Training Doc - Introduction To LTE ERAN2.1 Transmission Solution-20110426-A-1.0
Training Doc - Introduction To LTE ERAN2.1 Transmission Solution-20110426-A-1.0
Training Doc - Introduction To LTE ERAN2.1 Transmission Solution-20110426-A-1.0
www.huawei.com
S1
S1-C
-C -U
S1-U
S1
Clock server
OAM
X2 (X2-C, X2-U)
eNodeB eNodeB
Note: S11 interface is part of the core network and is not described in this course.
eNodeB
Router MME/S-GW
Router IP network Ethernet
A transport path is a pipe model. A pipe has bottlenecks prone to congestion. The end nodes should support traffic shaping to
prevent the traffic data from being discarded at the congested places.
1. QoS Mapping
• Traffic QoS: user plane (based on QCI, GBR, Non-GBR), signaling, IP clock, and OAM.
• IP layer: DSCP mapping, DiffServ.
• Data link layer: Ethernet QoS (IEEE802.1P/Q).
2. Traffic shaping
• Logical port shaping
• Physical port shaping
MPLS: Multi Protocol Label Switching ~ SDSCP: Differentiated Service Code Point ~ CoS: Class of Service
AF AF AF AF AF AF AF AF AF AF AF AF
EF BE EF BE EF BE
4 3 2 1 4 3 2 1 4 3 2 1
Level 1 shaper
Logical Logical Logical
interface1 interface2 interface3
IP Scheduler
Level 2 shaper
GE/FE
Interface
IP/Ethernet
Transport Network
eNode B2
eNode B1 SGW/MME
• The eNodeB GE/FE interfaces support two levels of shaping: physical port shaping and logical port shaping. Each logical port shaping contains eight queues.
• The need for two levels of queues is to differentiate operators, that is, to support eRAN sharing.
The parameters of a logical port include committed information rate (CIR), PIR and scheduling weight.
The logical ports can share the bandwidth of the physical ports.
• In versions earlier than eRAN2.1, eNodeB supports the single-rate tri-color markup algorithm, shortened as
srTCM (CIR, CBS, and EBS) for the traffic shaping, in compliance with RFC2697.
• In eRAN2.1, eNodeB supports dual-rate tri-color markup algorithm, shorten as trTCM (CIR, CBS, PIR, PBS)
in compliance with RFC2698. PIR/CIR refers to the trTCM algorithm.
• The transport admission algorithm of eNodeB is affected by this algorithm. The admission of GBR services is
controlled by CIR, whereas the admission of non-GBR services is controlled by PIR. The purpose is to
guarantee the quality of high priority GBR services.
• eNodeB supports two levels of traffic shaping, namely logical port shaping and physical port limited rate. In
eRAN2.1, logical ports support PIR/CIR.
• This function can be used by the eRAN sharing scenario. As illustrated by the following figure, the CIR traffics
of different operators do not share the physical bandwidth, whereas the PIR traffics do.
OperatorB CIR
OperatorB PIR
Total Bandwidth
OperatorA PIR
OperatorA CIR
Redundancy: eNodeB and backhaul network provide different redundancy solutions for
the backhaul design. This inevitably includes port redundancy and board redundancy.
The main reliability solution of eRAN2.1 is port (channel) redundancy. The board
redundancy is LMPT cold standby.
GE Router
eNodeB
IP/MPLS GE
Network
GE
S-GW/MME
eNodeB
Ethernet
GE
S-GW Pool
S/R
eNodeB S-GW S-GW
Switch/router
S-GW MME Pool
Ethernet Trunk MME
MME
MME
S1-flex
1. Reliability solution: S1-flex, channel backup
(3s), IP route backup, and Ethernet link eNodeB eNodeB
eNodeB
eNodeB eNodeB
eNodeB
aggregate. E-UTRAN eNodeB eNodeB
2. Fault detection mechanisms: BFD (100 ms),
Ethernet OAM (100 ms).
2. The OMCH backup function is used when the OM channel passes the Ethernet. The eNodeB
configures two different OM IP addresses for the active and standby OM channels, and
M2000 configures the same or different IP addresses.
3. The OMCH backup function uses two physical ports for higher reliability. Preferentially the
active and standby OM IP addresses are in different network segments. In this way, the
OMCHs are over different routes, providing higher reliability at higher cost.
4. When the active OMCH is down, the M2000 automatically delivers a switchover command
and, upon receipt of the command, the eNodeB switches to the standby OMCH. When the
active OMCH is down, the active/standby switchover takes a minimum of six minutes. The
following figure illustrates the OMCH backup function.
• Two scenarios
• End to End maintenance
• Seg by Seg maintenance
Seg-by-Seg
Transport Transport
GE/FE device device
Transport GE/FE
eNode B
network
End-to-end S-GW/MME
/FE
(X2 interface) GE eg
-S Seg-by-Seg
b y
g-
Se
eNode B
End-to-end (S1 interface)
IP CORE
Performance
counter
802.3ah
802.1ag
Strength: Provides transport KPI and works with the dynamic transport flow control to avoid the
impact of dynamic transport bandwidth variation on QoS.
Weakness: The more IP PM sessions are activated, the more accurate the congestion is
determined and the more resources are consumed.
Requirement for the devices: IPPM is Huawei proprietary and requires support from the eNodeB
and the core network. IPPM requires that the DSCP value of the transmission network is the
same as that of the eNodeB and core network and cannot be changed. Otherwise, activating the
IPPM fails.
Applicable scenario: IP PM is recommended in the scenario that the core network consists of
Huawei equipment, particularly if the IP transmission has to pass poor-quality ADSL lines that
have high packet loss rate, unstable line rates, or large bandwidth variation.
bottleneck:30Mbps 1. detect
This figure shows adaptive flow control based on IP PM. The dotted lines indicate bandwidth
variation of the IP/Ethernet transmission network. The IP PM between S-GW/MME and eNodeB
checks the variation of the transmission network performance, including delay, jitter, and packet
loss rate, and estimates the minimum end-to-end available transmission bandwidth. The eNodeB
sends the available bandwidth information to the flow control module who adjusts the data flow to
the transmission network to reduce the packet loss rate and to increase the bandwidth utilization of
the transmission network.
Recommended scenarios
Segment-by-segment BFD (SBFD): Used in point-to-point detection of network faults,
applicable to detection of direct connection between two points of the same network segment.
Multi-hop BFD (MBFD): Used in end-to-end detection of network faults, applicable to two ends
that have multiple routing nodes in between.
MBFD: Used for detection between eNodeBs, between an eNodeB and an SGW, and between an eNodeB and a
remote transmission device. Used to locate a fault or to trigger switchover of protection paths between two ends to
ensure network reliability.
6 Clock server Attack of eNodeB from the illegal clock OAM security
source.
Five security threat types are defined. See Remark.
1. Access control: Prevents equipment from being illegally used and allows only authorized users to access the
protected content (equipment, information, services). For example, only authorized users can gain access to eNodeB by
the OM interface.
2. Authentication: Authenticates the identity of a communication entity and allows entities of valid identity to set up
communications.
3. Non-repudiation: Prevents an entity from denying an operation by evidences (such as operation logs). For example,
an operation log records each operation on the eNodeB.
4. Data confidentiality: Uses encryption to prevent data from being disclosed.
5. Communications security: Information is transmitted only between authenticated entities to prevent disclosure or
falsification of the data during communications.
6. Data integrity: Ensures data correctness, prevents illegal change, deletion, generation, or replication of data, and
identifies unauthorized operations.
7. Availability: Ensures that the system works and that services are not interrupted as a result of an illegal operation.
8. Privacy: Protects keys, identity information, and equipment or network activity information, such as log information.
Security System
Transmission security Equipment security OM security
Transmission PNP
security policy Simple firewall function OM channel security
1.IPSEC
SeGW
CRL Server CA
IPSec
IPSec
802.1X
The 802.1x access control sends the digital certificate of the eNodeB to the RADIUS
server over the EAPoL; the RADIUS server authenticates the eNodeB identity by
using the Huawei CA root certificates configured on the server.
Transfer Mode IP Header ESP Header TCP/UDP Data ESP Tail ESP Auth
Tunnel Mode New Header ESP Header IP Header TCP/UDP Data ESP Tail ESP Auth
New Header AH Header ESP Header IP Header TCP/UDP Data ESP Tail ESP Auth
Tunnel
The Range of ESP Authentication Mode
SeGW
CRL Server CA
eNodeB
eNodeB
eNodeB
Centralized
None Security Security
zone zone eNodeB Distributed
The IPSec networking needs to consider three factors: security domain, protected stream, and configuration mode (see Remarks).
The PnP process has six steps (for details, see Remark):
Note: If one of the above steps is faulty, the system starts the PnP process again, until the PnP
process is finished.
PKI mechanism:
PKI (Public Key Infrastructure) uses asymmetric cryptography to provide
information security service and is the basis and core of the current network
security construction. PKI is in wide use.
PKI uses username, password, and symmetric key to provide a secure
and standard key management infrastructure. The core technology of PKI is
digital certificate (public key) management, including issuance, delivery,
update, and revocation of certificates.
Certificate management
Factory stage: The factory CA issues factory device certificate; the
eNodeB is preset with the device certificate and Huawei root certificate; the
root certificates, CRL, and ESN are published on the web portal.
Operation stage: Includes eNodeB installation, eNodeB security self-
startup with intelligent PnP, and automatic eNodeB certificate management
with all-process certificate management process.
User B
User A
KEY
KEY ALLOCATE KEY
User B
User A
Get the public key Public key of B
of B
Private key of B
cryptograph cryptograph
plaintext plaintext
version
tbsCertList Signature
signatureAlgorithm issuer
thisUpdate
signatureValue
nextUpdate
revokedCertificates
CA
PKI architecture
2
Middle CA certification CA
4 certificate
authorize cancel
entity
PKI system
ultimate user ultimate user ultimate user 1 certificate 5 certificate
request overdue
• A parent CA can have child CAs and therefore establishing a CA hierarchy. Any CA can issue
certificates adapted to its authority.
• A three-layer CA hierarchy can satisfy the requirement of most operators.
• There is no limit to the depth of the CA hierarchy. A customer can choose an appropriate
depth according to the actual situation.
Assume that A authenticates B’s certificates. B’s certificate specifies the CA that issues the certificate.
Move along the CA hierarchy until to the root certificate. The movement forms a certificate chain. The
authentication process is described as follows:
Moving in the reverse direction, starting from the root certificate, each node authenticates the
certificate of the next node until to B. The root certificate is of self-signature and uses its own
public key for authentication.
If all the signatures pass authentication, A determines that all certificates are correct. If A trusts
the root CA, he can trust B’s certificates and public key.
Certificate
management
CA CRL Server
Network element
Root certificate
Device certificate
CRL
Verify
Verify
Root certificate to verify the device Root certificate plus whitelist to verify
certificate the device certificate
CA root certificate can verify the validity of the device certificate issued by the CA.
For example, in the SeGW authenticating an eNodeB, the root certificate of the eNodeB
device certificate is preset on the SeGW. During authentication, the eNodeB sends the device
certificate to the SeGW which uses the preset root certificate to verify the validity of the device
certificate.
Verification of device certificates by root certificate can ensure that the device certificate
is issued by the root certificate CA. Huawei CA root certificate can verify that an
eNodeB is a valid Huawei device. To strengthen the authentication, the whitelist is
used. The whitelist stipulates that the eNodeB ESN contained in the device certificate is
compared with the preset ESN list. Only Huawei eNodeB of specific ESN is valid.
The eNodeB interfaces include S1, X2, OM, clock, and cascade. Except for X2 interface, all
interfaces are statically configured. A user can perform data planning and configuration in advance.
X2 interface is dynamically configured by ANR and the ACL rules cannot be planned in advance
over the X2 interface. Therefore, X2 interface should support generation of ACL rules during ANR.
To support this function, 3GPP extends S1AP "eNB Configuration Transfer/ ‘MME Configuration
Transfer’" and adds service IP in addition to signaling IP. During the X2 self-setup process, eNodeB
sets up ACL packet filtering rules after exchanging the address information.
• Confidentiality protection
• After the handshake protocol finishes negotiation of the session key, all
messages are encrypted for transmission.
• Integrity protection
• Maintains data integrity and ensures that data is not tampered with during
transmission.
• Authentication
• Authenticates a user and a server so that they are sure that data is sent to the
correct client and server. Though client authentication during a session is
optional, a server is always authenticated.
SSL Record Protocol SSL handshake Protocol Change Cipher Spec Protocol SSL Alert Protocol
TCP
IP
SSL application scenario
OMCH
FTPS
HTTPS
FTPS
HTTPS
SSL-based OMCH.
Local (or remote) FTPS connection to upload or download files.
Local (or remote) WebLMT sets up an HTTPS connection for operation and
maintenance.
ACLRULE defines an ACL rule, specifically the types of packets that require encryption protection.
ACL defines an ACL group. An ACL group contains one or multiple ACL rules.
IKECFG defines the eNodeB local negotiation parameters for IKE negotiation.
IKEPROPOSAL defines an IKE proposal that contains the encryption and negotiation algorithms at the IKE
negotiation stage.
IKEPEER defines the parameters interacted between eNodeB and peer at the IKE negotiation stage.
IPSECPROPOSAL defines the encapsulation, authentication algorithm, and encryption algorithm used at the IPSec
stage.
IPSECPOLICY defines the protection policy for IP packets compliant with the ACL rules.
IPSECBIND binds IPSec with physical ports.
ACL and ACLRULE define the admission rules for the packets.
PACKETFILTER binds ACL with physical ports.
• The attached file is about security configuration on the Symantec security gateway. The
configuration commands vary substantially for different vendors. The attached file is for
reference only.
• The security configuration on the DHCP server requires that option 43 contains the CA
server information and the certificate path. For details, see the attached Requirement for
the DHCP server.