Академический Документы
Профессиональный Документы
Культура Документы
E. Borcoci, UPB
2016-2017
TSAC 1- ARS- AWT1-ACNPS Sem I 2016-2017
CONTENTS
1 MULTIPLE PLANES ARCHITECTURES 8
1.1 PRINCIPLES 8
1.2 SIGNALLING ISSUES 10
1.2.1 Example: QoS signaling 10
1.2.2 Example of out of band signalling: Session Initiation Protocol (SIP) 11
1.2.3 Standardization Effort in separation Data Plane-Control Plane 13
1.2.3.1 NSIS (Next Step in Signalling) 13
1.2.3.2 IETF WG ForCES Forwarding and Control Element Seperaration, 2003 13
1.3 BUSINESS MODELS EXAMPLES 13
1.3.1 BM for Multimedia Communication Architectures 14
1.3.1.1 Customers and Users 14
1.3.1.2 Providers (PR) 14
1.3.1.3 Multiple Plane Architecture and Business Actors 16
1.3.1.4 Service Level Agreements/Specifications (SLA/SLS) 16
1.3.2 Novel BMs and actors (in the perspective of Future Internet) 19
1.3.2.1 Virtualisation-based systems 19
1.3.2.2 BM in Cloud Computing 19
1.4 EXAMPLES OF MULTIPLE PLANE ARCHITECTURES 22
1.4.1 IEEE 802.16 multi-plane stack ( lower layers) 22
1.4.2 Generic Example of a multi-plane architecture 23
1.4.2.1 An Architecture oriented to multimedia distribution 24
1.4.3 Next Generation Networks Architecture- high level view 25
1.4.3.1 Architectural layers: vertical and horizontal decomposition 26
1.4.3.1.1 Transport Stratum (TS) Functions 27
1.4.3.1.2 Service Stratum Functions 29
1.4.3.1.3 Management Functions 30
1.4.3.1.4 End-User Functions 31
1.5 SDN BASIC ARCHITECTURE 32
2 NETWORKING TECHNOLOGIES AND PROTOCOLS – FOR WIDE AREA WIRELESS
NETWORKS -I 36
2.1 INTRODUCTION 36
2.2 CELLULAR TECHNOLOGIES- BASICS 37
2.2.1 General Overview 37
2.2.2 GSM (2G) 44
2.2.2.1 Network Infrastructure and general architecture 44
2.2.2.2 Architectural Components 47
2.2.2.2.1 Mobile Terminal 47
2.2.2.2.2 Base Station Subsystem (BSS) 49
2.2.2.2.3 Network Switching Subsystem (NSS) 50
2.2.2.3 Physical Layer characteristics summary 52
2.2.2.4 Control Plane and Signalling Protocols 53
2.2.2.5 Input Call – Example 54
3 NETWORKING TECHNOLOGIES AND PROTOCOLS – FOR WIDE AREA WIRELESS
NETWORKS - II 55
3.1 INTRODUCTION LTE 55
3.2 LTE BASIC PARAMETERS 56
3.3 LTE NETWORK ARCHITECTURE [1],[3] 58
3.3.1 User Equipment (UE) 59
3.3.2 E-UTRAN (The access network) 59
3.3.3 Evolved Packet Core (EPC) (core network) 60
3.3.3.1 Functional split between the E-UTRAN and the EPC 61
3.3.3.2 2G/3G Versus LTE 61
3.3.3.3 Mobile IP (MIP) – and Proxi MIP - reminder 62
3.3.4 LTE Roaming Architecture (summary) 65
3.3.5 LTE Numbering and Addressing 66
3.3.6 LTE – Radio Protocol Architecture 68
3.3.6.1 User Plane 68
TSAC1-ARS – AWT1-ACNPS-E.Borcoci- UPB -2016-2017 3
TSAC 1- ARS- AWT1-ACNPS Sem I 2016-2017
8 ANNEXES 122
8.1 NETWORKS LAYERED ARCHITECTURES 122
8.1.1 General Principles and Functional Layers 122
8.1.2 OSI Reference Model 123
8.1.3 Real Stack Examples. Uncomplete stacks 125
8.1.3.1 TCP/IP Stack 125
8.1.3.2 IEEE 802.x standards for LAN, MAN 129
8.1.3.3 Signalling System No.7 130
8.1.3.4 MPLS architecture 131
8.1.3.4.1 MPLS IP stack 133
8.1.4 GPRS Tunneling Protocol (GTP) in LTE 134
8.1.5 Introduction 134
8.1.6 GPRS Tunneling Protocol Types 135
8.1.7 Why is GTP used in LTE? 135
8.1.8 GTP Interfaces in LTE 135
8.1.9 How GTP-U Works ? 136
Table of Figures
Figure 1-1 Example of (ITU-T) Multiple Plane architecture- for QoS assurance................................ 10
Figure 1-2 Diagram of a request, acceptance, setup and termination of a call..................................... 12
Figure 1-3 Basic SIP signaling configuration ..................................................................................... 13
Figure 1-4 Example of a generic multiple plane architecture ............................................................... 16
Figure 1-5 Generic IP Business Model (I) - and business relationships (SLA) ................................... 17
Figure 1-6 Example: IP Business Models (II) - Hub model and Cascade model................................. 18
Figure 1-7 Cloud access overview ....................................................................................................... 19
Figure 1-8 The NIST Conceptual Reference Model ............................................................................. 20
Figure 1-9 Interactions between the Actors in Cloud Computing (NIST) ............................................ 21
Figure 1-10 Basic IEEE 802.16 multi-plane protocol stack .................................................................. 22
Figure 1-11 (IEEE 802.16g-05/008r2, December 2005)...................................................................... 22
Figure 1-12 Relation IEEE802.16 vs. WiMAX Forum NWG ............................................................. 23
Figure 1-13 Generic example of a multi-plane architecture................................................................ 23
Figure 1-14 Business actors and multi-domain infrastructure............................................................... 24
Figure 1-15 QoS assurance methods in ENTHRONE architecture...................................................... 25
Figure 1-16 NGN Architecture.............................................................................................................. 26
Figure 1-17 NGN layered architecture [4] ........................................................................................... 27
Figure 1-18 NGN Functional Architecture [4]...................................................................................... 28
Figure 1-19 Layered Architectural Management Model and Function Areas (FCAPS)....................... 31
Figure 1-20 SDN generic architectture.................................................................................................. 32
Figure 1-21 Basic SDN architecture .................................................................................................... 34
Figure 1-22 Idealized OpenFlow Switch............................................................................................... 35
Figure 2-1 Types of networks (geo-span) ............................................................................................. 36
Figure 2-2 Multiple access methods...................................................................................................... 37
Figure 2-3 Spectral bands...................................................................................................................... 37
Figure 2-4 Mobile technologies evolution (I) ....................................................................................... 41
Figure 2-5 Mobile technologies evolution (II) ...................................................................................... 41
Figure 2-6 GSM Network General Architecture ................................................................................... 44
Figure 2-7 GSM interfaces; Data and Control Plane............................................................................. 46
Figure 2-8 Hierarchy of service areas in GSM..................................................................................... 47
Figure 2-9 Mapping of the temporal channels in BSC.......................................................................... 50
Figure 2-10 Uplink and downlink bands example ................................................................................ 52
Figure 2-11 Simple allocation of carrier frequencies for cells ( F1, F2, F3)- to avoid interference...... 53
Figure 2-12 Control Plane in GSM ...................................................................................................... 53
Figure 2-13 Input call processing - example ......................................................................................... 54
Figure 3-1 FDD modes.......................................................................................................................... 57
Figure 3-2 High level LTE architecture ................................................................................................ 58
Figure 3-3 E-UTRAN components ....................................................................................................... 59
Figure 3-4 Simplified EPC architecture ............................................................................................... 60
Figure 3-5 Main functions of E-UTRAN and EPC (simplified view) .................................................. 61
Figure 3-6 Mobile IP principle (CISCO- presentation)........................................................................ 63
Figure 3-7 MIP Triangle routing ........................................................................................................... 64
Figure 3-8 Mobile IPv6 – Routing through HA [5] .............................................................................. 64
Figure 3-9 Mobile IPv6 – Route Optimisation [5] ............................................................................... 65
Figure 3-10 LTE Roaming architecture ................................................................................................ 66
Figure 3-11 LTE Radio Protocol Architecture [1-2] ............................................................................. 68
Figure 3-12 Functional split between E-UTRAN and EPC (details) .................................................... 68
Figure 3-13 User Plane stack................................................................................................................. 69
Figure 3-14 Control Plane stack........................................................................................................... 70
Figure 3-15 Protocol stack layers.......................................................................................................... 71
Figure 3-16 Data Plane SDUs and PDUs at various layers.................................................................. 73
Figure 3-17 Header Compression......................................................................................................... 73
Figure 3-18 OFDM in LTE [3].............................................................................................................. 77
Figure 3-19 Integration of LTE with 2G/3G technologies .................................................................... 79
Figure 4-1 SDN generic architectture.................................................................................................... 85
Figure 4-2 Basic SDN architecture........................................................................................................ 86
Figure 4-3 Idealized OpenFlow Switch................................................................................................. 87
Figure 4-4 Example of a network of OpenFlow-enabled commercial switches and routers................. 87
Figure 4-5 Example of fields characterising a flow .............................................................................. 88
Figure 4-6 Basic layered design of data center network infrastructure................................................ 89
Figure 4-7 Cloud computing Architecture ............................................................................................ 89
Figure 4-8 Service Provider domains to apply SDN ............................................................................. 90
Figure 4-9 Examples of SDN solutions applied in SP subsystems ....................................................... 91
Figure 4-10 Dynamic service chaining – Source Ericsson.................................................................... 92
Figure 4-11 Example of Bandwidth on demand SDN solution............................................................. 93
Figure 4-12 Main components of an OpenFlow switch ....................................................................... 97
Figure 4-13 Packet flow through the processing pipeline. ................................................................... 98
Figure 4-14 Flow processing................................................................................................................. 98
Figure 4-15 Alternative view of flow processing.................................................................................. 99
Figure 4-16 Open Flow messages ...................................................................................................... 101
Figure 4-17 An OF Configuration Point communicates with an operational context........................ 102
Figure 4-18 Relationship between OF-CONFIG components and the OF protocol .......................... 104
Figure 5-1 NFV Approach .................................................................................................................. 107
Figure 5-2 NFV reference architectural framework ........................................................................... 109
Figure 5-3 NFV Use Cases................................................................................................................. 111
Figure 8-1 Simplified architectural model for communication ........................................................... 122
Figure 8-2 OSI Reference Model ........................................................................................................ 125
Figure 8-3 Simplified view of the TCP/IP protocol stack ................................................................... 126
Figure 8-4 Example of TCP/IP stack protocols................................................................................... 127
(English)
1.1 Principles
Ongoing standardization : IETF, ITU-T , ETSI, IEEE, 3GPP
• Telecom originated layered architectures: more than one architectural plane
• IETF (TCP/IP- Internet) stack – originally only one plane
o (data + control + management)
Nowadays- recognized the need of defining several cooperating architectural planes
Architectural Planes
• Data plane ( DPl)- transport of user data traffic directly:
o Examples of functions:
Main traditional function
• Forwarding
QoS – related (transfer the user data flows and accomplish the traffic control
mechanisms to assure the desired level of QoS)
• traffic classification,
• packet marking
• traffic policing (reactive action)
• traffic shaping
• queuing and scheduling
buffer management
congestion avoidance
• Control plane (CPl)
o controls the pathways for user data traffic
o short term actions for resource and traffic engineering and control, including routing.
o Examples
Main traditional function
• Routing ( routes computation, intra and inter-domains)
Traffic Engineering and QoS – related
• Admission control (preventive action)
TSAC1-ARS – AWT1-ACNPS-E.Borcoci- UPB -2016-2017 8
TSAC 1- ARS- AWT1-ACNPS Sem I 2016-2017
• Resource reservation.
o In multi-domain environment the MPl and also CPl are logically divided in two sub-
planes: inter-domain and intra-domain. This approach allows each domain to have its
own management and control policies and mechanisms.
• Management plane (MPl)
o the operation, administration, and management aspects of the resources and services
to serve user data traffic
o long term actions related to resource and traffic management in order to assure the
desired QoS levels for the users and also efficient utilization of the network resources
o Examples of finctions:
Monitoring ( hierarchical, i.e. on several levels)
Management Policies (management based not on fixed configuration of
network elements but on set of rules),
Service Management,
Service and network restoration.
• Summary examples of multiple plane architectures (DPl + CPl + MPl):
• (early) Circuit switching-based systems: (2G)GSM, old- telecom arch. ISDN , BISDN
reason: telecom design philosophy (user data have been seen long time ago -
from the beginning of telecom systems as separate entities from signalling and
management) data
User(Data) plane, Control Plane, Mgmt Plane.
• (more recent )Packet-switching based – systems : TCP/IP
Currently the arch. becomes multi-plane (DPl + CPl + MPl)
• IEEE 802.16 ( WiMAX),
• 3G, 4G (LTE, LTE-A), 5G
• Newest: Software Defined Networking (SDN)
o Clear separation ( including physical) :
Data plane (forwarding)- contains Forwading
Elements ( FE)
Control plane - contains centralised Controllers
Figure 1-1 Example of (ITU-T) Multiple Plane architecture- for QoS assurance
In band
- signalling info is part of the associated data traffic( typically presented in a particular header field
of the data packets. –(e.g., the TOS field in IPv4 as in DiffServ and 802.1p)
- Performed in the data plane ⇒ neither introduces additional traffic into the network nor incurs setup
delay for the data traffic.
- not suitable for resource reservation or QoS routing, which needs to be done a priori before data
transmission
- in-band signaling by definition is path-coupled (signaling nodes must be collocated with routers)
Out of band
- signalling info - carried by dedicated packets, separate from the associated data traffic. - introduces
TSAC1-ARS – AWT1-ACNPS-E.Borcoci- UPB -2016-2017 10
TSAC 1- ARS- AWT1-ACNPS Sem I 2016-2017
extra traffic into the network and incurs an overhead for delivering desired network performance
it entails the use of a signaling protocol and further processing above the network layer, which tends
to render slower responses than in-band signaling.
- lends itself naturally to resource reservation or QoS routing.
- depending on whether the signaling path is closely tied to the associated data path, signaling is path-
coupled or decoupled
Path-coupled
- signaling nodes must be collocated with routers
signaling messages - routed only through the nodes that are potentially on the data path.
- advantage of reduced overall signaling processing cost (since it leverages network- layer routing
tasks)
- disadvantage of inflexibility in upgrading routers or in integrating control entities (e.g., policy
servers) not on the data path (or nontraditional routing methods)
If a path-coupled mechanism involves a signaling protocol, routers need to support the protocol and
be able to process related signaling messages
- Example of a path-coupled signaling protocol : RSVP
Path-decoupled
- signaling messages are routed through nodes that are not assumed to be on the data path
only out-of-band signaling may be path-decoupled. (to date, most out-of-band QoS signaling schemes
are path coupled.)
- signaling nodes should be dedicated and separate from routers
- advantage of flexibility in deploying and upgrading signaling nodes independent of routers or in
integrating control entities not on the data path
- disadvantage of added complexity and cost in overall processing and operational tasks.
• SIP is a standardized protocol with its basis coming from the IP community and in most cases
uses UDP or TCP.
• The protocol can be used for setting up, modifying and terminating two-party (unicast), or
multiparty (multicast) sessions consisting of one or more media streams. Modifications can
include changing IP addresses or/or ports, inviting more participants, and adding or deleting
the media streams.
SIP is an application layer control protocol that supports five parts of making and stopping
communications.
It does not provide services, therefore it acts with other protocols to provide these services, one of
which is typically RTP that carries the voice for a call. The five parts of setting up and terminating
calls that SIP handles are:
• User Location: Determines where the end system is that will be used for a call.
• User Availability: Determination of the willingness (availability) of the called party to engage
in a call.
• User Capabilities: Determination of the media and parameters which will be used for the call.
• Session Setup: Establishment of the session parameters from both parties (ringing).
• Session Management: Invoking the services including transfer, termination, and modifying
the sessions parameters.
• User (US)
- entity (human or process) - named by a CST and appropriately identified by PR for
actually requesting/accessing and using the QoS-based services cf. SLAs
- USs are end-users of the services, they can only exist in association with a CST
- may be associated with one or several CST using services according to the agreed
SLAs of the respective CST. (e.g. Company = Customer, End User = employee)
Note: In the current public internet, the majority of users are “subscribers” for Connectivity services
and maybe for a subset of high level services (e.g e-mail)
- frequently there is no SLA concluded for high level services quality; e.g for media
A/V streaming, IPTV, etc.
• this is the case of Over the Top (OTT) services
• OTT are developed on top of the current Internet
• no QoS guarantees
• Cheap cost ( e.g Skype, YouTube, …)
- best effort access to high level services is practised but with no guarantees
FPs services - are mainly offered to IP NPs (link-layer connectivity, interconnect with their peers
FPs differentiation : size of technology deployment means
ANPs - connect CST premises equipment to the SPs or NPs equipment
- own and administer appropriate infrastructure
- may be differentiated by
- technology (e.g. POTS, FR, ISDN, xDSL, WLAN, Ethernet, WiMAX, hybrid)
- their deployment means and their size
- may not be present as a distinct stakeholder in the chain of QoS-service delivery
- may be included in distinct administrative domains, interacting at a business level with SPs
/NPs and/or CSTs
Interactions between Providers
- mainly governed by the legislations of the established legal telecom regulation framework
- may follow a customer-provider and/or a consumer-producer paradigm on the basis of
SLAs
Reseller (RS)
- intermediaries in offering the QoS-based services of the PRs to the CSTs
- offer market-penetration services (e.g. sales force, distribution/selling points) to PRs for
promoting and selling their QoS-based services in the market
- may promote the QoS-based services of the PRs either 'as they are' or with 'value-added',
however adhering to the SLAs of the services as required by the 'Providers'
- interact with :
• CSTs on a customer-provider paradigm (SLA based)
• PRs based upon respective commercial agreements..
Different types RSs:
- according to whether they introduce value-added or not
- their market penetration means
- size ( # of of points of presence and/or sales force)
RSs examples: Dealers, electronic/computers commercial chains, service portals
Service Plane
Inter-domain
manager
Management Plane
Control Plane
Data Plane
CC ANP NP SP CP/CS
• Any actor might have one or several functionalities depenfing on its role in the overall
architecture.
SLA
• it is a contract : documented result of a negotiation between a customer and a provider
of a service that specifies the levels of availability, serviceability, performance,
operation or other attributes of the transport service
• SLA contains technical and non-technical terms and conditions
• May be established offline or online (using negotiation oriented-protocols)
Example of an SLS between HLSP and NP for a connectivity service having QoS guarantees- to
transport multimedia flows
Content
Provider
HIGH LEV EL
(H IGH LEVEL) SERV IC E
RESELLER
SERV IC E PRO VID ER N
PRO VIDER 1
.....
IP NETW O RK IP NETW O RK
CUSTO M ER ..... PRO VID ER M
PR OVIDER 1
PHYSICA L PHYSICA L
USER
CO NNEC TIV ITY ..... CON NEC TIV ITY
USER PR OVIDER 1 PRO VIDER P
USER
M ay be joined
PRO VIDER /
within the same
O PER ATOR 1
entity
Figure 1-5 Generic IP Business Model (I) - and business relationships (SLA)
SER V IC E 1 C O N TE N T
P R O V ID ER M A N A G ER
3.n
3.1 3.2
3.1
5
3.2 … 3.n 2
IP N E TW O R K
IP N E TW O R K P R O V ID ER N
P R O V ID ER N 6 D ata
C O N TE N T
SER V ER
C U STO M ER P H Y SIC A L
PH Y SIC A L
C O N N EC TIV IT Y
C O N N EC TIV IT Y …
P R O V ID ER
PR O V ID ER C O N TE N T
P R O V ID ER
U SER PR O V ID ER
P R O V ID ER
Figure 1-6 Example: IP Business Models (II) - Hub model and Cascade model
1.3.2 Novel BMs and actors (in the perspective of Future Internet)
Basic Characteristics
• On-demand self-service ( “pay as you go” concept)
• Broad network access
• Resource pooling
TSAC1-ARS – AWT1-ACNPS-E.Borcoci- UPB -2016-2017 19
TSAC 1- ARS- AWT1-ACNPS Sem I 2016-2017
• Rapid elasticity.
• Measured service.
Service Models
Software as a Service (SaaS): consumer can use the provider’s applications running on a cloud
infrastructure
Platform as a Service (PaaS): consumer can deploy onto the cloud infrastructure consumer-
created or acquired applications created using programming languages, libraries, services, and
tools supported by the provider.
Infrastructure as a Service (IaaS): consumer can provision processing, storage, networks, and
other fundamental computing resources.
Deployment Models
Private cloud; Community cloud; Public cloud; Hybrid cloud
NIST cloud computing reference architecture identifies the major actors, their activities and
functions in cloud computing.
The diagram depicts a generic high-level architecture and is intended to facilitate
- the understanding of the requirements,
- uses,
- characteristics and
- standards of cloud computing.
Five major actors: cloud consumer(ClCs), cloud provider(ClP), cloud carrier(ClCr), cloud auditor
(ClA) and cloud broker(ClBr).
Each actor is an entity (a person or an organization) that participates in a transaction or process and/or
performs tasks in cloud computing (Table 1).
Actor Definition
Cloud Consumer (ClC) A person or organization that maintains a business relationship with, and
uses service from, Cloud Providers.
Cloud Provider (ClP) A person, organization, or entity responsible for making a service
available to interested parties.
Cloud Auditor (ClA) A party that can conduct independent assessment of cloud services,
information system operations, performance and security of the cloud
implementation.
Cloud Broker (ClB) An entity that manages the use, performance and delivery of cloud
services, and negotiates relationships between Cloud Providers and Cloud
Consumers.
Cloud Carrier ( ClCr) An intermediary that provides connectivity and transport of cloud services
from Cloud Providers to Cloud Consumers.
• ClCs need SLAs to specify the technical performance requirements fulfilled by a cloud
provider.
• SLAs : quality of service, security, remedies for performance failures.
• A ClP may also list in the SLAs a set of promises explicitly not made to consumers, i.e.
limitations, and obligations that ClCs must accept.
• A cloud consumer can freely choose a ClP with better pricing and more favorable terms
• Typically a ClP’s pricing policy and SLAs are non-negotiable, unless the customer expects
heavy usage and might be able to negotiate for better contracts.
Depending on the services, activities and usage scenarios can be different among cloud consumers.
Control flow
Data Plane
Control Plan
Control Resurse
Inter & Intra domain
Stratum: Transport
Inter-domain
Resources and traffic Mng.
Access & “Core”
Intra-domain
Resources and traffic Mng.
Access & “Core”
SM&RM SM&RM
NP1 NP2
Content
Consumers
NP3 Content
Server
QoS dynamic
adaptation loop
ENTHRONE Content
Consumers
AN
NP1 NP2
Content
Provider QoS quasi-static
resource provisioning
• Standardization Players
• ATIS NGN FG: Alliance for Telecommunication Industry Solutions, Next Generation Networks
Focus Group - USA
• ITU-T NGN FG: International Telecommunication Union (Telecom), Next Generation Networks
Focus Group
• ETSI TISPAN: European Telecommunications Standards Institute, Telecoms & Internet
converged Services & Protocols for Advanced Networks
• 3GPP: Third Generation Partnership – standardization in Mobile 3G networks
NGN
• packet-based network
• able to provide Telecommunication multiple services
• able to make use of multiple broadband,
• QoS-enabled transport technologies
• service-related functions are independent from underlying transport-related technologies.
• enables unfettered access for users to networks and to competing service providers and/or services
of their choice.
• supports generalized mobility which will allow consistent and ubiquitous provision of services to
users.
Note: Classical Internet cannot respond in very controllable manner to the above requirements
NGN characteristics
Management
SCN Applications and Plane
Service Level
Control
Plane
Transport Level
INTERNET User (Data)
Plane
Access Functions
- manages end-user access to the network
- access-technology-dependent ( W-CDMA, xDSL, Cable access, Ethernet, optical, etc.)
Edge Functions —used for traffic processing when access traffic is merged into the core network.
Core Transport Functions (Data Plane) - information transport throughout the core network.
- differentiate the quality of transport in the network, according to interactions with the
transport control functions.
- provide QoS mechanisms dealing directly with user traffic: buffer management, queuing
and scheduling, packet filtering, traffic classification, marking, policing and shaping, gate control, and
firewalls.
- provide AC and gate control functionalities, including control of network address and port
translation (NAPT) and differentiated services field code points (DSCPs).
- AC involves checking authentication based on user profiles, through the network attachment
control functions.
- It also involves authorization based on user profiles, (cf. operator-specific policy
rules and resource availability: AC function verifies whether a resource request (e.g., for
bandwidth) is allowable given the remaining resources, as opposed to resources that are
already provisioned or used).
The RACFs interact with transport functions to control one or more of the following functionalities
in the transport layer: packet filtering, traffic classification, marking and policing, bandwidth
reservation and allocation, NAPT, antispoofing of IP addresses, NAPT/FW traversal, and usage
metering.
Gateway Functions
- provide capabilities to interwork with other networks: e.g. PSTN, ISDN-based networks and
the Internet.
- support interworking with other NGNs belonging to other administrators.
- The NNI for other networks applies to both the control and transport levels, including border
gateways.
- Interactions between the control and transport levels may take place directly or through the
transport control functionality.
Media Handling Functions —media resource processes for providing services, such as generating
tone signals, transcoding, and conference bridging.
Service and Sessions Control Functions —session control functions, a registration function, and
authentication and authorization functions at the service level. They can include functions controlling
media resources (i.e., specialized resources).
Application Functions —
- NGNs support open APIs enabling third-party service providers to apply NGN capabilities
to create enhanced services for NGN users.
- All application functions (both trusted and untrusted) and third-party service providers
access NGN service stratum capabilities and resources through servers or gateways in the service
stratum.
- enable the NGN operator to manage the network and provide NGN services with the
expected quality, security, and reliability.
- These functions are allocated in a distributed manner to each functional entity (FE).
- They interact with network element (NE) management, network management, and service
management FEs.
Figure 1-19 Layered Architectural Management Model and Function Areas (FCAPS)
End note]
These functions interact with each other in the NGN to collect accounting information, which provides
the NGN operator with resource utilization data enabling the operator to properly bill users.
The charging and billing functions support the collection of data for both later processing (offline
charging) and near-real-time interactions with applications such as those for prepaid services (online
charging).
The interfaces to the end user are both physical and functional (control) interfaces,
No assumptions are made about the diverse customer interfaces and customer networks that
may be connected to the NGN access network.
All customer equipment categories are supported in the NGN, from singleline legacy
telephones to complex corporate networks.
End-user equipment may be either mobile or fixed.
Control
API
Plane
Control Network OS
Network Services Layer
( decoupled control logic)
Infrastructure Layer
Abstraction layer
Network Data
Network …
Element Plane
Element
Flow Table
Switch
Advantages
Centralization allows:
To alter network behavior in real-time and faster deploy new applications and network
services (hours, days not weeks or months as today).
flexibility to configure, manage, secure, and optimize network resources via dynamic,
automated SDN programs ( not waiting for vendors) .
SDN control and applications layers, business apps can operate on an abstraction of the
network, leveraging network services and capabilities without being tied to the details of their
implementation
Manage the entire network : intelligent orchestration and provisioning systems
ONF studies open APIs to promote multi-vendor management:
possibility for on-demand resource allocation, self-service provisioning,
truly virtualized networking, and secure cloud services.
Control Program
Application Application Application
Routing Traffic engineering QoS control
Abstract
API Network
view
Network Virtualization
Consistent updated
global
network view
Network OS
Control
Plane
Open I/F to Packet
Forwarding
e.g. OpenFlow
Swich/
Router
Swich/
Router Swich/
Router
Swich/ Forwarding
Router
Swich/ Data
Router Swich/ Plane
Flow Router
Table
Network OS:
Distributed system that creates a consistent, updated network view
Executed on servers (controllers) in the network
Examples: NOX, ONIX, HyperFlow, Floodlight, Trema, Kandoo, Beacon, Maestro,..
Uses forwarding abstraction in order to:
Collect state information from FE
Generate commands to FE
OpenFlow summary
the first SDN standard communications: CPl-DPl I/F
allows direct access to the Fwd. Plane of network devices (FE = switches and routers),
both physical and virtual (hypervisor-based)
allows to move CPl out of the FEs to logically centralized control software
Flow concept : to identify network traffic based on pre-defined match rules that can
be statically or dynamically programmed by the SDN control SW
allows IT admin to define how traffic should flow through FEs based on parameters
such as usage patterns, applications, and cloud resources
“OpenFlow Switch”
Specification scope
Router/
Switch
OpenFlow OpenFlow
Protocol
SW
Secure
channel
SSL
Controller
HW Flow
Table
2.1 Introduction
• Types of networks ( geographical span)
• Traditional: LAN MAN WAN
• Newer : PAN, BAN, Inter-plenetary (DTN)
Inter-planetary
WAN
MAN
LAN
PAN
BAN
1G networks
(NMT, C-Nets, AMPS, TACS)
• first analog cellular systems, ~1980s.
• before that, there were radio telephone systems
• conceived and designed for voice calls only with almost no consideration of data services
(with the possible exception of built-in modems in some headsets)
• data: 2.4kbps.
(-) Poor Voice Quality ; Poor Battery Life; Large Phone Size; No Security; Limited
Capacity
2G networks
(GSM, CDMAOne, D-AMPS) ~1991
• circuit switching technologies
• first digital cellular systems, ~1990s (network's switching station are digital)
• voice, data
• improved sound quality, better security and higher total capacity.
• circuit-switched data (CSD), allowing users to place dial-up data calls digitally,
• low data rates on temporal channels ( ~64kbps)
• SMS service
(-) These systems are unable to handle complex data such as Videos
2.5G networks
(GPRS, CDMA2000 1x)
• enhanced 2G versions with theoretical data rates up to about 144kbit/s.
• GPRS offered the first always-on data service
• 2.5G bridgeds 2G to 3G; it has faster and higher-capacity data transmission
• 2.5G has advances aiming to 3G networks (including packet-switching)
• 2G and 3G have been officially defined as wireless standards by the (ITU); however 2.5G
has not been defined like std. and was interim solution- market driven
• 2.5 G includes Enhanced Data rates for GSM Evolution (EDGE -part of the GSM family) and
CDMA 2000 1X; at times these technologies are called 3G as they both meet some of the ITU
requirements for 3G standards.
• Phone, e-mail, data, camera phones, web browsing – services
• 6-9 mins. to download a 3 mins. MP3 song
•
3G networks ( ~ 2000)
(UMTS FDD and TDD, CDMA2000 1x EVDO, CDMA2000 3x, TD-SCDMA, Arib WCDMA,
EDGE, IMT-2000 DECT)
• newer cellular networks that have data rates of 384kbit/s and more.
• UN's ITU IMT-2000 standard requires stationary speeds of 2Mbps and mobile speeds of
384kbps for a "true" 3G.
• 3G systems belong to ITU’s Int’l Mobile Telecommunications 2000 (IMT-2000)
• Services:
o 3G : faster data trs. speeds, greater network capacity, advanced network services
o Data 144kbps - 2Mbps
o Video Conferencing / 3D Gaming
o TV Streaming/ Mobile TV/ Phone Calls
o Large Capacities and Broadband Capabilities
o 11 sec – 1.5 min. time to download a 3 min Mp3 song
o High Speed Web / More Security
[ Note:
HSPA denotes:
HSDPA:
• upgrade of WCDMA (<14 Mbit/s with significantly reduced latency)
• based on shared channel transmission and its key features are shared channel and multi-code
transmission, higher order modulation short transmission time interval (TTI), fast link
adaptation and scheduling along with fast hybrid automatic repeat request (HARQ).
HSUPA
• WCDMA UL upgrade ( 3GPP Release 6); it is usually only a software update.
• Enhanced UL adds a new transport channel to WCDMA: Enhanced Dedicated Channel (E-
DCH).
o It supports new applications : VoIP, uploading pictures and sending large e-mail
messages.
• The enhanced UL data rate is <5.8 Mbit/s, and also reduces latency.
• improvements are similar to HSDPA: multi-code transmission, short Transmission Time
Interval (TTI), fast scheduling and fast HARQ Hybrid Automatic Repeat reQuest
4G technology
• 4G is defined by the ITU and its Radiocomm Sector (ITU-R) and established as an agreed
upon and globally accepted definition in IMT-Advanced
• September 2009, ITU
o LTE – Long Term Evolution standardized by the 3GPP
o WiMAX - 802.16m standardized by the IEEE (i.e. mobile WiMAX)
NOTE:
• LTE is commonly marketed as 4G LTE, but it does not meet the technical criteria of a 4G,
as specified in the 3GPP Release 8 and 9 document series, for LTE Advanced.
• The requirements were originally set forth by the ITU-R organization in the IMT Advanced
specification.
• However : marketing pressures and the significant advancements that WiMAX, Evolved
HSPA and LTE bring to the original 3G technologies ITU later decided that LTE
together with the aforementioned technologies can be called 4G technologies.
• The LTE Advanced standard formally satisfies the ITU-R requirements to be considered IMT-
Advanced.
• To differentiate LTE Advanced and WiMAX-Advanced from current 4G technologies, ITU
has defined them as "True 4G".
History
In Release 10, 3rd Generation Partnership Project (3GPP) addressed the IMT-Advanced
requirements in a version of LTE, called LTE-Advanced, for which specifications became available in
2011.
WiMAX addressed the IMT-Advanced requirements in a version called Mobile WiMAX 2.0, specified
in IEEE 802.16m.
WiMAX and Long-Term Evolution (LTE) standards - generally accepted to succeed both
CDMA2000 and GSM,
• labeled as "4G technologies,"
• but that's only partially true:
o they both make use of a newer, extremely efficient multiplexing scheme (OFDMA, as
opposed to the older CDMA or TDMA),
o however, WiMAX tops at around 40Mbps and LTE at around 100Mbps theoretical
speed;
they don't fully comply with the planned requirements of 1 Gbps for
stationary reception and 100 Mbps for mobile.
o Practical, real-world commercial networks using WiMAX and LTE range between
4Mbps and 30Mbps.
o Even though the speeed of WiMAX and LTE is lower than values of IMT-
Advanced's standard, they're very different than 3G networks and carriers around the
world refer to them as "4G"’;
The common argument for branding LTE and WiMAX systems as 4G is that
they use different frequency bands to 3G technologies
o Updates to these standards -- WiMAX 2 and LTE-Advanced, respectively -- will
increase througput further, but neither has been finalized yet.
Summary of evolution
1G 2G 2.5G 3G 4G
5G Vision
5G - evolution of mobile broadband networks + new unique network and service capabilities:
It will ensure user experience continuity in various situations
- high mobility (e.g. in trains)
- very dense or sparsely populated areas
It will integrate networking, computing and storage resources into one programmable and
unified infrastructure.
• optimized and more dynamic usage of all distributed resources
• convergence of fixed, mobile and broadcast services.
• support multi tenancy models, enabling players collaboration
• leveraging on the characteristic of current cloud computing -> the single digital
market further,
Additional requirements:
sustainable and scalable technology.
energy consumption reduction and energy harvesting
cost reduction through human task automation and hardware optimization
ecosystem for technical and business innovation.
Application fields: network solutions and vertical markets: automotive, energy, food and agriculture,
city management, government, healthcare, manufacturing, public transportation, and so forth.
5G disruptive capabilities
- connection of many devices simultaneously and to improve the terminal battery capacity
life
- help citizens to manage their personal data, tune their exposure over the Internet and
protect their privacy.
- reduce service creation time and facilitate the integration of various players delivering parts
of a service
Design principles
• adapt to a broad range of usage requirements and deliver converged services preserving
security and privacy across a versatile architecture with unified control of any type of ICT
resources.
• enable new business models in a programmable manner; APIs) should be available at different
levels (resources, connectivity and service enablers
Driven by SW
100 X in user data rate reaching a peak terminal data rate ≥ 10Gb/s
1/5 X in end-to-end latency reaching 5 ms for e.g. tactile Internet and radio link latency reaching
a target ≤ 1 ms for e.g. Vehicle to Vehicle communication
MSC EIR
BSC
HLR
VLR
C
AUC
BTS
GMSC
TRX
MSC
MT
VLR
C OMC
MT PLMN
Uplink and
downlink
PSTN
ISDN/IN
TRX – Transceiver
BSC Base Station Controller
GSM MT - Mobile Terminal = Terminal Equipment (TE) + Terminal Adapter (TA) Mobile
Station (MS)
- TE, TA may be missing
BSS ( Base Station Subsystem)
BTS - Base Transceiver Station (including antenna)
- receives / sends data units from / to MN via radio interface
BSC - Base Station Controller
- controls radio network specific signaling
- manages radio network resources
NSS – Network Switching Subsystem
• MSC - Mobile Services Switching Center: routing, signaling, collection of charging
info, mobility management
• GMSC - (Gateway) Mobile Services Switching Center: data and signalling
translation to be compatible to external networks (ISDN, PSTN, ...)
• HLR – Home Location Register: storage of subscriber profiles e.g. for authentication
/ authorisation; storage of current MSC
• VLR - Visited Location Register: temporary storage of data on subscribers currently
attached to an MSC
OSS (Operation Subsystem)
AUC – Authentication Center, EIR - Equipment Identity Register
OMC - Operation and Maintenance Center
Um AUC
BSC HLR
BTS EIR
MT MSC
BSC GMSC
VLR IWF
OMC
BTS BSC
BSS A
GSM PSTN PDN
signalling ISDN
Other Nets
User traffic
GSM Area
PLMN Area ISDN
LA1 GMSC
MSC Area PSTN
MSC/VLR LA2
LA3 MS
C2
C1 C3
C7
C6 C4
C5
Identification:
LA: Location Area Identity code
cell (by MS): BSIC ( Base Station Identity Code)
Mapping to SIM
The SIM stores permanent and temporary data about the mobile, the subscriber and the network,
including :
• International Mobile Subscribers Identity (IMSI)
TSAC1-ARS – AWT1-ACNPS-E.Borcoci- UPB -2016-2017 47
TSAC 1- ARS- AWT1-ACNPS Sem I 2016-2017
When a subscriber registers with a network operator, a unique IMSI identifier is issued and stored in
the SIM of the MS as well as in the HLR .
An MS can only function fully if it is operated with a valid SIM inserted into an MS with a valid
IMEI. IMSI consist of three parts:
The MSISDN represents the ‘true’ or ‘dialled’ number associated with the subscriber. It is assigned to
the subscriber by the network operator at registration and is stored in the SIM.
• The MSRN is a temporary, location-dependent ISDN number issued by the parent VLR to all
MSs within its area of responsibility.
• It is stored in the VLR and associated HLR but not in the MS.
• The MSRN is used by the VLR associated MSC for call routing within the MSC/VLR service
area.
BTS :
• provide radio access to the mobile stations
• manage the radio access aspects of the system
BTS contains:
• Radio Transmitter/Receiver (TRX)
• Signal processing and control equipment
• Antennas and feeder cables
BSC:
• allocates a channel for the duration of a call
• maintains the call:
monitors quality
controls the power transmitted by the BTS or MS
generates a handover to another cell when required
Access network
-is a connection between MS and NSS,
- comprise of BTSs & BSCs.
- It is responsible for radio management.
BSS Interfaces
External I/Fs
• Air I/F: Radio I/F BTS --- Mobile to supports frequency hopping and diversity.
Internal I/Fs
Abis Interface
A-bis is used if the BTS and BSC are not combined (otherwise, BS interface will be used)
Several frame unit channels are multiplexed on the same PCM support and BSC and BTS can
be remote from each other.
Abis main functions:
• Conversion of 260 – bit encoded blocks (corresponding to 160 x (8 – bit) samples for 20ms)
• Encoded block synchronization
• Vocal activity detection
• Alarm dispatch to BSC via PCM
• Test loop back operation
NSS : all the major activities like switching of calls, routing, security functions, call handling,
charging, operation & maintenance, handover decisions.
Call routing between MSCs is taken via existing PSTN or ISDN networks.
Difference between a MSC and an exchange in a fixed network is - MSC has to take into account the
impact of the allocation of radio resources and the mobile nature of the subscribers and has to perform
in addition, at least the following procedures:
• required for location registration
• required for handover
• GSM frequencies
• Originally designed on 900MHz range, now also available on 800MHz, 1800MHz and 1900
MHz ranges.
• Separate Uplink and Downlink frequencies
– One example channel on the 1800 MHz frequency band, where RF carriers are space
every 200 MHz
Low cell
F1 interference
F2
F3
F3
F1
F2
F2
F3
Figure 2-11 Simple allocation of carrier frequencies for cells ( F1, F2, F3)- to avoid interference
RIL3-CM
RIL3-CM Protocol CM
Protocol MM RIL3-MM MAP/E
RIL3-
MM MAP/G
7 OSI-RM
BSSAP BSSAP
DTAP
RIL3- Releu
DTAP BSSMAP DTAP
RR RIL3_RR BSSMAP
Relay
TCAP
Distrib RIL3_RR RSM RSM Distribution Distribution
SCCP SCCP
3 3 3 3
SS7 components:
MTP – Message Transport Part ( SS7)
LAPD – Link Access Protocol for D channel – layer 2 for ISDN
LAPDm – modification of LAPD for mobility
SCCP - Signalling Connection Control Part (CO mode for L3)
TCAP – Transaction Capabilities App. Part
MAP – Mobile Appl. Part
(*1)
GMSC (3)
HLR BTS
PSTN (2) (9)
(5)
(8)
Transit (6a) (4) (9)
Center BTS
MSC/VLR BSC
(6b) MS
(7)
(9)
PLMN BTS
• The related specifications were formally known as the evolved UMTS terrestrial radio access
(E-UTRA) and evolved UMTS terrestrial radio access network (E-UT RAN).
• First version of LTE : Release 8 of the 3GPP specs.
• Why LTE?? : A rapid increase of mobile data usage and emergence of new applications such
as MMOG (Multimedia Online Gaming), mobile TV, Web 2.0, streaming contents 3GPP
worked on the LTE for 4G mobile.
Main goals:
• high data rate, low latency and packet optimized RAT supporting flexible bandwidth
deployments; support packet-switched traffic with seamless mobility and QoS
Evolution:
Mar 2000 Release 99 - UMT S/WCDMA
Mar 2002 Rel 5 - HSDPA
Mar 2005 Rel 6 - HSUPA
Year 2007 Rel 7 - DL MIMO, IMS (IP Multimedia Subsystem)
Nov 2004 Work start on LT E specs
Jan 2008 Spec finalized and approved with Release 8
2010 First deployment
• ~ 50 times perf. improvement and much better spectral efficiency to cellular networks.
• high data rates: 300 Mbps peak DL and 75 Mbps peak UL
- data rates > 300Mbps can be achieved in a 20 MHz carrier, under very good signal
conditions.
• support for services : VOIP, streaming multimedia, videoconf., high-speed cellular
modem.
• duplex modes: both TDD and FDD mode.
• supports flexible carrier bandwidths, from 1.4 - 20 MHz as well as both FDD and T DD.
- scalable carrier bandwidth from 1.4 MHz up to 20 MHz ; the bandwidth used depends
on the frequency band and the amount of spectrum available with a network operator.
• All LTE devices have to support MIMO transmissions,
- (BS can transmit several data streams over the same carrier simultaneously).
• All I/Fs between network nodes in LTE are IP based, including the backhaul connection to
the radio base stations.
- Significant simplification compared to earlier technologies initially based on E1/T 1,
ATM and frame relay links, (most of them have been narrowband and expensive).
• QoS mechanism have been standardized on all I/Fs to ensure that the requirement of voice
calls for a constant delay and bandwidth, can still be met when capacity limits are reached.
• Works with GSM/EDGE/UMTS systems utilizing existing 2G and 3G spectrum and new
spectrum.
• Supports handover and roaming to existing mobile networks.
LTE Advantages
• High throughput
• Low latency (time required to connect to the network is ~ 102 ms and power saving states can
now be entered and exited very quickly).
• FDD and TDD in the same platform:
• Superior QoE : Optimized signaling for connection establishment and other air interface and
mobility management procedures have further improved the user experience. Reduced latency
(to 10 ms) for better user experience.
• Seamless connection to existing networks such as GSM, CDMA and WCDMA.
• Plug and play: no need to manually install drivers for devices.
o The system automatically recognizes the device, loads new drivers for the hardware if
needed, and begins to work with the newly connected device.
• More simple architecture: lower operating expenditure (OPEX) - versus 2G, 3G
LTE - QoS
• LTE supports E2E hard QoS, with guaranteed bit rate (GBR) for radio bearers.
• Various levels of QoS can be applied to LTE traffic for different applications.
• Because the LT E MAC is fully scheduled ( mnot random access) QoS is a natural fit.
• Evolved Packet System (EPS) bearers provide 1-to-1 correspondence with RLC radio
bearers and provide support for Traffic Flow Templates (TFT).
o There are four types of EPS bearers:
GBR Bearer: resources permanently allocated by admission control
Non-GBR Bearer no admission control
Dedicated Bearer associated with specific TFT (GBR or non-GBR)
Default Bearer Non GBR, catch-all for unassigned traffic
Parameters Description
Frequency range UMTS FDD bands and TDD bands defined in
36.101(v860) –Table 3-2 given below
Duplexing FDD, TDD, half-duplex FDD
Mobility < 350 km/h
Channel Bandwidth (MHz) 1.4; 3; 5; 10; 15; 20
T ransmission Bandwidth 6;15;25;50;75;100
Table 3-2 E-UTRA operating bands taken from LTE Sepecification 36.101(v860)
• E-UTRAN handles the radio communications between the mobile and EPC
o has one component, the evolved base stations, called eNodeB or eNB.
o Each eNB is a BS that controls the mobiles in one or more cells.
• The BS that is communicating with a mobile is known as its serving eNB.
• LTE Mobile communicates with just one BS and one cell at a time
o But may be aware about communication chanel status of other eNBs
• Two main eNB functions:
o sends and receives radio transmissions to mobiles using the analogue and DSP
functions of the LTE air I/F.
o controls the low-level operation of all its mobiles, by sending them signalling
messages such as handover commands.
• Each eNB is connected to
o EPC by S1 I/F
o (it can be) to nearby base stations by the X2 I/F (used for signalling and packet
forwarding during handover).
• A home eNB (HeNB) is a BS that has been purchased by a user to provide femtocell
coverage within the home.
o A home eNB belongs to a closed subscriber group (CSG) and can only be accessed
by mobiles with a USIM that also belongs to the closed subscriber g roup.
Several components have not been shown in the diagram to keep it simple e.g.
Earthquake and Tsunami Warning System (ETWS),
Equipment Identity Register (EIR)
Policy Control and Charging Rules Function (PCRF))
• Packet Data Network (PDN) Gateway (P-GW) communicates with the outside world i.e.
using SGi interface.
o Each packet data network is identified by an access point name (APN).
o PDN gateway role – is similar as the
GPRS support node (GGSN)
• Serving gateway (S-GW) acts as a router, and forwards data between the BS and the PDN
gateway.
Similar role to the serving GPRS support node (SGSN) with UMTS and GSM.
RB – Radio Bearer
NAS – Non Access Stratum
Evolved Packet System (EPS) describes the evolution of the 3G/UMTS standard introduced by the 3rd
Generation Partnership Project (3GPP) standard committee.
This topic is looked at from a system perspective, from the radio interface to network and
service architecture.
Many standards have been defined about EPS.
Following table compares various important Network Elements & Signaling protocols used in 2G/3G
and LTE.
FA Foreign Agent
HA Home Agent
MIP Mobile IP
PMIP Proxy MIP
2. Home Agent.
A router on a MN home network that tunnels datagrams for delivery to the MN when it is
away from home, and maintains current location information for the mobile node.
3. Foreign Agent.
A router on a MN’s visited network providing routing services to the MN while registered.
FA detunnels and delivers datagrams to the MN that were tunneled by the mobile node’s HA
For datagrams sent by a MN the FA may serve as a default router for registered MNs.
• Address Autoconfiguration
o Stateless autoconfiguratoin
Network Prefix + Interface ID
o Stateful autoconfiguration
DHCPv6
• Neighbor Discovery
o Discover each other’s presence and find routers
o Determine each other’s link-layer addresses
o Maintain reachability information
• Extension Headers
o Routing header
For route optimization
o Destination Options header
For mobile node originated datagrams
Proxy Mobile IPv6 (or PMIPv6, or PMIP) is a network-based mobility management protocol
standardized by IETF and is specified in RFC 5213.
It is a protocol for building a common and access technology independent of mobile core networks,
accommodating various access technologies such as WiMAX, 3GPP, 3GPP2 and WLAN based access
architectures.
Proxy Mobile IPv6 is the only network-based mobility management protocol standardized by
IETF.
PMIPv6 solution:
•PMIPv6 (RFC5213) is completely transparent to mobile nodes (use of a „proxy“ to do the
handoff work).
•PMIPv6 is meant to be used in localized networks with limited topology where handoff
signalling delays are minimal.
• Roaming = the user moves and uses the resources of other PLMN (Visited-PLMN).
• A roaming user is connected to the E-UTRAN, MME and S-GW of the visited LTE
network.
• However, LTE/SAE allows the P-GW of either the visited or the home
network to be used
• The home network's P-GW allows the user to access the home operator's services even
while in a visited network.
• A P-GW in the visited network allows a "local breakout" to the Internet in the visited
network.
• The I/F between the serving and PDN gateways is as S5/S8.
o slightly different implementations,
S5 if the two devices are in the same network,
S8 if they are in different networks.
Tracking areas
• MME pool areas and the S-GW service areas are both made from smaller, non-overlapping
units known as tracking areas (TAs).
• They are similar to the location and routing areas of UMTS and GSM and will be used to track
the locations of mobiles that are on standby mode.
Network IDs
• The network is identified using Public Land Mobile Network Identity (PLMN-ID) having
o three digit mobile country code (MCC)
o and a two or three digit mobile network code (MNC).
o PLMN-ID = MCC, MNC
MME IDs
Each MME has three main identities.
• An MME code (MMEC) uniquely identifies the MME within all the pool areas.
• A group of MMEs is assigned an MME Group Identity (MMEGI) which works along with
MMEC to make MME identifier (MMEI).
• A MMEI uniquely identifies the MME within a particular network.
• MMEI = MMEGI, MMEC
If we combine PLMN-ID with the MMEI then we arrive at a Globally Unique MME Identifier
(GUMMEI), which identifies an MME anywhere in the world:
• GUMMEI = PLMN-ID, MMEI
Adding the MME code in M-TMSI results in a S temporary mobile subscriber identity (S-TMSI),
which identifies the mobile within an MME pool area.
• S-TMSI= MMEC, M-TMSI
Finally adding the MME group identity and the PLMN identity with S-TMSI results in the
Globally Unique Temporary Identity (GUTI).
• GUTI= PLMN-ID, MMEGI, S-TMSI
User plane : transports the data packets ; the stack is : appl., TCP, UDP, IP, etc
Control plane: Radio resource control (RRC) protocol – via signalling messages BS- MN
• Packets in the core network (EPC) are encapsulated in a specific EPC protocol and
o Tunnelled between the P-GW and the eNodeB.
• Different tunneling protocols are used depending on the interface.
• On the S1 and S5/S8 I/Fs it is used GPRS Tunneling Protocol (GTP)
• SDUs and PDUs are defined in details in the standards
CPl
includes additionally the Radio Resource Control layer (RRC), responsible for configuring
the lower layers.
handles radio-specific functionality which depends on the UE state (idle or connected)
Idle UE
• UE associates itself to a cell
o following a cell selection or reselection process based on parameters like radio link
quality, cell status and also on radio access technology
• UE also monitors a paging channel to detect incoming calls and acquires system
information.
• CPl runs cell selection and reselection procedures.
Connected UE
• UE supplies the E-UT RAN with DL channel quality and neighbor cell information to enable
the E-UT RAN to select the most suitable cell for the UE.
o CPl includes the Radio Resource Control (RRC) protocol.
• The lower layers : the same functions as for the user plane; but no header compression
function
•
Designed initially to transport PSTN signaling messages over IP networks, but is capable
of broader applications.
• demultiplexing of MAC SDUs from one or different logical channels from transport blocks
(TB) delivered from the PHY on transport channels
• scheduling information reporting
• error correction through HARQ
• priority handling between UEs by means of dynamic scheduling
• priority handling between Logical channels of one UE, LogicalChannel prioritization.
Note:
Signalling Radio Bearers" (SRBs) are defined as Radio Bearers (RB) that are used only for the
transmission of RRC and NAS messages.:
(1) SRB0 is for RRC messages using the CCCH logical channel;
(2) SRB1 is for RRC messages (which may include a piggybacked NAS message)
as well as for NAS messages prior to the establishment of SRB2, all using DCCH logical channel;
• they form the highest stratum of the CPl between the user equipment (UE) and MME.
• support the mobility of the UE and the session management procedures to establish and
maintain IP connectivity between the UE and a PDN GW.
NAS is a functional layer in the UMTS and LTE wireless telecom protocol stacks between the
core network and user equipment.
- used to manage the establishment of communication sessions and for maintaining
continuous communications with the user equipment as it moves
- The NAS is defined in contrast to the Access Stratum which is responsible for
carrying information over the wireless portion of the network
- NAS is a protocol for messages passed between the UE, and Core Nodes
RLC layer
• may aply segmentation of the SDUS to make smaller RLC PDUs.
• May pack SDUs in larger PDUs
• adds header based on RLC mode of operation.
• submits these RLC PDUs (MAC SDUs) to the MAC layer.
LTE uses several different types of logical, transport and physical channel, for different info types
and processing
Logical Channels:
• Define info type which is transmitted over the air, e.g . traffic/control channels,
system broadcast, etc.
• Data and sgn. messages are carried on logical channels between the RLC and MAC
Transport Channels:
• Define how is data transmitted over the air
o e.g . what are encoding, interleaving options used to transmit data
• Defined between the MAC and PHY
Physical Channels:
• Define where is something transmitted over the air, e.g . first N symbols in the DL
frame.
• Data and sgn. messages are carried on PHY channels between the different levels of
the PHY
Transport Channeles
• define how and with what type of characteristics the data is transferred by the PHY layer.
• are distinguished by the ways in which the transport channel processor manipulates them.
The transport channel processor composes several types of control information, to support the low-
level operation of the physical layer.
Table 3-6 Transport channels information
Physical Channels
• Physical Data Channels
• Physical Control Channels
OFDM
• LTE uses OFDM ( based on digital multi-carrier modulation method) for the DL to
overcome the effect of multi path fading problem available in UMTS
o to transmit the data over many narrow band careers of 180 KHz each
• OFDM meets the LTE requirement for spectrum flexibility and enables cost-efficient
solutions for very wide carriers with high peak rates.
• The basic LTE DL PHY resource can be seen as a time-frequency grid,
• The OFDM symbols are grouped into resource blocks.
o The resource blocks have a total size of 180kHz in the frequency domain and 0.5ms
in the time domain.
o Each 1ms Transmission Time Interval (TTI) consists of two slots (T slot)
• Each user is allocated a number of so-called resource blocks in the time.frequency grid.
• The more resource blocks a user gets, and the higher the modulation used in the resource
elements, the higher the bit-rate.
• Which resource blocks and how many the user gets (at a given point in time) depend on
advanced scheduling mechanisms in the F-T dimensions (similar to WiMAX
scheduling) .
• The scheduling mechanisms in LTE are similar to those used in HSPA, and enable optimal
performance for different services in different radio environments.
Additional comments
• The LTE physical resource is a time-frequency resource grid
OFDM Drawbacks
High peak-to-average ratio
Sensitive to frequency offset, hence to Doppler-shift as well.
SC-FDMA Technolog y
• LTE uses in the UL Single Carrier Frequency Division Multiple Access (SC-FDMA)
• to compensate for a drawback with OFDM, which has a very high Peak to Avg.Power
Ratio (PAPR)
• High PAPR requires
o expensive and inefficient power amplifiers with high requirements on linearity
o increases the cost of the terminal and consumes the battery faster.
• SC-FDMA solves this problem by grouping together the resource blocks in such a way that
reduces the need for linearity, and so power consumption, in the power amplifier.
• A low PAPR also improves coverage and the cell-edge performance.
In LTE the number of channels is decreased compare to UMTS. For the user plane there is only one
shared transport channel in each direction. The TB sent on the channel, can therefore contain bits from
a number of services, multiplexed together.
Scalability issues:
Complex network (10**5 network devices in data centers)
TSAC1-ARS – AWT1-ACNPS-E.Borcoci- UPB -2016-2017 80
TSAC 1- ARS- AWT1-ACNPS Sem I 2016-2017
• New trends
Scalability issues:
Complex network (10**5 network devices in data centers)
Multi-tenancy : the network must serve large groups of users with different
applications and needs
Vendor dependency
Carriers/enterprises want rapid response to changing business needs or user demands
They are limited by vendors’ equipment product cycles (years)
Lack of standard, open I/F - limits the network operators ability to tailor the network
to their individual environments
Source: Software-Defined Networking: The New Norm for Networks ONF White Paper April
13, 2012
NETCONF, 2006
IETF Network Configuration WG (still active) : NETCONF defined a management
protocol for modifying the configuration of network devices.
network devices have APIs - (to send /retrieve) configuration data
still - no separation Control/Data Plane
Control
API
Plane
Control Network OS
Network Services Layer
( decoupled control logic)
Infrastructure Layer
Abstraction layer
Network Data
Network …
Element Plane
Element
Flow Table
Switch
Advantages
Centralization allows:
To alter network behavior in real-time and faster deploy new applications and network
services (hours, days not weeks or months as today).
flexibility to configure, manage, secure, and optimize network resources via dynamic,
automated SDN programs ( not waiting for vendors) .
SDN control and applications layers, business apps can operate on an abstraction of the
network, leveraging network services and capabilities without being tied to the details of their
implementation
TSAC1-ARS – AWT1-ACNPS-E.Borcoci- UPB -2016-2017 85
TSAC 1- ARS- AWT1-ACNPS Sem I 2016-2017
Control Program
Application Application Application
Routing Traffic engineering QoS control
Abstract
API Network
view
Network Virtualization
Consistent updated
global
network view
Network OS
Control
Plane
Open I/F to Packet
Forwarding
e.g. OpenFlow
Swich/
Router
Swich/
Router Swich/
Router
Swich/ Forwarding
Router
Swich/ Data
Router Swich/ Plane
Flow Router
Table
Network OS:
Distributed system that creates a consistent, updated network view
Executed on servers (controllers) in the network
Examples: NOX, ONIX, HyperFlow, Floodlight, Trema, Kandoo, Beacon, Maestro,..
Uses forwarding abstraction in order to:
Collect state information from FE
Generate commands to FE
OpenFlow summary
the first SDN standard communications: CPl-DPl I/F
allows direct access to the Fwd. Plane of network devices (FE = switches and routers),
both physical and virtual (hypervisor-based)
allows to move CPl out of the FEs to logically centralized control software
Flow concept : to identify network traffic based on pre-defined match rules that can
be statically or dynamically programmed by the SDN control SW
allows IT admin to define how traffic should flow through FEs based on parameters
such as usage patterns, applications, and cloud resources
“OpenFlow Switch”
Specification scope
Router/
Switch
OpenFlow OpenFlow
Protocol
SW
Secure
channel
SSL
Controller
HW Flow
Table
Commercial switch
OpenFlow capable OpenFlow
SDN
Controller
Traditional Secure
Ctrl. SW channel Server
OpenFlow OpenFlow Farm
& Acces
Traditional Flow Point
DPl Tables
WLAN
eliminate middleboxes (NAT, firewalls, load balancers, access control, DPI, etc.) by
integrating their functionality within the controller
a set of high-level abstractions are proposed that allow admin to update the entire
network
packets are processed in consistent way at network level based on flow concepts
Energy consumption – important in big Data Centers (10-20% for networking) need of
better energy management
Proposal: SDN based Network-wide power management, (elastic tree, savings 20-
65% depending on traffic conditions-have been shown)
Other Issues :OF sometimes excessively centralises control processing while only few “significant"
flows need to be managed bottlenecks in the control communication ( if fine granularity is wanted)
Solutions: proactive policies and wild-card rules, but the cost is paid with less to
manage traffic and gather statistics.
Source: SDN: the service provider perspective, Ericsson Review, February 21, 2013
SDN approach
Dynamic service-chaining
special services use – optimization: selectively steering traffic through
specific services or bypassing them (avoid over-dimensioning-> capex
savings)
Service paths are unidirectional- can be different for upstream and downstream
traffic.
Traffic steering has two phases
1. Classification of the incoming packets; assignment of a service path to
them, based on predefined policies.
2. Packets are then forwarded to the next service, based on the current
position in their assigned service path
No repeating classification is required; hence the solution is scalable.
The dynamic reconfiguration of service chains needs a mechanism to handle notifications sent
from middle-boxes to the controller.
TSAC1-ARS – AWT1-ACNPS-E.Borcoci- UPB -2016-2017 91
TSAC 1- ARS- AWT1-ACNPS Sem I 2016-2017
-e.g. , the DPI engine notifies CE ( via extended OF) that it has recognized a video
flow.
Virtual Network System (VNS) - concept ( source: Ericsson)- environment where one
can apply dynamic service chaining
VNS: domain of the network with centralized CPl (this excludes some traditional
control agents)
API- OpenFlow, controls the forwarders
VNS can create northbound I/Fs APIs to support creation of new features, e.g.
service chaining
The services provided may reside on devices located in different parts of the network, or
within an edge router –e.g. Ericsson’s Smart Services Router (SSR)
Service chains are programmed (cf. operator policies) based on a combination of information
from the different layers (L2-L4. ..)
Dynamic service-chaining (cont’d) - example
Traffic goes first thrugh DPI + FW
After flow type has been determined (DPI) the operator may decide to modify
the services applied to it.
- it may no longer need to pass the FW service after the service type has been detected
- the subsequent packets of the same flow may no longer need to pass the DPI service either (
shorter- blue path)
SDN Solution : BWoD from an OF - SDN architecture with a programmatic north API
operators have centralized, granular control over the networking infrastructure.
Customers can automatically request dynamic changes to bandwidth allocation and other QoS
parameters at the packet and/or optical layers, either immediately or scheduled in the future.
The SDN control layer can leverage topology-aware path computation to cost-effectively
enable bandwidth on demand.
SDN’s global view of network resource supply and customer demands ◊ intelligent and
dynamic BWoD pricing.
An analytics engine could evaluate current supply and demand as well as historical
temporal demand peaks and supply.
Through continual learning of the price elasticity of demand, these adjustments can
become more refined, enabling the analytics engine to maximize network revenue per
bit.
Network virtualization allows operators to leverage the same networking and operational
infrastructure on which they deliver traditional services to create BWoD services and new
billing models.
Action: an operation that forwards the packet to a port, modifies the packet (such as
decrementing the TTL field) or change its state (such as associating it with a queue).
Actions may be specified as part of the instruction set associated with a flow entry or
in an action bucket associated with a group entry.
Actions may be accumulated in the Action Set of the packet or applied
immediately to the packet
Action Bucket: a set of actions and associated parameters in a group. The group will select
one (or more) buckets for each packet.
Action Set: a set of actions associated with the packet that are accumulated while the packet is
processed by each table and that are executed when the instruction set instructs the packet to
exit the processing pipeline
Control Channel: The aggregation of components of an OF logical switch that manage
communication with controllers.
The control channel includes one OF channel per OF controller.
Counter: counts the number of packets and bytes at various specific points of the pipeline,
such as on a port or on a flow entry
Flow: a sequence of packets having one or more fields identical in various headers
( do not associate a flow with a route!)
Flow Entry: an element in a flow table used to match and process packets.
It contains a set of match fields for matching packets, a priority for matching
precedence, a set of counters to track packets, and a set of instructions to apply
Flow Table: a stage of the pipeline. It contains flow entries.
Group: a list of action buckets and some means of choosing one or more of those buckets to
apply on a per-packet basis.
Instruction: are attached to a flow entry and describe the OF processing that happens when a
packet matches the flow entry.
An instruction
OpenFlow (OF) protocol runs over the Secure Sockets Layer (SSL).
Each switch is connected to other OF switches and, possibly, to end-user devices that
are the sources and destinations of packet flows.
In a switch, a series of tables—implemented in HW or firmware—are used to manage
the flows of packets through the switch.
The switch
encapsulates and forwards the first packet of a flow to an SDN controller,
which decides whether the flow should be added to the switch flow table.
It forwards incoming packets out the appropriate port based on the flow table.
• The flow table may include priority information dictated by the
controller.
It can drop packets on a particular flow, temporarily or permanently, as
dictated by the controller.
• Packet dropping can be used for security purposes, to solve Denial-of-
Service (DoS) attacks or traffic management requirements.
An OF Switch contains :
one or more flow tables and a group table, which perform packet lookups and
forwarding,
and an OF channel to an external controller
The controller can add, update, and delete flow entries in flow tables, both reactively
(in response to packets) and proactively.
Flow table : a set of flow entries; each flow entry consists of match fields, counters, and a set
of instructions to apply to matching packets
Matching starts at the first flow table and may continue to additional flow tables
Flow entries match packets in priority order, with the first matching entry in each
table being used.
If a matching entry is found, the instructions associated with the specific flow entry
are executed.
If no match is found in a flow table, the outcome depends on configuration of the
table-miss flow entry:
for example, the packet may be forwarded to the controller over the OF
channel, dropped, or may continue to the next flow table
A Meter Table can trigger a variety of performance-related actions on a flow
Instructions associated with each flow entry either contain actions or modify pipeline
processing
Actions included in instructions describe packet forwarding, packet modification and group
table processing.
Pipeline processing instructions allow packets to be sent to subsequent tables for further
processing and allow information, in the form of metadata, to be communicated between
tables.
Table pipeline processing stops when the instruction set associated with a matching
flow entry does not specify a next table; at this point the packet is usually modified
and forwarded
Flow entries may forward to a port (physical port/logical/reserved port )
Reserved ports may specify generic forwarding actions such as sending to the
controller, flooding, or forwarding using non-OF methods, such as “normal" switch
processing
while switch-defined logical ports may specify link aggregation groups, tunnels or
loopback interfaces
Actions associated with flow entries may also direct packets to a group, which
specifies additional processing
A FT may direct a flow to a Group Table, which may trigger a variety of actions that
affect one or more flows
The group table contains group entries;
each group entry contains a list of action buckets with specific semantics
dependent on group type
The actions in one or more action buckets are applied to packets sent to the
group.
Groups represent sets of actions for flooding, or more complex forwarding semantics
(e.g. multipath, fast reroute, and link aggregation).
As a general layer of indirection, groups also enable multiple flow entries to
forward to a single identifier (e.g. IP forwarding to a common next hop).
This abstraction allows common output actions across flow entries to be
changed eficiently.
Switch designers are free to implement the internals in any way convenient, provided that
correct match and instruction semantics are preserved.
Ex. 1: while a flow entry may use an all group to forward to multiple ports, a switch
designer may choose to implement this as a single bitmask within the hardware
forwarding table.
Ingress Port: The identifier of the port on the switch where the packet arrived. It may be a
physical port or a switch-defined virtual port.
Ethernet Source and Destination Addresses: Each entry can be an exact address, a bitmasked
value for which only some of the address bits are checked, or a wildcard value (match any
value).
IPv4 or IPv6 Protocol Number: A protocol number value, indicating the next header in the
packet.
IPv4 or IPv6 Source Address and Destination Address: Each entry can be an exact address, a
bitmasked value, a subnet mask value, or a wildcard value.
User Datagram Protocol (UDP) Source and Destination Ports: Exact match or wildcard
value.
Address Resolution Protocol (ARP) Opcode: Exact match in Ether-net Type field.
Source and Target IPv4 Addresses in Address Resolution Protocol (ARP) Payload: Can be
an exact address, a bitmasked value, a subnet mask value, or a wildcard value.
IPv6 Neighbor Discovery Source and Target Addresses: Link-layer address options in an
IPv6 Neighbor Discovery message.
Multiprotocol Label Switching (MPLS) Label Value, Traffic Class, and Bottom of Stack
(BoS): Fields in the top label of an MPLS label stack.
The instructions component of a table entry consists of a set of instructions that are executed if
the packet matches the entry.
Set-Field: The various Set-Field actions are identified by their field type; they modify
the values of respective header fields in the packet.
Change-TTL: The various Change-TTL actions modify the values of the IPv4 Time
To Live (TTL), IPv6 Hop Limit, or MPLS TTL in the packet.
Symmetric: sent without solicitation from either the controller or the switch.
Hello messages are typically sent back and forth between the controller and switch
TSAC1-ARS – AWT1-ACNPS-E.Borcoci- UPB -2016-2017 100
TSAC 1- ARS- AWT1-ACNPS Sem I 2016-2017
Echo request and reply messages can be used by either the switch or controller to
measure the latency or bandwidth of a controller switch connection or just verify that
the device is operating. The Experimenter message is used to stage features to be built
into future versions of OpenFlow.
Currently there is work underway on two configuration and management protocols for OF switches:
OF Management and Configuration Protocol (OF-Config) and Open vSwitch Database Management
Protocol.
Motivation
The OF protocol assumes that an OF datapath (e.g. an Ethernet switch which supports the OF
protocol) has been configured with various artifacts such as the IP addresses of OF controllers.
OF-CONFIG enables the remote configuration of OF datapaths. While the OF protocol generally
operates on a time-scale of a flow (i.e. as flows are added and deleted), OF-CONFIG operates on a
slower time-scale.
• Example is building forwarding tables and deciding forwarding actions which are done via OF
protocol while enabling/disabling a port can be done via OF-Config protocol.
The OF-CONFIG protocol enables configuration of essential artifacts of an OF Logical Switch so that
an OF controller can communicate and control the OF Logical switch via the OF protocol.
OF-CONFIG 1.1 introduces an operating context for one or more OF datapaths called an OF Capable
Switch.
Terminology
OF Capable Switch
physical or virtual switching device which can act an as operational context for an OF Logical Switch.
OF Capable Switches contain and manage OF Resources which may be associated with an OF Logical
Switch context.
OF Configuration Point
It configures one or more OF Capable Switches via the OF Configuration and Management Protocol
(OF-CONFIG).
OF Logical Switch
It is a set of resources (e.g. ports) from an OF Capable Switch which can be associated with a specific
OF Controller. An OF Logical switch is an instantiation of an OF Datapath.
OF Resource
It is a resource (e.g. port or queue) associated with an OF Capable Switch and may be associated with
an OF Logical Switch.
OF Queue
It is a queuing resource of an OF Logical Switch as described in the OF specification as the queue
component of an OF datapath.
OF Port
An OF Port is a forwarding interface of an OF Logical Switch as described in the OF specification as
the port component of an OF datapath. An OF Port may map to a physical port on a physical switch or
a logical port on a physical or virtual switch.
Basic characteristics
The OF-CONFIG protocol enables dynamic association of the OF related resources of an OF Capable
Switch with specific OF Logical Switches which are being hosted on the OF Capable Switch.
OFCONFIG does not specify or report how the partitioning of resources on an OF Capable Switch is
achieved.
OF-CONFIG assumes that resources such as ports and queues are partitioned amongst multiple OF
Logical Switches such that each OF Logical Switch can assume full control over the resources that is
assigned to it.
OF-CONFIG 1.1 makes simplifying assumptions about the architecture of OF switches. The
specification is deliberately decoupled from whether the switch supports flowvisor or other
virtualization models.
OF-CONFIG 1.1 is focused on the following functions needed to configure an OpenFlow 1.3
(OFv1.2) datapath:
• The assignment of one or more OF controllers
• The configuration of queues and ports
• The ability to remotely change some aspects of ports (e.g. up/down)
• Configuration of ceritificates for secure communication between the OF Logical Switches and
OF Controllers
• Discovery of capabilities of an OF Logical Switch
• Configuration of a small set of tunnel types such as IP-in-GRE, NV-GRE, VxLAN
While limited in scope, OF-CONFIG 1.1 lays the foundation on top of which various automated
and more advanced configurations will be possible in future revisions.
Outside the scope of OF-CONFIG 1.1 : Switch discovery, topology discovery, capability
configuration, event triggers, versioning, instantiation of OF Logical Switches, assignment of
resources such as ports and queues to OF Logical Switches, and bootstrap of the OpenFlow capable
network are protocol. (it will be in future versions).
Table 4-1 OF-SWITCH and OF-CONFIG comparison ( from OF-CONFIG spec v1.2)
OF-Config details
OF Mgmt and Config Protocol version 1.1 (OF-Config), 2012, has been released by ONF
The OF-Config protocol addresses the following components of controller-switch
management:
a. OF configuration point: The OF-Config point issues OF-Config commands.
b. OF capable switch: A physical or virtual switching device contains a number of ports and
queues.
c. OF logical switch: A logical switch within the OF capable switch allocates a subset of the
ports and queues that make up an OF capable switch.
The OF-Config Point can be located in the same server or workstation as an OF controller or
within traditional network management products.
Configuration points can manage multiple OF-capable virtual or physical switches.
A configuration point may manage multiple OF capable switches, and a capable switch may
be managed by more than one configuration point.
The configuration point also communicates with OF logical switches that live within the OF
capable switch.
Specifically the control point supplies each logical Switch with the IP addresses and port
numbers of the OF controllers that will control individual packet flows through the switch.
It also specifies whether TCP or TLS will be used to communicate between the switch and
controller, and it configures certificates for communications between switches and controllers.
Each OF logical switch operates independently of the other logical switches within the same
OF capable switch.
A configuration point can discover the resources allocated to a logical switch, configure
tunnels, set port parameters, turn ports off and on, and retrieve switch status.
It receives error codes from a switch if a configuration operation fails and it can roll back the
operation in the event of a partial failure.
Implementing OF-Config in a switch requires modifying the switch's internal configuration
database and implementing the Netconf Protocol RFC (6241) to communicate between
configuration points and switches. Netconf uses XML encoding for configuration data and
protocol messages.
Configuration data is sent to, and retrieved from, switches using remote procedure calls.
Netconf can send or retrieve full and partial configuration descriptions and can convey
asynchronous notifications from the switch.
Netconf is extensible, so it will continue to support OF-Config as future capabilities are
added. Configuration points can retrieve switch configuration capabilities, so a configuration
point upgraded to a later OF-Config version can continue to support a switch that has not yet
been upgraded.
The OF-Config 1.1.1 specification contains UML diagrams XML examples and the full XML
schema defining configuration capabilities.
5.1 Introduction
Network Function Virtualisation [21-25] is a recent architectural development, aiming to
reduce the time to market of new services and improve network service provisioning flexibility.
• NFV decouples the SW implementation of network functions from the underlying HW
by using virtualisation technologies and off-the-shelf programmable hardware (general-
purpose servers, storage, software switches).
o network-related functions, e.g., balancing, network address translation (NAT),
firewalling, intrusion detection, domain name service, caching, etc., can be delivered
in software and deployed on general purpose servers.
o However, NFV exposes also important several challenges, such as the network
performance guarantees for virtual appliances, dynamic instantiation and migration,
and efficient placement of Virtual Network Functions (VNF).
• The NFV general objectives are: to improve capital efficiencies versus dedicated hardware
implementation solutions, by:
o using commercial-off-the-shelf (COTS) hardware to provide VNFs, through software
virtualisation;
o sharing of hardware and reducing the number of different HW architectures;
TSAC1-ARS – AWT1-ACNPS-E.Borcoci- UPB -2016-2017 107
TSAC 1- ARS- AWT1-ACNPS Sem I 2016-2017
The main actor involved in development of the NFV specifications is ETSI NFV Group
Global (operators-initiated) Industry Specification Group (ISG), under the auspices of ETSI, having
about 200 members (2014) and including 28 Tier-1 carriers (and mobile operators), service providers,
cable industry entities.
o NFV applies the principle of separating NFs from the HW they run on, by using
virtual hardware abstraction. Flexible network function deployment is possible.
• The SW/ HW detachment allows to reassign and share the infrastructure resources. The
hardware and software can perform different functions at various times.
• The HW resources pool is already in place and installed at some Network Function
Virtualisation Infrastructure (NFVI) – Points of Presence (PoPs); the immediate
consequence is that the actual NF software instantiation can be automated.
• The NFVI is the totality of the HW + SW components which build up the environment in
which VNFs are deployed.
• NFV can leverage the different cloud and network technologies currently available. All these
helps Network Operators (NO) to faster deploy new network services over the same
physical platform.
The NFV can support dynamic operations: the network functions are performed by instantiable SW
components, which provides greater flexibility (in comparison to traditional networking prodedures) to
TSAC1-ARS – AWT1-ACNPS-E.Borcoci- UPB -2016-2017 108
TSAC 1- ARS- AWT1-ACNPS Sem I 2016-2017
• NFV Infrastructure (NFVI) includes all HW+ SW components building up the environment
in which VNFs are deployed and it can span across several locations, e.g. places where data
centres are operated.
o The network providing connectivity between these locations is regarded to be part of
the NFVI. A NFVI component is an NFVI hardware distinguishable as a COTS
component at manufacturing time.
o The Virtualisation Layer (VL) is an important component of the NFV. It abstracts the
hardware HW resources and decouples the VNF software from the underlying
hardware, thus ensuring a HW independent lifecycle for the VNFs.
o The VL is responsible for:
o The VL allows that software of the VNFs can be deployed on different physical HW
resources. Typically, this type of functionality is provided for computing and storage
resources in the form of hypervisors and Virtual machines (VMs).
Nf-Vi
Virtualised
Infrastructure Virtualisation Layer
Manager(s)
Vi-Ha
Hardware
Computing Storage Network
Resources
NFV Management
and Orchestration
• NFV Management and Orchestration (NFV-MANO) deals with orchestration and lifecycle
management of physical and/or software resources that support the infrastructure
virtualisation, and the VNFs lifecycle management.
• NFV MANO focuses on all virtualisation-specific management tasks and includes the partial
managers for the Data Plane layers: Virtualised Infrastructure Manager (VIM), Virtualised
Network Function Manager (VNFM) and NFV Orchestrator (NFVO).
• The NFVO optimizes the resource allocation, i.e., manages the Network Service (NS)
lifecycle, VNF lifecycle (supported by the VNFM) and NFVI resources (supported by the
VIM).
• A Network Service (NS) is a composition of NFs defined by its functional and behavioural
specification.
o The NSes contributes to the behaviour of the higher layer service, which is
characterized by at least performance, dependability, and security specifications. The
individual NF behaviours plus a network infrastructure composition mechanism
determines the End to End ( E2E) NS behaviour.
• Many network function existent in a legacy environment can be virtualised in the NFV
framework: 3GPP Evolved Packet Core (EPC) network elements (Mobility Management
Entity (MME), Serving Gateway (SGW), Packet Data Network Gateway (PGW)); Residential
Gateway (RGW) in Home networks; Conventional network functions (Dynamic Host
Configuration Protocol (DHCP) servers, firewalls, etc.).
• The functional behaviour and the external operational interfaces of a Phy NF (PNF) and a
VNF are expected to be the same. A VNF may have n ≥ 1internal components; e.g., one VNF
can be deployed over multiple VMs, (each VM hosts a single VNF component).
The NFV technology is expected to provide strong support for several use cases [38].
• The NFVI supports several use cases and fields of application already identified by the NFV
ISG while providing a stable platform for the VNF evolution.
• It also provides a multi-tenant infrastructure, leveraging standard IT virtualisation technology
that may support multiple use cases and fields of application simultaneously.
• The cloud –related use cases are: NFVI as a Service, VNF as a Service, Service Chains (VNF
Forwarding Graphs).
• The mobile use cases could be virtualisation of the Mobile Core Network and/or of the Mobile
Base Stations. Virtualisation of Content Delivery Networks is also supported by NFV.
• For Access and Residential envioronment one can mention Virtualisation of the Home
Environment and Virtualisation of the Fixed Access Network Functions.
6 REFRENCES
[1] Andrew Tanenbaum. Computer Networks. 4th ed. Prentice Hall, 2003, (Andrew Tanenbaum.
Retele de calculatoare. Ed. a 4-a. Editura BYBLOS, 2003).
[2] Peter Mell , Timothy Grance, The NIST Definition of Cloud Computing, Special Publication 800-
145, Recommendations of the National Institute of Standards and Technology , 2011
[3] Fang Liu, Jin Tong, Jian Mao, Robert Bohn, John Messina, Lee Badger and Dawn Leaf,
Recommendations of the National Institute of Standards and Technology, NIST “Cloud
Computing Reference Architecture”, Special Publication 500-292 , 2011
[4] Jamil CHAWKI, “Cloud Computing Standards: Overview and ITU-T positioning”, ITU
Workshop on “Cloud Computing” (Tunis, Tunisia, 18-19 June 2012)
[5] Marco CARUGI Cloud Computing technology in Telecommunication ecosystems and recent ITU-
T standardization efforts, International Workshop “Innovative research directions in the field of
telecommunications in the world” within ITU-ZNIIS ITTC joint project 21-22 July 2011,
Moscow, Russia
[6] Larry Peterson, Bruce Davie. Computer Networks. A systems approach. 4th ed. Morgan
Kaufmann, 2007.
[7] ITU-T Rec. Y.2001, “General Overview of NGN.”
[8] ITU-T Rec. Y.2011, “General Principles and General Reference Model for Next Generation
Network.”
[9] Keith Knightson, Naotaka Morita, “NGN Architecture: Generic Principles, Functional
Architecture, and Implementation”, IEEE Communications Magazine , October 2005
[10] N.McKeown, T.Anderson, et. Al., OpenFlow: Enabling Innovation în Campus Networks, -
http://www.openflow.org/documents/openflow-wp-latest.pdf.
[11] M.Mendonca, et. al., A Survey of Software-Defined Networking: Past, Present,and Future of
Programmable Networks, http://hal.inria.fr/hal-00825087/
[12] Software-Defined Networking: The New Norm for Networks ONF White Paper April 13, 2012
[13] SDN Technical White Paper http://h17007.www1.hp.com/docs/interopny/4AA4-3871ENW.pdf
[14] Software-Defined Networking: The New Norm for Networks ONF White Paper April 13, 2012
[15] SDN: the service provider perspective, Ericsson Review, February 21, 2013
[16] S. H.Yeganeh, et.al., On Scalability of Software-Defined Networking, IEEE Comm. Magazine,
February 2013.
[17] ONF 2012 OF--‐CONFIG 1.1 OpenFlow Management and Configuration Protocol
[18] ONF 2014 OF--‐CONFIG 1.2 OpenFlow Management and Configuration Protocol
[19] Han B., Gopalakrishnan V., Ji L., and Lee S., ‘Network Function Virtualisation: Challenges and
Opportunities for Innovations’, IEEE Communications Magazine, February 2015, pp. 90-97
[20] ETSI GS NFV 003 V1.2.1 (2014-12), Network Functions Virtualisation (NFV);Terminology for
Main Concepts in NFV,
http://www.etsi.org/deliver/etsi_gs/NFV/001_099/003/01.02.01_60/gs_NFV003v010201p.pdf
[21] ETSI NFV 001 V1.1.1, 2013-10, NFV Use Cases
[22] ETSI GS NFV 002 v1.2.1 2014-12, NFV Architectural Framework
[23] ONF, “OpenFlow-Enabled SDN and Network FunctionsVirtualisation,”
https://www.opennetworking.org/images/stories/downloads/sdn-resources/solutionbriefs/sb-sdn-
nvf-solution.pdf
[24] “SDN and OpenFlow World Congress”, Frankfurt-Germany, 2013
[25] Reid A., ‘Network Functions Virtualisation and ETSI NFV ISG’,
http://www.commnet.ac.uk/documents/commnet workshop networks/CommNets EPSRC
workshop Reid.pdf
[1] ETSI TS 136 300 V8.9.0 (2009-07), LTE; Evolved Universal Terrestrial Radio Access (E-
UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN);Overall
description; Stage 2 (3GPP TS 36.300 version 8.9.0 Release 8)
[2] LTE QUICK GUIDE , http://www.tutorialspoint.com/lte /lte _quick_g uide .htm
[3] “LTE Tutorial”, http://www.tutorialspoint.com/lte
[4] Introduction to Mobile IPv6, IIS5711: Mobile Computing Mobile Computing and Broadband
Networking Laboratory CIS, NCTU, www.item.ntnu.no/fag/tm8100/Pensumstoff2004/mipv6-
bra.ppt
TSAC1-ARS – AWT1-ACNPS-E.Borcoci- UPB -2016-2017 120
TSAC 1- ARS- AWT1-ACNPS Sem I 2016-2017
8 ANNEXES
Ta User Tb
Protocols
Appl. Appl.
Ta Tb
processes processes
Upper layers
Pr ocessing protocols Processing
functions functions
C1 Network Network
C2 N1 N2
1 functions functions
1 1 1
Physical medium
Network(s)
Co mplexity /
Intelligen ce Futu re Internet?
(more intelligen t n etw ork s)
E. g. Con ten t cen tric/aware
netwo rks
a b
Figure 8-1 Simplified architectural model for communication
a. Network and terminals b.Two level model : Ta, Tb = terminals
TSAC1-ARS – AWT1-ACNPS-E.Borcoci- UPB -2016-2017 122
TSAC 1- ARS- AWT1-ACNPS Sem I 2016-2017
- application processes ( usually resident in Ta, Tb - they communicate through a set of rules
(protocol) at user level:
Protocols at different levels between:
- application processes
- higher layers processing functions (higher layers)
- network transport functions (lower layers)
- set of layers = protocol stack
Layering principle is extended inside each of the two layer
Base layers (1-3) ( network access and information transfer through network(s)
Upper layers (4-7)
- higher layer processing functions (closer to user application processes)
- usually – layers 4-7 belong to terminals (end–to-end ( E2E) protocols – independent of:
- Network technology, Number of networks, Fixed or mobile mode
• Important Notes:
o the same function name can be encountered on different layers but with different
semantics
o Not all functions listed must be present in a layer (large variety in practical stacks)
Communication Communication
Processes Processes
Service Primitives
Different level
Ta Service Access Protocols
Tb
Point
6 Presentation 6 Presentation
Network
1 Physical 1 Physical 1 Physical Acces
Protocols
OSI Environment
o That is why TCP/IP ( called “Internet” is accepted today as a basis for full network
and services integration
• Communication models:
o Hierachy criterion
Classic model: Client/server ( asymmetric one)
After 2000 Peer to peer (P2P) model
• Symmetric model
• huge expansion in last years ( ~70% of the total Internet traffic)
o Time criterion
Synchronous communication (usually r.t: VoIP, AVC, VoD, but also FTP,
etc.)
Asynchronous communication : e-mail, publish/subscribe
o Mode to get information: push/pull
- Original TCP/IP stack – single architectural plain containing several protocols for
data transfer and control
WWW MIME
Video, MM
BGP FTP
(*1) HTTP SMTP RTCP
IP (Connectionless)
ARP
RARP
Physical Layer
Video
Voice Multicast
protocols RIP
RTP SNMP (*) P2P RSVP
OSPF ICMP,
UDP (Connectionless) (*1) IGMP
(*2)
IP (Connectionless)
ARP RARP
Physical Layer
Transport:
• TCP – Transmission Control Protocol (connection oriented -CO)
• UDP – User Datagram Protocol ( connectionless CL)
Network: IP –Internet Protocol + ICMP, IGMP, BGP, OSPF
Data link Layer:
LLC – Logical Link Control + MAC- Medium acces Control
Example: AAL – ATM Adaptation Layer + ATM –Asynchronous Transfer Mode
Multicasting:
IGMP – Internet Group Management Protocol ( v.1, v.2, v.3)
Multicast routing protocols:
DVMRP – Distance Vector Multicast Routing Protocol
PIM-DM – Protocol Independent Multicast – Dense Mode
PIM-SM – Protocol Independent Multicast – Sparse Mode
CBT – Core based Tree
MOSPF – Multicast OSPF – multicast extension of OSPF
MBGP – Multicast BGP – extension of BGP to multicast
Multicast transport protocols:
RMTP – Reliable Multicast Transport Protocol
SRM – Scalable Reliable Multicast Protocol
MFTP – Multicast File Transfer Protocol
PGM – Pretty Good Multicast
ICMP IGMP
Network
ARP IP RARP
Data link
(LLC) MAC
Newer technologies
IEEE 802.15 Wireless PAN
IEEE 802.15.1Bluetooth certification
IEEE 802.15.2 IEEE 802.15 and IEEE 802.11 coexistence
IEEE 802.15.3 High-Rate wireless PAN
IEEE 802.15.4 Low-Rate wireless PAN (e.g., ZigBee, WirelessHART, MiWi, etc.)
IEEE 802.15.5 Mesh networking for WPAN
IEEE 802.16 Broadband Wireless Access (WiMAX certification)
IEEE 802.16.1 Local Multipoint Distribution Service
IEEE 802.17 Resilient packet ring
IEEE 802.18 Radio Regulatory TAG
IEEE 802.19 Coexistence TAG
IEEE 802.20 Mobile Broadband Wireless Access
IEEE 802.21 Media Independent Handoff
IEEE 802.22Wireless Regional Area Network
IEEE 802.23 Emergency Services Working GroupNew (March, 2010)
4-6
2 MTP-2
1 MTP-1
Signalling Connections Control Part (SCCP) – optionally completes the L3 (CO mode for L3)
- applications :
TCAP -"Transaction Capabilities Application Part" - realizes a common general transaction service
offered to other applications
Transaction : communication of type query/response (suitable for low volume of information
transfer)
• Examples of signalling applications :
TUP - "Telephonic User Part"- telephonic call control
ISUP - "ISDN User Part" - ISDN call control
MAP - "Mobile Application Part" – mobility control in GSM
All these applications use the message transport part MTP1-3
in CL mode ( if they work directly over MTP 3)
in CO mode ( if they work directly over SCCP)
• Each IP hop runs its own instance of the routing algorithm fill forwarding table
• IP forwarding is done independently at every hop ( router)
• IP forwarding decision is made on:
o Destination address extracted from the packet header,
o Forwarding table contents
o Note: Searching in routing table- time consuming operation done for every packet ( bcause
the global IP address is long – e.g. 32 bits in IPV4, the router cannot have a flat
tableof 232 words dimension ( too expensive). So, a router only stores the needed
addresses and therefore
• lower memory dimension is needed
• but search operation is necessary for each packet
MP LS Fo rwa rding
N orm al e2 N o rmal
Forw ardi ng (IP) e1
LSR LS R e3 Fo rwardi n g (IP)
ER ER
M PLS Path
(LS P)
LSR
M PLS
Do main
ER
IP
Domain
FWD table
LSR LSR
ER MPLS ER
Domain
-receives packet LSR
- L3 analysis and classification -drop label
- label assignment - L3 analysis
- forwrding to the next hop -packet forwarding in IP style
-
ER
Application
Transport TCP, UDP
Internet layer IP, ICMP, IGMP,
OSPF, etc.
MPLS sublayer
Data link layer (LLC) + MAC
Physical layer
8.1.5 Introduction
GPRS Tunneling protocol is an important IP/UDP based protocol used in GSM, UMTS and LTE core
networks.
It is used to encapsulate user data when passing through core network and also carries bearer specific
signalling traffic between various core network entities.
Consider any application on UE creates an IP/TCP packet. This packet consist of actual data by
application, TCP or UDP header and then IP field information which has source address of UE and
destination address of application server (e.g. Facebook).
When the eNodeB receives this packet over air interface, it will put the IP packet inside GTP header
which has information related to tunnel IDs. Then further, it is encapsulated inside UDP and IP header
and forwarded as ethernet frame towards SGW. Here the IP header contains eNodeB IP as a source
address and SGW IP as a destination address