292616319 Liquid Applications System Description PDF

Embed Size (px)

Citation preview

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    1/40

     

    Liquid Applications System Description

    Issue 01

     

    Nokia Siemens Networks is continually striving to reduce the adverse environmental effects of

    its products and services. We would like to encourage you as our customers and users to join

    us in working towards a cleaner, safer environment. Please recycle product packaging and

    follow the recommendations for power use and proper disposal of our products and their compo-

    nents.

    If you should have questions regarding our Environmental Policy or any of the environmental

    services we offer, please contact us at Nokia Siemens Networks for any additional information.

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    2/40

    2

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3e47a

    The information in this document is subject to change without notice and describes only the

    product defined in the introduction of this documentation. This documentation is intended for the

    use of Nokia Siemens Networks customers only for the purposes of the agreement under whichthe document is submitted, and no part of it may be used, reproduced, modified or transmitted

    in any form or means without the prior written permission of Nokia Siemens Networks. The

    documentation has been prepared to be used by professional and properly trained personnel,

    and the customer assumes full responsibility when using it. Nokia Siemens Networks welcomes

    customer comments as part of the process of continuous development and improvement of the

    documentation.

    The information or statements given in this documentation concerning the suitability, capacity,

    or performance of the mentioned hardware or software products are given "as is" and all liability

    arising in connection with such hardware or software products shall be defined conclusively and

    finally in a separate agreement between Nokia Siemens Networks and the customer. However,

    Nokia Siemens Networks has made all reasonable efforts to ensure that the instructions

    contained in the document are adequate and free of material errors and omissions. Nokia

    Siemens Networks will, if deemed necessary by Nokia Siemens Networks, explain issues which

    may not be covered by the document.

    Nokia Siemens Networks will correct errors in this documentation as soon as possible. IN NO

    EVENT WILL Nokia Siemens Networks BE LIABLE FOR ERRORS IN THIS DOCUMENTA-

    TION OR FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO SPECIAL, DIRECT, INDI-

    RECT, INCIDENTAL OR CONSEQUENTIAL OR ANY LOSSES, SUCH AS BUT NOT LIMITED

    TO LOSS OF PROFIT, REVENUE, BUSINESS INTERRUPTION, BUSINESS OPPORTUNITY

    OR DATA,THAT MAY ARISE FROM THE USE OF THIS DOCUMENT OR THE INFORMATION

    IN IT.

    This documentation and the product it describes are considered protected by copyrights and

    other intellectual property rights according to the applicable laws.

    The wave logo is a trademark of Nokia Siemens Networks Oy. Nokia is a registered trademark

    of Nokia Corporation. Siemens is a registered trademark of Siemens AG.

    Other product names mentioned in this document may be trademarks of their respectiveowners, and they are mentioned for identification purposes only.

    Copyright © Nokia Siemens Networks 2013/11/7. All rights reserved

    f Important Notice on Product SafetyThis product may present safety risks due to laser, electricity, heat, and other sources

    of danger.

    Only trained and qualified personnel may install, operate, maintain or otherwise handle

    this product and only after having carefully read the safety information applicable to this

    product.

    The safety information is provided in the Safety Information section in the “Legal, Safety

    and Environmental Information” part of this document or documentation set.

    The same text in German:

    f Wichtiger Hinweis zur ProduktsicherheitVon diesem Produkt können Gefahren durch Laser, Elektrizität, Hitzeentwicklung oder

    andere Gefahrenquellen ausgehen.

    Installation, Betrieb, Wartung und sonstige Handhabung des Produktes darf nur durch

    geschultes und qualifiziertes Personal unter Beachtung der anwendbaren Sicherheits-

    anforderungen erfolgen.

    Die Sicherheitsanforderungen finden Sie unter „Sicherheitshinweise“ im Teil „Legal,

    Safety and Environmental Information“ dieses Dokuments oder dieses Dokumentations-

    satzes.

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    3/40

    Issue 01

    3

    Liquid Applications System Description

    Id:0900d80580a3e47a

    Table of ContentsThis document has 40 pages.

    1 Introduction to Liquid Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71.1 Mobile edge computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    1.2 Benefits of proximity and context. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    1.3 Monetization opportunities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

    2 System overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

    2.1 RACS deployment scenarios. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

    2.2 Release principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

    3 Radio Applications Cloud Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    3.1 Product concept. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    3.1.1 Telecom and IT domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    3.2 High-level architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

    3.3 RACS hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

    3.4 Site configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    3.5 Cabling options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

    3.6 Software provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

    3.7 Network integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

    3.7.1 Transport network integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

    3.7.2 LTE U-plane integration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

    3.7.3 LTE C-plane integration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    3.8 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

    3.8.1 Server security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243.8.2 Sever O&M security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

    3.8.3 Application framework O&M security. . . . . . . . . . . . . . . . . . . . . . . . . . . 25

    3.8.4 Backhaul security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

    3.8.5 Application security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

    3.9 Capacity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

    4 RACS-C and RACS-T . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    4.1 Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    4.1.1 RACS-C. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    4.1.2 RACS-T . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    4.1.3 Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    4.2 Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

    5 Operation, administration, and maintenance . . . . . . . . . . . . . . . . . . . . . 30

    5.1 NetAct . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

    5.2 Application Framework Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

    6 Embedded applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

    6.1 Content Optimization and Delivery . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

    6.1.1 Content Caching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

    6.1.2 DNS Caching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

    6.1.3 Video Prioritization and Pacing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

    6.2 TCP Header Enrichment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    4/40

    4

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3e47a

    7 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

    8 Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    5/40

    Issue 01

    5

    Liquid Applications System Description

    Id:0900d80580a3e47a

    List of FiguresFigure 1 LA system and product structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

    Figure 2 RACS deployment scenarios. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

    Figure 3 Release principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

    Figure 4 RACS, RACS-C, and RACS-T Applications vs. Remote Applications. . 12

    Figure 5 RACS - product concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    Figure 6 Telecom and IT domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

    Figure 7 RACS with Traffic Offload Function (TOF). . . . . . . . . . . . . . . . . . . . . . . 15

    Figure 8 LA10 RACS high level architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

    Figure 9 FBSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    Figure 10 Flexi Multiradio 10 BTS site configuration . . . . . . . . . . . . . . . . . . . . . . . 17

    Figure 11 Flexi Multiradio BTS site configuration. . . . . . . . . . . . . . . . . . . . . . . . . . 18

    Figure 12 Cabling options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

    Figure 13 FBSA connectivity with Flexi Multiradio BTS . . . . . . . . . . . . . . . . . . . . . 19Figure 14 Connectivity with Flexi Multiradio 10 BTS . . . . . . . . . . . . . . . . . . . . . . . 20

    Figure 15 U-plane network architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

    Figure 16 TTP policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    Figure 17 Cell trace interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

    Figure 18 Throughput performance dimensioning . . . . . . . . . . . . . . . . . . . . . . . . . 27

    Figure 19 Operability domains and tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

    Figure 20 Transparent Content Caching - High Level Architecture . . . . . . . . . . . . 34

    Figure 21 Content Caching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

    Figure 22 DNS Caching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

    Figure 23 TCP Header Enrichment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    6/40

    6

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3e47a

    List of TablesTable 1 System release and network elements . . . . . . . . . . . . . . . . . . . . . . . . . . 9

    Table 2 Embedded applications in LA10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

    Table 3 Ethernet interfaces and IP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

    Table 4 Embedded applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    7/40

    Issue 01

    7

    Liquid Applications System Description Introduction to Liquid Applications

    Id:0900d80580a3fb91

    1 Introduction to Liquid ApplicationsThe demand for data-enabled mobile devices, such as smartphones, causes an

    increase in mobile broadband traffic within the network of an operator. This trend is

    expected to continue, especially with the widespread roll-out of Long Term Evolution

    (LTE), which offers increased data rates over mobile networks. Because of increasing

    mobile broadband traffic, operators are expected to provide a superior experience for

    the customers and create new value from network infrastructure, based on the individual

    and personalized applications and services.

    Liquid Applications (LA) is an innovative network technology that provides a unique and

    enhanced mobile broadband experience and drives new value for the operators. LA

    transforms the base station into a value creation engine through applications, services,

    and content that is placed in close proximity with the mobile subscribers. Moving the

    content at the edge of the mobile network provides a more responsive experience as it

    is delivered with lower latency. In addition, content and applications can interact in real-

    time with the subscriber, in terms of their individual needs, location and social-based

    preferences, making their experience completely personal.

     As the primary source of revenue like voice and messaging continue to decline, because

    of the rise of over-the-top (OTT) services, LA enables operators to generate new forms

    of revenue from new business models, services, and applications.

    1.1 Mobile edge computing

    LA is the new mobile edge computing platform from NSN. At the heart of LA is the Radio

     Applications Cloud Server (RACS) which re-defines the role of the base station through

    applications, services and content placed in close proximity to mobile subscribers and

    by using real-time network information to offer personalized services.

    The RACS deploys the latest cloud technology and service creation capabilities into the

    base station, enabling the collection of real-time network data such as radio conditions,

    subscriber location, direction of travel, and more. These data are used by applications

    to offer context-relevant services that transform the mobile broadband experience.

    1.2 Benefits of proximity and context

    Content located at the base station provides key advantages in terms of user experi-

    ence. It reduces the need for the content to be pulled from the Internet and across the

    mobile network whenever it is requested. This is facilitated by a cache located inside the

    base station which contains frequently requested or popular content that can be deliv-

    ered directly to the mobile subscriber over the radio interface every time it is requested.

    Content that is accessed from the base station is five times faster than from caches

    located elsewhere in the network.

    To provide a contextual experience, real-time radio data can be extracted from inside

    the base station to enable location-specific content, such as hyper-targeted advertising

    from nearby businesses, or information about tourist and visitor attractions within the

    area. This real-time data exposure will open-up fresh and exciting opportunities to pos-

    itively impact the mobile broadband experience of the subscribers with personalized

    service offerings and improved performance.

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    8/40

    8

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3fb91

    Introduction to Liquid Applications

    1.3 Monetization opportunities

    The RACS extends applications and services that normally reside within the Internet or

    the centralized core and data centers of operators, to the very edge of the network. An

    operator's dense network of base stations is transformed by the RACS into numerousvalue creation engines. The RACS enables innovative, low-latency services, such as

    mobile gaming and augmented reality, and accelerates media-rich applications that

    deliver an enhanced quality of experience for the mobile subscriber.

    The RACS processes large amount of data in real-time that are complex and costly to

    deliver on a traditional centralized cloud. The following key features enable a base

    station to become a value creation engine:

     • Network efficiency – Load in other parts of the network is reduced with the content

    stored inside the base station, which leads to saving and reducing of the Total Cost

    of Ownership (TCO).

     • Application connectivity – To improve the user experience through real-time con-

    textually-aware applications and services, real-time data that resides on or off the

    base station is extracted and exposed to applications.

     • Distributed Cloud architecture – A dense network of computing and storage loca-

    tions at the very edge of the mobile network approximates data centers rather than

     just improving their computation. Operators will benefit in creating a distributed

    Cloud-based architecture as it will empower them to embrace big data, giving them

    the opportunity to make more money.

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    9/40

    Issue 01

    9

    Liquid Applications System Description System overview

    Id:0900d80580a3fb9d

    2 System overviewThe first LA system release LA10 consists of the following products:

     •Radio Applications Cloud Server (RACS)

     • RACS-Tokenizer (RACS-T)

     • RACS-Core (RACS-C)

     •  Application Framework Manager (AFM)

    Figure 1 LA system and product structure shows the structure of LA system release

    LA10.

    Figure 1 LA system and product structure

    The RACS, RACS-C, and RACS-T are network elements that are managed individually.

    For more information, see 3 Radio Applications Cloud Server  and 4 RACS-C and

    RACS-T.

     Table 1 System release and network elements shows the respective network element

    software (SW) releases and the supported hardware (HW)

    The RACS application platform and RACS applications are managed using AFM. For

    more information on AFM, see 5.2 Application Framework Manager . LA10 supports four

    Embedded Applications, created by NSN. For more information on Embedded Applica-

    tions, see 6 Embedded applications.

    2.1 RACS deployment scenarios

    LA10 has been developed for LTE macro base station (eNB) deployment. This includes

    both Distributed RAN (DRAN) and Centralized RAN (CRAN) scenarios. For the CRAN

    (baseband hotel) scenario, there is a one-to-one mapping between the Flexi System

    Module and RACS. Figure 2 RACS deployment scenarios shows the deployment sce-

    narios of LA. LTE base station deployment is designed for LA system release LA10,

    while aggregation and RNC deployments are planned for future releases.

    UE eNB RACS

    MobileBackhaul

    RACS-T SAE-GW RACS-C

     AFM

    NetAct

    Internet

    Server 

    System

    Release

    RACS RACS-C RACS-T

    SW release supported HW SW release supported HW SW release supported HW

    LA10 RACS 1.0 FBSA, FBXA RACS-C 1.0 HP DL380 Gen8 RACS-T 1.0 HP DL380 Gen8

    Table 1 System release and network elements

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    10/40

    10

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3fb9d

    System overview

    Figure 2  RACS deployment scenarios

    2.2 Release principles

    LA is based on the LTE and WCDMA system releases, but it is not part of these system

    releases. As a result, LA uses features provided by the LTE and WCDMA system

    releases. For example, the first LA system release LA10 is based on RL40 and the

    second release LA20 is planned to be based on RL50. LA20 will be backwards compat-

    ible with RL40. Figure 3 Release principles shows the release principles of the software

    life cycles with respect to the application types of the LA

    LTEbase station

    FlexiMultiradio (10) BTS

    Low-order Aggregation(Access)Site

    High-order Aggregation Site Backbone Site (GW)

    Aggregation

    RNC

    RNC

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    11/40

    Issue 01

    11

    Liquid Applications System Description System overview

    Id:0900d80580a3fb9d

    Figure 3 Release principles

    The RACS, RACS-C, and RACS-T applications are application software that run on the

    RACS, RACS-C, and RACS-T platforms. There are two types of application, having dif-

    ferent life cycle management characteristics:

    • Embedded Applications - are created by NSN and provided as part of a system

    release.

     •  Add-on Applications - can be created by NSN or 3rd parties (for example, Inde-

    pendent Software Vendors) and provided independently from the LA systemrelease. The latter concept allows a faster release cycle than what is possible from

    telecom-based network elements.

    Embedded applications in LA10 is shown in Table 2 Embedded applications in LA10.

    There are applications that require software to run on other network elements. These

    applications are known as Remote Applications, which are located either in the core

    network or on the internet. Figure 4 RACS, RACS-C, and RACS-T Applications vs.

    Remote Applications shows the comparison between the RACS, RACS-C, and RACS-

    T applications and Remote applications.

    Embedded applications

    Life cycle management Related to LA

    Ownership NSN

    Storage NOLS

    SW management (installation) Using NetAct

    Deployment (Activation/Deactivation) Using AFM

    Table 2  Embedded applications in LA10

    Embedded applications

    LA System Release

    App1

    LA10 LA20 LA30

    API, resources API, resources

    RACS Applications

    Add-on Applications   App2

    App3

    Supporting features

    RL40

    Supporting features

    RL50

    Supporting features

    RL60, RU50

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    12/40

    12

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3fb9d

    System overview

    Figure 4 RACS, RACS-C, and RACS-T Applications vs. Remote Applications

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    13/40

    Issue 01

    13

    Liquid Applications System Description Radio Applications Cloud Server  

    Id:0900d80580a3fb97

    3 Radio Applications Cloud Server The key element of the LA system is the RACS. The RACS is a new network element in

    the Radio Access Network (RAN). For the RACS 1.0, the RACS is connected to the

    Long Term Evolution (LTE) base station (eNB).

    3.1 Product concept

    The RACS is an application server capable of providing computing resources, storage

    capacity, and connectivity. The principles of established cloud computing were adopted

    to accelerate the development of application software (known as RACS Applications)

    running on the RACS. Initially, RACS implements the Infrastructure-as-a-Service (IaaS)

    concept where the applications reside in their dedicated Virtual Machines (VM). Support

    for Java applications using Platform-as-a-Service (PaaS) principles is planned for future

    releases.

    The RACS provides a standard runtime environment for applications through virtualiza-

    tion. The RACS applications have access to LTE User plane (U-plane) and Control

    plane (C-plane) data through the defined Application Programming Interfaces (APIs).

    This is shown in Figure 5 RACS - product concept.

    g In RACS 1.0, APIs are only exposed towards Embedded Applications. For RACS 2.0, itis planned to extend this towards Add-on Applications.

    Figure 5  RACS - product concept

    3.1.1 Telecom and IT domains

    The IT domain (refers to the user applications, servers, and the IP traffic in between) is

    separated from the telecom domain based on the 3rd Generation Partnership Project

    (3GPP) design principles. Figure 6 Telecom and IT domain shows the relationship

    between the telecom and IT layer. From the perspective of the UE, the first network

     App N  App 1

    Radio ApplicationsCloud Server 

    App

    1

    App

    N

    Application Platform

    Hardware

    eNB

    NodeB RNC

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    14/40

    14

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3fb97

    Radio Applications Cloud Server 

    element that has access to the user's IP traffic is the System Architecture Evolution

    Gateway (SAE-GW) in the Core Network (CN). Normally, mobile networks were built

    with few centralized CNs. This resulted to CN elements being away from the UEs in

    terms of networking. Geographical distance turns into propagation delays, which is

    further increased by latencies introduced by the many networking hops in between. Fur-

    thermore, the Mobile Backhaul (MBH) network is a significant cost factor for the opera-

    tors. In most cases, over-dimensioning is prohibitive, so traffic congestion may occur.

    This has an impact on the service quality, perceived as Quality-of-Experience (QoE) by

    the mobile subscriber.

    Figure 6  Telecom and IT domain

    The separation between the Radio Access Network (RAN) and the CN defined by 3GPP

    is another drawback because most of the real-time information related to the radio inter-

    face is hidden in the RAN. Not even the CN elements of the operator can access this

    data. The availability of this information is very useful to improve the quality of many ser-

    vices.

    To address the above-mentioned issues, the RACS intercepts the U-plane. This is

    shown in Figure 7 RACS with Traffic Offload Function (TOF). The RACS implements a

    Traffic Offload Function (TOF) so that the software running on the RACS has full access

    to the IP traffic of the user. Note that the RACS does not conflict with 3GPP protocols.

    Through a proprietary interface, the RACS has real-time access to the 3GPP C-plane

    and Radio Resource Management (RRM) information in the eNB.

    UE eNB

    MobileBackhaul

    SAE-GW

    Internet

    Server 

    UserApp

    IP

    PDCP

    LTE MAC

    LTE PHY LTE PHY

    LTE MAC

    PDCP

    GTP-U

    UDP

    Eth MAC

    Eth PHY

     Application IP (NAT)

    GTP-U

    UDP

    Eth PHY

    Eth MAC   Eth MAC

    Eth PHY Eth PHY

    Eth MAC

    IP

    Server AppIT Domain

    Telecom Domain (3GPP)

    3GPP-TNL IPIP IP

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    15/40

    Issue 01

    15

    Liquid Applications System Description Radio Applications Cloud Server  

    Id:0900d80580a3fb97

    Figure 7  RACS with Traffic Offload Function (TOF)

    3.2 High-level architecture

    The LA software is divided into two major components: LA10 RACS Platform and LA10

    RACS Applications.

    The LA10 RACS Platform is subdivided into the following main components:

     • The Base Platform provides computing, storage and connectivity capabilities. The

    Base Platform is managed through NetAct.

     • The Application Platform provides the capabilities for hosting LA10 RACS Applica-

    tions. The Application Platform is managed through the Application Framework

    Manager (AFM).

    Figure 8 LA10 RACS high level architecture shows the high level architecture of LA10

    RACS. Additional value is created through Platform Services which LA10 RACS Appli-

    cations can take advantage of. Services are provided through well-documented Appli-

    cation Programming Interfaces (API). The architecture also allows LA10 RACS

     Applications to provide services to others through their own API.

    UE eNB

    MobileBackhaul

      Internet

    Server 

    User App

    IP

    PDCP

    LTE MAC

    LTE PHY LTE PHY

    LTE MAC

    PDCP

    GTP-U

    UDP

    Eth MAC

    Eth PHY

     Application IP

    IT Domain

    Telecom Domain

    3GPP-TNL IPIP

    SAE-GW

    (NAT)

    GTP-U

    UDP

    Eth MAC   Eth MAC

    IP

    RACS

    Eth PHY

    Eth MAC

    IP

    Server App

    GTP-U

    UDP

    Eth MAC

    IP

    Eth MAC

    GTP-U

    UDP

    IP

    IPIP

    RACS App

    Eth PHYEth PHYEth PHYEth PHY

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    16/40

    16

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3fb97

    Radio Applications Cloud Server 

    Figure 8  LA10 RACS high level architecture

    3.3 RACS hardware

    The FlexiBTS Server module, version A (FBSA) is the base station-specific hardware

    (HW) platform for RACS1.0.see Figure 9 FBSA.

    The FBSA module is a HW platform based on a scalable Intel x86 multi-core processor

    architecture that provides the functions to execute non-3GPP applications in a virtual-

    ized-processing environment. The module runs in a Windriver Linux 4.3 operating

    system and Kernel-based Virtual Machine (KVM)-enabled virtualization.

    The FBSA is fully compatible to the FlexiMultiradio10 BTS platform. The module is

    plugged into the Baseband (BB) extension slot of the FlexiMultiradio 10 System Module

    and thus is the most compact solution without requiring extra site cabinets or boxes. It

    covers the full temperature range of FlexiMultiradio 10 BTS and there is no need for

    additional space and power consuming heat exchange equipment.

    The FBSA main characteristics include:

     • Intel Xeon Sandy Bridge (Gladden) 4 cores at 2GHz

     • 16 Gbyte DDR-3

     • 400 Gbyte SSD storage

     • SPECInt2006_Rate: 111

     • SPECFP2006_Rate: 88

     • External interfaces:

     –  2x GE RJ-45

     –  2x 1/10 GE SFP+ (enables optical and twinax connection)

     –  -48V Power 

    Embedded Applications

     API

     VM VM

     API

     VM VM VM

     Add-on Applications

     API

    Platform Service API

    Platform Service API

    Platform Service

    Application Platforms (IaaS)

    Base Platform (Computing, Storage, Connectivity)

    Platform SW

    HW

    Radio Applciations Cloud Server (RACS)

     ApplicationManagers

     ApplicationFrameworkManager 

    NetAct

    NSN Applications 3rd Party Applications

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    17/40

    Issue 01

    17

    Liquid Applications System Description Radio Applications Cloud Server  

    Id:0900d80580a3fb97

    Figure 9 FBSA

    3.4 Site configuration

    The FBSA is designed for Flexi BTS mechanics, suitable for both indoor and outdoor

    installation. The FBSA supports zero-footprint installation with Flexi Multiradio 10 BTS.

    This is shown in Figure 10 Flexi Multiradio 10 BTS site configuration. For example, no

    extra installation space is required as the FBSA fits into one of the extension slots under-

    neath the System Module FSMF.

    Figure 10  Flexi Multiradio 10 BTS site configuration

    In case of Flexi Multiradio BTS or if both FSMF extension slots are occupied within the

    Flexi Multiradio 10, the FBSA can be installed in a separate casing with the Flexi BTS

    Server Extension Kit, version A (FBXA). This is shown in Figure 11 Flexi Multiradio BTSsite configuration.

    RACS

    (FSMF)

    hosted withSystem Module

    RF module

    FlexiMultiradio 10

    Flexi Multiradio 10System Module

    (FSMF)

    Flexi BTS Server Module (FBSA)

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    18/40

    18

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3fb97

    Radio Applications Cloud Server 

    Figure 11 Flexi Multiradio BTS site configuration

    The FBXA enables the integration of the FlexiBTS Server Module (FBSA) into Flexi

    Mutiradio BTS installations. The FBXA allows to use the FBSA module with Flexi Multi-

    radio 10 BTS installations with fully utilized FBBx extension slots in an extension config-

    uration.

    The FBXA provides the integration of the Flexi BTS Server Module into NSN's previous

    Flexi Multiradio BTS generation. This allows the operator to use the FBSA server

    module even in deployments with previous and actual Flexi Multiradio installations

    enabling a smooth transition to NSN's latest Flexi Multiradio BTS 10 solution.

    3.5 Cabling options

    There are many cabling options available, which is shown in Figure 12 Cabling options.

    FlexiMultiradio

    Flexi BTS Server Extension Kit

    (FBXA)

    Flexi BTS Server Module (FBSA)

    Extension kitfor stand-alone

    RF moduleSystem module(FSMD/FSME)

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    19/40

    Issue 01

    19

    Liquid Applications System Description Radio Applications Cloud Server  

    Id:0900d80580a3fb97

    Figure 12  Cabling options

    Connectivity with Flexi Multiradio BTS

    The connection of the FBSA with Flexi Multiradio BTS is shown in Figure 13 FBSA con-nectivity with Flexi Multiradio BTS.

    Figure 13 FBSA connectivity with Flexi Multiradio BTS

    WithoutTransportSubmodule

    WithoutServer Extension

    WithTransportSubmodule

    WithServer Extension

    Flexi Multiradio 10 BTS Flexi Multiradio BTS

    FSMF

    FBBA 1 FBSA 1

    FTIF FTIF FTIF

    FSMFFSMFFSMF

    FBBA 1 FBBA 1 FBBA 1FBSA 1 FBSA 1 FBSA 1

    FTIF FTIF FTIF

    FSMF FSMF FSMF

    FBBA 2 FBBA 2 FBBA 2 FBBA 1FBBA 1FBBA 1

    FBSA 1 FBSA 1 FBSA 1 FBSA 1

    FSME

    FTLB

    sRIO

    GE copper 

    GE opt

    TRS

    TRS TRS TRS

    TRS TRS TRS TRS

    case 1

    case 1 case 1 case 1

    case 1 case 1 case 1 case 1

    case 2 case 2 case 2 case 2

    DCOut1 DCOut2 DCOut3 DCOut4 EIF3 EIF2 EIF1 IF4 IF3 IF2 IF1

    LMP BBU OVP ETP EAC SOUT SIN RF1 RF2 RF3 EXT1 EXT2

    FSME

    DCIn DCIn DCOut DCOut Alarm

    DCIn   EIF1 EIF2 EIF3 EIF4

    FBSA

    DC-48V

    FTLB

    TRSGE Copper / Optical

    FBS Ext

    DC-48V

    LMP

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    20/40

    20

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3fb97

    Radio Applications Cloud Server 

    Flexi Multiradio 10 BTS

    The connectivity with Flexi Multiradio 10 BTS is shown in Figure 14 Connectivity with

    Flexi Multiradio 10 BTS

    Figure 14 Connectivity with Flexi Multiradio 10 BTS

    DCIn EIF1 EIF2 EIF3 EIF4

    FBBA

    FSMF

    DC-48V

    DCOut DCIn LMP EIF2/RF4 RF3 RF2 RF1 SRIO BBExt1 BBExt2 EI F1 EAC SIN SOUT

    DCIn DCOut RF/Ext   BBExt   SRIO

    TRSGE optical

    LMP

    DCIn EIF1 EIF2   EIF3   EIF4

    FBBA

    FSMF

    DC-48V

    DCOut DCIn LMP EIF2/RF4 RF3   RF2 RF1   SRIO BBExt1BBExt2   EIF1   EAC SIN SOUT

    DCIn DCOut RF/Ext BBExt SRIO

    TRSGE copper/optical

    LMP

    DCIn EIF1 EIF2 EIF3 EIF4

    EIF4 EIF3 EIF2 EIF1 IF4/8 IF3/7 IF2/6 IF1/5

    TRSGE copper 

    FBBA1

    FSMF

    DC-48V

    DCOut DCIn LMP EIF2/RF4 RF3   RF2 RF1 SRIO   BBExt1BBExt2   EIF1 EAC SIN SOUT

    DCIn   DCOut RF/Ext   BBEx t SRIO

    TRSGE copper/optical

    EIF4 EIF3 EIF2 EIF1 IF4/8 IF3/7 IF2/6 IF1/5

    TRSGE copper 

    FTIF

    FTIF

    DCIn   DCOut RF/Ext   BBEx t SRIO

    FBSA

    FBSA

    FBBA2

    FBSA

    DC-48V

    FBXA

    LMP

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    21/40

    Issue 01

    21

    Liquid Applications System Description Radio Applications Cloud Server  

    Id:0900d80580a3fb97

    3.6 Software provisioning

    The RACS supports commissioning in two stages: pre-commissioning at the factory and

    final commissioning at the BTS site. The factory pre-commissioning installs the RACS

    SW and configures the default parameters like RACS IP Address, subnet mask,gateway and certificates in FBSA HW.

    For local commissioning using the Structured Command Line Interface (SCLI), the

    RACS provides a Local Management Port (LMP). The final commissioning at the site

    provides the capabilities to setup the following:

     • the management interface (NE3S/WS) for remote management through NetAct

     • the management interface for application and cloud management through AFM

     • the interface to the eNB

    The LA10 SW (including Embedded Applications) will be shipped pre-installed on the

    FBSA. Later release upgrades might be done remotely using NetAct.

    Software Asset Monitoring (SWAM) has to be set up in the network. The activation ofEmbedded Applications is monitored using SWAM.

    3.7 Network integration

    This section provides information about the following network integration:

     • Transport network integration

     • LTE U-plane integration

     • LTE C-plane integration

    3.7.1 Transport network integrationBefore installing the RACS, the eNB is connected to the First-Hop-Router (FHR) through

    a layer-2 (Ethernet) network. see Figure 15 U-plane network architecture. Physical inte-

    gration of the RACS is done without affecting the operation of the LTE network. Network

    integration can be performed remotely as a configuration action on both eNB and FHR:

    The RACS is configured as a next hop as seen from the eNB in uplink and as seen from

    the FHR in downlink direction. This configuration is done for the the U-plane only

    (primary U-plane path). The eNB C-plane, M-plane and S-plane are not affected.

    Figure 15  U-plane network architecture

    The routing concept supports fail-safe behavior because Ethernet links between RACS

    and FHR and between RACS and eNB are supervised by Bidirectional Forwarding

    RACS

    First-Hop-Router (FHR)

    SAE-GWeNB

    Primary U-plane pathSecondary U-plane path

    MobileBackhaul

    (IP)

    MobileBackhaul(Ethernet)

    eNB integratedEthernet switch

    eNB integratedIP router 

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    22/40

    22

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3fb97

    Radio Applications Cloud Server 

    Detection (BFD). With this, both the eNB and the FHR can perform redundancy switch-

    ing, which means re-routing the traffic from the primary to the secondary U-plane path.

    The FBSA is connected to the eNB through either the EIF1 or EIF3 interface. For more

    information on FBSA, see 3.3 RACS hardware. EIF2 is allotted for the Local Manage-ment Port (LMP).

    Traffic separation

    The traffic between RACS Applications and related servers in the Core Network is called

    application plane traffic. In LA10, this applies to the traffic between the Content Optimi-

    zation and Delivery (COD) applications running on the RACS, RACS-C, and RACS-T.

    Separation between different types of traffic, like User plane (U-plane), Management

    plane (M-plane), and Application plane (A-plane) traffic, can be done optionally using

    VLAN (IEEE 802.1q).

    The RACS has access to LTE C-plane information, but this is provided through the M-

    plane. The LTE C-plane traffic bypasses RACS. As a result, C-plane is not included in

    RACS traffic separation.

    Transport QoS

    The RACS supports QoS on both the Ethernet layer (IEEE 802.1p) and on the IP layer

    (DSCP).

    3.7.2 LTE U-plane integration

    The Traffic Offload Function (TOF) in RACS is responsible for routing selected user

    traffic from/to selected applications. The traffic offload policy decision in LA10 follows a

    similar path as in the mobile packet core, for an EPS bearer / E-UTRAN Radio Access

    Bearer (E-RAB). In addition to an access decision, the policy can also set packet filters.

    The E-RAB might enter the system through the establishment of a new E-RAB or differ-

    ent handover scenarios.

    LA10 uses a static local policy decision. The policy is configured separately for each

    Traffic Termination Point (TTP) through the Application Framework Manager (AFM).

    The AFM allows different TTP Policy configurations for different RACS. The TTP policy

    can be modified during the run-time of the application and does not require restarting or

    redeploying the application. Figure 16 TTP policy shows the packet flow with the

    sequence of admission decisions that are made and the role of policy filters in overalldecision chain.

    Ethernet interface IP address Usage

    EIF1/EIF3 IP_oam external connectivity to O&Msystems (NetAct,

     AFM) and eNB integration (cell trace)

    IP_app external connectivity for RACS applications

    IP_uc gateway address for U-plane downlink traffic

    from core

    IP_ub gateway address for U-plane uplink traffic from

    eNB

    EIF2 IP_lmp local management port (LMP0

    Table 3 Ethernet interfaces and IP address

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    23/40

    Issue 01

    23

    Liquid Applications System Description Radio Applications Cloud Server  

    Id:0900d80580a3fb97

    Figure 16  TTP policy

    The optional policy filters have two categories:

     •E-UTRAN Radio Access Bearer (E-RAB) policy filters

     • packet policy filters

    The E-RAB policy filters implement E-RAB-level admission decision. The packet policy

    filters allow filtering based on IP protocol version, Network IP address, and UE IP

    address.

    The following E-RAB policy filter parameters are supported:

     • Subscriber Profile ID (SPID)

     • Quality Class Indicator (QCI)

     •  Allocation Retention Priority (ARP)

    The RACS performs U-plane interception to provide user IP layer data to the application.

    This results in decapsulation and later reconstruction of the following:

     • Transport Network Layer (TNL) IP Header (including DSCP persistence)

     • GTP-U header (including PDCP SN and GTP-U SN persistence)

    3.7.3 LTE C-plane integration

    The integration of the RACS to the control and management plane of the eNB enables

    the RACS to act as a third party trace collection entity through the cell trace interface,

    see Figure 17 Cell trace interface. Both the U-plane and C-plane data are carried

    through a single Ethernet link between the RACS and eNB.

    PDN conn./eRAB

    PDN conn./eRAB

     Application

    PDN conn./eRAB

     Application processing

     Applicationspecific filters

      Reject

    Pass

     Application policy filters

      Reject

    Pass

    eRAB policy filters

    Reject

    Pass

    Reject

    Pass

    Reject

    Pass

    eRAB ARP filters

    QCI (qualityclass indicator)

    Subscriber profile ID

     ApplicationU-planeinterface

    Packetadmission

    policy decision

    eRAB

    admissionpolicy decision

    Scope of TTP policy

    End-to-end IP trarffic

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    24/40

    24

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3fb97

    Radio Applications Cloud Server 

    Figure 17  Cell trace interface

    The NetAct TraceViewer application is used for the configuration of the cell trace inter-

    face at the eNB.

    The RACS monitors cell trace signaling and detects creation, modification and deletion

    of E-RABs. The procedures that triggers offload start are:

     • S1AP - E-RAB setup, E-RAB modify, initial context setup, UE context modification,

    and incoming S1 handover 

     • X2AP - incoming X2 handover 

    The procedures that triggers offload termination are:

     • S1AP: E-RAB Modify, E-RAB release, UE context modification, outgoing S1 han-

    dover, Reset

     • X2AP: outgoing X2 handover 

    3.8 Security

    This section provides information about the following RACS security features:

     • Server Security

     • Server O&M Security

     •  Application Framework O&M Security

     • Backhaul Security

     •  Application Security

    3.8.1 Server security

    The server security feature provides hardware and software protection for the RACS. It

    includes the following sub-features:

     •

     AES-based disk encryption • Secure boot preparations

     • Pre-Installed vendor certificate

     • Double authentication for root account

    AES based disk encryption

    The AES-based disk encryption sub-feature adds a physical security layer to the data

    stored on the integrated Solid State Disks (SSD). It provides a hardware-based mecha-

    nism for encryption and decryption of user data without performance impact.

    The AES-based disk encryption prevents critical data on the SSD to be read or cloned

    by putting the SSD in another computing device with a SATA interface. The data on the

    SSD cannot be modified offline in unattended situations.

    RACS

    MobileBackhaul

    Cell TraceInterface

    S1

    eNBUE SAE-GW

    TOF

    TOF   Traffic Offload Function

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    25/40

    Issue 01

    25

    Liquid Applications System Description Radio Applications Cloud Server  

    Id:0900d80580a3fb97

    The AES encryption is according to Federal Processing Standards (FIPS)

    Publication197. An AES key length of 128 is the minimum requirement.

    Secure Boot preparations

    The secure boot preparations sub-feature ensures that only authenticated and integrity-checked boot code, OS code, and application code is allowed to go into service. It allows

    the operator, in future releases, to upgrade to a secure boot environment without site

    maintenance.

    Pre-Installed vendor certificate

    The NSN vendor certificate is an individual certificate, which contains the FBSA's serial

    number, public key, certificate's validity period, and the NSN factory Certification Author-

    ity's (CA) signature. The NSN vendor certificate is pre-installed into the FBSA during

    production.

    This certificate may be used in later releases to authenticate the FBSA as genuine NSN

    hardware to an operator's Public Key Infrastructure (PKI).

    Double authentication for root account

    Double authentication for the root account is a concept where the access is granted to

    two super users simultaneously, to conduct any system-wide administrative operation.

     A representative from NSN and from the operator is required to grant access. None of

    them alone can take full control of the RACS node without the other party supervising

    the actions.

    3.8.2 Sever O&M security

    The server O&M security provides support in authenticating the O&M connectivity with

    X.509 certificates and managing these certificates in the RACS. It enables secure O&Mcontrol and bulk data communication between RACS and NetAct.

    Secure O&M Connections

     • HTTPS (NE3S/WS) is the protocol used for securing the O&M connection between

    RACS and NetAct. TLS is used for encryption and integrity protection of NE3S/WS

    carried by HTTP to form HTTPS.

     • File transfer between RACS and NetAct is encrypted and integrity-protected.

    Operator certificate management

    Private key, public key, and digital certificates in X.509v3 format are handled by the

    RACS certificate management. Certificate management is required for the enrollment of

    operator certificates when public key infrastructure (PKI) is used in the network of thecustomer.

    3.8.3 Application framework O&M security

    The Application Framework O&M Security secures the connection between the RACS

    and Application Framework Manager. The O&M messages and commands through the

    RACS and AFM are encrypted and integrity-protected by the Transport Layer Security

    (TLS) using X.509 certificates for authentication. File transfer between RACS and AFM

    is encrypted and integrity protected by TLS (HTTPS).

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    26/40

    26

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3fb97

    Radio Applications Cloud Server 

    3.8.4 Backhaul security

    The backhaul security enhances the security for all traffic of the of User plane (U-plane),

    Management plane (M-plane), and Application plane (A-plane) of the RACS, by provid-

    ing authentication, encryption, and integrity protection using IPsec. The IPsec providessecure communications between the RACS and the core nodes by using secure trans-

    port and application protocols.

    IPsec supports the following capabilities:

     • Services: data integrity protection, origin authentication and anti-replay protection,

    confidentiality

     • Protocol: ESP (RFC 4303)

     • IPsec mode: tunnel mode

     • Encryption/ciphering algorithms:

     –   AES-128-CBC

     – 

    3DES-192-CBC –  NULL

     • Integrity protection algorithm: HMAC-SHA-1-96

     •  Authentication: digital certificates in X.509v3 format, pre-shared key (PSK)

     • Identification with IP addresses, fully qualified domain names (FQDN, only with cer-

    tificate authentication), and distinguished name ID_DER_ASN1_DN (only with cer-

    tificate authentication)

     • Key exchange:

     –  IKEv1

     –  Diffie-Hellman: Group 2 (1024-bit MODP)

    3.8.5 Application security

     Applications are packaged and deployed as per OVF 1.1 standard (OVA packages). In

    LA10, only pre-integrated Embedded Applications are installed. Thus, there is no possi-

    bility to install an unknown, unauthorized and unauthenticated application image.

    3.9 Capacity

    For LA10, the capacity of the RACS is designed to be compatible with the eNB capacity

    of 3-cell configurations for 20 Mhz 2x2 MIMO, applying the all-average/single-peak prin-

    ciple. This is shown in Figure 18 Throughput performance dimensioning. The RACS

    also supports a maximum average throughput of 180 Mbps for the downlink and 60

    Mbps for the uplink at the Ethernet level of the LA10 Embedded Applications.

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    27/40

    Issue 01

    27

    Liquid Applications System Description Radio Applications Cloud Server  

    Id:0900d80580a3fb97

    Figure 18  Throughput performance dimensioning

    The maximum number of E-RABs that can be handled for the RACS is 5040. The

    average round trip time (RTT) for all kinds of packets in the RACS without the applica-

    tions is less than 1 millisecond.

    Cellaverage

    Cellpe

    ak

     All-Averageaverage   All-Average / Single-Peak

    MAX (( average), peak)

     All-Peakpeak

    Recommended dimensioning range

    Air interface capacity   Transport capacity

    Overbooking

    PracticalMaximum

    Minimum

    Theoretical Maximum(overdimensioning)

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    28/40

    28

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3fb99

    RACS-C and RACS-T

    4 RACS-C and RACS-TThe RACS-C and RACS-T are the key HW elements of the Content Optimization and

    Delivery (COD) solution located in the EPC. These two new HW entities host the RACS-

    C/COD and RACS-T/COD software.

    4.1 Hardware

    The RACS-C and RACS-T are based on commercial off-the-shelf (COTS) carrier grade

    servers. Furthermore, specific switches are selected supporting the required L2-based

    load balancing using LAG/LACP with SRC/DEST-IP hashing.

    4.1.1 RACS-C

     • HP DL380 Gen8 with 2 x XEON E5-2620 (6 Core @ 2GHz, HT, 15MB cache)

     • memory: 48GB RAM

     • HDD: 2 arrays of 8 disks of 900 GB to16 x 900 GB = 14,4 TB; highly reliable "enter-

    prise" server disks; Smart Array P420/2GB FBWC controller 

     • 10G-BaseT Ethernet cards (default)

     –  5 x 10G cards with 10 x 10G ports; DPDK-capable Intel 10G controllers (HP

    10GBase-T controller 561T (Intel's 540/ Twinville chipset))

     •  AC (default) or DC power supply

     • 2 rack units

    4.1.2 RACS-T

     • HP DL380 Gen8 with 1 x XEON E5-2620 (6 Core @ 2GHz, HT, 15MB cache)

     • memory: 8GB RAM

     • HDD: 2 disks of 300 GB to 600 GB

    • 10G-BaseT Ethernet cards (default)

     –  2 x 10G cards with 4 x 10G ports; DPDK-capable Intel 10G controllers (HP

    10GBase-T controller 561T (Intel’s 540 / Twinville chipset))

     –  2 x 1G cards with 2 x 1G ports (for CODP & O&M)

     •  AC (default) or DC power supply

     • 2 rack units

    4.1.3 Switches

    Default (electrical):

     • HP 5900AF-48XGT-4QSFP (electrical + 4 x QSFP)

     • 48 x 10G 10BaseT electrical ports

     • 4 x 40G QSFP optical ports

     •  AC (default) or DC power supply

     • 1 rack unit

    Optional (optical):

     • HP 5900AF-48XG-4QSFP (optical + 4 x QSFP)

     •

    48 x 10G SFP+ optical ports • 4 x 40G QSFP optical ports

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    29/40

    Issue 01

    29

    Liquid Applications System Description RACS-C and RACS-T

    Id:0900d80580a3fb99

     •  AC (default) or DC power supply

     • 1 rack unit

    4.2 SoftwareThe HW entities RACS-C and RACS-T are hosting the RACS-C/COD and RACS-

    T/COD software:

    RACS-C:

     • OS: CentOS 6.4

     • RACS-C/COD application SW

    RACS-T:

     • OS: CentOS 6.4

     • RACS-T/COD application SW

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    30/40

    30

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3fb95

    Operation, administration, and maintenance

    5 Operation, administration, and maintenanceWith the separation of the telecom and IT domains discussed in 1.2 Telecom and IT

    domains, the operation, administration, and maintenance for LA is addressed by

    domain-specific tooling:

    • NetAct (for the telecom domain)

     •  Application Framework Manager (for the IT domain)

     •  Application specific managers (as required)

    Figure 19 Operability domains and tools shows the operability domains and tools.

    Figure 19 Operability domains and tools

    5.1 NetAct

    The network resource management (NRM) provides the ability and means to monitor

    and control NEs from a central location. It supports the operator in executing automated

    tasks, such as the configuration of NEs, fault detection, fault handling, or performance

    surveillance.

    Netact is the NRM platform for managing the LA network elements. NetAct provides

    extended and sophisticated NEM functions, which includes the complete set of func-

    tional areas, fault, configuration, security as well as software management and perfor-

    mance monitoring.

    NetAct is designed as a client and server system. The client provides a graphical user

    interface (GUI), which enables the operator to inspect individual LA network elements

    or groups of NEs. The server is the central processing entity and operates in the back-

    ground. The server provides the contents of the GUIs displayed on a client using Web-

    UI and Java functions. Management applications on the server communicate with the

    dedicated O&M agents residing on RACS network elements, thus completing the func-

    tional NRM communication path from the client via the server to a NE and vice-versa.

    The main functional areas to be covered by the NRM system are commonly knownunder the acronym FCAPS, which stands for fault, configuration, accounting, perfor-

    mance, and security management. In addition, NetAct provides system management.

    Besides these functional areas, NetAct additionally provides the possibility of a central-

    ized backup and restore function.

    Fault management

    NetAct Monitor is the fault management application of the NetAct tool. It enables differ-

    ent and independent monitoring tools to be integrated within the same common desktop.

    Failures are represented by alarms with a certain severity level like: critical, major, and

    minor. In addition, explanation and repair texts are displayed.

    Application Platform

    Base Platform

     ApplicationFrameworkManager 

     ApplicationManagers

    NetAct

    Application

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    31/40

    Issue 01

    31

    Liquid Applications System Description Operation, administration, and maintenance

    Id:0900d80580a3fb95

    The fault management function provides fault monitoring of all the software layers of the

    LA. The fault management of LA is based on the FlexiPlatform (FP) FPT2.0 release and

    the Nokia Enhanced SNMP Solution Suite- Web Service (NE3S/WS) agent.

    Configuration managementNetAct has access to the LA data through the use of dedicated NE3S/WS agent for con-

    figuration management (CM) purposes. The communications between NetAct and the

    NE is based on SOAP (XML over HTTPS). For accessing configuration data, a generic

    GUI is provided on the NetAct client.

    The configuration management of the LA is based on the NetAct Configurator applica-

    tion, which consists of the CM Editor and the CM Operations Manager. In the context of

    the NetAct Configurator, configuration is a set of Managed Objects. The NetAct Config-

    urator application modules provide a set of tools to visualize and manage the configura-

    tion of network resources.

    The NetAct Configurator provides a north mediation interface to export CM data in XML

    or CSV syntax, which can be further processed and adapted to systems in the operator's

    environment.

    Performance monitoring

    Performance monitoring for LA10 uses the NetAct Reporter to provide data collection,

    processing, and web-based tools to create and manage reports and KPIs. Pre-made

    Reporting Suites are provided for the RACS network elements. In addition, own reports

    can be created by the user with free selection of performance indicators and network

    elements to be contained within the reports.

    The NetAct Reporter also provides a north mediation interface to export performance

    monitoring data in XML format.

    Software management

    Software management of the RACS elements is provided by the NetAct software

    manager. Software manager provides the capability to roll out new software releases

    and change packages in a fast and reliable manner from a centralized location.

    Log management

    Log Management is done with the NetAct Audit Trail application. Logs from the LA log

    database are uploaded to the Audit Trail. Log data might be exported from the Audit Trail

    storage.

    g  Audit trail support will be provided for the LA future releases

    System management

    The system management of NetAct includes launching element managers that cover

    the following functions for LA:

     • Process management

     • Shell access

     • Trace management

    Backup and restore

    Backup and restore (B&R) management enables the backup and restoration of NE data

    and software. B&R is used for the recovery of different types of failures and disasters.

    The following backup types are used depending on the degree of loss:

     • Full backup of relevant file systems

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    32/40

    32

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3fb95

    Operation, administration, and maintenance

     • Incremental backup of relevant file systems

     • Full database backup

     • Incremental database backup

    The failure or disaster severity determines the procedure to be performed to restore thedata. The following restoration types are used:

     • Restore of relevant file systems

     • Restore of last full database backup

     • Point-In-Time restore of database (only if supported by the database)

     • Complete restore of the NE

    The B&R solution also supports Fast System Restore (FSR) and Monitoring backup and

    restore applications. NetAct uses Networker-based B&RServer (BRS) that runs on a

    computing platform (CPf). The CPf uses HW from the HP Proliant product family,

    RedHat Linux (RHEL) for the SW, and IBM SolidDB for the operating system and data-

    base. The Networker server is managed via NetAct. Through the NE3S/WS agent, theNetworker server forwards the alarms and counters to the monitoring and performance

    management applictions of NetAct. For the Networker operation, the Networker GUI is

    a screen level that is integrated in NetAct.

    5.2 Application Framework Manager 

    The Application Framework Manager (AFM) is a user interface that manages the lifecy-

    cle and operability of the application and services provided by the application platform

    of the LA. In LA10, AFM is based on the following components:

     • HW: HP DL360p Gen8

     •

    SW: –  ITNCM (IBM Tivoli Netcool Configuration Manager) version 6.4

     –  Redhat Linux

    The AFM supports the following functions:

     •  Application Platform Configuration Management

     –  Machine application policy (for example, machine recovery priority)

     –  TTP policy (RAB selection parameters)

     •  Application life cycle management

     –   Application deploy (activation)

     –   Application undeploy (deactivation)

     –   Application start –   Application stop

     •  Application configuration management - Application properties (exposed to applica-

    tions running inside the virtual machine)

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    33/40

    Issue 01

    33

    Liquid Applications System Description Embedded applications

    Id:0900d80580a3fb8f 

    6 Embedded applicationsTable 4 Embedded applications shows the embedded applications supported by LA10

    and the required NE(s) for each application feature.

    Content Caching, DNS Caching, and Video Prioritization and Pacing are supported by

    the Application Package Content Optimization and Delivery. TCP Header Enrichment

    requires the respective Application Package to be installed.

    Content Caching and TCP Header Enrichment applications are activated by default

    when the respective application package is installed. DNS Caching and Video Prioriti-

    zation and Pacing is optionally activated, depending on the need of the customer.

    6.1 Content Optimization and Delivery

    The main function of the Content Optimization and Delivery (COD) solution is mobile-

    network-optimized transparent content caching. Transparent content caching allows to

    cache and serve content from a content cache hosted by the RACS at the eNB. The

    COD solution has three building blocks; for more information, see Figure

    20 Transparent Content Caching - High Level Architecture. The three COD solution

    building blocks are:

     • The RACS/COD is an Embedded Application on the RACS at the eNB base station

    providing a local content cache.

     • The RACS-C/COD application is located at the SGi side of the mobile packet core

    providing a central content cache and cache control.

     • The RACS-T/COD (Tokenizer) application is located at the S1 or S5 side of the

    mobile packet core, replacing the TCP payload with references to the real content

    as stored in the local cache at RACS/COD.

    The COD-P (COD protocol) provides the connectivity for intra-COD signaling and data

    transfer.

    Application

    (Application

    Package)

    Application

    Feature

    Activation RACS RACS-T RACS-C

    Content Optimiza-

    tion and Delivery

    (COD)

    Content Caching default x x x

    DNS Caching optional x

    Video Prioritization

    and Pacing

    optional x x x

    TCP Header

    Enrichment (TCP-HE)

    TCP Header

    Enrichment

    default x

    Table 4 Embedded applications

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    34/40

    34

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3fb8f 

    Embedded applications

    Figure 20  Transparent Content Caching - High Level Architecture

    The COD supports the following applications:

     • Content Caching

     • DNS Caching • Video Prioritization and Pacing

    6.1.1 Content Caching

    Frequently requested content is cached in proximity with the requesting mobile users.

    Therefore, content caching reduces the load on the backhaul network and improves the

    user experience because of faster content download. Figure 21 Content Caching shows

    the content caching solution. The solution supports handover, charging, and Lawful

    Interception (LI) functions, which is performed by the respective CN elements.

    Figure 21 Content Caching

    6.1.2 DNS Caching

    The purpose of DNS caching is to improve the DNS response time for the end-users by

    answering DNS queries from a local DNS cache at the RACS. When a UE requests a

    single web page, it triggers several DNS queries. Frequently requested address resolu-

    tions are cached on the RACS instead of routing DNS queries to remote DNS servers.

    This makes the web page load faster as DNS requests are quickly responded to, thus

    improving the perceived user-experience. Figure 22 DNS Caching shows the DNS

    caching network aspects.

    Packet DataNetwork

    eNBUE

    RACS/COD

    RACS-T/COD

    S-GW P-GWRACS-C/

    COD

    Localcache

    S1-U S1-U S5

    SAE-GWSGi SGi

    Centralcache

    Policy, Charging, LI

    (COD-P intra COD communication)

    RAN EPC

    WebServer LTE-Uu

    UE eNB RACS

    MobileBackhaul

    RACS-T SAE-GW RACS-C

    Internet

    Server 

    Caching Caching“Tokenization”

    LI, Charging

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    35/40

    Issue 01

    35

    Liquid Applications System Description Embedded applications

    Id:0900d80580a3fb8f 

    Figure 22  DNS Caching

    Cached entries are managed according to the DNS response frame Time-To-Live (TTL)

    value. Although the DNS query is served from the DNS cache, the original DNS query

    is forwarded to the respective DNS server to satisfy lawful interception regulations.

    6.1.3 Video Prioritization and PacingThe Video Prioritization and Pacing application contains two optimization techniques for

    the delivery of cached video from RACS:

     • Video Rating and Prioritization- The Video Rating and Prioritization performs

    intra-E-RAB optimization of concurrent traffic of one user without interfering with the

    prioritization between E-RABs. The optimization monitors the media parameters of

    each flow, including the required video bit-rate. If the actual video bit-rate is lower

    than the required, the RACS controls the bit-rate of the low-priority TCP flows

    passing over the same E-RAB.

     • Adaptive Video Pacing- The Adaptive Video Pacing is about “just-in-time” delivery

    of a media stream towards the UE. The UE is served with the content while being

    consumed by the user. This is important in cases where the user starts consuming

    content and stops the session after a short t ime. With this capability, only the portion

    of the content being consumed by the user is downloaded towards the UE.

    6.2 TCP Header Enrichment

    The TCP Header Enrichment conveys Radio Resource Management (RRM) data to a

    content optimizer, such as the NSN Flexi Content Optimizer (FCO), in real time. The

    TCP Header Enrichment provides the cell ID, cell load, and per bearer throughput

    guidance indicators. These indicators are inserted in the upstream user IP flows into the

    options field of the TCP header. The enriched flows are received by FCO which is

    deployed on the Gi interface. As a result, FCO applies optimization schemes under finegranular radio condition awareness. Figure 23 TCP Header Enrichment shows the TCP

    Header Enrichment network aspects.

    UE eNB RACS

    MobileBackhaul

    RACS-T SAE-GW RACS-C

    Internet

    Server 

    Caching Caching“Tokenization”

    LI, Charging

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    36/40

    36

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a3fb8f 

    Embedded applications

    Figure 23 TCP Header Enrichment

    UE eNB RACS

    MobileBackhaul

    SAE-GW ContentServer 

    Content Optimizer (in Core Network)

    Internet

    IP

    TCP

    HTTP

    Content

    TCP Header Enrichment

    IP IP   Application IP   IP

    TCP

    HTTP

    Content

    IP

    TCP

    HTTP

    Content

    2) Optimized content delivery

    1) TCP with additional header information

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    37/40

    Issue 01

    37

    Liquid Applications System Description Glossary

    Id:0900d80580a3e397

    7 Glossary

    Application Frame-

    work Manager 

    the user interface (UI) to manage the RACS Application Platform and the lifecycle of

    RACS Applications. AFM in LA10 is based on ITNCM v6.4 (IBM Tivoli Netcool Configu-ration Manager).

    RACS application

    feature

    a functional item of a RACS application

    Upon activation of a RACS Application Package, one or more supported RACS Appli-

    cation Features might be enabled by default. Other (optional) RACS Application

    Features might be activated selectively through AFM.

    RACS application

    package

    SW image which is deployed on the RACS platform using the Application Framework

    Manager (AFM) and supports the RACS Application

    RACS / RACS-C /

    RACS-T add-on

    applications

    (from LA20 onwards) can be created by NSN or 3rd parties (for example, Independent

    Software Vendors) and provided independently from a Liquid Applications system

    release

    RACS / RACS-C /

    RACS-T applications

    application software running on the RACS / RACS-C / RACS-T application platform

    RACS / RACS-C /

    RACS-T embedded

    applications

    created by NSN and provided as part of a Liquid Applications system release

    Remote applications application software running on other network elements, but is functionally related to

    RACS / RACS-C / RACS-T applications

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    38/40

    38

    Issue 01

    Liquid Applications System Description

    Id:0900d80580a40deb

     Acronyms

    8 Acronyms

     AC  Alternating current

    AFM  Application Framework Manager 

    API application programming interface

    ARP allocation and retention priority

    A-plane  Application plane

     BFD Bidirectional Forwarding Detection

    CDR charging data record

    CM Configuration Management

    CN core network

     COD Content Optimization and Delivery

    COTS commercial off-the shelf product

    CRAN Centralized RAN

    C-plane Control plane

    DC direct current

    DEST Destination

    DRAN Distributed RAN

     EPC evolved packet core

    E-RAB E-UTRAN radio access bearer 

    FCO Flexi Content Optimizer 

     FHR First-Hop-Router 

    FM Fault Management

     FTP file transfer protocol

    GE Gigabit Ethernet

    GW gateway

    HDD hard disk drive

    HTTP hypertext transfer protocol

    HW hardware

    IaaS Infrastructure-as-a-Service

    ITNCM IBM Tivoli Netcool Configuration Manager 

    L2 Layer 2

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    39/40

    Issue 01

    39

    Liquid Applications System Description Acronyms

    Id:0900d80580a40deb

    LA Liquid Applications

    LACP  Link Aggregation Control Protocol

    LAG Link Aggregation Group

    LI lawful interception

    LMP local management port

     LTE long-term evolution

     MBH mobile backhaul

    M-plane management plane

    NRM Network Resource Management

    O&M operation and maintenance

    OS operating system

    OTT Over-the-top

    PaaS Platform-as-a-Service

    PKI public key infrastructure

    PM Performance Management

    QC quality class indicator 

    QoE quality of user experience

     QoS quality of service

    QSFP Quad Small Form-Factor Pluggable (Transceiver-Module)

    RACS Radio Applications Cloud Server 

    RACS-C RACS-Core

     RACS-T RACS-Tokenizer 

    RAN radio access network

    RRM radio resource management

    RTT round-trip time

    SAE system architecture evolution

    SCLI Structured Command Line Interface

     SEG security gateway

    SFP small form-factor pluggable

    SNMP Simple Network Management Protocol

    SPID service provider identification

    SRC source

  • 8/19/2019 292616319 Liquid Applications System Description PDF

    40/40

    Liquid Applications System Description Acronyms

     SSD Solid State Disk

    SW software

    SWAM software asset monitoring

    S-plane synchronization plane

    TCO total cost of ownership analysis

    TOF traffic offload function

    TTP traffic termination point

    UE user equipment;

    UI user interface

    U-plane user plane

    VM virtual machine