You are on page 1of 6

Agile POL Solution

Configuration Guide 1 Data Planning Principle

1 Data Planning Principle

About This Chapter

1.1 Principles for IP Address Planning


To facilitate future capacity expansion, set convenient management as the major objective in
IP address planning for an AgilePOL.
1.2 Principles for QoS Planning
As a type of E2E planning, QoS planning can be divided into following policies: traffic
classification, marking, and scheduling policies, and traffic monitoring.
1.3 Principles for Security Planning
Security solution ensuring that user services are provided properly from different dimensions.
1.4 Principle of Reliability Planning
Reliability planning covers planning of equipment reliability and upstream/downstream
networking protection. Reliability planning helps to achieve high reliability of enterprise
access services.

1.1 Principles for IP Address Planning


To facilitate future capacity expansion, set convenient management as the major objective in
IP address planning for an AgilePOL.

General Principles
l On a campus network, use public network IP addresses for a few devices in the
demilitarized zone (DMZ) or Internet zone and private network IP addresses for devices
inside the campus.
l Principles for using a dynamic or static IP address are as follows:
– Use static IP addresses for servers, special terminal devices (such as clocking
terminals, printing servers, and IP video surveillance devices), and manufacture
devices.
– Use the Dynamic Host Configuration Protocol (DHCP) to dynamically obtain the IP
addresses of office devices (such as PCs and IP phones).

Issue 02 (2018-10-10) Copyright © Huawei Technologies Co., Ltd. 1


Agile POL Solution
Configuration Guide 1 Data Planning Principle

DHCP Planning
l Deploy an independent DHCP server in the data center or server zone of the campus.
l On the convergence layer gateway, configure a DHCP relay agent, which is directed to
an IP address allocated by the DHCP server.
l Allocate IP addresses through a virtual local area network (VLAN) within a DHCP
campus. (The DHCP relay agent carries the IP address of the gateway so that it is
allocated an IP address in the same network segment as the gateway.)
l Divide DHCP addresses by service type, office area, to facilitate uniform management
and fault locating.
l Enable the DHCP relay function when the DHCP needs to cross network segments to
obtain IP addresses.
l Enable the DHCP security authentication function to prevent deployment of
unauthorized DHCP servers and access of unauthorized users.

1.2 Principles for QoS Planning


As a type of E2E planning, QoS planning can be divided into following policies: traffic
classification, marking, and scheduling policies, and traffic monitoring.

Policies for Classifying, Marking, and Scheduling Traffic


Service 802.1p Queue OLT ONU/ONT Queue ID
Type Priority Scheduling Queue ID
Mode (8 Queues) Supporting Supporting
Eight Four
Queues Queues

Management 6 PQ 6 6 3
Service

Internet and 0 PQ 0 0 0
Data Service

WiFi Service 0 PQ 0 0 0

Voice 5 PQ 5 5 2
Service

AP Service 0 PQ 0 0 0

Camera 5 PQ 5 5 2
Service

VoD Service 3 PQ 0 0 0

BTV Service 3 PQ 0 0 0

NOTE
Service priorities in this table are recommended values. The service priorities are arranged according to
actual planning.

Issue 02 (2018-10-10) Copyright © Huawei Technologies Co., Ltd. 2


Agile POL Solution
Configuration Guide 1 Data Planning Principle

Traffic Monitoring
Item Man Intern Wi-Fi Voice AP Video VoD BTV
agem et and Servic Servic Servic Monit Servic Servic
ent Data e e e or e e
Servi Servic Servic
ce e e

Rate The Configu Config The Config The The The


limit on rate is re the ure the rate is ure the rate is rate is rate is
OLT not rate rate not rate not not not
downst limite limit limit limited. limit limited. limited. limited.
ream d. for a for a for a
traffic traffic traffic
profile profile profile
as as as
require require require
d. [Note d. d.
1] [Note
2]

ONU The rate is not limited.


upstrea
m port
rate
limit

ONU The rate is not limited.


downst
ream
port
rate
limit

NOTE

[Note 1]
l The rate restriction on the BRAS or SR is recommended. OLTs and ONUs do not restrict the rate
for service streams.
l If BRAS does not support rate restriction, OLTs can restrict the rate for service streams through the
traffic profile.
l The sum of the assured bandwidth of all ONUs connected to a PON port and the fixed bandwidth
of OMCI management channel is less than the GPON upstream bandwidth. Some bandwidth must
be reserved for the future service expansion.
[Note 2] Rate limit on AC is recommended.

1.3 Principles for Security Planning


Security solution ensuring that user services are provided properly from different dimensions.

Issue 02 (2018-10-10) Copyright © Huawei Technologies Co., Ltd. 3


Agile POL Solution
Configuration Guide 1 Data Planning Principle

NOTE

l The device provides comprehensive security measures, but not all security measures need to be
deployed. Only the security measures that meet the following requirements need to be deployed:
l The security measures can be used on the live network;
l The security measures are easy to deploy;
l The security measures are effective;
l Security features vary by device. Select security features based on actual device capabilities.

Security Planning
Solution Suggestion and Description

BPDU block Disable the transparent transmission of bridge


protocol data units (BPDUs), prevents users from
forging BPDU packets to attack the device
maliciously.

Restriction on the number of users Configure the maximum number of learnable


dynamic MAC addresses of a service port to limit the
number of the access users.

Port isolation Configure Layer 2 isolation in a VLAN on the OLT.

Traffic rate limit Configure the rate limit on the OLT to limit the traffic
entering the port.

1.4 Principle of Reliability Planning


Reliability planning covers planning of equipment reliability and upstream/downstream
networking protection. Reliability planning helps to achieve high reliability of enterprise
access services.

OLT Equipment Reliability


Protection Scheme Description

Main control board 1+1 The system uses two main control boards of the same
protection model and version. The two main control boards work in
the active/standby mode by default. When the active main
control board fails, the system switches to the standby main
control board to prevent service interruption.

Power board 1+1 protection A subrack is configured with two power boards of the same
model and version, which back up each other. When one of
the power boards fails, the other power board can still
provide power supply to the device and so the system can
still work properly.

Issue 02 (2018-10-10) Copyright © Huawei Technologies Co., Ltd. 4


Agile POL Solution
Configuration Guide 1 Data Planning Principle

Protection Scheme Description

Upstream board 1+1 The system uses two upstream interface boards of the same
protection model and version. Each upstream interface board provides
one upstream port and two upstream ports are bound
together using Link Aggregation Control Protocol (LACP).
When the active upstream port fails, traffic will be
transmitted upstream through the standby upstream port.

OLT Upstream Networking Protection


Protection Scheme Description

Link aggregation group Multiple upstream ports are bound together as an


aggregation group to increase the bandwidth and balance
the inbound and outbound load of each member port. In
addition, the ports in an aggregation group back up each
other, which enhances the reliability of links.

Protection group A protection group of upstream ports contains a working


port and a protection port.
l In normal state, the working port carries services and the
protection port does not.
l When the link at the working port is faulty, the system
automatically switches services from the working port to
the protection port to ensure normal service transmission
and protect the uplink.

NOTE
Link aggregation group and Ethernet protection group usually are not configured at the same time. You are
advised to configure only one of the two protection schemes.

Downstream Networking Protection


Protection Scheme Description

GPON Type B single l Two PON ports on the same OLT back up each other.
homing l When one of the PON ports fails, the system
automatically switches to the other PON port.
l This protection scheme provides port-level protection
with low costs.

Issue 02 (2018-10-10) Copyright © Huawei Technologies Co., Ltd. 5


Agile POL Solution
Configuration Guide 1 Data Planning Principle

Protection Scheme Description

GPON Type B dual homing l Two PON ports on the different OLTs back up each
other.
l When one of the PON ports fails, the system
automatically switches to the other PON port.
l This protection scheme provides device-level protection
with highest costs.

Issue 02 (2018-10-10) Copyright © Huawei Technologies Co., Ltd. 6

You might also like