Professional Documents
Culture Documents
LEGAL INFORMATION
By accepting this certain document of ZTE CORPORATION you agree to the following terms. If you
do not agree to the following terms, please notice that you are not allowed to use this document.
Copyright © 2018 ZTE CORPORATION. Any rights not expressly granted herein are reserved. This
document contains proprietary information of ZTE CORPORATION. Any reproduction, transfer,
distribution, use or disclosure of this document or any portion of this document, in any form by any
means, without the prior written consent of ZTE CORPORATION is prohibited.
and are registered trademarks of ZTE CORPORATION. ZTE’s company name, logo
and product names referenced herein are either trademarks or registered trademarks of ZTE
CORPORATION. Other product and company names mentioned herein may be trademarks or trade
names of their respective owners. Without the prior written consent of ZTE CORPORATION or the
third party owner thereof, anyone’s access to this document should not be construed as granting, by
implication, estopped or otherwise, any license or right to use any marks appearing in the document.
The design of this product complies with requirements of environmental protection and personal
security. This product shall be stored, used or discarded in accordance with product manual, relevant
contract or laws and regulations in relevant country (countries).
This document is provided “as is” and “as available”. Information contained in this document is
subject to continuous update without further notice due to improvement and update of ZTE
CORPORATION’s products and technologies.
ZTE CORPORATION
Address: NO. 55
Hi-tech Road South
ShenZhen
P.R.China
518057
Website: http://dms.zte.com.cn
Email: TSM.Aftersales@zte.com.cn
Revision History
Author
Document Version Date Prepared by Reviewed by Approved by
R1.0 2010-06-09 Wu Zhiliang Chen Qi
Abstract
Chapter Description
1 Network Basic Knowledge Introduces the basic concepts and the network terminologies.
2 Service Networking Analyzes the typical service networking solutions, to provide a
reference for service deployment.
3 Network Management Network Introduces several types of network management network.
4 IP Application Introduces the IP planning methods for different types of networking.
5 IP Configurations in BSS Introduces the IP configurations in BSS.
6 Network Configuration Introduces the commonly used network commands and the typical
network devices.
7 Further Understanding of the Introduces the basic configurations in different network
Scenarios environments.
8 Troubleshooting Introduces the commonly used fault examination methods for
failures in one site and multiple sites.
9 New Functions in R9 Introduces the IP related functions in R9.
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. III
IP Application Guide Internal Use Only▲
TABLE OF CONTENTS
1 NETWORK BASIC KNOWLEDGE...................................................................................1
1.1 ACRONYMS AND TERMS......................................................................................1
1.2 IP KNOWLEDGE......................................................................................................2
1.2.1 BASIC CONCEPT OF IP ADDRESS.............................................................2
1.2.2 IP ADDRESSES WITH SPECIAL PURPOSES..............................................3
1.2.3 PUBLIC IP ADDRESSES AND PRIVATE IP ADDRESSES...........................3
1.2.4 SUBNET MASK..............................................................................................4
1.3 UNDERSTANDING OF SWITCH ROUTING...........................................................6
1.3.1 L2 SWITCHING NETWORK..........................................................................6
1.3.2 L3 ROUTING NETWORK..............................................................................7
1.4 DETAIL INTRODUCTION OF DATA ROUTING.......................................................8
1.4.1 PRINCIPLES OF ROUTING..........................................................................8
1.4.2 ROUTING PROTOCOLS...............................................................................9
1.4.3 ROUTING ALGORITHMS............................................................................12
1.4.4 INTRODUCTION TO HSRP AND VRRP......................................................13
2 SERVICE NETWORKING...............................................................................................15
2.1 TYPICAL ABIS INTERFACE NETWORKING........................................................15
2.1.1 NETWORKING WITHOUT VLAN................................................................16
2.1.2 NETWORKING WITH VLAN........................................................................17
2.1.3 VRRP (HSRP) NETWORKING....................................................................19
2.2 TYPICAL A INTERFACE NETWORKING..............................................................21
2.3 TYPICAL GB INTERFACE NETWORKING...........................................................23
2.4 OMCB NETWORK ARCHITECTURE....................................................................23
2.4.1 OMCB NETWORK STRUCTURE................................................................23
2.4.2 OMCB ROUTING DESCRIPTION...............................................................24
2.5 IPOVERE1 NETWORKING...................................................................................26
4 IP APPLICATION.............................................................................................................31
4.1 IP ADDRESS PLANNING......................................................................................31
4.1.1 SERVICE ADDRESS PLANNING................................................................31
4.1.2 NETWORK MANAGEMENT ADDRESS PLANNING..................................36
4.1.3 BASE STATION ADDRESS PLANNING......................................................36
4.1.4 IP OVER E1 ADDRESS PLANNING............................................................43
4.2 ROUTING CONFIGURATION................................................................................43
4.2.1 ABIS INTERFACE ROUTING......................................................................43
4.2.2 A INTERFACE ROUTING............................................................................44
4.2.3 GB INTERFACE ROUTING.........................................................................45
4.3 REMOTE LMT........................................................................................................46
4.4 CASE INTRODUCTION.........................................................................................46
4.4.1 TOPOLOGY OF THE SERVICE NETWORK...............................................47
4.4.2 TOPOLOGY OF THE MANAGEMENT NETWORK.....................................60
5 IP CONFIGURATIONS IN BSS.......................................................................................66
5.1 RPU CONFIGURATION.........................................................................................66
5.1.1 ABIS INTERFACE........................................................................................66
5.1.2 A INTERFACE..............................................................................................67
5.1.3 GB INTERFACE...........................................................................................69
5.2 INTERFACE BOARD CONFIGURATION..............................................................70
5.2.1 ABIS INTERFACE........................................................................................70
5.2.2 A INTERFACE..............................................................................................71
5.2.3 GB INTERFACE...........................................................................................72
5.3 ROUTE CONFIGURATION....................................................................................73
5.4 SDR CONFIGURATION.........................................................................................73
5.5 SEVERAL KEY POINTS........................................................................................78
6 NETWORK CONFIGURATION.......................................................................................80
6.1 NETWORK DEVICE INTRODUCTION..................................................................80
6.1.1 MAIN NETWORK DEVICES FROM CISCO................................................80
6.1.2 COMMONLY USED NETWORK DEVICES FROM ZTE..............................82
6.2 COMMONLY USED NETWORK COMMANDS IN WINDOWS.............................85
6.2.1 PING.............................................................................................................85
6.2.2 NETSTAT......................................................................................................87
6.2.3 IPCONFIG....................................................................................................88
6.2.4 ARP..............................................................................................................89
6.2.5 TRACERT.....................................................................................................90
6.2.6 ROUTE.........................................................................................................90
6.3 COMMONLY USED NETWORK COMMANDS IN LINUX.....................................91
6.3.1 PING.............................................................................................................91
6.3.2 TRACEROUTE.............................................................................................91
6.3.3 IFCONFIG....................................................................................................91
6.4 COMMONLY USED COMMANDS IN SWITCHES................................................93
6.4.1 COMMANDS IN CISCO SWITCHES...........................................................93
6.4.2 COMMANDS IN ZTE 2000 SERIES OF SWITCHES..................................97
6.5 INTEGRATED CONFIGURATION.........................................................................98
6.5.1 NETWORKING CASE..................................................................................98
6.5.2 MAIN CONFIGURATION OF 6513..............................................................99
8 TROUBLESHOOTING...................................................................................................114
8.1 TROUBLESHOOTING FOR LINK TRANSMISSION FAULTS.............................114
8.2 TROUBLESHOOTING FOR COMMON NETWORK FAULTS.............................116
8.3 TROUBLESHOOTING FOR NETWORK DEVICE PROBLEMS..........................118
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. VII
IP Application Guide Internal Use Only▲
FIGURES
Figure 2-1 Networking Without VLAN............................................................................................16
Figure 2-2 Networking with VLAN..................................................................................................17
Figure 2-3 VRRP (HSRP) Networking...........................................................................................19
Fiture 2-4 A Interface Networking...................................................................................................21
Figure 2-5 OMCB Networking........................................................................................................23
Figure 2-6 OMCB Routed Networking...........................................................................................24
Figure 2-7 Networking Diagram.....................................................................................................27
Figure 3-1 OMCR Subnet..............................................................................................................28
Figure 3-2 OMCB Subnet..............................................................................................................28
Figure 3-3 EMS Subnet.................................................................................................................29
Figure 3-4 Use of VLAN to Segregate Subnets.............................................................................30
Figure 3-5 Multi-Functional Management Network........................................................................31
Figure 4-1 RPU Address................................................................................................................33
Figure 1-4 IP Address/RPU Address..............................................................................................36
Figure 4-5 Typical Base Station Networking-1...............................................................................37
Figure 4-6 Networking for Abis Interface Routing..........................................................................43
Figure 4-7 Networking for A Interface Routing...............................................................................44
Figure 4-8 Networking for Gb Interface Routing............................................................................45
Figure 4-9 Remote LMT Networking..............................................................................................46
Figure 4-10 Network Topology of the BMI Equipment Room.........................................................61
Figure 4-11 Core Switching Network for Interconnection of Two Equipment Rooms....................62
Figure 4-12 Interconnection Between BSC and RAN2950............................................................63
Figure 5-1 Configuration of Virtual Address for RPU on the Abis Interface...................................65
Figure 5-2 Configuration of Virtual Address for Control Plane RPU on the A Interface.................67
Figure 5-3 Configuration of Virtual Address for User Plane RPU on the A Interface.....................68
Figure 5-4 Configuration of Virtual Address for RPU on the Gb Interface.....................................69
Figure 5-5 Configuration of Real Address for IPBB Board on the Abis Interface..........................70
Figure 5-6 Configuration of Real Address for IPI Interface Board on the A Interface....................71
Figure 5-7 Configuration of Real Address for IPGB Interface Board on the Gb Interface.............72
Figure 6-3 Front Panel of ZXR10 3906/3206.................................................................................83
Figure 6-4 Front Panel of ZXR10 3952/3252.................................................................................83
Figure 6-5 Front Panel of ZXR10 3928/3228.................................................................................83
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. VIII
IP Application Guide Internal Use Only▲
TABLES
Table 1-1 Frequently-usded Used Terms.........................................................................................1
Table 1-2 Class of IP Addresses......................................................................................................3
Table 1-3 Private IP Addresses........................................................................................................4
Table 1-4 Administrative Distances of Routing Protocols...............................................................12
Table 2-1 Main Configuration Requirements-1..............................................................................19
Table 2-2 Main Configuration Requirements-2..............................................................................21
Table 2-3 Configuration Requirements for Connection Between iBSC and the OMCB Server.....23
Table 4-1 Subnets and Number of Usable IP Addresses...............................................................41
Table 4-2 Routing of BSC-1...........................................................................................................44
Table 4-3 Routing of Router-1........................................................................................................44
Table 4-4 Routing of BSC-2...........................................................................................................45
Table 4-5 Routing of Router -2.......................................................................................................45
Table 4-6 Routing of BSC-3...........................................................................................................45
Table 4-7 Route Planning at the BSC............................................................................................53
Term Description
It is short for Fast Ethernet.
BSC supports FE electrical interfaces. There are four FE interfaces led out
FE from RMNIC (the rear board of GIPI). The interfaces are in the type of
100Base-TX, which complies with the IEEE 802.3u standard.The RJ45
connector and CAT-5 Unshielded Twisted Pair (UTP) cable are used. The
longest transmission distance is 100m.
It is short for Gigabit Ethernet.
BSC supports GE electrical interface or GE optical interface. There is one GE
electrical interface led out from RGER (the rear board of GIPI), and one GE
optical interface led out from the front panel of another GIPI. One GIPI board
cannot provide both GE electrical interface and GE optical interface at the
same time.
GE The optical interface is in the type of 1000Base-LX, which complies with the
IEEE 802.3z standard. The SFP (LC) connector and 1310nm single-mode
fiber are used. The longest transmission distance is 10km (the output power
is from -9.5 to -3dBm, and the sensitivity is less than -20dBm).
The electrical interface is in the type of 1000Base-T, which complies with the
IEEE 802.3ab standard. The RJ45 connector and CAT-5 Unshielded Twisted
Pair (UTP) cable are used. The longest transmission distance is 100m.
It is short for Spanning Tree Protocal.
STP
It is used to prevent network loop in the L2 network.
NAT It is short for Network Address Translation.
It is the L2 switching network with only the equipment and terminals in L2
L2 Network
network.
L2 Port It is the port connected with the switch, that is, switchport.
L3 Network It is the L3 switching network with the equipment in L3 network.
L3 Port It is the port connected with the switch, that is, no switchport.
It refers to the physical interface of the network equipment. Unless otherwise
Port
specified in this document, interface and port have the same meaning.
External It usually refers to the external visible interface with one or multiple IP
Interface address(es).
It refers to the physical interface of a interface board, such as the FE interface
Real Interface
and the GE interface of the GIPI board.
It refers to the logical interface of an internal processing board, the virtual
Virtual
address of which should be disclosed, such as the logical interface configured
Interface
on RPU.
1.2 IP Knowledge
1×27+1×26+0×25+0×24+0×23+0×22+0×21+0×20=192
The following three units can be converted in the same method as that of the first one.
Their corresponding binary values are as follows:
1×27+0×26+1×25+0×24+1×23+0×22+0×21+0×20=168
0×27+0×26+0×25+0×24+1×23+0×22+0×21+0×20=8
0×27+1×26+0×25+1×24+0×23+0×22+0×21+0×20=80
Therefore, in the format of the dotted decimal notation, the above IP address should be
192.168.8.80, which is much easier to be read and written than the string of 0s and 1s.
Besides, IP address must be in a range. For each unit of an IP address is one byte (8
bits), the value of each unit must be in the range between 0 and 255 (including 0 and
255). That is, when the 8 bits are all 0, the unit has the minimum value 0; when the 8 bits
are all 1, the unit has the maximum value 255. Therefore, each IP address must be in
the range between 0.0.0.0 and 255.255.255.255.
An IP address is divided into two parts: network identifier (address) and host identifier
(address). The network identifier is used to identify a specific network, and the host
identifier is used to identify a specific host in this network. To make it easier to
understand, we can say that the network identifier is like the area code, and the host
identifier is like user’s phone number.
Classification of the network identifier and the host identifier can be fixed, but if we fix
certain digits of the IP address as the network identifier or host identifier when assigning
IP addresses, the following two problems may occur:
1. Due to network expansion or upgrade, there may be too many hosts in the network.
As a result, the assigned IP addresses may be insufficient.
2. There may be only some hosts in the network, for example, just less than twenty
computers in the network, but are assigned with several thousand host addresses.
This is apparently a waste of IP addresses.
To solve the above problems and efficiently utilize the limited IP addresses, we classify
IP addresses into the following five classes according to their first several digits:
Note: This is mainly applicable to IPv4. IPv4 is the fourth version of the IP protocol. In
this version, addresses are coded with 32 bits.
Not all the IP addresses mentioned above are available. Some IP addresses are
reserved for special purposes.
Network address: It refers to the IP address whose digits in the host ID are all
0. For example, 202.206.0.0 is a network address in Class B.
Broadcasting address: It refers to the IP address whose digits in the host ID are
all 1. For example, 202.206.255.255 is a broadcasting address of Class B.
Reserved address: Network ID cannot start with 127 in decimal form. For
addresses of Class A, 127 is reserved for network diagonosis. For example,
127.0.0.1 is used for loop test. Meanwhile, the first eight bits of a network ID
cannot be set to all 0s, otherwise it refers to the local network. IP addresses
whose network ID is composed of all 0s and 1s are reserved.
IP addresses that can route globally are called public IP addresses, and dedicated IP
addresses are called private IP addresses. Not all the IP addresses can be used in the
Internet. Normally, those IP addresses that can be used in the Internet are called public
IP addresses, while the other IP addresses are called private IP addresses. Internet
Table Network address: It refers to the IP address whose digits in the host ID are all 0. For
example, 202.206.0.0 is a network address in Class B. -3 Private IP Addresses
The subnet that Microsoft Windows APIPA (Automatic Private Internet Protocol
Addressing) uses to automatically assign IP addresses is 169.254.0.0 -
169.254.255.255.
The number of digits in a subnet mask is contingent on the potential number of subnets
and the number of hosts in each subnet. Therefore, before defining a subnet mask, we
must know clearly the number of subnets and hosts.
example, we may need 12 subnets now, but may expand that to 16 in the future. In
this case, we use the first four bits of the third byte to define the subnet mask, and
set them to “1” (that is, take the latter four bits of the third byte as the host bits.
Actually, there is a simple rule here: if the first n bits of the host ID are set to “1”, the
original network will be separated into 2n networks. In this case, the original network
is separated into 24 (16) subnets). So, the third byte becomes “11110000”, and we
call it a new binary subnet mask.
3. Set the bits of the original network ID to “1”. In this case, we set the first two bytes
to “1” and the fourth byte to “0”; the dotted binary format of the subnet mask
becomes: “11111111.11111111.11110000.00000000”.
4. Convert this number to the dotted decimal format, and it becomes “255.255.240.0”.
For IP addresses without subnets, we can notate the mask with 0 as its host ID.
Take IP address 210.73.140.5 as an example; its mask is 255.255.255.0. Or
you can use the default mask and only enter the IP address.
Notation for IP addresses with subnets
When there are subnets, the IP address and the mask must be consistent.
Take addresses of Class C as an example:
i. The first three bytes in an IP address form the network ID; the latter one
indicates both the subnet ID and the host ID, and it can also indicate whether
the two IP addresses are in the same subnet. If they are in the same subnet,
no router needs to be involved in the information exchange between the two
addresses. If they are not in the same subnet, that is, their subnet IDs are
different, information exchange between the two addresses must be
performed through a router. For example, for a host whose IP address is
210.73.140.5, its host ID is 00000101; and for a host whose IP address is
210.73.140.16, its host ID is 00010000. The first three bits in both host IDs
are 000, which indicates that the two IP addresses are in the same subnet
and information exchange between the two hosts does not need to be
conducted through the router. The host ID of 210.73.60.1 is 00000001, and
the host ID of 210.73.60.252 is 11111100; the two host IDs vary in the first
three bits; this indicates that the two IP addresses are in different subnets,
and their information exchange needs to be conducted through the router;
and their host IDs in the subnets are 1 and 252 respectively.
ii. The mask is to used to indicate the existence and quantity of subnets. But
the quantity of subnets can only be shown as a range, but not a specific
number. Mask does not convey the specific subnet ID, but it has the subnet
mask format (for addresses of Class C).
iii. Use the /N notation. N ranges from 0 to 32. Mapping between this notation
and the above notations are as follows:
Number of Available IP
Subnet Mask Short Form Addresses
255.255.255.252 /30 2
255.255.255.248 /29 6
255.255.255.240 /28 14
255.255.255.224 /27 30
255.255.255.192 /26 62
255.255.255.128 /25 126
255.255.255.0 /24 254
255.255.254.0 /23 510
255.255.252.0 /22 1022
255.255.248.0 /21 2046
255.255.240.0 /20 …
255.255.224.0 /19 …
255.255.192.0 /18 …
255.255.128.0 /17 …
255.255.0.0 /16 …
… /N 2(32-N)-2
1.3.1.1 HUB
HUB physically connects several terminals together, but it cannot segregate broadcast
domains from collision domains. Currently, we seldom see HUB in the market, and the
so-called HUB is actually a PBX (Private Branch eXchange).
1.3.1.2 Switch
A switch works in the second layer, which is the link layer in the OSI model. It forwards
frames to provide transparent communication between the networks it connects. Before
a switch forwards a frame, it judges whether the frame should be forwarded and which
port the frame should be forwarded to, according to the source address and destination
address in the frame. The addresses in the frame are called MAC addresses or
“hardware” addresses, and they are normally the addresses carried by the network
adapter.
The switch is used to interconnect two or multiple networks and provide transparent
communication. Devices on the networks will not notice the existence of the switch, and
the communication between them is as convenient as that in one network. Because a
switch only forwards frames, it can only connect identical or similar networks (the frames
are in the same or similar structures). For example, it can connect different Ethernets, or
Ethernet and token ring. For networks of different types (with different frame structures),
such as Ethernet and X.25, the switch is useless.
Switches can expand network size and improve network performance, which brings a lot
of convenience for network application. In the previous networks, switches were widely
used. But switch interconnection has also brought some problems: one of them is
broadcasting strom. Switches do not block broadcast messages in the network. If the
network is big (several switches, and multiple Ethernet segments), they may cause
broadcasting strom. In that case, the whole network will be crammed with broadcast
messages, or even collapse. The second problem is that when connecting with the
external network, switches will take the internal network and the external network as a
whole; and both the internal and the external network will automatically open their
network resources to each other, which is apparently unacceptable. The root cause of
the problems is that switches only facilitate network communication, and they do not
care about what information is transmitted.
Switches cannot forward data between different subnets. They only provide
communication for devices under the same subnet.
Router interconnection is related to the network protocols, and the description below is
only limited to the TCP/IP network.
A router works in the third layer of the OSI model, that is, the network layer. It uses the
“logical” network address (i.e. IP address) defined in the network layer to distinguish
different networks, and realize the interconnection and segregation of the networks so as
to maintain the independence of each network. A router does not forward broadcast
messages; instead, it will confine the broadcast messages to their own networks. Before
data is sent to another network, it will first be sent to the router, and then forwarded by
the router.
IP routers only forward IP packets, and will block other packets (including the broadcast)
and confine them to their own networks, so as to maintain the relative independence of
each network. In this way, a large network with multiple subnets connected with each
other will be formed. This interconnection is on the network layer. So, routers can
conveniently connect networks of different types, as long as they all use the IP protocol
on the network layer.
Devices in the network use their network addresses (IP addresses in the TCP/IP
network) to communicate with each other. IP addresses are “logical” addresses, which is
irrelevant to hardware addresses. Routers forward data based on the IP address. An IP
address has two parts: one part defines the network ID, and the other part defines the
host ID within a network. Currently, Internet uses the subnet mask to distinguish the
network ID and the host ID in an IP address. A subnet mask has 32 bits, which is the
same as an IP address; and the 32 bits in the subnet maks are one-to-one mapped to
the 32 bits in the IP address. As specified by the rule, for bits in the subnet mask whose
values are all “1”, their corresponding part in the IP address is the network ID; for bits in
the subnet mask whose values are all “0”, their corresponding part in the IP address is
the host ID. The network ID and the host ID together constitute an IP address. For IP
addresses of hosts in the same network, their network IDs must be the same, and this
network is called an IP subnet.
Communication can only be conducted between IP addresses that have the same
network ID. To communicate with a host of another IP subnet, the current host must
send its data to a router or gateway in the same network first. IP addresses with different
network IDs cannot communicate directly with each other, even if they are connected
together.
A router has multiple ports used to connect multiple IP subnets. The network ID in the IP
address of each port must be the same as the network ID of the IP subnet it connects to.
Different ports have different network IDs, and connect with different IP subnets. In this
way, hosts of different subnets can send IP packets to the router via their IP addresses.
Routers enable data forwarding between different subnets. Therefore, the interface IP
addresses must be in different subnets.
When a host in an IP subnet sends an IP packet to another host in the same IP subnet, it
will directly send the IP packet to the network, and the target host will receive it. But if
this host wants to send the IP packet to a host in another IP subnet, it must select a
router that can reach the target subnet and send the packet to this router first, and the
router will send the IP packet to the destination. If such a router is not found, the host will
send the IP packet to a router called “default gateway”. “Default gateway” is a
configuration parameter in each host; it is an IP address connected with a port of a
router in the same network.
When a router forwards an IP packet, it will select an appropriate port only based on the
network ID of the target IP address, and then send out the IP packet. The same as the
host, the router will also judge whether the port connects to the target subnet. If the port
does connect to the target subnet, the router will directly send the packet to the network
through the port; otherwise, the router will let the next router transmit the packet. A router
also has its default gateway used to transmit IP packets with unknown destinations. In
this way, IP packets with clear destinations will be correctly forwarded by the router; IP
packets with unknown destinations will be sent to the default gateway. After levels of
transmission, IP packets will finally reach the destination; packets that cannot reach the
destination will be discarded by the network.
The routing action includes two basic activities: routing and forwarding. Routng means to
find the best route to the destination, and it is realized by the routing algorithm. Routing
involves different routing protocols and routing algorithms, so it is more complicated. To
find the best route, the routing algorithm must be started and the routing table that
contains the route information must be maintained. The route information may differ with
different routing algorithms. The routing algorithm inputs the collected information into
the routing table, and it will tell the router the relationship between the destination
network and the next hop according to the routing table. Different routers communicate
with each other to update the routes and the routing table, so that the routing table can
correctly reflect the network topology changes. Then the router will determine the best
route based on some measures. This is the routing protocol, such as the Routing
Information Protocol (RIP), the Open Shortest Path First (OSPF) protocol, and the
Border Gateway Protocol (BGP).
Forwarding means to transmit packets along the best route that has been found. The
router will first search in the routing table, to see whether there is a route to send the
packet to the next hop (router or host). If the router does not know how to send the
packet, normally it will discard this packet; otherwise, it will send the packet to the next
hop according to the corresponding entries in the routing table. If the destination network
is directly connected with the router, the router will directly send the packet to the
corresponding port. This is the routed protocol.
The routed protocol and the routing protocol are two associated but independent
concepts. The former one uses the routing table maintained by the latter one;
meanwhile, the latter one needs to use functions provided by the former one to release
the data packets.
There are two typical routing methods: static routing and dynamic routing.
Static routing means to set a stationary routing table in the router. Unless the
network administrator interferes, the static routing will not change. Because
static routing cannot react to network changes, it is normally used in networks
with small size and fixed topology structure. The advantages of static routing lie
in its simplicity, high efficiency, and good reliability. Among all types of routing
methods, static routing has the highest priority. When dynamic routing conflicts
with static routing, static routing comes first.
Dynamic routing refers to the process in which routers communicate with each
other to transfer route information and use the received route information to
update the routing table. It can adapt to network structure changes in real time.
If the route update information indicates that the network change occurs, the
routing software will re-calculate the routes and send the new route update
information. This information will pass through every network. Consequently, all
routers concerned will restart their routing algorithms and update their routing
tables, to dynamically reflect network topology changes. Dynamic routing
applies to networks with big size and complicated topology structure. However,
all dynamic routing protocols will occupy network bandwidth and CPU
resources to different extent.
Static routing and dynamic routing have their unique features and applicable scopes.
Therefore, dynamic routing is often used as a complement to static routing. When a
packet is routed in the router, the router will first search for a static route. If a static route
is found, it will forward the packet along this static route; otherwise, it will search for a
dynamic route.
Based on whether the dynamic routing is used within one autonomous domain or not,
the dynamic routing protocols can be divided into Interior Gateway Protocol (IGP) and
Exterior Gateway Protocol (EGP). Hereby the autonomous domain refers to a network
with a common governance entity and routing policy. Routing protocols used in an
autonomous domain are called Interior Gateway Protocols, and the frequently-used ones
are RIP and OSPF. The Exterior Gateway Protocol is mainly used in the routing among
multiple autonomous domains, and the frequently-used ones are BGP and BGP-4. The
following sections will describe them one by one.
The RIP protocol was first designed for the Xerox parc general protocol of the Xerox
network system, and it is now the most frequently-used routing protocol in the Internet.
RIP adopts the distance vector algorithm, that is, the router selects the route according
to the distance. Therefore, this protocol is also called the Distance Vector Protocol. The
router collects different paths that can reach a destination, and saves the paths with the
minimum number of hops for each destination. Except for the optimal path to a
destination, all the other information will be discarded. Meanwhile, the router will use the
RIP protocol to inform its neighboring routers of the route information it has collected.
Thus, the correct route information will gradually spread to the whole network.
RIP is widely used. It is simple, reliable, and easy to configure. But RIP only applies to
small homogeneous networks. The maximum number of hops it allows is 15; therefore,
any destination with more than 15 hops will be marked with “unreachable”. Besides,
RIP’s route information broadcast will repeat every 30 seconds, which is a major element
that causes broadcast storm.
In the mid 1980s, RIP could not adapt to the interconnection of large heterogeneous
networks, and OSPF came into being consequently. It is a routing protocol developed by
the IGP work group of the Internet Engeneering Task Force (IETF) for IP networks.
OSPF is a routing protocol based on the link status, and each router needs to send link
status broadcast to all the other routers in the same management domain. The OSPF
link status broadcast contains all the interface information, all the measures, and some
variables. Routers adopting OSPF must collect related link status information first, and
then calculate the shortest path to each node based on certain algorithms. For routing
protocols based on the distance vector, routers send route updates only to their
neighboring routers.
Different from RIP, OSPF further divides an autonomous domain into areas.
Consequently, there are two types of routing: when the source and the destination are in
the same area, intra-area routing is adopted; when the source and the destination are in
different areas, inter-area routing is adopted. This has greatly reduced the network
overhead and increased network stability. In case a router in one area fails, routers in
other areas of the autonomous domain can still work. This also brings convenience for
network management and maintenance.
BGP is an exterior gateway protocol designed for the TCP/IP Internet. It is used among
multiple autonomous domains. It is based on neither the pure link status algorithm, nor
the pure distance vector algorithm. Its main function is to exchange network accessibility
information with BGP of other autonomous domains. Different autonomous domains can
run different interior gateway protocols. The BGP updates contain the paired information
of network ID/autonomous domain path. The autonomous domain path specifies the
string of intermediate autonomous domains before a packet reaches the destination
network. The updates are transmitted via TCP, to ensure the reliability of transmission.
To meet the requirements of the expanding Internet, BGP is also under continuous
development. In the latest BGP4, similar routes can be merged into one route.
In one router, the static routing and one or more types of dynamic routing can be
configured at the same time. Their routing tables are all provided to the forwarding
program. But the routing table entries may conflict with each other. To solve this problem,
you can configure the priorities of each routing table. The priorities are measured by
administrative distances. The shorter the administrative distance is, the higher the
priority becomes.
Table Network address: It refers to the IP address whose digits in the host ID are all 0. For
example, 202.206.0.0 is a network address in Class B. -4 Administrative Distances of Routing
Protocols
Besides, the administrative distance of direct connection is 0, and the priority is the
highest.
The routing algorithm plays a critical role in a routing protocol. The algorithm adopted
can often determine the routing result. Therefore, the routing algorithms must be
selected carefully. Normally, the following design objectives need to be considered:
Optimality: The algorithm should have the ability to select the optimal route.
Conciseness: The algorithm should be concise, using the minimum number of
software and overhead, but providing the most effective functions.
Stability: The routing algorithm should work normally in exceptional or
unexpected environment, such as hardware failure, overload, and
misoperations. Routers are distributed on the connecting points of the network;
so if they fail, several problems will be caused. Good routing algorithms can
work normally for a long time, and can be proved reliable in different network
environments.
Fast convergence: Convergence is the process in which all routers come to the
same conclusion in terms of the optimal route selection. When a network event
triggers the route selection, the router will send the update information. The
updates will spread to the whole network, and trigger re-calculation of the
optimal route. Finally all routers will get to the same conclusion in terms of the
optimal route selection. Slowly convergent routing algorithms will cause routing
loops or network disconnection.
Flexiblity: The routing algorithm can quickly and correctly adapt to various
network environment. For example, when a subnet fails, the routing algorithm
should quickly detect this failure, and select another optimal route for all routers
that use this subnet.
Routing algorithms can be divided into the following types: static and dynamic, single
route and multiple routes, equal and hierarchical, source routing and transparent routing,
intra-domain and inter-domain, as well as link status and distance vector. Here we will
focus on the link status and the distance vector algorithms.
In the link status algorithm (also called the shortest path algorithm), routers will send the
route information to all the nodes in the Internet. But each router only sends the part in
its routing table that describes its own link status. The distance vector algorithm (also
called the Bellman-Ford algorithm) requires each router to send all or part of the
information in its routing table, to the neighboring nodes only. Therefore, the link status
algorithm sends a small portion of update information to the entire network, while the
distance vector algorithm sends a large portion of update information to the neighboring
routers.
For the link status algorithm converges more quickly, to some extent, it has lower
possibility to cause routing loops than the distance vector algorithm. But on the other
hand, the link status algorithm requires stronger CPU capabilities and more memory
spaces than the distance vector algorithm. So, the link status algorithm is more
expensive in implementation. Except these differences, the two algorithms can both work
well in most environments.
The last point to be noted is that routing algorithms use mnay different measures to
determine the optimal route. A complex routing algorithm may use multiple measures to
select the route; it will combine these measures into a composite measure through
weighted calculations, and then input it into the routing table as the routing criteria. The
commonly used measures include: length of the path, reliability, delay, bandwidth, load,
and communication cost.
the default gateway (Router A), once Router A fails, Host A cannot access Host
B.
HSRP can solve the above problem. Multiple routers compose a standby group
(Router A and Router B). From Host A’s perspective, this standby group is a
virtual router with a virtual IP address of its own. Host A uses this virtual router
as the gateway (set with a virtual IP address). In the standby group, there is an
active router (for example, Router A), and it does the work for the virtual router,
such as forwarding the data packets that the host sends to the virtual router;
and Router B acts as the backup router. When Router A fails, backup Router B
will take over the work of the active router and forward data packets that the
host sends to the virtual router. This process is transparent to Host A, because
Host A only sees the virtual router.
The HSRP protocol sets the working mechanism for the standby group, to
realize the above backup function.
HSRP applies to LANs with multicast or broadcast capabilities (such as the
Ethernet).
HSRP is used for router hot standby in broadcast or multicast LANs, and it suits
for static route configuration. Actually, what HSRP targets at is exactly the
problem that equipment cannot dynamically adapt to route changes.
Implementation of HSRP
When HSRP is used, what users can see is a virtual router. This virtual router
has its own virtual IP address and virtual MAC address. It consists of a group of
routers, which is called a standby group. The standby group includes an active
router, a backup router, and the other member routers. Once the active router
fails, the backup router will become the active router, and another router in the
standby group will be selected as the new backup router.
Routers in the standby group judge whether the active router is working well by
receiving the HELLO packet periodically sent by the active router. If the backup
router R has not received the active router’s HELLO packet in a certain period,
it will suppose that the active router fails. In this case, the backup router
becomes the new active router. The backup router is also generated in this
way. Thus, there will always be an active router and a backup router in the
standby group.
HSRP and VRRP
HSRP and VRRP (Virtual Router Redundancy Protocol) are both router
standby protocols, and most of their functions are the same. From users’
perspective, they mainly differ in the following ways:
HSRP does not support the setting of the real interface address as the
virtual gateway (virtual router) address, but VRRP does. Thus, VRRP
only needs two IP addresses at the minimum, while HSRP needs three
IP addresses at the minimum. An HSRP group containing two members
must use three addresses: each router has an actual IP address, and the
HSRP group has a virtual IP address; however, a VRRP group
containing two members only needs two IP addresses: the interface IP
address of the master device is the virtual IP address of the VRRP
group; when the master device is down, the backup device will take over
this IP address. But of course, VRRP can also use three IP addresses,
just the same as HSRP: two actual addresses, and one virtual address,
that is, the interface IP address of the master device differs from the
virtual IP address. For VRRP, only when the virtual IP address is the
same as the interface IP address of the master device, can ARP queries
made to the virtual IP address be responded to; therefore, when the
virtual IP address is different from the interface IP address of the master
device, the virtual IP address cannot be pinged through. However, for
HSRP, the virtual IP address of the HSRP group can be pinged through.
HSRP takes the UDP packet as the bearer for its own packets, while
VRRP normally takes the TCP packet as the bearer. VRRP can provide
the traffic load sharing function. Although HSRP can assign different
subnets to different HSRP groups through planning, and define the
master router in each HSRP group by using different priorities for the two
switches or routers to share the traffic between the two routers. It cannot
realize traffic load sharing in one subnet (that is, in one HSRP group). On
the contrary, VRRP can realize this function.
2 Service Networking
When the Abis interface uses the L2 switch to connect with the L2 switching network,
GIPI adopts the backup mode. The main configuration requirements are as follows:
Item Configuration Requirement
BSC Board The resource frame should be configured with GIPI boards with the
Configuration Abis interface, and the GIPI boards are in the backup mode.
The active and the standby GIPI boards should be connected with
Cable Connection
the same switch.
When the network between BTS and BSC has VLANs, the switch connecting the L2
switching network and BSC is an L3 switch. GIPIs are in the load sharing mode. The
typical networking is as shown above. The main configuration requirements are as
follows:
Item Configuration Requirement
The resource frame should be configured with GIPI boards of the
BSC Board Abis interface, and the GIPI boards are in the load sharing mode. (If
Configuration they adopt the backup mode, it is mandatory to use the networking
described in “2.1.3VRRP (HSRP) Networking”.)
Each resource frame must be connected with two switches at the
Cable Connection
same time.
(1) When BSC is connected with the switch via the FE electrical
interface, both sides should be set to the forced 100Mbps full-
duplex mode.
(2) When BSC is connected with the switch via the GE electrical
interface, both sides should be set to the adaptive negotiation
mode.
(3) When BSC is connected with the switch via the GE optical
Physical Interface interface, both sides should be set to the forced 1000Mbps full-
Configuration duplex mode.
Ports of the switch that are connected with BSC should be all set to
L3 ports (no switchport).
Ports of the switch that are connected with BTS should be all set to
the trunk mode (dot1q encapsulation). VLAN IDs can be configured
as per the actual requirements. To realize traffic balance, it is
suggested that each port create two VLANs.
VLAN Interface
Create a VLAN interface for each VLAN.
Configuration
Ports on the switch that are connected with BSC should be
configured with different subnet IP addresses, and they cannot be in
the same subnets with the ports that are connected with BTS. The
IP Address suggested subnet mask is 255.255.255.252.
The IP address of a VLAN interface should be the gateway address
of the BTS within this VLAN.
Static routes to all BTSs should be configured on BSC. The routing
entries should be concise; subnets that can be merged should be
merged into one big subnet routing entry.
Downlink Route For each destination IP address (routed to BTS) on BSC, the next
Configuration hop of its static route should be the IP address of the interface on the
switch. If the number of interfaces on the switch is N, the number of
next hops with the same priority should also be N (that is, downlink
packets can pass through any active GIPI to the switch).
The switch should be configured with static routes to the following
addresses: BSC service IP address and signaling IP address. For the
Uplink Route
same destination IP address, the next hops configured on each
Configuration
switch should include the interfae IP addresses of all GIPIs that are
directly connected with it.
1. Between the L2 switching network and BSC, two L3 switches are used. They
are mutual backups for each other in terms of VLAN communication. (Suppose
there are four VLANs in the network, and we configure two VLAN sub-
interfaces as the gateways of the base station for both switch 1 and switch 2.
When switch 1 fails, the two gateway addresses on it will shift to switch 2.
Therefore, the traffic of two VLANs that was previously forwarded by switch 1
will then be forwarded by switch 2, and vice versa.)
2. Between the L3 switches and BSC, static routing is enabled.
3. Between the two switches, dynamic routing protocol is enabled (the OSPF
protocol is recommended). When the link between one switch and BSC breaks,
this switch will forward its data to the other switch through the Channel path,
and let the other switch forward the data to BSC, thus enhancing network
reliability.
4. The above figure is only a schematic drawing, and it does not represent
connection of any port in practice.
(1) When BSC is connected with the switch via the FE electrical
interface, both sides should be set to the forced 100Mbps full-duplex
mode.
(2) When BSC is connected with the switch via the GE electrical
interface, both sides should be set to the adaptive negotiation mode.
(3) When BSC is connected with the switch via the GE optical
Physical Interface interface, both sides should be set to the forced 1000Mbps full-
Configuration duplex mode.
Ports of the switch that are connected with BSC should be all set to
L3 ports (no switchport).
Ports of the switch that are connected with BTS should be all set to
the trunk mode (dot1q encapsulation). VLAN IDs can be configured
as per the actual requirements. To realize traffic balance, it is
suggested that each port create two VLANs.
VLAN Interface Set the virtual interface of the VLAN to the HSRP virtual address (or
Configuration VRRP).
Channels should be created between the two switches via multiple
FE/GE interfaces. The multiple FE/GE interfaces form link
Channel aggregation, so the usable bandwidth is increased.
Set the channel interface as the L3 interface.
Each VLAN interface should be configured with an IP address.
Different VLAN interfaces use different IP subnet addresses. The
BTS-side VLAN subnet mask is determined by the number of BTSs.
IP Address
The Channel interface of two switches should be configured with an
IP address, and it should occupy a 255.255.255.252 subnet of its
own.
To connect to the VLAN of BTS, two switches should create the
corresponding HSRP group or VRRP group. Different HSRP groups
HSRP (or VRRP)
should have different priority configuration policies, to allocate all the
VLAN traffic evenly to the two switches at the same time.
Static routes to all BTSs should be configured on BSC. The routing
entries should be concise; subnets that can be merged should be
merged into one big subnet routing entry.
For each destination IP address (routed to BTS) on BSC, the next
hop of its static route should be the IP address of the interface on the
switch. If the number of interfaces on the switch is N, the number of
Downlink Route next hops with the same priority should also be N (that is, downlink
Configuration packets can pass through any active GIPI to the switch).
It is not necessary to configure static routes to all BTSs on the
switch, because they can directly reach each other.
Between the two switches, OSPF learning should be enabled. It is
only necessary to create an area 0, which corresponds to the subnet
where the Channel interface resides.
On BTS, the virtual IP address of VRRP for the VLAN is its default
gateway.
Two switches should be configured with static routes to the following
addresses: BSC service IP address and signaling IP address. Do not
Uplink Route merge routing entries to different resource frames, and they should
Configuration be configured separately. These routes should be evenly shared
between the two switches. Therefore, for the same destination IP
address, the next hops configured on each switch should include the
interfae IP addresses of all GIPIs that are directly connected with it.
(Do not configure this item in case of non-direct connection, because
OSPF can learn this information.)
Note: When the redundancy requirement on the switch is not high, you can
adopt the networking with only one L3 switch in it. In this case, the VRRP
(HSRP) protocol is not used, which simplifies the network configuration.
1. The GIPI boards of BSC are connected with two switches. If there are four
interface boards with the A interface, each switch will be connected with two of
them.
2. Static routing is configured between BSC and the L3 switches.
3. A channel is configured between the two switches for inter-connection.
4. The dynamic routing protocol is enabled between the two L3 switches. It is
recommended to use the OSPF protocol.
5. The above figure is only a schematic drawing, and it does not represent
connection of any port in practice.
For the two switches, the number of configured static routes is the
same, but their next hops are different. Their next hops are the IP
addresses of their peer equipment respectively.
OSPF dynamic route learning should be enabled between the two
switches. It is only necessary to create an area 0, which corresponds
to the subnet where the Channel interface resides.
CN should be configured with routes to the following addresses: BSC
service IP address and signaling IP address. These routes should be
evenly shared between the two switches.
Two switches should be configured with static routes to the following
addresses: BSC service IP address and signaling IP address. Do not
Downlink Route merge routing entries to different resource frames, and they should
Configuration be configured separately. These routes should be evenly shared
between the two switches. Therefore, for the same destination IP
address, the next hops configured on each switch should include the
interfae IP addresses of all GIPIs that are directly connected with it.
(Do not configure this item in case of non-direct connection, because
OSPF can learn this information.)
Note: When the redundancy requirement on the router is not high, you can
adopt the networking with only one router/L3 switch in it. In this case, no
dynamic routing protocol needs to be used between the routers, which
simplifies the network configuration.
As shown in the figure above, the base station is connected with iBSC via a switching
network. For information of this networking structure, please refer to the configuration in
“2.1Typical Abis Interface Networking”.
The IPBB board connected with the OMCB server is normally a rear board with 100M.
(The data flow in operation and maintenance is comparatively low, and the OMCB server
currently uses the SBCX board that is integrated within iBSC, which only has 100M
electrical interfaces, so it is not necessary to use the 1000M IPBB rear board.)
Table Service Networking-7 Configuration Requirements for Connection Between iBSC and the
OMCB Server
1. Route Analysis
(1) SDR—→OMCB_Server: When SDR sends data to the OMCB server,
first the CC lower layer will encapsulate the IP packets into IPinIP
packets. Then the packets pass through the switching network and reach
the IPBB board that has the Abis interface. The IPBB board resolves and
decapsulate the IPinIP packets. Then the packets are forwarded to the
OMCB server through the IPBB board connected with the server.
(2) OMCB_Server—→SDR: When the OMCB server sends data to SDR, the
data will first be sent to the IPBB board connected with the OMCB server
in the form of normal IP packets. Then the IPBB board analyzes the
source address of the packets. When the board detects that the source
address is the IP address of the OMCB server, it will encapsulate the IP
packets into IPinIP packets. Then the packets are forwarded to SDR by
the IPBB board that has the Abis interface. After SDR receives the
packets, the CC board will decapsulates them. Last, the packets will be
forwarded to the VxWorks protocol stack by the BRS protocol stack.
2. Differences Between brsping and ping
(1) The CPU of CC has two Universal Communication Controllers (UCC1
and UCC2). The two UCCs are both connected with the switch chip of
the CC board.
UCC1 mainly processes Abis interface signaling (by using the SCTP
protocol, it completes the configuration of radio parameters, which are
used for connection between GSPS and iBSC, as well as the signaling
process in calls). It runs the BRS protocol stack;
(5) To establish connection between OMCB and the base station, routing to
the base station must be configured on OMCB, and OMCB parameters
must be configured on the base station. Thus, the route to OMCB can be
added on the base station, and the base station can know the
encapsulated external IP. You can use the routeShow command on the
base station to view the route information, and the ifShow command to
view the IP interface information of the VxWorks protocol stack.
(6) After you add the route to the base station on OMCB, if you do not
configure OMCB parameters on the base station, the base station cannot
be pinged through from OMCB, because the base station does not know
how to encapsulate a common packet into an IPinIP packet, and thus
does not know how to respond to the packet. After you configure the
OMCB parameters on the base station, the base station can be pinged
through from OMCB.
After you add the route to the base station on OMCB, if you do not configure
OMCB parameters on the base station, OMCB cannot be pinged through
from the base station, either, because the base station does not know how to
encapsulate a common packet into an IPinIP packet, and thus will not
forward the ping packet from the Abis interface.
After you add the OMCB parameter configuration on the base station, you
still cannot ping through OMCB from the base station. But at this time, if you
ping the base station first from OMCB, and after you get a positive result,
ping OMCB again from the base station. At this time, the OMCB can be
pinged through. This is because the base station must be configured with
OMCB parameters and the link between OMCB and the base station is
initiated by OMCB.
(7) Once OMCB establishes a link with the base station, the ping command
can be executed successfully in both directions.
Networking prerequisite: The base station side must use SDR; the BSC side needs an
EUIP board for protocol conversion.
Precautions:
OMP: Communicate with the background, that is, the OMCR subnet
SBCX: Use three ports (OMP1, OMC1, and OMC2)
OMP1: Communicate with the foreground, that is, the OMCR subnet.
OMC1: It is used for maintenance of the external network, that is, the
EMS subnet.
The OMCR subnet is where OMP and the OMCR server reside.
OMP and the OMCR server can connect with each other through an L2 switching
network (consisting of switches). IP addresses of the interfaces must be in the same
subnet. For example, the IP address of OMP is 10.5.5.1/29, and the address of the
OMCR server is 10.5.5.2/29. Other IP addresses cannot overlap with this subnet.
The OMCB subnet is where IPBB and the OMCB server reside. This IPBB only forwards
data from the OMCB channel.
IPBB and the OMCB server can connect with each other through an L2 switching
network (consisting of switches). IP addresses of the interfaces must be in the same
subnet. For example, the IP address of IPBB is 10.5.5.9/29, and the IP address of the
OMCB server is 10.5.5.10/29. Other IP addresses cannot overlap with this subnet.
The EMS subnet is where the EMS server (that is, the Minos server) resides. Terminals
for background operation and maintenance can log into the EMS server through this
subnet.
The EMS client, the OMM server, and the EMS server can connect with each other
through an L2 switching network (consisting of switches). IP addresses of the interfaces
must be in the same subnet. For example, the IP address of OMM Server1 is
172.22.16.1/24; the IP address of OMM Server2 is 172.22.16.2/24; the IP address of the
EMS server is 172.22.16.3/24. Addresses of EMS clients range from 172.22.16.10/24 to
172.22.16.250/24; other IP addresses cannot overlap with this subnet. This subnet can
also be used by other applications. For example, the alarm box can also use IP
addresses in this subnet.
The above describes the address configurations of the three subnets separately, and
logically gives a rough account of the basic networking methods. In actual physical
networking, we can integrate the three networks, and use VLANs to segregate the
subnets, as shown in Figure Network Management Network-11.
OMCR, OMCB, and EMS subnets match VLAN1, VLAN2, and VLAN3 respectively, and
they are connected to the same L2 switching network. Here you can use one L2 switch
(VLANs can be configured on it) to construct the simplest L2 switching network.
4 IP Application
RPU Address
RPU address is the destination address for SCTP link establishment of the
base stations under BSC. The subnet mask is 255.255.255.255. RPU address
cannot be used by other allocated subnet.
(For RPU addresses, the subnet mask must be 255.255.255.255.)
Interface Address of the IPBB Board
Load sharing mode: The IP address configured for each IPBB board should be
in the same subnet as the interface IP address of the corresponding router. The
subnet mask is 255.255.255.252. For example:
IPBB1: 10.1.1.1/30 ←→Interface IP address 1 of the corresponding router:
10.1.1.2/30
RPU Address
User plane address: It is the IP address for setting the UDP port of DSP on
AIPB as shown in Figure IP Application-13.
Control plane address: It is the local IP address in the SCTP association and
ASP configuration of the A interface.
As shown in , four control plane addresses are configured. Each IP address is
corresponding to an MSC and is configured with four local ports, forming four
virtual link channels.
RPU Address
The IP address in IPGB Endpoint configuration is the RPU address, as shown
in
Figure IP Application-14.
Base station address planning varies with the method of networking between the base
station and BSC. The following text will introduce base station address planning in two
typical networking scenarios.
When L2 network is adopted and VLAN is not configured, the interface IP address of
IPBB is used as the gateway address of the base station. In this case, the address
planning can be conducted in this way:
1. 100M platform (BIPI used as physical board of IPBB, and RMNIC as rear board
of IPBB).
The following configuration suggestions are based on the assumption that: site
ID starts from 1; the total number of sites does not exceed 508, and BSCID
does not exceed 392.
Four FE ports should be provided. If the actual processing capacity of each port
is 60M, and the average bandwidth of each site is 3M, the number of sites
connected with one FE port should not exceed 20.
Each FE port can be configured with four addresses of different subnets at the
maximum. But in practice, it is suggested that each FE port be configured with
one address only.
It is suggested to configure the FE port address as 10.BSCID.xxy.254,
where xx means the xxth IPBB board on the BSC (from the main rack to the
extension rack; in the same rack, from the higher frame to the lower frame,
from the slot on the left to the slot on the right)., “y” means the yth interface of
IPBB.
The SDR whose site number is smaller than 16 can be connected to the first
port of the first board, and is allocated to subnet 10.BSCID.11.0.
The SDR whose site number is in the range of “16-32” can be connected to the
second port of the first board, and is allocated to subnet 10.BSCID.12.0.
The SDR whose site number is in the range of “32- 48”can be connected to the
third port of the first board, and is allocated to subnet 10.BSCID.13.0.
The SDR whose site number is in the range of “48-64” can be connected to the
fourth port of the first board, and is allocated to subnet 10.BSCID.14.0.
The SDR whose site number is in the range of “64-80” can be connected to the
first port of the second IPBB board, and is allocated to subnet
10.BSCID.21.0.
The SDR whose site number is in the range of “80-96” can be connected to the
second port of the second IPBB board, and is allocated to 10.BSCID.22.0.
2. Gigabyte platform (BIPI used as physical board of IPBB, and RMNIC as rear
board of IPBB)
One GE port should be provided. If the actual processing capacity of the port is
600M, and the average bandwidth of each site is 3M, the number of sites
connected with one GE port should not exceed 200.
Each GE port can be configured with four addresses of different subnets at the
maximum. But in practice, it is suggested that each GE port be configured with
three addresses, according to the IP planning rules below.
It is suggested to configure the GE port address as 10.BSCID.xxy.254,
where xx refers to the xxth IPBB board on the BSC (from the main rack to the
extension rack; in the same rack, from the higher frame to the lower frame,
from the slot on the left to the slot on the right), y means the yth address of
IPBB.
SDR whose site ID is smaller than or equal to 63 can be connected to the first
address of the first IPBB board, and is allocated to subnet 10.BSCID.11.0.
The gateway address is the corresponding GIPI port address, that is,
10.BSCID.11.254.
SDR whose site number is in the range of “64-128” can be connected to the
second address of the first IPBB board, and is allocated to 10.BSCID.12.0.
The gateway address is the corresponding GIPI port address, that is,
10.BSCID.12.254.
SDR whose site number is in the range of “128-196” can be connected to the
third address of the first IPBB board, and is allocated to subnet
10.BSCID.13.0.
The gateway address is the corresponding GIPI port address, that is,
10.BSCID.13.254.
SDR whose site number is in the range of “196-254” can be connected to the
first address of the second IPBB board, and is allocated to subnet
10.BSCID.21.0.
The gateway address is the corresponding GIPI port address, that is,
10.BSCID.21.254.
Each site is connected with BSC through the IP network, and its gateway is normally
configured on the router that is directly connected with BSC. Besides, broadcast sto rm in
L2 network can be effectively reduced by using VLAN segregation.
Each physical site is normally allocated with eight IP addresses. One BBU corresponds
to two IP addresses: one service IP address and one operation & maintenance IP
address (separated service IP and operation & maintenance IP is supported). It is
estimated that each site has three BBUs at the most (this number depends on the actual
situation; it is only necessary to add the number of reserved IP addresses). For the
remaining two IP addresses, one is used for the management of the switch connected,
and the other is the PC IP address used for debugging.
If one site is allocated with eight IPs, there are 31 sites in a subnet.
Advantage: This segregation is simple and easy to understand.
Disadvantage: The subnet is too large. There is a large number of sites in one
VLAN, thus, it is difficult to control broadcast storm.
This segregation applies to offices with simple network structure and a small
number of sites.
Custom Subnets
We can change the size of a subnet by changing subnet mask, so as to suit
different on-site scenarios.
For subnets with the same features, the size and the number of usable IP
addresses are fixed.
Number of Usable IP
Subnet Mask Simplified
Addresses
255.255.255.252 /30 2
255.255.255.248 /29 6
255.255.255.240 /28 14
255.255.255.224 /27 30
255.255.255.192 /26 62
255.255.255.128 /25 126
255.255.255.0 /24 254
In this way, when a class C subnet is fully occupied, a new class C subnet can
be used, such as 10.9.2.0/28.
If this method is difficult to understand and there is no special requirement for
IP address planning on site, it is feasible to set a class C subnet for each SDR
and reserve 253 IPs for each SDR (gateway excluded).
Advantage: One site corresponding to one VLAN can effectively control
broadcast storm.
Disadvantage: Each site has a different gateway, increasing the load of the
router bearing the gateway.
This kind of segregation applies to scenarios with small number of sites.
Creation of supervlan and subvlan
The subnet for sites can be defined according to the first kind of segregation for
subnets class C. Sites in the same subnet of class C use the same gateway,
and this subnet of class C corresponds to one supervlan; N subvlans are
created in one supervlan, where N is the number of sites in the supervlan. The
subvlan ID is configured on the site.
The size of each subnet is defined based on the address of class C, as shown
below:
If one site is allocated with eight IP addresses, there will be 31 sites in one
subnet.
IP over E1
Information Table of Sites.xls
As shown in the above figure, the subnet of the sites is 10.1.1.0/24; the address of
interface A on the router is 10.1.1.254, which is the gateway of the sites; the address
of interface B on the router is 20.1.1.1, which is in the same subnet as IPBB interface
address 20.1.1.2. The RPU address on the Abis interface of BSC is 30.1.1.1.
Routing of BSC
Routing of Router
As shown in the above figure, the interface address 20.1.1.2 of IPI board on the BSC
is in the same subnet as the address (20.1.1.1) of interface B on the router. The
address (10.1.1.2) of interface board on the MSC is in the same subnet as the
address (10.1.1.1) of interface C on the router. The RPU (A interface) address of BSC
is 30.1.1.1. The virtual address of MSC is 50.1.1.1.
Routing of BSC
Routing of Router
Routing of BSC
The configuration here is the same as the configuration for A interface routing.
As shown in the above figure, connect the LMT client to the OMCB subnet with the
network adapter that is in the same subnet as the OMCB server, then configure the route
to the base station on the client, with the route pointing to the interface address of the
IPBB board (in the same subnet as the OMCB server).
Run the LMT software and type the service IP address of the base station, and then the
remote base station through can be managed with LMT, just like the debugging of local
base station.
If the remote LMT client has two network adapters, connect the other network adapter to
the EMS subnet, then the EMS client can connect to the LMT client through remote
desktop, and run the LMT software, to manage base station.
The above is the topology of a 2G service network. BSC devices are placed in two
equipment rooms: BMI and BPO.
The following part details the architecture of the service network from the aspects of
communications on the Abis interface, A interface, and Gb interface, and between the
two equipment rooms.
Network Topology
Ten BSCs are placed in two equipment rooms, and they are connected to the
L2 network through L3 switches (6513). This L2 network is provided by four
operators. All 2G base stations access this L2 network and establish links with
BSCs through ZTE’s switch 2818. In each equipment room, there are two L3
switches (6513) connected with the BSCs. The HSRP protocol is used between
the two 6513 switches, and the two switches are mutual backup for each other.
Information Routing Analysis
Take 10 sites as a group. VLAN segregation and the HSRP between switches
6513 can be used to plan routes for data from each group of sites.
As shown above, for the first group of 10 sites, the uplink data passes through
the L2 network, and then is forwarded to the GIPI board of BSC through
RAN6513-11. The operation & maintenance data is forwarded to the GIPI
board of BSC through RAN6513-12. Thus, the service channel and the
operation & maintenance channel are separated. Although the uplink channels
are unidirectional, the service channel and the operation & maintenance
channel will automatically switch to each other when either of them fails.
Therefore, the two channels are mutual backup for each other. As for the
downlink data, the BSC forwards them to two 6513 switches through two GIPI
boards, to realize multi-channel transmission and load sharing of the downlink
data.
Address Planning for GIPI Boards of iBSC
ZBSC11
GIPI 10.9.4.101/30
Abis
Subnet 10.9.4.48/29 GIPI 10.9.4.105/30
GIPI 10.9.4.109/30
GIPI 10.9.4.113/30
ZBSC12
GIPI 10.9.5.101/30
Abis
Subnet 10.9.5.48/29
GIPI 10.9.5.105/30
ZBSC13
GIPI 10.9.6.101/30
Abis RAN6513-11
Subnet 10.9.6.48/29 GIPI 10.9.6.105/30
GIPI 10.9.6.109/30
GIPI 10.9.6.113/30
ZBSC14
GIPI 10.9.7.101/30
Abis
Subnet 10.9.7.48/29 RAN6513-12
GIPI 10.9.7.105/30
ZBSC15
GIPI 10.9.8.101/30
Abis
Subnet 10.9.8.48/29
GIPI 10.9.8.105/30
ZBSC16
GIPI 10.9.9.101/30
Abis
Subnet 10.9.9.48/29
GIPI 10.9.9.105/30
BSC11 and BSC13 both have two racks, so there are four IPBB (GIPI) boards
to forward data of the Abis interface.
Inside BSC, the IPBB board forwards data of the sites to the PRU address. For
example, the RPU address of BSC11 is 10.9.4.49.
The above is the planning of the BMI equipment room. Following the same
principle, we can get the planning for the BPO equipment room as follows:
ZBSC21
GIPI 10.10.4.101/30
Abis
Subnet 10.10.4.48/29
GIPI 10.10.4.105/30
ZBSC22
GIPI 10.10.5.101/30
Abis
Subnet 10.10.5.48/29 GIPI 10.10.5.105/30
GIPI 10.10.5.109/30
GIPI 10.10.5.113/30 RAN6513-21
ZBSC23
GIPI 10.10.6.109/30
GIPI 10.10.6.113/30
ZBSC24
GIPI 10.10.7.101/30
Abis
Subnet 10.10.7.48/29 GIPI 10.10.7.105/30
GIPI 10.10.7.109/30
GIPI 10.10.7.113/30
BSC21 has only one rack, and the other BSCs are dual-rack structures.
IP Planning of RAN6513 (RAN6513 is Cisco’s equipment)
The address of the interface connected with BSC should be in the same subnet
as the connected GIPI board.
RAN6513-12:
interface Vlan30
description ###connected to SP_Domain###
ip address 10.9.30.253 255.255.255.0
standby version 2
standby 1030 ip 10.9.30.254
standby 1030 timers 2 5
standby 1030 authentication md5 key-string CSL_HSRP
Site Address
Planning.xls
The BSCs of the sites are in two equipment rooms, two subnets of class B are
used to distinguish the sites:
Network Topology
In this network, there are four MSCs and four SGSNs. They are in the same
layer, and are mutual backup for each other. Besides, they can realize load
balance. They are connected with each other through CORE6513. The A
interface and the Gb interface of BSC are both connected with CORE6513.
The interfaces connecting BSC, MSC, and SGSN with CORE6513 are all L3
ports. Static routes are used to forward the data on BSC to the corresponding
office via CORE6513
Address Planning for the A Interface and the Gb Interface
Here the address includes the physical address of the interface board and the
virtual address of the RPU board. On the A interface, the address also includes
the user plane IP address and the control plane IP address.
The specific structure is as follows:
ZBSC11
GIPI 10.9.4.65/30
Cs-CP GIPI 10.9.4.69/30
Subnet 10.9.4.0/29 GIPI 10.9.4.73/30
Cs-UP GIPI 10.9.4.77/30
Subnet 10.9.4.16/29
ZBSC12
GIPI 10.9.5.65/30
Cs-CP GIPI 10.9.5.69/30
Subnet 10.9.5.0/29 GIPI 10.9.5.73/30
Cs-UP GIPI 10.9.5.77/30
Subnet 10.9.5.16/29
ZBSC13
GIPI 10.9.6.65/30
Cs-CP GIPI 10.9.6.69/30 Core 6513-11
Subnet 10.9.6.0/29 GIPI 10.9.6.73/30
Cs-UP GIPI 10.9.6.77/30
Subnet 10.9.6.16/29
ZBSC15
GIPI 10.9.8.65/30
Cs-CP GIPI 10.9.8.69/30
Subnet 10.9.8.0/29 GIPI 10.9.8.73/30
Cs-UP GIPI 10.9.8.77/30
Subnet 10.9.8.16/29
ZBSC16
GIPI 10.9.9.65/30
Cs-CP GIPI 10.9.9.69/30
Subnet 10.9.9.0/29 GIPI 10.9.9.73/30
Cs-UP GIPI 10.9.9.77/30
Subnet 10.9.9.16/29
ZBSC21
GIPI 10.10.4.65/30
Cs-CP GIPI 10.10.4.69/30
Subnet 10.10.4.0/29
GIPI 10.10.4.73/30
Cs-UP GIPI 10.10.4.77/30
Subnet 10.10.4.16/29
ZBSC22
GIPI 10.10.5.65/30
Cs-CP GIPI 10.10.5.69/30
Subnet 10.10.5.0/29
GIPI 10.10.5.73/30
Cs-UP GIPI 10.10.5.77/30
Subnet 10.10.5.16/29
Core 6513-21
ZBSC23
GIPI 10.10.6.65/30
Cs-CP GIPI 10.10.6.69/30 Core 6513-22
Subnet 10.10.6.0/29
GIPI 10.10.6.73/30
Cs-UP GIPI 10.10.6.77/30
Subnet 10.10.6.16/29
ZBSC24
GIPI 10.10.7.65/30
Cs-CP GIPI 10.10.7.69/30
Subnet 10.10.7.0/29
GIPI 10.10.7.73/30
Cs-UP GIPI 10.10.7.77/30
Subnet 10.10.7.16/29
Aim of The Interface IP UnitType Rack No Shelf Slot No IP Subnet Mask Remark
No Address
The integration between the two equipment rooms is fulfilled through a core network.
This core network consists of four high-end routers called PE routers (PE is the boarder
router at the CN side of an MPLS network, where MPLS is Multi-Protocol Label
Switching). The four routers are connected with the CORE6513s in their equipment
rooms. Thus, the networks in the two equipment rooms are integrated with each other
through a transparent channel of the core network.
As shown above, there are six BSCs corresponding to six RAN2950 switches. As per the
planning g, SCBX adopts the active/standby mode, so the active O&M server of BSC11
is connected with RAN2950-11, and the standby O&M server of BSC11 is connected
with RAN2950-12; while the active O&M server of BSC12 is connected with RAN2950-
12, and the standby O&M server of BSC12 is connected with RAN2950-13; and the rest
may be deduced by analogy to realize interconnection and the backup of switches (when
one switch fails, the data packets are sent to the other switch).
The RAN2950s converge to two EMS2950s, and two EMS servers are connected with
EMS2950s respectively. Thus in the BMI equipment room, the six local O&M servers can
communicate with the EMS server through the LAN shown above. Each RAN2950 is
connected with two #MS2950 switches, to realize load balance and mutual backup. The
two network adapters on each EMS server are connected with the two switches
respectively, to realize the backup of links and improve redundancy.
EMS and O&M clients can access corresponding servers by connecting to the
RAN2950.
Besides, servers that use the EMS subnet, such as the Microwave (MW) server, access
this network by connecting to the EMS2950 switch.
Figure IP Application-21 Core Switching Network for Interconnection of Two Equipment Rooms
As shown above, EMS2950s are connected with Core3750s. The gateway of the EMS
subnet is also configured on Core3750, which is used for data forwarding. The four PE
routers in the middle and the four Core6513 routers compose a core switching network
that is used as a transparent channel for transparent transmission of the data forwarded
by Core3750, to realize connection of remote networks.
The EMS servers are backed up remotely. Each equipment room has an active EMS
server, and its standby server is placed in the remote equipment room, realizing remote
backup through the connection of remote network.
The CSL monitoring daemon and workstations are connected with the Core3750
switches through firewalls. Thus they can access the EMS network.
To analyze the topology more clearly, we logically separate the SBCX board that is
integrated in the BSC from the BSC.
Physically, the OMCR server, OMCB server, and EMS server refer to the same SBCX
board. There are three network interfaces on the rear panel of the SBCX board, and they
are connected with the three interfaces of the three servers. The three links of the three
servers are connected with the RAN2950 switch, and the subnetworks are segregated
through different VLANs.
SBCX in the above figure represents two boards: the active one and the standby one.
The active one is connected with RAN2950-11, and the standby one is connected with
RAN2950-12.
In the OMCR network, ROMPs are also connected with the two switches in the
active/standby mode.
In the CMCB network, GIPIs are connected with the two switches in the active/standby
mode, too.
The data packets in VLANs corresponding to the subnetworks of OMCR and OMCB are
not forwarded to upper layer network via EMS2950. That is, the data packets in these
two VLANs cannot be transmitted from an equipment room to the other equipment room,
which is for security considerations. Besides, there is no sense for transmitting the data
packets in these two VLANs from one equipment room to the other.
V890-21(BMI-Master)
172.22.97.11 255.255.255.128 172.22.97.126
EMSRANA1a: NIC1
V890-21(BMI-Master)
172.22.97.12 255.255.255.128 172.22.97.126
EMSRANA1a: NIC3
V890-21(BMI-Master)
172.22.97.13 255.255.255.128 172.22.97.126
EMSRANA1a: NIC2
V890-21(BMI-Master)
172.22.97.14 255.255.255.128 172.22.97.126
EMSRANA1a: NIC4
V890 172.22.97.15 Reserved
V890-21(BMI-Master)
172.22.97.16 255.255.255.128 172.22.97.126
EMSRANA1a: IPMP
V890-22(BPO-Slave)
172.22.97.17 255.255.255.128 172.22.97.126
EMSRANA2b:NIC1
V890-22(BPO-Slave)
172.22.97.18 255.255.255.128 172.22.97.126
EMSRANA2b:NIC3
V890-22(BPO-Slave)
172.22.97.19 255.255.255.128 172.22.97.126
EMSRANA2b:NIC2
V890-22(BPO-Slave)
172.22.97.20 255.255.255.128 172.22.97.126
EMSRANA2b:NIC4
V890 172.22.97.21 Reserved
V890-22(BPO-Slave)
172.22.97.22 255.255.255.128 172.22.97.126
EMSRANA2b:IPMP
172.22.97.23 Reserved
Sun STK6140 172.22.97.24 255.255.255.128 172.22.97.126
Brocade200E-21 172.22.97.25 255.255.255.128 172.22.97.126
Brocade200E-22 172.22.97.26 255.255.255.128 172.22.97.126
T5220_BPO 172.22.97.27 255.255.255.128 172.22.96.126
172.22.97.29~172.22.97.3
EMS CLIENT 255.255.255.128 172.22.97.126
1
5 IP Configurations in BSS
Figure IP Configurations in BSS-23 Configuration of Virtual Address for RPU on the Abis Interface
Create a board. Select RPU for the Board function type option. Select the Port No.
according to the creation sequence, and make sure that it is unique. Then configure the
IP address and the subnet mask of the interface board as per the planning. The third
column is the broadcast address. The broadcast address is a default value, and you do
not need to change it. The IP address here is the virtual IP address, and it is the
destination address in the SCTP link creation of all base stations.
5.1.2 A Interface
Figure IP Configurations in BSS-24 Configuration of Virtual Address for Control Plane RPU on the
A Interface
Figure IP Configurations in BSS-25 Configuration of Virtual Address for User Plane RPU on the A
Interface
Create a board. Select RPU for the Board function type option. Select the Port No.
according to the creation sequence, and make sure that the port number is unique. The
A interface has the control plane and the user plane, so you need to create two logical
RPU boards. Then configure the IP address and the subnet mask of the interface board
as per the planning. The third column is the broadcast address. The broadcast address
is a default value, and you do not need to change it. The IP addresses here are the
virtual IP addresses, and they are the control plane address and the user plane address
of the A interface.
5.1.3 Gb Interface
Figure IP Configurations in BSS-26 Configuration of Virtual Address for RPU on the Gb Interface
Create a board. Select RPU for the Board function type option. Select the Port No.
according to the creation sequence, and make sure that the port number is unique. Then
configure the IP address and the subnet mask of the interface board as per the planning.
The third column is the broadcast address. The broadcast address is a default value,
and you do not need to change it. The IP address here is the virtual IP address, and it is
the address of the Gb interface.
Figure IP Configurations in BSS-27 Configuration of Real Address for IPBB Board on the Abis
Interface
Create an IPBB board. Select the specific slot number and type the corresponding MAC
address (it is the hardware address of the network port and is written on a label of the
board). Then configure the IP address and the subnet mask of the interface board as per
the planning. The third column is the broadcast address. The broadcast address is a
default value, and you do not need to change it. The IP address here is the real address
of Abis interface on the IPBB board.
5.2.2 A Interface
Figure IP Configurations in BSS-28 Configuration of Real Address for IPI Interface Board on the A
Interface
Create an IPI board. Select the specific slot number and type the corresponding MAC
address (it is the hardware address of the network port and is written on a label inside
the board). Then configure the IP address and the subnet mask of the interface board as
per the planning. The third column is the broadcast address. The broadcast address is a
default value, and you do not need to change it. The IP address here is the real address
of A interface on the IPI board.
5.2.3 Gb Interface
Figure IP Configurations in BSS-29 Configuration of Real Address for IPGB Interface Board on
the Gb Interface
Create an IPGB board. Select the specific slot number and type the corresponding MAC
address (it is the hardware address of the network interface and is written on a label
inside the board). Then configure the IP address and the subnet mask of the interface
board as per the planning. The third column is the broadcast address. The broadcast
address is a default value, and you do not need to change it. The IP address here is the
real address of Gb interface on the IPGB board.
As shown above, create a static route entry in the Static Router page. There are three
key items: Static router prefix (subnet of the destination IP address), Static router
subnet mask, and Next hop IP address.
Static router prefix: In most cases, BSC will not create a route for the IP
address of a base station. Instead, it will create route entries by subnet for all
base stations under it.
Static router subnet mask: This is used to limit the size of a subnet.
Next hop IP address: If the corresponding interface board is connected with a
router or an L3 port of the switch, the next hop IP address is the IP address of
the router or the L3 port.
As shown above, click Ethernet Parameter on the left pane. Then right-click on the right
pane and click Create. In the displayed window, select the working mode of the physical
port (port for service); normally the selection is 100Mbps FDT. Then configure the
corresponding port bandwidth. The bandwidth here is the total service bandwidth of the
BBU (the bandwidth is greater than the total bandwidth of the SCTP links and the OMCB
links).
After configuring the Ethernet port, you need to configure Global Port Parameter. Click
Create, and select the working mode in the displayed window. If the transmission is
through FE, the selection here is IP over Ethernet; if the transmission is through E1/T1,
the selection here is IP over E1. If VLAN needs to be configured according to planning,
you need to set the VLAN ID.
Then you need to configure the IP Parameter, that is, to configure an IP address pool for
the base station.
Configure the IP address, the subnet mask, and the gateway as per the planning.
Note: The total bandwidth of the IP channels cannot exceed the bandwidth set
in Ethernet Parameter configuration.
Then in SCTP Parameter configuration, select the IP address used by this service
channel, the local port number (the site number), and the remote port number (that is,
14592+module number). For the Remote IP Address item, you need to configure the
RPU address of the Abis interface for the iBSC that this site belongs to. This address
must be the same as the IPABIS value in BSC global parameter configuration, as shown
below:
In OMC-B Parameter configuration, select the IP address used by the OMCB channel,
as well as the RPU address of the OMCB channel of the iBSC that this site belongs to.
This address must be the same as the OMCB channel IP in BSC global parameter
configuration, as shown below:
Lastly, you need to configure the IP address of the SNTP server as per the planning, as
shown above. The SNTP Server address here is normally the IP address of the OMCB
server.
As shown above, in the IP Property tab of the BSC Function page, you need to
configure IPAbis and OMCB channel IP (here OMCB channel IP refers to the operation
and maintenance IP address of the RPU on the Abis interface). You can set two IP
addresses for the Abis interface, one for service and the other for operation and
maintenance. But if the two IP addresses are the same, service will not be separated
from operation and maintenance.
As shown above, in the Basic Property tab of the BSC Function page, you need to
configure the OMP IP and the corresponding subnet mask. The IP address set here
must be the same as the IP address of the OMP board. If they are not the same, after
data synchronization between the OMCR and the iBSC, the IP address configured here
will overwrite the IP address of the OMP board.
Besides, you also need to configure the interface IP address of OMCR in this page, and
this address must be in the same subnetwork as the IP address of OMP on iBSC.
6 Network Configuration
Cisco System Inc. is well known to most people. With its Internet Operating System
(IOS), Cisco now possesses absolute predominance on the multi-protocol router market.
The following part will introduce Cisco’s switch product line and its main products.
6.1.1.1 Overview
Cisco’s switches are under the trademark of “Catalyst”, and they fall into more than 10
series, such as 1900, 2800, 2900, 3500, 4000, 5000, 5500, 6000, and 8500. Generally
speaking, these switches can be divided into two types:
Switches with fixed configuration: This type includes Switch 3500 and most
models under it. For example, Switch 1924 is a 10M Ethernet switch with 24
interfaces, and it has two 100M uplink ports. Except software upgrade, these
switches cannot be expanded.
Modular switches: This type mainly includes Switch 4000 and the models
above it. Network designers can select interface boards, power modules, and
corresponding software based on their network requirements.
When selecting devices, many people are puzzled by the long product name. Actually,
Cisco’s product naming has regular rules. For the Catalyst switches, their naming format
is as follows:
NN means the series number of the switch; for switches with fixed configuration, XX
means the number of ports, and for modular switches, it means the number of slots; the
appearance of -C means that the switch has fiber interfaces; -M means modularized; -A
means that the software is the standard version, and -EN means that the software is the
enterprise version.
Currently, Cisco switches commonly used in network integration projects are the
following series: the 1900/2900 series, the 3500 series, and the 6500 series. They are
respectively used at the low end, the medium end, and the high end networks. The
following part will introduce these series respectively:
are called ZXR10 3900; ZXR10 3206, ZXR10 3252, and ZXR10 3228 are
called ZXR10 3200.
ZXR10 3200 can be used in the convergence layer or access layer of a MAN.
ZXR10 3900 can be used as the convergence L3 switch in large enterprise
networks and campus networks.
ZXR10 3906 and ZXR10 3206 share the same appearance, except the product
name labeling, as shown in Figure Network Configuration-30.
ZXR10 3952 and ZXR10 3252 share the same appearance, except the product
name labeling, as shown in Figure Network Configuration-31.
ZXR10 3928 and ZXR10 3228 share the same appearance, except the product
name labeling, as shown in Figure Network Configuration-32.
6.2.1 Ping
Ping is a frequently used utility used to find out whether a local host can exchange (send
and receive) data packets with another host. Based on the returned information, you can
infer whether the TCP/IP parameters are correctly configured and whether the running is
normal. Note that succeeding in exchanging data with another host once or twice does
not mean that the TCP/IP configuration is correct. You need to execute huge volume of
data exchange between the local host and the remote host, to ensure that the TCP/IP
configuration is correct.
To put it simply, Ping is a test program. If Ping runs correctly, you can almost exclude
the possibility of failures in the network access layer, the network adapter, the input and
output lines of MODEM, cables, and routers. Thus the range for locating problems can
be compressed. Because of the ceaseless high-speed data sending and the customized
size of data packets, Ping can be used as the Distributed Deny Of Service (DDOS) tool
intentionally. Not long ago, Yahoo encountered an absolute failure, and the cause was
that hackers used hundreds of computers that could access the Internet at high speeds
to continuously send large volume of Ping packets.
By default, a Ping command in Windows will send four Internet Control Message
Protocol (ICMP) echo requests, and each requrest contains 32 bytes of data. If
everything is accpetable, you can get four replies.
Ping can show the time used from sending echo request to returning echo reply in
milliseconds. If the time to reply is short, it means that the data packets do not need to
pass through too many routers or the network speed is high. Ping can also show the
Time To Live (TTL) value. Through the TTL value, you can estimate the number of
routers that the data packets have passed through. The method is as follows: the source
address’s TTL value (a closest value of 2 n that is larger than the returned TTL value) –
the returned TTL value. For example, the returned TTL value is 119. Then you can
estimate that the start TTL value when the data packets left the source address is 128,
and that the data packets need to go through 9 (128-119) routers to reach the
destination address from the source address. If the returned TTL value is 246, the start
TTL value will be 256, and the data packets need to go through 9 routers to reach the
destination address from the source address.
In normal cases, you need to use many Ping commands to locate problems or check the
network running status. If all the Ping commands return positive results, you can
ascertain that there is no problem with the basic connectivity and the configuration
parameters. If some Ping commands fail, they can still indicate the possible location of
the problem.
ping 127.0.0.1: This Ping command is sent to the IP software of the local
computer, and it will never exit from the computer. If this command fails, it
means that problems exist in TCP/IP installation or running.
ping IP address of your own computer: This command is sent to the IP address
of your own computer, and your computer should always reply to this Ping
command. If it fails to do so, it means that problems exist in your local
configurations or installation. In this case, if you are a LAN user, please
disconnect the network cable and re-send this command; if this command runs
correctly in case of network cable disconnection, it means that another
computer may be configured with the same IP address with your computer.
ping other IP addresses in the LAN: This command should pass through the
network adapter and network cables and then reach another computer in the
LAN. Then it should return data to your computer. If your computer receives the
echo reply, it means that the network adapter and carriers in the local network
are running correctly. If your computer receives no echo reply, it means that the
subnet mask or the network adapter configuration is wrong, or there are
problems with the cables.
ping IP address of the gateway: If this command runs correctly, it means that
the gateway router in the LAN is running and can reply to requests.
ping a remote IP address: If your computer receives four replies, it means that
the default gateway is successfully used. For users who are connected to the
network through dial-up access, it means that they can successfully access the
Internet (but there may still be problems with ISP’s DNS).
ping localhost: localhost is a network reserved name of the operating system. It
is the alias of 127.0.0.1. Each computer can convert this name into this
address. If this command fails, it means that problems exist in the host file
(/Windows/host).
ping www.yahoo.com: This command will normally go through the DNS server.
If the command fails, it means that the IP address of the DNS server is not
correctly configured, or the DNS server fails (for users who are connected to
the network through dial-up access, some ISPs do not need the DNS
configuration). In addition, you can also use this command to convert the
domain name into the IP address.
If all the Ping commands listed above can run normally, it indicates that there is no
problem with the local and remote communication of your computer. However, the
successful execution of these commands does not necessarily mean that all your
network configurations are acceptable. For example, some subnet mask errors cannot
be detected by using this method.
6.2.2 Netstat
Netstat is used to show statistics related to IP, TCP, UDP, and ICMP protocols. It is often
used to check the network connectivity of each port on your computer.
If the data packets your computer receives cause error data deletion or faults, do not be
surprised, because TCP/IP allows for this kind of errors, and it can automatically re-send
the data packets. But if the accumulated number of errors accounts for a considerable
percentage of the received IP packets, or the number of errors is increasing rapidly, you
need to use Netstat to see the cause of the errors.
netstat –s: This command can show statistics of each protocol. If your
application (such as the Web browser) runs slowly, or it cannot display the Web
page, you can use this option to view the information. You need to read through
each line of the statistics to find out the key words of the errors, and then locate
the problem.
netstat –e: This option is used to show the Ethernet statistics. The items it lists
include the total number of bytes of the transferred data packets, as well as the
number of errors, deletions, data packets, and broadcasts. This statistics
includes both the number of the sent data packets and the number of the
received data packets. This option can be used to view the basic network
traffics.
netstat –r: This option can show information of the routing table, which is similar
to the information you see when you use the route print command. It shows
both the valid routes and the valid connections.
netstat –a: This option is used to list all the valid connections, including the
established connections (ESTABLISHED) and the listening (LISTENING)
connections.
netstat –n: This option is used to show all the established connections that are
valid.
6.2.3 IPConfig
The IPConfig utility and its equivalent GUI --- WinIPCfg in Windows 95/98, can be used
to show the TCP/IP configurations. This information is often used to check whether the
manually configured TCP/IP parameters are correct. If your computer and LAN have
used the Dynamic Host Configuration Protocol (DHCP --- a protocol used under
Windows NT to allocate a small number of IP addresses to a large number of hosts,
which is similar to the dynamic IP allocation in dial-up network access), information
displayed by this utility may seem more practical. In that case, IPConfig enables you to
know whether your computer has obtained an IP address and if it has, what address it
has been allocated. Getting the IP address, the subnet mask, and the default gateway of
a computer is actually an indispensable step for testing and fault analysis.
Ipconfig: This command does not need to carry any parameter, because it
shows the IP address, the subnet mask, and the default gateway for each
configured interface.
ipconfig /all: When the all option is used, IPConfig will show the additional
information (such as the IP address on DNS and WINS servers. It will also
show the physical address (MAC) embedded in the local network adapter. If the
IP address is leased from the DHCP server, IPConfig will also show the IP
address of the DHCP server and the expected expiry date of the leased
address (for information about the DHCP server, please consult books on NT
servers or your network management administrator).
ipconfig /release and ipconfig /renew: These are two additional options, and
can only be used on computers that lease IP addresses from the DHCP server.
If you enter ipconfig /release, IP addresses leased by all interfaces will be
given back to the DHCP server. If you enter ipconfig /renew, the local
computer will try to connect with the DHCP server and lease an IP address
from it. Note that in most cases, the network adapter will be allocated an IP
address that is the same as the previous one.
If you are a user of Windows 95/98, you should be more accustomed to the use
of winipcfg instead of ipconfig, because winipcfg is a GUI and the
information it provides is the same as that provided by ipconfig. Besides, it
also provides the release and renew options. If you have bought Windows NT
Resource Kit (NT resource package), Windows NT will also provide a GUI
named wntipcfg, which is similar to winipcfg in Windows 95/98.
6.2.4 ARP
The Address Resolution Protocol (ARP) is an important TCP/IP protocol. It can be used
to find out the network adapter’s physical address for an IP address. Using the arp
command, you can also view the current content in the ARP caches of the local
computer or another computer. Besides, using the arp command, you can also enter
pairs of static physical address/IP address of the network adapter; you may use this
operation on commonly used hosts like the default gateway or the local server, to reduce
the traffic over the network.
According to the default setting, entries in the ARP cache are dynamic. When data
packets to a specific address are sent and there is no matching entry in the cache, ARP
will automatically add this entry. Once an entry of the cache is entered, they will become
void soon. For example, in Windows NT network, if an entry is entered and then not
used, the physical/IP address pair will become void in 2 to 10 minutes. Therefore, if there
is no entry or just a small number of entries in the ARP cache, do not be surprised, and
you can add entries by using the ping command on another computer or router. If you
want to view the content in the cache through the arp command, it is suggested that you
remotely ping this computer first (you cannot ping this computer locally).
arp –a or arp –g: They are used to view all entries in the cache. -a and -g will
return the same result. –g is used in the UNIX platform, while arp -a is used in
Windows (-a can be viewed as the short form of all), but Windows can also
accept the use of -g.
arp -a IP: If you have multiple network adapters, you can use arp –a plus the IP
address of the specific interface to show ARP cache entries related to this
interface only.
arp -s IP physical address: You can manually enter a static entry into the ARP
cache. This entry will remain valid in the computer boot process, or when there
are errors, the manually configured physical address will automatically update
this entry.
arp -d IP: You can use this command to manually delete a static entry.
6.2.5 Tracert
When a data packet is sent from your computer and passes through several gateways to
reach the destination, the Tracert command can be used to track the route (path) of the
data packet. The route tracked by this utility is a route from the source computer to the
destination, and you cannot ensure or assume that data packets will always follow this
route. If your configuration uses DNS, you can often get city names, addresses, and
communication carrier names from the responses. Tracert runs slowly (if the specified
destination is far from the source), and each router will use almost 15 seconds.
The use of Tracert is very simple: you only need to add an IP address or URL behind
tracert, and Tracert will translate the domain names. Tracert is often used to detect the
location of a problem. You can use tracert IP to see where the problem locates.
Although you may not know what the problem is, you can be very sure and say “X has
problems”.
6.2.6 Route
Most hosts reside in subnets that are connected with only one router. Because there is
only one router, the consideration of using which router to send the data packets to a
remote computer does not exist. The IP address of this sole router can be used as the
default gateway of all computers in the subnet.
However, when there are two or more routers in the network, you do not necessarily
want to depend on the default gateway only. Maybe you want to use one router to
transmit data to some remote IP addresses, and use another router to transmit data to
the other remote IP addresses.
In this case, you need the corresponding route information, which is stored in the routing
tables. Each host and each router have their unique routing tables. In most cases,
routers use routing protocols to exchange and dynamically update their routing tables.
But in some cases, you need to manually add entries to the routing table of a router or
host. Route is the command to display, add, and modify routing table entries.
route print: This option is used to show the current entries in the routing table.
Because the network adapters are configured with IP addresses, all these
entries are added automatically.
route add: This option is used to add new routing entries into the routing table.
For example, you want to set a route to the destination network 209.98.32.33,
and there are five routers in between. Of course your data needs to pass
through the router in the local network first. The IP address of this router is
202.96.123.5, and its subnet mask is 255.255.255.224. Then you need to enter
the following commands:
route add 209.98.32.33 mask 255.255.255.224 202.96.123.5 metric 5
route change: This option can be used to modify the transmission route of data,
but it cannot be used to change the destination of data. The command in the
following example changes the route of data into another router, and it chooses
a more direct route that contains three subnets:
route add 209.98.32.33 mask 255.255.255.224 202.96.123.250 metric 3
route delete: This option is used to delete routes from the routing table, for
example, route delete 209.98.32.33.
6.3.1 ping
ping IP –s: Specify the data length of a ping command.
ping IP –c: Execute the ping command for a specified number of times.
The ping command without any parameter is used to ping an address successively, and
you can press Ctrl+C to stop this operation.
6.3.2 traceroute
The same as the tracert command in Windows, this command is used to track the UDP
routing data packets between a local host and a remote host.
6.3.3 ifconfig
The same as the ipconfig command in Windows, this command is used to check the
local IP address.
interface means the network interface. The network interface name normally has three
characters, such as le0 and lo0, and it is derived from the corresponding device driver.
Normally, le means that the device driver is made by AMD, while ie means that the
device driver is made by Intel. When the ifconfig command is followed by the network
interface parameter only, it means to view the current network configuration. The family
parameter indicates the protocol layer corresponding to the configurations that follow this
parameter. In most cases, the configurations are for the IP layer processing, so the
option is inet. The address option means the specified IP address. up&down means to
enable the interface and disable the interface respectively. options includes many
choices. For example, you can choose to set the subnet mask or the broadcast address.
Instances:
#ifconfig lo0 127.0.0.1 up /*means to enable the loopback interface of the network*/
#ifconfig le0
le0: flags=63<UP,BROADCAST,NOTRAILERS,RUNNING>;
UP means that the interface is enabled, and RUNNING means that the interface can be
used. Inet means the network interface is configured at the IP protocol layer. The
following parts mean the IP address, the subnet mask (in the hexadecimal format), and
the IP broadcast address (it is expressed in the dotted decimal notation. For a correct
broadcast address, the host part consists of 1s only. Here in the default value, the host
part consists of 0s) respectively.
In Linux, you can use ifconfig –a to show information of all interfaces, for example:
# ifconfig -a
collisions:1 txqueuelen:100
collisions:0 txqueuelen:0
#/*We can see that lo0 is an address of class A, and it has no subnet mask.*/
From the above, we can see that the MAC address in Linux is expressed in the form of
XX: XX: XX: XX: XX:XX, while in Windows, the physical address is expressed in the form
of XX- XX-XX-XX-XX-XX. But in CISCO, it is expressed in this way: XXXX.XXXX.XXXX,
and you should note that this is a hexadecimal notation.
If you need to set or modify the password used to enter the privileged EXEC
mode, you can use the enable secret command in the global configuration
mode.
Enter ? in the privileged EXEC mode and you can get the prompt on all the
commands that can be executed in this mode. To exit from the privileged EXEC
mode and return to the user mode, you can execute the exit or disable
command.
To restart the switch, you can execute the reload command.
Global Configuration Mode
You can execute the configure terminal command in the privileged EXEC
mode to enter the global configuration mode. In this mode, you only need to
enter a valid configuration command and press Enter, and then the
configurations in the memory will be modified immediately. Configuration
commands in this mode will take effect globally on the whole switch.
The command status line in the global configuration mode is as follows:
student1(config)#
student1#config terminal
student1(config)#
You can also enter sub-modes like interface configuration and line configuration
from the global configuration mode. To return to the global configuration mode
from the sub-modes, execute the exit command; to return to the privileged
EXEC mode from the global configuration mode, execute the exit command. To
exit from any configuration mode and return to the privileged EXEC mode
directly, execute the end command or press Ctrl+Z.
show running-config
This command is used to show the basic configurations of a switch. You can
press the space key or turn pages to view all configurations.
config terminal
This command is used to enter the configuration mode.
This command is used to enter the port mode. X is the port number.
no shutdown
This command is used to enable the physical port. shutdown means to
disable.
show vlan
This command is used to show all the VLAN information.
write
This command is used to save configurations of the switch.
Commands in ZTE 2000 series of switches are different from the commands listed
above. From the 3000 series, the command formats are the same as the Cisco
commands. In the following part, we will introduce the commonly used commands in
ZTE 2000 series.
To make it convenient for users to configure and manage the switches, ZXR10 2818S
allocates commands to different modes according to the functions and rights. Thus a
command can only be executed in a specific mode. In the CSL project, the command
modes of a switch mainly include the following:
1. User Mode
After you log in to the switch through Hyper Terminal or Telnet, you can input
the user name and password to enter the user mode. The prompt in the user
mode is the host name of the switch followed by >, as shown below:
The default host name is zte, and you can use the hostname <name>
command to change it. In the user mode, you can execute the exit command to
exit from the switch configuration, or you can execute the show command to
view the system configuration information and running information.
2. Global Configuration Mode
You can enter the enable command and the password in the user mode to
enter the global configuration mode, as shown below:
In the global configuration mode, you can configure functions of the switch. To
return to the user mode from the global configuration mode, execute the exit
command.
3. SNMP Configuration Mode
You can use the config snmp command in the global configuration mode to
enter the SNMP configuration mode, as shown below:
In the SNMP configuration mode, you can set the SNMP parameters. To return
to the global configuration mode from the SNMP configuration mode, use the
exit command or press Ctrl+Z.
4. L3 Configuration Mode
You can use the config router command in the global configuration mode to
enter the L3 configuration mode, as shown below:
In the L3 configuration mode, you can configure L3 ports, static routes and ARP
entities. To exit from the L3 configuration mode and return to the global
configuration mode, you can use the exit command or press Ctrl+Z.
set port <portlist> {enable|disable}
This command is used to enable/disable ports.
Show port X: Show the physical port stauts. X is the port number.
Show vlan X: Show the VLAN information. X is the VLAN ID.
Saveconfig: Save the switch configurations.
connected with GIPI boards of BSC. The static routing protocol is used for the
connection here.
5. Switch 6513 is L3 switching equipment, realizing the connection between L2
and L3, communication between VLANs, and route forwarding.
interface Loopback0
interface Port-channel1
interface GigabitEthernet7/1
no ip address
shutdown !
interface GigabitEthernet7/2
switchport
media-type rj45
interface GigabitEthernet8/1
no ip address
shutdown!
interface GigabitEthernet9/6
interface GigabitEthernet9/7
interface GigabitEthernet9/8
interface GigabitEthernet9/9
switchport!
interface GigabitEthernet9/10
switchport
shutdown
speed nonegotiate
interface Vlan20
standby 20 ip 10.9.20.254
standby 20 preempt
The VLAN configuration of RAN6513-2 should match that of RAN6513-1. Besides, you
need to configure router 6513S:
interface Vlan10
standby 10 ip 10.9.10.254
standby 10 preempt
interface Vlan20
standby 20 ip 10.9.20.254
standby 20 preempt
1. Switch 6513 adopts the HSRP protocol, which can greatly improve redundancy
and stability of the network.
2. As shown in the above figure, there is only one uplink from a site to BSC. The
different VLANs correspond to different master routers, so their uplinks are
different.
3. There are two downlinks to realize load balance and mutual backup.
4. As shown in the above figure, the failure in any node (on a single link and
switch) will not influence communication of the whole network.
5. The larger the priority value is, the higher the priority is. In VLAN10, the priority
of router 6513A (priority 110) is higher than the router 6513S (priority 100).
Therefore, router 6513A is the master router of VLAN10, and the site data in
VLAN10 will be forwarded to BSC through router 6513A. In VLAN20, the
priority of router 6513S (priority 110) is higher than router 6513A (priority 100).
Therefore, router 6513S is the master router of VLAN20, and the site data in
VLAN20 will be forwarded to BSC through router 6513S.
6. Static routing is used for data packet forwarding between switch 6513 and
BSC. Between switch 6513 and the sites, the data packets need to go through
L2 switching, and the VLAN interface acts as the gateway.
An L2 switch can provide L2 switching at the port rate of 100M/1000M. It does not
support route switching, and is normally used in LANs.
Required Environment
Objective
Configuration Instance
~~~~~~~~~~~~~~~~~~
Enter configuration commands, one per line. End with CNTL/Z. System prompt
SW50A(config)#enable password cisco Set the user password. This password is not
encrypted and is used when you enter the privileged mode.
Note: The secret ciscopassword has higher precedence than the user password.
Therefore, if you have set the secret ciscopassword, you are required to enter the
secret ciscopassword instead of the user password in login. Besides, the secret
ciscopassword is displayed after encryption. However, you can also encrypt the user
password by using the service password-encryption command.
SW50A(config)#line vty 0 4 Enter the VTY virtual link 0-4, where VTY is the
virtual link for Telnet login.
Note: Switch 2950 supports 16 telnet virtual links (0-15). 0-4 is the default value.
With this default setting, five telnet virtual links can be connected at the same time. 0
must be included in the default setting. That is to say, you cannot use 1-5, and the
default setting must be 0-4.
Building configuration...
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 100
IP Application Guide Internal Use Only▲
Current configuration : 1583 bytes This is the size of the configuration file, and it will
increase with the increase of configurations.
no service pad
service password-encryption!
enable password 7 030752180500 This is the password display after you use the
service password-encryption command to encrypt the password. 7 means that the
encryption adopts the bi-directional method.
ip subnet-zero!
spanning-tree mode pvst This is the spanning tree mode, which will be described
later.
interface FastEthernet0/1
no ip address...
interface FastEthernet0/24
no ip address
interface Vlan1
no ip address
no ip route-cache
ip http server!
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 101
IP Application Guide Internal Use Only▲
line con 0
login
line vty 0 4
password 7 13061E010803 Show the encrypted password for logging into VTY
virtual link 0-4
login
line vty 5 15 No password is set for VTY virtual link 5-15, so they cannot be
used.
login
end
The VLAN technique is widely used in current enterprise and campus networks. Before
we talk about VLAN, we must be familiar with two concepts. The first is broadcast --- the
communication method in which one node sends data to all the other nodes in the
subnet is called broadcast communication. ARP is an instance of broadcast
communication. The second is broadcast domain --- the physical range that the
broadcast data can reach. Generally speaking, a network segment is a broadcast
domain, such as the network segment formed by a port of a router. Here we talk about
L2 switching. An L2 switch and all users connected with it will form a broadcast domain.
If there are too many users, and it requires multiple switches to mutually add ports, the
range of the broadcast domain will be expanded to the multiple switches.
Required Environment
Objective
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 102
IP Application Guide Internal Use Only▲
Configuration Instance
Configure VLANs according to the above figure. You need to note the differences
between the config mode and the vlan database mode. Actually the vlan database mode
will disappear in the future (IOS will not support it).
After you have set the VLANs, you need to assign interfaces to them. At this time, you
need to note the range command, because it is not supported by some types of
equipment (for their IOS versions are low). Then we need to verify the configurations by
using the show vlan command.
Last, let's see how to delete VLANs. In the config or vlan database mode, the command
to delete VLANs is no vlan xx. Note that before you delete a VLAN, you need to release
the related interface from this VLAN. Otherwise the interface will be in the inactive status
(hidden), in which case you have to use the default interface f0/x command to restore
the default value of the interface.
Enter configuration commands, one per line. End with CNTL/Z. System prompt
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 103
IP Application Guide Internal Use Only▲
VLAN 20 modified:
Name: yanfa
VLAN 30 added:
Name: caiwu
SW50A(vlan)#exit Exit from the database mode (use exit to save and
then exit. Here you cannot press ctrl+z to exit).
APPLY completed.
Exiting....
SW50A#show vlan View the current VLAN setting (actually this is to view
the contents in the VLAN database).
2 VLAN0002 active
Note: Because we did not set a name for VLAN2, VLAN2 uses the default name
VLAN0002.
10 OMCB active
20 OMCR active
30 EMS active
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 104
IP Application Guide Internal Use Only▲
------------------------------------------------------------------------------
~~~~~~~~~~~~~~~~~~~
SW50A(config-if)#interface range f0/1 -5,f0/7 Enter interface F0/1 to F0/5 and F0/7
(use range to enter a group of interfaces)
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 105
IP Application Guide Internal Use Only▲
Note: You can use the range command to enter a group of interfaces at the same time.
This can save a lot of time for you. Use space plus – between successive interfaces, and
use space plus comma between non-successive interfaces. Old versions of IOS does
not support the range command, such as the default IOS of 2924.
1 default active
Fa0/5, Fa0/7
Fa0/15, Fa0/20
Fa0/21, Fa0/22
------------------------------------------------------------------------------
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 106
IP Application Guide Internal Use Only▲
~~~~~~~~~~~~~~~~~~~
Note: The management VLAN is used for equipment management. Set an IP address for
the management VLAN, and you can perform management operations very
conveniently. Normally, the management VLAN is not assigned to users. By default,
VLAN1 is the management VLAN. In versions after IOS12.0, you can set the
management VLAN by setting the IP address. For example, the following shows how to
set VLAN2 as the management VLAN.
SW50A#configure terminal
SW50A(config-if)#end
Note: In an L2 switch, there can only be one management VLAN. That is, the IP address
of only one VLAN is activated and can be used (there can be only one manageable IP
address). If you have set IP addresses for multiple VLANs, only one of them is in the no
shutdown status.
Routers work in the third layer of the OSI model, that is, the network layer. They use the
“logical” network addresses (IP addresses) defined by the network layer to identify
different networks, and realize the interconnection and segregation of the networks, to
maintain the independence of each network. Routers do not forward broadcast
messages. Instead, they confine the broadcast messages within their own networks.
Data sent to other networks should be sent to routers first, and then forwarded by the
routers.
Required Environment
Objective
Configuration Instance
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 107
IP Application Guide Internal Use Only▲
interface FastEthernet0/1
no shutdown
We know that different VLANs of a switch cannot communicate with each other directly.
In enterprise networks, VLANs are normally segregated according to the organizational
structures of the enterprises. We may wonder "Don't the different departments in an
enterprise make data communication with each other at all, since they belong to different
VLANs?" Actually, the answer is yes, but the communication between different
departments needs control.
Required Environment
Objective
Configuration Instance
Enter configuration commands, one per line. End with CNTL/Z. System prompt
SW50A(config-if)no shutdown
SW50A(config)#int vlan 20
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 108
IP Application Guide Internal Use Only▲
SW50A(config-if)no shutdown
SW50A(config-if)#switchport mode trunk Set the current port as the trunk port,
and the mode is on (enabled).
Note: The system prompts that port f0/1, f0/3, and f0/5 are in the UP status.
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 109
IP Application Guide Internal Use Only▲
Required Environment
Objective
1. When a router uses the VRRP function, it will define its role in the backup
group according to the priorities. The router with the highest priority becomes
the master router, and routers with lower priorities become backup routers. The
master router will send VRRP notification packets periodically, to inform other
routers in the backup group that it is working normally. The backup routers will
start the timer and wait for the notification packets.
2. In the preemptive mode, when a backup router receives the VRRP notification
packets, it will compare its own priority with the priority in the packets. If its own
priority is higher, it will become the master router; otherwise, it remains the
backup status.
3. In the non-preemptive mode, as long as the master router can work normally,
routers in the backup group will remain their own status. Even if a backup
router is configured with a higher priority later, it will not become the master
router.
4. If a backup router has not received the VRRP notification packets from the
master router when its timer times out, it will assume that the master router has
already failed. At this time, the backup router will assume that it is the master
router, and it will send VRRP notification packets. Then routers in the backup
group will re-elect a master router to take on the function of packet forwarding,
based on the priorities.
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 110
IP Application Guide Internal Use Only▲
Configuration Instance
Router:
interface supervlan35
vrrp 53 ip 10.19.35.254
Router2:
interface supervlan35
ip address 10.19.35.253255.255.254.0
vrrp 53 ip 10.19.35.254
8 Troubleshooting
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 111
IP Application Guide Internal Use Only▲
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 112
IP Application Guide Internal Use Only▲
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 113
IP Application Guide Internal Use Only▲
Exceptional packet capturing may have the following features (they may not
occur at the same time):
Phenomenon Possible Cause Handling Measure
Request the SP to export the MAC
forwarding tables of all GEs and FEs
in the domain, and find out the site
The traffic in packet capturing whose MAC table entries exceed 12.
is quite heavy, which is an Then request the SP to disconnect
obvious sign of the existence The network has this site (note that if there is a
of broadcast strom (for loops. microwave site under an FE port, its
example, there are more than MAC entries are more than those of
100 messages per second). the common sites, which is normal).
After you find out the doubtful site, go
to the site and check it.
The core switch at the RAN For the first possible cause: Request
side sends a large number of the SP to export the MAC forwarding
ARP requests, querying the tables of all GEs and FEs in the
MAC address of BTS; domain, and find out the site whose
At the same time, there are 1. Site FE Modem MAC table entries exceed 10. Then
many ARP requests from BTS. has configured request the SP to disconnect this site
Sometimes you can see that loopback. (this measure does not apply to a
one BTS sends four ARP 2. SP has network microwave site).
requests in one millisecond, problems. For the second possible cause: An L2
but it is not obvious broadcast test needs to be deployed between
storm. BMI/BPO and the sites. If the test
There are MAC conflict alarms result is not good, analyze it together
reported by BTS on OMCB. with the SP.
For the first possible cause: Execute
show arp on the core switch at the
RAN side (which is the source of the
packets) to find out the ARP entry
corresponding to the destination IP
1. The ARP table on address, and see whether the current
6513 is too old. age value is very large (for BTS,
Unicast packets whose normally this value will not exceed one
2. The MAC
destination IP address is not minute). If this value is very large, it
forwarding table
the local equipment room are means that the core switch at the RAN
of the SP has
captured. side has not learnt the MAC of the
problems.
destination IP for a long time, and you
need to give special attention to the
equipment corresponding to this IP
address.
For the second possible cause: Send
the packet capturing result to the SP
for analysis.
An unknown IP address An unknown device Find out the MAC address of this
(source IP address or has entered the device. Then log in to the switch that
destination IP address) is network. all sites in this domain are connected
captured. Or an unknown to, and execute show MAC table to
MAC address (source address find out the site corresponding to this
or destination address) is MAC address.
captured. Valid MAC Or you can find out the MAC address
addresses are the MAC of this device, and request the SP to
addresses of the networking export the MAC forwarding tables of
devices (you can use all GEs and FEs in this domain, to find
Wireshark to automatically out the site port corresponding to this
distinguish them). MAC address.
This IP address or MAC
address brings a lot of
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 114
IP Application Guide Internal Use Only▲
9 New Functions in R9
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 115
IP Application Guide Internal Use Only▲
Figure New Functions in R9-5 Parameters Configured for the Physical interface
Figure New Functions in R9-7 Parameters Configured for the Policy Table
******************EthPort Print**********************
0 IP1: 0x0 IP2: 0x0 IP3: 0x0 IP4: 0x0 Mac: 0-d0-d0-a0-69-12 Mtu: 0x5dc
1 IP1: 0x0 IP2: 0x0 IP3: 0x0 IP4: 0x0 Mac: 0-d0-d0-a0-2-77 Mtu: 0x5dc
2 IP1: 0x77131212 IP2: 0x0 IP3: 0x0 IP4: 0x0 Mac: 0-d0-d0-a0-2-88 Mtu:
0x5dc
3 IP1: 0x0 IP2: 0x0 IP3: 0x0 IP4: 0x0 Mac: 0-d0-d0-a0-2-55 Mtu: 0x5dc
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 116
IP Application Guide Internal Use Only▲
When the real interfaces are enabled, you can see the IP addresses, which
means that the configuration is valid.
MNIC_2_23XX->ip_print_if
========== Outer and Virtual Port Net_If Information ==========
name port(ss-m-u-su-p) v4_mtu v6_mtu NF_STAT
DRV_STAT MSFLAG RIM_FLAG
0:1:721:1:3 0-1-721-1-3 1500 1500 UP UP Master
0
ipv4_address=119.19.18.18,pfx_len=24
IPv6 LinkLocal Address: fe80::02d0:d0ff:fea0:0288, state:32, scope id 3
IPv6 Global Unicast Address:
IPv6 Multicast Address:
[1] ff02:0003::0001:ffa0:0288,scope id 3
[2] ff02:0003::0009,scope id 3
[3] ff02:0003::0006,scope id 3
[4] ff02:0003::0005,scope id 3
[5] ff01:0003::0001,scope id 3
[6] ff02:0003::0002,scope id 3
[7] ff02:0003::0001,scope id 3
The port status is UP, which means that the interface is already enabled.
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 117
IP Application Guide Internal Use Only▲
[3] ff02:0005::0006,scope id 5
[4] ff02:0005::0005,scope id 5
[5] ff01:0005::0001,scope id 5
[6] ff02:0005::0002,scope id 5
[7] ff02:0005::0001,scope id 5
MNIC_2_23XX->Np_SubIfVpnAttr_Display
Sub_VlanID: 0x 1 Sub_VRF: 0x 0 PortNo: 0x 13 N:0x0
CosPolicyTabNum: 0x 1 CosPolicyType: 0x 1 MTU:0x 5dc IP0:
0x77133264, IP1: 0x0, IP2: 0x0, IP3: 0x0
Check whether the policy table is bound with the port of the interface
board:
MNIC_2_23XX->PolicyMapDbgShowBind
service-policy configuration:
port policy-table direct
-----------------------------------------------------
0:1:721:1:196609 1 output
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 118
IP Application Guide Internal Use Only▲
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 119
IP Application Guide Internal Use Only▲
support access to more than two switches by different ports, while the
switches can be in the active/standby mode or load sharing mode.
(2) When there is a transmission problem or a switch fails, BSC can switch
the traffic to the normal ports in the way of active/standby switchover or
load sharing, without interrupting the services.
(3) Abis, A, and Gb interfaces should be supported.
Equipment compatibility and Function Compatibility
(1) The above networking methods apply to IPBB, IPI, and IPGB.
(2) The Gb interface does not support active/standby board configuration.
(3) For the BFD function configuration, the switch needs to support the static
BFD function.
Configurations to Enable the Function
For configurations to enable the BFD function, please refer to document
ibscV6.20.60BFD Configuration Description.doc.
Operations to Verify the Configurations
(1) In the debugging and testing view of the OMCR at the iBSC side, use the
traceroute function to check whether the intermediate network
configuration is complete.
(2) Perform service tests, to ensure the validity of all configurations.
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 120
IP Application Guide Internal Use Only▲
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 121
IP Application Guide Internal Use Only▲
The static route network prefix is the network address of the destination IP address.
The next hop is configured to the interface IP address of the router that is directly
connected with the outbound interface.
For sessions created in this way, their source address is the outbound interface whose
IP address is in the same network segment as the next hop, and their destination
address is the next hop.
At this time, parameters of the BFD sessions are the default parameters (you can also
modify them).
The fourth option in the above page is the identifier of the authentication, and
the sessions can use it.
Different types of authentication have different numbers of keys.
ZTE Confidential Proprietary © 2018 ZTE CORPORATION. All rights reserved. 122