Você está na página 1de 49

Configuration (New)

Case of RNC:
*Add M3DE:DEX=37,LEX=0,DPC=022F1
DET=SP, DEN=BBSR-RNC.
To add M3UA- Destination entity,
only one entity can be defined.
*ADD M3RT: signaling
route,maximum 16 entity can be
formed
*ADD M3LNK: signaling link
It SGP has process can be
configured upto 30 M3UA links
Local IPv4,peer IPv6
* Add M3LE-local entity
*ADD M3LNKS:-Link set , only 1 link
set can be formed between local

entity and adjacent destination .


Local IP, Peer IP,Port , link name.
*ADD SCCPDPC:-All SCEP message
interaction with local signaling print
can be configured ,OPC,DPC.
*ADD SCCPPSSN:-Local address of
SCEP,used to identify node of Scep.
DOC,OPC,load share type
*ADD RNC: It is at the IU interace,
MCC,MNC,RNCID,network indicator,
RAB assignment ,Traffic timer,RNC
protocol version (R99,R4,R5,R6,R7)
we use R6, RNC OTC one tunnel
channel,RNC QOS.
BSC .FR
ADD NSE- network service entity.
Added to PCU, and aso SGSN
BSSID,flush monitor timer, packet
flow context Y/N, INR-INTER
NSE Re- , LCS-location

service.RIM-RAN information
management,ARPAllocation/Retention priority, BTBearer type, CT-configuration
type(static/dynamic)
ADD NSVC: Network service
virtual connection . ent to end
virtual connectivity, port no,BC
ID,
ADD BC: Bearer channel. Port No.,
BTs-Begin time slot, ETS:-end
time slot,BC mode-DTE/DCE
ADD NSE
ADD Global end point: Dynamic
set.10local end point supported
by SGIN.
SW:signaling weight,Data
weight(0-255)
ADD GB Remote end point:Dynamically set ,512
support.RUP-Remote UDP no.,
NSEI,DW,SW.

Class oF Device
Class A-PS/CS Both data ad voice
call
Class B-PS or CS either Data or
voice call
Class C- avg Data calls,
chat,mail,ipod,pager,Tab.
Domain Name system
DNS is a hierarchical structure
having a database that translate
fully qualified domain name into
IP address.
DNS-Domain name to IP
address
RDNS-IP address to
domain name

It is a distributed database that


can serve as the foundation for name
resolution in a TCP/IP N/w.
Each computer is connected to
network .i.e assigned to IP
protocol. Address which appears
in each packet sent to that
computer. It is difficult
remember each and every
address.
Computer can be assigned as
symbolic names which can be
easily memorize by human being
but not to computer
The mechanism to map symbolic
names to a IP address is called
DNS. It is distributed across the
n/w or internet.
Internet is divided into hundreds
of top level domain

1. Generic domain .i.e. .com


commercial,.edu-education,.milmilitary.
2. Country.i.e. .in-india,.cnchina,.uk-UK
*Resolve the APN to GGSN IP in the
PDP active procedure(local DNS)
*Resolve the RAI to SGSNIP in inter
SGSN. RAU procedure.
*Resolve the RNCID to a SGSN IP in
the relocation procedure
IN SGSN:
Local DNS:APN to corresponding IP
address of GGSN.
ISP DNS:converts webbrowsing/URL
to corresponding IP.
Note: RAI:Routing area
identifier;RAU-Routing area.
DHCP:

DHCP centralize and manages


allocation of
TCP/IPconfuguration information
by automatically assigned IP
address to device configured to
use DHCP.
DHCP eliminates some of the
configuration errors associated
with manually configuration IP
.i.e typing IP address, subnet
mask, default gateway incorrectly
can lead to a bigger problem
including communication
difficulties and n/w problem due
to a duplicate IP address.
When DHCP client stats
request an IP from DHCP server,
it select one IP from IP pool . Id
client select the offer the IP
information is leased to the client
for a period of time. In addition to

that DHCP server provides DNS


and WINS(windows internet
name service).
Id there is no IP present ,client
cannot start TCP/IP . Non DHCP
client can be configured
automatically. Static address
depending on implementation.
DHCP server have 3 methods:
1. Dynamic Allocation: A N/W
admin assign range of IP to
DHCP and each client
computer configured to
request an IP from DHCP
server.
2. Automatically: DHCP
automatically assign a free IP
to client.
3. Static Allocation: DHCP
assign IP based on table with
MAC address/IP address

which are manually filled by


n/w admin.
DHCP is 4 level process
1. Client sent discover message
to server .DHCPDISCOVER Leave
IP request.
2. DHCP offers an IP address.
DHCP offer-IP leave offer.
3. Accept IP address. DHCP
REQUEST-IP base selection
4. Confirmation. DHCPACK-IP
leave acknowledgement
5. IP Leave
unacknowledgement.DHCPNACK.
Direct Tunneleing:
In internet HSDPA
architecture optimizes the radio
system data for data application .

it does so by implementing a
subnet of RNC functionality in to
base stations. While the SGSN
offers the ability to create tunnel
from RNC to GGSN , in otherwise
we can it as direct tunneling.
The direct tunneling works in
existing 3g, LTE and multivendor
environment.
In this the SGSN controls
mobility, authentication and
control plan accouting to decide
one to two tunnel is needed,
when one tunnel is created the
user plan traffic is bypassed the
SGSN.
When PDP context is activated
in a live n/w,two GTP-U tunnel is
created,one is from RNC to SGSN
and the other is from SGSN to
GGSN. The direct tunneling

instead requires only one tunnel


which run between RNC to GGSN.
SGSN decides how man
tunnels needs to be created.
It creates one tunnel when
both SGSN and GGSN are in same
PLMS, and creates two tunnel
when both SGSN and GGSN are in
different PLMN.
Cost saving: User plane
processing requires a lot of
processing capacity in the SGSN
but DP enables the operators to
transfer user plane traffic beyond
SGSN using IP backbone , which in
turn optimize the operators
cost,since most of the throughput
capacity can be carried out by
standard IP ,router and
switches.This simplifies user
plans dimensioning and operator

no longer need to over dimension


SGSN to carry user plane data.
Direct tunneling can also work
on ATM n/w.
It mainly depends on the
traffic payload in the n/w and the
existing invested capacity. The
packet processing capacity saving
becomes significant when n/w
traffic reaches 1Gbps . it is
advisable to invest in DT
functionality.
Notice point:
1. Inroamer homesubscriber1 tunnel (RNC-GGSN)
2. Outroamer-SGSN plays
important port in it 2 tunnel
formed.
3. RNC to SGSN not BSC to
SGSN because of unavailability
of PCU(Packet control unit).

Speed V/S Throughput


Speed

1.speed of a
connection is a
measure of how fast
data bit can travel from
one end to another end
in ameasurable amount
of time.

2.It associated with a


connection to describe
its characteristic.

Throughput
1.Throughput of
connection is a
measure of how
much information
data can be moved
from one end to
another in a
measurable amount
of time.
2.The average rate
of successful
message delivery
over a
communication
channel. The data
may be passed
through certain

physical channle or
certain network.
Digital:
Technology, capacity
utilization ,better noise
immunity,security and privacy,
compression and decompression ,
source independent,error
detection and connection
method,efficient and reliable
connection.
Frame Relay:
It is a long distance non
persistent connections .i.e. one
router can connected to many
routers and with their
interconnections.
Virtual connection.i.e. having
logical connection between two

end points . the VC may be of two


types switched(established by
MAN) or permanent which is
always on. It is having access link
(DTE-data terminal equipmentuser and DCE-Data
communication equipment) and
access rate .i.e.speed of
connectivity,
DLCI(Data link connection
identifier) .i.e. it identifies the
exact destination of my router.
NBMA-Non broadcast multiaccess : No broadcast will be done
to multi devices which are
directly connected. Only one data
set will enough to transfer the
data to multiple devices.
Local management interfaceLMI and LAPF-Link access
procedure .

Frame relay is faster and most


efficient mode of n/w . it do not
perform error-detection so
considerably smaller amount of
overhead and faster processing
that X.25.
It is protocol dependent can
accept any protocols.
Frame relay is entirely digital
and typically operates at 56 Kbps
to 1.544 mbps.
Advantages of frame relay:
1. It is having low overhead so
can be implemented in complex
n/w.
2. Multiple logical connection
can be sent over a single physical
connection . ultimately reducing
the internetwork cost.
3. FR uses simple link layer so
only simple software or hardware
change.

4. It accept multiple protocol, so


can accept traffic from different
nodes such as IP,IPX and SNA.
Used in WAN because of high
volume.
It is a high speed packet
switching protocol used in WAN
provided granual service upto
45mbps. It is faster than X.25. It
dont process packet it just relay
from input port to output port.
Variable length packet
switching : Packet switched as
segment till destination
Statical multiplexing : token
ring , Ethernet.
Advantages of FR over IP:
FR-2.6 Mbps, 32 time slots,
each can carry 64kbps.
IP: IP to IP connectivity .
multiple connection can be

established, without conflict


,capacity enhancement,
multiparty management and
higher traffic carry capacity.
Firewall:
Created barrier between
trusted and untrusted user.
Usually implemented at the
point where internet and intranet
is availed.
It can block the inappropriate
website, web resources that
deemed to be blocked.
Keep bad keys out and good
keys doing bad thing.
It blocks and allots the
concern people regarding the
possible breach in security policy.
It also apply encrypt policy so
to disguise the message from read

or avail info , only the person


having special knowledge can
decrypt and access to the
message.
MPBN:
Its a verified , multi service IP
connectivity transport
infrastructure.
Its required to design , deploy
and manage IP service platform.
Revitalization of existing
network and specially design for
carrying video traffic .
Every connectivity based or IP
and one site solution to a very
large network are site solution.
The solution delivers a holistic
approach to end to end QOS
,reliability,security,performance,
and network management.

Re-orient network
dimensioning.
Less time and cost investment
require for deployment.
All IP based with a ready
redundant connection.
In convergence almost all
network nodes in packet are
IU0PS,IU-CS,IU-b,Gbol
p,Voip,SIGTRAN(SS7), mc-mgwmss ,mb-mgn-mgn).
MPBN consist of two
prominent port IP and MPLS.
MPLS ia an open architecture , every
node, switch router, are connected to
it are open,any level of IP can be
configured. MPLS never work alone ,
it is not a standalone technology. In
order to synchronize with IP base
platform . it takes help of IP which
specifically use 2.5 layer protocol.

2.5 layer protocol:


it can forward layer 3 information
like route advertisements and IP
packet end-to-end but it behaves like
layer-2 protocol(Switches) which
sends packet from node to node.
MPLS header only significant on
peer-hop basis which is not a layer 3
characteristics.
Layer-2: communicate between
same network and finite number of
device(Ethernet).
Layer-3: communication happen in
outside network. In layer 3 fully
dynamic and scalability is added by
selecting best routes through and
between network. It transmits
packets from source to destination is
a determines at each hop along the

route based on most current


network topology. It is not
deterministic sequence of packets
take different route to destination
causing inconsistent performance.
MPLS uses 2.5 layer uses
critical and carriers class
networks with a deterministic
behavior . In case of layer 3
process for finding pathways so
that multiple packet can traverse
in a consistent manner. In other
words it uses dubbed layer 2.5
protocol with best of both layer 2
and layer 3. Speed of layer 2 and
scalability and dynamics of layer
3.
MPLS-TP(Transport profile).
Add more control to MPLS.

MPLS+tunnel provisioning
function as done by
SONET/TDM.
Provide 50ms protection
switching,managing traffic
flow,reducing fitter and
latency.
Sub network to be securely
segregated.
Routing decision load on
networks.
Normal routing process:
1. Source IP
2. Destination IP
3. Routing table
4. Static or dynamic routing
5. Destination
6. Delay and jitter.
MPBN setting up using MPLS
1. MPLS is a layer 2 protocol
which sits between the layer two

protocol (ATM, Frame


Relay,Ethernet) and layer
three(IP,IPv6).
2. MPLS adds an additional
header which dictates the label
which are attached to each
packet.
3. MPLS also makes use of an
additional protocol called Label
Distribution protocol(LDP) which
is used when a network is not
running BGP to distribute the
labels which are assigned by the
MPLS-enabled routers.
4. BGP has the capability to
advertise and load balance these
labels within the protocol which
is not supported natively with
current IGPs(OSPF, EIGRP).
5. LSR the routers within a
network that support and
perform MPLS function are called

Label Switch Routers(LSR). LSR


has to do three main
things:push,pop or swap labels
from a packet. Push means to add
a label to packet, to pop means is
to remove a label from a packet
and to swap is to remove and add
an alternative label to the packet .
3 different types of LSR
ingress,egress and intermediate.
Ingress LSR(PE-provider edge
routers) is at the edge of an MPLS
network and is the first to insert an
MPLS headed and label on a packet.
Egress LSR(PE) is at the edge of the
network and is the last point before
leaving the network and thus
removes all of the MPLS labels and
header. Both the ingress and egress
LSRs are considered provider
edge(PE) routers.

Intermediate LSRs(P-provider
network) is exist within the network
and are responsible for
pushing,popping or swapping labels
based on the routing with MPLS
network; the intermediate LSRs are
considered Provider(P) routers.
In a normal MPLS configuration
without traffic the network node
broadcast the hop and exchange tags,
direct connected hops are kept in
destination address as it is but the
indirect connected hops saved as
tag+1, where +1 mandates than there
is hop between the both source and
destines HOPS.
MPLS Label Switched Path(LSP):
The path from source to destination
for a data packet through an MPLS-

enabled network. LSPs are


unidirectional in nature and virtual
channel connection. The LSP is
usually derived from IGP routing
information but can diverge from
IGPs.
Upstream and downstream: The
concept of downstream and
upstream are pivotal in
understanding the operation of label
distribution(control Plane)and data
forwarding in an MPLS domain. Both
downstream and upstream are
defined with reference to the
destination network.
MPLS labels and label stacks: MPLS
label is a 20bit number that is
assigned to a destination prefix on a
router that defines the properties of
the prefix as well as forwarding

mechanisms that will be performed


for a packet destined for the prefix.
When using MPLSs layer two VPN
capability the edge connectivity can
be any number of different
technologies including ATM, Frame
relay and Ethernet. The traffic
tunneled via MPLS between the
ingress and egress PE routers. MPLS
also has the ability to offer Traffic
Engineering(TE) and Quality of
Service(QoS).
Open shortest path first(OSPF):
OSPF is a link state routing protocol
for internet protocol(IP)networks. It
uses a link state routing algorithm
and falls into the group of interior
routing protocols,operating within a
single autonomous system(AS).

1. OSPF is an interior gateway


protocol that routes Internet
Protocol(IP) packets solely within
a single routing
domain(autonomous system).
2. Collect link state information
from available routers and
constructs topology map of the
network.
3. OSPF was designed to support
variable-length subnet
masking(VLSM) or classless InterDomain Routing(CIDR)
addressing models.
4. OSPF detects changes in the
topology (link failures, converges
on a new loop-free routing
structure within seconds.
5. It computes the shortest path
tree for each route using a
method based on Dijkstras

algorithm, a shortest path first


algorithm.
6. Cost factors may be the
distance of a router (round-trip
time), network throughput of a
link , or link availability and
reliability , expressed as simple
unit less numbers.
7. OSPF does not use a TCP/IP
,UDP,TCP transfer protocol , but it
encapsulated directly in IP
datagrams with protocol number
89.
8. OSPF uses multicast
addressing for route flooding on a
broadcast domain . For nonbroadcast networks special
provisions for configuration
facilitate neighbor discovery.
9. Routing multicast IP
traffic,OSPF supports the

Multicast Open shortest Path First


protocol(MOSPF).
10. OSPF protocol ,using IPv4,can
operate securely between routers
, optionally using a variety of
authentication models to allow
only trusted routers to participate
in routing . And on IPv6 uses IPv6
protocol security (IPsec).
11. The IPv6 protocol runs per
link,IPV4 run on subnet. Despite
the expanded IP addressing to
128-bits in IPv6, area and router
Identifications are still based on
32-bit values.
Link state routing protocol concept
of link-state routing is that every
node constructs a map of the
connectivity to the network, in the
form of a graph, showing which
nodes are connected to which other

nodes. Each node then


independently calculates the next
best logical path from it to every
possible destination in the network.
The collection of best paths will then
form the nodes routing table.(OSPF
and ISIS and the other is Distance
vector RP..)
Link-state algorithm informally as
each router telling the world about
its neighbors,
Distance vector routing
protocols, which work by having
each node share its routing table
with its neighbors . In a link-state
protocol the only information passed
between nodes is connectivity
related. A router informs its
neighbors of topology changes
periodically and less computational
complexity and message

overhead.Ex.inlcude RIPv1 and


RIPv2 and IGRP.
Routers using distance-vector
protocol do not have knowledge of
the entire path to a destination . They
use:
1. Direction in which router or
exit interface a packet should be
forwarded.
2. Distance from its destination
EGP and BGP are not pure
distance-vector routing protocol
because a distance-vector
protocol calculates routes based
only on link costs whereas in BGP
, the local route preference value
takes priority over the link cost.
Autonomous system(AS): it is a
collection of connected internet

Protocol(IP) routing prefixes


under the control of one or more
network operators presents a
common clearly defined routing
policy to the Internet. A very large
organization with independent
connections to multiple netw
orks, that adhere to a single and
clearly defined routing policy .
Neighbor relationships:
The routers in an Ethernet or
frame relay network select a
designated router (DR) and a
backup designated router(BDR)
which act as a hub to reduce
traffic between routers. The
designated router controls the
area its in. if it goes down, the
BDR takes over as a fail-over or
redundancy OSPF uses both

unicast and multicast to send


hello packets and link state
updates.
Area types:

Standard area

Default OSPF
area type

Stub area

Totally stub

External
link(type
5)LSAs are Type 3,4 and
replaced with replaced wit
a default route
rout

7 within the area:


structured or subdivided ,into
routing areas to simplify

administration and optimize traffic


and resource utilization.
Areas are 32-bit numbers, expressed
either in decimal or in octet based
dot-decimal notation for IPv4
address notation.
7.1 Area 0(zero) or represents the
core or backbone region of an OSPF
network. Each additional area must
have a direct or virtual connection to
the backbone area. Done by
interconnecting router,known as
area border router(ABR). An ABR
maintains separate link state
databases for each area it serves and
maintains summarized routes for all
areas in the network.
7.2 areas are logical groupings of
hosts and networks,including their

routers having interfaces connected


to any of the included networks.
7.3 Each area maintains a separate
link state database thus the topology
of an area is unknown outside of the
area. This reduces the amount of
routing traffic between parts of an
autonomous system.
7.4 Backbone area: the backbone
area 0 or area 0.0.0.0 forms the core
of an OSPF network. It is the logical
band and physical structure for the
OSPF domain and is attached to all
nonzero areas in the OSPF domain.
The backbone area is responsible for
distributing routing information
between non backbone areas. The
backbone must ne contiguous, can be
the configuration of virtual links.

All OSPF areas must connect to


backbone area. Direct connection can
happen over the physical links but
virtual link uses the transit Area .i.e.
through some other area.
7.5 Stub area: A stub area does not
receive route advertisements from
external to the autonomous
system(AS) and can be only through
default route.
7.6 Not-so-stubby area: A not-sostubby area(NSSA) is a type of stub
area that can import autonomous
system external routes and send
them to other areas, but still cannot
receive AS-external routes from
other areas.
7.7 Transit area A transit area in an
area with two or more OSPF
border routers and is used to pass

network traffic from one adjacent


area to another.
The transit area does not originate
this traffic and is not the
destination of such traffic.
Path preference:
Four types of metrics are recognized.
An intra-area route is always
preferred to an External route
regardless of metric . In
decreasing preference, these
types are:
1. Intra-area
2. Inter-area
3. External Type 1, which
includes both the external path
cost and the sum of internal path
costs to the ASBR that advertise
the route,

4. External Type 2, the value of


which is solely that of the
external cost.
OSPF router types:
OSPF defines the following router
types:
Area border router(ABR)
Autonomous system boundary
router(ASBR)
Internal router(IR)
Backbone Router(BR).
Each router has an identifier written
in the dotted decimal
format(e.g.1,2,3,4) of an IP address.
This identifier must be established in
every OSPF instance.
These router types should not be
confused with the terms designated
router(DR), or backup designated

router(BDR), which are attributes of


a router interface, not the router.
Area border router:
An area border router(ABR) is a
router that connects one or more
areas to the main backbone network.
It is considered a member of all areas
it is connected to.
An ABR keeps multiple copies of the
link-state database in memory,one
for each area to which that router is
connected.
Autonomous system boundary
router:
An autonomous system boundary
router(ASBR) is a router that is
connected to more than one routing
protocol and that exchanges routing

information with routers in other


protocols.
ASBRs typically also run an exterior
routing protocol(e.g. BGP).
Internal router:
Internal router is a router that has
OSPF neighbor relationships with
interfaces in the same area. An
internal router has all its interfaces
in a single area.
Backbone router:
Backbone routers are all routers that
are connected to the OSPF backbone ,
irrespective of whether they are also
area border routers or internal
routers of the backbone area.
An area border router is always a
backbone router, since al areas must

be either directly connected to the


backbone or connected to the
backbone via a virtual.
Designated router:
A designated router(DR) is the
router interface elected among all
routers on a particular multi-access
network segment , generally
assumed to be broadcast multiaccess.
The basic neighbor discovery
process(Hello) , flooding(224.0.0.6),
DR election(priority, RID).
A given physical router can have
some interfaces that are
designated (DR), others that are
backup designated(BDR), and
others that are non-designated. If
no router is DR or BDR on a given

subnet, the BDR is first elected,


and then a second election is held
for the DR.
The DR maintains a complete
topology table of the network and
sends the updates to the other router
via multicast.
Applications:
OSPF used converge a network in the
low seconds and gurantee loop-free
paths.
Imposition of policies about the
propagation of routs that it may be
appropriate to keep local, for load
sharing, and for selective route
importing more than IS-IS.
IS-IS , lower overhead in stable
network, the sort more common in

ISP than enterprise networks. There


are some historical accidents that
made IS-IS the preferred IGP for ISPs.
OSPF can provide better load sharing
on external links that other IGPs..
BGP:
BGP(Border Gateway Protocol) is a
protocol for exchanging information
between gateway host in a network
of autonomous systems.
The routing table contains a list of
known routers , the addresses they
can reach , and a cost metric
associated with the path to each
router so that the best available
route is chosen.

Hosts using BGP communicate using


the Transmission Control
Protocol(TCP) an send updated
router table information only when
one host has detected a change.
BGP communicates with autonomous
(local) networks using Internal
BGP(IBGP). The routers inside the
autonomous network thus maintain
two routing tables:
1. For the interior gateway
protocol
2. For IBGP
BGP-4 makes it easy to use classless
Inter-Domain routing(CIDR).
CIDR
CIDR notation it depends to the
address a slash character and the
decimal number of leading bits of the

routing prefix,e.g.192.168.2.0/24 for


IPv4, and 2001:db8::/32 for IPv6.
Classless Inter-domain routing is
based on variable-length subnet
masking(VLSM), which allows a
network to be divided into variously
sized subnets, providing the
opportunity to size a network more
appropriately for local needs.
VLSM
A variable length subnet-mask
(VLSM) is a sequence of numbers of
variable length that streamlines
packet routing within the subnets of
a proprietary network.
The VLSM is usually a string of
binary digits shown over the subnet
number ,telling the router which

parts of the subnet number to look


at. A binary 1 over a particular digit
in the subnet number says Pay
attention to this digit. A 0 says
Ignore this digit.
The use of a subnet mask saves a
router the task of having to handle
an entire IP address because the
router deals only with the digits
selected by the mask.
The VSLM facilities efficient use of IP
address space in network whose
subnets are not filled to capacity . In
networks having many unassigned IP
addresses , a VSLM can provide more
efficient use of address space that the
more common fixed-length subnet
mask(FLSM) in which the sequence
of numbers always has the same
length. Variable-length subnet

masking also makes it easier for


system administrators to change the
configuration of a network as an
organization evolves.

Você também pode gostar