Networking
Networking
Networking
network such as IP. It offers the following services to its users: -- acknowledged
error-free non-duplicated transfer of user data, -- data fragmentation to conform to
discovered path MTU size,
6.1.3 Common Networking Solutions
Eth-trunk Inface
ARP Probe for Logical Links
Route
Concepts of OSPF Dynamic Routing
BFD
Typical Networking Solutions Between the UGW9811 and NEs
Common combinations of networking solutions
This describes the commonly used interfaces, routing modes, and typical networking solutions
for the UGW9811 to interconnect with different network elements (NEs).
Eth-trunk Interface
If a physical interface fails, the communications between the UGW9811 and the peer device that
is connected to the UGW9811 through this physical interface also fail. This is a reliability defect
of single point interconnection between NEs. This defect can be rectified by Layer 2 reliability
networking. Multiple physical interfaces are bound to one Eth-trunk logical interface.
Physical interfaces in the Eth-trunk interface work in active/standby mode or load-sharing mode.
For details, see Table 1.
Multiple Ethernet physical interfaces are Multiple Ethernet physical interfaces are bound
bound to one Eth-trunk interface. These to one Eth-trunk logical interface. These
physical interfaces share one IP address, and physical interfaces share one IP address and
only one interface is active. If the active multiple links work in active mode to share
physical interface fails, the system data streams. When one physical interface
automatically switches to a standby physical fails, the links of other available physical
interface. interfaces automatically take over the traffic.
Networking Diagrams
Figure 1 Networking of physical interfaces in Figure 2 Networking of physical interfaces in
an Eth-trunk interface working in an Eth-trunk interface working in load-sharing
active/standby mode mode
Table 1 Details about the Eth-trunk interface
Active/Standby Mode Load-sharing Mode
Networking Description
On the UGW9811, two physical interfaces are On the UGW9811, two Eth-trunk logical
bound to one Eth-trunk interface and they interfaces work in load-sharing mode and each
work in active/standby mode. Eth-trunk interface is bound with three
physical interfaces. The three physical
The two physical interfaces are located interfaces in each Eth-trunk interface are:
on different LPUs.
Each of the two physical interfaces is Located on the same LPU.
connected to one LAN Switch. Connected to the same LAN Switch.
The two physical interfaces have the Sharing the same IP address, that is, the
same IP address, that is, the IP address IP address of the Eth-trunk interface.
of the Eth-trunk interface.
When the link between the Ethernet1/0/1
Ethernet1/0/1 and Ethernet2/0/1 are the active interface on the UGW9811 and LAN Switch-1
and standby interfaces of the UGW9811 fails, the links of the Ethernet1/0/2 and
respectively. If the link between Ethernet1/0/1 Ethernet1/0/3 interfaces automatically take
and LAN Switch 1 fails, the UGW9811 over the traffic.
enables Ethernet2/0/1 and then switches to the
link between Ethernet2/0/1 and LAN Switch
2.
Remarks
Once the active/standby mode is adopted on To further enhance reliability, two Eth-trunk
the Eth-trunk interfaces, you cannot disable interfaces in load-sharing mode can be backups
this mode unless the networking mode is for each other. See Figure 2. The UGW9811
changed; otherwise, the system fails. connects to LAN Switch 1 through Eth-trunk 1
and connects to LAN Switch 2 through Eth-
The Layer 2 networking requires routers or trunk 2. The two Eth-trunk interfaces in load-
switches supporting the Layer 2 exchange sharing mode are backups for each other. If the
function. On the peer router or LAN Switch, a link between Eth-trunk 1 and LAN Switch 1
pair of active and standby interfaces must fails, the UGW9811 switches to the link
belong to the same network segment or virtual between Eth-trunk 2 and LAN Switch 2. This
local area network (VLAN). scheme is implemented through route
redundancy.
To improve the reliability of Layer 2 networking, the UGW9811 adopts the Address Resolution
Protocol (ARP) probe mechanism. For details, see GWFD-011000 Reliability.
Route
Table 2 lists the common static routing and OSPF dynamic routing modes from the UGW9811 to
interconnected NEs.
Normal routes are of this Multiple OSPF processes can run on an NE.
type. That is, IP packets are These processes independently run and do not
sent to the next hop through affect each other. The routing interaction
the static route to the between different OSPF processes can be
destination. regarded as the routing interaction between
different routing protocols. An interface on the
Black hole routes UGW9811 can belong to only one OSPF
process.
When a static route to a
destination has the Packet authentication
BLACKHOLE attribute, all
IP packets to this destination OSPF supports packet authentication. Only the
are discarded, and the source authenticated OSPF packets can be received;
host is not informed of packet otherwise, the neighbor relationship cannot be
discarding. established normally.
Hot backup
Table 2 Routing description
Static Routing Dynamic Routing
The device in distributed structure supports
OSPF hot backup. In OSPF hot backup, essential
information on the active SRU/MPU is backed
up to the standby SRU/MPU. When the active
SRU/MPU is faulty, the standby SRU/MPU
becomes the active SRU/MPU. This ensures the
normal running of OSPF.
You can manually set a router ID. Generally, the router ID is set as the IP
address of an interface on the router.
If you do not specify the router ID, the system automatically selects an IP
address of the existing interface as the router ID. The highest IP address of
loopback interfaces is selected as the router ID. If no loopback interface is
configured, the highest IP address of the interfaces is selected as the router
ID.
Area You must specify an area to which an interface running OSPF belongs.
OSPF processes can share an area. For example, area 0 can be used by both
OSPF 1 and OSPF 2.
Area OSPF supports packet authentication. Only the authenticated OSPF packets
authentication can be received; otherwise, the neighbor relation cannot be established
normally.
Table 3 Concepts of OSPF dynamic routing
Concept Description
All the routers in the area must agree on the same area authentication mode
and password.
OSPF network This network segment refers to the network segment of the IP addresses of
segment an interface that runs OSPF. A network segment can belong to only one area.
That is, you must specify an area for each interface running OSPF. OSPF can
be run on an interface only when the following conditions are satisfied::
BFD
Deployed on the LPU, the Bidirectional Forwarding Detection (BFD) functions implemented on
the UGW9811 are as follows:
Table 4 lists the typical networking solutions between the UGW9811 and interconnected NEs.
Table 4 Recommended UGW9811 networking solutions
Interconnected Single Group Recommended Backup
NE Logical Logical Networking Solution Networking
Interface Interface Solution
eNodeB S1-U Saif Networking of Eth- Networking of
trunk Interfaces in Eth-trunk Interface
MME S11
Static LACP in Active/Standby
RNC S12 Mode+OSPF Dynamic Mode+Static
Routing Routing
S4-SGSN S4
P-GW S5_p Paif
S-GW S5_s
Non-3GPP S2a
S2b
AAA Server S6a -
PDN SGi
CG Ga - Networking of Eth- -
trunk Interface in
OCS Gy
Active/Standby
PCRF Gx Mode+Static Routing
OM network OM
Report Server Grp
This networking solution is recommended for the UGW9811 to interwork with the operation and
maintenance (O&M) network, charging gateway (CG), online charging system (OCS) server,
policy and charging rules function (PCRF), and report server.
Networking Advantages
A default route is configured, which minimizes the route configuration. The number of
routes is small, which reduces the impact on performance.
Eth-trunk interfaces work in active/standby mode. When a member link fails, the traffic
is automatically switched to another available link.
Address Resolution Protocol (ARP) probe is used to enhance networking reliability. This
is to prevent interrupted communications caused by the member link faults that cannot be
detected, such as one way and probabilistic packet loss.
Figure 1 shows the networking of the GE interface and static routing. Figure 2 shows the reliable
networking by using a Layer 3 device.
Layer 3 networking is recommended for the 10GE interface on the UGW9811. See Figure 3.
This networking solution is used for the UGW9811 to interwork with the serving GPRS support
node (SGSN), evolved NodeB (eNodeB), mobility management entity (MME), serving gateway
(S-GW), PDN gateway (P-GW), and packet data network (PDN).
Networking Advantages
Open Shortest Path First (OSPF) dynamic routing is applicable in a network with the
complex topology and many devices and IP routes. For example, OSPF routes apply to
the situation in which there are a large number of eNodeBs, the Gp/S8 interface involves
inter-network roaming, and interworking with a packet data network (PDN) is required.
A Not-So-Stubby Area (NSSA) is configured. In the NASSA, autonomous system (AS)
external routes (described by five types of LSAs) and inter-area routes (described by
three types of LSAs) are not allowed to be imported. This is to reduce routing table
entries on the UGW9811.
Multiple GE/10GE physical interfaces are bound to an Eth-trunk interface and use the
same IP/MAC address. The physical interfaces that are bound to the Eth-trunk interface
work in load-sharing mode. In this situation, when the traffic volume increases, you
simply need to add physical interfaces to the Eth-trunk interface and do not need to add
IP addresses or change route configurations for the UGW9811 and the peer devices that
are directly connected to the UGW9811. Therefore, this networking has good
expansibility.
Downlink routes to the UGW9811 do not need to be manually configured on provider
edges (PEs) or customer edges (CEs), because OSPF routes are automatically advertised
and learned. The UGW9811 dynamically generates downlink routes for a subscriber
address pool. Therefore, when the capacity of the address pool is expanded, the
UGW9811 advertises the routes using dynamic route configurations, thereby reducing the
heavy maintenance workload.
In this networking solution, Layer 1/Layer 2/Layer 3 reliability can be guaranteed for the
UGW9811.
o At Layer 1, the auto-negotiation mode configured for GE optical ports and Local
Fault (LF)/Remote Fault (RF) defined by IEEE 802.3ae for 10GE ports are used
to detect physical layer faults (such as single-fiber faults).
o At Layer 2, Link Aggregation Control Protocol (LACP) detection is used to detect
link layer faults.
o At Layer 3, Bidirectional Forwarding Detection (BFD) is used to detect IP layer
faults.
Figure 1 shows the networking between the UGW9811 and a Layer 2 device. Figure 2 shows the
networking between the UGW9811 and a Layer 3 device.
Figure 1 Networking of the interconnection between the GE interface on the UGW9811 and a
Layer 2 device
Figure 2 Networking of the interconnection between the GE interface on the UGW9811 and a
Layer 3 device
Layer 3 networking is recommended for the 10GE interface on the UGW9811. See Figure 3.
This networking solution is used for the UGW9811 to interwork with the evolved NodeB
(eNodeB), packet data network (PDN), online charging system (OCS) server, charging gateway
(CG), policy and charging rules function (PCRF), and operation and maintenance (O&M)
network.
Networking Advantages
Two static default equal-cost routes are manually configured, which minimizes the route
configuration. Different interfaces are isolated using a virtual private network (VPN), and
a default route is configured for each interface.
Multiple GE/10GE physical interfaces are bound to an Eth-trunk interface and use the
same IP/MAC address. The physical interfaces that are bound to the Eth-trunk interface
work in load-sharing mode. In this situation, when the traffic volume increases, you
simply need to add physical interfaces to the Eth-trunk interface and do not need to add
IP addresses or change route configurations for the UGW9811 and the peer devices that
are directly connected to the UGW9811. Therefore, this networking has good
expansibility.
The Bidirectional Forwarding Detection (BFD) function is deployed on the LPU.
Forwarding services are not affected when the active and standby SRUs/MPUs are
switched.
In this networking solution, Layer 1/Layer 2/Layer 3 reliability can be guaranteed for the
UGW9811.
o At Layer 1, the auto-negotiation mode configured for GE optical ports and Local
Fault (LF)/Remote Fault (RF) defined by IEEE 802.3ae for 10GE ports are used
to detect physical layer faults (such as single-fiber faults).
o At Layer 2, Link Aggregation Control Protocol (LACP) detection is used to detect
link layer faults.
o At Layer 3, Bidirectional Forwarding Detection (BFD) is used to detect IP layer
faults.
Figure 1 shows the networking of the GE interface and static routing. Figure 2 shows the reliable
networking by using a Layer 3 device.
This networking solution is used for the UGW9811 to interwork with all network elements
(NEs).
Networking Advantages
Address separation
The address space of a virtual private network (VPN) is separated from address spaces of
its public packet switched network (PPSN) and other VPNs. That is, the address of a host
inside the VPN is invisible to its PPSN and other VPNs. Address overlapping is allowed.
Data security
No data exchange occurs between the VPNs or between a VPN and its PPSN.
Inside a VPN, when two hosts in different places communicate, the VPN edge device
selects a proper link on its PPSN. The data stream is therefore sent from a VPN edge
device to another VPN edge device.
Virtual routing forwarding (VRF) is used to logically divide a physical device and is a method of
constructing a VPN. Each VRF has an independent routing table and address space.
On the UGW9811, VRF is represented as VPN instances. With VPN instances, you can virtually
divide a router into multiple independent routers and then separate the routes on an IP network.
By creating VRF on the UGW9811, you can separate routes of a VPN from routes of a public
network and from those of another VPN.
Each VRF has an independent routing table. Therefore, routing tables of different VPNs
do not affect each other.
Each VRF has an independent address space. Address conflict does not occur on VPNs of
the same device.
Each VRF can be bound with multiple interfaces. The interfaces can be physical
interfaces or logical interfaces (such as the tunnel interface).
On the UGW9811, you can configure the mappings between access point names (APNs) and
VPN instances. In this manner, you can separate the addresses and routes of users of different
APNs. See Figure 1. When a user accesses the UGW9811, the UGW9811 matches the VPN
instance of the APN according to the APN carried in the user activation message. Then, the
UGW9811 forwards uplink and downlink packets of the user according to the routing table of
the VPN.
Figure 1 Diagram of separating routes of different network segments through VPN instances
Apart from creating VRF, you can also construct a VPN through tunnel routes. The commonly
used tunnels include Generic Routing Encapsulation (GRE), IP Security Protocol (IPSec), and
Layer 2 Tunneling Protocol (L2TP) tunnels.
In this solution, you must create an enterprise dedicated tunnel between the UGW9811 and the
VPN gateway of the enterprise. This tunnel is not bound with any APN. The service procedure is
as follows:
1. On the UGW9811, configure routes to the intranet and configure the interface at the peer
end of the tunnel as the output interface.
2. The UGW9811 transmits the VPN data to the intranet according to the route. Otherwise,
the UGW9811 forwards the user data to the Internet.
NOTE:
Address space of different enterprise users may overlap because most of the network addresses
for enterprise users are private network addresses. Therefore, the tunnel technology is required
together with the VRF technology, so that route tables can be segregated and address space of
different VPNs can be reused. In this case, the interfaces bound to the VPN are tunnel interfaces.
Typical Application Scenarios
Table 1 lists the typical application scenarios for the VPN networking.
GRE tunnel AAA server and PDN GRE tunnels are the most commonly used tunnels
access and are mainly applied to:
NOTE:
Intranet using private network addresses
The location of the AAA for communications.
server affects the Terminals remotely accessing the intranet
network topology and over the public network.
route planning.
IPSec tunnel If enterprise users have high security requirements,
If the AAA
access you can use the IPSec tunnels to construct the
server is located
VPN. IPSec tunnels are mainly applied to:
in an intranet,
you can
Intranet using private network addresses
configure only
for communications.
one VPN on the
Terminals remotely accessing the intranet
UGW9811.
over the public network.
If the AAA
server is located
NOTE:
on the bearer
network, you
must configure To ensure the transmission security, the
an independent UGW9811 encrypts the packets transmitted over
VPN for the the public network by using IPSec.
AAA server on
the UGW9811.
Table 1 Typical application scenarios for the VPN networking
Typical Interconnected NE Application Description
Application
Scenario
For details, see Inband
or Outband Networking
with the AAA Server.
L2TP tunnel PDN The UGW9811 provides enterprise users with
access L2TP tunnels to access the VPN. On the
UGW9811:
instance
Table 2 Application description of inband or outband networking with the AAA server
Inband Networking Outband Networking
For the RADIUS signaling packets from For the RADIUS signaling packets from an APN to
an APN to an AAA server and data an AAA server and data packets from an APN to a
packets from an APN to a PDN, the PDN, the UGW9811 uses different output
UGW9811 uses the same output interface interfaces for route forwarding.
for route forwarding.
Any interface of a physical interface, Eth-trunk interface, sub-interface, or tunnel interface,
which serves as the next hop from the UGW9811 to the AAA server and PDN, can be used as
the output interface.
VPN Binding Method
The same VPN routes are used from the Different VPN routes are used from the UGW9811
UGW9811 to the AAA server and PDN. to the AAA server and PDN. As shown by
As shown by Inband networking in Outband networking in Figure 2, VPN1 and
Figure 2, the VPN is used to bind with the VPN2 are used for data forwarding from the
following: UGW9811 to PDN1 and PDN2 and they are
respectively bound to:
Eth-trunk0: Specifies the output
interface from the UGW9811 to Eth-trunk0 and Eth-trunk1: Specify the
the AAA server and PDN. output interfaces from the UGW9811 to
Giif3/0/0: Specifies the logical PDN1 and PDN2.
interface from the UGW9811 to APN1 to APNn: Specify all APNs on the
the AAA server. UGW9811 bound to VPN1.
AAA server: Specifies the APNx1 to APNxn: Specify all APNs on the
RADIUS server used by APN1 to UGW9811 bound to VPN2.
APNn users.
APN1 to APNn: Specify all APNs VPN_Radius is used for forwarding RADIUS
on the UGW9811 bound to the signaling packets from the UGW9811 to the AAA
VPN. server and is used to bind with:
On an IPv4 network, all external interfaces on the UGW9811 use IPv4 addresses, as shown in
Figure 3. The UGW9811 uses IPv4 tunnels to access IPv6 networks.
1. IPv6 addresses are dynamically assigned to users and user data are encapsulated into
IPv6 packets inside the UGW9811.
2. A tunnel interconnecting the UGW9811 and the IPv6 gateway is established.
3. IPv6 packets are encapsulated into IPv4 packets.
4. IPv4 packets are transmitted to the border router on the IPv6 network through manual or
automatic tunnels.
5. IPv6 packets are obtained by decapsulating IPv4 packets on the border router.
6. The destination server is routed according to IPv6 headers.
On an IPv4 network, all external interfaces on the UGW9811 use IPv4 addresses, as shown in
Figure 4. The UGW9811 uses IPv4 GRE tunnels to access IPv6 networks.
1. IPv6 addresses are dynamically assigned to users and user data are encapsulated into
IPv6 packets inside the UGW9811.
2. A tunnel interconnecting the UGW9811 and the IPv6 gateway is established.
3. IPv6 packets are encapsulated into GRE packets and GRE packets are encapsulated into
IPv4 packets.
4. IPv4 packets are transmitted to the border router on the IPv6 network through tunnels.
5. IPv6 packets are obtained by decapsulating IPv4 packets and GRE packets on the border
router.
6. The destination server is routed according to IPv6 headers.
6to4 Tunnel
On an IPv4 network, all external interfaces on the UGW9811 use IPv4 addresses, as shown in
Figure 5. The UGW9811 uses IPv4 networks to access IPv6 networks.
1. 6to4 addresses are dynamically assigned to users and user data is encapsulated into IPv6
packets inside the UGW9811.
2. A tunnel interconnecting the UGW9811 and the IPv6 gateway is established.
3. IPv6 packets are encapsulated into IPv4 packets and the IPv4 address to the peer router is
obtained from the 6to4 address pool. The obtained IPv4 address is filled into the IPv4
header.
4. IPv4 packets are transmitted to the border router on the IPv6 network through tunnels.
5. IPv6 packets are obtained by decapsulating IPv4 packets on the border router.
6. The destination server is routed according to IPv6 headers.
Product Features
Configurations
This describes the operation and maintenance (OM) of the UGW9811 based on the client/server
architecture.
Technical Specifications
This lists the technical specifications of the UGW9811. The technical specifications consist of
performance specifications, entire-system specifications, reliability specifications, safety
standards, electromagnetic compatibility (EMC) specifications, and environment requirements.
Environment Specifications
This describes the environmental requirements for the UGW9811. The environment
specifications consist of the storage, transportation, and running specifications.
< Home
The UGW9811 has many logical forms and supports various types of access. This product can
meet carriers' networking requirements at different phases and in different deployment scenarios.
Multiple types of access: supports access in GPRS, UMTS, LTE, or CDMA2000HRPD mode.
Multiple logical product forms: The UGW9811 supports any combination of the GGSN, S-GW,
and/or P-GW. In operation and maintenance, the UGW9811 supports logical combinations of
the GGSN, S-GW + P-GW, GGSN + S-GW + P-GW.
The UGW9811 hardware platform can implement the UGW9811 functions after software
upgrade. It can better adapt to the operators' various requirements for network evolution and
service expansion, ensuring the operators' operation investments.
The UGW9811 presents an ideal and flexible solution for wireless data communication to
network carriers. In order to achieve this, it utilizes Huawei's Universal Switching Router (USR)
hardware platform which boasts high reliability and high-level data throughput and a software
platform that seamlessly integrates wireless telecommunication technologies and data
communication technologies.
The USR is a carrier-class network switching device that is compliant with industry standards.
Developed on the basis of Huawei Versatile Routing Platform (VRP), the software of the
UGW9811 inherits the integrated routing technology, IP Quality of Service (QoS), Virtual
Private Network (VPN), and security technology of the VRP and perfects the functions specific
to applications in wireless telecommunication.
Hardware reliability
The UGW9811 supports hot plugging and hot backup of key boards, possesses a double-
channel power supply system, and is protected from over-voltage and over-current.
Software reliability
The UGW9811 is capable of overload control, traffic control, resource check, system
software backup, configuration files check and automatic fault detection. This ensures
reliable running. The unique charging data record (CDR) cache function guarantees a
reliable billing system. The hot patch technology helps to ensure the normal software
running.
Networking reliability
The route backup and router load sharing functions can prevent single point failure on
networks, helping to build highly reliable networks. The Eth-Trunk function can prevent
failure of a single port from affecting services.
SSL: The UGW9811 ensure data confidentiality for operation and maintenance.
When the UGW9811 upgrade failed, it can rollback previous version automatically. In
this way, the remote update failed service restore time can be reduce.
The UGW9811 provides the patch rollback function to ensure the reliability of running
patch.
The same as reliability, security is concerned by operators and end users. The requirements for
security is fully considered for the design of the UGW9811 and the following measures are
taken:
Large Capacity
Huawei Universal Switching Router (USR), a fifth-generation core router, is the hardware
platform of the UGW9811. In Huawei USR, the signaling/control plane is separated from the
data plane. That is, the signaling/control plane consists of multiple high-performance universal
processors. The data plane consists of multiple high-performance and high-forwarding-capability
network processors (NPs).
User-Friendly GUI
The GUI helps to provide a user-friendly and convenient OM interface. Operations are
simplified through the graphic network topology view and device panel view. Frequent
operations can be performed by selecting items from the menu.
Configuration Management
Message Tracing
The UGW9811 allows signaling message tracing, data packet tracing, interface message
tracing, user message tracing, and message explanation.
Operator can create interface and user tracing tasks to monitor the signaling of the
interfaces and users of the system in real time. The stored messages including the
information about previous versions can be viewed online or offline. If a fault occurs in
the UGW9811, you can quickly and accurately locate and clear the fault through the
interface signaling tracing function.
The UGW9811 can display performance measurement data in the form of lists and
graphics. It also supports background performance data collection.The centralized
performance management system provides a comprehensive and direct operation
environment. Operator can manage the performance of devices in the entire network.
Operator can create, modify, and query performance measurement tasks and manage the
results to learn the running status of the network and devices. The measurement results
are for performance assessment and network optimization.
Remote Management
The UGW9811 can receive and display network device fault reports in real time. It
provides real-time audible or visual alarms through the topology view, alarm panel, and
alarm box. The UGW9811 provides detailed fault reports, and the fault management
system with leveled filtering functions. This enables you to determine fault causes
quickly. After determining fault causes, you can clear faults by following the instructions
provided in the online help.
The online help provides help information on the OM system and alarm handling. Thus,
you can be familiar with the operation and maintenance of the UGW9811 quickly.
< Home
6.2.2 Architecture
This describes the hardware and software structure of the UGW9811.
Hardware Structure
Software Structure
< Home
Cabinet
The UGW9811 uses an N68E-22 cabinet.
Subrack (PGP-16)
Subrack (PGP-X8)
Subrack (PGP-X16)
Boards
The UGW9811 consists of SRUs/MPUs, SFUs, SPUs, PEUs, STEs, MSUs, and LPUs.
< Home
6.2.2.1.1 Cabinet
The UGW9811 uses an N68E-22 cabinet.
The design of the cabinet complies with the International Electro Commission 297 (IEC297) and Institute
of Electrical and Electronics Engineers (IEEE) standards. A modular structure is used, facilitating capacity
expansion and maintenance. In addition, electromagnetic compatibility was fully considered in the
design of the cabinet and electromagnetic shielding interfaces are used.The UGW9811 consists of a
UGW9811 subrack and a power distribution box. Figure 1 shows the exterior of the N68E-22 cabinet.
< Home
MPU: Main SFU: SPU: Service PEU: Packet STE: MSU: LPU: Line
Processing Switching Processing Enforcement Smart Multi- Processing
Unit Fabric Unit Unit Unit Traffic Service Unit
Explorer Unit
Parent Topic: Hardware Structure
< Home
SRU: SFU: SPU: Service PEU: Packet STE: Smart MSU: LPU: Line
Switching Switching Processing Enforcement Traffic Multi- Processing
Route Unit Fabric Unit Unit Unit Explorer Service Unit
Unit
Parent Topic: Hardware Structure
< Home
MPU: Main SFU: SPU: Service PEU: Packet STE: MSU: LPU: Line
Processing Switching Processing Enforcement Smart Multi- Processing
Unit Fabric Unit Unit Unit Traffic Service Unit
Explorer Unit
Parent Topic: Hardware Structure
< Home
6.2.2.1.5 Boards
SRU/MPU(Switching Route Unit)/( Main Processing Unit)
SFU(Switching Fabric Unit)
SPU(Service Processing Unit)
PEU(Packet Enforcement Unit)
STE(Smart Traffic Explorer)
MSU(Multi-Service Unit)
LPU(Line Processing Unit)
The UGW9811 consists of SRUs/MPUs, SFUs, SPUs, PEUs, STEs, MSUs, and LPUs.
The SRU is the core circuit board for system management. The SFU performs the data exchange
function. The SPU performs the service processing function. The PEU provides the internet
protocol service quality management (IPSQM) function. The STE provides collecting metric
statistics for evaluating user experience. The MSU provides the traffic optimization function.
The LPU provides physical interfaces that connect the UGW9811 to NEs or external networks.
The SRU/MPU, as the main control and switching unit of the UGW9811, is responsible for
centralized control and management and data exchange. The SRU/MPUs work in 1+1 backup
mode. The SRU/MPU is composed of the main control unit, switching unit, system clock unit,
synchronous switching clock unit, and system maintenance unit. The SRU applies to a PGP-X8
subrack, and the MPU applies to PGP-16 and PGP-X16 subracks. The SRUX applies to a PGP-
X8 subrack, and the MPUX applies to a PGP-X16 subrack. The SRU in a PGP-X8 subrack
integrates the function of an SFU.
The SPU performs service control, user packet forwarding, flow control, QoS, and content
resolution functions. The SPUs work in load-sharing or N+1 or 1+1 backup mode. The operating
mode is defined in the license file. In 1+1 backup mode, the SPUs guarantee service reliability.
TCP optimization: uses a number of techniques, including TCP transparent proxy, skipping
slow-start, fast retransmission and fast recovery, and TCP sender algorithm optimization, to
improve the TCP transmission efficiency.
Large-scale sponsored data: The UGW9811 performs service awareness (SA) and sends Layer
3/Layer 4 information and/or uniform resource locators (URLs) to the virtual service capability
exposure function (vSCEF). The vSCEF then performs service rule matching and sends the
charging identifier to the UGW9811 for charging so that subscribers can use free-of-charge or
preferential traffic packages.
SDN-based traffic classifier function: The UGW9811 performs SA to identify data services and
matches them with service chains based on subscriber information and policies. Then the
UGW9811 forwards data flows that match service chains to the vMSE, and the vMSE forwards
the data flows to corresponding Gi-LAN services for VAS processing based on service chain
information carried in the data flows.
The PEU provides the internet protocol service quality management (IPSQM) function. With this
function, the PEU performs the traffic shaping function for the burst traffic destined to the
eNodeBs, improving the bandwidth usage of the S1-U bearer link.
The smart traffic explorer (STE) collects IP-, transmission-, and service-layer metric statistics for
evaluating user experience through the Gi/SGi interface and analyzes the statistics.
MSU(Multi-Service Unit)
The MSU provides functions, such as video optimization and content cache. The MSU must be
used together with the LPU and SPU to achieve network optimization and content acceleration
and improve user experience of online services.
The LPU provides the following physical interfaces that connect the UGW9811 to external
networks:
The LPU is composed of three modules: LPU module, switching network fabric adapter (FAD)
module, and physical interface card (PIC) module.
These three modules work together to quickly process and forward service data. In addition, they
maintain and manage link protocols and forwarding information base (FIB) tables.
< Home
The software structure of the UGW9811 consists of the access management (AM), charging
management (CM), service management (SM), platform service (PS), operation and maintenance
(OM) modules,and LMT(local maintenance terminal).
Structure Description
AM This module performs functions such as user
access control, user authentication and
authorization, address assignment, and
PDP/bearer context management. In addition,
the UGW9811 enables multiple user access
modes.
CM This module processes charging protocols and
manages charging data records (CDRs). In
addition, the CM system works with external
charging gateways (CGs) and external
charging systems to charge users.
SM This module obtains and controls policies of
user data flows.
PS This module distributes and processes
signaling packets and data packets of the
UGW9811; it works with the relevant modules
to implement charging and service control; it
performs functions such as system support and
routing.
OM This module performs OM functions such as
data configuration management, device
management, performance management, alarm
management, and security management.
LMT Provides graphical user interfaces (GUIs).
Parent Topic: Architecture
< Home
6.2.3 Configurations
This describes the typical configurations of the UGW9811.
The UGW9811 requires only one UGW9811 subrack. The cabinet that houses the UGW9811
subrack is called the UGW9811 service cabinet.
Firewalls and Ethernet switches are optional devices in the UGW9811 service cabinet.
The UGW9811(PGP-X8) supports four typical configurations: minimum configuration, 1+1 mode
maximum configuration, load-sharing mode maximum configuration, and N+1 backup mode
maximum configuration.
< Home
NOTICE:
The performance specifications provided in this document are assessed based on specific traffic
models. The performance specifications vary obviously with increasing everlasting bandwidth
required by PS subscribers and Darwinian development of Internet services. For network
assessment of a specific site, contact Huawei local office.
Minimum Configuration
In minimum configuration, the UGW9811(PGP-X16) supports 4,000,000 bearer contexts and 60
Gbit/s throughput (with the packet length of 1024 bytes). Table 1 shows the board numbers.
In 1+1 active/standby mode, the UGW9811(PGP-X16) supports 24,000,000 bearer contexts and
360 Gbit/s throughput (with the packet length of 1024 bytes). Table 2 shows the board numbers.
Load-sharing Mode
In load-sharing mode, the UGW9811(PGP-X16) supports 40,000,000 bearer contexts and 600
Gbit/s throughput (with the packet length of 1024 bytes).Table 3 shows the board numbers.
NOTE:
N+1 Mode
In N+1 mode, the UGW9811(PGP-X16) supports 36,000,000 bearer contexts and 540 Gbit/s
throughput (with the packet length of 1024 bytes).Table 4 shows the board numbers.
< Home
Protocol Interfaces
Physical Interfaces
< Home
6.2.4.1 Protocol Interfaces
The UGW9811 provides multiple interfaces that comply with standard protocols.
The interfaces provided by the UGW9811 on the GPRS/UMTS network are as follows:
Gn/Gp Interface: Gn/Gp Interface is an interface between the GGSN and the SGSN.The Gn
interface is between the GPRS support nodes (GSNs) within the same public land mobile
network (PLMN). The Gp interface is between the GSNs in different PLMNs.
Gi Interface: Gi interface is an interface between the GGSN and the PDN. It can also serve as the
interface connecting the GGSN and the AAA server, transmitting authentication and charging
control messages.
Ga Interface: Ga is an interface between the GGSN and the Charging Gateway Functionality
(CGF). The Ga interface runs the GTP protocol. It runs the GTP protocol to send charging data
records (CDRs) that are generated by a network element or functional entity to the CGF.
Gy Interface: Gy is an interface between the GGSN and the online charging system/credit control
function (OCS/CCF). It communicates based on the Diameter protocol and is used for online
charging control. The UGW9811 interacts with the OCS through the Gy interface to realize credit
control for content-based charging users and non-content-based charging users.
Gx Interface: Gx is an interface between the GGSN and the policy charging rules function (PCRF).
It communicates based on the Diameter protocol. The GGSN interacts with the PCRF through
the Gx interface to realize policy and charging control (PCC) function.
Grp Interface: Grp interface is a Huawei proprietary interface between the GGSN and report
server. The GGSN uses the Grp interface to interwork with the report server to implement the
mobile broadband (MBB) visibility function.
Gcf Interface: Gcf interface is a Huawei proprietary interface between the GGSN and Internet
Content Adaptation Protocol (ICAP) server. The GGSN uses the Gcf interface to interwork with
the ICAP server to implement the uniform resource locator (URL) filtering function.
Gnr Interface: Gnr interface is a Huawei proprietary interface between the GGSN and eLog
server. The GGSN uses the Gnr interface to interwork with the eLog server to implement the
NAT logs report function.
The interfaces provided by the UGW9811 on the EPC network are as follows:
S1-U Interface: S1-U interface is an interface in the user plane between the eNodeB and the S-
GW. It is used to transmit the uplink and downlink user plane data between the eNodeB and the
S-GW.
S11 interface: The S11 interface is an interface in the control plane between the MME and S-
GW. It is mainly used to transmit messages for bearer establishment, update, and deletion
between the MME and S-GW. This interface is also used for the S-GW to instruct the MME to
page a UE in the ECM-IDLE state and to restore the S1 bearer.
S12 Interface: S12 interface is an interface to the user plane between the RNC and the S-GW. It
is used to transmit the downlink and uplink user plane data flows between the RNC and the S-
GW when the direct tunnel solution is used on the UTRAN.
S4 Interface: S4 interface is an interface in the signaling plane and the user plane between the
S4 SGSN and S-GW. The signaling plane connects the S4 SGSN to the EPS network, transmitting
messages for bearer establishment, update, and deletion. The user plane transmits the user
plane downlink and uplink data flows between the S4 SGSN and the S-GW.
S5/S8 interface: The S5/S8 interface is an interface in the user plane and signaling plane
between the S-GW and P-GW. The S5 interface is used between the home S-GW and
home P-GW, and the S8 interface is used between the S-GW on a visited network and the
home P-GW.
NOTE:
S5 interface is used when the UGW9811 functions as the S-GW or as P-GW, not used
when the S-GW and P-GW are deployed on the same device.
Ga Interface: Ga is an interface between the S-GW,or P-GW and the charging gateway
functionality (CGF). The Ga interface runs the GTP protocol. It runs the GTP protocol to send
charging data records (CDRs) that are generated by a network element or functional entity to
the CGF.
Gxc Interface: Gxc is an interface between the S-GW and the policy charging rules function
(PCRF). It communicates based on the Diameter protocol. The S-GW interacts with the PCRF
through the Gxc interface to realize policy and charging control (PCC) function.
Gx Interface: Gx is an interface between the P-GW and the policy charging rules function (PCRF).
It communicates based on the Diameter protocol.The P-GW interacts with the PCRF through the
Gx interface to realize policy and charging control (PCC) function.
Gy Interface: Gy is an interface between the P-GW and the online charging system/credit control
function (OCS/CCF). It communicates based on the Diameter protocol and is used for online
charging control. The UGW9811 interacts with the OCS through the Gy interface to realize credit
control for content-based charging users and non-content-based charging users.
Gn/Gp Interface: Gn/Gp Interface is an interface between the P-GW and the Gn/Gp SGSN.The
Gn interface is between the GPRS support nodes (GSNs) within the same public land mobile
network (PLMN). The Gp interface is between the GSNs in different PLMNs.
S6b Interface: S6b interface is an interface between the P-GW and the 3GPP AAA server. It is
used to obtain authentication parameters related to mobility, transmit mobility parameters, and
provide static QoS information for the users switching from a non-3GPP network to the UE.
SGi Interface: SGi interface is an interface between the P-GW and the PDN. It can also serve as
the interface connecting the P-GW and the AAA server, transmitting authentication and
charging control messages.
S2a Interface: S2a interface is an interface between the P-GW and the trusted non-3GPP IP
network (HSGW/TWAN). The S2a interface enables the interworking between a trusted fixed
network and an EPC network.
S2b Interface: S2b interface is an interface between the P-GW and the Untrusted non-3GPP
Access ePDG(evolved Packet Data Gateway).The S2b interface enables the interworking
between a WLAN network and an EPC network.
SGmb Interface: SGmb is an interface between the S-GW+P-GW and the broadcast/multicast
service center (BM-SC). It communicates based on the Diameter protocol and is used to provide
the control plane function of the evolved multimedia broadcast multicast Service.
Grp Interface: Grp interface is a Huawei proprietary interface between the P-GW and report
server. The P-GW uses the Grp interface to interwork with the report server to implement the
mobile broadband (MBB) visibility function.
Gcf Interface: Gcf interface is a Huawei proprietary interface between the P-GW and Internet
Content Adaptation Protocol (ICAP) server. The P-GW uses the Gcf interface to interwork with
the ICAP server to implement the uniform resource locator (URL) filtering function.
Gnr Interface: Gnr interface is a Huawei proprietary interface between the P-GW and eLog
server. The P-GW uses the Gnr interface to interwork with the eLog server to implement the
NAT logs report function.
< Home
Table 1 Types and numbers of external physical interfaces provided by the UGW9811
10GE
S6b GE Diameter 3GPP TS 23.402
3GPP TS 29.281
S11 GE GTP-C 3GPP TS 23.401
3GPP TS 36.414
S5/S8 GE GTP-C 3GPP TS 23.401
10GE GTP-U
Table 2 Protocols used on the UGW9811 interfaces
3GPP TS 29.281
Ga GE GTP' 3GPP TS 32.240
3GPP TS 32.295
3GPP TS 32.298
Gy GE Diameter 3GPP TS 32.299
10GE
Gx/Gxc GE Diameter 3GPP TS 23.203
3GPP TS 29.213
Parent Topic: Interfaces and Protocols
< Home
This describes the operation and maintenance (OM) of the UGW9811 based on the client/server
architecture.
OM System
BAM
The BAM is the server based on the Transmission Control Protocol/Internet Protocol
(TCP/IP). The BAM of the UGW9811 is integrated on the Switching Route Unit
(SRU)Main Processing Unit (MPU).
o Receiving connection requests from the client to establish connections, and analyzing
and processing commands from the client
o Receiving connection requests from the host through the local bus to establish
connections and realize the communication between the BAM and the host, and
processing data loading requests and alarms from the host
NOTE:
In spite of the loss or error of BAM files, the U2000 can interwork with the UGW9811
and restore the BAM.
LMT
The LMT serves as the client and is connected to the back administration module (BAM)
based on the Transmission Control Protocol/Internet Protocol (TCP/IP).
The LMT supports the command line interface (CLI) mode and the graphic user interface
(GUI) mode. The LMT can be used to configure the device, trace messages, manage the
system performance, manage alarms, and manage logs. The LMT provides interfaces to
connect the alarm box to provide audible and visual alarms.
The LMT can be accessed by dialing through the public switched telephone network
(PSTN). Then, the LMT performs the operation and maintenance (OM) function.
The LMT can run on EMS clients to provide remote operation and maintenance.
U2000
The local maintenance terminal (LMT) can be integrated into the U2000. Thus, the LMT
can achieve uniform management and browsing of devices in the entire network through
the topology management function provided by the U2000. The LMT and the U2000 are
in the loose coupling relationship. The LMT is dedicated to management only on the
UGW9811, whereas the U2000 performs the public management such as topology
management and fault management for devices in the entire network.
OM Function
The UGW9811 provides the OM functions such as configuration management, message tracing,
performance management, alarm management, and log management.
Configuration Management
Message Tracing
The message tracing function of the UGW9811 is performed in the maintenance window
of the local maintenance terminal (LMT). Through the maintenance window of the LMT,
you can trace and view interfaces and users.
You can create interface and user tracing tasks to monitor the signaling of the interfaces
and users of the system in real time. The stored messages including the information about
previous versions can be viewed online or offline. If a fault occurs in the UGW9811, you
can quickly and accurately locate and clear the fault through the interface signaling
tracing function.
Performance Management
The UGW9811 generates performance measurement files and provides File Transfer
Protocol (FTP) services. The U2000 acts as the FTP client to receive the performance
measurement files and then manage the performance of the UGW9811. The LMT obtains
the performance measurement files and provides them for viewing through the
Performance Browser Tool.
The alarm management function of the UGW9811 is realized through the alarm
management system of the local maintenance terminal (LMT) or the centralized fault
management system of the U2000.
The UGW9811 sends alarms to the LMT or the U2000 and simultaneously saves them in
alarm logs.
The UGW9811 collects alarms that are generated during fault occurrence and classifies
them based on type and severity level. Then, the UGW9811 sends the alarms to the alarm
management system of the LMT or the centralized fault management system of the
U2000. The LMT or U2000 displays the alarms in graphical user interfaces (GUIs) and
provides the location, cause, and troubleshooting suggestions.
Log Management
Logs can be classified into operation logs, system logs, security logs, DDoS logs, alarm
logs, and diagnosis logs based on contents.
o The user operation logs record the information about user operation commands,
including the user name, executed commands, and execution time, to analyze faults.
o The system operation logs record certain state information in the system operation to
maintain the system and locate faults.
o The security logs record all security events, including user login events, user
authentication events, and management events.
o DDoS logs record DDoS attack events, including the IP address of a UE that initiates a
DDoS attack and the time a DDoS attack occurs.
o The alarm logs record all the generated alarms. You can learn fault information on the
device by querying the alarms.
o Diagnosis logs record normal key information and abnormal information about the
UGW9811.
< Home
Item Specification
Maximum number of SPUs in active/standby mode 24,000,000
activated bearer contexts
SPUs in load-sharing mode 40,000,000
SPUs in N+1 backup mode 36,000,000
Maximum data throughput SPUs in active/standby mode 360G bit/s
SPUs in load-sharing mode 600G bit/s
SPUs in N+1 backup mode 540G bit/s
Maximum number of APNs 3,000
Maximum number of GRE 4,000
tunnels
Maximum number of L2TP 40,000
tunnels
Maximum number of 100,000
eNodeBs
Item Specification
Cabinet N68E-22
Cabinet dimensions (height 2,200 mm × 600 mm × 800 mm (86.61 in. × 23.62 in. × 31.50
× width × depth) in.)
Cabinet weight (in full 475 kg (1047.4 lb)
configuration,include Power
Distribution Box)
Table 1 Entire-system specifications of the UGW9811 (PGP-X16)
Item Specification
Subrack dimensions (height 1420.00 mm× 442.00 mm × 650.00 mm (55.91 in. ×17.40 in. ×
× width × depth) 25.59 in.)
NOTE:
This section describes the requirements for the operating environment of the UGW9811. The
requirements for the operating environment consist of the climatic requirements, waterproofing
requirements, biological requirements, air purity requirements, and mechanical stress
requirements.
Climatic Requirements
Table 1 Requirements for temperature and humidity in the operating environment
Before measuring temperature or humidity, make sure the device has no protection cards. The
values are measured at 1.5 m above the floor and 0.4 m in front of the equipment, without
protective panels in front of or behind the cabinet.
Short term operation refers to continuous operation for no more than 48 hours or
accumulated operation of no more than 15 days in a year.
NOTE:
Air conditioners must not be installed above equipment and must not blow directly towards
equipment. Air conditioners should be installed away from windows to keep them from blowing
moisture to equipment.
Table 2lists requirements for other climatic factors in the operating environment.
Item Specification
Altitude ≤ 4000 m (13123.2 ft) When the altitude ranges
from 1800 m to 4000 m (5905.44 ft to 13123.2
ft), the equipment operating temperature
decreases by 1°C (1.8°F) each time the altitude
increases by 220 m (721.78 ft).
Temperature change rate ≤ 0.5°C(32.9°F)/min
Wind speed ≤ 5 m (16.40 ft)/s
6.3.5 PGP-X16
Functions
Appearance
Hardware Structure
Logical Structure
Technical Specifications
Functions
Serves as an independent unit composed of various boards that are connected using the
backplane.
Protects boards from external damage and supplies power to boards and fan modules.
Provides heat dissipation channels.
Non-blocking switching network that can be upgraded, with a switching capacity at the
Tbit/s level
Distributed and hardware-based forwarding capability and fast service deployment
Compact structure to increase interface density
Unified design of system components
Separation of the control channel, service channel, and monitoring channel
Carrier-class high reliability and manageability
Shielding based on modules to meet Electro Magnetic Compatibility (EMC) requirements
Hot swappable boards, power modules, and fan modules
U-shaped air channels to improve system heat dissipation
Independent power supply to enhance the power supply capability of a single subrack
200 mm (7.87 in.) fan modules and compliance with the NEBS and ETSI
Backup of key components such as power modules, fan modules, clocks, and
management buses
Protection against incorrect insertion of boards
Query of alarm prompts, alarm indications, running status, and alarm status of the voltage
and ambient temperature
Appearance
In the lower part of a PGP-X16 subrack, boards are installed using the same method but be
installed upside down compared with those in the upper part of the subrack. When connecting
cables to the LPUs in the lower part of a PGP-X16 subrack, ensure that the cables are connected
to the correct ports because the port numbers are also reversed.
Hardware Structure
Figure 2 shows the structure and main components of the PGP-X16 for the front view.
Figure 3 shows the structure and main components of the PGP-X16 for the rear view.
PEU 2 Slots 11 to 41 mm (1.60 You are advised to insert the PEUs into
16 in.) slots 15 and 16. The PEUs can also be
inserted into slots 11 to 14.
STE 1 to 4 Slots 11 to 41 mm (1.60 You are advised to insert the STEf/STEf1s
16 in.) into slots 15 and 16. The STEf/STEf1s can
also be inserted into slots 11 to 14.
MSU 2 to 6 Slots 7 to 41 mm (1.60 Insert MSUf1s into these slots.
16 in.)
NOTE:
For details about the basic configuration board list of the PGP-X16 subrack, see Boards.
PGP-X16 backplane is divided into six areas and power is supplied to the two areas
independently. For details, see Power Supply System.
For details about the heat dissipation system of the PGP-X16 subrack, see Heat Dissipation
System.
Logical Structure
The PGP-X16 uses a system architecture shown in Figure 5. In this architecture, the data plane,
management and control plane, and monitoring plane are separated. This design helps improve
system reliability and facilitates the upgrade of each plane separately.
Technical Specifications
Item Description
BOM 02300686
Dimensions (width x depth x height) The height of the PGP-X16 subrack is 32 U
(1422.4 mm or 56 in.).
NOTE:
NOTE:
Item Description
Maximum power consumption (full 14,000 W
configuration)
NOTE:
NOTE:
Functions
The power supply system of a PGP-X16 subrack provides 12 power entry modules (PEMs)
working in 6+6 backup mode.
Power Input
The DC PDF and the upstream DC switchboard are external devices connected to the
PGP-X16, providing twelve (working in 6+6 backup mode) independent input power
supplies of stable voltages for the cabinet.
Power Distribution
The PGP-X16 subrack is divided into six areas and two power inputs are provided for
each area.
The PGP-X16 power supply system works in 6+6 backup mode to provide power supply
for the subrack. PEM-A1 and PEM-B1 act as the backup for each other and provide
power supply for the first power supply area (slots in green). PEM-A2 and PEM-B2 act
as the backup for each other and provide power supply for the second power supply area
(slots in yellow). PEM-A3 and PEM-B3 act as the backup for each other and provide
power supply for the third power supply area (slots in blue). PEM-A4 and PEM-B4 act as
the backup for each other and provide power supply for the fourth power supply area
(slots in grey). PEM-A5 and PEM-B5 act as the backup for each other and provide power
supply for the fifth power supply area (slots in purple). PEM-A6 and PEM-B6 act as the
backup for each other and provide power supply for the sixth power supply area (slots in
orange).
NOTE:
If one area is not supplied by the active and standby power inputs, the area cannot be
powered on, and cannot be registered. The boards in this are faulty in the Device Panel
on the LMT.
The two power inputs working in active-standby mode supply power for each board in an
area.
After low-frequency filtering, the two power inputs for fan modules are joined inside the
fan modules, working in the 1:1 backup mode.
NOTE:
Each DC power input contains one NEG power input (-48 V or -60 V blue power cable) and one
RTN input (black power ground cable). RTN inputs are isolated before connecting to a board.
Two RTN inputs are combined into a board.
Figure 2 shows the PEM slot distribution. The functions of the PEM are as follows:
The PEM provides power supply, filtering, surge protection, and overcurrent protection
for the subrack. It also monitors the status of the power supply, surge protection circuit,
and circuit breaker, and generates alarms on detecting exceptions.
The PEM supports 2-input power supplies and uses the hydraulic electromagnetic breaker
(also called circuit breaker) as the overcurrent protection component. The PEM can be
maintained manually.
Appearance
Indicators
Technical Specifications
Item Description
Dimensions (height x width x depth) 220 mm x 117 mm x 58 mm (8.66 in. x 4.61 in.
x 2.28 in.)
Weight About 1.1 kg (2.43 lb)
Input rated voltage -48 V DC or -60 V DC
Input voltage range -38.4 V DC to -72 V DC
Maximum input current 80 A
Maximum output current 80 A
Rated current of the air breaker on the 80 A
power module
To ensure the subrack power supply reliability and facilitate subsequent hardware capacity
expansion, the rated current of the air breaker on the PDF must be greater than or equal to 80 A.
NOTE:
There is one-to-one mapping between the air breakers on the PDF and the air breakers on the
subrack's power modules. That is, there are altogether six pairs of air breakers. The two air
breakers in a pair work in active/standby mode. For details about power distribution, see The
power distribution guide for PGP-X16 subrack.
< Home
Functions
The heat dissipation system includes four FAN modules, ensures that the subrack operates in
normal temperature.
Appearance
Two fan modules each containing one fan are located side by side at the air exhaust vent. If a
single fan fails, the system can still work properly for a short period of time at the ambient
temperature of 40°C (104°F). Figure 1 shows the appearance of a fan module.
Indicators
Logical Structure
The PGP-X16 is divided into an upper subrack and a lower subrack; it draws in air from
the front and exhausts air from the rear to dissipate heat. The air intake vent on the upper
subrack is located above the board area on the front subrack; the air exhaust vent is
located above the board area on the rear subrack. The lower subrack and the upper
subrack are opposites. The upper subrack and the lower subrack also have separate heat
dissipation systems.
The middle area of the PGP-X16 is for SFU slots. The air intake vent of this area is
located on the left of the subrack. Two upper SFU slots in the area draw in air from the
left. When flowing to the right, the air joins the air from the upper subrack. Two lower
SFU slots in the area also draw in air from the left. When flowing to the right, the air
joins the air from the lower subrack.
The upper and lower subrack have separate air channels that draw air from the front and
exhausts air from the rear. The air filters are installed over the air intake vents. Each filter
has a curved face, large area, and small windage resistance. These features help to
improve heat dissipation efficiency. Air filters on the upper and lower subrack are
identical.
The air channel in the SFU slot area is located on the left of the subrack. The air filter
uses front access. The depth of the air filter is the same as that of an SFU and the height
of the air filter is four times the height of the an SFU.
Air Filter
The PGP-X16 draws in air from the front and exhausts air from the rear. The two air
filters on the upper and lower subrack are identical. To maximize air intake, the filters are
fully perforated. Air filters are fixed to the subrack by fasteners to facilitate filter removal
and replacement. Figure 3 shows the appearance of an air filter.
The air channel in the SFU slot area is located on the left of the subrack. The air filter
uses front access. The depth of the air filter is the same as that of an SFU and the height
of the air filter is four times the height of an SFU as shown in Figure 4.
Placing a black sponge air filter at the air intake vent helps prevent dust from entering the
system. It is recommended that air filters be removed and cleaned at least once every
three months.
When the system is fully configured, temperatures reported by the temperature sensors on
the LPUs, SFUs, and MPUs serve as the basis for fan speed adjustment. General
principles are listed below:
o When the ambient temperature is 27°C (80.6°F) or below, fans rotate at a fixed
low speed, which meets the NEBS noise requirement and the heat dissipation
requirement.
o When the ambient temperature is between 27°C (80.6°F) and 45°C (113°F), the
speed of fans is adjusted smoothly in linear mode, and there are slight changes in
noise levels.
Technical Specifications
NOTE:
NOTE:
< Home
6.3.8.1.1 MPUB
Functions
Appearance
Interfaces
Indicators
Hardware and Software Compatibility
Technical Specifications
Functions
The Main Processing Unit (MPU) controls and manages the system, including route calculation,
and device management, maintenance, and monitoring.
As the system control and management unit, the MPUB provides the following functions
on the system control panel:
o Route calculation: all routing protocol packets are sent by the forwarding engine
to the MPUB for processing. In addition, the MPUB broadcasts and filters
packets, and downloads routing policies from the policy server.
o Outband communication between boards: the LAN switch modules integrated on
the MPUB provide outband communications between boards. In this manner,
messages can be controlled, maintained, and exchanged between boards.
o Device management and maintenance: the MPUB manages and maintains the
system through the management interfaces such as the Console interface or
network interface.
o Data configuration: the MPUB stores configuration data, startup files, charging
information, upgrade software, and system logs.
o Data storage: the MPUB provides one 8 GB hard disk for storing operation and
maintenance (OM) data and one hard disk of at least 80 GB for storing charging
data records (CDRs).
NOTE:
The capacity of the hard disk will be changed as the hardware is upgraded.
ALM-0632 Insufficient hard disk space is generated when the OM hard disk
usage reaches 90%. This alarm is cleared when the OM hard disk usage falls
below 80%.
ALM-0632 Insufficient hard disk space is generated when the CDR hard disk
usage reaches 35%. This alarm is cleared when the CDR hard disk usage falls
below 25%.
System maintenance unit
As the system maintenance unit, the MPUB collects system monitoring information to
test system units locally or remotely, or implement in-service upgrade of system units.
The MPUB periodically collects information about the operation of system units by using
the Monitorbus. The MPUB then generates related control information based on the
collected information, for example, board installation detection and fan speed adjustment.
With the joint test action group (JTAG) bus, the MPUB remotely or locally tests system
units, or performs in-service upgrade of system units.
Reliability
The main control modules, clock modules, and LAN switch modules on the MPUB work
in 1+1 hot backup mode, improving system reliability.
The two MPUs work in 1+1 backup mode. Each MPUB monitors the status of the other.
If the master MPUB is faulty, the slave MPUB automatically takes over as the master
MPUB.
Appearance
Interfaces
NOTE:
NOTE:
The interfaces related CLK are not available on UGW9811.
Attribute Description
Connector type USB
Operation mode High-speed mode or full-speed mode
Standard compliance USB 2.0
Cable specification Standard USB cables
Attribute Description
Connector type SFP
Operation mode 1000M fiber
Standard compliance IEEE 802.3-2002
Cable specification Single-mode or multi-mode fibers
Attribute Description
Connector type RJ45
Operation mode 10M/100M/1000M auto-sensing interfaces, supporting half-duplex and full-
duplex modes
Standard IEEE 802.3-2002
compliance
Cable Category 5 unshielded twisted pair (UTP) cables recommended when the
specification interface rate is 10 Mbit/s or 100 Mbit/s; super category 5 Shielded Twisted
Pair (STP) cables recommended when the interface rate is 1000 Mbit/s
Attribute Description
Connector type RJ45
Operation mode Duplex Universal Asynchronous Receiver/Transmitter (UART)
Electrical attribute RS-232
Baud rate 9600 bit/s (default value), which can be changed as required
Data equipment Data Circuit-terminating Equipment (DCE)
type
Cable 8-core shielded cable
specification
Indicators
Indicator/Button Description
OFL button To remove a board, press and hold the button for about six
seconds until the OFL indicator turns on.
NOTE:
Indicator/Button Description
Reset button The button is used for resetting the MPUB. If you press the Reset
button, you can reset the MPUB.
SFP LINK/ACT indicator If the indicator is steady on, the link is normal.
(green)
If the indicator is blinking, data is being transmitted.
MGMT-ETH LINK If the indicator is steady on, the link is normal.
indicator (green) (on
Ethernet network If the indicator is off, the link is Down.
interfaces)
MGMT-ETH ACT If the indicator is blinking, data is being transmitted.
indicator (amber) (on
Ethernet interfaces) If the indicator is off, no data is being transmitted.
Table 7 show the difference of specifications between the MPUB and MPU.
Technical Specifications
Item Description
BOM 03053557
NOTE:
NOTE:
6.3.8.3 SFUs
SFUB
SFUC
SFUG
The switching fabric unit (SFU) provides the switching function of the service data throughout
the system.
SFU200B
SFU200C
< Home
6.3.8.3.1 SFUB
Functions
Appearance
Interfaces
Indicators
Hardware and Software Compatibility
Technical Specifications
Functions
The Switch Fabric Unit (SFU) on the PGP-X16 switches data for the entire system. This ensures
a non-blocked switching network.
The PGP-X16 has four SFUBs working in 3+1 load balancing mode.
The four SFUBs process services in load sharing mode. If an SFUB is faulty or replaced, the
other three SFUBs automatically take over the services on the SFUB, ensuring that the services
are not interrupted.
Appearance
Interfaces
None
Indicators
Table 1 describes the buttons and indicators on the panel of the SFUB.
Table 1 Buttons and indicators on the panel of the SFUB
LED Description
RUN Before the registration of the SFUB: If the indicator blinks twice every second (2
Hz), the system is in the alarm state.
After the registration of the SFUB: If the indicator blinks once every two seconds
(0.5 Hz), the system is running normally.
ACT If the indicator is on, it indicates that the SFUB is working normally; if the green
indicator is off, it indicates that the SFUB is faulty.
OFFLINE When the SFUB is working normally, the OFL indicator is off. After the OFL
button is pressed to power off the SFUB, the OFL indicator is on.
NOTE:
To remove a board, press and hold the button for about six seconds until the OFL
indicator turns on.
Technical Specifications
Item Description
BOM 03053560
NOTE:
Table 2 Technical Specifications of the SFUB
Item Description
NOTE:
6.3.8.4 SPUe
Functions
Appearance
Intefaces
Indicators
Hardware and Software Compatibility
Technical Specifications
Functions
The Service Processing Unit (SPU) performs functions such as service awareness and control, user packet
forwarding, flow control, and QoS functions.
The IP address assigned to a mobile user is the static IP address specified when the user
subscribes to packet services, or the dynamic IP address obtained when the PDP
context/EPS bearer is activated. The UGW9811 supports both static and dynamic address
assignment modes.
Appearance
Intefaces
None
Indicators
Table 1 describes the buttons and indicators on the panel of the SPUe.
Indicator/Button Description
OFL button To remove a board, press and hold the button
for about six seconds until the OFL indicator
turns on.
OFL indicator (red) If the indicator is on, you can remove the
board.
RUN indicator (green) If the indicator blinks every 2s (0.5 Hz), the
SPU is in the normal state.
Technical Specifications
Item Description
BOM 03053558
NOTE:
NOTE:
6.4.2 LMT
This describes the local maintenance terminal (LMT). HUAWEI LMT is the software that runs
over the operation and maintenance terminal. The LMT communicates with the back
administration module (BAM) on the SRU/MPU of the UGW9811 through the local area
network (LAN) or wide area network (WAN). Thus, the LMT enables the operation and
maintenance of the UGW9811.
LMT Software
This describes the local maintenance terminal (LMT) software. The LMT software contains the
LMT, File Transfer Protocol (FTP) client, FTP server, LMT service manager, trace viewer, monitor
viewer, performance browser tool, and convert management system.
This describes the directory structure of the local maintenance terminal (LMT) software on the
PC.
< Home
This describes the local maintenance terminal (LMT). The LMT provides the authority
management, alarm management, device maintenance, and message tracing functions through
a graphic user interface (GUI). The LMT also provides abundant command line interface (CLI)
commands with which you can maintain the device and manage the performance.
FTP Client
The FTP client communicates with the FTP server through the FTP protocol. They exchange the
performance data, configuration data, and maintenance data. Thus, the quality of service (QoS)
is improved.
FTP Server
This describes the File Transfer Protocol (FTP) server. The local computer can be used as an FTP
server for access if the parameters of the FTP server are set.
Trace Viewer
This describes the trace viewer. The trace viewer is used to view offline the saved trace files
whose extension names are .tmf. In this way, the trace messages can be viewed.
Monitor Viewer
This describes the monitor viewer. The monitor viewer is used to review the data and display
the state by opening the monitor file with the extension name .mrf.
This describes the performance browser tool. The performance browser tool is used to manage
performance measurement tasks and check performance measurement results.
This describes the convert management system. The convert management system is used to
transfer the alarm to the alarm box.
< Home
This describes the local maintenance terminal (LMT). The LMT provides the authority
management, alarm management, device maintenance, and message tracing functions through a
graphic user interface (GUI). The LMT also provides abundant command line interface (CLI)
commands with which you can maintain the device and manage the performance.
NOTE:
For details about how to run the CLI commands, refer to online help.
Start Mode
Choose Start > All Programs > HUAWEI Local Maintenance Terminal(Enhanced) > Local
Maintenance Terminal(Enhanced).
Window
The LMT window comprises the system menu, tool bar, navigation pane, output pane, client
pane, and status bar. The client pane provides the command line client, device panel, and tracing
pane.
Figure 1 shows the interface of the LMT when the CLI command line client is displayed in the
client window.
< Home
The FTP client communicates with the FTP server through the FTP protocol. They exchange the
performance data, configuration data, and maintenance data. Thus, the quality of service (QoS) is
improved.
Choose Start > All Programs > HUAWEI Local Maintenance Terminal(Enhanced) > FTP
Client(Enhanced).
NOTE:
FTP has security risks. You are advised to use secure protocols, such as SFTP and FTPS.
Use the SSL encryption mode for transmission to prevent data leakage. You can use the default
SSL certificate or a customized SSL certificate for encrypted transmission as required. If a
customized SSL certificate is used, you can choose to enter a private key. The SSL certificate is
stored in LMT installation directory\client\ftpclient\data. You can replace the certificate file in
this path with a customized certificate file.
The SRU/MPU serves as an FTP server when the FTP client backs up data. Run ftp server
enable to start the FTP server of the UGW9811 before using the FTP function.
Window
The window of the FTP client comprises the menu bar, toolbar, server input area, Local Folder
List, Local File List, Server File List, and Connection tips. See Figure 1.
The port number set in the FTP server input area of the FTP client must be the same as the port
number set in the ftp server port command.
Main Menu
Toolbar
Icon Function
To set up connection with the server.
Icon Function
To delete files from the server.
< Home
This describes the File Transfer Protocol (FTP) server. The local computer can be used as an
FTP server for access if the parameters of the FTP server are set.
Start Mode
Choose Start > Programs > HUAWEI Local Maintenance Terminal > FTPSServer.
For details about how to configure FTP server, refer to Configuring the FTP Service.
Window
After the FTP server is started, the system icon is displayed on the taskbar. You can set,
stop, or log out of the FTP server by right-clicking the icon.
Figure 1 shows the configurations of the FTP server. Table 1 lists the parameter settings.
Parameter Description
User name When you use the FTP server for the first time, enter the default
password hwbs@com and then change the user name and password..
Password The default password is hwbs@com.
Working directory It is the path where the executed file is saved. By default, it is
D:\HWLMT_Enhanced\adaptor\serveradaptor\UGW9811\lib. All the
related log information is saved in this path.
Port number The default port number of the FTP server is 21.
Thread number It specifies the number of the processes that can be initiated. The
default value is 50.
Plain text Indicates that the traffic encryption mode is plain text.
Encrypted Indicates that the traffic encryption mode is encrypted.
Both Indicates that the FTP server will change the traffic encryption mode
to plain text or encrypted according to the configuration of the FTP
client.
SSL Settings Set SSL parameters.
The port number set in the parameter configuration window of the FTP server must be the same
as the port number set in the ftps destination-port command. ftps destination-port specifies
one port number for every FTP server. If the port number for the FTP server is not specified, the
port number is 21 by default.
< Home
If the LMT service manager is not shut down properly or does not automatically start, you need
to start it manually. Otherwise, the LMT cannot be connected to the UGW9811.
Start Mode
You can start the LMT service manager by using either of the following modes:
Choose Start > All Programs > HUAWEI Local Maintenance Terminal(Enhanced) > LMT Service
Manager(Enhanced).
After the LMT software is installed, the LMT service manager automatically starts when the PC
with the LMT software starts.
Window
After the LMT service manager starts, the system icon is displayed on the taskbar. Right-
click on . Then, you can choose Open LMT service manager to start the LMT service
manager or choose Exit LMT service manager to shut down the LMT service manager. Figure
1 shows the LMT Service Manager window.
NOTE:
LMT Server is the process module of the LMT server. The client communicates with the
process module through the CORBA interface. In addition, the client is connected to the
SRU/MPU through this interface.
You can connect the LMT with the server or disconnect the LMT from the server through the
LMT service manager in either of the following ways:
Right-click on LMT Server. You can choose Start from the shortcut menu to set the status to
Started. You can choose Stop to set the status to Stopped.
You can choose Operation > Start to set the status to Started. You can choose Operation > Stop
to set the status to Stopped.
In the LMT service manager, when the status of the LMT server is Stopped, the following
problems may arise:
You cannot log in to the LMT if you have not logged in to it.
The LMT is disconnected from the LMT server if you have logged in to the LMT.
< Home
This describes the trace viewer. The trace viewer is used to view offline the saved trace files
whose extension names are .tmf. In this way, the trace messages can be viewed.
For the method of saving tracing file, see Saving CPU Usage Monitoring Results.
NOTE:
A UGW9811 trace viewer can parse traced files generated by trace viewers of earlier versions.
However, trace viewers of V900R009C01 and later versions cannot parse traced files generated
by trace viewers of versions earlier than V900R009C01.
Start Mode
You can start the trace viewer in one of the following ways:
Choose Start > All Programs > HUAWEI Local Maintenance Terminal(Enhanced) > Trace
Viewer(Enhanced).
Window
The trace viewer window comprises the system menu, toolbar, and pane for browsing trace
messages, as shown in Figure 1.
< Home
This describes the monitor viewer. The monitor viewer is used to review the data and display the
state by opening the monitor file with the extension name .mrf.
For the method of saving monitor file, see Saving CPU Usage Monitoring Results.
Start Mode
You can start the monitor viewer in one of the following ways:
Choose Start > All Programs > HUAWEI Local Maintenance Terminal(Enhanced) > Monitor
Viewer(Enhanced).
Window
The monitor viewer window comprises the system menu, toolbar, and pane for browsing monitor
data, as shown in Figure 1.
< Home
This describes the performance browser tool. The performance browser tool is used to manage
performance measurement tasks and check performance measurement results.
For the method of using performance browser tool, see Operations of the Performance Browser
Tool.
Start Mode
Choose Start > All Programs > HUAWEI Local Maintenance Terminal(Enhanced) >
Performance Browser Tool(Enhanced).
Window
The window of the performance browser tool comprises the system menu, toolbar, performance
browsing window, and status bar, as shown in Figure 1.
< Home
Start Mode
Choose Start > All Programs > HUAWEI Local Maintenance Terminal(Enhanced) >
Convert Management System(Enhanced).
Window
After the LMT service manager starts, the system icon is displayed on the taskbar. Right-
click on . Then, you can choose Restore. Alternatively, you can click the system icon
to display the Convert Management System window. If you right-click the system icon ,
and then choose Exit, the convert management system shuts down.
When the serial port connected to the alarm box is faulty during communication, the system icon
The convert management system window comprises the title bar, system menu, toolbar, output
pane, and status bar, as shown in Figure 1.
< Home
NOTE:
Access Functions
QoS Functions
< Home
Subscriber Access
APN Selection
Access Control
Address Assignment
Session Management
< Home
The UGW9811 access system provides a number of functions for 3rd Generation Partnership
Project (3GPP) and trusted non-3GPP subscribers and untrusted non-3GPP subscribers. These
functions include access, access point name (APN) selection, access control, address assignment,
and session management. When a mobile station/user equipment (MS/UE) accesses an evolved
packet core (EPC) network through a General Packet Radio System/Universal Mobile
Telecommunications System (GPRS/UMTS), Long Term Evolution (LTE), Code Division
Multiple Access 2000 (CDMA2000) network or WiFi network, the UGW9811 access system
sets up a connection for transmitting subscriber data packets between the MS/UE and a packet
data network (PDN). Figure 1 shows the logical architecture of the UGW9811 access system.
This section describes the basic concepts that enable you to better understand the UGW9811
access system.
GTP
GTPv2 (enhanced GTP-C) is used for communication between S-GWs and MMEs/S4 SGSNs
and between P-GWs and S-GWs on an EPC network. For details, see 3GPP TS 29.274. GTP-U
of GTPv1 is used for communication between S-GWs and eNodeBs/RNCs and between P-GWs
and S-GWs.
When UEs access the EPC network through a trusted non-3GPP network, GTPv2 enables
communication between an Trusted WLAN Access Network (TWAN) and a P-GW.
PMIP
On an EPC network, PMIPv6 enables an S-GW and a P-GW to interwork, with the S-GW
functioning as an MAG and the P-GW functioning as an LMA.
When UEs access the EPC network through a trusted non-3GPP network, PMIPv6 enables
communication between an HRPD serving gateway (HSGW) and a P-GW, with the HSGW
functioning as an MAG and the P-GW functioning as an LMA.
Subscriber data packets are encapsulated using Generic Routing Encapsulation (GRE) and
transmitted through PMIPv6 tunnels.
Session
A session is a logical connection for data exchange between MSs/UEs and PDNs.
On a GPRS/UMTS network, primary Packet Data Protocol (PDP) contexts are used to
implement subscriber sessions. A session can include multiple secondary PDP contexts.
On an Evolved Packet System (EPS) network, subscriber sessions are PDN connections. A PDN
connection includes a default bearer that is set up during subscriber attach and multiple dedicated
bearers that are set up after subscriber attach.
When MSs/UEs access an EPC network through a GPRS/UMTS network, the MSs/UEs use PDP
context activation procedures to attach to the EPC network. PDP contexts are used between the
MSs/UEs and an S4 SGSN. The S4 SGSN maps PDP contexts to EPS bearers and then send
messages to an S-GW and a P-GW to initiate EPS bearer setup procedures. For details, see 3GPP
TS 23.060.
PDP context
On a GPRS/UMTS network, MSs/UEs initiate PDP context activation procedures to set up data
channels to PDNs.
Activated PDP contexts are stored on MSs/UEs, the SGSN, and the GGSN/P-GW to provide
subscribers with access to data services. After PDP context activation, MSs/UEs or the network
side can initiate secondary PDP context activation procedures. For details, see 3GPP TS 23.060.
EPS bearer
On an EPS network, a default EPS bearer is set up when a UE initiates an attach procedure or
requests a connection to a PDN. The default EPS bearer is not released until the UE is detached,
which ensures always-on IP connectivity between the UE and PDN. After default EPS bearer
setup, the network side can initiate a dedicated bearer setup procedure to the PDN. For details,
see 3GPP TS 23.401.
< Home
Access Type
After accessing a network, a subscriber can switch between different networks, including:
Mobility management
Inter-RAT mobility between LTE and GSM/UMTS
Handover without optimizations between LTE and eHRPD
Path Management
The IP connection between the UGW9811 and the access side network element (NE) is called a
path.
3GPP subscribers can access the UGW9811 through the Gn/Gp-serving GPRS support node
(SGSN) with the path running GTPv0/GTPv1. 3GPP subscribers can also access the UGW9811
through the S4-SGSN/mobility management entity (MME) with the path running GTPv2. The
UGW9811 and the access side NE can periodically send echo messages to detect the path status,
implementing path management.
Trusted non-3GPP subscribers can access the UGW9811 through the HRPD serving gateway
(HSGW) with the path running Proxy Mobile IP (PMIP)v6. The UGW9811 and the access side
NE can periodically send echo messages to detect the path status, implementing PMIP
management.
Blacklist/Whitelist
Roaming Attribute
After a subscriber accesses the UGW9811, the UGW9811 extracts the subscriber's public land
mobile network (PLMN) ID, matches it with the locally configured home PLMN (HPLMN) to
identify the subscriber's roaming attribute (local subscriber, visitor, or roaming subscriber), and
performs charging and service policy control according to the roaming attribute.
< Home
6.5.1.3 APN Selection
APN Introduction
APN Mapping
APN Introduction
An access point name (APN) is a network identifier defined by general packet radio system
(GPRS)/evolved packet system (EPS) standards. The GPRS/EPS network uses APNs to identify
UGW9811s. An APN identifies an external packet data network (PDN) that is connected to a
UGW9811, or a service. The external PDN may be an Internet service provider (ISP) network or
an intranet. The service may be an Internet access service or a Wireless Application Protocol
(WAP) service.
As specified in 3GPP TS 23003, the APN is composed of the following two parts:
APN network identifier: defines the external network to which the gateway GPRS support node
/PDN gateway (GGSN/P-GW) is connected and an optional service requested by the mobile
station/user equipment (MS/UE). This part of the APN is mandatory.
An APN is assigned to the ISP or an enterprise by a carrier and is the same as the Internet
domain name. For example, the APN network identifier can be planned as
"enterprise.com" for a mobile subscriber to access an intranet through the UGW9811.
APN operator identifier: defines in which public land mobile network (PLMN) GPRS/EPS
backbone the GGSN/P-GW is located. This part of the APN is optional.
The UGW9811 controls which PDNs a mobile node (MN) is allowed to access through the
UGW9811. The access points for the external PDNs and APN information are configured on the
UGW9811. The domain name system (DNS) server on the GPRS/EPS network should associate
the APN with the UGW9811's IP address to ensure that the SGSN/MME can address this
UGW9811 based on the APN provided by the MS/UE. In this manner, the MS/UE can access the
corresponding PDN.
In addition, policies, such as accounting, quality of service (QoS), security, and service control
policies, can be configured on the UGW9811 based on APNs to implement flexible accounting
and service control.
Actual APN: corresponds to a PDN and is used to enable access to a specified PDN.
Virtual APN: must be mapped to an actual APN according to the mapping rule configured on the
UGW9811 to enable access to a specified PDN.
Alias APN: must be mapped to an actual APN according to the mapping rule configured on the
UGW9811 to enable access to a specified PDN.
NOTE:
Actual APNs can be configured on the UGW9811. For details, see apn. Configuring an actual
APN refers to configuring an APN network identifier (APN NI), which must have been
configured before a virtual APN and alias APN are configured on the UGW9811. An APN NI is
a string of 1 to 63 case-insensitive characters without any spaces or special characters such as _,
#, $, and &. An APN NI consists of letters, numbers, and hyphens but cannot start or end with a
hyphen.
APN Mapping
An actual APN, virtual APN, or alias APN is carried in an activation request during subscriber
access. Based on local configurations, the UGW9811 maps the virtual APN or alias APN carried
in the message to an actual APN to enable access to a specified PDN.
The UGW9811 maps a virtual APN to the actual APN according to the virtual APN mapping
rule configured locally by international mobile subscriber identity (IMSI), mobile station
international ISDN number (MSISDN), international mobile equipment identity (IMEI), or radio
access technology (RAT).
Besides obtaining the actual APN according to the virtual APN mapping rule, the UGW9811 can
use the APN returned using RADIUS as the actual APN. In this manner, the virtual APN carried
in the subscriber request must be authenticated on the AAA server. The UGW9811 accesses the
AAA server specified by the virtual APN after the subscriber accesses the UGW9811 and
obtains the actual APN after the authentication succeeds.
If the actual APN obtained must also be authenticated on an AAA server, the UGW9811 must
access the AAA server specified by the actual APN, which may be the same as or different from
that specified by the virtual APN. Then, secondary authentication occurs.
< Home
Subscribers can access packet data networks (PDNs) in three access modes:
Transparent access mode: Subscribers can access the UGW9811 without authentication.
Non-transparent access mode: Subscribers must be authenticated before accessing the
UGW9811 but can subscribe to customized services.
Transparent authentication access mode: Public user names and passwords are used for
authentication so that subscribers can still access PDNs if their user names or passwords are
unavailable or incorrect.
< Home
Static address assignment: In this mode, assigned IP addresses are the static addresses that an
MS/UE subscribes to on the home location register/home subscriber server (HLR/HSS) and are
always used during the data service.
The UGW9811 does not assign static addresses. It only checks address conflicts and
distributes downlink routes.
Local address pool assignment: In this mode, assigned IP addresses are the dynamic addresses
obtained from the address pool configured on the UGW9811.
Remote Authentication Dial-In User Service (RADIUS) address assignment: In this mode,
assigned IP addresses are those assigned by the Authentication, Authorization and Accounting
(AAA) server during RADIUS authentication.
Dynamic Host Configuration Protocol (DHCP) address assignment: In this mode, assigned IP
addresses are the dynamic addresses obtained from the address pool configured on a DHCP
server that is separately deployed by a carrier or on an intranet.
Local address pool assignment, RADIUS address assignment, and DHCP address assignment are
dynamic address assignment modes. The address assignment mode to be used depends on the
address assignment mode and priority configured for an access point name (APN) on the
UGW9811.
< Home
PDP contexts/EPS bearers that are established using the same IP address and access point name
(APN) belong to the same session, as shown in Figure 1. On an EPS network, one UE can use
multiple IP addresses and APNs to create connections to multiple PDNs through one or more
PDN gateways (P-GWs). On a general packet radio system/Universal Mobile
Telecommunications System (GPRS/UMTS) network, you can configure the GWFD-110905
Multi-service APN feature to create connections to multiple PDNs.
Create PDP Context Request and Create PDP Context Response messages are transmitted
between the serving GPRS support node (SGSN) and gateway GPRS support node (GGSN) to
activate the primary PDP context. Create Session Request and Create Session Response
messages are transmitted between the serving gateway (S-GW) and P-GW to create the default
bearer. The primary PDP context/default bearer is the first bearer of a session. Bearers created
subsequently are secondary PDP contexts/dedicated bearers.
After a subscriber requests a service that requires a special quality of service (QoS) guarantee,
the UGW9811 can activate a secondary PDP context or create a dedicated bearer.
Secondary PDP contexts/dedicated bearers and the primary PDP context/default bearer use the
same IP address and APN but different QoS parameters. The traffic flow template (TFT) defines
the service represented by each secondary PDP context/dedicated bearer.
As specified in 3GPP TS 24.008, a TFT includes a group of packet filters, which can be in an
uplink direction, a downlink direction, or in both directions. Packet filters determine the
secondary PDP contexts/dedicated bearers corresponding to data services. The GGSN/P-GW
uses downlink packet filters and MS/UE uses uplink packet filters.
For secondary PDP context activation initiated by a subscriber, the MS/UE provides the TFT.
For secondary PDP context activation initiated by the network sidesecondary PDP context
activation initiated by the network side, the policy and charging rules function (PCRF) provides
the TFT. Only the network side can initiate the dedicated bearer establishment, and the PCRF/P-
GW provides the TFT.
Delete PDP Context Request and Delete PDP Context Response messages are transmitted
between the SGSN and GGSN to release a PDP context. This procedure can be initiated by the
MS/UE, SGSN, or GGSN. Delete Bearer Request and Delete Bearer Response messages are
transmitted between the S-GW and P-GW to delete an EPS bearer. This procedure can be
initiated by the mobility management entity (MME) or P-GW.
The UGW9811 can reclaim PDP contexts/EPS bearers to reduce the memory used by unused
PDP contexts/EPS bearers. Reclaiming operations include deactivating idle PDP contexts/EPS
bearers, deactivating online PDP contexts/EPS bearers that have expired for a period of time, and
manually deactivating specified PDP contexts/EPS bearers.
During deactivation, the IP address of an MS/UE is released, and PDP contexts/EPS bearers are
deleted from the related network elements (NEs). After a PDP context/EPS bearer is deactivated,
the MS/UE cannot use the corresponding data service.
< Home
QoS Specifications
< Home
This section describes the basic concepts of the Quality of Service (QoS), traditional packet
delivery services, new demands resulting from new services, and QoS features supported by the
product.
QoS is a term that describes the relations between demands and supplies. It is a measurement
reflecting the ability of a supplier to meet the demands of customers. Usually, the QoS
assessment does not provide the accurate score. Instead, it focuses on the quality of service under
certain conditions so that the quality of the service that is found defective can be improved
accordingly.
On the Internet, QoS is used to assess the ability of the network to transmit packets. The network
provides a wide variety of services. Therefore, QoS assesses the service from different aspects.
Generally, QoS is used to assess the ability to meet the core requirements for packet
transmission, including delay, jitter, and packet loss ratio.
It is difficult to ensure QoS in the traditional IP network. Because routers in the network handle
all the packets equally and adopt First In First Out (FIFO) method to transfer packets. Resources
used for forwarding packets are allocated based on the arrival sequence of the packets.
All packets share the bandwidth of networks and routers. Resources are allocated according to
the arrival time of the packets. This policy is called best effort (BE) . The device in this mode
tries its best to transmit packets to the destination. The BE mode, however, does not ensure any
improvement in delay time, jitter, packet loss ratio, and high reliability.
The traditional BE mode applies only to services such as World Wide Web (WWW), file
transfer, and email, which have no specific request for bandwidth and jitter.
With the rapid development of the network, increasing number of networks are connected to the
Internet. The Internet expands greatly in size, scope, and users. The use of the Internet as a
platform for data transmission and implementation of various applications is on the rise. Further,
the service providers also want to develop new services for more profits.
Apart from traditional applications such as WWW, email, and File Transfer Protocol (FTP), the
Internet has expanded to accommodate other services such as E-learning, telemedicine,
videophone, videoconference, and video on demand. Enterprise users want to connect their
branches in different areas through VPN technologies to implement applications such as
accessing corporate databases or managing remote devices through Telnet.
These new applications put forward special requirements for bandwidth, delay, and jitter. For
example, videoconference and video on demand require high bandwidth, low delay, and low
jitter. Telnet stresses on low delay and priority handling in the event of congestion.
As new services spring up, the number of requests for the service capability of IP networks has
been on the rise. Users expect improved service transmission to the destination and also better
quality of services. For example, IP networks are expected to provide dedicated bandwidth,
reduce packet loss ratio, avoid network congestion, control network flow, and set the preference
of packets to provide different QoS for various services.
All these demand better service capability from the network, and QoS is just an answer to the
requirements.
< Home
Bandwidth/throughput
Delay
Jitter(Delay variations)
Packet loss rate
Bandwidth/throughput
Bandwidth, also called throughput, refers to the maximum number of bits allowed to transmit
between two ends within a specified period (1 second) or the average rate at which specific data
flows are transmitted between two network nodes. Bandwidth is expressed in bit/s.
As services become increasingly diversified, Internet Citizens expect higher bandwidths so they
cannot only browse the Internet for news but also experience any number of popular
applications. The epoch-making information evolution continually delivers new and attractive
applications, such as new-generation multimedia, video transmission, database, and IPTV, all of
which demand extremely high bandwidths. Therefore, bandwidth is always the major focus of
network planning and provides an important basis for network analysis.
Delay
A delay refers to the period of time during which a packet is transmitted from a source to its
destination.
Use voice transmission as an example. A delay refers to the period during which words are
spoken and then heard. If a long delay occurs, voices become unclear or interrupted.
Most users are insensitive to a delay of less than 100 ms. If a delay ranging from 100 ms to 300
ms occurs, the speaker can sense slight pauses in the responder's reply, which can seem annoying
to both. If a delay greater than 300 ms occurs, both the speaker and responder obviously sense
the delay and have to wait for responses. If the speaker cannot wait but repeats what has been
said, voices overlap, and the quality of the conversation deteriorates severely.
Jitter(Delay variations)
Jitter refers to the difference in delays of packets in the same flow. If the period before a packet
that has reached a device is sent by the device differs from one packet to another in a flow, jitters
occur, and service quality is negatively affected.
Specific services, especially voice and video services, are zero-tolerant of jitters, which causes
interruptions in voice or video services.
Packet loss rate
Packet loss occurs when one or more packets traveling across a network fail to reach their
destination. Slight packet loss does not affect services. For example, users are unaware of the
loss of a bit or a packet in voice transmissions. If a bit or a packet is lost in video transmission,
the image on the screen becomes momentarily garbled but the image recovers very quickly. Even
if TCP is used to transmit data, slight packet loss is not a problem because TCP instantly
retransmits the packets that have been lost. If severe packet loss does occur, however, packet
transmission efficiency is affected. The packet loss rate indicates the severity of service
interruptions on networks and concerns users.
< Home
< Home
The mapping between GPRS QoS parameters and UMTS QoS parameters complies with 3GPP
specifications and is not configured using commands. Table 1 and Table 2 describe the mapping
between the two types of QoS parameters.
Table 1 Mapping from GPRS QoS parameters to UMTS QoS parameters
NOTE:
< Home
6.5.2.1.3.2 Basic UMTS QoS Principles
In order to provide end-to-end (E2E) quality of service (QoS), the mobile packet switched (PS) network
sets up and uses bearer services with clearly defined attributes and functionality from the source to the
destination of a service. 3GPP TS 23.107 defines the E2E QoS architecture in the UMTS system, as shown
in Figure 1.
As illustrated by the UMTS QoS architecture, the bearer service at each layer is provided by the
bearer service of its lower layer. This section uses a UMTS UE that accesses packet data services
as an example to describe the basic UMTS QoS principles.
Generally, data service traffic of a UMTS UE, either a terminal equipment (TE) or mobile terminal (MT),
passes through the UE, a radio access network (RAN), a serving GPRS support node (SGSN), and a
UGW9811 before finally reaching an Internet server. In the UMTS QoS architecture, the data service
quality is guaranteed by the following QoS systems:
QoS of the radio access bearer (RAB) between the UE and SGSN
The RAB QoS is composed of the QoS of the GPRS Tunnel Protocol (GTP) tunnel
between the RNC and SGSN and the QoS of the radio bearer between the RNC and UE.
The QoS of the backbone network bearer and the QoS of the physical bearer at the
bottom layer are also used during data transmission.
3GPP UMTS QoS is classified into conversational class, streaming class, interactive class, and
background class based on how delay-sensitive the traffic is. Conversational class traffic is the
most delay-sensitive, whereas background class traffic is the least. Table 1 describes the QoS
classes.
Conversational and streaming classes are mainly used to carry real-time data flows. The
major difference between them is how delay-sensitive the traffic is. Typical
conversational class services include voice calls and video conference. Typical streaming
class services include real-time video stream services.
Interactive and background classes are mainly used by traditional Internet applications.
These two classes are less delay-sensitive compared with conversational and streaming
classes. The major difference between interactive and background classes is that the
interactive class is mainly used by interactive applications, such as interactive web
browsing, whereas the background class is used for background traffic, such as
background file download. Interactive applications have higher priorities than
background applications. Therefore, when bandwidth resources are insufficient,
background applications are allowed to use resources only when interactive applications
are not using them. This restriction is very important in wireless environment where
bandwidth resources are scarce.
The following uses a conversational service as an example to describe QoS principles in different
procedures of the service.
If the UE's traffic exceeds the negotiated MBR, excess traffic is discarded, traffic
between the GBR and MBR is forwarded with a low priority, and traffic within
the GBR is forwarded with a high priority. By default, the UGW9811 provides
priority queuing (PQ) for expedited forwarding (EF) traffic.
o The UGW9811 applies the negotiated QoS to the UE's subsequent traffic of this
PDP context.
2. Data forwarding procedure
During a data forwarding procedure, the UGW9811 performs differentiated services code
point (DSCP) or type of service (ToS) mapping for conversational service data flows,
matches these data flows against service rules based on their traffic class, traffic attributes
(direction and time period), and user properties (including the RAT type and roaming
attribute), and performs bandwidth management accordingly. In this way, the UGW9811
implements low-delay and high-priority data forwarding for conversational services.
NOTE:
The IETF defines three per-hop behaviors (PHBs): EF, assured forwarding (AF), and best
effort (BE).
In the mapping from 3GPP QoS to IP QoS, the QoS of conversational class traffic maps
to the DSCP value EF by default.
< Home
As illustrated by the LTE QoS architecture, the bearer service at each layer is provided by the
bearer service of its lower layer. This section uses an LTE UE that accesses packet data services
as an example to describe the basic QoS principles.
Generally, data service traffic of an LTE UE, either a terminal equipment (TE) or mobile terminal (MT),
passes through the UE, an E-UTRAN NodeB (eNodeB), a serving gateway (S-GW), and a PDN gateway (P-
GW) before finally reaching a service server. In the LTE QoS architecture, the data service quality is
guaranteed by the following QoS systems:
QoS of the radio bearer between the UE and eNodeB
QoS of the S1 bearer between the eNodeB and S-GW
QoS of the S5/S8 bearer between the S-GW and P-GW
3GPP LTE QoS is classified into nine classes identified by QoS class identifiers (QCIs) 1 to 9
based on how sensitive the traffic is to delay and packet loss. Conversational class traffic is the
most sensitive to delay and packet loss. Table 1 describes the QoS classes.
The following uses a conversational service as an example to describe QoS principles in different
procedures of the service.
If the UE's traffic exceeds the negotiated MBR, excess traffic is discarded, traffic
between the GBR and MBR is forwarded with a low priority, and traffic within
the GBR is forwarded with a high priority. By default, the UGW9811 provides
priority queuing (PQ) for expedited forwarding (EF) traffic.
o The UGW9811 applies the preceding QoS guarantee to the UE's subsequent
traffic of this bearer.
2. Data forwarding procedure
During a data forwarding procedure, the UGW9811 performs differentiated services code
point (DSCP) or type of service (ToS) mapping for conversational service data flows,
matches these data flows against service rules based on their traffic class, traffic attributes
(direction and time period), and user properties (including the RAT type and roaming
attribute), and performs bandwidth management accordingly. In this way, the UGW9811
implements low-delay and high-priority data forwarding for conversational services.
NOTE:
The IETF defines three per-hop behaviors (PHBs): EF, assured forwarding (AF), and best
effort (BE).
In the mapping from 3GPP QoS to IP QoS, the QoS of conversational class traffic maps
to the DSCP value EF by default.
< Home
6.5.2.1.4 Key QoS Parameters in 3GPP
Networks
Key QoS Parameters in GPRS Networks
< Home
Precedence class
Delay class
Reliability class
Peak throughput class
Mean throughput class
Parameter Description
Precedence class This parameter indicates the priority for
processing GPRS service packets. For
example, when an abnormality (such as a
network congestion) occurs, low-priority
packets are first discarded. Three precedence
classes are defined:
High
Normal
Table 1 Key QoS parameters in GPRS networks
Parameter Description
Low
< Home
Allocation/retention priority
Traffic class
Maximum bit rate for uplink
Maximum bit rate for downlink
Guaranteed bit rate for uplink
Guaranteed bit rate for downlink
Traffic handling priority
Delivery order
Maximum SDU size
SDU bit error ratio
Residual BER
Delivery of erroneous SDUs
Transfer delay
Parameter Description
Allocation/retention priority The allocation/retention priority (ARP)
parameter is used in session establishment and
update request messages to implement control
on access priority in session management.
ARP parameters of subscribers are registered
on the HLR and delivered by the HLR to the
SGSN.
Conversational
Streaming
Interactive
Background
Guaranteed bit rate for uplink These two parameters are used for bandwidth
management. The system uses multiple
Guaranteed bit rate for downlink methods, including resource reservation, to
ensure that all data flows can pass through
when the bit rate does not exceed the
guaranteed bit rate (GBR). When the bit rate
exceeds the GBR, the system handles excess
traffic as follows:
Parameter Description
Maximum bit rate for uplink These two parameters are used for bandwidth
management. The system prohibits excess data
Maximum bit rate for downlink flows to pass through to ensure that the bit rate
of data flows does not exceed the maximum
bit rate (MBR). The uplink MBR and
downlink MBR must be greater than or equal
to the uplink GBR and downlink GBR,
respectively.
Traffic handling priority This parameter specifies the priority with
which interactive class traffic is handled in
logical channels.
Parent Topic: Key QoS Parameters in 3GPP Networks
< Home
Parameter Description
Bearer Bearers are classified into guaranteed bit rate
(GBR) bearers and non-GBR bearers. GBR
bearers are identified by QoS class identifiers
(QCIs) 1 to 4, and non-GBR bearers are
identified by QCIs 5 to 9.
Parameter Description
bearer for the APN used by a subscriber must
be different.
QCI A QCI is an identifier used by UEs and mobile
network elements (NEs) to indicate QoS
characteristics of services. Services with
different QCIs are carried on different bearers.
Each QCI corresponds to a group of QoS
parameters. QoS parameters corresponding to
standard QCIs are preconfigured on NEs.
Parameter Description
compared with a bearer whose ARP
value is 2.
Pre-emption capability: indicates
whether a service can pre-empt the
resources of a lower-priority service
when resources are limited.
Pre-emption vulnerability: indicates
whether the resources of a service can
be pre-empted by a higher-priority
service when resources are limited.
Parameter Description
bandwidth of all bearers from a UE to the
same P-GW.