Internet DRAFT - draft-khy-rtgwg-central-controlled-ipran

draft-khy-rtgwg-central-controlled-ipran



 



Routing Area Working Group                                Katherine Zhao
Internet-Draft                                                 Jiehui Hu
Intended status: Informational                       Huawei Technologies

                                                          GuangMing Yong
                                                   China Telecom Co.,Ltd

                                                                 Ning So
                                                     TATA Communications

                                                        February 10, 2014




        Use Cases and Architecture of Central Controlled IP RAN
            draft-khy-rtgwg-central-controlled-ipran-01.txt

Abstract

   This document introduces the requirements and use cases for IP RAN
   (Radio Access Networks). To support the requirements, the document
   provides an architecture with centralized control plane as well as
   separation of control plane and data plane.  The document also
   describes techniques for IP RAN network initialization and
   construction; interfacing to management plane and third party
   applications.  This document can be used as a guideline for central
   controlled IP RAN design and development.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on January 06, 2014.

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
 


XXX                                                             [Page 1]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

   This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November
   10, 2008.  The person(s) controlling the copyright in some of this
   material may not have granted the IETF Trust the right to allow
   modifications of such material outside the IETF Standards Process.
   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may
   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
     1.1.  Requirement Language  . . . . . . . . . . . . . . . . . .   3
     1.2.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  Requirements and use case for central controlled IP RAN . . .   3
     2.1.  Scenarios of traditional IP RAN . . . . . . . . . . . . .   3
     2.2.  Requirements of central controlled IP RAN . . . . . . . .   4
     2.3.  Network structure of central controlled IP RAN  . . . . .   5
       2.3.1.  Mode 1: Integrated Controller . . . . . . . . . . . .   6
       2.3.2.  Mode 2: Separated Controller for access and
               aggregation . . . . . . . . . . . . . . . . . . . . .   7
       2.3.3.  Mode 3: Separated Controller for access, aggregation
               and metro core  . . . . . . . . . . . . . . . . . . .   8
     2.4.  Service carrier requirement for the central controlled IP
           RAN . . . . . . . . . . . . . . . . . . . . . . . . . . .   9
       2.4.1.  Requirements for the carrier of mobile back haul  . .   9
       2.4.2.  Requirements for the carrier of enterprises and
               governments  . . . . . . . . . . . . . . . . . . . .   9
   3.  Central Controlled IR RAN Architecture  . . . . . . . . . . .   9
     3.1.  Reference Architecture  . . . . . . . . . . . . . . . . .   9
     3.2.  Reference Model . . . . . . . . . . . . . . . . . . . . .  11
       3.2.1.  Built-in IP RAN Control Plane . . . . . . . . . . . .  11
       3.2.2.  Stand-alone IP RAN Control Plane  . . . . . . . . . .  13
       3.2.3.  Functional Block  . . . . . . . . . . . . . . . . . .  15
       3.2.4.  Interface Definition  . . . . . . . . . . . . . . . .  16
       3.2.5.  Management Plane  . . . . . . . . . . . . . . . . . .  17
 


XXX                                                             [Page 2]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


       3.2.6.  Forwarding Plane  . . . . . . . . . . . . . . . . . .  18
   4.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  18
   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  18
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .  18
   7.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  18 
     7.1.  Normative References  . . . . . . . . . . . . . . . . . .  18
     7.2.  Informative References  . . . . . . . . . . . . . . . . .  19
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .  19

1.  Introduction

1.1.  Requirement Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

1.2.  Terminology

   The following terms are used in this document:

   ASG: Aggregation Service gateway
   BS: Base station
   BSC: Base station controller
   CSG: Cell site gateway
   CE: Customer Edge
   CP-DP: Control Plane and Data Plane interface
   IP RAN: IP Radio Access Network
   IP RNC: IP Radio network controller
   NMG: Network management
   MME: Mobile management entity
   MPLS: Multi-protocol Label Switching
   RSC: Radio service controller
   RSG: Radio Service Gateway
   SGW: Serving gateway
   SR: Service router
   VLAN - Virtual Local Area Network
   VPN - Virtual private network



2.  Requirements and use case for central controlled IP RAN

2.1.  Scenarios of traditional IP RAN

   IP RAN is mainly used to carry the traffic from 3G, LTE base station
   to provide the carrier of high speed service for IP-based mobile back
   haul.
 


XXX                                                             [Page 3]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


   The normal topology in IP RAN is based on ring or tree.  When L3
   service is required in metro, aggregation and access area, IP RAN
   usually uses ring topology to form the network.

   Fig. 1 shows a typical network topology of IP RAN.  There are two
   layers: access layer and aggregation layer.  The access devices are
   the edge of the IP RAN, and are used for the service access; The
   aggregation devices are used to aggregate the traffic from access
   devices.

   The traffic from base station goes via FE/GE to access device. Access
   device will establish two redundant pseudowires to two aggregation
   devices.  Aggregation device will terminate the pseudowires and get
   into the L3VPN.  Two aggregation devices will work as the gateway for
   L3 services, and provide the protection for the base station service.
    The service core network element will access the metro core after
   the aggregation of CE, and are connected with base station through
   L3VPN.



          |<-Pseudowire->|<---L3VPN--->|

   +--+  +---+    +------+          +------+         +------+
   |BS|--|CSG|----| ASG  |----------| RSG  |---------| BSC  |
   +--+  +---+    +------+\       / +------+\----   /+------+
           |               \     /     |     \   \ /
           |                \   /      |      \   \
   +--+  +---+               \ /       |       \ / \ +-------+
   |BS|--|CSG|                \        |        \   -|ATM RSC|
   +--+  +---+               / \       |       / \ / +-------+
           |                /   \      |      /   /
           |               /     \     |     /   / \
   +--+  +---+    +------+/       \ +------+/---/   \+------+
   |BS|--|CSG|----| ASG  |----------| RSG  |---------|      |
   +--+  +---+    +------+          +------+         +------+
                                                 IP RNC/S-GW/MME
           |<-access->|<-aggregation-->|


     Fig. 1 Traditional IP RAN Network Structure


2.2.  Requirements of central controlled IP RAN

   IP RAN uses the design ideas from flexible IP network communication,
   and is based on the architecture of traditional router.  It enhances
   the OAM mechanism, service protection, and the capability of
 


XXX                                                             [Page 4]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


   multiplexing clock transportation.  The routing based hardware
   structure has rich L3 routing functions.  It can provide the better
   multi-service carrier, and support multi-point to multi-point
   communication scenario in future mobile network.  Compared with
   traditional IP metro network, IP RAN solution will focus on the high
   availability, simplified operation and management, networking
   intelligence and OPEX saving from end to end, etc.

   The problems in traditional IP RAN network

   Network high availability
         IP RAN is based on the traditional IP router platform, it uses
         complicated IP and MPLS protocols to construct the network with
         huge amount of devices.  This is a challenge to the high
         availability of network deployment

   Complexity of network management
         IP RAN deployment usually involves a lot of IP MPLS devices,
         this will introduce very complicated issues in network
         management and operation.  In a typical big metro area, for a
         local network with the scale of 10k base stations, we need to
         increase the network with 10500 IP/MPLS equipments.  The IP
         network scale (equipment number) will increase 10 times, and
         equipment is distributed divergently.  This will cause the
         operation pressure to carriers they nerve faced before.  In
         addition to that, there are many protocols running between
         access and aggregation devices, network operators must
         understand and memory lot information regarding to protocols
         and network structures.  It increases the complexity of network
         operation, and brings more OPEX to carriers.

   Low intelligence in network
         The time gaps in the mobile network evolving from 2G to 3G and
         to 4G are decreasing.  New value added service and application
         keep coming up.  The question about how to quickly deploy new 
         service and establish the dynamic maintenances will bring in
         more harsh technical requirements to traditional IP RAN.

   Using the architecture of central control, separation of control
   plane and forwarding plane, open and programmability, we can find out
   the solution for the network high availability, complexity of
   operation and management, network intelligence.

2.3.  Network structure of central controlled IP RAN




 


XXX                                                             [Page 5]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


   The network structure of central controlled IP RAN is illustrated in
   Fig. 2 to Fig. 4.  The network is still layered as access and
   aggregation layers.  There is central controller to provide the
   control capability of topology discovery, path calculation and
   service establishment.  There are three modes for central controller,
   one is built-in controller mode and other two are separated
   controller mode but for different scope of network. Details for these
   models and architectures are given in section 3 of the same document.

2.3.1.  Mode 1: Built-in Controller

   For this mode, the controller is integrated into aggregation routers.
   There may be multiple controller in a IP RAN.

                 *********<-----Built-in Controller Running on ASG
    +--+   +---+ * +---+ *
    |BS|---|CSG|---|ASG|\*
    +--+   +---+ * +---+ \
             |   *   |   *\
    +--+   +---+ ********* \
    |BS|---|CSG|     |      \
    +--+   +---+     |       \
             |   *********    \
    +--+   +---+ * +---+ *     \ +-----+         +------+
    |BS|---|CSG|---|ASG| *      \| RSG |---------| BSC  |
    +--+   +---+ * +---+\*      /+-----+\----   /+------+
                 *       \     /    |    \   \ /
                 *********\   /     |     \   \
                           \ /      |      \ / \ +-------+
                            \       |       \   -|ATM RSC|
                           / \      |      / \ / +-------+
                 *********/   \     |     /   /
                 *       /     \    |    /   / \
    +--+   +---+ * +---+/*      \+-----+/----   \+------+
    |BS|---|CSG|---|ASG| *      /| RSG |---------|      |
    +--+   +---+ * +---+ *     / +-----+         +------+
             |   *   |   *    /               IP RNC/S-GW/MME
    +--+   +---+ *********   /
    |BS|---|CSG|     |      /
    +--+   +---+     |     /
             |   *********/
    +--+   +---+ * +---+ /
    |BS|---|CSG|---|ASG|/*
    +--+   +---+ * +---+ *
                 *       *<-----Built-in Controller Running on ASG
                 *********

        Fig. 2 IP RAN Mode 1: Built-in Controller running on ASG
 


XXX                                                             [Page 6]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


2.3.2.  Mode 2: Stand-alone Controller for Access and Aggregation

   For this mode, the stand-alone central controller is used.  The
   control functions in access and aggregation devices are moved to the
   controller server named IPRAN-CP in this document.  In such a way,
   the access and aggregation devices are only responsible for the
   forwarding.  The controller can control multiple aggregation and
   access devices.
                                +----------+
                                |          |
        *****************-------| IPRAN-CP |
   +--+ * +---+   +---+ *       |          |
   |BS|---|CSG|---|ASG|\*       +----------+
   +--+ * +---+   +---+ \
        *   |       |   *\
   +--+ * +---+     |   * \
   |BS|---|CSG|     |   *  \
   +--+ * +---+     |   *   \
        *   |       |   *    \
   +--+ * +---+   +---+ *     \ +-----+         +------+
   |BS|---|CSG|---|ASG| *      \| RSG |---------| BSC  |
   +--+ * +---+   +---+\*      /+-----+\----   /+------+
        *               \     /    |    \   \ /
        *               *\   /     |     \   \
        *               * \ /      |      \ / \ +-------+
        *controlled area*  \       |       \   -|ATM RSC|
        *               * / \      |      / \ / +-------+
        *               */   \     |     /   /
        *               /     \    |    /   / \
   +--+ * +---+   +---+/*      \+-----+/----   \+------+
   |BS|---|CSG|---|ASG| *      /| RSG |---------|      |
   +--+ * +---+   +---+ *     / +-----+         +------+
        *   |       |   *    /               IP RNC/S-GW/MME
   +--+ * +---+     |   *   /
   |BS|---|CSG|     |   *  /
   +--+ * +---+     |   * /
        *   |       |   */
   +--+ * +---+   +---+ /
   |BS|---|CSG|---|ASG|/*
   +--+ * +---+   +---+ *
        *               *
        *****************


     Fig.3  IP RAN Mode 2: Stand-alone Controller Controls CSG and ASG



 


XXX                                                             [Page 7]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


2.3.3.  Mode 3: Stand-alone Controller for Access and Aggregation

   For this mode, the stand-alone central controller is used too.  The
   difference from the mode 2 is that the controller will control the
   access and aggregation layers include RSG. This mode can provide the
   control capability from end to end.

                                                 +----------+
                                                 |          |
        **********************************-------| IPRAN-CP |
   +--+ * +---+   +---+                  *       |          |
   |BS|---|CSG|---|ASG|\                 *       +----------+
   +--+ * +---+   +---+ \                *
        *   |       |    \               *
   +--+ * +---+     |     \              *
   |BS|---|CSG|     |      \             *
   +--+ * +---+     |       \            *
        *   |       |        \           *
   +--+ * +---+   +---+       \ +-----+  *      +------+
   |BS|---|CSG|---|ASG|        \| RSG |---------| BSC  |
   +--+ * +---+   +---+\       /+-----+\----   /+------+
        *               \     /    |    \*  \ /
        *                \   /     |     \   \
        *                 \ /      |     *\ / \ +-------+
        *                  \       |     * \   -|ATM RSC|
        *                 / \      |     */ \ / +-------+
        *                /   \     |     /   /
        *               /     \    |    /*  / \
   +--+ * +---+   +---+/       \+-----+/----   \+------+
   |BS|---|CSG|---|ASG|        /| RSG |---------|      |
   +--+ * +---+   +---+       / +-----+  *      +------+
        *   |       |        /           *   IP RNC/S-GW/MME
   +--+ * +---+     |       /            *
   |BS|---|CSG|     |      /             *
   +--+ * +---+     |     /              *
        *   |       |    /               *
   +--+ * +---+   +---+ /                *
   |BS|---|CSG|---|ASG|/                 *
   +--+ * +---+   +---+                  *
        *       controlled area          *
        **********************************



   Fig.4  IP RAN Mode 3: Stand-alone Controller controls from CSG to RSG



 


XXX                                                             [Page 8]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


2.4.  Service Carrier Requirement for Central Controlled IP RAN

   The central controlled IP RAN must satisfy two major categories of
   requirements for services.  One is for mobile back haul and another
   one is for enterprises and governments.  Services include Ethernet,
   ATM and TDM.

2.4.1.  Requirements for the Carrier of Mobile Backhaul

   1     Support the access of IP and Ethernet, provide the high
         available, high throughput carrier for the traffic of mobile
         back haul

   2     Provide the carrier for LTE network, support the flexible
         access between base stations, multi-home base station, and the
         carrier of multicast traffic for base stations

   3     Provide the power monitoring, integrated network management for
         different systems of access services

2.4.2.  Requirements for the carrier of enterprises and governments

   1     Provide the high available, high throughput carrier for the
         access of L2/L3 VPN services, it includes P2P, P2MP and MP2MP
         tunnels

   2     Support the access of high bandwidth Internet leased line,
         circuit emulation, access of ATM/FR/TDM




















 


XXX                                                             [Page 9]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


3.  Central Controlled IR RAN Architecture

3.1.  Reference Architecture


                +----------+           +----------+
                | Third    |           |Network   |
                | Party App|           |Management|
                +----------+           +----------+
                            \         /       |
                             \       /        |
                            +--------+      to NMG interfaces
                            |IPRAN-CP|      on network devices
                            +--------+      
                           /   |   |  \
                          /    |   |   \
               ........../.....|...|....\.............
               .  +----+-----+ |   |   +----+-----+  .
     +----+    .  |Base|Cntl | |   |   |Base|Cntl |  .
     | BS |----.--|Rtg |Agent|-|---|---|Rtg |Agent|\ .
     +----+    .  |----------| |   |   |----------| \.
               .  |Frwd Node1| |   |   |Frwd Node2|  \
               .  +----------+ |   |   +----------+  .\
               .               /    \                . \+--------+
               .              /      \               . /|RNC/SGW/|
               .  +----+-----+        +----+-----+   ./ |MME/BSC |
     +----+    .  |Base|Cntl |        |Base|Cntl |   /  +--------+
     | BS |----.---Rtg |Agent|        |Rtg |Agent|  /.
     +----+    .  |----------|        |----------| / .
               .  |Frwd Node1|        |Frwd Node2|/  .
               .  +----------+        +----------+   .
               . Central|Controlled Area   |         .
               .........|..................|..........
                        |                  |
   .....................|..................|...............
     TDM/ATM/Ethernet   |      MPLS        | TDM/ATM/Ethernet

   Fig 5. Central Controlled IP RAN Architecture




   Above is the central controlled IP RAN architecture, where the
   control plane is separated from the forwarding plane and moved to an
   independent entity named IPRAN-CP (IP RAN Control Plane) in this
   document.

   IPRAN-CP, IP RAN Control Plane, is a software system that can be
 


XXX                                                            [Page 10]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


   deployed either in a network device or a separate computer server.
   IPRAN-CP controls the entire IP RAN network domain, the size of the
   domain can be defined by Network Operator based on the actual network
   planning and use cases.  IPRAN-CP controls the IP RAN network based
   on the network topology, actual states and status, which are operated
   by the network administrator.

   IPRAN-CP provides northbound interface to network management system
   used for service deployment, monitoring, troubleshooting, fault
   location, and other functions. Netconf could be  one of the option
   for northbound interface implementation.  The northbound interface of
   IPRAN-CP is different from the traditional network equipment
   interfaces.  It is based on the network view and virtual interfaces.
   IPRAN-CP can provide the interface to network topology and operate on
   a virtual network.

   At the same time, IPRAN-CP also opens to third-party application,
   allows third party to use RESTful API to program and control network
   devices.  Through IPRAN-CP, Third-party applications can utilize the
   access to network resources (such as network topology), deliver
   network diagnosis, fault location, application performance
   monitoring, add innovative applications in the future and so on.

   Because the control plane has been separated out, the network devices
   become forwarding nodes in the IP RAN domain.  Forwarding nodes still
   keep the basic routing functions in order to establish control and
   management channel between IPRAN-CP/NMG and all the forwarding nodes.
   Other control functionality is moved to IPRAN-CP, the forwarding node
   no longer has the control plane functions (such as protocols needed
   for establishing services). Forwarding node accepts network resources
   and states from the controller via Control Agent module and reports
   itself (such as ports) to the controller.

   Forwarding nodes still need traditional northbound managemnent
   interface.  However northbound interface features of the network
   services and the protocol are no longer included. Instead only a
   small subset of the features such as power supplies, voltages,
   veneers and other management features are remained on the network
   devices. The forwarding plane continues to  maintain the existing
   schema using IP/MPLS forwarding.

3.2.  Reference Model

   According to different use cases and scenarios, typical reference
   model can be either in built-in model or stand-alone model. Where the
   stand-alone model can be divided into another two different sub
   models

 


XXX                                                            [Page 11]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


3.2.1.  Central Controlled IP RAN in Built-in Model


               .....................................
               .   +----+-----+                    .
     +----+    .   |Base|Cntl |     +----------+   .   +----+-----+
     | BS |-I1-----|Rtg |Agent|-I2--|Central-CP|   .   |Base|Cntl |
     +----+    .   |----+-----|     |----------|----I4-|Rtg |Agent|
               .   |   CSG 1  |-----|  ASG 1   |   .   |----+-----|
               .   +----------+\   /+----------+   .   |   RSG 1  |
               .                \ /                .   +----------+
               .                 * I3              .
               .                / \                .
               .   +----+-----+/   \+----------+   .   +----+-----+
     +----+    .   |Base|Cntl |-----|Central-CP|   .   |Base|Cntl |
     | BS |-I1-----|Rtg |Agent|     |----------|   .   |Rtg |Agnet|
     +----+    .   |----+-----|-I2--|  ASG 2   |---I4--|----+-----|
               .   |   CSG 2  |     +----------+   .   |   RSG 2  |
               .   +----------+                    .   +----------+
               .                                   .
               .    Central Controlled Domain      .
               .....................................

     Fig 6. Central Controlled IPRAN in Built-in Model




   Like the one above in an IP RAN network, IPRAN-CP functionality is
   built into aggregation service gateway ASG, in which an ASG controls
   a group of CSGs connected to it.  IPRAN-CP functionality is
   integrated with ASG that retains its original aggregation features. 
   The original control functionality on CSG is moved up to ASG. The ASG
   with built-in IPRAN-CP controls the forwarding behavior of CSG. CSG
   retains basic routing functions for establishing the communication
   channel with management plane and control plane. CSG communicates
   with IPRAN-CP through a control agent running on CSG, the agent
   performs status reporting and accepts control information distributed
   by the central control plane residing on ASG.

   In this reference model, an IP RAN domain can have more than one ASG,
   every ASG has a built-in IPRAN-CP.  A CSG can be controlled by a
   single or multiple(in ring structure) ASG(s). In case there are two
   or more ASGs, one ASG works as master controller, and the other one
   works as alternative backup.  IPRAN-CP can also do load-balancing. 
   In case of CSG redundancy, each active and standby can be controlled
   by different ASG.

 


XXX                                                            [Page 12]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


   IPRAN-DP supports the network virtualization capabilities, internal
   CSG topology of an IP RAN is not visible to external network.  For
   external routing device, it only establishes routing neighbor with
   ASG, and believes that only the ASG routes while the CSG routes are
   invisible.  External routing equipment can considered an IPRAN-CP
   controlled domain is a big virtual router.

   Using built-in mode, the one can use the existing network equipment
   to perform software upgrades, apply the new control technology in the
   access network.  Changes to the network architecture and network
   management model can be limited to small. It is a good strategy to
   conduct the rapid deployment of central controlled IP RAN.

3.2.2.  Central Controlled IP RAN in Stand-alone Model

   Built-in IPRAN-CP is easy of deployment and takes advantage of
   existing network structure, equipments and other investment.  However
   because there is no separation of control plane and forwarding plane
   on the existing device that IPRAN-CP attached to, for example ASG,
   the control ability, network performance and the domain scope are
   limited by the capability of the existing aggregation equipment ASG
   and its attached network structure.

   Stand-alone IPRAN-CP model is designed to resolve above issue.  It
   deploys IPRAN-CP with stand-alone computer server(s) or other IT
   hardware to eliminate the physical limitation of ASG.  The stand-
   alone control server can use the commodity product with much stronger
   CPU power and process ability. The controller no longer participates
   in the forwarding of network traffic like ASG does; it can be located
   in a remote data center without geographical limitation thus it is
   able to control more and more network nodes in different locations. 
   Therefore stand-alone IPRAN-CP can provide higher scalability and
   batter performance.















 


XXX                                                            [Page 13]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


                         +---------+
                         |IPRAN-CP |
                         +---------+
                        /I3  |I3|   \I3
                       /     |  |    \
            ........../......|..|.....\...........
            .  +----+-----+  |  |  +----+-----+  .   +----+-----+
    +----+  .  |Base|Cntl |  |  |  |Base|Cntl |  .   |Base|Cntl |
    | BS |-I1--|Rtg |Agent|--|I2|--|Rtg |Agent|---I4-|Rtg |Agent|
    +----+  .  |----------|  |  |  |----------|  .   |----------|
            .  |   CSG 1  |  |  |  |  ASG 1   |  .   |   RSG 1  |
            .  +----------+  |  |  +----------+  .   +----------+
            .               /    \               .
            .              /      \              .
            .  +----+-----+       +----+-----+   .   +----+-----+
            .  |Base|Cntl |       |Base|Cntl |   .   |Base|Cntl |
    +----+  .  |Rtg |Agent|       |Rtg |Agent|   .   |Rtg |Agent|
    | BS |-I1--|----------|---I2--|----------|---I4--|----------|
    +----+  .  |  CSG 2   |       |  ASG 2   |   .   |   RSG 2  |
            .  +----------+       +----------+   .   +----------+
            .           IP RAN Domain            .
            ......................................

    -------------------------------------------------------------------
                         +---------+
                         | IP RAN  |---------------+
                         |   CP    |               |
                         +---------+------------+  |
                        /I3  |I3|   \I3         |I3|
                       /     |  |    \          |  |
            ........../......|..|.....\.........|..|................
            .  +----+-----+  |  |  +----+-----+ |  | +----+-----+  .
    +----+  .  |Base|Cntl |  |  |  |Base|Cntl | |  +-|Base|Cntl |  .
    | BS |-I1--|Rtg |Agent|--|--|--|Rtg |Agent|-|----|Rtg |Agent|  .
    +----+  .  |----------|  |  |  |----------| |    |----------|  .
            .  |   CSG 1  |  |  |  |  ASG 1   | |    |   RSG 1  |  .
            .  +----------+  |  |  +----------+ |    +----------+  .
            .               /    \              |                  .
            .              /      \             |                  .
            .  +----+-----+        +----+-----+ |    +----+-----+  .
    +----+  .  |Base|Cntl |        |Base|Cntl | +----|Base|Cntl |  .
    | BS |  .  |Rtg |Agent|        |Rtg |Agent|      |Rtg |Agent|  .
    +----|-I1--|----------|---I2---|----------|---I4-|----------|  .
            .  |  CSG 2   |        |  ASG 2   |      |   RSG 2  |  .
            .  +----------+        +----------+      +----------+  .
            .                 IP RAN Domain                        .
            ........................................................

 


XXX                                                            [Page 14]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


    Fig 7. Central Controlled IP RAN in Stand-alone Model




   Above diagram shows a use case of stand-alone IP RAN control plane.
   Where IPRAN-CP software is pulled out from ASG and running on a
   separate computer server (or in a proprietary device, this document
   follow-up to the server instead).  The servers do not participate in
   the forwarding of network traffic. The network devices to be
   controlled by IPRAN-CP can be vary depending on the scope of the
   actual needs. You can only control access layer equipment, or you can
   also control the devices include both access layer and aggregation
   layer.

   Different from built-in IPRAN-CP on ASG, a stand-alone control plane
   can control and manage many CSGs as well as ASG itself, or more than
   one ASGs with CSGs connected to them. If needed, it can also control
   even RSGs in an extended IP RAN domain.  In this use case, CSG, ASG
   as well as RSG are integrated with a Control Agent module.  Control
   Agent is responsible for reporting topology, states and statistics to
   IPRAN-CP; and receiving control information and forwarding tables
   from IPRAN-CP.  The network devices include CSG, ASG and RSG keep
   basic routing functions for establishing control channel and
   management channel so that IPRAN-CP can use CP-DP (control plane and
   data plane) protocol to control these devices.

   IPRAN-CP needed to support network virtualization functions, from the
   view of the external network devices, this IPRAN domain is just a
   single logical router.  If any forwarding device (for example CSG)
   within the domain has communicated with external network nodes using
   traditional routing protocol such as BGP,IGP,LDP or RSVP, the central
   controlled IPRAN-CP must support the same communication channel and
   support the same routing protocols on behalf of the forwarding
   devices.

3.2.3.  Functional Block

   This section describes the functions and features to be supported by
   the control plane and forwarding plane respectively.

   The functions of IPRAN-CP:

   o  CP-DP control protocol features: provide forwarding device control
      information; establish and maintain connections between control
      plane and the forwarding nodes. CP-DP protocol can be XMPP,
      Openflow, or a newly defined protocol.

 


XXX                                                            [Page 15]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


   o  Network resource management features: discover and collect the
      forwarding nodes, the ports on the nodes as well as topology
      resources in the IP RAN domain.  Other software modules can use
      the resource collection to calculate path, deploying services, and
      build forwarding tables etc.  IPRAN-CP should also open to network
      management applications and third-party applications to programm
      and manage the network resources.

   o  Network virtualization features: abstract network and shield the
      physical network details from the service layer.  Operational
      service deployment can be done based on virtual network without
      concernning how forwarding path for the virtual network to get
      through at the lower layer.  In IP RAN, the transport uses MPLS,
      the network virtualization here means MPLS virtualization.

   o  Network protocol layer: provides traditional routers supported
      conventional routing protocol stack, which was running on the
      forwarding nodes.  Now these features are moved up to the central
      controller.

   o  Network service layer: Supports IP RAN required L2VPN and L3VPN
      services. L2VPN including VPWS and VPLS.

   o  Supporting module: provides basic tools include fault location,
      alarm, northbound interface for maintenance and management
      capabilities.

   The functions of forwarding node:


   o  Basic routing features: run IGP routing protocol and responsible
      for establishing connectivity with other devices, setup routes and
      collect topology.  It must be done before a controller can
      communicate with the network devices.

   o  Control protocols: corresponds to the control protocol running on
      the IPRAN-CP device, responsible for establish and maintain CP-DP
      connection.

   o  Control Agent: Responsible for the registration with IPRAN-CP;
      reporting its information to the controller; accepting control
      information and forwarding tables distributed by the IPRAN-DP. 
      Control Agent is also responsible to install the forwarding tables
      to the data plane that is used to guide the traffic forwarding.

   o  Forwarding Plane: forwarding and procession of messages and user
      traffics.

 


XXX                                                            [Page 16]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


   o  Support module: provides debug and diagnostics functions on
      forwarding nodes; supports device management features; provides
      interface to network management (include power supplies, voltages,
      etc).

3.2.4.  Interface Definition

   The interfaces given on above diagrams (refer to Fig 7) are described
      at below.

   o  I1: Interface between base station and forwarding node. It keeps
      traditional IP RAN network and base station interface, remains no
      change.

   o  I2: Interface between forwarding nodes.

      *  Forwarding nodes run extended ISIS for topology advertisements
         between nodes.  ISIS has been widely used in the existing IP
         RAN networks to flood link and node information, therefore,
         ISIS can be leveraged for central controlled IP RAN as part of
         the topology collection and flood protocol.

      *  With built-in model, because IPRAN-CP is running on an existing
         network devices such ASG, ISIS is running directly between the
         ASG and the CSG, IPRAN-CP on ASG can get topology information
         from ISIS directly.

      *  With stand-alone model, because SDN IPRAN-CP may be deployed
         outside of the actual physical network, the control plane
         cannot communication with forwarding plane via ISIS directly. 
         In this case, a selected topology collection agent in the
         network will be needed.  The agent gathers network topology
         information from CSGs through ISIS protocol, and then reports
         the information to IPRAN-CP through a CP-DP protocol.  An IP
         RAN may have very large number of network nodes, while the
         ability of access equipment is limited.  Hence it could be
         required to divide a IP RAN network into smaller ISIS domains
         to match the capacity of the access equipment.  The topology
         collection agent usually is located at ASBR node of ISIS such
         as ASG.

   o  I3: Interface between IPRAN-CP and forwarding devices.  This
      interface needs to run a CP-DP protocol for the forwarding node's
      registration, information reporting, and accepting the control
      information. Options of the CP-DP protocols could be XMPP,
      OpenFlow or a newly defined protocols.  This interface is beyond
      scope thus left out of this document.

 


XXX                                                            [Page 17]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


   o  I4: Interface between IPRAN-CP and external router.  It supports
      conventional routing protocols such as BGP,ISIS,RSVP and LDP etc.

   o  I5: Interface between RSG and base station controllers.  It
      remains unchanged. (I5 and BSC are not shown on Fig 7 due to space
      limitation)

3.2.5.  Management Plane

   IPRAN-CP needs to provide northbound interface used for network
   management and OSS integration.  At the same time, IPRAN-CP needs to
   provide an open programming interface used for third-party
   application integration and development.  For example, when a third-
   party monitoring application caught a situation of packet dropping
   and link quality degradation along a path, they can use programming
   interfaces of IPRAN-CP to control the path and switch to an
   alternative path.  The northbound interface provided by IPRAN-CP can
   be divided into the following categories:

   o  Policy control interface, including routing policy, ACL etc.

   o  The service interface, including L2VPN,L3VPN etc.

   o  Path control interface, including control of the forwarding path,
      switching over, definition of bandwidth constraints etc.

   o  Monitoring interface, including fault events, network quality
      threshold, system status monitoring, and statistics etc.

   o  Resource interfaces, including bandwidth, network topology, tag
      resources, interface resources etc.

   o  Diagnostic tools, such as ping, tracert, NQA etc.


   Forwarding nodes also have a light network management plane.  The
   management uses VPN channel separated from CP-DP channel to manage
   the forwarding node.  Because forwarding node's control plane has
   been moved up to IPRAN-CP, therefore management functionality
   provided by the forwarding nodes, are only themselves the equipment
   management features as follows:

   o  Equipment upgrades

   o  Device management protocols, such as SNMP, Telnet, and FTP etc

   o  Port management

 


XXX                                                            [Page 18]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


   o  Device power, voltage, single-board hardware management features
      such as alarms, veneer restarts.

   o  Environmental monitoring of the device, such as temperature alarms
      etc.

3.2.6.  Forwarding Plane

   Forwarding IP/MPLS forwarding service.

4.  Acknowledgements

   We would like to thank Lin Han and Guoyi Chen who provided valuable
      contribution to this document.


5.  IANA Considerations

   This draft requires no changes in IANA specification,

6.  Security Considerations

   This draft does not add any additional security implications to IP
   RAN networks.  All existing authentication and security mechanisms
   still apply.

7.  References

7.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.


7.2.  Informative References



Author's Address

   Katherine Zhao
   Huawei Technologies
   2330 Central Expressway
   Santa Clara, CA  95050
   USA
   Email: Katherine.Zhao@huawei.com


 


XXX                                                            [Page 19]

Internet-Draft         Central Controlled IP RAN            July 9, 2013


   Jiehui Hu
   Huawei Technologies
   Huawei Building, No.156 Beiqing Rd.
   Z-park ,Shi-Chuang-Ke-Ji-Shi-Fan-Yuan,
   Hai-Dian District , BEIJING 100095
   P.R.CHINA
   Email:hujiehui@huawei.com

   GuangMing Yang
   Guangzhou Research Institute of China Telecom Co.,Ltd.
   109 West Zhongshan Ave,
   Tianhe District, Guangzhou,510630
   P.R.China
   Email: yanggm@gsta.com

   Ning So
   TATA Communications
   2613 Fairbourne Cir., 
   Plano, Texas 75093
   USA

   email: ning.so@tatacommunications.com






































XXX                                                            [Page 20]