Bandwidth Optimization and Protection for Wireless Backhaul

Similar documents
Use of MPLS in Mobile Backhaul Networks

WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED

Packet Synchronization in Cellular Backhaul Networks By Patrick Diamond, PhD, Semtech Corporation

ALTERNATIVE BACKHAUL AND DATA OFFLOAD SOLUTIONS FOR GSM AND UMTS OPERATORS

The future of mobile networking. David Kessens

THE Evolution of Mobile network and THE role of Network transport. Rodolfo Di Muro, PhD, MBA Programs marketing

Using & Offering Wholesale Ethernet Network and Operational Considerations

Intel Network Builders Solution Brief. Intel and ASTRI* Help Mobile Network Operators Support Small Cell Networks

Cisco Wireless Security Gateway R2

Mobile Backhaul The Next Telecoms Revolution

HSPA, LTE and beyond. HSPA going strong. PRESS INFORMATION February 11, 2011

MIGRATING PUBLIC SAFETY NETWORKS TO IP/MPLS

Challenges in Future Wireless Broadband Access Networks

Get the best performance from your LTE Network with MOBIPASS

Mobile Wireless Overview

Whitepaper. 10 Metrics to Monitor in the LTE Network. blog.sevone.com

Synchronization Requirements in Cellular Networks over Ethernet

LTE Overview October 6, 2011

WHITE PAPER. Use of MPLS technology in mobile backhaul networks CONTENTS: Introduction. IP/MPLS Forum White Paper. February Introduction...

WiMAX and the IEEE m Air Interface Standard - April 2010

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]

FPGAs in Next Generation Wireless Networks

Wireless Carrier Ethernet Networks

Timing over Packet. Technical Brief

Nokia Siemens Networks Flexi Network Server

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA

White paper. Mobile broadband with HSPA and LTE capacity and cost aspects

JDSU Signaling Analyzer Family. Dramatically Re-engineered for an Industry Revolution

Architecture and transport for mobile broadband backhaul. Kåre Gustafsson Ericsson Research

Transporting Legacy Switched Digital Circuits Using a Packet Network

Understanding Mobile Wireless Backhaul

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Wireless Technologies for the 450 MHz band

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications

Application Note Gigabit Ethernet Port Modes

Auspex Support for Cisco Fast EtherChannel TM

Oracle s Secure HetNet Backhaul Solution. A Solution Based on Oracle s Network Session Delivery and Control Infrastructure

Cellular Backhaul: Extending the Edge of the Network November 2008

MNS Viewpoint: LTE EVOLUTION IN AFRICA 1. Introduction

PQoS Parameterized Quality of Service. White Paper

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks

Business Case for the Brocade Carrier Ethernet IP Solution in a Metro Network

Broadcom 10GbE High-Performance Adapters for Dell PowerEdge 12th Generation Servers

Alcatel-Lucent 9360 Small Cell Solution for the Home. Delivering big gains all around

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology

Connect & Go with WDM PON Ea 1100 WDM PON

Better Backhaul for Mobile

Use Current Success to Develop Future Business

Mobile Backhaul over Copper Networks

Verizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions

Fibre Channel over Ethernet in the Data Center: An Introduction

Simplified network architecture delivers superior mobile broadband

Cooperative Techniques in LTE- Advanced Networks. Md Shamsul Alam

1 Introduction Services and Applications for HSPA Organization of the Book 6 References 7

Monitoring Service Delivery in an MPLS Environment

Leased-Line Replacement. Utilizing gigabit wireless links to provide fiber-like performance at significant savings compared to leased lines.

LTE BACKHAUL REQUIREMENTS: A REALITY CHECK

Achieving Smooth Migration to a Next-Generation Mobile Backhaul Network

LoopStar 700. Next Generation Ethernet Access and Transport Solutions

ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS

Juniper Networks Universal Edge: Scaling for the New Network

The term Virtual Private Networks comes with a simple three-letter acronym VPN

Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data

Improving Quality of Service

Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service

Technical white paper. Enabling mobile broadband growth Evolved Packet Core

Wireless & Mobile. Working Group

Building High-Performance iscsi SAN Configurations. An Alacritech and McDATA Technical Note

NSN White paper February Nokia Solutions and Networks Smart Scheduler

Figure 1. Example of a Security System

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Telephone Company Lease Line Elimination. Dewey Day Principal Operational Technology Architect Pacific Gas & Electric

Media Gateway with IP and ATM Interworking

基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器

White Paper Abstract Disclaimer

5. DEPLOYMENT ISSUES Having described the fundamentals of VoIP and underlying IP infrastructure, let s address deployment issues.

of Network Access ASC Broadband Services Access Platform The New Edge Advanced Switching Communications

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN

App coverage. ericsson White paper Uen Rev B August 2015

White Paper. D-Link International Tel: (65) , Fax: (65) Web:

THE EVOLUTION OF EDGE

Carrier Ethernet: New Game Plan for Media Converters

ACE IP Wireless Loop Alternatives Wireless Broadband Access Platforms. Russ Hamilton Director Technology May 2, 2008

SATELLITE MOBILE BACKHAUL: FROM VOICE TO DOMINANT DATA

Smart Solutions for Network IP Migration

Application Notes. Introduction. Contents. Managing IP Centrex & Hosted PBX Services. Series. VoIP Performance Management. Overview.

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Nokia Siemens Networks mobile softswitching Taking voice to the next level

SBSCET, Firozpur (Punjab), India

Traffic. Data Dominant. Time. Figure 1. Wireless network traffic timescale

White paper. Reliable and Scalable TETRA networks

LTE Performance and Analysis using Atoll Simulation

Transcription:

Bandwidth Optimization and Protection for Wireless Backhaul Tien Shiah March 2009

Introduction As multimedia applications become ubiquitous on mobile phones, service providers will need to dramatically increase the bandwidth of their backhaul networks. This poses a challenge, as transmission facilities are one of the largest contributors to a service provider s operating costs. The need to mitigate these costs is driving the migration of backhaul connections onto more efficient packet-based networks. This paper discusses the evolving wireless backhaul network, and an elegant method to optimize as well as protect the traffic flowing through it. Evolution of Wireless Backhaul Wireless mobile technologies include cellular as well as WiMAX 1. Cellular networks are in the midst of 3G deployments, with 4G equipment currently under development 2. LTE networks 3 will eventually enable subscriber data download rates as high as 100 Mbps. WiMAX will also evolve into a 4G technology that competes with cellular. Its peak data rates will be around 70 Mbps. In order to offer subscribers such high data rates on user devices, the backhaul network needs to be upgraded. Wireless backhaul refers to either the connection from base stations to the network controller, or from the network controller to the mobile operator s core network. A base station in a cellular network is either called a base transceiver station (BTS),, or e. The terminology applies to whether you are referring to 2G, 3G, or 4G technologies, respectively 4. The network controller is either called a base station controller (BSC) or radio network controller (RNC). The following diagram illustrates the key elements in a cellular network. 1 Worldwide Interoperability for Microwave Access, a technology based on IEEE 802.16 standard 2 3G refers to the third generation of standards and technology for mobile networking, 4G refers to the fourth generation 3 LTE refers to Long Term Evolution, a 4G cellular technology 4 Note that CDMA2000, although a 3G technology, uses the term BTS for base stations 2

2G or 3G Network 4G Network Air BTS or T1/E1 or ATM BSC or RNC Air e IP Switch BTS or Packet Control Unit e MME/ SRNC MME: Mobile Management Entity SRNC: Serving Radio Network Controller Figure 1: Key Elements in Cellular Network With mobile operators offering increasing data rates to stay competitive, the backhaul link from the base station to the rest of the network is moving from T1/E1 (~1.5Mbps) leased lines to more cost-effective (shared) connections 5. Femtocells are being deployed to increase coverage for mobile network providers inside buildings. Rather than adding a costly macro base station to boost the wireless signal, a much cheaper femtocell base station is deployed inside the subscriber s home. Each base station typically supports four users and connects to femtocell Access Gateways over the Internet. Each Access Gateway aggregates the traffic of potentially hundreds of femtocell base stations before passing it to the RNC. The following diagram illustrates a cellular network before and after the addition of femtocells. 5 Femtocell base stations use the public Internet for the backhaul connection. 3

Wireless Network Wireless Network with Femtocells Air ATM Radio Network Controller (RNC) Air IP Femtocell Base Station Internet IP Access Gateway IP ATM RNC Figure 2: Femtocells in Cellular Networks As mentioned previously, transmission is a major contributor to a mobile operator s capital and operating expenses 6. As the network evolves from 2G to 4G technologies using disparate transmission facilities, there is motivation to consolidate them onto a common carrier. Pseudowire emulation (PWE) has been defined by the IETF 7 as the emulation of a native service (such as T1/ E1) over a packet switched network (such as ). The aggregation of disparate links from 2G, 3G, and 4G base stations via PWE access equipment onto can provide substantial savings related to facilities. The following diagram illustrates the use of PWE equipment. 2G 3G T1/E1 ATM Pseudowire Emulation (PWE) Access Service Pseudowire Emulation (PWE) Gateway T1/E1 ATM BSC RNC 4G Multi-protocol Pseudowires IP Switch Figure 3: Backhaul Aggregation using Pseudowires 6 Juniper Networks indicates mobile operators are spending more than 30% of the operating expense budgets on mobile backhaul IP/MPLS Backhaul to the Cell Site (Mar/08) 7 Internet Engineering Task Force 4

The Need for Bandwidth Optimization and Security Cellular base stations were originally connected to the rest of the network via dedicated leasedlines. These connections were secure, but very expensive. As user demand for bandwidth has increased, these connections have evolved to being carried over more cost-effective, shared packet networks. Given that cost-savings is a key goal, further savings can be achieved by compressing the data before it is sent onto the wire. Although compression ratios are traffic-dependent, achieving a 50% reduction in bandwidth usage via IPcomp 8 is a reasonable expectation. Shared networks pose security risks that need to be mitigated using encryption technology. The de facto standard for security in packet-based IP networks is IPsec. In fact, the 3GPP 9 has made IPsec mandatory for the backhaul connection of 4G base stations. Femtocell base stations reside on customer premises and connect to the mobile operator s network via the Internet. The 3GPP also mandates that these backhaul connections use IPsec for security 10. Finally, pseudowires that are carried on services should be protected by encryption as well. Some of the barriers for adding compression and security to communications links have to do with performance, cost, and power budget. The algorithms used in IPcomp and IPsec are very CPU intensive. As such, performing these functions can degrade the overall performance of the system. The compressed and encrypted throughput may also be inconsistent depending on the load of the CPU performing concurrent tasks. This would translate into poor service for subscribers. The following chart illustrates the enormous amount of CPU resources taken up by performing compression and encryption in software. CPU Utilization 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% Software Range of Throughput* 0 100 200 300 400 500 600 700 800 900 * Not practical to use > 50% of CPU for I/O CPU: Xeon (2GHz, Quad-core) Throughput (Mbps) Compression Encryption Figure 4: CPU Loading from Software Compression/Encryption 8 Industry-standard compression protocol using LZS (Lempel-Ziv Stac) algorithm 9 Third Generation Partnership Project a collaboration of telecom associations that specifies standards for cellular technologies 10 The technical specifications TS 33.210 and TR 33.821 specify the security requirements for wireless networks 5

Each successive generation of mobile technology will also require network latency to decrease. Network latency is defined as the round-trip time for data to travel from the mobile unit through the wireless network. For example, the latency requirement decreased from over 600 ms in a 2G GPRS network to about 10 ms in 4G LTE networks. This is so operators can deliver an improved end-user experience for real-time and interactive applications such as online gaming, multi-cast, and VOIP. 700 600 Latency (ms) 500 400 300 200 100 0 GPRS EDGE Rel 99 EDGE Rel 04 WCDMA HSPA LTE Source: Rysavy Research Sept, 2008 Cellular Technology Figure 5: Network Latency Requirements Becoming More Stringent Addressing the Challenge Equipment manufacturers and network operators are left with a daunting problem: compressing/ encrypting backhaul links and reducing network latency all while keeping costs and power consumption under control. Adding compression and security requirements typically increases latency, as those functions take many CPU cycles and memory copies/transfers to process a single packet. A faster, more expensive CPU can address throughput, but may not address the latency problem inherent in memory copies. The throughput may also be inconsistent depending on the load of other concurrent processes. The problem needs to be solved by specialized processors that completely offload compression and security functions from the host CPU while adding almost zero latency. The economics of using dedicated processors to perform specialized functions have been proven over time. However, as the specialized function matures, it eventually becomes integrated into the host CPU. Security processors have been in existence for many years and many embedded processors now have an integrated security core. However, these traditional security processing 6

architectures still require the use of many memory copies/transfers to process a single packet adding to latency. In security processor jargon, this configuration is known as a LookAside architecture. The following diagram illustrates the steps needed to process an IPsec packet. Security Coprocessor Backhaul GbE PHY GbE MAC 6 3 4 CPU 2 5 System Memory 1. Get packets from radio network 2. Store in memory 3. Direct packet to security processing 4. Store results back in memory 5. Get packets for further processing 6. Send packet to backhaul network 1 Radio Subsystem Figure 6: Data Flow in Traditional LookAside Architecture Network equipment that support compression and encryption using LookAside architectures need to be designed with those functions in mind from the start; thus adding the functions to an existing design becomes impractical. Steps 3 and 4 in Figure 6 also use CPU cycles unnecessarily relative to a FlowThrough architecture (described below). When experiencing heavy CPU loads, those steps may be delayed introducing additional latency. A better way to add compression and security to wireless backhaul is to use a FlowThrough processor. In this scenario, the CPU is relieved of all compression and encryption processing responsibility. The processor is added as a drop-in or bump-in-the-wire device between the MAC and PHY devices connected to the backhaul network. The following diagram illustrates how this solution simplifies and addresses the wireless backhaul challenge. As can be seen, the multi-hop journey of a packet to and from the host CPU is eliminated. The FlowThrough processor performs all of the steps necessary to compress the data and convert a clear-text IP packet into a secure IPsec packet to be transported to the backhaul network. A carefully designed FlowThrough device will also add minimal latency to the data path by using dedicated compression, crypto, and Public Key (PK) cores to process each packet. 7

Drop-in Solution Backhaul FlowThrough Security GbE PHY GbE MAC CPU 3 2 System Memory 1. Get packets from radio network 2. Store in memory 3. Send packet to backhaul network 1 Radio Subsystem Figure 7: Data Flow in FlowThrough Architecture Hifn brings years of experience building hardware processors that perform the compression and encryption functions. FlowThrough processors completely offload those tasks from the host CPU, including algorithm and protocol processing. For example, Hifn s 8450 processor compresses and encrypts data at up to 4 Gbps, enough to support two full-duplex Gigabit links at line rate. Compression and encryption are done in a single pass. The 8450 adds only 4 µs of latency and uses only 2.5 watts of power, making it ideal for wireless backhaul applications. The 8450 supports on-chip IKE 11 processing via one bank of inexpensive DDR2 SD 12. The 8450 interfaces to other devices via standard gigabit interfaces 13. 11 IKE refers to Internet Key Exchange, a protocol used to set up security associations in IPsec 12 With optional ECC (error correcting code) memory 13 GMII/TBI, RGMII/RTBI, SGMII, 8

ECC DDR2 SD 32/39-bit Control Plane Control Port (RMll) RNG MAC esc (Control Path) Public-Key Engine Memory Bridge DPU (Fast Path) Bridge Policy TCAM Code Data Post Processor Code Data SGMll/ Ch 0 RGMll/ RTBl Ch 1 SGMll/ GbE MAC GbE MAC Buffer Buffer Packet Queue Manager DMA Engine 0 Engine 1 Post Post Buffer Buffer GbE MAC GbE MAC SGMll/ Ch 0 GMll/TBl RGMll/RTBl Ch 1 SGMll Figure 8: Block Diagram of Hifn s FlowThrough Architecture The control interface to the 8450 is achieved via in-band frames via the Host Interface. However, an additional RMII (100Mbps ) interface offers an optional out-of-band control port. This port may also be used to establish an inter-chip link for multi-chip designs. The diagram below illustrates the steps that take place within the 8450 device. 9

D Source and destination IP address Protocol (TCP/UDP/ICMP...) Source and destination port numbers VLAN tag channel number (0 or 1) To Network Link-Layer Post- Processing Processing Fetch Lookup Policy Lookup IP Header Check & Extraction Link-Layer From Host L s On-chip L Mask Policy TCAM From Network Link-Layer IP Header Check & Extraction Lookup Fetch Processing Policy Selector Check Post- Processing Link-Layer To Host D D = Database L = Lookup table TCAM = Ternary Content-Addressable Memory Figure 9: Process Flow in Hifn s FlowThrough Architecture The hardware comes with the IKE stack that is loaded into the SD. It also comes with a software development kit (SDK) that provides the necessary application programming interfaces (API s) to set up initial security policies. Once the policies are set up, the 8450 takes care of all processing associated with compressing and encrypting the traffic. Termination of IP and is completely implemented on-chip, including fragmentation and reassembly of IP packets and ARP resolution for the interface. Summary The evolution of wireless services from supporting plain voice to rich multimedia has increased the bandwidth requirements of backhaul connections. As network facilities are one of the highest contributors to a mobile operator s costs, the backhaul connections are consolidating onto shared packet networks. A Hifn FlowThrough processor provides mobile equipment vendors the ability to offer bandwidth optimization and protection with minimal software integration effort - all while remaining within the cost, power, and latency budget. The drop-in nature of the device also enables the quickest time-to-market for vendors. For network operators, this means reduced facilities costs, improved quality of service, as well as meeting government compliance requirements with regard to protection of user data. 750 University Ave Los Gatos, CA 95032 408.399.3500 tel 408.399.3501 fax info@hifn.com www.hifn.com 2009 by Hi/fn, Inc. Patent pending. Diversion contrary to U.S. law prohibited. Hifn is a trademark of Hi/fn, Inc. Hi/fn and LZS are registered trademarks of Hi/fn, Inc. All other trademarks are the property of their respective owners. 0309