You are on page 1of 264

COURSE HANDBOOK

Installation | Commissioning | System Configuration

FibeAir IP-20N Basic Training Course


Updated for SW Version T7.9

Visit our Customer Training Portal at cts.ceragon.com or contact us at training@ceragon.com

Trainee Name: _________________

Copyright 2014 Ceragon Networks Ltd. www.ceragon.com & cts.ceragon.com


 

This page was intentionally left blank. 
FibeAir IP‐20N Ceragon Training Course 
Table of Content 

Intro to Radio Systems …………………………………………………………………………………………………………  005 

IP‐20N Overview…………………………………………………………………………………………………………………..  029 

Radio Frequency Units – RFUs …………………………………………………………………………………………….  059 

First Login…………………………………………………………………………………………………………………………...  077 

Shelf Management………………………………………………………………………………………………………………  085 

ACM & MSE….…………………………………………………………..………………………………………………………….  089 

Radio Link Parameters…………..……………………………………………………………………………………………  101 

Automatic Transmit Power Control ATPC……………………………………….…………………………………….   107 

IP‐20N XPIC Configuration……………………………….………………………………………………………………….  113 

Service Model in IP‐20N………………………….………………………………………………………………………….  121 

Protection System Configuration………………………………………………………………………………………..  145 

Multi Carrier ABC…………………………………………………………………………………………………………………  159 

Licensing……………………………………………………………………………………………………………………………..  177 

Native TDM …………………………………………………………………………………………………………………………  187 

Configuration Management & Software Download……………………………………………………………  205 

Troubleshooting…………………………………………………………………………………………………………………..  219 

Header De‐Duplication…………………………………………………………………………………………………………  237 

TCC Redundancy………………………………………………………………………………………………………………….  247 

Cascading Port Configuration ……………………………………………………………………………………………..  257 

Course Evaluation Form……………………………………………………………………………………………………….  263 

CERAGON TRAINING PROGRAM – IP‐20N Basic Training Course  Sw 7.9 
 

3
 

This page was intentionally left blank. 

4
Introduction to Radio Systems

October 2014
Version 3

Agenda
• Radio Relay Principles

• Parameters affecting propagations:


• Dispersion
• Humidity/gas absorption
• Multipath/ducting
• Atmospheric conditions (refraction)
• Terrain (flatness, type, Fresnel zone clearance, diffraction)
• Climatic conditions (rain zone, temperature)
• Rain attenuation

• Modulation

2 Proprietary and Confidential

5
Digital Transmission Systems

3 Proprietary and Confidential

Radio Relay Principles

f1

RF Signal

f1’

Path Terrain

• A Radio Link requires two end stations


• A line of sight (LOS) or nLOS (near LOS) is required
• Microwave Radio Link frequencies occupy 1-80GHz

4 Proprietary and Confidential

6
High and Low frequency station

Tx(f1)=11500 MHz Rx(f1)=11500 MHz


Full duplex
Local site Remote site
High station Low station

Rx(f1’)=11000 MHz Tx(f1’)=11000 MHz

High station means: Tx(f1) >Rx(f1’)

Low station means: Tx(f1’) < Rx(f1)

5 Proprietary and Confidential

Standard frequency plan patterns


Only Low stations can interfere High stations
Frequency reuse:
Low 1,3V High 1,3V Low High
1,3H 1,3H 1,3H
Tx Tx Tx Tx Tx

Reduced risk for overshoot

Frequency shift:
1,3H 1,3V 2,4V 2,4H 1,3H
Tx Tx Tx Tx Tx

Tx Tx in upper part of band


Reduced risk for overshoot Tx Tx in lower part of band

6 Proprietary and Confidential

7
Preferred site location structure

7 Proprietary and Confidential

Radio Principal Block Diagram

Input
signal
Z' E' A' B' C' D'
Digital Branching
Modulator Transmitter RF Tx Filter Feeder
Line interface Network(*)

TRANSMITTER PATH

D C B A E Z
Branching RF Rx Filter Demodulator Digital
Feeder Receiver
Network(*) Line interface Output
signal
RECEIVER PATH

8 Proprietary and Confidential

8
RF Principals
• RF - System of communication employing electromagnetic waves
(EMW) propagated through space
• EMW travel at the speed of light (300,000 km/s)
• The wave length is determined by the frequency as follows -

c where c is the propagation velocity of electromagnetic


Wave Length  waves in vacuum (3x108 m/s)
f

• Microwave – refers to very short waves (millimeters) and typically


relates to frequencies above 1GHz:
 300 MHz ~ 1 meter
 10 GHz ~ 3 cm

9 Proprietary and Confidential

RF Principals
• We can see the relationship between colour, wavelength and amplitude
using this animation

10 Proprietary and Confidential

9
Radio Spectrum

11 Proprietary and Confidential

Parameters Affecting Propagation

12

10
Parameters Affecting Propagation
• Dispersion
• Humidity/gas absorption
• Multipath/ducting
• Atmospheric conditions (refraction)
• Terrain (flatness, type, Fresnel zone clearance, diffraction)
• Climatic conditions (rain zone, temperature)
• Rain attenuation

13 Proprietary and Confidential

Parameters Affecting Propagation – Dispersion


• Electromagnetic signal propagating in a physical medium is degraded
because the various wave components (i.e., frequencies, wavelengths)
have different propagation velocities within the physical medium:

• Low frequencies have longer wavelength and refract less


• High frequencies have shorter wavelength and refract more

14 Proprietary and Confidential

11
Parameters Affecting Propagation
Atmospheric Refraction

• Deflection of the beam towards the ground due to different electrical


characteristics of the atmosphere’s is called Dielectric Constant.
• The dielectric constant depends on pressure, temperature &
humidity in the atmosphere, parameters that are normally decrease
with altitude
• Since waves travel faster through thinner medium, the upper part of the
wave will travel faster than the lower part, causing the beam to bend
downwards, following the curve of earth

With Atmosphere

No Atmosphere
15 Proprietary and Confidential

Wave in atmosphere

16 Proprietary and Confidential

12
Parameters Affecting Propagation – Multipath
• Multipath occurs when there is more then one beam reaching the receiver
with different amplitude or phase
• Multipath transmission is the main cause of fading in low frequencies

Direct beam

Delayed beam

17 Proprietary and Confidential

Parameters Affecting Propagation – Duct


• Atmospheric duct refers to a horizontal layer in the lower atmosphere with
vertical refractive index gradients causing radio signals:
• Remain within the duct
• Follow the curvature of the Earth
• Experience less attenuation in the ducts than they would if the ducts were not
present

Duct Layer
Duct Layer

Terrain

18 Proprietary and Confidential

13
Parameters Affecting Propagation - Polarization and
Rain
• Raindrops have sizes ranging from 0.1 millimeters to 9 millimeters
mean diameter (above that they tend to break up)

• Smaller drops are called cloud droplets, and their shape is spherical.

• As a raindrop increases in
• size, its shape becomes more
• oblate, with its largest
cross-section facing the
• oncoming airflow.

Large rain drops become


Increasingly flattened on the
Bottom;
very large ones are shaped
like parachutes

19 Proprietary and Confidential

Parameters Affecting Propagation – Rain Fading


• Refers to scenarios where signal is absorbed by rain, snow, ice
• Absorption becomes significant factor above 11GHz
• Signal quality degrades
• Represented by “dB/km” parameter which is related the rain
density which represented “mm/hr”
• Rain drops falls as flattened droplet

 V better than H (more immune to rain fading)

20 Proprietary and Confidential

14
Parameters Affecting Propagation – Rain Fading

Heavier rain >> Heavier Atten.

Higher FQ >> Higher Attenuation

21 Proprietary and Confidential

Parameters Affecting Propagation – Fresnel Zone

3rd
2nd
1. EMW propagate in beams
1st RX
2. Some beams widen – therefore, their path is longer
TX
3. A phase shift is introduced between the direct and indirect
beam
4. Thus, ring zones around the direct line are created

Duct Layer0

Terrain

22 Proprietary and Confidential

15
Parameters Affecting Propagation – Fresnel Zone
• Obstacles in the first Fresnel zone will create signals that will be 0 to 90 degrees out
of phase…in the 2nd zone they will be 90 to 270 degrees out of phase…in 3rd zone,
they will be 270 to 450 degrees out of phase and so on…
• Odd numbered zones are constructive and even numbered zones are destructive.
• When building wireless links, we therefore need to be sure that these zones are kept
free of obstructions.
• In wireless networking the area containing about 40-60 percent of the first Fresnel
zone should be kept free.

23 Proprietary and Confidential

Example: First condition

24 Proprietary and Confidential

16
RF Link Basic Components – Parabolic Reflector Radiation (antenna)

25 Proprietary and Confidential

RSSI Curve for RFU-C

1,9V

1,6V

1,3V

-30dBm -60dbm -90dBm

26 Proprietary and Confidential

17
Main Parabolic Antenna Types

• Standard performance antennas (SP,LP)


• Used for remote access links with low capacity. Re-using frequencies on adjacent links is not
normally possible due to poor front to back ratio.
• High performance antennas (HP)
• Used for high and low capacity links where only one polarization is used. Re-using
frequencies is possible. Can not be used with co-channel systems.
• High performance dual polarized antennas (HPX)
• Used for high and low capacity links with the possibility to utilize both polarizations. Re-using
frequencies is possible. Can be used for co-channel systems.
• Super high performance dual polarized antennas (HSX)
• Normally used on high capacity links with the possibility to utilize both polarizations. Re-using
frequencies is possible with high interference protection. Ideal for co-channel systems.
• Ultra high performance dual polarized antennas (UHX)
• Normally used on high capacity links with high interference requirements. Re-using
frequencies in many directions is possible. Can be used with co-channel systems.

27 Proprietary and Confidential

Passive Repeaters

Back-to-back
antennas
Plane
reflector

28 Proprietary and Confidential

18
Link Calculation – Basic Example (in vacuum)
Lfs

TSL Ga Lfsl Ga Lw

RSL  ‐ Received  Signal Level 
Lb
TSL – Transmitted Signal Level
Lfsl ‐ Free‐space loss = 92.45 + 20 log x(distance in km x frequency in GHz)
Lf   ‐ Filter loss
Lf
Lb ‐ Branching loss
Lw ‐ Waveguide loss
Ga – Antenna gain RSL

RSL=TSL+Ga‐Lfsl+Ga‐Lw‐Lb‐Lf

29 Proprietary and Confidential

Atmospheric attenuation
Starts to contribute to the total attenuation above approximately 15GHz

Aa   a  d [dB]

Parameters in a:
 Frequency
 Temperature
 Air pressure
 Water vapour

30 Proprietary and Confidential

19
Objective examples
• Typical objectives used in real systems

• 99.999%
• Month: 25.9 sec
• Year: 5 min 12 sec

• 99.995 %
• Month: 2 min 10 sec
• Year: 26 min

• 99.99%
• Month: 260 sec
• Year: 51 min

• Performance requirements generally higher than Availability.


• ITU use worst month for Performance Average year for Availability

31 Proprietary and Confidential

Modulation

32

20
Modulation
Modulation

Analog Digital
Modulation Modulation

AM - Amplitude modulation ASK – Amplitude Shift Keying


FM - Frequency modulation FSK – Frequency Shift Keying
PM – Phase modulation PSK – Phase Shift Keying
QAM – Quadrature Amplitude modulation

33 Proprietary and Confidential

Digital modulation

1 0 1 1 0 1 1 0

1 0 1 1 0 1 1 0 ASK modulation changes the amplitude to the analog


Modem signale.”1” and “ 0” have different amplitude.

1 0 1 1 0 1 1 0

1 0 1 1 0 1 1 0
PSK modulation changes the phase to the transmitted
Modem
signal. The simplest method uses 0 and 1800 .

1800 phase shift

1 0 1 1 0 1 1

1 0 1 1 0 1 1 0 FSK modulation is a method of represent the two


Modem binary states ”1” and ”0” with different
spcific frequencies.

F1 F2 F1 F1 F2 F1 F1

34 Proprietary and Confidential

21
QAM Modulation
• Quadrature Amplitude Modulation employs both phase modulation
(PSK) and amplitude modulation (ASK)
• The input stream is divided into groups of bits based on the number
of modulation states used.
• In 8 QAM, each three bits of input, which provides eight values (0-7)
alters the phase and amplitude of the carrier to derive eight unique
modulation states
• In 64 QAM, each six bits generates 64 modulation states; in 128
QAM, each seven bits generate 128 states, and so on

4QAM 2bits/symbol 256QAM 8bits/symbol


8QAM 3bits/symbol 512QAM 9bits/symbol
16QAM 4bits/symbol 1024QAM 10bits/symbol
32QAM 5bits/symbol 2048QAM 11bits/symbol
64QAM 6bits/symbol
128QAM 7bits/symbol

35 Proprietary and Confidential

Why QAM and not ASK or PSK for higher modulation?


• This is because QAM achieves a greater distance between adjacent points
in the I-Q plane by distributing the points more evenly

• The points on the constellation are more distinct and data errors are
reduced

• Higher modulation >> more bits per symbol

• Constellation points are closer >>TX is more susceptible to noise

36 Proprietary and Confidential

22
Constellation diagram
• In a more abstract sense, it represents the possible symbols that may be
selected by a given modulation scheme as points in the complex plane.
Measured constellation diagrams can be used to recognize the type of
interference and distortion in a signal.

37 Proprietary and Confidential

8 QAM Modulation Example


We have stream: 001-010-100-011-101-000-011-110

DIGITAL QAM (8QAM)

Bit sequence Amplitude Phase (degrees)


000  1  None
001  2  None
010  1  pi/2 (90°) 
011  2  pi/2 (90°) 
100  1  pi (180°) 
101  2  pi (180°) 
110  1  3pi/2 (270°) 
111  2 3pi/2 (270°) 

How does constellation diagram look?

38 Proprietary and Confidential

23
4QAM VS. 16QAM

4QAM 16QAM

39 Proprietary and Confidential

2048 QAM

40 Proprietary and Confidential

24
Bandwidth vs. Modulation

2-PSK

4-PSK
Modulation Bandwidth
Complixity Decreases
Increases 8-PSK

16-QAM

64-QAM

41 Proprietary and Confidential

Signal / Noise
• Example: S/N influence at QPSK Demodulator
• Each dot detected in wrong quadrant result in bit errors

BER≈0 BER<10-13 BER=10-6 BER=10-3


Signal

Signal
S/N Signal
Power

Power

Power
Power

S/N Signal
S/N S/N
Noise Noise Noise Noise

42 Proprietary and Confidential

25
BER Impact on Transmission Quality
10 -3

10 -4

10 -5
BER change ratio vs. Noise is
dependent on Noise Power distribution
and coding
10 -6

10 -7
BER

10 -8
-75 -72 -69 -66
Receiver input level [dBm ]

43 Proprietary and Confidential

RSL Vs. Threshold


RSL (dBm) BER>10-6
-20
-30 Nominal Input Level

Fading Margin

-73 Threshold level BER=10-6

BER>10-6 S/N=23dB for 128QAM (37 MHz)


-96 Receiver amplifies thermal noise

-99 K – Boltzmann constant


T – Temperature in Kelvin
Thermal Noise=10*log(k*T*B*1000) B – Bandwidth

Time (s)

44 Proprietary and Confidential

26
Thank you

45

27
 

This page was intentionally left blank. 

28
IP-20N Overview

November 2014
Version 4

Agenda
• IP-20N Product Highlights
• Network topology with IP-20N
• IP-20N Overview
• 1U and 2U chassis

• TCC – Traffic Control Card

• RMC – Radio Modem Card

• ELIC – Ethernet Line Interface Card

• TDM Line cards

• IVM – Inventory Module

• PDC – Power Distribution Card

• Fan Module and Air Filter

• RFU – Radio Frequency Unit

• IP-20N Block Diagram

2 Proprietary and Confidential

29
FibeAir IP-10 Product Line - 2011
Ethernet + Optional TDM Ethernet Only

IP-10G IP-10E IP-10C

Compact
All-Outdoor
Terminal / Terminal /
Single-Carrier Single-Carrier

IP-10Q
Aggregation
Nodal Nodal

Optimized for “Full GE”


Multi-Carrier pipes
Ultra-high density

Optimized Solution for Any Network


3 Proprietary and Confidential

FibeAir IP-X0 Product Line - 2012 (Introducing IP-20N)


Ethernet + Optional TDM Ethernet Only

IP-10G IP-10E IP-10C

Compact
All-Outdoor
Terminal / Terminal /
Single-Carrier Single-Carrier

IP-20N IP-10Q
Aggregation

Optimized for “Full GE”


Nodal Multi-Carrier pipes
Ultra-high density
Ultra-high density/modularity

Optimized Solution for Any Network


4 Proprietary and Confidential

30
FibeAir IP-20 Product Family

IP-20G

IP-20N 1RU & 2RU

IP-20E
IP-20S
IP-20C

IP‐20
Platform

IP-20A= IP20N + RFU-A


Available only for US & NA market
IP-20LH

5 Proprietary and Confidential

FibeAir IP-20N Product Overview


Purpose built for Nodal deployments
Unified architecture with
common cards
• Traffic/Control cards (TCC)
1RU chassis, Up to 5 RFUs • Radio interface cards (RMC)
o Non-XPIC
o XPIC
o 1024 QAM
• Line cards (LIC)
o Eth – 4 x 1GE
o TDM – 16 x E1/DS1 LIC
– 1 x STM-1/OC3 LIC
2RU chassis, Up to 10 RFUs - 1 x ch STM-1
Full redundancy option (No SPoF) o LIC-X-E4-Elec./Opt

Ultra-high flexibility/modularity
Optimized foot-print, density, scalability & availability

6 Proprietary and Confidential

31
FibeAir IP-20N – Product Highlights
• Optimized nodal solution
• Multi-Carrier ABC
• 1x Up to 8+0 MC‐ABC (Up to 1Gbps)
• 1+1/2+2 MC‐ABC/HSB (Up to 1Gbps)
• Mixed Nx1+0/1+1 & 1x ABC (4+0)
• Rich packet processing feature-set
• High Availability node
• Support for multi-operator scenarios
• Highest capacity, scalability and spectral efficiency
• High precision, flexible packet Synchronization solution
• Best-in-class TDM migration solution using PWE3 (Circuit Emulation)
• Support Ceragon’ s current and future RFUs
• Purpose built for supporting resilient and adaptive multi-carrier radio links scaling to GE
capacity
• Future-proof with maximal investment protection

7 Proprietary and Confidential

FibeAir IP-20N – Carrier Ethernet Transport


Main features
• Flexible transport
• Flexible service classification
• Full E-Line, E-LAN support
• Hierarchical QoS
• Superb (hardware based) service level OAM and SLA assurance mechanisms
• MSTP
• Enhanced <50msec network level resiliency (G.8031/2)
• Advanced L2-4 security policy (ACL) engine
• Enhanced Multicast (IGMP-snooping)
• ACM 4PSK – 1024 QAM
• LIC-T155 (1x ch-STM-1)
• LIC-STM1/OC3-RST

Future proof architecture for supporting


backhaul evolution to emerging services
8 Proprietary and Confidential

32
Network Topology Example (Tree)

9 Proprietary and Confidential

Network Topology Example (Ring)

10 Proprietary and Confidential

33
Network Topology Example (Tree)

C C

C RFU-C 1+0
1+1

C C
IP‐20N C
C
C
2+0
1+1

C
IP‐20N
C
C IP‐20N
1+0 C C
C
1+0
2+0
C
2+0 1+0
IP‐10G C C

IP‐20N
IP‐20G
C C
IP‐20G IP‐10G

11 Proprietary and Confidential

Reference Integrated CET solution

C RFU-C
E1s
Eth
IP‐10G E1s E1s
C 1+0 Eth Eth
E1s
C Eth
IP‐20N C 4+0
E1s 1+0 C 2+2 C IP‐20N
Eth C
IP‐10G C C C
IP‐20N E1s
4+0
IP‐20C Eth
1+0
C
Eth C
C 4+0 4+0 IP‐20N C
C C IP‐20G C C IP‐20N
IP‐20G C
1+1 1+1 Microwave C
C
2+2 C Ring 4+0
E1s E1s E1s IP‐20N
Eth C
Eth Eth C
IP‐20N
E1s
Eth
4+0
C
IP‐20N
IP‐20N
10GE Fiber
Edge
Ring
Router

IP‐20N
Edge
Router

12 Proprietary and Confidential

34
IP-20N Overview

13

IP-20N – 2RU Chassis


Filter tray 2 x Slots for Fans tray
(optional) power distribution
cards (PDC)

11 12
7 8 9 10
3 4 5 6
1 2

2 x Slots for 10 x Universal slots for:


Main traffic and - Radio interface cards (RMC)
control cards (TCC) - Ethernet line cards (4 x GE)
- TDM line cards

14 Proprietary and Confidential

35
Slots Numbering

3 4 5 6
1 2 51

Slots Numbering starts from bottom left

11 12 50
7 8 9 10
3 4 5 6
1 2 51
15 Proprietary and Confidential

Card types allowed per slot – 1RU

Slot Allowed Card Type Notes


Number
Slot
Number
1 TCC

2  RMC
 Ethernet – LIC-X-E4-Elec (4x GE)
 Ethernet – LIC-X-E4-Opt (4x GE)
 TDM– LIC-T16 (16x E1)
 TDM– LIC-T155 (1x ch-STM-1)

3-6  RMC
 TDM– LIC-T16 (16x E1)
 TDM– LIC-T155 (1x ch-STM-1)
 TDM –LIC-STM1/OC3-RST

16 Proprietary and Confidential

36
Card types per slot – 2RU

Slot Allowed Card Type Notes


Number

1 TCC

2,12  RMC
 Ethernet – LIC-X-E4-Elec (4x GE)
 Ethernet – LIC-X-E4-Opt (4x GE)
 TDM– LIC-T16 (16x E1)
 TDM– LIC-T155 (1x ch-STM-1)

3 - 10  RMC
 TDM– LIC-T16 (16x E1)
 TDM– LIC-T155 (1x ch-STM-1)
 TDM –LIC-STM1/OC3-RST

11 TCC

17 Proprietary and Confidential

Recommendations
It is recommended to place the same type of cards in adjacent pairs, as follows:

• Slots 3 and 4
• Slots 5 and 6
• Slots 7 and 8 (2RU only)
• Slots 9 and 10 (2RU only)

The reason for this is that for certain features, connectivity is supported in the backplane
between these slot pairs

For example 2+2 HSB SD configuration with XPIC:

• 1+1 or 2+2 are supported in release 7.9


• When combining HSB SD and XPIC, the HSB SD protection group and the
XPIC group cannot be identical. A valid combination would be:

XPIC Group #1: Slot 3 and 4


XPIC Group #2: Slot 5 and 6
Radio Protection Group #1: Slot 3 and 5
Radio Protection Group #2: Slot 4 and 6

18 Proprietary and Confidential

37
Traffic – Ethernet Matrix

TCC Slot 11 Slot 12

Slot 7 Slot 8 Slot 9 Slot 10

Slot 3 Slot 4 Slot 5 Slot 6

SGMII to TCC primary


TCC Slot 1 Slot 2 SGMII to TCC backup

19 Proprietary and Confidential

Supported Configurations in T7.9


Configuration Notes
1+0
1+0 IF Combining Requires RMC‐B and 1500HP
2+0 Single Polarization Requires Multi‐Carrier ABC or LAG.

2+0 Dual Polarization (XPIC) Requires Multi‐Carrier ABC.
3+0 Requires Multi‐Carrier ABC or LAG.

4+0 Single Polarization Requires Multi‐Carrier ABC or LAG.

4+0 Dual Polarization (XPIC) Requires Multi‐Carrier ABC.
4+0 IF Combining Requires Multi‐Carrier ABC and 
1500HP.
4+0 IF Combining and XPIC Requires Multi‐Carrier ABC and 
1500HP.
5+0 Single Polarization Requires Multi‐Carrier ABC or LAG.

6+0 Single Polarization Requires Multi‐Carrier ABC or LAG.

7+0 Single Polarization Requires Multi‐Carrier ABC or LAG.

8+0 Single Polarization Requires Multi‐Carrier ABC or LAG.

1+1 HSB Protection
1+1 HSB Protection with BBS Space  Requires Multi‐Carrier ABC
Diversity
2+2 HSB Protection Requires Multi‐Carrier ABC
2+2 HSB Protection with BBS Space  Requires Multi‐Carrier ABC
Diversity
2+2 HSB Protection with XPIC Requires Multi‐Carrier ABC
2+2 HSB Protection with BBS Space  Requires Multi‐Carrier ABC
Diversity and XPIC
2+2 HSB Protection with IF  Requires Multi‐Carrier ABC and 
Combining and XPIC 1500HP

20 Proprietary and Confidential

38
TCC – Traffic control card

21

11
Traffic Control Card (TCC)
1

• Main functions:
• TCC-B – doesn’t support Multi-Carrier ABC, HSB support
• TCC-B-MC – required for Multi-Carrier ABC configurations, HSB BBS SD support
• 1x Up to 8+0 MC‐ABC (Up to 1Gbps)
• 1+1/2+2 MC‐ABC/HSB (Up to 1Gbps)
• Mixed Nx1+0/1+1 & 1x ABC (4+0)
• Network processor with 16 ports
• 10 Gbps switching capacity
• 6,25 Mpps (Mega packet per second) switching capacity
• Shelf control and management
• Ethernet traffic management and switching
• Clock unit

Ceragon SD cards with Cera OS:

Industrial SD card 1GB class 6

22 Proprietary and Confidential

39
12
7 8 9 10
3 4 5 6
2

MNG port 1

MNG port 2
CPU
1Gb SGMII / (2.5Gb) Radio Card

Ethernet Switch
16 ports – 10Gbps

Line Interface 1Gb SGMII / (2.5Gb)

1Gb SGMII / (2.5Gb)


Line Interface 1Gb SGMII / (2.5Gb)

1Gb SGMII / (2.5Gb)


Ethernet Card
1Gb SGMII / (2.5Gb)

1Gb SGMII / (2.5Gb)

23 Proprietary and Confidential

11
TCC Indicators & Connectors
1
1

Activity
LED
SYNC Serial Gigabit
Port Port Electrical Ports

Handle External Management Gigabit Optical Handle


Alarms Ports Ports
Port

24 Proprietary and Confidential

40
TCC card – Interfaces pin out

25 Proprietary and Confidential

RMC – Radio Modem Card

26

41
12
Radio Modem Cards (RMC) 7
3
8
4
9
5
10
6
2

• RMC-A
• Based on Ceragon’s well known SoC modem
• Supports up to 256QAM
• FibeAir IP-10 Series support across a link
• RMC-B
• Based on Ceragon’s new SoC modem
• Supports up to 1024QAM
• Supports XPIC and non XPIC (same Hardware)
• Supports Header De-Duplication

RMC A RMC B
XPIC No Yes
Multi‐Carrier ABC No Yes
Modem type PVG modem Mars modem
Modulation 256 QAM + ACM 1024 QAM with Premium 
RFU + ACM
FD and SD Yes Yes
IP20 communication with 
Yes No
IP10 across a link

27 Proprietary and Confidential

Radio Modem Cards (RMC) and RFUs combinations


2

IP‐20N 
IP‐20N 
Multi – Carrier  XPIC & Header Max available  communication 
Combination communication 
ABC De‐ Duplication Modulation with IP‐10 across a 
with IP‐20G
radio link
RMC‐A & RFU 
No No 256 QAM Yes No
standard
RMC‐A & RFU 
No No 256 QAM Yes No
premium
RMC‐B & RFU 
Yes Yes 256 QAM No Yes
standard
RMC‐B & RFU‐
Yes Yes 1024 QAM No Yes
premium

RMC-A RMC-B RFU-C/Ce

28 Proprietary and Confidential

42
12
Radio Modem Cards (RMC-E) 7
3
8
4
9
5
10
6
2

RMC-E is used for IP-20LH with Evolution radio.


This card has Radio Interface and STM-1 RST Interface

29 Proprietary and Confidential

12
RMC Indicators & Connectors 7
3
8
4
9
5
10
6
2

IF Connector

Handle Handle

ACT LINK RFU


LED LED LED

Color ACT LINK RFU


off No power No power No power

green OK, active mode Link OK no alarms RFU is OK


Minor or warning Minor or warning
yellow OK, standby mode
alarm alarm
Critical or major  Critical or major 
red failure
alarm alarm

30 Proprietary and Confidential

43
ELIC – Ethernet Line Interface Cards

31

Ethernet Line Interface Card 12

Electrical LIC-XE4-Elec 2

• LIC-XE4-Elec
• Supports 4 GBE ports (one combo)
• Works only on slots 2 and 12
• MDI/MDIX support
• Cascading ports (port 3 & 4)

32 Proprietary and Confidential

44
LIC-XE4-Elec 12

Indicators & Connectors 2

Gigabit Electrical Ports

Handle Handle

ACT SFP SFP


LED Slot LED

Color ACT Left LED for port Right LED for port SFP LED


Interface is disabled 
Cable not connected, 
or the interface 
off No power Interface is disabled link not ok, interface 
operates at 
is disabled
100BaseT mode
Interface operates at 
the interface is  Interface is enabled 
1000BaseT mode, 
enabled and link is  and link is OK, 
green OK, no alarms Blinking means 
OK (Blinking = traffic  blinking means traffic 
operates at 10BaseT 
activity) activity
mode
Card failure or
red ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐
hardware failure

33 Proprietary and Confidential

Ethernet Line Interface Card 12

Optical LIC-XE4-Opt 2

• LIC-XE4-Opt
• Supports 4 GBE ports (firs port is combo)
• Total 4x SFP
• Works only on slots 2 and 12
• Cascading ports (port 3 & 4)

34 Proprietary and Confidential

45
LIC-XE4-Opt 12

Indicators & Connectors 2

Gigabit Optical Ports

Handle Handle

ACT Gigabit SFP


LED Electrical port LED

Color ACT Left LED for port Right LED for port SFP LED


Interface is disabled 
Cable not connected, 
or the interface 
off No power Interface is disabled link not ok, interface 
operates at 
is disabled
100BaseT mode
Interface operates at 
the interface is  Interface is enabled 
1000BaseT mode, 
enabled and link is  and link is OK, 
green OK, no alarms Blinking means 
OK (Blinking = traffic  blinking means traffic 
operates at 10BaseT 
activity) activity
mode
Card failure or
red ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐
hardware failure

35 Proprietary and Confidential

TDM Line cards

36

46
LIC-T16 (16xE1/DS1) 12
7 8 9 10
Line Interface Card 3 4 5
2
6

• TDM-LIC
• 16 E1/T1s
• 1588 client clock and boundary clock as a future option

37 Proprietary and Confidential

12
LIC-T16 (16xE1)- Indicators & Connectors 7 8 9 10
3 4 5 6
2

16 x E1/ DS1 Connector

Handle Handle

SYNC Connector ACT LED E1/DS1LED

Color ACT Sync Left LED for  Sync Right LED for  E1/DS1 LED


port port
The interface is 
The interface is  The interface is 
off No power disabled or no signal is 
disabled  disabled
being received 
Indicates whether a valid  Indicates whether the 
green OK, no alarms signal is being received  interface is configured to  No alarms
when enabled export a clock  

Card failure or
red ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ Any alarms
hardware failure

38 Proprietary and Confidential

47
LIC-T16 (16xE1) 12
7 8 9 10
Connector and Synchronization Interface 3 4 5 6
2

39 Proprietary and Confidential

TDM LIC-T155 (1x ch-STM-1) 7


3
8
4
9
5
12
10
6
2

• TDM-LIC
• 1 STM-1/OC3
• 1588 client clock and boundary clock as a future option
• The 1 x ch-STM-1 interface uses an optical SFP connector.

40 Proprietary and Confidential

48
TDM LIC-T155 (1x ch-STM-1) 12
7 8 9 10
Indicators & Connectors 3 4 5
2
6

STM-1/OC3 SFP

Handle Handle

ACT SYNC STM-1/OC3


LED Connector LED

Color ACT Sync Left LED for  Sync Right LED for  STM1/OC3


port port
The interface is 
The interface is  The interface is 
off No power disabled or no signal is 
disabled  disabled
being received 
Indicates whether a valid  Indicates whether the 
green OK, no alarms signal is being received  interface is configured to  No alarms
when enabled export a clock  

Card failure or
red ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ Any alarms
hardware failure

41 Proprietary and Confidential

TDM LIC-STM-1/OC3-RST 7
3
8
4
9
5
12
10
6
2

42 Proprietary and Confidential

49
Inventory Module (IVM)

43

Mandatory Cards - IVM


• Single card for 1RU and 2RU chassis.
• 2 x E2PROM on single board (function as 2 separated cards).
• Installed at the back of the chassis
• Holds the chassis:
• License.
• Node MAC address (48 MACs per unit).
• Serial number.

44 Proprietary and Confidential

50
IVM – Inventory Module
The IVM contains pre-programmed information that defines the chassis and its slots,
including:
• Module types that can be inserted into the chassis, per slot
• Product and card names
• Internal MAC addresses
• Serial number
• Hardware versions
• Licensed features and capacities

The IVM stores information in a 8 KB (64 kb) EEPROM. A 2RU IP-20N IVM contains
two EEPROMs. If a redundant TCC configuration is used, each EEPROM is
dedicated to a specific TCC

IVM
EEPROM EEPROM
TCC 2 TCC 1

45 Proprietary and Confidential

PDC – Power Distribution Card

46

51
Mandatory Cards – PDC
Power Distribution Card
• Monitors the inputs signal
• Drives the -48V signal
• Converts the -48V signal to other power levels
• Different card for 1RU chassis and 2RU chassis
• 2U chassis uses two PDC card for redundancy
• 1U chassis uses dual input for redundancy

47 Proprietary and Confidential

Power Distribution Card


• A 2RU IP-20N can use two PDC cards for redundancy. Each PDC provides 48V
power to all modules in the chassis via the backplane, on different lines.
• A diode bridge in the modules prevents power spikes and unstable power from the
two power sources.
• Voltage range: -40,5 VDC to -60 VDC
• The maximum rating of the overcurrent protection shall be 3 Amp per link, while the
maximum current rating is 9A for 1RU and 17Amp for 2RU
• The power source must be grounded
• If the voltage goes below -38V, the LED displays Red. When the voltage returns to -
40V or higher, the Red indication goes off and the Green indication reappears.

Standard PDC Interface Dual - Input PDC Interfaces

Proprietary and Confidential


48

52
Power consumption specification

49 Proprietary and Confidential

Fans Module & Air Filter

50

53
Mandatory Cards – Fans
• Four fans inside the fans module
• Powered up from -48VDC from the backplane
• Different module for 1RU and 2RU chassis

51 Proprietary and Confidential

Filter Tray - optional

• IP-20N offers a filter as optional


equipment. If a filter tray is not
ordered, the IP-20N chassis is
delivered with a blank filter slot
cover.

52 Proprietary and Confidential

54
IP-20N Block diagram

53
IP-20N – Block Diagram

54 Proprietary and Confidential

55
Traffic Path vs Internal Shelf Management Path

55 Proprietary and Confidential

Traffic Path vs Internal Shelf Management Path

56 Proprietary and Confidential

56
Thank You

57
 

This page was intentionally left blank. 

58
Radio Frequency Units

V1

1
April 2014

Agenda
• Radio Frequency units for IP-20N
• RFU Selection Guide
• RFU-C
• 1500HP / RFU – HP
• Split Mount Configuration and Branching
• New Outdoor Circulator Block OCB
• Split Mount Configurations
• Green mode

2 Proprietary and Confidential

59
Radio Frequency units
• Standard Power
• FibeAir RFU-C

• High Power
• FibeAir 1500HP
• FibeAir RFU-HP

• The following RFUs can be installed in a split-mount configuration:


• FibeAir RFU-C (6–42 GHz)
• FibeAir 1500HP RFU-HP (6–11 GHz)
• RFU-HP (6–8 GHz)

• The following RFUs can be installed in an all-indoor configuration:


• FibeAir 1500HP/RFU-HP (6–11 GHz)

• The IDU and RFU are connected by a coaxial cable RG-223 (up to 100 m/300 ft),
Belden 9914/RG-8 (up to 300 m/1000 ft) or equivalent, with an N-type connector
(male) on the RFU and a TNC connector on the RMC in the IP-20N chassis.

3 Proprietary and Confidential

FibeAir ® Radio Frequency Units

Standard Power (Max 24 dbm)


6-38 GHz
FibeAir RFU-C
3.5-56Mhz Ch. Bandwidth
QPSK-1024QAM
Very Compact

Ultra High Power (Max 33 dbm)


6-8 GHz
FibeAir RFU-HP -1RX 3.5-56Mhz Ch. Bandwidth
Low Loss Chaining
QPSK-1024QAM
Reduced Power Consumption Mode (Green Mode)

High Power (Max 33 dbm)


FibeAir 1500-HP/SD 6-11 GHz
3,5-56Mhz Ch. Bandwidth
QPSK-1024QAM
Low Loss Chaining
Dual RX with IFC (Single Rx available for 11GHz)

4 Proprietary and Confidential

60
RFU Selection Guide

1500HP/RFU‐HP RFU‐C RFU‐Ce


Character (6 – 11 GHz) (6 – 42 GHz) (6 – 42 GHz)

Split Mount √ √ √
Installation Type
All‐Indoor √  

1+0/2+0/1+1/2+2 √ √ √

N+1 √  
Configuration
N+0 ( N>2) √  

SD support √ (IFC, BBS) √ (BBS) √ (BBS)

Adjustable Power 
Power Saving Mode √   
Consumption

QPSK to 256 QAM √ √ √
Modulation 
512 to 1024 QAM √  √

RFU-HP does not support 56 MHz channels.


IFC at 40MHz is supported only for the 11GHz frequency band.

5 Proprietary and Confidential

RFU – C

61
RFU – C 6-42GHz

• Standard RFU – C
• Support up to 256 QAM modulation
• RMC-A or RMC-B

• Premium RFU-Ce
• Support up to 1024 QAM modulation
• RMC-B is required

• Main Features of RFU-C:


• Frequency range – Operates in the frequency range 6 – 42 GHz
• More power in a smaller package - Up to 26 dBm for extended distance, enhanced
availability, use of smaller antennas
• Configurable Modulation – QPSK – 1024 QAM
• Configurable Channel Bandwidth – 3.5 MHz – 56MHz
• Compact, lightweight form factor - Reduces installation and warehousing costs
• Supported configurations:
• 1+0 – direct and remote mount 
• 1+1 – direct and remote mount 
• 2+0 – direct and remote mount 
• 2+2 – remote mount
• 4+0 – remote mount
• Efficient and easy

7 Proprietary and Confidential

Example of RFU-C direct 1+1 mount configurations

1+1 direct

8 Proprietary and Confidential

62
Orthogonal Mode Transducer (OMT) Installation for 2+0
Configuration

Switch to the circular adaptor


(removing the
existing rectangular transition,
swapping the O-ring, and
replacing on the circular
transition).

9 Proprietary and Confidential

OMT Installation Example

Note: RFUs are at sub 11GHz band


10 Proprietary and Confidential

63
1500HP / RFU–HP

11

Main Features of 1500HP/RFU-HP


• Frequency range:
• 1500HP 2RX: 6-11GHz
• 1500HP 1RX: 11GHz
• RFU-HP: 6-8GHz
• Frequency source – Synthesizer
• Installation type – Split mount – remote mount, all indoor (No direct mount)
• Diversity – Optional innovative IF Combining Space Diversity for improved system gain (for 1500HP), as
well as BBS Space Diversity (all models)
• High transmit power – Up to 33dBm in all indoor and split mount installations
• Configurable Modulation – QPSK – 1024 QAM
• Configurable Channel Bandwidth –
• 1500HP 2RX (6-11 GHz): 10-30 MHz
• 1500HP 1RX (11 GHz): 10-30 MHz
• 1500HP 1RX (11 GHz wide): 24-40 MHz
• RFU-HP 1RX (6-8GHz): 3.5-56 MHz
• System Configurations – Non-Protected (1+0), Protected (1+1), Space Diversity, 2+0/2+2 XPIC, N+0, N+1
• XPIC and CCDP – Built-in XPIC (Cross Polarization Interference Canceller) and Co-Channel Dual Polarization
(CCDP) feature for double transmission capacity, and more bandwidth efficiency
• Power Saving Mode option - Enables the microwave system to automatically detect when link conditions allow it
to use less power (for RFU-HP)
• Tx Range (Manual/ATPC) – Up to 20 dB dynamic range
• ATPC (Automatic Tx Power Control)
• RF Channel Selection – Via EMS/NMS
• NEBS – Level 3 NEBS compliance

12 Proprietary and Confidential

64
1500 HP 2RX in 1+0 SD Configuration

13 Proprietary and Confidential

1500 HP 1RX in 1+0 SD Configuration

14 Proprietary and Confidential

65
RFU-HP 1RX in 1+0 SD Configuration

15 Proprietary and Confidential

HP Comparison Table
Feature 1500HP 2RX 1500HP 1RX RFU‐HP Notes
Frequency Bands Support 6L,6H,7,8,11GHz 6L,6H,7,8,11GHz 6L,6H,7,8GHz

Up to 30 MHz
Channel Spacing Support  Up to 30 MHz 11 GHz version for  Up to 60 MHz
40 MHz
All are compatible with OCBs 
Split‐Mount √ √ √
from both generations
All‐Indoor √ √ √ All are compatible with ICBs
IFC ‐ IF Combining
Space Diversity BBS and IFC BBS BBS
BBS ‐ Base Band Switching
Frequency Diversity √ √ √
1+0/2+0/1+1/2+2 √ √ √
N+1 √ √ √
N+0 ( N>2) √ √ √
High Power √ √ √

Remote Mount Antenna √ √ √

Power consumption changes 
Power Saving Mode ‐‐ ‐‐ √ 
with TX power

1500 HP (11 GHz ) 40 MHz bandwidth does not support IF Combining. For this frequency, space diversity is only available via BBS.

16 Proprietary and Confidential

66
Split Mount Configuration and Branching

Split Mount Configuration and Branching Network

• Outdoor Circulator Block OCB – The Tx and the Rx path


circulate together to the main OCB port. When chaining
multiple OCBs, each Tx signal is chained to the OCB Rx
signal and so on (uses S-bend section). For more details,
refer to 1500HP/RFU-HP OCBs

• Indoor Circulator Block ICB – All the Tx signals are


chained together to one Tx port (at the ICC) and all the Rx
signals are chained together to one Rx port (at the ICC). The
ICC circulates all the Tx and the Rx signals to one antenna
port.

18 Proprietary and Confidential

67
Split Mount Configuration and Branching Network

All- Indoor Vertical Branching Split-Mount Branching and All Indoor Compact

19 Proprietary and Confidential

New OCB

20

68
New OCB – Outdoor Circulator Block

The OCB has the following main purposes:


1. Hosts the circulators and the attached filters.
2. Chain and accumulate radio signal ( multiple carriers )
3. Routes the RF through the filters and circulators.
4. Allows RFU connection to the Main and Diversity antennas.

21 Proprietary and Confidential

New OCB Components


• RF Filters - are used for specific frequency channels and Tx/Rx separation. The filters are attached to the OCB,
and each RFU contains one Rx and one Tx filter. In a Space Diversity using IF combining configuration, each RFU
contains two Rx filters (which combine the IF signals) and one Tx filter. The filters can be replaced without
removing the OCB. The RF filter is installed with every configuration.

• DCB - Diversity Circulator Block An external block which is added in Space Diversity configurations. DCB is
connected to the diversity port and chains two OCBs.

• Coupler Kit is used for 1+1 Hot Standby configurations. (loss 1.6 /6dB)

• Symmetrical Coupler Kit is used for: (loss of 3/3 dB) • When chaining adjacent channels (only 28/30 MHz) • 1+1
Hot Standby configurations with a symmetrical loss of 3dB in each direction Note: CPLRs loss tolerance is ±0.7
dB

• U Bend The U Bend connects the chained DCB (Diversity Circulator Block) in N+1/N+0 configurations.

• S Bend The S Bend connects the chained OCB (Outdoor Circulator Block) in N+1/N+0 configurations.

• Pole Mount Kit The Pole Mount Kit is used to fasten up to five OCBs and the RFUs to the pole. The kit enables
fast and easy installation.

22 Proprietary and Confidential

69
1+1 and 2+2 HSB Configuration

23 Proprietary and Confidential

N+0/N+1 Configuration

24 Proprietary and Confidential

70
2+0 XPIC

25 Proprietary and Confidential

Split mount applications

26 Proprietary and Confidential

71
Split mount applications 4+0

S-Bend

27 Proprietary and Confidential

Split mount applications 4+0 SD

DCB DCB
S-Bend

28 Proprietary and Confidential U-Bend

72
Green Mode
Significant Power Consumption Reduction

• Minimal power consumption required in 99.9% of the time

• Green Mode enables:


• Reduction of consumed power by automatically reducing Tx power
• Quick increase in Tx Power in case of fading.
• No traffic impact

Power Consumption  Max. Tx Power Power Consumption


Level (@ 128QAM)

High 31dBm 80W


Mid  27dBm 56W
Low 21dBm 41W

Automatic TX Power control for optimal power 
consumption
29 Proprietary and Confidential

Green Mode (RFU-HP)


Significant Power Consumption Reduction

31dBm
80W
27dBm
56W
21dBm
41W

30 Proprietary and Confidential

73
Power Consumption VS. Monitored TSL

The radio operates in fixed and pre-defined


power-consumption states:

Monitored TX  Consumed   
Power State
Power power [W]

HIGH 31dBm 80 Watt


MEDIUM 27dBm 56 Watt
LOW 21dBm 41 Watt

Transition between power states is hitless and


errorless !
* X<Y<Z
Proprietary and Confidential
31

Normal ATPC

Set “reference level”  Remote TX changes accordingly

105 dB
150 dB

RX: ‐41dBm
Reference level: ‐40dBm

When fading occurs, both transmitters try to


compensate for the losses by increasing
transmission power while maintaining RSL as
close as possible to the Ref. level

Proprietary and Confidential


32

74
GREEN MODE setting the Green RSL to
-50dBm doesn’t degrade fade
Set “Green Mode” enable margin, as the mechanism will
Set “Green RSL”  limit [dBm] increase TX power if
necessary.

10
155
0 dB
dB

RX: ‐52dBm
RX: ‐37dBm
RX: ‐42dBm
RX: ‐47dBm
Green level: ‐50dBm

When fading occurs, both transmitters


compare the monitored RSL with the Green
Level (Ref.). As long as RSL> Ref. there is no
need to increase the TSL.

Proprietary and Confidential


33

GREEN MODE setting the Green RSL to


-50dBm doesn’t degrade fade
Set “Green Mode” enable margin, as the mechanism will
Set “Green RSL”  limit [dBm] increase TX power if
necessary.

15 dB

RX: ‐50dBm
RX: ‐52dBm
Green level: -50dBm

When RSL drops below the Green Ref. level,


we must increase the TSL to maintain the
fade margin and avoid low sensitivity

Proprietary and Confidential


34

75
Thank You

76
First login

Ceragon Training Services


October, 2014 v2

Agenda

• CLI and Web login


• General commands
• Get IP address
• Set IP address
• Set to default

2 Proprietary and Confidential

77
Connecting to the Unit
CLI

Baud rate = 115200
Web/Telnet
Data bits: 8
Parity: None
Stop bits: 1
Flow Control: None

IP address = 192.168.1.1

Default Username/password is admin/admin
3 Proprietary and Confidential

General commands

Press twice the TAB key for optional commands in actual directory
Use the TAB key to auto-complete a syntax

Use the arrow keys to navigate through recent commands

Question mark to list helpful commands

4 Proprietary and Confidential

78
Get IP address

CLI Command:

“platform management ip show ip-address”

5 Proprietary and Confidential

Changing Management IP Address


• CLI Command:

“platform management ip set ipv4-address <IP Address> subnet <Mask>


gateway <default gateway>”

• Example

• Web
expand Platform branch, then Management branch and click on IP, set
accordingly and click Apply button

6 Proprietary and Confidential

79
Set to default
• CLI Command:

“platform management set-to-default”

Please note that IP address after Set to Factory Default will be not changed!!!

7 Proprietary and Confidential

Other CLI commands


• For any CLI commands please follow our Web Manual

• Open Index html file


• Find out in Topics submenu required configuration

8 Proprietary and Confidential

80
Web Management

First Web login

Default IP address is 192.168.1.1 /24


Default Username/password is admin/admin

10 Proprietary and Confidential

81
Set to factory default

Please note that IP address after Set to Factory Default will be not changed!!!

11 Proprietary and Confidential

IP address settings

2 – select IPv4 or IPv6

12 Proprietary and Confidential

82
Web configuration manual
• For any CLI commands please follow our Web Manual

• Open Index html file


• Find out in Topics submenu required configuration

13 Proprietary and Confidential

Thank You

83
 

This page was intentionally left blank. 

84
Shelf Management

October 2014
Version 2

Connecting to the Unit


CLI

Baud rate = 115200
Web
Data bits: 8
Parity: None
Stop bits: 1
Flow Control: None

IP address = 192.168.1.1

Default Username/password is admin/admin
2 Proprietary and Confidential

85
Chassis Configuration Window
Navigation Tree Configuration Area

Selection Area
3 Proprietary and Confidential

Configuring the Chassis (1/2)

4 Proprietary and Confidential

86
Configuring the Chassis (2/2)

5 Proprietary and Confidential

Questions?

6 Proprietary and Confidential

87
Thank You

88
ACM – Adaptive Coding and Modulation
MSE – Mean Square Error

November 2014
Version 3

Agenda

• Adaptive Coding and Modulation


• Using MSE with ACM
• What is MSE?
• Link Commissioning with MSE
• Triggering ACM with MSE
• ACM Benefits
• ACM and 1+1 HSB

2 Proprietary and Confidential

89
Adaptive Coding and Modulation (ACM)
• In ACM mode, the radio will select the highest possible link capacity based on received signal quality.

• When the signal quality is degraded due to link fading or interference, the radio will change to a more robust
modulation and link capacity is consequently reduced.

• When signal quality improves, the modulation is automatically increased and link capacity is restored to the original
setting. The capacity changes are hitless (no bit errors introduced).

• During the period of reduced capacity, the traffic is prioritized based on Ethernet QoS - and TDM priority - settings.

• In case of congestion the Ethernet or TDM traffic with lowest priority is dropped. TDM capacity per modulation
state is configurable as part of the TDM priority setting.

3 3 Proprietary and Confidential

Hitless and Errorless switching

4 Proprietary and Confidential

90
Using MSE with ACM

MSE - Definition

MSE is used to quantify the difference between an estimated


(expected) value and the true value of the quantity being
estimated

MSE measures the average of the squared errors:

MSE is an aggregated error by which the expected value differs


from the quantity to be estimated.

The difference occurs because of randomness or because the


receiver does not account for information that could produce a
more accurate estimated RSL

6 Proprietary and Confidential

91
To simplify….

Imagine a production line where a machine needs to insert


one part into the other

Both devices must perfectly match

Let us assume the width has to be 10mm wide

We took a few of parts and measured them to see how


many can fit in….

7 Proprietary and Confidential

The Errors Histogram


(Gaussian probability distribution function)

Quantity 9 Expected value

3
3
2
1

width
6mm 7mm 10mm 12mm 16mm

To evaluate how accurate our machine is, we need to know how many
parts differ from the expected value

9 parts were perfectly OK


8 Proprietary and Confidential

92
The difference from Expected value…

Quantity
Error = 0 mm

Error = + 2 mm
Error = - 3 mm
Error = + 6 mm
Error = - 4 mm

width
6mm 7mm 10mm 12mm 16mm

To evaluate the inaccuracy (how sever the situation is) we


measure how much the errors differ from expected value

9 Proprietary and Confidential

Giving bigger differences more weight than smaller


differences

Quantity
Error = 0 mm

+ 2 mm = 4
-3 mm = 9
- 4 mm = 16 + 6 mm = 36

width
6mm 7mm 10mm 12mm 16mm

We convert all errors to absolute values and then we square them

The squared values give bigger differences more weight than smaller differences,
resulting in a more powerful statistics tool:

16cm parts are 36 ”units” away than 2cm parts which are only 4 units away

10 Proprietary and Confidential

93
Calculating MSE

Error = 0 mm
Quantity

+ 2 mm = 4
-3 mm = 9
- 4 mm = 16 + 6 mm = 36

width

To evaluate the total errors, we sum all the squared errors and take the average:

16 + 9 + 0 + 4 + 36 = 65, Average (MSE) = 13

The bigger the errors (differences) >> the bigger MSE becomes

11 Proprietary and Confidential

Calculating MSE

MSE determines how narrow / wide the “Bell” is

Quantity

width
10mm

When MSE is very small – the “Bell” shaped histogram is closer to perfect
condition (straight line): errors = ~ 0

12 Proprietary and Confidential

94
MSE in digital modulation (Radios)

Let us use QPSK (4QAM)


Q as an example:

01 00 QPSK = 2 bits per symbol

2 possible states for I signal


2 possible states for Q signal
I = 4 possible states for the
combined signal

11 10 The graph shows the expected


values (constellation) of the
received signal (RSL)

13 Proprietary and Confidential

MSE in digital modulation (Radios)

The black dots represent the


expected values (constellation)
Q of the received signal (RSL)
01 00
The blue dots represent the
actual RSL

I
As indicated in the previous
example, we can say that the
bigger the errors are – the
harder it becomes for the
11 10 receiver to detect & recover the
transmitted signal

14 Proprietary and Confidential

95
MSE in digital modulation (Radios)

Q
01 00 MSE would be the average
e1 errors of e1 + e2 + e3 + e4….
e2

I
When MSE is very small the
e4 actual signal is very close to
e3
the expected signal
11 10

15 Proprietary and Confidential

MSE in digital modulation (Radios)

Q
01 00 When MSE is too big, the
e1 actual signal (amplitude &
e2 phase) is too far from the
expected signal
I
e4
e3

11 10

16 Proprietary and Confidential

96
Commissioning with MSE in EMS

When you commission your


radio link, make sure your MSE
is small

Actual values may be read


-34dB to -35dB

Bigger values will result in loss


of signal

17 Proprietary and Confidential

MSE and ACM

When the errors is too big, we need


a stronger error correction
mechanism (FEC)

Therefore, we reduce the number


of bits per symbol allocated for data
and re-assign the extra bits for
correction instead

For example –
256QAM has great capacity but
poor immune to noise

64QAM has less capacity but much


better immune for noise
ACM – Adaptive Code Modulation
18 Proprietary and Confidential

97
Triggering ACM with MSE
When ACM is enabled, MSE values are analyzed on each side of the link

When MSE degrades or improves, the system applies the required


modulation per radio to maintain service
Profile Mod MSE Down-Threshold MSE Up-Threshold
0 QPSK -18
1 8PSK -16 -19
2 16QAM -17 -23
3 32QAM -21 -26
4 64QAM -24 -29
5 128QAM -27 -32
6 256QAM -30 -34
7 512QAM -32 -37
8 1024 QAM SFEC -35 -38
9 1024 QAM WFEC -36 -41
10 2048QAM -39
Applicable for both 28/56MHz , 2048 QAM will be supported in 7.9

The values are typical and subject to change in relation to the frequency and RFU
type. For more details please contact your Ceragon representative

19 Proprietary and Confidential

ACM & MSE: An example…


It is easier to observe the hysteresis of changing the ACM profile with
respect to measured MSE.

As you can see, the radio remains @ profile 8 till MSE improves to -38dB:

ACM
Profile
Downgrade
-41 Downgrade

-38
-37

-34

Profile 10 Profile 9 Profile 8 Profile 7 Profile 6 Profile 5 Profile 4 Profile 3


2048 QAM 1024 QAM 1024 QAM 512 QAM 256 QAM 128 QAM 64 QAM 32 QAM

MSE
-39 -36 -35 -32 -30 -27 -24 -21

20 Proprietary and Confidential

98
ACM & MSE: An Example
When RF signal degrades and MSE passes the upgrade point (MSE @ red point), ACM will
switch back FASTER to a higher profile (closer to an upgrade point) when MSE improves.

When RF signal degrades and MSE does not pass the upgrade point (green point) – ACM
waits till MSE improves to the point of next available upgrade point (takes longer time to
switch back to the higher profile).

ACM
Profile
‐41  ‐38 

Profile 10  Profile 9 Profile 8

‐39                              ‐36                               ‐35 MSE

21 Proprietary and Confidential

ACM Benefits
• The advantages of IP-20N’s dynamic ACM include:
• Maximized spectrum usage
• Increased capacity over a given bandwidth
• 8 to 10 modulation/coding work points (~3 db system gain for each
point change)
• Hitless and errorless modulation/coding changes, based on signal
quality
• Adaptive Radio Tx Power per modulation for maximal system gain per
working point
• An integrated QoS mechanism that enables intelligent congestion
management to ensure that high priority traffic is not affected during
link fading

22 Proprietary and Confidential

99
ACM and 1+1HSB
• When ACM is activated together with 1+1 HSB protection, it is
essential to feed the active RFU via the main channel of the coupler
(lossless channel), and to feed the standby RFU via the secondary
channel of the coupler (-6db attenuated channel). This maximizes
system gain and optimizes ACM behavior for the following reasons:
• In the TX direction, the power will experience minimal attenuation.
• In the RX direction, the received signal will be minimally attenuated.
Thus, the receiver will be able to lock on a higher ACM profile
(according to what is dictated by the RF channel conditions).
• The following ACM behavior should be expected in a 1+1 or 2+2
configuration:
• In the TX direction, the Active TX will follow the remote Active RX ACM
requests (according to the remote Active Rx MSE performance).
• The Standby TX might have the same profile as the Active TX, or might
stay at the lowest profile (profile-0). That depends on whether the
Standby TX was able to follow the remote RX Active unit’s ACM
requests (only the active remote RX sends ACM request messages).
• In the RX direction, both the active and the standby carriers follow the
remote Active TX profile (which is the only active transmitter).

23 Proprietary and Confidential

Thank You

100
Radio Link Parameters

October 2014
Version 3

Agenda
• MRMC
• TX & RX Frequencies
• Link ID
• RSL
• MSE
• Current ACM Profile

2 Proprietary and Confidential

101
High and Low frequency station

Tx(f1)=11500 MHz Rx(f1)=11500 MHz


Full duplex
Local site Remote site
High station Low station
Rx(f1’)=11000 MHz Tx(f1’)=11000 MHz

High station means: Tx(f1) >Rx(f1’)

Low station means: Tx(f1’) < Rx(f1)

3 Proprietary and Confidential

Radio Link Parameters


TSL RSL

IDU ODU )) ) ODU IDU

To Establish a radio link, we need configure following parameters:


1. MRMC – Modem scripts (ACM or fixed capacity, channel & modulation)
2. TX / RX frequencies – set on every radio
3. Link ID – must be the same on both ends
4. Max. TSL – Max. allowed Transmission Signal [dBm]
5. Unmute Transceiver – Transceiver is by default muted (is not transmitting)
-------------------------------------------------------------------------------------------------------

To verify a radio link, we need control following parameters:


1. RSL – Received Signal Level [dBm] – nominal input level is required
2. MSE- Mean Square Error [dB]
3. Current ACM profile

4 Proprietary and Confidential

102
MRMC – Multi Rate Multi Coding Profiles

Modulation RFU‐C with RMC‐A RFU‐C Premium with 


RMC‐B
QPSK Profile 0 Profile 0
8QAM Profile 1 Profile 1
16QAM Profile 2 Profile 2
32QAM Profile 3 Profile 3
64QAM Profile 4 Profile 4
128QAM Profile 5 Profile 5
256QAM (strong FEC) Profile 6 N/A
256QAM (weak FEC) Profile 7 Profile 6
512QAM N/A Profile 7
1024QAM (Strong FEC) N/A Profile 8
1024QAM (Light FEC) N/A Profile9

5 Proprietary and Confidential

MRMC Scripts – 1st step


1

N – normal script
X – XPIC script

Changing script automatically resets dedicated RMC card
6 Proprietary and Confidential

103
Radio Parameters settings

2nd step

4th step
5th step
3th step

7 Proprietary and Confidential

LINK ID – Antenna Alignment Process


To avoid pointing the antenna to a wrong direction (when both links share the same
frequency), LINK ID can be used to alert when such action is take.

# 101
# 101

# 102
“Link ID
Mismatch”
# 101

“Link ID Mismatch”

8 Proprietary and Confidential

104
LINK ID – Antenna Alignment Process
Both IDUs of the same link must use the same Link ID
Otherwise, “Link ID Mismatch” alarm will appear in Current Alarms Window

# 101
# 101

# 102
“Link ID
Mismatch”
# 101

“Link ID Mismatch”

9 Proprietary and Confidential

Questions?

10 Proprietary and Confidential

105
Radio Link Setup Exercise

11 Proprietary and Confidential

Thank You

106
Automatic Transmit Power Control - ATPC

October 2014
Version 1

Agenda
• Why ATPC?
• How does ATPC works?
• ATPC Vs. MTPC
• ATPC Configuration

2 Proprietary and Confidential

107
ATPC – Automatic Transmit Power Control

The quality of radio communication between low Power devices varies


significantly with time and environment.

This phenomenon indicates that static transmission power, transmission range,


and link quality, might not be effective in the physical world.

• Static transmission set to max. may reduce lifetime of Transmitter


• Side-lobes may affect nearby Receivers (image)

Main Lobe

Side Lobe

3 Proprietary and Confidential

ATPC – Automatic Transmit Power Control


1. Enable ATPC on both sites

2. Set Input reference level (min. possible RSL to maintain the radio link)

3. ATPC on both ends establish a Feedback Channel through the radio link (1byte)

4. Transmitters will reduce Output power to the min. possible level

5. Power reduction stops when RSL in remote receiver reaches Ref. input level

6. ATPC is strongly recommended with XPIC configuration

TSL Adjustments Monitored RSL

ATPC  Radio  Radio Radio 


module Transceiver  Receiver
‐ Ref. RSL

Feedback Signal  RSL


Radio 
Quality  required
Receiver change
Site A
Check
Site B

4 Proprietary and Confidential

108
ATPC – Example when ATPC is OFF

FSL= -60 dB
Site A Site B

MTPC MTPC

TSL A = 30dBm TSL B = 30dBm


RSL A = ? RSL B = ?

RSL A = -30dBm (TSL B + FSL) RSL B = -30dBm (TSL A + FSL)

5 Proprietary and Confidential

ATPC – Example when ATPC is ON (One site ATPC, second site MTPC)

FSL= -60 dB
Site A Site B

ATPC MTPC
IRLB (Input Ref. level on Site B) = -50dBm

TSL A = ? TSL B = 30dBm


RSL A = ? RSL B =?

TSL A = 10dBm (IRLB-FSL) RSL B = -50dBm (TSL A + FSL)


RSL A = -30dBm (TSL B + FSL)
You want -50dBm on Site B, so what is TXA in Site A?
6 Proprietary and Confidential

109
ATPC – Example when ATPC is ON (ATPC on both sites)

FSL= -60 dB
Site A Site B

ATPC ATPC
IRLB (Input Ref. level on Site B) = -50dBm IRLA (Input Ref. level on Site A) = -50dBm

TSL A = ? TSL B = ?
RSL A = ? RSL B = ?

TSL A = 10dBm (IRLB - FSL) TSL B = 10dBm (IRLA-FSL)


RSL A = -50dBm (TSLB + FSL) RSL B = -50dBm (TSL A + FSL)

7 Proprietary and Confidential

ATPC – Example when ATPC is ON (ATPC on both sites), ATPC range

Max TSL is 30dBm


Max TSL is 30dBm
ATPC range is 20dB
ATPC range is 20dB

FSL= -60 dB
Site A Site B

ATPC ATPC
IRLB (Input Ref. level on Site B) = -60dBm IRLA (Input Ref. level on Site A) = -50dBm

TSL A = ? TSL B = ?
RSL A = ? RSL B = ?

TSL A = 10dBm (IRLB-FSL) TSL B = 10dBm (IRLA - FSL)


RSL A = -50dBm (TSL B + FSL) RSL B = -50dBm (TSL A + FSL)
RSL B is -50dBm because typical ATPC range for TX level is 20dB (depend on RFU type)!!!
It means that TSL A can’t be 0dBm because possible min is 10dBm (Max is 30dBm)

8 Proprietary and Confidential

110
ATPC Configuration

9 Proprietary and Confidential

Thank You

10

111
 

This page was intentionally left blank. 

112
IP- 20N XPIC Configuration

November 2014
Version 3

Agenda

• System Spectrum Utilization


• ACAP

• ACCP

• CCDP

• Co-channel System
• IP-20N & XPIC
• XPIC Recovery mechanism
• XPIC Settings

2 Proprietary and Confidential

113
System Spectrum Utilization
BW

V 1 3 5 7 9
ACAP (Adjacent Channel Alternating Pol.)
H
2 4 6 8 10

BW

V 1 2 3 4 5 6 7 8 9 10 ACCP (Adjacent Channel Common Pol.)


H

BW

V 1 2 3 4 5
CCDP (Co-Channel Dual Polarisation)
H
6 7 8 9 10

3 Proprietary and Confidential

CCDP frequency plan

V 1 V 1
H H
2 2

Vertical and Horizontal Polarization are using the same frequency

4 Proprietary and Confidential

114
Co-channel Systems

• The XPIC improvement factor is typically 26 dB.


• Two channels are using the same frequency but different polarization

• RMC-B and XPIC script is required

• The XPIC mechanism utilizes the received signals from the V and H modems to extract the V and H signals
and cancel the cross polarization interference due to physical signal leakage between V and H polarizations.

• The H+v signal is the combination of the desired signal H (horizontal) and the interfering signal V (in lower
case, to denote that it is the interfering signal). The same happens with the vertical (V) signal reception=
V+h. The XPIC mechanism uses the received signals from both feeds and, manipulates them to produce the
desired data

• IP-20N’s XPIC reaches a BER of 10e-6 at a co-channel sensitivity of 5 dB. The improvement factor in an
XPIC system is defined as the SNR@threshold of 10e-6, with or without the XPIC mechanism.

5 Proprietary and Confidential

Conditions for XPIC


• XPIC is enabled by selecting an XPIC script for each carrier.

• In order for XPIC to be operational, all the following conditions must be met:
• The RMCs must be RMC-B
• Communications with the RFU are established in both RMCs.
• RFU type must be the same for both carriers.
• The frequency of both radios should be equal.
• The same script must be loaded in both RMCs.
• The script must support XPIC
• If any of these conditions is not met, an alarm will alert the user. In
addition, events will inform the user which conditions are not met.

6 Proprietary and Confidential

115
RSL Vs. Threshold for system without CCDP
RSL (dBm) BER>10-6
-20
-30 Nominal Input Level

Fading Margin = 43dB

-73 Threshold level BER=10-6

BER>10-6 S/N=23dB for 128QAM (37 MHz)


-96 Receiver amplifies thermal noise

-99 K – Boltzmann constant


T – Temperature in Kelvin
Thermal Noise=10*log(k*T*B*1000) B – Bandwidth

Time (s)

7 Proprietary and Confidential

RSL Vs. Threshold for CCDP system without XPIC

RSL (dBm)
BER>10-6
-20
-30 Nominal Input Level H

Fading Margin = 17dB


Threshold level because of interference without XPIC
-47 BER=10-6
BER>10-6
S/N=23dB for 128QAM (37 MHz)
Interference level in H (interference from V,
-65 separation between H & V with very good antenna is
35dB)
-73 Interference
Threshold level without interference BER=10-6

-96
-99

Time (s)

8 Proprietary and Confidential

116
RSL Vs. Threshold for CCDP system with XPIC
RSL (dBm)
BER>10-6
-20
-30 Nominal Input Level H

Fading Margin = 38 dB

BER>10-6
Interference level in H (interference from V, when
XPIC is not enabled

XPIC will -65 Threshold level when XPIC is ON

“improve” -68
-73 Original Threshold level without CCDP and XPIC
interference S/N=23dB for 128QAM (37 MHz) configuration
for extra Interference level in H (interference from V, when
26dB XPIC is enabled
-91
Interference level

Time (s)

9 Proprietary and Confidential

Conditions for XPIC


• XPIC is enabled by loading an XPIC
script to the radio in the IDU.
• In order for XPIC to be operational,
all the following conditions must be
met:
• Communications with the RFU are
established in both RMCs:
XPIC XPIC • An RFU must be connected to each
RMC
• The frequency of both radios should
be equal.
XPIC XPIC
• The same script must be loaded in
both RMCs.

• If any of these conditions is not met,


an alarm will alert the user. In
addition, events will inform the user
which conditions are not met.

10 Proprietary and Confidential

117
XPIC Recovery Mechanism

• The purpose of the XPIC recovery mechanism is to save the working link while
attempting to recover the faulty polarization.

• The mechanism works as follows:


• The indication that the recovery mechanism has been activated is a loss of
modem preamble lock, which takes place at SNR~10dB.
• The first action taken by the recovery mechanism is to cause the remote
transmitter of the faulty carrier to mute, thus eliminating the disturbing signal and
saving the working link.
• Following this, the mechanism attempts at intervals to recover the failed link. In
order to do so, it takes the following actions:
• The remote transmitter is un-muted for a brief period.
• The recovery mechanism probes the link to find out if it has recovered. If not,
it again mutes the remote transmitter.
• This action is repeated in exponentially larger intervals. This is meant to
quickly bring up both channels in case of a brief channel fade, without
seriously affecting the working link if the problem has been caused by a
hardware failure.
• The number of recovery attempts is user-configurable

Every such recovery attempt will cause a brief traffic hit in the working
link.

11 Proprietary and Confidential

Recommendations
It is recommended to place the same type of cards in adjacent pairs, as follows:

• Slots 3 and 4
• Slots 5 and 6
• Slots 7 and 8 (2RU only)
• Slots 9 and 10 (2RU only)

The reason for this is that for certain features, connectivity is supported in the backplane
between these slot pairs

For example 2+2 HSB SD configuration with XPIC:

• 1+1 or 2+2 are supported in release 7.9


• When combining HSB SD and XPIC, the HSB SD protection group and the
XPIC group cannot be identical. A valid combination would be:

XPIC Group #1: Slot 3 and 4


XPIC Group #2: Slot 5 and 6
Radio Protection Group #1: Slot 3 and 5
Radio Protection Group #2: Slot 4 and 6

12 Proprietary and Confidential

118
MRMC selection

X – means XPIC script


N – Normal script

13 Proprietary and Confidential

XPIC settings

14 Proprietary and Confidential

119
Thank you

15

120
Service Model in IP-20

November 2014
Version 5

Agenda
• IP-20 Ethernet Capabilities
• Service Model in General
• What is a Service ?
• What is a Service point?
• Services in IP-20 Family & Services attributes
1. Point to Point Service
2. Multipoint Service
3. Management Service
• Service Point in IP-20 Family
1. Pipe Service Point
2. Service Access Point (SAP)
3. Service Network Point (SNP)
4. Management Service Point (MNG)
• Service Points classification and attributes
• Examples for Services and Service points
• Logical VS. Physical Port

2 Proprietary and Confidential

121
IP-20’s Ethernet Capabilities
• Up to 1024 services (1025 reserved for Management)
• Up to 32 service points per service (30 SPs for MNG service)
• All service types:
• Multipoint (E-LAN)
• Point-to-Point (E-Line)
• Point-to-Multipoint (E-Tree)
• Smart Pipe
• Management
• 128K MAC learning table per service - ability to limit MAC learning per
service
• Split horizon between service points
• Flexible transport and encapsulation via 802.1q, 802.1ad (Q-in-Q), and
MPLS-TP, with tag manipulation possible at egress
• High precision, flexible frame synchronization solution combining SyncE
and 1588v2
• Hierarchical QoS with 8K service level queues, deep buffering, hierarchical
scheduling via WFQ and Strict priority, and shaping at each level

3 Proprietary and Confidential

IP-20’s Ethernet Capabilities


• Hierarchical two-rate three-Color policers
• Port based – Unicast, Multicast, Broadcast, Ethertype
• Service-based
• CoS-based
• Up to four link aggregation groups (LAG)
• Hashing based on L2, L3, MPLS, and L4
• Enhanced <50msec network level resiliency (G.8032) for ring/mesh support
• IP-20 is fully MEF-9 and MEF-14 certified for all Carrier Ethernet services.

4 Proprietary and Confidential

122
Service model in General

What is a Service?
• A virtual bridge, connecting two or more interfaces

• Bridge is a device that separates two or more network segments


within one logical network
• Interfaces are usually referred to physical ports but can also be logical
ports

6 Proprietary and Confidential

123
Service Model

2
Service #1

4 Service #2

7 Proprietary and Confidential

Service points
Service points are logical entities attached to the interfaces that make up the
service. Service points define the movement of frames through the service.
Without service points, a service is simply a virtual bridge with no ingress or
egress interfaces.

Rails are second service point


towards the bridge

The Route is your first service point


towards the bridge

8 Proprietary and Confidential

124
What is a service point?

2
SP Service #1 SP

SP SP

4 Service #2
SP SP

9 Proprietary and Confidential

Services in IP-20 Family

10

125
IP-20 Services

IP20N supports the following services types:

1. Point-to-Point Service (P2P)


2. Multipoint Service (MP)
3. Management Service (MNG)
4. Point-to-Multipoint Service (E-Tree)

E-Tree services are planned for future release.

11 Proprietary and Confidential

Point to Point Service (P2P)


• Point-to-point services are used to provide connectivity between two
interfaces of the network element.
• When traffic ingresses via one side of the service, it is immediately directed
to the other side according to ingress and egress tunneling rules.
• This type of service contains exactly two service points and does not require
MAC address-based learning or forwarding

1 4

PIPE PIPE
SAP SAP
2

12 Proprietary and Confidential

126
Multipoint Service (MP)
• Multipoint services are used to provide connectivity between two or more service points.
• When traffic ingresses via one service point, it is directed to one of the service points in the
service, other than the ingress service point, according to ingress and egress tunneling rules, and
based on the learning and forwarding mechanism.
• If the destination MAC address is not known by the learning and forwarding mechanism, the
arriving frame is flooded to all the other service points in the service except the ingress service
point.

1 4

SAP SNP

SAP SNP

13 Proprietary and Confidential

Management Service (MNG)


• The management service is a multipoint service that connects the two local
management ports, the network element host CPU, and the traffic ports into a single
service. The service behavior is same as the Multipoint service behavior.
• The management service is pre-defined with Service ID 1025.
Management ports TCC

CPU
1

4
2 SAP SNP

1
Traffic ports TCC

Service ID 1025
2

14 Proprietary and Confidential

127
Service Attributes

• Service ID - 1 - 1024

• Service Type – P2P, MP, MNG

• Service Admin Mode – Operational, Reserved

• EVC-ID - Ethernet Virtual Connection ID (End-to-end).

• EVC Description

• Maximum Dynamic MAC Address Learning per Service

• Static MAC Address Configuration

• CoS Mode & Default CoS

• xSTP Instance – The spanning tree instance ID (1-63)

• Split Horizon Group - (Enable/Disable)

15 Proprietary and Confidential

IP-20 Service Points

16

128
Service points
• SAP
• SNP
• Pipe Service Point
• Management Service Point

Proprietary and Confidential

Service Access Port SAP & Service Network Point SNP

18 Proprietary and Confidential

129
Service Access Port SAP & Service Network Point SNP

19 Proprietary and Confidential

Management (MNG) Service Point

Only used for management services

20 Proprietary and Confidential

130
Pipe Service Points

Pipe Service Point – Used to create traffic connectivity between two


points in a port-based manner (Smart Pipe). In other words, all the
traffic from one port passes to the other port. Pipe service points are
used in Point-to-Point services

PIPE PIPE PIPE


SAP SAP SAP PIPE
SAP

21 Proprietary and Confidential

Service points classification

22

131
Service Point – Interface Types

Interface Type Types of Frames Applies to SP Type


Dot1q A single C‐VLAN is classified into the service  All
point
S‐tag A single S‐VLAN is classified into the service  SNP and MNG
point
Bundle‐C A set of C‐VLANs is classified into the service  SAP
point
Bundle‐S A single S‐VLAN and a set of C‐VLAN are  SAP
classified into the service point
All‐to‐One All C‐VLANs, S‐VLANs with TPID diff than the  SAP
system one and untagged frames that enter 
the interface are classified into the service 
point
Q‐in‐Q A single S‐VLAN and C‐VLAN combination is  SAP and MNG
classified into the service point

23 Proprietary and Confidential

Service
Service Points

24 Proprietary and Confidential

132
Service

25 Proprietary and Confidential

Service Point Types that can Co-Exist on the Same Interface

Service point Types per Service Type


Service point type
MNG SAP SNP Pipe
Service Type Management Yes No No No
Point-to-Point No Yes Yes Yes
Multipoint No Yes Yes No

Service Point Types that can Co-Exist on the Same Interface


MNG SP SAP SP SNP SP Pipe SP
MNG SP Only one MNG SP is Yes Yes Yes
allowed per interface.
SAP SP Yes Yes No No
SNP SP Yes No Yes No
PIPE SP Yes No No Only one Pipe SP is
allowed per interface.

26 Proprietary and Confidential

133
Service Point Types that can Co-Exist on the Same Interface

27 Proprietary and Confidential

Example of dot1q services


• The classification to PtP1 and PtP2 is based 
on one c‐vlan.
• PtP 1 uses same c‐vlan as the classification 
at both ends
• PtP 2 uses different c‐vlan as the 
classification at both ends.
• PtP1 and PtP2 uses the transport vlan
inside the network. The original c‐vlan is 
not sent inside the network.
C‐Vlan
SAP3 10 SAP 3

ptp 1

C‐Vlan SAP1

10 SAP 1 C‐Vlan
20 SAP 2 SAP4 120 SAP 4
SAP2
ptp 2

Transport Vlan EVC

100 ptp1
SAP
200 ptp2 SNP

28 Proprietary and Confidential

134
Example of bundle services
• The classification to PtP1 and PtP2 is based 
on several c‐vlan’s.
• PtP1 and PtP2 uses the transport vlan
inside the network. The original c‐vlan is 
preserved and sent inside the network.

C‐Vlan
SAP3
10,11 SAP 3

ptp 1

C‐Vlan SAP1

10,11 SAP 1 C‐Vlan


20,21 SAP 2 20,21 SAP 4
SAP4
SAP2
ptp 2

Transport Vlan EVC

100 ptp1
SAP
200 ptp2 SNP

29 Proprietary and Confidential

Example of Q-in-Q services


• The classification to PtP1 and PtP2 is based 
on a pair of c‐vlan and s‐vlan.
• PtP1 and PtP2 uses the transport vlan
inside the network. The original c‐vlan and 
s‐vlan is not sent inside the network.

S‐Vlan C‐Vlan
SAP3
230 10 SAP 3

ptp 1

SAP1

S‐Vlan C‐Vlan

SAP4 340 320 SAP 4


SAP2
S‐Vlan C‐Vlan ptp 2

230 10 SAP 1

240 20 SAP 2
Transport Vlan EVC

100 ptp1
SAP
200 ptp2 SNP

30 Proprietary and Confidential

135
Service points Attributes

31

Service Point Attributes


As described above, traffic ingresses and egresses the service via service
points. The service point attributes are divided into two types:
• Ingress Attributes – Define how frames are handled upon ingress, e.g.,
policing and MAC address learning.
• Egress Attributes – Define how frames are handled upon egress, e.g.,
preservation of the ingress CoS value upon egress, VLAN swapping.

Proprietary and Confidential

136
Service Point Attributes

General Ingress Egress

Service Point ID Learning Admin C‐VLAN CoS Preservation


Service Point Name Allow Flooding C‐VLAN Preservation
Service Point Type Allow Broadcast S‐VLAN CoS Preservation
Interface CoS Mode Marking Admin
Interface Type Default CoS Service Bundle ID
C‐VLAN Encapsulation
S‐VLAN Encapsulation

33 Proprietary and Confidential

Service Point – General Attributes

General • Service Point ID – number for service point inside


the same service
• Service Point Name – The Name for service point
if is needed
Service Point ID • Service Point Type- SAP, SNP, MNG, PIPE
Service Point Name • Interface - The logical interface on which the
service point is located
Service Point Type
• Interface Type – Dot1q, S-Tag, Bundle-C, Bundle-
Interface S, All-to-One, Q-in-Q
Interface Type • C-Vlan Encapsulation - The C-VLAN classified
C‐VLAN Encapsulation into the service point
S‐VLAN Encapsulation • S-Vlan Encapsulation - The S-VLAN classified
into the service point

34 Proprietary and Confidential

137
Service Point – Ingress Attribute
• Learning Admin - Indicates whether MAC
address learning is enabled or disabled
Ingress
• Allow Flooding - Indicates whether incoming
frames with unknown MAC addresses are
forwarded to other service points via flooding
Learning Admin • Allow Broadcast - Indicates whether frames with
a broadcast destination MAC address are allowed
Allow Flooding to ingress the service via this service point
Allow Broadcast • CoS Mode - Indicates how the service point
CoS Mode handles the CoS of frames that pass through the
service point.
Default CoS
• Default CoS – The service point CoS. If the CoS
Mode is set to overwrite the CoS decision made at
the interface level, this is the CoS value assigned
to frames that ingress the service point.

35 Proprietary and Confidential

Service Point – Egress Attribute


• C-Vlan CoS Preservation - Indicates whether the
original C-VLAN CoS value is preserved or
Egress restored for frames egressing from the service
point
• C-Vlan Preservation - Indicates whether the
original C-VLAN ID is preserved or restored for
C‐VLAN CoS Preservation
frames egressing from the service point
C‐VLAN Preservation • S-Vlan CoS Preservation - Indicates whether the
S‐VLAN CoS Preservation original S-VLAN CoS value is preserved or
Marking Admin restored for frames egressing from the service
point
Service Bundle ID
• Marking Admin - Indicates whether re-marking of
the outer VLAN (C-VLAN or S-VLAN) of tagged
frames that pass through the service point is
enabled
• Service Bundle ID - This can be used to assign
one of the available service bundles from the H-
QoS hierarchy queues to the service point

36 Proprietary and Confidential

138
Ethernet Service Points – GUI
General

Service Point ID
Service Point Name
Service Point Type
Interface
Interface Type
C‐VLAN Encapsulation
S‐VLAN Encapsulation
Ingress

Learning Admin
Allow Flooding
Allow Broadcast
CoS Mode
Default CoS

Egress

C‐VLAN CoS Preservation
C‐VLAN Preservation
S‐VLAN CoS Preservation
Marking Admin
Service Bundle ID

37 Proprietary and Confidential

Logical Vs. Physical Interface

38

139
Logical and physical interface

39 Proprietary and Confidential

Service Demo

40

140
The Setup
• IP-20

• IP-20C

41 Proprietary and Confidential

Creating the Service

42 Proprietary and Confidential

141
Attaching Service Points

43 Proprietary and Confidential

Attaching Service Points

44 Proprietary and Confidential

142
Attaching Service Points

45 Proprietary and Confidential

Questions?

46 Proprietary and Confidential

143
Thank You

144
Protection System Configuration

November 2014
Version 4

Agenda
• What is Protection?
• General Guidelines
• HSB Configuration in general – principals
• BBS Space Diversity
• 1+1 HSB Configuration
• 2+2 HSB ABC Configuration
• 2+2 HSB XPIC Configuration

2 Proprietary and Confidential

145
Different types of protections systems

3 Proprietary and Confidential

What is Protection?
• A method of using one or more devices in a standby mode in order to
have a secondary link up when failure occurred to the active link

• In order to achieve a full protected link each and every device should
be protected

• The number of multiplied devices depends on the link importance

“The process of keeping (something or someone) safe”


Wikipedia.com

Everybody needs Protection

4 Proprietary and Confidential

146
Hot standby in general

1
In case of ch1 failure, will be traffic
Ch1
Main Ch1
Main switched to Protection channel

1′
1
Protection Protection

1’
• HSB system is using same frequency for Main and Standby channel (f1 & f1’)
• HSB system is typically 1+1
• Protection channel is internally muted. Just in case Main channel failure will be Protection channel Unmuted.
• Space diversity with baseband switching is based on HSB system (selection of better input level)

• In Hot Standby mode only one transmitter is active, the other transmitter is standby. Both receivers are active
and hitless switching is performed. The TX- and RX- switching at a terminal normally operates independently,
but they may be configured to operate together.

5 Proprietary and Confidential

HSB Protection

• IP-20N offers radio redundancy via the RMCs, which can be configured in 1+1 Hot
Standby (HSB) pairs.
• 1+1 HSB protection provides full protection in the event of RMC or RFU failure.
• Each RMC in a protected pair reports its status to the TCC. The TCC is responsible
for determining when a switchover takes place.

• In a 1+1 HSB configuration:


• The RMCs must have the same configuration.
• The RFUs must be the same type and must have the same configuration.

6 Proprietary and Confidential

147
HSB Protection – Revertive mode
• In an HSB protection scheme, the active and standby radios are usually
connected to the antenna with a coupler.
• This causes a -6dB loss on the secondary path on each side of the link,
resulting in a 12dB increase in the total path loss for the link.
• This additional path loss will either reduce the link’s fade margin or increase
the power consumption of the Power Amplifier (PA) in order to compensate
for the additional path loss.
• The system monitors the availability of the primary path at all times.
Whenever the primary path is operational and available, without any alarms,
but the secondary path is active, the system initiates a revertive protection
switch. Every revertive protection switch is recorded as an event in the
event log.

EACH PROTECTION SWITCH CAUSES TRAFFIC DISRUPTION!!!

7 Proprietary and Confidential

Switchover Triggers
The following events trigger switchover for 1+1 HSB protection according to
their priority, with the highest priority triggers listed first.

1. Card missing
2. Lockout
3. Force switch
4. Traffic failures
5. Manual switch

8 Proprietary and Confidential

148
ACM and 1+1HSB
• When ACM is activated together with 1+1 HSB protection, it is
essential to feed the active RFU via the main channel of the coupler
(lossless channel), and to feed the standby RFU via the secondary
channel of the coupler (-6db attenuated channel). This maximizes
system gain and optimizes ACM behavior for the following reasons:
• In the TX direction, the power will experience minimal attenuation.
• In the RX direction, the received signal will be minimally attenuated.
Thus, the receiver will be able to lock on a higher ACM profile
(according to what is dictated by the RF channel conditions).
• The following ACM behavior should be expected in a 1+1 or 2+2
configuration:
• In the TX direction, the Active TX will follow the remote Active RX ACM
requests (according to the remote Active Rx MSE performance).
• The Standby TX might have the same profile as the Active TX, or might
stay at the lowest profile (profile-0). That depends on whether the
Standby TX was able to follow the remote RX Active unit’s ACM
requests (only the active remote RX sends ACM request messages).
• In the RX direction, both the active and the standby carriers follow the
remote Active TX profile (which is the only active transmitter).

9 Proprietary and Confidential

General Guidelines
• A Standby RMC is referred to as the “Mate” RMC

• When a switchover occurs, the Active RMC becomes “Standby” and


the “Standby” RMC becomes “Active”

• It is possible for maintenance reason to lock current status

10 Proprietary and Confidential

149
1+1HSB Configuration

11

1+1 HSB Configuration

• 1+1 HSB – supported only by TCC-B • Select Member 1


• 1+1 HSB SD – supported only by TCC-B-MC • We support up to 4 Protection Groups

Select Member 2 • Summary


• Submit

12 Proprietary and Confidential

150
Copy to Mate

1. Configure first (Main) radio link (MRMC, Freq., Link ID)


2. Select Copy to mate source radio location (In this case 1st link)

13 Proprietary and Confidential

HSB Exercise
• Create 1+1 HSB link
• Disconnect one of the RFUs, make sure the link switched
• Reconnect the RFU
• Set manual switching

14 Proprietary and Confidential

151
Multi-Carrier ABC 2+2 HSB Configuration

15

Multi Carrier ABC 2+2 HSB


1- Cards configuration
• TCC-B-MC and RMC-B is required – check Platform/Management/Inventory

• Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them

HSB 1 HSB 2
P1 P2
1 2

16 Proprietary and Confidential

152
Multi Carrier ABC 2+2 HSB
2 - MC-ABC pre-configuration
1. Enable CMR via CLI per each slot belongs to ABC group (slot 3,4,7,8)
root> platform shelf-manager abc mode admin set slot 3 state enable

2. Configure Multi Carrier ABC group. Create Group 1, use any name (2+2 HSB), press
Finish – Submit (not next)

3. Edit created group and Enable protection

4. You are not able to add any members because they haven’t been created yet.

!!!

17 Proprietary and Confidential

Multi Carrier ABC 2+2 HSB


3 - Protection Groups
• Create Protection Group #1 (slot 3 &7) and Protection Group #2 (slot 4 & 8)

1+1 HSB is used only for TCC-B


1+1 HSB SD is used only for TCC-B-MC

Slot 7 Slot 8
Slot 3 Slot 4

Note: If configuration will failed, please enable CMR for each radio slot in CLI:
root>platform shelf-manager abc mode admin set slot 3 state enable

18 Proprietary and Confidential

153
Multi Carrier ABC 2+2 HSB
4 - Protection Groups
• Configure 1st link – slot 3 (MRMC, freq., Link ID)
• Copy to mate – slot 3 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 7.
• Configure 2nd link– slot 4 (MRMC, freq., Link ID)
• Copy to mate – slot 4 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 8.
2+2 HSB is now ready!!! (but we need add members for ABC)

Slot 7 Slot 8
Slot 3 Slot 4

19 Proprietary and Confidential

Multi Carrier ABC 2+2 HSB


5- MC ABC Configuration – Adding members

1. Add Protection Group #1 & Protection Group #2 into ABC


2. Check if Members PG1 & PG2 are enabled
3. Check if in MUX Configuration is Enabled ABC MUX Number 1
4. Check Interface Manager if Multi Carrier ABC Group #1 is UP

5. Chassis Configuration – Change operation status per each ABC slot to Enable

20 Proprietary and Confidential

154
Multi-Carrier ABC 2+2 HSB XPIC
Configuration

Video link: https://app.box.com/s/r60ek2xse43o94phhgt6

21

Multi Carrier ABC 2+2 HSB XPIC


1- Cards configuration
• TCC-B-MC and RMC-B is required – check Platform/Management/Inventory

• Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them

HSB 1 XPIC 2 HSB 2


P1 P2
1 2
XPIC 1

V 1 P1
H
2 P2

22 Proprietary and Confidential

155
Multi Carrier ABC 2+2 HSB XPIC
2 - MC-ABC pre-configuration
1. Enable CMR via CLI per each slot belongs to ABC group (slot 3,4,7,8)
root> platform shelf-manager abc mode admin set slot 3 state enable

2. Configure Multi Carrier ABC group. Create Group 1, use any name (2+2 HSB), press
Finish – Submit (not next)

3. Edit created group and Enable protection

4. You are not able to add any members because they haven’t been created yet.

!!!

23 Proprietary and Confidential

Multi Carrier ABC 2+2 HSB XPIC


3 - Protection Groups
• Create Protection Group #1 (slot 3 &7) and Protection Group #2 (slot 4 & 8)

1+1 HSB is used only for TCC-B


1+1 HSB SD is used only for TCC-B-MC

Slot 7 Slot 8
Slot 3 Slot 4

Note: If configuration will failed, please enable CMR for each radio slot in CLI:
root>platform shelf-manager abc mode admin set slot 3 state enable

24 Proprietary and Confidential

156
Multi Carrier ABC 2+2 HSB XPIC
4 - Protection Groups

• Configure 1st link – slot 3 (MRMC, freq., Link ID)


• Copy to mate – slot 3 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 7.
• Configure 2nd link– slot 4 (MRMC, freq., Link ID)
• Copy to mate – slot 4 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 8.
2+2 HSB is now ready!!! (but we need add members for ABC)

Slot 7 Slot 8
Slot 3 Slot 4

25 Proprietary and Confidential

Multi Carrier ABC 2+2 HSB XPIC


5- XPIC Groups configuration

• Create XPIC Group # 1 (slot 3 + slot 4)


• Create XPIC Group # 2 (slot 7 + slot 8)
• Enable XPIC Group #1 & # 2

Slot 7 Slot 8
Slot 3 Slot 4

26 Proprietary and Confidential

157
Multi Carrier ABC 2+2 HSB XPIC
6 – MC ABC Group Configuration – Adding members

1. Add Protection Group #1 & Protection Group #2 into ABC


2. Check if Members PG1 & PG2 are enabled
3. Check if in MUX Configuration is Enabled ABC MUX Number 1
4. Check Interface Manager if Multi Carrier ABC Group #1 is UP

5. Chassis Configuration – Change operation status per each ABC slot to Enable

27 Proprietary and Confidential

Thank You

158
Multi Carrier Adaptive Bandwidth Control
MC-ABC

November 2014
Version 4

Agenda
• Multi-channel ABC in general

• Multi Carrier ABC engine

• Multi Carrier ABC & ACM

• Hybrid Multi-Carrier ABC – Concept

• Multi-Carrier ABC 2+0 Configuration

• Multi-Carrier ABC 8+0 Configuration

• 2+0 MC-ABC Configuration with STM-1 Clear channel

• Multi-Carrier ABC 2+2 HSB Configuration

• Multi-Carrier ABC 2+2 HSB XPIC Configuration


2 Proprietary and Confidential

159
Multi-carrier Adaptive Bandwidth Control (ABC)

• Multi-channel Adaptive Bandwidth Control-ABC is the unique technology for traffic distribution over several
RF carriers.
• The Multi-channel ABC dynamically adjusts the total link capacity depending on the number of channels and
their available capacities to provide the highest throughput at any time.
• The traffic from the Ethernet WAN port is distributed to all available RF channels in a round robin fashion,
independent of packet sizes and flows. This results in a single high-capacity Ethernet link, with a high level of
resilience and efficiency.
• If an RF-channel fails, the overall throughput will drop, but the remaining capacity will be fully utilized. The
QoS scheduler ensures that high priority traffic is transmitted unaffected, while low priority traffic may be
dropped if the link becomes congested. http://www.youtube.com/watch?v=zBVL1Ac9xJU

3 Proprietary and Confidential

Multi Carrier ABC


• Multi Carrier ABC and BBS with SD require RMC-B and TCC-B-MC.
• Multi-Carrier Adaptive Bandwidth Control (ABC) is an innovative technology that
creates logical bundles of multiple radio links and optimizes them for wireless
backhaul applications.
• Multi-Carrier ABC enables separate radio carriers to be shared by a single Ethernet
port.
• This provides an Ethernet link over the radio with multiple capacities, while still
behaving as a single Ethernet interface.
• In Multi-Carrier ABC mode, traffic is divided among the carriers optimally at the radio
frame level without requiring Ethernet link aggregation (LAG).
• Load balancing is performed without regard to the number of MAC addresses or the
number of traffic flows.
• During fading events which cause ACM modulation changes, each carrier fluctuates
independently with hitless switchovers between modulations, increasing capacity
over a given bandwidth and maximizing spectrum utilization.
• The result is 100% utilization of radio resources in which traffic load is balanced
based on instantaneous radio capacity per carrier.

http://www.youtube.com/watch?v=zBVL1Ac9xJU

4 Proprietary and Confidential

160
Multi-Carrier ABC Traffic Flow
TCC
Service Engine
Ethernet Interface

Ethernet Interface
IF RMC-B Eth LIC
Ethernet Interface

Network Processor Ethernet Interface

Ethernet Interface
IF RMC-B

Hybrid
Multicarrier ABC PW
TDM
Engine E1 LIC
Srv

TDM Crossconnect
E1 Services
PW
TDM E1/CH-STM-1
E1
Srv
LIC

STM-1/ STM-1RST

RST LIC
IF RMC-B STM-1/ STM-1RST

RST LIC
STM-1/ STM-1RST

RST LIC

5 Proprietary and Confidential

Multi- Carrier ABC Operation


• The MC-ABC engine divides the data flows into blocks of data. Each
radio carrier is assigned blocks at a rate which is based on the ACM
profile of the carrier. Once the ACM profile of a carrier changes, the
rate at which the data blocks are delivered to this carrier changes. The
higher the ACM profile of a certain carrier, the higher the block rate
assigned to this carrier.
• On the receiving side of the link, all blocks are synchronized, meaning
that blocks are delayed based on the last arriving block. The latency of
the aggregated data flow is determined by the slowest arriving block.
• A low ACM profile means more latency compared to a higher ACM
profile. When all channels run the same radio script, the latency
variation for the aggregated data stream is determined by the latency
variation of one radio channel. This latency variation is slightly more
complicated to predict when the radio carriers runs at different radio
scripts, since each radio script has a unique delay distribution. Multi-
Carrier ABC can tolerate a large delay variance between the slowest
and the fastest arriving blocks.

6 Proprietary and Confidential

161
MC-ABC & ACM
• Multi-Carrier ABC automatically adapts to capacity changes that result
from changes in the current ACM profile.
• When an ACM profile change takes place on a specific carrier, MC-
ABC responds by changing the block size of that channel.
• The process of changing the block size is performed dynamically and
is hitless.
• Since the ACM profile changes are also hitless, the overall Multi-
Carrier ABC traffic is hitless.

7 Proprietary and Confidential

Multi-Carrier ABC engine

ABC Engine

1Gbps connection for


Clear STM-1 channels Ethernet and TDM

Network
Processor
1x Up to 8+0 MC‐ABC (Up to 1Gbps)
1+1/2+2 MC‐ABC/HSB (Up to 1Gbps)
Mixed Nx1+0/1+1 & 1x ABC (4+0)
Ethernet ports Channelized STM-1 or E1/DS1

8 Proprietary and Confidential

162
Multi-carrier ABC
In the past: N+1 protection

Protection
Radio
Radio

Radio
Radio

Radio
Radio
1. Dedicated carrier for each 
STM‐1

2. Unused protection channel for  Unused
a single carrier failure channel
ABC engine
3. Excess Ethernet traffic may be 
added to SDH carriers 
(provided there is excess 
STM‐1 

bandwidth)

Ethernet
STM‐1 #N
#1

STM‐1 

Traffic
#2
4. Multi‐carrier ABC works solely 
on Ethernet carriers

L2 switch

Simple and Powerful Traffic Allocation  TDM & Ethernet 
9 Proprietary and Confidential

Hybrid Multi-Carrier ABC – Concept


Creating Logical Groups

1. All radio carriers serve as a 
single logical pipe

2. SDH traffic is split (byte‐by‐
Radio
Radio

Radio
Radio

byte) between carriers,  1 2 N 1 2 N 1 2 N 1 2 N
combined with packet traffic

3. No channel is left unused ‐ full 
utilization of available 
bandwidth
ABC Engine
4. In case of channel failure or 
degradation, SDH traffic is 
STM‐1 

Ethernet

always prioritized over 
STM‐1 #N
STM‐1 
#1

Traffic

Ethernet traffic.
#2

5. Protects against multiple 
carrier failures

6. Flexible choice of modulation 
(lower modulation higher 
sys. gain)
Network
Processor

Simple and Powerful Traffic Allocation  TDM & Ethernet 
10 Proprietary and Confidential

163
Hybrid Multi-Carrier ABC
Channel failure/degradation

1. System is highly resilient to 
carrier failure/degradation

2. All SDH traffic remains in tact 

Radio
Radio

Radio
Radio
as long as: 1 2 N 1 2 N 1 2 N

155

3. Total available capacity for 
ABC Engine
Ethernet traffic:

155
STM‐1 

Ethernet
STM‐1 #N
STM‐1 
#1

Traffic
#2

Network
Processor

Simple and Powerful Traffic Allocation  TDM & Ethernet 
11 Proprietary and Confidential

2+0 MC-ABC Configuration

Video Link: https://app.box.com/s/d8gg7npc30cv9mrd57kd

12

164
Multi Carrier ABC 2+0
1- Cards configuration
• TCC-B-MC and RMC-B are required – check Platform/Management/Inventory

• Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them

1 2

13 Proprietary and Confidential

Multi Carrier ABC 2+0


2 – MC ABC Configuration

1. Create ABC Group 1 consists of slot 3 (channel 1) and slot 4 (channel 2)


2. Check if ABC group has Admin status – Enable
3. Setup MRMC, Freq., Link ID per each radio link
4. Check if ABC MUX Number 1 is enabled
5. Check IF Manager – MC ABC Grop1 is enabled
6. Enable all radio slots in Chassis Configuration

14 Proprietary and Confidential

165
8+0 MC-ABC Configuration

Video Link: https://app.box.com/s/qiakfcnv9va8bjbrh2xn

15

Multi Carrier ABC 8+0


1- Cards configuration
• TCC-B-MC and RMC-B are required – check Platform/Management/Inventory

• Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them

5 6 7 8
1 2 3 4

16 Proprietary and Confidential

166
Multi Carrier ABC 8+0
2 – MC ABC Configuration

1. Create ABC Group 1 consists of slot 3-10


2. Check if ABC group has Admin status – Enable
3. Setup MRMC, Freq., Link ID per each radio link
4. Check if ABC MUX Number 1 is enabled
5. Check IF Manager – MC ABC Grop1 is enabled
6. Enable all radio slots in Chassis Configuration

17 Proprietary and Confidential

2+0 MC-ABC Configuration with STM-1 Clear channel

18

167
STM-1 only card integration with ABC
• ABC group should allow the following combination of types of cards
1. RMC-E/STM-1 and RMC-E
2. RMC-E/STM-1 and RMC-B
3. RMC-E and STM-1
4. RMC-B and STM-1
5. RMC-B only
6. RMC-E only
• Attaching to a group
• Can this be done dynamically (adding STM-1 card to an existing
group)
• Group admin shall not be dependent on STM-1 admin
• STM-1 may be disabled but the group enabled
• Group size
• Up to four STM-1 channels shall be supported per group
• This is unrelated to the number of cards (no validation)
• Interface number is priority as well
• Group max size shall be 4 radios + 4 STM-1 cards (8 members)

Proprietary and Confidential

Multi Carrier ABC 2+0


1- Cards configuration
• TCC-B-MC,RMC-B and STM-1/OC3 Interface (RMC-E should be used as STM-
1/OC3 interface as well) are required – check Platform/Management/Inventory

• Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them

20 Proprietary and Confidential

168
Multi Carrier ABC 2+0
2 – MC ABC Configuration

1. Create ABC Group 1 consists of radio slots and STM-1 slots


2. Check if ABC group has Admin status – Enable
3. Setup MRMC, Freq., Link ID per each radio link
4. Check if ABC MUX Number 1 is enabled
5. Check IF Manager – MC ABC Grop1 is enabled
6. Enable STM-1 interfaces
7. Enable all radio slots in Chassis Configuration and
STM-1 cards as well

21 Proprietary and Confidential

Multi-Carrier ABC 2+2 HSB Configuration

22

169
Multi Carrier ABC 2+2 HSB
1- Cards configuration
• TCC-B-MC and RMC-B are required – check Platform/Management/Inventory

• Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them

HSB 1 HSB 2
P1 P2
1 2

23 Proprietary and Confidential

Multi Carrier ABC 2+2 HSB


2 - MC-ABC pre-configuration
1. Enable CMR via CLI per each slot belongs to ABC group (slot 3,4,7,8)
root> platform shelf-manager abc mode admin set slot 3 state enable

2. Configure Multi Carrier ABC group. Create Group 1, use any name (2+2 HSB), press
Finish – Submit (not next)

3. Edit created group and Enable protection

4. You are not able to add any members because they haven’t been created yet.

!!!

24 Proprietary and Confidential

170
Multi Carrier ABC 2+2 HSB
3 - Protection Groups
• Create Protection Group #1 (slot 3 &7) and Protection Group #2 (slot 4 & 8)

1+1 HSB is used only for TCC-B


1+1 HSB SD is used only for TCC-B-MC

Slot 7 Slot 8
Slot 3 Slot 4

Note: If configuration will failed, please enable CMR for each radio slot in CLI:
root>platform shelf-manager abc mode admin set slot 3 state enable

25 Proprietary and Confidential

Multi Carrier ABC 2+2 HSB


4 - Protection Groups
• Configure 1st link – slot 3 (MRMC, freq., Link ID)
• Copy to mate – slot 3 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 7.
• Configure 2nd link– slot 4 (MRMC, freq., Link ID)
• Copy to mate – slot 4 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 8.
2+2 HSB is now ready!!! (but we need add members for ABC)

Slot 7 Slot 8
Slot 3 Slot 4

26 Proprietary and Confidential

171
Multi Carrier ABC 2+2 HSB
5- MC ABC Configuration – Adding members

1. Add Protection Group #1 & Protection Group #2 into ABC


2. Check if Members PG1 & PG2 are enabled
3. Check if in MUX Configuration is Enabled ABC MUX Number 1
4. Check Interface Manager if Multi Carrier ABC Group #1 is UP

5. Chassis Configuration – Change operation status per each ABC slot to Enable

27 Proprietary and Confidential

Multi-Carrier ABC 2+2 HSB XPIC


Configuration

Video link: https://app.box.com/s/r60ek2xse43o94phhgt6

28

172
Multi Carrier ABC 2+2 HSB XPIC
1- Cards configuration
• TCC-B-MC and RMC-B are required – check Platform/Management/Inventory

• Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them

HSB 1 XPIC 2 HSB 2


P1 P2
1 2
XPIC 1

V 1 P1
H
2 P2

29 Proprietary and Confidential

Multi Carrier ABC 2+2 HSB XPIC


2 - MC-ABC pre-configuration
1. Enable CMR via CLI per each slot belongs to ABC group (slot 3,4,7,8)
root> platform shelf-manager abc mode admin set slot 3 state enable

2. Configure Multi Carrier ABC group. Create Group 1, use any name (2+2 HSB), press
Finish – Submit (not next)

3. Edit created group and Enable protection

4. You are not able to add any members because they haven’t been created yet.

!!!

30 Proprietary and Confidential

173
Multi Carrier ABC 2+2 HSB XPIC
3 - Protection Groups
• Create Protection Group #1 (slot 3 &7) and Protection Group #2 (slot 4 & 8)

1+1 HSB is used only for TCC-B


1+1 HSB SD is used only for TCC-B-MC

Slot 7 Slot 8
Slot 3 Slot 4

Note: If configuration will failed, please enable CMR for each radio slot in CLI:
root>platform shelf-manager abc mode admin set slot 3 state enable

31 Proprietary and Confidential

Multi Carrier ABC 2+2 HSB XPIC


4 - Protection Groups

• Configure 1st link – slot 3 (MRMC, freq., Link ID)


• Copy to mate – slot 3 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 7.
• Configure 2nd link– slot 4 (MRMC, freq., Link ID)
• Copy to mate – slot 4 will be source radio, it means that whole configuration (MRMC,
freq., link ID) will be copied to slot 8.
2+2 HSB is now ready!!! (but we need add members for ABC)

Slot 7 Slot 8
Slot 3 Slot 4

32 Proprietary and Confidential

174
Multi Carrier ABC 2+2 HSB XPIC
5- XPIC Groups configuration

• Create XPIC Group # 1 (slot 3 + slot 4)


• Create XPIC Group # 2 (slot 7 + slot 8)
• Enable XPIC Group #1 & # 2

Slot 7 Slot 8
Slot 3 Slot 4

33 Proprietary and Confidential

Multi Carrier ABC 2+2 HSB XPIC


6 – MC ABC Group Configuration – Adding members

1. Add Protection Group #1 & Protection Group #2 into ABC


2. Check if Members PG1 & PG2 are enabled
3. Check if in MUX Configuration is Enabled ABC MUX Number 1
4. Check Interface Manager if Multi Carrier ABC Group #1 is UP

5. Chassis Configuration – Change operation status per each ABC slot to Enable

34 Proprietary and Confidential

175
Thank You

176
IP-20N Licensing

October 2014
Version 4

Agenda
• Licensing in General
• Demo License
• CeraOS License concept
• IP-20 Licensing Scheme
• Licensed Features

2 Proprietary and Confidential

177
Licensing
• IP-20N offers a pay as-you-grow licensing concept in which
future capacity growth and additional functionality can be
enabled with Activation key.
• For purposes of licensing, each IP-20N chassis is considered
a distinct device, regardless of which cards are included in the
chassis. Each device contains a single Activation key.
• Licenses are divided into two categories:
• Per Carrier – The license is per carrier
• Per Device – The license is per device, regardless of the
number of carriers supported by the device.

• Ceragon provides a web-based License Management


System (LMS). The LMS enables authorized users to
generate Activation keys, which are generated per IDU serial
number.

• A 1+1 HSB configuration requires the same set of licenses for


both the active and the protected interfaces.

3 Proprietary and Confidential

License Management System

4 Proprietary and Confidential

178
License generating

License is generated according to chassis SN

5 Proprietary and Confidential

Mandatory Cards - IVM


• Single card for 1RU and 2RU chassis.
• 2 x E2PROM on single board (function as 2 separated cards).
• Installed at the back of the chassis
• Holds the chassis:
• License.
• Node MAC address (48 MACs per unit).
• Serial number for chassis

6 Proprietary and Confidential

179
DEMO License
• A demo license is available that enables all features for 60 days.

• The demo license expires 60 days from the time it was activated,
and the most recent valid license goes into effect.

• The 60-day period is only counted when the system is powered up.
10 days before the demo license expires, an alarm is raised
indicating to the user that the demo license is about to expire.

7 Proprietary and Confidential

License violation
License violation yellow color screen has been implemented from sw. T7.9

8 Proprietary and Confidential

180
IP-20 Pricing Concept (Value Structure)
Hardware, Software & Licensed Features

CeraOS (Software)
Licensed Scalability Licensed Premium Functionality
• Radio capacity • Advanced radio configurations
• 2nd modem/core  • Advanced QoS
activation (IP‐20G/C) • Ethernet OAM
• Additional GE user  • TDM PW services
interfaces • Synchronization
• Additional CET‐Node  • Network Resiliency
services/EVCs (L2) • Advanced Security

Licensed Mode ‐ CET‐Node
• CET services/EVCs (L2)
• 2x GE user interfaces

• Smart‐Pipe services (L1)
• 10M radio capacity Base‐line 
• 1x GE user interface functionality
• Native TDM services

Hardware
• Product Models (e.g. IP‐20N, IP‐20G, IP‐20C, IP‐20LH)
• Assembly options (e.g. single/dual modem in IP‐20G)
• Add‐on modules (e.g. RMC in IP‐20N)

9 Proprietary and Confidential

IP-20 Licensing Scheme


• Per Carrier • Per Node – Premium Functionality
• Scalability • QoS group
• Radio capacity • Enhanced Packet Buffer
• Advanced radio configurations • Frame Cut Through
• ACM • H-QoS
• XPIC • Sync group
• Multi-Carrier ABC • Sync-Unit
• IEEE-1588 TC
• MIMO
• IEEE-1588 OC
• Header De-duplication
• IEEE-1588 BC
• Redundancy/Resiliency group
• Per Node – scalability • Network Resiliency
• CET-Node mode/scalability • Main Card Redundancy - HA
• Edge (8 services/EVCs) • Ethernet OAM group
• Agg-Lvl-1 (64 services/EVCs) • Eth-OAM FM
• ETH-OAM PM
• Agg-Lvl-2 (1024 services/EVCs)
• TDM group
• General node scalability
• TDM PW
• 2nd
modem activation (IP-20G only)
• Security
• 2nd core activation (IP-20C only)
• Secure management
• GE user interfaces

10 Proprietary and Confidential

181
Licensed Features
License Name Description
Enables you to increase your system’s radio capacity in 
gradual steps by upgrading your capacity license. 
Without a capacity license, each carrier has a capacity 
Radio Capacity License
of 10 Mbps. Licensed capacity is available from 50 
Mbps to 500 Mbps. Each RMC card can be licensed for 
a different capacity. 
Enables the use of Adaptive Coding and Modulation 
(ACM) scripts. A separate license is required per core. 
IP‐20‐SL‐ACM

Enables Multi‐Carrier ABC.
IP‐20‐SL‐MC‐ABC

Enables the use of Header De‐Duplication, which can 
IP‐20‐SL‐Header‐DeDuplication be configured to operate at L2 through L4. 

Enables the use of Cross Polarization Interface 
IP‐20‐SL‐XPIC Canceller (XPIC). A separate license is required for each 
core in the XPIC pair. 

11 Proprietary and Confidential

Licensed Features
License Name Description
Enables the use of a TCC/LIC Ethernet traffic port in GE 
mode (10/100/1000baseT or 1000baseX). An activation 
key is required for each Ethernet traffic port that is used 
on the device. An activation key can be installed 
multiple times with dynamic allocation inside the unit 
IP‐20‐SL‐GE‐Port to enable multiple GE ports.
Note: All Ethernet traffic ports are enabled in FE mode 
(10/100baseT) by default without requiring any 
activation key.

Enables the use of a second TCC in a 2RU chassis for 
IP‐20‐SL‐Main‐Card‐Redundancy High Availability.

12 Proprietary and Confidential

182
Licensed Features
License Name Description
Enables Carrier Ethernet Transport (CET) and a number 
of Ethernet services (EVCs), depending on the type of 
CET Node license: 
• Edge CET Node – Up to 8 EVCs. 
• Aggregation Level 1 CET Node – Up to 64 EVCs. 
• Aggregation Level 2 CET Node – Up to 1024 EVCs. 
Edge CET Node 
A CET Node license also enables the following: 
• Network resiliency (MSTP/RSTP) for all services. 
• Full QoS for all services including basic queue buffer
management (fixed queues buffer size limit, tail‐
drop only) and eight queues per port, no H‐QoS. 
• LAG Support

Enables the following protocols for improving network 
resiliency: 
P‐20‐SL‐Network‐Resiliency
• G.8032 
• TDM (PW) services 1:1/1+1 path protection 

13 Proprietary and Confidential

Licensed Features
License Name Description
Enables H‐QoS. This license is required to add service‐
IP‐20‐SL‐H‐QoSH‐QoS bundles with dedicated queues to interfaces. Without 
this license, only the default eight queues per port are 
supported. (Planned for future release)
Enables configurable (non‐default) queue buffer size
limit for Green and Yellow frames. Also enables WRED. 
IP‐20‐SL‐Enh‐Packet‐Buffer
The default queue buffer size limit is 1Mbits for Green
frames and 0.5 Mbits for Yellow frames.
Enables the G.8262 synchronization unit. This license is 
required in order to provide end‐to‐end synchronization 
IP‐20‐SL‐Sync‐Unit
distribution on the physical layer. This license is also 
required to use Synchronous Ethernet (SyncE). 
Enables Frame Cut‐Through.
P‐20‐SL‐Frame‐Cut‐Through

Enables TDM pseudowire services on units with TDM 
IP‐20‐SL‐TDM‐PW interfaces. Without this activation key, only native TDM 
services are supported.

14 Proprietary and Confidential

183
Licensed Features

License Name Description
Enables secure management protocols (SSH, HTTPS, 
P‐20‐SL‐Secure‐Management
SFTP, SNMPv3, and RADIUS).
Enables Connectivity Fault Management (FM) per 
IP‐20‐SL‐Eth‐OAM‐FM
Y.1731/ 802.1ag and 802.3ah (CET mode only).

Enables performance monitoring pursuant to Y.1731 
IP‐20‐SL‐Eth‐OAM‐PM
(CET mode only).

15 Proprietary and Confidential

License

16 Proprietary and Confidential

184
License features available

17 Proprietary and Confidential

Thank You

185
 

This page was intentionally left blank. 

186
Native TDM

November 2014
Version 6

Agenda
• Native TDM Services
• Hybrid Service Engine – TDM + Ethernet
• All-packet services example: Ethernet EVCs + TDM Pseudowire
• How to Setup Native TDM
• TDM Path Protection
• 1:1 TDM Path Protection
• 1+1 TDM Protection
• 1+1 Dual Homing TDM Path Protection
• Configuration of Path Protection
• 2+0 MC-ABC Configuration with STM-1 Clear channel
• TDM Card and Interface Protection (only for chSTM-1)
2 Proprietary and Confidential

187
Native TDM Services
• IP-20N provides integrated support for transportation of TDM (E1) services
with integrated E1 and ch-STM-1 interfaces.

• Two types of TDM services are supported using the same hardware:
• Native TDM trails
• TDM Pseudowire services (enabling interoperability with third party
packet/PW equipment)

• IP-20N provides native TDM support, utilizing a cross-connect module to


support up to 512 TDM trails.
• The IP-20N Web EMS provides a simple and easy-to-use GUI that enables
users to provision end-to-end TDM trails. The Services Provisioning GUI
includes the following trail-creation end points:
• TDM interface
• Radio interface

3 Proprietary and Confidential

Hybrid Services Engine – Ethernet + TDM


Services engine

TDM cross-connect (VCs)


E1 TDM
Ch-STM1
traffic
Hybrid
TDM
PW
Radio
Network processor (EVCs)
Packet
traffic
GE/FE

• Native TDM Services (VCs)


• Ethernet Services (EVCs)
• Ethernet switched (L2) services – E-Line (PtP), E-LAN (MPtMP)
• Ethernet port based (L1) services (“smart pipe”)
• TDM Pseudowire services – Unstructured (SAToP), Structured (CESoP)

4 Proprietary and Confidential

188
Hybrid services example: Ethernet EVCs + Native TDM
TDM cross-connect (VCs)

E1/
Port SAP
ch-STM1

Ethernet Services (EVCs)

User Port PtP Service


(UNI)
TDM
traffic
Hybrid
GE/FE Port SAP
SAP SNP
SAP Packet Radio
traffic

MPtMP Service

User Port SAP SNP Network


(UNI) Port

GE/FE Port Port GE/FE

SAP SNP

5 Proprietary and Confidential

All-packet services example: Ethernet EVCs + TDM Pseudowire

Ethernet Services (EVCs)


TDM PtP Service
PW

E1/DS1/
Port SAP
SAP SNP
SAP
ch-STM1/
OC3

User Port PtP Service


(UNI)
S-VLAN =
200
GE/FE Port SAP SNP Packet Packet
SAP SAP traffic Radio

MPtMP Service

User Port SAP SNP Network


(UNI) Port

GE/FE Port Port GE/FE

SAP SNP

6 Proprietary and Confidential

189
How to Setup Native TDM

ETSI and ANSI

• For IP-20N default standard is ETSI


• To change the TDM interfaces to operate according to the ANSI (FCC) standard
(DS1 and OC-3), results in system reset and restores the default configuration.

8 Proprietary and Confidential

190
Native TDM Configuration

VC‐1 VC‐2 VC‐3 VC‐4


VC‐5 VC‐6 VC‐7 VC‐8
VC‐9 VC‐10 VC‐11 VC‐12
VC‐13 VC‐14 VC‐15 VC‐n

E1#1-16 (or STM-1 VC)


Loop Timing

TDM
Network
9

9 Proprietary and Confidential

TDM Service Configuration 1

As first we have to create any Eth. service for Radio port, because
we need specify which type of traffic will be carry by Radio.

Create any service point which is connected to the radio port in


Ethernet/Services …

10 Proprietary and Confidential

191
TDM Service Configuration 2
LIC-T155 ACR card
16E1/DS1 card

1
2 OR
3

1 – Select required TDM card


2 – Select required E1or VC
3 – Select Timing
Loop Timing – Timing is taken from incoming traffic.
Recovered Clock – Clock information is recovered on the egress path. Extra information may be located
in an RTP header that can be used to correct frequency offsets. Recovered Clock can provide very
accurate synchronization, but requires low PDV (Packer Delay Variation).
System Reference Clock – Trails are synchronized to the system reference clock.
Front Panel – Trails are synchronized from Front Panel synch. port.

11 Proprietary and Confidential

TDM Service Configuration - 3


TCC-B-MC with ABC TCC-B

OR

Select VC for radio slot or VC‐1 VC‐2 VC‐3 VC‐4


Multi Carrier ABC Group
VC‐5 VC‐6 VC‐7 VC‐8
VC‐9 VC‐10 VC‐11 VC‐12
VC‐13 VC‐14 VC‐15 VC‐n

E1#1-1

12 Proprietary and Confidential

192
TDM Service Configuration - 4

1 2

13 Proprietary and Confidential

TDM Service Configuration

Selection Summary

14 Proprietary and Confidential

193
TDM Path Protection

15

TDM Path Protection


• TDM path protection enables the operator to define two separate network
paths for a single TDM service.

• Two different kinds of path protection are available, each suitable for a
different network topology:

• 1:1 and 1+1 TDM path protection is suitable for ring networks that consist
entirely of IP-20N and/or IP-20G elements with two end-point interfaces for
the TDM trail.

• 1+1 Dual Homing TDM path protection is suitable for networks in which the
IP-20N and/or IP-20G elements are set up as a chain connected to the third
party networks at two different sites.
• The ring is closed on one side by the IP-20N and/or IP-20G elements,
and on the other by third party equipment supporting standard SNCP.
• In this case, there are three end-point interfaces in the IP-20N and/or
IP-20G section of the network.

16 Proprietary and Confidential

194
1:1 TDM Path Protection

Active Backup
Path Path

• 1:1 TDM path protection enables the operator to define two separate network paths for a single
TDM trail.
• Each trail has the same TDM interface end points, but traffic flows to the destination via different
paths.
• Bandwidth is utilized only on the active path, freeing up resources on the standby path.
• For native TDM services TDM path protection is done by means of configuring active and backup
path at the TDM service end-points.

17 Proprietary and Confidential

1+1 TDM Path Protection

Active Backup
Path Path

• 1:1 TDM path protection enables the operator to define two separate network paths for a single
TDM trail.
• Each trail has the same TDM interface end points, but traffic flows to the destination via different
paths.
• Bandwidth is utilized for both paths parallel.
• For native TDM services TDM path protection is done by means of configuring active and backup
path at the TDM service end-points.

18 Proprietary and Confidential

195
1+1 Dual Homing TDM Path Protection

• 1+1 TDM dual homing path protection is used for networks in which the IP-20 network elements are
set up as a chain connected to third party networks at two different sites, where one end-point is
located on an IP-20 unit and the other end-point is located on third-party equipment supporting
standard SNCP.
• As with 1:1 TDM path protection, the operator defines two separate network paths for a single TDM
trail. However, unlike path protection, traffic flows through both paths simultaneously, thereby
supporting standard SNCP in the third party equipment.

19 Proprietary and Confidential

Configuration of Path Protection

20

196
Configuration for 1:1 and 1+1 TDM Path Protection

1:1 or 1+1 TDM Protection

Bypass Bypass
configuration configuration

Trail ID 1 Trail ID 2
Radio Slot 4 E1#1 Radio Slot 5
VC-1 Slot 3 VC-1

1:1 or 1+1 TDM Protection

Proprietary and Confidential

Configuration 1:1 or 1+1 TDM Path Protection

1 2 3

or

4 5

22 Proprietary and Confidential

197
TDM Service

Interface #1 Interface #2 Protection Interface

23 Proprietary and Confidential

Configuration for 1+1 Dual homing Edge

1+1 Dual homing 1+1 Dual homing


network edge network edge

Trail ID 1 Trail ID 2

1+1 TDM Protection

24 Proprietary and Confidential

198
2+0 MC-ABC Configuration with STM-1 Clear channel

25

Multi-Carrier ABC Traffic Flow


TCC
Service Engine
Ethernet Interface

Ethernet Interface
IF RMC-B Eth LIC
Ethernet Interface

Network Processor Ethernet Interface

Ethernet Interface
IF RMC-B

Hybrid
Multicarrier ABC PW
TDM
Engine E1 LIC
Srv

TDM Crossconnect
E1 Services
PW
TDM E1/CH-STM-1
E1
Srv
LIC

STM-1/ STM-1RST

RST LIC
IF RMC-B STM-1/ STM-1RST

RST LIC
STM-1/ STM-1RST

RST LIC

26 Proprietary and Confidential

199
STM-1 only card integration with ABC
• ABC group should allow the following combination of types of cards
1. RMC-E/STM-1 and RMC-E
2. RMC-E/STM-1 and RMC-B
3. RMC-E and STM-1
4. RMC-B and STM-1
5. RMC-B only
6. RMC-E only
• Attaching to a group
• Can this be done dynamically (adding STM-1 card to an existing
group)
• Group admin shall not be dependent on STM-1 admin
• STM-1 may be disabled but the group enabled
• Group size
• Up to four STM-1 channels shall be supported per group
• This is unrelated to the number of cards (no validation)
• Interface number is priority as well
• Group max size shall be 4 radios + 4 STM-1 cards (8 members)

Proprietary and Confidential

Multi Carrier ABC 2+0


1- Cards configuration
• TCC-B-MC,RMC-B and STM-1/OC3 Interface (RMC-E should be used as STM-
1/OC3 interface as well) are required – check Platform/Management/Inventory

• Add needed cards Platform/Shelf Management/Chassis Configuration/Enable them

28 Proprietary and Confidential

200
Multi Carrier ABC 2+0
2 – MC ABC Configuration

1. Create ABC Group 1 consists of radio slots and STM-1 slots


2. Check if ABC group has Admin status – Enable
3. Setup MRMC, Freq., Link ID per each radio link
4. Check if ABC MUX Number 1 is enabled
5. Check IF Manager – MC ABC Grop1 is enabled
6. Enable STM-1 interfaces
7. Enable all radio slots in Chassis Configuration and
STM-1 cards as well

29 Proprietary and Confidential

TDM Card and Interface Protection


TDM card and interface protection is only applicable for LIC-T155 (1x ch-STM-1) cards.

30

201
TDM Card and Interface Protection
• Two different schemes are available for card and interface protection:
• 1+1 HSB
• Uni-Directional MSP

• Both schemes provide full protection against hardware failure.


• Both Schemes are available only for LIC-T155 card.
• Uni-Directional MSP also provides full protection against interface failure due
to cable disconnection or failure of the far-end equipment, while 1+1 HSB
provides protection against interface failure due to cable disconnection at the
IP-20N side of the link.
• In both schemes, configuration of the active card is automatically copied to the
standby card. The entire configuration can also be copied and stored for
maintenance purposes

31 Proprietary and Confidential

1+1 HSB Protection


• 1+1 HSB protection offers full redundancy for LIC-T155 cards. This form of
redundancy is appropriate for connections with third party equipment at which a
single STM-1 interface is available.

• In a 1+1 HSB configuration, the single port on the third party equipment is connected
to two STM-1 interfaces on the IP-20N through an optical splitter cable. This ensures
that an identical signal is received by each STM-1 interface on the IP-20N. The IP-
20N determines which interface is active, based on traffic loss indications such as
LOS, LOF, or other errors.
• While both interfaces on the IP-20N receive traffic, only the active interface transmits.
The standby interface is automatically muted.

32 Proprietary and Confidential

202
Uni-Direction MSP
• In Uni-directional Multiplex Section Protection (MSP), the element at each end of the
STM-1 link transmits traffic through both connections.
• On the receiving side, each IP-20N element unilaterally decides, based on traffic loss
indications such as LOS, LOF, or other errors, from which interface to receive the
traffic, and declares that interface the active interface.
• There is no need for a protocol between the two connected elements.
• Each LIC-T155 is connected directly to separate ports in the third party network
element.
• There is no need for a splitter or Y-cable.
• This ensures protection to the optical ports in the third party equipment and to the
optical fiber cable, as well as to the LIC-T155 in the IP-20N.

33 Proprietary and Confidential

Configuration – 1st create group

Up to 4 Groups for STM-1 Cards are available

34 Proprietary and Confidential

203
Configuration – 2nd select type of protection

For this configuration change need to be disabled:


1. Trail admin status = Down
2. STM-1 Interfaces Admin Status in Interface Manager = Down

35 Proprietary and Confidential

Thank You

204
Configuration Management &
Software Download

October 2014
Version 3

Agenda
• Backup and Restore
• Software Download
• Unit Info file

2 Proprietary and Confidential

205
Backup & Restore

Backup and Restore


• Backup and restore can be used for
• Restoring configuration upon unit replacement
• Duplicating configuration
• Three restore points
• Restore point are manually created
• Backup file is generated from a restore pointed
• Once a backup file is imported to a unit it can be restored

4 Proprietary and Confidential

206
Backup Process

Backup Configuration File Idea


1. Install FTP server – We recommend to use FileZilla Server (not Client)
2. Setup FileZilla Server parameters (Users, Shared Folders)
3. Setup communication parameters for IP20 unit with FTP Server
4. Create Configuration Backup inside IP20 unit
5. Export Configuration Backup to FTP server

Export
File

FTP IP address

6 Proprietary and Confidential

207
2. FTP Setup – FileZilla Settings
1. Install FileZilla Server and Run it
2. Create User in FileZilla Server

7 Proprietary and Confidential

2. FTP Setup – FileZilla Settings


3. Create shared folder in FTP Server PC (C:\ Backups)
4. Setup all permissions for this folder in FTP Server

FTP SERVER PC

FileZilla settings in FTP SERVER PC

5. Check Firewall settings in FTP Server PC and if port 21 is used only with
FileZilla
8 Proprietary and Confidential

208
3. IP20 Configuration Management Settings
Setup Parameters for FTP Server Connection

Status for File transfer

Status for for Backup creation

User name and password


must be same as in FileZilla
Server

FTP Server IP address


Path in Server (This setup means that
!!! file will be uploaded in C:\Backups)
Name.zip (.zip is MANDATORY)
Restore point selection
Time installation for future releases

9 Proprietary and Confidential

4. Backup process

6. Check Export status

4. Check Status

1. Setup Configuration parameters


included Restore Point which will be
used for Configuration Backup inside
the system

2. Apply 5. Export 3. Backup

10 Proprietary and Confidential

209
5. Backup Files

Here are stored


backup files per each
restore point

11 Proprietary and Confidential

Restore Process

210
Restore Configuration File Idea
1. Install FTP server (when is not already installed) – we recommend to use
FileZilla Server (Not Client)
2. Setup FileZilla Server parameters (Users, Shared Folders)
3. Setup communication parameters for IP20 unit with FTP Server
4. Import Configuration Backup from FTP Server
5. Restore Configuration Backup

Import File

FTP IP address

13 Proprietary and Confidential

3. IP20 Configuration Management Settings


Setup Parameters for FTP Server Connection

Status for File transfer

Status for Backup creation

User name and password


must be same as in FileZilla
Server

FTP Server IP address


Path in Server (Means that file will be downloaded
from Home FileZilla directory – in our case
!!! C:\Backups)
Name.zip (.zip is MANDATORY)
Restore point selection
Time installation for future releases

14 Proprietary and Confidential

211
Restore process

4. Check Import status

6. Check Restore status

1. Setup Configurations parameters


included Restore point 1-3

2.Apply 3.Import 5 Restore

RESTORE CONFIGURATION WILL NOT CHANGE CURRENT IP ADDRESS !!!


15 Proprietary and Confidential

Config_Dump File

16 Proprietary and Confidential

212
Software Download for IDU

17

Software Download Idea for IDU


1. Before performing a software upgrade, it is important to verify that the system date
and time are correct.
2. Install FTP server (when is not already installed) – we recommend to use FileZilla
Server (Not Client)
3. Setup FileZilla Server parameters (Users, Shared Folders)
4. Setup communication parameters for IP20 unit with FTP Server
5. UnZip software package for IP-20 to FTP Server shared folder
6. Download software from FTP Server
7. Install downloaded software

Software
Download

• Although RFU software is included in the standard installation bundle, the current
software version is not automatically updated in the RFU when an installation is
performed.
• To upgrade the software in an RFU, you must perform the upgrade manually, per slot

18 Proprietary and Confidential

213
IP-20 Software Download Settings

User name and password


must be same as in FileZilla
Server

FTP Server IP address

Path in FTP Server (This setup


means that configuration files will
be downloaded from Home
FileZilla directory)

19 Proprietary and Confidential

Software process download

4. Check Download Status

6. Check Installation Status

1. Setup
Parameters

2. Apply 3. Download 5. Install Downloaded Software


Software Files
from FTP Server

20 Proprietary and Confidential

214
Running Software version

21 Proprietary and Confidential

Unit Information file

22

215
Unit Info

Status for Unit info creation

Status for File transfer

User name and password


must be same as in FileZilla
Server
FTP Server IP address
Path in Server (This setup means that

!!! file will be uploaded in C:\Backups)


Name.zip (.zip is MANDATORY)

• Includes technical data about the unit and also backup files placed in restore points
• This file can be forwarded to customer support, at their request, to help in analyzing issues
that may occur

23 Proprietary and Confidential

Create and Transfer process

4. Check Status

6. Check Export status

1. Setup Configuration
parameters included Restore
Point which will be used for
Configuration Backup inside the
system

2. Apply 3. Create 5. Export

24 Proprietary and Confidential

216
RFU Software Installation

25

RFU Software Installation


• Although RFU software is included in the standard installation bundle, the
current software version is not automatically updated in the RFU when an
installation is performed.
• To upgrade the software in an RFU, you must perform the upgrade manually, per
slot.
• This enables you to manage IDU and RFU software versions separately.

• In this version, you must use the Command Line Interface (CLI) to
upgrade RFU software.

26 Proprietary and Confidential

217
RFU Software Installation Procedure
1. The following sequence of commands installs RFU-C software version 2.13 in the
RFU connected to slot 3.
root> platform software show rfu versions

2. The next step is to perform the update and install commands:


root> platform software update rfu version slot 3 radio-port 1
root> platform software install rfu version slot 3 radio-port 1

3. To check the status of an update or install operation, enter the following command:
root> platform software show rfu status

4. Once the installation is complete, the Install Status column should indicate installation
success and the In Progress column should indicate 100 (100%).
5.When the installation is complete, enter the show rfu versions command again to verify
that the new version has been properly installed in both the TCC and the RFU:
root> platform software show rfu versions

27 Proprietary and Confidential

Thank You

218
Troubleshooting

November 2014
Version 4

Agenda
• Faults and Alarms
• Performance monitoring
• RMON statistic
• Loopback

2 Proprietary and Confidential

219
Faults and Alarms

Faults
Current Alarms

Event Log

4 Proprietary and Confidential

220
Alarm Configuration

5 Proprietary and Confidential

Performance Monitoring - Radio

221
Radio Parameters

Profile Mod MSE Down-Threshold MSE Up-Threshold


0 QPSK -18
1 8PSK -16 -19
2 16QAM -17 -23
3 32QAM -21 -26
4 64QAM -24 -29
5 128QAM -27 -32
6 256QAM -30 -34
7 512QAM -32 -37
8 1024 QAM SFEC -35 -38
9 1024 QAM WFEC -36 -41
10 2048QAM -39

Applicable for both 28/56MHz , 2048 is planned for future releases

The values are typical and subject to change in relation to the frequency and RFU
type. For more details please contact your Ceragon representative

7 Proprietary and Confidential

Radio Parameters – Defected Blocks

8 Proprietary and Confidential

222
MRMC actual status

9 Proprietary and Confidential

Signal Level

10 Proprietary and Confidential

223
MSE – Mean Square Error

11 Proprietary and Confidential

XPI Level for XPIC

12 Proprietary and Confidential

224
MRMC

13 Proprietary and Confidential

Capacity, Throughput, Utilization, Frame Error State

14 Proprietary and Confidential

225
Performance Monitoring – Ethernet Services

ETH PM – RMON

16 Proprietary and Confidential

226
Ethernet Port Tx and RX PM Report

17 Proprietary and Confidential

PM – RMON – Special Registers

RMON register / Counter Description

Undersize frames received Frames shorter than 64 bytes

Oversize frames received Frames longer than 2000 bytes
Total frames received with a length of more than  2000 bytes, 
Jabber frames received
but with an invalid FCS
Total frames received with a length of less than 64
Fragments frames received
bytes, and an invalid FCS
Rx error frames received Total frames received with Phy‐error
Total frames received with CRC error, not countered in
FCS frames received
"Fragments", "Jabber" or "Rx error" counters

Pause frames received Number of flow‐control pause frames received

18 Proprietary and Confidential

227
Troubleshooting with RMON: Oversized frames

Site A Site B

T T T A

Tagged Frames with frame


size > 2000 bytes

When ingress frames exceed the maximum frame size, RMON counter “Oversized frames received” 
is updated accordingly 

19 Proprietary and Confidential

Troubleshooting with RMON: Discarding Example

Site A Site B

T T T A

Ingress traffic does not


comply to Policer rules

Discarding Examples:

Ingress rate > Rate Limiter
Ingress frames do not qualify to Policer rules

20 Proprietary and Confidential

228
Troubleshooting with RMON: Monitoring specific traffic types

Site A Site B
Rate Limiter
T T

Monitor

Video streams are generally transmitted over UDP 
with multicast addresses

To monitor traffic, check out the Multicast Frames 
Received register

To limit MC traffic, assign a Policer with a MC CIR 
rules

21 Proprietary and Confidential

Performance Monitoring – TDM Services

229
TDM – Line Alarms

23 Proprietary and Confidential

TDM port PMs Table

24 Proprietary and Confidential

230
Loopbacks

RFU RF Loopback

231
RFU RF Loopback

RFU RF LB

IF LB

27 Proprietary and Confidential

RFU RF Loopback

Use it to verify communication from Line to ODU is OK (including ODU)

• Traffic affecting – RX is stopped


• Configurable Timer to automatically restore traffic ( 0 = no time limits)
• RFU LED is RED when Loopback is ON
• LINK LED is GREEN when Loopback is ON
• Alarm is displayed in Current Alarms:

28 Proprietary and Confidential

232
TDM Loopback

29

TDM Loopback

30 Proprietary and Confidential

233
Ethernet Loopback – available from T7.9

31

Ethernet port loopback

Ethernet loopback level is available for T7.9!!!

32 Proprietary and Confidential

234
Ethernet Loopback

Radio port loopback


is far end loopback
type
Ethernet port
loopback is near end
loopback type

• Select port and click to Loopback button

33 Proprietary and Confidential

Ethernet Loopback Setting

• Enable Swapping MAC addresses


• Enable admin status
34 Proprietary and Confidential

235
Thank You

236
Header De-Duplication

November 2014
Version 3

Agenda
• Ethernet frame L1 and L2 Headers
• L3 Headers
• L4 Headers
• Header De-Duplication
• Exercise

2 Proprietary and Confidential

237
Ethernet frame L1 and L2 Headers

3 Proprietary and Confidential

L3 Headers
• Three types of header fields
• Constant
• Not Constant
• Calculated

Constant
Not Constant

Calculated

4 Proprietary and Confidential

238
L4 Headers
UDP Header

TCP Header

5 Proprietary and Confidential

Header De-Duplication
• Legacy (Layer 2)Header De- Duplication

• Enhanced (Layer 2-4) Header De- Duplication

http://www.youtube.com/watch?v=Z8dU0J9zDtg

6 Proprietary and Confidential

239
Header De-Duplication

Without Multi-Layer Header Compression, IP-20N still removes the IFG and
Preamble fields. This mechanism operates automatically even header
compression is not selected by the user.

7 Proprietary and Confidential

Layer 1 Header Suppression

8 Proprietary and Confidential

240
Legacy Header De-Duplication

9 Proprietary and Confidential

Enhanced Header De-Duplication

10 Proprietary and Confidential

241
Supported Headers
• Layer 2 Latency:
• Ethernet IP-20N provides best-in-class latency (RFC-2544) for all
• Ethernet + VLAN channels, making it LTE (Long-Term Evolution) ready:

• Ethernet + Q-in-Q <0.21ms for 28/56MHz channels (1518 byte frames)


• MPLS
<0.4 ms for 14MHz channels (1518 byte frames)
• PBB-TE
• Layer 3 <0.9 ms for 7MHz channels (1518 byte frames)
• IPv4
• IPv6
• Layer 4
• TCP
• UDP

11 Proprietary and Confidential

Multi Level Header De-duplications Counters

In order to help operators optimize Multi-Layer (Enhanced) header


compression, IP-20N provides counters when Enhanced Compression is
enabled. These counters include real-time information, such as the number of
currently active flows and the number of flows by specific flow type. This
information can be used by operators to monitor network usage and capacity,
and optimize the Multi-Layer compression settings. By monitoring the
effectiveness of the compression settings, the operator can adjust these
settings to ensure that the network achieves the highest possible effective
throughput.

12 Proprietary and Confidential

242
Capacity-Boosting Techniques
+40% Payload De-Duplication
Payload
40% Traffic Optimizer
De-Duplication
• Innovative Bit Stream Indexing technology
LTE/HSPA Optimized Header
Header 10% Compression • Additive to other traffic acceleration
De-Duplication Multi-Layer (L2-4) techniques offered by Ceragon
20% Compression

1Gbps
(2048 QAM)
• Exploits repetitive bit patterns in traffic
• Content, application & protocol agnostic

XPIC
• Does not affect network functionality
Radio
Capacity
• Optimized for aggregation microwave
backhaul where most repetitions occur
without any 520Mbps
(2048 QAM)
optimization

480Mbps
(1024QAM) Repetitive bit‐level patterns 
identified & compacted
390Mbps
(256 QAM)

56 MHz De‐compressor Compressor

13 Proprietary and Confidential

Working in a Live Network

Traffic optimizer performance in a live network
14 Proprietary and Confidential

243
Header De-Duplication Settings

15 Proprietary and Confidential

Summary
• Up to 148 B per frame can
be saved

• Header De-Duplication can


increase capacity by up to:

• 50% (256 byte packets)

• 25% (512 byte packets)

• 8% (1518 byte packets)

16 Proprietary and Confidential

244
De-Duplication Exercise

17 Proprietary and Confidential

Thank You

245
 

This page was intentionally left blank. 

246
TCC Redundancy

November 2014
Version 2

Agenda
• TCC Redundancy diagram
• TCC Redundancy in General
• TCC Redundancy Configuration

2 Proprietary and Confidential

247
TCC Redundancy

IF cable
IF cable

Traffic Traffic
Management
Management

3 Proprietary and Confidential

TCC Redundancy
• In a High Availability node, the 2RU IP-20N contains two TCCs for TCC
redundancy.
• TCC protection must be enabled in order for TCC redundancy to operate.
• In a High Availability node, the TCCs share chassis configuration and status
information via the chassis’ internal management channels.
• Activation key information, MAC addresses, and serial numbers, are stored
in the Inventory Module (IVM). In a High Availability node, both TCC cards
can access the IVM.
• TCC switchover takes place automatically upon failure of the active TCC.
TCC switchover can also be performed manually by the user.

• In a High Availability node, the GbE traffic interfaces on the TCC are
disabled.
• RMC-A and STM-1/OC-3 RST configurations are not copied from the active
to the standby TCC automatically by the Copy-to-Mate command and
should be aligned manually. Support for those cards is planned for a future
release.

4 Proprietary and Confidential

248
TCC redundancy procedure in general

1. Check software version running in main TCC.


2. Upgrade software chassis to software version T7.9 and higher
• (software below T7.7 version is not recommended for direct upgrade to T7.9)
3. Enable Main card Redundancy
4. Install software for Mate TCC (T7.9 and higher)
5. Check slot 1 and 11 for TDM standard (ETSI /ANSI)
• root>platform management show tdm-interfaces-standard
6. Check if both TCCs have identical license features
7. Copy configuration from Main to Mate TCC.
8. Connect Y cable for management

Remember that traffic ports on TCC is not recommended to use when TCC Redundancy is used!!!
Recommendation is to use E-LIC card for Ethernet traffic.

5 Proprietary and Confidential

1. Check software version running in chassis and Main TCC

• For TCC Redundancy function is required software version T7.9 and higher
• Upgrade to T7.9 is recommended from T7.7 or T7.7.5 (one version below)

6 Proprietary and Confidential

249
2. Upgrade Main TCC to sw. T7.9 and higher

This operation requires chassis cold reset which affects traffic

7 Proprietary and Confidential

3. Configure correct TDM standard when is needed - CLI

• For IP-20N default standard is ETSI


• To change the TDM interfaces to operate according to the ANSI (FCC) standard
(DS1 and OC-3), results in system reset and restores the default configuration.

8 Proprietary and Confidential

250
4. Enable Main Card Redundancy

9 Proprietary and Confidential

5. Check software version running in both TCCs

Mate TCC is not able to see


because Main Card
Redundancy is not enabled

10 Proprietary and Confidential

251
6. Install software T7.9 and higher to mate TCC

This operation will not affect traffic, only may cause management los for short time period

11 Proprietary and Confidential

7. Check if software was installed correctly

Identical sw. is required

12 Proprietary and Confidential

252
8. License installation

• Activation key and license features have to be same on both TCCs


• Activation key is the same one for both TCCs (Main and Standby TCC)

13 Proprietary and Confidential

9. Copy to mate

14 Proprietary and Confidential

253
10. Connect Y- cable for management

IF cable
IF cable

Traffic Traffic
Management
Management

15 Proprietary and Confidential

11. Check alarms

Correct configuration should be without Protection configuration mismatch alarm!!!

16 Proprietary and Confidential

254
12. Active & Standby TCC Redundancy status

17 Proprietary and Confidential

Thank you

18

255
 

This page was intentionally left blank. 

256
Cascading port

November 2014
Version 1

Agenda

• Hybrid TDM + Eth Concept

• Configuration of Cascading port

2 Proprietary and Confidential

257
Hybrid (TDM + Eth) services over IP-20N ‘cascading port’

• Cascading interfaces can be configured on ports 3 and 4 of an Ethernet LIC.


• When operating in cascading mode, these interfaces can handle hybrid
Ethernet and Native TDM traffic, enabling operators to create links among
multiple IP-20 units in a node for multi-directional applications based on hybrid
Ethernet and Native or Pseudowire TDM services

3 Proprietary and Confidential

Configuration – 1st Auto negotiation - OFF

Cascading
ports

4 Proprietary and Confidential

258
Configuration – 2nd Cascading Port Configuration

Cascading ports

5 Proprietary and Confidential

Configuration – 3rd Configure service

Create service point for Cascading Interface –


Management or Pipe service point

6 Proprietary and Confidential

259
Configuration – 4th Configure TDM Trail

Configure required TDM Trail by using cascading port

7 Proprietary and Confidential

Configuration – 5th Configure Ethernet Service

Configure Ethernet Service where Cascading port will be one Service point with
specific Interface type and C & S-VLAN encapsulation

8 Proprietary and Confidential

260
Thank You

261
 

This page was intentionally left blank. 

262
Course Evaluation Form
Dear Customer!
Thank you for taking the time to complete the following course evaluation form. Your
commentary and feedbacks are of great importance to us as we analysis and investigate each
course and report. The information you provide will be used to help us improve the content of
the course and monitor the quality of our training program.

Thank You,
Oren Gerstner,
Training Director

Course details
Location
Course Name / ID
Start Date (d/m/year) End Date (d/m/year)
Instructor Name
Company / Customer

Please rate your satisfaction with the course from 1 to 5 (1 = poor and 5 = excellent):

Did the course meet your expectations? 1 2 3 4 5

Was the course well organized? 1 2 3 4 5

Training facility & Environment 1 2 3 4 5


Was the difficulty of the course in line
1 2 3 4 5
with your expectations?

The instructor was well prepared 1 2 3 4 5


Instructor’s level of knowledge 1 2 3 4 5

Instructor’s presentation skills 1 2 3 4 5

Instructor’s willingness to help 1 2 3 4 5

Audience was treated respectfully 1 2 3 4 5

Language was clear and understood 1 2 3 4 5

Course book 1 2 3 4 5

Level of practical exercises (when relevant) 1 2 3 4 5


Setup and lab functionality (when relevant) 1 2 3 4 5
Usefulness Level of practical exercises (when relevant) 1 2 3 4 5
Overall satisfaction from the training session 1 2 3 4 5

Your comments:

Course Evaluation Form Page 1 of 1


263
 

This page was intentionally left blank. 

264

You might also like