40
Liquid Applications System Description Issue 01 Nokia Siemens Networks is continually striving to reduce the adverse environmental effects of its products and services. We would like to encourage you as our customers and users to join us in working towards a cleaner, safer environment. Please recycle product packaging and follow the recommendations for power use and proper disposal of our products and their compo- nents. If you should have questions regarding our Environmental Policy or any of the environmental services we offer, please contact us at Nokia Siemens Networks for any additional information.

Liquid_Applications_System_Description.pdf

  • Upload
    rodhian

  • View
    35

  • Download
    4

Embed Size (px)

Citation preview

Page 1: Liquid_Applications_System_Description.pdf

Liquid Applications System Description

Issue 01

Nokia Siemens Networks is continually striving to reduce the adverse environmental effects of its products and services. We would like to encourage you as our customers and users to join us in working towards a cleaner, safer environment. Please recycle product packaging and follow the recommendations for power use and proper disposal of our products and their compo-nents.

If you should have questions regarding our Environmental Policy or any of the environmental services we offer, please contact us at Nokia Siemens Networks for any additional information.

Page 2: Liquid_Applications_System_Description.pdf

2Issue 01

Liquid Applications System Description

Id:0900d80580a3e47a

The information in this document is subject to change without notice and describes only the product defined in the introduction of this documentation. This documentation is intended for the use of Nokia Siemens Networks customers only for the purposes of the agreement under which the document is submitted, and no part of it may be used, reproduced, modified or transmitted in any form or means without the prior written permission of Nokia Siemens Networks. The documentation has been prepared to be used by professional and properly trained personnel, and the customer assumes full responsibility when using it. Nokia Siemens Networks welcomes customer comments as part of the process of continuous development and improvement of the documentation.

The information or statements given in this documentation concerning the suitability, capacity, or performance of the mentioned hardware or software products are given "as is" and all liability arising in connection with such hardware or software products shall be defined conclusively and finally in a separate agreement between Nokia Siemens Networks and the customer. However, Nokia Siemens Networks has made all reasonable efforts to ensure that the instructions contained in the document are adequate and free of material errors and omissions. Nokia Siemens Networks will, if deemed necessary by Nokia Siemens Networks, explain issues which may not be covered by the document.

Nokia Siemens Networks will correct errors in this documentation as soon as possible. IN NO EVENT WILL Nokia Siemens Networks BE LIABLE FOR ERRORS IN THIS DOCUMENTA-TION OR FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO SPECIAL, DIRECT, INDI-RECT, INCIDENTAL OR CONSEQUENTIAL OR ANY LOSSES, SUCH AS BUT NOT LIMITED TO LOSS OF PROFIT, REVENUE, BUSINESS INTERRUPTION, BUSINESS OPPORTUNITY OR DATA,THAT MAY ARISE FROM THE USE OF THIS DOCUMENT OR THE INFORMATION IN IT.

This documentation and the product it describes are considered protected by copyrights and other intellectual property rights according to the applicable laws.

The wave logo is a trademark of Nokia Siemens Networks Oy. Nokia is a registered trademark of Nokia Corporation. Siemens is a registered trademark of Siemens AG.

Other product names mentioned in this document may be trademarks of their respective owners, and they are mentioned for identification purposes only.

Copyright © Nokia Siemens Networks 2013/11/7. All rights reserved

f Important Notice on Product SafetyThis product may present safety risks due to laser, electricity, heat, and other sources of danger.

Only trained and qualified personnel may install, operate, maintain or otherwise handle this product and only after having carefully read the safety information applicable to this product.

The safety information is provided in the Safety Information section in the “Legal, Safety and Environmental Information” part of this document or documentation set.

The same text in German:

f Wichtiger Hinweis zur Produktsicherheit Von diesem Produkt können Gefahren durch Laser, Elektrizität, Hitzeentwicklung oder andere Gefahrenquellen ausgehen.

Installation, Betrieb, Wartung und sonstige Handhabung des Produktes darf nur durch geschultes und qualifiziertes Personal unter Beachtung der anwendbaren Sicherheits-anforderungen erfolgen.

Die Sicherheitsanforderungen finden Sie unter „Sicherheitshinweise“ im Teil „Legal, Safety and Environmental Information“ dieses Dokuments oder dieses Dokumentations-satzes.

Page 3: Liquid_Applications_System_Description.pdf

Issue 013

Liquid Applications System Description

Id:0900d80580a3e47a

Table of ContentsThis document has 40 pages.

1 Introduction to Liquid Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71.1 Mobile edge computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71.2 Benefits of proximity and context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71.3 Monetization opportunities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

2 System overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92.1 RACS deployment scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92.2 Release principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

3 Radio Applications Cloud Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133.1 Product concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133.1.1 Telecom and IT domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133.2 High-level architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153.3 RACS hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163.4 Site configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173.5 Cabling options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183.6 Software provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213.7 Network integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213.7.1 Transport network integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213.7.2 LTE U-plane integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223.7.3 LTE C-plane integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233.8 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243.8.1 Server security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243.8.2 Sever O&M security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253.8.3 Application framework O&M security . . . . . . . . . . . . . . . . . . . . . . . . . . . 253.8.4 Backhaul security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263.8.5 Application security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263.9 Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

4 RACS-C and RACS-T . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284.1 Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284.1.1 RACS-C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284.1.2 RACS-T . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284.1.3 Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284.2 Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

5 Operation, administration, and maintenance . . . . . . . . . . . . . . . . . . . . . 305.1 NetAct . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305.2 Application Framework Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

6 Embedded applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336.1 Content Optimization and Delivery . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336.1.1 Content Caching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346.1.2 DNS Caching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346.1.3 Video Prioritization and Pacing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356.2 TCP Header Enrichment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Page 4: Liquid_Applications_System_Description.pdf

4Issue 01

Liquid Applications System Description

Id:0900d80580a3e47a

7 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

8 Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Page 5: Liquid_Applications_System_Description.pdf

Issue 015

Liquid Applications System Description

Id:0900d80580a3e47a

List of FiguresFigure 1 LA system and product structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Figure 2 RACS deployment scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Figure 3 Release principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Figure 4 RACS, RACS-C, and RACS-T Applications vs. Remote Applications. . 12Figure 5 RACS - product concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Figure 6 Telecom and IT domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Figure 7 RACS with Traffic Offload Function (TOF). . . . . . . . . . . . . . . . . . . . . . . 15Figure 8 LA10 RACS high level architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16Figure 9 FBSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Figure 10 Flexi Multiradio 10 BTS site configuration . . . . . . . . . . . . . . . . . . . . . . . 17Figure 11 Flexi Multiradio BTS site configuration. . . . . . . . . . . . . . . . . . . . . . . . . . 18Figure 12 Cabling options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Figure 13 FBSA connectivity with Flexi Multiradio BTS . . . . . . . . . . . . . . . . . . . . . 19Figure 14 Connectivity with Flexi Multiradio 10 BTS . . . . . . . . . . . . . . . . . . . . . . . 20Figure 15 U-plane network architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21Figure 16 TTP policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23Figure 17 Cell trace interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24Figure 18 Throughput performance dimensioning . . . . . . . . . . . . . . . . . . . . . . . . . 27Figure 19 Operability domains and tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30Figure 20 Transparent Content Caching - High Level Architecture . . . . . . . . . . . . 34Figure 21 Content Caching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Figure 22 DNS Caching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35Figure 23 TCP Header Enrichment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

Page 6: Liquid_Applications_System_Description.pdf

6Issue 01

Liquid Applications System Description

Id:0900d80580a3e47a

List of TablesTable 1 System release and network elements . . . . . . . . . . . . . . . . . . . . . . . . . . 9Table 2 Embedded applications in LA10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Table 3 Ethernet interfaces and IP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22Table 4 Embedded applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

Page 7: Liquid_Applications_System_Description.pdf

Issue 017

Liquid Applications System Description Introduction to Liquid Applications

Id:0900d80580a3fb91

1 Introduction to Liquid ApplicationsThe demand for data-enabled mobile devices, such as smartphones, causes an increase in mobile broadband traffic within the network of an operator. This trend is expected to continue, especially with the widespread roll-out of Long Term Evolution (LTE), which offers increased data rates over mobile networks. Because of increasing mobile broadband traffic, operators are expected to provide a superior experience for the customers and create new value from network infrastructure, based on the individual and personalized applications and services.

Liquid Applications (LA) is an innovative network technology that provides a unique and enhanced mobile broadband experience and drives new value for the operators. LA transforms the base station into a value creation engine through applications, services, and content that is placed in close proximity with the mobile subscribers. Moving the content at the edge of the mobile network provides a more responsive experience as it is delivered with lower latency. In addition, content and applications can interact in real-time with the subscriber, in terms of their individual needs, location and social-based preferences, making their experience completely personal.

As the primary source of revenue like voice and messaging continue to decline, because of the rise of over-the-top (OTT) services, LA enables operators to generate new forms of revenue from new business models, services, and applications.

1.1 Mobile edge computingLA is the new mobile edge computing platform from NSN. At the heart of LA is the Radio Applications Cloud Server (RACS) which re-defines the role of the base station through applications, services and content placed in close proximity to mobile subscribers and by using real-time network information to offer personalized services.

The RACS deploys the latest cloud technology and service creation capabilities into the base station, enabling the collection of real-time network data such as radio conditions, subscriber location, direction of travel, and more. These data are used by applications to offer context-relevant services that transform the mobile broadband experience.

1.2 Benefits of proximity and contextContent located at the base station provides key advantages in terms of user experi-ence. It reduces the need for the content to be pulled from the Internet and across the mobile network whenever it is requested. This is facilitated by a cache located inside the base station which contains frequently requested or popular content that can be deliv-ered directly to the mobile subscriber over the radio interface every time it is requested. Content that is accessed from the base station is five times faster than from caches located elsewhere in the network.

To provide a contextual experience, real-time radio data can be extracted from inside the base station to enable location-specific content, such as hyper-targeted advertising from nearby businesses, or information about tourist and visitor attractions within the area. This real-time data exposure will open-up fresh and exciting opportunities to pos-itively impact the mobile broadband experience of the subscribers with personalized service offerings and improved performance.

Page 8: Liquid_Applications_System_Description.pdf

8Issue 01

Liquid Applications System Description

Id:0900d80580a3fb91

Introduction to Liquid Applications

1.3 Monetization opportunitiesThe RACS extends applications and services that normally reside within the Internet or the centralized core and data centers of operators, to the very edge of the network. An operator's dense network of base stations is transformed by the RACS into numerous value creation engines. The RACS enables innovative, low-latency services, such as mobile gaming and augmented reality, and accelerates media-rich applications that deliver an enhanced quality of experience for the mobile subscriber.

The RACS processes large amount of data in real-time that are complex and costly to deliver on a traditional centralized cloud. The following key features enable a base station to become a value creation engine:

• Network efficiency – Load in other parts of the network is reduced with the content stored inside the base station, which leads to saving and reducing of the Total Cost of Ownership (TCO).

• Application connectivity – To improve the user experience through real-time con-textually-aware applications and services, real-time data that resides on or off the base station is extracted and exposed to applications.

• Distributed Cloud architecture – A dense network of computing and storage loca-tions at the very edge of the mobile network approximates data centers rather than just improving their computation. Operators will benefit in creating a distributed Cloud-based architecture as it will empower them to embrace big data, giving them the opportunity to make more money.

Page 9: Liquid_Applications_System_Description.pdf

Issue 019

Liquid Applications System Description System overview

Id:0900d80580a3fb9d

2 System overviewThe first LA system release LA10 consists of the following products:

• Radio Applications Cloud Server (RACS) • RACS-Tokenizer (RACS-T) • RACS-Core (RACS-C) • Application Framework Manager (AFM)

Figure 1 LA system and product structure shows the structure of LA system release LA10.

Figure 1 LA system and product structure

The RACS, RACS-C, and RACS-T are network elements that are managed individually. For more information, see 3 Radio Applications Cloud Server and 4 RACS-C and RACS-T.

Table 1 System release and network elements shows the respective network element software (SW) releases and the supported hardware (HW)

The RACS application platform and RACS applications are managed using AFM. For more information on AFM, see 5.2 Application Framework Manager. LA10 supports four Embedded Applications, created by NSN. For more information on Embedded Applica-tions, see 6 Embedded applications.

2.1 RACS deployment scenariosLA10 has been developed for LTE macro base station (eNB) deployment. This includes both Distributed RAN (DRAN) and Centralized RAN (CRAN) scenarios. For the CRAN (baseband hotel) scenario, there is a one-to-one mapping between the Flexi System Module and RACS. Figure 2 RACS deployment scenarios shows the deployment sce-narios of LA. LTE base station deployment is designed for LA system release LA10, while aggregation and RNC deployments are planned for future releases.

UE eNB RACS

MobileBackhaul

RACS-T SAE-GW RACS-C

AFM

NetAct

Internet

Server

System Release

RACS RACS-C RACS-T

SW release supported HW SW release supported HW SW release supported HW

LA10 RACS 1.0 FBSA, FBXA RACS-C 1.0 HP DL380 Gen8 RACS-T 1.0 HP DL380 Gen8

Table 1 System release and network elements

Page 10: Liquid_Applications_System_Description.pdf

10Issue 01

Liquid Applications System Description

Id:0900d80580a3fb9d

System overview

Figure 2 RACS deployment scenarios

2.2 Release principlesLA is based on the LTE and WCDMA system releases, but it is not part of these system releases. As a result, LA uses features provided by the LTE and WCDMA system releases. For example, the first LA system release LA10 is based on RL40 and the second release LA20 is planned to be based on RL50. LA20 will be backwards compat-ible with RL40. Figure 3 Release principles shows the release principles of the software life cycles with respect to the application types of the LA

LTEbase station

FlexiMultiradio (10) BTS

Low-order Aggregation(Access)Site

High-order Aggregation Site Backbone Site (GW)

Aggregation

RNC

RNC

Page 11: Liquid_Applications_System_Description.pdf

Issue 0111

Liquid Applications System Description System overview

Id:0900d80580a3fb9d

Figure 3 Release principles

The RACS, RACS-C, and RACS-T applications are application software that run on the RACS, RACS-C, and RACS-T platforms. There are two types of application, having dif-ferent life cycle management characteristics:

• Embedded Applications - are created by NSN and provided as part of a system release.

• Add-on Applications - can be created by NSN or 3rd parties (for example, Inde-pendent Software Vendors) and provided independently from the LA system release. The latter concept allows a faster release cycle than what is possible from telecom-based network elements.

Embedded applications in LA10 is shown in Table 2 Embedded applications in LA10.

There are applications that require software to run on other network elements. These applications are known as Remote Applications, which are located either in the core network or on the internet. Figure 4 RACS, RACS-C, and RACS-T Applications vs. Remote Applications shows the comparison between the RACS, RACS-C, and RACS-T applications and Remote applications.

Embedded applications

Life cycle management Related to LA

Ownership NSN

Storage NOLS

SW management (installation) Using NetAct

Deployment (Activation/Deactivation) Using AFM

Table 2 Embedded applications in LA10

Embedded applications

LA System Release

App1

LA10 LA20 LA30

API, resources API, resources

RACS Applications

Add-on Applications App2

App3

Supporting features

RL40

Supporting features

RL50

Supporting features

RL60, RU50

Page 12: Liquid_Applications_System_Description.pdf

12Issue 01

Liquid Applications System Description

Id:0900d80580a3fb9d

System overview

Figure 4 RACS, RACS-C, and RACS-T Applications vs. Remote Applications

Page 13: Liquid_Applications_System_Description.pdf

Issue 0113

Liquid Applications System Description Radio Applications Cloud Server

Id:0900d80580a3fb97

3 Radio Applications Cloud ServerThe key element of the LA system is the RACS. The RACS is a new network element in the Radio Access Network (RAN). For the RACS 1.0, the RACS is connected to the Long Term Evolution (LTE) base station (eNB).

3.1 Product conceptThe RACS is an application server capable of providing computing resources, storage capacity, and connectivity. The principles of established cloud computing were adopted to accelerate the development of application software (known as RACS Applications) running on the RACS. Initially, RACS implements the Infrastructure-as-a-Service (IaaS) concept where the applications reside in their dedicated Virtual Machines (VM). Support for Java applications using Platform-as-a-Service (PaaS) principles is planned for future releases.

The RACS provides a standard runtime environment for applications through virtualiza-tion. The RACS applications have access to LTE User plane (U-plane) and Control plane (C-plane) data through the defined Application Programming Interfaces (APIs). This is shown in Figure 5 RACS - product concept.

g In RACS 1.0, APIs are only exposed towards Embedded Applications. For RACS 2.0, it is planned to extend this towards Add-on Applications.

Figure 5 RACS - product concept

3.1.1 Telecom and IT domainsThe IT domain (refers to the user applications, servers, and the IP traffic in between) is separated from the telecom domain based on the 3rd Generation Partnership Project (3GPP) design principles. Figure 6 Telecom and IT domain shows the relationship between the telecom and IT layer. From the perspective of the UE, the first network

App NApp 1

Radio ApplicationsCloud Server

App1

AppN

Application Platform

Hardware

eNB

NodeB RNC

Page 14: Liquid_Applications_System_Description.pdf

14Issue 01

Liquid Applications System Description

Id:0900d80580a3fb97

Radio Applications Cloud Server

element that has access to the user's IP traffic is the System Architecture Evolution Gateway (SAE-GW) in the Core Network (CN). Normally, mobile networks were built with few centralized CNs. This resulted to CN elements being away from the UEs in terms of networking. Geographical distance turns into propagation delays, which is further increased by latencies introduced by the many networking hops in between. Fur-thermore, the Mobile Backhaul (MBH) network is a significant cost factor for the opera-tors. In most cases, over-dimensioning is prohibitive, so traffic congestion may occur. This has an impact on the service quality, perceived as Quality-of-Experience (QoE) by the mobile subscriber.

Figure 6 Telecom and IT domain

The separation between the Radio Access Network (RAN) and the CN defined by 3GPP is another drawback because most of the real-time information related to the radio inter-face is hidden in the RAN. Not even the CN elements of the operator can access this data. The availability of this information is very useful to improve the quality of many ser-vices.

To address the above-mentioned issues, the RACS intercepts the U-plane. This is shown in Figure 7 RACS with Traffic Offload Function (TOF). The RACS implements a Traffic Offload Function (TOF) so that the software running on the RACS has full access to the IP traffic of the user. Note that the RACS does not conflict with 3GPP protocols. Through a proprietary interface, the RACS has real-time access to the 3GPP C-plane and Radio Resource Management (RRM) information in the eNB.

UE eNB

MobileBackhaul

SAE-GW

Internet

Server

User App

IP

PDCP

LTE MAC

LTE PHY LTE PHY

LTE MAC

PDCP

GTP-U

UDP

Eth MAC

Eth PHY

Application IP (NAT)

GTP-U

UDP

Eth PHY

Eth MAC Eth MAC

Eth PHY Eth PHY

Eth MAC

IP

Server AppIT Domain

Telecom Domain (3GPP)

3GPP-TNL IPIP IP

Page 15: Liquid_Applications_System_Description.pdf

Issue 0115

Liquid Applications System Description Radio Applications Cloud Server

Id:0900d80580a3fb97

Figure 7 RACS with Traffic Offload Function (TOF)

3.2 High-level architectureThe LA software is divided into two major components: LA10 RACS Platform and LA10 RACS Applications.

The LA10 RACS Platform is subdivided into the following main components:

• The Base Platform provides computing, storage and connectivity capabilities. The Base Platform is managed through NetAct.

• The Application Platform provides the capabilities for hosting LA10 RACS Applica-tions. The Application Platform is managed through the Application Framework Manager (AFM).

Figure 8 LA10 RACS high level architecture shows the high level architecture of LA10 RACS. Additional value is created through Platform Services which LA10 RACS Appli-cations can take advantage of. Services are provided through well-documented Appli-cation Programming Interfaces (API). The architecture also allows LA10 RACS Applications to provide services to others through their own API.

UE eNB

MobileBackhaul

Internet

Server

User App

IP

PDCP

LTE MAC

LTE PHY LTE PHY

LTE MAC

PDCP

GTP-U

UDP

Eth MAC

Eth PHY

Application IP

IT Domain

Telecom Domain

3GPP-TNL IPIP

SAE-GW

(NAT)

GTP-U

UDP

Eth MAC Eth MAC

IP

RACS

Eth PHY

Eth MAC

IP

Server App

GTP-U

UDP

Eth MAC

IP

Eth MAC

GTP-U

UDP

IP

IPIP

RACS App

Eth PHYEth PHYEth PHYEth PHY

Page 16: Liquid_Applications_System_Description.pdf

16Issue 01

Liquid Applications System Description

Id:0900d80580a3fb97

Radio Applications Cloud Server

Figure 8 LA10 RACS high level architecture

3.3 RACS hardwareThe FlexiBTS Server module, version A (FBSA) is the base station-specific hardware (HW) platform for RACS1.0.see Figure 9 FBSA.

The FBSA module is a HW platform based on a scalable Intel x86 multi-core processor architecture that provides the functions to execute non-3GPP applications in a virtual-ized-processing environment. The module runs in a Windriver Linux 4.3 operating system and Kernel-based Virtual Machine (KVM)-enabled virtualization.

The FBSA is fully compatible to the FlexiMultiradio10 BTS platform. The module is plugged into the Baseband (BB) extension slot of the FlexiMultiradio 10 System Module and thus is the most compact solution without requiring extra site cabinets or boxes. It covers the full temperature range of FlexiMultiradio 10 BTS and there is no need for additional space and power consuming heat exchange equipment.

The FBSA main characteristics include:

• Intel Xeon Sandy Bridge (Gladden) 4 cores at 2GHz • 16 Gbyte DDR-3 • 400 Gbyte SSD storage • SPECInt2006_Rate: 111 • SPECFP2006_Rate: 88 • External interfaces:

– 2x GE RJ-45– 2x 1/10 GE SFP+ (enables optical and twinax connection)– -48V Power

Embedded Applications

API

VM VM

API

VM VM VM

Add-on Applications

API

Platform ServiceAPI

Platform ServiceAPI

Platform Service

Application Platforms (IaaS)

Base Platform (Computing, Storage, Connectivity)

Platform SW

HW

Radio Applciations Cloud Server (RACS)

ApplicationManagers

ApplicationFrameworkManager

NetAct

NSN Applications 3rd Party Applications

Page 17: Liquid_Applications_System_Description.pdf

Issue 0117

Liquid Applications System Description Radio Applications Cloud Server

Id:0900d80580a3fb97

Figure 9 FBSA

3.4 Site configurationThe FBSA is designed for Flexi BTS mechanics, suitable for both indoor and outdoor installation. The FBSA supports zero-footprint installation with Flexi Multiradio 10 BTS. This is shown in Figure 10 Flexi Multiradio 10 BTS site configuration. For example, no extra installation space is required as the FBSA fits into one of the extension slots under-neath the System Module FSMF.

Figure 10 Flexi Multiradio 10 BTS site configuration

In case of Flexi Multiradio BTS or if both FSMF extension slots are occupied within the Flexi Multiradio 10, the FBSA can be installed in a separate casing with the Flexi BTS Server Extension Kit, version A (FBXA). This is shown in Figure 11 Flexi Multiradio BTS site configuration.

RACS

(FSMF)

hosted withSystem Module

RF module

FlexiMultiradio 10

Flexi Multiradio 10System Module

(FSMF)

Flexi BTS ServerModule (FBSA)

Page 18: Liquid_Applications_System_Description.pdf

18Issue 01

Liquid Applications System Description

Id:0900d80580a3fb97

Radio Applications Cloud Server

Figure 11 Flexi Multiradio BTS site configuration

The FBXA enables the integration of the FlexiBTS Server Module (FBSA) into Flexi Mutiradio BTS installations. The FBXA allows to use the FBSA module with Flexi Multi-radio 10 BTS installations with fully utilized FBBx extension slots in an extension config-uration.

The FBXA provides the integration of the Flexi BTS Server Module into NSN's previous Flexi Multiradio BTS generation. This allows the operator to use the FBSA server module even in deployments with previous and actual Flexi Multiradio installations enabling a smooth transition to NSN's latest Flexi Multiradio BTS 10 solution.

3.5 Cabling optionsThere are many cabling options available, which is shown in Figure 12 Cabling options.

FlexiMultiradio

Flexi BTS ServerExtension Kit

(FBXA)

Flexi BTS ServerModule (FBSA)

Extension kitfor stand-alone

RF moduleSystem module(FSMD/FSME)

Page 19: Liquid_Applications_System_Description.pdf

Issue 0119

Liquid Applications System Description Radio Applications Cloud Server

Id:0900d80580a3fb97

Figure 12 Cabling options

Connectivity with Flexi Multiradio BTSThe connection of the FBSA with Flexi Multiradio BTS is shown in Figure 13 FBSA con-nectivity with Flexi Multiradio BTS.

Figure 13 FBSA connectivity with Flexi Multiradio BTS

WithoutTransportSubmodule

WithoutServerExtension

WithTransportSubmodule

WithServerExtension

Flexi Multiradio 10 BTS Flexi Multiradio BTS

FSMF

FBBA 1 FBSA 1

FTIF FTIF FTIF

FSMFFSMFFSMF

FBBA 1 FBBA 1 FBBA 1FBSA 1 FBSA 1 FBSA 1

FTIF FTIF FTIF

FSMF FSMF FSMF

FBBA 2 FBBA 2 FBBA 2 FBBA 1FBBA 1FBBA 1

FBSA 1 FBSA 1 FBSA 1 FBSA 1

FSME

FTLB

sRIO

GE copper

GE opt

TRS

TRS TRS TRS

TRS TRS TRS TRS

case 1

case 1 case 1 case 1

case 1 case 1 case 1 case 1

case 2 case 2 case 2 case 2

DCOut1 DCOut2 DCOut3 DCOut4 EIF3 EIF2 EIF1 IF4 IF3 IF2 IF1

LMP BBU OVP ETP EAC SOUT SIN RF1 RF2 RF3 EXT1 EXT2

FSME

DCIn DCIn DCOut DCOut Alarm

DCIn EIF1 EIF2 EIF3 EIF4

FBSA

DC-48V

FTLB

TRSGE Copper / Optical

FBS Ext

DC-48V

LMP

Page 20: Liquid_Applications_System_Description.pdf

20Issue 01

Liquid Applications System Description

Id:0900d80580a3fb97

Radio Applications Cloud Server

Flexi Multiradio 10 BTSThe connectivity with Flexi Multiradio 10 BTS is shown in Figure 14 Connectivity with Flexi Multiradio 10 BTS

Figure 14 Connectivity with Flexi Multiradio 10 BTS

DCIn EIF1 EIF2 EIF3 EIF4

FBBA

FSMF

DC-48V

DCOut DCIn LMP EIF2/RF4 RF3 RF2 RF1 SRIO BBExt1 BBExt2 EIF1 EAC SIN SOUT

DCIn DCOut RF/Ext BBExt SRIO

TRSGE optical

LMP

DCIn EIF1 EIF2 EIF3 EIF4

FBBA

FSMF

DC-48V

DCOut DCIn LMP EIF2/RF4 RF3 RF2 RF1 SRIO BBExt1 BBExt2 EIF1 EAC SIN SOUT

DCIn DCOut RF/Ext BBExt SRIO

TRSGE copper/optical

LMP

DCIn EIF1 EIF2 EIF3 EIF4

EIF4 EIF3 EIF2 EIF1 IF4/8 IF3/7 IF2/6 IF1/5

TRSGE copper

FBBA1

FSMF

DC-48V

DCOut DCIn LMP EIF2/RF4 RF3 RF2 RF1 SRIO BBExt1 BBExt2 EIF1 EAC SIN SOUT

DCIn DCOut RF/Ext BBExt SRIO

TRSGE copper/optical

EIF4 EIF3 EIF2 EIF1 IF4/8 IF3/7 IF2/6 IF1/5

TRSGE copper

FTIF

FTIF

DCIn DCOut RF/Ext BBExt SRIO

FBSA

FBSA

FBBA2

FBSA

DC-48V

FBXA

LMP

Page 21: Liquid_Applications_System_Description.pdf

Issue 0121

Liquid Applications System Description Radio Applications Cloud Server

Id:0900d80580a3fb97

3.6 Software provisioningThe RACS supports commissioning in two stages: pre-commissioning at the factory and final commissioning at the BTS site. The factory pre-commissioning installs the RACS SW and configures the default parameters like RACS IP Address, subnet mask, gateway and certificates in FBSA HW.

For local commissioning using the Structured Command Line Interface (SCLI), the RACS provides a Local Management Port (LMP). The final commissioning at the site provides the capabilities to setup the following:

• the management interface (NE3S/WS) for remote management through NetAct • the management interface for application and cloud management through AFM • the interface to the eNB

The LA10 SW (including Embedded Applications) will be shipped pre-installed on the FBSA. Later release upgrades might be done remotely using NetAct.

Software Asset Monitoring (SWAM) has to be set up in the network. The activation of Embedded Applications is monitored using SWAM.

3.7 Network integrationThis section provides information about the following network integration:

• Transport network integration • LTE U-plane integration • LTE C-plane integration

3.7.1 Transport network integrationBefore installing the RACS, the eNB is connected to the First-Hop-Router (FHR) through a layer-2 (Ethernet) network. see Figure 15 U-plane network architecture. Physical inte-gration of the RACS is done without affecting the operation of the LTE network. Network integration can be performed remotely as a configuration action on both eNB and FHR: The RACS is configured as a next hop as seen from the eNB in uplink and as seen from the FHR in downlink direction. This configuration is done for the the U-plane only (primary U-plane path). The eNB C-plane, M-plane and S-plane are not affected.

Figure 15 U-plane network architecture

The routing concept supports fail-safe behavior because Ethernet links between RACS and FHR and between RACS and eNB are supervised by Bidirectional Forwarding

RACS

First-Hop-Router(FHR)

SAE-GWeNB

Primary U-plane pathSecondary U-plane path

MobileBackhaul

(IP)

MobileBackhaul(Ethernet)

eNB integratedEthernet switch

eNB integratedIP router

Page 22: Liquid_Applications_System_Description.pdf

22Issue 01

Liquid Applications System Description

Id:0900d80580a3fb97

Radio Applications Cloud Server

Detection (BFD). With this, both the eNB and the FHR can perform redundancy switch-ing, which means re-routing the traffic from the primary to the secondary U-plane path.

The FBSA is connected to the eNB through either the EIF1 or EIF3 interface. For more information on FBSA, see 3.3 RACS hardware. EIF2 is allotted for the Local Manage-ment Port (LMP).

Traffic separationThe traffic between RACS Applications and related servers in the Core Network is called application plane traffic. In LA10, this applies to the traffic between the Content Optimi-zation and Delivery (COD) applications running on the RACS, RACS-C, and RACS-T. Separation between different types of traffic, like User plane (U-plane), Management plane (M-plane), and Application plane (A-plane) traffic, can be done optionally using VLAN (IEEE 802.1q).

The RACS has access to LTE C-plane information, but this is provided through the M-plane. The LTE C-plane traffic bypasses RACS. As a result, C-plane is not included in RACS traffic separation.

Transport QoSThe RACS supports QoS on both the Ethernet layer (IEEE 802.1p) and on the IP layer (DSCP).

3.7.2 LTE U-plane integrationThe Traffic Offload Function (TOF) in RACS is responsible for routing selected user traffic from/to selected applications. The traffic offload policy decision in LA10 follows a similar path as in the mobile packet core, for an EPS bearer / E-UTRAN Radio Access Bearer (E-RAB). In addition to an access decision, the policy can also set packet filters. The E-RAB might enter the system through the establishment of a new E-RAB or differ-ent handover scenarios.

LA10 uses a static local policy decision. The policy is configured separately for each Traffic Termination Point (TTP) through the Application Framework Manager (AFM).

The AFM allows different TTP Policy configurations for different RACS. The TTP policy can be modified during the run-time of the application and does not require restarting or redeploying the application. Figure 16 TTP policy shows the packet flow with the sequence of admission decisions that are made and the role of policy filters in overall decision chain.

Ethernet interface IP address Usage

EIF1/EIF3 IP_oam external connectivity to O&Msystems (NetAct, AFM) and eNB integration (cell trace)

IP_app external connectivity for RACS applications

IP_uc gateway address for U-plane downlink traffic from core

IP_ub gateway address for U-plane uplink traffic from eNB

EIF2 IP_lmp local management port (LMP0

Table 3 Ethernet interfaces and IP address

Page 23: Liquid_Applications_System_Description.pdf

Issue 0123

Liquid Applications System Description Radio Applications Cloud Server

Id:0900d80580a3fb97

Figure 16 TTP policy

The optional policy filters have two categories:

• E-UTRAN Radio Access Bearer (E-RAB) policy filters • packet policy filters

The E-RAB policy filters implement E-RAB-level admission decision. The packet policy filters allow filtering based on IP protocol version, Network IP address, and UE IP address.

The following E-RAB policy filter parameters are supported:

• Subscriber Profile ID (SPID) • Quality Class Indicator (QCI) • Allocation Retention Priority (ARP)

The RACS performs U-plane interception to provide user IP layer data to the application. This results in decapsulation and later reconstruction of the following:

• Transport Network Layer (TNL) IP Header (including DSCP persistence) • GTP-U header (including PDCP SN and GTP-U SN persistence)

3.7.3 LTE C-plane integrationThe integration of the RACS to the control and management plane of the eNB enables the RACS to act as a third party trace collection entity through the cell trace interface, see Figure 17 Cell trace interface. Both the U-plane and C-plane data are carried through a single Ethernet link between the RACS and eNB.

PDN conn./eRAB

PDN conn./eRAB

Application

PDN conn./eRAB

Application processing

Application

specific

filtersReject

Pass

Application

policy

filtersReject

Pass

eRAB

policy

filters

Reject

Pass

Reject

Pass

Reject

Pass

eRABARP filters

QCI (qualityclass indicator)

Subscriberprofile ID

ApplicationU-planeinterface

Packetadmission

policy decision

eRABadmission

policy decision

Scope ofTTP policy

End-to-end IP trarffic

Page 24: Liquid_Applications_System_Description.pdf

24Issue 01

Liquid Applications System Description

Id:0900d80580a3fb97

Radio Applications Cloud Server

Figure 17 Cell trace interface

The NetAct TraceViewer application is used for the configuration of the cell trace inter-face at the eNB.

The RACS monitors cell trace signaling and detects creation, modification and deletion of E-RABs. The procedures that triggers offload start are:

• S1AP - E-RAB setup, E-RAB modify, initial context setup, UE context modification, and incoming S1 handover

• X2AP - incoming X2 handover

The procedures that triggers offload termination are:

• S1AP: E-RAB Modify, E-RAB release, UE context modification, outgoing S1 han-dover, Reset

• X2AP: outgoing X2 handover

3.8 SecurityThis section provides information about the following RACS security features:

• Server Security • Server O&M Security • Application Framework O&M Security • Backhaul Security • Application Security

3.8.1 Server securityThe server security feature provides hardware and software protection for the RACS. It includes the following sub-features:

• AES-based disk encryption • Secure boot preparations • Pre-Installed vendor certificate • Double authentication for root account

AES based disk encryptionThe AES-based disk encryption sub-feature adds a physical security layer to the data stored on the integrated Solid State Disks (SSD). It provides a hardware-based mecha-nism for encryption and decryption of user data without performance impact.

The AES-based disk encryption prevents critical data on the SSD to be read or cloned by putting the SSD in another computing device with a SATA interface. The data on the SSD cannot be modified offline in unattended situations.

RACS

MobileBackhaul

Cell TraceInterface

S1

eNBUE SAE-GW

TOF

TOF Traffic Offload Function

Page 25: Liquid_Applications_System_Description.pdf

Issue 0125

Liquid Applications System Description Radio Applications Cloud Server

Id:0900d80580a3fb97

The AES encryption is according to Federal Processing Standards (FIPS) Publication197. An AES key length of 128 is the minimum requirement.

Secure Boot preparationsThe secure boot preparations sub-feature ensures that only authenticated and integrity-checked boot code, OS code, and application code is allowed to go into service. It allows the operator, in future releases, to upgrade to a secure boot environment without site maintenance.

Pre-Installed vendor certificateThe NSN vendor certificate is an individual certificate, which contains the FBSA's serial number, public key, certificate's validity period, and the NSN factory Certification Author-ity's (CA) signature. The NSN vendor certificate is pre-installed into the FBSA during production.

This certificate may be used in later releases to authenticate the FBSA as genuine NSN hardware to an operator's Public Key Infrastructure (PKI).

Double authentication for root accountDouble authentication for the root account is a concept where the access is granted to two super users simultaneously, to conduct any system-wide administrative operation. A representative from NSN and from the operator is required to grant access. None of them alone can take full control of the RACS node without the other party supervising the actions.

3.8.2 Sever O&M securityThe server O&M security provides support in authenticating the O&M connectivity with X.509 certificates and managing these certificates in the RACS. It enables secure O&M control and bulk data communication between RACS and NetAct.

Secure O&M Connections

• HTTPS (NE3S/WS) is the protocol used for securing the O&M connection between RACS and NetAct. TLS is used for encryption and integrity protection of NE3S/WS carried by HTTP to form HTTPS.

• File transfer between RACS and NetAct is encrypted and integrity-protected.

Operator certificate managementPrivate key, public key, and digital certificates in X.509v3 format are handled by the RACS certificate management. Certificate management is required for the enrollment of operator certificates when public key infrastructure (PKI) is used in the network of the customer.

3.8.3 Application framework O&M securityThe Application Framework O&M Security secures the connection between the RACS and Application Framework Manager. The O&M messages and commands through the RACS and AFM are encrypted and integrity-protected by the Transport Layer Security (TLS) using X.509 certificates for authentication. File transfer between RACS and AFM is encrypted and integrity protected by TLS (HTTPS).

Page 26: Liquid_Applications_System_Description.pdf

26Issue 01

Liquid Applications System Description

Id:0900d80580a3fb97

Radio Applications Cloud Server

3.8.4 Backhaul securityThe backhaul security enhances the security for all traffic of the of User plane (U-plane), Management plane (M-plane), and Application plane (A-plane) of the RACS, by provid-ing authentication, encryption, and integrity protection using IPsec. The IPsec provides secure communications between the RACS and the core nodes by using secure trans-port and application protocols.

IPsec supports the following capabilities:

• Services: data integrity protection, origin authentication and anti-replay protection, confidentiality

• Protocol: ESP (RFC 4303) • IPsec mode: tunnel mode • Encryption/ciphering algorithms:

– AES-128-CBC– 3DES-192-CBC– NULL

• Integrity protection algorithm: HMAC-SHA-1-96 • Authentication: digital certificates in X.509v3 format, pre-shared key (PSK) • Identification with IP addresses, fully qualified domain names (FQDN, only with cer-

tificate authentication), and distinguished name ID_DER_ASN1_DN (only with cer-tificate authentication)

• Key exchange:– IKEv1– Diffie-Hellman: Group 2 (1024-bit MODP)

3.8.5 Application securityApplications are packaged and deployed as per OVF 1.1 standard (OVA packages). In LA10, only pre-integrated Embedded Applications are installed. Thus, there is no possi-bility to install an unknown, unauthorized and unauthenticated application image.

3.9 CapacityFor LA10, the capacity of the RACS is designed to be compatible with the eNB capacity of 3-cell configurations for 20 Mhz 2x2 MIMO, applying the all-average/single-peak prin-ciple. This is shown in Figure 18 Throughput performance dimensioning. The RACS also supports a maximum average throughput of 180 Mbps for the downlink and 60 Mbps for the uplink at the Ethernet level of the LA10 Embedded Applications.

Page 27: Liquid_Applications_System_Description.pdf

Issue 0127

Liquid Applications System Description Radio Applications Cloud Server

Id:0900d80580a3fb97

Figure 18 Throughput performance dimensioning

The maximum number of E-RABs that can be handled for the RACS is 5040. The average round trip time (RTT) for all kinds of packets in the RACS without the applica-tions is less than 1 millisecond.

Cellaverage

Ce

ll p

ea

k

All-Averageaverage All-Average / Single-Peak

MAX (( average), peak)

All-Peakpeak

Recommended dimensioning range

Air interface capacity Transport capacity

Overbooking

PracticalMaximum

Minimum

Theoretical Maximum(overdimensioning)

Page 28: Liquid_Applications_System_Description.pdf

28Issue 01

Liquid Applications System Description

Id:0900d80580a3fb99

RACS-C and RACS-T

4 RACS-C and RACS-TThe RACS-C and RACS-T are the key HW elements of the Content Optimization and Delivery (COD) solution located in the EPC. These two new HW entities host the RACS-C/COD and RACS-T/COD software.

4.1 HardwareThe RACS-C and RACS-T are based on commercial off-the-shelf (COTS) carrier grade servers. Furthermore, specific switches are selected supporting the required L2-based load balancing using LAG/LACP with SRC/DEST-IP hashing.

4.1.1 RACS-C • HP DL380 Gen8 with 2 x XEON E5-2620 (6 Core @ 2GHz, HT, 15MB cache) • memory: 48GB RAM • HDD: 2 arrays of 8 disks of 900 GB to16 x 900 GB = 14,4 TB; highly reliable "enter-

prise" server disks; Smart Array P420/2GB FBWC controller • 10G-BaseT Ethernet cards (default)

– 5 x 10G cards with 10 x 10G ports; DPDK-capable Intel 10G controllers (HP 10GBase-T controller 561T (Intel's 540/ Twinville chipset))

• AC (default) or DC power supply • 2 rack units

4.1.2 RACS-T • HP DL380 Gen8 with 1 x XEON E5-2620 (6 Core @ 2GHz, HT, 15MB cache) • memory: 8GB RAM • HDD: 2 disks of 300 GB to 600 GB • 10G-BaseT Ethernet cards (default)

– 2 x 10G cards with 4 x 10G ports; DPDK-capable Intel 10G controllers (HP 10GBase-T controller 561T (Intel’s 540 / Twinville chipset))

– 2 x 1G cards with 2 x 1G ports (for CODP & O&M) • AC (default) or DC power supply • 2 rack units

4.1.3 SwitchesDefault (electrical):

• HP 5900AF-48XGT-4QSFP (electrical + 4 x QSFP) • 48 x 10G 10BaseT electrical ports • 4 x 40G QSFP optical ports • AC (default) or DC power supply • 1 rack unit

Optional (optical):

• HP 5900AF-48XG-4QSFP (optical + 4 x QSFP) • 48 x 10G SFP+ optical ports • 4 x 40G QSFP optical ports

Page 29: Liquid_Applications_System_Description.pdf

Issue 0129

Liquid Applications System Description RACS-C and RACS-T

Id:0900d80580a3fb99

• AC (default) or DC power supply • 1 rack unit

4.2 SoftwareThe HW entities RACS-C and RACS-T are hosting the RACS-C/COD and RACS-T/COD software:

RACS-C:

• OS: CentOS 6.4 • RACS-C/COD application SW

RACS-T:

• OS: CentOS 6.4 • RACS-T/COD application SW

Page 30: Liquid_Applications_System_Description.pdf

30Issue 01

Liquid Applications System Description

Id:0900d80580a3fb95

Operation, administration, and maintenance

5 Operation, administration, and maintenanceWith the separation of the telecom and IT domains discussed in 1.2 Telecom and IT domains, the operation, administration, and maintenance for LA is addressed by domain-specific tooling:

• NetAct (for the telecom domain) • Application Framework Manager (for the IT domain) • Application specific managers (as required)

Figure 19 Operability domains and tools shows the operability domains and tools.

Figure 19 Operability domains and tools

5.1 NetActThe network resource management (NRM) provides the ability and means to monitor and control NEs from a central location. It supports the operator in executing automated tasks, such as the configuration of NEs, fault detection, fault handling, or performance surveillance.

Netact is the NRM platform for managing the LA network elements. NetAct provides extended and sophisticated NEM functions, which includes the complete set of func-tional areas, fault, configuration, security as well as software management and perfor-mance monitoring.

NetAct is designed as a client and server system. The client provides a graphical user interface (GUI), which enables the operator to inspect individual LA network elements or groups of NEs. The server is the central processing entity and operates in the back-ground. The server provides the contents of the GUIs displayed on a client using Web-UI and Java functions. Management applications on the server communicate with the dedicated O&M agents residing on RACS network elements, thus completing the func-tional NRM communication path from the client via the server to a NE and vice-versa.

The main functional areas to be covered by the NRM system are commonly known under the acronym FCAPS, which stands for fault, configuration, accounting, perfor-mance, and security management. In addition, NetAct provides system management. Besides these functional areas, NetAct additionally provides the possibility of a central-ized backup and restore function.

Fault managementNetAct Monitor is the fault management application of the NetAct tool. It enables differ-ent and independent monitoring tools to be integrated within the same common desktop. Failures are represented by alarms with a certain severity level like: critical, major, and minor. In addition, explanation and repair texts are displayed.

Application Platform

Base Platform

ApplicationFrameworkManager

ApplicationManagers

NetAct

Application

Page 31: Liquid_Applications_System_Description.pdf

Issue 0131

Liquid Applications System Description Operation, administration, and maintenance

Id:0900d80580a3fb95

The fault management function provides fault monitoring of all the software layers of the LA. The fault management of LA is based on the FlexiPlatform (FP) FPT2.0 release and the Nokia Enhanced SNMP Solution Suite- Web Service (NE3S/WS) agent.

Configuration managementNetAct has access to the LA data through the use of dedicated NE3S/WS agent for con-figuration management (CM) purposes. The communications between NetAct and the NE is based on SOAP (XML over HTTPS). For accessing configuration data, a generic GUI is provided on the NetAct client.

The configuration management of the LA is based on the NetAct Configurator applica-tion, which consists of the CM Editor and the CM Operations Manager. In the context of the NetAct Configurator, configuration is a set of Managed Objects. The NetAct Config-urator application modules provide a set of tools to visualize and manage the configura-tion of network resources.

The NetAct Configurator provides a north mediation interface to export CM data in XML or CSV syntax, which can be further processed and adapted to systems in the operator's environment.

Performance monitoringPerformance monitoring for LA10 uses the NetAct Reporter to provide data collection, processing, and web-based tools to create and manage reports and KPIs. Pre-made Reporting Suites are provided for the RACS network elements. In addition, own reports can be created by the user with free selection of performance indicators and network elements to be contained within the reports.

The NetAct Reporter also provides a north mediation interface to export performance monitoring data in XML format.

Software managementSoftware management of the RACS elements is provided by the NetAct software manager. Software manager provides the capability to roll out new software releases and change packages in a fast and reliable manner from a centralized location.

Log managementLog Management is done with the NetAct Audit Trail application. Logs from the LA log database are uploaded to the Audit Trail. Log data might be exported from the Audit Trail storage.

g Audit trail support will be provided for the LA future releases

System managementThe system management of NetAct includes launching element managers that cover the following functions for LA:

• Process management • Shell access • Trace management

Backup and restoreBackup and restore (B&R) management enables the backup and restoration of NE data and software. B&R is used for the recovery of different types of failures and disasters. The following backup types are used depending on the degree of loss:

• Full backup of relevant file systems

Page 32: Liquid_Applications_System_Description.pdf

32Issue 01

Liquid Applications System Description

Id:0900d80580a3fb95

Operation, administration, and maintenance

• Incremental backup of relevant file systems • Full database backup • Incremental database backup

The failure or disaster severity determines the procedure to be performed to restore the data. The following restoration types are used:

• Restore of relevant file systems • Restore of last full database backup • Point-In-Time restore of database (only if supported by the database) • Complete restore of the NE

The B&R solution also supports Fast System Restore (FSR) and Monitoring backup and restore applications. NetAct uses Networker-based B&RServer (BRS) that runs on a computing platform (CPf). The CPf uses HW from the HP Proliant product family, RedHat Linux (RHEL) for the SW, and IBM SolidDB for the operating system and data-base. The Networker server is managed via NetAct. Through the NE3S/WS agent, the Networker server forwards the alarms and counters to the monitoring and performance management applictions of NetAct. For the Networker operation, the Networker GUI is a screen level that is integrated in NetAct.

5.2 Application Framework ManagerThe Application Framework Manager (AFM) is a user interface that manages the lifecy-cle and operability of the application and services provided by the application platform of the LA. In LA10, AFM is based on the following components:

• HW: HP DL360p Gen8 • SW:

– ITNCM (IBM Tivoli Netcool Configuration Manager) version 6.4– Redhat Linux

The AFM supports the following functions:

• Application Platform Configuration Management– Machine application policy (for example, machine recovery priority)– TTP policy (RAB selection parameters)

• Application life cycle management– Application deploy (activation)– Application undeploy (deactivation)– Application start– Application stop

• Application configuration management - Application properties (exposed to applica-tions running inside the virtual machine)

Page 33: Liquid_Applications_System_Description.pdf

Issue 0133

Liquid Applications System Description Embedded applications

Id:0900d80580a3fb8f

6 Embedded applicationsTable 4 Embedded applications shows the embedded applications supported by LA10 and the required NE(s) for each application feature.

Content Caching, DNS Caching, and Video Prioritization and Pacing are supported by the Application Package Content Optimization and Delivery. TCP Header Enrichment requires the respective Application Package to be installed.

Content Caching and TCP Header Enrichment applications are activated by default when the respective application package is installed. DNS Caching and Video Prioriti-zation and Pacing is optionally activated, depending on the need of the customer.

6.1 Content Optimization and DeliveryThe main function of the Content Optimization and Delivery (COD) solution is mobile-network-optimized transparent content caching. Transparent content caching allows to cache and serve content from a content cache hosted by the RACS at the eNB. The COD solution has three building blocks; for more information, see Figure 20 Transparent Content Caching - High Level Architecture. The three COD solution building blocks are:

• The RACS/COD is an Embedded Application on the RACS at the eNB base station providing a local content cache.

• The RACS-C/COD application is located at the SGi side of the mobile packet core providing a central content cache and cache control.

• The RACS-T/COD (Tokenizer) application is located at the S1 or S5 side of the mobile packet core, replacing the TCP payload with references to the real content as stored in the local cache at RACS/COD.

The COD-P (COD protocol) provides the connectivity for intra-COD signaling and data transfer.

Application (Application

Package)

Application Feature

Activation RACS RACS-T RACS-C

Content Optimiza-tion and Delivery (COD)

Content Caching default x x x

DNS Caching optional x

Video Prioritization and Pacing

optional x x x

TCP Header Enrichment (TCP-HE)

TCP Header Enrichment

default x

Table 4 Embedded applications

Page 34: Liquid_Applications_System_Description.pdf

34Issue 01

Liquid Applications System Description

Id:0900d80580a3fb8f

Embedded applications

Figure 20 Transparent Content Caching - High Level Architecture

The COD supports the following applications:

• Content Caching • DNS Caching • Video Prioritization and Pacing

6.1.1 Content CachingFrequently requested content is cached in proximity with the requesting mobile users. Therefore, content caching reduces the load on the backhaul network and improves the user experience because of faster content download. Figure 21 Content Caching shows the content caching solution. The solution supports handover, charging, and Lawful Interception (LI) functions, which is performed by the respective CN elements.

Figure 21 Content Caching

6.1.2 DNS CachingThe purpose of DNS caching is to improve the DNS response time for the end-users by answering DNS queries from a local DNS cache at the RACS. When a UE requests a single web page, it triggers several DNS queries. Frequently requested address resolu-tions are cached on the RACS instead of routing DNS queries to remote DNS servers. This makes the web page load faster as DNS requests are quickly responded to, thus improving the perceived user-experience. Figure 22 DNS Caching shows the DNS caching network aspects.

Packet DataNetwork

eNBUE

RACS/COD

RACS-T/COD

S-GW P-GWRACS-C/

COD

Localcache

S1-U S1-U S5

SAE-GWSGi SGi

Centralcache

Policy, Charging, LI

(COD-P intra COD communication)

RAN EPC

WebServerLTE-Uu

UE eNB RACS

MobileBackhaul

RACS-T SAE-GW RACS-C

Internet

Server

Caching Caching“Tokenization”

LI, Charging

Page 35: Liquid_Applications_System_Description.pdf

Issue 0135

Liquid Applications System Description Embedded applications

Id:0900d80580a3fb8f

Figure 22 DNS Caching

Cached entries are managed according to the DNS response frame Time-To-Live (TTL) value. Although the DNS query is served from the DNS cache, the original DNS query is forwarded to the respective DNS server to satisfy lawful interception regulations.

6.1.3 Video Prioritization and PacingThe Video Prioritization and Pacing application contains two optimization techniques for the delivery of cached video from RACS:

• Video Rating and Prioritization- The Video Rating and Prioritization performs intra-E-RAB optimization of concurrent traffic of one user without interfering with the prioritization between E-RABs. The optimization monitors the media parameters of each flow, including the required video bit-rate. If the actual video bit-rate is lower than the required, the RACS controls the bit-rate of the low-priority TCP flows passing over the same E-RAB.

• Adaptive Video Pacing- The Adaptive Video Pacing is about “just-in-time” delivery of a media stream towards the UE. The UE is served with the content while being consumed by the user. This is important in cases where the user starts consuming content and stops the session after a short time. With this capability, only the portion of the content being consumed by the user is downloaded towards the UE.

6.2 TCP Header EnrichmentThe TCP Header Enrichment conveys Radio Resource Management (RRM) data to a content optimizer, such as the NSN Flexi Content Optimizer (FCO), in real time. The TCP Header Enrichment provides the cell ID, cell load, and per bearer throughput guidance indicators. These indicators are inserted in the upstream user IP flows into the options field of the TCP header. The enriched flows are received by FCO which is deployed on the Gi interface. As a result, FCO applies optimization schemes under fine granular radio condition awareness. Figure 23 TCP Header Enrichment shows the TCP Header Enrichment network aspects.

UE eNB RACS

MobileBackhaul

RACS-T SAE-GW RACS-C

Internet

Server

Caching Caching“Tokenization”

LI, Charging

Page 36: Liquid_Applications_System_Description.pdf

36Issue 01

Liquid Applications System Description

Id:0900d80580a3fb8f

Embedded applications

Figure 23 TCP Header Enrichment

UE eNB RACS

MobileBackhaul

SAE-GW ContentServer

Content Optimizer(in Core Network)

Internet

IP

TCP

HTTP

Content

TCP Header Enrichment

IP IP Application IP IP

TCP

HTTP

Content

IP

TCP

HTTP

Content

2) Optimized content delivery

1) TCP with additional header information

Page 37: Liquid_Applications_System_Description.pdf

Issue 0137

Liquid Applications System Description Glossary

Id:0900d80580a3e397

7 GlossaryApplication Frame-

work Managerthe user interface (UI) to manage the RACS Application Platform and the lifecycle of RACS Applications. AFM in LA10 is based on ITNCM v6.4 (IBM Tivoli Netcool Configu-ration Manager).

RACS applicationfeature

a functional item of a RACS application

Upon activation of a RACS Application Package, one or more supported RACS Appli-cation Features might be enabled by default. Other (optional) RACS Application Features might be activated selectively through AFM.

RACS applicationpackage

SW image which is deployed on the RACS platform using the Application Framework Manager (AFM) and supports the RACS Application

RACS / RACS-C /RACS-T add-on

applications

(from LA20 onwards) can be created by NSN or 3rd parties (for example, Independent Software Vendors) and provided independently from a Liquid Applications system release

RACS / RACS-C /RACS-T applications

application software running on the RACS / RACS-C / RACS-T application platform

RACS / RACS-C /RACS-T embedded

applications

created by NSN and provided as part of a Liquid Applications system release

Remote applications application software running on other network elements, but is functionally related to RACS / RACS-C / RACS-T applications

Page 38: Liquid_Applications_System_Description.pdf

38Issue 01

Liquid Applications System Description

Id:0900d80580a40deb

Acronyms

8 Acronyms AC Alternating current

AFM Application Framework Manager

API application programming interface

ARP allocation and retention priority

A-plane Application plane

BFD Bidirectional Forwarding Detection

CDR charging data record

CM Configuration Management

CN core network

COD Content Optimization and Delivery

COTS commercial off-the shelf product

CRAN Centralized RAN

C-plane Control plane

DC direct current

DEST Destination

DRAN Distributed RAN

EPC evolved packet core

E-RAB E-UTRAN radio access bearer

FCO Flexi Content Optimizer

FHR First-Hop-Router

FM Fault Management

FTP file transfer protocol

GE Gigabit Ethernet

GW gateway

HDD hard disk drive

HTTP hypertext transfer protocol

HW hardware

IaaS Infrastructure-as-a-Service

ITNCM IBM Tivoli Netcool Configuration Manager

L2 Layer 2

Page 39: Liquid_Applications_System_Description.pdf

Issue 0139

Liquid Applications System Description Acronyms

Id:0900d80580a40deb

LA Liquid Applications

LACP Link Aggregation Control Protocol

LAG Link Aggregation Group

LI lawful interception

LMP local management port

LTE long-term evolution

MBH mobile backhaul

M-plane management plane

NRM Network Resource Management

O&M operation and maintenance

OS operating system

OTT Over-the-top

PaaS Platform-as-a-Service

PKI public key infrastructure

PM Performance Management

QC quality class indicator

QoE quality of user experience

QoS quality of service

QSFP Quad Small Form-Factor Pluggable (Transceiver-Module)

RACS Radio Applications Cloud Server

RACS-C RACS-Core

RACS-T RACS-Tokenizer

RAN radio access network

RRM radio resource management

RTT round-trip time

SAE system architecture evolution

SCLI Structured Command Line Interface

SEG security gateway

SFP small form-factor pluggable

SNMP Simple Network Management Protocol

SPID service provider identification

SRC source

Page 40: Liquid_Applications_System_Description.pdf

40Issue 01

Liquid Applications System Description

Id:0900d80580a40deb

Acronyms

SSD Solid State Disk

SW software

SWAM software asset monitoring

S-plane synchronization plane

TCO total cost of ownership analysis

TOF traffic offload function

TTP traffic termination point

UE user equipment;

UI user interface

U-plane user plane

VM virtual machine