iur Interface....................................................................................14
2.3.1 When to Use..............................................................................................................................................................14
2.3.2 Required Information................................................................................................................................................15
2.3.3 Planning.....................................................................................................................................................................15
2.3.3.1 Network Planning...................................................................................................................................................15
2.3.3.2 Hardware Planning.................................................................................................................................................15
2.3.4 Deployment...............................................................................................................................................................15
2.3.4.1 Process....................................................................................................................................................................15
2.3.4.2 Requirements..........................................................................................................................................................16
2.3.4.3 Data Preparation.....................................................................................................................................................17
2.3.4.4 Activation...............................................................................................................................................................17
2.3.4.5 Activation Observation...........................................................................................................................................17
2.3.4.6 Deactivation............................................................................................................................................................18
2.3.4.7 Reconfiguration......................................................................................................................................................18
2.3.5 Performance Monitoring............................................................................................................................................18
2.3.6 Parameter Optimization.............................................................................................................................................18
2.3.7 Troubleshooting.........................................................................................................................................................18
3.1.5 Troubleshooting.........................................................................................................................................................21
3.2 Ethernet Route Backup for the Base Station Controller...............................................................................................21
3.2.1 When to Use Ethernet Route Backup for the Base Station Controller......................................................................22
3.2.2 Planning.....................................................................................................................................................................22
3.2.2.1 Network Planning...................................................................................................................................................22
3.2.2.2 Hardware Planning.................................................................................................................................................22
3.2.3 Deployment...............................................................................................................................................................22
3.2.3.1 Requirements..........................................................................................................................................................22
3.2.3.2 Data Preparation.....................................................................................................................................................22
3.2.3.3 Activation...............................................................................................................................................................23
3.2.3.3.1 Using MML Commands......................................................................................................................................23
3.2.3.3.2 MML Command Examples.................................................................................................................................23
3.2.3.3.3 Using the CME....................................................................................................................................................24
3.2.3.4 Activation Observation...........................................................................................................................................24
3.2.3.5 Deactivation............................................................................................................................................................25
3.2.3.5.1 Using MML Commands......................................................................................................................................25
3.2.3.5.2 MML Command Examples.................................................................................................................................25
3.2.3.6 Reconfiguration......................................................................................................................................................25
3.2.4 Performance Monitoring............................................................................................................................................25
3.2.5 Troubleshooting.........................................................................................................................................................26
3.3 Ethernet Route Backup for the Base Station................................................................................................................26
3.3.1 When to Use Ethernet Route Backup for the Base Station.......................................................................................26
3.3.2 Planning.....................................................................................................................................................................26
3.3.2.1 Network Planning...................................................................................................................................................26
3.3.2.2 Hardware Planning.................................................................................................................................................26
3.3.3 Deployment...............................................................................................................................................................26
3.3.3.1 Requirements..........................................................................................................................................................26
3.3.3.2 Data Preparation.....................................................................................................................................................27
3.3.3.3 Activation...............................................................................................................................................................27
3.3.3.3.1 Using MML Commands......................................................................................................................................27
3.3.3.3.2 MML Command Examples.................................................................................................................................28
3.3.3.3.3 Using the CME....................................................................................................................................................29
3.3.3.4 Activation Observation...........................................................................................................................................29
3.3.3.5 Deactivation............................................................................................................................................................30
3.3.3.5.1 Using MML Commands......................................................................................................................................30
3.3.3.5.2 MML Command Examples.................................................................................................................................30
3.3.3.6 Reconfiguration......................................................................................................................................................30
3.3.4 Performance Monitoring............................................................................................................................................30
3.3.5 Troubleshooting.........................................................................................................................................................31
3.4 Link Aggregation in Scenario 1....................................................................................................................................31
3.4.1 When to Use Link Aggregation in Scenario 1...........................................................................................................31
3.4.2 Planning.....................................................................................................................................................................31
3.4.2.1 Network Planning...................................................................................................................................................31
3.4.2.2 Hardware Planning.................................................................................................................................................31
3.4.3 Deployment...............................................................................................................................................................31
3.4.3.1 Requirements..........................................................................................................................................................31
3.4.3.2 Data Preparation.....................................................................................................................................................32
3.4.3.3 Activation...............................................................................................................................................................32
3.4.3.3.1 Using MML Commands......................................................................................................................................32
3.4.3.3.2 MML Command Examples.................................................................................................................................33
3.4.3.3.3 Using the CME....................................................................................................................................................33
3.4.3.4 Activation Observation...........................................................................................................................................34
3.4.3.5 Deactivation............................................................................................................................................................34
3.4.3.5.1 Using MML Commands......................................................................................................................................34
3.4.3.5.2 MML Command Examples.................................................................................................................................34
3.4.3.6 Reconfiguration......................................................................................................................................................34
3.4.4 Performance Monitoring............................................................................................................................................34
3.4.5 Troubleshooting.........................................................................................................................................................34
3.5 Link Aggregation in Scenario 2....................................................................................................................................35
3.5.1 When to Use Link Aggregation in Scenario 2...........................................................................................................35
3.5.2 Planning.....................................................................................................................................................................35
3.5.2.1 Network Planning...................................................................................................................................................35
3.5.2.2 Hardware Planning.................................................................................................................................................35
3.5.3 Deployment...............................................................................................................................................................35
3.5.3.1 Requirements..........................................................................................................................................................35
3.5.3.2 Data Preparation.....................................................................................................................................................35
3.5.3.3 Activation...............................................................................................................................................................36
3.5.3.3.1 Using MML Commands......................................................................................................................................36
3.5.3.3.2 MML Command Examples.................................................................................................................................36
3.5.3.3.3 Using the CME....................................................................................................................................................37
3.5.3.4 Activation Observation...........................................................................................................................................37
3.5.3.5 Deactivation............................................................................................................................................................38
3.5.3.5.1 Using MML Commands......................................................................................................................................38
3.5.3.5.2 MML Command Examples.................................................................................................................................38
3.5.3.6 Reconfiguration......................................................................................................................................................38
3.5.4 Performance Monitoring............................................................................................................................................38
3.5.5 Troubleshooting.........................................................................................................................................................38
3.6 Link Aggregation in Scenario 3....................................................................................................................................38
3.6.1 When to Use Link Aggregation in Scenario 3...........................................................................................................38
3.6.2 Planning.....................................................................................................................................................................39
3.6.2.1 Network Planning...................................................................................................................................................39
3.6.2.2 Hardware Planning.................................................................................................................................................39
3.6.3 Deployment...............................................................................................................................................................39
3.6.3.1 Requirements..........................................................................................................................................................39
3.6.3.2 Data Preparation.....................................................................................................................................................39
3.6.3.3 Activation...............................................................................................................................................................39
3.6.3.3.1 Using MML Commands......................................................................................................................................39
3.6.3.3.2 MML Command Examples.................................................................................................................................40
3.6.3.3.3 Using the CME....................................................................................................................................................40
3.6.3.4 Activation Observation...........................................................................................................................................40
3.6.3.5 Deactivation............................................................................................................................................................41
3.6.3.5.1 Using MML Commands......................................................................................................................................41
3.6.3.5.2 MML Command Examples.................................................................................................................................41
3.6.3.6 Reconfiguration......................................................................................................................................................41
3.6.4 Performance Monitoring............................................................................................................................................41
3.6.5 Troubleshooting.........................................................................................................................................................41
3.7 OM Channel Backup....................................................................................................................................................41
3.7.1 When to Use OM Channel Backup...........................................................................................................................41
3.7.2 Planning.....................................................................................................................................................................42
3.7.2.1 Network Planning...................................................................................................................................................42
3.7.2.2 Hardware Planning.................................................................................................................................................42
3.7.3 Deployment...............................................................................................................................................................42
3.7.3.1 Requirements..........................................................................................................................................................42
3.7.3.2 Data Preparation.....................................................................................................................................................42
3.7.3.3 Activation...............................................................................................................................................................43
3.7.3.3.1 Using MML Commands......................................................................................................................................43
3.7.3.3.2 MML Command Examples.................................................................................................................................44
3.7.3.3.3 Using the CME....................................................................................................................................................45
3.7.3.4 Activation Observation...........................................................................................................................................45
3.7.3.5 Deactivation............................................................................................................................................................46
3.7.3.5.1 Using MML Commands......................................................................................................................................46
3.7.3.5.2 MML Command Examples.................................................................................................................................46
3.7.3.6 Reconfiguration......................................................................................................................................................46
3.7.4 Performance Monitoring............................................................................................................................................46
3.7.5 Troubleshooting.........................................................................................................................................................46
5 Parameters.....................................................................................................................................65
6 Counters........................................................................................................................................66
7 Glossary.........................................................................................................................................67
8 Reference Documents.................................................................................................................68
1.1 Scope
This document describes the engineering guidelines for interfaces, transmission reliability, and
maintenance and detection in IP transmission mode.
For details about the working principles of the IP Transmission feature, see SingleRAN IP
Transmission Feature Parameter Description.
l Feature change
Changes in features of a specific product version
l Editorial change
Changes in wording or addition of information that was not described in the earlier version
Draft A (2014-01-20)
This document is created for RAN16.0.
Contents of the document are moved from IP RAN Feature Parameter Description.
2 Engineering Guidelines
The Iub interface supports the configuration of IP paths or transmission resource pools. This
document provides the engineering guidelines with the configuration of IP paths. For details
about the engineering guidelines with the configuration of transmission resource pools, see
Transmission Resource Pool in RNC Feature Parameter Description. The BSC6910 supports
only the transmission resource pool networking mode.
2.1.3 Planning
2.1.4 Deployment
2.1.4.1 Process
Figure 2-1 shows the procedure for deploying IP Transmission Introduction on Iub Interface on
the RNC side.
Figure 2-2 shows the procedure for deploying IP Transmission Introduction on Iub Interface on
the NodeB side.
2.1.4.2 Requirements
l Bearer network QoS
NOTE
l The Maximum Value column indicates the basic commercial requirement for deploying radio services.
l The Target Value column lists the requirement for the transport network when customers require high
KPIs on the radio network. For example, the maximum throughput for HSPA+ users is required to be
84 Mbit/s.
l These QoS requirements are not applicable to satellite bearers.
l License
The license for the IP Transmission Introduction on Iub Interface feature has been activated.
For details on how to activate the license, see License Management Feature Parameter
Description.
For data preparation on the NodeB side, see section "Preparing Transport Data for a NodeB"
in 3900 Series Base Station Initial Configuration Guide.
For data preparation on the BTS3902E&BTS3803E side, see section "Preparing Data" in
BTS3902E&BTS3803E WCDMA Initial Configuration Guide.
2.1.4.4 Activation
l For details about activation using MML commands on the RNC side, follow the path below
from the navigation tree of BSC6900 UMTS Initial Configuration Guide (MML-Based)
> Configuring the Interfaces > Configuring the Iub Interface (over IP). For details
about activation using the CME on the RNC side, follow the path below from the navigation
tree of BSC6900 UMTS Initial Configuration (CME-based) > Configuring BSC6900
Data (General Configuration) > Configuring Interface Data.
l For details about activation on the NodeB side, follow the path below from the navigation
tree of 3900 Series Base Station Initial Configuration Guide: 3900 Series Base Station
Initial Configuration (Based on the CME) > Creating a NodeB > Creating a Single
NodeB > Configuring NodeB Transport Data > Configuring Physical NodeB
Transport Data (Non-Secure Networking).
l For details about activation on the BTS3902E&BTS3803E side, follow the path below from
the navigation tree of BTS3902E&BTS3803E WCDMA Initial Configuration
Guide: Creating a NodeB > Creating a Single NodeB > Configuring NodeB Transport
Data > Configuring Physical NodeB Transport Data (Non-Secure Networking).
Step 1 Run the BSC6900 MML command DSP IPPATH to check whether the IP path is available and
whether the bandwidth for the IP path is in use.
Expected result: The command output shows that the value of the Operation state parameter
is Available and the values of the Used forward bandwidth of path and Used backward
bandwidth of path parameters are not 0.
NOTE
Before running the DSP IPPATH command, run the BSC6900 MML command ADD IPPATH with
PATHCHK set to ENABLED.
Step 2 Optional: Run the BSC6900 command DSP IPCHK to check whether the value of the Check
state parameter is UP.
Expected result: The command output shows that the value of the Check state parameter is
UP.
Step 3 Run the BSC6900 command DSP SCTPLNK to check whether the value of the Operation
state parameter is Available.
Expected result: The command output shows that the value of the Operation state parameter
is Available.
Step 5 Optional: Start a Cell Trace task on the RNC LMT. On the FMR tab, select Transport Data
Periodic Report and enter SCCPCH ID and Report Period of the cell to be traced.
Expected result: On the Results of cell message tracing window, Trace Type is IP Interface
Trace.
Step 6 Optional: Start an Iub Interface Trace task on the RNC LMT. On the Basic tab, select
SCTP. On the SCTP tab, enter SCTP Link ID and select SCTP Message.
Expected result: On the Results of Tracing Messages on the Iub Interface window, Trace
Type is SCTP Message Trace.
----End
The following table lists the counters related to IP transmission over the Iub interface on the
RNC side.
Step 1 Run the NodeB MML command DSP ETHPORT to check the Ethernet physical port status.
Step 2 Optional: Start Iub Interface Trace and IP Message Statistics tasks on the NodeB LMT.
Expected result: There are traced messages. Services are carried on the SCTP link and IP path.
----End
The following table lists the counters related to IP transmission over the Iub interface on the
NodeB side.
2.1.4.6 Deactivation
This feature does not need to be deactivated.
2.1.4.7 Reconfiguration
For details, see RAN Reconfiguration Guide.
2.1.7 Troubleshooting
l For details about troubleshooting on the RNC side, see section "Troubleshooting IP
Transmission Faults" in RAN Troubleshooting Guide. For details about alarm handling
procedures on the RNC side, see section "Transport Alarm" in BSC6900 UMTS Alarm
Reference.
l The following table lists the alarms on the NodeB side.
The BSC6910 does not support the Hybrid Iub IP Transmission feature.
2.2.3 Planning
2.2.4 Deployment
2.2.4.1 Process
Figure 2-3 shows the deployment process of the IP Transmission Introduction on Iu Interface
feature.
2.2.4.2 Requirements
l Bearer network QoS
NOTE
l The Maximum Value column indicates the basic commercial requirement for deploying radio services.
l The Target Value column lists the requirement for the transport network when customers require high
KPIs on the radio network. For example, the maximum throughput for HSPA+ users is required to be
84 Mbit/s.
l These QoS requirements are not applicable to satellite bearers.
l License
The IP Transportation in Iu Interface license has been activated. For details on how to
activate the license, see License Management Feature Parameter Description.
l NE
The CN nodes must support IP transmission.
2.2.4.4 Activation
l For details about activation using MML commands, follow the path below from the
navigation tree of BSC6900 UMTS Initial Configuration Guide (MML-Based) >
Configuring the Interfaces > Configuring the Iu Interface (over IP).
l For details about activation using the CME, follow the path below from the navigation tree
of BSC6900 UMTS Initial Configuration (CME-based) > Configuring BSC6900 Data
(General Configuration) > Configuring Interface Data.
Optional: Start an Iub Interface Trace task on the RNC LMT. On the Basic tab, select SCTP
and on the displayed SCTP tab, enter SCTP Link ID and select SCTP Message.
Expected result: On the Results of Tracing Messages on the Iub Interface window, Trace
Type is SCTP Message Trace.
2.2.4.6 Deactivation
This feature does not need to be deactivated.
2.2.4.7 Reconfiguration
For details, see RAN Reconfiguration Guide.
2.2.7 Troubleshooting
For details about troubleshooting, see section "Troubleshooting IP Transmission Faults" in RAN
Troubleshooting Guide. For details about alarm handling procedures, see section "Transport
Alarm" in BSC6900 UMTS Alarm Reference.
The Iur interface supports the configuration of IP paths or transmission resource pools. This
document provides the engineering guidelines with the configuration of IP paths. For details
about the engineering guidelines with the configuration of transmission resource pools, see
Transmission Resource Pool in RNC Feature Parameter Description. The BSC6910 supports
only the transmission resource pool networking mode.
2.3.3 Planning
2.3.4 Deployment
2.3.4.1 Process
Figure 2-4 shows deployment process of IP Transmission Introduction on Iur Interface.
2.3.4.2 Requirements
l Bearer network QoS
NOTE
l The Maximum Value column indicates the basic commercial requirement for deploying radio services.
l The Target Value column lists the requirement for the transport network when customers require high
KPIs on the radio network. For example, the maximum throughput for HSPA+ users is required to be
84 Mbit/s.
l These QoS requirements are not applicable to satellite bearers.
l License
The license for the IP Transmission Introduction on Iur Interface feature has been activated.
For details on how to activate the license, see License Management Feature Parameter
Description.
l NE
The adjacent RNC must support the IP Transmission Introduction on Iur Interface feature.
2.3.4.4 Activation
l For details about activation using MML commands, follow the path below from the
navigation tree of BSC6900 UMTS Initial Configuration Guide (MML-Based) >
Configuring the Interfaces > Configuring the Iur Interface (over IP).
l For details about activation using the CME, follow the path below from the navigation tree
of BSC6900 UMTS Initial Configuration (CME-based) > Configuring BSC6900 Data
(General Configuration) > Configuring Interface Data.
Optional: Start an Iur Interface Trace task on the RNC LMT. On the Basic tab, select SCTP.
On the SCTP tab, enter SCTP Link ID and select SCTP Message.
Expected result: On the Results of Tracing Messages on the Iur Interface window, Trace
Type is SCTP Message Trace.
2.3.4.6 Deactivation
This feature does not need to be deactivated.
2.3.4.7 Reconfiguration
For details, see RAN Reconfiguration Guide.
2.3.7 Troubleshooting
For details about troubleshooting, see section "Troubleshooting IP Transmission Faults" in RAN
Troubleshooting Guide. For details about alarm handling procedures, see section "Transport
Alarm" in BSC6900 UMTS Alarm Reference.
3.1.1 When to Use Ethernet Port Backup for the Base Station
Controller
It is recommended that layer 3 networking be used. The base station controller is networked
with the router that supports VRRP.
3.1.2 Planning
3.1.3 Deployment
3.1.3.1 Requirements
If the base station controller is directly connected to the layer 3 router, the router must support
VRRP over VLANIF.
If the base station controller is not directly connected to the router, the switch for layer 2 must
be configured and the base station controller is connected to the switch.
3.1.3.2 Activation
Step 2 Run the base station controller MML command ADD ETHIP to set the IP address of the Ethernet
port.
Step 3 Run the base station controller MML command STR IPCHK to enable BFD between the IP
address of the Ethernet port and one of the real IP addresses of the VRRP-enabled router. Set
Check type to SBFD, Carry port type to ETHPORT, Whether affect the port swapping to
YES(YES), and Route associated flag to NO(NO).
Step 4 Run the base station controller MML command STR IPCHK to enable BFD between the IP
address of the Ethernet port and the other one of the real IP addresses of the VRRP-enabled
router. Set Check type to SBFD, Carry port type to ETHPORT, Whether affect the port
swapping to YES(YES), and Route associated flag to NO(NO).
----End
Port No. PN
Step 2 Run the base station controller MML command PING IP to check whether the IP address
between the local and peer ends can be pinged.
Step 3 Disconnect the cable from the active port. Run the base station controller MML command PING
IP to check whether the IP address between the local and peer ends can be pinged.
Step 4 Connect the cable to the active port and disconnect the cable from the standby port. Run the base
station controller MML command PING IP to check whether the IP address between the local
and peer ends can be pinged.
----End
3.1.3.4 Deactivation
Step 2 Run the base station controller MML command RMV ETHIP to remove the IP address of the
Ethernet port.
Step 3 Run the base station controller MML command RMV ETHREDPORT to remove the Ethernet
port.
----End
3.1.5 Troubleshooting
If ALM-21346 IP Connectivity Check Failure and ALM-21345 Ethernet Link Fault are reported,
clear them by referring to the alarm handling suggestions.
3.2.1 When to Use Ethernet Route Backup for the Base Station
Controller
It is recommended that layer 3 networking be used. The base station controller is networked
with the router that supports active/standby gateway.
3.2.2 Planning
3.2.3 Deployment
3.2.3.1 Requirements
A standby route is configured from each of the active and standby gateways to the base station
controller. If a route is faulty, the gateway router still can return packets to the base station
controller through the standby route.
When no IP transmission resource pools are configured, the base station controller configures
routes based on the destination IP address. When IP transmission resource pools are configured,
the base station controller configures routes based on the source IP address.
Table 3-2 Data to prepare when the routes are configured based on the destination IP address
Table 3-3 Data to prepare when the routes are configured based on the source IP address
Standby next hop STANDBYNEXTHO Set this parameter to the Transport network
P IP address of the standby plan
gateway.
3.2.3.3 Activation
Step 1 Run the base station controller MML command ADD IPRT with Forward route address set
to the IP address of the active gateway and Priority to HIGH.
Step 2 Run the base station controller MML command ADD IPRT with Forward route address set
to the IP address of the standby gateway and Priority to LOW.
----End
When routes are configured based on the source IP address, perform the following steps:
Step 1 Run the base station controller MML command ADD SRCIPRT with Forward route
address set to the IP address of the active gateway, Standby Next hop switch to YES(YES),
and Standby next hop to the IP address of the standby gateway.
Step 2 Run the base station controller MML command STR IPCHK with Check type set to SBFD,
Carry port type to ETHPORT, Check mode to CHECK_ON_INDEPENDENT_PORT
(Check on Independent Port), and Route associated flag to YES(YES) to start BFD for the
active gateway router.
Step 3 Run the base station controller MML command STR IPCHK with Check type set to SBFD,
Carry port type to ETHPORT, Check mode to CHECK_ON_INDEPENDENT_PORT
(Check on Independent Port), and Route associated flag to YES(YES) to start BFD for the
standby gateway router.
----End
address
ADD SRCIPRT: SRN=2, SN=26, IPTYPE=DEVIP, SRCIPADDR="20.20.20.1",
NEXTHOP="126.126.126.2", STANDBYNEXTHOPSWITCH=YES,
STANDBYNEXTHOP="126.126.127.2";
//Activating BFD between the base station controller and router
STR IPCHK: SRN=2, SN=26, CHKN=0, CHKTYPE=SBFD, CARRYT=ETHPORT, PN=1, MODE=
CHECK_ON_INDEPENDENT_PORT, PEERIP="126.126.126.2", ROUTEASSOCIATEDFLAG=YES;
STR IPCHK: SRN=2, SN=27, CHKN=1, CHKTYPE=SBFD, CARRYT=ETHPORT, PN=1,
MODE=CHECK_ON_INDEPENDENT_PORT, PEERIP="126.126.127.2", ROUTEASSOCIATEDFLAG=YES;
Table 3-4 Configuring parameters on the CME (when routes are configured based on the
destination IP address)
Priority PRIORITY
Table 3-5 Configuring parameters on the CME (when routes are configured based on the source
IP address)
Standby STANDBY
Next hop NEXTHOP
switch SWITCH
Step 1 Run the base station controller MML command DSP IPRT to check whether the route is valid.
----End
When routes are configured based on the source IP address, perform the following steps:
Step 1 Run the base station controller MML command DSP SRCIPRT to check whether the route is
valid.
Step 2 Run the base station controller MML command PING IP to check whether the IP address
between the two ends can be pinged.
----End
3.2.3.5 Deactivation
Step 2 When routes are configured based on the destination IP address, run the base station controller
MML command RMV IPRT to remove the standby and active routes. If the removal fails,
perform operations as prompted.
Step 3 When routes are configured based on the source IP address, run the base station controller MML
command RMV SRCIPRT to remove the active and standby gateways. If the removal fails,
perform operations as prompted.
----End
3.2.3.6 Reconfiguration
When routes are configured based on the destination IP address, run the MOD IPRT command
to perform reconfiguration. When routes are configured based on the source IP address, run the
MOD SCRIPRT command to perform reconfiguration.
3.2.5 Troubleshooting
If ALM-21346 IP Connectivity Check Failure is reported, clear the alarm by referring to the
alarm handling suggestions.
3.3.1 When to Use Ethernet Route Backup for the Base Station
It is recommended that layer 3 networking be used. The base station is networked with the router
that supports active/standby gateway.
3.3.2 Planning
l GTMUb
l WMPT/UMPT/LMPT
l UTRPc/UTRP (using the daughter board UEOC/UQEC/UIEC)
3.3.3 Deployment
3.3.3.1 Requirements
A standby route is configured from each of the active and standby gateways to the base station.
If a route is faulty, the gateway router still can return packets to the base station through the
standby route.
Table 3-6 Data to prepare for Ethernet route backup for the NodeB, eNodeB, eGBTS, and co-
MPT base station
Table 3-7 Data to prepare for Ethernet route backup for the GBTS
3.3.3.3 Activation
Step 1 Run the base station MML command ADD IPRT with Next Hop IP set to the IP address of the
active gateway and Preference to 60.
Step 2 Run the base station MML command ADD IPRT with Next Hop IP set to the IP address of the
standby gateway and Preference to 80.
Step 3 Run the base station MML command ADD BFDSESSION with Hop Type set to
SINGLE_HOP(Single Hop) and Session Catalog to RELIABILITY(Reliability) to start
BFD for the active gateway router.
Step 4 Run the base station MML command ADD BFDSESSION with Hop Type set to
SINGLE_HOP(Single Hop) and Session Catalog to RELIABILITY(Reliability) to start
BFD for the standby gateway router.
Step 5 (Optional) Run the base station MML command SET GTRANSPARA with Switch Back
Time set to 300.
----End
NOTE
Set Protocol Version as the BFD session protocol version supported by the peer device.
Step 1 Run the base station MML command ADD BTSIPRT with Forward Route Address set to the
IP address of the active gateway and Route Priority to 60.
Step 2 Run the base station MML command ADD BTSIPRT with Forward Route Address set to the
IP address of the standby gateway and Route Priority to 80.
Step 3 Run the base station MML command ADD BTSBFD with Hop Type set to SBFD
(SINGLE_HOP) to start BFD for the active gateway router.
Step 4 Run the base station MML command ADD BTSBFD with Hop Type set to SBFD
(SINGLE_HOP) to start BFD for the standby gateway router.
Step 5 (Optional) Run the base station MML command SET BTSGTRANSPARA with Route
switching delay set to 300.
----End
Table 3-8 Parameters for Ethernet route backup (NodeB, eNodeB, eGBTS, and co-MPT base
station)
Forward NEXTHOP
Route
Address
IP route backup can be implemented and verified in a flexible way. For two IP routes with the
same destination but different priorities and next-hop IP addresses, generate a fault in one IP
route. If the other IP route takes over and functions normally, IP route backup is activated. If
the two IP routes are both functional, data is transmitted on the IP route with the higher priority.
Before the verification, check the status of the active and standby IP routes and ensure that both
routes are functional. For this purpose, run the DSP IPRT command to verify that both routes
are in the routing table. The verification procedure is as follows:
Step 1 Check the active route. Run the TRACERT command. In the displayed results, the first hop IP
address is the next hop IP address of the active route.
Step 2 Generate a fault in the active route. Run the DSP IPRT command. The active route is not in the
routing table.
Step 3 Verify the switchover. Run the TRACERT command. The switchover is successful if the first
hop IP address is the next hop IP address of the standby route.
Step 4 Restore the transmission link of the IP route with the higher priority.
----End
3.3.3.5 Deactivation
Step 1 Run the base station MML command RMV BFDSESSION to disable BFD.
Step 2 Run the base station MML command RMV IPRT to remove the low-priority and high-priority
routes. If the removal fails, perform operations as prompted.
----End
Step 1 Run the base station MML command RMV BTSBFD to disable BFD.
Step 2 Run the base station MML command RMV BTSIPRT to remove the low-priority and high-
priority routes. If the removal fails, perform operations as prompted.
----End
3.3.3.6 Reconfiguration
To perform reconfiguration:
l Run the MOD IPRT command for the NodeB, eNodeB, eGBTS, and co-MPT base station.
l Run the MOD BTSIPRT command for the GBTS.
l Run the DSP IPRT command for the NodeB, eNodeB, eGBTS, and co-MPT base station.
l Run the DSP BTSIPRT command for the GBTS.
3.3.5 Troubleshooting
If ALM-25899 BFD Session Fault is reported, clear the alarm by referring to the alarm handling
suggestions.
3.4.2 Planning
3.4.3 Deployment
3.4.3.1 Requirements
If the base station controller is directly connected to the layer 3 router, the router must support
VRRP over VLANIF.
If the base station controller is not directly connected to the router, the switch for layer 2 must
be configured and the base station controller is connected to the switch.
3.4.3.3 Activation
----End
Aggregation LACPMOD
Mode E
Revertive RT
type
Local IP IPADDR
address
Step 2 Run the base station controller MML command DSP ETHTRKLNK to check whether the links
in the link aggregation group are functional.
Step 3 Run the base station controller MML command PING IP to check whether the IP address
between the two ends can be pinged.
----End
3.4.3.5 Deactivation
Step 2 Run the base station controller MML command RMV ETHTRKIP to remove the IP address
of the link aggregation group. If the removal fails, perform operations as prompted.
Step 3 Run the base station controller MML command RMV ETHTRKLNK to remove the ports/links
from the link aggregation group.
Step 4 Run the base station controller MML command RMV ETHTRK to remove the link aggregation
group.
----End
3.4.3.6 Reconfiguration
To perform reconfiguration, run the MOD ETHTRKIP command.
Run the base station controller MML command DSP ETHTRKLNK to check whether the links
in the link aggregation group are functional.
3.4.5 Troubleshooting
If ALM-21346 IP Connectivity Check Failure is reported, clear the alarm by referring to the
alarm handling suggestions.
3.5.2 Planning
3.5.3 Deployment
3.5.3.1 Requirements
The base station controller is directly connected to the layer 2 transmission device. The layer 2
transmission device supports link aggregation.
3.5.3.3 Activation
Step 2 Run the base station controller MML command ADD ETHTRKLNK with Trunk group work
mode set to ACTIVE_STANDBY(Active standby) to add a link to the link aggregation group
for the port on the active board.
Step 3 Run the base station controller MML command ADD ETHTRKLNK with Trunk group work
mode set to ACTIVE_STANDBY(Active standby) to add a link to the link aggregation group
for the port on the standby board. Note that Port priority of the port on the standby board must
be higher than that of the port on the active board. A larger value indicates a lower priority.
Step 4 Run the base station controller MML command ADD ETHTRKIP to set the IP address of the
link aggregation group.
----End
Aggregation LACPMOD
Mode E
Revertive RT
type
Local IP IPADDR
address
Step 2 Run the base station controller MML command DSP ETHTRKLNK to check whether the links
in the link aggregation group are functional.
Step 3 Run the base station controller MML command PING IP to check whether the IP address
between the two ends can be pinged.
----End
3.5.3.5 Deactivation
Step 2 Run the base station controller MML command RMV ETHTRKLNK to remove the ports/links
from the link aggregation group.
Step 3 Run the base station controller MML command RMV ETHTRK to remove the link aggregation
group.
----End
3.5.3.6 Reconfiguration
To perform reconfiguration, run the MOD ETHTRKIP command.
Run the base station controller MML command DSP ETHTRKLNK to check whether the links
in the link aggregation group are functional.
3.5.5 Troubleshooting
If ALM-21349 Ethernet Trunk Group Fault and ALM-21350 Ethernet Trunk Link Fault are
reported, clear them by referring to the alarm handling suggestions.
Layer 2 or layer 3 networking can be used. The peer layer 2 or layer 3 transmission device
supports link aggregation.
The ports on the base station board involve in link aggregation in static load sharing mode.
3.6.2 Planning
3.6.3 Deployment
3.6.3.1 Requirements
The base station is directly connected to the layer 2 or layer 3 transmission device. The layer 2
or layer 3 transmission device supports link aggregation.
3.6.3.3 Activation
Step 2 Run the base station MML command ADD ETHTRKLNK with Master Flag set to YES(Yes)
to add a primary port to the link aggregation group.
Step 3 Run the base station MML command ADD ETHTRKLNK with Master Flag set to NO(No)
to add another port to the link aggregation group. Repeat the command until all required ports
are added.
Step 4 Run the base station MML command ADD DEVIP with Port Type set to ETHTRK(Ethernet
Trunk) and Port No. to the value of Trunk No..
----End
Step 2 Remove the optical fiber or Ethernet cable from one active port, and run the DSP ETHTRK
command again. The number of this port is not displayed in the result and the S1 interface is
functional. Run the DSP ETHTRKLNK command to query the status of this port. Port
Status is Down.
Step 4 Run the DSP ETHTRK and DSP ETHTRKLNK commands. The port to which the optical
fiber or Ethernet cable is reconnected becomes active again.
----End
3.6.3.5 Deactivation
Step 2 Run the base station MML command RMV ETHTRKLNK to remove the ports from the link
aggregation group. The primary port must be removed last.
Step 3 Run the base station MML command RMV ETHTRK to remove the link aggregation group.
----End
3.6.3.6 Reconfiguration
If a port has different attributes from other ports, you need to remove the port from the link
aggregation group.
Run the base station MML command DSP ETHTRKLNK to check whether the links in the
link aggregation group are functional.
3.6.5 Troubleshooting
If ALM-25895 Ethernet Trunk Group Fault and ALM-25887 Ethernet Trunk Link Fault are
reported, clear them by referring to the alarm handling suggestions.
OM channel backup applies when hybrid transmission is used on the base station for high-QoS
and low-QoS links, secure and non-secure links, and multi-RAT services of a co-MPT
multimode base station.
3.7.2 Planning
3.7.3 Deployment
3.7.3.1 Requirements
The U2000 must be configured with the IP addresses of the master and slave OM channels and
the bound routes.
3.7.3.3 Activation
Step 1 Run the base station MML command ADD OMCH with Standby Status set to MASTER
(Master), Local IP to the IP address of the master OM channel, Binding Route to YES(Yes),
and Route Index to the index of the route bound to the master OM channel.
You must set Binding Secondary Route when the U2000 uses the remote HA system and the
IP address of the standby U2000 is not within the network segment range of the route bound to
the master OM channel. In this case, set Binding Secondary Route to YES(Yes) and Secondary
Route Index to the index of the route from the master OM channel to the standby U2000.
Step 2 Run the base station MML command ADD OMCH with Standby Status set to SLAVE
(Slave), Local IP to the IP address of the slave OM channel, Binding Route to YES(Yes), and
Route Index to the index of the route bound to the slave OM channel.
You must set Binding Secondary Route when the U2000 uses the remote HA system and the
IP address of the standby U2000 is not within the network segment range of the route bound to
the slave OM channel. In this case, set Binding Secondary Route to YES(Yes) and Secondary
Route Index to the index of the route from the slave OM channel to the standby U2000.
----End
l The local IP addresses of the master and slave OM channels belong to different network
segments.
l The next-hop IP addresses of the IP routes bound to the master and slave OM channels are
different.
Perform the verification based on the actual networking mode if the actual networking mode is
different from the assumptions. Ensure that the standby OM channel status is normal and a
switchover can be triggered if the active OM channel is faulty.
Run the DSP OMCH command to query the status of the master and slave OM channels. An
OM channel is active if its OM Channel Status is Normal and Used State is In Use.
Generate a transport link fault for the active OM channel and verify that the standby OM channel
can take over.
l If the active OM channel is the master channel, generate a route fault for the master OM
channel. Wait about 10 minutes and run the DSP OMCH command to check the status of
the slave OM channel. The switchover is successful if OM Channel Status is Normal and
Used State is In Use.
l If the active OM channel is the slave channel, generate a route fault for the slave OM channel.
Wait about 10 minutes and run the DSP OMCH command to check the status of the master
OM channel. The switchover is successful if OM Channel Status is Normal and Used
State is In Use.
----End
3.7.3.5 Deactivation
3.7.3.6 Reconfiguration
To perform reconfiguration, run the MOD OMCH command.
3.7.5 Troubleshooting
If ALM-25901 Remote Maintenance Link Failure is reported, clear the alarm by referring to the
alarm handling suggestions.
4.1 BFD
4.1.2 Planning
4.1.3 Deployment
4.1.3.1 Requirements
l NEs
The connected device supports BFD.
l Operating environment
Ethernet ports are available on the LMPT or UMPT on the eNodeB.
l License
BFD sessions are classified into SBFD sessions and MBFD sessions by hop type. BFD sessions
are also classified into maintainability BFD sessions and reliability BFD sessions by session
type.
4.1.3.3 Precautions
Currently, the RNC only supports SBFD on the active port and in asynchronous mode. It does
not support simultaneous SBFD on the active and standby ports.
If an SBFD session is shut down when it is running, the base station or base station controller
automatically disables the routes whose next-hop IP address is the peer IP address of the failed
SBFD session.
If SBFD is configured to be applicable only to the active port on the base station controller side
and the Whether affect the port swapping (IPCHK.WHETHERAFFECTSWAP) parameter
is set to YES(YES), an SBFD link fault triggers a port switchover. Otherwise, an SBFD link
fault does not trigger a port switchover, but the availability of the related routes is affected.
4.1.3.4 Activation
The correct IP path has been configured based on the network plane. For the BSC6910 which does not
support the configuration of IP paths, the BFD cannot be bound with an IP path or IP route.
l Base station controller side
Step 1 Run the MML command SET BFDPROTOSW with Bfd Protocol Switch set to BFD_ON to
activate BFD.
Step 2 Run the MML command STR IPCHK with Check type set to SBFD or MBFD to start the
continuity check.
Step 3 (Optional) Run the MML command ADD IPPATHBIND with IP path ID set to the ID of the
IP path to be checked for binding the BFD with the IP path.
Step 4 (Optional) Run the MML command ADD IPRTBIND with Destination IP address and
Forward route address set to the destination IP address and next hop IP address to be check,
respectively. This is for binding the BFD with the IP route.
----End
l eGBTS/NodeB/eNodeB side
Run the MML command ADD BFDSESSION with Hop Type and Session Catalog set to
SINGLE_HOP and RELIABILITY, respectively.
l GBTS side
Run the BSC MML command ADD BTSBFD and set the related parameters.
Batch reconfiguration using the CME is the recommended method to activate a feature on
existing base stations. This method reconfigures all data, except neighbor relationships, for
multiple base stations in a single procedure. The procedure is as follows:
Step 1 After creating a planned data area, choose CME > Advanced > Customize Summary Data
File (U2000 client mode), or choose Advanced > Customize Summary Data File (CME client
mode), to customize a summary data file for batch reconfiguration.
NOTE
Step 2 Choose CME > LTE Application > Export Data > Export Base Station Bulk Configuration
Data (U2000 client mode), or choose LTE Application > Export Data > Export Base Station
Bulk Configuration Data (CME client mode), to export the base station data stored on the CME
into the customized summary data file.
Step 3 In the summary data file, set the parameters in the MOs listed in Table 10-4 and close the file.
Step 4 Choose CME > LTE Application > Import Data > Import Base Station Bulk Configuration
Data (U2000 client mode), or choose LTE Application > Import Data > Import Base Station
Bulk Configuration Data (CME client mode), to import the summary data file into the CME,
and then start the data verification.
Step 5 After data verification is complete, choose CME > Planned Area > Export Incremental
Scripts (U2000 client mode), or choose Area Management > Planned Area > Export
Incremental Scripts (CME client mode), to export and activate the incremental scripts.
----End
On the CME, set the parameters listed in the "Data Preparation" section for a single base station.
The procedure is as follows:
Step 1 In the planned data area, click Base Station in the upper left corner of the configuration window.
Step 2 In area 1 shown in Figure 4-1, select the base station to which the MOs belong.
NOTE
To view descriptions of the parameters in the MO, click in area 4 and press F1.
Area 5 displays the details of a selected area-4 entry in vertical format. Click the Details icon to show or
hide this area.
Step 3 On the Search tab page in area 2, enter an MO name, for example, CELL.
Step 4 In area 3, double-click the MO in the Object Name column. All parameters in this MO are
displayed in area 4.
Step 6 Choose CME > Planned Area > Export Incremental Scripts (U2000 client mode), or choose
Area Management > Planned Area > Export Incremental Scripts (CME client mode), to
export and activate the incremental scripts.
----End
SBFD and MBFD use the same summary data file but different parameter values.
Step 1 Enable BFD-based IP fault detection. If BFD fails, ALM-21346 IP Connectivity Check Failure
is reported.
Step 2 Run the RNC MML command DSP IPCHK to query gateway check parameter and status.
Step 3 Run the NodeB MML command DSP BFDSESSION to query the status of a BFD session.
----End
Run the DSP BFDSESSION command. If Session State is Up, the feature is activated.
4.1.3.6 Deactivation
Step 1 Run the RNC MML command STP IPCHK to stop the continuity check of the gateway on FE/
GE ports.
----End
Base station side:
Step 1 Run the NodeB MML command RMV BFDSESSION to remove a BFD session.
----End
Step 1 Run the MML command DSP IPCHK to query gateway check parameter and status.
----End
Step 2 Run the MML command DSP BFDSESSION to query the status of a BFD session.
----End
4.1.6 Troubleshooting
The ALM-21346 IP Connectivity Check Failure is reported if the BFD fails.
If a BFD session is faulty, check whether an alarm listed in Table 4-6 is generated on the eNodeB.
If an alarm is generated, clear the alarm by referring to the related alarm reference.
4.2.2 Deployment
4.2.2.1 Requirements
GTP-U echo monitoring has no requirement for the operating environment, transport
networking, and licenses.
Path GTPU Networ This parameter specifies the maximum time interval between
Timeo PATH k plan sending of path detection message at the local end and
ut TIME (negoti reception of a response message from the peer end. If no
Thresh OUTT ation response is received after the delay threshold is exceeded, the
old HD not local end regards that the path detection fails or another path
require detection message needs to be transmitted.
d)
Maxi GTPU Networ This parameter specifies the maximum number of times the
mum PATH k plan path detection message is retransmitted when no response to
Path TIME (negoti the path detection message is received. If the number of times
Timeo OUTM ation the path detection message is retransmitted exceeds the
uts AXNU not maximum value, the path detection fails.
M require
d)
Echo EchoS Networ Set this parameter based on the network plan. You are advised
Detect witch k plan to set this parameter to ON to enable GTP-U echo.
ion (negoti
Switch ation
not
require
d)
ECHO GTPU. Networ Set this parameter based on the network plan. If no echo
Frame TIME k plan response is received during the period specified by this
Timeo OUTT (negoti parameter, echo response times out.
ut H ation
not
require
d)
ECHO GTPU. Networ Set this parameter based on the network plan. This parameter
Frame TIME k plan specifies the maximum number of echo response timeouts. If
Timeo OUTC (negoti the number of times no echo response is received reaches the
ut NT ation value specified by this parameter, the GTP-U path fails.
Count not
require
d)
DSCP GTPU. Networ Set this parameter based on the network plan.
DSCP k plan
(negoti
ation
not
require
d)
Static GTPU. Networ Set this parameter based on the network plan. The value
Check STATI k plan ENABLE(Enable) is recommended.
Switch CCHK (negoti
ation
not
require
d)
4.2.2.3 Activation
Step 1 Run the MML command SET GTPU with Echo Detection Switch set to ON.
----End
eNodeB side:
Step 1 Run the MML command MOD GTPU with Static Check Switch set to ENABLE(Enable).
----End
Step 1 Before starting GTP-U echo monitoring, check the following items.
If... Then...
GTP-U static detection is Ensure that bearers are set up for UEs in the cell. This can
disabled in the initial data be achieved by using UEs to access the cell and injecting
configuration packets to the uplink or downlink of the UEs.
The eNodeB can send GTP-U echo control messages in one of the preceding scenarios.
Step 3 Create a GTP-U echo monitoring task and set associated parameters.
l For details about how to create a GTP-U echo monitoring task, choose Fault
Management > FARS > LTE Trace/Monitoring > Creating LTE Trace/Monitoring
Tasks in the TOC pane.
l For details about how to set parameters for a GTP-U echo monitoring task, choose Fault
Management > FARS > LTE Trace/Monitoring > References for LTE Trace
Interfaces > Parameters for Creating an LTE Trace/Monitoring Task.
Step 4 Run the monitoring task, and check the results. GTP-U echo monitoring is successfully activated
if echo request and response messages can be viewed in real time, as shown in Figure 4-2.
----End
4.2.2.5 Deactivation
Step 1 Run the MML command SET UGTPU with Echo Detection Switch set to OFF.
----End
eNodeB side:
Step 1 Run the MML command MOD GTPU with Static Check Switch set to DISABLE(Disable).
----End
4.2.5 Troubleshooting
None
5 Parameters
6 Counters
7 Glossary
8 Reference Documents