Date post: | 24-Nov-2015 |
Category: |
Documents |
Upload: | randy-dookheran |
View: | 27 times |
Download: | 0 times |
HUAWEI TECHNOLOGIES CO., LTD. All rights reserved
www.huawei.com
Internal
ODD010010 IP Backbone Network Planning
ISSUE 1.2
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 1All rights reserved
With telecom services transferred to the IP network, the IP network bears more and more services. It is obviously more and more important to build a stable IP core network that can bear multiple services and ensure the Quality of Service (QoS).
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 2All rights reserved
This course helps you to:
[Learn the backbone network architecture of the current main operators.
[Master the traffic models of backbone network.
[Master major points of backbone networking planning.
[Learn typical IP backbone network networking instances.
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 3All rights reserved
Chapter 1 Overview of Backbone Network Chapter 1 Overview of Backbone Network PlanningPlanning
Chapter 2 Backbone Network Architecture Chapter 2 Backbone Network Architecture
Chapter 3 Backbone Network Planning Chapter 3 Backbone Network Planning
Chapter 4 Typical Case Analysis for Chapter 4 Typical Case Analysis for Backbone NetworkBackbone Network
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 4All rights reserved
Overview of Backbone Network
l The IP backbone network, as the core of the whole network and upper-level network of the metropolitan area network (MAN), serves as the egress for the MAN to visit external networks and the hinge for interworking between MANs.
l Because the IP network bears more and more services, the networktraffic is becoming large and the network is becoming more and more important. In addition to the traditional Internet access service, large operators are actively engaged in developing value-added services such as NGN services, 3G service, and key account interconnection. To bear the value-added services, some operators start to build a second backbone network such as CN2 of China Telecom, IP private network of China Mobile, and CRNET Stage 2 of China Tietong.
Introduction to Backbone Network Introduction to Backbone Network
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 5All rights reserved
Backbone Network Planning Principles
l High reliability
[ The reliability of backbone network devices is the key for the whole network to
run reliably. Therefore, the network architecture must be designed properly and
reliable network backup strategies must be developed to ensure that the network can recover by itself upon failure.
l Flexibility and scalability
[ Based on the requirements of future network service development, capacity
can be expanded smoothly and the network can be upgraded easily so as to
reduce the impact of network architecture adjustment.
l Flat
[ Decrease the network hierarchy and hops and facilitate network management.
Backbone Network Planning Principles Backbone Network Planning Principles
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 6All rights reserved
Backbone Network Planning Principles (Continued)
l Proper QoS planning
[The services borne by the current IP network cover not only the pure Internet access service but also VoIP service, video service, key account service, and other services. These services have high requirements for the QoS. Therefore, the support for QoS is a necessary condition for network transition from the telecom network to IP network. The QoS must be properly planned.
l Operability and manageability
[Monitor the network on an integrated basis, manage the network based on authority, and allocate bandwidth resources on a uniform basis so that the network can be in the management scope.
Backbone Network Planning Principles Backbone Network Planning Principles
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 7All rights reserved
Chapter 1 Overview of Backbone Network Chapter 1 Overview of Backbone Network PlanningPlanning
Chapter 2 Backbone Network ArchitectureChapter 2 Backbone Network Architecture
Chapter 3 Backbone Network Planning Chapter 3 Backbone Network Planning
Chapter 4 Typical Case Analysis for Chapter 4 Typical Case Analysis for Backbone NetworkBackbone Network
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 8All rights reserved
Network Architecture of Backbone Network
l The architecture of the backbone network falls into:
[ Plane hierarchical structure
[ Plane and space hierarchical structure
l The traditional backbone network often uses the plane hierarchical structure, that is, build a network using the hierarchy structure, for example, the current core layer and convergence layer structure. This network structure enables subscribers to access networks quickly and stably.
l The difference of the plane and space hierarchical structure from the above structure is that the backbone network is divided into multiple planes (two planes in most cases). The planes are still in the hierarchical structure and run services of their own. When the network is faulty, the planes can serve as backup devices of each other.
Network Architecture of Backbone Network Network Architecture of Backbone Network
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 9All rights reserved
VoIP, Video, BT, QQ, or MPLS VPN
Local IDC visit (news, games, or downloading) Access of local network IDC by external networks
External network traffic
Internal network traffic
BR BR ARAR
AR access router BR - core router/transit router
link link link
Core layer/transit layer
Access layerAccess layerIP provincial
network IP backbone network
National and international Internet access, or international VoIP
Longitudinal traffic
Transverse traffic
12
3
4
IP Backbone Network Traffic Model Analysis
IP provincialnetwork
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 10All rights reserved
External network traffic
BR BR ARAR
link link link
12
3
4
Plane Hierarchical Structure Model
IP provincialnetwork
Longitudinal traffic
Transverse traffic
Access layer Access layerCore layer/transit layer
IP backbone network
IP provincialnetwork
Internal network traffic
VoIP, Video, BT, QQ, or MPLS VPN
Local IDC visit (news, games, or downloading) Access of local network IDC by external networks
AR access router BR - core router/transit routerNational and international Internet access,
or international VoIP
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 11All rights reserved
XA
CD
WH
SY
NJSHGZ
BJ
GZ egress
GZ IDC
SH egress
SH IDCBJ IDC
BJ egress
Provincial IP network Region/City IP network
National backbone IP networkNational backbone IP network
Plane Hierarchical Structure Model
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 12All rights reserved
Plane Hierarchical Structure
l The plane hierarchical network is common in early backbone network.
l At present, most national operators use this network. The network consists of the core backbone layer, core convergence layer, and core access layer.
l The core backbone layer is divided into the regional centers based on regions. Regional centers are all connected or partially connected to make the network more robust.
l The dual-homing mode is used for networking of the core convergence layer. Two uplinks are connected to the backbone devices of the regional center or to different backbone devices of two regional centers.
Plane Hierarchical Structure Plane Hierarchical Structure
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 13All rights reserved
Typical Plane Hierarchical Network China CRC CRNET Stage 2
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 14All rights reserved
BR BR ARAR
link link link
12
3
4
Plane and Space Hierarchical Structure Model 1 (External Network/Internal Network)
IP provincialnetwork
Longitudinal traffic
Transverse traffic
External network traffic
Internal network traffic
IP provincialnetwork
Access layer Access layerCore layer/transit layer
IP backbone network
VoIP, Video, BT, QQ, or MPLS VPN
Local IDC visit (news, games, or downloading) Access of local network IDC by external networks
AR access router BR - core router/transit routerNational and international Internet access,
or international VoIP
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 15All rights reserved
External network traffic
Internal network traffic
BR BR ARAR
link link link
1
23
4
Plane and Space Hierarchical Structure Model 2 (Longitudinal/Transverse)
IP provincialnetwork
Longitudinal traffic
Transverse traffic
IP provincialnetwork
Access layer Access layerCore layer/transit layer
IP backbone network
VoIP, Video, BT, QQ, or MPLS VPN
Local IDC visit (news, games, or downloading) Access of local network IDC by external networks
AR access router BR - core router/transit routerNational and international Internet access,
or international VoIP
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 16All rights reserved
Provincial IP network Municipal IP network
XA
CD
WH
SY
NJGZ
BJ
GZ IDC
GZ egress
SH egress
SH IDC
BJ IDCBJ egress
BJGZ
SH
National Backbone IP Network National Backbone IP Network
SH
Plane and Space Hierarchical Network
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 17All rights reserved
Plane Hierarchical Network Structure
l For the plane and space hierarchical structure, the plane is divided during hierarchy. Different planes bear different services.
l In normal cases, the services in two planes do not affect each other. When one plane is faulty, the other plane serves as the backup device of the plane.
l Based on network design, each plane can bear all service volume by design.
l When multiple services need to be borne currently, the plane hierarchical network model shows its advantages of clear structure, good backup function, and high security.
Plane Hierarchical Structure Plane Hierarchical Structure
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 18All rights reserved
IP MAN Dual-Plane Structure
MANMAN
B: carrierB: carrier--class class service plane service plane
A: Internet service A: Internet service plane plane
1+1>21+1>2
Backbone network 2(carrier-class service)
Backbone network 1(network access and data services)
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 19All rights reserved
IP Bearer Network in T Office of China Mobile
SH1
XA1
XA2
BJ1
BJ2
WH1
SY2
NJ1
NJ2
SH2
GZ2
GZ1CD1
CD2
WH2
A forwarding plane
B forwarding plane
CR1
AR
SY1
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 20All rights reserved
Chapter 1 Overview of Backbone Network Chapter 1 Overview of Backbone Network PlanningPlanning
Chapter 2 Backbone Network Architecture Chapter 2 Backbone Network Architecture
Chapter 3 Backbone Network PlanningChapter 3 Backbone Network Planning
Chapter 4 Typical Case Analysis for Chapter 4 Typical Case Analysis for Backbone NetworkBackbone Network
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 21All rights reserved
Chapter 3 Backbone Network PlanningChapter 3 Backbone Network Planning
3.1 IP Address Planning 3.1 IP Address Planning
3.2 Routing Protocol Planning3.2 Routing Protocol Planning
3.3 MPLS VPN Planning 3.3 MPLS VPN Planning
3.4 QoS Planning 3.4 QoS Planning
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 22All rights reserved
IP Address Planning
l Proper IP address planning is an important part in the network design. IP addresses must be planned and implemented on a uniform basis for large networks.
l IP address planning affects the efficiency of network protocol algorithm, network performances, network scalability, network management, and further development of network application.
IP Address Planning IP Address Planning
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 23All rights reserved
IP Address Planning Principles
l Unique:
[ In an IP network, the same IP address cannot be set for two hosts. Do not set the same IP address for different hosts even if the MPLS/VPN technology that supports address overlapping is used.
l Continuous:
[ Continuous addresses facilitate path overlapping in the hierarchical network, thus cutting the size of the routing table and improving the efficiency of routing algorithms.
l Scalable:
[ Excessive addresses must be reserved for each layer so as to meet requirements of network expansion.
l Meaningful:
[ Each IP address shall have concrete meaning, and it is easy to find the device of an IP address.
IP Address Planning Principles IP Address Planning Principles
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 24All rights reserved
Chapter 3 Backbone Network PlanningChapter 3 Backbone Network Planning
3.1 IP Address Planning 3.1 IP Address Planning
3.2 Routing Protocol Planning3.2 Routing Protocol Planning
3.3 MPLS VPN Planning 3.3 MPLS VPN Planning
3.4 QoS Planning 3.4 QoS Planning
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 25All rights reserved
Routing Protocol Planning
l Routing protocol planning directly affects network stability, recovery duration upon network failure, and workload of network maintenance. Therefore, routing protocol planning is the key of network planning.
l Routing protocol planning covers Interior Gateway Protocol (IGP)and Exterior Gateway Protocol (EGP).
l In dynamic protocols of IGP, the protocols that are open and cansupport large networks include OSPF and IS-IS.
l BGP4 and MP-BGP are commonly used as the EGP currently.
Routing Protocol PlanningRouting Protocol Planning
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 26All rights reserved
Routing Protocol Planning Principles
l Shortest path: Try to make the shortest path of IGP be the shorttransmission distance because the end-to-end delay comes from transmission delay in the backbone network. Try to use the second shortest transmission distance as other backup paths to reduce the delay jitter caused by active/standby switchover.
l Fast convergence: Detect faults quickly and respond to them so that the system can recover as soon as possible and black hole routes and route loop can be avoided.
l Controllable and predictable routes: Use clear, specific, and simple routing strategies to avoid possible difficulties in operation and deployment.
l Reliability: Judge network faults correctly and avoid frequent route calculation and update. Load sharing: Improve network resource utilization and system reliability.
Routing Protocol Planning Principles Routing Protocol Planning Principles
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 27All rights reserved
Selection of IGP Routing Protocol
l Both OSPF and IS-IS are used in the current large networks.
l To select a routing protocol of IGP, take the following into account:
[Features of protocols
[Application degree
[Technology continuity
Selection of IGP Routing Protocol Selection of IGP Routing Protocol
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 28All rights reserved
Selection of IGP Routing Protocol (Continued)
l The OSPF protocol is based on the IP layer and can support the IP network only. The IS-IS protocol is running in the link layer directly and can support multiple types of network.
l Both OSPF and IS-IS cover the concepts of hierarchy and area. The OSPF has the backbone area 0 and branch areas. The IS-IS has two levels: level 1 and level 2. When visiting other networks, level 1 uses the nearest routerL2. In this case, routes need to be optimized. The route penetration must be used to solve this problem.
l The OSPF protocol, based on interface, is very flexible. It supports all types of network and is mature. The IS-IS is precise in structure and runs stably. The IS-IS router can belong to one area only and does not support networks such as FR, ATM, and X.25 network.
l The IS-IS protocol is more scalable because it is based on TLV.
In terms of protocol featuresIn terms of protocol features
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 29All rights reserved
Selection of IGP Routing Protocol (Continued)
l The OSPF is widely used in the MAN, and early network
maintenance personnel are familiar with this protocol.
l In recent years, the IS-IS protocol is frequently used in the
backbone networks of large operators. However, network
maintenance personnel are less familiar with this protocol, which
may affect subsequent network maintenance.
In terms of application degree In terms of application degree
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 30All rights reserved
Selection of IGP Routing Protocol (Continued)
l When selecting a protocol, you need to check the protocol that
is running in the original network. For example, some operators
use the IS-IS protocol in the core layer and the OSPF protocol
in the MAN. To protect network continuity, you must take the
cases into account when selecting a protocol.
In terms of technology continuity In terms of technology continuity
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 31All rights reserved
IGP Selection Principle
l Backbone network
[ In the backbone network, focus on stability of protocols and convergence speed. In the backbone network, the IGP needs to bear loopback addresses and interconnection addresses of the backbone network only. There are no special networking requirements, and the size of network is large. It is recommended to use the IS-IS protocol.
l MAN
[ In the MAN, focus on the flexibility of protocols and networking and whether a large number of user demands can be satisfied. The OSPF protocol can meet the requirements. It is recommended to use this protocol.
IGP Selection Principle IGP Selection Principle
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 32All rights reserved
OSPF Routing Protocol Planning
l Router id
[ It is unique in the OSPF area. It is recommended to use loopback addresses.
l Area division
[Division of areas is of great significance in the OSPF design.
[ It is recommended that no more than 50 routers are running in each area.
[ If the OSPF protocol is used in the backbone network, use area 0 by preference.
[ If a non-backbone area needs to be used, divide the area based on physical area.
Major Points of OSPF Planning Major Points of OSPF Planning
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 33All rights reserved
OSPF Routing Protocol Planning (Continued)
l Area type
[ The areas of OSPF can be divided into common area, Stub area, Totally Stub area, and NSSA area.
[ Stub: It is not allowed to introduce external routes of AS. Set a default route for the area.
[ Totally Stub: External routes of AS and the area are not introduced. Set a default route for the area.
[ NSSA: External routes are introduced during running. Others are the same as that of the Stub.
l The above three special areas are used to decrease the number of routes and reduce the performance requirements on equipment. Common backbone networks are used to transfer routes of interconnected links only. Therefore, the areas are not used in most cases.
Major Points of OSPF Planning Major Points of OSPF Planning
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 34All rights reserved
OSPF Routing Protocol Planning (Continued)
l COST
To ensure that the router selects the best path, the value of COST must be set uniformly. At present, the value is set in the following ways:
[ 1. Set this value according to the bandwidth of links: Select a reference bandwidth and compare the actual link bandwidth with the reference bandwidth. COST = reference value / actual link bandwidth (if the maximum bandwidth GE is selected)
40 GE links COST = 1
10 GE links COST = 4
GE links COST = 40
FE links COST = 400COST
155 M links COST = 258 2
[ 2. Set the value of COST based on the designed traffic model so as to control routing:
Major Points of OSPF PlanningMajor Points of OSPF Planning
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 35All rights reserved
IS-IS Routing Protocol Planning
l Network hierarchy
[The IS-IS is designed with L2 and L1. Therefore, the router in the IS-IS domain can play the roles of L1, L2, and L1/L2. Considering scalability, it is recommended that the IS-IS equipment is placed in L2 in the backbone network. L2 of the IS-IS must be continuous. At the border of the backbone network, you can set the router to L1/L2 so as to facilitate subsequent expansion of the IS-IS domain.
l Area division
[ IS-IS, the concept of area is almost the same as that in the OSPF. Currently, the OSPF protocol is used for L2 in most cases, but areas do not play an important role. Only when routers L1 and L1/L2 exist, areas can restrict routes and traffic. If areas are identified through the local telephone area codes, they must be planned uniformly.
Major Points of ISMajor Points of IS--IS Planning IS Planning
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 36All rights reserved
IS-IS Routing Protocol Planning (Continued)
l NET (network entity ID)
[ NET, converted by the NSAP by setting NSEL to 0, is used to identify an IS device in the IP network. Its structure is as follows:
l AFI: AFI can be applied officially or be set to the private value 49. The value plays the role of identification in the IP network only.
AREA ID: It is planned in advance. For the backbone network, you can set this parameter to a local telephone area code or the AS No. of the system.
System ID: ID of a device in an area. It is unique in an area. This parameter is often set to an MAC address or IP address. It is recommended to set this parameter to the loopback address of equipment.
NSEL: It is set to the fixed value 00.
Major Points of ISMajor Points of IS--IS Planning IS Planning
AFI Variable Length Area Address System ID NSEL1 byte 1~12 bytes 6 bytes 1 byte
Area ID Sys ID NESL
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 37All rights reserved
NET Planning Example
l Suppose the area of a device is 49.0001 and the loopback address is 192.168.3.25, the NET can be in the following forms:
NET Planning Example NET Planning Example
192.168.003.025
1921.6800.3025 : System ID
49.0001.1921.6800.3025.00: NET
192.168.3.25
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 38All rights reserved
IS-IS Routing Protocol Planning (Continued)
l Metric
[Metric The functions and settings of Metric are the same as those of COST of the OSPF. Metric is used to control the shortest path of a route. IS-IS Metric consists of basic Metric and extended Metric. In Huawei, it is set to basic Metric by default. In large networks,extended Metric is used frequently. The value ranges of Metric are as follows:
Basic Metric: 1 63
Extended Metric: 1 - 16777215
Major Points of ISMajor Points of IS--IS Planning IS Planning
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 39All rights reserved
BGP Routing Protocol Planning
l The BGP is the most widely used and complicated protocol in the backbone network. The major points of BGP route planning are as follows:
[AS Number
AS numbers consist of public numbers and private numbers. Public AS numbers are allocated by CNNIC and need not be planned. Private AS numbers are in the range 64512 to 65535. Private AS numbers can be used inside operators, and the numbers can be filtered at the egress of network.
[ IBGP & EBGP
BGP neighbor covers IBGP and EBGP. The EBGP is running between operators and other networks, and the IBGP is used internally.
Major Points of BGP Planning Major Points of BGP Planning AS Number & BGP NeighborAS Number & BGP Neighbor
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 40All rights reserved
BGP Routing Protocol Planning (Continued)
l RR
[ In an AS, IBGP neighbors must be fully connected. Because the number of IBGP neighbors is large, the router reflector (RR) is used for networking.
Major Points of BGP Planning Major Points of BGP Planning RR Planning RR Planning
A: RR B: RR
Client Client
Cluster
RR RR RR RR
RR RR
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 41All rights reserved
BGP Routing Protocol Planning (Continued)
l Select an independent RR to ensure stability of the RR.
l If an independent RR cannot be selected, choose the router in the core position as the RR and ensure that the router can meet performance requirements.
l Use the RR redundancy configuration, that is, configure two RRs in a cluster and run the two RRs on the client.
l Set the same cluster-id for multiple RRs in a same cluster to avoid loop. It is recommended to select the bigger router id of RR as the cluster-id.
l If the network is large and is in the regular 2-level structure, use multi-level RR form to plan the RR.
RR Planning Principles RR Planning Principles
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 42All rights reserved
RR Networking Instances
Beijin
Level-1 RR1
Level-1 RR2
Level-1 RR1
Level-1 RR2
...
Level-1 RR1 Level-1 RR2
...
.
..Shang
hai
ZONE 3
Xian
Wuhan Nanjin
Guangzhou
ZONE 1
Level-2 RR1
City ECityD
City CCity BCity A
Province A1
Province A2Level-2 RR2
ZONE 2
City A
City A
CityA
City A
CityA
City B
City B
City B
City B
City BCity C City C
City C
City C
City C
CityD
City D
CityD
CityD
City D
City E
City E
City E
City E
City E
Level-2 RR1
Level-2 RR1
Level-2 RR1
Level-2 RR1
Level-2 RR1
Province A1
Province A1
Province A1
Province A1
Province A1
Province A2
Province A2
Province A2
Province A2
Province A2
Level-2 RR2
Level-2 RR2
Level-2 RR2
Level-2 RR2
Level-2 RR2
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 43All rights reserved
BGP Routing Protocol Planning (Continued)
l The major feature of the BGP is the route attribute. Planning ofthe BGP covers:
[Local-preference
[MED
[AS-Path
[Community
[Load-balancing
Major Points of BGP Planning Major Points of BGP Planning Route Attributes and Strategy Route Attributes and Strategy
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 44All rights reserved
Local-preference
l Local Preference
[ To control the router in the AS to select outgoing routes, set the parameter local-preference. By default, this parameter is set to 100. The bigger value indicates higher priority. Local-preference is often used in the backbone network to boot outgoing traffic. It must be set during networking planning.
LocalLocal--preferencepreference
A B
C
10.0.0.1 /24 Pre:100 10.0.0.1 /24 Pre:200RRRR
RR
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 45All rights reserved
MED
l MED is used to control the direction of incoming traffic of the AS. It is set to 0 by default. The smaller value indicates higher priority. To make the MED value indicate the internal topology of AS, replicate the COST value of IGP routes in the next hop of IBGP routes to the MED in EBGP routes. However, it needs support of devices.
MEDMED
A B
C
10.0.0.1 /24 MED:100
10.0.0.1 /24 MED:200
RR
RR RR
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 46All rights reserved
AS-Path
l As-Path is used to prevent loops and control routing (that is, modify the length of As-Path through the AS-Path Prepend mode to implement routing). As-Path differs from MED in that the MED helps control incoming traffic of neighbor Ass, whereas the Prepend can control routing of remote ASs.
ASAS--PathPath
AS 100
Import route10.0.0.0/24AS 200
AS 300AS 400
AS 500
As-p: 200 100
As-p: 400 300 100
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 47All rights reserved
Community
l Community attribute
[You can apply a group of strategies to a group of neighbors so as to simplify configuration. Through the community attribute, a group of strategies can be applied to a group of routes to control routes. In large networks, the community attribute is planned uniformly to identify and control some types of route.
[Known community attribute:
no-export: not inform the EBGP peer entity
no-advertise: not inform any peer entity
CommunityCommunity
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 48All rights reserved
Load-Balancing
l Load sharing mode 1:
[Use the command Balance BGP to change the preference strategy and form the equal-cost route.
LoadLoad--BalancingBalancing
RR RR
RR RR
Router A Router B
Router C Router D
1.1.1.1 2.1.1.1
3.1.1.1
3.1.1.2
AS100
AS200
Serial2/0/0 2.1.1.2
Serial1/0/0 1.1.1.2
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 49All rights reserved
Load-Balancing
l Load sharing mode 2:
[There are many routes between ASBRs. Use the loopback interface to create EBGP connections and share load for BGP routes throughiteration of the IGP equal-cost route of loopback.
LoadLoad--BalancingBalancing
RR RRAS 100 AS 200
Loopback130.0.0.1/8
Loopback130.0.0.1/8
Loopback030.0.0.1/8
Loopback030.0.0.1/8
Ethemet1/0/010.0.0.1/8
Ethemet2/0/020.0.0.1/8
Ethemet2/0/020.0.0.2/8
Ethemet1/0/010.0.0.2/8
Router A Router B
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 50All rights reserved
Chapter 3 Backbone Network PlanningChapter 3 Backbone Network Planning
3.1 IP Address Planning 3.1 IP Address Planning
3.2 Routing Protocol Planning3.2 Routing Protocol Planning
3.3 MPLS VPN Planning 3.3 MPLS VPN Planning
3.4 QoS Planning 3.4 QoS Planning
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 51All rights reserved
MPLS VPN Planning
l VPN demand analysis
[Number of VPNs and VPN service types
[Determine the network scope of VPNs, number of subscribers, and number of routes.
[Determine VPN mutual visit demands and networking structure.
[Determine the demands of VPNs to access public networks.
[Determine VPN cross-domain demands and implementation basis.
l Selection of device roles
[Determine devices P, PE, and CE. In the backbone network, most devices serve as the device P, and device P must support basic protocols such as MBGP, MPLS, and LDP.
MPLS VPN Planning Clue MPLS VPN Planning Clue
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 52All rights reserved
MPLS VPN Planning (Continued)
l Planning of VPN-Instance, RD, and RT
[The above parameters are planned and implemented on the device PE.
l MBGP Planning
[The planning of MBGP is basically the same as that of common BGP. It is recommended to use an independent RR that is different from common BGP devices for the MBGP. Do not overlap the RR and ASBR.
l PE-CE Protocol Planning
[Currently, the commonly used protocols include RIP, static protocols, OSPF, and EBGP. Select a protocol based on the network conditions and support of devices.
MPLS VPN Planning Clue MPLS VPN Planning Clue
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 53All rights reserved
MPLS VPN Planning (Continued)
l Inter-AS implementation mode
l The cross-AS MPLS VPN can be implemented in the following modes:
[VRF-to-VRF
[MP-EBGP
[Multi-Hop MP-EBGP
MPLS VPN Planning ClueMPLS VPN Planning Clue
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 54All rights reserved
Inter-AS implementation mode
l VRF-to-VRF
[ Advantage: The MPLS need not be running between ASBRs.
[ Disadvantage: Each VPN site must be bound with a sub-interface, and the ASBR needs to maintain vpn routes.
l MP-EBGP
[ Advantage: It is unnecessary to configure a sub-interface for each VPN site at the ASBR.
[ Disadvantage: VPN routes must be maintained at the ASBR. A complete LSP is required between the PE ingress and PE egress, and ASBRs need mutual trust.
l Multi-Hop MP-EBGP
[ Advantage: It is easy to expand, and VPN routes need not be maintained by the ASBR. It is suitable for large networks.
[ Disadvantage: The PEs of both ASs need to know the PE host address of peer AS, which may cause security problems.
CrossCross--ASAS MPLS VPNMPLS VPN
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 55All rights reserved
Chapter 3 Backbone Network PlanningChapter 3 Backbone Network Planning
3.1 IP Address Planning 3.1 IP Address Planning
3.2 Routing Protocol Planning3.2 Routing Protocol Planning
3.3 MPLS VPN Planning 3.3 MPLS VPN Planning
3.4 QoS Planning 3.4 QoS Planning
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 56All rights reserved
IP QoS Planning
l IntServ model: Services request specific QoS service from the network through signaling messages, and the network reserves resources within the range defined by the traffic parameter.
IP QoS IP QoS IntServ Model IntServ Model
l The IntServ model requires that end-to-end devices support this protocol. Network units save status information for each application. This model is not easy to expand, and the overhead of protocol messages is large due to regular information exchange with neighbor units. This model is not suitable for large networks.
I want to reserve 20 Mbps of bandwidth.
OKOK OK OK
I want to re
serve
20 Mbps o
f bandwidt
h.I want to reserve 20 Mbps of bandwidth.
I want to re
serve
20 Mbps o
f bandwidt
h.
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 57All rights reserved
l DiffServ model: When the network is congested, remove congestion by controlling the traffic and forwarding according to different QoS levels.
l For the DiffServ model, multiple service streams are converged into a Behavior Aggregate (BA), and the same PHB is used in network units for forwarding, thus simplifying service processing and storage. This model is easy to be expanded. Currently, the QoS is implemented based on the DiffServ model in most cases.
IP QoS Planning (Continued) IP QoS IP QoS DiffServ model DiffServ model
DiffServ network
User network
Traffic control
SLA/TCA
Border node
Internal node
Border node
Border node
Internal node Border
node
DiffServ network
User network
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 58All rights reserved
MPLS QoS Planning
l At the LER, map the IP DS bytes to the EXP bit of the MPLS Label and indicate the packet QoS requirement for the LSR through the EXP bit. In this case, an LSP can support up to eight service levels. The LSR dispatches queues for packets based on label and EXP and discards messages based on EXP. The packets in the same LSP may be dispatched to different queues. E-LSP is a common LSP created through the LDP.
MPLS QoSMPLS QoSEE--LSPLSP
E-LSPLSR
EFAF1
LERLER
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 59All rights reserved
MPLS QoS Planning (Continued)
l At the LER, map the IP DS bytes to an LSP and indicate the packet QoS requirement for the LSR through the label and EXP bit. The LSR dispatches queues for packets based on the label and discards messages based on EXP. The packets in a same LSP are dispatched to a same queue.
MPLS QoSMPLS QoSLL--LSPLSP
L-LSPLSRLER LER
EFAF1
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 60All rights reserved
MPLS QoS Planning (Continued)
l Selection of E-LSP or L-LSP depends on the number of service types, packet discard value, and MPLS running mode (frame mode or cell mode) planned by the network.
l When the cell mode is used as the MPLS running mode, the label corresponds to VPI/VCI. In this case, only L-LSP can be used. Map the EXP of label to the CLP of cells.
l When the frame mode is used as the MPLS running mode, E-LSP or L-LSP can be used. Currently, most operators use up to four service levels (voice, video, VPN and high-quality network access, and common network access). Therefore, E-LSP can meet requirements of application and implement interworking with IP Precedence and 802.1p. It is recommend to use the E-LSP mode.
Selection of ESelection of E--LSP&LLSP&L--LSP LSP
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 61All rights reserved
MPLS TE
l MPLS TE helps optimize network resources of the backbone network and avoid congestion or idleness of some nodes.
l By extending the IGP routing protocol (OSPF or IS-IS), the MPLS TE enables the IGP to collect network traffic information (including maximum link bandwidth, maximum reserved bandwidth, currently reserved bandwidth, and link types) and stores the information in the traffic database (TED). Each TE router obtains displayed routes based on its TED and route calculation according to strategies. The finally displayed routes are deployed through the signaling protocol CR-LDP or extension of RSVP. The MPLS TE technology is not used in a large scale because its deployment is complicated and need support of devices.
MPLS TEMPLS TE
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 62All rights reserved
QoS Planning Service Analysis
l Currently, the requirements on the network quality fall into the following categories:
[ The delay, jitter, packet loss ratio are low, and the bandwidth can be ensured. The typical services for these requirements include NGN voice services and video services.
[ The bandwidth can be ensured, and the real-time requirement is not high. The typical services for these requirements include key account service and NM service.
[ The requirements for real-time performance and bandwidth are not high. The typical service for these requirements is the common network access service.
l In the current backbone network, the QoS models frequently used are DifferServ and MPLS E-LSP. Based on the above analysis, the EF stream is for the first type of service, the AF stream for the second type of service, and BE stream for the third type of service.
Service AnalysisService Analysis
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 63All rights reserved
QoS Planning Service Levels
Service levelService level
WRED00b000000BEInternet access
WRED10b001xxxAF1Key account VPN (bronze medal), Vnet low priority, 3G data services
WRED20b010xxxAF2Key account VPN (silver medal), Vnet high priority
WRED40b100xxxAF4Key account VPN (gold medal)
None 50b101110EFReal-time video service
None 60b110xxxEF3G/NGN voice stream
None 70b111xxxHighest Control management
Congestion avoidance
MPLS EXP codeDSCP code Priority Service type
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 64All rights reserved
Chapter 1 Overview of Backbone Network Chapter 1 Overview of Backbone Network PlanningPlanning
Chapter 2 Backbone Network Architecture Chapter 2 Backbone Network Architecture
Chapter 3 Backbone Network Planning Chapter 3 Backbone Network Planning
Chapter 4 Typical Case Analysis for Chapter 4 Typical Case Analysis for Backbone NetworkBackbone Network
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 65All rights reserved
Typical Cases of T Office of China Mobile
l T office of China Mobile is the IP private backbone network that bears the softswitch service and VPN service especially.
l Beijing, Shanghai, Guangzhou, Wuhan, Nanjing, Shenyang, Xi an, and Chengdu are eight transit nodes, used to converge traffic of the areas.
Guangzhou
Shanghai
Xian
Wuhan
Tianjin
Shijiazhuang
Zhengzhou
HhhotTaiyuan
Haerbing
Changchun
Hangzhou
Nanjing 2
Fuzhou
Guangzhou 1
Shanghai2
Jinan
Hefei
NanchangChengdu
Haikou Changsha
Chongqing
Lanzhou
Urumchi
Yinchuan
Sining
Nanling
Kunming
Lasa
Beijing
Shenyang2
Beijing 2
Nanjing
Wuhan 1
Chengdu2
Xian 2
Shenyang
1
Shenyang1
Shanghai1
Nanjing 1
Wuhan 2Guangzhou 2
Chengdu1
Xian 1
National network management center
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
HUAWEI TECHNOLOGIES CO., LTD. Page 66All rights reserved
Typical Cases of T Office of China Mobile
l The backbone network of T office is divided into two planes: A and B. Each plane can bear all data traffic by design.
l In normal cases, plane A is responsible for the softswitch services, and plane B bears the key account VPN service. When a plane is faulty, the traffic in the plane will be switched to the other plane.
Forwarding plane A
Forwarding plane B
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com
www.huawei.com
Thank You
PDF created with FinePrint pdfFactory Pro trial version www.pdffactory.com