TR 521
TR 521
TR 521
TR-521
5G Transport Networks
Issue: 1
Issue Date: June 2022
Notice
The Broadband Forum is a non-profit corporation organized to create guidelines for broadband network
system development and deployment. This Technical Report has been approved by members of the Forum.
This Technical Report is subject to change. This Technical Report is owned and copyrighted by the
Broadband Forum, and all rights are reserved. Portions of this Technical Report may be owned and/or
copyrighted by Broadband Forum members.
Intellectual Property
Recipients of this Technical Report are requested to submit, with their comments, notification of any relevant
patent claims or other intellectual property rights of which they may be aware that might be infringed by any
implementation of this Technical Report, or use of any software code normatively referenced in this
Technical Report, and to provide supporting documentation.
Terms of Use
1. License
Broadband Forum hereby grants you the right, without charge, on a perpetual, non-exclusive and worldwide
basis, to utilize the Technical Report for the purpose of developing, making, having made, using, marketing,
importing, offering to sell or license, and selling or licensing, and to otherwise distribute, products complying
with the Technical Report, in all cases subject to the conditions set forth in this notice and any relevant
patent and other intellectual property rights of third parties (which may include members of Broadband
Forum). This license grant does not include the right to sublicense, modify or create derivative works based
upon the Technical Report except to the extent this Technical Report includes text implementable in
computer code, in which case your right under this License to create and modify derivative works is limited to
modifying and creating derivative works of such code. For the avoidance of doubt, except as qualified by the
preceding sentence, products implementing this Technical Report are not deemed to be derivative works of
the Technical Report.
2. NO WARRANTIES
THIS TECHNICAL REPORT IS BEING OFFERED WITHOUT ANY WARRANTY WHATSOEVER, AND IN
PARTICULAR, ANY WARRANTY OF NONINFRINGEMENT AND ANY IMPLIED WARRANTIES ARE
EXPRESSLY DISCLAIMED. ANY USE OF THIS TECHNICAL REPORT SHALL BE MADE ENTIRELY AT
THE USER’S OR IMPLEMENTER'S OWN RISK, AND NEITHER THE BROADBAND FORUM, NOR ANY
OF ITS MEMBERS OR SUBMITTERS, SHALL HAVE ANY LIABILITY WHATSOEVER TO ANY USER,
IMPLEMENTER, OR THIRD PARTY FOR ANY DAMAGES OF ANY NATURE WHATSOEVER, DIRECTLY
OR INDIRECTLY, ARISING FROM THE USE OF THIS TECHNICAL REPORT, INCLUDING BUT NOT
LIMITED TO, ANY CONSEQUENTIAL, SPECIAL, PUNITIVE, INCIDENTAL, AND INDIRECT DAMAGES.
All copies of this Technical Report (or any portion hereof) must include the notices, legends, and other
provisions set forth on this page.
Issue History
Comments or questions about this Broadband Forum Technical Report should be directed to
info@broadband-forum.org.
Editor:
Ron Insler, RAD
Table of Contents
1 Purpose ....................................................................................................................................................8
2 Scope .......................................................................................................................................................9
Table of Figures
Figure 5.1: 5G system architecture as depicted in 3GPP TS 23.501 document with Mobile transport portion
of it ...........................................................................................................................................................20
Figure 5.2: Function Split between central and distributed unit........................................................................21
Figure 5.3: Reference Architecture for mobile backhaul network using packet Transport in the Access,
Aggregation, and Core Networks for high layer splits..............................................................................23
Figure 5.4: NG-RAN architecture no gMB split and Split option 2 and the corresponding interfaces. .............25
Figure 6.1: Reference Architecture of L2VPN/EVPN MPLS connectivity for IP TNL using Ethernet...............28
Figure 6.2: Reference Architecture of L3VPN MPLS connectivity for IP TNL ..................................................30
Figure 6.3: IP connectivity in the access for IP TNL over Ethernet. .................................................................31
Figure 6.4: IP connectivity in the access for IP TNL .........................................................................................32
Figure 6.5: NG-U/C protocol structure ..............................................................................................................33
Figure 6.6: F1-U/C protocol structure ...............................................................................................................33
Figure 6.7: N9 protocol structure ......................................................................................................................34
Figure 6.8: N6 protocol structure ......................................................................................................................34
Figure 6.9: Xn protocol structure ......................................................................................................................35
Figure 6.10: Protocol stacks used for TNL Transport in Use Case a ...............................................................36
Figure 6.11: Protocol stacks used for TNL Transport in Use Case b ...............................................................36
Figure 6.12: Protocol stacks used for TNL Transport in Use Case c ...............................................................37
Figure 6.13: Protocol stacks over IP access and MPLS aggregation used for TNL Transport in Use Case d 37
Figure 6.14: Protocol stacks over IP access and MPLS aggregation used for TNL Transport in Use Case e 38
Figure 6.15: Protocol stacks over Ethernet at the access network used for TNL that includes IP only
Transport ..................................................................................................................................................39
Figure 6.16: Protocol stacks over IP at the access network used for TNL that includes Ethernet Transport ..39
Table of Tables
Executive Summary
This document provides a functional reference architecture, design, and protocol requirements for Transport
networks supporting 5G cellular fronthaul and backhaul. It is intended to be used by operators in specifying
what is expected of the equipment they procure and some guidance on deployment to support 5G. It is
intended to be used by vendors in deciding what to implement and support and how it will be used.
1 Purpose
In the context of transport networks, the purpose of this Technical Report is:
• To provide technical architecture and equipment (HW and SW components) requirements for 5G
transport.
• To define end-to-end reference architectures for transport solutions and services addressing control,
user and management traffic in support of 5G mobile networks. The different 5G RAN functional splits
and network slicing mechanisms for various 5G use cases need to be addressed.
• To assess the suitability of multiple transport technologies for various 5G use cases.
• To define the role in the 5G transport architecture considering SDN and automation as well as
virtualization and edge cloud.
• To address stand alone (a sole 5G mobile network) and non-stand alone (5G-enabled smartphones will
connect to 5G frequencies for data-throughput improvements but will still use 4G for non-data duties
such as talking to the cell towers and servers) RAN deployment scenarios for migration and dual
connectivity cases.
• To provide specifications for various 5G transport scenarios that are depicted in this reference
architecture.
• To target deployment of energy saving technologies.
• To define 5G transport considering DetNet/TSN.
• To promote multi-vendor interoperability for 5G RAN transport SW and HW components, in coordination
with 3GPP, and IEEE, and other standardization activities, and to create a basis for evaluation for
compliance assessment.
2 Scope
The target is to define functional and architecture requirements for a suite of transport nodes for 5G
transport, to address various functional splits of the 5G RAN, as defined in 3GPP TR38.801[10], as well as
User Plane – Control Plane split options. Specifically, Cell-site Gateway and Aggregator devices would be
deployed for higher layer splits (e.g., options 1 and 2), while dedicated fronthaul nodes are engineered for
low layer splits (Out of scope for this document). In addition the target is to define network slicing
management plane, control plane and data plane architecture and nodal requirements.
For each transport node (e.g., CSG,MASG), the following requirements should be included in the scope:
• Transport service (TNL) technology, for example, Ethernet, IP,802.1CMde [53] etc.
• Synchronization requirements (see below).
• Underlay network technology (IP, Ethernet, MPLS) with regards to encapsulation, signaling and routing,
QoS, OAM mechanisms, resiliency, and security.
• Slicing mechanisms for different types of applications and services for different QoE and enabling end-
to-end slicing traffic engineering.
• Transport mechanisms to support network slicing with a transport network and their relevant
requirements.
The scope should cover co-location of 5G with 2/3/4G networks aligned with TR-221 [1],TR-224 [82], TR-350
Issue 2 [5] and consider multiple RAN interfaces: along with 5G’s N2, N3 U and C, Xn U and C interfaces,
F1, C and U interfaces as well as legacy RAN interfaces (e.g., Abis for GSM, Iub for UMTS, A15, A8, A9 for
CDMA, S1/X2 for LTE) from the point of view of TDM, ATM, Ethernet and IP services. RAN interfaces over
TDM and ATM are covered in TR-221 [1] and are not covered in this document.
The following Transport Network Layers are within scope of BBF 5G transport:
• Requirements for supporting clock distribution to the base stations, including frequency and Time/phase
synchronization.
• Resiliency requirements taking into account failover times appropriate for mobile backhaul networks.
• OAM requirements and capabilities for each transport network.
• RAN equipment with a range of physical interfaces (e.g., Gigabit Ethernet, 10G, 25G and 100G Ethernet
etc.), connected through intervening access and aggregation networks.
• Support for Time Sensitive Networking (IEEE 802.1CM for Ethernet fronthaul, IETF DetNet),).
• Support for Segment Routing, EVPN.
The project approaches the 5G transport architecture from the point of view of the transport network. Mobile
traffic is considered as application (overlay) data of the respective TNL and is transparent to the transport
network.
Different service types E-line, E-Tree, E-LAN are in scope for each transport network type.
Notwithstanding the references used in prior (source) BBF Technical Reports used in the document, this
document relies on reference to the backward compatible subset of more recently published versions of
revised MEF specifications (including MEF 6.2, MEF 10.3, MEF 22.3 & MEF 22.3.1, and MEF 23.2) to
achieve 5G Transport function. One of the things this accomplishes is to make this document compatible
with more recently published versions of TR-221 [1], TR-224 [82], and TR-350 [5].
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT",
"RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be
interpreted as described in BCP 14 [RFC 2119] [97] [RFC 8174] [98] when, and only when, they appear in
all capitals, as shown here.
3.2 References
The following references are of relevance to this Technical Report. At the time of publication, the editions
indicated were valid. All references are subject to revision; users of this Technical Report are therefore
encouraged to investigate the possibility of applying the most recent edition of the references listed below.
3.3 Definitions
The following terminology is used throughout this Technical Report.
CSG Cell Site Gateway – Node at the cell site that presents the transport network interface to
the Mobile RAN equipment. For purposes of this document this device is IP capable node or
an MPLS capable node
IP TNL The Transport Network Layer defined in this document as the transport bearer for 5G and
LTE IP traffic
The Transport Network Layer defined in this document where the transport commits to
ETH TNL
preserving the Ethernet/802.3 PDU end-to-end in forwarding Ethernet frames between TNL
end-points, the TNL is an Eth TNL (irrespective of what is encapsulated within the Ethernet
frames).
Mobile Aggregation Site Gateway – Last transport node before the MME or serving gateway
MASG site or Edge DC, that presents the transport network interface to the mobile equipment.
For purposes of this document this device is an MPLS capable node.
3.4 Abbreviations
This Technical Report uses the following abbreviations:
TR Technical Report
WA Work Area
WT Working Text
APTS Assisted Partial Timing Support
PTP IEEE 1588 Precision Time Protocol
GNSS Global Navigation Satellite System
PRTC Primary Reference Time Clock
PRC Primary Reference Clock
3GPP 3rd Generation Partnership Project
5GC 5G Core Network
AC Access Circuit
AN Access Node
AMF Access and Mobility Management Function
ATM Asynchronous Transfer Mode
BBF Broadband Forum
BFD Bidirectional Forwarding Detection
BGP Border Gateway Protocol
BS Base Station
BSC Base Station Controller
BTS Base Transceiver Station
BW Bandwidth
CDMA Code Division Multiple Access
CE Customer Edge
CES Circuit Emulation Service
COS Class Of Service
CSG Cell Site Gateway
CV Connectivity Verification
DC Data Center
ECMP Equal Cost Multi-Path
EDGE Enhanced Data Rates for GSM Evolution
EN Edge Node
eNB E-UTRAN Node B
EPC Evolved Packet Core
EPS Evolved Packet System
E-UTRAN Evolved Universal Terrestrial Radio Access Network
EVC Ethernet Virtual Connection
Several releases/generations (e.g., 2G/3G/4G/5G) of mobile network services (i.e., TDM, ATM, Ethernet and
IP RAN backhaul traffic) can be transported on a converged network infrastructure.
More functions can be combined into the same node (e.g., L2VPN and L3VPN hybrid), which means fewer
nodes are needed in the networks, thus energy consumption can be reduced.
MPLS based technologies such as L3VPN or VPLS can support multicast services efficiently, thus source
replication is not needed and energy efficiency for multicast service can be improved.
4.2 IPv6
IPv6 is an integral part of the specification below.
4.3 Security
Security requirements above the transport layer are specified by 3GPP. For example, for LTE, traffic
between eNB and MME or S-GW, may be encrypted using IPsec if the deployment scenario demands it.
For 5G traffic between gNB and UPF / AMF and traffic between the DU and the CU can also be encrypted
with IPsec if the deployment scenario demands it. In some cases, for DU to CU traffic MACSEC can be used
as well.
Security risks on the mobile backhaul network (e.g., securing the MPLS control plane or IP control plane) are
addressed by the security requirements described further in the document in Sections 7.1.6 and 9.3.
4.4 Privacy
Any issues regarding privacy are not affected by TR-521.
5 Reference Architecture
Figure 5.1: 5G system architecture as depicted in 3GPP TS 23.501 document with Mobile transport
portion of it
Figure 5.1 depicts the 5G system architecture as per 3GPP TS 23.501 [9] with the Mobile transport scope
indicated. The mobile transport scope will include the following interfaces:
Note: N1 is not in scope as well as other interfaces between 5G control elements that runs in the
Mobile core. This architecture does not include the different split options in the RAN.
Beside the radio access and core network, the transport network will play a key role in 5G to flexibly and
dynamically address the requirements of future mobile networks. In order to support the required flexibility,
an enhanced packet-based network is required. In order to address backhaul and fronthaul interfaces,
traffic class concepts at the transport layer will be leveraged. Furthermore, to efficiently support network
slicing by the transport network, SDN and network functions virtualization (NFV) may be supported by the
transport network, e.g., by separating the control and data planes through common packet-based data path
abstraction. This unified data and control plane interconnects distributed 5G radio access and core
network functions, hosted on the mobile in-network cloud infrastructure. The 5G transport network will
consist of integrated optical, Ethernet, IP and wireless e.g., Microwave network infrastructure.
Lower Layer functional splits are splits above the PHY layer and higher layer functional splits are splits below
the PHY layer. Currently 1 Higher layer splits is defined for 5G Option 2 [CU/DU split]) F1.
This document includes the concept of an Ethernet (Eth) TNL for transparent bridging of Ethernet frames. In
this document IP TNL is distinguished from Eth TNL as flows:
1. If the transport allows IP forwarding at any point between TNL end-points, the TNL is an IP TNL as
defined in TR-221 [1].
2. If the transport commits to preserving the Ethernet/802.3 PDU end-to-end in forwarding Ethernet
frames between TNL end-points, the TNL is an Eth TNL (irrespective of what is encapsulated within
the Ethernet frames).
In this document, IP TNL will have the same definition, however in Eth TNL it is not sufficient to transport just
an IP packet encapsulated by Ethernet frame. It is a must to transport any Ethernet frame (802.1CMde [53],
for example).
In the context of the TR-221 [1], the scenarios arising out of these TNLs are hereafter referred to as TNL
Scenarios since they refer to the transport service provided by the packet-based network to the mobile
access/aggregation network. Thus the following TNL scenarios are included:
1. Eth TNL
2. IP TNL
The architecture and requirements for the ETH TNL support are specified per TR-224 [82] for VPLS and per
TR-350i2 [5] for EVPN. These detail how to provide an Ethernet service such as EPL or EVPL. Ethernet
services for 5G Transport are as specified by MEF. 22.3 [20] (as amended by MEF 22.3.1 [54]).
Time-Sensitive Networking (TSN) features for mobile transport, that may be supported over an ETH TNL, are
described by IEEE Std. 802.1CM. This includes Ethernet interface support of traffic classes, strict priority,
flow metering and synchronization. This support ensures support of these features all the way to the gNB. It
should be noted that the underlying VPLS and EVPN networks can provide enhanced features using IETF
DetNet technology.
For each supported TNL scenario, the packet transport network may extend from the MASG to various
nodes in the mobile access/aggregation network as indicated by the cases (a) to (e) in Figure 5.3. These are
referred to as Architecture Scenarios.
The specific combinations of TNLs supported by mobile transport equipment are a business consideration
and not a subject for standardization.
Figure 5.3: Reference Architecture for mobile backhaul network using packet Transport in the
Access, Aggregation, and Core Networks for high layer splits
Note: The above figure does not depict the case in Figure 5.3 where the UPF is located in the
aggregation network which then put N4 (to the SMF) and N6 (to the Data Network) and N9 (data
between UPFs) over the IP TNL.
The green Arrow on Figure 5.3 shows a case where the transport provider’s first PE is not located on
the cell site but on the Access or aggregation network. In this case there is no Transport provider
CSG at the Cell site. In this case the connection between the cell site and the first Transport PE
might be an Ethernet or IP network. The last device in the cell site simply delivers (and receives)
packets over that ETHERNET or IP network.
The red arrow depicts a case where the CSG belongs to the transport provider/ mobile provider and
the CSG provides a point to point connection over the Ethernet (case d or e) or IP (case e) network.
In this case the CSG can be Eth device, IP Router, or bridge device. In case it is router and bridge
then we need to transport the Eth over IP tunnel.
All encapsulations over packet network solutions performed in the CSG require suitable adaptation
mechanisms at the MASG to provide a compliant interface N2, N3 and S1 C and U for interconnection to the
AMF UPF MME and S-GW. Figure 5.1 depicts packet-based mobile backhaul network in the Access and
Aggregation networks connecting Base Stations to AMF, UPF, MME/S-GW, and cases to connect UPF to
other UPF or SMF or DN. The reference architecture depicts the following connectivities:
1. Split option 1 for both LTE and 5G where the interface that is connected to the CSG connects the
PDCP and the RRC layers. In this case the TNL is generated from the Iub S1/X2 in 4G and N2/N3
and Xn in 5G.
2. Split option 2 defined for 5G only where the interface that is connected to the CSG connects the RLC
and PDCP layers. In this case the TNL is generated from the F1 interface in 5G.
3. UPF residing in the aggregation network:
a. The TNL is generated from N6 connecting the UPF to the DC
b. The TNL is generated from N9 connecting the UPF to another UPF
c. The TNL is generated from N4 connecting the UPF to the SMF
In the reference architecture, the location of packet-based solutions functions for the various TNL scenarios
is flexible; i.e., the interworking functions required to transport mobile traffic (TNL) could be located either in
the Edge Node (EN), or in the Access Node (AN), or in the CSG. Moreover, in Split option 2 the TNL
connection is split from the DU to the CU and from the CU to AMF/UPF. In this case the CU can reside in the
cell site over local NFVI or in different DC location in the network. The location and reachability to the CU
depends on various deployment considerations.
Various Deployment Scenarios arise based on the location of MPLS functions and the extent of MPLS in the
mobile backhaul network. Cases (a) through (e) in Figure 5.3 depict these deployment scenarios through the
access and aggregation networks:
1. MPLS or VXLAN transport is used between the EN and the MASG via LSP or L3VPN or EVPN
carrying a TNL.
2. MPLS or VXLAN transport is used between the AN and the MASG via LSP or L3VPN or EVPN
carrying a TNL.
3. MPLS or VXLAN transport is used between the CSG and the MASG, with the AN transparent to
MPLS. LSP or L3VPN or EVPN carrying a TNL is established between the CSG and the MASG,
which act as PE devices, while all MPLS nodes in the aggregation network act as P routers.
4. IP/MPLS transport is used between the CSG and the MASG using segment routing, with an AN that
is IP/MPLS segment routing aware. LSP or L3VPN or EVPN carrying a TNL is established between
the CSG and the MASG, which act as PE devices, while the AN and MPLS devices in the
aggregation network act as P routers all aware of segment routing.
5. IP/MPLS transport is used between the CSG and the MASG, with the AN transparent to IP/MPLS /
segment routing. LSP or L3VPN or EVPN carrying a TNL is established between the CSG and the
MASG, which act as PE devices, while all MPLS nodes in the aggregation network act as P routers
For each IP/MPLS use case, an overlay model based upon L2VPN could be used between any IP/MPLS
routers. L2VPN can be based upon VPWS or VPLS, EVPN over MPLS or VXLAN in the aggregation
network, and even down to the AN or CSG. This overlay model relies on the separation of IP control planes:
there is one IP control plane to support MPLS carrying the TNL, and another IP control plane used for the
aggregation network which is completely independent from the previous one. It is important to note that in
this overlay model the TNL is carried over an Ethernet PW at the CSG/MASG and / or AN / EN, and the
Ethernet layer is carried over L2VPN in the aggregation and Access network (including AN and CSG
optionally). This overlay model could be chosen by operators to tackle operational or equipment constraints
or in order to provide an Ethernet connectivity to a specific Ethernet Managed Service.
There are different types of solutions based upon MPLS and/or IP that could be used to transport LTE traffic
in the Access/Aggregation/Core networks: L2VPN and L3VPN solutions.
The IP TNL may be realized by either a L3VPN or an L2VPN or EVPN over MPLS or IP with or without
segment routing. The architectures described in this section have to support IP connectivity requirements
between DU part of the BS and the CU part of it that reside in different locations in the network, as well as
between the CUs and AMF, UPF, and UPF SMF other UPF and data network. In addition, it needs to support
connectivity between BSs.
Figure 5.4: NG-RAN architecture no gMB split and Split option 2 and the corresponding interfaces.
5GC – 5G Core
gNB- 5G Node B.
An gNB can support FDD mode, TDD mode or dual mode operation.
A gNB may consist of a gNB-CU and one or more gNB-DU(s). A gNB-CU and a gNB-DU is connected via F1
interface. One gNB-DU is connected to only one gNB-CU.
For NG-RAN, the NG and Xn-C interfaces for a gNB consisting of a gNB-CU and gNB-DUs, terminate in the
gNB-CU.
The NG-RAN is layered into a Radio Network Layer (RNL) and a Transport Network Layer (TNL).
The NG-RAN architecture, i.e., the NG-RAN logical nodes and interfaces between them, is defined as part of
the RNL.
For each NG-RAN interface (NG, Xn, F1) the related TNL protocol and the functionality are specified. The
TNL provides services for user plane transport, signaling transport.
In NG-Flex configuration, each gNB is connected to all AMFs within an AMF Region. The AMF Region is
defined in *3GPP TS 33.501 [12].
If security protection for control plane and user plane data on TNL of NG-RAN interfaces has to be
supported, NDS/IP *3GPP TS 33.501 [12] shall be applied.
6.1.1 Connectivity
The traffic at the Aggregation Network and Core Network will be over MPLS. The Access network is not a
routed network but can carry IP TNL over MPLS or IP TNL over IP tunnel and/or over VLAN. Since the IP
TNL includes a case of carrying the full Ethernet frame End to End, and even though the access network is
not a routed network, IP tunnels are needed when MPLS is not used. 5G multicast and broadcast services
can be supported by L2VPN and L3VPN MPLS technologies.
Note: MEF 22.3 [20] describes how mobile backhaul can be supported by Carrier Ethernet Services
in MEF 6.2 [18], using Service Attributes defined in MEF 10.3 [19] and MEF 22.3 [20]. The additional
service attributes focus on availability, resiliency performance, CoS and synchronization.
In the mobile backhaul network, Ethernet VLAN tagging as per IEEE 802.1Q [8], may be used for traffic
separation, for example to separate management from user traffic, to separate traffic between operators in
case of RAN sharing or to separate 2G, 3G LTE, and 5G traffic in case of traffic aggregation.
Figure 5.3 provides the reference architecture for L2VPN solutions as VPLS (e.g., IETF RFC 4762 [21]
and/or IETF RFC 4761 [22]) or EVPN (e.g., IETF RFC 7432 [23]), H-VPLS option of RFC 4762 [21] and
VPWS in the mobile backhaul network for 2G/3G using IP TNL or LTE or 5G, depicting the Access,
Aggregation and Core parts of the mobile backhaul network to transport Ethernet frames encapsulating IP
TNL between mobile nodes. The same L2VPN transport solution could be used to backhaul N2, N3, N6, N9
and N4 interfaces in order to get a converged and efficient network solution for 5G.
VPLS or EVPN can be used in the Aggregation network with PE routers embedded into the ENs and
optionally moved to the ANs. VPLS can be extended down to the CSGs and up to the MASG through the
Access and Aggregation networks.
H-VPLS can be used in the Aggregation and Access networks to enhance scalability by reducing the mesh
between the nodes.
VPWS can be used in the Aggregation network with PE routers embedded into the ENs. VPWS can be
extended down to the CSGs and up to the MASG though the Access and Aggregation networks.
Figure 6.1: Reference Architecture of L2VPN/EVPN MPLS connectivity for IP TNL using Ethernet
Figure 6.2 provides the reference architecture for L3VPN solutions IETF RFC 4364[27] in the mobile
backhaul network for 2G/3G using IP TNL, LTE or 5G, depicting the Access, Aggregation and Core parts of
the mobile backhaul network to transport IP TNL between mobile nodes. It is interesting to note that a single
L3 VPN MPLS transport solution IETF RFC 4364 [24] could be used to backhaul both N2, N3, N6, N4 and
N9 interfaces in order to get a converged and efficient network solution for 5G.
L3VPN MPLS can be used in the Aggregation network with PE routers embedded into the ENs and
optionally moved to the ANs. L3VPN MPLS can be extended down to the CSGs and up to the MASG
through the Access and Aggregation networks.
MPLS Layer 3 VPNs use a peer-to-peer VPN Model that leverages BGP to distribute VPN-related
information. They are based on IETF RFC 4364 [24] and support QoS and Traffic Engineering. The VPNs
provide layer 3 connectivity across the backhaul network and provide any to any topology to support N2, N3,
N4, N6, N4 and N9 interfaces. MPLS Layer 3 VPNs can be deployed over MPLS TE enabled networks with
related mechanisms, QoS reliability to offer strict SLA.
Different VPNs remain distinct and separate, even if two VPNs have an overlapping address space.
• IPoETH with or without VLAN in the access networks to L3VPN. In this case a VLAN is used to
indicate the VRF#
• L3VPN directly from the CSG
• IPoL2VPN In the access networks to L3VPN
• Eth PW to L3VPN
6.1.1.4 IP connectivity
IP connectivity can be in the access network only since the assumption is that the aggregation and core
network will be based on MPLS.
On the above figure there is an IP network at the access network and a tunnel is used to carry the original IP
packet over the access network in to the L3VPN in the aggregation and core.
• NG (N3) interface
As depicted in 3GPP TS 38.410 [13] V15.2.0 (2018-12) the following are the NG-U and NG-C
encapsulations:
The NG user plane (NG-U) interface is defined between a NG-RAN node and a UPF. The NG-U interface
provides non-guaranteed delivery of PDU Session user plane PDUs between the NG-RAN node and the
UPF.
In the NG-U transport network layer is built on IP transport. For the reliable transport of signaling messages,
SCTP is added on top of IP. The application layer signaling protocol is referred to as NGAP (NG Application
Protocol).
• F1 interface
The F1-U interface is connecting the gNB-DU with the gNB-CU-UP (User plan) while the F1-C interface
connected the gNB-DU with the gNB-CU-CP (control protocol)
In case of IP –TNL the CSG will transfer either IP TNL I.E only the IP layer or in case of ETH-TNL the
Ethernet part as well.
• N9 interface
As depicted in 3GPP TR 29.891 [15] V15.0.0 (2017-12) section 5.2.1.1 the following is the N9
encapsulations:
• The N9 user plane (N9-U) interface is defined between a pair of UPFs. The N9-U interface provides
non-guaranteed delivery of PDU Session user plane PDUs between the two UPFs.
• The protocol stack for N9 is shown in Figure 6.7.
• In case of IP –TNL the CSG/ Transport device will transfer either IP TNL I.E only the IP layer or in
case of ETH-TNL the Ethernet part as well
• N6 interface
• The N6 interface is defined between the UPF and a Data Network. The N6 interface provides non-
guaranteed delivery of PDU Session, user plane PDUs, between the a UPF and a Data Network. The
protocol stack for N6 is shown in Figure 6.8 In case of IP –TNL the MASG will transfer either IP TNL I.E only
the IP layer or in case of ETH-TNL the Ethernet part as well.
• Xn interface
• As defined in 3GPP TS 38.420 [17] version 16.0.0 Release 16 section 7 following is the Xn
encapsulation
The Xn user plane (Xn-U) interface is defined between two NG-RAN nodes. The Xn-U interface provides
nonguaranteed delivery of user plane PDUs between two NG-RAN nodes.
The transport network layer is built on IP transport. For the reliable transport of signaling messages, SCTP is
added on top of IP. The application layer signaling protocol is referred to as XnAP (Xn Application Protocol).
The protocol stack for Xn-U and Xn-C is shown in Figure 6.9 case of IP –TNL the CSG will transfer either IP
TNL I.E only the IP layer or in case of ETH-TNL the Ethernet part as well.
Figure 6.10: Protocol stacks used for TNL Transport in Use Case a
Figure 6.11: Protocol stacks used for TNL Transport in Use Case b
Figure 6.12: Protocol stacks used for TNL Transport in Use Case c
Figure 6.13: Protocol stacks over IP access and MPLS aggregation used for TNL Transport in Use
Case d
Figure 6.14: Protocol stacks over IP access and MPLS aggregation used for TNL Transport in Use
Case e
Figure 6.15: Protocol stacks over Ethernet at the access network used for TNL that includes IP only
Transport
Figure 6.16: Protocol stacks over IP at the access network used for TNL that includes Ethernet
Transport
• Static provisioning
• Dynamic signaling
[R-3] Both of the following methods MUST be supported by PE and P routers for dynamically
signaled PSN tunnel LSPs.
• LDP is used to set up, maintain and release LSP tunnels per IETF RFC 5036 [25].
• RSVP-TE is used to set up, maintain and release LSPs for traffic engineered tunnels per
IETF RFC 3209 [26] and RFC 5151 [46]. When traffic engineering is needed on the LSP,
RSVP-TE MUST be used.
• If RSVP-TE is used, the encoding MUST comply with Encoding of Attributes for MPLS LSP
Establishment Using Resource Reservation Protocol Traffic Engineering (RSVP-TE) as
described in RFC 5420 [94]
[R-4] If segment routing is supported then the PE routers MUST support IETF RFC 8666 [42] for
LSP signaling
[R-5] If segment routing is supported then the PE routers MAY support IETF RFC 8667 [43] for
LSP signaling
[R-6] If segment routing is supported then the PE SHOULD support IETF RFC 8661 [85] for
segment routing MPLS interworking with LDP
[R-7] When co-routed bidirectional LSPs are required, GMPLS-RSVP-TE as per IETF RFC 3473
[27] MAY be supported by PE and P routers.
A contiguous TE LSP is a single TE LSP that is set up across multiple domains using RSVP-TE signaling
procedures described in Section 5.1.1/ TR-221 [1].
[R-8] PE and P routers SHOULD support establishment of inter-area LSPs using LDP s per RFC
5283 [28].
[R-9] If GMPLS is support, OSPF extensions in support of GMPLS as per RFC 4203 [92] MUST
be supported.
[R-10] If GMPLS is supported, ISIS extensions in support of GMPLS as per RFC 5307 [93] MAY be
supported.
.
[R-12] If dynamic routing is supported, all of the following methods MUST be supported by PE and
P routers to exchange routing information to facilitate dynamic LSP signaling:
• OSPFv2 (IETF RFC 2328 [29])
• OSPFv3 (IETF RFC 5340 [30])
• IS-IS (IETF RFC 1195 [31])
• IS-IS for IPv6 (IETF RFC 5308 [32])
[R-13] Traffic engineering extensions of OSPF and IS-IS are used to exchange traffic attributes for
RSVP-TE tunnels. If TE is supported, both of the following methods MUST be supported by PE
and P routers:
• OSPF-TE (IETF RFC 3630 [33])
• OSPF-TEv6 (IETF RFC 5329 [34])
• OSPF-TE metric extension (IETF RFC 7471 [86])
• IS-IS-TE (IETF RFC 5305 [35])
• IS-IS-TE metric extension (IETF RFC 8570 [87])
[R-14] If segment routing is supported, then the PE routers MUST support IETF RFC 8666 [42] for
routing.
[R-15] If segment routing is supported, then the PE routers MAY support IETF RFC 8667 [43] for
routing.
[R-16] If segment routing is supported, then the PE routers MAY support IETF RFC 8669 [89] for
routing.
[R-17] If segment routing is supported, then the PE routers MUST support IETF RFC 8491 [89] for
advertisement of MSDs (maximum SID depth) using IS-IS extensions.
7.1.1.4 PW signaling
[R-18] One or both of the following methods MUST be used for PWs:
• Static provisioning
• Dynamic signaling
[R-19] PE routers MUST support Single Segment Pseudowire (SS-PWs) as per IETF RFC 3985
[36].
[R-20] PE and P routers SHOULD support static provisioned Multi-Segment Pseudowire (MS-PW)
as per IETF RFC 6073 [37]
When PE and P routers support Dynamic signaled PWs the following apply: MUST support pseudowire
setup, maintenance and release of PWs as per IETF RFC 4447 [38]with FEC 128
[R-21] SHOULD support pseudowire setup, maintenance and release of PWs as per IETF RFC
4447 [38] with FEC 129
If an implementation supports IP-MPLS 22.0.0 [7] “BGP auto-discovery and signaling for VPWS-based VPN
services” which provides specification for setup of VPWS pseudowires with BGP the following requirements
apply.
[R-22] PE routers SHOULD support one or more of the following encapsulation type values
from IP-MPLS 22.0.0 [7]
• For Ethernet over MPLS (IETF RFC 4448 [41]) the Encapsulation Type is 4 or 5 as per IP-MPLS
22.0.0 [7] Section 8.5.
• For TDM TNL (RFC 4553 [47] or RFC 5086 [48]) the Encapsulation Type is per IP-MPLSF 22.0.0 [7]
Section 8.5
Any difference from the above requirements for specific TNLs is identified in the specific TNL PW signaling
section and takes precedence on these requirements.
7.1.2 Forwarding
[R-23] The PE MUST support IPv4/IPv6 dual stack functionality.
[R-26] If segment routing is supported then PE routers MUST support Segment Routing with MPLS
data plane as per IETF RFC 8402 [51].
7.1.3 OAM
7.1.3.2 PW OAM
As defined in TR-224 [82] section 8.2.3.
7.1.4 Resiliency
TR-221 [1] section 5.3 defines resiliency in the mobile networks.
Loop free alternates (LFA) As defined in TR-221 Amendment 2 [2] section 3.3
7.1.5 QoS
As defined in TR-221 [1] section 5.4 and TR-224 [82] Section 9.
7.2.1 QoS
The MPLS mobile backhaul network has to provide QoS and service level agreements. The QoS capabilities
must be end to end, which includes both ACs and mobile BH domains. In this case the access domain is IP
and the Aggregation and Core domains are MPLS. Usually, a mobile backhaul network will support
guaranteeing sufficient bandwidth is available to support new and existing connections conforming to all SLA
metrics including protection mechanisms.
[R-27] The PE(CSG) MUST support a configurable mechanism to ensure CoS starvation
prevention.
For 5G, IP is the unique Transport Network Layer specified to transport mobile flows between gNBs and
mobile Core nodes in order to support logical mobile interfaces defined by 3GPP. Details on the IP
connectivity requirements for specific 3GPP interfaces, e.g., N3, 2, 6, 4, and N9, are given in Figure 5.1.
Different Solutions MPLS based or none MPLS based, can be used to transport IP TNL in the mobile
backhaul network and its different segments: L2VPN MPLS (e.g., VPWS, VPLS, H-VPLS), L3VPN MPLS
and RSVP-TE MPLS LSP, EVPN, Pure IP connectivity that are described hereafter.
9.3.2.1 Routing
[R-30] One or both of the following methods MUST be used by PE and P routers:
• Static routing
• Dynamic routing
[R-31] If dynamic routing is supported, all of the following methods MUST be supported by PE and
P routers to exchange routing information:
9.3.2.2 QoS
QoS as defined in section 7.2.1.
[R-32] The PE MUST support CoS marking in the DSCP bits of the IP tunnel.
[R-33] The PE MUST support CoS mapping between the QoS of TNL and DSCP bits of the IP
tunnel.
The following requirements apply to the CSG when using VXLAN IETF RFC 7348 [39] tunnels for IP
connectivity:
[R-35] The CSG MUST support VXLAN tunnels using IPv4 encapsulation.
[R-36] The CSG SHOULD support VXLAN tunnels using IPv6 encapsulation.
[R-37] The CSG MUST support bridging Ethernet frames into a VXLAN tunnel.
[R-38] The CSG MUST support using the tunnel settings in Table 9.1.
[R-39] The CSG MUST support static provisioning of VXLAN tunnel settings
[R-40] Upon receiving downstream encapsulated traffic from the AN/EN, the CSG MUST:
• Decapsulate VXLAN
• If the Protocol Type in IP header is UDP (0x11) and the UDP Destination Port is 4789,
then it must process the 802.3 frame following the VXLAN header.
• The frame should be forwarded per the MAC forwarding table, if matching the VNI
configured for the VXLAN tunnel.
The following requirements apply to the AN/EN when using VXLAN tunnels for the IP connectivity:
[R-42] The AN/EN MUST support stateless VXLAN tunnels using IPv4 encapsulation.
[R-43] The AN/EN SHOULD support stateless VXLAN tunnels using IPv6 encapsulation.
[R-44] The AN/EN MUST support bridging Ethernet frames into a VXLAN tunnel.
[R-45] The AN/EN MUST support using the tunnel settings in Table 9.1.
[R-47] The AN/EN SHOULD support dynamically learning the VXLAN tunnel settings from
encapsulated packets received from the CSG. Learned encapsulation is then used on downstream
traffic to the CSG.
[R-48] Upon receiving upstream encapsulated traffic from the CSG, the AN/EN MUST:
• Decapsulate VXLAN
• If the Protocol Type in IP header is UDP (0x11) and the UDP Destination Port is 4789,
then it must process the 802.3 frame following the VXLAN header.
• The frame should be forwarded to the selected AN/EN for this CSG, based on the VNI.
Table 9.1 describes the values that should be set in each of the headers of the VXLAN encapsulation in the
VXLAN tunnel.
The IP packet is carried over VXLAN by encapsulating the packet with an Ethernet Header inside a VXLAN
header added by the VXLAN ingress device.The Ethernet header is removed at the VXLAN Egress device.
[R-49] The PE MUST use the Ethernet source address that is associated with the VXLAN ingress
device in the Encapsulating Ethernet Header.
[R-50] The PE MUST use The Ethernet destination address that is associated with the VXLAN
egress device in the Encapsulating Ethernet Header.
9.3.2.7 Qos
The following capabilities are to be supported by the PEs (CSGs) supporting IP connectivity for IP TNL using
Ethernet:
[R-51] The PE(CSG) MUST support ingress bandwidth profile based on MEF 10.3 [19].
[R-52] The PE(CSG) MUST support at least 4 CoS and associated service metrics (e.g., delay,
delay variation, packet loss) as defined in MEF 22.3 “EVC Requirements” [20].
[R-53] The PE(CSG) SHOULD support Connection Admission Control to guarantee sufficient
bandwidth is available to support new connection conforming to all SLA metrics defined in MEF
22.3 [20] Section 10.3 [19].
[R-54] The ingress PE(CSG) MUST map the PCP (in the PRI field of the IEEE 802.1Q [8] VLAN
tag) into DSCP field of the IP tunnel.
[R-55] For support of PTP synchronization over the Ethernet, the network MUST support the
synchronization performance metrics defined in “Performance for Synchronization Traffic Class” by
MEF 22.3 [20].
It is assumed that QoS markings are mapped from higher layers to lower or encapsulation layers.
Note: Mapping based on higher layer QoS settings (e.g., DSCP, etc.) may be also used.
9.3.2.8 OAM
[R-56] The CSG MUST support monitoring the status of the underlay network using BFD.
[R-57] The CSG MUST support single-hop BFD per RFC 5881 [45] [3x] mandatory features.
[R-58] The CSG MUST support BFD asynchronous mode per RFC 5880 [44].
[R-59] The CSG MUST support a single BFD session per to a specific Access node / PE at the
POP/CO IP address.
The CSG MUST support measuring the performance between the CSG and the Access node or the
Edge node as depicted in
[R-60] Figure 5.3 cases d and e. The CSG MUST support measuring the performance between a
CSG and other CSG.
TWAMP Light (TWL), an IP OAM tool described in RFC 5357 [49], Appendix I, shall be used for measuring
the performance between any two CSGs, as well as between a CSG and the edge node.
[R-61] The CSG MUST support acting as a TWL Session-Reflector as per Section 6.1/TR-390 [6].
[R-62] The CSG MUST support static provisioning of the TWL Session-Reflector as defined
in section 5/TR-390 [6].
[R-63] The CSG MUST support acting as a TWL Session-Sender as defined section 6.2/TR-
390 [6].
[R-64] The CSG MUST be able to mark the DSCP field in the IP packet per the class of service
measured.
The mobile operator may use Ethernet Services to connect the CSG and the MASG. In that case, the mobile
operator must be able to manage this form of Mobile Backhaul using Service OAM, and the following
requirements apply:
[R-65] [The CSG MUST support MEF service OAM as defined in TR-221 [1] section 5.2.5 and TR-
224 [82] Section 8.1.2.
9.3.2.9 Resiliency
For mobile networks, resiliency is the ability to maintain the required levels of service for both inelastic and
elastic traffic when there are temporary or permanent failures in that network. This section describes
requirements to ensure resiliency over the access network between the CSG and the Access node / Edge
node for the case of transferring Ethernet over IP tunnel.
While the traffic is inherently bidirectional, failures may be related to a specific traffic direction. In the
following we will generally discuss traffic in the CSG to Access Node / Edge node direction, and the reader
will understand that the opposite direction needs to be similarly addressed.
If protection mechanisms are available at multiple layers, careful consideration should be given to setting of
the relevant timer values. For such cases, guidance can be derived from Section 3.5/RFC 3386 [50], which
states: “Multilayer interaction is addressed by having successively higher multiplexing levels operate at a
protection / restoration time scale greater than the next lowest layer".
Hence, if L1 or L2 protection is available in addition to IP protection, the PE must be able to delay its actions
sufficiently for lower layer protection methods to succeed. Whenever possible, protection switching at the
layers underneath the tunnel should be transparent to the IP layer. The specific algorithm of protection
switching implemented at each node is beyond the scope of this specification.
The CSG needs to monitor the underlay network as per section 9.3.2.8.1.1 “Continuity check”.
[R-66] The CSG MUST support re-establishing the path continuity over a backup access link.
[R-67] The CSG SHOULD restore traffic flow within 250 milliseconds after receipt of failure
notification.
When the failed access link comes back online, and is once again capable of providing underlay path
continuity, it is a matter of policy whether to re-establish the tunnel over the primary access link or to keep
using the backup.
[R-70] The CSG MUST support setting of the resiliency revert mode based on configuration and/or
policy.
9.3.2.11 Security
[R-71] The PEs MUST support the following capabilities for VPN security:
• General VPN security per Section 4.5/RFC 3809 [76] and RFC 4111 [80].
• L2VPN security per Section 6/RFC 4761 [22] and Section 14/RFC 4762 [21].
• L3VPN security per Section 13/RFC 4364 [24].
• Encapsulation MPLS in IP (for the IP part) Section 8/RFC 4023 [84]
[R-74] If the PE supports IPSec VPN, it MUST support encapsulating security payload (ESP), as
defined in IETF RFC 4303 [79].
[R-75] If the PE supports IPSec VPN, it MUST support the IKEv2 key exchange protocol as
defined in RFC 7296 [81].
[R-76] If the PE supports IPSec VPN, it MUST support IPSec VPN in tunnel mode, which is
defined in section 3.2 of RFC 4301 [77].
[R-77] If the PE supports IPSec VPN, it MUST support dead peer detection (DPD), which is
defined in RFC 7296 [81].
[R-78] If the PE supports IPSec VPN, it MUST support that the destination address in the IPSec is
configured to be either an IP address or a dynamic domain name.
[R-79] If the PE supports IPSec VPN, it MUST support querying the status of child security
associations (SA) from the Controller extension.
[R-84] The PE MUST NOT support authentication using Message Digest 5 (MD5) IP over Ethernet
No tunnel
[R-86] The PE MUST support CoS mapping between the QoS of TNL and the PCP (in the PRI field
of the IEEE 802.1QVLAN tag [8]) VRF VLAN and provider VLAN (if exist).
9.3.2.15 OAM
[R-87] The CSG MUST support monitoring the status of the IP network using BFD.
As required in section 9.3.2.8.1.1, the CSG needs to support requirements R50 – R53.
As required in section 9.3.2.8.1.2 the CSG needs to support requirements [R-60] - [R-64]
9.3.2.16 Resiliency
For mobile networks, resiliency is the ability to maintain the required levels of service for both inelastic and
elastic traffic when there are temporary or permanent failures in that network. This section describes
requirements to ensure resiliency over the access network between the CSG and the Access node / Edge
node for the case of transferring N3 interface over IP network.
While the traffic is inherently bidirectional, failures may be related to a specific traffic direction. In the
following we will generally discuss traffic in the CSG to Access Node / Edge node direction, and the reader
will understand that the opposite direction needs to be similarly addressed.
If protection mechanisms are available at multiple layers, careful consideration should be given to setting of
the relevant timer values. For such cases, guidance can be derived from Section 3.5/RFC 3386 [50], which
states: “Multilayer interaction is addressed by having successively higher multiplexing levels operate at a
protection / restoration time scale greater than the next lowest layer".
Hence, if L1 or L2 protection is available in addition to IP protection, the PE must be able to delay its actions
sufficiently for lower layer protection methods to succeed. Whenever possible, protection switching at the
layers underneath the tunnel should be transparent to the IP layer. The specific algorithm of protection
switching implemented at each node is beyond the scope of this specification.
[R-88] The CSG MUST support re-establishing the path continuity over a backup access link.
[R-89] The CSG SHOULD restore traffic flow within 250 milliseconds after receipt of failure
notification.
When the failed access link comes back online, and is once again capable of providing IP network path
continuity, it is a matter of policy whether to re-establish the IP connection over the primary access link or to
keep using the backup IP connection.
[R-92] The CSG MUST support setting of the resiliency revert mode based on configuration and/or
policy.
9.3.2.17 Security
[R-93] The PEs MUST support the following capabilities for VPN security:
• General VPN security per Section 4.5/RFC 3809 [76] and RFC 4111 [80].
• L3VPN security per Section 13/RFC 4364 [24].
9.3.3.1 OAM
As required in section 9.3.2.8.1.1, the CSG needs to support requirements [R-56] [R-59].
As required in section 9.3.2.8.1.2 the CSG needs to support requirements R54 - R58
9.3.3.3 Resiliency
As defined in section 9.3.2.9 Security
[R-94] The PEs MUST support the following capabilities for VPN security:
• General VPN security per Section 4.5/RFC 3809 [76] and RFC 4111 [80].
• L3VPN security per Section 13/RFC 4364 [24].
[R-95] The CSG MUST support Zero touch process as defend in IETF RFC 8572 [83].
11 Network Slicing
From the perspective of the CSG/MASG, which is not aware of mobile slices, only the transport slices exist.
The CSG/MASG needs to classify traffic and map it to a specific transport slice matching the correct SLA.
This mapping can be provided either by a management interface to the CSG/MASG or by a signaling
protocol. The interfaces between the 3GPP Management System and the Transport Network (TN) is out of
scope for this document. This document assumes that networks are capable of providing per slice service
behavior bounds, including confidence in delivering those bounds, all dependent on careful design of the
network traffic.
It should be noted that the relationship between the network slice and the transport is not necessarily a 1:1
relationship. For example, MEF 22.3.1 [54] indicates that this mapping of mobile slices to an EVC (i.e.,
transport slice in this document) can by N:1 or 1:1.
As described in IETF draft-ietf-teas-ietf-network-slices [91], the IETF network slice (i.e., transport slice in this
document) is an abstract topology connecting a set of endpoints, with shared or dedicated resources to
satisfy customer’s SLO requirements. The transport slice is technology agnostic, but to realize it in
underlying network should be technology specific. The requirements for realization of network slice may
include: (1) path computation to create network topology as customer’s intent (e.g., low-latency, high-
bandwidth, high-reliability, etc.); (2) necessary network resource reservation (including network, computing
and storage resource); (3) network abstraction for exporting abstract network topology to upper layer, (4)
network performance measuring, etc.
This document specifies the following MPLS-based transport methods with or without Segment Routing:
• L2VPN,
• L3VPN,
• E-VPN,
• IP over MPLS
and the following IP-based transport methods:
• IP and Ethernet over IP tunneling – VXLAN
• IP over Ethernet / VLAN no tunnel
The technologies listed above may be used to address the general requirements below.
VPN can provide separate services as overlay, the underlay network which can be divided into separate
virtual networks using some protocols (such as MPLS-TE, RSVP-TE, SR, SR-TE, etc.), but the network
topology with SLO (e.g., guaranteed latency, guaranteed bandwidth, etc.) requirements and dedicated or
shared network resource reservation requirements for transport slice, may not be satisfied for all use cases.
The extension to existing IGP or MPLS, SR technology may be needed, and deterministic technology (e.g.,
DetNet) may be used in combination.
[R-96] The CSG MUST be able to accept classification for F1-U or N3 packets from its EMS.
[R-97] The CSG SHOULD be able to accept classification for F1-U or N3 packets from a signaling
protocol.
[R-98] The CSG MUST be able to map frames accepted from F1-U and N3 interfaces to the
transport network based on the above methods.
12 Network Synchronization
12.1 Frequency Distribution Scenarios over mobile backhaul
networks
This section provides frequency distribution solutions required for mobile networks. The base station air
interface synchronization requirements are specified in 3GPP (UE to BS interface). If the synchronization
reference is provided by the network, the related network synchronization requirements are defined in ITU-T.
IP/MPLS.20.0.0 [7], Section 7.11.1.1, presented three prevalent scenarios for frequency distribution in mobile
networks. The remainder of this section expands on those scenarios and how they may be deployed. Unless
specifically stated, the rest of the text will focus on supplying the base-station required frequency reference
accuracy to meet its RF transmission requirements. Another distinction that will also be made in the following
text is between physical-layer frequency distribution methods and packet-based (higher-layer) distribution
methods. The first uses the physical-layer symbol-rate to distribute the frequency information while the latter
does it using a dedicated flow of packets. The frequency distribution scenarios were devised based on the
following principals:
(1) When a mixture of physical-layer and packet-based methods is used, the packet-based frequency
distribution always extends the physical-layer frequency distribution and never the other way around.
(2) The only exceptions to (1) are:
(i) At the last-mile (link between the access node and the CSG) where a packet-based to
physical-layer frequency conversion is possible in order to support various lastmile
frequency distribution technologies (such as NTR in DSL or downstream frequency
distribution in xPON).
(ii) At the, usually short distance, link between the CSG and the BS where various short-
distance or intra-office frequency distribution connections might be used (e.g., a 2.048MHz
physical clock over a coax cable).
(3) The frequency reference is generally a PRC complying to ITU-T G.811 [62].
(4) The fundamentals and specifics of the physical-layer or packet-based frequency distribution are
outside the scope of this document.
Furthermore, packet-based frequency transfer depends on the characteristics of the network affecting packet
delay variation (PDV) performance (e.g., network load, number of hops, speed of the links, re-routing). In
general anything that affects delay variation of the packets) and the clock recovery function in the end
equipment (e.g., the specific local oscillator used, timestamp accuracy). Generally speaking, the frequency
information is always distributed from a frequency distribution function towards a frequency recovery
function. The frequency distribution function is referred to as source IWF, Master or Server for TDM PW, PTP
or NTP respectively. For PTP or NTP, the frequency distribution function is referred to as packet master
clock and the frequency recovery function is referred to as packet slave clock.
[R-100] A CSG or other PE that complies with this specification MAY support frequency recovery
function. Note: In some cases the PE may also support a frequency recovery function. These
cases are for further study.
[R-101] The synchronization distribution network architecture MUST be per G.8265 [64].
[R-102] The CSG or other PE that implements a PTPv2 slave function SHOULD support a packet
slave clock function comply with the PTP Telecom Profile as defined in the ITU-T
Recommendations G.8265.1 [65].
12.2.1.4 NTP
The Network Time Protocol is another dedicated time distribution protocol which can be used also to transfer
frequency synchronization over packet networks. NTP can be used, for instance in the case of RAN
equipment with IP TNL (including LTE), to distribute frequency information to the radio base-station from
which its air interface transmission frequency would be derived. NTP is considered as a viable packet based
method for frequency distribution in G.8261 [63]. Being a higher-layer frequency distribution protocol, NTP is
sensitive to the network introduced PDV. NTP is defined in RFC 1305 (v3) [74] and RFC 5905 (v4) [75].
[R-103] The synchronization distribution network architecture MUST be per G.8265 [64].
[R-104] If a CSG or other PE supports NTP to deliver reference frequency signal to the base station
equipment in order to meet its air-interface transmission frequency accuracy requirements , then
only packet format and protocol MUST be according to RFC 5905 (v4) [75].
12.2.2 Encapsulation
The timing protocol mapping might depend on the specific transport layer. (e.g., in case of PTP this is
specified in G.8265.1 [65], i.e., IEEE 1588 [66] Annex D).
[R-105] A PE SHOULD support transport of timing packets as specified in section 8 of t TR-221 [1].
The encapsulation for the TDM PW is described in section 6.2 (TDM TNL Encapsulation) TR-221
[1].
Note: TDM-PW encapsulations are out of scope of this document. Appendix A TR-221 [1]provides
some examples of encapsulations for timing packets in the Mobile Backhaul Environment.
[R-106] A PE supporting G.8265.1 [65] MUST support PTP mapping per G.8265.1 [65], section 6.4
with the following change: “A master or a slave compliant with the profile described in this
Recommendation must be compliant with Transport of PTP over User Datagram Protocol over
Internet Protocol Version 4 IEEE 1588 [66] and must be compliant with Transport of PTP over User
Datagram Protocol over Internet Protocol Version 6 IEEE 1588 .”
12.5.1 Time and phase distribution with full timing support from the network
It can further be classified into the following 3 cases:
Case A: centralized PRTC co-located with Primary Reference Clock (PRC) In case A, the PRTC is co-
located with the PRC in the aggregation network (e.g., MASG), and may receive a frequency reference from
the PRC (the two functions may be integrated within the same equipment). The time synchronization
reference is then delivered from the PRTC via the packet master (T-GM) all along the mobile backhaul
network, down to the base station, using a time protocol such as IEEE 1588 PTPv2 [66].
Case B: centralized PRTC not co-located with PRC In case B, the PRTC is located in the aggregation
network (MASG), but not co-located with the PRC. The PRTC may receive the frequency reference from the
PRC. The time synchronization reference is then delivered from the PRTC via a packet master (T-GM) all
along the mobile backhaul network, down to the base station, using a time protocol such as IEEE 1588
PTPv2 [66].
Case C: PRTCs in access networks In case C, the PRTC is located in an access network; typically a GNSS
receiver is added to an access device. The PRTC may receive the frequency reference from the PRC. The
time synchronization reference is then delivered from the PRTC via a packet master (T-GM) all along the
mobile backhaul network, down to the base station, using a time protocol such as IEEE 1588 PTPv2 [66].
These packet based time and phase synchronization cases can be fulfilled by the mechanism and PTP
profile as defined in G.8275.1 [73]. The specific architecture is described in G.8275 [72] which allows the
distribution of phase/time with full timing support from the network, and is based on the second version of
PTP defined in IEEE 1588v2 [66]. That is, all of the nodes in the transmission path will provide timing support
by participating in the timing protocol, and the assumption is all the intermediate nodes are Telecom
Boundary Clocks (T-BC) with physical layer frequency support. The network limits are specified in G.8271.1
[67]. Note: work is ongoing concerning the inclusion of Telecom Transparent Clocks (T-TC) into the network
reference chain (T-TC is being defined in G.8273.3 [69]). The following requirements are needed to support
packet based time and phase synchronization:
[R-107] Time and phase distribution architecture MUST be per G.8275 [72]. Note: The PRTC
function may be incorporated within the MASG or other PE or implemented externally to it.
[R-108] A PE or P device that implements Telecom Boundary Clock (T-BC) function MUST support
T-BC timing characteristics as defined in the ITU-T Recommendations G.8273.2 [68].
[R-109] A CSG or other PE that implements Telecom Time Slave Clock (T-TSC) function MUST
support T-TSC timing characteristics as defined in the ITU-T Recommendations G.8273.2 [68].
[R-110] A CSG, PE or P device that implements packet based time and phase distribution MUST
support G.8275.1 [73] PTP protocol profile.
12.5.2 Time and phase distribution with partial timing support from the network
For some mobile backhaul networks, many nodes may not have timing synchronization capabilities. ITU-T
specifies synchronization architecture for a use case (case E in G.8275 Amendment 1 [71]) where
intermediate nodes do not provide timing support, but timing support is provided by GNSS at the network
edge, with PTP acting as a backup. This is called Assisted Partial Timing Support (APTS). The node
providing support at the edge of the network is called an Assisted Partial Timing Support Clock (APTSC).
The mechanism and PTP profile for time and phase distribution with partial timing support are further defined
in G.8275.2 [61]. Work is ongoing concerning the performance aspects. In particular, the network limits are
being addressed in G.8271.2 [60]and clock specification in G.8273.4 [70]. The following requirements are
needed to support time and phase synchronization with partial timing support from the network:
[R-111] Time and phase distribution architecture MUST be per G.8275 [72]case E. Note: The PRTC
function may be incorporated within the MASG or implemented externally to it.
[R-112] A MASG MUST support the T-BC-P with PTP protocol profile function as defined in
G.8275.2 [61]. Note: the performance of the clock to be used with the G.8275.2 [61]profile is under
study (G.8273.4 [70])
A CSG or other PE MUST support T-TSC-A with PTP protocol profile function as defined in the ITU-T
Recommendations G.8275 amd2 [61] . Specifically, section A.3.2 MUST be supported with the following
change: “A.3.2 Transport mechanisms required, permitted, or prohibited In this profile, a permitted transport
mechanism is Transport of PTP over User Datagram Protocol over Internet Protocol Version4 UDP/IPv4 as
per Annex D in IEEE 1588 V2 [66]. Bit 0 of the transportSpecific field defined in IEEE 1588 [66] must be set
to "0"; that field does not exist in IEEE 1588 [66]. In this profile, the required transport mechanism is
Transport of PTP over User Datagram Protocol over Internet Protocol Version 6 UDP/IPv6 as per Annex E in
IEEE 1588 [66].”
13 Network Virtualization
As depicted in Figure 5.1 of this document the scope of the document includes:
1. N3, N2 from the RAN to data and control networks
2. N6, N4 and N9 in case the UPF resides in the aggregation network
3. F1 interface DU-CU split option 2.
In addition, the scope is also covering only eMBB use only where the transport SLA requirements are not so
stringent.
Since the interfaces listed above are not changing regardless if virtualization is used or not, using
virtualization will not impact the transport.
14 4G to 5G migration scenarios
Following are 4G to 5G migration options:
Option 1. (SA) Current 4G network operation that connects LTE device to EPC
Option 2. (SA) Connects 5G NR device to 5G Core as defined in 3GPP R15
Option 5. (SA) Connects LTE device to 5G Core
From Transport perspective options 2 and 5 will require handling much higher rates for data interfaces.
Control and data interfaces will be carried as IP TNLs.
Option 2 is generally preferred by the industry e.g., as indicated by MEF 22.3.1 – Transport Services for
Mobile Networks [20].
The most important NSA option in the near term is called option 3 which collocates a gNB next to an eNB to
obtain the advantages of the NR air interface but without (yet) upgrading the core to the 5GC. This option
provides higher data rates for eMBB but not full 5G capabilities. In option 3 there is no direct connection
between the gNB and EPC, instead user and control data flow through the eNB via X2-U and X2-C
interfaces. Since this will overload the user plane capabilities of the collocated eNB, option 3A provides an
S1-U connection from gNB to EPC, obviating the X2-U but with the control traffic still over the X2-C. Option
3X has both X2 and S1 to enable load balancing.
Option 3x is generally preferred by the industry e.g., as indicated by MEF 22.3.1 – Transport Services for
Mobile Networks [20].
From Transport perspective both control and data interfaces will be carried as IP TNLs. The underlying
connectivity may be different between the collocated and non-collocated cases. For the collocated case the
X2 interface may be directly transported on a link connecting the eNB or ng-eNB and the gNB, or a CSG
may be used as a L2 switch or L3 router to provide this connectivity.
In option 3 and 3X the X2 interface will be used for control and also for data all in 4G rates.
In option 7 ng-eNB is the master and gNB connects via Xn interface. These too have variations (4, 4A, 7, 7A,
and 7X).
From Transport perspective both control and data interfaces will be carried as IP TNLs. The underlying
connectivity may be different between the collocated and non-collocated cases. For the collocated case the
X2 interface may be directly transported on a link connecting the eNB or ng-eNB and the gNB, or a CSG
may be used as a L2 switch or L3 router to provide this connectivity.
In option 4 and 7 the CSG needs to support higher BW since it carries more than one gNB/ng-eNB
interfaces.
Note: This is not an exhaustive list of models. It is assumed that there is a complete network
management framework that these fit into.
To set the tone for the models being referenced, YANG 1.1 and NMDA are useful and SHOULD be
supported:
The PE SHOULD support the following network management models according to the Category noted (e.g.,
If the PE supports the Sync Category, the corresponding models (i.e., IETF RFC 8575 ietf-ptp.yang)
SHOULD be supported as well):
ieee802-dot1q-cfm.yang
ieee802-dot1q-pb.yang
ieee802-dot1q-stream-filters-
gates.yang
ieee802-dot1q-tpmr.yang
ieee802-dot1q-tsn-types.yang
ieee802-dot1q-types.yang
[R-119] IEEE 802.1X-2020 Bridging IEEE Standard for • ieee802-dot1x-types.yang
(and Local and Metropolitan • ieee802-dot1x.yang
amendments) Area Networks—
Bridges and Bridged
Networks
Related to topology, the following provides a base set of topology related models:
• System Management
o RFC 7317: A YANG Data Model for System Management
ietf-system
• Security
o RFC 8341: Network Configuration Access Control Model
ietf-netconf-acm
• Alarm Management
o RFC 8632: A YANG Data Model for Alarm Management
ietf-alarms
• Notification Management
o RFC 8639: Subscription to YANG Notifications
ietf-subscribed-notifications
o RFC 8640: Dynamic Subscription to YANG Events and Datastores over NETCONF
o RFC 8641: Subscription to YANG Notifications for Datastore Updates
ietf-yang-push
• Monitoring of Management Protocol
o RFC 6022: YANG Module for NETCONF Monitoring
ietf-netconf-monitoring
• YANG Library
o RFC 8525: YANG Library
ietf-yang-library